Goto

Collaborating Authors

 container image


CRoSS: Diffusion Model Makes Controllable, Robust and Secure Image Steganography (Supplementary Material)

Neural Information Processing Systems

Below, we will introduce the details of each stage separately. In practical applications of image steganography, it is common to hide a single subject in an image, and this is also a problem that our method excels at solving. We employed two methods to obtain "Prompt1" and "Prompt2": an ChatGPT to generate the modified "Prompt2". The specific process of generating "Prompt2" is shown in Fig. A.1. We present examples from the Stego260 dataset in Fig. A.2, where each example consists of an image We show images from three categories: humans, animals, and general objects.



CRoSS: Diffusion Model Makes Controllable, Robust and Secure Image Steganography

Neural Information Processing Systems

Current image steganography techniques are mainly focused on cover-based methods, which commonly have the risk of leaking secret images and poor robustness against degraded container images. Inspired by recent developments in diffusion models, we discovered that two properties of diffusion models, the ability to achieve translation between two images without training, and robustness to noisy data, can be used to improve security and natural robustness in image steganography tasks. For the choice of diffusion model, we selected Stable Diffusion, a type of conditional diffusion model, and fully utilized the latest tools from open-source communities, such as LoRAs and ControlNets, to improve the controllability and diversity of container images. In summary, we propose a novel image steganography framework, named Controllable, Robust and Secure Image Steganography (CRoSS), which has significant advantages in controllability, robustness, and security compared to cover-based image steganography methods. These benefits are obtained without additional training. To our knowledge, this is the first work to introduce diffusion models to the field of image steganography. In the experimental section, we conducted detailed experiments to demonstrate the advantages of our proposed CRoSS framework in controllability, robustness, and security.



CRoSS: Diffusion Model Makes

Neural Information Processing Systems

Below, we will introduce the details of each stage separately. In practical applications of image steganography, it is common to hide a single subject in an image, and this is also a problem that our method excels at solving. We employed two methods to obtain "Prompt1" and "Prompt2": an ChatGPT to generate the modified "Prompt2". The specific process of generating "Prompt2" is shown in Fig. A.1. We present examples from the Stego260 dataset in Fig. A.2, where each example consists of an image We show images from three categories: humans, animals, and general objects.



Experience Deploying Containerized GenAI Services at an HPC Center

Beltre, Angel M., Ogden, Jeff, Pedretti, Kevin

arXiv.org Artificial Intelligence

Generative Artificial Intelligence (GenAI) applications are built from specialized components -- inference servers, object storage, vector and graph databases, and user interfaces -- interconnected via web-based APIs. While these components are often containerized and deployed in cloud environments, such capabilities are still emerging at High-Performance Computing (HPC) centers. In this paper, we share our experience deploying GenAI workloads within an established HPC center, discussing the integration of HPC and cloud computing environments. We describe our converged computing architecture that integrates HPC and Kubernetes platforms running containerized GenAI workloads, helping with reproducibility. A case study illustrates the deployment of the Llama Large Language Model (LLM) using a containerized inference server (vLLM) across both Kubernetes and HPC platforms using multiple container runtimes. Our experience highlights practical considerations and opportunities for the HPC container community, guiding future research and tool development.


ADA: Automated Moving Target Defense for AI Workloads via Ephemeral Infrastructure-Native Rotation in Kubernetes

Sheriff, Akram, Huang, Ken, Nemeth, Zsolt, Nakhjiri, Madjid

arXiv.org Artificial Intelligence

This paper introduces the Adaptive Defense Agent (ADA), an innovative Automated Moving Target Defense (AMTD) system designed to fundamentally enhance the security posture of AI workloads. ADA operates by continuously and automatically rotating these workloads at the infrastructure level, leveraging the inherent ephemerality of Kubernetes pods. This constant managed churn systematically invalidates attacker assumptions and disrupts potential kill chains by regularly destroying and respawning AI service instances. This methodology, applying principles of chaos engineering as a continuous, proactive defense, offers a paradigm shift from traditional static defenses that rely on complex and expensive confidential or trusted computing solutions to secure the underlying compute platforms, while at the same time agnostically supporting the latest advancements in agentic and nonagentic AI ecosystems and solutions such as agent-to-agent (A2A) communication frameworks or model context protocols (MCP). This AI-native infrastructure design, relying on the widely proliferated cloud-native Kubernetes technologies, facilitates easier deployment, simplifies maintenance through an inherent zero trust posture achieved by rotation, and promotes faster adoption. We posit that ADA's novel approach to AMTD provides a more robust, agile, and operationally efficient zero-trust model for AI services, achieving security through proactive environmental manipulation rather than reactive patching.


CRoSS: Diffusion Model Makes Controllable, Robust and Secure Image Steganography

Neural Information Processing Systems

Current image steganography techniques are mainly focused on cover-based methods, which commonly have the risk of leaking secret images and poor robustness against degraded container images. Inspired by recent developments in diffusion models, we discovered that two properties of diffusion models, the ability to achieve translation between two images without training, and robustness to noisy data, can be used to improve security and natural robustness in image steganography tasks. For the choice of diffusion model, we selected Stable Diffusion, a type of conditional diffusion model, and fully utilized the latest tools from open-source communities, such as LoRAs and ControlNets, to improve the controllability and diversity of container images. In summary, we propose a novel image steganography framework, named Controllable, Robust and Secure Image Steganography (CRoSS), which has significant advantages in controllability, robustness, and security compared to cover-based image steganography methods. These benefits are obtained without additional training.


Reviews: Hiding Images in Plain Sight: Deep Steganography

Neural Information Processing Systems

The authors present a new steganography technique based on deep neural networks to simultaneously conduct hiding and revealing as a pair. The main idea is to combine two images of the same size together. The trained process aims to compress the information from the secret image into the least noticeable portions of the cover image and consists of three processes: a prep-Network for encoding features, the Hiding Network creates a container image, and a Reveal Network for decoding the transmitted container image. On the positive side, the proposed technique seems novel and clever, although it uses/modifies existing deep learning frameworks and therefore should be viewed as an application paper. The experiments are comprehensive and the results are convincing.