FINDING · DEFENSE

Meteor is proven secure against chosen-hiddentext attacks: any PPT adversary distinguishing Meteor output from honest model output can be reduced to breaking the underlying PRG. The scheme produces stegotext provably indistinguishable from the generative model's own output distribution, and requires only a shared public model — not a secret channel — making the model analogous to a common random string. On GPU the encoding overhead is ~1× model-load time; on CPU ~4.6×; on mobile ~49.5×.

From 2021-kaptchuk-meteorMeteor: Cryptographically Secure Steganography for Realistic Distributions · §5.2 / §6 / Table 2 · 2021 · Computer and Communications Security

Implications

Tags

censors
cnir
techniques
random-payload-detectml-classifiertraffic-shape
defenses
steganographymeta-resistance

Extracted by claude-sonnet-4-6 — review before relying.