Towards Effective Prompt Stealing Attack against Text-to-Image Diffusion Models

📅 2025-08-09
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Prompt engineering in text-to-image diffusion models constitutes critical intellectual property, yet remains vulnerable to reverse-engineering attacks; existing methods suffer from poor generalizability and weak adaptability. This paper proposes Prometheus, a training-free, search-based prompt inversion framework. Leveraging a lightweight surrogate model, Prometheus integrates dynamic modifier generation, context-aware matching ranking, and greedy feedback-driven search to achieve efficient cross-model (e.g., DALL·E, Midjourney, Leonardo.ai) and multi-scenario (including platform-deployed images) prompt reconstruction. Crucially, it requires no access to target-model gradients or fine-tuning, ensuring strong robustness and low computational overhead. Evaluated on real-world platforms—including PromptBase and AIFrog—Prometheus improves average attack success rate by 25.0% over baselines and maintains high effectiveness against prevalent defense mechanisms.

Technology Category

Application Category

📝 Abstract
Text-to-Image (T2I) models, represented by DALL$cdot$E and Midjourney, have gained huge popularity for creating realistic images. The quality of these images relies on the carefully engineered prompts, which have become valuable intellectual property. While skilled prompters showcase their AI-generated art on markets to attract buyers, this business incidentally exposes them to extit{prompt stealing attacks}. Existing state-of-the-art attack techniques reconstruct the prompts from a fixed set of modifiers (i.e., style descriptions) with model-specific training, which exhibit restricted adaptability and effectiveness to diverse showcases (i.e., target images) and diffusion models. To alleviate these limitations, we propose Prometheus, a training-free, proxy-in-the-loop, search-based prompt-stealing attack, which reverse-engineers the valuable prompts of the showcases by interacting with a local proxy model. It consists of three innovative designs. First, we introduce dynamic modifiers, as a supplement to static modifiers used in prior works. These dynamic modifiers provide more details specific to the showcases, and we exploit NLP analysis to generate them on the fly. Second, we design a contextual matching algorithm to sort both dynamic and static modifiers. This offline process helps reduce the search space of the subsequent step. Third, we interact with a local proxy model to invert the prompts with a greedy search algorithm. Based on the feedback guidance, we refine the prompt to achieve higher fidelity. The evaluation results show that Prometheus successfully extracts prompts from popular platforms like PromptBase and AIFrog against diverse victim models, including Midjourney, Leonardo.ai, and DALL$cdot$E, with an ASR improvement of 25.0%. We also validate that Prometheus is resistant to extensive potential defenses, further highlighting its severity in practice.
Problem

Research questions and friction points this paper is trying to address.

Stealing valuable prompts from text-to-image models
Overcoming limitations of existing prompt attack techniques
Enhancing adaptability to diverse showcases and models
Innovation

Methods, ideas, or system contributions that make the work stand out.

Training-free, proxy-in-the-loop, search-based attack
Dynamic modifiers generated via NLP analysis
Contextual matching and greedy search algorithm
🔎 Similar Papers
No similar papers found.
Shiqian Zhao
Shiqian Zhao
Nanyang Technological University of Singapore
RobustAIAI SecurityAutomatic Driving
C
Chong Wang
Nanyang Technological University, Singapore
Y
Yiming Li
Nanyang Technological University, Singapore
Y
Yihao Huang
National University of Singapore, Singapore
Wenjie Qu
Wenjie Qu
National University of Singapore
Applied CryptographyLLM Security
Siew-Kei Lam
Siew-Kei Lam
Nanyang Technological University
Custom ComputingEmbedded VisionEdge AIEmbedded System SecurityTransportation Analytics
Y
Yi Xie
Tsinghua University, China
Kangjie Chen
Kangjie Chen
Nanyang Technological University
Trustworthy AIRed-teamingBackdoor AttacksLLM-based Agents
J
Jie Zhang
A*STAR, Singapore
T
Tianwei Zhang
Nanyang Technological University, Singapore