Multimedia Forensics Flashcards
Reorder in the correct sequence the following operations of the JPEG processing chain.
DCT Entropy coding Quantization Block partitioning Color conversion RGB to YUV
1) [Color conversion RGB to YUV]
2) [Block partitioning]
3) [DCT]
4) [Quantization]
5) [Entropy coding]
Classify the following strategies into passive and active ones.
Watermarking CFA estimation Steganography PRNU estimation Leveraging compression traces Encryption Checking inconsistencies
Watermarking [Active] CFA estimation [Passive] Steganography [Active] PRNU estimation [Passive] Leveraging compression traces [Passive] Encryption [Active] Checking inconsistencies [Passive]
Given the following statements, assign the strategy (watermarking/cryptography) that fits the definition most.
- It does not prevent from making untraceable copies ____
- It allows a free distribution of the image/video content ______
- It is unperceptible ____
- it prevents unauthorized users from accessing the multimedia content _____
- it can be applied multiple times without compromising the accessibility of the content
- It does not prevent from making untraceable copies [cryptography]
- It allows a free distribution of the image/video content [watermarking]
- It is unperceptible [watermarking]
- it prevents unauthorized users from accessing the multimedia content [cryptography]
- it can be applied multiple times without compromising the accessibility of the content [watermarking]b
Performances of a watermarking strategy can be measured using _______, while the performance of a data hiding strategy must be measured using _______. In both strategies it is possible to take into account ______ (or other quality measurements) and _______ to evaluate the impact of each approach on the rate-distortion performance.
Assign these: ROC PSNR BER bit rate
Performances of a watermarking strategy can be measured using [ROC], while the performance of a data hiding strategy must be measured using [BER]. In both strategies it is possible to take into account [PSNR] (or other quality measurements) and [bit rate] to evaluate the impact of each approach on the rate-distortion performance.
Complete the following sentences concerning the relation between forensic and antiforensic strategies.
- Non-reversible processing operations
- Antiforensic strategies want to
- Forensic analysts
a. leave (unintentionally) some footprints on multimedia contents
b. cancel processing footprints left on the multimedia content
c. look for processing traces lefet by the editing operations
- Non-reversible processing operations → leave (unintentionally) some footprints on multimedia contents,
- Antiforensic strategies want to → cancel processing footprints left on the multimedia content.,
- Forensic analysts → look for processing traces lefet by the editing operations
Assign the proper definition/description to each concept.
- In watermarking
- In attacks
- In steganography
a. the hidden information is supposed to be erased
b. the hidden information is supposed to be detectable only for certain users
c. the hidden information is supposed to be detectable
- In watermarking → the hidden information is supposed to be detectable,
- In attacks → the hidden information is supposed to be erased,
- In steganography → the hidden information is supposed to be detectable only for certain users
Select the correct sentences about chromatic aberration among the following ones:
a. It is due to the fact that the lens makes different wavelengths converge to different points.
b. It depends on light refraction passing from air to lens material and viceversa
c. It is more evident on the center of the lens
d. It can be compensated by an additional lens
b. It depends on light refraction passing from air to lens material and vice-versa,
d. It can be compensated by an additional lens,
a. It is due to the fact that the lens makes different wavelengths converge to different points.
Concerning CMOS imaging sensors, we can state that (select the correct ones):
Select one or more:
a. dedicated circuitry is used to control the reading
b. they are based on a shift register circuitry
c. they can be activated because of a blooming effect
d. they are made of 3 transistors
e. values are sequentially read according to a row-column ordering
a. dedicated circuitry is used to control the reading,
d. they are made of 3 transistors,
e. values are sequentially read according to a row-column ordering
An imaging sensor matrix is made of CCD units. Concerning each unit, we can state (select the correct ones):
Select one or more:
a. the first capacitor is charged according to light intensity
b. reading is sequential
c. the final image can be distorted because of a rolling shutter effect
d. charges are transferred using a shift register circuitry
d. charges are transferred using a shift register circuitry,
a. the first capacitor is charged according to light intensity
Concerning the Photo Response Non Uniformity (PRNU) noise, we can state that (select the correct ones):
Select one or more:
a. it can be easily estimated from a highly texture image
b. it is robust to compression and most editing steps
c. it generates a multiplicative noise components depending on light intensity
d. it depends on temperature
e. it is generated by artifacts in the fabrication process of the sensor matrix.
e. it is generated by artifacts in the fabrication process of the sensor matrix.,
c. it generates a multiplicative noise components depending on light intensity
Given an image 𝐼 under examination and the PRNU pattern 𝐾̂ (associated to a camera), select the most appropriate operation to verify that the image 𝐼 has been taken with the camera associated to 𝐾̂
a. Compute the correlation between 𝐾̂ and 𝑊̂, where 𝑊̂ is the residual obtained by denoising 𝐼
b. Compute the correlation between 𝐼 and 𝐾̂
c. Compute the correlation between 𝐾̂ 𝐼 and 𝑊̂, where 𝑊̂ is the residual obtained by denoising 𝐼
d. Compute the correlation between 𝐼 and 𝑊̂, where 𝑊̂ is the residual obtained by denoising 𝐼
c. Compute the correlation between 𝐾̂ 𝐼 and 𝑊̂, where 𝑊̂ is the residual obtained by denoising 𝐼
In order to verify the correpondence between a PRNU estimate and an image, which of the following metrics can be used?
Select one or more:
a. Peak correlation energy
b. Normalized Cross Correlation
c. Average ratio between PRNU noise and residual after denoising
d. MSE between residual and PRNU noise
b. Normalized Cross Correlation,
a. Peak correlation energy
Given a digital image, estimating the CFA interpolation strategy adopted on that image allows …
Select one or more:
a. … to associate the image to a specific camera.
b. … to associate the image to a specific acquisition time.
c. … to associate the image to a camera model.
d. … to associate the image to a bayer pattern
c. … to associate the image to a camera model.
d. … to associate the image to a bayer pattern
Among the following list, select the applications that can be enabled by multimedia forensics tools.
Select one or more:
a. Copyright violation detection
b. Fraud detection
c. 3D reconstruction
d. Image cyphering
e. image/video authentication
e. image/video authentication
b. Fraud detection
a. Copyright violation detection
Which of the following features can be used to identify the ink-jet printer that generated a given document.
Select one or more:
a. Dot shapes
b. Periodic variation in the missing jets or paper-advance errors
c. Optical photoconductor (OPC) angular velocity
d. Polygon mirror wobble
a. Dot shapes
b. Periodic variation in the miss
Concerning fragile watermarking, we can state that …
Select one:
a. … it is necessary to reveal the editing operations applied on an image.
b. … it is an active strategy
c. … it is designed to remain unaltered after an editing operation.
d. … it is necessarily designed to be detected by everyone.
b. … it is an active strategy
Considering a video re-capture, select the correct statement among the following:
Select one:
a. Recapture produces blocking artifacts on the acquired image.
b. Artifacts are never periodic
c. Ghosting artifacts are present.
d. Ghosting artifacts can be modelled as a non-linear operation
c. Ghosting artifacts are present.
Concerning a recaptured video using a handheld device, select the wrong statement about motion cues
Select one:
a. motion cues are highly uncorrelated.
b. motion cues are computed from local feature points
c. motion cues are highly correlated
c. motion cues are highly correlated
Assuming that you want to improve the clarity and visibility of a face in a frame from a video surveillance sequence taken at night by a low resolution camera, what operation would you consider … (among the following)
Select one or more:
a. magnification
b. frame integration
c. gamma correction
d. blurring compensation
e. motion ehnancement
f. noise reduction
a. magnification
b. frame integration
c. gamma correction
f. noise reduction
Reorder sequentially the different steps of a face recognition algorithm (listed at the bottom of the paragraph).
a. [Face processing]
b. [Face alignment and normalization]
c. [Feature extraction]
d. [Face classification/verification]
e. [Face localization]
A) [Face localization] B) [Face alignment and normalization] C) [Face processing] D) [Feature extraction] E) [Face classification/verification]
Given the different types of attacks to a facial recognition (FR) system (reported at the end of the section), link each characteristics to the attack type that proves to be the most suitable.
- the attack requires a picture (digital or printed) of the person to be impersonated ______
- the attack is very difficult to be detected (even for a human supervisor) ____
- shadows and depth cues can be used to reveal this attack ___
- It is less frequent than the other two ____
Assign these:
Photo attack
Mask attack
Make‑up attack
- the attack requires a picture (digital or printed) of the person to be impersonated [Photo attack]
- the attack is very difficult to be detected (even for a human supervisor) [Make‑up attack]
- shadows and depth cues can be used to reveal this attack [Photo attack]
- It is less frequent than the other two [Mask attack]
In face recognition, morphing operations are intended to …
Select one or more:
a. … compensate different head orientations and poses.
b. … compensate differences in facial expressions
c. … modify the positions of the 68 facial landmarks
d. … compensate illumination difference
b. … compensate differences in facial expressions
c. … modify the positions of the 68 facial landmarks
In face recognition systems, facial landmarks are detected and moved to compensate differences in people expressions. Concerning the 68 dlib facial landmarks, we can state that …
Select one or more:
a. … they can be localized around the mouth
b. … they are localized in the middle of cheeks.
c. … they can be localized on the chin
d. … they are localized in the middle of the forehead.
e. … they can be localized on the eyebrows
a. … they can be localized around the mouth
c. … they can be localized on the chin
e. … they can be localized on the eyebrows
Among the following factors, select those that can be included among the PIE factors
Select one or more:
a. few samples per person.
b. compression
c. image resolution
d. head pose
e. facial expression
f. closed-set limitations
g. light intensity
b. compression
c. image resolution
d. head pose
e. facial expression
g. light intensity