Multimedia Forensics Flashcards
Reorder in the correct sequence the following operations of the JPEG processing chain.
DCT Entropy coding Quantization Block partitioning Color conversion RGB to YUV
1) [Color conversion RGB to YUV]
2) [Block partitioning]
3) [DCT]
4) [Quantization]
5) [Entropy coding]
Classify the following strategies into passive and active ones.
Watermarking CFA estimation Steganography PRNU estimation Leveraging compression traces Encryption Checking inconsistencies
Watermarking [Active] CFA estimation [Passive] Steganography [Active] PRNU estimation [Passive] Leveraging compression traces [Passive] Encryption [Active] Checking inconsistencies [Passive]
Given the following statements, assign the strategy (watermarking/cryptography) that fits the definition most.
- It does not prevent from making untraceable copies ____
- It allows a free distribution of the image/video content ______
- It is unperceptible ____
- it prevents unauthorized users from accessing the multimedia content _____
- it can be applied multiple times without compromising the accessibility of the content
- It does not prevent from making untraceable copies [cryptography]
- It allows a free distribution of the image/video content [watermarking]
- It is unperceptible [watermarking]
- it prevents unauthorized users from accessing the multimedia content [cryptography]
- it can be applied multiple times without compromising the accessibility of the content [watermarking]b
Performances of a watermarking strategy can be measured using _______, while the performance of a data hiding strategy must be measured using _______. In both strategies it is possible to take into account ______ (or other quality measurements) and _______ to evaluate the impact of each approach on the rate-distortion performance.
Assign these: ROC PSNR BER bit rate
Performances of a watermarking strategy can be measured using [ROC], while the performance of a data hiding strategy must be measured using [BER]. In both strategies it is possible to take into account [PSNR] (or other quality measurements) and [bit rate] to evaluate the impact of each approach on the rate-distortion performance.
Complete the following sentences concerning the relation between forensic and antiforensic strategies.
- Non-reversible processing operations
- Antiforensic strategies want to
- Forensic analysts
a. leave (unintentionally) some footprints on multimedia contents
b. cancel processing footprints left on the multimedia content
c. look for processing traces lefet by the editing operations
- Non-reversible processing operations → leave (unintentionally) some footprints on multimedia contents,
- Antiforensic strategies want to → cancel processing footprints left on the multimedia content.,
- Forensic analysts → look for processing traces lefet by the editing operations
Assign the proper definition/description to each concept.
- In watermarking
- In attacks
- In steganography
a. the hidden information is supposed to be erased
b. the hidden information is supposed to be detectable only for certain users
c. the hidden information is supposed to be detectable
- In watermarking → the hidden information is supposed to be detectable,
- In attacks → the hidden information is supposed to be erased,
- In steganography → the hidden information is supposed to be detectable only for certain users
Select the correct sentences about chromatic aberration among the following ones:
a. It is due to the fact that the lens makes different wavelengths converge to different points.
b. It depends on light refraction passing from air to lens material and viceversa
c. It is more evident on the center of the lens
d. It can be compensated by an additional lens
b. It depends on light refraction passing from air to lens material and vice-versa,
d. It can be compensated by an additional lens,
a. It is due to the fact that the lens makes different wavelengths converge to different points.
Concerning CMOS imaging sensors, we can state that (select the correct ones):
Select one or more:
a. dedicated circuitry is used to control the reading
b. they are based on a shift register circuitry
c. they can be activated because of a blooming effect
d. they are made of 3 transistors
e. values are sequentially read according to a row-column ordering
a. dedicated circuitry is used to control the reading,
d. they are made of 3 transistors,
e. values are sequentially read according to a row-column ordering
An imaging sensor matrix is made of CCD units. Concerning each unit, we can state (select the correct ones):
Select one or more:
a. the first capacitor is charged according to light intensity
b. reading is sequential
c. the final image can be distorted because of a rolling shutter effect
d. charges are transferred using a shift register circuitry
d. charges are transferred using a shift register circuitry,
a. the first capacitor is charged according to light intensity
Concerning the Photo Response Non Uniformity (PRNU) noise, we can state that (select the correct ones):
Select one or more:
a. it can be easily estimated from a highly texture image
b. it is robust to compression and most editing steps
c. it generates a multiplicative noise components depending on light intensity
d. it depends on temperature
e. it is generated by artifacts in the fabrication process of the sensor matrix.
e. it is generated by artifacts in the fabrication process of the sensor matrix.,
c. it generates a multiplicative noise components depending on light intensity
Given an image 𝐼 under examination and the PRNU pattern 𝐾̂ (associated to a camera), select the most appropriate operation to verify that the image 𝐼 has been taken with the camera associated to 𝐾̂
a. Compute the correlation between 𝐾̂ and 𝑊̂, where 𝑊̂ is the residual obtained by denoising 𝐼
b. Compute the correlation between 𝐼 and 𝐾̂
c. Compute the correlation between 𝐾̂ 𝐼 and 𝑊̂, where 𝑊̂ is the residual obtained by denoising 𝐼
d. Compute the correlation between 𝐼 and 𝑊̂, where 𝑊̂ is the residual obtained by denoising 𝐼
c. Compute the correlation between 𝐾̂ 𝐼 and 𝑊̂, where 𝑊̂ is the residual obtained by denoising 𝐼
In order to verify the correpondence between a PRNU estimate and an image, which of the following metrics can be used?
Select one or more:
a. Peak correlation energy
b. Normalized Cross Correlation
c. Average ratio between PRNU noise and residual after denoising
d. MSE between residual and PRNU noise
b. Normalized Cross Correlation,
a. Peak correlation energy
Given a digital image, estimating the CFA interpolation strategy adopted on that image allows …
Select one or more:
a. … to associate the image to a specific camera.
b. … to associate the image to a specific acquisition time.
c. … to associate the image to a camera model.
d. … to associate the image to a bayer pattern
c. … to associate the image to a camera model.
d. … to associate the image to a bayer pattern
Among the following list, select the applications that can be enabled by multimedia forensics tools.
Select one or more:
a. Copyright violation detection
b. Fraud detection
c. 3D reconstruction
d. Image cyphering
e. image/video authentication
e. image/video authentication
b. Fraud detection
a. Copyright violation detection
Which of the following features can be used to identify the ink-jet printer that generated a given document.
Select one or more:
a. Dot shapes
b. Periodic variation in the missing jets or paper-advance errors
c. Optical photoconductor (OPC) angular velocity
d. Polygon mirror wobble
a. Dot shapes
b. Periodic variation in the miss
Concerning fragile watermarking, we can state that …
Select one:
a. … it is necessary to reveal the editing operations applied on an image.
b. … it is an active strategy
c. … it is designed to remain unaltered after an editing operation.
d. … it is necessarily designed to be detected by everyone.
b. … it is an active strategy
Considering a video re-capture, select the correct statement among the following:
Select one:
a. Recapture produces blocking artifacts on the acquired image.
b. Artifacts are never periodic
c. Ghosting artifacts are present.
d. Ghosting artifacts can be modelled as a non-linear operation
c. Ghosting artifacts are present.