0% found this document useful (0 votes)
25 views29 pages

Image Processig Mcqs QIP

dip

Uploaded by

dean-pmcs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views29 pages

Image Processig Mcqs QIP

dip

Uploaded by

dean-pmcs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 29

Representing Digital Images

1. Assume that an image f(x, y) is sampled so that the result has M rows and N columns. If the
values of the coordinates at the origin are (x, y) = (0, 0), then the notation (0, 1) is used to signify
:
a) Second sample along first row
b) First sample along second row
c) First sample along first row
d) Second sample along second row

Answer: a
Explanation: The values of the coordinates at the origin are (x, y) = (0, 0). Then, the next
coordinate values (second sample) along the first row of the image are represented as (x, y) = (0,
1).
2. The resulting image of sampling and quantization is considered a matrix of real numbers. By
what name(s) the element of this matrix array is called __________
a) Image element or Picture element
b) Pixel or Pel
c) All of the mentioned
d) None of the mentioned

Answer: c
Explanation: Sampling and Quantization of an image f(x, y) forms a matrix of real numbers and
each element of this matrix array is commonly known as Image element or Picture element or
Pixel or Pel.
3. Let Z be the set of real integers and R the set of real numbers. The sampling process may be
viewed as partitioning the x-y plane into a grid, with the central coordinates of each grid being
from the Cartesian product Z2, that is a set of all ordered pairs (zi, zj), with zi and zj being
integers from Z. Then, f(x, y) is said a digital image if:
a) (x, y) are integers from Z2 and f is a function that assigns a gray-level value (from Z) to each
distinct pair of coordinates (x, y)
b) (x, y) are integers from R2 and f is a function that assigns a gray-level value (from R) to each
distinct pair of coordinates (x, y)
c) (x, y) are integers from R2 and f is a function that assigns a gray-level value (from Z) to each
distinct pair of coordinates (x, y)
d) (x, y) are integers from Z2 and f is a function that assigns a gray-level value (from R) to each
distinct pair of coordinates (x, y)

Answer: d
Explanation: In the given condition, f(x, y) is a digital image if (x, y) are integers from Z2 and f a
function that assigns a gray-level value (that is, a real number from the set R) to each distinct
coordinate pair (x, y).
4. Let Z be the set of real integers and R the set of real numbers. The sampling process may be
viewed as partitioning the x-y plane into a grid, with the central coordinates of each grid being
from the Cartesian product Z2, that is a set of all ordered pairs (zi, zj), with zi and zj being
integers from Z. Then, f(x, y) is a digital image if (x, y) are integers from Z2 and f is a function
that assigns a gray-level value (that is, a real number from the set R) to each distinct coordinate
pair (x, y). What happens to the digital image if the gray levels also are integers?
a) The Digital image then becomes a 2-D function whose coordinates and amplitude values are
integers
b) The Digital image then becomes a 1-D function whose coordinates and amplitude values are
integers
c) The gray level can never be integer
d) None of the mentioned

Answer: a
Explanation: In Quantization Process if the gray levels also are integers the Digital image then
becomes a 2-D function whose coordinates and amplitude values are integers.
5. The digitization process i.e. the digital image has M rows and N columns, requires decisions
about values for M, N, and for the number, L, of gray levels allowed for each pixel. The value M
and N have to be:
a) M and N have to be positive integer
b) M and N have to be negative integer
c) M have to be negative and N have to be positive integer
d) M have to be positive and N have to be negative integer

Answer: a
Explanation: The digitization process i.e. the digital image has M rows and N columns, requires
decisions about values for M, N, and for the number, L, of max gray level. There are no
requirements on M and N, other than that M and N have to be positive integer.
6. The digitization process i.e. the digital image has M rows and N columns, requires decisions
about values for M, N, and for the number, L, of max gray levels. There are no requirements on
M and N, other than that M and N have to be positive integer. However, the number of gray
levels typically is
a) An integer power of 2 i.e. L = 2k
b) A Real power of 2 i.e. L = 2k
c) Two times the integer value i.e. L = 2k
d) None of the mentioned

Answer: a
Explanation: Due to processing, storage, and considering the sampling hardware, the number of
gray levels typically is an integer power of 2 i.e. L = 2k.
7. The digitization process i.e. the digital image has M rows and N columns, requires decisions
about values for M, N, and for the number, L, of max gray levels is an integer power of 2 i.e. L =
2k, allowed for each pixel. If we assume that the discrete levels are equally spaced and that they
are integers then they are in the interval __________ and Sometimes the range of values spanned
by the gray scale is called the ________ of an image.
a) [0, L – 1] and static range respectively
b) [0, L / 2] and dynamic range respectively
c) [0, L / 2] and static range respectively
d) [0, L – 1] and dynamic range respectively

8. After digitization process a digital image with M rows and N columns have to be positive and
for the number, L, max gray levels i.e. an integer power of 2 for each pixel. Then, the number b,
of bits required to store a digitized image is:
a) b=M*N*k
b) b=M*N*L
c) b=M*L*k
d) b=L*N*k

Answer: a
Explanation: In digital image of M rows and N columns and L max gray levels an integer power
of 2 for each pixel. The number, b, of bits required to store a digitized image is: b=M*N*k.
9. An image whose gray-levels span a significant portion of gray scale have __________
dynamic range while an image with dull, washed out gray look have __________ dynamic range.
a) Low and High respectively
b) High and Low respectively
c) Both have High dynamic range, irrespective of gray levels span significance on gray scale
d) Both have Low dynamic range, irrespective of gray levels span significance on gray scale

Answer: b
Explanation: An image whose gray-levels signifies a large portion of gray scale have High
dynamic range, while that with dull, washed out gray look have Low dynamic range.
10. Validate the statement “When in an Image an appreciable number of pixels exhibit high
dynamic range, the image will have high contrast.”
a) True
b) False

Answer: a
Explanation: In an Image if an appreciable number of pixels exhibit high dynamic range
property, the image will have high contrast.
11. In digital image of M rows and N columns and L discrete gray levels, calculate the bits
required to store a digitized image for M=N=32 and L=16.
a) 16384
b) 4096
c) 8192
d) 512

Answer: b
Explanation: In digital image of M rows and N columns and L max gray levels i.e. an integer
power of 2 for each pixel. The number, b, of bits required to store a digitized image is:
b=M*N*k.
For L=16, k=4.
i.e. b=4096.

Image Sensing and Acquisition

1. The most familiar single sensor used for Image Acquisition is


a) Microdensitometer
b) Photodiode
c) CMOS
d) None of the Mentioned

Answer: b
Explanation: Photodiode is the most commonly used single sensor made up of silicon materials.
2. A geometry consisting of in-line arrangement of sensors for image acquisition
a) A photodiode
b) Sensor strips
c) Sensor arrays
d) CMOS

Answer: b
Explanation: Sensor strips are very common next to single sensor and use in-line arrangement.
3. CAT in imaging stands for
a) Computer Aided Telegraphy
b) Computer Aided Tomography
c) Computerised Axial Telegraphy
d) Computerised Axial Tomography

Answer: d
Explanation: Industrial Computerised Axial Tomography is based on image acquisition using
sensor strips.
advertisement
4. The section of the real plane spanned by the coordinates of an image is called the
_____________
a) Spacial Domain
b) Coordinate Axes
c) Plane of Symmetry
d) None of the Mentioned

Answer: a
Explanation: The section of the real plane spanned by the coordinates of an image is called the
Spacial Domain, with the x and y coordinates referred to as Spacial coordinates.
5. The difference is intensity between the highest and the lowest intensity levels in an image is
___________
a) Noise
b) Saturation
c) Contrast
d) Brightness

Answer: c
Explanation: Contrast is the measure of the difference is intensity between the highest and the
lowest intensity levels in an image.
6. _____________ is the effect caused by the use of an insufficient number of intensity levels in
smooth areas of a digital image.
a) Gaussian smooth
b) Contouring
c) False Contouring
d) Interpolation

Answer: c
Explanation: It is called so because the ridges resemble the contours of a map.
7. The process of using known data to estimate values at unknown locations is called
a) Acquisition
b) Interpolation
c) Pixelation
d) None of the Mentioned

Answer: b
Explanation: Interpolation is the process used to estimate unknown locations. It is applied in all
image resampling methods.
8. Which of the following is NOT an application of Image Multiplication?
a) Shading Correction
b) Masking
c) Pixelation
d) Region of Interest operations

Answer: c
Explanation: Because Pixelation deals with enlargement of pixels.
9. The procedure done on a digital image to alter the values of its individual pixels is
a) Neighbourhood Operations
b) Image Registration
c) Geometric Spacial Transformation
d) Single Pixel Operation

Answer: d
Explanation: It is expressed as a transformation function T, of the form s=T(z) , where z is the
intensity.
10. In Geometric Spacial Transformation, points whose locations are known precisely in input
and reference images.
a) Tie points
b) Réseau points
c) Known points
d) Key-points

Answer: a
Explanation: Tie points, also called Control points are points whose locations are known
precisely in input and reference images.
Relationship between Pixels and Image Enhancement Basics
1. A pixel p at coordinates (x, y) has neighbors whose coordinates are given by:
(x+1, y), (x-1, y), (x, y+1), (x, y-1)
This set of pixels is called ____________
a) 4-neighbors of p
b) Diagonal neighbors
c) 8-neighbors
d) None of the mentioned

Answer: a
Explanation: The given set of neighbor pixel are 1 unit distance to right, left, up and below
respectively from pixel p(x, y). So, are called 4-neighbors of p.
2. A pixel p at coordinates (x, y) has neighbors whose coordinates are given by:
(x+1, y+1), (x+1, y-1), (x-1, y+1), (x-1, y-1)
This set of pixels is called ____________
a) 4-neighbors of p
b) Diagonal neighbors
c) 8-neighbors
d) None of the mentioned

Answer: b
Explanation: The given set of neighbor pixel are 1 unit distance to right-up diagonal, right-down
diagonal, left-up diagonal and left-down diagonal respectively from pixel p(x, y). So, are called
Diagonal neighbors of p.
3. What is the set of pixels of 8-neighbors of pixel p at coordinates (x, y)?
a) (x+1, y), (x-1, y), (x, y+1), (x, y-1), (x+2, y), (x-2, y), (x, y+2), (x, y-2)
b) (x+1, y), (x-1, y), (x, y+1), (x, y-1), (x+1, y+1), (x+1, y-1), (x-1, y+1), (x-1, y-1)
c) (x+1, y+1), (x+1, y-1), (x-1, y+1), (x-1, y-1), (x+2, y+2), (x+2, y-2), (x-2, y+2), (x-2, y-2)
d) (x+2, y), (x-2, y), (x, y+2), (x, y-2), (x+2, y+2), (x+2, y-2), (x-2, y+2), (x-2, y-2)

Answer: b
Explanation: The set of pixels of 4-neighbors of p and Diagonal neighbors of p together are
called as 8-neighbors of pixel p(x, y).
4. Two pixels p and q having gray values from V, the set of gray-level values used to define
adjacency, are m-adjacent if:
a) q is in N4(p)
b) q is in ND(p) and the set N4(p) ∩ N4(q) has no pixels whose values are from V
c) Any of the mentioned
d) None of the mentioned

Answer: c
Explanation: Mixed adjacency is a modified form of 8-adjacency.
The above conditioned Two pixels p and q are m-adjacent if:
q is in N4(p), or
q is in ND(p) and the set N4(p) ∩ N4(q) has no pixels whose values are from V.
5. Let S, a subset of pixels in an image, is said to be a connected set if:
a) If for any pixel p in S, the set of pixels that are connected to it in Sis only one
b) If it only has one connected component
c) If S is a region
d) All of the mentioned

Answer: d
Explanation: For a subset of pixels in an image S
For any pixel p in S, the set of pixels is called a connected component of S if connected to p in S.
The set S is called a connected set if it only has one connected component.
S, is a region of the image if S is a connected set.
6. Let R be a subset of pixels in an image. How can we define the contour of R?
a) If R is a region, and the set of pixels in R have one or more neighbors that are not in R
b) If R is an entire image, then the set of pixels in the first and last rows and columns of R
c) All of the mentioned
d) None of the mentioned

Answer: c
Explanation: For a subset of pixels in an image R
The boundary or contour of a region R is the set of pixels in the region that have one or more
neighbors that are not in R.
In case R is an entire image, then its boundary is defined as the set of pixels in the first and last
rows and columns of the image.
7. For pixels p(x, y), q(s, t), and z(v, w), D is a distance function or metric if:
a) D(p, q) ≥ 0
b) D(p, q) = D(q, p)
c) D(p, z) ≤ D(p, q) + D(q, z)
d) All of the mentioned

Answer: d
Explanation: For pixels p(x, y), q(s, t), and z(v, w), D is a distance function or metric if:
(i) D(p, q) ≥ 0, (D(p, q) = 0 if p=q),
(ii) D(p, q) = D(q, p), and
(iii) D(p, z) ≤ D(p, q) + D(q, z).
8. For pixels p(x, y), q(s, t), the Euclidean distance between p and q is defined as:
a) D(p, q) = [(x – s)2 + (y – t)2]1/2
b) D(p, q) = |x – s| + |y – t|
c) D(p, q) = max (|x – s| + |y – t|)
d) None of the mentioned

Answer: a
Explanation: The Euclidean distance for pixels p(x, y), q(s, t) is:
D(p, q) = [(x – s)2 + (y – t)2]1/2.
9. For pixels p(x, y), q(s, t), the city-block distance between p and q is defined as:
a) D(p, q) = [(x – s)2 + (y – t)2]1/2
b) D(p, q) = |x – s| + |y – t|
c) D(p, q) = max (|x – s| + |y – t|)
d) None of the mentioned

Answer: b
Explanation: The city-block distance for pixels p(x, y), q(s, t) is the D4 distance given by:
D(p, q) = |x – s| + |y – t|.
10. For pixels p(x, y), q(s, t), the chessboard distance between p and q is defined as:
a) D(p, q) = [(x – s)2 + (y – t)2]1/2
b) D(p, q) = |x – s| + |y – t|
c) D(p, q) = max (|x – s| + |y – t|)
d) None of the mentioned

Answer: c
Explanation: The chessboard distance for pixels p(x, y), q(s, t) is the D8 distance given by:
D(p, q) = max (|x – s| + |y – t|).
11. The domain that refers to image plane itself and the domain that refers to Fourier transform
of an image is/are :
a) Spatial domain in both
b) Frequency domain in both
c) Spatial domain and Frequency domain respectively
d) Frequency domain and Spatial domain respectively

Answer: c
Explanation: Spatial domain itself refers to the image plane, and approaches in this category are
based on direct manipulation of pixels in an image.
Techniques based on Frequency domain processing are based on modifying the Fourier
transform of an image.
12. What is the technique for a gray-level transformation function called, if the transformation
would be to produce an image of higher contrast than the original by darkening the levels below
some gray-level m and brightening the levels above m in the original image.
a) Contouring
b) Contrast stretching
c) Mask processing
d) Point processing

Answer: b
Explanation: For a gray-level transformation function “s=T(r)”, where r and s are the gray-level
of f(x, y) (input image) and g(x, y) (output image) respectively at any point (x, y).
Then the technique, contrast stretching compresses the value of r below m by transformation
function into a narrow range of s, towards black and brightens the value of r above m.
13. For Image Enhancement a general-approach is to use a function of values of f (input image)
in a predefined neighborhood of (x, y) to determine the value of g (output image) at (x, y). The
techniques that uses such approaches are called ________
a) Contouring
b) Contrast stretching
c) Mask processing
d) None of the mentioned

Answer: c
Explanation: The above mentioned approach is based on the use of masks. A mask is a small
m*n 2-D array in which the values of mask coefficients determine the nature of the process and
Image Enhancement on such is called Mask Processing or Filtering.

Intensity Transformation Functions

1. How is negative of an image obtained with intensity levels [0,L-1] with “r” and “s” being
pixel values?
a) s = L – 1 + r
b) s = L – 1 – r
c) s = L + 1 + r
d) s = L + 1 + r

Answer: b
Explanation: The negative is obtained using s = L – 1 + r.
2. The general form of log transformations is ____________________
a) s = c.log(1 + r)
b) s = c+log(1 + r)
c) s = c.log(1 – r)
d) s = c-log(1 – r)

Answer: a
Explanation: s = c.log(1 + r) is the log transformation.
3. Power-law transformations has the basic form of ________________ where c and ∆ are
constants.
a) s = c + r∆
b) s = c – r∆
c) s = c * r∆
d) s = c / r.∆

Answer: c
Explanation: s = c * r∆ is called the Power-law transformation.

4. For what value of the output must the Power-law transformation account for offset?
a) No offset needed
b) All values
c) One
d) Zero

Answer: d
Explanation: When the output is Zero, an offset is necessary.
5. What is Gamma Correction?
a) A Power-law response phenomenon
b) Inverted Intensity curve
c) Light brightness variation
d) None of the Mentioned

Answer: a
Explanation: The exponent in Power-law is called gamma and the process used to correct the
response of Power-law transformation is called Gamma Correction.

6. Which process expands the range of intensity levels in an image so that it spans the full
intensity range of the display?
a) Shading correction
b) Contrast sketching
c) Gamma correction
d) None of the Mentioned

Answer: b
Explanation: Contrast sketching is the process used to expand intensity levels in an image.
7. Highlighting a specific range of intensities of an image is called _______________
a) Intensity Matching
b) Intensity Highlighting
c) Intensity Slicing
d) None of the Mentioned

Answer: c
Explanation: Highlighting a specific range of intensities of an image is called Intensity Slicing.
8. Highlighting the contribution made to total image by specific bits instead of highlighting
intensity-level changes is called ____________________
a) Intensity Highlighting
b) Byte-Slicing
c) Bit-plane slicing
d) None of the Mentioned

Answer: c
Explanation: It is called Bit-plane slicing.
9. Which of the following involves reversing the intensity levels of an image?
a) Log Transformations
b) Piecewise Linear Transformations
c) Image Negatives
d) None of the Mentioned

Answer: c
Explanation: Image negatives use reversing intensity levels.
10. Piecewise Linear Transformation function involves which of the following?
a) Bit-plane slicing
b) Intensity level slicing
c) Contrast stretching
d) All of the Mentioned

Answer: d
Explanation: Piecewise Linear Transformation function involves all the mentioned functions.

image restoration

1. Degradation can be estimated by


(A) 2 ways
(B) 3 ways
(C) 4 ways
(D) 5 ways

Correct option is B
2. Power spectra and noise of undegraded image must be known as.
(A) Wiener filter
(B) Notch filter
(C) Band pass filter
(D) None of these

Correct option is A
3. . Degraded image is produced using degradation process and
(A) Pixels
(B) Destruction
(C) Coordinates
(D) Additive noise

Correct option is D

4. Degraded image is obtain in a


(A) Frequency domain
(B) Spatial domain
(C) Time domain
(D) Plane

Correct option is B

5. What is the Principle sources of noise arise during image ?


(A) Restoration
(B) Acquisition
(C) Destruction
(D) Degradation

Correct option is B

6. From where, Periodic noise arise


(A) Electric interference
(B) Gamma interference
(C) Beta interference
(D) None of the above

Correct option is A

7. Which is not a type of noise ?


(A) Gamma noise
(B) Rayleigh noise
(C) Black noise
(D) Exponential noise

Correct option is C

8. Band reject filters are used where the noise components are usually
(A) Known
(B) Unknown
(C) Taken
(D) Reject

Correct option is A

9. SNR in noise stands for


(A) Signal to noise ratio
(B) Serial to noise ratio
(C) Signal to notch ratio
(D) Serial to notch ratio

Correct option is A

10. The approach to restoration is


(A) Spike filtering
(B) Black filtering
(C) Ranking
(D) Inverse filtering

Correct option is D
11. Restoration can’t be done using
(A) Single projection
(B) Double projection
(C) Triple projection
(D) Octa projection

Correct option is A

12. What is the purpose of restoration ?


(A) To gain Pixels
(B) To gain original image
(C) To gain degraded image
(D) To gain coordinates

Correct option is B

13. Gaussian noise is referred to as


(A) Black noise
(B) White noise
(C) Red noise
(D) Normal noise

Correct option is D

14. Filter that performs opposite to band rejected filter is called


(A) Low pass filter
(B) Band pass filter
(C) High pass filter
(D) None of the above

Correct option is B

15. Contra harmonic mean filter generate


(A) Restored image
(B) Degraded image
(C) Original image
(D) Plane

Correct option is A

16. Which is not a type of mean filter ?


(A) Harmonic mean filter
(B) Arithmetic mean filter
(C) Geometrical mean filter
(D) Sequence mean filter
Correct option is D

17. Mean Filter reduce noise by using


(A) Acquisition
(B) Sharpening
(C) Restoration
(D) Blurring

Correct option is D

18. In geometric mean filters when alpha is equal to 0 then it works as:
(A) Notch filter
(B) Parametric filter
(C) Band pass filter
(D) Inverse filter

Correct option is B

19. Images usually gets corrupted during


(A) Restoration
(B) Acquisition
(C) Transmission
(D) Degradation

Correct option is C

20. Low frequency components are passed by:


(A) Max filter
(B) High pass filter
(C) Low pass filter
(D) All of the above

Correct option is C

Spatial Filtering

1. In neighborhood operations working is being done with the value of image pixel in the
neighborhood and the corresponding value of a subimage that has same dimension as
neighborhood. The subimage is referred as _________
a) Filter
b) Mask
c) Template
d) All of the mentioned

Answer: d
Explanation: Working in neighborhood operations is done with the value of a subimage having
same dimension as neighborhood corresponding to the value in the image pixel. The subimage is
called as filter, mask, template, kernel or window.
2. The response for linear spatial filtering is given by the relationship __________
a) Sum of filter coefficient’s product and corresponding image pixel under filter mask
b) Difference of filter coefficient’s product and corresponding image pixel under filter mask
c) Product of filter coefficient’s product and corresponding image pixel under filter mask
d) None of the mentioned

Answer: a
Explanation: In spatial filtering the mask is moved from point to point and at each point the
response is calculated using a predefined relationship. The relationship in linear spatial filtering
is given by: the Sum of filter coefficient’s product and corresponding image pixel in area under
filter mask.
3. In linear spatial filtering, what is the pixel of the image under mask corresponding to the mask
coefficient w (1, -1), assuming a 3*3 mask?
a) f (x, -y)
b) f (x + 1, y)
c) f (x, y – 1)
d) f (x + 1, y – 1)

Answer: d
Explanation: The pixel corresponding to mask coefficient (a 3*3 mask) w (0, 0) is f (x, y), and so
for w (1, -1) is f (x + 1, y – 1).
4. Which of the following is/are a nonlinear operation?
a) Computation of variance
b) Computation of median
c) All of the mentioned
d) None of the mentioned

Answer: c
Explanation: Computation of variance as well as median comes under nonlinear operation.
5. Which of the following is/are used as basic function in nonlinear filter for noise reduction?
a) Computation of variance
b) Computation of median
c) All of the mentioned
d) None of the mentioned
Answer: b
Explanation: Computation of median gray-level value in the neighborhood is the basic function
of nonlinear filter for noise reduction.
6. In neighborhood operation for spatial filtering if a square mask of size n*n is used it is
restricted that the center of mask must be at a distance ≥ (n – 1)/2 pixels from border of image,
what happens to the resultant image?
a) The resultant image will be of same size as original image
b) The resultant image will be a little larger size than original image
c) The resultant image will be a little smaller size than original image
d) None of the mentioned

Answer: c
Explanation: If the center of mask must be at a distance ≥ (n – 1)/2 pixels from border of image,
the border pixels won’t get processed under mask and so the resultant image would be of smaller
size.
7. Which of the following method is/are used for padding the image?
a) Adding rows and column of 0 or other constant gray level
b) Simply replicating the rows or columns
c) All of the mentioned
d) None of the mentioned

Answer: c
Explanation: In neighborhood operation for spatial filtering using square mask, padding of
original image is done to obtain filtered image of same size as of original image done, by adding
rows and column of 0 or other constant gray level or by replicating the rows or columns of the
original image.
8. In neighborhood operation for spatial filtering using square mask of n*n, which of the
following approach is/are used to obtain a perfectly filtered result irrespective of the size?
a) By padding the image
b) By filtering all the pixels only with the mask section that is fully contained in the image
c) By ensuring that center of mask must be at a distance ≥ (n – 1)/2 pixels from border of image
d) None of the mentioned

Answer: c
Explanation: By ensuring that center of mask must be at a distance ≥ (n – 1)/2 pixels from border
of image, the resultant image would be of smaller size but all the pixels would be the result of the
filter processing and so is a fully filtered result.
In the other approach like padding affect the values near the edges that gets more prevalent with
mask size increase, while the another approach results in the band of pixels near border that gets
processed with partial filter mask. So, not a fully filtered case.

Compression Working Process


1. Which of the following is termed as reducing image data?
a) Luminance
b) Compression
c) Hue
d) Saturation

Answer: b
Explanation: Compression means reducing image data. A digitised analog video sequence can
comprise of a more than 100 MBPS of data. To reduce the media overheads for distributing the
sequences, the following techniques are commonly employed to achieve desirable reductions in
image data:
i) Reduce colour nuances within the image
ii) Remove small, invisible parts, of the picture
2. What is the range of compression achieved with no visible difference?
a) 50 % to 90 %
b) 40 % to 80 %
c) 10 % to 30 %
d) 30 % to 60 %

Answer: a
Explanation: The two techniques of compression are image based compression and video
compression techniques. The extent, to which these image modifications are humanly visible, is
typically dependent upon the degree to which the chosen compression technique is used. Often
50 % to 90 % compression can be achieved with no visible difference and in some scenarios
even beyond 95 %.
3. In which of the following compression data upon decompression doesn’t lose its detail?
a) Lossy
b) JPG
c) Lossless
d) BMP

Answer: c
Explanation: In lossless compression, as the name suggests, the data upon decompression doesn’t
lose its detail. Compression works by taking the advantage of redundancies. In lossless
compression you don’t lose any information at all.

4. Which of the following is the example of lossless compression?


a) JPEG
b) MPEG
c) BMP
d) RLE (Run Length Encoding)

Answer: d
Explanation: One of the simplest methods of compression is Run Length Encoding (RLE).
Examples of lossless compression techniques are Huffman coding, Shannon Fano coding, RLE
(Run length encoding), Delta coding, LZW (Lempel-Ziv-Welch) coding etc.
5. In which of the following compression the data is lost and miss out minor details?
a) Lossy
b) Lossless
c) BMP
d) Energy

Answer: a
Explanation: In lossless compression the data upon decompression doesn’t lose its detail.
Whereas on the other hand the lossy algorithms tend to miss out the minor details of the data
involved. For the lossy compression, the information can be thrown away and still be acceptable.

6. Which of the following is the example of lossy compression?


a) JPEG
b) BMP
c) Huffman coding
d) Delta coding

Answer: a
Explanation: For the lossy compression, the information can be thrown away and still be
acceptable. Think of an image of Clouds. Split the image into tiny 8 × 8 blocks and you will find
that some of them can be approximated by a gradient and can be stored simply as two colors and
direction. Examples of lossy compression techniques are JPEG, MPEG etc.
7. What is the full form of JPEG?
a) Joint Pressure Expert Group
b) Joint Photographic Expert Group
c) Joint Picture Expert Group
d) Join Pic Expert Group

Answer: b
Explanation: JPEG stands for Joint Photographic Expert Group. The file name for a JPEG image
is .jpg or .jpeg. JPEG is the most commonly used format for photographs. It is specifically good
for color photographs or for images with many blends or gradients. JPEG is a method of lossy
compression for digital photography.
8. JPEG is not popular for web hosting of images.
a) True
b) False
Answer: b
Explanation: The above statement is false. Due to the popularity of JPEG, is also accepted in
most of the programs. It is quite popular for web hosting of images, for amateur and average
photographers, digital cameras etc. This is mainly due to the fact that high quality images can be
saved using less space.
9. What is the full form of MPEG?
a) Moving Picture Experts Group
b) Motion Pics Experts Group
c) Motion Picture Experts Group
d) Moving Photograph Experts Group

Answer: a
Explanation: MPEG, on the other hand, stands for the Moving Picture Experts Group. It is a
working group of experts that was formed in 1988 by ISO and IEC. It was a joint initiative
between Hiroshima Yasuda of the Nippon telegraph and telephone and Leonardo Chiariglione.
10. How many bits per pixel per color do a BMP (Bitmap image) uses, which matches the
resolution of most monitors?
a) 8
b) 32
c) 16
d) 64

Answer: a
Explanation: A BMP (Bitmap image) uses 8 bits per pixel per color, which matches the
resolution of most monitors. Each value is an 8 bit number ranging from zero (darkest) to 255
(brightest). The values are proportional to apparent light intensity, not actual intensity.
11. Which type of compression does GIF use?
a) Data
b) LZW (Lempel – Ziv – Welch)
c) Lossy
d) Energy
Answer: b
Explanation: The GIF image format is a lossless except that it uses a color palette of up to 256
colors. The format is an array of 8 bit indexes into the palette. GIF uses LZW compression. LZW
(Lempel – Ziv – Welch) compression is the compression of a file into a smaller file using a table
based lookup with the maximum dictionary size of 4K.
12. Which of the following is the common format for exchanging raster graphics (bitmap)
images between applications programs, including those used for scanner images?
a) GIF
b) PNG
c) TIFF
d) BMP

Answer: c
Explanation: TIFF is an image container format. Most commonly it is used for uncompressed
images when BMP cannot be used because more than 8 bits per pixel or more than 3 color
components are needed. TIFF (Tag Image File Format) is a common format for exchanging
raster graphics (bitmap) images between applications programs, including those used for scanner
images.
13. The artifacts show the “Blockiness” in the JPEG image.
a) True
b) False

Answer: a
Explanation: JPEG has a major disadvantage that the increasing compression causes an
increasing degradation of the image. This is called artifacts. The artifacts show the “blockiness”
in the image. The blockiness appears when the compression ratio is pushed too high. In normal
use, a JPEG compressed picture shows no visual difference to the original uncompressed picture.
14. What was created as the follow-up to the successful JPEG compression?
a) JPEG 50
b) JPEG 1000
c) JPEG 100
d) JPEG 2000

Answer: d
Explanation: JPEG 2000 was created as the follow-up to the successful JPEG compression, with
better compression ratios. The basis was to incorporate new advances in picture compression
research into an international standard. JPEG 2000 never took off for surveillance applications
and is still not widely supported in web browsers either.

Dilation followed by erosion is called


a.opening
b.closing
c.blurring
d.translation
Answer: (b).closing
Q2.Reflection and translation of the image objects are based on
a.pixels
b.frames
c.structuring elements
d.coordinates
Answer: (c).structuring elements

Q3.Opening smooths the image's


a.pixels
b.lines
c.contour
d.boundary
Answer: (c).contour
Q 4.Two main operations of morphology are
a.erosion
b.dilation
c.set theory
d.Both a and b
Answer: (d).Both a and b
Q 5.Structuring elements have origins at
a.top left
b.top right
c.center
d.bottom left
Answer: (c).center
Q 6.Structuring element is also called
a.pixels
b.lines
c.subimage
d.noise
Answer: (c).subimage
Q 7.With dilation process images get
a.thinner
b.shrinked
c.thickened
d.sharpened
Answer: (c).thickened
Q 8.Opening and closing are each others
a.neighbors
b.duals
c.centers
d.corners
Answer: (b).duals
Q 9.Fully containment of the SE in an image is required in
a.erosion
b.dilation
c.opening
d.closing
Answer: (a).erosion
Q 10.Erosion followed by dilation is called
a.opening
b.closing
c.blurring
d.translation
Answer: (a).opening
Image Segementation
Q1.Points exceeding the threshold in output image are marked as
a.0

b.1

c.11

d.x

Answer: (b).1

Q2.Example of discontinuity approach in image segmentation is


a.edge based segmentation

b.boundary based segmentation

c.region based segmentation

d.Both a and b

Answer: (d).Both a and b

Q3.First derivative approximation says that values of intensities at the onset must be
a.nonzero

b.zero

c.positive

d.negative

Answer: (a).nonzero

Q4.Image segmentation is also based on


a.morphology

b.set theory

c.extraction

d.recognition

Answer: (a).morphology
Q5.Image whose principle features are edges is called
a.orthogonal

b.isolated

c.edge map

d.edge normal

Answer: (c).edge map

Q6.Vertical lines are angles at


a.0

b.30

c.45

d.90

Answer: (d).90

Q7.If R is the entire region of the image then union of all segmented parts should be equal to

a.R

b.R'

c.Ri

d.Rn

Answer: (a).R

Q8.Mask's response to zero means


a.sum to zero

b.subtraction to zero

c.division to zero

d.multiplication to zero

Answer: (a).sum to zero


Q9.Lines in an image can be oriented at angle
a.0

b.90

c.30

d.Both a and b

Answer: (d).Both a and b

Q10.Laplacian images need


a.contraction

b.expansion

c.scaling

d.enhancement

Answer: (c).scaling

Feature Extraction

1. Spatial features of an objects is characterized as its


a.Gray level
b.Joint probability
c.All of the above
d. None of the above

Answer: All of the above

2.In infrared (IR) images amplitudes represents

a.Temperature
b.Pressure
c.all of the above
d.none of the above

Answer: Temperature

3.Fine edge structure are extracted by


a.description features

b.Standard deviations

c.Both of the above

d. None of the above

Answer: description features

4.The second order joint probability is used for


a.Spatial features extraction
b. Texture features extraction
c.Both of the above
d. None of the above

Answer: Texture features extraction

5.Image transformation provides


a.Spatial domain information of an image

b.Frequency domain information of an image

c.All of the above


d. None of the above

Answer: Frequency domain information of an image

6.Edge detection operator are also called


a.Mask
b.Filter
c.Both of the above
d. None of the above

Answer: Both of the above

7.Zero crossing is used by


a.Sobel operator
b.Prewitt operator
c.Laplacian operator
d.Robert operator

Answer: Laplacian operator


Image steagnography and watermarking
1. _____________ is another data hiding technique which can be used in conjunction with
cryptography for the extra-secure method of protecting data.
a) Cryptography
b) Steganography
c) Tomography
d) Chorography

Answer: b
Explanation: Steganography is the technique of hiding data in another raw data. Steganography
is another data hiding technique which can be used in conjunction with cryptography for an
extra-secure method of protecting data.
2. _____________ is hiding of data within data, where we can hide images, text, and other
messages within images, videos, music or recording files.
a) Cryptography
b) Tomography
c) Steganography
d) Chorography

Answer: c
Explanation: Steganography helps in hiding any form of data within data, where we can hide
images, text, and other messages within images, videos, music or recording files.
3. Steganography follows the concept of security through obscurity.
a) True
b) False

Answer: a
Explanation: Hiding of data within another data through obscurity is called steganography. It is
another data hiding technique which can be used in conjunction with cryptography for an extra-
secure method of protecting data.
4. The word ________________is a combination of the Greek words ‘steganos’ which means
“covered or concealed”, and ‘graphein’ which means “writing”.
a) Cryptography
b) Tomography
c) Steganography
d) Chorography

Answer: c
Explanation: The word steganography is a combination of the Greek words ‘steganos’ which
means “covered or concealed”, and ‘graphein’ which means “writing”. Steganography is hiding
of data within data, where we can hide images, text, and other messages within images, videos,
music or recording files.
5. A ________________ tool permits security professional or a hacker to embed hidden data
within a carrier file like an image or video which can later be extracted from them.
a) Cryptography
b) Tomography
c) Chorography
d) Steganography

Answer: d
Explanation: A steganography tool is a software tool that permits a security professional or a
hacker to embed hidden data within a carrier file like an image or video which can later be
extracted from them.
6. Which of the following is not a steganography tool?
a) Xaio steganography
b) Image steganography
c) ReaperExploit
d) Steghide

Answer: c
Explanation: ReaperExploit is not a steganography tool that permits security through obscurity.
Xaio steganography, image steganography, Steghide etc are examples of such tools.
7. Which of the following is not a steganography tool?
a) Crypture
b) SteganographX Plus
c) rSteg
d) Burp Suite

Answer: d
Explanation: There are some software tools that helps hackers to embed hidden data within a
which can later be extracted from them. SSuite Picsel, rSteg, SteganographX Plus, and crypture
are examples of such tools.
8. The main motive for using steganography is that hackers or other users can hide a secret
message behind a ______________
a) special file
b) ordinary file
c) program file
d) encrypted file

Answer: b
Explanation: The main motive for using steganography is that hackers or other users can hide a
secret message behind ordinary files. Some steganography tools are SSuite Picsel, rSteg etc.
9. People will normally think it as a normal/regular file and your secret message will pass on
without any _______________
a) suspicion
b) decryption
c) encryption
d) cracking

Answer: a
Explanation: Steganography techniques help hackers or other users to conceal covert message
behind regular files. People will normally think it as a normal/regular file and your secret
message will pass on without any suspicion.
10. By using ______________ you can diminish the chance of data leakage.
a) Cryptography
b) Tomography
c) Chorography
d) Steganography
Answer: d
Explanation: Hackers or other cyber criminals target ordinary files to hide different data or
information within another data file. By using steganography, you can diminish the chance of
data leakage.

You might also like