1. What is the primary goal of steganography in digital image processing?
(A) Compression
(B) Encryption
(C) Hiding information
(D) Enhancing image quality
2. Which domain is commonly used for steganographic techniques in images?
(A) Time domain
(B) Frequency domain
(C) Spatial domain
(D) Texture domain
3. Which of the following is the most common method used in spatial domain steganography?
(A) DCT
(B) LSB
(C) DWT
(D) Huffman encoding
4. In LSB steganography, what does LSB stand for?
(A) Least Secure Bit
(B) Least Significant Bit
(C) Low Signal Band
(D) Last Symbol Bit
5. Which of the following is a major drawback of LSB steganography?
(A) High computational cost
(B) Poor capacity
(C) Low robustness
(D) Difficult implementation
6. Which transform is commonly used in frequency-domain steganography?
(A) Hough transform
(B) Discrete Fourier transform
(C) Discrete Cosine Transform
(D) Radon transform
7. Which steganographic method uses wavelet coefficients for embedding data?
(A) LSB
(B) DCT
(C) DWT
(D) Huffman coding
8. Which one of the following is an advantage of frequency domain steganography?
(A) Low capacity
(B) Easy to detect
(C) High robustness
(D) Simple algorithm
9. Which term refers to the amount of data that can be hidden in an image using steganography?
(A) Resolution
(B) Capacity
(C) Entropy
(D) Fidelity
10. Which one of the following measures the resistance of hidden data to modifications?
(A) Visibility
(B) Robustness
(C) Entropy
(D) Capacity
11. What is the primary concern in image steganography regarding visual quality?
(A) Entropy
(B) Bit rate
(C) Imperceptibility
(D) Compression ratio
12. Which of the following is NOT a typical requirement for an effective steganographic system?
(A) High capacity
(B) High visibility
(C) High imperceptibility
(D) High robustness
13. Which color channel is often preferred for data hiding due to human visual sensitivity?
(A) Red
(B) Green
(C) Blue
(D) Alpha
14. Which type of attack aims to detect the presence of hidden data in images?
(A) Cryptanalysis
(B) Steganalysis
(C) Watermarking
(D) Compression attack
15. Which of the following is a passive steganalysis technique?
(A) Image forgery
(B) Data extraction
(C) Statistical analysis
(D) LSB embedding
16. Which type of image is generally preferred for steganography?
(A) Grayscale
(B) Binary
(C) Color
(D) Indexed
17. Which of the following is NOT a component of the steganographic process?
(A) Cover image
(B) Secret key
(C) Carrier wave
(D) Embedding algorithm
18. Which is used to enhance the security of steganographic communication?
(A) Entropy coding
(B) Histogram equalization
(C) Encryption
(D) Watermarking
19. What is a “cover image” in steganography?
(A) Image to be protected
(B) Image used to hide data
(C) Image containing watermark
(D) Final encrypted image
20. Which of the following could act as a stego image?
(A) Plain text file
(B) Image with hidden data
(C) Original cover image
(D) Audio file
21. Which method hides information by altering frequency components of the image?
(A) LSB
(B) DCT-based
(C) Run-length encoding
(D) Edge detection
22. Which of the following compression formats is lossy and may affect embedded data?
(A) PNG
(B) BMP
(C) JPEG
(D) TIFF
23. Why is JPEG not ideal for spatial domain steganography?
(A) High resolution
(B) Lossless nature
(C) Lossy compression
(D) Low frequency components
24. Which of the following steganographic techniques is most sensitive to image modification?
(A) LSB
(B) DCT
(C) DWT
(D) Spread spectrum
25. Which steganographic approach makes use of patterns and textures?
(A) Feature-based embedding
(B) Pixel substitution
(C) Histogram shifting
(D) Edge detection
26. What is the goal of payload in steganography?
(A) Detect changes
(B) Measure noise
(C) Carry hidden information
(D) Resize the image
27. Which feature of a steganographic system ensures that changes are undetectable?
(A) Entropy
(B) Imperceptibility
(C) Compression
(D) Resolution
28. Which term refers to the image after data has been embedded?
(A) Cover image
(B) Payload
(C) Stego image
(D) Cipher image
29. Which one of these is an active steganalysis technique?
(A) Passive monitoring
(B) Comparing histograms
(C) Introducing noise
(D) LSB matching
30. Which of the following formats is best suited for lossless steganography?
(A) JPEG
(B) PNG
(C) MPEG
(D) MP3
31. What is the primary difference between steganography and cryptography?
(A) Cryptography hides content; steganography hides existence
(B) Both use same algorithms
(C) Steganography encrypts data
(D) Cryptography uses cover media
32. Which one is a hybrid steganographic method?
(A) DCT
(B) LSB
(C) DWT-LSB
(D) PNG hiding
33. Which is used to validate integrity of the stego image?
(A) Checksum
(B) Histogram
(C) Contrast
(D) Threshold
34. Which of the following is used for embedding in transform domain steganography?
(A) Redundant pixels
(B) Coefficients
(C) Noise level
(D) Bit planes
35. Why is encryption often combined with steganography?
(A) To increase compression
(B) To reduce bandwidth
(C) To enhance security
(D) To simplify processing
36. Which method hides data using statistical properties of the image?
(A) DWT
(B) Histogram shifting
(C) JPEG compression
(D) Spatial interpolation
37. Which metric is used to evaluate distortion in steganographic images?
(A) RMSE
(B) PSNR
(C) FFT
(D) DWT
38. Which file format is usually NOT recommended for steganography?
(A) BMP
(B) PNG
(C) JPEG
(D) TIFF
39. What is the steganographic capacity of a 24-bit image with 512×512 resolution (1 bit per channel)?
(A) 131,072 bits
(B) 786,432 bits
(C) 262,144 bits
(D) 1,048,576 bits
40. What is the main challenge in blind steganalysis?
(A) Knowing the key
(B) Knowing the embedding algorithm
(C) Detecting without prior knowledge
(D) Decoding the payload
41. Which embedding method uses pattern matching to increase security?
(A) Random pixel selection
(B) Edge detection
(C) Adaptive steganography
(D) LSB replacement
42. Which of the following would help detect steganography in an image?
(A) Histogram analysis
(B) Thresholding
(C) Convolution
(D) Color quantization
43. Which of these is NOT a benefit of steganography?
(A) Concealment
(B) Data compression
(C) Secure communication
(D) Covert transmission
44. Which algorithm improves LSB by randomly spreading bits in an image?
(A) Spread spectrum
(B) DCT
(C) Run-length encoding
(D) Huffman coding
45. Which approach modifies the least sensitive areas of an image?
(A) Edge-based embedding
(B) Region growing
(C) Texture synthesis
(D) Entropy masking
46. Which of the following can combine with steganography for authentication?
(A) Watermarking
(B) Thresholding
(C) Clustering
(D) Histogram equalization
47. Which type of file has the highest tolerance for steganographic embedding?
(A) BMP
(B) GIF
(C) JPEG
(D) SVG
48. What happens if too much data is embedded in an image?
(A) Increased robustness
(B) Improved quality
(C) Image distortion
(D) Better compression
49. Which of the following best describes the role of a stego key in steganography?
(A) It compresses the hidden data
(B) It authenticates the stego image
(C) It determines embedding locations
(D) It enhances image resolution
50. Which of the following can degrade the effectiveness of steganography?
(A) High-resolution images
(B) Lossless compression
(C) Image resizing or cropping
(D) Use of cover images
