DATA COMPRESSION AND ENCRYPTION (DCE) MAY 2012 [ELECTIVE] ELECTRONICS AND TELECOMMUNICATION SEMESTER 7
Con. 4636.12. (REVISED COURSE) GN-8942
(3 Hours) [Total Marks : 100]
(2) Attempt any four questions out of remaining six questions.
1. (a) | What are the various models used for data compression? | 5 |
(b) | Compare between A-Law and u-Law compression ? | 5 |
(c) | What are active and passive attacts ? | 5 |
(d) | What are is Biometric Authentication ? Explain with examples. | 5 |
2. (a) | A source A= {a,b,c,d) has probabilities {0.7,0.15,0.1,0.05} respectively. | 10 |
Generate a tag for the sequence { a b c d a } using arithmetic code. | ||
(b) | Explain working of DES. | 10 |
3. (a) | Take an example and show the difference in the encoding procedures of LZ78 | 10 |
and LZW. | ||
(b) | Explain RSA algorithm with an example. | 10 |
4. (a) | Discuss the various lossless techniques for image compression. | 10 |
(b) | How are the keys distributed in conventional encryption systems ? | 10 |
5. (a) | How is motion compensation used in video compression ? | 10 |
(b) | What are digital signatures and how are they implemented ? | 10 |
6. (a) | Why are Transforms used in compression ? How is JPEG different from | 10 |
JPEG2000 ? | ||
(b) | What are the various aspects of a firewall design ? | 10 |
7. | Write notes on (any two) :- | 20 |
(a) Chinese Remainder Theorom | ||
(b) Elliptic curve cryptography | ||
(c) MPEG audio standard | ||
(d) Steganography. |
No comments:
Post a Comment