DATA COMPRESSION AND ENCRYPTION (DCE) [ELECTIVE] ELECTRONICS AND TELECOMMUNICATION SEMESTER 7
Con. 8446-13. LJ-14002
(3 Hours) [Total Marks : 100]
N. B. : (1) Question No. 1 is Compulsory.
(2) Attempt any four questions out of remaining six questions.
1. (a) | How are DPCM and ADPCM used for audio compression? | 5 |
(b) | What is the difference between Shannon Fano coding and Huffman coding? | 5 |
(c) | Discuss the major steps in S-box design. | 5 |
(d) | What are digital signatures and how are they used? | 5 |
2. (a) | A source A= {w,x,y,z) has probabilities {0.15,0.1,0.7,0.05} respectively. Generate | 10 |
and decipher the tag for the sequence [x,y,z,w,z] using arithmetic code. | ||
(b) | Explain how triples DES works with two and three keys. | 10 |
3. (a) | Take an alphabet string and code it using LZ78. what are the limitations and how can | 10 |
they be overcome with LZW? | ||
(b) | Classify the different types of attacks and explain them with examples. | 10 |
4. (a) | How is the frequency domain coding useful in audio compression? | 10 |
(b) | Discuss the various principle involved in private and public key cryptography. | 10 |
5. (a) | Explain one lossless technique of image compression. | 10 |
(b) | What are message authentication and Hash function and how are they used? | 10 |
6. (a) | What are the various steps involved in video compression? | 10 |
(b) | Explain the various certificate based on Biometric authentication methods. | 10 |
7. | Write short notes on (any two) :- | 20 |
(a) JPEG 2000. | ||
(b) Chinese Remainder Theorom. | ||
(c) Digital Immune Systems. | ||
(d) Success Electronic Payment Systems. |
No comments:
Post a Comment