DATA COMPRESSION AND ENCRYPTION (DCE) DECEMBER 2011 [ELECTIVE] ELECTRONICS AND TELECOMMUNICATION SEMESTER 7
Con. 6862-11. (REVISED COURSE) MP-5683
(3 Hours) [Total Marks : 100]
(2) Attempt any four questions out of remaining six questions.
1. (a) | What is the need of compression. | 5 |
(b) | Discuss the application of JPEG 2000. | 5 |
(c) | Compare Cryptography and steganography. | 5 |
(d) | What is Secure Electronic Payment System. | 5 |
2. (a) | A source emits letter from an alphabet A= { a1, a2, a3, a4, a5) with | 10 |
probabilities P(a1) = 0.15 , P(a2) = 0.04 , P(a3) = 0.26 , P(a4) = 0.05 | ||
and P(a5=0.05. | ||
a) Calculate the entropy of this source | ||
b) Find the Huffman code for this source. | ||
c) Find the average length of the code in | ||
d) and its redundancy. | ||
(b) | Explain ADPCM Encoder and Decoder for audio compression | 10 |
3. (a) | Describe the features of video compression as compared to image | 10 |
compression. Explain MPEG industry standards for video compression. | ||
(b) | The o/p of the LZW encoder is the following sequence | 5 |
Decode the sequence. | ||
(c) | Discuss in brief lossless audio compression | 5 |
4. (a) | Explain the working of DES with block diagram | 10 |
(b) | Discuss and explain security attacks on the system. | 10 |
5. (a) | Explain algorithms for RSA using Chinese Remainder Theorom | 10 |
(b) | Discuss Classical Encryption Techniques. | 10 |
6. (a) | Explain Hash and MAC algorithms used for authentication. | 10 |
(b) | Discuss certificate based and biometric system. | 10 |
7. | Write short notes on any three :- | 20 |
(a) Approaches to Image Compression. | ||
(b) S-Box Design. | ||
(c) Digital signatures. | ||
(d) Performance and quality measures for compression. |
No comments:
Post a Comment