1 (a)
How are DPCM and ADPCM used for audio compression?
5 M
1 (b)
Compare public key and private key cryptosystem giving an example for each.
5 M
1 (c)
Explain the principle of "arithmetic coding" with a suitable example.
5 M
1 (d)
What are digital signatures and how are they used?
5 M
2 (a)
Compare statistical text compression and dictionary text compression. List the techniques in each method.
8 M
2 (b)
Discuss various techniques for lossy and lossless image compression.
12 M
3 (a)
Explain the working of an MP3 encoder and decoder or audio compression.
10 M
3 (b)
What is motion compensation in video compression? Explain the MPEG video compression standard.
10 M
4 (a)
Explain the working of triple DES with two and three keys.
10 M
4 (b)
Explain RSA algorithm with an example.
10 M
5 (a)
What is Diffie-Hellman key exchanger? Explain with an example.
10 M
5 (b)
What are the requirements of Hash and a MAC function?
10 M
6 (a)
What are various aspects of firewall design?
10 M
6 (b)
What are digital signatures? How are they implemented?
10 M
Write short notes on any two of the following:
7 (a)
Chinese Remainder Theorem.
10 M
7 (b)
Secure Electronic Payment System.
10 M
7 (c)
Viruses and Worms, their Counter-measures.
10 M
More question papers from Data Compression and Encryption