1 (a)
How are DPCM and ADPCM used for audio compression ?
5 M
1 (b)
What is the difference between Shannon-Fano coding and Huffman coding?
5 M
1 (c)
Discuss the major steps in S-box design
5 M
1 (d)
What are digital signatures and how are they used?
5 M
2 (a)
A source A= {w, x, y, z} has probabilities {0.15, 0.1, 0.7, 0.05} respectively. Generate and decipher the tag for the sequence [x, y, z, w, z] using arithmetic code.
10 M
2 (b)
Explain how triple DES works with two and three keys.
10 M
3 (a)
Take an alphabet string and code it using LZ 78. What are the limitations and how can they be overcome with LZW
10 M
3 (b)
Classify the different types of attacks and explain them with examples.
10 M
4 (a)
How is the frequency domain coding useful in audio compression?
10 M
4 (b)
Discuss the various principles involved in private and public key cryptography
10 M
5 (a)
Explain one lossless technique of image compression.
10 M
5 (b)
What are message authentication and Hash functions and how are they used?
10 M
6 (a)
What are the various steps involved in video compression?
10 M
6 (b)
Explain the various certificate based and Biometric authentication methods
10 M
Write short notes on (any two)
7 (a)
JPEG 2000
10 M
7 (b)
Chinese Reminder Theorem
10 M
7 (c)
Digital Immune Systems
10 M
7 (d)
Success Electronic Payment System
10 M
More question papers from Data Compression and Encryption