1(a)
What do you mean by image file format? Explain any two frequently used image file formats?
4 M
1(b)
Explain any four properties of 2DD.F.T.
4 M
1(c)
Justify Lossy compression is not suitable for compressing executable fiels.
4 M
1(d)
What is m-connectivity amongst pixels. Explain with example.
4 M
1(e)
For the given 3-bit 4×4 image perform
i) Intensity level slicing with background for r1 =2
2) Negation
i) Intensity level slicing with background for r1 =2
2) Negation
4 | 2 | 3 | 0 |
1 | 3 | 5 | 7 |
5 | 3 | 2 | 1 |
2 | 4 | 6 | 7 |
4 M
2(a)
What is a histogram of a digital image Given below is a Grey Level Histogram of a Image, Compute Histogram Equalization. Draw histogram of input & output Image.
Grey Levels | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 |
No.of Pixels | 790 | 1023 | 850 | 656 | 329 | 245 | 122 | 81 |
10 M
2(b)
Explain the following frequency domain filters.
i) Ideal Low Pass filter. ii) Butterworth High Pass filter.
i) Ideal Low Pass filter. ii) Butterworth High Pass filter.
10 M
3(a)
Explain region Based & boundary Based segmentations. Explain the use of thresholding in both the cases.
10 M
3(b)
Consider the image given below. Calculate the direction of the edge at the centre point of the image. F = 50 60 70
5 50 80
7 9 50
5 50 80
7 9 50
10 M
4(a)
Calculate the efficiency of Huffman Code for the following symbol whose probability & occurence is given below :-
Symbol | Probability |
A1 | 0.9 |
A2 | 0.06 |
A3 | 0.02 |
A4 | 0.02 |
10 M
4(b)
Expain the following morphological operations with example
i) Dilation
Hit or Miss Transform
i) Dilation
Hit or Miss Transform
10 M
5(a)
Exlain smoothing & sharpening Filters in spatial domain. What are the properties that these masks must satisfy.
10 M
5(b)
Obtain four directional chain code & shape no. Representation of the following image.
!mage
!mage
5 M
5(c)
Explain fundamental steps in digital Image Processing.
5 M
Write a short note any four Q6.(a,b,c,d,e,f)
6(a)
Homomorphic Filtering
5 M
6(b)
Bit plane Coding
5 M
6(c)
Hough Transform
5 M
6(d)
Digital Watermarking
5 M
6(e)
Content Based Image Retrival
5 M
6(f)
Authentication
5 M
More question papers from Image Processing