MU Electronics and Telecom Engineering (Semester 7)
Data Compression and Encryption
December 2013
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


1 (a) How are DPCM and ADPCM used for audio compression ?
5 M
1 (b) What is the difference between Shannon-Fano coding and Huffman coding?
5 M
1 (c) Discuss the major steps in S-box design
5 M
1 (d) What are digital signatures and how are they used?
5 M

2 (a) A source A= {w, x, y, z} has probabilities {0.15, 0.1, 0.7, 0.05} respectively. Generate and decipher the tag for the sequence [x, y, z, w, z] using arithmetic code.
10 M
2 (b) Explain how triple DES works with two and three keys.
10 M

3 (a) Take an alphabet string and code it using LZ 78. What are the limitations and how can they be overcome with LZW
10 M
3 (b) Classify the different types of attacks and explain them with examples.
10 M

4 (a) How is the frequency domain coding useful in audio compression?
10 M
4 (b) Discuss the various principles involved in private and public key cryptography
10 M

5 (a) Explain one lossless technique of image compression.
10 M
5 (b) What are message authentication and Hash functions and how are they used?
10 M

6 (a) What are the various steps involved in video compression?
10 M
6 (b) Explain the various certificate based and Biometric authentication methods
10 M

Write short notes on (any two)
7 (a) JPEG 2000
10 M
7 (b) Chinese Reminder Theorem
10 M
7 (c) Digital Immune Systems
10 M
7 (d) Success Electronic Payment System
10 M



More question papers from Data Compression and Encryption
SPONSORED ADVERTISEMENTS