You are on page 1of 2
sem. vit | Dota Compzession € Encxypti on / QP Code : 2254 (3 Hours) N.B.: (1) Question no 1 is compulsory (2) Answer any four out of remaining (3) Assume suitable data if necessary and justify the same. 1, Answer in brief: (a) Give classifications Data Compression techniques Give an exaiuple of each type. (b) Explain different redundancies in text, digital images and Aigital videos. How are they important for data compression? (c) Differentiate between private key crypto systems and public key eryptosystems. Give an example of each. (@)_ Solve the following congruence using Chinese Remainder Theorem (and not by trial-and-error) X=1 mod 3 X=4mod 5 X=5mod7 2 (a) For the following alphabet and probasilities, find as real valued tag for arithmetic coding, for the sequence aa,a,4,2,2, Letter _[ Probability a, 02 a, 03 a, 0.8 (b) With a suitable example, explain LZ-77 dictionary compression technique. Also explain the worst case in LZ-77 and show how compression ratio is computed in LZ- 77 3. (@) An alphabet is given with following letters and probabilities. Perform minimum variance iuffman coding, Find the coding redundancy. Also find the compression ratio for the sequence ,2,3,8,2,2,2, [Letters ata| ala Probabilities | 0.1 | 0.3 | 0.25] 0.35 QP-Con. 11333-15. Exte 1Q-)2S7 ‘Total Marks ; 100 10 10 10 [TURN OVER} QP Code: 2254 2 (b) With a neat block diag explain the JPEG lossy compression technique. (a) Explain DPCM and ADPCM techniques with neat block diagrams, (b) What are T-, P- and B - frames in digital videos? Explain the principle of video ‘compression used in MPEG standard (a) The prime numbers used in RSA algorithm are P=19 and g=23. Ifthe public key eis 3 find 6 (n) and d; the decryption key where ¢ (n) has usual meaning. Write eneryption and decryption equations. (b) Explain "Men-in-the-middle" attack happening in Define- Hellman: key exchange system, How can it be avoided? (a) Give overall block diagram of the DES standard. Explain.one round in detail. (>) What are MAC and Hash functions? Give one example of each. Also explain what are the requirements on MAC and Hash functions. Write short notes on any two (a) MP-II encoder and decoder (e) JPEG-2000 standard (c) Viruses and worms QP-Con. 11333-15. 10 10 10 10 10 10

You might also like