sem. vit | Dota Compzession € Encxypti on /
QP Code : 2254
(3 Hours)
N.B.: (1) Question no 1 is compulsory
(2) Answer any four out of remaining
(3) Assume suitable data if necessary and justify the same.
1, Answer in brief:
(a) Give classifications Data Compression techniques Give an exaiuple of each
type.
(b) Explain different redundancies in text, digital images and Aigital videos. How
are they important for data compression?
(c) Differentiate between private key crypto systems and public key eryptosystems.
Give an example of each.
(@)_ Solve the following congruence using Chinese Remainder Theorem (and not
by trial-and-error)
X=1 mod 3
X=4mod 5
X=5mod7
2 (a) For the following alphabet and probasilities, find as real valued tag for arithmetic
coding, for the sequence aa,a,4,2,2,
Letter _[ Probability
a, 02
a, 03
a, 0.8
(b) With a suitable example, explain LZ-77 dictionary compression technique. Also
explain the worst case in LZ-77 and show how compression ratio is computed in LZ- 77
3. (@) An alphabet is given with following letters and probabilities. Perform minimum
variance iuffman coding, Find the coding redundancy. Also find the compression
ratio for the sequence ,2,3,8,2,2,2,
[Letters ata| ala
Probabilities | 0.1 | 0.3 | 0.25] 0.35
QP-Con. 11333-15.
Exte
1Q-)2S7
‘Total Marks ; 100
10
10
10
[TURN OVER}QP Code: 2254
2
(b) With a neat block diag
explain the JPEG lossy compression technique.
(a) Explain DPCM and ADPCM techniques with neat block diagrams,
(b) What are T-, P- and B - frames in digital videos? Explain the principle of video
‘compression used in MPEG standard
(a) The prime numbers used in RSA algorithm are P=19 and g=23. Ifthe public key eis
3 find 6 (n) and d; the decryption key where ¢ (n) has usual meaning. Write eneryption
and decryption equations.
(b) Explain "Men-in-the-middle" attack happening in Define- Hellman: key exchange
system, How can it be avoided?
(a) Give overall block diagram of the DES standard. Explain.one round in detail.
(>) What are MAC and Hash functions? Give one example of each. Also explain what are
the requirements on MAC and Hash functions.
Write short notes on any two
(a) MP-II encoder and decoder
(e) JPEG-2000 standard
(c) Viruses and worms
QP-Con. 11333-15.
10
10
10
10
10
10