Download AKTU B-Tech 7th Sem 2015-2016 EIT 074 It In Forensic Science Question Paper

Download AKTU (Dr. A.P.J. Abdul Kalam Technical University (AKTU), formerly Uttar Pradesh Technical University (UPTU) B-Tech 7th Semester (Seventh Semester) 2015-2016 EIT 074 It In Forensic Science Question Paper

Printed Pages: 3 496 EIT-074
(Following Paper ID and Roll No. to be ?lled in your
Answer Book)
Roll No.
B.Tech _
(SEM. VII) THEORY EXAMINATION. 2015-16
IT IN FORENSIC SCIENCE
[Time:3 hours] [Total Marks:100]
Note : Attempt questions from all sections as per directions. ,
SECI?ION-A
1. Attempt all parts. Answer in brief. (10x2=20)
(a) Discuss brie?y the basic design speci?cations of
biometric systems. 7
(b) Describe the speaker recognition and their
applications.
(0) How biometric smaples are matched? Explain.
(d) What is biometrics and what are the important
properties of biometric identi?cation.
(6) Describe the benefits of biometrics over
traditional authentication system.
225 (1) P.T.O.

(f) Justify the stages of biometric system.
(g) Write a short note on His recognition.
(h) What is access control system? What services are
offered by any access control system?
(i) What do you understand by secure authentication
protocol? . Discuss the various secure
authentication protocol.
(j) Discuss the ?ngerprint recognition with minutiae.
SECTION?B
Attempt any ?ve questions from this sections. (5x10=50)
2.
225
(a) What is the important of information hiding?
Explain.
(b) Discuss the technical steganography and Linguistic
steganography.
Describe Laplace ?ltering. How Laplace ?ltering
provide the strong evidence to prove the existence of
secret information in noisy data?
(a) Discuss brie?y the framework for secret
communication.
(b) Justify the theorem ?There exists perfect secure
steganography system?.
(2) EIT 074
N .AF .
Attempt any two questions from this section.
10.
225
Explain the information hiding in binary image. How is
infonnation encoded in formatted text using distortion
. technique?
What are the applications of watermarking? Whate are
different requirements and algorithmic design issues
of watennarking? Explain.
What is the purpose ofusing Fourier transformationin
watermarking? Also discuss the Discrete Cosine
Trans formation(DCT) in watermarking.
What is the data recovery process? What are the
obstacles to baking up applications? What are the
common factors that affect back-up on data recovery?
What is computer forensics? What are the phases of
computer forensics? What is a chain of custody?
SECTION-C
(2x1 5:3 0)
What are the reasons to collect the electronic evidence
in the ?rst place? What are the type? of evidence? What
are the rules of collecting evidence?
(3) P.T.0.

_ 11. (a) Discuss the LSB coding method for information
hiding.
(b) What are cover generation techniques? Discuss.
12. What general properties are identi?ed for real world
robust watermarking systems that are shared by all
proposed systems? Discuss.
225 (4) , EIT 074

This post was last modified on 29 January 2020