Printed Pages: 3
496
EIT-074
--- Content provided by FirstRanker.com ---
(Following Paper ID and Roll No. to be filled in your Answer Book)
Paper ID: 113754
Roll No.
B.Tech
(SEM. VII) THEORY EXAMINATION. 2015-16
--- Content provided by FirstRanker.com ---
IT IN FORENSIC SCIENCE
[Time: 3 hours]
[Total Marks: 100]
Note: Attempt questions from all sections as per directions.
SECTION-A
- Attempt all parts. Answer in brief. (10x2=20)
- Discuss briefly the basic design specifications of biometric systems.
- Describe the speaker recognition and their applications.
- How biometric samples are matched? Explain.
- What is biometrics and what are the important properties of biometric identification?
- Describe the benefits of biometrics over traditional authentication system.
- Justify the stages of biometric system.
- Write a short note on Iris recognition.
- What is access control system? What services are offered by any access control system?
- What do you understand by secure authentication protocol? Discuss the various secure authentication protocol.
- Discuss the fingerprint recognition with minutiae.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
SECTION-B
Attempt any five questions from this sections. (5x10=50)
-
- What is the important of information hiding? Explain.
- Discuss the technical steganography and Linguistic steganography.
- Describe Laplace filtering. How Laplace filtering provide the strong evidence to prove the existence of secret information in noisy data?
-
- Discuss briefly the framework for secret communication.
- Justify the theorem “There exists perfect secure steganography system".
- Explain the information hiding in binary image. How is information encoded in formatted text using distortion technique?
- What are the applications of watermarking? What are different requirements and algorithmic design issues of watermarking? Explain.
- What is the purpose of using Fourier transformation in watermarking? Also discuss the Discrete Cosine Transformation(DCT) in watermarking.
- What is the data recovery process? What are the obstacles to backing up applications? What are the common factors that affect back-up on data recovery?
- What is computer forensics? What are the phases of computer forensics? What is a chain of custody?
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
SECTION-C
Attempt any two questions from this section. (2x15=30)
- What are the reasons to collect the electronic evidence in the first place? What are the types of evidence? What are the rules of collecting evidence?
-
- Discuss the LSB coding method for information hiding.
- What are cover generation techniques? Discuss.
- What general properties are identified for real world robust watermarking systems that are shared by all proposed systems? Discuss.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
This download link is referred from the post: AKTU B-Tech Last 10 Years 2010-2020 Previous Question Papers || Dr. A.P.J. Abdul Kalam Technical University
--- Content provided by FirstRanker.com ---