
Wireless Networks and Computational Intelligence
Beschreibung
Weitere Details
Weitere Ausgaben
Personen
Inhalt
- Title
- Preface
- Organization
- Table of Contents
- Section I: Wireless Networks
- Near Field Communication - Applications and Performance Studies
- Introduction
- Related Work
- NFC System Design
- NFC Applications
- NFC Smart Kiosk - Information Broadcaster
- NFC Smart Kiosk - Query Based Information Provider
- NFC Smart Web Poster
- Performance Evaluation on NFC Enabled Devices
- Data Rate Measurements for NFC Enabled Devices
- NFC Antenna Design and Received Power for NFC Devices
- Summary and Conclusions
- References
- Inter-Carrier Interference Power Analysis of OFDM Systems under Slowly Fading Channels
- Introduction
- System Description
- OFDM System Description
- Power of Inter-Carrier Interference (PICI)
- Expectation and Variance of the Recovered Signal (rk)
- Numerical Results
- Conclusions
- References
- RCH-MAC Protocol for Multihop QoS in Wireless Sensor Networks
- Introduction
- Literature Survey
- Background
- Problem Definition
- Assumptions
- Objectives
- Implementation
- Mathematical Model
- Performance Evaluation
- Simulation Setup
- End-to-End Latency
- Packet Delivery Ratio (PDR)
- Energy Consumption
- Conclusions
- References
- Role Based Dynamic Trust Model for Routing in Mobile Wireless Sensor Networks
- Introduction
- Proposed Scheme
- Dynamic Pairwise Key Distribution Scheme
- Role Based Dynamic Trust Model for Route Selection
- Conclusions and Future Work
- References
- Distance Based Termite Algorithm for Mobile Ad-Hoc Networks
- Introduction
- Swarm Intelligence (SI)
- Termite Algorithm Summary
- Proposed Pheromone Update and Decay Functions
- Cross Layer Model
- Distance Based Pheromone Update and Decay Functions
- Termite with Distance Parameter (BTD)
- Opt-Termite with Distance Parameter(OPTD)
- Results and Discussion
- Experimental Setup
- Results and Analysis
- Conclusion and Future Work
- References
- Outage Probability of Impairments Due to Combining Errors in Rayleigh Fading Channels Incorporating Diversity
- Introduction
- System Model and Description
- MRC Diversity Combining Scheme
- Analysis of Outage Probability
- Simulation Results
- Conclusions
- References
- Energy Efficient Transmission Control Protocol in Wireless Sensor Networks
- Introduction
- Proposed EETCP
- EETCP Layering Model
- Proposed Algorithms
- Simulation Results
- Conclusion
- References
- AODV-MBR: A New Routing Protocol with Modified Backup Approach
- Introduction
- Related Work
- Proposed Protocol
- Route Discovery Phase
- Route Maintenance Phase
- Proposed Algorithm
- Performance Evaluation
- Effect of Traffic Load
- Conclusion
- References
- EGC Diversity Incorporated BER Performance Analysis of M-DCSK Schemes in MIMO Nakagami Channels
- Introduction
- System Description
- M-DCSK Modulation
- Multicode Transmission with EGC
- Data Formulation
- MIMO Multipath Fading Channel
- Detection Strategies
- Simulation Results
- Conclusions
- References
- Cognitive Network Layer in MANETs Mobility Aware Routing Protocol
- Introduction
- Issues for QoS-Aware Routing in MANETs
- Related Work
- Proposed MARP Model
- Packet Design
- Cross Layer Framework
- The Mobility Quantification
- Implementation and Results
- Conclusions
- References
- Spectrum Efficiency of Lognormal Fading Channels under Different Adaptation Policies with MRC Diversity
- Introduction
- System Model and Description
- OPRA Policy
- No Diversity Case
- MRC Diversity Case
- TIFR Policy
- No Diversity Case
- MRC Diversity Case
- Numerical Results
- Conclusions
- References
- FTSMR: A Failure Tolerant and Scalable Multipath Routing Protocol in MANET
- Introduction
- Related Works
- Proposed FTSMR Protocol
- Topology Sensing
- Route Computation
- Route Recovery
- Performance Evaluation Results
- Simulation Environment
- Simulation Results
- Conclusions
- References
- Secure Reputation Update for Target Localization in Wireless Sensor Networks
- Introduction
- Related Works
- Background
- Problem Definition and Algorithm
- Problem Definition
- Algorithm
- Implementation and Performance Evaluation
- Simulation Setup
- Results and Analysis
- Conclusions and Future Work
- References
- Section II: Image Processing
- Local Histogram Based Descriptor for Tracking in Wide Area Imagery
- Introduction
- Proposed Method
- Image Registration
- Feature Extraction
- Tracking
- Results and Discussion
- Conclusions
- References
- Shot-Based Genre Identification in Musicals
- Introduction
- Related Work
- Video Assisted Song Genre Identifier System
- Shot Duration Calculation
- Actor Movement Estimation
- Experimental Results
- Conclusions
- References
- Color Image Quantization Quality Assessment
- Introduction
- The Proposed Color Quantization Quality Measure
- Color Similarity
- Edge Similarity
- Structural Similarity
- Subjective Experiments Setup
- Results and Discussions
- Conclusion and Future Work
- References
- Enhanced Approach for 3d Model Reconstruction from Silhouettes
- Introduction
- Literature Survey
- Reconstruction Algorithm
- Enhanced Approach to Region Testing
- Coloring the Voxels
- Implementation and Results
- Conclusion and Future Work
- References
- Computationally Efficient Implementation of Convolution-Based Locally Adaptive Binarization Techniques
- Introduction
- Present Work
- Experimental Results
- Performance Analysis
- Computational Complexity and Computation Time
- Memory Consumption
- Conclusions
- References
- Study of Sampled Data Control Approach towards Prosthetic Eye Model for Initiating the Non Deterministic Aspect
- Introduction
- Short Review on Our Past Research Work on Control Model of Prosthetic Eye
- Background
- Discrete Domain Analysis for Different Sampling Time
- Stability Analysis in Discrete Domain for Prosthetic Eye Transfer Function
- Sample Data Control Domain Aspect towards the Prosthetic Eye Model
- Conclusions
- References
- Localization of Optic Disc in Color Fundus Images
- Introduction
- Methods
- Systematic Overview
- Optic Disc Localization and Detection
- Experimental Results
- Conclusion
- References
- Robust Color Image Watermarking Scheme Using JFIF -YCbCr Color Space in Wavelet Domain
- Introduction
- Selection of Color Space Representation and Watermark Embedding Channel
- Watermark Embedding and Extraction Algorithms
- Watermark Embedding Algorithm
- Watermark Extraction Algorithm
- Experimental Work and Result Analysis
- Conclusions
- References
- Novel Shannon's Entropy Based Segmentation Technique for SAR Images
- Introduction
- Proposed Methodology
- Shannon's Entropy
- Shannon's Filter
- Adaptive Shannon's Thresholding
- Region Merging
- Proposed Algorithm
- Proposed Work Flow Diagram
- Experimental Results
- Conclusions
- References
- Hybrid Approach for Image Encryption Using Hill Cipher Technique
- Introduction
- Proposed Position Manipulation Technique for Image Encryption
- Bits Rotation and Reversal Technique for Image Encryption
- Proposed Technique
- Results and Discussions
- Conclusions
- References
- A Fast Brain Image Registration Using Axial Transformation
- Introduction
- Related Works
- Proposed Method
- Performance Evaluation and Discussion
- Conclusions
- References
- A Fuzzy Based Automatic Bridge Detection Technique for Satellite Images
- Introduction
- Methodology
- Fuzzy Based Thresholding
- Fine Segmentation to Remove Noise
- Area Analysis
- Extraction of Bridges
- Post Processing of the Extracted Image
- Results and Discussions
- Conclusions
- References
- Capsule Endoscopic Colour Image Denoising Using Complex Wavelet Transform
- Introduction
- Framework of DDDT-CWT
- Proposed Algorithm
- Soft Thresholding Based on MAP Estimator
- Image Quality Assesment
- PSNR
- SSIM
- Results and Discussion
- Conclusion and Future Work
- References
- An Improved Adaptive Border Marching Algorithm for Inclusion of Juxtapleural Nodule in Lung Segmentation of CT-Images
- Introduction
- Lung Segmentation
- Lung Mask Creation
- Lung Border Smoothing
- Adaptive Border Marching Algorithm (ABM)
- Improved Adaptive Border Marching Algorithm (IABM)
- Conclusions
- References
- Section III: Pattern Recognition and Classification
- Document Classification after Dimension Reduction through a Modified Gram-Schmidt Process
- Introduction
- Gram-Schmidt Process Definitions and Algebraic Framework
- Gram-Schmidt Orthonormalization
- Modified Gram-Schmidt
- Query Answering
- Classification
- Experimental Results
- Documents Collection
- Classification Performance
- Classification Model
- Conclusions and Future Work
- References
- Automatic Facial Expression Recognition Using Extended AR-LBP
- Introduction
- EAR-LBP Operator
- Automatic Face Localization
- Automatic Facial Expression Recognition
- Experiments and Results
- Conclusions
- References
- Formation of a Compact Reduct Set Based on Discernibility Relation and Attribute Dependency of Rough Set Theory
- Introduction
- Dimension Reduction Using Rough Set Theory
- Basic Concepts of Rough Sets
- Formation of Reducts
- Experimental Results
- Conclusion
- References
- Isolated Word Recognition for Kannada Language Using Support Vector Machine
- Introduction
- Previous Works
- System Design and Implementation
- Feature Calculation (Front-end) Method
- Machine Learning Algorithm (Back-end)
- Experimental Results
- Conclusions
- References
- Vein Identification and Localization for Automated Intravenous Drug Delivery System
- Introduction
- Vein Imaging
- Near-Infrared Light
- Choice of Vein
- Previous Work
- Method
- Source of Light
- Camera
- System Set-Up
- Vein Identification and Localisation
- Results and Conclusions
- Future Work
- References
- A New Manifold Learning Technique for Face Recognition
- Introduction
- Marginality Preserving Embedding
- Experiments and Analysis
- Conclusions
- References
- An Innovative ANN Based Assamese Character Recognition System Configured with Radon Transform
- Introduction
- Different Techniques Used for Character Recognition
- Theoritical Background
- Radon Transform
- Artificial Neural Network
- Experimental Work
- ANN Based Recognition
- ANN Configured with Radon Transform
- Conclusions and Future Work
- References
- Implementation Scheme for Clinical Diagnosis System Using Multi-Agent System(MAS)
- Introduction
- Significance of Using Multi-Agent System
- Architecture of the CDS
- Experimental Design and Software Architecture
- JADE and Master Agent Communication
- Conclusions and Future Work
- References
- Applying Restrained Genetic Algorithm for Attribute Reduction Using Attribute Dependency and Discernibility Matrix
- Introduction
- Proposed Work
- Core Selection
- Multiple Reducts Generation
- Experimental Results
- Conclusion and Future Enhancements
- References
- Improving Generalization Ability of Classifier with Multiple Imputation Techniques
- Introduction
- Handling Missing Data
- Related Work
- The Decision Tree Construction
- Problem Definition and Proposed Algorithm
- Experimentation and Results
- Conclusions
- References
- Clustering of Ragas Based on Jump Sequence for Automatic Raga Identification
- Introduction
- Previous Works
- Raga
- Problem Definition
- Proposed Solution
- Compute Pitch Sequence
- Jump Sequence
- Clustering of Ragas
- Experimental Results for Clustering Ragas
- Experimental Results for Training and Testing Cluster HMM Models
- Conclusions
- References
- Syntactic and Semantic Feature Extraction and Preprocessing to Reduce Noise in Bug Classification
- Introduction
- Related Work
- Feature Extraction and Preprocessing
- Overview of the Bug Site
- Feature Extraction
- Feature Preprocessing to Reduce Noise
- Classification Technique
- Probabilistic Framework for Naïve Bayes Classification
- Support Vector Machine
- Experimental Results
- Dataset Information and Implementation
- Results and Discussion
- Conclusions
- References
- Analysis of Blind Source Separation Techniques for Eye Artifact Removal
- Introduction
- Data Acquisition and Preprocessing
- Artifact Removal Techniques
- EOG Based Eye Artifact Removal
- Blind Source Separation
- Results
- Clean EEG Metric
- Conclusions
- References
- Effective Multiclassifier for Arecanut Grading
- Introduction
- Proposed Methodology
- Segmentation
- Feature Extraction
- Support Vector Machines for Training
- k-NN Classification
- Results and Discussion
- Conclusions
- References
- Real Time Human Gender Detection Based on Facial Features and Connected Component Analysis
- Introduction
- Related Work
- Pre-processing the Image
- Connected Component Analysis
- Blobs of Facial Features
- Pixel Value of Blob Analysis
- Support Vector Machine
- Experimental Outcomes
- Result Analysis
- Conclusions
- References
- Classification of Categorical Data Using Hybrid Similarity Measures
- Introduction
- Similarity Measures Used
- Experiments
- Experimental Results for Scheme 2
- Conclusions
- References
- An Evolutionary Algorithm for Heart Disease Prediction
- Introduction
- Association Rule Mining
- Genetic Algorithms
- Heart Disease
- Methodology
- Data Source
- Explanation of Algorithm
- Results and Discussion
- Performance Evaluation
- Conclusions
- References
- An Efficient Voice Enabled Web Content Retrieval System for Limited Vocabulary
- Introduction
- A Review of Existing Web Content Retrieval Systems
- Adaptation of Sphinx 4 for the Proposed System
- Voice Enabled Content Retrieval System
- Reaching the Wikipedia Page
- Principle of Content Retrieval
- Extracting Content from a Specific Label in a Wiki Page
- Image Extraction
- Experimental Analysis
- Conclusion
- References
- Face Detection Using a Boosted Cascade of Features Using OpenCV
- Introduction
- Proposed Method
- Haar-Like Features
- Learning Classification
- Cascade of Classifiers
- Results and Discussion
- Conclusions
- References
- Disambiguating Phrasal Verbs in English to Kannada Machine Translation
- Introduction
- Related Work
- Phrasal Verbs
- Methodology
- Evaluation
- Discussion
- Conclusion and Future Work
- References
- Extraction of Panic Expression from Human Face Based on Histogram Approach
- Introduction
- Related Work
- Proposed Methodology
- Face Detection
- Image Pre-processing
- Panic Facial Features Extraction
- Color Image Segmentation
- Panic-Info-Mask Based Histogram Draw
- Expression Grading by Picks Value
- Proposed Work Flow Diagram
- Result and Discussion
- Conclusion
- References
- Section IV: Computer Architecture and Distributed Computing
- Towards a Novel Statistical Method for Generating Test Sets with a Given Coverage Probability
- Introduction
- Conceptual Framework
- Path Based Testing
- Probabilistic Paths
- Control Flow Graph Representation
- The Method
- Application
- A Practical Example
- Validation of the Method
- Comparison to Other Related Works
- Conclusions
- References
- Compiler Driven Inter Block Parallelism for Multicore Processors
- Introduction
- Target Architecture
- Compiler
- Inter Block Parallelism
- Sub Block of Dependence Graph(SDG)
- Algorithm
- Mapping Inter Block Disjoint Sub-blocks on to Multiple Cores
- Scheduler
- Experimental Results
- Conclusions
- References
- Implementation of Application Specific Network-On-Chip Architectures on Reconfigurable Device Using Topology Generation Algorithm with Genetic Algorithm Based Optimization Technique
- Introduction
- Related Work
- Power Analysis in NOC
- Power Analysis of NOC Router
- Power Analysis of NOC Links
- Proposed Methodology
- The Proposed Algorithm
- Genetic Algorithm Based Optimization
- Experimental Results and Discussion
- Conclusions
- References
- Painting an Area by Swarm of Mobile Robots with Limited Visibility
- Introduction
- Problem Definition, Assumptions and Models
- Characteristics of the Robot
- Visibility Graph
- Models
- Coverage Algorithm
- Algorithm
- Correctness Proof
- Conclusions
- References
- Design of RISC Based MIPS Architecture with VLSI Approach
- Introduction
- Salient Features of MIPS Architecture
- Instructions Set Architecture
- MIPS Functional Units
- Instruction Fetch Unit
- Instruction Decode Unit
- The Control Unit
- Execution Unit
- Data Memory Unit
- Synthesis and Simulation Results
- Instruction Fetch Unit
- Conclusions
- References
- A Fair and Efficient Gang Scheduling Algorithm for Multicore Processors
- Introduction
- Gang Scheduling
- Motivation and Contributions
- Contributions
- Fair and Efficient Gang Scheduling Algorithm
- Simulation Experiment
- Performance Metrics
- Simulation Setup
- Conclusions
- References
- Section V: Software Engineering, Information Technology and Optimization Techniques
- Identifying the Most Efficient Implementation Sequence of IT Projects Broken Down into MMFs and AEs
- Introduction
- Conceptual Framework
- The Incremental Funding Method
- Data Envelopment Analysis
- The Analytic Hierarchy Process
- The Method
- Conclusions
- References
- IBGA: An Incentives Based Grant Allocation Algorithm for Academic Institutions
- Introduction
- Incentive Based Scheme
- Grants for Faculty Members
- Grants for Research Students
- Balancing Meritocracy and Equitability
- Results and Discussion
- Conclusions
- References
- On the Merits and Pitfalls of the Incremental Funding Method and Its Software Project Scheduling Algorithms
- Introduction
- The Incremental Funding Method
- The IFM's Scheduling Algorithms
- The Greedy Approach
- The Simple Look-Ahead Approach
- The Weighted Look-Ahead Approach
- The Merits and Pitfalls of the IFM Algorithms
- The Merits
- The Pitfalls
- Overcoming the Pitfalls and Extending the IFM
- Future Research Directions
- Conclusions
- References
- Section VI: Data Mining Techniques
- Statistical Interpretation for Mining Hybrid Regional Web Documents
- Introduction
- Features of Regional Web Documents
- Need for Media Mining from Data Mining Approaches
- Content Features in Multi-lingual Documents
- Statistical Interpretation
- Conclusions
- References
- Ontology Based Text Processing for Context, Similarity and Key Word Extraction
- Introduction
- Related Work
- Proposed Work
- SenCon
- KeyWordEx
- Experimental Results
- SenCon
- KeyWordEx
- Conclusions
- References
- Reduction of Variation in Mooney Viscosity of Polybutadiene Rubber
- Introduction
- Process
- Data Mining
- Data Partitioning
- Interval Plots
- Conclusions
- References
- Assesement of Freeware Data Mining Tools over Some Wide-Range Characteristics
- Introduction
- Open-Source Data Mining
- Comparative Survey
- Summary
- Conclusions
- Future Work
- References
- Dimensionality Reduction for Efficient Classification of DNA Repair Genes
- Introduction
- Related Work
- Background
- The Proposed Method
- Problem Statement
- Design and Implementation
- Data Collection
- Data Preprocessing
- Classification Models
- Accuracy Measures
- Results and Discussions
- Conclusions
- References
- Section VII: Computer Networks and Network Security
- Comparison of Supervised Learning and Reinforcement Learning in Intrusion Domain
- Introduction
- Feature Reduction
- Supervised Learning
- Reinforcement Learning
- Experimental Results
- Conclusion and Future Work
- References
- An Improved Set-Valued Data Anonymization Algorithm and Generation of FP-Tree
- Introduction
- Literature Survey
- Concepts and Existing Algorithms
- Generalization
- Count Tree
- Direct Anonymization
- FP-Growth Algorithm
- The Proposed Algorithms
- Improved Direct Anonymization
- Improved FP-Growth Algorithm
- Comparison of the Algorithms
- Experimental Analysis
- Conclusions
- References
- Cryptanalysis of Simplified-Data Encryption Standard Using Tabu Search Method
- Introduction
- Related Work
- S-DES Algorithm
- Tabu Search
- Outline of a Basic Tabu Search Algorithm
- Experimental Setup and Results
- Conclusions and Future Work
- References
- QoS Improvement Using NLMPC for Congestion Control and Co-operative Information Processing
- Introduction
- Dynamic Matrix Control for Collision Avoidance
- Reverse Mapping of Location to IP Using Domain Name Server and GPS
- Navigational Control Using GPS, IP and LabVIEW
- Modelling of Stochastic Traffic Flow Based on Variable Leaky Bucket Algorithm
- Data Logging Using Hardware Implementation
- Vehicle Position Tracking Using Arduino and LabVIEW
- Conclusions
- Further Work
- References
- Modeling Access Permissions in Role Based Access Control Using Formal Concept Analysis
- Introduction
- Background
- Modeling Access Permissions Using FCA
- Illustration
- Conclusions
- References
- A Hybrid Fractal-Wavelet Digital Watermarking Technique with Localized Embedding Strength
- Introduction
- Fractal Encoding
- Fractal Watermarking
- Fractal Dimension
- Wavelet Transforms in Watermarking
- Hybrid Methods
- Embedding Strength
- Proposed Method
- Experimental Results
- Conclusions
- References
- Digital Signatures Using Multivariate Polynomial Systems with Relatively Simpler Central Maps
- Introduction
- Multivariate Polynomial Cryptography and Digital Signatures
- Introduction to MPC
- Encryption and Decryption Using MPC
- Digital Signatures Using MPC
- Eigen Values and Diagonalization of Matrices
- Ring Representation of Elements for Solving Polynomial Systems
- Solving One Variable Polynomials Using Eigen Values
- Solving Multivariate Polynomial Systems Using Ring Representations
- Grobner Basis Technique for Solving Polynomial Systems
- Affine Transformations and Hiding the Central Map
- Conclusions
- References
- Analysis and Comparison of Fully Layered Image Encryption Techniques and Partial Image Encryption Techniques
- Introduction
- Related Work
- Image Encryption Techniques
- Partial Image Encryption Techniques
- Results and Discussion
- Conclusions
- References
- Performance Analysis of TEA Block Cipher for Low Power Applications
- Introduction
- Related Works
- Implementation of TEA with Different Approaches
- Method I : Sequential Approach
- Method II : Structural Approach
- Method III : Subprogram Approach
- Performance Analysis and Results
- Conclusion
- References
- Robustness Test Analysis of Histogram Based Audio Watermarking
- Introduction
- Performance Parameters
- Bit Error Rate
- Signal to Noise Ratio
- Experiment Result of Histogram Based Approach
- Results with Different Length Watermark
- Robustness Test
- Amplification
- Resampling
- Low-Pass Filtering
- Random Cropping
- Jittering
- Addition of Noise
- Conclusions
- References
- A Secured-Concurrent-Available Architecture for Improving Performance of Web Servers
- Introduction
- Background Study
- Distributed Denial of Service (DDOS)
- Support for Concurrency in Web Servers
- Replication of Resources
- Summary of Findings
- Problem Statement
- Proposed Architecture
- Stage 1
- Stage 2
- Operation of the Inner Core
- Evaluation of the Architecture
- Conclusions
- References
- Text Steganography through Quantum Approach
- Introduction
- Quantum Steganography
- Quantum GateLogicGatesAshokMuthukrishnan
- Reversible Classical Logic
- Text Steganography
- Proposed Model
- Algorithms
- Algorithm for Message Embedding
- Algorithm for Message Extracting
- Algorithm for GUI
- Results Analysis
- Similarity Measure
- Conclusions
- References
- A Novel Approach of Video Steganography Using PMM
- Introduction
- Review of Related Works on Image and Video Steganography
- Existing Data Hiding Methods in Image
- Bhattachayya and Sanyal's Transformation
- Existing Data Hiding Methods in Video
- Proposed Method on Video Steganography
- Algorithms
- Data Hiding in Image Using PMM
- Data Extraction through PMM
- Wavelet DPCS (Division-PMM-Combination-Sending) Algorithm
- Wavelet DPCR (Division-PMM-Combination-Receiving) Algorithm
- Data Hiding in Video Using PMM
- Experimental Results
- Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR)
- Similarity Measure
- Steganography Security Using KullbackLeibler Divergence
- Case Study of Video Steganography Technique in Terms of MSE and PSNR
- Analysis of the Results
- Conclusion
- References
- Author Index
Systemvoraussetzungen
Dateiformat: PDF
Kopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
- Computer (Windows; MacOS X; Linux): Verwenden Sie zum Lesen die kostenlose Software Adobe Reader, Adobe Digital Editions oder einen anderen PDF-Viewer Ihrer Wahl (siehe E-Book Hilfe).
- Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions oder die App PocketBook (siehe E-Book Hilfe).
- E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m.
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.