Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,393,782 papers from all fields of science
Search
Sign In
Create Free Account
Copy protection
Known as:
Content protection
, Copy restriction
, Copy protected
Expand
Copy protection, also known as content protection, copy prevention and copy restriction, is any effort designed to prevent the reproduction of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
40-bit encryption
AIBO
Alan Wake
Atari DOS
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Poverty and protected areas: An evaluation of a marine integrated conservation and development project in Indonesia
G. Gurney
,
J. Cinner
,
+5 authors
F. Setiawan
2014
Corpus ID: 62826737
Review
2008
Review
2008
Multimedia Content Encryption: Techniques and Applications
Shiguo Lian
2008
Corpus ID: 60734351
How to Design a Secure Multimedia Encryption Scheme The widespread use of image, audio, and video data makes media content…
Expand
Highly Cited
2006
Highly Cited
2006
The comparative biodiversity of seven globally important wetlands: a synthesis
W. Junk
,
Mark T. Brown
,
+4 authors
B. Warner
Aquatic Sciences
2006
Corpus ID: 24369809
Abstract.The species diversity data of seven globally important wetlands (Canadian peatlands, Florida Everglades, Pantanal…
Expand
Review
2005
Review
2005
A survey of digital image watermarking techniques
V. Potdar
,
Song Han
,
E. Chang
,
V. Potdar
,
Song Han
,
E. Chang
INDIN '05. 3rd IEEE International Conference on…
2005
Corpus ID: 41768464
Watermarking, which belong to the information hiding field, has seen a lot of research interest. There is a lot of work begin…
Expand
Highly Cited
2001
Highly Cited
2001
Parks in peril : people, politics, and protected areas
K. Brandon
,
K. Redford
,
S. Sanderson
2001
Corpus ID: 64866415
Using the experience of the Parks in Peril program - a wide-ranging project instituted by The Nature Conservancy and its partner…
Expand
Highly Cited
1998
Highly Cited
1998
Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations
M. Kuhn
,
Ross J. Anderson
Information Hiding
1998
Corpus ID: 205962
It is well known that eavesdroppers can reconstruct video screen content from radio frequency emanations. We discuss techniques…
Expand
Highly Cited
1998
Highly Cited
1998
Analysis of the Sensitivity Attack against Electronic Watermarks in Images
J. Linnartz
,
Marten van Dijk
Information Hiding
1998
Corpus ID: 14657398
In some applications of electronic watermarks, the device that detects whether content contains a watermark or not is in public…
Expand
Highly Cited
1996
Highly Cited
1996
In pursuit of ecotourism
H. Goodwin
Biodiversity and Conservation
1996
Corpus ID: 10683034
Ecotourism is expected, by the tourism industry and academics, to grow rapidly over the next 20 years. Much has been written…
Expand
Review
1990
Review
1990
Otters : an action plan for their conservation
Pat Foster-Turley
,
S. Macdonald
,
C. Mason
1990
Corpus ID: 89269633
This Action Plan gives an overview of otter biology and the conservation issues that affect all 13 species, and also practical…
Expand
Highly Cited
1983
Highly Cited
1983
Development and validation of revisions in the counselor rating form.
J. Corrigan
,
L. D. Schmidt
1983
Corpus ID: 96422186
2. When an image on the film is obliterated with a round black mark it is an indication that the film inspector noticed either…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE