The progress of network and multimedia technologies has been phenomenal during the previous two decades. Unauthorized users will be able to copy, retransmit, modify reproduction, and upload the contents more easily as a result of this innovation. Malicious attackers are quite concerned about the development and widespread use of digital video. Digital watermarking technology gives solutions to the aforementioned problems. Watermarking methods can alleviate these issues by embedding a secret watermark in the original host data, allowing the genuine user or file owner to identify any manipulation. In this study, lots of papers have been analyzed and studied carefully, in the period 2011–2022. The historical basis of the subject should not be forgotten so studying old research will give a clear idea of the topic. To aid future researchers in this subject, we give a review of fragile watermarking approaches and some related papers presented in recent years. This paper presents a comparison of many relevant works in this field based on some of the outcomes and improvements gained in these studies, which focuses on the common characteristics that increase the effect of watermarking techniques such as invisibility, tamper detection, recovery, and security
Genetic diversity was studied in 31 Iraqi common reed samples , which were collected from Iraqi marshes in Basrah , Messan and Thi-Qar provinces and also from different areas in Baghdad province . Random amplified polymorphic DNA (RAPD) technique was used for evaluation of genetic diversity between collected samples . Seven primers were used for polymorphism detecting between common reed samples . The results revealed 102 bands for the all samples when RAPD-PCR was used . The percentage rate for the monomorphic bands is 6.86% , while the percentage rate for the polymorphic bands is 93.13% , and the numbers of these bands are ranging between 10 to 17 for each used primer . The UBC1 primer gave the highest number of poly
... Show MoreThis study was carried out in epidemically field with common reed (Phragmites communis Trin.) plants in the Nassiriah cityThiQur governorate ,during 2009/2010 to investigate the influence of plant growth regulator gibberellin (GA3)and cytokinin (CK) in increasing the efficacy of glyphosate and Fluazifop-butyl in common reed control . Factorial experiment in RCBD was used with three replications in tow Factors . Glyphosate 3500mg .l־¹ gave the higher mean of injury score of common reed and lower mean of common reed shoots , shoots dry weight and rhizome dry weight(3.59,22.01 shoot /0.5m² ,0.57Kg / 0.5m² and 250.50gm /0,5m² ),respectively. All plant growth regulators gaves the higher means of common reed shoots and rhizome dry weight com
... Show MoreThe development of Web 2.0 has improved people's ability to share their opinions. These opinions serve as an important piece of knowledge for other reviewers. To figure out what the opinions is all about, an automatic system of analysis is needed. Aspect-based sentiment analysis is the most important research topic conducted to extract reviewers-opinions about certain attribute, for instance opinion-target (aspect). In aspect-based tasks, the identification of the implicit aspect such as aspects implicitly implied in a review, is the most challenging task to accomplish. However, this paper strives to identify the implicit aspects based on hierarchical algorithm incorporated with common-sense knowledge by means of dimensionality reduction.
A robust video-bitrate adaptive scheme at client-aspect plays a significant role in keeping a good quality of video streaming technology experience. Video quality affects the amount of time the video has turned off playing due to the unfilled buffer state. Therefore to maintain a video streaming continuously with smooth bandwidth fluctuation, a video buffer structure based on adapting the video bitrate is considered in this work. Initially, the video buffer structure is formulated as an optimal control-theoretic problem that combines both video bitrate and video buffer feedback signals. While protecting the video buffer occupancy from exceeding the limited operating level can provide continuous video str
... Show MoreVideo steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show MoreIn this paper, we proved coincidence points theorems for two pairs mappings which are defined on nonempty subset in metric spaces by using condition (1.1). As application, we established a unique common fixed points theorems for these mappings by using the concept weakly compatible (R-weakly commuting) between these mappings.