#### Filter Results:

#### Publication Year

1977

2016

#### Publication Type

#### Co-author

#### Key Phrase

#### Publication Venue

Learn More

This article constitutes a contribution to an analysis of the notion of variable. Whithin the framework of Combinatory Logic as a formalism without bound variables, the Logic of Determination of Objects (LDO) provides an explanation for the necessary distinction between " whatever, any " and " indeterminate , indefinite " used by the introduction and… (More)

We propose a rigorous definition of the notion of typicality, making use of the strict partial order naturally induced among the objects at hand by a given concept. This perspective enables us to transpose in the framework of object determination logic some well-known problems like contextual typi-cality or contextual inference. Then these problems can be… (More)

We present a new approach for modeling color attacks of rgb-color watermarked images. We have used a based interpolation watermarking algorithm and supposed that the attacks are simulated by a scaling of the colors followed by a translation. We give bounds for the extracted watermark depending on the original image, the watermark and the attack. Different… (More)

Object Determination Logic (ODL) f f f f f x f x x f f x x f f g f g g f f f f f f g =f g f f f x f f f Abstract Structured Class of Concepts.

From a logical viewpoint, object is never defined, even by a negative definition. This paper is a theoretical contribution about object using a new constructivist logical approach called Logic of Determination of Objects (LDO) founded on a basic operation, called determination. This new logic takes into account cognitive problems such as the inheritance of… (More)

The images authentication transmitted through the communication networks must verify the proof of the originality and robustness against the hacker attacks. The existing techniques such as the cryptographic methods are not sufficient. An effectiveness and robust solution is proposed in this paper. This solution is based on the watermarking of the video and… (More)

- Quist-Aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo M Eghan, Nii Narku Quaynor
- 2016

Identity management is crucial in cyberspace where infringement of one's privacy, copy right disputes, theft and other malicious activities are very rampant. There exists a need of ownership identification and authentication of digital images. In solving and contributing to this field, we proposed a cryptographic and watermarking encryption technique for… (More)