C. Baras and F. Cayre, Towards a realistic channel model for security analysis of authentication using graphical codes, Information Forensics and Security (WIFS), IEEE International Workshop on, pp.115-119, 2013.

L. Yu, X. Niu, and S. Sun, Print-and-scan model and the watermarking countermeasure, Image and Vision Computing, vol.23, issue.9, pp.807-814, 2005.

O. Ibe, Fundamentals of applied probability and random processes, 2014.

. Iu, W. Tkachenko, O. Puech, J. Strauss, C. Gaudin et al., Fighting Against Forged Documents by Using Textured Image, Signal Processing Conference (EUSIPCO), Proceedings of the 22th European, 2014.

A. Vongkunghae, J. Yi, and R. B. Wells, A printer model using signal processing techniques, Image Processing, IEEE Transactions on, vol.12, issue.7, pp.776-783, 2003.

J. Tchan, R. C. Thompson, and A. Manning, A computational model of print-quality perception, Expert Systems with Applications, vol.17, issue.4, pp.243-256, 1999.

C. Lin and S. Chang, Distortion modeling and invariant extraction for digital image print-and-scan process, Int. Symp. Multimedia Information Processing, 1999.

K. Solanki, U. Madhow, B. S. Manjunath, and S. Chandrasekaran, Modeling the print-scan process for resilient data hiding, Electronic Imaging, International Society for Optics and Photonics, pp.418-429, 2005.

T. D. Kite, B. L. Evans, and A. C. Bovik, Modeling and quality assessment of halftoning by error diffusion, Image Processing, IEEE Transactions on, vol.9, issue.5, pp.909-922, 2000.

S. Voloshynovskiy, O. Koval, F. Deguillaume, and T. Pun, Visual communications with side information via distributed printing channels: extended multimedia and security perspectives, Electronic Imaging, International Society for Optics and Photonics, pp.428-445, 2004.

A. Ho, B. Hoang, W. Sawaya, and P. Bas, Authentication using graphical codes: Optimisation of the print and scan channels, Signal Processing Conference (EUSIPCO), Proceedings of the 22nd European, pp.800-804, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01056702

A. Ho, B. Hoang, W. Sawaya, and P. Bas, Document Authentication Using Graphical Codes: Reliable Performance Analysis and Channel Optimization, EURASIP Journal on Information Security, vol.2014, issue.9, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01056699

R. R. Wilcox, Introduction to robust estimation and hypothesis testing, 2012.

D. J. Sheskin, Handbook of parametric and nonparametric statistical procedures, 2003.