J. Picard, Digital authentication with copy-detection patterns, International Society for Optics and Photonics, pp.176-183, 2004.

. Iu, W. Tkachenko, C. Puech, O. Destruel, J. M. Strauss et al., Two-level QR code for private message sharing and document authentication, IEEE Transactions on Information Forensics and Security, vol.11, issue.3, pp.571-583, 2016.

A. E. Dirik and B. Haas, Copy detection pattern-based document protection for variable media, Image Processing, vol.6, issue.8, pp.1102-1113, 2012.

N. J. Salkind, Encyclopedia of measurement and statistics, 2006.

A. T. , -. Ho, and F. Shu, A print-and-scan resilient digital watermark for card authentication, Information, Communications and Signal Processing, and Fourth Pacific Rim Conference on Multimedia, vol.2, p.11491152, 2003.

R. Villn, S. Voloshynovskiy, O. Koval, F. Deguillaume, and T. Pun, Tamper-proofing of Electronic and Printed Text Documents via Robust Hashing and Data-Hiding, Proc. Proceedings of SPIE-IS&T Electronic Imaging 2007, Security, Steganography, and Watermarking of Multimedia Contents IX, 2007.

S. Shang, N. Memon, and X. Kong, Detecting documents forged by printing and copying, EURASIP Journal on Advances in Signal Processing, vol.1, pp.1-13, 2014.

C. Baras and F. Cayre, 2d bar-codes for authentication: A security approach, Signal Processing Conference (EUSIPCO), Proceedings of the 20th European, p.17601766, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00709394

J. Tchan, The development of an image analysis system that can detect fraudulent alterations made to printed images, International Society for Optics and Photonics, pp.151-159, 2004.

L. Yu, X. Niu, and S. Sun, Print-and-scan model and the watermarking countermeasure, Image and Vision Computing, vol.23, p.807814, 2005.

. Iu, W. Tkachenko, O. Puech, C. Strauss, J. M. Destruel et al., Printed document authentication using two level QR code, International Conference on Acoustics, Speech and Signal Processing, 2016.

A. T. Phan-ho, B. A. Hoang, W. Sawaya, and P. Bas, Document authentication using graphical codes: impacts of the channel model, Proceedings of the first ACM workshop on Information hiding and multimedia security, p.8794, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00836409