S. Amiri and M. Jamzad, An Algorithm for Modeling Print and Scan Operations Used for Watermarking, Digital Watermarking, 2009.
DOI : 10.1007/3-540-45453-5_52

C. Bishop, Pattern recognition and machine learning, 2006.

P. Borges, J. Mayer, and E. Izquierdo, Document image processing for paper side communications. Multimedia, IEEE Transactions on, vol.10, issue.7, pp.1277-1287, 2008.

L. Breiman, Statistical Modeling: The Two Cultures (with comments and a rejoinder by the author), Statistical Science, vol.16, issue.3, pp.199-231, 2001.
DOI : 10.1214/ss/1009213726

M. Davy and J. Tourneret, Generative supervised classification using dirichlet process priors. Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol.32, issue.10, pp.1781-1794, 2010.

N. Dridi, Y. Delignon, W. Sawaya, and F. Septier, Blind Detection of Severely Blurred 1D Barcode, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, pp.1-5, 2010.
DOI : 10.1109/GLOCOM.2010.5684145

URL : https://hal.archives-ouvertes.fr/hal-00805761

J. Friedman, T. Hastie, and R. Tibshirani, The elements of statistical learning, 2009.

B. Gassend, D. Clarke, M. Van-dijk, and S. Devadas, Controlled physical random functions, Computer Security Applications Conference Proceedings. 18th Annual, pp.149-160, 2002.

I. Guyon, Feature extraction: foundations and applications, 2006.
DOI : 10.1007/978-3-540-35488-8

T. Kanungo, R. Haralick, H. Baird, W. Stuezle, and D. Madigan, A statistical, nonparametric methodology for document degradation model validation. Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol.22, issue.11, pp.1209-1223, 2000.

L. Lai, H. Gamal, and H. Poor, Authentication over noisy channels. Information Theory, IEEE Transactions on, vol.55, issue.2, pp.906-916, 2009.

U. Maurer, Authentication theory and hypothesis testing. Information Theory, IEEE Transactions on, vol.46, issue.4, pp.1350-1356, 2000.

J. Picard, C. Vielhauer, and N. Thorwirth, Towards fraud-proof ID documents using multiple data hiding technologies and biometrics, Security, Steganography, and Watermarking of Multimedia Contents VI, pp.123-234, 2004.
DOI : 10.1117/12.525446

P. , J. Zhao, and J. , Improved techniques for detecting, analyzing, and using visible authentication patterns, wO Patent WO, p.586, 2005.

W. Press, Global congress addresses international counterfeits threat immediate action required to combat threat to finance, health, 2005.

W. Press, Counterfeiting and piracy endangers global economic recovery, say global congress leaders, 2009.

S. Shariati, F. Standaert, L. Jacques, B. Macq, M. Salhi et al., Random profiles of laser marks, Proceedings of the 31st WIC Symposium on Information Theory in the Benelux, 2010.

K. Solanki, U. Madhow, B. Manjunath, S. Chandrasekaran, and I. El-khalil, Print and scan'resilient data hiding in images. Information Forensics and Security, IEEE Transactions on, vol.1, issue.4, pp.464-478, 2006.

R. Villan, S. Voloshynovskiy, O. Koval, and T. Pun, Multilevel 2D bar codes: toward high-capacity storage modules for multimedia security and management, Security, Steganography, and Watermarking of Multimedia Contents VII, pp.453-464, 2005.
DOI : 10.1117/12.586274

R. Wells, A. Vongkunghae, and J. Yi, A signal processing model for laser print engines, IEEE 2002 28th Annual Conference of the Industrial Electronics Society. IECON 02, pp.1514-1519, 2002.
DOI : 10.1109/IECON.2002.1185504

L. Yu and S. Sun, Print-and-scan model and the watermarking countermeasure, Image and Vision Computing, vol.23, issue.9
DOI : 10.1016/j.imavis.2005.05.014