S. Aygun and M. Akcay, Securing biometric face images via steganography for QR code, Proceedings of the Eighth International Conference on Information Security and Cryptology, pp.128-133, 2015.

S. Chhabra, G. Gupta, M. Gupta, and G. Gupta, Detecting fraudulent bank checks, Advances in Digital Forensics XIII, pp.245-266, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01716398

A. Espejel-trujillo, I. Castillo-camacho, M. Nakano-miyatake, and H. Perez-meana, Identity document authentication based on VSS and QR codes, vol.3, pp.241-250, 2012.

I. Goodfellow, J. Pouget-abadie, M. Mirza, B. Xu, D. Warde-farley et al., Generative adversarial nets, Proceedings of the Twenty-Seventh Annual Conference on Neural Information Processing Systems, pp.2672-2680, 2014.

R. Gross, I. Matthews, J. Cohn, T. Kanade, and S. Baker, Multi-PIE, Image and Vision Computing, vol.28, issue.5, pp.807-813, 2010.

G. Gupta, S. Saha, S. Chakraborty, and C. Mazumdar, Document frauds: Identification and linking fake documents to scanners and printers, Proceedings of the International Conference on Computing: Theory and Applications, pp.497-501, 2007.

P. Isola, J. Zhu, T. Zhou, and A. Efros, Image-to-Image Translation with Conditional Adversarial Networks, 2018.

J. Nayak, S. Singh, S. Chhabra, G. Gupta, M. Gupta et al., Detecting data leakage from hard copy documents, Advances in Digital Forensics XIV, pp.111-124, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01988849

O. Parkhi, A. Vedaldi, and A. Zisserman, Deep face recognition, Proceedings of the British Machine Vision Conference, vol.12, pp.41-42, 2015.

A. Rai, I have been asked to shut my mouth, but work will go on -An interview with the whistleblower who exposed Madhya Pradesh Vyapam scam, The News Minute, 2015.

N. Raval, A. Machanavajjhala, and L. Cox, Protecting visual secrets using adversarial nets, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp.1329-1332, 2017.

S. Sarkar, R. Verma, and G. Gupta, Detecting counterfeit currency and identifying its source, Advances in Digital Forensics IX, pp.367-384, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01460616

V. Seenivasagam and R. Velumani, A QR code based zerowatermarking scheme for authentication of medical images in teleradiology cloud, Computational and Mathematical Methods in Medicine, issue.516465, 2013.

I. Tkachenko, W. Puech, C. Destruel, O. Strauss, J. Gaudin et al., Two-level QR code for private message sharing and document authentication, IEEE Transactions on Information Forensics and Security, vol.11, issue.3, pp.571-583, 2016.
URL : https://hal.archives-ouvertes.fr/lirmm-01337360

P. Tyre, How sophisticated test scams from China are making their way into the U.S., The Atlantic, 2016.

M. Warasart and P. Kuacharoen, Paper-based document authentication using digital signature and QR code, Proceedings of the Fourth International Conference on Computer Engineering and Technology, pp.94-98, 2012.

X. Wu, R. He, Z. Sun, and T. Tan, A light CNN for deep face representation with noisy labels, IEEE Transactions on Information Forensics and Security, vol.13, issue.11, pp.2884-2896, 2018.