Securing biometric face images via steganography for QR code, Proceedings of the Eighth International Conference on Information Security and Cryptology, pp.128-133, 2015. ,
Detecting fraudulent bank checks, Advances in Digital Forensics XIII, pp.245-266, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01716398
, Identity document authentication based on VSS and QR codes, vol.3, pp.241-250, 2012.
, Generative adversarial nets, Proceedings of the Twenty-Seventh Annual Conference on Neural Information Processing Systems, pp.2672-2680, 2014.
Multi-PIE, Image and Vision Computing, vol.28, issue.5, pp.807-813, 2010. ,
Document frauds: Identification and linking fake documents to scanners and printers, Proceedings of the International Conference on Computing: Theory and Applications, pp.497-501, 2007. ,
, Image-to-Image Translation with Conditional Adversarial Networks, 2018.
Detecting data leakage from hard copy documents, Advances in Digital Forensics XIV, pp.111-124, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01988849
Deep face recognition, Proceedings of the British Machine Vision Conference, vol.12, pp.41-42, 2015. ,
I have been asked to shut my mouth, but work will go on -An interview with the whistleblower who exposed Madhya Pradesh Vyapam scam, The News Minute, 2015. ,
Protecting visual secrets using adversarial nets, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp.1329-1332, 2017. ,
Detecting counterfeit currency and identifying its source, Advances in Digital Forensics IX, pp.367-384, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-01460616
A QR code based zerowatermarking scheme for authentication of medical images in teleradiology cloud, Computational and Mathematical Methods in Medicine, issue.516465, 2013. ,
Two-level QR code for private message sharing and document authentication, IEEE Transactions on Information Forensics and Security, vol.11, issue.3, pp.571-583, 2016. ,
URL : https://hal.archives-ouvertes.fr/lirmm-01337360
How sophisticated test scams from China are making their way into the U.S., The Atlantic, 2016. ,
Paper-based document authentication using digital signature and QR code, Proceedings of the Fourth International Conference on Computer Engineering and Technology, pp.94-98, 2012. ,
A light CNN for deep face representation with noisy labels, IEEE Transactions on Information Forensics and Security, vol.13, issue.11, pp.2884-2896, 2018. ,