How technology can help to fight counterfeits?, STP Pharma Pratiques, vol.19, issue.1, 2009. ,
Digital authentication with copy-detection patterns, Optical Security and Counterfeit Deterrence Techniques V, pp.176-183, 2004. ,
DOI : 10.1117/12.528055
Physical One-Way Functions, Science, vol.297, issue.5589, pp.2026-2030, 2002. ,
DOI : 10.1126/science.1074376
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.83.6166
Watermarking security: theory and practice, IEEE Transactions on Signal Processing, vol.53, issue.10, pp.3976-3987, 2005. ,
DOI : 10.1109/TSP.2005.855418
URL : https://hal.archives-ouvertes.fr/inria-00088006
Blind newton sensitivity attack, IEEE Proceedings of Information Security, pp.115-125, 2006. ,
DOI : 10.1049/ip-ifs:20055151