J. Bobee, How technology can help to fight counterfeits?, STP Pharma Pratiques, vol.19, issue.1, 2009.

J. Picard, Digital authentication with copy-detection patterns, Optical Security and Counterfeit Deterrence Techniques V, pp.176-183, 2004.
DOI : 10.1117/12.528055

R. Pappu, B. Recht, J. Taylor, and N. Gershenfeld, Physical One-Way Functions, Science, vol.297, issue.5589, pp.2026-2030, 2002.
DOI : 10.1126/science.1074376

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.83.6166

F. Cayre, C. Fontaine, and T. Furon, Watermarking security: theory and practice, IEEE Transactions on Signal Processing, vol.53, issue.10, pp.3976-3987, 2005.
DOI : 10.1109/TSP.2005.855418

URL : https://hal.archives-ouvertes.fr/inria-00088006

P. Comesana, L. Perez-freire, and F. Perez-gonzalez, Blind newton sensitivity attack, IEEE Proceedings of Information Security, pp.115-125, 2006.
DOI : 10.1049/ip-ifs:20055151