1. Shuhua, X. (2011). DES and RSA encryption algorithm based on the data security transmission technology research. Manufacturing Automation, 02, 180–182.
2. Sun, B., & Gao, M. (2010). Applications of quick response code in anticounterfeiting technology. Computer Security, 09, 6–9.
3. Gupta, V., et al. (2014). Robust and secured image watermarking using dwt and encryption with qr codes. International Journal of Computer Applications, 100(14), 33–37.
4. Mohammad, A. A., Alhaj, A., & Shaltaf, S. (2008). An improved SVD-based watermarking scheme for protecting rightful ownership. Signal Processing, 88(9), 2158–2180.
https://doi.org/10.1016/j.sigpro.2008.02.015
.
5. Zhu, Y., & Li, Y. (2011). Application of hybrid encryption algorithm in software anti-piracy. Computer Programming Skills & Maintenance, 16, 125–126.