1. [1] B. Schneier. Applied Cryptography: Protocols, Algorithms and Source Code in C, Moscow: Triumf, 2003 https://www.amazon.com/Applied-CryptographyProtocols-Algorithms-Source/dp
2. [2] B. Jane. Digital Image Processing. Springer-Verlag Berlin Heidelberg, 2005, https://www.amazon.com/ Digital-Image-Processing-AlgorithmsApplications/dp/3540592989
3. [3] R.C. Gonzales and R.E. Woods. Digital image processing. Prentice Hall, Upper Saddle River, NJ, 2nd ed.,2002. https://www.amazon.com/Digital-Image-ProcessingAlgorithms-Applications/dp
4. [4] Tsmots I., Riznyk O., Rabyk V., Kynash Y., Kustra N., Logoida M. (2020) Implementation of FPGA-Based Barker's-Like Codes. In: Lytvynenko V., Babichev S., Wójcik W., Vynokurova O., Vyshemyrskaya S., Radetskaya S. (eds) "Lecture Notes in Computational Intelligence and Decision Making". ISDMCI 2019. Advances in Intelligent Systems and Computing, vol 1020. Springer, Cham. doi: 10.1007/978-3-030-26474-1_15.
5. [5] Rafael C. Gonzalez, Richard E. Woods, "Digital Image Processing", published by Prentice Hall Upper Saddle River, New Jersey, 07456, http://sdeuoc.ac.in /sites/default /files/sde_videos.pdf