R. L. Van-renesse, Paper based document security - a review, European Conference on Security and Detection, ECOS97 Incorporating the One Day Symposium on Technology Used for Combatting Fraud, 1997.
DOI : 10.1049/cp:19970425

U. Garain and B. Halder, On Automatic Authenticity Verification of Printed Security Documents, 2008 Sixth Indian Conference on Computer Vision, Graphics & Image Processing, pp.706-713, 2008.
DOI : 10.1109/ICVGIP.2008.67

J. Z. Gao, L. Prakash, and R. Jagatesan, Understanding 2D-BarCode Technology and Applications in M-Commerce - Design and Implementation of A 2D Barcode Processing Solution, 31st Annual International Computer Software and Applications Conference, Vol. 2, (COMPSAC 2007), 2007.
DOI : 10.1109/COMPSAC.2007.229

M. Warasart and P. Kuacharoen, Paper-based Document Authentication using Digital Signature and QR Code, International Proceedings of Computer Science and Information Technology, vol.40, pp.94-98, 2012.

C. Rong, Coding principle and implementation of two-dimensional PDF417 bar code, 2011 6th IEEE Conference on Industrial Electronics and Applications, pp.466-468, 2011.
DOI : 10.1109/ICIEA.2011.5975630

H. Ke and G. Zhang, An algorithm correcting Flex distortion of Aztec code, 2010 2nd IEEE International Conference on Information Management and Engineering, pp.457-460, 2010.
DOI : 10.1109/ICIME.2010.5477746

L. Biao, A DataMatrix-based Mutant Code Design and Recognition Method Research, Fourth International Conference on Image and Graphics (ICIG 2007), pp.570-574, 2007.
DOI : 10.1109/ICIG.2007.172

P. Subpratatsavee and P. Kuacharoen, An Implementation of a High Capacity 2D Barcode, 5th International Conference on Advances in Information Technology, pp.159-169, 2012.
DOI : 10.1007/978-3-642-35076-4_15

S. Mamidi, Instruction Set Extensions for Reed-Solomon Encoding and Decoding, 2005 IEEE International Conference on Application-Specific Systems, Architecture Processors (ASAP'05), pp.364-369, 2005.
DOI : 10.1109/ASAP.2005.42

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.485.1945

M. R. Islam and S. A. Ahsan-rajon, An enhanced scheme for lossless compression of short text for resource constrained devices, 14th International Conference on Computer and Information Technology (ICCIT 2011), pp.292-297, 2011.
DOI : 10.1109/ICCITechn.2011.6164801

M. Singh and D. Garg, Choosing Best Hashing Strategies and Hash Functions, 2009 IEEE International Advance Computing Conference, pp.50-55, 2009.
DOI : 10.1109/IADCC.2009.4808979

P. Kuacharoen, Design and Analysis of Methods for Signing Electronic Documents Using Mobile Phones, International Conference on Computer Applications and Network Security, pp.154-158, 2011.