Return to Article Details Secure Mobile Computing Authentication Utilizing Hash, Cryptography and Steganography Combination Download Download PDF