Alotaibi, M., Al-hendi, D., Alroithy, B., AlGhamdi, M., & Gutub, A. (2019). Secure Mobile Computing Authentication Utilizing Hash, Cryptography and Steganography Combination. Journal of Information Security and Cybercrimes Research, 2(1), 73-82. https://doi.org/10.26735/16587790.2019.001