ALOTAIBI, M.; AL-HENDI, D.; ALROITHY, B.; ALGHAMDI, M.; GUTUB, A. Secure Mobile Computing Authentication Utilizing Hash, Cryptography and Steganography Combination. Journal of Information Security and Cybercrimes Research, v. 2, n. 1, p. 73-82, 1 Apr. 2019.