[1]
M. Alotaibi, D. Al-hendi, B. Alroithy, M. AlGhamdi, and A. Gutub, “Secure Mobile Computing Authentication Utilizing Hash, Cryptography and Steganography Combination”, JISCR, vol. 2, no. 1, pp. 73-82, Apr. 2019.