Alotaibi, M., D. Al-hendi, B. Alroithy, M. AlGhamdi, and A. Gutub. “Secure Mobile Computing Authentication Utilizing Hash, Cryptography and Steganography Combination”. Journal of Information Security and Cybercrimes Research, vol. 2, no. 1, Apr. 2019, pp. 73-82, doi:10.26735/16587790.2019.001.