Alotaibi, Muneera, Daniah Al-hendi, Budoor Alroithy, Manal AlGhamdi, and Adnan Gutub. “Secure Mobile Computing Authentication Utilizing Hash, Cryptography and Steganography Combination”. Journal of Information Security and Cybercrimes Research 2, no. 1 (April 1, 2019): 73-82. Accessed December 23, 2024. https://journals.nauss.edu.sa/index.php/JISCR/article/view/861.