The first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...