Steganographic access control in data hiding using run‐length encoding and modulo‐operations. Issue 2 (16th June 2011)