Secrecy Covertness and Authentication in Wireless Communications