Technology Reports of Kansai University (ISSN: 04532198) is a monthly peer-reviewed and open-access international Journal. It was first built in 1959 and officially in 1975 till now by kansai university, japan. The journal covers all sort of engineering topic, mathematics and physics. Technology Reports of Kansai University (TRKU) was closed access journal until 2017. After that TRKU became open access journal. TRKU is a scopus indexed journal and directly run by faculty of engineering, kansai university.
Technology Reports of Kansai University (ISSN: 04532198) is a peer-reviewed journal. The journal covers all sort of engineering topic as well as mathematics and physics. the journal's scopes are
in the following fields but not limited to:
Zhonghua er bi yan hou tou jing wai ke za zhi = Chinese journal of otorhinolaryngology head and neck surgery
Interventional Pulmonology
Interventional Pulmonology (middletown, de.)
Evolution in the concealment of data was reflected in the medical field specifically on medical images and becoming more challenging and an enthusiastic area of research since the last decades over the dispersed IoTs. Hide information technology in the image is called steganography. The objective of this study is the preservation of privacy and confidentiality of data in uncertain surroundings during multimedia exchange joining two IoT hops. For attacker hindrance and, provision of data confidentiality, a resilient multilevel security perspective depending on information hiding and cryptography is suggested. The existing schemes have limitations related to the equilibrium trade-off amid two variables (medical image quality and security). In addition, the direct embedment of the secret data into the images and further subtraction of encrypted data from it often enables the intruders to easily detect and extract the hidden information. Based on these factors, we proposed multilevel security based on three random iterations with chosen a procedure that was implemented using Henon function to stop against cybercrimes challenges. Satisfying results, gained when benchmarking our results with the existing methods in literature through the same criteria
Prevalent years have witnessed the rise in a plethora of data security issues that run across the board from copyright to content security issues due to the multitudinous transmission and sharing of multimedia activities across communications conduit that utilizes the network, which is not secure. Consequently, the requirement for the latest security techniques in data hiding such as steganography is now imperative and indispensable. Thus, steganography entails the skill and science of concealment of existing confidential information by concurrently making the communications imperceptible through the utilisation of diverse media carriers such as Image, Text, Audio, Video, Protocol and DNA. Amongst the varying kinds of media utilised, the findings of this study show the high demand and proliferation of digitalized images, thus the emphasis of our study is pertaining to the implementation of digital image steganography (IS). The major problem in the construction of a steganography system is the maintenance of a compromise between robustness, security, imperceptibility and a greater rate of bit embedding. This study offers a comprehensive summary of current IS forms, alongside the latest endowments of individual classification in a wide range of aspects and modes of operations. Additionally, this study offers a comprehensive summary of IS inclusive of customary operation, necessities, varying aspects, diverse forms and their performance assessments, protocols, and types of attacks. Diverse performance analysis measures for the evaluation of steganography systems are also deliberated here