{"id":"https://openalex.org/W4415208327","doi":"https://doi.org/10.1007/s43926-025-00162-0","title":"A novel fiestal structured chromatic series-based data security approach","display_name":"A novel fiestal structured chromatic series-based data security approach","publication_year":2025,"publication_date":"2025-10-15","ids":{"openalex":"https://openalex.org/W4415208327","doi":"https://doi.org/10.1007/s43926-025-00162-0"},"language":"en","primary_location":{"id":"doi:10.1007/s43926-025-00162-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-025-00162-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s43926-025-00162-0.pdf","source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007/s43926-025-00162-0.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054140338","display_name":"Ch. Rupa","orcid":"https://orcid.org/0000-0002-7162-8909"},"institutions":[{"id":"https://openalex.org/I116891498","display_name":"Siddhartha Medical College","ror":"https://ror.org/058pt1w78","country_code":"IN","type":"education","lineage":["https://openalex.org/I116891498"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Rupa Ch","raw_affiliation_strings":["Department of CSE, Siddhartha Academy of Higher Education Deemed to be University, Formerly VR Siddhartha Engineering College (A), Vijayawada, Andhra Pradesh, 520007, India"],"affiliations":[{"raw_affiliation_string":"Department of CSE, Siddhartha Academy of Higher Education Deemed to be University, Formerly VR Siddhartha Engineering College (A), Vijayawada, Andhra Pradesh, 520007, India","institution_ids":["https://openalex.org/I116891498"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120008604","display_name":"Jasmine Shaik","orcid":null},"institutions":[{"id":"https://openalex.org/I116891498","display_name":"Siddhartha Medical College","ror":"https://ror.org/058pt1w78","country_code":"IN","type":"education","lineage":["https://openalex.org/I116891498"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Jasmine Shaik","raw_affiliation_strings":["Department of CSE, Siddhartha Academy of Higher Education Deemed to be University, Formerly VR Siddhartha Engineering College (A), Vijayawada, Andhra Pradesh, 520007, India"],"affiliations":[{"raw_affiliation_string":"Department of CSE, Siddhartha Academy of Higher Education Deemed to be University, Formerly VR Siddhartha Engineering College (A), Vijayawada, Andhra Pradesh, 520007, India","institution_ids":["https://openalex.org/I116891498"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093893960","display_name":"R. Srikavya","orcid":null},"institutions":[{"id":"https://openalex.org/I116891498","display_name":"Siddhartha Medical College","ror":"https://ror.org/058pt1w78","country_code":"IN","type":"education","lineage":["https://openalex.org/I116891498"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Rayala Srikavya","raw_affiliation_strings":["Department of CSE, Siddhartha Academy of Higher Education Deemed to be University, Formerly VR Siddhartha Engineering College (A), Vijayawada, Andhra Pradesh, 520007, India"],"affiliations":[{"raw_affiliation_string":"Department of CSE, Siddhartha Academy of Higher Education Deemed to be University, Formerly VR Siddhartha Engineering College (A), Vijayawada, Andhra Pradesh, 520007, India","institution_ids":["https://openalex.org/I116891498"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120008605","display_name":"Monalisa Sahu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210131147","display_name":"SRM University","ror":"https://ror.org/037skf023","country_code":"IN","type":"education","lineage":["https://openalex.org/I145286018","https://openalex.org/I4210131147"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Monalisa Sahu","raw_affiliation_strings":["School of Computer Science & Engineering (SCOPE), VIT-AP University, Amaravati, Andhra Pradesh, 522237, India"],"affiliations":[{"raw_affiliation_string":"School of Computer Science & Engineering (SCOPE), VIT-AP University, Amaravati, Andhra Pradesh, 522237, India","institution_ids":["https://openalex.org/I4210131147"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054697970","display_name":"Ad\u0131tya Kumar Sahu","orcid":"https://orcid.org/0000-0003-4257-0688"},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Aditya Kumar Sahu","raw_affiliation_strings":["Amrita School of Computing, Amrita Vishwa Vidyapeetham, Amaravati, 522503, India"],"affiliations":[{"raw_affiliation_string":"Amrita School of Computing, Amrita Vishwa Vidyapeetham, Amaravati, 522503, India","institution_ids":["https://openalex.org/I81556334"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5054140338","https://openalex.org/A5054697970","https://openalex.org/A5120008605"],"corresponding_institution_ids":["https://openalex.org/I116891498","https://openalex.org/I4210131147","https://openalex.org/I81556334"],"apc_list":{"value":990,"currency":"EUR","value_usd":1067},"apc_paid":{"value":990,"currency":"EUR","value_usd":1067},"fwci":3.99,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.94483367,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"5","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13918","display_name":"Advanced Data and IoT Technologies","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7957000136375427},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.4472000002861023},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.4230000078678131},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.421099990606308},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4104999899864197},{"id":"https://openalex.org/keywords/bitwise-operation","display_name":"Bitwise operation","score":0.40049999952316284},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.3919000029563904},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.36559998989105225},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.3587999939918518}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7957000136375427},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7390999794006348},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.4472000002861023},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.444599986076355},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.4230000078678131},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.421099990606308},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4104999899864197},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.40299999713897705},{"id":"https://openalex.org/C134765980","wikidata":"https://www.wikidata.org/wiki/Q879126","display_name":"Bitwise operation","level":2,"score":0.40049999952316284},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3919000029563904},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.36559998989105225},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3653999865055084},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.3587999939918518},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.35760000348091125},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3463999927043915},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.34389999508857727},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.3230000138282776},{"id":"https://openalex.org/C46905813","wikidata":"https://www.wikidata.org/wiki/Q4640678","display_name":"56-bit encryption","level":4,"score":0.3109999895095825},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.3095000088214874},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.3050999939441681},{"id":"https://openalex.org/C122760801","wikidata":"https://www.wikidata.org/wiki/Q2552011","display_name":"Watermarking attack","level":5,"score":0.3018999993801117},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.2985000014305115},{"id":"https://openalex.org/C198082294","wikidata":"https://www.wikidata.org/wiki/Q3399648","display_name":"Position (finance)","level":2,"score":0.28360000252723694},{"id":"https://openalex.org/C207468940","wikidata":"https://www.wikidata.org/wiki/Q869370","display_name":"Brute-force attack","level":3,"score":0.2831999957561493},{"id":"https://openalex.org/C196832560","wikidata":"https://www.wikidata.org/wiki/Q8815","display_name":"ASCII","level":2,"score":0.27869999408721924},{"id":"https://openalex.org/C9368797","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"Disk encryption","level":4,"score":0.27379998564720154},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.2712000012397766},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.26969999074935913},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.25999999046325684},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.2596000134944916}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s43926-025-00162-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-025-00162-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s43926-025-00162-0.pdf","source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:e4d7b80de7e8473a9e2b722cfa524f83","is_oa":true,"landing_page_url":"https://doaj.org/article/e4d7b80de7e8473a9e2b722cfa524f83","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Discover Internet of Things, Vol 5, Iss 1, Pp 1-20 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s43926-025-00162-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-025-00162-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s43926-025-00162-0.pdf","source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320311327","display_name":"Amrita Vishwa Vidyapeetham University","ror":"https://ror.org/03am10p12"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4415208327.pdf","grobid_xml":"https://content.openalex.org/works/W4415208327.grobid-xml"},"referenced_works_count":35,"referenced_works":["https://openalex.org/W2783314664","https://openalex.org/W3004307973","https://openalex.org/W3012254913","https://openalex.org/W3029897761","https://openalex.org/W3047808990","https://openalex.org/W3091074232","https://openalex.org/W3119460354","https://openalex.org/W3130714454","https://openalex.org/W3133565686","https://openalex.org/W3154781724","https://openalex.org/W3164753704","https://openalex.org/W3166494441","https://openalex.org/W3181264283","https://openalex.org/W3193654764","https://openalex.org/W3198242274","https://openalex.org/W3214974927","https://openalex.org/W4210663935","https://openalex.org/W4214829631","https://openalex.org/W4225377307","https://openalex.org/W4281784038","https://openalex.org/W4285216117","https://openalex.org/W4285274133","https://openalex.org/W4288391520","https://openalex.org/W4294982477","https://openalex.org/W4300843184","https://openalex.org/W4313141281","https://openalex.org/W4319068553","https://openalex.org/W4360985276","https://openalex.org/W4382052636","https://openalex.org/W4383503870","https://openalex.org/W4385250130","https://openalex.org/W4391670844","https://openalex.org/W4392153486","https://openalex.org/W4399563430","https://openalex.org/W4401323051"],"related_works":[],"abstract_inverted_index":{"In":[0],"an":[1],"era":[2],"of":[3,110,129,153,184],"growing":[4,11],"cybersecurity":[5],"threats,":[6],"as":[7,194],"evidenced":[8],"by":[9,46],"the":[10,42,57,122,161,165,191,210],"reliance":[12],"on":[13,227],"medical":[14,49,186,207],"data,":[15,134,139],"it":[16],"is":[17],"necessary":[18],"to":[19,24,40,81,86,93],"develop":[20],"strong":[21],"encryption":[22,32,63,111,127,202],"algorithms":[23,33],"protect":[25],"sensitive":[26,185,206],"data":[27,50],"against":[28,51,170],"intruders.":[29],"Though":[30],"existing":[31],"offer":[34],"some":[35],"security,":[36,56],"they":[37],"often":[38],"fail":[39],"address":[41],"unique":[43],"challenges":[44,203],"posed":[45],"safeguarding":[47],"multimedia":[48],"sophisticated":[52],"attacks.":[53],"To":[54],"enhance":[55],"proposed":[58,166,192],"system":[59,147,211],"employs":[60],"a":[61,67,76,149,195,213,229],"distinctive":[62],"algorithm":[64,100,167],"that":[65],"integrates":[66],"color-based":[68],"approach":[69],"with":[70,75,125],"mathematical":[71],"transformations.":[72],"It":[73],"begins":[74],"randomly":[77,214,231],"generated":[78,215,232],"color":[79],"grid":[80],"map":[82],"plain":[83],"text":[84,133],"characters":[85],"hexadecimal":[87],"values,":[88],"which":[89],"are":[90],"then":[91],"converted":[92],"ASCII":[94],"and":[95,116,140,177,197,237],"processed":[96],"bit":[97],"wise.":[98],"The":[99,146],"strengthens":[101],"security":[102],"further":[103],"through":[104],"block-level":[105],"encryption,":[106],"utilizing":[107],"multiple":[108],"rounds":[109],"logic,":[112],"including":[113],"XOR":[114],"operations":[115],"circular":[117],"shifts.":[118],"Experimental":[119],"validation":[120],"demonstrates":[121,168],"method\u2019s":[123],"effectiveness,":[124],"average":[126],"times":[128],"0.18":[130],"s":[131,136,142],"for":[132,137,143,200,234],"111.03":[135],"image":[138],"1520.47":[141],"video":[144],"data.":[145,163,187,208],"achieves":[148],"decryption":[150],"error":[151],"rate":[152],"2\u20135%,":[154],"underscoring":[155],"its":[156],"high":[157],"reliability":[158],"in":[159,204],"reconstructing":[160],"original":[162],"Furthermore,":[164],"resistance":[169],"known":[171],"plaintext,":[172],"chosen":[173],"ciphertext,":[174],"brute":[175],"force,":[176],"differential":[178],"cryptanalysis":[179],"attacks,":[180],"ensuring":[181],"robust":[182,196],"protection":[183],"These":[188],"results":[189],"position":[190],"method":[193],"promising":[198],"solution":[199],"addressing":[201],"securing":[205],"Currently,":[209],"uses":[212],"10":[216,218],"$$\\times$$":[217],"fixed-length":[219],"secret":[220],"key;":[221],"however,":[222],"future":[223],"work":[224],"will":[225],"focus":[226],"implementing":[228],"variable-length":[230],"key":[233],"increased":[235],"flexibility":[236],"security.":[238]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-16T00:00:00"}
