{"id":"https://openalex.org/W4378363982","doi":"https://doi.org/10.3233/jifs-223329","title":"Lightweight Encryption Assisted Man-in-The-Middle Attack-Resilient Steganography Model for Secure Satellite Imagery Services: LEMARS","display_name":"Lightweight Encryption Assisted Man-in-The-Middle Attack-Resilient Steganography Model for Secure Satellite Imagery Services: LEMARS","publication_year":2023,"publication_date":"2023-05-26","ids":{"openalex":"https://openalex.org/W4378363982","doi":"https://doi.org/10.3233/jifs-223329"},"language":"en","primary_location":{"id":"doi:10.3233/jifs-223329","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-223329","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032454985","display_name":"Divya Madhu","orcid":"https://orcid.org/0000-0002-3116-9293"},"institutions":[{"id":"https://openalex.org/I24676775","display_name":"Indian Institute of Technology Madras","ror":"https://ror.org/03v0r5n49","country_code":"IN","type":"facility","lineage":["https://openalex.org/I24676775"]},{"id":"https://openalex.org/I33585257","display_name":"Anna University, Chennai","ror":"https://ror.org/01qhf1r47","country_code":"IN","type":"education","lineage":["https://openalex.org/I33585257"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"D. Madhu","raw_affiliation_strings":["Department of Electronics Engineering, Madras Institute of Technology, Anna University, Chennai, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics Engineering, Madras Institute of Technology, Anna University, Chennai, India","institution_ids":["https://openalex.org/I24676775","https://openalex.org/I33585257"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113910059","display_name":"S. Vasuhi","orcid":null},"institutions":[{"id":"https://openalex.org/I33585257","display_name":"Anna University, Chennai","ror":"https://ror.org/01qhf1r47","country_code":"IN","type":"education","lineage":["https://openalex.org/I33585257"]},{"id":"https://openalex.org/I24676775","display_name":"Indian Institute of Technology Madras","ror":"https://ror.org/03v0r5n49","country_code":"IN","type":"facility","lineage":["https://openalex.org/I24676775"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"S. Vasuhi","raw_affiliation_strings":["Department of Electronics Engineering, Madras Institute of Technology, Anna University, Chennai, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics Engineering, Madras Institute of Technology, Anna University, Chennai, India","institution_ids":["https://openalex.org/I24676775","https://openalex.org/I33585257"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5032454985"],"corresponding_institution_ids":["https://openalex.org/I24676775","https://openalex.org/I33585257"],"apc_list":null,"apc_paid":null,"fwci":0.8643,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.74913506,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":"45","issue":"2","first_page":"2847","last_page":"2869"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.758065402507782},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.6543582677841187},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5810189247131348},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.4755760729312897},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.42386624217033386},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.389191210269928},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3702709972858429},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.36714309453964233},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3396509289741516},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3328680098056793},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.32188284397125244},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2410409152507782},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.16086798906326294}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.758065402507782},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.6543582677841187},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5810189247131348},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.4755760729312897},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.42386624217033386},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.389191210269928},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3702709972858429},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.36714309453964233},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3396509289741516},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3328680098056793},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32188284397125244},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2410409152507782},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.16086798906326294},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jifs-223329","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-223329","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.5600000023841858,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W839645149","https://openalex.org/W2044370093","https://openalex.org/W2049558423","https://openalex.org/W2054621758","https://openalex.org/W2062086221","https://openalex.org/W2063505908","https://openalex.org/W2077267230","https://openalex.org/W2079174845","https://openalex.org/W2084782561","https://openalex.org/W2126690486","https://openalex.org/W2146621575","https://openalex.org/W2163340517","https://openalex.org/W2296056180","https://openalex.org/W2318956958","https://openalex.org/W2331652859","https://openalex.org/W2334963019","https://openalex.org/W2470008273","https://openalex.org/W2743829628","https://openalex.org/W2750204211","https://openalex.org/W2780576747","https://openalex.org/W2786395579","https://openalex.org/W2790867243","https://openalex.org/W2806609611","https://openalex.org/W2891509604","https://openalex.org/W2904288768","https://openalex.org/W2945150665","https://openalex.org/W2972450862","https://openalex.org/W3003971281","https://openalex.org/W3004257937","https://openalex.org/W3009719459","https://openalex.org/W3044391109","https://openalex.org/W3046088399","https://openalex.org/W3048532210","https://openalex.org/W3091624343","https://openalex.org/W3122006019","https://openalex.org/W3122279026","https://openalex.org/W3133565686","https://openalex.org/W3152600402","https://openalex.org/W3156484751","https://openalex.org/W3167293954","https://openalex.org/W3194995836","https://openalex.org/W4210663935","https://openalex.org/W4229366876","https://openalex.org/W4315628355","https://openalex.org/W6697014570"],"related_works":["https://openalex.org/W2521839693","https://openalex.org/W2969135852","https://openalex.org/W2188948172","https://openalex.org/W38533693","https://openalex.org/W2892069487","https://openalex.org/W2741842698","https://openalex.org/W1760333999","https://openalex.org/W2265739152","https://openalex.org/W2094307307","https://openalex.org/W2153696906"],"abstract_inverted_index":{"The":[0,62,83,112,127,204,225],"role":[1],"of":[2,85,115,129,161,167,173,178,238],"communication":[3],"technologies":[4,31],"has":[5,131],"become":[6],"increasingly":[7],"vital":[8],"in":[9,27,32,103],"various":[10],"fields":[11],"such":[12],"as":[13,44],"industrial":[14],"communication,":[15,22],"surveillance":[16],"and":[17,20,47,68,79,89,93,106,118,149,151,180,200,210,256,274,285],"monitoring,":[18],"healthcare,":[19],"data":[21,246,269],"leading":[23],"to":[24,71,207,213,277],"a":[25,45,158,175],"surge":[26],"demand":[28],"for":[29,57,98,123,220,243,267],"these":[30],"recent":[33],"years.":[34],"In":[35,258],"this":[36],"research":[37,205],"paper,":[38],"the":[39,190,236,239,260],"LEMARS":[40,130,156,227,241,261],"model":[41,56,192,228,242,262],"is":[42],"proposed":[43,63,191,226,240],"novel":[46],"robust":[48],"lightweight":[49,66,272],"encryption":[50,67,92,209,273],"assisted":[51],"Man-in-The-Middle":[52],"(MITM)":[53],"attack-resilient":[54,69,121,275],"steganography":[55,122],"secure":[58,124,221],"satellite":[59,125,222,252],"imagery":[60,223,253],"services.":[61,224],"solution":[64,219,266],"combines":[65],"embedding":[70,211,218,276],"achieve":[72,214,278],"higher":[73,104,194,279],"attack-resilience":[74,108,195,280],"with":[75,196,281],"low":[76,197,282],"computational":[77,198,283],"cost":[78,199,284],"optimal":[80,201,265,286],"reconstruction":[81,202,287],"quality.":[82,203,288],"use":[84],"Feistel":[86],"architecture-driven":[87],"substitution":[88],"permutation-based":[90],"block-cipher":[91],"heuristic-driven":[94],"pixel":[95],"adjustment":[96],"method":[97],"MITM-Adaptive":[99],"B-Channel":[100],"Embedding":[101],"results":[102,187],"imperceptibility":[105],"superior":[107],"under":[109],"uncertain":[110],"channels.":[111],"strategic":[113],"amalgamation":[114],"FSPN-BCE,":[116],"L2D-IWT,":[117],"HD-OMABE":[119],"enabled":[120],"communication.":[126],"performance":[128],"been":[132],"evaluated":[133],"using":[134],"Peak":[135],"Signal-to-Noise":[136],"Ratio":[137],"(PSNR),":[138],"entropy,":[139],"Non-Parametric":[140],"Change":[141,146],"Rate":[142],"(NPCR),":[143],"Unified":[144],"Average":[145],"Intensity":[147],"(UACI),":[148],"regular":[150],"singular":[152],"block":[153,183],"pattern":[154,184],"changes.":[155,185],"achieved":[157,193],"PSNR":[159],"value":[160,166,172,177],"58.02":[162],"dB,":[163,169],"an":[164,170,215,264],"entropy":[165],"6.15":[168],"NPCR":[171],"99.84%,":[174],"UACI":[176],"33.70,":[179],"exhibited":[181,229],"minimal":[182],"These":[186],"indicate":[188],"that":[189],"aimed":[206],"improve":[208],"methods":[212],"MITM-attack":[216],"resilient":[217],"superiority":[230],"over":[231],"other":[232],"state-of-the-art":[233],"methods,":[234],"affirming":[235],"robustness":[237],"real-time":[244],"multimedia":[245,268],"security":[247],"purposes,":[248],"including":[249],"remote":[250],"sensing,":[251],"services,":[254],"telemedicine,":[255],"EHR.":[257],"conclusion,":[259],"offers":[263],"security,":[270],"combining":[271]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
