{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T02:23:06Z","timestamp":1772936586313,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00162-0","type":"journal-article","created":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T09:53:34Z","timestamp":1760522014000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A novel fiestal structured chromatic series-based data security approach"],"prefix":"10.1007","volume":"5","author":[{"given":"Rupa","family":"Ch","sequence":"first","affiliation":[]},{"given":"Jasmine","family":"Shaik","sequence":"additional","affiliation":[]},{"given":"Rayala","family":"Srikavya","sequence":"additional","affiliation":[]},{"given":"Monalisa","family":"Sahu","sequence":"additional","affiliation":[]},{"given":"Aditya Kumar","family":"Sahu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,15]]},"reference":[{"key":"162_CR1","doi-asserted-by":"publisher","first-page":"3759","DOI":"10.1007\/s40747-022-00756-z","volume":"9","author":"K Munjal","year":"2023","unstructured":"Munjal K, Bhatia R. A systematic review of homomorphic encryption and its contributions in healthcare industry. Compl Intell Syst. 2023;9:3759\u201386. https:\/\/doi.org\/10.1007\/s40747-022-00756-z.","journal-title":"Compl Intell Syst"},{"key":"162_CR2","doi-asserted-by":"publisher","first-page":"68057","DOI":"10.1109\/ACCESS.2022.3181424","volume":"10","author":"A Sambas","year":"2022","unstructured":"Sambas A. A novel 3d chaotic system with line equilibrium: multistability, integral sliding mode control, electronic circuit, fpga implementation and its image encryption. IEEE Access. 2022;10:68057\u201374. https:\/\/doi.org\/10.1109\/ACCESS.2022.3181424.","journal-title":"IEEE Access"},{"key":"162_CR3","doi-asserted-by":"publisher","unstructured":"Jasmine S, Ch R, Srikavya R. A novel chromatic series based light weight cryptocipher with cryptanalysis. 2024 third international conference on distributed computing and electrical circuits and electronics (ICDCECE), 2024;01\u201306 https:\/\/doi.org\/10.1109\/ICDCECE60827.2024.10549622.","DOI":"10.1109\/ICDCECE60827.2024.10549622"},{"key":"162_CR4","doi-asserted-by":"publisher","first-page":"118253","DOI":"10.1109\/ACCESS.2021.3106028","volume":"9","author":"N Iqbal","year":"2021","unstructured":"Iqbal N. On the image encryption algorithm based on the chaotic system, dna encoding, and castle. IEEE Access. 2021;9:118253\u201370. https:\/\/doi.org\/10.1109\/ACCESS.2021.3106028.","journal-title":"IEEE Access"},{"key":"162_CR5","doi-asserted-by":"publisher","first-page":"11541","DOI":"10.1109\/ACCESS.2023.3242311","volume":"11","author":"W Alexan","year":"2023","unstructured":"Alexan W, Elkandoz M, Mashaly M, Azab E, Aboshousha A. Color image encryption through chaos and kaa map. IEEE Access. 2023;11:11541\u201354. https:\/\/doi.org\/10.1109\/ACCESS.2023.3242311.","journal-title":"IEEE Access"},{"issue":"2","key":"162_CR6","doi-asserted-by":"publisher","first-page":"2089","DOI":"10.1109\/TII.2022.3194590","volume":"19","author":"Y Wu","year":"2023","unstructured":"Wu Y, Zhang L, Berretti S, Wan S. Medical image encryption by content-aware dna computing for secure healthcare. IEEE Trans Industr Inf. 2023;19(2):2089\u201398. https:\/\/doi.org\/10.1109\/TII.2022.3194590.","journal-title":"IEEE Trans Industr Inf"},{"issue":"2","key":"162_CR7","doi-asserted-by":"publisher","first-page":"2382","DOI":"10.1109\/JIOT.2023.3293165","volume":"11","author":"J Huang","year":"2024","unstructured":"Huang J, Cui Q, Zhou Z, Yu K, Yang C-N, Choo K-KR. Encrypted domain secret medical-image sharing with secure outsourcing computation in iot environment. IEEE Internet Things J. 2024;11(2):2382\u201393. https:\/\/doi.org\/10.1109\/JIOT.2023.3293165.","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"162_CR8","doi-asserted-by":"publisher","first-page":"4468","DOI":"10.1109\/TNSE.2022.3204991","volume":"9","author":"J Oh","year":"2022","unstructured":"Oh J, Lee J, Kim M, Park Y, Park K, Noh S. A secure data sharing based on key aggregate searchable encryption in fog-enabled iot environment. IEEE Trans Netw Sci Eng. 2022;9(6):4468\u201381. https:\/\/doi.org\/10.1109\/TNSE.2022.3204991.","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"10","key":"162_CR9","doi-asserted-by":"publisher","first-page":"4103","DOI":"10.1109\/TCSI.2023.3296693","volume":"70","author":"S-Y Li","year":"2023","unstructured":"Li S-Y, Gai Y, Shih K-C, Chen C-S. An efficient image encryption algorithm based on innovative des structure and hyperchaotic keys. IEEE Trans Circuits Syst I Regul Pap. 2023;70(10):4103\u201311. https:\/\/doi.org\/10.1109\/TCSI.2023.3296693.","journal-title":"IEEE Trans Circuits Syst I Regul Pap"},{"key":"162_CR10","doi-asserted-by":"publisher","first-page":"69388","DOI":"10.1109\/ACCESS.2022.3187317","volume":"10","author":"M Abu-Faraj","year":"2022","unstructured":"Abu-Faraj M, Al-Hyari A, Aldebei K, Alqadi ZA, Al-Ahmad B. Rotation left digits to enhance the security level of message blocks cryptography. IEEE Access. 2022;10:69388\u201397. https:\/\/doi.org\/10.1109\/ACCESS.2022.3187317.","journal-title":"IEEE Access"},{"key":"162_CR11","doi-asserted-by":"publisher","first-page":"12966","DOI":"10.1109\/ACCESS.2022.3146792","volume":"10","author":"J Arif","year":"2022","unstructured":"Arif J. A novel chaotic permutation-substitution image encryption scheme based on logistic map and random substitution. IEEE Access. 2022;10:12966\u201382. https:\/\/doi.org\/10.1109\/ACCESS.2022.3146792.","journal-title":"IEEE Access"},{"key":"162_CR12","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-023-00425-7","author":"C Rupa","year":"2023","unstructured":"Rupa C, Greeshmanth Shah MA. Novel secure data protection scheme using martino homomorphic encryption. J Cloud Comput. 2023. https:\/\/doi.org\/10.1186\/s13677-023-00425-7.","journal-title":"J Cloud Comput"},{"issue":"12","key":"162_CR13","doi-asserted-by":"publisher","first-page":"8839","DOI":"10.1109\/TII.2022.3155599","volume":"18","author":"H Lin","year":"2022","unstructured":"Lin H, Wang C, Cui L, Sun Y, Xu C, Yu F. Brain-like initial-boosted hyperchaos and application in biomedical image encryption. IEEE Trans Industr Inf. 2022;18(12):8839\u201350. https:\/\/doi.org\/10.1109\/TII.2022.3155599.","journal-title":"IEEE Trans Industr Inf"},{"key":"162_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-020-0115-9","volume":"16","author":"J Feng","year":"2022","unstructured":"Feng J, Li L. Scenery: a lightweight block cipher based on feistel structure. Front Comput Sci. 2022;16: 163813. https:\/\/doi.org\/10.1007\/s11704-020-0115-9.","journal-title":"Front Comput Sci"},{"issue":"3","key":"162_CR15","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.1109\/JBHI.2022.3178629","volume":"27","author":"C Rupa","year":"2023","unstructured":"Rupa C, Harshitha M, Srivastava G, Gadekallu TR, Maddikunta PKR. Securing multimedia using a deep learning based chaotic logistic map. IEEE J Biomed Health Inform. 2023;27(3):1154\u201362. https:\/\/doi.org\/10.1109\/JBHI.2022.3178629.","journal-title":"IEEE J Biomed Health Inform"},{"issue":"2","key":"162_CR16","doi-asserted-by":"publisher","first-page":"845","DOI":"10.1109\/TNSE.2022.3223930","volume":"10","author":"F Yu","year":"2023","unstructured":"Yu F, Shen H, Yu Q, Kong X, Sharma PK, Cai S. Privacy protection of medical data based on multi-scroll memristive hopfield neural network. IEEE Trans Netw Sci Eng. 2023;10(2):845\u201358. https:\/\/doi.org\/10.1109\/TNSE.2022.3223930.","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"162_CR17","doi-asserted-by":"publisher","first-page":"47731","DOI":"10.1109\/ACCESS.2021.3061710","volume":"9","author":"MK Hasan","year":"2021","unstructured":"Hasan MK. Lightweight encryption technique to enhance medical image security on internet of medical things applications. IEEE Access. 2021;9:47731\u201342. https:\/\/doi.org\/10.1109\/ACCESS.2021.3061710.","journal-title":"IEEE Access"},{"issue":"12","key":"162_CR18","doi-asserted-by":"publisher","first-page":"1877","DOI":"10.1109\/JAS.2021.1004003","volume":"8","author":"BB Mamta Gupta","year":"2021","unstructured":"Mamta Gupta BB, Li K-C, Leung VCM, Psannis KE, Yamaguchi S. Blockchain-assisted secure fine-grained searchable encryption for a cloud-based healthcare cyber-physical system. IEEE\/CAA J Autom Sinica. 2021;8(12):1877\u201390. https:\/\/doi.org\/10.1109\/JAS.2021.1004003.","journal-title":"IEEE\/CAA J Autom Sinica"},{"key":"162_CR19","doi-asserted-by":"publisher","first-page":"77675","DOI":"10.1109\/ACCESS.2021.3082940","volume":"9","author":"W El-Shafai","year":"2021","unstructured":"El-Shafai W, Mohamed FAHE, Elkamchouchi HMA, Abd-Elnaby M, Elshafee A. Efficient and secure cancelable biometric authentication framework based on genetic encryption algorithm. IEEE Access. 2021;9:77675\u201392. https:\/\/doi.org\/10.1109\/ACCESS.2021.3082940.","journal-title":"IEEE Access"},{"key":"162_CR20","doi-asserted-by":"publisher","first-page":"8820","DOI":"10.1109\/ACCESS.2021.3049564","volume":"9","author":"M Shabbir","year":"2021","unstructured":"Shabbir M. Enhancing security of health information using modular encryption standard in mobile cloud computing. IEEE Access. 2021;9:8820\u201334. https:\/\/doi.org\/10.1109\/ACCESS.2021.3049564.","journal-title":"IEEE Access"},{"issue":"1","key":"162_CR21","doi-asserted-by":"publisher","DOI":"10.1063\/5.0217284","volume":"3075","author":"GD Sree","year":"2024","unstructured":"Sree GD, Rupa C, Gayathri UML. A novel substantial cipher against passive attacks using fuzzy logic based approach. AIP Conf Proc. 2024;3075(1): 020203. https:\/\/doi.org\/10.1063\/5.0217284.","journal-title":"AIP Conf Proc"},{"key":"162_CR22","doi-asserted-by":"publisher","unstructured":"Sultana SA, Ch R, Malleswari RP. Keyless lightweight encipher using homomorphic and binomial coefficients for smart computing applications. In: 2nd International conference on vision towards emerging trends in communication and networking technologies (ViTECoN), 2023;1\u20136 https:\/\/doi.org\/10.1109\/ViTECoN58111.2023.10157660","DOI":"10.1109\/ViTECoN58111.2023.10157660"},{"issue":"1","key":"162_CR23","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1109\/TGCN.2021.3095707","volume":"6","author":"Z Gu","year":"2022","unstructured":"Gu Z. Iepsbp: a cost-efficient image encryption algorithm based on parallel chaotic system for green iot. IEEE Trans Green Commun Netw. 2022;6(1):89\u2013106. https:\/\/doi.org\/10.1109\/TGCN.2021.3095707.","journal-title":"IEEE Trans Green Commun Netw"},{"issue":"4","key":"162_CR24","doi-asserted-by":"publisher","first-page":"2789","DOI":"10.1109\/TDSC.2021.3074146","volume":"19","author":"Y Zhang","year":"2022","unstructured":"Zhang Y, Xu C, Cheng N, Shen X. Secure password-protected encryption key for deduplicated cloud storage systems. IEEE Trans Dependable Secure Comput. 2022;19(4):2789\u2013806. https:\/\/doi.org\/10.1109\/TDSC.2021.3074146.","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"162_CR25","doi-asserted-by":"publisher","first-page":"37855","DOI":"10.1109\/ACCESS.2021.3063237","volume":"9","author":"ST Kamal","year":"2021","unstructured":"Kamal ST, Hosny KM, Elgindy TM, Darwish MM, Fouda MM. A new image encryption algorithm for grey and color medical images. IEEE Access. 2021;9:37855\u201365. https:\/\/doi.org\/10.1109\/ACCESS.2021.3063237.","journal-title":"IEEE Access"},{"key":"162_CR26","doi-asserted-by":"publisher","unstructured":"M, H, Rupa C, Sai KP, Pravallika A, Sowmya VK. Secure medical multimedia data using symmetric cipher based chaotic logistic mapping. In: 2021 international conference on system, computation, automation and networking (ICSCAN), 2021;1\u20136. https:\/\/doi.org\/10.1109\/ICSCAN53069.2021.9526406.","DOI":"10.1109\/ICSCAN53069.2021.9526406"},{"key":"162_CR27","doi-asserted-by":"publisher","first-page":"52018","DOI":"10.1109\/ACCESS.2020.2980739","volume":"8","author":"MA Khan","year":"2020","unstructured":"Khan MA, Quasim MT, Alghamdi NS, Khan MY. A secure framework for authentication and encryption using improved ecc for iot-based medical sensor data. IEEE Access. 2020;8:52018\u201327. https:\/\/doi.org\/10.1109\/ACCESS.2020.2980739.","journal-title":"IEEE Access"},{"key":"162_CR28","doi-asserted-by":"publisher","unstructured":"Bhaskar CU, Rupa C. An advanced symmetric block cipher based on chaotic systems. In: 2017 innovations in power and advanced computing technologies (i-PACT), 2017;1\u20134 https:\/\/doi.org\/10.1109\/IPACT.2017.8244891.","DOI":"10.1109\/IPACT.2017.8244891"},{"key":"162_CR29","doi-asserted-by":"publisher","unstructured":"Rupa C. Meaningful cipher data generation: novel encipher using fuzzy logic for reducing cyber data attacks. In: 2023 innovations in power and advanced computing technologies (i-PACT), 2023;1\u20136 https:\/\/doi.org\/10.1109\/i-PACT58649.2023.10434566.","DOI":"10.1109\/i-PACT58649.2023.10434566"},{"key":"162_CR30","doi-asserted-by":"publisher","unstructured":"Dharmika B, Rupa CH, Haritha D, Vineetha Y. Privacy preservation of medical health records using symmetric block cipher and frequency domain watermarking techniques. In: 2022 international conference on inventive computation technologies (ICICT), 2022;96\u2013103. https:\/\/doi.org\/10.1109\/ICICT54344.2022.9850736.","DOI":"10.1109\/ICICT54344.2022.9850736"},{"issue":"1","key":"162_CR31","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1109\/TNSM.2020.2969863","volume":"17","author":"AAA El-Latif","year":"2020","unstructured":"El-Latif AAA, Abd-El-Atty B, Mazurczyk W, Fung C, Venegas-Andraca SE. Secure data encryption based on quantum walks for 5g internet of things scenario. IEEE Trans Netw Serv Manage. 2020;17(1):118\u201331. https:\/\/doi.org\/10.1109\/TNSM.2020.2969863.","journal-title":"IEEE Trans Netw Serv Manage"},{"issue":"11","key":"162_CR32","doi-asserted-by":"publisher","first-page":"13784","DOI":"10.1109\/TVT.2020.3027568","volume":"69","author":"C Feng","year":"2020","unstructured":"Feng C, Yu K, Aloqaily M, Alazab M, Lv Z, Mumtaz S. Attribute-based encryption with parallel outsourced decryption for edge intelligent iov. IEEE Trans Veh Technol. 2020;69(11):13784\u201395. https:\/\/doi.org\/10.1109\/TVT.2020.3027568.","journal-title":"IEEE Trans Veh Technol"},{"issue":"2","key":"162_CR33","doi-asserted-by":"publisher","first-page":"819","DOI":"10.1109\/TR.2020.3010973","volume":"70","author":"MH Sara\u010devi\u0107","year":"2021","unstructured":"Sara\u010devi\u0107 MH. Data encryption for internet of things applications based on catalan objects and two combinatorial structures. IEEE Trans Reliab. 2021;70(2):819\u201330. https:\/\/doi.org\/10.1109\/TR.2020.3010973.","journal-title":"IEEE Trans Reliab"},{"key":"162_CR34","doi-asserted-by":"publisher","unstructured":"Sree G, Rupa C. Multimedia encryption over wireless communication using fuzzy logic based approach. In: Proceedings of ICIICS 2023, 2023;1\u20135 https:\/\/doi.org\/10.1109\/ICIICS59993.2023.10421322","DOI":"10.1109\/ICIICS59993.2023.10421322"},{"key":"162_CR35","doi-asserted-by":"publisher","first-page":"104432","DOI":"10.1109\/ACCESS.2020.2998395","volume":"8","author":"N Nguyen","year":"2020","unstructured":"Nguyen N, Pham-Nguyen L, Nguyen MB, Kaddoum G. A low power circuit design for chaos-key based data encryption. IEEE Access. 2020;8:104432\u201344. https:\/\/doi.org\/10.1109\/ACCESS.2020.2998395.","journal-title":"IEEE Access"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00162-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00162-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00162-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T09:53:35Z","timestamp":1760522015000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00162-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,15]]},"references-count":35,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["162"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00162-0","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,15]]},"assertion":[{"value":"27 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they do not have any conflicting interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"106"}}