{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T11:33:58Z","timestamp":1765280038675,"version":"3.37.3"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2018,2,26]],"date-time":"2018-02-26T00:00:00Z","timestamp":1519603200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1007\/s00034-018-0790-z","type":"journal-article","created":{"date-parts":[[2018,2,26]],"date-time":"2018-02-26T05:51:13Z","timestamp":1519624273000},"page":"4907-4928","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A New Image-Based Hybrid Reversible Data Hiding Model Using IHWT and RP-PEHM for Secured Data Communication"],"prefix":"10.1007","volume":"37","author":[{"given":"Ahmad","family":"Shaik","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2418-5217","authenticated-orcid":false,"given":"V.","family":"Thanikaiselvan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,26]]},"reference":[{"issue":"1","key":"790_CR1","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.sigpro.2012.07.012","volume":"93","author":"OM Al-Qershi","year":"2013","unstructured":"O.M. Al-Qershi, B.E. Khoo, Two-dimensional difference expansion (2D-DE) scheme with a characteristics-based threshold. Signal Process 93(1), 154\u2013162 (2013). \n                    https:\/\/doi.org\/10.1016\/j.sigpro.2012.07.012","journal-title":"Signal Process"},{"issue":"8","key":"790_CR2","doi-asserted-by":"publisher","first-page":"1147","DOI":"10.1109\/TIP.2004.828418","volume":"13","author":"AM Alattar","year":"2004","unstructured":"A.M. Alattar, Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans. Image Process. 13(8), 1147\u20131156 (2004). \n                    https:\/\/doi.org\/10.1109\/TIP.2004.828418","journal-title":"IEEE Trans. Image Process."},{"issue":"3","key":"790_CR3","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1016\/j.jss.2008.07.008","volume":"82","author":"YK Chan","year":"2009","unstructured":"Y.K. Chan, W.T. Chen, S.S. Yu, Y.A. Ho, C.S. Tsai, Y.P. Chu, A HDWT-based reversible data hiding method. J. Syst. Softw. 82(3), 411\u2013421 (2009). \n                    https:\/\/doi.org\/10.1016\/j.jss.2008.07.008","journal-title":"J. Syst. Softw."},{"issue":"13","key":"790_CR4","doi-asserted-by":"publisher","first-page":"2768","DOI":"10.1016\/j.ins.2007.02.019","volume":"177","author":"CC Chang","year":"2007","unstructured":"C.C. Chang, C.C. Lin, C.S. Tseng, W.L. Tai, Reversible hiding in DCT-based compressed images. Inf. Sci. 177(13), 2768\u20132786 (2007). \n                    https:\/\/doi.org\/10.1016\/j.ins.2007.02.019","journal-title":"Inf. Sci."},{"issue":"11","key":"790_CR5","doi-asserted-by":"publisher","first-page":"2286","DOI":"10.1016\/j.ins.2010.01.034","volume":"180","author":"CC Chang","year":"2010","unstructured":"C.C. Chang, P.Y. Pai, C.M. Yeh, Y.K. Chan, A high payload frequency-based reversible image hiding method. Inf. Sci. 180(11), 2286\u20132298 (2010). \n                    https:\/\/doi.org\/10.1016\/j.ins.2010.01.034","journal-title":"Inf. Sci."},{"key":"790_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.image.2016.04.006","volume":"46","author":"H Chen","year":"2016","unstructured":"H. Chen, J. Ni, W. Hong, T.S. Chen, Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering. Signal Process. Image Commun. 46, 1\u201316 (2016). \n                    https:\/\/doi.org\/10.1016\/j.image.2016.04.006","journal-title":"Signal Process. Image Commun."},{"issue":"3","key":"790_CR7","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1109\/TIFS.2011.2145372","volume":"6","author":"D Coltuc","year":"2011","unstructured":"D. Coltuc, Improved embedding for prediction-based reversible watermarking. IEEE Trans. Inf. Forensics Secur. 6(3), 873\u2013882 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"790_CR8","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/BF02476026","volume":"4","author":"I Daubechies","year":"1998","unstructured":"I. Daubechies, W. Sweldens, Factoring wavelet transforms into lifting steps. J. Fourier Anal. Appl. 4(3), 247\u2013269 (1998). \n                    https:\/\/doi.org\/10.1007\/BF02476026","journal-title":"J. Fourier Anal. Appl."},{"issue":"20","key":"790_CR9","doi-asserted-by":"publisher","first-page":"870","DOI":"10.1587\/elex.5.870","volume":"5","author":"Mehdi Fallahpour","year":"2008","unstructured":"M. Fallahpour, Reversible image data hiding based on gradient adjusted prediction. IEICE Electron. Express 5(20), 870\u2013876 (2008). \n                    https:\/\/doi.org\/10.1587\/elex.5.870\n                    \n                  . \n                    http:\/\/apps.webofknowledge.com\/full_record.do?product=UA&search_mode=GeneralSearch&qid=7&SID=R1PXbjeMqoNXWq9Q4KM&excludeEventConfig=ExcludeIfFromFullRecPage&page=1&doc=18","journal-title":"IEICE Electronics Express"},{"issue":"7","key":"790_CR10","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1587\/elex.4.205","volume":"4","author":"M Fallahpour","year":"2007","unstructured":"M. Fallahpour, M.H. Sedaaghi, High capacity lossless data hiding based on histogram modification. IEICE Electron. Express 4(7), 205\u2013210 (2007). \n                    https:\/\/doi.org\/10.1587\/elex.4.205","journal-title":"IEICE Electron. Express"},{"key":"790_CR11","doi-asserted-by":"publisher","unstructured":"J. Fridrich, M. Goljan, R. Du, Invertible authentication. Secur. Watermarking Multimed Contents 3, 197\u2013208 (2001). \n                    https:\/\/doi.org\/10.1117\/12.435400\n                    \n                  . \n                    http:\/\/proceedings.spiedigitallibrary.org\/proceeding.aspx?articleid=904964","DOI":"10.1117\/12.435400"},{"issue":"1","key":"790_CR12","first-page":"185","volume":"2002","author":"J Fridrich","year":"2002","unstructured":"J. Fridrich, M. Goljan, R. Du, Lossless data embedding: new paradigm in digital watermarking. EURASIP J. Appl. Signal Process. 2002(1), 185\u2013196 (2002)","journal-title":"EURASIP J. Appl. Signal Process."},{"issue":"10","key":"790_CR13","doi-asserted-by":"publisher","first-page":"933","DOI":"10.1016\/j.aeue.2014.04.015","volume":"68","author":"De-Sheng Fu","year":"2014","unstructured":"D.S. Fu, Z.J. Jing, S.G. Zhao, J. Fan, Reversible data hiding based on prediction-error histogram shifting and EMD mechanism. AEU Int. J. Electron. Commun. 68(10), 933\u2013943 (2014). \n                    https:\/\/doi.org\/10.1016\/j.aeue.2014.04.015\n                    \n                  . \n                    http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1434841114001113","journal-title":"AEU - International Journal of Electronics and Communications"},{"key":"790_CR14","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1016\/j.compeleceng.2015.04.014","volume":"46","author":"J Hu","year":"2015","unstructured":"J. Hu, T. Li, Reversible steganography using extended image interpolation technique. Comput. Electr. Eng. 46, 447\u2013455 (2015). \n                    https:\/\/doi.org\/10.1016\/j.compeleceng.2015.04.014","journal-title":"Comput. Electr. Eng."},{"key":"790_CR15","unstructured":"S.K. Jinna, L. Ganesan, Reversible image data hiding using lifting wavelet transform and histogram shifting. Int. J. Comput. Sci. Inf. Secur. 7(3), 283\u2013289 (2010). \n                    https:\/\/pdfs.semanticscholar.org\/0bf0\/ee9f25a58a07a2992e40cf0ec5db36bfa6aa.pdf"},{"issue":"12","key":"790_CR16","doi-asserted-by":"publisher","first-page":"2082","DOI":"10.1109\/TIP.2005.859373","volume":"14","author":"L. Kamstra","year":"2005","unstructured":"L. Kamstra, S. Member, H.J.A.M. Heijmans, Reversible data embedding into images using wavelet techniques and sorting. IEEE Trans. Image Process. 14(12), 2082\u20132090 (2005). \n                    https:\/\/doi.org\/10.1109\/TIP.2005.859373\n                    \n                  . \n                    http:\/\/ieeexplore.ieee.org\/xpls\/abs_all.jsp?arnumber=1532308","journal-title":"IEEE Transactions on Image Processing"},{"issue":"11","key":"790_CR17","doi-asserted-by":"publisher","first-page":"3083","DOI":"10.1016\/j.patcog.2009.04.004","volume":"42","author":"KS Kim","year":"2009","unstructured":"K.S. Kim, M.J. Lee, H.Y. Lee, H.K. Lee, Reversible data hiding exploiting spatial correlation between sub-sampled images. Pattern Recognit. 42(11), 3083\u20133096 (2009). \n                    https:\/\/doi.org\/10.1016\/j.patcog.2009.04.004","journal-title":"Pattern Recognit."},{"issue":"3","key":"790_CR18","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1109\/TIFS.2007.905146","volume":"2","author":"S Lee","year":"2007","unstructured":"S. Lee, C.D. Yoo, T. Kalker, Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Trans. Inf. Forensics Secur. 2(3), 321\u2013330 (2007). \n                    https:\/\/doi.org\/10.1109\/TIFS.2007.905146","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"790_CR19","doi-asserted-by":"publisher","unstructured":"S.K. Lee, Y.H. Suh, Y.S. Ho, Reversible image authentication based on watermarking, in 2006 IEEE International Conference on Multimedia and Expo, ICME 2006\u2014Proceedings, vol. 2006, pp. 1321\u20131324. IEEE (2006). \n                    https:\/\/doi.org\/10.1109\/ICME.2006.262782\n                    \n                  . \n                    http:\/\/ieeexplore.ieee.org\/document\/4036851\/","DOI":"10.1109\/ICME.2006.262782"},{"issue":"5","key":"790_CR20","doi-asserted-by":"publisher","first-page":"5149","DOI":"10.1007\/s11042-017-4388-4","volume":"77","author":"Fan Li","year":"2017","unstructured":"F. Li, Q. Mao, C.C. Chang, Reversible data hiding scheme based on the Haar discrete wavelet transform and interleaving prediction method. Multimed. Tools Appl. (516) (2017). \n                    https:\/\/doi.org\/10.1007\/s11042-017-4388-4\n                    \n                  . \n                    http:\/\/link.springer.com\/10.1007\/s11042-017-4388-4","journal-title":"Multimedia Tools and Applications"},{"issue":"7","key":"790_CR21","doi-asserted-by":"publisher","first-page":"1091","DOI":"10.1109\/TIFS.2013.2261062","volume":"8","author":"Xiaolong Li","year":"2013","unstructured":"X. Li, W. Zhang, X. Gui, B. Yang, A novel reversible data hiding scheme based on two-dimensional difference-histogram modification. IEEE Trans. Inf. Forensics Secur. 8(7), 1091\u20131100 (2013). \n                    https:\/\/doi.org\/10.1109\/TIFS.2013.2261062\n                    \n                  . \n                    http:\/\/ieeexplore.ieee.org\/document\/6512007\/","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"3","key":"790_CR22","first-page":"220","volume":"1","author":"CC Lin","year":"2010","unstructured":"C.C. Lin, High capacity data hiding scheme for DCT-based images. J. Inf. Hiding Multimed. Signal Process. 1(3), 220\u2013240 (2010)","journal-title":"J. Inf. Hiding Multimed. Signal Process."},{"issue":"10","key":"790_CR23","doi-asserted-by":"publisher","first-page":"2395","DOI":"10.1016\/j.jss.2012.05.032","volume":"85","author":"YK Lin","year":"2012","unstructured":"Y.K. Lin, High capacity reversible data hiding scheme based upon discrete cosine transformation. J. Syst. Softw. 85(10), 2395\u20132404 (2012). \n                    https:\/\/doi.org\/10.1016\/j.jss.2012.05.032","journal-title":"J. Syst. Softw."},{"issue":"5","key":"790_CR24","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1016\/S0167-4048(02)00515-1","volume":"21","author":"DC Lou","year":"2002","unstructured":"D.C. Lou, J.L. Liu, Steganographic method for secure communications. Comput. Secur. 21(5), 449\u2013460 (2002)","journal-title":"Comput. Secur."},{"issue":"9","key":"790_CR25","doi-asserted-by":"publisher","first-page":"1914","DOI":"10.1109\/TIFS.2016.2566261","volume":"11","author":"B Ma","year":"2016","unstructured":"B. Ma, Y.Q. Shi, A reversible data hiding scheme based on code division multiplexing. IEEE Trans. Inf. Forensics Secur. 11(9), 1914\u20131927 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"790_CR26","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"ZNZ Ni","year":"2006","unstructured":"Z.N.Z. Ni, Y.Q. Shi, N. Ansari, W. Su, Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354\u2013362 (2006). \n                    https:\/\/doi.org\/10.1109\/TCSVT.2006.869964","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"1","key":"790_CR27","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1016\/j.sigpro.2011.06.006","volume":"92","author":"F Peng","year":"2012","unstructured":"F. Peng, X. Li, B. Yang, Adaptive reversible data hiding scheme based on integer transform. Signal Process. 92(1), 54\u201362 (2012). \n                    https:\/\/doi.org\/10.1016\/j.sigpro.2011.06.006","journal-title":"Signal Process."},{"issue":"7","key":"790_CR28","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1109\/TCSVT.2009.2020257","volume":"19","author":"V Sachnev","year":"2009","unstructured":"V. Sachnev, H.J. Kim, J. Nam, S. Suresh, Y.Q. Shi, Reversible watermarking algorithm using sorting and prediction. IEEE Trans. Circuits Syst. Video Technol. 19(7), 989\u2013999 (2009). \n                    https:\/\/doi.org\/10.1109\/TCSVT.2009.2020257","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"790_CR29","doi-asserted-by":"publisher","DOI":"10.3923\/jai.2017.1.21","author":"A Shaik","year":"2017","unstructured":"A. Shaik, V. Thanikaiselvan, R. Amitharajan, Data security through data hiding in images: a review. J. Artif. Intell. (2017). \n                    https:\/\/doi.org\/10.3923\/jai.2017.1.21","journal-title":"J. Artif. Intell."},{"key":"790_CR30","doi-asserted-by":"publisher","first-page":"3210","DOI":"10.1109\/ACCESS.2016.2573308","volume":"4","author":"Yun-Qing Shi","year":"2016","unstructured":"Y.Q. Shi, X. Li, X. Zhang, H.T. Wu, B. Ma, Reversible data hiding : advances in the past two decades. IEEE Access 4, 3210\u20133237 (2016). \n                    https:\/\/doi.org\/10.1109\/ACCESS.2016.2573308\n                    \n                  . \n                    http:\/\/ieeexplore.ieee.org\/document\/7479451\/","journal-title":"IEEE Access"},{"issue":"8","key":"790_CR31","doi-asserted-by":"publisher","first-page":"3409","DOI":"10.1007\/s00034-016-0470-9","volume":"36","author":"G Suryanarayana","year":"2017","unstructured":"G. Suryanarayana, R. Dhuli, Super-resolution image reconstruction using dual-mode complex diffusion-based shock filter and singular value decomposition. Circuits Syst. Signal Process. 36(8), 3409\u20133425 (2017). \n                    https:\/\/doi.org\/10.1007\/s00034-016-0470-9","journal-title":"Circuits Syst. Signal Process."},{"key":"790_CR32","doi-asserted-by":"publisher","unstructured":"W. Sweldens, The lifting scheme: a new philosophy in biorthogonal wavelet constructions, in: SPIE\u2019s 1995 International Symposium on Optical Science, Engineering, and Instrumentation, vol. 2569, pp. 68\u201379 (1995). \n                    https:\/\/doi.org\/10.1117\/12.217619\n                    \n                  . \n                    http:\/\/proceedings.spiedigitallibrary.org\/proceeding.aspx?articleid=1007578","DOI":"10.1117\/12.217619"},{"key":"790_CR33","doi-asserted-by":"crossref","unstructured":"V. Thanikaiselvan, S. Shastri, S. Ahmad, Information hiding: steganography, in: Intelligent Techniques in Signal Processing for Multimedia Security, pp. 65\u201391. Springer (2017)","DOI":"10.1007\/978-3-319-44790-2_4"},{"key":"790_CR34","doi-asserted-by":"crossref","unstructured":"D.M. Thodi, J.J. Rodr\u00edguez, Reversible watermarking by prediction-error expansion, in 6th IEEE Southwest Symposium on Image Analysis and Interpretation, 2004, pp. 21\u201325. IEEE (2004)","DOI":"10.1109\/IAI.2004.1300937"},{"issue":"3","key":"790_CR35","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1109\/TIP.2006.891046","volume":"16","author":"DM Thodi","year":"2007","unstructured":"D.M. Thodi, J.J. Rodr\u00edguez, Expansion embedding techniques for reversible watermarking. IEEE Trans. Image Process. 16(3), 721\u2013730 (2007). \n                    https:\/\/doi.org\/10.1109\/TIP.2006.891046","journal-title":"IEEE Trans. Image Process."},{"issue":"8","key":"790_CR36","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"J. Tian, Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. 13(8), 890\u2013896 (2003). \n                    https:\/\/doi.org\/10.1109\/TCSVT.2003.815962","journal-title":"IEEE Trans. Circuits Syst."},{"issue":"6","key":"790_CR37","doi-asserted-by":"publisher","first-page":"1129","DOI":"10.1016\/j.sigpro.2008.12.017","volume":"89","author":"Piyu Tsai","year":"2009","unstructured":"P. Tsai, Y.C. Hu, H.L. Yeh, Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process. 89(6), 1129\u20131143 (2009). \n                    https:\/\/doi.org\/10.1016\/j.sigpro.2008.12.017\n                    \n                  . \n                    http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0165168408004131","journal-title":"Signal Processing"},{"issue":"6","key":"790_CR38","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1016\/j.cose.2005.05.001","volume":"24","author":"Hsien-Chu Wu","year":"2005","unstructured":"H.C. Wu, C.C. Chang, A novel digital image watermarking scheme based on the vector quantization technique. Comput. Secur. 24(6), 460\u2013471 (2005). \n                    https:\/\/doi.org\/10.1016\/j.cose.2005.05.001\n                    \n                  . \n                    http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404805000672","journal-title":"Computers & Security"},{"key":"790_CR39","doi-asserted-by":"publisher","unstructured":"G. Xuan, C. Yang, Y. Zhen, Y.Q. Shi, Z. Ni, Reversible data hiding based on wavelet spread spectrum, in IEEE 6th Workshop on Multimedia. Signal Processing, vol. 2004, pp. 211\u2013214 (2004). \n                    https:\/\/doi.org\/10.1109\/MMSP.2004.1436530\n                    \n                  . \n                    http:\/\/ieeexplore.ieee.org\/lpdocs\/epic03\/wrapper.htm?arnumber=1436530","DOI":"10.1109\/MMSP.2004.1436530"},{"key":"790_CR40","doi-asserted-by":"crossref","unstructured":"K. Yamato, K. Shinoda, M. Hasegawa, S. Kato, Two-dimensional histogram expansion of wavelet coefficient for reversible data hiding, in Visual communications and image processing conference, pp. 258\u2013261. IEEE (2014)","DOI":"10.1109\/VCIP.2014.7051553"},{"issue":"1","key":"790_CR41","doi-asserted-by":"publisher","first-page":"013001","DOI":"10.1117\/1.3532833","volume":"20","author":"DG Yeo","year":"2011","unstructured":"D.G. Yeo, H.Y. Lee, B. Kim, High capacity reversible watermarking using differential histogram shifting and predicted error compensation. J. Electron. Imaging 20(1), 013001 (2011). \n                    https:\/\/doi.org\/10.1117\/1.3532833","journal-title":"J. Electron. Imaging"}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00034-018-0790-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-018-0790-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-018-0790-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,25]],"date-time":"2019-02-25T20:26:48Z","timestamp":1551126408000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00034-018-0790-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,26]]},"references-count":41,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2018,11]]}},"alternative-id":["790"],"URL":"https:\/\/doi.org\/10.1007\/s00034-018-0790-z","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"type":"print","value":"0278-081X"},{"type":"electronic","value":"1531-5878"}],"subject":[],"published":{"date-parts":[[2018,2,26]]},"assertion":[{"value":"27 August 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 February 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 February 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 February 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}