{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T21:44:58Z","timestamp":1776030298372,"version":"3.50.1"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2023,4,25]],"date-time":"2023-04-25T00:00:00Z","timestamp":1682380800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,4,25]],"date-time":"2023-04-25T00:00:00Z","timestamp":1682380800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1007\/s00034-023-02382-7","type":"journal-article","created":{"date-parts":[[2023,4,25]],"date-time":"2023-04-25T19:02:36Z","timestamp":1682449356000},"page":"5684-5713","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["An Adaptive Embedding Approach for High Imperceptible and Robust Audio Watermarking Using Framelet Transform and SVD"],"prefix":"10.1007","volume":"42","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4335-8785","authenticated-orcid":false,"given":"Kasetty Praveen","family":"Kumar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3674-2968","authenticated-orcid":false,"given":"Aniruddha","family":"Kanhe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,25]]},"reference":[{"key":"2382_CR1","unstructured":"A first hands-on lab on Speech Processing. https:\/\/www.csd.uoc.gr\/~hy578\/2018\/Project0_Part1.pdf (2018)"},{"issue":"1","key":"2382_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13636-014-0037-2","volume":"2014","author":"A Al-Haj","year":"2014","unstructured":"A. Al-Haj, An imperceptible and robust audio watermarking algorithm. EURASIP J. Audio Speech Music Process 2014(1), 1\u201312 (2014). https:\/\/doi.org\/10.1186\/s13636-014-0037-2","journal-title":"EURASIP J. Audio Speech Music Process"},{"issue":"2","key":"2382_CR3","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1109\/6046.923822","volume":"3","author":"P Bassia","year":"2001","unstructured":"P. Bassia, I. Pitas, N. Nikolaidis, Robust audio watermarking in the time domain. IEEE Trans. Multimedia 3(2), 232\u2013241 (2001). https:\/\/doi.org\/10.1109\/6046.923822","journal-title":"IEEE Trans. Multimedia"},{"key":"2382_CR4","volume-title":"Introduction to Wavelets and Wavelet Transforms-A Primer","author":"CS Burrus","year":"1998","unstructured":"C.S. Burrus, R. Gopinath, H. Guo, Introduction to Wavelets and Wavelet Transforms-A Primer (Prentice-Hall, New Jersey, 1998)"},{"key":"2382_CR5","doi-asserted-by":"publisher","first-page":"4735","DOI":"10.1007\/s11042-015-2500-1","volume":"75","author":"ST Chen","year":"2016","unstructured":"S.T. Chen, H.N. Huang, Optimization-based audio watermarking with integrated quantization embedding. Multimed. Tools Appl. 75, 4735\u20134751 (2016). https:\/\/doi.org\/10.1007\/s11042-015-2500-1","journal-title":"Multimed. Tools Appl."},{"issue":"3","key":"2382_CR6","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1109\/TASL.2007.913022","volume":"16","author":"O T C Chen","year":"2008","unstructured":"O. T. C. Chen, W. C. Wu, Highly robust, secure, and perceptual-quality echo hiding scheme. IEEE Trans. Audio Speech Lang. Process. 16(3), 629\u2013638 (2008). https:\/\/doi.org\/10.1109\/TASL.2007.913022","journal-title":"IEEE Trans. Audio Speech Lang. Process."},{"issue":"6","key":"2382_CR7","doi-asserted-by":"publisher","first-page":"9597","DOI":"10.1007\/s11042-020-09980-6","volume":"80","author":"ST Chen","year":"2021","unstructured":"S.T. Chen, T.W. Huang, C.T. Yang, High-SNR steganography for digital audio signal in the wavelet domain. Multimed. Tools Appl. 80(6), 9597\u20139614 (2021). https:\/\/doi.org\/10.1007\/s11042-020-09980-6","journal-title":"Multimed. Tools Appl."},{"issue":"1","key":"2382_CR8","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1186\/1687-4722-2012-25","volume":"2012","author":"F Djebbar","year":"2012","unstructured":"F. Djebbar, B. Ayad, K.A. Meraim, H. Hamam, Comparative study of digital audio steganography techniques. EURASIP J. Audio Speech Music Process. 2012(1), 25 (2012). https:\/\/doi.org\/10.1186\/1687-4722-2012-25","journal-title":"EURASIP J. Audio Speech Music Process."},{"issue":"5","key":"2382_CR9","doi-asserted-by":"publisher","first-page":"925","DOI":"10.1109\/TMM.2006.879879","volume":"8","author":"S Erkucuk","year":"2006","unstructured":"S. Erkucuk, S. Krishnan, M. Zeytinoglu, A robust audio watermark representation based on linear chirps. IEEE Trans. Multimedia 8(5), 925\u2013936 (2006). https:\/\/doi.org\/10.1109\/TMM.2006.879879","journal-title":"IEEE Trans. Multimedia"},{"issue":"8","key":"2382_CR10","doi-asserted-by":"publisher","first-page":"1273","DOI":"10.1109\/TASLP.2015.2430818","volume":"23","author":"M Fallahpour","year":"2015","unstructured":"M. Fallahpour, D. Meg\u00edas, Audio watermarking based on fibonacci numbers. IEEE\/ACM Trans. Audio Speech Lang. Process. 23(8), 1273\u20131282 (2015). https:\/\/doi.org\/10.1109\/TASLP.2015.2430818","journal-title":"IEEE\/ACM Trans. Audio Speech Lang. Process."},{"key":"2382_CR11","doi-asserted-by":"publisher","unstructured":"J. Garofolo, L. Lamel, W. Fisher, J. Fiscus, D. Pallett, N. Dahlgren, V. Zue, TIMIT Acoustic-Phonetic Continuous Speech Corpus LDC93S1 (1993). https:\/\/doi.org\/10.35111\/17gk-bn40","DOI":"10.35111\/17gk-bn40"},{"issue":"1","key":"2382_CR12","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1051\/mmnp\/20138102","volume":"8","author":"B Han","year":"2013","unstructured":"B. Han, Properties of discrete framelet transforms. Math. Model. Nat. Phenom. 8(1), 18\u201347 (2013). https:\/\/doi.org\/10.1051\/mmnp\/20138102","journal-title":"Math. Model. Nat. Phenom."},{"key":"2382_CR13","volume-title":"Framelets and Wavelets: Algorithms, Analysis, and Applications","author":"B Han","year":"2018","unstructured":"B. Han, Framelets and Wavelets: Algorithms, Analysis, and Applications (Springer, Berlin, 2018)"},{"key":"2382_CR14","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511810817","volume-title":"Matrix Analysis","author":"RA Horn","year":"1985","unstructured":"R.A. Horn, C.R. Johnson, Matrix Analysis (Cambridge University Press, Cambridge, 1985)"},{"key":"2382_CR15","doi-asserted-by":"publisher","first-page":"19063","DOI":"10.1109\/ACCESS.2019.2893646","volume":"7","author":"HT Hu","year":"2019","unstructured":"H.T. Hu, T.T. Lee, High-performance self-synchronous blind audio watermarking in a unified FFT framework. IEEE Access 7, 19063\u201319076 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2893646","journal-title":"IEEE Access"},{"issue":"7","key":"2382_CR16","doi-asserted-by":"publisher","first-page":"588","DOI":"10.1016\/j.specom.2006.12.006","volume":"49","author":"Y Hu","year":"2007","unstructured":"Y. Hu, P.C. Loizou, Subjective comparison and evaluation of speech enhancement algorithms. Speech Commun. 49(7), 588\u2013601 (2007). https:\/\/doi.org\/10.1016\/j.specom.2006.12.006","journal-title":"Speech Commun."},{"key":"2382_CR17","doi-asserted-by":"publisher","first-page":"9916","DOI":"10.1109\/ACCESS.2021.3049525","volume":"9","author":"HT Hu","year":"2021","unstructured":"H.T. Hu, H.H. Chou, T.T. Lee, Robust blind speech watermarking via FFT-based perceptual vector norm modulation with frame self-synchronization. IEEE Access 9, 9916\u20139925 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3049525","journal-title":"IEEE Access"},{"issue":"2","key":"2382_CR18","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1109\/TASLP.2014.2387385","volume":"23","author":"G Hua","year":"2015","unstructured":"G. Hua, J. Goh, V.L.L. Thing, Time-spread echo-based audio watermarking with optimized imperceptibility and robustness. IEEE\/ACM Trans. Audio Speech Lang. Process. 23(2), 227\u2013239 (2015). https:\/\/doi.org\/10.1109\/TASLP.2014.2387385","journal-title":"IEEE\/ACM Trans. Audio Speech Lang. Process."},{"key":"2382_CR19","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1016\/j.sigpro.2016.04.005","volume":"128","author":"G Hua","year":"2016","unstructured":"G. Hua, J. Huang, Y.Q. Shi, J. Goh, V.L.L. Thing, Twenty years of digital audio watermarking-A comprehensive review. Signal Process. 128, 222\u2013242 (2016). https:\/\/doi.org\/10.1016\/j.sigpro.2016.04.005","journal-title":"Signal Process."},{"issue":"1","key":"2382_CR20","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/TMM.2017.2721642","volume":"20","author":"MJ Hwang","year":"2018","unstructured":"M.J. Hwang, J. Lee, M. Lee, H.G. Kang, SVD-based adaptive QIM watermarking on stereo audio signals. IEEE Trans. Multimedia 20(1), 45\u201354 (2018). https:\/\/doi.org\/10.1109\/TMM.2017.2721642","journal-title":"IEEE Trans. Multimedia"},{"key":"2382_CR21","unstructured":"R. ITU-R, Recommendation ITU-R BS. 1387-1 method for objective measurements of perceived audio quality, BS. 1387-1 International Telecommunications Union-Recommendation, Geneva (1998)"},{"key":"2382_CR22","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.sigpro.2019.04.017","volume":"162","author":"W Jiang","year":"2019","unstructured":"W. Jiang, X. Huang, Y. Quan, Audio watermarking algorithm against synchronization attacks using global characteristics and adaptive frame division. Signal Process. 162, 153\u2013160 (2019). https:\/\/doi.org\/10.1016\/j.sigpro.2019.04.017","journal-title":"Signal Process."},{"issue":"21","key":"2382_CR23","doi-asserted-by":"publisher","first-page":"3197","DOI":"10.1016\/j.ijleo.2015.07.084","volume":"126","author":"R Jiao","year":"2015","unstructured":"R. Jiao, S. Ma, B. Li, Framelet image watermarking considering dynamic visual masking. Optik 126(21), 3197\u20133202 (2015). https:\/\/doi.org\/10.1016\/j.ijleo.2015.07.084","journal-title":"Optik"},{"key":"2382_CR24","unstructured":"P. Kabal, An examination and interpretation of ITU-R BS. 1387: perceptual evaluation of audio quality. TSP Lab Technical Report, Dept. Electrical & Computer Engineering, McGill University, pp. 1\u201389 (2002)"},{"issue":"2","key":"2382_CR25","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1109\/TMM.2010.2098850","volume":"13","author":"X Kang","year":"2011","unstructured":"X. Kang, R. Yang, J. Huang, Geometric invariant audio watermarking based on an LCM feature. IEEE Trans. Multimedia 13(2), 181\u2013190 (2011). https:\/\/doi.org\/10.1109\/TMM.2010.2098850","journal-title":"IEEE Trans. Multimedia"},{"key":"2382_CR26","doi-asserted-by":"publisher","first-page":"5049","DOI":"10.1007\/s00034-018-0805-9","volume":"37","author":"A Kanhe","year":"2018","unstructured":"A. Kanhe, A. Gnanasekaran, A DCT-SVD based speech steganography in voiced frames. Circuits Syst. Signal Process. 37, 5049\u20135068 (2018). https:\/\/doi.org\/10.1007\/s00034-018-0805-9","journal-title":"Circuits Syst. Signal Process."},{"issue":"3","key":"2382_CR27","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/s00530-017-0545-x","volume":"24","author":"A Kaur","year":"2018","unstructured":"A. Kaur, M.K. Dutta, An optimized high payload audio watermarking algorithm based on LU-factorization. Multimedia Syst. 24(3), 341\u2013353 (2018). https:\/\/doi.org\/10.1007\/s00530-017-0545-x","journal-title":"Multimedia Syst."},{"issue":"2","key":"2382_CR28","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1109\/TMM.2005.843366","volume":"7","author":"BS Ko","year":"2005","unstructured":"B.S. Ko, R. Nishimura, Y. Suzuki, Time-spread echo method for digital audio watermarking. IEEE Trans. Multimedia 7(2), 212\u2013221 (2005). https:\/\/doi.org\/10.1109\/TMM.2005.843366","journal-title":"IEEE Trans. Multimedia"},{"key":"2382_CR29","unstructured":"A. Lang, StirMark benchmark for audio (2008). http:\/\/sourceforge.net\/projects\/stirmark. Accessed on Jan 2022"},{"issue":"4","key":"2382_CR30","doi-asserted-by":"publisher","first-page":"1088","DOI":"10.1109\/TSP.2003.809372","volume":"51","author":"AN Lemma","year":"2003","unstructured":"A.N. Lemma, J. Aprea, W. Oomen, L. van de Kerkhof, A temporal domain audio watermarking technique. IEEE Trans. Signal Process. 51(4), 1088\u20131097 (2003). https:\/\/doi.org\/10.1109\/TSP.2003.809372","journal-title":"IEEE Trans. Signal Process."},{"issue":"1","key":"2382_CR31","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/TMM.2005.861292","volume":"8","author":"WN Lie","year":"2006","unstructured":"W.N. Lie, L.C. Chang, Robust and high-quality time-domain audio watermarking based on low-frequency amplitude modification. IEEE Trans. Multimedia 8(1), 46\u201359 (2006). https:\/\/doi.org\/10.1109\/TMM.2005.861292","journal-title":"IEEE Trans. Multimedia"},{"issue":"5","key":"2382_CR32","doi-asserted-by":"publisher","first-page":"1171","DOI":"10.1109\/TIFS.2018.2871748","volume":"14","author":"Z Liu","year":"2019","unstructured":"Z. Liu, Y. Huang, J. Huang, Patchwork-based audio watermarking robust against de-synchronization and recapturing attacks. IEEE Trans. Inf. Forensics Secur. 14(5), 1171\u20131180 (2019). https:\/\/doi.org\/10.1109\/TIFS.2018.2871748","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2382_CR33","doi-asserted-by":"publisher","unstructured":"S. Mishra, V.K. Yadav, M.C. Trivedi, T. Shrimali, Audio steganography techniques: a survey. In: Advances in Computer and Computational Sciences, pp. 581\u2013589. Springer (2018). https:\/\/doi.org\/10.1007\/978-981-10-3773-3_56","DOI":"10.1007\/978-981-10-3773-3_56"},{"key":"2382_CR34","volume-title":"Digital Processing of Speech Signals","author":"L Rabiner","year":"1978","unstructured":"L. Rabiner, R. Schafer, Digital Processing of Speech Signals (Prentice Hall, USA, 1978)"},{"key":"2382_CR35","unstructured":"I.T. Recommendation, Perceptual evaluation of speech quality (PESQ): an objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs. Rec. ITU-T P. 862 (2001)"},{"issue":"11","key":"2382_CR36","doi-asserted-by":"publisher","first-page":"1917","DOI":"10.1109\/TASLP.2015.2456431","volume":"23","author":"S Sarreshtedari","year":"2015","unstructured":"S. Sarreshtedari, M.A. Akhaee, A. Abbasfar, A watermarking method for digital speech self-recovery. IEEE\/ACM Trans. Audio Speech Lang. Process. 23(11), 1917\u20131925 (2015). https:\/\/doi.org\/10.1109\/TASLP.2015.2456431","journal-title":"IEEE\/ACM Trans. Audio Speech Lang. Process."},{"issue":"2","key":"2382_CR37","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.acha.2004.05.003","volume":"17","author":"IW Selesnick","year":"2004","unstructured":"I.W. Selesnick, A. Abdelnour, Symmetric wavelet tight frames with two generators. Appl. Comput. Harmon. Anal. 17(2), 211\u2013225 (2004). https:\/\/doi.org\/10.1016\/j.acha.2004.05.003. (Special Issue: Frames in Harmonic Analysis, Part II)","journal-title":"Appl. Comput. Harmon. Anal."},{"issue":"10","key":"2382_CR38","doi-asserted-by":"publisher","first-page":"2631","DOI":"10.1109\/TMM.2018.2812599","volume":"20","author":"Z Su","year":"2018","unstructured":"Z. Su, G. Zhang, F. Yue, L. Chang, J. Jiang, X. Yao, SNR-constrained heuristics for optimizing the scaling parameter of robust audio watermarking. IEEE Trans. Multimedia 20(10), 2631\u20132644 (2018). https:\/\/doi.org\/10.1109\/TMM.2018.2812599","journal-title":"IEEE Trans. Multimedia"},{"issue":"3","key":"2382_CR39","doi-asserted-by":"publisher","first-page":"1865","DOI":"10.1007\/s11042-019-08221-9","volume":"79","author":"MS Subhedar","year":"2020","unstructured":"M.S. Subhedar, V.H. Mankar, Secure image steganography using framelet transform and bidiagonal SVD. Multimed. Tools Appl. 79(3), 1865\u20131886 (2020). https:\/\/doi.org\/10.1007\/s11042-019-08221-9","journal-title":"Multimed. Tools Appl."},{"issue":"1","key":"2382_CR40","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.ijleo.2015.07.084","volume":"9","author":"NH Sultan","year":"2021","unstructured":"N.H. Sultan, N.H.A. Khammas, Z.H. Najm, Image watermarking based on framelet transform. Period. Eng. Natural Sci. 9(1), 37\u201347 (2021). https:\/\/doi.org\/10.1016\/j.ijleo.2015.07.084","journal-title":"Period. Eng. Natural Sci."},{"key":"2382_CR41","unstructured":"Unified speech and audio database(USAC). http:\/\/www.voiceage.com\/Audio-Samples-AMR-WB.html (2008). Accessed on Feb 2021"},{"key":"2382_CR42","doi-asserted-by":"publisher","unstructured":"M. Unoki, R. Miyauchi, Detection of tampering in speech signals with inaudible watermarking technique. In: 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Process., pp. 118\u2013121 (2012). https:\/\/doi.org\/10.1109\/IIH-MSP.2012.34","DOI":"10.1109\/IIH-MSP.2012.34"},{"key":"2382_CR43","doi-asserted-by":"publisher","first-page":"157,480","DOI":"10.1109\/ACCESS.2019.2949691","volume":"7","author":"K Vivekananda Bhat","year":"2019","unstructured":"K. Vivekananda Bhat, A.K. Das, J. Lee, A mean quantization watermarking scheme for audio signals using singular-value decomposition. IEEE Access 7, 157,480-157,488 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2949691","journal-title":"IEEE Access"},{"key":"2382_CR44","doi-asserted-by":"publisher","unstructured":"Y. Wang, K. Yang, Y. Yang, J. Zhang, X. Zhao, Audio steganalysis dataset (2019). https:\/\/doi.org\/10.21227\/rab0-vf56. Accessed on Feb 2021","DOI":"10.21227\/rab0-vf56"},{"issue":"1","key":"2382_CR45","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TMM.2010.2080668","volume":"13","author":"Y Xiang","year":"2011","unstructured":"Y. Xiang, D. Peng, I. Natgunanathan, W. Zhou, Effective pseudonoise sequence and decoding function for imperceptibility and robustness enhancement in time-spread echo-based audio watermarking. IEEE Trans. Multimedia 13(1), 2\u201313 (2011). https:\/\/doi.org\/10.1109\/TMM.2010.2080668","journal-title":"IEEE Trans. Multimedia"},{"issue":"2","key":"2382_CR46","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1109\/TIFS.2011.2173678","volume":"7","author":"Y Xiang","year":"2012","unstructured":"Y. Xiang, I. Natgunanathan, D. Peng, W. Zhou, S. Yu, A dual-channel time-spread echo method for audio watermarking. IEEE Trans. Inf. Forensics Secur. 7(2), 383\u2013392 (2012). https:\/\/doi.org\/10.1109\/TIFS.2011.2173678","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2382_CR47","doi-asserted-by":"publisher","unstructured":"M. Xiao, Z. He, T. Quan, A robust digital watermarking algorithm based on framelet and SVD. In: Proceedings of SPIE 9811, MIPPR 2015: Multispectral Image Acquisition, Processing, and Analysis, 981119, vol. 9811, pp. 295\u2013300. SPIE (2015). https:\/\/doi.org\/10.1117\/12.2209570","DOI":"10.1117\/12.2209570"},{"key":"2382_CR48","doi-asserted-by":"publisher","first-page":"153,724","DOI":"10.1109\/access.2019.2948946","volume":"7","author":"Y Xue","year":"2019","unstructured":"Y. Xue, K. Mu, Y. Wang, Y. Chen, P. Zhong, J. Wen, Robust speech steganography using differential SVD. IEEE Access 7, 153,724-153,733 (2019). https:\/\/doi.org\/10.1109\/access.2019.2948946","journal-title":"IEEE Access"},{"key":"2382_CR49","doi-asserted-by":"publisher","first-page":"2282","DOI":"10.1109\/TASLP.2021.3092555","volume":"29","author":"J Zhao","year":"2021","unstructured":"J. Zhao, T. Zong, Y. Xiang, L. Gao, W. Zhou, G. Beliakov, Desynchronization attacks resilient watermarking method based on frequency singular value coefficient modification. IEEE\/ACM Trans. Audio Speech Lang. Process. 29, 2282\u20132295 (2021). https:\/\/doi.org\/10.1109\/TASLP.2021.3092555","journal-title":"IEEE\/ACM Trans. Audio Speech Lang. Process."}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-023-02382-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00034-023-02382-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-023-02382-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,28]],"date-time":"2023-07-28T11:15:08Z","timestamp":1690542908000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00034-023-02382-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,25]]},"references-count":49,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["2382"],"URL":"https:\/\/doi.org\/10.1007\/s00034-023-02382-7","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"value":"0278-081X","type":"print"},{"value":"1531-5878","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,25]]},"assertion":[{"value":"25 March 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 April 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 April 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 April 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}