{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T10:58:40Z","timestamp":1774609120282,"version":"3.50.1"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T00:00:00Z","timestamp":1758672000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T00:00:00Z","timestamp":1758672000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62062044"],"award-info":[{"award-number":["62062044"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004479","name":"Natural Science Foundation of Jiangxi Province","doi-asserted-by":"publisher","award":["20252BAC240224"],"award-info":[{"award-number":["20252BAC240224"]}],"id":[{"id":"10.13039\/501100004479","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science Foundation of Jiangxi Provincial Department of Education","award":["GJJ2400903"],"award-info":[{"award-number":["GJJ2400903"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1007\/s00034-025-03332-1","type":"journal-article","created":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T17:53:41Z","timestamp":1758736421000},"page":"2261-2286","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["CNN-Based Hybrid Prediction Scheme for Image Reversible Data Hiding"],"prefix":"10.1007","volume":"45","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-4345-1651","authenticated-orcid":false,"given":"Yi","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Yi","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Yixiang","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Tianzhu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Junxiang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,24]]},"reference":[{"issue":"8","key":"3332_CR1","doi-asserted-by":"publisher","first-page":"1147","DOI":"10.1109\/TIP.2004.828418","volume":"13","author":"AM Alattar","year":"2004","unstructured":"A.M. Alattar, Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans. Image Process. 13(8), 1147\u20131156 (2004)","journal-title":"IEEE Trans. Image Process."},{"issue":"7","key":"3332_CR2","doi-asserted-by":"publisher","first-page":"1685","DOI":"10.1109\/TPAMI.2019.2901877","volume":"42","author":"S Baluja","year":"2020","unstructured":"S. Baluja, Hiding images within images. IEEE Trans. Pattern Anal. Mach. Intell. 42(7), 1685\u20131697 (2020)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"3332_CR3","unstructured":"CVG UGR Image Database, https:\/\/ccia.ugr.es\/cvg\/dbimagenes\/g512.php. Accessed 15 June 2023, CVG UGR Image Database"},{"issue":"4","key":"3332_CR4","doi-asserted-by":"publisher","first-page":"1042","DOI":"10.1109\/TIP.2005.863053","volume":"15","author":"MU Celik","year":"2006","unstructured":"M.U. Celik, G. Sharma, A.M. Tekalp, Lossless watermarking for image authentication: a new framework and an implementation. IEEE Trans. Image Process. 15(4), 1042\u20131049 (2006)","journal-title":"IEEE Trans. Image Process."},{"issue":"2","key":"3332_CR5","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1109\/TIP.2004.840686","volume":"14","author":"MU Celik","year":"2005","unstructured":"M.U. Celik, G. Sharma, A.M. Tekalp, E. Saber, Lossless generalized-LSB data embedding. IEEE Trans. Image Process. 14(2), 253\u2013266 (2005)","journal-title":"IEEE Trans. Image Process."},{"issue":"1","key":"3332_CR6","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1109\/TIP.2011.2162424","volume":"21","author":"D Coltuc","year":"2012","unstructured":"D. Coltuc, Low distortion transform for reversible watermarking. IEEE Trans. Image Process. 21(1), 412\u2013417 (2012)","journal-title":"IEEE Trans. Image Process."},{"issue":"4","key":"3332_CR7","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/LSP.2006.884895","volume":"14","author":"D Coltuc","year":"2007","unstructured":"D. Coltuc, J.M. Chassery, Very fast watermarking by reversible contrast mapping. IEEE Signal Process. Lett. 14(4), 255\u2013258 (2007)","journal-title":"IEEE Signal Process. Lett."},{"issue":"10","key":"3332_CR8","doi-asserted-by":"publisher","first-page":"6122","DOI":"10.1109\/TPAMI.2021.3088846","volume":"44","author":"L Fan","year":"2021","unstructured":"L. Fan, K.W. Ng, C.S. Chan, Q. Yang, Deepip: deep neural network intellectual property protection with passports. IEEE Trans. Pattern Anal. Mach. Intell. 44(10), 6122\u20136139 (2021)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"3332_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2020.107817","volume":"178","author":"G Gao","year":"2021","unstructured":"G. Gao, S. Tong, Z. Xia, B. Wu, L. Xu, Z. Zhao, Reversible data hiding with automatic contrast enhancement for medical images. Signal Process. 178, 107817 (2021)","journal-title":"Signal Process."},{"issue":"2","key":"3332_CR10","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.optcom.2011.09.005","volume":"285","author":"W Hong","year":"2012","unstructured":"W. Hong, Adaptive reversible data hiding method based on error energy control and histogram shifting. Opt. Commun. 285(2), 101\u2013108 (2012)","journal-title":"Opt. Commun."},{"issue":"10","key":"3332_CR11","doi-asserted-by":"publisher","first-page":"5087","DOI":"10.1109\/TIP.2018.2851074","volume":"27","author":"D Hou","year":"2018","unstructured":"D. Hou, W. Zhang, Y. Yang, N. Yu, Reversible data hiding under inconsistent distortion metrics. IEEE Trans. Image Process. 27(10), 5087\u20135099 (2018)","journal-title":"IEEE Trans. Image Process."},{"key":"3332_CR12","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1109\/LSP.2021.3059202","volume":"28","author":"R Hu","year":"2021","unstructured":"R. Hu, S. Xiang, Cnn prediction based reversible data hiding. IEEE Signal Process. Lett. 28, 464\u2013468 (2021)","journal-title":"IEEE Signal Process. Lett."},{"issue":"12","key":"3332_CR13","doi-asserted-by":"publisher","first-page":"10196","DOI":"10.1109\/TPAMI.2021.3131250","volume":"44","author":"R Hu","year":"2022","unstructured":"R. Hu, S. Xiang, Reversible data hiding by using CNN prediction and adaptive embedding. IEEE Trans. Pattern Anal. Mach. Intell. 44(12), 10196\u201310208 (2022)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"2","key":"3332_CR14","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1109\/TCSVT.2008.2009252","volume":"19","author":"Y Hu","year":"2009","unstructured":"Y. Hu, H.K. Lee, J. Li, DE-based reversible data hiding with improved overflow location map. IEEE Trans. Circ. Syst. Video Technol. 19(2), 250\u2013260 (2009)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"3","key":"3332_CR15","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1093\/comjnl\/bxv067","volume":"59","author":"IF Jafar","year":"2016","unstructured":"I.F. Jafar, K.A. Darabkh, R.T. Al-Zubi, R.A.A. Na\u2019mneh, Efficient reversible data hiding using multiple predictors. Comput. J. 59(3), 423\u2013438 (2016)","journal-title":"Comput. J."},{"issue":"11","key":"3332_CR16","doi-asserted-by":"publisher","first-page":"3236","DOI":"10.1109\/TCSVT.2018.2878932","volume":"29","author":"S Kim","year":"2019","unstructured":"S. Kim, X. Qu, V. Sachnev, H.J. Kim, Skewed histogram shifting for reversible data hiding using a pair of extreme predictions. IEEE Trans. Circ. Syst. Video Technol. 29(11), 3236\u20133246 (2019)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"3332_CR17","unstructured":"Kodak Lossless True Color Image Suite, https:\/\/r0k.us\/graphics\/kodak\/ (2025)"},{"key":"3332_CR18","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.ins.2021.12.092","volume":"589","author":"A Kouhi","year":"2022","unstructured":"A. Kouhi, M.H. Sedaaghi, Reversible data hiding based on high fidelity prediction scheme for reducing the number of invalid modifications. Inf. Sci. 589, 46\u201361 (2022)","journal-title":"Inf. Sci."},{"issue":"1","key":"3332_CR19","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/TII.2021.3085669","volume":"18","author":"J Li","year":"2022","unstructured":"J. Li, J. Chen, B. Sheng, P. Li, P. Yang, D.D. Feng, J. Qi, Automatic detection and classification system of domestic waste via multimodel cascaded convolutional neural network. IEEE Trans. Ind. Inf. 18(1), 163\u2013173 (2022)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"3332_CR20","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.ins.2020.12.002","volume":"553","author":"Q Li","year":"2021","unstructured":"Q. Li, X. Wang, X. Wang, B. Ma, C. Wang, Y. Shi, An encrypted coverless information hiding method based on generative models. Inf. Sci. 553, 19\u201330 (2021)","journal-title":"Inf. Sci."},{"issue":"6","key":"3332_CR21","doi-asserted-by":"publisher","first-page":"2181","DOI":"10.1109\/TIP.2013.2246179","volume":"22","author":"X Li","year":"2013","unstructured":"X. Li, B. Li, B. Yang, T. Zeng, General framework to histogram-shifting-based reversible data hiding. IEEE Trans. Image Process. 22(6), 2181\u20132191 (2013)","journal-title":"IEEE Trans. Image Process."},{"issue":"9","key":"3332_CR22","doi-asserted-by":"publisher","first-page":"2016","DOI":"10.1109\/TIFS.2015.2444354","volume":"10","author":"X Li","year":"2015","unstructured":"X. Li, W. Zhang, X. Gui, B. Yang, Efficient reversible data hiding based on multiple histograms modification. IEEE Trans. Inf. Forensics Secur. 10(9), 2016\u20132027 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"3332_CR23","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1109\/TIFS.2009.2035975","volume":"5","author":"L Luo","year":"2010","unstructured":"L. Luo, Z. Chen, M. Chen, X. Zeng, Z. Xiong, Reversible image watermarking using interpolation technique. IEEE Trans. Inf. Forensics Secur. 5(1), 187\u2013193 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"3332_CR24","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.jvcir.2019.03.017","volume":"61","author":"T Luo","year":"2019","unstructured":"T. Luo, G. Jiang, M. Yu, C. Zhong, H. Xu, Z. Pan, Convolutional neural networks-based stereo image reversible data hiding method. J. Vis. Commun. Image Represent. 61, 61\u201373 (2019)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"3332_CR25","unstructured":"W. Luo, Y. Li, R. Urtasun, R. Zemel, Understanding the effective receptive field in deep convolutional neural networks, Adv. Neural Inf. Process. Syst. 29, (2016)"},{"issue":"12","key":"3332_CR26","doi-asserted-by":"publisher","first-page":"17569","DOI":"10.1007\/s11042-021-10532-9","volume":"80","author":"B Ma","year":"2021","unstructured":"B. Ma, J. Hou, C. Wang, X. Wu, Y. Shi, A reversible data hiding algorithm for audio files based on code division multiplexing. Multimed. Tools Appl. 80(12), 17569\u201317581 (2021)","journal-title":"Multimed. Tools Appl."},{"issue":"3","key":"3332_CR27","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Z. Ni, Y. Shi, N. Ansari, W. Su, Reversible data hiding. IEEE Trans. Circ. Syst. Video Technol. 16(3), 354\u2013362 (2006)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"7","key":"3332_CR28","doi-asserted-by":"publisher","first-page":"2176","DOI":"10.1109\/TCSVT.2018.2859792","volume":"29","author":"B Ou","year":"2019","unstructured":"B. Ou, X. Li, W. Zhang, Y. Zhao, Improving pairwise PEE via hybrid-dimensional histogram generation and adaptive mapping selection. IEEE Trans. Circ. Syst. Video Technol. 29(7), 2176\u20132190 (2019)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"10","key":"3332_CR29","doi-asserted-by":"publisher","first-page":"2700","DOI":"10.1016\/j.jss.2013.05.077","volume":"86","author":"B Ou","year":"2013","unstructured":"B. Ou, X. Li, Y. Zhao, R. Ni, Reversible data hiding based on PDE predictor. J. Syst. Softw. 86(10), 2700\u20132709 (2013)","journal-title":"J. Syst. Softw."},{"issue":"12","key":"3332_CR30","doi-asserted-by":"publisher","first-page":"5010","DOI":"10.1109\/TIP.2013.2281422","volume":"22","author":"B Ou","year":"2013","unstructured":"B. Ou, X. Li, Y. Zhao, R. Ni, Y.Q. Shi, Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans. Image Process. 22(12), 5010\u20135021 (2013)","journal-title":"IEEE Trans. Image Process."},{"issue":"8","key":"3332_CR31","doi-asserted-by":"publisher","first-page":"2329","DOI":"10.1109\/TCSVT.2019.2921812","volume":"30","author":"B Ou","year":"2020","unstructured":"B. Ou, Y. Zhao, High capacity reversible data hiding based on multiple histograms modification. IEEE Trans. Circ. Syst. Video Technol. 30(8), 2329\u20132342 (2020)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"3332_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123270","volume":"246","author":"P Ping","year":"2024","unstructured":"P. Ping, J. Huo, B. Guo, Novel asymmetric CNN-based and adaptive mean predictors for reversible data hiding in encrypted images. Expert Syst. Appl. 246, 123270 (2024)","journal-title":"Expert Syst. Appl."},{"issue":"8","key":"3332_CR33","doi-asserted-by":"publisher","first-page":"2300","DOI":"10.1109\/TCSVT.2019.2942489","volume":"30","author":"W Qi","year":"2020","unstructured":"W. Qi, X. Li, T. Zhang, Z. Guo, Optimal reversible data hiding scheme based on multiple histograms modification. IEEE Trans. Circ. Syst. Video Technol. 30(8), 2300\u20132312 (2020)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"3332_CR34","doi-asserted-by":"publisher","DOI":"10.3390\/e27020159","volume":"27","author":"Y Qiu","year":"2025","unstructured":"Y. Qiu, W. Peng, X. Lin, Improved CNN prediction based reversible data hiding for images. Entropy 27, 159 (2025)","journal-title":"Entropy"},{"issue":"1","key":"3332_CR35","volume":"2010","author":"R Caldelli","year":"2010","unstructured":"R. Caldelli, F. Filippini, R. Becarelli, Reversible watermarking techniques: an overview and a classification. EURASIP J. Inf. Secur. 2010(1), 134546 (2010)","journal-title":"EURASIP J. Inf. Secur."},{"issue":"7","key":"3332_CR36","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1109\/TCSVT.2009.2020257","volume":"19","author":"V Sachnev","year":"2009","unstructured":"V. Sachnev, H.J. Kim, J. Nam, S. Suresh, Y.Q. Shi, Reversible watermarking algorithm using sorting and prediction. IEEE Trans. Circ. Syst. Video Technol. 19(7), 989\u2013999 (2009)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"1","key":"3332_CR37","volume":"21","author":"AK Sahu","year":"2019","unstructured":"A.K. Sahu, G. Swain, Reversible image steganography using dual-layer LSB matching. Sens. Imag. 21(1), 1 (2019)","journal-title":"Sens. Imag."},{"key":"3332_CR38","doi-asserted-by":"publisher","first-page":"3210","DOI":"10.1109\/ACCESS.2016.2573308","volume":"4","author":"YQ Shi","year":"2016","unstructured":"Y.Q. Shi, X. Li, X. Zhang, H.T. Wu, B. Ma, Reversible data hiding: advances in the past two decades. IEEE Access 4, 3210\u20133237 (2016)","journal-title":"IEEE Access"},{"issue":"3","key":"3332_CR39","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1109\/TKDE.2018.2837745","volume":"31","author":"Z Tang","year":"2019","unstructured":"Z. Tang, L. Chen, X. Zhang, S. Zhang, Robust image hashing with tensor decomposition. IEEE Trans. Knowl. Data Eng. 31(3), 549\u2013560 (2019)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"3","key":"3332_CR40","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1109\/TIP.2006.891046","volume":"16","author":"DM Thodi","year":"2007","unstructured":"D.M. Thodi, J.J. Rodriguez, Expansion embedding techniques for reversible watermarking. IEEE Trans. Image Process. 16(3), 721\u2013730 (2007)","journal-title":"IEEE Trans. Image Process."},{"issue":"8","key":"3332_CR41","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"J. Tian, Reversible data embedding using a difference expansion. IEEE Trans. Circ. Syst. Video Technol. 13(8), 890\u2013896 (2003)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"3332_CR42","unstructured":"USC SIPI Image Database, https:\/\/sipi.usc.edu\/database\/database.php."},{"issue":"8","key":"3332_CR43","doi-asserted-by":"publisher","first-page":"2313","DOI":"10.1109\/TCSVT.2019.2915584","volume":"30","author":"J Wang","year":"2020","unstructured":"J. Wang, X. Chen, J. Ni, N. Mao, Y. Shi, Multiple histograms-based reversible data hiding: framework and realization. IEEE Trans. Circ. Syst. Video Technol. 30(8), 2313\u20132328 (2020)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"3332_CR44","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.ins.2020.10.063","volume":"549","author":"S Weng","year":"2021","unstructured":"S. Weng, W. Tan, B. Ou, J. Pan, Reversible data hiding method for multi-histogram point selection based on improved crisscross optimization algorithm. Inf. Sci. 549, 13\u201333 (2021)","journal-title":"Inf. Sci."},{"issue":"12","key":"3332_CR45","doi-asserted-by":"publisher","first-page":"3000","DOI":"10.1016\/j.sigpro.2012.05.034","volume":"92","author":"H Wu","year":"2012","unstructured":"H. Wu, J. Huang, Reversible image watermarking on prediction errors by efficient histogram modification. Signal Process. 92(12), 3000\u20133009 (2012)","journal-title":"Signal Process."},{"key":"3332_CR46","doi-asserted-by":"publisher","first-page":"2627","DOI":"10.1109\/LSP.2022.3231193","volume":"29","author":"X Yang","year":"2022","unstructured":"X. Yang, F. Huang, New CNN-based predictor for reversible data hiding. IEEE Signal Process. Lett. 29, 2627\u20132631 (2022)","journal-title":"IEEE Signal Process. Lett."},{"key":"3332_CR47","doi-asserted-by":"publisher","DOI":"10.2352\/J.ImagingSci.Technol.2023.67.4.040408","author":"J Yuan","year":"2023","unstructured":"J. Yuan, H. Zheng, J. Ni, Reversible data hiding with neighboring-prediction-errors aided sorting and CNN prediction. J. Imag. Sci. Technol. (2023). https:\/\/doi.org\/10.2352\/J.ImagingSci.Technol.2023.67.4.040408","journal-title":"J. Imag. Sci. Technol."},{"issue":"7","key":"3332_CR48","doi-asserted-by":"publisher","first-page":"4174","DOI":"10.1109\/TCSVT.2021.3125711","volume":"32","author":"C Zhang","year":"2022","unstructured":"C. Zhang, B. Ou, Reversible data hiding based on multiple adaptive two-dimensional prediction-error histograms modification. IEEE Trans. Circ. Syst. Video Technol. 32(7), 4174\u20134187 (2022)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"8","key":"3332_CR49","first-page":"4005","volume":"44","author":"J Zhang","year":"2022","unstructured":"J. Zhang, D. Chen, J. Liao, W. Zhang, H. Feng, G. Hua, N. Yu, Deep model intellectual property protection via deep watermarking. IEEE Trans. Pattern Anal. Mach. Intell. 44(8), 4005\u20134020 (2022)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"3332_CR50","unstructured":"B. Zhou, A. Khosla, A. Lapedriza, A. Oliva, A. Torralba, Object detectors emerge in deep scene CNNs, arXiv e-prints arXiv:1412.6856 (2014)"}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-025-03332-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00034-025-03332-1","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-025-03332-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T10:03:00Z","timestamp":1774605780000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00034-025-03332-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,24]]},"references-count":50,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,3]]}},"alternative-id":["3332"],"URL":"https:\/\/doi.org\/10.1007\/s00034-025-03332-1","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"value":"0278-081X","type":"print"},{"value":"1531-5878","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,24]]},"assertion":[{"value":"11 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 August 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 August 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 September 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}