{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T17:37:12Z","timestamp":1773077832359,"version":"3.50.1"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2021,7,30]],"date-time":"2021-07-30T00:00:00Z","timestamp":1627603200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,7,30]],"date-time":"2021-07-30T00:00:00Z","timestamp":1627603200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["No: 61672124"],"award-info":[{"award-number":["No: 61672124"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund","award":["No: MMJJ20170203"],"award-info":[{"award-number":["No: MMJJ20170203"]}]},{"name":"Liaoning Province Science and Technology Innovation Leading Talents Program Project","award":["No: XLYC1802013"],"award-info":[{"award-number":["No: XLYC1802013"]}]},{"name":"Key R&D Projects of Liaoning Province","award":["No: 2019020105-JH2\/103"],"award-info":[{"award-number":["No: 2019020105-JH2\/103"]}]},{"name":"Jinan City \u201820 universities\u2019 Funding Projects Introducing Innovation Team Program","award":["No: 2019GXRC031"],"award-info":[{"award-number":["No: 2019GXRC031"]}]},{"name":"Research Fund of Guangxi Key Lab of Multi-source Information Mining & Security","award":["No: MIMS20-M-02"],"award-info":[{"award-number":["No: MIMS20-M-02"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Vis Comput"],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1007\/s00371-021-02224-0","type":"journal-article","created":{"date-parts":[[2021,7,31]],"date-time":"2021-07-31T01:51:09Z","timestamp":1627696269000},"page":"3831-3852","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["A new hybrid image encryption algorithm based on Gray code transformation and snake-like diffusion"],"prefix":"10.1007","volume":"38","author":[{"given":"Xingyuan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yining","family":"Su","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Chengye","family":"Zou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,30]]},"reference":[{"key":"2224_CR1","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.ins.2019.02.049","volume":"486","author":"XY Wang","year":"2019","unstructured":"Wang, X.Y., Feng, L., Zhao, H.Y.: Fast image encryption algorithm based on parallel computing system. Inf. Sci. 486, 340\u2013358 (2019)","journal-title":"Inf. Sci."},{"key":"2224_CR2","doi-asserted-by":"crossref","unstructured":"Farah M A B, Farah A, Farah T. An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dynamics, 2019: 1\u201324","DOI":"10.1007\/s11071-019-05413-8"},{"issue":"8","key":"2224_CR3","doi-asserted-by":"publisher","first-page":"4363","DOI":"10.1007\/s11042-015-2479-7","volume":"75","author":"Y Liu","year":"2016","unstructured":"Liu, Y., Wang, J., Fan, J., Gong, L.H.: Image encryption algorithm based on chaotic system and dynamic S-boxes composed of DNA sequences. Multimedia Tools and Applications 75(8), 4363\u20134382 (2016)","journal-title":"Multimedia Tools and Applications"},{"key":"2224_CR4","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1016\/j.ins.2020.10.031","volume":"550","author":"A Sahasrabuddhe","year":"2021","unstructured":"Sahasrabuddhe, A., Laiphrakpam, D.S.: Multiple images encryption based on 3D scrambling and hyper-chaotic system. Inf. Sci. 550, 252\u2013267 (2021)","journal-title":"Inf. Sci."},{"key":"2224_CR5","doi-asserted-by":"publisher","first-page":"106485","DOI":"10.1016\/j.optlaseng.2020.106485","volume":"139","author":"MA Midoun","year":"2021","unstructured":"Midoun, M.A., Wang, X., Talhaoui, M.Z.: A sensitive dynamic mutual encryption system based on a new 1D chaotic map. Opt Lasers Eng 139, 106485 (2021)","journal-title":"Opt Lasers Eng"},{"key":"2224_CR6","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.optlaseng.2014.12.025","volume":"68","author":"XY Wang","year":"2015","unstructured":"Wang, X.Y., Gu, S.X., Zhang, Y.Q.: Novel image encryption algorithm based on cycle shift and chaotic system. Opt. Lasers Eng. 68, 126\u2013134 (2015)","journal-title":"Opt. Lasers Eng."},{"key":"2224_CR7","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.ins.2019.08.041","volume":"507","author":"XY Wang","year":"2020","unstructured":"Wang, X.Y., Gao, S.: Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Inf. Sci. 507, 16\u201336 (2020)","journal-title":"Inf. Sci."},{"issue":"6","key":"2224_CR8","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. In J Bifurcat Chaos 8(6), 1259\u20131284 (1998)","journal-title":"In J Bifurcat Chaos"},{"issue":"3","key":"2224_CR9","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1007\/s11071-014-1235-2","volume":"76","author":"Y Zhang","year":"2014","unstructured":"Zhang, Y., Xiao, D., Wen, W., Li, M.: Breaking an image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Nonlinear Dyn. 76(3), 1645\u20131650 (2014)","journal-title":"Nonlinear Dyn."},{"issue":"2","key":"2224_CR10","doi-asserted-by":"publisher","first-page":"837","DOI":"10.1016\/j.cnsns.2010.05.008","volume":"16","author":"CQ Li","year":"2011","unstructured":"Li, C.Q., Li, S.J., Lo, K.T.: Breaking a modified substitution\u2013diffusion image cipher based on chaotic standard and logistic maps. Commun. Nonlinear Sci. Numer. Simul. 16(2), 837\u2013843 (2011)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"7","key":"2224_CR11","doi-asserted-by":"publisher","first-page":"1887","DOI":"10.1016\/j.cnsns.2009.07.007","volume":"15","author":"R Rhouma","year":"2010","unstructured":"Rhouma, R., Solak, E., Belghith, S.: Cryptanalysis of a new substitution-diffusion based image cipher. Commun. Nonlinear Sci. Numer. Simul. 15(7), 1887\u20131892 (2010)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"2224_CR12","first-page":"24","volume":"79","author":"JAP Artiles","year":"2019","unstructured":"Artiles, J.A.P., Chaves, D.P.B., Pimentel, C.: Image encryption using block cipher and chaotic sequences. Sign Process: Image Commun 79, 24\u201331 (2019)","journal-title":"Sign Process: Image Commun"},{"issue":"6","key":"2224_CR13","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1016\/j.physleta.2005.05.040","volume":"343","author":"K Wang","year":"2005","unstructured":"Wang, K., Pei, W.J., Zou, L.H., Song, A.G., He, Z.Y.: On the security of 3D cat map based symmetric image encryption scheme. Phys. Lett. A 343(6), 432\u2013439 (2005)","journal-title":"Phys. Lett. A"},{"issue":"24","key":"2224_CR14","doi-asserted-by":"publisher","first-page":"5804","DOI":"10.1016\/j.optcom.2011.08.053","volume":"284","author":"X Wang","year":"2011","unstructured":"Wang, X., He, G.: Cryptanalysis on a novel image encryption method based on total shuffling scheme. Opt Communicat 284(24), 5804\u20135807 (2011)","journal-title":"Opt Communicat"},{"issue":"13","key":"2224_CR15","doi-asserted-by":"publisher","first-page":"4655","DOI":"10.1007\/s11042-013-1828-7","volume":"74","author":"AU Rehman","year":"2015","unstructured":"Rehman, A.U., Liao, X., Kulsoom, A., Abbas, S.A.: Selective encryption for gray images based on chaos and DNA complementary rules. Multimed Tools Applicat 74(13), 4655\u20134677 (2015)","journal-title":"Multimed Tools Applicat"},{"issue":"3","key":"2224_CR16","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1109\/TSMCB.2012.2210706","volume":"44","author":"YC Zhou","year":"2013","unstructured":"Zhou, Y.C., Panetta, K., Agaian, S., Chen, C.L.P.: (n, k, p)-Gray code for Image Systems. IEEE Transact On Cybernet 44(3), 515\u2013529 (2013)","journal-title":"IEEE Transact On Cybernet"},{"issue":"9","key":"2224_CR17","first-page":"34","volume":"28","author":"WX Ding","year":"2007","unstructured":"Ding, W.X., Lu, H.Z., Wang, H., Xie, J.B.: Fast Gray code sequence subsection scrambling video encryption algorithm based on chaos system. J Communicat 28(9), 34\u201339 (2007)","journal-title":"J Communicat"},{"issue":"4","key":"2224_CR18","first-page":"043011","volume":"28","author":"F Zhao","year":"2019","unstructured":"Zhao, F., Li, C., Liu, C., Song, Y.: Color image encryption algorithm based on hyperchaotic and security analysis. J Electr Imag 28(4), 043011 (2019)","journal-title":"J Electr Imag"},{"issue":"23","key":"2224_CR19","doi-asserted-by":"publisher","first-page":"30993","DOI":"10.1007\/s11042-018-6145-8","volume":"77","author":"BS Nabil","year":"2018","unstructured":"Nabil, B.S., Nahed, A., Kais, B., Mohsen, M.: A novel chaotic image cryptosystem based on DNA sequence operations and single neuron model. Multimed Tools Applicat 77(23), 30993\u201331019 (2018)","journal-title":"Multimed Tools Applicat"},{"key":"2224_CR20","doi-asserted-by":"publisher","first-page":"106355","DOI":"10.1016\/j.optlastec.2020.106355","volume":"132","author":"T Wang","year":"2020","unstructured":"Wang, T., Wang, M.: Hyperchaotic image encryption algorithm based on bit-level permutation and DNA encoding. Opt Laser Technol 132, 106355 (2020)","journal-title":"Opt Laser Technol"},{"issue":"2","key":"2224_CR21","doi-asserted-by":"publisher","first-page":"1925","DOI":"10.1007\/s11042-020-09672-1","volume":"80","author":"R Guesmi","year":"2021","unstructured":"Guesmi, R., Farah, M.A.B.: A new efficient medical image cipher based on hybrid chaotic map and DNA code. Multimed Tools Applicat 80(2), 1925\u20131944 (2021)","journal-title":"Multimed Tools Applicat"},{"key":"2224_CR22","doi-asserted-by":"publisher","first-page":"106333","DOI":"10.1016\/j.optlaseng.2020.106333","volume":"137","author":"OS Faragallah","year":"2021","unstructured":"Faragallah, O.S., El-sayed, H.S., Afifi, A., El-Shafai, W.: Efficient and secure opto-cryptosystem for color images using 2D logistic-based fractional Fourier transform. Opt Lasers Eng 137, 106333 (2021)","journal-title":"Opt Lasers Eng"},{"issue":"10","key":"2224_CR23","doi-asserted-by":"publisher","first-page":"2092","DOI":"10.1016\/j.optcom.2010.01.060","volume":"283","author":"J Lang","year":"2010","unstructured":"Lang, J., Tao, R., Wang, Y.: Image encryption based on the multiple-parameter discrete fractional Fourier transform and chaos function. Opt Communicat 283(10), 2092\u20132096 (2010)","journal-title":"Opt Communicat"},{"key":"2224_CR24","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.optlaseng.2015.09.007","volume":"78","author":"L Xu","year":"2016","unstructured":"Xu, L., Li, Z., Li, J., Hua, W.: A novel bit-level image encryption algorithm based on chaotic maps. Opt. Lasers Eng. 78, 17\u201325 (2016)","journal-title":"Opt. Lasers Eng."},{"issue":"1","key":"2224_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-020-02952-7","volume":"20","author":"X Liu","year":"2021","unstructured":"Liu, X., Xiao, D., Liu, C.: Three-level quantum image encryption based on Arnold transform and logistic map. Quantum Inf. Process. 20(1), 1\u201322 (2021)","journal-title":"Quantum Inf. Process."},{"key":"2224_CR26","doi-asserted-by":"crossref","unstructured":"Mansouri A, Wang X. Image encryption using shuffled Arnold map and multiple values manipulations. The Visual Computer, 2020: 1\u201312","DOI":"10.1007\/s00371-020-01791-y"},{"key":"2224_CR27","doi-asserted-by":"crossref","unstructured":"Xu J, Mou J, Liu J, Hao J. The image compression-encryption algorithm based on the compression sensing and fractional-order chaotic system. The Visual Computer, 2021: 1\u201318","DOI":"10.1007\/s00371-021-02085-7"},{"issue":"9","key":"2224_CR28","doi-asserted-by":"publisher","first-page":"12027","DOI":"10.1007\/s11042-018-6739-1","volume":"78","author":"C Pak","year":"2019","unstructured":"Pak, C., An, K., Jang, P., Kim, J., Kim, S.: A novel bit-level color image encryption using improved 1D chaotic map. Multimed Tools Applicat 78(9), 12027\u201312042 (2019)","journal-title":"Multimed Tools Applicat"},{"issue":"2","key":"2224_CR29","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1007\/s11071-018-4600-8","volume":"95","author":"SF Raza","year":"2019","unstructured":"Raza, S.F., Satpute, V.: A novel bit permutation-based image encryption algorithm. Nonlinear Dyn. 95(2), 859\u2013873 (2019)","journal-title":"Nonlinear Dyn."},{"key":"2224_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2018.11.010","volume":"478","author":"M Xu","year":"2019","unstructured":"Xu, M., Tian, Z.: A novel image cipher based on 3D bit matrix and latin cubes. Inf. Sci. 478, 1\u201314 (2019)","journal-title":"Inf. Sci."},{"issue":"6","key":"2224_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-018-1902-1","volume":"17","author":"N Zhou","year":"2018","unstructured":"Zhou, N., Chen, W., Yan, X., et al.: Bit-level quantum color image encryption scheme with quantum cross-exchange operation and hyper-chaotic system. Quantum Inf. Process. 17(6), 1\u201324 (2018)","journal-title":"Quantum Inf. Process."},{"key":"2224_CR32","first-page":"374","volume":"2004","author":"S Li","year":"2004","unstructured":"Li, S., Li, C., Chen, G., Zhang, D.: A general cryptanalysis of permutation-only multimedia encryption algorithms. IACR\u2019s Cryptol ePrint Arch: Rep 2004, 374 (2004)","journal-title":"IACR\u2019s Cryptol ePrint Arch: Rep"},{"issue":"2","key":"2224_CR33","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.1007\/s11071-014-1729-y","volume":"79","author":"XY Wang","year":"2015","unstructured":"Wang, X.Y., Wang, Q., Zhang, Y.Q.: A fast image algorithm based on rows and columns switch. Nonlinear Dyn. 79(2), 1141\u20131149 (2015)","journal-title":"Nonlinear Dyn."},{"issue":"2","key":"2224_CR34","doi-asserted-by":"publisher","first-page":"1319","DOI":"10.1007\/s11071-018-4426-4","volume":"94","author":"Z Li","year":"2018","unstructured":"Li, Z., Peng, C.G., Li, L.R., Zhu, X.Y.: A novel plaintext-related image encryption scheme using hyper-chaotic system. Nonlinear Dyn. 94(2), 1319\u20131333 (2018)","journal-title":"Nonlinear Dyn."},{"key":"2224_CR35","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.optlaseng.2014.11.017","volume":"67","author":"JX Chen","year":"2015","unstructured":"Chen, J.X., Zhu, Z.L., Fu, C., Yu, H., Zhang, L.B.: An efficient image encryption scheme using Gray code based permutation approach. Opt. Lasers Eng. 67, 191\u2013204 (2015)","journal-title":"Opt. Lasers Eng."},{"key":"2224_CR36","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1016\/j.optlaseng.2017.11.001","volume":"102","author":"JF Li","year":"2018","unstructured":"Li, J.F., Xiang, S.Y., Wang, H.N., Gong, J.K., Wen, A.J.: A novel image encryption algorithm based on synchronized random bit generated in cascade-coupled chaotic semiconductor ring lasers. Opt. Lasers Eng. 102, 170\u2013180 (2018)","journal-title":"Opt. Lasers Eng."},{"key":"2224_CR37","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1016\/j.sigpro.2018.02.028","volume":"148","author":"XJ Wu","year":"2018","unstructured":"Wu, X.J., Wang, K., Wang, X.Y., Kan, H.B., Kurths, J.: Color image DNA encryption using NCA map-based CML and one-time keys. Sign Procss. 148, 272\u2013287 (2018)","journal-title":"Sign Procss."},{"issue":"10","key":"2224_CR38","doi-asserted-by":"publisher","first-page":"12349","DOI":"10.1007\/s11042-017-4885-5","volume":"77","author":"XJ Wu","year":"2017","unstructured":"Wu, X.J., Kurths, J., Kan, H.B.: A robust and lossless DNA encryption scheme for color images. Multimed Tools Applicat 77(10), 12349\u201312376 (2017)","journal-title":"Multimed Tools Applicat"},{"key":"2224_CR39","doi-asserted-by":"publisher","first-page":"102470","DOI":"10.1016\/j.jisa.2020.102470","volume":"52","author":"KAK Patro","year":"2020","unstructured":"Patro, K.A.K., Soni, A., Netam, P.K., Acharya, B.: Multiple grayscale image encryption using cross-coupled chaotic maps. J Inform Secur Applicat 52, 102470 (2020)","journal-title":"J Inform Secur Applicat"},{"key":"2224_CR40","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.ijleo.2017.09.099","volume":"153","author":"X Liao","year":"2018","unstructured":"Liao, X., Hahsmi, M.A., Haider, R.: An efficient mixed inter-intra pixels substitution at 2bits-level for image encryption technique using DNA and chaos. Opt-Int J Light Elect Opt 153, 117\u2013134 (2018)","journal-title":"Opt-Int J Light Elect Opt"},{"issue":"1","key":"2224_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-020-78127-2","volume":"10","author":"G Ye","year":"2020","unstructured":"Ye, G., Jiao, K., Huang, X., Goi, B.M., Yap, W.S.: An image encryption scheme based on public key cryptosystem and quantum logistic map. Sci. Rep. 10(1), 1\u201319 (2020)","journal-title":"Sci. Rep."},{"issue":"1","key":"2224_CR42","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/s11071-018-4573-7","volume":"95","author":"S Hanis","year":"2019","unstructured":"Hanis, S., Amutha, R.: A fast double-keyed authenticated image encryption scheme using an improved chaotic map and a butterfly-like structure. Nonlinear Dyn. 95(1), 421\u2013432 (2019)","journal-title":"Nonlinear Dyn."},{"key":"2224_CR43","doi-asserted-by":"crossref","unstructured":"Al-Hazaimeh O M, Al-Jamal M F, Alhindawi N, Alhindawi N&Omari A. Image encryption algorithm based on Lorenz chaotic map with dynamic secret keys. Neur Comput Applicat, 2019, 31(7): 2395\u20132405","DOI":"10.1007\/s00521-017-3195-1"},{"key":"2224_CR44","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.ins.2020.06.030","volume":"539","author":"XY Wang","year":"2020","unstructured":"Wang, X.Y., Gao, S.: Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network. Inf. Sci. 539, 195\u2013214 (2020)","journal-title":"Inf. Sci."},{"key":"2224_CR45","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.ins.2021.04.013","volume":"569","author":"XY Wang","year":"2021","unstructured":"Wang, X.Y., Yang, J.J.: A privacy image encryption algorithm based on piecewise coupled map lattice with multi dynamic coupling coefficient. Inf. Sci. 569, 217\u2013240 (2021)","journal-title":"Inf. Sci."},{"key":"2224_CR46","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.1016\/j.ins.2020.09.055","volume":"547","author":"YJ Xian","year":"2021","unstructured":"Xian, Y.J., Wang, X.Y.: Fractal sorting matrix and its application on chaotic image encryption. Inf. Sci. 547, 1154\u20131169 (2021)","journal-title":"Inf. Sci."}],"container-title":["The Visual Computer"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-021-02224-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00371-021-02224-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-021-02224-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,5]],"date-time":"2023-02-05T11:03:26Z","timestamp":1675595006000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00371-021-02224-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,30]]},"references-count":46,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["2224"],"URL":"https:\/\/doi.org\/10.1007\/s00371-021-02224-0","relation":{},"ISSN":["0178-2789","1432-2315"],"issn-type":[{"value":"0178-2789","type":"print"},{"value":"1432-2315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,30]]},"assertion":[{"value":"20 June 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 July 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"The authors declare that they have no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}