{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T16:40:46Z","timestamp":1778344846731,"version":"3.51.4"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T00:00:00Z","timestamp":1737590400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T00:00:00Z","timestamp":1737590400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Vis Comput"],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s00371-024-03791-8","type":"journal-article","created":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T00:53:03Z","timestamp":1737593583000},"page":"7049-7061","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Deepfake face detection via multi-level discrete wavelet transform and vision transformer"],"prefix":"10.1007","volume":"41","author":[{"given":"Main","family":"Uddin","sequence":"first","affiliation":[]},{"given":"Zhangjie","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Xiang","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,23]]},"reference":[{"key":"3791_CR1","doi-asserted-by":"crossref","unstructured":"Chaitra, B., Bhaskar Reddy, P. V.: A Study on Digital Image Forgery Techniques and its Detection. In: Proceedings of the 4th International Conference on Contemporary Computing and Informatics, IC3I 2019 (2019)","DOI":"10.1109\/IC3I46837.2019.9055573"},{"key":"3791_CR2","doi-asserted-by":"crossref","unstructured":"Qian, Y., Yin, G., Sheng, L., Chen, Z., & Shao, J. (2020). Thinking in frequency: face forgery detection by mining frequency-aware clues. In European conference on computer vision (pp. 86-103). Springer International Publishing, Cham, USA","DOI":"10.1007\/978-3-030-58610-2_6"},{"key":"3791_CR3","doi-asserted-by":"crossref","unstructured":"Chen, S., Yao, T., Chen, Y., Ding, S., Li, J., Ji, R.: Local relation learning for face forgery detection. In: 35th AAAI Conference on Artificial Intelligence, AAAI 2021 (2021)","DOI":"10.1609\/aaai.v35i2.16193"},{"key":"3791_CR4","doi-asserted-by":"crossref","unstructured":"Liu, H., Li, X., Zhou, W., Chen, Y., He, Y., Xue, H., Zhang, W., Yu, N.: Spatial-phase shallow learning: rethinking face forgery detection in frequency domain. In: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (2021)","DOI":"10.1109\/CVPR46437.2021.00083"},{"key":"3791_CR5","doi-asserted-by":"crossref","unstructured":"Liu, J., Wang, J., Zhang, P., Wang, C., Xie, D., & Pu, S.: Multi-scale wavelet transformer for face forgery detection. In Proceedings of the Asian Conference on Computer Vision (pp. 1858-1874) (2022).","DOI":"10.1007\/978-3-031-26351-4_4"},{"key":"3791_CR6","unstructured":"Dosovitskiy, A., Beyer, L., Kolesnikov, A., Weissenborn, D., Zhai, X., Unterthiner, T., Dehghani, M., Minderer, M., Heigold, G., Gelly, S., Uszkoreit, J., Houlsby, N.: An Image is Worth 16x16 Words: Transformers for Image Recognition at Scale, (2021)"},{"key":"3791_CR7","doi-asserted-by":"publisher","unstructured":"Haar, A.: Zur Theorie der orthogonalen Funktionensysteme - Erste Mitteilung. Math Ann. 69, (1910). https:\/\/doi.org\/10.1007\/BF01456326","DOI":"10.1007\/BF01456326"},{"issue":"5","key":"3791_CR8","doi-asserted-by":"publisher","first-page":"1304","DOI":"10.1587\/transinf.E97.D.1304","volume":"97","author":"SJ Ryu","year":"2014","unstructured":"Ryu, S.J., Lee, H.Y., Lee, H.K.: Detecting trace of seam carving for forensic analysis. IEICE Trans. Inf. Syst. 97(5), 1304\u20131311 (2014)","journal-title":"IEICE Trans. Inf. Syst."},{"key":"3791_CR9","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1109\/TIFS.2013.2272377","volume":"8","author":"S-J Ryu","year":"2013","unstructured":"Ryu, S.-J., Kirchner, M., Lee, M.-J., Lee, H.-K.: Rotation invariant localization of duplicated image regions based on zernike moments. IEEE Trans. Inf. Forensics Secur. 8, 1355\u20131370 (2013). https:\/\/doi.org\/10.1109\/TIFS.2013.2272377","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"3791_CR10","doi-asserted-by":"publisher","first-page":"1826","DOI":"10.1109\/TCSVT.2016.2539828","volume":"27","author":"J-U Hou","year":"2017","unstructured":"Hou, J.-U., Lee, H.-K.: Detection of hue modification using photo response nonuniformity. IEEE Trans. Circuits Syst. Video Technol. 27, 1826\u20131832 (2017). https:\/\/doi.org\/10.1109\/TCSVT.2016.2539828","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"1","key":"3791_CR11","doi-asserted-by":"publisher","first-page":"e25","DOI":"10.1561\/116.00000069","volume":"12","author":"C Kong","year":"2023","unstructured":"Kong, C., Wang, S., Li, H.: Digital and physical face attacks: reviewing and one step further. APSIPA Trans Signal Inf Process 12(1), e25 (2023). https:\/\/doi.org\/10.1561\/116.00000069","journal-title":"APSIPA Trans Signal Inf Process"},{"issue":"10","key":"3791_CR12","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1016\/j.imavis.2009.02.001","volume":"27","author":"B Mahdian","year":"2009","unstructured":"Mahdian, B., Saic, S.: Using noise inconsistencies for blind image forensics. Image Vis. Comput. 27(10), 1497\u20131503 (2009). https:\/\/doi.org\/10.1016\/j.imavis.2009.02.001","journal-title":"Image Vis. Comput."},{"issue":"10","key":"3791_CR13","doi-asserted-by":"publisher","first-page":"3948","DOI":"10.1109\/TSP.2005.855406","volume":"53","author":"AC Popescu","year":"2005","unstructured":"Popescu, A.C., Farid, H.: Exposing digital forgeries in color filter array interpolated images. IEEE Trans. Signal Process. 53(10), 3948\u20133959 (2005). https:\/\/doi.org\/10.1109\/TSP.2005.855406","journal-title":"IEEE Trans. Signal Process."},{"key":"3791_CR14","unstructured":"Worth: A picture \u2018 s worth,Digital Image Analysis and Forensics. Solutions. (2007)"},{"key":"3791_CR15","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/j.patcog.2018.03.028","volume":"81","author":"X Bi","year":"2018","unstructured":"Bi, X., Pun, C.-M.: Fast copy-move forgery detection using local bidirectional coherency error refinement. Pattern Recognit. 81, 161\u2013175 (2018). https:\/\/doi.org\/10.1016\/j.patcog.2018.03.028","journal-title":"Pattern Recognit."},{"key":"3791_CR16","doi-asserted-by":"publisher","first-page":"1741","DOI":"10.1109\/TIFS.2022.3169921","volume":"17","author":"C Kong","year":"2022","unstructured":"Kong, C., Chen, B., Li, H., Wang, S., Rocha, A., Kwong, S.: Detect and locate: exposing face manipulation by semantic- and noise-level telltales. IEEE Trans. Inf Forensics Sec 17, 1741\u20131756 (2022). https:\/\/doi.org\/10.1109\/TIFS.2022.3169921","journal-title":"IEEE Trans. Inf Forensics Sec"},{"key":"3791_CR17","doi-asserted-by":"crossref","unstructured":"Zhao, H., Zhou, W., Chen, D., Wei, T., Zhang, W., Yu, N.: Multi-attentional deepfake detection. In: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (2021)","DOI":"10.1109\/CVPR46437.2021.00222"},{"key":"3791_CR18","doi-asserted-by":"crossref","unstructured":"Zhao, T., Xu, X., Xu, M., Ding, H., Xiong, Y., Xia, W.: Learning to recognize patch-wise consistency for deepfake detection [V1]. ICCV 2021. (2021)","DOI":"10.1109\/ICCV48922.2021.01475"},{"key":"3791_CR19","doi-asserted-by":"crossref","unstructured":"Sun, K., Liu, H., Ye, Q., Gao, Y., Liu, J., Shao, L., Ji, R.: Domain general face forgery detection by learning to weight. In: 35th AAAI Conference on Artificial Intelligence, AAAI 2021 (2021)","DOI":"10.1609\/aaai.v35i3.16367"},{"key":"3791_CR20","unstructured":"Wodajo, D., Atnafu, S.: Deepfake video detection using convolutional vision transformer. CoRR. abs\/2102.11126, (2021)"},{"key":"3791_CR21","doi-asserted-by":"crossref","unstructured":"Chollet, F.: Xception: Deep learning with depthwise separable convolutions. In: Proceedings - 30th IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2017 (2017)","DOI":"10.1109\/CVPR.2017.195"},{"key":"3791_CR22","doi-asserted-by":"publisher","first-page":"119361","DOI":"10.1016\/j.eswa.2022.119361","volume":"215","author":"Z Guo","year":"2023","unstructured":"Guo, Z., Yang, G., Zhang, D., Xia, M.: Rethinking gradient operator for exposing AI-enabled face forgeries. Expert Syst. Appl. 215, 119361 (2023). https:\/\/doi.org\/10.1016\/j.eswa.2022.119361","journal-title":"Expert Syst. Appl."},{"key":"3791_CR23","doi-asserted-by":"crossref","unstructured":"Li, L., Bao, J., Zhang, T., Yang, H., Chen, D., Wen, F., Guo, B.: Face X-ray for more general face forgery detection. In: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (2020)","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"3791_CR24","doi-asserted-by":"crossref","unstructured":"Kong, C., Li, H., Wang, S.: Enhancing General Face Forgery Detection via Vision Transformer with Low-Rank Adaptation. In: Proceedings - 2023 IEEE 6th International Conference on Multimedia Information Processing and Retrieval, MIPR 2023 (2023)","DOI":"10.1109\/MIPR59079.2023.00033"},{"key":"3791_CR25","doi-asserted-by":"crossref","unstructured":"Gao Caili and Qiao, P. and D.Y. and X.Q. and Q.X. and L.W.: Spatial and\u00a0Frequency Domains Inconsistency Learning for\u00a0Face Forgery Detection. In: Luo Biao and Cheng, L. and W.Z.-G. and L.H. and L.C. (ed.) Neural Information Processing. pp. 528\u2013542. Springer Nature Singapore, Singapore (2024)","DOI":"10.1007\/978-981-99-8148-9_41"},{"key":"3791_CR26","doi-asserted-by":"crossref","unstructured":"Jeevan, P., Viswanathan, K., S, A.A., Sethi, A.: WaveMix: A resource-efficient neural network for image analysis, (2024)","DOI":"10.1109\/WACV57701.2024.00578"},{"key":"3791_CR27","unstructured":"Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A.N., Kaiser, \u0141., Polosukhin, I.: Attention is all you need. In: Advances in Neural Information Processing Systems (2017)"},{"key":"3791_CR28","unstructured":"Chen, J., Lu, Y., Yu, Q., Luo, X., Adeli, E., Wang, Y., Lu, L., Yuille, A., Zhou, Y.: TransUNet: transformers make strong encoders for medical image segmentation, (2021)"},{"key":"3791_CR29","doi-asserted-by":"crossref","unstructured":"Chen, C.F., Fan, Q., Panda, R.: CrossViT: Cross-Attention Multi-Scale Vision Transformer for Image Classification. In: Proceedings of the IEEE International Conference on Computer Vision (2021)","DOI":"10.1109\/ICCV48922.2021.00041"},{"key":"3791_CR30","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-3-030-58452-8_13","volume-title":"Computer Vision \u2013 ECCV 2020: 16th European Conference, Glasgow, UK, August 23\u201328, 2020, Proceedings, Part I","author":"N Carion","year":"2020","unstructured":"Carion, N., Massa, F., Synnaeve, G., Usunier, N., Kirillov, A., Zagoruyko, S.: End-to-End Object Detection with Transformers. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) Computer Vision \u2013 ECCV 2020: 16th European Conference, Glasgow, UK, August 23\u201328, 2020, Proceedings, Part I, pp. 213\u2013229. Springer International Publishing, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58452-8_13"},{"key":"3791_CR31","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/TMM.2021.3120873","volume":"25","author":"X Lin","year":"2023","unstructured":"Lin, X., Sun, S., Huang, W., Sheng, B., Li, P., Feng, D.D.: EAPT: efficient attention pyramid transformer for image processing. IEEE Trans. Multimed. 25, 50\u201361 (2023). https:\/\/doi.org\/10.1109\/TMM.2021.3120873","journal-title":"IEEE Trans. Multimed."},{"key":"3791_CR32","doi-asserted-by":"publisher","first-page":"110306","DOI":"10.1016\/j.knosys.2023.110306","volume":"263","author":"M Shao","year":"2023","unstructured":"Shao, M., Qiao, Y., Meng, D., Zuo, W.: Uncertainty-guided hierarchical frequency domain transformer for image restoration. Knowl.-Based Syst. 263, 110306 (2023). https:\/\/doi.org\/10.1016\/j.knosys.2023.110306","journal-title":"Knowl.-Based Syst."},{"key":"3791_CR33","doi-asserted-by":"publisher","first-page":"2183","DOI":"10.1109\/LSP.2022.3214768","volume":"29","author":"Z Tan","year":"2022","unstructured":"Tan, Z., Yang, Z., Miao, C., Guo, G.: Transformer-based feature compensation and aggregation for DeepFake detection. IEEE Signal Process. Lett. 29, 2183\u20132187 (2022). https:\/\/doi.org\/10.1109\/LSP.2022.3214768","journal-title":"IEEE Signal Process. Lett."},{"key":"3791_CR34","doi-asserted-by":"publisher","first-page":"1039","DOI":"10.1109\/TIFS.2022.3233774","volume":"18","author":"C Miao","year":"2023","unstructured":"Miao, C., Tan, Z., Chu, Q., Liu, H., Hu, H., Yu, N.: F2Trans: high-frequency fine-grained transformer for face forgery detection. IEEE Trans. Inf. Forensics Secur. 18, 1039\u20131051 (2023). https:\/\/doi.org\/10.1109\/TIFS.2022.3233774","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"8","key":"3791_CR35","doi-asserted-by":"publisher","first-page":"3647","DOI":"10.1007\/s00371-023-02938-3","volume":"39","author":"S Huang","year":"2023","unstructured":"Huang, S., Liu, X., Tan, T., Menghan, H., Wei, X., Chen, T., Sheng, B.: TransMRSR: transformer-based self-distilled generative prior for brain MRI super-resolution. Vis. Comput. 39(8), 3647\u20133659 (2023). https:\/\/doi.org\/10.1007\/s00371-023-02938-3","journal-title":"Vis. Comput."},{"key":"3791_CR36","unstructured":"Tan, M., Le, Q. V.: EfficientNet: Rethinking model scaling for convolutional neural networks. In: 36th International Conference on Machine Learning, ICML 2019 (2019)"},{"key":"3791_CR37","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/978-3-031-06433-3_19","volume-title":"Image Analysis and Processing \u2013 ICIAP 2022: 21st International Conference, Lecce, Italy, May 23\u201327, 2022, Proceedings, Part III","author":"DA Coccomini","year":"2022","unstructured":"Coccomini, D.A., Messina, N., Gennaro, C., Falchi, F.: Combining EfficientNet and\u00a0Vision Transformers for\u00a0Video Deepfake Detection. In: Sclaroff, S., Distante, C., Leo, M., Farinella, G.M., Tombari, F. (eds.) Image Analysis and Processing \u2013 ICIAP 2022: 21st International Conference, Lecce, Italy, May 23\u201327, 2022, Proceedings, Part III, pp. 219\u2013229. Springer International Publishing, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-06433-3_19"},{"key":"3791_CR38","doi-asserted-by":"crossref","unstructured":"Shah, D., Shah, D., Jodhawat, D., Parekh, J., Srivastava, K.: Xception Net & Vision Transformer: A comparative study for Deepfake Detection. In: Proceedings - 2022 International Conference on Machine Learning, Computer Systems and Security, MLCSS 2022 (2022)","DOI":"10.1109\/MLCSS57186.2022.00077"},{"key":"3791_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118423","volume":"210","author":"S Ganguly","year":"2022","unstructured":"Ganguly, S., Ganguly, A., Mohiuddin, S., Malakar, S., Sarkar, R.: ViXNet: vision transformer with Xception network for DeepFakes based video and image forgery detection. Expert Syst. Appl. 210, 118423 (2022). https:\/\/doi.org\/10.1016\/j.eswa.2022.118423","journal-title":"Expert Syst. Appl."},{"issue":"4","key":"3791_CR40","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1109\/83.563320","volume":"6","author":"M Malfait","year":"1997","unstructured":"Malfait, M., Roose, D.: Wavelet-based image denoising using a Markov random field a priori model. IEEE Trans. Image Process. 6(4), 549\u2013565 (1997). https:\/\/doi.org\/10.1109\/83.563320","journal-title":"IEEE Trans. Image Process."},{"key":"3791_CR41","doi-asserted-by":"crossref","unstructured":"Figueiredo, M., Nowak, R.: An EM algorithm for wavelet-based image restoration. Image Processing, IEEE \u2026. 12, (2003)","DOI":"10.1109\/TIP.2003.814255"},{"key":"3791_CR42","doi-asserted-by":"crossref","unstructured":"Ramamonjisoa, M., Firman, M., Watson, J., Lepetit, V., Turmukhambetov, D.: Single Image Depth Prediction with Wavelet Decomposition. In: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (2021)","DOI":"10.1109\/CVPR46437.2021.01094"},{"issue":"3-4","key":"3791_CR43","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/j.jag.2004.10.010","volume":"6","author":"W Shi","year":"2005","unstructured":"Shi, W., Zhu, C., Tian, Y., Nichol, J.: Wavelet-based image fusion and quality assessment. Int J Appl Earth Observ Geoinf 6(3\u20134), 241\u2013251 (2005). https:\/\/doi.org\/10.1016\/j.jag.2004.10.010","journal-title":"Int J Appl Earth Observ Geoinf"},{"issue":"2","key":"3791_CR44","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1109\/TMM.2017.2729021","volume":"20","author":"N Kumar","year":"2018","unstructured":"Kumar, N., Sethi, A.: Super resolution by comprehensively exploiting dependencies of wavelet coefficients. IEEE Trans. Multimedia 20(2), 298\u2013309 (2018). https:\/\/doi.org\/10.1109\/TMM.2017.2729021","journal-title":"IEEE Trans. Multimedia"},{"key":"3791_CR45","doi-asserted-by":"crossref","unstructured":"Yuan, L., Chen, Y., Wang, T., Yu, W., Shi, Y., Jiang, Z., Tay, F.E.H., Feng, J., Yan, S.: Tokens-to-Token ViT: Training Vision Transformers from Scratch on ImageNet. In: Proceedings of the IEEE International Conference on Computer Vision (2021)","DOI":"10.1109\/ICCV48922.2021.00060"},{"key":"3791_CR46","doi-asserted-by":"crossref","unstructured":"Li, Y., Yang, X., Sun, P., Qi, H., Lyu, S.: Celeb-DF: A Large-Scale Challenging Dataset for DeepFake Forensics. In: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (2020)","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"3791_CR47","doi-asserted-by":"crossref","unstructured":"Rossler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., Niessner, M.: FaceForensics++: Learning to detect manipulated facial images. In: Proceedings of the IEEE International Conference on Computer Vision (2019)","DOI":"10.1109\/ICCV.2019.00009"},{"key":"3791_CR48","doi-asserted-by":"crossref","unstructured":"Afchar, D., Nozick, V., Yamagishi, J., Echizen, I.: MesoNet: A compact facial video forgery detection network. In: 10th IEEE International Workshop on Information Forensics and Security, WIFS 2018 (2019)","DOI":"10.1109\/WIFS.2018.8630761"},{"issue":"10","key":"3791_CR49","doi-asserted-by":"publisher","first-page":"1499","DOI":"10.1109\/LSP.2016.2603342","volume":"23","author":"K Zhang","year":"2016","unstructured":"Zhang, K., Zhang, Z., Li, Z., Qiao, Y.: Joint face detection and alignment using multitask cascaded convolutional networks. IEEE Signal Process. Lett. 23(10), 1499\u20131503 (2016). https:\/\/doi.org\/10.1109\/LSP.2016.2603342","journal-title":"IEEE Signal Process. Lett."}],"container-title":["The Visual Computer"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-024-03791-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00371-024-03791-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-024-03791-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T03:56:57Z","timestamp":1757131017000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00371-024-03791-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,23]]},"references-count":49,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["3791"],"URL":"https:\/\/doi.org\/10.1007\/s00371-024-03791-8","relation":{},"ISSN":["0178-2789","1432-2315"],"issn-type":[{"value":"0178-2789","type":"print"},{"value":"1432-2315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,23]]},"assertion":[{"value":"30 December 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 January 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This declaration is not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}