{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T02:12:49Z","timestamp":1776823969955,"version":"3.51.2"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2023,2,16]],"date-time":"2023-02-16T00:00:00Z","timestamp":1676505600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,2,16]],"date-time":"2023-02-16T00:00:00Z","timestamp":1676505600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61771231"],"award-info":[{"award-number":["61771231"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1007\/s00500-023-07898-3","type":"journal-article","created":{"date-parts":[[2023,2,16]],"date-time":"2023-02-16T10:03:07Z","timestamp":1676541787000},"page":"12517-12538","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["An improved blind watermarking method facing dual color images based on Hadamard transform"],"prefix":"10.1007","volume":"27","author":[{"given":"Siyu","family":"Chen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8291-1435","authenticated-orcid":false,"given":"Qingtang","family":"Su","sequence":"additional","affiliation":[]},{"given":"Huanying","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,16]]},"reference":[{"key":"7898_CR2","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.jisa.2018.05.003","volume":"41","author":"FY Bakhsh","year":"2018","unstructured":"Bakhsh FY, Moghaddam ME (2018) A robust HDR images watermarking method using artificial bee colony algorithm. J Inf Secur Appl 41:12\u201327. https:\/\/doi.org\/10.1016\/j.jisa.2018.05.003","journal-title":"J Inf Secur Appl"},{"issue":"3","key":"7898_CR3","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"CK Chan","year":"2004","unstructured":"Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recognit 37(3):469\u2013474. https:\/\/doi.org\/10.1016\/j.patcog.2003.08.007","journal-title":"Pattern Recognit"},{"issue":"8","key":"7898_CR4","doi-asserted-by":"publisher","first-page":"3921","DOI":"10.1109\/TIP.2017.2706502","volume":"26","author":"C Chang","year":"2017","unstructured":"Chang C, Shen J (2017) Features classification forest: a novel development that is adaptable to robust blind watermarking techniques. IEEE Trans Image Process 26(8):3921\u20133935. https:\/\/doi.org\/10.1109\/TIP.2017.2706502","journal-title":"IEEE Trans Image Process"},{"key":"7898_CR5","doi-asserted-by":"publisher","first-page":"168231","DOI":"10.1016\/j.ijleo.2021.168231","volume":"249","author":"S Chen","year":"2022","unstructured":"Chen S, Su Q, Sun Y, Zhang X (2022) A blind color image watermarking method using the energy concentration principle of Hadamard matrix. Optik-Int J Light Electr Optics 249:168231. https:\/\/doi.org\/10.1016\/j.ijleo.2021.168231","journal-title":"Optik-Int J Light Electr Optics"},{"key":"7898_CR6","doi-asserted-by":"publisher","first-page":"2189","DOI":"10.1007\/s00371-021-02277-1","volume":"38","author":"S Chen","year":"2022","unstructured":"Chen S, Su Q, Wang H, Wang G (2022b) A high-efficiency blind watermarking method for double color image using Walsh Hadamard transform. Visual Comput 38:2189\u20132205. https:\/\/doi.org\/10.1007\/s00371-021-02277-1","journal-title":"Visual Comput"},{"key":"7898_CR7","unstructured":"Chen J, Yang F, Ma H, Lu Q (2016) Text watermarking method based on semantic role labeling. In: 2016 Third International conference on digital information processing, data mining, and wireless communications, pp. 117\u2013120"},{"key":"7898_CR8","doi-asserted-by":"publisher","first-page":"164562","DOI":"10.1016\/j.ijleo.2020.164562","volume":"208","author":"K Fares","year":"2020","unstructured":"Fares K, Amine K, Salah E (2020) A robust blind color image watermarking based on fourier transform domain. Optik-Int J Light Electr Optics 208:164562. https:\/\/doi.org\/10.1016\/j.ijleo.2020.164562","journal-title":"Optik-Int J Light Electr Optics"},{"key":"7898_CR9","doi-asserted-by":"publisher","first-page":"15705","DOI":"10.1007\/s11042-018-6851-2","volume":"78","author":"M Ghadi","year":"2019","unstructured":"Ghadi M, Laouamer L, Nana L, Pascu A (2019) A blind spatial domain-based image watermarking using texture analysis and association rules mining. Multimed Tools Appl 78:15705\u201315750. https:\/\/doi.org\/10.1007\/s11042-018-6851-2","journal-title":"Multimed Tools Appl"},{"key":"7898_CR10","doi-asserted-by":"publisher","first-page":"113225","DOI":"10.1016\/j.eswa.2020.113225","volume":"149","author":"L Hsu","year":"2020","unstructured":"Hsu L, Hu H (2020) Blind watermarking for color images using EMMQ based on QDFT. Expert Syst Appl 149:113225. https:\/\/doi.org\/10.1016\/j.eswa.2020.113225","journal-title":"Expert Syst Appl"},{"key":"7898_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TMM.2017.2721642","volume":"99","author":"M Hwang","year":"2017","unstructured":"Hwang M, Lee J, Lee M, Kang H (2017) SVD based adaptive QIM watermarking on stereo audio signals. IEEE Trans Multimedia 99:1\u20131. https:\/\/doi.org\/10.1109\/TMM.2017.2721642","journal-title":"IEEE Trans Multimedia"},{"key":"7898_CR12","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.inffus.2020.04.009","volume":"62","author":"A Kakkar","year":"2020","unstructured":"Kakkar A (2020) A survey on secure communication techniques for 5G wireless heterogeneous networks. Inf Fusion 62:89\u2013109","journal-title":"Inf Fusion"},{"issue":"2","key":"7898_CR13","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1109\/TIFS.2006.873652","volume":"1","author":"IG Karybali","year":"2006","unstructured":"Karybali IG, Berberidis K (2006) Efficient spatial image watermarking via new perceptual masking and blind detection schemes. IEEE Trans Inf Forensic Secur 1(2):256\u2013274. https:\/\/doi.org\/10.1109\/TIFS.2006.873652","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"1","key":"7898_CR14","doi-asserted-by":"publisher","first-page":"52","DOI":"10.3390\/sym12010052","volume":"12","author":"T Khanam","year":"2019","unstructured":"Khanam T, Dhar PK, Kowsar S, Kim JM (2019) Svd-based image watermarking using the fast walsh-Hadamard transform, key mapping, and coefficient ordering for ownership protection. Symmetry 12(1):52. https:\/\/doi.org\/10.3390\/sym12010052","journal-title":"Symmetry"},{"key":"7898_CR15","doi-asserted-by":"publisher","first-page":"102159","DOI":"10.1016\/j.adhoc.2020.102159","volume":"103","author":"CA Lara-Nino","year":"2020","unstructured":"Lara-Nino CA, Diaz-Perez A, Morales-Sandoval M (2020) Lightweight elliptic curve cryptography accelerator for internet of things applications. Ad Hoc Netw 103:102159. https:\/\/doi.org\/10.1016\/j.adhoc.2020.102159","journal-title":"Ad Hoc Netw"},{"key":"7898_CR16","doi-asserted-by":"publisher","first-page":"106319","DOI":"10.1016\/j.optlaseng","volume":"136","author":"W Li","year":"2021","unstructured":"Li W, Chang X, Yan A, Zhang H (2021) Asymmetric multiple image elliptic curve cryptography. Opt Lasers Eng 136:106319. https:\/\/doi.org\/10.1016\/j.optlaseng","journal-title":"Opt Lasers Eng"},{"key":"7898_CR17","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.ins.2020.11.020","volume":"551","author":"YM Li","year":"2021","unstructured":"Li YM, Wei D, Zhang L (2021b) Double-encrypted watermarking method based on cosine transform and fractional Fourier transform in invariant wavelet domain. Inf Sci 551:205\u2013227. https:\/\/doi.org\/10.1016\/j.ins.2020.11.020","journal-title":"Inf Sci"},{"key":"7898_CR18","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.eswa.2017.12.003","volume":"97","author":"Y Liu","year":"2018","unstructured":"Liu Y, Tang S, Liu R, Zhang L, Ma Z (2018) Secure and robust digital image watermarking scheme using logistic and RSA encryption. Expert Syst Appl 97:95\u2013105. https:\/\/doi.org\/10.1016\/j.eswa.2017.12.003","journal-title":"Expert Syst Appl"},{"issue":"1","key":"7898_CR19","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1109\/TNSE.2018.2881152","volume":"7","author":"Y Liu","year":"2020","unstructured":"Liu Y, Ma M, Liu X, Xiong Neal N, Liu A, Zhu Y (2020) Design and analysis of probing route to defense sink-hole attacks for Internet of things security. IEEE Trans Netw Sci Eng 7(1):356\u2013372. https:\/\/doi.org\/10.1109\/TNSE.2018.2881152","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"7898_CR20","doi-asserted-by":"publisher","first-page":"114540","DOI":"10.1016\/j.eswa.2020.114540","volume":"170","author":"D Liu","year":"2021","unstructured":"Liu D, Su Q, Yuan Z, Zhang X (2021) A fusion-domain color image watermarking based on Haar transform and image correction. Expert Syst Appl 170:114540. https:\/\/doi.org\/10.1016\/j.eswa.2020.114540","journal-title":"Expert Syst Appl"},{"key":"7898_CR21","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.jvcir.2019.03.017","volume":"61","author":"T Luo","year":"2019","unstructured":"Luo T, Jiang G, Yu M, Zhong C, Xu H, Pan Z (2019) Convolutional neural networks-based stereo image reversible data hiding method. J Vis Commun Image Represent 61:61\u201373. https:\/\/doi.org\/10.1016\/j.jvcir.2019.03.017","journal-title":"J Vis Commun Image Represent"},{"key":"7898_CR22","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1016\/j.compeleceng.2018.03.007","volume":"72","author":"VM Manikandan","year":"2018","unstructured":"Manikandan VM, Masilamani V (2018) Histogram shifting-based blind watermarking scheme for copyright protection in 5G. Comput Electr Eng 72:614\u2013630. https:\/\/doi.org\/10.1016\/j.compeleceng.2018.03.007","journal-title":"Comput Electr Eng"},{"key":"7898_CR23","doi-asserted-by":"crossref","unstructured":"Meenakshi K, Rao CS, Prasad KS (2014) A Robust watermarking scheme based on Walsh-Hadamard Transform and SVD using zig-zag scanning. In: IEEE\/2014 international conference on information technology, pp. 167\u2013172","DOI":"10.1109\/ICIT.2014.53"},{"key":"7898_CR24","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.ijleo.2019.164152","volume":"47","author":"M Moosazadeh","year":"2019","unstructured":"Moosazadeh M, Ekbatanifard G (2019) A new DCT-based robust image watermarking method using teaching-learning-Based optimization. J Inf Secur Appl 47:28\u201338. https:\/\/doi.org\/10.1016\/j.ijleo.2019.164152","journal-title":"J Inf Secur Appl"},{"issue":"8","key":"7898_CR25","doi-asserted-by":"publisher","first-page":"3568","DOI":"10.1016\/j.matpr.2021.08.090","volume":"49","author":"A Peeran","year":"2022","unstructured":"Peeran A, Shanavas A (2022) E-governance security via public key cryptography using elliptic curve cryptography. Mater Today: Processing 49(8):3568\u20133573. https:\/\/doi.org\/10.1016\/j.matpr.2021.08.090","journal-title":"Mater Today: Processing"},{"issue":"4","key":"7898_CR26","doi-asserted-by":"publisher","first-page":"46","DOI":"10.3390\/jimaging3040046","volume":"3","author":"SK Pullayikodi","year":"2017","unstructured":"Pullayikodi SK, Tarhuni N, Ahmed A, Shiginah FB (2017) Computationally efficient robust color image watermarking using fast walsh Hadamard transform. J Imag 3(4):46. https:\/\/doi.org\/10.3390\/jimaging3040046","journal-title":"J Imag"},{"issue":"6","key":"7898_CR27","doi-asserted-by":"publisher","first-page":"2736","DOI":"10.1109\/TDSC.2019.2962672","volume":"18","author":"T Qiao","year":"2021","unstructured":"Qiao T, Luo X, Wu T, Xu M, Qian Z (2021) Adaptive steganalysis based on statistical model of quantized DCT coefficients for JPEG images. IEEE Trans Depend Secur Comput 18(6):2736\u20132751. https:\/\/doi.org\/10.1109\/TDSC.2019.2962672","journal-title":"IEEE Trans Depend Secur Comput"},{"key":"7898_CR28","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1016\/j.sigpro.2017.03.033","volume":"138","author":"C Qin","year":"2017","unstructured":"Qin C, Ji P, Zhang X, Dong J, Wang J (2017) Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process 138:280\u2013293. https:\/\/doi.org\/10.1016\/j.sigpro.2017.03.033","journal-title":"Signal Process"},{"key":"7898_CR30","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-5779-1","volume-title":"The colour image processing handbook (optoelectronics, imaging and sensing)","author":"S Sangwine","year":"1998","unstructured":"Sangwine S, Horne R (1998) The colour image processing handbook (optoelectronics, imaging and sensing). Springer, New York"},{"key":"7898_CR31","doi-asserted-by":"publisher","first-page":"114414","DOI":"10.1016\/j.eswa.2020.114414","volume":"168","author":"Y Shen","year":"2021","unstructured":"Shen Y, Tang C, Xu M, Chen M, Lei Z (2021) A DWT-SVD based adaptive color multi-watermarking scheme for copyright protection using AMEF and PSO-GWO. Expert Syst Appl 168:114414. https:\/\/doi.org\/10.1016\/j.eswa.2020.114414","journal-title":"Expert Syst Appl"},{"key":"7898_CR32","unstructured":"University of southern California, signal and Inage processing institute, USCSIPI Image Database, (1997) last accessed 2019\/10\/20, http:\/\/sipi.usc.edu\/database\/"},{"key":"7898_CR33","first-page":"2409","volume":"8","author":"A Solis-Rosas","year":"2019","unstructured":"Solis-Rosas A, Canchola-Magdaleno S, Garca-Ramrez M (2019) An enhanced run length encoding using an elegant pairing function for medical image compression. Int J Comp Sci Softw Eng 8:2409\u20134285","journal-title":"Int J Comp Sci Softw Eng"},{"issue":"1","key":"7898_CR34","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s00500-017-2489-7","volume":"22","author":"Q Su","year":"2018","unstructured":"Su Q, Chen B (2018) Robust color image watermarking technique in the spatial domain. Soft Comput 22(1):91\u2013106. https:\/\/doi.org\/10.1007\/s00500-017-2489-7","journal-title":"Soft Comput"},{"issue":"1","key":"7898_CR35","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.sigpro.2013.06.025","volume":"94","author":"Q Su","year":"2014","unstructured":"Su Q, Niu Y, Wang G, Jia S, Yue J (2014) Color image blind watermarking scheme based on QR decomposition. Signal Process 94(1):219\u2013235. https:\/\/doi.org\/10.1016\/j.sigpro.2013.06.025","journal-title":"Signal Process"},{"key":"7898_CR36","doi-asserted-by":"publisher","DOI":"10.1007\/s11045-017-0487-7","author":"Q Su","year":"2018","unstructured":"Su Q, Wang G, Zhang X, Lv G, Chen B (2018) A new algorithm of blind color image watermarking based on LU decomposition. Multidimens Syst Signal Process. https:\/\/doi.org\/10.1007\/s11045-017-0487-7","journal-title":"Multidimens Syst Signal Process"},{"key":"7898_CR37","doi-asserted-by":"publisher","first-page":"1792","DOI":"10.1016\/j.optcom.2011.12.065","volume":"285","author":"Q Su","year":"2020","unstructured":"Su Q, Niu Y, Liu X, Zhu Y (2020a) Embedding color watermarks in color images based on Schur decomposition. Opt Commun 285:1792\u20131802. https:\/\/doi.org\/10.1016\/j.optcom.2011.12.065","journal-title":"Opt Commun"},{"key":"7898_CR38","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/s00500-019-03924-5","volume":"24","author":"Q Su","year":"2020","unstructured":"Su Q, Zhang X, Wang G (2020b) An improved watermarking method for color image using Schur decomposition. Soft Comput 24:445\u2013460. https:\/\/doi.org\/10.1007\/s00500-019-03924-5","journal-title":"Soft Comput"},{"key":"7898_CR39","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1016\/j.ins.2022.05.046","volume":"606","author":"Q Su","year":"2022","unstructured":"Su Q, Liu D, Sun Y (2022a) A robust adaptive blind color image watermarking for resisting geometric attacks. Inf Sci 606:194\u2013212. https:\/\/doi.org\/10.1016\/j.ins.2022.05.046","journal-title":"Inf Sci"},{"key":"7898_CR40","doi-asserted-by":"publisher","DOI":"10.1002\/int.22893","author":"Q Su","year":"2022","unstructured":"Su Q, Sun Y, Zhang X, Wang H, Wang G, Yao T (2022b) A watermarking scheme for dual color images based on URV decomposition and image correction. Int J Intell Syst. https:\/\/doi.org\/10.1002\/int.22893","journal-title":"Int J Intell Syst"},{"key":"7898_CR41","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.neucom.2016.05.098","volume":"213","author":"J Sun","year":"2016","unstructured":"Sun J, Liu X, Wan W, Li J, Zhao D, Zhang H (2016) Video hashing based on appearance and attention features fusion via DBN. Neurocomputing 213:84\u201394. https:\/\/doi.org\/10.1016\/j.neucom.2016.05.098","journal-title":"Neurocomputing"},{"key":"7898_CR42","doi-asserted-by":"publisher","first-page":"6091","DOI":"10.1007\/s11042-021-11815-x","volume":"81","author":"Y Sun","year":"2022","unstructured":"Sun Y, Su Q, Wang H, Wang G (2022) A blind dual color images watermarking based on quaternion singular value decomposition. Multimed Tools Appl 81:6091\u20136113. https:\/\/doi.org\/10.1007\/s11042-021-11815-x","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"7898_CR43","doi-asserted-by":"publisher","first-page":"2224","DOI":"10.1016\/j.eswa.2014.09.055","volume":"42","author":"A Tareef","year":"2015","unstructured":"Tareef A, Al-Ani A (2015) A highly secure oblivious sparse coding-based watermarking system for ownership verification. Expert Syst Appl 42(4):2224\u20132233. https:\/\/doi.org\/10.1016\/j.eswa.2014.09.055","journal-title":"Expert Syst Appl"},{"key":"7898_CR44","unstructured":"University of Granada, Computer Vision Group, CVG-UGR Image Database (2002) last Accessed 2019\/10\/20, http:\/\/decsai.ugr.es\/cvg\/dbimagenes\/c512.php"},{"key":"7898_CR45","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.neucom.2022.02.083","volume":"488","author":"W Wan","year":"2022","unstructured":"Wan W, Wang J, Zhang Y, Li J, Yu H, Sun J (2022) A comprehensive survey on robust image watermarking. Neurocomputing 488:226\u2013247. https:\/\/doi.org\/10.1016\/j.neucom.2022.02.083","journal-title":"Neurocomputing"},{"issue":"4","key":"7898_CR46","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612. https:\/\/doi.org\/10.1109\/TIP.2003.819861","journal-title":"IEEE Trans Image Process"},{"key":"7898_CR47","doi-asserted-by":"publisher","first-page":"164152","DOI":"10.1016\/j.ijleo.2019.164152","volume":"204","author":"Z Yuan","year":"2020","unstructured":"Yuan Z, Liu D, Zhang X, Su Q (2020) New image blind watermarking method based on two-dimensional Discrete Cosine Transform. Optik-Int J Light Electr Optics 204:164152. https:\/\/doi.org\/10.1016\/j.ijleo.2019.164152","journal-title":"Optik-Int J Light Electr Optics"},{"key":"7898_CR48","doi-asserted-by":"publisher","first-page":"126568","DOI":"10.1016\/j.optcom.2020.126568","volume":"482","author":"S Yuan","year":"2021","unstructured":"Yuan S, Magayane D, Liu X, Zhou X, Lu G, Wang Z, Zhang H, Li Z (2021) A blind watermarking scheme based on computational ghost imaging in wavelet domain. Opt Commun 482:126568. https:\/\/doi.org\/10.1016\/j.optcom.2020.126568","journal-title":"Opt Commun"},{"key":"7898_CR49","doi-asserted-by":"publisher","first-page":"7053","DOI":"10.1002\/int.22580","volume":"36","author":"Y Zhang","year":"2021","unstructured":"Zhang Y, Wang Z, Zhan Y, Meng L, Sun J, Wan W (2021) JND-aware robust image watermarking with tri-directional inter-block correlation. Int J Intell Syst 36:7053\u20137079. https:\/\/doi.org\/10.1002\/int.22580","journal-title":"Int J Intell Syst"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-023-07898-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-023-07898-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-023-07898-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T13:05:25Z","timestamp":1689944725000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-023-07898-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,16]]},"references-count":47,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["7898"],"URL":"https:\/\/doi.org\/10.1007\/s00500-023-07898-3","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2,16]]},"assertion":[{"value":"1 February 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 February 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}