{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T11:32:54Z","timestamp":1772191974894,"version":"3.50.1"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,1,19]],"date-time":"2024-01-19T00:00:00Z","timestamp":1705622400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,19]],"date-time":"2024-01-19T00:00:00Z","timestamp":1705622400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1007\/s10586-023-04226-0","type":"journal-article","created":{"date-parts":[[2024,1,19]],"date-time":"2024-01-19T20:02:02Z","timestamp":1705694522000},"page":"5355-5376","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Image pixels swapping encryption based on the TetraVex game and a publicly hash-sharing algorithm"],"prefix":"10.1007","volume":"27","author":[{"given":"Muhammad","family":"Hussain","sequence":"first","affiliation":[]},{"given":"Nadeem","family":"Iqbal","sequence":"additional","affiliation":[]},{"given":"Zia","family":"Bashir","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,19]]},"reference":[{"issue":"3","key":"4226_CR1","first-page":"216","volume":"1","author":"F Amounas","year":"2012","unstructured":"Amounas, F.: Elliptic curve digital signature algorithm using Boolean permutation based ECC. Int. J. Inform. Netw. Sec. 1(3), 216 (2012)","journal-title":"Int. J. Inform. Netw. Sec."},{"issue":"08","key":"4226_CR2","doi-asserted-by":"crossref","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. and Chaos 16(08), 2129\u20132151 (2006)","journal-title":"Int. J. Bifurc. and Chaos"},{"key":"4226_CR3","doi-asserted-by":"publisher","unstructured":"Arul, M.C., KarthigaiKumar, P.: Survey on image encryption schemes, bio cryptography and efficient encryption algorithms. Mob. Netw. Appl. (2018). https:\/\/doi.org\/10.1007\/s11036-018-1058-3","DOI":"10.1007\/s11036-018-1058-3"},{"key":"4226_CR4","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijleo.2022.168956","volume":"259","author":"SM Basha","year":"2022","unstructured":"Basha, S.M., Mathivanan, P., Ganesh, A.B.: Bit level color image encryption using Logistic Sine-Tent-Chebyshev (LSTC) map. Optik 259, 168956 (2022)","journal-title":"Optik"},{"issue":"1","key":"4226_CR5","doi-asserted-by":"crossref","first-page":"1029","DOI":"10.1007\/s11042-020-09695-8","volume":"80","author":"Z Bashir","year":"2021","unstructured":"Bashir, Z., Iqbal, N., Hanif, M.: A novel gray scale image encryption scheme based on pixels\u2019 swapping operation. Multimed. Tools Appl. 80(1), 1029\u20131054 (2021)","journal-title":"Multimed. Tools Appl."},{"key":"4226_CR6","doi-asserted-by":"crossref","first-page":"3867","DOI":"10.1007\/s11042-021-11687-1","volume":"81","author":"Z Bashir","year":"2022","unstructured":"Bashir, Z., Malik, M.G., Hussain, M., Iqbal, N.: Multiple RGB images encryption algorithm based on elliptic curve, improved Diffie Hellman protocol. Multimed. Tools Appl. 81, 3867\u20133897 (2022)","journal-title":"Multimed. Tools Appl."},{"issue":"1","key":"4226_CR7","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1090\/S0273-0979-1987-15544-3","volume":"17","author":"JWS Cassels","year":"1987","unstructured":"Cassels, J.W.S., Silverman, J.H.: The arithmetic of elliptic curves. Bull. (New Ser.) Am. Math. Soc. 17(1), 148\u2013149 (1987)","journal-title":"Bull. (New Ser.) Am. Math. Soc."},{"key":"4226_CR8","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1016\/j.chaos.2016.12.018","volume":"95","author":"U Cavuusoglu","year":"2017","unstructured":"Cavuusoglu, U., Kacar, S., Pehlivan, I., Zengin, A.: Secure image encryption algorithm design using a novel chaos based S-Box. Chaos Solut. Fractals 95, 92\u2013101 (2017)","journal-title":"Chaos Solut. Fractals"},{"key":"4226_CR9","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1016\/j.optlaseng.2018.03.011","volume":"107","author":"H Chen","year":"2018","unstructured":"Chen, H., Tanougast, C., Liu, Z., Blondel, W., Hao, B.: Optical hyperspectral image encryption based on improved Chirikov mapping and gyrator transform. Opt. Lasers Eng. 107, 62\u201370 (2018)","journal-title":"Opt. Lasers Eng."},{"issue":"3","key":"4226_CR10","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1147\/rd.383.0243","volume":"38","author":"D Coppersmith","year":"1994","unstructured":"Coppersmith, D.: The data encryption standard (DES) and its strength against attacks. IBM J. Res. Dev. 38(3), 243\u2013250 (1994)","journal-title":"IBM J. Res. Dev."},{"key":"4226_CR11","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijleo.2022.169624","volume":"266","author":"M Demirtas","year":"2022","unstructured":"Demirtas, M.: A novel multiple grayscale image encryption method based on 3D bit scrambling and diffusion. Optik 266, 169624 (2022)","journal-title":"Optik"},{"key":"4226_CR12","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1016\/j.ijleo.2018.12.103","volume":"186","author":"W Feng","year":"2019","unstructured":"Feng, W., He, Y.G., Li, H.M., Li, C.L.: Cryptanalysis of the integrated chaotic systems based image encryption algorithm. Optik 186, 449\u2013457 (2019)","journal-title":"Optik"},{"key":"4226_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2003.12.022","author":"C Guanrong","year":"2004","unstructured":"Guanrong, C., Yaobin, M., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals (2004). https:\/\/doi.org\/10.1016\/j.chaos.2003.12.022","journal-title":"Chaos Solitons Fractals"},{"issue":"3","key":"4226_CR14","doi-asserted-by":"crossref","first-page":"1123","DOI":"10.1007\/s11071-015-2392-7","volume":"83","author":"R Guesmi","year":"2016","unstructured":"Guesmi, R., Farah, M.A.B., Kachouri, A., Samet, M.: A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2. Nonlinear Dyn. 83(3), 1123\u20131136 (2016)","journal-title":"Nonlinear Dyn."},{"key":"4226_CR15","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1007\/s11071-018-4573-7","volume":"95","author":"S Hanis","year":"2019","unstructured":"Hanis, S., Amutha, R.: A fast double-keyed authenticated image encryption scheme using an improved chaotic map and a butterfly-like structure. Nonlinear Dyn. 95, 421\u2013432 (2019)","journal-title":"Nonlinear Dyn."},{"issue":"123536","key":"4226_CR16","volume":"8","author":"M Hanif","year":"2020","unstructured":"Hanif, M., Naqvi, R.A., Abbas, S., Khan, M.A., Iqbal, N.: A novel and efficient 3D multiple images encryption scheme based on chaotic systems and swapping operations. IEEE Access 8(123536), 123555 (2020)","journal-title":"IEEE Access"},{"issue":"16","key":"4226_CR17","doi-asserted-by":"crossref","first-page":"6243","DOI":"10.3390\/s22166243","volume":"22","author":"M Hanif","year":"2022","unstructured":"Hanif, M., Iqbal, N., Ur Rahman, F., Khan, M.A., Ghazal, T.M., Abbas, S., Ahmad, M., Al Hamadi, H., Yeun, C.Y.: A novel grayscale image encryption scheme based on the block-level swapping of pixels and the chaotic system. Sensors 22(16), 6243 (2022)","journal-title":"Sensors"},{"issue":"9\u201310","key":"4226_CR18","doi-asserted-by":"crossref","first-page":"2576","DOI":"10.1016\/j.mcm.2013.01.009","volume":"57","author":"I Hussain","year":"2013","unstructured":"Hussain, I., Shah, T., Gondal, M.A.: Application of S-box and chaotic map for image encryption. Math. Comput. Model. 57(9\u201310), 2576\u20132579 (2013)","journal-title":"Math. Comput. Model."},{"key":"4226_CR19","doi-asserted-by":"crossref","first-page":"174051","DOI":"10.1109\/ACCESS.2019.2956389","volume":"7","author":"N Iqbal","year":"2019","unstructured":"Iqbal, N., Abbas, S., Khan, M.A., Alyas, T., Fatima, A., Ahmad, A.: An RGB image cipher using chaotic systems, 15-puzzle problem and DNA computing. IEEE Access 7, 174051\u2013174071 (2019)","journal-title":"IEEE Access"},{"issue":"2","key":"4226_CR20","volume":"29","author":"N Iqbal","year":"2020","unstructured":"Iqbal, N., Abbas, S., Khan, M.A., Fatima, A., Ahmed, A., Anwer, N.: Efficient image cipher based on the movement of king on the chessboard and chaotic system. Journal of ElectronicImaging 29(2), 023025 (2020)","journal-title":"Journal of ElectronicImaging"},{"issue":"6","key":"4226_CR21","doi-asserted-by":"crossref","first-page":"8107","DOI":"10.1007\/s11042-022-11912-5","volume":"81","author":"N Iqbal","year":"2022","unstructured":"Iqbal, N., Hanif, M., Rehman, Z.U., Zohaib, M.: On the novel image encryption based on chaotic system and DNA computing. Multimedia Tools and Applications 81(6), 8107\u20138137 (2022)","journal-title":"Multimedia Tools and Applications"},{"issue":"7","key":"4226_CR22","doi-asserted-by":"crossref","first-page":"2943","DOI":"10.1016\/j.cnsns.2011.11.030","volume":"17","author":"A Kanso","year":"2012","unstructured":"Kanso, A., Ghebleh, M.: A novel image encryption algorithm based on a 3D chaotic map. Commun. Nonlinear Sci. Numer. Simul. 17(7), 2943\u20132959 (2012)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"177","key":"4226_CR23","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Mathe. comput. 48(177), 203\u2013209 (1987)","journal-title":"Mathe. comput."},{"issue":"2","key":"4226_CR24","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1023\/A:1008354106356","volume":"19","author":"N Koblitz","year":"2000","unstructured":"Koblitz, N., Menezes, A., Vanstone, S.: The state of elliptic curve cryptography. Des. Codes Crypt. 19(2), 173\u2013193 (2000)","journal-title":"Des. Codes Crypt."},{"key":"4226_CR25","unstructured":"Kumar, A., Tyagi, S. S., Rana, M., Aggarwal, N., Bhadana, P.: A comparative study of public key cryptosystem based on ECC and RSA. Int. J. Comput. Sci. Eng. (IJCSE) (2011)"},{"issue":"7","key":"4226_CR26","doi-asserted-by":"crossref","first-page":"1482","DOI":"10.3390\/s17071482","volume":"17","author":"CT Li","year":"2017","unstructured":"Li, C.T., Wu, T.Y., Chen, C.L., Lee, C.C., Chen, C.M.: An efficient user authentication and user anonymity scheme with provably security for IoT-based medical care system. Sensors 17(7), 1482 (2017)","journal-title":"Sensors"},{"key":"4226_CR27","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1016\/j.optlaseng.2016.10.020","volume":"90","author":"Y Li","year":"2017","unstructured":"Li, Y., Wang, C., Chen, H.: A hyper-chaos-based image encryption algorithm using pixel level permutation and bit-level permutation. Opt. Lasers Eng. 90, 238\u2013246 (2017)","journal-title":"Opt. Lasers Eng."},{"issue":"11","key":"4226_CR28","first-page":"1091","volume":"4","author":"S Liu","year":"2009","unstructured":"Liu, S., Sun, J., Xu, Z.: An improved image encryption algorithm based on chaotic system. J. Comput. 4(11), 1091\u20131100 (2009)","journal-title":"J. Comput."},{"issue":"8","key":"4226_CR29","volume":"22","author":"YL Luo","year":"2013","unstructured":"Luo, Y.L., Du, M.H.: A self-adapting image encryption algorithm based on spatiotemporal chaos and ergodic matrix. Chin. Phys. B 22(8), 080503 (2013)","journal-title":"Chin. Phys. B"},{"issue":"8","key":"4226_CR30","doi-asserted-by":"crossref","first-page":"1769","DOI":"10.3390\/math11081769","volume":"11","author":"H Mahalingam","year":"2023","unstructured":"Mahalingam, H., Velupillai Meikandan, P., Thenmozhi, K., Moria, K.M., Lakshmi, C., Chidambaram, N., Amirtharajan, R.: Neural attractor-based adaptive key generator with DNA-coded security and privacy framework for multimedia data in cloud environments. Mathematics 11(8), 1769 (2023)","journal-title":"Mathematics"},{"issue":"2","key":"4226_CR31","doi-asserted-by":"crossref","first-page":"457","DOI":"10.3390\/math11020457","volume":"11","author":"H Mahalingam","year":"2023","unstructured":"Mahalingam, H., Veeramalai, T., Menon, A.R., Amirtharajan, R.: Dual-domain image encryption in unsecure medium-a secure communication perspective. Mathematics 11(2), 457 (2023)","journal-title":"Mathematics"},{"key":"4226_CR32","doi-asserted-by":"crossref","unstructured":"Miller, V. S.: Use of elliptic curves in cryptography. In: Conference on the theory and application of cryptographic techniques, pp. 417-426. Springer, Berlin\u00a0(1985)","DOI":"10.1007\/3-540-39799-X_31"},{"key":"4226_CR33","doi-asserted-by":"crossref","unstructured":"Ollis, C.L.: The ability of the coping competence questionnaire to predict resilience against learned helplessness among undergraduate college students: An experimental study. Utah State University\u2009ProQuest Dissertations Publishing, 3404293 (2010)","DOI":"10.1037\/e527772014-278"},{"key":"4226_CR34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-016-0611-5","volume":"40","author":"MM Parvees","year":"2016","unstructured":"Parvees, M.M., Samath, J.A., Bose, B.P.: Secured medical images-a chaotic pixel scrambling approach. J. Med. Syst. 40, 1\u201311 (2016)","journal-title":"J. Med. Syst."},{"key":"4226_CR35","doi-asserted-by":"crossref","unstructured":"Patel, S., Thanikaiselvan, V.: Latin square and machine learning techniques combined algorithm for image encryption. Circuits Syst. Signal Process. 1-25 (2023)","DOI":"10.1007\/s00034-023-02427-x"},{"issue":"20","key":"4226_CR36","doi-asserted-by":"crossref","first-page":"2638","DOI":"10.1016\/j.physd.2008.03.049","volume":"237","author":"AN Pisarchik","year":"2008","unstructured":"Pisarchik, A.N., Zanin, M.: Image encryption with chaotically coupled chaotic maps. Physica D 237(20), 2638\u20132648 (2008)","journal-title":"Physica D"},{"issue":"16","key":"4226_CR37","doi-asserted-by":"crossref","first-page":"24221","DOI":"10.1007\/s11042-021-10798-z","volume":"80","author":"S Rajendran","year":"2021","unstructured":"Rajendran, S., Krithivasan, K., Doraipandian, M.: A novel cross cosine map based medical image cryptosystem using dynamic bit-level diffusion. Multimed. Tools Appl. 80(16), 24221\u201324243 (2021)","journal-title":"Multimed. Tools Appl."},{"key":"4226_CR38","doi-asserted-by":"crossref","first-page":"12447","DOI":"10.1007\/s11042-019-08396-1","volume":"79","author":"S Rajendran","year":"2020","unstructured":"Rajendran, S., Krithivasan, K., Doraipandian, M., Gao, X.Z.: Fast pre-processing hex Chaos triggered color image cryptosystem. Multimedia Tools and Applications 79, 12447\u201312469 (2020)","journal-title":"Multimedia Tools and Applications"},{"key":"4226_CR39","doi-asserted-by":"crossref","unstructured":"Reyad, O., Kotulski, Z.: Image encryption using koblitz\u2019s encoding and new mapping method based on elliptic curve random number generator. In: International Conference on Multimedia Communications, Services and Security (pp. 34-45). Springer, Cham (2015)","DOI":"10.1007\/978-3-319-26404-2_3"},{"key":"4226_CR40","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1016\/j.compeleceng.2017.04.004","volume":"62","author":"MJ Rostami","year":"2017","unstructured":"Rostami, M.J., Shahba, A., Saryazdi, S., Nezamabadi-pour, H.: A novel parallel image encryption with chaotic windows based on logistic map. Comput. Electr. Eng. 62, 384\u2013400 (2017)","journal-title":"Comput. Electr. Eng."},{"issue":"4","key":"4226_CR41","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656\u2013715 (1949)","journal-title":"Bell Syst. Tech. J."},{"issue":"4","key":"4226_CR42","doi-asserted-by":"crossref","first-page":"1995","DOI":"10.1007\/s11071-012-0402-6","volume":"69","author":"I Shatheesh Sam","year":"2012","unstructured":"Shatheesh Sam, I., Devaraj, P., Bhuvaneswaran, R.: An intertwining chaotic maps based image encryption scheme. Nonlinear Dyn. 69(4), 1995\u20132007 (2012)","journal-title":"Nonlinear Dyn."},{"issue":"7\u20138","key":"4226_CR43","doi-asserted-by":"crossref","first-page":"985","DOI":"10.1515\/ijnsns-2022-0028","volume":"23","author":"H Stanley","year":"2022","unstructured":"Stanley, H., Ramachandran, A.: Extended logistic map for encryption of digital images. Int. J. Nonlinear Sci. Numerical Simul. 23(7\u20138), 985\u20131000 (2022)","journal-title":"Int. J. Nonlinear Sci. Numerical Simul."},{"issue":"15","key":"4226_CR44","doi-asserted-by":"crossref","first-page":"5429","DOI":"10.1007\/s11042-014-1861-1","volume":"74","author":"Z Tang","year":"2015","unstructured":"Tang, Z., Zhang, X., Lan, W.: Efficient image encryption with block shuffling and chaotic map. Multimed. Tools Appl. 74(15), 5429\u20135448 (2015)","journal-title":"Multimed. Tools Appl."},{"key":"4226_CR45","doi-asserted-by":"crossref","first-page":"444","DOI":"10.1016\/j.sigpro.2017.11.005","volume":"144","author":"H Wang","year":"2018","unstructured":"Wang, H., Xiao, D., Chen, X., Huang, H.: Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map. Signal Process. 144, 444\u2013452 (2018)","journal-title":"Signal Process."},{"issue":"10","key":"4226_CR46","doi-asserted-by":"crossref","first-page":"e0241184","DOI":"10.1371\/journal.pone.0241184","volume":"15","author":"X Xue","year":"2020","unstructured":"Xue, X., Zhou, D., Zhou, C.: New insights into the existing image encryption algorithms based on DNA coding. PLoS ONE 15(10), e0241184 (2020)","journal-title":"PLoS ONE"},{"key":"4226_CR47","doi-asserted-by":"crossref","first-page":"117709","DOI":"10.1016\/j.eswa.2022.117709","volume":"205","author":"G Ye","year":"2022","unstructured":"Ye, G., Wu, H., Liu, M., Shi, Y.: Image encryption scheme based on blind signature and an improved Lorenz system. Expert Syst. Appl. 205, 117709 (2022)","journal-title":"Expert Syst. Appl."},{"key":"4226_CR48","doi-asserted-by":"crossref","first-page":"27453","DOI":"10.1007\/s11042-022-12762-x","volume":"81","author":"SF Yousif","year":"2022","unstructured":"Yousif, S.F., Abboud, A.J., Alhumaima, R.S.: A new image encryption based on bit replacing, chaos and DNA coding techniques. Multimed. Tools Appl. 81, 27453\u201327493 (2022)","journal-title":"Multimed. Tools Appl."},{"key":"4226_CR49","doi-asserted-by":"crossref","first-page":"22231","DOI":"10.1007\/s11042-022-13461-3","volume":"82","author":"J Zheng","year":"2022","unstructured":"Zheng, J., Zeng, Q.: The unified image encryption algorithm based on composite chaotic system. Multimed. Tools Appl. 82, 22231\u201322250 (2022)","journal-title":"Multimed. Tools Appl."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-023-04226-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-023-04226-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-023-04226-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T14:48:05Z","timestamp":1722610085000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-023-04226-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,19]]},"references-count":49,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["4226"],"URL":"https:\/\/doi.org\/10.1007\/s10586-023-04226-0","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,19]]},"assertion":[{"value":"3 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 November 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 November 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 January 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}