{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T02:41:20Z","timestamp":1774924880957,"version":"3.50.1"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Deputyship for Research & Innovation, Ministry of Education in Saudi Arabia","award":["1120"],"award-info":[{"award-number":["1120"]}]},{"name":"Deputyship for Research & Innovation, Ministry of Education in Saudi Arabia","award":["1120"],"award-info":[{"award-number":["1120"]}]},{"name":"Deputyship for Research & Innovation, Ministry of Education in Saudi Arabia","award":["1120"],"award-info":[{"award-number":["1120"]}]},{"name":"Deputyship for Research & Innovation, Ministry of Education in Saudi Arabia","award":["1120"],"award-info":[{"award-number":["1120"]}]},{"name":"Deputyship for Research & Innovation, Ministry of Education in Saudi Arabia","award":["1120"],"award-info":[{"award-number":["1120"]}]},{"name":"Deputyship for Research & Innovation, Ministry of Education in Saudi Arabia","award":["1120"],"award-info":[{"award-number":["1120"]}]},{"name":"Deputyship for Research & Innovation, Ministry of Education in Saudi Arabia","award":["1120"],"award-info":[{"award-number":["1120"]}]},{"name":"Deputyship for Research & Innovation, Ministry of Education in Saudi Arabia","award":["1120"],"award-info":[{"award-number":["1120"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2024,11]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The breakthroughs in Machine learning and deep neural networks have revolutionized the handling of critical practical challenges, achieving state-of-the-art performance in various computer vision tasks. Notably, the application of deep neural networks in optical character recognition (OCR) has significantly enhanced the performance of OCR systems, making them a pivotal preprocessing component in text analysis pipelines for crucial applications such as license plate recognition (LPR) systems, where the efficiency of OCR is paramount. However, despite the advancements, the integration of deep neural networks in OCR introduces inherent security vulnerabilities, particularly susceptibility to adversarial examples. Adversarial examples in LPR systems are crafted by introducing perturbations to original license plate images, which can effectively compromise the integrity of the license plate recognition process, leading to erroneous license plate number identification. Given that the primary goal of OCR in this context is to accurately recognize license plate numbers, even a single misinterpreted character can significantly impact the overall performance of the LPR system. The vulnerability of LPR systems to adversarial attacks underscores the urgent need to address the security weaknesses inherited from deep neural networks. In response to these challenges, the exploration of alternative defense mechanisms, such as image denoising and in-painting, presents a compelling approach to bolstering the resilience of LPR systems against adversarial attacks. By prioritizing practical implementation and integration of image denoising and inpainting techniques align with the operational requirements of real-world LPR systems. These methods can be seamlessly integrated into existing pipelines, offering pragmatic and accessible means of enhancing security without imposing significant computational overhead. By embracing a multi-faceted approach that combines the strengths of traditional image processing techniques, the research endeavors to develop comprehensive and versatile defense strategies tailored to the specific vulnerabilities and requirements of LPR systems. This holistic approach aims to fortify LPR systems against adversarial threats, thereby fostering increased trust and reliability in the deployment of OCR and LPR technologies across various domains and applications.<\/jats:p>","DOI":"10.1007\/s10586-024-04513-4","type":"journal-article","created":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T08:01:46Z","timestamp":1717228906000},"page":"11627-11644","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Deep learning adversarial attacks and defenses on license plate recognition system"],"prefix":"10.1007","volume":"27","author":[{"given":"Conrado","family":"Vizcarra","sequence":"first","affiliation":[]},{"given":"Shadan","family":"Alhamed","sequence":"additional","affiliation":[]},{"given":"Abdulelah","family":"Algosaibi","sequence":"additional","affiliation":[]},{"given":"Mohammed","family":"Alnaeem","sequence":"additional","affiliation":[]},{"given":"Adel","family":"Aldalbahi","sequence":"additional","affiliation":[]},{"given":"Nura","family":"Aljaafari","sequence":"additional","affiliation":[]},{"given":"Ahmad","family":"Sawalmeh","sequence":"additional","affiliation":[]},{"given":"Mahmoud","family":"Nazzal","sequence":"additional","affiliation":[]},{"given":"Abdallah","family":"Khreishah","sequence":"additional","affiliation":[]},{"given":"Abdulaziz","family":"Alhumam","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Anan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,1]]},"reference":[{"key":"4513_CR1","unstructured":"Feng, R., Mangaokar, N., Chen, J., Fernandes, E., Jha, S., Prakash, A.: Graphite: A practical framework for generating automatic physical adversarial machine learning attacks. arXiv preprint arXiv:2002.08347 (2020)"},{"key":"4513_CR2","doi-asserted-by":"crossref","unstructured":"Zha, M., Meng, G., Lin, C., Zhou, Z., Chen, K.: Rolma: A practical adversarial attack against deep learning-based lpr systems. In: Information Security and Cryptology, pp. 101\u2013117 (2020)","DOI":"10.1007\/978-3-030-42921-8_6"},{"key":"4513_CR3","doi-asserted-by":"publisher","unstructured":"Mahony, N.O., et al.: Deep learning vs. traditional computer vision. In: International Conference on Image Analysis and Processing (2019). https:\/\/doi.org\/10.1007\/978-3-030-17795-9","DOI":"10.1007\/978-3-030-17795-9"},{"key":"4513_CR4","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)"},{"key":"4513_CR5","unstructured":"Brendel, W., Rauber, J., Bethge, M.: Decision-based adversarial attacks: Reliable attacks against black-box machine learning models (2018)"},{"key":"4513_CR6","doi-asserted-by":"publisher","unstructured":"Eykholt, K., et al.: Robust physical-world attacks on deep learning visual classification. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1625\u20131634 (2018). https:\/\/doi.org\/10.1109\/CVPR.2018.00175","DOI":"10.1109\/CVPR.2018.00175"},{"key":"4513_CR7","doi-asserted-by":"publisher","unstructured":"Liao, F., Liang, M., Dong, Y., Pang, T., Hu, X., Zhu, J.: Defense against adversarial attacks using high-level representation guided denoiser. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1778\u20131787 (2018). https:\/\/doi.org\/10.1109\/CVPR.2018.00191","DOI":"10.1109\/CVPR.2018.00191"},{"issue":"3","key":"4513_CR8","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.eng.2019.12.012","volume":"6","author":"K Ren","year":"2020","unstructured":"Ren, K., Zheng, T., Qin, Z., Liu, X.: Adversarial attacks and defenses in deep learning. Engineering 6(3), 346\u2013360 (2020). https:\/\/doi.org\/10.1016\/j.eng.2019.12.012","journal-title":"Engineering"},{"key":"4513_CR9","unstructured":"Chen, L., Xu, W.: Attacking optical character recognition (ocr) systems with adversarial watermarks. In: Proceedings of the IEEE International Conference on Multimedia and Expo (2020)"},{"key":"4513_CR10","doi-asserted-by":"publisher","unstructured":"Elsaid, S., et al.: Arabic real-time license plate recognition system. In: International Conference on Intelligent Computing, pp. 126\u2013143 (2019). https:\/\/doi.org\/10.1007\/978-3-030-36368-0_12","DOI":"10.1007\/978-3-030-36368-0_12"},{"key":"4513_CR11","doi-asserted-by":"crossref","unstructured":"Chen, L., Sun, J., Xu, W.: Fawa: Fast adversarial watermark attack on optical character recognition (ocr) systems (2020)","DOI":"10.1007\/978-3-030-67664-3_33"},{"key":"4513_CR12","doi-asserted-by":"publisher","first-page":"155161","DOI":"10.1109\/ACCESS.2021.3127960","volume":"9","author":"N Akhtar","year":"2021","unstructured":"Akhtar, N., Mian, A., Kardan, N., Shah, M.: Advances in adversarial attacks and defenses in computer vision: a survey. IEEE Access 9, 155161\u2013155196 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3127960","journal-title":"IEEE Access"},{"issue":"3","key":"4513_CR13","doi-asserted-by":"publisher","first-page":"1445","DOI":"10.3390\/app12031445","volume":"12","author":"C-J Lin","year":"2022","unstructured":"Lin, C.-J., Chuang, C.-C., Lin, H.-Y.: Edge-ai-based real-time automated license plate recognition system. Appl. Sci. 12(3), 1445 (2022). https:\/\/doi.org\/10.3390\/app12031445","journal-title":"Appl. Sci."},{"key":"4513_CR14","doi-asserted-by":"publisher","unstructured":"Dominguez, D.H.S., Sandoval, S.C.Q., Morocho-Cayamcela, M.E.: End-to-end license plate recognition system for an efficient deployment in surveillance scenarios. In: International Conference on Advances in Computational Intelligence, pp. 697\u2013704 (2022). https:\/\/doi.org\/10.1007\/978-3-030-96293-7_59","DOI":"10.1007\/978-3-030-96293-7_59"},{"key":"4513_CR15","doi-asserted-by":"publisher","unstructured":"Alzubaidi, L., Latif, G., Alghazo, J.: Affordable and portable realtime saudi license plate recognition using soc. In: 2019 2nd International Conference on New Trends in Computing Sciences (ICTCS), pp. 1\u20135 (2019).https:\/\/doi.org\/10.1109\/ICTCS.2019.8923061","DOI":"10.1109\/ICTCS.2019.8923061"},{"key":"4513_CR16","doi-asserted-by":"publisher","unstructured":"Antar, R., Alghamdi, S., Alotaibi, J., Alghamdi, M.: Automatic number plate recognition of saudi license car plates. Eng. Technol. Appl. Sci. Res. 12(2), 8266\u20138272 (2022). https:\/\/doi.org\/10.48084\/etasr.4727","DOI":"10.48084\/etasr.4727"},{"key":"4513_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101826","volume":"95","author":"Y Qian","year":"2020","unstructured":"Qian, Y., et al.: Spot evasion attacks: adversarial examples for license plate recognition systems with convolutional neural networks. Comput. Secur. 95, 101826 (2020). https:\/\/doi.org\/10.1016\/j.cose.2020.101826","journal-title":"Comput. Secur."},{"key":"4513_CR18","doi-asserted-by":"publisher","unstructured":"Gu, Z., et al.: Adversarial attacks on license plate recognition systems. Comput. Mater. Contin. 65, 1437\u20131452 (2020). https:\/\/doi.org\/10.32604\/cmc.2020.011834","DOI":"10.32604\/cmc.2020.011834"},{"key":"4513_CR19","doi-asserted-by":"publisher","unstructured":"Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 39\u201357 (2017). https:\/\/doi.org\/10.1109\/SP.2017.49","DOI":"10.1109\/SP.2017.49"},{"key":"4513_CR20","doi-asserted-by":"publisher","unstructured":"Yang, K., Tsai, T.-Y., Yu, H., Ho, T.-Y., Jin, Y.: Beyond digital domain: Fooling deep learning based recognition system in physical world. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34, pp. 1088\u20131095 (2020). https:\/\/doi.org\/10.1609\/aaai.v34i01.5459","DOI":"10.1609\/aaai.v34i01.5459"},{"issue":"4","key":"4513_CR21","doi-asserted-by":"publisher","first-page":"558","DOI":"10.3390\/make2040030","volume":"2","author":"T Combey","year":"2020","unstructured":"Combey, T., Loison, A., Faucher, M., Hajri, H.: Probabilistic jacobian-based saliency maps attacks. Mach. Learn. Knowl. Extract. 2(4), 558\u2013578 (2020). https:\/\/doi.org\/10.3390\/make2040030","journal-title":"Mach. Learn. Knowl. Extract."},{"key":"4513_CR22","doi-asserted-by":"publisher","unstructured":"Wang, G., Chen, X., Xu, C.: Adversarial watermarking to attack deep neural networks. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1962\u20131966 (2019). https:\/\/doi.org\/10.1109\/ICASSP.2019.8682351","DOI":"10.1109\/ICASSP.2019.8682351"},{"key":"4513_CR23","doi-asserted-by":"crossref","unstructured":"Lana, J.: Adversarial attack using neural image modification. TechRxiv (2022)","DOI":"10.36227\/techrxiv.18012122.v1"},{"issue":"5","key":"4513_CR24","doi-asserted-by":"publisher","first-page":"3142","DOI":"10.1002\/int.22808","volume":"37","author":"J Zhu","year":"2022","unstructured":"Zhu, J., et al.: Attention-guided transformation-invariant attack for black-box adversarial examples. Int. J. Intell. Syst. 37(5), 3142\u20133165 (2022). https:\/\/doi.org\/10.1002\/int.22808","journal-title":"Int. J. Intell. Syst."},{"key":"4513_CR25","doi-asserted-by":"publisher","first-page":"22617","DOI":"10.1109\/ACCESS.2020.2969288","volume":"8","author":"J Yuan","year":"2020","unstructured":"Yuan, J., He, Z.: Adversarial dual network learning with randomized image transform for restoring attacked images. IEEE Access 8, 22617\u201322624 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2969288","journal-title":"IEEE Access"},{"issue":"1","key":"4513_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13635-021-00125-2","volume":"2022","author":"J Lin","year":"2022","unstructured":"Lin, J., Njilla, L.L., Xiong, K.: Secure machine learning against adversarial samples at test time. EURASIP J. Inf. Secur. 2022(1), 1\u201312 (2022). https:\/\/doi.org\/10.1186\/s13635-021-00125-2","journal-title":"EURASIP J. Inf. Secur."},{"key":"4513_CR27","doi-asserted-by":"publisher","first-page":"118324","DOI":"10.1109\/ACCESS.2021.3106855","volume":"9","author":"A Hoyos","year":"2021","unstructured":"Hoyos, A., Ruiz, U., Chavez, E.: Hadamard\u2019s defense against adversarial examples. IEEE Access 9, 118324\u2013118333 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3106855","journal-title":"IEEE Access"},{"key":"4513_CR28","doi-asserted-by":"publisher","first-page":"6117","DOI":"10.1109\/TIP.2021.3092582","volume":"30","author":"S Zhang","year":"2021","unstructured":"Zhang, S., Gao, H., Rao, Q.: Defense against adversarial attacks by reconstructing images. IEEE Trans. Image Process. 30, 6117\u20136129 (2021). https:\/\/doi.org\/10.1109\/TIP.2021.3092582","journal-title":"IEEE Trans. Image Process."},{"key":"4513_CR29","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/OJITS.2022.3142612","volume":"3","author":"A Kloukiniotis","year":"2022","unstructured":"Kloukiniotis, A., Papandreou, A., Lalos, A., Kapsalas, P., Nguyen, D.-V., Moustakas, K.: Countering adversarial attacks on autonomous vehicles using denoising techniques: A review. IEEE Open J. Intell. Transport. Syst. 3, 61\u201380 (2022). https:\/\/doi.org\/10.1109\/OJITS.2022.3142612","journal-title":"IEEE Open J. Intell. Transport. Syst."},{"key":"4513_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/6124895","volume":"2022","author":"F Li","year":"2022","unstructured":"Li, F., Du, X., Zhang, L.: Adversarial attacks defense method based on multiple filtering and image rotation. Discrete Dyn. Nat. Soc. 2022, 1\u201311 (2022). https:\/\/doi.org\/10.1155\/2022\/6124895","journal-title":"Discrete Dyn. Nat. Soc."},{"key":"4513_CR31","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)"},{"key":"4513_CR32","doi-asserted-by":"publisher","unstructured":"Shi, B., Bai, X., Yao, C.: An end-to-end trainable neural network for image-based sequence recognition and its application to scene text recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence PP, 1\u20131 (2015). https:\/\/doi.org\/10.1109\/TPAMI.2016.2646371","DOI":"10.1109\/TPAMI.2016.2646371"},{"key":"4513_CR33","unstructured":"EasyOCR.: https:\/\/www.jaided.ai\/easyocr\/. Accessed 01 Jun 2021"},{"key":"4513_CR34","doi-asserted-by":"crossref","unstructured":"Baek, Y., Lee, B., Han, D., Yun, S., Lee, H.: Character region awareness for text detection. arXiv preprint arXiv:1904.01941 (2019)","DOI":"10.1109\/CVPR.2019.00959"},{"key":"4513_CR35","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9, 1735\u20131780 (1997). https:\/\/doi.org\/10.1162\/neco.1997.9.8.1735","journal-title":"Neural Comput."},{"key":"4513_CR36","doi-asserted-by":"crossref","unstructured":"Szeliski, R.: Computer vision. Algorithms and applications. Springer, Washington, p. 793 (2011)","DOI":"10.1007\/978-1-84882-935-0"},{"issue":"1","key":"4513_CR37","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1186\/s42492-019-0016-7","volume":"2","author":"L Fan","year":"2019","unstructured":"Fan, L., Zhang, F., Fan, H., Zhang, C.: Brief review of image denoising techniques. Vis. Comput. Ind. Biomed. Art 2(1), 7 (2019). https:\/\/doi.org\/10.1186\/s42492-019-0016-7","journal-title":"Vis. Comput. Ind. Biomed. Art"},{"key":"4513_CR38","unstructured":"Hambal, A.M., Pei, Z., Ishabailu, F.L.: Image noise reduction and filtering techniques. Int. J. Sci. Res. (IJSR) (2015)"},{"key":"4513_CR39","doi-asserted-by":"publisher","unstructured":"Xu, W., Evans, D., Qi, Y.: Feature squeezing mitigates and detects carlini\/wagner adversarial examples. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 646\u201364 (2017). https:\/\/doi.org\/10.1109\/SP.2017.49","DOI":"10.1109\/SP.2017.49"},{"key":"4513_CR40","unstructured":"Goyal, M.: Morphological image processing. Int. J. Comput. Sci. Technol. 2 (2011)"},{"key":"4513_CR41","first-page":"128","volume":"7","author":"S Bangare","year":"2017","unstructured":"Bangare, S., Gera, P., Patil, S.T.P.: Review of otsu\u2019s method for image thresholding. Int. J. Emerg. Technol. Adv. Eng. 7, 128\u2013136 (2017)","journal-title":"Int. J. Emerg. Technol. Adv. Eng."},{"key":"4513_CR42","unstructured":"Morphological Transformations.: https:\/\/opencv24-python-tutorials.readthedocs.io\/en\/latest\/py_tutorials\/py_imgproc\/py_morphological_ops\/py_morphological_ops.html#theory. Accessed 01 Sep 2021"},{"key":"4513_CR43","doi-asserted-by":"crossref","unstructured":"Hayes, J.: On visible adversarial perturbations & digital watermarking. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 1597\u20131604 (2018)","DOI":"10.1109\/CVPRW.2018.00210"},{"issue":"1","key":"4513_CR44","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1080\/10867651.2004.10487596","volume":"9","author":"A Telea","year":"2004","unstructured":"Telea, A.: An image inpainting technique based on the fast marching method. J. Graph. Tools 9(1), 23\u201334 (2004). https:\/\/doi.org\/10.1080\/10867651.2004.10487596","journal-title":"J. Graph. Tools"},{"key":"4513_CR45","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1016\/j.trc.2020.01.005","volume":"111","author":"KN Behara","year":"2020","unstructured":"Behara, K.N., Bhaskar, A., Chung, E.: A novel approach for the structural comparison of origin-destination matrices: Levenshtein distance. Transport. Res. Part C 111, 513\u2013530 (2020). https:\/\/doi.org\/10.1016\/j.trc.2020.01.005","journal-title":"Transport. Res. Part C"},{"key":"4513_CR46","doi-asserted-by":"crossref","unstructured":"Holley, R.: How good can it get? analysing and improving ocr accuracy in large scale historic newspaper digitisation programs. D-Lib Magazine 14(9\/10) (2008)","DOI":"10.1045\/march2009-holley"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04513-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-04513-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04513-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T19:10:54Z","timestamp":1725909054000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-04513-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,1]]},"references-count":46,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,11]]}},"alternative-id":["4513"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-04513-4","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,1]]},"assertion":[{"value":"14 February 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 April 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 April 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 June 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}