{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T03:25:12Z","timestamp":1774927512688,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T00:00:00Z","timestamp":1750032000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T00:00:00Z","timestamp":1750032000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s10586-024-05030-0","type":"journal-article","created":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T12:41:55Z","timestamp":1750077715000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["The class of bivariate non-chain rings and its application to data security"],"prefix":"10.1007","volume":"28","author":[{"given":"Muhammad Umair","family":"Safdar","sequence":"first","affiliation":[]},{"given":"Tariq","family":"Shah","sequence":"additional","affiliation":[]},{"given":"Asif","family":"Ali","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,16]]},"reference":[{"key":"5030_CR1","doi-asserted-by":"publisher","DOI":"10.53469\/jissr.2022.09(09).20","author":"JP Mhatre","year":"2022","unstructured":"Mhatre, J.P., More, M.K.: Digital image security: steganography and watermarking. J. Innov. Soc. Sci. Res. (2022). https:\/\/doi.org\/10.53469\/jissr.2022.09(09).20","journal-title":"J. Innov. Soc. Sci. Res."},{"key":"5030_CR2","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1016\/j.ins.2021.06.032","volume":"574","author":"X Wang","year":"2021","unstructured":"Wang, X., Liu, C., Jiang, D.: A novel triple-image encryption and hiding algorithm based on chaos, compressive sensing, and 3D DCT. Inf. Sci. 574, 505\u2013527 (2021). https:\/\/doi.org\/10.1016\/j.ins.2021.06.032","journal-title":"Inf. Sci."},{"key":"5030_CR3","unstructured":"Daemen, J., & Rijmen, V. (1999). AES proposal: Rijndael."},{"key":"5030_CR4","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1007\/s00521-012-1036-9","volume":"21","author":"I Hussain","year":"2012","unstructured":"Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: S8 affine-power-affine S-boxes and their applications. Neural Comput. Appl.Comput. Appl. 21, 377\u2013383 (2012). https:\/\/doi.org\/10.1007\/s00521-012-1036-9","journal-title":"Neural Comput. Appl.Comput. Appl."},{"key":"5030_CR5","doi-asserted-by":"publisher","first-page":"1627","DOI":"10.1002\/sec.1110","volume":"8","author":"M Khan","year":"2014","unstructured":"Khan, M., Azam, N.A.: Right translated AES gray S-boxes. Secur. Commun. Netw. 8, 1627\u20131635 (2014). https:\/\/doi.org\/10.1002\/sec.1110","journal-title":"Secur. Commun. Netw."},{"key":"5030_CR6","doi-asserted-by":"publisher","first-page":"23899","DOI":"10.1007\/s11042-022-12069-x","volume":"82","author":"H Liu","year":"2022","unstructured":"Liu, H., Liu, J., Ma, C.: Constructing dynamic strong S-Box using 3D chaotic map and application to image encryption. Multimed. Tools Appl. 82, 23899\u201323914 (2022). https:\/\/doi.org\/10.1007\/s11042-022-12069-x","journal-title":"Multimed. Tools Appl."},{"key":"5030_CR7","doi-asserted-by":"publisher","DOI":"10.7763\/ijcte.2012.v4.442","author":"HM El-Sheikh","year":"2012","unstructured":"El-Sheikh, H.M., El-Mohsen, O.A., Elgarf, T., Zekry, A.: A new approach for designing key-dependent S-box defined over GF (24) in AES. Int. J. Comput. Theory Eng. (2012). https:\/\/doi.org\/10.7763\/ijcte.2012.v4.442","journal-title":"Int. J. Comput. Theory Eng."},{"key":"5030_CR8","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography3020013","author":"T Shah","year":"2019","unstructured":"Shah, T., Qureshi, A.: S-Box on Subgroup of Galois Field. Cryptography (2019). https:\/\/doi.org\/10.3390\/cryptography3020013","journal-title":"Cryptography"},{"key":"5030_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2020.16492","author":"T ul Haq","year":"2020","unstructured":"ul Haq, T., Shah, T.: 12\u00d712 S-box design and its application to RGB image encryption. Optik (2020). https:\/\/doi.org\/10.1016\/j.ijleo.2020.16492","journal-title":"Optik"},{"issue":"2","key":"5030_CR10","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1007\/s40314-015-0265-9","volume":"36","author":"T Shah","year":"2015","unstructured":"Shah, T., Jahangir, S., de Andrade, A.A.: Design of new 4 \u00d7 4 S-box from finite commutative chain rings. Comput. Appl. Math.. Appl. Math. 36(2), 843\u2013857 (2015). https:\/\/doi.org\/10.1007\/s40314-015-0265-9","journal-title":"Comput. Appl. Math.. Appl. Math."},{"key":"5030_CR11","doi-asserted-by":"publisher","first-page":"102095","DOI":"10.1016\/j.vlsi.2023.102095","volume":"94","author":"MU Safdar","year":"2023","unstructured":"Safdar, M.U., Shah, T., Ali, A., Haq, T.U.: Construction of algebraic complex 9-bit lookup tables using non-chain-ring and its applications in data security. Integration 94, 102095 (2023). https:\/\/doi.org\/10.1016\/j.vlsi.2023.102095","journal-title":"Integration"},{"key":"5030_CR12","doi-asserted-by":"publisher","first-page":"125117","DOI":"10.1088\/1402-4896\/ad0bba","volume":"98","author":"T Shah","year":"2023","unstructured":"Shah, T., Safdar, M.U., Ali, A., ul Haq, T.: Color image encryption by a non-chain Galois ring extension. Phys. Scr. 98, 125117 (2023). https:\/\/doi.org\/10.1088\/1402-4896\/ad0bba","journal-title":"Phys. Scr."},{"key":"5030_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-024-09010-9","author":"MU Safdar","year":"2024","unstructured":"Safdar, M.U., Shah, T., Ali, A.: Design of nonlinear component of block cipher over non-chain semi-local ring with its application to color image encryption. Arab. J. Sci. Eng. (2024). https:\/\/doi.org\/10.1007\/s13369-024-09010-9","journal-title":"Arab. J. Sci. Eng."},{"key":"5030_CR14","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1016\/j.matcom.2024.06.008","volume":"225","author":"MU Safdar","year":"2024","unstructured":"Safdar, M.U., Shah, T., Ali, A.: Enhancing image data security with chain and non-chain Galois ring structures. Math. Comput. Simul 225, 659\u2013694 (2024). https:\/\/doi.org\/10.1016\/j.matcom.2024.06.008","journal-title":"Math. Comput. Simul"},{"key":"5030_CR15","doi-asserted-by":"publisher","DOI":"10.1088\/1402-4896\/ad8a9c","author":"MU Safdar","year":"2024","unstructured":"Safdar, M.U., Shah, T., Ali, A.: The implementation of algebraic complex lookup tables over non-chain galois ring extensions and henon map in multimedia security. Phys. Scr. (2024). https:\/\/doi.org\/10.1088\/1402-4896\/ad8a9c","journal-title":"Phys. Scr."},{"key":"5030_CR16","unstructured":"Webster, A. F., & Tavares, S. E. On the design of S boxes lecture notes in computer sciences; 218 on Advances in cryptology\u2014CRYPTO 85, New York (1985)"},{"issue":"9","key":"5030_CR17","doi-asserted-by":"publisher","first-page":"21644","DOI":"10.3934\/math.20231104","volume":"8","author":"A Waheed","year":"2023","unstructured":"Waheed, A., Subhan, F., Suud, M.M., Malik, M.Y.H., Mirza, A., Afzal, F.: Construction of nonlinear component of block cipher using coset graph. AIMS Math. 8(9), 21644\u201321667 (2023). https:\/\/doi.org\/10.3934\/math.20231104","journal-title":"AIMS Math."},{"key":"5030_CR18","doi-asserted-by":"publisher","first-page":"7584","DOI":"10.1109\/access.2024.3351794","volume":"12","author":"A Razaq","year":"2024","unstructured":"Razaq, A., Maghrabi, L.A., Ahmad, M., Aslam, F., Feng, W.: Fuzzy logic-based substitution-box for robust medical image encryption in telemedicine. IEEE Access 12, 7584\u20137608 (2024). https:\/\/doi.org\/10.1109\/access.2024.3351794","journal-title":"IEEE Access"},{"issue":"3","key":"5030_CR19","doi-asserted-by":"publisher","first-page":"6207","DOI":"10.3934\/math.2024303","volume":"9","author":"A Razaq","year":"2024","unstructured":"Razaq, A., Maghrabi, L.A., Ahmad, M., Naith, Q.H.: Novel substitution-box generation using group theory for secure medical image encryption in E-healthcare. AIMS Math. 9(3), 6207\u20136237 (2024). https:\/\/doi.org\/10.3934\/math.2024303","journal-title":"AIMS Math."},{"issue":"5","key":"5030_CR20","doi-asserted-by":"publisher","first-page":"e15902","DOI":"10.1016\/j.heliyon.2023.e15902","volume":"9","author":"A Razaq","year":"2023","unstructured":"Razaq, A., Alhamzi, G., Abbas, S., Ahmad, M., Razzaque, A.: Secure communication through reliable S-box design: a proposed approach using coset graphs and matrix operations. Heliyon 9(5), e15902 (2023). https:\/\/doi.org\/10.1016\/j.heliyon.2023.e15902","journal-title":"Heliyon"},{"issue":"23","key":"5030_CR21","doi-asserted-by":"publisher","first-page":"16641","DOI":"10.1007\/s00521-021-06260-8","volume":"33","author":"KZ Zamli","year":"2021","unstructured":"Zamli, K.Z., Kader, A., Din, F., Alhadawi, H.S.: Selective chaotic maps Tiki-Taka algorithm for the S-box generation and optimization. Neural Comput. Appl.Comput. Appl. 33(23), 16641\u201316658 (2021). https:\/\/doi.org\/10.1007\/s00521-021-06260-8","journal-title":"Neural Comput. Appl.Comput. Appl."},{"issue":"2","key":"5030_CR22","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1007\/s11071-016-3099-0","volume":"87","author":"N \u00c7avu\u015fo\u011flu","year":"2016","unstructured":"\u00c7avu\u015fo\u011flu, N., Zengin, A., Pehlivan, I., Ka\u00e7ar, S.: A novel approach for strong S-Box generation algorithm design based on chaotic scaled Zhongtang system. Nonlinear Dyn.Dyn. 87(2), 1081\u20131094 (2016). https:\/\/doi.org\/10.1007\/s11071-016-3099-0","journal-title":"Nonlinear Dyn.Dyn."},{"key":"5030_CR23","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.matcom.2023.01.036","volume":"209","author":"MI Haider","year":"2023","unstructured":"Haider, M.I., Shah, T., Ali, A., Shah, D., Khalid, I.: An innovative approach towards image encryption by using novel PRNs and S-boxes modeling techniques. Math. Comput. Simul 209, 153\u2013168 (2023). https:\/\/doi.org\/10.1016\/j.matcom.2023.01.036","journal-title":"Math. Comput. Simul"},{"issue":"1","key":"5030_CR24","doi-asserted-by":"publisher","first-page":"e23652","DOI":"10.1016\/j.heliyon.2023.e23652","volume":"10","author":"J Ali","year":"2024","unstructured":"Ali, J., Jamil, M.K., Alali, A.S., Ali, R., Gulraiz.: A medical image encryption scheme based on Mobius transformation and Galois field. Heliyon 10(1), e23652 (2024). https:\/\/doi.org\/10.1016\/j.heliyon.2023.e23652","journal-title":"Heliyon"},{"key":"5030_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-17046-6","author":"ST Dougherty","year":"2023","unstructured":"Dougherty, S.T., Klobusicky, J., \u015eahinkaya, S., Ustun, D.: An S-box construction from exponentiation in finite fields and its application in RGB color image encryption. Multimed. Tools Appl. (2023). https:\/\/doi.org\/10.1007\/s11042-023-17046-6","journal-title":"Multimed. Tools Appl."},{"issue":"6","key":"5030_CR26","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1109\/tsmc.1973.4309314","volume":"3","author":"RM Haralick","year":"1973","unstructured":"Haralick, R.M., Shanmugam, K., Dinstein, I.: Textural features for image classification. IEEE Trans. Syst. Man Cybern.Cybern. 3(6), 610\u2013621 (1973). https:\/\/doi.org\/10.1109\/tsmc.1973.4309314","journal-title":"IEEE Trans. Syst. Man Cybern.Cybern."},{"issue":"18","key":"5030_CR27","doi-asserted-by":"publisher","first-page":"26203","DOI":"10.1007\/s11042-019-07818-4","volume":"78","author":"M Khan","year":"2019","unstructured":"Khan, M., Masood, F.: A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multimed. Tools Appl. 78(18), 26203\u201326222 (2019). https:\/\/doi.org\/10.1007\/s11042-019-07818-4","journal-title":"Multimed. Tools Appl."},{"key":"5030_CR28","doi-asserted-by":"publisher","first-page":"118253","DOI":"10.1109\/access.2021.3106028","volume":"9","author":"N Iqbal","year":"2021","unstructured":"Iqbal, N., Naqvi, R.A., Atif, M., Khan, M.A., Hanif, M., Abbas, S., Hussain, D.: On the image encryption algorithm based on the chaotic system, DNA encoding, and castle. IEEE Access 9, 118253\u2013118270 (2021). https:\/\/doi.org\/10.1109\/access.2021.3106028","journal-title":"IEEE Access"},{"issue":"12","key":"5030_CR29","doi-asserted-by":"publisher","first-page":"2559","DOI":"10.3390\/sym14122559","volume":"14","author":"M Gabr","year":"2022","unstructured":"Gabr, M., Younis, H., Ibrahim, M., Alajmy, S., Khalid, I., Azab, E., Elias, R., Alexan, W.: Application of DNA coding, the Lorenz differential equations and a variation of the logistic map in a multi-stage cryptosystem. Symmetry 14(12), 2559 (2022). https:\/\/doi.org\/10.3390\/sym14122559","journal-title":"Symmetry"},{"issue":"3","key":"5030_CR30","doi-asserted-by":"publisher","first-page":"443","DOI":"10.3390\/sym14030443","volume":"14","author":"W Alexan","year":"2022","unstructured":"Alexan, W., ElBeltagy, M., Aboshousha, A.: RGB image encryption through cellular automata S-box and the Lorenz system. Symmetry 14(3), 443 (2022). https:\/\/doi.org\/10.3390\/sym14030443","journal-title":"Symmetry"},{"issue":"25","key":"5030_CR31","doi-asserted-by":"publisher","first-page":"38967","DOI":"10.1007\/s11042-023-15119-0","volume":"82","author":"X Ma","year":"2023","unstructured":"Ma, X., Wang, C.: Hyper-chaotic image encryption system based on N + 2 ring Joseph algorithm and reversible cellular automata. Multimed. Tools Appl. 82(25), 38967\u201338992 (2023). https:\/\/doi.org\/10.1007\/s11042-023-15119-0","journal-title":"Multimed. Tools Appl."},{"issue":"11","key":"5030_CR32","doi-asserted-by":"publisher","first-page":"2123","DOI":"10.1016\/j.optcom.2009.02.044","volume":"282","author":"C Huang","year":"2009","unstructured":"Huang, C., Nien, H.: Multi chaotic systems based pixel shuffle for image encryption. Opt. Commun.Commun. 282(11), 2123\u20132127 (2009). https:\/\/doi.org\/10.1016\/j.optcom.2009.02.044","journal-title":"Opt. Commun.Commun."},{"key":"5030_CR33","doi-asserted-by":"publisher","first-page":"102428","DOI":"10.1016\/j.jisa.2019.102428","volume":"50","author":"K Jithin","year":"2020","unstructured":"Jithin, K., Sankar, S.: Colour image encryption algorithm combining arnold map, DNA sequence operation, and a Mandelbrot set. J. Inf. Secur. Appl. 50, 102428 (2020). https:\/\/doi.org\/10.1016\/j.jisa.2019.102428","journal-title":"J. Inf. Secur. Appl."},{"issue":"6","key":"5030_CR34","doi-asserted-by":"publisher","first-page":"5919","DOI":"10.1007\/s11071-022-07995-2","volume":"111","author":"MA Lone","year":"2022","unstructured":"Lone, M.A., Qureshi, S.: Encryption scheme for RGB images using chaos and affine hill cipher technique. Nonlinear Dyn. 111(6), 5919\u20135939 (2022). https:\/\/doi.org\/10.1007\/s11071-022-07995-2","journal-title":"Nonlinear Dyn."},{"issue":"4","key":"5030_CR35","doi-asserted-by":"publisher","first-page":"5669","DOI":"10.1007\/s11042-021-11802-2","volume":"81","author":"PN Lone","year":"2021","unstructured":"Lone, P.N., Singh, D., Mir, U.H.: Image encryption using DNA coding and three-dimensional chaotic systems. Multimed. Tools Appl. 81(4), 5669\u20135693 (2021). https:\/\/doi.org\/10.1007\/s11042-021-11802-2","journal-title":"Multimed. Tools Appl."},{"issue":"2","key":"5030_CR36","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu, Y., Noonan, J.P., Agaian, S.: NPCR and UACI randomness tests for image encryption cyber journals: multidisciplinary journals in science and technology. J. Sel. Areas Telecommun. (JSAT) 1(2), 31\u201338 (2011)","journal-title":"J. Sel. Areas Telecommun. (JSAT)"},{"issue":"23","key":"5030_CR37","doi-asserted-by":"publisher","first-page":"30993","DOI":"10.1007\/s11042-018-6145-8","volume":"77","author":"N Ben Slimane","year":"2018","unstructured":"Ben Slimane, N., Aouf, N., Bouallegue, K., Machhout, M.: A novel chaotic image cryptosystem based on DNA sequence operations and single neuron model. Multimed. Tools Appl. 77(23), 30993\u201331019 (2018). https:\/\/doi.org\/10.1007\/s11042-018-6145-8","journal-title":"Multimed. Tools Appl."},{"issue":"11\u201312","key":"5030_CR38","doi-asserted-by":"publisher","first-page":"7279","DOI":"10.1007\/s11042-019-08342-1","volume":"79","author":"E Hasanzadeh","year":"2019","unstructured":"Hasanzadeh, E., Yaghoobi, M.: A novel color image encryption algorithm based on substitution box and hyper-chaotic system with fractal keys. Multimed. Tools Appl. 79(11\u201312), 7279\u20137297 (2019). https:\/\/doi.org\/10.1007\/s11042-019-08342-1","journal-title":"Multimed. Tools Appl."},{"key":"5030_CR39","doi-asserted-by":"publisher","first-page":"10411","DOI":"10.1109\/access.2024.3354170","volume":"12","author":"T Qayyum","year":"2024","unstructured":"Qayyum, T., Shah, T., Hummdi, A.Y., Aljaedi, A., Bassfar, Z.: An innovative feasible approach for multi-media security using both chaotic and elliptic curve structures. IEEE Access 12, 10411\u201310427 (2024). https:\/\/doi.org\/10.1109\/access.2024.3354170","journal-title":"IEEE Access"},{"key":"5030_CR40","doi-asserted-by":"publisher","first-page":"76191","DOI":"10.1109\/access.2021.3072075","volume":"9","author":"P Parida","year":"2021","unstructured":"Parida, P., Pradhan, C., Gao, X.Z., Roy, D.S., Barik, R.K.: Image encryption and authentication with elliptic curve cryptography and multidimensional chaotic maps. IEEE Access 9, 76191\u201376204 (2021). https:\/\/doi.org\/10.1109\/access.2021.3072075","journal-title":"IEEE Access"},{"issue":"20","key":"5030_CR41","doi-asserted-by":"publisher","first-page":"3878","DOI":"10.3390\/math10203878","volume":"10","author":"PN Lone","year":"2022","unstructured":"Lone, P.N., Singh, D., Stoffov\u00e1, V., Mishra, D.C., Mir, U.H., Kumar, N.: Cryptanalysis and improved image encryption scheme using elliptic curve and affine hill cipher. Mathematics 10(20), 3878 (2022). https:\/\/doi.org\/10.3390\/math10203878","journal-title":"Mathematics"},{"issue":"1\u20132","key":"5030_CR42","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/0010-4655(78)90080-2","volume":"15","author":"S Garpman","year":"1978","unstructured":"Garpman, S., Randrup, J.: Statistical test for pseudo-random number generators. Comput. Phys. Commun.. Phys. Commun. 15(1\u20132), 5\u201313 (1978). https:\/\/doi.org\/10.1016\/0010-4655(78)90080-2","journal-title":"Comput. Phys. Commun.. Phys. Commun."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-05030-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-05030-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-05030-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T20:22:11Z","timestamp":1756930931000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-05030-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,16]]},"references-count":42,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["5030"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-05030-0","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,16]]},"assertion":[{"value":"16 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 October 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 December 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 June 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Every author included in the manuscript has agreed to be designated as an author, has reviewed, and approved the manuscript, and has given their approval for submission and publication.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"389"}}