{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T23:26:53Z","timestamp":1761175613786,"version":"build-2065373602"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T00:00:00Z","timestamp":1761091200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T00:00:00Z","timestamp":1761091200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"Research Foundation for Advanced Talents of West Anhui University","award":["WGKQ2021050","WGKQ2021004"],"award-info":[{"award-number":["WGKQ2021050","WGKQ2021004"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Computing"],"DOI":"10.1007\/s10791-025-09764-2","type":"journal-article","created":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T08:49:39Z","timestamp":1761122979000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure imaging in dynamic scattering channels via hyperchaotic-encrypted multimodal diffusion with adaptive quantization"],"prefix":"10.1007","volume":"28","author":[{"given":"Yuebo","family":"Wu","sequence":"first","affiliation":[]},{"given":"Duansong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Huifang","family":"Bao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,22]]},"reference":[{"issue":"1","key":"9764_CR1","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MWC.001.2200192","volume":"30","author":"C Saigre-Tardif","year":"2023","unstructured":"Saigre-Tardif C, del Hougne P. Self-adaptive RISs beyond free space: convergence of localization, sensing, and communication under rich-scattering conditions[J]. IEEE Wirel Commun. 2023;30(1):24\u201330.","journal-title":"IEEE Wirel Commun"},{"issue":"1","key":"9764_CR2","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/s10311-022-01525-7","volume":"21","author":"Z Huang","year":"2023","unstructured":"Huang Z, Hu B, Wang H. Analytical methods for microplastics in the environment: a review[J]. Environ Chem Lett. 2023;21(1):383\u2013401.","journal-title":"Environ Chem Lett"},{"issue":"7","key":"9764_CR3","doi-asserted-by":"publisher","first-page":"2025","DOI":"10.1109\/JSAC.2023.3280966","volume":"41","author":"Y Yang","year":"2023","unstructured":"Yang Y, Gao F, Tao X, et al. Environment semantics aided wireless communications: A case study of MmWave beam prediction and blockage prediction[J]. IEEE J Sel Areas Commun. 2023;41(7):2025\u201340.","journal-title":"IEEE J Sel Areas Commun"},{"issue":"2","key":"9764_CR4","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1007\/s11571-023-10015-7","volume":"18","author":"Q Zheng","year":"2024","unstructured":"Zheng Q, Saponara S, Tian X, et al. A real-time constellation image classification method of wireless communication signals based on the lightweight network MobileViT[J]. Cogn Neurodyn. 2024;18(2):659\u201371.","journal-title":"Cogn Neurodyn"},{"issue":"6","key":"9764_CR5","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1038\/s41565-023-01354-x","volume":"18","author":"ARP Montblanch","year":"2023","unstructured":"Montblanch ARP, Barbone M, Aharonovich I, et al. Layered materials as a platform for quantum technologies[J]. Nat Nanotechnol. 2023;18(6):555\u201371.","journal-title":"Nat Nanotechnol"},{"issue":"2","key":"9764_CR6","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/s40766-023-00040-x","volume":"46","author":"T Giordani","year":"2023","unstructured":"Giordani T, Hoch F, Carvacho G, et al. Integrated photonics in quantum technologies[J]. La Rivista Del Nuovo Cimento. 2023;46(2):71\u2013103.","journal-title":"La Rivista Del Nuovo Cimento"},{"issue":"2","key":"9764_CR7","doi-asserted-by":"publisher","first-page":"3630","DOI":"10.1109\/TIV.2023.3341071","volume":"9","author":"K Wu","year":"2023","unstructured":"Wu K, Zhou Y, Shi H, et al. Graph-based interaction-aware multimodal 2d vehicle trajectory prediction using diffusion graph convolutional networks[J]. IEEE Trans Intell Veh. 2023;9(2):3630\u201343.","journal-title":"IEEE Trans Intell Veh"},{"issue":"1","key":"9764_CR8","doi-asserted-by":"publisher","first-page":"4266","DOI":"10.1109\/TCE.2023.3330943","volume":"70","author":"J Wen","year":"2023","unstructured":"Wen J, Dai H, He J, et al. Federated offline reinforcement learning with multimodal data[J]. IEEE Trans Consum Electron. 2023;70(1):4266\u201376.","journal-title":"IEEE Trans Consum Electron"},{"issue":"5","key":"9764_CR9","doi-asserted-by":"publisher","first-page":"1975","DOI":"10.1007\/s00371-022-02459-5","volume":"39","author":"P Fang","year":"2023","unstructured":"Fang P, Liu H, Wu C, et al. A survey of image encryption algorithms based on chaotic system[J]. Visual Comput. 2023;39(5):1975\u20132003.","journal-title":"Visual Comput"},{"issue":"3","key":"9764_CR10","doi-asserted-by":"publisher","first-page":"3778","DOI":"10.1109\/TII.2023.3312405","volume":"20","author":"J Sun","year":"2023","unstructured":"Sun J, Li C, Wang Z, et al. A memristive fully connect neural network and application of medical image encryption based on central diffusion algorithm[J]. IEEE Trans Industr Inf. 2023;20(3):3778\u201388.","journal-title":"IEEE Trans Industr Inf"},{"issue":"3","key":"9764_CR11","doi-asserted-by":"publisher","first-page":"2769","DOI":"10.1007\/s11071-024-10317-3","volume":"113","author":"Z Li","year":"2025","unstructured":"Li Z, Yang S, Tan W, et al. A remote sensing image encryption and compression scheme using novel hyperchaotic system and plaintext related random S-box[J]. Nonlinear Dyn. 2025;113(3):2769\u201390.","journal-title":"Nonlinear Dyn"},{"issue":"4","key":"9764_CR12","doi-asserted-by":"publisher","first-page":"043038","DOI":"10.1117\/1.JEI.32.4.043038","volume":"32","author":"AA Abdul-Kareem","year":"2023","unstructured":"Abdul-Kareem AA, Mahmoud Al-Jawher WA. Hybrid image encryption algorithm based on compressive sensing, Gray Wolf optimization, and chaos[J]. J Electron Imaging. 2023;32(4):043038\u2013043038.","journal-title":"J Electron Imaging"},{"issue":"4","key":"9764_CR13","doi-asserted-by":"publisher","first-page":"046010","DOI":"10.1117\/1.AP.5.4.046010","volume":"5","author":"F Ni","year":"2023","unstructured":"Ni F, Liu H, Zheng Y, et al. Nonlinear harmonic wave manipulation in nonlinear scattering medium via scattering-matrix method[J]. Adv Photonics. 2023;5(4):046010\u2013046010.","journal-title":"Adv Photonics"},{"issue":"8","key":"9764_CR14","doi-asserted-by":"publisher","first-page":"7831","DOI":"10.1007\/s11071-022-08206-8","volume":"111","author":"Y Sha","year":"2023","unstructured":"Sha Y, Mou J, Banerjee S, et al. Low-cost multiclass-image encryption based on compressive sensing and chaotic system[J]. Nonlinear Dyn. 2023;111(8):7831\u201357.","journal-title":"Nonlinear Dyn"},{"issue":"4","key":"9764_CR15","doi-asserted-by":"publisher","first-page":"2387","DOI":"10.1109\/TSC.2023.3258144","volume":"16","author":"Y Yang","year":"2023","unstructured":"Yang Y, Cheng M, Ding Y, et al. A visually meaningful image encryption scheme based on lossless compression SPIHT coding[J]. IEEE Trans Serv Comput. 2023;16(4):2387\u2013401.","journal-title":"IEEE Trans Serv Comput"},{"issue":"8","key":"9764_CR16","doi-asserted-by":"publisher","first-page":"2645","DOI":"10.1109\/JSAC.2023.3288243","volume":"41","author":"E Erdemir","year":"2023","unstructured":"Erdemir E, Tung TY, Dragotti PL, et al. Generative joint source-channel coding for semantic image transmission[J]. IEEE J Sel Areas Commun. 2023;41(8):2645\u201357.","journal-title":"IEEE J Sel Areas Commun"},{"issue":"9","key":"9764_CR17","doi-asserted-by":"publisher","first-page":"16279","DOI":"10.1109\/JIOT.2024.3351988","volume":"11","author":"D Zhang","year":"2024","unstructured":"Zhang D, Shafiq M, Srivastava G, et al. Stbciot: Securing the transmission of biometric images in customer iot[J]. IEEE Internet Things J. 2024;11(9):16279\u201388.","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"9764_CR18","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MGRS.2022.3227063","volume":"11","author":"M Wang","year":"2023","unstructured":"Wang M, Hong D, Han Z, et al. Tensor decompositions for hyperspectral data processing in remote sensing: A comprehensive review[J]. IEEE Geoscience Remote Sens Magazine. 2023;11(1):26\u201372.","journal-title":"IEEE Geoscience Remote Sens Magazine"},{"issue":"6","key":"9764_CR19","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1038\/s44287-024-00057-2","volume":"1","author":"X Wang","year":"2024","unstructured":"Wang X, Hao H, He X, et al. Advances in information processing and biological imaging using flat optics[J]. Nat Reviews Electr Eng. 2024;1(6):391\u2013411.","journal-title":"Nat Reviews Electr Eng"},{"issue":"5","key":"9764_CR20","doi-asserted-by":"publisher","first-page":"2290","DOI":"10.1007\/s10278-023-00842-9","volume":"36","author":"J Yuan","year":"2023","unstructured":"Yuan J, Zhou F, Guo Z, et al. HCformer: hybrid CNN-transformer for LDCT image denoising[J]. J Digit Imaging. 2023;36(5):2290\u2013305. https:\/\/doi.org\/10.1007\/s10278-023-00842-9.","journal-title":"J Digit Imaging"},{"key":"9764_CR21","doi-asserted-by":"publisher","unstructured":"Wen W, Huang M, Zhang Y et al. Visual security index combining CNN and filter for perceptually encrypted light field images[J]. ACM Transactions on Multimedia Computing, Communications and Applications, 2023, 20(1): 1\u201315. DIO: https:\/\/doi.org\/10.1145\/3612924","DOI":"10.1145\/3612924"},{"issue":"18","key":"9764_CR22","doi-asserted-by":"publisher","first-page":"28265","DOI":"10.1007\/s11042-021-11043-3","volume":"80","author":"Z Bao","year":"2021","unstructured":"Bao Z, Xue R, Jin Y. Image scrambling adversarial autoencoder based on the asymmetric encryption[J]. Multimedia Tools Appl. 2021;80(18):28265\u2013301. https:\/\/doi.org\/10.1007\/s11042-021-11043-3.","journal-title":"Multimedia Tools Appl"},{"key":"9764_CR23","doi-asserted-by":"publisher","unstructured":"Erkan U, Toktas A, Engino\u011flu S et al. An image encryption scheme based on chaotic logarithmic map and key generation using deep CNN[J]. Multimedia Tools and Applications, 2022, 81(5): 7365\u20137391. DIO: https:\/\/doi.org\/10.1007\/s11042-021-11803-1","DOI":"10.1007\/s11042-021-11803-1"},{"key":"9764_CR24","doi-asserted-by":"publisher","unstructured":"Ahmed F, Rehman MU, Ahmad J et al. A DNA based colour image encryption scheme using a convolutional autoencoder[J]. ACM Transactions on Multimedia Computing, Communications and Applications, 2023, 19(3s): 1\u201321. DIO: https:\/\/doi.org\/10.1145\/3570165","DOI":"10.1145\/3570165"},{"key":"9764_CR25","doi-asserted-by":"publisher","unstructured":"Shi J, Lu M, Ma Z. Rate-distortion optimized post-training quantization for learned image compression[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2023, 34(5): 3082\u20133095. DIO: https:\/\/doi.org\/10.1109\/TCSVT.2023.3323015","DOI":"10.1109\/TCSVT.2023.3323015"},{"issue":"1","key":"9764_CR26","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1109\/TPAMI.2023.3322904","volume":"46","author":"Z Duan","year":"2023","unstructured":"Duan Z, Lu M, Ma J, et al. Qarv: Quantization-aware Resnet Vae for lossy image compression[J]. IEEE Trans Pattern Anal Mach Intell. 2023;46(1):436\u201350. DIO: 2302.08899.","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"9764_CR27","doi-asserted-by":"publisher","unstructured":"Papakostas C, Troussas C, Krouska A et al. PARSAT: Fuzzy logic for adaptive spatial ability training in an augmented reality system[J]. Computer Science and Information Systems, 2023, 20(4): 1389\u20131417. DIO: https:\/\/doi.org\/10.2298\/CSIS230130043P","DOI":"10.2298\/CSIS230130043P"},{"key":"9764_CR28","doi-asserted-by":"publisher","unstructured":"Jiang J, Wang Y, Jiang Y et al. Robust image-based adaptive fuzzy controller for guarantee field of view with uncertain dynamics[J]. IEEE Transactions on Fuzzy Systems, 2023, 32(3): 1564\u20131575. DIO: https:\/\/doi.org\/10.1109\/TFUZZ.2023.3328884","DOI":"10.1109\/TFUZZ.2023.3328884"},{"key":"9764_CR29","doi-asserted-by":"publisher","unstructured":"Park JH, Kim S, Lee JC et al. Scalable color quantization for task-centric image compression[J]. ACM Transactions on Multimedia Computing, Communications and Applications, 2023, 19(2s): 1\u201318. DIO: https:\/\/doi.org\/10.1145\/3551389","DOI":"10.1145\/3551389"},{"key":"9764_CR30","doi-asserted-by":"publisher","unstructured":"Zhao F, Zhang C, Geng B. Deep multimodal data fusion[J]. ACM computing surveys, 2024, 56(9): 1\u201336. DIO: https:\/\/doi.org\/10.1145\/3649447","DOI":"10.1145\/3649447"},{"key":"9764_CR31","doi-asserted-by":"publisher","unstructured":"Wang J, Tan X. Mutually beneficial transformer for multimodal data fusion[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2023, 33(12): 7466\u20137479. DIO: https:\/\/doi.org\/10.1109\/TCSVT.2023.3274545","DOI":"10.1109\/TCSVT.2023.3274545"},{"issue":"4","key":"9764_CR32","doi-asserted-by":"publisher","first-page":"1947","DOI":"10.1007\/s12559-022-10040-4","volume":"16","author":"KN Singh","year":"2024","unstructured":"Singh KN, Singh OP, Singh AK, et al. Watmif: multimodal medical image fusion-based watermarking for telehealth applications[J]. Cogn Comput. 2024;16(4):1947\u201363. https:\/\/doi.org\/10.1007\/s12559-022-10040-4.","journal-title":"Cogn Comput"},{"key":"9764_CR33","doi-asserted-by":"publisher","unstructured":"Wang J, Meng F, Liu J et al. Multimodal data privacy protection and completeness verification method for mobile crowd sensing[J]. Peer-to-Peer Networking and Applications, 2025, 18(1): 1\u201320. DIO: https:\/\/doi.org\/10.1007\/s12083-024-01850-4","DOI":"10.1007\/s12083-024-01850-4"},{"key":"9764_CR34","doi-asserted-by":"publisher","unstructured":"Luo X, Jia N, Ouyang E et al. Introducing machine-learning\u2010based data fusion methods for analyzing multimodal data: An application of measuring trustworthiness of microenterprises[J]. Strategic Management Journal, 2024, 45(8): 1597\u20131629. DIO: https:\/\/doi.org\/10.1002\/smj.3597","DOI":"10.1002\/smj.3597"},{"key":"9764_CR35","doi-asserted-by":"publisher","unstructured":"Chen W, Ren T, Yuan T et al. Semantic-empowered visible light communication for image transmission based on deep convolutional generative adversarial network[J]. Optics Express, 2024, 32(19): 32564\u201332584. DIO: https:\/\/doi.org\/10.1364\/OE.522252","DOI":"10.1364\/OE.522252"},{"issue":"6","key":"9764_CR36","doi-asserted-by":"publisher","first-page":"982","DOI":"10.1109\/LWC.2023.3255221","volume":"12","author":"Q Fu","year":"2023","unstructured":"Fu Q, Xie H, Qin Z, et al. Vector quantized semantic communication system[J]. IEEE Wirel Commun Lett. 2023;12(6):982\u20136. DIO: arxiv.org\/pdf\/2209.11519.","journal-title":"IEEE Wirel Commun Lett"},{"key":"9764_CR37","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1007\/s10044-022-01104-0","volume":"26","author":"AK Sahu","year":"2023","unstructured":"Sahu AK, Sahu M, Patro P, et al. Dual image-based reversible fragile watermarking scheme for tamper detection and localization[J]. Pattern Anal Applic. 2023;26:571\u201390. https:\/\/doi.org\/10.1007\/s10044-022-01104-0.","journal-title":"Pattern Anal Applic"},{"issue":"6","key":"9764_CR38","doi-asserted-by":"publisher","first-page":"1871","DOI":"10.18280\/ijsse.140621","volume":"14","author":"AR Gottimukkala","year":"2024","unstructured":"Gottimukkala AR, Pradhan A, Patro P, et al. Image tamper detection and correction using modified hamming code with eight data Bits and four redundant Bits[J]. Int J Saf Secur Eng. 2024;14(6):1871\u201381. https:\/\/doi.org\/10.18280\/ijsse.140621.","journal-title":"Int J Saf Secur Eng"},{"key":"9764_CR39","doi-asserted-by":"publisher","DOI":"10.22111\/ijfs.2023.44767.7887","author":"P Patro","year":"2023","unstructured":"Patro P, Kumar K, Kumar GS, et al. Iran J Fuzzy Syst. 2023;20(6):155\u201369. https:\/\/doi.org\/10.22111\/ijfs.2023.44767.7887. Intelligent Data Classification Using Optimized Fuzzy Neural Network and Improved Cuckoo Search Optimization[J]."},{"key":"9764_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2020.06.003","author":"P Patro","year":"2022","unstructured":"Patro P, Kumar K, Kumar GS, et al. J King Saud Univ - Comput Inform Sci. 2022;34(6):3424\u201332. https:\/\/doi.org\/10.1016\/j.jksuci.2020.06.003. Similarity and wavelet transform based data partitioning and parameter learning for fuzzy neural network[J]."},{"key":"9764_CR41","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1007\/s43621-024-00725-1","volume":"5","author":"P Patro","year":"2024","unstructured":"Patro P, Fathima SH, Harikishore R, et al. Breast cancer image classification by using HCNN and LeNet5[J]. Discov Sustain. 2024;5:491. https:\/\/doi.org\/10.1007\/s43621-024-00725-1.","journal-title":"Discov Sustain"},{"key":"9764_CR42","doi-asserted-by":"publisher","first-page":"78589","DOI":"10.1109\/ACCESS.2024.3407838","volume":"12","author":"W Alexan","year":"2024","unstructured":"Alexan W, et al. Secure communication of military reconnaissance images over UAV-Assisted relay Networks[J]. IEEE Access. 2024;12:78589\u2013610. https:\/\/doi.org\/10.1109\/ACCESS.2024.3407838.","journal-title":"IEEE Access"},{"key":"9764_CR43","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2024.3470110","author":"L Teng","year":"2025","unstructured":"Teng L, Cao P, Liu Y, Multi-Image. IEEE Trans Circuits Syst Video Technol. 2025;35(2):1562\u201375. https:\/\/doi.org\/10.1109\/TCSVT.2024.3470110. Encryption Algorithm Based on Novel Spatiotemporal Chaotic System and Dynamical Chaotic Trajectories[J]."},{"key":"9764_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TMM.2023.3336236","volume":"27","author":"Y Yuan","year":"2025","unstructured":"Yuan Y, He H, Yang Y, Amirpour H, Timmerer C, Chen FJPEG. Image encryption with DC rotation and undivided RSV-Based AC group Permutation[J]. IEEE Trans Multimedia. 2025;27:1\u201315. https:\/\/doi.org\/10.1109\/TMM.2023.3336236.","journal-title":"IEEE Trans Multimedia"},{"key":"9764_CR45","doi-asserted-by":"publisher","unstructured":"Lai Q, Yang L, Chen G. Design and performance analysis of discrete memristive hyperchaotic systems with stuffed cube attractors and ultraboosting behaviors[J]. IEEE Transactions on Industrial Electronics, 2023, 71(7): 7819\u20137828. DIO: https:\/\/doi.org\/10.1109\/TIE.2023.3299016","DOI":"10.1109\/TIE.2023.3299016"},{"key":"9764_CR46","doi-asserted-by":"publisher","unstructured":"Wang X, Xu X, Sun K et al. A color image encryption and hiding algorithm based on hyperchaotic system and discrete cosine transform[J]. Nonlinear Dynamics, 2023, 111(15): 14513\u201314536. DIO: https:\/\/doi.org\/10.1007\/s11071-023-08538-z","DOI":"10.1007\/s11071-023-08538-z"},{"key":"9764_CR47","doi-asserted-by":"publisher","first-page":"102771","DOI":"10.1016\/j.rcim.2024.102771","volume":"89","author":"Y Luo","year":"2024","unstructured":"Luo Y, Gao J, Chen D, Zhang L, Liu Y, Zhong Y. Accurate error compensation method for multi-axis parallel machine via singularized jacobi geometric parameter correction and coupling error evaluation[J]. Robot Comput Integr Manuf. 2024;89:102771. https:\/\/doi.org\/10.1016\/j.rcim.2024.102771.","journal-title":"Robot Comput Integr Manuf"}],"container-title":["Discover Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10791-025-09764-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10791-025-09764-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10791-025-09764-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T08:49:40Z","timestamp":1761122980000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10791-025-09764-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,22]]},"references-count":47,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["9764"],"URL":"https:\/\/doi.org\/10.1007\/s10791-025-09764-2","relation":{"references":[{"id-type":"doi","id":"10.22111\/ijfs.2023.44767.7887","asserted-by":"subject"},{"id-type":"doi","id":"10.1016\/j.jksuci.2020.06.003","asserted-by":"subject"},{"id-type":"doi","id":"10.1109\/TCSVT.2024.3470110","asserted-by":"subject"}]},"ISSN":["2948-2992"],"issn-type":[{"value":"2948-2992","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,22]]},"assertion":[{"value":"30 May 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"228"}}