{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:41:35Z","timestamp":1740123695034,"version":"3.37.3"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Provincial Natural Science Foundation of Liaoning","award":["2020-MS-274"],"award-info":[{"award-number":["2020-MS-274"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China.","doi-asserted-by":"crossref","award":["62061014"],"award-info":[{"award-number":["62061014"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Basic Scientific Research Projects of Colleges and Universities of Liaoning Province","award":["LJKZ0545"],"award-info":[{"award-number":["LJKZ0545"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s11036-023-02133-7","type":"journal-article","created":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T16:02:05Z","timestamp":1690905725000},"page":"567-582","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Fast and Effective Image Encryption Scheme Based on DSVSM and (7, 4) Hamming Code"],"prefix":"10.1007","volume":"29","author":[{"given":"Yuwen","family":"Sha","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1192-1185","authenticated-orcid":false,"given":"Bo","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Hadi","family":"Jahanshahi","sequence":"additional","affiliation":[]},{"given":"Linian","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,1]]},"reference":[{"issue":"39\u201340","key":"2133_CR1","first-page":"29243","volume":"79","author":"G Cheng","year":"2022","unstructured":"Cheng G, Wang C, Xu C (2022) A novel hyper-chaotic image encryption scheme based on quantum genetic algorithm and compressive sensing. Multimedia Tools and Applications 79(39\u201340):29243\u201329263","journal-title":"Multimedia Tools and Applications"},{"key":"2133_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2020.107484","volume":"171","author":"M Zhou","year":"2020","unstructured":"Zhou M, Wang C (2020) A novel image encryption scheme based on conservative hyperchaotic system and closed-loop diffusion between blocks. Signal Process 171:107484","journal-title":"Signal Process"},{"issue":"1","key":"2133_CR3","doi-asserted-by":"publisher","first-page":"51","DOI":"10.3390\/sym11010051","volume":"11","author":"K Chen","year":"2019","unstructured":"Chen K, Chang C, Chin C (2019) Real-Time Error-Free Reversible Data Hiding in Encrypted Images Using (7, 4) Hamming Code and Most Significant Bit Prediction[J]. Symmetry 11(1):51\u201367","journal-title":"Symmetry"},{"key":"2133_CR4","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1186\/s40064-016-1818-0","volume":"5","author":"Z Cao","year":"2016","unstructured":"Cao Z, Yin Z, Hu H, Gao X, Wang L (2016) High capacity data hiding scheme based on (7, 4) Hamming code[J]. Springerplus 5:175","journal-title":"Springerplus"},{"key":"2133_CR5","doi-asserted-by":"crossref","unstructured":"Wang C, Ma B, Xia Z, Li J, Li Q (2021) Stereoscopic image description with trinion fractional-order continuous orthogonal moments. IEEE Transactions on Circuits and Systems for Video Technology","DOI":"10.1109\/TCSVT.2021.3094882"},{"key":"2133_CR6","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1109\/LSP.2021.3080181","volume":"28","author":"X Wang","year":"2021","unstructured":"Wang X, Wang X, Ma B, Li Q, Shi Y (2021) High Precision Error Prediction Algorithm Based on Ridge Regression Predictor for Reversible Data Hiding[J]. IEEE Signal Proc Lett 28:1125\u20131129","journal-title":"IEEE Signal Proc Lett"},{"issue":"9","key":"2133_CR7","doi-asserted-by":"publisher","first-page":"1914","DOI":"10.1109\/TIFS.2016.2566261","volume":"11","author":"B Ma","year":"2016","unstructured":"Ma B, Shi Y (2016) A reversible data hiding scheme based on code division multiplexing. IEEE Transactions on Information Forensics and Security 11(9):1914\u20131927","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2133_CR8","doi-asserted-by":"crossref","unstructured":"Li Q, Wang X, Ma B, Wang X, Wang C (2021) Concealed attack for robust watermarking based on generative model and perceptual loss. IEEE Transactions on Circuits and Systems for Video Technology","DOI":"10.1109\/TCSVT.2021.3138795"},{"key":"2133_CR9","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.optlaseng.2019.04.011","volume":"121","author":"Q Xu","year":"2019","unstructured":"Xu Q, Sun K, Cao C, Zhu C (2019) A fast image encryption algorithm based on compressive sensing and hyperchaotic map[J]. Opt Lasers Eng 121:203\u2013214","journal-title":"Opt Lasers Eng"},{"key":"2133_CR10","doi-asserted-by":"crossref","unstructured":"Ye G, Pan C, Dong Y, Shi Y, HX, (2020) Image encryption and hiding algorithm based on compressive sensing and random numbers insertion[J]. Signal Process 172:107563","DOI":"10.1016\/j.sigpro.2020.107563"},{"key":"2133_CR11","doi-asserted-by":"crossref","unstructured":"Han XT, Mou J, Jahanshahi H, Cao YH, Bu F, Zhang Y (2022) A new set of hyperchaotic maps based on modulation and coupling. Eur Phys J Plus 137(4)","DOI":"10.1140\/epjp\/s13360-022-02734-3"},{"issue":"12","key":"2133_CR12","doi-asserted-by":"publisher","first-page":"2250186","DOI":"10.1142\/S0218127422501863","volume":"32","author":"Y Sha","year":"2022","unstructured":"Sha Y, Sun B, Chen X, Mou J, Jahanshahi H (2022) A Chaotic Image Encryption Scheme Based on Genetic Central Dogma and KMP Method. International Journal of Bifurcation and Chaos 32(12):2250186","journal-title":"International Journal of Bifurcation and Chaos"},{"issue":"12","key":"2133_CR13","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127422501802","volume":"32","author":"X Liu","year":"2022","unstructured":"Liu X, Mou J, Yan H, Cao Y (2022) Memcapacitor-Coupled Chebyshev Hyperchaotic Map. International Journal of Bifurcation and Chaos 32(12):225018","journal-title":"International Journal of Bifurcation and Chaos"},{"key":"2133_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2022.112133","volume":"159","author":"X Li","year":"2022","unstructured":"Li X, Mou J, Banerjee S, Wang Z, Cao Y (2022) Design and DSP implementation of a fractional-rder detuned laser hyperchaotic circuit with applications in image encryption. Chaos, Solitons Fractals 159:112133","journal-title":"Chaos, Solitons Fractals"},{"issue":"10","key":"2133_CR15","doi-asserted-by":"publisher","first-page":"1135","DOI":"10.1140\/epjp\/s13360-022-03353-8","volume":"13","author":"T Ma","year":"2022","unstructured":"Ma T, Mou J, Yan H, Cao Y (2022) A New Class of Hopfield Neural Network with Double Memristive Synapses and Its DSP Implementation[J]. Eur Phys J Plus 13(10):1135","journal-title":"Eur Phys J Plus"},{"key":"2133_CR16","volume":"159","author":"L Ren","year":"2023","unstructured":"Ren L, Mou J, Banerjee S, Zhang Y (2023) A Hyperchaotic Map with A New Discrete Memristor Model: Design, Dynamical Analysis, Implementation and Application. Chaos, Solitons Fractals 159:112133","journal-title":"Chaos, Solitons Fractals"},{"issue":"1","key":"2133_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1140\/epjp\/s13360-019-00076-1","volume":"135","author":"C Ma","year":"2020","unstructured":"Ma C, Mou J, Yang F, Yan H (2020) A fractional-order hopfield neural network chaotic system and its circuit realization. Eur Phys J Plus 135(1):1\u201316","journal-title":"Eur Phys J Plus"},{"issue":"2","key":"2133_CR18","doi-asserted-by":"publisher","first-page":"1697","DOI":"10.1007\/s11071-022-07268-y","volume":"108","author":"C Li","year":"2022","unstructured":"Li C, Yang Y, Yang X, Zi X, Xiao F (2022) A tristable locally active memristor and its application in Hopfield neural network. Nonlinear Dyn 108(2):1697\u20131717","journal-title":"Nonlinear Dyn"},{"issue":"1","key":"2133_CR19","doi-asserted-by":"publisher","first-page":"1041","DOI":"10.1007\/s11071-021-06814-4","volume":"106","author":"C Li","year":"2022","unstructured":"Li C, Li H, Xie W, Du J (2022) A S-type bistable locally active memristor model and its analog implementation in an oscillator circuit. Nonlinear Dyn 106(1):1041\u20131058","journal-title":"Nonlinear Dyn"},{"issue":"2","key":"2133_CR20","doi-asserted-by":"publisher","first-page":"2043","DOI":"10.1007\/s11071-021-06206-8","volume":"103","author":"Y Zhou","year":"2022","unstructured":"Zhou Y, Li C, Li W, Li H, Feng W, Qian K (2022) Image encryption algorithm with circle index table scrambling and partition diffusion. Nonlinear Dyn 103(2):2043\u20132061","journal-title":"Nonlinear Dyn"},{"issue":"12","key":"2133_CR21","doi-asserted-by":"publisher","first-page":"18479","DOI":"10.1007\/s11042-021-10631-7","volume":"80","author":"C Li","year":"2021","unstructured":"Li C, Yang Z, Li H, Feng W, Du J (2021) Image encryption scheme with bit-level scrambling and multiplication diffusion. Multimedia Tools and Applications 80(12):18479\u201318501","journal-title":"Multimedia Tools and Applications"},{"issue":"5","key":"2133_CR22","first-page":"1","volume":"107","author":"L Xiong","year":"2022","unstructured":"Xiong L, Yang F, Mou J, An X, Zhang X (2022) A memristive system and its applications in red-blue 3D glasses and image encryption algorithm with DNA variation. Nonlinear Dyn 107(5):1\u201323","journal-title":"Nonlinear Dyn"},{"issue":"13","key":"2133_CR23","doi-asserted-by":"publisher","first-page":"2050193","DOI":"10.1142\/S021812742050193X","volume":"30","author":"L Xiong","year":"2020","unstructured":"Xiong L, Zhang X, Teng S (2020) Experimental verification of a comparative research platform for various nonlinearity and weak signal detection based on a memristor-based Chua\u2019s system. International Journal of Bifurcation and Chaos 30(13):2050193","journal-title":"International Journal of Bifurcation and Chaos"},{"key":"2133_CR24","doi-asserted-by":"crossref","unstructured":"Yu F, Kong X, Chen H, Yu Q, Cai S, Huang Y (2022) A 6D Fractional-Order Memristive Hopfield Neural Network and its Application in Image Encryption. Frontiers in Physics, 109","DOI":"10.3389\/fphy.2022.847385"},{"issue":"39","key":"2133_CR25","doi-asserted-by":"publisher","first-page":"29243","DOI":"10.1007\/s11042-020-09542-w","volume":"79","author":"G Cheng","year":"2020","unstructured":"Cheng G, Wang C, Xu C (2020) A novel hyper-chaotic image encryption scheme based on quantum genetic algorithm and compressive sensing. Multimedia Tools and Applications 79(39):29243\u201329263","journal-title":"Multimedia Tools and Applications"},{"key":"2133_CR26","first-page":"181884","volume":"7","author":"F Yu","year":"2021","unstructured":"Yu F, Zhang Z, Shen H, Huang Y, Cai S, Jin J (2021) Design and FPGA implementation of a pseudo-random number generator based on a Hopfield neural network under electromagnetic radiation. Frontiers in Physics 7:181884\u2013181898","journal-title":"Frontiers in Physics"},{"issue":"12","key":"2133_CR27","doi-asserted-by":"publisher","first-page":"12708","DOI":"10.1109\/TIE.2020.3047012","volume":"68","author":"H Lin","year":"2021","unstructured":"Lin H, Wang C, Yu F, Xu C, Hong Q (2021) An Extremely Simple Multiwing Chaotic System: Dynamics Analysis, Encryption Application, and Hardware Implementation. IEEE Trans Ind Electron 68(12):12708\u201312719","journal-title":"IEEE Trans Ind Electron"},{"issue":"9","key":"2133_CR28","doi-asserted-by":"publisher","first-page":"13821","DOI":"10.1007\/s11042-020-10429-z","volume":"80","author":"D Jie","year":"2021","unstructured":"Jie D, Zhou M, Wang C, Wang S, Xu C (2021) Image segmentation encryption algorithm with chaotic sequence generation participated by cipher and multi-feedback loops. Multimedia Tools and Applications 80(9):13821\u201313840","journal-title":"Multimedia Tools and Applications"},{"issue":"11\u201312","key":"2133_CR29","first-page":"7227","volume":"79","author":"C Zhu","year":"2019","unstructured":"Zhu C, Gan Z, Lu Y, Chai X (2019) An image encryption algorithm based on 3-D DNA level permutation and substitution scheme[J]. Multimedia Tools and Applications 79(11\u201312):7227\u20137258","journal-title":"Multimedia Tools and Applications"},{"issue":"6","key":"2133_CR30","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps[J]. International Journal of Bifurcation and chaos 8(6):1259\u20131284","journal-title":"International Journal of Bifurcation and chaos"},{"issue":"24","key":"2133_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2020.106031","volume":"129","author":"F Yang","year":"2020","unstructured":"Yang F, Mou J, Ma C, Cao Y (2020) Dynamic analysis of an improper fractional-order laser chaotic system and its image encryption application[J]. Opt Lasers Eng 129(24):106031","journal-title":"Opt Lasers Eng"},{"issue":"3","key":"2133_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2021.107074","volume":"140","author":"X Li","year":"2021","unstructured":"Li X, Mou J, Xiong L, Wang Z, Xu J (2021) Fractional-order double-ring erbium-doped fiber laser chaotic system and its application on image encryption[J]. Opt Lasers Technol 140(3):107074","journal-title":"Opt Lasers Technol"},{"issue":"1","key":"2133_CR33","doi-asserted-by":"publisher","first-page":"745","DOI":"10.1007\/s11071-018-4391-y","volume":"94","author":"G Ye","year":"2018","unstructured":"Ye G, Pan C, Huang X, Mei Q (2018) An efficient pixel-level chaotic image encryption algorithm[J]. Nonlinear Dyn 94(1):745\u2013756","journal-title":"Nonlinear Dyn"},{"issue":"16","key":"2133_CR34","doi-asserted-by":"publisher","first-page":"10371","DOI":"10.1007\/s00521-021-05797-y","volume":"33","author":"X Chai","year":"2021","unstructured":"Chai X, Fu J, Zhang J, Han D, Gan Z (2021) Exploiting preprocessing-permutation-diffusion strategy for secure image cipher based on 3D Latin cube and memristive hyperchaotic system[J]. Neural Comput & Applic 33(16):10371\u201310402","journal-title":"Neural Comput & Applic"},{"issue":"11","key":"2133_CR35","doi-asserted-by":"publisher","first-page":"7111","DOI":"10.1007\/s00521-018-3541-y","volume":"3","author":"Z Gan","year":"2018","unstructured":"Gan Z, Chai X, Han D, Chen Y (2018) A chaotic image encryption algorithm based on 3-D bit-plane permutation[J]. Neural Comput & Applic 3(11):7111\u20137130","journal-title":"Neural Comput & Applic"},{"issue":"3","key":"2133_CR36","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1016\/j.cnsns.2014.06.032","volume":"20","author":"J Chen","year":"2015","unstructured":"Chen J, Zhu Z, Fu C, Yu H, Zhang L (2015) A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism[J]. Commun Nonlinear Sci Numer Simul 20(3):846\u2013860","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"2133_CR37","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.ins.2020.10.048","volume":"550","author":"M Talhaoui","year":"2021","unstructured":"Talhaoui M, Wang X (2021) A new fractional one dimensional chaotic map and its application in high-speed image encryption[J]. Information Sciences 550:13\u201326","journal-title":"Information Sciences"},{"issue":"05","key":"2133_CR38","doi-asserted-by":"publisher","first-page":"1750069","DOI":"10.1142\/S0129183117500693","volume":"28","author":"X Chai","year":"2017","unstructured":"Chai X, Gan Z, Lu Y, Chen Y, Han D (2017) A novel image encryption algorithm based on the chaotic system and DNA computing[J]. Int J Mod Phys C 28(05):1750069","journal-title":"Int J Mod Phys C"},{"key":"2133_CR39","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1016\/j.image.2016.12.007","volume":"52","author":"X Chai","year":"2017","unstructured":"Chai X, Gan Z, Yang K, Chen Y, Liu X (2017) An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations[J]. Signal Process Image Commun 52:6\u201319","journal-title":"Signal Process Image Commun"},{"key":"2133_CR40","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.optlaseng.2016.08.009","volume":"88","author":"X Chai","year":"2017","unstructured":"Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations[J]. Opt Lasers Eng 88:197\u2013213","journal-title":"Opt Lasers Eng"},{"issue":"16","key":"2133_CR41","doi-asserted-by":"publisher","first-page":"21445","DOI":"10.1007\/s11042-017-5594-9","volume":"77","author":"L Liu","year":"2018","unstructured":"Liu L, Miao S (2018) A new simple one-dimensional chaotic map and its application for image encryption[J]. Multimedia Tools and Applications 77(16):21445\u201321462","journal-title":"Multimedia Tools and Applications"},{"issue":"4","key":"2133_CR42","doi-asserted-by":"publisher","first-page":"2797","DOI":"10.1007\/s11071-018-4723-y","volume":"95","author":"X Wang","year":"2019","unstructured":"Wang X, Feng L, Li R, Zhang F (2019) A fast image encryption algorithm based on non-adjacent dynamically coupled map lattice model[J]. Nonlinear Dyn 95(4):2797\u20132824","journal-title":"Nonlinear Dyn"},{"key":"2133_CR43","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.sigpro.2018.03.010","volume":"149","author":"Z Hua","year":"2018","unstructured":"Hua Z, Jin F, Xu B, Huang H (2018) 2D Logistic-Sine-coupling map for image encryption[J]. Signal Process 149:148\u2013161","journal-title":"Signal Process"},{"issue":"1","key":"2133_CR44","doi-asserted-by":"publisher","first-page":"112","DOI":"10.3390\/e22010112","volume":"22","author":"K Butt","year":"2020","unstructured":"Butt K, Li G, Khan S, Manzoor S (2020) Fast and Efficient Image Encryption Algorithm Based on Modular Addition and SPD[J]. Entropy (Basel) 22(1):112","journal-title":"Entropy (Basel)"},{"issue":"8","key":"2133_CR45","doi-asserted-by":"publisher","first-page":"2066","DOI":"10.1016\/j.cnsns.2012.12.012","volume":"18","author":"W Zhang","year":"2013","unstructured":"Zhang W, Wong K, Yu H, Zhu Z (2013) An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion[J]. Commun Nonlinear Sci Numer Simul 18(8):2066\u20132080","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"1","key":"2133_CR46","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1016\/j.asoc.2009.12.011","volume":"11","author":"Y Wang","year":"2011","unstructured":"Wang Y, Wong K, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm[J]. Appl Soft Comput 11(1):514\u2013522","journal-title":"Appl Soft Comput"},{"issue":"1","key":"2133_CR47","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1007\/s11071-015-2008-2","volume":"81","author":"S Seyedzadeh","year":"2015","unstructured":"Seyedzadeh S, Norouzi B, Mosavi M, Mirzakuchaki S (2015) A novel color image encryption algorithm based on spatial permutation and quantum chaotic map[J]. Nonlinear Dyn 81(1):511\u2013529","journal-title":"Nonlinear Dyn"},{"issue":"1","key":"2133_CR48","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s11554-020-00948-1","volume":"18","author":"M Talhaoui","year":"2020","unstructured":"Talhaoui M, Wang X, Midoun M (2020) Fast image encryption algorithm with high security level using the Bulban chaotic map[J]. J Real-Time Image Proc 18(1):85\u201398","journal-title":"J Real-Time Image Proc"},{"key":"2133_CR49","doi-asserted-by":"publisher","first-page":"96321","DOI":"10.1109\/ACCESS.2021.3094563","volume":"9","author":"Y Sha","year":"2021","unstructured":"Sha Y, Cao Y, Yan H, Jun M, Gao X (2021) An Image Encryption Scheme Based on IAVL Permutation Scheme and DNA Operations[J]. IEEE Access 9:96321\u201396336","journal-title":"IEEE Access"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-023-02133-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-023-02133-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-023-02133-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T19:05:20Z","timestamp":1735671920000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-023-02133-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,1]]},"references-count":49,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["2133"],"URL":"https:\/\/doi.org\/10.1007\/s11036-023-02133-7","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"type":"print","value":"1383-469X"},{"type":"electronic","value":"1572-8153"}],"subject":[],"published":{"date-parts":[[2023,8,1]]},"assertion":[{"value":"8 June 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 August 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No conflicts of interests about the publication by all authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}