{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T13:36:26Z","timestamp":1762781786373},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T00:00:00Z","timestamp":1380585600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2015,2]]},"DOI":"10.1007\/s11042-013-1699-y","type":"journal-article","created":{"date-parts":[[2013,9,30]],"date-time":"2013-09-30T08:19:05Z","timestamp":1380529145000},"page":"781-811","source":"Crossref","is-referenced-by-count":104,"title":["A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos"],"prefix":"10.1007","volume":"74","author":[{"given":"Benyamin","family":"Norouzi","sequence":"first","affiliation":[]},{"given":"Seyed Mohammad","family":"Seyedzadeh","sequence":"additional","affiliation":[]},{"given":"Sattar","family":"Mirzakuchaki","sequence":"additional","affiliation":[]},{"given":"Mohammad Reza","family":"Mosavi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,10,1]]},"reference":[{"key":"1699_CR1","doi-asserted-by":"crossref","first-page":"2714","DOI":"10.1016\/j.sigpro.2010.03.022","volume":"90","author":"X Liao","year":"2010","unstructured":"Liao X, Lai S, Zhou Q (2010) A novel image encryption algorithm based on self-adaptive wave transmission. J Signal Process 90:2714\u20132722","journal-title":"J Signal Process"},{"key":"1699_CR2","author":"CK Huang","year":"2011","unstructured":"Huang CK, Liao CW, Hsu SL, Jeng YC (2011) Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system. Telecommun Syst. doi: 10.1007\/s11235-011-9461-0","journal-title":"Telecommun Syst"},{"key":"1699_CR3","first-page":"1105","volume":"2","author":"J Fridrich","year":"1997","unstructured":"Fridrich J (1997) Image encryption based on chaotic maps. IEEE Conf Comput Cybern Simul 2:1105\u20131110","journal-title":"IEEE Conf Comput Cybern Simul"},{"key":"1699_CR4","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G Chen","year":"2004","unstructured":"Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. J Chaos Solitons Fractals 21:749\u2013761","journal-title":"J Chaos Solitons Fractals"},{"issue":"10","key":"1699_CR5","doi-asserted-by":"crossref","first-page":"3613","DOI":"10.1142\/S021812740401151X","volume":"14","author":"Y Mao","year":"2004","unstructured":"Mao Y, Chen G, Lian S (2004) A novel fast image encryption scheme based on 3D chaotic baker maps. Int J Bifurc Chaos 14(10):3613\u20133624","journal-title":"Int J Bifurc Chaos"},{"key":"1699_CR6","doi-asserted-by":"crossref","first-page":"1773","DOI":"10.1016\/j.chaos.2008.07.031","volume":"41","author":"Y Wang","year":"2009","unstructured":"Wang Y, Wong KW, Liao X, Xiang T, Chen G (2009) A chaos-based image encryption algorithm with variable control parameters. J Chaos Solitons Fractals 41:1773\u20131783","journal-title":"J Chaos Solitons Fractals"},{"key":"1699_CR7","doi-asserted-by":"crossref","first-page":"1745","DOI":"10.1016\/j.chaos.2009.03.084","volume":"42","author":"S Mazloom","year":"2009","unstructured":"Mazloom S, Eftekhari-Moghadam AM (2009) Color image encryption based on coupled nonlinear chaotic map. J Chaos Solitons Fractals 42:1745\u20131754","journal-title":"J Chaos Solitons Fractals"},{"key":"1699_CR8","doi-asserted-by":"crossref","first-page":"3259","DOI":"10.1016\/j.optcom.2010.04.056","volume":"283","author":"A Akhshani","year":"2010","unstructured":"Akhshani A, Behnia S, Akhavan A, Hassan HA, Hassan Z (2010) A novel scheme for image encryption based on 2D piecewise chaotic maps. J Opt Commun 283:3259\u20133266","journal-title":"J Opt Commun"},{"key":"1699_CR9","doi-asserted-by":"crossref","first-page":"1202","DOI":"10.1016\/j.sigpro.2011.11.004","volume":"92","author":"SM Seyedzadeh","year":"2012","unstructured":"Seyedzadeh SM, Mirzakuchaki S (2012) A fast color image encryption algorithm based on coupled two dimensional piecewise chaotic map. J Signal Process 92:1202\u20131215","journal-title":"J Signal Process"},{"issue":"1","key":"1699_CR10","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1007\/s11071-011-0006-6","volume":"67","author":"O Mirzaei","year":"2012","unstructured":"Mirzaei O, Yaghoobi M, Irani H (2012) A new image encryption method: parallel Sub-image encryption with hyper chaos. J Nonlinear Dyn 67(1):557\u2013566","journal-title":"J Nonlinear Dyn"},{"key":"1699_CR11","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.optcom.2011.08.079","volume":"285","author":"C Zhu","year":"2012","unstructured":"Zhu C (2012) A novel image encryption scheme based on improved hyperchaotic sequences. J Opt Commun 285:29\u201337","journal-title":"J Opt Commun"},{"issue":"2","key":"1699_CR12","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1016\/j.jss.2011.08.017","volume":"85","author":"X Wei","year":"2012","unstructured":"Wei X, Guo L, Zhang Q, Zhang J, Lian S (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw 85(2):290\u2013299","journal-title":"J Syst Softw"},{"key":"1699_CR13","first-page":"49","volume":"4","author":"JC Yen","year":"2000","unstructured":"Yen JC, Guo JI (2000) A new chaotic key-based design for image encryption and decryption. Proc IEEE Int Conf Circ Syst 4:49\u201352","journal-title":"Proc IEEE Int Conf Circ Syst"},{"key":"1699_CR14","first-page":"708","volume":"2","author":"S Li","year":"2002","unstructured":"Li S, Zheng X (2002) Cryptanalysis of a chaotic image encryption method. Proc IEEE Symp Circ Syst 2:708\u2013711","journal-title":"Proc IEEE Symp Circ Syst"},{"key":"1699_CR15","unstructured":"Belkhouche F, Qidwai U (2003) Binary image encoding using one-dimensional chaotic map. Proc IEEE Annu Techical Conf :39\u201343"},{"key":"1699_CR16","doi-asserted-by":"crossref","first-page":"645","DOI":"10.1016\/j.physa.2005.01.001","volume":"351","author":"S Lian","year":"2005","unstructured":"Lian S, Sun J, Wang Z (2005) Security analysis of a chaos-based image encryption algorithm. Physica A 351:645\u2013661","journal-title":"Physica A"},{"issue":"9","key":"1699_CR17","doi-asserted-by":"crossref","first-page":"1371","DOI":"10.1016\/j.imavis.2008.12.008","volume":"27","author":"C Li","year":"2009","unstructured":"Li C, Li S, Asim M, Nunez J, Alvarez G, Chen G (2009) On the security defects of an image encryption scheme. J Image Vision Comput 27(9):1371\u20131381","journal-title":"J Image Vision Comput"},{"key":"1699_CR18","doi-asserted-by":"crossref","first-page":"761","DOI":"10.1016\/j.cnsns.2010.04.021","volume":"16","author":"L Nian-Sheng","year":"2011","unstructured":"Nian-Sheng L (2011) Pseudo-randomness and complexity of binary sequences generated by the chaotic system. J Commun Nonlinear Sci Numer Simul 16:761\u2013768","journal-title":"J Commun Nonlinear Sci Numer Simul"},{"key":"1699_CR19","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1016\/j.physleta.2007.07.040","volume":"372","author":"T Gao","year":"2008","unstructured":"Gao T, Chen Z (2008) A new image encryption algorithm based on hyper-chaos. Phys Lett A 372:394\u2013400","journal-title":"Phys Lett A"},{"key":"1699_CR20","doi-asserted-by":"crossref","first-page":"5973","DOI":"10.1016\/j.physleta.2008.07.057","volume":"372","author":"R Rhouma","year":"2008","unstructured":"Rhouma R, Belghith S (2008) Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Phys Lett A 372:5973\u20135978","journal-title":"Phys Lett A"},{"key":"1699_CR21","doi-asserted-by":"crossref","first-page":"1362","DOI":"10.1016\/j.physleta.2010.01.024","volume":"374","author":"X Ge","year":"2010","unstructured":"Ge X, Liu F, Lu B, Yang C (2010) Improvement of Rhouma\u2019s attacks on Gao algorithm. J Phys Lett A 374:1362\u20131367","journal-title":"J Phys Lett A"},{"key":"1699_CR22","doi-asserted-by":"crossref","first-page":"2775","DOI":"10.1016\/j.optcom.2011.02.039","volume":"284","author":"G Zhang","year":"2011","unstructured":"Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. J Opt Commun 284:2775\u20132780","journal-title":"J Opt Commun"},{"key":"1699_CR23","doi-asserted-by":"crossref","first-page":"1797","DOI":"10.1016\/j.jfranklin.2011.05.001","volume":"348","author":"A Akhavan","year":"2011","unstructured":"Akhavan A, Samsudin A, Akhshani A (2011) A symmetric image encryption scheme based on combination of nonlinear chaotic maps. J Frankl Inst 348:1797\u20131813","journal-title":"J Frankl Inst"},{"key":"1699_CR24","doi-asserted-by":"crossref","first-page":"631","DOI":"10.1016\/j.chaos.2008.01.028","volume":"38","author":"F Sun","year":"2008","unstructured":"Sun F, Liu S, Li Z, Lu Z (2008) A novel image encryption scheme based on spatial chaos map. J Chaos Solitons Fractals 38:631\u2013640","journal-title":"J Chaos Solitons Fractals"},{"key":"1699_CR25","doi-asserted-by":"crossref","first-page":"1518","DOI":"10.1016\/j.chaos.2005.11.090","volume":"32","author":"HS Kwok","year":"2007","unstructured":"Kwok HS, Tang WKS (2007) A fast image encryption system based on chaotic maps with finite precision representation, Chaos Solitons Fractals 32:1518\u20131529","journal-title":"Chaos Solitons Fractals"},{"key":"1699_CR26","author":"SE Borujeni","year":"2011","unstructured":"Borujeni SE, Eshghi M (2011) Chaotic image encryption system using phase-magnitude transformation and pixel substitution. J Telecommun Syst. doi: 10.1007\/s11235-011-9458-8","journal-title":"J Telecommun Syst"},{"issue":"5","key":"1699_CR27","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1016\/0375-9601(76)90101-8","volume":"57","author":"OE R\u00f6ssler","year":"1976","unstructured":"R\u00f6ssler OE (1976) An equation for continuous chaos original research article, Phys Lett A 57(5):397\u2013398","journal-title":"Phys Lett A"},{"key":"1699_CR28","author":"B Norouzi","year":"2012","unstructured":"Norouzi B, Mirzakuchaki S, Seyedzadeh SM, Mosavi MR (2012) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed Tools Appl. doi: 10.1007\/s11042-012-1292-9","journal-title":"Multimed Tools Appl"},{"key":"1699_CR29","author":"B Norouzi","year":"2013","unstructured":"Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2013) A novel image encryption based on hash function with only two-round diffusion process. Multimedia Systems. doi: 10.1007\/s00530-013-0314-4","journal-title":"Multimedia Systems"},{"key":"1699_CR30","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1016\/j.physleta.2007.01.081","volume":"366","author":"S Behnia","year":"2007","unstructured":"Behnia S, Akhshani A, Ahadpour S, Mahmodi H, Akhavan A (2007) A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps. J Phys Lett A 366:391\u2013396","journal-title":"J Phys Lett A"},{"key":"1699_CR31","doi-asserted-by":"crossref","unstructured":"Khanzadi H, Omam MA, Lotfifar F, Eshghi M (2010) Image encryption based on gyrator transform using chaotic maps. IEEE Conf Signal Process :2608\u20132612","DOI":"10.1109\/ICOSP.2010.5656132"},{"key":"1699_CR32","doi-asserted-by":"crossref","first-page":"2028","DOI":"10.1016\/j.mcm.2010.06.005","volume":"52","author":"Q Zhang","year":"2010","unstructured":"Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combining with chaotic maps. J Math Comput Model 52:2028\u20132035","journal-title":"J Math Comput Model"},{"key":"1699_CR33","doi-asserted-by":"crossref","first-page":"584","DOI":"10.1016\/j.optcom.2011.11.025","volume":"285","author":"Z Zhong","year":"2012","unstructured":"Zhong Z, Chang J, Shan M, Hao B (2012) Double image encryption using double pixel scrambling and random phase encoding, J Opt Commun 285:584\u2013588","journal-title":"J Opt Commun"},{"key":"1699_CR34","author":"AAA El-Latif","year":"2012","unstructured":"El-Latif AAA, Li L, Niu X (2012) A New image encryption scheme based on cyclic elliptic curve and chaotic system. Multimed Tool Appl. doi: 10.1007\/s11042-012-1173-2","journal-title":"Multimed Tool Appl"},{"key":"1699_CR35","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1007\/s11042-010-0652-6","volume":"56","author":"IS Sam","year":"2012","unstructured":"Sam IS, Devaraj P, Bhuvaneswaran RS (2012) A novel image cipher based on mixed transformed logistic maps. Multimed Tool Appl 56:315\u2013330. doi: 10.1007\/s11042-010-0652-6","journal-title":"Multimed Tool Appl"},{"key":"1699_CR36","doi-asserted-by":"crossref","first-page":"775","DOI":"10.1007\/s11042-011-0775-4","volume":"59","author":"N Taneja","year":"2012","unstructured":"Taneja N, Raman B, Gupta I (2012) Combinational domain encryption for still visual data. Multimed Tool Appl 59:775\u2013793. doi: 10.1007\/s11042-011-0775-4","journal-title":"Multimed Tool Appl"},{"issue":"6","key":"1699_CR37","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1016\/j.physleta.2005.05.040","volume":"343","author":"K Wang","year":"2005","unstructured":"Wang K, Pei, Zou L, Song A, He Z (2005) On the security of 3D Cat map based symmetric image encryption scheme. Phys Lett A 343(6):432\u2013439","journal-title":"Phys Lett A"},{"key":"1699_CR38","doi-asserted-by":"crossref","first-page":"2509","DOI":"10.1016\/j.chaos.2007.10.054","volume":"40","author":"S Lian","year":"2009","unstructured":"Lian S (2009) Efficient image or video encryption based on spatiotemporal chaos system. Chaos, Solitons Fractals 40:2509\u20132519","journal-title":"Chaos, Solitons Fractals"},{"key":"1699_CR39","doi-asserted-by":"crossref","first-page":"5790","DOI":"10.1016\/j.physleta.2008.07.042","volume":"372","author":"R Rhouma","year":"2008","unstructured":"Rhouma R, Belghith S (2008) Cryptanalysis of a spatiotemporal chaotic image\/video cryptosystem. Phys Lett A 372:5790\u20135794","journal-title":"Phys Lett A"},{"key":"1699_CR40","doi-asserted-by":"crossref","first-page":"926","DOI":"10.1016\/j.imavis.2006.02.021","volume":"24","author":"NK Pareek","year":"2006","unstructured":"Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24:926\u2013934","journal-title":"Image Vis Comput"},{"key":"1699_CR41","doi-asserted-by":"crossref","first-page":"1371","DOI":"10.1016\/j.imavis.2008.12.008","volume":"27","author":"C Li","year":"2009","unstructured":"Li C, Li S, Asim M, Nunez J, Alvarez G, Chen G (2009) On the security defects of an image encryption scheme. Image Vis Comput 27:1371\u20131381","journal-title":"Image Vis Comput"},{"key":"1699_CR42","doi-asserted-by":"crossref","first-page":"3056","DOI":"10.1016\/j.cnsns.2008.11.005","volume":"14","author":"V Patidar","year":"2009","unstructured":"Patidar V, Pareek NK, Sud KK (2009) A new substitution-diffusion based image cipher using chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 14:3056\u20133075","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"1699_CR43","doi-asserted-by":"crossref","first-page":"1887","DOI":"10.1016\/j.cnsns.2009.07.007","volume":"15","author":"R Rhouma","year":"2010","unstructured":"Rhouma R, Solak E, Belghith S (2010) Cryptanalysis of a new substitution\u2013diffusion based image cipher. Commun Nonlinear Sci Numer Simul 15:1887\u20131892","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"1699_CR44","doi-asserted-by":"crossref","first-page":"2755","DOI":"10.1016\/j.cnsns.2009.11.010","volume":"15","author":"V Patidar","year":"2010","unstructured":"Patidar V, Pareek NK, Purohit G, Sud KK (2010) Modified substitution-diffusion image cipher using chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 15:2755\u20132765","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"1699_CR45","doi-asserted-by":"crossref","first-page":"837","DOI":"10.1016\/j.cnsns.2010.05.008","volume":"16","author":"C Li","year":"2011","unstructured":"Li C, Li S, Lo K-T (2011) Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 16:837\u2013843","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"1699_CR46","doi-asserted-by":"crossref","first-page":"795","DOI":"10.1007\/s11071-013-0832-9","volume":"73","author":"X Wang","year":"2013","unstructured":"Wang X, Liu L (2013) Cryptanalysis of a parallel sub-image encryption method with high-dimensional chaos. Nonlinear Dyn 73:795\u2013800","journal-title":"Nonlinear Dyn"},{"key":"1699_CR47","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1007\/s11071-012-0639-0","volume":"71","author":"C Zhu","year":"2013","unstructured":"Zhu C, Liao C, Deng X (2013) Breaking and improving an image encryption scheme based on total shuffling scheme. Nonlinear Dyn 71:25\u201334","journal-title":"Nonlinear Dyn"},{"issue":"3","key":"1699_CR48","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1007\/s11071-010-9749-8","volume":"62","author":"XY Wang","year":"2010","unstructured":"Wang XY, Yang L, Liu R, Kadir A (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 62(3):615\u2013621","journal-title":"Nonlinear Dyn"},{"key":"1699_CR49","doi-asserted-by":"crossref","first-page":"1091","DOI":"10.1007\/s11071-012-0329-y","volume":"69","author":"Y Zhang","year":"2012","unstructured":"Zhang Y, Li C, Li Q, Zhang D, Shu S (2012) Breaking a chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 69:1091\u20131096","journal-title":"Nonlinear Dyn"},{"key":"1699_CR50","author":"C Li","year":"2013","unstructured":"Li C, Liu Y, Xie T, Chen M (2013) Breaking a novel image encryption scheme based on improved hyperchaotic sequences. Nonlinear Dyn. doi: 10.1007\/s11071-013-0924-6","journal-title":"Nonlinear Dyn"},{"key":"1699_CR51","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1007\/s11071-012-0658-x","volume":"71","author":"G Ye","year":"2013","unstructured":"Ye G, Wong K-W (2013) An image encryption scheme based on time-delay and hyperchaotic system. Nonlinear Dyn 71:259\u2013267","journal-title":"Nonlinear Dyn"},{"key":"1699_CR52","author":"X Huang","year":"2013","unstructured":"Huang X, Ye G (2013) An image encryption algorithm based on hyper-chaos and DNA sequence. Multimed Tools Appl. doi: 10.1007\/s11042-012-1331-6","journal-title":"Multimed Tools Appl"},{"key":"1699_CR53","author":"F Liu","year":"2012","unstructured":"Liu F, Koenig H (2012) Puzzle - an efficient, compression independent video encryption algorithm. Multimed Tools Appl. doi: 10.1007\/s11042-012-1185-y","journal-title":"Multimed Tools Appl"},{"issue":"11","key":"1699_CR54","doi-asserted-by":"crossref","first-page":"3484","DOI":"10.1016\/j.cnsns.2009.12.025","volume":"15","author":"M Amin","year":"2010","unstructured":"Amin M, Faragallah OS, El-Latif AAA (2010) A chaotic block cipher algorithm for image cryptosystems. J Commun Nonlinear Sci Numer Simul 15(11):3484\u20133497","journal-title":"J Commun Nonlinear Sci Numer Simul"},{"key":"1699_CR55","doi-asserted-by":"crossref","first-page":"1171","DOI":"10.1016\/j.ins.2010.11.009","volume":"181","author":"ZL Zhu","year":"2011","unstructured":"Zhu ZL, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a Bit-level permutation. J Inform Sci 181:1171\u20131186","journal-title":"J Inform Sci"},{"key":"1699_CR56","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1016\/j.chaos.2006.11.009","volume":"38","author":"T Gao","year":"2008","unstructured":"Gao T, Chen Z (2008) Image encryption based on a new total shuffling algorithm. J Chaos Solitons Fractals 38:213\u2013220","journal-title":"J Chaos Solitons Fractals"},{"key":"1699_CR57","author":"R Huang","year":"2012","unstructured":"Huang R, Rhee KH, Uchida S (2012) A parallel image encryption method based on compressive sensing. Multimed Tools Appl. doi: 10.1007\/s11042-012-1337-0","journal-title":"Multimed Tools Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-013-1699-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-013-1699-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-013-1699-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,27]],"date-time":"2019-07-27T01:11:46Z","timestamp":1564189906000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-013-1699-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10,1]]},"references-count":57,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,2]]}},"alternative-id":["1699"],"URL":"https:\/\/doi.org\/10.1007\/s11042-013-1699-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,10,1]]}}}