{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T01:02:26Z","timestamp":1768352546512,"version":"3.49.0"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2016,7,20]],"date-time":"2016-07-20T00:00:00Z","timestamp":1468972800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s11042-016-3769-4","type":"journal-article","created":{"date-parts":[[2016,7,20]],"date-time":"2016-07-20T08:56:44Z","timestamp":1469005004000},"page":"13681-13701","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":60,"title":["An image encryption algorithm based on DNA sequence operations and cellular neural network"],"prefix":"10.1007","volume":"76","author":[{"given":"Benyamin","family":"Norouzi","sequence":"first","affiliation":[]},{"given":"Sattar","family":"Mirzakuchaki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,20]]},"reference":[{"key":"3769_CR1","doi-asserted-by":"crossref","first-page":"3259","DOI":"10.1016\/j.optcom.2010.04.056","volume":"283","author":"A Akhshani","year":"2010","unstructured":"Akhshani A, Behnia S, Akhavan A, Hassan HA, Hassan Z (2010) A novel scheme for image encryption based on 2D piecewise chaotic maps. J Opt Commun 283:3259\u20133266","journal-title":"J Opt Commun"},{"key":"3769_CR2","doi-asserted-by":"publisher","unstructured":"Belazi A, Hermassi H, Rhouma R, Belghith S (2014) Algebraic analysis of a RGB image encryption algorithm based on DNA encoding and chaotic map. Journal of Nonlinear Dynamics. doi:\n10.1007\/s11071-014-1263-y","DOI":"10.1007\/s11071-014-1263-y"},{"key":"3769_CR3","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G Chen","year":"2004","unstructured":"Chen G, Mao Y, Chui C (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Journal of Chaos, Solitons and Fractals 21:749\u2013761","journal-title":"Journal of Chaos, Solitons and Fractals"},{"key":"3769_CR4","doi-asserted-by":"publisher","unstructured":"Chou J, Yang C, Chang H (2015) Encryption domain content-based image retrieval and convolution through a block-based transformation algorithm. Multimedia Tools and Applications. doi:\n10.1007\/s11042-015-2917-6","DOI":"10.1007\/s11042-015-2917-6"},{"key":"3769_CR5","doi-asserted-by":"crossref","first-page":"1559","DOI":"10.1007\/s11042-012-1173-2","volume":"70","author":"AA El-Latif","year":"2014","unstructured":"El-Latif AA, Li L, Niu X (2014) A new image encryption scheme based on cyclic elliptic curve and chaotic system. Multimedia Tools and Applications 70:1559\u20131584","journal-title":"Multimedia Tools and Applications"},{"key":"3769_CR6","doi-asserted-by":"publisher","unstructured":"Etemadi Borujeni S, Eshghi M (2011) Chaotic image encryption system using phase-magnitude transformation and pixel substitution. Journal of Telecommunication Systems. doi:\n10.1007\/s11235-011-9458-8","DOI":"10.1007\/s11235-011-9458-8"},{"key":"3769_CR7","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1016\/j.chaos.2006.11.009","volume":"38","author":"T Gao","year":"2008","unstructured":"Gao T, Chen Z (2008) Image encryption based on a new total shuffling algorithm. Journal of Chaos, Solitons and Fractals 38:213\u2013220","journal-title":"Journal of Chaos, Solitons and Fractals"},{"key":"3769_CR8","volume-title":"An image encryption scheme based on irregularly decimated chaotic maps","author":"M Ghebleh","year":"2013","unstructured":"Ghebleh M, Kanso A, Noura H (2013) An image encryption scheme based on irregularly decimated chaotic maps. Image Communication, In Press, Corrected Proof, Signal Processing"},{"key":"3769_CR9","unstructured":"Hermassi A, Belazi R, Rhouma, Belghith SM (2013) Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps. Multimed Tools Appl:1\u201314"},{"key":"3769_CR10","doi-asserted-by":"publisher","unstructured":"Huang X, Ye G (2012) An image Encryption Algorithm based on Hyper-Chaos and DNA Sequence. Multimedia Tools and Applications. doi:\n10.1007\/s11042-012-1331-6","DOI":"10.1007\/s11042-012-1331-6"},{"key":"3769_CR11","doi-asserted-by":"crossref","unstructured":"Huang JJ, Hwang HE, Chen CY, Chen CM (2012) Optical multiple-image encryption based on phase encoding algorithm in the fresnel transform domain. Opt Laser Technol 44(7):2238--2244","DOI":"10.1016\/j.optlastec.2012.02.032"},{"key":"3769_CR12","doi-asserted-by":"publisher","unstructured":"Jain A, Rajpal N (2015) A robust image encryption algorithm resistant to attacks using DNA and chaotic logistic maps. Multimed Tools Appl. doi:\n10.1007\/s11042-015-2515-7","DOI":"10.1007\/s11042-015-2515-7"},{"key":"3769_CR13","doi-asserted-by":"crossref","first-page":"1671","DOI":"10.1016\/j.ijleo.2013.09.040","volume":"125","author":"A Kadir","year":"2014","unstructured":"Kadir A, Hamdulla A, Guo WQ (2014) Color image encryption using skew tent map and hyper chaotic system of 6th-order CNN. Optik 125:1671\u20131675","journal-title":"Optik"},{"key":"3769_CR14","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1016\/j.cnsns.2010.04.010","volume":"16","author":"A Kumar","year":"2011","unstructured":"Kumar A, Ghose MK (2011) Extended substitution\u2013diffusion based image cipher using chaotic standard map. Journal of Commun Nonlinear Sci Numer Simulat 16:372\u2013382","journal-title":"Journal of Commun Nonlinear Sci Numer Simulat"},{"key":"3769_CR15","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.physleta.2007.04.023","volume":"369","author":"CQ Li","year":"2007","unstructured":"Li CQ, Li SJ, Alvarez G, Chen GR, Lo KT (2007) Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations. Phys Lett A 369:23\u201330","journal-title":"Phys Lett A"},{"key":"3769_CR16","doi-asserted-by":"crossref","first-page":"2714","DOI":"10.1016\/j.sigpro.2010.03.022","volume":"90","author":"X Liao","year":"2010","unstructured":"Liao X, Lai S, Zhou Q (2010) A novel image encryption algorithm based on self-adaptive wave transmission. J Signal Process 90:2714\u20132722","journal-title":"J Signal Process"},{"key":"3769_CR17","doi-asserted-by":"crossref","unstructured":"Lima JB, Lima EAO, Madeiro F (2013) Image encryption based on the finite field cosine transform. Signal Process Image Commun 28(10):1537--1547","DOI":"10.1016\/j.image.2013.05.008"},{"key":"3769_CR18","doi-asserted-by":"crossref","first-page":"1457","DOI":"10.1016\/j.asoc.2012.01.016","volume":"12","author":"H Liu","year":"2012","unstructured":"Liu H, Wang X, kadir A (2012a) Image encryption using dna complementary rule and chaotic maps. Appl Soft Comput 12:1457\u20131466","journal-title":"Appl Soft Comput"},{"key":"3769_CR19","doi-asserted-by":"crossref","first-page":"1240","DOI":"10.1016\/j.compeleceng.2012.02.007","volume":"38","author":"L Liu","year":"2012","unstructured":"Liu L, Zhang Q, Wei X (2012b) A RGB image encryption algorithm based on DNA encoding and chaos map. Comput Electr Eng 38:1240\u20131248","journal-title":"Comput Electr Eng"},{"key":"3769_CR20","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1016\/j.optlastec.2014.01.015","volume":"60","author":"Y Liu","year":"2014","unstructured":"Liu Y, Tang J, Xie T (2014) Cryptanalyzing a RGB image encryption algorithm based on DNA encoding and chaos map. Opt Laser Technol 60:111\u2013115","journal-title":"Opt Laser Technol"},{"issue":"10","key":"3769_CR21","doi-asserted-by":"crossref","first-page":"3613","DOI":"10.1142\/S021812740401151X","volume":"14","author":"Y Mao","year":"2004","unstructured":"Mao Y, Chen G, Lian S (2004) A novel fast image encryption scheme based on the three-dimensional chaotic baker map. Journal of Bifurcation and Chaos 14(10):3613\u20133624","journal-title":"Journal of Bifurcation and Chaos"},{"key":"3769_CR22","doi-asserted-by":"crossref","first-page":"1745","DOI":"10.1016\/j.chaos.2009.03.084","volume":"42","author":"S Mazloom","year":"2009","unstructured":"Mazloom S, Eftekhari-Moghadam AM (2009) Color image encryption based on coupled nonlinear chaotic map. Journal of Chaos, Solitons and Fractals 42:1745\u20131754","journal-title":"Journal of Chaos, Solitons and Fractals"},{"key":"3769_CR23","doi-asserted-by":"crossref","first-page":"995","DOI":"10.1007\/s11071-014-1492-0","volume":"78","author":"B Norouzi","year":"2014","unstructured":"Norouzi B, Mirzakuchaki S (2014) A fast color image encryption algorithm based on hyper-chaotic systems. Nonlinear Dynamics 78:995\u20131015","journal-title":"Nonlinear Dynamics"},{"key":"3769_CR24","doi-asserted-by":"publisher","unstructured":"Norouzi B, Mirzakuchaki S (2015) Breaking a Novel Image Encryption Scheme based on an Improper Fractional-Order Chaotic System. Multimed Tools Appl. doi:\n10.1007\/s11042-015-3085-4","DOI":"10.1007\/s11042-015-3085-4"},{"key":"3769_CR25","doi-asserted-by":"crossref","first-page":"5695","DOI":"10.1016\/j.ijleo.2016.03.076","volume":"127","author":"B Norouzi","year":"2016","unstructured":"Norouzi B, Mirzakuchaki S (2016) Breaking an image encryption algorithm based on the new substitution stage with chaotic functions. Optik 127:5695\u20135701","journal-title":"Optik"},{"issue":"3","key":"3769_CR26","doi-asserted-by":"crossref","first-page":"1469","DOI":"10.1007\/s11042-012-1292-9","volume":"71","author":"B Norouzi","year":"2014","unstructured":"Norouzi B, Mirzakuchaki S, Seyedzadeh SM, Mosavi MR (2014a) A simple, sensitive and secure image encryption algorithm based on hyperchaotic system with only one round diffusion process. Multimed Tools Appl 71(3):1469--1497","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"3769_CR27","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/s00530-013-0314-4","volume":"20","author":"B Norouzi","year":"2014","unstructured":"Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2014b) A novel image encryption based on hash function with only two-round diffusion process. Multimedia Systems 20(1):45\u201364","journal-title":"Multimedia Systems"},{"key":"3769_CR28","doi-asserted-by":"crossref","first-page":"781","DOI":"10.1007\/s11042-013-1699-y","volume":"74","author":"B Norouzi","year":"2015","unstructured":"Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2015) A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos. Multimed Tools Appl 74:781\u2013811","journal-title":"Multimed Tools Appl"},{"key":"3769_CR29","doi-asserted-by":"publisher","unstructured":"Parvin Z, Seyedarabi H, Shamsi M (2014) A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimed Tools Appl. doi:\n10.1007\/s11042-014-2115-y","DOI":"10.1007\/s11042-014-2115-y"},{"key":"3769_CR30","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1007\/s11042-010-0652-6","volume":"56","author":"IS Sam","year":"2012","unstructured":"Sam IS, Devaraj P, Bhuvaneswaran RS (2012) A novel image cipher based on mixed transformed logistic maps. Multimedia Tools and Applications 56:315\u2013330","journal-title":"Multimedia Tools and Applications"},{"key":"3769_CR31","doi-asserted-by":"crossref","first-page":"1202","DOI":"10.1016\/j.sigpro.2011.11.004","volume":"92","author":"SM Seyedzadeh","year":"2012","unstructured":"Seyedzadeh SM, Mirzakuchaki S (2012) A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. J Signal Process 92:1202\u20131215","journal-title":"J Signal Process"},{"key":"3769_CR32","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.jss.2014.07.025","volume":"97","author":"SM Seyedzadeh","year":"2014","unstructured":"Seyedzadeh SM, Norouzi B, Mirzakuchaki S (2014) RGB color image encryption based on choquet fuzzy integral. J Syst Softw 97:128\u2013139","journal-title":"J Syst Softw"},{"key":"3769_CR33","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1007\/s11071-015-2008-2","volume":"81","author":"SM Seyedzadeh","year":"2015","unstructured":"Seyedzadeh SM, Norouzi B, Mosavi MR, Mirzakuchaki S (2015) A novel color image encryption algorithm based on spatial permutation and quantum chaotic map. Nonlinear Dynamics 81:511\u2013529","journal-title":"Nonlinear Dynamics"},{"key":"3769_CR34","doi-asserted-by":"crossref","first-page":"2456","DOI":"10.1016\/j.cnsns.2009.09.023","volume":"15","author":"Y Tang","year":"2010","unstructured":"Tang Y, Wang Z, Fang J (2010) Image encryption using chaotic coupled map lattices with time-varying delays. Journal of Commun Nonlinear Sci Numer Simulat 15:2456\u20132468","journal-title":"Journal of Commun Nonlinear Sci Numer Simulat"},{"key":"3769_CR35","doi-asserted-by":"crossref","first-page":"850","DOI":"10.1016\/j.jss.2011.10.051","volume":"85","author":"X Tong","year":"2012","unstructured":"Tong X (2012) The novel bilateral\u2013diffusion image encryption algorithm with dynamical compound chaos. The Journal of Systems and Software 85:850\u2013858","journal-title":"The Journal of Systems and Software"},{"key":"3769_CR36","doi-asserted-by":"crossref","first-page":"2722","DOI":"10.1016\/j.optcom.2009.03.075","volume":"282","author":"X Tong","year":"2009","unstructured":"Tong X, Cui M, Wang Z (2009) A new feedback image encryption scheme based on perturbation with dynamical compound chaotic sequence cipher generator. J Opt Commun 282:2722\u20132728","journal-title":"J Opt Commun"},{"key":"3769_CR37","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1016\/j.optcom.2011.10.010","volume":"285","author":"X Wang","year":"2012","unstructured":"Wang X, Jin C (2012) Image encryption using game of life permutation and PWLCM chaotic system. J Opt Commun 285:412\u2013417","journal-title":"J Opt Commun"},{"key":"3769_CR38","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1016\/j.asoc.2009.12.011","volume":"11","author":"Y Wang","year":"2011","unstructured":"Wang Y, Wong KW, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Journal of Applied Soft Computing 11:514\u2013522","journal-title":"Journal of Applied Soft Computing"},{"key":"3769_CR39","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1016\/j.jss.2011.08.017","volume":"85","author":"X Wei","year":"2012","unstructured":"Wei X, Guo L, Zhang Q, Zhang J, Lian S (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw 85:290\u2013299","journal-title":"J Syst Softw"},{"key":"3769_CR40","doi-asserted-by":"publisher","unstructured":"Wen W (2015) Security analysis of a color image encryption scheme based on skew tent map and hyper chaotic system of 6th-order CNN against chosen-plaintext attack. Multimedia Tools and Application. doi:\n10.1007\/s11042-015-2464-1","DOI":"10.1007\/s11042-015-2464-1"},{"key":"3769_CR41","doi-asserted-by":"crossref","first-page":"5290","DOI":"10.1016\/j.optcom.2011.07.070","volume":"284","author":"R Ye","year":"2011","unstructured":"Ye R (2011) A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism. J Opt Commun 284:5290\u20135298","journal-title":"J Opt Commun"},{"key":"3769_CR42","doi-asserted-by":"crossref","first-page":"2775","DOI":"10.1016\/j.optcom.2011.02.039","volume":"284","author":"G Zhang","year":"2011","unstructured":"Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284:2775\u20132780","journal-title":"Opt Commun"},{"key":"3769_CR43","doi-asserted-by":"crossref","first-page":"860","DOI":"10.1007\/11427445_138","volume":"3497","author":"W Zhang","year":"2005","unstructured":"Zhang W, Peng J, Yang H, Wei P (2005) A digital image encryption scheme based on the hybrid of cellular neural network and logistic map. Lect Notes Comput Sci 3497:860\u2013867","journal-title":"Lect Notes Comput Sci"},{"key":"3769_CR44","doi-asserted-by":"crossref","first-page":"2028","DOI":"10.1016\/j.mcm.2010.06.005","volume":"52","author":"Q Zhang","year":"2010","unstructured":"Zhang Q, Guo L, Wei X (2010a) Image encryption using dna addition combining with chaotic maps. Math Comput Model 52:2028\u20132035","journal-title":"Math Comput Model"},{"key":"3769_CR45","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1166\/asl.2010.1170","volume":"3","author":"Q Zhang","year":"2010","unstructured":"Zhang Q, Wang Q, Wei X (2010b) A novel image encryption scheme based on DNA coding and multi-chaotic maps. Adv Sci Lett 3:447\u2013451","journal-title":"Adv Sci Lett"},{"key":"3769_CR46","doi-asserted-by":"crossref","first-page":"3596","DOI":"10.1016\/j.ijleo.2012.11.018","volume":"124","author":"Q Zhang","year":"2013","unstructured":"Zhang Q, Guo L, Wei X (2013a) A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Optik 124:3596\u20133600","journal-title":"Optik"},{"key":"3769_CR47","first-page":"3596","volume":"124","author":"Q Zhang","year":"2013","unstructured":"Zhang Q, Guo L, Wei X (2013b) A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Opt 124:3596\u20133600","journal-title":"J Opt"},{"key":"3769_CR48","doi-asserted-by":"crossref","first-page":"5071","DOI":"10.1109\/TIP.2013.2278465","volume":"22","author":"L Zhang","year":"2013","unstructured":"Zhang L, Han Y, Yang Y, Song M, Yan S, Tian Q (2013c) Discovering discrminative graphlets for aerial image categories recognition. IEEE Trans Image Process 22:5071\u20135048","journal-title":"IEEE Trans Image Process"},{"key":"3769_CR49","doi-asserted-by":"crossref","first-page":"1885","DOI":"10.1007\/s11042-013-1684-5","volume":"73","author":"D Zhang","year":"2014","unstructured":"Zhang D, Xiao W, Wen, Li M (2014a) Cryptanalyzing a novel image cipher based on mixed transformed logistic maps. Multimedia Tools and Applications 73:1885\u20131896","journal-title":"Multimedia Tools and Applications"},{"key":"3769_CR50","first-page":"1562","volume":"125","author":"Y Zhang","year":"2014","unstructured":"Zhang Y, Wen W, Su M, Li M (2014b) Cryptanalyzing a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Opt 125:1562\u20131564","journal-title":"J Opt"},{"key":"3769_CR51","doi-asserted-by":"crossref","unstructured":"Zhang L, Yang Y, Gao Y, Yu Y, Wang C, Li X (2014c) A probabilistic associative model for segmenting weakly-supervised images. IEEE Trans Image Process 23(9)","DOI":"10.1109\/TIP.2014.2344433"},{"issue":"1","key":"3769_CR52","doi-asserted-by":"crossref","first-page":"564","DOI":"10.1109\/TIE.2014.2327558","volume":"62","author":"L Zhang","year":"2015","unstructured":"Zhang L, Gao Y, Xia Y, Dai Q, Li X (2015) A fine-grained image categorization system by cellet-encoded spatial pyramid modeling. IEEE Trans Ind Electron 62(1):564\u2013571","journal-title":"IEEE Trans Ind Electron"},{"key":"3769_CR53","doi-asserted-by":"publisher","unstructured":"Zhao J, Wang S, Chang Y, Li X (2015) A novel image encryption scheme based on an improper fractional-order chaotic system. Nonlinear Dyn. doi:\n10.1007\/s11071-015-1911-x","DOI":"10.1007\/s11071-015-1911-x"},{"key":"3769_CR54","doi-asserted-by":"crossref","first-page":"6303","DOI":"10.1007\/s11042-015-2573-x","volume":"75","author":"P Zhen","year":"2016","unstructured":"Zhen P, Zhao G, Min L, Jin X (2016) Chaos-based Image Encryption Scheme Combining DNA Coding and Entropy. Multimedia Tools and Applications 75:6303\u20136319","journal-title":"Multimedia Tools and Applications"},{"key":"3769_CR55","doi-asserted-by":"crossref","unstructured":"Zhou N, Wang Y, Gong L, Chen X, Yang Y (2013) Single-channel color image encryption based on iterative fractional fourier transform and chaos. Opt Laser Technol 48:117--127","DOI":"10.1016\/j.optlastec.2012.10.016"},{"key":"3769_CR56","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.optcom.2011.08.079","volume":"285","author":"C Zhu","year":"2012","unstructured":"Zhu C (2012) A novel image encryption scheme based on improved hyperchaotic sequences. J Opt Commun 285:29\u201337","journal-title":"J Opt Commun"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-016-3769-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3769-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3769-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3769-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,23]],"date-time":"2017-05-23T09:20:02Z","timestamp":1495531202000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-016-3769-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,20]]},"references-count":56,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["3769"],"URL":"https:\/\/doi.org\/10.1007\/s11042-016-3769-4","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,7,20]]}}}