{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:36:11Z","timestamp":1762508171609,"version":"3.37.3"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"37-38","license":[{"start":{"date-parts":[[2020,7,28]],"date-time":"2020-07-28T00:00:00Z","timestamp":1595894400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,7,28]],"date-time":"2020-07-28T00:00:00Z","timestamp":1595894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,10]]},"DOI":"10.1007\/s11042-020-08626-x","type":"journal-article","created":{"date-parts":[[2020,7,28]],"date-time":"2020-07-28T07:38:12Z","timestamp":1595921892000},"page":"27659-27682","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Reversible data hiding in dual encrypted halftone images using matrix embedding"],"prefix":"10.1007","volume":"79","author":[{"given":"Yu-Xia","family":"Sun","sequence":"first","affiliation":[]},{"given":"Qi","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2929-464X","authenticated-orcid":false,"given":"Bin","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Jeng-Shyang","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Hong-Mei","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,28]]},"reference":[{"key":"8626_CR1","doi-asserted-by":"crossref","unstructured":"Abdallah EE, Hamza AB, Bhattacharya P (2007) MPEG video watermarking using tensor singular value decomposition. In: International conference image analysis and recognition. Springer, pp 772\u2013783","DOI":"10.1007\/978-3-540-74260-9_69"},{"issue":"2","key":"8626_CR2","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/s11760-009-0114-7","volume":"4","author":"EE Abdallah","year":"2010","unstructured":"Abdallah EE, Hamza AB, Bhattacharya P (2010) Video watermarking using wavelet transform and tensor algebra. Signal Image Video Process 4(2):233\u2013245","journal-title":"Signal Image Video Process"},{"issue":"8","key":"8626_CR3","doi-asserted-by":"publisher","first-page":"830","DOI":"10.1007\/s42452-019-0875-8","volume":"1","author":"N Al-Juaid","year":"2019","unstructured":"Al-Juaid N, Gutub A (2019) Combining RSA and audio steganography on personal computers for enhancing security. SN Appl Sci 1(8):830","journal-title":"SN Appl Sci"},{"issue":"1","key":"8626_CR4","first-page":"8","volume":"1","author":"N Al-Juaid","year":"2018","unstructured":"Al-Juaid N, Gutub A, Khan EA, et al. (2018) Enhancing PC data security via combining RSA cryptography and video based steganography. Naif Arab Univ Secur Sci (NAUSS) 1(1):8\u201318","journal-title":"Naif Arab Univ Secur Sci (NAUSS)"},{"issue":"4","key":"8626_CR5","first-page":"118","volume":"3","author":"N Alanizy","year":"2018","unstructured":"Alanizy N, Alanizy A, Baghoza N, Al Ghamdi M, Gutub A (2018) 3-layer PC text security via combining compression, AES cryptography 2LSB image steganography. J Res Eng Appl Sci(JREAS) 3(4):118\u2013124","journal-title":"J Res Eng Appl Sci(JREAS)"},{"issue":"9","key":"8626_CR6","first-page":"1","volume":"4","author":"K Alaseri","year":"2018","unstructured":"Alaseri K, Gutub A (2018) Merging secret sharing within arabic text steganography for practical retrieval. IJRDO: J Comput Sci Eng 4(9):1\u201317","journal-title":"IJRDO: J Comput Sci Eng"},{"issue":"4","key":"8626_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJEHMC.2019100101","volume":"10","author":"N Alassaf","year":"2019","unstructured":"Alassaf N, Gutub A (2019) Simulating light-weight-cryptography implementation for IoT healthcare data security applications. Int J E-Health Med Commun (IJEHMC) 10(4):1\u201315","journal-title":"Int J E-Health Med Commun (IJEHMC)"},{"issue":"2","key":"8626_CR8","first-page":"50","volume":"2","author":"N Alassaf","year":"2017","unstructured":"Alassaf N, Alkazemi B, Gutub A (2017) Applicable light-weight cryptography to secure medical data in IoT systems. J Res Eng Appl Sci (JREAS) 2 (2):50\u201358","journal-title":"J Res Eng Appl Sci (JREAS)"},{"key":"8626_CR9","doi-asserted-by":"crossref","unstructured":"Alassaf N, Gutub A, Parah SA, Al Ghamdi M (2018) Enhancing speed of SIMON: a light-weight-cryptographic algorithm for IoT applications. Multimed Tools Appl, 1\u201325","DOI":"10.1007\/s11042-018-6801-z"},{"key":"8626_CR10","doi-asserted-by":"crossref","unstructured":"Alotaibi M, Al-hendi D, Alroithy B, AlGhamdi M, Gutub A Secure mobile computing authentication utilizing hash, cryptography and steganography combination. J Inform Secur Cybercrimes Res (JISCR), 2(1)","DOI":"10.26735\/16587790.2019.001"},{"issue":"3","key":"8626_CR11","doi-asserted-by":"publisher","first-page":"33","DOI":"10.20967\/jcscm.2018.03.002","volume":"8","author":"A Alsaidi","year":"2018","unstructured":"Alsaidi A, Al-lehaibi K, Alzahrani H, AlGhamdi M, Gutub A (2018) Compression multi-level crypto stego security of texts utilizing colored email forwarding. J Comput Sci Comput Math (JCSCM) 8(3):33\u201342","journal-title":"J Comput Sci Comput Math (JCSCM)"},{"key":"8626_CR12","unstructured":"Alsmirat MA, Al-Alem F, Al-Ayyoub M, Jararweh Y, Gupta B Impact of digital fingerprint image quality on the fingerprint recognition accuracy"},{"issue":"18","key":"8626_CR13","doi-asserted-by":"publisher","first-page":"18451","DOI":"10.1007\/s11042-016-3930-0","volume":"76","author":"S Atawneh","year":"2017","unstructured":"Atawneh S, Almomani A, Al Bazar H, Sumari P, Gupta B (2017) Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain. Multimed Tools Appl 76(18):18451\u201318472","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"8626_CR14","doi-asserted-by":"publisher","first-page":"1132","DOI":"10.1109\/TCYB.2015.2423678","volume":"46","author":"X Cao","year":"2016","unstructured":"Cao X, Du L, Wei X, Meng D, Guo X (2016) High capacity reversible data hiding in encrypted images by patch-level sparse representation. IEEE Trans Cybern 46(5):1132\u20131143","journal-title":"IEEE Trans Cybern"},{"issue":"6","key":"8626_CR15","doi-asserted-by":"publisher","first-page":"7499","DOI":"10.1007\/s11042-018-6446-y","volume":"78","author":"X Chen","year":"2019","unstructured":"Chen X, Zhong H, Qiu A (2019) Reversible data hiding scheme in multiple encrypted images based on code division multiplexing. Multimed Tools Appl 78(6):7499\u20137516","journal-title":"Multimed Tools Appl"},{"key":"8626_CR16","doi-asserted-by":"crossref","unstructured":"Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography. Morgan Kaufmann","DOI":"10.1016\/B978-012372585-1.50015-2"},{"key":"8626_CR17","unstructured":"Farooqi N, Gutub A, Khozium MO Smart community challenges: enabling IoT\/M2M technology case study. Life Sci J, 16(7)"},{"key":"8626_CR18","unstructured":"Floyd RW (1976) An adaptive algorithm for spatial gray-scale. In: Proc. Soc. Inf. Disp., vol 17, pp 75\u201377"},{"key":"8626_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.image.2016.08.007","volume":"48","author":"PG Freitas","year":"2016","unstructured":"Freitas PG, Farias MC, Ara\u00fajo AP (2016) Hiding color watermarks in halftone images using maximum-similarity binary patterns. Signal Process Image Commun 48:1\u201311","journal-title":"Signal Process Image Commun"},{"issue":"3","key":"8626_CR20","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1109\/TIFS.2006.879281","volume":"1","author":"J Fridrich","year":"2006","unstructured":"Fridrich J, Soukal D (2006) Matrix embedding for large payloads. IEEE Trans Inform Forens Secur 1(3):390\u2013395","journal-title":"IEEE Trans Inform Forens Secur"},{"issue":"4","key":"8626_CR21","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1109\/TIP.2002.999680","volume":"11","author":"MS Fu","year":"2002","unstructured":"Fu MS, Au OC (2002) Data hiding watermarking for halftone images. IEEE Trans Image Process 11(4):477\u2013484","journal-title":"IEEE Trans Image Process"},{"key":"8626_CR22","doi-asserted-by":"crossref","unstructured":"Galand F, Kabatiansky G (2003) Information hiding by coverings. In: Proceedings 2003 IEEE information theory workshop (Cat. No. 03EX674). IEEE, pp 151\u2013154","DOI":"10.1109\/ITW.2003.1216717"},{"issue":"3","key":"8626_CR23","doi-asserted-by":"publisher","first-page":"1269","DOI":"10.1109\/TIP.2013.2257812","volume":"23","author":"J-M Guo","year":"2014","unstructured":"Guo J-M, Liu Y-F (2014) Improved block truncation coding using optimized dot diffusion. IEEE Trans Image Process 23(3):1269\u20131275","journal-title":"IEEE Trans Image Process"},{"key":"8626_CR24","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-0105-3","volume-title":"Handbook of research on modern cryptographic solutions for computer and cyber security","author":"B Gupta","year":"2016","unstructured":"Gupta B, Agrawal DP, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security, 1st edn. IGI Global, Hershey","edition":"1st edn."},{"key":"8626_CR25","doi-asserted-by":"crossref","unstructured":"Gutub A, Al-Ghamdi M (2019) Image based steganography to facilitate improving counting-based secret sharing","DOI":"10.1007\/s13319-019-0216-0"},{"key":"8626_CR26","doi-asserted-by":"crossref","unstructured":"Gutub A, Alaseri K (2019) Hiding shares of counting-based secret sharing via arabic text steganography for personal usage. J Sci Eng, 1\u201326","DOI":"10.1007\/s13369-019-04010-6"},{"issue":"2","key":"8626_CR27","first-page":"1","volume":"1","author":"A Gutub","year":"2018","unstructured":"Gutub A, Al-Juaid N (2018) Multi-bits stego-system for hiding text in multimedia images based on user security priority. J Comput Hardware Eng 1(2):1\u20139","journal-title":"J Comput Hardware Eng"},{"issue":"1","key":"8626_CR28","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/S0146-664X(76)80003-2","volume":"5","author":"JF Jarvis","year":"1976","unstructured":"Jarvis JF, Judice CN, Ninke W (1976) A survey of techniques for the display of continuous tone pictures on bilevel displays. Comput Graph Image Process 5(1):13\u201340","journal-title":"Comput Graph Image Process"},{"issue":"1","key":"8626_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1504\/IJHPCN.2019.099740","volume":"14","author":"H Ji","year":"2019","unstructured":"Ji H, Fu Z (2019) Coverless information hiding method based on the keyword. Int J High Perform Comput Network 14(1):1\u20137","journal-title":"Int J High Perform Comput Network"},{"issue":"3","key":"8626_CR30","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1109\/83.988959","volume":"11","author":"SH Kim","year":"2002","unstructured":"Kim SH, Allebach JP (2002) Impact of hvs models on model-based halftoning. IEEE Trans Image Process 11(3):258\u2013269","journal-title":"IEEE Trans Image Process"},{"key":"8626_CR31","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.displa.2018.04.002","volume":"55","author":"C Kim","year":"2018","unstructured":"Kim C, Shin D, Leng L, Yang C-N (2018) Separable reversible data hiding in encrypted halftone image. Displays 55:71\u201379","journal-title":"Displays"},{"key":"8626_CR32","doi-asserted-by":"crossref","unstructured":"Lee C-F, Wang K-H, Chang C-C, Huang Y-L (2009) A reversible data hiding scheme based on dual steganographic images. In: Proceedings of the 3rd international conference on ubiquitous information management and communication. ACM, pp 228\u2013237","DOI":"10.1145\/1516241.1516281"},{"issue":"4","key":"8626_CR33","doi-asserted-by":"publisher","first-page":"4545","DOI":"10.1007\/s11042-017-4452-0","volume":"77","author":"J Li","year":"2018","unstructured":"Li J, Yu C, Gupta B, Ren X (2018) Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition. Multimed Tools Appl 77(4):4545\u20134561","journal-title":"Multimed Tools Appl"},{"issue":"23","key":"8626_CR34","doi-asserted-by":"publisher","first-page":"30749","DOI":"10.1007\/s11042-018-6187-y","volume":"77","author":"Q Li","year":"2018","unstructured":"Li Q, Yan B, Li H, Chen N (2018) Separable reversible data hiding in encrypted images with improved security and capacity. Multimed Tools Appl 77(23):30749\u201330768","journal-title":"Multimed Tools Appl"},{"key":"8626_CR35","unstructured":"Lien BK, Lin Y-M, Lee K-Y (2012) High-capacity reversible data hiding by maximum-span pixel pairing on ordered dithered halftone images. In: 2012 19th International conference on systems, signals and image processing (IWSSIP). IEEE, pp 76\u201379"},{"key":"8626_CR36","doi-asserted-by":"crossref","unstructured":"Lo C-C, Lee C-M, Liao B-Y, Pan J-S (2008) Halftone image data hiding with reference to original multitone image. In: 2008 International conference on intelligent information hiding and multimedia signal processing. IEEE, pp 265\u2013268","DOI":"10.1109\/IIH-MSP.2008.272"},{"issue":"3","key":"8626_CR37","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/TIFS.2013.2248725","volume":"8","author":"K Ma","year":"2013","unstructured":"Ma K, Zhang W, Zhao X, Yu N, Li F (2013) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans Inform Forens Secur 8(3):553\u2013562","journal-title":"IEEE Trans Inform Forens Secur"},{"key":"8626_CR38","unstructured":"Mohr A Quantum computing in complexity theory and theory of computation. Carbondale"},{"key":"8626_CR39","doi-asserted-by":"crossref","unstructured":"Moon TK (2005) Error correction coding \u2013 mathematical methods and algorithms. Wiley, pp 2001\u20132006","DOI":"10.1002\/0471739219"},{"key":"8626_CR40","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.image.2016.03.010","volume":"44","author":"T-S Nguyen","year":"2016","unstructured":"Nguyen T-S, Chang C-C, Chang W-C (2016) High capacity reversible data hiding scheme for encrypted images. Signal Process Image Commun 44:84\u201391","journal-title":"Signal Process Image Commun"},{"key":"8626_CR41","doi-asserted-by":"crossref","unstructured":"Puech W, Chaumont M, Strauss O (2008) A reversible data hiding method for encrypted images. In: Security, forensics, steganography, and watermarking of multimedia contents X, vol 6819. International Society for Optics and Photonics, p 68191E","DOI":"10.1117\/12.766754"},{"issue":"5","key":"8626_CR42","doi-asserted-by":"publisher","first-page":"1486","DOI":"10.1109\/TMM.2014.2316154","volume":"16","author":"Z Qian","year":"2014","unstructured":"Qian Z, Zhang X, Wang S (2014) Reversible data hiding in encrypted jpeg bitstream. IEEE Trans Multimed 16(5):1486\u20131491","journal-title":"IEEE Trans Multimed"},{"issue":"2","key":"8626_CR43","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1109\/TCSVT.2018.2797897","volume":"29","author":"Z Qian","year":"2019","unstructured":"Qian Z, Xu H, Luo X, Zhang X (2019) New framework of reversible data hiding in encrypted jpeg bitstreams. IEEE Trans Circ Syst Video Technol 29(2):351\u2013362","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"8626_CR44","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.jvcir.2015.06.009","volume":"31","author":"C Qin","year":"2015","unstructured":"Qin C, Zhang X (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image Represent 31:154\u2013164","journal-title":"J Vis Commun Image Represent"},{"key":"8626_CR45","unstructured":"Rivest RL (1992) The rc4 encryption algorithm. RSA Data Security, Inc., pp 9\u20132"},{"key":"8626_CR46","doi-asserted-by":"crossref","unstructured":"Shi H, Liu D, Lu H, Zhou C (2017) A homomorphic encrypted reversible information hiding scheme for integrity authentication and piracy tracing. Multimed Tools Appl, 1\u201333","DOI":"10.1007\/s11042-017-5446-7"},{"key":"8626_CR47","doi-asserted-by":"crossref","unstructured":"Steganalysis HCDB, Westfeld A (2001) F5\u2014a steganographic algorithm. In: Information hiding: 4th international workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001. Proceedings, vol 2137. Springer, p 289","DOI":"10.1007\/3-540-45496-9_21"},{"issue":"6","key":"8626_CR48","doi-asserted-by":"publisher","first-page":"906","DOI":"10.1109\/TCSVT.2009.2017409","volume":"19","author":"W-L Tai","year":"2009","unstructured":"Tai W-L, Yeh C-M, Chang C-C (2009) Reversible data hiding based on histogram modification of pixel differences. IEEE Trans Circ Syst Video Technol 19(6):906\u2013910","journal-title":"IEEE Trans Circ Syst Video Technol"},{"issue":"8","key":"8626_CR49","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circ Syst Video Technol 13(8):890\u2013896","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"8626_CR50","doi-asserted-by":"crossref","unstructured":"Ulichney R (1987) Digital halftoning. MIT Press","DOI":"10.7551\/mitpress\/2421.001.0001"},{"key":"8626_CR51","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1016\/j.sigpro.2014.04.032","volume":"104","author":"X Wu","year":"2014","unstructured":"Wu X, Sun W (2014) High-capacity reversible data hiding in encrypted images by prediction error. Signal Process 104:387\u2013400","journal-title":"Signal Process"},{"key":"8626_CR52","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1016\/j.sigpro.2017.09.017","volume":"143","author":"X Wu","year":"2018","unstructured":"Wu X, Weng J, Yan W (2018) Adopting secret sharing for reversible data hiding in encrypted images. Signal Process 143:269\u2013281","journal-title":"Signal Process"},{"issue":"11","key":"8626_CR53","doi-asserted-by":"publisher","first-page":"2594","DOI":"10.1109\/TIFS.2016.2590944","volume":"11","author":"Z Xia","year":"2016","unstructured":"Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inform Forens Secur 11(11):2594\u20132608","journal-title":"IEEE Trans Inform Forens Secur"},{"key":"8626_CR54","doi-asserted-by":"crossref","unstructured":"Xuan G, Yang C, Zhen Y, Shi YQ, Ni Z (2004) Reversible data hiding using integer wavelet transform and companding technique. In: International workshop on digital watermarking. Springer, pp 115\u2013124","DOI":"10.1007\/978-3-540-31805-7_10"},{"issue":"4","key":"8626_CR55","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1049\/iet-ipr.2009.0316","volume":"4","author":"C-H Yang","year":"2010","unstructured":"Yang C-H, Tsai M-H (2010) Improving histogram-based reversible data hiding by interleaving predictions. IET Image Process 4(4):223\u2013234","journal-title":"IET Image Process"},{"key":"8626_CR56","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.sigpro.2016.10.017","volume":"133","author":"S Yi","year":"2017","unstructured":"Yi S, Zhou Y (2017) Binary-block embedding for reversible data hiding in encrypted images. Signal Process 133:40\u201351","journal-title":"Signal Process"},{"issue":"4","key":"8626_CR57","doi-asserted-by":"publisher","first-page":"4585","DOI":"10.1007\/s11042-017-4637-6","volume":"77","author":"C Yu","year":"2018","unstructured":"Yu C, Li J, Li X, Ren X, Gupta B (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585\u20134608","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"8626_CR58","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","volume":"18","author":"X Zhang","year":"2011","unstructured":"Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lett 18(4):255\u2013258","journal-title":"IEEE Signal Process Lett"},{"issue":"2","key":"8626_CR59","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1109\/TIFS.2011.2176120","volume":"7","author":"X Zhang","year":"2012","unstructured":"Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE Trans Inform Forens Secur 7(2):826\u2013832","journal-title":"IEEE Trans Inform Forens Secur"},{"issue":"3","key":"8626_CR60","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1109\/TCSVT.2015.2416591","volume":"26","author":"J Zhou","year":"2016","unstructured":"Zhou J, Sun W, Dong L, Liu X, Au OC, Tang YY (2016) Secure reversible image data hiding over encrypted domain via key modulation. IEEE Trans Circ Syst Video Technol 26(3):441\u2013452","journal-title":"IEEE Trans Circ Syst Video Technol"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-08626-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-08626-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-08626-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T23:32:32Z","timestamp":1627428752000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-08626-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,28]]},"references-count":60,"journal-issue":{"issue":"37-38","published-print":{"date-parts":[[2020,10]]}},"alternative-id":["8626"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-08626-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2020,7,28]]},"assertion":[{"value":"15 April 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 December 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 January 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 July 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}