{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,9]],"date-time":"2025-11-09T03:21:12Z","timestamp":1762658472113,"version":"3.37.3"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"19-20","license":[{"start":{"date-parts":[[2020,2,5]],"date-time":"2020-02-05T00:00:00Z","timestamp":1580860800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,2,5]],"date-time":"2020-02-05T00:00:00Z","timestamp":1580860800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1007\/s11042-020-08658-3","type":"journal-article","created":{"date-parts":[[2020,2,5]],"date-time":"2020-02-05T10:02:32Z","timestamp":1580896952000},"page":"13967-13986","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Two level phase retrieval in fractional Hartley domain for secure image encryption and authentication using digital signatures"],"prefix":"10.1007","volume":"79","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5444-8244","authenticated-orcid":false,"given":"Mehak","family":"Khurana","sequence":"first","affiliation":[]},{"given":"Hukum","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,5]]},"reference":[{"key":"8658_CR1","doi-asserted-by":"crossref","first-page":"1128","DOI":"10.1109\/JPROC.2009.2018367","volume":"97","author":"O Matoba","year":"2009","unstructured":"Matoba O, Nomura T, Perez-Cabre E, Millan MS, Javidi B (2009) Optical techniques for information security. Proc IEEE 97:1128\u20131148","journal-title":"Proc IEEE"},{"issue":"3","key":"8658_CR2","doi-asserted-by":"crossref","first-page":"589","DOI":"10.1364\/AOP.1.000589","volume":"1","author":"Ayman Alfalou","year":"2009","unstructured":"Alfalou A, Brosseau C (2009) Optical image compression and encryption methods. Adv Opt Photon 1:589\u2013636","journal-title":"Advances in Optics and Photonics"},{"key":"8658_CR3","unstructured":"Millan M S and Perez-Cabre E, (2011) Optical data encryption, optical and digital image processing: fundamentals and applications, G. Cristobal P. Schelkens and H. Thienpont, eds (Wiley), 739-767"},{"key":"8658_CR4","doi-asserted-by":"crossref","first-page":"767","DOI":"10.1364\/OL.20.000767","volume":"20","author":"P Refregier","year":"1995","unstructured":"Refregier P, Javidi B (1995) Optical image encryption based on input plane and Fourier plane random encoding. Opt Lett 20:767\u2013769","journal-title":"Opt Lett"},{"key":"8658_CR5","first-page":"887","volume":"25","author":"G Unnikrishnan","year":"2000","unstructured":"Unnikrishnan G, Joseph J, Singh K (2000) Optical encryption by double random phase encoding in the fractional Fourier domain, opt. Lett 25:887\u2013889","journal-title":"Lett"},{"issue":"19","key":"8658_CR6","doi-asserted-by":"crossref","first-page":"1570","DOI":"10.1080\/09500340.2014.946565","volume":"61","author":"X Liu","year":"2014","unstructured":"Liu X, Mei W, Du H (2014) Optical image encryption based on compressive sensing and chaos in the fractional Fourier domain. J Mod Opt 61(19):1570\u20131577","journal-title":"J Mod Opt"},{"key":"8658_CR7","doi-asserted-by":"crossref","unstructured":"Singh H (2016) Optical cryptosystem of color images using random phase masks in the fractional wavelet transform domain. In AIP conference proceedings, 1728, 020063-1\/4","DOI":"10.17485\/ijst\/2016\/v9iS1\/105682"},{"key":"8658_CR8","doi-asserted-by":"crossref","first-page":"1584","DOI":"10.1364\/OL.29.001584","volume":"29","author":"G Situ","year":"2004","unstructured":"Situ G, Zhang J (2004) Double random-phase encoding in the Fresnel domain. Opt Lett 29:1584\u20131586","journal-title":"Opt Lett"},{"key":"8658_CR9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2015\/926135","volume":"926135","author":"H Singh","year":"2015","unstructured":"Singh H, Yadav AK, Vashisth S, Singh K (2015) Optical image encryption using devil\u2019s vortex Toroidal lens in the Fresnel transform domain. International J of Opt 926135:1\u201313","journal-title":"International J of Opt"},{"key":"8658_CR10","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1016\/j.optlaseng.2014.10.011","volume":"67","author":"H Singh","year":"2015","unstructured":"Singh H, Yadav AK, Vashisth S, Singh K (2015) Double phase-image encryption using gyrator transforms, and structured phase mask in the frequency plane. Opt Lasers Eng 67:145\u2013156","journal-title":"Opt Lasers Eng"},{"key":"8658_CR11","doi-asserted-by":"crossref","first-page":"3438","DOI":"10.1364\/OL.31.003438","volume":"31","author":"L Chen","year":"2006","unstructured":"Chen L, Zhao D (2006) Optical image encryption with Hartley transforms. Opt Lett 31:3438\u20133440","journal-title":"Opt Lett"},{"key":"8658_CR12","doi-asserted-by":"crossref","first-page":"3234","DOI":"10.1016\/j.optcom.2011.02.065","volume":"284","author":"N Zhou","year":"2011","unstructured":"Zhou N, Wang Y, Gong L (2011) Novel optical image encryption scheme based on fractional Mellin transform. Opt Commun 284:3234\u20133242","journal-title":"Opt Commun"},{"key":"8658_CR13","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.optcom.2014.12.084","volume":"343","author":"N Zhou","year":"2015","unstructured":"Zhou N, Li H, Wang D, Pan S, Zhou Z (2015) Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform. Opt Commun 343:10\u201321","journal-title":"Opt Commun"},{"key":"8658_CR14","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1007\/978-1-4939-3028-9_13","volume":"198","author":"P Kumar","year":"2016","unstructured":"Kumar P, Joseph J, Singh K (2016) Double random phase encoding based optical encryption systems using some linear canonical transforms: weaknesses and countermeasures. Springer series in Optical Sciences 198:367\u2013396","journal-title":"Springer series in Optical Sciences"},{"key":"8658_CR15","doi-asserted-by":"crossref","first-page":"1644","DOI":"10.1364\/OL.30.001644","volume":"30","author":"A Carnicer","year":"2005","unstructured":"Carnicer A, Montes-U M, Arcos S, Juvells I (2005) Vulnerability to chosen\u2013ciphertext attacks of optical encryption schemes based on double random phase keys. Opt Lett 30:1644\u20131646","journal-title":"Opt Lett"},{"key":"8658_CR16","doi-asserted-by":"crossref","first-page":"1044","DOI":"10.1364\/OL.31.001044","volume":"31","author":"X Peng","year":"2006","unstructured":"Peng X, Peng Z, Wei H, Yu B (2006) Known-plaintext attack on optical encryption based on double random phase keys. Opt Lett 31:1044\u20131046","journal-title":"Opt Lett"},{"issue":"8","key":"8658_CR17","doi-asserted-by":"crossref","first-page":"8690","DOI":"10.1364\/OE.25.008690","volume":"25","author":"G Li","year":"2017","unstructured":"Li G, Yang W, Li D, Situ G (2017) Cyphertext-only attack on the double random-phase encryption: experimental demonstration. Opt Exp 25(8):8690\u20138697","journal-title":"Opt Exp"},{"key":"8658_CR18","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1364\/OL.35.000118","volume":"35","author":"W Qin","year":"2010","unstructured":"Qin W, Peng X (2010) Asymmetric cryptosystem based on phase-truncated Fourier transforms. Opt Lett 35:118\u2013120","journal-title":"Opt Lett"},{"key":"8658_CR19","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1016\/j.optcom.2010.09.034","volume":"284","author":"X Wang","year":"2011","unstructured":"Wang X, Zhao D (2011) Multiple-image encryption based on nonlinear amplitude-truncation and phase-truncation in Fourier domain. Opt Commun 284:148\u2013152","journal-title":"Opt Commun"},{"key":"8658_CR20","doi-asserted-by":"crossref","first-page":"1446","DOI":"10.1364\/AO.51.001446","volume":"51","author":"SK Rajput","year":"2012","unstructured":"Rajput SK, Nishchal NK (2012) Image encryption based on interference that uses fractional Fourier domains asymmetric keys. Appl Opt 51:1446\u20131452","journal-title":"Appl Opt"},{"issue":"3","key":"8658_CR21","doi-asserted-by":"crossref","first-page":"467","DOI":"10.1364\/AO.52.000467","volume":"52","author":"X Ding","year":"2013","unstructured":"Ding X, Deng X, Song K, Chen G (2013) Security improvement for asymmetric cryptosystem based on spherical wave illumination. Appl Opt 52(3):467\u2013473","journal-title":"Appl Opt"},{"key":"8658_CR22","doi-asserted-by":"crossref","first-page":"1651","DOI":"10.1364\/OL.38.001651","volume":"38","author":"W Liu","year":"2013","unstructured":"Liu W, Liu Z, Liu S (2013) Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm. Opt Lett 38:1651\u20131653","journal-title":"Opt Lett"},{"issue":"6","key":"8658_CR23","doi-asserted-by":"crossref","first-page":"1078","DOI":"10.1016\/j.optcom.2011.12.017","volume":"285","author":"Xiaogang Wang","year":"2012","unstructured":"Wang X, Zhao D (2012) A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms. Opt Commun 285:6,1078\u20131081","journal-title":"Optics Communications"},{"issue":"11","key":"8658_CR24","doi-asserted-by":"crossref","first-page":"11994","DOI":"10.1364\/OE.20.011994","volume":"20","author":"X Wang","year":"2012","unstructured":"Wang X, Zhao D (2012) Double images encryption method with resistance against the specific attack based on an asymmetric algorithm. Opt Express 20(11):11994\u201312003","journal-title":"Opt Express"},{"key":"8658_CR25","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/j.optcom.2013.11.055","volume":"317","author":"D Xiaopeng","year":"2014","unstructured":"Xiaopeng D (2014) A hybrid attack on \u2018double images encryption method with resistance against the specific attack based on an asymmetric algorithm. Opt Commun 317:7\u201312","journal-title":"Opt Commun"},{"key":"8658_CR26","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/j.optlaseng.2013.06.015","volume":"52","author":"I Mehra","year":"2014","unstructured":"Mehra I, Rajput SK, Nishchal NK (2014) Cryptanalysis of an image encryption scheme based on joint transform correlator with amplitude and phase truncation approach. Opt Laser Eng 52:167\u2013173","journal-title":"Opt Laser Eng"},{"issue":"4","key":"8658_CR27","doi-asserted-by":"crossref","first-page":"679","DOI":"10.1364\/AO.55.000679","volume":"55","author":"Y Wang","year":"2016","unstructured":"Wang Y, Quan C, Tay CJ (2016) New method of attack and security enhancement on an asymmetric cryptosystem based on equal modulus decomposition. Appl Opt 55(4):679\u2013686","journal-title":"Appl Opt"},{"issue":"4","key":"8658_CR28","first-page":"557","volume":"47","author":"H Singh","year":"2017","unstructured":"Singh H (2017) Nonlinear optical double image encryption using random-vortex in fractional Hartley transform domain. Opt Appl 47(4):557\u2013578","journal-title":"Opt Appl"},{"issue":"28","key":"8658_CR29","first-page":"1","volume":"8","author":"M Khurana","year":"2017","unstructured":"Khurana M, Singh H (2017) An asymmetric image encryption based on phase truncated hybrid transform. 3D Research 8(28):1\u201317","journal-title":"3D Research"},{"issue":"53","key":"8658_CR30","first-page":"1","volume":"9","author":"P Maan","year":"2018","unstructured":"Maan P, Singh H (2018) Non-linear cryptosystem for image encryption using radial Hilbert mask in fractional Fourier transform domain. 3D Research 9(53):1\u201312","journal-title":"3D Research"},{"issue":"2","key":"8658_CR31","doi-asserted-by":"crossref","first-page":"80","DOI":"10.2174\/2213275911666181030111102","volume":"12","author":"M Khurana","year":"2019","unstructured":"Khurana M, Singh H (2019) A spiral-phase rear mounted triple masking for secure optical image encryption based on gyrator transform. Recent patents on Computer Science 12(2):80\u201384","journal-title":"Recent patents on Computer Science"},{"issue":"2","key":"8658_CR32","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1364\/JOSAA.35.000320","volume":"35","author":"Y. Xiong","year":"2018","unstructured":"Xiong Y, He A, Quan C (2018) Security analysis of a double-image encryption technique based on an asymmetric algorithm. J. Opt Soc Am A 35(2):320\u2013326","journal-title":"Journal of the Optical Society of America A"},{"issue":"21","key":"8658_CR33","doi-asserted-by":"crossref","first-page":"6010","DOI":"10.1364\/AO.57.006010","volume":"57","author":"Y Xiong","year":"2018","unstructured":"Xiong Y, He A, Quan C (2018) Hybrid attack on an optical cryptosystem based on phase-truncated Fourier transforms and a random amplitude mask. Appl Opt 57(21):6010\u20136016","journal-title":"Appl Opt"},{"key":"8658_CR34","doi-asserted-by":"crossref","first-page":"842","DOI":"10.1364\/OL.21.000842","volume":"21","author":"Z Zalevsky","year":"1996","unstructured":"Zalevsky Z, Mendlovic D, Dorsch RG (1996) Gerchberg Saxton algorithm applied in the fractional Fourier or the Fresnel domain. Opt Lett 21:842\u2013844","journal-title":"Opt Lett"},{"key":"8658_CR35","doi-asserted-by":"crossref","first-page":"3917","DOI":"10.1364\/OL.34.003917","volume":"34","author":"HE Hwang","year":"2009","unstructured":"Hwang HE, Chang HT, Lie WN (2009) Multiple-image encryption and multiplexing using a modified Gerchberg-Saxton algorithm and phase modulation in Fresnel-transform domain. Opt Lett 34:3917\u20133919","journal-title":"Opt Lett"},{"key":"8658_CR36","doi-asserted-by":"crossref","first-page":"374","DOI":"10.1016\/j.optlastec.2011.07.019","volume":"44","author":"X Deng","year":"2012","unstructured":"Deng X, Zhao D (2012) Multiple-image encryption using phase retrieve algorithm and intermodulation in Fourier domain opt. Laser Technol 44:374\u2013377","journal-title":"Laser Technol"},{"key":"8658_CR37","doi-asserted-by":"crossref","first-page":"3684","DOI":"10.1364\/OL.38.003684","volume":"38","author":"X Wang","year":"2013","unstructured":"Wang X, Zhao D (2013) Amplitude-phase retrieval attack free cryptosystem based on direct attack to phase-truncated Fourier transform-based encryption using a random amplitude mask. Opt Lett 38:3684\u20133686","journal-title":"Opt Lett"},{"key":"8658_CR38","first-page":"128","volume":"318","author":"W Chen","year":"2014","unstructured":"Chen W, Chen X (2014) Optical multiple-image authentication based on modified Gerchberg\u2013Saxton algorithm with random sampling opt. Commun. 318:128\u2013132","journal-title":"Commun."},{"key":"8658_CR39","doi-asserted-by":"crossref","first-page":"22981","DOI":"10.1364\/OE.22.022981","volume":"22","author":"X Wang","year":"2014","unstructured":"Wang X, Chen W, Chen X (2014) Fractional Fourier domain optical image hiding using phase retrieval algorithm based on iterative nonlinear double random phase encoding. opt. Exp. 22:22981\u201322995","journal-title":"opt. Exp."},{"key":"8658_CR40","doi-asserted-by":"crossref","first-page":"025701","DOI":"10.1088\/2040-8978\/17\/2\/025701","volume":"17","author":"Z Liu","year":"2015","unstructured":"Liu Z, Guo C, Tan J, Wu Q, Pan L, Liu S (2015) Iterative phase-amplitude retrieval with multiple intensity images at output plane of gyrator transforms. J. Opt. 17:025701","journal-title":"J. Opt."},{"issue":"055702","key":"8658_CR41","first-page":"1","volume":"19","author":"L Sui","year":"2017","unstructured":"Sui L, Zhang X, Tian A (2017) Optical multiple-image authentication scheme based on the phase retrieval algorithm in gyrator domain. J Opt 19(055702):1\u201314","journal-title":"J Opt"},{"key":"8658_CR42","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1016\/j.optlaseng.2016.08.013","volume":"88","author":"L Chen","year":"2017","unstructured":"Chen L, Chang G, He B, Mao H, Zhao D (2017) Optical image conversion and encryption by diffraction, phase retrieval algorithm and incoherent superposition. Opt. Laser Eng. 88:221\u2013232","journal-title":"Opt. Laser Eng."},{"key":"8658_CR43","doi-asserted-by":"crossref","first-page":"1233","DOI":"10.1364\/JOSAA.31.001233","volume":"31","author":"SK Rajput","year":"2014","unstructured":"Rajput SK, Nishchal NK (2014) An optical encryption and authentication scheme using asymmetric keys. J Opt Soc Am A 31:1233\u20131238","journal-title":"J Opt Soc Am A"},{"key":"8658_CR44","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1016\/j.optcom.2016.04.023","volume":"372","author":"Q Wang","year":"2016","unstructured":"Wang Q, Alfalou A, Brosseau C (2016) Security enhanced multiple-image authentication based on cascaded optical interference and sparse phase mixed encoding. opt. Commun. 372:144\u2013154","journal-title":"opt. Commun."},{"key":"8658_CR45","doi-asserted-by":"crossref","unstructured":"Wang Q, Alfalou A and Brosseau C (2016) Optical multiple image authentication based on cascaded phase filtering structure Proc. SPIE, Optics and Photonics for Counterterrorism, Crime Fighting, and Defence XII, 9995, 999503\u20131\/4","DOI":"10.1117\/12.2244515"},{"key":"8658_CR46","doi-asserted-by":"crossref","first-page":"3204","DOI":"10.1364\/AO.54.003204","volume":"54","author":"D Fan","year":"2015","unstructured":"Fan D, Meng X, Wang Y, Yang X, Pan X, Peng X, He W, Dong G, Cheng H (2015) Multiple-image authentication with a cascaded multilevel architecture based on amplitude field random sampling and phase information multiplexing. Appl. Opt. 54:3204\u20133215","journal-title":"Appl. Opt."},{"key":"8658_CR47","doi-asserted-by":"crossref","first-page":"96542E","DOI":"10.1117\/12.2183394","volume":"9654","author":"S Vashisth","year":"2015","unstructured":"Vashisth S, Yadav AK, Singh H, Singh K (2015) Watermarking in gyrator domain using an asymmetric cryptosystem. Proc SPIE 9654:96542E\u20139651\/8","journal-title":"Proc SPIE"},{"key":"8658_CR48","doi-asserted-by":"crossref","first-page":"462","DOI":"10.1016\/j.optcom.2015.06.069","volume":"355","author":"MR Abuturab","year":"2015","unstructured":"Abuturab MR (2015) Gyrator wavelet transform based non-linear multiple single channel information fusion authentication. Opt Commun 355:462\u2013478","journal-title":"Opt Commun"},{"key":"8658_CR49","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1016\/j.optcom.2015.01.019","volume":"344","author":"AK Yadav","year":"2015","unstructured":"Yadav AK, Vashisth S, Singh H, Singh K (2015) A phase-image watermarking scheme in gyrator domain using devil\u2019s vortex Fresnel lens as a phase mask. Opt Commun 344:172\u2013180","journal-title":"Opt Commun"},{"issue":"210","key":"8658_CR50","first-page":"1","volume":"50","author":"R Girija","year":"2018","unstructured":"Girija R, Singh H (2018) A cryptosystem based on deterministic phase masks and fractional Fourier transform deploying singular value decomposition. opt. Quantum Electronics 50(210):1\u201324","journal-title":"opt. Quantum Electronics"},{"issue":"20","key":"8658_CR51","first-page":"1","volume":"9","author":"P Yadav","year":"2018","unstructured":"Yadav P, Singh H (2018) Optical double image hiding in the fractional Hartley transform using structured phase filter and Arnold transform. 3D Research 9(20):1\u201320","journal-title":"3D Research"},{"issue":"21","key":"8658_CR52","doi-asserted-by":"crossref","first-page":"5326","DOI":"10.1016\/j.optcom.2008.07.049","volume":"281","author":"D Zhao","year":"2008","unstructured":"Zhao D, Li X, Chen L (2008) Optical image encryption with redefined fractional Hartley transform. Opt Commun 281(21):5326\u20135329","journal-title":"Opt Commun"},{"issue":"7","key":"8658_CR53","doi-asserted-by":"crossref","first-page":"673","DOI":"10.1016\/j.ijleo.2008.10.008","volume":"121","author":"L Xinxin","year":"2010","unstructured":"Xinxin L, Daomu Z (2010) Optical color image encryption with redefined fractional Hartley transform. Optik \u2013 International Journal for Light and Electron Optics 121(7):673\u2013677","journal-title":"Optik \u2013 International Journal for Light and Electron Optics"},{"key":"8658_CR54","doi-asserted-by":"crossref","unstructured":"Girija R and Singh H (2018) Enhancing security of double random phase encoding based on random S-box, 3D research, 9:15 (1-20).","DOI":"10.1007\/s13319-018-0165-z"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-08658-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-020-08658-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-08658-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,4]],"date-time":"2021-02-04T00:28:17Z","timestamp":1612398497000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-020-08658-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,5]]},"references-count":54,"journal-issue":{"issue":"19-20","published-print":{"date-parts":[[2020,5]]}},"alternative-id":["8658"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-08658-3","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2020,2,5]]},"assertion":[{"value":"3 July 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 December 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 February 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}