{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T16:52:40Z","timestamp":1771692760427,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"20","license":[{"start":{"date-parts":[[2020,3,18]],"date-time":"2020-03-18T00:00:00Z","timestamp":1584489600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,3,18]],"date-time":"2020-03-18T00:00:00Z","timestamp":1584489600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Educational Science Research Foundation of Henan Normal University","award":["2018JK20"],"award-info":[{"award-number":["2018JK20"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,8]]},"DOI":"10.1007\/s11042-020-08802-z","type":"journal-article","created":{"date-parts":[[2020,3,18]],"date-time":"2020-03-18T03:03:06Z","timestamp":1584500586000},"page":"30583-30603","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["Fingerprint-related chaotic image encryption scheme based on blockchain framework"],"prefix":"10.1007","volume":"80","author":[{"given":"Ruiping","family":"Li","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,18]]},"reference":[{"key":"8802_CR1","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/j.sigpro.2019.06.013","volume":"164","author":"M Alawida","year":"2019","unstructured":"Alawida M, Teh JS, Samsudin A, Alshoura WH (2019) An image encryption scheme based on hybridizing digital chaos and finite state machine. Signal Process 164:249\u2013266. https:\/\/doi.org\/10.1016\/j.sigpro.2019.06.013","journal-title":"Signal Process"},{"issue":"19","key":"8802_CR2","doi-asserted-by":"publisher","first-page":"27569","DOI":"10.1007\/s11042-019-07852-2","volume":"78","author":"S Anwar","year":"2019","unstructured":"Anwar S, Meghana S (2019) A pixel permutation based image encryption technique using chaotic map. Multimed Tools Appl 78(19):27569\u201327590. https:\/\/doi.org\/10.1007\/s11042-019-07852-2","journal-title":"Multimed Tools Appl"},{"issue":"19","key":"8802_CR3","doi-asserted-by":"publisher","first-page":"27611","DOI":"10.1007\/s11042-019-07881-x","volume":"78","author":"SI Batool","year":"2019","unstructured":"Batool SI, Waseem HM (2019) A novel image encryption scheme based on Arnold scrambling and Lucas series. Multimed Tools Appl 78(19):27611\u201327637. https:\/\/doi.org\/10.1007\/s11042-019-07881-x","journal-title":"Multimed Tools Appl"},{"key":"8802_CR4","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.sigpro.2016.03.021","volume":"128","author":"A Belazi","year":"2016","unstructured":"Belazi A, Abd El-Latif AA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155\u2013170. https:\/\/doi.org\/10.1016\/j.sigpro.2016.03.021","journal-title":"Signal Process"},{"issue":"2-3","key":"8802_CR5","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1023\/A:1008345904539","volume":"19","author":"S Blake-Wilson","year":"2000","unstructured":"Blake-Wilson S (2000) Information security, mathematics, and public-key cryptography. Design Code Cryptogr 19(2-3):77\u201399. https:\/\/doi.org\/10.1023\/A:1008345904539","journal-title":"Design Code Cryptogr"},{"issue":"5","key":"8802_CR6","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127412501271","volume":"22","author":"SE Borujeni","year":"2012","unstructured":"Borujeni SE, Eshghi M, Boroujeni MS (2012) Mehrab maps: one-dimensional piecewise nonlinear chaotic maps. Int J Bifurcat Chaos 22(5):Artn 1250127. https:\/\/doi.org\/10.1142\/S0218127412501271","journal-title":"Int J Bifurcat Chaos"},{"key":"8802_CR7","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.sigpro.2018.09.029","volume":"155","author":"XL Chai","year":"2019","unstructured":"Chai XL, Fu XL, Gan ZH, Lu Y, Chen YR (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44\u201362. https:\/\/doi.org\/10.1016\/j.sigpro.2018.09.029","journal-title":"Signal Process"},{"issue":"1","key":"8802_CR8","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s00521-017-2993-9","volume":"31","author":"XL Chai","year":"2019","unstructured":"Chai XL, Gan ZH, Yuan K, Chen YR, Liu XX (2019) A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Comput Appl 31(1):219\u2013237. https:\/\/doi.org\/10.1007\/s00521-017-2993-9","journal-title":"Neural Comput Appl"},{"key":"8802_CR9","doi-asserted-by":"publisher","first-page":"97549","DOI":"10.1109\/Access.2019.2926831","volume":"7","author":"L Chen","year":"2019","unstructured":"Chen L, Chen JX, Zhao G, Wang SH (2019) Cryptanalysis and improvement of a chaos-based watermarking scheme. IEEE Access 7:97549\u201397565. https:\/\/doi.org\/10.1109\/Access.2019.2926831","journal-title":"IEEE Access"},{"issue":"12","key":"8802_CR10","doi-asserted-by":"publisher","first-page":"3332","DOI":"10.1109\/Tifs.2019.2914557","volume":"14","author":"YC Chen","year":"2019","unstructured":"Chen YC, Hung TH, Hsieh SH, Shiu CW (2019) A new reversible data hiding in encrypted image based on multi-secret sharing and lightweight cryptographic algorithms. IEEE T Inf Foren Sec 14(12):3332\u20133343. https:\/\/doi.org\/10.1109\/Tifs.2019.2914557","journal-title":"IEEE T Inf Foren Sec"},{"issue":"7","key":"8802_CR11","doi-asserted-by":"publisher","first-page":"4843","DOI":"10.1109\/Tit.2011.2146130","volume":"57","author":"MQ Cheng","year":"2011","unstructured":"Cheng MQ, Miao Y (2011) On anti-collusion codes and detection algorithms for multimedia fingerprinting. IEEE T Inform Theory 57(7):4843\u20134851. https:\/\/doi.org\/10.1109\/Tit.2011.2146130","journal-title":"IEEE T Inform Theory"},{"issue":"6","key":"8802_CR12","doi-asserted-by":"publisher","first-page":"1515","DOI":"10.1109\/Tifs.2018.2881677","volume":"14","author":"T Chuman","year":"2019","unstructured":"Chuman T, Sirichotedumrong W, Kiya H (2019) Encryption-then-compression systems using Grayscale-based image encryption for JPEG images. IEEE T Inf Foren Sec 14(6):1515\u20131525. https:\/\/doi.org\/10.1109\/Tifs.2018.2881677","journal-title":"IEEE T Inf Foren Sec"},{"issue":"4","key":"8802_CR13","doi-asserted-by":"publisher","first-page":"3416","DOI":"10.1109\/Comst.2018.2842460","volume":"20","author":"M Conti","year":"2018","unstructured":"Conti M, Kumar ES, Lal C, Ruj S (2018) A survey on security and privacy issues of Bitcoin. IEEE Commun Surv Tut 20(4):3416\u20133452. https:\/\/doi.org\/10.1109\/Comst.2018.2842460","journal-title":"IEEE Commun Surv Tut"},{"key":"8802_CR14","doi-asserted-by":"crossref","unstructured":"Fridrich J (1997) Image encryption based on chaotic maps. IEEE Sys Man Cybern:1105\u20131110","DOI":"10.1109\/ICSMC.1997.638097"},{"key":"8802_CR15","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1016\/j.ins.2019.07.101","volume":"505","author":"ED Gao","year":"2019","unstructured":"Gao ED, Pan ZB, Gao XY (2019) Reversible data hiding based on novel pairwise PVO and annular merging strategy. Inf Sci 505:549\u2013561. https:\/\/doi.org\/10.1016\/j.ins.2019.07.101","journal-title":"Inf Sci"},{"issue":"13","key":"8802_CR16","doi-asserted-by":"publisher","first-page":"17701","DOI":"10.1007\/s11042-018-7084-0","volume":"78","author":"E Gul","year":"2019","unstructured":"Gul E, Ozturk S (2019) A novel hash function based fragile watermarking method for image integrity. Multimed Tools Appl 78(13):17701\u201317718. https:\/\/doi.org\/10.1007\/s11042-018-7084-0","journal-title":"Multimed Tools Appl"},{"issue":"20","key":"8802_CR17","doi-asserted-by":"publisher","first-page":"29137","DOI":"10.1007\/s11042-018-6589-x","volume":"78","author":"XY He","year":"2019","unstructured":"He XY, Zhang W, Zhang HF, Ma L, Li YB (2019) Reversible data hiding for high dynamic range images using edge information. Multimed Tools Appl 78(20):29137\u201329160. https:\/\/doi.org\/10.1007\/s11042-018-6589-x","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"8802_CR18","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1145\/2911977","volume":"59","author":"L Hoffmann","year":"2016","unstructured":"Hoffmann L, Diffie W, Hellman M (2016) Finding new directions in cryptography. Commun ACM 59(6):112\u2013111. https:\/\/doi.org\/10.1145\/2911977","journal-title":"Commun ACM"},{"issue":"2","key":"8802_CR19","doi-asserted-by":"publisher","first-page":"1273","DOI":"10.1109\/Tie.2018.2833049","volume":"66","author":"ZY Hua","year":"2019","unstructured":"Hua ZY, Zhou BH, Zhou YC (2019) Sine Chaotification model for enhancing Chaos and its hardware implementation. IEEE T Ind Electron 66(2):1273\u20131284. https:\/\/doi.org\/10.1109\/Tie.2018.2833049","journal-title":"IEEE T Ind Electron"},{"issue":"1\u20132","key":"8802_CR20","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s11071-012-0646-1","volume":"71","author":"I Hussain","year":"2013","unstructured":"Hussain I, Shah T, Gondal MA, Mahmood H (2013) An efficient approach for the construction of LFT S-boxes using chaotic logistic map. Nonlinear Dynam 71(1\u20132):133\u2013140. https:\/\/doi.org\/10.1007\/s11071-012-0646-1","journal-title":"Nonlinear Dynam"},{"issue":"7","key":"8802_CR21","doi-asserted-by":"publisher","first-page":"1919","DOI":"10.1109\/Tcsvt.2018.2859253","volume":"29","author":"XJ Kang","year":"2019","unstructured":"Kang XJ, Tao R (2019) Color image encryption using pixel scrambling operator and reality-preserving MPFRHT. IEEE T Circ Syst Vid 29(7):1919\u20131932. https:\/\/doi.org\/10.1109\/Tcsvt.2018.2859253","journal-title":"IEEE T Circ Syst Vid"},{"issue":"3","key":"8802_CR22","doi-asserted-by":"publisher","first-page":"2543","DOI":"10.1109\/Comst.2018.2818623","volume":"20","author":"MCK Khalilov","year":"2018","unstructured":"Khalilov MCK, Levi A (2018) A survey on anonymity and privacy in Bitcoin-like digital cash systems. IEEE Commun Surv Tut 20(3):2543\u20132585. https:\/\/doi.org\/10.1109\/Comst.2018.2818623","journal-title":"IEEE Commun Surv Tut"},{"issue":"22","key":"8802_CR23","doi-asserted-by":"publisher","first-page":"14143","DOI":"10.1007\/s11042-016-3242-4","volume":"75","author":"Y Kim","year":"2016","unstructured":"Kim Y (2016) Secure code design against collusion attacks for protecting digital content rights. Multimed Tools Appl 75(22):14143\u201314159. https:\/\/doi.org\/10.1007\/s11042-016-3242-4","journal-title":"Multimed Tools Appl"},{"key":"8802_CR24","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.sigpro.2018.01.026","volume":"147","author":"RS Lan","year":"2018","unstructured":"Lan RS, He JW, Wang SH, Gu TL, Luo XN (2018) Integrated chaotic systems for image encryption. Signal Process 147:133\u2013145. https:\/\/doi.org\/10.1016\/j.sigpro.2018.01.026","journal-title":"Signal Process"},{"key":"8802_CR25","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.image.2015.10.001","volume":"39","author":"M Li","year":"2015","unstructured":"Li M, Xiao D, Zhang YS, Nan H (2015) Reversible data hiding in encrypted images using cross division and additive homomorphism. Signal Process-Image 39:234\u2013248. https:\/\/doi.org\/10.1016\/j.image.2015.10.001","journal-title":"Signal Process-Image"},{"issue":"2","key":"8802_CR26","doi-asserted-by":"publisher","first-page":"1319","DOI":"10.1007\/s11071-018-4426-4","volume":"94","author":"Z Li","year":"2018","unstructured":"Li Z, Peng CG, Li LR, Zhu XY (2018) A novel plaintext-related image encryption scheme using hyper-chaotic system. Nonlinear Dynam 94(2):1319\u20131333. https:\/\/doi.org\/10.1007\/s11071-018-4426-4","journal-title":"Nonlinear Dynam"},{"issue":"1","key":"8802_CR27","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s11071-019-04771-7","volume":"96","author":"M Li","year":"2019","unstructured":"Li M, Lu DD, Xiang Y, Zhang YS, Ren H (2019) Cryptanalysis and improvement in a chaotic image cipher using two-round permutation and diffusion. Nonlinear Dynam 96(1):31\u201347. https:\/\/doi.org\/10.1007\/s11071-019-04771-7","journal-title":"Nonlinear Dynam"},{"issue":"3","key":"8802_CR28","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/Tifs.2013.2248725","volume":"8","author":"KD Ma","year":"2013","unstructured":"Ma KD, Zhang WM, Zhao XF, Yu NH, Li FH (2013) Reversible data hiding in encrypted images by reserving room before encryption. IEEE T Inf Foren Sec 8(3):553\u2013562. https:\/\/doi.org\/10.1109\/Tifs.2013.2248725","journal-title":"IEEE T Inf Foren Sec"},{"issue":"11","key":"8802_CR29","doi-asserted-by":"publisher","first-page":"2176","DOI":"10.1109\/Taslp.2017.2749001","volume":"25","author":"I Natgunanathan","year":"2017","unstructured":"Natgunanathan I, Xiang Y, Hua G, Beliakov G, Yearwood J (2017) Patchwork-based multilayer audio watermarking. IEEE-Acm T Audio Spe 25(11):2176\u20132187. https:\/\/doi.org\/10.1109\/Taslp.2017.2749001","journal-title":"IEEE-Acm T Audio Spe"},{"issue":"3","key":"8802_CR30","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/s10623-009-9285-z","volume":"52","author":"K Nuida","year":"2009","unstructured":"Nuida K, Fujitsu S, Hagiwara M, Kitagawa T, Watanabe H, Ogawa K, Imai H (2009) An improvement of discrete Tardos fingerprinting codes. Des Codes Cryptogr 52(3):339\u2013362. https:\/\/doi.org\/10.1007\/s10623-009-9285-z","journal-title":"Des Codes Cryptogr"},{"issue":"1","key":"8802_CR31","doi-asserted-by":"publisher","first-page":"858","DOI":"10.1109\/Comst.2018.2863956","volume":"21","author":"T Salman","year":"2019","unstructured":"Salman T, Zolanvari M, Erbad A, Jain R, Samaka M (2019) Security services using Blockchains: a state of the art survey. IEEE Commun Surv Tut 21(1):858\u2013880. https:\/\/doi.org\/10.1109\/Comst.2018.2863956","journal-title":"IEEE Commun Surv Tut"},{"issue":"5","key":"8802_CR32","doi-asserted-by":"publisher","first-page":"1405","DOI":"10.1142\/S0218127410026563","volume":"20","author":"E Solak","year":"2010","unstructured":"Solak E, Cokal C, Yildiz OT, Biyikoglu T (2010) Cryptanalysis of Fridrich's chaotic image encryption. Int J Bifurcat Chaos 20(5):1405\u20131413. https:\/\/doi.org\/10.1142\/S0218127410026563","journal-title":"Int J Bifurcat Chaos"},{"issue":"2","key":"8802_CR33","doi-asserted-by":"publisher","DOI":"10.1145\/1346330.1346335","volume":"55","author":"G Tardos","year":"2008","unstructured":"Tardos G (2008) Optimal probabilistic fingerprint codes. J Acm 55(2):Artn 10. https:\/\/doi.org\/10.1145\/1346330.1346335","journal-title":"J Acm"},{"issue":"6","key":"8802_CR34","doi-asserted-by":"publisher","first-page":"804","DOI":"10.1109\/Tip.2005.847284","volume":"14","author":"ZJ Wang","year":"2005","unstructured":"Wang ZJ, Wu M, Zhao HV, Trappe W, Liu KJR (2005) Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. IEEE T Image Process 14(6):804\u2013821. https:\/\/doi.org\/10.1109\/Tip.2005.847284","journal-title":"IEEE T Image Process"},{"issue":"3","key":"8802_CR35","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1007\/s11071-010-9749-8","volume":"62","author":"XY Wang","year":"2010","unstructured":"Wang XY, Yang L, Liu R, Kadir A (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dynam 62(3):615\u2013621. https:\/\/doi.org\/10.1007\/s11071-010-9749-8","journal-title":"Nonlinear Dynam"},{"issue":"2","key":"8802_CR36","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1109\/Tcyb.2015.2514110","volume":"47","author":"JX Wang","year":"2017","unstructured":"Wang JX, Ni JQ, Zhang X, Shi YQ (2017) Rate and distortion optimization for reversible data hiding using multiple histogram shifting. IEEE T Cybernetics 47(2):315\u2013326. https:\/\/doi.org\/10.1109\/Tcyb.2015.2514110","journal-title":"IEEE T Cybernetics"},{"issue":"1","key":"8802_CR37","doi-asserted-by":"publisher","first-page":"916","DOI":"10.1109\/Jsyst.2016.2585681","volume":"12","author":"D Wang","year":"2018","unstructured":"Wang D, Cheng HB, He DB, Wang P (2018) On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices. IEEE Syst J 12(1):916\u2013925. https:\/\/doi.org\/10.1109\/Jsyst.2016.2585681","journal-title":"IEEE Syst J"},{"issue":"6","key":"8802_CR38","doi-asserted-by":"publisher","first-page":"3553","DOI":"10.1007\/s11042-015-2464-1","volume":"75","author":"WY Wen","year":"2016","unstructured":"Wen WY (2016) Security analysis of a color image encryption scheme based on skew tent map and hyper chaotic system of 6th-order CNN against chosen-plaintext attack. Multimed Tools Appl 75(6):3553\u20133560. https:\/\/doi.org\/10.1007\/s11042-015-2464-1","journal-title":"Multimed Tools Appl"},{"key":"8802_CR39","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.sigpro.2016.10.002","volume":"132","author":"EY Xie","year":"2017","unstructured":"Xie EY, Li CQ, Yu SM, Lu JH (2017) On the cryptanalysis of Fridrich\u2019s chaotic image encryption scheme. Signal Process 132:150\u2013154. https:\/\/doi.org\/10.1016\/j.sigpro.2016.10.002","journal-title":"Signal Process"},{"issue":"3","key":"8802_CR40","doi-asserted-by":"publisher","first-page":"1091","DOI":"10.1007\/s11071-012-0329-y","volume":"69","author":"Y Zhang","year":"2012","unstructured":"Zhang Y, Li CQ, Li Q, Zhang D, Shu S (2012) Breaking a chaotic image encryption algorithm based on perceptron model. Nonlinear Dynam 69(3):1091\u20131096. https:\/\/doi.org\/10.1007\/s11071-012-0329-y","journal-title":"Nonlinear Dynam"},{"issue":"3","key":"8802_CR41","doi-asserted-by":"publisher","first-page":"1885","DOI":"10.1007\/s11042-013-1684-5","volume":"73","author":"YS Zhang","year":"2014","unstructured":"Zhang YS, Xiao D, Wen WY, Li M (2014) Cryptanalyzing a novel image cipher based on mixed transformed logistic maps. Multimed Tools Appl 73(3):1885\u20131896. https:\/\/doi.org\/10.1007\/s11042-013-1684-5","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"8802_CR42","doi-asserted-by":"publisher","first-page":"1163","DOI":"10.1109\/Tcyb.2017.2682561","volume":"48","author":"LY Zhang","year":"2018","unstructured":"Zhang LY, Liu YS, Pareschi F, Zhang YS, Wong KW, Rovatti R, Setti G (2018) On the security of a class of diffusion mechanisms for image encryption. IEEE T Cybernetics 48(4):1163\u20131175. https:\/\/doi.org\/10.1109\/Tcyb.2017.2682561","journal-title":"IEEE T Cybernetics"},{"issue":"2","key":"8802_CR43","doi-asserted-by":"publisher","first-page":"1093","DOI":"10.1109\/Comst.2018.2878943","volume":"21","author":"YS Zhang","year":"2019","unstructured":"Zhang YS, Xiang Y, Zhang LY, Rong Y, Guo S (2019) Secure wireless communications based on compressive sensing: a survey. IEEE Commun Surv Tut 21(2):1093\u20131111. https:\/\/doi.org\/10.1109\/Comst.2018.2878943","journal-title":"IEEE Commun Surv Tut"},{"key":"8802_CR44","doi-asserted-by":"publisher","unstructured":"Zhen P, Zhao G, Min LQ, Li XD (2014) A survey of chaos-based cryptography. 2014 ninth international conference on P2p, parallel, grid, cloud and internet computing (3pgcic):237-244. https:\/\/doi.org\/10.1109\/3pgcic.2014.69","DOI":"10.1109\/3pgcic.2014.69"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-08802-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-08802-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-08802-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T05:16:37Z","timestamp":1631682997000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-08802-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,18]]},"references-count":44,"journal-issue":{"issue":"20","published-print":{"date-parts":[[2021,8]]}},"alternative-id":["8802"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-08802-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,18]]},"assertion":[{"value":"18 November 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 February 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 March 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}