{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:25:10Z","timestamp":1772555110858,"version":"3.50.1"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"28-29","license":[{"start":{"date-parts":[[2020,7,7]],"date-time":"2020-07-07T00:00:00Z","timestamp":1594080000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,7,7]],"date-time":"2020-07-07T00:00:00Z","timestamp":1594080000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1007\/s11042-020-09174-0","type":"journal-article","created":{"date-parts":[[2020,7,7]],"date-time":"2020-07-07T18:04:37Z","timestamp":1594145077000},"page":"35051-35080","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["A verifiable multi-secret image sharing scheme using XOR operation and hash function"],"prefix":"10.1007","volume":"80","author":[{"given":"Arup Kumar","family":"Chattopadhyay","sequence":"first","affiliation":[]},{"given":"Amitava","family":"Nag","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3742-7484","authenticated-orcid":false,"given":"Jyoti Prakash","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Amit Kumar","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,7]]},"reference":[{"key":"9174_CR1","doi-asserted-by":"crossref","unstructured":"Chattopadhyay AK, Ghosh D, Maitra P, Nag A, Saha HN (2018) A verifiable (n, n) secret image sharing scheme using XOR operations. In: Proceedings of 9th IEEE Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), pages 1025\u20131031. IEEE","DOI":"10.1109\/UEMCON.2018.8796568"},{"key":"9174_CR2","doi-asserted-by":"crossref","unstructured":"Chattopadhyay AK, Maitra P, Saha HN, Nag A (2018) A verifiable multi-secret sharing scheme with elliptic curve cryptography. In: Proceedings of the 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), pages 1374\u20131379. IEEE","DOI":"10.1109\/IEMCON.2018.8614998"},{"key":"9174_CR3","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.jss.2014.01.001","volume":"92","author":"C-C Chen","year":"2014","unstructured":"Chen C-C, Wu W-J (2014) A secure Boolean-based multi-secret image sharing scheme. J Syst Softw 92:107\u2013114","journal-title":"J Syst Softw"},{"issue":"12","key":"9174_CR4","doi-asserted-by":"crossref","first-page":"7113","DOI":"10.1007\/s11042-015-2634-1","volume":"75","author":"C-C Chen","year":"2016","unstructured":"Chen C-C, Wu W-J, Chen J-L (2016) Highly efficient and secure multi-secret image sharing scheme. Multimedia Tools and Applications 75(12):7113\u20137128","journal-title":"Multimedia Tools and Applications"},{"key":"9174_CR5","doi-asserted-by":"crossref","first-page":"107104","DOI":"10.1109\/ACCESS.2019.2929090","volume":"7","author":"D Chen","year":"2019","unstructured":"Chen D, Lu W, Xing W, Wang N (2019) An efficient verifiable threshold multi-secret sharing scheme with different stages. IEEE Access 7:107104\u2013107110","journal-title":"IEEE Access"},{"issue":"1","key":"9174_CR6","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.sigpro.2010.06.012","volume":"91","author":"T-H Chen","year":"2011","unstructured":"Chen T-H, Wu C-S (2011) Efficient multi-secret image sharing based on Boolean operations. Signal Process 91(1):90\u201397","journal-title":"Signal Process"},{"issue":"5","key":"9174_CR7","doi-asserted-by":"crossref","first-page":"1496","DOI":"10.1016\/j.dsp.2013.05.014","volume":"23","author":"Y-C Chen","year":"2013","unstructured":"Chen Y-C, Tsai D-S, Horng G (2013) Visual secret sharing with cheating prevention revisited. Digital Signal Processing 23(5):1496\u20131504","journal-title":"Digital Signal Processing"},{"issue":"2","key":"9174_CR8","doi-asserted-by":"crossref","first-page":"1721","DOI":"10.1007\/s11042-015-3143-y","volume":"76","author":"Y-R Chen","year":"2017","unstructured":"Chen Y-R, Chen L-H (2017) Region image sharing with various secrecy levels. Multimedia Tools and Applications 76(2):1721\u20131734","journal-title":"Multimedia Tools and Applications"},{"key":"9174_CR9","doi-asserted-by":"crossref","unstructured":"Chor B, Goldwasser S, Micali S, Awerbuch B (1985) Verifiable secret sharing and achieving simultaneity in the presence of faults. In: Proceedings of 26th Annual Symposium on Foundations of Computer Science (SFCS 1985), pages 383\u2013395. IEEE","DOI":"10.1109\/SFCS.1985.64"},{"issue":"9","key":"9174_CR10","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1016\/j.aml.2010.04.024","volume":"23","author":"A Das","year":"2010","unstructured":"Das A, Adhikari A (2010) An efficient multi-use multi-secret sharing scheme based on hash function. Applied Mathematics Letters 23(9):993\u2013996","journal-title":"Applied Mathematics Letters"},{"issue":"3","key":"9174_CR11","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1016\/j.csi.2007.08.004","volume":"30","author":"MH Dehkordi","year":"2008","unstructured":"Dehkordi MH, Mashhadi S (2008) An efficient threshold verifiable multi-secret sharing. Computer Standards & Interfaces 30(3):187\u2013190","journal-title":"Computer Standards & Interfaces"},{"issue":"9","key":"9174_CR12","doi-asserted-by":"crossref","first-page":"2262","DOI":"10.1016\/j.ins.2007.11.031","volume":"178","author":"MH Dehkordi","year":"2008","unstructured":"Dehkordi MH, Mashhadi S (2008) New efficient and practical verifiable multi-secret sharing schemes. Information Sciences 178(9):2262\u20132274","journal-title":"Information Sciences"},{"issue":"9","key":"9174_CR13","doi-asserted-by":"crossref","first-page":"1777","DOI":"10.1016\/j.comcom.2007.11.014","volume":"31","author":"MH Dehkordi","year":"2008","unstructured":"Dehkordi MH, Mashhadi S (2008) Verifiable secret sharing schemes based on non-homogeneous linear recursions and elliptic curves. Computer Communications 31(9):1777\u20131784","journal-title":"Computer Communications"},{"issue":"4","key":"9174_CR14","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1049\/iet-ifs.2018.5306","volume":"13","author":"MH Dehkordi","year":"2019","unstructured":"Dehkordi MH, Oraei H (2019) How to construct a verifiable multi-secret sharing scheme based on graded encoding schemes. IET Inf Secur 13(4):343\u2013351","journal-title":"IET Inf Secur"},{"issue":"1","key":"9174_CR15","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1007\/s12095-012-0076-4","volume":"5","author":"R dela Cruz","year":"2013","unstructured":"dela Cruz R, Wang H (2013) Cheating-immune secret sharing schemes from codes and cumulative arrays. Cryptography and Communications 5(1):67\u201383","journal-title":"Cryptography and Communications"},{"key":"9174_CR16","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1016\/j.jvcir.2017.09.013","volume":"49","author":"M Deshmukh","year":"2017","unstructured":"Deshmukh M, Nain N, Ahmed M (2017) A novel approach for sharing multiple color images by employing Chinese remainder theorem. Journal of Visual Communication and Image Representation 49:291\u2013302","journal-title":"Journal of Visual Communication and Image Representation"},{"issue":"1","key":"9174_CR17","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/s11042-016-4229-x","volume":"77","author":"M Deshmukh","year":"2018","unstructured":"Deshmukh M, Nain N, Ahmed M (2018) Efficient and secure multi secret sharing schemes based on Boolean XOR and arithmetic modulo. Multimedia Tools and Applications 77(1):89\u2013107","journal-title":"Multimedia Tools and Applications"},{"issue":"5","key":"9174_CR18","doi-asserted-by":"crossref","first-page":"6247","DOI":"10.1007\/s11042-016-3317-2","volume":"76","author":"KM Faraoun","year":"2017","unstructured":"Faraoun KM (2017) Design of a new efficient and secure multi-secret images sharing scheme. Multimedia Tools and Applications 76(5):6247\u20136261","journal-title":"Multimedia Tools and Applications"},{"issue":"15","key":"9174_CR19","doi-asserted-by":"crossref","first-page":"19569","DOI":"10.1007\/s11042-017-5412-4","volume":"77","author":"C Guo","year":"2018","unstructured":"Guo C, Zhang H, Fu Z, Feng B, Li M (2018) A novel proactive secret image sharing scheme based on LISS. Multimedia Tools and Applications 77(15):19569\u201319590","journal-title":"Multimedia Tools and Applications"},{"issue":"6","key":"9174_CR20","doi-asserted-by":"crossref","first-page":"950","DOI":"10.1002\/sec.807","volume":"7","author":"L Harn","year":"2013","unstructured":"Harn L, Fuyou M, Chang C-C (2013) Verifiable secret sharing based on the Chinese remainder theorem. Security and Communication Networks 7 (6):950\u2013957","journal-title":"Security and Communication Networks"},{"issue":"1","key":"9174_CR21","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/s10623-008-9265-8","volume":"52","author":"L Harn","year":"2009","unstructured":"Harn L, Lin C (2009) Detection and identification of cheaters in (t, n) secret sharing scheme. Des Codes Crypt 52(1):15\u201324","journal-title":"Des Codes Crypt"},{"key":"9174_CR22","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.tcs.2012.05.006","volume":"445","author":"C Hu","year":"2012","unstructured":"Hu C, Liao X, Cheng X (2012) Verifiable multi-secret sharing based on LFSR sequences. Theoretical Computer Science 445:52\u201362","journal-title":"Theoretical Computer Science"},{"key":"9174_CR23","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/j.jvcir.2018.10.014","volume":"57","author":"S Kabirirad","year":"2018","unstructured":"Kabirirad S, Eslami Z (2018) A (t, n)-multi secret image sharing scheme based on Boolean operations. Journal of Visual Communication and Image Representation 57:39\u201347","journal-title":"Journal of Visual Communication and Image Representation"},{"key":"9174_CR24","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.jisa.2019.03.018","volume":"47","author":"S Kabirirad","year":"2019","unstructured":"Kabirirad S, Eslami Z (2019) Improvement of (n, n)-multi-secret image sharing schemes based on Boolean operations. Journal of Information Security and Applications 47:16\u201327","journal-title":"Journal of Information Security and Applications"},{"key":"9174_CR25","doi-asserted-by":"crossref","first-page":"102430","DOI":"10.1016\/j.jisa.2019.102430","volume":"51","author":"S Kandar","year":"2020","unstructured":"Kandar S, Dhara BC (2020) A verifiable secret sharing scheme with combiner verification and cheater identification. Journal of Information Security and Applications 51:102430","journal-title":"Journal of Information Security and Applications"},{"key":"9174_CR26","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/j.jvcir.2018.09.018","volume":"56","author":"A Kanso","year":"2018","unstructured":"Kanso A, Ghebleh M (2018) An efficient lossless secret sharing scheme for medical images. J Vis Commun Image Represent 56:245\u2013255","journal-title":"J Vis Commun Image Represent"},{"key":"9174_CR27","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.ins.2014.12.046","volume":"301","author":"P-Y Lin","year":"2015","unstructured":"Lin P-Y, Wang R-Z, Chang Y-J, Fang W-P (2015) Prevention of cheating in visual cryptography by using coherent patterns. Inf Sci 301:61\u201374","journal-title":"Inf Sci"},{"issue":"12","key":"9174_CR28","doi-asserted-by":"crossref","first-page":"7858","DOI":"10.1016\/j.eswa.2010.04.051","volume":"37","author":"T-L Lin","year":"2010","unstructured":"Lin T-L, Horng S-J, Lee K-H, Chiu P-L, Kao T-W, Chen Y-H, Run R-S, Lai J-L, Chen R-J (2010) A novel visual secret sharing scheme for multiple secrets without pixel expansion. Expert Syst Appl 37(12):7858\u20137869","journal-title":"Expert Syst Appl"},{"issue":"7","key":"9174_CR29","doi-asserted-by":"crossref","first-page":"1282","DOI":"10.1002\/dac.2760","volume":"28","author":"Y Liu","year":"2015","unstructured":"Liu Y, Harn L, Chang C-C (2015) A novel verifiable secret sharing mechanism using theory of numbers and a method for sharing secrets. International Journal of Communication Systems 28(7):1282\u20131292","journal-title":"International Journal of Communication Systems"},{"key":"9174_CR30","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.ins.2018.04.043","volume":"453","author":"Y Liu","year":"2018","unstructured":"Liu Y, Yang C, Wang Y, Zhu L, Ji W (2018) Cheating identifiable secret sharing scheme using symmetric bivariate polynomial. Inf Sci 453:21\u201329","journal-title":"Inf Sci"},{"key":"9174_CR31","first-page":"1","volume":"72","author":"Y-X Liu","year":"2018","unstructured":"Liu Y-X, Sun Q-D, Yang C-N (2018) (k,n) secret image sharing scheme capable of cheating detection. EURASIP Journal on Wireless Communications and Networking 72:1\u20136","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"key":"9174_CR32","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1016\/j.ins.2014.08.046","volume":"294","author":"S Mashhadi","year":"2015","unstructured":"Mashhadi S, Dehkordi MH (2015) Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem. Inf Sci 294:31\u201340","journal-title":"Inf Sci"},{"key":"9174_CR33","doi-asserted-by":"crossref","unstructured":"Nag A, Singh JP, Singh AK (2019) An efficient Boolean based multi-secret image sharing scheme. Multimed Tools Appl","DOI":"10.1007\/s11042-019-07807-7"},{"key":"9174_CR34","doi-asserted-by":"crossref","first-page":"604","DOI":"10.1016\/j.sigpro.2014.10.011","volume":"108","author":"D Ou","year":"2015","unstructured":"Ou D, Sun W, Wu X (2015) Non-expansible XOR-based visual cryptography scheme with meaningful shares. Signal Process 108:604\u2013621","journal-title":"Signal Process"},{"key":"9174_CR35","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.jvcir.2015.01.017","volume":"29","author":"D Ou","year":"2015","unstructured":"Ou D, Ye L, Sun W (2015) User-friendly secret image sharing scheme with verification ability based on block truncation coding and error diffusion. Journal of Visual Communication and Image Representation 29:46\u201360","journal-title":"Journal of Visual Communication and Image Representation"},{"key":"9174_CR36","doi-asserted-by":"crossref","first-page":"37473","DOI":"10.1109\/ACCESS.2019.2902853","volume":"7","author":"H Prasetyo","year":"2019","unstructured":"Prasetyo H, Guo J-M (2019) A note on multiple secret sharing using Chinese remainder theorem and exclusive-OR. IEEE Access 7:37473\u201337497","journal-title":"IEEE Access"},{"key":"9174_CR37","doi-asserted-by":"crossref","first-page":"24837","DOI":"10.1007\/s11042-019-7710-5","volume":"78","author":"H Prasetyo","year":"2019","unstructured":"Prasetyo H, Hsia C-H (2019) Lossless progressive secret sharing for grayscale and color images. Multimedia Tools and Applications 78:24837\u201324862","journal-title":"Multimedia Tools and Applications"},{"key":"9174_CR38","doi-asserted-by":"crossref","first-page":"655","DOI":"10.1016\/j.ins.2018.11.004","volume":"501","author":"B Rajabi","year":"2019","unstructured":"Rajabi B, Eslami Z (2019) A verifiable threshold secret sharing scheme based on lattices. Inf Sci 501:655\u2013661","journal-title":"Inf Sci"},{"issue":"4","key":"9174_CR39","doi-asserted-by":"crossref","first-page":"1283","DOI":"10.18576\/amis\/100407","volume":"10","author":"O Reyad","year":"2016","unstructured":"Reyad O, Kotulski Z, Abd-Elhafiez WM (2016) Image encryption using chaos-driven elliptic curve pseudo-random number generators. Applied Mathematics & Information Sciences 10(4):1283\u20131292","journal-title":"Applied Mathematics & Information Sciences"},{"key":"9174_CR40","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.ins.2014.03.025","volume":"278","author":"J Shao","year":"2014","unstructured":"Shao J (2014) Efficient verifiable multi-secret sharing scheme based on hash function. Inf Sci 278:104\u2013109","journal-title":"Inf Sci"},{"issue":"3","key":"9174_CR41","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1049\/iet-ifs.2018.5174","volume":"13","author":"M Sheikhi-Garjan","year":"2019","unstructured":"Sheikhi-Garjan M, Bahramian M, Doche C (2019) Threshold verifiable multi-secret sharing based on elliptic curves and Chinese remainder theorem. IET Inf Secur 13(3):278\u2013284","journal-title":"IET Inf Secur"},{"issue":"5","key":"9174_CR42","doi-asserted-by":"crossref","first-page":"6287","DOI":"10.1007\/s11042-017-4536-x","volume":"77","author":"S Shivani","year":"2018","unstructured":"Shivani S (2018) Multi secret sharing with unexpanded meaningful shares. Multimedia Tools and Applications 77(5):6287\u20136310","journal-title":"Multimedia Tools and Applications"},{"key":"9174_CR43","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1016\/j.sigpro.2017.06.015","volume":"142","author":"P Singh","year":"2018","unstructured":"Singh P, Raman B, Misra M (2018) A (n, n) threshold non-expansible XOR based visual cryptography with unique meaningful shares. Signal Process 142:301\u2013319","journal-title":"Signal Process"},{"issue":"5","key":"9174_CR44","doi-asserted-by":"crossref","first-page":"765","DOI":"10.1016\/S0097-8493(02)00131-0","volume":"26","author":"C-C Thien","year":"2002","unstructured":"Thien C-C, Lin J-C (2002) Secret image sharing. Computers & Graphics 26(5):765\u2013770","journal-title":"Computers & Graphics"},{"key":"9174_CR45","doi-asserted-by":"crossref","first-page":"2395","DOI":"10.1007\/s13369-019-03992-7","volume":"45","author":"OP Verma","year":"2020","unstructured":"Verma OP, Jain N, Pal SK (2020) A hybrid-based verifiable secret sharing scheme using Chinese remainder theorem. Arabian Journal for Science and Engineering 45:2395\u20132406","journal-title":"Arabian Journal for Science and Engineering"},{"issue":"10","key":"9174_CR46","doi-asserted-by":"crossref","first-page":"2776","DOI":"10.1016\/j.patcog.2006.11.018","volume":"40","author":"D Wang","year":"2007","unstructured":"Wang D, Zhang L, Ma N, Li X (2007) Two secret sharing schemes based on Boolean operations. Pattern Recogn 40(10):2776\u20132785","journal-title":"Pattern Recogn"},{"issue":"1","key":"9174_CR47","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1186\/1687-6180-2013-49","volume":"2013","author":"K-S Wu","year":"2013","unstructured":"Wu K-S (2013) A secret image sharing scheme for light images. EURASIP Journal on Advances in Signal Processing 2013(1):49","journal-title":"EURASIP Journal on Advances in Signal Processing"},{"issue":"1","key":"9174_CR48","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1007\/s11424-011-8408-6","volume":"24","author":"T-Y Wu","year":"2011","unstructured":"Wu T-Y, Tseng Y-M (2011) A pairing-based publicly verifiable secret sharing scheme. J Syst Sci & Complexity 24(1):186\u2013194","journal-title":"J Syst Sci & Complexity"},{"issue":"2","key":"9174_CR49","first-page":"483","volume":"151","author":"C-C Yang","year":"2004","unstructured":"Yang C-C, Chang T-Y, Hwang M-S (2004) A (t,n) multi-secret sharing scheme. Appl Math Comput 151(2):483\u2013490","journal-title":"Appl Math Comput"},{"issue":"1","key":"9174_CR50","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.csi.2006.02.004","volume":"29","author":"J Zhao","year":"2007","unstructured":"Zhao J, Zhang J, Zhao R (2007) A practical verifiable multi-secret sharing scheme. Computer Standards & Interfaces 29(1):138\u2013141","journal-title":"Computer Standards & Interfaces"},{"issue":"1","key":"9174_CR51","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1016\/j.csi.2007.10.012","volume":"31","author":"R Zhao","year":"2009","unstructured":"Zhao R, Zhao J, Dai F, Zhao F (2009) A new image secret sharing scheme to identify cheaters. Computer Standards & Interfaces 31(1):252\u2013257","journal-title":"Computer Standards & Interfaces"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09174-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09174-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09174-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,30]],"date-time":"2021-11-30T17:23:36Z","timestamp":1638293016000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09174-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,7]]},"references-count":51,"journal-issue":{"issue":"28-29","published-print":{"date-parts":[[2021,11]]}},"alternative-id":["9174"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09174-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,7]]},"assertion":[{"value":"24 February 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 April 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 June 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 July 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}