{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T15:08:50Z","timestamp":1767971330502,"version":"3.49.0"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,9,6]],"date-time":"2020-09-06T00:00:00Z","timestamp":1599350400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,6]],"date-time":"2020-09-06T00:00:00Z","timestamp":1599350400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s11042-020-09695-8","type":"journal-article","created":{"date-parts":[[2020,9,6]],"date-time":"2020-09-06T10:02:58Z","timestamp":1599386578000},"page":"1029-1054","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":43,"title":["A novel gray scale image encryption scheme based on pixels\u2019 swapping operations"],"prefix":"10.1007","volume":"80","author":[{"given":"Zia","family":"Bashir","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0954-5563","authenticated-orcid":false,"given":"Nadeem","family":"Iqbal","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Hanif","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,6]]},"reference":[{"issue":"1","key":"9695_CR1","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/s11047-012-9334-9","volume":"12","author":"M Babaei","year":"2013","unstructured":"Babaei M (2013) A novel text and image encryption method based on chaos theory and DNA computing. Nat Comput 12(1):101\u2013107","journal-title":"Nat Comput"},{"issue":"3","key":"9695_CR2","first-page":"254","volume":"18","author":"Z Bashir","year":"2016","unstructured":"Bashir Z, Rashid T, Zafar S (2016) Hyperchaotic dynamical system based image encryption scheme with time-varying delays. Pacific Science Review A: Natural Science and Engineering 18(3):254\u2013260","journal-title":"Pacific Science Review A: Natural Science and Engineering"},{"issue":"8","key":"9695_CR3","doi-asserted-by":"crossref","first-page":"887","DOI":"10.1016\/j.image.2014.04.001","volume":"29","author":"R Boriga","year":"2014","unstructured":"Boriga R, D\u0103sc\u0103lescu AC, Priescu I (2014) A new hyperchaotic map and its application in an image encryption scheme. Signal Process Image Commun 29(8):887\u2013901","journal-title":"Signal Process Image Commun"},{"key":"9695_CR4","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.sigpro.2018.09.029","volume":"155","author":"X Chai","year":"2019","unstructured":"Chai X, Fu X, Gan Z, Lu Y, Chen Y (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44\u201362","journal-title":"Signal Process"},{"issue":"14","key":"9695_CR5","doi-asserted-by":"crossref","first-page":"15561","DOI":"10.1007\/s11042-016-3858-4","volume":"76","author":"X Chai","year":"2017","unstructured":"Chai X, Gan Z, Zhang M (2017) A fast chaos-based image encryption scheme with a novel plain image-related swapping block permutation and block diffusion. Multimedia Tools and Applications 76(14):15561\u201315585","journal-title":"Multimedia Tools and Applications"},{"issue":"3","key":"9695_CR6","doi-asserted-by":"crossref","first-page":"1797","DOI":"10.1007\/s11071-016-3153-y","volume":"87","author":"L Chen","year":"2017","unstructured":"Chen L, Ma B, Zhao X, Wang S (2017) Differential cryptanalysis of a novel image encryption algorithm based on chaos and Line map. Nonlinear Dynamics 87(3):1797\u20131807","journal-title":"Nonlinear Dynamics"},{"issue":"3","key":"9695_CR7","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G Chen","year":"2004","unstructured":"Chen G, Mao Y, Chui CKA (2004) Symmetric image encryption scheme based on 3D chaotic cat maps. Chaos. Solitons & Fractals 21(3):749\u2013761","journal-title":"Solitons & Fractals"},{"issue":"23","key":"9695_CR8","doi-asserted-by":"crossref","first-page":"27873","DOI":"10.1364\/OE.21.027873","volume":"21","author":"JX Chen","year":"2013","unstructured":"Chen JX, Zhu ZL, Fu C, Yu H (2013) An improved permutation-diffusion type image cipher with a chaotic orbit perturbing mechanism. Opt Express 21(23):27873\u201327890","journal-title":"Opt Express"},{"issue":"4","key":"9695_CR9","doi-asserted-by":"crossref","first-page":"1191","DOI":"10.1007\/s11071-014-1370-9","volume":"77","author":"JX Chen","year":"2014","unstructured":"Chen JX, Zhu ZL, Fu C, Yu H (2014) A fast image encryption scheme with a novel pixel swapping-based confusion approach. Nonlinear Dynamics 77 (4):1191\u20131207","journal-title":"Nonlinear Dynamics"},{"key":"9695_CR10","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.optlaseng.2013.12.003","volume":"56","author":"R Enayatifar","year":"2014","unstructured":"Enayatifar R, Abdullah AH, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56:83\u201393","journal-title":"Opt Lasers Eng"},{"key":"9695_CR11","unstructured":"Floating-Point Working Group (1985) IEEE Computer society: IEEE standard for binary floating-point arithmetic, Standard, pp 754\u20131985"},{"key":"9695_CR12","doi-asserted-by":"crossref","unstructured":"Fu C, Zhao GY, Gao M, Ma HF (2013) A chaotic symmetric image cipher using a pixel-swapping based permutation. In: 2013 IEEE international conference of IEEE Region 10 (TENCON 2013), IEEE, pp 1\u20136","DOI":"10.1109\/TENCON.2013.6718798"},{"key":"9695_CR13","doi-asserted-by":"crossref","first-page":"123536","DOI":"10.1109\/ACCESS.2020.3004536","volume":"8","author":"M Hanif","year":"2020","unstructured":"Hanif M, Naqvi RA, Abbas S, Khan MA, Iqbal N (2020) A novel and efficient 3D multiple images encryption scheme based on chaotic systems and swapping operations. IEEE Access 8:123536\u2013123555","journal-title":"IEEE Access"},{"key":"9695_CR14","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1016\/j.ijleo.2017.10.072","volume":"155","author":"TM Hoang","year":"2018","unstructured":"Hoang TM, Thanh HX (2018) Cryptanalysis and security improvement for a symmetric color image encryption algorithm. Optik 155:366\u2013383","journal-title":"Optik"},{"issue":"10","key":"9695_CR15","doi-asserted-by":"crossref","first-page":"5455","DOI":"10.1007\/s11042-015-2515-7","volume":"75","author":"A Jain","year":"2016","unstructured":"Jain A, Rajpal N (2016) A robust image encryption algorithm resistant to attacks using DNA and chaotic logistic maps. Multimedia Tools and Applications 75(10):5455\u20135472","journal-title":"Multimedia Tools and Applications"},{"issue":"1","key":"9695_CR16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11042-014-2221-x","volume":"75","author":"A Kulsoom","year":"2016","unstructured":"Kulsoom A, Xiao D, Abbas SA (2016) An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules. Multimedia Tools and Applications 75(1):1\u201323","journal-title":"Multimedia Tools and Applications"},{"issue":"10","key":"9695_CR17","doi-asserted-by":"crossref","first-page":"3119","DOI":"10.1142\/S0218127405014052","volume":"15","author":"S Li","year":"2005","unstructured":"Li S, Chen G, Mou X (2005) On the dynamical degradation of digital piecewise linear chaotic maps. International Journal of Bifurcation and Chaos 15 (10):3119\u20133151","journal-title":"International Journal of Bifurcation and Chaos"},{"key":"9695_CR18","first-page":"2004","volume":"374","author":"S Li","year":"2004","unstructured":"Li S, Li C, Chen G, Zhang D, Bourbakis NG (2004) A general cryptanalysis of permutation-only multimedia encryption algorithms. IACR\u2019s Cryptology ePrint Archive: Report 374:2004","journal-title":"IACR\u2019s Cryptology ePrint Archive: Report"},{"issue":"4","key":"9695_CR19","doi-asserted-by":"crossref","first-page":"949","DOI":"10.1016\/j.sigpro.2010.09.014","volume":"91","author":"C Li","year":"2011","unstructured":"Li C, Lo KT (2011) Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal process 91(4):949\u2013954","journal-title":"Signal process"},{"key":"9695_CR20","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1016\/j.optlaseng.2016.10.020","volume":"90","author":"Y Li","year":"2017","unstructured":"Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt Lasers Eng 90:238\u2013246","journal-title":"Opt Lasers Eng"},{"key":"9695_CR21","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.ijleo.2017.09.099","volume":"153","author":"X Liao","year":"2018","unstructured":"Liao X, Hahsmi MA, Haider R (2018) An efficient mixed inter-intra pixels substitution at 2bits-level for image encryption technique using DNA and chaos. Optik-International Journal for Light and Electron Optics 153:117\u2013134","journal-title":"Optik-International Journal for Light and Electron Optics"},{"issue":"18","key":"9695_CR22","doi-asserted-by":"crossref","first-page":"11241","DOI":"10.1007\/s11042-015-2851-7","volume":"75","author":"X Liao","year":"2016","unstructured":"Liao X, Kulsoom A, Ullah S (2016) A modified (Dual) fusion technique for image encryption using SHA-256 hash and multiple chaotic maps. Multimedia Tools and Applications 75(18):11241\u201311266","journal-title":"Multimedia Tools and Applications"},{"issue":"16-17","key":"9695_CR23","doi-asserted-by":"crossref","first-page":"3895","DOI":"10.1016\/j.optcom.2011.04.001","volume":"284","author":"H Liu","year":"2011","unstructured":"Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284(16-17):3895\u20133903","journal-title":"Opt Commun"},{"issue":"18","key":"9695_CR24","doi-asserted-by":"crossref","first-page":"3527","DOI":"10.1016\/j.ijleo.2012.10.068","volume":"124","author":"H Liu","year":"2013","unstructured":"Liu H, Wang X, Kadir A (2013) Color image encryption using Choquet fuzzy integral and hyper chaotic system. Optik-International Journal for Light and Electron Optics 124(18):3527\u20133533","journal-title":"Optik-International Journal for Light and Electron Optics"},{"issue":"1","key":"9695_CR25","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1007\/s11071-011-0006-6","volume":"67","author":"O Mirzaei","year":"2012","unstructured":"Mirzaei O, Yaghoobi M, Irani H (2012) A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dynamics 67 (1):557\u2013566","journal-title":"Nonlinear Dynamics"},{"key":"9695_CR26","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1016\/j.optlaseng.2016.10.019","volume":"90","author":"AY Niyat","year":"2017","unstructured":"Niyat AY, Moattar MH, Torshiz MN (2017) Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt Lasers Eng 90:225\u2013237","journal-title":"Opt Lasers Eng"},{"issue":"2","key":"9695_CR27","doi-asserted-by":"crossref","first-page":"995","DOI":"10.1007\/s11071-014-1492-0","volume":"78","author":"B Norouzi","year":"2014","unstructured":"Norouzi B, Mirzakuchaki S (2014) A fast color image encryption algorithm based on hyper-chaotic systems. Nonlinear Dynamics 78(2):995\u20131015","journal-title":"Nonlinear Dynamics"},{"issue":"13","key":"9695_CR28","doi-asserted-by":"crossref","first-page":"5190","DOI":"10.1016\/j.ijleo.2016.03.018","volume":"127","author":"F \u00d6zkaynak","year":"2016","unstructured":"\u00d6zkaynak F, \u00d6zer AB (2016) Cryptanalysis of a new image encryption algorithm based on chaos. Optik 127(13):5190\u20135192","journal-title":"Optik"},{"issue":"09","key":"9695_CR29","doi-asserted-by":"crossref","first-page":"1450107","DOI":"10.1142\/S0218127414501077","volume":"24","author":"\u0130 \u00d6zt\u00fcrk","year":"2014","unstructured":"\u00d6zt\u00fcrk \u0130, Kili\u00e7 R (2014) Cycle lengths and correlation properties of finite precision chaotic maps. International Journal of Bifurcation and Chaos 24 (09):1450107","journal-title":"International Journal of Bifurcation and Chaos"},{"issue":"11","key":"9695_CR30","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1007\/s10916-016-0611-5","volume":"40","author":"MM Parvees","year":"2016","unstructured":"Parvees MM, Samath JA, Bose BP (2016) Secured medical images-a chaotic pixel scrambling approach. J Med Syst 40(11):232","journal-title":"J Med Syst"},{"issue":"17","key":"9695_CR31","doi-asserted-by":"crossref","first-page":"10631","DOI":"10.1007\/s11042-014-2115-y","volume":"75","author":"Z Parvin","year":"2016","unstructured":"Parvin Z, Seyedarabi H, Shamsi M (2016) A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimedia Tools and Applications 75(17):10631\u2013 10648","journal-title":"Multimedia Tools and Applications"},{"issue":"4","key":"9695_CR32","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication theory of secrecy systems. Bell System Technical Journal 28(4):656\u2013715","journal-title":"Bell System Technical Journal"},{"issue":"18","key":"9695_CR33","doi-asserted-by":"crossref","first-page":"3329","DOI":"10.1016\/j.ijleo.2012.11.002","volume":"124","author":"CY Song","year":"2013","unstructured":"Song CY, Qiao YL, Zhang XZ (2013) An image encryption scheme based on new spatiotemporal chaos. Optik-International Journal for Light and Electron Optics 124(18):3329\u20133334","journal-title":"Optik-International Journal for Light and Electron Optics"},{"key":"9695_CR34","doi-asserted-by":"crossref","first-page":"28539","DOI":"10.1109\/ACCESS.2019.2901870","volume":"7","author":"S Sun","year":"2019","unstructured":"Sun S, Guo Y, Wu R (2019) A novel image encryption scheme based on 7D hyperchaotic system and row-column simultaneous swapping. IEEE Access 7:28539\u201328547","journal-title":"IEEE Access"},{"issue":"3","key":"9695_CR35","doi-asserted-by":"crossref","first-page":"775","DOI":"10.1007\/s11042-011-0775-4","volume":"59","author":"N Taneja","year":"2012","unstructured":"Taneja N, Raman B, Gupta I (2012) Combinational domain encryption for still visual data. Multimedia Tools and Applications 59(3):775\u2013793","journal-title":"Multimedia Tools and Applications"},{"issue":"2","key":"9695_CR36","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1016\/j.jss.2011.08.017","volume":"85","author":"X Wei","year":"2012","unstructured":"Wei X, Guo L, Zhang Q, Zhang J, Lian S (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw 85(2):290\u2013299","journal-title":"J Syst Softw"},{"issue":"5","key":"9695_CR37","doi-asserted-by":"crossref","first-page":"2652","DOI":"10.1016\/j.chaos.2008.09.047","volume":"41","author":"KW Wong","year":"2009","unstructured":"Wong KW, Kwok BSH, Yuen CH (2009) An efficient diffusion approach for chaos-based image encryption. Chaos Solitons & Fractals 41(5):2652\u20132663","journal-title":"Chaos Solitons & Fractals"},{"key":"9695_CR38","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1016\/j.sigpro.2017.06.014","volume":"142","author":"J Wu","year":"2018","unstructured":"Wu J, Liao X, Yang B (2018) Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation. Signal Process 142:292\u2013300","journal-title":"Signal Process"},{"issue":"22","key":"9695_CR39","doi-asserted-by":"crossref","first-page":"31035","DOI":"10.1007\/s11042-018-7081-3","volume":"78","author":"Z Xiong","year":"2019","unstructured":"Xiong Z, Wu Y, Ye C, Zhang X, Xu F (2019) Color image chaos encryption algorithm combining CRC and nine palace map. Multimedia Tools and Applications 78(22):31035\u201331055","journal-title":"Multimedia Tools and Applications"},{"key":"9695_CR40","doi-asserted-by":"crossref","unstructured":"Xiong Z, Wu Y, Ye C, Zhang X, Xu F (2019) Color image chaos encryption algorithm combining CRC and nine palace map. Multimedia Tools and Applications, pp 1\u201321","DOI":"10.1007\/s11042-018-7081-3"},{"key":"9695_CR41","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.optlaseng.2015.09.007","volume":"78","author":"L Xu","year":"2016","unstructured":"Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17\u201325","journal-title":"Opt Lasers Eng"},{"key":"9695_CR42","doi-asserted-by":"crossref","unstructured":"Ye R, Xi Y, Ma Y (2016) A chaotic image encryption scheme using swapping based confusion approach. In: 2016 First IEEE international conference on computer communication and the internet (ICCCI), IEEE, pp 374-377","DOI":"10.1109\/CCI.2016.7778946"},{"issue":"3","key":"9695_CR43","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1016\/j.aeue.2013.08.007","volume":"68","author":"Q Zhang","year":"2014","unstructured":"Zhang Q, Liu L, Wei X (2014) Improved algorithm for image encryption based on DNA encoding and multi-chaotic maps. AEU-International Journal of Electronics and Communications 68(3):186\u2013192","journal-title":"AEU-International Journal of Electronics and Communications"},{"key":"9695_CR44","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/j.ins.2014.02.156","volume":"273","author":"YQ Zhang","year":"2014","unstructured":"Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear\u2013nonlinear coupled map lattice. Inf Sci 273:329\u2013351","journal-title":"Inf Sci"},{"issue":"3","key":"9695_CR45","doi-asserted-by":"crossref","first-page":"584","DOI":"10.1016\/j.cnsns.2012.08.010","volume":"18","author":"W Zhang","year":"2013","unstructured":"Zhang W, Wong KW, Yu H, Zhu ZL (2013) A symmetric color image encryption algorithm using the intrinsic features of bit distributions. Commun Nonlinear Sci Numer Simul 18(3):584\u2013600","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"9695_CR46","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.sigpro.2015.06.008","volume":"118","author":"W Zhang","year":"2016","unstructured":"Zhang W, Yu H, Zhao YL, Zhu ZL (2016) Image encryption based on three-dimensional bit matrix permutation. Signal Process 118:36\u201350","journal-title":"Signal Process"},{"issue":"11","key":"9695_CR47","doi-asserted-by":"crossref","first-page":"6303","DOI":"10.1007\/s11042-015-2573-x","volume":"75","author":"P Zhen","year":"2016","unstructured":"Zhen P, Zhao G, Min L, Jin X (2016) Chaos-based image encryption scheme combining DNA coding and entropy. Multimedia Tools and Applications 75(11):6303\u20136319","journal-title":"Multimedia Tools and Applications"},{"key":"9695_CR48","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1016\/j.neucom.2014.11.095","volume":"169","author":"G Zhou","year":"2015","unstructured":"Zhou G, Zhang D, Liu Y, Yuan Y, Liu Q (2015) A novel image encryption algorithm based on chaos and Line map. Neurocomputing 169:150\u2013157","journal-title":"Neurocomputing"},{"issue":"1","key":"9695_CR49","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.optcom.2011.08.079","volume":"285","author":"C Zhu","year":"2012","unstructured":"Zhu C (2012) A novel image encryption scheme based on improved hyperchaotic sequences. Opt Commun 285(1):29\u201337","journal-title":"Opt Commun"},{"issue":"6","key":"9695_CR50","doi-asserted-by":"crossref","first-page":"1171","DOI":"10.1016\/j.ins.2010.11.009","volume":"181","author":"ZL Zhu","year":"2011","unstructured":"Zhu ZL, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181(6):1171\u20131186","journal-title":"Inf Sci"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09695-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09695-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09695-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,5]],"date-time":"2021-09-05T23:12:39Z","timestamp":1630883559000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09695-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,6]]},"references-count":50,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["9695"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09695-8","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,6]]},"assertion":[{"value":"7 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 August 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 September 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of interests"}}]}}