{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T13:13:35Z","timestamp":1776086015217,"version":"3.50.1"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2020,11,3]],"date-time":"2020-11-03T00:00:00Z","timestamp":1604361600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,3]],"date-time":"2020-11-03T00:00:00Z","timestamp":1604361600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s11042-020-10035-z","type":"journal-article","created":{"date-parts":[[2020,11,3]],"date-time":"2020-11-03T09:10:40Z","timestamp":1604394640000},"page":"8423-8444","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":589,"title":["PSNR vs SSIM: imperceptibility quality assessment for image steganography"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6615-4457","authenticated-orcid":false,"given":"De Rosal Igantius Moses","family":"Setiadi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,3]]},"reference":[{"key":"10035_CR1","doi-asserted-by":"publisher","first-page":"17799","DOI":"10.1007\/s11042-019-7166-7","volume":"78","author":"AA Abdulla","year":"2019","unstructured":"Abdulla AA, Sellahewa H, Jassim SA (2019) Improving embedding efficiency for digital steganography by exploiting similarities between secret and container images. Multimed Tools Appl 78:17799\u201317823. https:\/\/doi.org\/10.1007\/s11042-019-7166-7","journal-title":"Multimed Tools Appl"},{"key":"10035_CR2","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.jksuci.2016.12.004","volume":"31","author":"J Abraham","year":"2019","unstructured":"Abraham J, Paul V (2019) An imperceptible spatial domain color image watermarking scheme. J King Saud Univ - Comput Inf Sci 31:125\u2013133. https:\/\/doi.org\/10.1016\/j.jksuci.2016.12.004","journal-title":"J King Saud Univ - Comput Inf Sci"},{"key":"10035_CR3","doi-asserted-by":"crossref","unstructured":"Aini DN, Setiadi DRIM, Putro SN, et al (2019) Survey of methods in the spatial domain image steganography based imperceptibility and payload capacity. In: proceedings - 2019 international seminar on application for Technology of Information and Communication: industry 4.0: retrospect, Prospect, and challenges, iSemantic 2019. Institute of Electrical and Electronics Engineers Inc., Semarang, pp 434\u2013439","DOI":"10.1109\/ISEMANTIC.2019.8884333"},{"key":"10035_CR4","doi-asserted-by":"publisher","unstructured":"Akbar JM, Setiadi DRIM (2019) Joint method using Akamatsu and discrete wavelet transform for image restoration. Appl Comput Inform https:\/\/doi.org\/10.1016\/J.ACI.2019.10.002, ahead-of-print","DOI":"10.1016\/J.ACI.2019.10.002"},{"key":"10035_CR5","first-page":"1486","volume-title":"Proceedings - international symposium on biomedical imaging","author":"H Al-Dmour","year":"2015","unstructured":"Al-Dmour H, Al-Ani A (2015) Quality optimized medical image steganography based on edge detection and hamming code. In: Proceedings - international symposium on biomedical imaging. IEEE Computer Society, New York, pp 1486\u20131489"},{"key":"10035_CR6","first-page":"713","volume-title":"Communications in Computer and Information Science","author":"I Aqeel","year":"2019","unstructured":"Aqeel I, Raheel M (2019) Digital image steganography by using a hash based LSB (3-2-3) technique. In: Communications in Computer and Information Science. Springer Verlag, Bahawalpur, pp 713\u2013724"},{"key":"10035_CR7","first-page":"674","volume-title":"Proceedings of the 2017 IEEE international conference on communication and signal processing, ICCSP 2017","author":"C Arun","year":"2018","unstructured":"Arun C, Murugan S (2018) Design of image steganography using LSB XOR substitution method. In: Proceedings of the 2017 IEEE international conference on communication and signal processing, ICCSP 2017. Institute of Electrical and Electronics Engineers Inc., Chennai, pp 674\u2013677"},{"key":"10035_CR8","doi-asserted-by":"crossref","unstructured":"Astuti YP, Setiadi DRIM, Rachmawanto EH, Sari CA (2018) Simple and secure image steganography using LSB and triple XOR operation on MSB. In: 2018 International conference on information and communications technology, ICOIACT 2018. Yogyakarta","DOI":"10.1109\/ICOIACT.2018.8350661"},{"key":"10035_CR9","volume-title":"The essential guide to image processing","author":"AC Bovik","year":"2009","unstructured":"Bovik AC (2009) The essential guide to image processing. Academic Press, Austin"},{"key":"10035_CR10","doi-asserted-by":"publisher","first-page":"1488","DOI":"10.1109\/TIP.2011.2173206","volume":"21","author":"D Brunet","year":"2012","unstructured":"Brunet D, Vrscay ER, Wang Z (2012) On the mathematical properties of the structural similarity index. IEEE Trans Image Process 21:1488\u20131495. https:\/\/doi.org\/10.1109\/TIP.2011.2173206","journal-title":"IEEE Trans Image Process"},{"key":"10035_CR11","doi-asserted-by":"publisher","first-page":"7973","DOI":"10.1007\/s11042-016-3449-4","volume":"76","author":"S Chakraborty","year":"2017","unstructured":"Chakraborty S, Jalal AS, Bhatnagar C (2017) LSB based non blind predictive edge adaptive image steganography. Multimed Tools Appl 76:7973\u20137987. https:\/\/doi.org\/10.1007\/s11042-016-3449-4","journal-title":"Multimed Tools Appl"},{"key":"10035_CR12","doi-asserted-by":"publisher","unstructured":"Chatterjee A, Ghosal SK, Sarkar R (2020) LSB based steganography with OCR: an intelligent amalgamation. Multimed tools Appl 1\u201319. https:\/\/doi.org\/10.1007\/s11042-019-08472-6","DOI":"10.1007\/s11042-019-08472-6"},{"key":"10035_CR13","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.sigpro.2009.08.010","volume":"90","author":"A Cheddad","year":"2010","unstructured":"Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90:727\u2013752","journal-title":"Signal Process"},{"key":"10035_CR14","first-page":"617","volume-title":"2019 IEEE 5th conference on knowledge based engineering and innovation, KBEI 2019","author":"A Darbani","year":"2019","unstructured":"Darbani A, Alyannezhadi MM, Forghani M (2019) A new steganography method for embedding message in JPEG images. In: 2019 IEEE 5th conference on knowledge based engineering and innovation, KBEI 2019. Institute of Electrical and Electronics Engineers Inc., Tehran, pp 617\u2013621"},{"key":"10035_CR15","doi-asserted-by":"publisher","first-page":"17333","DOI":"10.1007\/s11042-017-5308-3","volume":"77","author":"M Douglas","year":"2018","unstructured":"Douglas M, Bailey K, Leeney M, Curran K (2018) An overview of steganography techniques applied to the protection of biometric data. Multimed Tools Appl 77:17333\u201317373. https:\/\/doi.org\/10.1007\/s11042-017-5308-3","journal-title":"Multimed Tools Appl"},{"key":"10035_CR16","first-page":"125","volume-title":"3rd international conference on innovative applications of computational intelligence on power, energy and controls with their impact on humanity, CIPECH 2018","author":"R Grover","year":"2018","unstructured":"Grover R, Yadav DK, Chauhan DK, Kamya S (2018) Adaptive steganography via image complexity analysis using 3D color texture feature. In: 3rd international conference on innovative applications of computational intelligence on power, energy and controls with their impact on humanity, CIPECH 2018. Institute of Electrical and Electronics Engineers Inc., Ghaziabad, pp 125\u2013129"},{"key":"10035_CR17","first-page":"335","volume-title":"Proceedings - IEEE 2018 international conference on advances in computing, communication control and networking, ICACCCN 2018","author":"A Gupta","year":"2018","unstructured":"Gupta A, Ahuja S (2018) An improved image steganography technique using block division least significant bit approach. In: Proceedings - IEEE 2018 international conference on advances in computing, communication control and networking, ICACCCN 2018. Institute of Electrical and Electronics Engineers Inc., Greater Noida, pp 335\u2013339"},{"key":"10035_CR18","doi-asserted-by":"publisher","unstructured":"Gutub A, Al-Ghamdi M (2020) Hiding shares by multimedia image steganography for optimized counting-based secret sharing. Multimed Tools Appl 1\u201335. https:\/\/doi.org\/10.1007\/s11042-019-08427-x","DOI":"10.1007\/s11042-019-08427-x"},{"key":"10035_CR19","doi-asserted-by":"publisher","first-page":"2366","DOI":"10.1109\/ICPR.2010.579","volume-title":"2010 20th international conference on pattern recognition","author":"A Hore","year":"2010","unstructured":"Hore A, Ziou D (2010) Image quality metrics: PSNR vs. SSIM. In: 2010 20th international conference on pattern recognition. IEEE, Istanbul, pp 2366\u20132369"},{"key":"10035_CR20","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1049\/iet-ipr.2012.0489","volume":"7","author":"A Hor\u00e9","year":"2013","unstructured":"Hor\u00e9 A, Ziou D (2013) Is there a relationship between peak-signal-to-noise ratio and structural similarity index measure? IET Image Process 7:12\u201324. https:\/\/doi.org\/10.1049\/iet-ipr.2012.0489","journal-title":"IET Image Process"},{"key":"10035_CR21","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.image.2018.03.012","volume":"65","author":"M Hussain","year":"2018","unstructured":"Hussain M, Wahab AWA, Bin IYI et al (2018) Image steganography in spatial domain: a survey. Signal Process Image Commun 65:46\u201366. https:\/\/doi.org\/10.1016\/j.image.2018.03.012","journal-title":"Signal Process Image Commun"},{"key":"10035_CR22","first-page":"265","volume-title":"2016 6th international conference on innovative computing technology, INTECH 2016","author":"AU Islam","year":"2017","unstructured":"Islam AU, Khalid F, Shah M et al (2017) An improved image steganography technique based on MSB using bit differencing. In: 2016 6th international conference on innovative computing technology, INTECH 2016. Institute of Electrical and Electronics Engineers Inc., Dublin, pp 265\u2013269"},{"key":"10035_CR23","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1016\/j.neucom.2018.06.075","volume":"335","author":"IJ Kadhim","year":"2019","unstructured":"Kadhim IJ, Premaratne P, Vial PJ, Halloran B (2019) Comprehensive survey of image steganography: techniques, evaluations, and trends in future research. Neurocomputing 335:299\u2013326. https:\/\/doi.org\/10.1016\/j.neucom.2018.06.075","journal-title":"Neurocomputing"},{"key":"10035_CR24","doi-asserted-by":"publisher","first-page":"1496","DOI":"10.1109\/TIP.2017.2651374","volume":"26","author":"L Krasula","year":"2017","unstructured":"Krasula L, Le Callet P, Fliegel K, Klima M (2017) Quality assessment of sharpened images: challenges, methodology, and objective metrics. IEEE Trans Image Process 26:1496\u20131508. https:\/\/doi.org\/10.1109\/TIP.2017.2651374","journal-title":"IEEE Trans Image Process"},{"key":"10035_CR25","doi-asserted-by":"publisher","first-page":"9993","DOI":"10.1007\/s11042-016-3591-z","volume":"76","author":"CF Lee","year":"2017","unstructured":"Lee CF, Weng CY, Chen KC (2017) An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection. Multimed Tools Appl 76:9993\u201310016. https:\/\/doi.org\/10.1007\/s11042-016-3591-z","journal-title":"Multimed Tools Appl"},{"key":"10035_CR26","doi-asserted-by":"publisher","first-page":"2373","DOI":"10.1016\/J.CNSNS.2013.10.034","volume":"19","author":"X Li","year":"2014","unstructured":"Li X, Wang W, Wang W, Ding XL, Yin Q (2014) Optimal estimates of common remainder for the robust Chinese remainder theorem. Commun Nonlinear Sci Numer Simul 19:2373\u20132381. https:\/\/doi.org\/10.1016\/J.CNSNS.2013.10.034","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"10035_CR27","doi-asserted-by":"publisher","unstructured":"Liao X, Yin J, Chen M, Qin Z (2020) Adaptive payload distribution in multiple images steganography based on image texture features. IEEE trans dependable Secur Comput 1\u20131. https:\/\/doi.org\/10.1109\/tdsc.2020.3004708","DOI":"10.1109\/tdsc.2020.3004708"},{"key":"10035_CR28","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1109\/TCSVT.2019.2896270","volume":"30","author":"X Liao","year":"2020","unstructured":"Liao X, Yu Y, Li B, Li Z, Qin Z (2020) A new payload partition strategy in color image steganography. IEEE Trans Circuits Syst Video Technol 30:685\u2013696. https:\/\/doi.org\/10.1109\/TCSVT.2019.2896270","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"10035_CR29","doi-asserted-by":"publisher","first-page":"5462","DOI":"10.1109\/TIP.2017.2735192","volume":"26","author":"X Min","year":"2017","unstructured":"Min X, Ma K, Gu K, Zhai G, Wang Z, Lin W (2017) Unified blind quality assessment of compressed natural, graphic, and screen content images. IEEE Trans Image Process 26:5462\u20135474. https:\/\/doi.org\/10.1109\/TIP.2017.2735192","journal-title":"IEEE Trans Image Process"},{"key":"10035_CR30","doi-asserted-by":"publisher","first-page":"8597","DOI":"10.1007\/s11042-016-3383-5","volume":"76","author":"K Muhammad","year":"2017","unstructured":"Muhammad K, Ahmad J, Rehman NU, Jan Z, Sajjad M (2017) CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method. Multimed Tools Appl 76:8597\u20138626. https:\/\/doi.org\/10.1007\/s11042-016-3383-5","journal-title":"Multimed Tools Appl"},{"key":"10035_CR31","doi-asserted-by":"publisher","first-page":"16363","DOI":"10.1007\/s11042-018-6975-4","volume":"78","author":"S Mukherjee","year":"2019","unstructured":"Mukherjee S, Sanyal G (2019) Edge based image steganography with variable threshold. Multimed Tools Appl 78:16363\u201316388. https:\/\/doi.org\/10.1007\/s11042-018-6975-4","journal-title":"Multimed Tools Appl"},{"key":"10035_CR32","doi-asserted-by":"publisher","first-page":"1409","DOI":"10.1007\/s11042-019-08103-0","volume":"79","author":"C Pak","year":"2020","unstructured":"Pak C, Kim J, An K, Kim C, Kim K, Pak C (2020) A novel color image LSB steganography using improved 1D chaotic map. Multimed Tools Appl 79:1409\u20131425. https:\/\/doi.org\/10.1007\/s11042-019-08103-0","journal-title":"Multimed Tools Appl"},{"key":"10035_CR33","doi-asserted-by":"crossref","unstructured":"Patel N, Meena S (2017) LSB based image steganography using dynamic key cryptography. In: 2016 International conference on emerging trends in communication technologies, ETCT 2016. Institute of Electrical and Electronics Engineers Inc., Dehradun","DOI":"10.1109\/ETCT.2016.7882955"},{"key":"10035_CR34","doi-asserted-by":"crossref","unstructured":"Rashid RD, Majeed TF (2019) Edge based image steganography: Problems and solution. In: 2019 3rd international conference on communications, signal processing, and their applications, ICCSPA 2019. Institute of Electrical and Electronics Engineers Inc., Sharjah","DOI":"10.1109\/ICCSPA.2019.8713712"},{"key":"10035_CR35","doi-asserted-by":"publisher","first-page":"3378","DOI":"10.1109\/TIP.2012.2197011","volume":"21","author":"A Rehman","year":"2012","unstructured":"Rehman A, Wang Z (2012) Reduced-reference image quality assessment by structural similarity estimation. IEEE Trans Image Process 21:3378\u20133389. https:\/\/doi.org\/10.1109\/TIP.2012.2197011","journal-title":"IEEE Trans Image Process"},{"key":"10035_CR36","doi-asserted-by":"publisher","first-page":"295","DOI":"10.24425\/ijet.2019.126313","volume":"65","author":"DRIM Setiadi","year":"2019","unstructured":"Setiadi DRIM (2019) Payload enhancement on least significant bit image steganography using edge area dilation. Intl J Electron Telecommun 65:295\u2013300. https:\/\/doi.org\/10.24425\/ijet.2019.126313","journal-title":"Intl J Electron Telecommun"},{"key":"10035_CR37","doi-asserted-by":"publisher","unstructured":"Setiadi DRIM (2019) Improved payload capacity in LSB image steganography uses dilated hybrid edge detection. J King Saud Univ - Comput Inf Sci https:\/\/doi.org\/10.1016\/j.jksuci.2019.12.007","DOI":"10.1016\/j.jksuci.2019.12.007"},{"key":"10035_CR38","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1109\/ICOIACT.2018.8350670","volume-title":"2018 international conference on information and communications technology (ICOIACT)","author":"DRIM Setiadi","year":"2018","unstructured":"Setiadi DRIM, Santoso HA, Rachmawanto EH, Sari CA (2018) An improved message capacity and security using divide and modulus function in spatial domain steganography. In: 2018 international conference on information and communications technology (ICOIACT). IEEE, Yogyakarta, pp 186\u2013190"},{"key":"10035_CR39","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1109\/TIP.2005.859378","volume":"15","author":"HR Sheikh","year":"2006","unstructured":"Sheikh HR, Bovik AC (2006) Image information and visual quality. IEEE Trans Image Process 15:430\u2013444. https:\/\/doi.org\/10.1109\/TIP.2005.859378","journal-title":"IEEE Trans Image Process"},{"key":"10035_CR40","doi-asserted-by":"publisher","unstructured":"Shukla AK, Pandey RK, Reddy PK (2020) Generalized fractional derivative based adaptive algorithm for image denoising. Multimed tools Appl 1\u201324. https:\/\/doi.org\/10.1007\/s11042-020-08641-y","DOI":"10.1007\/s11042-020-08641-y"},{"key":"10035_CR41","doi-asserted-by":"crossref","unstructured":"Singh A, Singh H (2015) An improved LSB based image steganography technique for RGB images. In: Proceedings of 2015 IEEE international conference on electrical, computer and communication technologies, ICECCT 2015. Institute of Electrical and Electronics Engineers Inc., Coimbatore","DOI":"10.1109\/ICECCT.2015.7226122"},{"key":"10035_CR42","doi-asserted-by":"crossref","unstructured":"Solomon C, Breckon T (2011) Fundamentals of digital image processing","DOI":"10.1002\/9780470689776"},{"key":"10035_CR43","doi-asserted-by":"publisher","unstructured":"Subhedar MS, Mankar VH (2019) Secure image steganography using framelet transform and bidiagonal SVD. Multimed tools Appl 1\u201322. https:\/\/doi.org\/10.1007\/s11042-019-08221-9","DOI":"10.1007\/s11042-019-08221-9"},{"key":"10035_CR44","doi-asserted-by":"crossref","unstructured":"Subong RA, Fajardo AC, Kim YJ (2018) LSB Rotation and Inversion Scoring Approach to Image Steganography. In: Proceeding of 2018 15th international joint conference on computer science and software engineering, JCSSE 2018. Institute of Electrical and Electronics Engineers Inc., Nakhonpathom","DOI":"10.1109\/JCSSE.2018.8457333"},{"key":"10035_CR45","unstructured":"Sudibyo U, Eranisa F, Rachmawanto EH, et al (2018) A secure image watermarking using Chinese remainder theorem based on haar wavelet transform. In: proceedings - 2017 4th international conference on information technology, computer, and electrical engineering, ICITACEE 2017"},{"key":"10035_CR46","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/978-981-10-6113-4_14","volume-title":"Digital Image Processing","author":"D Sundararajan","year":"2017","unstructured":"Sundararajan D (2017) Color image processing. In: Digital Image Processing. Springer Singapore, Singapore, pp 407\u2013438"},{"key":"10035_CR47","doi-asserted-by":"publisher","first-page":"4447","DOI":"10.1109\/TIP.2013.2273671","volume":"22","author":"HL Tan","year":"2013","unstructured":"Tan HL, Li Z, Tan YH et al (2013) A perceptually relevant mse-based image quality metric. IEEE Trans Image Process 22:4447\u20134459. https:\/\/doi.org\/10.1109\/TIP.2013.2273671","journal-title":"IEEE Trans Image Process"},{"key":"10035_CR48","doi-asserted-by":"publisher","unstructured":"Verma V, Muttoo SK, Singh VB (2019) Enhanced payload and trade-off for image steganography via a novel pixel digits alteration. Multimed tools Appl 1\u201320. https:\/\/doi.org\/10.1007\/s11042-019-08283-9","DOI":"10.1007\/s11042-019-08283-9"},{"key":"10035_CR49","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1007\/s11042-019-08065-3","volume":"79","author":"W Wang","year":"2020","unstructured":"Wang W (2020) An efficient multiple-bit reversible data hiding scheme without shifting. Multimed Tools Appl 79:555\u2013579. https:\/\/doi.org\/10.1007\/s11042-019-08065-3","journal-title":"Multimed Tools Appl"},{"key":"10035_CR50","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1109\/MSP.2008.930649","volume":"26","author":"Z Wang","year":"2009","unstructured":"Wang Z, Bovik AC (2009) Mean squared error: lot it or leave it? A new look at signal fidelity measures. IEEE Signal Process Mag 26:98\u2013117. https:\/\/doi.org\/10.1109\/MSP.2008.930649","journal-title":"IEEE Signal Process Mag"},{"key":"10035_CR51","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13:600\u2013612. https:\/\/doi.org\/10.1109\/TIP.2003.819861","journal-title":"IEEE Trans Image Process"},{"key":"10035_CR52","doi-asserted-by":"publisher","first-page":"1613","DOI":"10.1016\/S0167-8655(02)00402-6","volume":"24","author":"D-C Wu","year":"2003","unstructured":"Wu D-C, Tsai W-H (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24:1613\u20131626. https:\/\/doi.org\/10.1016\/S0167-8655(02)00402-6","journal-title":"Pattern Recogn Lett"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10035-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-020-10035-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10035-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T21:30:11Z","timestamp":1614634211000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-020-10035-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,3]]},"references-count":52,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["10035"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10035-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,3]]},"assertion":[{"value":"15 May 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 October 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 November 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}