{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T06:36:49Z","timestamp":1771655809157,"version":"3.50.1"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T00:00:00Z","timestamp":1604534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T00:00:00Z","timestamp":1604534400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s11042-020-10117-y","type":"journal-article","created":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T18:03:04Z","timestamp":1604599384000},"page":"8721-8758","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["A novel 1D chaotic system for image encryption, authentication and compression in cloud"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9702-824X","authenticated-orcid":false,"given":"Hengjian","family":"Li","sequence":"first","affiliation":[]},{"given":"Changzhi","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Xiyu","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,5]]},"reference":[{"key":"10117_CR1","doi-asserted-by":"crossref","unstructured":"Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurc Chaos 16(08):2129\u20132151","DOI":"10.1142\/S0218127406015970"},{"issue":"5","key":"10117_CR2","doi-asserted-by":"crossref","first-page":"1358","DOI":"10.1016\/j.sigpro.2012.11.019","volume":"93","author":"D Arroyo","year":"2013","unstructured":"Arroyo D, Diaz J, Rodriguez FB (2013) Cryptanalysis of a one round chaos-based substitution permutation network. Signal Process 93(5):1358\u20131364","journal-title":"Signal Process"},{"key":"10117_CR3","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/s12532-013-0056-5","volume":"5","author":"JD Blanchard","year":"2013","unstructured":"Blanchard JD, Tanner J (2013) GPU accelerated greedy algorithms for compressed sensing. Math Prog Comp 5:267\u2013304. https:\/\/doi.org\/10.1007\/s12532-013-0056-5","journal-title":"Math Prog Comp"},{"issue":"2","key":"10117_CR4","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/MSP.2007.914731","volume":"25","author":"EJ Candes","year":"2008","unstructured":"Candes EJ, Wakin MB (2008) An introduction to compressive sampling. IEEE Signal Process Mag 25(2):21\u201330","journal-title":"IEEE Signal Process Mag"},{"key":"10117_CR5","doi-asserted-by":"crossref","first-page":"107684","DOI":"10.1016\/j.sigpro.2020.107684","volume":"176","author":"X Chai","year":"2020","unstructured":"Chai X, Bi J et al (2020) Color image compression and encryption scheme based on compressive sensing and double random encryption strategy. Signal Process 176:107684\u2013107701","journal-title":"Signal Process"},{"key":"10117_CR6","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.sigpro.2018.02.007","volume":"148","author":"X Chai","year":"2018","unstructured":"Chai X, Zheng X, Gan Z (2018) An image encryption algorithm based on chaotic system and compressive sensing. Signal Process 148:124\u2013144","journal-title":"Signal Process"},{"key":"10117_CR7","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1016\/j.optlastec.2017.09.008","volume":"99","author":"J Chen","year":"2018","unstructured":"Chen J, Zhang Y, Qi L et al (2018) Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression. Opt Laser Technol 99:238\u2013248","journal-title":"Opt Laser Technol"},{"key":"10117_CR8","doi-asserted-by":"crossref","first-page":"19229","DOI":"10.1007\/s11042-019-7256-6","volume":"78","author":"SM Darwish","year":"2019","unstructured":"Darwish SM (2019) A modified image selective encryption-compression technique based on 3D chaotic maps and arithmetic coding. Multimed Tools Appl 78:19229\u201319252","journal-title":"Multimed Tools Appl"},{"issue":"20","key":"10117_CR9","doi-asserted-by":"crossref","first-page":"4539","DOI":"10.1364\/AO.53.004539","volume":"53","author":"B Deepan","year":"2014","unstructured":"Deepan B, Quan C, Wang Y, Tay CJ (2014) Multiple-image encryption by space multiplexing based on compressive sensing and the double-random phase-encoding technique. Appl Opt 53(20):4539\u20134547","journal-title":"Appl Opt"},{"key":"10117_CR10","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1016\/j.sigpro.2018.12.007","volume":"157","author":"Q Deng","year":"2019","unstructured":"Deng Q, Zeng H, Zhang J, Tian S, Cao J, Li Z, Liu A (2019) Compressed sensing for image reconstruction via back-off and rectification of greedy algorithm. Signal Process 157:280\u2013287","journal-title":"Signal Process"},{"issue":"4","key":"10117_CR11","doi-asserted-by":"crossref","first-page":"1289","DOI":"10.1109\/TIT.2006.871582","volume":"52","author":"DL Donoho","year":"2006","unstructured":"Donoho DL (2006) Compressed sensing. IEEE Trans Inf Theory 52(4):1289\u20131306","journal-title":"IEEE Trans Inf Theory"},{"issue":"6","key":"10117_CR12","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcation and Chaos 8(6):1259\u20131284","journal-title":"Int J Bifurcation and Chaos"},{"issue":"99","key":"10117_CR13","doi-asserted-by":"crossref","first-page":"4587","DOI":"10.1109\/ACCESS.2017.2780323","volume":"6","author":"H Gan","year":"2018","unstructured":"Gan H, Xiao S, Zhao Y (2018) A novel secure data transmission scheme using chaotic compressed sensing. IEEE Access 6(99):4587\u20134598","journal-title":"IEEE Access"},{"key":"10117_CR14","unstructured":"Gao H, Zhang Y, Liang S, Li D (2006). A new chaotic algorithm for image encryption. Chaos, Solitons Fractals 29(2):393\u2013399."},{"key":"10117_CR15","doi-asserted-by":"crossref","unstructured":"Guiqiang H, Xiao D, Zhang Y et al (2017) A compressive sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud. Inf Sci 387:132\u2013145","DOI":"10.1016\/j.ins.2016.09.045"},{"key":"10117_CR16","doi-asserted-by":"crossref","first-page":"105837","DOI":"10.1016\/j.optlaseng.2019.105837","volume":"124","author":"X Hai","year":"2020","unstructured":"Hai X, Wu H et al (2020) An efficient visually meaningful image compression and encryption scheme based on compressive sensing and dynamic LSB embedding. Opt Lasers Eng 124:105837\u2013105855","journal-title":"Opt Lasers Eng"},{"key":"10117_CR17","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1016\/j.image.2016.12.010","volume":"52","author":"SR Islam","year":"2017","unstructured":"Islam SR, Maity SP, Ray AK (2017) Optimal combining fusion on degraded compressed sensing image reconstruction. Signal Process Image Commun 52:173\u2013182","journal-title":"Signal Process Image Commun"},{"key":"10117_CR18","doi-asserted-by":"crossref","unstructured":"Itani W, Kayssi A, Chehab A (2009) Privacy as a service: privacy-aware data storage and processing in cloud computing architectures. In: 8th IEEE international conference on dependable, autonomic and secure computing, 12\u201314 Dec. 2009 in Chengdu, China, pp 711\u2013716","DOI":"10.1109\/DASC.2009.139"},{"key":"10117_CR19","first-page":"865","volume":"10033","author":"MFF Khan","year":"2016","unstructured":"Khan MFF, Sakamura K (2016) A discretionary delegation framework for access control systems. In: OTM 2016 conferences. LNCS 10033:865\u2013882","journal-title":"LNCS"},{"issue":"7","key":"10117_CR20","doi-asserted-by":"crossref","first-page":"1408","DOI":"10.1016\/j.patcog.2009.01.018","volume":"42","author":"A Kong","year":"2009","unstructured":"Kong A, Zhang D, Kamel M (2009) A survey of palmprint recognition. Pattern Recogn 42(7):1408\u20131418","journal-title":"Pattern Recogn"},{"issue":"9","key":"10117_CR21","doi-asserted-by":"crossref","first-page":"1371","DOI":"10.1016\/j.imavis.2008.12.008","volume":"27","author":"C Li","year":"2009","unstructured":"Li C, Li S, Asim M (2009) On the security defects of an image encryption scheme. Image Vis Comput 27(9):1371\u20131381","journal-title":"Image Vis Comput"},{"issue":"3","key":"10117_CR22","doi-asserted-by":"crossref","first-page":"2331","DOI":"10.1007\/s11042-012-1240-8","volume":"70","author":"H Li","year":"2014","unstructured":"Li H, Zhang J, Wang L (2014) Robust palmprint identification based on directional representations and compressed sensing. Multimed Tools Appl 70(3):2331\u20132345","journal-title":"Multimed Tools Appl"},{"issue":"24","key":"10117_CR23","doi-asserted-by":"crossref","first-page":"6590","DOI":"10.1016\/j.ijleo.2013.05.092","volume":"124","author":"X Liu","year":"2013","unstructured":"Liu X, Cao Y, Lu P, Lu X, Li Y (2013) Optical image encryption technique based on compressed sensing and Arnold transformation. Opt Int J Light Electron Optics 124(24):6590\u20136593","journal-title":"Opt Int J Light Electron Optics"},{"key":"10117_CR24","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1109\/ACCESS.2017.2765317","volume":"6","author":"A Liu","year":"2018","unstructured":"Liu A, Wang W (2018) A privacy-preserving framework for trust-oriented point-ofinterest recommendation. IEEE Access 6:393\u2013404","journal-title":"IEEE Access"},{"issue":"20","key":"10117_CR25","doi-asserted-by":"crossref","first-page":"2663","DOI":"10.1016\/j.ijleo.2015.06.079","volume":"126","author":"H Liu","year":"2015","unstructured":"Liu H, Xiao D, Liu Y, Zhang Y (2015) Securely compressive sensing using double random phase encoding. Opt Int J Light Electron Optics 126(20):2663\u20132670","journal-title":"Opt Int J Light Electron Optics"},{"issue":"2","key":"10117_CR26","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1175\/1520-0469(1963)020<0130:DNF>2.0.CO;2","volume":"20","author":"EN Lorenz","year":"1963","unstructured":"Lorenz EN (1963) Deterministic nonperiodic flow. J Atmos Sci 20(2):130\u2013141","journal-title":"J Atmos Sci"},{"issue":"16","key":"10117_CR27","doi-asserted-by":"crossref","first-page":"2514","DOI":"10.1016\/j.ijleo.2012.08.017","volume":"124","author":"P Lu","year":"2013","unstructured":"Lu P, Xu Z, Lu X, Liu X (2013) Digital image information encryption based on compressive sensing and double random-phase encoding technique. Opt Int J Light Electron Optics 124(16):2514\u20132518","journal-title":"Opt Int J Light Electron Optics"},{"key":"10117_CR28","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1016\/j.jnca.2017.02.001","volume":"84","author":"B Muhammad","year":"2017","unstructured":"Muhammad B, Kalam Azad MA, Athanasios V (2017) Security and privacy challenges in mobile cloud computing: survey and way ahead. J Netw Comput 84:38\u201354","journal-title":"J Netw Comput"},{"key":"10117_CR29","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1016\/j.acha.2008.07.002","volume":"26","author":"D Needell","year":"2009","unstructured":"Needell D, Tropp JA (2009) CoSaMP: iterative signal recovery from incomplete and inaccurate samples. Appl Comput Harmon Anal 26:301\u2013321","journal-title":"Appl Comput Harmon Anal"},{"key":"10117_CR30","doi-asserted-by":"crossref","first-page":"2670","DOI":"10.1109\/ACCESS.2016.2570812","volume":"4","author":"AS Panah","year":"2016","unstructured":"Panah AS, Van SR, Sellis T (2016) On the properties of non-media digital watermarking: a review of state of the art techniques. IEEE Access 4:2670\u20132704","journal-title":"IEEE Access"},{"key":"10117_CR31","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1109\/TSUSC.2018.2817043","volume":"4","author":"K Psannis","year":"2019","unstructured":"Psannis K, Stergiou C et al (2019) Advanced media-based smart big data on intelligent cloud systems. IEEE Trans Sustain Comput 4:77\u201387","journal-title":"IEEE Trans Sustain Comput"},{"key":"10117_CR32","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1016\/j.optcom.2016.11.002","volume":"388","author":"SK Rajput","year":"2017","unstructured":"Rajput SK, Nishchal NK (2017) Optical double image security using random phase fractional Fourier domain encoding and phase-retrieval algorithm. Opt Commun 388:38\u201346","journal-title":"Opt Commun"},{"issue":"7","key":"10117_CR33","doi-asserted-by":"crossref","first-page":"1782","DOI":"10.1364\/AO.54.001782","volume":"54","author":"N Rawat","year":"2015","unstructured":"Rawat N, Kim B, Muniraj I et al (2015) Compressive sensing based robust multispectral double-image encryption. Appl Opt 54(7):1782\u20131793","journal-title":"Appl Opt"},{"key":"10117_CR34","first-page":"525","volume-title":"Secure machine learning scenario from big data in cloud computing via internet of things network, springer","author":"C Stergiou","year":"2019","unstructured":"Stergiou C, Plageras A et al (2019) Secure machine learning scenario from big data in cloud computing via internet of things network, springer. Handbook of Computer Networks and Cyber Security, Principles and Paradigms, Multimedia Systems and Applications, pp 525\u2013554"},{"key":"10117_CR35","doi-asserted-by":"crossref","unstructured":"Stergiou C, Psannis K (2017) Efficient and secure big data delivery in cloud computing Springer, Multimedia Tools and Applications 76:22803\u201322822","DOI":"10.1007\/s11042-017-4590-4"},{"issue":"1","key":"10117_CR36","first-page":"1","volume":"5","author":"C Stergiou","year":"2018","unstructured":"Stergiou C, Psannis K et al (2018) Algorithms for efficient digital media transmission over IoT and cloud networking. J Multimed Inf Syst 5(1):1\u201310","journal-title":"J Multimed Inf Syst"},{"issue":"3","key":"10117_CR37","doi-asserted-by":"crossref","first-page":"964","DOI":"10.1016\/j.future.2016.11.031","volume":"78","author":"C Stergiou","year":"2018","unstructured":"Stergiou C, Psannis K et al (2018) Secure integration of IoT and cloud computing. Futur Gener Comput Syst 78(3):964\u2013975","journal-title":"Futur Gener Comput Syst"},{"key":"10117_CR38","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1016\/j.optlaseng.2016.11.017","volume":"91","author":"L Sui","year":"2017","unstructured":"Sui L, Xu M, Tian A (2017) Optical noise-free image encryption based on quick response code and high dimension chaotic system in gyrator transform domain. Opt Lasers Eng 91:106\u2013114","journal-title":"Opt Lasers Eng"},{"key":"10117_CR39","doi-asserted-by":"crossref","first-page":"102642","DOI":"10.1016\/j.jnca.2020.102642","volume":"160","author":"P Sun","year":"2020","unstructured":"Sun P (2020) Security and privacy protection in cloud computing: discussions and challenges. J Netw Comput Appl 160:102642\u2013102663","journal-title":"J Netw Comput Appl"},{"issue":"4","key":"10117_CR40","doi-asserted-by":"crossref","first-page":"2333","DOI":"10.1007\/s11071-016-2648-x","volume":"84","author":"A Tong","year":"2016","unstructured":"Tong A, Zhang M, Wang Z, Ma J (2016) A joint color image encryption and compression scheme based on hyper-chaotic system. J Nonlinear Dyn 84(4):2333\u20132356","journal-title":"J Nonlinear Dyn"},{"key":"10117_CR41","doi-asserted-by":"crossref","first-page":"112713","DOI":"10.1109\/ACCESS.2019.2929205","volume":"7","author":"S Wang","year":"2019","unstructured":"Wang S, Wang X (2019) A secure cloud storage framework with access control based on blockchain. IEEE Access 7:112713\u2013112725","journal-title":"IEEE Access"},{"issue":"1","key":"10117_CR42","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1109\/TETC.2013.2273797","volume":"1","author":"C Wang","year":"2013","unstructured":"Wang C, Zhang B, Ren K, Roveda JM (2013) Privacy-assured outsourcing of image reconstruction service in cloud. IEEE Trans Emerg Top Comput 1(1):166\u2013177","journal-title":"IEEE Trans Emerg Top Comput"},{"issue":"2","key":"10117_CR43","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption, cyber journals: multidisciplinary journals in science and technology. J Select Areas Telecommunications (JSAT) 1(2):31\u201338","journal-title":"J Select Areas Telecommunications (JSAT)"},{"key":"10117_CR44","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.comcom.2018.01.001","volume":"117","author":"X Wu","year":"2018","unstructured":"Wu X, Tang S, Yang P, Xiang C, Zheng X (2018) Cloud is safe when compressive: efficient image privacy protection via shuffling enabled compressive sensing. Comput Commun 117:36\u201345","journal-title":"Comput Commun"},{"key":"10117_CR45","doi-asserted-by":"crossref","unstructured":"Xiao D, Li M et al (2020) Low-cost and high-efficiency privacy-protection scheme for distributed compressive video sensing in wireless multimedia sensor networks. J Netw Comput Appl 1611:102654\u2013102675","DOI":"10.1016\/j.jnca.2020.102654"},{"issue":"3","key":"10117_CR46","doi-asserted-by":"crossref","first-page":"1191","DOI":"10.1007\/s11045-017-0497-5","volume":"29","author":"L Xiong","year":"2018","unstructured":"Xiong L, Xu Z, Shi YQ (2018) An integer wavelet transform based scheme for reversible data hiding in encrypted images. Multidim Syst Sign Process 29(3):1191\u20131202","journal-title":"Multidim Syst Sign Process"},{"issue":"2","key":"10117_CR47","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1109\/TSMC.2016.2597291","volume":"48","author":"Y Xu","year":"2018","unstructured":"Xu Y, Fei L, Wen J, Zhang D (2018) Discriminative and robust competitive code for Palmprint recognition. IEEE trans. Syst Man Cybern Syst Hum Syst 48(2):232\u2013241","journal-title":"Syst Man Cybern Syst Hum Syst"},{"key":"10117_CR48","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.future.2014.06.004","volume":"43\u201344","author":"J Yang","year":"2015","unstructured":"Yang J, Li J (2015) A hybrid solution for privacy preserving medical data sharing in cloud environment. Futur Gener Comput Syst 43\u201344:74\u201386","journal-title":"Futur Gener Comput Syst"},{"key":"10117_CR49","first-page":"32","volume":"202","author":"R Ye","year":"2011","unstructured":"Ye R (2011) An image encryption scheme with efficient permutation and diffusion processes. Commun Comput Inf Sci 202:32\u201339","journal-title":"Commun Comput Inf Sci"},{"key":"10117_CR50","doi-asserted-by":"crossref","unstructured":"Yu C, Li H, Zhao Z (2017) A high and efficient sparse and compressed sensing-based security approach for biometric protection. In: International conference on intelligent computing pp 666\u2013677","DOI":"10.1007\/978-3-319-63312-1_59"},{"key":"10117_CR51","doi-asserted-by":"crossref","first-page":"2507","DOI":"10.1109\/ACCESS.2016.2569421","volume":"4","author":"Y Zhang","year":"2016","unstructured":"Zhang Y, Zhang LY, Zhou J (2016) A review of compressive sensing in information security field. IEEE Access 4:2507\u20132519","journal-title":"IEEE Access"},{"key":"10117_CR52","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","volume":"97","author":"Y Zhou","year":"2014","unstructured":"Zhou Y, Bao L, Chen CLP (2014) A new 1d chaotic system for image encryption. Signal Process 97:172\u2013182","journal-title":"Signal Process"},{"key":"10117_CR53","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.optcom.2014.12.084","volume":"343","author":"N Zhou","year":"2015","unstructured":"Zhou N, Li H, Wang D, Pan S, Zhou Z (2015) Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform. Opt Commun 343:10\u201321","journal-title":"Opt Commun"},{"issue":"10","key":"10117_CR54","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1016\/j.optlastec.2014.02.015","volume":"62","author":"N Zhou","year":"2014","unstructured":"Zhou N, Zhang A, Zheng F (2014) Novel image compression\u2013encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing. Opt Laser Technol 62(10):152\u2013160","journal-title":"Opt Laser Technol"},{"key":"10117_CR55","doi-asserted-by":"crossref","first-page":"20855","DOI":"10.1007\/s11042-019-7405-y","volume":"78","author":"S Zhu","year":"2019","unstructured":"Zhu S, Zhu C (2019) A new image compression-encryption scheme based on compressive sensing and cyclic shift. Multimed Tools Appl 78:20855\u201320875","journal-title":"Multimed Tools Appl"},{"key":"10117_CR56","doi-asserted-by":"crossref","unstructured":"Zhu L, Zhang C, Xu C et al (2018) An efficient and privacy-preserving biometric identification scheme in cloud computing. IEEE Access 6:19025\u201319033","DOI":"10.1109\/ACCESS.2018.2819166"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10117-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-020-10117-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10117-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T21:40:35Z","timestamp":1614634835000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-020-10117-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,5]]},"references-count":56,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["10117"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10117-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,5]]},"assertion":[{"value":"15 November 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 October 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 November 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}