{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:54:59Z","timestamp":1762005299983,"version":"3.37.3"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2021,1,21]],"date-time":"2021-01-21T00:00:00Z","timestamp":1611187200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,21]],"date-time":"2021-01-21T00:00:00Z","timestamp":1611187200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11042-021-10514-x","type":"journal-article","created":{"date-parts":[[2021,1,21]],"date-time":"2021-01-21T02:02:56Z","timestamp":1611194576000},"page":"14123-14136","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A multi-layered \u201cplus-minus one\u201d reversible data embedding scheme"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4451-1844","authenticated-orcid":false,"given":"R.","family":"Geetha","sequence":"first","affiliation":[]},{"given":"S.","family":"Geetha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,21]]},"reference":[{"key":"10514_CR1","doi-asserted-by":"crossref","unstructured":"Abadi MAM, Danyali H, Helfroush MS (2010) Reversible watermarking based on interpolation error histogram shifting. 5th International Symposium on Telecommunications (IST), Kish Island, Iran, pp 840\u2013845","DOI":"10.1109\/ISTEL.2010.5734139"},{"key":"10514_CR2","doi-asserted-by":"publisher","unstructured":"Abdulla AA, Jassim SA, Sellahewa H (2013) Secure Steganography Technique Based on Bitplane Indexes, vol 2013. IEEE International symposium on multimedia, Anaheim, pp 287\u2013291. https:\/\/doi.org\/10.1109\/ISM.2013.55","DOI":"10.1109\/ISM.2013.55"},{"key":"10514_CR3","unstructured":"Abdulla AA, Sellahewa H, Jassim SA (2014) Steganography based on pixel intensity value decomposition. Proc. SPIE 9120, Mobile Multimedia\/ Image Processing, Security, and Applications 2014, 912005. 10.1117 \/12.2050518"},{"key":"10514_CR4","doi-asserted-by":"publisher","first-page":"17799","DOI":"10.1007\/s11042-019-7166-7","volume":"78","author":"AA Abdulla","year":"2019","unstructured":"Abdulla AA, Sellahewa H, Jassim SA (2019) Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images. Multimed Tools Appl 78:17799\u201317823. https:\/\/doi.org\/10.1007\/s11042-019-7166-7","journal-title":"Multimed Tools Appl"},{"key":"10514_CR5","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1016\/j.jss.2011.11.005","volume":"85","author":"M Arsalan","year":"2012","unstructured":"Arsalan M, Sana AM, Asifullah K (2012) Intelli-gent reversible watermarking in integer wavelet domain for medical im-ages. J Syst Software Elsevier 85:883\u2013894","journal-title":"J Syst Software Elsevier"},{"key":"10514_CR6","doi-asserted-by":"publisher","first-page":"18451","DOI":"10.1007\/s11042-016-3930-0","volume":"76","author":"S Atawneh","year":"2017","unstructured":"Atawneh S, Almomani A, Al Bazar H et al (2017) Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain. Multimed Tools Appl 76:18451\u201318472. https:\/\/doi.org\/10.1007\/s11042-016-3930-0","journal-title":"Multimed Tools Appl"},{"key":"10514_CR7","doi-asserted-by":"crossref","unstructured":"Bao F, Deng R-H, Ooi B-C, Yang Y (2005) Tailored reversible watermarking schemes for authentication of electronic clinical atlas IEEE Trans Inf Technol Biomed 9(4):554\u2013563","DOI":"10.1109\/TITB.2005.855556"},{"key":"10514_CR8","unstructured":"Barton JM (1997) Method and apparatus for embedding authentication information within digital data, U.S. Patent 5,646,997"},{"key":"10514_CR9","doi-asserted-by":"publisher","unstructured":"Caldelli R, Filippini F, Becarelli R (2010) Reversible watermarking techniques: an overview and a classification. EURASIP J Inf Secur.\u00a0https:\/\/doi.org\/10.1155\/2010\/134546","DOI":"10.1155\/2010\/134546"},{"issue":"1","key":"10514_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.image.2010.11.001","volume":"26","author":"M Cancellaro","year":"2011","unstructured":"Cancellaro M, Battisti F, Carli M, Boato G, De Natale FGB, Neri A (2011) A commutative digital image watermarking and encryption method in the tree structured Haar transform domain. Signal Process, Image Commun 26(1):1\u201312","journal-title":"Signal Process, Image Commun"},{"issue":"2","key":"10514_CR11","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1109\/TIP.2004.840686","volume":"14","author":"MU Celik","year":"2005","unstructured":"Celik MU, Sharma G, Tekalp AM, Saber E (2005) Losslessgeneralized-LSB data embedding. IEEE Trans Image Process 14(2):253\u2013266","journal-title":"IEEE Trans Image Process"},{"key":"10514_CR12","doi-asserted-by":"publisher","unstructured":"Celik MU, Sharma G, Tekalp AM (2006) Lossless watermarking for image authentication: a new framework and an implementation. IEEE Trans. Image Process 15(4):1042\u20131049. https:\/\/doi.org\/10.1109\/TIP.2005.863053","DOI":"10.1109\/TIP.2005.863053"},{"issue":"2","key":"10514_CR13","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1109\/TITB.2008.2007199","volume":"13","author":"G Coatrieux","year":"2009","unstructured":"Coatrieux G, Le Guillou C, Cauvin J-M, Roux C (2009) Reversible watermarking for knowledge digest embedding an reliability control in medical images. IEEE Trans Inf Technol Biomed 13(2):158\u2013165","journal-title":"IEEE Trans Inf Technol Biomed"},{"issue":"3","key":"10514_CR14","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1109\/TIFS.2011.2145372","volume":"6","author":"D Coltuc","year":"2011","unstructured":"Coltuc D (2011) Improved embedding for prediction-based reversible watermarking. IEEE Trans Inf Forensic Secur 6(3):873\u2013882. https:\/\/doi.org\/10.1109\/TIFS.2011.2145372","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"10514_CR15","unstructured":"Coltuc D, Caciula I (2009) Stereo embedding by reversible watermarking:Further results. In Proc. Int Symp Signals Circuits Syst, pp 1\u20134"},{"issue":"4","key":"10514_CR16","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/LSP.2006.884895","volume":"14","author":"D Coltuc","year":"2007","unstructured":"Coltuc D, Chassery JM (2007) Very fast watermarking by reversible contrast mapping. IEEE Signal Process Lett 14(4):255\u2013258","journal-title":"IEEE Signal Process Lett"},{"key":"10514_CR17","volume-title":"Digital watermarking and steganography","author":"I Cox","year":"2007","unstructured":"Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography. Morgan Kaufmann, San Mateo"},{"key":"10514_CR18","doi-asserted-by":"crossref","unstructured":"Eswaraiah R, Sreenivasa Reddy E (2014) Medical image watermarking technique for accurate tamper detection in ROI and exact recovery of ROI. Int J Telemed Appl vol","DOI":"10.1109\/CSNT.2014.184"},{"issue":"7","key":"10514_CR19","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1587\/elex.4.205","volume":"4","author":"M Fallahpour","year":"2007","unstructured":"Fallahpour M, Sedaaghi MH (2007) High capacity lossless data hiding based on histogram modification. IEICE Electron Exp 4(7):205\u2013210","journal-title":"IEICE Electron Exp"},{"key":"10514_CR20","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139192903","volume-title":"Steganography in digital media: principles, algorithms, and applications","author":"J Fridrich","year":"2009","unstructured":"Fridrich J (2009) Steganography in digital media: principles, algorithms, and applications. Cambridge Univ. Press, Cambridge"},{"key":"10514_CR21","unstructured":"Fridrich J ,Goljan M, Du R (2001) Invertible authentication, in:Security and Watermarking of Multimedia Contents III,vol.4314, SPIE, pp 197\u2013208"},{"issue":"2002","key":"10514_CR22","first-page":"185","volume":"2","author":"J Fridrich","year":"2002","unstructured":"Fridrich J, Goljan M, Du R (2002) Lossless data embedding new paradigm in digital watermarking,EURASIP. J Appl Signal Process 2(2002):185\u2013196","journal-title":"J Appl Signal Process"},{"key":"10514_CR23","doi-asserted-by":"crossref","unstructured":"Geetha R, Geetha S (2018) Improved reversible data embedding in medical images using I-IWT and pairwise pixel difference expansion. Smart and innovative trends in NGCT 2017, CCIS 828, springer Nature pp 601\u2013611","DOI":"10.1007\/978-981-10-8660-1_45"},{"key":"10514_CR24","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1016\/j.sigpro.2013.12.005","volume":"98","author":"X Gui","year":"2014","unstructured":"Gui X, Li X, Yang B (2014) A high capacity reversible data hiding scheme based on generalized prediction-error expansion and adaptive embedding. Signal Process 98:370\u2013380. https:\/\/doi.org\/10.1016\/j.sigpro.2013.12.005","journal-title":"Signal Process"},{"key":"10514_CR25","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1016\/j.protcy.2012.10.033","volume":"6","author":"KM Hirak","year":"2012","unstructured":"Hirak KM, Santi PM (2012) Joint robust and reversible watermarking for medical images. 2nd international conference on communication, Computing & Security [ICCCS-2012], Elsevier. Procedia Technol 6:275\u2013282","journal-title":"Procedia Technol"},{"key":"10514_CR26","unstructured":"Honsinger CW, Jones PW, Rabbani M, Stoffel JC (2001) Lossless recovery of an original image containing embedded data. U.S. Patent 6 278 791 B1, 21 Aug 2001"},{"key":"10514_CR27","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1016\/j.csi.2008.06.001","volume":"31","author":"K Jung","year":"2009","unstructured":"Jung K, Yoo K (2009) Data hiding method using image interpolation. Comput Stand Interfaces 31:465\u2013470. https:\/\/doi.org\/10.1016\/j.csi.2008.06.001","journal-title":"Comput Stand Interfaces"},{"issue":"12","key":"10514_CR28","doi-asserted-by":"publisher","first-page":"2082","DOI":"10.1109\/TIP.2005.859373","volume":"14","author":"L Kamstra","year":"2005","unstructured":"Kamstra L, Heijmans HJAM (2005) Reversible data embedding into images using wavelet techniques and sorting. IEEE Trans Image Process 14(12):2082\u20132090","journal-title":"IEEE Trans Image Process"},{"key":"10514_CR29","doi-asserted-by":"publisher","first-page":"6712","DOI":"10.1016\/j.eswa.2011.12.019","volume":"39","author":"CF Lee","year":"2012","unstructured":"Lee CF, Huang YL (2012) An efficient image interpolation increasing payload in reversible data hiding. Expert Syst Appl Elsevier 39:6712\u20136719","journal-title":"Expert Syst Appl Elsevier"},{"key":"10514_CR30","unstructured":"Lee S-K, Suh Y-H, Ho Y-S (2006) Reversible image authentication based on watermarking. In Proc. IEEE Int. Conf. Multimedia Expo, pp 1321\u20131324"},{"key":"10514_CR31","unstructured":"Li X, Yang B, Zeng T (2011) Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection. IEEE Trans Image Process 20(12):3524\u20133533"},{"issue":"6","key":"10514_CR32","doi-asserted-by":"publisher","first-page":"774","DOI":"10.1109\/TCSVT.2007.896635","volume":"17","author":"S Lian","year":"2007","unstructured":"Lian S, Liu Z, Ren Z, Wang H (2007) Commutative encryption and watermarking in video compression. IEEE Trans Circuits Syst Video Technol 17(6):774\u2013778","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"1","key":"10514_CR33","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1109\/TIFS.2009.2035975","volume":"5","author":"L Luo","year":"2010","unstructured":"Luo L, Chen Z, Chen M, Zeng X, Xiong Z (2010) Reversible image watermarking using interpolation technique. IEEE Trans Inf Forensics Secur 5(1):187\u2013193","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"10514_CR34","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/TIFS.2013.2248725","volume":"8","author":"K Ma","year":"2013","unstructured":"Ma K, Zhang W, Zhao X, Yu N, Li F (2013) Reversible data hidingin encrypted images by reserving room before encryption. IEEE Trans Inf Forensics Secur 8(3):553\u2013562","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10514_CR35","unstructured":"Ni Z, Shi Y-Q, Ansari N, Su W (2003) Reversible data hiding. In: ISCAS Proceedings of the 2003 International Symposium on Circuits and Systems, Bangkok, pp II-912\u2013II-915"},{"issue":"1","key":"10514_CR36","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/TSMC.1979.4310076","volume":"9","author":"N Otsu","year":"1979","unstructured":"Otsu N (1979) A threshold selection method from gray-level histograms. IEEE Trans Syst Man Cybern 9(1):62\u201366","journal-title":"IEEE Trans Syst Man Cybern"},{"issue":"12","key":"10514_CR37","doi-asserted-by":"publisher","first-page":"5010","DOI":"10.1109\/TIP.2013.2281422","volume":"22","author":"B Ou","year":"2013","unstructured":"Ou B, Li X, Zhao Y, Ni R, Shi Y (Dec. 2013) Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans Image Process 22(12):5010\u20135021","journal-title":"IEEE Trans Image Process"},{"key":"10514_CR38","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1016\/j.jbi.2017.01.006","volume":"66","author":"SA Parah","year":"2017","unstructured":"Parah SA, Ahad F, Sheikh JA, Bhat GM (2017) Hiding clinical information in medical images: a new high capacity and reversible data hiding technique. J Biomed Informatics 66:214\u2013230. https:\/\/doi.org\/10.1016\/j.jbi.2017.01.006","journal-title":"J Biomed Informatics"},{"issue":"8","key":"10514_CR39","doi-asserted-by":"publisher","first-page":"1018","DOI":"10.1016\/j.cad.2011.03.011","volume":"43","author":"F Peng","year":"2011","unstructured":"Peng F, Lei Y-Z, Long M, Sun X-M (2011) A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion. Comput-Aided Design 43(8):1018\u20131024","journal-title":"Comput-Aided Design"},{"issue":"7","key":"10514_CR40","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1109\/TCSVT.2009.2020257","volume":"19","author":"V Sachnev","year":"2009","unstructured":"Sachnev V, Kim HJ, Nam J, Suresh S, Shi YQ (2009) Reversible watermarking algorithm using sorting and prediction. IEEE Trans Circuits Syst VideoTechnol 19(7):989\u2013999","journal-title":"IEEE Trans Circuits Syst VideoTechnol"},{"key":"10514_CR41","doi-asserted-by":"crossref","unstructured":"Schmitz R, Li S, Grecos C, Zhang X (2012) A new approach to commutative watermarking-encryption In Proc. 13th Joint IFIP TC6\/TC11 Conf Commun Multimedia Secur pp 117\u2013130","DOI":"10.1007\/978-3-642-32805-3_10"},{"key":"10514_CR42","unstructured":"Shi YQ (2004) Reversible data hiding,\u201d in Proc. Int. Workshop Digit.Watermarking, pp. 1\u201312"},{"key":"10514_CR43","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/ISCAS.2004.1329201","volume":"2","author":"YQ Shi","year":"2004","unstructured":"Shi YQ, Ni Z, Zou D, Liang C, Xuan G (2004) Lossless data hiding:Fundamentals, algorithms and applications. Proc IEEE Int Symp Circuits Syst 2:33\u201336. https:\/\/doi.org\/10.1109\/ISCAS.2004.1329201","journal-title":"Proc IEEE Int Symp Circuits Syst"},{"issue":"3","key":"10514_CR44","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1109\/TIP.2006.891046","volume":"16","author":"DM Thodi","year":"2007","unstructured":"Thodi DM, Rodriguez JJ (Mar. 2007) Expansion embedding techniques for reversible watermarking. IEEE Trans. Image Process 16(3):721\u2013730","journal-title":"IEEE Trans. Image Process"},{"issue":"8","key":"10514_CR45","first-page":"890","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst 13(8):890\u2013896","journal-title":"IEEE Trans Circuits Syst"},{"key":"10514_CR46","unstructured":"Tong X et al (2014) Stereo image coding with histogram-pair based reversible data hiding, in Proc. Int. Workshop Digital-Forensics Watermarking, pp 201\u2013214"},{"issue":"3","key":"10514_CR47","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1109\/TIFS.2007.902677","volume":"2","author":"X Wang","year":"2007","unstructured":"Wang X, Shao C, Xu X, Niu X (2007) Reversible data-hiding scheme for 2-D vector maps based on difference expansion. IEEE Trans Inf Forensics Secur 2(3):311\u2013320","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10514_CR48","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1109\/LSP.2008.2001984","volume":"15","author":"S Weng","year":"2008","unstructured":"Weng S, Zhao Y, Pan J-S, Ni R (2008) Reversible watermarking based on invariability and adjustment on pixel pairs. IEEE Signal Process Lett 15:721\u2013724","journal-title":"IEEE Signal Process Lett"},{"issue":"1","key":"10514_CR49","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/LSP.2014.2346989","volume":"22","author":"H-T Wu","year":"2015","unstructured":"Wu H-T, Dugelay J-L, Shi Y-Q (2015) Reversible image data hiding with contrast enhancement. IEEE Signal Process Lett 22(1):81\u201385. https:\/\/doi.org\/10.1109\/LSP.2014.2346989","journal-title":"IEEE Signal Process Lett"},{"key":"10514_CR50","doi-asserted-by":"crossref","unstructured":"XuanG, Shi YQ, Chai P, Cui X, Ni Z, Tong X (2007) Optimum histogram pair based image lossless data embedding, In Proc Int Workshop Digit Watermarking pp 264\u2013278","DOI":"10.1007\/978-3-540-92238-4_21"},{"issue":"January","key":"10514_CR51","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.image.2018.03.001","volume":"64","author":"S Yi","year":"2018","unstructured":"Yi S, Zhou Y, Hua Z (2018) Reversible data hiding in encrypted images using adaptive block-level prediction-error expansion. Signal Process Image Commun 64(January):78\u201388. https:\/\/doi.org\/10.1016\/j.image.2018.03.001","journal-title":"Signal Process Image Commun"},{"issue":"4","key":"10514_CR52","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","volume":"18","author":"X Zhang","year":"2011","unstructured":"Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lett 18(4):255\u2013258","journal-title":"IEEE Signal Process Lett"},{"issue":"6","key":"10514_CR53","doi-asserted-by":"publisher","first-page":"2991","DOI":"10.1109\/TIP.2012.2187667","volume":"21","author":"W Zhang","year":"2012","unstructured":"Zhang W, Chen B, Yu N (2012) Improving various reversible data hiding schemes via optimal codes for binarycover. IEEE TransImage Process 21(6):2991\u20133003","journal-title":"IEEE TransImage Process"},{"key":"10514_CR54","doi-asserted-by":"publisher","unstructured":"Zhang W, Ma K, Yu N (2014) Reversibility improved data hiding in encrypted images. Signal Process 94(1):118\u2013127. https:\/\/doi.org\/10.1016\/j.sigpro.2013.06.023","DOI":"10.1016\/j.sigpro.2013.06.023"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10514-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10514-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10514-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T09:05:01Z","timestamp":1619341501000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10514-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,21]]},"references-count":54,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["10514"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10514-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,1,21]]},"assertion":[{"value":"16 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 December 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 January 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 January 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"Author A declares that he\/she has no conflict of interest. Author B declares that he\/she has no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants performed by any of the authors.(Or) Ethical approval: This article does not contain any studies with animals performed by any of the authors.(Or) Ethical approval: This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}