{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T04:08:03Z","timestamp":1773288483571,"version":"3.50.1"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2021,2,6]],"date-time":"2021-02-06T00:00:00Z","timestamp":1612569600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,2,6]],"date-time":"2021-02-06T00:00:00Z","timestamp":1612569600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11042-021-10550-7","type":"journal-article","created":{"date-parts":[[2021,2,8]],"date-time":"2021-02-08T23:27:26Z","timestamp":1612826846000},"page":"15825-15848","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["Multiple-image encryption based on cascaded gyrator transforms and high-dimensional chaotic system"],"prefix":"10.1007","volume":"80","author":[{"given":"Xiaoni","family":"Sun","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4847-282X","authenticated-orcid":false,"given":"Zhuhong","family":"Shao","sequence":"additional","affiliation":[]},{"given":"Yuanyuan","family":"Shang","sequence":"additional","affiliation":[]},{"given":"Mingxian","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Fengjian","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,6]]},"reference":[{"key":"10550_CR1","doi-asserted-by":"crossref","first-page":"106063","DOI":"10.1016\/j.optlaseng.2020.106063","volume":"129","author":"M Abdelfattah","year":"2020","unstructured":"Abdelfattah M, Hegazy SF, Areed NFF, Obayya SSA (2020) Compact optical asymmetric cryptosystem based on unequal modulus decomposition of multiple color images. Opt Lasers Eng 129:106063","journal-title":"Opt Lasers Eng"},{"key":"10550_CR2","doi-asserted-by":"crossref","first-page":"105810","DOI":"10.1016\/j.optlaseng.2019.105810","volume":"124","author":"MR Abuturab","year":"2020","unstructured":"Abuturab MR (2020) Multiple-information security system using key image phase and chaotic random phase encoding in Fresnel transform domain. Opt Lasers Eng 124:105810","journal-title":"Opt Lasers Eng"},{"issue":"5","key":"10550_CR3","doi-asserted-by":"crossref","first-page":"898","DOI":"10.1109\/TPAMI.2010.161","volume":"33","author":"P Arbel\u00e1ez","year":"2011","unstructured":"Arbel\u00e1ez P, Maire M, Fowlkes C, Malik J (2011) Contour detection and hierarchical image segmentation. IEEE Trans Pattern Anal Mach Intell 33(5):898\u2013916","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"10550_CR4","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1016\/j.ins.2012.09.053","volume":"223","author":"G Bhatnagar","year":"2013","unstructured":"Bhatnagar G, Wu QMJ, Raman B (2013) Discrete fractional wavelet transform and its application to multiple encryption. Inf Sci 223:297\u2013316","journal-title":"Inf Sci"},{"key":"10550_CR5","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1016\/j.optlaseng.2018.03.011","volume":"107","author":"H Chen","year":"2018","unstructured":"Chen H, Tanougast C, Liu Z, Blondel W, Hao B (2018) Optical hyperspectral image encryption based on improved Chirikov mapping and gyrator transform. Opt Lasers Eng 107:62\u201370","journal-title":"Opt Lasers Eng"},{"issue":"12","key":"10550_CR6","doi-asserted-by":"crossref","first-page":"2238","DOI":"10.1049\/iet-ipr.2018.5440","volume":"12","author":"BJ Chen","year":"2018","unstructured":"Chen BJ, Yu M, Tian YH, Li LD, Wang DC, Sun XM (2018) Multiple-parameter fractional quaternion Fourier transform and its application in colour image encryption. IET Image Process 12(12):2238\u20132249","journal-title":"IET Image Process"},{"key":"10550_CR7","doi-asserted-by":"publisher","unstructured":"Chidambaram N, Raj P, Thenmozhi K, Amirtharajan R (2020) Advanced framework for highly secure and cloud-based storage of colour images. IET Image Process 14:3143\u20133153. https:\/\/doi.org\/10.1049\/iet-ipr.2018.5654","DOI":"10.1049\/iet-ipr.2018.5654"},{"key":"10550_CR8","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/j.patrec.2014.05.001","volume":"46","author":"B Czaplewski","year":"2014","unstructured":"Czaplewski B, Dzwonkowski M, Rykaczewski R (2014) Digital fingerprinting for color images based on the quaternion encryption scheme. Pattern Recogn Lett 46:11\u201319","journal-title":"Pattern Recogn Lett"},{"key":"10550_CR9","doi-asserted-by":"crossref","unstructured":"Dasgupta T, Paral P, Bhattacharya S, (2014) Grayscale image encryption based on high-dimensional fractional order Chua\u2019s system. In: 2nd international conference on advanced computing networking and informatics.","DOI":"10.1007\/978-3-319-07350-7_35"},{"issue":"1","key":"10550_CR10","first-page":"154","volume":"8","author":"O Dorgham","year":"2018","unstructured":"Dorgham O, Al-Rahamneh B, Almomani A et al (2018) Enhancing the security of exchanging and storing DICOM medical images on the cloud. Int J Cloud Appl Comput 8(1):154\u2013172","journal-title":"Int J Cloud Appl Comput"},{"key":"10550_CR11","doi-asserted-by":"crossref","unstructured":"Faragallah OS, Afifi A, El-Shafai W, El-Sayed HS, Alzain MA, Al-Amri JF, El-Samie FE (2020) Efficiently encrypting color images with few details based on RC6 and different operation modes for cybersecurity applications. IEEE Access 8:103200\u2013103218","DOI":"10.1109\/ACCESS.2020.2994583"},{"key":"10550_CR12","unstructured":"Fei-Fei L, Fergus R, Perona P (2004) Learning generative visual models from few examples: an incremental bayesian approach tested on 101 object categories. In: CVPR Workshop of Generative Model Based Vision"},{"key":"10550_CR13","doi-asserted-by":"crossref","first-page":"24809","DOI":"10.1007\/s11042-019-7623-3","volume":"78","author":"A Firdous","year":"2019","unstructured":"Firdous A, Aur R, Missen MMS (2019) A highly efficient color image encryption based on linear transformation using chaos theory and SHA-2. Multimed Tools Appl 78:24809\u201324835","journal-title":"Multimed Tools Appl"},{"key":"10550_CR14","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1016\/j.sigpro.2019.06.010","volume":"164","author":"HM Ghadirli","year":"2019","unstructured":"Ghadirli HM, Nodehi A, Enayatifar R (2019) An overview of encryption algorithms in color images. Signal Process 164:163\u2013185","journal-title":"Signal Process"},{"issue":"2","key":"10550_CR15","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1504\/IJHPCN.2019.097508","volume":"13","author":"NEH Gol\u00e9a","year":"2019","unstructured":"Gol\u00e9a NEH, Melkemi KE (2019) ROI-based fragile watermarking for medical image tamper detection. Int J High Performance Comput Network 13(2):199\u2013210","journal-title":"Int J High Performance Comput Network"},{"key":"10550_CR16","doi-asserted-by":"crossref","unstructured":"Gupta B, Agrawal DP, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global.","DOI":"10.4018\/978-1-5225-0105-3"},{"key":"10550_CR17","doi-asserted-by":"crossref","unstructured":"Kang XJ, Ming AL, R. Tao (2019) Reality-preserving multiple parameter discrete fractional angular transform and its application to color image encryption. IEEE Trans Circ Syst Vid 29(6): 1595\u20131607","DOI":"10.1109\/TCSVT.2018.2851983"},{"key":"10550_CR18","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/s11831-018-9298-8","volume":"27","author":"M Kaur","year":"2020","unstructured":"Kaur M, Kumar V (2020) A comprehensive review on image encryption techniques. Arch Comput Methods in Eng 27:15\u201343","journal-title":"Arch Comput Methods in Eng"},{"issue":"3","key":"10550_CR19","first-page":"22","volume":"9","author":"A Kumar","year":"2019","unstructured":"Kumar A (2019) Design of secure image fusion technique using cloud for privacy-preserving and copyright protection. Int J Cloud Appl Comput 9(3):22\u201336","journal-title":"Int J Cloud Appl Comput"},{"key":"10550_CR20","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1016\/j.optlaseng.2017.10.023","volume":"102","author":"X Li","year":"2018","unstructured":"Li X, Meng X, Yang X, Wang Y, Yin Y, Peng X, He W, Dong G, Chen H (2018) Multiple-image encryption via lifting wavelet transform and XOR operation based on compressive ghost imaging scheme. Opt Lasers Eng 102:106\u2013111","journal-title":"Opt Lasers Eng"},{"key":"10550_CR21","doi-asserted-by":"crossref","unstructured":"Li Z, Zhao M, Jiang H, Xu Q (2019) Keyword guessing on multi-user searchable encryption. Int J High Perform Comput Netw 14(1):60\u201368","DOI":"10.1504\/IJHPCN.2019.099744"},{"issue":"10","key":"10550_CR22","doi-asserted-by":"crossref","first-page":"3320","DOI":"10.1016\/j.camwa.2010.03.017","volume":"59","author":"H Liu","year":"2010","unstructured":"Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Appl 59(10):3320\u20133327","journal-title":"Comput Math Appl"},{"issue":"16\u201317","key":"10550_CR23","doi-asserted-by":"crossref","first-page":"3895","DOI":"10.1016\/j.optcom.2011.04.001","volume":"284","author":"H Liu","year":"2011","unstructured":"Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284(16\u201317):3895\u20133903","journal-title":"Opt Commun"},{"key":"10550_CR24","doi-asserted-by":"crossref","first-page":"1457","DOI":"10.1016\/j.asoc.2012.01.016","volume":"12","author":"H Liu","year":"2012","unstructured":"Liu H, Wang X, Kadir A (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12:1457\u20131466","journal-title":"Appl Soft Comput"},{"issue":"1","key":"10550_CR25","first-page":"6900207","volume":"11","author":"GY Luan","year":"2019","unstructured":"Luan GY, Li AC, Zhang DM, Wang DX (2019) Asymmetric image encryption and authentication based on equal modulus decomposition in the Fresnel transform domain. IEEE Photonics J 11(1):6900207","journal-title":"IEEE Photonics J"},{"key":"10550_CR26","doi-asserted-by":"crossref","unstructured":"Mamta, Gupta B B (2019) An efficient KP design framework of attribute-based searchable encryption for user level revocation in cloud. Concurrency and Computation: Practice and Experience","DOI":"10.1002\/cpe.5291"},{"issue":"3","key":"10550_CR27","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1504\/IJHPCN.2019.102133","volume":"14","author":"Y Mu","year":"2019","unstructured":"Mu Y, Zhou Z (2019) Visual vocabulary tree-based partial-duplicate image retrieval for coverless image steganography. Int J High Performance Comput Network 14(3):333\u2013341","journal-title":"Int J High Performance Comput Network"},{"issue":"1","key":"10550_CR28","first-page":"28","volume":"10","author":"PK Premkamal","year":"2020","unstructured":"Premkamal PK, Pasupuleti SK, Alphonse PJA (2020) Efficient escrow-free CP-ABE with constant size ciphertext and secret key for big data storage in cloud. Int J Cloud Appl Comput 10(1):28\u201345","journal-title":"Int J Cloud Appl Comput"},{"key":"10550_CR29","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/j.jvcir.2015.06.009","volume":"31","author":"C Qin","year":"2015","unstructured":"Qin C, Zhang X (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image Represent 31:154\u2013164","journal-title":"J Vis Commun Image Represent"},{"issue":"7","key":"10550_CR30","doi-asserted-by":"crossref","first-page":"767","DOI":"10.1364\/OL.20.000767","volume":"20","author":"P Refregier","year":"1995","unstructured":"Refregier P, Javidi B (1995) Optical image encryption based on input plane and Fourier plane random encoding. Opt Lett 20(7):767\u2013769","journal-title":"Opt Lett"},{"issue":"5","key":"10550_CR31","doi-asserted-by":"crossref","first-page":"4932","DOI":"10.1364\/OE.22.004932","volume":"22","author":"Z Shao","year":"2014","unstructured":"Shao Z, Shu H, Wu J, Dong Z, Coatrieux G, Coatrieux JL (2014) Double color image encryption using iterative phase retrieval algorithm in quaternion gyrator domain. Opt Express 22(5):4932\u20134943","journal-title":"Opt Express"},{"key":"10550_CR32","doi-asserted-by":"crossref","first-page":"1285","DOI":"10.1007\/s11042-016-4279-0","volume":"77","author":"Z Shao","year":"2018","unstructured":"Shao Z, Shang Y, Fu X, Yuan H, Shu H (2018) Double-image cryptosystem using chaotic map and mixture amplitude-phase retrieval in gyrator domain. Multimed Tools Appl 77:1285\u20131298","journal-title":"Multimed Tools Appl"},{"key":"10550_CR33","doi-asserted-by":"crossref","first-page":"25821","DOI":"10.1007\/s11042-018-5818-7","volume":"77","author":"Z Shao","year":"2018","unstructured":"Shao Z, Shang Y, Tong Q, Ding H, Zhao X, Fu X (2018) Multiple color image encryption and authentication based on phase retrieval and partial decryption in quaternion gyrator domain. Multimed Tools Appl 77:25821\u201325840","journal-title":"Multimed Tools Appl"},{"key":"10550_CR34","doi-asserted-by":"crossref","first-page":"115662","DOI":"10.1016\/j.image.2019.115662","volume":"80","author":"Z Shao","year":"2020","unstructured":"Shao Z, Liu X, Yao Q, Qi N, Shang Y, Zhang J (2020) Multiple-image encryption based on chaotic phase mask and equal modulus decomposition in quaternion gyrator domain. Signal Process Image Commun 80:115662","journal-title":"Signal Process Image Commun"},{"key":"10550_CR35","doi-asserted-by":"publisher","first-page":"2987","DOI":"10.1049\/iet-ipr.2019.0168","volume":"14","author":"R Sivaraman","year":"2020","unstructured":"Sivaraman R, Rajagopalan S, Rayappan JBB, Amirtharajan R (2020) Ring oscillator as confusion\u2013diffusion agent: a complete TRNG drove image security. IET Image Process 14:2987\u20132997. https:\/\/doi.org\/10.1049\/iet-ipr.2019.0168","journal-title":"IET Image Process"},{"issue":"4","key":"10550_CR36","doi-asserted-by":"crossref","first-page":"1370","DOI":"10.1364\/OSAC.1.001370","volume":"1","author":"L Sui","year":"2018","unstructured":"Sui L, Xu M, Huang C, Adhikari A, Tian A, Asundi A (2018) Multiple-image encryption by space multiplexing based on vector quantization and interference. OSA Continuum 1(4):1370\u20131384","journal-title":"OSA Continuum"},{"key":"10550_CR37","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.optlaseng.2018.10.002","volume":"113","author":"L Sui","year":"2019","unstructured":"Sui L, Zhang X, Huang C, Tian A, Asundi AK (2019) Silhouette-free interference-based multiple-image encryption using cascaded fractional Fourier transforms. Opt Lasers Eng 113:29\u201337","journal-title":"Opt Lasers Eng"},{"key":"10550_CR38","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/j.ins.2020.06.030","volume":"539","author":"X Wang","year":"2020","unstructured":"Wang X, Gao S (2020) Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network. Inf Sci 539:195\u2013214","journal-title":"Inf Sci"},{"key":"10550_CR39","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.ins.2019.08.041","volume":"507","author":"X Wang","year":"2020","unstructured":"Wang X, Gao S (2020) Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Inf Sci 507:16\u201336","journal-title":"Inf Sci"},{"issue":"3","key":"10550_CR40","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1007\/s11071-010-9749-8","volume":"62","author":"XY Wang","year":"2010","unstructured":"Wang XY, Yang L, Liu R, Kadir A (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 62(3):615\u2013621","journal-title":"Nonlinear Dyn"},{"issue":"4","key":"10550_CR41","doi-asserted-by":"crossref","first-page":"1101","DOI":"10.1016\/j.sigpro.2011.10.023","volume":"92","author":"X Wang","year":"2012","unstructured":"Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101\u20131108","journal-title":"Signal Process"},{"key":"10550_CR42","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.optcom.2014.01.041","volume":"320","author":"Q Wang","year":"2014","unstructured":"Wang Q, Guo Q, Lei L (2014) Multiple-image encryption system using cascaded phase mask encoding and a modified Gerchberg\u2013Saxton algorithm in gyrator domain. Opt Commun 320:12\u201321","journal-title":"Opt Commun"},{"key":"10550_CR43","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.optlaseng.2014.08.005","volume":"66","author":"X Wang","year":"2015","unstructured":"Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10\u201318","journal-title":"Opt Lasers Eng"},{"key":"10550_CR44","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.optlaseng.2015.03.022","volume":"73","author":"X Wang","year":"2015","unstructured":"Wang X, Zhang Y, Bao X (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53\u201361","journal-title":"Opt Lasers Eng"},{"key":"10550_CR45","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1016\/j.ins.2019.02.049","volume":"486","author":"X Wang","year":"2019","unstructured":"Wang X, Feng L, Zhao H (2019) Fast image encryption algorithm based on parallel computing system. Inf Sci 486:340\u2013358","journal-title":"Inf Sci"},{"key":"10550_CR46","doi-asserted-by":"crossref","first-page":"27555","DOI":"10.1007\/s11042-020-09296-5","volume":"79","author":"Q Yao","year":"2020","unstructured":"Yao Q, Shao Z, Shang Y, Ding H, Liu X, Zeng R, Tong Q (2020) Color image encryption based on discrete trinion Fourier transform and random-multiresolution singular value decomposition. Multimed Tools Appl 79:27555\u201327581","journal-title":"Multimed Tools Appl"},{"key":"10550_CR47","doi-asserted-by":"crossref","first-page":"107652","DOI":"10.1016\/j.sigpro.2020.107652","volume":"175","author":"H Ye","year":"2020","unstructured":"Ye H, Zhou N, Gong L (2020) Multi-image compression-encryption scheme based on quaternion discrete fractional Hartley transform and improved pixel adaptive diffusion. Signal Process 175:107652","journal-title":"Signal Process"},{"key":"10550_CR48","doi-asserted-by":"crossref","first-page":"31918","DOI":"10.1109\/ACCESS.2018.2840119","volume":"6","author":"Z Yu","year":"2018","unstructured":"Yu Z, Gao C, Jing Z, Gupta BB, Cai Q (2018) A practical public key encryption scheme based on learning parity with noise. IEEE Access 6:31918\u201331923","journal-title":"IEEE Access"},{"key":"10550_CR49","doi-asserted-by":"crossref","first-page":"4585","DOI":"10.1007\/s11042-017-4637-6","volume":"77","author":"C Yu","year":"2018","unstructured":"Yu C, Li J, Li X, Ren X, GuptaBB (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77:4585\u20134608","journal-title":"Multimed Tools Appl"},{"key":"10550_CR50","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/j.ins.2014.02.156","volume":"273","author":"YQ Zhang","year":"2014","unstructured":"Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear\u2013nonlinear coupled map lattice. Inf Sci 273:329\u2013351","journal-title":"Inf Sci"},{"key":"10550_CR51","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.asoc.2014.09.039","volume":"26","author":"Y Zhang","year":"2015","unstructured":"Zhang Y, Wang X (2015) A new image encryption algorithm based on non-adjacent coupled map lattices. Appl Soft Comput 26:10\u201320","journal-title":"Appl Soft Comput"},{"key":"10550_CR52","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1016\/j.optlastec.2018.03.004","volume":"105","author":"L Zhang","year":"2018","unstructured":"Zhang L, Zhou Y, Huo D, Li J, Zhou X (2018) Multiple-image encryption based on double random phase encoding and compressive sensing by using a measurement array preprocessed with orthogonal-basis matrices. Opt Laser Technol 105:162\u2013170","journal-title":"Opt Laser Technol"},{"key":"10550_CR53","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1109\/ACCESS.2017.2775038","volume":"6","author":"Q Zheng","year":"2017","unstructured":"Zheng Q, Wang X, Khan M, Zhang W, Gupta B, Guo W (2017) A lightweight authentication encryption based on chaotic SCML for railway cloud service. IEEE Access 6:711\u2013722","journal-title":"IEEE Access"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10550-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10550-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10550-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:45:23Z","timestamp":1619505923000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10550-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,6]]},"references-count":53,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["10550"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10550-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,6]]},"assertion":[{"value":"23 May 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 November 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 January 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 February 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}