{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T22:06:23Z","timestamp":1767650783130},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2021,2,17]],"date-time":"2021-02-17T00:00:00Z","timestamp":1613520000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,2,17]],"date-time":"2021-02-17T00:00:00Z","timestamp":1613520000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s11042-021-10576-x","type":"journal-article","created":{"date-parts":[[2021,2,19]],"date-time":"2021-02-19T07:17:30Z","timestamp":1613719050000},"page":"18317-18344","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["A new Grayscale image encryption algorithm composed of logistic mapping, Arnold cat, and image blocking"],"prefix":"10.1007","volume":"80","author":[{"given":"Delavar","family":"Zareai","sequence":"first","affiliation":[]},{"given":"Mohammadali","family":"Balafar","sequence":"additional","affiliation":[]},{"given":"Mohammad Reza","family":"Feizi Derakhshi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,17]]},"reference":[{"key":"10576_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-018-4159-4","author":"AA Abdulla","year":"2015","unstructured":"Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. Dissertation, University of Buckingham. https:\/\/doi.org\/10.1007\/s11071-018-4159-4","journal-title":"Dissertation, University of Buckingham."},{"key":"10576_CR2","doi-asserted-by":"crossref","unstructured":"Abdullah HN, Abdullah HA (2017) Image encryption using hybrid chaotic map. In: 2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT). IEEE, pp 121\u2013125","DOI":"10.1109\/CRCSIT.2017.7965545"},{"issue":"10","key":"10576_CR3","doi-asserted-by":"publisher","first-page":"806","DOI":"10.1016\/j.aeue.2012.01.015","volume":"66","author":"AH Abdullah","year":"2012","unstructured":"Abdullah AH, Enayatifar R, Lee M (2012) A hybrid genetic algorithm and chaotic function model for image encryption. AEU Int J Electron Commun 66(10):806\u2013816. https:\/\/doi.org\/10.1016\/j.aeue.2012.01.015","journal-title":"AEU Int J Electron Commun"},{"issue":"3","key":"10576_CR4","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/s41870-018-0099-y","volume":"10","author":"M Ahmad","year":"2018","unstructured":"Ahmad M, Alam MZ, Umayya Z, Khan S, Ahmad F (2018) An image encryption approach using particle swarm optimization and chaotic map. Int J Inf Technol 10(3):247\u2013255. https:\/\/doi.org\/10.1007\/s41870-018-0099-y","journal-title":"Int J Inf Technol"},{"key":"10576_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.sigpro.2018.11.010","volume":"157","author":"M Asgari-Chenaghlu","year":"2019","unstructured":"Asgari-Chenaghlu M, Balafar M-A, Feizi-Derakhshi M-R (2019) A novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generation. Signal Process 157:1\u201313. https:\/\/doi.org\/10.1016\/j.sigpro.2018.11.010","journal-title":"Signal Process"},{"issue":"19","key":"10576_CR6","doi-asserted-by":"publisher","first-page":"27611","DOI":"10.1007\/s11042-019-07881-x","volume":"78","author":"SI Batool","year":"2019","unstructured":"Batool SI, Waseem HM (2019) A novel image encryption scheme based on Arnold scrambling and Lucas series. Multimed Tools Appl 78(19):27611\u201327637. https:\/\/doi.org\/10.1007\/s11042-019-07881-x","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"10576_CR7","doi-asserted-by":"publisher","first-page":"1745","DOI":"10.1007\/s11071-018-4159-4","volume":"92","author":"\u00dc \u00c7avu\u015fo\u011flu","year":"2018","unstructured":"\u00c7avu\u015fo\u011flu \u00dc, Ka\u00e7ar S, Zengin A, Pehlivan I (2018) A novel hybrid encryption algorithm based on chaos and S-AES algorithm. Nonlinear Dyn 92(4):1745\u20131759. https:\/\/doi.org\/10.1007\/s11071-018-4159-4","journal-title":"Nonlinear Dyn"},{"issue":"3","key":"10576_CR8","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G Chen","year":"2004","unstructured":"Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21(3):749\u2013761. https:\/\/doi.org\/10.1016\/j.chaos.2003.12.022","journal-title":"Chaos, Solitons Fractals"},{"key":"10576_CR9","doi-asserted-by":"publisher","unstructured":"Daemen J, Rijmen V (1999) AES proposal: Rijndael. Katholieke Universiteit Leuven, ESAT-COSIC, Gaithersburg, MD, USA. https:\/\/doi.org\/10.1016\/j.aeue.2012.01.015","DOI":"10.1016\/j.aeue.2012.01.015"},{"key":"10576_CR10","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1016\/j.ijleo.2018.12.103","volume":"186","author":"W Feng","year":"2019","unstructured":"Feng W, He Y-G, Li H-M, Li C-L (2019) Cryptanalysis of the integrated chaotic systems based image encryption algorithm. Optik 186:449\u2013457. https:\/\/doi.org\/10.1016\/j.ijleo.2018.12.103","journal-title":"Optik"},{"issue":"12","key":"10576_CR11","doi-asserted-by":"publisher","first-page":"3616","DOI":"10.1088\/1009-1963\/16\/12\/011","volume":"16","author":"S Fu-Yan","year":"2007","unstructured":"Fu-Yan S, Shu-Tang L, Zong-Wang L (2007) Image encryption using high-dimension chaotic system. Chin Phys 16(12):3616\u20133623. https:\/\/doi.org\/10.1088\/1009-1963\/16\/12\/011","journal-title":"Chin Phys"},{"key":"10576_CR12","doi-asserted-by":"publisher","first-page":"917","DOI":"10.1016\/j.ijleo.2019.02.007","volume":"185","author":"W Gao","year":"2019","unstructured":"Gao W, Sun J, Qiao W, Zhang X (2019) Digital image encryption scheme based on generalized Mandelbrot-Julia set. Optik 185:917\u2013929. https:\/\/doi.org\/10.1016\/j.ijleo.2019.02.007","journal-title":"Optik"},{"key":"10576_CR13","doi-asserted-by":"publisher","unstructured":"He J, Lan R, Wang S, Luo X (2017) An Integrated Chaotic System with Application to Image Encryption. In: International Conference on Neural Information Processing. Springer, pp 837\u2013847.\u00a0https:\/\/doi.org\/10.1016\/j.chaos.2004.11.096","DOI":"10.1016\/j.chaos.2004.11.096"},{"issue":"4","key":"10576_CR14","doi-asserted-by":"publisher","first-page":"2411","DOI":"10.1007\/s11071-011-0155-7","volume":"67","author":"X Huang","year":"2012","unstructured":"Huang X (2012) Image encryption algorithm using chaotic Chebyshev generator. Nonlinear Dyn 67(4):2411\u20132417. https:\/\/doi.org\/10.1007\/s11071-011-0155-7","journal-title":"Nonlinear Dyn"},{"issue":"3","key":"10576_CR15","doi-asserted-by":"publisher","first-page":"979","DOI":"10.1007\/s10773-018-3989-7","volume":"58","author":"N Jiang","year":"2019","unstructured":"Jiang N, Dong X, Hu H, Ji Z, Zhang W (2019) Quantum image encryption based on Henon mapping. Int J Theor Phys 58(3):979\u2013991. https:\/\/doi.org\/10.1007\/s10773-018-3989-7","journal-title":"Int J Theor Phys"},{"key":"10576_CR16","doi-asserted-by":"publisher","unstructured":"Kalra M, Katyal S, Singh R (2019) A tent map and logistic map based approach for Chaos-based image encryption and decryption. In: Innovations in Computer Science and Engineering. Springer, pp 159\u2013165.\u00a0https:\/\/doi.org\/10.1007\/s11554-019-00940-4","DOI":"10.1007\/s11554-019-00940-4"},{"issue":"7","key":"10576_CR17","doi-asserted-by":"publisher","first-page":"2943","DOI":"10.1016\/j.cnsns.2011.11.030","volume":"17","author":"A Kanso","year":"2012","unstructured":"Kanso A, Ghebleh M (2012) A novel image encryption algorithm based on a 3D chaotic map. Commun Nonlinear Sci Numer Simul 17(7):2943\u20132959. https:\/\/doi.org\/10.1016\/j.cnsns.2011.11.030","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"3","key":"10576_CR18","first-page":"323","volume":"9","author":"PN Khade","year":"2012","unstructured":"Khade PN, MJIJoCSI N (2012) 3D chaotic functions for image encryption. IJCSI Int J Comput Sci Issues 9(3):323","journal-title":"IJCSI Int J Comput Sci Issues"},{"issue":"2","key":"10576_CR19","doi-asserted-by":"publisher","first-page":"943","DOI":"10.1007\/s11045-018-0589-x","volume":"30","author":"JS Khan","year":"2019","unstructured":"Khan JS, Ahmad J (2019) Chaos based efficient selective image encryption. Multidim Syst Sign Process 30(2):943\u2013961. https:\/\/doi.org\/10.1007\/s11045-018-0589-x","journal-title":"Multidim Syst Sign Process"},{"key":"10576_CR20","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.sigpro.2018.01.026","volume":"147","author":"R Lan","year":"2018","unstructured":"Lan R, He J, Wang S, Gu T, Luo X (2018) Integrated chaotic systems for image encryption. Signal Process 147:133\u2013145. https:\/\/doi.org\/10.1016\/j.sigpro.2018.01.026","journal-title":"Signal Process"},{"issue":"3","key":"10576_CR21","doi-asserted-by":"publisher","first-page":"775","DOI":"10.1007\/s11554-018-0801-0","volume":"16","author":"F Li","year":"2019","unstructured":"Li F, Wu H, Zhou G, Wei W (2019) Robust real-time image encryption with aperiodic chaotic map and random-cycling bit shift. J Real-Time Image Proc 16(3):775\u2013790. https:\/\/doi.org\/10.1007\/s11554-018-0801-0","journal-title":"J Real-Time Image Proc"},{"key":"10576_CR22","doi-asserted-by":"publisher","first-page":"63336","DOI":"10.1007\/s11042-018-5807-x","volume":"7","author":"M Li","year":"2019","unstructured":"Li M, Xu M, Luo J, Fan HJIA (2019) Cryptanalysis of an image encryption using 2D henon-sine map and DNA approach. IEEE Access 7:63336\u201363345. https:\/\/doi.org\/10.1007\/s11042-018-5807-x","journal-title":"IEEE Access"},{"issue":"1","key":"10576_CR23","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.chaos.2004.11.096","volume":"26","author":"S Lian","year":"2005","unstructured":"Lian S, Sun J, Wang Z (2005) A block cipher based on a suitable use of the chaotic standard map. Chaos, Solitons Fractals 26(1):117\u2013129. https:\/\/doi.org\/10.1016\/j.chaos.2004.11.096","journal-title":"Chaos, Solitons Fractals"},{"issue":"3","key":"10576_CR24","doi-asserted-by":"publisher","first-page":"2917","DOI":"10.1007\/s11071-020-05654-y","volume":"100","author":"Y Liu","year":"2020","unstructured":"Liu Y, Qin Z, Liao X, Wu J (2020) Cryptanalysis and enhancement of an image encryption scheme based on a 1-D coupled sine map. Nonlinear Dyn 100(3):2917\u20132931. https:\/\/doi.org\/10.1007\/s11071-020-05654-y","journal-title":"Nonlinear Dyn"},{"issue":"11","key":"10576_CR25","first-page":"1091","volume":"4","author":"S Liu","year":"2009","unstructured":"Liu S, Sun J, Xu ZJJ (2009) An improved image encryption algorithm based on chaotic system. J Comput 4(11):1091\u20131100","journal-title":"J Comput"},{"issue":"8","key":"10576_CR26","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/s11128-020-02739-w","volume":"19","author":"X Liu","year":"2020","unstructured":"Liu X, Xiao D, Liu C (2020) Quantum image encryption algorithm based on bit-plane permutation and sine logistic map. Quantum Inf Process 19(8):239. https:\/\/doi.org\/10.1007\/s11128-020-02739-w","journal-title":"Quantum Inf Process"},{"issue":"15","key":"10576_CR27","doi-asserted-by":"publisher","first-page":"22023","DOI":"10.1007\/s11042-019-7453-3","volume":"78","author":"Y Luo","year":"2019","unstructured":"Luo Y, Yu J, Lai W, Liu L (2019) A novel chaotic image encryption algorithm based on improved baker map and logistic map. Multimed Tools Appl 78(15):22023\u201322043. https:\/\/doi.org\/10.1007\/s11042-019-7453-3","journal-title":"Multimed Tools Appl"},{"key":"10576_CR28","doi-asserted-by":"publisher","unstructured":"Mishra M, Routray AR, Japa KS (2014) High security image steganography with modified Arnold cat map. Int J Comput Appl 5. https:\/\/doi.org\/10.1016\/j.asoc.2009.12.011","DOI":"10.1016\/j.asoc.2009.12.011"},{"key":"10576_CR29","doi-asserted-by":"publisher","unstructured":"Mondal B, Behera PK, Gangopadhyay S (2020) A secure image encryption scheme based on a novel 2D sine\u2013cosine cross-chaotic (SC3) map. J Real-Time Image Proc. https:\/\/doi.org\/10.1007\/s11554-019-00940-4","DOI":"10.1007\/s11554-019-00940-4"},{"issue":"11","key":"10576_CR30","doi-asserted-by":"publisher","first-page":"14867","DOI":"10.1007\/s11042-018-6827-2","volume":"78","author":"F Musanna","year":"2019","unstructured":"Musanna F, Kumar S (2019) A novel fractional order chaos-based image encryption using fisher yates algorithm and 3-D cat map. Multimed Tools Appl 78(11):14867\u201314895. https:\/\/doi.org\/10.1007\/s11042-018-6827-2","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"10576_CR31","doi-asserted-by":"publisher","first-page":"995","DOI":"10.1007\/s11071-014-1492-0","volume":"78","author":"B Norouzi","year":"2014","unstructured":"Norouzi B, Mirzakuchaki S (2014) A fast color image encryption algorithm based on hyper-chaotic systems. Nonlinear Dyn 78(2):995\u20131015. https:\/\/doi.org\/10.1007\/s11071-014-1492-0","journal-title":"Nonlinear Dyn"},{"issue":"19","key":"10576_CR32","doi-asserted-by":"publisher","first-page":"25569","DOI":"10.1007\/s11042-018-5807-x","volume":"77","author":"S Noshadian","year":"2018","unstructured":"Noshadian S, Ebrahimzade A, Kazemitabar SJ (2018) Optimizing chaos based image encryption. Multimed Tools Appl 77(19):25569\u201325590. https:\/\/doi.org\/10.1007\/s11042-018-5807-x","journal-title":"Multimed Tools Appl"},{"key":"10576_CR33","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.optlastec.2017.10.024","volume":"101","author":"R Parvaz","year":"2018","unstructured":"Parvaz R, Zarebnia M (2018) A combination chaotic system and application in color image encryption. Opt Laser Technol 101:30\u201341. https:\/\/doi.org\/10.1016\/j.optlastec.2017.10.024","journal-title":"Opt Laser Technol"},{"key":"10576_CR34","first-page":"1","volume":"45","author":"GJMLA Peterson","year":"1997","unstructured":"Peterson GJMLA (1997) Arnold\u2019s cat map. Linear Algebra 45:1\u20137","journal-title":"Linear Algebra"},{"issue":"20","key":"10576_CR35","doi-asserted-by":"publisher","first-page":"2638","DOI":"10.1016\/j.physd.2008.03.049","volume":"237","author":"AN Pisarchik","year":"2008","unstructured":"Pisarchik AN, Zanin M (2008) Image encryption with chaotically coupled chaotic maps. Physica D 237(20):2638\u20132648. https:\/\/doi.org\/10.1016\/j.physd.2008.03.049","journal-title":"Physica D"},{"issue":"4","key":"10576_CR36","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656\u2013715. https:\/\/doi.org\/10.1002\/j.1538-7305.1949.tb00928.x","journal-title":"Bell Syst Tech J"},{"issue":"1","key":"10576_CR37","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s10044-018-0765-5","volume":"22","author":"A Shokouh Saljoughi","year":"2019","unstructured":"Shokouh Saljoughi A, Mirvaziri H (2019) A new method for image encryption by 3D chaotic map. Pattern Anal Applic 22(1):243\u2013257. https:\/\/doi.org\/10.1007\/s10044-018-0765-5","journal-title":"Pattern Anal Applic"},{"key":"10576_CR38","doi-asserted-by":"publisher","unstructured":"Srividya G, Nandakumar P (2011) A Triple-Key chaotic image encryption method. In: 2011 International Conference on Communications and Signal Processing. IEEE, pp 266\u2013270.\u00a0hhttps:\/\/doi.org\/10.1016\/j.ijleo.2019.02.007","DOI":"10.1016\/j.ijleo.2019.02.007"},{"key":"10576_CR39","doi-asserted-by":"publisher","unstructured":"Talhaoui MZ, Wang X, Midoun MA (2020) Fast image encryption algorithm with high security level using the B\u00fclban chaotic map. J Real-Time Image Proc. https:\/\/doi.org\/10.1007\/s11554-020-00948-1","DOI":"10.1007\/s11554-020-00948-1"},{"issue":"3","key":"10576_CR40","doi-asserted-by":"publisher","first-page":"709","DOI":"10.1007\/s11554-018-0838-0","volume":"16","author":"Z Tang","year":"2019","unstructured":"Tang Z, Xu S, Ye D, Wang J, Zhang X, Yu C (2019) Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image. J Real-Time Image Proc 16(3):709\u2013724. https:\/\/doi.org\/10.1007\/s11554-018-0838-0","journal-title":"J Real-Time Image Proc"},{"issue":"15","key":"10576_CR41","doi-asserted-by":"publisher","first-page":"5429","DOI":"10.1007\/s11042-014-1861-1","volume":"74","author":"Z Tang","year":"2015","unstructured":"Tang Z, Zhang X, Lan W (2015) Efficient image encryption with block shuffling and chaotic map. Multimed Tools Appl 74(15):5429\u20135448. https:\/\/doi.org\/10.1007\/s11042-014-1861-1","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"10576_CR42","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1016\/j.asoc.2009.12.011","volume":"11","author":"Y Wang","year":"2011","unstructured":"Wang Y, Wong K-W, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11(1):514\u2013522. https:\/\/doi.org\/10.1016\/j.asoc.2009.12.011","journal-title":"Appl Soft Comput"},{"key":"10576_CR43","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1016\/j.sigpro.2017.11.005","volume":"144","author":"H Wang","year":"2018","unstructured":"Wang H, Xiao D, Chen X, Huang H (2018) Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map. Signal Process 144:444\u2013452. https:\/\/doi.org\/10.1016\/j.sigpro.2017.11.005","journal-title":"Signal Process"},{"key":"10576_CR44","doi-asserted-by":"publisher","unstructured":"Zhang X, Chen W (2008) A new chaotic algorithm for image encryption. In: 2008 International Conference on Audio, Language and Image Processing. IEEE, pp 889\u2013892.\u00a0https:\/\/doi.org\/10.1016\/j.chaos.2003.12.022","DOI":"10.1016\/j.chaos.2003.12.022"},{"issue":"2","key":"10576_CR45","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1016\/j.ijleo.2013.07.069","volume":"125","author":"D Zhang","year":"2014","unstructured":"Zhang D, Zhang F (2014) Chaotic encryption and decryption of JPEG image. Optik 125(2):717\u2013720. https:\/\/doi.org\/10.1016\/j.ijleo.2013.07.069","journal-title":"Optik"},{"key":"10576_CR46","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","volume":"97","author":"Y Zhou","year":"2014","unstructured":"Zhou Y, Bao L, Chen CLP (2014) A new 1D chaotic system for image encryption. Signal Process 97:172\u2013182. https:\/\/doi.org\/10.1016\/j.sigpro.2013.10.034","journal-title":"Signal Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10576-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10576-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10576-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,20]],"date-time":"2021-05-20T09:18:15Z","timestamp":1621502295000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10576-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,17]]},"references-count":46,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["10576"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10576-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,17]]},"assertion":[{"value":"3 August 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 November 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 January 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 February 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}