{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T17:14:32Z","timestamp":1772126072684,"version":"3.50.1"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2021,2,25]],"date-time":"2021-02-25T00:00:00Z","timestamp":1614211200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,2,25]],"date-time":"2021-02-25T00:00:00Z","timestamp":1614211200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s11042-021-10664-y","type":"journal-article","created":{"date-parts":[[2021,2,25]],"date-time":"2021-02-25T14:02:45Z","timestamp":1614261765000},"page":"19307-19333","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":33,"title":["A survey on fragile watermarking based image authentication schemes"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3462-6074","authenticated-orcid":false,"given":"N. R. Neena","family":"Raj","sequence":"first","affiliation":[]},{"given":"R.","family":"Shreelekshmi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,25]]},"reference":[{"issue":"6","key":"10664_CR1","doi-asserted-by":"publisher","first-page":"1225","DOI":"10.1007\/s13042-015-0455-1","volume":"7","author":"IA Ansari","year":"2015","unstructured":"Ansari IA, Pant M, Ahn CW (2015) Svd based fragile watermarking scheme for tamper localization and self-recovery. Int J Mach Learn Cybern 7 (6):1225\u20131239","journal-title":"Int J Mach Learn Cybern"},{"key":"10664_CR2","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1016\/j.aeue.2017.06.001","volume":"79","author":"A Azeroual","year":"2017","unstructured":"Azeroual A, Afdel K (2017) Real-time image tamper localization based on fragile watermarking and faber-schauder wavelet. AEU-Int J Electron Commun 79:207\u2013218","journal-title":"AEU-Int J Electron Commun"},{"issue":"20","key":"10664_CR3","doi-asserted-by":"publisher","first-page":"21,133","DOI":"10.1007\/s11042-016-4054-2","volume":"76","author":"O Benrhouma","year":"2017","unstructured":"Benrhouma O, Hermassi H, Belghith S (2017) Security analysis and improvement of an active watermarking system for image tampering detection using a self-recovery scheme. Multimed Tools Appl 76(20):21,133\u201321,156","journal-title":"Multimed Tools Appl"},{"key":"10664_CR4","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.dsp.2017.11.005","volume":"73","author":"S Bravo-Solorio","year":"2018","unstructured":"Bravo-Solorio S, Calderon F, Li C, Nandi AK (2018) Fast fragile watermark embedding and iterative mechanism with high self-restoration performance. Digit Sig Process 73:83\u201392","journal-title":"Digit Sig Process"},{"issue":"6","key":"10664_CR5","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1109\/TIP.2002.1014990","volume":"11","author":"MU Celik","year":"2002","unstructured":"Celik MU, Sharma G, Saber E, Tekalp AM (2002) Hierarchical watermarking for secure image authentication with localization. IEEE Trans Image Process 11(6):585\u2013595","journal-title":"IEEE Trans Image Process"},{"issue":"9","key":"10664_CR6","doi-asserted-by":"publisher","first-page":"1462","DOI":"10.1016\/j.jss.2011.02.029","volume":"84","author":"CC Chang","year":"2011","unstructured":"Chang CC, Chen KN, Lee CF, Liu LJ (2011) A secure fragile watermarking scheme based on chaos-and-hamming code. J Syst Softw 84(9):1462\u20131470","journal-title":"J Syst Softw"},{"issue":"2","key":"10664_CR7","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1016\/j.patcog.2007.06.003","volume":"41","author":"CC Chang","year":"2008","unstructured":"Chang CC, Fan YH, Tai WL (2008) Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn 41(2):654\u2013661","journal-title":"Pattern Recogn"},{"issue":"5","key":"10664_CR8","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1016\/j.patrec.2005.09.006","volume":"27","author":"CC Chang","year":"2006","unstructured":"Chang CC, Hu YS, Lu TC (2006) A watermarking-based image ownership and tampering authentication scheme. Pattern Recogn Lett 27(5):439\u2013446","journal-title":"Pattern Recogn Lett"},{"issue":"10","key":"10664_CR9","doi-asserted-by":"publisher","first-page":"1197","DOI":"10.1016\/j.image.2014.09.001","volume":"29","author":"S Dadkhah","year":"2014","unstructured":"Dadkhah S, Manaf AA, Hori Y, Hassanien AE, Sadeghi S (2014) An effective svd-based image tampering detection and self-recovery using active watermarking. Sig Process Image Commun 29(10):1197\u20131210","journal-title":"Sig Process Image Commun"},{"key":"10664_CR10","doi-asserted-by":"crossref","unstructured":"Fridrich J (2002) Security of fragile authentication watermarks with localization. In: Security and watermarking of multimedia contents IV. International society for optics and photonics, vol 4675, pp 691\u2013700","DOI":"10.1117\/12.465330"},{"key":"10664_CR11","doi-asserted-by":"crossref","unstructured":"Fridrich J, Goljan M (1999) Images with self-correcting capabilities. In: Proceedings 1999 international conference on image processing 1999. ICIP 99, vol 3. IEEE, pp 792\u2013796","DOI":"10.1109\/ICIP.1999.817228"},{"issue":"2","key":"10664_CR12","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1117\/1.1459449","volume":"11","author":"J Fridrich","year":"2002","unstructured":"Fridrich J, Goljan M, Memon N (2002) Cryptanalysis of the yeung-mintzer fragile watermarking technique. J Electron Imaging 11(2):262\u2013275","journal-title":"J Electron Imaging"},{"key":"10664_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-019-08484-2","volume":"79","author":"R Geetha","year":"2020","unstructured":"Geetha R, Geetha S (2020) Embedding electronic patient information in clinical images: an improved and efficient reversible data hiding technique. Multimed Tools Appl 79:1\u201322","journal-title":"Multimed Tools Appl"},{"key":"10664_CR14","unstructured":"Gonzalez R, Woods R, Eddins S (2020) Image databases. http:\/\/www.imageprocessingplace.com. Accessed on August"},{"key":"10664_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-018-7084-0","volume":"78","author":"E Gul","year":"2019","unstructured":"Gul E, Ozturk S (2019) A novel hash function based fragile watermarking method for image integrity. Multimed Tools Appl 78:1\u201318","journal-title":"Multimed Tools Appl"},{"key":"10664_CR16","first-page":"1","volume":"11","author":"S Gull","year":"2018","unstructured":"Gull S, Loan NA, Parah SA, Sheikh JA, Bhat G (2018) An efficient watermarking technique for tamper detection and localization of medical images. J Ambient Intell Humaniz Comput 11:1\u201310","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"10664_CR17","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.jvcir.2017.09.017","volume":"50","author":"BB Haghighi","year":"2018","unstructured":"Haghighi BB, Taherinia AH, Harati A (2018) Trlh: Fragile and blind dual watermarking for image tamper detection and self-recovery based on lifting wavelet transform and halftoning technique. J Vis Commun Image Represent 50:49\u201364","journal-title":"J Vis Commun Image Represent"},{"issue":"1","key":"10664_CR18","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1109\/TIFS.2011.2162950","volume":"7","author":"H He","year":"2012","unstructured":"He H, Chen F, Tai HM, Kalker T, Zhang J (2012) Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme. IEEE Trans Inform Forensic Secur 7(1):185\u2013196","journal-title":"IEEE Trans Inform Forensic Secur"},{"issue":"2","key":"10664_CR19","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/s11235-010-9380-5","volume":"49","author":"H He","year":"2012","unstructured":"He H, Zhang J (2012) Cryptanalysis on majority-voting based self-recovery watermarking scheme. Telecommun Syst 49(2):231\u2013238","journal-title":"Telecommun Syst"},{"issue":"8","key":"10664_CR20","doi-asserted-by":"publisher","first-page":"1557","DOI":"10.1016\/j.sigpro.2009.02.009","volume":"89","author":"HJ He","year":"2009","unstructured":"He HJ, Zhang JS, Chen F (2009) Adjacent-block based statistical detection method for self-embedding watermarking techniques. Sig Process 89 (8):1557\u20131566","journal-title":"Sig Process"},{"issue":"3","key":"10664_CR21","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/83.826780","volume":"9","author":"M Holliman","year":"2000","unstructured":"Holliman M, Memon N (2000) Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans Image Process 9(3):432\u2013441","journal-title":"IEEE Trans Image Process"},{"key":"10664_CR22","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.image.2017.07.001","volume":"58","author":"W Hong","year":"2017","unstructured":"Hong W, Chen M, Chen TS (2017) An efficient reversible image authentication method using improved pvo and lsb substitution techniques. Sig Process Image Commun 58:111\u2013122","journal-title":"Sig Process Image Commun"},{"issue":"9","key":"10664_CR23","doi-asserted-by":"publisher","first-page":"1737","DOI":"10.1016\/j.optcom.2009.12.073","volume":"283","author":"CS Hsu","year":"2010","unstructured":"Hsu CS, Tu SF (2010) Probability-based tampering detection scheme for digital images. Opt Commun 283(9):1737\u20131743","journal-title":"Opt Commun"},{"issue":"1","key":"10664_CR24","doi-asserted-by":"publisher","first-page":"49","DOI":"10.51400\/2709-6998.2421","volume":"20","author":"SC Huang","year":"2012","unstructured":"Huang SC, Jiang CF (2012) A color image authentication and recovery method using block truncation code embedding. J Mar Sci Technol 20(1):49\u201355","journal-title":"J Mar Sci Technol"},{"issue":"1","key":"10664_CR25","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/s00779-017-1061-x","volume":"22","author":"C Kim","year":"2018","unstructured":"Kim C, Shin D, Yang CN (2018) Self-embedding fragile watermarking scheme to restoration of a tampered image using ambtc. Pers Ubiquit Comput 22 (1):11\u201322","journal-title":"Pers Ubiquit Comput"},{"issue":"3","key":"10664_CR26","doi-asserted-by":"publisher","first-page":"1134","DOI":"10.1109\/TIP.2012.2227769","volume":"22","author":"P Korus","year":"2013","unstructured":"Korus P, Dziech A (2013) Efficient method for content reconstruction with self-embedding. IEEE Trans Image Process 22(3):1134\u20131147","journal-title":"IEEE Trans Image Process"},{"issue":"11","key":"10664_CR27","doi-asserted-by":"publisher","first-page":"3497","DOI":"10.1016\/j.patcog.2008.05.003","volume":"41","author":"TY Lee","year":"2008","unstructured":"Lee TY, Lin SD (2008) Dual watermark for image tamper detection and recovery. Pattern Recogn 41(11):3497\u20133506","journal-title":"Pattern Recogn"},{"issue":"3","key":"10664_CR28","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1007\/s11042-011-0974-z","volume":"64","author":"C Li","year":"2013","unstructured":"Li C, Wang Y, Ma B, Zhang Z (2013) Multi-block dependency based fragile watermarking scheme for fingerprint images protection. Multimed Tools Appl 64(3):757\u2013776","journal-title":"Multimed Tools Appl"},{"issue":"12","key":"10664_CR29","doi-asserted-by":"publisher","first-page":"2519","DOI":"10.1016\/j.patcog.2005.02.007","volume":"38","author":"PL Lin","year":"2005","unstructured":"Lin PL, Hsieh CK, Huang PW (2005) A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognit 38 (12):2519\u20132529","journal-title":"Pattern Recognit"},{"key":"10664_CR30","doi-asserted-by":"crossref","unstructured":"Neena Raj NR, Shreelekshmi R (2018) Blockwise fragile watermarking schemes for tamper localization in digital images. In: International conference on control, communication, and computing (IC4). IEEE, pp 441\u2013446","DOI":"10.1109\/CETIC4.2018.8530950"},{"key":"10664_CR31","doi-asserted-by":"crossref","unstructured":"Neena Raj NR, Shreelekshmi R (2019) Security analysis of hash based fragile watermarking scheme for image integrity. In: 2019 2nd international conference on intelligent computing, instrumentation and control technologies (ICICICT), vol 1. IEEE, pp 651\u2013654","DOI":"10.1109\/ICICICT46008.2019.8993317"},{"key":"10664_CR32","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1016\/j.jbi.2017.01.006","volume":"66","author":"SA Parah","year":"2017","unstructured":"Parah SA, Ahad F, Sheikh JA, Bhat GM (2017) Hiding clinical information in medical images: a new high capacity and reversible data hiding technique. J Biomed Inform 66:214\u2013230","journal-title":"J Biomed Inform"},{"issue":"11","key":"10664_CR33","doi-asserted-by":"publisher","first-page":"3493","DOI":"10.1016\/j.patcog.2008.05.009","volume":"41","author":"RCW Phan","year":"2008","unstructured":"Phan RCW (2008) Tampering with a watermarking-based image authentication scheme. Pattern Recogn 41(11):3493\u20133496","journal-title":"Pattern Recogn"},{"issue":"29","key":"10664_CR34","doi-asserted-by":"publisher","first-page":"20897","DOI":"10.1007\/s11042-020-08715-x","volume":"79","author":"S Prasad","year":"2020","unstructured":"Prasad S, Pal AK (2020) Hamming code and logistic-map based pixel-level active forgery detection scheme using fragile watermarking. Multimed Tools Appl 79(29):20897\u201320928","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"10664_CR35","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1007\/s11042-019-08144-5","volume":"79","author":"S Prasad","year":"2020","unstructured":"Prasad S, Pal AK (2020) A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy. Multimed Tools Appl 79(3):1673\u20131705","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"10664_CR36","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MMUL.2018.112142509","volume":"25","author":"C Qin","year":"2018","unstructured":"Qin C, Ji P, Chang CC, Dong J, Sun X (2018) Non-uniform watermark sharing based on optimal iterative btc for image tampering recovery. IEEE Multimed 25(3):36\u201348","journal-title":"IEEE Multimed"},{"key":"10664_CR37","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/j.ins.2016.09.001","volume":"373","author":"C Qin","year":"2016","unstructured":"Qin C, Wang H, Zhang X, Sun X (2016) Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode. Inform Sci 373:233\u2013250","journal-title":"Inform Sci"},{"key":"10664_CR38","first-page":"1","volume":"79","author":"V Rajput","year":"2019","unstructured":"Rajput V, Ansari IA (2019) Image tamper detection and self-recovery using multiple median watermarking. Multimed Tools Appl 79:1\u201317","journal-title":"Multimed Tools Appl"},{"issue":"10","key":"10664_CR39","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1016\/j.aeue.2011.01.016","volume":"65","author":"S Rawat","year":"2011","unstructured":"Rawat S, Raman B (2011) A chaotic system based fragile watermarking scheme for image tamper detection. AEU-Int J Electron Commun 65(10):840\u2013847","journal-title":"AEU-Int J Electron Commun"},{"issue":"7","key":"10664_CR40","doi-asserted-by":"publisher","first-page":"2266","DOI":"10.1109\/TIP.2015.2414878","volume":"24","author":"S Sarreshtedari","year":"2015","unstructured":"Sarreshtedari S, Akhaee MA (2015) A source-channel coding approach to digital image protection and self-recovery. IEEE Trans Image Process 24 (7):2266\u20132277","journal-title":"IEEE Trans Image Process"},{"key":"10664_CR41","doi-asserted-by":"publisher","first-page":"10269","DOI":"10.1109\/ACCESS.2018.2799240","volume":"6","author":"A Shehab","year":"2018","unstructured":"Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6:10269\u201310278","journal-title":"IEEE Access"},{"key":"10664_CR42","doi-asserted-by":"publisher","first-page":"775","DOI":"10.1016\/j.jvcir.2016.04.023","volume":"38","author":"D Singh","year":"2016","unstructured":"Singh D, Singh SK (2016) Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability. J Vis Commun Image Represent 38:775\u2013789","journal-title":"J Vis Commun Image Represent"},{"issue":"1","key":"10664_CR43","doi-asserted-by":"publisher","first-page":"953","DOI":"10.1007\/s11042-015-3010-x","volume":"76","author":"D Singh","year":"2017","unstructured":"Singh D, Singh SK (2017) Dct based efficient fragile watermarking scheme for image authentication and restoration. Multimed Tools Appl 76(1):953\u2013977","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"10664_CR44","doi-asserted-by":"publisher","first-page":"4197","DOI":"10.1007\/s11042-017-5454-7","volume":"78","author":"D Singh","year":"2019","unstructured":"Singh D, Singh SK (2019) Block truncation coding based effective watermarking scheme for image authentication with recovery capability. Multimed Tools Appl 78(4):4197\u20134215","journal-title":"Multimed Tools Appl"},{"issue":"7","key":"10664_CR45","doi-asserted-by":"publisher","first-page":"1193","DOI":"10.1007\/s13042-017-0641-4","volume":"9","author":"K Sreenivas","year":"2018","unstructured":"Sreenivas K, Prasad VK (2018) Fragile watermarking schemes for image authentication: a survey. Int J Mach Learn Cybern 9(7):1193\u20131218","journal-title":"Int J Mach Learn Cybern"},{"key":"10664_CR46","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.image.2018.03.011","volume":"65","author":"WL Tai","year":"2018","unstructured":"Tai WL, Liao ZJ (2018) Image self-recovery with watermark self-embedding. Signal Process Image Commun 65:11\u201325","journal-title":"Signal Process Image Commun"},{"issue":"3","key":"10664_CR47","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1016\/j.image.2012.12.003","volume":"28","author":"X Tong","year":"2013","unstructured":"Tong X, Liu Y, Zhang M, Chen Y (2013) A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Sig Process Image Commun 28(3):301\u2013308","journal-title":"Sig Process Image Commun"},{"issue":"4","key":"10664_CR48","first-page":"18","volume":"20","author":"S Walton","year":"1995","unstructured":"Walton S (1995) Image authentication for a slippery new age. Dr Dobb\u2019s J 20(4):18\u201326","journal-title":"Dr Dobb\u2019s J"},{"issue":"5","key":"10664_CR49","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1016\/j.csi.2006.11.009","volume":"29","author":"MS Wang","year":"2007","unstructured":"Wang MS, Chen WC (2007) A majority-voting based watermarking scheme for color image tamper detection and recovery. Comput Stand Interfaces 29 (5):561\u2013570","journal-title":"Comput Stand Interfaces"},{"issue":"4","key":"10664_CR50","doi-asserted-by":"publisher","first-page":"548","DOI":"10.3390\/app8040548","volume":"8","author":"C Wang","year":"2018","unstructured":"Wang C, Zhang H, Zhou X (2018) A self-recovery fragile image watermarking with variable watermark capacity. Appl Sci 8(4):548","journal-title":"Appl Sci"},{"key":"10664_CR51","doi-asserted-by":"crossref","unstructured":"Wong PW (1998) A public key watermark for image verification and authentication. In: Proceedings international conference on image processing (ICIP), vol 1, IEEE, pp 455\u2013459","DOI":"10.1109\/ICIP.1998.723526"},{"key":"10664_CR52","unstructured":"Wong PW (1998) A watermark for image integrity and ownership verification. In: PICS, pp 374\u2013379"},{"issue":"10","key":"10664_CR53","doi-asserted-by":"publisher","first-page":"1593","DOI":"10.1109\/83.951543","volume":"10","author":"PW Wong","year":"2001","unstructured":"Wong PW, Memon N (2001) Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10(10):1593\u20131601","journal-title":"IEEE Trans Image Process"},{"key":"10664_CR54","unstructured":"Yeung MM, Mintzer F (1997) An invisible watermarking technique for image verification. In: Proceedings international conference on image processing (ICIP), vol 2. IEEE, pp 680\u2013683"},{"issue":"8","key":"10664_CR55","doi-asserted-by":"publisher","first-page":"1490","DOI":"10.1109\/TMM.2008.2007334","volume":"10","author":"X Zhang","year":"2008","unstructured":"Zhang X, Wang S (2008) Fragile watermarking with error-free restoration capability. IEEE Trans Multimed 10(8):1490\u20131499","journal-title":"IEEE Trans Multimed"},{"issue":"2","key":"10664_CR56","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1109\/TIP.2010.2066981","volume":"20","author":"X Zhang","year":"2011","unstructured":"Zhang X, Wang S, Qian Z, Feng G (2011) Reference sharing mechanism for watermark self-embedding. IEEE Trans Image Process 20(2):485\u2013495","journal-title":"IEEE Trans Image Process"},{"key":"10664_CR57","unstructured":"(2020) The cvg-ugr image database. http:\/\/decsai.ugr.es\/cvg\/dbimagenes, Accessed on August"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10664-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10664-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10664-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,29]],"date-time":"2023-01-29T15:09:29Z","timestamp":1675004969000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10664-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,25]]},"references-count":57,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["10664"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10664-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,25]]},"assertion":[{"value":"30 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 October 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 February 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}