{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T23:58:00Z","timestamp":1769817480904,"version":"3.49.0"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2021,3,6]],"date-time":"2021-03-06T00:00:00Z","timestamp":1614988800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,6]],"date-time":"2021-03-06T00:00:00Z","timestamp":1614988800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s11042-021-10730-5","type":"journal-article","created":{"date-parts":[[2021,3,6]],"date-time":"2021-03-06T06:02:46Z","timestamp":1615010566000},"page":"20449-20476","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["A secure method in digital video watermarking with transform domain algorithms"],"prefix":"10.1007","volume":"80","author":[{"given":"Mohammad Reza","family":"Keyvanpour","sequence":"first","affiliation":[]},{"given":"Neda","family":"Khanbani","sequence":"additional","affiliation":[]},{"given":"Mahsa","family":"Boreiry","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,6]]},"reference":[{"key":"10730_CR1","doi-asserted-by":"publisher","first-page":"5617","DOI":"10.1007\/s11042-019-08023-z","volume":"79","author":"KM Abdelwahab","year":"2020","unstructured":"Abdelwahab KM, Abd El-atty SM, El-Shafai W et al (2020) Efficient SVD-based audio watermarking technique in FRT domain. Multimed Tools Appl 79:5617\u20135648","journal-title":"Multimed Tools Appl"},{"key":"10730_CR2","doi-asserted-by":"publisher","first-page":"8603","DOI":"10.1007\/s11042-018-7128-5","volume":"78","author":"N Agarwal","year":"2019","unstructured":"Agarwal N, Singh AK, Singh PK (2019) Survey of robust and imperceptible watermarking. Multimed Tools Appl 78:8603\u20138633. https:\/\/doi.org\/10.1007\/s11042-018-7128-5","journal-title":"Multimed Tools Appl"},{"key":"10730_CR3","doi-asserted-by":"publisher","first-page":"1075","DOI":"10.1007\/s11042-019-08197-6","volume":"79","author":"SBB Ahmadi","year":"2020","unstructured":"Ahmadi SBB, Zhang G, Wei S (2020) Robust and hybrid SVD-based image watermarking schemes. Multimed Tools Appl 79:1075\u20131117. https:\/\/doi.org\/10.1007\/s11042-019-08197-6","journal-title":"Multimed Tools Appl"},{"key":"10730_CR4","doi-asserted-by":"publisher","first-page":"16239","DOI":"10.1007\/s11042-016-3906-0","volume":"76","author":"NaAS Al-Maweri","year":"2017","unstructured":"Al-Maweri NaAS, Sabri AQM, Mansoor AM et al (2017) Metadata hiding for UAV video based on digital watermarking in DWT transform. Multimed Tools Appl 76:16239\u201316261. https:\/\/doi.org\/10.1007\/s11042-016-3906-0","journal-title":"Multimed Tools Appl"},{"key":"10730_CR5","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/s11042-016-4226-0","volume":"77","author":"Z Bahrami","year":"2018","unstructured":"Bahrami Z, Akhlaghian Tab F (2018) A new robust video watermarking algorithm based on SURF features and block classification. Multimed Tools Appl 77:327\u2013345. https:\/\/doi.org\/10.1007\/s11042-016-4226-0","journal-title":"Multimed Tools Appl"},{"key":"10730_CR6","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/s11042-016-4226-0","volume":"77","author":"Z Bahrami","year":"2018","unstructured":"Bahrami Z, Akhlaghian Tab F (2018) A new robust video watermarking algorithm based on SURF features and block classification. Multimed Tools Appl 77:327\u2013345. https:\/\/doi.org\/10.1007\/s11042-016-4226-0","journal-title":"Multimed Tools Appl"},{"key":"10730_CR7","doi-asserted-by":"publisher","first-page":"14361","DOI":"10.1007\/s11042-017-5033-y","volume":"77","author":"I Bayoudh","year":"2018","unstructured":"Bayoudh I, Ben Jabra S, Zagrouba E (2018) Online multi-sprites based video watermarking robust to collusion and transcoding attacks for emerging applications. Multimed Tools Appl 77:14361\u201314379. https:\/\/doi.org\/10.1007\/s11042-017-5033-y","journal-title":"Multimed Tools Appl"},{"key":"10730_CR8","doi-asserted-by":"publisher","first-page":"19659","DOI":"10.1007\/s11042-017-5340-3","volume":"77","author":"A Bhardwaj","year":"2018","unstructured":"Bhardwaj A, Verma VS, Jha RK (2018) Robust video watermarking using significant frame selection based on coefficient difference of lifting wavelet transform. Multimed Tools Appl 77:19659\u201319678. https:\/\/doi.org\/10.1007\/s11042-017-5340-3","journal-title":"Multimed Tools Appl"},{"key":"10730_CR9","doi-asserted-by":"publisher","first-page":"26089","DOI":"10.1007\/s11042-019-07809-5","volume":"78","author":"Z Cao","year":"2019","unstructured":"Cao Z, Wang L (2019) A secure video watermarking technique based on hyperchaotic Lorentz system. Multimed Tools Appl 78:26089\u201326109. https:\/\/doi.org\/10.1007\/s11042-019-07809-5","journal-title":"Multimed Tools Appl"},{"key":"10730_CR10","doi-asserted-by":"publisher","first-page":"26089","DOI":"10.1007\/s11042-019-07809-5","volume":"78","author":"Z Cao","year":"2019","unstructured":"Cao Z, Wang L (2019) A secure video watermarking technique based on hyperchaotic Lorentz system. Multimed Tools Appl 78:26089\u201326109. https:\/\/doi.org\/10.1007\/s11042-019-07809-5","journal-title":"Multimed Tools Appl"},{"key":"10730_CR11","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1007\/s11042-019-08087-x","volume":"79","author":"A Chopra","year":"2020","unstructured":"Chopra A, Gupta S, Dhall S (2020) Analysis of frequency domain watermarking techniques in presence of geometric and simple attacks. Multimed Tools Appl 79:501\u2013554. https:\/\/doi.org\/10.1007\/s11042-019-08087-x","journal-title":"Multimed Tools Appl"},{"key":"10730_CR12","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s41870-017-0054-3","volume":"10","author":"S Das","year":"2018","unstructured":"Das S, Banerjee M, Chaudhuri A (2018) An improved video key-frame extraction algorithm leads to video watermarking. Int j inf tecnol 10:21\u201334. https:\/\/doi.org\/10.1007\/s41870-017-0054-3","journal-title":"Int j inf tecnol"},{"key":"10730_CR13","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/s13319-019-0223-1","volume":"10","author":"D Dhaou","year":"2019","unstructured":"Dhaou D, Jabra BS, Zagrouba EA (2019) Review on Anaglyph 3D Image and Video Watermarking. 3D Res 10:13. https:\/\/doi.org\/10.1007\/s13319-019-0223-1","journal-title":"3D Res"},{"key":"10730_CR14","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/s13319-019-0223-1","volume":"10","author":"D Dhaou","year":"2019","unstructured":"Dhaou D, Ben Jabra S, Zagrouba E (2019) A review on anaglyph 3D image and video watermarking. 3D. Res 10:13. https:\/\/doi.org\/10.1007\/s13319-019-0223-1","journal-title":"Res"},{"key":"10730_CR15","volume-title":"Computer vision in control systems\u20146. Intelligent systems reference library","author":"MN Favorskaya","year":"2020","unstructured":"Favorskaya MN (2020) Watermarking models of video sequences. In: Favorskaya M, Jain L (eds) Computer vision in control systems\u20146. Intelligent systems reference library, vol 182. Springer, Cham"},{"key":"10730_CR16","doi-asserted-by":"publisher","first-page":"2539","DOI":"10.1007\/s00542-017-3689-x","volume":"24","author":"G Gupta","year":"2018","unstructured":"Gupta G, Gupta VK, Chandra M (2018) An efficient video watermarking based security model. Microsyst Technol 24:2539\u20132548. https:\/\/doi.org\/10.1007\/s00542-017-3689-x","journal-title":"Microsyst Technol"},{"key":"10730_CR17","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1186\/s13640-020-00500-y","volume":"2020","author":"J He","year":"2020","unstructured":"He J, Ying Q, Qian Z, Feng G, Zhang X (2020) Semi-structured data protection scheme based on robust watermarking. J Image Video Proc 2020:12. https:\/\/doi.org\/10.1186\/s13640-020-00500-y","journal-title":"J Image Video Proc"},{"key":"10730_CR18","doi-asserted-by":"publisher","first-page":"8603","DOI":"10.1007\/s11042-017-4754-2","volume":"77","author":"Y Himeur","year":"2018","unstructured":"Himeur Y, Boukabou A (2018) A robust and secure key-frames based video watermarking system using chaotic encryption. Multimed Tools Appl 77:8603\u20138627. https:\/\/doi.org\/10.1007\/s11042-017-4754-2","journal-title":"Multimed Tools Appl"},{"key":"10730_CR19","doi-asserted-by":"publisher","first-page":"8603","DOI":"10.1007\/s11042-017-4754-2","volume":"77","author":"Y Himeur","year":"2018","unstructured":"Himeur Y, Boukabou A (2018) A robust and secure key-frames based video watermarking system using chaotic encryption. Multimed Tools Appl 77:8603\u20138627","journal-title":"Multimed Tools Appl"},{"key":"10730_CR20","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.ins.2016.01.017","volume":"339","author":"Z Hua","year":"2016","unstructured":"Hua Z, Zhou Y (2016) Image encryption using 2D logistic-adjustedSine map. Inf Sci 339:237\u2013253","journal-title":"Inf Sci"},{"key":"10730_CR21","doi-asserted-by":"publisher","first-page":"2127","DOI":"10.1007\/s11042-019-08225-5","volume":"79","author":"M Jafari Barani","year":"2020","unstructured":"Jafari Barani M, Ayubi P, Yousefi Valandar M, Yosefnezhad Irani B (2020) A blind video watermarking algorithm robust to lossy video compression attacks based on generalized Newton complex map and contourlet transform. Multimed Tools Appl 79:2127\u20132159. https:\/\/doi.org\/10.1007\/s11042-019-08225-5","journal-title":"Multimed Tools Appl"},{"key":"10730_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-3773-3_42","volume-title":"advances in computer and computational sciences. Advances in intelligent systems and computing","author":"R Jain","year":"2018","unstructured":"Jain R, Trivedi MC, Tiwari S (2018) digital audio watermarking: a survey. In: Bhatia S, Mishra K, Tiwari S, Singh V (eds) advances in computer and computational sciences. Advances in intelligent systems and computing, vol 554. Springer, Singapore. https:\/\/doi.org\/10.1007\/978-981-10-3773-3_42"},{"key":"10730_CR23","volume-title":"Progress in advanced computing and intelligent engineering. Advances in intelligent systems and computing","author":"R Jakhmola","year":"2019","unstructured":"Jakhmola R, Rani R (2019) Enhanced digital video watermarking technique using 2-level DWT. In: Pati B, Panigrahi C, Misra S, Pujari A, Bakshi S (eds) Progress in advanced computing and intelligent engineering. Advances in intelligent systems and computing, vol 713. Springer, Singapore"},{"key":"10730_CR24","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1007\/s00530-017-0584-3","volume":"24","author":"S Kadu","year":"2018","unstructured":"Kadu S, Cheggoju N, Satpute VR (2018) Noise-resilient compressed domain video watermarking system for in-car camera security. Multimedia Systems 24:583\u2013595. https:\/\/doi.org\/10.1007\/s00530-017-0584-3","journal-title":"Multimedia Systems"},{"key":"10730_CR25","doi-asserted-by":"crossref","unstructured":"Kanocz T, Tokar T, Levicky D. (2009) Robust frame by frame video watermarking resistant against collusion attacks, IEEE, in Radioelektronika, RADIOELEKTRONIKA'09. 19th international conference, 99-102","DOI":"10.1109\/RADIOELEK.2009.5158760"},{"issue":"2","key":"10730_CR26","first-page":"199","volume":"28","author":"A Karmakar","year":"2016","unstructured":"Karmakar A, Phadikar A, Phadikar BS (2016) A blind video watermarking scheme resistant to rotation and collusion attacks. J King Saud Univ-Comput Inform Sci 28(2):199\u2013210","journal-title":"J King Saud Univ-Comput Inform Sci"},{"key":"10730_CR27","doi-asserted-by":"publisher","first-page":"20149","DOI":"10.1007\/s11042-020-08881-y","volume":"79","author":"S Kumar","year":"2020","unstructured":"Kumar S, Singh BK, Yadav M (2020) A recent survey on multimedia and database watermarking. Multimed Tools Appl 79:20149\u201320197. https:\/\/doi.org\/10.1007\/s11042-020-08881-y","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"10730_CR28","doi-asserted-by":"publisher","first-page":"2781","DOI":"10.1007\/s11042-013-1678-3","volume":"74","author":"Z Li","year":"2015","unstructured":"Li Z, Chen XW, Ma J (2015) Adaptively imperceptible video watermarking based on the local motion entropy. Multimed Tools Appl 74(8):2781\u20132802","journal-title":"Multimed Tools Appl"},{"key":"10730_CR29","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s11042-019-08074-2","volume":"79","author":"AW Luo","year":"2020","unstructured":"Luo AW, Gong LH, Zhou NR, Zou WP (2020) Adaptive and blind watermarking scheme based on optimal SVD blocks selection. Multimed Tools Appl 79:243\u2013261. https:\/\/doi.org\/10.1007\/s11042-019-08074-2","journal-title":"Multimed Tools Appl"},{"key":"10730_CR30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63673-3_61","volume-title":"Information and Communication Technology for Intelligent Systems (ICTIS 2017) - Volume 1. ICTIS 2017. Smart innovation, systems and technologies","author":"S Maloo","year":"2018","unstructured":"Maloo S, Lakshmi N, Pareek NK (2018) Study of Digital Watermarking Techniques for Against Security Attacks. In: Satapathy S, Joshi A (eds) Information and Communication Technology for Intelligent Systems (ICTIS 2017) - Volume 1. ICTIS 2017. Smart innovation, systems and technologies, vol 83. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-319-63673-3_61"},{"key":"10730_CR31","doi-asserted-by":"publisher","first-page":"2791","DOI":"10.1007\/s11042-017-4427-1","volume":"77","author":"AA Mohammed","year":"2018","unstructured":"Mohammed AA, Ali NA (2018) Robust video watermarking scheme using high efficiency video coding attack. Multimed Tools Appl 77:2791\u20132806. https:\/\/doi.org\/10.1007\/s11042-017-4427-1","journal-title":"Multimed Tools Appl"},{"key":"10730_CR32","doi-asserted-by":"publisher","first-page":"2791","DOI":"10.1007\/s11042-017-4427-1","volume":"77","author":"AA Mohammed","year":"2018","unstructured":"Mohammed AA, Ali NA (2018) Robust video watermarking scheme using high efficiency video coding attack. Multimed Tools Appl 77:2791\u20132806. https:\/\/doi.org\/10.1007\/s11042-017-4427-1","journal-title":"Multimed Tools Appl"},{"key":"10730_CR33","doi-asserted-by":"publisher","first-page":"26837","DOI":"10.1007\/s11042-020-09258-x","volume":"79","author":"R Shoitan","year":"2020","unstructured":"Shoitan R, Moussa MM, Elshoura SM (2020) A robust video watermarking scheme based on Laplacian pyramid, SVD, and DWT with improved robustness towards geometric attacks via SURF. Multimed Tools Appl 79:26837\u201326860. https:\/\/doi.org\/10.1007\/s11042-020-09258-x","journal-title":"Multimed Tools Appl"},{"key":"10730_CR34","doi-asserted-by":"publisher","first-page":"16419","DOI":"10.1007\/s11042-017-5213-9","volume":"77","author":"KM Singh","year":"2018","unstructured":"Singh KM (2018) A robust rotation resilient video watermarking scheme based on the SIFT. Multimed Tools Appl 77:16419\u201316444. https:\/\/doi.org\/10.1007\/s11042-017-5213-9","journal-title":"Multimed Tools Appl"},{"key":"10730_CR35","doi-asserted-by":"publisher","first-page":"16445","DOI":"10.1007\/s11042-017-5345-y","volume":"77","author":"KM Singh","year":"2018","unstructured":"Singh KM (2018) Correction to: a robust rotation resilient video watermarking scheme based on the SIFT. Multimed Tools Appl 77:16445. https:\/\/doi.org\/10.1007\/s11042-017-5345-y","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"10730_CR36","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1016\/j.aeue.2013.01.008","volume":"67","author":"TR Singh","year":"2013","unstructured":"Singh TR, Singh KM, Roy S (2013) Video watermarking scheme based on visual cryptography and scene change detection. AEU-Int J Electron Commun 67(8):645\u2013651","journal-title":"AEU-Int J Electron Commun"},{"key":"10730_CR37","doi-asserted-by":"publisher","unstructured":"Singh OP, Singh AK, Srivastava G, Kumar N (2020) Image watermarking using soft computing techniques: a comprehensive survey. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-020-09606-x","DOI":"10.1007\/s11042-020-09606-x"},{"key":"10730_CR38","doi-asserted-by":"publisher","first-page":"7515","DOI":"10.1007\/s11042-019-08530-z","volume":"79","author":"C Tian","year":"2020","unstructured":"Tian C, Wen RH, Zou WP, Gong LH (2020) Robust and blind watermarking algorithm based on DCT and SVD in the contourlet domain. Multimed Tools Appl 79:7515\u20137541. https:\/\/doi.org\/10.1007\/s11042-019-08530-z","journal-title":"Multimed Tools Appl"},{"key":"10730_CR39","doi-asserted-by":"publisher","first-page":"1759","DOI":"10.1007\/s11042-019-08256-y","volume":"79","author":"L Tian","year":"2020","unstructured":"Tian L, Dai H, Li C (2020) A semi-fragile video watermarking algorithm based on chromatic residual DCT. Multimed Tools Appl 79:1759\u20131779. https:\/\/doi.org\/10.1007\/s11042-019-08256-y","journal-title":"Multimed Tools Appl"},{"key":"10730_CR40","doi-asserted-by":"publisher","first-page":"22727","DOI":"10.1007\/s11042-020-08987-3","volume":"79","author":"JY Wu","year":"2020","unstructured":"Wu JY, Huang WL, Xia-Hou WM, Zou WP, Gong LH (2020) Imperceptible digital watermarking scheme combining 4-level discrete wavelet transform with singular value decomposition. Multimed Tools Appl 79:22727\u201322747. https:\/\/doi.org\/10.1007\/s11042-020-08987-3","journal-title":"Multimed Tools Appl"},{"key":"10730_CR41","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/j.compeleceng.2015.04.001","volume":"46","author":"W Xiang-yang","year":"2015","unstructured":"Xiang-yang W, Yu-nan L, Shuo L, Hong-ying Y, Pan-pan N, Yan Z (2015) A new robust digital watermarking using local polar harmonic transform. Comput Electr Eng 46:403\u2013418","journal-title":"Comput Electr Eng"},{"key":"10730_CR42","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2019. ASIACRYPT 2019. Lecture notes in computer science","author":"R Yang","year":"2019","unstructured":"Yang R, Au MH, Lai J, Xu Q, Yu Z (2019) Collusion Resistant Watermarking Schemes for Cryptographic Functionalities. In: Galbraith S, Moriai S (eds) Advances in Cryptology \u2013 ASIACRYPT 2019. ASIACRYPT 2019. Lecture notes in computer science, vol 11921. Springer, Cham"},{"key":"10730_CR43","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1007\/s11554-015-0557-8","volume":"13","author":"G Yoo","year":"2017","unstructured":"Yoo G, Kim H (2017) Real-time video watermarking techniques robust against re-encoding. J Real-Time Image Proc 13:467\u2013477. https:\/\/doi.org\/10.1007\/s11554-015-0557-8","journal-title":"J Real-Time Image Proc"},{"key":"10730_CR44","doi-asserted-by":"publisher","first-page":"30251","DOI":"10.1007\/s11042-018-6128-9","volume":"77","author":"NR Zhou","year":"2018","unstructured":"Zhou NR, Hou WMX, Wen RH, Zou WP (2018) Imperceptible digital watermarking scheme in multiple transform domains. Multimed Tools Appl 77:30251\u201330267. https:\/\/doi.org\/10.1007\/s11042-018-6128-9","journal-title":"Multimed Tools Appl"},{"key":"10730_CR45","doi-asserted-by":"publisher","first-page":"2507","DOI":"10.1007\/s11042-018-6322-9","volume":"78","author":"NR Zhou","year":"2019","unstructured":"Zhou NR, Luo AW, Zou WP (2019) Secure and robust watermark scheme based on multiple transforms and particle swarm optimization algorithm. Multimed Tools Appl 78:2507\u20132523. https:\/\/doi.org\/10.1007\/s11042-018-6322-9","journal-title":"Multimed Tools Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10730-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10730-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10730-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,21]],"date-time":"2021-05-21T06:21:20Z","timestamp":1621578080000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10730-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,6]]},"references-count":45,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["10730"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10730-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,6]]},"assertion":[{"value":"13 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 February 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 March 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest\/competing interests"}}]}}