{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:46:25Z","timestamp":1767339985957,"version":"3.40.5"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"16","license":[{"start":{"date-parts":[[2021,4,3]],"date-time":"2021-04-03T00:00:00Z","timestamp":1617408000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,4,3]],"date-time":"2021-04-03T00:00:00Z","timestamp":1617408000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"TATA Realty-IT city -SASTRA Srinivasa Ramanujan Research cell"},{"name":"DST-FIST","award":["SR\/FST\/ETI-371\/2014","SR\/FST\/MSI-107\/2015"],"award-info":[{"award-number":["SR\/FST\/ETI-371\/2014","SR\/FST\/MSI-107\/2015"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s11042-021-10798-z","type":"journal-article","created":{"date-parts":[[2021,4,3]],"date-time":"2021-04-03T05:02:46Z","timestamp":1617426166000},"page":"24221-24243","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["A novel cross cosine map based medical image cryptosystem using dynamic bit-level diffusion"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9827-0807","authenticated-orcid":false,"given":"Sujarani","family":"Rajendran","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4182-7461","authenticated-orcid":false,"given":"Kannan","family":"Krithivasan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7604-0928","authenticated-orcid":false,"given":"Manivannan","family":"Doraipandian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,3]]},"reference":[{"key":"10798_CR1","unstructured":"Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography"},{"key":"10798_CR2","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-319-14054-4_10","volume":"8893","author":"AA Abdulla","year":"2014","unstructured":"Abdulla AA, Sellahewa H, Jassim SA (2014) Stego quality enhancement by message size reduction and fibonacci bit-plane mapping. Lect Notes Comput Sci 8893:151\u2013166. https:\/\/doi.org\/10.1007\/978-3-319-14054-4_10","journal-title":"Lect Notes Comput Sci"},{"key":"10798_CR3","doi-asserted-by":"publisher","first-page":"806","DOI":"10.1016\/j.aeue.2012.01.015","volume":"66","author":"AH Abdullah","year":"2012","unstructured":"Abdullah AH, Enayatifar R, Lee M (2012) A hybrid genetic algorithm and chaotic function model for image encryption. AEU Int J Electron Commun 66:806\u2013816. https:\/\/doi.org\/10.1016\/j.aeue.2012.01.015","journal-title":"AEU Int J Electron Commun"},{"key":"10798_CR4","doi-asserted-by":"publisher","first-page":"19853","DOI":"10.1007\/s11042-020-08850-5","volume":"79","author":"TS Ali","year":"2020","unstructured":"Ali TS, Ali R (2020) A new chaos based color image encryption algorithm using permutation substitution and Boolean operation. Multimed Tools Appl 79:19853\u201319873. https:\/\/doi.org\/10.1007\/s11042-020-08850-5","journal-title":"Multimed Tools Appl"},{"key":"10798_CR5","doi-asserted-by":"publisher","first-page":"71974","DOI":"10.1109\/ACCESS.2020.2987615","volume":"8","author":"TS Ali","year":"2020","unstructured":"Ali TS, Ali R (2020) A novel medical image Signcryption scheme using TLTS and Henon chaotic map. IEEE Access 8:71974\u201371992. https:\/\/doi.org\/10.1109\/ACCESS.2020.2987615","journal-title":"IEEE Access"},{"key":"10798_CR6","doi-asserted-by":"publisher","first-page":"31467","DOI":"10.1007\/s11042-019-07981-8","volume":"78","author":"JA Attaullah","year":"2019","unstructured":"Attaullah JA, Shah T (2019) Cryptosystem techniques based on the improved Chebyshev map: an application in image encryption. Multimed Tools Appl 78:31467\u201331484. https:\/\/doi.org\/10.1007\/s11042-019-07981-8","journal-title":"Multimed Tools Appl"},{"key":"10798_CR7","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.image.2015.09.006","volume":"39","author":"R Bechikh","year":"2015","unstructured":"Bechikh R, Hermassi H, El-latif AAA et al (2015) Signal processing : image communication breaking an image encryption scheme based on a spatiotemporal chaotic system. Signal Process Image Commun 39:151\u2013158. https:\/\/doi.org\/10.1016\/j.image.2015.09.006","journal-title":"Signal Process Image Commun"},{"key":"10798_CR8","unstructured":"Benvenuto CJ (2012) Galois field in cryptography. 1\u201311"},{"key":"10798_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cmpb.2011.09.015","volume":"16","author":"D Bouslimi","year":"2011","unstructured":"Bouslimi D, Coatrieux G, Roux C (2011) A joint encryption \/ watermarking algorithm for verifying the reliability of medical images : application to echographic. Comput Methods Prog Biomed 16:1\u20138. https:\/\/doi.org\/10.1016\/j.cmpb.2011.09.015","journal-title":"Comput Methods Prog Biomed"},{"key":"10798_CR10","unstructured":"CENTER ITR (2019) https:\/\/www.idtheftcenter.org\/wp-content\/uploads\/2020\/01\/01.28.2020_ITRC_2019-End-of-Year-Data-Breach-Report_FINAL. 237."},{"key":"10798_CR11","doi-asserted-by":"publisher","first-page":"35419","DOI":"10.1007\/s11042-019-08168-x","volume":"78","author":"X Chai","year":"2019","unstructured":"Chai X, Zhang J, Gan Z, Zhang Y (2019) Medical image encryption algorithm based on Latin square and memristive chaotic system. Multimed Tools Appl 78:35419\u201335453. https:\/\/doi.org\/10.1007\/s11042-019-08168-x","journal-title":"Multimed Tools Appl"},{"key":"10798_CR12","doi-asserted-by":"publisher","first-page":"8065","DOI":"10.1007\/s00521-019-04312-8","volume":"32","author":"X Chai","year":"2020","unstructured":"Chai X, Zheng X, Gan Z, Chen Y (2020) Exploiting plaintext-related mechanism for secure color image encryption. Neural Comput & Applic 32:8065\u20138088. https:\/\/doi.org\/10.1007\/s00521-019-04312-8","journal-title":"Neural Comput & Applic"},{"key":"10798_CR13","doi-asserted-by":"publisher","unstructured":"Chen J, Chen L, Zhang LY, Zhu Z liang (2019) Medical image cipher using hierarchical diffusion and non-sequential encryption. Nonlinear Dyn 96:301\u2013322. https:\/\/doi.org\/10.1007\/s11071-019-04791-3","DOI":"10.1007\/s11071-019-04791-3"},{"key":"10798_CR14","doi-asserted-by":"publisher","first-page":"20665","DOI":"10.1007\/s11042-019-08322-5","volume":"79","author":"IF Elashry","year":"2020","unstructured":"Elashry IF, El-Shafai W, Hasan ES et al (2020) Efficient chaotic-based image cryptosystem with different modes of operation. Multimed Tools Appl 79:20665\u201320687. https:\/\/doi.org\/10.1007\/s11042-019-08322-5","journal-title":"Multimed Tools Appl"},{"key":"10798_CR15","doi-asserted-by":"publisher","first-page":"1066","DOI":"10.1016\/j.optlaseng.2013.03.010","volume":"51","author":"R Enayatifar","year":"2013","unstructured":"Enayatifar R, Abdullah AH, Lee M (2013) A weighted discrete imperialist competitive algorithm (WDICA) combined with chaotic map for image encryption. Opt Lasers Eng 51:1066\u20131077. https:\/\/doi.org\/10.1016\/j.optlaseng.2013.03.010","journal-title":"Opt Lasers Eng"},{"key":"10798_CR16","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.optlaseng.2013.12.003","volume":"56","author":"R Enayatifar","year":"2014","unstructured":"Enayatifar R, Hanan A, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56:83\u201393. https:\/\/doi.org\/10.1016\/j.optlaseng.2013.12.003","journal-title":"Opt Lasers Eng"},{"key":"10798_CR17","doi-asserted-by":"publisher","first-page":"2495","DOI":"10.1007\/s11042-019-08190-z","volume":"79","author":"OS Faragallah","year":"2020","unstructured":"Faragallah OS, AlZain MA, El-Sayed HS et al (2020) Secure color image cryptosystem based on chaotic logistic in the FrFT domain. Multimed Tools Appl 79:2495\u20132519. https:\/\/doi.org\/10.1007\/s11042-019-08190-z","journal-title":"Multimed Tools Appl"},{"key":"10798_CR18","doi-asserted-by":"publisher","first-page":"1000","DOI":"10.1016\/j.compbiomed.2013.05.005","volume":"43","author":"C Fu","year":"2013","unstructured":"Fu C, Meng W, Zhan Y, Zhu ZL, Lau FCM, Tse CK, Ma HF (2013) An efficient and secure medical image protection scheme based on chaotic maps. Comput Biol Med 43:1000\u20131010","journal-title":"Comput Biol Med"},{"key":"10798_CR19","doi-asserted-by":"crossref","unstructured":"Guesmi R, Farah MAB (2020) A new efficient medical image cipher based on hybrid chaotic map and DNA code","DOI":"10.1007\/s11042-020-09672-1"},{"key":"10798_CR20","unstructured":"(2012) https:\/\/www.garykessler.net\/library\/byte_logic_table.html."},{"key":"10798_CR21","doi-asserted-by":"publisher","first-page":"788","DOI":"10.1016\/j.jnca.2009.02.009","volume":"32","author":"J Hu","year":"2009","unstructured":"Hu J, Han F (2009) A pixel-based scrambling scheme for digital medical images protection. J Netw Comput Appl 32:788\u2013794. https:\/\/doi.org\/10.1016\/j.jnca.2009.02.009","journal-title":"J Netw Comput Appl"},{"key":"10798_CR22","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.sigpro.2017.10.004","volume":"144","author":"Z Hua","year":"2018","unstructured":"Hua Z, Yi S, Zhou Y (2018) Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process 144:134\u2013144. https:\/\/doi.org\/10.1016\/j.sigpro.2017.10.004","journal-title":"Signal Process"},{"key":"10798_CR23","doi-asserted-by":"publisher","first-page":"27483","DOI":"10.1007\/s11042-020-09163-3","volume":"79","author":"R Huang","year":"2020","unstructured":"Huang R, Liao X, Dong A, Sun S (2020) Cryptanalysis and security enhancement for a chaos-based color image encryption algorithm. Multimed Tools Appl 79:27483\u201327509. https:\/\/doi.org\/10.1007\/s11042-020-09163-3","journal-title":"Multimed Tools Appl"},{"key":"10798_CR24","doi-asserted-by":"publisher","first-page":"6135","DOI":"10.1007\/s11042-019-08282-w","volume":"79","author":"B Idrees","year":"2020","unstructured":"Idrees B, Zafar S, Rashid T, Gao W (2020) Image encryption algorithm using S-box and dynamic H\u00e9non bit level permutation. Multimed Tools Appl 79:6135\u20136162. https:\/\/doi.org\/10.1007\/s11042-019-08282-w","journal-title":"Multimed Tools Appl"},{"key":"10798_CR25","doi-asserted-by":"crossref","unstructured":"Khashan OA, Alshaikh M (2020) Edge-based lightweight selective encryption scheme for digital medical images. 26369\u201326388","DOI":"10.1007\/s11042-020-09264-z"},{"key":"10798_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.image.2015.03.005","volume":"35","author":"JB Lima","year":"2015","unstructured":"Lima JB, Madeiro F, Sales FJR (2015) Encryption of medical images based on the cosine number transform. Signal Process Image Commun 35:1\u20138. https:\/\/doi.org\/10.1016\/j.image.2015.03.005","journal-title":"Signal Process Image Commun"},{"key":"10798_CR27","doi-asserted-by":"publisher","first-page":"21579","DOI":"10.1007\/s11042-020-08880-z","volume":"79","author":"Y Liu","year":"2020","unstructured":"Liu Y, Zhang J (2020) A multidimensional chaotic image encryption algorithm based on DNA coding. Multimed Tools Appl 79:21579\u201321601. https:\/\/doi.org\/10.1007\/s11042-020-08880-z","journal-title":"Multimed Tools Appl"},{"key":"10798_CR28","doi-asserted-by":"publisher","first-page":"15997","DOI":"10.1007\/s11042-018-6996-z","volume":"78","author":"H Liu","year":"2019","unstructured":"Liu H, Wen F, Kadir A (2019) Construction of a new 2D Chebyshev-sine map and its application to color image encryption. Multimed Tools Appl 78:15997\u201316010. https:\/\/doi.org\/10.1007\/s11042-018-6996-z","journal-title":"Multimed Tools Appl"},{"key":"10798_CR29","doi-asserted-by":"publisher","first-page":"2917","DOI":"10.1007\/s11071-020-05654-y","volume":"100","author":"Y Liu","year":"2020","unstructured":"Liu Y, Qin Z, Liao X, Wu J (2020) Cryptanalysis and enhancement of an image encryption scheme based on a 1-D coupled sine map. Nonlinear Dyn 100:2917\u20132931. https:\/\/doi.org\/10.1007\/s11071-020-05654-y","journal-title":"Nonlinear Dyn"},{"key":"10798_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11554-019-00940-4","volume":"18","author":"B Mondal","year":"2020","unstructured":"Mondal B, Behera PK, Gangopadhyay S (2020) A secure image encryption scheme based on a novel 2D sine\u2013cosine cross-chaotic (SC3) map. J Real-Time Image Process 18:1\u201318. https:\/\/doi.org\/10.1007\/s11554-019-00940-4","journal-title":"J Real-Time Image Process"},{"key":"10798_CR31","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.optlaseng.2018.05.009","volume":"110","author":"H Nematzadeh","year":"2018","unstructured":"Nematzadeh H, Enayatifar R, Motameni H, Guimar\u00e3es FG, Coelho VN (2018) Medical image encryption using a hybrid model of modified genetic algorithm and coupled map lattices. Opt Lasers Eng 110:24\u201332. https:\/\/doi.org\/10.1016\/j.optlaseng.2018.05.009","journal-title":"Opt Lasers Eng"},{"key":"10798_CR32","doi-asserted-by":"publisher","first-page":"12959","DOI":"10.1007\/s11042-019-08470-8","volume":"79","author":"KAK Patro","year":"2020","unstructured":"Patro KAK, Acharya B (2020) A novel multi-dimensional multiple image encryption technique. Multimed Tools Appl 79:12959\u201312994. https:\/\/doi.org\/10.1007\/s11042-019-08470-8","journal-title":"Multimed Tools Appl"},{"key":"10798_CR33","doi-asserted-by":"publisher","first-page":"12447","DOI":"10.1007\/s11042-019-08396-1","volume":"79","author":"S Rajendran","year":"2020","unstructured":"Rajendran S, Krithivasan K, Doraipandian M (2020) Fast pre-processing Hex chaos triggered color image cryptosystem. Multimed Tools Appl 79:12447\u201312469. https:\/\/doi.org\/10.1007\/s11042-019-08396-1","journal-title":"Multimed Tools Appl"},{"key":"10798_CR34","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1016\/j.compbiomed.2016.03.020","volume":"72","author":"D Ravichandran","year":"2016","unstructured":"Ravichandran D, Praveenkumar P, Balaguru Rayappan JB, Amirtharajan R (2016) Chaos based crossover and mutation for securing DICOM image. Comput Biol Med 72:170\u2013184. https:\/\/doi.org\/10.1016\/j.compbiomed.2016.03.020","journal-title":"Comput Biol Med"},{"key":"10798_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compbiomed.2016.09.003","volume":"78","author":"A Sahi","year":"2016","unstructured":"Sahi A, Lai D, Li Y (2016) Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan. Comput Biol Med 78:1\u20138. https:\/\/doi.org\/10.1016\/j.compbiomed.2016.09.003","journal-title":"Comput Biol Med"},{"key":"10798_CR36","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/978-3-642-17881-8_28","volume":"133 CCIS","author":"GA Sathishkumar","year":"2011","unstructured":"Sathishkumar GA, Bhoopathybagan K, Sriraam N et al (2011) A novel image encryption algorithm using two chaotic maps for medical application. Commun Comput Inf Sci 133 CCIS:290\u2013299. https:\/\/doi.org\/10.1007\/978-3-642-17881-8_28","journal-title":"Commun Comput Inf Sci"},{"key":"10798_CR37","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/s10916-019-1389-z","volume":"43","author":"S Stalin","year":"2019","unstructured":"Stalin S, Maheshwary P, Shukla PK, Maheshwari M, Gour B, Khare A (2019) Fast and secure medical image encryption based on non linear 4D logistic map and DNA sequences (NL4DLM_DNA). J Med Syst 43:267. https:\/\/doi.org\/10.1007\/s10916-019-1389-z","journal-title":"J Med Syst"},{"key":"10798_CR38","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s11554-020-00948-1","volume":"18","author":"MZ Talhaoui","year":"2020","unstructured":"Talhaoui MZ, Wang X, Midoun MA (2020) Fast image encryption algorithm with high security level using the B\u00fclban chaotic map. J Real-Time Image Process 18:85\u201398. https:\/\/doi.org\/10.1007\/s11554-020-00948-1","journal-title":"J Real-Time Image Process"},{"key":"10798_CR39","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1016\/j.ipl.2015.09.014","volume":"116","author":"CH Tan","year":"2016","unstructured":"Tan CH, Prabowo TF, Le D (2016) Breaking an ID-based encryption based on discrete logarithm and factorization problems. Inf Process Lett 116:116\u2013119. https:\/\/doi.org\/10.1016\/j.ipl.2015.09.014","journal-title":"Inf Process Lett"},{"key":"10798_CR40","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1007\/s11859-012-0871-y","volume":"17","author":"X Tong","year":"2012","unstructured":"Tong X, Liu Y, Zhang M, Shi H (2012) New chaotic image encryption algorithm based on cross-mapping. Wuhan Univ J Nat Sci 17:461\u2013467. https:\/\/doi.org\/10.1007\/s11859-012-0871-y","journal-title":"Wuhan Univ J Nat Sci"},{"key":"10798_CR41","doi-asserted-by":"publisher","first-page":"30281","DOI":"10.1007\/s11042-020-09462-9","volume":"79","author":"R Vidhya","year":"2020","unstructured":"Vidhya R, Brindha M (2020) A novel dynamic chaotic image encryption using butterfly network topology based diffusion and decision based permutation. Multimed Tools Appl 79:30281\u201330310. https:\/\/doi.org\/10.1007\/s11042-020-09462-9","journal-title":"Multimed Tools Appl"},{"key":"10798_CR42","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1016\/j.sigpro.2017.11.005","volume":"144","author":"H Wang","year":"2018","unstructured":"Wang H, Xiao D, Chen X, Huang H (2018) Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map. Signal Process 144:444\u2013452. https:\/\/doi.org\/10.1016\/j.sigpro.2017.11.005","journal-title":"Signal Process"},{"key":"10798_CR43","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.optlastec.2019.02.009","volume":"115","author":"X Wang","year":"2019","unstructured":"Wang X, Zhao H, Wang M (2019) A new image encryption algorithm with nonlinear-diffusion based on multiple coupled map lattices. Opt Laser Technol 115:42\u201357. https:\/\/doi.org\/10.1016\/j.optlastec.2019.02.009","journal-title":"Opt Laser Technol"},{"key":"10798_CR44","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/j.ins.2012.07.049","volume":"222","author":"Y Wu","year":"2013","unstructured":"Wu Y, Zhou Y, Saveriades G, Agaian S, Noonan JP, Natarajan P (2013) Local Shannon entropy measure with statistical tests for image randomness. Inf Sci (Ny) 222:323\u2013342. https:\/\/doi.org\/10.1016\/j.ins.2012.07.049","journal-title":"Inf Sci (Ny)"},{"key":"10798_CR45","doi-asserted-by":"publisher","first-page":"30329","DOI":"10.1007\/s11042-020-09595-x","volume":"79","author":"H Xiang","year":"2020","unstructured":"Xiang H, Liu L (2020) An improved digital logistic map and its application in image encryption. Multimed Tools Appl 79:30329\u201330355. https:\/\/doi.org\/10.1007\/s11042-020-09595-x","journal-title":"Multimed Tools Appl"},{"key":"10798_CR46","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.optlaseng.2015.09.007","volume":"78","author":"L Xu","year":"2016","unstructured":"Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17\u201325. https:\/\/doi.org\/10.1016\/j.optlaseng.2015.09.007","journal-title":"Opt Lasers Eng"},{"key":"10798_CR47","doi-asserted-by":"publisher","first-page":"5573","DOI":"10.1007\/s11042-019-08273-x","volume":"79","author":"C Xu","year":"2020","unstructured":"Xu C, Sun J, Wang C (2020) A novel image encryption algorithm based on bit-plane matrix rotation and hyper chaotic systems. Multimed Tools Appl 79:5573\u20135593. https:\/\/doi.org\/10.1007\/s11042-019-08273-x","journal-title":"Multimed Tools Appl"},{"key":"10798_CR48","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.sigpro.2014.01.020","volume":"100","author":"Y Zhou","year":"2014","unstructured":"Zhou Y, Cao W, Philip Chen CL (2014) Image encryption using binary bitplane. Signal Process 100:197\u2013207. https:\/\/doi.org\/10.1016\/j.sigpro.2014.01.020","journal-title":"Signal Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10798-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10798-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10798-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T04:12:55Z","timestamp":1625458375000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10798-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,3]]},"references-count":48,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["10798"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10798-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,4,3]]},"assertion":[{"value":"24 February 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 October 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 April 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"The authors hereby declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}