{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T19:35:42Z","timestamp":1775158542988,"version":"3.50.1"},"reference-count":70,"publisher":"Springer Science and Business Media LLC","issue":"18","license":[{"start":{"date-parts":[[2021,6,2]],"date-time":"2021-06-02T00:00:00Z","timestamp":1622592000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,2]],"date-time":"2021-06-02T00:00:00Z","timestamp":1622592000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Natural Science Foundation of Xizang Autonomous Region","award":["XZ2018ZR G-64."],"award-info":[{"award-number":["XZ2018ZR G-64."]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2017YFB1402100"],"award-info":[{"award-number":["2017YFB1402100"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s11042-021-11043-3","type":"journal-article","created":{"date-parts":[[2021,6,2]],"date-time":"2021-06-02T22:04:35Z","timestamp":1622671475000},"page":"28265-28301","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["Image scrambling adversarial autoencoder based on the asymmetric encryption"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5499-2883","authenticated-orcid":false,"given":"Zhenjie","family":"Bao","sequence":"first","affiliation":[]},{"given":"Ru","family":"Xue","sequence":"additional","affiliation":[]},{"given":"Yadong","family":"Jin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,2]]},"reference":[{"key":"11043_CR1","doi-asserted-by":"publisher","unstructured":"M AprilPyone, W Sirichotedumrong, H. Kiya (2019) Adversarial test on learnable image encryption in 2019 IEEE 8th global conference on consumer electronics (GCCE), pp 667-669. IEEE, Osaka, https:\/\/doi.org\/10.1109\/GCCE46687.2019.9015447","DOI":"10.1109\/GCCE46687.2019.9015447"},{"key":"11043_CR2","doi-asserted-by":"crossref","unstructured":"Awais Y, Hanan A, Musheer A, Muhammad D, Abdul R (2020) Comparison of pre and post-action of a finite Abelian group over certain nonlinear schemes. IEEE Access 8:39781\u201339792","DOI":"10.1109\/ACCESS.2020.2975880"},{"key":"11043_CR3","doi-asserted-by":"crossref","unstructured":"Baek J, Lee B, Kim K (2000) Secure length-saving ElGamal encryption under the computational Diffie-Hellman assumption. In: Proceedings of the 5th Australasian conference on information security and privacy (ACISP '00). Springer-Verlag, Berlin, Heidelberg, pp 49\u201358","DOI":"10.1007\/10718964_5"},{"key":"11043_CR4","doi-asserted-by":"publisher","unstructured":"Battisti F, Cancellaro M, Boato G, Carli M, Neri A (2009) Joint watermarking and encryption of color images in the Fibonacci-Haar domain. EURASIP J Adv Signal Process 2009:43. https:\/\/doi.org\/10.1155\/2009\/938515","DOI":"10.1155\/2009\/938515"},{"key":"11043_CR5","doi-asserted-by":"crossref","unstructured":"Belazi A, El-Latif AAA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155\u2013170","DOI":"10.1016\/j.sigpro.2016.03.021"},{"key":"11043_CR6","doi-asserted-by":"crossref","unstructured":"Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21(3):749\u2013761","DOI":"10.1016\/j.chaos.2003.12.022"},{"key":"11043_CR7","doi-asserted-by":"crossref","unstructured":"Chen J, Li XW, Wang QH (2019) Deep learning for improving the robustness of image encryption. IEEE Access 7:181083\u2013181091","DOI":"10.1109\/ACCESS.2019.2959031"},{"key":"11043_CR8","doi-asserted-by":"crossref","unstructured":"Daras G, Odena A, Zhang H, Dimakis AG (2020) Your local GAN: designing two dimensional local attention mechanisms for generative models. In: 2020 IEEE\/CVF conference on computer vision and pattern recognition (CVPR). IEEE, Seattle, pp 14519\u201314527","DOI":"10.1109\/CVPR42600.2020.01454"},{"key":"11043_CR9","doi-asserted-by":"publisher","unstructured":"Ding Y, Wu GZ, Chen DJ, Zhang N, Gong L, Cao M, Qin Z (2020) DeepEDN: a deep learning-based image encryption and decryption network for internet of medical things. IEEE Internet Things J 8:1504\u20131518. https:\/\/doi.org\/10.1109\/JIOT.2020.3012452","DOI":"10.1109\/JIOT.2020.3012452"},{"key":"11043_CR10","doi-asserted-by":"publisher","unstructured":"Dong J, Wu G, Yang T, Li Y (2018) The improved image scrambling algorithm for the wireless image transmission systems of UAVs. Sensors (Basel, Switzerland) 18(10):3430. https:\/\/doi.org\/10.3390\/s18103430","DOI":"10.3390\/s18103430"},{"key":"11043_CR11","doi-asserted-by":"crossref","unstructured":"Feng L, Wu J, Liu S, Zhang H (2015) Global correlation descriptor: a novel image representation for image retrieval. J Vis Commun Image Represent 33:104\u2013114","DOI":"10.1016\/j.jvcir.2015.09.002"},{"key":"11043_CR12","unstructured":"Goodfellow IJ, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. In: Proceedings of the 27th international conference on neural information processing systems - volume 2 (NIPS'14). MIT Press, Cambridge, pp 2672\u20132680"},{"key":"11043_CR13","doi-asserted-by":"crossref","unstructured":"Gu J, Shen Y, Zhou B (2020) Image processing using multi-code GAN prior. In: 2020 IEEE\/CVF conference on computer vision and pattern recognition (CVPR). IEEE, Seattle, pp 3009\u20133018","DOI":"10.1109\/CVPR42600.2020.00308"},{"key":"11043_CR14","doi-asserted-by":"crossref","unstructured":"Guo T, Xu C, Huang J, Wang Y, Shi B, Xu C, Tao D (2020) On positive-unlabeled classification in GAN. In: 2020 IEEE\/CVF conference on computer vision and pattern recognition (CVPR). IEEE, Seattle, pp 8382\u20138390","DOI":"10.1109\/CVPR42600.2020.00841"},{"key":"11043_CR15","doi-asserted-by":"crossref","unstructured":"Hamza YA (2019) Highly secure image steganography approach using Arnold's cat map and maximum image entropy. In: Proceedings of the international conference on information and communication technology (ICICT '19). ACM, New York, pp 134\u2013138","DOI":"10.1145\/3321289.3321323"},{"key":"11043_CR16","doi-asserted-by":"crossref","unstructured":"He K, Sun J (2015) Convolutional neural networks at constrained time cost. In: 2015 IEEE conference on computer vision and pattern recognition (CVPR). IEEE, Boston, pp 5353\u20135360","DOI":"10.1109\/CVPR.2015.7299173"},{"key":"11043_CR17","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: 2016 IEEE conference on computer vision and pattern recognition (CVPR). IEEE, Las Vegas, pp 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"key":"11043_CR18","doi-asserted-by":"publisher","unstructured":"Heidari S, Vafaei M, Houshmand M, Tabatabaey-Mashadi N (2019) A dual quantum image scrambling method. Quantum Inf Process 18(1):9. https:\/\/doi.org\/10.1007\/s11128-018-2122-4","DOI":"10.1007\/s11128-018-2122-4"},{"key":"11043_CR19","unstructured":"Hu F, Pu CJ, Gao HW, Tang MZ, Li L (2016) An image compression and encryption scheme based on deep learning arXiv: 1608.05001"},{"key":"11043_CR20","doi-asserted-by":"crossref","unstructured":"Hua Z, Zhu Z, Yi S, Zhang Z, Huang H (2021) Cross-plane colour image encryption using a two-dimensional logistic tent modular map. Inf Sci 546:1063\u20131083","DOI":"10.1016\/j.ins.2020.09.032"},{"key":"11043_CR21","doi-asserted-by":"crossref","unstructured":"Isola P, Zhu JY, Zhou T, Efros AA (2017) Image-to-image translation with conditional adversarial networks. In: 2017 IEEE conference on computer vision and pattern recognition (CVPR). IEEE, Honolulu, pp 5967\u20135976","DOI":"10.1109\/CVPR.2017.632"},{"key":"11043_CR22","doi-asserted-by":"publisher","unstructured":"Kandar S, Chaudhuri D, Bhattacharjee A, Dhara BC (2019) Image encryption using sequence generated by cyclic group. J Inform Secur Appl 44:117\u2013129. https:\/\/doi.org\/10.3969\/j.issn.1006-8961.2004.10.013","DOI":"10.3969\/j.issn.1006-8961.2004.10.013"},{"key":"11043_CR23","doi-asserted-by":"crossref","unstructured":"Kang XJ, Ran T (2019) Color image encryption using pixel scrambling operator and reality-preserving MPFRHT. IEEE Trans Circuits Syst Video Technol 29(7):1919\u20131932","DOI":"10.1109\/TCSVT.2018.2859253"},{"key":"11043_CR24","unstructured":"Kim T, Cha M, Kim H, Lee JK, Kim J (2017) Learning to discover cross-domain relations with generative adversarial networks. In: Proceedings of the 34th international conference on machine learning - volume 70 (ICML'17). JMLR.org, Sydney, pp 1857\u20131865"},{"key":"11043_CR25","unstructured":"Kingma D, Ba J (2014) Adam: A method for stochastic optimization arXiv: 1412.6980"},{"key":"11043_CR26","unstructured":"Kingma D P, Welling M (2014) Auto-encoding variational bayes. In 2nd international conference on learning representations, ICLR. arXiv: 1312.6114"},{"key":"11043_CR27","doi-asserted-by":"crossref","unstructured":"Kocher PC (1996) Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Proceedings of the 16th annual international cryptology conference on advances in cryptology, vol 1109. Springer, Berlin","DOI":"10.1007\/3-540-68697-5_9"},{"key":"11043_CR28","unstructured":"Koki M, Masayuki T, Masaki O, Tetsuji O (2020) Block-wise Scrambled Image Recognition Using Adaptation Network arXiv: 2001.07761"},{"key":"11043_CR29","doi-asserted-by":"crossref","unstructured":"Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Mathematics Appl 59(10):3320\u20133327","DOI":"10.1016\/j.camwa.2010.03.017"},{"key":"11043_CR30","doi-asserted-by":"crossref","unstructured":"Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284(16\u201317):3895\u20133903","DOI":"10.1016\/j.optcom.2011.04.001"},{"key":"11043_CR31","doi-asserted-by":"publisher","unstructured":"Liu H, Wang X, Kadir A (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12(5):1457\u20131466. https:\/\/doi.org\/10.1109\/JIOT.2020.3012452","DOI":"10.1109\/JIOT.2020.3012452"},{"key":"11043_CR32","doi-asserted-by":"crossref","unstructured":"Liu Z, Dai J, Sun X, Liu S (2010) Color image encryption by using the rotation of color vector in Hartley transform domains. Optics Lasers Eng 48(7\u20138):800\u2013805","DOI":"10.1016\/j.optlaseng.2010.02.005"},{"key":"11043_CR33","unstructured":"Luma A, Raufi B, Zenuni X (2012) Asymmetric encryption \/ decryption with Pentor and ultra Pentor operators. J Sci Technol 2:9\u201312"},{"key":"11043_CR34","unstructured":"Makhzani A, Shlens J, Jaitly N, Goodfellow I, Frey B (2015) Adversarial Autoencoders arXiv: 1511.05644"},{"key":"11043_CR35","doi-asserted-by":"crossref","unstructured":"Mao X, Li Q, Xie H, Lau RYK, Wang Z, Smolley SP (2017) Least squares generative adversarial networks. In: 2017 IEEE international conference on computer vision (ICCV). Venice, Italy, pp 2813\u20132821","DOI":"10.1109\/ICCV.2017.304"},{"key":"11043_CR36","unstructured":"Martin A, Soumith C, L\u00e9on B (2017) Wasserstein GAN arXiv: 1701.07875"},{"key":"11043_CR37","doi-asserted-by":"crossref","unstructured":"Miller VS (1985) Use of elliptic curves in cryptography. Advances in cryptology. In: Advances in cryptology (CRYPTO '85). Springer-Verlag, Berlin, pp 417\u2013426","DOI":"10.1007\/3-540-39799-X_31"},{"key":"11043_CR38","doi-asserted-by":"crossref","unstructured":"Parvin Z, Seyedarabi H, Shamsi M (2016) A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimed Tools Appl 75(17):10631\u201310648","DOI":"10.1007\/s11042-014-2115-y"},{"key":"11043_CR39","doi-asserted-by":"crossref","unstructured":"Pellegrini A, Bertacco V, Austin T (2010) Fault-based attack of RSA authentication. In: Proceedings of the conference on design, automation and test in Europe (DATE '10). IEEE, Dresden, pp 855\u2013860","DOI":"10.1109\/DATE.2010.5456933"},{"key":"11043_CR40","doi-asserted-by":"publisher","unstructured":"Qi D, Zou J, Han X (2000) A new class of scrambling transformation and its application in the image information covering. Sci China Series E: Technol Sci 43:304\u2013312. https:\/\/doi.org\/10.1007\/BF02916835","DOI":"10.1007\/BF02916835"},{"key":"11043_CR41","doi-asserted-by":"crossref","unstructured":"Qin YY, Zhang CN, Liang R, Chen MR (2019) Research on face image encryption based on deep learning. IOP Conference Series Earth Environ Sci 252(5):052007","DOI":"10.1088\/1755-1315\/252\/5\/052007"},{"key":"11043_CR42","doi-asserted-by":"crossref","unstructured":"Tanaka M (2018) Learnable image encryption. In: 2018 IEEE international conference on consumer electronics-Taiwan (ICCE-TW). IEEE, Taichung, pp 1\u20132","DOI":"10.1109\/ICCE-China.2018.8448772"},{"key":"11043_CR43","doi-asserted-by":"crossref","unstructured":"Taneja N, Raman B, Gupta I (2011) Selective image encryption in fractional wavelet domain. AEU - Intl J Electronics Commun 65(4):338\u2013344","DOI":"10.1016\/j.aeue.2010.04.011"},{"key":"11043_CR44","doi-asserted-by":"crossref","unstructured":"Taneja Nidhi, Raman Balasubramanian, Gupta Indra (2011) Chaos based partial encryption of SPIHT compressed images. Intl J Wavelets, Multiresolution Inform Process. 9(2): 317","DOI":"10.1142\/S0219691311004092"},{"key":"11043_CR45","doi-asserted-by":"publisher","unstructured":"Tang ZJ (2017) Image scrambling encryption algorithm based on chaotic mapping. J Changsha Aeronautical Vocational Tech College 17(02):90\u201392. (in Chinese. https:\/\/doi.org\/10.13829\/j.cnki.issn.16719654.2017.02.022","DOI":"10.13829\/j.cnki.issn.16719654.2017.02.022"},{"key":"11043_CR46","doi-asserted-by":"crossref","unstructured":"Tang Z, Zhang X, Lan W (2015) Efficient image encryption with block shuffling and chaotic map. Multimed Tools Appl 74:5429\u20135448","DOI":"10.1007\/s11042-014-1861-1"},{"key":"11043_CR47","unstructured":"Ulyanov D, Vedaldi A, Lempitsky V (2016) Instance normalization: The missing ingredient for fast stylization. arXiv:1607.08022, 2016."},{"key":"11043_CR48","doi-asserted-by":"crossref","unstructured":"Uppu R, Wolterink T A W, Goorden S A, Chen B. C, et al. (2018). Asymmetric cryptography with physical unclonable keys. Quantum Sci Technol 4: 045011","DOI":"10.1088\/2058-9565\/ab479f"},{"key":"11043_CR49","doi-asserted-by":"crossref","unstructured":"Wang X, Gao S (2020) Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network. Information Ences 539:195\u2013214","DOI":"10.1016\/j.ins.2020.06.030"},{"key":"11043_CR50","doi-asserted-by":"crossref","unstructured":"Wang X, Gao S (2020) Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Information Ences 507:16\u201336","DOI":"10.1016\/j.ins.2019.08.041"},{"key":"11043_CR51","doi-asserted-by":"crossref","unstructured":"Xu W, Luo Y, Li T, Wang H, Shi Y (2017) Multiple-image hiding by using single-shot ptychography in transform domain. IEEE Photonics J 9(3):1\u201310","DOI":"10.1109\/JPHOT.2017.2695398"},{"key":"11043_CR52","doi-asserted-by":"crossref","unstructured":"Wang X, Feng L, Zhao H (2019) Fast image encryption algorithm based on parallel computing system. Inf Sci 486:340\u2013358","DOI":"10.1016\/j.ins.2019.02.049"},{"key":"11043_CR53","doi-asserted-by":"crossref","unstructured":"Xian Y, Wang X (2021) Fractal sorting matrix and its application on chaotic image encryption. Information Ences 547:1154\u20131169","DOI":"10.1016\/j.ins.2020.09.055"},{"key":"11043_CR54","doi-asserted-by":"crossref","unstructured":"Xiong G, Zheng S, Wang J, Cai Z, Qi D (2018) Local negative base transform and image scrambling. Math Probl Eng 2018:8087958","DOI":"10.1155\/2018\/8087958"},{"key":"11043_CR55","doi-asserted-by":"crossref","unstructured":"Wang XY, Yang L, Liu R, Kadir A (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dynamics 62(3):615\u2013621","DOI":"10.1007\/s11071-010-9749-8"},{"key":"11043_CR56","doi-asserted-by":"publisher","unstructured":"Zhu J, Park T, Isola P, Efros AA (2017) Unpaired image-to-image translation using cycle-consistent adversarial networks in 2017 IEEE international conference on computer vision (ICCV). pp 2242-2251. IEEE, Venice, Italy. https:\/\/doi.org\/10.1109\/ICCV.2017.244","DOI":"10.1109\/ICCV.2017.244"},{"key":"11043_CR57","doi-asserted-by":"crossref","unstructured":"Wu C, Wang Y, Chen Y, Wang J, Wang QH (2018) Asymmetric encryption of multiple-image based on compressed sensing and phase-truncation in cylindrical diffraction domain. Opt Commun 431:203\u2013209","DOI":"10.1016\/j.optcom.2018.09.034"},{"key":"11043_CR58","doi-asserted-by":"crossref","unstructured":"Yuan X, Huang B, Wang Y, Yang C, Gui W (2018) Deep learning-based feature representation and its application for soft sensor modeling with variable-wise weighted SAE. IEEE Trans Indust Informatics 14(7):3235\u20133243","DOI":"10.1109\/TII.2018.2809730"},{"key":"11043_CR59","doi-asserted-by":"crossref","unstructured":"Yi Z, Zhang H, Tan P, Gong M (2017) DualGAN: unsupervised dual learning for image-to-image translation. In: 2017 IEEE international conference on computer vision (ICCV). IEEE, Venice, pp 2868\u20132876","DOI":"10.1109\/ICCV.2017.310"},{"key":"11043_CR60","doi-asserted-by":"crossref","unstructured":"Wang T, Liu M, Zhu J, Tao A, Kautz J, Catanzaro B (2018) High-resolution image synthesis and semantic manipulation with conditional GANs in 2018 IEEE\/CVF conference on computer vision and pattern recognition. IEEE, Salt Lake City, pp 8798\u20138807","DOI":"10.1109\/CVPR.2018.00917"},{"key":"11043_CR61","doi-asserted-by":"crossref","unstructured":"Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53\u201361","DOI":"10.1016\/j.optlaseng.2015.03.022"},{"key":"11043_CR62","doi-asserted-by":"crossref","unstructured":"Wang Z, Simoncelli EP, Bovik AC (2003) Multiscale structural similarity for image quality assessment. In: The Thrity-seventh Asilomar conference on signals, systems & computers. IEEE, Pacific Grove, pp 1398\u20131402","DOI":"10.1109\/ACSSC.2003.1292216"},{"key":"11043_CR63","doi-asserted-by":"crossref","unstructured":"Wang Z, Simoncelli EP, Bovik AC (2003) Multiscale structural similarity for image quality assessment. In: The Thrity-seventh Asilomar conference on signals, systems & computers. IEEE, Pacific Grove, pp 1398\u20131402","DOI":"10.1109\/ACSSC.2003.1292216"},{"key":"11043_CR64","doi-asserted-by":"crossref","unstructured":"Wei XP, Guo L, Zhang Q, Zhang JX, Lian SG (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw 85(2):290\u2013299","DOI":"10.1016\/j.jss.2011.08.017"},{"key":"11043_CR65","doi-asserted-by":"publisher","unstructured":"Xinguang S, Luo H (2004) Digital image scrambling based on S-box. J Image Graphics 10:79\u201383 (in Chinese). https:\/\/doi.org\/10.3969\/j.issn.1006-8961.2004.10.013","DOI":"10.3969\/j.issn.1006-8961.2004.10.013"},{"key":"11043_CR66","unstructured":"Zhang H, Goodfellow IJ, Metaxas D, Odena A. (2018) Self-attention generative adversarial networks. arXiv:1805.08318, May 2018."},{"key":"11043_CR67","doi-asserted-by":"crossref","unstructured":"Zhang Y (2018) The unified image encryption algorithm based on chaos and cubic s-box. Inf Sci 450:361\u2013377","DOI":"10.1016\/j.ins.2018.03.055"},{"key":"11043_CR68","doi-asserted-by":"crossref","unstructured":"Zhang YQ, Wang XY (2015) A new image encryption algorithm based on non-adjacent coupled map lattices. Appl Soft Comput 26:10\u201320","DOI":"10.1016\/j.asoc.2014.09.039"},{"key":"11043_CR69","doi-asserted-by":"crossref","unstructured":"Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear\u2013nonlinear coupled map lattice. Information Ences 273:329\u2013351","DOI":"10.1016\/j.ins.2014.02.156"},{"key":"11043_CR70","doi-asserted-by":"crossref","unstructured":"Zhang Z, Song Y, Qi H (2017) Age progression\/regression by conditional adversarial autoencoder. In: 2017 IEEE conference on computer vision and pattern recognition (CVPR). IEEE, Honolulu, pp 4352\u20134360","DOI":"10.1109\/CVPR.2017.463"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11043-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11043-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11043-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,24]],"date-time":"2021-07-24T15:28:54Z","timestamp":1627140534000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11043-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,2]]},"references-count":70,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["11043"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11043-3","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,2]]},"assertion":[{"value":"17 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 April 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 May 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 June 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}