{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T20:34:38Z","timestamp":1769978078737,"version":"3.49.0"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2022,2,17]],"date-time":"2022-02-17T00:00:00Z","timestamp":1645056000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,2,17]],"date-time":"2022-02-17T00:00:00Z","timestamp":1645056000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"NSCF","award":["61702429"],"award-info":[{"award-number":["61702429"]}]},{"name":"Sichuan Science and Technology Program","award":["21ZDYF3119"],"award-info":[{"award-number":["21ZDYF3119"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1007\/s11042-022-12040-w","type":"journal-article","created":{"date-parts":[[2022,2,17]],"date-time":"2022-02-17T07:02:44Z","timestamp":1645081364000},"page":"11087-11105","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["A deep learning approach with data augmentation for median filtering forensics"],"prefix":"10.1007","volume":"81","author":[{"given":"Wanli","family":"Dong","sequence":"first","affiliation":[]},{"given":"Hui","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Xiaoming","family":"Gao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9287-7536","authenticated-orcid":false,"given":"Anjie","family":"Peng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,17]]},"reference":[{"key":"12040_CR1","unstructured":"[Online] <http:\/\/exile.felk.cvut.cz\/boss\/BOSSFinal\/index.php?mode=VIEW&tmpl=materials>"},{"key":"12040_CR2","unstructured":"[Online] <http:\/\/photogallery.nrcs.usda.gov >"},{"key":"12040_CR3","doi-asserted-by":"publisher","first-page":"1690","DOI":"10.1109\/ICASSP.2010.5495494","volume-title":"2010 IEEE international conference on acoustics, speech and signal processing","author":"M Barni","year":"2010","unstructured":"Barni M, Cancelli G, Esposito A (2010) Forensics aided steganalysis of heterogeneous images. In: 2010 IEEE international conference on acoustics, speech and signal processing, pp 1690\u20131693"},{"key":"12040_CR4","volume-title":"Organised within the activity of the watermarking virtual laboratory (Wavila) of the European network of excellence ECRYPT","author":"P Bas","year":"2008","unstructured":"Bas P, Furon T (2008) BOWS-2 contest (break our watermarking system). In: Organised within the activity of the watermarking virtual laboratory (Wavila) of the European network of excellence ECRYPT"},{"key":"12040_CR5","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-3-642-24178-9_5","volume-title":"International workshop on information hiding","author":"P Bas","year":"2011","unstructured":"Bas P, Filler T, Pevn\u00fd T (2011) Break our steganographic system: the ins and outs of organizing BOSS. In: International workshop on information hiding. Springer, Berlin, Heidelberg, pp 59\u201370"},{"issue":"11","key":"12040_CR6","doi-asserted-by":"publisher","first-page":"2691","DOI":"10.1109\/TIFS.2018.2825953","volume":"13","author":"B Bayar","year":"2018","unstructured":"Bayar B, Stamm MC (2018) Constrained convolutional neural networks: a new approach towards general purpose image manipulation detection. IEEE Transactions on Information Forensics and Security 13(11):2691\u20132706","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"4","key":"12040_CR7","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1109\/TASSP.1987.1165153","volume":"35","author":"ALANCONRAD Bovik","year":"1987","unstructured":"Bovik ALANCONRAD (1987) Streaking in median filtered images. IEEE Trans Acoust Speech Signal Process 35(4):493\u2013503","journal-title":"IEEE Trans Acoust Speech Signal Process"},{"key":"12040_CR8","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1109\/ICME.2010.5583869","volume-title":"2010 IEEE international conference on multimedia and expo","author":"G Cao","year":"2010","unstructured":"Cao G, Zhao Y, Ni R, Yu L, Tian H (2010) Forensic detection of median filtering in digital images. In: 2010 IEEE international conference on multimedia and expo. IEEE, pp 89\u201394"},{"key":"12040_CR9","first-page":"1","volume-title":"International workshop on information hiding","author":"C Chen","year":"2012","unstructured":"Chen C, Ni J, Huang R, Huang J (2012) Blind median filtering detection using statistics in difference domain. In: International workshop on information hiding. Springer, Berlin, Heidelberg, pp 1\u201315"},{"issue":"11","key":"12040_CR10","doi-asserted-by":"publisher","first-page":"1849","DOI":"10.1109\/LSP.2015.2438008","volume":"22","author":"J Chen","year":"2015","unstructured":"Chen J, Kang X, Liu Y, Wang ZJ (2015) Median filtering forensics based on convolutional neural networks. IEEE Signal Process Lett 22(11):1849\u20131853","journal-title":"IEEE Signal Process Lett"},{"key":"12040_CR11","doi-asserted-by":"publisher","first-page":"2111","DOI":"10.1109\/ICASSP.2018.8462057","volume-title":"In 2018 IEEE international conference on acoustics, speech and signal processing (ICASSP)","author":"Y Chen","year":"2018","unstructured":"Chen Y, Lyu ZX, Kang X, Wang ZJ (2018) A rotation-invariant convolutional neural network for image enhancement forensics. In: In 2018 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 2111\u20132115"},{"key":"12040_CR12","first-page":"1251","volume-title":"Proceedings of the IEEE conference on computer vision and pattern recognition","author":"F Chollet","year":"2017","unstructured":"Chollet F (2017) Xception: deep learning with depthwise separable convolutions. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1251\u20131258"},{"key":"12040_CR13","doi-asserted-by":"publisher","first-page":"1517","DOI":"10.1109\/ICASSP.2009.4959884","volume-title":"2009 IEEE international conference on acoustics, speech and signal processing","author":"WH Chuang","year":"2009","unstructured":"Chuang WH, Swaminathan A, Wu M (2009) Tampering identification using empirical frequency response. In: 2009 IEEE international conference on acoustics, speech and signal processing. IEEE, pp 1517\u20131520"},{"key":"12040_CR14","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1145\/2713168.2713194","volume-title":"Proceedings of the 6th ACM multimedia systems conference","author":"DT Dang-Nguyen","year":"2015","unstructured":"Dang-Nguyen DT, Pasquini C, Conotter V, Boato G (2015) Raise: a raw images dataset for digital image forensics. In: Proceedings of the 6th ACM multimedia systems conference, pp 219\u2013224"},{"key":"12040_CR15","volume-title":"Incorporating nesterov momentum into adam","author":"T Dozat","year":"2016","unstructured":"Dozat, T. (2016). Incorporating nesterov momentum into adam."},{"key":"12040_CR16","first-page":"126","volume-title":"International workshop on digital watermarking","author":"G Duan","year":"2019","unstructured":"Duan G, Miao J, Huang T (2019) Median filtering detection of small-size image using AlexCaps-network. In: International workshop on digital watermarking. Springer, Cham, pp 126\u2013140"},{"issue":"3","key":"12040_CR17","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Transactions on Information Forensics and Security 7(3):868\u2013882","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"12040_CR18","doi-asserted-by":"publisher","first-page":"1584","DOI":"10.1145\/1774088.1774427","volume-title":"Proceedings of the 2010 ACM symposium on applied computing","author":"T Gloe","year":"2010","unstructured":"Gloe T, B\u00f6hme R (2010) The'Dresden image Database'for benchmarking digital image forensics. In: Proceedings of the 2010 ACM symposium on applied computing, pp 1584\u20131590"},{"key":"12040_CR19","first-page":"770","volume-title":"Proceedings of the IEEE conference on computer vision and pattern recognition","author":"K He","year":"2016","unstructured":"He K, Zhang X, Ren S, Sun J (2016a) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770\u2013778"},{"key":"12040_CR20","first-page":"630","volume-title":"European conference on computer vision","author":"K He","year":"2016","unstructured":"He K, Zhang X, Ren S, Sun J (2016b) Identity mappings in deep residual networks. In: European conference on computer vision. Springer, Cham, pp 630\u2013645"},{"issue":"4","key":"12040_CR21","doi-asserted-by":"publisher","first-page":"18","DOI":"10.9781\/ijimai.2020.11.011","volume":"6","author":"F Heydarpoor","year":"2020","unstructured":"Heydarpoor F, Abbasi E, Ebadi MJ, Karbassi M (2020) Solving an optimal control problem of Cancer treatment by artificial neural networks. International Journal of Interactive Multimedia and Artificial Intelligence 6(4):18\u201325","journal-title":"International Journal of Interactive Multimedia and Artificial Intelligence"},{"key":"12040_CR22","first-page":"7132","volume-title":"Proceedings of the IEEE conference on computer vision and pattern recognition","author":"J Hu","year":"2018","unstructured":"Hu J, Shen L, Sun G (2018) Squeeze-and-excitation networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 7132\u20137141"},{"key":"12040_CR23","first-page":"4700","volume-title":"Proceedings of the IEEE conference on computer vision and pattern recognition","author":"G Huang","year":"2017","unstructured":"Huang G, Liu Z, Van Der Maaten L, Weinberger KQ (2017) Densely connected convolutional networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 4700\u20134708"},{"key":"12040_CR24","doi-asserted-by":"publisher","first-page":"50459","DOI":"10.1109\/ACCESS.2018.2867370","volume":"6","author":"X Jin","year":"2018","unstructured":"Jin X, Jing P, Su Y (2018) AMFNet: an adversarial network for median filtering detection. IEEE Access 6:50459\u201350467","journal-title":"IEEE Access"},{"issue":"9","key":"12040_CR25","doi-asserted-by":"publisher","first-page":"1456","DOI":"10.1109\/TIFS.2013.2273394","volume":"8","author":"X Kang","year":"2013","unstructured":"Kang X, Stamm MC, Peng A, Liu KR (2013) Robust median filtering forensics using an autoregressive model. IEEE Transactions on Information Forensics and Security 8(9):1456\u20131468","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"2","key":"12040_CR26","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1109\/LSP.2017.2782363","volume":"25","author":"D Kim","year":"2017","unstructured":"Kim D, Jang HU, Mun SM, Choi S, Lee HK (2017) Median filtered image restoration and anti-forensics using adversarial networks. IEEE Signal Process Lett 25(2):278\u2013282","journal-title":"IEEE Signal Process Lett"},{"key":"12040_CR27","volume-title":"Media forensics and security II (Vol. 7541, p. 754110)","author":"M Kirchner","year":"2010","unstructured":"Kirchner M, Fridrich J (2010) On detection of median filtering in digital images. In: Media forensics and security II (Vol. 7541, p. 754110). International Society for Optics and Photonics"},{"issue":"5","key":"12040_CR28","doi-asserted-by":"publisher","first-page":"752","DOI":"10.1109\/TIFS.2014.2309054","volume":"9","author":"J Kodovsk\u00fd","year":"2014","unstructured":"Kodovsk\u00fd J, Fridrich J (2014) Effect of image downsampling on steganographic security. IEEE Trans Inf Forensics Secur 9(5):752\u2013762","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"12040_CR29","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/TCSVT.2016.2599849","volume":"28","author":"H Li","year":"2016","unstructured":"Li H, Luo W, Qiu X, Huang J (2016) Identification of various image operations using residual-based features. IEEE Trans Circuits Syst Video Technol 28(1):31\u201345","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"12040_CR30","volume-title":"Network in network","author":"M Lin","year":"2013","unstructured":"Lin, M., Chen, Q., & Yan, S. (2013). Network in network. arXiv preprint arXiv:1312.4400."},{"issue":"21","key":"12040_CR31","doi-asserted-by":"publisher","first-page":"22119","DOI":"10.1007\/s11042-017-4845-0","volume":"76","author":"A Liu","year":"2017","unstructured":"Liu A, Zhao Z, Zhang C, Su Y (2017) Median filtering forensics in digital images based on frequency-domain features. Multimed Tools Appl 76(21):22119\u201322132","journal-title":"Multimed Tools Appl"},{"key":"12040_CR32","doi-asserted-by":"crossref","unstructured":"Liu A, Zhao Z, Zhang C, Su Y (2019) Smooth filtering identification based on convolutional neural networks. Multimed Tools Appl:1\u201315","DOI":"10.1007\/s11042-016-4251-z"},{"key":"12040_CR33","doi-asserted-by":"publisher","first-page":"80614","DOI":"10.1109\/ACCESS.2019.2923000","volume":"7","author":"S Luo","year":"2019","unstructured":"Luo S, Peng A, Zeng H, Kang X, Liu L (2019) Deep residual learning using data augmentation for median filtering forensics of digital images. IEEE Access 7:80614\u201380621","journal-title":"IEEE Access"},{"key":"12040_CR34","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.image.2017.01.008","volume":"53","author":"Y Niu","year":"2017","unstructured":"Niu Y, Zhao Y, Ni R (2017) Robust median filtering detection based on local difference descriptor. Signal Process Image Commun 53:65\u201372","journal-title":"Signal Process Image Commun"},{"key":"12040_CR35","first-page":"85","volume-title":"European conference on computer vision","author":"G Patterson","year":"2016","unstructured":"Patterson G, Hays J (2016) Coco attributes: attributes for people, animals, and objects. In: European conference on computer vision. Springer, Cham, pp 85\u2013100"},{"issue":"3","key":"12040_CR36","first-page":"503","volume":"39","author":"A Peng","year":"2016","unstructured":"Peng A, Kang X (2016) Median filtering forensics based on multi-directional difference of filtering residuals. Jisuanji Xuebao\/Chin. J Comput 39(3):503\u2013515","journal-title":"J Comput"},{"key":"12040_CR37","doi-asserted-by":"publisher","first-page":"28525","DOI":"10.1109\/ACCESS.2019.2897761","volume":"7","author":"A Peng","year":"2019","unstructured":"Peng A, Luo S, Zeng H, Wu Y (2019) Median filtering forensics using multiple models in residual domain. IEEE Access 7:28525\u201328538","journal-title":"IEEE Access"},{"issue":"2","key":"12040_CR38","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/TIFS.2010.2045842","volume":"5","author":"T Pevny","year":"2010","unstructured":"Pevny T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensics Secur 5(2):215\u2013224","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"12040_CR39","volume-title":"Storage and retrieval methods and applications for multimedia 2004 (Vol. 5307, pp. 472-480)","author":"G Schaefer","year":"2003","unstructured":"Schaefer G, Stich M (2003) UCID: an uncompressed color image database. In: Storage and retrieval methods and applications for multimedia 2004 (Vol. 5307, pp. 472-480). International Society for Optics and Photonics"},{"key":"12040_CR40","doi-asserted-by":"publisher","first-page":"17174","DOI":"10.1109\/ACCESS.2019.2894981","volume":"7","author":"W Shan","year":"2019","unstructured":"Shan W, Yi Y, Qiu J, Yin A (2019) Robust median filtering forensics using image deblocking and filtered residual fusion. IEEE Access 7:17174\u201317183","journal-title":"IEEE Access"},{"issue":"4","key":"12040_CR41","doi-asserted-by":"publisher","first-page":"2327","DOI":"10.1007\/s11042-014-2407-2","volume":"75","author":"Z Shen","year":"2016","unstructured":"Shen Z, Ni J, Chen C (2016) Blind detection of median filtering using linear and nonlinear descriptors. Multimed Tools Appl 75(4):2327\u20132346","journal-title":"Multimed Tools Appl"},{"key":"12040_CR42","unstructured":"Simonyan, K., & Zisserman, A. (2014). Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556."},{"issue":"3","key":"12040_CR43","doi-asserted-by":"publisher","first-page":"1050","DOI":"10.1109\/TIFS.2011.2119314","volume":"6","author":"MC Stamm","year":"2011","unstructured":"Stamm MC, Liu KR (2011) Anti-forensics of digital image compression. IEEE Trans Inf Forensics Secur 6(3):1050\u20131065","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"12040_CR44","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1109\/ACCESS.2013.2260814","volume":"1","author":"MC Stamm","year":"2013","unstructured":"Stamm MC, Wu M, Liu KR (2013) Information forensics: an overview of the first decade. IEEE Access 1:167\u2013200","journal-title":"IEEE Access"},{"key":"12040_CR45","first-page":"786","volume-title":"Asian conference on machine learning","author":"R Takahashi","year":"2018","unstructured":"Takahashi R, Matsubara T, Uehara K (2018) Ricap: random image cropping and patching data augmentation for deep cnns. In: Asian conference on machine learning, pp 786\u2013798"},{"key":"12040_CR46","unstructured":"Tan, M., & Le, Q. V. (2019). Efficientnet: rethinking model scaling for convolutional neural networks. arXiv preprint arXiv:1905.11946"},{"key":"12040_CR47","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.jvcir.2018.01.011","volume":"51","author":"H Tang","year":"2018","unstructured":"Tang H, Ni R, Zhao Y, Li X (2018) Median filtering detection of small-size image based on CNN. J Vis Commun Image Represent 51:162\u2013168","journal-title":"J Vis Commun Image Represent"},{"issue":"8","key":"12040_CR48","doi-asserted-by":"publisher","first-page":"1132","DOI":"10.1109\/LSP.2019.2922498","volume":"26","author":"DB Tariang","year":"2019","unstructured":"Tariang DB, Chakraborty RS, Naskar R (2019) A robust residual dense neural network for countering Antiforensic attack on median filtered images. IEEE Signal Process Lett 26(8):1132\u20131136","journal-title":"IEEE Signal Process Lett"},{"issue":"7","key":"12040_CR49","doi-asserted-by":"publisher","first-page":"7931","DOI":"10.1007\/s11042-017-4691-0","volume":"77","author":"J Yang","year":"2018","unstructured":"Yang J, Ren H, Zhu G, Huang J, Shi YQ (2018) Detecting median filtering via two-dimensional AR models of multiple filtered residuals. Multimed Tools Appl 77(7):7931\u20137953","journal-title":"Multimed Tools Appl"},{"key":"12040_CR50","doi-asserted-by":"publisher","first-page":"120594","DOI":"10.1109\/ACCESS.2019.2932810","volume":"7","author":"L Yu","year":"2019","unstructured":"Yu L, Zhang Y, Han H, Zhang L, Wu F (2019) Robust median filtering forensics by cnn-based multiple residuals learning. IEEE Access 7:120594\u2013120602","journal-title":"IEEE Access"},{"issue":"4","key":"12040_CR51","doi-asserted-by":"publisher","first-page":"1335","DOI":"10.1109\/TIFS.2011.2161761","volume":"6","author":"HD Yuan","year":"2011","unstructured":"Yuan HD (2011) Blind forensics of median filtering in digital images. IEEE Trans Inf Forensics Secur 6(4):1335\u20131345","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"12040_CR52","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1145\/3082031.3083250","volume-title":"Proceedings of the 5th ACM workshop on information hiding and multimedia security","author":"Y Zhan","year":"2017","unstructured":"Zhan Y, Chen Y, Zhang Q, Kang X (2017) Image forensics based on transfer learning and convolutional neural network. In: Proceedings of the 5th ACM workshop on information hiding and multimedia security, pp 165\u2013170"},{"issue":"3","key":"12040_CR53","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1109\/LSP.2013.2295858","volume":"21","author":"Y Zhang","year":"2014","unstructured":"Zhang Y, Li S, Wang S, Shi YQ (2014) Revealing the traces of median filtering using high-order local ternary patterns. IEEE Signal Process Lett 21(3):275\u2013279","journal-title":"IEEE Signal Process Lett"},{"key":"12040_CR54","unstructured":"Zhang, H., Cisse, M., Dauphin, Y. N., & Lopez-Paz, D. (2017). mixup: Beyond empirical risk minimization. arXiv preprint arXiv:1710.09412."},{"key":"12040_CR55","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1109\/LSP.2020.2966888","volume":"27","author":"J Zhang","year":"2020","unstructured":"Zhang J, Liao Y, Zhu X, Wang H, Ding J (2020) A deep learning approach in the discrete cosine transform domain to median filtering forensics. IEEE Signal Process Lett 27:276\u2013280","journal-title":"IEEE Signal Process Lett"},{"key":"12040_CR56","first-page":"13001","volume-title":"AAAI","author":"Z Zhong","year":"2020","unstructured":"Zhong Z, Zheng L, Kang G, Li S, Yang Y (2020) Random erasing data augmentation. In: AAAI, pp 13001\u201313008"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12040-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-12040-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12040-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,22]],"date-time":"2022-10-22T15:20:39Z","timestamp":1666452039000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-12040-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,17]]},"references-count":56,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["12040"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-12040-w","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,17]]},"assertion":[{"value":"5 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 August 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 January 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 February 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}