{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T15:15:51Z","timestamp":1778166951547,"version":"3.51.4"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1007\/s11042-022-12598-5","type":"journal-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T03:02:32Z","timestamp":1646103752000},"page":"15859-15878","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":45,"title":["4D Hyperchaotic map and DNA encoding combined image encryption for secure communication"],"prefix":"10.1007","volume":"81","author":[{"given":"G.","family":"Arthi","sequence":"first","affiliation":[]},{"given":"V.","family":"Thanikaiselvan","sequence":"additional","affiliation":[]},{"given":"R.","family":"Amirtharajan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,1]]},"reference":[{"key":"12598_CR1","doi-asserted-by":"publisher","first-page":"28807","DOI":"10.1007\/s11042-020-09501-5","volume":"79","author":"S Aashiq Banu","year":"2020","unstructured":"Aashiq Banu S, Amirtharajan R (2020) Tri-level scrambling and enhanced diffusion for DICOM image cipher- DNA and chaotic fused approach. Multimed Tools Appl 79:28807\u201328824. https:\/\/doi.org\/10.1007\/s11042-020-09501-5","journal-title":"Multimed Tools Appl"},{"key":"12598_CR2","doi-asserted-by":"publisher","first-page":"940","DOI":"10.1631\/FITEE.2000071","volume":"22","author":"S Aashiq Banu","year":"2021","unstructured":"Aashiq Banu S, Amirtharajan R (2021) Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data. Front Inform Technol Electron Eng 22:940\u2013956. https:\/\/doi.org\/10.1631\/FITEE.2000071","journal-title":"Front Inform Technol Electron Eng"},{"key":"12598_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14054-4_10","volume-title":"Security standardisation research. SSR 2014. Lecture notes in computer science","author":"AA Abdulla","year":"2014","unstructured":"Abdulla AA, Sellahewa H, Jassim SA (2014) Stego quality enhancement by message size reduction and fibonacci bit-plane mapping. In: Chen L, Mitchell C (eds) Security standardisation research. SSR 2014. Lecture notes in computer science, vol 8893. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-319-14054-4_10"},{"key":"12598_CR4","doi-asserted-by":"publisher","first-page":"17799","DOI":"10.1007\/s11042-019-7166-7","volume":"78","author":"AA Abdulla","year":"2019","unstructured":"Abdulla AA, Sellahewa H, Jassim SA (2019) Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images. Multimed Tools Appl 78:17799\u201317823. https:\/\/doi.org\/10.1007\/s11042-019-7166-7","journal-title":"Multimed Tools Appl"},{"key":"12598_CR5","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.optlaseng.2017.11.005","volume":"103","author":"M Annaby","year":"2018","unstructured":"Annaby M, Rushdi M, Nehary E (2018) Color image encryption using random transforms, phase retrieval, chaotic maps, and diffusion. Opt Lasers Eng 103:9\u201323","journal-title":"Opt Lasers Eng"},{"key":"12598_CR6","doi-asserted-by":"publisher","first-page":"1445","DOI":"10.1007\/s11517-020-02178-w","volume":"58","author":"SA Banu","year":"2020","unstructured":"Banu SA, Amirtharajan R (2020) Robust medical image encryption in dual domain: chaos-DNA-IWTcombinedapproach. Med Biol Eng Comput 58:1445\u20131458. https:\/\/doi.org\/10.1007\/s11517-020-02178-w","journal-title":"Med Biol Eng Comput"},{"key":"12598_CR7","doi-asserted-by":"publisher","first-page":"36667","DOI":"10.1109\/ACCESS.2019.2906292","volume":"7","author":"A Belazi","year":"2019","unstructured":"Belazi A, Talha M, Kharbechand S, Xiang W (2019) Novel medical image encryption scheme based on chaos and DNA encoding. IEEE Access 7:36667\u201336681. https:\/\/doi.org\/10.1109\/ACCESS.2019.2906292","journal-title":"IEEE Access"},{"key":"12598_CR8","unstructured":"Chen J (2003) ADNA-based, biomolecular cryptography design,\u201d Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS\u201903., Bangkok, pp. III-III"},{"issue":"7","key":"12598_CR9","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/S0167-7799(01)01671-7","volume":"19","author":"JP Cox","year":"2001","unstructured":"Cox JP (2001) Long-term data storage in DNA. Trends Biotechnol 19(7):247\u2013250","journal-title":"Trends Biotechnol"},{"key":"12598_CR10","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1007\/s11277-019-06420-z","volume":"108","author":"JC Dagadu","year":"2019","unstructured":"Dagadu JC, Li JP, Aboagye EO (2019) Medical image encryption based on hybrid chaotic DNA diffusion. Wirel Pers Commun 108:591\u2013612. https:\/\/doi.org\/10.1007\/s11277-019-06420-z","journal-title":"Wirel Pers Commun"},{"issue":"9","key":"12598_CR11","doi-asserted-by":"publisher","first-page":"3771","DOI":"10.1007\/s12652-019-01580-z","volume":"11","author":"M Dua","year":"2019","unstructured":"Dua M, Wesanekar A, Gupta V, Bhola M, Dua S (2019) Differential evolution optimisation of intertwining logistic map-DNA based image encryption technique. J Ambient Intell Hum Computig 11(9):3771\u20133786. https:\/\/doi.org\/10.1007\/s12652-019-01580-z","journal-title":"J Ambient Intell Hum Computig"},{"key":"12598_CR12","doi-asserted-by":"publisher","first-page":"1535","DOI":"10.1049\/iet-ipr.2019.0051","volume":"13","author":"M Guan","year":"2019","unstructured":"Guan M, Yang X, Hu W (2019) Chaotic image encryption algorithm using frequency-domain DNA encoding. IET Image Process 13:1535\u20131539. https:\/\/doi.org\/10.1049\/iet-ipr.2019.0051","journal-title":"IET Image Process"},{"issue":"1","key":"12598_CR13","first-page":"93","volume":"4","author":"S Hamad","year":"2014","unstructured":"Hamad S (2014) A novel implementation of an extended 8\u00d78 play fair cipher using interweaving on DNA- encoded data. Int J Elect Comput Eng 4(1):93\u2013100","journal-title":"Int J Elect Comput Eng"},{"issue":"5","key":"12598_CR14","doi-asserted-by":"crossref","first-page":"1605","DOI":"10.1109\/TCBB.2017.2754496","volume":"15","author":"S Hamad","year":"2018","unstructured":"Hamad S, Elhadad A, Khalifa A (2018) DNA watermarking using codon post fix technique. IEEE\/ACM Trans Comput Biol Bioinf 15(5):1605\u20131610","journal-title":"IEEE\/ACM Trans Comput Biol Bioinf"},{"key":"12598_CR15","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","volume":"297","author":"Z Hua","year":"2015","unstructured":"Hua Z, Zhou Y, Pun C-M, Chen CLP (2015) 2D sine logistic modulation map for imageencryption. Inf Sci 297:80\u201394. https:\/\/doi.org\/10.1016\/j.ins.2014.11.018","journal-title":"Inf Sci"},{"issue":"2","key":"12598_CR16","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1109\/TIFS.2015.2489178","volume":"11","author":"A Jolfaei","year":"2016","unstructured":"Jolfaei A, Wu X-W, Muthukkumarasamy V (2016) On the security of permutation-only image encryption schemes. IEEE Trans Inf Forensics Secur 11(2):235\u2013246","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"12598_CR17","doi-asserted-by":"publisher","first-page":"63336","DOI":"10.1109\/ACCESS.2019.2916402","volume":"7","author":"M Li","year":"2019","unstructured":"Li M, Xu M, Luo J, Fan H (2019) Cryptanalysis of an image encryption using 2D Henon-sine map and DNA approach. IEEE Access 7:63336\u201363345. https:\/\/doi.org\/10.1109\/ACCESS.2019.2916402","journal-title":"IEEE Access"},{"key":"12598_CR18","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1186\/s13640-018-0402-7","volume":"2019","author":"P Li","year":"2019","unstructured":"Li P, Xu J, Mou J et al (2019) Fractional order 4D Hyperchaotic memristivesystem and application in colorimageencryption. J Image Video Proc 2019:22. https:\/\/doi.org\/10.1186\/s13640-018-0402-7","journal-title":"J Image Video Proc"},{"issue":"3","key":"12598_CR19","doi-asserted-by":"publisher","first-page":"319","DOI":"10.3390\/e21030319","volume":"21","author":"T Li","year":"2019","unstructured":"Li T, Shi J, Li X, Wu J, Pan F (2019) Image Encryption based on pixel-level diffusion with dynamic filtering and DNA-level permutation with 3D latin cubes. Entropy 21(3):319. https:\/\/doi.org\/10.3390\/e21030319","journal-title":"Entropy"},{"key":"12598_CR20","doi-asserted-by":"publisher","first-page":"65450","DOI":"10.1109\/ACCESS.2019.2917498","volume":"7","author":"H Liu","year":"2019","unstructured":"Liu H, Zhao B, Huang L (2019) A remote-sensing image encryption scheme using DNA bases probability and two-dimensional logistic map. IEEE Access 7:65450\u201365459. https:\/\/doi.org\/10.1109\/ACCESS.2019.2917498","journal-title":"IEEE Access"},{"key":"12598_CR21","doi-asserted-by":"crossref","unstructured":"Z Liu, C Wu, J Wang, Y Hu,\u201d A color image encryption using dynamic DNA and 4-D memristive hyper-chaos\u201d, IEEE Access, 7, 2019 78367-78378.","DOI":"10.1109\/ACCESS.2019.2922376"},{"issue":"20","key":"12598_CR22","doi-asserted-by":"publisher","first-page":"26191","DOI":"10.1007\/s11042-018-5844-5","volume":"77","author":"Y Luo","year":"2018","unstructured":"Luo Y, Zhou R, Liu J, Qiu S, Cao Y (2018) An efficient and self-adapting colour-image encryption algorithm based on chaos and inter-actions among multiple layers. Multimed Tools Appl 77(20):26191\u201326217","journal-title":"Multimed Tools Appl"},{"key":"12598_CR23","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1016\/j.procs.2017.09.151","volume":"115","author":"P Malathi","year":"2017","unstructured":"Malathi P, Manoaj M, Manoj R, Raghavan V, Vinodhini RE (2017) Highly improved DNAbasedsteganography. Procedia Comput Sci 115:651\u2013659","journal-title":"Procedia Comput Sci"},{"key":"12598_CR24","doi-asserted-by":"publisher","unstructured":"Mamta B, Gupta B, Li K-C, Leung VCM, Psannis KE, Yamaguchi S (2021) Blockchain-assisted secure fine-grained searchable encryption for a cloud-based healthcare cyber-physical system. IEEE\/CAA J Autom Sin. https:\/\/doi.org\/10.1109\/JAS.2021.1004003","DOI":"10.1109\/JAS.2021.1004003"},{"issue":"2","key":"12598_CR25","first-page":"147","volume":"8","author":"H Mousa","year":"2011","unstructured":"Mousa H, Moustafa K, Abdel-Wahed W, Hadhoud M (2011) Data hiding based on contrast mapping using DNA medium. Int Arab J Inf Technol 8(2):147\u2013154","journal-title":"Int Arab J Inf Technol"},{"key":"12598_CR26","doi-asserted-by":"publisher","first-page":"163843","DOI":"10.1016\/j.ijleo.2019.163843","volume":"207","author":"JS Muthu","year":"2020","unstructured":"Muthu JS, Murali P, Chunyan H (2020) An image encryption algorithm based on modified logisticchaoticmap. Optik 207:163843,ISSN0030-4026. https:\/\/doi.org\/10.1016\/j.ijleo.2019.163843","journal-title":"Optik"},{"key":"12598_CR27","doi-asserted-by":"crossref","unstructured":"Naveen C, Gupta TVS, Satpute VR, Gandhi AS (2015) A simple and efficient approach formedical image security using chaos on EZW. 2015 Eighth International Conference on Advances in PatternRecognition(ICAPR)","DOI":"10.1109\/ICAPR.2015.7050653"},{"key":"12598_CR28","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.jisa.2019.02.006","volume":"46","author":"KAK Patro","year":"2019","unstructured":"Patro KAK, Acharya B (2019) An efficient colour image encryption schemebased on 1-D chaotic maps. J Inf Secur Appl 46:23\u201341. https:\/\/doi.org\/10.1016\/j.jisa.2019.02.006","journal-title":"J Inf Secur Appl"},{"issue":"9","key":"12598_CR29","doi-asserted-by":"publisher","first-page":"2137","DOI":"10.1109\/TIFS.2018.2812080","volume":"13","author":"M Preishuber","year":"2018","unstructured":"Preishuber M, Hutter T, Katzenbeisser S, Uhl A (2018) Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Trans Inf Forensics Security 13(9):2137\u20132150","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"12598_CR30","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1016\/j.compbiomed.2016.03.020","volume":"72","author":"D Ravichandran","year":"2016","unstructured":"Ravichandran D et al (2016) Chaos based crossover and mutation for securing DICOM image. Comput Biol Med 72:170\u2013184. https:\/\/doi.org\/10.1016\/j.compbiomed.2016.03.020","journal-title":"Comput Biol Med"},{"issue":"1","key":"12598_CR31","first-page":"3182","volume":"3","author":"M Rusia","year":"2014","unstructured":"Rusia M, Makwana RH (2014) Review on DNA based encryption algorithm for text and imagedata. Int J Eng Res Technol 3(1):3182\u20133186","journal-title":"Int J Eng Res Technol"},{"key":"12598_CR32","doi-asserted-by":"publisher","first-page":"25650","DOI":"10.1109\/ACCESS.2020.2970981","volume":"8","author":"M Samiullah","year":"2020","unstructured":"Samiullah M et al (2020) An image encryption scheme based on DNA computing and multiple chaotic systems. IEEE Access 8:25650\u201325663. https:\/\/doi.org\/10.1109\/ACCESS.2020.2970981","journal-title":"IEEE Access"},{"key":"12598_CR33","doi-asserted-by":"publisher","unstructured":"Shivhare R, Shrivastava R, Gupta C (2018) An enhanced image encryption technique using DES Algorithm with Random Image over lapping and RandomkeyGeneration. 2018 International Conferenceon Advanced Computation and Telecommunication (ICACAT), pp. 1\u20139. https:\/\/doi.org\/10.1109\/ICACAT.2018.8933591.","DOI":"10.1109\/ICACAT.2018.8933591"},{"key":"12598_CR34","doi-asserted-by":"publisher","first-page":"11859","DOI":"10.1007\/s00521-019-04668-x","volume":"32","author":"S Suri","year":"2020","unstructured":"Suri S, Vijay R (2020) A Pareto-optimal evolutionary approach of image encryption using coupled maplattice and DNA. Neural Comput Applic 32:11859\u201311873. https:\/\/doi.org\/10.1007\/s00521-019-04668-x","journal-title":"Neural Comput Applic"},{"key":"12598_CR35","first-page":"Art. no. 012028","volume":"974","author":"M Suryadi","year":"2018","unstructured":"Suryadi M, Satria Y, Fauzi M (2018) Implementation of digital image encryption algorithm using logistic function and DNA encoding. J Phys Conf Ser 974:Art. no. 012028","journal-title":"J Phys Conf Ser"},{"issue":"1","key":"12598_CR36","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.biosystems.2005.01.004","volume":"81","author":"K Tanaka","year":"2005","unstructured":"Tanaka K, Okamoto A et al (2005) Public-keysystemusing DNA asaone-way function for key distribution. Biosystems 81(1):25\u201329","journal-title":"Biosystems"},{"key":"12598_CR37","unstructured":"Tornea O (2013) Contributionsto DNA cryptography: applications to text and image secure transmission. Universit\u00e9 Nice Sophia Antipolis; Technical University of Cluj-Napoca (Roumanie)"},{"key":"12598_CR38","doi-asserted-by":"publisher","first-page":"103662","DOI":"10.1109\/ACCESS.2019.2931052","volume":"7","author":"X Wang","year":"2019","unstructured":"Wang X, Gao S, Yu L, Sun Y, Sun H (2019) Chaotic image encryption algorithm based on bit-combination scrambling in decimal system and dynamic diffusion. IEEE Access 7:103662\u2013103677. https:\/\/doi.org\/10.1109\/ACCESS.2019.2931052","journal-title":"IEEE Access"},{"issue":"2","key":"12598_CR39","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber J: Multidiscip J Sin Sci Technol J Sel Area Telecommun (JSAT) 1(2):31\u201333","journal-title":"Cyber J: Multidiscip J Sin Sci Technol J Sel Area Telecommun (JSAT)"},{"issue":"10","key":"12598_CR40","doi-asserted-by":"publisher","first-page":"12349","DOI":"10.1007\/s11042-017-4885-5","volume":"77","author":"X Wu","year":"2018","unstructured":"Wu X, Kurths J, Kan H (2018) Arobust and lossless DNA encryp-tion scheme for colorimages. Multimed Tools Appl 77(10):12349\u201312376","journal-title":"Multimed Tools Appl"},{"key":"12598_CR41","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.optlaseng.2019.04.011","volume":"121","author":"Q Xu","year":"2019","unstructured":"Xu Q, Sun K, Cao C, Zhu C (2019) A fast image encryption algorithm based oncompressive sensing and hyperchaotic map. Opt Lasers Eng 121:203\u2013214, ISSN0143\u20138166. https:\/\/doi.org\/10.1016\/j.optlaseng.2019.04.011","journal-title":"Opt Lasers Eng"},{"key":"12598_CR42","doi-asserted-by":"publisher","unstructured":"Yasser I, Khalifa F, Mohamed MA, Samrah AS (2020, 2020) A new image encryption scheme based on hybrid chaotic maps. Complexity:Article ID 9597619, 23 pages. https:\/\/doi.org\/10.1155\/2020\/9597619","DOI":"10.1155\/2020\/9597619"},{"key":"12598_CR43","doi-asserted-by":"publisher","unstructured":"Zhang Q, Ding Q (2015) Digital image encryption based on advanced encryption standard (AES). 2015 Fifth International Conferenceon Instrumentation and Measurement, Computer, Communicationand Control (IMCCC), pp. 1218\u20131221. https:\/\/doi.org\/10.1109\/IMCCC.2015.261.","DOI":"10.1109\/IMCCC.2015.261"},{"issue":"11","key":"12598_CR44","doi-asserted-by":"publisher","first-page":"660","DOI":"10.3390\/sym10110660","volume":"10","author":"X Zhang","year":"2018","unstructured":"Zhang X, Wang X (2018) Multiple-image encryption algorithm based on the 3D permutation model and chaotic system. Symmetry 10(11):660","journal-title":"Symmetry"},{"issue":"11\u201312","key":"12598_CR45","doi-asserted-by":"publisher","first-page":"2001","DOI":"10.1016\/j.camwa.2008.10.038","volume":"57","author":"X Zhang","year":"2009","unstructured":"Zhang X, Jin X et al (2009) Application of a novel IWO to the design of encoding sequences for DNA computing. Comput Math Appl 57(11\u201312):2001\u20132008","journal-title":"Comput Math Appl"},{"key":"12598_CR46","doi-asserted-by":"crossref","unstructured":"Zhang TT, Yan SJ, Gu CY, Ren L, Liao KX (2018) Research on image encryption based on dna sequence and chaos theory. Proc 2nd Int Conf Mach Vis Inf Technol(CMVIT), vol. 1004, pp. 149\u2013154","DOI":"10.1088\/1742-6596\/1004\/1\/012023"},{"key":"12598_CR47","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1109\/ACCESS.2017.2775038","volume":"6","author":"Q Zheng","year":"2018","unstructured":"Zheng Q, Wang X, Khurram Khan M, Zhang W, Gupta BB, Guo W (2018) A lightweight authenticated encryption scheme based on chaotic SCML for railway cloud service. IEEE Access 6:711\u2013722. https:\/\/doi.org\/10.1109\/ACCESS.2017.2775038","journal-title":"IEEE Access"},{"key":"12598_CR48","doi-asserted-by":"publisher","unstructured":"Zhu C, Sun K (2018) Cryptanalyzing and improving a novel color image encryption algorithm using RT-enhanced chaotic tent maps. IEEE Access 6:18759\u201318770.\u00a0https:\/\/doi.org\/10.1109\/ACCESS.2018.2817600","DOI":"10.1109\/ACCESS.2018.2817600"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12598-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-12598-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12598-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T14:32:50Z","timestamp":1726756370000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-12598-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,1]]},"references-count":48,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["12598"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-12598-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,1]]},"assertion":[{"value":"29 May 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 September 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 February 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}