{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T08:35:50Z","timestamp":1771490150587,"version":"3.50.1"},"reference-count":63,"publisher":"Springer Science and Business Media LLC","issue":"28","license":[{"start":{"date-parts":[[2022,5,11]],"date-time":"2022-05-11T00:00:00Z","timestamp":1652227200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,5,11]],"date-time":"2022-05-11T00:00:00Z","timestamp":1652227200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100004541","name":"Ministry of Human Resource Development","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004541","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Department of Biotechnology, Government of India","award":["BT\/COE\/34\/SP28408\/2018"],"award-info":[{"award-number":["BT\/COE\/34\/SP28408\/2018"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1007\/s11042-022-13172-9","type":"journal-article","created":{"date-parts":[[2022,5,11]],"date-time":"2022-05-11T00:02:25Z","timestamp":1652227345000},"page":"40511-40533","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["StegGAN: hiding image within image using conditional generative adversarial networks"],"prefix":"10.1007","volume":"81","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2661-6244","authenticated-orcid":false,"given":"Brijesh","family":"Singh","sequence":"first","affiliation":[]},{"given":"Prasen Kumar","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Shashank Anil","family":"Huddedar","sequence":"additional","affiliation":[]},{"given":"Arijit","family":"Sur","sequence":"additional","affiliation":[]},{"given":"Pinaki","family":"Mitra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,11]]},"reference":[{"key":"13172_CR1","doi-asserted-by":"crossref","unstructured":"Abdulla AA, Jassim SA, Sellahewa H (2013) Efficient high-capacity steganography technique. In: Mobile multimedia\/image processing, security, and applications 2013, vol 8755, p 875508. International society for optics and photonics","DOI":"10.1117\/12.2018994"},{"key":"13172_CR2","doi-asserted-by":"crossref","unstructured":"Abdulla AA, Jassim SA, Sellahewa H (2013) Secure steganography technique based on bitplane indexes. In: 2013 IEEE International symposium on multimedia, pp 287\u2013291. IEEE","DOI":"10.1109\/ISM.2013.55"},{"key":"13172_CR3","doi-asserted-by":"crossref","unstructured":"Abdulla AA, Sellahewa H, Jassim SA (2014) Steganography based on pixel intensity value decomposition. In: Mobile multimedia\/image processing, security, and applications 2014, vol 9120, p 912005. International society for optics and photonics","DOI":"10.1117\/12.2050518"},{"key":"13172_CR4","doi-asserted-by":"crossref","unstructured":"Agustsson E, Timofte R (2017) Ntire 2017 challenge on single image super-resolution: Dataset and study. In: The IEEE conference on computer vision and pattern recognition (CVPR) workshops","DOI":"10.1109\/CVPRW.2017.150"},{"key":"13172_CR5","unstructured":"Arjovsky M, Chintala S, Bottou L (2017) Wasserstein generative adversarial networks. In: Precup D, Teh YW (eds) Proceedings of the 34th International Conference on Machine Learning, Proceedings of Machine Learning Research, vol. 70. PMLR, International Convention Centre, Sydney, Australia, pp 214\u2013223"},{"key":"13172_CR6","unstructured":"Baluja S (2017) Hiding images in plain sight: deep steganography. In: Advances in neural information processing systems 30, pp 2069\u20132079"},{"key":"13172_CR7","unstructured":"Baluja S (2019) Hiding images within images. IEEE Trans Pattern Anal Mach Intell:1\u20131"},{"key":"13172_CR8","unstructured":"Boehm B (2014) Stegexpose - A tool for detecting LSB steganography. arXiv:1410.6656"},{"issue":"5","key":"13172_CR9","doi-asserted-by":"publisher","first-page":"1181","DOI":"10.1109\/TIFS.2018.2871749","volume":"14","author":"M Boroumand","year":"2018","unstructured":"Boroumand M, Chen M, Fridrich J (2018) Deep residual network for steganalysis of digital images. IEEE Trans Inform Forensic Secur 14(5):1181\u20131193","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"13172_CR10","unstructured":"Franzen R Kodak lossless true color image suite. http:\/\/r0k.us\/graphics\/kodak\/"},{"issue":"3","key":"13172_CR11","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inform Forensic Secur 7(3):868\u2013882","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"13172_CR12","doi-asserted-by":"crossref","unstructured":"Goljan M, Fridrich J, Cogranne R (2014) Rich model for steganalysis of color images. In: 2014 IEEE International workshop on information forensics and security (WIFS), pp 185\u2013190","DOI":"10.1109\/WIFS.2014.7084325"},{"key":"13172_CR13","unstructured":"Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. In: Advances in neural information processing systems, pp 2672\u20132680"},{"key":"13172_CR14","doi-asserted-by":"crossref","unstructured":"Gu S, Meng D, Zuo W, Zhang L (2017) Joint convolutional analysis and synthesis sparse representation for single image layer separation. In: 2017 IEEE International conference on computer vision (ICCV), pp 1717\u20131725","DOI":"10.1109\/ICCV.2017.189"},{"key":"13172_CR15","doi-asserted-by":"crossref","unstructured":"Haichao S, Jing D, Wei W, Yinlong Q, Xiaoyu Z (2018) Ssgan: secure steganography based on generative adversarial networks. In: Advances in multimedia information processing \u2013 PCM 2017. Springer International Publishing, Cham, pp 534\u2013544","DOI":"10.1007\/978-3-319-77380-3_51"},{"key":"13172_CR16","unstructured":"Hayes J, Danezis G (2017) Generating steganographic images via adversarial training. In: Advances in neural information processing systems 30, pp 1954\u20131963"},{"key":"13172_CR17","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2015) Delving deep into rectifiers: surpassing human-level performance on imagenet classification. arXiv:1502.01852","DOI":"10.1109\/ICCV.2015.123"},{"key":"13172_CR18","doi-asserted-by":"crossref","unstructured":"Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: 2012 IEEE International workshop on information forensics and security (WIFS), pp 234\u2013239. IEEE","DOI":"10.1109\/WIFS.2012.6412655"},{"issue":"1","key":"13172_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-417X-2014-1","volume":"2014","author":"V Holub","year":"2014","unstructured":"Holub V, Fridrich J, Denemark T (2014) Universal distortion function for steganography in an arbitrary domain. EURASIP J Inform Secur 2014 (1):1","journal-title":"EURASIP J Inform Secur"},{"key":"13172_CR20","unstructured":"Ioffe S, Szegedy C (2015) Batch normalization: accelerating deep network training by reducing internal covariate shift. In: Proceedings of the 32Nd International Conference on International Conference on Machine Learning - vol 37, ICML\u201915, pp 448\u2013456"},{"key":"13172_CR21","doi-asserted-by":"crossref","unstructured":"Johnson J, Alahi A, Fei-Fei L (2016) Perceptual losses for real-time style transfer and super-resolution. In: European conference on computer vision, pp 694\u2013711. Springer","DOI":"10.1007\/978-3-319-46475-6_43"},{"key":"13172_CR22","doi-asserted-by":"crossref","unstructured":"Kaur G, Singh S, Rani R (2020) A high capacity reversible data hiding technique based on pixel value ordering using interlock partitioning. In: 2020 7Th international conference on signal processing and integrated networks (SPIN), pp 727\u2013732. IEEE","DOI":"10.1109\/SPIN48934.2020.9071330"},{"key":"13172_CR23","doi-asserted-by":"crossref","unstructured":"Kaur G, Singh S, Rani R, Kumar R (2020) A comprehensive study of reversible data hiding (rdh) schemes based on pixel value ordering (pvo). Archive Comput Method Eng:1\u201352","DOI":"10.1007\/s11831-020-09512-3"},{"key":"13172_CR24","unstructured":"Kingma DP, Ba J (2014) Adam: a method for stochastic optimization. arXiv:1412.6980"},{"issue":"2","key":"13172_CR25","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","volume":"7","author":"J Kodovsky","year":"2012","unstructured":"Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inform Forensic Secur 7(2):432\u2013444","journal-title":"IEEE Trans Inform Forensic Secur"},{"issue":"4","key":"13172_CR26","first-page":"763","volume":"15","author":"R Kumar","year":"2018","unstructured":"Kumar R, Chand S, Singh S (2018) A reversible data hiding scheme using pixel location. Int Arab J Inf Technol 15(4):763\u2013768","journal-title":"Int Arab J Inf Technol"},{"issue":"16","key":"13172_CR27","doi-asserted-by":"publisher","first-page":"22977","DOI":"10.1007\/s11042-019-7640-2","volume":"78","author":"R Kumar","year":"2019","unstructured":"Kumar R, Chand S, Singh S (2019) An optimal high capacity reversible data hiding scheme using move to front coding for lzw codes. Multimed Tools Appl 78(16):22977\u201323001","journal-title":"Multimed Tools Appl"},{"key":"13172_CR28","doi-asserted-by":"crossref","unstructured":"Lang X, Zhu F, Hao Y, Ou J (2008) Integral image based fast algorithm for two-dimensional otsu thresholding. In: 2008 Congress on image and signal processing, vol 3, pp 677\u2013681","DOI":"10.1109\/CISP.2008.179"},{"key":"13172_CR29","doi-asserted-by":"publisher","unstructured":"Li B, Wang M, Huang J, Li X (2014) A new cost function for spatial image steganography. In: 2014 IEEE International conference on image processing (ICIP), pp 4206\u20134210. https:\/\/doi.org\/10.1109\/ICIP.2014.7025854","DOI":"10.1109\/ICIP.2014.7025854"},{"issue":"2","key":"13172_CR30","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/LSP.2008.2008947","volume":"16","author":"X Li","year":"2009","unstructured":"Li X, Yang B, Cheng D, Zeng T (2009) A generalization of lsb matching. IEEE Signal Process Lett 16(2):69\u201372. https:\/\/doi.org\/10.1109\/LSP.2008.2008947","journal-title":"IEEE Signal Process Lett"},{"key":"13172_CR31","doi-asserted-by":"crossref","unstructured":"Lin TY, Maire M, Belongie S, Hays J, Perona P, Ramanan D, Doll\u00e1r P, Zitnick CL (2014) Microsoft coco: common objects in context. In: European conference on computer vision, pp 740\u2013755. Springer","DOI":"10.1007\/978-3-319-10602-1_48"},{"issue":"12","key":"13172_CR32","doi-asserted-by":"publisher","first-page":"15803","DOI":"10.1007\/s11042-017-5156-1","volume":"77","author":"A Malik","year":"2018","unstructured":"Malik A, Singh S, Kumar R (2018) Recovery based high capacity reversible data hiding scheme using even-odd embedding. Multimed Tools Appl 77 (12):15803\u201315827","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"13172_CR33","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1109\/LSP.2006.870357","volume":"13","author":"J Mielikainen","year":"2006","unstructured":"Mielikainen J (2006) Lsb matching revisited. IEEE Signal Process Lett 13(5):285\u2013287. https:\/\/doi.org\/10.1109\/LSP.2006.870357","journal-title":"IEEE Signal Process Lett"},{"key":"13172_CR34","unstructured":"Mirza M, Osindero S (2014) Conditional generative adversarial nets. arXiv:1411.1784"},{"issue":"1","key":"13172_CR35","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1073\/pnas.36.1.48","volume":"36","author":"JF Nash","year":"1950","unstructured":"Nash JF (1950) Equilibrium points in n-person games. Proc Nat Academy Sci 36(1):48\u201349. https:\/\/doi.org\/10.1073\/pnas.36.1.48","journal-title":"Proc Nat Academy Sci"},{"issue":"9","key":"13172_CR36","doi-asserted-by":"publisher","first-page":"1855","DOI":"10.1016\/j.patcog.2004.03.010","volume":"37","author":"G Pajares","year":"2004","unstructured":"Pajares G, De La Cruz JM (2004) A wavelet-based image fusion tutorial. Pattern recognition 37(9):1855\u20131872","journal-title":"Pattern recognition"},{"key":"13172_CR37","unstructured":"Paszke A, Gross S, Chintala S, Chanan G, Yang E, DeVito Z, Lin Z, Desmaison A, Antiga L, Lerer A (2017) Automatic differentiation in pytorch"},{"issue":"2","key":"13172_CR38","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/TIFS.2010.2045842","volume":"5","author":"T Pevny","year":"2010","unstructured":"Pevny T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inform Forensic Secur 5(2):215\u2013224","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"13172_CR39","doi-asserted-by":"crossref","unstructured":"Pevny\u0300 T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: International workshop on information hiding, pp 161\u2013177. Springer","DOI":"10.1007\/978-3-642-16435-4_13"},{"issue":"3","key":"13172_CR40","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MSECP.2003.1203220","volume":"99","author":"N Provos","year":"2003","unstructured":"Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Secur Privacy 99(3):32\u201344. https:\/\/doi.org\/10.1109\/MSECP.2003.1203220","journal-title":"IEEE Secur Privacy"},{"key":"13172_CR41","doi-asserted-by":"crossref","unstructured":"Qian Y, Dong J, Wang W, Tan T (2015) Deep learning for steganalysis via convolutional neural networks. In: Media watermarking, security, and forensics","DOI":"10.1117\/12.2083479"},{"key":"13172_CR42","doi-asserted-by":"crossref","unstructured":"Ronneberger O, Fischer P, Brox T (2015) U-net: convolutional networks for biomedical image segmentation. In: International conference on medical image computing and computer-assisted intervention, pp 234\u2013241. Springer","DOI":"10.1007\/978-3-319-24574-4_28"},{"issue":"3","key":"13172_CR43","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11263-015-0816-y","volume":"115","author":"O Russakovsky","year":"2015","unstructured":"Russakovsky O, Deng J, Su H, Krause J, Satheesh S, Ma S, Huang Z, Karpathy A, Khosla A, Bernstein M, Berg AC, Fei-Fei L (2015) Imagenet large scale visual recognition challenge. Int J Comput Vis (IJCV) 115 (3):211\u2013252. https:\/\/doi.org\/10.1007\/s11263-015-0816-y","journal-title":"Int J Comput Vis (IJCV)"},{"key":"13172_CR44","unstructured":"Sarkar T, Sanyal S (2014) Reversible and irreversible data hiding technique. arXiv:1405.2684"},{"key":"13172_CR45","unstructured":"Sheikh HR, Bovik AC (2004) Image information and visual quality. In: 2004 IEEE International conference on acoustics, speech, and signal processing, vol 3, pp iii\u2013709"},{"key":"13172_CR46","unstructured":"Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. arXiv:1409.1556"},{"key":"13172_CR47","doi-asserted-by":"crossref","unstructured":"Singh B, Chhajed M, Sur A, Mitra P (2020) Steganalysis using learned denoising kernels. Multimed Tools Appl:1\u201315","DOI":"10.1007\/s11042-020-09960-w"},{"key":"13172_CR48","doi-asserted-by":"crossref","unstructured":"Singh B, Sharma PK, Saxena R, Sur A, Mitra P (2019) A new steganalysis method using densely connected convnets. In: International conference on pattern recognition and machine intelligence, pp 277\u2013285. Springer","DOI":"10.1007\/978-3-030-34869-4_31"},{"key":"13172_CR49","doi-asserted-by":"publisher","unstructured":"Singh B, Sur A, Mitra P (2021) Steganalysis of digital images using deep fractal network. IEEE Trans Comput Social Syst:1\u20138. https:\/\/doi.org\/10.1109\/TCSS.2021.3052520","DOI":"10.1109\/TCSS.2021.3052520"},{"key":"13172_CR50","doi-asserted-by":"crossref","unstructured":"Singh S (2020) Adaptive pvd and lsb based high capacity data hiding scheme. Multimed Tools Appl:1\u201323","DOI":"10.1007\/s11042-020-08745-5"},{"key":"13172_CR51","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/TIFS.2020.3005304","volume":"16","author":"S Tan","year":"2020","unstructured":"Tan S, Wu W, Shao Z, Li Q, Li B, Huang J (2020) Calpa-net: channel-pruning-assisted deep residual network for steganalysis of digital images. IEEE Trans Inform Forensic Secur 16:131\u2013146","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"13172_CR52","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2440-0","volume-title":"The nature of statistical learning theory","author":"VN Vapnik","year":"1995","unstructured":"Vapnik VN (1995) The nature of statistical learning theory. Springer, Berlin"},{"key":"13172_CR53","doi-asserted-by":"crossref","unstructured":"Volkhonskiy D, Nazarov I, Burnaev E (2020) Steganographic generative adversarial networks. In: Twelfth international conference on machine vision (ICMV 2019), vol 11433, p 114333m. International society for optics and photonics","DOI":"10.1117\/12.2559429"},{"issue":"3","key":"13172_CR54","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/97.995823","volume":"9","author":"Z Wang","year":"2002","unstructured":"Wang Z, Bovik AC (2002) A universal image quality index. IEEE Signal Process Lett 9(3):81\u201384","journal-title":"IEEE Signal Process Lett"},{"issue":"4","key":"13172_CR55","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP, et al. (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612","journal-title":"IEEE Trans Image Process"},{"key":"13172_CR56","doi-asserted-by":"crossref","unstructured":"Wang Z, Simoncelli EP, Bovik AC (2003) Multiscale structural similarity for image quality assessment. In: The thrity-seventh asilomar conference on signals, systems computers, 2003, vol 2, pp 1398\u20131402","DOI":"10.1109\/ACSSC.2003.1292216"},{"key":"13172_CR57","unstructured":"Weber AG (1997) The usc-sipi image database version 5 USC-SIPI Report 315(1)"},{"issue":"5","key":"13172_CR58","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1109\/LSP.2016.2548421","volume":"23","author":"G Xu","year":"2016","unstructured":"Xu G, Wu H, Shi Y (2016) Structural design of convolutional neural networks for steganalysis. IEEE Signal Process Lett 23(5):708\u2013712. https:\/\/doi.org\/10.1109\/LSP.2016.2548421","journal-title":"IEEE Signal Process Lett"},{"key":"13172_CR59","unstructured":"Zhang KA, Cuesta-Infante A, Veeramachaneni K (2019) Steganogan: Pushing the limits of image steganography. arXiv:1901.03892"},{"key":"13172_CR60","doi-asserted-by":"publisher","unstructured":"Zhang R, Dong S, Liu J (2018) Invisible steganography via generative adversarial networks. Multimed Tool Appl. https:\/\/doi.org\/10.1007\/s11042-018-6951-z","DOI":"10.1007\/s11042-018-6951-z"},{"issue":"1","key":"13172_CR61","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/TCI.2016.2644865","volume":"3","author":"H Zhao","year":"2017","unstructured":"Zhao H, Gallo O, Frosio I, Kautz J (2017) Loss functions for image restoration with neural networks. IEEE Trans Comput Imag 3(1):47\u201357","journal-title":"IEEE Trans Comput Imag"},{"issue":"1","key":"13172_CR62","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/TCI.2016.2644865","volume":"3","author":"H Zhao","year":"2017","unstructured":"Zhao H, Gallo O, Frosio I, Kautz J (2017) Loss functions for image restoration with neural networks. IEEE Trans Comput Imag 3(1):47\u201357. https:\/\/doi.org\/10.1109\/TCI.2016.2644865","journal-title":"IEEE Trans Comput Imag"},{"key":"13172_CR63","doi-asserted-by":"crossref","unstructured":"Zhu J, Kaplan R, Johnson J, Fei-Fei L (2018) Hidden: hiding data with deep networks. In: The european conference on computer vision (ECCV)","DOI":"10.1007\/978-3-030-01267-0_40"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13172-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-13172-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13172-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,25]],"date-time":"2022-10-25T09:47:34Z","timestamp":1666691254000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-13172-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,11]]},"references-count":63,"journal-issue":{"issue":"28","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["13172"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-13172-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,11]]},"assertion":[{"value":"8 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 February 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 April 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 May 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}