{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T05:00:31Z","timestamp":1774501231979,"version":"3.50.1"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2022,11,17]],"date-time":"2022-11-17T00:00:00Z","timestamp":1668643200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,11,17]],"date-time":"2022-11-17T00:00:00Z","timestamp":1668643200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s11042-022-14093-3","type":"journal-article","created":{"date-parts":[[2022,11,17]],"date-time":"2022-11-17T04:34:07Z","timestamp":1668659647000},"page":"23735-23770","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["An optical-based encryption and authentication algorithm for color and grayscale medical images"],"prefix":"10.1007","volume":"82","author":[{"given":"Walid","family":"El-Shafai","sequence":"first","affiliation":[]},{"given":"Iman","family":"Almomani","sequence":"additional","affiliation":[]},{"given":"Anees","family":"Ara","sequence":"additional","affiliation":[]},{"given":"Aala","family":"Alkhayer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,17]]},"reference":[{"key":"14093_CR1","doi-asserted-by":"publisher","first-page":"106403","DOI":"10.1016\/j.optlaseng.2020.106403","volume":"138","author":"B Abd-El-Atty","year":"2021","unstructured":"Abd-El-Atty B, Iliyasu A M, Alanezi A, Abd El-latif A A (2021) Optical image encryption based on quantum walks. Opt Lasers Eng 138:106403","journal-title":"Opt Lasers Eng"},{"key":"14093_CR2","doi-asserted-by":"publisher","first-page":"105942","DOI":"10.1016\/j.optlastec.2019.105942","volume":"124","author":"AA Abd EL-Latif","year":"2020","unstructured":"Abd EL-Latif A A, Abd-El-Atty B, Abou-Nassar E M, Venegas-Andraca S E (2020) Controlled alternate quantum walks based privacy preserving healthcare images in internet of things. Opt Laser Technol 124:105942","journal-title":"Opt Laser Technol"},{"key":"14093_CR3","doi-asserted-by":"crossref","unstructured":"Abdulla A A, Sellahewa H, Jassim S A (2014) Stego quality enhancement by message size reduction and fibonacci bit-plane mapping. In: International conference on research in security standardisation. Springer, pp 151\u2013166","DOI":"10.1007\/978-3-319-14054-4_10"},{"issue":"13","key":"14093_CR4","doi-asserted-by":"publisher","first-page":"17799","DOI":"10.1007\/s11042-019-7166-7","volume":"78","author":"AA Abdulla","year":"2019","unstructured":"Abdulla A A, Sellahewa H, Jassim S A (2019) Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images. Multimed Tools Applic 78(13):17799\u201317823","journal-title":"Multimed Tools Applic"},{"issue":"17","key":"14093_CR5","doi-asserted-by":"publisher","first-page":"4435","DOI":"10.1049\/iet-ipr.2020.0978","volume":"14","author":"AA Abdulla","year":"2020","unstructured":"Abdulla A A (2020) Efficient computer-aided diagnosis technique for leukaemia cancer detection. IET Image Proc 14(17):4435\u20134440","journal-title":"IET Image Proc"},{"key":"14093_CR6","doi-asserted-by":"crossref","unstructured":"Al-Zubaidie M, Zhang Z, Zhang J (2019) Ramhu: a new robust lightweight scheme for mutual users authentication in healthcare applications. Security and Communication Networks, 2019","DOI":"10.1155\/2019\/3263902"},{"key":"14093_CR7","doi-asserted-by":"publisher","first-page":"128548","DOI":"10.1109\/ACCESS.2020.3008644","volume":"8","author":"A Alarifi","year":"2020","unstructured":"Alarifi A, Sankar S, Altameem T, Jithin KC, Amoon M, El-Shafai W (2020) A novel hybrid cryptosystem for secure streaming of high efficiency h. 265 compressed videos in iot multimedia applications. IEEE Access 8:128548\u2013128573","journal-title":"IEEE Access"},{"key":"14093_CR8","unstructured":"Alder S July 2021 Healthcare data breach report, https:\/\/www.hipaajournal.com\/july-2021-healthcare-data-breach-report\/"},{"key":"14093_CR9","doi-asserted-by":"crossref","unstructured":"Almomani I, Ahmed M, El-Shafai W (2022) Defoff: defensive\/offensive system based on hiding technologies. In: 2022 2nd International Conference of Smart Systems and Emerging Technologies (SMARTTECH). IEEE, pp 214\u2013219","DOI":"10.1109\/SMARTTECH54121.2022.00054"},{"key":"14093_CR10","first-page":"1209","volume":"70","author":"I Almomani","year":"2021","unstructured":"Almomani I, AlKhayer A, El-Shafai W (2021) Novel ransomware hiding model using hevc steganography approach. CMC Comput Mater Contin 70:1209\u20131228","journal-title":"CMC Comput Mater Contin"},{"issue":"6","key":"14093_CR11","doi-asserted-by":"publisher","first-page":"2281","DOI":"10.3390\/s22062281","volume":"22","author":"I Almomani","year":"2022","unstructured":"Almomani I, Alkhayer A, El-Shafai W (2022) A crypto-steganography approach for hiding ransomware within hevc streams in android iot devices. Sensors 22(6):2281","journal-title":"Sensors"},{"issue":"2","key":"14093_CR12","doi-asserted-by":"publisher","first-page":"3133","DOI":"10.32604\/cmc.2022.020454","volume":"70","author":"F Alqahtani","year":"2022","unstructured":"Alqahtani F, Amoon M, El-Shafai W (2022) A fractional fourier based medical image authentication approach. CMC-Computers Materials & Continua 70 (2):3133\u20133150","journal-title":"CMC-Computers Materials & Continua"},{"issue":"7","key":"14093_CR13","doi-asserted-by":"publisher","first-page":"1445","DOI":"10.1007\/s11517-020-02178-w","volume":"58","author":"R Amirtharajan","year":"2020","unstructured":"Amirtharajan R, et al. (2020) A robust medical image encryption in dual domain: chaos-dna-iwt combined approach. Med Biol Eng Comput 58(7):1445\u20131458","journal-title":"Med Biol Eng Comput"},{"issue":"43","key":"14093_CR14","doi-asserted-by":"publisher","first-page":"31715","DOI":"10.1007\/s11042-020-09497-y","volume":"79","author":"P Biswas","year":"2020","unstructured":"Biswas P, Kandar S, Dhara B C (2020) An image encryption scheme using sequence generated by interval bisection of polynomial function. Multimed Tools Applic 79(43):31715\u201331738","journal-title":"Multimed Tools Applic"},{"key":"14093_CR15","doi-asserted-by":"crossref","unstructured":"Borda M (2011) Fundamentals in information theory and coding. Springer Science & Business Media","DOI":"10.1007\/978-3-642-20347-3"},{"key":"14093_CR16","doi-asserted-by":"publisher","first-page":"106026","DOI":"10.1016\/j.optlaseng.2020.106026","volume":"128","author":"M Chen","year":"2020","unstructured":"Chen M, Ma G, Tang C, Lei Z (2020) Generalized optical encryption framework based on shearlets for medical image. Opt Lasers Eng 128:106026","journal-title":"Opt Lasers Eng"},{"issue":"3","key":"14093_CR17","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1147\/rd.383.0243","volume":"38","author":"D Coppersmith","year":"1994","unstructured":"Coppersmith D (1994) The data encryption standard (des) and its strength against attacks. IBM J Res Develop 38(3):243\u2013250","journal-title":"IBM J Res Develop"},{"issue":"4","key":"14093_CR18","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.1109\/TIT.2006.871582","volume":"52","author":"DL Donoho","year":"2006","unstructured":"Donoho D L (2006) Compressed sensing. IEEE Trans Inform Theory 52(4):1289\u20131306","journal-title":"IEEE Trans Inform Theory"},{"key":"14093_CR19","doi-asserted-by":"publisher","first-page":"35004","DOI":"10.1109\/ACCESS.2021.3062403","volume":"9","author":"W El-Shafai","year":"2021","unstructured":"El-Shafai W, Almomani I M, Alkhayer A (2021) Optical bit-plane-based 3d-jst cryptography algorithm with cascaded 2d-frft encryption for efficient and secure hevc communication. IEEE Access 9:35004\u201335026","journal-title":"IEEE Access"},{"issue":"1","key":"14093_CR20","doi-asserted-by":"publisher","first-page":"895","DOI":"10.32604\/cmc.2022.018545","volume":"70","author":"W El-Shafai","year":"2022","unstructured":"El-Shafai W, Aly M H, Algarni A D, Abd El-Samie F E, Soliman N F (2022) Secure and robust optical multi-stage medical image cryptosystem. CMC-Computers Materials & Continua 70(1):895\u2013913","journal-title":"CMC-Computers Materials & Continua"},{"key":"14093_CR21","doi-asserted-by":"crossref","unstructured":"El-Shafai W, Khallaf F, El-Rabaie E-S M, Abd El-Samie F E (2021) Robust medical image encryption based on dna-chaos cryptosystem for secure telemedicine and healthcare applications. J Ambient Intell Humaniz Comput, 1\u201329","DOI":"10.1007\/s12652-020-02597-5"},{"key":"14093_CR22","first-page":"103039","volume":"64","author":"W El-Shafai","year":"2022","unstructured":"El-Shafai W, Mesrega A K, Ahmed H E H, El-Bahnasawy N A, Abd El-Samie F E (2022) An efficient multimedia compression-encryption scheme using latin squares for securing internet-of-things networks. J Inform Secur Applic 64:103039","journal-title":"J Inform Secur Applic"},{"issue":"17","key":"14093_CR23","doi-asserted-by":"publisher","first-page":"1196","DOI":"10.1049\/el.2017.1321","volume":"53","author":"H Fan","year":"2017","unstructured":"Fan H, Li M, Mao W (2017) Vq-based compressive sensing with high compression quality. Electron Lett 53(17):1196\u20131198","journal-title":"Electron Lett"},{"key":"14093_CR24","doi-asserted-by":"publisher","first-page":"4184","DOI":"10.1109\/ACCESS.2018.2879857","volume":"7","author":"OS Faragallah","year":"2018","unstructured":"Faragallah O S, Alzain M A, El-Sayed H S, Al-Amri J F, El-Shafai W, Afifi A, Naeem E A, Soh B (2018) Block-based optical color image encryption based on double random phase encoding. IEEE Access 7:4184\u20134194","journal-title":"IEEE Access"},{"issue":"3","key":"14093_CR25","doi-asserted-by":"publisher","first-page":"2495","DOI":"10.1007\/s11042-019-08190-z","volume":"79","author":"OS Faragallah","year":"2020","unstructured":"Faragallah O S, AlZain M A, El-Sayed H S, Al-Amri J F, El-Shafai W, Afifi A, Naeem E A, Soh B (2020) Secure color image cryptosystem based on chaotic logistic in the frft domain. Multimed Tools Applic 79(3):2495\u20132519","journal-title":"Multimed Tools Applic"},{"key":"14093_CR26","doi-asserted-by":"publisher","first-page":"106333","DOI":"10.1016\/j.optlaseng.2020.106333","volume":"137","author":"OS Faragallah","year":"2021","unstructured":"Faragallah O S, El-sayed H S, Afifi A, El-Shafai W (2021) Efficient and secure opto-cryptosystem for color images using 2d logistic-based fractional fourier transform. Opt Lasers Eng 137:106333","journal-title":"Opt Lasers Eng"},{"key":"14093_CR27","doi-asserted-by":"crossref","unstructured":"Faragallah O S, El-Shafai W, Sallam A I, Elashry I, EL-Rabaie E-S M, Afifi A, AlZain M A, Al-Amri J F, Abd El-Samie F E, El-sayed H S (2021) Cybersecurity framework of hybrid watermarking and selective encryption for secure hevc communication. J Ambient Intell Humaniz Comput, 1\u201325","DOI":"10.1007\/s12652-020-02832-z"},{"issue":"1","key":"14093_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12596-013-0147-8","volume":"43","author":"SN George","year":"2014","unstructured":"George S N, Pattathil D P (2014) A novel approach for secure compressive sensing of images using multiple chaotic maps. J Opt 43(1):1\u201317","journal-title":"J Opt"},{"key":"14093_CR29","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.jbi.2017.06.009","volume":"71","author":"TM Godinho","year":"2017","unstructured":"Godinho T M, Lebre R, Silva L B , Costa C (2017) An efficient architecture to support digital pathology in standard medical imaging repositories. J Biomed Inform 71:190\u2013197","journal-title":"J Biomed Inform"},{"key":"14093_CR30","doi-asserted-by":"crossref","unstructured":"Gopinathan U, Monaghan D S, Naughton T J, Sheridan J T, Javidi B (2005) Strengths and weaknesses of optical encryption algorithms. In: 2005 IEEE LEOS Annual meeting conference proceedings. IEEE, pp 951\u2013952","DOI":"10.1109\/LEOS.2005.1548326"},{"key":"14093_CR31","doi-asserted-by":"crossref","unstructured":"Gueron S, Johnson S, Walker J (2011) Sha-512\/256. In: 2011 Eighth international conference on information technology: new generations. IEEE, pp 354\u2013358","DOI":"10.1109\/ITNG.2011.69"},{"key":"14093_CR32","first-page":"1","volume":"2021","author":"A Hafsa","year":"2021","unstructured":"Hafsa A, Gafsi M, Malek J, Machhout M (2021) Fpga implementation of improved security approach for medical image encryption and decryption. Sci Program 2021:1\u201320","journal-title":"Sci Program"},{"key":"14093_CR33","doi-asserted-by":"crossref","unstructured":"Hazer A, Y\u0131ld\u0131r\u0131m R (2021) A review of single and multiple optical image encryption techniques. J Opt","DOI":"10.1364\/COSI.2021.CF2E.6"},{"key":"14093_CR34","doi-asserted-by":"crossref","unstructured":"Helmy M, El-Shafai W, El-Rabaie S, El-Dokany IM, El-Samie F E A (2021) Efficient security framework for reliable wireless 3d video transmission. Multidimension Syst Signal Process, 1\u201341","DOI":"10.1007\/s11045-021-00796-7"},{"issue":"3","key":"14093_CR35","doi-asserted-by":"publisher","first-page":"3373","DOI":"10.1007\/s12652-020-02399-9","volume":"12","author":"S Jeevitha","year":"2021","unstructured":"Jeevitha S, Prabha N A (2021) Novel medical image encryption using dwt block-based scrambling and edge maps. J Ambient Intell Humaniz Comput 12(3):3373\u20133388","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"14093_CR36","doi-asserted-by":"publisher","first-page":"37855","DOI":"10.1109\/ACCESS.2021.3063237","volume":"9","author":"ST Kamal","year":"2021","unstructured":"Kamal S T, Hosny K M, Elgindy T M, Darwish M M, Fouda M M (2021) A new image encryption algorithm for grey and color medical images. IEEE Access 9:37855\u201337865","journal-title":"IEEE Access"},{"key":"14093_CR37","doi-asserted-by":"crossref","unstructured":"Kang S W, Choi U S, Cho S J (2021) Fast image encryption algorithm based on (n, m, k)-pcmlca. Multimedia Tools and Applications, 1\u201327","DOI":"10.1007\/s11042-021-11424-8"},{"key":"14093_CR38","doi-asserted-by":"crossref","unstructured":"Karim SM Masud, Rahman M S, Hossain M I (2011) A new approach for lsb based image steganography using secret key. In: 14th International conference on computer and information technology (ICCIT 2011). IEEE, pp 286\u2013291","DOI":"10.1109\/ICCITechn.2011.6164800"},{"issue":"3","key":"14093_CR39","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MMUL.2005.46","volume":"12","author":"V Licks","year":"2005","unstructured":"Licks V, Jordan R (2005) Geometric attacks on image watermarking systems. IEEE Multimed 12(3):68\u201378","journal-title":"IEEE Multimed"},{"issue":"17","key":"14093_CR40","doi-asserted-by":"publisher","first-page":"22787","DOI":"10.1007\/s11042-017-5534-8","volume":"77","author":"J Liu","year":"2018","unstructured":"Liu J, Ma Y, Li S, Lian J, Zhang X (2018) A new simple chaotic system and its application in medical image encryption. Multimed Tools Applic 77(17):22787\u201322808","journal-title":"Multimed Tools Applic"},{"key":"14093_CR41","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1016\/j.optlastec.2013.05.023","volume":"57","author":"S Liu","year":"2014","unstructured":"Liu S, Guo C, Sheridan J T (2014) A review of optical image encryption techniques. Opt Laser Technol 57:327\u2013342","journal-title":"Opt Laser Technol"},{"key":"14093_CR42","doi-asserted-by":"publisher","first-page":"102296","DOI":"10.1016\/j.sysarc.2021.102296","volume":"120","author":"AK Maurya","year":"2021","unstructured":"Maurya A K, Das A K, Jamal S S, Giri D (2021) Secure user authentication mechanism for iot-enabled wireless sensor networks based on multiple bloom filters. J Syst Architect 120:102296","journal-title":"J Syst Architect"},{"issue":"16","key":"14093_CR43","doi-asserted-by":"publisher","first-page":"4328","DOI":"10.1364\/AO.55.004328","volume":"55","author":"I Moon","year":"2016","unstructured":"Moon I, Yi F, Han M, Lee J (2016) Efficient asymmetric image authentication schemes based on photon counting-double random phase encoding and rsa algorithms. Appl Opt 55(16):4328\u20134335","journal-title":"Appl Opt"},{"key":"14093_CR44","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.optlaseng.2018.05.009","volume":"110","author":"H Nematzadeh","year":"2018","unstructured":"Nematzadeh H, Enayatifar R, Motameni H, Guimar\u00e3es F G, Coelho V N (2018) Medical image encryption using a hybrid model of modified genetic algorithm and coupled map lattices. Opt Lasers Eng 110:24\u201332","journal-title":"Opt Lasers Eng"},{"issue":"7","key":"14093_CR45","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1364\/OL.20.000767","volume":"20","author":"P Refregier","year":"1995","unstructured":"Refregier P, Javidi B (1995) Optical image encryption based on input plane and fourier plane random encoding. Opt Lett 20(7):767\u2013769","journal-title":"Opt Lett"},{"issue":"3","key":"14093_CR46","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1093\/biomet\/66.3.605","volume":"66","author":"DW Scott","year":"1979","unstructured":"Scott D W (1979) On optimal and data-based histograms. Biometrika 66(3):605\u2013610","journal-title":"Biometrika"},{"key":"14093_CR47","doi-asserted-by":"crossref","unstructured":"Selvi C T, Amudha J, Sudhakar R (2021) Medical image encryption and compression by adaptive sigma filterized synorr certificateless signcryptive levenshtein entropy-coding-based deep neural learning. Multimed Syst, 1\u201316","DOI":"10.1007\/s00530-021-00764-y"},{"key":"14093_CR48","doi-asserted-by":"publisher","first-page":"106911","DOI":"10.1016\/j.optlastec.2020.106911","volume":"138","author":"Y Shen","year":"2021","unstructured":"Shen Y, Tang C, Xu M, Lei Z (2021) Optical selective encryption based on the frfcm algorithm and face biometric for the medical image. Opt Laser Technol 138:106911","journal-title":"Opt Laser Technol"},{"key":"14093_CR49","unstructured":"Stone C J (1984) An asymptotically optimal histogram selection rule. In: Proceedings of the Berkeley conference in honor of Jerzy Neyman and Jack Kiefer, vol 2. Wadsworth, pp 513\u2013520"},{"key":"14093_CR50","unstructured":"Taylor J (1997) Introduction to error analysis, the study of uncertainties in physical measurements. University Science Books, 648 Broadway, Suite 902, New York, NY 10012"},{"key":"14093_CR51","doi-asserted-by":"crossref","unstructured":"Thanki R (2020) Genetic algorithm-based intelligent watermarking for security of medical images in telemedicine applications. In: Intelligent data security solutions for e-health applications. Elsevier, pp 185\u2013204","DOI":"10.1016\/B978-0-12-819511-6.00010-8"},{"key":"14093_CR52","doi-asserted-by":"crossref","unstructured":"Umbaugh S E (2010) Digital image processing and analysis: human and computer vision applications with cviptools. CRC press","DOI":"10.1201\/9781439802069"},{"key":"14093_CR53","doi-asserted-by":"publisher","first-page":"106399","DOI":"10.1016\/j.optlaseng.2020.106399","volume":"137","author":"A Vandana","year":"2021","unstructured":"Vandana A, Sachin S, Singh P (2021) Cascaded unequal modulus decomposition in fresnel domain based cryptosystem to enhance the image security. Opt Lasers Eng 137:106399","journal-title":"Opt Lasers Eng"},{"key":"14093_CR54","doi-asserted-by":"crossref","unstructured":"Yousif S F, Abboud A J, Alhumaima R S (2022) A new image encryption based on bit replacing, chaos and dna coding techniques. Multimedia Tools and Applications, 1\u201341","DOI":"10.1007\/s11042-022-12762-x"},{"key":"14093_CR55","doi-asserted-by":"publisher","first-page":"155184","DOI":"10.1109\/ACCESS.2020.3019216","volume":"8","author":"SF Yousif","year":"2020","unstructured":"Yousif S F, Abboud A J, Radhi H Y (2020) Robust image encryption with scanning technology, the el-gamal algorithm and chaos theory. IEEE Access 8:155184\u2013155209","journal-title":"IEEE Access"},{"key":"14093_CR56","doi-asserted-by":"publisher","first-page":"105769","DOI":"10.1016\/j.optlastec.2019.105769","volume":"121","author":"K Zhou","year":"2020","unstructured":"Zhou K, Fan J, Fan H, Li M (2020) Secure image encryption scheme using double random-phase encoding and compressed sensing. Opt Laser Technol 121:105769","journal-title":"Opt Laser Technol"},{"issue":"15","key":"14093_CR57","doi-asserted-by":"publisher","first-page":"20855","DOI":"10.1007\/s11042-019-7405-y","volume":"78","author":"S Zhu","year":"2019","unstructured":"Zhu S, Zhu C (2019) A new image compression-encryption scheme based on compressive sensing and cyclic shift. Multimed Tools Applic 78 (15):20855\u201320875","journal-title":"Multimed Tools Applic"},{"key":"14093_CR58","first-page":"537","volume":"8","author":"D Ziou","year":"1998","unstructured":"Ziou D, Tabbone S, et al. (1998) Edge detection techniques-an overview. Pattern Recognition and Image Analysis C\/C of Raspoznavaniye Obrazov I Analiz Izobrazhenii 8:537\u2013559","journal-title":"Pattern Recognition and Image Analysis C\/C of Raspoznavaniye Obrazov I Analiz Izobrazhenii"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-14093-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-14093-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-14093-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T09:23:32Z","timestamp":1685438612000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-14093-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,17]]},"references-count":58,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["14093"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-14093-3","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,17]]},"assertion":[{"value":"7 June 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 August 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 October 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 November 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We declare that we have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Competing interests"}}]}}