{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T13:50:26Z","timestamp":1762869026703,"version":"3.37.3"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"20","license":[{"start":{"date-parts":[[2023,2,22]],"date-time":"2023-02-22T00:00:00Z","timestamp":1677024000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,2,22]],"date-time":"2023-02-22T00:00:00Z","timestamp":1677024000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1007\/s11042-023-14602-y","type":"journal-article","created":{"date-parts":[[2023,2,22]],"date-time":"2023-02-22T08:02:58Z","timestamp":1677052978000},"page":"31001-31034","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Detection and localization of frame duplication using binary image template"],"prefix":"10.1007","volume":"82","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6941-9721","authenticated-orcid":false,"given":"I\u015f\u0131lay","family":"Bozkurt","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5729-6613","authenticated-orcid":false,"given":"G\u00fczin","family":"Uluta\u015f","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,22]]},"reference":[{"issue":"4","key":"14602_CR1","doi-asserted-by":"publisher","first-page":"4905","DOI":"10.1007\/s11042-018-6570-8","volume":"78","author":"J Bakas","year":"2019","unstructured":"Bakas J, Naskar R, Dixit R (2019) Detection and localization of inter-frame video forgeries based on inconsistency in correlation distribution between Haralick coded frames. Multimed Tools Appl 78(4):4905\u20134935. https:\/\/doi.org\/10.1007\/s11042-018-6570-8","journal-title":"Multimed Tools Appl"},{"key":"14602_CR2","doi-asserted-by":"publisher","first-page":"106929","DOI":"10.1016\/j.compeleceng.2020.106929","volume":"89","author":"J Bakas","year":"2021","unstructured":"Bakas J, Naskar R, Bakshi S (2021) Detection and localization of inter-frame forgeries in videos based on macroblock variation and motion vector analysis. Comput Electr Eng 89:106929. https:\/\/doi.org\/10.1016\/j.compeleceng.2020.106929","journal-title":"Comput Electr Eng"},{"issue":"6","key":"14602_CR3","doi-asserted-by":"publisher","first-page":"4558","DOI":"10.3906\/elk-1703-125","volume":"25","author":"I Bozkurt","year":"2017","unstructured":"Bozkurt I, Bozkurt MH, Uluta\u015f G (2017) A new video forgery detection approach based on forgery line. Turk J Electr Eng Comput Sci 25(6):4558\u20134574","journal-title":"Turk J Electr Eng Comput Sci"},{"issue":"4","key":"14602_CR4","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1111\/1556-4029.13658","volume":"63","author":"SM Fadl","year":"2018","unstructured":"Fadl SM, Han Q, Li Q (2018) Authentication of surveillance videos: detecting frame duplication based on residual frame. J Forensic Sci 63(4):1099\u20131109. https:\/\/doi.org\/10.1111\/1556-4029.13658","journal-title":"J Forensic Sci"},{"issue":"9","key":"14602_CR5","doi-asserted-by":"publisher","first-page":"5767","DOI":"10.1007\/s11042-019-08236-2","volume":"79","author":"MA Fayyaz","year":"2020","unstructured":"Fayyaz MA, Anjum A, Ziauddin S, Khan A, Sarfaraz A (2020) An improved surveillance video forgery detection technique using sensor pattern noise and correlation of noise residues. Multimed Tools Appl 79(9):5767\u20135788. https:\/\/doi.org\/10.1007\/s11042-019-08236-2","journal-title":"Multimed Tools Appl"},{"key":"14602_CR6","doi-asserted-by":"crossref","unstructured":"Hosler B, Mayer O, Bayar B, Zhao X, Chen C, Shackleford JA, Stamm MC (2019) A video camera model identification system using deep learning and fusion. In: ICASSP 2019-2019 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 8271\u20138275","DOI":"10.1109\/ICASSP.2019.8682608"},{"issue":"6","key":"14602_CR7","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1080\/13682199.2018.1461345","volume":"66","author":"KM Hosny","year":"2018","unstructured":"Hosny KM, Hamza HM, Lashin NA (2018) Copy-move forgery detection of duplicated objects using accurate PCET moments and morphological operators. Imaging Sci J 66(6):330\u2013345. https:\/\/doi.org\/10.1080\/13682199.2018.1461345","journal-title":"Imaging Sci J"},{"issue":"9","key":"14602_CR8","doi-asserted-by":"publisher","first-page":"1437","DOI":"10.1049\/iet-ipr.2018.5356","volume":"13","author":"KM Hosny","year":"2019","unstructured":"Hosny KM, Hamza HM, Lashin NA (2019) Copy-for-duplication forgery detection in colour images using QPCETMs and sub-image approach. IET Image Process 13(9):1437\u20131446","journal-title":"IET Image Process"},{"issue":"13","key":"14602_CR9","doi-asserted-by":"publisher","first-page":"800","DOI":"10.1049\/el:20080522","volume":"44","author":"Q Huynh-Thu","year":"2008","unstructured":"Huynh-Thu Q, Ghanbari M (2008) Scope of validity of PSNR in image\/video quality assessment. Electron Lett 44(13):800\u2013801","journal-title":"Electron Lett"},{"key":"14602_CR10","unstructured":"IeeeXplore. https:\/\/ieeexplore.ieee.org\/search\/searchresult.jsp?newsearch=true&querytext=passive%20video%20forgery. Accessed 16 Jan 2022"},{"key":"14602_CR11","volume-title":"Fundamentals of digital image processing","author":"AK Jain","year":"1989","unstructured":"Jain AK (1989) Fundamentals of digital image processing. Prentice-Hall, Inc., Englewood Cliffs"},{"issue":"11","key":"14602_CR12","doi-asserted-by":"publisher","first-page":"8107","DOI":"10.1007\/s11042-019-08272-y","volume":"79","author":"J Kharat","year":"2020","unstructured":"Kharat J, Chougule S (2020) A passive blind forgery detection technique to identify frame duplication attack. Multimed Tools Appl 79(11):8107\u20138123. https:\/\/doi.org\/10.1007\/s11042-019-08272-y","journal-title":"Multimed Tools Appl"},{"key":"14602_CR13","doi-asserted-by":"crossref","unstructured":"Li F, Huang T (2014) Video copy-move forgery detection and localization based on structural similarity. In: Proceedings of the 3rd international conference on multimedia technology (ICMT 2013). Springer, Berlin, pp 63\u201376","DOI":"10.1007\/978-3-642-41407-7_7"},{"issue":"1","key":"14602_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-022-10117-y","volume":"12","author":"X Li","year":"2022","unstructured":"Li X, Xiao X, Li J, Hu C, Yao J, Li S (2022) A CNN-based misleading video detection model. Sci Rep 12(1):1\u20139. https:\/\/doi.org\/10.1038\/s41598-022-10117-y","journal-title":"Sci Rep"},{"key":"14602_CR15","doi-asserted-by":"crossref","unstructured":"Lin GS, Chang JF, Chuang CH (2011) Detecting frame duplication based on spatial and temporal analyses. In: 2011 6th international conference on computer science & education (ICCSE). IEEE, pp 1396\u20131399","DOI":"10.1109\/ICCSE.2011.6028891"},{"key":"14602_CR16","doi-asserted-by":"crossref","unstructured":"Long C, Basharat A, Hoogs A (2022) Video frame deletion and duplication. In: Multimedia forensics. Springer, Singapore, pp 333\u2013362","DOI":"10.1007\/978-981-16-7621-5_13"},{"issue":"23","key":"14602_CR17","doi-asserted-by":"publisher","first-page":"33505","DOI":"10.1007\/s11042-019-08082-2","volume":"78","author":"KB Meena","year":"2019","unstructured":"Meena KB, Tyagi V (2019) A copy-move image forgery detection technique based on Gaussian-Hermite moments. Multimed Tools Appl 78(23):33505\u201333526. https:\/\/doi.org\/10.1007\/s11042-019-08082-2","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"14602_CR18","first-page":"702","volume":"4","author":"P Mukherjee","year":"2015","unstructured":"Mukherjee P, Mitra S (2015) A review on copy-move forgery detection techniques based on DCT and DWT. Int J Comput Sci Mob Comput IJCSMC 4(3):702\u2013708","journal-title":"Int J Comput Sci Mob Comput IJCSMC"},{"key":"14602_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00530-021-00873-8","volume":"28","author":"ST Nabi","year":"2022","unstructured":"Nabi ST, Kumar M, Singh P, Aggarwal N, Kumar K (2022) A comprehensive survey of image and video forgery techniques: variants, challenges, and future directions. Multimedia Systems 28:1\u201354. https:\/\/doi.org\/10.1007\/s00530-021-00873-8","journal-title":"Multimedia Systems"},{"key":"14602_CR20","doi-asserted-by":"crossref","unstructured":"Pennebaker WB, Mitchell JL (1992) JPEG: still image data compression standard. Springer Science & Business Media","DOI":"10.1117\/12.48892"},{"key":"14602_CR21","volume-title":"Computer networks: a systems approach","author":"LL Peterson","year":"2007","unstructured":"Peterson LL, Davie BS (2007) Computer networks: a systems approach. Elsevier"},{"key":"14602_CR22","doi-asserted-by":"publisher","unstructured":"Prasath R, Kathirvalavakumar T (2013) Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): preface. Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), vol 8284 Lnai. https:\/\/doi.org\/10.1007\/978-3-319-03844-5","DOI":"10.1007\/978-3-319-03844-5"},{"issue":"12","key":"14602_CR23","doi-asserted-by":"publisher","first-page":"3953","DOI":"10.3390\/s21123953","volume":"21","author":"H Pu","year":"2021","unstructured":"Pu H, Huang T, Weng B, Ye F, Zhao C (2021) Overcome the brightness and jitter noises in video inter-frame tampering detection. Sensors 21(12):3953. https:\/\/doi.org\/10.3390\/s21123953","journal-title":"Sensors"},{"key":"14602_CR24","doi-asserted-by":"crossref","unstructured":"Qadir G, Yahaya S, Ho AT (2012) Surrey university library for forensic analysis (SULFA) of video content","DOI":"10.1049\/cp.2012.0422"},{"key":"14602_CR25","doi-asserted-by":"publisher","unstructured":"Ren H, Atwa W, Zhang H, Muhammad S, Emam M (2021) Frame duplication forgery detection and localization algorithm based on the improved Levenshtein distance. Sci Program 2021. https:\/\/doi.org\/10.1155\/2021\/5595850","DOI":"10.1155\/2021\/5595850"},{"key":"14602_CR26","unstructured":"Sciencedirect. https:\/\/www.sciencedirect.com\/search?qs=passive%20video%20forgery&subjectareas=1700&lastselectedfacet=subjectareas. Accessed 16 Jan 2022"},{"key":"14602_CR27","unstructured":"Scopus. https:\/\/www.scopus.com\/term\/analyzer.uri?sid=9d9cc2ec729fd090502e7115ddf07853&origin=resultslist&src=s&s=key%28passive+video+forgery%29&sort=plf-f&sdt=b&sot=b&sl=26&count=32&analyzeresults=analyze+results&txgid=b059578e91d5f859d3579b9f84eb8afa. Accessed 16 Jan 2022"},{"issue":"4","key":"14602_CR28","doi-asserted-by":"publisher","first-page":"6247","DOI":"10.1007\/s11042-020-09974-4","volume":"80","author":"NA Shelke","year":"2021","unstructured":"Shelke NA, Kasana SS (2021) A comprehensive survey on passive techniques for digital video forgery detection. Multimed Tools Appl 80(4):6247\u20136310. https:\/\/doi.org\/10.1007\/s11042-020-09974-4","journal-title":"Multimed Tools Appl"},{"key":"14602_CR29","doi-asserted-by":"publisher","unstructured":"Shelke NA, Kasana SS (2021) Multiple forgeries identification in digital video based on correlation consistency between entropy coded frames. Multimed Syst:1\u201314. https:\/\/doi.org\/10.1007\/s00530-021-00837-y","DOI":"10.1007\/s00530-021-00837-y"},{"issue":"07","key":"14602_CR30","doi-asserted-by":"publisher","first-page":"1750107","DOI":"10.1142\/S0218126617501079","volume":"26","author":"RD Singh","year":"2017","unstructured":"Singh RD, Aggarwal N (2017) Optical flow and prediction residual based hybrid forensic system for inter-frame tampering detection. J Circuits Syst Comput 26(07):1750107. https:\/\/doi.org\/10.1142\/S0218126617501079","journal-title":"J Circuits Syst Comput"},{"issue":"3","key":"14602_CR31","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/s00530-020-00749-3","volume":"27","author":"RD Singh","year":"2021","unstructured":"Singh RD, Aggarwal N (2021) Optical flow and pattern noise-based copy\u2013paste detection in digital videos. Multimed Syst 27(3):449\u2013469. https:\/\/doi.org\/10.1007\/s00530-020-00749-3","journal-title":"Multimed Syst"},{"issue":"9","key":"14602_CR32","doi-asserted-by":"publisher","first-page":"11527","DOI":"10.1007\/s11042-018-6585-1","volume":"78","author":"G Singh","year":"2019","unstructured":"Singh G, Singh K (2019) Video frame and region duplication forgery detection based on correlation coefficient and coefficient of variation. Multimed Tools Appl 78(9):11527\u201311562. https:\/\/doi.org\/10.1007\/s11042-018-6585-1","journal-title":"Multimed Tools Appl"},{"key":"14602_CR33","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1016\/j.forsciint.2018.04.056","volume":"289","author":"K Sitara","year":"2018","unstructured":"Sitara K, Mehtre BM (2018) Detection of inter-frame forgeries in digital videos. Forensic Sci Int 289:186\u2013206. https:\/\/doi.org\/10.1016\/j.forsciint.2018.04.056","journal-title":"Forensic Sci Int"},{"key":"14602_CR34","doi-asserted-by":"crossref","unstructured":"Su Y, Xu J (2010) Detection of double-compression in MPEG-2 videos. In: 2010 2nd international workshop on intelligent systems and applications. IEEE, pp 1\u20134","DOI":"10.1109\/IWISA.2010.5473474"},{"key":"14602_CR35","doi-asserted-by":"crossref","unstructured":"Su Y, Nie W, Zhang C (2011) A frame tampering detection algorithm for MPEG videos. In: 2011 6th IEEE joint international information technology and artificial intelligence conference, vol 2. IEEE, pp 461\u2013464","DOI":"10.1109\/ITAIC.2011.6030373"},{"issue":"8","key":"14602_CR36","doi-asserted-by":"publisher","first-page":"4005","DOI":"10.3837\/tiis.2019.08.010","volume":"13","author":"SA Thajeel","year":"2019","unstructured":"Thajeel SA, Mahmood AS, Humood WR, Sulong G (2019) Detection copy-move forgery in image via quaternion polar harmonic transforms. KSII Trans Internet Inf Syst (TIIS) 13(8):4005\u20134025. https:\/\/doi.org\/10.3837\/tiis.2019.08.010","journal-title":"KSII Trans Internet Inf Syst (TIIS)"},{"key":"14602_CR37","unstructured":"Trace Library. Http:\/\/Trace.Eas.Asu.Edu\/Yuv\/Index.Html. Accessed 16 Jan 2022"},{"issue":"5","key":"14602_CR38","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1049\/iet-ipr.2016.0321","volume":"11","author":"G Ulutas","year":"2017","unstructured":"Ulutas G, Ustubioglu B, Ulutas M, Nabiyev V (2017) Frame duplication\/mirroring detection method with binary features. IET Image Process 11(5):333\u2013342","journal-title":"IET Image Process"},{"issue":"5","key":"14602_CR39","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/s00530-017-0581-6","volume":"24","author":"G Ulutas","year":"2018","unstructured":"Ulutas G, Ustubioglu B, Ulutas M, Nabiyev VV (2018) Frame duplication detection based on bow model. Multimedia Systems 24(5):549\u2013567. https:\/\/doi.org\/10.1007\/s00530-017-0581-6","journal-title":"Multimedia Systems"},{"issue":"5","key":"14602_CR40","first-page":"983","volume":"26","author":"G Ulutas","year":"2020","unstructured":"Ulutas G, Ustubioglu B, Ulutas M, Nabiyev V (2020) Video forgery detection method based on local difference binary. Pamukkale \u00dcniversitesi M\u00fchendislik Bilimleri Dergisi 26(5):983\u2013992","journal-title":"Pamukkale \u00dcniversitesi M\u00fchendislik Bilimleri Dergisi"},{"key":"14602_CR41","doi-asserted-by":"crossref","unstructured":"Ustubioglu B, Ulutas G, Ulutas M, Nabiyev V, Ustubioglu A (2016) LBP-DCT based copy move forgery detection algorithm. In: information sciences and systems 2015. Springer, Cham, pp 127\u2013136","DOI":"10.1007\/978-3-319-22635-4_11"},{"key":"14602_CR42","doi-asserted-by":"crossref","unstructured":"Vinolin V, Sucharitha M (2021) Video forgery detection using distance-based features and deep convolutional neural network. In: 2021 4th international conference on computing and communications technologies (ICCCT). IEEE, pp 350\u2013355","DOI":"10.1109\/ICCCT53315.2021.9711876"},{"key":"14602_CR43","doi-asserted-by":"publisher","unstructured":"Wang W, Farid H (2007) Exposing digital forgeries in video by detecting duplication. In: Proceedings of the 9th workshop on multimedia & security, pp 35\u201342. https:\/\/doi.org\/10.1145\/1288869.1288876","DOI":"10.1145\/1288869.1288876"},{"key":"14602_CR44","doi-asserted-by":"crossref","unstructured":"Wang W, Farid H (2009) Exposing digital forgeries in video by detecting double quantization. In: Proceedings of the 11th ACM workshop on multimedia and security, pp 39\u201348","DOI":"10.1145\/1597817.1597826"},{"issue":"4","key":"14602_CR45","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612","journal-title":"IEEE Trans Image Process"},{"key":"14602_CR46","doi-asserted-by":"publisher","first-page":"170032","DOI":"10.1109\/ACCESS.2019.2955308","volume":"7","author":"C Wang","year":"2019","unstructured":"Wang C, Zhang Z, Li Q, Zhou X (2019) An image copy-move forgery detection method based on SURF and PCET. IEEE Access 7:170032\u2013170047","journal-title":"IEEE Access"},{"issue":"19","key":"14602_CR47","doi-asserted-by":"publisher","first-page":"27109","DOI":"10.1007\/s11042-017-5083-1","volume":"78","author":"W Wei","year":"2019","unstructured":"Wei W, Fan X, Song H, Wang H (2019) Video tamper detection based on multi-scale mutual information. Multimed Tools Appl 78(19):27109\u201327126. https:\/\/doi.org\/10.1007\/s11042-017-5083-1","journal-title":"Multimed Tools Appl"},{"key":"14602_CR48","doi-asserted-by":"crossref","unstructured":"Xu J, Su Y, You X (2012) Detection of video transcoding for digital forensics. In: 2012 international conference on audio, language and image processing. IEEE, pp 160\u2013164","DOI":"10.1109\/ICALIP.2012.6376604"},{"issue":"01","key":"14602_CR49","doi-asserted-by":"publisher","first-page":"1354001","DOI":"10.1142\/S0218001413540013","volume":"27","author":"J Xu","year":"2013","unstructured":"Xu J, Su Y, Liu Q (2013) Detection of double MPEG-2 compression based on distributions of DCT coefficients. Int J Pattern Recognit Artif Intell 27(01):1354001. https:\/\/doi.org\/10.1142\/S0218001413540013","journal-title":"Int J Pattern Recognit Artif Intell"},{"issue":"4","key":"14602_CR50","doi-asserted-by":"publisher","first-page":"1793","DOI":"10.1007\/s11042-014-2374-7","volume":"75","author":"J Yang","year":"2016","unstructured":"Yang J, Huang T, Su L (2016) Using similarity analysis to detect frame duplication forgery in videos. Multimed Tools Appl 75(4):1793\u20131811. https:\/\/doi.org\/10.1007\/s11042-014-2374-7","journal-title":"Multimed Tools Appl"},{"key":"14602_CR51","doi-asserted-by":"publisher","unstructured":"Zhang Z, Hou J, Li Z, Li D (2015) Inter-frame forgery detection for static-background video based on MVP consistency. In: International workshop on digital watermarking. Springer, Cham, pp 94\u2013106. https:\/\/doi.org\/10.1007\/978-3-319-31960-5_9","DOI":"10.1007\/978-3-319-31960-5_9"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-14602-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-14602-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-14602-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,26]],"date-time":"2023-07-26T13:40:42Z","timestamp":1690378842000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-14602-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,22]]},"references-count":51,"journal-issue":{"issue":"20","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["14602"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-14602-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2023,2,22]]},"assertion":[{"value":"7 February 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 May 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 February 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 February 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}}]}}