{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T11:21:44Z","timestamp":1767612104102,"version":"3.37.3"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"30","license":[{"start":{"date-parts":[[2023,5,3]],"date-time":"2023-05-03T00:00:00Z","timestamp":1683072000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,5,3]],"date-time":"2023-05-03T00:00:00Z","timestamp":1683072000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s11042-023-14919-8","type":"journal-article","created":{"date-parts":[[2023,5,3]],"date-time":"2023-05-03T09:02:32Z","timestamp":1683104552000},"page":"46961-47002","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A new image encryption method using Bezier curve"],"prefix":"10.1007","volume":"82","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8505-0044","authenticated-orcid":false,"given":"Sujit Kumar","family":"Das","sequence":"first","affiliation":[]},{"given":"Bibhas Chandra","family":"Dhara","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,3]]},"reference":[{"key":"14919_CR1","doi-asserted-by":"crossref","first-page":"106974","DOI":"10.1016\/j.optlastec.2021.106974","volume":"140","author":"AA Abbasi","year":"2021","unstructured":"Abbasi AA, Mazinani M, Hosseini R (2021) Evolutionary-based image encryption using biomolecules and non-coupled map lattice. Opt Laser Technol 140:106974","journal-title":"Opt Laser Technol"},{"issue":"21","key":"14919_CR2","doi-asserted-by":"crossref","first-page":"13951","DOI":"10.1007\/s11042-015-2973-y","volume":"75","author":"J Ahmad","year":"2016","unstructured":"Ahmad J, Hwang SO (2016) A secure image encryption scheme based on chaotic maps and affine transformation. Multimed Tools Appl 75(21):13951\u201313976","journal-title":"Multimed Tools Appl"},{"key":"14919_CR3","doi-asserted-by":"crossref","unstructured":"Al-Maadeed TA, Hussain I, Anees A, Mustafa MT (2021) A image encryption algorithm based on chaotic lorenz system and novel primitive polynomial s-boxes. Multimed Tools Appl 1\u201322","DOI":"10.1007\/s11042-021-10695-5"},{"key":"14919_CR4","doi-asserted-by":"crossref","unstructured":"Biswas M, Das SK, Dhara BC (2021) An image encryption method using chaos and dna encoding. In: International Conference on Computational Intelligence in Communications and Business Analytics, pp 42\u201356. Springer","DOI":"10.1007\/978-3-030-75529-4_4"},{"key":"14919_CR5","doi-asserted-by":"crossref","unstructured":"Biswas P, Kandar S, Dhara BC (2020) An image encryption scheme using sequence generated by interval bisection of polynomial function. Multimed Tools Appl 1\u201324","DOI":"10.1007\/s11042-020-09497-y"},{"key":"14919_CR6","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.optlaseng.2016.08.009","volume":"88","author":"X Chai","year":"2017","unstructured":"Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using dna sequence operations. Opt Lasers Eng 88:197\u2013213","journal-title":"Opt Lasers Eng"},{"issue":"1","key":"14919_CR7","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/s00521-017-2993-9","volume":"31","author":"X Chai","year":"2019","unstructured":"Chai X, Gan Z, Yuan K, Chen Y, Liu X (2019) A novel image encryption scheme based on dna sequence operations and chaotic systems. Neural Comput & Applic 31(1):219\u2013237","journal-title":"Neural Comput & Applic"},{"issue":"2","key":"14919_CR8","first-page":"1","volume":"8","author":"W Chen","year":"2016","unstructured":"Chen W (2016) Optical multiple-image encryption using three-dimensional space. IEEE Photonics J 8(2):1\u20138","journal-title":"IEEE Photonics J"},{"issue":"1","key":"14919_CR9","first-page":"1","volume":"8","author":"W Chen","year":"2016","unstructured":"Chen W (2016) Single-shot imaging without reference wave using binary intensity pattern for optically-secured-based correlation. IEEE Photonics J 8(1):1\u20139","journal-title":"IEEE Photonics J"},{"issue":"1","key":"14919_CR10","doi-asserted-by":"crossref","first-page":"591","DOI":"10.1007\/s11277-019-06420-z","volume":"108","author":"JC Dagadu","year":"2019","unstructured":"Dagadu JC, Li J. -P., Aboagye EO (2019) Medical image encryption based on hybrid chaotic dna diffusion. Wirel Pers Commun 108(1):591\u2013612","journal-title":"Wirel Pers Commun"},{"key":"14919_CR11","doi-asserted-by":"crossref","unstructured":"Dagadu JC, Li J. -P., Addo PC (2019) An image cryptosystem based on pseudorandomly enhanced chaotic dna and random permutation. Multimed Tools Appl 1\u201322","DOI":"10.1007\/s11042-019-7693-2"},{"key":"14919_CR12","doi-asserted-by":"crossref","unstructured":"Das SK, Dhara BC (2017) An image encryption technique using sine curve. In: Advances in Pattern Recognition (ICAPR), 2017 9th International Conference On, pp 1\u20136. IEEE","DOI":"10.1109\/ICAPR.2017.8592943"},{"key":"14919_CR13","doi-asserted-by":"crossref","unstructured":"Das SK, Dhara BC (2017) A new image encryption method using circle. In: Computing, communication and networking technologies (ICCCNT), 2017 8th international conference on. IEEE, pp 1\u20136","DOI":"10.1109\/ICCCNT.2017.8203912"},{"key":"14919_CR14","doi-asserted-by":"crossref","unstructured":"Das SK, Dhara BC (2017) An image encryption technique using sine curve. In: 2017 ninth international conference on advances in pattern recognition (ICAPR). IEEE, pp 1\u20136","DOI":"10.1109\/ICAPR.2017.8592943"},{"issue":"4","key":"14919_CR15","first-page":"3186","volume":"4","author":"AS Dongare","year":"2017","unstructured":"Dongare AS, Alvi A, Tarbani N (2017) An efficient technique for image encryption and decryption for secured multimedia application. International Research Journal of Engineering and Technology (IRJET) 4(4):3186\u20133190","journal-title":"International Research Journal of Engineering and Technology (IRJET)"},{"issue":"3","key":"14919_CR16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJCAC.2021070101","volume":"11","author":"RK Dwivedi","year":"2021","unstructured":"Dwivedi RK, Kumar R, Buyya R (2021) Secure healthcare monitoring sensor cloud with attribute-based elliptical curve cryptography. International Journal of Cloud Applications and Computing (IJCAC) 11(3):1\u201318","journal-title":"International Journal of Cloud Applications and Computing (IJCAC)"},{"key":"14919_CR17","first-page":"173","volume":"47","author":"M Essaid","year":"2019","unstructured":"Essaid M, Akharraz I, Saaidi A, et al. (2019) Image encryption scheme based on a new secure variant of hill cipher and 1d chaotic maps. J Inf Secur Appl 47:173\u2013187","journal-title":"J Inf Secur Appl"},{"key":"14919_CR18","unstructured":"FIPS P (1999) 46-3. Data Encryption Standard (DES) 25"},{"key":"14919_CR19","volume-title":"Handbook of Computer Aided Geometric Design","author":"G Farin","year":"2002","unstructured":"Farin G, Hoschek J, Kim M. -S. (2002) Handbook of Computer Aided Geometric Design. Elsevier, Amsterdam"},{"issue":"06","key":"14919_CR20","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcation Chaos 8(06):1259\u20131284","journal-title":"Int J Bifurcation Chaos"},{"issue":"3","key":"14919_CR21","doi-asserted-by":"crossref","first-page":"1123","DOI":"10.1007\/s11071-015-2392-7","volume":"83","author":"R Guesmi","year":"2016","unstructured":"Guesmi R, Farah M, Kachouri A, Samet M (2016) A novel chaos-based image encryption using dna sequence operation and secure hash algorithm sha-2. Nonlinear Dyn 83(3):1123\u20131136","journal-title":"Nonlinear Dyn"},{"issue":"2","key":"14919_CR22","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1007\/s11071-013-1214-z","volume":"76","author":"I Hussain","year":"2014","unstructured":"Hussain I, Gondal MA (2014) An extended image encryption using chaotic coupled map and s-box transformation. Nonlinear Dyn 76(2):1355\u20131363","journal-title":"Nonlinear Dyn"},{"issue":"1","key":"14919_CR23","first-page":"1","volume":"12","author":"B Joshi","year":"2022","unstructured":"Joshi B, Joshi B, Mishra A, Arya V, Gupta AK, Perakovi\u0107 D. (2022) A comparative study of privacy-preserving homomorphic encryption techniques in cloud computing. Int J Cloud Appl Comput 12(1):1\u201311","journal-title":"Int J Cloud Appl Comput"},{"key":"14919_CR24","first-page":"117","volume":"44","author":"S Kandar","year":"2019","unstructured":"Kandar S, Chaudhuri D, Bhattacharjee A, Dhara BC (2019) Image encryption using sequence generated by cyclic group. J Inf Secur Appl 44:117\u2013129","journal-title":"J Inf Secur Appl"},{"key":"14919_CR25","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1016\/j.sigpro.2016.01.017","volume":"125","author":"M Kumar","year":"2016","unstructured":"Kumar M, Iqbal A, Kumar P (2016) A new rgb image encryption algorithm based on dna encoding and elliptic curve diffie\u2013hellman cryptography. Signal Process 125:187\u2013202","journal-title":"Signal Process"},{"key":"14919_CR26","doi-asserted-by":"crossref","unstructured":"Lai X, Massey JL (1990) A proposal for a new block encryption standard. In: Eurocrypt. Springer, vol 90, pp 389\u2013404","DOI":"10.1007\/3-540-46877-3_35"},{"issue":"7","key":"14919_CR27","first-page":"1","volume":"33","author":"Y Li","year":"2021","unstructured":"Li Y, Yu H, Song B, Chen J (2021) Image encryption based on a single-round dictionary and chaotic sequences in cloud computing. Concurrency Comput Pract Experience 33(7):1\u20131","journal-title":"Concurrency Comput Pract Experience"},{"issue":"9","key":"14919_CR28","doi-asserted-by":"crossref","first-page":"2714","DOI":"10.1016\/j.sigpro.2010.03.022","volume":"90","author":"X Liao","year":"2010","unstructured":"Liao X, Lai S, Zhou Q (2010) A novel image encryption algorithm based on self-adaptive wave transmission. Signal Process 90(9):2714\u20132722","journal-title":"Signal Process"},{"key":"14919_CR29","first-page":"376","volume":"125153","author":"H Liu","year":"2020","unstructured":"Liu H, Kadir A, Xu C (2020) Cryptanalysis and constructing s-box based on chaotic map and backtracking. Appl Math Comput 125153:376","journal-title":"Appl Math Comput"},{"issue":"11","key":"14919_CR30","doi-asserted-by":"crossref","first-page":"2250163","DOI":"10.1142\/S0218127422501632","volume":"32","author":"H Liu","year":"2022","unstructured":"Liu H, Wang X, Zhao M, Niu Y (2022) Constructing strong s-box by 2d chaotic map with application to irreversible parallel key expansion. Int J Bifurcation Chaos 32(11):2250163","journal-title":"Int J Bifurcation Chaos"},{"key":"14919_CR31","first-page":"57","volume":"42","author":"AS Mahmood","year":"2018","unstructured":"Mahmood AS, Rahim MSM (2018) Novel method for image security system based on improved scan method and pixel rotation technique. J Inf Secur Appl 42:57\u201370","journal-title":"J Inf Secur Appl"},{"key":"14919_CR32","doi-asserted-by":"crossref","unstructured":"Maiti C, Dhara BC (2018) Image encryption with a new fibonacci transform. In: 2018 Fifth international conference on emerging applications of information technology (EAIT). IEEE, pp 1\u20134","DOI":"10.1109\/EAIT.2018.8470437"},{"issue":"4","key":"14919_CR33","doi-asserted-by":"crossref","first-page":"725","DOI":"10.1016\/j.patcog.2003.08.011","volume":"37","author":"SS Maniccam","year":"2004","unstructured":"Maniccam SS, Bourbakis NG (2004) Image and video encryption using scan patterns. Pattern Recogn 37(4):725\u2013737","journal-title":"Pattern Recogn"},{"key":"14919_CR34","first-page":"117","volume":"45","author":"B Mondal","year":"2019","unstructured":"Mondal B, Singh S, Kumar P (2019) A secure image encryption scheme based on cellular automata and chaotic skew tent map. J Inf Secur Appl 45:117\u2013130","journal-title":"J Inf Secur Appl"},{"key":"14919_CR35","first-page":"202","volume":"163505","author":"H Nematzadeh","year":"2020","unstructured":"Nematzadeh H, Enayatifar R, Yadollahi M, Lee M, Jeong G (2020) Binary search tree image encryption with dna. Optik 163505:202","journal-title":"Optik"},{"key":"14919_CR36","doi-asserted-by":"crossref","unstructured":"Nithya R, Dhanasekaran D (2022) Novel dominant color subband image encryption in visual sensor network for smart military surveillance system, vol 39","DOI":"10.18280\/ts.390322"},{"issue":"441","key":"14919_CR37","first-page":"0311","volume":"197","author":"NF Pub","year":"2001","unstructured":"Pub NF (2001) 197: Advanced encryption standard (aes). Federal Information Processing Standards Publication 197(441):0311","journal-title":"Federal Information Processing Standards Publication"},{"issue":"8","key":"14919_CR38","doi-asserted-by":"crossref","first-page":"10513","DOI":"10.1007\/s11042-018-6574-4","volume":"78","author":"S Rajagopalan","year":"2019","unstructured":"Rajagopalan S, Sharma S, Arumugham S, Upadhyay HN, Rayappan JBB, Amirtharajan R (2019) Yrbs coding with logistic map\u2013a novel sanskrit aphorism and chaos for image encryption. Multimed Tools Appl 78(8):10513\u201310541","journal-title":"Multimed Tools Appl"},{"key":"14919_CR39","volume-title":"Curves and Surfaces for Computer Graphics","author":"D Salomon","year":"2007","unstructured":"Salomon D (2007) Curves and Surfaces for Computer Graphics. Springer, New York"},{"issue":"4","key":"14919_CR40","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication theory of secrecy systems. Bell Labs Tech J 28(4):656\u2013715","journal-title":"Bell Labs Tech J"},{"issue":"10","key":"14919_CR41","doi-asserted-by":"crossref","first-page":"2150146","DOI":"10.1142\/S0218127421501467","volume":"31","author":"Y Si","year":"2021","unstructured":"Si Y, Liu H, Chen Y (2021) Constructing keyed strong s-box using an enhanced quadratic map. Int J Bifurcation Chaos 31(10):2150146","journal-title":"Int J Bifurcation Chaos"},{"key":"14919_CR42","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1016\/j.optlastec.2018.09.048","volume":"111","author":"T Sivakumar","year":"2019","unstructured":"Sivakumar T, Li P (2019) A secure image encryption method using scan pattern and random key stream derived from laser chaos. Optics & Laser Technology 111:196\u2013204","journal-title":"Optics & Laser Technology"},{"key":"14919_CR43","doi-asserted-by":"crossref","unstructured":"Sivakumar T, Pandi M, Madasamy NS, Bharathi R (2021) An image encryption algorithm with hermite chaotic polynomials and scan pattern. In: Journal of Physics: Conference Series, vol. 1767, p. 012044. IOP Publishing","DOI":"10.1088\/1742-6596\/1767\/1\/012044"},{"issue":"2","key":"14919_CR44","first-page":"91","volume":"41","author":"T Sivakumar","year":"2014","unstructured":"Sivakumar T, Venkatesan R (2014) A novel approach for image encryption using dynamic scan pattern. IAENG Int J Comput Sci 41(2):91\u2013101","journal-title":"IAENG Int J Comput Sci"},{"key":"14919_CR45","doi-asserted-by":"crossref","first-page":"11","DOI":"10.2174\/1874431101610010011","volume":"10","author":"M Sokouti","year":"2016","unstructured":"Sokouti M, Zakerolhosseini A, Sokouti B (2016) Medical image encryption: an application for improved padding based ggh encryption algorithm. The open medical informatics journal 10:11","journal-title":"The open medical informatics journal"},{"key":"14919_CR46","first-page":"1","volume":"2019","author":"Z Tang","year":"2019","unstructured":"Tang Z, Yang Y, Xu S, Yu C, Zhang X (2019) Image encryption with double spiral scans and chaotic maps. Security and Communication Networks 2019:1\u201315","journal-title":"Security and Communication Networks"},{"key":"14919_CR47","unstructured":"USC-SIPI Image Database Website https:\/\/sipi.usc.edu\/database\/database.php?volume=misc"},{"issue":"10","key":"14919_CR48","doi-asserted-by":"crossref","first-page":"3101","DOI":"10.1007\/s10489-020-01697-1","volume":"50","author":"R Vidhya","year":"2020","unstructured":"Vidhya R, Brindha M, Gounden NA (2020) Analysis of zig-zag scan based modified feedback convolution algorithm against differential attacks and its application to image encryption. Appl Intell 50(10):3101\u20133124","journal-title":"Appl Intell"},{"key":"14919_CR49","first-page":"58","volume":"102699","author":"R Wang","year":"2021","unstructured":"Wang R, Deng G. -Q., Duan X. -F. (2021) An image encryption scheme based on double chaotic cyclic shift and josephus problem. J Inf Secur Appl 102699:58","journal-title":"J Inf Secur Appl"},{"issue":"5","key":"14919_CR50","doi-asserted-by":"crossref","first-page":"6229","DOI":"10.1007\/s11042-016-3311-8","volume":"76","author":"X Wang","year":"2017","unstructured":"Wang X, Liu C (2017) A novel and effective image encryption algorithm based on chaos and dna encoding. Multimed Tools Appl 76(5):6229\u20136245","journal-title":"Multimed Tools Appl"},{"key":"14919_CR51","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1016\/j.optlaseng.2015.09.008","volume":"78","author":"Y Wang","year":"2016","unstructured":"Wang Y, Quan C, Tay C (2016) Asymmetric optical image encryption based on an improved amplitude\u2013phase retrieval algorithm. Opt Lasers Eng 78:8\u201316","journal-title":"Opt Lasers Eng"},{"key":"14919_CR52","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/j.sigpro.2018.06.008","volume":"153","author":"J Wu","year":"2018","unstructured":"Wu J, Liao X, Yang B (2018) Image encryption using 2d h\u00e9non-sine map and dna approach. Signal Process 153:11\u201323","journal-title":"Signal Process"},{"key":"14919_CR53","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1016\/j.ins.2013.11.027","volume":"264","author":"Y Wu","year":"2014","unstructured":"Wu Y, Zhou Y, Noonan JP, Agaian S (2014) Design of image cipher using latin squares. Inf Sci 264: 317\u2013339","journal-title":"Inf Sci"},{"key":"14919_CR54","first-page":"53","volume":"102505","author":"M Yadollahi","year":"2020","unstructured":"Yadollahi M, Enayatifar R, Nematzadeh H, Lee M, Choi J. -Y. (2020) A novel image security technique based on nucleic acid concepts. J Inf Secur Appl 102505:53","journal-title":"J Inf Secur Appl"},{"issue":"3","key":"14919_CR55","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/s11071-013-1074-6","volume":"75","author":"G Ye","year":"2014","unstructured":"Ye G (2014) A block image encryption algorithm based on wave transmission and chaotic systems. Nonlinear Dyn 75(3):417\u2013427","journal-title":"Nonlinear Dyn"},{"key":"14919_CR56","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1016\/j.ins.2018.03.055","volume":"450","author":"Y Zhang","year":"2018","unstructured":"Zhang Y (2018) The unified image encryption algorithm based on chaos and cubic s-box. Inf Sci 450:361\u2013377","journal-title":"Inf Sci"},{"key":"14919_CR57","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1016\/j.ins.2020.02.012","volume":"520","author":"Y Zhang","year":"2020","unstructured":"Zhang Y (2020) The fast image encryption algorithm based on lifting scheme and chaos. Inf Sci 520:177\u2013194","journal-title":"Inf Sci"},{"key":"14919_CR58","doi-asserted-by":"crossref","first-page":"74734","DOI":"10.1109\/ACCESS.2019.2921309","volume":"7","author":"X Zhang","year":"2019","unstructured":"Zhang X, Wang L, Zhou Z, Niu Y (2019) A chaos-based image encryption technique utilizing hilbert curves and h-fractals. IEEE Access 7:74734\u201374746","journal-title":"IEEE Access"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-14919-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-14919-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-14919-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,29]],"date-time":"2023-11-29T09:14:09Z","timestamp":1701249249000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-14919-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,3]]},"references-count":58,"journal-issue":{"issue":"30","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["14919"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-14919-8","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2023,5,3]]},"assertion":[{"value":"24 November 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 December 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 February 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 May 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}