{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T19:25:44Z","timestamp":1772133944576,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T00:00:00Z","timestamp":1683763200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T00:00:00Z","timestamp":1683763200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672124"],"award-info":[{"award-number":["61672124"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund","award":["MMJJ20170203"],"award-info":[{"award-number":["MMJJ20170203"]}]},{"name":"Liaoning Province Science and Technology Innovation Leading Talents Program Project","award":["XLYC1802013"],"award-info":[{"award-number":["XLYC1802013"]}]},{"name":"Key R&D Projects of Liaoning Province","award":["2019020105-JH2\/103"],"award-info":[{"award-number":["2019020105-JH2\/103"]}]},{"name":"Jinan City \u201820 universities\u2019 Funding Projects Introducing Innovation Team Program","award":["2019GXRC031"],"award-info":[{"award-number":["2019GXRC031"]}]},{"name":"Research Fund of Guangxi Key Lab of Multi-source Information Mining & Security","award":["MIMS20-M-02"],"award-info":[{"award-number":["MIMS20-M-02"]}]},{"name":"the Research Project of Chongqing Normal University","award":["16XYY21"],"award-info":[{"award-number":["16XYY21"]}]},{"name":"the Research Project of Chongqing Normal University","award":["17XLB001"],"award-info":[{"award-number":["17XLB001"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s11042-023-15286-0","type":"journal-article","created":{"date-parts":[[2023,5,15]],"date-time":"2023-05-15T15:46:26Z","timestamp":1684165586000},"page":"1891-1917","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Novel image compression-then-encryption scheme based on 2D cross coupled map lattice and compressive sensing"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9392-9809","authenticated-orcid":false,"given":"Mingxu","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xingyuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chunpeng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhiqiu","family":"Xia","sequence":"additional","affiliation":[]},{"given":"Shuang","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,11]]},"reference":[{"issue":"1","key":"15286_CR1","first-page":"1","volume":"14","author":"G Akshat","year":"2022","unstructured":"Akshat G, Konstantinos EP, Dragan P (2022) Security of Cloud-Based Medical Internet of Things (MIoTs): A Survey. Int J Softw Sci Comput Intell 14(1):1\u201316","journal-title":"Int J Softw Sci Comput Intell"},{"issue":"3","key":"15286_CR2","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1109\/JETCAS.2018.2832204","volume":"8","author":"MS Ansari","year":"2018","unstructured":"Ansari MS, Jiang H, Cockburn BF, Han J (2018) Low-power approximate multipliers using encoded partial products and approximate compressors. IEEE J Emerg Sel Top Circ Syst 8(3):404\u2013416","journal-title":"IEEE J Emerg Sel Top Circ Syst"},{"key":"15286_CR3","doi-asserted-by":"crossref","unstructured":"Cand\u00e8s EJ (2006) Compressive sampling. In: Proceedings of the international congress of mathematicians pp. 1433\u20131452","DOI":"10.4171\/022-3\/69"},{"key":"15286_CR4","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.sigpro.2018.02.007","volume":"148","author":"X Chai","year":"2018","unstructured":"Chai X, Zheng X, Gan Z, Han D, Chen Y (2018) An image encryption algorithm based on chaotic system and compressive sensing. Signal Process 148:124\u2013144","journal-title":"Signal Process"},{"key":"15286_CR5","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.optlastec.2017.09.008","volume":"99","author":"J Chen","year":"2018","unstructured":"Chen J, Zhang Y, Qi L, Fu C, Xu L (2018) Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression. Opt Laser Technol 99:238\u2013248","journal-title":"Opt Laser Technol"},{"issue":"4","key":"15286_CR6","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.1109\/TIT.2006.871582","volume":"52","author":"DL Donoho","year":"2006","unstructured":"Donoho DL (2006) Compressed sensing. IEEE Trans Inf Theory 52(4):1289\u20131306","journal-title":"IEEE Trans Inf Theory"},{"key":"15286_CR7","unstructured":"Frunzete M, Yu L, Barbot J, Vlad A (2011) Compressive sensing matrix designed by tent map, for secure data transmission. In: Proceedings of the Signal Processing Algorithms, Architectures, Arrangements, and Applications Conference Proceedings, pp 1\u20136"},{"key":"15286_CR8","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1016\/j.jvcir.2017.01.022","volume":"44","author":"G Hu","year":"2017","unstructured":"Hu G, Xiao D, Wang Y, Xiang T (2017) An image coding scheme using parallel compressive sensing for simultaneous compression-encryption applications. J Vis Commun Image Represent 44:116\u2013127","journal-title":"J Vis Commun Image Represent"},{"key":"15286_CR9","doi-asserted-by":"crossref","unstructured":"Huang R, Rhee K, Uchida S (2014) A parallel image encryption method based on compressive sensing. Multimed Tools Appl 72(1):71\u201393","DOI":"10.1007\/s11042-012-1337-0"},{"issue":"7","key":"15286_CR10","doi-asserted-by":"publisher","first-page":"1919","DOI":"10.1109\/TCSVT.2018.2859253","volume":"29","author":"X Kang","year":"2019","unstructured":"Kang X, Tao R (2019) Color Image Encryption Using Pixel Scrambling Operator and Reality-Preserving MPFRHT. IEEE Trans Circ Syst Vid Technol 29(7):1919\u20131932","journal-title":"IEEE Trans Circ Syst Vid Technol"},{"key":"15286_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-12069-x","author":"H Liu","year":"2022","unstructured":"Liu H, Liu J, Ma C (2022) Constructing dynamic strong S-Box using 3D chaotic map and application to image encryption. Multimed Tools Appl Online. https:\/\/doi.org\/10.1007\/s11042-022-12069-x","journal-title":"Multimed Tools Appl"},{"issue":"12","key":"15286_CR12","doi-asserted-by":"publisher","first-page":"15997","DOI":"10.1007\/s11042-018-6996-z","volume":"78","author":"H Liu","year":"2019","unstructured":"Liu H, Wen F, Kadir A (2019) Construction of a new 2D Chebyshev-Sine map and its application to color image encryption. Multimed Tools Appl 78(12):15997\u201316010","journal-title":"Multimed Tools Appl"},{"key":"15286_CR13","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.optcom.2017.08.047","volume":"407","author":"L Ma","year":"2018","unstructured":"Ma L, Jin W (2018) Symmetric and asymmetric hybrid cryptosystem based on compressive sensing and computer generated holography. Opt Commun 407:51\u201356","journal-title":"Opt Commun"},{"issue":"12","key":"15286_CR14","first-page":"1877","volume":"8","author":"GBB Mamta","year":"2021","unstructured":"Mamta GBB, Li KC, Leung VCM, Psannis KE, Yamaguchi S (2021) Blockchain-assisted secure fine-grained searchable encryption for a cloud-based healthcare cyber-physical system. IEEE-CAA J Autom 8(12):1877\u20131890","journal-title":"IEEE-CAA J Autom"},{"key":"15286_CR15","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/j.ijleo.2017.07.063","volume":"147","author":"D Ponnaian","year":"2017","unstructured":"Ponnaian D, Chandranbabu K (2017) Crypt analysis of an image compression-encryption algorithm and a modified scheme using compressive sensing. Optik 147:263\u2013276","journal-title":"Optik"},{"issue":"15","key":"15286_CR16","doi-asserted-by":"publisher","first-page":"19209","DOI":"10.1007\/s11042-017-5378-2","volume":"77","author":"R Ponuma","year":"2018","unstructured":"Ponuma R, Amutha R (2018) Compressive sensing based image compression-encryption using Novel 1D-Chaotic map. Multimed Tools Appl 77(15):19209\u201319234","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"15286_CR17","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1109\/TNB.2017.2780881","volume":"16","author":"D Ravichandran","year":"2017","unstructured":"Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R (2017) DNA Chaos Blend to Secure Medical Privacy. IEEE Trans Nanobiosci 16(8):850\u2013858","journal-title":"IEEE Trans Nanobiosci"},{"issue":"14","key":"15286_CR18","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1007\/s00521-020-05410-8","volume":"34","author":"A Sedik","year":"2022","unstructured":"Sedik A, Hammad M, Abd El-Samie FE, Gupta BB, Abd El-Latif AA (2022) Efficient deep learning approach for augmented detection of Coronavirus disease. Neural Comput Appl 34(14):1423\u201311440","journal-title":"Neural Comput Appl"},{"issue":"1\u20134","key":"15286_CR19","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/S0378-4371(00)00591-4","volume":"292","author":"H Shibata","year":"2001","unstructured":"Shibata H (2001) KS entropy and mean Lyapunov exponent for coupled map lattices. Phys A 292(1\u20134):182\u2013192","journal-title":"Phys A"},{"issue":"5","key":"15286_CR20","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/79.952804","volume":"18","author":"A Skodras","year":"2001","unstructured":"Skodras A, Christopoulos C, Ebrahimi T (2001) The jpeg 2000 still image compression standard. IEEE Signal Process Mag 18(5):36\u201358","journal-title":"IEEE Signal Process Mag"},{"key":"15286_CR21","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.ins.2022.05.032","volume":"605","author":"L Teng","year":"2022","unstructured":"Teng L, Wang X, Xian Y (2022) Image encryption algorithm based on 2D-CLSS hyperchaotic map using simultaneous permutation and diffusion. Inf Sci 605:71\u201385","journal-title":"Inf Sci"},{"issue":"2","key":"15286_CR22","doi-asserted-by":"publisher","first-page":"1859","DOI":"10.1007\/s11071-021-06663-1","volume":"105","author":"L Teng","year":"2021","unstructured":"Teng L, Wang X, Yang F, Xian Y (2021) Color image encryption based on cross 2D hyperchaotic map using combined cycle shift scrambling and selecting diffusion. Nonlin Dyn 105(2):1859\u20131876","journal-title":"Nonlin Dyn"},{"issue":"3","key":"15286_CR23","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1007\/s11227-016-1849-x","volume":"73","author":"A Tewari","year":"2017","unstructured":"Tewari A, Gupta BB (2017) Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. J Supercomput 73(3):1085\u20131102","journal-title":"J Supercomput"},{"key":"15286_CR24","doi-asserted-by":"publisher","first-page":"4655","DOI":"10.1109\/TIT.2007.909108","volume":"53","author":"JA Tropp","year":"2007","unstructured":"Tropp JA, Gilbert AC (2007) Signal recovery from random measurements via orthogonal matching pursuit. IEEE Trans Inf Theory 53:4655\u20134666","journal-title":"IEEE Trans Inf Theory"},{"key":"15286_CR25","doi-asserted-by":"publisher","first-page":"39705","DOI":"10.1109\/ACCESS.2018.2855726","volume":"6","author":"X Wang","year":"2018","unstructured":"Wang X, Feng L, Wang S, Chuan Z, Zhang Y (2018) Spatiotemporal chaos in coupled logistic map lattice with dynamic coupling coefficient and its application in image encryption. IEEE Access 6:39705\u201339724","journal-title":"IEEE Access"},{"issue":"3","key":"15286_CR26","doi-asserted-by":"publisher","first-page":"1291","DOI":"10.1109\/TCSI.2021.3133318","volume":"69","author":"X Wang","year":"2021","unstructured":"Wang X, Liu P (2021) A new full chaos coupled mapping lattice and its application in privacy image encryption. IEEE Trans Circ Syst I, Reg Pap 69(3):1291\u20131301","journal-title":"IEEE Trans Circ Syst I, Reg Pap"},{"key":"15286_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2020.110028","volume":"139","author":"M Wang","year":"2020","unstructured":"Wang M, Wang X, Wang C, Xia Z, Zhao H, Gao S, Zhou S, Yao N (2020) Spatiotemporal chaos in cross coupled map lattice with dynamic coupling coefficient and its application in bit-level color image encryption. Chaos Soliton Fract 139:110028","journal-title":"Chaos Soliton Fract"},{"key":"15286_CR28","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.ins.2018.08.028","volume":"470","author":"C Wang","year":"2019","unstructured":"Wang C, Wang X, Xia Z, Zhang C (2019) Ternary radial harmonic Fourier moments based robust stereo image zero-watermarking algorithm. Inf Sci 470:109\u2013120","journal-title":"Inf Sci"},{"key":"15286_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2020.07.051","volume":"544","author":"M Wang","year":"2021","unstructured":"Wang M, Wang X, Zhao T, Zhang C, Xia Z, Yao N (2021) Spatiotemporal chaos in improved cross coupled map lattice and its application in a bit-level image encryption scheme. Inf Sci 544:1\u201324","journal-title":"Inf Sci"},{"issue":"2","key":"15286_CR30","doi-asserted-by":"publisher","first-page":"2150021","DOI":"10.1142\/S0218127421500218","volume":"31","author":"XQ Wang","year":"2021","unstructured":"Wang XQ, Zhang H, Sun YJ, Wang XY (2021) A Plaintext-Related Image Encryption Algorithm Based on Compressive Sensing and a Novel Hyperchaotic System. Int J Bifurcation Chaos 31(2):2150021","journal-title":"Int J Bifurcation Chaos"},{"issue":"2","key":"15286_CR31","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber J Multidiscip J Sci Technol J Select Areas Telecommun (JSAT) 1(2):31\u201338","journal-title":"Cyber J Multidiscip J Sci Technol J Select Areas Telecommun (JSAT)"},{"key":"15286_CR32","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/j.ins.2012.07.049","volume":"222","author":"Y Wu","year":"2013","unstructured":"Wu Y, Zhou Y, Saveriades G, Agaian S, Noonan JP, Natarajan P (2013) Local shannon entropy measure with statistical tests for image randomness. Inf Sci 222:323\u2013342","journal-title":"Inf Sci"},{"issue":"6","key":"15286_CR33","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1088\/1674-1056\/24\/6\/060505","volume":"24","author":"D Xiao","year":"2015","unstructured":"Xiao D, Cai HK, Zheng HY (2015) A joint image encryption and watermarking algorithm based on compressive sensing and chaotic map. Chin Phys B 24(6):198\u2013206","journal-title":"Chin Phys B"},{"key":"15286_CR34","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.optlaseng.2019.04.011","volume":"124","author":"Q Xu","year":"2019","unstructured":"Xu Q, Sun K, Cao C, Zhu C (2019) A fast image encryption algorithm based on compressive sensing and hyperchaotic map. Opt Lasers Eng 124:203\u2013214","journal-title":"Opt Lasers Eng"},{"key":"15286_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2020.106178","volume":"134","author":"Q Xu","year":"2020","unstructured":"Xu Q, Sun K, He S, Zhu C (2020) An effective image encryption algorithm based on compressive sensing and 2D-SLIM. Opt Lasers Eng 134:106178","journal-title":"Opt Lasers Eng"},{"issue":"7","key":"15286_CR36","doi-asserted-by":"publisher","first-page":"10949","DOI":"10.1007\/s11042-020-10218-8","volume":"80","author":"X Yan","year":"2022","unstructured":"Yan X, Wang X, Xian Y (2022) Chaotic image encryption algorithm based on arithmetic sequence scrambling model and DNA encoding operation. Multimed Tools Appl 80(7):10949\u201310983","journal-title":"Multimed Tools Appl"},{"key":"15286_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2019.105661","volume":"119","author":"Y Yang","year":"2019","unstructured":"Yang Y, Guan B-W, Li J, Li D, Zhou Y-H, Shi W-M (2019) Image compression-encryption scheme based on fractional order hyper-chaotic systems combined with 2D compressed sensing and DNA encoding. Opt Laser Technol 119:105661","journal-title":"Opt Laser Technol"},{"issue":"10","key":"15286_CR38","first-page":"1441","volume":"28","author":"H Yin","year":"2013","unstructured":"Yin H, Liu Z, Chai Y, Jiao X (2013) Survey of compressed sensing. Control and Decision 28(10):1441\u20131445","journal-title":"Control and Decision"},{"key":"15286_CR39","unstructured":"Yu L, Barbot JP, Zheng G, Sun H (2010) Toeplitz-structured Chaotic Sensing Matrix for Compressive Sensing. In: Proceedings of the 7th International Symposium on Communication Systems Networks and Digital Signal Processing, pp 229\u2013233"},{"issue":"8","key":"15286_CR40","doi-asserted-by":"publisher","first-page":"731","DOI":"10.1109\/LSP.2010.2052243","volume":"17","author":"L Yu","year":"2010","unstructured":"Yu L, Barbot JP, Zheng G, Sun H (2010) Compressive sensing with chaotic sequence. IEEE Signal Process Lett 17(8):731\u2013734","journal-title":"IEEE Signal Process Lett"},{"issue":"4","key":"15286_CR41","doi-asserted-by":"publisher","first-page":"4585","DOI":"10.1007\/s11042-017-4637-6","volume":"77","author":"C Yu","year":"2018","unstructured":"Yu C, Li J, Li X, Ren XC, Gupta BB (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585\u20134608","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"15286_CR42","doi-asserted-by":"publisher","first-page":"526","DOI":"10.15388\/NA.18.4.13977","volume":"18","author":"YQ Zhang","year":"2013","unstructured":"Zhang YQ, Wang XY (2013) Spatiotemporal chaos in Arnold coupled logistic map lattice. Nonlin Anal Model Control 18(4):526\u2013541","journal-title":"Nonlin Anal Model Control"},{"key":"15286_CR43","unstructured":"Zhao C, Liu J (2013) Cross coupled tent map lattices system with uniform distribution. In: Proceedings of the IEEE International Conference on Signal Processing, pp 1\u20135"},{"issue":"3","key":"15286_CR44","doi-asserted-by":"publisher","DOI":"10.1063\/1.5087512","volume":"29","author":"S Zhou","year":"2019","unstructured":"Zhou S, Wang X, Wang Z, Zhang C (2019) A novel method based on the pseudo-orbits to calculate the largest Lyapunov exponent from chaotic equations. Chaos 29(3):033125","journal-title":"Chaos"},{"issue":"1","key":"15286_CR45","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/s00530-021-00803-8","volume":"28","author":"S Zhou","year":"2022","unstructured":"Zhou S, Wang X, Zhang Y, Ge B, Wang M, Gao S (2022) A novel image encryption cryptosystem based on true random numbers and chaotic systems. Multimed Syst 28(1):95\u2013112","journal-title":"Multimed Syst"},{"key":"15286_CR46","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.optcom.2015.05.043","volume":"354","author":"N Zhou","year":"2015","unstructured":"Zhou N, Yang J, Tan C, Pan S, Zhou Z (2015) Double-image encryption scheme combining DWT-based compressive sensing with discrete fractional random transform. Opt Commun 354:112\u2013121","journal-title":"Opt Commun"},{"key":"15286_CR47","doi-asserted-by":"crossref","unstructured":"Zhou S, Zhao Z, Wang X (2022) Novel chaotic colour image cryptosystem with deep learning. Chaos Sol Fract 161:112380","DOI":"10.1016\/j.chaos.2022.112380"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15286-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-15286-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15286-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,2]],"date-time":"2024-01-02T08:46:03Z","timestamp":1704185163000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-15286-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,11]]},"references-count":47,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["15286"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-15286-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,11]]},"assertion":[{"value":"13 July 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 November 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 April 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 May 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}]}}