{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T06:24:38Z","timestamp":1775197478618,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"28","license":[{"start":{"date-parts":[[2023,4,22]],"date-time":"2023-04-22T00:00:00Z","timestamp":1682121600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,4,22]],"date-time":"2023-04-22T00:00:00Z","timestamp":1682121600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1007\/s11042-023-15289-x","type":"journal-article","created":{"date-parts":[[2023,4,22]],"date-time":"2023-04-22T10:02:07Z","timestamp":1682157727000},"page":"43729-43758","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["Chaos-based audio encryption algorithm using biometric image and SHA-256 hash algorithm"],"prefix":"10.1007","volume":"82","author":[{"given":"B.","family":"Rahul","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"K.","family":"Kuppusamy","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"A.","family":"Senthilrajan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,4,22]]},"reference":[{"issue":"4","key":"15289_CR1","doi-asserted-by":"publisher","first-page":"1463","DOI":"10.1007\/s41870-021-00714-x","volume":"13","author":"S Adhikari","year":"2021","unstructured":"Adhikari S, Karforma S (2021) A novel audio encryption method using Henon-Tent chaotic pseudo random number sequence. Int J Inf Technol 13(4):1463\u20131471. https:\/\/doi.org\/10.1007\/s41870-021-00714-x","journal-title":"Int J Inf Technol"},{"issue":"27","key":"15289_CR2","doi-asserted-by":"publisher","first-page":"19615","DOI":"10.1007\/s11042-020-08869-8","volume":"79","author":"ZN Al-kateeb","year":"2020","unstructured":"Al-kateeb ZN, Mohammed SJ (2020) A novel approach for audio file encryption using hand geometry. Multimed Tools Appl 79(27):19615\u201319628. https:\/\/doi.org\/10.1007\/s11042-020-08869-8","journal-title":"Multimed Tools Appl"},{"issue":"12","key":"15289_CR3","doi-asserted-by":"publisher","first-page":"18043","DOI":"10.1007\/s11042-020-10288-8","volume":"80","author":"NR Babu","year":"2021","unstructured":"Babu NR, Kalpana M, Balasubramaniam P (2021) A novel audio encryption approach via finite-time synchronization of fractional order hyperchaotic system. Multimed Tools Appl 80(12):18043\u201318067. https:\/\/doi.org\/10.1007\/s11042-020-10288-8","journal-title":"Multimed Tools Appl"},{"issue":"19","key":"15289_CR4","doi-asserted-by":"publisher","first-page":"27611","DOI":"10.1007\/s11042-019-07881-x","volume":"78","author":"SI Batool","year":"2019","unstructured":"Batool SI, Waseem HM (2019) A novel image encryption scheme based on Arnold scrambling and Lucas series. Multimed Tools Appl 78(19):27611\u201327637. https:\/\/doi.org\/10.1007\/s11042-019-07881-x","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"15289_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/sym14010017","volume":"14","author":"W Dai","year":"2022","unstructured":"Dai W, Xu X, Song X, Li G (2022) Audio encryption algorithm based on chen memristor chaotic system. Symmetry (Basel) 14(1):1\u201319. https:\/\/doi.org\/10.3390\/sym14010017","journal-title":"Symmetry (Basel)"},{"issue":"8","key":"15289_CR6","doi-asserted-by":"publisher","first-page":"12077","DOI":"10.1007\/s11042-020-10153-8","volume":"80","author":"H El Fadili","year":"2021","unstructured":"El Fadili H (2021) Security analysis of an audio data encryption scheme based on key chaining and DNA encoding. Multimed Tools Appl 80(8):12077\u201312099. https:\/\/doi.org\/10.1007\/s11042-020-10153-8","journal-title":"Multimed Tools Appl"},{"issue":"23","key":"15289_CR7","doi-asserted-by":"publisher","first-page":"10393","DOI":"10.1007\/s11042-014-2172-2","volume":"74","author":"SN George","year":"2015","unstructured":"George SN, Augustine N, Pattathil DP (2015) Audio security through compressive sampling and cellular automata. Multimed Tools Appl 74(23):10393\u201310417. https:\/\/doi.org\/10.1007\/s11042-014-2172-2","journal-title":"Multimed Tools Appl"},{"issue":"43\u201344","key":"15289_CR8","doi-asserted-by":"publisher","first-page":"33119","DOI":"10.1007\/s11042-020-09615-w","volume":"79","author":"V Guleria","year":"2020","unstructured":"Guleria V, Mishra DC (2020) A new multi-layer RGB image encryption algorithm based on Diffie-Hellman cryptography associated with FrDCT and Arnold transform. Multimed Tools Appl 79(43\u201344):33119\u201333160. https:\/\/doi.org\/10.1007\/s11042-020-09615-w","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"15289_CR9","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/s13174-011-0027-x","volume":"2","author":"CN H\u00f6fer","year":"2011","unstructured":"H\u00f6fer CN, Karagiannis G (2011) Cloud computing services: taxonomy and comparison. J Internet Serv Appl 2(2):81\u201394. https:\/\/doi.org\/10.1007\/s13174-011-0027-x","journal-title":"J Internet Serv Appl"},{"issue":"2","key":"15289_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13319-018-0167-x","volume":"9","author":"H Kakaei","year":"2018","unstructured":"Kakaei H, Jafar K, Ayaz R (2018) A novel fast and secure approach for voice encryption based on DNA computing. 3D Res 9(2):1\u201311. https:\/\/doi.org\/10.1007\/s13319-018-0167-x","journal-title":"3D Res"},{"issue":"7","key":"15289_CR11","doi-asserted-by":"publisher","first-page":"10927","DOI":"10.1007\/s11042-020-10223-x","volume":"80","author":"G Kaur","year":"2021","unstructured":"Kaur G, Singh K, Gill HS (2021) Chaos-based joint speech encryption scheme using SHA-1. Multimed Tools Appl 80(7):10927\u201310947. https:\/\/doi.org\/10.1007\/s11042-020-10223-x","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"15289_CR12","doi-asserted-by":"publisher","first-page":"2341","DOI":"10.1016\/j.ijleo.2015.11.188","volume":"127","author":"P Kumar","year":"2016","unstructured":"Kumar P, Rana SB (2016) Development of modified AES algorithm for data security. Optik (Stuttg) 127(4):2341\u20132345. https:\/\/doi.org\/10.1016\/j.ijleo.2015.11.188","journal-title":"Optik (Stuttg)"},{"issue":"3","key":"15289_CR13","doi-asserted-by":"publisher","first-page":"7423","DOI":"10.1007\/s10586-018-1700-7","volume":"22","author":"G Li","year":"2019","unstructured":"Li G, Pu Y, Yang B, Zhao J (2019) Synchronization between different hyper chaotic systems and dimensions of cellular neural network and its design in audio encryption. Cluster Comput 22(3):7423\u20137434. https:\/\/doi.org\/10.1007\/s10586-018-1700-7","journal-title":"Cluster Comput"},{"issue":"14","key":"15289_CR14","doi-asserted-by":"publisher","first-page":"8403","DOI":"10.1007\/s11042-015-2755-6","volume":"75","author":"JB Lima","year":"2016","unstructured":"Lima JB, Eronides F, Neto S (2016) Audio encryption based on the cosine number transform. Multimed Tools Appl 75(14):8403\u20138418. https:\/\/doi.org\/10.1007\/s11042-015-2755-6","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"15289_CR15","doi-asserted-by":"publisher","first-page":"1793","DOI":"10.1007\/s00530-022-00950-6","volume":"28","author":"CH Lin","year":"2022","unstructured":"Lin CH, Hu GH, Chen JS, Yan JJ, Tang KH (2022) Novel design of cryptosystems for video\/audio streaming via dynamic synchronized chaos-based random keys. Multimed Syst 28(5):1793\u20131808. https:\/\/doi.org\/10.1007\/s00530-022-00950-6","journal-title":"Multimed Syst"},{"issue":"12","key":"15289_CR16","doi-asserted-by":"publisher","first-page":"13684","DOI":"10.1109\/TCYB.2021.3134245","volume":"52","author":"C-M Lin","year":"2022","unstructured":"Lin C-M, Pham D-H, Huynh T-T (2022) Encryption and decryption of audio signal and image secure communications using chaotic system synchronization control by TSK fuzzy brain emotional learning controllers. IEEE Trans Cybern 52(12):13684\u201313698. https:\/\/doi.org\/10.1109\/TCYB.2021.3134245","journal-title":"IEEE Trans Cybern"},{"issue":"5","key":"15289_CR17","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1049\/iet-ipr.2016.0040","volume":"11","author":"H Liu","year":"2017","unstructured":"Liu H, Kadir A, Sun X (2017) Chaos-based fast colour image encryption scheme with true random number keys from environmental noise. IET Image Process 11(5):324\u2013332. https:\/\/doi.org\/10.1049\/iet-ipr.2016.0040","journal-title":"IET Image Process"},{"key":"15289_CR18","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.amc.2019.04.078","volume":"360","author":"H Liu","year":"2019","unstructured":"Liu H, Zhang Y, Kadir A, Xu Y (2019) Image encryption using complex hyper chaotic system by injecting impulse into parameters. Appl Math Comput 360:83\u201393. https:\/\/doi.org\/10.1016\/j.amc.2019.04.078","journal-title":"Appl Math Comput"},{"issue":"10","key":"15289_CR19","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1080\/09500340.2021.1924885","volume":"68","author":"PN Lone","year":"2021","unstructured":"Lone PN, Singh D, Mir UH (2021) A novel image encryption using random matrix affine cipher and the chaotic maps. J Mod Opt 68(10):507\u2013521. https:\/\/doi.org\/10.1080\/09500340.2021.1924885","journal-title":"J Mod Opt"},{"issue":"1","key":"15289_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13677-015-0046-4","volume":"4","author":"S Nagaraju","year":"2015","unstructured":"Nagaraju S, Parthiban L (2015) Trusted framework for online banking in public cloud using multi-factor authentication and privacy protection gateway. J Cloud Comput 4(1):1\u201323. https:\/\/doi.org\/10.1186\/s13677-015-0046-4","journal-title":"J Cloud Comput"},{"issue":"17","key":"15289_CR21","doi-asserted-by":"publisher","first-page":"25019","DOI":"10.1007\/s11042-019-7696-z","volume":"78","author":"PK Naskar","year":"2019","unstructured":"Naskar PK, Paul S, Nandy D, Chaudhuri A (2019) DNA encoding and channel shuffling for secured encryption of audio data. Multimed Tools Appl 78(17):25019\u201325042. https:\/\/doi.org\/10.1007\/s11042-019-7696-z","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"15289_CR22","doi-asserted-by":"publisher","first-page":"2019","DOI":"10.1007\/s11071-020-06164-7","volume":"103","author":"PK Naskar","year":"2021","unstructured":"Naskar PK, Bhattacharyya S, Chaudhuri A (2021) An audio encryption based on distinct key blocks along with PWLCM and ECA. Nonlinear Dyn 103(2):2019\u20132042. https:\/\/doi.org\/10.1007\/s11071-020-06164-7","journal-title":"Nonlinear Dyn"},{"issue":"12","key":"15289_CR23","doi-asserted-by":"publisher","first-page":"19011","DOI":"10.1007\/s11042-021-10549-0","volume":"80","author":"A Nicole","year":"2021","unstructured":"Nicole A, Telem K, Fotsin HB, Kengne J (2021) Image encryption algorithm based on dynamic DNA coding operations and 3D chaotic systems. Multimed Tools Appl 80(12):19011\u201319041. https:\/\/doi.org\/10.1007\/s11042-021-10549-0","journal-title":"Multimed Tools Appl"},{"key":"15289_CR24","doi-asserted-by":"publisher","first-page":"102266","DOI":"10.1016\/j.cose.2021.102266","volume":"106","author":"Y Nugraha","year":"2021","unstructured":"Nugraha Y, Martin A (2021) Towards a framework for trustworthy data security level agreement in cloud procurement. Comput Secur 106:102266. https:\/\/doi.org\/10.1016\/j.cose.2021.102266","journal-title":"Comput Secur"},{"issue":"9","key":"15289_CR25","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1016\/j.imavis.2006.02.021","volume":"24","author":"NK Pareek","year":"2006","unstructured":"Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926\u2013934. https:\/\/doi.org\/10.1016\/j.imavis.2006.02.021","journal-title":"Image Vis Comput"},{"issue":"December","key":"15289_CR26","doi-asserted-by":"publisher","first-page":"2020","DOI":"10.1016\/j.jnca.2020.102633","volume":"160","author":"K Riad","year":"2019","unstructured":"Riad K, Huang T, Ke L (2019) A dynamic and hierarchical access control for IoT in multi-authority cloud storage. J Netw Comput Appl 160(December):2020. https:\/\/doi.org\/10.1016\/j.jnca.2020.102633","journal-title":"J Netw Comput Appl"},{"issue":"21","key":"15289_CR27","doi-asserted-by":"publisher","first-page":"31529","DOI":"10.1007\/s11042-020-09880-9","volume":"80","author":"S Roy","year":"2021","unstructured":"Roy S, Shrivastava M, Vinodkumar C, Kumar S, Umashankar N (2021) IEVCA: an efficient image encryption technique for IoT applications using 2-D Von-Neumann cellular automata. Multimed Tools Appl 80(21):31529\u201331567. https:\/\/doi.org\/10.1007\/s11042-020-09880-9","journal-title":"Multimed Tools Appl"},{"issue":"18","key":"15289_CR28","doi-asserted-by":"publisher","first-page":"27829","DOI":"10.1007\/s11042-021-11003-x","volume":"80","author":"S Sabir","year":"2021","unstructured":"Sabir S, Guleria V (2021) Multi-layer color image encryption using random matrix affine cipher, RP2DFrHT and 2D Arnold map. Multimed Tools Appl 80(18):27829\u201327853. https:\/\/doi.org\/10.1007\/s11042-021-11003-x","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"15289_CR29","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1186\/s13673-015-0039-9","volume":"5","author":"MI Salam","year":"2015","unstructured":"Salam MI et al (2015) Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage. Hum-Centric Comput Inf Sci 5(1):19. https:\/\/doi.org\/10.1186\/s13673-015-0039-9","journal-title":"Hum-Centric Comput Inf Sci"},{"key":"15289_CR30","doi-asserted-by":"publisher","unstructured":"Salau AO, Oluwafemi I, Faleye KF, Jain S (2019) Audio compression using a modified discrete cosine transform with temporal auditory masking. 2019 Int. Conf. Signal Process. Commun. ICSC 2019, pp 135\u2013142.https:\/\/doi.org\/10.1109\/ICSC45622.2019.8938213","DOI":"10.1109\/ICSC45622.2019.8938213"},{"issue":"2","key":"15289_CR31","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/s11042-010-0652-6","volume":"56","author":"IS Sam","year":"2012","unstructured":"Sam IS, Devaraj P, Bhuvaneswaran RS (2012) A novel image cipher based on mixed transformed logistic maps. Multimed Tools Appl 56(2):315\u2013330. https:\/\/doi.org\/10.1007\/s11042-010-0652-6","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"15289_CR32","doi-asserted-by":"publisher","first-page":"6331","DOI":"10.1007\/s11042-021-11757-4","volume":"81","author":"P Sathiyamurthi","year":"2022","unstructured":"Sathiyamurthi P, Ramakrishnan S (2022) Speech encryption using hybrid-hyper chaotic system and binary masking technique. Multimed Tools Appl 81(5):6331\u20136349. https:\/\/doi.org\/10.1007\/s11042-021-11757-4","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"15289_CR33","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/s00530-019-00640-w","volume":"26","author":"D Shah","year":"2020","unstructured":"Shah D, Shah T, Jamal SS (2020) Digital audio signals encryption by Mobius transformation and H\u00e9non map. Multimed Syst 26(2):235\u2013245. https:\/\/doi.org\/10.1007\/s00530-019-00640-w","journal-title":"Multimed Syst"},{"issue":"14","key":"15289_CR34","doi-asserted-by":"publisher","first-page":"22251","DOI":"10.1007\/s11042-021-10697-3","volume":"80","author":"D Shah","year":"2021","unstructured":"Shah D, Shah T, Ahamad I, Haider MI, Khalid I (2021) A three-dimensional chaotic map and their applications to digital audio security. Multimed Tools Appl 80(14):22251\u201322273. https:\/\/doi.org\/10.1007\/s11042-021-10697-3","journal-title":"Multimed Tools Appl"},{"issue":"19","key":"15289_CR35","doi-asserted-by":"publisher","first-page":"25223","DOI":"10.1007\/s11042-018-5782-2","volume":"77","author":"SJ Sheela","year":"2018","unstructured":"Sheela SJ, Suresh KV, Tandur D (2018) Image encryption based on modified Henon map using hybrid chaotic shift transform. Multimed Tools Appl 77(19):25223\u201325251. https:\/\/doi.org\/10.1007\/s11042-018-5782-2","journal-title":"Multimed Tools Appl"},{"issue":"19","key":"15289_CR36","doi-asserted-by":"publisher","first-page":"27089","DOI":"10.1007\/s11042-021-11460-4","volume":"81","author":"RR Suman","year":"2022","unstructured":"Suman RR, Mondal B, Mandal T (2022) A secure encryption scheme using a Composite Logistic Sine Map (CLSM) and SHA-256. Multimed Tools Appl 81(19):27089\u201327110. https:\/\/doi.org\/10.1007\/s11042-021-11460-4","journal-title":"Multimed Tools Appl"},{"key":"15289_CR37","doi-asserted-by":"publisher","first-page":"125039","DOI":"10.1016\/j.amc.2020.125039","volume":"373","author":"Y-j Sun","year":"2020","unstructured":"Sun Y-j, Zhang H, Wang X-y, Wang X-q, Yan P-f (2020) 2D non-adjacent coupled map lattice with q and its applications in image encryption. Appl Math Comput 373:125039. https:\/\/doi.org\/10.1016\/j.amc.2020.125039","journal-title":"Appl Math Comput"},{"key":"15289_CR38","doi-asserted-by":"publisher","first-page":"158697","DOI":"10.1109\/ACCESS.2019.2950007","volume":"7","author":"GRW Thoms","year":"2019","unstructured":"Thoms GRW, Muresan R, Al-dweik A (2019) Chaotic encryption algorithm with key controlled neural networks for intelligent transportation systems. IEEE Access 7:158697\u2013158709. https:\/\/doi.org\/10.1109\/ACCESS.2019.2950007","journal-title":"IEEE Access"},{"issue":"8","key":"15289_CR39","doi-asserted-by":"publisher","first-page":"9260","DOI":"10.1109\/ACCESS.2019.2963329","volume":"8","author":"X Wang","year":"2020","unstructured":"Wang X, Su Y (2020) An audio encryption algorithm based on DNA coding and chaotic system. IEEE Access 8(8):9260\u20139270. https:\/\/doi.org\/10.1109\/ACCESS.2019.2963329","journal-title":"IEEE Access"},{"issue":"00","key":"15289_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/19393555.2016.1272725","volume":"00","author":"X Wang","year":"2017","unstructured":"Wang X, Wang S, Zhang Y, Guo K (2017) A novel image encryption algorithm based on chaotic shuffling method. Inf Secur J A Glob Perspect 00(00):1\u201310. https:\/\/doi.org\/10.1080\/19393555.2016.1272725","journal-title":"Inf Secur J A Glob Perspect"},{"issue":"September","key":"15289_CR41","doi-asserted-by":"publisher","first-page":"112770","DOI":"10.1016\/j.chaos.2022.112770","volume":"165","author":"R Wu","year":"2022","unstructured":"Wu R et al (2022) AEA-NCS: an audio encryption algorithm based on a nested chaotic system. Chaos Solitons Fractals 165(September):112770. https:\/\/doi.org\/10.1016\/j.chaos.2022.112770","journal-title":"Chaos Solitons Fractals"},{"issue":"November 2020","key":"15289_CR42","doi-asserted-by":"publisher","first-page":"103177","DOI":"10.1016\/j.jnca.2021.103177","volume":"192","author":"A Yaser","year":"2021","unstructured":"Yaser A, Alsahlani F, Popa A (2021) Journal of network and computer applications LMAAS-IoT\u202f: lightweight multi-factor authentication and authorization scheme for real-time data access in IoT cloud-based environment \u2729. J Netw Comput Appl 192(November 2020):103177. https:\/\/doi.org\/10.1016\/j.jnca.2021.103177","journal-title":"J Netw Comput Appl"},{"issue":"4","key":"15289_CR43","doi-asserted-by":"publisher","first-page":"917","DOI":"10.1007\/s10207-022-00588-5","volume":"21","author":"U Zia","year":"2022","unstructured":"Zia U et al (2022) Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains. Int J Inf Secur 21(4):917\u2013935. https:\/\/doi.org\/10.1007\/s10207-022-00588-5","journal-title":"Int J Inf Secur"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15289-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-15289-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15289-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,28]],"date-time":"2023-10-28T06:04:13Z","timestamp":1698473053000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-15289-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,22]]},"references-count":43,"journal-issue":{"issue":"28","published-print":{"date-parts":[[2023,11]]}},"alternative-id":["15289"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-15289-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,22]]},"assertion":[{"value":"20 July 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 December 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 April 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 April 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The Author warrants that the Work has not been published before in any form that the Work is not being concurrently submitted to and is not under consideration by another publisher, that the persons listed above are listed in the proper order. The Author also warrants that the Work does not libel anyone, infringe anyone\u2019s copyright, or otherwise violate anyone\u2019s statutory or common law rights.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no conflict of interest.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}