{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T04:40:24Z","timestamp":1766378424475,"version":"3.40.4"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"30","license":[{"start":{"date-parts":[[2023,5,2]],"date-time":"2023-05-02T00:00:00Z","timestamp":1682985600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,5,2]],"date-time":"2023-05-02T00:00:00Z","timestamp":1682985600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s11042-023-15586-5","type":"journal-article","created":{"date-parts":[[2023,5,2]],"date-time":"2023-05-02T06:02:22Z","timestamp":1683007342000},"page":"46577-46609","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Practicality analysis of utilizing text-based CAPTCHA vs. graphic-based CAPTCHA authentication"],"prefix":"10.1007","volume":"82","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0923-202X","authenticated-orcid":false,"given":"Adnan","family":"Gutub","sequence":"first","affiliation":[]},{"given":"Nafisah","family":"Kheshaifaty","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,2]]},"reference":[{"issue":"2","key":"15586_CR1","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1049\/cit2.12070","volume":"7","author":"M Abu-Hashem","year":"2022","unstructured":"Abu-Hashem M, Gutub A (2022) Efficient computation of Hash Hirschberg protein alignment utilizing hyper threading multi-core sharing technology. CAAI Trans Intell Technol 7(2):278\u2013291. https:\/\/doi.org\/10.1049\/cit2.12070","journal-title":"CAAI Trans Intell Technol"},{"key":"15586_CR2","doi-asserted-by":"publisher","unstructured":"Ali F, Karim F (2014) Development of CAPTCHA system based on puzzle. IEEE International Conference on Computer, Communications, and Control Technology. https:\/\/doi.org\/10.1109\/I4CT.2014.6914219","DOI":"10.1109\/I4CT.2014.6914219"},{"issue":"1","key":"15586_CR3","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.jksuci.2018.02.006","volume":"32","author":"M Almazrooie","year":"2020","unstructured":"Almazrooie M, Samsudin A, Gutub A, Salleh MS, Omar MA, Hassan SA (2020) Integrity verification for digital Holy Quran verses using cryptographic hash function and compression. J King Saud Univ - Comput Inf Sci 32(1):24\u201334. https:\/\/doi.org\/10.1016\/j.jksuci.2018.02.006","journal-title":"J King Saud Univ - Comput Inf Sci"},{"issue":"2","key":"15586_CR4","doi-asserted-by":"publisher","first-page":"43","DOI":"10.13140\/RG.2.2.32048.30727","volume":"16","author":"S Almutairi","year":"2019","unstructured":"Almutairi S, Gutub A, Al-Ghamdi M (2019) Image steganography to facilitate online students account system. Rev Bus Technol Res 16(2):43\u201349. https:\/\/doi.org\/10.13140\/RG.2.2.32048.30727","journal-title":"Rev Bus Technol Res"},{"issue":"2","key":"15586_CR5","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1504\/IJTEL.2020.10027118","volume":"12","author":"S Almutairi","year":"2020","unstructured":"Almutairi S, Gutub A, Al-Juaid N (2020) Motivating teachers to use information technology in educational process within Saudi Arabia. Int J Technol Enhanc Learn 12(2):200\u2013217. https:\/\/doi.org\/10.1504\/IJTEL.2020.10027118","journal-title":"Int J Technol Enhanc Learn"},{"key":"15586_CR6","doi-asserted-by":"publisher","unstructured":"Alotaibi M, Al-hendi D, Alroithy B, AlGhamdi M, Gutub A (2019) Secure mobile computing authentication utilizing hash, cryptography and steganography combination. Journal of Information Security and Cybercrimes Research 2.1, pp. 73\u201382. https:\/\/doi.org\/10.26735\/16587790.2019.001","DOI":"10.26735\/16587790.2019.001"},{"key":"15586_CR7","doi-asserted-by":"publisher","unstructured":"Althamary I, El-Alfy E-S (2017) A more secure scheme for CAPTCHA-based authentication in cloud environment. IEEE International Conference on Information Technology. https:\/\/doi.org\/10.1109\/ICITECH.2017.8080034","DOI":"10.1109\/ICITECH.2017.8080034"},{"key":"15586_CR8","unstructured":"Baird HS, Lopresti DP, eds. (2005) Human Interactive Proofs: Second International Workshop, HIP 2005, Bethlehem, PA, USA, May 19\u201320, 2005, Proceedings. Vol. 3517. Springer"},{"key":"15586_CR9","doi-asserted-by":"crossref","unstructured":"Banne SS, Shedge KN (2016) CARP: CAPTCHA as a graphical password based authentication scheme. Int J Adv Res Comput Commun Eng 5(1):14\u201318","DOI":"10.17148\/IJARCCE.2016.5104"},{"key":"15586_CR10","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/978-981-15-0626-0_37","volume-title":"Advances in Communication, Signal Processing, VLSI, and Embedded Systems","author":"MP Bhat","year":"2020","unstructured":"Bhat MP, Raj RN (2020) Two-Way Image Based CAPTCHA. In: Advances in Communication, Signal Processing, VLSI, and Embedded Systems. Springer, Singapore, pp 471\u2013483. https:\/\/doi.org\/10.1007\/978-981-15-0626-0_37"},{"key":"15586_CR11","unstructured":"Bursztein E et al (2014) The end is nigh: Generic solving of text-based CAPTCHAs. In: 8th {USENIX} Workshop on Offensive Technologies ({WOOT} 14), San Diego"},{"key":"15586_CR12","doi-asserted-by":"publisher","unstructured":"Bursztein E, et al (2010) How good are humans at solving CAPTCHAs? A large scale evaluation. 2010 IEEE symposium on security and privacy. IEEE, 2010, pp. 15\u201333. https:\/\/doi.org\/10.1109\/SP.2010.31","DOI":"10.1109\/SP.2010.31"},{"key":"15586_CR13","doi-asserted-by":"crossref","unstructured":"Bursztein E, Martin M, Mitchell J (2011) Text-based CAPTCHA strengths and weaknesses. In: Proceedings of the 18th ACM conference on Computer and communications security. https:\/\/elie.net\/static\/files\/text-based-captcha-strengths-and-weaknesses\/text-based-captcha-strengths-and-weaknesses-paper.pdf.\u00a0Accessed 29 Apr 2023","DOI":"10.1145\/2046707.2046724"},{"key":"15586_CR14","doi-asserted-by":"crossref","unstructured":"Chellapilla K et al (2005) Computers beat humans at single character recognition in reading based human interaction proofs (HIPs). CEAS, pp 1\u201317","DOI":"10.1007\/11427896_1"},{"key":"15586_CR15","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-981-13-1483-4_4","volume-title":"Advances in Cyber Security: Principles, Techniques, and Applications","author":"Y-W Chow","year":"2019","unstructured":"Chow Y-W, Susilo W, Thorncharoensri P (2019) CAPTCHA design and security issues. In: Advances in Cyber Security: Principles, Techniques, and Applications. Springer, Singapore, pp 69\u201392. https:\/\/doi.org\/10.1007\/978-981-13-1483-4_4"},{"key":"15586_CR16","doi-asserted-by":"publisher","unstructured":"Cui J, Zhang W-Z, Peng Y, Liang Y, Xiao B, Mei J-T, Zhang D, Wang X (2010) A 3-layer dynamic CAPTCHA implementation. IEEE International Workshop on Education Technology and Computer Science. https:\/\/doi.org\/10.1109\/ETCS.2010.575","DOI":"10.1109\/ETCS.2010.575"},{"key":"15586_CR17","unstructured":"Da\u015f R, Baykara M, Tuna M (2015) Novel CAPTCHA approaches to protect web forms against bots. The Third International Symposium on Digital Forensics and Security (ISDFS 2015). https:\/\/silo.tips\/download\/isdfs-2015-program-0930-0945-opening-speeches-prof-eref-sairolu-chair-isdfs-prof. Accessed 29 Apr 2023"},{"key":"15586_CR18","unstructured":"Ghorpade J et al (2014) Novel method for graphical passwords using CAPTCHA. Int J Soft Comput Eng (IJSCE):2231\u20132307. https:\/\/www.semanticscholar.org\/paper\/Novel-Method-for-Graphical-Passwords-using-CAPTCHA-Ghorpade-Mukane\/1f4fdfe97fcb23ccd89a0f0b3d9991b291398129. Accessed 29 Apr 2023"},{"key":"15586_CR19","doi-asserted-by":"publisher","unstructured":"Guo P, Deng YW, Zhang HY (2011) A CAPTCHA image recognition algorithm based on edit distance. Key Engineering Materials. Vol. 474. Trans Tech Publications Ltd, pp. 2203\u20132207. https:\/\/doi.org\/10.4028\/www.scientific.net\/KEM.474-476.2203","DOI":"10.4028\/www.scientific.net\/KEM.474-476.2203"},{"issue":"1000","key":"15586_CR20","doi-asserted-by":"publisher","first-page":"0","DOI":"10.5505\/pajes.2021.54837","volume":"1000","author":"A Gutub","year":"2021","unstructured":"Gutub A (2021) Regulating watermarking semi-authentication of multimedia audio via counting-based secret sharing. Pamukkale Univ J Engin Sci 1000(1000):0\u20130. https:\/\/doi.org\/10.5505\/pajes.2021.54837","journal-title":"Pamukkale Univ J Engin Sci"},{"issue":"4","key":"15586_CR21","doi-asserted-by":"publisher","first-page":"997","DOI":"10.1007\/s10772-022-09999-0","volume":"25","author":"A Gutub","year":"2022","unstructured":"Gutub A (2022) Integrity verification of Holy Quran verses recitation via incomplete watermarking authentication. Int J Speech Technol 25(4):997\u20131011. https:\/\/doi.org\/10.1007\/s10772-022-09999-0","journal-title":"Int J Speech Technol"},{"issue":"1","key":"15586_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJISP.2022010118","volume":"16","author":"A Gutub","year":"2022","unstructured":"Gutub A (2022) Watermarking Images via Counting-Based Secret Sharing for Lightweight Semi-Complete Authentication. Int J Inform Sec Priv (IJISP) 16(1):1\u201318. https:\/\/doi.org\/10.4018\/IJISP.2022010118","journal-title":"Int J Inform Sec Priv (IJISP)"},{"key":"15586_CR23","doi-asserted-by":"publisher","unstructured":"Gutub A, Almehmadi E (2022) Advancing partial verification of watermarking for Arabic text via utilization of innovative counting-based secret sharing. Arab J Sci Eng. https:\/\/doi.org\/10.1007\/s13369-022-07387-z","DOI":"10.1007\/s13369-022-07387-z"},{"key":"15586_CR24","doi-asserted-by":"publisher","unstructured":"Gutub A, AlKhodaidi T (2020) Smart expansion of target key for more handlers to access multimedia counting-based secret sharing. Multimedia Tools & Applications 79. https:\/\/doi.org\/10.1007\/s11042-020-08695-y","DOI":"10.1007\/s11042-020-08695-y"},{"issue":"5","key":"15586_CR25","doi-asserted-by":"publisher","first-page":"5591","DOI":"10.1007\/s11042-017-5293-6","volume":"78","author":"A Gutub","year":"2019","unstructured":"Gutub A, Al-Juaid N, Khan E (2019) Counting-based secret sharing technique for multimedia applications. Multimed Tools Appl 78(5):5591\u20135619. https:\/\/doi.org\/10.1007\/s11042-017-5293-6","journal-title":"Multimed Tools Appl"},{"key":"15586_CR26","doi-asserted-by":"publisher","unstructured":"Gutub A, Shambour MK, Abu-Hashem M (2023) Coronavirus impact on human feelings during 2021 Hajj season via deep learning critical Twitter analysis. J Eng Res 11(1):100001. https:\/\/doi.org\/10.1016\/j.jer.2023.100001","DOI":"10.1016\/j.jer.2023.100001"},{"key":"15586_CR27","doi-asserted-by":"publisher","unstructured":"Kaur R (2016) A non-OCR approach for math captcha design based on boolean algebra using digital gates to enhance web security. IEEE International Conference on Wireless Communications, Signal Processing and Networking https:\/\/doi.org\/10.1109\/WiSPNET.2016.7566254","DOI":"10.1109\/WiSPNET.2016.7566254"},{"issue":"9","key":"15586_CR28","doi-asserted-by":"publisher","first-page":"16","DOI":"10.22937\/IJCSNS.2020.20.09.3","volume":"20","author":"N Kheshaifaty","year":"2020","unstructured":"Kheshaifaty N, Gutub A (2020) Preventing multiple accessing attacks via efficient integration of captcha crypto hash functions. Int J Comput Sci Netw Secur(IJCSNS) 20(9):16\u201328. https:\/\/doi.org\/10.22937\/IJCSNS.2020.20.09.3","journal-title":"Int J Comput Sci Netw Secur(IJCSNS)"},{"key":"15586_CR29","doi-asserted-by":"publisher","unstructured":"Kheshaifaty N, Gutub A (2021) Engineering Graphical Captcha and AES Crypto Hash Functions for Secure Online Authentication. Journal of Engineering Research, pp. 1\u201311. https:\/\/doi.org\/10.36909\/jer.13761","DOI":"10.36909\/jer.13761"},{"key":"15586_CR30","doi-asserted-by":"publisher","unstructured":"Kulkarni P, Malwatkar G (2015) The graphical security system by using CaRP. IEEE International Conference on Energy Systems and Applications https:\/\/doi.org\/10.1109\/ICESA.2015.7503319","DOI":"10.1109\/ICESA.2015.7503319"},{"key":"15586_CR31","unstructured":"Kumar S, Kumar S (2019) Artificial intelligence: Concept of Security 7(6):45\u201352"},{"key":"15586_CR32","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/978-981-15-8354-4_57","volume-title":"A Brief Survey of Challenge\u2013Response Authentication Mechanisms","author":"P Kushwaha","year":"2021","unstructured":"Kushwaha P et al (2021) A Brief Survey of Challenge\u2013Response Authentication Mechanisms. ICT Analysis and Applications. Springer, Singapore, pp 573\u2013581. https:\/\/doi.org\/10.1007\/978-981-15-8354-4_57"},{"key":"15586_CR33","doi-asserted-by":"publisher","unstructured":"Lv Y, Cai F, Lin D, Cao D (2016) Chinese character CAPTCHA recognition based on convolution neural network. IEEE Congress on Evolutionary Computation https:\/\/doi.org\/10.1109\/CEC.2016.7744412","DOI":"10.1109\/CEC.2016.7744412"},{"key":"15586_CR34","doi-asserted-by":"publisher","unstructured":"Malutan R, Grosan C (2015) Web authentication methods using single sign on method and virtual keyboard\u201d. IEEE Conference on Grid, Cloud & High Performance Computing Sciences. https:\/\/doi.org\/10.1109\/ROLCG.2015.7367431","DOI":"10.1109\/ROLCG.2015.7367431"},{"key":"15586_CR35","doi-asserted-by":"crossref","unstructured":"Mori G, Malik J (2003) Recognizing objects in adversarial clutter: breaking a visual CAPTCHA. In: 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2003. Proceedings, vol. 1. IEEE, pp 1\u20138. https:\/\/www.cs.sfu.ca\/~mori\/research\/papers\/mori_cvpr03.pdf.\u00a0Accessed 29 Apr 2023","DOI":"10.1109\/CVPR.2003.1211347"},{"issue":"4","key":"15586_CR36","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.eij.2022.10.003","volume":"23","author":"NA Roslan","year":"2022","unstructured":"Roslan NA, Udzir NI, Mahmod R, Gutub A (2022) Systematic literature review and analysis for Arabic text steganography method practically. Egypt Inform J 23(4):177\u2013191. https:\/\/doi.org\/10.1016\/j.eij.2022.10.003","journal-title":"Egypt Inform J"},{"issue":"1","key":"15586_CR37","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1049\/cit2.12081","volume":"8","author":"PK Roy","year":"2023","unstructured":"Roy PK, Saumya S, Singh JP, Banerjee S, Gutub A (2023) Analysis of community question-answering issues via machine learning and deep learning: state-of-the-art review. CAAI Trans Intell Technol 8(1):95\u2013117. https:\/\/doi.org\/10.1049\/cit2.12081","journal-title":"CAAI Trans Intell Technol"},{"key":"15586_CR38","unstructured":"Serrao M, Salunke S, Mathur A (2013) Cracking captchas for cash: A review of captcha crackers, vol 2, no 1.\u00a0https:\/\/www.ijert.org\/cracking-captchas-for-cash-a-review-of-captcha-crackers. Accessed 29 Apr 2023"},{"key":"15586_CR39","doi-asserted-by":"publisher","unstructured":"Shaikh RA, Memon I, Hussain R et al (2018) A contemporary approach for object recognition based on spatial layout and low level features\u2019 integration. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-018-6796-5","DOI":"10.1007\/s11042-018-6796-5"},{"key":"15586_CR40","doi-asserted-by":"publisher","unstructured":"Singh A, Gutub A, Nayyar A, Khan MK (2022) Redefining food safety traceability system through blockchain: findings challenges and open issues. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-022-14006-4","DOI":"10.1007\/s11042-022-14006-4"},{"issue":"8","key":"15586_CR41","doi-asserted-by":"publisher","first-page":"9801","DOI":"10.1007\/s13369-021-06348-2","volume":"47","author":"A Singh","year":"2022","unstructured":"Singh A, Satapathy SC, Roy A, Gutub A (2022) AI-Based Mobile Edge Computing for IoT: Applications, Challenges, and Future Scope. Arabian J Sci Engin (AJSE) 47(8):9801\u20139831. https:\/\/doi.org\/10.1007\/s13369-021-06348-2","journal-title":"Arabian J Sci Engin (AJSE)"},{"key":"15586_CR42","unstructured":"Singh VP, Pal P (2014) Survey of different types of CAPTCHA. Int J Comput Sci Inform Technol 5(2):2242\u20132245"},{"key":"15586_CR43","doi-asserted-by":"publisher","unstructured":"Sufi FK, Alsulami M, Gutub A (2023) Automating global threat-maps generation via advancements of news sensors and AI. Arab J Sci Eng 48(2):2455\u20132472. https:\/\/doi.org\/10.1007\/s13369-022-07250-1","DOI":"10.1007\/s13369-022-07250-1"},{"issue":"10","key":"15586_CR44","doi-asserted-by":"publisher","first-page":"2522","DOI":"10.1109\/TIFS.2018.2821096","volume":"13","author":"M Tang","year":"2018","unstructured":"Tang M et al (2018) Research on deep learning techniques in breaking text-based captchas and designing image-based captcha. IEEE Trans Inform Forens Sec 13(10):2522\u20132537. https:\/\/doi.org\/10.1109\/TIFS.2018.2821096","journal-title":"IEEE Trans Inform Forens Sec"},{"key":"15586_CR45","unstructured":"Tirthani N, Ganesan R (2014) Data security in cloud architecture based on diffie hellman and elliptical curve cryptography. IACR Cryptol ePrint Arch, p 49. http:\/\/eprint.iacr.org\/2014\/049. Accessed 29 Apr 2023"},{"key":"15586_CR46","doi-asserted-by":"publisher","unstructured":"Vaithyasubramanian S (2016) Review on development of some strong visual CAPTCHAs and breaking of weak audio CAPTCHAs. IEEE International Conference on Information Communication and Embedded Systems. https:\/\/doi.org\/10.1109\/ICICES.2016.7518939","DOI":"10.1109\/ICICES.2016.7518939"},{"key":"15586_CR47","doi-asserted-by":"publisher","first-page":"117639","DOI":"10.1109\/ACCESS.2020.3003911","volume":"8","author":"N Varish","year":"2020","unstructured":"Varish N, Pal AK, Hassan R, Hasan MK, Khan A, Parveen N, Banerjee D, Pellakuri V, Haqis AU, Memon I (2020) Image Retrieval Scheme Using Quantized Bins of Color Image Components and Adaptive Tetrolet Transform. IEEE Access 8:117639\u2013117665. https:\/\/doi.org\/10.1109\/ACCESS.2020.3003911","journal-title":"IEEE Access"},{"key":"15586_CR48","doi-asserted-by":"publisher","unstructured":"Yan J, El Ahmad AS (2008) Usability of CAPTCHAs or usability issues in CAPTCHA design. Proceedings of the 4th symposium on Usable privacy and security https:\/\/doi.org\/10.1145\/1408664.1408671","DOI":"10.1145\/1408664.1408671"},{"key":"15586_CR49","doi-asserted-by":"publisher","unstructured":"Yan J, El Ahmad AS (2008) A Low-cost Attack on a Microsoft CAPTCHA.\" Proceedings of the 15th ACM conference on Computer and communications security, pp. 543\u2013554. https:\/\/doi.org\/10.1145\/1455770.1455839","DOI":"10.1145\/1455770.1455839"},{"key":"15586_CR50","doi-asserted-by":"publisher","unstructured":"Zhang L Xie Y Luan X He J (2017) Captcha automatic segmentation and recognition based on improved vertical projection. In: IEEE International Conference on Communication Software and Networks.\u00a0https:\/\/doi.org\/10.1109\/ICCSN.2017.8230294","DOI":"10.1109\/ICCSN.2017.8230294"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15586-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-15586-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15586-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T15:40:21Z","timestamp":1744213221000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-15586-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,2]]},"references-count":50,"journal-issue":{"issue":"30","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["15586"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-15586-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2023,5,2]]},"assertion":[{"value":"10 May 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 January 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 April 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 May 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"The authors declare that they have no conflict of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"We declare that this work is original and not considered to be published in any other publication media.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Agreement"}}]}}