{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:32:47Z","timestamp":1763202767578,"version":"3.37.3"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2023,8,19]],"date-time":"2023-08-19T00:00:00Z","timestamp":1692403200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,8,19]],"date-time":"2023-08-19T00:00:00Z","timestamp":1692403200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-16471-x","type":"journal-article","created":{"date-parts":[[2023,8,19]],"date-time":"2023-08-19T13:01:42Z","timestamp":1692450102000},"page":"25321-25349","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Metaheuristic-supported image encryption framework based on binary search tree and DNA encoding"],"prefix":"10.1007","volume":"83","author":[{"given":"Mousomi","family":"Roy","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3427-7492","authenticated-orcid":false,"given":"Shouvik","family":"Chakraborty","sequence":"additional","affiliation":[]},{"given":"Kalyani","family":"Mali","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,19]]},"reference":[{"unstructured":"Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography (Doctoral dissertation, University of Buckingham)","key":"16471_CR1"},{"doi-asserted-by":"crossref","unstructured":"Amari SI (1993) Backpropagation and stochastic gradient descent method. Neurocomputing 5(4\u20135):185\u2013196","key":"16471_CR2","DOI":"10.1016\/0925-2312(93)90006-O"},{"doi-asserted-by":"crossref","unstructured":"Bao L,\u00a0 Zhou Y (2015) Image encryption: Generating visually meaningful encrypted images. Inf Sci 324:197\u2013207","key":"16471_CR3","DOI":"10.1016\/j.ins.2015.06.049"},{"key":"16471_CR4","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1023\/A:1022452626305","volume":"25","author":"\u015eI Birbil","year":"2003","unstructured":"Birbil \u015eI, Fang SC (2003) An electromagnetism-like mechanism for global optimization. J Glob Optim 25:263\u2013282. https:\/\/doi.org\/10.1023\/A:1022452626305","journal-title":"J Glob Optim"},{"doi-asserted-by":"publisher","unstructured":"Chakraborty S, Mali K (2020) SuFMoFPA: a superpixel and meta-heuristic based fuzzy image segmentation approach to explicate COVID-19 radiological images. Expert Syst Appl 114142. https:\/\/doi.org\/10.1016\/j.eswa.2020.114142","key":"16471_CR5","DOI":"10.1016\/j.eswa.2020.114142"},{"doi-asserted-by":"publisher","unstructured":"Chakraborty S, Mali K (2020) Fuzzy electromagnetism optimization (FEMO) and its application in biomedical image segmentation. Appl Soft Comput J 97. https:\/\/doi.org\/10.1016\/j.asoc.2020.106800","key":"16471_CR6","DOI":"10.1016\/j.asoc.2020.106800"},{"doi-asserted-by":"publisher","unstructured":"Chakraborty S, Seal A, Roy M, Mali K (2016) A novel lossless image encryption method using DNA substitution and chaotic logistic map. Int J Secur its Appl 10:. https:\/\/doi.org\/10.14257\/ijsia.2016.10.2.19","key":"16471_CR7","DOI":"10.14257\/ijsia.2016.10.2.19"},{"doi-asserted-by":"crossref","unstructured":"Chakraborty S, Chatterjee S, Dey N, Ashour AS, Ashour AS, Shi F, Mali K (2017) Modified cuckoo search algorithm in microscopic image segmentation of hippocampus. Microscopy Research and Technique 80(10):1051\u20131072","key":"16471_CR8","DOI":"10.1002\/jemt.22900"},{"unstructured":"Computer security division N FIPS 46-3, data encryption standard (DES) (withdrawn May 19, 2005)","key":"16471_CR9"},{"doi-asserted-by":"crossref","unstructured":"Cui G, Qin L, Wang Y, Zhang X (2008) An encryption scheme using DNA technology. In: 2008 3rd international conference on bio-inspired computing: theories and applications. IEEE, pp 37\u201342","key":"16471_CR10","DOI":"10.1109\/BICTA.2008.4656701"},{"doi-asserted-by":"crossref","unstructured":"Daemen J, Rijmen V (1998) The block cipher Rijndael. In International Conference on Smart Card Research and Advanced Applications. Berlin, Springer pp. 277\u2013284","key":"16471_CR11","DOI":"10.1007\/10721064_26"},{"key":"16471_CR12","doi-asserted-by":"publisher","first-page":"1066","DOI":"10.1016\/j.optlaseng.2013.03.010","volume":"51","author":"R Enayatifar","year":"2013","unstructured":"Enayatifar R, Abdullah AH, Lee M (2013) A weighted discrete imperialist competitive algorithm (WDICA) combined with chaotic map for image encryption. Opt Lasers Eng 51:1066\u20131077. https:\/\/doi.org\/10.1016\/j.optlaseng.2013.03.010","journal-title":"Opt Lasers Eng"},{"doi-asserted-by":"crossref","unstructured":"G\u00e1lvez J, Cuevas E, Avalos O, Oliva D, Hinojosa S (2018) Electromagnetism-like mechanism with collective animal behavior for multimodal optimization. Appl Intell 48:2580\u20132612","key":"16471_CR13","DOI":"10.1007\/s10489-017-1090-1"},{"doi-asserted-by":"crossref","unstructured":"Gehani A, LaBean T, Reif J (2004) DNA-based cryptography. Aspects of molecular computing: essays dedicated to tom head, on the occasion of his 70th birthday, 167\u2013188","key":"16471_CR14","DOI":"10.1007\/978-3-540-24635-0_12"},{"doi-asserted-by":"crossref","unstructured":"Gehani A, La Bean T, Reif JH DNA-based cryptography. DIMACS series in discrete mathematics. Theor Comput Sci 54:233\u2013249","key":"16471_CR15","DOI":"10.1090\/dimacs\/054\/19"},{"key":"16471_CR16","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1109\/TMM.2006.879919","volume":"8","author":"M Grangetto","year":"2006","unstructured":"Grangetto M, Magli E, Olmo G (2006) Multimedia selective encryption by means of randomized arithmetic coding. IEEE Trans Multimed 8:905\u2013917. https:\/\/doi.org\/10.1109\/TMM.2006.879919","journal-title":"IEEE Trans Multimed"},{"key":"16471_CR17","doi-asserted-by":"publisher","first-page":"788","DOI":"10.1016\/J.JNCA.2009.02.009","volume":"32","author":"J Hu","year":"2009","unstructured":"Hu J, Han F (2009) A pixel-based scrambling scheme for digital medical images protection. J Netw Comput Appl 32:788\u2013794. https:\/\/doi.org\/10.1016\/J.JNCA.2009.02.009","journal-title":"J Netw Comput Appl"},{"key":"16471_CR18","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/J.INS.2014.11.018","volume":"297","author":"Z Hua","year":"2015","unstructured":"Hua Z, Zhou Y, Pun C-M, Chen CLP (2015) 2D sine logistic modulation map for image encryption. Inf Sci (Ny) 297:80\u201394. https:\/\/doi.org\/10.1016\/J.INS.2014.11.018","journal-title":"Inf Sci (Ny)"},{"key":"16471_CR19","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/J.INS.2018.12.048","volume":"480","author":"Z Hua","year":"2019","unstructured":"Hua Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci (Ny) 480:403\u2013419. https:\/\/doi.org\/10.1016\/J.INS.2018.12.048","journal-title":"Inf Sci (Ny)"},{"doi-asserted-by":"crossref","unstructured":"Kamali SH, Hedayati M, Shakerian R, Rahmani M (2010) A new modified version of advanced encryption standard based algorithm for image encryption. In: ICEIE 2010 - 2010 International Conference on Electronics and Information Engineering, Proceedings","key":"16471_CR20","DOI":"10.1109\/ICEIE.2010.5559902"},{"doi-asserted-by":"publisher","unstructured":"Khan HN, Chaudhuri A, Das A, Chaudhuri A (2019) An ultra robust session key based image cryptography. Microsyst Technol 1\u20139. https:\/\/doi.org\/10.1007\/s00542-019-04518-9","key":"16471_CR21","DOI":"10.1007\/s00542-019-04518-9"},{"doi-asserted-by":"crossref","unstructured":"Leong MP, Cheung OYH, Tsoi KH, Leong PHW A bit-serial implementation of the international data encryption algorithm IDEA. In: Proceedings 2000 IEEE Symposium on Field-Programmable Custom Computing Machines (Cat. No.PR00871). IEEE Comput Soc, pp 122\u2013131","key":"16471_CR22","DOI":"10.1109\/FPGA.2000.903399"},{"key":"16471_CR23","doi-asserted-by":"publisher","first-page":"105616","DOI":"10.1016\/j.optlastec.2019.105616","volume":"119","author":"L Li","year":"2019","unstructured":"Li L, Xie Y, Liu B et al (2019) Optical image encryption and transmission with semiconductor lasers. Opt Laser Technol 119:105616. https:\/\/doi.org\/10.1016\/j.optlastec.2019.105616","journal-title":"Opt Laser Technol"},{"key":"16471_CR24","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1109\/T-ED.1979.19400","volume":"26","author":"FA Lindholm","year":"1979","unstructured":"Lindholm FA, Fossum JG, Burgess EL (1979) Application of the superposition principle to solar-cell analysis. IEEE Trans Electron Devices 26:165\u2013171. https:\/\/doi.org\/10.1109\/T-ED.1979.19400","journal-title":"IEEE Trans Electron Devices"},{"key":"16471_CR25","doi-asserted-by":"publisher","first-page":"279","DOI":"10.14257\/ijsia.2015.9.12.26","volume":"9","author":"K Mali","year":"2015","unstructured":"Mali K, Chakraborty S, Seal A, Roy M (2015) An efficient image cryptographic algorithm based on frequency domain using Haar wavelet transform. Int J Secur its Appl 9:279\u2013288. https:\/\/doi.org\/10.14257\/ijsia.2015.9.12.26","journal-title":"Int J Secur its Appl"},{"key":"16471_CR26","first-page":"2321","volume":"3","author":"K Mali","year":"2015","unstructured":"Mali K, Chakraborty S, Roy M (2015) A study on statistical analysis and security evaluation parameters in image encryption. IJSRD-International J Sci Res Dev 3:2321\u20130613","journal-title":"IJSRD-International J Sci Res Dev"},{"key":"16471_CR27","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/S0375-9601(03)00122-1","volume":"309","author":"N Pareek","year":"2003","unstructured":"Pareek N, Patidar V, Sud K (2003) Discrete chaotic cryptography using external key. Phys Lett A 309:75\u201382. https:\/\/doi.org\/10.1016\/S0375-9601(03)00122-1","journal-title":"Phys Lett A"},{"unstructured":"Patidar V, Sud K, Informatica NP, (2009) Undefined A pseudo random bit generator based on chaotic logistic map and its statistical testing. informatica.si","key":"16471_CR28"},{"doi-asserted-by":"crossref","unstructured":"Roy M, Mali K, Chatterjee S, et al (2019) A study on the applications of the biomedical image encryption methods for secured computer aided diagnostics. In: proceedings - 2019 Amity International conference on artificial intelligence, AICAI 2019","key":"16471_CR29","DOI":"10.1109\/AICAI.2019.8701382"},{"doi-asserted-by":"crossref","unstructured":"Roy M, Chakraborty S, Mali K, et al (2019) A dual layer image encryption using polymerase chain reaction amplification and dna encryption. In 2019 international conference on optoelectronics and applied optics (Optronix). IEEE\u00a0 (pp. 1\u20134)","key":"16471_CR30","DOI":"10.1109\/OPTRONIX.2019.8862350"},{"doi-asserted-by":"crossref","unstructured":"Roy M, Chakraborty S, Mali K (2020) A robust image encryption method using chaotic skew-tent map. In: Chakraborty S, Mali K (eds) Applications of Advanced Machine Intelligence in Computer Vision and Object Recognition: Emerging Research and Opportunities","key":"16471_CR31","DOI":"10.4018\/978-1-7998-2736-8.ch001"},{"key":"16471_CR32","first-page":"49","volume-title":"Advances in intelligent systems and computing","author":"M Roy","year":"2020","unstructured":"Roy M, Chakraborty S, Mali K et al (2020) Biomedical image security using matrix manipulation and DNA encryption. In: Advances in intelligent systems and computing. Springer, pp 49\u201360"},{"doi-asserted-by":"crossref","unstructured":"Roy M, Chakraborty S, Mali K,\u00a0 et al (2020) Data security techniques based on DNA encryption. In Proceedings of International Ethical Hacking Conference 2019: eHaCON 2019, Kolkata, India. Springer, Singapore\u00a0 (pp. 239\u2013249)","key":"16471_CR33","DOI":"10.1007\/978-981-15-0361-0_19"},{"doi-asserted-by":"crossref","unstructured":"Roy M, Chakraborty S, Mali K (2021) A chaotic framework and its application in image encryption. Multimedia Tools Appl 80:24069\u201324110","key":"16471_CR34","DOI":"10.1007\/s11042-021-10839-7"},{"doi-asserted-by":"crossref","unstructured":"Roy M, Chakraborty S, Mali K (2021) The MSK: a simple and robust image encryption method. Multimed Tools Appl 80:21261\u201321291","key":"16471_CR35","DOI":"10.1007\/s11042-021-10761-y"},{"doi-asserted-by":"publisher","unstructured":"Roy M, Chakraborty S, Mali K, et al (2021) A robust image encryption framework based on DNA computing and chaotic environment. Microsyst Technol 1\u201311. https:\/\/doi.org\/10.1007\/s00542-020-05120-0","key":"16471_CR36","DOI":"10.1007\/s00542-020-05120-0"},{"key":"16471_CR37","first-page":"267","volume-title":"An image security method based on low dimensional chaotic environment and DNA encoding","author":"M Roy","year":"2021","unstructured":"Roy M, Chakraborty S, Mali K et al (2021) An image security method based on low dimensional chaotic environment and DNA encoding. Springer, Singapore, pp 267\u2013277"},{"doi-asserted-by":"crossref","unstructured":"Roy M, Chakraborty S, Mali K, Roy D (2021) Utilization of Hyperchaotic environment and DNA sequences for digital image security.\u00a0Advances in\u00a0smart communication technology and information processing: OPTRONIX 2020. Springer, Singapore","key":"16471_CR38","DOI":"10.1007\/978-981-15-9433-5_28"},{"unstructured":"Seal A, Chakraborty S, Mali K (2017) A new and resilient image encryption technique based on pixel manipulation, value transformation and visual transformation utilizing single\u2013level haar wavelet transform","key":"16471_CR39"},{"key":"16471_CR40","first-page":"316","volume-title":"Pseudo-random bit generator based on couple chaotic systems and its applications in stream-cipher cryptography","author":"L Shujun","year":"2001","unstructured":"Shujun L, Xuanqin M, Yuanlong C (2001) Pseudo-random bit generator based on couple chaotic systems and its applications in stream-cipher cryptography. Springer, Berlin, Heidelberg, pp 316\u2013329"},{"key":"16471_CR41","doi-asserted-by":"publisher","first-page":"2066","DOI":"10.1016\/j.optcom.2010.01.028","volume":"283","author":"F Sun","year":"2010","unstructured":"Sun F, Lu Z, Liu S (2010) A new cryptosystem based on spatial chaotic system. Opt Commun 283:2066\u20132073. https:\/\/doi.org\/10.1016\/j.optcom.2010.01.028","journal-title":"Opt Commun"},{"key":"16471_CR42","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1515\/jisys-2017-0069","volume":"28","author":"S Suri","year":"2019","unstructured":"Suri S, Vijay R (2019) A bi-objective genetic algorithm optimization of Chaos-DNA based hybrid approach. J Intell Syst 28:333\u2013346. https:\/\/doi.org\/10.1515\/jisys-2017-0069","journal-title":"J Intell Syst"},{"key":"16471_CR43","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s10994-006-6889-7","volume":"65","author":"I Tsamardinos","year":"2006","unstructured":"Tsamardinos I, Brown LE, Aliferis CF (2006) The max-min hill-climbing Bayesian network structure learning algorithm. Mach Learn 65:31\u201378. https:\/\/doi.org\/10.1007\/s10994-006-6889-7","journal-title":"Mach Learn"},{"key":"16471_CR44","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1007\/s11277-014-1888-7","volume":"79","author":"SM Wadi","year":"2014","unstructured":"Wadi SM, Zainal N (2014) High definition image encryption algorithm based on AES modification. Wirel Pers Commun 79:811\u2013829. https:\/\/doi.org\/10.1007\/s11277-014-1888-7","journal-title":"Wirel Pers Commun"},{"doi-asserted-by":"crossref","unstructured":"Wang X, Zhang Q (2009) DNA computing-based cryptography. In: 2009 fourth international on conference on bio-inspired computing. IEEE, pp 1\u20133","key":"16471_CR45","DOI":"10.1109\/BICTA.2009.5338153"},{"key":"16471_CR46","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/J.OPTLASENG.2014.08.005","volume":"66","author":"X Wang","year":"2015","unstructured":"Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10\u201318. https:\/\/doi.org\/10.1016\/J.OPTLASENG.2014.08.005","journal-title":"Opt Lasers Eng"},{"key":"16471_CR47","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/J.INS.2013.11.027","volume":"264","author":"Y Wu","year":"2014","unstructured":"Wu Y, Zhou Y, Noonan JP, Agaian S (2014) Design of image cipher using latin squares. Inf Sci (Ny) 264:317\u2013339. https:\/\/doi.org\/10.1016\/J.INS.2013.11.027","journal-title":"Inf Sci (Ny)"},{"key":"16471_CR48","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/J.INS.2016.02.041","volume":"349\u2013350","author":"X Wu","year":"2016","unstructured":"Wu X, Wang D, Kurths J, Kan H (2016) A novel lossless color image encryption scheme using 2D DWT and 6D hyperchaotic system. Inf Sci (Ny) 349\u2013350:137\u2013153. https:\/\/doi.org\/10.1016\/J.INS.2016.02.041","journal-title":"Inf Sci (Ny)"},{"key":"16471_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/J.INS.2018.11.010","volume":"478","author":"M Xu","year":"2019","unstructured":"Xu M, Tian Z (2019) A novel image cipher based on 3D bit matrix and latin cubes. Inf Sci (Ny) 478:1\u201314. https:\/\/doi.org\/10.1016\/J.INS.2018.11.010","journal-title":"Inf Sci (Ny)"},{"key":"16471_CR50","doi-asserted-by":"publisher","first-page":"5290","DOI":"10.1016\/j.optcom.2011.07.070","volume":"284","author":"R Ye","year":"2011","unstructured":"Ye R (2011) A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism. Opt Commun 284:5290\u20135298. https:\/\/doi.org\/10.1016\/j.optcom.2011.07.070","journal-title":"Opt Commun"},{"key":"16471_CR51","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/J.OPTLASENG.2017.04.009","volume":"96","author":"R Zahmoul","year":"2017","unstructured":"Zahmoul R, Ejbali R, Zaied M (2017) Image encryption based on new Beta chaotic maps. Opt Lasers Eng 96:39\u201349. https:\/\/doi.org\/10.1016\/J.OPTLASENG.2017.04.009","journal-title":"Opt Lasers Eng"},{"key":"16471_CR52","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/J.INS.2018.03.055","volume":"450","author":"Y Zhang","year":"2018","unstructured":"Zhang Y (2018) The unified image encryption algorithm based on chaos and cubic S-box. Inf Sci (Ny) 450:361\u2013377. https:\/\/doi.org\/10.1016\/J.INS.2018.03.055","journal-title":"Inf Sci (Ny)"},{"key":"16471_CR53","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/J.SIGPRO.2015.06.008","volume":"118","author":"W Zhang","year":"2016","unstructured":"Zhang W, Yu H, Zhao Y, Zhu Z (2016) Image encryption based on three-dimensional bit matrix permutation. Signal Process 118:36\u201350. https:\/\/doi.org\/10.1016\/J.SIGPRO.2015.06.008","journal-title":"Signal Process"},{"key":"16471_CR54","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1109\/TSMCB.2012.2210706","volume":"43","author":"Y Zhou","year":"2013","unstructured":"Zhou Y, Panetta K, Agaian S, Chen CLP (2013) (n, k, p)-gray code for image systems. IEEE Trans Cybern 43:515\u2013529. https:\/\/doi.org\/10.1109\/TSMCB.2012.2210706","journal-title":"IEEE Trans Cybern"},{"key":"16471_CR55","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/J.SIGPRO.2014.01.020","volume":"100","author":"Y Zhou","year":"2014","unstructured":"Zhou Y, Cao W, Philip Chen CL (2014) Image encryption using binary bitplane. Signal Process 100:197\u2013207. https:\/\/doi.org\/10.1016\/J.SIGPRO.2014.01.020","journal-title":"Signal Process"},{"key":"16471_CR56","doi-asserted-by":"publisher","first-page":"1171","DOI":"10.1016\/J.INS.2010.11.009","volume":"181","author":"Z Zhu","year":"2011","unstructured":"Zhu Z, Zhang W, Wong K, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci (Ny) 181:1171\u20131186. https:\/\/doi.org\/10.1016\/J.INS.2010.11.009","journal-title":"Inf Sci (Ny)"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16471-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-16471-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16471-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,26]],"date-time":"2024-10-26T12:04:24Z","timestamp":1729944264000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-16471-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,19]]},"references-count":56,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2024,3]]}},"alternative-id":["16471"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-16471-x","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2023,8,19]]},"assertion":[{"value":"30 November 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 June 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 August 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 August 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}}]}}