{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T19:13:24Z","timestamp":1774034004559,"version":"3.50.1"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2023,10,6]],"date-time":"2023-10-06T00:00:00Z","timestamp":1696550400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,10,6]],"date-time":"2023-10-06T00:00:00Z","timestamp":1696550400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-17034-w","type":"journal-article","created":{"date-parts":[[2023,10,6]],"date-time":"2023-10-06T04:02:39Z","timestamp":1696564959000},"page":"38793-38817","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Fast chaotic encryption scheme based on separable moments and parallel computing"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6188-2324","authenticated-orcid":false,"given":"Abdelhalim","family":"Kamrani","sequence":"first","affiliation":[]},{"given":"Khalid","family":"Zenkouar","sequence":"additional","affiliation":[]},{"given":"Said","family":"Najah","sequence":"additional","affiliation":[]},{"given":"Hakim","family":"El Fadili","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,6]]},"reference":[{"issue":"08","key":"17034_CR1","doi-asserted-by":"crossref","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifur Chaos 16(08):2129\u20132151","journal-title":"Int J Bifur Chaos"},{"key":"17034_CR2","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1016\/j.patcog.2017.06.013","volume":"71","author":"I Batioua","year":"2017","unstructured":"Batioua I, Benouini R, Zenkouar K, Zahi A et al (2017) 3d image analysis by separable discrete orthogonal moments based on krawtchouk and tchebichef polynomials. Pattern Recogn 71:264\u2013277","journal-title":"Pattern Recogn"},{"issue":"3","key":"17034_CR3","doi-asserted-by":"crossref","first-page":"2671","DOI":"10.1007\/s11071-022-07328-3","volume":"108","author":"X Chai","year":"2022","unstructured":"Chai X, Fu J, Gan Z, Lu Y, Zhang Y (2022) An image encryption scheme based on multi-objective optimization and block compressed sensing. Nonlinear Dyn 108(3):2671\u20132704","journal-title":"Nonlinear Dyn"},{"issue":"9","key":"17034_CR4","doi-asserted-by":"crossref","first-page":"1535","DOI":"10.1049\/iet-ipr.2019.0051","volume":"13","author":"M Guan","year":"2019","unstructured":"Guan M, Yang X, Hu W (2019) Chaotic image encryption algorithm using frequency-domain dna encoding. IET Image Process 13(9):1535\u20131539","journal-title":"IET Image Process"},{"key":"17034_CR5","doi-asserted-by":"crossref","DOI":"10.1201\/b16944","volume-title":"Coding theory and cryptography: the essentials","author":"D Hankerson","year":"2000","unstructured":"Hankerson D, Hoffman G, Leonard DA, Lindner CC, Phelps KT, Rodger CA, Wall JR (2000) Coding theory and cryptography: the essentials. CRC Press"},{"key":"17034_CR6","doi-asserted-by":"crossref","unstructured":"H\u00e9non M (2004) A two-dimensional mapping with a strange attractor. Theory Chaotic Attrac 94\u2013102","DOI":"10.1007\/978-0-387-21830-4_8"},{"key":"17034_CR7","doi-asserted-by":"crossref","unstructured":"Hore A, Ziou D (2010) Image quality metrics: Psnr vs. ssim. In: 2010 20th international conference on pattern recognition, pp 2366\u20132369. IEEE","DOI":"10.1109\/ICPR.2010.579"},{"issue":"3","key":"17034_CR8","doi-asserted-by":"crossref","first-page":"2819","DOI":"10.1007\/s11071-021-06228-2","volume":"103","author":"G Hu","year":"2021","unstructured":"Hu G, Li B (2021) A uniform chaotic system with extended parameter range for image encryption. Nonlinear Dyn 103(3):2819\u20132840","journal-title":"Nonlinear Dyn"},{"issue":"2","key":"17034_CR9","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1109\/TIT.1962.1057692","volume":"8","author":"MK Hu","year":"1962","unstructured":"Hu MK (1962) Visual pattern recognition by moment invariants. IRE Trans Inf Theory 8(2):179\u2013187","journal-title":"IRE Trans Inf Theory"},{"key":"17034_CR10","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1016\/j.sigpro.2018.03.010","volume":"149","author":"Z Hua","year":"2018","unstructured":"Hua Z, Jin F, Xu B, Huang H (2018) 2d logistic-sine-coupling map for image encryption. Signal Process 149:148\u2013161","journal-title":"Signal Process"},{"key":"17034_CR11","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1016\/j.ins.2018.12.048","volume":"480","author":"Z Hua","year":"2019","unstructured":"Hua Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci 480:403\u2013419","journal-title":"Inf Sci"},{"key":"17034_CR12","doi-asserted-by":"crossref","first-page":"1063","DOI":"10.1016\/j.ins.2020.09.032","volume":"546","author":"Z Hua","year":"2021","unstructured":"Hua Z, Zhu Z, Yi S, Zhang Z, Huang H (2021) Cross-plane colour image encryption using a two-dimensional logistic tent modular map. Inf Sci 546:1063\u20131083","journal-title":"Inf Sci"},{"issue":"11","key":"17034_CR13","doi-asserted-by":"crossref","first-page":"2123","DOI":"10.1016\/j.optcom.2009.02.044","volume":"282","author":"CK Huang","year":"2009","unstructured":"Huang CK, Nien HH (2009) Multi chaotic systems based pixel shuffle for image encryption. Opt Commun 282(11):2123\u20132127","journal-title":"Opt Commun"},{"key":"17034_CR14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.micpro.2017.10.013","volume":"56","author":"S Janakiraman","year":"2018","unstructured":"Janakiraman S, Thenmozhi K, Rayappan JBB, Amirtharajan R (2018) Lightweight chaotic image encryption algorithm for real-time embedded system: Implementation and analysis on 32-bit microcontroller. Microprocess Microsyst 56:1\u201312","journal-title":"Microprocess Microsyst"},{"key":"17034_CR15","unstructured":"Jiang NZX, Lan X (2006) Advances in machine vision, image processing, and pattern analysis. In: International Workshop on Intelligent Computing in Pattern Analysis\/Synthesis, IWICPAS. Springer"},{"issue":"27","key":"17034_CR16","doi-asserted-by":"crossref","first-page":"20263","DOI":"10.1007\/s11042-020-08879-6","volume":"79","author":"A Kamrani","year":"2020","unstructured":"Kamrani A, Zenkouar K, Najah S (2020) A new set of image encryption algorithms based on discrete orthogonal moments and chaos theory. Multimedia Tools Appl 79(27):20263\u201320279","journal-title":"Multimedia Tools Appl"},{"key":"17034_CR17","unstructured":"Khedr WI (2019) A new efficient and configurable image encryption structure for secure transmission. Multimed Tools Appl 1\u201325"},{"issue":"2","key":"17034_CR18","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1109\/TCSVT.2006.888840","volume":"17","author":"S Li","year":"2007","unstructured":"Li S, Chen G, Cheung A, Bhargava B, Lo KT (2007) On the design of perceptual mpeg-video encryption algorithms. IEEE Trans Circ Sys Vid Tech 17(2):214\u2013223","journal-title":"IEEE Trans Circ Sys Vid Tech"},{"key":"17034_CR19","unstructured":"Li S, Li C, Chen G, Zhang D, Bourbakis NG (2004) A general cryptanalysis of permutation-only multimedia encryption algorithms. IACR\u2019s Crypto ePrint Arch Rep 374:2004"},{"issue":"3","key":"17034_CR20","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1109\/TIP.2007.916157","volume":"17","author":"H Lin","year":"2008","unstructured":"Lin H, Si J, Abousleman GP (2008) Orthogonal rotation-invariant moments for digital image processing. IEEE Trans Image Process 17(3):272\u2013282","journal-title":"IEEE Trans Image Process"},{"issue":"12","key":"17034_CR21","doi-asserted-by":"crossref","first-page":"2050173","DOI":"10.1142\/S0218127420501734","volume":"30","author":"H Liu","year":"2020","unstructured":"Liu H, Kadir A, Xu C (2020) Color image encryption with cipher feedback and coupling chaotic map. Int J Bifur Chaos 30(12):2050173","journal-title":"Int J Bifur Chaos"},{"key":"17034_CR22","volume":"376","author":"H Liu","year":"2020","unstructured":"Liu H, Kadir A, Xu C (2020) Cryptanalysis and constructing s-box based on chaotic map and backtracking. Appl Math Comput 376:125153","journal-title":"Appl Math Comput"},{"issue":"16","key":"17034_CR23","doi-asserted-by":"crossref","first-page":"11077","DOI":"10.1007\/s00500-021-05849-4","volume":"25","author":"H Liu","year":"2021","unstructured":"Liu H, Wang X, Kadir A (2021) Constructing chaos-based hash function via parallel impulse perturbation. Soft Comput 25(16):11077\u201311086","journal-title":"Soft Comput"},{"issue":"12","key":"17034_CR24","doi-asserted-by":"crossref","first-page":"15997","DOI":"10.1007\/s11042-018-6996-z","volume":"78","author":"H Liu","year":"2019","unstructured":"Liu H, Wen F, Kadir A (2019) Construction of a new 2d chebyshev-sine map and its application to color image encryption. Multimed Tools Appl 78(12):15997\u201316010","journal-title":"Multimed Tools Appl"},{"key":"17034_CR25","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1016\/j.optlastec.2013.05.023","volume":"57","author":"S Liu","year":"2014","unstructured":"Liu S, Guo C, Sheridan JT (2014) A review of optical image encryption techniques. Opt Laser Technol 57:327\u2013342","journal-title":"Opt Laser Technol"},{"issue":"2","key":"17034_CR26","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1175\/1520-0469(1963)020<0130:DNF>2.0.CO;2","volume":"20","author":"EN Lorenz","year":"1963","unstructured":"Lorenz EN (1963) Deterministic nonperiodic flow. J Atmos Sci 20(2):130\u2013141","journal-title":"J Atmos Sci"},{"key":"17034_CR27","doi-asserted-by":"crossref","first-page":"25664","DOI":"10.1109\/ACCESS.2020.2970806","volume":"8","author":"Q Lu","year":"2020","unstructured":"Lu Q, Zhu C, Deng X (2020) An efficient image encryption scheme based on the lss chaotic map and single s-box. IEEE Access 8:25664\u201325678","journal-title":"IEEE Access"},{"issue":"2","key":"17034_CR28","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1109\/70.134273","volume":"8","author":"V Markandey","year":"1992","unstructured":"Markandey V, deFigueiredo R (1992) Robot sensing techniques based on high-dimensional moment invariants and tensors. IEEE Trans Robot Autom 8(2):186\u2013195","journal-title":"IEEE Trans Robot Autom"},{"issue":"9","key":"17034_CR29","doi-asserted-by":"crossref","first-page":"1357","DOI":"10.1109\/83.941859","volume":"10","author":"R Mukundan","year":"2001","unstructured":"Mukundan R, Ong S, Lee PA (2001) Image analysis by tchebichef moments. IEEE Trans Image Process 10(9):1357\u20131364","journal-title":"IEEE Trans Image Process"},{"issue":"2","key":"17034_CR30","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1179\/136821909X12520525092765","volume":"58","author":"J Munoz-Rodriguez","year":"2010","unstructured":"Munoz-Rodriguez J (2010) Computational cryptography based on trigonometric algorithms and intensity superposition. Imaging Sci J 58(2):61\u201380","journal-title":"Imaging Sci J"},{"key":"17034_CR31","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.neucom.2017.12.048","volume":"283","author":"P Ping","year":"2018","unstructured":"Ping P, Xu F, Mao Y, Wang Z (2018) Designing permutation-substitution image encryption networks with henon map. Neurocomputing 283:53\u201363","journal-title":"Neurocomputing"},{"issue":"3","key":"17034_CR32","doi-asserted-by":"crossref","first-page":"589","DOI":"10.1007\/s11517-021-02328-8","volume":"59","author":"D Ravichandran","year":"2021","unstructured":"Ravichandran D, Murthy B, Balasubramanian V, Fathima S, Amirtharajan R et al (2021) An efficient medical image encryption using hybrid dna computing and chaos in transform domain. Med Biol Eng Comput 59(3):589\u2013605","journal-title":"Med Biol Eng Comput"},{"key":"17034_CR33","doi-asserted-by":"crossref","unstructured":"Sankpal PR, Vijaya P (2014) Image encryption using chaotic maps: a survey. In: 2014 fifth international conference on signal and image processing, pp 102\u2013107. IEEE","DOI":"10.1109\/ICSIP.2014.80"},{"issue":"1","key":"17034_CR34","doi-asserted-by":"crossref","first-page":"547","DOI":"10.1007\/s11042-014-2307-5","volume":"75","author":"M Sayyouri","year":"2016","unstructured":"Sayyouri M, Hmimid A, Qjidaa H (2016) Image analysis using separable discrete moments of charlier-hahn. Multimed Tools Appl 75(1):547\u2013571","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"17034_CR35","doi-asserted-by":"crossref","first-page":"2139","DOI":"10.1007\/s11554-020-01008-4","volume":"17","author":"AA Shah","year":"2020","unstructured":"Shah AA, Parah SA, Rashid M, Elhoseny M (2020) Efficient image encryption scheme based on generalized logistic map for real time image processing. J Real-Time Image Proc 17(6):2139\u20132151","journal-title":"J Real-Time Image Proc"},{"issue":"10","key":"17034_CR36","doi-asserted-by":"crossref","first-page":"2150146","DOI":"10.1142\/S0218127421501467","volume":"31","author":"Y Si","year":"2021","unstructured":"Si Y, Liu H, Chen Y (2021) Constructing keyed strong s-box using an enhanced quadratic map. Int J Bifur Chaos 31(10):2150146","journal-title":"Int J Bifur Chaos"},{"issue":"07","key":"17034_CR37","doi-asserted-by":"crossref","first-page":"2250095","DOI":"10.1142\/S021812742250095X","volume":"32","author":"Y Si","year":"2022","unstructured":"Si Y, Liu H, Chen Y (2022) Constructing a 3d exponential hyperchaotic map with application to prng. Int J Bifur Chaos 32(07):2250095","journal-title":"Int J Bifur Chaos"},{"issue":"8","key":"17034_CR38","doi-asserted-by":"crossref","first-page":"920","DOI":"10.1364\/JOSA.70.000920","volume":"70","author":"MR Teague","year":"1980","unstructured":"Teague MR (1980) Image analysis via the general theory of moments. Josa 70(8):920\u2013930","journal-title":"Josa"},{"key":"17034_CR39","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/j.ins.2022.05.032","volume":"605","author":"L Teng","year":"2022","unstructured":"Teng L, Wang X, Xian Y (2022) Image encryption algorithm based on a 2d-clss hyperchaotic map using simultaneous permutation and diffusion. Inf Sci 605:71\u201385","journal-title":"Inf Sci"},{"issue":"11","key":"17034_CR40","doi-asserted-by":"crossref","first-page":"3985","DOI":"10.1007\/s11042-013-1808-y","volume":"74","author":"E Tsougenis","year":"2015","unstructured":"Tsougenis E, Papakostas GA, Koulouriotis DE (2015) Image watermarking via separable moments. Multimed Tools Appl 74(11):3985\u20134012","journal-title":"Multimed Tools Appl"},{"key":"17034_CR41","doi-asserted-by":"crossref","unstructured":"Von\u00a0Solms R (1998) Information security management (3): the code of practice for information security management (bs 7799). Inf Manag omput Secur","DOI":"10.1108\/09685229810240158"},{"key":"17034_CR42","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/j.cose.2013.04.004","volume":"38","author":"R Von Solms","year":"2013","unstructured":"Von Solms R, Van Niekerk J (2013) From information security to cyber security. Comp Secur 38:97\u2013102","journal-title":"Comp Secur"},{"key":"17034_CR43","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1016\/j.ins.2019.02.049","volume":"486","author":"X Wang","year":"2019","unstructured":"Wang X, Feng L, Zhao H (2019) Fast image encryption algorithm based on parallel computing system. Inf Sci 486:340\u2013358","journal-title":"Inf Sci"},{"issue":"15","key":"17034_CR44","doi-asserted-by":"crossref","first-page":"2645","DOI":"10.1016\/j.physleta.2007.12.026","volume":"372","author":"KW Wong","year":"2008","unstructured":"Wong KW, Kwok BSH, Law WS (2008) A fast image encryption scheme based on chaotic standard map. Phys Lett A 372(15):2645\u20132652","journal-title":"Phys Lett A"},{"issue":"8","key":"17034_CR45","volume":"29","author":"GC Wu","year":"2019","unstructured":"Wu GC, Deng ZG, Baleanu D, Zeng DQ (2019) New variable-order fractional chaotic systems for fast image encryption. Chaos Interdiscip J Nonlinear Sci 29(8):083103","journal-title":"Chaos Interdiscip J Nonlinear Sci"},{"key":"17034_CR46","doi-asserted-by":"crossref","first-page":"545","DOI":"10.1016\/j.ins.2019.12.044","volume":"516","author":"B Xiao","year":"2020","unstructured":"Xiao B, Luo J, Bi X, Li W, Chen B (2020) Fractional discrete tchebyshev moments and their applications in image encryption and watermarking. Inf Sci 516:545\u2013559","journal-title":"Inf Sci"},{"issue":"4","key":"17034_CR47","doi-asserted-by":"crossref","first-page":"2535","DOI":"10.1016\/j.jfranklin.2021.01.011","volume":"358","author":"M Yamni","year":"2021","unstructured":"Yamni M, Karmouni H, Sayyouri M, Qjidaa H (2021) Image watermarking using separable fractional moments of charlier-meixner. J Frankl Inst 358(4):2535\u20132560","journal-title":"J Frankl Inst"},{"issue":"11","key":"17034_CR48","doi-asserted-by":"crossref","first-page":"1367","DOI":"10.1109\/TIP.2003.818019","volume":"12","author":"PT Yap","year":"2003","unstructured":"Yap PT, Paramesran R, Ong SH (2003) Image analysis by krawtchouk moments. IEEE Trans Image Process 12(11):1367\u20131377","journal-title":"IEEE Trans Image Process"},{"issue":"1","key":"17034_CR49","doi-asserted-by":"crossref","first-page":"745","DOI":"10.1007\/s11071-018-4391-y","volume":"94","author":"G Ye","year":"2018","unstructured":"Ye G, Pan C, Huang X, Mei Q (2018) An efficient pixel-level chaotic image encryption algorithm. Nonlinear Dyn 94(1):745\u2013756","journal-title":"Nonlinear Dyn"},{"issue":"12","key":"17034_CR50","doi-asserted-by":"crossref","first-page":"2775","DOI":"10.1016\/j.optcom.2011.02.039","volume":"284","author":"G Zhang","year":"2011","unstructured":"Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284(12):2775\u20132780","journal-title":"Opt Commun"},{"key":"17034_CR51","volume":"164","author":"H Zhao","year":"2022","unstructured":"Zhao H, Wang S, Wang X (2022) Fast image encryption algorithm based on multi-parameter fractal matrix and mpmcml system. Chaos, Solitons Fractals 164:112742","journal-title":"Chaos, Solitons Fractals"},{"issue":"06","key":"17034_CR52","doi-asserted-by":"crossref","first-page":"2250081","DOI":"10.1142\/S021812742250081X","volume":"32","author":"M Zhao","year":"2022","unstructured":"Zhao M, Liu H (2022) Construction of a nondegenerate 2d chaotic map with application to irreversible parallel key expansion algorithm. Int J Bifur Chaos 32(06):2250081","journal-title":"Int J Bifur Chaos"},{"issue":"17","key":"17034_CR53","doi-asserted-by":"crossref","first-page":"24757","DOI":"10.1007\/s11042-022-12479-x","volume":"81","author":"H Zhong","year":"2022","unstructured":"Zhong H, Li G (2022) Multi-image encryption algorithm based on wavelet transform and 3d shuffling scrambling. Multimed Tools Appl 81(17):24757\u201324776","journal-title":"Multimed Tools Appl"},{"key":"17034_CR54","doi-asserted-by":"crossref","unstructured":"Zhou J, Shu H, Zhu H, Toumoulin C, Luo L (2005) Image analysis by discrete orthogonal hahn moments. In: International conference image analysis and recognition, pp 524\u2013531. Springer","DOI":"10.1007\/11559573_65"},{"issue":"1","key":"17034_CR55","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.optcom.2011.08.079","volume":"285","author":"C Zhu","year":"2012","unstructured":"Zhu C (2012) A novel image encryption scheme based on improved hyperchaotic sequences. Opt Commun 285(1):29\u201337","journal-title":"Opt Commun"},{"issue":"4","key":"17034_CR56","doi-asserted-by":"crossref","first-page":"1540","DOI":"10.1016\/j.patcog.2011.10.002","volume":"45","author":"H Zhu","year":"2012","unstructured":"Zhu H (2012) Image representation using separable two-dimensional continuous and discrete orthogonal moments. Pattern Recogn 45(4):1540\u20131558","journal-title":"Pattern Recogn"},{"key":"17034_CR57","doi-asserted-by":"crossref","unstructured":"Zhu S, Wang G, Zhu C (2019) A secure and fast image encryption scheme based on double chaotic s-boxes. Entropy 21(8):790","DOI":"10.3390\/e21080790"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17034-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-17034-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17034-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,3]],"date-time":"2024-04-03T06:39:18Z","timestamp":1712126358000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-17034-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,6]]},"references-count":57,"journal-issue":{"issue":"13","published-online":{"date-parts":[[2024,4]]}},"alternative-id":["17034"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-17034-w","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-992868\/v1","asserted-by":"object"}]},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,6]]},"assertion":[{"value":"4 June 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 May 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 October 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}