{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:21:50Z","timestamp":1759335710657,"version":"3.37.3"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2023,10,11]],"date-time":"2023-10-11T00:00:00Z","timestamp":1696982400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,10,11]],"date-time":"2023-10-11T00:00:00Z","timestamp":1696982400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-17046-6","type":"journal-article","created":{"date-parts":[[2023,10,11]],"date-time":"2023-10-11T08:03:24Z","timestamp":1697011404000},"page":"41213-41241","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["An S-Box construction from exponentiation in finite fields and its application in RGB color image encryption"],"prefix":"10.1007","volume":"83","author":[{"given":"Steven T.","family":"Dougherty","sequence":"first","affiliation":[]},{"given":"Joseph","family":"Klobusicky","sequence":"additional","affiliation":[]},{"given":"Serap","family":"\u015eahinkaya","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5229-4018","authenticated-orcid":false,"given":"Deniz","family":"Ustun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,11]]},"reference":[{"key":"17046_CR1","doi-asserted-by":"crossref","unstructured":"Aboytes-Gonzalez JA, Murguia JS, Mejia-Carlos Gonzalez-Aguilar MH, Ramirez-Torres MT (2018) Design of a strong $$S$$-box based on a matrix approach. Nonlinear Dyn 94:(3)2003-2012","DOI":"10.1007\/s11071-018-4471-z"},{"key":"17046_CR2","doi-asserted-by":"publisher","first-page":"572","DOI":"10.1016\/j.procs.2015.07.394","volume":"57","author":"M Ahmad","year":"2015","unstructured":"Ahmad M, Bhatia D, Hassan Y (2015) A novel ant colony optimization based scheme for substitution box design. Procedia Comput Sci 57:572\u2013580","journal-title":"Procedia Comput Sci"},{"key":"17046_CR3","doi-asserted-by":"publisher","first-page":"112757","DOI":"10.1109\/ACCESS.2022.3209202","volume":"10","author":"M Ahmad","year":"2022","unstructured":"Ahmad M, Alkanhel R, El-Shafai W, Algarni AD, El-Samie FEA, Soliman NF (2022) Multi-Objective Evolution of Strong S-Boxes Using Non-Dominated Sorting Genetic Algorithm-II and Chaos for Secure Telemedicine IEEE. Access 10:112757\u2013112775. https:\/\/doi.org\/10.1109\/ACCESS.2022.3209202","journal-title":"Access"},{"issue":"11","key":"17046_CR4","doi-asserted-by":"publisher","first-page":"7201","DOI":"10.1007\/s00521-018-3557-3","volume":"31","author":"HA Ahmed","year":"2019","unstructured":"Ahmed HA, Zolkipli MF, Ahmad M (2019) A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map. Neural Comput Appl 31(11):7201\u20137210","journal-title":"Neural Comput Appl"},{"issue":"5","key":"17046_CR5","doi-asserted-by":"publisher","first-page":"7333","DOI":"10.1007\/s11042-020-10048-8","volume":"80","author":"HS Alhadawi","year":"2021","unstructured":"Alhadawi HS, Majid MA, Lambic D, Ahmad M (2021) A novel method of $$S$$-box design based on discrete chaotic maps and cuckoo search algorithm. Multimed Tools Appl 80(5):7333\u20137350","journal-title":"Multimed Tools Appl"},{"key":"17046_CR6","volume":"55","author":"HS Alhadawi","year":"2020","unstructured":"Alhadawi HS, Lambic D, Zolkipli MF, Ahmad M (2020) Globalized firefly algorithm and chaos for designing substitution box. J Inf Secur Appl 55:102671","journal-title":"J Inf Secur Appl"},{"key":"17046_CR7","doi-asserted-by":"publisher","first-page":"20585","DOI":"10.1007\/s11042-022-12268-6","volume":"81","author":"TS Ali","year":"2022","unstructured":"Ali TS, Ali R (2022) A novel color image encryption scheme based on a new dynamic compound chaotic map and S-box. Multimed Tools Appl 81:20585\u201320609. https:\/\/doi.org\/10.1007\/s11042-022-12268-6","journal-title":"Multimed Tools Appl"},{"key":"17046_CR8","doi-asserted-by":"publisher","first-page":"833","DOI":"10.3390\/sym15040833","volume":"15","author":"H Alsaif","year":"2023","unstructured":"Alsaif H, Guesmi R, Kalghoum A, Alshammari BM, Guesmi TA (2023) Novel Strong S-Box Design Using Quantum Crossover and Chaotic Boolean Functions for Symmetric Cryptosystems Symmetry 15:833. https:\/\/doi.org\/10.3390\/sym15040833","journal-title":"Novel Strong S-Box Design Using Quantum Crossover and Chaotic Boolean Functions for Symmetric Cryptosystems Symmetry"},{"key":"17046_CR9","doi-asserted-by":"publisher","first-page":"20203","DOI":"10.1007\/s00521-022-07589-4","volume":"34","author":"F Artuger","year":"2022","unstructured":"Artuger F, Ozkaynak F (2022) SBOX-CGA: substitution box generator based on chaos and genetic algorithm. Neural Comput Applic 34:20203\u201320211. https:\/\/doi.org\/10.1007\/s00521-022-07589-4","journal-title":"Neural Comput Applic"},{"key":"17046_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2022.168956","volume":"259","author":"SM Basha","year":"2022","unstructured":"Basha SM, Mathivanan P, Ganesh AB (2022) Bit level color image encryption using Logistic-Sine-Tent-Chebyshev (LSTC) map. Optik 259:168956. https:\/\/doi.org\/10.1016\/j.ijleo.2022.168956","journal-title":"Optik"},{"key":"17046_CR11","doi-asserted-by":"publisher","unstructured":"Biham E, Shamir A (1991) Differential Cryptanalysis of DES-like Cryptosystems In Menezes, A.J., Vanstone, S.A. (eds) Advances in Cryptology-CRYPTO\u2019 90. CRYPTO 1990.Lecture Notes in Computer Science 537 Springer Berlin Heidelberg https:\/\/doi.org\/10.1007\/3-540-38424-31","DOI":"10.1007\/3-540-38424-31"},{"key":"17046_CR12","doi-asserted-by":"crossref","unstructured":"Chen G (2008) A novel heuristic method for obtaining $$S$$-boxes. Chaos Solitons Fractals 36(4):1028\u20131036","DOI":"10.1016\/j.chaos.2006.08.003"},{"key":"17046_CR13","unstructured":"Damg I (1998) On the randomness of Legendre and Jacobi sequences Advances in Cryptology Santa Barbara CA 163\u2013172 Lecture Notes in Comput Sci 403 Springer. Berlin"},{"key":"17046_CR14","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1112\/jlms\/s1-6.1.49","volume":"6","author":"H Davenport","year":"1931","unstructured":"Davenport H (1931) On the distribution of quadratic residues (mod p). J Lond Math Soc 6:49\u201354","journal-title":"J Lond Math Soc"},{"key":"17046_CR15","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1112\/jlms\/s1-8.1.46","volume":"6","author":"H Davenport","year":"1933","unstructured":"Davenport H (1933) On the distribution of quadratic residues (mod p) II. J Lond Math Soc 6:46\u201352","journal-title":"J Lond Math Soc"},{"key":"17046_CR16","doi-asserted-by":"crossref","unstructured":"Detombe J, Tavares S (1992) Constructing large cryptographically strong S-boxes: Advances in Cryptology Proc. of CRYPTO92 Lecture Notes in Computer Science 165-181","DOI":"10.1007\/3-540-57220-1_60"},{"key":"17046_CR17","doi-asserted-by":"publisher","first-page":"34901","DOI":"10.1007\/s11042-019-08086-y","volume":"78","author":"S Deb","year":"2019","unstructured":"Deb S, Biswas B, Bhuyan B (2019) Secure image encryption scheme using high efficiency word-oriented feedback shift register over finite field. Multimed Tools Appl 78:34901\u201334925. https:\/\/doi.org\/10.1007\/s11042-019-08086-y","journal-title":"Multimed Tools Appl"},{"key":"17046_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2022.169430","volume":"265","author":"M Demirtas","year":"2022","unstructured":"Demirtas M (2022) A new RGB color image encryption scheme based on cross-channel pixel and bit scrambling using chaos. Optik 265:169430. https:\/\/doi.org\/10.1016\/j.ijleo.2022.169430","journal-title":"Optik"},{"key":"17046_CR19","doi-asserted-by":"publisher","first-page":"2963","DOI":"10.1007\/s13198-022-01766-3","volume":"13","author":"M Din","year":"2022","unstructured":"Din M, Pal SK, Muttoo SK (2022) A new S-box design by applying Swarm Intelligence based technique. Int J Syst Assur Eng Manag 13:2963\u20132970. https:\/\/doi.org\/10.1007\/s13198-022-01766-3","journal-title":"Int J Syst Assur Eng Manag"},{"key":"17046_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-15240-0","author":"ST Dougherty","year":"2023","unstructured":"Dougherty ST, Sahinkaya S, Ustun D (2023) A novel method for image encryption using time signature-dependent s-boxes based on latin squares and the playfair system of cryptography. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-023-15240-0","journal-title":"Multimed Tools Appl"},{"key":"17046_CR21","doi-asserted-by":"crossref","unstructured":"El-Latif AAA, Abd-El-Atty B, Belazi A, Iliyasu AM (2021) Efficient chaos-based substitution-box and its application to image encryption. Electronics 10:(12)1392","DOI":"10.3390\/electronics10121392"},{"issue":"2","key":"17046_CR22","doi-asserted-by":"publisher","first-page":"1059","DOI":"10.1007\/s11071-016-3295-y","volume":"88","author":"T Farah","year":"2017","unstructured":"Farah T, Rhouma R, Belghith S (2017) A novel method for designing $$S$$-box based on chaotic map and teaching- learning based optimization. Nonlinear Dyn 88(2):1059\u20131074","journal-title":"Nonlinear Dyn"},{"key":"17046_CR23","doi-asserted-by":"publisher","unstructured":"Gerardo de la Fraga L, Ovilla-Mart\u00ednez B, (2023) A chaotic PRNG tested with the heuristic Differential Evolution. Integration 90:22\u201326. https:\/\/doi.org\/10.1016\/j.vlsi.2023.01.001","DOI":"10.1016\/j.vlsi.2023.01.001"},{"key":"17046_CR24","doi-asserted-by":"publisher","first-page":"116167","DOI":"10.1109\/ACCESS.2022.3218062","volume":"10","author":"AT Haque","year":"2022","unstructured":"Haque AT, Abdulhussein A, Ahmad M, Waheed Falah M, Abd El-Latif AA (2022) A Strong Hybrid S-Box Scheme Based on Chaos, 2D Cellular Automata and Algebraic Structure. IEEE Access 10:116167\u2013116181. https:\/\/doi.org\/10.1109\/ACCESS.2022.3218062","journal-title":"IEEE Access"},{"issue":"10","key":"17046_CR25","doi-asserted-by":"publisher","first-page":"5111","DOI":"10.1007\/s00521-020-05304-9","volume":"33","author":"N Hematpour","year":"2021","unstructured":"Hematpour N, Ahadpour S (2021) Execution examination of chaotic $$S$$-box dependent on improved PSO algorithm. Neural Comput Appl 33(10):5111\u20135133","journal-title":"Neural Comput Appl"},{"key":"17046_CR26","doi-asserted-by":"publisher","unstructured":"Huynh-Thu Q, Ghanbari M (2008) Scope of validity of PSNR in image\/video quality assessment. Electron Lett 44:(13)800\u2013801 https:\/\/doi.org\/10.1049\/el:20080522","DOI":"10.1049\/el:20080522"},{"issue":"1","key":"17046_CR27","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/s00521-012-0914-5","volume":"23","author":"I Hussain","year":"2013","unstructured":"Hussain I, Shah T, Gondal MA, Khan WA, Mahmood H (2013) A group theoretic approach to construct cryptographically strong substitution boxes. Neural Comput Appl 23(1):97\u2013104","journal-title":"Neural Comput Appl"},{"key":"17046_CR28","doi-asserted-by":"publisher","unstructured":"Lai Q, Hu G, Erkan U, Toktas A (2023) High-efficiency medical image encryption method based on 2D Logistic-Gaussian hyperchaotic map. Appl Math Comput 442, 2023, https:\/\/doi.org\/10.1016\/j.amc.2022.127738","DOI":"10.1016\/j.amc.2022.127738"},{"key":"17046_CR29","doi-asserted-by":"publisher","first-page":"119244","DOI":"10.1109\/ACCESS.2022.3218643","volume":"10","author":"A Mahboob","year":"2022","unstructured":"Mahboob A et al (2022) A Novel Construction of Substitution Box Based on Polynomial Mapped and Finite Field With Image Encryption Application. IEEE Access 10:119244\u2013119258. https:\/\/doi.org\/10.1109\/ACCESS.2022.3218643","journal-title":"IEEE Access"},{"key":"17046_CR30","doi-asserted-by":"publisher","unstructured":"Manivannan D, Murugan B (2023) Image encryption using chaos based heuristic diffusion. SN Comput Sci 4(239). https:\/\/doi.org\/10.1007\/s42979-022-01582-3","DOI":"10.1007\/s42979-022-01582-3"},{"key":"17046_CR31","doi-asserted-by":"publisher","unstructured":"Manjula G, Mohan H (2016) Constructing key dependent dynamic $$S$$-box for AES block cipher system 2016 2nd international conference on applied and theoretical computing and communication technology 613-617. https:\/\/doi.org\/10.1109\/ICATCCT.2016.7912073","DOI":"10.1109\/ICATCCT.2016.7912073"},{"key":"17046_CR32","doi-asserted-by":"publisher","unstructured":"Manzoor A, Zahid AH, Hassan MT. A New Dynamic Substitution Box for Data Security Using an Innovative Chaotic Map IEEE Access 10:74164\u201374174 https:\/\/doi.org\/10.1109\/ACCESS.2022.3184012","DOI":"10.1109\/ACCESS.2022.3184012"},{"key":"17046_CR33","doi-asserted-by":"crossref","unstructured":"Matsui M (1994) Linear cryptanalysis method of DES cipher: Advances in Cryptology\u201d, Proceeding of the Eurocrypt\u201993 Lecture Notes in Computer Science 765:386\u2013397","DOI":"10.1007\/3-540-48285-7_33"},{"key":"17046_CR34","doi-asserted-by":"crossref","unstructured":"Nyberg K (1994) Differentially uniform mappings for cryptography\", Proceedings of Eurocrypt\u201993 Lecture Notes in Computer Science 765:55\u201364","DOI":"10.1007\/3-540-48285-7_6"},{"key":"17046_CR35","unstructured":"Ozturk I, Sogukpinar I. Analysis and comparison of image encryption algorithms. Int J Inf Technol 1(2):108\u2013111"},{"key":"17046_CR36","doi-asserted-by":"publisher","unstructured":"Lang L, Jinggen L, Ying G, Botao L (2022) A new S-box construction method meeting strict avalanche criterion. J Inf Secur Appl 66. https:\/\/doi.org\/10.1016\/j.jisa.2022.103135","DOI":"10.1016\/j.jisa.2022.103135"},{"key":"17046_CR37","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.3390\/sym12091497","volume":"12","author":"Z Li","year":"2020","unstructured":"Li Z et al (2020) A novel chaos-based color image encryption scheme using bit-level permutation. Symmetry 12:1497. https:\/\/doi.org\/10.3390\/sym12091497","journal-title":"Symmetry"},{"key":"17046_CR38","doi-asserted-by":"crossref","unstructured":"Razaq A, Akhter S, Yousaf A, Shuaib U, Ahmad M (2022) A group theoretic construction of highly nonlinear substitution box and its applications in image encryption. Multimed Tools Appl 1\u201322","DOI":"10.1007\/s11042-021-11635-z"},{"key":"17046_CR39","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication theory of security systems The Bell Syst Tech J 28:656715","journal-title":"Communication theory of security systems The Bell Syst Tech J"},{"key":"17046_CR40","unstructured":"Sosa PM (2016) Calculating nonlinearity of Boolean functions with Walsh-Hadamard Transform UCSB, Santa Barbara 1-4"},{"issue":"2","key":"17046_CR41","doi-asserted-by":"publisher","first-page":"1859","DOI":"10.1007\/s11071-021-06663-1","volume":"105","author":"L Teng","year":"2021","unstructured":"Teng L et al (2021) Color image encryption based on cross 2D hyperchaotic map using combined cycle shift scrambling and selecting diffusion. Nonlinear Dyn 105(2):1859\u20131876. https:\/\/doi.org\/10.1007\/s11071-021-06663-1","journal-title":"Nonlinear Dyn"},{"key":"17046_CR42","doi-asserted-by":"publisher","first-page":"6969312","DOI":"10.1155\/2017\/6969312","volume":"2017","author":"Y Tian","year":"2017","unstructured":"Tian Y, Lu Z (2017) Chaotic $$S$$-box: intertwining logistic map and bacterial foraging optimization. Math Probl Eng 2017:6969312","journal-title":"Math Probl Eng"},{"key":"17046_CR43","doi-asserted-by":"publisher","first-page":"4295","DOI":"10.1007\/s00521-021-06552-z","volume":"34","author":"A Toktas","year":"2022","unstructured":"Toktas A, Erkan U (2022) 2D fully chaotic map for image encryption constructed through a quadruple-objective optimization via artificial bee colony algorithm. Neural Comput and Applic. 34:4295\u20134319. https:\/\/doi.org\/10.1007\/s00521-021-06552-z","journal-title":"Neural Comput and Applic."},{"issue":"1","key":"17046_CR44","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/s11071-017-3874-6","volume":"91","author":"A Ullah","year":"2018","unstructured":"Ullah A, Jamal SS, Shah T (2018) A novel scheme for image encryption using substitution box and chaotic system. Nonlinear Dyn 91(1):359\u2013370","journal-title":"Nonlinear Dyn"},{"key":"17046_CR45","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-14910-3","author":"A Waheed","year":"2023","unstructured":"Waheed A, Subhan F, Suud MM et al (2023) An analytical review of current S-box design methodologies performance evaluation criteria and major challenges. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-023-14910-3","journal-title":"Multimed Tools Appl"},{"issue":"6\u20137","key":"17046_CR46","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1016\/j.physleta.2012.01.009","volume":"376","author":"Y Wang","year":"2012","unstructured":"Wang Y, Wong KW, Li C, Li Y (2012) A novel method to design $$S$$-box based on chaotic map and genetic algorithm. Phys Lett A 376(6\u20137):827\u2013833","journal-title":"Phys Lett A"},{"issue":"1","key":"17046_CR47","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1109\/MSP.2008.930649","volume":"26","author":"Z Wang","year":"2009","unstructured":"Wang Z, Bovik AC (2009) Mean squared error: love it or leave it? A new look at signalfidelity measures. IEEE Signal Process Mag 26(1):98\u2013117. https:\/\/doi.org\/10.1109\/MSP.2008.930649","journal-title":"IEEE Signal Process Mag"},{"key":"17046_CR48","doi-asserted-by":"publisher","unstructured":"Webster AF, Tavares SE (1985) On the Design of $$S$$-boxes In: Williams H.C. (eds) Advances in Cryptology-CRYPTO-85 Proceedings CRYPTO 1985 Lecture notes in computer science 218 Springer Berlin Heidelberg https:\/\/doi.org\/10.1007\/3-540-39799-X-41","DOI":"10.1007\/3-540-39799-X-41"},{"key":"17046_CR49","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for Image encryption. Cyber J Multidiscip J Sci Technol J Sel Areas Telecommun 1:31\u201338","journal-title":"Cyber J Multidiscip J Sci Technol J Sel Areas Telecommun"},{"key":"17046_CR50","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/j.ins.2021.08.073","volume":"580","author":"Y-G Yang","year":"2021","unstructured":"Yang Y-G, Wang B-P, Pei S-K, Zhou Y-H, Shi W-M, Liao X (2021) Using M-ary decomposition and virtual bits for visually meaningful image encryption. Inf Sci 580:174\u2013201. https:\/\/doi.org\/10.1016\/j.ins.2021.08.073","journal-title":"Inf Sci"},{"key":"17046_CR51","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-13003-x","author":"X Zhang","year":"2022","unstructured":"Zhang X, Gong Z (2022) Color image encryption algorithm based on 3D Zigzag transformation and view planes. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-022-13003-x","journal-title":"Multimed Tools Appl"},{"key":"17046_CR52","doi-asserted-by":"publisher","first-page":"67797","DOI":"10.1109\/ACCESS.2021.3077194","volume":"9","author":"AH Zahid","year":"2021","unstructured":"Zahid AH, Iliyasu AM, Ahmad M, Shaban MMU, Arshad MJ, Alhadawi HS, Abd El-Latif AA (2021) A novel construction of dynamic S-box with high nonlinearity using heuristic evolution. IEEE Access 9:67797\u201367812","journal-title":"IEEE Access"},{"key":"17046_CR53","doi-asserted-by":"publisher","first-page":"16641","DOI":"10.1007\/s00521-021-06260-8","volume":"33","author":"KZ Zamli","year":"2021","unstructured":"Zamli KZ, Kader A, Din F, Alhadawi HS (2021) Selective chaotic maps Tiki-Taka algorithm for the $$S$$-box generation and optimization. Neural Comput Appl 33:16641\u201316658","journal-title":"Neural Comput Appl"},{"key":"17046_CR54","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115305","volume":"182","author":"KZ Zamli","year":"2021","unstructured":"Zamli KZ (2021) Optimizing $$S$$-box generation based on the adaptive agent heroes and cowards algorithm. Expert Syst Appl 182:115305","journal-title":"Expert Syst Appl"},{"key":"17046_CR55","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2020.106040","volume":"128","author":"YQ Zhang","year":"2020","unstructured":"Zhang YQ et al (2020) A new color image encryption scheme based on 2DNLCML system and genetic operations. Opt Lasers Eng 128:106040. https:\/\/doi.org\/10.1016\/j.optlaseng.2020.106040","journal-title":"Opt Lasers Eng"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17046-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-17046-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17046-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,4]],"date-time":"2024-04-04T13:28:42Z","timestamp":1712237322000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-17046-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,11]]},"references-count":55,"journal-issue":{"issue":"14","published-online":{"date-parts":[[2024,4]]}},"alternative-id":["17046"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-17046-6","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2023,10,11]]},"assertion":[{"value":"4 January 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 August 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 October 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}