{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T07:31:30Z","timestamp":1774164690966,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"16","license":[{"start":{"date-parts":[[2023,10,31]],"date-time":"2023-10-31T00:00:00Z","timestamp":1698710400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,10,31]],"date-time":"2023-10-31T00:00:00Z","timestamp":1698710400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Not Applicable"},{"name":"No Conflict","award":["No Conflict"],"award-info":[{"award-number":["No Conflict"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-17386-3","type":"journal-article","created":{"date-parts":[[2023,10,31]],"date-time":"2023-10-31T07:02:31Z","timestamp":1698735751000},"page":"47889-47917","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A novel watermarking technique for video on android mobile devices based on JPG quantization value and discrete cosine transform approach"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4757-8542","authenticated-orcid":false,"given":"Ankitha A.","family":"Nayak","sequence":"first","affiliation":[]},{"given":"P. S.","family":"Venugopala","sequence":"additional","affiliation":[]},{"given":"H.","family":"Sarojadevi","sequence":"additional","affiliation":[]},{"given":"B.","family":"Ashwini","sequence":"additional","affiliation":[]},{"given":"Niranjan N.","family":"Chiplunkar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,31]]},"reference":[{"key":"17386_CR1","unstructured":"Nayak AA, Venugopala PS, Sarojadevi H, Chiplunkar NN (2014) A survey and comparative study on video watermarking techniques with reference to mobile devices. Int Journal of Engineering Research and Applications 4(12)(Part 6)"},{"key":"17386_CR2","doi-asserted-by":"publisher","unstructured":"Feng G, Huang X (2012) An improved dct based zero-watermarking algorithm for text image. In: Anti-counterfeiting, Security, and Identification, pp 1\u20134. https:\/\/doi.org\/10.1109\/ICASID.2012.6325285","DOI":"10.1109\/ICASID.2012.6325285"},{"key":"17386_CR3","doi-asserted-by":"publisher","unstructured":"Jadhav A, Kolhekar M (2014) Digital watermarking in video for copyright protection. In: 2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies, pp 140\u2013144. https:\/\/doi.org\/10.1109\/ICESC.2014.29","DOI":"10.1109\/ICESC.2014.29"},{"key":"17386_CR4","doi-asserted-by":"publisher","unstructured":"Li J, Gabbouj M, Takala J, Chen H (2008) Simplified video coding for digital mobile devices. In: 2008 9th International Conference on Signal Processing, pp 1247\u20131250. https:\/\/doi.org\/10.1109\/ICOSP.2008.4697357","DOI":"10.1109\/ICOSP.2008.4697357"},{"key":"17386_CR5","doi-asserted-by":"publisher","unstructured":"Mohammed GN, Yasin A, Zeki AM (2012) Digital image watermarking, analysis of current methods. In: 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT), pp 324\u2013329. https:\/\/doi.org\/10.1109\/ACSAT.2012.90","DOI":"10.1109\/ACSAT.2012.90"},{"key":"17386_CR6","unstructured":"Pinto VM, Padmashree G, Venugopala PS, Sarojadevi H, Niranjan NC (2014) Design of A DCT based watermarking approach using RGB color channels for an android device. Proceedings of Second International Conference on ERCICA-14"},{"key":"17386_CR7","doi-asserted-by":"publisher","unstructured":"B\u00b4anoci V, Bug\u00b4ar G, Broda M, Levicky\u00b4 D (2014) Robust spread spectrum water- marking system in video. In: Proceedings ELMAR-2014, pp 1\u20134. https:\/\/doi.org\/10.1109\/ELMAR.2014.6923343","DOI":"10.1109\/ELMAR.2014.6923343"},{"key":"17386_CR8","doi-asserted-by":"publisher","unstructured":"Kunhu A, Nisi K, Sabnam S, Majida A, Saeed AM (2016) Index mapping based hybrid dwt-dct watermarking technique for copyright protection of videos files. In: 2016 Online International Conference on Green Engineering and Technologies (IC-GET), pp 1\u20136. https:\/\/doi.org\/10.1109\/GET.2016.7916855","DOI":"10.1109\/GET.2016.7916855"},{"key":"17386_CR9","doi-asserted-by":"publisher","unstructured":"Panyavaraporn J, Horkaew P (2018) Dwt\/dct-based invisible digital watermarking scheme for video stream. In: 2018 10th International Conference on Knowledge and Smart Technology (KST), pp 154\u2013157. https:\/\/doi.org\/10.1109\/KST.2018.8426150","DOI":"10.1109\/KST.2018.8426150"},{"key":"17386_CR10","doi-asserted-by":"publisher","unstructured":"Kejariwal A, Gupta S, Nicolaut A, Dutt N, Gupta R (2005) Energy analysis of multimedia watermarking on mobile handheld devices. In: 3rd Workshop on Embedded Systems for Real-Time Multimedia, 2005, pp 33\u201338. https:\/\/doi.org\/10.1109\/ESTMED.2005.1518065","DOI":"10.1109\/ESTMED.2005.1518065"},{"key":"17386_CR11","doi-asserted-by":"publisher","unstructured":"Adul V, Mwangi E (2017) A robust video watermarking approach based on a hybrid svd\/dwt technique. In: 2017 IEEE AFRICON, pp 309\u2013313. https:\/\/doi.org\/10.1109\/AFRCON.2017.8095500","DOI":"10.1109\/AFRCON.2017.8095500"},{"key":"17386_CR12","doi-asserted-by":"publisher","unstructured":"Ponnisathya S, Ramakrishnan S, Dhinakaran S, Ashwanth PS, Dhamod-haran P (2017) Chaotic map based video watermarking using dwt and svd. In: 2017 International Conference on Inventive Communication and Computational Tech- nologies (ICICCT), pp 45\u201349. https:\/\/doi.org\/10.1109\/ICICCT.2017.7975156","DOI":"10.1109\/ICICCT.2017.7975156"},{"key":"17386_CR13","doi-asserted-by":"publisher","unstructured":"Hao S, Li D, Halfond WGJ, Govindan R (2012) Estimating android applications\u2019 cpu energy usage via bytecode profiling. In: 2012 First International Workshop on Green and Sustainable Software (GREENS), pp 1\u20137. https:\/\/doi.org\/10.1109\/GREENS.2012.6224263","DOI":"10.1109\/GREENS.2012.6224263"},{"key":"17386_CR14","doi-asserted-by":"publisher","unstructured":"Arab F, Zamani M, Poger S, Manigault C, Yu S (2019) A framework to evaluate the performance of video watermarking techniques. In: 2019 IEEE 2nd Inter- national Conference on Information and Computer Technologies (ICICT), pp 114\u2013117. https:\/\/doi.org\/10.1109\/INFOCT.2019.8711154","DOI":"10.1109\/INFOCT.2019.8711154"},{"key":"17386_CR15","doi-asserted-by":"publisher","unstructured":"Yamada T, Kamitani M, Nakamura H, Ohta T (2015) Improved implementation of method for video-watermark detection using smart device. In: 2015 IIAI 4th International Congress on Advanced Applied Informatics, pp 225\u2013228. https:\/\/doi.org\/10.1109\/IIAI-AAI.2015.164","DOI":"10.1109\/IIAI-AAI.2015.164"},{"key":"17386_CR16","doi-asserted-by":"publisher","unstructured":"Cao Z, Wang L (2018) A novel video watermarking technique based on image decomposition and chen\u2019s system. In: 2018 Ninth International Conference on Intelligent Control and Information Processing (ICICIP), pp 103\u2013106. https:\/\/doi.org\/10.1109\/ICICIP.2018.8606680","DOI":"10.1109\/ICICIP.2018.8606680"},{"key":"17386_CR17","doi-asserted-by":"publisher","unstructured":"Agarwal P, Kumar A, Choudhary A (2015) A secure and reliable video watermarking technique. In: 2015 International Conference on Computer and Computational Sciences (ICCCS), pp 151\u2013156. https:\/\/doi.org\/10.1109\/ICCACS.2015.7361341","DOI":"10.1109\/ICCACS.2015.7361341"},{"key":"17386_CR18","doi-asserted-by":"publisher","unstructured":"Venugopala PS, Sarojadevi H, Chiplunkar NN, Bhat V (2014) Video watermarking by adjusting the pixel values and using scene change detection. In: 2014 Fifth International Conference on Signal and Image Processing, pp 259\u2013264. https:\/\/doi.org\/10.1109\/ICSIP.2014.47","DOI":"10.1109\/ICSIP.2014.47"},{"key":"17386_CR19","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.suscom.2017.06.003","volume":"15","author":"PS Venugopala","year":"2017","unstructured":"Venugopala PS, Sarojadevi H, Chiplunkar NN (2017) An approach to embed image in video as watermark using a mobile device. Sustain Comput: Inform Syst 15:82\u201387. https:\/\/doi.org\/10.1016\/j.suscom.2017.06.003","journal-title":"Sustain Comput: Inform Syst"},{"key":"17386_CR20","doi-asserted-by":"crossref","unstructured":"Venugopala PS, Kamath S, Sarojadevi H, Chiplunkar NN (2016) An approach for bitstream video watermarking on mobile device. 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), 578\u2013583","DOI":"10.1109\/SCOPES.2016.7955505"},{"key":"17386_CR21","unstructured":"Venugopala PS, Nayak AA, Sarojadevi H, Chiplunkar NN (2016) Video watermarking for android mobile devices. In: 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), pp 3554\u20133560"},{"key":"17386_CR22","doi-asserted-by":"publisher","unstructured":"Kadu S, Naveen C, Satpute VR, Keskar AG (2016) A blind video watermarking technique for indoor video content protection using discrete wavelet transform. In: 2016 IEEE Students\u2019 Conference on Electrical, Electronics and Computer Science (SCEECS), pp 1\u20136. https:\/\/doi.org\/10.1109\/SCEECS.2016.7509264","DOI":"10.1109\/SCEECS.2016.7509264"},{"key":"17386_CR23","doi-asserted-by":"publisher","unstructured":"Munir R, Harlili (2019) A secure fragile video watermarking algorithm for content authentication based on arnold cat map. In: 2019 4th International Conference on Information Technology (InCIT), pp 32\u201337. https:\/\/doi.org\/10.1109\/INCIT.2019.8912074","DOI":"10.1109\/INCIT.2019.8912074"},{"key":"17386_CR24","doi-asserted-by":"publisher","unstructured":"Jesus Vega-Hernandez P, Cedillo-Hernandez M, Nakano M, Cedillo-Hernandez A, Perez-Meana HM (2019) Ownership identification of digital video via unseen-visible watermarking. In: 2019 7th International Workshop on Biomet- rics and Forensics (IWBF), pp 1\u20136. https:\/\/doi.org\/10.1109\/IWBF.2019.8739199","DOI":"10.1109\/IWBF.2019.8739199"},{"key":"17386_CR25","doi-asserted-by":"publisher","unstructured":"Li J, Wang H, Yang L, Liu D (2022) Dst-based video watermarking robust to lossy channel compression. In: 2022 IEEE 24th International Workshop on Mul- timedia Signal Processing (MMSP), pp 1\u20136. https:\/\/doi.org\/10.1109\/MMSP55362.2022.9948875","DOI":"10.1109\/MMSP55362.2022.9948875"},{"key":"17386_CR26","doi-asserted-by":"publisher","unstructured":"Zhang Y, Sun G (2019) A watermark algorithm based on space-domain and transform-domain. In: 2019 IEEE 9th International Conference on Electronics Information and Emergency Communication (ICEIEC), pp 41\u201344. https:\/\/doi.org\/10.1109\/ICEIEC.2019.8784574","DOI":"10.1109\/ICEIEC.2019.8784574"},{"key":"17386_CR27","doi-asserted-by":"publisher","unstructured":"Basu A, Roy SS, Chattopadhyay A (2016) Implementation of a spatial domain salient region based digital image watermarking scheme. In: 2016 Second Interna-tional Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), pp 269\u2013270.\u00a0https:\/\/doi.org\/10.1109\/ICRCICN.2016.7813669","DOI":"10.1109\/ICRCICN.2016.7813669"},{"key":"17386_CR28","doi-asserted-by":"publisher","first-page":"115708","DOI":"10.1109\/ACCESS.2019.2936134","volume":"7","author":"X Yu","year":"2019","unstructured":"Yu X, Wang C, Zhou X (2019) A hybrid transforms-based robust video zero- watermarking algorithm for resisting high efficiency video coding compression. IEEE Access 7:115708\u2013115724. https:\/\/doi.org\/10.1109\/ACCESS.2019.2936134","journal-title":"IEEE Access"},{"key":"17386_CR29","doi-asserted-by":"publisher","first-page":"953","DOI":"10.1007\/s00530-021-00765-x","volume":"27","author":"G Dhevanandhini","year":"2021","unstructured":"Dhevanandhini G, Yamuna G (2021) An effective and secure video watermarking using hybrid technique. Multimedia Syst 27:953\u2013967. https:\/\/doi.org\/10.1007\/s00530-021-00765-x","journal-title":"Multimedia Syst"},{"key":"17386_CR30","doi-asserted-by":"publisher","first-page":"18089","DOI":"10.1007\/s11042-019-08301-w","volume":"79","author":"S Gaj","year":"2020","unstructured":"Gaj S, Sur A, Bora PK (2020) Prediction mode based H.265\/HEVC video watermarking resisting re-compression attack. Multimed Tools Appl 79:18089\u201318119. https:\/\/doi.org\/10.1007\/s11042-019-08301-w","journal-title":"Multimed Tools Appl"},{"key":"17386_CR31","doi-asserted-by":"publisher","first-page":"165911","DOI":"10.1016\/j.ijleo.2020.165911","volume":"227","author":"Y Sun","year":"2021","unstructured":"Sun Y, Wang J, Huang H, Chen Q (2021) Research on scalable video watermarking algorithm based on h.264 compressed domain. Optik 227:165911. https:\/\/doi.org\/10.1016\/j.ijleo.2020.165911","journal-title":"Optik"},{"key":"17386_CR32","doi-asserted-by":"publisher","unstructured":"Li C, Yang Y, Liu K, Tian L (2020) A semi-fragile video watermarking algorithm based on H.264\/AVC\". Wirel Commun Mob Comput. https:\/\/doi.org\/10.1155\/2020\/8848553","DOI":"10.1155\/2020\/8848553"},{"key":"17386_CR33","first-page":"585","volume":"11","author":"R Ahuja","year":"2019","unstructured":"Ahuja R, Singh Bedi S (2019) Video watermarking scheme based on IDR frames using MPEG-2 structure. Int J Inf Comput Secur 11:585\u2013603","journal-title":"Int J Inf Comput Secur"},{"key":"17386_CR34","doi-asserted-by":"publisher","unstructured":"Ahuja R, Sharma M, Haque MJ (2020) A compressed domain based robust and imperceptible digital video watermarking scheme. In: 2020 Sixth International Conference on Parallel, Distributed and Grid Computing (PDGC), pp 313\u2013317. https:\/\/doi.org\/10.1109\/PDGC50313.2020.9315778","DOI":"10.1109\/PDGC50313.2020.9315778"},{"key":"17386_CR35","doi-asserted-by":"publisher","unstructured":"Sharma C, Amandeep B, Sobti R, Lohani TK, Shabaz M, Kaur M (2021) A secured frame selection based video watermarking technique to address quality loss of data: Combining graph based transform, singular valued decomposition, and hyperchaotic encryption. Sec Commun Netw 2021 https:\/\/doi.org\/10.1155\/2021\/5536170","DOI":"10.1155\/2021\/5536170"},{"key":"17386_CR36","doi-asserted-by":"publisher","unstructured":"Fu Y (2009) Robust image watermarking scheme based on 3d-dct. In: 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery. 5: 437\u2013441. https:\/\/doi.org\/10.1109\/FSKD.2009.19","DOI":"10.1109\/FSKD.2009.19"},{"key":"17386_CR37","doi-asserted-by":"publisher","unstructured":"Ke Z, Huang H, Liang Y, Ding Y, Cheng X, Wu Q (2022) Robust video water- marking based on deep neural network and curriculum learning. In: 2022 IEEE International Conference on e-Business Engineering (ICEBE), pp 80\u201385. https:\/\/doi.org\/10.1109\/ICEBE55470.2022.00023","DOI":"10.1109\/ICEBE55470.2022.00023"},{"issue":"11","key":"17386_CR38","doi-asserted-by":"publisher","first-page":"131","DOI":"10.23919\/JCC.2020.11.012","volume":"17","author":"K Hao","year":"2020","unstructured":"Hao K, Feng G, Zhang X (2020) Robust image watermarking based on generative adversarial network. China Commun 17(11):131\u2013140. https:\/\/doi.org\/10.23919\/JCC.2020.11.012","journal-title":"China Commun"},{"key":"17386_CR39","doi-asserted-by":"publisher","first-page":"100658","DOI":"10.1109\/ACCESS.2019.2930173","volume":"7","author":"Z Zhou","year":"2019","unstructured":"Zhou Z, Chen J, Yang C-N, Sun X (2019) Video copy detection using spatio- temporal cnn features. IEEE Access 7:100658\u2013100665. https:\/\/doi.org\/10.1109\/ACCESS.2019.2930173","journal-title":"IEEE Access"},{"key":"17386_CR40","doi-asserted-by":"publisher","unstructured":"Ahmed HM (2019) Hiding color image within a video file using discrete wavelets transform and artificial neural networks. In: 2019 2nd International Conference on Electrical, Communication, Computer, Power and Control Engineering (ICECCPCE), pp 74\u201379. https:\/\/doi.org\/10.1109\/ICECCPCE46549.2019.203751","DOI":"10.1109\/ICECCPCE46549.2019.203751"},{"issue":"2","key":"17386_CR41","doi-asserted-by":"publisher","first-page":"154","DOI":"10.26599\/TST.2019.9010050","volume":"26","author":"J Sun","year":"2021","unstructured":"Sun J, Jiang X, Liu J, Zhang F, Li C (2021) An anti-recompression video watermarking algorithm in bitstream domain. Tsinghua Sci Technol 26(2):154\u2013162. https:\/\/doi.org\/10.26599\/TST.2019.9010050","journal-title":"Tsinghua Sci Technol"},{"key":"17386_CR42","doi-asserted-by":"publisher","unstructured":"Shrivastava G, Kumar P, Gupta D, Rodrigues JJPC (2020) Privacy issues of android application permissions: a literature review. Trans Emerg Telecommun Technol 31(12):3773. https:\/\/doi.org\/10.1002\/ett.3773","DOI":"10.1002\/ett.3773"},{"key":"17386_CR43","doi-asserted-by":"publisher","unstructured":"Abdulla NTB, Navas KA (2020) Robust video watermarking resilient to inadvertent attacks. In: 2020 International Conference on Power Electronics and Renew- able Energy Applications (PEREA), pp 1\u20135. https:\/\/doi.org\/10.1109\/PEREA51218.2020.9339797","DOI":"10.1109\/PEREA51218.2020.9339797"},{"key":"17386_CR44","doi-asserted-by":"publisher","unstructured":"Wang Y, Ying Q, Sun Y, Qian Z, Zhang X (2022) A dtcwt-svd based video watermarking resistant to frame rate conversion. In: 2022 International Conference on Culture-Oriented Science and Technology (CoST), pp 36\u201340. https:\/\/doi.org\/10.1109\/CoST57098.2022.00017","DOI":"10.1109\/CoST57098.2022.00017"},{"key":"17386_CR45","doi-asserted-by":"publisher","unstructured":"Gao Z, Niu Z, Niu B, Guan H, Huang Y, Zhang S (2021) A robust video watermarking approach based on qr code. In: 2021 International Conference on Culture-oriented Science Technology (ICCST), pp 349\u2013353. https:\/\/doi.org\/10.1109\/ICCST53801.2021.00079","DOI":"10.1109\/ICCST53801.2021.00079"},{"key":"17386_CR46","doi-asserted-by":"publisher","unstructured":"Mishra A, Agarwal C, Chetty G (2018) Lifting wavelet transform based fast watermarking of video summaries using extreme learning machine. In: 2018 International Joint Conference on Neural Networks (IJCNN), pp 1\u20137. https:\/\/doi.org\/10.1109\/IJCNN.2018.8489305","DOI":"10.1109\/IJCNN.2018.8489305"},{"key":"17386_CR47","doi-asserted-by":"publisher","unstructured":"Bai J, Wang X, Zhang Y, Yang C (2022) Shot-based content adaptive robust digital video watermarking algorithm against camera recording. In: 2022 IEEE 22nd International Conference on Communication Technology (ICCT), pp 1667\u20131671. https:\/\/doi.org\/10.1109\/ICCT56141.2022.10072571","DOI":"10.1109\/ICCT56141.2022.10072571"},{"key":"17386_CR48","doi-asserted-by":"publisher","unstructured":"Busiri MG, Munir R (2017) Mobile application of video watermarking using discrete cosine transform on android platform. In: 2017 5th International Conference on Instrumentation, Communications, Information Technology, and Biomed- ical Engineering (ICICI-BME), pp 207\u2013211. https:\/\/doi.org\/10.1109\/ICICI-BME.2017.8537779","DOI":"10.1109\/ICICI-BME.2017.8537779"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17386-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-17386-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17386-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,7]],"date-time":"2024-05-07T11:25:38Z","timestamp":1715081138000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-17386-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,31]]},"references-count":48,"journal-issue":{"issue":"16","published-online":{"date-parts":[[2024,5]]}},"alternative-id":["17386"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-17386-3","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,31]]},"assertion":[{"value":"9 January 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 August 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 October 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 October 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This study has no conflicts of interest and is not funded by any Organization\/Institution. All authors have participated in conception and design, analysis and interpretation of the data, drafting the article or revising it critically for important intellectual content, and approval of the final version.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interests"}}]}}