{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T10:32:09Z","timestamp":1771065129672,"version":"3.50.1"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,3,16]],"date-time":"2024-03-16T00:00:00Z","timestamp":1710547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,3,16]],"date-time":"2024-03-16T00:00:00Z","timestamp":1710547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"NR","award":["2021R1I1A3049788, 2019H1D3A1A01101687, 2021H1D3A2A01099390"],"award-info":[{"award-number":["2021R1I1A3049788, 2019H1D3A1A01101687, 2021H1D3A2A01099390"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-18154-7","type":"journal-article","created":{"date-parts":[[2024,3,16]],"date-time":"2024-03-16T05:02:16Z","timestamp":1710565336000},"page":"147-163","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A cohesive forgery detection for splicing and copy-paste in digital images"],"prefix":"10.1007","volume":"84","author":[{"given":"Saurabh","family":"Agarwal","sequence":"first","affiliation":[]},{"given":"Savita","family":"Walia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0662-8355","authenticated-orcid":false,"given":"Ki-Hyun","family":"Jung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,16]]},"reference":[{"issue":"1","key":"18154_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-007-0154-3","volume":"39","author":"A Haouzia","year":"2008","unstructured":"Haouzia A, Noumeir R (2008) Methods for image authentication\u202f: a survey. Multimed Tools Appl 39(1):1\u201346. https:\/\/doi.org\/10.1007\/s11042-007-0154-3","journal-title":"Multimed Tools Appl"},{"key":"18154_CR2","doi-asserted-by":"crossref","unstructured":"Kaur M, Gupta S (2015) Evaluation of image forensic cues for fusion. In: 2015 Third International Conference on Image Information Processing Evaluation, pp 301\u2013305","DOI":"10.1109\/ICIIP.2015.7414785"},{"issue":"5","key":"18154_CR3","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1080\/00450618.2018.1424241","volume":"51","author":"S Walia","year":"2019","unstructured":"Walia S, Kumar K (2019) Digital image forgery detection: a systematic scrutiny. Australian J Forensic Sci 51(5):488\u2013526. https:\/\/doi.org\/10.1080\/00450618.2018.1424241","journal-title":"Australian J Forensic Sci"},{"key":"18154_CR4","first-page":"1103","volume":"5226","author":"Z Zhang","year":"2008","unstructured":"Zhang Z, Zhou Y (2008) Study of image splicing detection. Adv Intell Comput Theor Appl Aspects Theor Methodol Issues 5226:1103\u20131110","journal-title":"Adv Intell Comput Theor Appl Aspects Theor Methodol Issues"},{"key":"18154_CR5","unstructured":"Fridrich J, Soukal D, Lukas J (2003) Detection of copy-move forgery in digital images. In: Digital Forensic Research Workshop, pp 55\u201361"},{"key":"18154_CR6","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/j.jnca.2016.09.008","volume":"75","author":"N Bakiah","year":"2016","unstructured":"Bakiah N et al (2016) Copy-move forgery detection: Survey, challenges and future directions. J Netw Comput Appl 75:259\u2013278","journal-title":"J Netw Comput Appl"},{"issue":"6","key":"18154_CR7","doi-asserted-by":"publisher","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"V Christlein","year":"2012","unstructured":"Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensics Secur 7(6):1841\u20131854","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"18154_CR8","doi-asserted-by":"publisher","unstructured":"Li G, Wu Q, Tu D, Sun S (2007) A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. In: IEEE International Conference on Multimedia and Expo, pp 1750\u20131753. https:\/\/doi.org\/10.1109\/ICME.2007.4285009","DOI":"10.1109\/ICME.2007.4285009"},{"key":"18154_CR9","unstructured":"Ng TT, Chang SF (2004) A model for image splicing. In: International Conference on Image Processing (ICIP), pp 1169\u20131172"},{"key":"18154_CR10","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.jvcir.2016.03.005","volume":"38","author":"C Pun","year":"2016","unstructured":"Pun C, Liu B, Yuan X (2016) Multi-scale noise estimation for image splicing forgery detection. J Vis Commun Image Represent 38:195\u2013206","journal-title":"J Vis Commun Image Represent"},{"issue":"4","key":"18154_CR11","doi-asserted-by":"publisher","first-page":"37","DOI":"10.14257\/ijmue.2016.11.4.05","volume":"11","author":"M Kaur","year":"2016","unstructured":"Kaur M, Walia S (2016) Forgery detection using noise estimation and HOG feature extraction. Int J Multimed Ubiquitous Eng 11(4):37\u201348. https:\/\/doi.org\/10.14257\/ijmue.2016.11.4.05","journal-title":"Int J Multimed Ubiquitous Eng"},{"key":"18154_CR12","doi-asserted-by":"publisher","unstructured":"Lin Z, Wang R, Tang X, Shum H-Y (2005) Detecting doctored images using camera response normality and consistency. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR\u201905), pp 1087\u20131092. https:\/\/doi.org\/10.1109\/CVPR.2005.125","DOI":"10.1109\/CVPR.2005.125"},{"issue":"1","key":"18154_CR13","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/s11760-016-0899-0","volume":"11","author":"A Alahmadi","year":"2017","unstructured":"Alahmadi A, Hussain M, Aboalsamh H, Muhammad G, Bebis G, Mathkour H (2017) Passive detection of image forgery using DCT and local binary pattern. Signal Image Video Process 11(1):81\u201388. https:\/\/doi.org\/10.1007\/s11760-016-0899-0","journal-title":"Signal Image Video Process"},{"key":"18154_CR14","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.measurement.2019.02.086","volume":"139","author":"X Lin","year":"2019","unstructured":"Lin X, Wang S-L, Huang W-J, Liew AW-C, Huang X-S, Wu J (2019) Toward adaptive BDCT feature representation based image splicing measurement in smart cities. Measurement 139:61\u201369. https:\/\/doi.org\/10.1016\/j.measurement.2019.02.086","journal-title":"Measurement"},{"key":"18154_CR15","doi-asserted-by":"publisher","unstructured":"Hussain M, Saleh SQ, Aboalsamh H, Muhammad G, Bebis G (2014) Comparison between WLD and LBP descriptors for non-intrusive image forgery detection. In: International Symposium on Innovations in Intelligent Systems and Applications (INISTA), pp 197\u2013204. https:\/\/doi.org\/10.1109\/INISTA.2014.6873618","DOI":"10.1109\/INISTA.2014.6873618"},{"issue":"4","key":"18154_CR16","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1142\/s0218213015400163","volume":"24","author":"M Hussain","year":"2015","unstructured":"Hussain M, Qasem S, Bebis G, Muhammad G, Aboalsamh H, Mathkour H (2015) Evaluation of image Forgery Detection using Multi-scale Weber local descriptors. Int J Artif Intell Tools 24(4):416\u2013424. https:\/\/doi.org\/10.1142\/s0218213015400163","journal-title":"Int J Artif Intell Tools"},{"key":"18154_CR17","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1007\/s10044-014-0396-4","volume":"18","author":"EM El-alfy","year":"2015","unstructured":"El-alfy EM, Qureshi MA (2015) Combining spatial and DCT based Markov features for enhanced blind detection of image splicing. Pattern Anal Appl 18:713\u2013723. https:\/\/doi.org\/10.1007\/s10044-014-0396-4","journal-title":"Pattern Anal Appl"},{"issue":"2","key":"18154_CR18","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1109\/TCSVT.2014.2347513","volume":"25","author":"X Zhao","year":"2015","unstructured":"Zhao X, Wang S, Li S, Li J (2015) Passive image splicing detection by a 2-D Noncausal Markov Model. IEEE Trans Circuits Syst Video Technol 25(2):185\u2013199","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"4","key":"18154_CR19","doi-asserted-by":"publisher","first-page":"3177","DOI":"10.3233\/JIFS-169261","volume":"32","author":"DS Vidyadharan","year":"2017","unstructured":"Vidyadharan DS, Thampi SM (2017) Digital image forgery detection using compact multi-texture representation. J Intell Fuzzy Syst 32(4):3177\u20133188. https:\/\/doi.org\/10.3233\/JIFS-169261","journal-title":"J Intell Fuzzy Syst"},{"key":"18154_CR20","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1007\/s10586-017-1668-8","volume":"22","author":"A Rajab","year":"2019","unstructured":"Rajab A, Mohd A, Mohd S, bin Sulong G (2019) Splicing image forgery identification based on artificial neural network approach and texture features. Cluster Comput 22:647\u2013660. https:\/\/doi.org\/10.1007\/s10586-017-1668-8","journal-title":"Cluster Comput"},{"key":"18154_CR21","doi-asserted-by":"publisher","first-page":"78","DOI":"10.5815\/ijigsp.2015.10.08","volume":"10","author":"S Agarwal","year":"2015","unstructured":"Agarwal S, Chand S (2015) Image forgery detection using multi scale entropy filter and local phase quantization. Int J Image Graphics Signal Process 10:78\u201385. https:\/\/doi.org\/10.5815\/ijigsp.2015.10.08","journal-title":"Int J Image Graphics Signal Process"},{"key":"18154_CR22","doi-asserted-by":"publisher","unstructured":"Kaur M, Gupta S (2016) A passive blind approach for image splicing detection based on DWT and LBP Histograms. In: International Symposium on Security in Computing and Communication, pp 318\u2013327. https:\/\/doi.org\/10.1007\/978-981-10-2738-3","DOI":"10.1007\/978-981-10-2738-3"},{"issue":"2","key":"18154_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1117\/1.JEI.25.2.023031","volume":"25","author":"JG Han","year":"2016","unstructured":"Han JG, Park TH, Moon YH, Eom IK (2016) Efficient Markov feature extraction method for image splicing detection using maximization and threshold expansion. J Electron Imaging 25(2):1\u20138. https:\/\/doi.org\/10.1117\/1.JEI.25.2.023031","journal-title":"J Electron Imaging"},{"key":"18154_CR24","doi-asserted-by":"publisher","first-page":"4292","DOI":"10.1016\/j.patcog.2012.05.014","volume":"45","author":"Z He","year":"2012","unstructured":"He Z, Lu W, Sun W, Huang J (2012) Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recognit 45:4292\u20134299","journal-title":"Pattern Recognit"},{"key":"18154_CR25","doi-asserted-by":"publisher","first-page":"99742","DOI":"10.1109\/ACCESS.2021.3096240","volume":"9","author":"S Walia","year":"2021","unstructured":"Walia S, Kumar K, Kumar M, Gao XZ (2021) Fusion of handcrafted and deep features for forgery detection in digital images. IEEE Access 9:99742\u201399755. https:\/\/doi.org\/10.1109\/ACCESS.2021.3096240","journal-title":"IEEE Access"},{"issue":"16","key":"18154_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/electronics11162621","volume":"11","author":"D Zhao","year":"2022","unstructured":"Zhao D, Tian X (2022) A multiscale fusion lightweight image-splicing tamper-detection model. Electronics (Switzerland) 11(16):1\u201314. https:\/\/doi.org\/10.3390\/electronics11162621","journal-title":"Electronics (Switzerland)"},{"key":"18154_CR27","doi-asserted-by":"publisher","unstructured":"Cozzolino D, Poggi G, Verdoliva L (2014) Copy-move forgery detection based on Patchmatch.\u00a0In: 2014 IEEE International Conference on Image Processing (ICIP). IEEE,\u00a0Paris, France, pp 5312\u20135316.\u00a0https:\/\/doi.org\/10.1109\/ICIP.2014.7026075","DOI":"10.1109\/ICIP.2014.7026075"},{"issue":"9","key":"18154_CR28","doi-asserted-by":"publisher","first-page":"4467","DOI":"10.3837\/tiis.2018.09.019","volume":"12","author":"J Deng","year":"2018","unstructured":"Deng J, Yang J, Weng S, Gu G, Li Z (2018) Copy-move forgery detection robust to various transformation and degradation attacks. KSII Trans Internet Inf Syst 12(9):4467\u20134486. https:\/\/doi.org\/10.3837\/tiis.2018.09.019","journal-title":"KSII Trans Internet Inf Syst"},{"key":"18154_CR29","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/j.forsciint.2017.07.037","volume":"279","author":"T Mahmood","year":"2017","unstructured":"Mahmood T, Irtaza A, Mehmood Z, Mahmood TM (2017) Copy\u2013move forgery detection through stationary wavelets and local binary pattern variance for forensic analysis in digital images. Forensic Sci Int 279:8\u201321. https:\/\/doi.org\/10.1016\/j.forsciint.2017.07.037","journal-title":"Forensic Sci Int"},{"key":"18154_CR30","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.neucom.2016.11.091","volume":"265","author":"SM Fadl","year":"2017","unstructured":"Fadl SM, Semary NA (2017) Robust Copy\u2013Move forgery revealing in digital images using polar coordinate system. Neurocomputing 265:57\u201365. https:\/\/doi.org\/10.1016\/j.neucom.2016.11.091","journal-title":"Neurocomputing"},{"key":"18154_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2022.103644","volume":"89","author":"S Kumar","year":"2022","unstructured":"Kumar S, Gupta SK, Kaur M, Gupta U (2022) VI-NET: a hybrid deep convolutional neural network using VGG and inception V3 model for copy-move forgery classification. J Vis Commun Image Represent 89:103644. https:\/\/doi.org\/10.1016\/j.jvcir.2022.103644","journal-title":"J Vis Commun Image Represent"},{"issue":"2","key":"18154_CR32","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"DG Lowe","year":"2004","unstructured":"Lowe DG (2004) Distinctive image features from Scale-Invariant keypoints. Int J Comput Vision 60(2):91\u2013110. https:\/\/doi.org\/10.1023\/B:VISI.0000029664.99615.94","journal-title":"Int J Comput Vision"},{"key":"18154_CR33","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.cviu.2007.09.014","volume":"110","author":"H Bay","year":"2008","unstructured":"Bay H, Ess A, Tuytelaars T, van Gool L (2008) Speeded-Up Robust Features (SURF). Comput Vis Image Underst 110:346\u2013359. https:\/\/doi.org\/10.1016\/j.cviu.2007.09.014","journal-title":"Comput Vis Image Underst"},{"key":"18154_CR34","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-642-33783-3_16","volume":"7577","author":"PF Alcantarilla","year":"2012","unstructured":"Alcantarilla PF, Bartoli A, Davison AJ (2012) \u201cKAZE Features\u201d, in Computer Vision \u2013 ECCV 2012. Lect Notes Comput Sci 7577:214\u2013227","journal-title":"Lect Notes Comput Sci"},{"issue":"4","key":"18154_CR35","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1109\/LGRS.2011.2177437","volume":"9","author":"S Wang","year":"2012","unstructured":"Wang S, You H, Fu K (2012) A novel method to find feature matches for SAR image registration. IEEE Geosci Remote Sens Lett 9(4):649\u2013653. https:\/\/doi.org\/10.1109\/LGRS.2011.2177437","journal-title":"IEEE Geosci Remote Sens Lett"},{"key":"18154_CR36","doi-asserted-by":"crossref","unstructured":"Dong J, Wang W, Tan T (2013) CASIA image tampering detection evaluation database (CAISA TIDE). In: IEEE China Summit and International Conference on Signal and Information Processing. IEEE, pp 422\u2013426.\u00a0http:\/\/forensics.idealtest.org.\u00a0Accessed 3 Nov 2022","DOI":"10.1109\/ChinaSIP.2013.6625374"},{"issue":"4","key":"18154_CR37","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1049\/bme2.12025","volume":"10","author":"A Novoz\u00e1msk\u00fd","year":"2021","unstructured":"Novoz\u00e1msk\u00fd A, Mahdian B, Saic S (2021) Extended IMD2020: a large-scale annotated dataset tailored for detecting manipulated images. IET Biom 10(4):392\u2013407. https:\/\/doi.org\/10.1049\/bme2.12025","journal-title":"IET Biom"},{"key":"18154_CR38","doi-asserted-by":"crossref","unstructured":"Kanwal N, Girdhar A, Kaur L, Bhullar JS (2019) Detection of dgital image forgery using fast fourier transform and local features. In: International Conference on Automation, Computational and Technology Management (ICACTM), pp 262\u2013267","DOI":"10.1109\/ICACTM.2019.8776709"},{"issue":"4","key":"18154_CR39","doi-asserted-by":"publisher","first-page":"90","DOI":"10.4018\/IJDCF.2018100107","volume":"10","author":"R Wang","year":"2018","unstructured":"Wang R et al (2018) Digital image splicing detection based on Markov features in QDCT and QWT domain. Int J Digit Crime Forensics 10(4):90\u2013107. https:\/\/doi.org\/10.4018\/IJDCF.2018100107","journal-title":"Int J Digit Crime Forensics"},{"issue":"7","key":"18154_CR40","doi-asserted-by":"publisher","first-page":"2981","DOI":"10.3837\/tiis.2020.07.014","volume":"14","author":"J Wang","year":"2020","unstructured":"Wang J, Liu R, Wang H, Wu B, Shi YQ (2020) Quaternion Markov splicing detection for color images based on quaternion discrete cosine transform. KSII Trans Internet Inf Syst 14(7):2981\u20132996. https:\/\/doi.org\/10.3837\/tiis.2020.07.014","journal-title":"KSII Trans Internet Inf Syst"},{"issue":"February","key":"18154_CR41","doi-asserted-by":"publisher","first-page":"103658","DOI":"10.1016\/j.jvcir.2022.103658","volume":"89","author":"X Wang","year":"2022","unstructured":"Wang X, Chen W, Niu P, Yang H (2022) Image copy-move forgery detection based on dynamic threshold with dense points. J Vis Commun Image Represent 89(February):103658. https:\/\/doi.org\/10.1016\/j.jvcir.2022.103658","journal-title":"J Vis Commun Image Represent"},{"issue":"4","key":"18154_CR42","doi-asserted-by":"publisher","first-page":"985","DOI":"10.1007\/s00138-013-0547-4","volume":"25","author":"G Muhammad","year":"2014","unstructured":"Muhammad G, Al-Hammadi MH, Hussain M, Bebis G (2014) Image forgery detection using steerable pyramid transform and local binary pattern. Mach Vis Appl 25(4):985\u2013995. https:\/\/doi.org\/10.1007\/s00138-013-0547-4","journal-title":"Mach Vis Appl"},{"key":"18154_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2022.116785","volume":"107","author":"Y Chen","year":"2022","unstructured":"Chen Y, Retraint F, Qiao T (2022) Image splicing forgery detection using simplified generalized noise model. Signal Process Image Commun 107:116785. https:\/\/doi.org\/10.1016\/j.image.2022.116785","journal-title":"Signal Process Image Commun"},{"key":"18154_CR44","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.neucom.2016.04.068","volume":"228","author":"C Li","year":"2017","unstructured":"Li C, Ma Q, Xiao L, Li M, Zhang A (2017) Image splicing detection based on Markov features in QDCT domain. Neurocomputing 228:29\u201336. https:\/\/doi.org\/10.1016\/j.neucom.2016.04.068","journal-title":"Neurocomputing"},{"issue":"2","key":"18154_CR45","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1108\/IJWIS-04-2022-0088","volume":"18","author":"KT Huynh","year":"2022","unstructured":"Huynh KT, Ly TN, Le-Tien T (2022) An efficient model for copy-move image forgery detection. Int J Web Inform Syst 18(2):181\u2013195. https:\/\/doi.org\/10.1108\/IJWIS-04-2022-0088","journal-title":"Int J Web Inform Syst"}],"updated-by":[{"DOI":"10.1007\/s11042-024-19825-1","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2024,7,12]],"date-time":"2024-07-12T00:00:00Z","timestamp":1720742400000}}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-18154-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-18154-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-18154-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,27]],"date-time":"2025-01-27T09:20:59Z","timestamp":1737969659000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-18154-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,16]]},"references-count":45,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,1]]}},"alternative-id":["18154"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-18154-7","relation":{"correction":[{"id-type":"doi","id":"10.1007\/s11042-024-19825-1","asserted-by":"object"}]},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,16]]},"assertion":[{"value":"23 November 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 October 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 March 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 July 2024","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11042-024-19825-1","URL":"https:\/\/doi.org\/10.1007\/s11042-024-19825-1","order":8,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This manuscript is the author\u2019s original work and has not been published or submitted simultaneously elsewhere. There is no copyright issue in all of the figures.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}