{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:43:58Z","timestamp":1772905438097,"version":"3.50.1"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2024,5,24]],"date-time":"2024-05-24T00:00:00Z","timestamp":1716508800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,24]],"date-time":"2024-05-24T00:00:00Z","timestamp":1716508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61976132"],"award-info":[{"award-number":["61976132"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61991411"],"award-info":[{"award-number":["61991411"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1811461"],"award-info":[{"award-number":["U1811461"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007219","name":"Natural Science Foundation of Shanghai","doi-asserted-by":"publisher","award":["19ZR1419200"],"award-info":[{"award-number":["19ZR1419200"]}],"id":[{"id":"10.13039\/100007219","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-19308-3","type":"journal-article","created":{"date-parts":[[2024,5,24]],"date-time":"2024-05-24T20:20:53Z","timestamp":1716582053000},"page":"11653-11677","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Multi-channel attribute preservation for face de-identification"],"prefix":"10.1007","volume":"84","author":[{"given":"Yiting","family":"Cao","sequence":"first","affiliation":[]},{"given":"Yaofang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jiahua","family":"Wu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7085-8876","authenticated-orcid":false,"given":"Yuchun","family":"Fang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,24]]},"reference":[{"issue":"05","key":"19308_CR1","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney L (2002) k-anonymity: a model for protecting privacy. Internat J Uncertain, Fuzziness Knowl-Based Syst 10(05):557\u2013570","journal-title":"Internat J Uncertain, Fuzziness Knowl-Based Syst"},{"key":"19308_CR2","doi-asserted-by":"crossref","unstructured":"Gross R, Airoldi E, Malin B, Sweeney L (2005) Integrating utility into face de-identification. In: International workshop on privacy enhancing technologies. Springer, pp 227\u2013242","DOI":"10.1007\/11767831_15"},{"key":"19308_CR3","doi-asserted-by":"crossref","unstructured":"Gross R, Sweeney L, De\u00a0la Torre F, Baker S (2006) Model-based face de-identification. In: 2006 Conference on computer vision and pattern recognition workshop (CVPRW\u201906) . IEEE, pp 161\u2013161","DOI":"10.1109\/CVPRW.2006.125"},{"key":"19308_CR4","doi-asserted-by":"crossref","unstructured":"Gross R, Sweeney L, De\u00a0La\u00a0Torre F, Baker S (2008) Semi-supervised learning of multi-factor models for face de-identification. In: 2008 IEEE conference on computer vision and pattern recognition. IEEE, pp 1\u20138","DOI":"10.1109\/CVPR.2008.4587369"},{"key":"19308_CR5","unstructured":"Liu Y, Chen X, Liu C, Song D (2016) Delving into transferable adversarial examples and black-box attacks. arXiv:1611.02770"},{"key":"19308_CR6","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli S-M, Fawzi A, Fawzi O, Frossard P (2017) Universal adversarial perturbations. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1765\u20131773","DOI":"10.1109\/CVPR.2017.17"},{"key":"19308_CR7","unstructured":"Athalye A, Engstrom L, Ilyas A, Kwok K (2018) Synthesizing robust adversarial examples. In: International conference on machine learning. PMLR, pp 284\u2013293"},{"key":"19308_CR8","doi-asserted-by":"crossref","unstructured":"Khojaste MH, Farid NM, Nickabadi A (2022) Gmfim: a generative mask-guided facial image manipulation model for privacy preservation. arXiv:2201.03353","DOI":"10.1016\/j.cag.2023.03.007"},{"issue":"11","key":"19308_CR9","doi-asserted-by":"publisher","first-page":"8417","DOI":"10.1016\/j.aej.2022.02.007","volume":"61","author":"J Yang","year":"2022","unstructured":"Yang J, Zhang W, Liu J, Wu J, Yang J (2022) Generating de-identification facial images based on the attention models and adversarial examples. Alex Eng J 61(11):8417\u20138429","journal-title":"Alex Eng J"},{"key":"19308_CR10","doi-asserted-by":"crossref","unstructured":"Kuang Z, Liu H, Yu J, Tian A, Wang L, Fan J, Babaguchi N (2021) Effective de-identification generative adversarial network for face anonymization. In: Proceedings of the 29th ACM international conference on multimedia, pp 3182\u20133191","DOI":"10.1145\/3474085.3475464"},{"key":"19308_CR11","doi-asserted-by":"crossref","unstructured":"Hukkel\u00e5s H, Mester R, Lindseth F (2019) Deepprivacy: a generative adversarial network for face anonymization. In: International symposium on visual computing. Springer, pp 565\u2013578","DOI":"10.1007\/978-3-030-33720-9_44"},{"key":"19308_CR12","unstructured":"Mirza M, Osindero S (2014) Conditional generative adversarial nets. arXiv:1411.1784"},{"key":"19308_CR13","doi-asserted-by":"crossref","unstructured":"Maximov M, Elezi I, Leal-Taix\u00e9 L (2020) Ciagan: conditional identity anonymization generative adversarial networks. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 5447\u20135456","DOI":"10.1109\/CVPR42600.2020.00549"},{"key":"19308_CR14","doi-asserted-by":"crossref","unstructured":"Heo Y-J, Yeo W-H, Kim B-G (2022) Deepfake detection algorithm based on improved vision transformer. Appl Intell, pp 1\u201316","DOI":"10.1007\/s10489-022-03867-9"},{"key":"19308_CR15","doi-asserted-by":"crossref","unstructured":"Masood M, Nawaz M, Malik KM, Javed A, Irtaza A, Malik H (2022) Deepfakes generation and detection: state-of-the-art, open challenges, countermeasures, and way forward. Appl Intell, pp 1\u201353","DOI":"10.1007\/s10489-022-03766-z"},{"key":"19308_CR16","doi-asserted-by":"crossref","unstructured":"Zhao Y, Jin X, Gao S, Wu L, Yao S, Jiang Q (2023) Tan-gfd: generalizing face forgery detection based on texture information and adaptive noise mining. Appl Intell, pp 1\u201321","DOI":"10.1007\/s10489-023-04462-2"},{"key":"19308_CR17","doi-asserted-by":"crossref","unstructured":"Jing B, Ding H, Yang Z, Li B, Liu Q (2022) Image generation step by step: animation generation-image translation. Appl Intell, pp 1\u201314","DOI":"10.1007\/s10489-021-02835-z"},{"issue":"11","key":"19308_CR18","doi-asserted-by":"publisher","first-page":"12\u00a0704","DOI":"10.1007\/s10489-021-03064-0","volume":"52","author":"NK Yadav","year":"2022","unstructured":"Yadav NK, Singh SK, Dubey SR (2022) Csa-gan: cyclic synthesized attention guided generative adversarial network for face synthesis. Appl Intell 52(11):12\u00a0704-12\u00a0723","journal-title":"Appl Intell"},{"issue":"13","key":"19308_CR19","doi-asserted-by":"publisher","first-page":"15\u00a0295","DOI":"10.1007\/s10489-022-03302-z","volume":"52","author":"Y Zhang","year":"2022","unstructured":"Zhang Y, Yu L, Sun B, He J (2022) Eng-face: cross-domain heterogeneous face synthesis with enhanced asymmetric cyclegan. Appl Intell 52(13):15\u00a0295-15\u00a0307","journal-title":"Appl Intell"},{"key":"19308_CR20","unstructured":"Ma T, Li D, Wang W, Dong J (2021) Cfa-net: controllable face anonymization network with identity representation manipulation. arXiv:2105.11137"},{"key":"19308_CR21","doi-asserted-by":"crossref","unstructured":"Halder A, Chattopadhyay P, Kumar S (2022) Gait transformation network for gait de-identification with pose preservation. Signal, Image and Video Processing, pp 1\u20139","DOI":"10.1007\/s11760-022-02386-x"},{"key":"19308_CR22","doi-asserted-by":"publisher","first-page":"951","DOI":"10.1007\/s11760-020-01819-9","volume":"15","author":"A Agarwal","year":"2021","unstructured":"Agarwal A, Chattopadhyay P, Wang L (2021) Privacy preservation through facial de-identification with simultaneous emotion preservation. Signal, Image and Video Processing 15:951\u2013958","journal-title":"Signal, Image and Video Processing"},{"issue":"2","key":"19308_CR23","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1109\/TKDE.2005.32","volume":"17","author":"EM Newton","year":"2005","unstructured":"Newton EM, Sweeney L, Malin B (2005) Preserving privacy by de-identifying face images. IEEE Trans Knowl Data Eng 17(2):232\u2013243","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"19308_CR24","doi-asserted-by":"crossref","unstructured":"Pan Y-L, Haung M-J, Ding K-T, Wu J-L, Jang J-S (2019) K-same-siamese-gan: K-same algorithm with generative adversarial network for facial image de-identification with hyperparameter tuning and mixed precision training. In: 2019 16th IEEE international conference on advanced video and signal based surveillance (AVSS). IEEE, pp 1\u20138","DOI":"10.1109\/AVSS.2019.8909866"},{"issue":"5","key":"19308_CR25","doi-asserted-by":"publisher","first-page":"910","DOI":"10.1109\/JSTSP.2020.3002101","volume":"14","author":"L Verdoliva","year":"2020","unstructured":"Verdoliva L (2020) Media forensics and deepfakes: an overview. IEEE J Sel Top Signal Process 14(5):910\u2013932","journal-title":"IEEE J Sel Top Signal Process"},{"issue":"5","key":"19308_CR26","doi-asserted-by":"publisher","first-page":"e7554","DOI":"10.1002\/cpe.7554","volume":"35","author":"H Xue","year":"2023","unstructured":"Xue H, Liu B, Yuan X, Ding M, Zhu T (2023) Face image de-identification by feature space adversarial perturbation. Concurr Comput Pract Exp 35(5):e7554","journal-title":"Concurr Comput Pract Exp"},{"key":"19308_CR27","doi-asserted-by":"crossref","unstructured":"Li Y, Li Y, Dai X, Guo S, Xiao B (2023) Physical-world optical adversarial attacks on 3d face recognition. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 24\u00a0699\u201324\u00a0708","DOI":"10.1109\/CVPR52729.2023.02366"},{"key":"19308_CR28","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1016\/j.neucom.2021.06.061","volume":"457","author":"Z Kuang","year":"2021","unstructured":"Kuang Z, Guo Z, Fang J, Yu J, Babaguchi N, Fan J (2021) Unnoticeable synthetic face replacement for image privacy protection. Neurocomputing 457:322\u2013333","journal-title":"Neurocomputing"},{"key":"19308_CR29","doi-asserted-by":"crossref","unstructured":"Cao J, Liu B, Wen Y, Xie R, Song L (2021) Personalized and invertible face de-identification by disentangled identity information manipulation. In: Proceedings of the IEEE\/CVF international conference on computer vision, pp 3334\u20133342","DOI":"10.1109\/ICCV48922.2021.00332"},{"key":"19308_CR30","doi-asserted-by":"crossref","unstructured":"Zhai L, Guo Q, Xie X, Ma L, Wang YE, Liu Y (2022) A3gan: attribute-aware anonymization networks for face de-identification. In: Proceedings of the 30th ACM international conference on multimedia, pp 5303\u20135313","DOI":"10.1145\/3503161.3547757"},{"key":"19308_CR31","doi-asserted-by":"crossref","unstructured":"Hu S, Liu X, Zhang Y, Li M, Zhang LY, Jin H, Wu L (2022) Protecting facial privacy: generating adversarial identity masks via style-robust makeup transfer. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 15\u00a0014\u201315\u00a0023","DOI":"10.1109\/CVPR52688.2022.01459"},{"key":"19308_CR32","doi-asserted-by":"crossref","unstructured":"Ning X, Xu S, Nan F, Zeng Q, Wang C, Cai W, Li W, Jiang Y (2022) Face editing based on facial recognition features. IEEE Trans Cogn Dev Syst","DOI":"10.1109\/TCDS.2022.3182650"},{"key":"19308_CR33","unstructured":"Li D, Wang W, Zhao K, Dong J, Tan T (2023) Riddle: reversible and diversified de-identification with latent encryptor. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 8093\u20138102"},{"key":"19308_CR34","unstructured":"Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. Adv Neural Inf Process Syst 27"},{"issue":"5","key":"19308_CR35","doi-asserted-by":"publisher","first-page":"1038","DOI":"10.1109\/JSTSP.2020.3007250","volume":"14","author":"JC Neves","year":"2020","unstructured":"Neves JC, Tolosana R, Vera-Rodriguez R, Lopes V, Proen\u00e7a H, Fierrez J (2020) Ganprintr: improved fakes and evaluation of the state of the art in face manipulation detection. IEEE J Sel Top Signal Process 14(5):1038\u20131048","journal-title":"IEEE J Sel Top Signal Process"},{"key":"19308_CR36","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1016\/j.neucom.2019.04.074","volume":"358","author":"L Ye","year":"2019","unstructured":"Ye L, Zhang B, Yang M, Lian W (2019) Triple-translation gan with multi-layer sparse representation for face image synthesis. Neurocomputing 358:294\u2013308","journal-title":"Neurocomputing"},{"key":"19308_CR37","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1016\/j.neucom.2021.07.029","volume":"460","author":"W Xia","year":"2021","unstructured":"Xia W, Yang Y, Xue J-H (2021) Cali-sketch: stroke calibration and completion for high-quality face image generation from human-like sketches. Neurocomputing 460:256\u2013265","journal-title":"Neurocomputing"},{"key":"19308_CR38","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.neucom.2021.05.063","volume":"456","author":"Y Hu","year":"2021","unstructured":"Hu Y, Lu M, Xie C, Lu X (2021) Fin-gan: face illumination normalization via retinex-based self-supervised learning and conditional generative adversarial network. Neurocomputing 456:109\u2013125","journal-title":"Neurocomputing"},{"key":"19308_CR39","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.neucom.2022.09.025","volume":"511","author":"D Zeng","year":"2022","unstructured":"Zeng D, Zhao S, Zhang J, Liu H, Li K (2022) Expression-tailored talking face generation with adaptive cross-modal weighting. Neurocomputing 511:117\u2013130","journal-title":"Neurocomputing"},{"key":"19308_CR40","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1016\/j.neucom.2022.11.033","volume":"518","author":"Q Duan","year":"2023","unstructured":"Duan Q, Zhang L, Zhang Y, Gao X (2023) Psgan: revisit the binary discriminator and an alternative for face frontalization. Neurocomputing 518:360\u2013372","journal-title":"Neurocomputing"},{"key":"19308_CR41","doi-asserted-by":"crossref","unstructured":"Mao X, Li Q, Xie H, Lau RY, Wang Z, Paul\u00a0Smolley S (2017) Least squares generative adversarial networks. In: Proceedings of the IEEE international conference on computer vision, pp 2794\u20132802","DOI":"10.1109\/ICCV.2017.304"},{"key":"19308_CR42","doi-asserted-by":"crossref","unstructured":"Kazemi V, Sullivan J (2014) One millisecond face alignment with an ensemble of regression trees. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1867\u20131874","DOI":"10.1109\/CVPR.2014.241"},{"key":"19308_CR43","doi-asserted-by":"crossref","unstructured":"Fang Y, Cao Y, Zhang W, Yuan Q (2019) Enhance feature representation of dual networks for attribute prediction. In: International conference on neural information processing. Springer, pp 13\u201320","DOI":"10.1007\/978-3-030-36808-1_2"},{"key":"19308_CR44","doi-asserted-by":"crossref","unstructured":"Liu Z, Luo P, Wang X, Tang X (2015) Deep learning face attributes in the wild. In: Proceedings of the IEEE international conference on computer vision, pp 3730\u20133738","DOI":"10.1109\/ICCV.2015.425"},{"key":"19308_CR45","doi-asserted-by":"crossref","unstructured":"Ronneberger O, Fischer P, Brox T (2015) U-net: convolutional networks for biomedical image segmentation. In: International conference on medical image computing and computer-assisted intervention. Springer, pp 234\u2013241","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"19308_CR46","doi-asserted-by":"crossref","unstructured":"Schroff F, Kalenichenko D, Philbin J (2015) Facenet: a unified embedding for face recognition and clustering. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 815\u2013823","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"19308_CR47","doi-asserted-by":"crossref","unstructured":"Cao Q, Shen L, Xie W, Parkhi OM, Zisserman A (2018) Vggface2: a dataset for recognising faces across pose and age. In: 2018 13th IEEE international conference on automatic face & gesture recognition (FG 2018). IEEE, pp 67\u201374","DOI":"10.1109\/FG.2018.00020"},{"key":"19308_CR48","unstructured":"Kingma DP, Ba J (2014) Adam: a method for stochastic optimization. arXiv:1412.6980"},{"key":"19308_CR49","unstructured":"Karras T, Aila T, Laine S, Lehtinen J (2017) Progressive growing of gans for improved quality, stability, and variation. arXiv:1710.10196"},{"key":"19308_CR50","doi-asserted-by":"crossref","unstructured":"Karras T, Laine S, Aila T (2019) A style-based generator architecture for generative adversarial networks. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 4401\u20134410","DOI":"10.1109\/CVPR.2019.00453"},{"key":"19308_CR51","unstructured":"Yi D, Lei Z, Liao S, Li SZ (2014) Learning face representation from scratch. arXiv:1411.7923"},{"key":"19308_CR52","unstructured":"Huang GB, Mattar M, Berg T, Learned-Miller E (2008) Labeled faces in the wild: a database forstudying face recognition in unconstrained environments. In: Workshop on faces in\u2019Real-Life\u2019Images: detection, alignment, and recognition"},{"issue":"4","key":"19308_CR53","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612","journal-title":"IEEE Trans Image Process"},{"issue":"13","key":"19308_CR54","doi-asserted-by":"publisher","first-page":"800","DOI":"10.1049\/el:20080522","volume":"44","author":"Q Huynh-Thu","year":"2008","unstructured":"Huynh-Thu Q, Ghanbari M (2008) Scope of validity of psnr in image\/video quality assessment. Electron Lett 44(13):800\u2013801","journal-title":"Electron Lett"},{"key":"19308_CR55","unstructured":"Heusel M, Ramsauer H, Unterthiner T, Nessler B, Hochreiter S (2017) Gans trained by a two time-scale update rule converge to a local nash equilibrium. Adv Neural Inf Process Syst 30"},{"key":"19308_CR56","doi-asserted-by":"crossref","unstructured":"Deng J, Guo J, Ververas E, Kotsia I, Zafeiriou S (2020) Retinaface: single-shot multi-level face localisation in the wild. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 5203\u20135212","DOI":"10.1109\/CVPR42600.2020.00525"},{"key":"19308_CR57","doi-asserted-by":"crossref","unstructured":"Karras T, Laine S, Aittala M, Hellsten J, Lehtinen J, Aila T (2020) Analyzing and improving the image quality of stylegan. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 8110\u20138119","DOI":"10.1109\/CVPR42600.2020.00813"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19308-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-19308-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19308-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T03:27:34Z","timestamp":1746156454000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-19308-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,24]]},"references-count":57,"journal-issue":{"issue":"13","published-online":{"date-parts":[[2025,4]]}},"alternative-id":["19308"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-19308-3","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,24]]},"assertion":[{"value":"20 June 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 April 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 May 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interests"}}]}}