{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,19]],"date-time":"2026-04-19T18:50:10Z","timestamp":1776624610998,"version":"3.51.2"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2024,5,30]],"date-time":"2024-05-30T00:00:00Z","timestamp":1717027200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,30]],"date-time":"2024-05-30T00:00:00Z","timestamp":1717027200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-19431-1","type":"journal-article","created":{"date-parts":[[2024,5,30]],"date-time":"2024-05-30T04:06:12Z","timestamp":1717041972000},"page":"12299-12327","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Decoding the future: exploring and comparing ABE standards for cloud, IoT, blockchain security applications"],"prefix":"10.1007","volume":"84","author":[{"given":"Kranthi Kumar","family":"Singamaneni","sequence":"first","affiliation":[]},{"given":"Kusum","family":"Yadav","sequence":"additional","affiliation":[]},{"given":"Arwa N.","family":"Aledaily","sequence":"additional","affiliation":[]},{"given":"Wattana","family":"Viriyasitavat","sequence":"additional","affiliation":[]},{"given":"Gaurav","family":"Dhiman","sequence":"additional","affiliation":[]},{"given":"Amandeep","family":"Kaur","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,30]]},"reference":[{"key":"19431_CR1","doi-asserted-by":"crossref","unstructured":"Goyal V et al (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on Computer and communications security","DOI":"10.1145\/1180405.1180418"},{"key":"19431_CR2","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1016\/j.jpdc.2020.08.012","volume":"147","author":"Z Guan","year":"2021","unstructured":"Guan Z et al (2021) Achieving efficient and privacy-preserving energy trading based on blockchain and ABE in smart grid. J Parallel Distrib Comput 147:34\u201345","journal-title":"J Parallel Distrib Comput"},{"issue":"21","key":"19431_CR3","doi-asserted-by":"publisher","first-page":"7300","DOI":"10.3390\/s21217300","volume":"21","author":"K Singamaneni","year":"2021","unstructured":"Singamaneni K, Kumar et al (2021) A novel blockchain and Bi-linear polynomial-based QCP-ABE framework for privacy and security over the complex cloud data. Sensors 21(21):7300","journal-title":"Sensors"},{"issue":"4","key":"19431_CR4","doi-asserted-by":"publisher","first-page":"4406","DOI":"10.1109\/TNSM.2021.3093002","volume":"18","author":"W Ren","year":"2021","unstructured":"Ren W et al (2021) SILedger: a blockchain and ABE-based access control for applications in SDN-IoT networks. IEEE Trans Netw Serv Manage 18(4):4406\u20134419","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"19431_CR5","doi-asserted-by":"crossref","unstructured":"Singamaneni K, Kumar et al (2022) An enhanced dynamic nonlinear polynomial integrity-based QHCP-ABE framework for big data privacy and security. Security and Communication Networks","DOI":"10.1155\/2022\/4206000"},{"key":"19431_CR6","doi-asserted-by":"publisher","first-page":"3273","DOI":"10.1109\/ACCESS.2017.2669940","volume":"5","author":"V Odelu","year":"2017","unstructured":"Odelu V et al (2017) Expressive CP-ABE scheme for mobile devices in IoT satisfying constant-size keys and ciphertexts. IEEE Access 5:3273\u20133283","journal-title":"IEEE Access"},{"key":"19431_CR7","doi-asserted-by":"publisher","first-page":"27336","DOI":"10.1109\/ACCESS.2018.2836350","volume":"6","author":"S Ding","year":"2018","unstructured":"Ding S, Li C, Li H (2018) A novel efficient pairing-free CP-ABE based on elliptic curve cryptography for IoT. IEEE Access 6:27336\u201327345","journal-title":"IEEE Access"},{"key":"19431_CR8","first-page":"102503","volume":"53","author":"S Banerjee","year":"2020","unstructured":"Banerjee S et al (2020) Multi-authority CP-ABE-based user access control scheme with constant-size key and ciphertext for IoT deployment. J Inform Secur Appl 53:102503","journal-title":"J Inform Secur Appl"},{"key":"19431_CR9","doi-asserted-by":"crossref","unstructured":"Wang X et al (2014) Performance evaluation of attribute-based encryption: Toward data privacy in the IoT. 2014 IEEE International Conference on Communications (ICC). IEEE","DOI":"10.1109\/ICC.2014.6883405"},{"issue":"18","key":"19431_CR10","doi-asserted-by":"publisher","first-page":"6741","DOI":"10.3390\/s22186741","volume":"22","author":"K Singamaneni","year":"2022","unstructured":"Singamaneni K, Kumar et al (2022) A novel QKD approach to enhance IIOT privacy and computational knacks. Sensors 22(18):6741","journal-title":"Sensors"},{"key":"19431_CR11","doi-asserted-by":"crossref","unstructured":"Touati L, Challal Y, Bouabdallah A (2014) C-cp-abe: Cooperative ciphertext policy attribute-based encryption for the internet of things. International Conference on Advanced Networking Distributed Systems and Applications. IEEE, 2014","DOI":"10.1109\/INDS.2014.19"},{"key":"19431_CR12","unstructured":"Rao Y, Sreenivasa (2013) and Ratna Dutta. Decentralized ciphertext-policy attribute-based encryption scheme with fast decryption. Communications and Multimedia Security: 14th IFIP TC 6\/TC 11 International Conference, CMS Magdeburg, Germany, September 25\u201326, 2013. Proceedings 14. Springer Berlin Heidelberg, 2013"},{"issue":"3","key":"19431_CR13","doi-asserted-by":"publisher","first-page":"155014772199961","DOI":"10.1177\/1550147721999616","volume":"17","author":"Y Zuo","year":"2021","unstructured":"Zuo Y et al (2021) BCAS: a blockchain-based ciphertext-policy attribute-based encryption scheme for cloud data security sharing. Int J Distrib Sens Netw 17(3):1550147721999616","journal-title":"Int J Distrib Sens Netw"},{"issue":"1","key":"19431_CR14","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1109\/JIOT.2021.3109440","volume":"9","author":"H Xiong","year":"2021","unstructured":"Xiong H et al (2021) A survey of public-key encryption with search functionality for cloud-assisted IoT. IEEE Internet Things J 9(1):401\u2013418","journal-title":"IEEE Internet Things J"},{"key":"19431_CR15","doi-asserted-by":"crossref","unstructured":"Yamada S et al (2014) A framework and compact constructions for non-monotonic attribute-based encryption. Public-Key Cryptography\u2013PKC : 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26\u201328, 2014. Proceedings 17. Springer Berlin Heidelberg, 2014","DOI":"10.1007\/978-3-642-54631-0_16"},{"key":"19431_CR16","doi-asserted-by":"publisher","first-page":"63513","DOI":"10.1109\/ACCESS.2018.2877177","volume":"6","author":"J Wang","year":"2018","unstructured":"Wang J et al (2018) A compact ciphertext-policy attribute-based encryption scheme for the information-centric internet of things. IEEE Access 6:63513\u201363526","journal-title":"IEEE Access"},{"key":"19431_CR17","doi-asserted-by":"crossref","unstructured":"Lewko A et al (2010) Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. Advances in Cryptology\u2013EUROCRYPT : 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30\u2013June 3, 2010. Proceedings 29. Springer Berlin Heidelberg, 2010","DOI":"10.1007\/978-3-642-13190-5_4"},{"key":"19431_CR18","unstructured":"Mascia C, Sala M, Villa I (2021) A survey on functional encryption. arXiv preprint arXiv:2106.06306"},{"key":"19431_CR19","doi-asserted-by":"crossref","unstructured":"Ge A et al (2012) Threshold ciphertext policy attribute-based encryption with constant size ciphertexts. Information Security and Privacy: 17th Australasian Conference, ACISP Wollongong, NSW, Australia, July 9\u201311, 2012. Proceedings 17. Springer Berlin Heidelberg, 2012","DOI":"10.1007\/978-3-642-31448-3_25"},{"key":"19431_CR20","doi-asserted-by":"crossref","unstructured":"Garg S et al (2013) Attribute-based encryption for circuits from multilinear maps. Advances in Cryptology\u2013CRYPTO : 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18\u201322, 2013. Proceedings, Part II. Springer Berlin Heidelberg, 2013","DOI":"10.1007\/978-3-642-40084-1_27"},{"key":"19431_CR21","doi-asserted-by":"crossref","unstructured":"Wang C (2011) and Jiasen Huang. Attribute-based signcryption with ciphertext-policy and claim-predicate mechanism. Seventh International Conference on Computational Intelligence and Security. IEEE, 2011. Yu, Shucheng, Achieving secure, scalable, and fine-grained data access control in cloud computing. 2010 Proceedings IEEE INFOCOM. Ieee, 2010","DOI":"10.1109\/CIS.2011.204"},{"key":"19431_CR22","first-page":"1367","volume":"96","author":"Yi-mu Ji","year":"2014","unstructured":"Ji Yi-mu et al (2014) A privacy Protection Method based on CP-ABE and KP-ABE for Cloud Computing. J Softw 96:1367\u20131375","journal-title":"J Softw"},{"issue":"5","key":"19431_CR23","doi-asserted-by":"publisher","first-page":"1169","DOI":"10.1109\/TIFS.2017.2779427","volume":"13","author":"W Dai","year":"2017","unstructured":"Dai W et al (2017) Implementation and evaluation of a lattice-based key-policy ABE scheme. IEEE Trans Inf Forensics Secur 13(5):1169\u20131184","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"19431_CR24","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1109\/TSC.2016.2542813","volume":"10","author":"J Li","year":"2016","unstructured":"Li J et al (2016) KSF-OABE: outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Trans Serv Comput 10:715\u2013725","journal-title":"IEEE Trans Serv Comput"},{"issue":"2","key":"19431_CR25","doi-asserted-by":"publisher","first-page":"743","DOI":"10.1109\/TIFS.2011.2172209","volume":"7","author":"Z Wan","year":"2011","unstructured":"Wan Z, Robert H, Deng (2011) HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inf Forensics Secur 7(2):743\u2013754","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"19431_CR26","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.future.2014.10.010","volume":"49","author":"X Yao","year":"2015","unstructured":"Yao X, Chen Z, Tian Y (2015) A lightweight attribute-based encryption scheme for the internet of things. Future Generation Comput Syst 49:104\u2013112","journal-title":"Future Generation Comput Syst"},{"key":"19431_CR27","doi-asserted-by":"crossref","unstructured":"Girgenti B et al (2019) On the feasibility of attribute-based encryption on constrained IoT devices for smart systems. IEEE international conference on smart computing (SMARTCOMP). IEEE, 2019","DOI":"10.1109\/SMARTCOMP.2019.00057"},{"issue":"5","key":"19431_CR28","doi-asserted-by":"publisher","first-page":"785","DOI":"10.1109\/TSC.2016.2520932","volume":"10","author":"J Li","year":"2016","unstructured":"Li J et al (2016) Flexible and fine-grained attribute-based data storage in cloud computing. IEEE Trans Serv Comput 10(5):785\u2013796","journal-title":"IEEE Trans Serv Comput"},{"key":"19431_CR29","doi-asserted-by":"crossref","unstructured":"Attrapadung N, Hanaoka G, Yamada S (2015) Conversions among several classes of predicate encryption and applications to ABE with various compactness tradeoffs. Advances in Cryptology\u2013ASIACRYPT : 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29\u2013December 3, 2015, Proceedings, Part I 21. Springer Berlin Heidelberg, 2015","DOI":"10.1007\/978-3-662-48797-6_24"},{"issue":"4","key":"19431_CR30","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1109\/TSC.2014.2363474","volume":"8","author":"Y Zhu","year":"2014","unstructured":"Zhu Y et al (2014) From RBAC to ABAC: constructing flexible data access control for cloud storage services. IEEE Trans Serv Comput 8(4):601\u2013616","journal-title":"IEEE Trans Serv Comput"},{"issue":"10","key":"19431_CR31","doi-asserted-by":"publisher","first-page":"2266","DOI":"10.1016\/j.comnet.2012.12.018","volume":"57","author":"R Roman","year":"2013","unstructured":"Roman R, Zhou J, Lopez J (2013) On the features and challenges of security and privacy in distributed internet of things. Comput Netw 57(10):2266\u20132279","journal-title":"Comput Netw"},{"key":"19431_CR32","unstructured":"Rahulamathavan Y et al (2017) IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). IEEE, 2017"},{"key":"19431_CR33","doi-asserted-by":"publisher","first-page":"4613","DOI":"10.1007\/s12652-020-01710-y","volume":"11","author":"S Pournaghi","year":"2020","unstructured":"Pournaghi S, Morteza M, Bayat, Farjami Y (2020) MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption. J Ambient Intell Humaniz Comput 11:4613\u20134641","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"2","key":"19431_CR34","doi-asserted-by":"publisher","first-page":"155014772090679","DOI":"10.1177\/1550147720906796","volume":"16","author":"R Guo","year":"2020","unstructured":"Guo R et al (2020) A lightweight verifiable outsourced decryption of attribute-based encryption scheme for blockchain-enabled wireless body area network in fog computing. Int J Distrib Sens Netw 16(2):1550147720906796","journal-title":"Int J Distrib Sens Netw"},{"key":"19431_CR35","doi-asserted-by":"crossref","unstructured":"Guo H, Meamari E, Chien-Chung S (2019) Multi-authority attribute-based access control with smart contract. Proceedings of the international conference on blockchain technology. 2019","DOI":"10.1145\/3320154.3320164"},{"key":"19431_CR36","doi-asserted-by":"publisher","first-page":"1949","DOI":"10.1109\/JBHI.2021.3075995","volume":"26","author":"H Li","year":"2021","unstructured":"Li H et al (2021) An efficient ciphertext-policy weighted attribute-based encryption for the internet of health things. IEEE J Biomedical Health Inf 26:1949\u20131960","journal-title":"IEEE J Biomedical Health Inf"},{"key":"19431_CR37","doi-asserted-by":"crossref","unstructured":"Michalas A (2017) and Noam Weingarten. Healthshare: Using attribute-based encryption for secure data sharing between multiple clouds. IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS). IEEE, 2017","DOI":"10.1109\/CBMS.2017.30"},{"key":"19431_CR38","doi-asserted-by":"crossref","unstructured":"Bobba R, Khurana H, Prabhakaran M (2009) Attribute-sets: A practically motivated enhancement to attribute-based encryption. Computer Security\u2013ESORICS 2009: 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21\u201323, 2009. Proceedings 14. Springer Berlin Heidelberg","DOI":"10.1007\/978-3-642-04444-1_36"},{"key":"19431_CR39","doi-asserted-by":"crossref","unstructured":"Wang G, Liu Q, Wu J (2010) Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. Proceedings of the 17th ACM conference on Computer and communications security","DOI":"10.1145\/1866307.1866414"},{"key":"19431_CR40","volume-title":"Time-based direct revocable ciphertext-policy attribute-based encryption with short revocation list. Applied Cryptography and Network Security: 16th International Conference, ACNS,\u00a0Proceedings 16","author":"JK Liu","year":"2018","unstructured":"Liu JK et al (2018) Time-based direct revocable ciphertext-policy attribute-based encryption with short revocation list. Applied Cryptography and Network Security: 16th International Conference, ACNS,\u00a0Proceedings 16. Springer International Publishing, Leuven"},{"key":"19431_CR41","doi-asserted-by":"crossref","unstructured":"Kandala S, Sandhu R, Bhamidipati V (2011) An attribute based framework for risk-adaptive access control models. Sixth International Conference on Availability, Reliability and Security. IEEE, 2011","DOI":"10.1109\/ARES.2011.41"},{"key":"19431_CR42","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.jnca.2018.02.009","volume":"108","author":"P Kumar","year":"2018","unstructured":"Kumar P, Alphonse PJA (2018) Attribute based encryption in cloud computing: a survey, gap analysis, and future directions. J Netw Comput Appl 108:37\u201352","journal-title":"J Netw Comput Appl"},{"key":"19431_CR43","doi-asserted-by":"crossref","unstructured":"Manjusha R, Ramachandran R (2014) Comparative study of attribute based encryption techniques in cloud computing. international conference on embedded systems (ICES). IEEE, 2014","DOI":"10.1109\/EmbeddedSys.2014.6953101"},{"issue":"11","key":"19431_CR44","doi-asserted-by":"publisher","first-page":"8269","DOI":"10.1109\/JIOT.2022.3154039","volume":"9","author":"M Rasori","year":"2022","unstructured":"Rasori M et al (2022) A survey on attribute-based encryption schemes suitable for the internet of things. IEEE Internet Things J 9(11):8269\u20138290","journal-title":"IEEE Internet Things J"},{"key":"19431_CR45","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.neucom.2021.10.105","volume":"471","author":"H Abdellatef","year":"2022","unstructured":"Abdellatef H, Khalil-Hani M, Shaikh-Husin N, Ayat SO (2022) Accurate and compact convolutional neural network based on stochastic computing. Neurocomputing 471:31\u201347","journal-title":"Neurocomputing"},{"key":"19431_CR46","volume-title":"Noisy output based direct learning tracking control with markov nonuniform trial lengths using adaptive gains","author":"D Shen","year":"2021","unstructured":"Shen D, Saab SS (2021) Noisy output based direct learning tracking control with markov nonuniform trial lengths using adaptive gains. IEEE Transactions on Automatic Control"},{"key":"19431_CR47","doi-asserted-by":"crossref","unstructured":"Sayour MH, Kozhaya SE, Saab SS (2022) Autonomous Robotic Manipulation: Real-Time, Deep-Learning Approach for Grasping of Unknown Objects. Journal of Robotics, 2022","DOI":"10.1155\/2022\/2585656"},{"key":"19431_CR48","volume-title":"A Probabilistically Quantized Learning Control Framework for Networked Linear Systems","author":"D Shen","year":"2021","unstructured":"Shen D, Huo N, Saab SS (2021) A Probabilistically Quantized Learning Control Framework for Networked Linear systems. IEEE Transactions on Neural Networks and Learning Systems"},{"issue":"5","key":"19431_CR49","doi-asserted-by":"publisher","first-page":"1273","DOI":"10.1080\/00207179.2019.1642518","volume":"94","author":"SS Saab","year":"2021","unstructured":"Saab SS, Jaafar RH (2021) A proportional-derivative-double derivative controller for robot manipulators. Int J Control 94(5):1273\u20131285","journal-title":"Int J Control"},{"issue":"2","key":"19431_CR50","doi-asserted-by":"publisher","first-page":"1858","DOI":"10.1109\/TIE.2021.3063866","volume":"69","author":"SS Saab","year":"2021","unstructured":"Saab SS, Shen D, Orabi M, Kors D, Jaafar RH (2021) Iterative learning control: practical implementation and automation. IEEE Trans Industr Electron 69(2):1858\u20131866","journal-title":"IEEE Trans Industr Electron"},{"key":"19431_CR51","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3172370","volume-title":"On demand fog federations for horizontal federated learning in IoV","author":"A Hammoud","year":"2022","unstructured":"Hammoud A, Otrok H, Mourad A, Dziong Z (2022) On demand fog federations for horizontal federated learning in IoV. IEEE Transactions on Network and Service Management"},{"key":"19431_CR52","doi-asserted-by":"crossref","unstructured":"Helwan A, Ma\u2019aitah MKS, Uzelaltinbulat S, Altobel MZ, Darwish M (2021), April Gaze Prediction Based on Convolutional Neural Network. In International Conference on Emerging Technologies and Intelligent Systems (pp. 215\u2013224). Springer, Cham","DOI":"10.1007\/978-3-030-85990-9_18"},{"key":"19431_CR53","doi-asserted-by":"crossref","unstructured":"Gerges F, Shih F, Azar D (2021), September Automated Diagnosis of Acne and Rosacea using Convolution Neural Networks. In 2021 4th International Conference on Artificial Intelligence and Pattern Recognition (pp. 607\u2013613)","DOI":"10.1145\/3488933.3488993"},{"key":"19431_CR54","doi-asserted-by":"crossref","unstructured":"Abbas N, Nasser Y, Shehab M, Sharafeddine S (2021), December Attack-Specific Feature Selection for Anomaly Detection in Software-Defined Networks. In 2021 3rd IEEE Middle East and North Africa COMMunications Conference (MENACOMM) (pp. 142\u2013146). IEEE","DOI":"10.1109\/MENACOMM50742.2021.9678279"},{"issue":"2","key":"19431_CR55","first-page":"1","volume":"14","author":"A Tarhini","year":"2022","unstructured":"Tarhini A, Harfouche A, De Marco M (2022) Artificial intelligence-based digital transformation for sustainable societies: the prevailing effect of COVID-19 crises. Pac Asia J Association Inform Syst 14(2):1","journal-title":"Pac Asia J Association Inform Syst"},{"key":"19431_CR56","doi-asserted-by":"crossref","unstructured":"Tarhini A, Danach K, Harfouche A (2020) Swarm intelligence-based hyper-heuristic for the vehicle routing problem with prioritized customers. Ann Oper Res, 1\u201322","DOI":"10.1007\/s10479-020-03625-5"},{"key":"19431_CR57","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.future.2021.05.021","volume":"124","author":"A Hammoud","year":"2021","unstructured":"Hammoud A, Otrok H, Mourad A, Dziong Z (2021) Stable federated fog formation: an evolutionary game theoretical approach. Future Generation Comput Syst 124:21\u201332","journal-title":"Future Generation Comput Syst"},{"key":"19431_CR58","volume-title":"Optimizing Information Freshness for MEC-Enabled Cooperative Autonomous Driving","author":"I Sorkhoh","year":"2021","unstructured":"Sorkhoh I, Assi C, Ebrahimi D, Sharafeddine S (2021) Optimizing information freshness for MEC-Enabled Cooperative Autonomous Driving. IEEE Transactions on Intelligent Transportation Systems"},{"key":"19431_CR59","doi-asserted-by":"crossref","unstructured":"Chamra A, Harmanani H (2020) A smart green house control and management system using iot. In 17th International Conference on Information Technology\u2013New Generations (ITNG 2020) (pp. 641\u2013646). Springer, Cham","DOI":"10.1007\/978-3-030-43020-7_86"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19431-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-19431-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19431-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T03:28:01Z","timestamp":1746156481000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-19431-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,30]]},"references-count":59,"journal-issue":{"issue":"13","published-online":{"date-parts":[[2025,4]]}},"alternative-id":["19431"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-19431-1","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,30]]},"assertion":[{"value":"15 June 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 February 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 May 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 May 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"None.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of potential conflicts of interest"}},{"value":"None.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research involving human participants and\/or animals"}}]}}