{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T18:19:02Z","timestamp":1766600342713,"version":"3.41.0"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T00:00:00Z","timestamp":1719964800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T00:00:00Z","timestamp":1719964800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-19472-6","type":"journal-article","created":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T08:05:03Z","timestamp":1719993903000},"page":"17279-17307","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A new image encryption approach that uses an improved Hill-Vigen\u00e8re method and chaotic maps"],"prefix":"10.1007","volume":"84","author":[{"given":"S.","family":"El Kaddouhi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Y.","family":"Qobbi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"A.","family":"Abid","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"M.","family":"Jarjar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"H.","family":"Zaaraoui","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"A.","family":"Jarjar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,7,3]]},"reference":[{"key":"19472_CR1","doi-asserted-by":"publisher","first-page":"917","DOI":"10.1007\/s10207-022-00588-5","volume":"21","author":"U Zia","year":"2022","unstructured":"Zia U, McCartney M, Scotney B, Martinez J, AbuTair M, Memon J, Sajjad A (2022) Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains. Int J Inf Secur 21:917\u2013935. https:\/\/doi.org\/10.1007\/s10207-022-00588-5","journal-title":"Int J Inf Secur"},{"key":"19472_CR2","doi-asserted-by":"publisher","unstructured":"Kumari M, Gupta S, Sardana P (2017) A Survey of Image Encryption Algorithms. 3D Res 8. https:\/\/doi.org\/10.1007\/s13319-017-0148-5","DOI":"10.1007\/s13319-017-0148-5"},{"key":"19472_CR3","doi-asserted-by":"publisher","unstructured":"Fang P, Liu H, Wu C, Liu M (2022) A survey of image encryption algorithms based on chaotic system. Visual Comp 3. https:\/\/doi.org\/10.1007\/s00371-022-02459-5","DOI":"10.1007\/s00371-022-02459-5"},{"key":"19472_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-023-09130-8","author":"AA Abdulla","year":"2023","unstructured":"Abdulla AA (2023) Digital image steganography: challenges, investigation, and recommendation for the future direction. Soft Comput. https:\/\/doi.org\/10.1007\/s00500-023-09130-8","journal-title":"Soft Comput"},{"key":"19472_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2022.168955","volume":"258","author":"X Wang","year":"2022","unstructured":"Wang X, Guan N, Liu P (2022) A selective image encryption algorithm based on a chaotic model using modular sine arithmetic. Optik 258:168955. https:\/\/doi.org\/10.1016\/j.ijleo.2022.168955","journal-title":"Optik"},{"key":"19472_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2022.169430","volume":"265","author":"M Demirta\u015f","year":"2022","unstructured":"Demirta\u015f M (2022) A new RGB color image encryption scheme based on cross-channel pixel and bit scrambling using chaos. Optik 265:169430. https:\/\/doi.org\/10.1016\/j.ijleo.2022.169430","journal-title":"Optik"},{"key":"19472_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2021.107326","volume":"143","author":"N Khalil","year":"2021","unstructured":"Khalil N, Sarhan A, Alshewimy MAM (2021) An efficient color\/grayscale image encryption scheme based on hybrid chaotic maps. Opt Laser Technol 143:107326. https:\/\/doi.org\/10.1016\/j.optlastec.2021.107326","journal-title":"Opt Laser Technol"},{"key":"19472_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13319-015-0068-1","volume":"6","author":"M Machkour","year":"2015","unstructured":"Machkour M, Saaidi A, Benmaati ML (2015) A Novel Image Encryption Algorithm Based on the Two-Dimensional Logistic Map and the Latin Square Image Cipher. 3D Res 6:1\u201318. https:\/\/doi.org\/10.1007\/s13319-015-0068-1","journal-title":"3D Res"},{"key":"19472_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2021.107252","volume":"142","author":"X Gao","year":"2021","unstructured":"Gao X (2021) Image encryption algorithm based on 2D hyperchaotic map. Opt Laser Technol 142:107252. https:\/\/doi.org\/10.1016\/j.optlastec.2021.107252","journal-title":"Opt Laser Technol"},{"key":"19472_CR10","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1016\/j.procs.2018.01.153","volume":"127","author":"M Essaid","year":"2018","unstructured":"Essaid M, Akharraz I, Saaidi A, Mouhib A (2018) A new image encryption scheme based on confusion-diffusion using an enhanced skew tent map. Procedia Comput Sci 127:539\u2013548. https:\/\/doi.org\/10.1016\/j.procs.2018.01.153","journal-title":"Procedia Comput Sci"},{"key":"19472_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/e20070535","volume":"20","author":"L Huang","year":"2018","unstructured":"Huang L, Cai S, Xiao M, Xiong X (2018) A simple chaotic map-based image encryption system using both plaintext related permutation and diffusion. Entropy 20:1\u201320. https:\/\/doi.org\/10.3390\/e20070535","journal-title":"Entropy"},{"key":"19472_CR12","doi-asserted-by":"publisher","first-page":"19853","DOI":"10.1007\/s11042-020-08850-5","volume":"79","author":"T Sajjad","year":"2020","unstructured":"Sajjad T, Rashid A (2020) A new chaos-based color image encryption algorithm using permutation substitution and Boolean operation. Multimedia Tools Appl 79:19853\u201319873. https:\/\/doi.org\/10.1007\/s11042-020-08850-5","journal-title":"Multimedia Tools Appl"},{"key":"19472_CR13","doi-asserted-by":"publisher","unstructured":"Patro K.A.K, Banerjee A, Acharya B (2018) A simple, secure and time efficient multi-way rotational permutation and diffusion based image encryption by using multiple 1-D chaotic maps. Springer Nature Singapore 396\u2013418. https:\/\/doi.org\/10.1007\/978-981-10-8660-1_30","DOI":"10.1007\/978-981-10-8660-1_30"},{"key":"19472_CR14","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.optlaseng.2016.10.006","volume":"90","author":"R Enayatifar","year":"2017","unstructured":"Enayatifar R, Abdullah AH, Isnin IF, Altameem A, Lee M (2017) Image encryption using a synchronous permutation-diffusion technique. Opt Lasers Eng 90:146\u2013154. https:\/\/doi.org\/10.1016\/j.optlaseng.2016.10.006","journal-title":"Opt Lasers Eng"},{"key":"19472_CR15","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.ins.2022.05.032","volume":"605","author":"L Teng","year":"2022","unstructured":"Teng L, Wang X, Xian Y (2022) Image encryption algorithm based on a 2D-CLSS hyperchaotic map using simultaneous permutation and diffusion. Inf Sci 605:71\u201385. https:\/\/doi.org\/10.1016\/j.ins.2022.05.032","journal-title":"Inf Sci"},{"key":"19472_CR16","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.chaos.2016.12.018","volume":"95","author":"\u00dc \u00c7avu\u015fo\u011flu","year":"2017","unstructured":"\u00c7avu\u015fo\u011flu \u00dc, Ka\u00e7ar S, Pehlivan I, Zengin (2017) Secure image encryption algorithm design using a novel chaos based S-Box. Chaos, Solitons Fractals. 95:92\u2013101. https:\/\/doi.org\/10.1016\/j.chaos.2016.12.018","journal-title":"Chaos, Solitons Fractals."},{"key":"19472_CR17","doi-asserted-by":"publisher","first-page":"790","DOI":"10.3390\/E21080790","volume":"21","author":"S Zhu","year":"2019","unstructured":"Zhu S, Wang G, Zhu C (2019) A secure and fast image encryption scheme based on double chaotic s-boxes. Entropy 21:790. https:\/\/doi.org\/10.3390\/E21080790","journal-title":"Entropy"},{"key":"19472_CR18","doi-asserted-by":"publisher","unstructured":"Qobbi Y, Jarjar A, Essaid M, Benazzi A (2021) Development of Large Chaotic S-boxes for Image Encryption. Lecture Notes in Networks and Systems 211. LNNS, 847\u2013858. https:\/\/doi.org\/10.1007\/978-3-030-73882-2_77","DOI":"10.1007\/978-3-030-73882-2_77"},{"key":"19472_CR19","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/j.ins.2018.03.055","volume":"450","author":"Y Zhang","year":"2018","unstructured":"Zhang Y (2018) The unified image encryption algorithm based on chaos and cubic S-Box. Inf Sci 450:361\u2013377. https:\/\/doi.org\/10.1016\/j.ins.2018.03.055","journal-title":"Inf Sci"},{"key":"19472_CR20","doi-asserted-by":"publisher","first-page":"2757","DOI":"10.1007\/s11071-017-3409-1","volume":"88","author":"A Ullah","year":"2017","unstructured":"Ullah A, Jamal SS, Shah T (2017) A novel construction of substitution box using a combination of chaotic maps with improved chaotic range. Nonlinear Dyn 88:2757\u20132769. https:\/\/doi.org\/10.1007\/s11071-017-3409-1","journal-title":"Nonlinear Dyn"},{"key":"19472_CR21","doi-asserted-by":"publisher","first-page":"10013","DOI":"10.1007\/s11042-018-6612-2","volume":"78","author":"YPK Nkandeu","year":"2019","unstructured":"Nkandeu YPK, Tiedeu A (2019) An image encryption algorithm based on substitution technique and chaos mixing. Multimedia Tools Appl 78:10013\u201310034. https:\/\/doi.org\/10.1007\/s11042-018-6612-2","journal-title":"Multimedia Tools Appl"},{"key":"19472_CR22","doi-asserted-by":"publisher","first-page":"150326","DOI":"10.1109\/ACCESS.2020.3016401","volume":"8","author":"AH Zahid","year":"2020","unstructured":"Zahid AH, Al-Solami E, Ahmad M (2020) A Novel Modular Approach Based Substitution-Box Design for Image Encryption. IEEE Access 8:150326\u2013150340. https:\/\/doi.org\/10.1109\/ACCESS.2020.3016401","journal-title":"IEEE Access"},{"key":"19472_CR23","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/s11071-016-3046-0","volume":"87","author":"A Belazi","year":"2017","unstructured":"Belazi A, Khan M, El-Latif AAA, Belghith S (2017) Efficient cryptosystem approaches: S-boxes and permutation\u2013substitution-based encryption. Nonlinear Dyn 87:337\u2013361. https:\/\/doi.org\/10.1007\/s11071-016-3046-0","journal-title":"Nonlinear Dyn"},{"key":"19472_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-14175-2","author":"Y Qobbi","year":"2022","unstructured":"Qobbi Y, Jarjar A, Essaid M, Benazzi A (2022) Image encryption algorithm using dynamic permutation and large chaotic S-box. Multimedia Tools Appl. https:\/\/doi.org\/10.1007\/s11042-022-14175-2","journal-title":"Multimedia Tools Appl"},{"key":"19472_CR25","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/s11071-014-1435-9","volume":"78","author":"Y Zhang","year":"2014","unstructured":"Zhang Y, Xiao D, Wen W, Nan H (2014) Cryptanalysis of image scrambling based on chaotic sequences and Vigen\u00e8re cipher. Nonlinear Dyn 78:235\u2013240. https:\/\/doi.org\/10.1007\/s11071-014-1435-9","journal-title":"Nonlinear Dyn"},{"key":"19472_CR26","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1016\/j.asoc.2014.10.004","volume":"26","author":"AK Bhateja","year":"2015","unstructured":"Bhateja AK, Bhateja A, Chaudhury S, Saxena PK (2015) Cryptanalysis of Vigenere cipher using Cuckoo Search. Appl Soft Comput 26:315\u2013324. https:\/\/doi.org\/10.1016\/j.asoc.2014.10.004","journal-title":"Appl Soft Comput"},{"key":"19472_CR27","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/s11042-012-1281-z","volume":"66","author":"S Li","year":"2013","unstructured":"Li S, Zhao Y, Qu B, Wang J (2013) Image scrambling based on chaotic sequences and Vigen\u00e8re cipher. Multimed Tools Appl 66:573\u2013588. https:\/\/doi.org\/10.1007\/s11042-012-1281-z","journal-title":"Multimed Tools Appl"},{"key":"19472_CR28","doi-asserted-by":"publisher","first-page":"16529","DOI":"10.1007\/s11042-016-3926-9","volume":"76","author":"R Bansal","year":"2017","unstructured":"Bansal R, Gupta S, Sharma G (2017) An innovative image encryption scheme based on chaotic map and Vigen\u00e8re scheme. Multimedia Tools Appl 76:16529\u201316562. https:\/\/doi.org\/10.1007\/s11042-016-3926-9","journal-title":"Multimedia Tools Appl"},{"key":"19472_CR29","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/j.jisa.2019.05.006","volume":"47","author":"M Essaid","year":"2019","unstructured":"Essaid M, Akharraz I, Saaidi A, Mouhib A (2019) Image encryption scheme based on a new secure variant of Hill cipher and 1D chaotic maps. J Inform Secur Appl 47:173\u2013187. https:\/\/doi.org\/10.1016\/j.jisa.2019.05.006","journal-title":"J Inform Secur Appl"},{"key":"19472_CR30","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1016\/j.procs.2019.01.048","volume":"148","author":"S Hraoui","year":"2019","unstructured":"Hraoui S, Gmira F, Abbou MF, Oulidi AJ, Jarjar A (2019) A New Cryptosystem of Color Image Using a Dynamic-Chaos Hill Cipher Algorithm. Procedia Comp Sci 148:399\u2013408. https:\/\/doi.org\/10.1016\/j.procs.2019.01.048","journal-title":"Procedia Comp Sci"},{"key":"19472_CR31","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s11071-015-1979-3","volume":"81","author":"W Yao","year":"2015","unstructured":"Yao W, Zhang X, Zheng Z, Qiu W (2015) A color image encryption algorithm using 4-pixel Feistel structure and multiple chaotic systems. Nonlinear Dyn 81:151\u2013168. https:\/\/doi.org\/10.1007\/s11071-015-1979-3","journal-title":"Nonlinear Dyn"},{"key":"19472_CR32","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/s42452-022-04972-7","volume":"4","author":"S Hraoui","year":"2022","unstructured":"Hraoui S, JarJar A (2022) Single Feistel lapse acting on reduced ASCII codes followed by a genetic crossover. SN Appl Sci 4:113. https:\/\/doi.org\/10.1007\/s42452-022-04972-7","journal-title":"SN Appl Sci"},{"key":"19472_CR33","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09237-2","author":"Y Niu","year":"2020","unstructured":"Niu Y, Zhou Z, Zhang X (2020) An image encryption approach based on chaotic maps and genetic operations. Multimedia Tools Appl. https:\/\/doi.org\/10.1007\/s11042-020-09237-2","journal-title":"Multimedia Tools Appl"},{"key":"19472_CR34","doi-asserted-by":"publisher","first-page":"5823","DOI":"10.1007\/s00500-021-06567-7","volume":"26","author":"Y Qobbi","year":"2022","unstructured":"Qobbi Y, Jarjar A, Essaid M, Benazzi A (2022) Image encryption algorithm based on genetic operations and chaotic DNA encoding. Soft Comput 26:5823\u20135832. https:\/\/doi.org\/10.1007\/s00500-021-06567-7","journal-title":"Soft Comput"},{"key":"19472_CR35","doi-asserted-by":"publisher","first-page":"26927","DOI":"10.1007\/s11042-020-09058-3","volume":"79","author":"M Ghazvini","year":"2020","unstructured":"Ghazvini M, Mirzadi M, Parvar N (2020) A modified method for image encryption based on chaotic map and genetic algorithm. Multimedia Tools Appl 79:26927\u201326950. https:\/\/doi.org\/10.1007\/s11042-020-09058-3","journal-title":"Multimedia Tools Appl"},{"key":"19472_CR36","doi-asserted-by":"publisher","first-page":"2310","DOI":"10.1049\/iet-ipr.2019.1340","volume":"14","author":"J Zheng","year":"2020","unstructured":"Zheng J, Liu LF (2020) Novel image encryption by combining dynamic DNA sequence encryption and the improved 2D logistic sine map. IET Image Proc 14:2310\u20132320. https:\/\/doi.org\/10.1049\/iet-ipr.2019.1340","journal-title":"IET Image Proc"},{"key":"19472_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117861","volume":"206","author":"J Bhat","year":"2022","unstructured":"Bhat J, Moon AH (2022) Color image encryption and authentication using dynamic DNA encoding and Hyper Chaotic System. Expert Syst Appl 206:117861. https:\/\/doi.org\/10.1016\/j.eswa.2022.117861","journal-title":"Expert Syst Appl"},{"key":"19472_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2021.107316","volume":"143","author":"X Wang","year":"2021","unstructured":"Wang X, Zhao M (2021) An image encryption algorithm based on hyperchaotic system and DNA coding. Opt Laser Technol 143:107316. https:\/\/doi.org\/10.1016\/j.optlastec.2021.107316","journal-title":"Opt Laser Technol"},{"key":"19472_CR39","doi-asserted-by":"publisher","first-page":"17497","DOI":"10.1007\/s11042-019-08352-z","volume":"79","author":"B Mondal","year":"2020","unstructured":"Mondal B, Mandal T (2020) A secure image encryption scheme based on genetic operations and a new hybrid pseudo random number generator. Multimedia Tools Appl 79:17497\u201317520. https:\/\/doi.org\/10.1007\/s11042-019-08352-z","journal-title":"Multimedia Tools Appl"},{"key":"19472_CR40","doi-asserted-by":"publisher","first-page":"822","DOI":"10.1016\/j.cnsns.2010.04.039","volume":"16","author":"A Kanso","year":"2011","unstructured":"Kanso A (2011) Self-shrinking chaotic stream ciphers. Commun Nonlinear Sci Numer Simulat 16:822\u2013836. https:\/\/doi.org\/10.1016\/j.cnsns.2010.04.039","journal-title":"Commun Nonlinear Sci Numer Simulat"},{"key":"19472_CR41","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1080\/00029890.1981.11995301","volume":"88","author":"LE Dubins","year":"1981","unstructured":"Dubins LE, Freedman DA (1981) The american mathematical. Am. Math. Mon. 88:485\u2013494","journal-title":"Am. Math. Mon."},{"key":"19472_CR42","doi-asserted-by":"publisher","first-page":"e01551","DOI":"10.1016\/j.sciaf.2023.e01551","volume":"19","author":"Y Qobbi","year":"2023","unstructured":"Qobbi Y, Abid A, Jarjar M, EL Kaddouhi S, Jarjar A, Benazzi A (2023) Adaptation of a genetic operator and a dynamic S-box for chaotic encryption of medical and color images. Scientific African 19:e01551. https:\/\/doi.org\/10.1016\/j.sciaf.2023.e01551","journal-title":"Scientific African"},{"key":"19472_CR43","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1918\/4\/042009","volume":"1918","author":"Z Qowi","year":"2021","unstructured":"Qowi Z, Hudallah N (2021) Combining Cesar cipher and hill cipher in the generating encryption key on the vigenere cipher algorithm. J Phys: Conf Ser 1918:042009. https:\/\/doi.org\/10.1088\/1742-6596\/1918\/4\/042009","journal-title":"J Phys: Conf Ser"},{"issue":"4","key":"19472_CR44","first-page":"1372","volume":"35","author":"PN Srinivasu","year":"2022","unstructured":"Srinivasu PN, Md Norwawi N, Amiripalli SS, Deepalakshmi P (2022) secured compression for 2D medical images through the manifold and fuzzy trapezoidal correlation function. GU J Sci 35(4):1372\u20131391","journal-title":"GU J Sci"},{"issue":"9","key":"19472_CR45","doi-asserted-by":"publisher","first-page":"1850115","DOI":"10.1142\/S0217984918501154","volume":"32","author":"M Kaur","year":"2018","unstructured":"Kaur M, Kumar V (2018) Fourier Mellin moment-based intertwining map for image encryption. Modern Phys Lett B. 32(9):1850115. https:\/\/doi.org\/10.1142\/S0217984918501154","journal-title":"Modern Phys Lett B."},{"issue":"8","key":"19472_CR46","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1080\/13682199.2018.1505327","volume":"66","author":"M Kaur","year":"2018","unstructured":"Kaur M, Kumar V (2018) Parallel non-dominated sorting genetic algorithm II-based image encryption technique. Imaging Sci J 66(8):453\u2013462. https:\/\/doi.org\/10.1080\/13682199.2018.1505327","journal-title":"Imaging Sci J"},{"key":"19472_CR47","unstructured":"The USC-SIPI database: http:\/\/sipi.usc.edu\/database"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19472-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-19472-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19472-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,24]],"date-time":"2025-05-24T08:40:38Z","timestamp":1748076038000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-19472-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,3]]},"references-count":47,"journal-issue":{"issue":"17","published-online":{"date-parts":[[2025,5]]}},"alternative-id":["19472"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-19472-6","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2024,7,3]]},"assertion":[{"value":"23 May 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 May 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 May 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 July 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}}]}}