{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:02:06Z","timestamp":1757617326098,"version":"3.44.0"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"28","license":[{"start":{"date-parts":[[2025,1,14]],"date-time":"2025-01-14T00:00:00Z","timestamp":1736812800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,14]],"date-time":"2025-01-14T00:00:00Z","timestamp":1736812800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-20534-y","type":"journal-article","created":{"date-parts":[[2025,1,14]],"date-time":"2025-01-14T02:33:46Z","timestamp":1736822026000},"page":"33719-33770","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Real-time source authentication of shared videos in online social media"],"prefix":"10.1007","volume":"84","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3915-7393","authenticated-orcid":false,"given":"Mohd","family":"Shaliyar","sequence":"first","affiliation":[]},{"given":"Khurram","family":"Mustafa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,14]]},"reference":[{"key":"20534_CR1","unstructured":"\u201cNumber of social media users 2027 | Statista.\u201d [Online]. Available: https:\/\/www.statista.com\/statistics\/278414\/number-of-worldwide-social-network-users\/. [Accessed: 25-June-2022]."},{"key":"20534_CR2","unstructured":"Banaji S, With RB, Agarwal A, Passanha N, Pravin MS (2019) WhatsApp vigilantes: an exploration of citizen reception and circulation of WhatsApp misinformation linked to mob violence in India. https:\/\/eprints.lse.ac.uk\/104316\/"},{"key":"20534_CR3","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/j.patrec.2021.02.011","volume":"145","author":"R Sinhal","year":"2021","unstructured":"Sinhal R, Jain DK, Ansari IA (2021) Machine learning based blind color image watermarking scheme forcopyright protection. Pattern Recognit Lett 145:171\u2013177. https:\/\/doi.org\/10.1016\/j.patrec.2021.02.011","journal-title":"Pattern Recognit Lett"},{"key":"20534_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09918-y","author":"S Koley","year":"2020","unstructured":"Koley S (2020) Visual attention model based dual watermarking for simultaneous image copyright protection andauthentication. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-020-09918-y","journal-title":"Multimed Tools Appl"},{"issue":"18","key":"20534_CR5","doi-asserted-by":"publisher","first-page":"27593","DOI":"10.1007\/s11042-021-11064-y","volume":"80","author":"R Thanki","year":"2021","unstructured":"Thanki R, Kothari A, Borra S (2021) Hybrid, blind and robust image watermarking: RDWT \u2013 NSCT basedsecure approach for telemedicine applications. Multimed Tools Appl 80(18):27593\u201327613. https:\/\/doi.org\/10.1007\/s11042-021-11064-y","journal-title":"Multimed Tools Appl"},{"key":"20534_CR6","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1016\/j.patrec.2019.06.004","volume":"125","author":"S Bhalerao","year":"2019","unstructured":"Bhalerao S, Ansari IA, Kumar A, Jain DK (2019) A reversible and multipurpose ECG data hiding technique for telemedicine applications. Pattern Recognit Lett 125:463\u2013473. https:\/\/doi.org\/10.1016\/j.patrec.2019.06.004","journal-title":"Pattern Recognit Lett"},{"key":"20534_CR7","doi-asserted-by":"publisher","first-page":"101665","DOI":"10.1016\/j.bspc.2019.101665","volume":"55","author":"K Swaraja","year":"2020","unstructured":"Swaraja K, Meenakshi K, Kora P (2020) An optimized blind dual medical image watermarking framework for tamperlocalization and content authentication in secured telemedicine. Biomed Signal Process Control 55:101665. https:\/\/doi.org\/10.1016\/j.bspc.2019.101665","journal-title":"Biomed Signal Process Control"},{"issue":"8","key":"20534_CR8","doi-asserted-by":"publisher","first-page":"11605","DOI":"10.1007\/s11042-022-12273-9","volume":"81","author":"PV Sanivarapu","year":"2022","unstructured":"Sanivarapu PV (2022) Adaptive tamper detection watermarking scheme for medical images in transform domain. Multimed Tools Appl 81(8):11605\u201311619. https:\/\/doi.org\/10.1007\/s11042-022-12273-9","journal-title":"Multimed Tools Appl"},{"issue":"11\u201312","key":"20534_CR9","doi-asserted-by":"publisher","first-page":"7339","DOI":"10.1007\/s11042-019-08314-5","volume":"79","author":"C Kumar","year":"2020","unstructured":"Kumar C, Singh AK, Kumar P (2020) Dual watermarking: An approach for securing digital documents. Multimed Tools Appl 79(11\u201312):7339\u20137354. https:\/\/doi.org\/10.1007\/s11042-019-08314-5","journal-title":"Multimed Tools Appl"},{"key":"20534_CR10","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1016\/j.future.2016.11.023","volume":"86","author":"AK Singh","year":"2018","unstructured":"Singh AK, Kumar B, Singh SK, Ghrera SP, Mohan A (2018) Multiple watermarking technique forsecuring online social network contents using Back Propagation Neural Network. Futur Gener Comput Syst 86:926\u2013939. https:\/\/doi.org\/10.1016\/j.future.2016.11.023","journal-title":"Futur Gener Comput Syst"},{"issue":"5","key":"20534_CR11","doi-asserted-by":"publisher","first-page":"1304","DOI":"10.1109\/78.757218","volume":"47","author":"IW Selesnick","year":"1999","unstructured":"Selesnick IW (1999) The slantlet transform. IEEE Trans Signal Process 47(5):1304\u20131313","journal-title":"IEEE Trans Signal Process"},{"issue":"10","key":"20534_CR12","doi-asserted-by":"publisher","first-page":"12493","DOI":"10.1007\/s11042-017-4898-0","volume":"77","author":"R Bamal","year":"2018","unstructured":"Bamal R, Kasana SS (2018) Slantlet based hybrid watermarking technique for medical images. Multimed Tools Appl 77(10):12493\u201312518. https:\/\/doi.org\/10.1007\/s11042-017-4898-0","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"20534_CR13","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1016\/j.bspc.2006.12.001.1007\/s11227-021-03886-2","volume":"1","author":"M Maitra","year":"2006","unstructured":"Maitra M, Chatterjee A (2006) A Slantlet transform based intelligent system for magnetic resonance braiimage classification. Biomed Signal Process Control 1(4):299\u2013306. https:\/\/doi.org\/10.1016\/j.bspc.2006.12.001.1007\/s11227-021-03886-2","journal-title":"Biomed Signal Process Control"},{"issue":"6","key":"20534_CR14","doi-asserted-by":"publisher","first-page":"2077","DOI":"10.1007\/s11554-019-00937-z","volume":"17","author":"R Sinhal","year":"2020","unstructured":"Sinhal R, Ansari IA, Jain DK (2020) Real-time watermark reconstruction for the identification of sourceinformation based on deep neural network. J Real-Time Image Proc 17(6):2077\u20132095. https:\/\/doi.org\/10.1007\/s11554-019-00937-z","journal-title":"J Real-Time Image Proc"},{"issue":"4","key":"20534_CR15","doi-asserted-by":"publisher","first-page":"3175","DOI":"10.1007\/s10586-020-03078-2","volume":"23","author":"E Rayachoti","year":"2020","unstructured":"Rayachoti E, Tirumalasetty S, Prathipati SC (2020) SLT based watermarking system for secure telemedicine. Cluster Comput 23(4):3175\u20133184. https:\/\/doi.org\/10.1007\/s10586-020-03078-2","journal-title":"Cluster Comput"},{"key":"20534_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09254-1","author":"JJ Shen","year":"2020","unstructured":"Shen JJ, Lee CF, Hsu FW, Agrawal S (2020) A self-embedding fragile image authentication based onsingular value decomposition. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-020-09254-1","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"20534_CR17","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1002\/j.1538-7305.1950.tb00463.x","volume":"26","author":"RW Hamming","year":"1950","unstructured":"Hamming RW (1950) Error detecting and error correcting codes. Bell System Tech J 26(2):147\u2013160","journal-title":"Bell System Tech J"},{"issue":"9","key":"20534_CR18","doi-asserted-by":"publisher","first-page":"1462","DOI":"10.1016\/j.jss.2011.02.029","volume":"84","author":"C-C Chang","year":"2011","unstructured":"Chang C-C, Chen K-N, Lee C-F, Liu L-J (2011) A secure fragile watermarking scheme based on chaos- andhamming code. J Syst Softw 84(9):1462\u20131470","journal-title":"J Syst Softw"},{"key":"20534_CR19","doi-asserted-by":"crossref","unstructured":"Abdul W, Carr\u00e9 P, Gaborit P\u00a0(2013) Error correcting codes for robust color wavelet Watermarking. EURASIP J Inf Secur (pp 1\u201317) https:\/\/link.springer.com\/article\/10.1186\/1687-417X-2013-1","DOI":"10.1186\/1687-417X-2013-1"},{"issue":"43\u201344","key":"20534_CR20","doi-asserted-by":"publisher","first-page":"32881","DOI":"10.1007\/s11042-020-09716-6","volume":"79","author":"KJ Giri","year":"2020","unstructured":"Giri KJ, Quadri SMK, Bashir R, Bhat JI (2020) DWT based color image watermarking: a review. MultimedTools Appl 79(43\u201344):32881\u201332895. https:\/\/doi.org\/10.1007\/s11042-020-09716-6","journal-title":"MultimedTools Appl"},{"key":"20534_CR21","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1016\/j.image.2018.06.015","volume":"68","author":"F Madine","year":"2018","unstructured":"Madine F, Akhaee MA, Zarmehi N (2018) A multiplicative video watermarking robust to H.264\/AVC compression standard. Signal Process Image Commun 68:229\u2013240. https:\/\/doi.org\/10.1016\/j.image.2018.06.015","journal-title":"Signal Process Image Commun"},{"key":"20534_CR22","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1016\/j.asoc.2018.10.043","volume":"74","author":"A Rajpal","year":"2019","unstructured":"Rajpal A, Mishra A, Bala R (2019) A Novel fuzzy frame selection based watermarking scheme for MPEG-4 videos using Bi-directional extreme learning machine. Appl Soft Comput J 74:603\u2013620. https:\/\/doi.org\/10.1016\/j.asoc.2018.10.043","journal-title":"Appl Soft Comput J"},{"issue":"8\u20139","key":"20534_CR23","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1016\/j.image.2011.07.004","volume":"26","author":"PC Su","year":"2011","unstructured":"Su PC, Wu CS, Chen IF, Wu CY, Wu YC (2011) A practical design of digital video watermarking in H.264\/AVC for content authentication. Signal Process Image Commun 26(8\u20139):413\u2013426. https:\/\/doi.org\/10.1016\/j.image.2011.07.004","journal-title":"Signal Process Image Commun"},{"key":"20534_CR24","doi-asserted-by":"publisher","first-page":"115935","DOI":"10.1016\/j.image.2020.115935","volume":"87","author":"L Chen","year":"2020","unstructured":"Chen L, Zhao J (2020) A robust blind watermarking algorithm for depth-image-based rendering 3D images. Signal Process Image Commun 87:115935. https:\/\/doi.org\/10.1016\/j.image.2020.115935","journal-title":"Signal Process Image Commun"},{"key":"20534_CR25","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1016\/j.jvcir.2018.02.007","volume":"52","author":"A Cedillo-Hernandez","year":"2018","unstructured":"Cedillo-Hernandez A, Cedillo-Hernandez M, Nakano Miyatake M, Perez Meana H (2018) A spatiotemporal saliency-modulated JND profile applied to video watermarking. J Vis Commun Image Represent 52:106\u2013117. https:\/\/doi.org\/10.1016\/j.jvcir.2018.02.007","journal-title":"J Vis Commun Image Represent"},{"key":"20534_CR26","doi-asserted-by":"publisher","unstructured":"Wu X, Ma P, Jin Z, Wu Y, Han W, Ou W (2022) A novel zero-watermarking scheme based on NSCT-SVD and blockchain for video copyright. Eurasip J Wirel Commun Netw 2022. https:\/\/doi.org\/10.1186\/s13638-022-02090-x, https:\/\/link.springer.com\/article\/10.1186\/s13638-022-02090-x","DOI":"10.1186\/s13638-022-02090-x"},{"issue":"4","key":"20534_CR27","doi-asserted-by":"publisher","first-page":"2997","DOI":"10.1007\/s10462-021-10070-8","volume":"55","author":"M Kumar","year":"2022","unstructured":"Kumar M, Aggarwal J, Rani A, Stephan T, Shankar A, Mirjalili S (2022) Secure video communication using firefly optimization and visual cryptography. Artif Intell Rev 55(4):2997\u20133017. https:\/\/doi.org\/10.1007\/s10462-021-10070-8","journal-title":"Artif Intell Rev"},{"issue":"5","key":"20534_CR28","doi-asserted-by":"publisher","first-page":"7479","DOI":"10.1007\/s11042-020-09982-4","volume":"80","author":"A Hammami","year":"2021","unstructured":"Hammami A, Ben Hamida A, Ben Amar C (2021) Blind semi-fragile watermarking scheme for video authentication in video surveillance context. Multimed Tools Appl 80(5):7479\u20137513. https:\/\/doi.org\/10.1007\/s11042-020-09982-4","journal-title":"Multimed Tools Appl"},{"key":"20534_CR29","doi-asserted-by":"publisher","unstructured":"Velazquez-Garcia L, Cedillo-Hernandez A, Cedillo-Hernandez M, Nakano-Miyatake M, Perez-Meana H (2022) Imperceptible\u2013visible watermarking for copyright protection of digital videos based on temporal codes. Signal Process Image Commun 102:116593. https:\/\/doi.org\/10.1016\/j.image.2021.116593","DOI":"10.1016\/j.image.2021.116593"},{"issue":"5","key":"20534_CR30","doi-asserted-by":"publisher","first-page":"953","DOI":"10.1007\/s00530-021-00765-x","volume":"27","author":"G Dhevanandhini","year":"2021","unstructured":"Dhevanandhini G, Yamuna G (2021) An effective and secure video watermarking using hybrid technique. Multimed Syst 27(5):953\u2013967. https:\/\/doi.org\/10.1007\/s00530-021-00765-x","journal-title":"Multimed Syst"},{"issue":"35\u201336","key":"20534_CR31","doi-asserted-by":"publisher","first-page":"26837","DOI":"10.1007\/s11042-020-09258-x","volume":"79","author":"R Shoitan","year":"2020","unstructured":"Shoitan R, Moussa MM, Elshoura SM (2020) A robust video watermarking scheme based on Laplacian pyramid, SVD, and DWT with improved robustness towards geometric attacks via SURF. Multimed Tools Appl 79(35\u201336):26837\u201326860. https:\/\/doi.org\/10.1007\/s11042-020-09258-x","journal-title":"Multimed Tools Appl"},{"issue":"13","key":"20534_CR32","doi-asserted-by":"publisher","first-page":"16419","DOI":"10.1007\/s11042-017-5213-9","volume":"77","author":"KM Singh","year":"2018","unstructured":"Singh KM (2018) A robust rotation resilient video watermarking scheme based on the SIFT. Multimed Tools Appl 77(13):16419\u201316444. https:\/\/doi.org\/10.1007\/s11042-017-5213-9","journal-title":"Multimed Tools Appl"},{"key":"20534_CR33","doi-asserted-by":"publisher","unstructured":"Saleh A, Fouad Y, Mahar K, Elsayed WG, El-Borai MM (2022) Unsupervised video frame clustering approach for video watermarking using sift features and contourlet transform. Available at\u00a0https:\/\/doi.org\/10.2139\/ssrn.4250247","DOI":"10.2139\/ssrn.4250247"},{"key":"20534_CR34","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-022-03771-7","author":"E Farri","year":"2022","unstructured":"Farri E, Ayubi P (2022) A robust digital video watermarking based on CT-SVD domain and chaotic DNA sequences for copyright protection. J Ambient Intell Humaniz Comput. https:\/\/doi.org\/10.1007\/s12652-022-03771-7","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"4","key":"20534_CR35","doi-asserted-by":"publisher","first-page":"6019","DOI":"10.1007\/s11042-020-09904-4","volume":"80","author":"Y Gao","year":"2021","unstructured":"Gao Y, Kang X, Chen Y (2021) A robust video zero-watermarking based on deep convolutional neural network and self-organizing map in polar complex exponential transform domain. Multimed Tools Appl 80(4):6019\u20136039. https:\/\/doi.org\/10.1007\/s11042-020-09904-4","journal-title":"Multimed Tools Appl"},{"issue":"23","key":"20534_CR36","doi-asserted-by":"publisher","first-page":"33375","DOI":"10.1007\/s11042-022-13145-y","volume":"81","author":"M Du","year":"2022","unstructured":"Du M, Luo T, Xu H, Song Y, Wang C, Li L (2022) Robust HDR video watermarking method based on the HVS model and T-QR. Multimed Tools Appl 81(23):33375\u201333395. https:\/\/doi.org\/10.1007\/s11042-022-13145-y","journal-title":"Multimed Tools Appl"},{"key":"20534_CR37","unstructured":"\u201cXiph.org\u202f:: Derf\u2019s Test Media Collection.\u201d [Online]. Available: https:\/\/media.xiph.org\/video\/derf\/. [Accessed: 03-Jan-2023]"},{"issue":"4","key":"20534_CR38","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/s40009-014-0241-8","volume":"37","author":"AK Singh","year":"2014","unstructured":"Singh AK, Dave M, Mohan A (2014) Hybrid technique for robust and imperceptible image watermarking in DWT-DCT-SVD domain. Natl Acad Sci Lett 37(4):351\u2013358. https:\/\/doi.org\/10.1007\/s40009-014-0241-8","journal-title":"Natl Acad Sci Lett"},{"key":"20534_CR39","doi-asserted-by":"crossref","unstructured":"Fridrich J, Goj M (1999) Comparing robustness of watermarking techniques 3657 pp. 214\u2013225","DOI":"10.1117\/12.344671"},{"issue":"1","key":"20534_CR40","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.jss.2013.09.033","volume":"88","author":"R Thabit","year":"2014","unstructured":"Thabit R, Khoo BE (2014) Robust reversible watermarking scheme using Slantlet transform matrix. J Syst Softw 88(1):74\u201386. https:\/\/doi.org\/10.1016\/j.jss.2013.09.033","journal-title":"J Syst Softw"},{"issue":"15","key":"20534_CR41","doi-asserted-by":"publisher","first-page":"19659","DOI":"10.1007\/s11042-017-5340-3","volume":"77","author":"A Bhardwaj","year":"2018","unstructured":"Bhardwaj A, Verma VS, Jha RK (2018) Robust video watermarking using significant frame selection based on coefficient difference of lifting wavelet transform. Multimed Tools Appl 77(15):19659\u201319678. https:\/\/doi.org\/10.1007\/s11042-017-5340-3","journal-title":"Multimed Tools Appl"},{"key":"20534_CR42","unstructured":"Singh P (2008) A Survey of Digital Watermarking Techniques, Applications and Attacks. Certified International Journal of Engineering and Innovative Technology (IJEIT, 9001(9). https:\/\/www.researchgate.net\/publication\/342344131"},{"key":"20534_CR43","unstructured":"Mob Lynching in India: An Overview\u202f\u00bb. (n.d.). Retrieved July 31, 2024, from https:\/\/www.lawaudience.com\/mob-lynching-in-india-an-overview\/"},{"key":"20534_CR44","unstructured":"Mob Lynching: WhatsApp Says no to Trace Origin of Fake Messages, Says Cannot Build Software For it | India.com. (n.d.). Retrieved July 31, 2024, from https:\/\/www.india.com\/news\/india\/mob-lynching-whatsapp-says-no-to-trace-origin-of-fake-messages-says-cannot-build-software-for-it-3254536\/"},{"key":"20534_CR45","unstructured":"WhatsApp rejects India\u2019s demand to track origin of message, says cannot undermine privacy - India News News. (n.d.). Retrieved July 31, 2024, from https:\/\/www.wionews.com\/india-news\/whatsapp-rejects-indias-demand-to-track-origin-of-message-says-cannot-undermine-privacy-161162"},{"key":"20534_CR46","unstructured":"Chellappa R, Theodoridis S (2013) Academic press library in signal processing: signal processing theory and machine learning. p 1480"},{"key":"20534_CR47","doi-asserted-by":"publisher","first-page":"38999","DOI":"10.1007\/s11042-023-16620-2","volume":"83","author":"BS Kapre","year":"2024","unstructured":"Kapre BS, Rajurkar AM, Guru DS (2024) The blind robust video watermarking scheme in video surveillance context. Multimed Tools Appl 83:38999\u201339025. https:\/\/doi.org\/10.1007\/s11042-023-16620-2","journal-title":"Multimed Tools Appl"},{"key":"20534_CR48","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-024-18854-0","author":"S Dhahri","year":"2024","unstructured":"Dhahri S, Moulahi T (2024) Video watermarking technique using motion vectors to video authentication. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-024-18854-0","journal-title":"Multimed Tools Appl"},{"key":"20534_CR49","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.osnem.2018.12.001","volume":"9","author":"S Shelke","year":"2019","unstructured":"Shelke S, Attar V (2019) Source detection of rumor in social network\u2013a review. Online Social Networks Media 9:30\u201342. https:\/\/doi.org\/10.1016\/j.osnem.2018.12.001","journal-title":"Online Social Networks Media"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-20534-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-20534-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-20534-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T03:33:18Z","timestamp":1757129598000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-20534-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,14]]},"references-count":49,"journal-issue":{"issue":"28","published-online":{"date-parts":[[2025,8]]}},"alternative-id":["20534"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-20534-y","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2025,1,14]]},"assertion":[{"value":"24 March 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 October 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 December 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 January 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"The authors declare that they have no conflict of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests"}}]}}