{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T18:12:29Z","timestamp":1764785549874,"version":"3.44.0"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"28","license":[{"start":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T00:00:00Z","timestamp":1735948800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T00:00:00Z","timestamp":1735948800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100002322","name":"Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior","doi-asserted-by":"publisher","award":["001"],"award-info":[{"award-number":["001"]}],"id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-20537-9","type":"journal-article","created":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T04:22:09Z","timestamp":1735964529000},"page":"33331-33352","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["FPGA implementation of low cost and low power chaotic encryption scheme based on a discrete-space chaotic map"],"prefix":"10.1007","volume":"84","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9217-5577","authenticated-orcid":false,"given":"Jo\u00e3o In\u00e1cio","family":"Moreira Bezerra","sequence":"first","affiliation":[]},{"given":"Gustavo","family":"Machado","sequence":"additional","affiliation":[]},{"given":"Rafael","family":"Iankowski Soares","sequence":"additional","affiliation":[]},{"given":"Vin\u00edcius","family":"Valduga de Almeida Camargo","sequence":"additional","affiliation":[]},{"given":"Alexandre","family":"Molter","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,4]]},"reference":[{"issue":"2011","key":"20537_CR1","first-page":"1","volume":"1","author":"D Evans","year":"2011","unstructured":"Evans D (2011) The internet of things: how the next evolution of the internet is changing everything. CISCO White Paper 1(2011):1\u201311","journal-title":"CISCO White Paper"},{"issue":"1","key":"20537_CR2","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/s11277-018-5615-7","volume":"100","author":"SK Rao","year":"2018","unstructured":"Rao SK, Prasad R (2018) Impact of 5g technologies on industry 4.0. Wireless Personal Commun 100(1):145\u2013159","journal-title":"Wireless Personal Commun"},{"key":"20537_CR3","doi-asserted-by":"crossref","unstructured":"Janveja M, Paul B, Trivedi G, Vijayakanthi G, Agrawal A, Jan P, N\u011bmec Z (2020) Design of efficient aes architecture for secure ecg signal transmission for low-power iot applications. In: 2020 30th International Conference Radioelektronika (RADIOELEKTRONIKA), IEEE, pp 1\u20136","DOI":"10.1109\/RADIOELEKTRONIKA49387.2020.9092417"},{"issue":"9","key":"20537_CR4","first-page":"3624","volume":"70","author":"X Zheng","year":"2023","unstructured":"Zheng X, Wu J, Lin X, Gao H, Cai S, Xiong X (2023) Hardware\/software co-design of cryptographic soc based on risc-v virtual prototype. IEEE Trans Circuits Syst II Express Briefs 70(9):3624\u20133628","journal-title":"IEEE Trans Circuits Syst II Express Briefs"},{"issue":"1","key":"20537_CR5","doi-asserted-by":"publisher","first-page":"38","DOI":"10.3390\/drones7010038","volume":"7","author":"M Alawida","year":"2023","unstructured":"Alawida M, Teh JS, Alshoura W (2023) A new image encryption algorithm based on dna state machine for uav data encryption. Drones 7(1):38","journal-title":"Drones"},{"issue":"10","key":"20537_CR6","doi-asserted-by":"publisher","first-page":"6663","DOI":"10.1007\/s11227-019-02878-7","volume":"75","author":"A Arab","year":"2019","unstructured":"Arab A, Rostami MJ, Ghavami B (2019) An image encryption method based on chaos system and aes algorithm. J Supercomput 75(10):6663\u20136682","journal-title":"J Supercomput"},{"key":"20537_CR7","doi-asserted-by":"publisher","first-page":"111235","DOI":"10.1016\/j.chaos.2021.111235","volume":"151","author":"JIM Bezerra","year":"2021","unstructured":"Bezerra JIM, Almeida Camargo VV, Molter A (2021) A new efficient permutation-diffusion encryption algorithm based on a chaotic map. Chaos, Solitons & Fractals 151:111235","journal-title":"Chaos, Solitons & Fractals"},{"key":"20537_CR8","doi-asserted-by":"publisher","first-page":"112781","DOI":"10.1016\/j.chaos.2022.112781","volume":"165","author":"Q Lai","year":"2022","unstructured":"Lai Q, Yang L, Liu Y (2022) Design and realization of discrete memristive hyperchaotic map with application in image encryption. Chaos, Solitons & Fractals 165:112781","journal-title":"Chaos, Solitons & Fractals"},{"key":"20537_CR9","doi-asserted-by":"publisher","first-page":"113160","DOI":"10.1016\/j.chaos.2023.113160","volume":"168","author":"JIM Bezerra","year":"2023","unstructured":"Bezerra JIM, Machado G, Molter A, Soares RI, Camargo V (2023) A novel simultaneous permutation-diffusion image encryption scheme based on a discrete space map. Chaos, Solitons & Fractals 168:113160","journal-title":"Chaos, Solitons & Fractals"},{"key":"20537_CR10","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.ins.2020.10.048","volume":"550","author":"MZ Talhaoui","year":"2021","unstructured":"Talhaoui MZ, Wang X (2021) A new fractional one dimensional chaotic map and its application in high-speed image encryption. Inf Sci 550:13\u201326","journal-title":"Inf Sci"},{"key":"20537_CR11","doi-asserted-by":"publisher","first-page":"108745","DOI":"10.1016\/j.sigpro.2022.108745","volume":"202","author":"S Gao","year":"2023","unstructured":"Gao S, Wu R, Wang X, Wang J, Li Q, Wang C, Tang X (2023) A 3d model encryption scheme based on a cascaded chaotic system. Signal Process 202:108745","journal-title":"Signal Process"},{"issue":"1","key":"20537_CR12","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/s11042-022-13280-6","volume":"82","author":"Y Xian","year":"2023","unstructured":"Xian Y, Wang X, Zhang Y, Yan X, Leng Z (2023) A novel chaotic image encryption with fsv based global bit-level chaotic permutation. Multimed Tool Appl 82(1):407\u2013426","journal-title":"Multimed Tool Appl"},{"issue":"9","key":"20537_CR13","doi-asserted-by":"publisher","first-page":"2137","DOI":"10.1109\/TIFS.2018.2812080","volume":"13","author":"M Preishuber","year":"2018","unstructured":"Preishuber M, H\u00fctter T, Katzenbeisser S, Uhl A (2018) Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Trans Inf Forensics Secur 13(9):2137\u20132150","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"20537_CR14","doi-asserted-by":"publisher","first-page":"1151","DOI":"10.1109\/TIFS.2019.2935415","volume":"15","author":"S Guo","year":"2019","unstructured":"Guo S, Xiang T, Li X, Yang Y (2019) Peid: A perceptually encrypted image database for visual security evaluation. IEEE Trans Inf Forensics Secur 15:1151\u20131163","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"20537_CR15","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/s11071-014-1272-x","volume":"77","author":"I Koyuncu","year":"2014","unstructured":"Koyuncu I, Ozcerit AT, Pehlivan I (2014) Implementation of fpga-based real time novel chaotic oscillator. Nonlinear Dyn 77:49\u201359","journal-title":"Nonlinear Dyn"},{"key":"20537_CR16","doi-asserted-by":"crossref","unstructured":"Capligins F, Litvinenko A, Aboltins A, Kolosovs D (2021) Fpga implementation and study of synchronization of modified chua\u2019s circuit-based chaotic oscillator for high-speed secure communications. In: 2020 IEEE 8th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE), IEEE, pp 1\u20136","DOI":"10.1109\/AIEEE51419.2021.9435783"},{"issue":"3","key":"20537_CR17","doi-asserted-by":"publisher","first-page":"1061","DOI":"10.1007\/s00034-020-01521-8","volume":"40","author":"T Bonny","year":"2021","unstructured":"Bonny T (2021) Chaotic or hyper-chaotic oscillator? numerical solution, circuit design, matlab hdl-coder implementation, vhdl code, security analysis, and fpga realization. Circ Syst Signal Process 40(3):1061\u20131088","journal-title":"Circ Syst Signal Process"},{"issue":"2","key":"20537_CR18","doi-asserted-by":"publisher","first-page":"788","DOI":"10.3390\/app11020788","volume":"11","author":"A Sambas","year":"2021","unstructured":"Sambas A, Vaidyanathan S, Bonny T, Zhang S, Hidayat Y, Gundara G, Mamat M (2021) Mathematical model and fpga realization of a multi-stable chaotic dynamical system with a closed butterfly-like curve of equilibrium points. Appl Sci 11(2):788","journal-title":"Appl Sci"},{"key":"20537_CR19","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.micpro.2019.02.012","volume":"66","author":"M Tuna","year":"2019","unstructured":"Tuna M, Al\u00e7\u0131n M, Koyuncu \u0130, Fidan CB, Pehlivan \u0130 (2019) High speed fpga-based chaotic oscillator design. Microprocess Microsyst 66:72\u201380","journal-title":"Microprocess Microsyst"},{"key":"20537_CR20","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.chaos.2018.12.021","volume":"119","author":"B Karakaya","year":"2019","unstructured":"Karakaya B, G\u00fclten A, Frasca M (2019) A true random bit generator based on a memristive chaotic circuit: analysis, design and fpga implementation. Chaos, Solitons & Fractals 119:143\u2013149","journal-title":"Chaos, Solitons & Fractals"},{"key":"20537_CR21","doi-asserted-by":"publisher","first-page":"68057","DOI":"10.1109\/ACCESS.2022.3181424","volume":"10","author":"A Sambas","year":"2022","unstructured":"Sambas A, Vaidyanathan S, Zhang X, Koyuncu I, Bonny T, Tuna M, Al\u00e7in M, Zhang S, Sulaiman IM, Awwal AM et al (2022) A novel 3d chaotic system with line equilibrium: multistability, integral sliding mode control, electronic circuit, fpga implementation and its image encryption. IEEE Access 10:68057\u201368074","journal-title":"IEEE Access"},{"issue":"2","key":"20537_CR22","doi-asserted-by":"publisher","first-page":"625","DOI":"10.3390\/app11020625","volume":"11","author":"F Dridi","year":"2021","unstructured":"Dridi F, El Assad S, El Hadj Youssef W, Machhout M, Lozi R (2021) The design and fpga-based implementation of a stream cipher based on a secure chaotic generator. Appl Sci 11(2):625","journal-title":"Appl Sci"},{"issue":"1","key":"20537_CR23","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/s11220-020-00301-7","volume":"21","author":"FS Hasan","year":"2020","unstructured":"Hasan FS, Saffo MA (2020) Fpga hardware co-simulation of image encryption using stream cipher based on chaotic maps. Sensing and Imaging 21(1):35","journal-title":"Sensing and Imaging"},{"key":"20537_CR24","doi-asserted-by":"publisher","first-page":"103644","DOI":"10.1016\/j.micpro.2020.103644","volume":"80","author":"M Madani","year":"2021","unstructured":"Madani M, Tanougast C (2021) Fpga implementation of an enhanced chaotic-kasumi block cipher. Microprocess Microsyst 80:103644","journal-title":"Microprocess Microsyst"},{"issue":"31\u201332","key":"20537_CR25","doi-asserted-by":"publisher","first-page":"23203","DOI":"10.1007\/s11042-019-08517-w","volume":"79","author":"EA Hagras","year":"2020","unstructured":"Hagras EA, Saber M (2020) Low power and high-speed fpga implementation for 4d memristor chaotic system for image encryption. Multimed Tool Appl 79(31\u201332):23203\u201323222","journal-title":"Multimed Tool Appl"},{"issue":"19\u201320","key":"20537_CR26","doi-asserted-by":"publisher","first-page":"13841","DOI":"10.1007\/s11042-019-08592-z","volume":"79","author":"R Sivaraman","year":"2020","unstructured":"Sivaraman R, Rajagopalan S, Amirtharajan R (2020) Fpga based generic ro trng architecture for image confusion. Multimed Tool Appl 79(19\u201320):13841\u201313868","journal-title":"Multimed Tool Appl"},{"issue":"17","key":"20537_CR27","doi-asserted-by":"publisher","first-page":"23819","DOI":"10.1007\/s11042-022-12400-6","volume":"81","author":"B Ramakrishnan","year":"2022","unstructured":"Ramakrishnan B, Nkandeu Kamdeu PY, Natiq H, Pone JRM, Karthikeyan A, Kingni ST, Tiedeu A (2022) Image encryption with a josephson junction model embedded in fpga. Multimed Tool Appl 81(17):23819\u201323843","journal-title":"Multimed Tool Appl"},{"issue":"4","key":"20537_CR28","doi-asserted-by":"publisher","first-page":"775","DOI":"10.1007\/s11554-022-01220-4","volume":"19","author":"H Cai","year":"2022","unstructured":"Cai H, Sun J-Y, Gao Z-B, Zhang H (2022) A novel multi-wing chaotic system with fpga implementation and application in image encryption. J Real-Time Image Proc 19(4):775\u2013790","journal-title":"J Real-Time Image Proc"},{"issue":"06","key":"20537_CR29","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcat Chaos 8(06):1259\u20131284","journal-title":"Int J Bifurcat Chaos"},{"key":"20537_CR30","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.ins.2022.05.032","volume":"605","author":"L Teng","year":"2022","unstructured":"Teng L, Wang X, Xian Y (2022) Image encryption algorithm based on a 2d-clss hyperchaotic map using simultaneous permutation and diffusion. Inf Sci 605:71\u201385","journal-title":"Inf Sci"},{"issue":"1","key":"20537_CR31","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1007\/s11071-020-05503-y","volume":"100","author":"D Lambi\u0107","year":"2020","unstructured":"Lambi\u0107 D (2020) A new discrete-space chaotic map based on the multiplication of integer numbers and its application in s-box design. Nonlinear Dyn 100(1):699\u2013711","journal-title":"Nonlinear Dyn"},{"key":"20537_CR32","doi-asserted-by":"publisher","first-page":"102972","DOI":"10.1016\/j.micpro.2019.102972","volume":"73","author":"S Madhavapandian","year":"2020","unstructured":"Madhavapandian S, MaruthuPandi P (2020) Fpga implementation of highly scalable aes algorithm using modified mix column with gate replacement technique for security application in tcp\/ip. Microprocess Microsyst 73:102972","journal-title":"Microprocess Microsyst"},{"key":"20537_CR33","doi-asserted-by":"crossref","unstructured":"Zhang Y, Chen A, Tang Y, Dang J, Wang G (2020) Plaintext-related image encryption algorithm based on perceptron-like network. Inf, Sci","DOI":"10.1016\/j.ins.2020.03.054"},{"key":"20537_CR34","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1016\/j.ins.2014.02.156","volume":"273","author":"Y-Q Zhang","year":"2014","unstructured":"Zhang Y-Q, Wang X-Y (2014) A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice. Inf Sci 273:329\u2013351","journal-title":"Inf Sci"},{"key":"20537_CR35","doi-asserted-by":"crossref","unstructured":"Rukhin A, Soto J, Nechvatal J, Smid M, Barker E (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications. Technical report, Booz-allen and hamilton inc mclean va","DOI":"10.6028\/NIST.SP.800-22"},{"key":"20537_CR36","unstructured":"NIST: https:\/\/csrc.nist.gov\/projects\/random-bit-generation\/documentation-and-software. (Accessed on 08\/16\/2022) (2022)"},{"key":"20537_CR37","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1016\/j.matcom.2020.05.016","volume":"177","author":"A Alghafis","year":"2020","unstructured":"Alghafis A, Firdousi F, Khan M, Batool SI, Amin M (2020) An efficient image encryption scheme based on chaotic and deoxyribonucleic acid sequencing. Math Comput Simul 177:441\u2013466","journal-title":"Math Comput Simul"},{"key":"20537_CR38","doi-asserted-by":"publisher","first-page":"42227","DOI":"10.1109\/ACCESS.2018.2858839","volume":"6","author":"H Diab","year":"2018","unstructured":"Diab H (2018) An efficient chaotic image cryptosystem based on simultaneous permutation and diffusion operations. IEEE Access 6:42227\u201342244","journal-title":"IEEE Access"},{"issue":"08","key":"20537_CR39","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcat Chaos 16(08):2129\u20132151","journal-title":"Int J Bifurcat Chaos"},{"issue":"3","key":"20537_CR40","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1049\/iet-cdt.2014.0101","volume":"9","author":"Q Liu","year":"2015","unstructured":"Liu Q, Xu Z, Yuan Y (2015) High throughput and secure advanced encryption standard on field programmable gate array with fine pipelining and enhanced key expansion. IET Comput Digital Techniques 9(3):175\u2013184","journal-title":"IET Comput Digital Techniques"},{"key":"20537_CR41","doi-asserted-by":"crossref","unstructured":"Kumar K, Ramkumar K, Kaur A (2020) A design implementation and comparative analysis of advanced encryption standard (aes) algorithm on fpga. In: 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO), IEEE, pp 182\u2013185","DOI":"10.1109\/ICRITO48877.2020.9198033"},{"issue":"2","key":"20537_CR42","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.jksues.2018.07.002","volume":"32","author":"H Zodpe","year":"2020","unstructured":"Zodpe H, Sapkal A (2020) An efficient aes implementation using fpga with enhanced security features. J King Saud University-Eng Sci 32(2):115\u2013122","journal-title":"J King Saud University-Eng Sci"},{"key":"20537_CR43","doi-asserted-by":"publisher","first-page":"1879","DOI":"10.1007\/s11071-015-2284-x","volume":"82","author":"E Tlelo-Cuautle","year":"2015","unstructured":"Tlelo-Cuautle E, Carbajal-Gomez V, Obeso-Rodelo P, Rangel-Magdaleno J, Nunez-Perez JC (2015) Fpga realization of a chaotic communication system applied to image processing. Nonlinear Dyn 82:1879\u20131892","journal-title":"Nonlinear Dyn"},{"issue":"2","key":"20537_CR44","first-page":"153","volume":"47","author":"P Rajasekar","year":"2020","unstructured":"Rajasekar P, Mangalam H (2020) Design and implementation of power and area optimized aes architecture on fpga for iot application. Circuit World 47(2):153\u2013163","journal-title":"Circuit World"},{"key":"20537_CR45","doi-asserted-by":"crossref","unstructured":"Setetemela K, Keta K, Nkhabu M, Winberg S (2019) Python-based fpga implementation of aes using migen for internet of things security. In: 2019 IEEE 10th International Conference on Mechanical and Intelligent Manufacturing Technologies (ICMIMT), IEEE, pp 194\u2013198","DOI":"10.1109\/ICMIMT.2019.8712074"},{"key":"20537_CR46","doi-asserted-by":"publisher","first-page":"19769","DOI":"10.1007\/s11042-021-10700-x","volume":"80","author":"A Hafsa","year":"2021","unstructured":"Hafsa A, Sghaier A, Malek J, Machhout M (2021) Image encryption method based on improved ecc and modified aes algorithm. Multimed Tool Appl 80:19769\u201319801","journal-title":"Multimed Tool Appl"},{"issue":"12","key":"20537_CR47","doi-asserted-by":"publisher","first-page":"1930009","DOI":"10.1142\/S0218126619300095","volume":"28","author":"N Samir","year":"2019","unstructured":"Samir N, Hussein AS, Khaled M, El-Zeiny AN, Osama M, Yassin H, Abdelbaky A, Mahmoud O, Shawky A, Mostafa H (2019) Asic and fpga comparative study for iot lightweight hardware security algorithms. J Circ Syst Comput 28(12):1930009","journal-title":"J Circ Syst Comput"},{"issue":"9","key":"20537_CR48","doi-asserted-by":"publisher","first-page":"11625","DOI":"10.1007\/s12652-022-03726-y","volume":"14","author":"A Poojary","year":"2023","unstructured":"Poojary A, Kiran Kumar V, Nagesh H (2023) Fpga implementation novel lightweight mbrisi cipher. J Ambient Intell Humaniz Comput 14(9):11625\u201311637","journal-title":"J Ambient Intell Humaniz Comput"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-20537-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-20537-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-20537-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T05:43:28Z","timestamp":1757137408000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-20537-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,4]]},"references-count":48,"journal-issue":{"issue":"28","published-online":{"date-parts":[[2025,8]]}},"alternative-id":["20537"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-20537-9","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2025,1,4]]},"assertion":[{"value":"20 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 July 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 December 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 January 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}}]}}