{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T18:23:25Z","timestamp":1774290205259,"version":"3.50.1"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"16","license":[{"start":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T00:00:00Z","timestamp":1720569600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T00:00:00Z","timestamp":1720569600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province","award":["Grant No. SKLACSS--202208"],"award-info":[{"award-number":["Grant No. SKLACSS--202208"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["No.61772295"],"award-info":[{"award-number":["No.61772295"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Technology Research Program of Chongqing Municipal Education Commission","award":["Grant no. KJZD-M202000501"],"award-info":[{"award-number":["Grant no. KJZD-M202000501"]}]},{"name":"Key Projects of Chongqing Natural Science Foundation Innovation Development Joint Fund","award":["CSTB2023NSCQ-LZX0139"],"award-info":[{"award-number":["CSTB2023NSCQ-LZX0139"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1007\/s11227-024-06332-1","type":"journal-article","created":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T08:02:58Z","timestamp":1720598578000},"page":"24758-24780","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A new integrated steganography scheme for quantum color images"],"prefix":"10.1007","volume":"80","author":[{"given":"Yumin","family":"Dong","sequence":"first","affiliation":[]},{"given":"Rui","family":"Yan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,10]]},"reference":[{"issue":"01","key":"6332_CR1","doi-asserted-by":"publisher","first-page":"2154001","DOI":"10.1142\/S021800142154001X","volume":"35","author":"H Dai","year":"2021","unstructured":"Dai H, Cheng J, Li Y (2021) A novel steganography algorithm based on quantization table modification and image scrambling in DCT domain. Int J Pattern Recognit Artif Intell 35(01):2154001","journal-title":"Int J Pattern Recognit Artif Intell"},{"key":"6332_CR2","unstructured":"Beach G, Lomont C, Cohen C (2003) Quantum image processing (quip). In: 32nd Applied Imagery Pattern Recognition Workshop, 2003. Proceedings., pp. 39\u201344 . IEEE"},{"key":"6332_CR3","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1007\/s00530-014-0355-3","volume":"20","author":"X Song","year":"2014","unstructured":"Song X, Wang S, , A.\u00a0Abd\u00a0El-Latif A, Niu X (2014) Dynamic watermarking scheme for quantum images based on hadamard transform. Multimed Syst 20:379\u2013388","journal-title":"Multimed Syst"},{"key":"6332_CR4","doi-asserted-by":"crossref","unstructured":"Abd-El-Atty B, Abd\u00a0El-Latif AA, Amin M (2017) New quantum image steganography scheme with hadamard transformation. In: Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2016 2, pp. 342\u2013352 . Springer","DOI":"10.1007\/978-3-319-48308-5_33"},{"issue":"3","key":"6332_CR5","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/s10773-023-05303-1","volume":"62","author":"J-L Yao","year":"2023","unstructured":"Yao J-L, Yang H-M, Jiang D-H, Yan B, Pan J-S, Wang M-X (2023) A novel quantum image steganography algorithm based on double-layer gray code. Int J Theor Phys 62(3):52","journal-title":"Int J Theor Phys"},{"key":"6332_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2020.106403","volume":"138","author":"B Abd-El-Atty","year":"2021","unstructured":"Abd-El-Atty B, Iliyasu AM, Alanezi A, Abd El-latif AA (2021) Optical image encryption based on quantum walks. Opt Lasers Eng 138:106403","journal-title":"Opt Lasers Eng"},{"issue":"1","key":"6332_CR7","doi-asserted-by":"publisher","first-page":"1930","DOI":"10.1038\/s41598-020-58636-w","volume":"10","author":"AA Abd El-Latif","year":"2020","unstructured":"Abd El-Latif AA, Abd-El-Atty B, Amin M, Iliyasu AM (2020) Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications. Sci Rep 10(1):1930","journal-title":"Sci Rep"},{"issue":"5","key":"6332_CR8","doi-asserted-by":"publisher","first-page":"1448","DOI":"10.1109\/TIFS.2012.2204250","volume":"7","author":"S-C Liu","year":"2012","unstructured":"Liu S-C, Tsai W-H (2012) Line-based cubism-like image\u00e2\u20ac\u201da new type of art image and its application to lossless data hiding. IEEE Trans Inf Forensics Secur 7(5):1448\u20131458","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"6332_CR9","first-page":"101","volume":"2","author":"P Khare","year":"2011","unstructured":"Khare P, Singh J, Tiwari M (2011) Digital image steganography. J Eng Res Stud 2(3):101\u2013104","journal-title":"J Eng Res Stud"},{"issue":"12","key":"6332_CR10","doi-asserted-by":"publisher","first-page":"3223","DOI":"10.1109\/TMM.2018.2838334","volume":"20","author":"X Zhang","year":"2018","unstructured":"Zhang X, Peng F, Long M (2018) Robust coverless image steganography based on DCT and LDA topic classification. IEEE Trans Multimed 20(12):3223\u20133238","journal-title":"IEEE Trans Multimed"},{"key":"6332_CR11","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1007\/s10773-012-1354-9","volume":"52","author":"W-W Zhang","year":"2013","unstructured":"Zhang W-W, Gao F, Liu B, Jia H-Y, Wen Q-Y, Chen H (2013) A quantum watermark protocol. Int J Theor Phys 52:504\u2013513","journal-title":"Int J Theor Phys"},{"key":"6332_CR12","doi-asserted-by":"publisher","first-page":"3689","DOI":"10.1007\/s11128-013-0629-2","volume":"12","author":"X-H Song","year":"2013","unstructured":"Song X-H, Wang S, Liu S, Abd El-Latif AA, Niu X-M (2013) A dynamic watermarking scheme for quantum images using quantum wavelet transform. Quantum Inf Process 12:3689\u20133706","journal-title":"Quantum Inf Process"},{"key":"6332_CR13","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1007\/s00530-014-0355-3","volume":"20","author":"X Song","year":"2014","unstructured":"Song X, Wang S, A.\u00a0Abd\u00a0El-Latif A, Niu X (2014) Dynamic watermarking scheme for quantum images based on Hadamard transform. Multimed Syst 20:379\u2013388","journal-title":"Multimed Syst"},{"issue":"2","key":"6332_CR14","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1049\/cje.2015.04.016","volume":"24","author":"S Wang","year":"2015","unstructured":"Wang S, Song X, Niu X (2015) Quantum cosine transform based watermarking scheme for quantum images. Chin J Electron 24(2):321\u2013325","journal-title":"Chin J Electron"},{"issue":"3","key":"6332_CR15","first-page":"263","volume":"32","author":"W Ning","year":"2015","unstructured":"Ning W, Song L (2015) A watermarking strategy for quantum image based on least significant bit. Chin J Quantum Electron 32(3):263","journal-title":"Chin J Quantum Electron"},{"key":"6332_CR16","doi-asserted-by":"publisher","first-page":"4205","DOI":"10.1007\/s10773-016-3046-3","volume":"55","author":"S Heidari","year":"2016","unstructured":"Heidari S, Naseri M (2016) A novel LSB based quantum watermarking. Int J Theor Phys 55:4205\u20134218","journal-title":"Int J Theor Phys"},{"issue":"1","key":"6332_CR17","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/s10773-015-2640-0","volume":"55","author":"N Jiang","year":"2016","unstructured":"Jiang N, Zhao N, Wang L (2016) LSB based quantum image steganography algorithm. Int J Theor Phys 55(1):107\u2013123","journal-title":"Int J Theor Phys"},{"issue":"1","key":"6332_CR18","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1088\/0253-6102\/66\/1\/066","volume":"66","author":"Z-H Wei","year":"2016","unstructured":"Wei Z-H, Chen X-B, Xu S-J, Niu X-X, Yang Y-X (2016) A spatial domain quantum watermarking scheme. Commun Theor Phys 66(1):66","journal-title":"Commun Theor Phys"},{"issue":"6","key":"6332_CR19","doi-asserted-by":"publisher","first-page":"732","DOI":"10.1088\/0253-6102\/67\/6\/732","volume":"67","author":"S Heidari","year":"2017","unstructured":"Heidari S, Naseri M, Gheibi R, Baghfalaki M, Pourarian MR, Farouk A (2017) A new quantum watermarking based on quantum wavelet transforms. Commun Theor Phys 67(6):732","journal-title":"Commun Theor Phys"},{"key":"6332_CR20","doi-asserted-by":"publisher","first-page":"121303","DOI":"10.1109\/ACCESS.2019.2937390","volume":"7","author":"W-W Hu","year":"2019","unstructured":"Hu W-W, Zhou R-G, El-Rafei A, Jiang S-X (2019) Quantum image watermarking algorithm based on HAAR wavelet transform. IEEE Access 7:121303\u2013121320","journal-title":"IEEE Access"},{"issue":"12","key":"6332_CR21","doi-asserted-by":"publisher","first-page":"18753","DOI":"10.1007\/s11042-021-10610-y","volume":"80","author":"S Sharma","year":"2021","unstructured":"Sharma S, Sharma H, Sharma JB (2021) Artificial bee colony based perceptually tuned blind color image watermarking in hybrid LWT-DCT domain. Multimed Tools Appl 80(12):18753\u201318785","journal-title":"Multimed Tools Appl"},{"key":"6332_CR22","doi-asserted-by":"publisher","first-page":"4297","DOI":"10.1007\/s12652-021-03408-1","volume":"13","author":"S Sharma","year":"2022","unstructured":"Sharma S, Sharma H, Sharma JB (2022) A new optimization based color image watermarking using non-negative matrix factorization in discrete cosine transform domain. J Ambient Intell Humanized Comput 13:4297\u20134319","journal-title":"J Ambient Intell Humanized Comput"},{"issue":"4","key":"6332_CR23","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/s11128-022-03494-w","volume":"21","author":"M-X Wang","year":"2022","unstructured":"Wang M-X, Yang H-M, Jiang D-H, Yan B, Pan J-S, Liu T (2022) A novel quantum color image steganography algorithm based on turtle shell and LSB. Quantum Inf Process 21(4):148","journal-title":"Quantum Inf Process"},{"key":"6332_CR24","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.cjph.2023.06.016","volume":"85","author":"M Khan","year":"2023","unstructured":"Khan M, Rasheed A (2023) A high-capacity and robust steganography algorithm for quantum images. Chin J Phys 85:89\u2013103","journal-title":"Chin J Phys"},{"issue":"7","key":"6332_CR25","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/s11128-023-04022-0","volume":"22","author":"M Khan","year":"2023","unstructured":"Khan M, Rasheed A (2023) A secure controlled quantum image steganography scheme based on the multi-channel effective quantum image representation model. Quantum Inf Process 22(7):268","journal-title":"Quantum Inf Process"},{"key":"6332_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-016-1463-0","volume":"16","author":"J Sang","year":"2017","unstructured":"Sang J, Wang S, Li Q (2017) A novel quantum representation of color digital images. Quantum Inf Process 16:1\u201314","journal-title":"Quantum Inf Process"},{"key":"6332_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-017-1640-9","volume":"16","author":"R-G Zhou","year":"2017","unstructured":"Zhou R-G, Hu W, Fan P (2017) Quantum watermarking scheme through Arnold scrambling and LSB steganography. Quantum Inf Process 16:1\u201321","journal-title":"Quantum Inf Process"},{"key":"6332_CR28","unstructured":"Tirkel AZ, Rankin G, Van\u00a0Schyndel R, Ho W, Mee N, Osborne CF (1993) Electronic watermark. Digital Image Computing, Technology and Applications (DICTA\u201993), 666\u2013673"},{"issue":"03","key":"6332_CR29","doi-asserted-by":"publisher","first-page":"1850021","DOI":"10.1142\/S0219749918500211","volume":"16","author":"R-G Zhou","year":"2018","unstructured":"Zhou R-G, Hu W, Fan P, Luo G (2018) Quantum color image watermarking based on Arnold transformation and LSB steganography. Int J Quantum Inf 16(03):1850021","journal-title":"Int J Quantum Inf"},{"key":"6332_CR30","doi-asserted-by":"crossref","unstructured":"Tseng C-C, Hwang T-M (2004) Quantum circuit design of 8x8 discrete fourier transform using its fast computation flow graph. In: The 2004 IEEE Asia-Pacific Conference on Circuits and Systems, 2004. Proceedings., vol. 2, p. 801\u2013804. IEEE","DOI":"10.1109\/APCCAS.2004.1413000"},{"key":"6332_CR31","doi-asserted-by":"crossref","unstructured":"Klappenecker A, Rotteler M (2001) Discrete cosine transforms on quantum computers. In: ISPA 2001. Proceedings of the 2nd International Symposium on Image and Signal Processing and Analysis. In Conjunction with 23rd International Conference on Information Technology Interfaces IEEE Cat., pp. 464\u2013468. IEEE","DOI":"10.1109\/ISPA.2001.938674"},{"key":"6332_CR32","doi-asserted-by":"publisher","first-page":"2904","DOI":"10.1007\/s10773-018-3810-7","volume":"57","author":"X-Z Li","year":"2018","unstructured":"Li X-Z, Chen W-W, Wang Y-Q (2018) Quantum image compression-encryption scheme based on quantum discrete cosine transform. Int J Theor Phys 57:2904\u20132919","journal-title":"Int J Theor Phys"},{"key":"6332_CR33","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.ins.2019.07.057","volume":"504","author":"H-S Li","year":"2019","unstructured":"Li H-S, Fan P, Xia H-Y, Song S (2019) Quantum multi-level wavelet transforms. Inf Sci 504:113\u2013135","journal-title":"Inf Sci"},{"issue":"4","key":"6332_CR34","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612","journal-title":"IEEE Trans Image Process"},{"key":"6332_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2023.128688","volume":"617","author":"J-Y Sun","year":"2023","unstructured":"Sun J-Y, Wang W-T, Zhang H, Zhang J (2023) Color image quantum steganography scheme and circuit design based on DWT+ DCT+ SVD. Phys A 617:128688","journal-title":"Phys A"},{"issue":"7","key":"6332_CR36","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/s11128-022-03596-5","volume":"21","author":"H-W Xie","year":"2022","unstructured":"Xie H-W, Gao Y-J, Liu X-L, Zhang J, Zhang H (2022) A novel exploiting modification direction scheme and its application in quantum color image steganography. Quantum Inf Process 21(7):249","journal-title":"Quantum Inf Process"},{"issue":"2","key":"6332_CR37","doi-asserted-by":"publisher","first-page":"246","DOI":"10.3390\/e24020246","volume":"24","author":"P Pan","year":"2022","unstructured":"Pan P, Wu Z, Yang C, Zhao B (2022) Double-matrix decomposition image steganography scheme based on wavelet transform with multi-region coverage. Entropy 24(2):246","journal-title":"Entropy"},{"issue":"18","key":"6332_CR38","doi-asserted-by":"publisher","first-page":"25075","DOI":"10.1007\/s11042-022-12456-4","volume":"81","author":"D Awasthi","year":"2022","unstructured":"Awasthi D, Srivastava VK (2022) LWT-DCT-SVD AND DWT-DCT-SVD based watermarking schemes with their performance enhancement using Jaya and particle swarm optimization and comparison of results under various attacks. Multimed Tools Appl 81(18):25075\u201325099","journal-title":"Multimed Tools Appl"},{"key":"6332_CR39","doi-asserted-by":"publisher","first-page":"45474","DOI":"10.1109\/ACCESS.2021.3067245","volume":"9","author":"F Ernawan","year":"2021","unstructured":"Ernawan F, Ariatmanto D, Firdaus A (2021) An improved image watermarking by modifying selected DWT-DCT coefficients. IEEE Access 9:45474\u201345485","journal-title":"IEEE Access"},{"key":"6332_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.robot.2019.103377","volume":"124","author":"L Moysis","year":"2020","unstructured":"Moysis L, Petavratzis E, Volos C, Nistazakis H, Stouboulos I (2020) A chaotic path planning generator based on logistic map and modulo tactics. Robot Auton Syst 124:103377","journal-title":"Robot Auton Syst"},{"key":"6332_CR41","doi-asserted-by":"publisher","first-page":"1379","DOI":"10.1007\/s00521-018-3647-2","volume":"32","author":"M Islam","year":"2020","unstructured":"Islam M, Roy A, Laskar RH (2020) Svm-based robust image watermarking technique in LWT domain using different sub-bands. Neural Comput Appl 32:1379\u20131403","journal-title":"Neural Comput Appl"},{"issue":"6","key":"6332_CR42","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1049\/iet-ipr.2018.6040","volume":"14","author":"F Deeba","year":"2020","unstructured":"Deeba F, Kun S, Dharejo FA, Zhou Y (2020) Lossless digital image watermarking in sparse domain by using k-singular value decomposition algorithm. IET Image Proc 14(6):1005\u20131014","journal-title":"IET Image Proc"},{"key":"6332_CR43","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1016\/j.compeleceng.2016.04.017","volume":"54","author":"MS Subhedar","year":"2016","unstructured":"Subhedar MS, Mankar VH (2016) Image steganography using redundant discrete wavelet transform and QR factorization. Comput Electr Eng 54:406\u2013422","journal-title":"Comput Electr Eng"},{"key":"6332_CR44","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.eswa.2017.12.003","volume":"97","author":"Y Liu","year":"2018","unstructured":"Liu Y, Tang S, Liu R, Zhang L, Ma Z (2018) Secure and robust digital image watermarking scheme using logistic and RSA encryption. Expert Syst Appl 97:95\u2013105","journal-title":"Expert Syst Appl"},{"key":"6332_CR45","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1016\/j.ins.2017.07.026","volume":"417","author":"NM Makbol","year":"2017","unstructured":"Makbol NM, Khoo BE, Rassem TH, Loukhaoukha K (2017) A new reliable optimized image watermarking scheme based on the integer wavelet transform and singular value decomposition for copyright protection. Inf Sci 417:381\u2013400","journal-title":"Inf Sci"},{"key":"6332_CR46","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2019.107421","volume":"169","author":"L Zhang","year":"2020","unstructured":"Zhang L, Wei D (2020) Image watermarking based on matrix decomposition and gyrator transform in invariant integer wavelet domain. Signal Process 169:107421","journal-title":"Signal Process"},{"issue":"11","key":"6332_CR47","doi-asserted-by":"publisher","first-page":"817","DOI":"10.1049\/iet-ipr.2016.0048","volume":"10","author":"Q Su","year":"2016","unstructured":"Su Q (2016) Novel blind colour image watermarking technique using Hessenberg decomposition. IET Image Process 10(11):817\u2013829","journal-title":"IET Image Process"},{"key":"6332_CR48","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113225","volume":"149","author":"L-Y Hsu","year":"2020","unstructured":"Hsu L-Y, Hu H-T (2020) Blind watermarking for color images using EMMQ based on QDFT. Expert Syst Appl 149:113225","journal-title":"Expert Syst Appl"},{"key":"6332_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2017.10.016","volume":"426","author":"T Huynh-The","year":"2018","unstructured":"Huynh-The T, Hua C-H, Tu NA, Hur T, Bang J, Kim D, Amin MB, Kang BH, Seung H, Lee S (2018) Selective bit embedding scheme for robust blind color image watermarking. Inf Sci 426:1\u201318","journal-title":"Inf Sci"},{"key":"6332_CR50","doi-asserted-by":"publisher","first-page":"8113","DOI":"10.1007\/s11042-018-6632-y","volume":"78","author":"Q Su","year":"2019","unstructured":"Su Q, Liu Y, Liu D, Yuan Z, Ning H (2019) A new watermarking scheme for colour image using QR decomposition and ternary coding. Multimed Tools Appl 78:8113\u20138132","journal-title":"Multimed Tools Appl"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06332-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-024-06332-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06332-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,23]],"date-time":"2024-11-23T20:23:44Z","timestamp":1732393424000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-024-06332-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,10]]},"references-count":50,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2024,11]]}},"alternative-id":["6332"],"URL":"https:\/\/doi.org\/10.1007\/s11227-024-06332-1","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,10]]},"assertion":[{"value":"25 June 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 July 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author(s) declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}