{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:24:26Z","timestamp":1760142266214,"version":"build-2065373602"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T00:00:00Z","timestamp":1751932800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T00:00:00Z","timestamp":1751932800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Comput Vis"],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s11263-025-02515-2","type":"journal-article","created":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T03:19:33Z","timestamp":1751944773000},"page":"6993-7011","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["RealDTT: Towards A Comprehensive Real-World Dataset for Tampered Text Detection"],"prefix":"10.1007","volume":"133","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0218-6924","authenticated-orcid":false,"given":"Junxian","family":"Duan","sequence":"first","affiliation":[]},{"given":"Hao","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Ji","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Zhiyong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Huaibo","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Lianwen","family":"Jin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,8]]},"reference":[{"key":"2515_CR1","unstructured":"Bao, H., Dong, L., Piao, S., & Wei, F. (2021). Beit: BERT pre-training of image transformers. In International Conference on Learning Representations."},{"key":"2515_CR2","doi-asserted-by":"crossref","unstructured":"Bayar, B., & Stamm, M. C. (2018). Constrained convolutional neural networks: A new approach towards general purpose image manipulation detection. IEEE Transactions on Information Forensics and Security, 13(11), (pp 2691-2706).","DOI":"10.1109\/TIFS.2018.2825953"},{"key":"2515_CR3","doi-asserted-by":"crossref","unstructured":"Berman, M., Triki, A., & Blaschko, M. B. (2018). The lovasz-softmax loss: A tractable surrogate for the optimization of the intersection-over-union measure in neural networks. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, (pp 4413-4421).","DOI":"10.1109\/CVPR.2018.00464"},{"key":"2515_CR4","unstructured":"Chen, J., Huang, Y., Lv, T., Cui, L., Chen, Q., & Wei, F. (2023). Textdiffuser: Diffusion models as text painters. In Advances in Neural Information Processing Systems, 36, 9353-9387."},{"key":"2515_CR5","doi-asserted-by":"crossref","unstructured":"Chen, L. C., Zhu, Y., Papandreou, G., Schroff, F., & Adam, H. (2018). Encoder-decoder with atrous separable convolution for semantic image segmentation. In European Conference on Computer Vision, (pp 801-818).","DOI":"10.1007\/978-3-030-01234-2_49"},{"key":"2515_CR6","doi-asserted-by":"crossref","unstructured":"Chen, X., Dong, C., Ji, J., Cao, J., & Li, X. (2021). Image manipulation detection by multi-view multi-scale supervision. In International Conference on Computer Vision, (pp 14185-14193).","DOI":"10.1109\/ICCV48922.2021.01392"},{"key":"2515_CR7","doi-asserted-by":"crossref","unstructured":"Cruz, F., Sidere, N., Coustaty, M., d\u2019Andecy, V. P., & Ogier, J. M. (2017). Local binary patterns for document forgery detection. In International Conference on Document Analysis and Recognition, (pp 1223-1228).","DOI":"10.1109\/ICDAR.2017.202"},{"key":"2515_CR8","unstructured":"Dhariwal, P., & Nichol, A. (2021). Diffusion models beat gans on image synthesis. Advances in Neural Information Processing Systems, 34, 8780-8794."},{"key":"2515_CR9","doi-asserted-by":"crossref","unstructured":"Dong, L., Liang, W., & Wang, R. (2024). Robust text image tampering localization via forgery traces enhancement and multiscale attention. IEEE Transactions on Consumer Electronics, 70(1), 3495-3507.","DOI":"10.1109\/TCE.2024.3367947"},{"key":"2515_CR10","doi-asserted-by":"crossref","unstructured":"Du, B., Ye, J., Zhang, J., Liu, J., & Tao, D. (2022). I3CL: intra- and inter-instance collaborative learning for arbitrary-shaped scene text detection. International Journal of Computer Vision, 130(8), 1961-1977.","DOI":"10.1007\/s11263-022-01616-6"},{"key":"2515_CR11","doi-asserted-by":"crossref","unstructured":"Durall, R., Keuper, M., & Keuper, J. (2020). Watch your up-convolution: Cnn based generative deep neural networks are failing to reproduce spectral distributions. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition, (pp 7890-7899).","DOI":"10.1109\/CVPR42600.2020.00791"},{"key":"2515_CR12","doi-asserted-by":"crossref","unstructured":"Fridrich, J., & Kodovsky, J. (2012). Rich models for steganalysis of digital images. IEEE Transactions on Information Forensics and Security, 7(3), 868-882.","DOI":"10.1109\/TIFS.2012.2190402"},{"key":"2515_CR13","doi-asserted-by":"crossref","unstructured":"Jaume, G., Ekenel, H. K., & Thiran, J. P. (2019). Funsd: A dataset for form understanding in noisy scanned documents. In International Conference on Document Analysis and Recognition.","DOI":"10.1109\/ICDARW.2019.10029"},{"key":"2515_CR14","doi-asserted-by":"crossref","unstructured":"Hao, Q., Ren, R., Wang, K., Niu, S., Zhang, J., & Wang, M. (2024). Ec-net: General image tampering localization network based on edge distribution guidance and contrastive learning. Knowledge-Based Systems, 293, Article 111656.","DOI":"10.1016\/j.knosys.2024.111656"},{"key":"2515_CR15","doi-asserted-by":"crossref","unstructured":"He, R., Zhang, M., Wang, L., Ji, Y., & Yin, Q. (2015). Cross-modal subspace learning via pairwise constraints. IEEE Transactions on Image Processing, 24(12), 5543-5556.","DOI":"10.1109\/TIP.2015.2466106"},{"key":"2515_CR16","doi-asserted-by":"crossref","unstructured":"Huang, Z., Chen, K., He, J., Bai, X., Karatzas, D., Lu, S., & Jawahar, C. V. (2019). Icdar2019 competition on scanned receipt ocr and information extraction. In International Conference on Document Analysis and Recognition, IEEE, (pp 1516-1520).","DOI":"10.1109\/ICDAR.2019.00244"},{"key":"2515_CR17","volume-title":"2024","author":"J Ji","year":"2024","unstructured":"Ji, J., Zhang, G., Wang, Z., Hou, B., Zhang, Z., Price, B., & Chang, S. (2024). 2024. Transactions on Machine Learning Research: Improving diffusion models for scene text editing with dual encoders."},{"key":"2515_CR18","doi-asserted-by":"crossref","unstructured":"Karatzas, D., Shafait, F., Uchida, S., Iwamura, M., i Bigorda, L. G., Mestre, S. R., ... & De Las Heras, L. P. (2013) Icdar 2013 robust reading competition. In International Conference on Document Analysis and Recognition, (pp 1484-1493).","DOI":"10.1109\/ICDAR.2013.221"},{"issue":"4","key":"2515_CR19","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s10676-024-09795-1","volume":"26","author":"A Knott","year":"2024","unstructured":"Knott, A., Pedreschi, D., Jitsuzumi, T., Leavy, S., Eyers, D., Chakraborti, T., & Bengio, Y. (2024). Ai content detection in the emerging information ecosystem: new obligations for media and tech companies. Ethics and Information Technology, 26(4), 63.","journal-title":"Ethics and Information Technology"},{"key":"2515_CR20","doi-asserted-by":"crossref","unstructured":"Kwon, M. J., Nam, S. H., Yu, I. J., Lee, H. K., & Kim, C. (2022). Learning jpeg compression artifacts for image manipulation detection and localization. International Journal of Computer Vision, 130(8), 1875-1895.","DOI":"10.1007\/s11263-022-01617-5"},{"issue":"12","key":"2515_CR21","doi-asserted-by":"publisher","first-page":"3758","DOI":"10.3390\/s24123758","volume":"24","author":"N Li","year":"2024","unstructured":"Li, N., Wang, Z., Huang, Y., Tian, J., Li, X., & Xiao, Z. (2024). A multi-scale natural scene text detection method based on attention feature extraction and cascade feature fusion. Sensors, 24(12), 3758.","journal-title":"Sensors"},{"key":"2515_CR22","doi-asserted-by":"crossref","unstructured":"Liao, M., Zou, Z., Wan, Z., Yao, C., & Bai, X. (2023). Real-time scene text detection with differentiable binarization and adaptive scale fusion. IEEE Transactions on Pattern Analysis and Machine Intelligence, 45(1), 919-931.","DOI":"10.1109\/TPAMI.2022.3155612"},{"key":"2515_CR23","unstructured":"Liao, X., Chen, S., Chen, J., Wang, T., & Li, X. (2023) Ctp-net: Character texture perception network for document image forgery localization. arXiv preprint arXiv:2308.02158"},{"key":"2515_CR24","doi-asserted-by":"crossref","unstructured":"Liu, X., Liu, Y., Chen, J., & Liu, X. (2022). Pscc-net: Progressive spatio-channel correlation network for image manipulation detection and localization. IEEE Transactions on Circuits and Systems for Video Technology, 32(11), 7505-7517.","DOI":"10.1109\/TCSVT.2022.3189545"},{"key":"2515_CR25","unstructured":"Liu, Y., Tian, Y., Zhao, Y., Yu, H., Xie, L., Wang, Y., & Liu, Y. (2024). Vmamba: Visual state space model. arXiv preprint arXiv:2401.10166"},{"key":"2515_CR26","doi-asserted-by":"crossref","unstructured":"Liu, Z., Hu, H., Lin, Y., Yao, Z., Xie, Z., Wei, Y., ... & Guo, B. (2022) Swin transformer v2: Scaling up capacity and resolution. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition, (pp 12009-12019).","DOI":"10.1109\/CVPR52688.2022.01170"},{"key":"2515_CR27","unstructured":"Loshchilov, I., & Hutter, F. (2019). Decoupled weight decay regularization. In International Conference on Learning Representations."},{"key":"2515_CR28","doi-asserted-by":"crossref","unstructured":"Luo, D., Liu, Y., Yang, R., Liu, X., Zeng, J., Zhou, Y., & Bai, X. (2025). Toward real text manipulation detection: New dataset and new solution. Pattern Recognition, 157, Article 110828.","DOI":"10.1016\/j.patcog.2024.110828"},{"key":"2515_CR29","doi-asserted-by":"crossref","unstructured":"Luo, Z., Shafait, F., & Mian, A. (2015). Localized forgery detection in hyperspectral document images. In International Conference on Document Analysis and Recognition, (pp 496-500).","DOI":"10.1109\/ICDAR.2015.7333811"},{"key":"2515_CR30","doi-asserted-by":"crossref","unstructured":"Peng, D., Jin, L., Liu, Y., Luo, C., & Lai, S. (2022). Pagenet: Towards end-to-end weakly supervised page-level handwritten chinese text recognition. International Journal of Computer Vision, 130(11), 2623-2645.","DOI":"10.1007\/s11263-022-01654-0"},{"key":"2515_CR31","doi-asserted-by":"crossref","unstructured":"Peng, D., Liu, C., Liu, Y., & Jin, L. (2024). Viteraser: Harnessing the power of vision transformers for scene text removal with segmim pretraining. In Proceedings of the AAAI Conference on Artificial Intelligence, (pp 4468-4477).","DOI":"10.1609\/aaai.v38i5.28245"},{"key":"2515_CR32","doi-asserted-by":"crossref","unstructured":"Pippi, V., Cascianelli, S., & Cucchiara, R. (2023). Handwritten text generation from visual archetypes. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition, (pp 22458-22467).","DOI":"10.1109\/CVPR52729.2023.02151"},{"key":"2515_CR33","doi-asserted-by":"crossref","unstructured":"Qu, C., Liu, C., Liu, Y., Chen, X., Peng, D., Guo, F., & Jin, L. (2023). Towards robust tampered text detection in document image: new dataset and new solution. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition, (pp 5937-5946).","DOI":"10.1109\/CVPR52729.2023.00575"},{"key":"2515_CR34","doi-asserted-by":"crossref","unstructured":"Qu, C., Zhong, Y., Guo, F., & Jin, L. (2025). Revisiting tampered scene text detection in the era of generative AI. In Proceedings of the AAAI Conference on Artificial Intelligence, (pp 694-702).","DOI":"10.1609\/aaai.v39i1.32051"},{"key":"2515_CR35","doi-asserted-by":"crossref","unstructured":"Qu, Y., Tan, Q., Xie, H., Xu, J., Wang, Y., & Zhang, Y. (2023). Exploring stroke-level modifications for scene text editing. In Proceedings of the AAAI Conference on Artificial Intelligence, (pp 2119-2127).","DOI":"10.1609\/aaai.v37i2.25305"},{"key":"2515_CR36","doi-asserted-by":"crossref","unstructured":"Roy, A. G., Navab, N., & Wachinger, C. (2018). Concurrent spatial and channel \u2018squeeze & excitation\u2019 in fully convolutional networks. In Medical Image Computing and Computer Assisted Intervention, (pp 421-429).","DOI":"10.1007\/978-3-030-00928-1_48"},{"key":"2515_CR37","doi-asserted-by":"crossref","unstructured":"Roy, P., Bhattacharya, S., Ghosh, S., & Pal, U. (2020). Stefann: scene text editor using font adaptive neural network. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition, (pp 13228-13237).","DOI":"10.1109\/CVPR42600.2020.01324"},{"key":"2515_CR38","doi-asserted-by":"crossref","unstructured":"Shi, B., Yao, C., Liao, M., Yang, M., Xu, P., Cui, L., ... & Bai, X. (2017). Icdar2017 competition on reading chinese text in the wild (rctw-17). In International Conference on Document Analysis and Recognition, (pp 1429-1434).","DOI":"10.1109\/ICDAR.2017.233"},{"key":"2515_CR39","doi-asserted-by":"crossref","unstructured":"Shimoda, W., Haraguchi, D., Uchida, S., & Yamaguchi, K. (2021). De-rendering stylized texts. In International Conference on Computer Vision, (pp 1056-1065).","DOI":"10.1109\/ICCV48922.2021.00111"},{"key":"2515_CR40","doi-asserted-by":"crossref","unstructured":"Sidere, N., Cruz, F., Coustaty, M., & Ogier, J. M. (2017). A dataset for forgery detection and spotting in document images. In International Conference on Emerging Security Technologies, (pp 26-31).","DOI":"10.1109\/EST.2017.8090394"},{"key":"2515_CR41","doi-asserted-by":"crossref","unstructured":"Sun, Y., Ni, Z., Chng, C. K., Liu, Y., Luo, C., Ng, C. C., ... & Jin, L. (2019). Icdar 2019 competition on large-scale street view text with partial labeling-rrc-lsvt. In International Conference on Document Analysis and Recognition, (pp 1557-1562).","DOI":"10.1109\/ICDAR.2019.00250"},{"key":"2515_CR42","doi-asserted-by":"crossref","unstructured":"Torn\u00e9s, B. M., Taburet, T., Boros, E., Rouis, K., Doucet, A., Gomez-Kr\u00e4mer, P., ... & d\u2019Andecy, V. P. (2023). Receipt dataset for document forgery detection. In International Conference on Document Analysis and Recognition, (pp 454-469).","DOI":"10.1007\/978-3-031-41682-8_28"},{"key":"2515_CR43","unstructured":"Tuo, Y., Xiang, W., He, J. Y., Geng, Y., & Xie, X. (2024). Anytext: Multilingual visual text generation and editing. In International Conference on Learning Representations."},{"key":"2515_CR44","doi-asserted-by":"crossref","unstructured":"Wang, J., Sun, K., Cheng, T., Jiang, B., Deng, C., Zhao, Y., & Xiao, B. (2020). Deep high-resolution representation learning for visual recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence, 43(10), 3349-3364.","DOI":"10.1109\/TPAMI.2020.2983686"},{"key":"2515_CR45","doi-asserted-by":"crossref","unstructured":"Wang, W., Xie, E., Li, X., Hou, W., Lu, T., Yu, G., & Shao, S. (2019). Shape robust text detection with progressive scale expansion network. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition, (pp 9336-9345).","DOI":"10.1109\/CVPR.2019.00956"},{"key":"2515_CR46","doi-asserted-by":"crossref","unstructured":"Wang, X., Jiang, Y., Luo, Z., Liu, C. L., Choi, H., & Kim, S. (2019). Arbitrary shape scene text detection with adaptive text region representation. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition, (pp 6449-6458).","DOI":"10.1109\/CVPR.2019.00661"},{"key":"2515_CR47","doi-asserted-by":"crossref","unstructured":"Wang, Y., Xie, H., Xing, M., Wang, J., Zhu, S., & Zhang, Y. (2022). Detecting tampered scene text in the wild. In European Conference on Computer Vision, Springer, (pp 215-232).","DOI":"10.1007\/978-3-031-19815-1_13"},{"key":"2515_CR48","unstructured":"Wang, Y., Zhang, B., Xie, H., & Zhang, Y. (2022). Tampered text detection via rgb and frequency relationship modeling. Chinese Journal of Network and Information Security, 8(3), 29-40."},{"key":"2515_CR49","doi-asserted-by":"crossref","unstructured":"Woo, S., Park, J., Lee, J. Y., & Kweon, I. S. (2018). Cbam: Convolutional block attention module. In European Conference on Computer Vision, (pp 3-19.)","DOI":"10.1007\/978-3-030-01234-2_1"},{"key":"2515_CR50","doi-asserted-by":"crossref","unstructured":"Wu, L., Zhang, C., Liu, J., Han, J., Liu, J., Ding, E., & Bai, X. (2019). Editing text in the wild. In ACM International Conference on Multimedia, (p 1500-1508).","DOI":"10.1145\/3343031.3350929"},{"key":"2515_CR51","doi-asserted-by":"crossref","unstructured":"Wu, Y., AbdAlmageed, W., & Natarajan, P. (2019). Mantra-net: Manipulation tracing network for detection and localization of image forgeries with anomalous features. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition, (pp 9543-9552).","DOI":"10.1109\/CVPR.2019.00977"},{"key":"2515_CR52","unstructured":"Xie, E., Wang, W., Yu, Z., Anandkumar, A., Alvarez, J. M., & Luo, P. (2021). Segformer: Simple and efficient design for semantic segmentation with transformers. In Advances in Neural Information Processing Systems, 34, 12077-12090."},{"key":"2515_CR53","doi-asserted-by":"crossref","unstructured":"Xu, W., Luo, J., Zhu, C., Lu, W., Zeng, J., Shi, S., & Lin, C. (2022). Document images forgery localization using a two-stream network. International Journal of Intelligent Systems, 37(8), 5272-5289.","DOI":"10.1002\/int.22792"},{"key":"2515_CR54","doi-asserted-by":"crossref","unstructured":"Yang, J., Zhou, K., Li, Y., & Liu, Z. (2024). Generalized out-of-distribution detection: A survey. International Journal of Computer Vision, (pp 1-28).","DOI":"10.1007\/s11263-024-02117-4"},{"key":"2515_CR55","doi-asserted-by":"crossref","unstructured":"Yu, Z., Li, B., Lin, Y., Zeng, J., & Zeng, J. (2023). Learning to locate the text forgery in smartphone screenshots. In IEEE International Conference on Acoustics, Speech and Signal Processing, (pp 1-5).","DOI":"10.1109\/ICASSP49357.2023.10095070"},{"key":"2515_CR56","doi-asserted-by":"crossref","unstructured":"Zhang, L., Chen, X., Wang, Y., Lu, Y., & Qiao, Y. (2024). Brush your text: Synthesize any scene text on images via diffusion model. In Proceedings of the AAAI Conference on Artificial Intelligence, (pp 7215-7223).","DOI":"10.1609\/aaai.v38i7.28550"},{"key":"2515_CR57","doi-asserted-by":"crossref","unstructured":"Zhang, R., Zhou, Y., Jiang, Q., Song, Q., Li, N., Zhou, K., ... & Jawahar, C. V. (2019). Icdar 2019 robust reading challenge on reading chinese text on signboard. In International Conference on Document Analysis and Recognition, (pp 1577-1581).","DOI":"10.1109\/ICDAR.2019.00253"},{"key":"2515_CR58","doi-asserted-by":"crossref","unstructured":"Zhao, L., Chen, C., & Huang, J. (2021). Deep learning-based forgery attack on document images. IEEE Transactions on Image Processing, 30, 7964-7979.","DOI":"10.1109\/TIP.2021.3112048"},{"key":"2515_CR59","doi-asserted-by":"crossref","unstructured":"Zhao, X., Feng, W., Zhang, Z., Lv, J., Zhu, X., Lin, Z., & Shao, J. (2024). Cbnet: A plug-and-play network for segmentation-based scene text detection. International Journal of Computer Vision, 132, 3119-3138.","DOI":"10.1007\/s11263-024-02022-w"},{"key":"2515_CR60","doi-asserted-by":"crossref","unstructured":"Zhao, Y., & Lian, Z. (2023). Udifftext: A unified framework for high-quality text synthesis in arbitrary images via character-aware diffusion models. CoRR abs\/2312.04884.","DOI":"10.1007\/978-3-031-72751-1_13"},{"key":"2515_CR61","doi-asserted-by":"crossref","unstructured":"Zhou, X., Yao, C., Wen, H., Wang, Y., Zhou, S., He, W., & Liang, J. (2017). East: an efficient and accurate scene text detector. In IEEE Conference on Computer Vision and Pattern Recognition, (pp 5551-5560).","DOI":"10.1109\/CVPR.2017.283"}],"container-title":["International Journal of Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11263-025-02515-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11263-025-02515-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11263-025-02515-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T08:52:15Z","timestamp":1760086335000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11263-025-02515-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,8]]},"references-count":61,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["2515"],"URL":"https:\/\/doi.org\/10.1007\/s11263-025-02515-2","relation":{},"ISSN":["0920-5691","1573-1405"],"issn-type":[{"value":"0920-5691","type":"print"},{"value":"1573-1405","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,8]]},"assertion":[{"value":"30 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}