{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T22:27:16Z","timestamp":1773181636960,"version":"3.50.1"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Sign Process Syst"],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1007\/s11265-024-01937-4","type":"journal-article","created":{"date-parts":[[2024,10,19]],"date-time":"2024-10-19T10:02:10Z","timestamp":1729332130000},"page":"601-615","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["An Image Encryption Method Based on a High-performance\u00a0and Efficient Block Cipher"],"prefix":"10.1007","volume":"96","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-6025-1543","authenticated-orcid":false,"given":"Bahram","family":"Rashidi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,19]]},"reference":[{"key":"1937_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-023-17896-0","volume":"83","author":"H Kolivand","year":"2024","unstructured":"Kolivand, H., Fadhel Hamood, S., Asadianfam, S., & Shafry Rahim, M. (2024). Image encryption techniques: A comprehensive review. Multimedia Tools and Applications, 83, 1\u201336.","journal-title":"Multimedia Tools and Applications"},{"key":"1937_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.chaos.2023.114361","volume":"178","author":"M SaberiKamarposhti","year":"2024","unstructured":"SaberiKamarposhti, M., Ghorbani, A., & Yadollahi, M. (2024). A comprehensive survey on image encryption: Taxonomy, challenges, and future directions. Chaos, Solitons and Fractals, 178, 1\u201325.","journal-title":"Chaos, Solitons and Fractals"},{"issue":"3","key":"1937_CR3","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/s13389-017-0160-y","volume":"11","author":"G Hatzivasilis","year":"2018","unstructured":"Hatzivasilis, G., Fysarakis, K., Papaefstathiou, I., & Manifavas, C. (2018). A review of lightweight block ciphers. Journal of Cryptographic Engineering, 11(3), 141\u2013184.","journal-title":"Journal of Cryptographic Engineering"},{"key":"1937_CR4","doi-asserted-by":"crossref","unstructured":"Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin Y., & Vikkelsoe, C. 2007. PRESENT: An ultra lightweight block cipher. In Proc. Cryptographic Hardware and Embedded Systems-CHES, Springer, pp. 450\u2013466.","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"1937_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/sym14030604","volume":"14","author":"M Imdad","year":"2022","unstructured":"Imdad, M., Najwa Ramli, S., & Mahdin, H. (2022). An Enhanced Key Schedule Algorithm of PRESENT-128 Block Cipher for Random and Non-Random Secret Keys. Symmetry, 14, 1\u201322.","journal-title":"Symmetry"},{"key":"1937_CR6","unstructured":"International Standardization of Organization (ISO) (2012) Information Technology-Security Techniques-Lightweight Cryptography-Part 2: Block Ciphers, document ISO\/IEC 29192-2."},{"key":"1937_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.sigpro.2020.107563","volume":"172","author":"G Ye","year":"2020","unstructured":"Ye, G., Pan, C., Dong, Y., Shi, Y., & Huang, X. (2020). Image encryption and hiding algorithm based on compressive sensing and random numbers insertion. Signal Processing, 172, 1\u201326.","journal-title":"Signal Processing"},{"issue":"1","key":"1937_CR8","first-page":"2","volume":"2183","author":"DS Ali","year":"2019","unstructured":"Ali, D. S., Alwan, N. A., & Al-Saidi, M. N. G. (2019). Image encryption based on highly sensitive chaotic system. AIP Conference Proceedings, 2183(1), 2\u20134.","journal-title":"AIP Conference Proceedings"},{"key":"1937_CR9","first-page":"1","volume":"128","author":"S Wang","year":"2019","unstructured":"Wang, S., Wang, C. H., & Xu, C. (2019). An image encryption algorithm based on a hidden attractor chaos system and the Knuth-Durstenfeld algorithm. Optics and Lasers in Engineering, 128, 1\u201314.","journal-title":"Optics and Lasers in Engineering"},{"issue":"1","key":"1937_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1142\/S0218127418500104","volume":"28","author":"G Ye","year":"2018","unstructured":"Ye, G., Pan, C., Huang, X., Zhao, Z., & He, J. (2018). A Chaotic Image Encryption Algorithm Based on Information Entropy. International Journal of Bifurcation and Chaos, 28(1), 1\u201311.","journal-title":"International Journal of Bifurcation and Chaos"},{"issue":"10","key":"1937_CR11","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1080\/09500340.2021.1924885","volume":"68","author":"PN Lone","year":"2021","unstructured":"Lone, P. N., Singh, P. D., & Mir, U. H. (2021). A novel image encryption using random matrix affine cipher and the chaotic maps. Journal of Modern Optics, 68(10), 507\u2013521.","journal-title":"Journal of Modern Optics"},{"issue":"5","key":"1937_CR12","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1504\/IJIEI.2019.103623","volume":"7","author":"H Rashaideh","year":"2019","unstructured":"Rashaideh, H., Shaheen, A., & Al-Najdaw, N. (2019). Real-time image encryption and decryption methods based on the Karhunen-Loeve transform. International Journal of Intelligent Engineering Informatics, 7(5), 399\u2013421.","journal-title":"International Journal of Intelligent Engineering Informatics"},{"issue":"1","key":"1937_CR13","doi-asserted-by":"publisher","first-page":"1246","DOI":"10.1515\/jisys-2018-0365","volume":"29","author":"A Bisht","year":"2020","unstructured":"Bisht, A., Dua, M., Dua, S., & Jaroli, P. (2020). A Color Image Encryption Technique Based on Bit-Level Permutation and Alternate Logistic Maps. Journal of Intelligent Systems, 29(1), 1246\u20131260.","journal-title":"Journal of Intelligent Systems"},{"issue":"2","key":"1937_CR14","doi-asserted-by":"publisher","first-page":"1722","DOI":"10.3934\/mbe.2021089","volume":"18","author":"X Chen","year":"2021","unstructured":"Chen, X., Zou, M., Yang, B., Wang, Z., Wu, N., & Qi, L. (2021). A visually secure image encryption method based on integer wavelet transform and rhombus prediction. Mathematical biosciences and engineering, 18(2), 1722\u20131739.","journal-title":"Mathematical biosciences and engineering"},{"issue":"3","key":"1937_CR15","doi-asserted-by":"publisher","first-page":"70","DOI":"10.15446\/ing.investig.v40n3.81421","volume":"40","author":"DM Ballesteros","year":"2020","unstructured":"Ballesteros, D. M., Renza, D., & Pena, J. (2020). Entropy-Based Image Encryption Using Orthogonal Variable Spreading Factor (OVSF). Ingenieria e Investigacion (I &I) journal, 40(3), 70\u201380.","journal-title":"Ingenieria e Investigacion (I &I) journal"},{"issue":"3","key":"1937_CR16","doi-asserted-by":"publisher","first-page":"123","DOI":"10.3923\/jai.2014.123.135","volume":"7","author":"N Aarthie","year":"2014","unstructured":"Aarthie, N., & Amirtharajan, R. (2014). Image encryption: An information security perceptive. Journal of artificial intelligence, 7(3), 123\u2013135.","journal-title":"Journal of artificial intelligence"},{"issue":"1","key":"1937_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1117\/1.JEI.21.1.013014","volume":"21","author":"Y Wu","year":"2012","unstructured":"Wu, Y., Yang, G., Jin, H., & Noonan, J. P. (2012). Image encryption using the two-dimensional logistic chaotic map. Journal of Electronic Imaging, 21(1), 1\u201315.","journal-title":"Journal of Electronic Imaging"},{"key":"1937_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.chaos.2021.111318","volume":"152","author":"Z Man","year":"2021","unstructured":"Man, Z., Li, J., Di, X., Sheng, Y., & Liu, Z. (2021). Double image encryption algorithm based on neural network and chaos. Chaos, Solitons and Fractals, 152, 1\u201316.","journal-title":"Chaos, Solitons and Fractals"},{"key":"1937_CR19","first-page":"1","volume":"2021","author":"M Kaur","year":"2021","unstructured":"Kaur, M., Singh, S., & Kaur, M. (2021). Computational Image Encryption Techniques: A Comprehensive Review. Mathematical Problems in Engineering, 2021, 1\u201317.","journal-title":"Mathematical Problems in Engineering"},{"issue":"3","key":"1937_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/1550147720914779","volume":"16","author":"W Jang","year":"2020","unstructured":"Jang, W., & Lee, S. Y. (2020). Partial image encryption using format-preserving encryption in image processing systems for Internet of things environment. International Journal of Distributed Sensor Networks, 16(3), 1\u201317.","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"1937_CR21","doi-asserted-by":"publisher","first-page":"24801","DOI":"10.1007\/s11042-021-10695-5","volume":"80","author":"TA Al-Maadeed","year":"2021","unstructured":"Al-Maadeed, T. A., Hussain, L., & Anees, A. (2021). A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes. Multimedia Tools and Applications, 80, 24801\u201324822.","journal-title":"Multimedia Tools and Applications"},{"key":"1937_CR22","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.optlaseng.2013.07.015","volume":"52","author":"M Kumar","year":"2014","unstructured":"Kumar, M., Mishra, D. C., & Sharma, R. K. (2014). A first approach on an RGB image encryption. Optics and Lasers in Engineering, 52, 27\u201334.","journal-title":"Optics and Lasers in Engineering"},{"key":"1937_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/e23030341","volume":"23","author":"Y Pourasad","year":"2021","unstructured":"Pourasad, Y., Ranjbarzadeh, R., & Mardani, A. (2021). A New Algorithm for Digital Image Encryption Based on Chaos Theory. Entropy, 23, 1\u201316.","journal-title":"Entropy"},{"key":"1937_CR24","first-page":"1","volume":"12","author":"X Xue","year":"2021","unstructured":"Xue, X., Jin, H., Zhou, D., & Zhou, C. (2021). Provably secure biometric based authentication and key agreement protocol for wireless sensor networks. Frontiers in Genetics, 12, 1\u201318.","journal-title":"Frontiers in Genetics"},{"issue":"6","key":"1937_CR25","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1049\/iet-cvi.2015.0344","volume":"10","author":"B Murugan","year":"2016","unstructured":"Murugan, B., & Gounder, A. G. N. (2016). Image encryption scheme based on block-based confusion and multiple levels of diffusion. IET Computer Vision, 10(6), 593\u2013602.","journal-title":"IET Computer Vision"},{"issue":"11","key":"1937_CR26","doi-asserted-by":"publisher","first-page":"2310","DOI":"10.1049\/iet-ipr.2019.1340","volume":"14","author":"J Zheng","year":"2020","unstructured":"Zheng, J., & Liu, J. F. (2020). Novel image encryption by combining dynamic DNA sequence encryption and the improved 2D logistic sine map. IET Image Processing, 14(11), 2310\u20132320.","journal-title":"IET Image Processing"},{"key":"1937_CR27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41598-019-56847-4","volume":"10","author":"X Wang","year":"2020","unstructured":"Wang, X., Guan, N., Zhao, H., Wang, S., & Zhang, Y. (2020). A new image encryption scheme based on coupling map lattices with mixed multi-chaos. Scientific Report, 10, 1\u201315.","journal-title":"Scientific Report"},{"key":"1937_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.adhoc.2019.102005","volume":"97","author":"R Montero-Canela","year":"2020","unstructured":"Montero-Canela, R., Zambrano-Serrano, E., & Tamariz-Flores, E. I. (2020). Fractional chaos based-cryptosystem for generating encryption keys in Ad Hoc networks. Ad Hoc Networks, 97, 1\u201321.","journal-title":"Ad Hoc Networks"},{"key":"1937_CR29","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.optlastec.2014.05.012","volume":"64","author":"KM Faraoun","year":"2014","unstructured":"Faraoun, K. M. (2014). Fast encryption of RGB color digital images using a tweakable cellular automaton based schema. Optics and Laser Technology, 64, 145\u2013155.","journal-title":"Optics and Laser Technology"},{"key":"1937_CR30","doi-asserted-by":"publisher","first-page":"1884","DOI":"10.1016\/j.cnsns.2013.10.025","volume":"19","author":"XJ Wu","year":"2014","unstructured":"Wu, X. J., Bai, C. X., & Kan, H. B. (2014). A new color image cryptosystem via hyperchaos synchronization. Communications in Nonlinear Science and Numerical Simulation, 19, 1884\u20131897.","journal-title":"Communications in Nonlinear Science and Numerical Simulation"},{"key":"1937_CR31","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1049\/iet-ipr.2016.0040","volume":"11","author":"HJ Liu","year":"2017","unstructured":"Liu, H. J., Kadir, A., & Sun, X. B. (2017). Chaos-based fast color image encryption scheme with true random number keys from environmental noise. IET Image Process, 11, 324\u2013332.","journal-title":"IET Image Process"},{"key":"1937_CR32","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.optlaseng.2016.03.019","volume":"84","author":"WH Liu","year":"2016","unstructured":"Liu, W. H., Sun, K. H., & Zhu, C. X. (2016). A fast image encryption algorithm based on chaotic map. Optics and Lasers in Engineering, 84, 26\u201336.","journal-title":"Optics and Lasers in Engineering"},{"key":"1937_CR33","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.optcom.2014.12.043","volume":"342","author":"XY Wang","year":"2015","unstructured":"Wang, X. Y., & Zhang, H. L. (2015). A color image encryption with heterogeneous bit-permutation and correlated chaos. Optical Communications, 342, 51\u201360.","journal-title":"Optical Communications"},{"key":"1937_CR34","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.optlaseng.2015.09.007","volume":"78","author":"L Xu","year":"2016","unstructured":"Xu, L., Li, Z., & Li, J. (2016). A novel bit-level image encryption algorithm based on chaotic maps. Optics and Lasers in Engineering, 78, 17\u201325.","journal-title":"Optics and Lasers in Engineering"},{"key":"1937_CR35","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.optlaseng.2016.10.012","volume":"91","author":"L Xu","year":"2017","unstructured":"Xu, L., Gou, X., Li, Z., et al. (2017). A novel chaotic image encryption algorithm using block scrambling and dynamic index-based diffusion. Optics and Lasers in Engineering, 91, 41\u201352.","journal-title":"Optics and Lasers in Engineering"},{"key":"1937_CR36","doi-asserted-by":"crossref","unstructured":"Daemen, J. (2002). Rijmen VTDR, AES-The Advanced Encryption Standard. In Information Security and Cryptography. New York: Springer.","DOI":"10.1007\/978-3-662-04722-4_1"},{"key":"1937_CR37","doi-asserted-by":"publisher","first-page":"2753","DOI":"10.1007\/s11042-020-09648-1","volume":"81","author":"A Pourjabbar Kari","year":"2021","unstructured":"Pourjabbar Kari, A., Habibizad Navin, A., Bidgoli, A. M., & Mirnia, M. (2021). A new image encryption scheme based on hybrid chaotic maps. Multimedia Tools and Applications, 81, 2753\u20132772.","journal-title":"Multimedia Tools and Applications"},{"key":"1937_CR38","doi-asserted-by":"crossref","unstructured":"Zhang, X., Wang, L., Niu, Y., Cui, G., & Geng, S. (2019). Image Encryption Algorithm Based on the H-Fractal and Dynamic Self-Invertible Matrix, Computational Intelligence and Neuroscience, 2019, Article ID 9524080, pp. 1\u201312.","DOI":"10.1155\/2019\/9524080"},{"key":"1937_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/app11125691","volume":"11","author":"H Liang","year":"2021","unstructured":"Liang, H., Zhang, G., Hou, W., Huang, P., Liu, B., & Li, S. (2021). A Novel Asymmetric Hyperchaotic Image Encryption Scheme Based on Elliptic Curve Cryptography. Applied Sciences, 11, 1\u201323.","journal-title":"Applied Sciences"},{"key":"1937_CR40","unstructured":"Ogra\u015f, H., & TUrk, M. (2016). A Secure Chaos-based Image Cryptosystem with an Improved Sine Key Generator. American Journal of Signal Processing, 6(3), 67\u201376."},{"key":"1937_CR41","doi-asserted-by":"crossref","unstructured":"Sheng, Y., Li, J., Di, X., Li, X., Xu, R. (2022). An Image Encryption Algorithm Based on Complex Network Scrambling and Multi-Directional Diffusion, entropy, 24, 1\u201323.","DOI":"10.3390\/e24091247"},{"key":"1937_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.chaos.2022.112628","volume":"164","author":"R Tuli","year":"2022","unstructured":"Tuli, R., Narayan Soneji, H., & Churi, P. (2022). PixAdapt: A novel approach to adaptive image encryption. Chaos, Solitons and Fractals, 164, 1\u201329.","journal-title":"Chaos, Solitons and Fractals"},{"key":"1937_CR43","doi-asserted-by":"publisher","first-page":"13339","DOI":"10.1007\/s11042-020-10318-5","volume":"80","author":"X Wang","year":"2021","unstructured":"Wang, X., & Zhang, M. (2021). A new image encryption algorithm based on ladder transformation and DNA coding. Multimedia Tools and Applications, 80, 13339\u201313365.","journal-title":"Multimedia Tools and Applications"},{"key":"1937_CR44","doi-asserted-by":"publisher","first-page":"3673","DOI":"10.1007\/s11071-021-06761-0","volume":"105","author":"P Kumar Naskar","year":"2021","unstructured":"Kumar Naskar, P., Bhattacharyya, S., Chandra Mahatab, K., Gopal Dhal, K., & Chaudhuri, A. (2021). An efficient block-level image encryption scheme based on multi-chaotic maps with DNA encoding. Nonlinear Dynamics, 105, 3673\u20133698.","journal-title":"Nonlinear Dynamics"},{"key":"1937_CR45","doi-asserted-by":"crossref","unstructured":"Umoh, E. A., Iloanusi, O. N., & Nnolim, U. A. (2020). Image multi-encryption architecture based on hybrid keystream sequence interspersed with Haar discrete wavelet transform. IET Image Processing, 14(10), 2081\u20132091.","DOI":"10.1049\/iet-ipr.2019.0991"},{"key":"1937_CR46","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1007\/s11071-018-4076-6","volume":"92","author":"WK Lee","year":"2018","unstructured":"Lee, W. K., Phan, R. C. W., Yap, W. S., & Goi, B. M. (2018). SPRING: a novel parallel chaos-based image encryption scheme. Nonlinear Dynamics, 92, 575\u2013593.","journal-title":"Nonlinear Dynamics"},{"key":"1937_CR47","doi-asserted-by":"crossref","unstructured":"Tuli, R., Soneji, H., Vahora, S., Churi, P., & Bangalore, M. N. (2022). PixJS: A novel chaos-based approach for image encryption. Concurrency Computat Pract Exper, 34, 1\u201330.","DOI":"10.1002\/cpe.6990"},{"key":"1937_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.eswa.2023.121514","volume":"237","author":"H Wen","year":"2024","unstructured":"Wen, H., & Lin, Y. (2024). Cryptanalysis of an image encryption algorithm using quantum chaotic map and DNA coding. Expert Systems With Applications, 237, 1\u201311.","journal-title":"Expert Systems With Applications"},{"key":"1937_CR49","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.vlsi.2020.10.009","volume":"76","author":"B Rashidi","year":"2021","unstructured":"Rashidi, B. (2021). Compact and Efficient structure of 8-bit S-box for lightweight cryptography. Integration, the VLSI Journal, 76, 172\u2013182.","journal-title":"Integration, the VLSI Journal"},{"issue":"4","key":"1937_CR50","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A. C., Sheikh, H. R., & Simoncelli, E. P. (2004). Image quality assessment: From error visibility to structural similarity. IEEE Transactions on Image Processing, 13(4), 600\u2013612.","journal-title":"IEEE Transactions on Image Processing"}],"container-title":["Journal of Signal Processing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-024-01937-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11265-024-01937-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-024-01937-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T09:51:26Z","timestamp":1737107486000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11265-024-01937-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10]]},"references-count":50,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["1937"],"URL":"https:\/\/doi.org\/10.1007\/s11265-024-01937-4","relation":{},"ISSN":["1939-8018","1939-8115"],"issn-type":[{"value":"1939-8018","type":"print"},{"value":"1939-8115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10]]},"assertion":[{"value":"25 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 October 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 October 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 October 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"The authors declare that they have no conficts of interest.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}