{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:24:32Z","timestamp":1740122672050,"version":"3.37.3"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,8,16]],"date-time":"2017-08-16T00:00:00Z","timestamp":1502841600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100009536","name":"SASTRA University","doi-asserted-by":"crossref","award":["R&M\/0027\/SEEE \u2013 010\/2012\u201313"],"award-info":[{"award-number":["R&M\/0027\/SEEE \u2013 010\/2012\u201313"]}],"id":[{"id":"10.13039\/501100009536","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1007\/s11277-017-4795-x","type":"journal-article","created":{"date-parts":[[2017,8,16]],"date-time":"2017-08-16T16:07:26Z","timestamp":1502899646000},"page":"5573-5595","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Tamper Proofing Identification and Authenticated DICOM Image Transmission Using Wireless Channels and CR Network"],"prefix":"10.1007","volume":"97","author":[{"given":"Padmapriya","family":"Praveenkumar","sequence":"first","affiliation":[]},{"given":"P.","family":"Catherine Priya","sequence":"additional","affiliation":[]},{"given":"J.","family":"Avila","sequence":"additional","affiliation":[]},{"given":"K.","family":"Thenmozhi","sequence":"additional","affiliation":[]},{"given":"John Bosco Balaguru","family":"Rayappan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1574-3045","authenticated-orcid":false,"given":"Rengarajan","family":"Amirtharajan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,16]]},"reference":[{"key":"4795_CR1","doi-asserted-by":"crossref","unstructured":"Qian, Z., & Zhang, X. (2016). Reversible data hiding in encrypted images with distributed source encoding, reversible data hiding in encrypted images with distributed source encoding. IEEE Transactions on Circuits and Systems for Video Technology, 26, 636\u2013646. \n                        https:\/\/doi.org\/10.1109\/TCSVT.2015.2418611\n                        \n                    .","DOI":"10.1109\/TCSVT.2015.2418611"},{"key":"4795_CR2","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1016\/j.compbiomed.2016.03.020","volume":"72","author":"D Ravichandran","year":"2016","unstructured":"Ravichandran, D., Padmapriya, P., Rayappan, J. B. B., & Amirtharajan, R. (2016). Chaos based crossover and mutation for securing DICOM image. Computers in Biology and Medicine, 72, 170\u2013184.","journal-title":"Computers in Biology and Medicine"},{"key":"4795_CR3","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1016\/j.compbiomed.2015.04.031","volume":"62","author":"P Padmapriya","year":"2015","unstructured":"Padmapriya, P., Amirtharajan, R., Thenmozhi, K., & Rayappan, J. B. B. (2015). Medical data sheet in safe havens\u2014A tri-layer cryptic solution. Computers in biology and medicine, 62, 264\u2013276.","journal-title":"Computers in biology and medicine"},{"key":"4795_CR4","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1016\/j.cnsns.2014.11.021","volume":"23","author":"J Chen","year":"2015","unstructured":"Chen, J., Zhu, Z., Fu, C., Zhang, L., & Zhang, Y. (2015). An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach. Communications in Nonlinear Science and Numerical Simulation, 23, 294\u2013310.","journal-title":"Communications in Nonlinear Science and Numerical Simulation"},{"key":"4795_CR5","unstructured":"Georgiadis, A., Benny, L., Crookston, B. T., Thucduc, L., Hermida, P., Mani, S., Woldehanna, T., Stein, A. D., & Behrman, J. R. (2016). Growth trajectories from conception through middle childhood and cognitive achievement at age 8\u00a0years: Evidence from four low- and middle-income countries. SSM\u2014Population Health 43\u201354. \n                        http:\/\/www.sciencedirect.com\/science\/article\/pii\/S2352827316000057\n                        \n                    ."},{"key":"4795_CR6","doi-asserted-by":"crossref","first-page":"147","DOI":"10.6029\/smartcr.2014.03.002","volume":"4","author":"S Mohandass","year":"2014","unstructured":"Mohandass, S., & Umamaheswari, G. (2014). Biomedical signal transmission using OFDM-based cognitive radio for wireless healthcare applications. Smart Computing Review, 4, 147.","journal-title":"Smart Computing Review"},{"key":"4795_CR7","doi-asserted-by":"crossref","first-page":"753","DOI":"10.1049\/iet-com.2015.0209","volume":"10","author":"D Goel","year":"2016","unstructured":"Goel, D., Krishna, V. S., & Bhatnagar, M. (2016). Selection relaying in decode-and-forward multi-hop\u00a0cognitive radio\u00a0systems using\u00a0energy detection. IET Communications, 10, 753\u2013760.","journal-title":"IET Communications"},{"key":"4795_CR8","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1109\/MSP.2012.2183771","volume":"29","author":"E Axell","year":"2012","unstructured":"Axell, E., Leus, G., Larsson, E. G., & Poor, H. V. (2012). Spectrum sensing for cognitive radio: State-of-the-art and recent advances. IEEE Signal Processing Magazine, 29, 101.","journal-title":"IEEE Signal Processing Magazine"},{"key":"4795_CR9","doi-asserted-by":"crossref","unstructured":"Lima, J.-B., Madeiro, F., & Sales, F.-J.-R. (2015). Encryption of medical images based on the cosine number transform. Signal Processing: Image Communication, 35, 1\u20138. \n                        https:\/\/doi.org\/10.1016\/j.image.2015.03.005\n                        \n                    .","DOI":"10.1016\/j.image.2015.03.005"},{"key":"4795_CR10","first-page":"687","volume":"27","author":"G Li","year":"2015","unstructured":"Li, G., Kadir, A., & Liu, H. (2015). Color pathological image encryption scheme with S-boxes generated by complex chaotic system and environmental noise. Neural Computer and Application, 27, 687.","journal-title":"Neural Computer and Application"},{"key":"4795_CR11","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1016\/j.cnsns.2014.12.005","volume":"24","author":"A Kanso","year":"2015","unstructured":"Kanso, A., & Ghebleh, M. (2015). An efficient and robust image encryption scheme for medical applications. Communications in Nonlinear Science and Numerical Simulation, 24, 98\u2013116.","journal-title":"Communications in Nonlinear Science and Numerical Simulation"},{"key":"4795_CR12","unstructured":"Das, P., Kushwaha, S. C., Chakraborty, & M. (2015). Data hiding using randomization and multiple encrypted secret images. In Proceedings of the communications and signal processing (pp. 0298\u20130302). \n                        http:\/\/ieeexplore.ieee.org\/xpl\/articleDetails.jsp?arnumber=7322892&queryText=least%20substitution%20bit&sortType=desc_p_Publication_Year\n                        \n                    ."},{"key":"4795_CR13","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.cnsns.2014.10.021","volume":"22","author":"X-J Tong","year":"2015","unstructured":"Tong, X.-J., Wang, Z., Liu, Y., Zhang, M., & Xu, L. (2015). A novel compound chaotic block cipher for wireless sensor networks. Communications in Nonlinear Science and Numerical Simulation, 22, 120\u2013133.","journal-title":"Communications in Nonlinear Science and Numerical Simulation"},{"key":"4795_CR14","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/j.optlaseng.2014.11.017","volume":"67","author":"J-X Chen","year":"2015","unstructured":"Chen, J.-X., Zhu, Z.-L., Fu, C., Yu, H., & Zhang, L.-B. (2015). An efficient image encryption scheme using gray code based permutation approach. Optics and Lasers in Engineering, 67, 191\u2013204.","journal-title":"Optics and Lasers in Engineering"},{"key":"4795_CR15","doi-asserted-by":"crossref","unstructured":"Prashanthi, R. (2015). A hybrid fragile high capacity watermarking technique with template matching detection scheme. In Proceedings of the intelligent systems and control (pp. 1\u20136). \n                        https:\/\/doi.org\/10.1109\/ISCO.2015.7282332\n                        \n                    .","DOI":"10.1109\/ISCO.2015.7282332"},{"key":"4795_CR16","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s13319-015-0068-1","volume":"6","author":"MA Machkour","year":"2015","unstructured":"Machkour, M., Saaidi, A., & Benmaati, M. L. (2015). A novel image encryption algorithm based on the two-dimensional logistic map and the latin square image cipher. 3D Research, 6, 36. \n                        https:\/\/doi.org\/10.1007\/s13319-015-0068-1\n                        \n                    .","journal-title":"3D Research"},{"key":"4795_CR17","unstructured":"Padmapriya, P., Nisha, R., Thenmozhi, K., Rayappan, J. B. B., & Amirtharajan, R. (2016). Image merger encryptor: A chaotic and Chebyshev key approach. Research Journal of Information Technology, 10\u201316. \n                        http:\/\/scialert.net\/abstract\/?doi=rjit.2016.10.16\n                        \n                    ."},{"key":"4795_CR18","doi-asserted-by":"crossref","first-page":"3495","DOI":"10.1007\/s11042-015-2449-0","volume":"75","author":"W-CA Hu","year":"2016","unstructured":"Hu, W.-C. A., Chen, W.-H. A., Huang, D.-Y. B., & Yang, C.-Y. A. (2016). Effective image forgery detection of tampered foreground or background image based on image watermarking and alpha mattes. Multimedia Tools and Applications, 75, 3495\u20133516.","journal-title":"Multimedia Tools and Applications"},{"key":"4795_CR19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13638-015-0511-2","volume":"2016","author":"FH Qureshi","year":"2016","unstructured":"Qureshi, F. H., Sheikh, S. A., Khan, Q. U., & Malik, F. M. (2016). SEP performance of triangular QAM with MRC spatial diversity over fading channels. EURASIP Journal on Wireless Communications and Networking, 2016, 1\u201316.","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"key":"4795_CR20","unstructured":"Ahmad, M., & Ahmad, F. (2014). Cryptanalysis of image encryption based on permutation-substitution using chaotic map and latin square image cipher. In Proceedings of the 3rd international conference on frontiers of intelligent computing: Theory and applications (pp. 481\u2013488). \n                        https:\/\/link.springer.com\/chapter\/10.1007%2F978-3-319-11933-5_53\n                        \n                    . \u00a0"},{"key":"4795_CR21","doi-asserted-by":"crossref","unstructured":"Panduranga, H. T., Naveen Kumar, S. K., & Kiran. (2014). Image encryption based on permutation-substitution using chaotic map and latin square image cipher. The European Physical Journal Special Topics, 223, 1663\u20131677. \n                        https:\/\/link.springer.com\/article\/10.1140\/epjst\/e2014-02119-9\n                        \n                    .","DOI":"10.1140\/epjst\/e2014-02119-9"},{"key":"4795_CR22","first-page":"1","volume":"59","author":"ZA He","year":"2016","unstructured":"He, Z. A., Ma, W. A., Shao, S. A., Wu, F. A., Qing, C. B., & Tang, Y. A. (2016). Performance of an M-QAM full-duplex wireless system with a nonlinear amplifier. Science China Information Sciences, 59, 1\u20139.","journal-title":"Science China Information Sciences"},{"key":"4795_CR23","doi-asserted-by":"crossref","unstructured":"Shi, Q., Wu, N., Wang, H., & Yuan, W. (2016). Joint channel estimation and decoding in the presence of phase noise over time-selective flat-fading channels. IET Communications, 577\u2013585. \n                        https:\/\/doi.org\/10.1049\/iet-com.2015.0453\n                        \n                    .","DOI":"10.1049\/iet-com.2015.0453"},{"key":"4795_CR24","doi-asserted-by":"crossref","unstructured":"Kester, Q.-A., Nana, L., Pascu, A. C., & Gire, S. (2013). A new encryption cipher for securing digital images of video surveillance devices using Diffie-Hellman-MD5 algorithm and RGB pixel shuffling. In European modelling symposium (pp. 305\u2013311).","DOI":"10.1109\/EMS.2013.53"},{"key":"4795_CR25","doi-asserted-by":"crossref","unstructured":"Ghosh, R., Verma, S., Kumar, R., Kumar, S., & Ram, S. (2015). Design of hash algorithm using Latin square. Procedia Computer Science, 46, 759\u2013765. \n                        https:\/\/doi.org\/10.1016\/j.procs.2015.02.144\n                        \n                    .","DOI":"10.1016\/j.procs.2015.02.144"},{"key":"4795_CR26","doi-asserted-by":"crossref","first-page":"3269","DOI":"10.1016\/j.cnsns.2010.12.016","volume":"16","author":"S Deng","year":"2011","unstructured":"Deng, S., Zhan, Y., Xiao, D., & Li, Y. (2011). Analysis and improvement of a hash-based image encryption algorithm. Communications in Nonlinear Science and Numerical Simulation, 16, 3269\u20133278.","journal-title":"Communications in Nonlinear Science and Numerical Simulation"},{"key":"4795_CR27","doi-asserted-by":"crossref","unstructured":"Praveenkumar, P., Kerthana Devi, N., Ravichandran, D.,  Avila, J.,  Thenmozhi, K., Rayappan, J. B. B., et al. (2017). Transreceiving of encrypted medical image \u2013 a cognitive approach. Multimedia Tools and Applications. \n                        https:\/\/doi.org\/10.1007\/s11042-017-4741-7\n                        \n                    .","DOI":"10.1007\/s11042-017-4741-7"},{"key":"4795_CR28","unstructured":"Padmapriya, P., Amirtharajan, R.,\u00a0Thenmozhi, K.,\u00a0Rayappan, J. B. B. (2015). Medical data sheet in safe havens\u2014A tri-layer cryptic solution. Computers in Biology and Medicine 264\u2013276. \n                        http:\/\/www.ncbi.nlm.nih.gov\/pubmed\/25966921\n                        \n                    ."},{"key":"4795_CR29","doi-asserted-by":"crossref","first-page":"2224","DOI":"10.1016\/j.eswa.2014.09.055","volume":"42","author":"A Tareef","year":"2015","unstructured":"Tareef, A., & Al-Ani, A. (2015). A highly secure oblivious sparse coding-based watermarking system for ownership verification. Expert Systems with Applications, 42, 2224\u20132233.","journal-title":"Expert Systems with Applications"},{"key":"4795_CR30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/MCOM.2008.4481339","volume":"46","author":"IF Akyildiz","year":"2008","unstructured":"Akyildiz, I. F., Lee, W. Y., Vuran, M. C., & Mohanty, S. (2008). A survey on spectrum management in cognitive radio network. IEEE Communications Magazine, 46, 1.","journal-title":"IEEE Communications Magazine"},{"key":"4795_CR31","doi-asserted-by":"crossref","unstructured":"Liang, Y. C., Zeng, Y., Peh, E. C. Y., & Hoang, A. T. (2008). Sensing-throughput tradeoff for cognitive radio networks. IEEE Transactions on Wireless Communication, 7, 1326\u20131337. \n                        https:\/\/doi.org\/10.1109\/TWC.2008.060869\n                        \n                    .","DOI":"10.1109\/TWC.2008.060869"},{"key":"4795_CR32","doi-asserted-by":"crossref","unstructured":"Srinivasa, S., & Jafar, S. A. (2008). Cognitive radios for dynamic spectrum access\u2014The throughput potential for cognitive radio: A theoretical perspective. IEEE Communications Magazine, 45,\u00a073\u201379. \n                        https:\/\/doi.org\/10.1109\/MCOM.2007.358852\n                        \n                    .","DOI":"10.1109\/MCOM.2007.358852"},{"key":"4795_CR33","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1109\/TITB.2006.879588","volume":"11","author":"SF Sergio","year":"2007","unstructured":"Sergio, S. F., Marina, S. R., Ramon, A. M., Marcelo, S., Nivaldo, B., & Gustavo, H. M. B. M. (2007). Managing medical images and clinical information. IEEE Transaction on Information Technology Biomedicine, 11, 17\u201324.","journal-title":"IEEE Transaction on Information Technology Biomedicine"},{"key":"4795_CR34","volume-title":"Information hiding techniques for steganography and digital watermarking","author":"K Stefan","year":"2000","unstructured":"Stefan, K., & Fabien, A. P. P. (2000). Information hiding techniques for steganography and digital watermarking. Boston: Artek House."},{"key":"4795_CR35","unstructured":"Shoemaker, C. (2000). Independent study, hidden bits: A survey of techniques for digital watermarking. EER-290 Prof Rudko Spring."},{"key":"4795_CR36","doi-asserted-by":"crossref","unstructured":"Chung, Y. Y., & Wong, M. T. (2003) Implementation of digital watermarking system. In 2003 IEEE international conference on consumer electronics, 2003 ICCE. IEEE (pp. 214\u2013215).","DOI":"10.1109\/ICCE.2003.1218891"},{"key":"4795_CR37","doi-asserted-by":"crossref","first-page":"619","DOI":"10.1007\/s11517-006-0081-x","volume":"44","author":"A Giakoumaki","year":"2006","unstructured":"Giakoumaki, A., Pavlopoulos, S., & Koutsouris, D. (2006). Secure and efficient health data management through multiple watermarking on medical images. Medical and Biological Engineering and Computing, 44, 619\u2013631.","journal-title":"Medical and Biological Engineering and Computing"},{"key":"4795_CR38","first-page":"156","volume":"6064","author":"HM Le","year":"2006","unstructured":"Le, H. M., & Aburdene, M. (2006). The discrete Gould transform and its applications. Proceedings of SPIE\u2014The International Society for Optical Engineering, 6064, 156.","journal-title":"Proceedings of SPIE\u2014The International Society for Optical Engineering"},{"key":"4795_CR39","unstructured":"Skodras, A. N. (2013). Discrete Gould transform\u2014Fast realizations and data hiding. In Proceedings of the IET seminar digest."},{"key":"4795_CR40","doi-asserted-by":"crossref","unstructured":"Kumar, S. K. N., Kumar, H. S. S., & Panduranga, H. T. (2013). Hardware software co-simulation of dual image encryption using Latin square image. In Proceedings of the 4th international conference on computing, communications and networking technologies (pp. 1\u20135). \n                        https:\/\/doi.org\/10.1109\/ICCCNT.2013.6726681\n                        \n                    .","DOI":"10.1109\/ICCCNT.2013.6726681"},{"key":"4795_CR41","doi-asserted-by":"crossref","unstructured":"Yue, W., Noonan, J. P., & Agaian, S. (2011). Image encryption using the rectangular Sudoku cipher.  In International Conference on System Science and Engineering (pp. 704\u2013709). \u00a0\n                        https:\/\/doi.org\/10.1109\/ICSSE.2011.5961994\n                        \n                    .","DOI":"10.1109\/ICSSE.2011.5961994"},{"key":"4795_CR42","doi-asserted-by":"crossref","unstructured":"Padmapriya, P., Kala, L., Nisha, R., Amirtharajan, R., Thenmozhi, K., & Rayappan, J. B. B. (2015). Hungarian sculptured discrete Gould transformed bit planes\u2014A double puzzled image. In International conference on computer communication and informatics\u00a0(pp. 1\u20134). \n                        https:\/\/doi.org\/10.1109\/ICCCI.2015.7218068\n                        \n                    .","DOI":"10.1109\/ICCCI.2015.7218068"},{"key":"4795_CR43","doi-asserted-by":"crossref","unstructured":"Praveenkumar, P., Amirtharajan, R., Thenmozhi, K., & Rayappan, J. B. B. (2017). Fusion of confusion and diffusion: A novel image encryption approach. Telecommunications System, 65, 65\u201378. \n                        https:\/\/doi.org\/10.1007\/s11235-016-0212-0\n                        \n                    .","DOI":"10.1007\/s11235-016-0212-0"},{"key":"4795_CR44","doi-asserted-by":"crossref","unstructured":"He, C., Jiang, A., Yu, J., & Du, B. (2011). Scrambling chaotic image encryption algorithm based on Contourlet. In Fourth international workshop on chaos-fractals theories and applications\u00a0\u00a0(pp. 188\u2013192). \n                        https:\/\/doi.org\/10.1109\/IWCFTA.2011.89\n                        \n                    .","DOI":"10.1109\/IWCFTA.2011.89"},{"key":"4795_CR45","doi-asserted-by":"crossref","unstructured":"Zhu, Z.-L., Wang, C., Chai, C., & Yu, H. (2011). A chaotic image encryption scheme based on magic cube transformation. In a Fourth international workshop on chaos-fractals theories and applications (pp. 214\u2013218). \n                        https:\/\/doi.org\/10.1109\/IWCFTA.2011.75\n                        \n                    .","DOI":"10.1109\/IWCFTA.2011.75"},{"key":"4795_CR46","doi-asserted-by":"crossref","unstructured":"Pathak, S., Kamble, R., & Chaursia, D. (2014). An efficient data encryption standard image encryption technique with RGB random uncertainty. In International conference on optimization, reliability, and information technology\u00a0(pp. 413\u2013421). \n                        https:\/\/doi.org\/10.1109\/ICROIT.2014.6798366\n                        \n                    .","DOI":"10.1109\/ICROIT.2014.6798366"},{"key":"4795_CR47","doi-asserted-by":"crossref","unstructured":"Chen, J.-X., Zhu, Z.-L., Fu, C., Zhang, L.-B., & Yu, H. (2015). Analysis and improvement of a double-image encryption scheme using pixel scrambling technique in gyrator domains. Optics and Lasers in Engineering, 66, 1\u20139. \n                        https:\/\/doi.org\/10.1016\/j.optlaseng.2014.08.010\n                        \n                    .","DOI":"10.1016\/j.optlaseng.2014.08.010"},{"key":"4795_CR48","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1016\/j.optcom.2014.10.049","volume":"338","author":"J Lang","year":"2015","unstructured":"Lang, J. (2015). Color image encryption based on color blend and chaos permutation in the reality-preserving multiple-parameter fractional Fourier transform domain. Optics Communications, 338, 181\u2013192.","journal-title":"Optics Communications"},{"key":"4795_CR49","doi-asserted-by":"crossref","unstructured":"Zhao, T., Ran, Q., & Chi, Y. (2015). Image encryption based on nonlinear encryption system and public-key cryptography. Optics Communications, 338, 64\u201372. \n                        https:\/\/doi.org\/10.1016\/j.optcom.2014.09.083\n                        \n                    .","DOI":"10.1016\/j.optcom.2014.09.083"},{"key":"4795_CR50","doi-asserted-by":"crossref","unstructured":"Allidina, K. A., Khattab, T. B., & El-Gamal, M. N. A. (2016). Dual peak detection UWB receivers in noise and interference dominated environments. AEU International Journal of Electronics and Communications, 70, 121\u2013131. \n                        https:\/\/doi.org\/10.1016\/j.aeue.2015.10.002\n                        \n                    .","DOI":"10.1016\/j.aeue.2015.10.002"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-4795-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4795-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4795-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,18]],"date-time":"2020-05-18T04:54:47Z","timestamp":1589777687000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-4795-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,16]]},"references-count":50,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["4795"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-4795-x","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2017,8,16]]}}}