{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:05:17Z","timestamp":1760709917803,"version":"3.37.3"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,6,3]],"date-time":"2019-06-03T00:00:00Z","timestamp":1559520000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,6,3]],"date-time":"2019-06-03T00:00:00Z","timestamp":1559520000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Real-Time Image Proc"],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1007\/s11554-019-00887-6","type":"journal-article","created":{"date-parts":[[2019,6,3]],"date-time":"2019-06-03T17:51:44Z","timestamp":1559584304000},"page":"175-184","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Secure real-time image protection scheme with near-duplicate detection in cloud computing"],"prefix":"10.1007","volume":"17","author":[{"given":"Dengzhi","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0519-9058","authenticated-orcid":false,"given":"Jian","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Anxi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,3]]},"reference":[{"issue":"3","key":"887_CR1","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/j.patrec.2009.10.014","volume":"31","author":"Q Gao","year":"2010","unstructured":"Gao, Q., Zhang, L., Zhang, D., Xu, H.: Independent components extraction from image matrix. Pattern Recogn. Lett. 31(3), 171\u2013178 (2010)","journal-title":"Pattern Recogn. Lett."},{"key":"887_CR2","first-page":"346","volume":"2","author":"H Wang","year":"2005","unstructured":"Wang, H., Ahuja, N.: Rank-r approximation of tensors: using image-as-matrix representation. IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit. 2, 346\u2013353 (2005)","journal-title":"IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit."},{"key":"887_CR3","first-page":"37","volume":"9677","author":"L Chang","year":"2016","unstructured":"Chang, L., Yu, C., Yan, L., Chen, G., Vokkarane, V., Ma, Y.: Deepfood: deep learning-based food image recognition for computer-aided dietary assessment. Int. Conf. Smart Homes Health Telemat. 9677, 37\u201348 (2016)","journal-title":"Int. Conf. Smart Homes Health Telemat."},{"key":"887_CR4","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.neunet.2014.09.003","volume":"61","author":"J Schmidhuber","year":"2015","unstructured":"Schmidhuber, J.: Deep learning in neural networks: an overview. Neural Netw. 61, 85\u2013117 (2015)","journal-title":"Neural Netw."},{"key":"887_CR5","first-page":"323","volume-title":"Lecture Notes in Computational Vision and Biomechanics","author":"Muhammad Imran Razzak","year":"2017","unstructured":"Razzak, M.I., Naz, S., Zaib, A.: Deep learning for medical image processing: Overview, challenges and the future. In: Classification in BioApps, pp. 323\u2013350 (2018)"},{"issue":"6","key":"887_CR6","first-page":"50","volume":"53","author":"P Mell","year":"2011","unstructured":"Mell, P., Grance, T.: The nist definition of cloud computing. Commun. ACM 53(6), 50 (2011)","journal-title":"Commun. ACM"},{"issue":"4","key":"887_CR7","first-page":"833","volume":"18","author":"J Shen","year":"2017","unstructured":"Shen, J., Liu, D., Lai, C.F., Ren, Y., Wang, J., Sun, X.: A secure identity-based dynamic group data sharing scheme for cloud computing. J. Internet Technol. 18(4), 833\u2013842 (2017)","journal-title":"J. Internet Technol."},{"key":"887_CR8","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/8214619","author":"T Zhou","year":"2018","unstructured":"Zhou, T., Shen, J., Li, X., Wang, C., Shen, J.: Quantum cryptography for the future internet and the security analysis. Secur. Commun. Netw. (2018). \nhttps:\/\/doi.org\/10.1155\/2018\/8214619","journal-title":"Secur. Commun. Netw."},{"issue":"1","key":"887_CR9","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/TIFS.2014.2363765","volume":"10","author":"X Chen","year":"2014","unstructured":"Chen, X., Huang, X., Jin, L., Ma, J., Lou, W., Wong, D.S.: New algorithms for secure outsourcing of largescale systems of linear equations. IEEE Trans. Inf. Forensics Secur. 10(1), 69\u201378 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"887_CR10","doi-asserted-by":"publisher","DOI":"10.1109\/jsyst.2019.2900723","author":"M Zhang","year":"2019","unstructured":"Zhang, M., Zhang, Y., Jiang, Y., Shen, J.: Obfuscating EVES algorithm and its application in fair electronic transactions in public cloud systems. IEEE Syst. J. (2019). \nhttps:\/\/doi.org\/10.1109\/jsyst.2019.2900723","journal-title":"IEEE Syst. J."},{"issue":"9","key":"887_CR11","doi-asserted-by":"publisher","first-page":"2386","DOI":"10.1109\/TPDS.2013.180","volume":"25","author":"X Chen","year":"2012","unstructured":"Chen, X., Li, J., Ma, J., Qiang, T., Lou, W.: New algorithms for secure outsourcing of modular exponentiations. IEEE Trans. Parallel Distrib. Syst. 25(9), 2386\u20132396 (2012)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"4","key":"887_CR12","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MCOM.2011.5741145","volume":"49","author":"Y Zhang","year":"2011","unstructured":"Zhang, Y., Yu, R., Yao, W., Xie, S., Miao, Y., Guizani, M.: Home m2m networks: architectures, standards, and qos improvement. IEEE Commun. Mag. 49(4), 44\u201352 (2011)","journal-title":"IEEE Commun. Mag."},{"issue":"1","key":"887_CR13","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.dss.2010.12.006","volume":"51","author":"S Marston","year":"2011","unstructured":"Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., Ghalsasi, A.: Cloud computing-the business perspective. Decis. Support Syst. 51(1), 176\u2013189 (2011)","journal-title":"Decis. Support Syst."},{"key":"887_CR14","doi-asserted-by":"publisher","unstructured":"Wang, C., Shen, J., Lai, C.F., Huang, R., Wei, F.: Neighborhood trustworthiness based vehicle-to-vehicle authentication scheme for vehicular ad hoc networks. Concurr. Comput. Pract. Exp. (2018). \nhttps:\/\/doi.org\/10.1002\/cpe.4643","DOI":"10.1002\/cpe.4643"},{"issue":"5","key":"887_CR15","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1109\/TDSC.2014.2366471","volume":"12","author":"X Chen","year":"2015","unstructured":"Chen, X., Li, J., Huang, X., Ma, J., Lou, W.: New publicly verifiable databases with efficient updates. IEEE Trans. Dependable Secure Comput. 12(5), 546\u2013556 (2015)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"1","key":"887_CR16","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1109\/TSG.2012.2223766","volume":"4","author":"S Maharjan","year":"2013","unstructured":"Maharjan, S., Zhu, Q., Zhang, Y., Gjessing, S., Basar, T.: Dependable demand response management in the smart grid: a stackelberg game approach. IEEE Trans. Smart Grid 4(1), 120\u2013132 (2013)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"12","key":"887_CR17","doi-asserted-by":"publisher","first-page":"3285","DOI":"10.1109\/TPDS.2013.2295809","volume":"25","author":"X Chen","year":"2014","unstructured":"Chen, X., Li, J., Huang, X., Li, J., Xiang, Y., Wong, D.S.: Secure outsourced attribute-based signatures. IEEE Trans. Parallel Distrib. Syst. 25(12), 3285\u20133294 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"2","key":"887_CR18","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1504\/IJSNET.2018.092638","volume":"27","author":"D Liu","year":"2018","unstructured":"Liu, D., Shen, J., Wang, A., Wang, C.: Lightweight and practical node clustering authentication protocol for hierarchical wireless sensor networks. Int. J. Sens. Netw. 27(2), 95\u2013102 (2018)","journal-title":"Int. J. Sens. Netw."},{"key":"887_CR19","doi-asserted-by":"publisher","unstructured":"Shen, J., Liu, D., Bhuiyan, M.Z.A., Shen, J., Sun, X., Castiglione, A.: Secure verifiable database supporting efficient dynamic operations in cloud computing. In: IEEE Transactions on Emerging Topics in Computing (2017). \nhttps:\/\/doi.org\/10.1109\/tetc.2017.2776402","DOI":"10.1109\/tetc.2017.2776402"},{"key":"887_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.04.008","author":"T Zhou","year":"2018","unstructured":"Zhou, T., Shen, J., Li, X., Wang, C., Tan, H.: Logarithmic encryption scheme for cyber-physical systems employing fibonacci q-matrix. Future Gener Comput Syst (2018). \nhttps:\/\/doi.org\/10.1016\/j.future.2018.04.008","journal-title":"Future Gener Comput Syst"},{"key":"887_CR21","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2018.2885561","author":"N Sun","year":"2018","unstructured":"Sun, N., Zhang, J., Rimba, P., Gao, S., Xiang, Y.: Data-driven cybersecurity incident prediction and discovery: a survey. IEEE Commun Surv Tutor (2018). \nhttps:\/\/doi.org\/10.1109\/comst.2018.2885561","journal-title":"IEEE Commun Surv Tutor"},{"issue":"2","key":"887_CR22","doi-asserted-by":"publisher","first-page":"1397","DOI":"10.1109\/COMST.2018.2800740","volume":"20","author":"L Liu","year":"2018","unstructured":"Liu, L., Vel, D.O., Han, Q.-L., Zhang, J., Xiang, Y.: Detecting and preventing cyber insider threats: a survey. IEEE Commun. Surv. Tutor. 20(2), 1397\u20131417 (2018)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"887_CR23","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1109\/COMST.2016.2615098","volume":"19","author":"J Jiang","year":"2017","unstructured":"Jiang, J., Wen, S., Yu, S., Xiang, Y., Zhou, W.: Identifying propagation sources in networks: state-of-the-art and comparative studies. IEEE Commun. Surv. Tutor. 19(1), 465\u2013481 (2017)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"5","key":"887_CR24","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MIC.2009.103","volume":"13","author":"MD Dikaiakos","year":"2009","unstructured":"Dikaiakos, M.D., Katsaros, D., Mehra, P., Pallis, G., Vakali, A.: Cloud computing: distributed internet computing for it and scientific research. IEEE Internet Comput. 13(5), 10\u201313 (2009)","journal-title":"IEEE Internet Comput."},{"key":"887_CR25","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/j.cose.2017.11.013","volume":"76","author":"T Wu","year":"2018","unstructured":"Wu, T., Wen, S., Xiang, Y., Zhou, W.: Twitter spam detection: survey of new approaches and comparative study. Comput. Secur. 76, 265\u2013284 (2018)","journal-title":"Comput. Secur."},{"issue":"1","key":"887_CR26","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1109\/TPDS.2012.98","volume":"24","author":"J Zhang","year":"2013","unstructured":"Zhang, J., Xiang, Y., Wang, Y., Zhou, W., Xiang, Y., Guan, Y.: Network traffic classification using correlation information. IEEE Trans. Parallel Distrib. Syst. 24(1), 104\u2013117 (2013)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"3","key":"887_CR27","doi-asserted-by":"publisher","first-page":"640","DOI":"10.1109\/TC.2013.2295802","volume":"64","author":"S Wen","year":"2015","unstructured":"Wen, S., Haghighi, M.S., Chen, C., Xiang, Y., Zhou, W., Jia, W.: A sword with two edges: propagation studies on both positive and negative information in online social networks. IEEE Trans. Comput. 64(3), 640\u2013653 (2015)","journal-title":"IEEE Trans. Comput."},{"issue":"3","key":"887_CR28","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MNET.2012.6201210","volume":"26","author":"Y Zhang","year":"2012","unstructured":"Zhang, Y., Yu, R., Nekovee, M., Liu, Y., Xie, S., Gjessing, S.: Cognitive machine-to-machine communications: visions and potentials for the smart grid. IEEE Netw. Mag. 26(3), 6\u201313 (2012)","journal-title":"IEEE Netw. Mag."},{"issue":"8","key":"887_CR29","doi-asserted-by":"publisher","first-page":"1000","DOI":"10.1016\/j.compbiomed.2013.05.005","volume":"43","author":"F Chong","year":"2013","unstructured":"Chong, F., Meng, W., Zhan, Y., Zhu, Z., Lau, F.C.M., Chi, K.T., Ma, H.: An efficient and secure medical image protection scheme based on chaotic maps. Comput. Biol. Med. 43(8), 1000\u20131010 (2013)","journal-title":"Comput. Biol. Med."},{"key":"887_CR30","doi-asserted-by":"crossref","unstructured":"Hou, Y.C., Huang, P.H.: Image protection based on visual cryptography and statistical property. In: IEEE Statistical Signal Processing Workshop, pp. 481\u2013484 (2011)","DOI":"10.1109\/SSP.2011.5967737"},{"key":"887_CR31","doi-asserted-by":"crossref","unstructured":"Isa, M.R.M., Aljareh, S.: Biometric image protection based on discrete cosine transform watermarking technique. In: International Conference on Engineering & Technology, pp. 1\u20135 (2012)","DOI":"10.1109\/ICEngTechnol.2012.6396130"},{"key":"887_CR32","unstructured":"Masmoudi, A., Puech, W., Bouhlel, M.S.: A generalized continued fraction-based asynchronous stream cipher for image protection. In: European Signal Processing Conference, pp. 24\u201328 (2009)"},{"issue":"7","key":"887_CR33","doi-asserted-by":"publisher","first-page":"2266","DOI":"10.1109\/TIP.2015.2414878","volume":"24","author":"S Sarreshtedari","year":"2015","unstructured":"Sarreshtedari, S., Ali, A.: A source-channel coding approach to digital image protection and self-recovery. IEEE Trans. Image Process. 24(7), 2266\u20132277 (2015)","journal-title":"IEEE Trans. Image Process."},{"issue":"2","key":"887_CR34","doi-asserted-by":"publisher","first-page":"790","DOI":"10.1109\/JSEN.2017.2772799","volume":"18","author":"C-H Hsia","year":"2018","unstructured":"Hsia, C.-H.: New verification method for finger-vein recognition system. IEEE Sens. J. 18(2), 790\u2013797 (2018)","journal-title":"IEEE Sens. J."},{"issue":"4","key":"887_CR35","doi-asserted-by":"publisher","first-page":"803","DOI":"10.1007\/s11554-015-0553-z","volume":"14","author":"S-L Chen","year":"2018","unstructured":"Chen, S.-L., Nie, J., Lin, T.-L., Chung, R.-L., Hsia, C.-H., Liu, Z.-Y., Wu, H.-X.: VLSI implementation of an ultra low-cost and low-power image compressor for wireless camera networks. J. Real Time Image Proc. 14(4), 803\u2013812 (2018)","journal-title":"J. Real Time Image Proc."},{"issue":"2","key":"887_CR36","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/s11554-014-0404-3","volume":"13","author":"C-H Hsia","year":"2017","unstructured":"Hsia, C.-H., Wu, T.-C., Chiang, J.-S.: A new method of moving object detection using adaptive filter. J. Real Time Image Proc. 13(2), 311\u2013325 (2017)","journal-title":"J. Real Time Image Proc."},{"key":"887_CR37","doi-asserted-by":"crossref","unstructured":"Bueno, L.M., Valle, E., Torres, R.: Bayesian approach for near-duplicate image detection. In: ACM International Conference on Multimedia Retrieval, pp. 15\u201318 (2012)","DOI":"10.1145\/2324796.2324815"},{"key":"887_CR38","unstructured":"Hu, Y., Li, M., Yu, N.: Efficient near-duplicate image detection by learning from examples. In: IEEE International Conference on Multimedia and Expo, pp. 657\u2013660 (2008)"},{"key":"887_CR39","first-page":"229","volume-title":"Lecture Notes in Computer Science","author":"Hung-sik Kim","year":"2010","unstructured":"Kim, H.s., Chang, H.W., Lee, J., Lee, D.: Basil: effective near-duplicate image detection using gene sequence alignment. In: European Conference on Information Retrieval, pp. 229\u2013240 (2010)"},{"issue":"6","key":"887_CR40","doi-asserted-by":"publisher","first-page":"1319","DOI":"10.1109\/TMM.2011.2167224","volume":"13","author":"H Xie","year":"2011","unstructured":"Xie, H., Gao, K., Zhang, Y., Tang, S., Li, J., Liu, Y.: Efficient feature detection and effective post-verification for large scale near-duplicate image search. IEEE Trans. Multimed. 13(6), 1319\u20131332 (2011)","journal-title":"IEEE Trans. Multimed."},{"key":"887_CR41","doi-asserted-by":"crossref","unstructured":"Zheng, L., Qiu, G., Huang, J., Fu, H.: Salient covariance for near-duplicate image and video detection. In: IEEE International Conference on Image Processing, pp. 2537\u20132540 (2011)","DOI":"10.1109\/ICIP.2011.6116179"},{"key":"887_CR42","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1007\/978-3-642-38348-9_18","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2013","author":"Mihir Bellare","year":"2013","unstructured":"Bellare, M., Keelveedhi, S., Ristenpart, T.: Messagelocked encryption and secure deduplication. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 296\u2013312 (2013)"},{"key":"887_CR43","unstructured":"Douceur, J.R., Adya, A., Bolosky, W.J., Simon, P., Theimer, M.: Reclaiming space from duplicate files in a serverless distributed file system. In: International Conference on Distributed Computing Systems, pp. 617\u2013624 (2002)"},{"issue":"8","key":"887_CR44","doi-asserted-by":"publisher","first-page":"2386","DOI":"10.1109\/TC.2015.2389960","volume":"65","author":"J Li","year":"2016","unstructured":"Li, J., Li, J., Xie, D., Zhang, C.: Secure auditing and deduplicating data in cloud. IEEE Trans. Comput. 65(8), 2386\u20132396 (2016)","journal-title":"IEEE Trans. Comput."},{"issue":"11","key":"887_CR45","doi-asserted-by":"publisher","first-page":"4593","DOI":"10.1109\/TIP.2012.2204272","volume":"21","author":"CY Hsu","year":"2012","unstructured":"Hsu, C.Y., Lu, C.S., Pei, S.C.: Image feature extraction in encrypted domain with privacy-preserving sift. IEEE Trans. Image Process. 21(11), 4593\u20134607 (2012)","journal-title":"IEEE Trans. Image Process."},{"issue":"5","key":"887_CR46","doi-asserted-by":"publisher","first-page":"2435","DOI":"10.1007\/s11042-015-2472-1","volume":"75","author":"F Nian","year":"2016","unstructured":"Nian, F., Li, T., Wu, X., Gao, Q., Li, F.: Efficient nearduplicate image detection with a local-based binary representation. Multimed. Tools Appl. 75(5), 2435\u20132452 (2016)","journal-title":"Multimed. Tools Appl."},{"issue":"3","key":"887_CR47","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1561\/2000000039","volume":"7","author":"L Deng","year":"2014","unstructured":"Deng, L., Yu, D.: Deep learning: methods and applications. Found. Trends Signal Process. 7(3), 197\u2013387 (2014)","journal-title":"Found. Trends Signal Process."},{"key":"887_CR48","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV, USA, 27\u201330 June 2016, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"887_CR49","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/978-3-540-25937-4_24","volume-title":"Fast Software Encryption","author":"Phillip Rogaway","year":"2004","unstructured":"Rogaway, P., Shrimpton, T.: Cryptographic hash-function basics: definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In: International Workshop on Fast Software Encryption, pp. 371\u2013388 (2004)"}],"container-title":["Journal of Real-Time Image Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-019-00887-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11554-019-00887-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-019-00887-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,2]],"date-time":"2020-06-02T00:56:58Z","timestamp":1591059418000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11554-019-00887-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,3]]},"references-count":49,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,2]]}},"alternative-id":["887"],"URL":"https:\/\/doi.org\/10.1007\/s11554-019-00887-6","relation":{},"ISSN":["1861-8200","1861-8219"],"issn-type":[{"type":"print","value":"1861-8200"},{"type":"electronic","value":"1861-8219"}],"subject":[],"published":{"date-parts":[[2019,6,3]]},"assertion":[{"value":"20 February 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 May 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}