{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T04:00:42Z","timestamp":1763092842639},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,3,4]],"date-time":"2023-03-04T00:00:00Z","timestamp":1677888000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,4]],"date-time":"2023-03-04T00:00:00Z","timestamp":1677888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"DST FIST Fund","award":["SR\/FST\/ET-I\/2018\/221(C)"],"award-info":[{"award-number":["SR\/FST\/ET-I\/2018\/221(C)"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Real-Time Image Proc"],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1007\/s11554-023-01278-8","type":"journal-article","created":{"date-parts":[[2023,3,4]],"date-time":"2023-03-04T12:02:47Z","timestamp":1677931367000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Reconfigurable color medical image encryptor using hardware accelerated Chao(S)-box triplets"],"prefix":"10.1007","volume":"20","author":[{"given":"Vinoth","family":"Raj","sequence":"first","affiliation":[]},{"given":"Siva","family":"Janakiraman","sequence":"additional","affiliation":[]},{"given":"Rengarajan","family":"Amirtharajan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,4]]},"reference":[{"issue":"8","key":"1278_CR1","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1109\/TNB.2017.2780881","volume":"16","author":"D Ravichandran","year":"2017","unstructured":"Ravichandran, D., Praveenkumar, P., Rayappan, J.B.B., Amirtharajan, R.: DNA Chaos blend to secure medical privacy. IEEE Trans. Nanobiosci. 16(8), 850\u2013858 (2017)","journal-title":"IEEE Trans. Nanobiosci."},{"issue":"4","key":"1278_CR2","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656\u2013715 (1949)","journal-title":"Bell Syst. Tech. J."},{"key":"1278_CR3","unstructured":"Rosslyn, S.: \u201cDICOM PS 3.15 Security and System Management Profiles,\u201d DICOM Stand., (2011)"},{"issue":"5","key":"1278_CR4","doi-asserted-by":"publisher","first-page":"562","DOI":"10.1016\/j.optcom.2011.10.098","volume":"285","author":"X Wang","year":"2012","unstructured":"Wang, X., Zhao, J., Liu, H.: A new image encryption algorithm based on chaos. Opt. Commun. 285(5), 562\u2013566 (2012)","journal-title":"Opt. Commun."},{"issue":"23","key":"1278_CR5","doi-asserted-by":"publisher","first-page":"5415","DOI":"10.1016\/j.optcom.2011.08.013","volume":"284","author":"C Fu","year":"2011","unstructured":"Fu, C., Bin Lin, B., Miao, Y.S., Liu, X., Chen, J.J.: A novel chaos-based bit-level permutation scheme for digital image encryption. Opt. Commun. 284(23), 5415\u20135423 (2011)","journal-title":"Opt. Commun."},{"key":"1278_CR6","doi-asserted-by":"publisher","first-page":"37991","DOI":"10.1109\/ACCESS.2018.2849439","volume":"6","author":"WK Lee","year":"2018","unstructured":"Lee, W.K., Phan, R.C.W., Goi, B.M., Chen, L., Zhang, X., Xiong, N.N.: Parallel and high speed hashing in GPU for telemedicine applications. IEEE Access 6, 37991\u201338002 (2018)","journal-title":"IEEE Access"},{"issue":"2","key":"1278_CR7","doi-asserted-by":"publisher","first-page":"1201","DOI":"10.1007\/s11277-020-07274-6","volume":"113","author":"T Shah","year":"2020","unstructured":"Shah, T., Ali, A., Khan, M., Farooq, G., de Andrade, A.A.: Galois ring GR(2 3, 8) dependent 24 \u00d7 24 S-box design: an RGB image encryption application. Wirel. Pers. Commun. 113(2), 1201\u20131224 (2020)","journal-title":"Wirel. Pers. Commun."},{"issue":"20","key":"1278_CR8","doi-asserted-by":"publisher","first-page":"27017","DOI":"10.1007\/s11042-018-5902-z","volume":"77","author":"A Girdhar","year":"2018","unstructured":"Girdhar, A., Kumar, V.: A RGB image encryption technique using Lorenz and Rossler chaotic system on DNA sequences. Multimed. Tools Appl. 77(20), 27017\u201327039 (2018)","journal-title":"Multimed. Tools Appl."},{"key":"1278_CR9","first-page":"1","volume":"5","author":"AK Das","year":"2018","unstructured":"Das, A.K., Hajra, S., Mandal, M.K.: RGB image encryption using microcontroller ATMEGA 32. Microsyst. Technol. 5, 1\u20139 (2018)","journal-title":"Microsyst. Technol."},{"issue":"4","key":"1278_CR10","doi-asserted-by":"publisher","first-page":"781","DOI":"10.3390\/app9040781","volume":"9","author":"X Wang","year":"2019","unstructured":"Wang, X., et al.: S-box based image encryption application using a chaotic system without equilibrium. Appl. Sci. 9(4), 781 (2019)","journal-title":"Appl. Sci."},{"key":"1278_CR11","doi-asserted-by":"publisher","first-page":"78367","DOI":"10.1109\/ACCESS.2019.2922376","volume":"7","author":"Z Liu","year":"2019","unstructured":"Liu, Z., Wu, C., Wang, J., Hu, Y.: A color image encryption using dynamic DNA and 4-D Memristive Hyper-Chaos. IEEE Access 7, 78367\u201378378 (2019)","journal-title":"IEEE Access"},{"issue":"11","key":"1278_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/e21111075","volume":"21","author":"S Khan","year":"2019","unstructured":"Khan, S., Han, L., Mudassir, G., Guehguih, B., Ullah, H.: 3C3R, an image encryption algorithm based on BBI, 2D-CA, and SM-DNA. Entropy 21(11), 1\u201333 (2019)","journal-title":"Entropy"},{"issue":"31\u201332","key":"1278_CR13","doi-asserted-by":"publisher","first-page":"22825","DOI":"10.1007\/s11042-020-09033-y","volume":"79","author":"US Choi","year":"2020","unstructured":"Choi, U.S., Cho, S.J., Kim, J.G., Kang, S.W., Kim, H.D.: Color image encryption based on programmable complemented maximum length cellular automata and generalized 3-D chaotic cat map. Multimed. Tools Appl. 79(31\u201332), 22825\u201322842 (2020)","journal-title":"Multimed. Tools Appl."},{"issue":"2","key":"1278_CR14","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1007\/s11071-016-3099-0","volume":"87","author":"\u00dc \u00c7avu\u015fo\u011flu","year":"2017","unstructured":"\u00c7avu\u015fo\u011flu, \u00dc., Zengin, A., Pehlivan, I., Ka\u00e7ar, S.: A novel approach for strong S-Box generation algorithm design based on chaotic scaled Zhongtang system. Nonlinear Dyn. 87(2), 1081\u20131094 (2017)","journal-title":"Nonlinear Dyn."},{"key":"1278_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.micpro.2017.02.003","volume":"50","author":"B Ramalingam","year":"2017","unstructured":"Ramalingam, B., Rengarajan, A., Rayappan, J.B.B.: Hybrid image crypto system for secure image communication\u2014a VLSI approach. Microprocess. Microsyst. 50, 1\u201313 (2017)","journal-title":"Microprocess. Microsyst."},{"issue":"5","key":"1278_CR16","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/s11265-018-1337-z","volume":"91","author":"D Ravichandran","year":"2019","unstructured":"Ravichandran, D., Rajagopalan, S., Upadhyay, H.N., Rayappan, J.B.B., Amirtharajan, R.: Encrypted biography of biomedical image\u2014a pentalayer cryptosystem on FPGA. J. Signal Process. Syst. 91(5), 475\u2013501 (2019)","journal-title":"J. Signal Process. Syst."},{"key":"1278_CR17","doi-asserted-by":"publisher","first-page":"50513","DOI":"10.1109\/ACCESS.2019.2910859","volume":"7","author":"CH Yang","year":"2019","unstructured":"Yang, C.H., Wu, H.C., Su, S.F.: Implementation of encryption algorithm and wireless image transmission system on FPGA. IEEE Access 7, 50513\u201350523 (2019)","journal-title":"IEEE Access"},{"key":"1278_CR18","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.aeue.2017.05.047","volume":"80","author":"SM Ismail","year":"2017","unstructured":"Ismail, S.M., et al.: Generalized fractional logistic map encryption system based on FPGA. AEU Int. J. Electron. Commun. 80, 114\u2013126 (2017)","journal-title":"AEU Int. J. Electron. Commun."},{"key":"1278_CR19","doi-asserted-by":"crossref","unstructured":"ElSafty, A. H., Tolba, M. F., Said, L. A., Madian, A. H., Radwan, A. G.: Hardware realization of a secure and enhanced s-box based speech encryption engine. Analog Integr. Circuits Signal Process. 106, 385\u2013397 (2021)","DOI":"10.1007\/s10470-020-01614-z"},{"key":"1278_CR20","doi-asserted-by":"publisher","unstructured":"Schmitz, J., Lei, Z.: R\u00f6ssler-based chaotic communication system implemented on FPGA. Can. Conf. Electr. Comput. Eng. 1\u20134 (2017). https:\/\/doi.org\/10.1109\/CCECE.2017.7946729","DOI":"10.1109\/CCECE.2017.7946729"},{"issue":"18","key":"1278_CR21","doi-asserted-by":"publisher","first-page":"23449","DOI":"10.1007\/s11042-017-5566-0","volume":"77","author":"S Rajagopalan","year":"2018","unstructured":"Rajagopalan, S., Rethinam, S., Arumugham, S., Upadhyay, H.N., Rayappan, J.B.B., Amirtharajan, R.: Networked hardware assisted key image and chaotic attractors for secure RGB image communication. Multimedia Tools Appl. 77(18), 23449 (2018)","journal-title":"Multimedia Tools Appl."},{"key":"1278_CR22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3233\/JIFS-182519","volume":"40","author":"V Raj","year":"2021","unstructured":"Raj, V., Janakiraman, S., Amirtharajan, R.: Optimal concurrency on FPGA for lightweight medical image encryption. J. Intell. Fuzzy Syst. 40, 1\u201316 (2021)","journal-title":"J. Intell. Fuzzy Syst."},{"key":"1278_CR23","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.ijleo.2017.08.028","volume":"147","author":"DS Laiphrakpam","year":"2017","unstructured":"Laiphrakpam, D.S., Khumanthem, M.S.: Medical image encryption based on improved ElGamal encryption technique. Optik (Stuttg) 147, 88\u2013102 (2017)","journal-title":"Optik (Stuttg)"},{"issue":"27\u201328","key":"1278_CR24","doi-asserted-by":"publisher","first-page":"19129","DOI":"10.1007\/s11042-020-08718-8","volume":"79","author":"MAB Farah","year":"2020","unstructured":"Farah, M.A.B., Guesmi, R., Kachouri, A., Samet, M.: A new design of cryptosystem based on S-box and chaotic permutation. Multimed. Tools Appl. 79(27\u201328), 19129\u201319150 (2020)","journal-title":"Multimed. Tools Appl."},{"issue":"6","key":"1278_CR25","doi-asserted-by":"publisher","first-page":"577","DOI":"10.3390\/e21060577","volume":"21","author":"SS Moafimadani","year":"2019","unstructured":"Moafimadani, S.S., Chen, Y., Tang, C.: A new algorithm for medical color images encryption using chaotic systems. Entropy 21(6), 577 (2019)","journal-title":"Entropy"},{"issue":"2","key":"1278_CR26","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1007\/s00500-014-1539-7","volume":"20","author":"NK Pareek","year":"2016","unstructured":"Pareek, N.K., Patidar, V.: Medical image protection using genetic algorithm operations. Soft Comput. 20(2), 763\u2013772 (2016)","journal-title":"Soft Comput."},{"key":"1278_CR27","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-642-27866-2_29","volume":"137","author":"Z Chen","year":"2012","unstructured":"Chen, Z.: A lightweight encryption algorithm for images. Adv. Intell. Soft Comput. 137, 235\u2013241 (2012)","journal-title":"Adv. Intell. Soft Comput."},{"key":"1278_CR28","doi-asserted-by":"publisher","first-page":"36667","DOI":"10.1109\/ACCESS.2019.2906292","volume":"7","author":"A Belazi","year":"2019","unstructured":"Belazi, A., Talha, M., Kharbech, S., Xiang, W.: Novel medical image encryption scheme based on Chaos and DNA encoding. IEEE Access 7, 36667\u201336681 (2019)","journal-title":"IEEE Access"},{"key":"1278_CR29","doi-asserted-by":"publisher","first-page":"107484","DOI":"10.1016\/j.sigpro.2020.107484","volume":"171","author":"M Zhou","year":"2020","unstructured":"Zhou, M., Wang, C.: A novel image encryption scheme based on conservative hyperchaotic system and closed-loop diffusion between blocks. Signal Process. 171, 107484 (2020)","journal-title":"Signal Process."},{"key":"1278_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2019.107340","volume":"168","author":"C Chen","year":"2020","unstructured":"Chen, C., Sun, K., He, S.: An improved image encryption algorithm with finite computing precision. Signal Process. 168, 107340 (2020)","journal-title":"Signal Process."},{"key":"1278_CR31","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1364\/AO.410329","volume":"60","author":"YH Xiaohui Wang","year":"2021","unstructured":"Xiaohui Wang, Y.H., Zhu, Z., Wang, F., Ni, R., Wang, J.: Medical image encryption based on biometric keys and lower\u2013upper decomposition with partial pivoting. Appl. Opt. 60, 24\u201332 (2021)","journal-title":"Appl. Opt."},{"key":"1278_CR32","doi-asserted-by":"publisher","first-page":"104265","DOI":"10.1016\/j.micpro.2021.104265","volume":"84","author":"V Raj","year":"2021","unstructured":"Raj, V., Janakiraman, S., Rajagopalan, S., Amirtharajan, R.: Security analysis of reversible logic cryptography design with LFSR key on 32-bit microcontroller. Microprocess. Microsyst. 84, 104265 (2021)","journal-title":"Microprocess. Microsyst."},{"key":"1278_CR33","unstructured":"Rukhin, A., Soto, J., Nechvatal, J.: A statistical test suite for random and pseudorandom number generators for cryptographic applications. Nist Spec. Publ. 22, 1\/1\u2013G\/1, (2010)"},{"issue":"1","key":"1278_CR34","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1049\/iet-ipr.2012.0586","volume":"8","author":"ML Barakat","year":"2014","unstructured":"Barakat, M.L., Mansingka, A.S., Radwan, A.G., Salama, K.N.: Hardware stream cipher with controllable chaos generator for colour image encryption. IET Image Process. 8(1), 33\u201343 (2014)","journal-title":"IET Image Process."},{"key":"1278_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-5281-2013-43","volume":"2013","author":"S Sadoudi","year":"2013","unstructured":"Sadoudi, S., Tanougast, C., Azzaz, M.S., Dandache, A.: Design and FPGA implementation of a wireless hyperchaotic communication system for secure real-time image transmission. Eurasip J. Image Video Process. 2013, 1\u201318 (2013)","journal-title":"Eurasip J. Image Video Process."},{"issue":"10","key":"1278_CR36","doi-asserted-by":"publisher","first-page":"11669","DOI":"10.1007\/s11042-017-4811-x","volume":"77","author":"B Ramalingam","year":"2018","unstructured":"Ramalingam, B., Ravichandran, D., Annadurai, A.A., Rengarajan, A., Rayappan, J.B.B.: Chaos triggered image encryption\u2014a reconfigurable security solution. Multimed. Tools Appl. 77(10), 11669\u201311692 (2018)","journal-title":"Multimed. Tools Appl."},{"key":"1278_CR37","doi-asserted-by":"publisher","first-page":"153","DOI":"10.36909\/jer.v9i3A.10111","volume":"9","author":"A Gutub","year":"2021","unstructured":"Gutub, A., Al Roithy, B.: Varying PRNG to improve image cryptography implementation. J. Eng. Res. 9, 153\u2013183 (2021). https:\/\/doi.org\/10.36909\/jer.v9i3A.10111","journal-title":"J. Eng. Res."},{"issue":"1","key":"1278_CR38","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1049\/cit2.12053","volume":"7","author":"FS Hassan","year":"2022","unstructured":"Hassan, F.S., Gutub, A.: Improving data hiding within colour images using hue component of HSV colour space. CAAI Trans. Intell. Technol. 7(1), 56\u201368 (2022). https:\/\/doi.org\/10.1049\/cit2.12053","journal-title":"CAAI Trans. Intell. Technol."},{"key":"1278_CR39","doi-asserted-by":"publisher","first-page":"28521","DOI":"10.1007\/s11042-021-11051-3","volume":"80","author":"BO Al-Roithy","year":"2021","unstructured":"Al-Roithy, B.O., Gutub, A.: Remodeling randomness prioritization to boost-up security of RGB image encryption. Multimed. Tools Appl. 80, 28521\u201328581 (2021). https:\/\/doi.org\/10.1007\/s11042-021-11051-3","journal-title":"Multimed. Tools Appl."},{"issue":"1","key":"1278_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJISP.307071","volume":"16","author":"A Gutub","year":"2022","unstructured":"Gutub, A.: Enhancing cryptography of grayscale images via resilience randomization flexibility. IJISP 16(1), 1\u201328 (2022). https:\/\/doi.org\/10.4018\/IJISP.307071","journal-title":"IJISP"},{"key":"1278_CR41","doi-asserted-by":"publisher","first-page":"8441","DOI":"10.1007\/s13369-021-05529-3","volume":"46","author":"FS Hassan","year":"2021","unstructured":"Hassan, F.S., Gutub, A.: Efficient image reversible data hiding technique based on interpolation optimization. Arab. J. Sci. Eng. 46, 8441\u20138456 (2021). https:\/\/doi.org\/10.1007\/s13369-021-05529-3","journal-title":"Arab. J. Sci. Eng."},{"key":"1278_CR42","doi-asserted-by":"publisher","DOI":"10.1049\/cit2.12093","author":"A Gutub","year":"2022","unstructured":"Gutub, A.: Boosting image watermarking authenticity spreading secrecy from counting-based secret-sharing. CAAI Trans. Intell. Technol (2022). https:\/\/doi.org\/10.1049\/cit2.12093","journal-title":"CAAI Trans. Intell. Technol"},{"issue":"1","key":"1278_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJISP.2022010118","volume":"16","author":"A Gutub","year":"2022","unstructured":"Gutub, A.: Watermarking images via counting-based secret sharing for lightweight semi-complete authentication. IJISP 16(1), 1\u201318 (2022). https:\/\/doi.org\/10.4018\/IJISP.2022010118","journal-title":"IJISP"},{"key":"1278_CR44","unstructured":"Al-Roithy, B.O., Abdul-Aziz Gutub, A.: Trustworthy image security via involving binary and chaotic gravitational searching within PRNG selections. Int. J. Comput. Sci. Netw. Secur. 20(12), 167\u2013176 (2020)"},{"key":"1278_CR45","doi-asserted-by":"publisher","DOI":"10.36909\/jer.17853","author":"A Gutub","year":"2022","unstructured":"Gutub, A.: Dynamic smart random preference for higher medical image confidentiality. J. Eng. Res. (2022). https:\/\/doi.org\/10.36909\/jer.17853","journal-title":"J. Eng. Res."},{"key":"1278_CR46","unstructured":"Hureib, E., Gutub, A.: Enhancing medical data security via combining elliptic curve cryptography and image steganography. Int. J. Comput. Sci. Netw. Secur. 20, 1\u20138 (2020)"},{"issue":"3","key":"1278_CR47","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5281\/zenodo.3543455","volume":"2","author":"H Samkari","year":"2019","unstructured":"Samkari, H., Gutub, A.: Protecting medical records against cybercrimes within Hajj period by 3-layer security. Recent Trends Inform. Technol. Appl. 2(3), 1\u201321 (2019). https:\/\/doi.org\/10.5281\/zenodo.3543455","journal-title":"Recent Trends Inform. Technol. Appl."},{"issue":"4","key":"1278_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJEHMC.2019100101","volume":"10","author":"N Alassaf","year":"2019","unstructured":"Alassaf, N., Gutub, A.: Simulating light-weight-cryptography implementation for IoT healthcare data security applications. IJEHMC 10(4), 1\u201315 (2019). https:\/\/doi.org\/10.4018\/IJEHMC.2019100101","journal-title":"IJEHMC"},{"key":"1278_CR49","doi-asserted-by":"publisher","first-page":"50","DOI":"10.4656\/jreas.2017.v02i02.002","volume":"2","author":"N Alassaf","year":"2017","unstructured":"Alassaf, N., Alkazemi, B., Gutub, A.: Applicable light-weight cryptography to secure medical data in IoT systems. J. Res. Eng. Appl. Sci. 2, 50\u201358 (2017). https:\/\/doi.org\/10.4656\/jreas.2017.v02i02.002","journal-title":"J. Res. Eng. Appl. Sci."},{"key":"1278_CR50","doi-asserted-by":"crossref","unstructured":"Allawi, S.T., Riadh Alshibani, D.: Color image encryption using LFSR, DNA, and 3D Chaotic maps International journal of electrical and computer engineering systems 13(10), 885\u2013893 (2022)","DOI":"10.32985\/ijeces.13.10.4"},{"issue":"12","key":"1278_CR51","doi-asserted-by":"publisher","first-page":"1827","DOI":"10.3390\/e24121827.PMID:36554231;PMCID:PMC9777660","volume":"24","author":"J Zheng","year":"2022","unstructured":"Zheng, J., Bao, T.: An image encryption algorithm using cascade chaotic map and S-box. Entropy (Basel). 24(12), 1827 (2022). https:\/\/doi.org\/10.3390\/e24121827.PMID:36554231;PMCID:PMC9777660","journal-title":"Entropy (Basel)."}],"container-title":["Journal of Real-Time Image Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-023-01278-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11554-023-01278-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-023-01278-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,13]],"date-time":"2023-04-13T19:19:43Z","timestamp":1681413583000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11554-023-01278-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,4]]},"references-count":51,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["1278"],"URL":"https:\/\/doi.org\/10.1007\/s11554-023-01278-8","relation":{},"ISSN":["1861-8200","1861-8219"],"issn-type":[{"value":"1861-8200","type":"print"},{"value":"1861-8219","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,4]]},"assertion":[{"value":"22 July 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 January 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"27"}}