{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T20:24:22Z","timestamp":1773692662639,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"S1","license":[{"start":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T00:00:00Z","timestamp":1717372800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T00:00:00Z","timestamp":1717372800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s11760-024-03182-5","type":"journal-article","created":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T06:02:17Z","timestamp":1717394537000},"page":"663-676","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Robust watermarking with PSO and DnCNN"],"prefix":"10.1007","volume":"18","author":[{"given":"Ali","family":"Amiri","sequence":"first","affiliation":[]},{"given":"Bahram","family":"Kimiaghalam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,3]]},"reference":[{"issue":"10","key":"3182_CR1","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1049\/iet-ipr.2016.0862","volume":"11","author":"S Liu","year":"2017","unstructured":"Liu, S., Pan, Z., Song, H.: Digital image watermarking method based on DCT and fractal encoding. IET J. Image Process. 11(10), 815\u2013821 (2017)","journal-title":"IET J. Image Process."},{"issue":"10","key":"3182_CR2","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1049\/iet-ipr.2016.0862","volume":"11","author":"S Liu","year":"2017","unstructured":"Liu, S., Pan, Z., Song, H.: Digital image watermarking method based on DCT and fractal encoding. IET Image Process. 11(10), 815\u2013821 (2017)","journal-title":"IET Image Process."},{"issue":"3","key":"3182_CR3","first-page":"451","volume":"4","author":"S Mishra","year":"2013","unstructured":"Mishra, S., Mahapatra, A., Mishra, P.: A survey on digital watermarking techniques. Int. J. Comput. Sci. Inf. Technol. (IJCSIT) 4(3), 451\u2013456 (2013)","journal-title":"Int. J. Comput. Sci. Inf. Technol. (IJCSIT)"},{"key":"3182_CR4","doi-asserted-by":"publisher","first-page":"3597","DOI":"10.1007\/s11042-017-5222-8","volume":"77","author":"C Kumar","year":"2018","unstructured":"Kumar, C., Singh, A.K., Kumar, P.: A recent survey on image watermarking techniques and its application in e-governance. Multimed. Tools Appl. 77, 3597\u20133622 (2018). https:\/\/doi.org\/10.1007\/s11042-017-5222-8","journal-title":"Multimed. Tools Appl."},{"key":"3182_CR5","doi-asserted-by":"publisher","first-page":"10561","DOI":"10.1007\/s00500-019-04563-6","volume":"24","author":"X Kang","year":"2020","unstructured":"Kang, X., Chen, Y., Zhao, F., Lin, G.: Multi-dimensional particle swarm optimization for robust blind image watermarking using intertwining logistic map and hybrid domain. Soft. Comput. 24, 10561\u201310584 (2020)","journal-title":"Soft. Comput."},{"issue":"1","key":"3182_CR6","first-page":"e4912","volume":"32","author":"S Malshe","year":"2012","unstructured":"Malshe, S., Gupta, H., Mandloi, S.: Survey of digital image watermarking techniques to achieve robustness. Int. J. Comput. Appl. 32(1), e4912 (2012)","journal-title":"Int. J. Comput. Appl."},{"issue":"10","key":"3182_CR7","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1049\/el:20058252","volume":"41","author":"MH Sedaaghi","year":"2005","unstructured":"Sedaaghi, M.H., Yousefi, S.: Morphological watermarking. Electron. Lett. 41(10), 587\u2013589 (2005)","journal-title":"Electron. Lett."},{"issue":"9","key":"3182_CR8","first-page":"165","volume":"2","author":"P Singh","year":"2013","unstructured":"Singh, P., Chadha, R.S.: A survey of digital watermarking techniques, applications and attacks. Int. J. Eng. Innov. Technol. (IJEIT) 2(9), 165\u2013175 (2013)","journal-title":"Int. J. Eng. Innov. Technol. (IJEIT)"},{"key":"3182_CR9","unstructured":"Potdar, V.M., Han, S., Chang, E.: A survey of digital image watermarking techniques. In: Proceeding of IEEE International Conference on Industrial Informatics (2005)"},{"key":"3182_CR10","doi-asserted-by":"crossref","unstructured":"Panchal, U.H., Srivastava, R.: A comprehensive survey on digital image watermarking techniques. In: Proceeding of Fifth International Conference Communication Systems and Network Technologies, Gwalior, India, pp. 591\u2013595 (2015)","DOI":"10.1109\/CSNT.2015.165"},{"issue":"1","key":"3182_CR11","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/TIFS.2007.916275","volume":"3","author":"TK Tsui","year":"2008","unstructured":"Tsui, T.K., Zhang, X.P., Androutsos, D.: Color image watermarking using multidimensional fourier transforms. IEEE Trans. Inf. Foren. Secur. 3(1), 16\u201328 (2008)","journal-title":"IEEE Trans. Inf. Foren. Secur."},{"key":"3182_CR12","doi-asserted-by":"publisher","first-page":"4863","DOI":"10.1007\/s11042-016-3862-8","volume":"77","author":"A Zear","year":"2018","unstructured":"Zear, A., Singh, A.K., Kumar, P.: A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed. Tools Appl. 77, 4863\u20134882 (2018)","journal-title":"Multimed. Tools Appl."},{"key":"3182_CR13","doi-asserted-by":"publisher","first-page":"43391","DOI":"10.1109\/ACCESS.2020.2978186","volume":"8","author":"WH Alshoura","year":"2020","unstructured":"Alshoura, W.H., Zainol, Z., Teh, J.S., Alawida, M.: A new chaotic image watermarking scheme based on SVD and IWT. IEEE Access 8, 43391\u201343406 (2020)","journal-title":"IEEE Access"},{"issue":"6","key":"3182_CR14","doi-asserted-by":"publisher","first-page":"8781","DOI":"10.1007\/s11042-016-3522-z","volume":"76","author":"Q Su","year":"2017","unstructured":"Su, Q., et al.: A novel blind color image watermarking based on Contourlet transform and Hessenberg decomposition. Multimed. Tools Appl. 76(6), 8781\u20138801 (2017)","journal-title":"Multimed. Tools Appl."},{"key":"3182_CR15","doi-asserted-by":"crossref","unstructured":"Aslantas, V., Dog\u02d8an, L.A., Ozturk, S.: DWT-SVD based image watermarking using particle swarm optimizer. In: Proceeding of IEEE International Conference Multimedia Expo, Hannover, Germany, pp. 241\u2013244 (2008)","DOI":"10.1109\/ICME.2008.4607416"},{"key":"3182_CR16","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1016\/j.eswa.2011.07.059","volume":"39","author":"R-S Run","year":"2012","unstructured":"Run, R.-S., Horng, S.-J., Lai, J.-L., Kao, T.-W., Chen, R.-J.: An improved SVD-based watermarking technique for copyright protection. Expert Syst. Appl. 39, 673\u2013689 (2012)","journal-title":"Expert Syst. Appl."},{"key":"3182_CR17","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1016\/j.ijleo.2018.04.050","volume":"170","author":"P Murali","year":"2018","unstructured":"Murali, P., Sankaradass, V.: An ef_cient roi based copyright protection scheme for digital images with SVD and orthogonal polynomials transformation. Optik 170, 242\u2013264 (2018). https:\/\/doi.org\/10.1016\/j.ijleo.2018.04.050","journal-title":"Optik"},{"issue":"14","key":"3182_CR18","doi-asserted-by":"publisher","first-page":"5711","DOI":"10.1016\/j.ijleo.2016.03.070","volume":"127","author":"IA Ansari","year":"2016","unstructured":"Ansari, I.A., Pant, M., Ahn, C.W.: ABC optimized secured image watermarking scheme to find out the rightful ownership. Optik Int. J. Light Electron Opt. 127(14), 5711\u20135721 (2016)","journal-title":"Optik Int. J. Light Electron Opt."},{"key":"3182_CR19","doi-asserted-by":"crossref","unstructured":"Khare, P., Srivastava, V.K.: Robust digital image watermarking scheme based on RDWT-DCT-SVD. In 2018 5th International Conference on Signal Processing and Integrated Networks (SPIN), pp. 88\u201393. IEEE (2018)","DOI":"10.1109\/SPIN.2018.8474125"},{"key":"3182_CR20","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1007\/s11042-020-09677-w","volume":"80","author":"LH Gong","year":"2021","unstructured":"Gong, L.H., Tian, C., Zou, W.P., Zhou, N.R.: Robust and imperceptible watermarking scheme based on Canny edge detection and SVD in the contourlet domain. Multimed. Tools Appl. 80, 439\u2013461 (2021)","journal-title":"Multimed. Tools Appl."},{"issue":"11\u201312","key":"3182_CR21","doi-asserted-by":"publisher","first-page":"7515","DOI":"10.1007\/s11042-019-08530-z","volume":"79","author":"C Tian","year":"2020","unstructured":"Tian, C., Wen, R.-H., Zou, W.P., Gong, L.H.: Robust and blind watermarking algorithm based on DCT and SVD in the contourlet domain. Multimed. Tools Appl. 79(11\u201312), 7515\u20137541 (2020)","journal-title":"Multimed. Tools Appl."},{"key":"3182_CR22","first-page":"144","volume":"44","author":"E Najafi","year":"2019","unstructured":"Najafi, E., Loukhaoukha, K.: Hybrid secure and robust image watermarking scheme based on SVD and sharp frequency localized contourlet transform. J. Inf. Secur. Appl. 44, 144\u2013156 (2019)","journal-title":"J. Inf. Secur. Appl."},{"issue":"19","key":"3182_CR23","doi-asserted-by":"publisher","first-page":"28003","DOI":"10.1007\/s11042-019-07902-9","volume":"78","author":"L Zhang","year":"2019","unstructured":"Zhang, L., Wei, D.: Dual DCT-DWT-SVD digital watermarking algorithm based on particle swarm optimization. Multimed. Tools Appl. 78(19), 28003\u201328023 (2019). https:\/\/doi.org\/10.1007\/s11042-019-07902-9","journal-title":"Multimed. Tools Appl."},{"issue":"3","key":"3182_CR24","doi-asserted-by":"publisher","first-page":"77","DOI":"10.3390\/sym10030077","volume":"10","author":"X Zhou","year":"2018","unstructured":"Zhou, X., Zhang, H., Wang, C.: A robust image watermarking technique based on DWT, APDCBT, and SVD. Symmetry 10(3), 77 (2018)","journal-title":"Symmetry"},{"key":"3182_CR25","first-page":"123","volume":"147","author":"M Arya","year":"2011","unstructured":"Arya, M., Siddavatam, R.: A novel biometric watermarking approach using LWT-SVD, communications in computer and information. Science 147, 123\u2013131 (2011)","journal-title":"Science"},{"issue":"3","key":"3182_CR26","first-page":"1","volume":"2","author":"LK Saini","year":"2014","unstructured":"Saini, L.K., Shrivastava, V.: A survey of digital watermarking techniques and its applications. Int. J. Comput. Sci. Trends Technol. (IJCST) 2(3), 1 (2014)","journal-title":"Int. J. Comput. Sci. Trends Technol. (IJCST)"},{"issue":"1","key":"3182_CR27","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/S1665-6423(14)71612-8","volume":"12","author":"H Tao","year":"2014","unstructured":"Tao, H., Chongmin, L., Zain, J.M., Abdalla, A.N.: Robust image watermarking theories and techniques: a review. J. Appl. Res. Technol. 12(1), 122\u2013138 (2014)","journal-title":"J. Appl. Res. Technol."},{"issue":"5","key":"3182_CR28","doi-asserted-by":"publisher","first-page":"1149","DOI":"10.1016\/j.jvcir.2014.03.012","volume":"25","author":"J Guo","year":"2014","unstructured":"Guo, J., Prasetyo, H.: False-positive free SVD-based image watermarking. J. Vis. Commun. Image R. 25(5), 1149\u20131163 (2014)","journal-title":"J. Vis. Commun. Image R."},{"key":"3182_CR29","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1016\/j.aeue.2007.02.010","volume":"62","author":"V Aslantas","year":"2008","unstructured":"Aslantas, V.: A singular-value decomposition-based image watermarking using genetic algorithm. AEU Int. J. Electron. Commun. 62, 386\u2013394 (2008)","journal-title":"AEU Int. J. Electron. Commun."},{"key":"3182_CR30","doi-asserted-by":"crossref","unstructured":"Aslantas, V., Dogan, A.L., Ozturk, S.: DWT-SVD based image watermarking using particle swarm optimizer, ICME (2008)","DOI":"10.1109\/ICME.2008.4607416"},{"issue":"4","key":"3182_CR31","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1080\/03772063.2014.961570","volume":"60","author":"K Meenakshi","year":"2014","unstructured":"Meenakshi, K., Satya Prasad, K., Srinivasa Rao, Ch.: A scene based video watermarking using slant transform. IETE J. Res. 60(4), 276\u2013287 (2014)","journal-title":"IETE J. Res."},{"key":"3182_CR32","first-page":"1","volume":"12","author":"K Meenakshi","year":"2020","unstructured":"Meenakshi, K., Swaraja, K., Kora, P.: A hybrid matrix factorization technique to free the watermarking scheme from false positive and negative problems. Multimed. Tools Appl. 12, 1\u201336 (2020)","journal-title":"Multimed. Tools Appl."},{"key":"3182_CR33","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1016\/j.patrec.2016.12.010","volume":"94","author":"IA Ansari","year":"2017","unstructured":"Ansari, I.A., Pant, M.: Multipurpose image watermarking in the domain of DWT based on SVD and ABC. Pattern Recogn. Lett. 94, 228\u2013236 (2017)","journal-title":"Pattern Recogn. Lett."},{"issue":"3","key":"3182_CR34","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MMUL.2011.41","volume":"19","author":"D Rosiyadi","year":"2012","unstructured":"Rosiyadi, D., Horng, S.-J., Fan, P., Wang, X., Khan, M.K., Pan, Y.: Copyright protection for e-government document t images. IEEE Multimed. 19(3), 62\u201373 (2012)","journal-title":"IEEE Multimed."},{"issue":"7","key":"3182_CR35","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1016\/j.jvcir.2013.07.008","volume":"24","author":"SJ Horng","year":"2013","unstructured":"Horng, S.J., Rosiyadi, D., Li, T., Takao, T., Guo, M., Khan, M.K.: A blind image copyright protection scheme for e-government. J. Vis. Commun. Image Rep. 24(7), 1099\u20131105 (2013)","journal-title":"J. Vis. Commun. Image Rep."},{"issue":"1","key":"3182_CR36","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1016\/j.eswa.2011.07.059","volume":"39","author":"RS Run","year":"2012","unstructured":"Run, R.S., Horng, S.J., Lai, J.L., Kao, T.W., Chen, R.J.: An improved SVD-based watermarking technique for copyright protection. Expert Syst. Appl. 39(1), 673\u2013689 (2012)","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"3182_CR37","doi-asserted-by":"publisher","first-page":"013007","DOI":"10.1117\/1.3327935","volume":"19","author":"K Loukhaoukha","year":"2010","unstructured":"Loukhaoukha, K., Chouinard, J.Y.: On the security of ownership watermarking of digital images based on SVD decomposition. J. Electron. Imaging 19(1), 013007 (2010)","journal-title":"J. Electron. Imaging"},{"issue":"5","key":"3182_CR38","doi-asserted-by":"publisher","first-page":"2392","DOI":"10.1016\/j.eswa.2014.10.045","volume":"42","author":"M Ali","year":"2015","unstructured":"Ali, M., Ahn, C.W.: Comments on optimized gray-scale image watermarking using DWT-SVD and firefly algorithm. Expert Syst. Appl. 42(5), 2392\u20132394 (2015)","journal-title":"Expert Syst. Appl."},{"key":"3182_CR39","first-page":"1","volume":"540723","author":"S Khalighi","year":"2010","unstructured":"Khalighi, S., Tirdad, P., Rabiee, H.R.: A contourlet-based image watermarking scheme with high resistance to removal and geometrical attacks. EURASIP J. Adv. Signal 540723, 1\u201313 (2010)","journal-title":"EURASIP J. Adv. Signal"},{"key":"3182_CR40","doi-asserted-by":"crossref","unstructured":"Bhatnagar, G., Raman, B., Swaminathan, K.: DWT-SVD based dual watermarking scheme. In: 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT), pp. 526\u2013531. IEEE (2008)","DOI":"10.1109\/ICADIWT.2008.4664404"},{"issue":"5","key":"3182_CR41","doi-asserted-by":"publisher","first-page":"2392","DOI":"10.1016\/j.eswa.2014.10.045","volume":"42","author":"M Ali","year":"2015","unstructured":"Ali, M., Ahn, C.W.C.W.: Comments on `optimized gray-scale image watermarking using DWT-SVD and _re_y algorithm. Expert Syst. Appl. 42(5), 2392\u20132394 (2015)","journal-title":"Expert Syst. Appl."},{"key":"3182_CR42","doi-asserted-by":"publisher","first-page":"7858","DOI":"10.1016\/j.eswa.2014.06.011","volume":"41","author":"A Mishra","year":"2014","unstructured":"Mishra, A., Agarwal, C., Sharma, A., Bedi, P.: Optimized grayscale image watermarking using DWT-SVD and firefly algorithm. Expert Syst. Appl. 41, 7858\u20137867 (2014)","journal-title":"Expert Syst. Appl."},{"key":"3182_CR43","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.optlaseng.2018.10.014","volume":"114","author":"S Wang","year":"2019","unstructured":"Wang, S., Meng, X., Yin, Y., Wang, Y., Yang, X., Zhang, X., Peng, X., He, W., Dong, G., Chen, H.: Optical image watermarking based on singular value decomposition ghost imaging and lifting wavelet transform. Opt. Lasers Eng. 114, 76\u201382 (2019)","journal-title":"Opt. Lasers Eng."},{"issue":"4","key":"3182_CR44","doi-asserted-by":"publisher","first-page":"938","DOI":"10.1016\/j.optcom.2010.10.047","volume":"284","author":"CC Lai","year":"2011","unstructured":"Lai, C.C.: An improved SVD-based watermarking scheme using human visual characteristics. Opt. Commun. 284(4), 938\u2013944 (2011)","journal-title":"Opt. Commun."},{"issue":"1","key":"3182_CR45","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1049\/iet-ipr.2014.0965","volume":"10","author":"NM Makbol","year":"2016","unstructured":"Makbol, N.M., Khoo, B.E., Rassem, T.H.: Block-based discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics. IET Image Process. 10(1), 34\u201352 (2016)","journal-title":"IET Image Process."},{"issue":"11","key":"3182_CR46","doi-asserted-by":"publisher","first-page":"3060","DOI":"10.1109\/TIM.2010.2066770","volume":"59","author":"C-C Lai","year":"2010","unstructured":"Lai, C.-C., Tsai, C.-C.: Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans. Instrum. Meas. 59(11), 3060\u20133063 (2010)","journal-title":"IEEE Trans. Instrum. Meas."},{"issue":"20","key":"3182_CR47","doi-asserted-by":"publisher","first-page":"20499","DOI":"10.1007\/s11042-016-3962-5","volume":"76","author":"B Kazemivash","year":"2017","unstructured":"Kazemivash, B., Moghaddam, M.E.: A robust digital image watermarking technique using lifting wavelet transform and firefly algorithm. Multimed. Tools Appl. 76(20), 20499\u201320524 (2017)","journal-title":"Multimed. Tools Appl."},{"issue":"2","key":"3182_CR48","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1109\/TMM.2006.886297","volume":"9","author":"R Rykaczewski","year":"2007","unstructured":"Rykaczewski, R.: Comments on an SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans. Multimed. 9(2), 421\u2013423 (2007)","journal-title":"IEEE Trans. Multimed."}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-024-03182-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-024-03182-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-024-03182-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T08:41:04Z","timestamp":1719304864000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-024-03182-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,3]]},"references-count":48,"journal-issue":{"issue":"S1","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["3182"],"URL":"https:\/\/doi.org\/10.1007\/s11760-024-03182-5","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-3885225\/v1","asserted-by":"object"}]},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"value":"1863-1703","type":"print"},{"value":"1863-1711","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,3]]},"assertion":[{"value":"21 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 February 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 March 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate."}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}