{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T21:17:44Z","timestamp":1777497464909,"version":"3.51.4"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2018,8,7]],"date-time":"2018-08-07T00:00:00Z","timestamp":1533600000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Evol. Intel."],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1007\/s12065-018-0159-z","type":"journal-article","created":{"date-parts":[[2018,8,7]],"date-time":"2018-08-07T10:26:00Z","timestamp":1533637560000},"page":"53-71","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Medical image security enhancement using two dimensional chaotic mapping optimized by self-adaptive grey wolf algorithm"],"prefix":"10.1007","volume":"11","author":[{"given":"Srinivas","family":"Koppu","sequence":"first","affiliation":[]},{"given":"V. Madhu","family":"Viswanatham","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,7]]},"reference":[{"key":"159_CR1","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.optlastec.2016.02.018","volume":"82","author":"N Zhou","year":"2016","unstructured":"Zhou N, Pan S, Cheng S, Zhou Z (2016) Image compression\u2014encryption scheme based on hyper-chaotic system and 2D compressive sensing. Opt Laser Technol 82:121\u2013133","journal-title":"Opt Laser Technol"},{"key":"159_CR2","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.optlaseng.2016.03.019","volume":"84","author":"W Liu","year":"2016","unstructured":"Liu W, Sun K, Zhu C (2016) A fast image encryption algorithm based on chaotic map. Opt Lasers Eng 84:26\u201336","journal-title":"Opt Lasers Eng"},{"issue":"6","key":"159_CR3","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1049\/iet-cvi.2015.0344","volume":"10","author":"B Murugan","year":"2016","unstructured":"Murugan B, Nanjappa Gounder AG (2016) Image encryption scheme based on block-based confusion and multiple levels of diffusion. IET Comput Vision 10(6):593\u2013602","journal-title":"IET Comput Vision"},{"issue":"2\u20133","key":"159_CR4","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/0375-9601(93)91067-F","volume":"182","author":"M Giovannozzi","year":"1993","unstructured":"Giovannozzi M (1993) Analysis of the stability domain for the Henon map. Phys Lett A 182(2\u20133):255\u2013260","journal-title":"Phys Lett A"},{"issue":"5","key":"159_CR5","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1049\/iet-ipr.2014.0514","volume":"9","author":"SM Wadi","year":"2015","unstructured":"Wadi SM, Zainal N (2015) Decomposition by binary codes-based speedy image encryption algorithm for multiple applications. IET Image Proc 9(5):413\u2013423","journal-title":"IET Image Proc"},{"issue":"3","key":"159_CR6","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1049\/iet-ipr.2014.0224","volume":"9","author":"Y Sun","year":"2015","unstructured":"Sun Y, Xu R, Chen L, Hu X (2015) Image compression and encryption scheme using fractal dictionary and Julia set. IET Image Proc 9(3):173\u2013183","journal-title":"IET Image Proc"},{"key":"159_CR7","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.sigpro.2016.03.021","volume":"128","author":"A Belazi","year":"2016","unstructured":"Belazi A, Abd El-Latif AA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Sig Process 128:155\u2013170","journal-title":"Sig Process"},{"issue":"4","key":"159_CR8","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1049\/iet-ifs.2012.0304","volume":"7","author":"J Li","year":"2013","unstructured":"Li J, Liu H (2013) Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map. IET Inf Secur 7(4):265\u2013270","journal-title":"IET Inf Secur"},{"key":"159_CR9","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","volume":"297","author":"Z Hua","year":"2015","unstructured":"Hua Z, Zhou Y, Pun CM, Philip Chen CL (2015) 2D Sine Logistic modulation map for image encryption. Inf Sci 297:80\u201394","journal-title":"Inf Sci"},{"issue":"3","key":"159_CR10","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.sigpro.2009.08.010","volume":"90","author":"A Cheddad","year":"2010","unstructured":"Cheddad A, Condell J, Curran K, McKevitt P (2010) Digital image steganography: survey and analysis of current methods. Sig Process 90(3):727\u2013752","journal-title":"Sig Process"},{"issue":"8","key":"159_CR11","doi-asserted-by":"publisher","first-page":"1227","DOI":"10.1109\/TCOMM.2002.801488","volume":"50","author":"YC Tseng","year":"2002","unstructured":"Tseng YC, Chen YY, Pan HK (2002) A secure data hiding scheme for binary images. IEEE Trans Commun 50(8):1227\u20131231","journal-title":"IEEE Trans Commun"},{"issue":"11","key":"159_CR12","doi-asserted-by":"publisher","first-page":"5388","DOI":"10.1109\/JSTARS.2015.2475169","volume":"8","author":"S Zope-Chaudhari","year":"2015","unstructured":"Zope-Chaudhari S, Venkatachalam P, Buddhiraju KM (2015) Secure dissemination and protection of multispectral images using crypto-watermarking. IEEE J Select Topics Appl Earth Observations Remote Sens 8(11):5388\u20135394","journal-title":"IEEE J Select Topics Appl Earth Observations Remote Sens"},{"issue":"6","key":"159_CR13","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MPOT.2012.2219651","volume":"32","author":"A Philip","year":"2013","unstructured":"Philip A (2013) A generalized pseudo-knight? s tour algorithm for encryption of an image. IEEE Potentials 32(6):10\u201316","journal-title":"IEEE Potentials"},{"issue":"3","key":"159_CR14","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MP.2004.1341784","volume":"23","author":"M Yang","year":"2004","unstructured":"Yang M, Bourbakis N, Li S (2004) Data-image-video encryption. IEEE Potentials 23(3):28\u201334","journal-title":"IEEE Potentials"},{"key":"159_CR15","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.ins.2016.02.041","volume":"349\u2013350","author":"X Wu","year":"2016","unstructured":"Wu X, Wang D, Kurths J, Kan H (2016) A novel lossless color image encryption scheme using 2D DWT and 6D hyperchaotic system. Inf Sci 349\u2013350:137\u2013153","journal-title":"Inf Sci"},{"issue":"4","key":"159_CR16","doi-asserted-by":"publisher","first-page":"1204","DOI":"10.1109\/TCE.2005.1561845","volume":"51","author":"S Sudharsanan","year":"2005","unstructured":"Sudharsanan S (2005) Shared key encryption of JPEG color images. IEEE Trans Consum Electron 51(4):1204\u20131211","journal-title":"IEEE Trans Consum Electron"},{"issue":"4","key":"159_CR17","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1364\/JOCN.7.000276","volume":"7","author":"X Zhang","year":"2015","unstructured":"Zhang X, Li W, Hu H, Dutta NK (2015) High-speed all-optical encryption and decryption based on two-photon absorption in semiconductor optical amplifiers. IEEE\/OSA J Opt Commun Netw 7(4):276\u2013285","journal-title":"IEEE\/OSA J Opt Commun Netw"},{"key":"159_CR18","unstructured":"Wagh AM, Todmal SR (2015) Eyelids, eyelashes detection algorithm and Hough transform method for noise removal in iris recognition. Int J Comput Appl 112(3)"},{"issue":"1","key":"159_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.aej.2016.09.003","volume":"57","author":"BS Sunil Kumar","year":"2018","unstructured":"Sunil Kumar BS, Manjunath AS, Christopher S (2018) Improved entropy encoding for high efficient video coding standard. Alex Eng J 57(1):1\u20139","journal-title":"Alex Eng J"},{"key":"159_CR20","unstructured":"Kota PN, Gaikwad AN (2017) Optimized scrambling sequence to reduce papr in space frequency block codes based MIMO-OFDM system. J Adv Res Dyn Control Syst 502\u2013525"},{"issue":"4","key":"159_CR21","doi-asserted-by":"publisher","first-page":"274","DOI":"10.22266\/ijies2017.0831.29","volume":"10","author":"K Bhatnagar","year":"2017","unstructured":"Bhatnagar K, Gupta S (2017) Extending the neural model to study the impact of effective area of optical fiber on laser intensity. Int J Intell Eng Syst 10(4):274\u2013283","journal-title":"Int J Intell Eng Syst"},{"issue":"3","key":"159_CR22","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1080\/03772063.2015.1009403","volume":"61","author":"GN Balaji","year":"2015","unstructured":"Balaji GN, Subashini TS, Chidambaram N (2015) Detection of heart muscle damage from automated analysis of echocardiogram video. IETE J Res 61(3):236\u2013243","journal-title":"IETE J Res"},{"key":"159_CR23","doi-asserted-by":"crossref","unstructured":"Bramhe SS, Dalal A, Tajne D, Marotkar D (2015) Glass shaped antenna with defected ground structure for cognitive radio application. In: International Conference on Computing Communication Control and Automation, Pune, pp\u00a0330\u2013333","DOI":"10.1109\/ICCUBEA.2015.69"},{"key":"159_CR24","unstructured":"Yarrapragada KSSR, Krishna BB (2017) Impact of tamanu oil-diesel blend on combustion, performance and emissions of diesel engine and its prediction methodology. J Braz Soc Mech Sci Eng 1\u201315"},{"key":"159_CR25","unstructured":"Sreedharan NPN, Ganesan B, Raveendran R, Sarala P, Dennis B, Boothalingam R (2018) Grey Wolf optimisation-based feature selection and classification for facial emotion recognition. IET Biometrics"},{"key":"159_CR26","unstructured":"Sarkar A, Murugan TS (2017) Cluster head selection for energy efficient and delay-less routing in wireless sensor network. Wireless Netw 1\u201318"},{"key":"159_CR27","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.optlaseng.2016.07.009","volume":"88","author":"M Kumar","year":"2017","unstructured":"Kumar M, Vaish A (2017) Encryption of color images using MSVD in DCST domain. Opt Lasers Eng 88:51\u201359","journal-title":"Opt Lasers Eng"},{"key":"159_CR28","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1016\/j.image.2016.05.001","volume":"46","author":"H Hofbauer","year":"2016","unstructured":"Hofbauer H, Uhl A (2016) Identifying deficits of visual security metrics for images. Sig Process Image Commun 46:60\u201375","journal-title":"Sig Process Image Commun"},{"issue":"3","key":"159_CR29","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1109\/30.883383","volume":"46","author":"PP Dang","year":"2000","unstructured":"Dang PP, Chau PM (2000) Image encryption for secure Internet multimedia applications. IEEE Trans Consum Electron 46(3):395\u2013403","journal-title":"IEEE Trans Consum Electron"},{"issue":"2","key":"159_CR30","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1109\/TCE.2004.1309431","volume":"50","author":"K Satish","year":"2004","unstructured":"Satish K, Jayakar T, Tobin C, Madhavi K, Murali K (2004) Chaos based spread spectrum image steganography. IEEE Trans Consum Electron 50(2):587\u2013590","journal-title":"IEEE Trans Consum Electron"},{"key":"159_CR31","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","volume":"69","author":"S Mirjalili","year":"2014","unstructured":"Mirjalili S, Mirjalili SM, Lewis A (2014) Grey wolf optimizer. Adv Eng Softw 69:46\u201361","journal-title":"Adv Eng Softw"},{"issue":"4","key":"159_CR32","doi-asserted-by":"publisher","first-page":"042019","DOI":"10.1088\/1757-899X\/263\/4\/042019","volume":"263","author":"M Iyapparaja","year":"2017","unstructured":"Iyapparaja M, Tiwari M (2017) Security policy speculation of user uploaded images on content sharing sites. IOP Conf Ser Mater Sci Eng 263(4):042019","journal-title":"IOP Conf Ser Mater Sci Eng"},{"key":"159_CR33","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1016\/j.pisc.2016.04.093","volume":"8","author":"M Jain","year":"2016","unstructured":"Jain M, Lenka SK, Vasistha SK (2016) Adaptive circular queue image steganography with RSA cryptosystem. Perspect Sci 8:417\u2013420","journal-title":"Perspect Sci"},{"issue":"2","key":"159_CR34","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.ipl.2015.09.016","volume":"116","author":"S Sun","year":"2016","unstructured":"Sun S (2016) A novel edge based image steganography with 2 k correction and Huffman encoding. Inf Process Lett 116(2):93\u201399","journal-title":"Inf Process Lett"},{"issue":"2","key":"159_CR35","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1016\/j.ijleo.2013.07.069","volume":"125","author":"D Zhang","year":"2014","unstructured":"Zhang D, Zhang F (2014) Chaotic encryption and decryption of JPEG image. Optik Int Light Electron Opt 125(2):717\u2013720","journal-title":"Optik Int Light Electron Opt"},{"issue":"2","key":"159_CR36","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MMUL.2015.72","volume":"23","author":"G Ye","year":"2016","unstructured":"Ye G, Huang X (2016) An image encryption algorithm based on autoblocking and electrocardiography. IEEE MultiMedia 23(2):64\u201371","journal-title":"IEEE MultiMedia"},{"key":"159_CR37","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1016\/j.sigpro.2014.10.004","volume":"108","author":"R Candido","year":"2015","unstructured":"Candido R, Soriano DC, Silva MTM, Eisencraft M (2015) Do chaos-based communication systems really transmit chaotic signals? Sig Process 108:412\u2013420","journal-title":"Sig Process"},{"key":"159_CR38","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/j.ins.2016.01.078","volume":"345","author":"YG Yang","year":"2016","unstructured":"Yang YG, Tian J, Lei H, Zhou YH, Shi WM (2016) Novel quantum image encryption using one-dimensional quantum cellular automata. Inf Sci 345:257\u2013270","journal-title":"Inf Sci"},{"issue":"1","key":"159_CR39","first-page":"1","volume":"8","author":"Y Liu","year":"2016","unstructured":"Liu Y et al (2016) Light encryption scheme using light-emitting diode and camera image sensor. IEEE Photon J 8(1):1\u20137","journal-title":"IEEE Photon J"},{"issue":"5","key":"159_CR40","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1049\/ip-vis:20059022","volume":"152","author":"H.-C. Wu","year":"2005","unstructured":"Wu HC, Wu NI, Tsai CS, Hwang MS (2005) Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEEE Proc Vis Image Signal Process 152(5):611\u2013615","journal-title":"IEE Proceedings - Vision, Image, and Signal Processing"},{"issue":"11","key":"159_CR41","doi-asserted-by":"publisher","first-page":"4614","DOI":"10.1109\/TIP.2015.2467317","volume":"24","author":"M Dzwonkowski","year":"2015","unstructured":"Dzwonkowski M, Papaj M, Rykaczewski R (2015) A new quaternion-based encryption method for DICOM images. IEEE Trans Image Process 24(11):4614\u20134622","journal-title":"IEEE Trans Image Process"},{"issue":"11","key":"159_CR42","doi-asserted-by":"publisher","first-page":"2319","DOI":"10.1109\/TPDS.2012.328","volume":"24","author":"A Ge","year":"2013","unstructured":"Ge A, Zhang J, Zhang R, Ma C, Zhang Z (2013) Security analysis of a privacy-preserving decentralized key-policy attribute-based encryption scheme. IEEE Trans Parallel Distrib Syst 24(11):2319\u20132321","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"20","key":"159_CR43","doi-asserted-by":"publisher","first-page":"1572","DOI":"10.1049\/el.2015.0927","volume":"51","author":"Y Zhang","year":"2015","unstructured":"Zhang Y, Zhang LY (2015) Exploiting random convolution and random subsampling for image encryption and compression. Electron Lett 51(20):1572\u20131574","journal-title":"Electron Lett"},{"issue":"2","key":"159_CR44","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1109\/TIFS.2015.2489178","volume":"11","author":"A Jolfaei","year":"2016","unstructured":"Jolfaei A, Wu XW, Muthukkumarasamy V (2016) On the security of permutation-only image encryption schemes. IEEE Trans Inf Forensics Secur 11(2):235\u2013246","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"15","key":"159_CR45","doi-asserted-by":"publisher","first-page":"2533","DOI":"10.1109\/JLT.2013.2267891","volume":"31","author":"AM Elshamy","year":"2013","unstructured":"Elshamy AM et al (2013) Optical image encryption based on chaotic baker map and double random phase encoding. J Lightwave Technol 31(15):2533\u20132539","journal-title":"J Lightwave Technol"},{"issue":"8","key":"159_CR46","doi-asserted-by":"publisher","first-page":"2439","DOI":"10.1109\/78.852023","volume":"48","author":"H Cheng","year":"2000","unstructured":"Cheng H, Li X (2000) Partial encryption of compressed images and videos. IEEE Trans Signal Process 48(8):2439\u20132451","journal-title":"IEEE Trans Signal Process"},{"issue":"12","key":"159_CR47","doi-asserted-by":"publisher","first-page":"742","DOI":"10.1049\/iet-ipr.2013.0570","volume":"8","author":"SK Abd-El-Hafiz","year":"2014","unstructured":"Abd-El-Hafiz SK, Radwan AG, Abdel Haleem SH, Barakat ML (2014) A fractal-based image encryption system. IET Image Proc 8(12):742\u2013752","journal-title":"IET Image Proc"},{"issue":"1","key":"159_CR48","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/TIFS.2013.2291625","volume":"9","author":"J Zhou","year":"2014","unstructured":"Zhou J, Liu X, Au OC, Tang YY (2014) Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation. IEEE Trans Inf Forensics Secur 9(1):39\u201350","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"159_CR49","doi-asserted-by":"publisher","first-page":"806","DOI":"10.1016\/j.aeue.2012.01.015","volume":"66","author":"AH Abdullah","year":"2012","unstructured":"Abdullah AH, Enayatifar R, Leeb M (2012) A hybrid genetic algorithm and chaotic function model for image encryption. Int J Electron Commun (AEU) 66:806\u2013816","journal-title":"Int J Electron Commun (AEU)"},{"key":"159_CR50","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.optlaseng.2013.12.003","volume":"56","author":"R Enayatifar","year":"2014","unstructured":"Enayatifar R, Abdullah AH, FauziIsnin I (2014) Chaos-based image encryption using a hybrid genetic algorithm and aDNAsequence. Opt Lasers Eng 56:83\u201393","journal-title":"Opt Lasers Eng"},{"issue":"4","key":"159_CR51","doi-asserted-by":"publisher","first-page":"2975","DOI":"10.1007\/s11071-014-1639-z","volume":"78","author":"X Wang","year":"2014","unstructured":"Wang X, Xu D (2014) Image encryption using genetic operators and intertwining logistic map. Nonlinear Dyn 78(4):2975\u20132984","journal-title":"Nonlinear Dyn"},{"issue":"2","key":"159_CR52","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1007\/s00500-014-1539-7","volume":"20","author":"NK Pareek","year":"2016","unstructured":"Pareek NK, Patidar V (2016) Medical image protection using genetic algorithm operations. Soft Comput 20(2):763\u2013772","journal-title":"Soft Comput"},{"key":"159_CR53","first-page":"145","volume":"343","author":"S Das","year":"2015","unstructured":"Das S, Mandal S, Ghoshal N (2015) Multiple-image encryption using genetic algorithm. Intell Comput Appl 343:145\u2013153","journal-title":"Intell Comput Appl"},{"key":"159_CR54","first-page":"705","volume":"394","author":"K Shankar","year":"2016","unstructured":"Shankar K, Eswaran P (2016) An efficient image encryption technique based on optimized key generation in ECC using genetic algorithm. Artif Intell Evol Comput Eng Syst 394:705\u2013714","journal-title":"Artif Intell Evol Comput Eng Syst"},{"key":"159_CR55","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.optlaseng.2016.07.012","volume":"88","author":"Y Su","year":"2017","unstructured":"Su Y, Tang C, Chen X, Li B, Xu W, Lei Z (2017) Cascaded Fresnel holographic image encryption scheme based on a constrained optimization algorithm and Henon map. Opt Lasers Eng 88:20\u201327","journal-title":"Opt Lasers Eng"},{"issue":"8","key":"159_CR56","doi-asserted-by":"publisher","first-page":"1469","DOI":"10.1109\/TMM.2016.2569497","volume":"18","author":"W Zhang","year":"2016","unstructured":"Zhang W, Wang H, Hou D, Yu N (2016) Reversible data hiding in encrypted images by reversible image transformation. IEEE Trans Multimed 18(8):1469\u20131479","journal-title":"IEEE Trans Multimed"}],"container-title":["Evolutionary Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12065-018-0159-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12065-018-0159-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12065-018-0159-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T23:19:34Z","timestamp":1565133574000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12065-018-0159-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,7]]},"references-count":56,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["159"],"URL":"https:\/\/doi.org\/10.1007\/s12065-018-0159-z","relation":{},"ISSN":["1864-5909","1864-5917"],"issn-type":[{"value":"1864-5909","type":"print"},{"value":"1864-5917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8,7]]},"assertion":[{"value":"16 April 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 July 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 August 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}