{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:45:12Z","timestamp":1759333512476,"version":"3.37.3"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T00:00:00Z","timestamp":1722902400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T00:00:00Z","timestamp":1722902400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Research on Key Technology of Optical Encryption for Remote Sensing Images","award":["20220402013GH"],"award-info":[{"award-number":["20220402013GH"]}]},{"name":"Research on Privacy Protection Mechanism of Vehicle-to-everything Based on Blockchain","award":["CSTB2022NS CQ-MSX1434"],"award-info":[{"award-number":["CSTB2022NS CQ-MSX1434"]}]},{"DOI":"10.13039\/501100005230","name":"Natural Science Foundation of Chongqing Municipality","doi-asserted-by":"publisher","award":["cstc2021jcyj-msxmX0500"],"award-info":[{"award-number":["cstc2021jcyj-msxmX0500"]}],"id":[{"id":"10.13039\/501100005230","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Earth Sci Inform"],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1007\/s12145-024-01424-1","type":"journal-article","created":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T09:05:40Z","timestamp":1722935140000},"page":"4875-4900","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A novel secure scheme for remote sensing image transmission: an integrated approach with compression and encoding"],"prefix":"10.1007","volume":"17","author":[{"given":"Haiyang","family":"Shen","sequence":"first","affiliation":[]},{"given":"Jinqing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiaoqiang","family":"Di","sequence":"additional","affiliation":[]},{"given":"Xusheng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhenxun","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Makram","family":"Ibrahim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,6]]},"reference":[{"key":"1424_CR1","doi-asserted-by":"crossref","unstructured":"Al-Khasawneh MA, Uddin I, Shah SAA (2022) An improved chaotic image encryption algorithm using hadoop-based mapreduce framework for massive remote sensed images in parallel iot applications. Cluster Computing","DOI":"10.1007\/s10586-021-03466-2"},{"issue":"6","key":"1424_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JPHOT.2021.3119767","volume":"13","author":"N Alshaer","year":"2021","unstructured":"Alshaer N, Nasr ME, Ismail T (2021) Hybrid mppm-bb84 quantum key distribution over fso channel considering atmospheric turbulence and pointing errors. IEEE Photonics J 13(6):1\u20139","journal-title":"IEEE Photonics J"},{"issue":"4","key":"1424_CR3","doi-asserted-by":"crossref","first-page":"1022","DOI":"10.3390\/rs15041022","volume":"15","author":"FS Alsubaei","year":"2023","unstructured":"Alsubaei FS, Alneil AA, Mohamed A, Hilal AM (2023) Block-scrambling-based encryption with deep-learning-driven remote sensing image classification. Remote Sensing 15(4):1022","journal-title":"Remote Sensing"},{"issue":"11","key":"1424_CR4","doi-asserted-by":"crossref","first-page":"15977","DOI":"10.1007\/s11042-022-12623-7","volume":"81","author":"W Bao","year":"2022","unstructured":"Bao W, Zhu C (2022) A secure and robust image encryption algorithm based on compressive sensing and dna coding. Multimedia Tools and Applications 81(11):15977\u201315996","journal-title":"Multimedia Tools and Applications"},{"key":"1424_CR5","volume":"267","author":"Z Chen","year":"2022","unstructured":"Chen Z, Ye G (2022) An asymmetric image encryption scheme based on hash sha-3, rsa and compressive sensing. Optik 267:169676","journal-title":"Optik"},{"issue":"6","key":"1424_CR6","doi-asserted-by":"crossref","DOI":"10.1088\/1402-4896\/ac6d85","volume":"97","author":"Y Chen","year":"2022","unstructured":"Chen Y, Xie S, Zhang J (2022) A novel double image encryption algorithm based on coupled chaotic system. Phys Scr 97(6):065207","journal-title":"Phys Scr"},{"key":"1424_CR7","doi-asserted-by":"crossref","unstructured":"Chen X, Mou J, Cao Y, Yan H, Jahanshahi H (2023) A chaotic color image encryption scheme based on improved arnold scrambling and dynamic dna encoding. Multimedia Tools and Applications, pages 1\u201322","DOI":"10.1007\/s11042-023-14826-y"},{"key":"1424_CR8","doi-asserted-by":"crossref","unstructured":"Eldin SS, Nasr M, Khamees S, Sourour E, Elbanna M (2009) Ldpc coded mimo ofdm-based ieee 802.11 n wireless lan. In 2009 IFIP International Conference on Wireless and Optical Communications Networks, pages 1\u20135. IEEE","DOI":"10.1109\/WOCN.2009.5010561"},{"key":"1424_CR9","doi-asserted-by":"crossref","unstructured":"Eldin SS, Nasr M, Khamees S, Sourour E, Elbanna M (2009) Ldpc coded mimo ofdm-based ieee 802.11 n wireless lan. In: 2009 IFIP International conference on wireless and optical communications networks, pages 1\u20135. IEEE","DOI":"10.1109\/WOCN.2009.5010561"},{"issue":"18","key":"1424_CR10","doi-asserted-by":"crossref","first-page":"25497","DOI":"10.1007\/s11042-022-12595-8","volume":"81","author":"MT Elkandoz","year":"2022","unstructured":"Elkandoz MT, Alexan W (2022) Image encryption based on a combination of multiple chaotic maps. Multimedia Tools and Applications 81(18):25497\u2013518","journal-title":"Multimedia Tools and Applications"},{"key":"1424_CR11","doi-asserted-by":"crossref","first-page":"145459","DOI":"10.1109\/ACCESS.2021.3123571","volume":"9","author":"W Feng","year":"2021","unstructured":"Feng W, Qin Z, Zhang J, Ahmad M (2021) Cryptanalysis and improvement of the image encryption scheme based on feistel network and dynamic dna encoding. IEEE Access 9:145459\u2013145470","journal-title":"IEEE Access"},{"issue":"15","key":"1424_CR12","doi-asserted-by":"crossref","first-page":"2751","DOI":"10.3390\/math10152751","volume":"10","author":"W Feng","year":"2022","unstructured":"Feng W, Zhao X, Zhang J, Qin Z, Zhang J, He Y (2022) Image encryption algorithm based on plane-level image filtering and discrete logarithmic transform. Mathematics 10(15):2751","journal-title":"Mathematics"},{"issue":"12","key":"1424_CR13","doi-asserted-by":"crossref","first-page":"887","DOI":"10.3390\/fractalfract7120887","volume":"7","author":"W Feng","year":"2023","unstructured":"Feng W, Wang Q, Liu H, Ren Y, Zhang J, Zhang S, Qian K, Wen H (2023) Exploiting newly designed fractional-order 3d Lorenz chaotic system and 2d discrete polynomial hyper-chaotic map for high-performance multi-image encryption. Fractal and Fractional 7(12):887","journal-title":"Fractal and Fractional"},{"key":"1424_CR14","volume":"246","author":"W Feng","year":"2024","unstructured":"Feng W, Zhang J, Chen Y, Qin Z, Zhang Y, Ahmad M, Wo\u017aniak M (2024) Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption. Expert Syst Appl 246:123190","journal-title":"Expert Syst Appl"},{"key":"1424_CR15","volume":"202","author":"S Gao","year":"2023","unstructured":"Gao S, Wu R, Wang X, Wang J, Li Q, Wang C, Tang X (2023) A 3d model encryption scheme based on a cascaded chaotic system. Signal Process 202:108745","journal-title":"Signal Process"},{"key":"1424_CR16","doi-asserted-by":"crossref","unstructured":"Gottwald GA, Melbourne I (2016) The 0-1 test for chaos: a review. Chaos detection and predictability, pages 221\u201347","DOI":"10.1007\/978-3-662-48410-4_7"},{"issue":"7","key":"1424_CR17","doi-asserted-by":"crossref","first-page":"900","DOI":"10.1109\/81.933333","volume":"48","author":"D He","year":"2001","unstructured":"He D, He C, Jiang LG et al (2001) Chaotic characteristics of a one-dimensional iterative map with infinite collapses. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications 48(7):900\u20136","journal-title":"IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications"},{"key":"1424_CR18","doi-asserted-by":"crossref","DOI":"10.1016\/j.optlastec.2022.107879","volume":"149","author":"ZW Huang","year":"2022","unstructured":"Huang ZW, Zhou NR (2022) Image encryption scheme based on discrete cosine stockwell transform and dna-level modulus diffusion. Optics & Laser Technology 149:107879","journal-title":"Optics & Laser Technology"},{"issue":"01","key":"1424_CR19","doi-asserted-by":"crossref","first-page":"2150011","DOI":"10.1142\/S0218127421500115","volume":"31","author":"A Jafari","year":"2021","unstructured":"Jafari A, Hussain I, Nazarimehr F et al (2021) A simple guide for plotting a proper bifurcation diagram. International Journal of Bifurcation and Chaos 31(01):2150011","journal-title":"International Journal of Bifurcation and Chaos"},{"key":"1424_CR20","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2022.117861","volume":"206","author":"B Jasra","year":"2022","unstructured":"Jasra B, Moon AH (2022) Color image encryption and authentication using dynamic dna encoding and hyper chaotic system. Expert Syst Appl 206:117861","journal-title":"Expert Syst Appl"},{"key":"1424_CR21","volume":"213","author":"Q Lai","year":"2023","unstructured":"Lai Q, Hu G, Erkan U (2023) A novel pixel-split image encryption scheme based on 2d salomon map. Expert Syst Appl 213:118845","journal-title":"Expert Syst Appl"},{"key":"1424_CR22","volume":"155","author":"C Li","year":"2022","unstructured":"Li C, Sprott JC, Zhang X, Chai L, Liu Z (2022) Constructing conditional symmetry in symmetric chaotic systems. Chaos, Solitons & Fractals 155:111723","journal-title":"Chaos, Solitons & Fractals"},{"issue":"3","key":"1424_CR23","doi-asserted-by":"crossref","first-page":"2917","DOI":"10.1007\/s11071-022-07949-8","volume":"111","author":"D Li","year":"2023","unstructured":"Li D, Li J, Di X, Li B (2023) Design of cross-plane colour image encryption based on a new 2d chaotic map and combination of ecies framework. Nonlinear Dyn 111(3):2917\u20132942","journal-title":"Nonlinear Dyn"},{"issue":"3","key":"1424_CR24","doi-asserted-by":"crossref","first-page":"2917","DOI":"10.1007\/s11071-022-07949-8","volume":"111","author":"D Li","year":"2023","unstructured":"Li D, Li J, Di X (2023) Design of cross-plane colour image encryption based on a new 2d chaotic map and combination of ecies framework. Nonlinear Dyn 111(3):2917\u201342","journal-title":"Nonlinear Dyn"},{"key":"1424_CR25","doi-asserted-by":"crossref","DOI":"10.1016\/j.optlastec.2022.109033","volume":"160","author":"Q Liang","year":"2023","unstructured":"Liang Q, Zhu C (2023) A new one-dimensional chaotic map for image encryption scheme based on random dna coding. Optics & Laser Technology 160:109033","journal-title":"Optics & Laser Technology"},{"issue":"5","key":"1424_CR26","doi-asserted-by":"crossref","first-page":"1476","DOI":"10.3390\/pr11051476","volume":"11","author":"CH Lin","year":"2023","unstructured":"Lin CH, Wen CH, Lai HY (2023) Multilayer convolutional processing network based cryptography mechanism for digital images infosecurity. Processes 11(5):1476","journal-title":"Processes"},{"key":"1424_CR27","first-page":"1","volume":"2021","author":"Z Liu","year":"2021","unstructured":"Liu Z, Li J, Di X, Man Z, Sheng Y (2021) A novel multiband remote-sensing image encryption algorithm based on dual-channel key transmission model. Security and Communication Networks 2021:1\u201327","journal-title":"Security and Communication Networks"},{"key":"1424_CR28","volume":"260","author":"MA Lone","year":"2022","unstructured":"Lone MA, Qureshi S (2022) Rgb image encryption based on symmetric keys using arnold transform, 3d chaotic map and affine hill cipher. Optik 260:168880","journal-title":"Optik"},{"issue":"4","key":"1424_CR29","doi-asserted-by":"crossref","first-page":"3133","DOI":"10.1007\/s11071-022-07585-2","volume":"109","author":"Z Lv","year":"2022","unstructured":"Lv Z, Sun F, Cai C (2022) A new spatiotemporal chaotic system based on two-dimensional discrete system. Nonlinear Dyn 109(4):3133\u201344","journal-title":"Nonlinear Dyn"},{"key":"1424_CR30","doi-asserted-by":"crossref","unstructured":"Maiwald V (2023) Frameworks of sustainability and sustainable development in a spaceflight context: a systematic review and critical analysis. Acta Astronautica","DOI":"10.1016\/j.actaastro.2023.01.023"},{"issue":"2","key":"1424_CR31","doi-asserted-by":"crossref","first-page":"1405","DOI":"10.1007\/s11277-021-08584-z","volume":"127","author":"F Masood","year":"2022","unstructured":"Masood F, Driss M, Boulila W (2022) A lightweight chaos-based medical image encryption scheme using random shuffling and xor operations. Wireless Pers Commun 127(2):1405\u201332","journal-title":"Wireless Pers Commun"},{"issue":"7","key":"1424_CR32","doi-asserted-by":"crossref","first-page":"901","DOI":"10.3390\/e24070901","volume":"24","author":"X Meng","year":"2022","unstructured":"Meng X, Li J, Di X, Sheng Y, Jiang D (2022) An encryption algorithm for region of interest in medical dicom based on one-dimensional e$$\\lambda $$-cos-cot map. Entropy 24(7):901","journal-title":"Entropy"},{"issue":"3","key":"1424_CR33","doi-asserted-by":"crossref","first-page":"2705","DOI":"10.1007\/s11071-022-07335-4","volume":"108","author":"SX Nan","year":"2022","unstructured":"Nan SX, Feng XF, Wu YF, Zhang H (2022) Remote sensing image compression and encryption based on block compressive sensing and 2d-lcccm. Nonlinear Dyn 108(3):2705\u20132729","journal-title":"Nonlinear Dyn"},{"key":"1424_CR34","doi-asserted-by":"crossref","first-page":"589","DOI":"10.1007\/s11517-021-02328-8","volume":"59","author":"D Ravichandran","year":"2021","unstructured":"Ravichandran D, Banu SA, Murthy B et al (2021) An efficient medical image encryption using hybrid dna computing and chaos in transform domain. Medical & Biological Engineering & Computing 59:589\u2013605","journal-title":"Medical & Biological Engineering & Computing"},{"key":"1424_CR35","doi-asserted-by":"crossref","unstructured":"Ray A (2022) Dna mutation, repair, and recombination. Genetics Fundamentals Notes, pages 433\u201390","DOI":"10.1007\/978-981-16-7041-1_9"},{"key":"1424_CR36","doi-asserted-by":"crossref","unstructured":"Rementeria S (2022) Power dynamics in the age of space commercialisation. Space Policy 60","DOI":"10.1016\/j.spacepol.2021.101472"},{"key":"1424_CR37","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1016\/S0076-6879(04)84011-4","volume":"384","author":"S Richman","year":"2004","unstructured":"Richman S, Douglas EL, Moorman JR (2004) Sample entropy. Methods Enzymol 384:172\u2013184","journal-title":"Methods Enzymol"},{"key":"1424_CR38","doi-asserted-by":"crossref","DOI":"10.1016\/j.chaos.2022.111926","volume":"157","author":"S Sahoo","year":"2022","unstructured":"Sahoo S, Roy BK (2022) Design of multi-wing chaotic systems with higher largest lyapunov exponent. Chaos, Solitons & Fractals 157:111926","journal-title":"Chaos, Solitons & Fractals"},{"key":"1424_CR39","volume":"237","author":"XY Tong","year":"2020","unstructured":"Tong XY, Xia GS, Lu Q et al (2020) Land-cover classification with high-resolution remote sensing images using transferable deep models. Remote Sens Environ 237:111322","journal-title":"Remote Sens Environ"},{"key":"1424_CR40","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.optlaseng.2014.08.005","volume":"66","author":"X Wang","year":"2015","unstructured":"Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10\u20138","journal-title":"Opt Lasers Eng"},{"key":"1424_CR41","volume":"139","author":"X Wang","year":"2020","unstructured":"Wang X, Li Y, Jin J (2020) A new one-dimensional chaotic system with applications in image encryption. Chaos, Solitons & Fractals 139:110102","journal-title":"Chaos, Solitons & Fractals"},{"key":"1424_CR42","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1016\/j.ins.2022.08.002","volume":"610","author":"X Wang","year":"2022","unstructured":"Wang X, Liu C, Jiang D (2022) An efficient double-image encryption and hiding algorithm using a newly designed chaotic system and parallel compressive sensing. Inf Sci 610:300\u2013325","journal-title":"Inf Sci"},{"key":"1424_CR43","volume":"158","author":"R Wang","year":"2022","unstructured":"Wang R, Li C, Kong S, Jiang Y, Lei T (2022) A 3d memristive chaotic system with conditional symmetry. Chaos, Solitons & Fractals 158:111992","journal-title":"Chaos, Solitons & Fractals"},{"issue":"7","key":"1424_CR44","volume":"35","author":"H Wen","year":"2023","unstructured":"Wen H, Lin Y (2023) Cryptanalyzing an image cipher using multiple chaos and dna operations. Journal of King Saud University-Computer and Information Sciences 35(7):101612","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"key":"1424_CR45","volume":"237","author":"H Wen","year":"2024","unstructured":"Wen H, Lin Y (2024) Cryptanalysis of an image encryption algorithm using quantum chaotic map and dna coding. Expert Syst Appl 237:121514","journal-title":"Expert Syst Appl"},{"key":"1424_CR46","doi-asserted-by":"crossref","first-page":"10949","DOI":"10.1007\/s11042-020-10218-8","volume":"80","author":"X Yan","year":"2021","unstructured":"Yan X, Wang X, Xian Y (2021) Chaotic image encryption algorithm based on arithmetic sequence scrambling model and dna encoding operation. Multimedia Tools and Applications 80:10949\u201383","journal-title":"Multimedia Tools and Applications"},{"key":"1424_CR47","doi-asserted-by":"crossref","DOI":"10.1016\/j.chaos.2021.111631","volume":"155","author":"M Yildirim","year":"2022","unstructured":"Yildirim M (2022) Optical color image encryption scheme with a novel dna encoding algorithm based on a chaotic circuit. Chaos, Solitons & Fractals 155:111631","journal-title":"Chaos, Solitons & Fractals"},{"issue":"4","key":"1424_CR48","doi-asserted-by":"crossref","first-page":"88","DOI":"10.23919\/JCC.2020.04.009","volume":"17","author":"G Yuan","year":"2020","unstructured":"Yuan G, Hao Q (2020) Digital watermarking secure scheme for remote sensing image protection. China communications 17(4):88\u201398","journal-title":"China communications"},{"key":"1424_CR49","doi-asserted-by":"crossref","DOI":"10.1016\/j.apgeog.2022.102711","volume":"143","author":"H Zhang","year":"2022","unstructured":"Zhang H, Wang Z (2022) Human activities and natural geographical environment and their interactive effects on sudden geologic hazard: A perspective of macro-scale and spatial statistical analysis. Appl Geogr 143:102711","journal-title":"Appl Geogr"},{"issue":"8","key":"1424_CR50","doi-asserted-by":"crossref","first-page":"1242","DOI":"10.3390\/math10081242","volume":"10","author":"R Zhang","year":"2022","unstructured":"Zhang R, Xiao D (2022) Double image encryption scheme based on compressive sensing and double random phase encoding. Mathematics 10(8):1242","journal-title":"Mathematics"},{"key":"1424_CR51","doi-asserted-by":"crossref","first-page":"2821","DOI":"10.1007\/s11071-020-06072-w","volume":"102","author":"S Zhang","year":"2020","unstructured":"Zhang S, Zheng J, Wang X (2020) Initial offset boosting coexisting attractors in memristive multi-double-scroll hopfield neural network. Nonlinear Dyn 102:2821\u201341","journal-title":"Nonlinear Dyn"},{"key":"1424_CR52","doi-asserted-by":"crossref","unstructured":"Zheng Y, Hong K, Wang B, Liu D, Chen T, Wang Z (2021) Genetic diversity for accelerating microbial adaptive laboratory evolution. ACS Synth Biol 10(7):1574\u20131586","DOI":"10.1021\/acssynbio.0c00589"},{"issue":"7","key":"1424_CR53","doi-asserted-by":"crossref","first-page":"1574","DOI":"10.1021\/acssynbio.0c00589","volume":"10","author":"Y Zheng","year":"2021","unstructured":"Zheng Y, Hong K, Wang B et al (2021) Genetic diversity for accelerating microbial adaptive laboratory evolution. ACS Synth Biol 10(7):1574\u201386","journal-title":"ACS Synth Biol"},{"key":"1424_CR54","doi-asserted-by":"crossref","unstructured":"Zheng Q, Huang W, Xia Q, Dong Y, Ye H, Jiang H, Chen S, Huang S (2023) Remote sensing monitoring of rice diseases and pests from different data sources: a review. Agronomy 13(7):1851","DOI":"10.3390\/agronomy13071851"},{"key":"1424_CR55","doi-asserted-by":"crossref","unstructured":"Zhou Z, Xu X, Yao Y, Jiang Z, Sun K (2023) Novel multiple-image encryption algorithm based on a two-dimensional hyperchaotic modular model. Chaos, Solitons & Fractals 173:113630","DOI":"10.1016\/j.chaos.2023.113630"}],"container-title":["Earth Science Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12145-024-01424-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12145-024-01424-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12145-024-01424-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T18:04:22Z","timestamp":1729101862000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12145-024-01424-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,6]]},"references-count":55,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["1424"],"URL":"https:\/\/doi.org\/10.1007\/s12145-024-01424-1","relation":{},"ISSN":["1865-0473","1865-0481"],"issn-type":[{"type":"print","value":"1865-0473"},{"type":"electronic","value":"1865-0481"}],"subject":[],"published":{"date-parts":[[2024,8,6]]},"assertion":[{"value":"12 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 July 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 August 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}},{"value":"Not applicable for studies not involving humans.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}},{"value":"Not applicable for studies not involving humans or animals.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Institutional Review Board Statement"}}]}}