{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T02:24:00Z","timestamp":1773800640575,"version":"3.50.1"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,1,6]],"date-time":"2022-01-06T00:00:00Z","timestamp":1641427200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,6]],"date-time":"2022-01-06T00:00:00Z","timestamp":1641427200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s12652-021-03675-y","type":"journal-article","created":{"date-parts":[[2022,1,6]],"date-time":"2022-01-06T16:03:00Z","timestamp":1641484980000},"page":"973-988","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":106,"title":["Novel encryption for color images using fractional-order hyperchaotic system"],"prefix":"10.1007","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8065-8977","authenticated-orcid":false,"given":"Khalid M.","family":"Hosny","sequence":"first","affiliation":[]},{"given":"Sara T.","family":"Kamal","sequence":"additional","affiliation":[]},{"given":"Mohamed M.","family":"Darwish","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,6]]},"reference":[{"issue":"6","key":"3675_CR1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0235187","volume":"15","author":"MA Abd Elaziz","year":"2020","unstructured":"Abd Elaziz MA, Hosny KM, Salah A, Darwish MM, Lu S, Sahlol AT (2020) New machine learning method for image-based diagnosis of COVID-19. PLoS One 15(6):e0235187. https:\/\/doi.org\/10.1371\/journal.pone.0235187","journal-title":"PLoS One"},{"key":"3675_CR2","doi-asserted-by":"crossref","first-page":"106428","DOI":"10.1016\/j.knosys.2020.106428","volume":"208","author":"WA Abro","year":"2020","unstructured":"Abro WA, Qi G, Ali Z, Feng Y, Aamir M (2020) Multi-turn intent determination and slot filling with neural networks and regular expressions. Knowl Based Syst 208:106428","journal-title":"Knowl Based Syst"},{"key":"3675_CR3","doi-asserted-by":"crossref","first-page":"106438","DOI":"10.1016\/j.knosys.2020.106438","volume":"210","author":"Z Ali","year":"2020","unstructured":"Ali Z, Qi G, Muhammad K, Ali B, Abro WA (2020) Paper recommendation based on heterogeneous network embedding. Knowl Based Syst 210:106438","journal-title":"Knowl Based Syst"},{"key":"3675_CR4","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.sigpro.2018.09.029","volume":"155","author":"X Chai","year":"2019","unstructured":"Chai X, Fu X, Gan Z, Lu Y, Chen Y (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44\u201362","journal-title":"Signal Process"},{"key":"3675_CR5","doi-asserted-by":"crossref","first-page":"56637","DOI":"10.1109\/ACCESS.2018.2871952","volume":"6","author":"B Chen","year":"2018","unstructured":"Chen B, Yu M, Su Q, Shim HJ, Shi YQ (2018) Fractional quaternion Zernike moments for robust color image copy-move forgery detection. IEEE Access 6:56637\u201356646","journal-title":"IEEE Access"},{"key":"3675_CR6","doi-asserted-by":"crossref","first-page":"181083","DOI":"10.1109\/ACCESS.2019.2959031","volume":"7","author":"J Chen","year":"2019","unstructured":"Chen J, Li XW, Wang QH (2019) Deep learning for improving the robustness of image encryption. IEEE Access 7:181083\u2013181091","journal-title":"IEEE Access"},{"key":"3675_CR7","doi-asserted-by":"crossref","first-page":"1504","DOI":"10.1109\/JIOT.2020.3012452","volume":"8","author":"Y Ding","year":"2020","unstructured":"Ding Y, Wu G, Chen D, Zhang N, Gong L, Cao M, Qin Z (2020) A deep learning-based image encryption and decryption network for internet of medical things. IEEE Internet Things 8:1504\u20131518","journal-title":"IEEE Internet Things"},{"key":"3675_CR8","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3062754","author":"Y Ding","year":"2021","unstructured":"Ding Y, Tan F, Qin Z, Cao M, Choo KKR, Qin Z (2021) DeepKeyGen: a deep learning-based stream cipher generator for medical image encryption and decryption. IEEE Trans Neural Netw Learn Syst. https:\/\/doi.org\/10.1109\/TNNLS.2021.3062754 (Online first)","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"3675_CR9","first-page":"173","volume":"47","author":"M Essaid","year":"2019","unstructured":"Essaid M, Akharraz I, Saaidi A (2019) Image encryption scheme based on a new secure variant of Hill cipher and 1D chaotic maps. J Inform Secur Appl 47:173\u2013187","journal-title":"J Inform Secur Appl"},{"issue":"11","key":"3675_CR10","doi-asserted-by":"crossref","first-page":"1938","DOI":"10.1016\/j.aml.2011.05.025","volume":"24","author":"AS Hegazi","year":"2011","unstructured":"Hegazi AS, Matouk AE (2011) Dynamical behaviors and synchronization in the fractional-order hyperchaotic Chen system. Appl Math Lett 24(11):1938\u20131944","journal-title":"Appl Math Lett"},{"issue":"2","key":"3675_CR11","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1145\/3325193","volume":"15","author":"KM Hosny","year":"2019","unstructured":"Hosny KM, Darwish MM (2019) Resilient color image watermarking using quaternion radial substituted chebychev moments. ACM Trans Multimed Comput Commun Appl 15(2):46","journal-title":"ACM Trans Multimed Comput Commun Appl"},{"key":"3675_CR12","doi-asserted-by":"crossref","first-page":"77212","DOI":"10.1109\/ACCESS.2018.2879919","volume":"6","author":"KM Hosny","year":"2018","unstructured":"Hosny KM, Darwish MM, Li K, Salah A (2018) Parallel multi-core CPU and GPU for fast and robust medical image watermarking. IEEE Access 6:77212\u201377225","journal-title":"IEEE Access"},{"key":"3675_CR13","doi-asserted-by":"crossref","first-page":"107545","DOI":"10.1016\/j.sigpro.2020.107545","volume":"172","author":"KM Hosny","year":"2020","unstructured":"Hosny KM, Darwish MM, Aboelenen T (2020a) Novel fractional-order generic Jacobi\u2013Fourier moments for image analysis. Signal Processing 172:107545","journal-title":"Signal Processing"},{"key":"3675_CR14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.patcog.2020.107324","volume":"103","author":"KM Hosny","year":"2020","unstructured":"Hosny KM, Darwish MM, Aboelenen T (2020b) New fractional-order legendre-fourier moments for pattern recognition applications. Pattern Recogn 103:1\u201319","journal-title":"Pattern Recogn"},{"key":"3675_CR15","doi-asserted-by":"crossref","first-page":"47425","DOI":"10.1109\/ACCESS.2021.3068211","volume":"9","author":"KM Hosny","year":"2021","unstructured":"Hosny KM, Darwish MM, Fouda MM (2021a) Robust color images watermarking using new fractional-order exponent moments. IEEE Access 9:47425\u201347435","journal-title":"IEEE Access"},{"key":"3675_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-11384-z","author":"KM Hosny","year":"2021","unstructured":"Hosny KM, Kamal ST, Darwish MM (2021b) A color image encryption technique using block scrambling and chaos. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-021-11384-z (Online first)","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"3675_CR17","doi-asserted-by":"crossref","first-page":"2693","DOI":"10.1007\/s11071-019-05157-5","volume":"97","author":"BY Irani","year":"2019","unstructured":"Irani BY, Ayubi P, Jabalkandi FA, Valandar MY, Barani MJ (2019) Digital image scrambling based on a new one-dimensional coupled Sine map. Nonlinear Dyn 97(4):2693\u20132721","journal-title":"Nonlinear Dyn"},{"key":"3675_CR18","first-page":"102428","volume":"50","author":"KC Jithin","year":"2020","unstructured":"Jithin KC, Sankar S (2020) Colour image encryption algorithm combining Arnold map, DNA sequence operation, and a Mandelbrot set. J Inf Secur Appl. 50:102428","journal-title":"J Inf Secur Appl."},{"key":"3675_CR19","doi-asserted-by":"crossref","first-page":"107481","DOI":"10.1016\/j.sigpro.2020.107481","volume":"171","author":"IJ Kadhim","year":"2020","unstructured":"Kadhim IJ, Premaratne P, Vial PJ (2020) Improved image steganography based on super-pixel and coefficient-plane-selection. Signal Process 171:107481","journal-title":"Signal Process"},{"key":"3675_CR20","doi-asserted-by":"crossref","first-page":"37855","DOI":"10.1109\/ACCESS.2021.3063237","volume":"9","author":"ST Kamal","year":"2021","unstructured":"Kamal ST, Hosny KM, Elgindy TM, Darwish MM, Fouda MM (2021) A new image encryption algorithm for grey and color medical images. IEEE Access 9:37855\u201337865","journal-title":"IEEE Access"},{"key":"3675_CR21","doi-asserted-by":"crossref","first-page":"8749","DOI":"10.1007\/s00521-018-3939-6","volume":"31","author":"P Kaur","year":"2019","unstructured":"Kaur P, Pannu HS, Malhi AK (2019) Plant disease recognition using fractional-order Zernike moments and SVM classifier. Neural Comput Appl 31:8749\u20138768","journal-title":"Neural Comput Appl"},{"issue":"9","key":"3675_CR22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s00340-020-07480-x","volume":"126","author":"M Kaur","year":"2020","unstructured":"Kaur M, Singh D, Kumar V (2020) Color image encryption using minimax differential evolution-based 7d hyper-chaotic map. Appl Phys B 126(9):1\u201319","journal-title":"Appl Phys B"},{"issue":"10","key":"3675_CR23","doi-asserted-by":"crossref","first-page":"3367","DOI":"10.1142\/S0218127405013988","volume":"15","author":"Y Li","year":"2005","unstructured":"Li Y, Tang WK, Chen G (2005) Generating hyperchaos via state feedback control. Int J Bifurcat Chaos 15(10):3367\u20133375","journal-title":"Int J Bifurcat Chaos"},{"key":"3675_CR24","doi-asserted-by":"crossref","first-page":"47102","DOI":"10.1109\/ACCESS.2018.2867111","volume":"6","author":"M Li","year":"2018","unstructured":"Li M, Lu D, Wen W, Ren H, Zhang Y (2018) Cryptanalyzing a color image encryption scheme based on hybrid hyper-chaotic system and cellular automata. IEEE Access 6:47102\u201347111","journal-title":"IEEE Access"},{"key":"3675_CR25","doi-asserted-by":"crossref","first-page":"145798","DOI":"10.1109\/ACCESS.2019.2945578","volume":"7","author":"M Li","year":"2019","unstructured":"Li M, Wang P, Liu Y, Fan H (2019a) Cryptanalysis of a novel bit-level color image encryption using improved 1D chaotic map. IEEE Access 7:145798\u2013145806","journal-title":"IEEE Access"},{"issue":"1","key":"3675_CR26","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1186\/s13640-018-0402-7","volume":"2019","author":"P Li","year":"2019","unstructured":"Li P, Xu J, Mou J, Yang F (2019b) Fractional-order 4D hyperchaotic memristive system and application in color image encryption. EURASIP J Image Video Process 2019(1):22","journal-title":"EURASIP J Image Video Process"},{"key":"3675_CR27","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/j.optlaseng.2019.05.027","volume":"122","author":"H Liu","year":"2019","unstructured":"Liu H, Kadir A, Liu J (2019a) Color pathological image encryption algorithm using arithmetic over Galois field and coupled hyperchaotic system. Opt Lasers Eng 122:123\u2013133","journal-title":"Opt Lasers Eng"},{"key":"3675_CR28","doi-asserted-by":"crossref","first-page":"78367","DOI":"10.1109\/ACCESS.2019.2922376","volume":"7","author":"Z Liu","year":"2019","unstructured":"Liu Z, Wu C, Wang J, Hu Y (2019b) A color image encryption using dynamic DNA and 4-D memristive hyper-chaos. IEEE Access 7:78367\u201378378","journal-title":"IEEE Access"},{"key":"3675_CR29","doi-asserted-by":"crossref","first-page":"2877","DOI":"10.1007\/s11071-020-05625-3","volume":"100","author":"PK Naskar","year":"2020","unstructured":"Naskar PK, Bhattacharyya S, Nandy D, Chaudhuri A (2020) A robust image encryption scheme using chaotic tent map and cellular automata. Nonlinear Dyn 100:2877\u20132898","journal-title":"Nonlinear Dyn"},{"key":"3675_CR30","doi-asserted-by":"crossref","first-page":"163505","DOI":"10.1016\/j.ijleo.2019.163505","volume":"202","author":"H Nematzadeh","year":"2020","unstructured":"Nematzadeh H, Enayatifar R, Yadollahi M, Lee M, Jeong G (2020) Binary search tree image encryption with DNA. Optik 202:163505","journal-title":"Optik"},{"key":"3675_CR31","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/j.sigpro.2017.03.011","volume":"138","author":"C Pak","year":"2017","unstructured":"Pak C, Huang L (2017) A new color image encryption using combination of the 1D chaotic map. Signal Process 138:129\u2013137","journal-title":"Signal Process"},{"key":"3675_CR32","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.optlastec.2017.10.024","volume":"101","author":"R Parvaz","year":"2018","unstructured":"Parvaz R, Zarebnia M (2018) A combination chaotic system and application in color image encryption. Opt Laser Technol 101:30\u201341","journal-title":"Opt Laser Technol"},{"key":"3675_CR33","doi-asserted-by":"crossref","first-page":"348","DOI":"10.1016\/j.ijleo.2018.01.064","volume":"159","author":"A Rehman","year":"2018","unstructured":"Rehman A, Liao X, Ashraf R, Ullah S, Wang H (2018) A color image encryption technique using exclusive-OR with DNA complementary rules based on chaos theory and SHA-2. Optik 159:348\u2013367","journal-title":"Optik"},{"issue":"1","key":"3675_CR34","doi-asserted-by":"crossref","first-page":"723","DOI":"10.1007\/s11071-018-4390-z","volume":"94","author":"ML Sahari","year":"2018","unstructured":"Sahari ML, Boukemara I (2018) A pseudo-random numbers generator based on a novel 3D chaotic map with an application to color image encryption. Nonlinear Dyn 94(1):723\u2013744","journal-title":"Nonlinear Dyn"},{"issue":"6","key":"3675_CR35","doi-asserted-by":"crossref","first-page":"6883","DOI":"10.1007\/s11042-017-4605-1","volume":"77","author":"L Teng","year":"2018","unstructured":"Teng L, Wang X, Meng J (2018) A chaotic color image encryption using integrated bit-level permutation. Multimed Tools Appl 77(6):6883\u20136896","journal-title":"Multimed Tools Appl"},{"key":"3675_CR36","doi-asserted-by":"crossref","first-page":"2797","DOI":"10.1007\/s11071-018-4723-y","volume":"95","author":"X Wang","year":"2019","unstructured":"Wang X, Feng L, Li R, Zhang F (2019a) A fast image encryption algorithm based on non-adjacent dynamically coupled map lattice model. Nonlinear Dyn 95:2797\u20132824","journal-title":"Nonlinear Dyn"},{"issue":"5","key":"3675_CR37","doi-asserted-by":"crossref","first-page":"6191","DOI":"10.1007\/s11042-018-6326-5","volume":"78","author":"X Wang","year":"2019","unstructured":"Wang X, Qin X, Liu C (2019b) Color image encryption algorithm based on customized globally coupled map lattices. Multimed Tools Appl 78(5):6191\u20136209","journal-title":"Multimed Tools Appl"},{"key":"3675_CR38","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.asoc.2015.08.008","volume":"37","author":"X Wu","year":"2015","unstructured":"Wu X, Kan H, Kurths J (2015) A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl Soft Comput 37:24\u201339","journal-title":"Appl Soft Comput"},{"key":"3675_CR39","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/j.ins.2016.02.041","volume":"349","author":"X Wu","year":"2016","unstructured":"Wu X, Wang D, Kurths J, Kan H (2016) A novel lossless color image encryption scheme using 2D DWT and 6D hyperchaotic system. Inf Sci 349:137\u2013153","journal-title":"Inf Sci"},{"key":"3675_CR40","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1016\/j.sigpro.2018.02.028","volume":"148","author":"X Wu","year":"2018","unstructured":"Wu X, Wang K, Wang X, Kan H, Kurths J (2018) Color image DNA encryption using NCA map-based CML and one-time keys. Signal Process 148:272\u2013287","journal-title":"Signal Process"},{"key":"3675_CR41","doi-asserted-by":"crossref","first-page":"106202","DOI":"10.1016\/j.optlaseng.2020.106202","volume":"134","author":"Y Xian","year":"2020","unstructured":"Xian Y, Wang X, Yan X, Li Q, Wang X (2020) Image\u00a0encryption\u00a0based on chaotic sub-block scrambling and chaotic digit selection diffusion. Opt Lasers Eng 134:106202","journal-title":"Opt Lasers Eng"},{"key":"3675_CR42","doi-asserted-by":"crossref","first-page":"115670","DOI":"10.1016\/j.image.2019.115670","volume":"80","author":"K Xuejing","year":"2020","unstructured":"Xuejing K, Zihui G (2020) A new color image encryption scheme based on DNA encoding and spatiotemporal chaotic system. Signal Process Image Commun 80:115670","journal-title":"Signal Process Image Commun"},{"issue":"16","key":"3675_CR43","doi-asserted-by":"crossref","first-page":"21803","DOI":"10.1007\/s11042-017-5590-0","volume":"77","author":"B Yang","year":"2018","unstructured":"Yang B, Liao X (2018) A new color image encryption scheme based on logistic map over the finite field Z N. Multimed Tools Appl 77(16):21803\u201321821","journal-title":"Multimed Tools Appl"},{"key":"3675_CR44","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2019.105661","author":"YG Yang","year":"2019","unstructured":"Yang YG, Guan BW, Li J, Li D, Zhou YH, Shi WM (2019) Image compression-encryption scheme based on fractional-order hyperchaotic systems combined with 2D compressed sensing and DNA encoding. Opt Laser Technol. https:\/\/doi.org\/10.1016\/j.optlastec.2019.105661","journal-title":"Opt Laser Technol"},{"key":"3675_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2019.107373","author":"F Yang","year":"2020","unstructured":"Yang F, Mou J, Liu J, Ma C, Yan H (2020a) Characteristic analysis of the fractional-order hyperchaotic complex system and its image encryption application. Signal Process. https:\/\/doi.org\/10.1016\/j.sigpro.2019.107373","journal-title":"Signal Process"},{"key":"3675_CR46","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2020.106031","author":"F Yang","year":"2020","unstructured":"Yang F, Mou J, Ma C, Cao Y (2020b) Dynamic analysis of an improper fractional-order laser chaotic system and its image encryption application. Opt Lasers Eng. https:\/\/doi.org\/10.1016\/j.optlaseng.2020.106031","journal-title":"Opt Lasers Eng"},{"key":"3675_CR47","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2019.105703","author":"S Yao","year":"2019","unstructured":"Yao S, Chen L, Zhong Y (2019) An encryption system for color image based on compressive sensing. Opt Laser Technol. https:\/\/doi.org\/10.1016\/j.optlastec.2019.105703","journal-title":"Opt Laser Technol"},{"issue":"9","key":"3675_CR48","doi-asserted-by":"crossref","first-page":"13841","DOI":"10.1007\/s11042-020-10437-z","volume":"80","author":"Q Zhang","year":"2021","unstructured":"Zhang Q, Han J (2021) A novel color image encryption algorithm based on image hashing, 6D hyperchaotic and DNA coding. Multimed Tools Appl 80(9):13841\u201313864","journal-title":"Multimed Tools Appl"},{"key":"3675_CR49","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2020.106040","author":"YQ Zhang","year":"2020","unstructured":"Zhang YQ, He Y, Li P, Wang XY (2020) A new color image encryption scheme based on 2DNLCML system and genetic operations. Opt Lasers Eng. https:\/\/doi.org\/10.1016\/j.optlaseng.2020.106040","journal-title":"Opt Lasers Eng."},{"issue":"6","key":"3675_CR50","first-page":"1","volume":"17","author":"N Zhou","year":"2018","unstructured":"Zhou N, Chen W, Yan X, Wang Y (2018) Bit-level quantum color image encryption scheme with quantum cross-exchange operation and hyper-chaotic system. Quantum Inf Process 17(6):1\u201324","journal-title":"Quantum Inf Process"},{"issue":"13","key":"3675_CR51","doi-asserted-by":"crossref","first-page":"4927","DOI":"10.1007\/s00500-018-3151-8","volume":"23","author":"Z Zhou","year":"2019","unstructured":"Zhou Z, Mu Y, Wu QJ (2019) Coverless image steganography using partial-duplicate image retrieval. Soft Comput 23(13):4927\u20134938","journal-title":"Soft Comput"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-021-03675-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-021-03675-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-021-03675-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T11:22:50Z","timestamp":1744197770000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-021-03675-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,6]]},"references-count":51,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["3675"],"URL":"https:\/\/doi.org\/10.1007\/s12652-021-03675-y","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,6]]},"assertion":[{"value":"20 July 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 December 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}