{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T05:04:57Z","timestamp":1773810297553,"version":"3.50.1"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T00:00:00Z","timestamp":1719964800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T00:00:00Z","timestamp":1719964800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1007\/s13042-024-02268-3","type":"journal-article","created":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T16:07:25Z","timestamp":1720022845000},"page":"5607-5634","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A copy-move forgery detection technique using DBSCAN-based keypoint similarity matching"],"prefix":"10.1007","volume":"15","author":[{"given":"Soumya","family":"Mukherjee","sequence":"first","affiliation":[]},{"given":"Arup Kumar","family":"Pal","sequence":"additional","affiliation":[]},{"given":"Soham","family":"Maji","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,3]]},"reference":[{"key":"2268_CR1","unstructured":"Broz M (2024) How many pictures are there: statistics, trends, and forecasts. photutorial.com (November 23, 2023)"},{"issue":"1\u20133","key":"2268_CR2","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1016\/j.forsciint.2013.05.027","volume":"231","author":"OM Al-Qershi","year":"2013","unstructured":"Al-Qershi OM, Khoo BE (2013) Passive detection of copy-move forgery in digital images: state-of-the-art. Forensic Sci Int 231(1\u20133):284\u2013295","journal-title":"Forensic Sci Int"},{"issue":"10","key":"2268_CR3","doi-asserted-by":"publisher","first-page":"1615","DOI":"10.1109\/TPAMI.2005.188","volume":"27","author":"K Mikolajczyk","year":"2005","unstructured":"Mikolajczyk K, Schmid C (2005) A performance evaluation of local descriptors. IEEE Trans Pattern Anal Mach Intell 27(10):1615\u20131630","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"7","key":"2268_CR4","first-page":"1281","volume":"34","author":"PF Alcantarilla","year":"2011","unstructured":"Alcantarilla PF, Solutions T (2011) Fast explicit diffusion for accelerated features in nonlinear scale spaces. IEEE Trans Pattern Anal Mach Intell 34(7):1281\u20131298","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"2268_CR5","unstructured":"Ester M, Kriegel H.-P, Sander J, Xu X et al (1996) A density-based algorithm for discovering clusters in large spatial databases with noise. In: Kdd, 96, 226\u2013231"},{"key":"2268_CR6","doi-asserted-by":"crossref","unstructured":"Khan K, Rehman S.U, Aziz K, Fong S, Sarasvady S (2014) Dbscan: past, present and future. In: The fifth international conference on the applications of digital information and web technologies (ICADIWT 2014). IEEE, pp 232\u2013238","DOI":"10.1109\/ICADIWT.2014.6814687"},{"key":"2268_CR7","doi-asserted-by":"publisher","first-page":"2975","DOI":"10.1007\/s13369-019-04238-2","volume":"45","author":"M Bilal","year":"2020","unstructured":"Bilal M, Habib HA, Mehmood Z, Saba T, Rashid M (2020) Single and multiple copy-move forgery detection and localization in digital images based on the sparsely encoded distinctive features and dbscan clustering. Arab J Sci Eng 45:2975\u20132992","journal-title":"Arab J Sci Eng"},{"key":"2268_CR8","doi-asserted-by":"crossref","unstructured":"Jaiswal A.K, Gupta D, Srivastava R (2020) Detection of copy-move forgery using hybrid approach of dct and brisk. In: 2020 7th International conference on signal processing and integrated networks (SPIN). IEEE, pp 471\u2013476","DOI":"10.1109\/SPIN48934.2020.9071015"},{"issue":"10","key":"2268_CR9","doi-asserted-by":"publisher","first-page":"2084","DOI":"10.1109\/TIFS.2015.2445742","volume":"10","author":"E Ardizzone","year":"2015","unstructured":"Ardizzone E, Bruno A, Mazzola G (2015) Copy-move forgery detection by matching triangles of keypoints. IEEE Trans Inf Forens Secur 10(10):2084\u20132094","journal-title":"IEEE Trans Inf Forens Secur"},{"issue":"13","key":"2268_CR10","doi-asserted-by":"publisher","first-page":"3589","DOI":"10.1049\/ipr2.12578","volume":"16","author":"G Yue","year":"2022","unstructured":"Yue G, Duan Q, Liu R, Peng W, Liao Y, Liu J (2022) Smdaf: a novel keypoint based method for copy-move forgery detection. IET Image Proc 16(13):3589\u20133602","journal-title":"IET Image Proc"},{"key":"2268_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2021.103057","volume":"76","author":"Q Lyu","year":"2021","unstructured":"Lyu Q, Luo J, Liu K, Yin X, Liu J, Lu W (2021) Copy move forgery detection based on double matching. J Vis Commun Image Rep 76:103057","journal-title":"J Vis Commun Image Rep"},{"key":"2268_CR12","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.ins.2018.06.040","volume":"463","author":"C-M Pun","year":"2018","unstructured":"Pun C-M, Chung J-L (2018) A two-stage localization for copy-move forgery detection. Inf Sci 463:33\u201355","journal-title":"Inf Sci"},{"key":"2268_CR13","doi-asserted-by":"crossref","unstructured":"Du T, Tian L, Li C (2018) Image copy-move forgery detection based on sift-brisk. In: 2018 International Conference on Control, Automation and Information Sciences (ICCAIS). IEEE, pp 141\u2013145","DOI":"10.1109\/ICCAIS.2018.8570513"},{"key":"2268_CR14","doi-asserted-by":"crossref","unstructured":"Narayanan S.S, Gopakumar G (2020) Recursive block based keypoint matching for copy move image forgery detection. In: 2020 11th international conference on computing, communication and networking technologies (ICCCNT). IEEE, pp 1\u20136","DOI":"10.1109\/ICCCNT49239.2020.9225658"},{"issue":"4","key":"2268_CR15","first-page":"199","volume":"8","author":"B Shivakumar","year":"2011","unstructured":"Shivakumar B, Baboo SS (2011) Detection of region duplication forgery in digital images using surf. Int J Comput Sci Issues (IJCSI) 8(4):199","journal-title":"Int J Comput Sci Issues (IJCSI)"},{"key":"2268_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115282","volume":"182","author":"A Dixit","year":"2021","unstructured":"Dixit A, Bag S (2021) A fast technique to detect copy-move image forgery with reflection and non-affine transformation attacks. Expert Syst Appl 182:115282","journal-title":"Expert Syst Appl"},{"key":"2268_CR17","doi-asserted-by":"crossref","unstructured":"Wang Z, Fan B, Wu F (2011). Local intensity order pattern for feature description. In: 2011 International conference on computer vision. IEEE, pp 603\u2013610","DOI":"10.1109\/ICCV.2011.6126294"},{"issue":"3","key":"2268_CR18","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1016\/j.jvcir.2013.01.008","volume":"24","author":"L Chen","year":"2013","unstructured":"Chen L, Lu W, Ni J, Sun W, Huang J (2013) Region duplication detection based on Harris corner points and step sector statistics. J Vis Commun Image Rep 24(3):244\u2013254","journal-title":"J Vis Commun Image Rep"},{"key":"2268_CR19","doi-asserted-by":"publisher","first-page":"30081","DOI":"10.1007\/s11042-018-6922-4","volume":"78","author":"C Lin","year":"2019","unstructured":"Lin C, Lu W, Huang X, Liu K, Sun W, Lin H, Tan Z (2019) Copy-move forgery detection using combined features and transitive matching. Multimedia Tools Appl 78:30081\u201330096","journal-title":"Multimedia Tools Appl"},{"key":"2268_CR20","doi-asserted-by":"crossref","unstructured":"Lowe DG (1999) Object recognition from local scale-invariant features. In: Proceedings of the seventh IEEE international conference on computer vision, vol 2. Ieee, pp 1150\u20131157","DOI":"10.1109\/ICCV.1999.790410"},{"key":"2268_CR21","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1007\/s11045-016-0416-1","volume":"27","author":"J Zheng","year":"2016","unstructured":"Zheng J, Liu Y, Ren J, Zhu T, Yan Y, Yang H (2016) Fusion of block and keypoints based approaches for effective copy-move image forgery detection. Multidimens Syst Signal Process 27:989\u20131005","journal-title":"Multidimens Syst Signal Process"},{"key":"2268_CR22","doi-asserted-by":"publisher","first-page":"14429","DOI":"10.1007\/s00500-020-04795-x","volume":"24","author":"S Dhivya","year":"2020","unstructured":"Dhivya S, Sangeetha J, Sudhakar B (2020) Copy-move forgery detection using surf feature extraction and svm supervised learning technique. Soft Comput 24:14429\u201314440","journal-title":"Soft Comput"},{"issue":"10","key":"2268_CR23","doi-asserted-by":"publisher","first-page":"2092","DOI":"10.1049\/iet-ipr.2019.1145","volume":"14","author":"X Tian","year":"2020","unstructured":"Tian X, Zhou G, Xu M (2020) Image copy-move forgery detection algorithm based on orb and novel similarity metric. IET Image Proc 14(10):2092\u20132100","journal-title":"IET Image Proc"},{"issue":"3","key":"2268_CR24","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A sift-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans Inf Forens Secur 6(3):1099\u20131110","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"2268_CR25","doi-asserted-by":"publisher","first-page":"11513","DOI":"10.1007\/s11042-015-2872-2","volume":"75","author":"M Emam","year":"2016","unstructured":"Emam M, Han Q, Niu X (2016) Pcet based copy-move forgery detection in images under geometric transforms. Multimedia Tools Appl 75:11513\u201311527","journal-title":"Multimedia Tools Appl"},{"issue":"1","key":"2268_CR26","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1111\/1556-4029.13456","volume":"63","author":"M Emam","year":"2018","unstructured":"Emam M, Han Q, Zhang H (2018) Two-stage keypoint detection scheme for region duplication forgery detection in digital images. J Forens Sci 63(1):102\u2013111","journal-title":"J Forens Sci"},{"issue":"9","key":"2268_CR27","doi-asserted-by":"publisher","first-page":"2413","DOI":"10.1587\/transinf.2016EDL8024","volume":"99","author":"M Emam","year":"2016","unstructured":"Emam M, Han Q, Yu L, Zhang H (2016) A keypoint-based region duplication forgery detection algorithm. IEICE Trans Inf Syst 99(9):2413\u20132416","journal-title":"IEICE Trans Inf Syst"},{"key":"2268_CR28","doi-asserted-by":"crossref","unstructured":"Emam M, Han Q, Zhang H (2016) Detection of copy-scale-move forgery in digital images using sfop and mrogh. In: Social computing: second international conference of young computer scientists, engineers and educators, ICYCSEE 2016, Harbin, China, August 20\u201322, 2016, Proceedings, Part I 2, pp 326\u2013334 Springer","DOI":"10.1007\/978-981-10-2053-7_29"},{"key":"2268_CR29","doi-asserted-by":"crossref","unstructured":"Emam M, Han Q, Li Q, Zhang H (2017) A robust detection algorithm for image copy-move forgery in smooth regions. In: 2017 International conference on circuits, system and simulation (ICCSS). IEEE, pp 119\u2013123","DOI":"10.1109\/CIRSYSSIM.2017.8023194"},{"key":"2268_CR30","doi-asserted-by":"crossref","unstructured":"Diwan A, Kumar D, Mahadeva R, Perera H, Alawatugoda J (2023) Unveiling copy-move forgeries: enhancing detection with superpoint keypoint architecture. IEEE Access","DOI":"10.1109\/ACCESS.2023.3304728"},{"issue":"1","key":"2268_CR31","doi-asserted-by":"publisher","first-page":"2203","DOI":"10.1007\/s11042-023-15499-3","volume":"83","author":"X-y Wang","year":"2024","unstructured":"Wang X-y, Wang X-q, Niu P-p, Yang H-y (2024) Accurate and robust image copy-move forgery detection using adaptive keypoints and fqgpcet-glcm feature. Multimedia Tools Appl 83(1):2203\u20132235","journal-title":"Multimedia Tools Appl"},{"issue":"06","key":"2268_CR32","doi-asserted-by":"publisher","first-page":"2350011","DOI":"10.1142\/S0218001423500118","volume":"37","author":"J Yang","year":"2023","unstructured":"Yang J, Liang Z, Li J, Gan Y, Zhong J (2023) A novel copy-move forgery detection algorithm via gradient-hash matching and simplified cluster-based filtering. Int J Pattern Recognit Artif Intell 37(06):2350011","journal-title":"Int J Pattern Recognit Artif Intell"},{"key":"2268_CR33","unstructured":"Tralic D, Zupancic I, Grgic S, Grgic M (2013) Comofod-new database for copy-move forgery detection. In: Proceedings ELMAR-2013. IEEE, pp 49\u201354"},{"key":"2268_CR34","doi-asserted-by":"publisher","unstructured":"Cozzolino D, Poggi G, Verdoliva L (2014) Copy-move forgery detection based on patchmatch. In: 2014 IEEE international conference on image processing (ICIP), pp 5312\u20135316. https:\/\/doi.org\/10.1109\/ICIP.2014.7026075","DOI":"10.1109\/ICIP.2014.7026075"},{"issue":"3","key":"2268_CR35","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A sift-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans Inf Forens Secur 6(3):1099\u20131110","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"2268_CR36","doi-asserted-by":"crossref","unstructured":"Wen B, Zhu Y, Subramanian R, Ng T.-T, Shen X, Winkler S (2016) Coverage\u2014a novel database for copy-move forgery detection. In: 2016 IEEE international conference on image processing (ICIP). IEEE, pp 161\u2013165","DOI":"10.1109\/ICIP.2016.7532339"},{"issue":"3","key":"2268_CR37","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A sift-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans Inf Forens Secur 6(3):1099\u20131110","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"2268_CR38","doi-asserted-by":"crossref","unstructured":"Bravo-Solorio S, Nandi AK (2011) Exposing duplicated regions affected by reflection, rotation and scaling. In: 2011 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 1880\u20131883","DOI":"10.1109\/ICASSP.2011.5946873"},{"issue":"6","key":"2268_CR39","doi-asserted-by":"publisher","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"V Christlein","year":"2012","unstructured":"Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forens Secur 7(6):1841\u20131854","journal-title":"IEEE Trans Inf Forens Secur"},{"issue":"11","key":"2268_CR40","doi-asserted-by":"publisher","first-page":"2284","DOI":"10.1109\/TIFS.2015.2455334","volume":"10","author":"D Cozzolino","year":"2015","unstructured":"Cozzolino D, Poggi G, Verdoliva L (2015) Efficient dense-field copy-move forgery detection. IEEE Trans Inf Forens Secur 10(11):2284\u20132297","journal-title":"IEEE Trans Inf Forens Secur"},{"issue":"5","key":"2268_CR41","doi-asserted-by":"publisher","first-page":"1307","DOI":"10.1109\/TIFS.2018.2876837","volume":"14","author":"Y Li","year":"2018","unstructured":"Li Y, Zhou J (2018) Fast and effective image copy-move forgery detection via hierarchical feature point matching. IEEE Trans Inf Forens Secur 14(5):1307\u20131322","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"2268_CR42","first-page":"1","volume":"2018","author":"Y Sun","year":"2018","unstructured":"Sun Y, Ni R, Zhao Y (2018) Nonoverlapping blocks based copy-move forgery detection. Secur Commun Netw 2018:1\u201311","journal-title":"Secur Commun Netw"},{"issue":"12","key":"2268_CR43","doi-asserted-by":"publisher","first-page":"706","DOI":"10.3390\/sym10120706","volume":"10","author":"C Wang","year":"2018","unstructured":"Wang C, Zhang Z, Zhou X (2018) An image copy-move forgery detection scheme based on a-kaze and surf features. Symmetry 10(12):706","journal-title":"Symmetry"},{"key":"2268_CR44","doi-asserted-by":"publisher","first-page":"36863","DOI":"10.1109\/ACCESS.2020.2974804","volume":"8","author":"H Chen","year":"2020","unstructured":"Chen H, Yang X, Lyu Y (2020) Copy-move forgery detection based on keypoint clustering and similar neighborhood search algorithm. IEEE Access 8:36863\u201336875","journal-title":"IEEE Access"},{"key":"2268_CR45","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/s11760-017-1191-7","volume":"12","author":"V Manu","year":"2018","unstructured":"Manu V, Mehtre BM (2018) Copy-move tampering detection using affine transformation property preservation on clustered keypoints. SIViP 12:549\u2013556","journal-title":"SIViP"},{"key":"2268_CR46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04960-1","volume-title":"Advances in signal processing and intelligent recognition systems","author":"SM Thampi","year":"2014","unstructured":"Thampi SM, Gelbukh A, Mukhopadhyay J (2014) Advances in signal processing and intelligent recognition systems. Springer, Berlin"},{"key":"2268_CR47","doi-asserted-by":"publisher","first-page":"1351","DOI":"10.1007\/s11049-014-9271-7","volume":"33","author":"F Torres-Tamarit","year":"2015","unstructured":"Torres-Tamarit F (2015) Length and voicing in friulian and milanese: or why rule-free derivations are needed. Nat Lang Linguist Theory 33:1351\u20131386","journal-title":"Nat Lang Linguist Theory"},{"key":"2268_CR48","doi-asserted-by":"publisher","first-page":"43809","DOI":"10.1109\/ACCESS.2024.3380460","volume":"12","author":"A Diwan","year":"2024","unstructured":"Diwan A, Roy AK (2024) Cnn-keypoint based two-stage hybrid approach for copy-move forgery detection. IEEE Access 12:43809\u201343826","journal-title":"IEEE Access"},{"key":"2268_CR49","doi-asserted-by":"crossref","unstructured":"Muzaffer G, Ulutas G (2017) A fast and effective digital image copy move forgery detection with binarized sift. In: 2017 40th international conference on telecommunications and signal processing (TSP). IEEE, pp 595\u2013598","DOI":"10.1109\/TSP.2017.8076056"},{"key":"2268_CR50","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.engappai.2016.12.022","volume":"59","author":"F Yang","year":"2017","unstructured":"Yang F, Li J, Lu W, Weng J (2017) Copy-move forgery detection based on hybrid features. Eng Appl Artif Intell 59:73\u201383","journal-title":"Eng Appl Artif Intell"},{"key":"2268_CR51","doi-asserted-by":"crossref","unstructured":"Dong J, Wang W, Tan T (2013) Casia image tampering detection evaluation database. In: 2013 IEEE China summit and international conference on signal and information processing. IEEE, pp 422\u2013426","DOI":"10.1109\/ChinaSIP.2013.6625374"},{"issue":"2","key":"2268_CR52","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1016\/j.eswa.2012.08.002","volume":"40","author":"J-M Guo","year":"2013","unstructured":"Guo J-M, Liu Y-F, Wu Z-J (2013) Duplication forgery detection using improved daisy descriptor. Expert Syst Appl 40(2):707\u2013714","journal-title":"Expert Syst Appl"},{"key":"2268_CR53","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.jvcir.2017.04.004","volume":"46","author":"NBA Warif","year":"2017","unstructured":"Warif NBA, Wahab AWA, Idris MYI, Salleh R, Othman F (2017) Sift-symmetry: a robust detection method for copy-move forgery with reflection attack. J Vis Commun Image Rep 46:219\u2013232","journal-title":"J Vis Commun Image Rep"},{"key":"2268_CR54","doi-asserted-by":"crossref","unstructured":"Isaac M.M, Wilscy M (2015) Copy-move forgery detection based on harris corner points and brisk. In: Proceedings of the third international symposium on women in computing and informatics, pp 394\u2013399","DOI":"10.1145\/2791405.2791453"},{"key":"2268_CR55","first-page":"44","volume":"45","author":"B Soni","year":"2019","unstructured":"Soni B, Das PK, Thounaojam DM (2019) Geometric transformation invariant block based copy-move forgery detection using fast and efficient hybrid local features. J Inf Secur Appl 45:44\u201351","journal-title":"J Inf Secur Appl"},{"key":"2268_CR56","doi-asserted-by":"publisher","first-page":"3221","DOI":"10.1007\/s11042-014-2431-2","volume":"75","author":"Y Zhu","year":"2016","unstructured":"Zhu Y, Shen X, Chen H (2016) Copy-move forgery detection based on scaled orb. Multimedia Tools Appl 75:3221\u20133233","journal-title":"Multimedia Tools Appl"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-024-02268-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-024-02268-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-024-02268-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T10:25:12Z","timestamp":1730197512000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-024-02268-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,3]]},"references-count":56,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["2268"],"URL":"https:\/\/doi.org\/10.1007\/s13042-024-02268-3","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"value":"1868-8071","type":"print"},{"value":"1868-808X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,3]]},"assertion":[{"value":"9 February 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 June 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 July 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}