{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T01:50:49Z","timestamp":1772502649532,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2025,5,26]],"date-time":"2025-05-26T00:00:00Z","timestamp":1748217600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,26]],"date-time":"2025-05-26T00:00:00Z","timestamp":1748217600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s13042-025-02660-7","type":"journal-article","created":{"date-parts":[[2025,5,26]],"date-time":"2025-05-26T08:16:44Z","timestamp":1748247404000},"page":"7369-7389","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Crayfish optimization-based secure encryption of medical images with 7D hyperchaotic maps"],"prefix":"10.1007","volume":"16","author":[{"given":"Pauline Freeda","family":"David","sequence":"first","affiliation":[]},{"given":"Suganya Devi","family":"Kothandapani","sequence":"additional","affiliation":[]},{"given":"Ganesh Kumar","family":"Pugalendhi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,26]]},"reference":[{"key":"2660_CR1","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2024.2312975","author":"S Pankaj","year":"2024","unstructured":"Pankaj S, Dua M (2024) Chaos based medical image encryption techniques: a comprehensive review and analysis. Inf Security J Glob Perspect. https:\/\/doi.org\/10.1080\/19393555.2024.2312975","journal-title":"Inf Security J Glob Perspect"},{"issue":"14","key":"2660_CR2","doi-asserted-by":"publisher","first-page":"22213","DOI":"10.1007\/s11042-023-15386-x","volume":"82","author":"RI Abdelfatah","year":"2023","unstructured":"Abdelfatah RI, Saqr HM, Nasr ME (2023) An efficient medical image encryption scheme for (WBAN) based on adaptive DNA and modern multi chaotic map. Multim Tools Appl 82(14):22213\u201322227. https:\/\/doi.org\/10.1007\/s11042-023-15386-x","journal-title":"Multim Tools Appl"},{"key":"2660_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-024-09508-1","author":"YS Alsahafi","year":"2024","unstructured":"Alsahafi YS, Khalid AM, Hamza HM, Hosny KM (2024) New optimized chaotic encryption with BCOVIDOA for efficient security of medical images in IoMT systems. Neural Comput Appl. https:\/\/doi.org\/10.1007\/s00521-024-09508-1","journal-title":"Neural Comput Appl"},{"key":"2660_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103131","volume":"66","author":"A Belazi","year":"2022","unstructured":"Belazi A, Kharbech S, Aslam MN, Talha M, Xiang W, Iliyasu AM, Abd El-Latif AA (2022) Improved Sine-Tangent chaotic map with application in medical images encryption. J Inf Security Appl 66:103131. https:\/\/doi.org\/10.1016\/j.jisa.2022.103131","journal-title":"J Inf Security Appl"},{"key":"2660_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2022.104546","volume":"91","author":"P Kiran","year":"2022","unstructured":"Kiran P, Parameshachari BD (2022) Resource optimized selective image encryption of medical images using multiple chaotic systems. Microprocess Microsyst 91:104546. https:\/\/doi.org\/10.1016\/j.micpro.2022.104546","journal-title":"Microprocess Microsyst"},{"key":"2660_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/9363377","volume":"2022","author":"P Rashmi","year":"2022","unstructured":"Rashmi P, Supriya MC, Hua Q (2022) Enhanced lorenz-chaotic encryption method for partial medical image encryption and data hiding in big data healthcare. Security Commun Netw 2022:1\u20139. https:\/\/doi.org\/10.1155\/2022\/9363377","journal-title":"Security Commun Netw"},{"issue":"6","key":"2660_CR7","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1080\/19393555.2021.1934197","volume":"31","author":"MSR Tanveer","year":"2022","unstructured":"Tanveer MSR, Md Rokibul Alam K, Morimoto Y (2022) A multi-stage chaotic encryption technique for medical image. Info Security J Glob Perspect 31(6):657\u2013675. https:\/\/doi.org\/10.1080\/19393555.2021.1934197","journal-title":"Info Security J Glob Perspect"},{"key":"2660_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2022.105542","volume":"146","author":"Y Zhang","year":"2022","unstructured":"Zhang Y, Xie H, Sun J, Zhang H (2022) An efficient multi-level encryption scheme for stereoscopic medical images based on coupled chaotic system and Otsu threshold segmentation. Comput Biol Med 146:105542. https:\/\/doi.org\/10.1016\/j.compbiomed.2022.105542","journal-title":"Comput Biol Med"},{"issue":"2","key":"2660_CR9","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/s42979-021-01012-w","volume":"3","author":"N Balaska","year":"2022","unstructured":"Balaska N, Belmeguenai A, Goutas A, Ahmida Z, Boumerdassi S (2022) Securing medical data by combining encryption and robust blind medical image watermarking based on Zaslavsky chaotic map and DCT coefficients. SN Comput Sci 3(2):118. https:\/\/doi.org\/10.1007\/s42979-021-01012-w","journal-title":"SN Comput Sci"},{"key":"2660_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-025-02587-z","author":"SA Bouhamed","year":"2025","unstructured":"Bouhamed SA (2025) Exploring possibilistic fingerprint image quality analysis: a soft computing approach for biometric database management. Int J Mach Learn Cybern. https:\/\/doi.org\/10.1007\/s13042-025-02587-z","journal-title":"Int J Mach Learn Cybern"},{"issue":"11","key":"2660_CR11","doi-asserted-by":"publisher","first-page":"10794","DOI":"10.1109\/JSEN.2022.3169226","volume":"22","author":"K Sekar","year":"2022","unstructured":"Sekar K, Devi KS, Srinivasan P (2022) Compressed tensor completion: a robust technique for fast and efficient data reconstruction in wireless sensor networks. IEEE Sens J 22(11):10794\u201310807. https:\/\/doi.org\/10.1109\/JSEN.2022.3169226","journal-title":"IEEE Sens J"},{"key":"2660_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-025-02600-5","author":"HA Tran","year":"2025","unstructured":"Tran HA, Tong V (2025) ECODI: a novel evolutionary coreset distillation with LLM-assisted fitness evaluation for encrypted network traffics. Int J Mach Learn Cybern. https:\/\/doi.org\/10.1007\/s13042-025-02600-5","journal-title":"Int J Mach Learn Cybern"},{"issue":"13","key":"2660_CR13","doi-asserted-by":"publisher","first-page":"18829","DOI":"10.1007\/s11042-022-12653-1","volume":"81","author":"A Jan","year":"2022","unstructured":"Jan A, Parah SA, Malik BA (2022) IEFHAC: image encryption framework based on hessenberg transform and chaotic theory for smart health. Multim Tools Appl 81(13):18829\u201318853. https:\/\/doi.org\/10.1007\/s11042-022-12653-1","journal-title":"Multim Tools Appl"},{"key":"2660_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.122030","volume":"238","author":"SS Jamal","year":"2024","unstructured":"Jamal SS, Hazzazi MM, Khan MF, Bassfar Z, Aljaedi A (2024) Region of interest-based medical image encryption technique based on chaotic S-boxes. Expert Syst Appl 238:122030. https:\/\/doi.org\/10.1016\/j.eswa.2023.122030","journal-title":"Expert Syst Appl"},{"issue":"2","key":"2660_CR15","doi-asserted-by":"publisher","first-page":"2187","DOI":"10.1007\/s40747-023-01258-2","volume":"10","author":"L Zhang","year":"2024","unstructured":"Zhang L, Song X, El-Latif AAA, Zhao Y, Abd-El-Atty B (2024) Reversibly selective encryption for medical images based on coupled chaotic maps and steganography. Complex Intell Syst 10(2):2187\u20132213. https:\/\/doi.org\/10.1007\/s40747-023-01258-2","journal-title":"Complex Intell Syst"},{"key":"2660_CR16","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1109\/ACCESS.2021.3138718","volume":"10","author":"I Yasser","year":"2021","unstructured":"Yasser I, Khalil AT, Mohamed MA, Samra AS, Khalifa F (2021) A robust chaos-based technique for medical image encryption. IEEE Access 10:244\u2013257. https:\/\/doi.org\/10.1109\/ACCESS.2021.3138718","journal-title":"IEEE Access"},{"issue":"11","key":"2660_CR17","doi-asserted-by":"publisher","first-page":"3925","DOI":"10.3390\/s21113925","volume":"21","author":"AAK Javan","year":"2021","unstructured":"Javan AAK, Jafari M, Shoeibi A, Zare A, Khodatars M, Ghassemi N, Alizadehsani R, Gorriz JM (2021) Medical images encryption based on adaptive-robust multi-mode synchronization of chen hyper-chaotic systems. Sensors 21(11):3925. https:\/\/doi.org\/10.3390\/s21113925","journal-title":"Sensors"},{"key":"2660_CR18","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.369","author":"K Demla","year":"2024","unstructured":"Demla K, Anand A (2024) MieWC: medical image encryption using wavelet transform and multiple chaotic maps. Security Privacy. https:\/\/doi.org\/10.1002\/spy2.369","journal-title":"Security Privacy"},{"key":"2660_CR19","doi-asserted-by":"publisher","first-page":"59108","DOI":"10.1109\/ACCESS.2021.3071535","volume":"9","author":"A Shafique","year":"2021","unstructured":"Shafique A, Ahmed J, Rehman MU, Hazzazi MM (2021) Noise-resistant image encryption scheme for medical images in the chaos and wavelet domain. IEEE Access 9:59108\u201359130. https:\/\/doi.org\/10.1109\/ACCESS.2021.3071535","journal-title":"IEEE Access"},{"issue":"12","key":"2660_CR20","doi-asserted-by":"publisher","first-page":"2770","DOI":"10.1049\/ipr2.12261","volume":"15","author":"I Aouissaoui","year":"2021","unstructured":"Aouissaoui I, Bakir T, Sakly A (2021) Robustly correlated key-medical image for DNA-chaos based encryption. IET Image Proc 15(12):2770\u20132786. https:\/\/doi.org\/10.1049\/ipr2.12261","journal-title":"IET Image Proc"},{"key":"2660_CR21","doi-asserted-by":"publisher","first-page":"118624","DOI":"10.1109\/ACCESS.2021.3107608","volume":"9","author":"CH Lin","year":"2021","unstructured":"Lin CH, Wu JX, Chen PY, Lai HY, Li CM, Kuo CL, Pai NS (2021) Intelligent symmetric cryptography with chaotic map and quantum based key generator for medical images infosecurity. IEEE Access 9:118624\u2013118639. https:\/\/doi.org\/10.1109\/ACCESS.2021.3107608","journal-title":"IEEE Access"},{"issue":"4","key":"2660_CR22","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1049\/ccs2.12070","volume":"4","author":"M Li","year":"2022","unstructured":"Li M, Pan S, Meng W, Guoyong W, Ji Z, Wang L (2022) Medical image encryption algorithm based on hyper-chaotic system and DNA coding. Cogn Comput Syst 4(4):378\u2013390. https:\/\/doi.org\/10.1049\/ccs2.12070","journal-title":"Cogn Comput Syst"},{"issue":"1","key":"2660_CR23","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1186\/s13677-022-00331-4","volume":"11","author":"Z Liu","year":"2022","unstructured":"Liu Z, Li J, Ai Y, Zheng Y, Liu J (2022) A robust encryption watermarking algorithm for medical images based on ridgelet-DCT and THM double chaos. J Cloud Comput 11(1):60. https:\/\/doi.org\/10.1186\/s13677-022-00331-4","journal-title":"J Cloud Comput"},{"key":"2660_CR24","doi-asserted-by":"publisher","first-page":"54928","DOI":"10.1109\/ACCESS.2023.3282160","volume":"11","author":"W Alexan","year":"2023","unstructured":"Alexan W, Gabr M, Mamdouh E, Elias R, Aboshousha A (2023) Color image cryptosystem based on sine chaotic map, 4d chen hyperchaotic map of fractional-order and hybrid dna coding. IEEE Access 11:54928\u201354956. https:\/\/doi.org\/10.1109\/ACCESS.2023.3282160","journal-title":"IEEE Access"},{"key":"2660_CR25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3319335","author":"W Alexan","year":"2023","unstructured":"Alexan W, Korayem Y, Gabr M, El-Aasser M, Maher EA, El-Damak D, Aboshousha A (2023) Anteater: When Arnold\u2019s cat meets Langton\u2019s ant to encrypt images. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2023.3319335","journal-title":"IEEE Access"},{"key":"2660_CR26","doi-asserted-by":"publisher","first-page":"85002","DOI":"10.1109\/ACCESS.2023.3301460","volume":"11","author":"M Gabr","year":"2023","unstructured":"Gabr M, Elias R, Hosny KM, Papakostas GA, Alexan W (2023) Image encryption via base-n prngs and parallel base-n s-boxes. IEEE Access 11:85002\u201385030. https:\/\/doi.org\/10.1109\/ACCESS.2023.3301460","journal-title":"IEEE Access"},{"key":"2660_CR27","doi-asserted-by":"publisher","first-page":"119284","DOI":"10.1109\/ACCESS.2023.3326848","volume":"11","author":"M Gabr","year":"2023","unstructured":"Gabr M, Korayem Y, Chen YL, Yee L, Ku CS, Alexan W (2023) R 3\u2014rescale, rotate, and randomize: a novel image cryptosystem utilizing chaotic and hyper-chaotic systems. IEEE Access 11:119284\u2013119312. https:\/\/doi.org\/10.1109\/ACCESS.2023.3326848","journal-title":"IEEE Access"},{"key":"2660_CR28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3407838","author":"W Alexan","year":"2024","unstructured":"Alexan W, Aly L, Korayem Y, Gabr M, El-Damak D, Fathy A, Mansour HA (2024) Secure communication of military reconnaissance images over UAV-assisted relay networks. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2024.3407838","journal-title":"IEEE Access"},{"key":"2660_CR29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3363018","author":"W Alexan","year":"2024","unstructured":"Alexan W, El-Damak D, Gabr M (2024) Image encryption based on fourier-DNA coding for hyperchaotic chen system, chen-based binary quantization S-box, and variable-base modulo operation. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2024.3363018","journal-title":"IEEE Access"},{"issue":"2","key":"2660_CR30","doi-asserted-by":"publisher","first-page":"1405","DOI":"10.1007\/s11277-021-08584-z","volume":"127","author":"F Masood","year":"2022","unstructured":"Masood F, Driss M, Boulila W, Ahmad J, Rehman SU, Jan SU, Qayyum A, Buchanan WJ (2022) A lightweight chaos-based medical image encryption scheme using random shuffling and XOR operations. Wireless Pers Commun 127(2):1405\u20131432. https:\/\/doi.org\/10.1007\/s11277-021-08584-z","journal-title":"Wireless Pers Commun"},{"key":"2660_CR31","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1016\/j.patrec.2021.10.033","volume":"152","author":"K Jain","year":"2021","unstructured":"Jain K, Aji A, Krishnan P (2021) Medical image encryption scheme using multiple chaotic maps. Pattern Recogn Lett 152:356\u2013364. https:\/\/doi.org\/10.1016\/j.patrec.2021.10.033","journal-title":"Pattern Recogn Lett"},{"key":"2660_CR32","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1007\/s11517-021-02328-8","volume":"59","author":"D Ravichandran","year":"2021","unstructured":"Ravichandran D, Banu SA, Murthy BK, Balasubramanian V, Fathima S, Amirtharajan R (2021) An efficient medical image encryption using hybrid DNA computing and chaos in transform domain. Med Biol Eng Comput 59:589\u2013605. https:\/\/doi.org\/10.1007\/s11517-021-02328-8","journal-title":"Med Biol Eng Comput"},{"key":"2660_CR33","doi-asserted-by":"publisher","first-page":"160433","DOI":"10.1109\/ACCESS.2020.3020746","volume":"8","author":"S Ibrahim","year":"2020","unstructured":"Ibrahim S, Alhumyani H, Masud M, Alshamrani SS, Cheikhrouhou O, Muhammad G, Hossain MS, Abbas AM (2020) Framework for efficient medical image encryption using dynamic S-boxes and chaotic maps. Ieee Access 8:160433\u2013160449. https:\/\/doi.org\/10.1109\/ACCESS.2020.3020746","journal-title":"Ieee Access"},{"issue":"1","key":"2660_CR34","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/TII.2024.3395631","volume":"7","author":"M Alawida","year":"2023","unstructured":"Alawida M, Teh JS, Alshoura WH (2023) A new image encryption algorithm based on DNA state machine for UAV data encryption. Drones 7(1):38. https:\/\/doi.org\/10.1109\/TII.2024.3395631","journal-title":"Drones"},{"key":"2660_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2024.103791","volume":"83","author":"M Alawida","year":"2024","unstructured":"Alawida M (2024) A novel DNA tree-based chaotic image encryption algorithm. J Inf Security Appl 83:103791. https:\/\/doi.org\/10.1016\/j.jisa.2024.103791","journal-title":"J Inf Security Appl"},{"key":"2660_CR36","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2024.3395631","author":"M Alawida","year":"2024","unstructured":"Alawida M (2024) A novel image encryption algorithm based on cyclic chaotic map in industrial IoT environments. IEEE Trans Industr Inf. https:\/\/doi.org\/10.1109\/TII.2024.3395631","journal-title":"IEEE Trans Industr Inf"},{"key":"2660_CR37","doi-asserted-by":"publisher","first-page":"113163","DOI":"10.1109\/ACCESS.2020.3002763","volume":"8","author":"M Alawida","year":"2020","unstructured":"Alawida M, Teh JS, Oyinloye DP, Ahmad M, Alkhawaldeh RS (2020) A new hash function based on chaotic maps and deterministic finite state automata. IEEE Access 8:113163\u2013113174. https:\/\/doi.org\/10.1109\/ACCESS.2020.3002763","journal-title":"IEEE Access"},{"key":"2660_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2023.114111","volume":"176","author":"G Long","year":"2023","unstructured":"Long G, Chai X, Gan Z, Jiang D, He X, Sun M (2023) Exploiting one-dimensional exponential Chebyshev chaotic map and matching embedding for visually meaningful image encryption. Chaos Solitons Fractals 176:114111. https:\/\/doi.org\/10.1016\/j.chaos.2023.114111","journal-title":"Chaos Solitons Fractals"},{"key":"2660_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2024.115632","volume":"189","author":"D Jiang","year":"2024","unstructured":"Jiang D, Njitacke ZT, Long G, Awrejcewicz J, Zheng M, Cai L (2024) Novel Tabu learning neuron model with variable activation gradient and its application to secure healthcare. Chaos Solitons Fractals 189:115632. https:\/\/doi.org\/10.1016\/j.chaos.2024.115632","journal-title":"Chaos Solitons Fractals"},{"issue":"4","key":"2660_CR40","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/s10462-024-10719-0","volume":"57","author":"S Kumar","year":"2024","unstructured":"Kumar S, Sharma D (2024) A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm. Artif Intell Rev 57(4):87. https:\/\/doi.org\/10.1007\/s10462-024-10719-0","journal-title":"Artif Intell Rev"},{"issue":"16","key":"2660_CR41","doi-asserted-by":"publisher","first-page":"2628","DOI":"10.3390\/electronics11162628","volume":"11","author":"J Wang","year":"2022","unstructured":"Wang J, Song X, El-Latif AAA (2022) Single-objective particle swarm optimization-based chaotic image encryption scheme. Electronics 11(16):2628. https:\/\/doi.org\/10.3390\/electronics11162628","journal-title":"Electronics"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-025-02660-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-025-02660-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-025-02660-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T16:57:27Z","timestamp":1760547447000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-025-02660-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,26]]},"references-count":41,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["2660"],"URL":"https:\/\/doi.org\/10.1007\/s13042-025-02660-7","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"value":"1868-8071","type":"print"},{"value":"1868-808X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,26]]},"assertion":[{"value":"31 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable.","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}