{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T10:42:16Z","timestamp":1777891336694,"version":"3.51.4"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T00:00:00Z","timestamp":1636761600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T00:00:00Z","timestamp":1636761600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2022,4]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Video piracy is a challenging issue in the modern world. Approximately <jats:inline-formula><jats:alternatives><jats:tex-math>$$90\\%$$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mrow>\n                    <mml:mn>90<\/mml:mn>\n                    <mml:mo>%<\/mml:mo>\n                  <\/mml:mrow>\n                <\/mml:math><\/jats:alternatives><\/jats:inline-formula> of newly released films were illegally distributed around the world via the Internet. To overcome this issue, video watermarking is an effective process that integrates a logo in video frames as a watermark. Therefore, this paper presents an efficient lossless video-watermarking scheme based on optimal keyframe selection using an intelligent gravitational search algorithm in linear wavelet transform. This technique obtains color motion and motionless frames from the cover video by the histogram difference method. One-level linear wavelet transform is performed on the chrominance channel of motion frames and a low-frequency sub-band LL opts for watermark embedding. The performance of the proposed technique has been evaluated against 12 video processing attacks in terms of imperceptibility and robustness. Experiments demonstrate that the proposed technique outperforms five state-of-the-art schemes on the considered attacks.<\/jats:p>","DOI":"10.1007\/s40747-021-00569-6","type":"journal-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T15:02:37Z","timestamp":1636815757000},"page":"1047-1070","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Optimal keyframe selection-based lossless video-watermarking technique using IGSA in LWT domain for copyright protection"],"prefix":"10.1007","volume":"8","author":[{"given":"Roop","family":"Singh","sequence":"first","affiliation":[]},{"given":"Himanshu","family":"Mittal","sequence":"additional","affiliation":[]},{"given":"Raju","family":"Pal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"issue":"2","key":"569_CR1","first-page":"107","volume":"24","author":"MN Asghar","year":"2012","unstructured":"Asghar MN, Ghanbari M (2012) Mikey for keys management of h. 264 scalable video coded layers. J King Saud Univ Comput Inf Sci 24(2):107\u2013116","journal-title":"J King Saud Univ Comput Inf Sci"},{"issue":"2","key":"569_CR2","first-page":"199","volume":"28","author":"A Karmakar","year":"2016","unstructured":"Karmakar A, Phadikar A, Phadikar BS, Maity GK (2016) A blind video watermarking scheme resistant to rotation and collusion attacks. J King Saud Univ Comput Inf Sci 28(2):199\u2013210","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"569_CR3","doi-asserted-by":"crossref","unstructured":"Balamurugan N, Adimoolam M, John A, et\u00a0al (2021) A novel efficient algorithm for duplicate video comparison in surveillance video storage systems. J Ambient Intell Humaniz Comput 1\u201312","DOI":"10.1007\/s12652-021-03119-7"},{"key":"569_CR4","first-page":"5","volume-title":"Digital pirates winning battle with studios","author":"B Stelter","year":"2009","unstructured":"Stelter B, Stone B (2009) Digital pirates winning battle with studios. New York Times, New York, p 5"},{"issue":"9","key":"569_CR5","doi-asserted-by":"publisher","first-page":"2131","DOI":"10.1109\/TCSVT.2017.2712162","volume":"28","author":"M Asikuzzaman","year":"2017","unstructured":"Asikuzzaman M, Pickering MR (2017) An overview of digital video watermarking. IEEE Trans Circuits Syst Video Technol 28(9):2131\u20132153","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"102","key":"569_CR6","first-page":"734","volume":"58","author":"R Singh","year":"2021","unstructured":"Singh R, Ashok A (2021) An optimized robust watermarking technique using CKGSA in frequency domain. J Inf Secur Appl 58(102):734","journal-title":"J Inf Secur Appl"},{"issue":"10","key":"569_CR7","doi-asserted-by":"publisher","first-page":"2052","DOI":"10.1049\/iet-ipr.2019.1059","volume":"14","author":"R Singh","year":"2020","unstructured":"Singh R, Ashok A, Saraswat M (2020) Optimised robust watermarking technique using CKGSA in DCT-SVD domain. IET Image Process 14(10):2052\u20132063","journal-title":"IET Image Process"},{"issue":"2","key":"569_CR8","first-page":"163","volume":"25","author":"A Phadikar","year":"2013","unstructured":"Phadikar A (2013) Multibit quantization index modulation: a high-rate robust data-hiding method. J King Saud Univ Comput Inf Sci 25(2):163\u2013171","journal-title":"J King Saud Univ Comput Inf Sci"},{"issue":"4","key":"569_CR9","doi-asserted-by":"publisher","first-page":"1327","DOI":"10.1016\/j.sigpro.2009.10.009","volume":"90","author":"D Choi","year":"2010","unstructured":"Choi D, Do H, Choi H, Kim T (2010) A blind mpeg-2 video watermarking robust to camcorder recording. Signal Process 90(4):1327\u20131332","journal-title":"Signal Process"},{"issue":"1","key":"569_CR10","doi-asserted-by":"publisher","first-page":"013022","DOI":"10.1117\/1.3558734","volume":"20","author":"R Preda","year":"2011","unstructured":"Preda R, Vizireanu DN (2011) Robust wavelet-based video watermarking scheme for copyright protection using the human visual system. J Electron Imaging 20(1):013022","journal-title":"J Electron Imaging"},{"issue":"1","key":"569_CR11","first-page":"296","volume":"9","author":"NI Yassin","year":"2012","unstructured":"Yassin NI, Salem NM, El Adawy MI (2012) Block based video watermarking scheme using wavelet transform and principle component analysis. Int J Comput Sci Issues (IJCSI) 9(1):296","journal-title":"Int J Comput Sci Issues (IJCSI)"},{"issue":"3","key":"569_CR12","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1016\/j.aeue.2012.07.010","volume":"67","author":"OS Faragallah","year":"2013","unstructured":"Faragallah OS (2013) Efficient video watermarking based on singular value decomposition in the discrete wavelet transform domain. AEU-Int J Electron Commun 67(3):189\u2013196","journal-title":"AEU-Int J Electron Commun"},{"issue":"6","key":"569_CR13","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1016\/j.aeue.2012.11.009","volume":"67","author":"M Masoumi","year":"2013","unstructured":"Masoumi M, Amiri S (2013) A blind scene-based watermarking for video copyright protection. AEU-Int J Electron Commun 67(6):528\u2013535","journal-title":"AEU-Int J Electron Commun"},{"issue":"10","key":"569_CR14","doi-asserted-by":"publisher","first-page":"1007","DOI":"10.1016\/j.aeue.2014.05.004","volume":"68","author":"TM Thanh","year":"2014","unstructured":"Thanh TM, Hiep PT, Tam TM, Tanaka K (2014) Robust semi-blind video watermarking based on frame-patch matching. AEU-Int J Electron Commun 68(10):1007\u20131015","journal-title":"AEU-Int J Electron Commun"},{"issue":"12","key":"569_CR15","doi-asserted-by":"publisher","first-page":"1868","DOI":"10.1016\/j.aeue.2015.09.015","volume":"69","author":"M Masoumi","year":"2015","unstructured":"Masoumi M, Rezaei M, Hamza AB (2015) A blind spatio-temporal data hiding for video ownership verification in frequency domain. AEU-Int J Electron Commun 69(12):1868\u20131879","journal-title":"AEU-Int J Electron Commun"},{"key":"569_CR16","doi-asserted-by":"publisher","first-page":"838","DOI":"10.1016\/j.jvcir.2016.05.001","volume":"38","author":"P Rasti","year":"2016","unstructured":"Rasti P, Samiei S, Agoyi M, Escalera S, Anbarjafari G (2016) Robust non-blind color video watermarking using qr decomposition and entropy analysis. J Vis Commun Image Represent 38:838\u2013847","journal-title":"J Vis Commun Image Represent"},{"issue":"4","key":"569_CR17","doi-asserted-by":"publisher","first-page":"1875","DOI":"10.1007\/s11071-018-4295-x","volume":"93","author":"E Farri","year":"2018","unstructured":"Farri E, Ayubi P (2018) A blind and robust video watermarking based on IWT and new 3D generalized chaotic sine map. Nonlinear Dyn 93(4):1875\u20131897","journal-title":"Nonlinear Dyn"},{"key":"569_CR18","doi-asserted-by":"crossref","unstructured":"Suresh M, Sam IS (2020) Optimized interesting region identification for video steganography using fractional grey wolf optimization along with multi-objective cost function. J King Saud Univ Comput Inf Sci :1\u20138","DOI":"10.1016\/j.jksuci.2020.08.007"},{"issue":"2","key":"569_CR19","doi-asserted-by":"publisher","first-page":"1237","DOI":"10.1007\/s10462-020-09877-8","volume":"54","author":"P Ayubi","year":"2021","unstructured":"Ayubi P, Barani MJ, Valandar MY, Irani BY, Sadigh RSM (2021) A new chaotic complex map for robust video watermarking. Artif Intell Rev 54(2):1237\u20131280","journal-title":"Artif Intell Rev"},{"key":"569_CR20","doi-asserted-by":"crossref","unstructured":"Aditya K, Choudhary A, Raj A, Sing M (2017) Video watermarking based on cuckoo search and scene change detection. In: 2017 international conference on intelligent sustainable systems (ICISS). IEEE, pp 420\u2013424","DOI":"10.1109\/ISS1.2017.8389443"},{"key":"569_CR21","doi-asserted-by":"crossref","unstructured":"Agrawal P, Khurshid A (2014) Dwt and ga-pso based novel watermarking for videos using audio watermark. In: International conference in swarm intelligence. Springer, pp 212\u2013220","DOI":"10.1007\/978-3-319-11897-0_25"},{"issue":"6","key":"569_CR22","doi-asserted-by":"publisher","first-page":"2539","DOI":"10.1007\/s00542-017-3689-x","volume":"24","author":"G Gupta","year":"2018","unstructured":"Gupta G, Gupta V, Chandra M (2018) An efficient video watermarking based security model. Microsyst Technol 24(6):2539\u20132548","journal-title":"Microsyst Technol"},{"key":"569_CR23","doi-asserted-by":"crossref","unstructured":"Kumar PM, Srinivas K, Prabhakar B (2021) A new video watermarking using redundant discrete wavelet in singular value decomposition domain with multi-objective optimization. Concurr Comput Pract Exp 24:e6217","DOI":"10.1002\/cpe.6217"},{"issue":"6","key":"569_CR24","doi-asserted-by":"publisher","first-page":"565","DOI":"10.18280\/ts.360612","volume":"36","author":"S Kuraparthi","year":"2019","unstructured":"Kuraparthi S, Kollati M, Kora P (2019) Robust optimized discrete wavelet transform-singular value decomposition based video watermarking. Traitement du Signal 36(6):565\u2013573","journal-title":"Traitement du Signal"},{"key":"569_CR25","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.jvcir.2017.02.013","volume":"45","author":"N Sahu","year":"2017","unstructured":"Sahu N, Sur A (2017) Sift based video watermarking resistant to temporal scaling. J Vis Commun Image Represent 45:77\u201386","journal-title":"J Vis Commun Image Represent"},{"issue":"1","key":"569_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3002178","volume":"13","author":"T Dutta","year":"2017","unstructured":"Dutta T, Gupta HP (2017) An efficient framework for compressed domain watermarking in p frames of high-efficiency video coding (hevc)-encoded video. ACM Tran Multimed Comput Commun Appl (TOMM) 13(1):1\u201324","journal-title":"ACM Tran Multimed Comput Commun Appl (TOMM)"},{"issue":"13","key":"569_CR27","doi-asserted-by":"publisher","first-page":"16419","DOI":"10.1007\/s11042-017-5213-9","volume":"77","author":"KM Singh","year":"2018","unstructured":"Singh KM (2018) A robust rotation resilient video watermarking scheme based on the sift. Multimed Tools Appl 77(13):16419\u201316444","journal-title":"Multimed Tools Appl"},{"issue":"04","key":"569_CR28","doi-asserted-by":"publisher","first-page":"224","DOI":"10.4236\/jsea.2015.84023","volume":"8","author":"L Rajab","year":"2015","unstructured":"Rajab L, Al-Khatib T, Al-Haj A (2015) A blind DWT-SCHUR based digital video watermarking technique. J Softw Eng Appl 8(04):224","journal-title":"J Softw Eng Appl"},{"issue":"105","key":"569_CR29","first-page":"696","volume":"84","author":"S Sharma","year":"2019","unstructured":"Sharma S, Sharma H, Sharma JB (2019) An adaptive color image watermarking using RDWT-SVD and artificial bee colony based quality metric strength factor optimization. Appl Soft Comput 84(105):696","journal-title":"Appl Soft Comput"},{"issue":"4","key":"569_CR30","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1049\/iet-ipr.2009.0264","volume":"5","author":"YT Lin","year":"2011","unstructured":"Lin YT, Huang CY, Lee GC (2011) Rotation, scaling, and translation resilient watermarking for images. IET Image Process 5(4):328\u2013340","journal-title":"IET Image Process"},{"issue":"9","key":"569_CR31","doi-asserted-by":"publisher","first-page":"1502","DOI":"10.1109\/TIFS.2014.2338274","volume":"9","author":"M Asikuzzaman","year":"2014","unstructured":"Asikuzzaman M, Alam MJ, Lambert AJ, Pickering MR (2014) Imperceptible and robust blind video watermarking using chrominance embedding: a set of approaches in the DT CWT domain. IEEE Trans Inf Forensics Secur 9(9):1502\u20131517","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"569_CR32","doi-asserted-by":"crossref","unstructured":"Mittal H, Saraswat M (2020) A new fuzzy cluster validity index for hyper-ellipsoid or hyper-spherical shape close clusters with distant centroids. IEEE Trans Fuzzy Syst 29:3249\u20133258","DOI":"10.1109\/TFUZZ.2020.3016339"},{"key":"569_CR33","doi-asserted-by":"crossref","unstructured":"Pal R, Saraswat M (2017) Data clustering using enhanced biogeography-based optimization. In: 2017 tenth international conference on contemporary computing (IC3). IEEE","DOI":"10.1109\/IC3.2017.8284305"},{"issue":"2","key":"569_CR34","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/s40747-020-00137-4","volume":"6","author":"P Raju","year":"2020","unstructured":"Raju P, Subash Y, Rishabh K et al (2020) EEWC: energy-efficient weighted clustering method based on genetic algorithm for HWSNS. Complex Intell Syst 6(2):391\u2013400","journal-title":"Complex Intell Syst"},{"issue":"1","key":"569_CR35","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/s40747-020-00200-0","volume":"7","author":"AK Tripathi","year":"2021","unstructured":"Tripathi AK, Mittal H, Saxena P, Gupta S (2021) A new recommendation system using map-reduce-based tournament empowered whale optimization algorithm. Complex Intell Syst 7(1):297\u2013309","journal-title":"Complex Intell Syst"},{"issue":"13","key":"569_CR36","doi-asserted-by":"publisher","first-page":"2232","DOI":"10.1016\/j.ins.2009.03.004","volume":"179","author":"E Rashedi","year":"2009","unstructured":"Rashedi E, Nezamabadi-Pour H, Saryazdi S (2009) GSA: a gravitational search algorithm. Inf Sci 179(13):2232\u20132248","journal-title":"Inf Sci"},{"key":"569_CR37","doi-asserted-by":"crossref","unstructured":"Mittal H, Pandey AC, Saraswat M, Kumar S, Pal R, Modwel G (2021) A comprehensive survey of image segmentation: clustering methods, performance parameters, and benchmark datasets. Multimed Tools Appl 1\u201326","DOI":"10.1007\/s11042-021-10594-9"},{"issue":"5","key":"569_CR38","doi-asserted-by":"publisher","first-page":"2988","DOI":"10.1007\/s10489-020-02122-3","volume":"51","author":"H Mittal","year":"2021","unstructured":"Mittal H, Pandey AC, Pal R, Tripathi A (2021) A new clustering method for the diagnosis of covid19 using medical images. Appl Intell 51(5):2988\u20133011","journal-title":"Appl Intell"},{"key":"569_CR39","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/j.asoc.2016.12.007","volume":"51","author":"B Anari","year":"2017","unstructured":"Anari B, Torkestani JA, Rahmani AM (2017) Automatic data clustering using continuous action-set learning automata and its application in segmentation of images. Appl Soft Comput 51:253\u2013265","journal-title":"Appl Soft Comput"},{"key":"569_CR40","doi-asserted-by":"crossref","unstructured":"Mittal H, Saraswat M (2018) cKGSA based fuzzy clustering method for image segmentation of RGB-D images. In: 2018 eleventh international conference on contemporary computing (IC3). IEEE, pp 1\u20136","DOI":"10.1109\/IC3.2018.8530568"},{"key":"569_CR41","doi-asserted-by":"crossref","unstructured":"Mittal H, Pal R, Kulhari A, Saraswat M (2016) Chaotic kbest gravitational search algorithm (ckgsa). In: 2016 ninth international conference on contemporary computing (IC3). IEEE, pp 1\u20136","DOI":"10.1109\/IC3.2016.7880252"},{"issue":"10","key":"569_CR42","doi-asserted-by":"publisher","first-page":"2117","DOI":"10.1007\/s00607-020-00828-3","volume":"102","author":"J Liu","year":"2020","unstructured":"Liu J, Xing Y, Ma Y, Li Y (2020) Gravitational search algorithm based on multiple adaptive constraint strategy. Computing 102(10):2117\u20132157","journal-title":"Computing"},{"key":"569_CR43","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.ins.2018.10.025","volume":"476","author":"F Olivas","year":"2019","unstructured":"Olivas F, Valdez F, Melin P, Sombra A, Castillo O (2019) Interval type-2 fuzzy logic for dynamic parameter adaptation in a modified gravitational search algorithm. Inf Sci 476:159\u2013175","journal-title":"Inf Sci"},{"issue":"7","key":"569_CR44","doi-asserted-by":"publisher","first-page":"1569","DOI":"10.1007\/s00521-014-1640-y","volume":"25","author":"S Mirjalili","year":"2014","unstructured":"Mirjalili S, Lewis A (2014) Adaptive gbest-guided gravitational search algorithm. Neural Comput Appl 25(7):1569\u20131584","journal-title":"Neural Comput Appl"},{"key":"569_CR45","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.engappai.2018.03.001","volume":"71","author":"H Mittal","year":"2018","unstructured":"Mittal H, Saraswat M (2018) An optimum multi-level image thresholding segmentation using non-local means 2d histogram and exponential kbest gravitational search algorithm. Eng Appl Artif Intell 71:226\u2013235","journal-title":"Eng Appl Artif Intell"},{"key":"569_CR46","doi-asserted-by":"crossref","unstructured":"Wang Y, Yu Y, Gao S, Pan H, Yang G (2019) A hierarchical gravitational search algorithm with an effective gravitational constant. Swarm Evolut Comput 46:118\u2013139","DOI":"10.1016\/j.swevo.2019.02.004"},{"key":"569_CR47","doi-asserted-by":"crossref","unstructured":"Rawal P, Sharma H, Sharma N (2020) Fast convergent gravitational search algorithm. In: Recent trends in communication and intelligent systems. Springer, pp 1\u201312","DOI":"10.1007\/978-981-15-0426-6_1"},{"key":"569_CR48","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.swevo.2018.12.005","volume":"45","author":"H Mittal","year":"2019","unstructured":"Mittal H, Saraswat M (2019) An automatic nuclei segmentation method using intelligent gravitational search algorithm based superpixel clustering. Swarm Evolut Comput 45:15\u201332","journal-title":"Swarm Evolut Comput"},{"key":"569_CR49","doi-asserted-by":"crossref","unstructured":"Bhardwaj A, Verma VS, Jha RK (2018) Robust video watermarking using significant frame selection based on coefficient difference of lifting wavelet transform. Multimed Tools Appl 77(15):19659\u201319678","DOI":"10.1007\/s11042-017-5340-3"},{"issue":"19","key":"569_CR50","doi-asserted-by":"publisher","first-page":"25431","DOI":"10.1007\/s11042-018-5800-4","volume":"77","author":"L Agilandeeswari","year":"2018","unstructured":"Agilandeeswari L, Ganesan K (2018) RST invariant robust video watermarking algorithm using quaternion curvelet transform. Multimed Tools Appl 77(19):25431\u201325474","journal-title":"Multimed Tools Appl"},{"key":"569_CR51","doi-asserted-by":"crossref","unstructured":"Zear A, Singh PK (2021) Secure and robust color image dual watermarking based on LWT-DCT-SVD. Multimed Tools Appl 1\u201318","DOI":"10.1007\/s11042-020-10472-w"},{"key":"569_CR52","unstructured":"Koley S (2019) A feature adaptive image watermarking framework based on phase congruency and symmetric key cryptography. J King Saud Univ Comput Inf Sci :1\u201310"},{"issue":"1","key":"569_CR53","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/j.future.2012.05.021","volume":"29","author":"G Bhatnagar","year":"2013","unstructured":"Bhatnagar G, Wu QJ (2013) Biometrics inspired watermarking based on a fractional dual tree complex wavelet transform. Future Gener Comput Syst 29(1):182\u2013195","journal-title":"Future Gener Comput Syst"},{"issue":"4","key":"569_CR54","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612","journal-title":"IEEE Trans Image Process"},{"key":"569_CR55","doi-asserted-by":"crossref","unstructured":"Thounaojam DM, Khelchandra T, Singh K, Roy S et al (2016) A genetic algorithm and fuzzy logic approach for video shot boundary detection. Comput Intell Neurosci 2016:1\u201312","DOI":"10.1155\/2016\/8469428"},{"key":"569_CR56","unstructured":"Sipi (2020) http:\/\/www.sipi.usc.edu\/database\/. Accessed 2 Mar 2020"},{"key":"569_CR57","unstructured":"Xiph (2020) https:\/\/media.xiph.org\/video\/derf\/. (Accessed on 01\/31\/2020)"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-021-00569-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-021-00569-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-021-00569-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,29]],"date-time":"2022-04-29T17:41:04Z","timestamp":1651254064000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-021-00569-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,13]]},"references-count":57,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["569"],"URL":"https:\/\/doi.org\/10.1007\/s40747-021-00569-6","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,13]]},"assertion":[{"value":"19 May 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 October 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 November 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}