{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T19:13:34Z","timestamp":1774034014116,"version":"3.50.1"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2023,2,13]],"date-time":"2023-02-13T00:00:00Z","timestamp":1676246400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,2,13]],"date-time":"2023-02-13T00:00:00Z","timestamp":1676246400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Regional Innovation and Development Joint Funds of the National Natural Science Foundation of China","award":["U22A2079"],"award-info":[{"award-number":["U22A2079"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61475104"],"award-info":[{"award-number":["61475104"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61177009"],"award-info":[{"award-number":["61177009"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010814","name":"Anhui Provincial Department of Education","doi-asserted-by":"publisher","award":["KJ2020 A0346"],"award-info":[{"award-number":["KJ2020 A0346"]}],"id":[{"id":"10.13039\/501100010814","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010814","name":"Anhui Provincial Department of Education","doi-asserted-by":"publisher","award":["KJ2020 ZD39"],"award-info":[{"award-number":["KJ2020 ZD39"]}],"id":[{"id":"10.13039\/501100010814","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2023,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>A visually meaningful double-image encryption scheme using 2D compressive sensing and multi-rule DNA encoding is presented. First, scrambling, diffusing and 2D compressive sensing are performed on the two plain images, and two privacy images are obtained, respectively. Then, the two privacy images are re-encrypted using DNA encoding theory to obtain two secret images. Finally, integer wavelet transform (IWT) is performed on the carrier image to obtain the wavelet coefficients, then the two secret images are embedded into the wavelet coefficients and 2k correction is performed, and the obtained result is processed by inverse IWT to obtain a visually meaningful encrypted image. DNA encoding rules selected for the pixel values of different positions in the two privacy images, and DNA operations performed between the two privacy images and the key streams at different positions are controlled by the chaotic system. The application of 2D compressive sensing reduces the amount of data, thus increasing the encryption capacity of the system. The introduction of DNA encoding theory and the double-image embedding process increases the security of the system. The simulation results demonstrate the feasibility of the scheme, and it has high data security and visual security.<\/jats:p>","DOI":"10.1007\/s40747-023-00989-6","type":"journal-article","created":{"date-parts":[[2023,2,13]],"date-time":"2023-02-13T21:32:25Z","timestamp":1676323945000},"page":"4783-4803","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["A visually meaningful double-image encryption scheme using 2D compressive sensing and multi-rule DNA encoding"],"prefix":"10.1007","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8703-761X","authenticated-orcid":false,"given":"Dongming","family":"Huo","sequence":"first","affiliation":[]},{"given":"Yueyou","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Han","sequence":"additional","affiliation":[]},{"given":"Lisheng","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Yao","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Zhilong","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,13]]},"reference":[{"issue":"4","key":"989_CR1","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1016\/j.optlaseng.2012.11.001","volume":"51","author":"Y Zhang","year":"2013","unstructured":"Zhang Y, Xiao D (2013) Double optical image encryption using discrete chirikov standard map and chaos-based fractional random transform. Optics and Lasers in Engineering 51(4):472\u2013480","journal-title":"Optics and Lasers in Engineering"},{"key":"989_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.optlaseng.2015.12.004","volume":"80","author":"Z Tang","year":"2016","unstructured":"Tang Z, Song J, Zhang X, Sun R (2016) Multiple-image encryption with bit-plane decomposition and chaotic maps. Optics and Lasers in Engineering 80:1\u201311","journal-title":"Optics and Lasers in Engineering"},{"key":"989_CR3","doi-asserted-by":"crossref","first-page":"1063","DOI":"10.1016\/j.ins.2020.09.032","volume":"546","author":"Z Hua","year":"2021","unstructured":"Hua Z, Zhu Z, Yi S, Zhang Z, Huang H (2021) Cross-plane colour image encryption using a two-dimensional logistic tent modular map. Information Sciences 546:1063\u20131083","journal-title":"Information Sciences"},{"key":"989_CR4","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.ins.2020.10.048","volume":"550","author":"MZ Talhaoui","year":"2021","unstructured":"Talhaoui MZ, Wang X (2021) A new fractional one dimensional chaotic map and its application in high-speed image encryption. Information Sciences 550:13\u201326","journal-title":"Information Sciences"},{"key":"989_CR5","doi-asserted-by":"crossref","unstructured":"S KU, Mohamed A (2021) Novel hyper chaotic color image encryption based on pixel and bit level scrambling with diffusion. Signal Processing: Image Communication 99, 116,495","DOI":"10.1016\/j.image.2021.116495"},{"key":"989_CR6","doi-asserted-by":"crossref","unstructured":"Alahmadi Ah (2022) Chaos coordinated neural key synchronization for enhancing security of iot. Complex & Intelligent Systems 8(2):1619\u20131637","DOI":"10.1007\/s40747-021-00616-2"},{"issue":"14","key":"989_CR7","doi-asserted-by":"crossref","first-page":"1584","DOI":"10.1364\/OL.29.001584","volume":"29","author":"G Situ","year":"2004","unstructured":"Situ G, Zhang J (2004) Double random-phase encoding in the fresnel domain. Optics Letters 29(14):1584\u20131586","journal-title":"Optics Letters"},{"issue":"13","key":"989_CR8","doi-asserted-by":"crossref","first-page":"3234","DOI":"10.1016\/j.optcom.2011.02.065","volume":"284","author":"N Zhou","year":"2011","unstructured":"Zhou N, Wang Y, Gong L (2011) Novel optical image encryption scheme based on fractional mellin transform. Optics communications 284(13):3234\u20133242","journal-title":"Optics communications"},{"issue":"11","key":"989_CR9","doi-asserted-by":"crossref","first-page":"6187","DOI":"10.1109\/TII.2019.2897733","volume":"15","author":"X Li","year":"2019","unstructured":"Li X, Wang Y, Wang Q, Kim S, Zhou X (2019) Copyright protection for holographic video using spatiotemporal consistent embedding strategy. IEEE Transactions on Industrial Informatics 15(11):6187\u20136197","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"18","key":"989_CR10","doi-asserted-by":"crossref","first-page":"5279","DOI":"10.1364\/OL.400174","volume":"45","author":"L Zhou","year":"2020","unstructured":"Zhou L, Xiao Y, Chen W (2020) Learning complex scattering media for optical encryption. Opt. Lett. 45(18):5279\u20135282","journal-title":"Opt. Lett."},{"issue":"1","key":"989_CR11","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1016\/j.amc.2009.02.011","volume":"212","author":"X Zheng","year":"2009","unstructured":"Zheng X, Xu J, Li W (2009) Parallel dna arithmetic operation based on n-moduli set. Applied Mathematics and Computation 212(1):177\u2013184","journal-title":"Applied Mathematics and Computation"},{"issue":"5","key":"989_CR12","first-page":"1","volume":"76","author":"X Wang","year":"2016","unstructured":"Wang X, Liu C (2016) A novel and effective image encryption algorithm based on chaos and dna encoding. Multimedia Tools & Applications 76(5):1\u201317","journal-title":"Multimedia Tools & Applications"},{"issue":"45","key":"989_CR13","first-page":"1","volume":"126","author":"D Huo","year":"2020","unstructured":"Huo D, Zhu X, Dai G, Yang H, Feng M (2020) Novel image compression-encryption hybrid scheme based on dna encoding and compressive sensing. Applied Physics B 126(45):1\u20139","journal-title":"Applied Physics B"},{"key":"989_CR14","doi-asserted-by":"crossref","first-page":"723","DOI":"10.1016\/j.matcom.2021.06.012","volume":"190","author":"S Zhang","year":"2021","unstructured":"Zhang S, Liu L (2021) A novel image encryption algorithm based on spwlcm and dna coding. Mathematics and Computers in Simulation 190:723\u2013744","journal-title":"Mathematics and Computers in Simulation"},{"issue":"6","key":"989_CR15","doi-asserted-by":"crossref","first-page":"3241","DOI":"10.1007\/s40747-021-00515-6","volume":"7","author":"M Uddin","year":"2021","unstructured":"Uddin M, Jahan F, Islam MK, Rakib Hassan M (2021) A novel dna-based key scrambling technique for image encryption. Complex & Intelligent Systems 7(6):3241\u20133258","journal-title":"Complex & Intelligent Systems"},{"issue":"7","key":"989_CR16","doi-asserted-by":"crossref","first-page":"1782","DOI":"10.1364\/AO.54.001782","volume":"54","author":"N Rawat","year":"2015","unstructured":"Rawat N, Kim B, Muniraj I, Situ G, Lee BG (2015) Compressive sensing based robust multispectral double-image encryption. Appl. Opt. 54(7):1782\u20131793","journal-title":"Appl. Opt."},{"key":"989_CR17","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.optcom.2014.12.084","volume":"343","author":"N Zhou","year":"2015","unstructured":"Zhou N, Li H, Wang D, Pan S, Zhou Z (2015) Image compression and encryption scheme based on 2d compressive sensing and fractional mellin transform. Optics Communications 343:10\u201321","journal-title":"Optics Communications"},{"issue":"105","key":"989_CR18","first-page":"769","volume":"121","author":"K Zhou","year":"2020","unstructured":"Zhou K, Fan J, Fan H, Li M (2020) Secure image encryption scheme using double random-phase encoding and compressed sensing. Optics & Laser Technology 121(105):769","journal-title":"Optics & Laser Technology"},{"issue":"126","key":"989_CR19","first-page":"683","volume":"484","author":"X Jiang","year":"2021","unstructured":"Jiang X, Xiao Y, Xie Y, Liu B, Ye Y, Song T, Chai J, Liu Y (2021) Exploiting optical chaos for double images encryption with compressive sensing and double random phase encoding. Optics Communications 484(126):683","journal-title":"Optics Communications"},{"issue":"116","key":"989_CR20","first-page":"246","volume":"95","author":"X Wang","year":"2021","unstructured":"Wang X, Su Y (2021) Image encryption based on compressed sensing and dna encoding. Signal Processing: Image Communication 95(116):246","journal-title":"Signal Processing: Image Communication"},{"key":"989_CR21","doi-asserted-by":"crossref","unstructured":"Gan Z, Chai X, Bi J, Chen X (2022) Content-adaptive image compression and encryption via optimized compressive sensing with double random phase encoding driven by chaos. Complex & Intelligent Systems pp. 1\u201319","DOI":"10.1007\/s40747-022-00644-6"},{"key":"989_CR22","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1016\/j.optlaseng.2018.09.015","volume":"112","author":"X Li","year":"2019","unstructured":"Li X, Wang Y, Wang QH, Liu Y, Zhou X (2019) Modified integral imaging reconstruction and encryption using an improved sr reconstruction algorithm. Optics and Lasers in Engineering 112:162\u2013169","journal-title":"Optics and Lasers in Engineering"},{"key":"989_CR23","doi-asserted-by":"crossref","unstructured":"Zhang H, Wang X qing, Sun Y jie, Wang X yuan (2020) A novel method for lossless image compression and encryption based on lwt, spiht and cellular automata. Signal Processing: Image Communication 84, 115,829","DOI":"10.1016\/j.image.2020.115829"},{"issue":"102","key":"989_CR24","first-page":"919","volume":"61","author":"S Roy","year":"2021","unstructured":"Roy S, Shrivastava M, Rawat U, Pandey CV, Nayak SK (2021) Iesca: An efficient image encryption scheme using 2-d cellular automata. Journal of Information Security and Applications 61(102):919","journal-title":"Journal of Information Security and Applications"},{"key":"989_CR25","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.ins.2015.06.049","volume":"324","author":"L Bao","year":"2015","unstructured":"Bao L, Zhou Y (2015) Image encryption: Generating visually meaningful encrypted images. Information Sciences 324:197\u2013207","journal-title":"Information Sciences"},{"key":"989_CR26","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.sigpro.2016.11.016","volume":"134","author":"X Chai","year":"2017","unstructured":"Chai X, Gan Z, Chen Y, Zhang Y (2017) A visually secure image encryption scheme based on compressive sensing. Signal Processing 134:35\u201351","journal-title":"Signal Processing"},{"issue":"105","key":"989_CR27","first-page":"837","volume":"124","author":"X Chai","year":"2020","unstructured":"Chai X, Wu H, Gan Z, Zhang Y, Chen Y, Nixon KW (2020) An efficient visually meaningful image compression and encryption scheme based on compressive sensing and dynamic lsb embedding. Optics and Lasers in Engineering 124(105):837","journal-title":"Optics and Lasers in Engineering"},{"key":"989_CR28","first-page":"1","volume":"2019","author":"C Pan","year":"2019","unstructured":"Pan C, Ye G, Huang X, Zhou J (2019) Novel meaningful image encryption based on block compressive sensing. Security and Communication Networks 2019:1\u201312","journal-title":"Security and Communication Networks"},{"issue":"107","key":"989_CR29","first-page":"629","volume":"175","author":"L Zhu","year":"2020","unstructured":"Zhu L, Song H, Zhang X, Yan M, Zhang T, Wang X, Xu J (2020) A robust meaningful image encryption scheme based on block compressive sensing and svd embedding. Signal Processing 175(107):629","journal-title":"Signal Processing"},{"issue":"107","key":"989_CR30","first-page":"580","volume":"173","author":"W Wen","year":"2020","unstructured":"Wen W, Hong Y, Fang Y, Li M, Li M (2020) A visually secure image encryption scheme based on semi-tensor product compressed sensing. Signal Processing 173(107):580","journal-title":"Signal Processing"},{"issue":"107","key":"989_CR31","first-page":"525","volume":"171","author":"X Chai","year":"2020","unstructured":"Chai X, Wu H, Gan Z, Zhang Y, Chen Y (2020) Hiding cipher-images generated by 2-d compressive sensing with a multi-embedding strategy. Signal Processing 171(107):525","journal-title":"Signal Processing"},{"issue":"126","key":"989_CR32","first-page":"976","volume":"492","author":"D Huo","year":"2021","unstructured":"Huo D, Zhu Z, Wei L, Han C, Zhou X (2021) A visually secure image encryption scheme based on 2d compressive sensing and integer wavelet transform embedding. Optics Communications 492(126):976","journal-title":"Optics Communications"},{"key":"989_CR33","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1016\/j.ins.2020.10.007","volume":"556","author":"X Chai","year":"2021","unstructured":"Chai X, Wu H, Gan Z, Han D, Zhang Y, Chen Y (2021) An efficient approach for encrypting double color images into a visually meaningful cipher image using 2d compressive sensing. Information Sciences 556:305\u2013340","journal-title":"Information Sciences"},{"key":"989_CR34","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1016\/j.sigpro.2018.10.001","volume":"155","author":"H Wang","year":"2019","unstructured":"Wang H, Xiao D, Li M, Xiang Y, Li X (2019) A visually secure image encryption scheme based on parallel compressive sensing. Signal Processing 155:218\u2013232","journal-title":"Signal Processing"},{"issue":"107","key":"989_CR35","first-page":"998","volume":"183","author":"Z Hua","year":"2021","unstructured":"Hua Z, Zhang K, Li Y, Zhou Y (2021) Visually secure image encryption using adaptive-thresholding sparsification and parallel compressive sensing. Signal Processing 183(107):998","journal-title":"Signal Processing"},{"issue":"108","key":"989_CR36","first-page":"489","volume":"195","author":"L Zhu","year":"2022","unstructured":"Zhu L, Jiang D, Ni J, Wang X, Rong X, Ahmad M, Chen Y (2022) A stable meaningful image encryption scheme using the newly-designed 2d discrete fractional-order chaotic map and bayesian compressive sensing. Signal Processing 195(108):489","journal-title":"Signal Processing"},{"issue":"2","key":"989_CR37","first-page":"1","volume":"32","author":"G Ye","year":"2021","unstructured":"Ye G, Pan C, Dong Y, Jiao K, Huang X (2021) A novel multi-image visually meaningful encryption algorithm based on compressive sensing and schur decomposition. Trans. Emerg. Telecommun. Technol. 32(2):1\u201314","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"989_CR38","doi-asserted-by":"crossref","unstructured":"Singh O, Singh A (2021) Data hiding in encryption\u2013compression domain. Complex & Intelligent Systems pp. 1\u201314","DOI":"10.1007\/s40747-021-00309-w"},{"key":"989_CR39","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1016\/j.ins.2017.11.009","volume":"429","author":"YG Yang","year":"2018","unstructured":"Yang YG, Zhang YC, Chen XB, Zhou YH, Shi WM (2018) Eliminating the texture features in visually meaningful cipher images. Information Sciences 429:102\u2013119","journal-title":"Information Sciences"},{"key":"989_CR40","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1016\/j.optlaseng.2016.10.009","volume":"90","author":"A Kanso","year":"2017","unstructured":"Kanso A, Ghebleh M (2017) An algorithm for encryption of secret images into meaningful images. Optics and Lasers in Engineering 90:196\u2013208","journal-title":"Optics and Lasers in Engineering"},{"issue":"4","key":"989_CR41","doi-asserted-by":"crossref","first-page":"817","DOI":"10.2478\/amcs-2019-0060","volume":"29","author":"T Tuncer","year":"2019","unstructured":"Tuncer T, Dogan S, Tadeusiewicz R, P\u0142awiak P (2019) Improved reference image encryption methods based on 2 correction in the integer wavelet domain. International Journal of Applied Mathematics and Computer Science 29(4):817\u2013829","journal-title":"International Journal of Applied Mathematics and Computer Science"},{"key":"989_CR42","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1016\/j.ins.2021.08.073","volume":"580","author":"YG Yang","year":"2021","unstructured":"Yang YG, Wang BP, Pei SK, Zhou YH, Shi WM, Liao X (2021) Using m-ary decomposition and virtual bits for visually meaningful image encryption. Information Sciences 580:174\u2013201","journal-title":"Information Sciences"},{"issue":"108","key":"989_CR43","first-page":"220","volume":"188","author":"D Jiang","year":"2021","unstructured":"Jiang D, Liu L, Zhu L, Wang X, Rong X, Chai H (2021) Adaptive embedding: A novel meaningful image encryption scheme based on parallel compressive sensing and slant transform. Signal Processing 188(108):220","journal-title":"Signal Processing"},{"issue":"103","key":"989_CR44","first-page":"263","volume":"120","author":"P Ping","year":"2022","unstructured":"Ping P, Yang X, Zhang X, Mao Y, Khalid H (2022) Generating visually secure encrypted images by partial block pairing-substitution and semi-tensor product compressed sensing. Digital Signal Processing 120(103):263","journal-title":"Digital Signal Processing"},{"key":"989_CR45","unstructured":"Ghaffari A, Babaie-Zadeh M, Jutten C (2009) in 2009 IEEE International Conference on Acoustics, Speech and Signal Processing , pp. 3157\u20133160"},{"issue":"4","key":"989_CR46","first-page":"889","volume":"55","author":"Y Fang","year":"2012","unstructured":"Fang Y, Wu J, Huang B (2012) 2d sparse signal recovery via 2d orthogonal matching pursuit. Science in China Series F: Information Sciences 55(4):889\u2013897","journal-title":"Science in China Series F: Information Sciences"},{"key":"989_CR47","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/j.sigpro.2014.03.039","volume":"104","author":"G Chen","year":"2014","unstructured":"Chen G, Li D, Zhang J (2014) Iterative gradient projection algorithm for two-dimensional compressive sensing sparse image reconstruction. Signal Processing 104:15\u201326","journal-title":"Signal Processing"},{"key":"989_CR48","doi-asserted-by":"crossref","first-page":"2656","DOI":"10.1109\/TMM.2020.3014489","volume":"23","author":"B Zhang","year":"2020","unstructured":"Zhang B, Xiao D, Xiang Y (2020) Robust coding of encrypted images via 2d compressed sensing. IEEE Transactions on Multimedia 23:2656\u20132671","journal-title":"IEEE Transactions on Multimedia"},{"issue":"2","key":"989_CR49","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1016\/j.ipl.2015.09.016","volume":"116","author":"S Sun","year":"2016","unstructured":"Sun S (2016) A novel edge based image steganography with 2k correction and huffman encoding. Information Processing Letters 116(2):93-99","journal-title":"Information Processing Letters"},{"key":"989_CR50","doi-asserted-by":"crossref","unstructured":"Zhou W, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4)","DOI":"10.1109\/TIP.2003.819861"},{"key":"989_CR51","doi-asserted-by":"crossref","unstructured":"Setiadi DRIM (2020) Psnr vs ssim: imperceptibility quality assessment for image steganography. Multimedia Tools and Applications pp. 1\u201322","DOI":"10.1007\/s11042-020-10035-z"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-023-00989-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-023-00989-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-023-00989-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T17:12:25Z","timestamp":1695402745000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-023-00989-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,13]]},"references-count":51,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["989"],"URL":"https:\/\/doi.org\/10.1007\/s40747-023-00989-6","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2,13]]},"assertion":[{"value":"22 May 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 January 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 February 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}