{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T07:32:15Z","timestamp":1707809535704},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J BANK FINANC TECHNOL"],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1007\/s42786-020-00016-z","type":"journal-article","created":{"date-parts":[[2020,4,27]],"date-time":"2020-04-27T16:41:58Z","timestamp":1588005718000},"page":"37-52","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Comprehensive survey on cancelable biometrics with novel case study on finger dorsal template protection"],"prefix":"10.1007","volume":"4","author":[{"given":"Avantika","family":"Singh","sequence":"first","affiliation":[]},{"given":"Ashish","family":"Arora","sequence":"additional","affiliation":[]},{"given":"Gaurav","family":"Jaswal","sequence":"additional","affiliation":[]},{"given":"Aditya","family":"Nigam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,27]]},"reference":[{"key":"16_CR1","unstructured":"(2006\u20132013) Polyu contact-less finger knuckle image database. http:\/\/www4.comp.polyu.edu.hk\/~csajaykr\/fn1.htm"},{"key":"16_CR2","unstructured":"(2009) Finger-knuckle-print polyu. http:\/\/www.comp.polyu.edu.hk\/biometrics"},{"key":"16_CR3","unstructured":"(2011) ISO\/IEC JTC1 SC27 security techniques, ISO\/IEC 24745:2011. information technology\u2014security techniques\u2014biometric information protection, ISO"},{"key":"16_CR4","unstructured":"Abadi M (2015) TensorFlow: large-scale machine learning on heterogeneous systems. https:\/\/www.tensorflow.org\/"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Arjona R, Prada-Delgado M\u00c1, Baturone I, Ross A (2018) Securing minutia cylinder codes for fingerprints through physically unclonable functions: an exploratory study. International Conference on Biometrics, ICB 2018. Gold Coast, Australia, pp 54\u201360","DOI":"10.1109\/ICB2018.2018.00019"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Chikkerur S, Pankanti S, Jea A, Ratha NK, Bolle RM (2006) Fingerprint representation using localized texture features. 18th International conference on pattern recognition (ICPR 2006), 20\u201324 August 2006, Hong Kong, pp 521\u2013524","DOI":"10.1109\/ICPR.2006.576"},{"issue":"2","key":"16_CR7","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.cviu.2006.01.002","volume":"102","author":"CS Chin","year":"2006","unstructured":"Chin CS, Jin ATB, Ling DNC (2006) High security iris verification system based on random secret integration. Comput Vis Image Underst 102(2):169\u2013177","journal-title":"Comput Vis Image Underst"},{"key":"16_CR8","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1016\/j.cose.2016.10.004","volume":"65","author":"R Dwivedi","year":"2017","unstructured":"Dwivedi R, Dey S, Singh R, Prasad A (2017) A privacy-preserving cancelable iris template generation scheme using decimal encoding and look-up table mapping. Comput Secur 65:373\u2013386","journal-title":"Comput Secur"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Fan B, Andersen DG, Kaminsky M, Mitzenmacher M (2014) Cuckoo filter: practically better than bloom. In: Proceedings of the 10th ACM international on conference on emerging networking experiments and technologies, CoNEXT 2014, Sydney, December 2\u20135, 2014, pp 75\u201388","DOI":"10.1145\/2674005.2674994"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Farooq F, Bolle RM, Jea T, Ratha NK, (2007) Anonymous and revocable fingerprint recognition. In: 2007 IEEE Computer Society conference on computer vision and pattern recognition (CVPR 2007), 18\u201323 June 2007. Minneapolis","DOI":"10.1109\/CVPR.2007.383382"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Ganapathi II, Prakash S, Dave IR, Bakshi S (2020) Unconstrained ear detection using ensemble-based convolutional neural network model. Concurr Comput Pract Exp 32(1)","DOI":"10.1002\/cpe.5197"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Gilbert AC, Zhang Y, Lee K, Zhang Y, Lee H (2017) Towards understanding the invertibility of convolutional neural networks. In: Proceedings of the twenty-sixth international joint conference on artificial intelligence, IJCAI, pp 1703\u20131710","DOI":"10.24963\/ijcai.2017\/236"},{"issue":"6","key":"16_CR13","doi-asserted-by":"publisher","first-page":"1406","DOI":"10.1109\/TIFS.2017.2788000","volume":"13","author":"M Gomez-Barrero","year":"2018","unstructured":"Gomez-Barrero M, Galbally J, Rathgeb C, Busch C (2018) General framework to evaluate unlinkability in biometric template protection systems. IEEE Trans Inf Forensics Secur 13(6):1406\u20131420","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"16_CR14","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.inffus.2017.10.003","volume":"42","author":"M Gomez-Barrero","year":"2018","unstructured":"Gomez-Barrero M, Rathgeb C, Li G, Raghavendra R, Galbally J, Busch C (2018) Multi-biometric template protection based on bloom filters. Inf Fusion 42:37\u201350","journal-title":"Inf Fusion"},{"issue":"6\u20137","key":"16_CR15","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1007\/s11263-019-01160-w","volume":"127","author":"G Goswami","year":"2019","unstructured":"Goswami G, Agarwal A, Ratha NK, Singh R, Vatsa M (2019) Detecting and mitigating adversarial perturbations for robust face recognition. Int J Comput Vis 127(6\u20137):719\u2013742","journal-title":"Int J Comput Vis"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"H\u00e4mmerle-Uhl J, Pschernig E, Uhl A (2009) Cancelable iris biometrics using block re-mapping and image warping. In: Information security, 12th international conference, ISC 2009, Pisa, September 7\u20139, 2009. Proceedings, pp 135\u2013142","DOI":"10.1007\/978-3-642-04474-8_11"},{"key":"16_CR17","unstructured":"Hermans J, Mennink B, Peeters R (2014) When a bloom filter is a doom filter: Security assessment of a novel iris biometric template protection system. In: BIOSIG 2014\u2014proceedings of the 13th international conference of the biometrics special interest group, 10\u201312 September 2014, Darmstadt, pp 63\u201374"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Hu Y, Sirlantzis K, Howells G (2015) Exploiting stable and discriminative iris weight map for iris recognition under less constrained environment. In: IEEE 7th international conference on biometrics theory, applications and systems, BTAS 2015, Arlington, September 8\u201311, 2015, pp 1\u20138","DOI":"10.1109\/BTAS.2015.7358759"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Jain S, Nigam A, Gupta P (2013) Age-invariant face recognition using shape transformation. In: Intelligent computing theories\u20149th international conference, ICIC 2013, Nanning, July 28\u201331, 2013. Proceedings, pp 453\u2013461","DOI":"10.1007\/978-3-642-39479-9_54"},{"issue":"18","key":"16_CR20","doi-asserted-by":"publisher","first-page":"18955","DOI":"10.1007\/s11042-017-4475-6","volume":"76","author":"G Jaswal","year":"2017","unstructured":"Jaswal G, Nigam A, Nath R (2017) Deepknuckle: revealing the human identity. Multimed Tools Appl 76(18):18955\u201318984","journal-title":"Multimed Tools Appl"},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"Jha RR, Thapar D, Patil SM, Nigam A (2017) Ubsegnet: unified biometric region of interest segmentation network. CoRR abs\/1709.08924","DOI":"10.1109\/ACPR.2017.148"},{"issue":"11","key":"16_CR22","doi-asserted-by":"publisher","first-page":"2245","DOI":"10.1016\/j.patcog.2004.04.011","volume":"37","author":"ATB Jin","year":"2004","unstructured":"Jin ATB, Ling DNC, Goh A (2004) Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognit 37(11):2245\u20132255","journal-title":"Pattern Recognit"},{"key":"16_CR23","unstructured":"Jin ATB, Toh K, Yip WK (2007) 2$${}^{{\\text{N}}}$$ discretisation of biophasor in cancellable biometrics. In: Advances in biometrics, international conference, ICB, pp 435\u2013444"},{"issue":"2","key":"16_CR24","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1109\/TIFS.2017.2753172","volume":"13","author":"Z Jin","year":"2018","unstructured":"Jin Z, Hwang J, Lai Y, Kim S, Teoh ABJ (2018) Ranking-based locality sensitive hashing-enabled cancelable biometrics: index-of-max hashing. IEEE Trans Inf Forensics Secur 13(2):393\u2013407","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"16_CR25","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/BF02764938","volume":"54","author":"WB Johnson","year":"1986","unstructured":"Johnson WB, Lindenstrauss J, Schechtman G (1986) Extensions of Lipschitz maps into Banach spaces. Isr J Math 54(2):129\u2013138","journal-title":"Isr J Math"},{"key":"16_CR26","doi-asserted-by":"crossref","unstructured":"Juefei-Xu F, Boddeti VN, Savvides M (2017) Local binary convolutional neural networks. In: IEEE conference on computer vision and pattern recognition, CVPR, pp 4284\u20134293","DOI":"10.1109\/CVPR.2017.456"},{"issue":"3","key":"16_CR27","doi-asserted-by":"publisher","first-page":"709","DOI":"10.1109\/TIFS.2018.2855669","volume":"14","author":"H Kaur","year":"2019","unstructured":"Kaur H, Khanna P (2019) Random distance method for generating unimodal and multimodal cancelable biometric features. IEEE Trans Inf Forensics Secur 14(3):709\u2013719","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"8","key":"16_CR28","doi-asserted-by":"publisher","first-page":"1288","DOI":"10.1109\/TIFS.2014.2328869","volume":"9","author":"A Kumar","year":"2014","unstructured":"Kumar A (2014) Importance of being unique from finger dorsal patterns: exploring minor finger knuckle patterns in verifying human identities. IEEE Trans Inf Forensics Secur 9(8):1288\u20131298","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"16_CR29","unstructured":"Lacharme P, Cherrier E, Rosenberger C (2013) Preimage attack on biohashing. In: SECRYPT 2013\u2014proceedings of the 10th international conference on security and cryptography, Reykjav\u00edk, 29\u201331 July, 2013, pp 363\u2013370"},{"key":"16_CR30","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.patcog.2016.10.035","volume":"64","author":"Y Lai","year":"2017","unstructured":"Lai Y, Jin Z, Teoh ABJ, Goi B, Yap W, Chai T, Rathgeb C (2017) Cancellable iris template generation based on indexing-first-one hashing. Pattern Recognit 64:105\u2013117","journal-title":"Pattern Recognit"},{"issue":"1","key":"16_CR31","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/TKDE.2006.14","volume":"18","author":"K Liu","year":"2006","unstructured":"Liu K, Kargupta H, Ryan J (2006) Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Trans Knowl Data Eng 18(1):92\u2013106","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"3","key":"16_CR32","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1109\/TSMCA.2010.2041653","volume":"40","author":"E Maiorana","year":"2010","unstructured":"Maiorana E, Campisi P, Fi\u00e9rrez J, Ortega-Garcia J, Neri A (2010) Cancelable templates for sequence-based biometrics with application to on-line signature recognition. IEEE Trans Syst Man Cybern Part A 40(3):525\u2013538","journal-title":"IEEE Trans Syst Man Cybern Part A"},{"key":"16_CR33","doi-asserted-by":"publisher","first-page":"1120","DOI":"10.1016\/j.neucom.2014.03.083","volume":"151","author":"A Nigam","year":"2015","unstructured":"Nigam A, Gupta P (2015) Designing an accurate hand biometric based authentication system fusing finger knuckleprint and palmprint. Neurocomputing 151:1120\u20131132","journal-title":"Neurocomputing"},{"key":"16_CR34","doi-asserted-by":"crossref","unstructured":"Nigam A, Khan P, Gupta P (2015) Fusion of palmprint and finger-knuckle-print for human personal recognition. In: IEEE symposium series on computational intelligence, SSCI 2015, Cape Town, December 7\u201310, 2015, pp 341\u2013348","DOI":"10.1109\/SSCI.2015.58"},{"key":"16_CR35","doi-asserted-by":"crossref","unstructured":"Nigam A, Kumar B, Triyar J, Gupta P (2015) Iris recognition using discrete cosine transform and relational measures. In: Computer analysis of images and patterns\u201416th international conference, CAIP 2015, Valletta, September 2\u20134, 2015, Proceedings, Part II, pp 506\u2013517","DOI":"10.1007\/978-3-319-23117-4_44"},{"key":"16_CR36","doi-asserted-by":"crossref","unstructured":"Ouda O, Tsumura N, Nakaguchi T (2010) Tokenless cancelable biometrics scheme for protecting iris codes. In: International conference on pattern recognition, ICPR 2010, Istanbul, pp 882\u2013885","DOI":"10.1109\/ICPR.2010.222"},{"key":"16_CR37","doi-asserted-by":"crossref","unstructured":"Pillai JK, Patel VM, Chellappa R, Ratha NK (2010) Sectored random projections for cancelable iris biometrics. In: Proceedings of the IEEE international conference on acoustics, speech, and signal processing, ICASSP 2010, 14\u201319 March 2010, Sheraton Dallas Hotel, Dallas, pp 1838\u20131841","DOI":"10.1109\/ICASSP.2010.5495383"},{"key":"16_CR38","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.neucom.2014.03.007","volume":"140","author":"S Prakash","year":"2014","unstructured":"Prakash S, Gupta P (2014) Human recognition using 3d ear images. Neurocomputing 140:317\u2013325","journal-title":"Neurocomputing"},{"key":"16_CR39","doi-asserted-by":"crossref","unstructured":"Raja K, Raghavendra R, Busch C (2019) Towards reducing the error rates in template protection for iris recognition using custom cuckoo filters. In: Proceedings of the international conference on identity, security and behavior analysis (ISBA), Hyderabad, January 22\u201324, pp 1\u20138","DOI":"10.1109\/ISBA.2019.8778470"},{"key":"16_CR40","unstructured":"Raja KB, Raghavendra R, Venkatesh S, Busch C (2020) Morton filters for superior template protection for iris recognition. CoRR abs\/2001.05290"},{"issue":"4","key":"16_CR41","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1109\/TPAMI.2007.1004","volume":"29","author":"NK Ratha","year":"2007","unstructured":"Ratha NK, Chikkerur S, Connell JH, Bolle RM (2007) Generating cancelable fingerprint templates. IEEE Trans Pattern Anal Mach Intell 29(4):561\u2013572","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"16_CR42","doi-asserted-by":"crossref","unstructured":"Rathgeb C, Breitinger F, Busch C (2013) Alignment-free cancelable iris biometric templates based on adaptive bloom filters. In: International conference on biometrics. ICB, Madrid, pp 1\u20138","DOI":"10.1109\/ICB.2013.6612976"},{"key":"16_CR43","doi-asserted-by":"crossref","unstructured":"Rathgeb C, Baier H, Busch C, Breitinger F (2015) Towards bloom filter-based indexing of iris biometric data. In: International conference on biometrics, ICB 2015, Phuket, 19\u201322 May, 2015, pp 422\u2013429","DOI":"10.1109\/ICB.2015.7139105"},{"key":"16_CR44","doi-asserted-by":"crossref","unstructured":"Rathgeb C, Gomez-Barrero M, Busch C, Galbally J, Fi\u00e9rrez J (2015) Towards cancelable multi-biometrics based on bloom filters: a case study on feature level fusion of face and iris. In: 3rd International workshop on biometrics and forensics, IWBF 2015, Gjovik, March 3\u20134, 2015, pp 1\u20136","DOI":"10.1109\/IWBF.2015.7110225"},{"key":"16_CR45","doi-asserted-by":"crossref","unstructured":"Rathgeb C, Gomez-Barrero M, Busch C, Galbally J, Fierrez J (2015) Towards cancelable multi-biometrics based on bloom filters: a case study on feature level fusion of face and iris. In: International workshop on biometrics and forensics (IWBF), pp 1\u20136","DOI":"10.1109\/IWBF.2015.7110225"},{"key":"16_CR46","doi-asserted-by":"crossref","unstructured":"Rosenberger C (2018) Evaluation of biometric template protection schemes based on a transformation. In: Proceedings of the 4th international conference on information systems security and privacy, ICISSP, pp 216\u2013224","DOI":"10.5220\/0006550502160224"},{"issue":"11","key":"16_CR47","doi-asserted-by":"publisher","first-page":"2972","DOI":"10.1109\/TIFS.2019.2907014","volume":"14","author":"D Sadhya","year":"2019","unstructured":"Sadhya D, Raman B (2019) Generation of cancelable iris templates via randomized bit sampling. IEEE Trans Inf Forensics Secur 14(11):2972\u20132986","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"16_CR48","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1049\/iet-bmt.2016.0008","volume":"6","author":"M Sandhya","year":"2017","unstructured":"Sandhya M, Prasad MVNK (2017) Securing fingerprint templates using fused structures. IET Biom 6(3):173\u2013182","journal-title":"IET Biom"},{"issue":"12","key":"16_CR49","doi-asserted-by":"publisher","first-page":"2211","DOI":"10.1109\/TPAMI.2008.240","volume":"31","author":"Z Sun","year":"2009","unstructured":"Sun Z, Tan T (2009) Ordinal measures for iris recognition. IEEE Trans Pattern Anal Mach Intell 31(12):2211\u20132226. https:\/\/doi.org\/10.1109\/TPAMI.2008.240","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"16_CR50","unstructured":"Teoh ABJ, Ngo DCL (2006) Biophasor: Token supplemented cancellable biometrics. In: Ninth international conference on control, automation, robotics and vision, ICARCV 2006, Singapore, 5\u20138 December 2006, Proceedings, pp 1\u20135"},{"key":"16_CR51","doi-asserted-by":"crossref","unstructured":"Thapar D, Nigam A, Aggarwal D, Agarwal P (2018) Vgr-net: a view invariant gait recognition network. In: IEEE 4th International conference on identity, security, and behavior analysis, ISBA 2018, Singapore, January 11\u201312, 2018, pp 1\u20138","DOI":"10.1109\/ISBA.2018.8311475"},{"key":"16_CR52","doi-asserted-by":"crossref","unstructured":"Thapar D, Jaswal G, Nigam A (2019) Fkimnet: A finger dorsal image matching network comparing component (major, minor and nail) matching with holistic (finger dorsal) matching. In: International joint conference on neural networks, IJCNN 2019 Budapest, July 14\u201319, 2019, pp 1\u20138","DOI":"10.1109\/IJCNN.2019.8852390"},{"key":"16_CR53","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1016\/j.patrec.2019.07.008","volume":"125","author":"D Thapar","year":"2019","unstructured":"Thapar D, Jaswal G, Nigam A, Arora C (2019) Gait metric learning Siamese network exploiting dual of spatio-temporal 3d-cnn intra and LSTM based inter gait-cycle-segment features. Pattern Recognit Lett 125:646\u2013653","journal-title":"Pattern Recognit Lett"},{"key":"16_CR54","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.ins.2017.04.026","volume":"406","author":"S Umer","year":"2017","unstructured":"Umer S, Dhara BC, Chanda B (2017) A novel cancelable iris recognition system based on feature learning techniques. Inf Sci 406:102\u2013118","journal-title":"Inf Sci"},{"issue":"12","key":"16_CR55","doi-asserted-by":"publisher","first-page":"2676","DOI":"10.1016\/j.sigpro.2009.05.009","volume":"89","author":"M Vatsa","year":"2009","unstructured":"Vatsa M, Singh R, Noore A, Singh SK (2009) Combining pores and ridges with minutiae for improved fingerprint verification. Signal Process 89(12):2676\u20132685","journal-title":"Signal Process"},{"issue":"3","key":"16_CR56","doi-asserted-by":"publisher","first-page":"1321","DOI":"10.1016\/j.patcog.2013.10.003","volume":"47","author":"S Wang","year":"2014","unstructured":"Wang S, Hu J (2014) Design of alignment-free cancelable fingerprint templates via curtailed circular convolution. Pattern Recognit 47(3):1321\u20131329","journal-title":"Pattern Recognit"},{"key":"16_CR57","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1016\/j.patcog.2018.01.026","volume":"78","author":"W Yang","year":"2018","unstructured":"Yang W, Wang S, Hu J, Zheng G, Valli C (2018) A fingerprint and finger-vein based cancelable multi-biometric system. Pattern Recognit 78:242\u2013251","journal-title":"Pattern Recognit"},{"issue":"7","key":"16_CR58","doi-asserted-by":"publisher","first-page":"2560","DOI":"10.1016\/j.patcog.2010.01.020","volume":"43","author":"L Zhang","year":"2010","unstructured":"Zhang L, Zhang L, Zhang D, Zhu H (2010) Online finger-knuckle-print verification for personal authentication. Pattern Recognit 43(7):2560\u20132571","journal-title":"Pattern Recognit"},{"key":"16_CR59","doi-asserted-by":"crossref","unstructured":"Zhang N, Yang X, Zang Y, Jia X, Tian J (2013) Generating registration-free cancelable fingerprint templates based on minutia cylinder-code representation. In: IEEE sixth international conference on biometrics: theory. Applications and systems, BTAS, VA, pp 1\u20136","DOI":"10.1109\/BTAS.2013.6712731"},{"key":"16_CR60","unstructured":"Zuo J, Ratha NK, Connell JH (2008) Cancelable iris biometric. In: 19th International conference on pattern recognition (ICPR 2008), December 8\u201311, 2008, Tampa, pp 1\u20134"}],"container-title":["Journal of Banking and Financial Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42786-020-00016-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42786-020-00016-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42786-020-00016-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T23:53:16Z","timestamp":1619481196000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42786-020-00016-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4]]},"references-count":60,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,4]]}},"alternative-id":["16"],"URL":"https:\/\/doi.org\/10.1007\/s42786-020-00016-z","relation":{},"ISSN":["2524-7956","2524-7964"],"issn-type":[{"value":"2524-7956","type":"print"},{"value":"2524-7964","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4]]},"assertion":[{"value":"4 July 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 April 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 April 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}