{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T01:18:01Z","timestamp":1760577481761,"version":"3.37.3"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,1,7]],"date-time":"2022-01-07T00:00:00Z","timestamp":1641513600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,7]],"date-time":"2022-01-07T00:00:00Z","timestamp":1641513600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1007\/s42979-021-01012-w","type":"journal-article","created":{"date-parts":[[2022,1,7]],"date-time":"2022-01-07T03:02:35Z","timestamp":1641524555000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Securing Medical Data by Combining Encryption and Robust Blind Medical Image Watermarking Based on Zaslavsky Chaotic Map and DCT Coefficients"],"prefix":"10.1007","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0057-8702","authenticated-orcid":false,"given":"Nawal","family":"Balaska","sequence":"first","affiliation":[]},{"given":"Aissa","family":"Belmeguenai","sequence":"additional","affiliation":[]},{"given":"Ahc\u00e8ne","family":"Goutas","sequence":"additional","affiliation":[]},{"given":"Zahir","family":"Ahmida","sequence":"additional","affiliation":[]},{"given":"Selma","family":"Boumerdassi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,7]]},"reference":[{"key":"1012_CR1","doi-asserted-by":"publisher","unstructured":"Coatrieux G, Maitre H, Sankur B, Rolland Y, Collorec R. Relevance of watermarking in medical imaging. In: Proceedings 2000 IEEE EMBS international conference on information technology applications in biomedicine. ITAB-ITIS 2000, joint meeting third IEEE EMBS international conference on information technol, Arlington, VA, USA, pp 250\u2013255; 2000. https:\/\/doi.org\/10.1109\/ITAB.2000.892396.","DOI":"10.1109\/ITAB.2000.892396"},{"key":"1012_CR2","doi-asserted-by":"publisher","first-page":"8603","DOI":"10.1007\/s11042-018-7128-5","volume":"78","author":"N Agarwal","year":"2019","unstructured":"Agarwal N, Singh AK, Singh PK. Survey of robust and imperceptible watermarking. Multimed Tools Appl. 2019;78:8603\u201333. https:\/\/doi.org\/10.1007\/s11042-018-7128-5.","journal-title":"Multimed Tools Appl"},{"key":"1012_CR3","doi-asserted-by":"publisher","unstructured":"Allaf AH, Kbir MA. A review of digital watermarking applications for medical image exchange security. In: SCA 2018, LNITI, pp 472\u2013480; 2019. https:\/\/doi.org\/10.1007\/978-3-030-11196-0_40.","DOI":"10.1007\/978-3-030-11196-0_40"},{"key":"1012_CR4","doi-asserted-by":"publisher","unstructured":"Singh G. A review of secure medical image watermarking. In: 2017 IEEE international conference on power, control, signals and instrumentation engineering (ICPCSI), Chennai, pp 3105\u20133109; 2017. https:\/\/doi.org\/10.1109\/ICPCSI.2017.8392297.","DOI":"10.1109\/ICPCSI.2017.8392297"},{"key":"1012_CR5","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/s10278-012-9527-x","volume":"26","author":"H Nyeem","year":"2013","unstructured":"Nyeem H, Boles W, Boyd C. A review of medical image watermarking requirements for teleradiology. J Digit Imaging. 2013;26:326\u201343. https:\/\/doi.org\/10.1007\/s10278-012-9527-x.","journal-title":"J Digit Imaging"},{"key":"1012_CR6","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.ijleo.2020.165272","volume":"31","author":"J Abraham","year":"2019","unstructured":"Abraham J, Paul V. An imperceptible spatial domain color image watermarking scheme. J King Saud Univ Comput Inf Sci. 2019;31:125\u201333. https:\/\/doi.org\/10.1016\/j.ijleo.2020.165272.","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"1012_CR7","doi-asserted-by":"publisher","first-page":"1505","DOI":"10.1016\/j.procs.2020.03.361","volume":"167","author":"Sunesh","year":"2020","unstructured":"Sunesh, Rama Kishore R. A novel and efficient blind image watermarking in transform domain. Proc Comput Sci. 2020;167:1505\u201314. https:\/\/doi.org\/10.1016\/j.procs.2020.03.361.","journal-title":"Proc Comput Sci"},{"issue":"164152","key":"1012_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ijleo.2019.164152","volume":"204","author":"Z Yuan","year":"2020","unstructured":"Yuan Z, Liu D, Zhang X, Su Q. New image blind watermarking method based on two-dimensional discrete cosine transform. Optik. 2020;204(164152):1\u201312. https:\/\/doi.org\/10.1016\/j.ijleo.2019.164152.","journal-title":"Optik"},{"key":"1012_CR9","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.jisa.2019.04.001","volume":"47","author":"M Moosazadeh","year":"2019","unstructured":"Moosazadeh M, Ekbatanifard G. A new DCT-based robust image watermarking method using teaching-learning-based optimization. J Inf Secur Appl. 2019;47:28\u201338. https:\/\/doi.org\/10.1016\/j.jisa.2019.04.001.","journal-title":"J Inf Secur Appl"},{"issue":"164562","key":"1012_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ijleo.2020.164562","volume":"208","author":"K Fares","year":"2020","unstructured":"Fares K, Amine K, Salah E. A robust blind color image watermarking based on Fourier transform domain. Optik. 2020;208(164562):1\u20139. https:\/\/doi.org\/10.1016\/j.ijleo.2020.164562.","journal-title":"Optik"},{"key":"1012_CR11","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.comcom.2020.01.038","volume":"152","author":"A Anand","year":"2020","unstructured":"Anand A, Singh AK. An improved DWT-SVD domain watermarking for medical information security. Comput Commun. 2020;152:72\u201380. https:\/\/doi.org\/10.1016\/j.comcom.2020.01.038.","journal-title":"Comput Commun"},{"key":"1012_CR12","doi-asserted-by":"publisher","unstructured":"Soualmi A, Alti A, Laouamer L. A blind image watermarking method for personal medical data security. In: 2019 International conference on networking and advanced systems (ICNAS). https:\/\/doi.org\/10.1109\/ICNAS.2019.8807442.","DOI":"10.1109\/ICNAS.2019.8807442"},{"key":"1012_CR13","doi-asserted-by":"publisher","unstructured":"Thakur S, Singh AK, Kumar B, Ghrera SP. Improved DWT-SVD-based medical image watermarking through hamming code and chaotic encryption. In: Advances in VLSI, communication, and signal processing, lecture notes in electrical engineering, vol 587, pp 897\u2013905; 2020. https:\/\/doi.org\/10.1007\/978-981-32-9775-3_80.","DOI":"10.1007\/978-981-32-9775-3_80"},{"key":"1012_CR14","doi-asserted-by":"publisher","first-page":"10599","DOI":"10.1007\/s11042-015-3127-y","volume":"76","author":"SA Parah","year":"2017","unstructured":"Parah SA, Sheikh JA, Ahad F, Loan NA, Bhat GM. Information hiding in medical images: a robust medical image watermarking system for E-healthcare. Multimed Tools Appl. 2017;76:10599\u2013633. https:\/\/doi.org\/10.1007\/s11042-015-3127-y.","journal-title":"Multimed Tools Appl"},{"key":"1012_CR15","doi-asserted-by":"publisher","unstructured":"Liu Y, Li J, Liu J, Bhatti UA, Chen Y, Hu S. Watermarking algorithm for encrypted medical image based on DCT-DFRFT. In: Innovation in medicine and healthcare systems, and multimedia, smart innovation, systems and technologies, vol 145, pp 105\u2013114; 2019. https:\/\/doi.org\/10.1007\/978-981-13-8566-7_10.","DOI":"10.1007\/978-981-13-8566-7_10"},{"key":"1012_CR16","doi-asserted-by":"publisher","unstructured":"Singh S, Singh R, Singh AK, Siddiqui TJ. SVD-DCT based medical image watermarking in NSCT domain. In: Quantum computing: an environment for intelligent large scale real application, studies in big data, vol 33, 467\u2013486; 2018. https:\/\/doi.org\/10.1007\/978-3-319-63639-9_20.","DOI":"10.1007\/978-3-319-63639-9_20"},{"key":"1012_CR17","doi-asserted-by":"publisher","unstructured":"Liu Y, Li J, Liu J, Cheng J, Liu J, Wang L, Bai X. Robust encrypted watermarking for medical images based on DWT-DCT and tent mapping in encrypted domain. In: ICAIS 2019, LNCS 11633, pp 584\u2013596; 2019. https:\/\/doi.org\/10.1007\/978-3-030-24265-7_50.","DOI":"10.1007\/978-3-030-24265-7_50"},{"key":"1012_CR18","doi-asserted-by":"publisher","unstructured":"Dai Q, Li J, Bhatti UA, Chen Y-W, Liu J. SWT-DCT-based robust watermarking for medical image. In: Innovation in medicine and healthcare systems, and multimedia, smart innovation, systems and technologies, vol 145, pp 93\u2013103; 2019. https:\/\/doi.org\/10.1007\/978-981-13-8566-7_9.","DOI":"10.1007\/978-981-13-8566-7_9"},{"key":"1012_CR19","doi-asserted-by":"publisher","first-page":"2379","DOI":"10.1007\/s10916-011-9705-2","volume":"36","author":"S Dogan","year":"2012","unstructured":"Dogan S, Tuncer T, Avci E, et al. A new watermarking system based on discrete cosine transform (DCT) in color biometric images. J Med Syst. 2012;36:2379\u201385. https:\/\/doi.org\/10.1007\/s10916-011-9705-2.","journal-title":"J Med Syst"},{"key":"1012_CR20","doi-asserted-by":"publisher","first-page":"1366","DOI":"10.1016\/j.jestch.2017.06.001","volume":"20","author":"R Thanki","year":"2017","unstructured":"Thanki R, Borra S, Dwivedi V, Borisagar K. An efficient medical image watermarking scheme based on FDCuT\u2013DCT. Eng Sci Technol Int J. 2017;20:1366\u201379. https:\/\/doi.org\/10.1016\/j.jestch.2017.06.001.","journal-title":"Eng Sci Technol Int J"},{"key":"1012_CR21","doi-asserted-by":"publisher","first-page":"1933","DOI":"10.1007\/s11071-018-4299-6","volume":"93","author":"SA Parah","year":"2018","unstructured":"Parah SA, Loan NA, Shah AA, et al. A new secure and robust watermarking technique based on logistic map and modification of DC coefficient. Nonlinear Dyn. 2018;93:1933\u201351. https:\/\/doi.org\/10.1007\/s11071-018-4299-6.","journal-title":"Nonlinear Dyn"},{"key":"1012_CR22","doi-asserted-by":"publisher","first-page":"1329","DOI":"10.1007\/s11071-015-1946-z","volume":"80","author":"N Liu","year":"2015","unstructured":"Liu N, Li H, Dai H, et al. Robust blind image watermarking based on chaotic mixtures. Nonlinear Dyn. 2015;80:1329\u201355. https:\/\/doi.org\/10.1007\/s11071-015-1946-z.","journal-title":"Nonlinear Dyn"},{"key":"1012_CR23","doi-asserted-by":"publisher","unstructured":"Singh RK, Singh AK. A recent survey of DCT based digital image watermarking theories and techniques: a review. In: ICAICR 2019, CCIS 1075, pp 431\u2013440; 2019. https:\/\/doi.org\/10.1007\/978-981-15-0108-1_40.","DOI":"10.1007\/978-981-15-0108-1_40"},{"issue":"3","key":"1012_CR24","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/0375-9601(78)90195-0","volume":"69","author":"GM Zaslavsky","year":"1978","unstructured":"Zaslavsky GM. The simplest case of a strange attractor. Phys Lett A. 1978;69(3):145\u20137.","journal-title":"Phys Lett A"},{"issue":"6","key":"1012_CR25","doi-asserted-by":"publisher","first-page":"1120","DOI":"10.1049\/iet-ipr.2019.0671","volume":"14","author":"N Balaska","year":"2020","unstructured":"Balaska N, Ahmida Z, Belmeguenai A, Boumerdassi S. Image encryption using a combination of Grain-128a algorithm and Zaslavsky chaotic map. IET Image Process. 2020;14(6):1120\u201331. https:\/\/doi.org\/10.1049\/iet-ipr.2019.0671.","journal-title":"IET Image Process"},{"key":"1012_CR26","doi-asserted-by":"publisher","first-page":"20464","DOI":"10.1109\/ACCESS.2018.2819424","volume":"6","author":"F Ernawan","year":"2018","unstructured":"Ernawan F, Kabir MN. A robust image watermarking technique with an optimal DCT-psychovisual threshold. IEEE Access. 2018;6:20464\u201380. https:\/\/doi.org\/10.1109\/ACCESS.2018.2819424.","journal-title":"IEEE Access"},{"key":"1012_CR27","doi-asserted-by":"publisher","first-page":"100706","DOI":"10.1109\/ACCESS.2019.2931039","volume":"7","author":"S Byun","year":"2019","unstructured":"Byun S, Son H, Lee S. Fast and robust watermarking method based on DCT specific location. IEEE Access. 2019;7:100706\u201318. https:\/\/doi.org\/10.1109\/ACCESS.2019.2931039.","journal-title":"IEEE Access"},{"key":"1012_CR28","doi-asserted-by":"publisher","unstructured":"Tomar R, Patni JC, Dumka A, Anand A. Blind watermarking technique for grey scale image using block level discrete cosine transform (DCT). In: Advances in intelligent systems and computing, vol 338. Springer, Cham; 2015. https:\/\/doi.org\/10.1007\/978-3-319-13731-5_10.","DOI":"10.1007\/978-3-319-13731-5_10"},{"key":"1012_CR29","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/s11071-012-0707-5","volume":"72","author":"XJ Tong","year":"2013","unstructured":"Tong XJ, Wang Z, Zhang M, et al. A new algorithm of the combination of image compression and encryption technology based on cross chaotic map. Nonlinear Dyn. 2013;72:229\u201341. https:\/\/doi.org\/10.1007\/s11071-012-0707-5.","journal-title":"Nonlinear Dyn"},{"key":"1012_CR30","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/s11220-014-0092-x","volume":"15","author":"IS Sam","year":"2014","unstructured":"Sam IS, Devaraj P, Bhuvaneswaran RS. An efficient quasigroup based image encryption using modified nonlinear chaotic maps. Sens Imaging. 2014;15:92. https:\/\/doi.org\/10.1007\/s11220-014-0092-x.","journal-title":"Sens Imaging"},{"key":"1012_CR31","doi-asserted-by":"publisher","first-page":"1995","DOI":"10.1007\/s11071-012-0402-6","volume":"69","author":"I Shatheesh Sam","year":"2012","unstructured":"Shatheesh Sam I, Devaraj P, Bhuvaneswaran RS. An intertwining chaotic maps based image encryption scheme. Nonlinear Dyn. 2012;69:1995\u20132007. https:\/\/doi.org\/10.1007\/s11071-012-0402-6.","journal-title":"Nonlinear Dyn"},{"key":"1012_CR32","doi-asserted-by":"publisher","first-page":"3041","DOI":"10.1007\/s11071-019-05413-8","volume":"99","author":"MAB Farah","year":"2020","unstructured":"Farah MAB, Farah A, Farah T. An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dyn. 2020;99:3041\u201364. https:\/\/doi.org\/10.1007\/s11071-019-05413-8.","journal-title":"Nonlinear Dyn"},{"key":"1012_CR33","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1007\/s11071-020-05526-5","volume":"100","author":"CF Zhao","year":"2020","unstructured":"Zhao CF, Ren HP. Image encryption based on hyper-chaotic multi-attractors. Nonlinear Dyn. 2020;100:679\u201398. https:\/\/doi.org\/10.1007\/s11071-020-05526-5.","journal-title":"Nonlinear Dyn"},{"issue":"3","key":"1012_CR34","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1109\/TCSI.2016.2515398","volume":"63","author":"Q Wang","year":"2016","unstructured":"Wang Q, et al. Theoretical design and FPGA-based implementation of higher-dimensional digital chaotic systems. IEEE Trans Circuits Syst I Regul Pap. 2016;63(3):401\u201312. https:\/\/doi.org\/10.1109\/TCSI.2016.2515398.","journal-title":"IEEE Trans Circuits Syst I Regul Pap"},{"key":"1012_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2020.110493","author":"BADM AboAlNaga","year":"2020","unstructured":"AboAlNaga BADM, Said LA, Madian AH, Radwan AG. Analysis and FPGA of semi-fractal shapes based on complex Gaussian map. Chaos Solitons Fractals. 2020. https:\/\/doi.org\/10.1016\/j.chaos.2020.110493 (ISSN 0960-0779).","journal-title":"Chaos Solitons Fractals"},{"key":"1012_CR36","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/j.mejo.2019.05.005","volume":"90","author":"AJ Abd El-Maksoud","year":"2019","unstructured":"Abd El-Maksoud AJ, Abd El-Kader AA, Hassan BG, Rihan NG, Tolba MF, Said LA, Radwan AG, Abu-Elyazeed MF. FPGA implementation of sound encryption system based on fractional-order chaotic systems. Microelectron J. 2019;90:323\u201335. https:\/\/doi.org\/10.1016\/j.mejo.2019.05.005 (ISSN 0026-2692).","journal-title":"Microelectron J"},{"key":"1012_CR37","doi-asserted-by":"publisher","first-page":"1781","DOI":"10.1007\/s11071-018-4659-2","volume":"95","author":"B Li","year":"2019","unstructured":"Li B, Liao X, Jiang Y. A novel image encryption scheme based on improved random number generator and its implementation. Nonlinear Dyn. 2019;95:1781\u2013805. https:\/\/doi.org\/10.1007\/s11071-018-4659-2.","journal-title":"Nonlinear Dyn"},{"key":"1012_CR38","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1016\/j.ins.2019.01.070","volume":"527","author":"R Hamza","year":"2020","unstructured":"Hamza R, Yan Z, Muhammad K, Bellavista P, Titouna F. A privacy-preserving cryptosystem for IoT E-healthcare. Inf Sci. 2020;527:493\u2013510. https:\/\/doi.org\/10.1016\/j.ins.2019.01.070 (ISSN 0020-0255).","journal-title":"Inf Sci"},{"key":"1012_CR39","doi-asserted-by":"publisher","first-page":"109615","DOI":"10.1016\/j.chaos.2020.109615","volume":"133","author":"AV Tutueva","year":"2020","unstructured":"Tutueva AV, Nepomuceno EG, Karimov AI, Andreev VS, Butusov DN. Adaptive chaotic maps and their application to pseudo-random numbers generation. Chaos Solitons Fractals. 2020;133:109615. https:\/\/doi.org\/10.1016\/j.chaos.2020.109615 (ISSN 0960-0779).","journal-title":"Chaos Solitons Fractals"},{"key":"1012_CR40","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/BF01608556","volume":"1","author":"M H\u00e9non","year":"1976","unstructured":"H\u00e9non M. A two-dimensional mapping with a strange attractor. Commun Math Phys. 1976;1:69\u201377.","journal-title":"Commun Math Phys"},{"issue":"1","key":"1012_CR41","doi-asserted-by":"publisher","first-page":"3014","DOI":"10.1117\/1.JEI.21.1.013014","volume":"21","author":"Y Wu","year":"2012","unstructured":"Wu Y, Yang G, Jin H, et al. Image encryption using the two-dimensional logistic chaotic map. J Electron Imaging. 2012;21(1):3014\u201343.","journal-title":"J Electron Imaging"},{"issue":"08","key":"1012_CR42","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"A Gonzalo","year":"2006","unstructured":"Gonzalo A, Shujun L. Some basic cryptographic requirements for chaos based cryptosystems. Int J Bifurc Chaos. 2006;16(08):2129\u201351. https:\/\/doi.org\/10.1142\/S0218127406015970.","journal-title":"Int J Bifurc Chaos"},{"issue":"1","key":"1012_CR43","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1504\/IJWMC.2011.044106","volume":"5","author":"M Agren","year":"2011","unstructured":"Agren M, Hell M, Johansson T. Grain-128a: a new version of grain-128 with optional authentication. Int J Wirel Mob Comput. 2011;5(1):48\u201359.","journal-title":"Int J Wirel Mob Comput"},{"key":"1012_CR44","unstructured":"https:\/\/medpix.nlm.nih.gov\/home."},{"key":"1012_CR45","doi-asserted-by":"publisher","first-page":"2133","DOI":"10.1007\/s11277-015-2505-0","volume":"83","author":"AK Singh","year":"2015","unstructured":"Singh AK, Dave M, Mohan A. Multilevel encrypted text watermarking on medical images using spread-spectrum in DWT domain. Wirel Pers Commun. 2015;83:2133\u201350. https:\/\/doi.org\/10.1007\/s11277-015-2505-0.","journal-title":"Wirel Pers Commun"},{"issue":"4","key":"1012_CR46","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP. Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process. 2004;13(4):600\u201312. https:\/\/doi.org\/10.1109\/TIP.2003.819861.","journal-title":"IEEE Trans Image Process"},{"key":"1012_CR47","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1016\/j.ijleo.2017.07.060","volume":"145","author":"P Selvam","year":"2017","unstructured":"Selvam P, Balachandran S, Iyer SP, Jayabal R. Hybrid transform based reversible watermarking technique for medical images in telemedicine applications. Optik. 2017;145:655\u201371. https:\/\/doi.org\/10.1016\/j.ijleo.2017.07.060.","journal-title":"Optik"},{"key":"1012_CR48","unstructured":"Wu Y, Noonan JP, Agaian S. NPCR and UACI randomness tests for image encryption. In: Cyber journals: multidisciplinary journals in science and technology. J. Sel. Areas Telecommun. (JSAT), pp 31\u201338; 2011."}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-021-01012-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-021-01012-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-021-01012-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,18]],"date-time":"2022-03-18T11:15:52Z","timestamp":1647602152000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-021-01012-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,7]]},"references-count":48,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["1012"],"URL":"https:\/\/doi.org\/10.1007\/s42979-021-01012-w","relation":{},"ISSN":["2662-995X","2661-8907"],"issn-type":[{"type":"print","value":"2662-995X"},{"type":"electronic","value":"2661-8907"}],"subject":[],"published":{"date-parts":[[2022,1,7]]},"assertion":[{"value":"15 February 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 December 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 January 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"118"}}