{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T17:06:53Z","timestamp":1777655213981,"version":"3.51.4"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T00:00:00Z","timestamp":1719964800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T00:00:00Z","timestamp":1719964800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"The National Key R &D Program of China","award":["2021YFB3100400"],"award-info":[{"award-number":["2021YFB3100400"]}]},{"name":"the State Key Laboratory of Information Security","award":["2022-MS-02"],"award-info":[{"award-number":["2022-MS-02"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>With the popularity of the media cloud computing industry, individuals and organizations outsource image computation and storage to the media cloud server to reduce the storage burden. Media images usually contain a large amount of private information. To prevent disclosure of privacy of the image owners, media images are encrypted before uploading to the server. However, this operation will greatly limit the utilization of the image for the user, such as content-based image retrieval. We propose an efficient similarity query algorithm with access control based on Bkd-tree in this paper, in which a searchable encryption scheme is designed for similarity image retrieval, and the encrypted image is used to extract image features by a pre-trained CNN model. The Bkd-tree is utilized to generate an index tree for the image features to speed up retrieval and make it faster than linear indexing. Finally, the security performances of the proposed scheme is analyzed and the performance of this scheme is evaluated by experiments. The results show that the security of the image content and image features can be ensured, and it has a shorter retrieval time and higher retrieval efficiency.<\/jats:p>","DOI":"10.1186\/s42400-024-00213-z","type":"journal-article","created":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T00:02:10Z","timestamp":1719964930000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A privacy-preserving image retrieval scheme with access control based on searchable encryption in media cloud"],"prefix":"10.1186","volume":"7","author":[{"given":"Miao","family":"Tian","sequence":"first","affiliation":[]},{"given":"Yushu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yongming","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiangli","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Wenying","family":"Wen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,3]]},"reference":[{"key":"213_CR1","first-page":"33","volume":"3","author":"I Ahamd","year":"2003","unstructured":"Ahamd I, Jang T-S (2003) Old fashion text-based image retrieval using FCA. Proc Int Conf Image Process 3:33","journal-title":"Proc Int Conf Image Process"},{"issue":"3","key":"213_CR2","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/s10916-017-0880-7","volume":"42","author":"R Ashraf","year":"2018","unstructured":"Ashraf R, Ahmed M, Jabbar S, Khalid S, Ahmad A, Din S, Jeon G (2018) Content based image retrieval by using color descriptor and discrete wavelet transform. J Med Syst 42(3):44","journal-title":"J Med Syst"},{"key":"213_CR3","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.compeleceng.2019.01.022","volume":"75","author":"MT Bella","year":"2019","unstructured":"Bella MT, Vasuki A (2019) An efficient image retrieval framework using fused information feature. Comput Electr Eng 75:46\u201360","journal-title":"Comput Electr Eng"},{"key":"213_CR4","doi-asserted-by":"crossref","unstructured":"Dai W, Jin H, Zou D, Xu S, Zheng W, Shi L, Yang LT (2010) TEE: A virtual drtm based execution environment for secure cloud-end computing. In: Proceedings of 17th ACM conference on computer communications and security, pp 663\u2013665","DOI":"10.1145\/1866307.1866390"},{"key":"213_CR5","doi-asserted-by":"crossref","unstructured":"Deng Y, Wang C, Yu S, Liu S, Ning Z, Leach K, Li J, Yan S, He Z, Cao J, Zhang F (2022) Strong box: a GPU TEE on arm endpoints. In: Proceedings of 29th ACM SIGSAC conference in computing communications and security (CCS\u201922), pp 769\u2013783","DOI":"10.1145\/3548606.3560627"},{"issue":"3","key":"213_CR6","doi-asserted-by":"publisher","first-page":"784","DOI":"10.1109\/TCC.2017.2669999","volume":"7","author":"B Ferreira","year":"2019","unstructured":"Ferreira B, Rodrigues J, Leitao J, Domingos H (2019) Practical privacy-preserving content-based retrieval in cloud image repositories. IEEE Trans Cloud Comput 7(3):784\u2013798","journal-title":"IEEE Trans Cloud Comput"},{"key":"213_CR7","doi-asserted-by":"crossref","unstructured":"Goldreich O (1987) Towards a theory of software protection and simulation by oblivious rams. In: Proceedings of 19th annual ACM symposium theory and computing, pp 182\u2013194","DOI":"10.1145\/28395.28416"},{"issue":"3","key":"213_CR8","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1145\/233551.233553","volume":"43","author":"O Goldreich","year":"1996","unstructured":"Goldreich O, Ostrovsky R (1996) Software protection and simulation on oblivious rams. J ACM 43(3):431\u2013473","journal-title":"J ACM"},{"key":"213_CR9","doi-asserted-by":"publisher","first-page":"1538","DOI":"10.1109\/TIFS.2020.3033412","volume":"16","author":"K He","year":"2021","unstructured":"He K, Chen J, Zhou Q, Du R, Xiang Y (2021) Secure dynamic searchable symmetric encryption with constant client storage cost. IEEE Trans Inf Forensics Secur 16:1538\u20131549","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"213_CR10","first-page":"595","volume":"17","author":"Y Huang","year":"2020","unstructured":"Huang Y, Zhang J, Pan L, Xiang Y (2020) Privacy protection in interactive content based image retrieval. IEEE Trans Depend Secure Comput 17(3):595\u2013607","journal-title":"IEEE Trans Depend Secure Comput"},{"issue":"5","key":"213_CR11","doi-asserted-by":"publisher","first-page":"797","DOI":"10.1109\/TDSC.2016.2622261","volume":"15","author":"J Jang","year":"2018","unstructured":"Jang J, Choi C, Lee J, Kwak N, Lee S, Choi Y, Kang BB (2018) Privatezone: providing a private execution environment using arm trustzone. IEEE Trans Depend Secure Comput 15(5):797\u2013810","journal-title":"IEEE Trans Depend Secure Comput"},{"issue":"2","key":"213_CR12","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1109\/TIP.2013.2289997","volume":"23","author":"EG Karakasis","year":"2014","unstructured":"Karakasis EG, Papakostas GA, Koulouriotis DE, Tourassis VD (2014) A unified methodology for computing accurate quaternion color moments and moment invariants. IEEE Trans Image Process 23(2):596\u2013611","journal-title":"IEEE Trans Image Process"},{"key":"213_CR13","first-page":"2049","volume":"8","author":"W Li","year":"2011","unstructured":"Li W, Duan L, Xu D, Tsang IW-H (2011) Text-based image retrieval using progressive multi-instance learning. Int Conf Comput Vis 8:2049\u20132055","journal-title":"Int Conf Comput Vis"},{"key":"213_CR14","doi-asserted-by":"publisher","first-page":"2738","DOI":"10.1109\/TKDE.2016.2587258","volume":"28","author":"W Li","year":"2016","unstructured":"Li W, Laurent A, Teddy F (2016) Privacy-preserving outsourced media search. IEEE Trans Knowl Data Eng 28:2738\u20132751","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"2","key":"213_CR15","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1109\/TCC.2017.2769645","volume":"8","author":"H Li","year":"2020","unstructured":"Li H, Yang Y, Dai Y, Bai J, Yu S, Xiang Y (2020) Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data. IEEE Trans Cloud Comput 8(2):484\u2013494","journal-title":"IEEE Trans Cloud Comput"},{"issue":"1","key":"213_CR16","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1856\/1\/012007","volume":"1856","author":"B Li","year":"2021","unstructured":"Li B, Ding S, Yang X (2021) A privacy-preserving scheme for jpeg image retrieval based on deep learning. J Phys Conf Ser 1856(1):012007","journal-title":"J Phys Conf Ser"},{"key":"213_CR17","first-page":"1","volume":"1856","author":"B Li","year":"2021","unstructured":"Li B, Ding S, Yang X (2021) A privacy-preserving scheme for jpeg image retrieval based on deep learning. J Phys 1856:1","journal-title":"J Phys"},{"issue":"2","key":"213_CR18","doi-asserted-by":"publisher","first-page":"1142","DOI":"10.1109\/TCC.2020.2989923","volume":"10","author":"Y Li","year":"2022","unstructured":"Li Y, Ma J, Miao Y, Wang Y, Liu X, Choo KKR (2022) Similarity search for encrypted images in secure cloud computing. IEEE Trans Cloud Comput 10(2):1142\u20131155","journal-title":"IEEE Trans Cloud Comput"},{"key":"213_CR19","doi-asserted-by":"crossref","unstructured":"Liang H, Zhang X, Cheng H (2019) Huffman-code based retrieval for encrypted jpeg images. J Vis Commun Image Represent","DOI":"10.1016\/j.jvcir.2019.03.021"},{"key":"213_CR20","doi-asserted-by":"crossref","unstructured":"Lu W, Swaminathan A, Varna AL, Wu M (2009) Enabling search over encrypted multimedia databases. In: Media forensics security, vol 7254 . International Society for Optics and Photonics","DOI":"10.1117\/12.806980"},{"key":"213_CR21","doi-asserted-by":"crossref","unstructured":"Lu W, Varna AL, Swaminathan A, Min W (2009) Secure image retrieval through feature protection. In: IEEE international conference on acoustics","DOI":"10.1109\/ICASSP.2009.4959888"},{"key":"213_CR22","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1016\/j.compeleceng.2019.04.020","volume":"76","author":"S Magdy","year":"2019","unstructured":"Magdy S, Abouelseoud Y, Mikhail M (2019) Effect of chosen features on performance of privacy preserving image retrieval systems. Comput Electr Eng 76:411\u2013424","journal-title":"Comput Electr Eng"},{"key":"213_CR23","doi-asserted-by":"crossref","unstructured":"Majhi M, Mallick AK (2022) Random projection and hashing based privacy preserving for image retrieval paradigm using invariant and clustered feature. J King Saud Univ Comput Inf Sci","DOI":"10.1016\/j.jksuci.2022.04.018"},{"key":"213_CR24","doi-asserted-by":"crossref","unstructured":"Ostrovsky R (1990) Efficient computation on oblivious rams. In: Proeedings of 22th annual ACM symposium and theory computing, pp 514\u2013523","DOI":"10.1145\/100216.100289"},{"issue":"10","key":"213_CR25","doi-asserted-by":"publisher","first-page":"10979","DOI":"10.1007\/s10489-021-03063-1","volume":"52","author":"A Paul","year":"2022","unstructured":"Paul A, Kandar S, Dhara BC (2022) Image encryption using permutation generated by modified Regula\u2013Falsi method. Appl Intell 52(10):10979\u201310998","journal-title":"Appl Intell"},{"key":"213_CR26","doi-asserted-by":"crossref","unstructured":"Procopiuc O, Agarwal PK, Arge L, Vitter JS (2003) Bkd-tree: a dynamic scalable kd-tree, vol 2750, pp 46\u201365","DOI":"10.1007\/978-3-540-45072-6_4"},{"key":"213_CR27","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1016\/j.compeleceng.2019.02.006","volume":"74","author":"K Raveendra","year":"2019","unstructured":"Raveendra K, Vinothkanna R (2019) Hybrid ant colony optimization model for image retrieval using scale-invariant feature transform local descriptor. Comput Electr Eng 74:281\u2013291","journal-title":"Comput Electr Eng"},{"issue":"1","key":"213_CR28","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/MIC.2012.14","volume":"16","author":"K Ren","year":"2012","unstructured":"Ren K, Wang C, Wang Q (2012) Security challenges for the public cloud. IEEE Int Comput 16(1):69\u201373","journal-title":"IEEE Int Comput"},{"issue":"20","key":"213_CR29","doi-asserted-by":"publisher","first-page":"13301","DOI":"10.1007\/s00521-021-05955-2","volume":"33","author":"S Saikia","year":"2021","unstructured":"Saikia S, Fern\u00e1indez-Robles L, Alegre E (2021) Image retrieval based on texture using latent space representation of discrete Fourier transformed maps. Neural Comput Appl 33(20):13301\u201313316","journal-title":"Neural Comput Appl"},{"key":"213_CR30","doi-asserted-by":"crossref","unstructured":"Samet N, Hi\u00e7s\u00f6nmez S, Sener F (2016) Creating image tags for text based image retrieval using additional corpora. In: 24th Signal processing and communication application conference (SIU), pp 1321\u20131324","DOI":"10.1109\/SIU.2016.7495991"},{"issue":"2","key":"213_CR31","first-page":"58","volume":"34","author":"P Shamna","year":"2022","unstructured":"Shamna P, Govindan VK, Abdul Nazeer KA (2022) Content-based medical image retrieval by spatial matching of visual words. J King Saud Univ Comput Inf Sci. 34(2):58\u201371","journal-title":"J King Saud Univ Comput Inf Sci."},{"key":"213_CR32","doi-asserted-by":"crossref","unstructured":"Shamna P, Govindan VK, Nazeer KAA (2018) Content-based medical image retrieval by spatial matching of visual words. J King Saud Univ Comput Inf Sci","DOI":"10.1016\/j.jbi.2019.103112"},{"key":"213_CR33","doi-asserted-by":"crossref","unstructured":"Shashank J, Kowshik P, Srinathan K, Jawahar CV (2008) Private content based image retrieval. In: IEEE conference on computer vision and pattern recognition, pp 1\u20138","DOI":"10.1109\/CVPR.2008.4587388"},{"key":"213_CR34","unstructured":"Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceedings under IEEE symposium on security and privacy(SP), pp 44\u201355"},{"issue":"2","key":"213_CR35","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/MSP.2012.2228533","volume":"30","author":"JR Troncoso-pastoriza","year":"2013","unstructured":"Troncoso-pastoriza JR, Perez-Gonzalez F (2013) Secure signal processing in the cloud: enabling technologies for privacy-preserving multimedia cloud processing. IEEE Signal Proc Mag 30(2):29\u201341","journal-title":"IEEE Signal Proc Mag"},{"issue":"9","key":"213_CR36","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1109\/34.955109","volume":"23","author":"JZ Wang","year":"2001","unstructured":"Wang JZ, Li J, Wiederhold G (2001) Simplicity: semantics-sensitive integrated matching for picture libraries. IEEE Trans Pattern Anal Mach Intell 23(9):947\u2013963","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"213_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.106992","volume":"90","author":"X Wang","year":"2021","unstructured":"Wang X, Lan R, Wang H, Liu Z, Luo X (2021) Fine-grained correlation analysis for medical image retrieval. Comput Electric Eng 90:106992","journal-title":"Comput Electric Eng"},{"issue":"4","key":"213_CR38","doi-asserted-by":"publisher","first-page":"4027","DOI":"10.1007\/s10489-022-03597-y","volume":"53","author":"Y Wang","year":"2023","unstructured":"Wang Y, Chai X, Gan Z, Zhang Y, Chen X, He X (2023) TPE-ISE: approximate thumbnail preserving encryption based on multilevel dwt information self-embedding. Appl Intell 53(4):4027\u20134046","journal-title":"Appl Intell"},{"issue":"11","key":"213_CR39","doi-asserted-by":"publisher","first-page":"2594","DOI":"10.1109\/TIFS.2016.2590944","volume":"11","author":"Z Xia","year":"2017","unstructured":"Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2017) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(11):2594\u20132608","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"213_CR40","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1109\/TCC.2015.2491933","volume":"6","author":"Z Xia","year":"2018","unstructured":"Xia Z, Zhu Y, Sun X, Qin Z, Ren K (2018) Towards privacy-preserving content-based image retrieval in cloud computing. IEEE Trans Cloud Comput 6(1):276\u2013286","journal-title":"IEEE Trans Cloud Comput"},{"key":"213_CR41","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1109\/TII.2019.2913217","volume":"16","author":"Z Xia","year":"2019","unstructured":"Xia Z, Jiang L, Ma X, Yang W, Ji P, Xiong N (2019) A privacy-preserving outsourcing scheme for image local binary pattern in secure industrial internet of things. IEEE Trans Ind Inf 16:629\u2013638","journal-title":"IEEE Trans Ind Inf"},{"issue":"1","key":"213_CR42","first-page":"27","volume":"58","author":"Z Xia","year":"2019","unstructured":"Xia Z, Lu L, Qiu T, Shim HJ, Chen X, Jeon B (2019) A privacy-preserving image retrieval based on ac-coefficients and color histograms in cloud environment. Comput Mater Contin 58(1):27\u201343","journal-title":"Comput Mater Contin"},{"issue":"1","key":"213_CR43","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1109\/TNSE.2020.3038218","volume":"8","author":"Z Xia","year":"2021","unstructured":"Xia Z, Wang L, Tang J, Xiong N, Weng J (2021) A privacy-preserving image retrieval scheme using secure local binary pattern in cloud computing. IEEE Trans Network Sci Eng 8(1):318\u2013330","journal-title":"IEEE Trans Network Sci Eng"},{"issue":"1","key":"213_CR44","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1109\/TSC.2019.2927215","volume":"15","author":"Z Xia","year":"2022","unstructured":"Xia Z, Jiang L, Liu D, Lu L, Jeon B (2022) BOEW: a content-based image retrieval scheme using bag-of-encrypted-words in cloud computing. IEEE Trans Services Comput 15(1):202\u2013214","journal-title":"IEEE Trans Services Comput"},{"issue":"3","key":"213_CR45","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3492705","volume":"18","author":"Z Xia","year":"2022","unstructured":"Xia Z, Ji Q, Gu Q, Yuan C, Xiao F (2022) A format-compatible searchable encryption scheme for jpeg images using bag-of-words. ACM Trans Mult Comput Commun Appl 18(3):1\u201318","journal-title":"ACM Trans Mult Comput Commun Appl"},{"key":"213_CR46","doi-asserted-by":"publisher","first-page":"6503","DOI":"10.1007\/s10489-021-02729-0","volume":"52","author":"J Yang","year":"2022","unstructured":"Yang J, Wu Y (2022) An approach of bursty event detection in social networks based on topological features. Appl Intell 52:6503\u20136521","journal-title":"Appl Intell"},{"key":"213_CR47","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1109\/TSC.2022.3149962","volume":"8","author":"T Yang","year":"2022","unstructured":"Yang T, Ma J, Miao Y, Wang Y, Liu X, Choo K-KR, Xiao B (2022) Mu-teir: traceable encrypted image retrieval in the multi-user setting. IEEE Trans Services Comput 8:9. https:\/\/doi.org\/10.1109\/TSC.2022.3149962","journal-title":"IEEE Trans Services Comput"},{"issue":"1","key":"213_CR48","first-page":"611","volume":"10","author":"SAJ Zaidi","year":"2019","unstructured":"Zaidi SAJ, Buriro A, Riaz M, Mahboob A, Riaz MN (2019) Implementation and comparison of text-based image retrieval schemes. Int J Adv Comput Sci Appl 10(1):611\u2013618","journal-title":"Int J Adv Comput Sci Appl"},{"issue":"13","key":"213_CR49","doi-asserted-by":"publisher","first-page":"15703","DOI":"10.1007\/s10489-022-03174-3","volume":"52","author":"J Zheng","year":"2022","unstructured":"Zheng J, Zeng Q (2022) An image encryption algorithm using a dynamic s-box and chaotic maps. Appl Intell 52(13):15703\u201315717","journal-title":"Appl Intell"},{"issue":"3","key":"213_CR50","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1109\/MSP.2011.940269","volume":"28","author":"W Zhu","year":"2011","unstructured":"Zhu W, Luo C, Wang J, Li S (2011) Multimedia cloud computing. IEEE Sig Process Mag 28(3):59\u201369","journal-title":"IEEE Sig Process Mag"},{"key":"213_CR51","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2022.3149847","author":"D Zhu","year":"2022","unstructured":"Zhu D, Zhu H, Wang X, Lu R, Feng D (2022) An accurate and privacy-preserving retrieval scheme over outsourced medical images. IEEE Trans Services Comput. https:\/\/doi.org\/10.1109\/TSC.2022.3149847","journal-title":"IEEE Trans Services Comput"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-024-00213-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-024-00213-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-024-00213-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T00:03:09Z","timestamp":1719964989000},"score":1,"resource":{"primary":{"URL":"https:\/\/cybersecurity.springeropen.com\/articles\/10.1186\/s42400-024-00213-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,3]]},"references-count":51,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["213"],"URL":"https:\/\/doi.org\/10.1186\/s42400-024-00213-z","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,3]]},"assertion":[{"value":"15 May 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 January 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 July 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}}],"article-number":"22"}}