{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T11:45:42Z","timestamp":1767959142825,"version":"3.49.0"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T00:00:00Z","timestamp":1767916800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T00:00:00Z","timestamp":1767916800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100003819","name":"Natural Science Foundation of Hubei Province","doi-asserted-by":"publisher","award":["2024AFB544"],"award-info":[{"award-number":["2024AFB544"]}],"id":[{"id":"10.13039\/501100003819","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>With the rapid adoption of smart healthcare systems, medical image distribution is expected to become increasingly prevalent. However, such distribution faces significant threats of privacy breaches. Although conventional encryption schemes can prevent unauthorized access during transmission, they cannot control the illegal redistribution of decrypted content. To prevent medical images from being accessed by unauthorized personnel, we propose a dual-level security scheme that integrates robust watermarking with selective encryption for smart healthcare environments. The primary objective is to protect medical images throughout their entire lifecycle. The key innovation of our approach lies in its ability to perform watermarking operations directly on encrypted content. Additionally, the scheme is designed to satisfy diverse security requirements across various medical scenarios. This dual-level security mechanism enables tracing of medical content usage and controlling unauthorized redistribution. Comprehensive experimental evaluations and security analyses demonstrate that our method outperforms existing approaches in computational efficiency while maintaining comparable security levels. This research contributes a novel methodology for end-to-end protection of medical images and holds significant implications for multimedia security in healthcare contexts.<\/jats:p>","DOI":"10.1186\/s42400-025-00535-6","type":"journal-article","created":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T10:30:42Z","timestamp":1767954642000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A controllable medical image security scheme using selective encryption and watermarking for bit-planes in the TSH domain"],"prefix":"10.1186","volume":"9","author":[{"given":"Conghuan","family":"Ye","sequence":"first","affiliation":[]},{"given":"Li","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Shenglong","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Qiankun","family":"Zuo","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,9]]},"reference":[{"issue":"17","key":"535_CR1","doi-asserted-by":"publisher","first-page":"26021","DOI":"10.1007\/s11042-021-10801-7","volume":"80","author":"A Al-Haj","year":"2021","unstructured":"Al-Haj A, Abdel-Nabi H (2021) An efficient watermarking algorithm for medical images. Multimedia Tools Appl 80(17):26021\u201326047. https:\/\/doi.org\/10.1007\/s11042-021-10801-7","journal-title":"Multimedia Tools Appl"},{"issue":"2","key":"535_CR2","doi-asserted-by":"publisher","first-page":"778","DOI":"10.1109\/JBHI.2022.3181823","volume":"27","author":"M Ali","year":"2023","unstructured":"Ali M, Naeem F, Tariq M, Kaddoum G (2023) Federated learning for privacy preservation in smart healthcare systems: a comprehensive survey. IEEE J Biomed Health Inform 27(2):778\u2013789. https:\/\/doi.org\/10.1109\/JBHI.2022.3181823","journal-title":"IEEE J Biomed Health Inform"},{"issue":"12","key":"535_CR3","doi-asserted-by":"publisher","first-page":"10575","DOI":"10.1109\/JIOT.2023.3242126","volume":"10","author":"A Almas","year":"2023","unstructured":"Almas A, Iqbal W, Altaf A, Saleem K, Mussiraliyeva S, Iqbal MW (2023) Context-based adaptive fog computing trust solution for time-critical smart healthcare systems. IEEE Internet Things J 10(12):10575\u201310586. https:\/\/doi.org\/10.1109\/JIOT.2023.3242126","journal-title":"IEEE Internet Things J"},{"key":"535_CR4","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.comcom.2020.01.038","volume":"152","author":"A Anand","year":"2020","unstructured":"Anand A, Singh AK (2020) An improved dwt-svd domain watermarking for medical information security. Comput Commn 152:72\u201380. https:\/\/doi.org\/10.1016\/j.comcom.2020.01.038","journal-title":"Comput Commn"},{"issue":"4","key":"535_CR5","doi-asserted-by":"publisher","first-page":"2033","DOI":"10.1109\/TCSS.2022.3140862","volume":"10","author":"A Anand","year":"2023","unstructured":"Anand A, Singh AK (2023) Hybrid nature-inspired optimization and encryption-based watermarking for e-healthcare. IEEE Trans Comput Soc Sys 10(4):2033\u20132040. https:\/\/doi.org\/10.1109\/TCSS.2022.3140862","journal-title":"IEEE Trans Comput Soc Sys"},{"issue":"1","key":"535_CR6","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1109\/TDSC.2022.3144657","volume":"20","author":"A Anand","year":"2023","unstructured":"Anand A, Singh AK (2023) Dual watermarking for security of Covid-19 patient record. IEEE Trans Dependable Secure Comput 20(1):859\u2013866. https:\/\/doi.org\/10.1109\/TDSC.2022.3144657","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"1","key":"535_CR7","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1109\/COMST.2022.3224644","volume":"25","author":"MS Arbabi","year":"2023","unstructured":"Arbabi MS, Lal C, Veeraragavan NR, Marijan D, Nygrd JF, Vitenberg R (2023) A survey on blockchain for healthcare: challenges, benefits, and future directions. IEEE Commn Sur & Tutorials 25(1):386\u2013424. https:\/\/doi.org\/10.1109\/COMST.2022.3224644","journal-title":"IEEE Commn Sur & Tutorials"},{"key":"535_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109451","volume":"118","author":"D Awasthi","year":"2024","unstructured":"Awasthi D, Khare P, Srivastava VK, Singh AK (2024) Anfis optimization-based watermarking for securing integrity of medical images with blockchain authentication. Comput Electrical Eng 118:109451. https:\/\/doi.org\/10.1016\/j.compeleceng.2024.109451","journal-title":"Comput Electrical Eng"},{"issue":"3","key":"535_CR9","doi-asserted-by":"publisher","first-page":"2970","DOI":"10.1007\/s11227-023-05566-9","volume":"80","author":"D Awasthi","year":"2024","unstructured":"Awasthi D, Khare P, Srivastava VK (2024) Internet of medical things-based authentication for an optimized watermarking of encrypted EEG. J Supercomput 80(3):2970\u20133004","journal-title":"J Supercomput"},{"key":"535_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09981-","author":"K Balasamy","year":"2020","unstructured":"Balasamy K, Suganyadevi S (2020) A fuzzy based ROI selection for encryption and watermarking in medical image using DWT and SVD. Multimedia Tools Appl. https:\/\/doi.org\/10.1007\/s11042-020-09981-","journal-title":"Multimedia Tools Appl"},{"issue":"5","key":"535_CR11","doi-asserted-by":"publisher","first-page":"891","DOI":"10.1109\/TITB.2012.2207730","volume":"16","author":"D Bouslimi","year":"2012","unstructured":"Bouslimi D, Coatrieux G, Cozic M, Roux C (2012) A joint encryption\/watermarking system for verifying the reliability of medical images. IEEE Trans Inf Technol Biomed 16(5):891\u2013899","journal-title":"IEEE Trans Inf Technol Biomed"},{"key":"535_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2023.105877","volume":"90","author":"X Chai","year":"2024","unstructured":"Chai X, Tang Z, Gan Z, Lu Y, Wang B, Zhang Y (2024) Se-ndend: a novel symmetric watermarking framework with neural network-based chaotic encryption for internet of medical things. Biomed Sig Process Control 90:105877. https:\/\/doi.org\/10.1016\/j.bspc.2023.105877","journal-title":"Biomed Sig Process Control"},{"key":"535_CR13","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1109\/TIFS.2023.3322315","volume":"19","author":"Y Ding","year":"2024","unstructured":"Ding Y, Wang Z, Qin Z, Zhou E, Zhu G, Qin Z, Choo K-KR (2024) Backdoor attack on deep learning-based medical image encryption and decryption network. IEEE Trans Inform Forensics Sec 19:280\u2013292. https:\/\/doi.org\/10.1109\/TIFS.2023.3322315","journal-title":"IEEE Trans Inform Forensics Sec"},{"issue":"12","key":"535_CR14","doi-asserted-by":"publisher","first-page":"887","DOI":"10.3390\/fractalfract7120887","volume":"7","author":"W Feng","year":"2023","unstructured":"Feng W, Wang Q, Liu H, Ren Y, Zhang J, Zhang S, Qian K, Wen H (2023) Exploiting newly designed fractional-order 3D Lorenz chaotic system and 2D discrete polynomial hyper-chaotic map for high-performance multi-image encryption. Fract Fract 7(12):887. https:\/\/doi.org\/10.3390\/fractalfract7120887","journal-title":"Fract Fract"},{"key":"535_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123190","volume":"246","author":"W Feng","year":"2024","unstructured":"Feng W, Zhang J, Chen Y, Qin Z, Zhang Y, Ahmad M, Woniak M (2024) Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption. Expert Sys Appl 246:123190. https:\/\/doi.org\/10.1016\/j.eswa.2024.123190","journal-title":"Expert Sys Appl"},{"issue":"8","key":"535_CR16","doi-asserted-by":"publisher","first-page":"2554","DOI":"10.1073\/pnas.79.8.2554","volume":"79","author":"JJ Hopfield","year":"1982","unstructured":"Hopfield JJ (1982) Neural networks and physical systems with emergent collective computational abilities. Proc Nat Acad Sci USA 79(8):2554\u20132558","journal-title":"Proc Nat Acad Sci USA"},{"issue":"2","key":"535_CR17","doi-asserted-by":"publisher","first-page":"2382","DOI":"10.1109\/JIOT.2023.3293165","volume":"11","author":"J Huang","year":"2024","unstructured":"Huang J, Cui Q, Zhou Z, Yu K, Yang C-N, Choo K-KR (2024) Encrypted domain secret medical-image sharing with secure outsourcing computation in IOT environment. IEEE Internet Things J 11(2):2382\u20132393. https:\/\/doi.org\/10.1109\/JIOT.2023.3293165","journal-title":"IEEE Internet Things J"},{"key":"535_CR18","doi-asserted-by":"publisher","unstructured":"Ping, P., Wei, P., Fu, D., Guo, B., Bloh, O.T., Xu, F.: Imih: Imperceptible medical image hiding for secure healthcare. IEEE Trans Depend Sec Comput 1\u201316 (2024) https:\/\/doi.org\/10.1109\/TDSC.2024.3355165","DOI":"10.1109\/TDSC.2024.3355165"},{"issue":"7","key":"535_CR19","doi-asserted-by":"publisher","first-page":"1883122","DOI":"10.1080\/17517575.2021.1883122","volume":"16","author":"A Lakhan","year":"2022","unstructured":"Lakhan A, Mastoi Q-U-A, Elhoseny M, Memon MS, Mohammed MA (2022) Deep neural network-based application partitioning and scheduling for hospitals and medical enterprises using iot assisted mobile fog cloud. Enterprise Inform Sys 16(7):1883122. https:\/\/doi.org\/10.1080\/17517575.2021.1883122","journal-title":"Enterprise Inform Sys"},{"key":"535_CR20","doi-asserted-by":"publisher","unstructured":"Balasamy, K., Suganyadevi, S.: A fuzzy based ROI selection for encryption and watermarking in medical image using DWT and SVD. Multimed Tools Appl (2020) https:\/\/doi.org\/10.1007\/s11042-020-09981-","DOI":"10.1007\/s11042-020-09981-"},{"key":"535_CR21","doi-asserted-by":"crossref","unstructured":"Thanki, R., Kothari, A.: Multi-level security of medical images based on encryption and watermarking for telemedicine applications. Multimed Tools Appl (2020)","DOI":"10.1007\/s11042-020-09941-z"},{"issue":"18","key":"535_CR22","doi-asserted-by":"publisher","first-page":"15980","DOI":"10.1109\/JIOT.2023.3268278","volume":"10","author":"J Li","year":"2023","unstructured":"Li J, Li D, Zhang X (2023) A secure blockchain-assisted access control scheme for smart healthcare system in fog computing. IEEE Internet Things J 10(18):15980\u201315989. https:\/\/doi.org\/10.1109\/JIOT.2023.3268278","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"535_CR23","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1109\/6046.98556","volume":"4","author":"R Liu","year":"2002","unstructured":"Liu R, Tan T (2002) An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans Multimedia 4(1):121\u2013128. https:\/\/doi.org\/10.1109\/6046.98556","journal-title":"IEEE Trans Multimedia"},{"issue":"12","key":"535_CR24","doi-asserted-by":"publisher","first-page":"10510","DOI":"10.1109\/JIOT.2023.3242319","volume":"10","author":"J Liu","year":"2023","unstructured":"Liu J, Han J, Fu K, Jia J, Zhu D, Zhai G (2023) Application of QR code watermarking and encryption in the protection of data privacy of intelligent mouth-opening trainer. IEEE Internet Things J 10(12):10510\u201310518. https:\/\/doi.org\/10.1109\/JIOT.2023.3242319","journal-title":"IEEE Internet Things J"},{"key":"535_CR25","doi-asserted-by":"publisher","first-page":"1935","DOI":"10.1109\/TIFS.2023.3342612","volume":"19","author":"J Mao","year":"2024","unstructured":"Mao J, Tang H, Lyu S, Zhou Z, Cao X (2024) Content-aware quantization index modulation: Leveraging data statistics for enhanced image watermarking. IEEE Trans Inform Forensics Sec 19:1935\u20131947. https:\/\/doi.org\/10.1109\/TIFS.2023.3342612","journal-title":"IEEE Trans Inform Forensics Sec"},{"issue":"1","key":"535_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2024.101932","volume":"36","author":"B Meng","year":"2024","unstructured":"Meng B, Yuan X, Zhang Q, Lam C-T, Huang G (2024) Encryption-then-embedding-based hybrid data hiding scheme for medical images. J King Saud Univ Comput Inform Sci 36(1):101932. https:\/\/doi.org\/10.1016\/j.jksuci.2024.101932","journal-title":"J King Saud Univ Comput Inform Sci"},{"key":"535_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119810","volume":"653","author":"SA Nawaz","year":"2024","unstructured":"Nawaz SA, Li J, Bhatti UA, Shoukat MU, Li D, Raza MA (2024) Hybrid watermarking algorithm for medical images based on digital transformation and mobilenetv2. Inform Sci 653:119810. https:\/\/doi.org\/10.1016\/j.ins.2023.119810","journal-title":"Inform Sci"},{"key":"535_CR28","doi-asserted-by":"publisher","unstructured":"Mao, J., Tang, H., Lyu, S., Zhou, Z., Cao, X.: Content-aware quantization index modulation: Leveraging data statistics for enhanced image watermarking. IEEE Trans Inform Forensics Sec 19, 1935\u20131947 (2024) https:\/\/doi.org\/10.1109\/TIFS.2023.3342612","DOI":"10.1109\/TIFS.2023.3342612"},{"issue":"1","key":"535_CR29","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/JIOT.2023.3285388","volume":"11","author":"Z Qu","year":"2024","unstructured":"Qu Z, Meng Y, Liu B, Muhammad G, Tiwari P (2024) Qb-imd: a secure medical data processing system with privacy protection based on quantum blockchain for IOMT. IEEE Internet Things J 11(1):40\u201349. https:\/\/doi.org\/10.1109\/JIOT.2023.3285388","journal-title":"IEEE Internet Things J"},{"issue":"21","key":"535_CR30","doi-asserted-by":"publisher","first-page":"18477","DOI":"10.1109\/JIOT.2023.3280592","volume":"10","author":"KS Sankaran","year":"2023","unstructured":"Sankaran KS, Kim T-H, Renjith PN (2023) An improved ai-based secure m-trust privacy protocol for medical internet of things in smart healthcare system. IEEE Internet Things J 10(21):18477\u201318485. https:\/\/doi.org\/10.1109\/JIOT.2023.3280592","journal-title":"IEEE Internet Things J"},{"issue":"7","key":"535_CR31","doi-asserted-by":"publisher","first-page":"8137","DOI":"10.1109\/TII.2022.3217039","volume":"19","author":"P Sarosh","year":"2023","unstructured":"Sarosh P, Parah SA, Malik BA, Hijji M, Muhammad K (2023) Real-time medical data security solution for smart healthcare. IEEE Trans Industr Inf 19(7):8137\u20138147. https:\/\/doi.org\/10.1109\/TII.2022.3217039","journal-title":"IEEE Trans Industr Inf"},{"key":"535_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2025.114750","volume":"330","author":"R Sood","year":"2025","unstructured":"Sood R, Rani J, Anand A, Bedi J (2025) Deep learning-based dual watermarking solution for securing medical images in e-healthcare. Knowledge-Based Sys 330:114750. https:\/\/doi.org\/10.1016\/j.knosys.2025.114750","journal-title":"Knowledge-Based Sys"},{"issue":"3","key":"535_CR33","doi-asserted-by":"publisher","first-page":"3457","DOI":"10.1007\/s11042-018-6263-3","volume":"78","author":"S Thakur","year":"2019","unstructured":"Thakur S, Singh AK, Ghrera SP, Elhoseny M (2019) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimedia Tools Appl 78(3):3457\u20133470. https:\/\/doi.org\/10.1007\/s11042-018-6263-3","journal-title":"Multimedia Tools Appl"},{"key":"535_CR34","doi-asserted-by":"publisher","unstructured":"Wang, M.-m., Song, X.-g., Liu, S.-h., Zhao, X.-q., Zhou, N.-r.: A novel 2d log-logistic-sine chaotic map for image encryption. Nonlinear Dyn 113(3), 2867\u20132896 (2025) https:\/\/doi.org\/10.1007\/s11071-024-10331-5","DOI":"10.1007\/s11071-024-10331-5"},{"key":"535_CR35","doi-asserted-by":"publisher","unstructured":"Feng, W., Zhang, J., Chen, Y., Qin, Z., Zhang, Y., Ahmad, M., Wo?niak, M.: Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption. Expert Syst Appl 246, 123190 (2024) https:\/\/doi.org\/10.1016\/j.eswa.2024.123190","DOI":"10.1016\/j.eswa.2024.123190"},{"key":"535_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.125328","volume":"261","author":"M Wang","year":"2025","unstructured":"Wang M, Teng L, Zhou W, Yan X, Xia Z, Zhou S (2025) A new 2d cross hyperchaotic sine-modulation-logistic map and its application in bit-level image encryption. Expert Sys Appl 261:125328. https:\/\/doi.org\/10.1016\/j.eswa.2024.125328","journal-title":"Expert Sys Appl"},{"issue":"3","key":"535_CR37","doi-asserted-by":"publisher","first-page":"2867","DOI":"10.1007\/s11071-024-10331-5","volume":"113","author":"M Wang","year":"2025","unstructured":"Wang M, Song X, Liu S, Zhao X, Zhou N (2025) A novel 2D log-logistic-sine chaotic map for image encryption. Nonlinear Dynamic 113(3):2867\u20132896. https:\/\/doi.org\/10.1007\/s11071-024-10331-5","journal-title":"Nonlinear Dynamic"},{"issue":"2","key":"535_CR38","doi-asserted-by":"publisher","first-page":"2089","DOI":"10.1109\/TII.2022.3194590","volume":"19","author":"Y Wu","year":"2023","unstructured":"Wu Y, Zhang L, Berretti S, Wan S (2023) Medical image encryption by content-aware DNA computing for secure healthcare. IEEE Trans Industr Inf 19(2):2089\u20132098. https:\/\/doi.org\/10.1109\/TII.2022.3194590","journal-title":"IEEE Trans Industr Inf"},{"issue":"2","key":"535_CR39","doi-asserted-by":"publisher","first-page":"1653","DOI":"10.1007\/s40747-022-00881-9","volume":"9","author":"C Ye","year":"2023","unstructured":"Ye C, Chen C (2023) Secure medical image sharing for smart healthcare system based on cellular neural network. Complex Intell Sys 9(2):1653\u20131670. https:\/\/doi.org\/10.1007\/s40747-022-00881-9","journal-title":"Complex Intell Sys"},{"key":"535_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2023.114440","volume":"179","author":"F Yu","year":"2024","unstructured":"Yu F, Kong X, Yao W, Zhang J, Cai S, Lin H, Jin J (2024) Dynamics analysis, synchronization and FPGA implementation of multiscroll hopfield neural networks with non-polynomial memristor. Chaos Solitons Fract 179:114440. https:\/\/doi.org\/10.1016\/j.chaos.2023.114440","journal-title":"Chaos Solitons Fract"},{"key":"535_CR41","doi-asserted-by":"publisher","first-page":"1114","DOI":"10.1109\/TMM.2023.3276504","volume":"26","author":"C Zhang","year":"2024","unstructured":"Zhang C, Chen J, Chen D, Wang W, Zhang Y, Zhou Y (2024) Exploiting substitution box for cryptanalyzing image encryption schemes with DNA coding and nonlinear dynamics. IEEE Trans Multimedia 26:1114\u20131128. https:\/\/doi.org\/10.1109\/TMM.2023.3276504","journal-title":"IEEE Trans Multimedia"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00535-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-025-00535-6","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00535-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T10:30:44Z","timestamp":1767954644000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s42400-025-00535-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,9]]},"references-count":41,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["535"],"URL":"https:\/\/doi.org\/10.1186\/s42400-025-00535-6","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,9]]},"assertion":[{"value":"22 September 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"All authors agree to the publication of this article.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"98"}}