{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T09:47:40Z","timestamp":1775209660547,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T00:00:00Z","timestamp":1768348800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T00:00:00Z","timestamp":1768348800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272077"],"award-info":[{"award-number":["62272077"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100018555","name":"Science and Technology Program of Guizhou Province","doi-asserted-by":"publisher","award":["QianKeHeJiChu-ZK[2022]YiBan331"],"award-info":[{"award-number":["QianKeHeJiChu-ZK[2022]YiBan331"]}],"id":[{"id":"10.13039\/501100018555","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Recently, image encryption is becoming increasingly important, many chaotic models have been prevalently used to design kinds of cryptographic schemes in chaos cryptography. Among those models, coupled map lattice (CML), as a classics spatiotemporal chaotic model with good performance, is popularly used for those chaos-based cryptographic schemes. However, there exist no scientific studies in the three dimensional (3D)\u00a0CML model from the view of theoretical and application perspectives besides our previous research. To further improve the complicated chaotic dynamic behavior and extend the application scenarios of CML into a3D CML one, therefore it is introduced into our paper for constructing chaos-based image encryption scheme with higher security. First of all, properties of 3D CML are comprehensively analyzed to fully verify that it possesses more complicated chaotic behavior than one dimensional and two dimensional CML. Subsequently, the chaotic sequences are produced by means of intercepting 32 bit from each node of the 3D CML model, both NIST and TestU01 testing certificate those chaotic sequences have high randomness, which are pretty suitable for designing the chaos-based cryptographic scheme. Based on those above-mentioned analyses, a new color image encryption scheme is proposed via diffusion and confusion. In our scheme, diffusion is performed based on those above-mentioned chaotic sequences via the 3D CML model, while confusion is carried out according to the Baker map. Specially, before diffusion and confusion operations, red, green and blue channel of a plain color image are combined into one pixel including 24 bit (0 or 1) for improving the efficiency of our scheme. To sum up, all corresponding simulations show our scheme has excellent encryption performance, and it would be popularly applied in the real-life cryptographic domains. Our research contributes to enriching the theoretical research on chaotic cryptography and provides new chaotic image encryption schemes.<\/jats:p>","DOI":"10.1186\/s42400-025-00541-8","type":"journal-article","created":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T06:50:01Z","timestamp":1768373401000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A newly image encryption scheme based on 3-D coupled map lattice and Baker map"],"prefix":"10.1186","volume":"9","author":[{"given":"Zhuo","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5247-043X","authenticated-orcid":false,"given":"Yong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jinyuan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Leo Yu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,14]]},"reference":[{"key":"541_CR1","doi-asserted-by":"publisher","first-page":"25583","DOI":"10.1007\/s11042-021-10773-8","volume":"80","author":"B Bouteghrine","year":"2021","unstructured":"Bouteghrine B, Tanougast C, Sadoudi S (2021) Novel image encryption algorithm based on new 3-d chaos map. Multimed Tools Appl 80:25583\u201325605","journal-title":"Multimed Tools Appl"},{"key":"541_CR2","doi-asserted-by":"publisher","first-page":"103424","DOI":"10.1016\/j.jvcir.2021.103424","volume":"83","author":"L Chen","year":"2022","unstructured":"Chen L, Li C, Li C (2022) Security measurement of a medical communication scheme based on chaos and DNA coding. J Vis Commun Image Represent 83:103424","journal-title":"J Vis Commun Image Represent"},{"key":"541_CR3","doi-asserted-by":"publisher","first-page":"4569","DOI":"10.1007\/s11071-021-06491-3","volume":"104","author":"LG De la Fraga","year":"2021","unstructured":"De la Fraga LG, Mancillas-L\u00f3pez C, Tlelo-Cuautle E (2021) Designing an authenticated hash function with a 2d chaotic map. Nonlinear Dyn 104:4569\u20134580","journal-title":"Nonlinear Dyn"},{"key":"541_CR4","doi-asserted-by":"publisher","first-page":"6629","DOI":"10.1007\/s11071-024-09384-3","volume":"112","author":"Q Deng","year":"2024","unstructured":"Deng Q, Wang C, Lin H (2024) Chaotic dynamical system of hopfield neural network influenced by neuron activation threshold and its image encryption. Nonlinear Dyn 112:6629\u20136646","journal-title":"Nonlinear Dyn"},{"key":"541_CR5","first-page":"3034","volume":"6","author":"A Devi","year":"2015","unstructured":"Devi A, Sharma A, Rangra A (2015) A review on DES, AES and blowfish for image encryption and decryption. Int J Comput Sci Info Tech 6:3034\u20133036","journal-title":"Int J Comput Sci Info Tech"},{"key":"541_CR6","doi-asserted-by":"publisher","first-page":"4009","DOI":"10.1103\/PhysRevE.56.4009","volume":"56","author":"M Ding","year":"1997","unstructured":"Ding M, Yang W (1997) Stability of synchronous chaos and on-off intermittency in coupled map lattices. Phys Rev E 56:4009","journal-title":"Phys Rev E"},{"key":"541_CR7","doi-asserted-by":"publisher","first-page":"625","DOI":"10.3390\/app11020625","volume":"11","author":"F Dridi","year":"2021","unstructured":"Dridi F, El Assad S, El Hadj Youssef W, Machhout M, Lozi R (2021) The design and FPGA-based implementation of a stream cipher based on a secure chaotic generator. Appl Sci 11:625","journal-title":"Appl Sci"},{"key":"541_CR8","doi-asserted-by":"publisher","first-page":"114203","DOI":"10.1088\/1674-1056\/acef08","volume":"32","author":"Y Du","year":"2023","unstructured":"Du Y, Long G, Jiang D, Chai X, Han J (2023) Optical image encryption algorithm based on a new four-dimensional memristive hyperchaotic system and compressed sensing. Chin Phys B 32:114203","journal-title":"Chin Phys B"},{"key":"541_CR9","doi-asserted-by":"publisher","first-page":"2250075","DOI":"10.1142\/S0218127422500754","volume":"32","author":"C Fan","year":"2022","unstructured":"Fan C, Ding Q, Tse CK (2022) Evaluating the randomness of chaotic binary sequences via a novel period detection algorithm. Int J Bifurc Chaos Appl Sci 32:2250075","journal-title":"Int J Bifurc Chaos Appl Sci"},{"key":"541_CR10","doi-asserted-by":"publisher","first-page":"123190","DOI":"10.1016\/j.eswa.2024.123190","volume":"246","author":"W Feng","year":"2024","unstructured":"Feng W et al (2024) Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption. Expert Syst Appl 246:123190","journal-title":"Expert Syst Appl"},{"key":"541_CR11","doi-asserted-by":"publisher","first-page":"426","DOI":"10.3390\/fractalfract9070426","volume":"9","author":"W Feng","year":"2025","unstructured":"Feng W et al (2025) Integrating fractional-order hopfield neural network with differentiated encryption: achieving high-performance privacy protection for medical images. Fractal Fract 9:426","journal-title":"Fractal Fract"},{"key":"541_CR12","doi-asserted-by":"publisher","first-page":"12584","DOI":"10.1109\/ACCESS.2019.2893760","volume":"7","author":"W Feng","year":"2019","unstructured":"Feng W, He Y, Li H, Li C (2019) cryptanalysis and improvement of the image encryption scheme based on 2d logistic- adjusted-sine map. IEEE Access 7:12584\u201312597","journal-title":"IEEE Access"},{"key":"541_CR13","doi-asserted-by":"publisher","first-page":"145459","DOI":"10.1109\/ACCESS.2021.3123571","volume":"9","author":"W Feng","year":"2021","unstructured":"Feng W, Qin Z, Zhang J, Ahmad M (2021) Cryptanalysis and improvement of the image encryption scheme based on feistel network and dynamic DNA encoding. IEEE Access 9:145459\u2013145470","journal-title":"IEEE Access"},{"key":"541_CR14","doi-asserted-by":"publisher","first-page":"12845","DOI":"10.1007\/s00521-021-05937-4","volume":"33","author":"Z Gan","year":"2021","unstructured":"Gan Z, Bi J, Ding W, Chai X (2021) Exploiting 2d compressed sensing and information entropy for secure color image compression and encryption. Neural Comput Appl 33:12845\u201312867","journal-title":"Neural Comput Appl"},{"key":"541_CR15","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1007\/s11042-022-12883-3","volume":"82","author":"K Golalipour","year":"2023","unstructured":"Golalipour K (2023) A novel permutation-diffusion technique for image encryption based on the imperialist competitive algorithm. Multimed Tools Appl 82:725\u2013746","journal-title":"Multimed Tools Appl"},{"key":"541_CR16","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.sigpro.2018.03.010","volume":"149","author":"Z Hua","year":"2018","unstructured":"Hua Z, Jin F, Xu B, Huang H (2018) 2d logistic-sine-coupling map for image encryption. Signal Process 149:148\u2013161","journal-title":"Signal Process"},{"key":"541_CR17","doi-asserted-by":"publisher","first-page":"4505","DOI":"10.1007\/s11071-021-06472-6","volume":"104","author":"Z Hua","year":"2021","unstructured":"Hua Z, Zhu Z, Chen Y, Li Y (2021) Color image encryption using orthogonal Latin squares and a new 2d chaotic system. Nonlinear Dyn 104:4505\u20134522","journal-title":"Nonlinear Dyn"},{"key":"541_CR18","doi-asserted-by":"publisher","first-page":"114945","DOI":"10.1016\/j.chaos.2024.114945","volume":"184","author":"Y Huang","year":"2024","unstructured":"Huang Y et al (2024) Asymptotic shape synchronization in three-dimensional chaotic systems and its application in color image encryption. Chaos Solitons Fract 184:114945","journal-title":"Chaos Solitons Fract"},{"key":"541_CR19","doi-asserted-by":"publisher","first-page":"115632","DOI":"10.1016\/j.chaos.2024.115632","volume":"189","author":"D Jiang","year":"2024","unstructured":"Jiang D et al (2024) Novel tabu learning neuron model with variable activation gradient and its application to secure healthcare. Chaos Solitons Fract 189:115632","journal-title":"Chaos Solitons Fract"},{"key":"541_CR20","doi-asserted-by":"publisher","first-page":"125854","DOI":"10.1016\/j.eswa.2024.125854","volume":"264","author":"Q Lai","year":"2025","unstructured":"Lai Q, Hua H (2025) Secure medical image encryption scheme for healthcare IoT using novel hyperchaotic map and DNA cubes. Expert Syst Appl 264:125854","journal-title":"Expert Syst Appl"},{"key":"541_CR21","doi-asserted-by":"publisher","first-page":"111989","DOI":"10.1016\/j.chaos.2022.111989","volume":"158","author":"M Li","year":"2022","unstructured":"Li M, Wang M, Fan H, An K, Liu G (2022) A novel plaintext-related chaotic image encryption scheme with no additional plaintext information. Chaos Solitons Fract 158:111989","journal-title":"Chaos Solitons Fract"},{"key":"541_CR22","doi-asserted-by":"publisher","first-page":"55269","DOI":"10.1109\/JIOT.2025.3622741","volume":"12","author":"H Lin","year":"2025","unstructured":"Lin H et al (2025) Securing image privacy in internet-of-vehicles with a multiwing hyperchaotic memristive neural network. IEEE Internet Things J 12:55269\u201355282","journal-title":"IEEE Internet Things J"},{"key":"541_CR23","doi-asserted-by":"publisher","first-page":"115232","DOI":"10.1088\/1402-4896\/ad80dd","volume":"99","author":"T Liu","year":"2024","unstructured":"Liu T et al (2024) A color image encryption algorithm based on a novel 4d hyperchaotic system and bit-level diffusion. Phys Scr 99:115232","journal-title":"Phys Scr"},{"key":"541_CR24","doi-asserted-by":"publisher","first-page":"1950016","DOI":"10.1142\/S0218127419500160","volume":"29","author":"X Liu","year":"2019","unstructured":"Liu X, Song Y, Jiang G-P (2019) Hierarchical bit-level image encryption based on chaotic map and feistel network. Int J Bifurcat Chaos 29:1950016","journal-title":"Int J Bifurcat Chaos"},{"key":"541_CR25","first-page":"1","volume":"2021","author":"Z Liu","year":"2021","unstructured":"Liu Z, Wang Y, Zhang LY, Ma J (2021) A novel compressive image encryption with an improved 2d coupled map lattice model. Secur Commun Netw 2021:1\u201321","journal-title":"Secur Commun Netw"},{"key":"541_CR26","doi-asserted-by":"publisher","first-page":"21509","DOI":"10.1007\/s11071-024-10138-4","volume":"112","author":"Z Liu","year":"2024","unstructured":"Liu Z, Wang Y, Liu J, Feng J, Zhang LY (2024) Characteristics of 3d coupled map lattice and its application in pseudo-random number generator. Nonlinear Dyn 112:21509\u201321531","journal-title":"Nonlinear Dyn"},{"key":"541_CR27","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.optlaseng.2018.05.009","volume":"110","author":"H Nematzadeh","year":"2018","unstructured":"Nematzadeh H, Enayatifar R, Motameni H, Guimar\u00e3es FG, Coelho VN (2018) Medical image encryption using a hybrid model of modified genetic algorithm and coupled map lattices. Opt Lasers Eng 110:24\u201332","journal-title":"Opt Lasers Eng"},{"key":"541_CR28","doi-asserted-by":"publisher","first-page":"1655","DOI":"10.1109\/TCSI.2022.3140762","volume":"69","author":"K Onuki","year":"2022","unstructured":"Onuki K, Cho K, Horio Y, Miyano T (2022) Secret-key exchange through synchronization of randomized chaotic oscillators aided by logistic hash function. IEEE Trans Circuits Syst I Regul Pap 69:1655\u20131667","journal-title":"IEEE Trans Circuits Syst I Regul Pap"},{"key":"541_CR29","doi-asserted-by":"publisher","first-page":"109543","DOI":"10.1016\/j.optlastec.2023.109543","volume":"165","author":"Y Peng","year":"2023","unstructured":"Peng Y, Lan Z, Sun K, Xu W (2023) A simple color image encryption algorithm based on a discrete memristive hyperchaotic map and time-controllable operation. Opt Laser Technol 165:109543","journal-title":"Opt Laser Technol"},{"key":"541_CR30","doi-asserted-by":"publisher","first-page":"2869","DOI":"10.1007\/s11071-022-07756-1","volume":"110","author":"H Qiu","year":"2022","unstructured":"Qiu H, Xu X, Jiang Z, Sun K, Xiao C (2022) A color image encryption algorithm based on hyperchaotic map and Rubik\u2019s cube scrambling. Nonlinear Dyn 110:2869\u20132887","journal-title":"Nonlinear Dyn"},{"key":"541_CR31","doi-asserted-by":"publisher","first-page":"11859","DOI":"10.1007\/s00521-019-04668-x","volume":"32","author":"S Suri","year":"2020","unstructured":"Suri S, Vijay R (2020) A pareto-optimal evolutionary approach of image encryption using coupled map lattice and DNA. Neural Comput Appl 32:11859\u201311873","journal-title":"Neural Comput Appl"},{"key":"541_CR32","doi-asserted-by":"publisher","first-page":"3829","DOI":"10.1007\/s11071-024-10403-6","volume":"113","author":"V Verma","year":"2025","unstructured":"Verma V, Kumar S (2025) Quantum image encryption algorithm based on 3D-BNM chaotic map. Nonlinear Dyn 113:3829\u20133855","journal-title":"Nonlinear Dyn"},{"key":"541_CR33","doi-asserted-by":"publisher","first-page":"115987","DOI":"10.1016\/j.chaos.2024.115987","volume":"192","author":"V Vismaya","year":"2025","unstructured":"Vismaya V, Muni SS, Panda AK, Mondal B (2025) Degn-Harrison map: dynamical and network behaviours with applications in image encryption. Chaos Soliton Fract 192:115987","journal-title":"Chaos Soliton Fract"},{"key":"541_CR34","doi-asserted-by":"publisher","first-page":"1324","DOI":"10.1109\/TCYB.2021.3129808","volume":"53","author":"Y Wang","year":"2021","unstructured":"Wang Y et al (2021) From chaos to pseudorandomness: a case study on the 2-d coupled map lattice. IEEE Trans Cybern 53:1324\u20131334","journal-title":"IEEE Trans Cybern"},{"key":"541_CR35","doi-asserted-by":"publisher","first-page":"1943","DOI":"10.1007\/s11071-014-1259-7","volume":"76","author":"X Wang","year":"2014","unstructured":"Wang X, Guo K (2014) A new image alternate encryption algorithm based on chaotic map. Nonlinear Dyn 76:1943\u20131950","journal-title":"Nonlinear Dyn"},{"key":"541_CR36","doi-asserted-by":"publisher","first-page":"1291","DOI":"10.1109\/TCSI.2021.3133318","volume":"69","author":"X Wang","year":"2021","unstructured":"Wang X, Liu P (2021) A new full chaos coupled mapping lattice and its application in privacy image encryption. IEEE Trans Circuits Syst I Regul Pap 69:1291\u20131301","journal-title":"IEEE Trans Circuits Syst I Regul Pap"},{"key":"541_CR37","doi-asserted-by":"publisher","first-page":"2373","DOI":"10.1007\/s11071-015-2488-0","volume":"83","author":"Y Wang","year":"2016","unstructured":"Wang Y, Liu Z, Ma J, He H (2016) A pseudorandom number generator based on piecewise logistic map. Nonlinear Dyn 83:2373\u20132391","journal-title":"Nonlinear Dyn"},{"key":"541_CR38","doi-asserted-by":"publisher","first-page":"12755","DOI":"10.1007\/s00521-021-05921-y","volume":"33","author":"K Wang","year":"2021","unstructured":"Wang K, Wu X, Gao T (2021) Double color images compression-encryption via compressive sensing. Neural Comput Appl 33:12755\u201312776","journal-title":"Neural Comput Appl"},{"key":"541_CR39","doi-asserted-by":"publisher","first-page":"114793","DOI":"10.1016\/j.chaos.2024.114793","volume":"182","author":"S Yan","year":"2024","unstructured":"Yan S et al (2024) A fractional-order hyperchaotic system that is period in integer-order case and its application in a novel high-quality color image encryption algorithm. Chaos Solitons Fract 182:114793","journal-title":"Chaos Solitons Fract"},{"key":"541_CR40","doi-asserted-by":"publisher","first-page":"122430","DOI":"10.1016\/j.ins.2025.122430","volume":"719","author":"M Yao","year":"2025","unstructured":"Yao M, Deng H, Chen Z, Zhang P (2025) Efficient and secure image compression and encryption based on compressive sensing and four-dimensional hyperchaotic system. Inf Sci 719:122430","journal-title":"Inf Sci"},{"key":"541_CR41","doi-asserted-by":"publisher","first-page":"276","DOI":"10.3390\/e27030276","volume":"27","author":"C Ye","year":"2025","unstructured":"Ye C et al (2025) Social image security with encryption and watermarking in hybrid domains. Entropy 27:276","journal-title":"Entropy"},{"key":"541_CR42","doi-asserted-by":"publisher","first-page":"102475","DOI":"10.1016\/j.vlsi.2025.102475","volume":"104","author":"F Yu","year":"2025","unstructured":"Yu F et al (2025) Dynamical analysis, hardware implementation, and image encryption application of new 4d discrete hyperchaotic maps based on parallel and cascade memristors. Integration 104:102475","journal-title":"Integration"},{"key":"541_CR43","doi-asserted-by":"publisher","first-page":"638","DOI":"10.3390\/axioms14080638","volume":"14","author":"F Yu","year":"2025","unstructured":"Yu F et al (2025) Dynamic analysis and application of 6d multistable memristive chaotic system with wide range of hyperchaotic states. Axioms 14:638","journal-title":"Axioms"},{"key":"541_CR44","doi-asserted-by":"publisher","first-page":"4564","DOI":"10.1109\/TCAD.2025.3567878","volume":"44","author":"F Yu","year":"2025","unstructured":"Yu F, He S, Yao W, Cai S, Xu Q (2025) Bursting firings in memristive hopffeld neural network with image encryption and hardware implementation. IEEE Trans Comput-Aided Des Integr Circuits Syst 44:4564","journal-title":"IEEE Trans Comput-Aided Des Integr Circuits Syst"},{"key":"541_CR45","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1016\/j.ins.2020.07.058","volume":"547","author":"Y Zhang","year":"2021","unstructured":"Zhang Y (2021) A new unified image encryption algorithm based on a lifting transformation and chaos. Inf Sci 547:307\u2013327","journal-title":"Inf Sci"},{"key":"541_CR46","doi-asserted-by":"publisher","first-page":"115076","DOI":"10.1016\/j.chaos.2024.115076","volume":"185","author":"H Zhao","year":"2024","unstructured":"Zhao H, Wang S, Fu Z (2024) A new image encryption algorithm based on cubic fractal matrix and L-LCCML system. Chaos Solitons Fract 185:115076","journal-title":"Chaos Solitons Fract"},{"key":"541_CR47","doi-asserted-by":"publisher","first-page":"109107","DOI":"10.1016\/j.sigpro.2023.109107","volume":"211","author":"NR Zhou","year":"2023","unstructured":"Zhou NR, Tong LJ, Zou WP (2023) Multi-image encryption scheme with quaternion discrete fractional tchebyshev moment transform and cross-coupling operation. Signal Process 211:109107","journal-title":"Signal Process"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00541-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-025-00541-8","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00541-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T08:03:29Z","timestamp":1768377809000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s42400-025-00541-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,14]]},"references-count":47,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["541"],"URL":"https:\/\/doi.org\/10.1186\/s42400-025-00541-8","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,14]]},"assertion":[{"value":"20 September 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"103"}}