{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T02:12:10Z","timestamp":1760235130700,"version":"build-2065373602"},"reference-count":61,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2021,7,31]],"date-time":"2021-07-31T00:00:00Z","timestamp":1627689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62071088"],"award-info":[{"award-number":["62071088"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>In the current network and big data environment, the secure transmission of digital images is facing huge challenges. The use of some methodologies in artificial intelligence to enhance its security is extremely cutting-edge and also a development trend. To this end, this paper proposes a security-enhanced image communication scheme based on cellular neural network (CNN) under cryptanalysis. First, the complex characteristics of CNN are used to create pseudorandom sequences for image encryption. Then, a plain image is sequentially confused, permuted and diffused to get the cipher image by these CNN-based sequences. Based on cryptanalysis theory, a security-enhanced algorithm structure and relevant steps are detailed. Theoretical analysis and experimental results both demonstrate its safety performance. Moreover, the structure of image cipher can effectively resist various common attacks in cryptography. Therefore, the image communication scheme based on CNN proposed in this paper is a competitive security technology method.<\/jats:p>","DOI":"10.3390\/e23081000","type":"journal-article","created":{"date-parts":[[2021,8,1]],"date-time":"2021-08-01T21:51:07Z","timestamp":1627854667000},"page":"1000","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["A Security-Enhanced Image Communication Scheme Using Cellular Neural Network"],"prefix":"10.3390","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1178-4598","authenticated-orcid":false,"given":"Heping","family":"Wen","sequence":"first","affiliation":[{"name":"Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China"},{"name":"School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China"},{"name":"Guangdong Provincial Key Laboratory of Information Security Technology, Guangzhou 510006, China"}]},{"given":"Jiajun","family":"Xu","sequence":"additional","affiliation":[{"name":"Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China"}]},{"given":"Yunlong","family":"Liao","sequence":"additional","affiliation":[{"name":"Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China"}]},{"given":"Ruiting","family":"Chen","sequence":"additional","affiliation":[{"name":"Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China"}]},{"given":"Danze","family":"Shen","sequence":"additional","affiliation":[{"name":"Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China"}]},{"given":"Lifei","family":"Wen","sequence":"additional","affiliation":[{"name":"Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China"}]},{"given":"Yulin","family":"Shi","sequence":"additional","affiliation":[{"name":"Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China"}]},{"given":"Qin","family":"Lin","sequence":"additional","affiliation":[{"name":"Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China"}]},{"given":"Zhonghao","family":"Liang","sequence":"additional","affiliation":[{"name":"Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China"}]},{"given":"Sihang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China"}]},{"given":"Yuxuan","family":"Liu","sequence":"additional","affiliation":[{"name":"Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China"}]},{"given":"Ailin","family":"Huo","sequence":"additional","affiliation":[{"name":"Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China"}]},{"given":"Tong","family":"Li","sequence":"additional","affiliation":[{"name":"Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China"}]},{"given":"Chang","family":"Cai","sequence":"additional","affiliation":[{"name":"Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China"}]},{"given":"Jiaqian","family":"Wen","sequence":"additional","affiliation":[{"name":"Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China"}]},{"given":"Chongfu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China"},{"name":"School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China"}]}],"member":"1968","published-online":{"date-parts":[[2021,7,31]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"6954","DOI":"10.3390\/e17106954","article-title":"A Novel Image Encryption Algorithm Based on DNA Encoding and Spatiotemporal Chaos","volume":"17","author":"Chunyan","year":"2015","journal-title":"Entropy"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1080\/03772063.2016.1251855","article-title":"Chaotic Image Encryption with Hash Keying as Key Generator","volume":"63","author":"Gopalakrishnan","year":"2017","journal-title":"IETE J. Res."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"66395","DOI":"10.1109\/ACCESS.2019.2911559","article-title":"Fourth Order MCA and Chaos-Based Image Encryption Scheme","volume":"7","author":"Li","year":"2019","journal-title":"IEEE Access"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.optlaseng.2016.08.009","article-title":"A novel chaos-based image encryption algorithm using DNA sequence operations","volume":"88","author":"Chai","year":"2017","journal-title":"Opt. Lasers Eng."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"543","DOI":"10.1007\/s11071-018-4208-z","article-title":"Synchronization of chaotic-type delayed neural networks and its application","volume":"93","author":"Kalpana","year":"2018","journal-title":"Nonlinear Dyn."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1016\/j.image.2018.01.002","article-title":"Cryptanalysis of a chaotic image encryption scheme based on permutation-diffusion structure","volume":"62","author":"Li","year":"2018","journal-title":"Signal Process. Image Commun."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"74734","DOI":"10.1109\/ACCESS.2019.2921309","article-title":"A chaos-based image encryption technique utilizing hilbert curves and h-fractals","volume":"7","author":"Zhang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1016\/j.sigpro.2016.10.002","article-title":"On the cryptanalysis of Fridrich\u2019s chaotic image encryption scheme","volume":"132","author":"Xie","year":"2017","journal-title":"Signal Process."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1080\/02564602.2018.1533892","article-title":"Image Encryption Based on Block-wise Fractional Fourier Transform with Wavelet Transform","volume":"36","author":"Panna","year":"2019","journal-title":"IETE Tech. Rev."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"25569","DOI":"10.1007\/s11042-018-5807-x","article-title":"Optimizing chaos based image encryption","volume":"77","author":"Noshadian","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1080\/13682199.2020.1732116","article-title":"A chaos-based image encryption algorithm based on multiresolution singular value decomposition and a symmetric attractor","volume":"68","author":"Musanna","year":"2020","journal-title":"Imaging Sci. J."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1016\/j.optlaseng.2016.10.020","article-title":"A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation","volume":"90","author":"Li","year":"2017","journal-title":"Opt. Lasers Eng."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"24091","DOI":"10.1007\/s11042-016-4113-8","article-title":"A security enhanced robust audio steganography algorithm for image hiding using sample comparison in discrete wavelet transform domain and RSA encryption","volume":"76","author":"Korany","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"209471","DOI":"10.1109\/ACCESS.2020.3038006","article-title":"Cryptanalzing a Novel Hyper-Chaotic Image Encryption Scheme Based on Pixel-Level Filtering and DNA-Level Diffusion","volume":"8","author":"Feng","year":"2020","journal-title":"IEEE Access"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"137731","DOI":"10.1109\/ACCESS.2020.3010794","article-title":"A New Chaotic Map With Dynamic Analysis and Encryption Application in Internet of Health Things","volume":"8","author":"Tsafack","year":"2020","journal-title":"IEEE Access"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/s11760-014-0663-2","article-title":"A novel template protection scheme for multibiometrics based on fuzzy commitment and chaotic system","volume":"9","author":"Wang","year":"2015","journal-title":"Signal Image Video Process."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"105942","DOI":"10.1016\/j.optlastec.2019.105942","article-title":"Controlled alternate quantum walks based privacy preserving healthcare images in Internet of Things","volume":"124","year":"2020","journal-title":"Opt. Laser Technol."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"3669","DOI":"10.1364\/OE.416154","article-title":"Compressive sensing chaotic encryption algorithms for OFDM-PON data transmission","volume":"29","author":"Wu","year":"2021","journal-title":"Opt. Express"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1016\/j.ins.2018.12.048","article-title":"Cosine-transform-based chaotic system for image encryption","volume":"480","author":"Hua","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"17669","DOI":"10.1007\/s11042-020-08645-8","article-title":"A multidimensional chaotic image encryption algorithm based on the region of interest","volume":"79","author":"Liu","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/s11071-016-3030-8","article-title":"An image encryption scheme based on chaotic tent map","volume":"87","author":"Li","year":"2017","journal-title":"Nonlinear Dyn."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1007\/s11071-018-4056-x","article-title":"Brief review on application of nonlinear dynamics in image encryption","volume":"92","author":"Ozkaynak","year":"2018","journal-title":"Nonlinear Dyn."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1873","DOI":"10.1016\/j.aej.2020.11.035","article-title":"A novel secure communications scheme based on chaotic modulation, recursive encryption and chaotic masking","volume":"60","author":"Ouannas","year":"2021","journal-title":"Alex. Eng. J."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/j.sigpro.2017.05.002","article-title":"Image encryption method based on chaotic fuzzy cellular neural networks","volume":"140","author":"Ratnavelu","year":"2017","journal-title":"Signal Process."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"29243","DOI":"10.1007\/s11042-020-09542-w","article-title":"A novel hyper-chaotic image encryption scheme based on quantum genetic algorithm and compressive sensing","volume":"79","author":"Cheng","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1016\/j.ijleo.2018.09.062","article-title":"Chaos-based image encryption using vertical-cavity surface-emitting lasers","volume":"176","author":"Roy","year":"2019","journal-title":"Optik"},{"key":"ref_27","first-page":"102361","article-title":"When an attacker meets a cipher-image in 2018: A year in review","volume":"48","author":"Li","year":"2019","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.optlaseng.2015.09.007","article-title":"A novel bit-level image encryption algorithm based on chaotic maps","volume":"78","author":"Xu","year":"2016","journal-title":"Opt. Lasers Eng."},{"key":"ref_29","unstructured":"He, C., Ming, K., Wang, Y., and Wang, Z. (2019). A Deep Learning Based Attack for The Chaos-based Image Encryption. arXiv."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1754009","DOI":"10.1142\/S021800141754009X","article-title":"Synchronization of generalized using to image encryption","volume":"31","author":"Li","year":"2017","journal-title":"Int. J. Pattern Recognit. Artif. Intell."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"13681","DOI":"10.1007\/s11042-016-3769-4","article-title":"An image encryption algorithm based on DNA sequence operations and cellular neural network","volume":"76","author":"Norouzi","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"20753","DOI":"10.1007\/s11042-020-08835-4","article-title":"Multiple-image encryption algorithm based on bit planes and chaos","volume":"79","author":"Zhang","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/MMUL.2018.112142439","article-title":"Cryptanalysis and Improvement of a Chaotic Image Encryption by First-Order Time-Delay System","volume":"25","author":"Li","year":"2018","journal-title":"IEEE Multimed."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"496","DOI":"10.1109\/TMI.2014.2361481","article-title":"Towards large-scale histopathological image analysis: Hashing-based image retrieval","volume":"34","author":"Zhang","year":"2015","journal-title":"IEEE Trans. Med. Imaging"},{"key":"ref_35","first-page":"1785","article-title":"An efficient chaotic image encryption algorithm based on self-adaptive model and feedback mechanism","volume":"11","author":"Zhang","year":"2017","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"14867","DOI":"10.1007\/s11042-018-6827-2","article-title":"A novel fractional order chaos-based image encryption using Fisher Yates algorithm and 3-D cat map","volume":"78","author":"Musanna","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"16087","DOI":"10.1007\/s11042-020-10413-7","article-title":"Chaos-based image encryption strategy based on random number embedding and DNA-level self-adaptive permutation and diffusion","volume":"80","author":"Wang","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Lin, M., Long, F., and Guo, L. (2016, January 28\u201330). Grayscale image encryption based on Latin square and cellular neural network. Proceedings of the 2016 Chinese Control and Decision Conference (CCDC), Yinchuan, China.","DOI":"10.1109\/CCDC.2016.7531456"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.sigpro.2019.02.016","article-title":"A new hybrid digital chaotic system with applications in image encryption","volume":"160","author":"Alawida","year":"2019","journal-title":"Signal Process."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"2137","DOI":"10.1109\/TIFS.2018.2812080","article-title":"Depreciating Motivation and Empirical Security Analysis of Chaos-Based Image and Video Encryption","volume":"13","author":"Preishuber","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_41","unstructured":"(2021, June 23). The USC-SIPI Image Database. Available online: http:\/\/sipi.usc.edu\/database."},{"key":"ref_42","unstructured":"(2021, June 23). The Ground Truth Database. Available online: http:\/\/www.cs.washington.edu\/research\/imagedatabase."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","article-title":"A symmetric image encryption scheme based on 3D chaotic cat maps","volume":"21","author":"Chen","year":"2004","journal-title":"Chaos Solitons Fractals"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Wen, H., Yu, S., and Luuml, J. (2019). Breaking an Image Encryption Algorithm Based on DNA Encoding and Spatiotemporal Chaos. Entropy, 21.","DOI":"10.3390\/e21030246"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"11675","DOI":"10.1007\/s11042-018-6711-0","article-title":"RADIANT - hybrid multilayered chaotic image encryption system for color images","volume":"78","author":"Sasikaladevi","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Wen, H., Zhang, C., Huang, L., Ke, J., and Xiong, D. (2021). Security Analysis of a Color Image Encryption Algorithm Using a Fractional-Order Chaos. Entropy, 23.","DOI":"10.3390\/e23020258"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1080\/09500340.2016.1246680","article-title":"An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box","volume":"64","author":"Khan","year":"2017","journal-title":"J. Mod. Opt."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"20481","DOI":"10.1109\/ACCESS.2021.3054952","article-title":"A Quantum Chaotic Image Cryptosystem and Its Application in IoT Secure Communication","volume":"9","author":"Weng","year":"2021","journal-title":"IEEE Access"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"42491","DOI":"10.1109\/ACCESS.2020.2974226","article-title":"Investigation of Chaotic Image Encryption in Spatial and FrFT Domains for Cybersecurity Applications","volume":"8","author":"Faragallah","year":"2020","journal-title":"IEEE Access"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"75119","DOI":"10.1109\/ACCESS.2020.2989172","article-title":"Security Improvement for OFDM-PON via DNA Extension Code and Chaotic Systems","volume":"8","author":"Wu","year":"2020","journal-title":"IEEE Access"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.ins.2019.04.007","article-title":"Adaptive control for fractional order induced chaotic fuzzy cellular neural networks and its application to image encryption","volume":"491","author":"Mani","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_52","first-page":"155","article-title":"An improved image encryption algorithm based on chaotic mapping and discrete wavelet transform domain","volume":"22","author":"Meng","year":"2020","journal-title":"Int. J. Netw. Secur."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"22023","DOI":"10.1007\/s11042-019-7453-3","article-title":"A novel chaotic image encryption algorithm based on improved baker map and logistic map","volume":"78","author":"Luo","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1140\/epjp\/i2019-12797-4","article-title":"Cryptanalysis of an image encryption cryptosystem based on binary bit planes extraction and multiple chaotic maps","volume":"134","author":"Wen","year":"2019","journal-title":"Eur. Phys. J. Plus"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"166320","DOI":"10.1016\/j.ijleo.2021.166320","article-title":"Laguerre-Gaussian mode purity of Gaussian vortex beams","volume":"230","author":"Pan","year":"2021","journal-title":"Optik"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"208718","DOI":"10.1109\/ACCESS.2020.3038183","article-title":"Chaotic Image Encryption Algorithm Based on Fractional Order Scrambling Wavelet Transform and 3D Cyclic Displacement Operation","volume":"8","author":"Yan","year":"2020","journal-title":"IEEE Access"},{"key":"ref_57","first-page":"75834","article-title":"Cryptanalysis of a Chaotic Image Encryption Algorithm Based on Information Entropy","volume":"6","author":"Li","year":"2018","journal-title":"IEEE J. Transl. Eng. Health Med."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"933","DOI":"10.1080\/09500340.2020.1789233","article-title":"Colour-image encryption based on 2D discrete wavelet transform and 3D logistic chaotic map","volume":"67","author":"Joshi","year":"2020","journal-title":"J. Mod. Opt."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"1267","DOI":"10.1007\/s00371-018-1574-y","article-title":"Double chaotic image encryption algorithm based on optimal sequence solution and fractional transform","volume":"35","author":"Li","year":"2019","journal-title":"Vis. Comput."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"1850047","DOI":"10.1142\/S0218127418500475","article-title":"A New Chaotic Image Encryption Scheme Using Breadth-First Search and Dynamic Diffusion","volume":"28","author":"Yin","year":"2018","journal-title":"Int. J. Bifurc. Chaos"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"2469","DOI":"10.1109\/TIP.2016.2545300","article-title":"Instance-aware hashing for multi-label image retrieval","volume":"25","author":"Lai","year":"2016","journal-title":"IEEE Trans. Image Process."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/23\/8\/1000\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T06:38:05Z","timestamp":1760164685000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/23\/8\/1000"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,31]]},"references-count":61,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2021,8]]}},"alternative-id":["e23081000"],"URL":"https:\/\/doi.org\/10.3390\/e23081000","relation":{},"ISSN":["1099-4300"],"issn-type":[{"type":"electronic","value":"1099-4300"}],"subject":[],"published":{"date-parts":[[2021,7,31]]}}}