{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T16:14:11Z","timestamp":1774455251673,"version":"3.50.1"},"reference-count":57,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T00:00:00Z","timestamp":1761782400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Natural Science Support Program Project of the Xinjiang Production and Construction Corps","award":["2025DB024"],"award-info":[{"award-number":["2025DB024"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>With the rapid advancement of hyperspectral remote sensing technology, the security of hyperspectral images (HSIs) has become a critical concern. However, traditional image encryption methods\u2014designed primarily for grayscale or RGB images\u2014fail to address the high dimensionality, large data volume, and spectral-domain characteristics inherent to HSIs. Existing chaotic encryption schemes often suffer from limited chaotic performance, narrow parameter ranges, and inadequate spectral protection, leaving HSIs vulnerable to spectral feature extraction and statistical attacks. To overcome these limitations, this paper proposes a novel hyperspectral image encryption algorithm based on a newly designed two-dimensional cross-coupled hyperchaotic map (2D-CSCM), which synergistically integrates Cubic, Sinusoidal, and Chebyshev maps. The 2D-CSCM exhibits superior hyperchaotic behavior, including a wider hyperchaotic parameter range, enhanced randomness, and higher complexity, as validated by Lyapunov exponents, sample entropy, and NIST tests. Building on this, a layered encryption framework is introduced: spectral-band scrambling to conceal spectral curves while preserving spatial structure, spatial pixel permutation to disrupt correlation, and a bit-level diffusion mechanism based on dynamic DNA encoding, specifically designed to secure high bit-depth digital number (DN) values (typically &gt;8 bits). Experimental results on multiple HSI datasets demonstrate that the proposed algorithm achieves near-ideal information entropy (up to 15.8107 for 16-bit data), negligible adjacent-pixel correlation (below 0.01), and strong resistance to statistical, cropping, and differential attacks (NPCR \u2248 99.998%, UACI \u2248 33.30%). The algorithm not only ensures comprehensive encryption of both spectral and spatial information but also supports lossless decryption, offering a robust and practical solution for secure storage and transmission of hyperspectral remote sensing imagery.<\/jats:p>","DOI":"10.3390\/e27111117","type":"journal-article","created":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T01:23:59Z","timestamp":1761873839000},"page":"1117","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Hyperspectral Remote Sensing Image Encryption Algorithm Based on a Novel Two-Dimensional Hyperchaotic Map"],"prefix":"10.3390","volume":"27","author":[{"given":"Zongyue","family":"Bai","sequence":"first","affiliation":[{"name":"College of Information Science and Technology, Shihezi University, Shihezi 832002, China"},{"name":"Geospatial Information Engineering Research Center, Xinjiang Production and Construction Corps, Shihezi 832002, China"},{"name":"Industrial Technology Research Institute, Xinjiang Production and Construction Corps, Shihezi 832002, China"}]},{"given":"Qingzhan","family":"Zhao","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Shihezi University, Shihezi 832002, China"},{"name":"Geospatial Information Engineering Research Center, Xinjiang Production and Construction Corps, Shihezi 832002, China"},{"name":"Industrial Technology Research Institute, Xinjiang Production and Construction Corps, Shihezi 832002, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7484-2169","authenticated-orcid":false,"given":"Wenzhong","family":"Tian","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Shihezi University, Shihezi 832002, China"},{"name":"Geospatial Information Engineering Research Center, Xinjiang Production and Construction Corps, Shihezi 832002, China"},{"name":"Industrial Technology Research Institute, Xinjiang Production and Construction Corps, Shihezi 832002, China"}]},{"given":"Xuewen","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Shihezi University, Shihezi 832002, China"},{"name":"Geospatial Information Engineering Research Center, Xinjiang Production and Construction Corps, Shihezi 832002, China"},{"name":"Industrial Technology Research Institute, Xinjiang Production and Construction Corps, Shihezi 832002, China"}]},{"given":"Jingyang","family":"Li","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Shihezi University, Shihezi 832002, China"},{"name":"Geospatial Information Engineering Research Center, Xinjiang Production and Construction Corps, Shihezi 832002, China"},{"name":"Industrial Technology Research Institute, Xinjiang Production and Construction Corps, Shihezi 832002, China"}]},{"given":"Yuzhen","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Information Network Security, Xinjiang University of Political Science and Law, Tumxuk 843900, China"}]}],"member":"1968","published-online":{"date-parts":[[2025,10,30]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"3099","DOI":"10.1109\/JSTARS.2024.3522318","article-title":"UAV Hyperspectral Remote Sensing Image Classification: A Systematic Review","volume":"18","author":"Zhang","year":"2025","journal-title":"IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"100658","DOI":"10.1016\/j.cosrev.2024.100658","article-title":"Deep learning for hyperspectral image classification: A survey","volume":"53","author":"Kumar","year":"2024","journal-title":"Comput. Sci. Rev."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1579","DOI":"10.1109\/TGRS.2017.2765364","article-title":"Recent Advances on Spectral\u2013Spatial Hyperspectral Image Classification: An Overview and New Guidelines","volume":"56","author":"He","year":"2018","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"102620","DOI":"10.1016\/j.asej.2023.102620","article-title":"An optimized chaotic S-box for real-time image encryption scheme based on 4-dimensional memristive hyperchaotic map","volume":"15","author":"Vijayakumar","year":"2024","journal-title":"Ain Shams Eng. J."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"101980","DOI":"10.1016\/j.jksuci.2024.101980","article-title":"Quantum-enhanced Chaotic Image Encryption: Strengthening Digital Data Security With 1-D Sine-based Chaotic Maps and Quantum Coding","volume":"36","year":"2024","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Alsubaei, F.S., Alneil, A.A., Mohamed, A., and Mustafa Hilal, A. (2023). Block-Scrambling-Based Encryption with Deep-Learning-Driven Remote Sensing Image Classification. Remote Sens., 15.","DOI":"10.3390\/rs15041022"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Li, Y.-M., Jiang, M., Wei, D., and Deng, Y. (2024). A Novel Image Encryption Algorithm Based on Compressive Sensing and a Two-Dimensional Linear Canonical Transform. Fractal Fract., 8.","DOI":"10.3390\/fractalfract8020092"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"110726","DOI":"10.1016\/j.optlastec.2024.110726","article-title":"A robust color image watermarking scheme in the fusion domain based on LU factorization","volume":"174","author":"Su","year":"2024","journal-title":"Opt. Laser Technol."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"121190","DOI":"10.1016\/j.eswa.2023.121190","article-title":"Enabling secure image transmission in unmanned aerial vehicle using digital image watermarking with H-Grey optimization","volume":"236","author":"Singh","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Zhou, Q., Sun, H., Pang, X., Ai, C., Zhu, X., Zhu, C., and Ren, N. (2024). Watermarking Algorithm for Remote Sensing Images Based on Ring-Shaped Template Watermark and Multiscale LCM. Remote Sens., 16.","DOI":"10.3390\/rs16142535"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Ye, C., Tan, S., Wang, J., Shi, L., Zuo, Q., and Feng, W. (2025). Social Image Security with Encryption and Watermarking in Hybrid Domains. Entropy, 27.","DOI":"10.3390\/e27030276"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/s11831-018-9298-8","article-title":"A Comprehensive Review on Image Encryption Techniques","volume":"27","author":"Kaur","year":"2020","journal-title":"Arch. Comput. Methods Eng."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"110102","DOI":"10.1016\/j.chaos.2020.110102","article-title":"A new one-dimensional chaotic system with applications in image encryption","volume":"139","author":"Wang","year":"2020","journal-title":"Chaos Solitons Fractals"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1157","DOI":"10.1049\/iet-ipr.2019.0551","article-title":"Efficient symmetric image encryption by using a novel 2D chaotic system","volume":"14","author":"Huang","year":"2020","journal-title":"IET Image Process."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"564","DOI":"10.1016\/j.aej.2025.03.026","article-title":"A novel 3-D image encryption algorithm based on SHA-256 and chaos theory","volume":"122","author":"Singh","year":"2025","journal-title":"Alex. Eng. J."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1016\/j.joes.2022.04.002","article-title":"A new fractional order 6D chaotic model: Study of model dynamics, system structure graph, electronic circuit realization and fractional control","volume":"9","author":"Higazy","year":"2024","journal-title":"J. Ocean Eng. Sci."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"3063","DOI":"10.1007\/s11760-023-02971-8","article-title":"CLSM-IEA: A novel cosine-logistic-sine map and its application in a new image encryption scheme","volume":"18","author":"Gao","year":"2024","journal-title":"Signal Image Video Process."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","article-title":"2D Sine Logistic modulation map for image encryption","volume":"297","author":"Hua","year":"2015","journal-title":"Inf. Sci."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"14081","DOI":"10.1109\/ACCESS.2019.2893538","article-title":"2D Logistic-Modulated-Sine-Coupling-Logistic Chaotic Map for Image Encryption","volume":"7","author":"Zhu","year":"2019","journal-title":"IEEE Access"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/j.ins.2022.05.032","article-title":"Image encryption algorithm based on a 2D-CLSS hyperchaotic map using simultaneous permutation and diffusion","volume":"605","author":"Teng","year":"2022","journal-title":"Inf. Sci."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"2815","DOI":"10.1007\/s11071-022-07942-1","article-title":"Quantum image encryption scheme based on 2D chaotic map","volume":"111","author":"Hu","year":"2023","journal-title":"Nonlinear Dyn."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Yu, F., He, S., Yao, W., Cai, S., and Xu, Q. (2025). Bursting Firings in Memristive Hopfield Neural Network with Image Encryption and Hardware Implementation. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst.","DOI":"10.1109\/TCAD.2025.3567878"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"102475","DOI":"10.1016\/j.vlsi.2025.102475","article-title":"Dynamical Analysis, Hardware Implementation, and Image Encryption Application of New 4D Discrete Hyperchaotic Maps Based on Parallel and Cascade Memristors","volume":"104","author":"Yu","year":"2025","journal-title":"Integration"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Yu, F., Gracia, Y.M., Guo, R., Ying, Z., Xu, J., Yao, W., Jin, J., and Lin, H. (2025). Dynamic Analysis and Application of 6D Multistable Memristive Chaotic System with Wide Range of Hyperchaotic States. Axioms, 14.","DOI":"10.3390\/axioms14080638"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Feng, W., Zhang, K., Zhang, J., Zhao, X., Chen, Y., Cai, B., Zhu, Z., Wen, H., and Ye, C. (2025). Integrating Fractional-Order Hopfield Neural Network with Differentiated Encryption: Achieving High-Performance Privacy Protection for Medical Images. Fractal Fract., 9.","DOI":"10.3390\/fractalfract9070426"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"103424","DOI":"10.1016\/j.jvcir.2021.103424","article-title":"Security Measurement of a Medical Communication Scheme Based on Chaos and DNA Coding","volume":"83","author":"Chen","year":"2022","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"12584","DOI":"10.1109\/ACCESS.2019.2893760","article-title":"Cryptanalysis and Improvement of the Image Encryption Scheme Based on 2D Logistic-Adjusted-Sine Map","volume":"7","author":"Feng","year":"2019","journal-title":"IEEE Access"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"145459","DOI":"10.1109\/ACCESS.2021.3123571","article-title":"Cryptanalysis and Improvement of the Image Encryption Scheme Based on Feistel Network and Dynamic DNA Encoding","volume":"9","author":"Feng","year":"2021","journal-title":"IEEE Access"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1053","DOI":"10.1109\/TSMCB.2012.2185842","article-title":"H\u221e state estimation for discrete-time chaotic systems based on a unified model","volume":"42","author":"Liu","year":"2012","journal-title":"IEEE Trans. Syst. Man Cybern. Part B (Cybern.)"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"4426","DOI":"10.1109\/TSP.2012.2195659","article-title":"Convergence analysis for initial condition estimation in coupled map lattice systems","volume":"60","author":"Lin","year":"2012","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/TSMCC.2008.2006988","article-title":"Detection and prognostics on low-dimensional systems","volume":"39","author":"Srivastava","year":"2009","journal-title":"IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.)"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Li, H., Yu, S., Feng, W., Chen, Y., Zhang, J., Qin, Z., Zhu, Z., and Wozniak, M. (2023). Exploiting Dynamic Vector-Level Operations and a 2D-Enhanced Logistic Modular Map for Efficient Chaotic Image Encryption. Entropy, 25.","DOI":"10.3390\/e25081147"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1142\/S021812749800098X","article-title":"Symmetric ciphers based on two-dimensional chaotic maps","volume":"8","author":"Fridrich","year":"1998","journal-title":"Int. J. Bifurc. Chaos"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"106393","DOI":"10.1016\/j.optlaseng.2020.106393","article-title":"Chaotic image encryption algorithm based on hybrid multi-objective particle swarm optimization and DNA sequence","volume":"137","author":"Wang","year":"2021","journal-title":"Opt. Lasers Eng."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"121090","DOI":"10.1016\/j.eswa.2023.121090","article-title":"Mutil-medical image encryption by a new spatiotemporal chaos model and DNA new computing for information security","volume":"235","author":"Liu","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"22679","DOI":"10.1007\/s11071-023-09020-6","article-title":"Color image encryption algorithm based on novel 2D hyper-chaotic system and DNA crossover and mutation","volume":"111","author":"Wang","year":"2023","journal-title":"Nonlinear Dyn."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"112016","DOI":"10.1016\/j.asoc.2024.112016","article-title":"Harris Hawk optimization driven adaptive image encryption integrating Hilbert vibrational decomposition and chaos","volume":"164","author":"Sharma","year":"2024","journal-title":"Appl. Soft Comput."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Ad\u00e3o, T., Hru\u0161ka, J., P\u00e1dua, L., Bessa, J., Peres, E., Morais, R., and Sousa, J.J. (2017). Hyperspectral Imaging: A Review on UAV-Based Sensors, Data Processing and Applications for Agriculture and Forestry. Remote Sens., 9.","DOI":"10.3390\/rs9111110"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"123583","DOI":"10.1016\/j.eswa.2024.123583","article-title":"Cross-channel color image encryption through 2D hyperchaotic hybrid map of optimization test functions","volume":"249","author":"Toktas","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"119076","DOI":"10.1016\/j.eswa.2022.119076","article-title":"2D hyperchaotic system based on Schaffer function for image encryption","volume":"213","author":"Erkan","year":"2023","journal-title":"Expert Syst. Appl."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"2869","DOI":"10.1007\/s11071-022-07756-1","article-title":"A color image encryption algorithm based on hyperchaotic map and Rubik\u2019s Cube scrambling","volume":"110","author":"Qiu","year":"2022","journal-title":"Nonlinear Dyn."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"115704","DOI":"10.1016\/j.chaos.2024.115704","article-title":"A Special Memristive Diode-Bridge-Based Hyperchaotic Hyperjerk Autonomous Circuit with Three Positive Lyapunov Exponents","volume":"189","author":"Rong","year":"2024","journal-title":"Chaos Solitons Fract."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Feng, W., Wang, Q., Liu, H., Ren, Y., Zhang, J., Zhang, S., Qian, K., and Wen, H. (2023). Exploiting Newly Designed Fractional-Order 3D Lorenz Chaotic System and 2D Discrete Polynomial Hyper-Chaotic Map for High-Performance Multi-Image Encryption. Fractal Fract., 7.","DOI":"10.3390\/fractalfract7120887"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0167-2789(96)00216-3","article-title":"An efficient QR based method for the computation of Lyapunov exponents","volume":"101","author":"Udwadia","year":"1997","journal-title":"Phys. D Nonlinear Phenom."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"6773","DOI":"10.1007\/s11071-022-08101-2","article-title":"Pseudorandom number generator based on novel 2D H\u00e9non-Sine hyperchaotic map with microcontroller implementation","volume":"111","year":"2023","journal-title":"Nonlinear Dyn."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"H2039","DOI":"10.1152\/ajpheart.2000.278.6.H2039","article-title":"Physiological time-series analysis using approximate entropy and sample entropy","volume":"278","author":"Richman","year":"2000","journal-title":"Am. J. Physiol. Heart Circ. Physiol."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"103818","DOI":"10.1016\/j.dsp.2022.103818","article-title":"Color image encryption based on 2D enhanced hyperchaotic logistic-sine map and two-way Josephus traversing","volume":"132","author":"Wang","year":"2023","journal-title":"Digit. Signal Process."},{"key":"ref_48","unstructured":"Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel, M., Banks, D., and Heckert, N. (2010). A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, National Institute of Standards and Technology. NIST Special Publication 800-22."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"1777","DOI":"10.1117\/1.1766301","article-title":"New hyperspectral discrimination measure for spectral characterization","volume":"43","author":"Du","year":"2004","journal-title":"Opt. Eng."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/s11554-023-01294-8","article-title":"Real-time image encryption algorithm based on combined chaotic map and optimized lifting wavelet transform","volume":"20","author":"Mao","year":"2023","journal-title":"J. Real-Time Image Process."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"2511","DOI":"10.1109\/TCSI.2023.3250713","article-title":"Globally Coupled Private Image Encryption Algorithm Based on Infinite Interval Spatiotemporal Chaotic System","volume":"70","author":"Liu","year":"2023","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"1773","DOI":"10.1007\/s11071-022-07276-y","article-title":"Grayscale and colored image encryption model using a novel fused magic cube","volume":"108","author":"Rani","year":"2022","journal-title":"Nonlinear Dyn."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"110309","DOI":"10.1016\/j.chaos.2020.110309","article-title":"Image encryption algorithm based on Tent-Dynamics coupled map lattices and diffusion of Household","volume":"141","author":"Wang","year":"2020","journal-title":"Chaos Solitons Fractals"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"112456","DOI":"10.1016\/j.chaos.2022.112456","article-title":"Image encryption algorithm based on hyperchaotic system and a new DNA sequence operation","volume":"162","author":"Yu","year":"2022","journal-title":"Chaos Solitons Fractals"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"10633","DOI":"10.1007\/s11071-024-09645-1","article-title":"Partial-privacy image encryption algorithm based on time-varying delayed exponentially controlled chaotic system","volume":"112","author":"Wang","year":"2024","journal-title":"Nonlinear Dyn."},{"key":"ref_56","first-page":"102711","article-title":"Chaos and compressive sensing based novel image encryption scheme","volume":"58","author":"Khan","year":"2021","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_57","first-page":"31","article-title":"NPCR and UACI randomness tests for image encryption","volume":"1","author":"Wu","year":"2011","journal-title":"Cybern. J. Multidiscip. J. Sci. Technol. J. Sel. Areas Telecommun."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/27\/11\/1117\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T13:44:49Z","timestamp":1762177489000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/27\/11\/1117"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,30]]},"references-count":57,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2025,11]]}},"alternative-id":["e27111117"],"URL":"https:\/\/doi.org\/10.3390\/e27111117","relation":{},"ISSN":["1099-4300"],"issn-type":[{"value":"1099-4300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,30]]}}}