{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T23:55:05Z","timestamp":1768348505942,"version":"3.49.0"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"9-10","license":[{"start":{"date-parts":[[2019,12,18]],"date-time":"2019-12-18T00:00:00Z","timestamp":1576627200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,12,18]],"date-time":"2019-12-18T00:00:00Z","timestamp":1576627200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1007\/s11042-019-08570-5","type":"journal-article","created":{"date-parts":[[2019,12,19]],"date-time":"2019-12-19T00:04:17Z","timestamp":1576713857000},"page":"6891-6914","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["A new watermarking scheme based on Daubechies wavelet and chaotic map for quick response code images"],"prefix":"10.1007","volume":"79","author":[{"given":"Umer Aziz","family":"Waqas","sequence":"first","affiliation":[]},{"given":"Majid","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Syeda Iram","family":"Batool","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,18]]},"reference":[{"issue":"9","key":"8570_CR1","doi-asserted-by":"publisher","first-page":"3091","DOI":"10.1007\/s10773-019-04188-3","volume":"58","author":"KM Ali","year":"2019","unstructured":"Ali KM, Khan M (2019) Application based construction and optimization of substitution boxes over 2D mixed chaotic maps. Int J Theor Phys 58(9):3091\u20133117","journal-title":"Int J Theor Phys"},{"key":"8570_CR2","unstructured":"Ali KM, Khan M (2019) A new construction of confusion component of block ciphers. Multimed Tools Appl:1\u201320"},{"key":"8570_CR3","doi-asserted-by":"crossref","unstructured":"Arshad U, Batool SI, Amin M (2019) A novel image encryption scheme based on Walsh compressed quantum spinning chaotic Lorenz system. Int J Theor Phys:1\u201324","DOI":"10.1007\/s10773-019-04221-5"},{"key":"8570_CR4","unstructured":"Batool SI, Waseem HM (2019) A novel image encryption scheme based on Arnold scrambling and Lucas series. Multimed Tools Appl:1\u201327"},{"key":"8570_CR5","doi-asserted-by":"publisher","first-page":"2037","DOI":"10.1007\/s00521-014-1691-0","volume":"25","author":"SI Batool","year":"2014","unstructured":"Batool SI, Khan M, Shah T (2014) A color image watermarking scheme based on affine transformation and S4 permutation. Neural Comput Appl 25:2037\u20132045","journal-title":"Neural Comput Appl"},{"key":"8570_CR6","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1109\/TPAMI.1980.4767008","volume":"2","author":"RW Conners","year":"1980","unstructured":"Conners RW, Harlow CA (1980) A theoretical comparison of texture algorithms. IEEE Trans Pattern Anal Mach Intell 2:204\u2013222","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"8570_CR7","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/0734-189X(84)90197-X","volume":"25","author":"RW Conners","year":"1984","unstructured":"Conners RW, Trivedi MM, Harlow CA (1984) Segmentation of a high-resolution urban scene using texture operators. Comput Vis Graph Image Process 25:273\u2013310","journal-title":"Comput Vis Graph Image Process"},{"key":"8570_CR8","doi-asserted-by":"crossref","unstructured":"Firdousi F, Batool SI, Amin M (2019) A novel construction scheme for nonlinear component based on quantum map. Int J Theor Phys:1\u201328","DOI":"10.1007\/s10773-019-04254-w"},{"key":"8570_CR9","doi-asserted-by":"crossref","unstructured":"Geo M, Sun B (2012) Blinding watermark algorithm based on QR-code. Found Intell Syst Adv Intell Soft Comput 122:457\u2013462","DOI":"10.1007\/978-3-642-25664-6_52"},{"key":"8570_CR10","unstructured":"Gunjal BL, Mali SN (2011) Secured color image watermarking technique in DWT-DCT domain. arXiv preprint arXiv:1109.2325"},{"key":"8570_CR11","first-page":"171","volume":"11","author":"RM Haralick","year":"1973","unstructured":"Haralick RM, Shanmugam K (1973) Computer classification of reservoir sandstones. IEEE Trans Geo Eng 11:171\u2013177","journal-title":"IEEE Trans Geo Eng"},{"key":"8570_CR12","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1109\/TSMC.1973.4309314","volume":"3","author":"RM Haralick","year":"1973","unstructured":"Haralick RM, Shanmugam K, Dinstein I (1973) Textural features for image classification. IEEE Trans Syst Man Cybern 3:610\u2013621","journal-title":"IEEE Trans Syst Man Cybern"},{"key":"8570_CR13","unstructured":"Hasija M, Jindal A (2011) Contrast of watermarking techniques in different domains. IJCSI, Int J Comput Sci Issues 8(3):559\u2013563"},{"issue":"4","key":"8570_CR14","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1016\/0167-8655(87)90087-0","volume":"6","author":"DC He","year":"1987","unstructured":"He DC, Wang L, Guibert J (1987) Texture feature extraction. Pattern Recogn Lett 6(4):269\u2013273","journal-title":"Pattern Recogn Lett"},{"key":"8570_CR15","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1016\/0734-189X(87)90118-6","volume":"38","author":"M Iizulca","year":"1987","unstructured":"Iizulca M (1987) Quantitative evaluation of similar images with quasi-gray levels. Comput Vis Graph Image Process 38:342\u2013360","journal-title":"Comput Vis Graph Image Process"},{"key":"8570_CR16","doi-asserted-by":"crossref","unstructured":"Javeed A, Shah T Cryptosystem techniques based on the improved Chebyshev map: an application in image encryption. Multimed Tools 78(22):31467\u201331484","DOI":"10.1007\/s11042-019-07981-8"},{"issue":"2","key":"8570_CR17","first-page":"226","volume":"2","author":"M Kaur","year":"2012","unstructured":"Kaur M, Jindal S, Behal S (2012) A study of digital image watermarking. Int J Res Eng Appl Sci 2(2):226\u2013236","journal-title":"Int J Res Eng Appl Sci"},{"issue":"4","key":"8570_CR18","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1007\/s00521-016-2511-5","volume":"29","author":"M Khan","year":"2018","unstructured":"Khan M, Asghar Z (2018) A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S 8 permutation. Neural Comput Appl 29(4):993\u2013999","journal-title":"Neural Comput Appl"},{"key":"8570_CR19","doi-asserted-by":"crossref","unstructured":"Khan M, Masood F (2019) A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multimed Tools 78(18):26203\u201326222","DOI":"10.1007\/s11042-019-07818-4"},{"key":"8570_CR20","doi-asserted-by":"crossref","unstructured":"Khan M, Munir N (2019) A novel image encryption technique based on generalized advanced encryption standard based on field of any characteristic. Wirel Pers Commun:1\u201319","DOI":"10.1007\/s11277-019-06594-6"},{"issue":"1","key":"8570_CR21","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1007\/s11071-013-1132-0","volume":"76","author":"M Khan","year":"2014","unstructured":"Khan M, Shah T (2014) A construction of novel chaos base nonlinear component of block cipher. Nonlinear Dyn 76(1):377\u2013382","journal-title":"Nonlinear Dyn"},{"issue":"5","key":"8570_CR22","doi-asserted-by":"publisher","first-page":"1137","DOI":"10.1007\/s00521-014-1800-0","volume":"26","author":"M Khan","year":"2015","unstructured":"Khan M, Shah T (2015) An efficient chaotic image encryption scheme. Neural Comput Appl 26(5):1137\u20131148","journal-title":"Neural Comput Appl"},{"issue":"4","key":"8570_CR23","doi-asserted-by":"publisher","first-page":"845","DOI":"10.1007\/s00521-014-1747-1","volume":"26","author":"M Khan","year":"2015","unstructured":"Khan M, Shah T (2015) A copyright protection using watermarking scheme based on nonlinear permutation and its quality metrics. Neural Comput Appl 26(4):845\u2013855","journal-title":"Neural Comput Appl"},{"issue":"11","key":"8570_CR24","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0206460","volume":"13","author":"M Khan","year":"2018","unstructured":"Khan M, Waseem HM (2018) A novel image encryption scheme based on quantum dynamical spinning and rotations. PLoS One 13(11):e0206460","journal-title":"PLoS One"},{"key":"8570_CR25","doi-asserted-by":"crossref","unstructured":"Khan M, Waseem HM (2019) A novel digital contents privacy scheme based on Kramer\u2019s arbitrary spin. Int J Theor Phys:1\u201324","DOI":"10.1007\/s10773-019-04162-z"},{"key":"8570_CR26","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1007\/s11071-012-0675-9","volume":"71","author":"M Khan","year":"2013","unstructured":"Khan M, Shah T, Mahmood H, Gondal (2013) An efficient method for the construction of block cipher with multi-chaotic systems. Nonlinear Dyn 71:493\u2013504","journal-title":"Nonlinear Dyn"},{"key":"8570_CR27","doi-asserted-by":"publisher","first-page":"1795","DOI":"10.1007\/s11071-013-0904-x","volume":"73","author":"M Khan","year":"2013","unstructured":"Khan M, Shah T, Gondal MA (2013) An efficient technique for the construction of substitution box with chaotic partial differential equation. Nonlinear Dyn 73:1795\u20131801","journal-title":"Nonlinear Dyn"},{"issue":"3","key":"8570_CR28","first-page":"1","volume":"15","author":"M Khan","year":"2015","unstructured":"Khan M, Shah T, Batool SI (2015) Texture analysis of chaotic coupled map lattices based image encryption algorithm. 3D Res 15(3):1\u20135","journal-title":"3D Res"},{"issue":"2","key":"8570_CR29","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/s11760-014-0741-5","volume":"10","author":"M Khan","year":"2016","unstructured":"Khan M, Shah T, Batool SI (2016) A new implementation of chaotic S-boxes in CAPTCHA. SIViP 10(2):293\u2013300","journal-title":"SIViP"},{"issue":"22","key":"8570_CR30","doi-asserted-by":"publisher","first-page":"24027","DOI":"10.1007\/s11042-016-4090-y","volume":"76","author":"M Khan","year":"2017","unstructured":"Khan M, Shah T, Batool SI (2017) A new approach for image encryption and watermarking based on substitution box over the classes of chain rings. Multimed Tools Appl 76(22):24027\u201324062","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"8570_CR31","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s11554-016-0641-8","volume":"14","author":"C Kim","year":"2018","unstructured":"Kim C, Shin D, Leng L, Yang CN (2018) Lossless data hiding for absolute moment block truncation coding using histogram modification. J Real-Time Image Proc 14(1):101\u2013114","journal-title":"J Real-Time Image Proc"},{"key":"8570_CR32","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.displa.2018.04.002","volume":"55","author":"C Kim","year":"2018","unstructured":"Kim C, Shin D, Leng L, Yang CN (2018) Separable reversible data hiding in encrypted halftone image. Displays 55:71\u201379","journal-title":"Displays"},{"key":"8570_CR33","first-page":"141","volume-title":"Advances in intelligent systems and applications","author":"HC Lee","year":"2013","unstructured":"Lee HC, Dong CR, Lin TM (2013) Digital watermarking based on JND model and QR code features. In: Advances in intelligent systems and applications, vol 2. Springer, Berlin, pp 141\u2013148"},{"key":"8570_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.neucom.2012.08.028","volume":"108","author":"L Leng","year":"2013","unstructured":"Leng L, Zhang J (2013) Palmhash code vs. palmphasor code. Neurocomputing 108:1\u201312","journal-title":"Neurocomputing"},{"issue":"17","key":"8570_CR35","first-page":"2543","volume":"5","author":"L Leng","year":"2010","unstructured":"Leng L, Zhang J, Khan MK, Chen X, Alghathbar K (2010) Dynamic weighted discrimination power analysis: a novel approach for face and palmprint recognition in DCT domain. Int J Phys Sci 5(17):2543\u20132554","journal-title":"Int J Phys Sci"},{"key":"8570_CR36","doi-asserted-by":"crossref","unstructured":"Leng L, Zhang J, Xu J, Khan MK, Alghathbar K (2010) Dynamic weighted discrimination power analysis in DCT domain for face and palmprint recognition. In: 2010 international conference on information and communication technology convergence (ICTC). IEEE, pp 467\u2013471","DOI":"10.1109\/ICTC.2010.5674791"},{"key":"8570_CR37","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1016\/j.neucom.2013.10.005","volume":"131","author":"L Leng","year":"2014","unstructured":"Leng L, Teoh ABJ, Li M, Khan MK (2014) Analysis of correlation of 2DPalmHash code and orientation range suitable for transposition. Neurocomputing 131:377\u2013387","journal-title":"Neurocomputing"},{"key":"8570_CR38","doi-asserted-by":"crossref","unstructured":"Leng L, Teoh ABJ, Li M, Khan MK (2015) Orientation range of transposition for vertical correlation suppression of 2DPalmPhasor code. Multimed Tools Appl 74(24):11683\u201311701","DOI":"10.1007\/s11042-014-2255-0"},{"key":"8570_CR39","unstructured":"Madane AR, Talele KT, Shah MM (2008) Watermark logo in digital image using DWT. In: Proceedings of SPIT-IEEE colloquium and international conference, Mumbai, 1, pp 121\u2013127"},{"key":"8570_CR40","doi-asserted-by":"crossref","unstructured":"Munir N, Khan M (2018) A generalization of algebraic expression for nonlinear component of symmetric key algorithms of any characteristic p. In: 2018 international conference on applied and engineering mathematics (ICAEM). IEEE, pp 48\u201352","DOI":"10.1109\/ICAEM.2018.8536308"},{"issue":"1","key":"8570_CR41","doi-asserted-by":"publisher","first-page":"6","DOI":"10.3390\/cryptography3010006","volume":"3","author":"Y Naseer","year":"2019","unstructured":"Naseer Y, Shah T, Shah D, Hussain S (2019) A novel algorithm of constructing highly nonlinear S-p-boxes. Cryptography 3(1):6. https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.3390\/cryptography3010006","journal-title":"Cryptography"},{"key":"8570_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.micpro.2018.12.003","volume":"65","author":"Y Naseer","year":"2019","unstructured":"Naseer Y, Shah D, Shah T (2019) A novel approach to improve multimedia security utilizing 3D mixed chaotic map. Microprocess Microsyst 65:1\u20136","journal-title":"Microprocess Microsyst"},{"issue":"2","key":"8570_CR43","doi-asserted-by":"publisher","first-page":"1219","DOI":"10.1007\/s11042-018-6250-8","volume":"78","author":"T Shah","year":"2019","unstructured":"Shah T, Shah D (2019) Construction of highly nonlinear S-boxes for degree 8 primitive irreducible polynomials over \u21242. Multimed Tools Appl 78(2):1219\u20131234","journal-title":"Multimed Tools Appl"},{"key":"8570_CR44","doi-asserted-by":"crossref","unstructured":"Shah D, ul Haq T, Shah T (2018) Image encryption based on action of projective general linear group on a Galois field GF (2 8). In: 2018 international conference on applied and engineering mathematics (ICAEM). IEEE, pp 38\u201341","DOI":"10.1109\/ICAEM.2018.8536281"},{"issue":"4","key":"8570_CR45","first-page":"63","volume":"2","author":"H Shaikh","year":"2012","unstructured":"Shaikh H, Khan MI, Kelkar Y (2012) A robust DWT digital image watermarking technique basis on scaling factor. Int J Comput Sci Eng Appl 2(4):63","journal-title":"Int J Comput Sci Eng Appl"},{"key":"8570_CR46","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1080\/00288230709510361","volume":"50","author":"M Si","year":"2007","unstructured":"Si M, Si J (2007) Research on embedding and extracting methods for digital watermarks applied to QR-code images. N Z J Agric Res 50:861\u2013867","journal-title":"N Z J Agric Res"},{"issue":"1","key":"8570_CR47","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/34.3870","volume":"10","author":"LH Siew","year":"1988","unstructured":"Siew LH, Hodgson RM, Wood EJ (1988) Texture measures for carpet wear assessment. IEEE Trans Pattern Anal Mach Intell 10(1):92\u2013105","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"1","key":"8570_CR48","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/s11771-011-0668-8","volume":"18","author":"W Song","year":"2011","unstructured":"Song W, Hou JJ, Li ZH, Huang L (2011) Chaotic system and QR factorization based robust digital image watermarking algorithm. J Cent S Univ Technol 18(1):116\u2013124","journal-title":"J Cent S Univ Technol"},{"key":"8570_CR49","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/S0734-189X(84)80022-5","volume":"28","author":"MM Travedi","year":"1984","unstructured":"Travedi MM, Haralick RM, Conners RW, Goh S (1984) Object detection based on gray level co-occurrence. Comput Vis Graph Image Process 28:199\u2013219","journal-title":"Comput Vis Graph Image Process"},{"key":"8570_CR50","doi-asserted-by":"crossref","unstructured":"Ullah A, Javeed A, Shah T (2019) A scheme based on algebraic and chaotic structures for the construction of substitution box. Multimed Tools Appl:1\u201318","DOI":"10.1007\/s11042-019-07957-8"},{"key":"8570_CR51","doi-asserted-by":"publisher","first-page":"3584","DOI":"10.1007\/s10773-018-3872-6","volume":"57","author":"HM Waseem","year":"2018","unstructured":"Waseem HM, Khan M (2018) Information confidentiality using quantum spinning, rotation and finite state machine. Int J Theor Phys 57:3584. https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/s10773-018-3872-6","journal-title":"Int J Theor Phys"},{"issue":"2","key":"8570_CR52","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s00340-019-7142-y","volume":"125","author":"HM Waseem","year":"2019","unstructured":"Waseem HM, Khan M (2019) A new approach to digital content privacy using quantum spin and finite-state machine. Appl Phys B 125(2):27","journal-title":"Appl Phys B"},{"issue":"6","key":"8570_CR53","doi-asserted-by":"publisher","first-page":"063022","DOI":"10.1117\/1.JEI.27.6.063022","volume":"27","author":"HM Waseem","year":"2018","unstructured":"Waseem HM, Khan M, Shah T (2018) Image privacy scheme using quantum spinning and rotation. J Electron Imaging 27(6):063022","journal-title":"J Electron Imaging"},{"issue":"4","key":"8570_CR54","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1109\/TSMC.1976.5408777","volume":"6","author":"JS Weszka","year":"1976","unstructured":"Weszka JS, Dyer CR, Rosenfeld A (1976) A comparative study of texture measures for terrain classification. IEEE Trans Syst Man Cybern 6(4):269\u2013285","journal-title":"IEEE Trans Syst Man Cybern"},{"issue":"5","key":"8570_CR55","first-page":"407","volume":"54","author":"CM Wu","year":"1992","unstructured":"Wu CM, Chen YC (1992) Statistical feature matrix for texture analysis. CVGIP: Graph Models Image Process 54(5):407\u2013419","journal-title":"CVGIP: Graph Models Image Process"},{"issue":"12","key":"8570_CR56","doi-asserted-by":"publisher","first-page":"913","DOI":"10.3390\/e20120913","volume":"20","author":"I Younas","year":"2018","unstructured":"Younas I, Khan M (2018) A new efficient digital image encryption based on inverse left almost semi group and Lorenz chaotic system. Entropy 20(12):913","journal-title":"Entropy"},{"issue":"4","key":"8570_CR57","doi-asserted-by":"publisher","first-page":"1520","DOI":"10.1109\/TVLSI.2016.2619682","volume":"25","author":"J Zhang","year":"2017","unstructured":"Zhang J, Liu L (2017) Publicly verifiable watermarking for intellectual property protection in FPGA design. IEEE Trans Very Large Scale Integr (VLSI) Syst 25(4):1520\u20131527","journal-title":"IEEE Trans Very Large Scale Integr (VLSI) Syst"},{"issue":"2","key":"8570_CR58","first-page":"764","volume":"21","author":"J Zhang","year":"2012","unstructured":"Zhang J, Lin Y, Wu Q, Che W (2012) Watermarking FPGA Bitfile for intellectual property protection. Radioengineering 21(2):764\u2013771","journal-title":"Radioengineering"},{"issue":"6","key":"8570_CR59","doi-asserted-by":"publisher","first-page":"1137","DOI":"10.1109\/TIFS.2015.2400413","volume":"10","author":"J Zhang","year":"2015","unstructured":"Zhang J, Lin Y, Lyu Y, Qu G (2015) A PUF-FSM binding scheme for FPGA IP protection and pay-per-device licensing. IEEE Trans Inf Forensics Secur 10(6):1137\u20131150","journal-title":"IEEE Trans Inf Forensics Secur"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08570-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/link.springer.com\/article\/10.1007\/s11042-019-08570-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08570-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,17]],"date-time":"2020-12-17T01:22:57Z","timestamp":1608168177000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/link.springer.com\/10.1007\/s11042-019-08570-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,18]]},"references-count":59,"journal-issue":{"issue":"9-10","published-print":{"date-parts":[[2020,3]]}},"alternative-id":["8570"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/s11042-019-08570-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12,18]]},"assertion":[{"value":"23 January 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 September 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 December 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 December 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"There is no funding to publish this research work.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Funding information"}},{"value":"The authors declare that they have no conflict of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}