{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T17:13:17Z","timestamp":1726161197625},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2022,6,14]],"date-time":"2022-06-14T00:00:00Z","timestamp":1655164800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,6,14]],"date-time":"2022-06-14T00:00:00Z","timestamp":1655164800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1007\/s00034-022-02063-x","type":"journal-article","created":{"date-parts":[[2022,6,14]],"date-time":"2022-06-14T12:04:48Z","timestamp":1655208288000},"page":"5856-5871","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["ECG Signal Protection for Telemedicine Applications"],"prefix":"10.1007","volume":"41","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-1637-9129","authenticated-orcid":false,"given":"Khaldi","family":"Amine","sequence":"first","affiliation":[]},{"given":"Kafi","family":"Med Redouane","sequence":"additional","affiliation":[]},{"given":"Zermi","family":"Narima","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,14]]},"reference":[{"key":"2063_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-020-01903-0","author":"SBB Ahmadi","year":"2020","unstructured":"S.B.B. Ahmadi, G. Zhang, M. Rabbani, L. Boukela, H. Jelodar, An intelligent and blind dual color image watermarking for authentication and copyright protection. Appl. Intell. (2020). https:\/\/doi.org\/10.1007\/s10489-020-01903-0","journal-title":"Appl. Intell."},{"key":"2063_CR2","doi-asserted-by":"publisher","unstructured":"S.B.B. Ahmadi, G. Zhang, H. Jelodar, A robust hybrid SVD-based image watermarking scheme for color images, in 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, Canada, 2019, pp. 0682\u20130688, https:\/\/doi.org\/10.1109\/IEMCON.2019.8936229","DOI":"10.1109\/IEMCON.2019.8936229"},{"issue":"1","key":"2063_CR3","doi-asserted-by":"publisher","first-page":"1075","DOI":"10.1007\/s11042-019-08197-6","volume":"79","author":"SBB Ahmadi","year":"2020","unstructured":"S.B.B. Ahmadi, G. Zhang, S. Wei, Robust and hybrid SVD-based image watermarking schemes. Multimed. Tools Appl. 79(1), 1075\u20131117 (2020). https:\/\/doi.org\/10.1007\/s11042-019-08197-6","journal-title":"Multimed. Tools Appl."},{"key":"2063_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-020-01808-6","author":"SBB Ahmadi","year":"2020","unstructured":"S.B.B. Ahmadi, G. Zhang, S. Wei, L. Boukela, An intelligent and blind image watermarking scheme based on hybrid SVD transforms using human visual system characteristics. Vis. Comput. (2020). https:\/\/doi.org\/10.1007\/s00371-020-01808-6","journal-title":"Vis. Comput."},{"key":"2063_CR5","doi-asserted-by":"publisher","first-page":"128548","DOI":"10.1109\/ACCESS.2020.3008644","volume":"8","author":"A Alarifi","year":"2020","unstructured":"A. Alarifi, S. Sankar, T. Altameem, K.C. Jithin, M. Amoon, W. El-Shafai, A novel hybrid cryptosystem for secure streaming of high efficiency H.265 compressed videos in IoT multimedia applications. IEEE Access 8, 128548\u2013128573 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3008644","journal-title":"IEEE Access"},{"issue":"2","key":"2063_CR6","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.aci.2018.06.003","volume":"15","author":"RA Alotaibi","year":"2019","unstructured":"R.A. Alotaibi, L.A. Elrefaei, Text-image watermarking based on integer wavelet transform (IWT) and discrete cosine transform (DCT). Appl. Comput. Inform. 15(2), 191\u2013202 (2019). https:\/\/doi.org\/10.1016\/j.aci.2018.06.003","journal-title":"Appl. Comput. Inform."},{"key":"2063_CR7","doi-asserted-by":"publisher","first-page":"2250097","DOI":"10.1142\/S0218126622500979","volume":"31","author":"K Amine","year":"2021","unstructured":"K. Amine, K. Fares, K.M. Redouane, E. Salah, Medical image watermarking for telemedicine application security. J. Circuit Syst. Comp. 31, 2250097 (2021). https:\/\/doi.org\/10.1142\/S0218126622500979","journal-title":"J. Circuit Syst. Comp."},{"key":"2063_CR8","doi-asserted-by":"publisher","first-page":"1223","DOI":"10.1016\/j.future.2019.07.064","volume":"101","author":"TK Araghi","year":"2019","unstructured":"T.K. Araghi, A.A. Manaf, An enhanced hybrid image watermarking scheme for security of medical and non-medical images based on DWT and 2-D SVD. Future Gener. Comput. Syst. 101, 1223\u20131246 (2019). https:\/\/doi.org\/10.1016\/j.future.2019.07.064","journal-title":"Future Gener. Comput. Syst."},{"key":"2063_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.apacoust.2020.107652","volume":"172","author":"S Euschi","year":"2021","unstructured":"S. Euschi, K. Amine, R. Kafi, F. Kahlessenane, A Fourier transform based audio watermarking algorithm. Appl. Acoust. 172, 107652 (2021). https:\/\/doi.org\/10.1016\/j.apacoust.2020.107652","journal-title":"Appl. Acoust."},{"key":"2063_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2020.102403","volume":"66","author":"K Fares","year":"2021","unstructured":"K. Fares, A. Khaldi, K. Redouane, E. Salah, DCT & DWT based watermarking scheme for medical information security. Biomed. Signal Process. Control 66, 102403 (2021). https:\/\/doi.org\/10.1016\/j.bspc.2020.102403","journal-title":"Biomed. Signal Process. Control"},{"issue":"4","key":"2063_CR11","doi-asserted-by":"publisher","first-page":"1875","DOI":"10.1007\/s11071-018-4295-x","volume":"93","author":"E Farri","year":"2018","unstructured":"E. Farri, P. Ayubi, A blind and robust video watermarking based on IWT and new 3D generalized chaotic sine map. Nonlinear Dyn. 93(4), 1875\u20131897 (2018). https:\/\/doi.org\/10.1007\/s11071-018-4295-x","journal-title":"Nonlinear Dyn."},{"key":"2063_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102428","volume":"50","author":"KC Jithin","year":"2020","unstructured":"K.C. Jithin, S. Sankar, Colour image encryption algorithm combining Arnold map, DNA sequence operation, and a Mandelbrot set. J. Inf. Secur. Appl. 50, 102428 (2020). https:\/\/doi.org\/10.1016\/j.jisa.2019.102428","journal-title":"J. Inf. Secur. Appl."},{"issue":"3","key":"2063_CR13","doi-asserted-by":"publisher","first-page":"2127","DOI":"10.1007\/s11042-019-08225-5","volume":"79","author":"M Jafari Barani","year":"2020","unstructured":"M. Jafari Barani, P. Ayubi, M. Yousefi Valandar, B. Yosefnezhad Irani, A blind video watermarking algorithm robust to lossy video compression attacks based on generalized Newton complex map and contourlet transform. Multimed. Tools Appl. 79(3), 2127\u20132159 (2020). https:\/\/doi.org\/10.1007\/s11042-019-08225-5","journal-title":"Multimed. Tools Appl."},{"key":"2063_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-10713-6","author":"F Kahlessenane","year":"2021","unstructured":"F. Kahlessenane, A. Khaldi, M.R. Kafi, S. Euschi, A color value differentiation scheme for blind digital image watermarking. Multimed. Tools Appl. (2021). https:\/\/doi.org\/10.1007\/s11042-021-10713-6","journal-title":"Multimed. Tools Appl."},{"key":"2063_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02450-9","author":"F Kahlessenane","year":"2020","unstructured":"F. Kahlessenane, A. Khaldi, R. Kafi, S. Euschi, A DWT based watermarking approach for medical image protection. J. Ambient Intell. Hum. Comput. (2020). https:\/\/doi.org\/10.1007\/s12652-020-02450-9","journal-title":"J. Ambient Intell. Hum. Comput."},{"key":"2063_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-020-03215-x","author":"F Kahlessenane","year":"2021","unstructured":"F. Kahlessenane, A. Khaldi, R. Kafi, S. Euschi, A robust blind medical image watermarking approach for telemedicine applications. Cluster Comput. (2021). https:\/\/doi.org\/10.1007\/s10586-020-03215-x","journal-title":"Cluster Comput."},{"issue":"3","key":"2063_CR17","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s11082-021-02793-3","volume":"53","author":"F Kahlessenane","year":"2021","unstructured":"F. Kahlessenane, A. Khaldi, M.R. Kafi, N. Zermi, S. Euschi, A value parity combination based scheme for retinal images watermarking. Opt. Quant. Electron. 53(3), 161 (2021). https:\/\/doi.org\/10.1007\/s11082-021-02793-3","journal-title":"Opt. Quant. Electron."},{"key":"2063_CR18","doi-asserted-by":"publisher","first-page":"103540","DOI":"10.1016\/j.bspc.2022.103540","volume":"75","author":"A Khaldi","year":"2022","unstructured":"A. Khaldi, M.R. Kafi, M.S. Moad, Wrapping based curvelet transform approach for ECG watermarking in telemedicine application. Biomed. Signal Process. Control 75, 103540 (2022). https:\/\/doi.org\/10.1016\/j.bspc.2022.103540","journal-title":"Biomed. Signal Process. Control"},{"key":"2063_CR19","doi-asserted-by":"publisher","unstructured":"S. Kuanar, V. Athitsos, N. Pradhan, A. Mishra, K. R. Rao, Cognitive analysis of working memory load from EEG, by a deep recurrent neural network, in 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2018, p. 2576\u20132580. https:\/\/doi.org\/10.1109\/ICASSP.2018.8462243","DOI":"10.1109\/ICASSP.2018.8462243"},{"issue":"11","key":"2063_CR20","doi-asserted-by":"publisher","first-page":"7086","DOI":"10.1109\/TGRS.2014.2307354","volume":"52","author":"X Li","year":"2014","unstructured":"X. Li, H. Shen, L. Zhang, H. Zhang, Q. Yuan, G. Yang, Recovering quantitative remote sensing products contaminated by thick clouds and shadows using multitemporal dictionary learning. IEEE Trans. Geosci. Remote Sens. 52(11), 7086\u20137098 (2014). https:\/\/doi.org\/10.1109\/TGRS.2014.2307354","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"2063_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114272","volume":"168","author":"Y Luo","year":"2021","unstructured":"Y. Luo et al., A multi-scale image watermarking based on integer wavelet transform and singular value decomposition. Expert Syst. Appl. 168, 114272 (2021). https:\/\/doi.org\/10.1016\/j.eswa.2020.114272","journal-title":"Expert Syst. Appl."},{"issue":"8","key":"2063_CR22","first-page":"600","volume":"29","author":"RG Mark","year":"1982","unstructured":"R.G. Mark, P.S. Schluter, G.B. Moody, P.H. Devlin, D. Chernoff, An annotated ECG database for evaluating arrhythmia detectors. IEEE Trans. Biomed. Eng. 29(8), 600 (1982)","journal-title":"IEEE Trans. Biomed. Eng."},{"issue":"1","key":"2063_CR23","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1007\/s11042-020-09686-9","volume":"80","author":"L Meng","year":"2021","unstructured":"L. Meng, L. Liu, G. Tian, X. Wang, An adaptive reversible watermarking in IWT domain. Multimed. Tools Appl. 80(1), 711\u2013735 (2021). https:\/\/doi.org\/10.1007\/s11042-020-09686-9","journal-title":"Multimed. Tools Appl."},{"key":"2063_CR24","doi-asserted-by":"publisher","first-page":"104490","DOI":"10.1016\/j.micpro.2022.104490","volume":"90","author":"MS Moad","year":"2022","unstructured":"M.S. Moad, M.R. Kafi, A. Khaldi, A wavelet based medical image watermarking scheme for secure transmission in telemedicine applications. Microprocessors Microsyst. 90, 104490 (2022). https:\/\/doi.org\/10.1016\/j.micpro.2022.104490","journal-title":"Microprocessors Microsyst."},{"key":"2063_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2021.103114","volume":"71","author":"MS Moad","year":"2022","unstructured":"M.S. Moad, M.R. Kafi, A. Khaldi, A non-subsampled Shearlet transform based approach for heartbeat sound watermarking. Biomed. Signal Process. Control 71, 103114 (2022). https:\/\/doi.org\/10.1016\/j.bspc.2021.103114","journal-title":"Biomed. Signal Process. Control"},{"key":"2063_CR26","doi-asserted-by":"publisher","first-page":"110691","DOI":"10.1016\/j.forsciint.2021.110691","volume":"320","author":"Z Narima","year":"2021","unstructured":"Z. Narima, A. Khaldi, K. Redouane, K. Fares, E. Salah, A DWT-SVD based robust digital watermarking for medical image security. Forensic Sci. Int. 320, 110691 (2021). https:\/\/doi.org\/10.1016\/j.forsciint.2021.110691","journal-title":"Forensic Sci. Int."},{"issue":"7","key":"2063_CR27","doi-asserted-by":"publisher","first-page":"10615","DOI":"10.1007\/s11042-020-10032-2","volume":"80","author":"M Nazari","year":"2021","unstructured":"M. Nazari, M. Mehrabian, A novel chaotic IWT-LSB blind watermarking approach with flexible capacity for secure transmission of authenticated medical images. Multimed. Tools Appl. 80(7), 10615\u201310655 (2021). https:\/\/doi.org\/10.1007\/s11042-020-10032-2","journal-title":"Multimed. Tools Appl."},{"issue":"1","key":"2063_CR28","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/s11277-019-06393-z","volume":"108","author":"AK Sahu","year":"2019","unstructured":"A.K. Sahu, G. Swain, An optimal information hiding approach based on pixel value differencing and modulus function. Wirel. Pers. Commun. 108(1), 159\u2013174 (2019). https:\/\/doi.org\/10.1007\/s11277-019-06393-z","journal-title":"Wirel. Pers. Commun."},{"key":"2063_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2019.07.004","author":"AK Sahu","year":"2019","unstructured":"A.K. Sahu, G. Swain, High fidelity based reversible data hiding using modified LSB matching and pixel difference. J. King Saud Univ. Comput. Inf. Sci. (2019). https:\/\/doi.org\/10.1016\/j.jksuci.2019.07.004","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"issue":"1","key":"2063_CR30","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/s11220-020-00328-w","volume":"22","author":"M Sahu","year":"2021","unstructured":"M. Sahu, N. Padhy, S.S. Gantayat, A.K. Sahu, Shadow image based reversible data hiding using addition and subtraction logic on the LSB planes. Sens. Imaging 22(1), 7 (2021). https:\/\/doi.org\/10.1007\/s11220-020-00328-w","journal-title":"Sens. Imaging"},{"issue":"1","key":"2063_CR31","doi-asserted-by":"publisher","first-page":"69","DOI":"10.2478\/cait-2018-0006","volume":"18","author":"AK Sahu","year":"2018","unstructured":"A.K. Sahu, G. Swain, E.S. Babu, Digital image steganography using bit flipping. Cybern. Inf. Technol. 18(1), 69\u201380 (2018). https:\/\/doi.org\/10.2478\/cait-2018-0006","journal-title":"Cybern. Inf. Technol."},{"key":"2063_CR32","doi-asserted-by":"publisher","unstructured":"M.J. Saikia, S. Kuanar, D. Borthakur, M. Vinti, T. Tendhar, A machine learning approach to classify working memory load from optical neuroimaging data, in Optical Techniques in Neurosurgery, Neurophotonics, and Optogenetics, 2021, vol. 11629, p. 157\u2013164. https:\/\/doi.org\/10.1117\/12.2578952.","DOI":"10.1117\/12.2578952"},{"key":"2063_CR33","doi-asserted-by":"publisher","first-page":"2150210","DOI":"10.1142\/S0218126621502108","volume":"30","author":"E Salah","year":"2021","unstructured":"E. Salah, K. Amine, K.M. Redouane, K. Fares, Spatial and frequency approaches for audio file protection. J. Circuit Syst. Comput. 30, 2150210 (2021). https:\/\/doi.org\/10.1142\/S0218126621502108","journal-title":"J. Circuit Syst. Comput."},{"issue":"3","key":"2063_CR34","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.1007\/s12652-019-01385-0","volume":"11","author":"PS Sneha","year":"2020","unstructured":"P.S. Sneha, S. Sankar, A.S. Kumar, A chaotic colour image encryption scheme combining Walsh-Hadamard transform and Arnold-Tent maps. J. Ambient Intell. Hum. Comput. 11(3), 1289\u20131308 (2020). https:\/\/doi.org\/10.1007\/s12652-019-01385-0","journal-title":"J. Ambient Intell. Hum. Comput."},{"key":"2063_CR35","doi-asserted-by":"publisher","first-page":"137731","DOI":"10.1109\/ACCESS.2020.3010794","volume":"8","author":"N Tsafack","year":"2020","unstructured":"N. Tsafack, S. Sankar, B. Abd-El-Atty, J. Kengne, K.C. Jithin, A. Belazi, I. Mehmood, A.K. Bashir, O.-Y. Song, A.A.A. El-Latif, A new chaotic map with dynamic analysis and encryption application in internet of health things. IEEE Access 8, 137731\u2013137744 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3010794","journal-title":"IEEE Access"},{"key":"2063_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2019.06.021","volume":"193","author":"MY Valandar","year":"2019","unstructured":"M.Y. Valandar, M.J. Barani, P. Ayubi, A fast color image encryption technique based on three dimensional chaotic map. Optik 193, 162921 (2019). https:\/\/doi.org\/10.1016\/j.ijleo.2019.06.021","journal-title":"Optik"},{"issue":"2","key":"2063_CR37","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1007\/s00500-019-04524-z","volume":"24","author":"M YousefiValandar","year":"2020","unstructured":"M. Yousefi Valandar, M. Jafari Barani, P. Ayubi, A blind and robust color images watermarking method based on block transform and secured by modified 3-dimensional H\u00e9non map. Soft Comput. 24(2), 771\u2013794 (2020). https:\/\/doi.org\/10.1007\/s00500-019-04524-z","journal-title":"Soft Comput."},{"issue":"16","key":"2063_CR38","doi-asserted-by":"publisher","first-page":"24823","DOI":"10.1007\/s11042-021-10712-7","volume":"80","author":"N Zermi","year":"2021","unstructured":"N. Zermi, A. Khaldi, M.R. Kafi, F. Kahlessenane, S. Euschi, A lossless DWT-SVD domain watermarking for medical information security. Multimed. Tools Appl. 80(16), 24823\u201324841 (2021). https:\/\/doi.org\/10.1007\/s11042-021-10712-7","journal-title":"Multimed. Tools Appl."},{"issue":"1","key":"2063_CR39","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1080\/01969722.2021.1983700","volume":"53","author":"N Zermi","year":"2021","unstructured":"N. Zermi, A. Khaldi, M.R. Kafi, F. Kahlessenane, S. Euschi, An SVD values ordering scheme for medical image watermarking. Cybern. Syst. 53(1), 282\u2013297 (2021). https:\/\/doi.org\/10.1080\/01969722.2021.1983700","journal-title":"Cybern. Syst."},{"key":"2063_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2021.104134","volume":"84","author":"N Zermi","year":"2021","unstructured":"N. Zermi, A. Khaldi, M.R. Kafi, F. Kahlessenane, S. Euschi, Robust SVD-based schemes for medical image watermarking. Microprocess. Microsyst. 84, 104134 (2021). https:\/\/doi.org\/10.1016\/j.micpro.2021.104134","journal-title":"Microprocess. Microsyst."},{"key":"2063_CR41","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1016\/j.image.2019.07.019","volume":"78","author":"H Zhang","year":"2019","unstructured":"H. Zhang, L. Hu, A data hiding scheme based on multidirectional line encoding and integer wavelet transform. Signal Process. Image Commun. 78, 331\u2013344 (2019). https:\/\/doi.org\/10.1016\/j.image.2019.07.019","journal-title":"Signal Process. Image Commun."},{"key":"2063_CR42","doi-asserted-by":"publisher","first-page":"107421","DOI":"10.1016\/j.sigpro.2019.107421","volume":"169","author":"L Zhang","year":"2020","unstructured":"L. Zhang, D. Wei, Image watermarking based on matrix decomposition and gyrator transform in invariant integer wavelet domain. Signal Process. 169, 107421 (2020). https:\/\/doi.org\/10.1016\/j.sigpro.2019.107421","journal-title":"Signal Process."},{"key":"2063_CR43","doi-asserted-by":"publisher","first-page":"102805","DOI":"10.1016\/j.dsp.2020.102805","volume":"106","author":"L Zhang","year":"2020","unstructured":"L. Zhang, D. Wei, Robust and reliable image copyright protection scheme using downsampling and block transform in integer wavelet domain. Digit. Signal Process. 106, 102805 (2020). https:\/\/doi.org\/10.1016\/j.dsp.2020.102805","journal-title":"Digit. Signal Process."}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-022-02063-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00034-022-02063-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-022-02063-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,9]],"date-time":"2022-08-09T08:11:41Z","timestamp":1660032701000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00034-022-02063-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,14]]},"references-count":43,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["2063"],"URL":"https:\/\/doi.org\/10.1007\/s00034-022-02063-x","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"value":"0278-081X","type":"print"},{"value":"1531-5878","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,14]]},"assertion":[{"value":"11 September 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 May 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 May 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 June 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}