{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T05:24:30Z","timestamp":1730957070672,"version":"3.28.0"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2024,1,2]],"date-time":"2024-01-02T00:00:00Z","timestamp":1704153600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,2]],"date-time":"2024-01-02T00:00:00Z","timestamp":1704153600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Key-Area Research and Development Program of Guangdong Province","award":["2018B010108001"]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Vis Comput"],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1007\/s00371-023-03219-9","type":"journal-article","created":{"date-parts":[[2024,1,2]],"date-time":"2024-01-02T19:05:08Z","timestamp":1704222308000},"page":"8001-8021","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Image encryption algorithm based on DNA network and hyperchaotic system"],"prefix":"10.1007","volume":"40","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-9969-2697","authenticated-orcid":false,"given":"Jinwei","family":"Yu","sequence":"first","affiliation":[]},{"given":"Kaiyu","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Langwen","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Xie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,2]]},"reference":[{"issue":"5","key":"3219_CR1","doi-asserted-by":"crossref","first-page":"1975","DOI":"10.1007\/s00371-022-02459-5","volume":"39","author":"Pengfei Fang","year":"2023","unstructured":"Fang, Pengfei, Liu, Han, Chengmao, Wu., Liu, Min: A survey of image encryption algorithms based on chaotic system. Vis. Comput. 39(5), 1975\u20132003 (2023)","journal-title":"Vis. Comput."},{"issue":"7","key":"3219_CR2","doi-asserted-by":"crossref","first-page":"3123","DOI":"10.1007\/s00371-022-02517-y","volume":"39","author":"Xingyuan Wang","year":"2023","unstructured":"Wang, Xingyuan, Chen, Shengnan: An image encryption algorithm based on pixel bit operation and nonlinear chaotic system. Vis. Comput. 39(7), 3123\u20133144 (2023)","journal-title":"Vis. Comput."},{"key":"3219_CR3","doi-asserted-by":"crossref","first-page":"111777","DOI":"10.1016\/j.chaos.2021.111777","volume":"155","author":"VRF Signing","year":"2022","unstructured":"Signing, V.R.F., Tegue, G.A.G., Kountchou, M., Njitacke, Z.T., Tsafack, N., Nkapkop, J.D.D., Etoundi, C.M.L., Kengne, J.: A cryptosystem based on a chameleon chaotic system and dynamic DNA coding. Chaos Solitons Fractals 155, 111777 (2022)","journal-title":"Chaos Solitons Fractals"},{"key":"3219_CR4","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1007\/s00371-020-01822-8","volume":"37","author":"MZ Talhaoui","year":"2021","unstructured":"Talhaoui, M.Z., Wang, X., Midoun, M.A.: A new one-dimensional cosine polynomial chaotic map and its use in image encryption. Vis. Comput. 37, 541\u2013551 (2021)","journal-title":"Vis. Comput."},{"key":"3219_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-023-02812-2","author":"C Li","year":"2023","unstructured":"Li, C., Zhang, Y., Li, H., Zhou, Y.: Visual image encryption scheme based on inter-intra-block scrambling and weighted diffusion. Vis. Comput. (2023). https:\/\/doi.org\/10.1007\/s00371-023-02812-2","journal-title":"Vis. Comput."},{"issue":"11","key":"3219_CR6","doi-asserted-by":"crossref","first-page":"1750171","DOI":"10.1142\/S0218127417501711","volume":"27","author":"Wenhao Liu","year":"2017","unstructured":"Liu, Wenhao, Sun, Kehui, He, Yi., Mengyao, Yu.: Color image encryption using three-dimensional sine ICMIC modulation map and DNA sequence operations. Int. J. Bifurc. Chaos 27(11), 1750171 (2017)","journal-title":"Int. J. Bifurc. Chaos"},{"issue":"1","key":"3219_CR7","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1080\/0161-118991863745","volume":"13","author":"Robert Matthews","year":"1989","unstructured":"Matthews, Robert: On the derivation of a \u201cchaotic\u2019\u2019 encryption algorithm. Cryptologia 13(1), 29\u201342 (1989)","journal-title":"Cryptologia"},{"issue":"4","key":"3219_CR8","doi-asserted-by":"crossref","first-page":"1101","DOI":"10.1016\/j.sigpro.2011.10.023","volume":"92","author":"Xingyuan Wang","year":"2012","unstructured":"Wang, Xingyuan, Teng, Lin, Qin, Xue: A novel colour image encryption algorithm based on chaos. Signal Process. 92(4), 1101\u20131108 (2012)","journal-title":"Signal Process."},{"key":"3219_CR9","doi-asserted-by":"crossref","first-page":"5455","DOI":"10.1007\/s11042-015-2515-7","volume":"75","author":"Anchal Jain","year":"2016","unstructured":"Jain, Anchal, Rajpal, Navin: A robust image encryption algorithm resistant to attacks using DNA and chaotic logistic maps. Multimed. Tools Appl. 75, 5455\u20135472 (2016)","journal-title":"Multimed. Tools Appl."},{"issue":"6","key":"3219_CR10","doi-asserted-by":"crossref","first-page":"2187","DOI":"10.3390\/app10062187","volume":"10","author":"Yuqiang Dou","year":"2020","unstructured":"Dou, Yuqiang, Li, Ming: Cryptanalysis of a new color image encryption using combination of the 1d chaotic map. Appl. Sci. 10(6), 2187 (2020)","journal-title":"Appl. Sci."},{"key":"3219_CR11","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1016\/j.neucom.2014.11.095","volume":"169","author":"Guomin Zhou","year":"2015","unstructured":"Zhou, Guomin, Zhang, Daxing, Liu, Yanjian, Yuan, Ying, Liu, Qiang: A novel image encryption algorithm based on chaos and line map. Neurocomputing 169, 150\u2013157 (2015)","journal-title":"Neurocomputing"},{"key":"3219_CR12","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/j.sigpro.2018.06.008","volume":"153","author":"Wu Jiahui","year":"2018","unstructured":"Jiahui, Wu., Liao, Xiaofeng, Yang, Bo.: Image encryption using 2d h\u00e9non-sine map and DNA approach. Signal Process. 153, 11\u201323 (2018)","journal-title":"Signal Process."},{"issue":"2","key":"3219_CR13","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1016\/j.optcom.2009.09.070","volume":"283","author":"Ercan Solak","year":"2010","unstructured":"Solak, Ercan, Rhouma, Rhouma, Belghith, Safya: Cryptanalysis of a multi-chaotic systems based image cryptosystem. Opt. Commun. 283(2), 232\u2013236 (2010)","journal-title":"Opt. Commun."},{"key":"3219_CR14","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1016\/j.optlaseng.2016.10.019","volume":"90","author":"AY Niyat","year":"2017","unstructured":"Niyat, A.Y., Moattar, M.H., Torshiz, M.N.: Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt. Lasers Eng. 90, 225\u2013237 (2017)","journal-title":"Opt. Lasers Eng."},{"issue":"22","key":"3219_CR15","doi-asserted-by":"crossref","first-page":"20017","DOI":"10.1007\/s00521-022-07530-9","volume":"34","author":"AE Ezugwu","year":"2022","unstructured":"Ezugwu, A.E., Agushaka, J.O., Abualigah, L., Mirjalili, S., Gandomi, A.H.: Prairie dog optimization algorithm. Neural Comput. Appl. 34(22), 20017\u201320065 (2022)","journal-title":"Neural Comput. Appl."},{"key":"3219_CR16","doi-asserted-by":"crossref","first-page":"114570","DOI":"10.1016\/j.cma.2022.114570","volume":"391","author":"JO Agushaka","year":"2022","unstructured":"Agushaka, J.O., Ezugwu, A.E., Abualigah, L.: Dwarf mongoose optimization algorithm. Comput. Methods Appl. Mech. Eng. 391, 114570 (2022)","journal-title":"Comput. Methods Appl. Mech. Eng."},{"key":"3219_CR17","doi-asserted-by":"crossref","first-page":"107250","DOI":"10.1016\/j.cie.2021.107250","volume":"157","author":"L Abualigah","year":"2021","unstructured":"Abualigah, L., Yousri, D., Elaziz, M.A., Ewees, A.A., Al-Qaness, M.A.A., Gandomi, A.H.: Aquila optimizer: a novel meta-heuristic optimization algorithm. Comput. Ind. Eng. 157, 107250 (2021)","journal-title":"Comput. Ind. Eng."},{"key":"3219_CR18","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/j.optlaseng.2019.04.011","volume":"121","author":"Xu Qiaoyun","year":"2019","unstructured":"Qiaoyun, Xu., Sun, Kehui, Cao, Chun, Zhu, Congxu: A fast image encryption algorithm based on compressive sensing and hyperchaotic map. Opt. Lasers Eng. 121, 203\u2013214 (2019)","journal-title":"Opt. Lasers Eng."},{"issue":"3","key":"3219_CR19","doi-asserted-by":"crossref","first-page":"2671","DOI":"10.1007\/s11071-022-07328-3","volume":"108","author":"Xiuli Chai","year":"2022","unstructured":"Chai, Xiuli, Jiangyu, Fu., Gan, Zhihua, Yang, Lu., Zhang, Yushu: An image encryption scheme based on multi-objective optimization and block compressed sensing. Nonlinear Dyn. 108(3), 2671\u20132704 (2022)","journal-title":"Nonlinear Dyn."},{"key":"3219_CR20","doi-asserted-by":"crossref","first-page":"1509","DOI":"10.1007\/s00371-021-02085-7","volume":"38","author":"J Xu","year":"2022","unstructured":"Xu, J., Mou, J., Liu, J., Hao, J.: The image compression-encryption algorithm based on the compression sensing and fractional-order chaotic system. Vis. Comput. 38, 1509\u20131526 (2022)","journal-title":"Vis. Comput."},{"key":"3219_CR21","first-page":"103005","volume":"63","author":"S Sabir","year":"2021","unstructured":"Sabir, S., Guleria, V., Mishra, D.C.: Security of multiple RGB images in the time domain and frequency domain. J. Inf. Secur. Appl. 63, 103005 (2021)","journal-title":"J. Inf. Secur. Appl."},{"issue":"3","key":"3219_CR22","doi-asserted-by":"crossref","first-page":"1027","DOI":"10.1007\/s00371-021-02066-w","volume":"38","author":"Gurpreet Kaur","year":"2022","unstructured":"Kaur, Gurpreet, Agarwal, Rekha, Patidar, Vinod: Color image encryption scheme based on fractional Hartley transform and chaotic substitution-permutation. Vis. Comput. 38(3), 1027\u20131050 (2022)","journal-title":"Vis. Comput."},{"key":"3219_CR23","doi-asserted-by":"crossref","first-page":"348","DOI":"10.1016\/j.ijleo.2018.01.064","volume":"159","author":"A Ur Rehman","year":"2018","unstructured":"Ur Rehman, A., Liao, X., Ashraf, R., Ullah, S., Wang, H.: A color image encryption technique using exclusive-or with DNA complementary rules based on chaos theory and SHA-2. Optik 159, 348\u2013367 (2018)","journal-title":"Optik"},{"key":"3219_CR24","doi-asserted-by":"crossref","first-page":"127211","DOI":"10.1016\/j.optcom.2021.127211","volume":"499","author":"Wenlong Dong","year":"2021","unstructured":"Dong, Wenlong, Li, Qiliang, Tang, Yiwen, Miao, Hu., Zeng, Ran: A robust and multi chaotic DNA image encryption with pixel-value pseudorandom substitution scheme. Opt. Commun. 499, 127211 (2021)","journal-title":"Opt. Commun."},{"key":"3219_CR25","doi-asserted-by":"crossref","first-page":"107879","DOI":"10.1016\/j.optlastec.2022.107879","volume":"149","author":"Zhi-Wen Huang","year":"2022","unstructured":"Huang, Zhi-Wen., Zhou, Nan-Run.: Image encryption scheme based on discrete cosine Stockwell transform and DNA-level modulus diffusion. Opt. Laser Technol. 149, 107879 (2022)","journal-title":"Opt. Laser Technol."},{"key":"3219_CR26","doi-asserted-by":"crossref","unstructured":"Cun, Q., Tong, X., Wang, Z., Zhang, M.: A new chaotic image encryption algorithm based on dynamic DNA coding and RNA computing. Vis. Comput. 39, 6589\u20136608 (2023)","DOI":"10.1007\/s00371-022-02750-5"},{"key":"3219_CR27","doi-asserted-by":"crossref","unstructured":"Wang, Quanyv, Zhang, Xiaoqiang, Zhao, Xiaohu: Image encryption algorithm based on improved zigzag transformation and quaternary DNA coding. J. Inf. Secur. Appl. 70, 103340 (2022)","DOI":"10.1016\/j.jisa.2022.103340"},{"issue":"2","key":"3219_CR28","doi-asserted-by":"crossref","first-page":"1995","DOI":"10.1007\/s11042-022-12641-5","volume":"82","author":"SA Elsaid","year":"2023","unstructured":"Elsaid, S.A., Alotaibi, E.R., Alsaleh, S.: A robust hybrid cryptosystem based on DNA and hyperchaotic for images encryption. Multimed. Tools Appl. 82(2), 1995\u20132019 (2023)","journal-title":"Multimed. Tools Appl."},{"issue":"23","key":"3219_CR29","doi-asserted-by":"crossref","first-page":"6276","DOI":"10.1016\/j.ijleo.2013.05.009","volume":"124","author":"Qiang Zhang","year":"2013","unstructured":"Zhang, Qiang, Wei, Xiaopeng: A novel couple images encryption algorithm based on DNA subsequence operation and chaotic system. Optik 124(23), 6276\u20136281 (2013)","journal-title":"Optik"},{"issue":"5","key":"3219_CR30","doi-asserted-by":"crossref","first-page":"2558","DOI":"10.1016\/j.ijleo.2015.11.221","volume":"127","author":"Xiang Li","year":"2016","unstructured":"Li, Xiang, Wang, Leyuan, Yan, Yinfa, Liu, Ping: An improvement color image encryption algorithm based on DNA operations and real and complex chaotic systems. Optik 127(5), 2558\u20132565 (2016)","journal-title":"Optik"},{"key":"3219_CR31","doi-asserted-by":"crossref","first-page":"105851","DOI":"10.1016\/j.optlaseng.2019.105851","volume":"125","author":"Yu Xingyuan Wang","year":"2020","unstructured":"Xingyuan Wang, Yu., Wang, Xiaoqiang Zhu, Luo, Chao: A novel chaotic algorithm for image encryption utilizing one-time pad based on pixel level and DNA level. Opt. Lasers Eng. 125, 105851 (2020)","journal-title":"Opt. Lasers Eng."},{"issue":"2","key":"3219_CR32","doi-asserted-by":"crossref","first-page":"1587","DOI":"10.1007\/s11071-019-05378-8","volume":"99","author":"Wenying Wen","year":"2020","unstructured":"Wen, Wenying, Wei, Kangkang, Zhang, Yushu, Fang, Yuming, Li, Ming: Colour light field image encryption based on DNA sequences and chaotic systems. Nonlinear Dyn. 99(2), 1587\u20131600 (2020)","journal-title":"Nonlinear Dyn."},{"key":"3219_CR33","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.sigpro.2018.09.029","volume":"155","author":"Xiuli Chai","year":"2019","unstructured":"Chai, Xiuli, Xianglong, Fu., Gan, Zhihua, Yang, Lu., Chen, Yiran: A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process. 155, 44\u201362 (2019)","journal-title":"Signal Process."},{"key":"3219_CR34","doi-asserted-by":"crossref","first-page":"2103","DOI":"10.1007\/s11071-022-07534-z","volume":"109","author":"C Yang","year":"2022","unstructured":"Yang, C., Taralova, I., El Assad, S., Loiseau, J.-J.: Image encryption based on fractional chaotic pseudo-random number generator and DNA encryption method. Nonlinear Dyn. 109, 2103 (2022)","journal-title":"Nonlinear Dyn."},{"key":"3219_CR35","doi-asserted-by":"crossref","first-page":"111631","DOI":"10.1016\/j.chaos.2021.111631","volume":"155","author":"Melih Yildirim","year":"2022","unstructured":"Yildirim, Melih: Optical color image encryption scheme with a novel DNA encoding algorithm based on a chaotic circuit. Chaos Solitons Fractals 155, 111631 (2022)","journal-title":"Chaos Solitons Fractals"},{"key":"3219_CR36","doi-asserted-by":"crossref","first-page":"112456","DOI":"10.1016\/j.chaos.2022.112456","volume":"162","author":"Yu Jinwei","year":"2022","unstructured":"Jinwei, Yu., Xie, Wei, Zhong, Zhenyu, Wang, Huan: Image encryption algorithm based on hyperchaotic system and a new DNA sequence operation. Chaos Solitons Fractals 162, 112456 (2022)","journal-title":"Chaos Solitons Fractals"},{"key":"3219_CR37","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1016\/j.sigpro.2016.12.008","volume":"134","author":"Hu Ting","year":"2017","unstructured":"Ting, Hu., Liu, Ye., Gong, Li-Hua., Guo, Shao-Feng., Yuan, Hong-Mei.: Chaotic image cryptosystem using DNA deletion and DNA insertion. Signal Process. 134, 234\u2013243 (2017)","journal-title":"Signal Process."},{"key":"3219_CR38","first-page":"323","volume":"291","author":"Amin Zarei","year":"2016","unstructured":"Zarei, Amin, Tavakoli, Saeed: Hopf bifurcation analysis and ultimate bound estimation of a new 4-d quadratic autonomous hyper-chaotic system. Appl. Math. Comput. 291, 323\u2013339 (2016)","journal-title":"Appl. Math. Comput."},{"issue":"4356","key":"3219_CR39","doi-asserted-by":"crossref","first-page":"737","DOI":"10.1038\/171737a0","volume":"171","author":"JD Watson","year":"1953","unstructured":"Watson, J.D., Crick, F.H.C.: Molecular structure of nucleic acids: a structure for deoxyribose nucleic acid. Nature 171(4356), 737\u2013738 (1953)","journal-title":"Nature"},{"key":"3219_CR40","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.ins.2019.08.041","volume":"507","author":"Xingyuan Wang","year":"2020","unstructured":"Wang, Xingyuan, Gao, Suo: Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Inf. Sci. 507, 16\u201336 (2020)","journal-title":"Inf. Sci."},{"key":"3219_CR41","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1016\/j.sigpro.2018.02.028","volume":"148","author":"Wu Xiangjun","year":"2018","unstructured":"Xiangjun, Wu., Wang, Kunshu, Wang, Xingyuan, Kan, Haibin, Kurths, J\u00fcrgen.: Color image DNA encryption using NCA map-based CML and one-time keys. Signal Process. 148, 272\u2013287 (2018)","journal-title":"Signal Process."},{"key":"3219_CR42","doi-asserted-by":"crossref","first-page":"107326","DOI":"10.1016\/j.optlastec.2021.107326","volume":"143","author":"N Khalil","year":"2021","unstructured":"Khalil, N., Sarhan, A., Alshewimy, M.A.M.: An efficient color\/grayscale image encryption scheme based on hybrid chaotic maps. Opt. Laser Technol. 143, 107326 (2021)","journal-title":"Opt. Laser Technol."},{"key":"3219_CR43","doi-asserted-by":"crossref","first-page":"105769","DOI":"10.1016\/j.optlastec.2019.105769","volume":"121","author":"Kanglei Zhou","year":"2020","unstructured":"Zhou, Kanglei, Fan, Jingjing, Fan, Haiju, Li, Ming: Secure image encryption scheme using double random-phase encoding and compressed sensing. Opt. Laser Technol. 121, 105769 (2020)","journal-title":"Opt. Laser Technol."},{"key":"3219_CR44","doi-asserted-by":"crossref","unstructured":"Wang, Xingyuan, Yang, Jingjing: Spatiotemporal chaos in multiple coupled mapping lattices with multi-dynamic coupling coefficient and its application in color image encryption. Chaos Solitons Fractals 147, 110970 (2021)","DOI":"10.1016\/j.chaos.2021.110970"},{"key":"3219_CR45","doi-asserted-by":"crossref","first-page":"106881","DOI":"10.1016\/j.optlaseng.2021.106881","volume":"150","author":"Chen-Feng Duan","year":"2022","unstructured":"Duan, Chen-Feng., Zhou, Jie, Gong, Li-Hua., Jun-Yun, Wu., Zhou, Nan-Run.: New color image encryption scheme based on multi-parameter fractional discrete tchebyshev moments and nonlinear fractal permutation method. Opt. Lasers Eng. 150, 106881 (2022)","journal-title":"Opt. Lasers Eng."},{"issue":"6","key":"3219_CR46","doi-asserted-by":"crossref","first-page":"5919","DOI":"10.1007\/s11071-022-07995-2","volume":"111","author":"MA Lone","year":"2023","unstructured":"Lone, M.A., Qureshi, S.: Encryption scheme for rgb images using chaos and affine hill cipher technique. Nonlinear Dyn. 111(6), 5919\u20135939 (2023)","journal-title":"Nonlinear Dyn."}],"container-title":["The Visual Computer"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-023-03219-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00371-023-03219-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-023-03219-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,6]],"date-time":"2024-11-06T16:12:47Z","timestamp":1730909567000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00371-023-03219-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,2]]},"references-count":46,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2024,11]]}},"alternative-id":["3219"],"URL":"https:\/\/doi.org\/10.1007\/s00371-023-03219-9","relation":{},"ISSN":["0178-2789","1432-2315"],"issn-type":[{"type":"print","value":"0178-2789"},{"type":"electronic","value":"1432-2315"}],"subject":[],"published":{"date-parts":[[2024,1,2]]},"assertion":[{"value":"28 November 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 January 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}