{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T16:26:21Z","timestamp":1726849581196},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2018,5,22]],"date-time":"2018-05-22T00:00:00Z","timestamp":1526947200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput & Applic"],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1007\/s00521-018-3541-y","type":"journal-article","created":{"date-parts":[[2018,5,22]],"date-time":"2018-05-22T04:51:02Z","timestamp":1526964662000},"page":"7111-7130","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":166,"title":["A chaotic image encryption algorithm based on 3-D bit-plane permutation"],"prefix":"10.1007","volume":"31","author":[{"given":"Zhi-hua","family":"Gan","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-1609-0624","authenticated-orcid":false,"given":"Xiu-li","family":"Chai","sequence":"additional","affiliation":[]},{"given":"Dao-jun","family":"Han","sequence":"additional","affiliation":[]},{"given":"Yi-ran","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,22]]},"reference":[{"key":"3541_CR1","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.biosystems.2016.03.011","volume":"144","author":"XY Wang","year":"2016","unstructured":"Wang XY, Zhang HL, Bao XM (2016) Color image encryption scheme using CML and DNA sequence operations. Biosystems 144:18\u201326","journal-title":"Biosystems"},{"key":"3541_CR2","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/j.asoc.2014.05.025","volume":"22","author":"GD Ye","year":"2014","unstructured":"Ye GD, Zhou JW (2014) A block chaotic image encryption scheme based on self-adaptive modelling. Appl Soft Comput 22:351\u2013357","journal-title":"Appl Soft Comput"},{"key":"3541_CR3","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.optlaseng.2016.08.009","volume":"88","author":"XL Chai","year":"2017","unstructured":"Chai XL, Chen YR, LBroyde YR (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 88:197\u2013213","journal-title":"Opt Lasers Eng"},{"issue":"9","key":"3541_CR4","doi-asserted-by":"publisher","first-page":"2001","DOI":"10.1109\/TCYB.2014.2363168","volume":"45","author":"YC Zhou","year":"2015","unstructured":"Zhou YC, Hua ZY, Pun CM, Philip Chen CL (2015) Cascade chaotic system with applications. IEEE Trans Cybern 45(9):2001\u20132012","journal-title":"IEEE Trans Cybern"},{"key":"3541_CR5","doi-asserted-by":"publisher","first-page":"020504","DOI":"10.1088\/1674-1056\/26\/2\/020504","volume":"26","author":"XL Chai","year":"2017","unstructured":"Chai XL, Gan ZH, Yuan K, Yang L, Chen YR (2017) An image encryption scheme based on three-dimensional Brownian motion and chaotic system. Chin Phys B 26:020504","journal-title":"Chin Phys B"},{"issue":"1","key":"3541_CR6","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.cnsns.2013.06.031","volume":"19","author":"YS Zhang","year":"2014","unstructured":"Zhang YS, Xiao D (2014) An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun Nonlinear Sci Numer Simul 19(1):74\u201382","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"3541_CR7","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1080\/0161-118991863745","volume":"4","author":"R Matthews","year":"1989","unstructured":"Matthews R (1989) On the derivation of a chaotic encryption algorithm. Cryptologia 4:29\u201342","journal-title":"Cryptologia"},{"key":"3541_CR8","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.sigpro.2015.06.008","volume":"118","author":"W Zhang","year":"2016","unstructured":"Zhang W, Yu H, Zhao YL, Zhu ZL (2016) Image encryption based on three-dimensional bit matrix permutation. Signal Process 118:36\u201350","journal-title":"Signal Process"},{"key":"3541_CR9","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.neucom.2014.11.095","volume":"169","author":"GM Zhou","year":"2015","unstructured":"Zhou GM, Zhang DX, Liu YJ, Yuan Y, Liu Q (2015) A novel image encryption algorithm based on chaos and Line map. Neurocomputing 169:150\u2013157","journal-title":"Neurocomputing"},{"key":"3541_CR10","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.sigpro.2015.01.016","volume":"113","author":"HJ Liu","year":"2015","unstructured":"Liu HJ, Kadir A (2015) Asymmetric color image encryption scheme using 2D discrete-time map. Signal Process 113:104\u2013112","journal-title":"Signal Process"},{"key":"3541_CR11","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.ins.2016.02.041","volume":"349\u2013350","author":"XJ Wu","year":"2016","unstructured":"Wu XJ, Wang DW, Kurths J, Kan HB (2016) A novel lossless color image encryption scheme using 2D DWT and 6D hyperchaotic system. Inf Sci 349\u2013350:137\u2013153","journal-title":"Inf Sci"},{"key":"3541_CR12","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.optlaseng.2015.03.022","volume":"73","author":"XY Wang","year":"2015","unstructured":"Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53\u201361","journal-title":"Opt Lasers Eng"},{"key":"3541_CR13","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1016\/j.ins.2014.02.156","volume":"273","author":"YQ Zhang","year":"2014","unstructured":"Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear- nonlinear coupled map lattice. Inf Sci 273:329\u2013351","journal-title":"Inf Sci"},{"key":"3541_CR14","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.ins.2016.01.017","volume":"339","author":"ZY Hua","year":"2016","unstructured":"Hua ZY, Zhou YC (2016) Image encryption using 2D logistic-adjusted-sine map. Inf Sci 339:237\u2013253","journal-title":"Inf Sci"},{"key":"3541_CR15","doi-asserted-by":"publisher","first-page":"9907","DOI":"10.1007\/s11042-016-3585-x","volume":"76","author":"XL Chai","year":"2017","unstructured":"Chai XL, Yang K, Gan ZH (2017) A new chaos-based image encryption algorithm with dynamic key selection mechanisms. Multimed Tools Appl 76:9907\u20139927","journal-title":"Multimed Tools Appl"},{"key":"3541_CR16","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/s11071-013-1074-6","volume":"75","author":"GD Ye","year":"2014","unstructured":"Ye GD (2014) A block image encryption algorithm based on wave transmission and chaotic systems. Nonlinear Dyn 75:417\u2013427","journal-title":"Nonlinear Dyn"},{"key":"3541_CR17","doi-asserted-by":"publisher","first-page":"1493","DOI":"10.1007\/s11071-015-1957-9","volume":"80","author":"XJ Tong","year":"2015","unstructured":"Tong XJ, Wang Z, Zhang M, Liu Y, Xu H, Ma J (2015) An image encryption algorithm based on the perturbed high-dimensional chaotic map. Nonlinear Dyn 80:1493\u20131508","journal-title":"Nonlinear Dyn"},{"key":"3541_CR18","first-page":"1","volume":"6","author":"WY Wen","year":"2016","unstructured":"Wen WY, Zhang YS, Fang YM, Fang ZJ (2016) Image salient regions encryption for generating visually meaningful ciphertext image. Neural Comput Appl 6:1\u201311","journal-title":"Neural Comput Appl"},{"key":"3541_CR19","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1007\/s11071-011-0006-6","volume":"67","author":"O Mirzaei","year":"2012","unstructured":"Mirzaei O, Yaghoobi M, Irani H (2012) A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dyn 67:557\u2013566","journal-title":"Nonlinear Dyn"},{"key":"3541_CR20","doi-asserted-by":"publisher","first-page":"795","DOI":"10.1007\/s11071-013-0832-9","volume":"73","author":"XY Wang","year":"2013","unstructured":"Wang XY, Liu LT (2013) Cryptanalysis of a parallel sub-image encryption method with high-dimensional chaos. Nonlinear Dyn 73:795\u2013800","journal-title":"Nonlinear Dyn"},{"key":"3541_CR21","doi-asserted-by":"publisher","first-page":"3596","DOI":"10.1016\/j.ijleo.2012.11.018","volume":"124","author":"Q Zhang","year":"2013","unstructured":"Zhang Q, Guo L, Wei X (2013) A novel image fusion encryption algorithm based on DNA sequence operation and hyperchaotic system. Optik. 124:3596\u20133600","journal-title":"Optik."},{"key":"3541_CR22","doi-asserted-by":"publisher","first-page":"1311","DOI":"10.1007\/s11071-014-1517-8","volume":"78","author":"Fatih Ozkaynak","year":"2014","unstructured":"Ozkaynak Fatih, Yavuz Sirma (2014) Analysis and improvement of a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Nonlinear Dyn 78:1311\u20131320","journal-title":"Nonlinear Dyn"},{"key":"3541_CR23","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1049\/ip-vis:20000208","volume":"147","author":"JC Yen","year":"2000","unstructured":"Yen JC, Guo JI (2000) Efficient hierarchical chaotic image encryption algorithm and its VLSI realization. IEEE Proc Vis Image signal Process 147:167\u2013175","journal-title":"IEEE Proc Vis Image signal Process"},{"key":"3541_CR24","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.sigpro.2015.07.008","volume":"118","author":"CQ Li","year":"2016","unstructured":"Li CQ (2016) Cracking a hierarchical chaotic image encryption algorithm based on permutation. Signal Process 118:203\u2013210","journal-title":"Signal Process"},{"key":"3541_CR25","doi-asserted-by":"publisher","first-page":"2178","DOI":"10.1016\/j.cpc.2013.04.014","volume":"184","author":"F Ozkaynak","year":"2013","unstructured":"Ozkaynak F, Yavuz S (2013) Security problems of pseudorandom sequence generator based on Chen chaotic system. Comput Phys Commun 184:2178\u20132181","journal-title":"Comput Phys Commun"},{"key":"3541_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.optlaseng.2014.08.010","volume":"66","author":"JX Chen","year":"2015","unstructured":"Chen JX, Zhu ZL, Fu C, Zhang LB, Yu H (2015) Analysis and improvement of a double-image encryption scheme using pixel scrambling technique in gyrator domains. Opt Lasers Eng 66:1\u20139","journal-title":"Opt Lasers Eng"},{"issue":"13","key":"3541_CR27","doi-asserted-by":"publisher","first-page":"1550188","DOI":"10.1142\/S0218127415501886","volume":"25","author":"YS Liu","year":"2015","unstructured":"Liu YS, Fan H, Xie EY, Cheng G, Li CQ (2015) Deciphering an image cipher based on mixed transformed logistic maps. Int J Bifurc Chaos 25(13):1550188","journal-title":"Int J Bifurc Chaos"},{"key":"3541_CR28","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.optcom.2015.03.079","volume":"350","author":"A Akhavan","year":"2015","unstructured":"Akhavan A, Samsudin A, Akhshani A (2015) Cryptanalysis of \u201can improvement over an image encryption method based on total shuffling\u201d. Opt Commun 350:77\u201382","journal-title":"Opt Commun"},{"key":"3541_CR29","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MMUL.2017.3051512","volume":"24","author":"CQ Li","year":"2017","unstructured":"Li CQ, Lin DD, Lu JH (2017) Cryptanalyzing an image-scrambling encryption algorithm of pixel bits. IEEE Multimed 24:64\u201371","journal-title":"IEEE Multimed"},{"key":"3541_CR30","unstructured":"Li CQ, Feng BB, Lu JH (2018) Cryptanalysis of a chaotic image encryption algorithm based on information entropy. Int J Bifurc Chaos \n arXiv:1803.10024"},{"key":"3541_CR31","doi-asserted-by":"publisher","first-page":"1745","DOI":"10.1016\/j.chaos.2009.03.084","volume":"42","author":"S Mazloom","year":"2009","unstructured":"Mazloom S, Eftekhari-Moghadam A (2009) Color image encryption based on coupled nonlinear chaotic map. Chaos Solitons Fract 42:1745\u20131754","journal-title":"Chaos Solitons Fract"},{"key":"3541_CR32","doi-asserted-by":"publisher","first-page":"1174","DOI":"10.1016\/j.optlaseng.2010.07.005","volume":"48","author":"Q Guo","year":"2010","unstructured":"Guo Q, Liu ZG, Liu ST (2010) Colour image encryption by using Arnold and discrete fractional random transforms in HIS space. Opt Lasers Eng 48:1174\u20131181","journal-title":"Opt Lasers Eng"},{"key":"3541_CR33","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1007\/s11071-015-2392-7","volume":"83","author":"R Guesmi","year":"2016","unstructured":"Guesmi R, Farah MAB, Kachouri A, Samet M (2016) A novel chaos-based image encryption using DNA sequence operation and secure hash algorithm SHA-2. Nonlinear Dyn 83:1123\u20131136","journal-title":"Nonlinear Dyn"},{"key":"3541_CR34","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1007\/s11071-015-1893-8","volume":"80","author":"S Som","year":"2015","unstructured":"Som S, Dutta S, Singha R, Kotal A, Palit S (2015) Confusion and diffusion of color images with multiple chaotic maps and chaos-based pseudorandom binary number generator. Nonlinear Dyn 80:615\u2013627","journal-title":"Nonlinear Dyn"},{"key":"3541_CR35","doi-asserted-by":"publisher","first-page":"1240","DOI":"10.1016\/j.compeleceng.2012.02.007","volume":"38","author":"L Liu","year":"2012","unstructured":"Liu L, Zhang Q, Wei X (2012) A RGB image encryption algorithm based on DNA encoding and chaos map. Comput Electr Eng 38:1240\u20131248","journal-title":"Comput Electr Eng"},{"key":"3541_CR36","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.optlastec.2014.01.015","volume":"60","author":"Y Liu","year":"2014","unstructured":"Liu Y, Tang J, Xie T (2014) Cryptanalyzing a RGB image encryption algorithm based on DNA encoding and chaos map. Opt Lasers Eng 60:111\u2013115","journal-title":"Opt Lasers Eng"},{"key":"3541_CR37","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1016\/j.sigpro.2011.10.023","volume":"92","author":"XY Wang","year":"2012","unstructured":"Wang XY, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92:1101\u20131108","journal-title":"Signal Process"},{"key":"3541_CR38","doi-asserted-by":"publisher","first-page":"2383","DOI":"10.1007\/s11071-012-0626-5","volume":"70","author":"CQ Li","year":"2012","unstructured":"Li CQ, Zhang Y, Ou R, Wong KW (2012) Breaking a novel colour image encryption algorithm based on chaos. Nonlinear Dyn 70:2383\u20132388","journal-title":"Nonlinear Dyn"},{"key":"3541_CR39","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/j.aeue.2013.10.002","volume":"68","author":"YS Zhang","year":"2014","unstructured":"Zhang YS, Xiao D (2014) Self-adaptive permutation and combined global diffusion for chaotic color image encryption. Int J Electron Commun 68:361\u2013368","journal-title":"Int J Electron Commun"},{"key":"3541_CR40","doi-asserted-by":"publisher","first-page":"769108","DOI":"10.1155\/2013\/769108","volume":"2013","author":"A-C D\u0103sc\u0103lescu","year":"2013","unstructured":"D\u0103sc\u0103lescu A-C, Boriga RE, Diaconu A-V (2013) Study of a new chaotic dynamical system and its usage in a novel pseudorandom bit generator. Math Probl Eng 2013:769108. \n https:\/\/doi.org\/10.1155\/2013\/769108","journal-title":"Math Probl Eng"},{"key":"3541_CR41","doi-asserted-by":"publisher","first-page":"871","DOI":"10.1364\/AO.52.000871","volume":"52","author":"SK Rajput","year":"2013","unstructured":"Rajput SK, Naveen NK (2013) Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform. Appl Opt 52:871\u2013878","journal-title":"Appl Opt"},{"key":"3541_CR42","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.compbiomed.2013.11.010","volume":"45","author":"GY Liu","year":"2014","unstructured":"Liu GY, Li J, Liu HJ (2014) Chaos-based color pathological image encryption scheme using one-time keys. Comput Biol Med 45:111\u2013117","journal-title":"Comput Biol Med"},{"key":"3541_CR43","first-page":"1091","volume":"4","author":"S Liu","year":"2009","unstructured":"Liu S, Sun J, Xu Z (2009) An improved image encryption algorithm based on chaotic system. J Comput 4:1091\u20131100","journal-title":"J Comput"},{"key":"3541_CR44","doi-asserted-by":"publisher","first-page":"4653","DOI":"10.1016\/j.cnsns.2012.05.033","volume":"17","author":"A Akhshani","year":"2012","unstructured":"Akhshani A, Akhavan A, Lim SC, Hassan Z (2012) An image encryption scheme based on quantum logistic map. Commun Nonlinear Sci Numer Simul 17:4653\u20134661","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"3541_CR45","doi-asserted-by":"publisher","first-page":"2986","DOI":"10.1016\/j.sigpro.2013.03.031","volume":"93","author":"AAA El-Latif","year":"2013","unstructured":"El-Latif AAA, Li L, Wang N, Han Q, Niu X (2013) A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces. Signal Process 93:2986\u20133000","journal-title":"Signal Process"},{"key":"3541_CR46","doi-asserted-by":"publisher","first-page":"100503","DOI":"10.1088\/1674-1056\/25\/10\/100503","volume":"25","author":"XL Chai","year":"2016","unstructured":"Chai XL, Gan ZH, Lu Y, Zhang MH, Chen YR (2016) A novel color image encryption algorithm based on genetic recombination and the four-dimensional memristive hyperchaotic system. Chin Phys B 25:100503","journal-title":"Chin Phys B"},{"key":"3541_CR47","doi-asserted-by":"publisher","first-page":"902","DOI":"10.1016\/j.image.2014.06.012","volume":"29","author":"XP Zhang","year":"2014","unstructured":"Zhang XP, Zhao ZM, Wang JY (2014) Chaotic image encryption based on circular substitution box and key stream buffer. Signal Process Image\u00a029:902\u2013913","journal-title":"Signal Process Image"},{"key":"3541_CR48","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s11071-015-1979-3","volume":"81","author":"Y Wang","year":"2015","unstructured":"Wang Y, Zhang X, Zheng ZM, Qiu WJ (2015) A colour image encryption algorithm using 4-pixel Feistel structure and multiple chaotic systems. Nonlinear Dyn 81:151\u2013168","journal-title":"Nonlinear Dyn"},{"key":"3541_CR49","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/j.ins.2012.07.049","volume":"222","author":"Y Wu","year":"2013","unstructured":"Wu Y, Zhou YC, Saveriades G, Agaian S, Noonan JP, Natarajan P (2013) Local Shannon entropy measure with statistical tests for image randomness. Inf Sci 222:323\u2013342","journal-title":"Inf Sci"},{"key":"3541_CR50","doi-asserted-by":"publisher","first-page":"1671","DOI":"10.1016\/j.ijleo.2013.09.040","volume":"125","author":"A Kadir","year":"2014","unstructured":"Kadir A, Hamdulla A, Guo W (2014) Color image encryption using skew tent map and hyper chaotic system of 6th-order CNN. Optik 125:1671\u20131675","journal-title":"Optik"},{"key":"3541_CR51","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1016\/j.jss.2011.08.017","volume":"85","author":"X Wei","year":"2012","unstructured":"Wei X, Guo L, Zhang Q, Zhang J, Lian S (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw 85:290\u2013299","journal-title":"J Syst Softw"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-018-3541-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00521-018-3541-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-018-3541-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T16:29:09Z","timestamp":1571934549000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00521-018-3541-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,22]]},"references-count":51,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2019,11]]}},"alternative-id":["3541"],"URL":"https:\/\/doi.org\/10.1007\/s00521-018-3541-y","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5,22]]},"assertion":[{"value":"21 December 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 May 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 May 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}