{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,3]],"date-time":"2024-08-03T09:49:27Z","timestamp":1722678567345},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2022,2,19]],"date-time":"2022-02-19T00:00:00Z","timestamp":1645228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,2,19]],"date-time":"2022-02-19T00:00:00Z","timestamp":1645228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802111, 61872125, 61871175"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1007\/s10489-022-03323-8","type":"journal-article","created":{"date-parts":[[2022,2,19]],"date-time":"2022-02-19T17:02:31Z","timestamp":1645290151000},"page":"13006-13026","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Efficient capacity-distortion reversible data hiding based on combining multipeak embedding with local complexity"],"prefix":"10.1007","volume":"52","author":[{"given":"Zhifeng","family":"Fu","sequence":"first","affiliation":[]},{"given":"Mengxin","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Guoqiang","family":"Long","sequence":"additional","affiliation":[]},{"given":"Zhihua","family":"Gan","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-1609-0624","authenticated-orcid":false,"given":"Xiuli","family":"Chai","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,19]]},"reference":[{"key":"3323_CR1","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.sigpro.2018.01.011","volume":"146","author":"Y Zhang","year":"2018","unstructured":"Zhang Y, Qin C, Zhang WM, Liu FL, Luo XY (2018) On the fault-tolerant performance for a class of robust image steganography. Signal Process 146:99\u2013111","journal-title":"Signal Process"},{"key":"3323_CR2","doi-asserted-by":"publisher","first-page":"1701","DOI":"10.1007\/s10489-020-01903-0","volume":"51","author":"SBB Ahmadi","year":"2021","unstructured":"Ahmadi SBB, Zhang GX, Rabbani M, Boukela L, Jelodar H (2021) An intelligent and blind dual color image watermarking for authentication and copyright protection. Appl Intell 51:1701\u20131732","journal-title":"Appl Intell"},{"key":"3323_CR3","doi-asserted-by":"crossref","unstructured":"Quan YH, Teng H, Chen YX, Ji H (2021) Watermarking deep neural networks in image processing. IEEE T Neur Net Lear 32(5):1852\u20131865","DOI":"10.1109\/TNNLS.2020.2991378"},{"key":"3323_CR4","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1007\/s10489-021-02476-2","volume":"52","author":"ZQ Xia","year":"2021","unstructured":"Xia ZQ, Wang XY, Wang CP, Wang CX, Ma B, Li Q, Wang MX, Zhao TT (2021) A robust zero-watermarking algorithm for lossless copyright protection of medical images. Appl Intell 52:607\u2013621. https:\/\/doi.org\/10.1007\/s10489-021-02476-2","journal-title":"Appl Intell"},{"key":"3323_CR5","doi-asserted-by":"crossref","unstructured":"Wang ZC, Zhang XP, Yin ZX (2018) Joint cover-selection and payload-allocation by steganographic distortion optimization. IEEE Signal Proc Let 25(10):1530\u20131534","DOI":"10.1109\/LSP.2018.2865888"},{"issue":"6","key":"3323_CR6","doi-asserted-by":"publisher","first-page":"1609","DOI":"10.1007\/s10489-017-0989-x","volume":"48","author":"A Adeli","year":"2018","unstructured":"Adeli A, Broumandnia A (2018) Image steganalysis using improved particle swarm optimization based feature selection. Appl Intell 48(6):1609\u20131622","journal-title":"Appl Intell"},{"key":"3323_CR7","doi-asserted-by":"publisher","first-page":"165492","DOI":"10.1016\/j.ijleo.2020.165492","volume":"226","author":"J Sharafi","year":"2021","unstructured":"Sharafi J, Khedmati Y, Shabani MM (2021) Image steganography based on a new hybrid chaos map and discrete transforms. Optik 226:165492","journal-title":"Optik."},{"key":"3323_CR8","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.sigpro.2019.01.008","volume":"158","author":"MY Xiao","year":"2019","unstructured":"Xiao MY, Li XL, Wang YY, Zhao Y, Ni RR (2019) Reversible data hiding based on pairwise embedding and optimal expansion path. Signal Process 158:210\u2013218","journal-title":"Signal Process"},{"key":"3323_CR9","doi-asserted-by":"publisher","unstructured":"Kumar S, Gupta A, Walia GS (2021) Reversible data hiding: a contemporary survey of state-of-the-art, opportunities and challenges, Appl Intell. \u00a0https:\/\/doi.org\/10.1007\/s10489-021-02789-2","DOI":"10.1007\/s10489-021-02789-2"},{"issue":"33\u201334","key":"3323_CR10","doi-asserted-by":"publisher","first-page":"24329","DOI":"10.1007\/s11042-019-08402-6","volume":"79","author":"XZ Xie","year":"2020","unstructured":"Xie XZ, Chang CC, Hu YC (2020) An adaptive reversible data hiding scheme based on prediction error histogram shifting by exploiting signed-digit representation. Multimed Tools Appl 79(33\u201334):24329\u201324346","journal-title":"Multimed Tools Appl"},{"key":"3323_CR11","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1109\/TIP.2020.3036727","volume":"30","author":"RW Hu","year":"2021","unstructured":"Hu RW, Xiang SJ (2021) Cover-lossless robust image watermarking against geometric deformations. IEEE Trans Image Process 30:318\u2013331","journal-title":"IEEE Trans Image Process"},{"key":"3323_CR12","doi-asserted-by":"publisher","first-page":"107583","DOI":"10.1016\/j.knosys.2021.107583","volume":"234","author":"FH Wu","year":"2021","unstructured":"Wu FH, Zhou X, Chen ZL, Yang BH (2021) A reversible data hiding scheme for encrypted images with pixel difference encoding. Knowl-Based Syst 234:107583","journal-title":"Knowl-Based Syst"},{"key":"3323_CR13","first-page":"168137","volume":"168137","author":"SJ Panchikkil","year":"2021","unstructured":"Panchikkil SJ, Manikandan VM, Zhang YD (2021) A convolutional neural network model based reversible data hiding scheme in encrypted images with block-wise Arnold transform. Optik. 168137:168137","journal-title":"Optik."},{"key":"3323_CR14","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.ins.2021.10.050","volume":"584","author":"CQ Yu","year":"2022","unstructured":"Yu CQ, Zhang XQ, Li GX, Zhan SH, Tang ZJ (2022) Reversible data hiding with adaptive difference recovery for encrypted images. Inf Sci 584:89\u2013110","journal-title":"Inf Sci"},{"key":"3323_CR15","doi-asserted-by":"crossref","unstructured":"Wu YQ, Xiang YZ, Guo YT, Tang J, Yin ZX (2020) An improved reversible data hiding in encrypted images using parametric binary tree labeling. IEEE T Multimedia 22(8):1929\u20131938","DOI":"10.1109\/TMM.2019.2952979"},{"key":"3323_CR16","doi-asserted-by":"publisher","first-page":"108200","DOI":"10.1016\/j.sigpro.2021.108200","volume":"188","author":"XS Wu","year":"2021","unstructured":"Wu XS, Qiao T, Xu M, Zheng N (2021) Secure reversible data hiding in encrypted images based on adaptive prediction-error labeling. Signal Process 188:108200","journal-title":"Signal Process"},{"key":"3323_CR17","doi-asserted-by":"publisher","first-page":"103166","DOI":"10.1016\/j.jvcir.2021.103166","volume":"78","author":"M Li","year":"2021","unstructured":"Li M, Ren H, Xiang Y, Zhang YS (2021) Reversible data hiding in encrypted color images using cross-channel correlations. J Vis Commun Image Represent 78:103166","journal-title":"J Vis Commun Image Represent"},{"key":"3323_CR18","doi-asserted-by":"publisher","first-page":"108146","DOI":"10.1016\/j.sigpro.2021.108146","volume":"187","author":"ZX Yin","year":"2021","unstructured":"Yin ZX, She XM, Tang J, Luo B (2021) Reversible data hiding in encrypted images based on pixel prediction and multi-MSB planes rearrangement. Signal Process 187:108146","journal-title":"Signal Process"},{"key":"3323_CR19","doi-asserted-by":"publisher","first-page":"115721","DOI":"10.1016\/j.eswa.2021.115721","volume":"186","author":"R Bhardwaj","year":"2021","unstructured":"Bhardwaj R, Aggarwal A (2021) An enhanced separable reversible and secure patient data hiding algorithm for telemedicine applications. Expert Syst Appl 186:115721","journal-title":"Expert Syst Appl"},{"key":"3323_CR20","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/j.jvcir.2017.10.001","volume":"49","author":"WG He","year":"2017","unstructured":"He WG, Zhou K, Cai J, Wang L, Xiong GQ (2017) Reversible data hiding using multi-pass pixel value ordering and prediction-error expansion. J Vis Commun Image Represent 49:351\u2013360","journal-title":"J Vis Commun Image Represent"},{"key":"3323_CR21","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.jvcir.2017.05.005","volume":"48","author":"SW Weng","year":"2017","unstructured":"Weng SW, Zhang GH, Pan JS, Zhou ZL (2017) Optimal PPVO-based reversible data hiding. J Vis Commun Image Represent 48:317\u2013328","journal-title":"J Vis Commun Image Represent"},{"key":"3323_CR22","doi-asserted-by":"crossref","unstructured":"Kaur G, Singh S, Rani R, Kumar R (2021) A comprehensive study of reversible data hiding (RDH) schemes based on pixel value ordering (PVO). Arch Computat Methods Eng 28. 3517\u20133568","DOI":"10.1007\/s11831-020-09512-3"},{"key":"3323_CR23","doi-asserted-by":"publisher","first-page":"102821","DOI":"10.1016\/j.jvcir.2020.102821","volume":"71","author":"C Zhang","year":"2020","unstructured":"Zhang C, Ou B, Tian HW, Qin Z (2020) Reversible data hiding in JPEG bitstream using optimal VLC mapping. J Vis Commun Image Represent 71:102821","journal-title":"J Vis Commun Image Represent"},{"key":"3323_CR24","doi-asserted-by":"publisher","first-page":"107476","DOI":"10.1016\/j.sigpro.2020.107476","volume":"171","author":"N Li","year":"2020","unstructured":"Li N, Huang FJ (2020) Reversible data hiding for JPEG images based on pairwise nonzero AC coefficient expansion. Signal Process 171:107476","journal-title":"Signal Process"},{"key":"3323_CR25","doi-asserted-by":"crossref","unstructured":"Yin ZX, Ji Y, Luo B (2020) Reversible data hiding in JPEG images with multi-objective optimization. IEEE T Circ Syst Vid 30(8):2343\u20132352","DOI":"10.1109\/TCSVT.2020.2969463"},{"key":"3323_CR26","unstructured":"Ahmad Shaik V (2020) Thanikaiselvan, comparative analysis of integer wavelet transforms in reversible data hiding using threshold based histogram modification. J King Saud Univ Sci 32(10):1218"},{"key":"3323_CR27","doi-asserted-by":"publisher","first-page":"107288","DOI":"10.1016\/j.sigpro.2019.107288","volume":"167","author":"YQ Qiu","year":"2020","unstructured":"Qiu YQ, Qian ZX, Zeng HQ, Lin XD, Zhang XP (2020) Reversible data hiding in encrypted images using adaptive reversible integer transformation. Signal Process 167:107288","journal-title":"Signal Process"},{"key":"3323_CR28","unstructured":"Du Y, Yin ZX, Zhang XP (2018) Improved lossless data hiding for JPEG images based on histogram modification. CMC-Comput Mater Con 55(3):495\u2013507"},{"key":"3323_CR29","doi-asserted-by":"crossref","unstructured":"Rashid A, Xu LX, Farhan A, Luo B (2019) Efficient lossless compression based reversible data hiding using multilayered n-bit localization, Secur Commun Netw 2019:8981240","DOI":"10.1155\/2019\/8981240"},{"issue":"3","key":"3323_CR30","doi-asserted-by":"publisher","first-page":"3623","DOI":"10.1007\/s11042-020-09341-3","volume":"80","author":"PC Mandal","year":"2020","unstructured":"Mandal PC, Mukherjee I, Chatterji BN (2020) High capacity reversible and secured data hiding in images using interpolation and difference expansion technique. Multimed Tools Appl 80(3):3623\u20133644","journal-title":"Multimed Tools Appl"},{"key":"3323_CR31","doi-asserted-by":"crossref","unstructured":"Ke Y, Zhang MQ, Liu J, Su TT, Yang XY (2020) Fully homomorphic encryption encapsulated difference expansion for reversible data hiding in encrypted domain. IEEE T Circ Syst Vid 30(8):2353\u20132365","DOI":"10.1109\/TCSVT.2019.2963393"},{"key":"3323_CR32","doi-asserted-by":"crossref","unstructured":"Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE T Circ Syst Vid 16(3):354\u2013362","DOI":"10.1109\/TCSVT.2006.869964"},{"key":"3323_CR33","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.sigpro.2019.05.020","volume":"163","author":"YJ Jia","year":"2019","unstructured":"Jia YJ, Yin ZX, Zhang XP, Luo YL (2019) Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting. Signal Process 163:238\u2013246","journal-title":"Signal Process"},{"key":"3323_CR34","doi-asserted-by":"crossref","unstructured":"He WG, Cai ZC (2020) An insight into pixel value ordering prediction based prediction-error expansion. IEEE T Inf Foren Sec 15:3859\u20133871","DOI":"10.1109\/TIFS.2020.3002377"},{"key":"3323_CR35","doi-asserted-by":"crossref","unstructured":"Qi WF, Li XL, Zhang T, Guo ZM (2020) Optimal reversible data hiding scheme based on multiple histograms modification. IEEE T Circ Syst Vid 30(8):2300\u20132312","DOI":"10.1109\/TCSVT.2019.2942489"},{"key":"3323_CR36","doi-asserted-by":"publisher","first-page":"103359","DOI":"10.1016\/j.jvcir.2021.103359","volume":"81","author":"S Mansouri","year":"2021","unstructured":"Mansouri S, Bizaki HK, Fakhredanesh M (2021) Reversible data hiding with automatic contrast enhancement using two-sided histogram expansion. J Vis Commun Image Represent 81:103359","journal-title":"J Vis Commun Image Represent"},{"key":"3323_CR37","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.ins.2020.10.063","volume":"549","author":"SW Weng","year":"2021","unstructured":"Weng SW, Tan WL, Ou B, Pan JS (2021) Reversible data hiding method for multi-histogram point selection based on improved crisscross optimization algorithm. Inf Sci 549:13\u201333","journal-title":"Inf Sci"},{"key":"3323_CR38","doi-asserted-by":"publisher","first-page":"106257","DOI":"10.1016\/j.asoc.2020.106257","volume":"92","author":"PK Muhuri","year":"2020","unstructured":"Muhuri PK, Ashraf Z, Goel S (2020) A novel image Steganographic method based on integer wavelet transformation and particle swarm optimization. Appl Soft Comput 92:106257","journal-title":"Appl Soft Comput"},{"key":"3323_CR39","doi-asserted-by":"publisher","first-page":"113377","DOI":"10.1016\/j.eswa.2020.113377","volume":"152","author":"A Faramarzi","year":"2020","unstructured":"Faramarzi A, Heidarinejad M, Mirjalili S, Gandomi AH (2020) Marine predators algorithm: a nature-inspired metaheuristic. Expert Syst Appl 152:113377","journal-title":"Expert Syst Appl"},{"key":"3323_CR40","doi-asserted-by":"publisher","unstructured":"Dinh PH (2021) An improved medical image synthesis approach based on marine predators algorithm and maximum Gabor energy, Neural Comput Appl. https:\/\/doi.org\/10.1007\/s00521-021-06577-4","DOI":"10.1007\/s00521-021-06577-4"},{"key":"3323_CR41","doi-asserted-by":"crossref","unstructured":"Dinh PH (2021) A novel approach based on three-scale image decomposition and marine predators algorithm for multi-modal medical image fusion. Biomedical Signal Process 67:102536","DOI":"10.1016\/j.bspc.2021.102536"},{"key":"3323_CR42","doi-asserted-by":"publisher","first-page":"105190","DOI":"10.1016\/j.knosys.2019.105190","volume":"191","author":"A Faramarzi","year":"2020","unstructured":"Faramarzi A, Heidarinejad M, Stephens B (2020) Equilibrium optimizer: a novel optimization algorithm. Knowl-Based Syst 191:105190","journal-title":"Knowl-Based Syst"},{"key":"3323_CR43","doi-asserted-by":"crossref","unstructured":"Dinh PH (2021) Combining Gabor energy with equilibrium optimizer algorithm for multi-modality medical image fusion. Biomed Signal Process 68:102696","DOI":"10.1016\/j.bspc.2021.102696"},{"issue":"11","key":"3323_CR44","doi-asserted-by":"publisher","first-page":"8416","DOI":"10.1007\/s10489-021-02282-w","volume":"51","author":"PH Dinh","year":"2021","unstructured":"Dinh PH (2021) Multi-modal medical image fusion based on equilibrium optimizer algorithm and local energy functions. Appl Intell 51(11):8416\u20138431","journal-title":"Appl Intell"},{"key":"3323_CR45","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.advengsoft.2017.01.004","volume":"105","author":"S Saremi","year":"2017","unstructured":"Saremi S, Mirjalili S, Lewis A (2017) Grasshopper optimisation algorithm: theory and application. Adv Eng Softw 105:30\u201347","journal-title":"Adv Eng Softw"},{"key":"3323_CR46","doi-asserted-by":"publisher","first-page":"114576","DOI":"10.1016\/j.eswa.2021.114576","volume":"171","author":"PH Dinh","year":"2021","unstructured":"Dinh PH (2021) A novel approach based on grasshopper optimization algorithm for medical image fusion. Expert Syst Appl 171:114576","journal-title":"Expert Syst Appl"},{"key":"3323_CR47","doi-asserted-by":"crossref","unstructured":"Gan ZH, Chai XL, Zhang JT, Zhang YS, Chen YR (2020) An effective image compression-encryption scheme based on compressive sensing (CS) and game of life (GOL). Neural Comput Appl 32:14113\u201314141","DOI":"10.1007\/s00521-020-04808-8"},{"key":"3323_CR48","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1016\/j.ins.2020.10.007","volume":"556","author":"XL Chai","year":"2021","unstructured":"Chai XL, Wu HY, Gan ZH, Han DJ, Zhang YS, Chen YR (2021) An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing. Inf Sci 556:305\u2013340","journal-title":"Inf Sci"},{"key":"3323_CR49","doi-asserted-by":"crossref","unstructured":"Chai XL, Zhi XC, Gan ZH, Zhang YS, Chen YR, Fu JY (2021) Combining improved genetic algorithm and matrix semi-tensor product (STP) in color image encryption. Signal Process 183:108041","DOI":"10.1016\/j.sigpro.2021.108041"},{"key":"3323_CR50","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.jss.2015.04.085","volume":"116","author":"TC Lu","year":"2016","unstructured":"Lu TC, Tseng CY, Wu JH (2016) Asymmetric-histogram based reversible information hiding scheme using edge sensitivity detection. J Syst Softw 116:2\u201321","journal-title":"J Syst Softw"},{"issue":"11","key":"3323_CR51","doi-asserted-by":"publisher","first-page":"13127","DOI":"10.1007\/s11042-016-3739-x","volume":"76","author":"KH Jung","year":"2017","unstructured":"Jung KH (2017) A high-capacity reversible data hiding scheme based on sorting and prediction in digital images. Multimed Tools Appl 76(11):13127\u201313137","journal-title":"Multimed Tools Appl"},{"key":"3323_CR52","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1016\/j.ins.2020.02.003","volume":"520","author":"WG He","year":"2020","unstructured":"He WG, Cai ZC, Wang YM (2020) Flexible spatial location-based PVO predictor for high-fidelity reversible data hiding. Inf Sci 520:431\u2013444","journal-title":"Inf Sci"},{"key":"3323_CR53","doi-asserted-by":"publisher","first-page":"107264","DOI":"10.1016\/j.sigpro.2019.107264","volume":"167","author":"HR Wu","year":"2020","unstructured":"Wu HR, Li XL, Zhao Y, Ni RR (2020) Improved PPVO-based high-fidelity reversible data hiding. Signal Process 167:107264","journal-title":"Signal Process"},{"key":"3323_CR54","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.ins.2020.05.047","volume":"536","author":"R Kumar","year":"2020","unstructured":"Kumar R, Jung K-H (2020) Enhanced pairwise IPVO-based reversible data hiding scheme using rhombus context. Inf Sci 536:101\u2013119","journal-title":"Inf Sci"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-022-03323-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-022-03323-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-022-03323-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,16]],"date-time":"2022-09-16T22:05:13Z","timestamp":1663365913000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-022-03323-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,19]]},"references-count":54,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["3323"],"URL":"https:\/\/doi.org\/10.1007\/s10489-022-03323-8","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,19]]},"assertion":[{"value":"30 January 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 February 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}