{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,3]],"date-time":"2025-01-03T05:25:11Z","timestamp":1735881911056,"version":"3.32.0"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,12,5]],"date-time":"2024-12-05T00:00:00Z","timestamp":1733356800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,5]],"date-time":"2024-12-05T00:00:00Z","timestamp":1733356800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["Grant Nos. 61802111, 61872125"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Project of Henan Province","award":["Grant Nos. 232102210109, 232102210096"]},{"name":"Key Scientific Research Projects of Colleges and Universities of Henan Province","award":["Grant No. 24A520003"]},{"name":"Pre-research Project of SongShan Laboratory","award":["Grant No. YYJC012022011"]},{"DOI":"10.13039\/501100018607","name":"Henan Province Science and Technology Innovation Talent Program","doi-asserted-by":"publisher","award":["Grant Nos. SYLYC2022193, SYLAL2023020"],"id":[{"id":"10.13039\/501100018607","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006407","name":"Natural Science Foundation of Henan Province","doi-asserted-by":"publisher","award":["No. 242300421404"],"id":[{"id":"10.13039\/501100006407","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s10489-024-06093-7","type":"journal-article","created":{"date-parts":[[2024,12,5]],"date-time":"2024-12-05T12:12:00Z","timestamp":1733400720000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["ImageShield: a responsibility-to-person blind watermarking mechanism for image datasets protection"],"prefix":"10.1007","volume":"55","author":[{"given":"Zongwei","family":"Tang","sequence":"first","affiliation":[]},{"given":"Junyang","family":"Yu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1609-0624","authenticated-orcid":false,"given":"Xiuli","family":"Chai","sequence":"additional","affiliation":[]},{"given":"Tianfeng","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Zhihua","family":"Gan","sequence":"additional","affiliation":[]},{"given":"Binjie","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,5]]},"reference":[{"issue":"28","key":"6093_CR1","doi-asserted-by":"publisher","first-page":"43367","DOI":"10.1007\/s11042-023-15177-4","volume":"82","author":"L Agilandeeswari","year":"2023","unstructured":"Agilandeeswari L, Prabukumar M, Alenizi FA (2023) A robust semi-fragile watermarking system using pseudo-zernike moments and dual tree complex wavelet transform for social media content authentication. Multimed Tools and Appl 82(28):43367\u201343419","journal-title":"Multimed Tools and Appl"},{"issue":"2","key":"6093_CR2","doi-asserted-by":"publisher","first-page":"5531","DOI":"10.1007\/s11042-023-15806-y","volume":"83","author":"P Aberna","year":"2024","unstructured":"Aberna P, Agilandeeswari L (2024) Digital image and video watermarking: methodologies, attacks, applications, and future directions. Multimed Tools and Appl 83(2):5531\u20135591","journal-title":"Multimed Tools and Appl"},{"issue":"2","key":"6093_CR3","doi-asserted-by":"publisher","first-page":"1755","DOI":"10.1016\/j.jfranklin.2021.11.027","volume":"359","author":"H Zhang","year":"2022","unstructured":"Zhang H, Li Z, Liu X, Wang C, Wang X (2022) Robust image watermarking algorithm based on qwt and qsvd using 2d chebyshev-logistic map. J Franklin Inst 359(2):1755\u20131781","journal-title":"J Franklin Inst"},{"key":"6093_CR4","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1016\/j.ins.2022.05.046","volume":"606","author":"Q Su","year":"2022","unstructured":"Su Q, Liu D, Sun Y (2022) A robust adaptive blind color image watermarking for resisting geometric attacks. Inf Sci 606:194\u2013212","journal-title":"Inf Sci"},{"key":"6093_CR5","doi-asserted-by":"crossref","unstructured":"Wang J, Wu D, Li L, Zhao J, Wu H, Tang Y (2023) Robust periodic blind watermarking based on sub-block mapping and block encryption. Exp Syst Appl 224:119981","DOI":"10.1016\/j.eswa.2023.119981"},{"issue":"2","key":"6093_CR6","doi-asserted-by":"publisher","first-page":"339","DOI":"10.37391\/ijeer.110214","volume":"11","author":"A Palani","year":"2023","unstructured":"Palani A, Loganathan A (2023) Multi-image feature map-based watermarking techniques using transformer. Int J Electr Electron Res. 11(2):339\u2013344","journal-title":"Int J Electr Electron Res."},{"key":"6093_CR7","doi-asserted-by":"crossref","unstructured":"Aberna P, Agilandeeswari L (2024) Optimal semi-fragile watermarking based on maximum entropy random walk and swin transformer for tamper localization. IEEE Access","DOI":"10.1109\/ACCESS.2024.3370411"},{"key":"6093_CR8","doi-asserted-by":"publisher","first-page":"1701","DOI":"10.1007\/s10489-020-01903-0","volume":"51","author":"SBB Ahmadi","year":"2021","unstructured":"Ahmadi SBB, Zhang G, Rabbani M, Boukela L, Jelodar H (2021) An intelligent and blind dual color image watermarking for authentication and copyright protection. Applied Intell 51:1701\u20131732","journal-title":"Applied Intell"},{"key":"6093_CR9","doi-asserted-by":"crossref","unstructured":"Lu Y, Gong M, Gan Z, Chai X, Cao L, Wang B (2023) Exploiting one-dimensional improved chebyshev chaotic system and partitioned diffusion based on the divide-and-conquer principle for 3d medical model encryption. Chaos, Solitons & Fractals. 171:113449","DOI":"10.1016\/j.chaos.2023.113449"},{"key":"6093_CR10","doi-asserted-by":"crossref","unstructured":"Gong L-H, Luo H-X (2023) Dual color images watermarking scheme with geometric correction based on quaternion froofmms and ls-svr. Optics & Laser Technol 167:109665","DOI":"10.1016\/j.optlastec.2023.109665"},{"key":"6093_CR11","first-page":"10223","volume":"33","author":"C Zhang","year":"2020","unstructured":"Zhang C, Benz P, Karjauv A, Sun G, Kweon IS (2020) Udh: Universal deep hiding for steganography, watermarking, and light field messaging. Adv Neural Inf Process Syst 33:10223\u201310234","journal-title":"Adv Neural Inf Process Syst"},{"key":"6093_CR12","doi-asserted-by":"crossref","unstructured":"Zhu J (2018) Hidden: hiding data with deep networks. arXiv:1807.09937","DOI":"10.1007\/978-3-030-01267-0_40"},{"issue":"7","key":"6093_CR13","doi-asserted-by":"publisher","first-page":"7094","DOI":"10.1109\/TCYB.2020.3037208","volume":"52","author":"J Jia","year":"2020","unstructured":"Jia J, Gao Z, Chen K, Hu M, Min X, Zhai G, Yang X (2020) Rihoop: Robust invisible hyperlinks in offline and online photographs. IEEE Trans Cybern 52(7):7094\u20137106","journal-title":"IEEE Trans Cybern"},{"key":"6093_CR14","doi-asserted-by":"publisher","first-page":"1951","DOI":"10.1109\/TMM.2020.3006415","volume":"23","author":"X Zhong","year":"2020","unstructured":"Zhong X, Huang P-C, Mastorakis S, Shih FY (2020) An automated and robust image watermarking scheme based on deep neural networks. IEEE Trans Multimed 23:1951\u20131961","journal-title":"IEEE Trans Multimed"},{"key":"6093_CR15","doi-asserted-by":"publisher","first-page":"863","DOI":"10.1007\/s12559-019-09700-9","volume":"12","author":"B Bolourian Haghighi","year":"2020","unstructured":"Bolourian Haghighi B, Taherinia AH, Monsefi R (2020) An effective semi-fragile watermarking method for image authentication based on lifting wavelet transform and feed-forward neural network. Cogn Comput 12:863\u2013890","journal-title":"Cogn Comput"},{"key":"6093_CR16","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.neucom.2019.01.067","volume":"337","author":"S-M Mun","year":"2019","unstructured":"Mun S-M, Nam S-H, Jang H, Kim D, Lee H-K (2019) Finding robust domain from attacks: A learning framework for blind watermarking. Neurocomput 337:191\u2013202","journal-title":"Neurocomput"},{"key":"6093_CR17","doi-asserted-by":"crossref","unstructured":"Tang Z, Chai X, Lu Y, Wang B, Tan Y (2023) An end-to-end screen shooting resilient blind watermarking scheme for medical images. J Inf Secur and Appl 76:103547","DOI":"10.1016\/j.jisa.2023.103547"},{"key":"6093_CR18","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/j.ins.2020.01.019","volume":"519","author":"H-T Hu","year":"2020","unstructured":"Hu H-T, Hsu L-Y, Chou H-H (2020) An improved svd-based blind color image watermarking algorithm with mixed modulation incorporated. Inf Sci 519:161\u2013182","journal-title":"Inf Sci"},{"key":"6093_CR19","doi-asserted-by":"crossref","unstructured":"Salehnia T, Fathi A (2021) Fault tolerance in lwt-svd based image watermarking systems using three module redundancy technique. Exp Syst Appl 179:115058","DOI":"10.1016\/j.eswa.2021.115058"},{"key":"6093_CR20","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1016\/j.measurement.2019.02.069","volume":"139","author":"S Arunkumar","year":"2019","unstructured":"Arunkumar S, Subramaniyaswamy V, Vijayakumar V, Chilamkurti N, Logesh R (2019) Svd-based robust image steganographic scheme using riwt and dct for secure transmission of medical images. Measurement. 139:426\u2013437","journal-title":"Measurement."},{"key":"6093_CR21","doi-asserted-by":"crossref","unstructured":"Singh N, Joshi S, Birla S (2019) Color image watermarking with watermark authentication against false positive detection using svd. In: International Conference on Sustainable Computing in Science, Technology and Management (SUSCOM), pp 399\u2013405","DOI":"10.2139\/ssrn.3352328"},{"key":"6093_CR22","doi-asserted-by":"publisher","first-page":"972","DOI":"10.1109\/LSP.2022.3163685","volume":"29","author":"X Chai","year":"2022","unstructured":"Chai X, Wang Y, Chen X, Gan Z, Zhang Y (2022) Tpe-gan: Thumbnail preserving encryption based on gan with key. IEEE Signal Process Lett 29:972\u2013976","journal-title":"IEEE Signal Process Lett"},{"key":"6093_CR23","doi-asserted-by":"crossref","unstructured":"Liu M, Ding Y, Xia M, Liu X, Ding E, Zuo W, Wen S (2019) Stgan: A unified selective transfer network for arbitrary image attribute editing. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp 3673\u20133682","DOI":"10.1109\/CVPR.2019.00379"},{"key":"6093_CR24","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1016\/j.inffus.2022.07.016","volume":"88","author":"H Zhou","year":"2022","unstructured":"Zhou H, Hou J, Zhang Y, Ma J, Ling H (2022) Unified gradient-and intensity-discriminator generative adversarial network for image fusion. Inf Fusion. 88:184\u2013201","journal-title":"Inf Fusion."},{"key":"6093_CR25","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.media.2018.07.001","volume":"49","author":"H Zhao","year":"2018","unstructured":"Zhao H, Li H, Maurer-Stroh S, Cheng L (2018) Synthesizing retinal and neuronal images with generative adversarial nets. Med Image Anal 49:14\u201326","journal-title":"Med Image Anal"},{"key":"6093_CR26","doi-asserted-by":"crossref","unstructured":"Bargshady G, Zhou X, Deo RC, Soar J, Whittaker F, Wang H (2020) The modeling of human facial pain intensity based on temporal convolutional networks trained with video frames in hsv color space. Applied Soft Comput 97:106805","DOI":"10.1016\/j.asoc.2020.106805"},{"issue":"2","key":"6093_CR27","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1109\/TC.2021.3051387","volume":"71","author":"C Li","year":"2021","unstructured":"Li C, Tan K, Feng B, L\u00fc J (2021) The graph structure of the generalized discrete arnold\u2019s cat map. IEEE Trans Comput 71(2):364\u2013377","journal-title":"IEEE Trans Comput"},{"issue":"9","key":"6093_CR28","doi-asserted-by":"publisher","first-page":"1015","DOI":"10.3390\/rs11091015","volume":"11","author":"H He","year":"2019","unstructured":"He H, Yang D, Wang S, Wang S, Li Y (2019) Road extraction by using atrous spatial pyramid pooling integrated encoder-decoder network and structural similarity loss. Remote Sens 11(9):1015","journal-title":"Remote Sens"},{"key":"6093_CR29","doi-asserted-by":"crossref","unstructured":"Liu Y, Chen H, Chen Y, Yin W, Shen C (2021) Generic perceptual loss for modeling structured output dependencies. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp 5424\u20135432","DOI":"10.1109\/CVPR46437.2021.00538"},{"key":"6093_CR30","doi-asserted-by":"crossref","unstructured":"Lin Z, Jia S, Zhou X, Zhang H, Wang L, Li G, Wang Z (2023) Digital holographic microscopy phase noise reduction based on an over-complete chunked discrete cosine transform sparse dictionary. Optics and Lasers in Eng 166:107571","DOI":"10.1016\/j.optlaseng.2023.107571"},{"key":"6093_CR31","doi-asserted-by":"crossref","unstructured":"Yu C (2020) Attention based data hiding with generative adversarial networks. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol 34, pp 1120\u20131128","DOI":"10.1609\/aaai.v34i01.5463"},{"key":"6093_CR32","doi-asserted-by":"crossref","unstructured":"Luo X, Zhan R, Chang H, Yang F, Milanfar P (2020) Distortion agnostic deep watermarking. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp 13548\u201313557","DOI":"10.1109\/CVPR42600.2020.01356"},{"key":"6093_CR33","doi-asserted-by":"crossref","unstructured":"Liu Y, Guo M, Zhang J, Zhu Y, Xie X (2019) A novel two-stage separable deep learning framework for practical blind watermarking. In: Proceedings of the 27th ACM International Conference on Multimedia, pp 1509\u20131517","DOI":"10.1145\/3343031.3351025"},{"issue":"31","key":"6093_CR34","doi-asserted-by":"publisher","first-page":"23041","DOI":"10.1007\/s00521-023-08457-5","volume":"35","author":"R Sinhal","year":"2023","unstructured":"Sinhal R, Ansari IA (2023) Machine learning based multipurpose medical image watermarking. Neural Comput Appl 35(31):23041\u201323062","journal-title":"Neural Comput Appl"},{"issue":"2","key":"6093_CR35","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1049\/ipr2.12653","volume":"17","author":"S Ge","year":"2023","unstructured":"Ge S, Fei J, Xia Z, Tong Y, Weng J, Liu J (2023) A screen-shooting resilient document image watermarking scheme using deep neural network. IET Image Process 17(2):323\u2013336","journal-title":"IET Image Process"},{"issue":"6","key":"6093_CR36","doi-asserted-by":"publisher","first-page":"1403","DOI":"10.1109\/TIFS.2018.2878541","volume":"14","author":"H Fang","year":"2018","unstructured":"Fang H, Zhang W, Zhou H, Cui H, Yu N (2018) Screen-shooting resilient watermarking. IEEE Trans Inf Foren Secur 14(6):1403\u20131418","journal-title":"IEEE Trans Inf Foren Secur"},{"key":"6093_CR37","doi-asserted-by":"crossref","unstructured":"Lu Y, Tang Z, Chai X, Wang M, Song S (2022) A hierarchical protection scheme for intellectual property of semi-open source datasets based on double watermarking. Optik. 269:169931","DOI":"10.1016\/j.ijleo.2022.169931"},{"key":"6093_CR38","doi-asserted-by":"crossref","unstructured":"Liu D, Su Q, Yuan Z, Zhang X (2021) A fusion-domain color image watermarking based on haar transform and image correction. Exp Syst Appl 170:114540","DOI":"10.1016\/j.eswa.2020.114540"},{"issue":"6","key":"6093_CR39","first-page":"2982","volume":"34","author":"K Prabha","year":"2022","unstructured":"Prabha K, Sam IS (2022) An effective robust and imperceptible blind color image watermarking using wht. J King Saud Univer-Comput Inf Sci 34(6):2982\u20132992","journal-title":"J King Saud Univer-Comput Inf Sci"},{"key":"6093_CR40","doi-asserted-by":"crossref","unstructured":"Rakhmawati L, Wirawan W, Suwadi S, Delpha C, Duhamel P (2022) Blind robust image watermarking based on adaptive embedding strength and distribution of quantified coefficients. Exp Syst Appl 187:115906","DOI":"10.1016\/j.eswa.2021.115906"},{"issue":"3","key":"6093_CR41","first-page":"605","volume":"34","author":"D Ariatmanto","year":"2022","unstructured":"Ariatmanto D, Ernawan F (2022) Adaptive scaling factors based on the impact of selected dct coefficients for image watermarking. J King Saud Univer-Comput Inf Sci 34(3):605\u2013614","journal-title":"J King Saud Univer-Comput Inf Sci"},{"key":"6093_CR42","doi-asserted-by":"crossref","unstructured":"Zhang M, Ding W, Li Y, Sun J, Liu Z (2023) Color image watermarking based on a fast structure-preserving algorithm of quaternion singular value decomposition. Signal Process 208:108971","DOI":"10.1016\/j.sigpro.2023.108971"},{"issue":"10","key":"6093_CR43","doi-asserted-by":"publisher","first-page":"5345","DOI":"10.1109\/TCSVT.2023.3252042","volume":"33","author":"X Wang","year":"2023","unstructured":"Wang X, Lin Y, Shen Y, Niu P (2023) Udtcwt-phfms domain statistical image watermarking using vector bw-type r distribution. IEEE Trans Circ Syst Video Technol 33(10):5345\u20135359","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"6093_CR44","doi-asserted-by":"crossref","unstructured":"Roy M, Thounaojam DM, Pal S (2023) A perceptual hash based blind-watermarking scheme for image authentication. Exp Syst Appl 227:120237","DOI":"10.1016\/j.eswa.2023.120237"},{"key":"6093_CR45","doi-asserted-by":"crossref","unstructured":"Zhang Y, Gong Y, Wang J, Sun J, Wan W (2023) Towards perceptual image watermarking with robust texture measurement. Exp Syst Appl 219:119649","DOI":"10.1016\/j.eswa.2023.119649"},{"key":"6093_CR46","doi-asserted-by":"crossref","unstructured":"Zhang Q, Wang C, Ma B, Xia Z, Li J, Zhang H, Li Q (2023) Sedenion polar harmonic fourier moments and their application in multi-view color image watermarking. Signal Process 209:109010","DOI":"10.1016\/j.sigpro.2023.109010"},{"key":"6093_CR47","doi-asserted-by":"crossref","unstructured":"Liu D, Yuan Z, Su Q (2020) A blind color image watermarking scheme with variable steps based on schur decomposition. Multimed Tools and Appl 79:7491\u20137513","DOI":"10.1007\/s11042-019-08423-1"},{"key":"6093_CR48","doi-asserted-by":"crossref","unstructured":"Noor R, Khan A, Sarfaraz A, Mehmood Z, Cheema AM (2019) Highly robust hybrid image watermarking approach using tchebichef transform with secured pca and cat encryption. Soft Comput 23:9821\u20139829","DOI":"10.1007\/s00500-019-03838-2"},{"key":"6093_CR49","doi-asserted-by":"crossref","unstructured":"Su Q, Zhang X, Wang G (2020) An improved watermarking algorithm for color image using schur decomposition. Soft Comput 24(1):445\u2013460","DOI":"10.1007\/s00500-019-03924-5"},{"key":"6093_CR50","doi-asserted-by":"publisher","first-page":"8045","DOI":"10.1007\/s00500-018-3441-1","volume":"23","author":"A Khan","year":"2019","unstructured":"Khan A, Sarfaraz A (2019) Novel high-capacity robust and imperceptible image steganography scheme using multi-flipped permutations and frequency entropy matching method. Soft Comput 23:8045\u20138056","journal-title":"Soft Comput"},{"key":"6093_CR51","doi-asserted-by":"publisher","first-page":"1055","DOI":"10.1007\/s11045-017-0487-7","volume":"29","author":"Q Su","year":"2018","unstructured":"Su Q, Wang G, Zhang X, Lv G, Chen B (2018) A new algorithm of blind color image watermarking based on lu decomposition. Multidimen Syst Signal Process 29:1055\u20131074","journal-title":"Multidimen Syst Signal Process"},{"key":"6093_CR52","doi-asserted-by":"crossref","unstructured":"Fares K, Amine K, Salah E (2020) A robust blind color image watermarking based on fourier transform domain. Optik. 208:164562","DOI":"10.1016\/j.ijleo.2020.164562"},{"key":"6093_CR53","doi-asserted-by":"crossref","unstructured":"Liu D, Su Q, Yuan Z, Zhang X (2021) A blind color digital image watermarking method based on image correction and eigenvalue decomposition. Signal Processing: Image Commu 95:116292","DOI":"10.1016\/j.image.2021.116292"},{"key":"6093_CR54","doi-asserted-by":"publisher","first-page":"15705","DOI":"10.1007\/s11042-018-6851-2","volume":"78","author":"M Ghadi","year":"2019","unstructured":"Ghadi M, Laouamer L, Nana L, Pascu A (2019) A blind spatial domain-based image watermarking using texture analysis and association rules mining. Multimed Tools and Appl 78:15705\u201315750","journal-title":"Multimed Tools and Appl"},{"key":"6093_CR55","unstructured":"Zhang H, Wang H, Cao Y, Shen C, Li Y (2020) Robust data hiding using inverse gradient attention. arXiv:2011.10850"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-024-06093-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-024-06093-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-024-06093-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,2]],"date-time":"2025-01-02T16:07:51Z","timestamp":1735834071000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-024-06093-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,5]]},"references-count":55,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["6093"],"URL":"https:\/\/doi.org\/10.1007\/s10489-024-06093-7","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"type":"print","value":"0924-669X"},{"type":"electronic","value":"1573-7497"}],"subject":[],"published":{"date-parts":[[2024,12,5]]},"assertion":[{"value":"19 November 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 December 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}},{"value":"All procedures performed in studies involving human participants were in accordance with the ethical standards of the institutional and\/or national research committee. Prior to participation, all participants were informed about the purpose of the research, the procedures involved, their rights to withdraw at any time without penalty, and the measures taken to ensure their privacy and data confidentiality. Written informed consent was obtained from each participant.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical and informed consent for data used"}}],"article-number":"84"}}