{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T09:07:42Z","timestamp":1723194462187},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"21","license":[{"start":{"date-parts":[[2018,4,23]],"date-time":"2018-04-23T00:00:00Z","timestamp":1524441600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Nationa l Natural Science Foundation of China","doi-asserted-by":"publisher","award":["41571417 and U1604145"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2016M602235"],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004773","name":"Henan University","doi-asserted-by":"publisher","award":["xxjc20140006"],"id":[{"id":"10.13039\/501100004773","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Foundation of Henan Province of China","award":["182102210027, 182102210238, and 172102210186"]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1007\/s11042-018-5974-9","type":"journal-article","created":{"date-parts":[[2018,4,23]],"date-time":"2018-04-23T06:29:41Z","timestamp":1524464981000},"page":"27919-27953","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":52,"title":["A double color image encryption scheme based on three-dimensional brownian motion"],"prefix":"10.1007","volume":"77","author":[{"given":"Zhihua","family":"Gan","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5727-8933","authenticated-orcid":false,"given":"Xiuli","family":"Chai","sequence":"additional","affiliation":[]},{"given":"Miaohui","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,23]]},"reference":[{"key":"5974_CR1","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1016\/j.optlaseng.2013.01.001","volume":"51","author":"A Bakshandeh","year":"2013","unstructured":"Bakshandeh A, Eslami Z (2013) An authenticated image encryption scheme based on chaotic maps and memory cellular automata. Opt Lasers Eng 51:665\u2013673","journal-title":"Opt Lasers Eng"},{"key":"5974_CR2","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.optlaseng.2016.08.009","volume":"88","author":"XL Chai","year":"2017","unstructured":"Chai XL, Chen YR, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 88:197\u2013213","journal-title":"Opt Lasers Eng"},{"issue":"10","key":"5974_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1088\/1674-1056\/25\/10\/100503","volume":"25","author":"XL Chai","year":"2016","unstructured":"Chai XL, Gan ZH, Lu Y, Zhang MH, Chen YR (2016) A novel color image encryption algorithm based on genetic recombination and the four-dimensional memristive hyperchaotic system. Chin Phys B 25(10):1\u201313","journal-title":"Chin Phys B"},{"issue":"5","key":"5974_CR4","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.sigpro.2016.11.016","volume":"134","author":"XL Chai","year":"2017","unstructured":"Chai XL, Gan ZH, Chen YR, Zhang YSA (2017) Visually secure image encryption scheme based on compressive sensing. Signal Process 134(5):35\u201351","journal-title":"Signal Process"},{"key":"5974_CR5","doi-asserted-by":"publisher","first-page":"020504","DOI":"10.1088\/1674-1056\/26\/2\/020504","volume":"26","author":"XL Chai","year":"2017","unstructured":"Chai XL, Gan ZH, Yuan K, Yang L, Chen YR (2017) An image encryption scheme based on three-dimensional Brownian motion and chaotic system. Chin Phys B 26:020504","journal-title":"Chin Phys B"},{"key":"5974_CR6","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.sigpro.2017.03.011","volume":"138","author":"P Chanil","year":"2017","unstructured":"Chanil P, Huang LL (2017) A new color image encryption using combination of the 1D chaotic map. Signal Process 138:129\u2013137","journal-title":"Signal Process"},{"key":"5974_CR7","doi-asserted-by":"publisher","first-page":"7349","DOI":"10.1364\/OE.22.007349","volume":"22","author":"JX Chen","year":"2014","unstructured":"Chen JX, Zhu ZL, Liu ZJ, Fu C, Zhang LB, Yu H (2014) A novel double-image encryption scheme based on cross-image pixel scrambling in gyrator domains. Opt Express 22:7349\u20137361","journal-title":"Opt Express"},{"key":"5974_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.optlaseng.2014.08.010","volume":"66","author":"JX Chen","year":"2015","unstructured":"Chen JX, Zhu ZLFC, Zhang LB, Analysis YH (2015) Improvement of a double-image encryption scheme using pixel scrambling technique in gyrator domains. Opt Lasers Eng 66:1\u20139","journal-title":"Opt Lasers Eng"},{"key":"5974_CR9","doi-asserted-by":"publisher","first-page":"1000","DOI":"10.1364\/AO.51.001000","volume":"51","author":"H Di","year":"2012","unstructured":"Di H, Zheng K, Zhang X, Lam EY, Kim T, Kim YS et al (2012) Multiple-image encryption by compressive holography. Appl Opt 51:1000\u20131009","journal-title":"Appl Opt"},{"key":"5974_CR10","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.optlastec.2014.05.012","volume":"64","author":"KM Faraoun","year":"2014","unstructured":"Faraoun KM (2014) Fast encryption of RGB color digital images using a tweakable cellular automaton based schema. Opt Laser Technol 64:145\u2013155","journal-title":"Opt Laser Technol"},{"key":"5974_CR11","unstructured":"Gonzalez RC, Woods RE (2008) Digital image processing, 3rd edition, Pearson Prentice Hall, upper Saddle River, New Jersey, ISBN: 9780131687288"},{"key":"5974_CR12","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.ins.2016.01.017","volume":"339","author":"ZY Hua","year":"2016","unstructured":"Hua ZY, Zhou YC (2016) Image encryption using 2D logistic-adjusted-sine map. Inf Sci 339:237\u2013253","journal-title":"Inf Sci"},{"key":"5974_CR13","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.ins.2017.02.036","volume":"396","author":"ZY Hua","year":"2017","unstructured":"Hua ZY, Zhou YC (2017) Design of image cipher using block-based scrambling and image filtering. Inf Sci 396:97\u2013113","journal-title":"Inf Sci"},{"key":"5974_CR14","doi-asserted-by":"publisher","first-page":"1327","DOI":"10.1016\/j.optlaseng.2013.05.011","volume":"51","author":"HJ Li","year":"2013","unstructured":"Li HJ, Wang YR, Yan HT, Li LB, Li QZ, Zhao XY (2013) Double-image encryption by using chaos-based local pixel scrambling technique and gyrator transform. Opt Lasers Eng 51:1327\u20131331","journal-title":"Opt Lasers Eng"},{"key":"5974_CR15","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s00500-016-2320-x","volume":"22","author":"JZ Li","year":"2016","unstructured":"Li JZ, Lin Q, Yu CY, Ren XC, Li P (2016) A QDCT- and SVD-based color image watermarking scheme using an optimized encrypted binary computer-generated hologram. Soft Comput 22:47\u201365","journal-title":"Soft Comput"},{"key":"5974_CR16","doi-asserted-by":"publisher","first-page":"4349","DOI":"10.1007\/s00500-016-2066-5","volume":"21","author":"P Li","year":"2017","unstructured":"Li P, Li T, Yao ZA, Tang CM, Li J (2017) Privacy-preserving outsourcing of image feature extraction in cloud computing. Soft Comput 21:4349\u20134359","journal-title":"Soft Comput"},{"key":"5974_CR17","doi-asserted-by":"publisher","first-page":"1023","DOI":"10.1016\/j.optcom.2011.10.046","volume":"285","author":"C Lin","year":"2012","unstructured":"Lin C, Shen X, Tang R, Zou X (2012) Multiple images encryption based on Fourier transform hologram. Opt Commun 285:1023\u20131028","journal-title":"Opt Commun"},{"key":"5974_CR18","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.optlastec.2012.09.007","volume":"47","author":"ZJ Liu","year":"2013","unstructured":"Liu ZJ, Zhang Y, Li S, Liu W, Liu WY, Wang YH, Liu ST (2013) Double image encryption scheme by using random phase encoding and pixel exchanging in the gyrator transform domains. Opt Laser Technol 47:152\u2013158","journal-title":"Opt Laser Technol"},{"key":"5974_CR19","doi-asserted-by":"publisher","first-page":"2069","DOI":"10.1007\/s11071-015-2300-1","volume":"82","author":"JM Liu","year":"2015","unstructured":"Liu JM, Qu Q, Li GJ (2015) A new six-term 3-D chaotic system with fan-shaped Poincare maps. Nonlinear Dyn 82:2069\u20132079","journal-title":"Nonlinear Dyn"},{"key":"5974_CR20","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1007\/s11071-011-0006-6","volume":"67","author":"O Mirzaei","year":"2012","unstructured":"Mirzaei O, Yaghoobi M, Irani H (2012) A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dyn 67:557\u2013566","journal-title":"Nonlinear Dyn"},{"key":"5974_CR21","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1016\/j.eswa.2016.02.001","volume":"54","author":"AM Rey del","year":"2016","unstructured":"del Rey AM, Pastora JLH, Sanchez GR (2016) 3D medical data security protection. Expert Syst Appl 54:379\u2013386","journal-title":"Expert Syst Appl"},{"key":"5974_CR22","doi-asserted-by":"publisher","first-page":"4227","DOI":"10.1016\/j.optcom.2012.06.023","volume":"285","author":"MG Shan","year":"2012","unstructured":"Shan MG, Chang J, Zhong Z, Hao BG (2012) Double image encryption based on discrete multiple-parameter fractional Fourier transform and chaotic maps. Opt Commun 285:4227\u20134234","journal-title":"Opt Commun"},{"key":"5974_CR23","doi-asserted-by":"publisher","first-page":"1306","DOI":"10.1364\/OL.30.001306","volume":"30","author":"GH Situ","year":"2005","unstructured":"Situ GH, Zhang JJ (2005) Multiple-image encryption by wavelength multiplexing. Opt Lett 30:1306\u20131308","journal-title":"Opt Lett"},{"key":"5974_CR24","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1007\/s11071-015-2521-3","volume":"84","author":"A Souyah","year":"2016","unstructured":"Souyah A, Faraoun KM (2016) Fast and efficient randomized encryption scheme for digital images based on Quadtree decomposition and reversible memory cellular automata. Nonlinear Dyn 84:715\u2013732","journal-title":"Nonlinear Dyn"},{"key":"5974_CR25","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1016\/j.optcom.2015.05.071","volume":"354","author":"LS Sui","year":"2015","unstructured":"Sui LS, Liu BQ, Wang Q, Li Y, Liang JL (2015) Double-image encryption based on Yang-Gu mixture amplitude-phase retrieval algorithm and high dimension chaotic system in gyrator domain. Opt Commun 354:184\u2013196","journal-title":"Opt Commun"},{"key":"5974_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.optlaseng.2015.12.004","volume":"80","author":"ZJ Tang","year":"2016","unstructured":"Tang ZJ, Song J, Zhang XQ, Sun RH (2016) Multiple-image encryption with bit-plane decomposition and chaotic maps. Opt Lasers Eng 80:1\u201311","journal-title":"Opt Lasers Eng"},{"key":"5974_CR27","doi-asserted-by":"publisher","first-page":"8257","DOI":"10.1007\/s11042-016-3476-1","volume":"76","author":"ZJ Tang","year":"2017","unstructured":"Tang ZJ, Wang F, Zhang XQ (2017) Image encryption based on random projection partition and chaotic system. Multimed Tools Appl 76:8257\u20138283","journal-title":"Multimed Tools Appl"},{"key":"5974_CR28","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.optcom.2014.12.044","volume":"342","author":"YH Wan","year":"2015","unstructured":"Wan YH, Wu F, Yang JH, Man TL (2015) Multiple-image encryption based on compressive holography using a multiple-beam interferometer. Opt Commun 342:95\u2013101","journal-title":"Opt Commun"},{"key":"5974_CR29","doi-asserted-by":"publisher","first-page":"3075","DOI":"10.1016\/j.cnsns.2013.04.008","volume":"18","author":"X Wang","year":"2013","unstructured":"Wang X, Luan D (2013) A novel image encryption algorithm using chaos and reversible cellular automata. Commun Nonlinear Sci Numer Simul 18:3075\u20133085","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"5974_CR30","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/s11071-013-1070-x","volume":"75","author":"XY Wang","year":"2014","unstructured":"Wang XY, Xu DH (2014) A novel image encryption scheme based on Brownian motion and PWLCM chaotic system. Nonlinear Dyn 75:345\u2013353","journal-title":"Nonlinear Dyn"},{"key":"5974_CR31","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1016\/j.sigpro.2011.10.023","volume":"92","author":"X Wang","year":"2012","unstructured":"Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92:1101\u20131108","journal-title":"Signal Process"},{"key":"5974_CR32","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.optcom.2014.01.041","volume":"320","author":"Q Wang","year":"2014","unstructured":"Wang Q, Guo Q, Lei L (2014) Multiple-image encryption system using cascaded phase mask encoding and a modified Gerchberg-Saxton algorithm in gyrator domain. Opt Commun 320:12\u201321","journal-title":"Opt Commun"},{"key":"5974_CR33","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s11071-015-1979-3","volume":"81","author":"Y Wang","year":"2015","unstructured":"Wang Y, Zhang X, Zheng ZM, Qiu WJ (2015) A colour image encryption algorithm using 4-pixel Feistel structure and multiple chaotic systems. Nonlinear Dyn 81:151\u2013168","journal-title":"Nonlinear Dyn"},{"key":"5974_CR34","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/j.optlaseng.2015.09.008","volume":"78","author":"Y Wang","year":"2016","unstructured":"Wang Y, Quan C, Tay CJ (2016) Asymmetric optical image encryption based on an improved amplitude-phase retrieval algorithm. Opt Lasers Eng 78:8\u201316","journal-title":"Opt Lasers Eng"},{"key":"5974_CR35","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1016\/j.optlastec.2012.05.030","volume":"45","author":"JH Wu","year":"2013","unstructured":"Wu JH, Luo XZ, Zhou NR (2013) Four-image encryption method based on spectrum truncation. Chaos and the MODFrFT. Opt Laser Technol 45:571\u2013577","journal-title":"Opt Laser Technol"},{"key":"5974_CR36","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/j.ins.2012.07.049","volume":"222","author":"Y Wu","year":"2013","unstructured":"Wu Y, Zhou YC, George S, Sos A, Noonan Joseph P, Premkumar N (2013) Local Shannon entropy measure with statistical tests for image randomness. Inf Sci 222:323\u2013342","journal-title":"Inf Sci"},{"key":"5974_CR37","doi-asserted-by":"publisher","first-page":"1884","DOI":"10.1016\/j.cnsns.2013.10.025","volume":"19","author":"XJ Wu","year":"2014","unstructured":"Wu XJ, Bai CX, Kan HB (2014) A new color image cryptosystem via hyperchaos synchronization. Commun Nonlinear Sci Numer Simul 19:1884\u20131897","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"5974_CR38","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.optcom.2015.09.039","volume":"359","author":"JJ Wu","year":"2016","unstructured":"Wu JJ, Xie ZW, Liu ZJ, Liu W, Zhang Y, Liu ST (2016) Multiple-image encryption based on computational ghost imaging. Opt Commun 359:38\u201343","journal-title":"Opt Commun"},{"key":"5974_CR39","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.ins.2016.02.041","volume":"349-350","author":"XJ Wu","year":"2016","unstructured":"Wu XJ, Wang DW, Kurths J, Kan HB (2016) A novel lossless color image encryption scheme using 2D DWT and 6D hyperchaotic system. Inf Sci 349-350:137\u2013153","journal-title":"Inf Sci"},{"key":"5974_CR40","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1016\/j.sigpro.2017.06.014","volume":"142","author":"JH Wu","year":"2018","unstructured":"Wu JH, Liao XF, Yang B (2018) Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation. Signal Process 142:292\u2013300","journal-title":"Signal Process"},{"key":"5974_CR41","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.jnca.2018.01.014","volume":"107","author":"J Xu","year":"2018","unstructured":"Xu J, Wei LW, Zhang Y, Wang AD, Zhou FC, Gao CZ (2018) Dynamic fully homomorphic encryption-based merkle tree for lightweight streaming authenticated data structures. J Netw Comput Appl 107:113\u2013124. \n https:\/\/doi.org\/10.1016\/j.jnca.2018.01.014","journal-title":"J Netw Comput Appl"},{"key":"5974_CR42","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/j.asoc.2014.05.025","volume":"22","author":"GD Ye","year":"2014","unstructured":"Ye GD, Zhou JW (2014) A block chaotic image encryption scheme based on self-adaptive modelling. Appl Soft Comput 22:351\u2013357","journal-title":"Appl Soft Comput"},{"key":"5974_CR43","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1016\/j.ins.2014.02.156","volume":"273","author":"YQ Zhang","year":"2014","unstructured":"Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear- nonlinear coupled map lattice. Inf Sci 273:329\u2013351","journal-title":"Inf Sci"},{"key":"5974_CR44","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1016\/j.optlaseng.2016.12.005","volume":"92","author":"XQ Zhang","year":"2017","unstructured":"Zhang XQ, Wang XS (2017) Multiple-image encryption algorithm based on mixed image element and permutation. Opt Lasers Eng 92:6\u201316","journal-title":"Opt Lasers Eng"},{"key":"5974_CR45","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1016\/j.optlaseng.2012.11.001","volume":"51","author":"YS Zhang","year":"2013","unstructured":"Zhang YS, Xiao D (2013) Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform. Opt Lasers Eng 51:472\u2013480","journal-title":"Opt Lasers Eng"},{"key":"5974_CR46","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/j.aeue.2013.10.002","volume":"68","author":"YS Zhang","year":"2014","unstructured":"Zhang YS, Xiao D (2014) Self-adaptive permutation and combined global diffusion for chaotic color image encryption. Int J Electron Commun 68:361\u2013368","journal-title":"Int J Electron Commun"},{"key":"5974_CR47","first-page":"902","volume":"29","author":"XP Zhang","year":"2014","unstructured":"Zhang XP, Zhao ZM, Wang JY (2014) Chaotic image encryption based on circular substitution box and key stream buffer. Signal Process: Image 29:902\u2013913","journal-title":"Signal Process: Image"},{"key":"5974_CR48","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.sigpro.2015.06.008","volume":"118","author":"W Zhang","year":"2016","unstructured":"Zhang W, Yu H, Zhao YL, Zhu ZL (2016) Image encryption based on three-dimensional bit matrix permutation. Signal Process 118:36\u201350","journal-title":"Signal Process"},{"key":"5974_CR49","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1016\/j.optcom.2011.11.044","volume":"285","author":"YC Zhou","year":"2012","unstructured":"Zhou YC, Panetta K, Agaian S, Chen CLP (2012) Image encryption using p-Fibonacci transform and decomposition. Opt Commun 285:594\u2013608","journal-title":"Opt Commun"},{"key":"5974_CR50","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","volume":"97","author":"Y Zhou","year":"2014","unstructured":"Zhou Y, Bao L, Chen CP (2014) A new 1D chaotic system for image encryption. Signal Process 97:172\u2013182","journal-title":"Signal Process"},{"key":"5974_CR51","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.optcom.2015.05.043","volume":"354","author":"NR Zhou","year":"2015","unstructured":"Zhou NR, Yang JP, Tan CF, Pan SM, Zhou ZH (2015) Double-image encryption scheme combining DWT-based compressive sensing with discrete fractional random transform. Opt Commun 354:112\u2013121","journal-title":"Opt Commun"},{"key":"5974_CR52","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.optlastec.2016.02.018","volume":"82","author":"NR Zhou","year":"2016","unstructured":"Zhou NR, Pan SM, Cheng S, Efficient ZZH (2016) Image compression-encryption scheme based on hyper-chaotic system and 2D compressive sensing. Opt Laser Technol 82:121\u2013133","journal-title":"Opt Laser Technol"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-5974-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-5974-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-5974-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,22]],"date-time":"2019-04-22T19:43:50Z","timestamp":1555962230000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-5974-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,23]]},"references-count":52,"journal-issue":{"issue":"21","published-print":{"date-parts":[[2018,11]]}},"alternative-id":["5974"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-5974-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,4,23]]},"assertion":[{"value":"21 October 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 March 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 April 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 April 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}