{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,19]],"date-time":"2024-07-19T09:09:55Z","timestamp":1721380195948},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"19-20","license":[{"start":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T00:00:00Z","timestamp":1580256000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T00:00:00Z","timestamp":1580256000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1007\/s11042-020-08662-7","type":"journal-article","created":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T23:01:32Z","timestamp":1580338892000},"page":"13427-13447","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Fragile high capacity data hiding in digital images using integer-to-integer DWT and lattice vector quantization"],"prefix":"10.1007","volume":"79","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-2468-8359","authenticated-orcid":false,"given":"Ehsan","family":"Akhtarkavan","sequence":"first","affiliation":[]},{"given":"Babak","family":"Majidi","sequence":"additional","affiliation":[]},{"given":"M. F. M.","family":"Salleh","sequence":"additional","affiliation":[]},{"given":"Jagdish C.","family":"Patra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,29]]},"reference":[{"key":"8662_CR1","unstructured":"Akhtarkavan E (2012) Multiple-description lattice vector quantization for image and video coding based on coinciding similar sublattices of An, in School of Electrical and Electronics. Univesiti Sains Malaysia: http:\/\/ee.eng.usm.my\/eeacad\/fadzli\/abstract\/Phd-06-12-Abstract.pdf. p. 169."},{"issue":"8","key":"8662_CR2","doi-asserted-by":"crossref","first-page":"10325","DOI":"10.1007\/s11042-018-6607-z","volume":"78","author":"E Akhtarkavan","year":"2019","unstructured":"Akhtarkavan E, Majidi B, Manzuri MT (2019) Secure communication and archiving of low altitude remote sensing data using high capacity fragile data hiding. Multimed Tools Appl 78(8):10325\u201310351","journal-title":"Multimed Tools Appl"},{"issue":"17","key":"8662_CR3","doi-asserted-by":"crossref","first-page":"1233","DOI":"10.1587\/elex.7.1233","volume":"7","author":"E Akhtarkavan","year":"2010","unstructured":"Akhtarkavan E, Salleh MFM (2010) Multiple description lattice vector quantization using multiple A4 quantizers. IEICE Electronics Express 7(17):1233\u20131239","journal-title":"IEICE Electronics Express"},{"issue":"17","key":"8662_CR4","doi-asserted-by":"crossref","first-page":"1233","DOI":"10.1587\/elex.7.1233","volume":"7","author":"E Akhtarkavan","year":"2010","unstructured":"Akhtarkavan E, Salleh MFM (2010) Multiple description lattice vector quantization using multiple A4 quantizers. IEICE Electronics Express 7(17):1233\u20131239","journal-title":"IEICE Electronics Express"},{"key":"8662_CR5","doi-asserted-by":"crossref","unstructured":"Akhtarkavan E, Salleh MFM (2011) Multiple descriptions coding for H.264\/AVC using coinciding A2 lattice vector quantizer. in 2011 IEEE International Conference on Signal and Image Processing Applications (ICSIPA)","DOI":"10.1109\/ICSIPA.2011.6144079"},{"issue":"2","key":"8662_CR6","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1109\/TIP.2011.2164419","volume":"21","author":"E Akhtarkavan","year":"2012","unstructured":"Akhtarkavan E, Salleh MFM (2012) Multiple descriptions coinciding lattice vector Quantizer for wavelet image coding. IEEE Trans Image Process 21(2):653\u2013661","journal-title":"IEEE Trans Image Process"},{"key":"8662_CR7","doi-asserted-by":"crossref","unstructured":"Akhtarkavan E, Salleh M (2012) Multiple Descriptions Coinciding Lattice Vector Quantizer for H. 264\/AVC and Motion JPEG2000, in Advanced Video Coding for Next-Generation Multimedia Services, Y.-S. Ho, Editor, Electronics and Telecommunications Research Institute IntechOpen: South Korea","DOI":"10.5772\/54296"},{"issue":"2","key":"8662_CR8","first-page":"157","volume":"21","author":"E Akhtarkavan","year":"2013","unstructured":"Akhtarkavan E, Salleh M, Sidek O (2013) Multiple descriptions video coding using coinciding lattice vector Quantizer for H. 264\/AVC and motion JPEG2000. World Appl Sci J 21(2):157\u2013169","journal-title":"World Appl Sci J"},{"issue":"4","key":"8662_CR9","doi-asserted-by":"crossref","first-page":"1391","DOI":"10.1016\/j.jalgebra.2008.04.021","volume":"320","author":"M Baake","year":"2008","unstructured":"Baake M, Heuer M, Moody RV (2008) Similar sublattices of the root lattice A4. Journal of Algebra 320(4):1391\u20131408","journal-title":"Journal of Algebra"},{"key":"8662_CR10","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1016\/j.sigpro.2014.09.036","volume":"108","author":"I-C Chang","year":"2015","unstructured":"Chang I-C et al (2015) High capacity reversible data hiding scheme based on residual histogram shifting for block truncation coding. Signal Process 108:376\u2013388","journal-title":"Signal Process"},{"issue":"1","key":"8662_CR11","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1109\/TIFS.2012.2224108","volume":"8","author":"G Coatrieux","year":"2013","unstructured":"Coatrieux G et al (2013) Reversible watermarking based on invariant image classification and dynamic histogram shifting. IEEE Transactions on Information Forensics and Security 8(1):111\u2013120","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"8662_CR12","doi-asserted-by":"crossref","first-page":"1300","DOI":"10.4153\/CJM-1999-059-5","volume":"51","author":"JH Conway","year":"1999","unstructured":"Conway JH, Rains EM, Sloane NJA (1999) On the existence of similar sublattices. Can J Math 51:1300\u20131306","journal-title":"Can J Math"},{"issue":"2","key":"8662_CR13","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1109\/TIT.1982.1056483","volume":"28","author":"JH Conway","year":"1982","unstructured":"Conway JH, Sloane NJA (1982) Voronoi regions of lattices, second moments of polytopes and quantization. IEEE Trans on Information Theory 28(2):211\u2013226","journal-title":"IEEE Trans on Information Theory"},{"issue":"2","key":"8662_CR14","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1109\/TIT.1982.1056484","volume":"28","author":"JH Conway","year":"1982","unstructured":"Conway JH, Sloane NJA (1982) Fast quantizing and decoding and algorithms for lattice quantizers and codes. IEEE Trans on Information Theory 28(2):227\u2013232","journal-title":"IEEE Trans on Information Theory"},{"key":"8662_CR15","doi-asserted-by":"crossref","unstructured":"Conway JH, Sloane NJA (1998) Sphere Packings, Lattices and Groups, 3rd edn. Springer-Verlag, New York","DOI":"10.1007\/978-1-4757-6568-7"},{"issue":"3","key":"8662_CR16","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1016\/j.aeue.2013.08.018","volume":"68","author":"C Das","year":"2014","unstructured":"Das C et al (2014) A novel blind robust image watermarking in DCT domain using inter-block coefficient correlation. AEU-International Journal of Electronics and Communications 68(3):244\u2013253","journal-title":"AEU-International Journal of Electronics and Communications"},{"issue":"1","key":"8662_CR17","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1049\/cje.2017.10.004","volume":"27","author":"H Ding","year":"2018","unstructured":"Ding H et al (2018) High Quality Data Hiding in Halftone Image Based on Block Conjugate. Chin J Electron 27(1):150\u2013158","journal-title":"Chin J Electron"},{"issue":"5","key":"8662_CR18","doi-asserted-by":"crossref","first-page":"2420","DOI":"10.1109\/TIP.2016.2549458","volume":"25","author":"IC Dragoi","year":"2016","unstructured":"Dragoi IC, Coltuc D (2016) Adaptive pairing reversible watermarking. IEEE Trans Image Process 25(5):2420\u20132422","journal-title":"IEEE Trans Image Process"},{"key":"8662_CR19","doi-asserted-by":"crossref","unstructured":"Fan D-P et al (2018) Salient objects in clutter: Bringing salient object detection to the foreground. in Proceedings of the European Conference on Computer Vision (ECCV)","DOI":"10.1007\/978-3-030-01267-0_12"},{"key":"8662_CR20","volume-title":"Rethinking rgb-d salient object detection: models, datasets, and large-scale benchmarks","author":"D-P Fan","year":"2019","unstructured":"Fan, D.-P., et al., Rethinking rgb-d salient object detection: models, datasets, and large-scale benchmarks. 2019."},{"key":"8662_CR21","unstructured":"Gersho A, Gray RM (2003) Vector quantization and signal compression, 9th edn. Kluwer Academic Publishers, Amsterdam"},{"issue":"3","key":"8662_CR22","doi-asserted-by":"crossref","first-page":"781","DOI":"10.1109\/18.986048","volume":"48","author":"VK Goyal","year":"2002","unstructured":"Goyal VK, Kelner JA, Kovacevic J (2002) Multiple description vector quantization with a coarse lattice. IEEE Trans Inf Theory 48(3):781\u2013788","journal-title":"IEEE Trans Inf Theory"},{"issue":"1","key":"8662_CR23","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1186\/s40064-015-0904-z","volume":"4","author":"BL Gunjal","year":"2015","unstructured":"Gunjal BL, Mali SN (2015) MEO based secured, robust, high capacity and perceptual quality image watermarking in DWT-SVD domain. SpringerPlus 4(1):126","journal-title":"SpringerPlus"},{"issue":"11","key":"8662_CR24","doi-asserted-by":"crossref","first-page":"1833","DOI":"10.1016\/j.jss.2009.05.051","volume":"82","author":"W Hong","year":"2009","unstructured":"Hong W, Chen T-S, Shiu C-W (2009) Reversible data hiding for high quality images using modification of prediction errors. J Syst Softw 82(11):1833\u20131842","journal-title":"J Syst Softw"},{"key":"8662_CR25","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1016\/j.comnet.2016.01.009","volume":"101","author":"MS Hossain","year":"2016","unstructured":"Hossain MS, Muhammad G (2016) Cloud-assisted industrial internet of things (iiot)\u2013enabled framework for health monitoring. Comput Netw 101:192\u2013202","journal-title":"Comput Netw"},{"issue":"3","key":"8662_CR26","doi-asserted-by":"crossref","first-page":"625","DOI":"10.1109\/TCSVT.2018.2809585","volume":"29","author":"G Hua","year":"2019","unstructured":"Hua G et al (2019) Random matching pursuit for image watermarking. IEEE Transactions on Circuits and Systems for Video Technology 29(3):625\u2013639","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"4","key":"8662_CR27","first-page":"655","volume":"4","author":"HJ Hwang","year":"2010","unstructured":"Hwang HJ et al (2010) Reversible watermarking method using optimal histogram pair shifting based on prediction and sorting. KSII Transactions on Internet and Information Systems (TIIS) 4(4):655\u2013670","journal-title":"KSII Transactions on Internet and Information Systems (TIIS)"},{"issue":"17","key":"8662_CR28","doi-asserted-by":"crossref","first-page":"6849","DOI":"10.1007\/s11042-014-1932-3","volume":"74","author":"GS Kalra","year":"2015","unstructured":"Kalra GS, Talwar R, Sadawarti H (2015) Adaptive digital image watermarking for color images in frequency domain. Multimed Tools Appl 74(17):6849\u20136869","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"8662_CR29","doi-asserted-by":"crossref","first-page":"2181","DOI":"10.1109\/TIP.2013.2246179","volume":"22","author":"X Li","year":"2013","unstructured":"Li X, Li B, Yang B, Zeng T (2013) General framework to histogram-shifting-based reversible data hiding. IEEE Trans Image Process 22(6):2181\u20132191","journal-title":"IEEE Trans Image Process"},{"issue":"7","key":"8662_CR30","doi-asserted-by":"crossref","first-page":"1091","DOI":"10.1109\/TIFS.2013.2261062","volume":"8","author":"X Li","year":"2013","unstructured":"Li X et al (2013) A novel reversible data hiding scheme based on two-dimensional difference-histogram modification. IEEE Transactions on Information Forensics and Security 8(7):1091\u20131100","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"9","key":"8662_CR31","doi-asserted-by":"crossref","first-page":"2016","DOI":"10.1109\/TIFS.2015.2444354","volume":"10","author":"X Li","year":"2015","unstructured":"Li X et al (2015) Efficient reversible data hiding based on multiple histograms modification. IEEE Transactions on Information Forensics and Security 10(9):2016\u20132027","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"8662_CR32","doi-asserted-by":"crossref","first-page":"69808","DOI":"10.1109\/ACCESS.2019.2919376","volume":"7","author":"M Li","year":"2019","unstructured":"Li M et al (2019) Fidelity preserved data hiding in encrypted highly autocorrelated data based on homomorphism and compressive sensing. IEEE Access 7:69808\u201369825","journal-title":"IEEE Access"},{"key":"8662_CR33","doi-asserted-by":"crossref","first-page":"73573","DOI":"10.1109\/ACCESS.2019.2920178","volume":"7","author":"Y Li","year":"2019","unstructured":"Li Y et al (2019) A high-imperceptibility and histogram-shifting data hiding scheme for JPEG images. IEEE Access 7:73573\u201373582","journal-title":"IEEE Access"},{"issue":"1","key":"8662_CR34","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/TCOM.1980.1094577","volume":"28","author":"Y Linde","year":"1980","unstructured":"Linde Y, Buzo A, Gray R (1980) An algorithm for vector quantizer design. IEEE Trans on Communications 28(1):84\u201395","journal-title":"IEEE Trans on Communications"},{"key":"8662_CR35","unstructured":"Liu Y et al (2019) DNA: Deeply-supervised Nonlinear Aggregation for Salient Object Detection"},{"issue":"7","key":"8662_CR36","doi-asserted-by":"crossref","first-page":"674","DOI":"10.1109\/34.192463","volume":"11","author":"SG Mallat","year":"1989","unstructured":"Mallat SG (1989) A theory for multiresolution signal decomposition: the wavelet representation. IEEE Trans on Pattern Analysis and Machine Intelligence 11(7):674\u2013693","journal-title":"IEEE Trans on Pattern Analysis and Machine Intelligence"},{"issue":"3","key":"8662_CR37","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1109\/MCE.2017.2684980","volume":"6","author":"SP Mohanty","year":"2017","unstructured":"Mohanty SP et al (2017) Everything you want to know about watermarking: from paper Marks to hardware protection: from paper marks to hardware protection. IEEE Consumer Electronics Magazine 6(3):83\u201391","journal-title":"IEEE Consumer Electronics Magazine"},{"issue":"5","key":"8662_CR38","doi-asserted-by":"crossref","first-page":"762","DOI":"10.1016\/j.dsp.2007.10.004","volume":"18","author":"TV Nguyen","year":"2008","unstructured":"Nguyen TV, Patra JC (2008) A simple ICA-based digital image watermarking scheme. Digital Signal Processing 18(5):762\u2013776","journal-title":"Digital Signal Processing"},{"issue":"12","key":"8662_CR39","doi-asserted-by":"crossref","first-page":"5010","DOI":"10.1109\/TIP.2013.2281422","volume":"22","author":"B Ou","year":"2013","unstructured":"Ou B, Li X, Zhao Y, Ni R, Shi YQ (2013) Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans Image Process 22(12):5010\u20135021","journal-title":"IEEE Trans Image Process"},{"issue":"50","key":"8662_CR40","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1016\/j.jvcir.2017.11.020","volume":"50","author":"Z Pan","year":"2018","unstructured":"Pan Z, Wang L (2018) Novel reversible data hiding scheme for two-stage VQ compressed images based on search-order coding. J Vis Commun Image Represent 50(50):186\u2013198","journal-title":"J Vis Commun Image Represent"},{"issue":"2","key":"8662_CR41","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1016\/j.dsp.2009.07.004","volume":"20","author":"JC Patra","year":"2010","unstructured":"Patra JC, Karthik A, Bornand C (2010) A novel CRT-based watermarking technique for authentication of multimedia contents. Digital Signal Processing 20(2):442\u2013453","journal-title":"Digital Signal Processing"},{"issue":"6","key":"8662_CR42","doi-asserted-by":"crossref","first-page":"1597","DOI":"10.1016\/j.dsp.2010.03.010","volume":"20","author":"JC Patra","year":"2010","unstructured":"Patra JC, Phua JE, Bornand C (2010) A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression. Digital Signal Processing 20(6):1597\u20131611","journal-title":"Digital Signal Processing"},{"issue":"4","key":"8662_CR43","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1049\/iet-ifs.2010.0059","volume":"7","author":"A Piper","year":"2013","unstructured":"Piper A, Safavi-Naini R (2013) Scalable fragile watermarking for image authentication. IET Inf Secur 7(4):300\u2013311","journal-title":"IET Inf Secur"},{"key":"8662_CR44","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.sigpro.2016.05.032","volume":"129","author":"C Qin","year":"2016","unstructured":"Qin C, Hu Y-C (2016) Reversible data hiding in VQ index table with lossless coding and adaptive switching mechanism. Signal Process 129:48\u201355","journal-title":"Signal Process"},{"issue":"435","key":"8662_CR45","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1016\/j.ins.2017.12.041","volume":"435","author":"P Rahmani","year":"2018","unstructured":"Rahmani P, Dastghaibyfard G (2018) An efficient histogram-based index mapping mechanism for reversible data hiding in VQ-compressed images. Inf Sci 435(435):224\u2013239","journal-title":"Inf Sci"},{"issue":"7","key":"8662_CR46","doi-asserted-by":"crossref","first-page":"1195","DOI":"10.1049\/iet-ipr.2016.0618","volume":"12","author":"P Rahmani","year":"2018","unstructured":"Rahmani P, Dastghaibyfard G (2018) Two reversible data hiding schemes for VQ-compressed images based on index coding. IET Image Process 12(7):1195\u20131203","journal-title":"IET Image Process"},{"issue":"7","key":"8662_CR47","doi-asserted-by":"crossref","first-page":"989","DOI":"10.1109\/TCSVT.2009.2020257","volume":"19","author":"V Sachnev","year":"2009","unstructured":"Sachnev V et al (2009) Reversible watermarking algorithm using sorting and prediction. IEEE Transactions on Circuits and Systems for Video Technology 19(7):989\u2013999","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"8662_CR48","doi-asserted-by":"crossref","first-page":"10269","DOI":"10.1109\/ACCESS.2018.2799240","volume":"6","author":"A Shehab","year":"2018","unstructured":"Shehab A et al (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6:10269\u201310278","journal-title":"IEEE Access"},{"key":"8662_CR49","doi-asserted-by":"crossref","first-page":"3210","DOI":"10.1109\/ACCESS.2016.2573308","volume":"4","author":"YQ Shi","year":"2016","unstructured":"Shi YQ et al (2016) Reversible data hiding: advances in the past two decades. IEEE Access 4:3210\u20133237","journal-title":"IEEE Access"},{"key":"8662_CR50","doi-asserted-by":"crossref","unstructured":"Shirafkan MH, Akhtarkavan E, Vahidi J (2015) A image steganography scheme based on discrete wavelet transform using lattice vector quantization and reed-solomon encoding. in 2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","DOI":"10.1109\/KBEI.2015.7436041"},{"key":"8662_CR51","doi-asserted-by":"crossref","first-page":"51130","DOI":"10.1109\/ACCESS.2018.2868192","volume":"6","author":"AK Shukla","year":"2018","unstructured":"Shukla AK et al (2018) A secure and high-capacity data-hiding method using compression, encryption and optimized pixel value differencing. IEEE Access 6:51130\u201351139","journal-title":"IEEE Access"},{"key":"8662_CR52","unstructured":"Singh AK, et al (2016) Digital image watermarking: techniques and emerging applications, in Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global. p. 246\u2013272"},{"issue":"1","key":"8662_CR53","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1007\/s00500-017-2489-7","volume":"22","author":"Q Su","year":"2018","unstructured":"Su Q, Chen B (2018) Robust color image watermarking technique in the spatial domain. Soft Comput 22(1):91\u2013106","journal-title":"Soft Comput"},{"issue":"2","key":"8662_CR54","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1137\/S0036141095289051","volume":"29","author":"Wim Sweldens","year":"1998","unstructured":"Sweldens W (1998) The lifting scheme: a construction of second generation wavelets. SIAM J Math Anal 29(2)","journal-title":"SIAM Journal on Mathematical Analysis"},{"key":"8662_CR55","doi-asserted-by":"crossref","first-page":"1718","DOI":"10.1109\/18.930913","volume":"47","author":"VA Vaishampayan","year":"2001","unstructured":"Vaishampayan VA, Sloane N, Servetto S (2001) Multiple description vector quantization with lattice codebooks: design and analysis. IEEE Trans on Information Theory 47:1718\u20131734","journal-title":"IEEE Trans on Information Theory"},{"key":"8662_CR56","unstructured":"Wang C, Li X, Yang B (2010) Efficient reversible image watermarking by using dynamical prediction-error expansion, in 2010 IEEE International Conference on Image Processing. p. 3673\u20133676."},{"key":"8662_CR57","unstructured":"Weber G (1993) USC-SIPI image database: Version 4. Dept. Elect. Eng.-Syst., Univ. Southern California, Los Angeles, CA, USA, Tech. Rep, 244"},{"key":"8662_CR58","doi-asserted-by":"crossref","first-page":"34570","DOI":"10.1109\/ACCESS.2019.2904174","volume":"7","author":"S Weng","year":"2019","unstructured":"Weng S et al (2019) Improved K-pass pixel value ordering based data hiding. IEEE Access 7:34570\u201334582","journal-title":"IEEE Access"},{"key":"8662_CR59","doi-asserted-by":"crossref","unstructured":"Zheng S, Wang Y, Hu D (2019) Lossless Data Hiding Based on Homomorphic Cryptosystem. IEEE Transactions on Dependable and Secure Computing:1","DOI":"10.1109\/TDSC.2019.2913422"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-08662-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-020-08662-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-08662-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T00:39:51Z","timestamp":1611794391000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-020-08662-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,29]]},"references-count":59,"journal-issue":{"issue":"19-20","published-print":{"date-parts":[[2020,5]]}},"alternative-id":["8662"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-08662-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,29]]},"assertion":[{"value":"7 February 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 November 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}