{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T15:57:41Z","timestamp":1761580661513},"reference-count":24,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[1987,9,1]],"date-time":"1987-09-01T00:00:00Z","timestamp":557452800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Pattern Anal. Mach. Intell."],"published-print":{"date-parts":[[1987,9]]},"DOI":"10.1109\/tpami.1987.4767969","type":"journal-article","created":{"date-parts":[[2009,1,29]],"date-time":"2009-01-29T21:35:15Z","timestamp":1233264915000},"page":"710-715","source":"Crossref","is-referenced-by-count":29,"title":["Decoding Substitution Ciphers by Means of Word Matching with Application to OCR"],"prefix":"10.1109","volume":"PAMI-9","author":[{"given":"George","family":"Nagy","sequence":"first","affiliation":[]},{"given":"Sharad","family":"Seth","sequence":"additional","affiliation":[]},{"given":"Kent","family":"Einspahr","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359174"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/26.1.68"},{"key":"ref12","author":"nilsson","year":"1980","journal-title":"Principles of Artificial Intelligence"},{"key":"ref13","author":"rich","year":"1983","journal-title":"Artificial Intelligence"},{"key":"ref14","author":"winston","year":"1977","journal-title":"Artificial Intelligence"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1137\/0205003"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1979.11543"},{"key":"ref17","author":"o'mara","year":"1980","journal-title":"Cybernetics and Applied Systems"},{"key":"ref18","author":"chen","year":"1984","journal-title":"Computer Research Review"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/359038.359041"},{"key":"ref4","first-page":"128","article-title":"Page-to-disk technology: 9 state of the art scanners","volume":"5","author":"stanton","year":"1986","journal-title":"PC Mag"},{"key":"ref3","first-page":"347","article-title":"Hierarchical image representation with application to optically scanned documents","author":"nagy","year":"1984","journal-title":"Proc 6th ICPR"},{"key":"ref6","article-title":"Unsupervised construction of decision networks for pattern classification","author":"casey","year":"1984","journal-title":"Proc 6th ICPR"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"647","DOI":"10.1147\/rd.266.0647","article-title":"Document analysis system","volume":"26","author":"wong","year":"1982","journal-title":"IBM J Res Develop"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0471-56"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1968.226928"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1983.1654376"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"621","DOI":"10.1016\/S0169-7161(82)02032-X","author":"nagy","year":"1982","journal-title":"Handbook of Statistics 2"},{"key":"ref9","article-title":"An algorithm for solving simple substitution cryptograms","author":"bahl","year":"1977","journal-title":"Proc IEEE Int Symp Inform Theory"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(60)90272-2"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1976.5009232"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/363282.363326"},{"key":"ref24","first-page":"349","article-title":"Text OCR by solving a cryptogram","author":"casey","year":"1986","journal-title":"Proc 6th ICPR"},{"key":"ref23","first-page":"340","article-title":"High speed string correction for OCR","author":"tanaka","year":"1986","journal-title":"Proc 6th ICPR"}],"container-title":["IEEE Transactions on Pattern Analysis and Machine Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/34\/4767950\/04767969.pdf?arnumber=4767969","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:53:35Z","timestamp":1638219215000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4767969"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1987,9]]},"references-count":24,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tpami.1987.4767969","relation":{},"ISSN":["0162-8828"],"issn-type":[{"value":"0162-8828","type":"print"}],"subject":[],"published":{"date-parts":[[1987,9]]}}}