{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T13:45:06Z","timestamp":1773409506266,"version":"3.50.1"},"reference-count":36,"publisher":"SPIE-Intl Soc Optical Eng","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Electron. Imaging"],"published-print":{"date-parts":[[2009,1,1]]},"DOI":"10.1117\/1.3073979","type":"journal-article","created":{"date-parts":[[2009,1,30]],"date-time":"2009-01-30T00:12:10Z","timestamp":1233274330000},"page":"013003","source":"Crossref","is-referenced-by-count":12,"title":["Novel steganographic method based on jig swap puzzle images"],"prefix":"10.1117","volume":"18","author":[{"given":"En-Jung","family":"Farn","sequence":"first","affiliation":[]}],"member":"189","reference":[{"key":"10.1117\/1.3073979_r1","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"Bender","year":"1996","journal-title":"IBM Syst. J.","ISSN":"https:\/\/id.crossref.org\/issn\/0018-8670","issn-type":"print"},{"key":"10.1117\/1.3073979_r2","first-page":"26","volume":"31","author":"Johnson","year":"1998","journal-title":"IEEE Comput. Sci. Eng.","ISSN":"https:\/\/id.crossref.org\/issn\/1070-9924","issn-type":"print"},{"key":"10.1117\/1.3073979_r3","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MSECP.2003.1203220","volume":"1","author":"Provos","year":"2003","journal-title":"IEEE Security Privacy"},{"key":"10.1117\/1.3073979_r4","doi-asserted-by":"crossref","unstructured":"I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich, and T. Kalker ,Digital Watermarking and Steganography, pp. 429\u2013495, Morgan Kaufmann, San Francisco (2008).","DOI":"10.1016\/B978-012372585-1.50015-2"},{"key":"10.1117\/1.3073979_r5","doi-asserted-by":"crossref","unstructured":"C. Cachin , \u201cAn information-theoretic model for steganography,\u201d in2nd Int. Workshop on Information Hiding, Portland, Oregon, Lecture Notes in Computer Science, vol. 1525, pp. 306\u2013318, Springer-Verlag, Berlin (1998).","DOI":"10.1007\/3-540-49380-8_21"},{"key":"10.1117\/1.3073979_r6","doi-asserted-by":"crossref","unstructured":"N. F. Johnson and S. Jajodia , \u201cSteganalysis of images created using current steganographic software,\u201d inProc. 2nd Int. Workshop on Information Hiding, Portland, Oregon, Lecture Notes in Computer Science, vol. 1525, pp. 273\u2013289, Springer-Verlag, Berlin (1998).","DOI":"10.1007\/3-540-49380-8_19"},{"key":"10.1117\/1.3073979_r7","doi-asserted-by":"crossref","unstructured":"A. Westfeld and A. Pfitzmann , \u201cAttacks on steganographic systems,\u201d inProc. 3rd Int. Workshop on Information Hiding, Dresden, Germany, Lecture Notes in Computer Science, vol. 1768, , pp. 61\u201376, Springer-Verlag, Berlin (1999).","DOI":"10.1007\/10719724_5"},{"key":"10.1117\/1.3073979_r8","doi-asserted-by":"crossref","unstructured":"S. Lyu and H. Farid , \u201cDetecting hidden messages using higher-order statistics and support vector machines,\u201d inProc. 5th Int. Workshop on Information Hiding, Noordwijkerhout, the Netherlands, Lecture Notes in Computer Science, vol. 2578, pp. 340\u2013354, Springer-Verlag, Berlin (2002).","DOI":"10.1007\/3-540-36415-3_22"},{"key":"10.1117\/1.3073979_r9","unstructured":"J. Fridrich, M. Goljan, and D. Hogea , \u201cSteganalysis of JPEG images: breaking the F5 algorithm,\u201d inProc. 5th Int. Workshop on Information Hiding, Noordwijkerhout, the Netherlands, Lecture Notes in Computer Science, vol. 2578, pp. 310\u2013323, Springer-Verlag, Berlin (2002)."},{"key":"10.1117\/1.3073979_r10","doi-asserted-by":"crossref","unstructured":"S. Dumitrescu, X. Wu, and Z. Wang , \u201cDetection of LSB steganography via sample pair analysis,\u201d inProc. 5th Int. Workshop on Information Hiding, Noordwijkerhout, the Netherlands, Lecture Notes in Computer Science, vol. 2578, pp. 355\u2013372, Springer-Verlag, Berlin (2002).","DOI":"10.1007\/3-540-36415-3_23"},{"key":"10.1117\/1.3073979_r11","first-page":"673","volume":"16","author":"Fridrich","year":"2005","journal-title":"Proc. SPIE","ISSN":"https:\/\/id.crossref.org\/issn\/0277-786X","issn-type":"print"},{"key":"10.1117\/1.3073979_r12","unstructured":"A. Brown , \u201cS-Tool V4,\u201d http:\/\/www.spychecker.com\/program\/stiils.html, Jan. 21 (2009)."},{"key":"10.1117\/1.3073979_r13","unstructured":"H. Repp , \u201cHide4PGP,\u201d http:\/\/www.heinz-repp.onlinehome.de\/hide4PGP.htm, Jan. 21 (2009)."},{"key":"10.1117\/1.3073979_r14","unstructured":"D. Upham , \u201cJPEG-JSteg,\u201d http:\/\/www.funet.fi\/pub\/crypt\/stefanography\/jpeg-jsteg-v4.diff.gzee (1997)."},{"key":"10.1117\/1.3073979_r15","unstructured":"A. Latham , \u201cSteganography: JPHIDE and JPSEEK,\u201d http:\/\/linux01.gwdg.de\/~alatham\/stego.html (1999)."},{"key":"10.1117\/1.3073979_r16","unstructured":"N. Provos , \u201cOutguess,\u201d http:\/\/www.outguesst.orgoutguest-0.2.tar.gz (2001)."},{"key":"10.1117\/1.3073979_r17","doi-asserted-by":"publisher","DOI":"10.1049\/ip-vis:20000341"},{"key":"10.1117\/1.3073979_r18","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(03)00221-8"},{"key":"10.1117\/1.3073979_r19","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"Chan","year":"2004","journal-title":"Pattern Recogn.","ISSN":"https:\/\/id.crossref.org\/issn\/0031-3203","issn-type":"print"},{"key":"10.1117\/1.3073979_r20","unstructured":"R. Machado , \u201c\\Stego,\u201d http:\/\/www.stego.com, Jan. 21 (2009)."},{"key":"10.1117\/1.3073979_r21","doi-asserted-by":"crossref","unstructured":"J. Fridrich and R. Du , \u201cSecure steganographic methods for palette images,\u201d inProc. 3rd Information Hiding Workshop, Dresden, Germany, Lecture Notes in Computer Science, Vol. 1768, pp. 47\u201360, Springer-Verlag, New York (2000).","DOI":"10.1007\/10719724_4"},{"key":"10.1117\/1.3073979_r22","doi-asserted-by":"publisher","DOI":"10.1109\/83.777088"},{"key":"10.1117\/1.3073979_r23","unstructured":"N. Provos , \u201cDefending against statistical steganalysis,\u201d inProc. 10th Usenix Security Symp., Washington, DC, pp. 323\u2013335, Usenix Assoc. (2001)."},{"key":"10.1117\/1.3073979_r24","unstructured":"A. Westfeld , \u201cF5\u2014a steganographic algorithm: high capacity despite better steganalysis,\u201d inProc. 4th Int. Workshop on Information Hiding, Pittsburg, PA, Lecture Notes in Computer Science, vol. 2137, pp. 289\u2013302, Springer-Verlag, Berlin (2001)."},{"key":"10.1117\/1.3073979_r25","doi-asserted-by":"crossref","first-page":"967","DOI":"10.1142\/S021800140300268X","volume":"17","author":"Lee","year":"2003","journal-title":"Int. J. Pattern Recognit. Artif. Intell.","ISSN":"https:\/\/id.crossref.org\/issn\/0218-0014","issn-type":"print"},{"key":"10.1117\/1.3073979_r26","unstructured":"http:\/\/www.jigzone.com, Jan. 21 (2009)."},{"key":"10.1117\/1.3073979_r27","unstructured":"http:\/\/www.jigsawpuzzles.ws, Jan. 21 (2009)."},{"key":"10.1117\/1.3073979_r28","unstructured":"http:\/\/www.pajersoft.com\/winshweb.htm, Jan. 21 (2009)."},{"key":"10.1117\/1.3073979_r29","unstructured":"http:\/\/www.kraisoft.com\/puzzle-games\/jigsaw, Jan. 21 (2009)."},{"key":"10.1117\/1.3073979_r30","unstructured":"http:\/\/www.spintop-games.com\/jigsaw_game_download\/jigsaw_landscapes.html, Jan. 21 (2009)."},{"key":"10.1117\/1.3073979_r31","unstructured":"http:\/\/www.spintop-games.com\/jigsaw_game_download\/jigsaw_nature.html, Jan. 21 (2009)."},{"key":"10.1117\/1.3073979_r32","unstructured":"Yell, \u201cPicture puzzle,\u201d http:\/\/www.onlinegameshq.com\/game\/867\/picture-puzzle.html, Jan. 21 (2009)."},{"key":"10.1117\/1.3073979_r33","doi-asserted-by":"crossref","unstructured":"E. D. Demaine and M. L. Demaine , \u201cJigsaw puzzles, edge matching, and polyomino packing: connections and complexity,\u201dGraphs and Combinatorics23, 195\u2013208 (2007).","DOI":"10.1007\/s00373-007-0713-4"},{"key":"10.1117\/1.3073979_r34","first-page":"1923","volume":"14","author":"Nielsen","year":"2008","journal-title":"Pattern Recogn. Lett.","ISSN":"https:\/\/id.crossref.org\/issn\/0167-8655","issn-type":"print"},{"key":"10.1117\/1.3073979_r35","unstructured":"Y. X. Zhao, M. C. Su, Z. L. Chou, and J. Lee , \u201cA puzzle solver and its application in speech descrambling,\u201d inProc. 2007 WSEAS Int. Conf. Computer Engineering and Applications, Gold Coast, Australia, pp. 171\u2013176, World Scientific and Engineering Academy and Society (WSEAS), Stevens Point, WI (2007)."},{"key":"10.1117\/1.3073979_r36","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2005.863054"}],"container-title":["Journal of Electronic Imaging"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/electronicimaging.spiedigitallibrary.org\/article.aspx?articleid=1100210","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T17:18:33Z","timestamp":1558113513000},"score":1,"resource":{"primary":{"URL":"http:\/\/electronicimaging.spiedigitallibrary.org\/article.aspx?doi=10.1117\/1.3073979"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,1,1]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2009,1,1]]}},"URL":"https:\/\/doi.org\/10.1117\/1.3073979","relation":{},"ISSN":["1017-9909"],"issn-type":[{"value":"1017-9909","type":"print"}],"subject":[],"published":{"date-parts":[[2009,1,1]]}}}