{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T04:22:13Z","timestamp":1751516533588,"version":"3.41.0"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030781132"},{"type":"electronic","value":"9783030781149"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-78114-9_10","type":"book-chapter","created":{"date-parts":[[2021,7,2]],"date-time":"2021-07-02T23:20:19Z","timestamp":1625268019000},"page":"134-146","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Pressure Analysis in Dynamic Handwriting for Forgery Detection"],"prefix":"10.1007","author":[{"given":"Mariam","family":"Doliashvili","sequence":"first","affiliation":[]},{"given":"Dwayne","family":"Jeffrey","sequence":"additional","affiliation":[]},{"given":"Michael-Brian C.","family":"Ogawa","sequence":"additional","affiliation":[]},{"given":"Martha E.","family":"Crosby","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,3]]},"reference":[{"key":"10_CR1","unstructured":"Ketubot (The Talmud): In Tractate Ketubot (with commentary by Rabbi Adin Steinsalz), vol. VIII, Section 18B, p. 57. Random House, New York (1992)"},{"key":"10_CR2","unstructured":"E. Participation: Statute of Frauds (1677). https:\/\/www.legislation.gov.uk\/aep\/Cha2\/29\/3\/contents. Accessed 12 Aug 2020"},{"issue":"Suppl 1","key":"10_CR3","doi-asserted-by":"publisher","first-page":"S136","DOI":"10.1111\/j.1556-4029.2010.01584.x","volume":"56","author":"LA Mohammed","year":"2011","unstructured":"Mohammed, L.A., Found, B., Caligiuri, M., Rogers, D.: The dynamic character of disguise behavior for text-based, mixed, and stylized signatures. J. Forensic Sci. 56(Suppl 1), S136-141 (2011). https:\/\/doi.org\/10.1111\/j.1556-4029.2010.01584.x","journal-title":"J. Forensic Sci."},{"key":"10_CR4","unstructured":"Harrison, D., Seiger, D.P.: Meeting the Daubert Challenge: A Bibliography of Handwriting Articles for the Forensic Document Examiner, FBI.https:\/\/www.fbi.gov\/about-us\/lab\/forensic-science-communications\/fsc\/jan2003\/seiger.htm. Accessed 12 Aug 2020"},{"key":"10_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.11.039","author":"SY Ooi","year":"2016","unstructured":"Ooi, S.Y., Teoh, A.B.J., Pang, Y., Hiew, B.Y.: Image-based handwritten signature verification using hybrid methods of discrete radon transform, principal component analysis and probabilistic neural network. Appl. Soft Comput. (2016). https:\/\/doi.org\/10.1016\/j.asoc.2015.11.039","journal-title":"Appl. Soft Comput."},{"key":"10_CR6","doi-asserted-by":"publisher","unstructured":"Ortega-Garcia, J., et al.: MCYT baseline corpus: a bimodal biometric database. In: IEE Proceedings - Vision Image Signal Processing, vol. 150, no. 6, pp. 395\u2013401, December 2003. https:\/\/doi.org\/10.1049\/ip-vis:20031078","DOI":"10.1049\/ip-vis:20031078"},{"key":"10_CR7","unstructured":"Parmar, P., Mehta, J., Sharma, S., Patel, K., Singh, P.: A Survey of Handwritten Signature Verification System Methodologies, vol. 6, no. 5, p. 6 (2019)"},{"key":"10_CR8","unstructured":"Tolosana, R., Vera-Rodriguez, R., Fierrez, J., Ortega-Garcia, J.: DeepSign: Deep On-Line Signature Verification, ArXiv200210119 Cs, February 2020. Accessed 12 Aug 2020, http:\/\/arxiv.org\/abs\/2002.10119"},{"key":"10_CR9","unstructured":"Sanda, S., Amirisetti, S.: Online Handwritten Signature Verification System, p. 50"},{"issue":"5","key":"10_CR10","doi-asserted-by":"publisher","first-page":"951","DOI":"10.1109\/TPAMI.2016.2560810","volume":"39","author":"M Diaz","year":"2017","unstructured":"Diaz, M., Ferrer, M.A., Eskander, G.S., Sabourin, R.: Generation of duplicated off-line signature images for verification systems. IEEE Trans. Pattern Anal. Mach. Intell. 39(5), 951\u2013964 (2017). https:\/\/doi.org\/10.1109\/TPAMI.2016.2560810","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"1","key":"10_CR11","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1109\/TCYB.2016.2630419","volume":"48","author":"M Diaz","year":"2018","unstructured":"Diaz, M., Fischer, A., Ferrer, M.A., Plamondon, R.: Dynamic signature verification system based on one real signature. IEEE Trans. Cybern. 48(1), 228\u2013239 (2018). https:\/\/doi.org\/10.1109\/TCYB.2016.2630419","journal-title":"IEEE Trans. Cybern."},{"issue":"6","key":"10_CR12","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1109\/THMS.2015.2443050","volume":"45","author":"G Pirlo","year":"2015","unstructured":"Pirlo, G., Cuccovillo, V., Diaz-Cabrera, M., Impedovo, D., Mignone, P.: Multidomain Verification of Dynamic Signatures Using Local Stability Analysis. IEEE Trans Hum.-Mach. Syst. 45(6), 805\u2013810 (2015). https:\/\/doi.org\/10.1109\/THMS.2015.2443050","journal-title":"IEEE Trans Hum.-Mach. Syst."},{"key":"10_CR13","doi-asserted-by":"publisher","unstructured":"Offline signature verification and quality characterization using poset-oriented grid features|Pattern Recognition. https:\/\/doi.org\/10.1016\/j.patcog.2016.01.009. Accessed 12 Aug 2020","DOI":"10.1016\/j.patcog.2016.01.009"},{"key":"10_CR14","doi-asserted-by":"publisher","unstructured":"Fischer, A., Diaz, M., Plamondon, R., Ferrer, M.A.: Robust score normalization for DTW-based on-line signature verification. In: 2015 13th International Conference on Document Analysis and Recognition (ICDAR), August 2015, pp. 241\u2013245 (2015). https:\/\/doi.org\/10.1109\/ICDAR.2015.7333760.","DOI":"10.1109\/ICDAR.2015.7333760"},{"key":"10_CR15","unstructured":"Farimani, S.A., Jahan, M.V.: An HMM for online signature verification based on velocity and hand movement directions. In: IEEE Conference Publication (2018). https:\/\/ieeexplore.ieee.org\/abstract\/document\/8336639. Accessed 12 Aug 2020"},{"issue":"1","key":"10_CR16","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.asej.2010.09.007","volume":"1","author":"MMM Fahmy","year":"2010","unstructured":"Fahmy, M.M.M.: Online handwritten signature verification system based on DWT features extraction and neural network classification. Ain Shams Eng. J. 1(1), 59\u201370 (2010). https:\/\/doi.org\/10.1016\/j.asej.2010.09.007","journal-title":"Ain Shams Eng. J."},{"key":"10_CR17","doi-asserted-by":"publisher","unstructured":"Maiorana, E., Campisi, P., Neri, A.: Bioconvolving: cancelable templates for a multi-biometrics signature recognition system. In: 2011 IEEE International Systems Conference, April 2011, pp. 495\u2013500 (2011). https:\/\/doi.org\/10.1109\/SYSCON.2011.5929064","DOI":"10.1109\/SYSCON.2011.5929064"},{"key":"10_CR18","doi-asserted-by":"publisher","unstructured":"Nanni, L., Maiorana, E., Lumini, A., Campisi, P.: Combining local, regional and global matchers for a template protected on-line signature verification system. Exp. Syst. Appl.: Int. J. (2010). https:\/\/doi.org\/10.1016\/j.eswa.2009.10.023. Accessed 12 Aug 2020","DOI":"10.1016\/j.eswa.2009.10.023"},{"key":"10_CR19","doi-asserted-by":"publisher","unstructured":"Blumenstein, M., Ferrer, M.A., Vargas, J.F.: The 4NSigComp2010 off-line signature verification competition: scenario 2. In: 2010 12th International Conference on Frontiers in Handwriting Recognition, November 2010, pp. 721\u2013726 (2010). https:\/\/doi.org\/10.1109\/ICFHR.2010.117","DOI":"10.1109\/ICFHR.2010.117"},{"key":"10_CR20","unstructured":"Deep Learning for Biometrics|Bir Bhanu|Springer. https:\/\/www.springer.com\/gp\/book\/9783319616568. Accessed 12 Aug 2020"},{"issue":"12","key":"10_CR21","doi-asserted-by":"publisher","first-page":"9321","DOI":"10.1007\/s00521-018-3844-z","volume":"31","author":"K Ahrabian","year":"2018","unstructured":"Ahrabian, K., BabaAli, B.: Usage of autoencoders and siamese networks for online handwritten signature verification. Neural Comput. Appl. 31(12), 9321\u20139334 (2018). https:\/\/doi.org\/10.1007\/s00521-018-3844-z","journal-title":"Neural Comput. Appl."},{"key":"10_CR22","doi-asserted-by":"publisher","unstructured":"Mutlu Yapici, M., Tekerek, A., Topaloglu, N.: Convolutional neural network based offline signature verification application. In: 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), December 2018, pp. 30\u201334 (2018). https:\/\/doi.org\/10.1109\/IBIGDELFT.2018.8625290","DOI":"10.1109\/IBIGDELFT.2018.8625290"},{"key":"10_CR23","doi-asserted-by":"publisher","unstructured":"Hafemann, L.G., Sabourin, R., Oliveira, L.S.: Writer-independent feature learning for offline signature verification using deep convolutional neural networks. In: 2016 International Joint Conference on Neural Networks (IJCNN), July 2016, pp. 2576\u20132583 (2016). https:\/\/doi.org\/10.1109\/IJCNN.2016.7727521","DOI":"10.1109\/IJCNN.2016.7727521"},{"key":"10_CR24","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.patrec.2016.05.023","volume":"80","author":"A Soleimani","year":"2016","unstructured":"Soleimani, A., Araabi, B.N., Fouladi, K.: Deep Multitask Metric Learning for Offline Signature Verification. Pattern Recognit. Lett. 80, 84\u201390 (2016). https:\/\/doi.org\/10.1016\/j.patrec.2016.05.023","journal-title":"Pattern Recognit. Lett."},{"issue":"4","key":"10_CR25","doi-asserted-by":"publisher","first-page":"752","DOI":"10.1109\/TIM.2009.2037871","volume":"59","author":"D Wang","year":"2010","unstructured":"Wang, D., Zhang, Y., Yao, C., Wu, J., Jiao, H., Liu, M.: Toward force-based signature verification: a pen-type sensor and preliminary validation. IEEE Trans. Instrum. Meas. 59(4), 752\u2013762 (2010). https:\/\/doi.org\/10.1109\/TIM.2009.2037871","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"10_CR26","doi-asserted-by":"publisher","unstructured":"Houmani, N., Garcia-Salicetti, S., Dorizzi, B.: On assessing the robustness of pen coordinates, pen pressure and pen inclination to time variability with personal entropy. In: 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems, September 2009, pp. 1\u20136 (2009). https:\/\/doi.org\/10.1109\/BTAS.2009.5339074","DOI":"10.1109\/BTAS.2009.5339074"},{"key":"10_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"616","DOI":"10.1007\/978-3-319-50832-0_60","volume-title":"Advances in Visual Computing","author":"H Rantzsch","year":"2016","unstructured":"Rantzsch, H., Yang, H., Meinel, C.: Signature embedding: writer independent offline signature verification with deep metric learning. In: Bebis, G., et al. (eds.) ISVC 2016. LNCS, vol. 10073, pp. 616\u2013625. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-50832-0_60"},{"key":"10_CR28","doi-asserted-by":"publisher","DOI":"10.1007\/s10032-012-0193-9","author":"K Barkoula","year":"2012","unstructured":"Barkoula, K., Economou, G., Fotopoulos, S.: Online signature verification based on signatures turning angle representation using longest common subsequence matching. Int. J. Doc. Anal. Recognit. IJDAR (2012). https:\/\/doi.org\/10.1007\/s10032-012-0193-9","journal-title":"Int. J. Doc. Anal. Recognit. IJDAR"},{"key":"10_CR29","doi-asserted-by":"publisher","unstructured":"Ibrahim, M.T., Kyan, M.J., Khan, M.A., Guan, L.: On-line signature verification using 1-D velocity-based directional analysis. In: 2010 20th International Conference on Pattern Recognition (2010).https:\/\/doi.org\/10.1109\/ICPR.2010.933","DOI":"10.1109\/ICPR.2010.933"},{"issue":"11","key":"10_CR30","doi-asserted-by":"publisher","first-page":"2498","DOI":"10.1109\/TCYB.2014.2375959","volume":"45","author":"Y Liu","year":"2015","unstructured":"Liu, Y., Yang, Z., Yang, L.: Online signature verification based on dct and sparse representation. IEEE Trans. Cybern. 45(11), 2498\u20132511 (2015). https:\/\/doi.org\/10.1109\/TCYB.2014.2375959","journal-title":"IEEE Trans. Cybern."},{"key":"10_CR31","doi-asserted-by":"publisher","unstructured":"Impedovo, D., Pirlo, G.: On-line signature verification by stroke-dependent representation domains. In: 2010 12th International Conference on Frontiers in Handwriting Recognition, November 2010, pp. 623\u2013627 (2010). https:\/\/doi.org\/10.1109\/ICFHR.2010.102","DOI":"10.1109\/ICFHR.2010.102"},{"key":"10_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/978-3-540-25976-3_27","volume-title":"Biometric Authentication","author":"J Fierrez-Aguilar","year":"2004","unstructured":"Fierrez-Aguilar, J., Alonso-Hermira, N., Moreno-Marquez, G., Ortega-Garcia, J.: An off-line signature verification system based on fusion of local and global information. In: Maltoni, D., Jain, A.K. (eds.) BioAW 2004. LNCS, vol. 3087, pp. 295\u2013306. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-25976-3_27"},{"issue":"4","key":"10_CR33","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1049\/iet-bmt.2013.0081","volume":"3","author":"M Martinez-Diaz","year":"2014","unstructured":"Martinez-Diaz, M., Fierrez, J., Krish, R.P., Galbally, J.: Mobile signature verification: feature robustness and performance comparison. IET Biom. 3(4), 267\u2013277 (2014). https:\/\/doi.org\/10.1049\/iet-bmt.2013.0081","journal-title":"IET Biom."},{"issue":"9","key":"10_CR34","doi-asserted-by":"publisher","first-page":"2921","DOI":"10.1016\/j.patcog.2015.03.019","volume":"48","author":"J Galbally","year":"2015","unstructured":"Galbally, J., Diaz-Cabrera, M., Ferrer, M.A., Gomez-Barrero, M., Morales, A., Fierrez, J.: On-line signature recognition through the combination of real dynamic data and synthetically generated static data. Pattern Recognit. 48(9), 2921\u20132934 (2015). https:\/\/doi.org\/10.1016\/j.patcog.2015.03.019","journal-title":"Pattern Recognit."},{"issue":"2","key":"10_CR35","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1109\/TCYB.2017.2647826","volume":"48","author":"A Sharma","year":"2018","unstructured":"Sharma, A., Sundaram, S.: On the exploration of information from the DTW cost matrix for online signature verification. IEEE Trans. Cybern. 48(2), 611\u2013624 (2018). https:\/\/doi.org\/10.1109\/TCYB.2017.2647826","journal-title":"IEEE Trans. Cybern."},{"key":"10_CR36","doi-asserted-by":"publisher","first-page":"478","DOI":"10.1109\/ACCESS.2015.2431493","volume":"3","author":"R Tolosana","year":"2015","unstructured":"Tolosana, R., Vera-Rodriguez, R., Ortega-Garcia, J., Fierrez, J.: Preprocessing and feature selection for improved sensor interoperability in online biometric signature verification. IEEE Access 3, 478\u2013489 (2015). https:\/\/doi.org\/10.1109\/ACCESS.2015.2431493","journal-title":"IEEE Access"},{"issue":"4","key":"10_CR37","doi-asserted-by":"publisher","first-page":"1088","DOI":"10.1109\/TSMCB.2009.2034382","volume":"40","author":"C Gruber","year":"2010","unstructured":"Gruber, C., Gruber, T., Krinninger, S., Sick, B.: Online signature verification with support vector machines based on LCSS kernel functions. IEEE Trans syst. Man Cybern. Part B Cybern. 40(4), 1088\u20131100 (2010). https:\/\/doi.org\/10.1109\/TSMCB.2009.2034382","journal-title":"IEEE Trans syst. Man Cybern. Part B Cybern."},{"key":"10_CR38","doi-asserted-by":"publisher","unstructured":"Meng, M., Xi, X., Luo, Z.: On-line signature verification based on support vector data description and genetic algorithm. In: 2008 7th World Congress on Intelligent Control and Automation, June 2008, pp. 3778\u20133782 (2008). https:\/\/doi.org\/10.1109\/WCICA.2008.4593531.","DOI":"10.1109\/WCICA.2008.4593531"},{"issue":"6","key":"10_CR39","doi-asserted-by":"publisher","first-page":"1059","DOI":"10.1109\/TPAMI.2008.302","volume":"31","author":"DS Guru","year":"2009","unstructured":"Guru, D.S., Prakash, H.N.: Online signature verification and recognition: an approach based on symbolic representation. IEEE Trans. Pattern Anal. Mach. Intell. 31(6), 1059\u20131073 (2009). https:\/\/doi.org\/10.1109\/TPAMI.2008.302","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10_CR40","doi-asserted-by":"publisher","unstructured":"Maiorana, E., Campisi, P., Fierrez, J., Ortega-Garcia, J., Neri, A.: Cancelable templates for sequence-based biometrics with application to on-line signature recognition. IEEE Trans. Syst. Man Cybern. - Part Syst. Hum. 40(3), 525\u2013538 (2010). https:\/\/doi.org\/10.1109\/TSMCA.2010.2041653","DOI":"10.1109\/TSMCA.2010.2041653"},{"issue":"6","key":"10_CR41","doi-asserted-by":"publisher","first-page":"933","DOI":"10.1109\/TIFS.2014.2316472","volume":"9","author":"N Sae-Bae","year":"2014","unstructured":"Sae-Bae, N., Memon, N.: Online signature verification on mobile devices. IEEE Trans. Inf. Forensics Secur. 9(6), 933\u2013947 (2014). https:\/\/doi.org\/10.1109\/TIFS.2014.2316472","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"10_CR42","doi-asserted-by":"publisher","first-page":"588","DOI":"10.1016\/j.humov.2009.01.005.doi:10.1109\/ICFHR.2012.217","volume":"28","author":"M Djioua","year":"2009","unstructured":"Djioua, M., Plamondon, R.: Studying the variability of handwriting patterns using the kinematic theory. Hum. Mov. Sci. 28(5), 588\u2013601 (2009). https:\/\/doi.org\/10.1016\/j.humov.2009.01.005.doi:10.1109\/ICFHR.2012.217","journal-title":"Hum. Mov. Sci."}],"container-title":["Lecture Notes in Computer Science","Augmented Cognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-78114-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T22:37:45Z","timestamp":1751495865000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-78114-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030781132","9783030781149"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-78114-9_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"3 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}