{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T12:22:25Z","timestamp":1743078145618,"version":"3.40.3"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030926373"},{"type":"electronic","value":"9783030926380"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-92638-0_16","type":"book-chapter","created":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T13:02:45Z","timestamp":1641042165000},"page":"261-275","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Multi-view Representation Learning with\u00a0Deep Features for\u00a0Offline Signature Verification"],"prefix":"10.1007","author":[{"given":"Xingbiao","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Changzheng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Benzhuang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Limengzi","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Yuchen","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,1]]},"reference":[{"key":"16_CR1","unstructured":"Andrew, G., Arora, R., Bilmes, J., Livescu, K.: Deep canonical correlation analysis. In: ICML, pp. 1247\u20131255 (2013)"},{"issue":"7","key":"16_CR2","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1145\/3448250","volume":"64","author":"Y Bengio","year":"2021","unstructured":"Bengio, Y., Lecun, Y., Hinton, G.: Deep learning for AI. Commun. ACM 64(7), 58\u201365 (2021)","journal-title":"Commun. ACM"},{"issue":"1","key":"16_CR3","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1016\/j.patcog.2009.05.009","volume":"43","author":"D Bertolini","year":"2010","unstructured":"Bertolini, D., Oliveira, L.S., Justino, E., Sabourin, R.: Reducing forgeries in writer-independent off-line signature verification through ensemble of classifiers. Pattern Recogn. 43(1), 387\u2013396 (2010)","journal-title":"Pattern Recogn."},{"issue":"8","key":"16_CR4","doi-asserted-by":"publisher","first-page":"1655","DOI":"10.1109\/JPROC.2019.2921977","volume":"107","author":"J Chen","year":"2019","unstructured":"Chen, J., Ran, X.: Deep learning with edge computing: a review. Proc. IEEE 107(8), 1655\u20131674 (2019)","journal-title":"Proc. IEEE"},{"issue":"2","key":"16_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3440756","volume":"54","author":"X Chen","year":"2021","unstructured":"Chen, X., Jin, L., Zhu, Y., Luo, C., Wang, T.: Text recognition in the wild: a survey. ACM Comput. Surv. 54(2), 1\u201335 (2021)","journal-title":"ACM Comput. Surv."},{"key":"16_CR6","unstructured":"de Freitas, C.O.A., et al.: Bases de dados de cheques banc\u00e1rios brasileiros"},{"issue":"6","key":"16_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3274658","volume":"51","author":"M Diaz","year":"2019","unstructured":"Diaz, M., Ferrer, M.A., Impedovo, D., Malik, M.I., Pirlo, G., Plamondon, R.: A perspective analysis of handwritten signature technology. ACM Comput. Surv. 51(6), 1\u201339 (2019)","journal-title":"ACM Comput. Surv."},{"issue":"3","key":"16_CR8","doi-asserted-by":"publisher","first-page":"966","DOI":"10.1109\/TIFS.2012.2190281","volume":"7","author":"MA Ferrer","year":"2012","unstructured":"Ferrer, M.A., Vargas, J.F., Morales, A., Ordonez, A.: Robustness of offline signature verification based on gray level features. IEEE Trans. Inf. Forensics Secur. 7(3), 966\u2013977 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"16_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114249","volume":"168","author":"R Ghosh","year":"2021","unstructured":"Ghosh, R.: A recurrent neural network based deep learning model for offline signature verification and recognition system. Expert Syst. Appl. 168, 114249 (2021)","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"16_CR10","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.patcog.2014.07.016","volume":"48","author":"Y Guerbai","year":"2015","unstructured":"Guerbai, Y., Chibani, Y., Hadjadji, B.: The effective use of the one-class SVM classifier for handwritten signature verification based on writer-independent parameters. Pattern Recogn. 48(1), 103\u2013113 (2015)","journal-title":"Pattern Recogn."},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Hafemann, L.G., Sabourin, R., Oliveira, L.S.: Analyzing features learned for offline signature verification using deep CNNs. In: ICPR, pp. 2989\u20132994 (2016)","DOI":"10.1109\/ICPR.2016.7900092"},{"key":"16_CR12","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.patcog.2017.05.012","volume":"70","author":"LG Hafemann","year":"2017","unstructured":"Hafemann, L.G., Sabourin, R., Oliveira, L.S.: Learning features for offline handwritten signature verification using deep convolutional neural networks. Pattern Recogn. 70, 163\u2013176 (2017)","journal-title":"Pattern Recogn."},{"key":"16_CR13","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1109\/TIFS.2019.2949425","volume":"15","author":"LG Hafemann","year":"2019","unstructured":"Hafemann, L.G., Sabourin, R., Oliveira, L.S.: Meta-learning for fast classifier adaptation to new users of signature verification systems. IEEE Trans. Inf. Forensics Secur. 15, 1735\u20131745 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"12","key":"16_CR14","doi-asserted-by":"publisher","first-page":"2639","DOI":"10.1162\/0899766042321814","volume":"16","author":"DR Hardoon","year":"2004","unstructured":"Hardoon, D.R., Szedmak, S., Shawe-Taylor, J.: Canonical correlation analysis: an overview with application to learning methods. Neural Comput. 16(12), 2639\u20132664 (2004)","journal-title":"Neural Comput."},{"issue":"3\u20134","key":"16_CR15","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1093\/biomet\/28.3-4.321","volume":"28","author":"H Hotelling","year":"1936","unstructured":"Hotelling, H.: Relations between two sets of variates*. Biometrika 28(3\u20134), 321\u2013377 (1936)","journal-title":"Biometrika"},{"key":"16_CR16","doi-asserted-by":"publisher","first-page":"6759","DOI":"10.1007\/s11042-019-08447-7","volume":"79","author":"M Houtinezhad","year":"2019","unstructured":"Houtinezhad, M., Ghaffary, H.R.: Writer-independent signature verification based on feature extraction fusion. Multimedia Tools Appl. 79, 6759\u20136779 (2019). https:\/\/doi.org\/10.1007\/s11042-019-08447-7","journal-title":"Multimedia Tools Appl."},{"issue":"12","key":"16_CR17","doi-asserted-by":"publisher","first-page":"6999","DOI":"10.1007\/s00521-020-05473-7","volume":"33","author":"A Jain","year":"2020","unstructured":"Jain, A., Singh, S.K., Singh, K.P.: Signature verification using geometrical features and artificial neural network classifier. Neural Comput. Appl. 33(12), 6999\u20137010 (2020). https:\/\/doi.org\/10.1007\/s00521-020-05473-7","journal-title":"Neural Comput. Appl."},{"issue":"07","key":"16_CR18","doi-asserted-by":"publisher","first-page":"1339","DOI":"10.1142\/S0218001404003630","volume":"18","author":"MK Kalera","year":"2004","unstructured":"Kalera, M.K., Srihari, S., Xu, A.: Offline signature verification and identification using distance statistics. Int. J. Pattern Recognit Artif Intell. 18(07), 1339\u20131360 (2004)","journal-title":"Int. J. Pattern Recognit Artif Intell."},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Khan, S.H., Khan, Z., Shafait, F.: Can signature biometrics address both identification and verification problems? In: ICDAR, pp. 981\u2013985 (2004)","DOI":"10.1109\/ICDAR.2013.198"},{"issue":"7553","key":"16_CR20","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521(7553), 436\u2013444 (2015)","journal-title":"Nature"},{"issue":"1","key":"16_CR21","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/MNET.2018.1700202","volume":"32","author":"H Li","year":"2018","unstructured":"Li, H., Ota, K., Dong, M.: Learning IoT in edge: deep learning for the internet of things with edge computing. IEEE Netw. 32(1), 96\u2013101 (2018)","journal-title":"IEEE Netw."},{"key":"16_CR22","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.inffus.2020.08.020","volume":"65","author":"J Li","year":"2021","unstructured":"Li, J., Li, Z., Lu, G., Xu, Y., Zhang, B., Zhang, D.: Asymmetric Gaussian process multi-view learning for visual classification. Inf. Fusion 65, 108\u2013118 (2021)","journal-title":"Inf. Fusion"},{"key":"16_CR23","doi-asserted-by":"publisher","first-page":"107692","DOI":"10.1016\/j.patcog.2020.107692","volume":"111","author":"Q Lin","year":"2021","unstructured":"Lin, Q., Luo, C., Jin, L., Lai, S.: STAN: a sequential transformation attention-based network for scene text recognition. Pattern Recogn. 111, 107692 (2021)","journal-title":"Pattern Recogn."},{"issue":"1","key":"16_CR24","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1007\/BF01589116","volume":"45","author":"DC Liu","year":"1989","unstructured":"Liu, D.C., Nocedal, J.: On the limited memory BFGS method for large scale optimization. Math. Program. 45(1), 503\u2013528 (1989)","journal-title":"Math. Program."},{"issue":"12","key":"16_CR25","doi-asserted-by":"publisher","first-page":"9531","DOI":"10.1109\/JIOT.2020.3007130","volume":"8","author":"Z Lv","year":"2020","unstructured":"Lv, Z., Qiao, L., Li, J., Song, H.: Deep-learning-enabled security issues in the internet of things. IEEE Internet Things J. 8(12), 9531\u20139538 (2020)","journal-title":"IEEE Internet Things J."},{"key":"16_CR26","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.eswa.2019.03.040","volume":"133","author":"S Masoudnia","year":"2019","unstructured":"Masoudnia, S., Mersa, O., Araabi, B.N., Vahabie, A.H., Sadeghi, M.A., Ahmadabadi, M.N.: Multi-representational learning for offline signature verification using multi-loss snapshot ensemble of CNNs. Expert Syst. Appl. 133, 317\u2013330 (2019)","journal-title":"Expert Syst. Appl."},{"key":"16_CR27","doi-asserted-by":"crossref","unstructured":"Melzer, T., Reiter, M., Bischof, H.: Kernel canonical correlation analysis. In: ICANN, pp. 353\u2013360 (2001)","DOI":"10.1007\/3-540-44668-0_50"},{"key":"16_CR28","doi-asserted-by":"crossref","unstructured":"Nasser, A.T., Dogru, N.: Signature recognition by using sift and surf with SVM basic on RBF for voting online. In: ICET, pp. 1\u20135 (2017)","DOI":"10.1109\/ICEngTechnol.2017.8308208"},{"issue":"3","key":"16_CR29","doi-asserted-by":"publisher","first-page":"1501","DOI":"10.1109\/TIP.2017.2754939","volume":"27","author":"F Nie","year":"2017","unstructured":"Nie, F., Cai, G., Li, J., Li, X.: Auto-weighted multi-view learning for image clustering and semi-supervised classification. IEEE Trans. Image Process. 27(3), 1501\u20131511 (2017)","journal-title":"IEEE Trans. Image Process."},{"key":"16_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"616","DOI":"10.1007\/978-3-319-50832-0_60","volume-title":"Advances in Visual Computing","author":"H Rantzsch","year":"2016","unstructured":"Rantzsch, H., Yang, H., Meinel, C.: Signature embedding: writer independent offline signature verification with deep metric learning. In: Bebis, G., et al. (eds.) ISVC 2016. LNCS, vol. 10073, pp. 616\u2013625. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-50832-0_60"},{"key":"16_CR31","doi-asserted-by":"crossref","unstructured":"Serdouk, Y., Nemmour, H., Chibani, Y.: New gradient features for off-line handwritten signature verification. In: INISTA, pp. 1\u20134 (2015)","DOI":"10.1109\/INISTA.2015.7276751"},{"key":"16_CR32","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.imavis.2017.08.004","volume":"66","author":"Y Serdouk","year":"2017","unstructured":"Serdouk, Y., Nemmour, H., Chibani, Y.: Handwritten signature verification using the quad-tree histogram of templates and a support vector-based artificial immune classification. Image Vis. Comput. 66, 26\u201335 (2017)","journal-title":"Image Vis. Comput."},{"key":"16_CR33","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.patrec.2016.05.023","volume":"80","author":"A Soleimani","year":"2016","unstructured":"Soleimani, A., Araabi, B.N., Fouladi, K.: Deep multitask metric learning for offline signature verification. Pattern Recogn. Lett. 80, 84\u201390 (2016)","journal-title":"Pattern Recogn. Lett."},{"key":"16_CR34","doi-asserted-by":"crossref","unstructured":"Vargas, F., Ferrer, M., Travieso, C., Alonso, J.: Off-line handwritten signature GPDS-960 corpus. In: ICDAR, vol. 2, pp. 764\u2013768 (2007)","DOI":"10.1109\/ICDAR.2007.4377018"},{"key":"16_CR35","doi-asserted-by":"crossref","unstructured":"Wan, Q., Zou, Q.: Learning metric features for writer-independent signature verification using dual triplet loss. In: ICPR, pp. 3853\u20133859 (2021)","DOI":"10.1109\/ICPR48806.2021.9413091"},{"issue":"5","key":"16_CR36","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MC.2018.2381131","volume":"51","author":"S Yao","year":"2018","unstructured":"Yao, S., Zhao, Y., Zhang, A., Hu, S., Shao, H., Zhang, C., Su, L., Abdelzaher, T.: Deep learning for the internet of things. Computer 51(5), 32\u201341 (2018)","journal-title":"Computer"},{"key":"16_CR37","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.inffus.2016.02.003","volume":"32","author":"MB Y\u0131lmaz","year":"2016","unstructured":"Y\u0131lmaz, M.B., Yan\u0131ko\u011flu, B.: Score level fusion of classifiers in off-line signature verification. Inf. Fusion 32, 109\u2013119 (2016)","journal-title":"Inf. Fusion"},{"key":"16_CR38","doi-asserted-by":"crossref","unstructured":"Yilmaz, M.B., Yanikoglu, B., Tirkaz, C., Kholmatov, A.: Offline signature verification using classifier combination of hog and LBP features. In: IJCB, pp. 1\u20137 (2011)","DOI":"10.1109\/IJCB.2011.6117473"},{"key":"16_CR39","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.inffus.2017.02.007","volume":"38","author":"J Zhao","year":"2017","unstructured":"Zhao, J., Xie, X., Xu, X., Sun, S.: Multi-view learning overview: recent progress and new challenges. Inf. Fusion 38, 43\u201354 (2017)","journal-title":"Inf. Fusion"},{"issue":"13","key":"16_CR40","doi-asserted-by":"publisher","first-page":"5867","DOI":"10.3390\/app11135867","volume":"11","author":"Y Zhou","year":"2021","unstructured":"Zhou, Y., Zheng, J., Hu, H., Wang, Y.: Handwritten signature verification method based on improved combined features. Appl. Sci. 11(13), 5867 (2021)","journal-title":"Appl. Sci."},{"key":"16_CR41","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.patcog.2016.01.009","volume":"54","author":"EN Zois","year":"2016","unstructured":"Zois, E.N., Alewijnse, L., Economou, G.: Offline signature verification and quality characterization using poset-oriented grid features. Pattern Recogn. 54, 162\u2013177 (2016)","journal-title":"Pattern Recogn."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Collaborative Computing: Networking, Applications and Worksharing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-92638-0_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T14:29:32Z","timestamp":1726410572000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-92638-0_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030926373","9783030926380"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-92638-0_16","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"1 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CollaborateCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Collaborative Computing: Networking, Applications and Worksharing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"colcom2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/collaboratecom.eai-conferences.org\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"206","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"62","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}