{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,26]],"date-time":"2025-07-26T08:47:30Z","timestamp":1753519650275,"version":"3.40.3"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031705359"},{"type":"electronic","value":"9783031705366"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-70536-6_15","type":"book-chapter","created":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T10:03:02Z","timestamp":1725271382000},"page":"250-267","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Deep Metric Learning with\u00a0Cross-Writer Attention for\u00a0Offline Signature Verification"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-0000-0291","authenticated-orcid":false,"given":"Lu-Rong","family":"Ling","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9448-4031","authenticated-orcid":false,"given":"Heng","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6412-9140","authenticated-orcid":false,"given":"Fei","family":"Yin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6743-4175","authenticated-orcid":false,"given":"Cheng-Lin","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,3]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Aravinda, C.V., Meng, L., Reddy, K.R.U.K., Prabhu, A.: Signature recognition and verification using multiple classifiers combination of Hu\u2019s and HOG features. In: International Conference on Advanced Mechatronic Systems, pp. 63\u201368 (2019)","DOI":"10.1109\/ICAMechS.2019.8861686"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Thakare, B.S., Deshmukh, H.R.: A combined feature extraction model using SIFT and LBP for offline signature verification system. In: International Conference for Convergence for Technology, pp. 1\u20137 (2018)","DOI":"10.1109\/I2CT.2018.8529788"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Goon, L.W., Eng, S.K.: Offline signature verification system using SVM classifier with image pre-processing steps and SURF algorithm. J. Phys. Conf. Ser. 2107(1), 012069 (2021)","DOI":"10.1088\/1742-6596\/2107\/1\/012069"},{"key":"15_CR4","doi-asserted-by":"publisher","first-page":"105461","DOI":"10.1016\/j.engappai.2022.105461","volume":"116","author":"K Shaukat","year":"2022","unstructured":"Shaukat, K., Luo, S., Varadharajan, V.: A novel method for improving the robustness of deep learning-based malware detectors against adversarial attacks. Eng. Appl. Artif. Intell. 116, 105461 (2022)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"15_CR5","doi-asserted-by":"publisher","first-page":"102726","DOI":"10.1016\/j.bspc.2021.102726","volume":"68","author":"TM Alam","year":"2021","unstructured":"Alam, T.M., et al.: A novel framework for prognostic factors identification of malignant mesothelioma through association rule mining. Biomed. Signal Process. Control. 68, 102726 (2021)","journal-title":"Biomed. Signal Process. Control."},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Xiong, Y.-J., Cheng, S.-Y.: Attention based multiple Siamese network for offline signature verification. In: ICDAR 2021, pp. 337\u2013349 (2021)","DOI":"10.1007\/978-3-030-86334-0_22"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Malik, M.I., Liwicki, M., Dengel, A., Uchida, S., Frinken, V.: Automatic signature stability analysis and verification using local features. In: ICFHR 2014, pp. 621\u2013626 (2014)","DOI":"10.1109\/ICFHR.2014.109"},{"key":"15_CR8","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.patrec.2018.01.021","volume":"139","author":"M Sharif","year":"2020","unstructured":"Sharif, M., Khan, M.A., Faisal, M., Yasmin, M., Fernandes, S.L.: A framework for offline signature verification system: best features selection approach. Pattern Recognit. Lett. 139, 50\u201359 (2020)","journal-title":"Pattern Recognit. Lett."},{"key":"15_CR9","doi-asserted-by":"publisher","first-page":"109882","DOI":"10.1016\/j.patcog.2023.109882","volume":"145","author":"H Li","year":"2024","unstructured":"Li, H., Wei, P., Ma, Z., Li, C., Zheng, N.: TransOSV: offline signature verification with transformers. Pattern Recognit. 145, 109882 (2024)","journal-title":"Pattern Recognit."},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Stauffer, M., Maergner, P., Fischer, A., Ingold, R., Riesen, K.: Offline signature verification using structural dynamic time warping. In: ICDAR 2019, pp. 1117\u20131124 (2019)","DOI":"10.1109\/ICDAR.2019.00181"},{"issue":"1","key":"15_CR11","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/S0952-1976(00)00064-6","volume":"14","author":"H Baltzakis","year":"2001","unstructured":"Baltzakis, H., Papamarkos, N.: A new signature verification technique based on a two-stage neural network classifier. Eng. Appl. Artif. Intell. 14(1), 95\u2013103 (2001)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Yilmaz, M.B., Yanikoglu, B.A., Tirkaz, C., Kholmatov, A.: Offline signature verification using classifier combination of HOG and LBP features. In: IJCB 2011, pp. 1\u20137 (2011)","DOI":"10.1109\/IJCB.2011.6117473"},{"issue":"1","key":"15_CR13","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.patcog.2014.07.016","volume":"48","author":"Y Guerbai","year":"2015","unstructured":"Guerbai, Y., Chibani, Y., Hadjadji, B.: The effective use of the one-class SVM classifier for handwritten signature verification based on writer-independent parameters. Pattern Recognit. 48(1), 103\u2013113 (2015)","journal-title":"Pattern Recognit."},{"key":"15_CR14","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1016\/j.patcog.2018.02.027","volume":"79","author":"M Okawa","year":"2018","unstructured":"Okawa, M.: Synergy of foreground-background images for feature extraction: offline signature verification using Fisher vector with fused KAZE features. Pattern Recognit. 79, 480\u2013489 (2018)","journal-title":"Pattern Recognit."},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Hu, J., Chen, Y.: Offline signature verification using real adaboost classifier combination of pseudo-dynamic features. In: Proceedings of the International Conference on Document Analysis and Recognition, pp. 1345\u20131349 (2013)","DOI":"10.1109\/ICDAR.2013.272"},{"key":"15_CR16","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.patcog.2017.05.012","volume":"70","author":"LG Hafemann","year":"2017","unstructured":"Hafemann, L.G., Sabourin, R., Oliveira, L.S.: Learning features for offline handwritten signature verification using deep convolutional neural networks. Pattern Recognit. 70, 163\u2013176 (2017)","journal-title":"Pattern Recognit."},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Lu, X., Huang, L., Yin, F.: Cut and compare: end-to-end offline signature verification network. In: ICPR 2020, pp. 3589\u20133596 (2020)","DOI":"10.1109\/ICPR48806.2021.9412377"},{"key":"15_CR18","unstructured":"Bromley, J., Guyon, I., LeCun, Y., S\u00e4ckinger, E., Shah, R.: Signature verification using a Siamese time delay neural network. In: NIPS 1993, pp. 737\u2013744 (1993)"},{"key":"15_CR19","unstructured":"Dey, S., Dutta, A., Toledo, J.I., Ghosh, S.K., Llad\u00f3s, J., Pal, U.: SigNet: convolutional Siamese network for writer independent offline signature verification. CoRR arXiv:abs\/1707.02131 (2017)"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Ruiz, V., Linares, I., Sanchez, \u00c1., Velez, J.F.: Off-line handwritten signature verification using compositional synthetic generation of signatures and Siamese Neural Networks. Neurocomputing 374, 30\u201341 (2020)","DOI":"10.1016\/j.neucom.2019.09.041"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Wei, P., Li, H., Hu, P.: Inverse discriminative networks for handwritten signature verification. In: CVPR 2019, pp. 5764\u20135772 (2019)","DOI":"10.1109\/CVPR.2019.00591"},{"key":"15_CR22","doi-asserted-by":"publisher","first-page":"108009","DOI":"10.1016\/j.patcog.2021.108009","volume":"118","author":"L Liu","year":"2021","unstructured":"Liu, L., Huang, L., Yin, F., Chen, Y.: Offline signature verification using a region based deep metric learning network. Pattern Recognit. 118, 108009 (2021)","journal-title":"Pattern Recognit."},{"key":"15_CR23","unstructured":"Dosovitskiy, A., et al.: An image is worth 16$$\\times $$ 16 words: transformers for image recognition at scale. In: ICLR 2021 (2021)"},{"issue":"8","key":"15_CR24","doi-asserted-by":"publisher","first-page":"2153","DOI":"10.1109\/TIFS.2019.2894031","volume":"14","author":"LG Hafemann","year":"2019","unstructured":"Hafemann, L.G., Sabourin, R., Oliveira, L.S.: Characterizing and evaluating adversarial examples for offline handwritten signature verification. IEEE Trans. Inf. Forensics Secur. 14(8), 2153\u20132166 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"15_CR25","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1109\/TMM.2021.3056217","volume":"24","author":"H Li","year":"2022","unstructured":"Li, H., Wei, P., Ping, H.: AVN: an adversarial variation network model for handwritten signature verification. IEEE Trans. Multim. 24, 594\u2013608 (2022)","journal-title":"IEEE Trans. Multim."},{"key":"15_CR26","unstructured":"Vaswani, A., et al.: Attention is all you need. In: NIPS 2017, pp. 5998\u20136008 (2017)"},{"issue":"8","key":"15_CR27","doi-asserted-by":"publisher","first-page":"2011","DOI":"10.1109\/TPAMI.2019.2913372","volume":"42","author":"H Jie","year":"2020","unstructured":"Jie, H., Shen, L., Albanie, S., Sun, G., Enhua, W.: Squeeze-and-excitation networks. IEEE Trans. Pattern Anal. Mach. Intell. 42(8), 2011\u20132023 (2020)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"6","key":"15_CR28","doi-asserted-by":"publisher","first-page":"6881","DOI":"10.1109\/TPAMI.2020.3047209","volume":"45","author":"Y Cao","year":"2023","unstructured":"Cao, Y., Jiarui, X., Lin, S., Wei, F., Han, H.: Global context networks. IEEE Trans. Pattern Anal. Mach. Intell. 45(6), 6881\u20136895 (2023)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"15_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/978-3-030-58520-4_5","volume-title":"Computer Vision \u2013 ECCV 2020","author":"X Li","year":"2020","unstructured":"Li, X., Sun, W., Wu, T.: Attentive normalization. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12362, pp. 70\u201387. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58520-4_5"},{"key":"15_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-01234-2_1","volume-title":"Computer Vision \u2013 ECCV 2018","author":"S Woo","year":"2018","unstructured":"Woo, S., Park, J., Lee, J.-Y., Kweon, I.S.: CBAM: convolutional block attention module. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) ECCV 2018. LNCS, vol. 11211, pp. 3\u201319. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01234-2_1"},{"key":"15_CR31","unstructured":"Yang, L., Zhang, R.-Y., Li, L., Xie, X.: SimAM: a simple, parameter-free attention module for convolutional neural networks. In: ICML 2021, pp. 11863\u201311874 (2021)"},{"key":"15_CR32","doi-asserted-by":"crossref","unstructured":"Wang, W., et al.: Pyramid vision transformer: a versatile backbone for dense prediction without convolutions. In: ICCV 2021, pp. 548\u2013558 (2021)","DOI":"10.1109\/ICCV48922.2021.00061"},{"key":"15_CR33","doi-asserted-by":"crossref","unstructured":"Wu, H.: CvT: introducing convolutions to vision transformers. In: ICCV 2021, pp. 22\u201331 (2021)","DOI":"10.1109\/ICCV48922.2021.00009"},{"key":"15_CR34","unstructured":"Bahdanau, D., Cho, K., Bengio, Y.: Neural machine translation by jointly learning to align and translate. In: ICLR 2015 (2015)"},{"issue":"6","key":"15_CR35","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/3065386","volume":"60","author":"A Krizhevsky","year":"2017","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. Commun. ACM 60(6), 84\u201390 (2017)","journal-title":"Commun. ACM"},{"key":"15_CR36","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. In: ICLR 2015 (2015)"},{"key":"15_CR37","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: CVPR 2016, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"15_CR38","doi-asserted-by":"crossref","unstructured":"Huang, G., Liu, Z., Weinberger, K.Q.: Densely connected convolutional networks. In: CVPR 2017, pp. 2261\u20132269 (2017)","DOI":"10.1109\/CVPR.2017.243"},{"key":"15_CR39","doi-asserted-by":"crossref","unstructured":"Yuan, L., et al.: Tokens-to-token ViT: training vision transformers from scratch on ImageNet. In: ICCV 2021, pp. 538\u2013547 (2021)","DOI":"10.1109\/ICCV48922.2021.00060"},{"key":"15_CR40","unstructured":"Hendrycks, D., Gimpel, K.: Bridging nonlinearities and stochastic regularizers with Gaussian error linear units. CoRR arXiv:abs\/1606.08415 (2017)"},{"key":"15_CR41","doi-asserted-by":"crossref","unstructured":"Hadsell, R., Chopra, S., LeCun, Y.: Dimensionality reduction by learning an invariant mapping. In: CVPR (2) 2006, pp. 1735\u20131742 (2006)","DOI":"10.1109\/CVPR.2006.100"},{"key":"15_CR42","doi-asserted-by":"crossref","unstructured":"Lin, T.-Y., Goyal, P., Girshick, R.B., He, K., Doll\u00e1r, P.: Focal loss for dense object detection. In: ICCV 2017, pp. 2999\u20133007 (2017)","DOI":"10.1109\/ICCV.2017.324"},{"issue":"7","key":"15_CR43","doi-asserted-by":"publisher","first-page":"1339","DOI":"10.1142\/S0218001404003630","volume":"18","author":"MK Kalera","year":"2004","unstructured":"Kalera, M.K., Srihari, S.N., Aihua, X.: Offline signature verification and identification using distance statistics. Int. J. Pattern Recognit. Artif. Intell. 18(7), 1339\u20131360 (2004)","journal-title":"Int. J. Pattern Recognit. Artif. Intell."},{"key":"15_CR44","doi-asserted-by":"crossref","unstructured":"Pal, S., Alaei, A., Pal, U., Blumenstein, M.: Performance of an off-line signature verification method based on texture features on a large indic-script signature dataset. In: DAS 2016, pp. 72\u201377 (2016)","DOI":"10.1109\/DAS.2016.48"},{"key":"15_CR45","doi-asserted-by":"crossref","unstructured":"Huang, F.-H., Lu, H.-M.: Multiscale global and regional feature learning using co-tuplet loss for offline handwritten signature verification. CoRR arXiv:abs\/2308.00428 (2023)","DOI":"10.2139\/ssrn.4677183"},{"key":"15_CR46","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. In: ICLR (Poster) 2015 (2015)"}],"container-title":["Lecture Notes in Computer Science","Document Analysis and Recognition - ICDAR 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-70536-6_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T10:12:57Z","timestamp":1725271977000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-70536-6_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031705359","9783031705366"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-70536-6_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"3 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICDAR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Document Analysis and Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Athens","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icdar2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icdar2024.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}