{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,16]],"date-time":"2025-09-16T20:54:55Z","timestamp":1758056095430,"version":"3.44.0"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032046161","type":"print"},{"value":"9783032046178","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T00:00:00Z","timestamp":1757894400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T00:00:00Z","timestamp":1757894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-04617-8_7","type":"book-chapter","created":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T11:46:14Z","timestamp":1757936774000},"page":"116-128","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Multi-scale Convolution Combined with\u00a0DTW for\u00a0Online Signature Verification"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-8589-9571","authenticated-orcid":false,"given":"Dengshan","family":"Yang","sequence":"first","affiliation":[]},{"given":"Mahpirat","family":"Muhammat","sequence":"additional","affiliation":[]},{"given":"Xuebin","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Alimjan","family":"Aysa","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7566-6494","authenticated-orcid":false,"given":"Kurban","family":"Ubul","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,15]]},"reference":[{"issue":"6","key":"7_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3274658","volume":"51","author":"M Diaz","year":"2019","unstructured":"Diaz, M., Ferrer, M.A., Impedovo, D., Malik, M.I., Pirlo, G., Plamondon, R.: A perspective analysis of handwritten signature technology. ACM Comput. Surv. (CSUR) 51(6), 1\u201339 (2019)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"7_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107227","volume":"102","author":"M Okawa","year":"2020","unstructured":"Okawa, M.: Online signature verification using single-template matching with time-series averaging and gradient boosting. Pattern Recogn. 102, 107227 (2020)","journal-title":"Pattern Recogn."},{"key":"7_CR3","doi-asserted-by":"publisher","first-page":"81010","DOI":"10.1109\/ACCESS.2019.2923093","volume":"7","author":"M Okawa","year":"2019","unstructured":"Okawa, M.: Template matching using time-series averaging and DTW with dependent warping for online signature verification. IEEE Access 7, 81010\u201381019 (2019)","journal-title":"IEEE Access"},{"key":"7_CR4","doi-asserted-by":"publisher","first-page":"2198","DOI":"10.1109\/TIFS.2022.3180219","volume":"17","author":"J Jiang","year":"2022","unstructured":"Jiang, J., Lai, S., Jin, L., Zhu, Y.: DSDTW: local representation learning with deep soft-DTW for dynamic signature verification. IEEE Trans. Inf. Forensics Secur. 17, 2198\u20132212 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"10","key":"7_CR5","doi-asserted-by":"publisher","first-page":"6472","DOI":"10.1109\/TPAMI.2021.3087619","volume":"44","author":"S Lai","year":"2021","unstructured":"Lai, S., Jin, L., Zhu, Y., Li, Z., Lin, L.: Synsig2vec: forgery-free learning of dynamic signature representations by sigma lognormal-based synthesis and 1D CNN. IEEE Trans. Pattern Anal. Mach. Intell. 44(10), 6472\u20136485 (2021)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"7_CR6","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1016\/j.eswa.2017.03.024","volume":"80","author":"DS Guru","year":"2017","unstructured":"Guru, D.S., Manjunatha, K.S., Manjunath, S., Somashekara, M.T.: Interval valued symbolic representation of writer dependent features for online signature verification. Expert Syst. Appl. 80, 232\u2013243 (2017)","journal-title":"Expert Syst. Appl."},{"issue":"10","key":"7_CR7","doi-asserted-by":"publisher","first-page":"2360","DOI":"10.1109\/TIFS.2017.2707332","volume":"12","author":"A Alaei","year":"2017","unstructured":"Alaei, A., Pal, S., Pal, U., Blumenstein, M.: An efficient signature verification method based on an interval symbolic representation and a fuzzy similarity measure. IEEE Trans. Inf. Forensics Secur. 12(10), 2360\u20132372 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"13","key":"7_CR8","doi-asserted-by":"publisher","first-page":"10901","DOI":"10.1007\/s00521-022-07018-6","volume":"34","author":"CS Vorugunti","year":"2022","unstructured":"Vorugunti, C.S., Pulabaigari, V., Mukherjee, P., Gautam, A.: Composv: compound feature extraction and depthwise separable convolution-based online signature verification. Neural Comput. Appl. 34(13), 10901\u201310928 (2022)","journal-title":"Neural Comput. Appl."},{"issue":"1","key":"7_CR9","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/TASSP.1978.1163055","volume":"26","author":"H Sakoe","year":"1978","unstructured":"Sakoe, H., Chiba, S.: Dynamic programming algorithm optimization for spoken word recognition. IEEE Trans. Acoust. Speech Signal Process. 26(1), 43\u201349 (1978)","journal-title":"IEEE Trans. Acoust. Speech Signal Process."},{"issue":"4","key":"7_CR10","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1109\/TIFS.2017.2769023","volume":"13","author":"L Tang","year":"2017","unstructured":"Tang, L., Kang, W., Fang, Y.: Information divergence-based matching strategy for online signature verification. IEEE Trans. Inf. Forensics Secur. 13(4), 861\u2013873 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107699","volume":"112","author":"M Okawa","year":"2021","unstructured":"Okawa, M.: Time-series averaging and local stability-weighted dynamic time warping for online signature verification. Pattern Recogn. 112, 107699 (2021)","journal-title":"Pattern Recogn."},{"issue":"3","key":"7_CR12","doi-asserted-by":"publisher","first-page":"705","DOI":"10.1109\/TIFS.2016.2632063","volume":"12","author":"A Sharma","year":"2016","unstructured":"Sharma, A., Sundaram, S.: A novel online signature verification system based on GMM features in a DTW framework. IEEE Trans. Inf. Forensics Secur. 12(3), 705\u2013718 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"7_CR13","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1109\/TCYB.2017.2647826","volume":"48","author":"A Sharma","year":"2017","unstructured":"Sharma, A., Sundaram, S.: On the exploration of information from the DTW cost matrix for online signature verification. IEEE Trans. Cybern. 48(2), 611\u2013624 (2017)","journal-title":"IEEE Trans. Cybern."},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Tolosana, R., Vera-Rodriguez, R., Fierrez, J., Morales, A., Ortega-Garcia, J.: Do you need more data? The DeepSignDB on-line handwritten signature biometric database. In: 2019 International Conference on Document Analysis and Recognition (ICDAR), pp. 1143\u20131148. IEEE (2019)","DOI":"10.1109\/ICDAR.2019.00185"},{"issue":"7553","key":"7_CR15","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521(7553), 436\u2013444 (2015)","journal-title":"Nature"},{"issue":"12","key":"7_CR16","doi-asserted-by":"publisher","first-page":"9321","DOI":"10.1007\/s00521-018-3844-z","volume":"31","author":"K Ahrabian","year":"2019","unstructured":"Ahrabian, K., BabaAli, B.: Usage of autoencoders and Siamese networks for online handwritten signature verification. Neural Comput. Appl. 31(12), 9321\u20139334 (2019)","journal-title":"Neural Comput. Appl."},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Li, C., et al.: A stroke-based RNN for writer-independent online signature verification. In: 2019 International Conference on Document Analysis and Recognition (ICDAR), pp. 526\u2013532. IEEE (2019)","DOI":"10.1109\/ICDAR.2019.00090"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Vorugunti, C.S., Pulabaigari, V., Mukherjee, P., Gorthi, R.K.S.S.: Inf-Att-OSVNet: information theory based feature selection and deep attention networks for online signature verification. Multimed. Tools Appl. 1\u201343 (2024)","DOI":"10.1007\/s11042-024-19886-2"},{"issue":"2","key":"7_CR19","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1109\/TBIOM.2021.3054533","volume":"3","author":"R Tolosana","year":"2021","unstructured":"Tolosana, R., Vera-Rodriguez, R., Fierrez, J., Ortega-Garcia, J.: Deepsign: deep on-line signature verification. IEEE Trans. Biometrics Behav. Identity Sci. 3(2), 229\u2013239 (2021)","journal-title":"IEEE Trans. Biometrics Behav. Identity Sci."},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Wu, X., Kimura, A., Uchida, S., Kashino, K.: Prewarping Siamese network: learning local representations for online signature verification. In: 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), ICASSP 2019, pp. 2467\u20132471. IEEE (2019)","DOI":"10.1109\/ICASSP.2019.8683036"},{"key":"7_CR21","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1007\/978-981-99-7356-9_32","volume-title":"ICICS 2023","author":"H Yu","year":"2023","unstructured":"Yu, H., Shi, P.: A novel deep ensemble framework for online signature verification using temporal and spatial representation. In: Wang, D., Yung, M., Liu, Z., Chen, X. (eds.) ICICS 2023. LNCS, vol. 14252, pp. 534\u2013549. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-99-7356-9_32"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Wu, X., Kimura, A., Iwana, B.K., Uchida, S., Kashino, K.: Deep dynamic time warping: end-to-end local representation learning for online signature verification. In: 2019 International Conference on Document Analysis and Recognition (ICDAR), pp. 1103\u20131110. IEEE (2019)","DOI":"10.1109\/ICDAR.2019.00179"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Szegedy, C., et al.: Going deeper with convolutions. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1\u20139. IEEE (2015)","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Hu, J., Shen, L., Sun, G.: Squeeze-and-excitation networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 7132\u20137141 (2018)","DOI":"10.1109\/CVPR.2018.00745"},{"key":"7_CR25","unstructured":"Cuturi, M., Blondel, M.: Soft-DTW: a differentiable loss function for time-series. In: Proceedings of the 34th International Conference on Machine Learning, pp. 894\u2013903. PMLR (2017). Accessed 01 July 2024"},{"key":"7_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-319-24261-3_7","volume-title":"Similarity-Based Pattern Recognition","author":"E Hoffer","year":"2015","unstructured":"Hoffer, E., Ailon, N.: Deep metric learning using triplet network. In: Feragen, A., Pelillo, M., Loog, M. (eds.) SIMBAD 2015. LNCS, vol. 9370, pp. 84\u201392. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24261-3_7"},{"issue":"6","key":"7_CR27","doi-asserted-by":"publisher","first-page":"1624","DOI":"10.1109\/TIFS.2018.2883152","volume":"14","author":"S Lai","year":"2018","unstructured":"Lai, S., Jin, L.: Recurrent adaptation networks for online signature verification. IEEE Trans. Inf. Forensics Secur. 14(6), 1624\u20131637 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"7_CR28","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1049\/ip-vis:20031078","volume":"150","author":"J Ortega-Garcia","year":"2003","unstructured":"Ortega-Garcia, J., et al.: MCYT baseline corpus: a bimodal biometric database. IEE Proc.-Vis. Image Signal Process. 150(6), 395\u2013401 (2003)","journal-title":"IEE Proc.-Vis. Image Signal Process."},{"issue":"2","key":"7_CR29","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/s10044-009-0151-4","volume":"13","author":"F Alonso","year":"2010","unstructured":"Alonso, F., et al.: Biosecurid: a multimodal biometric database. Pattern Anal. Appl. 13(2), 235\u2013246 (2010)","journal-title":"Pattern Anal. Appl."},{"issue":"6","key":"7_CR30","doi-asserted-by":"publisher","first-page":"1097","DOI":"10.1109\/TPAMI.2009.76","volume":"32","author":"J Ortega-Garcia","year":"2009","unstructured":"Ortega-Garcia, J., et al.: The multiscenario multienvironment biosecure multimodal database (BMDB). IEEE Trans. Pattern Anal. Mach. Intell. 32(6), 1097\u20131111 (2009)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"5","key":"7_CR31","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0176792","volume":"12","author":"R Tolosana","year":"2017","unstructured":"Tolosana, R., Vera-Rodriguez, R., Fierrez, J., Morales, A., Ortega-Garcia, J.: Benchmarking desktop and mobile handwriting across cots devices: the e-biosign biometric database. PLoS ONE 12(5), e0176792 (2017)","journal-title":"PLoS ONE"},{"key":"7_CR32","doi-asserted-by":"crossref","unstructured":"Luan, F., Cao, W., Yuan, S.: Relative position matrix and multi-scale feature fusion for writer-independent online signature verification. Heliyon 10(18) (2024)","DOI":"10.1016\/j.heliyon.2024.e37655"},{"issue":"12","key":"7_CR33","doi-asserted-by":"publisher","first-page":"14571","DOI":"10.1007\/s10489-022-03318-5","volume":"52","author":"Q Shen","year":"2022","unstructured":"Shen, Q., Luan, F., Yuan, S.: Multi-scale residual based Siamese neural network for writer-independent online signature verification. Appl. Intell. 52(12), 14571\u201314589 (2022)","journal-title":"Appl. Intell."}],"container-title":["Lecture Notes in Computer Science","Document Analysis and Recognition \u2013 ICDAR 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-04617-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T11:46:17Z","timestamp":1757936777000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-04617-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,15]]},"ISBN":["9783032046161","9783032046178"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-04617-8_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,15]]},"assertion":[{"value":"15 September 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICDAR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Document Analysis and Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wuhan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icdar2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iapr.org\/icdar2025","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}