{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,16]],"date-time":"2025-09-16T21:27:25Z","timestamp":1758058045404,"version":"3.44.0"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032046291","type":"print"},{"value":"9783032046307","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,9,16]],"date-time":"2025-09-16T00:00:00Z","timestamp":1757980800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,16]],"date-time":"2025-09-16T00:00:00Z","timestamp":1757980800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-04630-7_23","type":"book-chapter","created":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T23:48:10Z","timestamp":1757980090000},"page":"398-415","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["DevInSight: Weaving Path Development Into Online Signature Verification"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-5886-6638","authenticated-orcid":false,"given":"Yilin","family":"Shi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-9446-8118","authenticated-orcid":false,"given":"Lei","family":"Jiang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5485-4376","authenticated-orcid":false,"given":"Hao","family":"Ni","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5456-0957","authenticated-orcid":false,"given":"Lianwen","family":"Jin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,16]]},"reference":[{"issue":"1","key":"23_CR1","doi-asserted-by":"publisher","first-page":"2853","DOI":"10.1007\/s11042-023-15357-2","volume":"83","author":"SD Bhavani","year":"2024","unstructured":"Bhavani, S.D., Bharathi, R.K.: A multi-dimensional review on handwritten signature verification: strengths and gaps. Multimedia Tools Appl. 83(1), 2853\u20132894 (2024)","journal-title":"Multimedia Tools Appl."},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Cho, K., et al.: Learning phrase representations using RNN encoder-decoder for statistical machine translation (2014). https:\/\/arxiv.org\/abs\/1406.1078","DOI":"10.3115\/v1\/D14-1179"},{"key":"23_CR3","unstructured":"Galbally, J., Martinez-Diaz, M., Fierrez, J.: Ageing in biometrics: a case study in online signature, vol. 6, pp. 117\u2013132. Institution of Engineering and Technology (2013)"},{"issue":"8","key":"23_CR4","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S.: Long Short-term Memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Hu, J., Shen, L., Sun, G.: Squeeze-and-excitation networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2018)","DOI":"10.1109\/CVPR.2018.00745"},{"key":"23_CR6","doi-asserted-by":"publisher","first-page":"2198","DOI":"10.1109\/TIFS.2022.3180219","volume":"17","author":"J Jiang","year":"2022","unstructured":"Jiang, J., Lai, S., Jin, L., Zhu, Y.: DsDTW: local representation learning with deep soft-dtw for dynamic signature verification. IEEE Trans. Inf. Forensics Secur. 17, 2198\u20132212 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"23_CR7","unstructured":"Jiang, L., Yang, W., Zhang, X., Ni, H.: GCN-DevLSTM: path development for skeleton-based action recognition (2024). https:\/\/arxiv.org\/abs\/2403.15212"},{"issue":"2","key":"23_CR8","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1007\/s12652-021-03356-w","volume":"14","author":"H Kaur","year":"2023","unstructured":"Kaur, H., Kumar, M.: Signature identification and verification techniques: state-of-the-art work. J. Ambient. Intell. Humaniz. Comput. 14(2), 1027\u20131045 (2023)","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Lai, S., Jin, L.: Offline writer identification based on the path signature feature. In: 2019 International Conference on Document Analysis and Recognition (ICDAR), pp. 1137\u20131142. IEEE (2019)","DOI":"10.1109\/ICDAR.2019.00184"},{"issue":"6","key":"23_CR10","doi-asserted-by":"publisher","first-page":"1624","DOI":"10.1109\/TIFS.2018.2883152","volume":"14","author":"S Lai","year":"2019","unstructured":"Lai, S., Jin, L.: Recurrent adaptation networks for online signature verification. IEEE Trans. Inf. Forensics Secur. 14(6), 1624\u20131637 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Lai, S., Jin, L., Yang, W.: Online signature verification using recurrent neural network and length-normalized path signature descriptor. In: 2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR), vol.\u00a01, pp. 400\u2013405. IEEE (2017)","DOI":"10.1109\/ICDAR.2017.73"},{"issue":"10","key":"23_CR12","doi-asserted-by":"publisher","first-page":"6472","DOI":"10.1109\/TPAMI.2021.3087619","volume":"44","author":"S Lai","year":"2022","unstructured":"Lai, S., Jin, L., Zhu, Y., Li, Z., Lin, L.: SynSig2Vec: forgery-free learning of dynamic signature representations by sigma lognormal-based synthesis and 1D CNN. IEEE Trans. Pattern Anal. Mach. Intell. 44(10), 6472\u20136485 (2022)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"23_CR13","doi-asserted-by":"publisher","first-page":"3553","DOI":"10.1109\/TIFS.2020.2991880","volume":"15","author":"S Lai","year":"2020","unstructured":"Lai, S., Zhu, Y., Jin, L.: Encoding pathlet and SIFT features with bagged VLAD for historical writer identification. IEEE Trans. Inf. Forensics Secur. 15, 3553\u20133566 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Li, C., et\u00a0al.: A stroke-based RNN for writer-independent online signature verification. In: 2019 International Conference on Document Analysis and Recognition (ICDAR), pp. 526\u2013532. IEEE (2019)","DOI":"10.1109\/ICDAR.2019.00090"},{"issue":"08","key":"23_CR15","doi-asserted-by":"publisher","first-page":"2223","DOI":"10.11834\/jig.221112","volume":"28","author":"C Liu","year":"2023","unstructured":"Liu, C., Jin, L., Bai, X., Li, X., Yin, F.: Frontiers of intelligent document analysis and recognition: review and prospects. J. Image Graph. 28(08), 2223\u20132252 (2023)","journal-title":"J. Image Graph."},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Liu, M., Jin, L., Xie, Z.: PS-LSTM: capturing essential sequential online information with path signature and LSTM for writer identification. In: 2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR), vol.\u00a01, pp. 664\u2013669. IEEE (2017)","DOI":"10.1109\/ICDAR.2017.114"},{"key":"23_CR17","unstructured":"Lou, H., Li, S., Ni, H.: PCF-GAN: generating sequential data via the characteristic function of measures on the path space. In: Advances in Neural Information Processing Systems, vol.\u00a036, pp. 39755\u201339781. Curran Associates, Inc. (2023)"},{"key":"23_CR18","unstructured":"Lou, H., Li, S., Ni, H.: Path development network with finite-dimensional lie group. Trans. Mach. Learn. Res. (2024)"},{"key":"23_CR19","doi-asserted-by":"publisher","unstructured":"Lyons, T.J., Caruana, M., L\u00e9vy, T.: Differential equations driven by rough paths, pp. 81\u201393. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-71285-5","DOI":"10.1007\/978-3-540-71285-5"},{"issue":"7","key":"23_CR20","doi-asserted-by":"publisher","first-page":"2933","DOI":"10.1016\/j.jfa.2016.12.024","volume":"272","author":"TJ Lyons","year":"2017","unstructured":"Lyons, T.J., Xu, W.: Hyperbolic development and inversion of signature. J. Funct. Anal. 272(7), 2933\u20132955 (2017)","journal-title":"J. Funct. Anal."},{"key":"23_CR21","unstructured":"Nicolas, B.: Elements of Mathematics: Lie Groups and Lie Algebras, vol.\u00a04-6. Springer, Heidelberg (2002)"},{"key":"23_CR22","doi-asserted-by":"publisher","first-page":"81010","DOI":"10.1109\/ACCESS.2019.2923093","volume":"7","author":"M Okawa","year":"2019","unstructured":"Okawa, M.: Template matching using time-series averaging and DTW with dependent warping for online signature verification. IEEE Access 7, 81010\u201381019 (2019)","journal-title":"IEEE Access"},{"key":"23_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107227","volume":"102","author":"M Okawa","year":"2020","unstructured":"Okawa, M.: Online signature verification using single-template matching with time-series averaging and gradient boosting. Pattern Recogn. 102, 107227 (2020)","journal-title":"Pattern Recogn."},{"key":"23_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107699","volume":"112","author":"M Okawa","year":"2021","unstructured":"Okawa, M.: Time-series averaging and local stability-weighted dynamic time warping for online signature verification. Pattern Recogn. 112, 107699 (2021)","journal-title":"Pattern Recogn."},{"issue":"1","key":"23_CR25","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/TASSP.1978.1163055","volume":"26","author":"H Sakoe","year":"1978","unstructured":"Sakoe, H., Chiba, S.: Dynamic programming algorithm optimization for spoken word recognition. IEEE Trans. Acoust. Speech Signal Process. 26(1), 43\u201349 (1978)","journal-title":"IEEE Trans. Acoust. Speech Signal Process."},{"key":"23_CR26","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.patrec.2016.07.015","volume":"84","author":"A Sharma","year":"2016","unstructured":"Sharma, A., Sundaram, S.: An enhanced contextual dtw based system for online signature verification using vector quantization. Pattern Recogn. Lett. 84, 22\u201328 (2016)","journal-title":"Pattern Recogn. Lett."},{"key":"23_CR27","unstructured":"Tao, J., Ni, H., Liu, C.: High rank path development: an approach to learning the filtration of stochastic processes. In: Advances in Neural Information Processing Systems, vol.\u00a037, pp. 115309\u2013115350. Curran Associates, Inc. (2024)"},{"key":"23_CR28","doi-asserted-by":"publisher","first-page":"5128","DOI":"10.1109\/ACCESS.2018.2793966","volume":"6","author":"R Tolosana","year":"2018","unstructured":"Tolosana, R., Vera-Rodriguez, R., Fierrez, J., Ortega-Garcia, J.: Exploring recurrent neural networks for on-line handwritten signature biometrics. IEEE Access 6, 5128\u20135138 (2018)","journal-title":"IEEE Access"},{"issue":"2","key":"23_CR29","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1109\/TBIOM.2021.3054533","volume":"3","author":"R Tolosana","year":"2021","unstructured":"Tolosana, R., Vera-Rodriguez, R., Fierrez, J., Ortega-Garcia, J.: DeepSign: deep on-line signature verification. IEEE Trans. Biometr. Behav. Identity Sci. 3(2), 229\u2013239 (2021)","journal-title":"IEEE Trans. Biometr. Behav. Identity Sci."},{"key":"23_CR30","doi-asserted-by":"crossref","unstructured":"Vorugunti, C.S., Devanur\u00a0S, G., Mukherjee, P., Pulabaigari, V.: OSVNet: convolutional siamese network for writer independent online signature verification. In: 2019 International Conference on Document Analysis and Recognition (ICDAR), pp. 1470\u20131475. IEEE (2019)","DOI":"10.1109\/ICDAR.2019.00236"},{"key":"23_CR31","doi-asserted-by":"crossref","unstructured":"Wu, X., Kimura, A., Iwana, B.K., Uchida, S., Kashino, K.: Deep dynamic time warping: end-to-end local representation learning for online signature verification. In: 2019 International Conference on Document Analysis and Recognition (ICDAR), pp. 1103\u20131110. IEEE (2019)","DOI":"10.1109\/ICDAR.2019.00179"},{"key":"23_CR32","doi-asserted-by":"crossref","unstructured":"Wu, X., Kimura, A., Uchida, S., Kashino, K.: Prewarping siamese network: learning local representations for online signature verification. In: 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2467\u20132471. IEEE (2019)","DOI":"10.1109\/ICASSP.2019.8683036"},{"issue":"8","key":"23_CR33","doi-asserted-by":"publisher","first-page":"1903","DOI":"10.1109\/TPAMI.2017.2732978","volume":"40","author":"Z Xie","year":"2018","unstructured":"Xie, Z., Sun, Z., Jin, L., Ni, H., Lyons, T.: Learning spatial-semantic context with fully convolutional recurrent network for online handwritten Chinese text recognition. IEEE Trans. Pattern Anal. Mach. Intell. 40(8), 1903\u20131917 (2018)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"23_CR34","doi-asserted-by":"crossref","unstructured":"Yang, W., Jin, L., Liu, M.: Chinese character-level writer identification using path signature feature, DropStroke and deep CNN. In: 2015 13th International Conference on Document Analysis and Recognition (ICDAR), pp. 546\u2013550. IEEE (2015)","DOI":"10.1109\/ICDAR.2015.7333821"},{"issue":"2","key":"23_CR35","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/MIS.2016.22","volume":"31","author":"W Yang","year":"2016","unstructured":"Yang, W., Jin, L., Liu, M.: Deepwriterid: an end-to-end online text-independent writer identification system. IEEE Intell. Syst. 31(2), 45\u201353 (2016)","journal-title":"IEEE Intell. Syst."},{"key":"23_CR36","doi-asserted-by":"publisher","unstructured":"Yu, H., Shi, P.: A novel deep ensemble framework for online signature verification using temporal and spatial representation. In: International Conference on Information and Communications Security, pp. 534\u2013549. Springer, Heidelberg (2023). https:\/\/doi.org\/10.1007\/978-981-99-7356-9_32","DOI":"10.1007\/978-981-99-7356-9_32"},{"key":"23_CR37","unstructured":"Zhang, P., Jiang, J., Liu, Y., Jin, L.: MSDS: a large-scale Chinese signature and token digit string dataset for handwriting verification. In: Advances in Neural Information Processing Systems, vol.\u00a035, pp. 36507\u201336519 (2022)"}],"container-title":["Lecture Notes in Computer Science","Document Analysis and Recognition \u2013 ICDAR 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-04630-7_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T23:48:20Z","timestamp":1757980100000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-04630-7_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,16]]},"ISBN":["9783032046291","9783032046307"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-04630-7_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,16]]},"assertion":[{"value":"16 September 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICDAR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Document Analysis and Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wuhan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icdar2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iapr.org\/icdar2025","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}