{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T05:49:11Z","timestamp":1761976151014,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319029603"},{"type":"electronic","value":"9783319029610"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-319-02961-0_53","type":"book-chapter","created":{"date-parts":[[2013,11,5]],"date-time":"2013-11-05T03:56:02Z","timestamp":1383623762000},"page":"425-432","source":"Crossref","is-referenced-by-count":4,"title":["Application of HMM to Online Signature Verification Based on Segment Differences"],"prefix":"10.1007","author":[{"given":"Jie","family":"Zou","sequence":"first","affiliation":[]},{"given":"Zengfu","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"53_CR1","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/0031-3203(89)90059-9","volume":"22","author":"R. Plamondon","year":"1989","unstructured":"Plamondon, R., Lorette, G.: Automatic signature verification and writer identification - the state of the art. Pattern Recogn. Lett\u00a022(2), 107\u2013131 (1989)","journal-title":"Pattern Recogn. Lett"},{"issue":"5","key":"53_CR2","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1109\/TSMCC.2008.923866","volume":"38","author":"D. Impedovo","year":"2008","unstructured":"Impedovo, D., Pirlo, G.: Automatic Signature Verification: The State of the Art. IEEE Trans. on Sys. Man. Cybernet- Pt C.\u00a038(5), 609\u2013635 (2008)","journal-title":"IEEE Trans. on Sys. Man. Cybernet- Pt C."},{"key":"53_CR3","doi-asserted-by":"crossref","unstructured":"Sakoe, H.: Dynamic Programming Optimisation for Spoken Word Recognition. IEEE Trans. on Acoustics, Speech and Signal Processing, 43\u201349 (1978)","DOI":"10.1109\/TASSP.1978.1163055"},{"key":"53_CR4","doi-asserted-by":"crossref","unstructured":"Chang, W.D., Shin, J.: Modified Dynamic Time Warping for Stroke-based On-line Signature Verification. In: Proceedings of the Ninth International Conference on Document Analysis and Recognition, vol.\u00a002, pp. 724\u2013728 (2007)","DOI":"10.1109\/ICDAR.2007.4377010"},{"issue":"2005","key":"53_CR5","doi-asserted-by":"publisher","first-page":"2400","DOI":"10.1016\/j.patrec.2005.04.017","volume":"26","author":"A. Kholmatov","year":"2005","unstructured":"Kholmatov, A., Yanikoglu, B.: Identity authentication using improved online signature verification method. Pattern Recog. Lett.\u00a026(2005), 2400\u20132408 (2005)","journal-title":"Pattern Recog. Lett."},{"key":"53_CR6","doi-asserted-by":"crossref","unstructured":"Fierrez, J., Ortega-Garcia, J., Ramos, D.: HMM-based on-line signature verification: Feature extraction and signature modeling. Pattern Recog. Lett. 2325-2334 (2007)","DOI":"10.1016\/j.patrec.2007.07.012"},{"key":"53_CR7","doi-asserted-by":"crossref","unstructured":"Igarza, J.J., Goirizelaia, I., Espinosam, K.: Online handwritten signature verification using Hidden Markov Models. Progress in PRSIA, 391\u2013399 (2003)","DOI":"10.1007\/978-3-540-24586-5_48"},{"issue":"5","key":"53_CR8","doi-asserted-by":"publisher","first-page":"1237","DOI":"10.1109\/TSMCB.2007.895323","volume":"38","author":"B.L. Van","year":"2007","unstructured":"Van, B.L., Garcia-Salicetti, S., Dorizzi, B.: On Using the Veterbi Path Along with HMM Likelihood Information for Onling Signature Verification. IEEE Trans. on Sys. Man. and Cybernetics-PART B\u00a038(5), 1237\u20131247 (2007)","journal-title":"IEEE Trans. on Sys. Man. and Cybernetics-PART B"},{"issue":"2","key":"53_CR9","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/0031-3203(94)00092-Z","volume":"28","author":"L. Yang","year":"1995","unstructured":"Yang, L., Widjaja, B.K., Prasad, R.: Application of Hidden Markov Models for Signature Verification. Pattern Recog.\u00a028(2), 161\u2013170 (1995)","journal-title":"Pattern Recog."},{"key":"53_CR10","doi-asserted-by":"crossref","unstructured":"Dolfing, J.G.A., Aarts, E.H.L.: Online Signature Verification with Hidden Markov Models. In: Proc. Internat. Conf. on Pattern Recog., pp. 1309\u20131312 (1998)","DOI":"10.1109\/ICPR.1998.711942"},{"key":"53_CR11","unstructured":"Shafiei, A.: New On-line Signature Verification Algorithm Using Variable Length Segmentation and HMM. In: Proc. of Conf. on Docu. Anal. and Recog. (2003)"},{"issue":"10","key":"53_CR12","first-page":"1039","volume":"18","author":"J. Hu","year":"2002","unstructured":"Hu, J., Brown, M.K.: HMM Based Online Handwriting Recognition. IEEE Tran. on Pattern Analysis and Machine Intelligence\u00a018(10), 1039\u20131045 (2002)","journal-title":"IEEE Tran. on Pattern Analysis and Machine Intelligence"},{"issue":"16","key":"53_CR13","doi-asserted-by":"publisher","first-page":"2943","DOI":"10.1016\/S0167-8655(03)00155-7","volume":"24","author":"H. Feng","year":"2003","unstructured":"Feng, H., Wah, C.C.: Online Signature Verification Using a New Extreme Points Warping Technique. Pattern Recog. Lett.\u00a024(16), 2943\u20132951 (2003)","journal-title":"Pattern Recog. Lett."},{"issue":"7","key":"53_CR14","first-page":"45","volume":"12","author":"B. Li","year":"2006","unstructured":"Li, B.: Improved Critical Point Correspondence for On-line Signature Verification. International Journal of Information Technology\u00a012(7), 45\u201356 (2006)","journal-title":"International Journal of Information Technology"},{"issue":"2","key":"53_CR15","first-page":"284","volume":"24","author":"J. Zou","year":"2011","unstructured":"Zou, J., Wu, Z.C.: Online Signature Verification System Based on Support Vector Data Description. Pattern Recog. and Artificial Intelligence\u00a024(2), 284\u2013290 (2011)","journal-title":"Pattern Recog. and Artificial Intelligence"},{"issue":"2","key":"53_CR16","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/5.18626","volume":"77","author":"L.R. Rabiner","year":"1989","unstructured":"Rabiner, L.R.: A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition. Proceedings of the IEEE\u00a077(2), 257\u2013286 (1989)","journal-title":"Proceedings of the IEEE"},{"key":"53_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-25948-0_3","volume-title":"Biometric Authentication","author":"D.-Y. Yeung","year":"2004","unstructured":"Yeung, D.-Y., Chang, H., Xiong, Y., George, S.E., Kashi, R.S., Matsumoto, T., Rigoll, G.: SVC 2004: First International Signature Verification Competition. In: Zhang, D., Jain, A.K. (eds.) ICBA 2004. LNCS, vol.\u00a03072, pp. 16\u201322. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Biometric Recognition"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-02961-0_53","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T19:32:11Z","timestamp":1746041531000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-02961-0_53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783319029603","9783319029610"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-02961-0_53","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}