{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,24]],"date-time":"2025-02-24T05:22:16Z","timestamp":1740374536942,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540208273"},{"type":"electronic","value":"9783540245919"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24591-9_30","type":"book-chapter","created":{"date-parts":[[2010,7,29]],"date-time":"2010-07-29T07:36:56Z","timestamp":1280389016000},"page":"395-409","source":"Crossref","is-referenced-by-count":2,"title":["Visualization of Dynamic Characteristics in Two-Dimensional Time Series Patterns: An Application to Online Signature Verification"],"prefix":"10.1007","author":[{"given":"Suyoung","family":"Chi","sequence":"first","affiliation":[]},{"given":"Jaeyeon","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Jung","family":"Soh","sequence":"additional","affiliation":[]},{"given":"Dohyung","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Weongeun","family":"Oh","sequence":"additional","affiliation":[]},{"given":"Changhun","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"30_CR1","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/s100320050010","volume":"1","author":"R. Kashi","year":"1998","unstructured":"Kashi, R., Hu, J., Nelson, W.L., Turin, W.: A Hidden Markov Model Approach to online handwritten signature verification. International Journal on Document Analysis & Recognition\u00a01(2), 102\u2013109 (1998)","journal-title":"International Journal on Document Analysis & Recognition"},{"key":"30_CR2","doi-asserted-by":"crossref","unstructured":"Wijesoma, W.S., Mingming, M., Sung, E.: Selecting Optimal Personalized Features for Online Signature Verification Using GA. In: Proc. SMC 2000, vol.\u00a04, pp. 2740\u20132745 (2000)","DOI":"10.1109\/ICSMC.2000.884411"},{"issue":"1","key":"30_CR3","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/s102090100009","volume":"1","author":"M.C. Fairhust","year":"2001","unstructured":"Fairhust, M.C., Ng, S.: Management of access through biometric control: A case study based on automatic signature verification. Universal Access in the Information Society\u00a01(1), 31\u201339 (2001)","journal-title":"Universal Access in the Information Society"},{"key":"30_CR4","first-page":"78","volume-title":"Digital Image Processing","author":"R.C. Gonzalez","year":"1977","unstructured":"Gonzalez, R.C., Wintz, P.: Digital Image Processing, pp. 78\u201387. Addison-Wesley Publishing Company, Inc., Reading (1977)"},{"key":"30_CR5","doi-asserted-by":"crossref","unstructured":"Wessels, T., Omlin, C.W.: A Hybrid System for Signature Verification. In: Proc. IJCNN 2000, vol.\u00a05, pp. 509\u2013514 (2000)","DOI":"10.1109\/IJCNN.2000.861520"},{"key":"30_CR6","unstructured":"Burden, R.L., Faires, J.D.: Numerical Analysis, 5th edn., pp. 57\u2013168. International Thomson Publishing (1993)"},{"issue":"6","key":"30_CR7","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1049\/ecej:19970606","volume":"9","author":"M.C. Fairhust","year":"1997","unstructured":"Fairhust, M.C.: Signature Verification Revisited: promoting practical exploitation of biometric technology. Electronics & Communication Engineering Journal\u00a09(6), 273\u2013280 (1997)","journal-title":"Electronics & Communication Engineering Journal"},{"issue":"2","key":"30_CR8","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/0031-3203(89)90059-9","volume":"22","author":"R. Plamondon","year":"1989","unstructured":"Plamondon, R., Lorette, G.: Automatic Signature Verification and Writer Identification \u2013 The State of the Art. Pattern Recognition\u00a022(2), 107\u2013131 (1989)","journal-title":"Pattern Recognition"},{"issue":"3","key":"30_CR9","doi-asserted-by":"crossref","first-page":"634","DOI":"10.1142\/S0218001494000346","volume":"8","author":"F. Leclerc","year":"1994","unstructured":"Leclerc, F., Plamondon, R.: Automatic Signature Verification: The State of the Art \u2013 1989-1993. International Journal of Pattern Recognition & Artificial Intelligence\u00a08(3), 634\u2013660 (1994)","journal-title":"International Journal of Pattern Recognition & Artificial Intelligence"},{"issue":"1","key":"30_CR10","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/34.824821","volume":"22","author":"R. Plamondon","year":"2000","unstructured":"Plamondon, R., Srihari, S.: On-Line and Off-Line Handwriting Recognition: A Comprehensive Survey. IEEE Trans. Pattern Analysis & Matchine Intelligence\u00a022(1), 63\u201384 (2000)","journal-title":"IEEE Trans. Pattern Analysis & Matchine Intelligence"},{"issue":"1","key":"30_CR11","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/S0031-3203(96)00063-5","volume":"30","author":"K. Huang","year":"1997","unstructured":"Huang, K., Yan, H.: Off-Line Signature Verification based on Geometric Feature Extraction and Neural Network Classification. Pattern Recognition\u00a030(1), 9\u201317 (1997)","journal-title":"Pattern Recognition"},{"issue":"2","key":"30_CR12","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/s100320050011","volume":"1","author":"R. Martens","year":"1998","unstructured":"Martens, R., Classen, L.: Incorporating local consistency information into the online signature verification process. International Journal on Document Analysis & Recognition\u00a01(2), 110\u2013115 (1998)","journal-title":"International Journal on Document Analysis & Recognition"},{"key":"30_CR13","doi-asserted-by":"crossref","unstructured":"Ribeiro, J., Vasconcelos, G.: Off-Line Signature Verification Using an Auto-associator Cascade-Correlation Architecture. In: Proc. International Joint Conference on Neural Networks, vol.\u00a04, pp. 2882\u20132886 (1999)","DOI":"10.1109\/IJCNN.1999.833542"},{"key":"30_CR14","doi-asserted-by":"crossref","unstructured":"El-Yacoubi, A., Justino, E.J.R., Sabourin, R., Bortolizzi, F.: Off-Line Signature Verification Using HMMs and Cross-Validation. In: Proc. Signal Processing Society Workshop 2000, vol.\u00a02, pp. 859\u2013868 (2000)","DOI":"10.1109\/NNSP.2000.890166"},{"key":"30_CR15","doi-asserted-by":"crossref","unstructured":"Justino, E.J.R., Bortolozzi, F., Babourin, R.: Off-line Signature Verification Using HMM for Random, Simple and Skilled Forgeries. In: Proc. 6th International Conf. on Document Analysis and Recognition, pp. 1031\u20131034 (2001)","DOI":"10.1109\/ICDAR.2001.953942"},{"issue":"9","key":"30_CR16","doi-asserted-by":"publisher","first-page":"976","DOI":"10.1109\/34.615447","volume":"19","author":"R. Sabourin","year":"1997","unstructured":"Sabourin, R., Genest, G., Preteux, F.J.: Off-Line Signature Verification by Local Granulometric Size Distributions. IEEE Trans. Pattern Analysis & Machine Intelligence\u00a019(9), 976\u2013988 (1997)","journal-title":"IEEE Trans. Pattern Analysis & Machine Intelligence"},{"key":"30_CR17","first-page":"255","volume-title":"Learning and Soft Computing","author":"V. Kecman","year":"2001","unstructured":"Kecman, V.: Learning and Soft Computing, pp. 255\u2013312. The MIT Press, Cambridge (2001)"},{"issue":"1","key":"30_CR18","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/s100440050007","volume":"3","author":"K. Zhang","year":"2000","unstructured":"Zhang, K., Pratikakis, I., Cornelis, J., Nyssen, E.: Using Landmarks to Establish a Pointto-Point Correspondence between Signatures. Pattern Analysis & Applications\u00a03(1), 69\u201374 (2000)","journal-title":"Pattern Analysis & Applications"},{"key":"30_CR19","doi-asserted-by":"crossref","unstructured":"Kiran, G.V., Kunte, R.S., Samuel, S.: On-Line Signature Verification System Using Probablistic Feature Modeling. In: Proc. 6th International Symposium on Signal Processing and its Applications, vol.\u00a01, pp. 355\u2013358 (2001)","DOI":"10.1109\/ISSPA.2001.949851"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24591-9_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,23]],"date-time":"2025-02-23T15:19:10Z","timestamp":1740323950000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24591-9_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540208273","9783540245919"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24591-9_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}