{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:06:30Z","timestamp":1725541590734},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642108464"},{"type":"electronic","value":"9783642108471"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10847-1_25","type":"book-chapter","created":{"date-parts":[[2009,11,28]],"date-time":"2009-11-28T03:33:01Z","timestamp":1259379181000},"page":"201-208","source":"Crossref","is-referenced-by-count":7,"title":["Fusion of Multiple Matchers Using SVM for Offline Signature Identification"],"prefix":"10.1007","author":[{"given":"Dakshina Ranjan","family":"Kisku","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Phalguni","family":"Gupta","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jamuna Kanta","family":"Sing","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"1","key":"25_CR1","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TCSVT.2003.818349","volume":"14","author":"A.K. Jain","year":"2004","unstructured":"Jain, A.K., Ross, A., Prabhakar, S.: An Introduction to Biometric Recognition. IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image- and Video-Based Biometrics\u00a014(1), 4\u201320 (2004)","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image- and Video-Based Biometrics"},{"key":"25_CR2","unstructured":"Justino, E.J.R., Bortolozzi, F., Sabourin, R.: Off-line Signature Verification Using HMM for Random, Simple and Skilled Forgeries. In: ICDAR 2001, International Conference on Document Analysis and Recognition, vol.\u00a01, pp. 105\u2013110 (2001)"},{"issue":"10","key":"25_CR3","doi-asserted-by":"publisher","first-page":"1727","DOI":"10.1016\/S0031-3203(99)00047-3","volume":"33","author":"M.A. Ismail","year":"2000","unstructured":"Ismail, M.A., Gad, S.: Offline Arabic Signature Recognition and Verification. Pattern Recognition\u00a033(10), 1727\u20131740 (2000)","journal-title":"Pattern Recognition"},{"key":"25_CR4","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-84882-254-2","volume-title":"Handbook of Fingerprint Recognition","author":"D. Maltoni","year":"2009","unstructured":"Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition, 2nd edn. Springer, Heidelberg (2009)","edition":"2"},{"issue":"1","key":"25_CR5","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/TCSVT.2003.818350","volume":"14","author":"J. Daugman","year":"2004","unstructured":"Daugman, J.: How Iris Recognition Works. IEEE Transactions on Circuits and Systems for Video Technology\u00a014(1), 21\u201330 (2004)","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"4","key":"25_CR6","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1016\/S0167-8655(01)00179-9","volume":"23","author":"N. Duta","year":"2002","unstructured":"Duta, N., Jain, A.K., Mardia, K.V.: Matching of Palmprint. Pattern Recognition Letters\u00a023(4), 477\u2013485 (2002)","journal-title":"Pattern Recognition Letters"},{"volume-title":"Handbook of Face Recognition","year":"2005","key":"25_CR7","unstructured":"Li, S.Z., Jain, A.K. (eds.): Handbook of Face Recognition. Springer, Heidelberg (2005)"},{"issue":"15","key":"25_CR8","doi-asserted-by":"publisher","first-page":"2390","DOI":"10.1016\/j.patrec.2005.04.013","volume":"26","author":"H. Lv","year":"2005","unstructured":"Lv, H., Wang, W., Wang, C., Zhuo, Q.: Offline Chinese Signature Verification based on Support Vector Machines. Pattern Recognition Letters\u00a026(15), 2390\u20132399 (2005)","journal-title":"Pattern Recognition Letters"},{"issue":"1","key":"25_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0031-3203(96)00059-3","volume":"30","author":"R. Bajaj","year":"1997","unstructured":"Bajaj, R., Chaudhuri, S.: Signature Verification using Multiple Neural Classifiers. Pattern Recognition\u00a030(1), 1\u20137 (1997)","journal-title":"Pattern Recognition"},{"key":"25_CR10","first-page":"161","volume-title":"Proceedings of the International Workshop on Frontiers in Handwriting Recognition","author":"A. Xu","year":"2004","unstructured":"Xu, A., Srihari, S.N., Kalera, M.K.: Learning Strategies for Signature Verification. In: Proceedings of the International Workshop on Frontiers in Handwriting Recognition, pp. 161\u2013166. IEEE Computer Society Press, Los Alamitos (2004)"},{"key":"25_CR11","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2440-0","volume-title":"The Nature of Statistical Learning Theory","author":"V.N. Vapnik","year":"1995","unstructured":"Vapnik, V.N.: The Nature of Statistical Learning Theory. Springer, Heidelberg (1995)"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Gutschoven, B., Verlinde, P.: Multi-Modal Identity Verification using Support Vector Machines (SVM). In: Proc. of the 3rd International Conference on Information Fusion (2000)","DOI":"10.1109\/IFIC.2000.859876"},{"key":"25_CR13","unstructured":"Kisku, D.R., Rattani, A., Sing, J.K., Gupta, P.: Offline Signature Verified with Multiple Classifiers: An Authentic Realization. In: International Conference on Advances in Computing, pp. 550\u2013553 (2008)"},{"key":"25_CR14","unstructured":"Gonzalez, R.C., Woods, R.E.: Digital Image Processing, 2nd edn. (2000)"},{"issue":"1","key":"25_CR15","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/S0031-3203(96)00063-5","volume":"30","author":"K. Huang","year":"1997","unstructured":"Huang, K., Yan, H.: Offline Signature Verification based on Geometric Feature Extraction and Neural Network Classification. Pattern Recognition\u00a030(1), 9\u201317 (1997)","journal-title":"Pattern Recognition"}],"container-title":["Communications in Computer and Information Science","Security Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10847-1_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T11:42:44Z","timestamp":1619782964000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10847-1_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642108464","9783642108471"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10847-1_25","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2009]]}}}