{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:55:55Z","timestamp":1742993755314,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642164439"},{"type":"electronic","value":"9783642164446"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16444-6_62","type":"book-chapter","created":{"date-parts":[[2010,9,8]],"date-time":"2010-09-08T23:19:29Z","timestamp":1283987969000},"page":"493-503","source":"Crossref","is-referenced-by-count":1,"title":["Extraction of Features from Signature Image and Signature Verification Using Clustering Techniques"],"prefix":"10.1007","author":[{"given":"Samit","family":"Biswas","sequence":"first","affiliation":[]},{"given":"Debnath","family":"Bhattacharyya","sequence":"additional","affiliation":[]},{"given":"Tai-hoon","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Samir Kumar","family":"Bandyopadhyay","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"62_CR1","unstructured":"Kiran, G.K., Srinivasa Rao Kunte, R., Samuel, S.: On-line Signature Verification System Using Probabilistic Feature Modelling. In: International Symposium on Signal Processing and its Applications (ISSPA), Kuala Lumpur, Malaysia, August 13-I6 (2001)"},{"key":"62_CR2","doi-asserted-by":"crossref","unstructured":"Itrat Bin Shams, M.: Signature Recognition by Segmentation and Regular Line Detection. In: TENCON 2007 - 2007 IEEE Region 10 Conference, October 30 - November 2, pp. 1\u20134 (2007)","DOI":"10.1109\/TENCON.2007.4428999"},{"issue":"3","key":"62_CR3","doi-asserted-by":"publisher","first-page":"181","DOI":"10.3844\/jcssp.2008.181.185","volume":"4","author":"D. Bhattacharyya","year":"2008","unstructured":"Bhattacharyya, D., Bandyopadhyay, S.K., Das, P., Ganguly, D., Mukherjee, S.: Statistical Approach for Offline Handwritten Signature Verification. Journal of Computer Science\u00a04(3), 181\u2013185 (2008) ISSN 1549-3636","journal-title":"Journal of Computer Science"},{"key":"62_CR4","unstructured":"Bandyopadhyay, S.K., Das, P., Bhattacharyya, D.: Statistical Analysis towards Image Recognition. International Journal of Multimedia and Ubiquitous Engineering\u00a03(3) (July 2008)"},{"issue":"4","key":"62_CR5","first-page":"1109","volume":"8","author":"A. Mohamed","year":"2009","unstructured":"Mohamed, A., Yusof, R., Rahman, S.A., Mutalib, S.: Baseline Extraction Algorithm for Online Signature Recognition. Wseas Transactions On Systems\u00a08(4), 1109\u20132777 (2009) ISSN: 1109-2777","journal-title":"Wseas Transactions On Systems"},{"issue":"7","key":"62_CR6","doi-asserted-by":"publisher","first-page":"670","DOI":"10.4304\/jcp.4.7.670-680","volume":"4","author":"A. McCabe","year":"2009","unstructured":"McCabe, A., Trevathan, J.: Handwritten Signature Verification Using Complementary Statistical Models. Journal Of Computers\u00a04(7), 670\u2013680 (2009)","journal-title":"Journal Of Computers"},{"key":"62_CR7","unstructured":"\u00d6zg\u00fcnd\u00fcz, E., \u015eent\u00fcrk, T., Elif Karsl\u0131gil, M.: Off-line signature verification and recognition by support vector machine. In: Eusipco 2005, Antalya, Turkey, September 4-8, pp. 113\u2013116 (2005), \n                  \n                    http:\/\/www.eurasip.org\/Proceedings\/Eusipco\/Eusipco2005\/deferent\/papers\/cr2010.pdf"},{"key":"62_CR8","unstructured":"Gonzalez, R.C., Woods, R.E.: Digital image Processing, ISBN 81-7808-629-8"},{"key":"62_CR9","unstructured":"Chanda, B., Dutta Majumder, D.: Digital Image Processing and Analysis, ISBN: 81-203-1618-5"},{"key":"62_CR10","unstructured":"Biswas, S., Bhattacharya, S., Sahu, S.: A method to extract features from handwritten signature image for signature verification. In: Proceedings of National Conference on Emerging Trends and Application in Computer Science (NCETACS 2010), St. Anthony\u2019s College, Shillong, April 9-10, pp. 275\u2013277 (2010) ISBN:978-81-910147-0-9"},{"key":"62_CR11","unstructured":"Faber, V.: Clustering And the Continuous K-means Algorithm. Los Alamos Science (22) (1994)"},{"key":"62_CR12","unstructured":"Bradley, P.S., Fayyad, U.M.: Refining Initial Points for K-Means Clustering. In: Shavlik, J. (ed.) International Conference on Machine Learning (ICML 1998), pp. 91\u201399 (1998)"},{"key":"62_CR13","doi-asserted-by":"crossref","unstructured":"Comaniciu, D., Meer, P.: Mean Shift: A Robust Approach Toward Feature Space Analysis. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a024(5) (May 2002)","DOI":"10.1109\/34.1000236"},{"key":"62_CR14","doi-asserted-by":"crossref","unstructured":"Mo\u00ebllic, P.-A., Haugeard, J.-E., Pittel, G.: Image Clustering Based on a Shared Nearest Neighbors Approach for Tagged Collections. In: Proceedings of the 2008 International Conference on Content-Based Image and Video Retrieval, pp, pp. 269\u2013278 (2008) ISBN:978-1-60558-070-8","DOI":"10.1145\/1386352.1386390"},{"key":"62_CR15","doi-asserted-by":"crossref","unstructured":"Maulik, U., Bandyopadhyay, S.: Performance Evaluation of Some Clustering Algorithms and Validity Indices. IEEE Transactions On Pattern Analysis And Machine Intelligence\u00a024(12) (December 2002)","DOI":"10.1109\/TPAMI.2002.1114856"},{"issue":"2","key":"62_CR16","doi-asserted-by":"publisher","first-page":"40","DOI":"10.3808\/jei.200300012","volume":"1","author":"H. Liu","year":"2003","unstructured":"Liu, H., Li, J., Chapman, M.A.: Automated Road Extraction from Satellite Imagery Using Hybrid Genetic Algorithms and Cluster Analysis. Journal of Environmental Informatics\u00a01(2), 40\u201347 (2003)","journal-title":"Journal of Environmental Informatics"}],"container-title":["Communications in Computer and Information Science","Security-Enriched Urban Computing and Smart Grid"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16444-6_62","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T21:32:11Z","timestamp":1558387931000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16444-6_62"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642164439","9783642164446"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16444-6_62","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}