{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T21:02:33Z","timestamp":1743109353114,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642250842"},{"type":"electronic","value":"9783642250859"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-25085-9_51","type":"book-chapter","created":{"date-parts":[[2011,11,11]],"date-time":"2011-11-11T10:03:34Z","timestamp":1321005814000},"page":"433-442","source":"Crossref","is-referenced-by-count":2,"title":["Dynamic Signature Recognition Based on Fisher Discriminant"],"prefix":"10.1007","author":[{"given":"Teodoro","family":"Schmidt","sequence":"first","affiliation":[]},{"given":"Vladimir","family":"Riffo","sequence":"additional","affiliation":[]},{"given":"Domingo","family":"Mery","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"51_CR1","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TCSVT.2003.818349","volume":"14","author":"A.K. Jain","year":"2004","unstructured":"Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology\u00a014, 4\u201320 (2004)","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"51_CR2","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/MSECP.2003.1193209","volume":"1","author":"S. Prabhakar","year":"2003","unstructured":"Prabhakar, S., Pankanti, S., Jain, A.K.: Biometric recognition: security and privacy concerns. IEEE Security & Privacy\u00a01, 33\u201342 (2003)","journal-title":"IEEE Security & Privacy"},{"key":"51_CR3","doi-asserted-by":"publisher","first-page":"981","DOI":"10.1016\/j.patcog.2006.06.007","volume":"40","author":"M. Faundez-Zanuy","year":"2007","unstructured":"Faundez-Zanuy, M.: On-line signature recognition based on VQ-DTW. Pattern Recognition\u00a040, 981\u2013992 (2007)","journal-title":"Pattern Recognition"},{"issue":"2","key":"51_CR4","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1016\/j.engappai.2010.10.015","volume":"24","author":"J.M. Pascual-Gaspar","year":"2011","unstructured":"Pascual-Gaspar, J.M., Faundez-Zanuy, M., Vivaracho, C.: Fast on-line signature recognition based on VQ with time modeling. Engineering Applications of Artificial Intelligence\u00a024(2), 368\u2013377 (2011)","journal-title":"Engineering Applications of Artificial Intelligence"},{"issue":"1","key":"51_CR5","first-page":"37","volume":"14","author":"J.M. Pascual-Gaspar","year":"2010","unstructured":"Pascual-Gaspar, J.M., Faundez-Zanuy, M., Vivaracho, C.: Efficient on-line signature recognition based on multi-section vector quantization. Pattern Analysis & Applications\u00a014(1), 37\u201345 (2010)","journal-title":"Pattern Analysis & Applications"},{"key":"51_CR6","doi-asserted-by":"crossref","unstructured":"Karouni, A., Daya, B., Bahlak, S.: Offline signature recognition using neural networks approach. In: Procedia Computer Science, World Conference on Information Technology, vol.\u00a03, pp. 155\u2013161 (2011)","DOI":"10.1016\/j.procs.2010.12.027"},{"issue":"3","key":"51_CR7","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1016\/j.dsp.2011.01.007","volume":"21","author":"W. Al-Mayyan","year":"2011","unstructured":"Al-Mayyan, W., Own, H.S., Zedan, H.: Rough set approach to online signature identification. Digital Signal Processing\u00a021(3), 477\u2013485 (2011)","journal-title":"Digital Signal Processing"},{"issue":"3","key":"51_CR8","doi-asserted-by":"publisher","first-page":"3218","DOI":"10.1016\/j.asoc.2010.12.024","volume":"11","author":"K.R. Radhika","year":"2011","unstructured":"Radhika, K.R., Venkatesha, M.K., Sekhar, G.N.: Signature authentication based on subpattern analysis. Applied Soft Computing\u00a011(3), 3218\u20133228 (2011)","journal-title":"Applied Soft Computing"},{"key":"51_CR9","doi-asserted-by":"crossref","unstructured":"Ebrahimpour, R, Amiri, A., Nazari, M., Hajiany, A.: Robust Model for Signature Recognition Based on Biological Inspired Features. International Journal of Computer and Electrical Engineering 2(4) (August 2010)","DOI":"10.7763\/IJCEE.2010.V2.202"},{"key":"51_CR10","doi-asserted-by":"crossref","unstructured":"Meshoul, S., Batouche, M.: A novel approach for online signature verification using fisher based probabilistic neural networks. In: Proceedings - IEEE Symposium on Computers and Communications, pp. 314\u2013319 (2010)","DOI":"10.1109\/ISCC.2010.5546760"},{"issue":"11","key":"51_CR11","doi-asserted-by":"publisher","first-page":"1225","DOI":"10.1016\/S0895-4356(96)00002-9","volume":"49","author":"J.V. Tu","year":"1996","unstructured":"Tu, J.V.: Advantages and disadvantages of using artificial neural networks versus logistic regression for predicting medical outcomes. Journal of Clinical Epidemiology\u00a049(11), 1225\u20131231 (1996)","journal-title":"Journal of Clinical Epidemiology"},{"key":"51_CR12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5565\/rev\/elcvia.133","volume":"6","author":"V.B. Kulkarni","year":"2007","unstructured":"Kulkarni, V.B.: A Colour Code Algorithm for Signature Recognition. Electronic Letters on Computer Vision and Image Analysis\u00a06, 1\u201312 (2007)","journal-title":"Electronic Letters on Computer Vision and Image Analysis"},{"key":"51_CR13","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1162\/jocn.1991.3.1.71","volume":"3","author":"M. Turk","year":"1991","unstructured":"Turk, M., Pentland, A.: Eigenfaces for Recognition. Journal of Cognitive Neuroscience\u00a03, 71\u201386 (1991)","journal-title":"Journal of Cognitive Neuroscience"},{"key":"51_CR14","doi-asserted-by":"crossref","unstructured":"Turk, M., Pentland, A.: Face recognition using eigenfaces. In: Proceedings of Computer Vision & Pattern Recognition, CVPR 1991, IEEE Computer Society Conference, pp. 586\u2013591 (1991)","DOI":"10.1109\/CVPR.1991.139758"},{"key":"51_CR15","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1109\/34.598228","volume":"19","author":"P. Belhumeur","year":"1997","unstructured":"Belhumeur, P., Hespanha, J., Kriegman, D.: Eigenfaces vs. Fisherfaces: recognition using class specific linear projection. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a019, 711\u2013720 (1997)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"51_CR16","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.patcog.2008.07.008","volume":"42","author":"C. Vivaracho-Pascual","year":"2009","unstructured":"Vivaracho-Pascual, C., Faundez-Zanuy, M., Pascual, J.M.: An efficient low cost approach for on-line signature recognition based on length normalization and fractional distances. Pattern Recognition\u00a042, 183\u2013193 (2009)","journal-title":"Pattern Recognition"},{"key":"51_CR17","doi-asserted-by":"crossref","unstructured":"Erkmen, B., Kahraman, N., Vural, R., Yildirim, T.: CSFNN optimization of signature recognition problem for a special VLSI NN chip. In: 3rd International Symposium on Communications, Control and Signal Processing, ISCCSP 2008, pp. 1082\u20131085 (2008)","DOI":"10.1109\/ISCCSP.2008.4537385"},{"key":"51_CR18","unstructured":"Riffo, V., Schmidt, T., Mery, D.: Propuesta Novedosa de Reconocimiento Dinmico de Firmas. In: Proceeding of First Chilean Workshop on Pattern Recognition: Theory and Applications, pp. 44\u201351 (2009)"},{"key":"51_CR19","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s00607-004-0113-z","volume":"75","author":"V. Hari","year":"2005","unstructured":"Hari, V.: Accelerating the SVD Block-Jacobi Method. Computing\u00a075, 27\u201353 (2005)","journal-title":"Computing"},{"key":"51_CR20","doi-asserted-by":"crossref","unstructured":"Blumenstein, M., Ferrer Miguel, A., Vargas, J.F.: The 4NSigComp2010 off-line signature verification competition: Scenario 2. In: Proceedings of 12th International Conference on Frontiers in Handwriting Recognition, Kolkata, India, November 16-18, pp. 721\u2013726 (2010) ISSBN: 978-0-7695-4221-8","DOI":"10.1109\/ICFHR.2010.117"}],"container-title":["Lecture Notes in Computer Science","Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25085-9_51","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,17]],"date-time":"2019-04-17T00:27:31Z","timestamp":1555460851000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25085-9_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642250842","9783642250859"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25085-9_51","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}