{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:23:22Z","timestamp":1761895402384},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642272448"},{"type":"electronic","value":"9783642272455"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-27245-5_17","type":"book-chapter","created":{"date-parts":[[2011,12,9]],"date-time":"2011-12-09T14:37:08Z","timestamp":1323441428000},"page":"128-136","source":"Crossref","is-referenced-by-count":13,"title":["Handwritten Signature Recognition with Adaptive Selection of Behavioral Features"],"prefix":"10.1007","author":[{"given":"Rafal","family":"Doroz","sequence":"first","affiliation":[]},{"given":"Piotr","family":"Porwik","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"Al-Shoshan, A.I.: Handwritten Signature Verification Using Image Invariants and Dynamic Features. In: Int. Conf. on Computer Graphics, Imaging and Visualisation, pp. 173\u2013176 (2006)"},{"key":"17_CR2","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1504\/IJBM.2008.018663","volume":"1","author":"R. Doroz","year":"2008","unstructured":"Doroz, R., Porwik, P., Para, T., Wrobel, K.: Dynamic Signature Recognition Based on Velocity Changes of Some Features. Int. Journal of Biometrics\u00a01, 47\u201362 (2008)","journal-title":"Int. Journal of Biometrics"},{"key":"17_CR3","first-page":"73","volume":"13","author":"R. Doroz","year":"2009","unstructured":"Doroz, R., Wr\u00f3bel, K., Porwik, P.: Signatures Recognition Method by Using the Normalized Levenshtein Distance. Journal of Medical Informatics & Technologies\u00a013, 73\u201377 (2009)","journal-title":"Journal of Medical Informatics & Technologies"},{"key":"17_CR4","unstructured":"Anderson, T.W.: An introduction to multivariate statistical analysis. Wiley (1984)"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Ibrahim, M.T., Kyan, M.J., Guan, L.: On-line Signature Verification Using Most Discriminating Features and Fisher Linear Discriminant Analysis. In: 10th IEEE Int. Symposium on Multimedia, Berkeley CA, pp. 172\u2013177 (2008)","DOI":"10.1109\/ISM.2008.115"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Ismail, I.A., Ramadan, M.A., Danf, T.E., Samak, A.H.: Automatic Signature Recognition and Verification Using Principal Components Analysis. In: Int. Conf. on Computer Graphics, Imaging and Visualization, pp. 356\u2013361 (2008)","DOI":"10.1109\/CGIV.2008.8"},{"key":"17_CR7","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/S0167-8655(97)00155-4","volume":"19","author":"A. J\u00f3zwik","year":"1998","unstructured":"J\u00f3zwik, A., Serpico, S.B., Roli, F.: A Parallel Network of Modified 1-NN and k-NN Classifiers-Application to Remote-Sensing Image Classification. Pattern Recognition Letters\u00a019, 57\u201362 (1998)","journal-title":"Pattern Recognition Letters"},{"key":"17_CR8","unstructured":"Kirkwood, B.R., Sterne, J.A.C.: Essentials of Medical Statistics, 2nd ed. Wiley-Blackwell (2003)"},{"key":"17_CR9","unstructured":"Kovari, B., Charaf, F.: Statistical Analysis of Signature Features with Respect to Applicability in Off-line Signature Verification. In: 14th WSEAS Int. Conf. on Computers, vol.\u00a0II, pp. 473\u2013478 (2010)"},{"key":"17_CR10","doi-asserted-by":"publisher","first-page":"2483","DOI":"10.1016\/j.patrec.2005.05.005","volume":"26","author":"H. Lei","year":"2005","unstructured":"Lei, H., Govindaraju, V.A.: Comparative Study on the Consistency of Features in On-line Signature Verification. Pattern Recognition Letters\u00a026, 2483\u20132489 (2005)","journal-title":"Pattern Recognition Letters"},{"key":"17_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"540","DOI":"10.1007\/978-3-540-25948-0_74","volume-title":"Biometric Authentication","author":"B. LI","year":"2004","unstructured":"LI, B., Wang, K., Zhang, D.: On-line Signature Verification Based on PCA (Principal Component Analysis) and MCA (Minor Component Analysis). In: Zhang, D., Jain, A.K. (eds.) ICBA 2004. LNCS, vol.\u00a03072, pp. 540\u2013546. Springer, Heidelberg (2004)"},{"key":"17_CR12","unstructured":"Moravec, P., Snasel, V.: Dimension Reduction Methods for Iris Recognition. In: Proc. of the Int. Workshop on Databases DATESO 2009, pp. 80\u201389 (2009)"},{"key":"17_CR13","first-page":"43","volume":"14","author":"P. Porwik","year":"2009","unstructured":"Porwik, P., Wrobel, K., Doroz, R.: Signature Recognition Method by Means of the Windows Technique. Int. Journal Image Processing and Communication\u00a014, 43\u201350 (2009)","journal-title":"Int. Journal Image Processing and Communication"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Richiardi, J., Ketabdar, H., Drygajlo, A.: Local and Global Feature Selection for on-line Signature verification. In: Proc. of the 8th Int. Conf. Document Analysis and Recognition ICDAR 2005, pp. 625\u2013629 (2005)","DOI":"10.1109\/ICDAR.2005.152"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Shakhnarovich, G., Darrell, T., Indyk, P.: Nearest-Neighbor Methods in Learning and 15. In: Vision: Theory and Practice (Neural Information Processing). The MIT Press (2006)","DOI":"10.7551\/mitpress\/4908.001.0001"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Willems, G., Pison, G., Rousseeuw, P. J., Van Aelst, S.: A Robust Hotelling Test, Vol. 55, pp. 125\u2013138. Physica Verlag, An Imprint of Springer-Verlag GmbH (2002) http:\/\/www.cse.ust.hk\/svc2004\/","DOI":"10.1007\/s001840200192"}],"container-title":["Communications in Computer and Information Science","Computer Information Systems \u2013 Analysis and Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27245-5_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T17:49:40Z","timestamp":1561052980000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27245-5_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642272448","9783642272455"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27245-5_17","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}