{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:09:00Z","timestamp":1726034940338},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811393600"},{"type":"electronic","value":"9789811393617"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-9361-7_12","type":"book-chapter","created":{"date-parts":[[2019,7,4]],"date-time":"2019-07-04T14:33:05Z","timestamp":1562250785000},"page":"133-140","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Secure and Light Weight User Authentication System Based on Online Signature Verification for Resource Constrained Mobile Networks"],"prefix":"10.1007","author":[{"given":"Chandra Sekhar","family":"Vorugunti","sequence":"first","affiliation":[]},{"given":"D. S.","family":"Guru","sequence":"additional","affiliation":[]},{"given":"Viswanath","family":"Pulabaigari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,5]]},"reference":[{"key":"12_CR1","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-81-322-1143-3_19","volume-title":"Multimedia Processing, Communication and Computing Applications","author":"DS Guru","year":"2013","unstructured":"Guru, D.S., Manjunatha, K.S., Manjunath, S.: User dependent features in online signature verification. In: Swamy, P., Guru, D. (eds.) Multimedia Processing, Communication and Computing Applications. Lecture Notes in Electrical Engineering, pp. 229\u2013240. Springer, New Delhi (2013). \n                    https:\/\/doi.org\/10.1007\/978-81-322-1143-3_19"},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/978-3-319-26832-3_7","volume-title":"Mining Intelligence and Knowledge Exploration","author":"S Manjunath","year":"2015","unstructured":"Manjunath, S., Manjunatha, K.S., Guru, D.S., Somashekara, M.T.: Cluster dependent classifiers for online signature verification. In: Prasath, R., Vuppala, A.K., Kathirvalavakumar, T. (eds.) MIKE 2015. LNCS (LNAI), vol. 9468, pp. 58\u201369. Springer, Cham (2015). \n                    https:\/\/doi.org\/10.1007\/978-3-319-26832-3_7"},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"2652","DOI":"10.1016\/j.patcog.2014.02.012","volume":"47","author":"K Cpa\u0142ka","year":"2014","unstructured":"Cpa\u0142ka, K., Zalasi\u0144ski, M., Rutkowski, L.: New method for the on-line signature verification based on horizontal partitioning. J. Pattern Recognit. 47, 2652\u20132661 (2014)","journal-title":"J. Pattern Recognit."},{"key":"12_CR4","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.patrec.2016.06.016","volume":"80","author":"KS Manjunatha","year":"2016","unstructured":"Manjunatha, K.S., Manjunath, S., Guru, D.S., Somashekara, M.T.: Online signature verification based on writer dependent features and classifiers. Pattern Recogn. Lett. 80, 129\u2013136 (2016)","journal-title":"Pattern Recogn. Lett."},{"key":"12_CR5","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1016\/j.eswa.2017.03.024","volume":"80","author":"DS Guru","year":"2017","unstructured":"Guru, D.S., Manjunatha, K.S., Manjunath, S., Somashekara, M.T.: Interval valued symbolic representation of writer dependent features for online signature verification. J. Expert Syst. Appl. 80, 232\u2013243 (2017)","journal-title":"J. Expert Syst. Appl."},{"issue":"10","key":"12_CR6","doi-asserted-by":"publisher","first-page":"2360","DOI":"10.1109\/TIFS.2017.2707332","volume":"12","author":"Alireza Alaei","year":"2017","unstructured":"Alaei, A., Pal, S., Pal, S., Blumenstein, M.: An efficient signature verification method based on an interval symbolic representation and a fuzzy similarity measure. IEEE Trans. Inf. Forensics Secur. 12 (2017)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"12_CR7","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/s40010-016-0293-x","volume":"87","author":"S Rohilla","year":"2017","unstructured":"Rohilla, S., Sharma, A.: Online signature verification technique using reference feature vector. Proc. Natl. Acad. Sci. India Sect. A 87, 125 (2017)","journal-title":"Proc. Natl. Acad. Sci. India Sect. A"},{"key":"12_CR8","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1016\/j.patcog.2016.12.019","volume":"65","author":"X Xia","year":"2017","unstructured":"Xia, X., Chen, Z., Luan, F., Song, X.: Signature alignment based on GMM for on-line signature verification. J. Pattern Recogn. 65, 188\u2013196 (2017)","journal-title":"J. Pattern Recogn."},{"issue":"10","key":"12_CR9","doi-asserted-by":"publisher","first-page":"2663","DOI":"10.1109\/TSMC.2016.2597240","volume":"47","author":"Xiaoyu Song","year":"2017","unstructured":"Song, X., Xia, X., Luan, F.: Online signature verification based on stable features extracted dynamically. IEEE Trans. Syst. Man Cybern. Syst. 47 (2017)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Systems"},{"key":"12_CR10","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.ins.2018.05.049","volume":"460\u2013461","author":"R Doroz","year":"2018","unstructured":"Doroz, R., Kudlacik, P., Porwik, P.: Online signature verification modeled by stability-oriented reference signatures. Inf. Sci. 460\u2013461, 151\u2013171 (2018)","journal-title":"Inf. Sci."},{"key":"12_CR11","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1016\/j.patcog.2017.09.033","volume":"74","author":"X Xia","year":"2018","unstructured":"Xia, X., Song, X., Luan, F., Zheng, J., Chen, Z., Ma, X.: Discriminative feature selection for on-line signature verification. J. Pattern Recogn. 74, 422\u2013433 (2018)","journal-title":"J. Pattern Recogn."},{"key":"12_CR12","first-page":"13","volume":"289","author":"Z Marcin","year":"2018","unstructured":"Marcin, Z., Krzysztof, C.: A new method for signature verification based on selection of the most important partitions of the dynamic signature. J. Neuro Comput. 289, 13\u201322 (2018)","journal-title":"J. Neuro Comput."},{"key":"12_CR13","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/j.eswa.2018.04.035","volume":"107","author":"W Bouamra","year":"2018","unstructured":"Bouamra, W., Djeddi, C., Nini, B., Diaz, M., Siddiqi, I.: Towards the design of an offline signature verifier based on a small number of genuine samples for training. J. Expert Syst. Appl. 107, 182\u2013195 (2018)","journal-title":"J. Expert Syst. Appl."},{"key":"12_CR14","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TIM.2017.2755898","volume":"67","author":"B Kar","year":"2018","unstructured":"Kar, B., Mukherjee, A., Dutta, P.K.: Stroke point warping-based reference selection and verification of online signature. IEEE Trans. Instrum. Meas. 67, 2\u201311 (2018)","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"12_CR15","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.eswa.2018.03.023","volume":"104","author":"O Alpar","year":"2018","unstructured":"Alpar, O.: Online signature verification by continuous wavelet transformation of speed signals. Expert Syst. Appl. 104, 33\u201342 (2018)","journal-title":"Expert Syst. Appl."},{"issue":"4","key":"12_CR16","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1109\/TIFS.2017.2769023","volume":"13","author":"Lei Tang","year":"2018","unstructured":"Tang, L., Kang, W., Fang, Y.: Information divergence-based matching strategy for online signature verification. IEEE Trans. Inf. Forensics Secur. 13 (2018)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"12_CR17","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1109\/TCYB.2017.2647826","volume":"48","author":"S Abhishek","year":"2018","unstructured":"Abhishek, S., Suresh, S.: On the exploration of information from the DTW cost matrix for online signature verification. IEEE Trans. Cybern. 48, 611\u2013624 (2018)","journal-title":"IEEE Trans. Cybern."},{"key":"12_CR18","first-page":"1","volume":"6","author":"Y Li","year":"2018","unstructured":"Li, Y., Xiaoyan, J., Qi, J.: Online handwritten signature verification based on the most stable feature and partition. J. Cluster Comput. 6, 1\u201311 (2018)","journal-title":"J. Cluster Comput."},{"key":"12_CR19","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1016\/j.patcog.2018.07.024","volume":"84","author":"S Napa","year":"2018","unstructured":"Napa, S., Nasir, M., Pitikhate, S.: Distinctiveness, complexity, and repeatability of online signature templates. Pattern Recogn. 84, 332\u2013344 (2018)","journal-title":"Pattern Recogn."},{"key":"12_CR20","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.neucom.2018.02.017","volume":"289","author":"M Zalasi\u0144skia","year":"2018","unstructured":"Zalasi\u0144skia, M., Cpa\u0142kaa, K.: A new method for signature verification based on selection of the most important partitions of the dynamic signature. J. Neurocomput. 289, 13\u201322 (2018)","journal-title":"J. Neurocomput."}],"container-title":["Communications in Computer and Information Science","Document Analysis and Recognition"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-9361-7_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,4]],"date-time":"2019-07-04T14:34:53Z","timestamp":1562250893000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-9361-7_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811393600","9789811393617"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-9361-7_12","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"5 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DAR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Workshop on Document Analysis and Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hyderabad","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dar2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cse.iitj.ac.in\/dar2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"55% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}