{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:14:35Z","timestamp":1761581675277,"version":"3.37.3"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2018,3,22]],"date-time":"2018-03-22T00:00:00Z","timestamp":1521676800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1007\/s00521-018-3444-y","type":"journal-article","created":{"date-parts":[[2018,3,22]],"date-time":"2018-03-22T03:48:57Z","timestamp":1521690537000},"page":"6223-6247","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Bag-of-visual-words for signature-based multi-script document retrieval"],"prefix":"10.1007","volume":"31","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3669-2446","authenticated-orcid":false,"given":"Ranju","family":"Mandal","sequence":"first","affiliation":[]},{"given":"Partha Pratim","family":"Roy","sequence":"additional","affiliation":[]},{"given":"Umapada","family":"Pal","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Blumenstein","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,22]]},"reference":[{"key":"3444_CR1","unstructured":"The Legacy Tobacco Document Library (LTDL) (2007). University of California, San Francisco. \n                    http:\/\/legacy.library.ucsf.edu\/"},{"key":"3444_CR2","doi-asserted-by":"publisher","first-page":"1287","DOI":"10.1016\/S0167-8655(99)00098-7","volume":"20","author":"CY Suen","year":"1999","unstructured":"Suen CY, Xu Q, Lam L (1999) Automatic recognition of handwritten data on cheques\u2014fact or fiction? Pattern Recogni Lett 20:1287\u20131295","journal-title":"Pattern Recogni Lett"},{"key":"3444_CR3","unstructured":"Levy S (2004) \u201cgoogle's two revolutions\u201d. Newsweek. \n                    http:\/\/www.newsweek.com\/googles-two-revolutions-123507"},{"key":"3444_CR4","doi-asserted-by":"crossref","unstructured":"Roy PP, Vazquez E, Llad\u00f3s J, Baldrich R, Pal U (2008) A system to segment text and symbols from color maps. In: Proceedings of the international workshop on graphics recognition (GREC), pp 245\u2013256","DOI":"10.1007\/978-3-540-88188-9_23"},{"key":"3444_CR5","doi-asserted-by":"crossref","unstructured":"Zhu G, Doermann D (2009) Logo matching for document image retrieval. In: Proceedings of the international conference on document analysis and recognition (ICDAR), pp 606\u2013610","DOI":"10.1109\/ICDAR.2009.60"},{"key":"3444_CR6","unstructured":"Zhu G, Jaeger S, Doermann D (2006) A robust stamp detection framework on degraded documents. In: Proceedings of SPIE conference on document recognition and retrieval, pp 1\u20139"},{"key":"3444_CR7","doi-asserted-by":"crossref","unstructured":"Farooq F, Sridharan K, Govindaraju V (2006) Identifying handwritten text in mixed documents. In: Proceedings international conference on pattern recognition (ICPR), pp 1\u20134","DOI":"10.1109\/ICPR.2006.676"},{"key":"3444_CR8","unstructured":"Guo JK, Ma MY (2001) Separating handwritten material from machine printed text using Hidden Markov Models. In: Proceedings of international conference on document analysis and recognition (ICDAR), pp 439\u2013443"},{"key":"3444_CR9","doi-asserted-by":"publisher","unstructured":"Kumar J, Prasad R, Cao H, Abd-Almageed W, Doermann D, Natarajan P (2011) Shape codebook based handwritten and machine printed text zone extraction. In: Proceedings of SPIE, vol 7874. \n                    https:\/\/doi.org\/10.1117\/12.876725","DOI":"10.1117\/12.876725"},{"key":"3444_CR10","doi-asserted-by":"crossref","unstructured":"Peng X, Setlur S, Govindaraju V, Sitaram R, Bhuvanagiri K (2009) Markov Random Field-based text identification from annotated machine printed documents. In: Proceedings of the international conference on document analysis and recognition (ICDAR), pp 431\u2013435","DOI":"10.1109\/ICDAR.2009.237"},{"key":"3444_CR11","doi-asserted-by":"crossref","unstructured":"Zheng Y, Li H, Doermann D (2002) The segmentation and identification of handwriting in noisy document images. In: Proceedings of the document analysis systems (DAS), pp 95\u2013105","DOI":"10.1007\/3-540-45869-7_12"},{"key":"3444_CR12","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1049\/iet-bmt.2013.0081","volume":"3","author":"M Martinez-Diaz","year":"2014","unstructured":"Martinez-Diaz M, Fierrez J, Krish RP, Galbally J (2014) Mobile signature verification: feature robustness and performance comparison. IET Biom 3(4):267\u2013277","journal-title":"IET Biom"},{"issue":"9","key":"3444_CR13","doi-asserted-by":"publisher","first-page":"2921","DOI":"10.1016\/j.patcog.2015.03.019","volume":"48","author":"J Galbally","year":"2015","unstructured":"Galbally J, Diaz-Cabrera M, Ferrer MA, Gomez-Barrero M, Morales A, Fierrez J (2015) On-line signature recognition through the combination of real dynamic data and synthetically generated static data. Pattern Recognit 48(9):2921\u20132934","journal-title":"Pattern Recognit"},{"key":"3444_CR14","doi-asserted-by":"crossref","unstructured":"Morocho D, Morales A, Fierrez J, Vera-Rodriguez R (2016) Towards human-assisted signature recognition: improving biometric systems through attribute-based recognition. In: Proceedings of the international conference on identity, security and behavior analysis (ISBA)","DOI":"10.1109\/ISBA.2016.7477227"},{"key":"3444_CR15","doi-asserted-by":"crossref","unstructured":"Blumenstein M, Ferrer Miguel A, Vargas JF (2010) The 4NSigComp2010 off-line signature verification competition: Scenario 2. In: Proceedings of the international conference on frontiers in handwriting recognition (ICFHR), vol 4, pp 721\u2013726","DOI":"10.1109\/ICFHR.2010.117"},{"key":"3444_CR16","unstructured":"Chalechale A, Naghdy G, Mertins A (2003) Signature-based document retrieval. In: Proceedings of the international symposium on signal processing and information technology (ISSPIT), pp 597\u2013600"},{"issue":"11","key":"3444_CR17","doi-asserted-by":"publisher","first-page":"2015","DOI":"10.1109\/TPAMI.2008.237","volume":"31","author":"G Zhu","year":"2009","unstructured":"Zhu G, Zheng Y, Doermann D, Jaeger S (2009) Signature detection and matching for document image retrieval. IEEE Trans Pattern Anal Mach Intell (PAMI) 31(11):2015\u20132031","journal-title":"IEEE Trans Pattern Anal Mach Intell (PAMI)"},{"key":"3444_CR18","doi-asserted-by":"crossref","unstructured":"Srinivasan H, Srihari S (2009) Signature-based retrieval of scanned documents using conditional random fields. In: Argamon S, Howard N (eds.) Computational methods for counterterrorism, Springer, Berlin, pp 17\u201332","DOI":"10.1007\/978-3-642-01141-2_2"},{"key":"3444_CR19","doi-asserted-by":"crossref","unstructured":"Roy PP, Bhowmick S, Pal U, Ramel JY (2012) Signature based document retrieval using GHT of background information. In: Proceedings of the international conference on frontiers in handwriting recognition (ICFHR), pp 225\u2013230","DOI":"10.1109\/ICFHR.2012.270"},{"key":"3444_CR20","doi-asserted-by":"crossref","unstructured":"Mandal R, Roy PP, Pal U (2011) Signature segmentation from machine printed documents using Conditional Random Field. In: Proceedings of the international conference on document analysis and recognition (ICDAR), pp 1170\u20131174","DOI":"10.1109\/ICDAR.2011.236"},{"key":"3444_CR21","doi-asserted-by":"crossref","unstructured":"Du X, AbdAlmageed W, Doermann D (2013) Large-scale signature matching using multi-stage hashing. In: Proceedings of the ICDAR, pp 976\u2013980","DOI":"10.1109\/ICDAR.2013.197"},{"key":"3444_CR22","doi-asserted-by":"crossref","unstructured":"Briceno JC, Travieso CM, Ferrer MA, Alonso JB, Vargas F (2009) Angular contour parameterization for signature identification. In: LNCS EUROCAST, vol 5717","DOI":"10.1007\/978-3-642-04772-5_47"},{"key":"3444_CR23","unstructured":"Dewan H, Xichang W, Jiang L (2010) A content-based retrieval algorithm for document image database. In: Proceedings of the international conference on multimedia technology (ICMT), pp 1\u20135"},{"key":"3444_CR24","doi-asserted-by":"crossref","unstructured":"Wang H (2010) Document logo detection and recognition using Bayesian model. In: Proceedings of the international conference on pattern recognition (ICPR), pp 1961\u20131964","DOI":"10.1109\/ICPR.2010.483"},{"key":"3444_CR25","doi-asserted-by":"crossref","unstructured":"Alaei A, Delalandre M (2014) A complete logo detection\/recognition system for document images. In: Proceedings of the international workshop on document analysis systems (DAS), pp 324\u2013328","DOI":"10.1109\/DAS.2014.79"},{"key":"3444_CR26","doi-asserted-by":"crossref","unstructured":"Fischer A, Keller A, Frinken V, Bunke H (2010) Hmm-based word spotting in handwritten documents using subword models. In: Proceedings of the international conference on pattern recognition (ICPR), pp 3416\u20133419","DOI":"10.1109\/ICPR.2010.834"},{"issue":"3","key":"3444_CR27","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1109\/TPAMI.2011.113","volume":"3","author":"V Frinken","year":"2012","unstructured":"Frinken V, Fischer A, Manmatha R, Bunke H (2012) A novel word spotting method based on recurrent neural networks. IEEE Trans Pattern Anal Mach Intell (PAMI) 3(3):211\u2013224","journal-title":"IEEE Trans Pattern Anal Mach Intell (PAMI)"},{"issue":"9","key":"3444_CR28","doi-asserted-by":"publisher","first-page":"2106","DOI":"10.1016\/j.patcog.2009.02.005","volume":"42","author":"JA Rodr\u00edguez-Serrano","year":"2009","unstructured":"Rodr\u00edguez-Serrano JA, Perronnin F (2009) Handwritten word-spotting using hidden markov models and universal vocabularies. Pattern Recognit 42(9):2106\u20132116","journal-title":"Pattern Recognit"},{"key":"3444_CR29","doi-asserted-by":"crossref","unstructured":"Alhwarin F, Wang C, Durrant DR, Gr\u00e4ser A (2008) Improved sift-features matching for object recognition. In: Proceedings of the vision of computer science, pp 179\u2013190","DOI":"10.14236\/ewic\/VOCS2008.16"},{"key":"3444_CR30","unstructured":"Hua Y, Lin J, Lin C (2010) An improved sift feature matching algorithm. In: Proceedings of the world congress on intelligent control and automation (WCICA), pp 6109\u20136113"},{"key":"3444_CR31","unstructured":"Kai W, Bo C, Long T (2011) An improved sift feature matching algorithm based on maximizing minimum distance cluster. In: Proceedings of the international conference on computer science and information technology (ICCSIT), pp 255\u2013259"},{"issue":"2","key":"3444_CR32","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"DG Lowe","year":"2004","unstructured":"Lowe DG (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vis (IJCV) 60(2):91\u2013110","journal-title":"Int J Comput Vis (IJCV)"},{"key":"3444_CR33","doi-asserted-by":"crossref","unstructured":"Lazebnik S, Schmid C, Ponce J (2006) Beyond Bags of Features: Spatial Pyramid Matching for recognizing natural scene categories. In: Proceedings of the computer vision and pattern recognition (CVPR), vol 2, pp 2169\u20132178","DOI":"10.1109\/CVPR.2006.68"},{"key":"3444_CR34","doi-asserted-by":"crossref","unstructured":"Fei-Fei L, Peronae P (2005) A bayesian hierarchical model for learning natural scene categories. In: Proceedings of the computer vision and pattern recognition (CVPR), pp 524\u2013531","DOI":"10.1109\/CVPR.2005.16"},{"key":"3444_CR35","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2440-0","volume-title":"The nature of statistical learning theory","author":"V Vapnik","year":"1995","unstructured":"Vapnik V (1995) The nature of statistical learning theory. Springer, Berlin"},{"key":"3444_CR36","unstructured":"Ester M, Kriegel H, Sander J, Xu X (1996) A density-based algorithm for discovering clusters in large spatial databases with noise. In: Proceedings of the international conference on knowledge discovery and data mining (KDD), pp 226\u2013231"},{"key":"3444_CR37","doi-asserted-by":"crossref","unstructured":"Harris C, Stephens M (1988) A combined corner and edge detector. In: Proceedings of the Alvey vision conference (AVC), pp 147\u2013151","DOI":"10.5244\/C.2.23"},{"issue":"1\u20133","key":"3444_CR38","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1016\/S0167-8655(02)00240-4","volume":"24","author":"U Pal","year":"2003","unstructured":"Pal U, Belaid A, Choisy CH (2003) Touching numeral segmentation using water reservoir concept. Pattern Recognit Lett 24(1\u20133):261\u2013272","journal-title":"Pattern Recognit Lett"},{"key":"3444_CR39","doi-asserted-by":"crossref","unstructured":"Pal S, Alaei A, Pal U, Blumenstein M (2012) Multi-script off-line signature identification. In: Proceedings of the international conference hybrid intelligent systems (HIS), pp 236\u2013240","DOI":"10.1109\/HIS.2012.6421340"},{"key":"3444_CR40","unstructured":"Logo dataset. University of Maryland, Laboratory for Language and Media Processing (LAMP) (2014). \n                    http:\/\/lamp.cfar.umd.edu\/"},{"key":"3444_CR41","doi-asserted-by":"publisher","unstructured":"Mandal R, Roy PP, Pal U (2012) Signature segmentation from machine printed documents using contextual information. Int J Pattern Recognit Artif Intell (IJPRAI) 26(7). \n                    https:\/\/doi.org\/10.1142\/S0218001412530035","DOI":"10.1142\/S0218001412530035"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-018-3444-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00521-018-3444-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-018-3444-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,20]],"date-time":"2019-10-20T16:44:01Z","timestamp":1571589841000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00521-018-3444-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,22]]},"references-count":41,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2019,10]]}},"alternative-id":["3444"],"URL":"https:\/\/doi.org\/10.1007\/s00521-018-3444-y","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"type":"print","value":"0941-0643"},{"type":"electronic","value":"1433-3058"}],"subject":[],"published":{"date-parts":[[2018,3,22]]},"assertion":[{"value":"27 February 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 March 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 March 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}