{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:47:20Z","timestamp":1761598040507,"version":"3.37.3"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,2,11]],"date-time":"2019-02-11T00:00:00Z","timestamp":1549843200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Kommission f\u00fcr Technologie und Innovation","award":["18029.1 PFES-ES"],"award-info":[{"award-number":["18029.1 PFES-ES"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["IJDAR"],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1007\/s10032-019-00316-1","type":"journal-article","created":{"date-parts":[[2019,2,11]],"date-time":"2019-02-11T10:20:55Z","timestamp":1549880455000},"page":"41-54","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Online signature verification based on string edit distance"],"prefix":"10.1007","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9145-3157","authenticated-orcid":false,"given":"Kaspar","family":"Riesen","sequence":"first","affiliation":[]},{"given":"Roman","family":"Schmidt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,11]]},"reference":[{"issue":"3","key":"316_CR1","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1049\/iet-bmt.2012.0048","volume":"3","author":"A Ansari","year":"2014","unstructured":"Ansari, A., Hanmandlu, M., Kour, J., Singh, A.: Online signature verification using segment-level fuzzy modelling. IET Biom. 3(3), 113\u2013127 (2014)","journal-title":"IET Biom."},{"issue":"11","key":"316_CR2","doi-asserted-by":"publisher","first-page":"4808","DOI":"10.1016\/j.ijleo.2016.01.160","volume":"127","author":"M Bansal","year":"2016","unstructured":"Bansal, M., Hanmandlu, M., Kumar, P.: Iris based authentication using local principal independent components. Optik-Int. J. Light Electron Opt. 127(11), 4808\u20134814 (2016)","journal-title":"Optik-Int. J. Light Electron Opt."},{"issue":"16","key":"316_CR3","doi-asserted-by":"publisher","first-page":"2325","DOI":"10.1016\/j.patrec.2007.07.012","volume":"28","author":"J Fierrez","year":"2007","unstructured":"Fierrez, J., Ortega-Garcia, J., Ramos, D., Gonzales-Rodriguez, J.: Hmm-based on-line signature verification: feature extraction and signature modeling. Pattern Recognit. Lett. 28(16), 2325\u20132334 (2007)","journal-title":"Pattern Recognit. Lett."},{"key":"316_CR4","unstructured":"Guru, D., Prakash, H.: Online signature verification and recognition: an approach based on symbolic representation. IEEE Trans. Pattern Anal. Mach. Intell. 31(6), 1059\u20141073 (2009)"},{"key":"316_CR5","doi-asserted-by":"crossref","unstructured":"Ibrahim, M., Kyan, M., Guang, L.: On-line signature verification using global features. In: 2009 Canadian Conference on Electrical and Computer Engineering (2009)","DOI":"10.1109\/CCECE.2009.5090216"},{"issue":"5","key":"316_CR6","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1109\/TSMCC.2008.923866","volume":"38","author":"D Impedovo","year":"2008","unstructured":"Impedovo, D., Pirlo, G.: Automatic signature verification: the state of the art\u2019. IEEE Trans. Syst. Man Cybern. 38(5), 609\u2013635 (2008)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"issue":"15","key":"316_CR7","doi-asserted-by":"publisher","first-page":"1400","DOI":"10.1016\/j.patrec.2005.04.017","volume":"26","author":"A Kholmatov","year":"2005","unstructured":"Kholmatov, A., Yanikoglu, B.: Identity authentication using improved online signature verification method. Pattern Recognit. Lett. 26(15), 1400\u20132408 (2005)","journal-title":"Pattern Recognit. Lett."},{"issue":"3","key":"316_CR8","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/s10044-008-0118-x","volume":"12","author":"A Kholmatov","year":"2009","unstructured":"Kholmatov, A., Yanikoglu, B.: SUSIG: an on-line signature database, associated protocols and benchmark results. Pattern Anal. Appl. 12(3), 227\u2013236 (2009)","journal-title":"Pattern Anal. Appl."},{"issue":"8","key":"316_CR9","first-page":"707","volume":"10","author":"V Levenshtein","year":"1966","unstructured":"Levenshtein, V.: Binary codes capable of correcting deletions, insertions and reversals. Sov. Phys. Dokl. 10(8), 707\u2013710 (1966)","journal-title":"Sov. Phys. Dokl."},{"key":"316_CR10","doi-asserted-by":"crossref","unstructured":"Liwicki, M., Blumenstein, M., van\u00a0den Heuvel, E., Berger, C., Stoel, R.D., Found, B., Chen, X., Malik, M.I.: Sigcomp11: Signature verification competition for on- and offline skilled forgeries. In: Proc. 11th Int. Conference on Document Analysis and Recognition (2011)","DOI":"10.1109\/ICDAR.2011.294"},{"issue":"4","key":"316_CR11","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1049\/iet-bmt.2013.0081","volume":"3","author":"M Martinez-Diaz","year":"2014","unstructured":"Martinez-Diaz, M., Fierrez, J., Krish, R., Galbally, J.: Mobile signature verification: feature robustness and performance comparison. IET Biom. 3(4), 267\u2013277 (2014)","journal-title":"IET Biom."},{"issue":"9","key":"316_CR12","doi-asserted-by":"publisher","first-page":"3625","DOI":"10.1109\/TIP.2013.2266257","volume":"22","author":"S Mehdi","year":"2013","unstructured":"Mehdi, S., Arakala, A., Davis, S., Horadam, K.: Retina verification system based on biometric graph matching. IEEE Trans. Image Process. 22(9), 3625\u20133635 (2013)","journal-title":"IEEE Trans. Image Process."},{"issue":"4","key":"316_CR13","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1049\/iet-bmt.2013.0086","volume":"3","author":"S Mehdi Lajevardi","year":"2014","unstructured":"Mehdi Lajevardi, S., Arakala, A., Davis, S., Horadam, K.: Hand vein authentication using biometric graph matching. IET Biom. 3(4), 302\u2013313 (2014)","journal-title":"IET Biom."},{"key":"316_CR14","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.neucom.2005.05.004","volume":"68","author":"L Nanni","year":"2005","unstructured":"Nanni, L., Lumini, A.: Ensemble of parzen window classifiers for on-line signature verification. Neurocomputing 68, 217\u2013224 (2005)","journal-title":"Neurocomputing"},{"issue":"12","key":"316_CR15","doi-asserted-by":"publisher","first-page":"2021","DOI":"10.1109\/JPROC.2003.819611","volume":"91","author":"L O\u2019Gorman","year":"2003","unstructured":"O\u2019Gorman, L.: Comparing passwords, tokens, and biometrics for user authentication. Proc. IEEE 91(12), 2021\u20132040 (2003)","journal-title":"Proc. IEEE"},{"key":"316_CR16","unstructured":"Oka, M., Kato, K., Xu, Y., Liang, L., Wen, F.: Scribble-a-secret: Similarity-based password authentication using sketches. In: In Proc. of the 19th International Conference on Pattern Recognition, pp. 1\u20134 (2008)"},{"key":"316_CR17","unstructured":"Ortega-Garcia J. andFierrez-Aguilar, J., Simon, D., Gonzalez, J., Faundez, M., Espinosa, V., Satue A.\u00a0andHernaez, I., Igarza, J.J., Vivaracho, C., Escudero, D., Moro, Q.I.: Mcyt baseline corpus: A bimodal biometric database. IEEE Proc. Vis. Image Signal Process. Spec. Issue Biom. Internet 150(6), 395\u2013401 (2003)"},{"key":"316_CR18","doi-asserted-by":"crossref","unstructured":"Plamondon, R., Pirlo, G., Impedovo, D.: On-line Signature Verification, chap.\u00a027, pp. 917\u2013947. Springer (2014)","DOI":"10.1007\/978-0-85729-859-1_30"},{"issue":"1","key":"316_CR19","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/34.824821","volume":"22","author":"R Plamondon","year":"2000","unstructured":"Plamondon, R., Srihari, S.N.: Online and off-line handwriting recognition: a comprehensive survey. IEEE Trans. PAMI 22(1), 63\u201384 (2000)","journal-title":"IEEE Trans. PAMI"},{"key":"316_CR20","unstructured":"Riesen, K., Hanne, T., Schmidt, R.: Sketch-based user authentication with a novel string edit distance model. IEEE Trans. Syst. Man Cybern. Syst. PP(99) (2016)"},{"issue":"10","key":"316_CR21","doi-asserted-by":"publisher","first-page":"4611","DOI":"10.1109\/TIP.2014.2348802","volume":"23","author":"J Roth","year":"2014","unstructured":"Roth, J., Liu, X., Metaxas, D.: On continuous user authentication via typing behavior. IEEE Trans. Image Process. 23(10), 4611\u20134624 (2014)","journal-title":"IEEE Trans. Image Process."},{"key":"316_CR22","doi-asserted-by":"crossref","unstructured":"Sae-Bae, N., Memon, N.: Online signature verification on mobile devices. IEEE Trans. Inf. Forensics Secur. 9(6), 933\u2014947 (2014)","DOI":"10.1109\/TIFS.2014.2316472"},{"key":"316_CR23","doi-asserted-by":"crossref","unstructured":"Sakoe, H., Chiba, S.: Dynamic programming algorithm optimization for spoken word recognition. Trans. Acoust. Speech Signal Process. 26, 43\u201349 (1978)","DOI":"10.1109\/TASSP.1978.1163055"},{"key":"316_CR24","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/TASSP.1978.1163055","volume":"26","author":"H Sakoe","year":"1978","unstructured":"Sakoe, H., Chiba, S.: Dynamic programming algorithm optimization for spoken word recognition. IEEE Trans. Acoust. Speech Signal Process. 26, 43\u201349 (1978)","journal-title":"IEEE Trans. Acoust. Speech Signal Process."},{"key":"316_CR25","doi-asserted-by":"crossref","unstructured":"Stajano, F.: No more passwords. In: In Proc.\u00a0Security Protocols Workshop, pp. 49\u201381 (2011)","DOI":"10.1007\/978-3-642-25867-1_6"},{"issue":"1\u20133","key":"316_CR26","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/S0019-9958(85)80046-2","volume":"64","author":"E Ukkonen","year":"1985","unstructured":"Ukkonen, E.: Algorithms for approximate string matching. Inf. Control 64(1\u20133), 100\u2013118 (1985)","journal-title":"Inf. Control"},{"issue":"1","key":"316_CR27","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.patcog.2008.07.008","volume":"42","author":"C Vivaracho-Pascual","year":"2009","unstructured":"Vivaracho-Pascual, C., Faundez-Zanuy, M., Pascual, J.M.: An efficient low cost approach for on-line signature recognition based on length normalization and fractional distances. Pattern Recognit. 42(1), 183\u2013193 (2009)","journal-title":"Pattern Recognit."},{"key":"316_CR28","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.patcog.2015.09.032","volume":"51","author":"W Wong","year":"2016","unstructured":"Wong, W., Teoh, A., Kho, Y., Wong, M.: Kernel PCA enabled bit-string representation for minutiae-based cancellable fingerprint template. Pattern Recognit. 51, 197\u2013208 (2016)","journal-title":"Pattern Recognit."},{"key":"316_CR29","doi-asserted-by":"crossref","unstructured":"Yanikoglu, B., Kholmatov, A.: Online signature verification using fourier descriptors. Eur. J. Adv. Signal Process. (1\u201314) (2009)","DOI":"10.1155\/2009\/260516"}],"container-title":["International Journal on Document Analysis and Recognition (IJDAR)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10032-019-00316-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10032-019-00316-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10032-019-00316-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,10]],"date-time":"2020-02-10T19:13:24Z","timestamp":1581362004000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10032-019-00316-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,11]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["316"],"URL":"https:\/\/doi.org\/10.1007\/s10032-019-00316-1","relation":{},"ISSN":["1433-2833","1433-2825"],"issn-type":[{"type":"print","value":"1433-2833"},{"type":"electronic","value":"1433-2825"}],"subject":[],"published":{"date-parts":[[2019,2,11]]},"assertion":[{"value":"26 June 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 January 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 February 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}