{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T07:44:58Z","timestamp":1775807098559,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T00:00:00Z","timestamp":1749600000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T00:00:00Z","timestamp":1749600000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["IJDAR"],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1007\/s10032-025-00537-7","type":"journal-article","created":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T12:48:11Z","timestamp":1749646091000},"page":"137-149","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["PAST: Pairwise attention swin transformer for offline signature verification"],"prefix":"10.1007","volume":"29","author":[{"given":"Yu-Jie","family":"Xiong","sequence":"first","affiliation":[]},{"given":"Jian-Xin","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Dong-Hai","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Xi-Jiong","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Xi-He","family":"Qiu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,11]]},"reference":[{"key":"537_CR1","unstructured":"Kaur, H., Kumar, M., Signature Identification and Verification Techniques: State-of-the-Art Work. Journal of Ambient Intelligence and Humanized Computing, 1\u201319 (2021)"},{"issue":"6","key":"537_CR2","doi-asserted-by":"publisher","first-page":"1756","DOI":"10.1109\/TCAD.2022.3207328","volume":"42","author":"J Zhou","year":"2023","unstructured":"Zhou, J., Shen, Y., Li, L., Zhuo, C.: Swarm Intelligence-Based Task Scheduling for Enhancing Security for IoT Devices. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 42(6), 1756\u20131769 (2023)","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"key":"537_CR3","first-page":"1","volume":"73","author":"P Cong","year":"2023","unstructured":"Cong, P., Zhou, J., Wang, J., Wu, Z., Hu, S.: Learning-Based Cloud Server Configuration for Energy Minimization Under Reliability Constraint. IEEE Transactions on Reliability 73, 1\u201313 (2023)","journal-title":"IEEE Transactions on Reliability"},{"issue":"8","key":"537_CR4","doi-asserted-by":"publisher","first-page":"2153","DOI":"10.1109\/TIFS.2019.2894031","volume":"14","author":"LG Hafemann","year":"2019","unstructured":"Hafemann, L.G., Sabourin, R., Oliveira, L.S.: Characterizing and evaluating adversarial examples for offline handwritten signature verification. IEEE Transactions on Information Forensics and Security 14(8), 2153\u20132166 (2019)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"537_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.108009","volume":"118","author":"L Liu","year":"2021","unstructured":"Liu, L., Huang, L., Yin, F., Chen, Y.: Offline Signature Verification Using a Region Based Deep Metric Learning Network. Pattern Recognition 118, 108009 (2021)","journal-title":"Pattern Recognition"},{"key":"537_CR6","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.patcog.2017.05.012","volume":"70","author":"LG Hafemann","year":"2017","unstructured":"Hafemann, L.G., Sabourin, R., Oliveira, L.S.: Learning features for offline handwritten signature verification using deep convolutional neural networks. Pattern Recognition 70, 163\u2013176 (2017)","journal-title":"Pattern Recognition"},{"key":"537_CR7","doi-asserted-by":"crossref","unstructured":"Bromley, J., Guyon, I., LeCun, Y., Sckinger, E.: Signature verification using a \u201dSiamese\u201d time delay neural network. In Advances in neural information processing systems (NIPS) 6, 737\u2013744 (1993)","DOI":"10.1142\/S0218001493000339"},{"key":"537_CR8","doi-asserted-by":"crossref","unstructured":"Xiong, Y.-J., Cheng, S.-Y.: Attention Based Multiple Siamese Network for Offline Signature Verification. In International Conference on Document Analysis and Recognition (ICDAR), 337\u2013349 (2021)","DOI":"10.1007\/978-3-030-86334-0_22"},{"key":"537_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114249","volume":"168","author":"R Ghosh","year":"2021","unstructured":"Ghosh, R.: A Recurrent Neural Network based deep learning model for offline signature verification and recognition system. Expert Systems with Applications 168, 114249 (2021)","journal-title":"Expert Systems with Applications"},{"key":"537_CR10","doi-asserted-by":"publisher","first-page":"14571","DOI":"10.1007\/s10489-022-03318-5","volume":"52","author":"Q Shen","year":"2022","unstructured":"Shen, Q., Luan, F.-J., Yuan, S.: Multi-scale residual based siamese neural network for writer-independent online signature verification. Applied Intelligence 52, 14571\u201314589 (2022)","journal-title":"Applied Intelligence"},{"key":"537_CR11","unstructured":"Dey, S., Dutta, A., Toledo, J.I., Ghosh, S.K., Pal, U.: Signet: convolutional siamese network for writer independent offline signature verification. (2017) arXiv preprint arXiv:1707.02131"},{"key":"537_CR12","unstructured":"Dosovitskiy, A., Beyer, L., Kolesnikov, A., Weissenborn, D.: An image is worth 16x16 words: Transformers for image recognition at scale. In International Conference on Learning Representations. (2021) https:\/\/openreview.net\/forum?id=YicbFdNTTy"},{"key":"537_CR13","unstructured":"Touvron, H., Cord, M., Douze, M., Massa, F.: Training data-efficient image transformers & distillation through attention. In Proceedings of the 38th International Conference on Machine Learning, 10347\u201310357 (2021)"},{"key":"537_CR14","doi-asserted-by":"crossref","unstructured":"Liu, Z., Lin, Y., Cao, Y., Hu, H.: Swin Transformer: Hierarchical Vision Transformer Using Shifted Windows. In Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV), October, 10012-10022 (2021)","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"537_CR15","unstructured":"Chen, C.-F., Panda, R., Fan, Q.: Regionvit: Regional-to-local attention for vision transformers (2021). arXiv preprint arXiv:2106.02689"},{"key":"537_CR16","unstructured":"Zhou, D., Kang, B., Jin, X., Yang, L.: Deepvit: Towards deeper vision transformer. (2021) arXiv preprint arXiv:2103.11886"},{"key":"537_CR17","doi-asserted-by":"crossref","unstructured":"Wang, W., Xie, E., Li, X., Fan, D.-P.: Pyramid vision transformer: A versatile backbone for dense prediction without convolutions. In IEEE International Conference on Computer Vision (ICCV), 568\u2013578 (2021)","DOI":"10.1109\/ICCV48922.2021.00061"},{"key":"537_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2023.109882","volume":"145","author":"H Li","year":"2024","unstructured":"Li, H., Wei, P., Ma, Z., Li, C., Zheng, N.: TransOSV: Offline Signature Verification with Transformers. Pattern Recognition 145, 109882 (2024)","journal-title":"Pattern Recognition"},{"key":"537_CR19","doi-asserted-by":"crossref","unstructured":"Chu, J., Zhang, W., Zheng, Y., Ahmad, R.: Signature Verification by Multi-Size Assembled-Attention with the Backbone of Swin-Transformer. Research Square (2023)","DOI":"10.21203\/rs.3.rs-2533077\/v1"},{"key":"537_CR20","doi-asserted-by":"crossref","unstructured":"Wei, P., Li, H., Hu, P.: Inverse discriminative networks for handwritten signature verification. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 5764\u20135772 (2019)","DOI":"10.1109\/CVPR.2019.00591"},{"key":"537_CR21","doi-asserted-by":"crossref","unstructured":"Srinivasan, H., Srihari, S.N., Beal, M.J.: Machine learning for signature verification. In Conference on Computer Vision, Graphics and Image Processing (ICVGIP), 761\u2013775 (2006)","DOI":"10.1007\/11949619_68"},{"key":"537_CR22","doi-asserted-by":"crossref","unstructured":"Pal, S., Alaei, A., Pal, U., Blumenstein, M.: Performance of an off-line signature verification method based on texture features on a large indic-script signature dataset. In International Workshop on Document Analysis Systems (DAS), 72\u201377 (2016)","DOI":"10.1109\/DAS.2016.48"},{"issue":"1","key":"537_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1049\/iet-bmt.2015.0058","volume":"6","author":"A Soleimani","year":"2017","unstructured":"Soleimani, A., Fouladi, K., Araabi, B.N.: UTSig: A Persian offline signature dataset. IET Biometrics 6(1), 1\u20138 (2017)","journal-title":"IET Biometrics"},{"key":"537_CR24","doi-asserted-by":"crossref","unstructured":"S\u00e1nchez, J.A., Romero, V., Toselli, A.H., Vidal, E.: ICFHR2016 Competition on Handwritten Text Recognition on the READ Dataset. In 2016 15th International Conference on Frontiers in Handwriting Recognition (ICFHR) (pp. 630\u2013635) (2016)","DOI":"10.1109\/ICFHR.2016.0120"},{"key":"537_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0069897","volume":"8","author":"J Galbally","year":"2013","unstructured":"Galbally, J., Martinez-Diaz, M., Fierrez, J.: Aging in Biometrics: An Experimental Analysis on On-Line Signature. PLOS ONE 8, 1\u201317 (2013)","journal-title":"PLOS ONE"},{"key":"537_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2022.105639","volume":"118","author":"J-X Ren","year":"2023","unstructured":"Ren, J.-X., Xiong, Y.-J., Zhan, H., Huang, B.: 2C2S: A Two-Channel and Two-Stream Transformer-based Framework for Offline Signature Verification. Engineering Applications of Artificial Intelligence 118, 105639 (2023)","journal-title":"Engineering Applications of Artificial Intelligence"},{"key":"537_CR27","doi-asserted-by":"crossref","unstructured":"Li, C., Lin, F., Wang, Z., Yu, G.: DeepHSV: User-independent offline signature verification using two-channel CNN. In International Conference on Document Analysis and Recognition (ICDAR), 166\u2013171 (2019)","DOI":"10.1109\/ICDAR.2019.00035"},{"issue":"12","key":"537_CR28","doi-asserted-by":"publisher","first-page":"8737","DOI":"10.1007\/s00521-019-04220-x","volume":"31","author":"AK Bhunia","year":"2019","unstructured":"Bhunia, A.K., Alaei, A., Roy, P.P.: Signature verification approach using fusion of hybrid texture features. Neural Computing and Applications 31(12), 8737\u20138748 (2019)","journal-title":"Neural Computing and Applications"},{"key":"537_CR29","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.patrec.2018.01.021","volume":"139","author":"M Sharif","year":"2020","unstructured":"Sharif, M., Khan, M.A., Faisal, M., Yasmin, M.: A framework for offline signature verification system: Best features selection approach. Pattern Recognition Letters 139, 50\u201359 (2020)","journal-title":"Pattern Recognition Letters"},{"key":"537_CR30","doi-asserted-by":"crossref","unstructured":"Chattopadhyay, S., Manna, S., Bhattacharya, S., Pal, U.: SURDS: Self-Supervised Attention-guided Reconstruction and Dual Triplet Loss for Writer Independent Offline Signature Verification. In International Conference on Pattern Recognition (ICPR), 1600-1606 (2022)","DOI":"10.1109\/ICPR56361.2022.9956442"},{"key":"537_CR31","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1109\/TMM.2021.3056217","volume":"24","author":"H Li","year":"2021","unstructured":"Li, H., Wei, P., Hu, P.: AVN: An Adversarial Variation Network Model for Handwritten Signature Verification. IEEE Transactions on Multimedia 24, 594\u2013608 (2021)","journal-title":"IEEE Transactions on Multimedia"},{"key":"537_CR32","doi-asserted-by":"crossref","unstructured":"Chattopadhyay, S., Manna, S., Bhattacharya, S., Pal, U.: SURDS: Self-Supervised Attention-guided Reconstruction and Dual Triplet Loss for Writer Independent Offline Signature Verification. In 2022 International Conference on Pattern Recognition (ICPR), 1600-1606 (2022)","DOI":"10.1109\/ICPR56361.2022.9956442"},{"key":"537_CR33","doi-asserted-by":"crossref","unstructured":"Jadhav, S.K., Chavan, M.K.: Symbolic representation model for off-line signature verification. In International Conference on Computing, Communication and Networking Technologies (ICCCNT), 1\u20135 (2018)","DOI":"10.1109\/ICCCNT.2018.8494145"},{"key":"537_CR34","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.patrec.2016.05.023","volume":"80","author":"A Soleimani","year":"2016","unstructured":"Soleimani, A., Araabi, B.N., Fouladi, K.: Deep multitask metric learning for offline signature verification. Pattern Recognition Letters 80, 84\u201390 (2016)","journal-title":"Pattern Recognition Letters"},{"key":"537_CR35","unstructured":"Rezaei, M., Naderi, N.: Persian signature verification using fully convolutional networks. (2019) arXiv preprint arXiv:1909.09720"},{"key":"537_CR36","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1016\/j.patrec.2019.06.024","volume":"125","author":"P Maergner","year":"2019","unstructured":"Maergner, P., Pondenkandath, V., Alberti, M., Liwicki, M.: Combining Graph Edit Distance and Triplet Networks for Offline Signature Verification. Pattern Recognition Letters 125, 527\u2013533 (2019)","journal-title":"Pattern Recognition Letters"},{"key":"537_CR37","doi-asserted-by":"publisher","first-page":"35109","DOI":"10.1007\/s11042-020-08857-y","volume":"79","author":"AB Jagtap","year":"2020","unstructured":"Jagtap, A.B., Sawat, D.D., Hegadi, R.S., Hegadi, R.S.: Verification of Genuine and Forged Offline Signatures using Siamese Neural Network (SNN). Multimedia Tools and Applications 79, 35109\u201335123 (2020)","journal-title":"Multimedia Tools and Applications"},{"issue":"5","key":"537_CR38","doi-asserted-by":"publisher","first-page":"951","DOI":"10.1109\/TPAMI.2016.2560810","volume":"39","author":"M Diaz","year":"2016","unstructured":"Diaz, M., Ferrer, M.A., Eskander, G.S., Sabourin, R.: Generation of Duplicated Off-line Signature Images for Verification Systems. IEEE Transactions on Pattern Analysis and Machine Intelligence 39(5), 951\u2013964 (2016)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"2","key":"537_CR39","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1016\/j.patcog.2010.07.028","volume":"44","author":"JF Vargas","year":"2011","unstructured":"Vargas, J.F., Ferrer, M.A., Travieso, C.M., Alonso, J.B.: Off-line Signature Verification Based on Grey Level Information using Texture Features. Pattern Recognition 44(2), 375\u2013385 (2011)","journal-title":"Pattern Recognition"},{"key":"537_CR40","doi-asserted-by":"crossref","unstructured":"\u00c7a\u011flayan, S.C., Uyan\u0131k, \u015e., \u00c7al\u0131k, N.: Wet-Ink Signature Forgery Detection Using Siamese ResNeXt. In 2024 32nd Signal Processing and Communications Applications Conference (SIU), 1-4 (2024)","DOI":"10.1109\/SIU61531.2024.10600997"},{"key":"537_CR41","doi-asserted-by":"crossref","unstructured":"Dutta, A., Pal, U., Llad\u00f3s, J.: Compact correlated features for writer independent signature verification. In 2016 23rd International Conference on pattern Recognition (ICPR), 3422-3427 (2016)","DOI":"10.1109\/ICPR.2016.7900163"}],"container-title":["International Journal on Document Analysis and Recognition (IJDAR)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10032-025-00537-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10032-025-00537-7","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10032-025-00537-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T06:49:32Z","timestamp":1775803772000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10032-025-00537-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,11]]},"references-count":41,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,3]]}},"alternative-id":["537"],"URL":"https:\/\/doi.org\/10.1007\/s10032-025-00537-7","relation":{},"ISSN":["1433-2833","1433-2825"],"issn-type":[{"value":"1433-2833","type":"print"},{"value":"1433-2825","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,11]]},"assertion":[{"value":"9 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 May 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 June 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 June 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests to declare relevant to this article\u2019s content.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"All the authors have been informed.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}}]}}