{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T21:08:43Z","timestamp":1772140123256,"version":"3.50.1"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2005,11,24]],"date-time":"2005-11-24T00:00:00Z","timestamp":1132790400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pattern Anal Applic"],"published-print":{"date-parts":[[2006,2]]},"DOI":"10.1007\/s10044-005-0016-4","type":"journal-article","created":{"date-parts":[[2005,11,23]],"date-time":"2005-11-23T10:14:30Z","timestamp":1132740870000},"page":"345-356","source":"Crossref","is-referenced-by-count":18,"title":["Online signature verification based on null component analysis and principal component analysis"],"prefix":"10.1007","volume":"8","author":[{"given":"Bin","family":"Li","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"David","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kuanquan","family":"Wang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2005,11,24]]},"reference":[{"issue":"3","key":"16_CR1","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1142\/S0218001494000346","volume":"8","author":"F Leclerc","year":"1994","unstructured":"Leclerc F, Plamondon R (1994) Automatic signature verification: the state of the art\u20141989\u20131993. Int J Pattern Recognit Artif Intell 8(3):643\u2013660","journal-title":"Int J Pattern Recognit Artif Intell"},{"issue":"2","key":"16_CR2","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1109\/5.554220","volume":"85","author":"VS Nalwa","year":"1997","unstructured":"Nalwa VS (1997) Automatic online signature verification. Proc IEEE 85(2):215\u2013239","journal-title":"Proc IEEE"},{"issue":"2","key":"16_CR3","doi-asserted-by":"crossref","first-page":"2963","DOI":"10.1016\/S0031-3203(01)00240-0","volume":"35","author":"AK Jain","year":"2002","unstructured":"Jain AK, Griess FD, Connell SD (2002) Online signature verification. J Pattern Recognit 35(2):2963\u20132972","journal-title":"J Pattern Recognit"},{"issue":"1","key":"16_CR4","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/s100440050007","volume":"3","author":"K Zhang","year":"2000","unstructured":"Zhang K, Pratikakis I, Cornelis J, Nyssen E (2000) Using landmarks to establish a point-to-point correspondence between signatures. J Pattern Anal Appl 3(1):69\u201375","journal-title":"J Pattern Anal Appl"},{"issue":"9","key":"16_CR5","doi-asserted-by":"crossref","first-page":"953","DOI":"10.1109\/34.232079","volume":"15","author":"J Brault","year":"1993","unstructured":"Brault J, Plamondon R (1993) Segmenting handwritten signatures at their perceptually important points. IEEE Trans Pattern Anal Mach Intell 15(9):953\u2013957","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"16_CR6","doi-asserted-by":"crossref","first-page":"2752","DOI":"10.1109\/ICSMC.2000.884413","volume":"4","author":"KW Yue","year":"2000","unstructured":"Yue KW, Wijesoma WS (2000) Improved segmentation and segment association for online signature verification. IEEE Inter Conf Syst Man Cybern 4:2752\u20132756","journal-title":"IEEE Inter Conf Syst Man Cybern"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Wirtz B (1995) Stroke-based time warping for signature verification. In: Proceedings of the 3rd international conference on document analysis and recognition, vol 1, pp 179\u2013182","DOI":"10.1109\/ICDAR.1995.598971"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Wirtz B (1997) Average prototypes for stroke-based signature verification. In: Proceedings of the 4th interernational conference on document analysis and recognition, vol 1, pp 268\u2013272","DOI":"10.1109\/ICDAR.1997.619854"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Rhee TH, Cho SJ, Kim JH (2001) On-line signature verification using model-guided segmentation and discriminative feature selection for skilled forgeries. In: Proceedings of 6th international conference on document analysis and recognition, pp 645\u2013649","DOI":"10.1109\/ICDAR.2001.953869"},{"key":"16_CR10","unstructured":"Qu T, Saddik AE, Adler A (2004) A Stroke based algorithm for dynamic signature verification. In: Proceedings of international conference on electrical and computer engineering, vol 1, pp 461\u2013464"},{"key":"16_CR11","unstructured":"Qu T, Saddik AE, Adler A (2003) Dynamic signature verification system using stroked based features. In: Proceedings of 2003 international conference on haptic, audio and visual environments and their applications, vol 1, pp 83\u201388"},{"key":"16_CR12","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1016\/S0031-3203(03)00229-2","volume":"37","author":"J Lee","year":"2004","unstructured":"Lee J, Yoon H, Soh J, Chun B, Chung Y (2004) Using geometric extrema for segment-to-segment characteristics comparison in online signature verification. J Pattern Recognit 37:93\u2013103","journal-title":"J Pattern Recognit"},{"key":"16_CR13","unstructured":"Lee W, Mokankishnan N, Paulik M (1998) Improved segmentation through dynamic time warping for signature verification using a neural network classifer. In: Image proceedings on 1998 international conference, vol 2, pp 929\u2013933"},{"key":"16_CR14","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1364\/JOSAA.4.000519","volume":"4","author":"L Sirovich","year":"1987","unstructured":"Sirovich L, Kirby M (1987) Low-dimensional procedure for characterization of human faces. J Opt Soc Am 4:519\u2013524","journal-title":"J Opt Soc Am"},{"key":"16_CR15","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1109\/34.41390","volume":"12","author":"M Kirby","year":"1990","unstructured":"Kirby M, Sirovich L (1990) Application of the KL procedure for the characterization of human faces. IEEE Trans Pattern Anal Mach Intell 12:103\u2013108","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"16_CR16","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1162\/jocn.1991.3.1.71","volume":"3","author":"M Turk","year":"1991","unstructured":"Turk M, Pentland A (1991) Eigenfaces for recognition. J Cognit Neurosci 3:71\u201386","journal-title":"J Cognit Neurosci"},{"key":"16_CR17","doi-asserted-by":"crossref","first-page":"1463","DOI":"10.1016\/S0167-8655(02)00386-0","volume":"24","author":"G Lu","year":"2003","unstructured":"Lu G, Zhang D, Wang K (2003) Palmprint recognition using eigenpalms features. Pattern Recognit Lett 24:1463\u20131467","journal-title":"Pattern Recognit Lett"},{"key":"16_CR18","doi-asserted-by":"crossref","first-page":"2829","DOI":"10.1016\/S0167-8655(03)00141-7","volume":"24","author":"X Wu","year":"2003","unstructured":"Wu X, Zhang D, Wang K (2003) Fisherpalms based palmprint recognition. Pattern Recognit Lett 24:2829\u20132838","journal-title":"Pattern Recognit Lett"},{"key":"16_CR19","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.patrec.2004.09.006","volume":"26","author":"R Huber","year":"2005","unstructured":"Huber R, Ramoser H, Mayer K, Penz H, Rubik M (2005) Classification of coins using an eigenspace approach. Pattern Recognit Lett 26:61\u201375","journal-title":"Pattern Recognit Lett"}],"container-title":["Pattern Analysis and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-005-0016-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10044-005-0016-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-005-0016-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T04:02:24Z","timestamp":1559102544000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10044-005-0016-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,11,24]]},"references-count":19,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2006,2]]}},"alternative-id":["16"],"URL":"https:\/\/doi.org\/10.1007\/s10044-005-0016-4","relation":{},"ISSN":["1433-7541","1433-755X"],"issn-type":[{"value":"1433-7541","type":"print"},{"value":"1433-755X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,11,24]]}}}