{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T11:04:43Z","timestamp":1773486283436,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T00:00:00Z","timestamp":1766793600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T00:00:00Z","timestamp":1766793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pattern Anal Applic"],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1007\/s10044-025-01592-w","type":"journal-article","created":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T00:27:06Z","timestamp":1766795226000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A novel fusion of ArcLoss and AutoEncoder for high-precision handwritten signature verification"],"prefix":"10.1007","volume":"29","author":[{"given":"Do Thanh","family":"Ton","sequence":"first","affiliation":[]},{"given":"Duc-Tuan-Anh","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Van-Hau","family":"Nguyen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,27]]},"reference":[{"key":"1592_CR1","doi-asserted-by":"publisher","unstructured":"Hafemann LG, Sabourin R, Oliveira LS (2017) Offline handwritten signature verification literature review. In: 2017 Seventh International Conference on Image Processing Theory, Tools and Applications (IPTA), pp. 1\u20138. https:\/\/doi.org\/10.1109\/IPTA.2017.8310112","DOI":"10.1109\/IPTA.2017.8310112"},{"issue":"5","key":"1592_CR2","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1109\/TSMCC.2008.923866","volume":"38","author":"D Impedovo","year":"2008","unstructured":"Impedovo D, Pirlo G (2008) Automatic signature verification: the state of the art. IEEE Trans Syst Man Cybern Part C (Applications and Reviews) 38(5):609\u2013635. https:\/\/doi.org\/10.1109\/TSMCC.2008.923866","journal-title":"IEEE Trans Syst Man Cybern Part C (Applications and Reviews)"},{"issue":"3","key":"1592_CR3","doi-asserted-by":"publisher","first-page":"966","DOI":"10.1109\/TIFS.2012.2190281","volume":"7","author":"MA Ferrer","year":"2012","unstructured":"Ferrer MA, Vargas JF, Morales A, Ordonez A (2012) Robustness of offline signature verification based on gray level features. IEEE Trans Inf Forensics Secur 7(3):966\u2013977. https:\/\/doi.org\/10.1109\/TIFS.2012.2190281","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"6","key":"1592_CR4","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1145\/3274658","volume":"51","author":"M Diaz","year":"2019","unstructured":"Diaz M, Ferrer MA, Impedovo D, Malik MI, Pirlo G, Plamondon R (2019) A perspective analysis of handwritten signature technology. ACM Comput Surv 51(6):117\u2013111739. https:\/\/doi.org\/10.1145\/3274658","journal-title":"ACM Comput Surv"},{"issue":"7553","key":"1592_CR5","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/NATURE14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun Y, Bengio Y, Hinton GE (2015) Deep learning. Nature 521(7553):436\u2013444. https:\/\/doi.org\/10.1038\/NATURE14539","journal-title":"Nature"},{"key":"1592_CR6","doi-asserted-by":"publisher","unstructured":"Sun Y, Wang X, Tang X (2014) Deep learning face representation from predicting 10,000 classes. In: 2014 IEEE Conference on computer vision and pattern recognition, pp. 1891\u20131898. https:\/\/doi.org\/10.1109\/CVPR.2014.244","DOI":"10.1109\/CVPR.2014.244"},{"key":"1592_CR7","unstructured":"Melzi P, Tolosana R, Vera-Rodriguez R, Delgado-Santos P, Stragapede G, Fierrez J, Ortega-Garcia J (2023) Exploring transformers for on-line handwritten signature verification. https:\/\/arxiv.org\/abs\/2307.01663"},{"key":"1592_CR8","doi-asserted-by":"crossref","unstructured":"Chauhan M, Hashemi MA, Satbhai A, Ali MB, Ramamurthy B, Gao M, Lyu S, Srihari S (2024) Self-supervised learning based handwriting verification. https:\/\/arxiv.org\/abs\/2405.18320","DOI":"10.1049\/icp.2024.3302"},{"issue":"6","key":"1592_CR9","doi-asserted-by":"publisher","first-page":"2613","DOI":"10.18280\/ts.400623","volume":"40","author":"F Ozyurt","year":"2023","unstructured":"Ozyurt F, Majidpour J, Rashid TA, Koc C (2023) Offline handwriting signature verification: a transfer learning and feature selection approach. Traitement du Signal 40(6):2613\u20132622. https:\/\/doi.org\/10.18280\/ts.400623","journal-title":"Traitement du Signal"},{"key":"1592_CR10","doi-asserted-by":"crossref","unstructured":"Lai S, Jin L, Zhu Y, Li Z, Lin L (2022) Synsig2vec: forgery-free learning of dynamic signature representations by sigma lognormal-based synthesis and 1d cnn 44","DOI":"10.1109\/TPAMI.2021.3087619"},{"key":"1592_CR11","doi-asserted-by":"crossref","unstructured":"Zhang H, Guo J, Li K, Zhang Y, Zhao Y (2024) Offline signature verification based on feature disentangling aided variational autoencoder. https:\/\/arxiv.org\/abs\/2409.19754","DOI":"10.1109\/ICMLCA63499.2024.10754373"},{"key":"1592_CR12","unstructured":"Dey S, Dutta A, Toledo JI, Ghosh SK, Llados J, Pal U (2017) Signet: convolutional Siamese network for writer independent offline signature verification. arXiv arXIv:abs\/1707.02131"},{"key":"1592_CR13","doi-asserted-by":"publisher","first-page":"5962","DOI":"10.1109\/TPAMI.2021.3087709","volume":"44","author":"J Deng","year":"2018","unstructured":"Deng J, Guo J, Yang J, Xue N, Kotsia I, Zafeiriou S (2018) Arcface: additive angular margin loss for deep face recognition. IEEE Trans Pattern Anal Mach Intell 44:5962\u20135979","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"1592_CR14","unstructured":"Bank D, Koenigstein N, Giryes R (2020) Autoencoders. arXiv arXiv:abs\/2003.05991"},{"key":"1592_CR15","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2015) Deep residual learning for image recognition. In: 2016 IEEE Conference on computer vision and pattern recognition (CVPR), 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"key":"1592_CR16","unstructured":"Howard AG, Zhu M, Chen B, Kalenichenko D, Wang W, Weyand T, Andreetto M, Adam H (2017) Mobilenets: efficient convolutional neural networks for mobile vision applications. arXiv arXiv:abs\/1704.04861"},{"key":"1592_CR17","doi-asserted-by":"publisher","unstructured":"Yan K, Zhang Y, Tang H, Ren C, Zhang J, Wang G, Wang H (2022) Signature detection, restoration, and verification: a novel Chinese document signature forgery detection benchmark. In: 2022 IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 5159\u20135168. https:\/\/doi.org\/10.1109\/CVPRW56347.2022.00564","DOI":"10.1109\/CVPRW56347.2022.00564"},{"issue":"2","key":"1592_CR18","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/0031-3203(89)90059-9","volume":"22","author":"R Plamondon","year":"1989","unstructured":"Plamondon R, Lorette G (1989) Automatic signature verification and writer identification the state of the art. Pattern Recogn 22(2):107\u2013131. https:\/\/doi.org\/10.1016\/0031-3203(89)90059-9","journal-title":"Pattern Recogn"},{"key":"1592_CR19","doi-asserted-by":"publisher","unstructured":"Guo JK, Doermann D, Rosenfeld A (1997) Local correspondence for detecting random forgeries. In: Proceedings of the Fourth International Conference on Document Analysis and Recognition 1:319\u20133231. https:\/\/doi.org\/10.1109\/ICDAR.1997.619864","DOI":"10.1109\/ICDAR.1997.619864"},{"key":"1592_CR20","doi-asserted-by":"publisher","unstructured":"Justino EJR, Bortolozzi F, Sabourin R (2001) Off-line signature verification using hmm for random, simple and skilled forgeries. In: Proceedings of Sixth International Conference on document analysis and recognition, 1031\u20131034. https:\/\/doi.org\/10.1109\/ICDAR.2001.953942","DOI":"10.1109\/ICDAR.2001.953942"},{"key":"1592_CR21","doi-asserted-by":"publisher","unstructured":"Muramatsu D, Matsumoto T (2003) An hmm online signature verifier incorporating signature trajectories. In: Seventh International Conference on document analysis and recognition, 2003. Proceedings., 438\u20134421. https:\/\/doi.org\/10.1109\/ICDAR.2003.1227705","DOI":"10.1109\/ICDAR.2003.1227705"},{"key":"1592_CR22","unstructured":"Schmidhuber J (2014) Deep learning in neural networks: an overview. CoRR abs\/1404.7828 arXiv:1404.7828"},{"key":"1592_CR23","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.patcog.2017.05.012","volume":"70","author":"LG Hafemann","year":"2017","unstructured":"Hafemann LG, Sabourin R, Oliveira LS (2017) Learning features for offline handwritten signature verification using deep convolutional neural networks. Pattern Recognit 70:163\u2013176. https:\/\/doi.org\/10.1016\/j.patcog.2017.05.012","journal-title":"Pattern Recognit"},{"key":"1592_CR24","doi-asserted-by":"publisher","first-page":"616","DOI":"10.1007\/978-3-319-50832-0_60","volume-title":"Advances in visual computing","author":"H Rantzsch","year":"2016","unstructured":"Rantzsch H, Yang H, Meinel C (2016) Signature embedding: writer independent offline signature verification with deep metric learning. In: Bebis G, Boyle R, Parvin B, Koracin D, Porikli F, Skaff S, Entezari A, Min J, Iwai D, Sadagic A, Scheidegger C, Isenberg T (eds) Advances in visual computing. Springer, Cham, pp 616\u2013625"},{"key":"1592_CR25","doi-asserted-by":"publisher","unstructured":"Vincent P, Larochelle H, Bengio Y, Manzagol P-A (2008) Extracting and composing robust features with denoising autoencoders. In: Proceedings of the 25th International Conference on Machine Learning. ICML \u201908, pp. 1096\u20131103. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/1390156.1390294","DOI":"10.1145\/1390156.1390294"},{"key":"1592_CR26","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/978-3-642-25085-9_62","volume-title":"Progress in pattern recognition, image analysis, computer vision, and applications","author":"B Ribeiro","year":"2011","unstructured":"Ribeiro B, Gon\u00e7alves I, Santos S, Kovacec A (2011) Deep learning networks for off-line handwritten signature recognition. In: San Martin C, Kim S-W (eds) Progress in pattern recognition, image analysis, computer vision, and applications. Springer, Berlin, Heidelberg, pp 523\u2013532"},{"key":"1592_CR27","doi-asserted-by":"crossref","unstructured":"Hafemann LG, Sabourin R, Oliveira L (2016) Writer-independent feature learning for offline signature verification using deep convolutional neural networks. In: 2016 International Joint Conference on Neural Networks (IJCNN), 2576\u20132583","DOI":"10.1109\/IJCNN.2016.7727521"},{"key":"1592_CR28","doi-asserted-by":"crossref","unstructured":"Zhang Z, Liu X, Cui Y (2016) Multi-phase offline signature verification system using deep convolutional generative adversarial networks. In: 2016 9th International Symposium on Computational Intelligence and Design (ISCID) 02:103\u2013107","DOI":"10.1109\/ISCID.2016.2033"},{"key":"1592_CR29","doi-asserted-by":"publisher","DOI":"10.3390\/sym14061216","author":"W Xiao","year":"2022","unstructured":"Xiao W, Ding Y (2022) A two-stage Siamese network model for offline handwritten signature verification. Symmetry. https:\/\/doi.org\/10.3390\/sym14061216","journal-title":"Symmetry"},{"key":"1592_CR30","unstructured":"Loshchilov I, Hutter F (2017) Fixing weight decay regularization in adam. CoRR abs\/1711.05101 arXiv:1711.05101"},{"key":"1592_CR31","unstructured":"Han S, Mao H, Dally WJ (2016) Deep compression: Compressing deep neural network with pruning, trained quantization and huffman coding. In: Bengio Y, LeCun Y (eds) 4th International Conference on Learning Representations, ICLR 2016, San Juan, Puerto Rico, May 2-4, 2016, Conference Track Proceedings. http:\/\/arxiv.org\/abs\/1510.00149"},{"key":"1592_CR32","doi-asserted-by":"publisher","unstructured":"Sandler M, Howard A, Zhu M, Zhmoginov A, Chen L (2018) Mobilenetv2: inverted residuals and linear bottlenecks. In: 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 4510\u20134520. IEEE Computer Society, Los Alamitos, CA, USA. https:\/\/doi.org\/10.1109\/CVPR.2018.00474","DOI":"10.1109\/CVPR.2018.00474"},{"key":"1592_CR33","unstructured":"Nader E (2023) Handwritten Signatures Forgery Detection Using Pre-Trained Deep Learning Methods}: Proceedings of the 2nd InternationalCongress of New Horizons in Sciences (INCOHIS 2023 Spring), 2023, Istanbul, Turkey, May 224\u2013229. https:\/\/www.researchgate.net\/publication\/371746294_HANDWRITTEN_SIGNATURES_FORGERY_DETECTION_USING_PRETRAINED_DEEP_LEARNING_METHODS"}],"container-title":["Pattern Analysis and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-025-01592-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10044-025-01592-w","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-025-01592-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T10:38:28Z","timestamp":1773484708000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10044-025-01592-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,27]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,3]]}},"alternative-id":["1592"],"URL":"https:\/\/doi.org\/10.1007\/s10044-025-01592-w","relation":{},"ISSN":["1433-7541","1433-755X"],"issn-type":[{"value":"1433-7541","type":"print"},{"value":"1433-755X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,27]]},"assertion":[{"value":"9 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"11"}}