{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T04:17:37Z","timestamp":1771474657746,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"27-28","license":[{"start":{"date-parts":[[2020,4,7]],"date-time":"2020-04-07T00:00:00Z","timestamp":1586217600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,4,7]],"date-time":"2020-04-07T00:00:00Z","timestamp":1586217600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1007\/s11042-020-08728-6","type":"journal-article","created":{"date-parts":[[2020,4,7]],"date-time":"2020-04-07T07:02:57Z","timestamp":1586242977000},"page":"19993-20018","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":54,"title":["Handwritten signature verification using shallow convolutional neural network"],"prefix":"10.1007","volume":"79","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3612-8690","authenticated-orcid":false,"given":"Anamika","family":"Jain","sequence":"first","affiliation":[]},{"given":"Satish Kumar","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Krishna Pratap","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,7]]},"reference":[{"key":"8728_CR1","doi-asserted-by":"crossref","unstructured":"Alcantarilla PF, Bartoli A, Davison AJ (2012) Kaze features. In: Fitzgibbon A., Lazebnik S., Perona P., Sato Y., Schmid C (eds) Computer vision \u2013 ECCV 2012. Springer, Berlin, pp 214\u2013227","DOI":"10.1007\/978-3-642-33783-3_16"},{"issue":"14","key":"8728_CR2","doi-asserted-by":"publisher","first-page":"15341","DOI":"10.1007\/s11042-016-3831-2","volume":"76","author":"AN Azmi","year":"2017","unstructured":"Azmi AN, Nasien D, Omar FS (2017) Biometric signature verification system based on freeman chain code and k-nearest neighbor. Multimed Tools Appl 76 (14):15341\u201315355","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"8728_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0031-3203(96)00059-3","volume":"30","author":"R Bajaj","year":"1997","unstructured":"Bajaj R, Chaudhury S (1997) Signature verification using multiple neural classifiers. Pattern Recogn 30(1):1\u20137","journal-title":"Pattern Recogn"},{"issue":"1","key":"8728_CR4","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/S0952-1976(00)00064-6","volume":"14","author":"H Baltzakis","year":"2001","unstructured":"Baltzakis H, Papamarkos N (2001) A new signature verification technique based on a two-stage neural network classifier. Eng Appl Artif Intell 14 (1):95\u2013103. https:\/\/doi.org\/10.1016\/S0952-1976(00)00064-6. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0952197600000646","journal-title":"Eng Appl Artif Intell"},{"key":"8728_CR5","doi-asserted-by":"crossref","unstructured":"Berkay Yilmaz M, Ozturk K (2018) Hybrid user-independent and user-dependent offline signature verification with a two-channel cnn. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp 526\u2013534","DOI":"10.1109\/CVPRW.2018.00094"},{"issue":"12","key":"8728_CR6","doi-asserted-by":"publisher","first-page":"5507","DOI":"10.1007\/s00034-018-0827-3","volume":"37","author":"RK Bhukya","year":"2018","unstructured":"Bhukya RK, Sarma BD, Prasanna SM (2018) End point detection using speech-specific knowledge for text-dependent speaker verification. Circ Syst Signal Process 37(12):5507\u20135539","journal-title":"Circ Syst Signal Process"},{"key":"8728_CR7","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/j.eswa.2018.04.035","volume":"107","author":"W Bouamra","year":"2018","unstructured":"Bouamra W, Djeddi C, Nini B, Diaz M, Siddiqi I (2018) Towards the design of an offline signature verifier based on a small number of genuine samples for training. Expert Syst Appl 107:182\u2013195","journal-title":"Expert Syst Appl"},{"issue":"20","key":"8728_CR8","doi-asserted-by":"publisher","first-page":"20457","DOI":"10.1007\/s11042-016-3987-9","volume":"76","author":"N Charfi","year":"2017","unstructured":"Charfi N, Trichili H, Alimi AM, Solaiman B (2017) Bimodal biometric system for hand shape and palmprint recognition based on sift sparse representation. Multimed Tools Appl 76(20):20457\u201320482","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"8728_CR9","doi-asserted-by":"publisher","first-page":"5503","DOI":"10.1007\/s11042-017-4464-9","volume":"77","author":"SA Chaudhry","year":"2018","unstructured":"Chaudhry SA, Naqvi H, Khan MK (2018) An enhanced lightweight anonymous biometric based authentication scheme for tmis. Multimed Tools Appl 77(5):5503\u20135524","journal-title":"Multimed Tools Appl"},{"key":"8728_CR10","unstructured":"Cs231n: Convolutional neural networks for visual recognition. http:\/\/cs231n.github.io\/convolutional-networks\/http:\/\/cs231n.github.io\/convolutional-networks\/"},{"key":"8728_CR11","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1016\/j.patrec.2016.02.001","volume":"82","author":"M De Marsico","year":"2016","unstructured":"De Marsico M, Petrosino A, Ricciardi S (2016) Iris recognition through machine learning techniques: a survey. Pattern Recogn Lett 82:106\u2013115","journal-title":"Pattern Recogn Lett"},{"key":"8728_CR12","unstructured":"Dey S, Dutta A, Toledo JI, Ghosh SK, Llad\u00f3s J, Pal U (2017) Signet: Convolutional siamese network for writer independent offline signature verification. arXiv:1707.02131"},{"key":"8728_CR13","doi-asserted-by":"publisher","unstructured":"Dutta A, Pal U, Llad\u00f3s J (2016) Compact correlated features for writer independent signature verification. In: 2016 23Rd international conference on pattern recognition (ICPR), pp 3422\u20133427. https:\/\/doi.org\/10.1109\/ICPR.2016.7900163","DOI":"10.1109\/ICPR.2016.7900163"},{"issue":"3","key":"8728_CR14","doi-asserted-by":"publisher","first-page":"966","DOI":"10.1109\/TIFS.2012.2190281","volume":"7","author":"MA Ferrer","year":"2012","unstructured":"Ferrer MA, Vargas JF, Morales A, Ordonez A (2012) Robustness of offline signature verification based on gray level features. IEEE Trans Inf Forensic Secur 7 (3):966\u2013977. https:\/\/doi.org\/10.1109\/TIFS.2012.2190281","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"8728_CR15","doi-asserted-by":"publisher","unstructured":"Ferrer MA, Diaz-Cabrera M, Morales A (2013) Synthetic off-line signature image generation. In: 2013 International conference on biometrics (ICB), pp 1\u20137. https:\/\/doi.org\/10.1109\/ICB.2013.6612969","DOI":"10.1109\/ICB.2013.6612969"},{"issue":"3","key":"8728_CR16","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1109\/TPAMI.2014.2343981","volume":"37","author":"MA Ferrer","year":"2015","unstructured":"Ferrer MA, Diaz-Cabrera M, Morales A (2015) Static signature synthesis: a neuromotor inspired approach for biometrics. IEEE Trans Pattern Anal Mach Intell 37 (3):667\u2013680","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"8728_CR17","doi-asserted-by":"crossref","unstructured":"Fierrez-Aguilar J, Nanni L, Lopez-Pen\u0307alba J, Ortega-Garcia J, Maltoni D (2005) An on-line signature verification system based on fusion of local and global information. In: Kanade T, Jain A, Ratha NK (eds) Audio- and video-based biometric person authentication. Springer, Berlin, pp 523\u2013532","DOI":"10.1007\/11527923_54"},{"key":"8728_CR18","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.neucom.2017.01.108","volume":"265","author":"B Hadjadji","year":"2017","unstructured":"Hadjadji B, Chibani Y, Nemmour H (2017) An efficient open system for offline handwritten signature identification based on curvelet transform and one-class principal component analysis. Neurocomputing 265:66\u201377. https:\/\/doi.org\/10.1016\/j.neucom.2017.01.108. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0925231217310159. New Trends for Pattern Recognition: Theory and Applications","journal-title":"Neurocomputing"},{"key":"8728_CR19","doi-asserted-by":"crossref","unstructured":"Hafemann LG, Sabourin R, Oliveira LS (2016) Analyzing features learned for offline signature verification using deep cnns. In: 2016 23rd international conference on Pattern recognition (ICPR). IEEE, pp 2989\u20132994","DOI":"10.1109\/ICPR.2016.7900092"},{"key":"8728_CR20","doi-asserted-by":"crossref","unstructured":"Hafemann LG, Sabourin R, Oliveira LS (2016) Writer-independent feature learning for offline signature verification using deep convolutional neural networks. In: 2016 international joint conference on Neural networks (IJCNN). IEEE, pp 2576\u20132583","DOI":"10.1109\/IJCNN.2016.7727521"},{"key":"8728_CR21","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.patcog.2017.05.012","volume":"70","author":"LG Hafemann","year":"2017","unstructured":"Hafemann LG, Sabourin R, Oliveira LS (2017) Learning features for offline handwritten signature verification using deep convolutional neural networks. Pattern Recogn 70:163\u2013176","journal-title":"Pattern Recogn"},{"issue":"3","key":"8728_CR22","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s10032-018-0301-6","volume":"21","author":"LG Hafemann","year":"2018","unstructured":"Hafemann LG, Oliveira LS, Sabourin R (2018) Fixed-sized representation learning from offline handwritten signatures of different sizes. Int J Doc Anal Recogn (IJDAR) 21(3):219\u2013232. https:\/\/doi.org\/10.1007\/s10032-018-0301-6","journal-title":"Int J Doc Anal Recogn (IJDAR)"},{"issue":"3","key":"8728_CR23","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s10032-018-0301-6","volume":"21","author":"LG Hafemann","year":"2018","unstructured":"Hafemann LG, Oliveira LS, Sabourin R (2018) Fixed-sized representation learning from offline handwritten signatures of different sizes. Int J Doc Anal Recogn (IJDAR) 21(3):219\u2013232","journal-title":"Int J Doc Anal Recogn (IJDAR)"},{"issue":"9","key":"8728_CR24","doi-asserted-by":"publisher","first-page":"1904","DOI":"10.1109\/TPAMI.2015.2389824","volume":"37","author":"K He","year":"2015","unstructured":"He K, Zhang X, Ren S, Sun J (2015) Spatial pyramid pooling in deep convolutional networks for visual recognition. IEEE Trans Pattern Anal Mach Intell 37 (9):1904\u20131916. https:\/\/doi.org\/10.1109\/TPAMI.2015.2389824","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"14","key":"8728_CR25","doi-asserted-by":"publisher","first-page":"19253","DOI":"10.1007\/s11042-019-7264-6","volume":"78","author":"L He","year":"2019","unstructured":"He L, Tan H, Huang ZC (2019) Online handwritten signature verification based on association of curvature and torsion feature with hausdorff distance. Multimedia Tools and Applications 78(14):19253\u201319278","journal-title":"Multimedia Tools and Applications"},{"issue":"1","key":"8728_CR26","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TCSVT.2003.818349","volume":"14","author":"AK Jain","year":"2004","unstructured":"Jain AK, Ross A, Prabhakar S (2004) An introduction to biometric recognition. IEEE Trans Circ Syst Video Technol 14(1):4\u201320","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"8728_CR27","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.patrec.2015.12.013","volume":"79","author":"AK Jain","year":"2016","unstructured":"Jain AK, Nandakumar K, Ross A (2016) 50 years of biometric research: Accomplishments, challenges, and opportunities. Pattern Recogn Lett 79:80\u2013105. https:\/\/doi.org\/10.1016\/j.patrec.2015.12.013. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167865515004365","journal-title":"Pattern Recogn Lett"},{"key":"8728_CR28","unstructured":"Lai S, Jin L, Yang W (2017) Online signature verification using recurrent neural network and length-normalized path signature descriptor. In: 2017 14Th IAPR international conference on document analysis and recognition (ICDAR). IEEE, vol 1, pp 400\u2013405"},{"key":"8728_CR29","unstructured":"Liu W, Wen Y, Yu Z, Yang M (2016) Large-margin softmax loss for convolutional neural networks. In: ICML, pp 507\u2013516"},{"key":"8728_CR30","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.patrec.2016.06.016","volume":"80","author":"K Manjunatha","year":"2016","unstructured":"Manjunatha K, Manjunath S, Guru D, Somashekara M (2016) Online signature verification based on writer dependent features and classifiers. Pattern Recogn Lett 80:129\u2013136","journal-title":"Pattern Recogn Lett"},{"key":"8728_CR31","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.patrec.2018.05.019","volume":"113","author":"M Okawa","year":"2018","unstructured":"Okawa M (2018) From bovw to vlad with kaze features: Offline signature verification considering cognitive processes of forensic experts. Pattern Recogn Lett 113:75\u201382","journal-title":"Pattern Recogn Lett"},{"key":"8728_CR32","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1016\/j.patcog.2018.02.027","volume":"79","author":"M Okawa","year":"2018","unstructured":"Okawa M (2018) Synergy of foreground\u2013background images for feature extraction: Offline signature verification using fisher vector with fused kaze features. Pattern Recogn 79:480\u2013489. https:\/\/doi.org\/10.1016\/j.patcog.2018.02.027. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0031320318300803","journal-title":"Pattern Recogn"},{"issue":"6","key":"8728_CR33","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1049\/ip-vis:20031078","volume":"150","author":"J Ortega-Garcia","year":"2003","unstructured":"Ortega-Garcia J, Fierrez-Aguilar J, Simon D, Gonzalez J, Faundez-Zanuy M, Espinosa V, Satue A, Hernaez I, Igarza JJ, Vivaracho C et al (2003) Mcyt baseline corpus: a bimodal biometric database. IEE Proc-Vis Image Signal Process 150 (6):395\u2013401","journal-title":"IEE Proc-Vis Image Signal Process"},{"key":"8728_CR34","doi-asserted-by":"crossref","unstructured":"Pal S, Alaei A, Pal U, Blumenstein M (2016) Performance of an off-line signature verification method based on texture features on a large indic-script signature dataset. In: 2016 12Th IAPR workshop on document analysis systems (DAS). IEEE, pp 72\u201377","DOI":"10.1109\/DAS.2016.48"},{"key":"8728_CR35","doi-asserted-by":"crossref","unstructured":"Pascual-Gaspar JM, Carden\u0307oso-Payo V, Vivaracho-Pascual CE (2009) Practical on-line signature verification. In: Tistarelli M, Nixon MS (eds). Springer, Berlin, pp 1180\u20131189","DOI":"10.1007\/978-3-642-01793-3_119"},{"key":"8728_CR36","unstructured":"Ruder S (2016) An overview of gradient descent optimization algorithms. arXiv:1609.04747"},{"issue":"6","key":"8728_CR37","doi-asserted-by":"publisher","first-page":"933","DOI":"10.1109\/TIFS.2014.2316472","volume":"9","author":"N Sae-Bae","year":"2014","unstructured":"Sae-Bae N, Memon N (2014) Online signature verification on mobile devices. IEEE Trans Inf Forensic Secur 9(6):933\u2013947. https:\/\/doi.org\/10.1109\/TIFS.2014.2316472","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"3","key":"8728_CR38","doi-asserted-by":"publisher","first-page":"705","DOI":"10.1109\/TIFS.2016.2632063","volume":"12","author":"A Sharma","year":"2017","unstructured":"Sharma A, Sundaram S (2017) A novel online signature verification system based on gmm features in a dtw framework. IEEE Trans Inf Forensic Secur 12(3):705\u2013718. https:\/\/doi.org\/10.1109\/TIFS.2016.2632063","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"2","key":"8728_CR39","doi-asserted-by":"publisher","first-page":"821","DOI":"10.1016\/j.eswa.2014.08.052","volume":"42","author":"S Sharma","year":"2015","unstructured":"Sharma S, Dubey SR, Singh SK, Saxena R, Singh RK (2015) Identity verification using shape and geometry of human hands. Expert Syst Appl 42(2):821\u2013832","journal-title":"Expert Syst Appl"},{"key":"8728_CR40","doi-asserted-by":"publisher","unstructured":"Van BL, Garcia-Salicetti S, Dorizzi B (2007) On using the viterbi path along with hmm likelihood information for online signature verification. IEEE Trans Syst Man Cybern Part B (Cybern) 37(5):1237\u20131247. https:\/\/doi.org\/10.1109\/TSMCB.2007.895323","DOI":"10.1109\/TSMCB.2007.895323"},{"key":"8728_CR41","doi-asserted-by":"publisher","unstructured":"Vargas JF, Travieso CM, Alonso JB, Ferrer MA (2010) Off-line signature verification based on gray level information using wavelet transform and texture features. In: 2010 12Th international conference on frontiers in handwriting recognition, pp 587\u2013592. https:\/\/doi.org\/10.1109\/ICFHR.2010.96","DOI":"10.1109\/ICFHR.2010.96"},{"issue":"2","key":"8728_CR42","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1016\/j.bjps.2008.09.031","volume":"63","author":"E Vezzetti","year":"2010","unstructured":"Vezzetti E, Calignano F, Moos S (2010) Computer-aided morphological analysis for maxillo-facial diagnostic: a preliminary study. Journal of Plastic. Reconstruct Aesthet Surgery 63(2):218\u2013226","journal-title":"Reconstruct Aesthet Surgery"},{"issue":"3","key":"8728_CR43","doi-asserted-by":"publisher","first-page":"1078","DOI":"10.1016\/j.cmpb.2012.07.008","volume":"108","author":"E Vezzetti","year":"2012","unstructured":"Vezzetti E, Moos S, Marcolin F, Stola V (2012) A pose-independent method for 3d face landmark formalization. Comput Methods Programs Biomed 108 (3):1078\u20131096","journal-title":"Comput Methods Programs Biomed"},{"issue":"5","key":"8728_CR44","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1145\/3230633","volume":"51","author":"C Wan","year":"2019","unstructured":"Wan C, Wang L, Phoha VV (2019) A survey on gait recognition. ACM Comput Surv (CSUR) 51(5):89","journal-title":"ACM Comput Surv (CSUR)"},{"key":"8728_CR45","doi-asserted-by":"crossref","unstructured":"Yeung DY, Chang H, Xiong Y, George S, Kashi R, Matsumoto T, Rigoll G (2004) Svc2004: First international signature verification competition. In: Zhang D, Jain AK (eds) Biometric authentication. Springer, Berlin, pp 16\u201322","DOI":"10.1007\/978-3-540-25948-0_3"},{"key":"8728_CR46","unstructured":"Zhang C, Bengio S, Hardt M, Recht B, Vinyals O (2016) Understanding deep learning requires rethinking generalization. arXiv:1611.03530"},{"key":"8728_CR47","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.eswa.2019.01.058","volume":"125","author":"EN Zois","year":"2019","unstructured":"Zois EN, Alexandridis A, Economou G (2019) Writer independent offline signature verification based on asymmetric pixel relations and unrelated training-testing datasets. Expert Syst Appl 125:14\u201332","journal-title":"Expert Syst Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-08728-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-020-08728-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-08728-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,7]],"date-time":"2021-04-07T00:09:57Z","timestamp":1617754197000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-020-08728-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,7]]},"references-count":47,"journal-issue":{"issue":"27-28","published-print":{"date-parts":[[2020,7]]}},"alternative-id":["8728"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-08728-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,7]]},"assertion":[{"value":"2 April 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 December 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 February 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 April 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}