{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T17:31:48Z","timestamp":1772299908885,"version":"3.50.1"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,11,24]],"date-time":"2021-11-24T00:00:00Z","timestamp":1637712000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,11,24]],"date-time":"2021-11-24T00:00:00Z","timestamp":1637712000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1007\/s11042-021-11726-x","type":"journal-article","created":{"date-parts":[[2021,11,24]],"date-time":"2021-11-24T16:03:50Z","timestamp":1637769830000},"page":"3899-3913","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["A deep feature warehouse and iterative MRMR based handwritten signature verification method"],"prefix":"10.1007","volume":"81","author":[{"given":"Turker","family":"Tuncer","sequence":"first","affiliation":[]},{"given":"Emrah","family":"Aydemir","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8154-6691","authenticated-orcid":false,"given":"Fatih","family":"Ozyurt","sequence":"additional","affiliation":[]},{"given":"Sengul","family":"Dogan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,24]]},"reference":[{"issue":"2","key":"11726_CR1","first-page":"44","volume":"35","author":"O Abikoye","year":"2011","unstructured":"Abikoye O, Mabayoje M, Ajibade R (2011) Offline signature recognition & verification using neural network. Int J Comput Appl 35(2):44\u201351","journal-title":"Int J Comput Appl"},{"issue":"3","key":"11726_CR2","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1109\/TIFS.2007.902675","volume":"2","author":"G Agam","year":"2007","unstructured":"Agam G, Suresh S (2007) Warping-based offline signature recognition. IEEE Trans Inf Forensics Secur 2(3):430\u2013437","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"11726_CR3","first-page":"28","volume":"2","author":"A Bouguettaya","year":"2019","unstructured":"Bouguettaya A, Kechida A, Taberkit AM (2019) A survey on lightweight CNN-based object detection algorithms for platforms with limited computational resources. Int J Inform Appl Math 2(2):28\u201344","journal-title":"Int J Inform Appl Math"},{"key":"11726_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.neucom.2019.03.027","volume":"359","author":"N Calik","year":"2019","unstructured":"Calik N, Kurban OC, Yilmaz AR, Yildirim T, Ata LD (2019) Large-scale offline signature recognition via deep neural networks and feature embedding. Neurocomputing 359:1\u201314","journal-title":"Neurocomputing"},{"issue":"2","key":"11726_CR5","first-page":"17","volume":"10","author":"SA Daramola","year":"2010","unstructured":"Daramola SA, Ibiyemi TS (2010) Offline signature recognition using hidden markov model (HMM). Int J Comput Appl 10(2):17\u201322","journal-title":"Int J Comput Appl"},{"key":"11726_CR6","unstructured":"Dey S, Dutta A, Toledo JI, Ghosh SK, Llad\u00f3s J, Pal U (2017) Signet: Convolutional siamese network for writer independent offline signature verification. arXiv preprint arXiv:170702131"},{"issue":"5","key":"11726_CR7","doi-asserted-by":"publisher","first-page":"951","DOI":"10.1109\/TPAMI.2016.2560810","volume":"39","author":"M Diaz","year":"2016","unstructured":"Diaz M, Ferrer MA, Eskander GS, Sabourin R (2016) Generation of duplicated off-line signature images for verification systems. IEEE Trans Pattern Anal 39(5):951\u2013964","journal-title":"IEEE Trans Pattern Anal"},{"issue":"1","key":"11726_CR8","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1109\/TCYB.2016.2630419","volume":"48","author":"M Diaz","year":"2016","unstructured":"Diaz M, Fischer A, Ferrer MA, Plamondon R (2016) Dynamic signature verification system based on one real signature. IEEE Trans Cybern 48(1):228\u2013239","journal-title":"IEEE Trans Cybern"},{"issue":"02","key":"11726_CR9","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1142\/S0219720005001004","volume":"3","author":"C Ding","year":"2005","unstructured":"Ding C, Peng H (2005) Minimum redundancy feature selection from microarray gene expression data. J Bioinf Comput Biol 3(02):185\u2013205","journal-title":"J Bioinf Comput Biol"},{"issue":"4","key":"11726_CR10","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1109\/TNN.2010.2040751","volume":"21","author":"B Erkmen","year":"2010","unstructured":"Erkmen B, Kahraman N, Vural RA, Yildirim T (2010) Conic section function neural network circuitry for offline signature recognition. IEEE Trans Neural Netw 21(4):667\u2013672","journal-title":"IEEE Trans Neural Netw"},{"issue":"4","key":"11726_CR11","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1049\/iet-bmt.2013.0024","volume":"2","author":"GS Eskander","year":"2013","unstructured":"Eskander GS, Sabourin R, Granger E (2013) Hybrid writer-independent\u2013writer-dependent offline signature verification system. IET Biom 2(4):169\u2013181","journal-title":"IET Biom"},{"issue":"3","key":"11726_CR12","doi-asserted-by":"publisher","first-page":"966","DOI":"10.1109\/TIFS.2012.2190281","volume":"7","author":"MA Ferrer","year":"2012","unstructured":"Ferrer MA, Vargas JF, Morales A, Ordonez A (2012) Robustness of offline signature verification based on gray level features. IEEE Trans Inf Forensics Secur 7(3):966\u2013977","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"11726_CR13","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1109\/TPAMI.2014.2343981","volume":"37","author":"MA Ferrer","year":"2014","unstructured":"Ferrer MA, Diaz-Cabrera M, Morales A (2014) Static signature synthesis: A neuromotor inspired approach for biometrics. IEEE Trans Pattern Anal 37(3):667\u2013680","journal-title":"IEEE Trans Pattern Anal"},{"issue":"6","key":"11726_CR14","doi-asserted-by":"publisher","first-page":"693","DOI":"10.1016\/j.engappai.2005.12.006","volume":"19","author":"E Frias-Martinez","year":"2006","unstructured":"Frias-Martinez E, Sanchez A, Velez J (2006) Support vector machines versus multi-layer perceptrons for efficient off-line signature recognition. Eng Appl Artif Intel 19(6):693\u2013704","journal-title":"Eng Appl Artif Intel"},{"key":"11726_CR15","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proc Cvpr IEEE, pp 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"key":"11726_CR16","doi-asserted-by":"crossref","unstructured":"Hu J, Shen L, Sun G (2018) Squeeze-and-excitation networks. In: Proc Cvpr IEEE, pp 7132\u20137141","DOI":"10.1109\/CVPR.2018.00745"},{"key":"11726_CR17","doi-asserted-by":"crossref","unstructured":"Huang G, Liu Z, Van Der Maaten L,\u00a0Weinberger KQ (2017) Densely connected convolutional networks. In: Proc Cvpr IEEE, pp 4700\u20134708","DOI":"10.1109\/CVPR.2017.243"},{"key":"11726_CR18","unstructured":"Iandola FN, Han S, Moskewicz MW, Ashraf K, Dally WJ, Keutzer K (2016) SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and< 0.5\u00a0MB model size. arXiv preprint arXiv:160207360"},{"issue":"10","key":"11726_CR19","doi-asserted-by":"publisher","first-page":"1727","DOI":"10.1016\/S0031-3203(99)00047-3","volume":"33","author":"M Ismail","year":"2000","unstructured":"Ismail M, Gad S (2000) Off-line Arabic signature recognition and verification. Pattern Recogn 33(10):1727\u20131740","journal-title":"Pattern Recogn"},{"issue":"1","key":"11726_CR20","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TCSVT.2003.818349","volume":"14","author":"AK Jain","year":"2004","unstructured":"Jain AK, Ross A, Prabhakar S (2004) An introduction to biometric recognition. IEEE T Circ Syst Vid 14(1):4\u201320","journal-title":"IEEE T Circ Syst Vid"},{"key":"11726_CR21","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.procs.2010.12.027","volume":"3","author":"A Karouni","year":"2011","unstructured":"Karouni A, Daya B, Bahlak S (2011) Offline signature recognition using neural networks approach. Procedia Comput Sci 3:155\u2013161","journal-title":"Procedia Comput Sci"},{"key":"11726_CR22","doi-asserted-by":"crossref","unstructured":"Khoshdeli M, Cong R, Parvin B (2017) Detection of nuclei in H&E stained sections using convolutional neural networks. In: IEEE EMBS International Conference on Biomedical & Health Informatics (BHI). IEEE, New York, pp\u00a0105-108","DOI":"10.1109\/BHI.2017.7897216"},{"key":"11726_CR23","doi-asserted-by":"crossref","unstructured":"Kim Y (2014) Convolutional neural networks for sentence classification. arXiv preprint arXiv:14085882","DOI":"10.3115\/v1\/D14-1181"},{"key":"11726_CR24","unstructured":"Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. In: Adv Neur In, pp 1097\u20131105"},{"key":"11726_CR25","unstructured":"LeCun Y, Jackel L, Bottou L, Brunot A, Cortes C, Denker J, Drucker H, Guyon I, Muller U, Sackinger E (1995)\u00a0Comparison of learning algorithms for handwritten digit recognition. In: International conference on artificial neural networks, Perth, Australia, pp\u00a053-60"},{"issue":"3","key":"11726_CR26","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1109\/TSMCA.2010.2041653","volume":"40","author":"E Maiorana","year":"2010","unstructured":"Maiorana E, Campisi P, Fierrez J, Ortega-Garcia J, Neri A (2010) Cancelable templates for sequence-based biometrics with application to on-line signature recognition. IEEE T Syst Man Cy A 40(3):525\u2013538","journal-title":"IEEE T Syst Man Cy A"},{"issue":"6","key":"11726_CR27","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1049\/ip-vis:20031078","volume":"150","author":"J Ortega-Garcia","year":"2003","unstructured":"Ortega-Garcia J, Fierrez-Aguilar J, Simon D, Gonzalez J, Faundez-Zanuy M, Espinosa V, Satue A, Hernaez I, Igarza J-J, Vivaracho C (2003) MCYT baseline corpus: a bimodal biometric database. IEE Proc Vis Image Signal Process 150(6):395\u2013401","journal-title":"IEE Proc Vis Image Signal Process"},{"issue":"11","key":"11726_CR28","doi-asserted-by":"publisher","first-page":"8163","DOI":"10.1007\/s00500-019-04383-8","volume":"24","author":"F \u00d6zyurt","year":"2020","unstructured":"\u00d6zyurt F (2020) A fused CNN model for WBC detection with MRMR feature selection and extreme learning machine. Soft Computing 24(11):8163\u20138172","journal-title":"Soft Computing"},{"issue":"11","key":"11726_CR29","doi-asserted-by":"publisher","first-page":"8413","DOI":"10.1007\/s11227-019-03106-y","volume":"76","author":"F \u00d6zyurt","year":"2020","unstructured":"\u00d6zyurt F (2020) Efficient deep feature selection for remote sensing image recognition with fused deep learning architectures. The Journal of Supercomputing 76(11):8413\u20138431","journal-title":"The Journal of Supercomputing"},{"key":"11726_CR30","doi-asserted-by":"crossref","unstructured":"Rastegari M, Ordonez V, Redmon J, Farhadi A (2016)\u00a0Xnor-net: Imagenet classification using binary convolutional neural networks. In: European conference on computer vision, Springer, Berlin, pp\u00a0525-542","DOI":"10.1007\/978-3-319-46493-0_32"},{"key":"11726_CR31","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.neucom.2019.09.041","volume":"374","author":"V Ruiz","year":"2020","unstructured":"Ruiz V, Linares I, Sanchez A, Velez JF (2020) Off-line handwritten signature verification using compositional synthetic generation of signatures and Siamese Neural Networks. Neurocomputing 374:30\u201341","journal-title":"Neurocomputing"},{"key":"11726_CR32","doi-asserted-by":"crossref","unstructured":"Sandler M, Howard A, Zhu M, Zhmoginov A, Chen L-C (2018)\u00a0Mobilenetv2: Inverted residuals and linear bottlenecks. In: Proc Cvpr IEEE, pp 4510\u20134520","DOI":"10.1109\/CVPR.2018.00474"},{"key":"11726_CR33","doi-asserted-by":"crossref","unstructured":"\u015eenol C, Y\u0131ld\u0131r\u0131m T (2005) Signature verification using conic section function neural network. In: International Symposium on Computer and Information Sciences, Springer, Berlin, pp\u00a0524-532","DOI":"10.1007\/11569596_55"},{"issue":"9","key":"11726_CR34","doi-asserted-by":"publisher","first-page":"1205","DOI":"10.1109\/TSMC.2015.2389768","volume":"45","author":"W Sheng","year":"2015","unstructured":"Sheng W, Chen S, Xiao G, Mao J, Zheng Y (2015) A biometric key generation method based on semisupervised data clustering. IEEE Trans Syst Man Cy-S 45(9):1205\u20131217","journal-title":"IEEE Trans Syst Man Cy-S"},{"key":"11726_CR35","unstructured":"Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:14091556"},{"key":"11726_CR36","doi-asserted-by":"crossref","unstructured":"Srihari SN, Xu A, Kalera MK (2004) Learning strategies and classification methods for off-line signature verification. In: Ninth International Workshop on Frontiers in Handwriting Recognition, Kokubunji, Japan, IEEE, pp\u00a0161-166","DOI":"10.1109\/IWFHR.2004.61"},{"key":"11726_CR37","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1016\/j.procs.2017.10.025","volume":"116","author":"D Suryani","year":"2017","unstructured":"Suryani D, Irwansyah E, Chindra R (2017) Offline signature recognition and verification system using efficient fuzzy kohonen clustering network (EFKCN) algorithm. Procedia Comput Sci 116:621\u2013628","journal-title":"Procedia Comput Sci"},{"key":"11726_CR38","doi-asserted-by":"crossref","unstructured":"Szegedy C, Liu W, Jia Y, Sermanet P, Reed S, Anguelov D, Erhan D, Vanhoucke V,\u00a0Rabinovich A (2015) Going deeper with convolutions. In: Proc Cvpr IEEE, pp1\u20139","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"11726_CR39","doi-asserted-by":"crossref","unstructured":"Szegedy C, Vanhoucke V, Ioffe S, Shlens J,\u00a0Wojna Z (2016) Rethinking the inception architecture for computer vision. In: Proc Cvpr IEEE, pp 2818\u20132826","DOI":"10.1109\/CVPR.2016.308"},{"key":"11726_CR40","doi-asserted-by":"publisher","first-page":"478","DOI":"10.1109\/ACCESS.2015.2431493","volume":"3","author":"R Tolosana","year":"2015","unstructured":"Tolosana R, Vera-Rodriguez R, Ortega-Garcia J, Fierrez J (2015) Preprocessing and feature selection for improved sensor interoperability in online biometric signature verification. IEEE Access 3:478\u2013489","journal-title":"IEEE Access"},{"key":"11726_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.patcog.2016.02.007","volume":"55","author":"C Vivaracho-Pascual","year":"2016","unstructured":"Vivaracho-Pascual C, Simon-Hurtado A, Manso-Martinez E, Pascual-Gaspar JM (2016) Client threshold prediction in biometric signature recognition by means of Multiple Linear Regression and its use for score normalization. Pattern Recogn 55:1\u201313","journal-title":"Pattern Recogn"},{"key":"11726_CR42","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.neucom.2016.11.080","volume":"248","author":"C Vivaracho-Pascual","year":"2017","unstructured":"Vivaracho-Pascual C, Simon-Hurtado A, Manso-Martinez E (2017) Using the score ratio with distance-based classifiers: A theoretical and practical study in biometric signature recognition. Neurocomputing 248:57\u201366","journal-title":"Neurocomputing"},{"key":"11726_CR43","unstructured":"Xia X, Xu C, Nan B (2017) Inception-v3 for flower classification. In: 2017 2nd International Conference on Image, Vision and Computing (ICIVC), IEEE, New York, pp\u00a0783-787"},{"key":"11726_CR44","doi-asserted-by":"crossref","unstructured":"Zhang X, Zhou X, Lin M, Sun J (2018)\u00a0Shufflenet: An extremely efficient convolutional neural network for mobile devices. In: Proc Cvpr IEEE, pp 6848\u20136856","DOI":"10.1109\/CVPR.2018.00716"},{"key":"11726_CR45","doi-asserted-by":"crossref","unstructured":"Zhao, H. H., & Liu, H. (2020). Multiple classifiers fusion and CNN feature extraction for handwritten digits recognition. Granular Computing, 5(3), 411-418.","DOI":"10.1007\/s41066-019-00158-6"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11726-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11726-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11726-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,21]],"date-time":"2022-02-21T19:08:19Z","timestamp":1645470499000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11726-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,24]]},"references-count":45,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["11726"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11726-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,24]]},"assertion":[{"value":"23 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 August 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 November 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 November 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}