{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T09:51:40Z","timestamp":1771926700285,"version":"3.50.1"},"reference-count":83,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,1,15]],"date-time":"2021-01-15T00:00:00Z","timestamp":1610668800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,15]],"date-time":"2021-01-15T00:00:00Z","timestamp":1610668800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1007\/s12652-020-02872-5","type":"journal-article","created":{"date-parts":[[2021,1,15]],"date-time":"2021-01-15T20:44:02Z","timestamp":1610743442000},"page":"21-40","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["A two-tier ensemble approach for writer dependent online signature verification"],"prefix":"10.1007","volume":"13","author":[{"given":"Pratik","family":"Bhowal","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Debanshu","family":"Banerjee","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4217-2372","authenticated-orcid":false,"given":"Samir","family":"Malakar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ram","family":"Sarkar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2021,1,15]]},"reference":[{"key":"2872_CR1","doi-asserted-by":"crossref","unstructured":"Adithya DR, VL A, MR N, N S, Aditya SK  (2019) Signature analysis for forgery detection. In: Shetty NR, Patnaik LM, Nagaraj HC, Hamsavath PN, Nalini N (eds) Emerging research in computing, information, communication and applications. Springer, New York, pp 339\u2013349","DOI":"10.1007\/978-981-13-6001-5_26"},{"key":"2872_CR2","doi-asserted-by":"crossref","unstructured":"An TK, Kim MH (2010) A new diverse adaboost classifier. In: 2010 International conference on artificial intelligence and computational intelligence, vol\u00a01. IEEE, pp 359\u2013363","DOI":"10.1109\/AICI.2010.82"},{"key":"2872_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02295-2","author":"SSC Bose","year":"2020","unstructured":"Bose SSC, Sivanandam N, Sundar PVP (2020) Design of ensemble classifier using statistical gradient and dynamic weight LogitBoost for malicious tumor detection. J Ambient Intell Hum Comput. https:\/\/doi.org\/10.1007\/s12652-020-02295-2","journal-title":"J Ambient Intell Hum Comput"},{"key":"2872_CR4","doi-asserted-by":"crossref","unstructured":"Chang WD, Shin J (2008) Dpw approach for random forgery problem in online handwritten signature verification. In: 2008 4th international conference on networked computing and advanced information management, vol\u00a01. IEEE, pp 347\u2013352","DOI":"10.1109\/NCM.2008.118"},{"key":"2872_CR5","doi-asserted-by":"publisher","unstructured":"Chen X (2020) The application of neural network with convolution algorithm in western music recommendation practice. J Ambient Intell Hum Comput https:\/\/doi.org\/10.1007\/s12652-020-01806-5","DOI":"10.1007\/s12652-020-01806-5"},{"issue":"5","key":"2872_CR6","doi-asserted-by":"publisher","first-page":"1662","DOI":"10.1109\/TNNLS.2017.2677441","volume":"29","author":"Y Cheng","year":"2017","unstructured":"Cheng Y, Qiao X, Wang X, Yu Q (2017) Random forest classifier for zero-shot learning based on relative attribute. IEEE Trans Neural Netw Learn Syst 29(5):1662\u20131674","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"6","key":"2872_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3274658","volume":"51","author":"M Diaz","year":"2019","unstructured":"Diaz M, Ferrer MA, Impedovo D, Malik MI, Pirlo G, Plamondon R (2019) A perspective analysis of handwritten signature technology. ACM Comput Surv 51(6):1\u201339. https:\/\/doi.org\/10.1145\/3274658","journal-title":"ACM Comput Surv"},{"key":"2872_CR8","first-page":"1871","volume":"9","author":"RE Fan","year":"2008","unstructured":"Fan RE, Chang KW, Hsieh CJ, Wang XR, Lin CJ (2008) Liblinear: a library for large linear classification. J Mach Learn Res 9:1871\u20131874","journal-title":"J Mach Learn Res"},{"key":"2872_CR9","doi-asserted-by":"crossref","unstructured":"Fayyaz M, Hajizadeh\\_Saffar M, Sabokrou M, Fathy M (2015) Feature representation for online signature verification. ArXiv preprint arXiv:150508153","DOI":"10.1109\/AISP.2015.7123528"},{"key":"2872_CR10","doi-asserted-by":"crossref","unstructured":"Ferrer MA, Diaz M, Carmona-Duarte C, Plamondon R (2019) Generating off-line and on-line forgeries from on-line genuine signatures. In: 2019 International Carnahan conference on security technology (ICCST). IEEE, pp 1\u20136","DOI":"10.1109\/CCST.2019.8888418"},{"issue":"16","key":"2872_CR11","doi-asserted-by":"publisher","first-page":"2325","DOI":"10.1016\/j.patrec.2007.07.012","volume":"28","author":"J Fierrez","year":"2007","unstructured":"Fierrez J, Ortega-Garcia J, Ramos D, Gonzalez-Rodriguez J (2007) Hmm-based on-line signature verification: feature extraction and signature modeling. Pattern Recogn Lett 28(16):2325\u20132334","journal-title":"Pattern Recogn Lett"},{"key":"2872_CR12","doi-asserted-by":"publisher","unstructured":"Fierrez-Aguilar J, Krawczyk S, Ortega-Garcia J, Jain AK (2005) Fusion of local and regional approaches for on-line signature verification. In:  Li SZ, Sun Z, Tan T, Pankanti S, Chollet G, Zhang D (eds) Advances in biometric person authentication. IWBRS 2005. Lecture Notes in Computer Science, vol 3781. Springer, Berlin, Heidelberg, pp 188\u2013196. https:\/\/doi.org\/10.1007\/11569947_24","DOI":"10.1007\/11569947_24"},{"key":"2872_CR13","doi-asserted-by":"crossref","unstructured":"Fischer A, Diaz M, Plamondon R, Ferrer MA (2015) Robust score normalization for dtw-based on-line signature verification. In: 2015 13th international conference on document analysis and recognition (ICDAR). IEEE, pp 241\u2013245","DOI":"10.1109\/ICDAR.2015.7333760"},{"issue":"2\u20133","key":"2872_CR14","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1023\/A:1007465528199","volume":"29","author":"N Friedman","year":"1997","unstructured":"Friedman N, Geiger D, Goldszmidt M (1997) Bayesian network classifiers. Mach Learn 29(2\u20133):131\u2013163","journal-title":"Mach Learn"},{"issue":"6","key":"2872_CR15","doi-asserted-by":"publisher","first-page":"1059","DOI":"10.1109\/TPAMI.2008.302","volume":"31","author":"D Guru","year":"2008","unstructured":"Guru D, Prakash H (2008) Online signature verification and recognition: an approach based on symbolic representation. IEEE Trans Pattern Anal Mach Intell 31(6):1059\u20131073","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"6","key":"2872_CR16","doi-asserted-by":"publisher","first-page":"1059","DOI":"10.1109\/tpami.2008.302","volume":"31","author":"D Guru","year":"2009","unstructured":"Guru D, Prakash H (2009) Online signature verification and recognition: an approach based on symbolic representation. IEEE Trans Pattern Anal Mach Intell 31(6):1059\u20131073. https:\/\/doi.org\/10.1109\/tpami.2008.302","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"2872_CR17","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-81-322-1143-3_19","volume-title":"Multimedia processing, communication and computing applications","author":"D Guru","year":"2013","unstructured":"Guru D, Manjunatha K, Manjunath S (2013) User dependent features in online signature verification. In: Swamy PP, Guru DS (eds) Multimedia processing, communication and computing applications. Springer, Berlin, pp 229\u2013240"},{"key":"2872_CR18","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1016\/j.eswa.2017.03.024","volume":"80","author":"D Guru","year":"2017","unstructured":"Guru D, Manjunatha K, Manjunath S, Somashekara M (2017) Interval valued symbolic representation of writer dependent features for online signature verification. Expert Syst Appl 80:232\u2013243","journal-title":"Expert Syst Appl"},{"key":"2872_CR19","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.patcog.2017.05.012","volume":"70","author":"LG Hafemann","year":"2017","unstructured":"Hafemann LG, Sabourin R, Oliveira LS (2017a) Learning features for offline handwritten signature verification using deep convolutional neural networks. Pattern Recogn 70:163\u2013176","journal-title":"Pattern Recogn"},{"key":"2872_CR20","doi-asserted-by":"publisher","unstructured":"Hafemann LG, Sabourin R, Oliveira LS, (2017b) Offline handwritten signature verification\u2014literature review. In: 2017 7th international conference on image processing theory, tools and applications (IPTA). IEEE. https:\/\/doi.org\/10.1109\/ipta.2017.8310112","DOI":"10.1109\/ipta.2017.8310112"},{"key":"2872_CR21","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1016\/j.knosys.2018.09.001","volume":"163","author":"H He","year":"2019","unstructured":"He H, Tan Y, Xing J (2019a) Unsupervised classification of 12-lead ecg signals using wavelet tensor decomposition and two-dimensional gaussian spectral clustering. Knowl-Based Syst 163:392\u2013403","journal-title":"Knowl-Based Syst"},{"issue":"14","key":"2872_CR22","doi-asserted-by":"publisher","first-page":"19253","DOI":"10.1007\/s11042-019-7264-6","volume":"78","author":"L He","year":"2019","unstructured":"He L, Tan H, Huang ZC (2019b) Online handwritten signature verification based on association of curvature and torsion feature with hausdorff distance. Multimed Tools Appl 78(14):19253\u201319278. https:\/\/doi.org\/10.1007\/s11042-019-7264-6","journal-title":"Multimed Tools Appl"},{"key":"2872_CR23","doi-asserted-by":"crossref","unstructured":"Hofbauer H, Uhl A (2016) Calculating a boundary for the significance from the equal-error rate. In: 2016 international conference on biometrics (ICB). IEEE, pp 1\u20134","DOI":"10.1109\/ICB.2016.7550053"},{"issue":"10","key":"2872_CR24","doi-asserted-by":"publisher","first-page":"2253","DOI":"10.1016\/s0031-3203(03)00126-2","volume":"36","author":"K Huang","year":"2003","unstructured":"Huang K, Yan H (2003) Stability and style-variation modeling for on-line signature verification. Pattern Recogn 36(10):2253\u20132270. https:\/\/doi.org\/10.1016\/s0031-3203(03)00126-2","journal-title":"Pattern Recogn"},{"key":"2872_CR25","doi-asserted-by":"publisher","unstructured":"Impedovo D, Pirlo G (2018) Automatic signature verification in the mobile cloud scenario: survey and way ahead. IEEE Trans Emerg Top Comput. https:\/\/doi.org\/10.1109\/tetc.2018.2865345","DOI":"10.1109\/tetc.2018.2865345"},{"key":"2872_CR26","doi-asserted-by":"crossref","unstructured":"Jahromi AH, Taheri M (2017) A non-parametric mixture of gaussian naive bayes classifiers based on local independent features. In: 2017 artificial intelligence and signal processing conference (AISP). IEEE, pp 209\u2013212","DOI":"10.1109\/AISP.2017.8324083"},{"key":"2872_CR27","doi-asserted-by":"publisher","first-page":"19993","DOI":"10.1007\/s11042-020-08728-6","volume":"79","author":"A Jain","year":"2020","unstructured":"Jain A, Singh SK, Singh KP (2020) Handwritten signature verification using shallow convolutional neural network. Multimed Tools Appl 79:19993\u201320018. https:\/\/doi.org\/10.1007\/s11042-020-08728-6","journal-title":"Multimed Tools Appl"},{"issue":"12","key":"2872_CR28","doi-asserted-by":"publisher","first-page":"2963","DOI":"10.1016\/S0031-3203(01)00240-0","volume":"35","author":"AK Jain","year":"2002","unstructured":"Jain AK, Griess FD, Connell SD (2002) On-line signature verification. Pattern Recogn 35(12):2963\u20132972","journal-title":"Pattern Recogn"},{"issue":"8","key":"2872_CR29","doi-asserted-by":"publisher","first-page":"1808","DOI":"10.3390\/s19081808","volume":"19","author":"Y Jia","year":"2019","unstructured":"Jia Y, Huang L, Chen H (2019) A two-stage method for online signature verification using shape contexts and function features. Sensors 19(8):1808","journal-title":"Sensors"},{"issue":"1","key":"2872_CR30","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/tim.2017.2755898","volume":"67","author":"B Kar","year":"2018","unstructured":"Kar B, Mukherjee A, Dutta PK (2018) Stroke point warping-based reference selection and verification of online signature. IEEE Trans Instrum Meas 67(1):2\u201311. https:\/\/doi.org\/10.1109\/tim.2017.2755898","journal-title":"IEEE Trans Instrum Meas"},{"issue":"15","key":"2872_CR31","doi-asserted-by":"publisher","first-page":"2400","DOI":"10.1016\/j.patrec.2005.04.017","volume":"26","author":"A Kholmatov","year":"2005","unstructured":"Kholmatov A, Yanikoglu B (2005) Identity authentication using improved online signature verification method. Pattern Recogn Lett 26(15):2400\u20132408","journal-title":"Pattern Recogn Lett"},{"issue":"4","key":"2872_CR32","doi-asserted-by":"publisher","first-page":"1451","DOI":"10.1007\/s12652-018-0972-3","volume":"11","author":"JC Kim","year":"2020","unstructured":"Kim JC, Chung K (2020) Neural-network based adaptive context prediction model for ambient intelligence. J Ambient Intell Hum Comput 11(4):1451\u20131458","journal-title":"J Ambient Intell Hum Comput"},{"issue":"1","key":"2872_CR33","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/s12652-019-01289-z","volume":"11","author":"AS Kittur","year":"2020","unstructured":"Kittur AS, Pais AR (2020) A trust model based batch verification of digital signatures in iot. Ambient Intell Hum Comput 11(1):313\u2013327","journal-title":"Ambient Intell Hum Comput"},{"key":"2872_CR34","doi-asserted-by":"publisher","unstructured":"Lai S, Jin L, Yang W, (2017a) Online signature verification using recurrent neural network and length-normalized path signature descriptor. In: 2017 14th IAPR international conference on document analysis and recognition (ICDAR). IEEE. https:\/\/doi.org\/10.1109\/icdar.2017.73","DOI":"10.1109\/icdar.2017.73"},{"key":"2872_CR35","doi-asserted-by":"crossref","unstructured":"Lai S, Jin L, Yang W (2017b) Online signature verification using recurrent neural network and length-normalized path signature descriptor. In: 2017 14th IAPR international conference on document analysis and recognition (ICDAR), vol\u00a01. IEEE, pp 400\u2013405","DOI":"10.1109\/ICDAR.2017.73"},{"key":"2872_CR36","first-page":"735","volume":"34","author":"S Lai","year":"2020","unstructured":"Lai S, Jin L, Lin L, Zhu Y, Mao H (2020) Synsig2vec: learning representations from synthetic dynamic signatures for real-world verification. Proc AAAI Conf Artif Intell 34:735\u2013742","journal-title":"Proc AAAI Conf Artif Intell"},{"issue":"11","key":"2872_CR37","doi-asserted-by":"publisher","first-page":"2498","DOI":"10.1109\/tcyb.2014.2375959","volume":"45","author":"Y Liu","year":"2015","unstructured":"Liu Y, Yang Z, Yang L (2015) Online signature verification based on DCT and sparse representation. IEEE Trans Cybern 45(11):2498\u20132511. https:\/\/doi.org\/10.1109\/tcyb.2014.2375959","journal-title":"IEEE Trans Cybern"},{"issue":"1","key":"2872_CR38","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1109\/TII.2013.2269031","volume":"10","author":"M L\u00f3pez-Garc\u00eda","year":"2013","unstructured":"L\u00f3pez-Garc\u00eda M, Ramos-Lara R, Miguel-Hurtado O, Cant\u00f3-Navarro E (2013) Embedded system for biometric online signature verification. IEEE Trans Ind Inform 10(1):491\u2013501","journal-title":"IEEE Trans Ind Inform"},{"issue":"1","key":"2872_CR39","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1109\/tii.2013.2269031","volume":"10","author":"M Lopez-Garcia","year":"2014","unstructured":"Lopez-Garcia M, Ramos-Lara R, Miguel-Hurtado O, Canto-Navarro E (2014) Embedded system for biometric online signature verification. IEEE Trans Ind Inform 10(1):491\u2013501. https:\/\/doi.org\/10.1109\/tii.2013.2269031","journal-title":"IEEE Trans Ind Inform"},{"issue":"3","key":"2872_CR40","doi-asserted-by":"publisher","first-page":"5291","DOI":"10.1016\/j.eswa.2008.06.069","volume":"36","author":"A Lumini","year":"2009","unstructured":"Lumini A, Nanni L (2009) Ensemble of on-line signature matchers based on OverComplete feature generation. Expert Syst Appl 36(3):5291\u20135296. https:\/\/doi.org\/10.1016\/j.eswa.2008.06.069","journal-title":"Expert Syst Appl"},{"issue":"15","key":"2872_CR41","doi-asserted-by":"publisher","first-page":"2390","DOI":"10.1016\/j.patrec.2005.04.013","volume":"26","author":"H Lv","year":"2005","unstructured":"Lv H, Wang W, Wang C, Zhuo Q (2005) Off-line Chinese signature verification based on support vector machines. Pattern Recogn Lett 26(15):2390\u20132399. https:\/\/doi.org\/10.1016\/j.patrec.2005.04.013","journal-title":"Pattern Recogn Lett"},{"key":"2872_CR42","doi-asserted-by":"publisher","unstructured":"Malik MI, Ahmed S, Marcelli A, Pal U, Blumenstein M, Alewijns L, Liwicki M, (2015) ICDAR2015 competition on signature verification and writer identification for on- and off-line skilled forgeries (SigWIcomp2015). In: 2015 13th international conference on document analysis and recognition (ICDAR). IEEE. https:\/\/doi.org\/10.1109\/icdar.2015.7333948","DOI":"10.1109\/icdar.2015.7333948"},{"key":"2872_CR43","unstructured":"Manjunatha KS (2015) Writer dependent online signature verification system. https:\/\/hdl.handle.net\/10603\/203997"},{"key":"2872_CR44","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.patrec.2016.06.016","volume":"80","author":"K Manjunatha","year":"2016","unstructured":"Manjunatha K, Manjunath S, Guru D, Somashekara M (2016) Online signature verification based on writer dependent features and classifiers. Pattern Recogn Lett 80:129\u2013136","journal-title":"Pattern Recogn Lett"},{"key":"2872_CR45","unstructured":"Mason L, Baxter J, Bartlett PL, Frean MR (2000) Boosting algorithms as gradient descent. In: Proceedings of the 12th International Conference on Neural Information Processing System, MIT Press, Cambridge, MA, USA, pp 512\u2013518"},{"key":"2872_CR46","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.eswa.2019.03.040","volume":"133","author":"S Masoudnia","year":"2019","unstructured":"Masoudnia S, Mersa O, Araabi BN, Vahabie AH, Sadeghi MA, Ahmadabadi MN (2019) Multi-representational learning for offline signature verification using multi-loss snapshot ensemble of CNNs. Expert Syst Appl 133:317\u2013330. https:\/\/doi.org\/10.1016\/j.eswa.2019.03.040","journal-title":"Expert Syst Appl"},{"issue":"3","key":"2872_CR47","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1177\/0272989X8900900307","volume":"9","author":"DK McClish","year":"1989","unstructured":"McClish DK (1989) Analyzing a portion of the roc curve. Med Decis Mak 9(3):190\u2013195","journal-title":"Med Decis Mak"},{"issue":"7\u20139","key":"2872_CR48","doi-asserted-by":"publisher","first-page":"869","DOI":"10.1016\/j.neucom.2005.06.007","volume":"69","author":"L Nanni","year":"2006","unstructured":"Nanni L (2006) Experimental comparison of one-class classifiers for online signature verification. Neurocomputing 69(7\u20139):869\u2013873","journal-title":"Neurocomputing"},{"key":"2872_CR49","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.neucom.2005.05.004","volume":"68","author":"L Nanni","year":"2005","unstructured":"Nanni L, Lumini A (2005) Ensemble of Parzen window classifiers for on-line signature verification. Neurocomputing 68:217\u2013224. https:\/\/doi.org\/10.1016\/j.neucom.2005.05.004","journal-title":"Neurocomputing"},{"issue":"5","key":"2872_CR50","doi-asserted-by":"publisher","first-page":"3676","DOI":"10.1016\/j.eswa.2009.10.023","volume":"37","author":"L Nanni","year":"2010","unstructured":"Nanni L, Maiorana E, Lumini A, Campisi P (2010) Combining local, regional and global matchers for a template protected on-line signature verification system. Expert Syst Appl 37(5):3676\u20133684. https:\/\/doi.org\/10.1016\/j.eswa.2009.10.023","journal-title":"Expert Syst Appl"},{"issue":"3","key":"2872_CR51","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/s100440200025","volume":"5","author":"E Nyssen","year":"2002","unstructured":"Nyssen E, Sahli H, Zhang K (2002) A multi-stage online signature verification system. Pattern Anal Appl 5(3):288\u2013295","journal-title":"Pattern Anal Appl"},{"key":"2872_CR52","doi-asserted-by":"publisher","first-page":"81010","DOI":"10.1109\/access.2019.2923093","volume":"7","author":"M Okawa","year":"2019","unstructured":"Okawa M (2019) Template matching using time-series averaging and DTW with dependent warping for online signature verification. IEEE Access 7:81010\u201381019. https:\/\/doi.org\/10.1109\/access.2019.2923093","journal-title":"IEEE Access"},{"key":"2872_CR53","doi-asserted-by":"publisher","first-page":"107227","DOI":"10.1016\/j.patcog.2020.107227","volume":"102","author":"M Okawa","year":"2020","unstructured":"Okawa M (2020) Online signature verification using single-template matching with time-series averaging and gradient boosting. Pattern Recogn 102:107227","journal-title":"Pattern Recogn"},{"key":"2872_CR54","doi-asserted-by":"publisher","unstructured":"Ortega-Garcia J, Fierrez-Aguilar J, Martin-Rello J, Gonzalez-Rodriguez J (2003a) Complete signal modeling and score normalization for function-based dynamic signature verification. In:  Kittler J,  Nixon MS (eds) Lecture notes in computer science. Springer, Berlin, Heidelberg, pp 658\u2013667. https:\/\/doi.org\/10.1007\/3-540-44887-x_77","DOI":"10.1007\/3-540-44887-x_77"},{"issue":"6","key":"2872_CR55","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1049\/ip-vis:20031078","volume":"150","author":"J Ortega-Garcia","year":"2003","unstructured":"Ortega-Garcia J, Fierrez-Aguilar J, Simon D, Gonzalez J, Faundez-Zanuy M, Espinosa V, Satue A, Hernaez I, Igarza JJ, Vivaracho C et al (2003b) Mcyt baseline corpus: a bimodal biometric database. IEEE Proc-Vis, Image Signal Process 150(6):395\u2013401","journal-title":"IEEE Proc-Vis, Image Signal Process"},{"key":"2872_CR56","doi-asserted-by":"crossref","unstructured":"Pascual-Gaspar JM, Carde\u00f1oso-Payo V, Vivaracho-Pascual CE (2009) Practical on-line signature verification. In: International conference on biometrics. Springer, pp 1180\u20131189","DOI":"10.1007\/978-3-642-01793-3_119"},{"issue":"2","key":"2872_CR57","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1016\/j.engappai.2010.10.015","volume":"24","author":"JM Pascual-Gaspar","year":"2011","unstructured":"Pascual-Gaspar JM, Faundez-Zanuy M, Vivaracho C (2011) Fast on-line signature recognition based on vq with time modeling. Eng Appl Artif Intell 24(2):368\u2013377","journal-title":"Eng Appl Artif Intell"},{"issue":"6","key":"2872_CR58","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1109\/THMS.2015.2443050","volume":"45","author":"G Pirlo","year":"2015","unstructured":"Pirlo G, Cuccovillo V, Diaz-Cabrera M, Impedovo D, Mignone P (2015) Multidomain verification of dynamic signatures using local stability analysis. IEEE Trans Hum-Mach Syst 45(6):805\u2013810","journal-title":"IEEE Trans Hum-Mach Syst"},{"issue":"6","key":"2872_CR59","doi-asserted-by":"publisher","first-page":"1810","DOI":"10.1016\/j.scient.2012.05.007","volume":"19","author":"S Rashidi","year":"2012","unstructured":"Rashidi S, Fallah A, Towhidkhah F (2012) Feature extraction based DCT on dynamic signature verification. Sci Iran 19(6):1810\u20131819. https:\/\/doi.org\/10.1016\/j.scient.2012.05.007","journal-title":"Sci Iran"},{"issue":"6","key":"2872_CR60","doi-asserted-by":"publisher","first-page":"933","DOI":"10.1109\/tifs.2014.2316472","volume":"9","author":"N Sae-Bae","year":"2014","unstructured":"Sae-Bae N, Memon N (2014) Online signature verification on mobile devices. IEEE Trans Inf Forensics Secur 9(6):933\u2013947. https:\/\/doi.org\/10.1109\/tifs.2014.2316472","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"2872_CR61","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/21.97458","volume":"21","author":"SR Safavian","year":"1991","unstructured":"Safavian SR, Landgrebe D (1991) A survey of decision tree classifier methodology. IEEE Trans Syst, Man, Cybern 21(3):660\u2013674","journal-title":"IEEE Trans Syst, Man, Cybern"},{"key":"2872_CR62","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-01882-7","author":"M Savargiv","year":"2020","unstructured":"Savargiv M, Masoumi B, Keyvanpour MR (2020) A new ensemble learning method based on learning automata. J Ambient Intell Hum Comput. https:\/\/doi.org\/10.1007\/s12652-020-01882-7","journal-title":"J Ambient Intell Hum Comput"},{"issue":"15","key":"2872_CR63","doi-asserted-by":"publisher","first-page":"1632","DOI":"10.3923\/jas.2010.1632.1643","volume":"10","author":"S Sayeed","year":"2010","unstructured":"Sayeed S, Samraj A, Besar R, Hossen J (2010) Online hand signature verification: a review. J Appl Sci 10(15):1632\u20131643. https:\/\/doi.org\/10.3923\/jas.2010.1632.1643","journal-title":"J Appl Sci"},{"key":"2872_CR64","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.patrec.2016.07.015","volume":"84","author":"A Sharma","year":"2016","unstructured":"Sharma A, Sundaram S (2016) An enhanced contextual dtw based system for online signature verification using vector quantization. Pattern Recogn Lett 84:22\u201328","journal-title":"Pattern Recogn Lett"},{"issue":"2","key":"2872_CR65","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1109\/TCYB.2017.2647826","volume":"48","author":"A Sharma","year":"2017","unstructured":"Sharma A, Sundaram S (2017) On the exploration of information from the dtw cost matrix for online signature verification. IEEE Trans Cybern 48(2):611\u2013624","journal-title":"IEEE Trans Cybern"},{"issue":"10","key":"2872_CR66","doi-asserted-by":"publisher","first-page":"2663","DOI":"10.1109\/TSMC.2016.2597240","volume":"47","author":"X Song","year":"2016","unstructured":"Song X, Xia X, Luan F (2016) Online signature verification based on stable features extracted dynamically. IEEE Trans Syst, Man, Cybern: Syst 47(10):2663\u20132676","journal-title":"IEEE Trans Syst, Man, Cybern: Syst"},{"issue":"10","key":"2872_CR67","doi-asserted-by":"publisher","first-page":"2663","DOI":"10.1109\/tsmc.2016.2597240","volume":"47","author":"X Song","year":"2017","unstructured":"Song X, Xia X, Luan F (2017) Online signature verification based on stable features extracted dynamically. IEEE Trans Syst, Man, Cybern: Syst 47(10):2663\u20132676. https:\/\/doi.org\/10.1109\/tsmc.2016.2597240","journal-title":"IEEE Trans Syst, Man, Cybern: Syst"},{"key":"2872_CR69","doi-asserted-by":"publisher","unstructured":"Souza VLF, Oliveira ALI, Sabourin R (2018) A writer-independent approach for offline signature verification using deep convolutional neural networks features. In: 2018 7th Brazilian conference on intelligent systems (BRACIS). IEEE. https:\/\/doi.org\/10.1109\/bracis.2018.00044","DOI":"10.1109\/bracis.2018.00044"},{"key":"2872_CR68","doi-asserted-by":"publisher","first-page":"113397","DOI":"10.1016\/j.eswa.2020.113397","volume":"154","author":"VL Souza","year":"2020","unstructured":"Souza VL, Oliveira AL, Cruz RM, Sabourin R (2020) A white-box analysis on the writer-independent dichotomy transformation applied to offline handwritten signature verification. Expert Syst Appl 154:113397. https:\/\/doi.org\/10.1016\/j.eswa.2020.113397","journal-title":"Expert Syst Appl"},{"issue":"3","key":"2872_CR70","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3190618","volume":"51","author":"K Sundararajan","year":"2018","unstructured":"Sundararajan K, Woodard DL (2018) Deep learning for biometrics. ACM Comput Surv 51(3):1\u201334. https:\/\/doi.org\/10.1145\/3190618","journal-title":"ACM Comput Surv"},{"key":"2872_CR71","doi-asserted-by":"publisher","unstructured":"Tahir M, Akram MU, Idris MA, (2016) Online signature verification using segmented local features. In: 2016 international conference on computing, electronic and electrical engineering (ICE Cube). IEEE. https:\/\/doi.org\/10.1109\/icecube.2016.7495205","DOI":"10.1109\/icecube.2016.7495205"},{"issue":"4","key":"2872_CR72","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1109\/tifs.2017.2769023","volume":"13","author":"L Tang","year":"2018","unstructured":"Tang L, Kang W, Fang Y (2018) Information divergence-based matching strategy for online signature verification. IEEE Trans Inf Forensics Secur 13(4):861\u2013873. https:\/\/doi.org\/10.1109\/tifs.2017.2769023","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"5","key":"2872_CR73","doi-asserted-by":"publisher","first-page":"1237","DOI":"10.1109\/TSMCB.2007.895323","volume":"37","author":"BL Van","year":"2007","unstructured":"Van BL, Garcia-Salicetti S, Dorizzi B (2007) On using the viterbi path along with hmm likelihood information for online signature verification. IEEE Trans Syst, Man, Cybern, Part B (Cybern) 37(5):1237\u20131247","journal-title":"IEEE Trans Syst, Man, Cybern, Part B (Cybern)"},{"key":"2872_CR74","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.neucom.2020.05.072","volume":"409","author":"CS Vorugunti","year":"2020","unstructured":"Vorugunti CS, Pulabaigari V, Gorthi RKSS, Mukherjee P (2020) OSVFuseNet: online signature verification by feature fusion and depth-wise separable convolution based deep learning. Neurocomputing 409:157\u2013172. https:\/\/doi.org\/10.1016\/j.neucom.2020.05.072","journal-title":"Neurocomputing"},{"issue":"8","key":"2872_CR75","doi-asserted-by":"publisher","first-page":"3035","DOI":"10.1007\/s12652-018-0803-6","volume":"10","author":"W Wang","year":"2019","unstructured":"Wang W, Zhao M, Wang J (2019) Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network. J Ambient Intell Hum Comput 10(8):3035\u20133043","journal-title":"J Ambient Intell Hum Comput"},{"key":"2872_CR76","doi-asserted-by":"publisher","unstructured":"Wu X, Kimura A, Iwana BK, Uchida S, Kashino K, (2019) Deep dynamic time warping: End-to-end local representation learning for online signature verification. In: 2019 international conference on document analysis and recognition (ICDAR). IEEE. https:\/\/doi.org\/10.1109\/icdar.2019.00179","DOI":"10.1109\/icdar.2019.00179"},{"key":"2872_CR77","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1016\/j.patcog.2017.09.033","volume":"74","author":"X Xia","year":"2018","unstructured":"Xia X, Song X, Luan F, Zheng J, Chen Z, Ma X (2018) Discriminative feature selection for on-line signature verification. Pattern Recogn 74:422\u2013433","journal-title":"Pattern Recogn"},{"issue":"23","key":"2872_CR78","doi-asserted-by":"publisher","first-page":"7811","DOI":"10.1007\/s00500-018-3477-2","volume":"22","author":"L Yang","year":"2018","unstructured":"Yang L, Cheng Y, Wang X, Liu Q (2018) Online handwritten signature verification using feature weighting algorithm relief. Soft Comput 22(23):7811\u20137823. https:\/\/doi.org\/10.1007\/s00500-018-3477-2","journal-title":"Soft Comput"},{"key":"2872_CR79","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2009\/260516","volume":"2009","author":"B Yanikoglu","year":"2009","unstructured":"Yanikoglu B, Kholmatov A (2009) Online signature verification using Fourier descriptors. EURASIP J Adv Signal Process 2009:1\u201313","journal-title":"EURASIP J Adv Signal Process"},{"key":"2872_CR80","doi-asserted-by":"crossref","unstructured":"Yeung DY, Chang H, Xiong Y, George S, Kashi R, Matsumoto T, Rigoll G (2004) Svc2004: First international signature verification competition. In: International conference on biometric authentication. Springer, pp 16\u201322","DOI":"10.1007\/978-3-540-25948-0_3"},{"key":"2872_CR81","doi-asserted-by":"publisher","unstructured":"Yoon H, Lee J, Yang H (2002) An online signature verification system using hidden markov model in polar space. In: Proceedings 8th international workshop on frontiers in handwriting recognition. IEEE Computer Society. https:\/\/doi.org\/10.1109\/iwfhr.2002.1030931","DOI":"10.1109\/iwfhr.2002.1030931"},{"key":"2872_CR82","doi-asserted-by":"publisher","unstructured":"Zalasi\u0144ski M, Cpa\u0142ka K, Hayashi Y (2015) New fast algorithm for the dynamic signature verification using global features values. In: Artificial intelligence and soft computing. Springer, pp 175\u2013188. https:\/\/doi.org\/10.1007\/978-3-319-19369-4_17","DOI":"10.1007\/978-3-319-19369-4_17"},{"key":"2872_CR83","doi-asserted-by":"publisher","unstructured":"Zimmerman T, Russell G, Heilper A, Smith B, Hu J, Markman D, Graham J, Drews C (2004) Retail applications of signature verification. In: Proceedings of SPIE\u2014the international society for optical engineering, pp 5404. https:\/\/doi.org\/10.1117\/12.542747","DOI":"10.1117\/12.542747"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-020-02872-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-020-02872-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-020-02872-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T18:35:31Z","timestamp":1643654131000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-020-02872-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,15]]},"references-count":83,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["2872"],"URL":"https:\/\/doi.org\/10.1007\/s12652-020-02872-5","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,15]]},"assertion":[{"value":"25 July 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 December 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 January 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"All the authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The link for accessing the code of this paper is .","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}}]}}