{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T00:03:17Z","timestamp":1704931397626},"reference-count":13,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[1985,1,1]],"date-time":"1985-01-01T00:00:00Z","timestamp":473385600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pattern Recognition"],"published-print":{"date-parts":[[1985,1]]},"DOI":"10.1016\/0031-3203(85)90007-x","type":"journal-article","created":{"date-parts":[[2003,6,30]],"date-time":"2003-06-30T18:41:01Z","timestamp":1056998461000},"page":"63-72","source":"Crossref","is-referenced-by-count":18,"title":["Handwriter identification from one-bit quantized pressure patterns"],"prefix":"10.1016","volume":"18","author":[{"given":"K.P.","family":"Zimmermann","sequence":"first","affiliation":[]},{"given":"M.J.","family":"Varady","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0031-3203(85)90007-X_BIB1","series-title":"Information Theory","article-title":"The characterization of cursive writing","author":"Eden","year":"1961"},{"key":"10.1016\/0031-3203(85)90007-X_BIB2","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/BF00272310","article-title":"The guiding of human writing movements","volume":"II","author":"van der Gon","year":"1965","journal-title":"Kybernetik"},{"key":"10.1016\/0031-3203(85)90007-X_BIB3","series-title":"Technical Report 443","article-title":"Experimental studies of handwriting signals","author":"Macdonald","year":"1966"},{"key":"10.1016\/0031-3203(85)90007-X_BIB4","first-page":"73","article-title":"Analysis and synthesis of handwriting","volume":"32","author":"Vredenbregt","year":"1971","journal-title":"Philips tech. Rev."},{"key":"10.1016\/0031-3203(85)90007-X_BIB5","first-page":"31\/4","article-title":"Automated signature verification using handwriting pressure","volume":"1","author":"Sternberg","year":"1975"},{"key":"10.1016\/0031-3203(85)90007-X_BIB6","doi-asserted-by":"crossref","DOI":"10.1147\/rd.213.0245","article-title":"Automatic signature verification based on accelerometry","volume":"21","author":"Herbst","year":"1977","journal-title":"IBM Jl Res. Dev."},{"key":"10.1016\/0031-3203(85)90007-X_BIB7","article-title":"Automatic signature verification: system description and field test results","author":"Liu","year":"1979","journal-title":"IEEE Trans. Syst. Man Cybernet. SMC-9"},{"key":"10.1016\/0031-3203(85)90007-X_BIB8","doi-asserted-by":"crossref","DOI":"10.1147\/rd.266.0765","article-title":"Cursive script recognition by elastic matching","volume":"26","author":"Tappert","year":"1982","journal-title":"IBM Jl Res. Dev."},{"key":"10.1016\/0031-3203(85)90007-X_BIB9","doi-asserted-by":"crossref","DOI":"10.1147\/rd.272.0181","article-title":"An improved regional correlation algorithm for signature verification which permits small speed changes between handwriting segments","volume":"27","author":"Lew","year":"1983","journal-title":"IBM Jl Res. Dev."},{"key":"10.1016\/0031-3203(85)90007-X_BIB10","series-title":"Proc. Carnahan Conf. Crime on Countermeasures","article-title":"Automatic identification of personnel through speaker and signature verification\u2014system description and testing","author":"Haberman","year":"1976"},{"key":"10.1016\/0031-3203(85)90007-X_BIB11","first-page":"212","article-title":"Signature verification experiment based on nonlinear time alignment: a feasibility study","author":"Yasuhara","year":"1977","journal-title":"IEEE Trans. Syst. Man Cybernet. SMC-7"},{"key":"10.1016\/0031-3203(85)90007-X_BIB12","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1111\/j.1469-1809.1936.tb02137.x","article-title":"The use of multiple measurements in taxonomic problems","volume":"7","author":"Fisher","year":"1936","journal-title":"Ann. Eugen."},{"key":"10.1016\/0031-3203(85)90007-X_BIB13","series-title":"BMDP Statistical Software","year":"1981"}],"container-title":["Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:003132038590007X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:003132038590007X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T06:36:54Z","timestamp":1704868614000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/003132038590007X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1985,1]]},"references-count":13,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1985,1]]}},"alternative-id":["003132038590007X"],"URL":"https:\/\/doi.org\/10.1016\/0031-3203(85)90007-x","relation":{},"ISSN":["0031-3203"],"issn-type":[{"value":"0031-3203","type":"print"}],"subject":[],"published":{"date-parts":[[1985,1]]}}}