{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T15:49:22Z","timestamp":1761580162373,"version":"3.30.2"},"reference-count":29,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pattern Recognition"],"published-print":{"date-parts":[[2004,1]]},"DOI":"10.1016\/s0031-3203(03)00229-2","type":"journal-article","created":{"date-parts":[[2003,11,7]],"date-time":"2003-11-07T15:56:24Z","timestamp":1068220584000},"page":"93-103","source":"Crossref","is-referenced-by-count":38,"title":["Using geometric extrema for segment-to-segment characteristics comparison in online signature verification"],"prefix":"10.1016","volume":"37","author":[{"given":"Jaeyeon","family":"Lee","sequence":"first","affiliation":[]},{"given":"Ho-Sub","family":"Yoon","sequence":"additional","affiliation":[]},{"given":"Jung","family":"Soh","sequence":"additional","affiliation":[]},{"given":"Byung Tae","family":"Chun","sequence":"additional","affiliation":[]},{"given":"Yun Koo","family":"Chung","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0031-3203(03)00229-2_BIB1","unstructured":"S. Nanavati, M. Thieme, R. Nanavati, Biometrics: Identity Verification in a Networked World, pp. 123\u2013131, Wiley, New York, 2002."},{"key":"10.1016\/S0031-3203(03)00229-2_BIB2","unstructured":"J. Ashbourn, Biometrics: Advanced Identity Verification, Springer, Berlin, 2002, pp. 61\u201362."},{"key":"10.1016\/S0031-3203(03)00229-2_BIB3","doi-asserted-by":"crossref","unstructured":"W.S. Wijesoma, K.W. Yue, K.L. Chien, T.K. Chow, Online Handwritten Signature Verification for Electronic Commerce over the Internet, WI 2001, LNAI 2198, 2001, pp. 227\u2013236.","DOI":"10.1007\/3-540-45490-X_27"},{"key":"10.1016\/S0031-3203(03)00229-2_BIB4","unstructured":"B. Struif, Use of biometrics for user verification in electronic signature smartcards, E-smart 2001, Lecture Notes in Computer Science, Vol. 2140, Springer, Berlin, 2001, pp. 220\u2013227."},{"issue":"1","key":"10.1016\/S0031-3203(03)00229-2_BIB5","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/34.824821","article-title":"On-line and off-line handwriting recognition","volume":"22","author":"Plamondon","year":"2000","journal-title":"IEEE Trans. on Pattern Anal. Mach. Intel."},{"issue":"2","key":"10.1016\/S0031-3203(03)00229-2_BIB6","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/0031-3203(89)90059-9","article-title":"Automatic signature verification and write identification\u2014the state of the art","volume":"22","author":"Plamondon","year":"1989","journal-title":"Pattern Recognition"},{"issue":"3","key":"10.1016\/S0031-3203(03)00229-2_BIB7","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1142\/S0218001494000346","article-title":"Automatic signature verification","volume":"8","author":"Leclerc","year":"1994","journal-title":"Int. J. Pattern Recognition Artif. Intel."},{"issue":"1","key":"10.1016\/S0031-3203(03)00229-2_BIB8","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/s100440050007","article-title":"Using landmarks to establish a point-to-point correspondence between signatures","volume":"3","author":"Zhang","year":"2000","journal-title":"Pattern Anal. Appl."},{"issue":"2","key":"10.1016\/S0031-3203(03)00229-2_BIB9","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/s100320050010","article-title":"A hidden Markov model approach to online handwritten signature verification","volume":"1","author":"Kashi","year":"1998","journal-title":"Int. J. Document Anal. Recognition"},{"issue":"2","key":"10.1016\/S0031-3203(03)00229-2_BIB10","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/5.554220","article-title":"Automatic on-line signature verification","volume":"85","author":"Nalwa","year":"1997","journal-title":"Proc. IEEE"},{"issue":"2","key":"10.1016\/S0031-3203(03)00229-2_BIB11","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/s100320050011","article-title":"Incorporating local consistency information into the online signature verification process","volume":"1","author":"Martens","year":"1998","journal-title":"Int. J. Document Anal. Recognition"},{"key":"10.1016\/S0031-3203(03)00229-2_BIB12","unstructured":"V.D. Lecce, G. Dimauro, A. Guerriero, S. Impedovo, G. Pirlo, A. Salzo, A multi-expert system for dynamic signature verification, MCS 2000, Lecture Notes in Computer Science, Vol. 1857, Springer, Berlin, 2000, pp. 320\u2013329."},{"key":"10.1016\/S0031-3203(03)00229-2_BIB13","unstructured":"C. Allgrove, M.C. Fairhurst, Majority voting for improved signature verification, IEE Colloquium on Visual Biometrics (Ref. No. 2000\/018), 2000, pp. 9\/1\u20139\/4."},{"key":"10.1016\/S0031-3203(03)00229-2_BIB14","doi-asserted-by":"publisher","unstructured":"L.P. Cordella, P. Foggia, C. Sansone, F. Tortorella, M. Vento, A cascaded multiple expert system for verification. Multiple Classifier Systems, First International Workshop, MCS 2000, Proceedings, Lecture Notes in Computer Science, Vol. 1857, 2000, pp. 330\u2013339.","DOI":"10.1007\/3-540-45014-9_32"},{"issue":"2","key":"10.1016\/S0031-3203(03)00229-2_BIB15","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/s100440070021","article-title":"Signature verification","volume":"3","author":"Sansone","year":"2000","journal-title":"Pattern Anal. Appl."},{"issue":"7","key":"10.1016\/S0031-3203(03)00229-2_BIB16","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1109\/34.56215","article-title":"A comparative analysis of regional correlation, dynamic time warping, and skeletal tree matching for signature verification","volume":"12","author":"Parizeau","year":"1990","journal-title":"IEEE Trans. Pattern Anal. Mach. Intel."},{"issue":"9","key":"10.1016\/S0031-3203(03)00229-2_BIB17","doi-asserted-by":"publisher","first-page":"953","DOI":"10.1109\/34.232079","article-title":"Segmenting handwritten signatures at their perceptually important points","volume":"15","author":"Brault","year":"1993","journal-title":"IEEE Trans. Pattern Anal. Mach. Intel."},{"key":"10.1016\/S0031-3203(03)00229-2_BIB18","doi-asserted-by":"publisher","first-page":"2752","DOI":"10.1109\/ICSMC.2000.884413","article-title":"Improved segmentation and segment association for on-line signature verification","volume":"4","author":"Yue","year":"2000","journal-title":"Proc. IEEE Int. Conf. Syst. Man Cybernetics"},{"key":"10.1016\/S0031-3203(03)00229-2_BIB19","doi-asserted-by":"publisher","unstructured":"T.H. Rhee, S.J. Cho, J.H. Kim, On-line signature verification using model-guided segmentation and discriminative feature selection for skilled forgeries, Proceedings on the Sixth International Conference on Document Analysis and Recognition, 2001, pp. 645\u2013649.","DOI":"10.1109\/ICDAR.2001.953869"},{"key":"10.1016\/S0031-3203(03)00229-2_BIB20","doi-asserted-by":"publisher","unstructured":"M.E. Munich, P. Perona, Continuous dynamic time warping for translation-invariant curve alignment with applications to signature verification, Proceedings of the Seventh IEEE International Conference on Computer Vision, Vol. 1, 1999, pp. 108\u2013115.","DOI":"10.1109\/ICCV.1999.791205"},{"key":"10.1016\/S0031-3203(03)00229-2_BIB21","doi-asserted-by":"publisher","unstructured":"E.J. Keogh, M.J. Pazzani, Derivative dynamic time warping, First SIAM International Conference on Data Mining (SDM\u20192001), 2001.","DOI":"10.1137\/1.9781611972719.1"},{"key":"10.1016\/S0031-3203(03)00229-2_BIB22","doi-asserted-by":"crossref","unstructured":"T. Wang, V. Cuperman, Robust voicing estimation with dynamic time warping, Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP \u201998, Vol. 1, 1998, pp. 533\u2013536.","DOI":"10.1109\/ICASSP.1998.674485"},{"year":"2000","series-title":"Decision Theory: An Introduction to Dynamic Programming and Sequential Decisions","author":"Bather","key":"10.1016\/S0031-3203(03)00229-2_BIB23"},{"key":"10.1016\/S0031-3203(03)00229-2_BIB24","doi-asserted-by":"crossref","unstructured":"M.C. Fairhust, Management of access through biometric control: a case study based on automatic signature verification, Universal Access in the Information Society, Vol. 1 (1), 2001, pp. 31\u201339.","DOI":"10.1007\/s102090100009"},{"key":"10.1016\/S0031-3203(03)00229-2_BIB25","unstructured":"V. Kecman, Learning and Soft Computing, pp. 1\u2013120, MIT Press, 2001."},{"key":"10.1016\/S0031-3203(03)00229-2_BIB26","doi-asserted-by":"publisher","unstructured":"N. Cristianini, J. Shawe-Taylor, An Introduction to Support Vector Machines and other Kernel-based Learning Methods, Cambridge University Press, Cambridge, 2000, pp. 1\u20138.","DOI":"10.1017\/CBO9780511801389.003"},{"key":"10.1016\/S0031-3203(03)00229-2_BIB27","unstructured":"W.S. Wijesoma, M. Mingming, K.W. Yue, On-line signature verification using a computational intelligence approach, Fuzzy Days 2001, Lecture Notes in Computer Science, Vol. 2206, Springer, Berlin, 2001, pp. 699\u2013711."},{"key":"10.1016\/S0031-3203(03)00229-2_BIB28","doi-asserted-by":"publisher","unstructured":"D.Z. Lejtman, S.E. George, On-line handwritten signature verification using wavelets and back-propagation neural networks, Proceedings on the Sixth International Conference on Document Analysis and Recognition, 2001, pp. 992\u2013996.","DOI":"10.1109\/ICDAR.2001.953934"},{"key":"10.1016\/S0031-3203(03)00229-2_BIB29","unstructured":"R.M. Guest, M.C. Fairhurst, F. Deravi, Signature Collection Best Practice Report, Technical Report, pp. 2\u20135, University of Kent, 2001."}],"container-title":["Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0031320303002292?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0031320303002292?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,12,14]],"date-time":"2024-12-14T09:03:26Z","timestamp":1734167006000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0031320303002292"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,1]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2004,1]]}},"alternative-id":["S0031320303002292"],"URL":"https:\/\/doi.org\/10.1016\/s0031-3203(03)00229-2","relation":{},"ISSN":["0031-3203"],"issn-type":[{"type":"print","value":"0031-3203"}],"subject":[],"published":{"date-parts":[[2004,1]]}}}