{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T04:11:38Z","timestamp":1771474298105,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/icacci.2013.6637499","type":"proceedings-article","created":{"date-parts":[[2013,10,29]],"date-time":"2013-10-29T19:21:09Z","timestamp":1383074469000},"page":"2063-2068","source":"Crossref","is-referenced-by-count":42,"title":["Off-line signature verification based on chain code histogram and Support Vector Machine"],"prefix":"10.1109","author":[{"given":"R. K.","family":"Bharathi","sequence":"first","affiliation":[]},{"given":"B. H.","family":"Shekar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ICRTIT.2011.5972461"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2010.07.028"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/DAS.2012.60"},{"key":"23","first-page":"226","article-title":"Biometric technologies and applications","author":"wang","year":"2007","journal-title":"Proceedings of International Conference on Artificial Intelligence and Applications-IASTED"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85920-8_3"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2011.76"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2009.123"},{"key":"13","first-page":"473","article-title":"Statistical analysis of signature features with respect to applicability in off-line signature verification","volume":"2","author":"kovari","year":"2010","journal-title":"14th WSEAS Int Conf on Computers"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1963564.1963610"},{"key":"11","first-page":"228","article-title":"Off-line signature verification and identification using distance statistics","author":"kalera","year":"2003","journal-title":"International Journal of Pattern Recognition and Artificial Intelligence"},{"key":"12","first-page":"1359","article-title":"Analysis of intra-person variability of features for off-line signature verification","volume":"9","author":"kovari","year":"2010","journal-title":"WSEAS Transactions on Computers"},{"key":"21","first-page":"373","article-title":"Offline signature verification based on high pressure polar distribution","author":"vargas","year":"2008","journal-title":"Procedeeins of the 11th ICFHR 2008"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-84996-098-4","author":"abe","year":"2010","journal-title":"Support Vector Machine for Pattern Classification"},{"key":"20","first-page":"37","article-title":"Kernel eigensignature: An offline signature verification technique based on kernel principal component analysis","author":"shekar","year":"2011","journal-title":"Emergining Applications of Computer Vision-2011 Bilateral Russian-Indian Scientific Workshop"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.5120\/5780-8035"},{"key":"1","first-page":"20","article-title":"Automatic off-line signature verification systems: A review","year":"2011","journal-title":"IJCA Proceedings on International Conference and Workshop on Emerging Trends in Technology (ICWET)"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2004.1334413"},{"key":"7","author":"hsu","year":"2003","journal-title":"A Practical Guide to Support Vector Classification"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2005.12.006"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.125"},{"key":"4","first-page":"1280","article-title":"Use of exterior contours and shape features in off-line signature verification","author":"chen","year":"2005","journal-title":"International Conference on Document Analysis and Recognition"},{"key":"9","first-page":"29","article-title":"An efficient off line signature identification method based on fourier descriptor and chain codes","volume":"10","author":"ismail","year":"2010","journal-title":"International Journal of Computer Science and Network Security"},{"key":"8","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1109\/TSMCC.2008.923866","article-title":"Automatic signature verification: The state of the art","volume":"38","author":"impedovo","year":"2008","journal-title":"IEEE Transactions on Systems Man and Cybernetics Part C (Applications and Reviews)"}],"event":{"name":"2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","location":"Mysore","start":{"date-parts":[[2013,8,22]]},"end":{"date-parts":[[2013,8,25]]}},"container-title":["2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6621059\/6637135\/06637499.pdf?arnumber=6637499","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T21:02:03Z","timestamp":1498078923000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6637499\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icacci.2013.6637499","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}