{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T02:55:42Z","timestamp":1765421742889,"version":"3.28.0"},"reference-count":141,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,9]]},"DOI":"10.1109\/iciap.2007.4362778","type":"proceedings-article","created":{"date-parts":[[2007,11,6]],"date-time":"2007-11-06T20:28:02Z","timestamp":1194380882000},"page":"191-196","source":"Crossref","is-referenced-by-count":29,"title":["Verification of Handwritten Signatures: an Overview"],"prefix":"10.1109","author":[{"given":"S.","family":"Impedovo","sequence":"first","affiliation":[]},{"given":"G.","family":"Pirlo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"929","article-title":"Improved segmentation through dynamic time warping for signature verification using a neural network classifier","volume":"ii","author":"lee","year":"1998","journal-title":"IEEE International Conference on Image Processing (ICIP)"},{"key":"ref38","first-page":"363","article-title":"A multi-level signature verification system","author":"plamondon","year":"1992","journal-title":"From Pixels to Features III"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(01)00240-0"},{"key":"ref32","first-page":"244","article-title":"Online Chinese signature verification with mixture of experts","author":"cheng","year":"1998","journal-title":"32nd ICCS'T"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1049\/cp:19950498","article-title":"low cost dynamic signature verification system","author":"hamilton","year":"1995","journal-title":"European Convention on Security and Detection (Conf Publ No 408)"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s100320050010"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1142\/9789812797803_0009"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1142\/9789812797803_0008"},{"key":"ref35","first-page":"371","article-title":"A Stroke-Oriented Approach to Signature Verification","author":"dimauro","year":"1992","journal-title":"From Pixels to Features III"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25948-0_71"},{"key":"ref28","first-page":"976","article-title":"The design of an intelligent signature processing system for banking environment","volume":"2","author":"hui","year":"1994","journal-title":"TENCON"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1117\/12.539890"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.1997.619851"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(96)00059-3"},{"key":"ref22","first-page":"6","article-title":"Verification of Handwritten Signature Images by multi-resolution Wavelet Analysis","author":"qi","year":"1993","journal-title":"ICPR"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/S0952-1976(00)00064-6"},{"key":"ref24","first-page":"131","article-title":"Off-line signature verification with thickened templates","author":"yedekcoglu","year":"1995","journal-title":"5th COMCON"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(96)00063-5"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45224-9_56"},{"key":"ref26","first-page":"467","article-title":"Automatic Bankcheck Processing: A New Engineered System","volume":"11","author":"dimauro","year":"1997","journal-title":"IJPRAI"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1006\/dspr.1999.0340"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1142\/9789812797681_0018"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/223355.223662"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1051\/jp4:19982176"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-78646-4_27"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.1994.576868"},{"key":"ref57","first-page":"19","article-title":"Management of access through biometric control: A case study based on automatic signature verification","volume":"1","author":"fairhust","year":"2001","journal-title":"Universal Access in the Information Society (UAIS)"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45493-4_69"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47917-1_17"},{"key":"ref54","first-page":"391","article-title":"Online Handwritten Signature Verification Using Hidden Markov Models","author":"igarza","year":"2003","journal-title":"CIARP 2003"},{"key":"ref53","first-page":"2083","article-title":"On-Line Signature Verification Incorporating the Direction of Pen Movement","volume":"e 74","author":"yoshimura","year":"1991","journal-title":"IEICE Transactions"},{"key":"ref52","first-page":"353","article-title":"On-line signature verification incorporating the direction of pen movement - An experimental examination of the effectiveness","author":"yoshimura","year":"1992","journal-title":"From Pixels to Features III"},{"key":"ref40","first-page":"331","article-title":"Off-line Signature Verification through Fundamental Strokes Analysis","author":"dimauro","year":"1994","journal-title":"Progress in Image Analysis and Processing III"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/6294.899930"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MAES.2006.1662038"},{"key":"ref6","first-page":"643","article-title":"Automatic signature verification: The state of the art-1989&#x2013;1993","volume":"8","author":"leclerc","year":"1994","journal-title":"IJPRAI"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(89)90059-9"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1142\/2440","article-title":"Progress in Automatic Signature Verification","author":"plamondon","year":"1994"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"665","DOI":"10.1016\/S0167-8655(97)00046-9","article-title":"On-line signature verification based on split-and-merge matching mechanism","volume":"18","author":"wu","year":"1997","journal-title":"Patt Recogn Letters"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-78646-4_26"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/S1363-4127(98)80019-8"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2001.953869"},{"key":"ref45","first-page":"262","article-title":"On-line Signature Verification by a Dynamic Segmentation Technique","author":"dimauro","year":"1993","journal-title":"Proc 3th IWFHR"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1147\/rd.244.0496"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1147\/rd.213.0245"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/34.232079"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.1997.619864"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(03)00229-2"},{"key":"ref43","first-page":"443","article-title":"A New On-Line Signature Verification Algorithm Using Variable Length Segmentation and Hidden Markov Models","volume":"i","author":"shafiei","year":"2003","journal-title":"7th ICDAR"},{"key":"ref127","first-page":"587","article-title":"Enrolment validation in optimisation of practical signature verification procedures","author":"fairhurst","year":"1997","journal-title":"Progress in Handwriting Recognition"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1049\/ecej:19970606"},{"key":"ref125","first-page":"565","article-title":"Enrolment model stability in static signature verification","author":"allgrove","year":"2000","journal-title":"7th ICDAR"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1016\/0167-8655(96)00016-5"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.1997.620589"},{"key":"ref72","doi-asserted-by":"crossref","first-page":"870","DOI":"10.1109\/83.388092","article-title":"A multiresolution approach to computer verification of handwritten signatures","volume":"4","author":"qi","year":"1995","journal-title":"IEEE T-IP"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/21.229453"},{"key":"ref71","first-page":"2948","article-title":"Identification and authentication of handwritten signatures with a connectionist approach","author":"pottier","year":"1994","journal-title":"IEEE Conference on Neural Networks"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-60298-4_308"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-78646-4_27"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1006\/dspr.1999.0351"},{"key":"ref130","first-page":"135","article-title":"A new methodology for the measurement of local stability in dynamical signatures","author":"congedo","year":"1994","journal-title":"4th IWFHR"},{"key":"ref77","first-page":"882","article-title":"Applying Personalized Weights to a Feature Set for On-line Signature Verification","volume":"1","author":"kim","year":"1995","journal-title":"3rd ICDAR"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45014-9_32"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.1995.598972"},{"key":"ref133","first-page":"859","article-title":"Off-line signature verification using HMMs and cross-validation","volume":"2","author":"ei-yacoubi","year":"2000","journal-title":"10th NNSP"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.1992.201782"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.1999.791858"},{"key":"ref78","first-page":"617","article-title":"On two-pattern classification and feature selection using neural networks","volume":"ii","author":"lee","year":"1994","journal-title":"ICASSP '94"},{"key":"ref132","article-title":"Technical Evaluation of Biometric Systems","author":"wirtz","year":"1998","journal-title":"ACC'98"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2000.884411"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.1995.598975"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.1994.576979"},{"article-title":"Signature Verification System using Pen Pressure for Internet and E-Commerce Annlication","year":"2001","author":"keit","key":"ref138"},{"key":"ref137","first-page":"329","article-title":"An On-line Signature Verification System Using Hidden Markov Model In Polar Space","author":"yoon","year":"2002","journal-title":"8th IWFHR"},{"key":"ref60","first-page":"331","article-title":"Ott-line SIgnature Verification by Fundamental Components Analysis","author":"congedo","year":"1993","journal-title":"Progress in Image Analysis and Processing III"},{"key":"ref139","article-title":"On-line signature verification based on optimal feature representation and neural-network-driven fuzzy reasoning","author":"martinez-r","year":"2003","journal-title":"SSGRR 2003"},{"key":"ref62","article-title":"Ability of Neural Network for Off-line Signature Verification","author":"fadhel","year":"2000","journal-title":"International Conference of Knowledge Based Computer Systems"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1117\/12.150284"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/s100320050011"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(98)00141-1"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44887-X_28"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(90)90093-Z"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(03)00126-2"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2001.953942"},{"key":"ref67","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1109\/SIBGRA.2000.883902","article-title":"An Off-Line Signature Verification System Using Hidden Markov Model and Cross-Validation","author":"justino","year":"2000","journal-title":"XIII Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI-XIII)"},{"key":"ref68","first-page":"211","article-title":"An Off-Line Signature Verification System Using HMM and Graphometric Features","author":"justino","year":"2000","journal-title":"DAS 2000"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.66"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1142\/9789812797803_0004"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.58"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2001.953765"},{"key":"ref95","first-page":"1055","article-title":"Neural Approaches for Human Signature Verification","volume":"1","author":"lee","year":"1995","journal-title":"3ra ICDAR"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(01)00222-9"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(01)00088-7"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(94)00092-Z"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.1993.395736"},{"key":"ref106","first-page":"389","article-title":"Utilizing Baum-Welch for On-line Signature Verification","author":"martens","year":"1998","journal-title":"6th IWFHR"},{"key":"ref92","first-page":"535","article-title":"On-line signature verification by adaptively weighted DP matching","volume":"e79 d","author":"zhao","year":"1996","journal-title":"IEICE"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/ICNN.1996.549040"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.1999.791205"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(02)00153-8"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.1995.599028"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45631-7_26"},{"key":"ref102","first-page":"1862","article-title":"Handwritten Signature Verification Based on Neural &#x2018;Gas&#x2019; Based Vector Quantization","volume":"ii","author":"zhang","year":"1998","journal-title":"ICPR"},{"key":"ref111","first-page":"135","article-title":"Mathematical Modelation of Handwritten Signatures by Conics","volume":"18","author":"bastos","year":"1998","journal-title":"Revista da Sociedade Paranaese de Matematica"},{"key":"ref112","first-page":"347","article-title":"On the Distortion Measurement of On-Line Signature Verification","author":"wu","year":"1994","journal-title":"4th IWFHR"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2004.05.015"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(95)00092-5"},{"key":"ref99","first-page":"391","article-title":"Cooperative self-organizing maps for signature verification","author":"abu-rezq","year":"1997","journal-title":"IAIF'97"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.1994.399980"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001493000339"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1142\/9789814503549_0001"},{"key":"ref11","first-page":"187","article-title":"Signature Identification Via Local Association of Features","volume":"1","author":"han","year":"1995","journal-title":"3rd ICDAR"},{"key":"ref12","first-page":"131","article-title":"Development of the new digital sign pen system using tactile sensor for handwritten recognition","author":"ornata","year":"2001","journal-title":"Tech Dig 18th Sensor Symposium 2001"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1016\/j.sna.2003.11.014","article-title":"An electrical pen for signature verification using a two-dimensional optical angle sensor","volume":"111","author":"shimizu","year":"2004","journal-title":"Sensors and Actuators"},{"key":"ref14","first-page":"573","article-title":"On Line Handwriting Data Acqusition Using a Video Camera","author":"bunke","year":"1999","journal-title":"5th ICDAR"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/34.990134"},{"key":"ref118","first-page":"35","article-title":"A Fusion Methodology for Recognition of Off-Line Signatures","author":"arif","year":"2004","journal-title":"4th PRIS"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.1996.569811"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1541\/ieejias.114.674"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.1999.791859"},{"key":"ref17","first-page":"782","article-title":"Camera-Based ID verification by Signature Tracking","volume":"1","author":"munich","year":"1998"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.1993.714318"},{"key":"ref18","article-title":"Real-Time Feature-Based Automatic Signature Verification","author":"shridhar","year":"2006","journal-title":"10th IWFHR"},{"key":"ref84","doi-asserted-by":"crossref","first-page":"2526","DOI":"10.1117\/1.600857","article-title":"On-line handwritten signature verification using stroke direction coding","volume":"35","author":"ramanujan","year":"1996","journal-title":"Optical Engineering Journal"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2003.1227796"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/34.506415"},{"key":"ref83","first-page":"31","article-title":"A method for finding Knowledge of Signature Recognition","author":"furuhashi","year":"1994","journal-title":"10th Fuzzy Symposium"},{"key":"ref114","first-page":"202","article-title":"A Hierarchical On-line Chinese Signature Verification System","volume":"1","author":"xiao","year":"1995","journal-title":"3rd ICDAR"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(98)00058-2"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1007\/s100440050029"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ANNES.1995.499465"},{"key":"ref115","article-title":"Cooperation de r&#x00E9;seaux neuronaux pour 1&#x2019; autentification de signatures manuscrites","author":"cardot","year":"1991","journal-title":"Proc of Int Conf Neuro-nimes"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/ICNN.1995.489018"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.1995.598971"},{"key":"ref121","first-page":"191","article-title":"Off-Line Signature Verification, Without a Priori Knowledge of Class ?2. A New Aooroach","volume":"1","author":"murshed","year":"1995","journal-title":"3rd ICDAR"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.1997.619853"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.1997.619854"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/34.615447"},{"key":"ref86","first-page":"526","article-title":"Reduction of Feature Statistics Estimation Error for Small Training Sample Size in Off-Line Signature Verification","author":"fang","year":"2004"},{"key":"ref87","first-page":"38","article-title":"On-Line Signature Verification by Dynamic Time-Warning","author":"martens","year":"1996","journal-title":"13th ICPR"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/IWFHR.2002.1030919"}],"event":{"name":"14th International Conference on Image Analysis and Processing (ICIAP 2007)","start":{"date-parts":[[2007,9,10]]},"location":"Modena, Italy","end":{"date-parts":[[2007,9,14]]}},"container-title":["14th International Conference on Image Analysis and Processing (ICIAP 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4362741\/4362742\/04362778.pdf?arnumber=4362778","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,4]],"date-time":"2019-05-04T06:09:45Z","timestamp":1556950185000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4362778\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9]]},"references-count":141,"URL":"https:\/\/doi.org\/10.1109\/iciap.2007.4362778","relation":{},"subject":[],"published":{"date-parts":[[2007,9]]}}}