{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T16:55:18Z","timestamp":1776358518197,"version":"3.51.2"},"reference-count":69,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1109\/ipta.2017.8310112","type":"proceedings-article","created":{"date-parts":[[2018,3,12]],"date-time":"2018-03-12T17:52:17Z","timestamp":1520877137000},"page":"1-8","source":"Crossref","is-referenced-by-count":133,"title":["Offline handwritten signature verification \u2014 Literature review"],"prefix":"10.1109","author":[{"given":"Luiz G.","family":"Hafemann","sequence":"first","affiliation":[]},{"given":"Robert","family":"Sabourin","sequence":"additional","affiliation":[]},{"given":"Luiz S.","family":"Oliveira","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2011.10.009"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1963564.1963610"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818349"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICFHR.2012.211"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2008.923866"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(96)00063-5"},{"key":"ref37","article-title":"Persian Signature Verification using Convolutional Neural Networks","volume":"1","author":"khalajzadeh","year":"2012","journal-title":"International Journal of Engineering Research and Technology"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001404003630"},{"key":"ref35","first-page":"211","article-title":"An off-line signature verification system using HMM and graphometric features","author":"justino","year":"2000","journal-title":"Proc of Fourth IAPR International Workshop on Document Analysis Systems (DAS)"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2004.11.015"},{"key":"ref60","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1016\/j.patrec.2016.05.023","article-title":"Deep Multitask Metric Learning for Offline Signature Verification","volume":"80","author":"amir","year":"2016","journal-title":"Pattern Recognition Letters"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2007.4377018"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2010.07.028"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICFHR.2010.96"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.05.012"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.10.006"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2016.7727521"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2016.02.003"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117473"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2013.272"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1108\/17563781011094197"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ISCID.2016.2033"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/IPAS.2014.7043305"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2011.10.011"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S0952-1976(00)00064-6"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25976-3_27"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPIT.2008.4775712"},{"key":"ref21","article-title":"Bases de dados de cheques bancarios brasileiros","author":"freitas","year":"2000","journal-title":"XXVI Conferencia Latinoamericana de Informatica"},{"key":"ref24","first-page":"2672","article-title":"Generative Adversarial Nets","author":"goodfellow","year":"2014","journal-title":"Advances in Neural Information Processing Systems 27"},{"key":"ref23","article-title":"Off-line signature verification using contour features","author":"gilperez","year":"2008","journal-title":"11th International Conference on Frontiers in Handwriting Recognition"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2016.7900092"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2014.07.016"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50832-0_60"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25085-9_62"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2015.7139106"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.5815\/ijmecs.2015.04.08"},{"key":"ref57","author":"serdouk","year":"2014","journal-title":"Orthogonal Combination and Rotation Invariant of Local Binary Patterns for Offline Handwritten Signature Verification"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/SITIS.2014.36"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.1994.576979"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.1992.201782"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85920-8_3"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s10032-011-0180-6"},{"key":"ref10","article-title":"Wavelet-Based Off-Line Handwritten Signature Verification","volume":"76","author":"shaohua deng","year":"1999","journal-title":"Computer Vision and Image Understanding"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2560810"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001494000346"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001497000378"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/83.718483"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(95)00092-5"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/NNSP.2000.890166"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2013.0024"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.125"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2014.2343981"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6612969"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.05.009"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1561\/2200000006"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2014.05.003"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2013.6637499"},{"key":"ref8","author":"coetzer","year":"2005","journal-title":"Off-line Signature Verification"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2006.125"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/SoCPaR.2009.132"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2017.09.010"},{"key":"ref46","article-title":"Off-line signature verification and recognition by support vector machine","author":"ozgunduz","year":"2005","journal-title":"European Signal Processing Conference EUSIPCO"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.11.039"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/34.824821"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(89)90059-9"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICFHR.2014.109"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"ref44","first-page":"286","article-title":"The graphology applied to signature verification","author":"oliveira","year":"2005","journal-title":"12th Conference of the International Graphonomics Society"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1974.5408537"}],"event":{"name":"2017 Seventh International Conference on Image Processing Theory, Tools and Applications (IPTA)","location":"Montreal, QC","start":{"date-parts":[[2017,11,28]]},"end":{"date-parts":[[2017,12,1]]}},"container-title":["2017 Seventh International Conference on Image Processing Theory, Tools and Applications (IPTA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8304402\/8310074\/08310112.pdf?arnumber=8310112","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,12]],"date-time":"2019-10-12T14:52:00Z","timestamp":1570891920000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8310112\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":69,"URL":"https:\/\/doi.org\/10.1109\/ipta.2017.8310112","relation":{},"subject":[],"published":{"date-parts":[[2017,11]]}}}