{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T07:05:38Z","timestamp":1760425538482,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,2]]},"DOI":"10.1109\/isba.2017.7947708","type":"proceedings-article","created":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T18:35:15Z","timestamp":1497551715000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["Quasi-straightness based features for off-line verification of signatures"],"prefix":"10.1109","author":[{"given":"Md.","family":"Ajij","sequence":"first","affiliation":[]},{"given":"Sanjoy","family":"Pratihar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2016.7727521"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001404003630"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2002.12.001"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1049\/iet-bmt.2014.0024","article-title":"Off-line signature verification: upper and lower envelope shape analysis using chord moments","volume":"3","author":"kumar","year":"2014","journal-title":"IET Biometrics"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1963564.1963610"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2011.10.009"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IVCNZ.2008.4762072"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.04.013"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICFHR.2010.53"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.11.039"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2013.6637499"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2011.10.011"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2005.249"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"970","DOI":"10.1016\/j.protcy.2013.12.445","article-title":"Offline signature verification using pixel matching technique","volume":"10","author":"bhattacharya","year":"2013","journal-title":"Procedia Technology"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.125"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2006.125"},{"journal-title":"GPDS dataset","year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2014.07.016"},{"journal-title":"CEDAR dataset","year":"0","key":"ref1"},{"key":"ref20","first-page":"22","article-title":"Offline signature verification using local interest points and descriptors","author":"ruiz-del solar","year":"2008","journal-title":"Iberoamerican Congress on Pattern Recognition"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.01.001"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(99)00055-2"},{"key":"ref24","first-page":"373","article-title":"Off-line signature verification based on high pressure polar distribution","author":"vargas","year":"2008","journal-title":"Procedeeins of the 11 th International Conference on Frontiers in Handwriting Recognition ICFHR 2008"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2010.07.028"},{"key":"ref26","first-page":"485","article-title":"Triangular geometric feature for offline signature verification","volume":"10","author":"zulnarnain","year":"2016","journal-title":"World Academy of Science Engineering and Technology International Journal of Computer Electrical Automation Control and Information Engineering"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.01.009"}],"event":{"name":"2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","start":{"date-parts":[[2017,2,22]]},"location":"New Delhi, India","end":{"date-parts":[[2017,2,24]]}},"container-title":["2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7938565\/7947678\/07947708.pdf?arnumber=7947708","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T00:30:29Z","timestamp":1569457829000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7947708\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/isba.2017.7947708","relation":{},"subject":[],"published":{"date-parts":[[2017,2]]}}}