{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T03:07:35Z","timestamp":1762916855884,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/iwfhr.2002.1030918","type":"proceedings-article","created":{"date-parts":[[2003,6,25]],"date-time":"2003-06-25T18:14:31Z","timestamp":1056564871000},"page":"253-258","source":"Crossref","is-referenced-by-count":36,"title":["On line signature verification: Fusion of a Hidden Markov Model and a neural network via a support vector machine"],"prefix":"10.1109","author":[{"given":"M.","family":"Fuentes","sequence":"first","affiliation":[]},{"given":"S.","family":"Garcia-Salicetti","sequence":"additional","affiliation":[]},{"given":"B.","family":"Dorizzi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","article-title":"The nature of statistical learning theory","author":"vapnik","year":"1999","journal-title":"Statistics for Engineering and Information Science"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(94)00092-Z"},{"key":"15","article-title":"Fundamentals of speech recognition","author":"rabiner","year":"1993","journal-title":"Signal Processing Series"},{"key":"16","first-page":"1755","article-title":"A systematic comparison of online and off-line methods for signature verification with hidden markov models","author":"rigoll","year":"1998","journal-title":"ICPR"},{"key":"13","first-page":"423","article-title":"Authentification dynamique de signatures par reseaux de neurones","volume":"8","author":"minot","year":"1991","journal-title":"Traitement du Signal"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(89)90059-9"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.1994.577051"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/s100320050011"},{"journal-title":"Choosing Kernel Parameters for Support Vector Machines","year":"2000","author":"chapelle","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001493000339"},{"journal-title":"Multi-modal Data Fusion for Person Authentification Using Svm","year":"0","author":"ben-yacoub","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1992.4.3.415"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/s100320050010"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2000.903588"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.1998.711942"},{"journal-title":"Handwriting recognition and verification A hidden Markov approach","year":"1998","author":"dolfing","key":"4"},{"key":"9","first-page":"992","article-title":"On-line handwritten signature verification using wavelets and back-propagation neural networks","author":"letjman","year":"2001","journal-title":"ICDAR"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001494000346"}],"event":{"name":"Eighth International Workshop on Frontiers in Handwriting Recognition","acronym":"IWFHR-02","location":"Niagara on the Lake, Ont., Canada"},"container-title":["Proceedings Eighth International Workshop on Frontiers in Handwriting Recognition"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8011\/22139\/01030918.pdf?arnumber=1030918","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,10]],"date-time":"2017-03-10T11:44:09Z","timestamp":1489146249000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1030918\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/iwfhr.2002.1030918","relation":{},"subject":[]}}