{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:11:05Z","timestamp":1772644265593,"version":"3.50.1"},"reference-count":277,"publisher":"Association for Computing Machinery (ACM)","issue":"6","license":[{"start":{"date-parts":[[2019,1,28]],"date-time":"2019-01-28T00:00:00Z","timestamp":1548633600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"MIMECO","award":["TEC2016- 77791-C4-1-R"],"award-info":[{"award-number":["TEC2016- 77791-C4-1-R"]}]},{"name":"NSERC-Canada Grant","award":["RGPIN-2015-06409"],"award-info":[{"award-number":["RGPIN-2015-06409"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2019,11,30]]},"abstract":"<jats:p>Handwritten signatures are biometric traits at the center of debate in the scientific community. Over the last 40 years, the interest in signature studies has grown steadily, having as its main reference the application of automatic signature verification, as previously published reviews in 1989, 2000, and 2008 bear witness. Ever since, and over the last 10 years, the application of handwritten signature technology has strongly evolved and much research has focused on the possibility of applying systems based on handwritten signature analysis and processing to a multitude of new fields. After several years of haphazard growth of this research area, it is time to assess its current developments for their applicability in order to draw a structured way forward. This perspective reports a systematic review of the last 10 years of the literature on handwritten signatures with respect to the new scenario, focusing on the most promising domains of research and trying to elicit possible future research directions in this subject.<\/jats:p>","DOI":"10.1145\/3274658","type":"journal-article","created":{"date-parts":[[2019,1,28]],"date-time":"2019-01-28T13:28:51Z","timestamp":1548682131000},"page":"1-39","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":190,"title":["A Perspective Analysis of Handwritten Signature Technology"],"prefix":"10.1145","volume":"51","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3878-3867","authenticated-orcid":false,"given":"Moises","family":"Diaz","sequence":"first","affiliation":[{"name":"Universidad del Atlantico Medio, Las Palmas de Gran Canaria, Spain"}]},{"given":"Miguel A.","family":"Ferrer","sequence":"additional","affiliation":[{"name":"Universidad de Las Palmas de Gran Canaria, Spain"}]},{"given":"Donato","family":"Impedovo","sequence":"additional","affiliation":[{"name":"University of Bari, Bari, Italy"}]},{"given":"Muhammad Imran","family":"Malik","sequence":"additional","affiliation":[{"name":"National University of Sciences and Technology, Islamabad, Pakistan"}]},{"given":"Giuseppe","family":"Pirlo","sequence":"additional","affiliation":[{"name":"University of Bari, Bari, Italy"}]},{"given":"R\u00e9jean","family":"Plamondon","sequence":"additional","affiliation":[{"name":"\u00c9cole Polytechnique of Montr\u00e9al, Canada"}]}],"member":"320","published-online":{"date-parts":[[2019,1,28]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Information technology - Biometric presentation attack detection - Part 1: Framework","author":"IEC","unstructured":"ISO\/ IEC 30107-1:2016. 2016. Information technology - Biometric presentation attack detection - Part 1: Framework . Int. Org. Standardization , Geneva . ISO\/IEC 30107-1:2016. 2016. Information technology - Biometric presentation attack detection - Part 1: Framework. Int. Org. Standardization, Geneva."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41190-8_15"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2008.4493644"},{"key":"e_1_2_1_4_1","unstructured":"K. Ahrabian and B. Babaali. 2017. On usage of autoencoders and siamese networks for online handwritten signature verification. Corr (2017). arXiv:1712.02781 K. Ahrabian and B. Babaali. 2017. On usage of autoencoders and siamese networks for online handwritten signature verification. Corr (2017). arXiv:1712.02781"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.09.011"},{"key":"e_1_2_1_6_1","volume-title":"13th Int. Arab Conf. on Information Technology. 288--293","author":"Al-Maadeed S.","unstructured":"S. Al-Maadeed , W. Ayouby , A. Hassaine , A. Almejali , A. Al-Yazeedi , and R. Al-Atiya . 2012. Arabic signature verification dataset . In 13th Int. Arab Conf. on Information Technology. 288--293 . S. Al-Maadeed, W. Ayouby, A. Hassaine, A. Almejali, A. Al-Yazeedi, and R. Al-Atiya. 2012. Arabic signature verification dataset. In 13th Int. Arab Conf. on Information Technology. 288--293."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2707332"},{"key":"e_1_2_1_8_1","volume-title":"Proceedings of the 14th Biennial Conf. of the Int. Graphonomics Society: Advances in Graphonomics. 6--9.","author":"Alewijnse L. C.","unstructured":"L. C. Alewijnse , C. E. van den Heuvel, R. D. Stoel, and K. Franke. 2009. Analysis of signature complexity . In Proceedings of the 14th Biennial Conf. of the Int. Graphonomics Society: Advances in Graphonomics. 6--9. L. C. Alewijnse, C. E. van den Heuvel, R. D. Stoel, and K. Franke. 2009. Analysis of signature complexity. In Proceedings of the 14th Biennial Conf. of the Int. Graphonomics Society: Advances in Graphonomics. 6--9."},{"key":"e_1_2_1_9_1","volume-title":"Biometrics Symposium","author":"Alonso-Fernandez F.","year":"2007","unstructured":"F. Alonso-Fernandez , M. C. Fairhurst , J. Fierrez , and J. Ortega-Garcia . 2007. Impact of signature legibility and signature type in off-line signature verification . In Biometrics Symposium , 2007 . IEEE, 1--6. F. Alonso-Fernandez, M. C. Fairhurst, J. Fierrez, and J. Ortega-Garcia. 2007. Impact of signature legibility and signature type in off-line signature verification. In Biometrics Symposium, 2007. IEEE, 1--6."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2009.261"},{"key":"e_1_2_1_11_1","unstructured":"G. Alvarez B. Sheffer and M. Bryant. 2016. Offline Signature Verification with Convolutional Neural Networks. Technical Report. Stanford University Stanford. G. Alvarez B. Sheffer and M. Bryant. 2016. Offline Signature Verification with Convolutional Neural Networks. Technical Report. Stanford University Stanford."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2012.0048"},{"key":"e_1_2_1_13_1","volume-title":"Proceedings of the 5th International Conference on Recent Achievements in Mechatronics, Automation, Computer Sciences and Robotics (MACRo'17)","author":"Antal M.","unstructured":"M. Antal and A. Bandi . 2017. Finger or stylus: Their impact on the performance of on-line signature verification systems . In Proceedings of the 5th International Conference on Recent Achievements in Mechatronics, Automation, Computer Sciences and Robotics (MACRo'17) . M. Antal and A. Bandi. 2017. Finger or stylus: Their impact on the performance of on-line signature verification systems. In Proceedings of the 5th International Conference on Recent Achievements in Mechatronics, Automation, Computer Sciences and Robotics (MACRo'17)."},{"key":"e_1_2_1_14_1","doi-asserted-by":"crossref","unstructured":"M. Antal L. Z. Szab\u00f3 and T. Tordai. 2018. Online signature verification on MOBISIG finger-drawn signature corpus. Mobile Information Systems 2018 Article 3127042 (2018) 15 pages. M. Antal L. Z. Szab\u00f3 and T. Tordai. 2018. Online signature verification on MOBISIG finger-drawn signature corpus. Mobile Information Systems 2018 Article 3127042 (2018) 15 pages.","DOI":"10.1155\/2018\/3127042"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2012.2188508"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2168213"},{"key":"e_1_2_1_17_1","volume-title":"Interpreting Evidence: Evaluating Forensic Science in the Courtroom.","author":"Berger C. E. H.","year":"2016","unstructured":"C. E. H. Berger , B. Robertson , and G. A. Vignaux . 2016 . Interpreting Evidence: Evaluating Forensic Science in the Courtroom. Vol. 2 . Wiley . C. E. H. Berger, B. Robertson, and G. A. Vignaux. 2016. Interpreting Evidence: Evaluating Forensic Science in the Courtroom. Vol. 2. Wiley."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2011.04.010"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10032-012-0193-9"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-011-0576-z"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2011.10.011"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.05.009"},{"key":"e_1_2_1_23_1","doi-asserted-by":"crossref","unstructured":"B. Bhanu and A. Kumar. 2017. Deep Learning for Biometrics. Springer. B. Bhanu and A. Kumar. 2017. Deep Learning for Biometrics. Springer.","DOI":"10.1007\/978-3-319-61657-5"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.humov.2010.08.008"},{"key":"e_1_2_1_25_1","volume-title":"IEEE Int. Carnahan Conf. on Security Technology (ICCST\u201912)","author":"Blanco-Gonzalo R.","unstructured":"R. Blanco-Gonzalo , O. M. Hurtado , A. Mendaza-Ormaza , and R. Sanchez-Reillo . 2012. Handwritten signature recognition in mobile scenarios: Performance evaluation . In IEEE Int. Carnahan Conf. on Security Technology (ICCST\u201912) . 174--179. R. Blanco-Gonzalo, O. M. Hurtado, A. Mendaza-Ormaza, and R. Sanchez-Reillo. 2012. Handwritten signature recognition in mobile scenarios: Performance evaluation. In IEEE Int. Carnahan Conf. on Security Technology (ICCST\u201912). 174--179."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2013.0044"},{"key":"e_1_2_1_27_1","volume-title":"Int. Conf. of the Biometrics Special Interest Group (BIOSIG\u201913)","author":"Blanco-Gonzalo R.","unstructured":"R. Blanco-Gonzalo , R. Sanchez-Reillo , O. M. Hurtado , and J. Liu-Jimenez . 2013. Usability analysis of dynamic signature verification in mobile environments . In Int. Conf. of the Biometrics Special Interest Group (BIOSIG\u201913) . IEEE, 1--9. R. Blanco-Gonzalo, R. Sanchez-Reillo, O. M. Hurtado, and J. Liu-Jimenez. 2013. Usability analysis of dynamic signature verification in mobile environments. In Int. Conf. of the Biometrics Special Interest Group (BIOSIG\u201913). IEEE, 1--9."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2009.216"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICFHR.2010.117"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.04.035"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/21.229453"},{"key":"e_1_2_1_32_1","volume-title":"The Neuroscience of Handwriting: Applications for Forensic Document Examination","author":"Caligiuri M. P.","unstructured":"M. P. Caligiuri and L. A Mohammed . 2012. The Neuroscience of Handwriting: Applications for Forensic Document Examination . CRC Press . M. P. Caligiuri and L. A Mohammed. 2012. The Neuroscience of Handwriting: Applications for Forensic Document Examination. CRC Press."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1097\/JCP.0000000000000277"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.psychres.2009.07.005"},{"key":"e_1_2_1_35_1","volume-title":"18th Biennial Conf. of the Int. Graphonomics Society. 131--134","author":"Carina-Fernandes A.","unstructured":"A. Carina-Fernandes and J. M. Lopes-Lima . 2017. Alzheimer\u2019s disease and handwriting. what do we know so far? In 18th Biennial Conf. of the Int. Graphonomics Society. 131--134 . A. Carina-Fernandes and J. M. Lopes-Lima. 2017. Alzheimer\u2019s disease and handwriting. what do we know so far? In 18th Biennial Conf. of the Int. Graphonomics Society. 131--134."},{"key":"e_1_2_1_36_1","volume-title":"The impact of the EU general data protection regulation on scientific research. Ecancermedicalscience 11, 709","author":"Chassang G.","year":"2017","unstructured":"G. Chassang . 2017. The impact of the EU general data protection regulation on scientific research. Ecancermedicalscience 11, 709 ( 2017 ). G. Chassang. 2017. The impact of the EU general data protection regulation on scientific research. Ecancermedicalscience 11, 709 (2017)."},{"key":"e_1_2_1_37_1","volume-title":"7th IEEE Int. Conf. on Software Engineering and Service Science (ICSESS\u201916)","author":"Chen Z.","unstructured":"Z. Chen , X. Xia , and F. Luan . 2016. Automatic online signature verification based on dynamic function features . In 7th IEEE Int. Conf. on Software Engineering and Service Science (ICSESS\u201916) . 964--968. Z. Chen, X. Xia, and F. Luan. 2016. Automatic online signature verification based on dynamic function features. In 7th IEEE Int. Conf. on Software Engineering and Service Science (ICSESS\u201916). 964--968."},{"key":"e_1_2_1_38_1","volume-title":"18th Conf. of the Int. Graphonomics Society (IGS'17)","author":"Costa F.","unstructured":"F. Costa and A. Accardo . 2017. Kinematic analysis of handwriting in parkinson disease . In 18th Conf. of the Int. Graphonomics Society (IGS'17) . 135--138. F. Costa and A. Accardo. 2017. Kinematic analysis of handwriting in parkinson disease. In 18th Conf. of the Int. Graphonomics Society (IGS'17). 135--138."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.12.047"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2014.02.012"},{"key":"e_1_2_1_41_1","volume-title":"Recent Progress in Graphonomics: Learn from the Past--Proceedings of the 16th Conf. of the Int","author":"Danna J.","unstructured":"J. Danna , V. Paz-Villagr\u00e1n , C. Gondre , M. Aramaki , R. Kronland-Martinet , S. Ystad , and J.-L. Velay . 2013. Handwriting sonification for the diagnosis of dysgraphia . In Recent Progress in Graphonomics: Learn from the Past--Proceedings of the 16th Conf. of the Int . Graphonomics Society . 123--126. J. Danna, V. Paz-Villagr\u00e1n, C. Gondre, M. Aramaki, R. Kronland-Martinet, S. Ystad, and J.-L. Velay. 2013. Handwriting sonification for the diagnosis of dysgraphia. In Recent Progress in Graphonomics: Learn from the Past--Proceedings of the 16th Conf. of the Int. Graphonomics Society. 123--126."},{"key":"e_1_2_1_42_1","unstructured":"S. Darwish and A. El-Nour. 2016. Automated offline arabic signature verification system using multiple features fusion for forensic applications. Arab Journal of Forensic Sciences 8 Forensic Medicine 1 4 (2016) 424--437. S. Darwish and A. El-Nour. 2016. Automated offline arabic signature verification system using multiple features fusion for forensic applications. Arab Journal of Forensic Sciences 8 Forensic Medicine 1 4 (2016) 424--437."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2016.0010"},{"key":"e_1_2_1_44_1","volume-title":"6th Int. Symposium on Image and Signal Processing and Analysis. 546--549","author":"Dehghani E.","unstructured":"E. Dehghani and M. E. Moghaddam . 2009. On-line signature verification using ANFIS . In 6th Int. Symposium on Image and Signal Processing and Analysis. 546--549 . E. Dehghani and M. E. Moghaddam. 2009. On-line signature verification using ANFIS. In 6th Int. Symposium on Image and Signal Processing and Analysis. 546--549."},{"key":"e_1_2_1_45_1","volume-title":"Int. Conf. on Machine Learning and Cybernetics","volume":"3","author":"Deng H.-R.","year":"2009","unstructured":"H.-R. Deng and Y.-H. Wang . 2009 . On-line signature verification based on correlation image . In Int. Conf. on Machine Learning and Cybernetics , Vol. 3 . 1788--1792. H.-R. Deng and Y.-H. Wang. 2009. On-line signature verification based on correlation image. In Int. Conf. on Machine Learning and Cybernetics, Vol. 3. 1788--1792."},{"key":"e_1_2_1_46_1","unstructured":"S. Dey A. Dutta J. I. Toledo S. K. Ghosh J. Llad\u00f3s and U. Pal. 2017. SigNet: Convolutional Siamese network for writer independent offline signature verification. Corr (2017). arXiv:1707.02131 S. Dey A. Dutta J. I. Toledo S. K. Ghosh J. Llad\u00f3s and U. Pal. 2017. SigNet: Convolutional Siamese network for writer independent offline signature verification. Corr (2017). arXiv:1707.02131"},{"key":"e_1_2_1_47_1","volume-title":"15th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'16)","author":"Diaz M.","unstructured":"M. Diaz , S. Chanda , M. A. Ferrer , C. K. Banerjee , A. Majumdar , C. Carmona-Duarte , P. Acharya , and U. Pal . 2016. Multiple generation of bengali static signatures . In 15th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'16) . 42--47. M. Diaz, S. Chanda, M. A. Ferrer, C. K. Banerjee, A. Majumdar, C. Carmona-Duarte, P. Acharya, and U. Pal. 2016. Multiple generation of bengali static signatures. In 15th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'16). 42--47."},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2560810"},{"key":"e_1_2_1_49_1","volume-title":"14th IAPR Int. Conf. on Document Analysis and Recognition (ICDAR\u201917)","author":"Diaz M.","unstructured":"M. Diaz , M. A. Ferrer , A. Parziale , and A. Marcelli . 2017. Recovering western on-line signatures from image-based specimens . In 14th IAPR Int. Conf. on Document Analysis and Recognition (ICDAR\u201917) . 1204--1209. M. Diaz, M. A. Ferrer, A. Parziale, and A. Marcelli. 2017. Recovering western on-line signatures from image-based specimens. In 14th IAPR Int. Conf. on Document Analysis and Recognition (ICDAR\u201917). 1204--1209."},{"key":"e_1_2_1_50_1","volume-title":"49th IEEE Int. Carnahan Conf. on Security Technology (ICCST'15)","author":"Diaz M.","unstructured":"M. Diaz , M. A. Ferrer , G. Pirlo , G. Giannico , and D. Impedovo . 2015. Off-line signature stability by optical flow: Feasibility study of predicting the verifier performance . In 49th IEEE Int. Carnahan Conf. on Security Technology (ICCST'15) . 341--345. M. Diaz, M. A. Ferrer, G. Pirlo, G. Giannico, and D. Impedovo. 2015. Off-line signature stability by optical flow: Feasibility study of predicting the verifier performance. In 49th IEEE Int. Carnahan Conf. on Security Technology (ICCST'15). 341--345."},{"key":"e_1_2_1_51_1","volume-title":"23rd Int. Conf. on Pattern Recognition (ICPR\u201916)","author":"Diaz M.","unstructured":"M. Diaz , M. A. Ferrer , and R. Sabourin . 2016. Approaching the intra-class variability in multi-script static signature evaluation . In 23rd Int. Conf. on Pattern Recognition (ICPR\u201916) . IEEE, 1147--1152. M. Diaz, M. A. Ferrer, and R. Sabourin. 2016. Approaching the intra-class variability in multi-script static signature evaluation. In 23rd Int. Conf. on Pattern Recognition (ICPR\u201916). IEEE, 1147--1152."},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2016.2630419"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2015.7333838"},{"key":"e_1_2_1_54_1","volume-title":"Int. Conf. on Frontiers in Handwriting Recognition (ICFHR\u201914)","author":"Diaz-Cabrera M.","unstructured":"M. Diaz-Cabrera , M. A. Ferrer , and A. Morales . 2014. Cognitive inspired model to generate duplicated static signature images . In Int. Conf. on Frontiers in Handwriting Recognition (ICFHR\u201914) . 61--66. M. Diaz-Cabrera, M. A. Ferrer, and A. Morales. 2014. Cognitive inspired model to generate duplicated static signature images. In Int. Conf. on Frontiers in Handwriting Recognition (ICFHR\u201914). 61--66."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0123254"},{"key":"e_1_2_1_56_1","volume-title":"14th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR\u201914)","author":"Diaz-Cabrera M.","unstructured":"M. Diaz-Cabrera , M. Gomez-Barrero , A. Morales , M. A. Ferrer , and J. Galbally . 2014. Generation of enhanced synthetic off-line signatures based on real on-line data . In 14th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR\u201914) . 482--487. M. Diaz-Cabrera, M. Gomez-Barrero, A. Morales, M. A. Ferrer, and J. Galbally. 2014. Generation of enhanced synthetic off-line signatures based on real on-line data. In 14th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR\u201914). 482--487."},{"key":"e_1_2_1_57_1","doi-asserted-by":"crossref","unstructured":"M. Diaz-Cabrera A. Morales and M. A Ferrer. 2014. Emerging issues for static handwritten signature biometric. In Advances in Digital Handwritten Signature Processing. A Human Artefact for e-Society. 111--122. M. Diaz-Cabrera A. Morales and M. A Ferrer. 2014. Emerging issues for static handwritten signature biometric. In Advances in Digital Handwritten Signature Processing. A Human Artefact for e-Society. 111--122.","DOI":"10.1142\/9789814579636_0009"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.264"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.humov.2009.01.005"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.humov.2014.07.006"},{"key":"e_1_2_1_61_1","volume-title":"23rd Int. Conf. on Pattern Recognition (ICPR'16)","author":"Dutta A.","unstructured":"A. Dutta , U. Pal , and J. Llad\u00f3s . 2016. Compact correlated features for writer independent signature verification . In 23rd Int. Conf. on Pattern Recognition (ICPR'16) . IEEE, 3422--3427. A. Dutta, U. Pal, and J. Llad\u00f3s. 2016. Compact correlated features for writer independent signature verification. In 23rd Int. Conf. on Pattern Recognition (ICPR'16). IEEE, 3422--3427."},{"key":"e_1_2_1_62_1","volume-title":"United States: A Path Forward","author":"Edwards H.","year":"2009","unstructured":"H. Edwards , C. Gotsonis , 2009 . Strengthening Forensic Science in the United States: A Path Forward . National Academies Press . H. Edwards, C. Gotsonis, et al. 2009. Strengthening Forensic Science in the United States: A Path Forward. National Academies Press."},{"key":"e_1_2_1_63_1","doi-asserted-by":"crossref","unstructured":"Y. Elmir Z. Elberrichi and R. Adjoudj. 2014. Multimodal biometric using a hierarchical fusion of a person\u2019s face voice and online signature.Journal of Information Processing Systems 10 4 (2014) 555--567. Y. Elmir Z. Elberrichi and R. Adjoudj. 2014. Multimodal biometric using a hierarchical fusion of a person\u2019s face voice and online signature.Journal of Information Processing Systems 10 4 (2014) 555--567.","DOI":"10.3745\/JIPS.02.0007"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.09.004"},{"key":"e_1_2_1_65_1","volume-title":"Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM\u201911)","author":"Eskander G. S.","unstructured":"G. S. Eskander , R. Sabourin , and E. Granger . 2011. Signature based fuzzy vaults with boosted feature selection . In Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM\u201911) . IEEE, 131--138. G. S. Eskander, R. Sabourin, and E. Granger. 2011. Signature based fuzzy vaults with boosted feature selection. In Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM\u201911). IEEE, 131--138."},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2013.0024"},{"key":"e_1_2_1_67_1","volume-title":"Symposium on Computational Intelligence in Biometrics and Identity Management. 45--52","author":"Eskander G. S.","unstructured":"G. S. Eskander , R. Sabourin , and E. Granger . 2014. Offline signature-based fuzzy vault: A review and new results . In Symposium on Computational Intelligence in Biometrics and Identity Management. 45--52 . G. S. Eskander, R. Sabourin, and E. Granger. 2014. Offline signature-based fuzzy vault: A review and new results. In Symposium on Computational Intelligence in Biometrics and Identity Management. 45--52."},{"key":"e_1_2_1_68_1","volume-title":"Int. Workshop on Biometrics and Forensics (IWBF\u201914)","author":"Fairhurst M.","unstructured":"M. Fairhurst , M. Erbilek , and C. Li . 2014. Enhancing the forensic value of handwriting using emotion prediction . In Int. Workshop on Biometrics and Forensics (IWBF\u201914) . 1--6. M. Fairhurst, M. Erbilek, and C. Li. 2014. Enhancing the forensic value of handwriting using emotion prediction. In Int. Workshop on Biometrics and Forensics (IWBF\u201914). 1--6."},{"key":"e_1_2_1_69_1","volume-title":"Proc. 1st Intl. Conf. on Universal Access in Human-Computer Interaction.","author":"Fairhurst M. C.","unstructured":"M. C. Fairhurst , E. Kaplani , and R. M. Guest . 2001. Complexity measures in handwritten signature verification . In Proc. 1st Intl. Conf. on Universal Access in Human-Computer Interaction. M. C. Fairhurst, E. Kaplani, and R. M. Guest. 2001. Complexity measures in handwritten signature verification. In Proc. 1st Intl. Conf. on Universal Access in Human-Computer Interaction."},{"key":"e_1_2_1_70_1","volume-title":"19th Iranian Conf. on Electrical Engineering (ICEE\u201911)","author":"Falahati D.","unstructured":"D. Falahati , M. S. Helforoush , H. Danyali , and M. Rashidpour . 2011. Static signature verification for Farsi and Arabic signatures using dynamic time warping . In 19th Iranian Conf. on Electrical Engineering (ICEE\u201911) . 1--6. D. Falahati, M. S. Helforoush, H. Danyali, and M. Rashidpour. 2011. Static signature verification for Farsi and Arabic signatures using dynamic time warping. In 19th Iranian Conf. on Electrical Engineering (ICEE\u201911). 1--6."},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2016.11.010"},{"key":"e_1_2_1_72_1","volume-title":"6th Iranian Joint Congress on Fuzzy and Intelligent Systems. 205--209","author":"Farimani S. A.","unstructured":"S. A. Farimani and M. V. Jahan . 2018. An HMM for online signature verification based on velocity and hand movement directions . In 6th Iranian Joint Congress on Fuzzy and Intelligent Systems. 205--209 . S. A. Farimani and M. V. Jahan. 2018. An HMM for online signature verification based on velocity and hand movement directions. In 6th Iranian Joint Congress on Fuzzy and Intelligent Systems. 205--209."},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2014.2343981"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2017.2751740"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2582167"},{"key":"e_1_2_1_76_1","volume-title":"Int. Conf. on Biometrics. IEEE, 1--7.","author":"Ferrer M. A","unstructured":"M. A Ferrer , M. Diaz-Cabrera , and A. Morales . 2013. Synthetic off-line signature image generation . In Int. Conf. on Biometrics. IEEE, 1--7. M. A Ferrer, M. Diaz-Cabrera, and A. Morales. 2013. Synthetic off-line signature image generation. In Int. Conf. on Biometrics. IEEE, 1--7."},{"key":"e_1_2_1_77_1","volume-title":"Proc. IEEE Int. Carnahan Conf. on Security Technology (ICCST\u201913)","author":"Ferrer M. A.","unstructured":"M. A. Ferrer , M. Diaz-Cabrera , A. Morales , J. Galbally , and M. Gomez-Barrero . 2013. Realistic synthetic off-line signature generation based on synthetic on-line data . In Proc. IEEE Int. Carnahan Conf. on Security Technology (ICCST\u201913) . 116--121. M. A. Ferrer, M. Diaz-Cabrera, A. Morales, J. Galbally, and M. Gomez-Barrero. 2013. Realistic synthetic off-line signature generation based on synthetic on-line data. In Proc. IEEE Int. Carnahan Conf. on Security Technology (ICCST\u201913). 116--121."},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190281"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-009-0151-4"},{"key":"e_1_2_1_80_1","doi-asserted-by":"crossref","unstructured":"J. Fierrez and J. Ortega-Garcia. 2008. On-line Signature Verification. Springer 189--209. J. Fierrez and J. Ortega-Garcia. 2008. On-line Signature Verification. Springer 189--209.","DOI":"10.1007\/978-0-387-71041-9_10"},{"key":"e_1_2_1_81_1","volume-title":"International Workshop on Biometric Authentication. Springer, 295--306","author":"Fierrez-Aguilar J.","unstructured":"J. Fierrez-Aguilar , N. Alonso-Hermira , G. Moreno-Marquez , and J. Ortega-Garcia . 2004. An off-line signature verification system based on fusion of local and global information . In International Workshop on Biometric Authentication. Springer, 295--306 . J. Fierrez-Aguilar, N. Alonso-Hermira, G. Moreno-Marquez, and J. Ortega-Garcia. 2004. An off-line signature verification system based on fusion of local and global information. In International Workshop on Biometric Authentication. Springer, 295--306."},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2015.7333760"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/THMS.2016.2634922"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICFHR.2012.254"},{"key":"e_1_2_1_85_1","volume-title":"1st Int. Workshop on Automated Forensic Handwriting Analysis (AFHA\u201911)","author":"Found B.","year":"2011","unstructured":"B. Found . 2011 . An introduction to the character of forensic investigations into questioned signatures . In 1st Int. Workshop on Automated Forensic Handwriting Analysis (AFHA\u201911) . B. Found. 2011. An introduction to the character of forensic investigations into questioned signatures. In 1st Int. Workshop on Automated Forensic Handwriting Analysis (AFHA\u201911)."},{"key":"e_1_2_1_86_1","unstructured":"B. Found D. Rogers and C. Bird. 2012. Documentation of Forensic Handwriting Method: A Modular Approach. Technical Report. Victoria Police Forensic Services Department Victoria Australia. B. Found D. Rogers and C. Bird. 2012. Documentation of Forensic Handwriting Method: A Modular Approach. Technical Report. Victoria Police Forensic Services Department Victoria Australia."},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2225048"},{"key":"e_1_2_1_88_1","volume-title":"Int. Conf. on Document Analysis and Recognition","volume":"2","author":"Freire M.","unstructured":"M. Freire , J. Fierrez , M. Martinez-Diaz , and J. Ortega-Garcia . 2007. On the applicability of off-line signatures to the fuzzy vault construction . In Int. Conf. on Document Analysis and Recognition , Vol. 2 . IEEE, 1173--1177. M. Freire, J. Fierrez, M. Martinez-Diaz, and J. Ortega-Garcia. 2007. On the applicability of off-line signatures to the fuzzy vault construction. In Int. Conf. on Document Analysis and Recognition, Vol. 2. IEEE, 1173--1177."},{"key":"e_1_2_1_89_1","unstructured":"C. Freitas M. Morita L. de Oliveira E. Justino A. Yacoubi E. Lethelier F. Bortolozzi and R. Sabourin. 2000. Bases de dados de cheques banc\u00e1rios brasileiros. In XXVI Conferencia Latinoamericana de Informatica. 209--226. C. Freitas M. Morita L. de Oliveira E. Justino A. Yacoubi E. Lethelier F. Bortolozzi and R. Sabourin. 2000. Bases de dados de cheques banc\u00e1rios brasileiros. In XXVI Conferencia Latinoamericana de Informatica. 209--226."},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2005.12.006"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2015.03.019"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2009.38"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2011.12.007"},{"key":"e_1_2_1_94_1","volume-title":"Int. Joint Conf. on Biometrics (IJCB'17)","author":"Galbally J.","unstructured":"J. Galbally , M. Gomez-Barrero , and A. Ross . 2017. Accuracy evaluation of handwritten signature verification: Rethinking the random-skilled forgeries dichotomy . In Int. Joint Conf. on Biometrics (IJCB'17) . IEEE, 302--310. J. Galbally, M. Gomez-Barrero, and A. Ross. 2017. Accuracy evaluation of handwritten signature verification: Rethinking the random-skilled forgeries dichotomy. In Int. Joint Conf. on Biometrics (IJCB'17). IEEE, 302--310."},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0069897"},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2011.12.011"},{"key":"e_1_2_1_97_1","volume-title":"Biometrics Symposium. IEEE, 83--88","author":"Garcia-Salicetti S.","unstructured":"S. Garcia-Salicetti , N. Houmani , and B. Dorizzi . 2008. A client-entropy measure for on-line signatures . In Biometrics Symposium. IEEE, 83--88 . S. Garcia-Salicetti, N. Houmani, and B. Dorizzi. 2008. A client-entropy measure for on-line signatures. In Biometrics Symposium. IEEE, 83--88."},{"key":"e_1_2_1_98_1","volume-title":"Int. Symposium on Signal Processing and Information Technology. IEEE, 315--319","author":"Ghandali S.","unstructured":"S. Ghandali and M. E. Moghaddam . 2008. A method for off-line Persian signature identification and verification using DWT and image fusion . In Int. Symposium on Signal Processing and Information Technology. IEEE, 315--319 . S. Ghandali and M. E. Moghaddam. 2008. A method for off-line Persian signature identification and verification using DWT and image fusion. In Int. Symposium on Signal Processing and Information Technology. IEEE, 315--319."},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.4304\/jmm.4.3.137-144"},{"key":"e_1_2_1_100_1","volume-title":"4th Int. Workshop on Biometrics and Forensics. IEEE, 1--6.","author":"Gomez-Barrero M.","unstructured":"M. Gomez-Barrero , J. Fierrez , and J. Galbally . 2016. Variable-length template protection based on homomorphic encryption with application to signature biometrics . In 4th Int. Workshop on Biometrics and Forensics. IEEE, 1--6. M. Gomez-Barrero, J. Fierrez, and J. Galbally. 2016. Variable-length template protection based on homomorphic encryption with application to signature biometrics. In 4th Int. Workshop on Biometrics and Forensics. IEEE, 1--6."},{"key":"e_1_2_1_101_1","volume-title":"Proc. European Workshop on Biometrics and Identity Management (BioID\u201911)","author":"Gomez-Barrero M.","unstructured":"M. Gomez-Barrero , J. Galbally , J. Fierrez , and J. Ortega-Garcia . 2011. Hill-climbing attack based on the uphill simplex algorithm and its application to signature verification . In Proc. European Workshop on Biometrics and Identity Management (BioID\u201911) (LNCS-6583). Springer, 83--94. M. Gomez-Barrero, J. Galbally, J. Fierrez, and J. Ortega-Garcia. 2011. Hill-climbing attack based on the uphill simplex algorithm and its application to signature verification. In Proc. European Workshop on Biometrics and Identity Management (BioID\u201911) (LNCS-6583). Springer, 83--94."},{"key":"e_1_2_1_102_1","volume-title":"Conf. on Biometrics (ICB\u201915)","author":"Gomez-Barrero M.","unstructured":"M. Gomez-Barrero , J. Galbally , J. Fierrez , J. Ortega-Garcia , and R. Plamondon . 2015. Enhanced on-line signature verification based on skilled forgery detection using sigma-lognormal features . In Conf. on Biometrics (ICB\u201915) . 501--506. M. Gomez-Barrero, J. Galbally, J. Fierrez, J. Ortega-Garcia, and R. Plamondon. 2015. Enhanced on-line signature verification based on skilled forgery detection using sigma-lognormal features. In Conf. on Biometrics (ICB\u201915). 501--506."},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2009.2034382"},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2014.07.016"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2011.6095931"},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2013.0022"},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.03.024"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.302"},{"key":"e_1_2_1_109_1","volume-title":"Int. Joint Conf. on Neural Networks (IJCNN\u201916)","author":"Hafemann L. G.","unstructured":"L. G. Hafemann , R. Sabourin , and L. S. Oliveira . 2016. Writer-independent feature learning for offline signature verification using deep convolutional neural networks . In Int. Joint Conf. on Neural Networks (IJCNN\u201916) . IEEE, 2576--2583. L. G. Hafemann, R. Sabourin, and L. S. Oliveira. 2016. Writer-independent feature learning for offline signature verification using deep convolutional neural networks. In Int. Joint Conf. on Neural Networks (IJCNN\u201916). IEEE, 2576--2583."},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.05.012"},{"key":"e_1_2_1_111_1","volume-title":"7th Int. Conf. on Image Processing Theory, Tools and Applications (IPTA\u201917)","author":"Hafemann L. G.","unstructured":"L. G. Hafemann , R. Sabourin , and L. S. Oliveira . 2017. Offline handwritten signature verification - literature review . In 7th Int. Conf. on Image Processing Theory, Tools and Applications (IPTA\u201917) . 1--5. L. G. Hafemann, R. Sabourin, and L. S. Oliveira. 2017. Offline handwritten signature verification - literature review. In 7th Int. Conf. on Image Processing Theory, Tools and Applications (IPTA\u201917). 1--5."},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2521611"},{"key":"e_1_2_1_113_1","volume-title":"17th Biennial Conf. of the Int. Graphonomics Society (IGS'15)","author":"Hernandez A. B.","unstructured":"A. B. Hernandez , A. Fischer , and R. Plamondon . 2015. Omega-lognormal analysis of oscillatory movements as a function of brain stroke risk factors . In 17th Biennial Conf. of the Int. Graphonomics Society (IGS'15) . A. B. Hernandez, A. Fischer, and R. Plamondon. 2015. Omega-lognormal analysis of oscillatory movements as a function of brain stroke risk factors. In 17th Biennial Conf. of the Int. Graphonomics Society (IGS'15)."},{"key":"e_1_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501988.2502021"},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117487"},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0151691"},{"key":"e_1_2_1_117_1","volume-title":"IEEE 3rd Int. Conf. on Biometrics: Theory, Applications, and Systems. 1--6.","author":"Houmani N.","unstructured":"N. Houmani , S. Garcia-Salicetti , and B. Dorizzi . 2009. On assessing the robustness of pen coordinates, pen pressure and pen inclination to time variability with personal entropy . In IEEE 3rd Int. Conf. on Biometrics: Theory, Applications, and Systems. 1--6. N. Houmani, S. Garcia-Salicetti, and B. Dorizzi. 2009. On assessing the robustness of pen coordinates, pen pressure and pen inclination to time variability with personal entropy. In IEEE 3rd Int. Conf. on Biometrics: Theory, Applications, and Systems. 1--6."},{"key":"e_1_2_1_118_1","volume-title":"Int. Conf. on Mobile Computing, Applications, and Services. Springer, 396--400","author":"Houmani N.","unstructured":"N. Houmani , S. Garcia-Salicetti , B. Dorizzi , and M. El-Yacoubi . 2010. On-line signature verification on a mobile platform . In Int. Conf. on Mobile Computing, Applications, and Services. Springer, 396--400 . N. Houmani, S. Garcia-Salicetti, B. Dorizzi, and M. El-Yacoubi. 2010. On-line signature verification on a mobile platform. In Int. Conf. on Mobile Computing, Applications, and Services. Springer, 396--400."},{"key":"e_1_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2011.08.008"},{"key":"e_1_2_1_120_1","volume-title":"2nd IEEE Intl. Conf. on Biometrics: Theory, Applications and Systems (BTAS\u201908)","author":"Houmani N.","unstructured":"N. Houmani , S. Garcia Salicetti , and B. Dorizzi . 2008. A novel personal entropy measure confronted with online signature verification systems\u2019 performance . In 2nd IEEE Intl. Conf. on Biometrics: Theory, Applications and Systems (BTAS\u201908) . 1--6. N. Houmani, S. Garcia Salicetti, and B. Dorizzi. 2008. A novel personal entropy measure confronted with online signature verification systems\u2019 performance. In 2nd IEEE Intl. Conf. on Biometrics: Theory, Applications and Systems (BTAS\u201908). 1--6."},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781420048773"},{"key":"e_1_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2010.933"},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2008.923866"},{"key":"e_1_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICFHR.2010.102"},{"key":"e_1_2_1_125_1","doi-asserted-by":"crossref","unstructured":"D. Impedovo and G. Pirlo. 2018. Dynamic handwriting analysis for the assessment of neurodegenerative diseases: A pattern recognition perspective. IEEE Reviews in Biomedical Engineering (2018). D. Impedovo and G. Pirlo. 2018. Dynamic handwriting analysis for the assessment of neurodegenerative diseases: A pattern recognition perspective. IEEE Reviews in Biomedical Engineering (2018).","DOI":"10.1109\/RBME.2018.2840679"},{"key":"e_1_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICFHR.2012.211"},{"key":"e_1_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(99)00047-3"},{"key":"e_1_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICFHR.2012.192"},{"key":"e_1_2_1_129_1","volume-title":"2nd Int. Conf. on E-Business and Information System Security. 1--4.","author":"Ji J.","unstructured":"J. Ji , C. B. Chen , and X. Chen . 2010. Off-line Chinese signature verification: Using weighting factor on similarity computation . In 2nd Int. Conf. on E-Business and Information System Security. 1--4. J. Ji, C. B. Chen, and X. Chen. 2010. Off-line Chinese signature verification: Using weighting factor on similarity computation. In 2nd Int. Conf. on E-Business and Information System Security. 1--4."},{"key":"e_1_2_1_130_1","volume-title":"Int. Conf. on Computational Intelligence and Software Engineering (CiSE'09)","author":"Ji J.","unstructured":"J. Ji and X. Chen . 2009. Off-line Chinese signature verification segmentation and feature extraction . In Int. Conf. on Computational Intelligence and Software Engineering (CiSE'09) . 1--4. J. Ji and X. Chen. 2009. Off-line Chinese signature verification segmentation and feature extraction. In Int. Conf. on Computational Intelligence and Software Engineering (CiSE'09). 1--4."},{"key":"e_1_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2009.597"},{"key":"e_1_2_1_132_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-005-6343-z"},{"key":"e_1_2_1_133_1","volume-title":"Int. Conf. of the Biometrics Special Interest Group (BIOSIG\u201915)","author":"Kahindo C.","unstructured":"C. Kahindo , S. Garcia-Salicetti , and N. Houmani . 2015. A signature complexity measure to select reference signatures for online signature verification . In Int. Conf. of the Biometrics Special Interest Group (BIOSIG\u201915) . IEEE, 1--8. C. Kahindo, S. Garcia-Salicetti, and N. Houmani. 2015. A signature complexity measure to select reference signatures for online signature verification. In Int. Conf. of the Biometrics Special Interest Group (BIOSIG\u201915). IEEE, 1--8."},{"key":"e_1_2_1_134_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001404003630"},{"key":"e_1_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.32"},{"key":"e_1_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2013.83"},{"key":"e_1_2_1_137_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACPR.2013.46"},{"key":"e_1_2_1_138_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICFHR.2010.70"},{"key":"e_1_2_1_139_1","first-page":"7","article-title":"Persian signature verification using convolutional neural networks","volume":"1","author":"Khalajzadeh H.","year":"2012","unstructured":"H. Khalajzadeh , M. Mansouri , and M. Teshnehlab . 2012 . Persian signature verification using convolutional neural networks . International Journal of Engineering Research and Technology 1 , 2 (2012), 7 -- 12 . H. Khalajzadeh, M. Mansouri, and M. Teshnehlab. 2012. Persian signature verification using convolutional neural networks. International Journal of Engineering Research and Technology 1, 2 (2012), 7--12.","journal-title":"International Journal of Engineering Research and Technology"},{"key":"e_1_2_1_140_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-008-0118-x"},{"key":"e_1_2_1_141_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sna.2009.12.031"},{"key":"e_1_2_1_142_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2012.10.011"},{"key":"e_1_2_1_143_1","volume-title":"Int. Conf. on Practical Applications of Agents and Multi-Agent Systems (PAAMS'13)","author":"Krish R. P.","unstructured":"R. P. Krish , J. Fierrez , J. Galbally , and M. Martinez-Diaz . 2013. Dynamic signature verification on smart phones . In Int. Conf. on Practical Applications of Agents and Multi-Agent Systems (PAAMS'13) . Springer, 213--222. R. P. Krish, J. Fierrez, J. Galbally, and M. Martinez-Diaz. 2013. Dynamic signature verification on smart phones. In Int. Conf. on Practical Applications of Agents and Multi-Agent Systems (PAAMS'13). Springer, 213--222."},{"key":"e_1_2_1_144_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2011.10.009"},{"key":"e_1_2_1_145_1","volume-title":"14th IAPR Int. Conf. on Document Analysis and Recognition (ICDAR\u201917)","author":"Lai S.","unstructured":"S. Lai , L. Jin , and W. Yang . 2017. Online signature verification using recurrent neural network and length-normalized path signature . In 14th IAPR Int. Conf. on Document Analysis and Recognition (ICDAR\u201917) . 1--6. S. Lai, L. Jin, and W. Yang. 2017. Online signature verification using recurrent neural network and length-normalized path signature. In 14th IAPR Int. Conf. on Document Analysis and Recognition (ICDAR\u201917). 1--6."},{"key":"e_1_2_1_146_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJBM.2010.030415"},{"key":"e_1_2_1_147_1","doi-asserted-by":"publisher","DOI":"10.4103\/2349-5014.170619"},{"key":"e_1_2_1_148_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2016.683"},{"key":"e_1_2_1_149_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2014.2375959"},{"key":"e_1_2_1_150_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICFHR.2012.217"},{"key":"e_1_2_1_151_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2011.294"},{"key":"e_1_2_1_152_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICFHR.2010.116"},{"key":"e_1_2_1_153_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11910-013-0369-9"},{"key":"e_1_2_1_154_1","volume-title":"IEEE Int. Carnahan Conf. on Security Technology (ICCST\u201916)","author":"Hurtado O. M.","unstructured":"O. M. Hurtado , R. Guest , and T. Chatzisterkotis . 2016. A new approach to automatic signature complexity assessment . In IEEE Int. Carnahan Conf. on Security Technology (ICCST\u201916) . IEEE, 1--7. O. M. Hurtado, R. Guest, and T. Chatzisterkotis. 2016. A new approach to automatic signature complexity assessment. In IEEE Int. Carnahan Conf. on Security Technology (ICCST\u201916). IEEE, 1--7."},{"key":"e_1_2_1_155_1","volume-title":"IEEE Int. Joint Conf. on Biometrics (IJCB\u201914)","author":"Hurtado O. M.","unstructured":"O. M. Hurtado , R. Guest , S. V. Stevenage , and G. J. Neil . 2014. The relationship between handwritten signature production and personality traits . In IEEE Int. Joint Conf. on Biometrics (IJCB\u201914) . IEEE, 1--8. O. M. Hurtado, R. Guest, S. V. Stevenage, and G. J. Neil. 2014. The relationship between handwritten signature production and personality traits. In IEEE Int. Joint Conf. on Biometrics (IJCB\u201914). IEEE, 1--8."},{"key":"e_1_2_1_156_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2009.2038111"},{"key":"e_1_2_1_157_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2010.2041653"},{"key":"e_1_2_1_158_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAS.2012.10"},{"key":"e_1_2_1_159_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2013.196"},{"key":"e_1_2_1_160_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2015.7333948"},{"key":"e_1_2_1_161_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2013.220"},{"key":"e_1_2_1_162_1","doi-asserted-by":"publisher","DOI":"10.31974\/jfde24-21-35"},{"key":"e_1_2_1_163_1","volume-title":"14th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'14)","author":"Malik M. I.","unstructured":"M. I. Malik , M. Liwicki , A. Dengel , S. Uchida , and V. Frinken . 2014. Automatic signature stability analysis and verification using local features . In 14th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'14) . IEEE, 621--626. M. I. Malik, M. Liwicki, A. Dengel, S. Uchida, and V. Frinken. 2014. Automatic signature stability analysis and verification using local features. In 14th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'14). IEEE, 621--626."},{"key":"e_1_2_1_164_1","volume-title":"National Workshop on Information Assurance Research. 1--6.","author":"Mamoun S.","year":"2012","unstructured":"S. Mamoun . 2012 . Off-line arabic signature verification using geometrical features . In National Workshop on Information Assurance Research. 1--6. S. Mamoun. 2012. Off-line arabic signature verification using geometrical features. In National Workshop on Information Assurance Research. 1--6."},{"key":"e_1_2_1_165_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2016.06.016"},{"key":"e_1_2_1_166_1","volume-title":"19th Int. Conf. on Pattern Recognition (ICPR'08)","author":"Martinez-Diaz M.","unstructured":"M. Martinez-Diaz , J. Fierrez , J. Galbally , and J. Ortega-Garcia . 2008. Towards mobile authentication using dynamic signature verification: Useful features and performance evaluation . In 19th Int. Conf. on Pattern Recognition (ICPR'08) . IEEE, 1--5. M. Martinez-Diaz, J. Fierrez, J. Galbally, and J. Ortega-Garcia. 2008. Towards mobile authentication using dynamic signature verification: Useful features and performance evaluation. In 19th Int. Conf. on Pattern Recognition (ICPR'08). IEEE, 1--5."},{"key":"e_1_2_1_167_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2013.0081"},{"key":"e_1_2_1_168_1","doi-asserted-by":"publisher","DOI":"10.1002\/mds.25894"},{"key":"e_1_2_1_169_1","volume-title":"15th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'16)","author":"Matsuda K.","unstructured":"K. Matsuda , W. Ohyama , T. Wakabayashi , and F. Kimura . 2016. Effective random-impostor training for combined segmentation signature verification . In 15th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'16) . IEEE, 489--494. K. Matsuda, W. Ohyama, T. Wakabayashi, and F. Kimura. 2016. Effective random-impostor training for combined segmentation signature verification. In 15th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'16). IEEE, 489--494."},{"key":"e_1_2_1_171_1","volume-title":"IEEE Int. Carnahan Conf. on Security Technology (ICCST\u201910)","author":"Mendaza-Ormaza A.","unstructured":"A. Mendaza-Ormaza , O. M. Hurtado , R. S\u00e1nchez-Reillo , and J. Uriarte . 2010. Analysis on the resolution of the different signals in an on-line handwritten signature verification system applied to portable devices . In IEEE Int. Carnahan Conf. on Security Technology (ICCST\u201910) . 341--350. A. Mendaza-Ormaza, O. M. Hurtado, R. S\u00e1nchez-Reillo, and J. Uriarte. 2010. Analysis on the resolution of the different signals in an on-line handwritten signature verification system applied to portable devices. In IEEE Int. Carnahan Conf. on Security Technology (ICCST\u201910). 341--350."},{"key":"e_1_2_1_172_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2011.6095930"},{"key":"e_1_2_1_173_1","volume-title":"7th World Congress on Intelligent Control and Automation. 3778--3782","author":"Meng M.","unstructured":"M. Meng , X. Xi , and Z. Luo . 2008. On-line signature verification based on support vector data description and genetic algorithm . In 7th World Congress on Intelligent Control and Automation. 3778--3782 . M. Meng, X. Xi, and Z. Luo. 2008. On-line signature verification based on support vector data description and genetic algorithm. In 7th World Congress on Intelligent Control and Automation. 3778--3782."},{"key":"e_1_2_1_174_1","volume-title":"Int. Conf. on Information Security and Cryptology. Springer, 331--350","author":"Meng Y.","unstructured":"Y. Meng , D. S. Wong , R. Schlegel , and L. Kwok . 2012. Touch gestures based biometric authentication scheme for touchscreen mobile phones . In Int. Conf. on Information Security and Cryptology. Springer, 331--350 . Y. Meng, D. S. Wong, R. Schlegel, and L. Kwok. 2012. Touch gestures based biometric authentication scheme for touchscreen mobile phones. In Int. Conf. on Information Security and Cryptology. Springer, 331--350."},{"key":"e_1_2_1_175_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1556-4029.2010.01584.x"},{"key":"e_1_2_1_176_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2016.0115"},{"key":"e_1_2_1_177_1","doi-asserted-by":"publisher","DOI":"10.13089\/JKIISC.2016.26.5.1161"},{"key":"e_1_2_1_178_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.10.023"},{"key":"e_1_2_1_179_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.01.008"},{"key":"e_1_2_1_180_1","doi-asserted-by":"publisher","DOI":"10.1145\/1815330.1815390"},{"key":"e_1_2_1_181_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2009.123"},{"key":"e_1_2_1_182_1","doi-asserted-by":"publisher","DOI":"10.1093\/lpr\/mgs019"},{"key":"e_1_2_1_183_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2015.7333874"},{"key":"e_1_2_1_184_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272676"},{"key":"e_1_2_1_185_1","doi-asserted-by":"crossref","first-page":"113","DOI":"10.6000\/2292-2598.2013.01.02.4","article-title":"Dysgraphia in relation to cognitive performance in patients with Alzheimer\u2019s disease","volume":"1","author":"Onofri E.","year":"2013","unstructured":"E. Onofri , M. Mercuri , M. Salesi , S. Ferrara , G. M. Troili , C. Simeone , M. R. Ricciardi , S. Ricci , and T. Archer . 2013 . Dysgraphia in relation to cognitive performance in patients with Alzheimer\u2019s disease . Journal of Intellectual Disability-Diagnosis and Treatment 1 , 2 (2013), 113 -- 124 . E. Onofri, M. Mercuri, M. Salesi, S. Ferrara, G. M. Troili, C. Simeone, M. R. Ricciardi, S. Ricci, and T. Archer. 2013. Dysgraphia in relation to cognitive performance in patients with Alzheimer\u2019s disease. Journal of Intellectual Disability-Diagnosis and Treatment 1, 2 (2013), 113--124.","journal-title":"Journal of Intellectual Disability-Diagnosis and Treatment"},{"key":"e_1_2_1_186_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.10.017"},{"key":"e_1_2_1_187_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.humov.2010.07.010"},{"key":"e_1_2_1_188_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.humov.2012.07.005"},{"key":"e_1_2_1_189_1","doi-asserted-by":"publisher","DOI":"10.3389\/fnagi.2014.00150"},{"key":"e_1_2_1_190_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2009.76"},{"key":"e_1_2_1_191_1","doi-asserted-by":"publisher","DOI":"10.1049\/ip-vis:20031078"},{"key":"e_1_2_1_192_1","volume-title":"12th IAPR Workshop on Document Analysis Systems (DAS\u201916)","author":"Pal S.","unstructured":"S. Pal , A. Alaei , U. Pal , and M. Blumenstein . 2016. Performance of an off-line signature verification method based on texture features on a large indic-script signature dataset . In 12th IAPR Workshop on Document Analysis Systems (DAS\u201916) . IEEE, 72--77. S. Pal, A. Alaei, U. Pal, and M. Blumenstein. 2016. Performance of an off-line signature verification method based on texture features on a large indic-script signature dataset. In 12th IAPR Workshop on Document Analysis Systems (DAS\u201916). IEEE, 72--77."},{"key":"e_1_2_1_193_1","doi-asserted-by":"publisher","DOI":"10.1142\/S146902681340004X"},{"key":"e_1_2_1_194_1","doi-asserted-by":"publisher","DOI":"10.1109\/DICTA.2011.119"},{"key":"e_1_2_1_195_1","volume-title":"Int. Conf. on Hybrid Intelligent Systems (HIS'12)","author":"Pal S.","unstructured":"S. Pal , A. Alaei , U. Pal , and M. Blumenstein . 2012. Multi-script off-line signature identification . In Int. Conf. on Hybrid Intelligent Systems (HIS'12) . 236--240. S. Pal, A. Alaei, U. Pal, and M. Blumenstein. 2012. Multi-script off-line signature identification. In Int. Conf. on Hybrid Intelligent Systems (HIS'12). 236--240."},{"key":"e_1_2_1_196_1","volume-title":"1st Int. Workshop on Automated Forensic Handwriting Analysis (AFHA'11)","author":"Pal S.","unstructured":"S. Pal , M. Blumenstein , and U. Pal . 2011. Non-English and non-Latin signature verification systems a survey . In 1st Int. Workshop on Automated Forensic Handwriting Analysis (AFHA'11) . 1--5. S. Pal, M. Blumenstein, and U. Pal. 2011. Non-English and non-Latin signature verification systems a survey. In 1st Int. Workshop on Automated Forensic Handwriting Analysis (AFHA'11). 1--5."},{"key":"e_1_2_1_197_1","volume-title":"Int. Joint Conf. on Neural Networks (IJCNN\u201912)","author":"Pal S.","unstructured":"S. Pal , U. Pal , and M. Blumenstein . 2012. Off-line English and Chinese signature identification using foreground and background features . In Int. Joint Conf. on Neural Networks (IJCNN\u201912) . 1--7. S. Pal, U. Pal, and M. Blumenstein. 2012. Off-line English and Chinese signature identification using foreground and background features. In Int. Joint Conf. on Neural Networks (IJCNN\u201912). 1--7."},{"key":"e_1_2_1_198_1","volume-title":"Proc. of Int. Conf. on Advances in Computing. Springer","author":"Pal S.","unstructured":"S. Pal , U. Pal , and M. Blumenstein . 2013. Hindi and English off-line signature identification and verification . In Proc. of Int. Conf. on Advances in Computing. Springer , New Delhi, 905--910. S. Pal, U. Pal, and M. Blumenstein. 2013. Hindi and English off-line signature identification and verification. In Proc. of Int. Conf. on Advances in Computing. Springer, New Delhi, 905--910."},{"key":"e_1_2_1_199_1","volume-title":"2nd Int. Workshop on Automated Forensic Handwriting Analysis (AFHA'13)","author":"Pal S.","unstructured":"S. Pal , U. Pal , and M. Blumenstein . 2013. Multi-script off-line signature verification: A two stage approach . In 2nd Int. Workshop on Automated Forensic Handwriting Analysis (AFHA'13) . 31--35. S. Pal, U. Pal, and M. Blumenstein. 2013. Multi-script off-line signature verification: A two stage approach. In 2nd Int. Workshop on Automated Forensic Handwriting Analysis (AFHA'13). 31--35."},{"key":"e_1_2_1_200_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2013.0016"},{"key":"e_1_2_1_201_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2013.06.026"},{"key":"e_1_2_1_202_1","volume-title":"14th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR\u201914)","author":"Parodi M.","unstructured":"M. Parodi , J. C. G\u00f3mez , and L. Alewijnse . 2014. Automatic online signature verification based only on FHE features: An oxymoron? In 14th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR\u201914) . 73--78. M. Parodi, J. C. G\u00f3mez, and L. Alewijnse. 2014. Automatic online signature verification based only on FHE features: An oxymoron? In 14th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR\u201914). 73--78."},{"key":"e_1_2_1_203_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2013.0025"},{"key":"e_1_2_1_204_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41190-8_13"},{"key":"e_1_2_1_205_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACPR.2013.164"},{"key":"e_1_2_1_206_1","doi-asserted-by":"publisher","DOI":"10.1109\/THMS.2015.2443050"},{"key":"e_1_2_1_207_1","volume-title":"1st Workshop on Image-based Smart City Applications: Int. Conf. on Image Analysis and Processing (ICIAP\u201915)","author":"Pirlo G.","unstructured":"G. Pirlo , M. Diaz , M. A. Ferrer , D. Impedovo , F. Occhionero , and U. Zurlo . 2015. Early diagnosis of neurodegenerative diseases by handwritten signature analysis . In 1st Workshop on Image-based Smart City Applications: Int. Conf. on Image Analysis and Processing (ICIAP\u201915) . 290--297. G. Pirlo, M. Diaz, M. A. Ferrer, D. Impedovo, F. Occhionero, and U. Zurlo. 2015. Early diagnosis of neurodegenerative diseases by handwritten signature analysis. In 1st Workshop on Image-based Smart City Applications: Int. Conf. on Image Analysis and Processing (ICIAP\u201915). 290--297."},{"key":"e_1_2_1_208_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2013.0012"},{"key":"e_1_2_1_209_1","doi-asserted-by":"publisher","DOI":"10.1109\/THMS.2013.2279008"},{"key":"e_1_2_1_210_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41190-8_14"},{"key":"e_1_2_1_211_1","volume-title":"17th Biennial Conf. of the Int. Graphonomics Society (IGS'15)","author":"Pirlo G.","unstructured":"G. Pirlo , D. Impedovo , and T. Ferranti . 2015. Stability\/complexity analysis of dynamic handwritten signatures . In 17th Biennial Conf. of the Int. Graphonomics Society (IGS'15) . G. Pirlo, D. Impedovo, and T. Ferranti. 2015. Stability\/complexity analysis of dynamic handwritten signatures. In 17th Biennial Conf. of the Int. Graphonomics Society (IGS'15)."},{"key":"e_1_2_1_212_1","doi-asserted-by":"crossref","unstructured":"G. Pirlo D. Impedovo R. Plamondon and C. O\u2019Reilly. 2014. Stability analysis of online signatures in the generation domain. In Advances in Digital Handwritten Signature Processing. A Human Artefact for e-Society. 1--12. G. Pirlo D. Impedovo R. Plamondon and C. O\u2019Reilly. 2014. Stability analysis of online signatures in the generation domain. In Advances in Digital Handwritten Signature Processing. A Human Artefact for e-Society. 1--12.","DOI":"10.1142\/9789814579636_0001"},{"key":"e_1_2_1_213_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2013.00945"},{"key":"e_1_2_1_214_1","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(89)90059-9"},{"key":"e_1_2_1_215_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2013.05.004"},{"key":"e_1_2_1_216_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2018.04.012"},{"key":"e_1_2_1_217_1","doi-asserted-by":"crossref","unstructured":"R. Plamondon G. Pirlo and D. Impedovo. 2014. Online signature verification. In Handbook of Document Image Processing and Recognition. Springer 917--947. R. Plamondon G. Pirlo and D. Impedovo. 2014. Online signature verification. In Handbook of Document Image Processing and Recognition. Springer 917--947.","DOI":"10.1007\/978-0-85729-859-1_30"},{"key":"e_1_2_1_218_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.824821"},{"key":"e_1_2_1_219_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2008.918575"},{"key":"e_1_2_1_220_1","volume-title":"Int. Symposium on Visual Computing. Springer, 616--625","author":"Rantzsch H.","unstructured":"H. Rantzsch , H. Yang , and C. Meinel . 2016. Signature embedding: Writer independent offline signature verification with deep metric learning . In Int. Symposium on Visual Computing. Springer, 616--625 . H. Rantzsch, H. Yang, and C. Meinel. 2016. Signature embedding: Writer independent offline signature verification with deep metric learning. In Int. Symposium on Visual Computing. Springer, 616--625."},{"key":"e_1_2_1_221_1","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2011-3"},{"key":"e_1_2_1_222_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40520-016-0549-y"},{"key":"e_1_2_1_223_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10032-011-0180-6"},{"key":"e_1_2_1_224_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00415-013-6996-x"},{"key":"e_1_2_1_225_1","volume-title":"14th Conf. of the Int. Graphonomics Society (IGS'09)","author":"Rosenblum S.","unstructured":"S. Rosenblum , M. Samuel , S. Zlotnik , and I. Schlesinger . 2009. Handwriting performance measures of \u201creal life\u201d tasks: A comparison between the performance of patients with Parkinson\u2019s disease and controls . In 14th Conf. of the Int. Graphonomics Society (IGS'09) . 43--47. S. Rosenblum, M. Samuel, S. Zlotnik, and I. Schlesinger. 2009. Handwriting performance measures of \u201creal life\u201d tasks: A comparison between the performance of patients with Parkinson\u2019s disease and controls. In 14th Conf. of the Int. Graphonomics Society (IGS'09). 43--47."},{"key":"e_1_2_1_226_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.rasd.2015.11.004"},{"key":"e_1_2_1_227_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2316472"},{"key":"e_1_2_1_228_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCEE.2008.157"},{"key":"e_1_2_1_229_1","volume-title":"Int. Conf. on Signal and Image Processing Applications (ICSIPA'09)","author":"Schafer B.","unstructured":"B. Schafer and S. Viriri . 2009. An off-line signature verification system . In Int. Conf. on Signal and Image Processing Applications (ICSIPA'09) . 95--100. B. Schafer and S. Viriri. 2009. An off-line signature verification system. In Int. Conf. on Signal and Image Processing Applications (ICSIPA'09). 95--100."},{"key":"e_1_2_1_230_1","unstructured":"M. Schulte-Austum. 2013. D-Scribe. In Presentation at Measurement Science and Standards in Forensic Handwriting Analysis Conf. M. Schulte-Austum. 2013. D-Scribe. In Presentation at Measurement Science and Standards in Forensic Handwriting Analysis Conf."},{"key":"e_1_2_1_231_1","volume-title":"18th Biennial Conf. of the Int. Graphonomics Society (IGS'17)","author":"Senatore R.","unstructured":"R. Senatore and A. Marcelli . 2017. Do handwriting difficulties of Parkinson\u2019s patients depend on their impaired ability to retain the motor plan? A pilot study . In 18th Biennial Conf. of the Int. Graphonomics Society (IGS'17) . 139--142. R. Senatore and A. Marcelli. 2017. Do handwriting difficulties of Parkinson\u2019s patients depend on their impaired ability to retain the motor plan? A pilot study. In 18th Biennial Conf. of the Int. Graphonomics Society (IGS'17). 139--142."},{"key":"e_1_2_1_232_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2017.08.004"},{"key":"e_1_2_1_233_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12559-011-9119-y"},{"key":"e_1_2_1_234_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2016.07.015"},{"key":"e_1_2_1_235_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2632063"},{"key":"e_1_2_1_236_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2017.2647826"},{"key":"e_1_2_1_237_1","first-page":"55","article-title":"Post-stroke writing and reading disorders","volume":"8","author":"Sinanovi\u0107 O.","year":"2013","unstructured":"O. Sinanovi\u0107 and Z. Mrkonji\u0107 . 2013 . Post-stroke writing and reading disorders . Sanamed 8 , 1 (2013), 55 -- 63 . O. Sinanovi\u0107 and Z. Mrkonji\u0107. 2013. Post-stroke writing and reading disorders. Sanamed 8, 1 (2013), 55--63.","journal-title":"Sanamed"},{"key":"e_1_2_1_238_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bandl.2006.12.002"},{"key":"e_1_2_1_239_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0097614"},{"key":"e_1_2_1_240_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2016.05.023"},{"key":"e_1_2_1_241_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2015.0058"},{"key":"e_1_2_1_242_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2014\/324645","article-title":"An immune clonal selection algorithm for synthetic signature generation","volume":"2014","author":"Song M.","year":"2014","unstructured":"M. Song and Z. Sun . 2014 . An immune clonal selection algorithm for synthetic signature generation . Mathematical Problems in Engineering 2014 (2014), 1 -- 12 . M. Song and Z. Sun. 2014. An immune clonal selection algorithm for synthetic signature generation. Mathematical Problems in Engineering 2014 (2014), 1--12.","journal-title":"Mathematical Problems in Engineering"},{"key":"e_1_2_1_243_1","unstructured":"S. Srihari. 2013. iFOX. In Presentation at Measurement Science and Standards in Forensic Handwriting Analysis Conf. S. Srihari. 2013. iFOX. In Presentation at Measurement Science and Standards in Forensic Handwriting Analysis Conf."},{"key":"e_1_2_1_244_1","volume-title":"Handwriting analysis to support neurodegenerative diseases diagnosis: A review. Pattern Recognition Letters","author":"Stefano C. D.","year":"2018","unstructured":"C. D. Stefano , C. De Stefano , F. Fontanella , D. Impedovo , G. Pirlo , and A. Scotto di Freca . 2018. Handwriting analysis to support neurodegenerative diseases diagnosis: A review. Pattern Recognition Letters ( 2018 ). C. D. Stefano, C. De Stefano, F. Fontanella, D. Impedovo, G. Pirlo, and A. Scotto di Freca. 2018. Handwriting analysis to support neurodegenerative diseases diagnosis: A review. Pattern Recognition Letters (2018)."},{"key":"e_1_2_1_245_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.68"},{"key":"e_1_2_1_246_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0176792"},{"key":"e_1_2_1_247_1","doi-asserted-by":"crossref","unstructured":"R. Tolosana R. Vera-Rodriguez J. Fierrez and J. Ortega-Garcia. 2018. Exploring recurrent neural networks for on-line handwritten signature biometrics. IEEE Access (2018) 5128--5138. R. Tolosana R. Vera-Rodriguez J. Fierrez and J. Ortega-Garcia. 2018. Exploring recurrent neural networks for on-line handwritten signature biometrics. IEEE Access (2018) 5128--5138.","DOI":"10.1109\/ACCESS.2018.2793966"},{"key":"e_1_2_1_248_1","volume-title":"Proc. 14th IAPR Int. Conference on Document Analysis and Recognition (ICDAR'17)","author":"Tolosana R.","unstructured":"R. Tolosana , R. Vera-Rodriguez , R. Guest , J. Fierrez , and J. Ortega-Garcia . 2017. Complexity-based biometric signature verification . In Proc. 14th IAPR Int. Conference on Document Analysis and Recognition (ICDAR'17) . R. Tolosana, R. Vera-Rodriguez, R. Guest, J. Fierrez, and J. Ortega-Garcia. 2017. Complexity-based biometric signature verification. In Proc. 14th IAPR Int. Conference on Document Analysis and Recognition (ICDAR'17)."},{"key":"e_1_2_1_249_1","volume-title":"Int. Carnahan Conf. on Security Technology (ICCST'15)","author":"Tolosana R.","unstructured":"R. Tolosana , R. Vera-Rodriguez , J. Ortega-Garcia , and J. Fierrez . 2015. Increasing the robustness of biometric templates for dynamic signature biometric systems . In Int. Carnahan Conf. on Security Technology (ICCST'15) . IEEE, 229--234. R. Tolosana, R. Vera-Rodriguez, J. Ortega-Garcia, and J. Fierrez. 2015. Increasing the robustness of biometric templates for dynamic signature biometric systems. In Int. Carnahan Conf. on Security Technology (ICCST'15). IEEE, 229--234."},{"key":"e_1_2_1_250_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2431493"},{"key":"e_1_2_1_251_1","volume-title":"Int. Workshop on Information Forensics and Security (WIFS\u201915)","author":"Tolosana R.","unstructured":"R. Tolosana , R. Vera-Rodriguez , J. Ortega-Garcia , and J. Fierrez . 2015. Update strategies for HMM-based dynamic signature biometric systems . In Int. Workshop on Information Forensics and Security (WIFS\u201915) . IEEE, 1--6. R. Tolosana, R. Vera-Rodriguez, J. Ortega-Garcia, and J. Fierrez. 2015. Update strategies for HMM-based dynamic signature biometric systems. In Int. Workshop on Information Forensics and Security (WIFS\u201915). IEEE, 1--6."},{"key":"e_1_2_1_252_1","volume-title":"Proc. 1992 IJCNN Int. Joint Conf. on Neural Networks (IJCNN'92)","volume":"3","author":"Tseng L. Y.","unstructured":"L. Y. Tseng and T. H. Huang . 1992. An online Chinese signature verification scheme based on the ART1 neural network . In Proc. 1992 IJCNN Int. Joint Conf. on Neural Networks (IJCNN'92) , Vol. 3 . 624--630. L. Y. Tseng and T. H. Huang. 1992. An online Chinese signature verification scheme based on the ART1 neural network. In Proc. 1992 IJCNN Int. Joint Conf. on Neural Networks (IJCNN'92), Vol. 3. 624--630."},{"key":"e_1_2_1_253_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.827372"},{"key":"e_1_2_1_254_1","volume-title":"5th Int. Conf. on Document Analysis and Recognition (ICDAR'99)","author":"Ureche O.","unstructured":"O. Ureche and R. Plamondon . 1999. Document transport, transfer and exchange: Security and commercial aspects . In 5th Int. Conf. on Document Analysis and Recognition (ICDAR'99) . 585--588. O. Ureche and R. Plamondon. 1999. Document transport, transfer and exchange: Security and commercial aspects. In 5th Int. Conf. on Document Analysis and Recognition (ICDAR'99). 585--588."},{"key":"e_1_2_1_255_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2010.07.028"},{"key":"e_1_2_1_256_1","volume-title":"Int. Conf. on Document Analysis and Recogn. (ICDAR'07)","volume":"2","author":"Vargas F.","unstructured":"F. Vargas , M. A. Ferrer , C. Travieso , and J. Alonso . 2007. Off-line handwritten signature GPDS-960 corpus . In Int. Conf. on Document Analysis and Recogn. (ICDAR'07) , Vol. 2 . 764--768. F. Vargas, M. A. Ferrer, C. Travieso, and J. Alonso. 2007. Off-line handwritten signature GPDS-960 corpus. In Int. Conf. on Document Analysis and Recogn. (ICDAR'07), Vol. 2. 764--768."},{"key":"e_1_2_1_257_1","volume-title":"Biennial Conf. of the Int. Graphonomics Society (IGS'11)","author":"Verduijn R. J.","unstructured":"R. J. Verduijn , E. van den Heuvel, and R. Stoel. 2011. Forensic requirements for automated handwriting analysis systems . In Biennial Conf. of the Int. Graphonomics Society (IGS'11) . 132--135. R. J. Verduijn, E. van den Heuvel, and R. Stoel. 2011. Forensic requirements for automated handwriting analysis systems. In Biennial Conf. of the Int. Graphonomics Society (IGS'11). 132--135."},{"key":"e_1_2_1_258_1","first-page":"113","article-title":"A behavioural biometrics","volume":"9","author":"Vielhauer C.","year":"2005","unstructured":"C. Vielhauer . 2005 . A behavioural biometrics . Public Service Review: European Union 9 (2005), 113 -- 115 . C. Vielhauer. 2005. A behavioural biometrics. Public Service Review: European Union 9 (2005), 113--115.","journal-title":"Public Service Review: European Union"},{"key":"e_1_2_1_259_1","volume-title":"In18th Population Census Conf..","author":"Vijayanunni M.","year":"1998","unstructured":"M. Vijayanunni . 1998 . Planning for 2001 census of India based on 1991 census . In18th Population Census Conf.. M. Vijayanunni. 1998. Planning for 2001 census of India based on 1991 census. In18th Population Census Conf.."},{"key":"e_1_2_1_260_1","unstructured":"M. Walch and D. Gantz. 2013. The forensic language-independent analysis system for handwriting identification (FLASH ID). Presentation at the Measurement Science and Standards In Forensic Handwriting Analysis Conference at The National Institute of Standards 8 Technology (NIST) Gaithersburg Maryland. M. Walch and D. Gantz. 2013. The forensic language-independent analysis system for handwriting identification (FLASH ID). Presentation at the Measurement Science and Standards In Forensic Handwriting Analysis Conference at The National Institute of Standards 8 Technology (NIST) Gaithersburg Maryland."},{"key":"e_1_2_1_261_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2009.2037871"},{"key":"e_1_2_1_262_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2009.2038339"},{"key":"e_1_2_1_263_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIG.2011.57"},{"key":"e_1_2_1_264_1","doi-asserted-by":"publisher","DOI":"10.1080\/13554794.2013.860178"},{"key":"e_1_2_1_265_1","doi-asserted-by":"publisher","DOI":"10.1123\/mcj.14.1.1"},{"key":"e_1_2_1_266_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.humov.2009.10.006"},{"key":"e_1_2_1_267_1","volume-title":"21st Iranian Conf. on Electrical Engineering (ICEE\u201913)","author":"Yahyatabar M. E.","unstructured":"M. E. Yahyatabar , Y. Baleghi , and M. R. Karami . 2013. Online signature verification: A Persian-language specific approach . In 21st Iranian Conf. on Electrical Engineering (ICEE\u201913) . 1--6. M. E. Yahyatabar, Y. Baleghi, and M. R. Karami. 2013. Online signature verification: A Persian-language specific approach. In 21st Iranian Conf. on Electrical Engineering (ICEE\u201913). 1--6."},{"key":"e_1_2_1_268_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2016.0103"},{"key":"e_1_2_1_269_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpsychires.2008.01.006"},{"key":"e_1_2_1_270_1","doi-asserted-by":"publisher","DOI":"10.1080\/02687030050174638"},{"key":"e_1_2_1_271_1","volume-title":"SVC2004: First International signature verification competition. In Biometric Authentication. LNCS","volume":"3072","author":"Yeung D.-Y.","unstructured":"D.-Y. Yeung , H. Chang , Y. Xiong , S. George , R. Kashi , T. Matsumoto , and G. Rigoll . 2004 . SVC2004: First International signature verification competition. In Biometric Authentication. LNCS , Vol. 3072 . Springer, 16--22. D.-Y. Yeung, H. Chang, Y. Xiong, S. George, R. Kashi, T. Matsumoto, and G. Rigoll. 2004. SVC2004: First International signature verification competition. In Biometric Authentication. LNCS, Vol. 3072. Springer, 16--22."},{"key":"e_1_2_1_272_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2016.02.003"},{"key":"e_1_2_1_273_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2015.0017"},{"key":"e_1_2_1_274_1","doi-asserted-by":"crossref","unstructured":"S. Zhang and F. Li. 2012. Off-line handwritten Chinese signature verification based on support vector machine multiple classifiers. In Advances in Electric and Electronics. Springer 563--568. S. Zhang and F. Li. 2012. Off-line handwritten Chinese signature verification based on support vector machine multiple classifiers. In Advances in Electric and Electronics. Springer 563--568.","DOI":"10.1007\/978-3-642-28744-2_74"},{"key":"e_1_2_1_275_1","volume-title":"9th International Symposium on Computational Intelligence and Design (ISCID\u201916)","volume":"2","author":"Zhang Z.","unstructured":"Z. Zhang , X. Liu , and Y. Cui . 2016. Multi-phase offline signature verification system using deep convolutional generative adversarial networks . In 9th International Symposium on Computational Intelligence and Design (ISCID\u201916) , Vol. 2 . 103--107. Z. Zhang, X. Liu, and Y. Cui. 2016. Multi-phase offline signature verification system using deep convolutional generative adversarial networks. In 9th International Symposium on Computational Intelligence and Design (ISCID\u201916), Vol. 2. 103--107."},{"key":"e_1_2_1_276_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2014.43"},{"key":"e_1_2_1_277_1","volume-title":"15th Workshop on Statistical Signal Processing (SSP'09)","author":"Zoghi M.","unstructured":"M. Zoghi and V. Abolghasemi . 2009. Persian signature verification using improved dynamic time warping-based segmentation and multivariate autoregressive modeling . In 15th Workshop on Statistical Signal Processing (SSP'09) . 329--332. M. Zoghi and V. Abolghasemi. 2009. Persian signature verification using improved dynamic time warping-based segmentation and multivariate autoregressive modeling. In 15th Workshop on Statistical Signal Processing (SSP'09). 329--332."},{"key":"e_1_2_1_278_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.01.009"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3274658","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3274658","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:56Z","timestamp":1750208276000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3274658"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,28]]},"references-count":277,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2019,11,30]]}},"alternative-id":["10.1145\/3274658"],"URL":"https:\/\/doi.org\/10.1145\/3274658","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,28]]},"assertion":[{"value":"2018-02-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-08-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-01-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}