{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T20:38:11Z","timestamp":1771706291013,"version":"3.50.1"},"reference-count":46,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2019,9,9]],"date-time":"2019-09-09T00:00:00Z","timestamp":1567987200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2019,9,9]]},"abstract":"<jats:p>As one kind of biological characteristics of people, handwritten signature has been widely used in the banking industry, government and education. Verifying handwritten signatures manually causes too much human cost, and its high probability of errors can threaten the property safety and even society stability. Therefore, the need for an automatic verification system is emphasized. This paper proposes a device-free on-line handwritten signature verification system ASSV, providing paper-based handwritten signature verification service. As far as we know, ASSV is the first system which uses the changes of acoustic signals to realize signature verification. ASSV differs from previous on-line signature verification work in two aspects: 1. It requires neither a special sensor-instrumented pen nor a tablet; 2. People do not need to wear a device such as a smartwatch on the dominant hand for hand tracking. Differing from previous acoustic-based sensing systems, ASSV uses a novel chord-based method to estimate phase-related changes caused by tiny actions. Then based on the estimation, frequency-domain features are extracted by a discrete cosine transform (DCT). Moreover, a deep convolutional neural network (CNN) model fed with distance matrices is designed to verify signatures. Extensive experiments show that ASSV is a robust, efficient and secure system achieving an AUC of 98.7% and an EER of 5.5% with a low latency.<\/jats:p>","DOI":"10.1145\/3351238","type":"journal-article","created":{"date-parts":[[2019,9,10]],"date-time":"2019-09-10T15:58:26Z","timestamp":1568131106000},"page":"1-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["ASSV"],"prefix":"10.1145","volume":"3","author":[{"given":"Feng","family":"Ding","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Dong","family":"Wang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Qian","family":"Zhang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Run","family":"Zhao","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2019,9,9]]},"reference":[{"key":"e_1_2_2_1_1","unstructured":"2013. 2013 ABA Deposit Account Fraud Survey. Retrieved Jan. 4 2019 from https:\/\/www.aba.com\/Products\/Surveys\/Pages\/2013DepositAccount.aspx  2013. 2013 ABA Deposit Account Fraud Survey. Retrieved Jan. 4 2019 from https:\/\/www.aba.com\/Products\/Surveys\/Pages\/2013DepositAccount.aspx"},{"key":"e_1_2_2_2_1","unstructured":"2015. 2015 AFP Payments Fraud and Control Survey. Retrieved Jan. 4 2019 from http:\/\/wwtug.org\/instmem.html  2015. 2015 AFP Payments Fraud and Control Survey. Retrieved Jan. 4 2019 from http:\/\/wwtug.org\/instmem.html"},{"key":"e_1_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493432.2493515"},{"key":"e_1_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2013.12.445"},{"key":"e_1_2_2_5_1","doi-asserted-by":"crossref","unstructured":"Horst Bunke Markus Roth and Ernst G\u00fcnter Schukat-Talamazzini. 1995. Off-line cursive handwriting recognition using hidden Markov models. Pattern recognition 28 9 (1995) 1399--1413.  Horst Bunke Markus Roth and Ernst G\u00fcnter Schukat-Talamazzini. 1995. Off-line cursive handwriting recognition using hidden Markov models. Pattern recognition 28 9 (1995) 1399--1413.","DOI":"10.1016\/0031-3203(95)00013-P"},{"key":"e_1_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/RAIT.2016.7507937"},{"key":"e_1_2_2_7_1","first-page":"3","article-title":"STL: A Seasonal-Trend Decomposition","volume":"6","author":"Cleveland Robert B","year":"1990","journal-title":"Journal of Official Statistics"},{"key":"e_1_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.06.007"},{"key":"e_1_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2007.07.012"},{"key":"e_1_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2015.7333760"},{"key":"e_1_2_2_11_1","unstructured":"Ian Goodfellow Yoshua Bengio Aaron Courville and Yoshua Bengio. 2016. Deep learning. Vol. 1. MIT press Cambridge.   Ian Goodfellow Yoshua Bengio Aaron Courville and Yoshua Bengio. 2016. Deep learning. Vol. 1. MIT press Cambridge."},{"key":"e_1_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208331"},{"key":"e_1_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.05.012"},{"key":"e_1_2_2_14_1","volume-title":"Tools and Applications (IPTA), 2017 Seventh International Conference on. IEEE, 1--8.","author":"Hafemann Luiz G","year":"2017"},{"key":"e_1_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2008.923866"},{"key":"e_1_2_2_17_1","unstructured":"Sergey Ioffe and Christian Szegedy. 2015. Batch normalization: Accelerating deep network training by reducing internal covariate shift. arXiv preprint arXiv:1502.03167 (2015).  Sergey Ioffe and Christian Szegedy. 2015. Batch normalization: Accelerating deep network training by reducing internal covariate shift. arXiv preprint arXiv:1502.03167 (2015)."},{"key":"e_1_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818349"},{"key":"e_1_2_2_19_1","unstructured":"Ramanujan S Kashi Jianying Hu Winston L Nelson and William Turin. 1997. On-line handwritten signature verification using hidden Markov model features. In icdar. IEEE 253.   Ramanujan S Kashi Jianying Hu Winston L Nelson and William Turin. 1997. On-line handwritten signature verification using hidden Markov model features. In icdar. IEEE 253."},{"key":"e_1_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.04.017"},{"key":"e_1_2_2_21_1","volume-title":"International journal of pattern recognition and artificial intelligence 8, 03","author":"Leclerc Franck","year":"1994"},{"key":"e_1_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264929"},{"key":"e_1_2_2_23_1","volume-title":"UltraGesture: Fine-Grained Gesture Sensing and Recognition. In 2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON). IEEE, 1--9.","author":"Ling Kang","year":"2018"},{"key":"e_1_2_2_24_1","volume-title":"LipPass: Lip Reading-based User Authentication on Smartphones Leveraging Acoustic Signals. In IEEE INFOCOM 2018-IEEE Conference on Computer Communications. IEEE, 1466--1474","author":"Lu Li","year":"2018"},{"key":"e_1_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2973755"},{"key":"e_1_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2003.1177152"},{"key":"e_1_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.554220"},{"key":"e_1_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1980022.1980163"},{"key":"e_1_2_2_29_1","doi-asserted-by":"crossref","unstructured":"Rejean Plamondon and Guy Lorette. 1989. Automatic signature verification and writer identification\u00e2\u0102\u0164the state of the art. Pattern recognition 22 2 (1989) 107--131.  Rejean Plamondon and Guy Lorette. 1989. Automatic signature verification and writer identification\u00e2\u0102\u0164the state of the art. Pattern recognition 22 2 (1989) 107--131.","DOI":"10.1016\/0031-3203(89)90059-9"},{"key":"e_1_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.824821"},{"key":"e_1_2_2_31_1","doi-asserted-by":"crossref","unstructured":"Lawrence R Rabiner and Biing-Hwang Juang. 1986. An introduction to hidden Markov models. ieee assp magazine 3 1 (1986) 4--16.  Lawrence R Rabiner and Biing-Hwang Juang. 1986. An introduction to hidden Markov models. ieee assp magazine 3 1 (1986) 4--16.","DOI":"10.1109\/MASSP.1986.1165342"},{"key":"e_1_2_2_32_1","doi-asserted-by":"crossref","unstructured":"A Rodr\u00edguez Valiente A Trinidad JR Garc\u00eda Berrocal C G\u00f3rriz and R Ram\u00edrez Camacho. 2014. Extended high-frequency (9-20 kHz) audiometry reference thresholds in 645 healthy subjects. International journal of audiology 53 8 (2014) 531--545.  A Rodr\u00edguez Valiente A Trinidad JR Garc\u00eda Berrocal C G\u00f3rriz and R Ram\u00edrez Camacho. 2014. Extended high-frequency (9-20 kHz) audiometry reference thresholds in 645 healthy subjects. International journal of audiology 53 8 (2014) 531--545.","DOI":"10.3109\/14992027.2014.893375"},{"key":"e_1_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971736"},{"key":"e_1_2_2_34_1","volume-title":"Structured Document Image Analysis","author":"Sabourin Robert"},{"key":"e_1_2_2_35_1","unstructured":"MC Schoeman-Malan. 2015. Fraud and forgery of the testator's will or signature: the flight from formalities to no formalities. JS Afr. L. (2015) 125.  MC Schoeman-Malan. 2015. Fraud and forgery of the testator's will or signature: the flight from formalities to no formalities. JS Afr. L. (2015) 125."},{"key":"e_1_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/2627435.2670313"},{"key":"e_1_2_2_37_1","unstructured":"Harry Thornburg. 2016. Real-Time Decomposition of Time Series. Retrieved Jan. 1 2019 from https:\/\/developer.ibm.com\/streamsdev\/docs\/real-time-decomposition-of-time-series\/  Harry Thornburg. 2016. Real-Time Decomposition of Time Series. Retrieved Jan. 1 2019 from https:\/\/developer.ibm.com\/streamsdev\/docs\/real-time-decomposition-of-time-series\/"},{"key":"e_1_2_2_38_1","doi-asserted-by":"crossref","unstructured":"David Tse and Pramod Viswanath. 2005. Fundamentals of wireless communication. Cambridge university press.   David Tse and Pramod Viswanath. 2005. Fundamentals of wireless communication. Cambridge university press.","DOI":"10.1017\/CBO9780511807213"},{"key":"e_1_2_2_39_1","doi-asserted-by":"crossref","unstructured":"Tianben Wang Daqing Zhang Leye Wang Yuanqing Zheng Tao Gu Bernadette Dorizzi and Xingshe Zhou. 2018. Contactless Respiration Monitoring using Ultrasound Signal with Off-the-shelf Audio Devices. IEEE Internet of Things Journal (2018).  Tianben Wang Daqing Zhang Leye Wang Yuanqing Zheng Tao Gu Bernadette Dorizzi and Xingshe Zhou. 2018. Contactless Respiration Monitoring using Ultrasound Signal with Off-the-shelf Audio Devices. IEEE Internet of Things Journal (2018).","DOI":"10.1109\/JIOT.2018.2877607"},{"key":"e_1_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3161188"},{"key":"e_1_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2973764"},{"key":"e_1_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790113"},{"key":"e_1_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210325"},{"key":"e_1_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742662"},{"key":"e_1_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081356"},{"key":"e_1_2_2_46_1","volume-title":"Biometric Recognition","author":"Zou Jie"}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3351238","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3351238","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:25:50Z","timestamp":1750206350000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3351238"}},"subtitle":["Handwritten Signature Verification Using Acoustic Signals"],"short-title":[],"issued":{"date-parts":[[2019,9,9]]},"references-count":46,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,9,9]]}},"alternative-id":["10.1145\/3351238"],"URL":"https:\/\/doi.org\/10.1145\/3351238","relation":{},"ISSN":["2474-9567"],"issn-type":[{"value":"2474-9567","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9,9]]},"assertion":[{"value":"2019-09-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}