A Perspective Analysis of Handwritten Signature Technology
Handwritten signatures are biometric traits at the center of debate in the scientific community. Over the last 40 years, the interest in signature studies has grown steadily, having as its main reference the application of automatic signature verification, as previously published reviews in 1989, 20...
Saved in:
Published in | ACM computing surveys Vol. 51; no. 6; pp. 1 - 39 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | English |
Published |
New York, NY, USA
ACM
30.11.2019
Association for Computing Machinery |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Handwritten signatures are biometric traits at the center of debate in the scientific community. Over the last 40 years, the interest in signature studies has grown steadily, having as its main reference the application of automatic signature verification, as previously published reviews in 1989, 2000, and 2008 bear witness. Ever since, and over the last 10 years, the application of handwritten signature technology has strongly evolved and much research has focused on the possibility of applying systems based on handwritten signature analysis and processing to a multitude of new fields. After several years of haphazard growth of this research area, it is time to assess its current developments for their applicability in order to draw a structured way forward. This perspective reports a systematic review of the last 10 years of the literature on handwritten signatures with respect to the new scenario, focusing on the most promising domains of research and trying to elicit possible future research directions in this subject. |
---|---|
AbstractList | Handwritten signatures are biometric traits at the center of debate in the scientific community. Over the last 40 years, the interest in signature studies has grown steadily, having as its main reference the application of automatic signature verification, as previously published reviews in 1989, 2000, and 2008 bear witness. Ever since, and over the last 10 years, the application of handwritten signature technology has strongly evolved and much research has focused on the possibility of applying systems based on handwritten signature analysis and processing to a multitude of new fields. After several years of haphazard growth of this research area, it is time to assess its current developments for their applicability in order to draw a structured way forward. This perspective reports a systematic review of the last 10 years of the literature on handwritten signatures with respect to the new scenario, focusing on the most promising domains of research and trying to elicit possible future research directions in this subject. |
ArticleNumber | 117 |
Author | Ferrer, Miguel A. Impedovo, Donato Malik, Muhammad Imran Plamondon, Réjean Diaz, Moises Pirlo, Giuseppe |
Author_xml | – sequence: 1 givenname: Moises orcidid: 0000-0003-3878-3867 surname: Diaz fullname: Diaz, Moises email: moises.diaz@atlanticomedio.es organization: Universidad del Atlantico Medio, Las Palmas de Gran Canaria, Spain – sequence: 2 givenname: Miguel A. surname: Ferrer fullname: Ferrer, Miguel A. email: miguelangel.ferrer@ulpgc.es organization: Universidad de Las Palmas de Gran Canaria, Spain – sequence: 3 givenname: Donato surname: Impedovo fullname: Impedovo, Donato email: donato.impedovo@uniba.it organization: University of Bari, Bari, Italy – sequence: 4 givenname: Muhammad Imran surname: Malik fullname: Malik, Muhammad Imran email: malik.imran@seecs.edu.pk organization: National University of Sciences and Technology, Islamabad, Pakistan – sequence: 5 givenname: Giuseppe surname: Pirlo fullname: Pirlo, Giuseppe email: giuseppe.pirlo@uniba.it organization: University of Bari, Bari, Italy – sequence: 6 givenname: Réjean surname: Plamondon fullname: Plamondon, Réjean email: rejean.plamondon@polymtl.ca organization: École Polytechnique of Montréal, Canada |
BookMark | eNpt0MFLwzAUBvAgE9ymePdU8OCp-tIkTettDHXCQMF5Lmn6OjO6ZCaZsv_eyqYH8fQO78fH996IDKyzSMg5hWtKubhhmeS5KI7IkAohU8k4HZAhsBxSYAAnZBTCCgAyTvMhuZ0kz-jDBnU0H5hMrOp2wYTEtclM2ebTmxjRJi9maVXcekwWqN-s69xyd0qOW9UFPDvMMXm9v1tMZ-n86eFxOpmnikka05yjRt3kXECBohSsbBQyzrBopBRl3fRVJM0oYltLnQHwVjRlI0VdK1aAYmNyuc_dePe-xRCrldv6vmiosv4IlhUc8l5d7ZX2LgSPbbXxZq38rqJQfT-mOjyml-kfqU1U0TgbvTLdP_5i75Ve_4b-LL8AFtlsvg |
CitedBy_id | crossref_primary_10_1016_j_bspc_2023_105040 crossref_primary_10_1016_j_neucom_2020_05_072 crossref_primary_10_1109_TMC_2019_2911506 crossref_primary_10_51252_rcsi_v4i2_642 crossref_primary_10_1109_TIFS_2020_3033442 crossref_primary_10_1016_j_eswa_2022_119111 crossref_primary_10_1007_s12559_023_10205_9 crossref_primary_10_1049_bme2_12007 crossref_primary_10_1049_iet_bmt_2018_5259 crossref_primary_10_35784_iapgos_2718 crossref_primary_10_1016_j_fsidi_2021_301216 crossref_primary_10_1049_iet_bmt_2020_0032 crossref_primary_10_1088_2631_8695_ada86d crossref_primary_10_1109_ACCESS_2020_3033848 crossref_primary_10_3390_app13148022 crossref_primary_10_1109_TIFS_2019_2924195 crossref_primary_10_1007_s12559_021_09938_2 crossref_primary_10_1016_j_engappai_2024_109640 crossref_primary_10_1016_j_patcog_2025_111581 crossref_primary_10_1109_TBIOM_2021_3054533 crossref_primary_10_1016_j_eswa_2024_125470 crossref_primary_10_1016_j_patrec_2021_06_033 crossref_primary_10_1109_ACCESS_2021_3071228 crossref_primary_10_3389_frobt_2023_1112986 crossref_primary_10_1088_1742_6596_2031_1_012042 crossref_primary_10_3390_app10113716 crossref_primary_10_1016_j_engappai_2023_106378 crossref_primary_10_1007_s11042_022_12499_7 crossref_primary_10_1016_j_cosrev_2022_100515 crossref_primary_10_1109_ACCESS_2024_3355449 crossref_primary_10_1111_1556_4029_15386 crossref_primary_10_1016_j_eswa_2021_116136 crossref_primary_10_3390_electronics10040456 crossref_primary_10_1016_j_patcog_2021_108008 crossref_primary_10_1109_ACCESS_2019_2923093 crossref_primary_10_1007_s12652_021_03356_w crossref_primary_10_1016_j_patcog_2020_107699 crossref_primary_10_1080_20961790_2021_1923167 crossref_primary_10_3390_jimaging9040079 crossref_primary_10_1016_j_patrec_2023_02_002 crossref_primary_10_1016_j_patcog_2023_109816 crossref_primary_10_1007_s00521_023_09192_7 crossref_primary_10_1007_s10032_019_00331_2 crossref_primary_10_1007_s12652_020_02872_5 crossref_primary_10_1016_j_patcog_2023_109882 crossref_primary_10_1016_j_eswa_2021_115649 crossref_primary_10_1109_TPAMI_2025_3529022 crossref_primary_10_37661_1816_0301_2022_19_3_62_73 crossref_primary_10_32890_jict2020_19_4_6 crossref_primary_10_1109_TIFS_2020_2991833 crossref_primary_10_3233_JIFS_231369 crossref_primary_10_36548_jaicn_2022_3_007 crossref_primary_10_1016_j_patcog_2023_109681 crossref_primary_10_1016_j_image_2021_116139 crossref_primary_10_1016_j_patcog_2020_107227 crossref_primary_10_1016_j_patcog_2021_108513 crossref_primary_10_1016_j_fsir_2023_100340 crossref_primary_10_1016_j_knosys_2023_110365 crossref_primary_10_1109_ACCESS_2021_3053499 crossref_primary_10_1109_TIFS_2022_3180219 crossref_primary_10_1142_S0218001420530018 crossref_primary_10_4103_jfsm_jfsm_115_23 crossref_primary_10_1007_s11042_023_14638_0 crossref_primary_10_1007_s44395_025_00004_6 crossref_primary_10_1109_ACCESS_2024_3412433 crossref_primary_10_3233_IDT_220247 crossref_primary_10_1007_s10032_023_00455_6 crossref_primary_10_1007_s11042_024_20454_x crossref_primary_10_1109_TPAMI_2021_3087619 crossref_primary_10_1016_j_neucom_2022_08_017 crossref_primary_10_1016_j_patcog_2025_111357 crossref_primary_10_1016_j_neucom_2019_09_041 crossref_primary_10_18287_2412_6179_CO_567 crossref_primary_10_1007_s11042_023_15357_2 crossref_primary_10_1016_j_eswa_2020_114405 crossref_primary_10_3390_s20030933 crossref_primary_10_1109_ACCESS_2022_3167413 crossref_primary_10_1145_3488544 crossref_primary_10_1016_j_eswa_2021_114588 crossref_primary_10_1109_TIFS_2023_3333681 crossref_primary_10_1002_aisy_202300439 crossref_primary_10_1016_j_bspc_2022_103697 crossref_primary_10_1111_1556_4029_15686 crossref_primary_10_1145_3711714 crossref_primary_10_1016_j_patcog_2021_108426 crossref_primary_10_1007_s10032_020_00351_3 crossref_primary_10_1007_s12559_020_09755_z crossref_primary_10_1007_s42486_024_00170_z crossref_primary_10_1145_3605945 crossref_primary_10_1016_j_patrec_2019_06_024 crossref_primary_10_1587_transinf_2020EDP7099 crossref_primary_10_1016_j_patcog_2022_108609 crossref_primary_10_1109_ACCESS_2021_3071479 crossref_primary_10_1007_s11042_022_13159_6 |
Cites_doi | 10.1109/TIFS.2017.2707332 10.1142/S146902681340004X 10.1016/j.patcog.2015.03.019 10.1007/s10032-012-0193-9 10.1109/TIFS.2011.2168213 10.1109/ICDAR.2011.294 10.1007/s00415-013-6996-x 10.1016/j.patcog.2018.04.012 10.1007/s40520-016-0549-y 10.1109/TPAMI.2008.264 10.1007/s11910-013-0369-9 10.1016/j.patcog.2013.06.026 10.1109/TCYB.2017.2647826 10.1016/j.humov.2009.01.005 10.1109/ICDAR.2009.261 10.1371/journal.pone.0069897 10.1097/JCP.0000000000000277 10.1109/FSKD.2009.597 10.31974/jfde24-21-35 10.1109/AICCSA.2008.4493644 10.1049/iet-bmt.2015.0017 10.1109/TCYB.2017.2751740 10.1016/j.patcog.2010.07.028 10.1109/ACPR.2013.164 10.1109/RBME.2018.2840679 10.1109/LSP.2009.2038111 10.1016/j.inffus.2016.02.003 10.1109/TIFS.2016.2632063 10.1109/CCST.2011.6095930 10.13089/JKIISC.2016.26.5.1161 10.1016/j.cose.2017.01.008 10.1016/j.humov.2009.10.006 10.1016/j.patrec.2011.10.009 10.1007/978-3-642-41190-8_13 10.1016/j.rasd.2015.11.004 10.1007/s10032-011-0180-6 10.1109/TPAMI.2008.68 10.1109/TSMCB.2009.2034382 10.1111/j.1556-4029.2010.01584.x 10.1109/ICFHR.2012.192 10.1109/THMS.2015.2443050 10.1109/ICFHR.2012.211 10.1049/iet-bmt.2013.0012 10.1371/journal.pone.0151691 10.1109/TIM.2009.2037871 10.1016/j.patcog.2013.05.004 10.1016/j.psychres.2009.07.005 10.1016/j.patcog.2011.10.011 10.1049/ip-vis:20031078 10.1109/ICDAR.2015.7333838 10.1109/ICDAR.2013.83 10.1049/iet-bmt.2016.0010 10.1109/ACPR.2013.46 10.1016/j.humov.2010.07.010 10.1109/TIFS.2014.2316472 10.1109/TPAMI.2008.302 10.1049/iet-bmt.2013.0016 10.1109/TIFS.2012.2190281 10.1016/j.patrec.2016.07.015 10.1109/TSMCC.2008.923866 10.1016/j.imavis.2017.08.004 10.1007/978-3-642-28744-2_74 10.1109/TCYB.2016.2630419 10.1109/ICFHR.2010.102 10.1016/S0031-3203(99)00047-3 10.1109/ICDAR.2009.123 10.1142/9789814579636_0009 10.1049/iet-bmt.2013.0024 10.1049/iet-bmt.2012.0048 10.1109/ICCEE.2008.157 10.1155/2014/324645 10.1109/ICDAR.2013.196 10.1109/ICDAR.2015.7333874 10.1109/34.824821 10.1109/CCST.2011.6095931 10.1109/BTAS.2017.8272676 10.1016/j.ins.2013.09.004 10.1049/iet-bmt.2013.0044 10.1049/iet-bmt.2013.0081 10.1109/TSMCB.2008.918575 10.1016/j.patcog.2011.04.010 10.1109/THMS.2016.2634922 10.1016/j.patcog.2016.01.009 10.3389/fnagi.2014.00150 10.1007/s10044-008-0118-x 10.1109/TSMCB.2012.2188508 10.1016/j.bandl.2006.12.002 10.4304/jmm.4.3.137-144 10.1109/ICFHR.2010.117 10.1016/j.eswa.2017.03.024 10.1109/TPAMI.2009.76 10.1007/s11265-011-0576-z 10.1109/ICDAR.2009.38 10.1007/978-3-642-41190-8_14 10.1007/s10044-009-0151-4 10.1109/ICPR.2010.933 10.1109/DAS.2012.10 10.1109/ICNP.2014.43 10.1049/iet-bmt.2016.0103 10.1371/journal.pone.0123254 10.1109/TPAMI.2008.32 10.1016/j.patcog.2011.12.007 10.1007/978-3-642-41190-8_15 10.1109/DICTA.2011.119 10.1016/j.eswa.2009.10.023 10.1007/978-3-319-61657-5 10.1007/s12559-011-9119-y 10.1049/iet-bmt.2015.0058 10.1109/HICSS.2016.683 10.1016/0031-3203(89)90059-9 10.1016/j.patrec.2016.06.016 10.1109/ICDAR.2015.7333948 10.1155/2018/3127042 10.1109/TPAMI.2016.2582167 10.1109/ICFHR.2012.254 10.1109/TIFS.2016.2521611 10.1109/ICFHR.2012.217 10.1109/ICFHR.2010.116 10.1016/j.humov.2012.07.005 10.1145/2501988.2502021 10.1186/1687-417X-2011-3 10.1016/j.patcog.2009.05.009 10.1016/j.patcog.2017.09.011 10.1016/j.patcog.2017.05.012 10.1371/journal.pone.0097614 10.1016/j.patcog.2014.07.016 10.1109/TPAMI.2016.2560810 10.1016/j.humov.2010.08.008 10.1504/IJBM.2010.030415 10.1049/iet-bmt.2013.0022 10.1109/ICFHR.2010.70 10.1002/mds.25894 10.1016/j.eswa.2013.12.047 10.1109/TIE.2009.2038339 10.1109/ICIG.2011.57 10.1142/9789814579636_0001 10.1123/mcj.14.1.1 10.1093/lpr/mgs019 10.1201/9781420048773 10.1145/1815330.1815390 10.1109/TSMCA.2010.2041653 10.1109/ICDAR.2013.220 10.3745/JIPS.02.0007 10.1016/j.patcog.2011.08.008 10.1016/j.eswa.2018.04.035 10.1016/j.engappai.2005.12.006 10.1016/j.patcog.2014.02.012 10.1109/THMS.2013.2279008 10.1016/j.humov.2014.07.006 10.1007/s10623-005-6343-z 10.1049/iet-bmt.2013.0025 10.1109/ACCESS.2018.2793966 10.1016/j.patcog.2008.10.017 10.1109/21.229453 10.1007/978-0-387-71041-9_10 10.1109/ICDAR.2009.216 10.1016/j.patcog.2011.12.011 10.1142/S0218001404003630 10.1109/TIFS.2012.2225048 10.1016/j.patrec.2016.05.023 10.1109/ICDAR.2015.7333760 10.1016/j.compeleceng.2016.11.010 10.1016/j.sna.2009.12.031 10.1371/journal.pone.0176792 10.1080/02687030050174638 10.1109/TCYB.2014.2375959 10.1109/TPAMI.2014.2343981 10.1016/j.patrec.2012.10.011 10.6000/2292-2598.2013.01.02.4 10.1016/j.jpsychires.2008.01.006 10.1109/JPROC.2004.827372 10.4103/2349-5014.170619 10.3389/fpsyg.2013.00945 10.1109/ACCESS.2015.2431493 10.1109/IJCB.2011.6117487 10.1007/978-0-85729-859-1_30 10.1080/13554794.2013.860178 10.1049/iet-bmt.2016.0115 |
ContentType | Journal Article |
Copyright | ACM Copyright Association for Computing Machinery Feb 2019 |
Copyright_xml | – notice: ACM – notice: Copyright Association for Computing Machinery Feb 2019 |
DBID | AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
DOI | 10.1145/3274658 |
DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Computer and Information Systems Abstracts CrossRef |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1557-7341 |
EndPage | 39 |
ExternalDocumentID | 10_1145_3274658 3274658 |
GrantInformation_xml | – fundername: MIMECO grantid: TEC2016- 77791-C4-1-R – fundername: NSERC-Canada Grant grantid: RGPIN-2015-06409 |
GroupedDBID | --Z -DZ -~X .4S .DC 23M 4.4 5GY 5VS 6J9 85S 8US 8VB AAIKC AAKMM AALFJ AAMNW AAYFX ABPPZ ACGFO ACGOD ACM ACNCT ADBCU ADL ADMLS ADPZR AEBYY AEGXH AEMOZ AENEX AENSD AFWIH AFWXC AGHSJ AHQJS AIAGR AIKLT AKVCP ALMA_UNASSIGNED_HOLDINGS ARCSS ASPBG AVWKF BDXCO CCLIF CS3 EBE EBR EBS EBU EDO EJD EMK FEDTE GUFHI HGAVV H~9 IAO ICD IEA IGS IOF K1G LHSKQ N95 P1C P2P PQQKQ QWB RNS ROL RXW TAE TH9 U5U UKR UPT VQA W7O WH7 X6Y XH6 XSW XZL YXB Z5M ZCA ZL0 AAYXX ADXHL AEFXT AEJOY AETEA AKRVB CITATION 7SC 8FD JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-a371t-64ececd64508e59539dae343e8d7759bd0027121eefb7c2004f5d9d75bba380a3 |
ISSN | 0360-0300 |
IngestDate | Mon Jun 30 08:27:40 EDT 2025 Thu Jul 03 08:28:31 EDT 2025 Thu Apr 24 22:54:44 EDT 2025 Fri Feb 21 04:13:21 EST 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 6 |
Keywords | surveys biometrics automatic signature verification Offline and online handwritten signature |
Language | English |
License | Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Permissions@acm.org |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-a371t-64ececd64508e59539dae343e8d7759bd0027121eefb7c2004f5d9d75bba380a3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0003-3878-3867 |
OpenAccessLink | https://dl.acm.org/doi/10.1145/3274658 |
PQID | 2241328406 |
PQPubID | 47570 |
PageCount | 39 |
ParticipantIDs | proquest_journals_2241328406 crossref_primary_10_1145_3274658 crossref_citationtrail_10_1145_3274658 acm_primary_3274658 |
PublicationCentury | 2000 |
PublicationDate | 2019-11-30 |
PublicationDateYYYYMMDD | 2019-11-30 |
PublicationDate_xml | – month: 11 year: 2019 text: 2019-11-30 day: 30 |
PublicationDecade | 2010 |
PublicationPlace | New York, NY, USA |
PublicationPlace_xml | – name: New York, NY, USA – name: Baltimore |
PublicationTitle | ACM computing surveys |
PublicationTitleAbbrev | ACM CSUR |
PublicationYear | 2019 |
Publisher | ACM Association for Computing Machinery |
Publisher_xml | – name: ACM – name: Association for Computing Machinery |
References | Y. Meng, D. S. Wong, R. Schlegel, and L. Kwok. 2012. Touch gestures based biometric authentication scheme for touchscreen mobile phones. In Int. Conf. on Information Security and Cryptology. Springer, 331--350. J. Ji, C. B. Chen, and X. Chen. 2010. Off-line Chinese signature verification: Using weighting factor on similarity computation. In 2nd Int. Conf. on E-Business and Information System Security. 1--4. M. Djioua and R. Plamondon. 2009. Studying the variability of handwriting patterns using the kinematic theory. Human Movement Science 28, 5 (2009), 588--601. N. Li, J. Liu, Q. Li, X. Luo, and J. Duan. 2016. Online signature verification based on biometric features. In 49th Hawaii Int. Conf. on System Sciences (HICSS’16). 5527--5534. 10.1109/HICSS.2016.683 M. C. Fairhurst, E. Kaplani, and R. M. Guest. 2001. Complexity measures in handwritten signature verification. In Proc. 1st Intl. Conf. on Universal Access in Human-Computer Interaction. D. S. Guru, K. S. Manjunatha, S. Manjunath, and M. T. Somashekara. 2017. Interval valued symbolic representation of writer dependent features for online signature verification. Expert Systems with Applications 80 (2017), 232--243. 10.1016/j.eswa.2017.03.024 W. Ohyama, Y. Ogi, T. Wakabayashi, and F. Kimura. 2015. Multilingual signature-verification by generalized combined segmentation verification. In 13th Int. Conference on Document Analysis and Recognition (ICDAR'15). 811--815. 10.1109/ICDAR.2015.7333874 E. Onofri, M. Mercuri, M. Salesi, S. Ferrara, G. M. Troili, C. Simeone, M. R. Ricciardi, S. Ricci, and T. Archer. 2013. Dysgraphia in relation to cognitive performance in patients with Alzheimer’s disease. Journal of Intellectual Disability-Diagnosis and Treatment 1, 2 (2013), 113--124. I. A. B. Abdelghani and N. E. B. Amara. 2013. SID signature database: A Tunisian off-line handwritten signature database. In Int. Conf. on Image Analysis and Processing. Springer, 131--139. 10.1007/978-3-642-41190-8_15 A. M. Huber, and R. A. Headrick. 1999. Handwriting Identification: Facts and Fundamentals. Boca Raton, CRC Press. M. A Ferrer, M. Diaz-Cabrera, and A. Morales. 2013. Synthetic off-line signature image generation. In Int. Conf. on Biometrics. IEEE, 1--7. R. Tolosana, R. Vera-Rodriguez, J. Fierrez, and J. Ortega-Garcia. 2018. Exploring recurrent neural networks for on-line handwritten signature biometrics. IEEE Access (2018), 5128--5138. M. Martinez-Diaz, J. Fierrez, R. P. Krish, and J. Galbally. 2014. Mobile signature verification: Feature robustness and performance comparison. IET Biometrics 3, 4 (2014), 267--277. M. Song and Z. Sun. 2014. An immune clonal selection algorithm for synthetic signature generation. Mathematical Problems in Engineering 2014 (2014), 1--12. K. Cpałka, M. Zalasiński, and L. Rutkowski. 2014. New method for the on-line signature verification based on horizontal partitioning. Pattern Recognition 47, 8 (2014), 2652--2661. D.-Y. Yeung, H. Chang, Y. Xiong, S. George, R. Kashi, T. Matsumoto, and G. Rigoll. 2004. SVC2004: First International signature verification competition. In Biometric Authentication. LNCS, Vol. 3072. Springer, 16--22. A. Dutta, U. Pal, and J. Lladós. 2016. Compact correlated features for writer independent signature verification. In 23rd Int. Conf. on Pattern Recognition (ICPR'16). IEEE, 3422--3427. A. Mendaza-Ormaza, O. M. Hurtado, R. Sánchez-Reillo, and J. Uriarte. 2010. Analysis on the resolution of the different signals in an on-line handwritten signature verification system applied to portable devices. In IEEE Int. Carnahan Conf. on Security Technology (ICCST’10). 341--350. J. F. Vargas, M. A. Ferrer, C. M. Travieso, and J. B. Alonso. 2011. Off-line signature verification based on grey level information using texture features. Pattern Recognition 44, 2 (2011), 375--385. 10.1016/j.patcog.2010.07.028 M. Schulte-Austum. 2013. D-Scribe. In Presentation at Measurement Science and Standards in Forensic Handwriting Analysis Conf. M. B. Yılmaz and B. Yanıkoğlu. 2016. Score level fusion of classifiers in off-line signature verification. Information Fusion 32 (2016), 109--119. 10.1016/j.inffus.2016.02.003 L. C. Alewijnse, C. E. van den Heuvel, R. D. Stoel, and K. Franke. 2009. Analysis of signature complexity. In Proceedings of the 14th Biennial Conf. of the Int. Graphonomics Society: Advances in Graphonomics. 6--9. Y. Liu, Z. Yang, and L. Yang. 2015. Online signature verification based on DCT and sparse representation. IEEE Transactions on Cybernetics 45, 11 (2015), 2498--2511. M. I. Malik, S. Ahmed, M. Liwicki, and A. Dengel. 2013. Freak for real time forensic signature verification. In 12th Int. Conf. on Document Analysis and Recognition (ICDAR'13). IEEE, 971--975. 10.1109/ICDAR.2013.196 T. Ito, W. Ohyama, T. Wakabayashi, and F. Kimura. 2012. Combination of signature verification techniques by SVM. In 13th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'12). IEEE, 430--433. 10.1109/ICFHR.2012.192 M. Gomez-Barrero, J. Galbally, J. Fierrez, J. Ortega-Garcia, and R. Plamondon. 2015. Enhanced on-line signature verification based on skilled forgery detection using sigma-lognormal features. In Conf. on Biometrics (ICB’15). 501--506. D. Falahati, M. S. Helforoush, H. Danyali, and M. Rashidpour. 2011. Static signature verification for Farsi and Arabic signatures using dynamic time warping. In 19th Iranian Conf. on Electrical Engineering (ICEE’11). 1--6. T. Steinherz, D. Doermann, E. Rivlin, and N. Intrator. 2009. Offline loop investigation for handwriting analysis. IEEE Transactions on Pattern Analysis and Machine Intelligence 31, 2 (2009), 193--209. 10.1109/TPAMI.2008.68 A. Carina-Fernandes and J. M. Lopes-Lima. 2017. Alzheimer’s disease and handwriting. what do we know so far? In 18th Biennial Conf. of the Int. Graphonomics Society. 131--134. J. Danna, V. Paz-Villagrán, C. Gondre, M. Aramaki, R. Kronland-Martinet, S. Ystad, and J.-L. Velay. 2013. Handwriting sonification for the diagnosis of dysgraphia. In Recent Progress in Graphonomics: Learn from the Past--Proceedings of the 16th Conf. of the Int. Graphonomics Society. 123--126. D. Rivard, E. Granger, and R. Sabourin. 2013. Multi-feature extraction and selection in writer-independent off-line signature verification. International Journal on Document Analysis and Recognition 16 (2013), 83--103. 10.1007/s10032-011-0180-6 A. Lanitis. 2009. A survey of the effects of aging on biometric identity verification. International Journal of Biometrics 2, 1 (2009), 34--52. 10.1504/IJBM.2010.030415 E. Maiorana, P. Campisi, J. Fierrez, J. Ortega-Garcia, and A. Neri. 2010. Cancelable templates for sequence-based biometrics with application to on-line signature recognition. IEEE Transactions on Systems, Man, and Cybernetics Part A: Systems and Humans 40, 3 (2010), 525--538. 10.1109/TSMCA.2010.2041653 Y. Kamihira, W. Ohyama, T. Wakabayashi, and F. Kimura. 2013. Improvement of Japanese signature verification by combined segmentation verification approach. In 2nd IAPR Asian Conf. on Pattern Recognition. 501--505. 10.1109/ACPR.2013.46 O. Sinanović and Z. Mrkonjić. 2013. Post-stroke writing and reading disorders. Sanamed 8, 1 (2013), 55--63. S. Zhang and F. Li. 2012. Off-line handwritten Chinese signature verification based on support vector machine multiple classifiers. In Advances in Electric and Electronics. Springer, 563--568. E. N. Zois, L. Alewijnse, and G. Economou. 2016. Offline signature verification and quality characterization using Poset-oriented grid features. Pattern Recognition 54 (2016), 162--177. 10.1016/j.patcog.2016.01.009 M. T. Ibrahim, M. Kyan, M. A. Khan, and L. Guan. 2010. On-line signature verification using 1-D velocity-based directional analysis. In 20th International Conference on Pattern Recognition (ICPR'10). 3830--3833. 10.1109/ICPR.2010.933 G. Pirlo, D. Impedovo, R. Plamondon, C. O'Reilly, A. Cozzolongo, R. Gravinese, and A. Rollo. 2013. Stability of dynamic signatures: From the representation to the generation domain. In New Trends in Image Analysis and Processing. Lecture Notes in Computer Science, Vol. 8158. Springer, 122--130. 10.1007/978-3-642-41190-8_14 K. S. Manjunatha, S. Manjunath, D. S. Guru, and M. T. Somashekara. 2016. Online signature verification based on writer dependent features and classifiers. Pattern Recognition Letters 80 (2016), 129--136. 10.1016/j.patrec.2016.06.016 T. A. Duda, J. E. Casey, and N. McNevin. 2014. Variability of kinematic graphomotor fluency in adults with ADHD. Human Movement Science 38 (2014), 331--342. J. H. Yan, S. Rountree, P. Massman, R. S. Doody, and H. Li. 2008. Alzheimer’s disease and mild cognitive impairment deteriorate fine movement control. Journal of Psychiatric Research 42, 14 (2008), 1203--1212. F. Alonso-Fernandez, J. Fierrez, A. Gilperez, J. Galbally, and J. Ortega-Garcia. 2009. Robustness of signature verification systems to imitators with increasing skills. In 10th Int. Conf. on Document Analysis and Recognition. IEEE, 728--732. 10.1109/ICDAR.2009.261 G. S. Eskander, R. Sabourin, and E. Granger. 2011. Signature based fuzzy vaults with boosted feature selection. In Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM’11). IEEE, 131--138. D. Impedovo, G. Pirlo, and R. Plamondon. 2012. Handwritten signature verification: New advancements and open issues. In Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'12). 367--372. 10.1109/ICFHR.2012.211 J. J. Brault and R. Plamondon. 1993. A complexity measure of handwritten curves: Modeling of dynamic signature forgery. IEEE Transactions on Systems, Man, and Cybernetics 23, 2 (1993), 400--413. A. Woch and R. Plamondon. 2010. Characterization of bi-directional movement primitives and their agonist-antagonist synergy with the delta-lognormal model. Motor Control 14, 1 (2010), 1--25. M. Parodi, J. C. Gómez, M. Liwicki, and L. Alewijnse. 2013. Orthogonal function representation for online signature verification: Which features should be looked at? IET Biometrics 2, 4 (2013), 137--150. R. P Ureche O. (e_1_2_1_254_1) Vargas F. (e_1_2_1_256_1); 2 Fairhurst M. C. (e_1_2_1_69_1) e_1_2_1_262_1 Fierrez-Aguilar J. (e_1_2_1_81_1) Fairhurst M. (e_1_2_1_68_1) e_1_2_1_115_1 e_1_2_1_138_1 e_1_2_1_187_1 e_1_2_1_213_1 e_1_2_1_24_1 e_1_2_1_141_1 e_1_2_1_236_1 Chassang G. (e_1_2_1_36_1) 2017 Dutta A. (e_1_2_1_61_1) Onofri E. (e_1_2_1_185_1) 2013; 1 e_1_2_1_250_1 e_1_2_1_273_1 e_1_2_1_103_1 e_1_2_1_126_1 e_1_2_1_149_1 Sinanović O. (e_1_2_1_237_1) 2013; 8 e_1_2_1_175_1 e_1_2_1_12_1 e_1_2_1_73_1 e_1_2_1_96_1 e_1_2_1_201_1 e_1_2_1_152_1 Caligiuri M. P. (e_1_2_1_32_1) e_1_2_1_190_1 Pal S. (e_1_2_1_197_1) Ji J. (e_1_2_1_130_1) e_1_2_1_224_1 e_1_2_1_58_1 Song M. (e_1_2_1_242_1) 2014; 2014 e_1_2_1_209_1 e_1_2_1_247_1 Yahyatabar M. E. (e_1_2_1_267_1) e_1_2_1_261_1 Costa F. (e_1_2_1_38_1) Edwards H. (e_1_2_1_62_1) 2009 e_1_2_1_114_1 Rantzsch H. (e_1_2_1_220_1) Tolosana R. (e_1_2_1_249_1) Alewijnse L. C. (e_1_2_1_8_1) e_1_2_1_137_1 e_1_2_1_40_1 e_1_2_1_186_1 e_1_2_1_212_1 e_1_2_1_63_1 e_1_2_1_86_1 e_1_2_1_140_1 e_1_2_1_48_1 e_1_2_1_235_1 Pal S. (e_1_2_1_196_1) Tseng L. Y. (e_1_2_1_252_1); 3 Carina-Fernandes A. (e_1_2_1_35_1) e_1_2_1_272_1 e_1_2_1_125_1 Khalajzadeh H. (e_1_2_1_139_1) 2012; 1 e_1_2_1_148_1 e_1_2_1_7_1 Matsuda K. (e_1_2_1_169_1) Gomez-Barrero M. (e_1_2_1_100_1) e_1_2_1_200_1 e_1_2_1_74_1 Ji J. (e_1_2_1_129_1) e_1_2_1_151_1 e_1_2_1_223_1 e_1_2_1_246_1 e_1_2_1_59_1 e_1_2_1_208_1 e_1_2_1_269_1 e_1_2_1_264_1 e_1_2_1_241_1 Hurtado O. M. (e_1_2_1_154_1) e_1_2_1_178_1 e_1_2_1_87_1 Lai S. (e_1_2_1_145_1) e_1_2_1_215_1 e_1_2_1_181_1 Gomez-Barrero M. (e_1_2_1_101_1) e_1_2_1_64_1 e_1_2_1_276_1 IEC (e_1_2_1_1_1) e_1_2_1_26_1 Garcia-Salicetti S. (e_1_2_1_97_1) Malik M. I. (e_1_2_1_163_1) e_1_2_1_238_1 Eskander G. S. (e_1_2_1_67_1) Stefano C. D. (e_1_2_1_244_1) 2018 Verduijn R. J. (e_1_2_1_257_1) e_1_2_1_90_1 e_1_2_1_105_1 e_1_2_1_128_1 e_1_2_1_189_1 Parodi M. (e_1_2_1_202_1) e_1_2_1_203_1 e_1_2_1_131_1 e_1_2_1_52_1 e_1_2_1_75_1 Pirlo G. (e_1_2_1_211_1) e_1_2_1_14_1 Diaz M. (e_1_2_1_47_1) e_1_2_1_226_1 Senatore R. (e_1_2_1_231_1) Mendaza-Ormaza A. (e_1_2_1_171_1) e_1_2_1_240_1 e_1_2_1_263_1 e_1_2_1_80_1 Blanco-Gonzalo R. (e_1_2_1_25_1) Diaz-Cabrera M. (e_1_2_1_56_1) e_1_2_1_116_1 e_1_2_1_177_1 e_1_2_1_42_1 e_1_2_1_165_1 e_1_2_1_214_1 e_1_2_1_180_1 e_1_2_1_142_1 e_1_2_1_274_1 Tolosana R. (e_1_2_1_248_1) e_1_2_1_91_1 Hurtado O. M. (e_1_2_1_155_1) e_1_2_1_104_1 e_1_2_1_188_1 e_1_2_1_127_1 e_1_2_1_30_1 e_1_2_1_5_1 Berger C. E. H. (e_1_2_1_17_1) 2016 e_1_2_1_99_1 e_1_2_1_176_1 e_1_2_1_153_1 e_1_2_1_191_1 Hernandez A. B. (e_1_2_1_113_1) e_1_2_1_53_1 e_1_2_1_15_1 Pal S. (e_1_2_1_195_1) e_1_2_1_119_1 Galbally J. (e_1_2_1_94_1) e_1_2_1_157_1 Blanco-Gonzalo R. (e_1_2_1_27_1) e_1_2_1_134_1 e_1_2_1_217_1 e_1_2_1_20_1 e_1_2_1_66_1 e_1_2_1_160_1 e_1_2_1_89_1 e_1_2_1_43_1 Found B. (e_1_2_1_85_1) 2011 e_1_2_1_183_1 e_1_2_1_232_1 e_1_2_1_255_1 e_1_2_1_278_1 e_1_2_1_28_1 Alonso-Fernandez F. (e_1_2_1_9_1) 2007 e_1_2_1_92_1 Houmani N. (e_1_2_1_117_1) e_1_2_1_122_1 Dehghani E. (e_1_2_1_44_1) e_1_2_1_107_1 e_1_2_1_168_1 Danna J. (e_1_2_1_41_1) e_1_2_1_31_1 e_1_2_1_205_1 e_1_2_1_4_1 e_1_2_1_110_1 e_1_2_1_194_1 Gomez-Barrero M. (e_1_2_1_102_1) Yeung D.-Y. (e_1_2_1_271_1); 3072 e_1_2_1_16_1 e_1_2_1_39_1 e_1_2_1_243_1 Zhang Z. (e_1_2_1_275_1); 2 e_1_2_1_266_1 e_1_2_1_228_1 Houmani N. (e_1_2_1_118_1) e_1_2_1_82_1 e_1_2_1_156_1 Krish R. P. (e_1_2_1_143_1) Meng Y. (e_1_2_1_174_1) e_1_2_1_179_1 Zoghi M. (e_1_2_1_277_1) e_1_2_1_216_1 e_1_2_1_121_1 e_1_2_1_21_1 e_1_2_1_182_1 Hafemann L. G. (e_1_2_1_111_1) Deng H.-R. (e_1_2_1_45_1) 2009; 3 e_1_2_1_29_1 e_1_2_1_239_1 e_1_2_1_230_1 e_1_2_1_253_1 e_1_2_1_93_1 e_1_2_1_144_1 Mamoun S. (e_1_2_1_164_1) 2012 e_1_2_1_167_1 e_1_2_1_106_1 e_1_2_1_55_1 e_1_2_1_204_1 e_1_2_1_78_1 e_1_2_1_3_1 e_1_2_1_132_1 e_1_2_1_193_1 Diaz M. (e_1_2_1_49_1) e_1_2_1_265_1 Pal S. (e_1_2_1_199_1) e_1_2_1_227_1 Antal M. (e_1_2_1_13_1) e_1_2_1_260_1 Vijayanunni M. (e_1_2_1_259_1) 1998 Rosenblum S. (e_1_2_1_225_1) e_1_2_1_136_1 e_1_2_1_60_1 Pirlo G. (e_1_2_1_207_1) Diaz-Cabrera M. (e_1_2_1_54_1) e_1_2_1_159_1 e_1_2_1_162_1 e_1_2_1_83_1 Falahati D. (e_1_2_1_70_1) e_1_2_1_22_1 Chen Z. (e_1_2_1_37_1) e_1_2_1_234_1 Pal S. (e_1_2_1_198_1) e_1_2_1_219_1 Ghandali S. (e_1_2_1_98_1) Diaz M. (e_1_2_1_50_1) Martinez-Diaz M. (e_1_2_1_166_1) e_1_2_1_124_1 e_1_2_1_147_1 e_1_2_1_71_1 e_1_2_1_150_1 e_1_2_1_79_1 e_1_2_1_10_1 e_1_2_1_33_1 Hafemann L. G. (e_1_2_1_109_1) e_1_2_1_2_1 e_1_2_1_222_1 e_1_2_1_268_1 Ferrer M. A. (e_1_2_1_77_1) Meng M. (e_1_2_1_173_1) e_1_2_1_245_1 e_1_2_1_18_1 Diaz M. (e_1_2_1_51_1) e_1_2_1_112_1 e_1_2_1_135_1 e_1_2_1_158_1 Vielhauer C. (e_1_2_1_258_1) 2005; 9 e_1_2_1_161_1 e_1_2_1_184_1 e_1_2_1_23_1 e_1_2_1_46_1 e_1_2_1_84_1 e_1_2_1_210_1 Houmani N. (e_1_2_1_120_1) Kahindo C. (e_1_2_1_133_1) e_1_2_1_233_1 Tolosana R. (e_1_2_1_251_1) Pal S. (e_1_2_1_192_1) e_1_2_1_218_1 e_1_2_1_270_1 Freire M. (e_1_2_1_88_1); 2 e_1_2_1_108_1 Schafer B. (e_1_2_1_229_1) Eskander G. S. (e_1_2_1_65_1) Farimani S. A. (e_1_2_1_72_1) e_1_2_1_146_1 e_1_2_1_123_1 e_1_2_1_206_1 e_1_2_1_57_1 e_1_2_1_34_1 Al-Maadeed S. (e_1_2_1_6_1) e_1_2_1_11_1 e_1_2_1_95_1 e_1_2_1_172_1 e_1_2_1_221_1 Ferrer M. A (e_1_2_1_76_1) e_1_2_1_19_1 |
References_xml | – reference: J. Ji and X. Chen. 2009. Off-line Chinese signature verification segmentation and feature extraction. In Int. Conf. on Computational Intelligence and Software Engineering (CiSE'09). 1--4. – reference: Y. Liu, Z. Yang, and L. Yang. 2015. Online signature verification based on DCT and sparse representation. IEEE Transactions on Cybernetics 45, 11 (2015), 2498--2511. – reference: M. C. Fairhurst, E. Kaplani, and R. M. Guest. 2001. Complexity measures in handwritten signature verification. In Proc. 1st Intl. Conf. on Universal Access in Human-Computer Interaction. – reference: A. Woch and R. Plamondon. 2010. Characterization of bi-directional movement primitives and their agonist-antagonist synergy with the delta-lognormal model. Motor Control 14, 1 (2010), 1--25. – reference: E. Sesa-Nogueras, M. Faundez-Zanuy, and J. Mekyska. 2012. An information analysis of in-air and on-surface trajectories in online handwriting. Cognitive Computation 4, 2 (2012), 195--205. – reference: G. S Eskander, R. Sabourin, and E. Granger. 2014. A bio-cryptographic system based on offline signature images. Information Sciences 259 (2014), 170--191. 10.1016/j.ins.2013.09.004 – reference: S. M. S. Ahmad, A. Shakil, A. R. Ahmad, M. A. M. Balbed, and R. M. Anwar. 2008. SIGMA-A Malaysian signatures’ database. In IEEE/ACS Int. Conf. on Computer Systems and Applications. IEEE, 919--920. 10.1109/AICCSA.2008.4493644 – reference: J. Galbally, J. Fierrez, M. Martinez-Diaz, and J. Ortega-Garcia. 2009. Improving the enrollment in dynamic signature verfication with synthetic samples. In 10th Int. Conf. on Document Analysis and Recognition (ICDAR’09). 1295--1299. 10.1109/ICDAR.2009.38 – reference: M. I. Malik, S. Ahmed, A. Dengel, and M. Liwicki. 2012. A signature verification framework for digital pen applications. In 10th IAPR International Workshop on Document Analysis Systems (DAS'12). IEEE, 419--423. 10.1109/DAS.2012.10 – reference: M. Parodi, J. C. Gómez, and L. Alewijnse. 2014. Automatic online signature verification based only on FHE features: An oxymoron? In 14th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR’14). 73--78. – reference: G. S. Eskander, R. Sabourin, and E. Granger. 2013. Hybrid writer-independent--writer-dependent offline signature verification system. IET Biometrics 2, 4 (2013), 169--181. – reference: A. Foroozandeh, Y. Akbari, M. J. Jalili, and J. Sadri. 2012. Persian signature verification based on fractal dimension using testing hypothesis. In Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'12). 313--318. 10.1109/ICFHR.2012.254 – reference: ISO/IEC 30107-1:2016. 2016. Information technology - Biometric presentation attack detection - Part 1: Framework. Int. Org. Standardization, Geneva. – reference: R. M. Guest, O. M. Hurtado, and O. Henniger. 2014. Assessment of methods for image recreation from signature time-series data. IET Biometrics 3, 3 (2014), 159--166. – reference: A. Juels and M. Sudan. 2006. A fuzzy vault scheme. Designs, Codes and Cryptography 38, 2 (2006), 237--257. 10.1007/s10623-005-6343-z – reference: A. Lanitis. 2009. A survey of the effects of aging on biometric identity verification. International Journal of Biometrics 2, 1 (2009), 34--52. 10.1504/IJBM.2010.030415 – reference: C. O’Reilly and R. Plamondon. 2009. Development of a sigma-lognormal representation for on-line signatures. Pattern Recognition 42, 12 (2009), 3324--3337. 10.1016/j.patcog.2008.10.017 – reference: G. Alvarez, B. Sheffer, and M. Bryant. 2016. Offline Signature Verification with Convolutional Neural Networks. Technical Report. Stanford University, Stanford. – reference: E. N. Zois, L. Alewijnse, and G. Economou. 2016. Offline signature verification and quality characterization using Poset-oriented grid features. Pattern Recognition 54 (2016), 162--177. 10.1016/j.patcog.2016.01.009 – reference: A. Mendaza-Ormaza, O. Miguel-Hurtado, R. Blanco-Gonzalo, and F.-J. Diez-Jimeno. 2011. Analysis of handwritten signature performances using mobile devices. In IEEE Int. Carnahan Conf. on Security Technology (ICCST’11). 1--6. – reference: Y. Kamihira, W. Ohyama, T. Wakabayashi, and F. Kimura. 2013. Improvement of Japanese signature verification by segmentation-verification. In 12th Int. Conf. on Document Analysis and Recognition (ICDAR'13). 379--382. 10.1109/ICDAR.2013.83 – reference: N. Li, J. Liu, Q. Li, X. Luo, and J. Duan. 2016. Online signature verification based on biometric features. In 49th Hawaii Int. Conf. on System Sciences (HICSS’16). 5527--5534. 10.1109/HICSS.2016.683 – reference: F. Alonso-Fernandez, M. C. Fairhurst, J. Fierrez, and J. Ortega-Garcia. 2007. Impact of signature legibility and signature type in off-line signature verification. In Biometrics Symposium, 2007. IEEE, 1--6. – reference: M. I. Malik, S. Ahmed, M. Liwicki, and A. Dengel. 2013. Freak for real time forensic signature verification. In 12th Int. Conf. on Document Analysis and Recognition (ICDAR'13). IEEE, 971--975. 10.1109/ICDAR.2013.196 – reference: H.-R. Deng and Y.-H. Wang. 2009. On-line signature verification based on correlation image. In Int. Conf. on Machine Learning and Cybernetics, Vol. 3. 1788--1792. – reference: A. Hamadene and Y. Chibani. 2016. One-class writer-independent offline signature verification using feature dissimilarity thresholding. IEEE Transactions on Information Forensics and Security 11, 6 (2016), 1226--1238. – reference: M. Meng, X. Xi, and Z. Luo. 2008. On-line signature verification based on support vector data description and genetic algorithm. In 7th World Congress on Intelligent Control and Automation. 3778--3782. – reference: M. P. Caligiuri, H.-L. Teulings, C. E. Dean, A. B Niculescu, and J. B. Lohr. 2010. Handwriting movement kinematics for quantifying extrapyramidal side effects in patients treated with atypical antipsychotics. Psychiatry Research 177, 1 (2010), 77--83. – reference: J. Galbally, J. Fierrez, J. Ortega-Garcia, and R. Plamondon. 2012. Synthetic on-line signature generation. Part II: Experimental validation. Pattern Recognition 45 (2012), 2622--2632. 10.1016/j.patcog.2011.12.007 – reference: A. Fischer, M. Diaz, R. Plamondon, and M. A. Ferrer. 2015. Robust score normalization for DTW-based on-line signature verification. In 13th Int. Conf. on Document Analysis and Recognition (ICDAR’15). 241--245. 10.1109/ICDAR.2015.7333760 – reference: M. I. Malik, M. Liwicki, L. Alewijnse, W. Ohyama, M. Blumenstein, and B. Found. 2013. Signature verification and writer identification competitions for on- and offline skilled forgeries (SigWiComp2013). In 12th Int. Conf. on Document Analysis and Recognition (ICDAR'13). 1477--1483. 10.1109/ICDAR.2013.220 – reference: M. I. Malik, M. Liwicki, A. Dengel, and B. Found. 2014. Man vs. machine: A comparative analysis for signature verification. Journal of Forensic Document Examination 24 (2014), 21--35. – reference: J. A. Small and N. Sandhu. 2008. Episodic and semantic memory influences on picture naming in Alzheimer’s disease. Brain and Language 104, 1 (2008), 1--9. – reference: C. O’Reilly and R. Plamondon. 2013. Agonistic and antagonistic interaction in speed/accuracy tradeoff: A delta-lognormal perspective. Human Movement Science 32, 5 (2013), 1040--1055. – reference: J. Ji, Z. D. Lu, and X. Chen. 2009. Similarity computation based on feature extraction for off-line Chinese signature verification. In 6th Int. Conf. on Fuzzy Systems and Knowledge Discovery, Vol. 1. 291--295. 10.1109/FSKD.2009.597 – reference: K. S. Manjunatha, S. Manjunath, D. S. Guru, and M. T. Somashekara. 2016. Online signature verification based on writer dependent features and classifiers. Pattern Recognition Letters 80 (2016), 129--136. 10.1016/j.patrec.2016.06.016 – reference: M. Diaz-Cabrera, M. Gomez-Barrero, A. Morales, M. A. Ferrer, and J. Galbally. 2014. Generation of enhanced synthetic off-line signatures based on real on-line data. In 14th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR’14). 482--487. – reference: H. Saevanee and P. Bhatarakosol. 2008. User authentication using combination of behavioral biometrics over the touchpad acting like touch screen of mobile device. In Int. Conf. on Computer and Electrical Engineering (ICCEE'08). IEEE, 82--86. 10.1109/ICCEE.2008.157 – reference: J. Ji, C. B. Chen, and X. Chen. 2010. Off-line Chinese signature verification: Using weighting factor on similarity computation. In 2nd Int. Conf. on E-Business and Information System Security. 1--4. – reference: R. P. Krish, J. Fierrez, J. Galbally, and M. Martinez-Diaz. 2013. Dynamic signature verification on smart phones. In Int. Conf. on Practical Applications of Agents and Multi-Agent Systems (PAAMS'13). Springer, 213--222. – reference: S. Pal, U. Pal, and M. Blumenstein. 2012. Off-line English and Chinese signature identification using foreground and background features. In Int. Joint Conf. on Neural Networks (IJCNN’12). 1--7. – reference: J. Fierrez and J. Ortega-Garcia. 2008. On-line Signature Verification. Springer, 189--209. – reference: C. Gruber, T. Gruber, S. Krinninger, and B. Sick. 2010. Online signature verification with support vector machines based on LCSS kernel functions. IEEE Transactions on Systems, Man, and Cybernetics Part B: Cybernetics 40, 4 (2010), 1088--1100. 10.1109/TSMCB.2009.2034382 – reference: M. Diaz, M. A. Ferrer, A. Parziale, and A. Marcelli. 2017. Recovering western on-line signatures from image-based specimens. In 14th IAPR Int. Conf. on Document Analysis and Recognition (ICDAR’17). 1204--1209. – reference: E. Frias-Martinez, A. Sanchez, and J. Velez. 2006. Support vector machines versus multi-layer perceptrons for efficient off-line signature recognition. Engineering Applications of Artificial Intelligence 19, 6 (2006), 693--704. – reference: Y. Serdouk, H. Nemmour, and Y. Chibani. 2017. Handwritten signature verification using the quad-tree histogram of templates and a support vector-based artificial immune classification. Image and Vision Computing 66 (2017), 26--35. – reference: C. F. Whitelock, H. N. Agyepong, K. Patterson, and K. D. Ersche. 2015. Signing below the dotted line: Signature position as a marker of vulnerability for visuospatial processing difficulties. Neurocase 21, 1 (2015), 67--72. – reference: S. Pal, A. Alaei, U. Pal, and M. Blumenstein. 2012. Multi-script off-line signature identification. In Int. Conf. on Hybrid Intelligent Systems (HIS'12). 236--240. – reference: R. Tolosana, R. Vera-Rodriguez, J. Fierrez, and J. Ortega-Garcia. 2018. Exploring recurrent neural networks for on-line handwritten signature biometrics. IEEE Access (2018), 5128--5138. – reference: H. R. Martinez-Hernandez and E. D. Louis. 2014. Macrographia in essential tremor: A study of patients with and without rest tremor. Movement Disorders 29, 7 (2014), 960--961. – reference: B. Li. 2016. The hot issues and future direction of forensic document examination in China. Journal of Forensic Science and Medicine 2, 1 (2016), 22--27. – reference: M. Martinez-Diaz, J. Fierrez, J. Galbally, and J. Ortega-Garcia. 2008. Towards mobile authentication using dynamic signature verification: Useful features and performance evaluation. In 19th Int. Conf. on Pattern Recognition (ICPR'08). IEEE, 1--5. – reference: A. Soleimani, B. N. Araabi, and K. Fouladi. 2016. Deep multitask metric learning for offline signature verification. Pattern Recognition Letters 80 (2016), 84--90. 10.1016/j.patrec.2016.05.023 – reference: R. Blanco-Gonzalo, R. Sanchez-Reillo, O. M. Hurtado, and J. Liu-Jimenez. 2013. Performance evaluation of handwritten signature recognition in mobile environments. IET Biometrics 3, 3 (2013), 139--146. – reference: B. Schafer and S. Viriri. 2009. An off-line signature verification system. In Int. Conf. on Signal and Image Processing Applications (ICSIPA'09). 95--100. – reference: L. G. Hafemann, R. Sabourin, and L. S. Oliveira. 2017. Learning features for offline handwritten signature verification using deep convolutional neural networks. Pattern Recognition 70 (2017), 163--176. 10.1016/j.patcog.2017.05.012 – reference: C. D. Stefano, C. De Stefano, F. Fontanella, D. Impedovo, G. Pirlo, and A. Scotto di Freca. 2018. Handwriting analysis to support neurodegenerative diseases diagnosis: A review. Pattern Recognition Letters (2018). – reference: G. S. Eskander, R. Sabourin, and E. Granger. 2011. Signature based fuzzy vaults with boosted feature selection. In Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM’11). IEEE, 131--138. – reference: D. S. Guru and H. N. Prakash. 2009. Online signature verification and recognition: An approach based on symbolic representation. IEEE Transactions on Pattern Analysis and Machine Intelligence 31, 6 (2009), 1059--1073. 10.1109/TPAMI.2008.302 – reference: M. Liwicki, M. Imran Malik, C. E. van den Heuvel, X. Chen, C. Berger, R. Stoel, M. Blumenstein, and B. Found. 2011. Signature verification competition for online and offline skilled forgeries (SigComp2011). In 11th Int. Conf. on Document Analysis and Recognition (ICDAR'11). 1480--1484. 10.1109/ICDAR.2011.294 – reference: M. Diaz-Cabrera, M. A. Ferrer, and A. Morales. 2015. Modeling the lexical morphology of western handwritten signatures. PLoS ONE 10, 4 (2015), e0123254. https://journals.plos.org/plosone/article/citation?id=10.1371/journal.pone.0123254. – reference: A. Q. Ansari, M. Hanmandlu, J. Kour, and A. K. Singh. 2013. Online signature verification using segment-level fuzzy modelling. IET Biometrics 3, 3 (2013), 113--127. – reference: J. J. Brault and R. Plamondon. 1993. A complexity measure of handwritten curves: Modeling of dynamic signature forgery. IEEE Transactions on Systems, Man, and Cybernetics 23, 2 (1993), 400--413. – reference: M. Liwicki, M. Imran Malik, L. Alewijnse, E. van den Heuvel, and B. Found. 2012. ICFHR 2012 competition on automatic forensic signature verification (4NsigComp 2012). In 13th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'12). IEEE, 823--828. 10.1109/ICFHR.2012.217 – reference: V. Nguyen, M. Blumenstein, and G. Leedham. 2009. Global features for the off-line signature verification problem. In 10th Int. Conf. on Document Analysis and Recognition (ICDAR'09). 1300--1304. 10.1109/ICDAR.2009.123 – reference: S. Dey, A. Dutta, J. I. Toledo, S. K. Ghosh, J. Lladós, and U. Pal. 2017. SigNet: Convolutional Siamese network for writer independent offline signature verification. Corr (2017). arXiv:1707.02131 – reference: M. Antal, L. Z. Szabó, and T. Tordai. 2018. Online signature verification on MOBISIG finger-drawn signature corpus. Mobile Information Systems 2018, Article 3127042 (2018) 15 pages. – reference: G. Pirlo, D. Impedovo, R. Plamondon, and C. O’Reilly. 2014. Stability analysis of online signatures in the generation domain. In Advances in Digital Handwritten Signature Processing. A Human Artefact for e-Society. 1--12. – reference: B. Found, D. Rogers, and C. Bird. 2012. Documentation of Forensic Handwriting Method: A Modular Approach. Technical Report. Victoria Police Forensic Services Department, Victoria, Australia. – reference: M. Gomez-Barrero, J. Galbally, J. Fierrez, and J. Ortega-Garcia. 2011. Hill-climbing attack based on the uphill simplex algorithm and its application to signature verification. In Proc. European Workshop on Biometrics and Identity Management (BioID’11) (LNCS-6583). Springer, 83--94. – reference: R. Tolosana, R. Vera-Rodriguez, J. Ortega-Garcia, and J. Fierrez. 2015. Update strategies for HMM-based dynamic signature biometric systems. In Int. Workshop on Information Forensics and Security (WIFS’15). IEEE, 1--6. – reference: J. Ortega-Garcia, J. Fierrez, F. Alonso-Fernandez, J. Galbally, M. Freire, J. Gonzalez-Rodriguez, C. Garcia-Mateo, J.-L. Alba-Castro, E. Gonzalez-Agulla, E. Otero-Muras, S. Garcia-Salicetti, L. Allano, B. Ly-Van, B. Dorizzi, J. Kittler, T. Bourlai, N. Poh, F. Deravi, M. Ng, M. Fairhurst, J. Hennebert, A. Humm, M. Tistarelli, L. Brodo, J. Richiardi, A. Drygajlo, H. Ganster, F. M. Sukno, S.-K. Pavani, A. Frangi, L. Akarun, and A. Savran. 2010. The multi-scenario multi-environment BioSecure multimodal database (BMDB). IEEE Transactions on Pattern Analysis and Machine Intelligence 32, 6 (2010), 1097--1111. 10.1109/TPAMI.2009.76 – reference: E. Maiorana, P. Campisi, J. Fierrez, J. Ortega-Garcia, and A. Neri. 2010. Cancelable templates for sequence-based biometrics with application to on-line signature recognition. IEEE Transactions on Systems, Man, and Cybernetics Part A: Systems and Humans 40, 3 (2010), 525--538. 10.1109/TSMCA.2010.2041653 – reference: M. E. Yahyatabar, Y. Baleghi, and M. R. Karami. 2013. Online signature verification: A Persian-language specific approach. In 21st Iranian Conf. on Electrical Engineering (ICEE’13). 1--6. – reference: A. Kholmatov and B. Yanikoglu. 2008. SUSIG: An on-line signature database, associated protocols and benchmark results. Pattern Analysis and Applications 12, 3 (2008), 227--236. – reference: J. Ortega-Garcia, J. Fierrez-Aguilar, D. Simon, J. Gonzalez, M. Faundez-Zanuy, V. Espinosa, A. Satue, I. Hernaez, J.-J. Igarza, C. Vivaracho, D. Escudero, and Q. I. Moro. 2003. MCYT baseline corpus: A bimodal biometric database. IEE Proceedings-Vision, Image and Signal Processing 150, 6 (2003), 395--401. – reference: M. A. Ferrer, M. Diaz-Cabrera, and A. Morales. 2015. Static signature synthesis: A neuromotor inspired approach for biometrics. IEEE Transactions on Pattern Analysis and Machine Intelligence 37, 3 (2015), 667--680. – reference: C. O’Reilly and R. Plamondon. 2011. Impact of the principal stroke risk factors on human movements. Human Movement Science 30, 4 (2011), 792--806. – reference: Y. Kamihira, W. Ohyama, T. Wakabayashi, and F. Kimura. 2013. Improvement of Japanese signature verification by combined segmentation verification approach. In 2nd IAPR Asian Conf. on Pattern Recognition. 501--505. 10.1109/ACPR.2013.46 – reference: F. J. Zareen and S. Jabin. 2016. Authentic mobile-biometric signature verification system. IET Biometrics 5, 1 (2016), 13--19. – reference: E. Argones Rua, E. Maiorana, J. L. Alba Castro, and P. Campisi. 2012. Biometric template protection using universal background models: An application to online signature. IEEE Transactions on Information Forensics and Security 7, 1 (2012), 269--282. 10.1109/TIFS.2011.2168213 – reference: J. Galbally, M. Martinez, and J. Fierrez. 2013. Aging in biometrics: An experimental analysis on on-line signature. PLoS ONE 8, 7 (2013), e69897. – reference: D. Impedovo and G. Pirlo. 2008. Automatic signature verification: The state of the art. IEEE Transactions on Systems, Man, and Cybernetics 38, 5 (2008), 609--635. 10.1109/TSMCC.2008.923866 – reference: A. Sharma and S. Sundaram. 2017. A novel online signature verification system based on GMM features in a DTW framework. IEEE Transactions on Information Forensics and Security 12, 3 (2017), 705--718. 10.1109/TIFS.2016.2632063 – reference: M. Antal and A. Bandi. 2017. Finger or stylus: Their impact on the performance of on-line signature verification systems. In Proceedings of the 5th International Conference on Recent Achievements in Mechatronics, Automation, Computer Sciences and Robotics (MACRo'17). – reference: Y. Fang, W. Kang, Q. Wu, and L. Tang. 2017. A novel video-based system for in-air signature verification. Computers 8 Electrical Engineering 57 (2017), 1--14. 10.1016/j.compeleceng.2016.11.010 – reference: S. Garcia-Salicetti, N. Houmani, and B. Dorizzi. 2008. A client-entropy measure for on-line signatures. In Biometrics Symposium. IEEE, 83--88. – reference: M. A. Ferrer, M. Diaz-Cabrera, A. Morales, J. Galbally, and M. Gomez-Barrero. 2013. Realistic synthetic off-line signature generation based on synthetic on-line data. In Proc. IEEE Int. Carnahan Conf. on Security Technology (ICCST’13). 116--121. – reference: T. A. Duda, J. E. Casey, and N. McNevin. 2014. Variability of kinematic graphomotor fluency in adults with ADHD. Human Movement Science 38 (2014), 331--342. – reference: R. Plamondon, G. Pirlo, E. Anquetil, C. Remi, H-L. Teulings, and M. Nakagawa. 2018. Personal digital bodyguards for e-Security, e-Learning and e-Health: A prospective survey. Pattern Recognition 81, 2018 (2018), 633--659. – reference: I. A. B. Abdelghani and N. E. B. Amara. 2013. SID signature database: A Tunisian off-line handwritten signature database. In Int. Conf. on Image Analysis and Processing. Springer, 131--139. 10.1007/978-3-642-41190-8_15 – reference: M. P. Caligiuri and L. A Mohammed. 2012. The Neuroscience of Handwriting: Applications for Forensic Document Examination. CRC Press. – reference: G. S. Eskander, R. Sabourin, and E. Granger. 2014. Offline signature-based fuzzy vault: A review and new results. In Symposium on Computational Intelligence in Biometrics and Identity Management. 45--52. – reference: B. Found. 2011. An introduction to the character of forensic investigations into questioned signatures. In 1st Int. Workshop on Automated Forensic Handwriting Analysis (AFHA’11). – reference: M. I. Malik, M. Liwicki, A. Dengel, S. Uchida, and V. Frinken. 2014. Automatic signature stability analysis and verification using local features. In 14th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'14). IEEE, 621--626. – reference: G. Pirlo, D. Impedovo, and T. Ferranti. 2015. Stability/complexity analysis of dynamic handwritten signatures. In 17th Biennial Conf. of the Int. Graphonomics Society (IGS'15). – reference: S. Ghandali and M. E. Moghaddam. 2009. Off-line Persian signature identification and verification based on image registration and fusion. Journal of Multimedia 4 (2009), 137--144. https://www.semanticscholar.org/paper/Off-Line-Persian-Signature-Identification-and-Based-Ghandali-Moghaddam/7076a5b9b8e5bc121a3e8f57b236ce5651359988. – reference: M. Piekarczyk and M. R. Ogiela. 2013. Matrix-based hierarchical graph matching in off-line handwritten signatures recognition. In 2nd IAPR Asian Conf. on Pattern Recognition. IEEE, 897--901. 10.1109/ACPR.2013.164 – reference: G. Pirlo, D. Impedovo, R. Plamondon, C. O'Reilly, A. Cozzolongo, R. Gravinese, and A. Rollo. 2013. Stability of dynamic signatures: From the representation to the generation domain. In New Trends in Image Analysis and Processing. Lecture Notes in Computer Science, Vol. 8158. Springer, 122--130. 10.1007/978-3-642-41190-8_14 – reference: A. Carina-Fernandes and J. M. Lopes-Lima. 2017. Alzheimer’s disease and handwriting. what do we know so far? In 18th Biennial Conf. of the Int. Graphonomics Society. 131--134. – reference: C. Bidet-Ildei, P. Pollak, S. Kandel, V. Fraix, and J.-P. Orliaguet. 2011. Handwriting in patients with Parkinson disease: Effect of L-dopa and stimulation of the sub-thalamic nucleus on motor anticipation. Human Movement Science 30, 4 (2011), 783--791. – reference: V. Nguyen and M. Blumenstein. 2010. Techniques for static handwriting trajectory recovery: A survey. In Proc. of the 9th IAPR Int. Workshop on Document Analysis Systems (DAS'10). 463--470. 10.1145/1815330.1815390 – reference: S. Pal, A. Alaei, U. Pal, and M. Blumenstein. 2016. Performance of an off-line signature verification method based on texture features on a large indic-script signature dataset. In 12th IAPR Workshop on Document Analysis Systems (DAS’16). IEEE, 72--77. – reference: L. Y. Tseng and T. H. Huang. 1992. An online Chinese signature verification scheme based on the ART1 neural network. In Proc. 1992 IJCNN Int. Joint Conf. on Neural Networks (IJCNN'92), Vol. 3. 624--630. – reference: M. Song and Z. Sun. 2014. An immune clonal selection algorithm for synthetic signature generation. Mathematical Problems in Engineering 2014 (2014), 1--12. – reference: K. Cpałka and M. Zalasiński. 2014. On-line signature verification using vertical signature partitioning. Expert Systems with Applications 41, 9 (2014), 4170--4180. 10.1016/j.eswa.2013.12.047 – reference: E. Argones Rua and J. L. Alba Castro. 2012. Online signature verification based on generative models. IEEE Transactions on Systems, Man, and Cybernetics Part B (Cybernetics) 42, 4 (2012), 1231--1242. 10.1109/TSMCB.2012.2188508 – reference: W. Bouamra, C. Djeddi, B. Nini, M. Diaz, and I. Siddiqi. 2018. Towards the design of an offline signature verifier based on a small number of genuine samples for training. Expert Systems with Applications 107 (2018), 182--195. – reference: C. O’Reilly, R. Plamondon, and L-H. Lebrun. 2014. Linking brain stroke risk factors to human movement features for the development of preventive tools. Frontiers in Aging Neuroscience 6, 150 (2014), 1--13. – reference: K. Yasuda, B. Beckmann, and T. Nakamura. 2000. Brain processing of proper names. Aphasiology 14, 11 (2000), 1067--1089. – reference: D. S. Guru, K. S. Manjunatha, S. Manjunath, and M. T. Somashekara. 2017. Interval valued symbolic representation of writer dependent features for online signature verification. Expert Systems with Applications 80 (2017), 232--243. 10.1016/j.eswa.2017.03.024 – reference: A. B. Hernandez, A. Fischer, and R. Plamondon. 2015. Omega-lognormal analysis of oscillatory movements as a function of brain stroke risk factors. In 17th Biennial Conf. of the Int. Graphonomics Society (IGS'15). – reference: D. Impedovo, G. Pirlo, and R. Plamondon. 2012. Handwritten signature verification: New advancements and open issues. In Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'12). 367--372. 10.1109/ICFHR.2012.211 – reference: S. Darwish and A. El-Nour. 2016. Automated offline arabic signature verification system using multiple features fusion for forensic applications. Arab Journal of Forensic Sciences 8 Forensic Medicine 1, 4 (2016), 424--437. – reference: J. Galbally, M. Diaz-Cabrera, M. A Ferrer, M. Gomez-Barrero, A. Morales, and J. Fierrez. 2015. On-line signature recognition through the combination of real dynamic data and synthetically generated static data. Pattern Recognition 48, 9 (2015), 2921--2934. 10.1016/j.patcog.2015.03.019 – reference: S. Pal, A. Alaei, U. Pal, and M. Blumenstein. 2011. Off-line signature identification using background and foreground information. In Int. Conf. on Digital Image Computing Techniques and Applications (DICTA’11). IEEE, 672--677. 10.1109/DICTA.2011.119 – reference: S. Rosenblum, M. Samuel, S. Zlotnik, and I. Schlesinger. 2009. Handwriting performance measures of “real life” tasks: A comparison between the performance of patients with Parkinson’s disease and controls. In 14th Conf. of the Int. Graphonomics Society (IGS'09). 43--47. – reference: S. Pal, M. Blumenstein, and U. Pal. 2011. Non-English and non-Latin signature verification systems a survey. In 1st Int. Workshop on Automated Forensic Handwriting Analysis (AFHA'11). 1--5. – reference: M. Walch and D. Gantz. 2013. The forensic language-independent analysis system for handwriting identification (FLASH ID). Presentation at the Measurement Science and Standards In Forensic Handwriting Analysis Conference at The National Institute of Standards 8 Technology (NIST), Gaithersburg, Maryland. – reference: T. Ito, W. Ohyama, T. Wakabayashi, and F. Kimura. 2012. Combination of signature verification techniques by SVM. In 13th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'12). IEEE, 430--433. 10.1109/ICFHR.2012.192 – reference: A. Soleimani, K. Fouladi, and B. N. Araabi. 2016. UTSig: A Persian offline signature dataset. IET Biometrics 6, 1 (2016), 1--8. – reference: D. Wang, Y. Zhang, C. Yao, J. Wu, H. Jiao, and M. Liu. 2010. Toward force-based signature verification: A pen-type sensor and preliminary validation. IEEE Transactions on Instrumentation and Measurement 59, 4 (2010), 752--762. – reference: M. A. Ismail and S. Gad. 2000. Off-line arabic signature recognition and verification. Pattern Recognition 33, 10 (2000), 1727--1740. – reference: G. Pirlo, M. Diaz, M. A. Ferrer, D. Impedovo, F. Occhionero, and U. Zurlo. 2015. Early diagnosis of neurodegenerative diseases by handwritten signature analysis. In 1st Workshop on Image-based Smart City Applications: Int. Conf. on Image Analysis and Processing (ICIAP’15). 290--297. – reference: S. Ghandali and M. E. Moghaddam. 2008. A method for off-line Persian signature identification and verification using DWT and image fusion. In Int. Symposium on Signal Processing and Information Technology. IEEE, 315--319. – reference: G. Pirlo and D. Impedovo. 2013. Verification of static signatures by optical flow analysis. IEEE Transactions on Human-Machine Systems 43, 5 (2013), 499--505. – reference: M. Martinez-Diaz, J. Fierrez, R. P. Krish, and J. Galbally. 2014. Mobile signature verification: Feature robustness and performance comparison. IET Biometrics 3, 4 (2014), 267--277. – reference: K. Matsuda, W. Ohyama, T. Wakabayashi, and F. Kimura. 2016. Effective random-impostor training for combined segmentation signature verification. In 15th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'16). IEEE, 489--494. – reference: C. E. H. Berger, B. Robertson, and G. A. Vignaux. 2016. Interpreting Evidence: Evaluating Forensic Science in the Courtroom. Vol. 2. Wiley. – reference: M. A Ferrer, J. F. Vargas, A. Morales, and A. Ordóñez. 2012. Robustness of offline signature verification based on gray level features. IEEE Transactions on Information Forensics and Security 7, 3 (2012), 966--977. 10.1109/TIFS.2012.2190281 – reference: R. Plamondon, G. Pirlo, and D. Impedovo. 2014. Online signature verification. In Handbook of Document Image Processing and Recognition. Springer, 917--947. – reference: M. A Ferrer, M. Diaz, C. Carmona-Duarte, and A. Morales. 2017. A behavioral handwriting model for static and dynamic signature synthesis. IEEE Transactions on Pattern Analysis and Machine Intelligence 39, 6 (2017), 1041--1053. 10.1109/TPAMI.2016.2582167 – reference: C. Vielhauer. 2005. A behavioural biometrics. Public Service Review: European Union 9 (2005), 113--115. – reference: M. Zoghi and V. Abolghasemi. 2009. Persian signature verification using improved dynamic time warping-based segmentation and multivariate autoregressive modeling. In 15th Workshop on Statistical Signal Processing (SSP'09). 329--332. – reference: R. Plamondon and G. Lorette. 1989. Automatic signature verification and writer identification - the state of the art. Pattern Recognition 22, 2 (1989), 107--131. – reference: Z. Chen, X. Xia, and F. Luan. 2016. Automatic online signature verification based on dynamic function features. In 7th IEEE Int. Conf. on Software Engineering and Service Science (ICSESS’16). 964--968. – reference: N. Houmani, S. Garcia Salicetti, and B. Dorizzi. 2008. A novel personal entropy measure confronted with online signature verification systems’ performance. In 2nd IEEE Intl. Conf. on Biometrics: Theory, Applications and Systems (BTAS’08). 1--6. – reference: S. Pal, A. Reza, U. Pal, and M. Blumenstein. 2013. SVM and NN based offline signature verification. International Journal of Computational Intelligence and Applications 12, 4 (2013), 1340004. – reference: A. Das, M. A Ferrer, U. Pal, S. Pal, M. Diaz, and M. Blumenstein. 2016. Multi-script versus single-script scenarios in automatic off-line signature verification. IET Biometrics 5, 4 (2016), 305--313. – reference: M. Diaz, A. Fischer, M. A. Ferrer, and R. Plamondon. 2018. Dynamic signature verification system based on one real signature. IEEE Transactions on Cybernetics 48, 1 (2018), 228--239. – reference: M. Djioua and R. Plamondon. 2009. A new algorithm and system for the characterization of handwriting strokes with delta-lognormal parameters. IEEE Transactions on Pattern Analysis and Machine Intelligence 31, 11 (2009), 2060--2072. 10.1109/TPAMI.2008.264 – reference: S. Rosenblum, H. A. B. Simhon, and E. Gal. 2016. Unique handwriting performance characteristics of children with high-functioning autism spectrum disorder. Research in Autism Spectrum Disorders 23 (2016), 235--244. – reference: H. Rantzsch, H. Yang, and C. Meinel. 2016. Signature embedding: Writer independent offline signature verification with deep metric learning. In Int. Symposium on Visual Computing. Springer, 616--625. – reference: V. L. Blankers, C. E. v. d. Heuvel, K. Y. Franke, and L. G. Vuurpijl. 2009. ICDAR 2009 signature verification competition. In 10th Int. Conf. on Document Analysis and Recognition (ICDAR'09). 1403--1407. 10.1109/ICDAR.2009.216 – reference: W. Ohyama, Y. Ogi, T. Wakabayashi, and F. Kimura. 2015. Multilingual signature-verification by generalized combined segmentation verification. In 13th Int. Conference on Document Analysis and Recognition (ICDAR'15). 811--815. 10.1109/ICDAR.2015.7333874 – reference: S. A. Farimani and M. V. Jahan. 2018. An HMM for online signature verification based on velocity and hand movement directions. In 6th Iranian Joint Congress on Fuzzy and Intelligent Systems. 205--209. – reference: S. Srihari. 2013. iFOX. In Presentation at Measurement Science and Standards in Forensic Handwriting Analysis Conf. – reference: J.-S. Wang, Y.-L. Hsu, and J.-N. Liu. 2010. An inertial-measurement-unit-based pen with a trajectory reconstruction algorithm and its applications. IEEE Transactions on Industrial Electronics 57, 10 (2010), 3508--3521. – reference: O. M. Hurtado, R. Guest, S. V. Stevenage, and G. J. Neil. 2014. The relationship between handwritten signature production and personality traits. In IEEE Int. Joint Conf. on Biometrics (IJCB’14). IEEE, 1--8. – reference: J. Galbally, R. Plamondon, J. Fierrez, and J. Ortega-Garcia. 2012. Synthetic on-line signature generation. Part I: Methodology and algorithms. Pattern Recognition 45 (2012), 2610--2621. 10.1016/j.patcog.2011.12.011 – reference: R. Tolosana, R. Vera-Rodriguez, J. Fierrez, A. Morales, and J. Ortega-Garcia. 2017. Benchmarking desktop and mobile handwriting across COTS devices: The e-BioSign biometric database. PloS ONE 12, 5 (2017), e0176792. – reference: F. Alonso-Fernandez, J. Fierrez, A. Gilperez, J. Galbally, and J. Ortega-Garcia. 2009. Robustness of signature verification systems to imitators with increasing skills. In 10th Int. Conf. on Document Analysis and Recognition. IEEE, 728--732. 10.1109/ICDAR.2009.261 – reference: M. Gomez-Barrero, J. Galbally, J. Fierrez, J. Ortega-Garcia, and R. Plamondon. 2015. Enhanced on-line signature verification based on skilled forgery detection using sigma-lognormal features. In Conf. on Biometrics (ICB’15). 501--506. – reference: G. Pirlo and D. Impedovo. 2013. Cosine similarity for analysis and verification of static signatures. IET Biometrics 2, 4 (2013), 151--158. – reference: R. Tolosana, R. Vera-Rodriguez, R. Guest, J. Fierrez, and J. Ortega-Garcia. 2017. Complexity-based biometric signature verification. In Proc. 14th IAPR Int. Conference on Document Analysis and Recognition (ICDAR'17). – reference: M. Okawa. 2017. KAZE features via Fisher vector encoding for offline signature verification. In Int. Joint Conf. on Biometrics (IJCB'17). IEEE, 10--15. – reference: J. Fierrez-Aguilar, N. Alonso-Hermira, G. Moreno-Marquez, and J. Ortega-Garcia. 2004. An off-line signature verification system based on fusion of local and global information. In International Workshop on Biometric Authentication. Springer, 295--306. – reference: L. A. Mohammed, B. Found, M. Caligiuri, and D. Rogers. 2011. The dynamic character of disguise behavior for text-based, mixed, and stylized signatures. Journal of Forensic Sciences 56, s1 (2011), S136--S141. – reference: M. Gomez-Barrero, J. Fierrez, and J. Galbally. 2016. Variable-length template protection based on homomorphic encryption with application to signature biometrics. In 4th Int. Workshop on Biometrics and Forensics. IEEE, 1--6. – reference: S. Lai, L. Jin, and W. Yang. 2017. Online signature verification using recurrent neural network and length-normalized path signature. In 14th IAPR Int. Conf. on Document Analysis and Recognition (ICDAR’17). 1--6. – reference: M. A. Ferrer, S. Chanda, M. Diaz, C. K. Banerjee, A. Majumdar, C. Carmona-Duarte, P. Acharya, and U. Pal. 2018. Static and dynamic synthesis of Bengali and Devanagari signatures. IEEE Transactions on Cybernetics 48, 10 (2018), 2896--2907. – reference: G. Pirlo, V. Cuccovillo, M. Diaz-Cabrera, D. Impedovo, and P. Mignone. 2015. Multidomain verification of dynamic signatures using local stability analysis. IEEE Transactions on Human-Machine Systems 45, 6 (2015), 805--810. https://ieeexplore.ieee.org/document/7145458. – reference: Y. Kawazoe, W. Ohyama, T. Wakabayashi, and F. Kimura. 2010. Improvement of on-line signature verification based on gradient features. In Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'10). IEEE, 410--414. 10.1109/ICFHR.2010.70 – reference: S. Mamoun. 2012. Off-line arabic signature verification using geometrical features. In National Workshop on Information Assurance Research. 1--6. – reference: M. Diaz, M. A. Ferrer, G. Pirlo, G. Giannico, and D. Impedovo. 2015. Off-line signature stability by optical flow: Feasibility study of predicting the verifier performance. In 49th IEEE Int. Carnahan Conf. on Security Technology (ICCST'15). 341--345. – reference: M. Freire, J. Fierrez, M. Martinez-Diaz, and J. Ortega-Garcia. 2007. On the applicability of off-line signatures to the fuzzy vault construction. In Int. Conf. on Document Analysis and Recognition, Vol. 2. IEEE, 1173--1177. – reference: A. J. Mauceri. 1965. Feasibility studies of personal identification by signature verification. Technical Report SID65--24. North American Aviation. – reference: E. Dehghani and M. E. Moghaddam. 2009. On-line signature verification using ANFIS. In 6th Int. Symposium on Image and Signal Processing and Analysis. 546--549. – reference: D. Bertolini, L. S. Oliveira, E. Justino, and R. Sabourin. 2010. Reducing forgeries in writer-independent off-line signature verification through ensemble of classifiers. Pattern Recognition 43, 1 (January 2010), 387--396. 10.1016/j.patcog.2009.05.009 – reference: L. Batista, E. Granger, and R. Sabourin. 2012. Dynamic selection of generative--discriminative ensembles for off-line signature verification. Pattern Recognition 45, 4 (2012), 1326--1340. 10.1016/j.patcog.2011.10.011 – reference: H. Khalajzadeh, M. Mansouri, and M. Teshnehlab. 2012. Persian signature verification using convolutional neural networks. International Journal of Engineering Research and Technology 1, 2 (2012), 7--12. – reference: M. Diaz, A. Fischer, R. Plamondon, and M. A. Ferrer. 2015. Towards an automatic on-line signature verifier using only one reference per signer. In Proc. IAPR Int. Conf. on Document Analysis and Recognition (ICDAR’15). 631--635. 10.1109/ICDAR.2015.7333838 – reference: N. Houmani, S. Garcia-Salicetti, and B. Dorizzi. 2009. On assessing the robustness of pen coordinates, pen pressure and pen inclination to time variability with personal entropy. In IEEE 3rd Int. Conf. on Biometrics: Theory, Applications, and Systems. 1--6. – reference: D. Impedovo and G. Pirlo. 2010. On-line signature verification by stroke-dependent representation domains. In 12th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'10). 623--627. 10.1109/ICFHR.2010.102 – reference: M. Djioua and R. Plamondon. 2009. Studying the variability of handwriting patterns using the kinematic theory. Human Movement Science 28, 5 (2009), 588--601. – reference: A. Morales, D. Morocho, J. Fierrez, and R. Vera-Rodriguez. 2017. Signature authentication based on human intervention: Performance and complementarity with automatic systems. IET Biometrics 6, 4 (2017), 307--315. – reference: A. Sharma and S. Sundaram. 2016. An enhanced contextual DTW based system for online signature verification using vector quantization. Pattern Recognition Letters 84 (2016), 22--28. 10.1016/j.patrec.2016.07.015 – reference: M. Diaz, S. Chanda, M. A. Ferrer, C. K. Banerjee, A. Majumdar, C. Carmona-Duarte, P. Acharya, and U. Pal. 2016. Multiple generation of bengali static signatures. In 15th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'16). 42--47. – reference: O. M. Hurtado, R. Guest, and T. Chatzisterkotis. 2016. A new approach to automatic signature complexity assessment. In IEEE Int. Carnahan Conf. on Security Technology (ICCST’16). IEEE, 1--7. – reference: R. Tolosana, R. Vera-Rodriguez, J. Ortega-Garcia, and J. Fierrez. 2015. Preprocessing and feature selection for improved sensor interoperability in online biometric signature verification. IEEE Access 3 (2015), 478--489. – reference: D. Falahati, M. S. Helforoush, H. Danyali, and M. Rashidpour. 2011. Static signature verification for Farsi and Arabic signatures using dynamic time warping. In 19th Iranian Conf. on Electrical Engineering (ICEE’11). 1--6. – reference: T. V. Nguyen, N. Sae-Bae, and N. Memon. 2017. DRAW-A-PIN: Authentication using finger-drawn PIN on touch devices. Computers 8 Security 66 (2017), 115--128. 10.1016/j.cose.2017.01.008 – reference: O. Sinanović and Z. Mrkonjić. 2013. Post-stroke writing and reading disorders. Sanamed 8, 1 (2013), 55--63. – reference: J. Danna, V. Paz-Villagrán, C. Gondre, M. Aramaki, R. Kronland-Martinet, S. Ystad, and J.-L. Velay. 2013. Handwriting sonification for the diagnosis of dysgraphia. In Recent Progress in Graphonomics: Learn from the Past--Proceedings of the 16th Conf. of the Int. Graphonomics Society. 123--126. – reference: J. Galbally, M. Gomez-Barrero, and A. Ross. 2017. Accuracy evaluation of handwritten signature verification: Rethinking the random-skilled forgeries dichotomy. In Int. Joint Conf. on Biometrics (IJCB'17). IEEE, 302--310. – reference: M. Diaz, M. A Ferrer, G. S Eskander, and R. Sabourin. 2017. Generation of duplicated off-line signature images for verification systems. IEEE Transactions on Pattern Analysis and Machine Intelligence 39, 5 (2017), 951--964. 10.1109/TPAMI.2016.2560810 – reference: C. Holz and P. Baudisch. 2013. Fiberio: A touchscreen that senses fingerprints. In Proc. 26th Annual ACM Symp. on User Interface Software and Technology. ACM, 41--50. 10.1145/2501988.2502021 – reference: B. Kovari and H. Charaf. 2013. A study on the consistency and significance of local features in off-line signature verification. Pattern Recognition Letters 34, 3 (2013), 247--255. 10.1016/j.patrec.2012.10.011 – reference: R. Blanco-Gonzalo, O. M. Hurtado, A. Mendaza-Ormaza, and R. Sanchez-Reillo. 2012. Handwritten signature recognition in mobile scenarios: Performance evaluation. In IEEE Int. Carnahan Conf. on Security Technology (ICCST’12). 174--179. – reference: M. Renier, F. Gnoato, A. Tessari, M. Formilan, F. Busonera, P. Albanese, G. Sartori, and A. Cester. 2016. A correlational study between signature, writing abilities and decision-making capacity among people with initial cognitive impairment. Aging Clinical and Experimental Research 28, 3 (2016), 505--511. – reference: M. Lorch. 2013. Written language production disorders: Historical and recent perspectives. Current Neurology and Neuroscience Reports 13, 8 (2013), 369. – reference: G. Bailador, C. Sanchez-Avila, J. Guerra-Casanova, and A. de Santos Sierra. 2011. Analysis of pattern recognition techniques for in-air signature biometrics. Pattern Recognition 44, 10 (2011), 2468--2478. 10.1016/j.patcog.2011.04.010 – reference: N. S. Kamel, S. Sayeed, and G. A. Ellis. 2008. Glove-based approach to online signature verification. IEEE Transactions on Pattern Analysis and Machine Intelligence 30, 6 (2008), 1109--1113. 10.1109/TPAMI.2008.32 – reference: C. Freitas, M. Morita, L. de Oliveira, E. Justino, A. Yacoubi, E. Lethelier, F. Bortolozzi, and R. Sabourin. 2000. Bases de dados de cheques bancários brasileiros. In XXVI Conferencia Latinoamericana de Informatica. 209--226. – reference: L. G. Hafemann, R. Sabourin, and L. S. Oliveira. 2016. Writer-independent feature learning for offline signature verification using deep convolutional neural networks. In Int. Joint Conf. on Neural Networks (IJCNN’16). IEEE, 2576--2583. – reference: Y. Akbari, M. J. Jalili, J. Sadri, K. Nouri, I. Siddiqi, and C. Djeddi. 2018. A novel database for automatic processing of Persian handwritten bank checks. Pattern Recognition 74 (2018), 253--265. 10.1016/j.patcog.2017.09.011 – reference: M. K. Kalera, S. Srihari, and A. Xu. 2004. Offline signature verification and identification using distance statistics. International Journal of Pattern Recognition and Artificial Intelligence 18, 7 (2004), 1339--1360. – reference: M. A Ferrer, M. Diaz-Cabrera, and A. Morales. 2013. Synthetic off-line signature image generation. In Int. Conf. on Biometrics. IEEE, 1--7. – reference: D. Rivard, E. Granger, and R. Sabourin. 2013. Multi-feature extraction and selection in writer-independent off-line signature verification. International Journal on Document Analysis and Recognition 16 (2013), 83--103. 10.1007/s10032-011-0180-6 – reference: K. Cpałka, M. Zalasiński, and L. Rutkowski. 2014. New method for the on-line signature verification based on horizontal partitioning. Pattern Recognition 47, 8 (2014), 2652--2661. – reference: E. Onofri, M. Mercuri, M. Salesi, S. Ferrara, G. M. Troili, C. Simeone, M. R. Ricciardi, S. Ricci, and T. Archer. 2013. Dysgraphia in relation to cognitive performance in patients with Alzheimer’s disease. Journal of Intellectual Disability-Diagnosis and Treatment 1, 2 (2013), 113--124. – reference: M. Parodi and J. C. Gómez. 2014. Legendre polynomials based feature extraction for online signature verification. Consistency analysis of feature combinations. Pattern Recognition 47, 1 (2014), 128--140. 10.1016/j.patcog.2013.06.026 – reference: O. Ureche and R. Plamondon. 1999. Document transport, transfer and exchange: Security and commercial aspects. In 5th Int. Conf. on Document Analysis and Recognition (ICDAR'99). 585--588. – reference: F. Vargas, M. A. Ferrer, C. Travieso, and J. Alonso. 2007. Off-line handwritten signature GPDS-960 corpus. In Int. Conf. on Document Analysis and Recogn. (ICDAR'07), Vol. 2. 764--768. – reference: K. Barkoula, G. Economou, and S. Fotopoulos. 2013. Online signature verification based on signatures turning angle representation using longest common subsequence matching. International Journal on Document Analysis and Recognition 16, 3 (2013), 261--272. 10.1007/s10032-012-0193-9 – reference: M. T. Ibrahim, M. Kyan, M. A. Khan, and L. Guan. 2010. On-line signature verification using 1-D velocity-based directional analysis. In 20th International Conference on Pattern Recognition (ICPR'10). 3830--3833. 10.1109/ICPR.2010.933 – reference: M. Bashir and F. Kempf. 2012. Advanced biometric pen system for recording and analyzing handwriting. Journal of Signal Processing Systems 68, 1 (2012), 75--81. 10.1007/s11265-011-0576-z – reference: M. Frank, R. Biedert, E. Ma, I. Martinovic, and D. Song. 2013. Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Transactions on Information Forensics and Security 8, 1 (2013), 136--148. 10.1109/TIFS.2012.2225048 – reference: A. Parziale, S. G. Fuschetto, and A. Marcelli. 2013. Exploiting stability regions for online signature verification. In New Trends in Image Analysis and Processing. Lecture Notes in Computer Science, Vol. 8158. Springer, 112--121. 10.1007/978-3-642-41190-8_13 – reference: M. Blumenstein, M. A. Ferrer, and J. F. Vargas. 2010. The 4NSigComp2010 off-line signature verification competition: Scenario 2. In Int. Conf. on Frontiers in Handwriting Recognition, (ICFHR’10). 721--726. 10.1109/ICFHR.2010.117 – reference: M. I. Malik, S. Ahmed, A. Marcelli, U. Pal, M. Blumenstein, L. Alewijns, and M. Liwicki. 2015. ICDAR2015 competition on signature verification and writer identification for on- and off-line skilled forgeries (SigWIcomp2015). In 13th Int. Conf. on Document Analysis and Recognition (ICDAR'15). 1186--1190. 10.1109/ICDAR.2015.7333948 – reference: J. F. Vargas, M. A. Ferrer, C. M. Travieso, and J. B. Alonso. 2011. Off-line signature verification based on grey level information using texture features. Pattern Recognition 44, 2 (2011), 375--385. 10.1016/j.patcog.2010.07.028 – reference: Y. Elmir, Z. Elberrichi, and R. Adjoudj. 2014. Multimodal biometric using a hierarchical fusion of a person’s face, voice, and online signature.Journal of Information Processing Systems 10, 4 (2014), 555--567. – reference: M. Parodi, J. C. Gómez, M. Liwicki, and L. Alewijnse. 2013. Orthogonal function representation for online signature verification: Which features should be looked at? IET Biometrics 2, 4 (2013), 137--150. – reference: R. J. Verduijn, E. van den Heuvel, and R. Stoel. 2011. Forensic requirements for automated handwriting analysis systems. In Biennial Conf. of the Int. Graphonomics Society (IGS'11). 132--135. – reference: K. Ahrabian and B. Babaali. 2017. On usage of autoencoders and siamese networks for online handwritten signature verification. Corr (2017). arXiv:1712.02781 – reference: R. Senatore and A. Marcelli. 2017. Do handwriting difficulties of Parkinson’s patients depend on their impaired ability to retain the motor plan? A pilot study. In 18th Biennial Conf. of the Int. Graphonomics Society (IGS'17). 139--142. – reference: C. Rathgeb and A. Uhl. 2011. A survey on biometric cryptosystems and cancelable biometrics. EURASIP Journal on Information Security 2011, 1 (2011), 3. – reference: C. Kahindo, S. Garcia-Salicetti, and N. Houmani. 2015. A signature complexity measure to select reference signatures for online signature verification. In Int. Conf. of the Biometrics Special Interest Group (BIOSIG’15). IEEE, 1--8. – reference: A. Sharma and S. Sundaram. 2018. On the exploration of information from the DTW cost matrix for online signature verification. IEEE Transactions on Cybernetics 48, 2 (2018), 611--624. – reference: S. Zhang and F. Li. 2012. Off-line handwritten Chinese signature verification based on support vector machine multiple classifiers. In Advances in Electric and Electronics. Springer, 563--568. – reference: Y. Guerbai, Y. Chibani, and B. Hadjadji. 2015. The effective use of the one-class SVM classifier for handwritten signature verification based on writer-independent parameters. Pattern Recognition 48, 1 (2015), 103--113. 10.1016/j.patcog.2014.07.016 – reference: M. Diaz-Cabrera, A. Morales, and M. A Ferrer. 2014. Emerging issues for static handwritten signature biometric. In Advances in Digital Handwritten Signature Processing. A Human Artefact for e-Society. 111--122. – reference: E. Maiorana and P. Campisi. 2010. Fuzzy commitment for function based signature template protection. IEEE Signal Processing Letters 17, 3 (2010), 249--252. – reference: N. Sae-Bae and N. Memon. 2014. Online signature verification on mobile devices. IEEE Transactions on Information Forensics and Security 9, 6 (2014), 933--947. 10.1109/TIFS.2014.2316472 – reference: S. Al-Maadeed, W. Ayouby, A. Hassaine, A. Almejali, A. Al-Yazeedi, and R. Al-Atiya. 2012. Arabic signature verification dataset. In 13th Int. Arab Conf. on Information Technology. 288--293. – reference: M. Diaz, M. A. Ferrer, and R. Sabourin. 2016. Approaching the intra-class variability in multi-script static signature evaluation. In 23rd Int. Conf. on Pattern Recognition (ICPR’16). IEEE, 1147--1152. – reference: S. Nam, C. Seo, and D. Choi. 2016. Mobile finger signature verification robust to skilled forgery. Journal of the Korea Institute of Information Security 8 Cryptology 26, 5 (2016), 1161--1170. – reference: M. Diaz-Cabrera, M. A. Ferrer, and A. Morales. 2014. Cognitive inspired model to generate duplicated static signature images. In Int. Conf. on Frontiers in Handwriting Recognition (ICFHR’14). 61--66. – reference: A. Dutta, U. Pal, and J. Lladós. 2016. Compact correlated features for writer independent signature verification. In 23rd Int. Conf. on Pattern Recognition (ICPR'16). IEEE, 3422--3427. – reference: H. Kim, S. Lee, and K. Yun. 2011. Capacitive tactile sensor array for touch screen application. Sensors and Actuators A: Physical 165, 1 (2011), 2--7. – reference: A. Nordgaard and B. Rasmusson. 2012. The likelihood ratio as value of evidence - more than a question of numbers. Law, Probability and Risk 11, 4 (2012), 303--315. – reference: Z. Zhang, X. Liu, and Y. Cui. 2016. Multi-phase offline signature verification system using deep convolutional generative adversarial networks. In 9th International Symposium on Computational Intelligence and Design (ISCID’16), Vol. 2. 103--107. – reference: N. Houmani and S. Garcia-Salicetti. 2016. On hunting animals of the biometric menagerie for online signature. PLoS ONE 11, 4 (2016), e0151691. – reference: M. Vijayanunni. 1998. Planning for 2001 census of India based on 1991 census. In18th Population Census Conf.. – reference: N. Zheng, K. Bai, H. Huang, and H. Wang. 2014. You are how you touch: User verification on smartphones via tapping behaviors. In Int. Conf. on Network Protocols (ICNP'14). IEEE, 221--232. 10.1109/ICNP.2014.43 – reference: K. Wang, Y. Wang, and Z. Zhang. 2011. On-line signature verification using graph representation. In 6th Int. Conf. on Image and Graphics (ICIG'11). 943--948. 10.1109/ICIG.2011.57 – reference: L. Nanni, E. Maiorana, A. Lumini, and P. Campisi. 2010. Combining local, regional and global matchers for a template protected on-line signature verification system. Expert Systems with Applications 37, 5 (2010), 3676--3684. 10.1016/j.eswa.2009.10.023 – reference: M. Fairhurst, M. Erbilek, and C. Li. 2014. Enhancing the forensic value of handwriting using emotion prediction. In Int. Workshop on Biometrics and Forensics (IWBF’14). 1--6. – reference: R. Kumar, J. D. Sharma, and B. Chanda. 2012. Writer-independent off-line signature verification using surroundedness feature. Pattern Recognition Letters 33, 3 (2012), 301--308. 10.1016/j.patrec.2011.10.009 – reference: N. Houmani, A. Mayoue, S. Garcia-Salicetti, B. Dorizzi, M. I. Khalil, M. N. Moustafa, H. Abbas, D. Muramatsu, B. Yanikoglu, A. Kholmatov, M. Martinez-Diaz, J. Fierrez, J. Ortega-Garcia, J. Roure Alcobé, J. Fabregas, M. Faundez-Zanuy, J. M. Pascual-Gaspar, V. Cardeñoso-Payo, and C. Vivaracho-Pascual. 2012. BioSecure signature evaluation campaign (BSEC2009): Evaluating online signature algorithms depending on the quality of signatures. Pattern Recognition 45, 3 (2012), 993--1003. 10.1016/j.patcog.2011.08.008 – reference: E. J. Smits, A. J. Tolonen, L. Cluitmans, M. van Gils, B. A. Conway, R. C. Zietsma, K. L. Leenders, and N. M. Maurits. 2014. Standardized handwriting to assess bradykinesia, micrographia and tremor in Parkinson’s disease. PloS ONE 9, 5 (2014), e97614. – reference: S. Pal, U. Pal, and M. Blumenstein. 2013. Hindi and English off-line signature identification and verification. In Proc. of Int. Conf. on Advances in Computing. Springer, New Delhi, 905--910. – reference: S. Pal, U. Pal, and M. Blumenstein. 2013. Multi-script off-line signature verification: A two stage approach. In 2nd Int. Workshop on Automated Forensic Handwriting Analysis (AFHA'13). 31--35. – reference: L. C. Alewijnse, C. E. van den Heuvel, R. D. Stoel, and K. Franke. 2009. Analysis of signature complexity. In Proceedings of the 14th Biennial Conf. of the Int. Graphonomics Society: Advances in Graphonomics. 6--9. – reference: N. Houmani, S. Garcia, B. Dorizzi, J. Montalvao, J. Canuto, M. Andrade, Y. Qiao, X. Wang, T. Scheidat, A. Makrushin, D. Muramatsu, J. Putz, M. Kudelski, M. Faundez, J. Pascual, V. Cardeñoso, C. Vivaracho, E. Argones Rúa, J. Alba, A. Kholmatov, and B. Yanikoglu. 2011. BioSecure signature evaluation campaign (ESRA’2011): Evaluating systems on quality-based categories of skilled forgeries. In 2011 Int. Joint Conf. on Biometrics (IJCB’11). 1--10. 10.1109/IJCB.2011.6117487 – reference: B. Bhanu and A. Kumar. 2017. Deep Learning for Biometrics. Springer. – reference: J. H. Yan, S. Rountree, P. Massman, R. S. Doody, and H. Li. 2008. Alzheimer’s disease and mild cognitive impairment deteriorate fine movement control. Journal of Psychiatric Research 42, 14 (2008), 1203--1212. – reference: R. Plamondon, C. O’Reilly, and C. Ouellet-Plamondon. 2014. Strokes against stroke - strokes for strides. Pattern Recognition 47, 3 (2014), 929--944. 10.1016/j.patcog.2013.05.004 – reference: G. Chassang. 2017. The impact of the EU general data protection regulation on scientific research. Ecancermedicalscience 11, 709 (2017). – reference: F. Costa and A. Accardo. 2017. Kinematic analysis of handwriting in parkinson disease. In 18th Conf. of the Int. Graphonomics Society (IGS'17). 135--138. – reference: C. Rabasse, R. M. Guest, and M. C. Fairhurst. 2008. A new method for the synthesis of signature data with natural variability. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 38, 3 (2008), 691--699. 10.1109/TSMCB.2008.918575 – reference: A. Alaei, S. Pal, U. Pal, and M. Blumenstein. 2017. An efficient signature verification method based on an interval symbolic representation and a fuzzy similarity measure. IEEE Transactions on Information Forensics and Security 12, 10 (2017), 2360--2372. – reference: T. Steinherz, D. Doermann, E. Rivlin, and N. Intrator. 2009. Offline loop investigation for handwriting analysis. IEEE Transactions on Pattern Analysis and Machine Intelligence 31, 2 (2009), 193--209. 10.1109/TPAMI.2008.68 – reference: H. Edwards, C. Gotsonis, et al. 2009. Strengthening Forensic Science in the United States: A Path Forward. National Academies Press. – reference: J. Fierrez, J. Galbally, J. Ortega-Garcia, M. R. Freire, F. Alonso-Fernandez, D. Ramos, D. T. Toledano, J. Gonzalez-Rodriguez, J. A. Siguenza, J. Garrido-Salas, E. Anguiano, G. Gonzalez-de-Rivera, R. Ribalda, M. Faundez-Zanuy, J. A. Ortega, V. Cardenoso-Payo, A. Viloria, C. E. Vivaracho, Q. I. Moro, J. J. Igarza, J. Sanchez, I. Hernaez, C. Orrite-Uruñuela, F. Martinez-Contreras, and J. J. Gracia-Roche. 2010. BiosecurID: A multimodal biometric database. Pattern Analysis and Applications 13, 2 (2010), 235--246. 10.1007/s10044-009-0151-4 – reference: A. Fischer and R. Plamondon. 2017. Signature verification based on the kinematic theory of rapid human movements. IEEE Transactions on Human-Machine Systems 47, 2 (2017), 169--180. – reference: L. G. Hafemann, R. Sabourin, and L. S. Oliveira. 2017. Offline handwritten signature verification - literature review. In 7th Int. Conf. on Image Processing Theory, Tools and Applications (IPTA’17). 1--5. – reference: A. Woch, R. Plamondon, and C. O’Reilly. 2011. Kinematic characteristics of bidirectional delta-lognormal primitives in young and older subjects. Human Movement Science 30, 1 (2011), 1--17. – reference: M. Schulte-Austum. 2013. D-Scribe. In Presentation at Measurement Science and Standards in Forensic Handwriting Analysis Conf. – reference: M. Liwicki, C. E. van den Heuvel, B. Found, and M. I. Malik. 2010. Forensic signature verification competition 4NSigComp2010 - detection of simulated and disguised signatures. In 12th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'10). 715--720. 10.1109/ICFHR.2010.116 – reference: J. Guerra-Casanova, G. Sánchez-Ávila, C. Bailador, and A. de Santos-Sierra. 2011. Time series distances measures to analyze in-air signatures to authenticate users on mobile phones. In IEEE Int. Carnahan Conf. on Security Technology (ICCST’11). IEEE, 1--7. – reference: S. Pal, U. Pal, and M. Blumenstein. 2013. Off-line verification technique for Hindi signatures. IET Biometrics 2, 4 (2013), 182--190. – reference: R. Tolosana, R. Vera-Rodriguez, J. Ortega-Garcia, and J. Fierrez. 2015. Increasing the robustness of biometric templates for dynamic signature biometric systems. In Int. Carnahan Conf. on Security Technology (ICCST'15). IEEE, 229--234. – reference: M. E. Yahyatabar and J. Ghasemi. 2017. Online signature verification using double-stage feature extraction modelled by dynamic feature stability experiment. IET Biometrics 6, 6 (2017), 393--401. – reference: M. P. Caligiuri, H.-L. Teulings, C. E. Dean, and J. B. Lohr. 2015. A quantitative measure of handwriting dysfluency for assessing tardive dyskinesia. Journal of Clinical Psychopharmacology 35, 2 (2015), 168. – reference: D.-Y. Yeung, H. Chang, Y. Xiong, S. George, R. Kashi, T. Matsumoto, and G. Rigoll. 2004. SVC2004: First International signature verification competition. In Biometric Authentication. LNCS, Vol. 3072. Springer, 16--22. – reference: N. Houmani, S. Garcia-Salicetti, B. Dorizzi, and M. El-Yacoubi. 2010. On-line signature verification on a mobile platform. In Int. Conf. on Mobile Computing, Applications, and Services. Springer, 396--400. – reference: M. B. Yılmaz and B. Yanıkoğlu. 2016. Score level fusion of classifiers in off-line signature verification. Information Fusion 32 (2016), 109--119. 10.1016/j.inffus.2016.02.003 – reference: Y. Meng, D. S. Wong, R. Schlegel, and L. Kwok. 2012. Touch gestures based biometric authentication scheme for touchscreen mobile phones. In Int. Conf. on Information Security and Cryptology. Springer, 331--350. – reference: R. Plamondon, C. O'Reilly, C. Rémi, and T. Duval. 2013. The lognormal handwriter: Learning, performing, and declining. Frontiers in Psychology 4 (2013), 945. – reference: R. Blanco-Gonzalo, R. Sanchez-Reillo, O. M. Hurtado, and J. Liu-Jimenez. 2013. Usability analysis of dynamic signature verification in mobile environments. In Int. Conf. of the Biometrics Special Interest Group (BIOSIG’13). IEEE, 1--9. – reference: A. Mendaza-Ormaza, O. M. Hurtado, R. Sánchez-Reillo, and J. Uriarte. 2010. Analysis on the resolution of the different signals in an on-line handwritten signature verification system applied to portable devices. In IEEE Int. Carnahan Conf. on Security Technology (ICCST’10). 341--350. – reference: U. Uludag, S. Pankanti, S. Prabhakar, and A. Jain. 2004. Biometric cryptosystems: Issues and challenges. Proceedings of the IEEE 92, 6 (2004), 948--960. – reference: D. Impedovo and G. Pirlo. 2018. Dynamic handwriting analysis for the assessment of neurodegenerative diseases: A pattern recognition perspective. IEEE Reviews in Biomedical Engineering (2018). – reference: S. Rosenblum, M. Samuel, S. Zlotnik, I. Erikh, and I. Schlesinger. 2013. Handwriting as an objective tool for Parkinson’s disease diagnosis. Journal of Neurology 260, 9 (2013), 2357--2361. – reference: A. M. Huber, and R. A. Headrick. 1999. Handwriting Identification: Facts and Fundamentals. Boca Raton, CRC Press. – reference: R. Plamondon and S. N. Srihari. 2000. On-line and off-line handwriting recognition: A comprehensive survey. IEEE Transactions on Pattern Analysis and Machine Intelligence 22, 1 (2000), 63--84. 10.1109/34.824821 – ident: e_1_2_1_7_1 doi: 10.1109/TIFS.2017.2707332 – volume-title: Int. Joint Conf. on Neural Networks (IJCNN’16) ident: e_1_2_1_109_1 – volume-title: 6th Int. Symposium on Image and Signal Processing and Analysis. 546--549 ident: e_1_2_1_44_1 – volume-title: Conf. on Biometrics (ICB’15) ident: e_1_2_1_102_1 – ident: e_1_2_1_193_1 doi: 10.1142/S146902681340004X – ident: e_1_2_1_91_1 doi: 10.1016/j.patcog.2015.03.019 – ident: e_1_2_1_19_1 doi: 10.1007/s10032-012-0193-9 – ident: e_1_2_1_16_1 doi: 10.1109/TIFS.2011.2168213 – ident: e_1_2_1_151_1 doi: 10.1109/ICDAR.2011.294 – volume-title: Proc. European Workshop on Biometrics and Identity Management (BioID’11) ident: e_1_2_1_101_1 – ident: e_1_2_1_224_1 doi: 10.1007/s00415-013-6996-x – ident: e_1_2_1_260_1 – volume-title: 23rd Int. Conf. on Pattern Recognition (ICPR'16) ident: e_1_2_1_61_1 – volume-title: 1st Int. Workshop on Automated Forensic Handwriting Analysis (AFHA’11) year: 2011 ident: e_1_2_1_85_1 – ident: e_1_2_1_216_1 doi: 10.1016/j.patcog.2018.04.012 – volume-title: Int. Conf. on Hybrid Intelligent Systems (HIS'12) ident: e_1_2_1_195_1 – volume-title: 19th Int. Conf. on Pattern Recognition (ICPR'08) ident: e_1_2_1_166_1 – ident: e_1_2_1_222_1 doi: 10.1007/s40520-016-0549-y – volume: 2 volume-title: 9th International Symposium on Computational Intelligence and Design (ISCID’16) ident: e_1_2_1_275_1 – volume-title: 2nd Int. Workshop on Automated Forensic Handwriting Analysis (AFHA'13) ident: e_1_2_1_199_1 – volume-title: 14th Conf. of the Int. Graphonomics Society (IGS'09) ident: e_1_2_1_225_1 – volume-title: Biennial Conf. of the Int. Graphonomics Society (IGS'11) ident: e_1_2_1_257_1 – volume-title: Recent Progress in Graphonomics: Learn from the Past--Proceedings of the 16th Conf. of the Int ident: e_1_2_1_41_1 – volume-title: 15th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'16) ident: e_1_2_1_169_1 – volume-title: Proceedings of the 14th Biennial Conf. of the Int. Graphonomics Society: Advances in Graphonomics. 6--9. ident: e_1_2_1_8_1 – ident: e_1_2_1_58_1 doi: 10.1109/TPAMI.2008.264 – ident: e_1_2_1_153_1 doi: 10.1007/s11910-013-0369-9 – ident: e_1_2_1_201_1 doi: 10.1016/j.patcog.2013.06.026 – ident: e_1_2_1_236_1 doi: 10.1109/TCYB.2017.2647826 – ident: e_1_2_1_59_1 doi: 10.1016/j.humov.2009.01.005 – volume-title: 2nd IEEE Intl. Conf. on Biometrics: Theory, Applications and Systems (BTAS’08) ident: e_1_2_1_120_1 – ident: e_1_2_1_10_1 doi: 10.1109/ICDAR.2009.261 – ident: e_1_2_1_95_1 doi: 10.1371/journal.pone.0069897 – ident: e_1_2_1_33_1 doi: 10.1097/JCP.0000000000000277 – ident: e_1_2_1_131_1 doi: 10.1109/FSKD.2009.597 – ident: e_1_2_1_162_1 doi: 10.31974/jfde24-21-35 – ident: e_1_2_1_3_1 doi: 10.1109/AICCSA.2008.4493644 – ident: e_1_2_1_273_1 doi: 10.1049/iet-bmt.2015.0017 – volume-title: 14th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'14) ident: e_1_2_1_163_1 – ident: e_1_2_1_74_1 doi: 10.1109/TCYB.2017.2751740 – volume: 3072 volume-title: SVC2004: First International signature verification competition. In Biometric Authentication. LNCS ident: e_1_2_1_271_1 – ident: e_1_2_1_255_1 doi: 10.1016/j.patcog.2010.07.028 – volume-title: 14th IAPR Int. Conf. on Document Analysis and Recognition (ICDAR’17) ident: e_1_2_1_49_1 – ident: e_1_2_1_205_1 doi: 10.1109/ACPR.2013.164 – ident: e_1_2_1_125_1 doi: 10.1109/RBME.2018.2840679 – volume-title: Int. Conf. on Practical Applications of Agents and Multi-Agent Systems (PAAMS'13) ident: e_1_2_1_143_1 – ident: e_1_2_1_156_1 doi: 10.1109/LSP.2009.2038111 – volume-title: 21st Iranian Conf. on Electrical Engineering (ICEE’13) ident: e_1_2_1_267_1 – volume-title: Proc. 14th IAPR Int. Conference on Document Analysis and Recognition (ICDAR'17) ident: e_1_2_1_248_1 – ident: e_1_2_1_243_1 – volume-title: Handwriting analysis to support neurodegenerative diseases diagnosis: A review. Pattern Recognition Letters year: 2018 ident: e_1_2_1_244_1 – ident: e_1_2_1_272_1 doi: 10.1016/j.inffus.2016.02.003 – ident: e_1_2_1_235_1 doi: 10.1109/TIFS.2016.2632063 – ident: e_1_2_1_172_1 doi: 10.1109/CCST.2011.6095930 – volume-title: Int. Conf. on Information Security and Cryptology. Springer, 331--350 ident: e_1_2_1_174_1 – ident: e_1_2_1_177_1 doi: 10.13089/JKIISC.2016.26.5.1161 – ident: e_1_2_1_179_1 doi: 10.1016/j.cose.2017.01.008 – ident: e_1_2_1_266_1 doi: 10.1016/j.humov.2009.10.006 – volume-title: 6th Iranian Joint Congress on Fuzzy and Intelligent Systems. 205--209 ident: e_1_2_1_72_1 – volume-title: International Workshop on Biometric Authentication. Springer, 295--306 ident: e_1_2_1_81_1 – ident: e_1_2_1_144_1 doi: 10.1016/j.patrec.2011.10.009 – ident: e_1_2_1_204_1 doi: 10.1007/978-3-642-41190-8_13 – volume-title: 23rd Int. Conf. on Pattern Recognition (ICPR’16) ident: e_1_2_1_51_1 – ident: e_1_2_1_226_1 doi: 10.1016/j.rasd.2015.11.004 – ident: e_1_2_1_223_1 doi: 10.1007/s10032-011-0180-6 – volume-title: 7th IEEE Int. Conf. on Software Engineering and Service Science (ICSESS’16) ident: e_1_2_1_37_1 – ident: e_1_2_1_245_1 doi: 10.1109/TPAMI.2008.68 – ident: e_1_2_1_103_1 doi: 10.1109/TSMCB.2009.2034382 – ident: e_1_2_1_175_1 doi: 10.1111/j.1556-4029.2010.01584.x – volume-title: Symposium on Computational Intelligence in Biometrics and Identity Management. 45--52 ident: e_1_2_1_67_1 – ident: e_1_2_1_128_1 doi: 10.1109/ICFHR.2012.192 – volume-title: 49th IEEE Int. Carnahan Conf. on Security Technology (ICCST'15) ident: e_1_2_1_50_1 – volume-title: Biometrics Symposium. IEEE, 83--88 ident: e_1_2_1_97_1 – ident: e_1_2_1_206_1 doi: 10.1109/THMS.2015.2443050 – ident: e_1_2_1_4_1 – volume-title: 18th Conf. of the Int. Graphonomics Society (IGS'17) ident: e_1_2_1_38_1 – ident: e_1_2_1_126_1 doi: 10.1109/ICFHR.2012.211 – ident: e_1_2_1_208_1 doi: 10.1049/iet-bmt.2013.0012 – volume-title: 19th Iranian Conf. on Electrical Engineering (ICEE’11) ident: e_1_2_1_70_1 – ident: e_1_2_1_42_1 – ident: e_1_2_1_116_1 doi: 10.1371/journal.pone.0151691 – ident: e_1_2_1_261_1 doi: 10.1109/TIM.2009.2037871 – volume-title: Int. Conf. of the Biometrics Special Interest Group (BIOSIG’13) ident: e_1_2_1_27_1 – volume: 2 volume-title: Int. Conf. on Document Analysis and Recogn. (ICDAR'07) ident: e_1_2_1_256_1 – volume-title: 17th Biennial Conf. of the Int. Graphonomics Society (IGS'15) ident: e_1_2_1_113_1 – ident: e_1_2_1_215_1 doi: 10.1016/j.patcog.2013.05.004 – ident: e_1_2_1_34_1 doi: 10.1016/j.psychres.2009.07.005 – volume-title: Int. Workshop on Information Forensics and Security (WIFS’15) ident: e_1_2_1_251_1 – ident: e_1_2_1_21_1 doi: 10.1016/j.patcog.2011.10.011 – ident: e_1_2_1_86_1 – ident: e_1_2_1_191_1 doi: 10.1049/ip-vis:20031078 – ident: e_1_2_1_53_1 doi: 10.1109/ICDAR.2015.7333838 – ident: e_1_2_1_136_1 doi: 10.1109/ICDAR.2013.83 – volume-title: Proc. 1st Intl. Conf. on Universal Access in Human-Computer Interaction. ident: e_1_2_1_69_1 – ident: e_1_2_1_43_1 doi: 10.1049/iet-bmt.2016.0010 – ident: e_1_2_1_137_1 doi: 10.1109/ACPR.2013.46 – ident: e_1_2_1_187_1 doi: 10.1016/j.humov.2010.07.010 – volume-title: In18th Population Census Conf.. year: 1998 ident: e_1_2_1_259_1 – volume-title: 7th World Congress on Intelligent Control and Automation. 3778--3782 ident: e_1_2_1_173_1 – ident: e_1_2_1_227_1 doi: 10.1109/TIFS.2014.2316472 – ident: e_1_2_1_108_1 doi: 10.1109/TPAMI.2008.302 – ident: e_1_2_1_200_1 doi: 10.1049/iet-bmt.2013.0016 – volume-title: 7th Int. Conf. on Image Processing Theory, Tools and Applications (IPTA’17) ident: e_1_2_1_111_1 – volume-title: 1st Workshop on Image-based Smart City Applications: Int. Conf. on Image Analysis and Processing (ICIAP’15) ident: e_1_2_1_207_1 – ident: e_1_2_1_78_1 doi: 10.1109/TIFS.2012.2190281 – ident: e_1_2_1_234_1 doi: 10.1016/j.patrec.2016.07.015 – volume-title: 18th Biennial Conf. of the Int. Graphonomics Society. 131--134 ident: e_1_2_1_35_1 – ident: e_1_2_1_123_1 doi: 10.1109/TSMCC.2008.923866 – ident: e_1_2_1_232_1 doi: 10.1016/j.imavis.2017.08.004 – ident: e_1_2_1_274_1 doi: 10.1007/978-3-642-28744-2_74 – ident: e_1_2_1_52_1 doi: 10.1109/TCYB.2016.2630419 – ident: e_1_2_1_124_1 doi: 10.1109/ICFHR.2010.102 – volume-title: Int. Symposium on Signal Processing and Information Technology. IEEE, 315--319 ident: e_1_2_1_98_1 – ident: e_1_2_1_127_1 doi: 10.1016/S0031-3203(99)00047-3 – ident: e_1_2_1_181_1 doi: 10.1109/ICDAR.2009.123 – ident: e_1_2_1_57_1 doi: 10.1142/9789814579636_0009 – ident: e_1_2_1_66_1 doi: 10.1049/iet-bmt.2013.0024 – ident: e_1_2_1_12_1 doi: 10.1049/iet-bmt.2012.0048 – volume-title: IEEE Int. Carnahan Conf. on Security Technology (ICCST’10) ident: e_1_2_1_171_1 – ident: e_1_2_1_228_1 doi: 10.1109/ICCEE.2008.157 – volume: 2014 start-page: 1 year: 2014 ident: e_1_2_1_242_1 article-title: An immune clonal selection algorithm for synthetic signature generation publication-title: Mathematical Problems in Engineering doi: 10.1155/2014/324645 – ident: e_1_2_1_159_1 doi: 10.1109/ICDAR.2013.196 – volume-title: IEEE Int. Joint Conf. on Biometrics (IJCB’14) ident: e_1_2_1_155_1 – volume-title: Information technology - Biometric presentation attack detection - Part 1: Framework ident: e_1_2_1_1_1 – volume: 2 volume-title: Int. Conf. on Document Analysis and Recognition ident: e_1_2_1_88_1 – ident: e_1_2_1_183_1 doi: 10.1109/ICDAR.2015.7333874 – ident: e_1_2_1_218_1 doi: 10.1109/34.824821 – volume-title: 17th Biennial Conf. of the Int. Graphonomics Society (IGS'15) ident: e_1_2_1_211_1 – ident: e_1_2_1_105_1 doi: 10.1109/CCST.2011.6095931 – ident: e_1_2_1_184_1 doi: 10.1109/BTAS.2017.8272676 – ident: e_1_2_1_64_1 doi: 10.1016/j.ins.2013.09.004 – volume-title: IEEE 3rd Int. Conf. on Biometrics: Theory, Applications, and Systems. 1--6. ident: e_1_2_1_117_1 – volume-title: 14th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR’14) ident: e_1_2_1_202_1 – ident: e_1_2_1_26_1 doi: 10.1049/iet-bmt.2013.0044 – volume-title: Int. Conf. on Computational Intelligence and Software Engineering (CiSE'09) ident: e_1_2_1_130_1 – ident: e_1_2_1_167_1 doi: 10.1049/iet-bmt.2013.0081 – ident: e_1_2_1_219_1 doi: 10.1109/TSMCB.2008.918575 – ident: e_1_2_1_18_1 doi: 10.1016/j.patcog.2011.04.010 – ident: e_1_2_1_83_1 doi: 10.1109/THMS.2016.2634922 – ident: e_1_2_1_278_1 doi: 10.1016/j.patcog.2016.01.009 – volume-title: 13th Int. Arab Conf. on Information Technology. 288--293 ident: e_1_2_1_6_1 – ident: e_1_2_1_189_1 doi: 10.3389/fnagi.2014.00150 – ident: e_1_2_1_140_1 doi: 10.1007/s10044-008-0118-x – volume-title: Int. Symposium on Visual Computing. Springer, 616--625 ident: e_1_2_1_220_1 – ident: e_1_2_1_15_1 doi: 10.1109/TSMCB.2012.2188508 – volume-title: Int. Conf. on Signal and Image Processing Applications (ICSIPA'09) ident: e_1_2_1_229_1 – ident: e_1_2_1_238_1 doi: 10.1016/j.bandl.2006.12.002 – volume-title: Proc. of Int. Conf. on Advances in Computing. Springer ident: e_1_2_1_198_1 – ident: e_1_2_1_99_1 doi: 10.4304/jmm.4.3.137-144 – ident: e_1_2_1_29_1 doi: 10.1109/ICFHR.2010.117 – ident: e_1_2_1_107_1 doi: 10.1016/j.eswa.2017.03.024 – volume-title: Int. Conf. of the Biometrics Special Interest Group (BIOSIG’15) ident: e_1_2_1_133_1 – ident: e_1_2_1_230_1 – ident: e_1_2_1_190_1 doi: 10.1109/TPAMI.2009.76 – ident: e_1_2_1_20_1 doi: 10.1007/s11265-011-0576-z – ident: e_1_2_1_92_1 doi: 10.1109/ICDAR.2009.38 – volume-title: 12th IAPR Workshop on Document Analysis Systems (DAS’16) ident: e_1_2_1_192_1 – ident: e_1_2_1_210_1 doi: 10.1007/978-3-642-41190-8_14 – ident: e_1_2_1_79_1 doi: 10.1007/s10044-009-0151-4 – ident: e_1_2_1_122_1 doi: 10.1109/ICPR.2010.933 – ident: e_1_2_1_158_1 doi: 10.1109/DAS.2012.10 – ident: e_1_2_1_276_1 doi: 10.1109/ICNP.2014.43 – volume-title: The Neuroscience of Handwriting: Applications for Forensic Document Examination ident: e_1_2_1_32_1 – volume-title: 5th Int. Conf. on Document Analysis and Recognition (ICDAR'99) ident: e_1_2_1_254_1 – ident: e_1_2_1_268_1 doi: 10.1049/iet-bmt.2016.0103 – ident: e_1_2_1_55_1 doi: 10.1371/journal.pone.0123254 – ident: e_1_2_1_135_1 doi: 10.1109/TPAMI.2008.32 – ident: e_1_2_1_93_1 doi: 10.1016/j.patcog.2011.12.007 – volume-title: Biometrics Symposium year: 2007 ident: e_1_2_1_9_1 – ident: e_1_2_1_2_1 doi: 10.1007/978-3-642-41190-8_15 – ident: e_1_2_1_194_1 doi: 10.1109/DICTA.2011.119 – volume-title: 4th Int. Workshop on Biometrics and Forensics. IEEE, 1--6. ident: e_1_2_1_100_1 – ident: e_1_2_1_178_1 doi: 10.1016/j.eswa.2009.10.023 – ident: e_1_2_1_23_1 doi: 10.1007/978-3-319-61657-5 – volume: 8 start-page: 55 year: 2013 ident: e_1_2_1_237_1 article-title: Post-stroke writing and reading disorders publication-title: Sanamed – volume-title: IEEE Int. Carnahan Conf. on Security Technology (ICCST’16) ident: e_1_2_1_154_1 – ident: e_1_2_1_233_1 doi: 10.1007/s12559-011-9119-y – ident: e_1_2_1_241_1 doi: 10.1049/iet-bmt.2015.0058 – volume: 3 volume-title: Int. Conf. on Machine Learning and Cybernetics year: 2009 ident: e_1_2_1_45_1 – ident: e_1_2_1_148_1 doi: 10.1109/HICSS.2016.683 – ident: e_1_2_1_214_1 doi: 10.1016/0031-3203(89)90059-9 – volume-title: United States: A Path Forward year: 2009 ident: e_1_2_1_62_1 – ident: e_1_2_1_165_1 doi: 10.1016/j.patrec.2016.06.016 – ident: e_1_2_1_160_1 doi: 10.1109/ICDAR.2015.7333948 – ident: e_1_2_1_14_1 doi: 10.1155/2018/3127042 – volume: 3 volume-title: Proc. 1992 IJCNN Int. Joint Conf. on Neural Networks (IJCNN'92) ident: e_1_2_1_252_1 – ident: e_1_2_1_75_1 doi: 10.1109/TPAMI.2016.2582167 – ident: e_1_2_1_84_1 doi: 10.1109/ICFHR.2012.254 – ident: e_1_2_1_112_1 doi: 10.1109/TIFS.2016.2521611 – ident: e_1_2_1_150_1 doi: 10.1109/ICFHR.2012.217 – ident: e_1_2_1_152_1 doi: 10.1109/ICFHR.2010.116 – ident: e_1_2_1_188_1 doi: 10.1016/j.humov.2012.07.005 – volume-title: Proceedings of the 5th International Conference on Recent Achievements in Mechatronics, Automation, Computer Sciences and Robotics (MACRo'17) ident: e_1_2_1_13_1 – ident: e_1_2_1_114_1 doi: 10.1145/2501988.2502021 – volume-title: Int. Conf. on Mobile Computing, Applications, and Services. Springer, 396--400 ident: e_1_2_1_118_1 – volume-title: Int. Joint Conf. on Neural Networks (IJCNN’12) ident: e_1_2_1_197_1 – ident: e_1_2_1_221_1 doi: 10.1186/1687-417X-2011-3 – ident: e_1_2_1_22_1 doi: 10.1016/j.patcog.2009.05.009 – volume-title: 1st Int. Workshop on Automated Forensic Handwriting Analysis (AFHA'11) ident: e_1_2_1_196_1 – ident: e_1_2_1_5_1 doi: 10.1016/j.patcog.2017.09.011 – ident: e_1_2_1_110_1 doi: 10.1016/j.patcog.2017.05.012 – ident: e_1_2_1_239_1 doi: 10.1371/journal.pone.0097614 – ident: e_1_2_1_104_1 doi: 10.1016/j.patcog.2014.07.016 – ident: e_1_2_1_48_1 doi: 10.1109/TPAMI.2016.2560810 – ident: e_1_2_1_24_1 doi: 10.1016/j.humov.2010.08.008 – ident: e_1_2_1_146_1 doi: 10.1504/IJBM.2010.030415 – ident: e_1_2_1_106_1 doi: 10.1049/iet-bmt.2013.0022 – ident: e_1_2_1_138_1 doi: 10.1109/ICFHR.2010.70 – ident: e_1_2_1_168_1 doi: 10.1002/mds.25894 – ident: e_1_2_1_39_1 doi: 10.1016/j.eswa.2013.12.047 – ident: e_1_2_1_262_1 doi: 10.1109/TIE.2009.2038339 – ident: e_1_2_1_263_1 doi: 10.1109/ICIG.2011.57 – ident: e_1_2_1_212_1 doi: 10.1142/9789814579636_0001 – ident: e_1_2_1_265_1 doi: 10.1123/mcj.14.1.1 – volume-title: 14th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR’14) ident: e_1_2_1_56_1 – ident: e_1_2_1_182_1 doi: 10.1093/lpr/mgs019 – ident: e_1_2_1_121_1 doi: 10.1201/9781420048773 – ident: e_1_2_1_180_1 doi: 10.1145/1815330.1815390 – ident: e_1_2_1_157_1 doi: 10.1109/TSMCA.2010.2041653 – volume-title: 18th Biennial Conf. of the Int. Graphonomics Society (IGS'17) ident: e_1_2_1_231_1 – ident: e_1_2_1_161_1 doi: 10.1109/ICDAR.2013.220 – volume-title: The impact of the EU general data protection regulation on scientific research. Ecancermedicalscience 11, 709 year: 2017 ident: e_1_2_1_36_1 – ident: e_1_2_1_63_1 doi: 10.3745/JIPS.02.0007 – volume-title: 2nd Int. Conf. on E-Business and Information System Security. 1--4. ident: e_1_2_1_129_1 – volume-title: Int. Workshop on Biometrics and Forensics (IWBF’14) ident: e_1_2_1_68_1 – ident: e_1_2_1_119_1 doi: 10.1016/j.patcog.2011.08.008 – ident: e_1_2_1_30_1 doi: 10.1016/j.eswa.2018.04.035 – ident: e_1_2_1_90_1 doi: 10.1016/j.engappai.2005.12.006 – ident: e_1_2_1_40_1 doi: 10.1016/j.patcog.2014.02.012 – ident: e_1_2_1_209_1 doi: 10.1109/THMS.2013.2279008 – ident: e_1_2_1_60_1 doi: 10.1016/j.humov.2014.07.006 – ident: e_1_2_1_132_1 doi: 10.1007/s10623-005-6343-z – volume-title: Interpreting Evidence: Evaluating Forensic Science in the Courtroom. year: 2016 ident: e_1_2_1_17_1 – volume-title: Int. Conf. on Frontiers in Handwriting Recognition (ICFHR’14) ident: e_1_2_1_54_1 – ident: e_1_2_1_203_1 doi: 10.1049/iet-bmt.2013.0025 – ident: e_1_2_1_247_1 doi: 10.1109/ACCESS.2018.2793966 – volume-title: IEEE Int. Carnahan Conf. on Security Technology (ICCST’12) ident: e_1_2_1_25_1 – ident: e_1_2_1_186_1 doi: 10.1016/j.patcog.2008.10.017 – ident: e_1_2_1_31_1 doi: 10.1109/21.229453 – ident: e_1_2_1_80_1 doi: 10.1007/978-0-387-71041-9_10 – ident: e_1_2_1_89_1 – volume-title: 15th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'16) ident: e_1_2_1_47_1 – volume-title: Proc. IEEE Int. Carnahan Conf. on Security Technology (ICCST’13) ident: e_1_2_1_77_1 – ident: e_1_2_1_28_1 doi: 10.1109/ICDAR.2009.216 – ident: e_1_2_1_46_1 – ident: e_1_2_1_96_1 doi: 10.1016/j.patcog.2011.12.011 – volume-title: Int. Carnahan Conf. on Security Technology (ICCST'15) ident: e_1_2_1_249_1 – ident: e_1_2_1_134_1 doi: 10.1142/S0218001404003630 – ident: e_1_2_1_87_1 doi: 10.1109/TIFS.2012.2225048 – volume: 1 start-page: 7 year: 2012 ident: e_1_2_1_139_1 article-title: Persian signature verification using convolutional neural networks publication-title: International Journal of Engineering Research and Technology – ident: e_1_2_1_240_1 doi: 10.1016/j.patrec.2016.05.023 – ident: e_1_2_1_82_1 doi: 10.1109/ICDAR.2015.7333760 – volume-title: National Workshop on Information Assurance Research. 1--6. year: 2012 ident: e_1_2_1_164_1 – ident: e_1_2_1_71_1 doi: 10.1016/j.compeleceng.2016.11.010 – ident: e_1_2_1_141_1 doi: 10.1016/j.sna.2009.12.031 – volume-title: Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM’11) ident: e_1_2_1_65_1 – ident: e_1_2_1_246_1 doi: 10.1371/journal.pone.0176792 – volume-title: Int. Joint Conf. on Biometrics (IJCB'17) ident: e_1_2_1_94_1 – ident: e_1_2_1_270_1 doi: 10.1080/02687030050174638 – volume-title: 15th Workshop on Statistical Signal Processing (SSP'09) ident: e_1_2_1_277_1 – ident: e_1_2_1_149_1 doi: 10.1109/TCYB.2014.2375959 – volume: 9 start-page: 113 year: 2005 ident: e_1_2_1_258_1 article-title: A behavioural biometrics publication-title: Public Service Review: European Union – volume-title: Int. Conf. on Biometrics. IEEE, 1--7. ident: e_1_2_1_76_1 – ident: e_1_2_1_73_1 doi: 10.1109/TPAMI.2014.2343981 – ident: e_1_2_1_142_1 doi: 10.1016/j.patrec.2012.10.011 – volume: 1 start-page: 113 year: 2013 ident: e_1_2_1_185_1 article-title: Dysgraphia in relation to cognitive performance in patients with Alzheimer’s disease publication-title: Journal of Intellectual Disability-Diagnosis and Treatment doi: 10.6000/2292-2598.2013.01.02.4 – ident: e_1_2_1_269_1 doi: 10.1016/j.jpsychires.2008.01.006 – ident: e_1_2_1_11_1 – ident: e_1_2_1_253_1 doi: 10.1109/JPROC.2004.827372 – ident: e_1_2_1_147_1 doi: 10.4103/2349-5014.170619 – ident: e_1_2_1_213_1 doi: 10.3389/fpsyg.2013.00945 – ident: e_1_2_1_250_1 doi: 10.1109/ACCESS.2015.2431493 – ident: e_1_2_1_115_1 doi: 10.1109/IJCB.2011.6117487 – ident: e_1_2_1_217_1 doi: 10.1007/978-0-85729-859-1_30 – ident: e_1_2_1_264_1 doi: 10.1080/13554794.2013.860178 – volume-title: 14th IAPR Int. Conf. on Document Analysis and Recognition (ICDAR’17) ident: e_1_2_1_145_1 – ident: e_1_2_1_176_1 doi: 10.1049/iet-bmt.2016.0115 |
SSID | ssj0002416 |
Score | 2.6374207 |
SecondaryResourceType | review_article |
Snippet | Handwritten signatures are biometric traits at the center of debate in the scientific community. Over the last 40 years, the interest in signature studies has... |
SourceID | proquest crossref acm |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 1 |
SubjectTerms | Access control Applied computing Authentication Biometrics Computer forensics Computer science Data structures design and analysis Design and analysis of algorithms Document analysis Document capture Document management and text processing Document types Domains General and reference Handwriting Pattern matching Security and privacy Security services Signature analysis Signatures Surveys and overviews System forensics Theory of computation |
SubjectTermsDisplay | Applied computing -- Computer forensics -- System forensics Applied computing -- Document management and text processing -- Document capture -- Document analysis General and reference -- Document types -- Surveys and overviews Security and privacy -- Security services -- Access control Security and privacy -- Security services -- Authentication -- Biometrics Theory of computation -- Design and analysis of algorithms -- Data structures design and analysis -- Pattern matching |
Title | A Perspective Analysis of Handwritten Signature Technology |
URI | https://dl.acm.org/doi/10.1145/3274658 https://www.proquest.com/docview/2241328406 |
Volume | 51 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3JbtswECWyXHJJ2iyI27TgIejFkCNZ1JabkQVuUeXiBPBNoEgqFRBbhW0lQL8-w03yEqBNL4JBiBTMGc28Gc08InQecw6wG6ITcAfEIYxxJ2dJ4YSx9M4uc12hqi3uwuED-TEOxm0pr-ouWeQ99ufNvpL_kSqMgVxll-w7JNssCgPwG-QLV5AwXP9JxgNVwG56JVf4RYZ0yl8g7gdE3B2Vj5q-cz2Pbslnr1JVWV6rCuh5PXsG6TYAt6QqxZxW5XypV0TMzDHYaflYC5Byr9ExwOG8eq40OocHV23S-6lUtjetf9HJhPLu98nMKKfJO3iJ5Tss2n4r1wEToYeEMZ9B5ES-prKy9tUQypYbxtJb8rqa0WjTnhNJfeFD6BxqhvdVxuw1T9bUF-pu6yAzE7fRbh-iCDCDu4Pr9OeocdUAX8zHbP1XdFe1nHphpkrQwiaroGXVZysgcv8B7ZsIAg-0OnxEW2J6iA7s6RzYGOsjdDnAS9qBrXbgqsBL2oEb7cCtdhyjh9ub-6uhY07KcKgfeQsnJIIJxkMCcFsESeAnnAqf-CLmURQkOZfZB6_vCVHkEZOvUBHwhEdBnlM_dql_gnam1VScIhxTzkQ_TxgnEPvL7AEXADJJ7MEzPJZ00CFsSPZbc6HYHe6gb3aDMmbI5eUZJ0_Zmig6CDc32jU2bjmzO5yZl22eqe-_AKXc8NPfV_iM9lqNPUM7i1ktvgB2XORfjQa8AkS4bMk |
linkProvider | EBSCOhost |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Perspective+Analysis+of+Handwritten+Signature+Technology&rft.jtitle=ACM+computing+surveys&rft.au=Diaz%2C+Moises&rft.au=Ferrer%2C+Miguel+A.&rft.au=Impedovo%2C+Donato&rft.au=Malik%2C+Muhammad+Imran&rft.date=2019-11-30&rft.issn=0360-0300&rft.eissn=1557-7341&rft.volume=51&rft.issue=6&rft.spage=1&rft.epage=39&rft_id=info:doi/10.1145%2F3274658&rft.externalDBID=n%2Fa&rft.externalDocID=10_1145_3274658 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0360-0300&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0360-0300&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0360-0300&client=summon |