A Perspective Analysis of Handwritten Signature Technology

Handwritten signatures are biometric traits at the center of debate in the scientific community. Over the last 40 years, the interest in signature studies has grown steadily, having as its main reference the application of automatic signature verification, as previously published reviews in 1989, 20...

Full description

Saved in:
Bibliographic Details
Published inACM computing surveys Vol. 51; no. 6; pp. 1 - 39
Main Authors Diaz, Moises, Ferrer, Miguel A., Impedovo, Donato, Malik, Muhammad Imran, Pirlo, Giuseppe, Plamondon, Réjean
Format Journal Article
LanguageEnglish
Published New York, NY, USA ACM 30.11.2019
Association for Computing Machinery
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Handwritten signatures are biometric traits at the center of debate in the scientific community. Over the last 40 years, the interest in signature studies has grown steadily, having as its main reference the application of automatic signature verification, as previously published reviews in 1989, 2000, and 2008 bear witness. Ever since, and over the last 10 years, the application of handwritten signature technology has strongly evolved and much research has focused on the possibility of applying systems based on handwritten signature analysis and processing to a multitude of new fields. After several years of haphazard growth of this research area, it is time to assess its current developments for their applicability in order to draw a structured way forward. This perspective reports a systematic review of the last 10 years of the literature on handwritten signatures with respect to the new scenario, focusing on the most promising domains of research and trying to elicit possible future research directions in this subject.
AbstractList Handwritten signatures are biometric traits at the center of debate in the scientific community. Over the last 40 years, the interest in signature studies has grown steadily, having as its main reference the application of automatic signature verification, as previously published reviews in 1989, 2000, and 2008 bear witness. Ever since, and over the last 10 years, the application of handwritten signature technology has strongly evolved and much research has focused on the possibility of applying systems based on handwritten signature analysis and processing to a multitude of new fields. After several years of haphazard growth of this research area, it is time to assess its current developments for their applicability in order to draw a structured way forward. This perspective reports a systematic review of the last 10 years of the literature on handwritten signatures with respect to the new scenario, focusing on the most promising domains of research and trying to elicit possible future research directions in this subject.
ArticleNumber 117
Author Ferrer, Miguel A.
Impedovo, Donato
Malik, Muhammad Imran
Plamondon, Réjean
Diaz, Moises
Pirlo, Giuseppe
Author_xml – sequence: 1
  givenname: Moises
  orcidid: 0000-0003-3878-3867
  surname: Diaz
  fullname: Diaz, Moises
  email: moises.diaz@atlanticomedio.es
  organization: Universidad del Atlantico Medio, Las Palmas de Gran Canaria, Spain
– sequence: 2
  givenname: Miguel A.
  surname: Ferrer
  fullname: Ferrer, Miguel A.
  email: miguelangel.ferrer@ulpgc.es
  organization: Universidad de Las Palmas de Gran Canaria, Spain
– sequence: 3
  givenname: Donato
  surname: Impedovo
  fullname: Impedovo, Donato
  email: donato.impedovo@uniba.it
  organization: University of Bari, Bari, Italy
– sequence: 4
  givenname: Muhammad Imran
  surname: Malik
  fullname: Malik, Muhammad Imran
  email: malik.imran@seecs.edu.pk
  organization: National University of Sciences and Technology, Islamabad, Pakistan
– sequence: 5
  givenname: Giuseppe
  surname: Pirlo
  fullname: Pirlo, Giuseppe
  email: giuseppe.pirlo@uniba.it
  organization: University of Bari, Bari, Italy
– sequence: 6
  givenname: Réjean
  surname: Plamondon
  fullname: Plamondon, Réjean
  email: rejean.plamondon@polymtl.ca
  organization: École Polytechnique of Montréal, Canada
BookMark eNpt0MFLwzAUBvAgE9ymePdU8OCp-tIkTettDHXCQMF5Lmn6OjO6ZCaZsv_eyqYH8fQO78fH996IDKyzSMg5hWtKubhhmeS5KI7IkAohU8k4HZAhsBxSYAAnZBTCCgAyTvMhuZ0kz-jDBnU0H5hMrOp2wYTEtclM2ebTmxjRJi9maVXcekwWqN-s69xyd0qOW9UFPDvMMXm9v1tMZ-n86eFxOpmnikka05yjRt3kXECBohSsbBQyzrBopBRl3fRVJM0oYltLnQHwVjRlI0VdK1aAYmNyuc_dePe-xRCrldv6vmiosv4IlhUc8l5d7ZX2LgSPbbXxZq38rqJQfT-mOjyml-kfqU1U0TgbvTLdP_5i75Ve_4b-LL8AFtlsvg
CitedBy_id crossref_primary_10_1016_j_bspc_2023_105040
crossref_primary_10_1016_j_neucom_2020_05_072
crossref_primary_10_1109_TMC_2019_2911506
crossref_primary_10_51252_rcsi_v4i2_642
crossref_primary_10_1109_TIFS_2020_3033442
crossref_primary_10_1016_j_eswa_2022_119111
crossref_primary_10_1007_s12559_023_10205_9
crossref_primary_10_1049_bme2_12007
crossref_primary_10_1049_iet_bmt_2018_5259
crossref_primary_10_35784_iapgos_2718
crossref_primary_10_1016_j_fsidi_2021_301216
crossref_primary_10_1049_iet_bmt_2020_0032
crossref_primary_10_1088_2631_8695_ada86d
crossref_primary_10_1109_ACCESS_2020_3033848
crossref_primary_10_3390_app13148022
crossref_primary_10_1109_TIFS_2019_2924195
crossref_primary_10_1007_s12559_021_09938_2
crossref_primary_10_1016_j_engappai_2024_109640
crossref_primary_10_1016_j_patcog_2025_111581
crossref_primary_10_1109_TBIOM_2021_3054533
crossref_primary_10_1016_j_eswa_2024_125470
crossref_primary_10_1016_j_patrec_2021_06_033
crossref_primary_10_1109_ACCESS_2021_3071228
crossref_primary_10_3389_frobt_2023_1112986
crossref_primary_10_1088_1742_6596_2031_1_012042
crossref_primary_10_3390_app10113716
crossref_primary_10_1016_j_engappai_2023_106378
crossref_primary_10_1007_s11042_022_12499_7
crossref_primary_10_1016_j_cosrev_2022_100515
crossref_primary_10_1109_ACCESS_2024_3355449
crossref_primary_10_1111_1556_4029_15386
crossref_primary_10_1016_j_eswa_2021_116136
crossref_primary_10_3390_electronics10040456
crossref_primary_10_1016_j_patcog_2021_108008
crossref_primary_10_1109_ACCESS_2019_2923093
crossref_primary_10_1007_s12652_021_03356_w
crossref_primary_10_1016_j_patcog_2020_107699
crossref_primary_10_1080_20961790_2021_1923167
crossref_primary_10_3390_jimaging9040079
crossref_primary_10_1016_j_patrec_2023_02_002
crossref_primary_10_1016_j_patcog_2023_109816
crossref_primary_10_1007_s00521_023_09192_7
crossref_primary_10_1007_s10032_019_00331_2
crossref_primary_10_1007_s12652_020_02872_5
crossref_primary_10_1016_j_patcog_2023_109882
crossref_primary_10_1016_j_eswa_2021_115649
crossref_primary_10_1109_TPAMI_2025_3529022
crossref_primary_10_37661_1816_0301_2022_19_3_62_73
crossref_primary_10_32890_jict2020_19_4_6
crossref_primary_10_1109_TIFS_2020_2991833
crossref_primary_10_3233_JIFS_231369
crossref_primary_10_36548_jaicn_2022_3_007
crossref_primary_10_1016_j_patcog_2023_109681
crossref_primary_10_1016_j_image_2021_116139
crossref_primary_10_1016_j_patcog_2020_107227
crossref_primary_10_1016_j_patcog_2021_108513
crossref_primary_10_1016_j_fsir_2023_100340
crossref_primary_10_1016_j_knosys_2023_110365
crossref_primary_10_1109_ACCESS_2021_3053499
crossref_primary_10_1109_TIFS_2022_3180219
crossref_primary_10_1142_S0218001420530018
crossref_primary_10_4103_jfsm_jfsm_115_23
crossref_primary_10_1007_s11042_023_14638_0
crossref_primary_10_1007_s44395_025_00004_6
crossref_primary_10_1109_ACCESS_2024_3412433
crossref_primary_10_3233_IDT_220247
crossref_primary_10_1007_s10032_023_00455_6
crossref_primary_10_1007_s11042_024_20454_x
crossref_primary_10_1109_TPAMI_2021_3087619
crossref_primary_10_1016_j_neucom_2022_08_017
crossref_primary_10_1016_j_patcog_2025_111357
crossref_primary_10_1016_j_neucom_2019_09_041
crossref_primary_10_18287_2412_6179_CO_567
crossref_primary_10_1007_s11042_023_15357_2
crossref_primary_10_1016_j_eswa_2020_114405
crossref_primary_10_3390_s20030933
crossref_primary_10_1109_ACCESS_2022_3167413
crossref_primary_10_1145_3488544
crossref_primary_10_1016_j_eswa_2021_114588
crossref_primary_10_1109_TIFS_2023_3333681
crossref_primary_10_1002_aisy_202300439
crossref_primary_10_1016_j_bspc_2022_103697
crossref_primary_10_1111_1556_4029_15686
crossref_primary_10_1145_3711714
crossref_primary_10_1016_j_patcog_2021_108426
crossref_primary_10_1007_s10032_020_00351_3
crossref_primary_10_1007_s12559_020_09755_z
crossref_primary_10_1007_s42486_024_00170_z
crossref_primary_10_1145_3605945
crossref_primary_10_1016_j_patrec_2019_06_024
crossref_primary_10_1587_transinf_2020EDP7099
crossref_primary_10_1016_j_patcog_2022_108609
crossref_primary_10_1109_ACCESS_2021_3071479
crossref_primary_10_1007_s11042_022_13159_6
Cites_doi 10.1109/TIFS.2017.2707332
10.1142/S146902681340004X
10.1016/j.patcog.2015.03.019
10.1007/s10032-012-0193-9
10.1109/TIFS.2011.2168213
10.1109/ICDAR.2011.294
10.1007/s00415-013-6996-x
10.1016/j.patcog.2018.04.012
10.1007/s40520-016-0549-y
10.1109/TPAMI.2008.264
10.1007/s11910-013-0369-9
10.1016/j.patcog.2013.06.026
10.1109/TCYB.2017.2647826
10.1016/j.humov.2009.01.005
10.1109/ICDAR.2009.261
10.1371/journal.pone.0069897
10.1097/JCP.0000000000000277
10.1109/FSKD.2009.597
10.31974/jfde24-21-35
10.1109/AICCSA.2008.4493644
10.1049/iet-bmt.2015.0017
10.1109/TCYB.2017.2751740
10.1016/j.patcog.2010.07.028
10.1109/ACPR.2013.164
10.1109/RBME.2018.2840679
10.1109/LSP.2009.2038111
10.1016/j.inffus.2016.02.003
10.1109/TIFS.2016.2632063
10.1109/CCST.2011.6095930
10.13089/JKIISC.2016.26.5.1161
10.1016/j.cose.2017.01.008
10.1016/j.humov.2009.10.006
10.1016/j.patrec.2011.10.009
10.1007/978-3-642-41190-8_13
10.1016/j.rasd.2015.11.004
10.1007/s10032-011-0180-6
10.1109/TPAMI.2008.68
10.1109/TSMCB.2009.2034382
10.1111/j.1556-4029.2010.01584.x
10.1109/ICFHR.2012.192
10.1109/THMS.2015.2443050
10.1109/ICFHR.2012.211
10.1049/iet-bmt.2013.0012
10.1371/journal.pone.0151691
10.1109/TIM.2009.2037871
10.1016/j.patcog.2013.05.004
10.1016/j.psychres.2009.07.005
10.1016/j.patcog.2011.10.011
10.1049/ip-vis:20031078
10.1109/ICDAR.2015.7333838
10.1109/ICDAR.2013.83
10.1049/iet-bmt.2016.0010
10.1109/ACPR.2013.46
10.1016/j.humov.2010.07.010
10.1109/TIFS.2014.2316472
10.1109/TPAMI.2008.302
10.1049/iet-bmt.2013.0016
10.1109/TIFS.2012.2190281
10.1016/j.patrec.2016.07.015
10.1109/TSMCC.2008.923866
10.1016/j.imavis.2017.08.004
10.1007/978-3-642-28744-2_74
10.1109/TCYB.2016.2630419
10.1109/ICFHR.2010.102
10.1016/S0031-3203(99)00047-3
10.1109/ICDAR.2009.123
10.1142/9789814579636_0009
10.1049/iet-bmt.2013.0024
10.1049/iet-bmt.2012.0048
10.1109/ICCEE.2008.157
10.1155/2014/324645
10.1109/ICDAR.2013.196
10.1109/ICDAR.2015.7333874
10.1109/34.824821
10.1109/CCST.2011.6095931
10.1109/BTAS.2017.8272676
10.1016/j.ins.2013.09.004
10.1049/iet-bmt.2013.0044
10.1049/iet-bmt.2013.0081
10.1109/TSMCB.2008.918575
10.1016/j.patcog.2011.04.010
10.1109/THMS.2016.2634922
10.1016/j.patcog.2016.01.009
10.3389/fnagi.2014.00150
10.1007/s10044-008-0118-x
10.1109/TSMCB.2012.2188508
10.1016/j.bandl.2006.12.002
10.4304/jmm.4.3.137-144
10.1109/ICFHR.2010.117
10.1016/j.eswa.2017.03.024
10.1109/TPAMI.2009.76
10.1007/s11265-011-0576-z
10.1109/ICDAR.2009.38
10.1007/978-3-642-41190-8_14
10.1007/s10044-009-0151-4
10.1109/ICPR.2010.933
10.1109/DAS.2012.10
10.1109/ICNP.2014.43
10.1049/iet-bmt.2016.0103
10.1371/journal.pone.0123254
10.1109/TPAMI.2008.32
10.1016/j.patcog.2011.12.007
10.1007/978-3-642-41190-8_15
10.1109/DICTA.2011.119
10.1016/j.eswa.2009.10.023
10.1007/978-3-319-61657-5
10.1007/s12559-011-9119-y
10.1049/iet-bmt.2015.0058
10.1109/HICSS.2016.683
10.1016/0031-3203(89)90059-9
10.1016/j.patrec.2016.06.016
10.1109/ICDAR.2015.7333948
10.1155/2018/3127042
10.1109/TPAMI.2016.2582167
10.1109/ICFHR.2012.254
10.1109/TIFS.2016.2521611
10.1109/ICFHR.2012.217
10.1109/ICFHR.2010.116
10.1016/j.humov.2012.07.005
10.1145/2501988.2502021
10.1186/1687-417X-2011-3
10.1016/j.patcog.2009.05.009
10.1016/j.patcog.2017.09.011
10.1016/j.patcog.2017.05.012
10.1371/journal.pone.0097614
10.1016/j.patcog.2014.07.016
10.1109/TPAMI.2016.2560810
10.1016/j.humov.2010.08.008
10.1504/IJBM.2010.030415
10.1049/iet-bmt.2013.0022
10.1109/ICFHR.2010.70
10.1002/mds.25894
10.1016/j.eswa.2013.12.047
10.1109/TIE.2009.2038339
10.1109/ICIG.2011.57
10.1142/9789814579636_0001
10.1123/mcj.14.1.1
10.1093/lpr/mgs019
10.1201/9781420048773
10.1145/1815330.1815390
10.1109/TSMCA.2010.2041653
10.1109/ICDAR.2013.220
10.3745/JIPS.02.0007
10.1016/j.patcog.2011.08.008
10.1016/j.eswa.2018.04.035
10.1016/j.engappai.2005.12.006
10.1016/j.patcog.2014.02.012
10.1109/THMS.2013.2279008
10.1016/j.humov.2014.07.006
10.1007/s10623-005-6343-z
10.1049/iet-bmt.2013.0025
10.1109/ACCESS.2018.2793966
10.1016/j.patcog.2008.10.017
10.1109/21.229453
10.1007/978-0-387-71041-9_10
10.1109/ICDAR.2009.216
10.1016/j.patcog.2011.12.011
10.1142/S0218001404003630
10.1109/TIFS.2012.2225048
10.1016/j.patrec.2016.05.023
10.1109/ICDAR.2015.7333760
10.1016/j.compeleceng.2016.11.010
10.1016/j.sna.2009.12.031
10.1371/journal.pone.0176792
10.1080/02687030050174638
10.1109/TCYB.2014.2375959
10.1109/TPAMI.2014.2343981
10.1016/j.patrec.2012.10.011
10.6000/2292-2598.2013.01.02.4
10.1016/j.jpsychires.2008.01.006
10.1109/JPROC.2004.827372
10.4103/2349-5014.170619
10.3389/fpsyg.2013.00945
10.1109/ACCESS.2015.2431493
10.1109/IJCB.2011.6117487
10.1007/978-0-85729-859-1_30
10.1080/13554794.2013.860178
10.1049/iet-bmt.2016.0115
ContentType Journal Article
Copyright ACM
Copyright Association for Computing Machinery Feb 2019
Copyright_xml – notice: ACM
– notice: Copyright Association for Computing Machinery Feb 2019
DBID AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1145/3274658
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList Computer and Information Systems Abstracts

CrossRef
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1557-7341
EndPage 39
ExternalDocumentID 10_1145_3274658
3274658
GrantInformation_xml – fundername: MIMECO
  grantid: TEC2016- 77791-C4-1-R
– fundername: NSERC-Canada Grant
  grantid: RGPIN-2015-06409
GroupedDBID --Z
-DZ
-~X
.4S
.DC
23M
4.4
5GY
5VS
6J9
85S
8US
8VB
AAIKC
AAKMM
AALFJ
AAMNW
AAYFX
ABPPZ
ACGFO
ACGOD
ACM
ACNCT
ADBCU
ADL
ADMLS
ADPZR
AEBYY
AEGXH
AEMOZ
AENEX
AENSD
AFWIH
AFWXC
AGHSJ
AHQJS
AIAGR
AIKLT
AKVCP
ALMA_UNASSIGNED_HOLDINGS
ARCSS
ASPBG
AVWKF
BDXCO
CCLIF
CS3
EBE
EBR
EBS
EBU
EDO
EJD
EMK
FEDTE
GUFHI
HGAVV
H~9
IAO
ICD
IEA
IGS
IOF
K1G
LHSKQ
N95
P1C
P2P
PQQKQ
QWB
RNS
ROL
RXW
TAE
TH9
U5U
UKR
UPT
VQA
W7O
WH7
X6Y
XH6
XSW
XZL
YXB
Z5M
ZCA
ZL0
AAYXX
ADXHL
AEFXT
AEJOY
AETEA
AKRVB
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-a371t-64ececd64508e59539dae343e8d7759bd0027121eefb7c2004f5d9d75bba380a3
ISSN 0360-0300
IngestDate Mon Jun 30 08:27:40 EDT 2025
Thu Jul 03 08:28:31 EDT 2025
Thu Apr 24 22:54:44 EDT 2025
Fri Feb 21 04:13:21 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 6
Keywords surveys
biometrics
automatic signature verification
Offline and online handwritten signature
Language English
License Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Permissions@acm.org
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-a371t-64ececd64508e59539dae343e8d7759bd0027121eefb7c2004f5d9d75bba380a3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0003-3878-3867
OpenAccessLink https://dl.acm.org/doi/10.1145/3274658
PQID 2241328406
PQPubID 47570
PageCount 39
ParticipantIDs proquest_journals_2241328406
crossref_primary_10_1145_3274658
crossref_citationtrail_10_1145_3274658
acm_primary_3274658
PublicationCentury 2000
PublicationDate 2019-11-30
PublicationDateYYYYMMDD 2019-11-30
PublicationDate_xml – month: 11
  year: 2019
  text: 2019-11-30
  day: 30
PublicationDecade 2010
PublicationPlace New York, NY, USA
PublicationPlace_xml – name: New York, NY, USA
– name: Baltimore
PublicationTitle ACM computing surveys
PublicationTitleAbbrev ACM CSUR
PublicationYear 2019
Publisher ACM
Association for Computing Machinery
Publisher_xml – name: ACM
– name: Association for Computing Machinery
References Y. Meng, D. S. Wong, R. Schlegel, and L. Kwok. 2012. Touch gestures based biometric authentication scheme for touchscreen mobile phones. In Int. Conf. on Information Security and Cryptology. Springer, 331--350.
J. Ji, C. B. Chen, and X. Chen. 2010. Off-line Chinese signature verification: Using weighting factor on similarity computation. In 2nd Int. Conf. on E-Business and Information System Security. 1--4.
M. Djioua and R. Plamondon. 2009. Studying the variability of handwriting patterns using the kinematic theory. Human Movement Science 28, 5 (2009), 588--601.
N. Li, J. Liu, Q. Li, X. Luo, and J. Duan. 2016. Online signature verification based on biometric features. In 49th Hawaii Int. Conf. on System Sciences (HICSS’16). 5527--5534. 10.1109/HICSS.2016.683
M. C. Fairhurst, E. Kaplani, and R. M. Guest. 2001. Complexity measures in handwritten signature verification. In Proc. 1st Intl. Conf. on Universal Access in Human-Computer Interaction.
D. S. Guru, K. S. Manjunatha, S. Manjunath, and M. T. Somashekara. 2017. Interval valued symbolic representation of writer dependent features for online signature verification. Expert Systems with Applications 80 (2017), 232--243. 10.1016/j.eswa.2017.03.024
W. Ohyama, Y. Ogi, T. Wakabayashi, and F. Kimura. 2015. Multilingual signature-verification by generalized combined segmentation verification. In 13th Int. Conference on Document Analysis and Recognition (ICDAR'15). 811--815. 10.1109/ICDAR.2015.7333874
E. Onofri, M. Mercuri, M. Salesi, S. Ferrara, G. M. Troili, C. Simeone, M. R. Ricciardi, S. Ricci, and T. Archer. 2013. Dysgraphia in relation to cognitive performance in patients with Alzheimer’s disease. Journal of Intellectual Disability-Diagnosis and Treatment 1, 2 (2013), 113--124.
I. A. B. Abdelghani and N. E. B. Amara. 2013. SID signature database: A Tunisian off-line handwritten signature database. In Int. Conf. on Image Analysis and Processing. Springer, 131--139. 10.1007/978-3-642-41190-8_15
A. M. Huber, and R. A. Headrick. 1999. Handwriting Identification: Facts and Fundamentals. Boca Raton, CRC Press.
M. A Ferrer, M. Diaz-Cabrera, and A. Morales. 2013. Synthetic off-line signature image generation. In Int. Conf. on Biometrics. IEEE, 1--7.
R. Tolosana, R. Vera-Rodriguez, J. Fierrez, and J. Ortega-Garcia. 2018. Exploring recurrent neural networks for on-line handwritten signature biometrics. IEEE Access (2018), 5128--5138.
M. Martinez-Diaz, J. Fierrez, R. P. Krish, and J. Galbally. 2014. Mobile signature verification: Feature robustness and performance comparison. IET Biometrics 3, 4 (2014), 267--277.
M. Song and Z. Sun. 2014. An immune clonal selection algorithm for synthetic signature generation. Mathematical Problems in Engineering 2014 (2014), 1--12.
K. Cpałka, M. Zalasiński, and L. Rutkowski. 2014. New method for the on-line signature verification based on horizontal partitioning. Pattern Recognition 47, 8 (2014), 2652--2661.
D.-Y. Yeung, H. Chang, Y. Xiong, S. George, R. Kashi, T. Matsumoto, and G. Rigoll. 2004. SVC2004: First International signature verification competition. In Biometric Authentication. LNCS, Vol. 3072. Springer, 16--22.
A. Dutta, U. Pal, and J. Lladós. 2016. Compact correlated features for writer independent signature verification. In 23rd Int. Conf. on Pattern Recognition (ICPR'16). IEEE, 3422--3427.
A. Mendaza-Ormaza, O. M. Hurtado, R. Sánchez-Reillo, and J. Uriarte. 2010. Analysis on the resolution of the different signals in an on-line handwritten signature verification system applied to portable devices. In IEEE Int. Carnahan Conf. on Security Technology (ICCST’10). 341--350.
J. F. Vargas, M. A. Ferrer, C. M. Travieso, and J. B. Alonso. 2011. Off-line signature verification based on grey level information using texture features. Pattern Recognition 44, 2 (2011), 375--385. 10.1016/j.patcog.2010.07.028
M. Schulte-Austum. 2013. D-Scribe. In Presentation at Measurement Science and Standards in Forensic Handwriting Analysis Conf.
M. B. Yılmaz and B. Yanıkoğlu. 2016. Score level fusion of classifiers in off-line signature verification. Information Fusion 32 (2016), 109--119. 10.1016/j.inffus.2016.02.003
L. C. Alewijnse, C. E. van den Heuvel, R. D. Stoel, and K. Franke. 2009. Analysis of signature complexity. In Proceedings of the 14th Biennial Conf. of the Int. Graphonomics Society: Advances in Graphonomics. 6--9.
Y. Liu, Z. Yang, and L. Yang. 2015. Online signature verification based on DCT and sparse representation. IEEE Transactions on Cybernetics 45, 11 (2015), 2498--2511.
M. I. Malik, S. Ahmed, M. Liwicki, and A. Dengel. 2013. Freak for real time forensic signature verification. In 12th Int. Conf. on Document Analysis and Recognition (ICDAR'13). IEEE, 971--975. 10.1109/ICDAR.2013.196
T. Ito, W. Ohyama, T. Wakabayashi, and F. Kimura. 2012. Combination of signature verification techniques by SVM. In 13th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'12). IEEE, 430--433. 10.1109/ICFHR.2012.192
M. Gomez-Barrero, J. Galbally, J. Fierrez, J. Ortega-Garcia, and R. Plamondon. 2015. Enhanced on-line signature verification based on skilled forgery detection using sigma-lognormal features. In Conf. on Biometrics (ICB’15). 501--506.
D. Falahati, M. S. Helforoush, H. Danyali, and M. Rashidpour. 2011. Static signature verification for Farsi and Arabic signatures using dynamic time warping. In 19th Iranian Conf. on Electrical Engineering (ICEE’11). 1--6.
T. Steinherz, D. Doermann, E. Rivlin, and N. Intrator. 2009. Offline loop investigation for handwriting analysis. IEEE Transactions on Pattern Analysis and Machine Intelligence 31, 2 (2009), 193--209. 10.1109/TPAMI.2008.68
A. Carina-Fernandes and J. M. Lopes-Lima. 2017. Alzheimer’s disease and handwriting. what do we know so far? In 18th Biennial Conf. of the Int. Graphonomics Society. 131--134.
J. Danna, V. Paz-Villagrán, C. Gondre, M. Aramaki, R. Kronland-Martinet, S. Ystad, and J.-L. Velay. 2013. Handwriting sonification for the diagnosis of dysgraphia. In Recent Progress in Graphonomics: Learn from the Past--Proceedings of the 16th Conf. of the Int. Graphonomics Society. 123--126.
D. Rivard, E. Granger, and R. Sabourin. 2013. Multi-feature extraction and selection in writer-independent off-line signature verification. International Journal on Document Analysis and Recognition 16 (2013), 83--103. 10.1007/s10032-011-0180-6
A. Lanitis. 2009. A survey of the effects of aging on biometric identity verification. International Journal of Biometrics 2, 1 (2009), 34--52. 10.1504/IJBM.2010.030415
E. Maiorana, P. Campisi, J. Fierrez, J. Ortega-Garcia, and A. Neri. 2010. Cancelable templates for sequence-based biometrics with application to on-line signature recognition. IEEE Transactions on Systems, Man, and Cybernetics Part A: Systems and Humans 40, 3 (2010), 525--538. 10.1109/TSMCA.2010.2041653
Y. Kamihira, W. Ohyama, T. Wakabayashi, and F. Kimura. 2013. Improvement of Japanese signature verification by combined segmentation verification approach. In 2nd IAPR Asian Conf. on Pattern Recognition. 501--505. 10.1109/ACPR.2013.46
O. Sinanović and Z. Mrkonjić. 2013. Post-stroke writing and reading disorders. Sanamed 8, 1 (2013), 55--63.
S. Zhang and F. Li. 2012. Off-line handwritten Chinese signature verification based on support vector machine multiple classifiers. In Advances in Electric and Electronics. Springer, 563--568.
E. N. Zois, L. Alewijnse, and G. Economou. 2016. Offline signature verification and quality characterization using Poset-oriented grid features. Pattern Recognition 54 (2016), 162--177. 10.1016/j.patcog.2016.01.009
M. T. Ibrahim, M. Kyan, M. A. Khan, and L. Guan. 2010. On-line signature verification using 1-D velocity-based directional analysis. In 20th International Conference on Pattern Recognition (ICPR'10). 3830--3833. 10.1109/ICPR.2010.933
G. Pirlo, D. Impedovo, R. Plamondon, C. O'Reilly, A. Cozzolongo, R. Gravinese, and A. Rollo. 2013. Stability of dynamic signatures: From the representation to the generation domain. In New Trends in Image Analysis and Processing. Lecture Notes in Computer Science, Vol. 8158. Springer, 122--130. 10.1007/978-3-642-41190-8_14
K. S. Manjunatha, S. Manjunath, D. S. Guru, and M. T. Somashekara. 2016. Online signature verification based on writer dependent features and classifiers. Pattern Recognition Letters 80 (2016), 129--136. 10.1016/j.patrec.2016.06.016
T. A. Duda, J. E. Casey, and N. McNevin. 2014. Variability of kinematic graphomotor fluency in adults with ADHD. Human Movement Science 38 (2014), 331--342.
J. H. Yan, S. Rountree, P. Massman, R. S. Doody, and H. Li. 2008. Alzheimer’s disease and mild cognitive impairment deteriorate fine movement control. Journal of Psychiatric Research 42, 14 (2008), 1203--1212.
F. Alonso-Fernandez, J. Fierrez, A. Gilperez, J. Galbally, and J. Ortega-Garcia. 2009. Robustness of signature verification systems to imitators with increasing skills. In 10th Int. Conf. on Document Analysis and Recognition. IEEE, 728--732. 10.1109/ICDAR.2009.261
G. S. Eskander, R. Sabourin, and E. Granger. 2011. Signature based fuzzy vaults with boosted feature selection. In Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM’11). IEEE, 131--138.
D. Impedovo, G. Pirlo, and R. Plamondon. 2012. Handwritten signature verification: New advancements and open issues. In Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'12). 367--372. 10.1109/ICFHR.2012.211
J. J. Brault and R. Plamondon. 1993. A complexity measure of handwritten curves: Modeling of dynamic signature forgery. IEEE Transactions on Systems, Man, and Cybernetics 23, 2 (1993), 400--413.
A. Woch and R. Plamondon. 2010. Characterization of bi-directional movement primitives and their agonist-antagonist synergy with the delta-lognormal model. Motor Control 14, 1 (2010), 1--25.
M. Parodi, J. C. Gómez, M. Liwicki, and L. Alewijnse. 2013. Orthogonal function representation for online signature verification: Which features should be looked at? IET Biometrics 2, 4 (2013), 137--150.
R. P
Ureche O. (e_1_2_1_254_1)
Vargas F. (e_1_2_1_256_1); 2
Fairhurst M. C. (e_1_2_1_69_1)
e_1_2_1_262_1
Fierrez-Aguilar J. (e_1_2_1_81_1)
Fairhurst M. (e_1_2_1_68_1)
e_1_2_1_115_1
e_1_2_1_138_1
e_1_2_1_187_1
e_1_2_1_213_1
e_1_2_1_24_1
e_1_2_1_141_1
e_1_2_1_236_1
Chassang G. (e_1_2_1_36_1) 2017
Dutta A. (e_1_2_1_61_1)
Onofri E. (e_1_2_1_185_1) 2013; 1
e_1_2_1_250_1
e_1_2_1_273_1
e_1_2_1_103_1
e_1_2_1_126_1
e_1_2_1_149_1
Sinanović O. (e_1_2_1_237_1) 2013; 8
e_1_2_1_175_1
e_1_2_1_12_1
e_1_2_1_73_1
e_1_2_1_96_1
e_1_2_1_201_1
e_1_2_1_152_1
Caligiuri M. P. (e_1_2_1_32_1)
e_1_2_1_190_1
Pal S. (e_1_2_1_197_1)
Ji J. (e_1_2_1_130_1)
e_1_2_1_224_1
e_1_2_1_58_1
Song M. (e_1_2_1_242_1) 2014; 2014
e_1_2_1_209_1
e_1_2_1_247_1
Yahyatabar M. E. (e_1_2_1_267_1)
e_1_2_1_261_1
Costa F. (e_1_2_1_38_1)
Edwards H. (e_1_2_1_62_1) 2009
e_1_2_1_114_1
Rantzsch H. (e_1_2_1_220_1)
Tolosana R. (e_1_2_1_249_1)
Alewijnse L. C. (e_1_2_1_8_1)
e_1_2_1_137_1
e_1_2_1_40_1
e_1_2_1_186_1
e_1_2_1_212_1
e_1_2_1_63_1
e_1_2_1_86_1
e_1_2_1_140_1
e_1_2_1_48_1
e_1_2_1_235_1
Pal S. (e_1_2_1_196_1)
Tseng L. Y. (e_1_2_1_252_1); 3
Carina-Fernandes A. (e_1_2_1_35_1)
e_1_2_1_272_1
e_1_2_1_125_1
Khalajzadeh H. (e_1_2_1_139_1) 2012; 1
e_1_2_1_148_1
e_1_2_1_7_1
Matsuda K. (e_1_2_1_169_1)
Gomez-Barrero M. (e_1_2_1_100_1)
e_1_2_1_200_1
e_1_2_1_74_1
Ji J. (e_1_2_1_129_1)
e_1_2_1_151_1
e_1_2_1_223_1
e_1_2_1_246_1
e_1_2_1_59_1
e_1_2_1_208_1
e_1_2_1_269_1
e_1_2_1_264_1
e_1_2_1_241_1
Hurtado O. M. (e_1_2_1_154_1)
e_1_2_1_178_1
e_1_2_1_87_1
Lai S. (e_1_2_1_145_1)
e_1_2_1_215_1
e_1_2_1_181_1
Gomez-Barrero M. (e_1_2_1_101_1)
e_1_2_1_64_1
e_1_2_1_276_1
IEC (e_1_2_1_1_1)
e_1_2_1_26_1
Garcia-Salicetti S. (e_1_2_1_97_1)
Malik M. I. (e_1_2_1_163_1)
e_1_2_1_238_1
Eskander G. S. (e_1_2_1_67_1)
Stefano C. D. (e_1_2_1_244_1) 2018
Verduijn R. J. (e_1_2_1_257_1)
e_1_2_1_90_1
e_1_2_1_105_1
e_1_2_1_128_1
e_1_2_1_189_1
Parodi M. (e_1_2_1_202_1)
e_1_2_1_203_1
e_1_2_1_131_1
e_1_2_1_52_1
e_1_2_1_75_1
Pirlo G. (e_1_2_1_211_1)
e_1_2_1_14_1
Diaz M. (e_1_2_1_47_1)
e_1_2_1_226_1
Senatore R. (e_1_2_1_231_1)
Mendaza-Ormaza A. (e_1_2_1_171_1)
e_1_2_1_240_1
e_1_2_1_263_1
e_1_2_1_80_1
Blanco-Gonzalo R. (e_1_2_1_25_1)
Diaz-Cabrera M. (e_1_2_1_56_1)
e_1_2_1_116_1
e_1_2_1_177_1
e_1_2_1_42_1
e_1_2_1_165_1
e_1_2_1_214_1
e_1_2_1_180_1
e_1_2_1_142_1
e_1_2_1_274_1
Tolosana R. (e_1_2_1_248_1)
e_1_2_1_91_1
Hurtado O. M. (e_1_2_1_155_1)
e_1_2_1_104_1
e_1_2_1_188_1
e_1_2_1_127_1
e_1_2_1_30_1
e_1_2_1_5_1
Berger C. E. H. (e_1_2_1_17_1) 2016
e_1_2_1_99_1
e_1_2_1_176_1
e_1_2_1_153_1
e_1_2_1_191_1
Hernandez A. B. (e_1_2_1_113_1)
e_1_2_1_53_1
e_1_2_1_15_1
Pal S. (e_1_2_1_195_1)
e_1_2_1_119_1
Galbally J. (e_1_2_1_94_1)
e_1_2_1_157_1
Blanco-Gonzalo R. (e_1_2_1_27_1)
e_1_2_1_134_1
e_1_2_1_217_1
e_1_2_1_20_1
e_1_2_1_66_1
e_1_2_1_160_1
e_1_2_1_89_1
e_1_2_1_43_1
Found B. (e_1_2_1_85_1) 2011
e_1_2_1_183_1
e_1_2_1_232_1
e_1_2_1_255_1
e_1_2_1_278_1
e_1_2_1_28_1
Alonso-Fernandez F. (e_1_2_1_9_1) 2007
e_1_2_1_92_1
Houmani N. (e_1_2_1_117_1)
e_1_2_1_122_1
Dehghani E. (e_1_2_1_44_1)
e_1_2_1_107_1
e_1_2_1_168_1
Danna J. (e_1_2_1_41_1)
e_1_2_1_31_1
e_1_2_1_205_1
e_1_2_1_4_1
e_1_2_1_110_1
e_1_2_1_194_1
Gomez-Barrero M. (e_1_2_1_102_1)
Yeung D.-Y. (e_1_2_1_271_1); 3072
e_1_2_1_16_1
e_1_2_1_39_1
e_1_2_1_243_1
Zhang Z. (e_1_2_1_275_1); 2
e_1_2_1_266_1
e_1_2_1_228_1
Houmani N. (e_1_2_1_118_1)
e_1_2_1_82_1
e_1_2_1_156_1
Krish R. P. (e_1_2_1_143_1)
Meng Y. (e_1_2_1_174_1)
e_1_2_1_179_1
Zoghi M. (e_1_2_1_277_1)
e_1_2_1_216_1
e_1_2_1_121_1
e_1_2_1_21_1
e_1_2_1_182_1
Hafemann L. G. (e_1_2_1_111_1)
Deng H.-R. (e_1_2_1_45_1) 2009; 3
e_1_2_1_29_1
e_1_2_1_239_1
e_1_2_1_230_1
e_1_2_1_253_1
e_1_2_1_93_1
e_1_2_1_144_1
Mamoun S. (e_1_2_1_164_1) 2012
e_1_2_1_167_1
e_1_2_1_106_1
e_1_2_1_55_1
e_1_2_1_204_1
e_1_2_1_78_1
e_1_2_1_3_1
e_1_2_1_132_1
e_1_2_1_193_1
Diaz M. (e_1_2_1_49_1)
e_1_2_1_265_1
Pal S. (e_1_2_1_199_1)
e_1_2_1_227_1
Antal M. (e_1_2_1_13_1)
e_1_2_1_260_1
Vijayanunni M. (e_1_2_1_259_1) 1998
Rosenblum S. (e_1_2_1_225_1)
e_1_2_1_136_1
e_1_2_1_60_1
Pirlo G. (e_1_2_1_207_1)
Diaz-Cabrera M. (e_1_2_1_54_1)
e_1_2_1_159_1
e_1_2_1_162_1
e_1_2_1_83_1
Falahati D. (e_1_2_1_70_1)
e_1_2_1_22_1
Chen Z. (e_1_2_1_37_1)
e_1_2_1_234_1
Pal S. (e_1_2_1_198_1)
e_1_2_1_219_1
Ghandali S. (e_1_2_1_98_1)
Diaz M. (e_1_2_1_50_1)
Martinez-Diaz M. (e_1_2_1_166_1)
e_1_2_1_124_1
e_1_2_1_147_1
e_1_2_1_71_1
e_1_2_1_150_1
e_1_2_1_79_1
e_1_2_1_10_1
e_1_2_1_33_1
Hafemann L. G. (e_1_2_1_109_1)
e_1_2_1_2_1
e_1_2_1_222_1
e_1_2_1_268_1
Ferrer M. A. (e_1_2_1_77_1)
Meng M. (e_1_2_1_173_1)
e_1_2_1_245_1
e_1_2_1_18_1
Diaz M. (e_1_2_1_51_1)
e_1_2_1_112_1
e_1_2_1_135_1
e_1_2_1_158_1
Vielhauer C. (e_1_2_1_258_1) 2005; 9
e_1_2_1_161_1
e_1_2_1_184_1
e_1_2_1_23_1
e_1_2_1_46_1
e_1_2_1_84_1
e_1_2_1_210_1
Houmani N. (e_1_2_1_120_1)
Kahindo C. (e_1_2_1_133_1)
e_1_2_1_233_1
Tolosana R. (e_1_2_1_251_1)
Pal S. (e_1_2_1_192_1)
e_1_2_1_218_1
e_1_2_1_270_1
Freire M. (e_1_2_1_88_1); 2
e_1_2_1_108_1
Schafer B. (e_1_2_1_229_1)
Eskander G. S. (e_1_2_1_65_1)
Farimani S. A. (e_1_2_1_72_1)
e_1_2_1_146_1
e_1_2_1_123_1
e_1_2_1_206_1
e_1_2_1_57_1
e_1_2_1_34_1
Al-Maadeed S. (e_1_2_1_6_1)
e_1_2_1_11_1
e_1_2_1_95_1
e_1_2_1_172_1
e_1_2_1_221_1
Ferrer M. A (e_1_2_1_76_1)
e_1_2_1_19_1
References_xml – reference: J. Ji and X. Chen. 2009. Off-line Chinese signature verification segmentation and feature extraction. In Int. Conf. on Computational Intelligence and Software Engineering (CiSE'09). 1--4.
– reference: Y. Liu, Z. Yang, and L. Yang. 2015. Online signature verification based on DCT and sparse representation. IEEE Transactions on Cybernetics 45, 11 (2015), 2498--2511.
– reference: M. C. Fairhurst, E. Kaplani, and R. M. Guest. 2001. Complexity measures in handwritten signature verification. In Proc. 1st Intl. Conf. on Universal Access in Human-Computer Interaction.
– reference: A. Woch and R. Plamondon. 2010. Characterization of bi-directional movement primitives and their agonist-antagonist synergy with the delta-lognormal model. Motor Control 14, 1 (2010), 1--25.
– reference: E. Sesa-Nogueras, M. Faundez-Zanuy, and J. Mekyska. 2012. An information analysis of in-air and on-surface trajectories in online handwriting. Cognitive Computation 4, 2 (2012), 195--205.
– reference: G. S Eskander, R. Sabourin, and E. Granger. 2014. A bio-cryptographic system based on offline signature images. Information Sciences 259 (2014), 170--191. 10.1016/j.ins.2013.09.004
– reference: S. M. S. Ahmad, A. Shakil, A. R. Ahmad, M. A. M. Balbed, and R. M. Anwar. 2008. SIGMA-A Malaysian signatures’ database. In IEEE/ACS Int. Conf. on Computer Systems and Applications. IEEE, 919--920. 10.1109/AICCSA.2008.4493644
– reference: J. Galbally, J. Fierrez, M. Martinez-Diaz, and J. Ortega-Garcia. 2009. Improving the enrollment in dynamic signature verfication with synthetic samples. In 10th Int. Conf. on Document Analysis and Recognition (ICDAR’09). 1295--1299. 10.1109/ICDAR.2009.38
– reference: M. I. Malik, S. Ahmed, A. Dengel, and M. Liwicki. 2012. A signature verification framework for digital pen applications. In 10th IAPR International Workshop on Document Analysis Systems (DAS'12). IEEE, 419--423. 10.1109/DAS.2012.10
– reference: M. Parodi, J. C. Gómez, and L. Alewijnse. 2014. Automatic online signature verification based only on FHE features: An oxymoron? In 14th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR’14). 73--78.
– reference: G. S. Eskander, R. Sabourin, and E. Granger. 2013. Hybrid writer-independent--writer-dependent offline signature verification system. IET Biometrics 2, 4 (2013), 169--181.
– reference: A. Foroozandeh, Y. Akbari, M. J. Jalili, and J. Sadri. 2012. Persian signature verification based on fractal dimension using testing hypothesis. In Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'12). 313--318. 10.1109/ICFHR.2012.254
– reference: ISO/IEC 30107-1:2016. 2016. Information technology - Biometric presentation attack detection - Part 1: Framework. Int. Org. Standardization, Geneva.
– reference: R. M. Guest, O. M. Hurtado, and O. Henniger. 2014. Assessment of methods for image recreation from signature time-series data. IET Biometrics 3, 3 (2014), 159--166.
– reference: A. Juels and M. Sudan. 2006. A fuzzy vault scheme. Designs, Codes and Cryptography 38, 2 (2006), 237--257. 10.1007/s10623-005-6343-z
– reference: A. Lanitis. 2009. A survey of the effects of aging on biometric identity verification. International Journal of Biometrics 2, 1 (2009), 34--52. 10.1504/IJBM.2010.030415
– reference: C. O’Reilly and R. Plamondon. 2009. Development of a sigma-lognormal representation for on-line signatures. Pattern Recognition 42, 12 (2009), 3324--3337. 10.1016/j.patcog.2008.10.017
– reference: G. Alvarez, B. Sheffer, and M. Bryant. 2016. Offline Signature Verification with Convolutional Neural Networks. Technical Report. Stanford University, Stanford.
– reference: E. N. Zois, L. Alewijnse, and G. Economou. 2016. Offline signature verification and quality characterization using Poset-oriented grid features. Pattern Recognition 54 (2016), 162--177. 10.1016/j.patcog.2016.01.009
– reference: A. Mendaza-Ormaza, O. Miguel-Hurtado, R. Blanco-Gonzalo, and F.-J. Diez-Jimeno. 2011. Analysis of handwritten signature performances using mobile devices. In IEEE Int. Carnahan Conf. on Security Technology (ICCST’11). 1--6.
– reference: Y. Kamihira, W. Ohyama, T. Wakabayashi, and F. Kimura. 2013. Improvement of Japanese signature verification by segmentation-verification. In 12th Int. Conf. on Document Analysis and Recognition (ICDAR'13). 379--382. 10.1109/ICDAR.2013.83
– reference: N. Li, J. Liu, Q. Li, X. Luo, and J. Duan. 2016. Online signature verification based on biometric features. In 49th Hawaii Int. Conf. on System Sciences (HICSS’16). 5527--5534. 10.1109/HICSS.2016.683
– reference: F. Alonso-Fernandez, M. C. Fairhurst, J. Fierrez, and J. Ortega-Garcia. 2007. Impact of signature legibility and signature type in off-line signature verification. In Biometrics Symposium, 2007. IEEE, 1--6.
– reference: M. I. Malik, S. Ahmed, M. Liwicki, and A. Dengel. 2013. Freak for real time forensic signature verification. In 12th Int. Conf. on Document Analysis and Recognition (ICDAR'13). IEEE, 971--975. 10.1109/ICDAR.2013.196
– reference: H.-R. Deng and Y.-H. Wang. 2009. On-line signature verification based on correlation image. In Int. Conf. on Machine Learning and Cybernetics, Vol. 3. 1788--1792.
– reference: A. Hamadene and Y. Chibani. 2016. One-class writer-independent offline signature verification using feature dissimilarity thresholding. IEEE Transactions on Information Forensics and Security 11, 6 (2016), 1226--1238.
– reference: M. Meng, X. Xi, and Z. Luo. 2008. On-line signature verification based on support vector data description and genetic algorithm. In 7th World Congress on Intelligent Control and Automation. 3778--3782.
– reference: M. P. Caligiuri, H.-L. Teulings, C. E. Dean, A. B Niculescu, and J. B. Lohr. 2010. Handwriting movement kinematics for quantifying extrapyramidal side effects in patients treated with atypical antipsychotics. Psychiatry Research 177, 1 (2010), 77--83.
– reference: J. Galbally, J. Fierrez, J. Ortega-Garcia, and R. Plamondon. 2012. Synthetic on-line signature generation. Part II: Experimental validation. Pattern Recognition 45 (2012), 2622--2632. 10.1016/j.patcog.2011.12.007
– reference: A. Fischer, M. Diaz, R. Plamondon, and M. A. Ferrer. 2015. Robust score normalization for DTW-based on-line signature verification. In 13th Int. Conf. on Document Analysis and Recognition (ICDAR’15). 241--245. 10.1109/ICDAR.2015.7333760
– reference: M. I. Malik, M. Liwicki, L. Alewijnse, W. Ohyama, M. Blumenstein, and B. Found. 2013. Signature verification and writer identification competitions for on- and offline skilled forgeries (SigWiComp2013). In 12th Int. Conf. on Document Analysis and Recognition (ICDAR'13). 1477--1483. 10.1109/ICDAR.2013.220
– reference: M. I. Malik, M. Liwicki, A. Dengel, and B. Found. 2014. Man vs. machine: A comparative analysis for signature verification. Journal of Forensic Document Examination 24 (2014), 21--35.
– reference: J. A. Small and N. Sandhu. 2008. Episodic and semantic memory influences on picture naming in Alzheimer’s disease. Brain and Language 104, 1 (2008), 1--9.
– reference: C. O’Reilly and R. Plamondon. 2013. Agonistic and antagonistic interaction in speed/accuracy tradeoff: A delta-lognormal perspective. Human Movement Science 32, 5 (2013), 1040--1055.
– reference: J. Ji, Z. D. Lu, and X. Chen. 2009. Similarity computation based on feature extraction for off-line Chinese signature verification. In 6th Int. Conf. on Fuzzy Systems and Knowledge Discovery, Vol. 1. 291--295. 10.1109/FSKD.2009.597
– reference: K. S. Manjunatha, S. Manjunath, D. S. Guru, and M. T. Somashekara. 2016. Online signature verification based on writer dependent features and classifiers. Pattern Recognition Letters 80 (2016), 129--136. 10.1016/j.patrec.2016.06.016
– reference: M. Diaz-Cabrera, M. Gomez-Barrero, A. Morales, M. A. Ferrer, and J. Galbally. 2014. Generation of enhanced synthetic off-line signatures based on real on-line data. In 14th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR’14). 482--487.
– reference: H. Saevanee and P. Bhatarakosol. 2008. User authentication using combination of behavioral biometrics over the touchpad acting like touch screen of mobile device. In Int. Conf. on Computer and Electrical Engineering (ICCEE'08). IEEE, 82--86. 10.1109/ICCEE.2008.157
– reference: J. Ji, C. B. Chen, and X. Chen. 2010. Off-line Chinese signature verification: Using weighting factor on similarity computation. In 2nd Int. Conf. on E-Business and Information System Security. 1--4.
– reference: R. P. Krish, J. Fierrez, J. Galbally, and M. Martinez-Diaz. 2013. Dynamic signature verification on smart phones. In Int. Conf. on Practical Applications of Agents and Multi-Agent Systems (PAAMS'13). Springer, 213--222.
– reference: S. Pal, U. Pal, and M. Blumenstein. 2012. Off-line English and Chinese signature identification using foreground and background features. In Int. Joint Conf. on Neural Networks (IJCNN’12). 1--7.
– reference: J. Fierrez and J. Ortega-Garcia. 2008. On-line Signature Verification. Springer, 189--209.
– reference: C. Gruber, T. Gruber, S. Krinninger, and B. Sick. 2010. Online signature verification with support vector machines based on LCSS kernel functions. IEEE Transactions on Systems, Man, and Cybernetics Part B: Cybernetics 40, 4 (2010), 1088--1100. 10.1109/TSMCB.2009.2034382
– reference: M. Diaz, M. A. Ferrer, A. Parziale, and A. Marcelli. 2017. Recovering western on-line signatures from image-based specimens. In 14th IAPR Int. Conf. on Document Analysis and Recognition (ICDAR’17). 1204--1209.
– reference: E. Frias-Martinez, A. Sanchez, and J. Velez. 2006. Support vector machines versus multi-layer perceptrons for efficient off-line signature recognition. Engineering Applications of Artificial Intelligence 19, 6 (2006), 693--704.
– reference: Y. Serdouk, H. Nemmour, and Y. Chibani. 2017. Handwritten signature verification using the quad-tree histogram of templates and a support vector-based artificial immune classification. Image and Vision Computing 66 (2017), 26--35.
– reference: C. F. Whitelock, H. N. Agyepong, K. Patterson, and K. D. Ersche. 2015. Signing below the dotted line: Signature position as a marker of vulnerability for visuospatial processing difficulties. Neurocase 21, 1 (2015), 67--72.
– reference: S. Pal, A. Alaei, U. Pal, and M. Blumenstein. 2012. Multi-script off-line signature identification. In Int. Conf. on Hybrid Intelligent Systems (HIS'12). 236--240.
– reference: R. Tolosana, R. Vera-Rodriguez, J. Fierrez, and J. Ortega-Garcia. 2018. Exploring recurrent neural networks for on-line handwritten signature biometrics. IEEE Access (2018), 5128--5138.
– reference: H. R. Martinez-Hernandez and E. D. Louis. 2014. Macrographia in essential tremor: A study of patients with and without rest tremor. Movement Disorders 29, 7 (2014), 960--961.
– reference: B. Li. 2016. The hot issues and future direction of forensic document examination in China. Journal of Forensic Science and Medicine 2, 1 (2016), 22--27.
– reference: M. Martinez-Diaz, J. Fierrez, J. Galbally, and J. Ortega-Garcia. 2008. Towards mobile authentication using dynamic signature verification: Useful features and performance evaluation. In 19th Int. Conf. on Pattern Recognition (ICPR'08). IEEE, 1--5.
– reference: A. Soleimani, B. N. Araabi, and K. Fouladi. 2016. Deep multitask metric learning for offline signature verification. Pattern Recognition Letters 80 (2016), 84--90. 10.1016/j.patrec.2016.05.023
– reference: R. Blanco-Gonzalo, R. Sanchez-Reillo, O. M. Hurtado, and J. Liu-Jimenez. 2013. Performance evaluation of handwritten signature recognition in mobile environments. IET Biometrics 3, 3 (2013), 139--146.
– reference: B. Schafer and S. Viriri. 2009. An off-line signature verification system. In Int. Conf. on Signal and Image Processing Applications (ICSIPA'09). 95--100.
– reference: L. G. Hafemann, R. Sabourin, and L. S. Oliveira. 2017. Learning features for offline handwritten signature verification using deep convolutional neural networks. Pattern Recognition 70 (2017), 163--176. 10.1016/j.patcog.2017.05.012
– reference: C. D. Stefano, C. De Stefano, F. Fontanella, D. Impedovo, G. Pirlo, and A. Scotto di Freca. 2018. Handwriting analysis to support neurodegenerative diseases diagnosis: A review. Pattern Recognition Letters (2018).
– reference: G. S. Eskander, R. Sabourin, and E. Granger. 2011. Signature based fuzzy vaults with boosted feature selection. In Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM’11). IEEE, 131--138.
– reference: D. S. Guru and H. N. Prakash. 2009. Online signature verification and recognition: An approach based on symbolic representation. IEEE Transactions on Pattern Analysis and Machine Intelligence 31, 6 (2009), 1059--1073. 10.1109/TPAMI.2008.302
– reference: M. Liwicki, M. Imran Malik, C. E. van den Heuvel, X. Chen, C. Berger, R. Stoel, M. Blumenstein, and B. Found. 2011. Signature verification competition for online and offline skilled forgeries (SigComp2011). In 11th Int. Conf. on Document Analysis and Recognition (ICDAR'11). 1480--1484. 10.1109/ICDAR.2011.294
– reference: M. Diaz-Cabrera, M. A. Ferrer, and A. Morales. 2015. Modeling the lexical morphology of western handwritten signatures. PLoS ONE 10, 4 (2015), e0123254. https://journals.plos.org/plosone/article/citation?id=10.1371/journal.pone.0123254.
– reference: A. Q. Ansari, M. Hanmandlu, J. Kour, and A. K. Singh. 2013. Online signature verification using segment-level fuzzy modelling. IET Biometrics 3, 3 (2013), 113--127.
– reference: J. J. Brault and R. Plamondon. 1993. A complexity measure of handwritten curves: Modeling of dynamic signature forgery. IEEE Transactions on Systems, Man, and Cybernetics 23, 2 (1993), 400--413.
– reference: M. Liwicki, M. Imran Malik, L. Alewijnse, E. van den Heuvel, and B. Found. 2012. ICFHR 2012 competition on automatic forensic signature verification (4NsigComp 2012). In 13th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'12). IEEE, 823--828. 10.1109/ICFHR.2012.217
– reference: V. Nguyen, M. Blumenstein, and G. Leedham. 2009. Global features for the off-line signature verification problem. In 10th Int. Conf. on Document Analysis and Recognition (ICDAR'09). 1300--1304. 10.1109/ICDAR.2009.123
– reference: S. Dey, A. Dutta, J. I. Toledo, S. K. Ghosh, J. Lladós, and U. Pal. 2017. SigNet: Convolutional Siamese network for writer independent offline signature verification. Corr (2017). arXiv:1707.02131
– reference: M. Antal, L. Z. Szabó, and T. Tordai. 2018. Online signature verification on MOBISIG finger-drawn signature corpus. Mobile Information Systems 2018, Article 3127042 (2018) 15 pages.
– reference: G. Pirlo, D. Impedovo, R. Plamondon, and C. O’Reilly. 2014. Stability analysis of online signatures in the generation domain. In Advances in Digital Handwritten Signature Processing. A Human Artefact for e-Society. 1--12.
– reference: B. Found, D. Rogers, and C. Bird. 2012. Documentation of Forensic Handwriting Method: A Modular Approach. Technical Report. Victoria Police Forensic Services Department, Victoria, Australia.
– reference: M. Gomez-Barrero, J. Galbally, J. Fierrez, and J. Ortega-Garcia. 2011. Hill-climbing attack based on the uphill simplex algorithm and its application to signature verification. In Proc. European Workshop on Biometrics and Identity Management (BioID’11) (LNCS-6583). Springer, 83--94.
– reference: R. Tolosana, R. Vera-Rodriguez, J. Ortega-Garcia, and J. Fierrez. 2015. Update strategies for HMM-based dynamic signature biometric systems. In Int. Workshop on Information Forensics and Security (WIFS’15). IEEE, 1--6.
– reference: J. Ortega-Garcia, J. Fierrez, F. Alonso-Fernandez, J. Galbally, M. Freire, J. Gonzalez-Rodriguez, C. Garcia-Mateo, J.-L. Alba-Castro, E. Gonzalez-Agulla, E. Otero-Muras, S. Garcia-Salicetti, L. Allano, B. Ly-Van, B. Dorizzi, J. Kittler, T. Bourlai, N. Poh, F. Deravi, M. Ng, M. Fairhurst, J. Hennebert, A. Humm, M. Tistarelli, L. Brodo, J. Richiardi, A. Drygajlo, H. Ganster, F. M. Sukno, S.-K. Pavani, A. Frangi, L. Akarun, and A. Savran. 2010. The multi-scenario multi-environment BioSecure multimodal database (BMDB). IEEE Transactions on Pattern Analysis and Machine Intelligence 32, 6 (2010), 1097--1111. 10.1109/TPAMI.2009.76
– reference: E. Maiorana, P. Campisi, J. Fierrez, J. Ortega-Garcia, and A. Neri. 2010. Cancelable templates for sequence-based biometrics with application to on-line signature recognition. IEEE Transactions on Systems, Man, and Cybernetics Part A: Systems and Humans 40, 3 (2010), 525--538. 10.1109/TSMCA.2010.2041653
– reference: M. E. Yahyatabar, Y. Baleghi, and M. R. Karami. 2013. Online signature verification: A Persian-language specific approach. In 21st Iranian Conf. on Electrical Engineering (ICEE’13). 1--6.
– reference: A. Kholmatov and B. Yanikoglu. 2008. SUSIG: An on-line signature database, associated protocols and benchmark results. Pattern Analysis and Applications 12, 3 (2008), 227--236.
– reference: J. Ortega-Garcia, J. Fierrez-Aguilar, D. Simon, J. Gonzalez, M. Faundez-Zanuy, V. Espinosa, A. Satue, I. Hernaez, J.-J. Igarza, C. Vivaracho, D. Escudero, and Q. I. Moro. 2003. MCYT baseline corpus: A bimodal biometric database. IEE Proceedings-Vision, Image and Signal Processing 150, 6 (2003), 395--401.
– reference: M. A. Ferrer, M. Diaz-Cabrera, and A. Morales. 2015. Static signature synthesis: A neuromotor inspired approach for biometrics. IEEE Transactions on Pattern Analysis and Machine Intelligence 37, 3 (2015), 667--680.
– reference: C. O’Reilly and R. Plamondon. 2011. Impact of the principal stroke risk factors on human movements. Human Movement Science 30, 4 (2011), 792--806.
– reference: Y. Kamihira, W. Ohyama, T. Wakabayashi, and F. Kimura. 2013. Improvement of Japanese signature verification by combined segmentation verification approach. In 2nd IAPR Asian Conf. on Pattern Recognition. 501--505. 10.1109/ACPR.2013.46
– reference: F. J. Zareen and S. Jabin. 2016. Authentic mobile-biometric signature verification system. IET Biometrics 5, 1 (2016), 13--19.
– reference: E. Argones Rua, E. Maiorana, J. L. Alba Castro, and P. Campisi. 2012. Biometric template protection using universal background models: An application to online signature. IEEE Transactions on Information Forensics and Security 7, 1 (2012), 269--282. 10.1109/TIFS.2011.2168213
– reference: J. Galbally, M. Martinez, and J. Fierrez. 2013. Aging in biometrics: An experimental analysis on on-line signature. PLoS ONE 8, 7 (2013), e69897.
– reference: D. Impedovo and G. Pirlo. 2008. Automatic signature verification: The state of the art. IEEE Transactions on Systems, Man, and Cybernetics 38, 5 (2008), 609--635. 10.1109/TSMCC.2008.923866
– reference: A. Sharma and S. Sundaram. 2017. A novel online signature verification system based on GMM features in a DTW framework. IEEE Transactions on Information Forensics and Security 12, 3 (2017), 705--718. 10.1109/TIFS.2016.2632063
– reference: M. Antal and A. Bandi. 2017. Finger or stylus: Their impact on the performance of on-line signature verification systems. In Proceedings of the 5th International Conference on Recent Achievements in Mechatronics, Automation, Computer Sciences and Robotics (MACRo'17).
– reference: Y. Fang, W. Kang, Q. Wu, and L. Tang. 2017. A novel video-based system for in-air signature verification. Computers 8 Electrical Engineering 57 (2017), 1--14. 10.1016/j.compeleceng.2016.11.010
– reference: S. Garcia-Salicetti, N. Houmani, and B. Dorizzi. 2008. A client-entropy measure for on-line signatures. In Biometrics Symposium. IEEE, 83--88.
– reference: M. A. Ferrer, M. Diaz-Cabrera, A. Morales, J. Galbally, and M. Gomez-Barrero. 2013. Realistic synthetic off-line signature generation based on synthetic on-line data. In Proc. IEEE Int. Carnahan Conf. on Security Technology (ICCST’13). 116--121.
– reference: T. A. Duda, J. E. Casey, and N. McNevin. 2014. Variability of kinematic graphomotor fluency in adults with ADHD. Human Movement Science 38 (2014), 331--342.
– reference: R. Plamondon, G. Pirlo, E. Anquetil, C. Remi, H-L. Teulings, and M. Nakagawa. 2018. Personal digital bodyguards for e-Security, e-Learning and e-Health: A prospective survey. Pattern Recognition 81, 2018 (2018), 633--659.
– reference: I. A. B. Abdelghani and N. E. B. Amara. 2013. SID signature database: A Tunisian off-line handwritten signature database. In Int. Conf. on Image Analysis and Processing. Springer, 131--139. 10.1007/978-3-642-41190-8_15
– reference: M. P. Caligiuri and L. A Mohammed. 2012. The Neuroscience of Handwriting: Applications for Forensic Document Examination. CRC Press.
– reference: G. S. Eskander, R. Sabourin, and E. Granger. 2014. Offline signature-based fuzzy vault: A review and new results. In Symposium on Computational Intelligence in Biometrics and Identity Management. 45--52.
– reference: B. Found. 2011. An introduction to the character of forensic investigations into questioned signatures. In 1st Int. Workshop on Automated Forensic Handwriting Analysis (AFHA’11).
– reference: M. I. Malik, M. Liwicki, A. Dengel, S. Uchida, and V. Frinken. 2014. Automatic signature stability analysis and verification using local features. In 14th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'14). IEEE, 621--626.
– reference: G. Pirlo, D. Impedovo, and T. Ferranti. 2015. Stability/complexity analysis of dynamic handwritten signatures. In 17th Biennial Conf. of the Int. Graphonomics Society (IGS'15).
– reference: S. Ghandali and M. E. Moghaddam. 2009. Off-line Persian signature identification and verification based on image registration and fusion. Journal of Multimedia 4 (2009), 137--144. https://www.semanticscholar.org/paper/Off-Line-Persian-Signature-Identification-and-Based-Ghandali-Moghaddam/7076a5b9b8e5bc121a3e8f57b236ce5651359988.
– reference: M. Piekarczyk and M. R. Ogiela. 2013. Matrix-based hierarchical graph matching in off-line handwritten signatures recognition. In 2nd IAPR Asian Conf. on Pattern Recognition. IEEE, 897--901. 10.1109/ACPR.2013.164
– reference: G. Pirlo, D. Impedovo, R. Plamondon, C. O'Reilly, A. Cozzolongo, R. Gravinese, and A. Rollo. 2013. Stability of dynamic signatures: From the representation to the generation domain. In New Trends in Image Analysis and Processing. Lecture Notes in Computer Science, Vol. 8158. Springer, 122--130. 10.1007/978-3-642-41190-8_14
– reference: A. Carina-Fernandes and J. M. Lopes-Lima. 2017. Alzheimer’s disease and handwriting. what do we know so far? In 18th Biennial Conf. of the Int. Graphonomics Society. 131--134.
– reference: C. Bidet-Ildei, P. Pollak, S. Kandel, V. Fraix, and J.-P. Orliaguet. 2011. Handwriting in patients with Parkinson disease: Effect of L-dopa and stimulation of the sub-thalamic nucleus on motor anticipation. Human Movement Science 30, 4 (2011), 783--791.
– reference: V. Nguyen and M. Blumenstein. 2010. Techniques for static handwriting trajectory recovery: A survey. In Proc. of the 9th IAPR Int. Workshop on Document Analysis Systems (DAS'10). 463--470. 10.1145/1815330.1815390
– reference: S. Pal, A. Alaei, U. Pal, and M. Blumenstein. 2016. Performance of an off-line signature verification method based on texture features on a large indic-script signature dataset. In 12th IAPR Workshop on Document Analysis Systems (DAS’16). IEEE, 72--77.
– reference: L. Y. Tseng and T. H. Huang. 1992. An online Chinese signature verification scheme based on the ART1 neural network. In Proc. 1992 IJCNN Int. Joint Conf. on Neural Networks (IJCNN'92), Vol. 3. 624--630.
– reference: M. Song and Z. Sun. 2014. An immune clonal selection algorithm for synthetic signature generation. Mathematical Problems in Engineering 2014 (2014), 1--12.
– reference: K. Cpałka and M. Zalasiński. 2014. On-line signature verification using vertical signature partitioning. Expert Systems with Applications 41, 9 (2014), 4170--4180. 10.1016/j.eswa.2013.12.047
– reference: E. Argones Rua and J. L. Alba Castro. 2012. Online signature verification based on generative models. IEEE Transactions on Systems, Man, and Cybernetics Part B (Cybernetics) 42, 4 (2012), 1231--1242. 10.1109/TSMCB.2012.2188508
– reference: W. Bouamra, C. Djeddi, B. Nini, M. Diaz, and I. Siddiqi. 2018. Towards the design of an offline signature verifier based on a small number of genuine samples for training. Expert Systems with Applications 107 (2018), 182--195.
– reference: C. O’Reilly, R. Plamondon, and L-H. Lebrun. 2014. Linking brain stroke risk factors to human movement features for the development of preventive tools. Frontiers in Aging Neuroscience 6, 150 (2014), 1--13.
– reference: K. Yasuda, B. Beckmann, and T. Nakamura. 2000. Brain processing of proper names. Aphasiology 14, 11 (2000), 1067--1089.
– reference: D. S. Guru, K. S. Manjunatha, S. Manjunath, and M. T. Somashekara. 2017. Interval valued symbolic representation of writer dependent features for online signature verification. Expert Systems with Applications 80 (2017), 232--243. 10.1016/j.eswa.2017.03.024
– reference: A. B. Hernandez, A. Fischer, and R. Plamondon. 2015. Omega-lognormal analysis of oscillatory movements as a function of brain stroke risk factors. In 17th Biennial Conf. of the Int. Graphonomics Society (IGS'15).
– reference: D. Impedovo, G. Pirlo, and R. Plamondon. 2012. Handwritten signature verification: New advancements and open issues. In Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'12). 367--372. 10.1109/ICFHR.2012.211
– reference: S. Darwish and A. El-Nour. 2016. Automated offline arabic signature verification system using multiple features fusion for forensic applications. Arab Journal of Forensic Sciences 8 Forensic Medicine 1, 4 (2016), 424--437.
– reference: J. Galbally, M. Diaz-Cabrera, M. A Ferrer, M. Gomez-Barrero, A. Morales, and J. Fierrez. 2015. On-line signature recognition through the combination of real dynamic data and synthetically generated static data. Pattern Recognition 48, 9 (2015), 2921--2934. 10.1016/j.patcog.2015.03.019
– reference: S. Pal, A. Alaei, U. Pal, and M. Blumenstein. 2011. Off-line signature identification using background and foreground information. In Int. Conf. on Digital Image Computing Techniques and Applications (DICTA’11). IEEE, 672--677. 10.1109/DICTA.2011.119
– reference: S. Rosenblum, M. Samuel, S. Zlotnik, and I. Schlesinger. 2009. Handwriting performance measures of “real life” tasks: A comparison between the performance of patients with Parkinson’s disease and controls. In 14th Conf. of the Int. Graphonomics Society (IGS'09). 43--47.
– reference: S. Pal, M. Blumenstein, and U. Pal. 2011. Non-English and non-Latin signature verification systems a survey. In 1st Int. Workshop on Automated Forensic Handwriting Analysis (AFHA'11). 1--5.
– reference: M. Walch and D. Gantz. 2013. The forensic language-independent analysis system for handwriting identification (FLASH ID). Presentation at the Measurement Science and Standards In Forensic Handwriting Analysis Conference at The National Institute of Standards 8 Technology (NIST), Gaithersburg, Maryland.
– reference: T. Ito, W. Ohyama, T. Wakabayashi, and F. Kimura. 2012. Combination of signature verification techniques by SVM. In 13th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'12). IEEE, 430--433. 10.1109/ICFHR.2012.192
– reference: A. Soleimani, K. Fouladi, and B. N. Araabi. 2016. UTSig: A Persian offline signature dataset. IET Biometrics 6, 1 (2016), 1--8.
– reference: D. Wang, Y. Zhang, C. Yao, J. Wu, H. Jiao, and M. Liu. 2010. Toward force-based signature verification: A pen-type sensor and preliminary validation. IEEE Transactions on Instrumentation and Measurement 59, 4 (2010), 752--762.
– reference: M. A. Ismail and S. Gad. 2000. Off-line arabic signature recognition and verification. Pattern Recognition 33, 10 (2000), 1727--1740.
– reference: G. Pirlo, M. Diaz, M. A. Ferrer, D. Impedovo, F. Occhionero, and U. Zurlo. 2015. Early diagnosis of neurodegenerative diseases by handwritten signature analysis. In 1st Workshop on Image-based Smart City Applications: Int. Conf. on Image Analysis and Processing (ICIAP’15). 290--297.
– reference: S. Ghandali and M. E. Moghaddam. 2008. A method for off-line Persian signature identification and verification using DWT and image fusion. In Int. Symposium on Signal Processing and Information Technology. IEEE, 315--319.
– reference: G. Pirlo and D. Impedovo. 2013. Verification of static signatures by optical flow analysis. IEEE Transactions on Human-Machine Systems 43, 5 (2013), 499--505.
– reference: M. Martinez-Diaz, J. Fierrez, R. P. Krish, and J. Galbally. 2014. Mobile signature verification: Feature robustness and performance comparison. IET Biometrics 3, 4 (2014), 267--277.
– reference: K. Matsuda, W. Ohyama, T. Wakabayashi, and F. Kimura. 2016. Effective random-impostor training for combined segmentation signature verification. In 15th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'16). IEEE, 489--494.
– reference: C. E. H. Berger, B. Robertson, and G. A. Vignaux. 2016. Interpreting Evidence: Evaluating Forensic Science in the Courtroom. Vol. 2. Wiley.
– reference: M. A Ferrer, J. F. Vargas, A. Morales, and A. Ordóñez. 2012. Robustness of offline signature verification based on gray level features. IEEE Transactions on Information Forensics and Security 7, 3 (2012), 966--977. 10.1109/TIFS.2012.2190281
– reference: R. Plamondon, G. Pirlo, and D. Impedovo. 2014. Online signature verification. In Handbook of Document Image Processing and Recognition. Springer, 917--947.
– reference: M. A Ferrer, M. Diaz, C. Carmona-Duarte, and A. Morales. 2017. A behavioral handwriting model for static and dynamic signature synthesis. IEEE Transactions on Pattern Analysis and Machine Intelligence 39, 6 (2017), 1041--1053. 10.1109/TPAMI.2016.2582167
– reference: C. Vielhauer. 2005. A behavioural biometrics. Public Service Review: European Union 9 (2005), 113--115.
– reference: M. Zoghi and V. Abolghasemi. 2009. Persian signature verification using improved dynamic time warping-based segmentation and multivariate autoregressive modeling. In 15th Workshop on Statistical Signal Processing (SSP'09). 329--332.
– reference: R. Plamondon and G. Lorette. 1989. Automatic signature verification and writer identification - the state of the art. Pattern Recognition 22, 2 (1989), 107--131.
– reference: Z. Chen, X. Xia, and F. Luan. 2016. Automatic online signature verification based on dynamic function features. In 7th IEEE Int. Conf. on Software Engineering and Service Science (ICSESS’16). 964--968.
– reference: N. Houmani, S. Garcia Salicetti, and B. Dorizzi. 2008. A novel personal entropy measure confronted with online signature verification systems’ performance. In 2nd IEEE Intl. Conf. on Biometrics: Theory, Applications and Systems (BTAS’08). 1--6.
– reference: S. Pal, A. Reza, U. Pal, and M. Blumenstein. 2013. SVM and NN based offline signature verification. International Journal of Computational Intelligence and Applications 12, 4 (2013), 1340004.
– reference: A. Das, M. A Ferrer, U. Pal, S. Pal, M. Diaz, and M. Blumenstein. 2016. Multi-script versus single-script scenarios in automatic off-line signature verification. IET Biometrics 5, 4 (2016), 305--313.
– reference: M. Diaz, A. Fischer, M. A. Ferrer, and R. Plamondon. 2018. Dynamic signature verification system based on one real signature. IEEE Transactions on Cybernetics 48, 1 (2018), 228--239.
– reference: M. Djioua and R. Plamondon. 2009. A new algorithm and system for the characterization of handwriting strokes with delta-lognormal parameters. IEEE Transactions on Pattern Analysis and Machine Intelligence 31, 11 (2009), 2060--2072. 10.1109/TPAMI.2008.264
– reference: S. Rosenblum, H. A. B. Simhon, and E. Gal. 2016. Unique handwriting performance characteristics of children with high-functioning autism spectrum disorder. Research in Autism Spectrum Disorders 23 (2016), 235--244.
– reference: H. Rantzsch, H. Yang, and C. Meinel. 2016. Signature embedding: Writer independent offline signature verification with deep metric learning. In Int. Symposium on Visual Computing. Springer, 616--625.
– reference: V. L. Blankers, C. E. v. d. Heuvel, K. Y. Franke, and L. G. Vuurpijl. 2009. ICDAR 2009 signature verification competition. In 10th Int. Conf. on Document Analysis and Recognition (ICDAR'09). 1403--1407. 10.1109/ICDAR.2009.216
– reference: W. Ohyama, Y. Ogi, T. Wakabayashi, and F. Kimura. 2015. Multilingual signature-verification by generalized combined segmentation verification. In 13th Int. Conference on Document Analysis and Recognition (ICDAR'15). 811--815. 10.1109/ICDAR.2015.7333874
– reference: S. A. Farimani and M. V. Jahan. 2018. An HMM for online signature verification based on velocity and hand movement directions. In 6th Iranian Joint Congress on Fuzzy and Intelligent Systems. 205--209.
– reference: S. Srihari. 2013. iFOX. In Presentation at Measurement Science and Standards in Forensic Handwriting Analysis Conf.
– reference: J.-S. Wang, Y.-L. Hsu, and J.-N. Liu. 2010. An inertial-measurement-unit-based pen with a trajectory reconstruction algorithm and its applications. IEEE Transactions on Industrial Electronics 57, 10 (2010), 3508--3521.
– reference: O. M. Hurtado, R. Guest, S. V. Stevenage, and G. J. Neil. 2014. The relationship between handwritten signature production and personality traits. In IEEE Int. Joint Conf. on Biometrics (IJCB’14). IEEE, 1--8.
– reference: J. Galbally, R. Plamondon, J. Fierrez, and J. Ortega-Garcia. 2012. Synthetic on-line signature generation. Part I: Methodology and algorithms. Pattern Recognition 45 (2012), 2610--2621. 10.1016/j.patcog.2011.12.011
– reference: R. Tolosana, R. Vera-Rodriguez, J. Fierrez, A. Morales, and J. Ortega-Garcia. 2017. Benchmarking desktop and mobile handwriting across COTS devices: The e-BioSign biometric database. PloS ONE 12, 5 (2017), e0176792.
– reference: F. Alonso-Fernandez, J. Fierrez, A. Gilperez, J. Galbally, and J. Ortega-Garcia. 2009. Robustness of signature verification systems to imitators with increasing skills. In 10th Int. Conf. on Document Analysis and Recognition. IEEE, 728--732. 10.1109/ICDAR.2009.261
– reference: M. Gomez-Barrero, J. Galbally, J. Fierrez, J. Ortega-Garcia, and R. Plamondon. 2015. Enhanced on-line signature verification based on skilled forgery detection using sigma-lognormal features. In Conf. on Biometrics (ICB’15). 501--506.
– reference: G. Pirlo and D. Impedovo. 2013. Cosine similarity for analysis and verification of static signatures. IET Biometrics 2, 4 (2013), 151--158.
– reference: R. Tolosana, R. Vera-Rodriguez, R. Guest, J. Fierrez, and J. Ortega-Garcia. 2017. Complexity-based biometric signature verification. In Proc. 14th IAPR Int. Conference on Document Analysis and Recognition (ICDAR'17).
– reference: M. Okawa. 2017. KAZE features via Fisher vector encoding for offline signature verification. In Int. Joint Conf. on Biometrics (IJCB'17). IEEE, 10--15.
– reference: J. Fierrez-Aguilar, N. Alonso-Hermira, G. Moreno-Marquez, and J. Ortega-Garcia. 2004. An off-line signature verification system based on fusion of local and global information. In International Workshop on Biometric Authentication. Springer, 295--306.
– reference: L. A. Mohammed, B. Found, M. Caligiuri, and D. Rogers. 2011. The dynamic character of disguise behavior for text-based, mixed, and stylized signatures. Journal of Forensic Sciences 56, s1 (2011), S136--S141.
– reference: M. Gomez-Barrero, J. Fierrez, and J. Galbally. 2016. Variable-length template protection based on homomorphic encryption with application to signature biometrics. In 4th Int. Workshop on Biometrics and Forensics. IEEE, 1--6.
– reference: S. Lai, L. Jin, and W. Yang. 2017. Online signature verification using recurrent neural network and length-normalized path signature. In 14th IAPR Int. Conf. on Document Analysis and Recognition (ICDAR’17). 1--6.
– reference: M. A. Ferrer, S. Chanda, M. Diaz, C. K. Banerjee, A. Majumdar, C. Carmona-Duarte, P. Acharya, and U. Pal. 2018. Static and dynamic synthesis of Bengali and Devanagari signatures. IEEE Transactions on Cybernetics 48, 10 (2018), 2896--2907.
– reference: G. Pirlo, V. Cuccovillo, M. Diaz-Cabrera, D. Impedovo, and P. Mignone. 2015. Multidomain verification of dynamic signatures using local stability analysis. IEEE Transactions on Human-Machine Systems 45, 6 (2015), 805--810. https://ieeexplore.ieee.org/document/7145458.
– reference: Y. Kawazoe, W. Ohyama, T. Wakabayashi, and F. Kimura. 2010. Improvement of on-line signature verification based on gradient features. In Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'10). IEEE, 410--414. 10.1109/ICFHR.2010.70
– reference: S. Mamoun. 2012. Off-line arabic signature verification using geometrical features. In National Workshop on Information Assurance Research. 1--6.
– reference: M. Diaz, M. A. Ferrer, G. Pirlo, G. Giannico, and D. Impedovo. 2015. Off-line signature stability by optical flow: Feasibility study of predicting the verifier performance. In 49th IEEE Int. Carnahan Conf. on Security Technology (ICCST'15). 341--345.
– reference: M. Freire, J. Fierrez, M. Martinez-Diaz, and J. Ortega-Garcia. 2007. On the applicability of off-line signatures to the fuzzy vault construction. In Int. Conf. on Document Analysis and Recognition, Vol. 2. IEEE, 1173--1177.
– reference: A. J. Mauceri. 1965. Feasibility studies of personal identification by signature verification. Technical Report SID65--24. North American Aviation.
– reference: E. Dehghani and M. E. Moghaddam. 2009. On-line signature verification using ANFIS. In 6th Int. Symposium on Image and Signal Processing and Analysis. 546--549.
– reference: D. Bertolini, L. S. Oliveira, E. Justino, and R. Sabourin. 2010. Reducing forgeries in writer-independent off-line signature verification through ensemble of classifiers. Pattern Recognition 43, 1 (January 2010), 387--396. 10.1016/j.patcog.2009.05.009
– reference: L. Batista, E. Granger, and R. Sabourin. 2012. Dynamic selection of generative--discriminative ensembles for off-line signature verification. Pattern Recognition 45, 4 (2012), 1326--1340. 10.1016/j.patcog.2011.10.011
– reference: H. Khalajzadeh, M. Mansouri, and M. Teshnehlab. 2012. Persian signature verification using convolutional neural networks. International Journal of Engineering Research and Technology 1, 2 (2012), 7--12.
– reference: M. Diaz, A. Fischer, R. Plamondon, and M. A. Ferrer. 2015. Towards an automatic on-line signature verifier using only one reference per signer. In Proc. IAPR Int. Conf. on Document Analysis and Recognition (ICDAR’15). 631--635. 10.1109/ICDAR.2015.7333838
– reference: N. Houmani, S. Garcia-Salicetti, and B. Dorizzi. 2009. On assessing the robustness of pen coordinates, pen pressure and pen inclination to time variability with personal entropy. In IEEE 3rd Int. Conf. on Biometrics: Theory, Applications, and Systems. 1--6.
– reference: D. Impedovo and G. Pirlo. 2010. On-line signature verification by stroke-dependent representation domains. In 12th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'10). 623--627. 10.1109/ICFHR.2010.102
– reference: M. Djioua and R. Plamondon. 2009. Studying the variability of handwriting patterns using the kinematic theory. Human Movement Science 28, 5 (2009), 588--601.
– reference: A. Morales, D. Morocho, J. Fierrez, and R. Vera-Rodriguez. 2017. Signature authentication based on human intervention: Performance and complementarity with automatic systems. IET Biometrics 6, 4 (2017), 307--315.
– reference: A. Sharma and S. Sundaram. 2016. An enhanced contextual DTW based system for online signature verification using vector quantization. Pattern Recognition Letters 84 (2016), 22--28. 10.1016/j.patrec.2016.07.015
– reference: M. Diaz, S. Chanda, M. A. Ferrer, C. K. Banerjee, A. Majumdar, C. Carmona-Duarte, P. Acharya, and U. Pal. 2016. Multiple generation of bengali static signatures. In 15th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'16). 42--47.
– reference: O. M. Hurtado, R. Guest, and T. Chatzisterkotis. 2016. A new approach to automatic signature complexity assessment. In IEEE Int. Carnahan Conf. on Security Technology (ICCST’16). IEEE, 1--7.
– reference: R. Tolosana, R. Vera-Rodriguez, J. Ortega-Garcia, and J. Fierrez. 2015. Preprocessing and feature selection for improved sensor interoperability in online biometric signature verification. IEEE Access 3 (2015), 478--489.
– reference: D. Falahati, M. S. Helforoush, H. Danyali, and M. Rashidpour. 2011. Static signature verification for Farsi and Arabic signatures using dynamic time warping. In 19th Iranian Conf. on Electrical Engineering (ICEE’11). 1--6.
– reference: T. V. Nguyen, N. Sae-Bae, and N. Memon. 2017. DRAW-A-PIN: Authentication using finger-drawn PIN on touch devices. Computers 8 Security 66 (2017), 115--128. 10.1016/j.cose.2017.01.008
– reference: O. Sinanović and Z. Mrkonjić. 2013. Post-stroke writing and reading disorders. Sanamed 8, 1 (2013), 55--63.
– reference: J. Danna, V. Paz-Villagrán, C. Gondre, M. Aramaki, R. Kronland-Martinet, S. Ystad, and J.-L. Velay. 2013. Handwriting sonification for the diagnosis of dysgraphia. In Recent Progress in Graphonomics: Learn from the Past--Proceedings of the 16th Conf. of the Int. Graphonomics Society. 123--126.
– reference: J. Galbally, M. Gomez-Barrero, and A. Ross. 2017. Accuracy evaluation of handwritten signature verification: Rethinking the random-skilled forgeries dichotomy. In Int. Joint Conf. on Biometrics (IJCB'17). IEEE, 302--310.
– reference: M. Diaz, M. A Ferrer, G. S Eskander, and R. Sabourin. 2017. Generation of duplicated off-line signature images for verification systems. IEEE Transactions on Pattern Analysis and Machine Intelligence 39, 5 (2017), 951--964. 10.1109/TPAMI.2016.2560810
– reference: C. Holz and P. Baudisch. 2013. Fiberio: A touchscreen that senses fingerprints. In Proc. 26th Annual ACM Symp. on User Interface Software and Technology. ACM, 41--50. 10.1145/2501988.2502021
– reference: B. Kovari and H. Charaf. 2013. A study on the consistency and significance of local features in off-line signature verification. Pattern Recognition Letters 34, 3 (2013), 247--255. 10.1016/j.patrec.2012.10.011
– reference: R. Blanco-Gonzalo, O. M. Hurtado, A. Mendaza-Ormaza, and R. Sanchez-Reillo. 2012. Handwritten signature recognition in mobile scenarios: Performance evaluation. In IEEE Int. Carnahan Conf. on Security Technology (ICCST’12). 174--179.
– reference: M. Renier, F. Gnoato, A. Tessari, M. Formilan, F. Busonera, P. Albanese, G. Sartori, and A. Cester. 2016. A correlational study between signature, writing abilities and decision-making capacity among people with initial cognitive impairment. Aging Clinical and Experimental Research 28, 3 (2016), 505--511.
– reference: M. Lorch. 2013. Written language production disorders: Historical and recent perspectives. Current Neurology and Neuroscience Reports 13, 8 (2013), 369.
– reference: G. Bailador, C. Sanchez-Avila, J. Guerra-Casanova, and A. de Santos Sierra. 2011. Analysis of pattern recognition techniques for in-air signature biometrics. Pattern Recognition 44, 10 (2011), 2468--2478. 10.1016/j.patcog.2011.04.010
– reference: N. S. Kamel, S. Sayeed, and G. A. Ellis. 2008. Glove-based approach to online signature verification. IEEE Transactions on Pattern Analysis and Machine Intelligence 30, 6 (2008), 1109--1113. 10.1109/TPAMI.2008.32
– reference: C. Freitas, M. Morita, L. de Oliveira, E. Justino, A. Yacoubi, E. Lethelier, F. Bortolozzi, and R. Sabourin. 2000. Bases de dados de cheques bancários brasileiros. In XXVI Conferencia Latinoamericana de Informatica. 209--226.
– reference: L. G. Hafemann, R. Sabourin, and L. S. Oliveira. 2016. Writer-independent feature learning for offline signature verification using deep convolutional neural networks. In Int. Joint Conf. on Neural Networks (IJCNN’16). IEEE, 2576--2583.
– reference: Y. Akbari, M. J. Jalili, J. Sadri, K. Nouri, I. Siddiqi, and C. Djeddi. 2018. A novel database for automatic processing of Persian handwritten bank checks. Pattern Recognition 74 (2018), 253--265. 10.1016/j.patcog.2017.09.011
– reference: M. K. Kalera, S. Srihari, and A. Xu. 2004. Offline signature verification and identification using distance statistics. International Journal of Pattern Recognition and Artificial Intelligence 18, 7 (2004), 1339--1360.
– reference: M. A Ferrer, M. Diaz-Cabrera, and A. Morales. 2013. Synthetic off-line signature image generation. In Int. Conf. on Biometrics. IEEE, 1--7.
– reference: D. Rivard, E. Granger, and R. Sabourin. 2013. Multi-feature extraction and selection in writer-independent off-line signature verification. International Journal on Document Analysis and Recognition 16 (2013), 83--103. 10.1007/s10032-011-0180-6
– reference: K. Cpałka, M. Zalasiński, and L. Rutkowski. 2014. New method for the on-line signature verification based on horizontal partitioning. Pattern Recognition 47, 8 (2014), 2652--2661.
– reference: E. Onofri, M. Mercuri, M. Salesi, S. Ferrara, G. M. Troili, C. Simeone, M. R. Ricciardi, S. Ricci, and T. Archer. 2013. Dysgraphia in relation to cognitive performance in patients with Alzheimer’s disease. Journal of Intellectual Disability-Diagnosis and Treatment 1, 2 (2013), 113--124.
– reference: M. Parodi and J. C. Gómez. 2014. Legendre polynomials based feature extraction for online signature verification. Consistency analysis of feature combinations. Pattern Recognition 47, 1 (2014), 128--140. 10.1016/j.patcog.2013.06.026
– reference: O. Ureche and R. Plamondon. 1999. Document transport, transfer and exchange: Security and commercial aspects. In 5th Int. Conf. on Document Analysis and Recognition (ICDAR'99). 585--588.
– reference: F. Vargas, M. A. Ferrer, C. Travieso, and J. Alonso. 2007. Off-line handwritten signature GPDS-960 corpus. In Int. Conf. on Document Analysis and Recogn. (ICDAR'07), Vol. 2. 764--768.
– reference: K. Barkoula, G. Economou, and S. Fotopoulos. 2013. Online signature verification based on signatures turning angle representation using longest common subsequence matching. International Journal on Document Analysis and Recognition 16, 3 (2013), 261--272. 10.1007/s10032-012-0193-9
– reference: M. T. Ibrahim, M. Kyan, M. A. Khan, and L. Guan. 2010. On-line signature verification using 1-D velocity-based directional analysis. In 20th International Conference on Pattern Recognition (ICPR'10). 3830--3833. 10.1109/ICPR.2010.933
– reference: M. Bashir and F. Kempf. 2012. Advanced biometric pen system for recording and analyzing handwriting. Journal of Signal Processing Systems 68, 1 (2012), 75--81. 10.1007/s11265-011-0576-z
– reference: M. Frank, R. Biedert, E. Ma, I. Martinovic, and D. Song. 2013. Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Transactions on Information Forensics and Security 8, 1 (2013), 136--148. 10.1109/TIFS.2012.2225048
– reference: A. Parziale, S. G. Fuschetto, and A. Marcelli. 2013. Exploiting stability regions for online signature verification. In New Trends in Image Analysis and Processing. Lecture Notes in Computer Science, Vol. 8158. Springer, 112--121. 10.1007/978-3-642-41190-8_13
– reference: M. Blumenstein, M. A. Ferrer, and J. F. Vargas. 2010. The 4NSigComp2010 off-line signature verification competition: Scenario 2. In Int. Conf. on Frontiers in Handwriting Recognition, (ICFHR’10). 721--726. 10.1109/ICFHR.2010.117
– reference: M. I. Malik, S. Ahmed, A. Marcelli, U. Pal, M. Blumenstein, L. Alewijns, and M. Liwicki. 2015. ICDAR2015 competition on signature verification and writer identification for on- and off-line skilled forgeries (SigWIcomp2015). In 13th Int. Conf. on Document Analysis and Recognition (ICDAR'15). 1186--1190. 10.1109/ICDAR.2015.7333948
– reference: J. F. Vargas, M. A. Ferrer, C. M. Travieso, and J. B. Alonso. 2011. Off-line signature verification based on grey level information using texture features. Pattern Recognition 44, 2 (2011), 375--385. 10.1016/j.patcog.2010.07.028
– reference: Y. Elmir, Z. Elberrichi, and R. Adjoudj. 2014. Multimodal biometric using a hierarchical fusion of a person’s face, voice, and online signature.Journal of Information Processing Systems 10, 4 (2014), 555--567.
– reference: M. Parodi, J. C. Gómez, M. Liwicki, and L. Alewijnse. 2013. Orthogonal function representation for online signature verification: Which features should be looked at? IET Biometrics 2, 4 (2013), 137--150.
– reference: R. J. Verduijn, E. van den Heuvel, and R. Stoel. 2011. Forensic requirements for automated handwriting analysis systems. In Biennial Conf. of the Int. Graphonomics Society (IGS'11). 132--135.
– reference: K. Ahrabian and B. Babaali. 2017. On usage of autoencoders and siamese networks for online handwritten signature verification. Corr (2017). arXiv:1712.02781
– reference: R. Senatore and A. Marcelli. 2017. Do handwriting difficulties of Parkinson’s patients depend on their impaired ability to retain the motor plan? A pilot study. In 18th Biennial Conf. of the Int. Graphonomics Society (IGS'17). 139--142.
– reference: C. Rathgeb and A. Uhl. 2011. A survey on biometric cryptosystems and cancelable biometrics. EURASIP Journal on Information Security 2011, 1 (2011), 3.
– reference: C. Kahindo, S. Garcia-Salicetti, and N. Houmani. 2015. A signature complexity measure to select reference signatures for online signature verification. In Int. Conf. of the Biometrics Special Interest Group (BIOSIG’15). IEEE, 1--8.
– reference: A. Sharma and S. Sundaram. 2018. On the exploration of information from the DTW cost matrix for online signature verification. IEEE Transactions on Cybernetics 48, 2 (2018), 611--624.
– reference: S. Zhang and F. Li. 2012. Off-line handwritten Chinese signature verification based on support vector machine multiple classifiers. In Advances in Electric and Electronics. Springer, 563--568.
– reference: Y. Guerbai, Y. Chibani, and B. Hadjadji. 2015. The effective use of the one-class SVM classifier for handwritten signature verification based on writer-independent parameters. Pattern Recognition 48, 1 (2015), 103--113. 10.1016/j.patcog.2014.07.016
– reference: M. Diaz-Cabrera, A. Morales, and M. A Ferrer. 2014. Emerging issues for static handwritten signature biometric. In Advances in Digital Handwritten Signature Processing. A Human Artefact for e-Society. 111--122.
– reference: E. Maiorana and P. Campisi. 2010. Fuzzy commitment for function based signature template protection. IEEE Signal Processing Letters 17, 3 (2010), 249--252.
– reference: N. Sae-Bae and N. Memon. 2014. Online signature verification on mobile devices. IEEE Transactions on Information Forensics and Security 9, 6 (2014), 933--947. 10.1109/TIFS.2014.2316472
– reference: S. Al-Maadeed, W. Ayouby, A. Hassaine, A. Almejali, A. Al-Yazeedi, and R. Al-Atiya. 2012. Arabic signature verification dataset. In 13th Int. Arab Conf. on Information Technology. 288--293.
– reference: M. Diaz, M. A. Ferrer, and R. Sabourin. 2016. Approaching the intra-class variability in multi-script static signature evaluation. In 23rd Int. Conf. on Pattern Recognition (ICPR’16). IEEE, 1147--1152.
– reference: S. Nam, C. Seo, and D. Choi. 2016. Mobile finger signature verification robust to skilled forgery. Journal of the Korea Institute of Information Security 8 Cryptology 26, 5 (2016), 1161--1170.
– reference: M. Diaz-Cabrera, M. A. Ferrer, and A. Morales. 2014. Cognitive inspired model to generate duplicated static signature images. In Int. Conf. on Frontiers in Handwriting Recognition (ICFHR’14). 61--66.
– reference: A. Dutta, U. Pal, and J. Lladós. 2016. Compact correlated features for writer independent signature verification. In 23rd Int. Conf. on Pattern Recognition (ICPR'16). IEEE, 3422--3427.
– reference: H. Kim, S. Lee, and K. Yun. 2011. Capacitive tactile sensor array for touch screen application. Sensors and Actuators A: Physical 165, 1 (2011), 2--7.
– reference: A. Nordgaard and B. Rasmusson. 2012. The likelihood ratio as value of evidence - more than a question of numbers. Law, Probability and Risk 11, 4 (2012), 303--315.
– reference: Z. Zhang, X. Liu, and Y. Cui. 2016. Multi-phase offline signature verification system using deep convolutional generative adversarial networks. In 9th International Symposium on Computational Intelligence and Design (ISCID’16), Vol. 2. 103--107.
– reference: N. Houmani and S. Garcia-Salicetti. 2016. On hunting animals of the biometric menagerie for online signature. PLoS ONE 11, 4 (2016), e0151691.
– reference: M. Vijayanunni. 1998. Planning for 2001 census of India based on 1991 census. In18th Population Census Conf..
– reference: N. Zheng, K. Bai, H. Huang, and H. Wang. 2014. You are how you touch: User verification on smartphones via tapping behaviors. In Int. Conf. on Network Protocols (ICNP'14). IEEE, 221--232. 10.1109/ICNP.2014.43
– reference: K. Wang, Y. Wang, and Z. Zhang. 2011. On-line signature verification using graph representation. In 6th Int. Conf. on Image and Graphics (ICIG'11). 943--948. 10.1109/ICIG.2011.57
– reference: L. Nanni, E. Maiorana, A. Lumini, and P. Campisi. 2010. Combining local, regional and global matchers for a template protected on-line signature verification system. Expert Systems with Applications 37, 5 (2010), 3676--3684. 10.1016/j.eswa.2009.10.023
– reference: M. Fairhurst, M. Erbilek, and C. Li. 2014. Enhancing the forensic value of handwriting using emotion prediction. In Int. Workshop on Biometrics and Forensics (IWBF’14). 1--6.
– reference: R. Kumar, J. D. Sharma, and B. Chanda. 2012. Writer-independent off-line signature verification using surroundedness feature. Pattern Recognition Letters 33, 3 (2012), 301--308. 10.1016/j.patrec.2011.10.009
– reference: N. Houmani, A. Mayoue, S. Garcia-Salicetti, B. Dorizzi, M. I. Khalil, M. N. Moustafa, H. Abbas, D. Muramatsu, B. Yanikoglu, A. Kholmatov, M. Martinez-Diaz, J. Fierrez, J. Ortega-Garcia, J. Roure Alcobé, J. Fabregas, M. Faundez-Zanuy, J. M. Pascual-Gaspar, V. Cardeñoso-Payo, and C. Vivaracho-Pascual. 2012. BioSecure signature evaluation campaign (BSEC2009): Evaluating online signature algorithms depending on the quality of signatures. Pattern Recognition 45, 3 (2012), 993--1003. 10.1016/j.patcog.2011.08.008
– reference: E. J. Smits, A. J. Tolonen, L. Cluitmans, M. van Gils, B. A. Conway, R. C. Zietsma, K. L. Leenders, and N. M. Maurits. 2014. Standardized handwriting to assess bradykinesia, micrographia and tremor in Parkinson’s disease. PloS ONE 9, 5 (2014), e97614.
– reference: S. Pal, U. Pal, and M. Blumenstein. 2013. Hindi and English off-line signature identification and verification. In Proc. of Int. Conf. on Advances in Computing. Springer, New Delhi, 905--910.
– reference: S. Pal, U. Pal, and M. Blumenstein. 2013. Multi-script off-line signature verification: A two stage approach. In 2nd Int. Workshop on Automated Forensic Handwriting Analysis (AFHA'13). 31--35.
– reference: L. C. Alewijnse, C. E. van den Heuvel, R. D. Stoel, and K. Franke. 2009. Analysis of signature complexity. In Proceedings of the 14th Biennial Conf. of the Int. Graphonomics Society: Advances in Graphonomics. 6--9.
– reference: N. Houmani, S. Garcia, B. Dorizzi, J. Montalvao, J. Canuto, M. Andrade, Y. Qiao, X. Wang, T. Scheidat, A. Makrushin, D. Muramatsu, J. Putz, M. Kudelski, M. Faundez, J. Pascual, V. Cardeñoso, C. Vivaracho, E. Argones Rúa, J. Alba, A. Kholmatov, and B. Yanikoglu. 2011. BioSecure signature evaluation campaign (ESRA’2011): Evaluating systems on quality-based categories of skilled forgeries. In 2011 Int. Joint Conf. on Biometrics (IJCB’11). 1--10. 10.1109/IJCB.2011.6117487
– reference: B. Bhanu and A. Kumar. 2017. Deep Learning for Biometrics. Springer.
– reference: J. H. Yan, S. Rountree, P. Massman, R. S. Doody, and H. Li. 2008. Alzheimer’s disease and mild cognitive impairment deteriorate fine movement control. Journal of Psychiatric Research 42, 14 (2008), 1203--1212.
– reference: R. Plamondon, C. O’Reilly, and C. Ouellet-Plamondon. 2014. Strokes against stroke - strokes for strides. Pattern Recognition 47, 3 (2014), 929--944. 10.1016/j.patcog.2013.05.004
– reference: G. Chassang. 2017. The impact of the EU general data protection regulation on scientific research. Ecancermedicalscience 11, 709 (2017).
– reference: F. Costa and A. Accardo. 2017. Kinematic analysis of handwriting in parkinson disease. In 18th Conf. of the Int. Graphonomics Society (IGS'17). 135--138.
– reference: C. Rabasse, R. M. Guest, and M. C. Fairhurst. 2008. A new method for the synthesis of signature data with natural variability. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 38, 3 (2008), 691--699. 10.1109/TSMCB.2008.918575
– reference: A. Alaei, S. Pal, U. Pal, and M. Blumenstein. 2017. An efficient signature verification method based on an interval symbolic representation and a fuzzy similarity measure. IEEE Transactions on Information Forensics and Security 12, 10 (2017), 2360--2372.
– reference: T. Steinherz, D. Doermann, E. Rivlin, and N. Intrator. 2009. Offline loop investigation for handwriting analysis. IEEE Transactions on Pattern Analysis and Machine Intelligence 31, 2 (2009), 193--209. 10.1109/TPAMI.2008.68
– reference: H. Edwards, C. Gotsonis, et al. 2009. Strengthening Forensic Science in the United States: A Path Forward. National Academies Press.
– reference: J. Fierrez, J. Galbally, J. Ortega-Garcia, M. R. Freire, F. Alonso-Fernandez, D. Ramos, D. T. Toledano, J. Gonzalez-Rodriguez, J. A. Siguenza, J. Garrido-Salas, E. Anguiano, G. Gonzalez-de-Rivera, R. Ribalda, M. Faundez-Zanuy, J. A. Ortega, V. Cardenoso-Payo, A. Viloria, C. E. Vivaracho, Q. I. Moro, J. J. Igarza, J. Sanchez, I. Hernaez, C. Orrite-Uruñuela, F. Martinez-Contreras, and J. J. Gracia-Roche. 2010. BiosecurID: A multimodal biometric database. Pattern Analysis and Applications 13, 2 (2010), 235--246. 10.1007/s10044-009-0151-4
– reference: A. Fischer and R. Plamondon. 2017. Signature verification based on the kinematic theory of rapid human movements. IEEE Transactions on Human-Machine Systems 47, 2 (2017), 169--180.
– reference: L. G. Hafemann, R. Sabourin, and L. S. Oliveira. 2017. Offline handwritten signature verification - literature review. In 7th Int. Conf. on Image Processing Theory, Tools and Applications (IPTA’17). 1--5.
– reference: A. Woch, R. Plamondon, and C. O’Reilly. 2011. Kinematic characteristics of bidirectional delta-lognormal primitives in young and older subjects. Human Movement Science 30, 1 (2011), 1--17.
– reference: M. Schulte-Austum. 2013. D-Scribe. In Presentation at Measurement Science and Standards in Forensic Handwriting Analysis Conf.
– reference: M. Liwicki, C. E. van den Heuvel, B. Found, and M. I. Malik. 2010. Forensic signature verification competition 4NSigComp2010 - detection of simulated and disguised signatures. In 12th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'10). 715--720. 10.1109/ICFHR.2010.116
– reference: J. Guerra-Casanova, G. Sánchez-Ávila, C. Bailador, and A. de Santos-Sierra. 2011. Time series distances measures to analyze in-air signatures to authenticate users on mobile phones. In IEEE Int. Carnahan Conf. on Security Technology (ICCST’11). IEEE, 1--7.
– reference: S. Pal, U. Pal, and M. Blumenstein. 2013. Off-line verification technique for Hindi signatures. IET Biometrics 2, 4 (2013), 182--190.
– reference: R. Tolosana, R. Vera-Rodriguez, J. Ortega-Garcia, and J. Fierrez. 2015. Increasing the robustness of biometric templates for dynamic signature biometric systems. In Int. Carnahan Conf. on Security Technology (ICCST'15). IEEE, 229--234.
– reference: M. E. Yahyatabar and J. Ghasemi. 2017. Online signature verification using double-stage feature extraction modelled by dynamic feature stability experiment. IET Biometrics 6, 6 (2017), 393--401.
– reference: M. P. Caligiuri, H.-L. Teulings, C. E. Dean, and J. B. Lohr. 2015. A quantitative measure of handwriting dysfluency for assessing tardive dyskinesia. Journal of Clinical Psychopharmacology 35, 2 (2015), 168.
– reference: D.-Y. Yeung, H. Chang, Y. Xiong, S. George, R. Kashi, T. Matsumoto, and G. Rigoll. 2004. SVC2004: First International signature verification competition. In Biometric Authentication. LNCS, Vol. 3072. Springer, 16--22.
– reference: N. Houmani, S. Garcia-Salicetti, B. Dorizzi, and M. El-Yacoubi. 2010. On-line signature verification on a mobile platform. In Int. Conf. on Mobile Computing, Applications, and Services. Springer, 396--400.
– reference: M. B. Yılmaz and B. Yanıkoğlu. 2016. Score level fusion of classifiers in off-line signature verification. Information Fusion 32 (2016), 109--119. 10.1016/j.inffus.2016.02.003
– reference: Y. Meng, D. S. Wong, R. Schlegel, and L. Kwok. 2012. Touch gestures based biometric authentication scheme for touchscreen mobile phones. In Int. Conf. on Information Security and Cryptology. Springer, 331--350.
– reference: R. Plamondon, C. O'Reilly, C. Rémi, and T. Duval. 2013. The lognormal handwriter: Learning, performing, and declining. Frontiers in Psychology 4 (2013), 945.
– reference: R. Blanco-Gonzalo, R. Sanchez-Reillo, O. M. Hurtado, and J. Liu-Jimenez. 2013. Usability analysis of dynamic signature verification in mobile environments. In Int. Conf. of the Biometrics Special Interest Group (BIOSIG’13). IEEE, 1--9.
– reference: A. Mendaza-Ormaza, O. M. Hurtado, R. Sánchez-Reillo, and J. Uriarte. 2010. Analysis on the resolution of the different signals in an on-line handwritten signature verification system applied to portable devices. In IEEE Int. Carnahan Conf. on Security Technology (ICCST’10). 341--350.
– reference: U. Uludag, S. Pankanti, S. Prabhakar, and A. Jain. 2004. Biometric cryptosystems: Issues and challenges. Proceedings of the IEEE 92, 6 (2004), 948--960.
– reference: D. Impedovo and G. Pirlo. 2018. Dynamic handwriting analysis for the assessment of neurodegenerative diseases: A pattern recognition perspective. IEEE Reviews in Biomedical Engineering (2018).
– reference: S. Rosenblum, M. Samuel, S. Zlotnik, I. Erikh, and I. Schlesinger. 2013. Handwriting as an objective tool for Parkinson’s disease diagnosis. Journal of Neurology 260, 9 (2013), 2357--2361.
– reference: A. M. Huber, and R. A. Headrick. 1999. Handwriting Identification: Facts and Fundamentals. Boca Raton, CRC Press.
– reference: R. Plamondon and S. N. Srihari. 2000. On-line and off-line handwriting recognition: A comprehensive survey. IEEE Transactions on Pattern Analysis and Machine Intelligence 22, 1 (2000), 63--84. 10.1109/34.824821
– ident: e_1_2_1_7_1
  doi: 10.1109/TIFS.2017.2707332
– volume-title: Int. Joint Conf. on Neural Networks (IJCNN’16)
  ident: e_1_2_1_109_1
– volume-title: 6th Int. Symposium on Image and Signal Processing and Analysis. 546--549
  ident: e_1_2_1_44_1
– volume-title: Conf. on Biometrics (ICB’15)
  ident: e_1_2_1_102_1
– ident: e_1_2_1_193_1
  doi: 10.1142/S146902681340004X
– ident: e_1_2_1_91_1
  doi: 10.1016/j.patcog.2015.03.019
– ident: e_1_2_1_19_1
  doi: 10.1007/s10032-012-0193-9
– ident: e_1_2_1_16_1
  doi: 10.1109/TIFS.2011.2168213
– ident: e_1_2_1_151_1
  doi: 10.1109/ICDAR.2011.294
– volume-title: Proc. European Workshop on Biometrics and Identity Management (BioID’11)
  ident: e_1_2_1_101_1
– ident: e_1_2_1_224_1
  doi: 10.1007/s00415-013-6996-x
– ident: e_1_2_1_260_1
– volume-title: 23rd Int. Conf. on Pattern Recognition (ICPR'16)
  ident: e_1_2_1_61_1
– volume-title: 1st Int. Workshop on Automated Forensic Handwriting Analysis (AFHA’11)
  year: 2011
  ident: e_1_2_1_85_1
– ident: e_1_2_1_216_1
  doi: 10.1016/j.patcog.2018.04.012
– volume-title: Int. Conf. on Hybrid Intelligent Systems (HIS'12)
  ident: e_1_2_1_195_1
– volume-title: 19th Int. Conf. on Pattern Recognition (ICPR'08)
  ident: e_1_2_1_166_1
– ident: e_1_2_1_222_1
  doi: 10.1007/s40520-016-0549-y
– volume: 2
  volume-title: 9th International Symposium on Computational Intelligence and Design (ISCID’16)
  ident: e_1_2_1_275_1
– volume-title: 2nd Int. Workshop on Automated Forensic Handwriting Analysis (AFHA'13)
  ident: e_1_2_1_199_1
– volume-title: 14th Conf. of the Int. Graphonomics Society (IGS'09)
  ident: e_1_2_1_225_1
– volume-title: Biennial Conf. of the Int. Graphonomics Society (IGS'11)
  ident: e_1_2_1_257_1
– volume-title: Recent Progress in Graphonomics: Learn from the Past--Proceedings of the 16th Conf. of the Int
  ident: e_1_2_1_41_1
– volume-title: 15th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'16)
  ident: e_1_2_1_169_1
– volume-title: Proceedings of the 14th Biennial Conf. of the Int. Graphonomics Society: Advances in Graphonomics. 6--9.
  ident: e_1_2_1_8_1
– ident: e_1_2_1_58_1
  doi: 10.1109/TPAMI.2008.264
– ident: e_1_2_1_153_1
  doi: 10.1007/s11910-013-0369-9
– ident: e_1_2_1_201_1
  doi: 10.1016/j.patcog.2013.06.026
– ident: e_1_2_1_236_1
  doi: 10.1109/TCYB.2017.2647826
– ident: e_1_2_1_59_1
  doi: 10.1016/j.humov.2009.01.005
– volume-title: 2nd IEEE Intl. Conf. on Biometrics: Theory, Applications and Systems (BTAS’08)
  ident: e_1_2_1_120_1
– ident: e_1_2_1_10_1
  doi: 10.1109/ICDAR.2009.261
– ident: e_1_2_1_95_1
  doi: 10.1371/journal.pone.0069897
– ident: e_1_2_1_33_1
  doi: 10.1097/JCP.0000000000000277
– ident: e_1_2_1_131_1
  doi: 10.1109/FSKD.2009.597
– ident: e_1_2_1_162_1
  doi: 10.31974/jfde24-21-35
– ident: e_1_2_1_3_1
  doi: 10.1109/AICCSA.2008.4493644
– ident: e_1_2_1_273_1
  doi: 10.1049/iet-bmt.2015.0017
– volume-title: 14th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'14)
  ident: e_1_2_1_163_1
– ident: e_1_2_1_74_1
  doi: 10.1109/TCYB.2017.2751740
– volume: 3072
  volume-title: SVC2004: First International signature verification competition. In Biometric Authentication. LNCS
  ident: e_1_2_1_271_1
– ident: e_1_2_1_255_1
  doi: 10.1016/j.patcog.2010.07.028
– volume-title: 14th IAPR Int. Conf. on Document Analysis and Recognition (ICDAR’17)
  ident: e_1_2_1_49_1
– ident: e_1_2_1_205_1
  doi: 10.1109/ACPR.2013.164
– ident: e_1_2_1_125_1
  doi: 10.1109/RBME.2018.2840679
– volume-title: Int. Conf. on Practical Applications of Agents and Multi-Agent Systems (PAAMS'13)
  ident: e_1_2_1_143_1
– ident: e_1_2_1_156_1
  doi: 10.1109/LSP.2009.2038111
– volume-title: 21st Iranian Conf. on Electrical Engineering (ICEE’13)
  ident: e_1_2_1_267_1
– volume-title: Proc. 14th IAPR Int. Conference on Document Analysis and Recognition (ICDAR'17)
  ident: e_1_2_1_248_1
– ident: e_1_2_1_243_1
– volume-title: Handwriting analysis to support neurodegenerative diseases diagnosis: A review. Pattern Recognition Letters
  year: 2018
  ident: e_1_2_1_244_1
– ident: e_1_2_1_272_1
  doi: 10.1016/j.inffus.2016.02.003
– ident: e_1_2_1_235_1
  doi: 10.1109/TIFS.2016.2632063
– ident: e_1_2_1_172_1
  doi: 10.1109/CCST.2011.6095930
– volume-title: Int. Conf. on Information Security and Cryptology. Springer, 331--350
  ident: e_1_2_1_174_1
– ident: e_1_2_1_177_1
  doi: 10.13089/JKIISC.2016.26.5.1161
– ident: e_1_2_1_179_1
  doi: 10.1016/j.cose.2017.01.008
– ident: e_1_2_1_266_1
  doi: 10.1016/j.humov.2009.10.006
– volume-title: 6th Iranian Joint Congress on Fuzzy and Intelligent Systems. 205--209
  ident: e_1_2_1_72_1
– volume-title: International Workshop on Biometric Authentication. Springer, 295--306
  ident: e_1_2_1_81_1
– ident: e_1_2_1_144_1
  doi: 10.1016/j.patrec.2011.10.009
– ident: e_1_2_1_204_1
  doi: 10.1007/978-3-642-41190-8_13
– volume-title: 23rd Int. Conf. on Pattern Recognition (ICPR’16)
  ident: e_1_2_1_51_1
– ident: e_1_2_1_226_1
  doi: 10.1016/j.rasd.2015.11.004
– ident: e_1_2_1_223_1
  doi: 10.1007/s10032-011-0180-6
– volume-title: 7th IEEE Int. Conf. on Software Engineering and Service Science (ICSESS’16)
  ident: e_1_2_1_37_1
– ident: e_1_2_1_245_1
  doi: 10.1109/TPAMI.2008.68
– ident: e_1_2_1_103_1
  doi: 10.1109/TSMCB.2009.2034382
– ident: e_1_2_1_175_1
  doi: 10.1111/j.1556-4029.2010.01584.x
– volume-title: Symposium on Computational Intelligence in Biometrics and Identity Management. 45--52
  ident: e_1_2_1_67_1
– ident: e_1_2_1_128_1
  doi: 10.1109/ICFHR.2012.192
– volume-title: 49th IEEE Int. Carnahan Conf. on Security Technology (ICCST'15)
  ident: e_1_2_1_50_1
– volume-title: Biometrics Symposium. IEEE, 83--88
  ident: e_1_2_1_97_1
– ident: e_1_2_1_206_1
  doi: 10.1109/THMS.2015.2443050
– ident: e_1_2_1_4_1
– volume-title: 18th Conf. of the Int. Graphonomics Society (IGS'17)
  ident: e_1_2_1_38_1
– ident: e_1_2_1_126_1
  doi: 10.1109/ICFHR.2012.211
– ident: e_1_2_1_208_1
  doi: 10.1049/iet-bmt.2013.0012
– volume-title: 19th Iranian Conf. on Electrical Engineering (ICEE’11)
  ident: e_1_2_1_70_1
– ident: e_1_2_1_42_1
– ident: e_1_2_1_116_1
  doi: 10.1371/journal.pone.0151691
– ident: e_1_2_1_261_1
  doi: 10.1109/TIM.2009.2037871
– volume-title: Int. Conf. of the Biometrics Special Interest Group (BIOSIG’13)
  ident: e_1_2_1_27_1
– volume: 2
  volume-title: Int. Conf. on Document Analysis and Recogn. (ICDAR'07)
  ident: e_1_2_1_256_1
– volume-title: 17th Biennial Conf. of the Int. Graphonomics Society (IGS'15)
  ident: e_1_2_1_113_1
– ident: e_1_2_1_215_1
  doi: 10.1016/j.patcog.2013.05.004
– ident: e_1_2_1_34_1
  doi: 10.1016/j.psychres.2009.07.005
– volume-title: Int. Workshop on Information Forensics and Security (WIFS’15)
  ident: e_1_2_1_251_1
– ident: e_1_2_1_21_1
  doi: 10.1016/j.patcog.2011.10.011
– ident: e_1_2_1_86_1
– ident: e_1_2_1_191_1
  doi: 10.1049/ip-vis:20031078
– ident: e_1_2_1_53_1
  doi: 10.1109/ICDAR.2015.7333838
– ident: e_1_2_1_136_1
  doi: 10.1109/ICDAR.2013.83
– volume-title: Proc. 1st Intl. Conf. on Universal Access in Human-Computer Interaction.
  ident: e_1_2_1_69_1
– ident: e_1_2_1_43_1
  doi: 10.1049/iet-bmt.2016.0010
– ident: e_1_2_1_137_1
  doi: 10.1109/ACPR.2013.46
– ident: e_1_2_1_187_1
  doi: 10.1016/j.humov.2010.07.010
– volume-title: In18th Population Census Conf..
  year: 1998
  ident: e_1_2_1_259_1
– volume-title: 7th World Congress on Intelligent Control and Automation. 3778--3782
  ident: e_1_2_1_173_1
– ident: e_1_2_1_227_1
  doi: 10.1109/TIFS.2014.2316472
– ident: e_1_2_1_108_1
  doi: 10.1109/TPAMI.2008.302
– ident: e_1_2_1_200_1
  doi: 10.1049/iet-bmt.2013.0016
– volume-title: 7th Int. Conf. on Image Processing Theory, Tools and Applications (IPTA’17)
  ident: e_1_2_1_111_1
– volume-title: 1st Workshop on Image-based Smart City Applications: Int. Conf. on Image Analysis and Processing (ICIAP’15)
  ident: e_1_2_1_207_1
– ident: e_1_2_1_78_1
  doi: 10.1109/TIFS.2012.2190281
– ident: e_1_2_1_234_1
  doi: 10.1016/j.patrec.2016.07.015
– volume-title: 18th Biennial Conf. of the Int. Graphonomics Society. 131--134
  ident: e_1_2_1_35_1
– ident: e_1_2_1_123_1
  doi: 10.1109/TSMCC.2008.923866
– ident: e_1_2_1_232_1
  doi: 10.1016/j.imavis.2017.08.004
– ident: e_1_2_1_274_1
  doi: 10.1007/978-3-642-28744-2_74
– ident: e_1_2_1_52_1
  doi: 10.1109/TCYB.2016.2630419
– ident: e_1_2_1_124_1
  doi: 10.1109/ICFHR.2010.102
– volume-title: Int. Symposium on Signal Processing and Information Technology. IEEE, 315--319
  ident: e_1_2_1_98_1
– ident: e_1_2_1_127_1
  doi: 10.1016/S0031-3203(99)00047-3
– ident: e_1_2_1_181_1
  doi: 10.1109/ICDAR.2009.123
– ident: e_1_2_1_57_1
  doi: 10.1142/9789814579636_0009
– ident: e_1_2_1_66_1
  doi: 10.1049/iet-bmt.2013.0024
– ident: e_1_2_1_12_1
  doi: 10.1049/iet-bmt.2012.0048
– volume-title: IEEE Int. Carnahan Conf. on Security Technology (ICCST’10)
  ident: e_1_2_1_171_1
– ident: e_1_2_1_228_1
  doi: 10.1109/ICCEE.2008.157
– volume: 2014
  start-page: 1
  year: 2014
  ident: e_1_2_1_242_1
  article-title: An immune clonal selection algorithm for synthetic signature generation
  publication-title: Mathematical Problems in Engineering
  doi: 10.1155/2014/324645
– ident: e_1_2_1_159_1
  doi: 10.1109/ICDAR.2013.196
– volume-title: IEEE Int. Joint Conf. on Biometrics (IJCB’14)
  ident: e_1_2_1_155_1
– volume-title: Information technology - Biometric presentation attack detection - Part 1: Framework
  ident: e_1_2_1_1_1
– volume: 2
  volume-title: Int. Conf. on Document Analysis and Recognition
  ident: e_1_2_1_88_1
– ident: e_1_2_1_183_1
  doi: 10.1109/ICDAR.2015.7333874
– ident: e_1_2_1_218_1
  doi: 10.1109/34.824821
– volume-title: 17th Biennial Conf. of the Int. Graphonomics Society (IGS'15)
  ident: e_1_2_1_211_1
– ident: e_1_2_1_105_1
  doi: 10.1109/CCST.2011.6095931
– ident: e_1_2_1_184_1
  doi: 10.1109/BTAS.2017.8272676
– ident: e_1_2_1_64_1
  doi: 10.1016/j.ins.2013.09.004
– volume-title: IEEE 3rd Int. Conf. on Biometrics: Theory, Applications, and Systems. 1--6.
  ident: e_1_2_1_117_1
– volume-title: 14th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR’14)
  ident: e_1_2_1_202_1
– ident: e_1_2_1_26_1
  doi: 10.1049/iet-bmt.2013.0044
– volume-title: Int. Conf. on Computational Intelligence and Software Engineering (CiSE'09)
  ident: e_1_2_1_130_1
– ident: e_1_2_1_167_1
  doi: 10.1049/iet-bmt.2013.0081
– ident: e_1_2_1_219_1
  doi: 10.1109/TSMCB.2008.918575
– ident: e_1_2_1_18_1
  doi: 10.1016/j.patcog.2011.04.010
– ident: e_1_2_1_83_1
  doi: 10.1109/THMS.2016.2634922
– ident: e_1_2_1_278_1
  doi: 10.1016/j.patcog.2016.01.009
– volume-title: 13th Int. Arab Conf. on Information Technology. 288--293
  ident: e_1_2_1_6_1
– ident: e_1_2_1_189_1
  doi: 10.3389/fnagi.2014.00150
– ident: e_1_2_1_140_1
  doi: 10.1007/s10044-008-0118-x
– volume-title: Int. Symposium on Visual Computing. Springer, 616--625
  ident: e_1_2_1_220_1
– ident: e_1_2_1_15_1
  doi: 10.1109/TSMCB.2012.2188508
– volume-title: Int. Conf. on Signal and Image Processing Applications (ICSIPA'09)
  ident: e_1_2_1_229_1
– ident: e_1_2_1_238_1
  doi: 10.1016/j.bandl.2006.12.002
– volume-title: Proc. of Int. Conf. on Advances in Computing. Springer
  ident: e_1_2_1_198_1
– ident: e_1_2_1_99_1
  doi: 10.4304/jmm.4.3.137-144
– ident: e_1_2_1_29_1
  doi: 10.1109/ICFHR.2010.117
– ident: e_1_2_1_107_1
  doi: 10.1016/j.eswa.2017.03.024
– volume-title: Int. Conf. of the Biometrics Special Interest Group (BIOSIG’15)
  ident: e_1_2_1_133_1
– ident: e_1_2_1_230_1
– ident: e_1_2_1_190_1
  doi: 10.1109/TPAMI.2009.76
– ident: e_1_2_1_20_1
  doi: 10.1007/s11265-011-0576-z
– ident: e_1_2_1_92_1
  doi: 10.1109/ICDAR.2009.38
– volume-title: 12th IAPR Workshop on Document Analysis Systems (DAS’16)
  ident: e_1_2_1_192_1
– ident: e_1_2_1_210_1
  doi: 10.1007/978-3-642-41190-8_14
– ident: e_1_2_1_79_1
  doi: 10.1007/s10044-009-0151-4
– ident: e_1_2_1_122_1
  doi: 10.1109/ICPR.2010.933
– ident: e_1_2_1_158_1
  doi: 10.1109/DAS.2012.10
– ident: e_1_2_1_276_1
  doi: 10.1109/ICNP.2014.43
– volume-title: The Neuroscience of Handwriting: Applications for Forensic Document Examination
  ident: e_1_2_1_32_1
– volume-title: 5th Int. Conf. on Document Analysis and Recognition (ICDAR'99)
  ident: e_1_2_1_254_1
– ident: e_1_2_1_268_1
  doi: 10.1049/iet-bmt.2016.0103
– ident: e_1_2_1_55_1
  doi: 10.1371/journal.pone.0123254
– ident: e_1_2_1_135_1
  doi: 10.1109/TPAMI.2008.32
– ident: e_1_2_1_93_1
  doi: 10.1016/j.patcog.2011.12.007
– volume-title: Biometrics Symposium
  year: 2007
  ident: e_1_2_1_9_1
– ident: e_1_2_1_2_1
  doi: 10.1007/978-3-642-41190-8_15
– ident: e_1_2_1_194_1
  doi: 10.1109/DICTA.2011.119
– volume-title: 4th Int. Workshop on Biometrics and Forensics. IEEE, 1--6.
  ident: e_1_2_1_100_1
– ident: e_1_2_1_178_1
  doi: 10.1016/j.eswa.2009.10.023
– ident: e_1_2_1_23_1
  doi: 10.1007/978-3-319-61657-5
– volume: 8
  start-page: 55
  year: 2013
  ident: e_1_2_1_237_1
  article-title: Post-stroke writing and reading disorders
  publication-title: Sanamed
– volume-title: IEEE Int. Carnahan Conf. on Security Technology (ICCST’16)
  ident: e_1_2_1_154_1
– ident: e_1_2_1_233_1
  doi: 10.1007/s12559-011-9119-y
– ident: e_1_2_1_241_1
  doi: 10.1049/iet-bmt.2015.0058
– volume: 3
  volume-title: Int. Conf. on Machine Learning and Cybernetics
  year: 2009
  ident: e_1_2_1_45_1
– ident: e_1_2_1_148_1
  doi: 10.1109/HICSS.2016.683
– ident: e_1_2_1_214_1
  doi: 10.1016/0031-3203(89)90059-9
– volume-title: United States: A Path Forward
  year: 2009
  ident: e_1_2_1_62_1
– ident: e_1_2_1_165_1
  doi: 10.1016/j.patrec.2016.06.016
– ident: e_1_2_1_160_1
  doi: 10.1109/ICDAR.2015.7333948
– ident: e_1_2_1_14_1
  doi: 10.1155/2018/3127042
– volume: 3
  volume-title: Proc. 1992 IJCNN Int. Joint Conf. on Neural Networks (IJCNN'92)
  ident: e_1_2_1_252_1
– ident: e_1_2_1_75_1
  doi: 10.1109/TPAMI.2016.2582167
– ident: e_1_2_1_84_1
  doi: 10.1109/ICFHR.2012.254
– ident: e_1_2_1_112_1
  doi: 10.1109/TIFS.2016.2521611
– ident: e_1_2_1_150_1
  doi: 10.1109/ICFHR.2012.217
– ident: e_1_2_1_152_1
  doi: 10.1109/ICFHR.2010.116
– ident: e_1_2_1_188_1
  doi: 10.1016/j.humov.2012.07.005
– volume-title: Proceedings of the 5th International Conference on Recent Achievements in Mechatronics, Automation, Computer Sciences and Robotics (MACRo'17)
  ident: e_1_2_1_13_1
– ident: e_1_2_1_114_1
  doi: 10.1145/2501988.2502021
– volume-title: Int. Conf. on Mobile Computing, Applications, and Services. Springer, 396--400
  ident: e_1_2_1_118_1
– volume-title: Int. Joint Conf. on Neural Networks (IJCNN’12)
  ident: e_1_2_1_197_1
– ident: e_1_2_1_221_1
  doi: 10.1186/1687-417X-2011-3
– ident: e_1_2_1_22_1
  doi: 10.1016/j.patcog.2009.05.009
– volume-title: 1st Int. Workshop on Automated Forensic Handwriting Analysis (AFHA'11)
  ident: e_1_2_1_196_1
– ident: e_1_2_1_5_1
  doi: 10.1016/j.patcog.2017.09.011
– ident: e_1_2_1_110_1
  doi: 10.1016/j.patcog.2017.05.012
– ident: e_1_2_1_239_1
  doi: 10.1371/journal.pone.0097614
– ident: e_1_2_1_104_1
  doi: 10.1016/j.patcog.2014.07.016
– ident: e_1_2_1_48_1
  doi: 10.1109/TPAMI.2016.2560810
– ident: e_1_2_1_24_1
  doi: 10.1016/j.humov.2010.08.008
– ident: e_1_2_1_146_1
  doi: 10.1504/IJBM.2010.030415
– ident: e_1_2_1_106_1
  doi: 10.1049/iet-bmt.2013.0022
– ident: e_1_2_1_138_1
  doi: 10.1109/ICFHR.2010.70
– ident: e_1_2_1_168_1
  doi: 10.1002/mds.25894
– ident: e_1_2_1_39_1
  doi: 10.1016/j.eswa.2013.12.047
– ident: e_1_2_1_262_1
  doi: 10.1109/TIE.2009.2038339
– ident: e_1_2_1_263_1
  doi: 10.1109/ICIG.2011.57
– ident: e_1_2_1_212_1
  doi: 10.1142/9789814579636_0001
– ident: e_1_2_1_265_1
  doi: 10.1123/mcj.14.1.1
– volume-title: 14th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR’14)
  ident: e_1_2_1_56_1
– ident: e_1_2_1_182_1
  doi: 10.1093/lpr/mgs019
– ident: e_1_2_1_121_1
  doi: 10.1201/9781420048773
– ident: e_1_2_1_180_1
  doi: 10.1145/1815330.1815390
– ident: e_1_2_1_157_1
  doi: 10.1109/TSMCA.2010.2041653
– volume-title: 18th Biennial Conf. of the Int. Graphonomics Society (IGS'17)
  ident: e_1_2_1_231_1
– ident: e_1_2_1_161_1
  doi: 10.1109/ICDAR.2013.220
– volume-title: The impact of the EU general data protection regulation on scientific research. Ecancermedicalscience 11, 709
  year: 2017
  ident: e_1_2_1_36_1
– ident: e_1_2_1_63_1
  doi: 10.3745/JIPS.02.0007
– volume-title: 2nd Int. Conf. on E-Business and Information System Security. 1--4.
  ident: e_1_2_1_129_1
– volume-title: Int. Workshop on Biometrics and Forensics (IWBF’14)
  ident: e_1_2_1_68_1
– ident: e_1_2_1_119_1
  doi: 10.1016/j.patcog.2011.08.008
– ident: e_1_2_1_30_1
  doi: 10.1016/j.eswa.2018.04.035
– ident: e_1_2_1_90_1
  doi: 10.1016/j.engappai.2005.12.006
– ident: e_1_2_1_40_1
  doi: 10.1016/j.patcog.2014.02.012
– ident: e_1_2_1_209_1
  doi: 10.1109/THMS.2013.2279008
– ident: e_1_2_1_60_1
  doi: 10.1016/j.humov.2014.07.006
– ident: e_1_2_1_132_1
  doi: 10.1007/s10623-005-6343-z
– volume-title: Interpreting Evidence: Evaluating Forensic Science in the Courtroom.
  year: 2016
  ident: e_1_2_1_17_1
– volume-title: Int. Conf. on Frontiers in Handwriting Recognition (ICFHR’14)
  ident: e_1_2_1_54_1
– ident: e_1_2_1_203_1
  doi: 10.1049/iet-bmt.2013.0025
– ident: e_1_2_1_247_1
  doi: 10.1109/ACCESS.2018.2793966
– volume-title: IEEE Int. Carnahan Conf. on Security Technology (ICCST’12)
  ident: e_1_2_1_25_1
– ident: e_1_2_1_186_1
  doi: 10.1016/j.patcog.2008.10.017
– ident: e_1_2_1_31_1
  doi: 10.1109/21.229453
– ident: e_1_2_1_80_1
  doi: 10.1007/978-0-387-71041-9_10
– ident: e_1_2_1_89_1
– volume-title: 15th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR'16)
  ident: e_1_2_1_47_1
– volume-title: Proc. IEEE Int. Carnahan Conf. on Security Technology (ICCST’13)
  ident: e_1_2_1_77_1
– ident: e_1_2_1_28_1
  doi: 10.1109/ICDAR.2009.216
– ident: e_1_2_1_46_1
– ident: e_1_2_1_96_1
  doi: 10.1016/j.patcog.2011.12.011
– volume-title: Int. Carnahan Conf. on Security Technology (ICCST'15)
  ident: e_1_2_1_249_1
– ident: e_1_2_1_134_1
  doi: 10.1142/S0218001404003630
– ident: e_1_2_1_87_1
  doi: 10.1109/TIFS.2012.2225048
– volume: 1
  start-page: 7
  year: 2012
  ident: e_1_2_1_139_1
  article-title: Persian signature verification using convolutional neural networks
  publication-title: International Journal of Engineering Research and Technology
– ident: e_1_2_1_240_1
  doi: 10.1016/j.patrec.2016.05.023
– ident: e_1_2_1_82_1
  doi: 10.1109/ICDAR.2015.7333760
– volume-title: National Workshop on Information Assurance Research. 1--6.
  year: 2012
  ident: e_1_2_1_164_1
– ident: e_1_2_1_71_1
  doi: 10.1016/j.compeleceng.2016.11.010
– ident: e_1_2_1_141_1
  doi: 10.1016/j.sna.2009.12.031
– volume-title: Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM’11)
  ident: e_1_2_1_65_1
– ident: e_1_2_1_246_1
  doi: 10.1371/journal.pone.0176792
– volume-title: Int. Joint Conf. on Biometrics (IJCB'17)
  ident: e_1_2_1_94_1
– ident: e_1_2_1_270_1
  doi: 10.1080/02687030050174638
– volume-title: 15th Workshop on Statistical Signal Processing (SSP'09)
  ident: e_1_2_1_277_1
– ident: e_1_2_1_149_1
  doi: 10.1109/TCYB.2014.2375959
– volume: 9
  start-page: 113
  year: 2005
  ident: e_1_2_1_258_1
  article-title: A behavioural biometrics
  publication-title: Public Service Review: European Union
– volume-title: Int. Conf. on Biometrics. IEEE, 1--7.
  ident: e_1_2_1_76_1
– ident: e_1_2_1_73_1
  doi: 10.1109/TPAMI.2014.2343981
– ident: e_1_2_1_142_1
  doi: 10.1016/j.patrec.2012.10.011
– volume: 1
  start-page: 113
  year: 2013
  ident: e_1_2_1_185_1
  article-title: Dysgraphia in relation to cognitive performance in patients with Alzheimer’s disease
  publication-title: Journal of Intellectual Disability-Diagnosis and Treatment
  doi: 10.6000/2292-2598.2013.01.02.4
– ident: e_1_2_1_269_1
  doi: 10.1016/j.jpsychires.2008.01.006
– ident: e_1_2_1_11_1
– ident: e_1_2_1_253_1
  doi: 10.1109/JPROC.2004.827372
– ident: e_1_2_1_147_1
  doi: 10.4103/2349-5014.170619
– ident: e_1_2_1_213_1
  doi: 10.3389/fpsyg.2013.00945
– ident: e_1_2_1_250_1
  doi: 10.1109/ACCESS.2015.2431493
– ident: e_1_2_1_115_1
  doi: 10.1109/IJCB.2011.6117487
– ident: e_1_2_1_217_1
  doi: 10.1007/978-0-85729-859-1_30
– ident: e_1_2_1_264_1
  doi: 10.1080/13554794.2013.860178
– volume-title: 14th IAPR Int. Conf. on Document Analysis and Recognition (ICDAR’17)
  ident: e_1_2_1_145_1
– ident: e_1_2_1_176_1
  doi: 10.1049/iet-bmt.2016.0115
SSID ssj0002416
Score 2.6374207
SecondaryResourceType review_article
Snippet Handwritten signatures are biometric traits at the center of debate in the scientific community. Over the last 40 years, the interest in signature studies has...
SourceID proquest
crossref
acm
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1
SubjectTerms Access control
Applied computing
Authentication
Biometrics
Computer forensics
Computer science
Data structures design and analysis
Design and analysis of algorithms
Document analysis
Document capture
Document management and text processing
Document types
Domains
General and reference
Handwriting
Pattern matching
Security and privacy
Security services
Signature analysis
Signatures
Surveys and overviews
System forensics
Theory of computation
SubjectTermsDisplay Applied computing -- Computer forensics -- System forensics
Applied computing -- Document management and text processing -- Document capture -- Document analysis
General and reference -- Document types -- Surveys and overviews
Security and privacy -- Security services -- Access control
Security and privacy -- Security services -- Authentication -- Biometrics
Theory of computation -- Design and analysis of algorithms -- Data structures design and analysis -- Pattern matching
Title A Perspective Analysis of Handwritten Signature Technology
URI https://dl.acm.org/doi/10.1145/3274658
https://www.proquest.com/docview/2241328406
Volume 51
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3JbtswECWyXHJJ2iyI27TgIejFkCNZ1JabkQVuUeXiBPBNoEgqFRBbhW0lQL8-w03yEqBNL4JBiBTMGc28Gc08InQecw6wG6ITcAfEIYxxJ2dJ4YSx9M4uc12hqi3uwuED-TEOxm0pr-ouWeQ99ufNvpL_kSqMgVxll-w7JNssCgPwG-QLV5AwXP9JxgNVwG56JVf4RYZ0yl8g7gdE3B2Vj5q-cz2Pbslnr1JVWV6rCuh5PXsG6TYAt6QqxZxW5XypV0TMzDHYaflYC5Byr9ExwOG8eq40OocHV23S-6lUtjetf9HJhPLu98nMKKfJO3iJ5Tss2n4r1wEToYeEMZ9B5ES-prKy9tUQypYbxtJb8rqa0WjTnhNJfeFD6BxqhvdVxuw1T9bUF-pu6yAzE7fRbh-iCDCDu4Pr9OeocdUAX8zHbP1XdFe1nHphpkrQwiaroGXVZysgcv8B7ZsIAg-0OnxEW2J6iA7s6RzYGOsjdDnAS9qBrXbgqsBL2oEb7cCtdhyjh9ub-6uhY07KcKgfeQsnJIIJxkMCcFsESeAnnAqf-CLmURQkOZfZB6_vCVHkEZOvUBHwhEdBnlM_dql_gnam1VScIhxTzkQ_TxgnEPvL7AEXADJJ7MEzPJZ00CFsSPZbc6HYHe6gb3aDMmbI5eUZJ0_Zmig6CDc32jU2bjmzO5yZl22eqe-_AKXc8NPfV_iM9lqNPUM7i1ktvgB2XORfjQa8AkS4bMk
linkProvider EBSCOhost
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Perspective+Analysis+of+Handwritten+Signature+Technology&rft.jtitle=ACM+computing+surveys&rft.au=Diaz%2C+Moises&rft.au=Ferrer%2C+Miguel+A.&rft.au=Impedovo%2C+Donato&rft.au=Malik%2C+Muhammad+Imran&rft.date=2019-11-30&rft.issn=0360-0300&rft.eissn=1557-7341&rft.volume=51&rft.issue=6&rft.spage=1&rft.epage=39&rft_id=info:doi/10.1145%2F3274658&rft.externalDBID=n%2Fa&rft.externalDocID=10_1145_3274658
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0360-0300&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0360-0300&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0360-0300&client=summon