{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,24]],"date-time":"2024-08-24T19:12:01Z","timestamp":1724526721153},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2021,5,14]],"date-time":"2021-05-14T00:00:00Z","timestamp":1620950400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,5,14]],"date-time":"2021-05-14T00:00:00Z","timestamp":1620950400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-021-11063-z","type":"journal-article","created":{"date-parts":[[2021,5,14]],"date-time":"2021-05-14T14:02:54Z","timestamp":1621000974000},"page":"15195-15221","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Online signature verification based on dynamic features from gene expression programming"],"prefix":"10.1007","volume":"83","author":[{"given":"Hua","family":"Tan","sequence":"first","affiliation":[]},{"given":"Lang","family":"He","sequence":"additional","affiliation":[]},{"given":"Zhang-Can","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Hang","family":"Zhan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,14]]},"reference":[{"issue":"2","key":"11063_CR1","first-page":"46","volume":"2","author":"MJ Alhaddad","year":"2012","unstructured":"Alhaddad MJ (2012) Multiple classifiers to verify the online signature. World of Computer Science & Information Technology Journal 2(2):46\u201350","journal-title":"World of Computer Science & Information Technology Journal"},{"key":"11063_CR2","first-page":"410","volume-title":"On-line signature verification using point pattern matching algorithm","author":"N Aqili","year":"2016","unstructured":"Aqili N, Maazouzi A, Raji M (2016) On-line signature verification using point pattern matching algorithm. International Conference on Electrical and Information Technologies, In, pp 410\u2013413"},{"issue":"1","key":"11063_CR3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2299\/jsp.21.1","volume":"21","author":"C Che","year":"2017","unstructured":"Che C, Yu X, Sun X et al (2017) Image retrieval by information fusion based on scalable vocabulary tree and robust Hausdorff distance. EURASIP Journal on Advances in Signal Processing 21(1):1\u201313","journal-title":"EURASIP Journal on Advances in Signal Processing"},{"key":"11063_CR4","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.asoc.2016.02.017","volume":"43","author":"K Cpaka","year":"2016","unstructured":"Cpaka K, Zalasiski M, Rutkowski L (2016) A new algorithm for identity verification based on the analysis of a handwritten dynamic signature. Appl Soft Comput 43:47\u201356","journal-title":"Appl Soft Comput"},{"issue":"9","key":"11063_CR5","doi-asserted-by":"publisher","first-page":"4170","DOI":"10.1016\/j.eswa.2013.12.047","volume":"41","author":"K Cpa\u0142ka","year":"2014","unstructured":"Cpa\u0142ka K, Zalasi\u0144ski M (2014) On-line signature verification using vertical signature partitioning. Expert Systems and Applications 41(9):4170\u20134180","journal-title":"Expert Systems and Applications"},{"issue":"8","key":"11063_CR6","doi-asserted-by":"publisher","first-page":"2652","DOI":"10.1016\/j.patcog.2014.02.012","volume":"47","author":"K Cpa\u0142ka","year":"2014","unstructured":"Cpa\u0142ka K, Zalasi\u0144ski M, Rutkowski L (2014) New method for the on-line signature verification based on horizontal partitioning. Pattern Recogn 47(8):2652\u20132661","journal-title":"Pattern Recogn"},{"issue":"1","key":"11063_CR7","first-page":"921","volume":"171","author":"R Doroz","year":"2016","unstructured":"Doroz R, Porwik P, Orczyk T (2016) Dynamic signature verification method based on association of features with similarity measures. Neuro-computing 171(1):921\u2013931","journal-title":"Neuro-computing"},{"issue":"2","key":"11063_CR8","doi-asserted-by":"publisher","first-page":"7229","DOI":"10.1007\/s10586-017-1129-4","volume":"22","author":"MY Durrani","year":"2019","unstructured":"Durrani MY, Khan S, Khalid S (2019) VerSig: a new approach for online signature verification. Clust Comput 22(2):7229\u20137239","journal-title":"Clust Comput"},{"issue":"2","key":"11063_CR9","first-page":"9","volume":"33","author":"L Fang","year":"2012","unstructured":"Fang L, Lu W, Huang W (2012) Estimate algorithms and embedded crafts of curvature and torsion. Journal of Graphics 33(2):9\u201313","journal-title":"Journal of Graphics"},{"key":"11063_CR10","doi-asserted-by":"crossref","unstructured":"Fang X, Wu S, Liu J (2017) Discrete curvature and torsion-based parameterization scheme for data points. 7-th International Conference on Computer Engineering & Networks, pp. 1-12","DOI":"10.22323\/1.299.0093"},{"issue":"2","key":"11063_CR11","first-page":"87","volume":"13","author":"C Ferreira","year":"2001","unstructured":"Ferreira C (2001) Gene expression programming: a new adaptive algorithm for solving problems. Complex Systems 13(2):87\u2013129","journal-title":"Complex Systems"},{"issue":"2","key":"11063_CR12","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s10710-014-9231-3","volume":"16","author":"CH Garcia-Capulin","year":"2015","unstructured":"Garcia-Capulin CH, Cuevas FJ, Trejo-Caballero G, Rostro-Gonzalez H (2015) A hierarchical genetic algorithm approach for curve fitting with B-splines. Genet Program Evolvable Mach 16(2):151\u2013166","journal-title":"Genet Program Evolvable Mach"},{"issue":"14","key":"11063_CR13","doi-asserted-by":"publisher","first-page":"19253","DOI":"10.1007\/s11042-019-7264-6","volume":"78","author":"L He","year":"2019","unstructured":"He L, Tan H, Huang Z (2019) Online handwritten signature verification based on Association of Curvature and Torsion Feature with Hausdorff distance. Multimed Tools Appl 78(14):19253\u201319278","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"11063_CR14","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/s10044-008-0118-x","volume":"12","author":"A Kholmatov","year":"2009","unstructured":"Kholmatov A, Yanikoglu B (2009) SUSIG: an on-line handwritten signature database, associated protocols and benchmark results. Pattern Anal Applic 12(3):227\u2013236","journal-title":"Pattern Anal Applic"},{"key":"11063_CR15","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.patrec.2016.06.016","volume":"80","author":"KS Manjunatha","year":"2016","unstructured":"Manjunatha KS, Manjunath S, Guru DS, Somashekara MT (2016) Online signature verification based on writer dependent features and classifiers. Pattern Recogn Lett 80:129\u2013136","journal-title":"Pattern Recogn Lett"},{"issue":"C","key":"11063_CR16","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1016\/j.asoc.2015.11.039","volume":"40","author":"SY Ooi","year":"2016","unstructured":"Ooi SY, Teoh ABJ, Pang YH, Hiew BY (2016) Image-based handwritten signature verification using hybrid methods of discrete radon transform, principal component analysis and probabilistic neural network. Appl Soft Comput 40(C):274\u2013282","journal-title":"Appl Soft Comput"},{"issue":"6","key":"11063_CR17","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1049\/ip-vis:20031078","volume":"150","author":"J Ortega-Garcia","year":"2003","unstructured":"Ortega-Garcia J, Fierrez-Aguilar J, Simon D, Gonzalez J, Faundez-Zanuy M, Espinosa V, Satue A, Hernaez I, Igarza JJ, Vivaracho C, Escudero D, Moro QI (2003) Biometric on the internet MCYT baseline corpus: a bimodal biometric database. IEE Proceedings-Vision Image and Signal Processing 150(6):395\u2013401","journal-title":"IEE Proceedings-Vision Image and Signal Processing"},{"issue":"1","key":"11063_CR18","doi-asserted-by":"publisher","first-page":"3067","DOI":"10.1007\/s00500-017-2954-3","volume":"23","author":"OP Patel","year":"2019","unstructured":"Patel OP, Tiwari A, Chaudhary R, Nuthalapati SV, Bharill N, Prasad M, Hussain FK, Hussain OK (2019) Enhanced quantum-based neural network learning and its application to signature verification. Soft Comput 23(1):3067\u20133080","journal-title":"Soft Comput"},{"issue":"1","key":"11063_CR19","first-page":"293","volume":"137","author":"Y Peng","year":"2014","unstructured":"Peng Y, Yuan C, Qin X, Huang JT, Shi YB (2014) An improved gene expression programming approach for symbolic regression problems. Neuro-computing 137(1):293\u2013301","journal-title":"Neuro-computing"},{"issue":"6","key":"11063_CR20","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1109\/THMS.2015.2443050","volume":"45","author":"G Pirlo","year":"2015","unstructured":"Pirlo G, Cuccovillo V, Diaz-Cabrera M, Impedovo D, Mignone P (2015) Multi-domain verification of dynamic signatures using local stability analysis. IEEE Transactions on Human-Machine Systems 45(6):805\u2013810","journal-title":"IEEE Transactions on Human-Machine Systems"},{"key":"11063_CR21","doi-asserted-by":"publisher","first-page":"1039","DOI":"10.4028\/www.scientific.net\/AMM.635-637.1039","volume":"635","author":"HQ Qiang","year":"2014","unstructured":"Qiang HQ, Qian CH, Gong SR (2014) Similarity measure for image retrieval based on Hausdorff distance. Appl Mech Mater 635:1039\u20131044","journal-title":"Appl Mech Mater"},{"key":"11063_CR22","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.patrec.2016.07.015","volume":"84","author":"A Sharma","year":"2016","unstructured":"Sharma A, Sundaram S (2016) An enhanced contextual DTW based system for online signature verification using vector quantization. Pattern Recogn Lett 84:22\u201328","journal-title":"Pattern Recogn Lett"},{"issue":"3","key":"11063_CR23","doi-asserted-by":"publisher","first-page":"705","DOI":"10.1109\/TIFS.2016.2632063","volume":"12","author":"A Sharma","year":"2017","unstructured":"Sharma A, Sundaram S (2017) A novel online signature verification system based on GMM features in a DTW framework. IEEE Transactions on Information Forensics & Security 12(3):705\u2013718","journal-title":"IEEE Transactions on Information Forensics & Security"},{"issue":"4","key":"11063_CR24","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1109\/TIFS.2017.2769023","volume":"13","author":"L Tang","year":"2018","unstructured":"Tang L, Kang W, Fang Y (2018) Information divergence-based matching strategy for online signature verification. IEEE Transactions on Forensic Information and Security 13(4):861\u2013873","journal-title":"IEEE Transactions on Forensic Information and Security"},{"key":"11063_CR25","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1016\/j.patcog.2017.09.033","volume":"74","author":"X Xia","year":"2018","unstructured":"Xia X, Song X, Luan F, Zheng J, Chen Z, Ma X (2018) Discriminative feature selection for on-line signature verification. Pattern Recogn 74:422\u2013433","journal-title":"Pattern Recogn"},{"issue":"23","key":"11063_CR26","doi-asserted-by":"publisher","first-page":"7811","DOI":"10.1007\/s00500-018-3477-2","volume":"22","author":"L Yang","year":"2018","unstructured":"Yang L, Cheng YT, Wang XM, Liu Q (2018) Online handwritten signature verification using feature weighting algorithm relief. Soft Comput 22(23):7811\u20137823","journal-title":"Soft Comput"},{"key":"11063_CR27","doi-asserted-by":"publisher","first-page":"1691","DOI":"10.1007\/s10586-018-1749-3","volume":"22","author":"L Yang","year":"2019","unstructured":"Yang L, Jin X, Jiang Q (2019) Online handwritten signature verification based on the most stable feature and partition. Clust Comput 22:1691\u20131701","journal-title":"Clust Comput"},{"key":"11063_CR28","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-25948-0_3","volume":"5","author":"DY Yeung","year":"2004","unstructured":"Yeung DY, George S, Kashi R, Matsumoto T, Rigoll G (2004) SVC 2004: first international signature verification competition. Proceedings of the International Conference on Biometric Authentication 5:16\u201322","journal-title":"Proceedings of the International Conference on Biometric Authentication"},{"issue":"11","key":"11063_CR29","first-page":"1318","volume":"3","author":"CT Yuen","year":"2011","unstructured":"Yuen CT, Lim WL, Tan CS et al (2011) Probabilistic model for dynamic signature verification system. Res J Appl Sci Eng Technol 3(11):1318\u20131322","journal-title":"Res J Appl Sci Eng Technol"},{"key":"11063_CR30","first-page":"232","volume-title":"An idea of the dynamic signature verification based on a hybrid approach","author":"M Zalasi\u0144ski","year":"2016","unstructured":"Zalasi\u0144ski M, Cpa\u0142ka K, Rakus-Andersson E (2016) An idea of the dynamic signature verification based on a hybrid approach. Springer International Publishing, International Conference on Artificial Intelligence and Soft Computing, pp 232\u2013246"},{"issue":"1","key":"11063_CR31","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/TEVC.2015.2424410","volume":"20","author":"J Zhong","year":"2016","unstructured":"Zhong J, Ong YS, Cai W (2016) Self-learning gene expression programming. IEEE Trans Evol Comput 20(1):65\u201380","journal-title":"IEEE Trans Evol Comput"},{"issue":"1","key":"11063_CR32","first-page":"164","volume":"12","author":"Y Zhu","year":"2007","unstructured":"Zhu Y, Zhou L, Zhang L (2007) Algorithm for three-dimensional fragments reassembly. Journal of Image & Graphics 12(1):164\u2013170","journal-title":"Journal of Image & Graphics"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11063-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11063-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11063-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,26]],"date-time":"2024-01-26T10:09:25Z","timestamp":1706263765000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11063-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,14]]},"references-count":32,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2024,2]]}},"alternative-id":["11063"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11063-z","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,14]]},"assertion":[{"value":"4 September 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 May 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 May 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}