{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T09:58:33Z","timestamp":1730195913372,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/aina.2018.00158","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T18:03:06Z","timestamp":1534183386000},"page":"1104-1109","source":"Crossref","is-referenced-by-count":2,"title":["Online Signature Verification Using the Information Set Based Models"],"prefix":"10.1109","author":[{"given":"Urvashi","family":"Choudhary","sequence":"first","affiliation":[]},{"given":"Sanjay Kumar","family":"Dhurandher","sequence":"additional","affiliation":[]},{"given":"Vinesh","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Isaac","family":"Woungang","sequence":"additional","affiliation":[]},{"given":"Joel J. P. C.","family":"Rodrigues","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2002","author":"kholmatov","journal-title":"Biometric Authentication Using Online Signatures","key":"ref10"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/ICFHR.2012.211"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1007\/978-3-642-25449-9_18"},{"key":"ref13","first-page":"9\/1","article-title":"majority voting for improved signature verification","author":"allgrove","year":"2000","journal-title":"IEE Colloquium on Visual Biometrics"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.5120\/13172-0849"},{"key":"ref15","first-page":"471","article-title":"Online Signature Verification: A Survey on Authentication in Smartphones","volume":"2","author":"waseem","year":"2017","journal-title":"Advances in Ubiquitous Networking 2"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"2663","DOI":"10.1109\/TSMC.2016.2597240","article-title":"Online signature verification based on stable features extracted dynamically","volume":"47","author":"xiaoyu","year":"2017","journal-title":"IEEE Transactions on Systems Man and Cybernetics Systems"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1016\/j.patrec.2016.06.016"},{"key":"ref18","article-title":"Online Signature Verification using Energy Angle and Directional Gradient Feature with Neural Network","volume":"2","author":"jain","year":"2013","journal-title":"International Journal of Innovative Research in Science Engineering and Technology"},{"key":"ref4","article-title":"Efficient on-line signature verification system","volume":"10","author":"daramola","year":"2010","journal-title":"International Journal of Engineering & Technology"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1016\/j.patrec.2005.05.005"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1016\/j.patcog.2004.05.015"},{"year":"0","author":"yanikoglu","journal-title":"Sabanci University Tuzla Istanbul 34956 Turkey","article-title":"An Improved decision criterion for genuine\/forgery classification in on-line signature verification","key":"ref5"},{"key":"ref8","first-page":"681","article-title":"On-Line Signature verification based on template matching approach and support vector data description","volume":"12","author":"dong","year":"2010","journal-title":"International Conference on Computer Application and System Modeling (ICCASM)"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/ICIIP.2011.6108923"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1016\/S0031-3203(01)00240-0"},{"key":"ref1","first-page":"91","article-title":"Communications of the ACM","volume":"43","author":"jain","year":"2008","journal-title":"Biometric Identification"},{"year":"2006","author":"araujo","journal-title":"International Workshop on Frontiers in Handwriting Recognition","article-title":"On-line verication for signatures of different sizes","key":"ref9"}],"event":{"name":"2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)","start":{"date-parts":[[2018,5,16]]},"location":"Krakow, Poland","end":{"date-parts":[[2018,5,18]]}},"container-title":["2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8424835\/8432202\/08432360.pdf?arnumber=8432360","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,2]],"date-time":"2021-06-02T19:47:56Z","timestamp":1622663276000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8432360\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/aina.2018.00158","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}