<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Dissimilarity Representation for Handwritten Signature Verification</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>George S. Eskander</institution>
          ,
          <addr-line>Robert Sabourin</addr-line>
          ,
          <institution>and Eric Granger Laboratoire d'imagerie, de vision et d'intelligence artificielle Ecole de technologie supe ́rieure, Universite ́ du Que ́bec Montre ́al</institution>
          ,
          <addr-line>QC</addr-line>
          ,
          <country country="CA">Canada</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>-Signature verification (SV) systems authenticate individuals, based on their handwritten signatures. The standard approach for such systems employ feature representations (FR), where features are extracted from the signature signals and classifiers are designed in the feature space. Performance of FR-based systems is limited by the quality of employed feature representations and the quantity of training data. The dissimilarity representation (DR) approach is recently introduced to pattern recognition community, where proximity among patterns constitute the classification space. Similar concept has been applied by forensic Questioned Document Examination (QDE) experts, where proximity between questioned signatures and a set of templates lead to the authentication decision. Recently, few automatic SV systems are proposed to simulate the QDE approach, by employing DR-based pattern recognition methods. In this paper, we explore different scenarios for employing the DR approach for replacing and/or enhancing the standard SV systems. A general framework for designing FR/DR based systems is proposed, that might guide the signature processing research direction to new areas.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>I. INTRODUCTION</title>
      <p>
        Signature Verification (SV) systems verify that a signature
sample belongs to a specific writer. Signature signals can be
acquired either online or offline. For online systems, signature
dynamics such as velocity, pressure, stroke order, etc., are
acquired during the signing process. Special pens and tablets
are employed for the online acquisition task. On the other
hand, for offline systems, signature images are scanned, after
the signing process. Only static information are extracted from
the signature images, producing a harder pattern recognition
problem [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>Standard SV systems employ feature-based pattern
recognition approaches. Discriminative features are extracted from
the signature signals, so that each signature is represented
as a vector in the Feature Representation (FR) space. The
classifiers are then designed in the feature space. Simply,
accuracy of such systems relies on to which extend the
employed feature representation is discriminative and stable.
Signature representations of different users may have high
similarities, when features are not discriminative enough. Also,
representations of the same writer may differ significantly,
when features are not stable. Besides quality of features,
enough training data is required to design reliable classifiers
in the feature space. The training samples should represent a
wide range of genuine signatures and possible forgeries, for
all system users. For real world applications, e.g., banking
systems, the number of users could be very high and there
is a high risk of forgery. The enrolling signature samples,
available for designing such systems, are mostly few and no
samples of forgeries are available. With these limitations, it
is a challenge to extract informative feature representations
and to design feature-based classifiers, that absorb the
intrapersonal variabilities while detecting both the forgeries and
the inter-personal similarities.</p>
      <p>
        The Dissimilarity Representation (DR) approach for pattern
recognition is recently introduced, by Elzbieta Pekalska and
Robert P.W. Duin., [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. The rational behind this concept is that
modeling the proximity between objects may be more tractable
than modeling the objects themselves. To this end,
dissimilarity measures are computed and considered as features for
classification. The dissimilarity measures can be derived in
many ways, e.g. from raw (sensor) measurements, histograms,
strings or graphs. However, it can also be build on top of a
feature representation [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>In the field of forensic science, similar concept has been
applied by the Questioned Document Examination (QDE)
experts. A questioned handwritten sample is associated to a
specific writer, if it is similar to a set of reference templates
of his handwritings. Degree of similarity is determined by
comparing a set of graphonomic features, extracted from both
the questioned and template samples.</p>
      <p>
        Recently, some automatic SV systems are proposed to
simulate the QDE approach [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]-[
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Distances between
intrapersonal training samples are computed and used as intra-class
samples. Similarly, distances between inter-personal training
samples are computed and used as inter-class samples. The
produced distance samples are used to train a single two-class
classifier, that distinguishes between intra-class and inter-class
distances.
      </p>
      <p>
        The DR approach, besides it enabled automating the
forensic expert manual tasks, it alleviates some of the limitations
of the FR-based design approach. First, a distance sample
is generated for every pair of the original training samples,
so it results in a much higher number of samples. This
property alleviates the shortage of training data required to
model the signatures. Second, dissimilarities between
signature signals maybe more discriminative and stable than the
feature representations. This is why the QDE experts build
their decisions on the dissimilarity between questioned and
template samples, and not on the absolute measurements of the
questioned sample. Finally, the DR-approach could be applied
to develop global classifiers, that are valid for all current and
future users. This concept is known as Writer-Independent
(WI) systems, developed by Siteargur N. Srihari et al., [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ],
and Santos and Sabourin et al., [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Instead of building a
single writer-dependent (WD) classifier for each user using
his enrolling signatures, a single global classifier is designed
by learning the dissimilarities between signatures of all users.
The rational behind the WI approach is: while it is impossible
to model a feature-based class distribution that is valid for
current and future users, the statistical models for inter-sample
distances are generic and can be generalized for users whose
signature samples are not used for training.
      </p>
      <p>In this paper, we argue that the DR approach can be
applied in different scenarios, in order to design more
robust classifiers. It can enable the design of new family of
classification systems, such as global and hybrid
global/userspecific classifiers. Also, the DR approach can be employed,
as an intermediate design tool, for enhanced performance of
standard feature-based systems.</p>
      <p>In the next section, the DR approach is illustrated, and
a general framework for designing FR/DR based systems is
proposed. Section III surveys the existing implementations of
the DR approach to the offline signature classification area, and
relates them to the proposed framework. Section IV discusses
possible directions and areas where the DR approach can be
applied.</p>
      <p>II. GENERAL FRAMEWORK FOR DISSIMILARITY-BASED</p>
      <p>CLASSIFICATION</p>
      <p>
        Although the DR is a general approach, where dissimilarity
measures can be derived directly from patterns, e.g., raw
(sensor) measurements, graphs, etc., we discuss here a special case
where the DR is build on top of a feature representation (FR).
This approach is suitable for the offline signature classification
task, as many techniques of feature extraction are already
proposed [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>Figure 1 illustrates a DR constituted on top of a FR. Assume
a system is designed for M different users, where for any
user m there are R prototypes (templates) fpmrgrR=1. Also,
a user n provides a set of J questioned signature images</p>
      <p>J
fQnj gj=1. The dissimilarity between a questioned sample
Qnj and a prototype pmr is DQnj pmr . In case that questioned
and prototype samples belong to the same person, i.e., n = m,
the dissimilarity sample is an intra-personal sample (black
cells in Figure 1). On the other hand, if questioned and
prototype samples belong to different persons, i.e., n 6= m,
then the dissimilarity sample is an inter-personal sample (white
cells in Figure 1).</p>
      <p>Perfect dissimilarity representation implies that all of the
intra-class distances have zero values, while all of the
interclass distances have large values. This occurs when the
employed dissimilarity measure absorbs all of the intra-class
variabilities, and detects all of the inter-class similarities.</p>
    </sec>
    <sec id="sec-2">
      <title>Feature-Dissimilarity (FD) Space</title>
      <p>Q11
Q12
Q21
Qn j
p11 p12
p21
δ Q11pnr
pnr
Inter-personal
Dissimilarities
Intra-personal
Dissimilarities</p>
    </sec>
    <sec id="sec-3">
      <title>Dissimilarity (D) Space</title>
      <p>To design a reliable classifier that works in a DR space,
it is not mandatory to achieve a perfect representation, but
only a discriminative one. The degree of ease to design a
reliable classifier depends on the discriminative power of the
representation. Accordingly, it is more important to carefully
design the DR, then the classifier design comes in a next step.</p>
      <p>In case of the DR is build on top of a FR, quality of the
resulting DR relies on the quality of features that constitute
the FR, and on the applied dissimilarity measure. For instance,
assume the feature representations F Qnj = ffkQnj gkK=1 and
F pmr = ffkpmr gkK=1, are extracted from the query sample Qnj
(from user n) and a prototype pmr (of user m), respectively.
Also, consider the Euclidean distance Qnj pmr as a measure
of dissimilarity:
v
u K
Qnj pmr = tuX( fk)2; where
k=1</p>
      <p>f Qnj
fk = k k
fkpmr k (1)</p>
      <p>It is obvious that, the overall distance between feature
representations of the two samples is controlled by the
individual feature components, and on the reference prototypes.
Accordingly, features and prototypes should be properly
selected, in order to minimize the intra-personal dissimilarities
and to maximize the inter-personal dissimilarities. Moreover,
dissimilarity measures other than the Euclidean distance can
be investigated for better dissimilarity representations.</p>
      <p>After designing a discriminative representation, classifiers
can be designed in the resulting space. Different forms of
dissimilarity representation spaces can be employed. More
Feature-Based</p>
      <p>Classifier</p>
      <p>Feature
Representation</p>
      <p>B
A
I
P
1</p>
      <p>H</p>
      <p>D</p>
      <p>Feature Selection
Prototype Selection</p>
      <p>Q</p>
      <p>Dissimilarity-Based</p>
      <p>Classifier</p>
      <p>F</p>
      <p>G
Prototype Selection</p>
      <p>E
R
Feature Selection
specifically, three different forms of dissimilarity
representations (DR) can be constituted:</p>
      <p>Dissimilarity matrix: the matrix of all distances, where
a row Dnj represents distances between a query j that
belongs to a specific user n, with respect to the prototypes
of all users:</p>
      <p>Dnj = f</p>
      <p>Qnj p11 ; ::; Qnj pmr ; ::; Qnj pMR g:
(2)
where m 2 [1; M ] and r 2 [1; R].</p>
      <p>Dissimilarity space (D-Space): the dissimilarity matrix is
projected on a space, where each row of the matrix is
represented as a vector Dnj in this space. By other words,
each dimension of the D-space is the distance to a specific
prototype.</p>
      <p>Feature-Dissimilarity space (FD-Space): the dissimilarity
matrix is embedded in an Euclidean space, where
dimensions of this space are the dissimilarities of feature
values. In the FD-space, a vector dQnj pmr , has same
dimensionality as that of the original feature space, where
dQnj pmr = f fkQnj pmr gkK=1. The length of a vector
dQnj pmr is equivalent to Qnj pmr , given by Eq. 1.</p>
      <p>We argue that, classifiers can be designed in any of the
aforementioned dissimilarity representation spaces. Moreover,
the different tasks for feature selection, prototype selection,
and classifiers design, can be done in different spaces,
whenever translation between spaces is possible. This strategy
permits applying a massive number of pattern recognition
techniques, with multiple combinations of space transitions.
We propose that new techniques for pattern recognition might
be developed based on this strategy. In this context, the DR
approach is employed either as a tool for enhancing the
standard FR-based systems (for feature/prototype selection),
or to design reliable dissimilarity-based classification systems
(when classifiers are designed in a DR space).</p>
      <p>Figure 2 illustrates a general framework for designing
classification systems based on the DR approach. The standard
approach is to extract feature representations from the training
samples, and design classifiers in the feature space (path A in
the Figure). However, the DR approach can be employed in
different scenarios for either build new family of classifiers in
DR-based spaces, or to enhance the performance of standard
feature-based classifiers. More specifically, dissimilarities can
be computed on top of a feature representation, and are used
to constitute different types dissimilarity representations (DR),
e.g., dissimilarity matrix, D-space, or FD-space (path B). The
resulting representation could be constituted on top of a huge
number of feature extractions, and based on large number of
prototypes. The intra-personal (black cells) and inter-personal
(white cells) dissimilarities, should be discriminative enough
in order to design a DR-based classifier (path C). In case that
the DR is not enough informative, feature selection and/or
prototype selection can be applied for enhanced representation.
For instance, feature selection can be employed in a FD-space
(path D). In literature, there are many methodologies of feature
selection that can be applied to select the most discriminative
and stable features. The resulting DR is constituted on top of
a sparser feature representation, however, redundancy in
prototypes may exist (block 2). A classifier can be then designed
in the resulting space (path E), or a prototype selection step is
done (path F) producing a more compact representation (block
4). Surely, classifiers designed in the sparse and compact
representation, are lighter and more accurate (path G). Also, order
of the feature/prototype selection processes can be reversed
(see the bottom part of the Figure). It is obvious that, it is more
logical to run the feature selection process in the FD-space,
however, the D-space is more suitable for prototype selection
task. The classifier design process can be implemented based
on different DR (dissimilarity matrix, D-space, or FD-space).</p>
      <p>Besides that the DR approach can be employed to design
dissimilarity-based classifiers, it can be considered as an
intermediate tool for building reliable feature-based
classifiers. Good features and/or prototypes can be selected in a
dissimilarity-based space, then the representation is translated
back to a sparser and more informative feature space (dotted
paths, like path H-I). On contrary, FR-based classifiers can
be designed and they are considered as an intermediate tool,
to design reliable DR-based classifiers. In such case,
multiclassifier systems can be designed, where FR-based classifiers
are used to produce the dissimilarity measures, that are needed
to build the DR (path P).</p>
      <p>III. CURRENT IMPLEMENTATIONS TO OFFLINE SIGNATURE</p>
      <p>SYSTEMS</p>
      <p>
        The first application of the dissimilarity learning to
biometrics, and more specifically, to the behavioral
handwritten biometrics is proposed by Jain, A.K. et al., [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. The
dissimilarity between handwritten digits is measured by the
amount of deformation required to restore a query sample to
its stored prototype. This approach is extended to the author
identification problem by Cha and Srihari [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], where distance
statistics are used for classification. Later, similar concept is
applied to the handwritten signature images. Here we list and
categorize some of these implementations, and relate them to
the proposed framework for DR-based classification shown in
Figure 2.
      </p>
      <sec id="sec-3-1">
        <title>A. Writer-Dependent Systems</title>
        <p>
          The Writer-Dependent (WD) approach seeks to build a
single classifier for each user based on his enrolling signatures.
The DR concept is first introduced to design WD-SV systems,
by Siteargur N. Srihari et al., [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ]. Correlation between high
dimensional (1024-bits) binary feature vectors, is employed as
a dissimilarity measure. For a specific user, distances among
every pair of his training samples, are determined to represent
the intra-class samples. Also, distances between samples of the
specific user and some forgeries are computed to represent the
inter-class samples. The authors tried different classification
strategies: one-class, two-class, discriminative, and generative
classifiers. This implementation is a realization of the path
B-C in Figure 2, where classifiers are designed based on the
statistics of the dissimilarity matrix.
        </p>
        <p>
          Later, Batista et al., [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ] applied the dissimilarity
learning concept to produce reliable WD-SV systems. A
featurebased one-class classifier is built by producing user-specific
generative models using Hidden Markov models (HMMs).
To increase the system accuracy, a two-class discriminative
model is build in DR space. The HMMs models are considered
as prototypes, and samples are projected to a D-space by
considering the likehood to each HMM generative model as
a similarity measure. SVM classifies are then designed in
the produced D-space. This implementation is a realization
of the path APC in Figure 2. Also, the authors employed
the AdaBoost method for classifier design in the D-space.
This later implementation achieves prototype selection, while
building the classifier, which is a realization of the path APQR
in the Figure.
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>B. Writer-Independent Systems</title>
        <p>Instead of building a single writer-dependent (WD)
classifier for each user using his enrolling signatures, a single
writer-independent (WI) classifier is designed by learning the
dissimilarities between signatures of all users. This concept is
impossible to realize by means of the standard FR approach.
However, it is possible to model the class distributions of
intra-class and inter-class dissimilarities, by employing the
DR approach. A single ”global” classifier can be designed
to model, or to discriminate between, these classes. If a
huge number of samples are used to build the global
DRbased classifier, it is statistically valid that the resulting model
generalizes for users whose samples are not included in the
training set.</p>
        <p>
          The WI concept is proposed by Siteargur N. Srihari et al.,
[
          <xref ref-type="bibr" rid="ref8">8</xref>
          ], and Santos and Sabourin et al., [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]. While the first group
used the correlation between binary features as a distance
measure, the second group employed the Euclidean distance
between graphometric feature vectors. This implementation is
a realization of the path BC in Figure 2, where the classifiers
are designed in the FD-space. Improved implementation of
this concept is proposed where different dissimilarity spaces
are generated based on different feature representations, and
classification decisions taken in each space are fused to
produce the final decision [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ], [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]. This scenario can be considered
as generation of different instances for path BC, and fusion is
done in the score or decision levels.
        </p>
        <p>
          More recently, Rivard et al., [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] extended the idea to
perform multiple feature extraction and selection. In this work,
information fusion is also performed at the feature level.
Multiple graphometric features are extracted based on multiple
size grids. Then, the features are fused and pairwise distances
between corresponding features are computed to constitute
a high dimensional feature-dissimilarity space, where each
dimension represents dissimilarity of a single feature. This
complex representation is then simplified by applying the
boosting feature selection approach (BFS) [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. A sparser and
more discriminative FD-space is produced by applying BFS
with multi-feature extraction. This scenario can be considered
as realization of path BDE in Figure 2. As the resulting WI
classifier recognizes all users, even the users who are enrolled
after the design phase, so the feature representation embedded
in the WI classifier is considered as a global
”populationbased” representation.
        </p>
      </sec>
      <sec id="sec-3-3">
        <title>C. Adaptation of Writer-Independent Systems</title>
        <p>
          Recently, some work is done to combine advantages of both
WI and WD approaches. Eskander et al., [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ] extends on the
system in [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] by adapting the population-based representation
to each specific user, with the aim of reducing the classification
complexity. While the first WI stage is designed in a
FDspace, the following WD stage is designed in a standard
feature space. Accordingly, the final WD classifier is FR-based
classifier, that avoids storing reference signatures for enhanced
security. Simulation results on two real-world offline signature
databases (the Brazilian DB and GPDS public DB) confirm the
feasibility and robustness of the proposed approach. Only a
single compact classifier produced similar level of accuracy
(Average Error Rate of about 5.38% and 13.96% for the
Brazilian and the GPDS databases, respectively) as complex
WI and WD systems in literature. This scenario is a realization
of path BDHI in Figure 2.
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>IV. RESEARCH DIRECTIONS</title>
      <p>
        The aforementioned implementations represent a subset of
large number of possible FR/DR combinations. Future
research may investigate the unvisited scenarios of the proposed
framework. For instance, combinations of global/user-specific,
generative/discriminative, one-class/two-class systems can be
designed. Also, all of the tasks for feature selection, prototype
selection, classifier design, etc., can be employed in either
feature space, dissimilarity matrix, FD-space, and D-space.
Selection of the working space for each step, should depend on
the specific requirements and constraints of the design problem
and on the application itself. For example, in [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], features are
selected in a FD-space as that provides a way to select reliable
feature representations. Then, the classifiers are designed in a
standard feature space, to avoid the need for storing signature
templates for verification. Besides the large number of possible
combinations and translations between the different spaces,
there is also a wide range of pattern recognition techniques
and tools that can be tested with the proposed framework. This
includes different methods for feature extraction and selection,
prototype selection, classifiers, etc.
      </p>
      <p>
        From the application perspective, the proposed framework
can be utilized for other applications, rather than the standard
SV systems. For example, the Signature Identification (SI)
systems that identify a producer of a signature sample, can be
designed based on the DR-approach. Prototypes of all system
users can be considered to build a classification D-space.
Another example of systems, that imply a challenging design
problem, is the signature-based bio-cryptographic systems. In
these systems, cryptographic keys of encryption and digital
signatures, are secured by means of handwritten signatures. It
is a challenging to select informative features, signature
prototype, and system parameters, for encoding reliable
signaturebased bio-cryptographic systems, based on the standard FR
approach. Instead, recently, we proposed a methodology to
design such systems, by means of the DR approach [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
Features are selected in the FD-space and prototypes are
selected in the D-space. Some of the system parameters such
as length of the cryptographic key, are optimized in the
different spaces.
      </p>
    </sec>
    <sec id="sec-5">
      <title>V. CONCLUSIONS</title>
      <p>In this paper, the dissimilarity approach for pattern
recognition is considered to design signature verification (SV)
systems. A general framework is proposed, for designing
classification system based on a mixture of feature and
dissimilarity representations. This framework imparts additional
flexibility to the pattern recognition (PR) area. Combinations
of transitions between different feature and dissimilarity spaces
are suggested. Some of the existing implementations to the SV
problem, are surveyed and related to the proposed framework.
There are, however, a wide range of methodologies and
applications that might benefit from the proposed approach,
that opens a door for new research directions.</p>
    </sec>
    <sec id="sec-6">
      <title>ACKNOWLEDGMENT</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>D.</given-names>
            <surname>Impedovo</surname>
          </string-name>
          and
          <string-name>
            <surname>G. Pirlo.</surname>
          </string-name>
          ,
          <article-title>Automatic signature verification: the state of the art</article-title>
          .
          <source>IEEE Transactions on SMC</source>
          ,
          <string-name>
            <surname>Part</surname>
            <given-names>C</given-names>
          </string-name>
          :
          <article-title>Applications</article-title>
          and Reviews, vol.
          <volume>38</volume>
          , no.
          <issue>5</issue>
          , pp.
          <fpage>609</fpage>
          -
          <lpage>635</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Elzbieta</given-names>
            <surname>Pekalska</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Robert P.W.</given-names>
            <surname>Duin</surname>
          </string-name>
          .
          <article-title>Dissimilarity representations allow for building good classifiers</article-title>
          .
          <source>PR Letters</source>
          , vol.
          <volume>23</volume>
          , no.
          <issue>8</issue>
          , pp.
          <fpage>161</fpage>
          -
          <lpage>166</lpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Robert</surname>
            <given-names>P.W.</given-names>
          </string-name>
          <string-name>
            <surname>Duin</surname>
            , Marco Loog, Elzbieta Pekalska , and
            <given-names>David M.J.</given-names>
          </string-name>
          <string-name>
            <surname>Tax</surname>
          </string-name>
          .
          <article-title>Feature-Based Dissimilarity Space Classification</article-title>
          .
          <source>Proceedings of the 20th International conference on Recognizing patterns in signals, speech, images, and videos (ICPR'10)</source>
          , pp.
          <fpage>46</fpage>
          -
          <lpage>55</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>C.</given-names>
            <surname>Santos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Justino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Bortolozzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Sabourin</surname>
          </string-name>
          .
          <article-title>An off-line signature verification method based on document questioned experts approach and a neural network</article-title>
          <source>Proceedings of 9Th IWFHR International Workshop on Frontiers in Handwriting Recognition (IWFHR'04)</source>
          , pp.
          <fpage>498502</fpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>L.</given-names>
            <surname>Oliveira</surname>
          </string-name>
          , E. Justino,
          <string-name>
            <given-names>R.</given-names>
            <surname>Sabourin</surname>
          </string-name>
          .
          <article-title>Off-line signature using writerindependent approach</article-title>
          .
          <source>IJCNN</source>
          , pp.
          <fpage>25392544</fpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>D.</given-names>
            <surname>Bertolini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Oliveira</surname>
          </string-name>
          , E. Justino,
          <string-name>
            <given-names>R.</given-names>
            <surname>Sabourin</surname>
          </string-name>
          .
          <article-title>Reducing forgeries in writer-independent off-line signature verification through ensemble of classifiers</article-title>
          .
          <source>PR</source>
          , vol.
          <volume>43</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>387396</fpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Rivard</surname>
            ,
            <given-names>D</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Granger</surname>
          </string-name>
          , E and Sabourin, R.,
          <article-title>Multi-Feature extraction and selection in writer-independent offline signature verification</article-title>
          .
          <source>IJDAR</source>
          , vol.
          <volume>16</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>83</fpage>
          -
          <lpage>103</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Sargur</surname>
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Srihari</surname>
            , Aihua Xu and
            <given-names>Meenakshi K.</given-names>
          </string-name>
          <string-name>
            <surname>Kalera</surname>
          </string-name>
          .
          <article-title>Learning Strategies and Classification Methods for Off-Line Signature Verification</article-title>
          .
          <source>Proceedings of the Ninth International Workshop on Frontiers in Handwriting Recognition (IWFHR'04)</source>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Elzbieta</surname>
            <given-names>pekalska</given-names>
          </string-name>
          , Robert P.W. Duin,
          <article-title>Pavel Paclk Prototype selection for dissimilarity-based classifiers</article-title>
          .
          <source>PR</source>
          , vol.
          <volume>39</volume>
          , pp.
          <fpage>189208</fpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Jain</surname>
            ,
            <given-names>A.K.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Zongker</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <article-title>Representation and recognition of handwritten digits using deformable templates</article-title>
          .
          <source>IEEE Transactions on PAMI</source>
          , vol.
          <volume>19</volume>
          , no.
          <issue>12</issue>
          , pp.
          <fpage>1386</fpage>
          -
          <lpage>1390</lpage>
          ,
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>S. Cha.</surname>
          </string-name>
          ,
          <article-title>Use of distance measures in handwriting Analysis</article-title>
          .
          <source>PhD Thesis</source>
          , State University of New York at Buffalo, USA,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>K.</given-names>
            <surname>Tieu</surname>
          </string-name>
          and
          <string-name>
            <given-names>P.</given-names>
            <surname>Viola</surname>
          </string-name>
          .,
          <article-title>Boosting image retrieval</article-title>
          .
          <source>International Journal of Computer Vision</source>
          , vol.
          <volume>56</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>17</fpage>
          -
          <lpage>36</lpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>L.</given-names>
            <surname>Batista</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Granger</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Sabourin</surname>
          </string-name>
          .
          <article-title>Applying Dissimilarity Representation to Off-Line Signature Verification</article-title>
          .
          <source>International Conference on PR (ICPR)</source>
          , pp.
          <fpage>1293</fpage>
          -
          <lpage>1297</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Eskander</surname>
            ,
            <given-names>G.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sabourin</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Granger</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hybrid WriterIndependent-Writer-Dependent Offline Signature Verification System. IET-Biometrics</surname>
            <given-names>Journal</given-names>
          </string-name>
          , Special issue on Handwriting Biometrics, doi: 10.1049/iet-bmt.
          <year>2013</year>
          .
          <volume>0024</volume>
          , in press,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Eskander</surname>
            ,
            <given-names>G.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sabourin</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Granger</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <source>On the Dissimilarity Representation and Prototype Selection for Signature-Based BioCryptographic Systems. 2nd Intel. Workshop on Similarity-Based Pattern Analysis and Recognition (SIMBAD2013)</source>
          , York, UK,
          <fpage>3</fpage>
          -
          <issue>5</issue>
          <year>July 2013</year>
          , LNCS, vol.
          <volume>7953</volume>
          , pp.
          <fpage>265</fpage>
          -
          <lpage>280</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>