<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Off-Line Signature Verification based on Ordered Grid Features: An Evaluation</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Konstantina Barkoula</string-name>
          <email>kbarkoula@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>George Economou</string-name>
          <email>economou@upatras.gr</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Elias N. Zois</string-name>
          <email>ezois@teiath.gr</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Evangelos Zervas</string-name>
          <email>ezervas@teiath.gr</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Electronics Engineering Department Technological and Educational Institution of Athens Egaleo</institution>
          ,
          <country country="GR">Greece</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Grid Features</institution>
          ,
          <addr-line>Power Set, Ordering, Signature Verification</addr-line>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Physics Department University of Patras Patras</institution>
          ,
          <country country="GR">Greece</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>- A novel offline signature modeling is introduced and evaluated which attempts to advance a grid based feature extraction method uniting it with the use of an ordered powerset. Specifically, this work represents the pixel distribution of the signature trace by modeling specific predetermined paths having Chebyshev distance of two, as being members of alphabet subsets-events. In addition, it is proposed here that these events, partitioned in groups, are further explored and processed within an ordered set context. As a proof of concept, this study progresses by counting the events' first order appearance (in respect to inclusion) at a specific powerset, along with their corresponding distribution. These are considered to be the features which will be employed in a signature verification problem. The verification strategy relies on a support vector machine based classifier and the equal error rate figure. Using the new scheme verification results were derived for both the GPDS300 and a proprietary data set, while the proposed technique proved quite efficient in the handling of skilled forgeries as well.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>INTRODUCTION</p>
      <p>
        Automated handwritten signature verification systems
(ASVS) remain up to now an accepted way for humans to
declare their identity in many application areas including
civilian ones [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], [3], [4]. ASVS are separated into two
major categories based on the method that the signature is
obtained. Both online and offline ASVS must cope with the
evidence that the process of creating handwritten signatures,
even when they originate from a well trained genuine writer,
will carry natural variations, defined as intra-writer
variability [5]. It is adopted that the online ASVS are
generally more efficient when compared to offline. A
commonly used figure of merit which is employed in order
to characterize the efficiency of ASVS is the equal error rate
(EER) which is calculated from the ROC or DET plots of
both types of error rates.
      </p>
      <p>
        The goal of an offline ASVS is to efficiently transform
an image into a mathematical measurable space where it will
be represented by means of its corresponding features [6].
Next, the features are feeding computational intelligence
techniques and pattern recognition classifiers which will
decide, after appropriate training and testing procedures, if a
signature under query belongs to a claimed writer [7], [8].
According to the experimental protocol followed, there are
two major approaches which have been applied to off-line
ASVS; writer dependent (WD) and writer-independent (WI).
The WD approach uses an atomic classifier for each writer.
The WI approach uses a classifier to match each input
questioned signature to one or more reference signatures, and
a single classifier is trained for all writers [9], [
        <xref ref-type="bibr" rid="ref13">10</xref>
        ].
      </p>
      <p>
        Feature extraction is considered to be one of the most
challenging tasks when ASVS are designed. An important
feature extraction philosophy which attracts increasing
interest, exploits the signature using a coarse or fine detail
grid which is imposed upon the image. Among others,
examples of grid based feature extraction can be found in the
work provided by references [
        <xref ref-type="bibr" rid="ref13">10</xref>
        ], [
        <xref ref-type="bibr" rid="ref14">11</xref>
        ], [
        <xref ref-type="bibr" rid="ref15">12</xref>
        ], [
        <xref ref-type="bibr" rid="ref16">13</xref>
        ], [
        <xref ref-type="bibr" rid="ref17">14</xref>
        ], [
        <xref ref-type="bibr" rid="ref18">15</xref>
        ],
[
        <xref ref-type="bibr" rid="ref19">16</xref>
        ], [
        <xref ref-type="bibr" rid="ref20">17</xref>
        ], [
        <xref ref-type="bibr" rid="ref21">18</xref>
        ] and [
        <xref ref-type="bibr" rid="ref22">19</xref>
        ].
      </p>
      <p>
        In another work provided by Tselios, Zois, Nassiopoulos
and Economou [
        <xref ref-type="bibr" rid="ref23">20</xref>
        ], a grid based feature extraction method
was developed which represents the signature trace by taking
into account the histogram of specific pixel path transitions
along predefined paths within pre-confined Chebyshev
distances of two (FCB2 feature). The feature extraction
concepts have been advanced by describing these paths in a
way in which they can be viewed as symbols transmitted by
a discrete space random source. The combination of the
produced FCB2 symbols defines the message or event that the
random source sends out when a certain sequence of
signature pixels is accounted. They are treated according to
the event concept, reported in standard set and information
theory and they are complemented along with their
corresponding probabilistic moments [
        <xref ref-type="bibr" rid="ref24">21</xref>
        ]. In this work and
in order to further increase our signature discriminating
capability the potential messages-events of the FCB2 paths are
organized in sub-groups of independent tetrads. Each tetrad
is organized according to its ordered powerset with respect to
inclusion [
        <xref ref-type="bibr" rid="ref25">22</xref>
        ]. The outcome of this procedure provides an
attempt to model the handwriting process in concordance
with basic elements of information and coding theory.
      </p>
      <p>The distributions of the now ordered transition paths in
the new feature space are used to code the signature image.
In the case study presented here a WD verification scheme is
followed which comprises of the training and testing phase.
Verification results have been drawn with the use of two
databases, the GPDS300 and a proprietary one by means of
the false acceptance, false rejection and the equal error rate
(EER) figure of merit. The rest of this work is organized as
follows: Section 2 provides the database details and the
description of the feature extraction algorithm. Section 3
presents the experimental verification protocol which has
been applied. Section 4 presents the comparative evaluation
results while section 5 draws the conclusions.</p>
      <p>
        The proposed feature extraction modeling has been
studied with the use of two databases of 8-bit grey scale
signatures: a Greek signers’ database (CORPUS1) [
        <xref ref-type="bibr" rid="ref23">20</xref>
        ] and
GPDS-300 (CORPUS2) [
        <xref ref-type="bibr" rid="ref15">12</xref>
        ]. CORPUS1 comprises of a
domestic Greek collection of 105 genuine and 21 simulated
forgery signature samples for each of the 69 signers of the
database. Genuine samples were acquired in a one month
time frame. CORPUS2 contains 24 genuine signatures and
30 simulated forgeries for each of the 300 signers of the
database and is publicly available. During the experimental
process, two schemes of randomly selected training and
testing samples were used for comparison with the outcomes
of contemporary research in the field. In the first scheme, 12
genuine and 12 simulated-forgery reference samples per
writer are used, while in the second scheme 5 genuine and 5
simulated forgery reference samples are used. The remaining
samples are used for testing.
      </p>
      <p>
        In order to produce the binary form of the acquired
signatures the following preprocessing steps have been
carried out: thresholding using Otsu’s method [6],
skeletonization, cropping and segmentation. This procedure
is expected to reduce a number of side effects of the writing
instruments variations. The result is the generation of the
most informative window (MIW) of the image. The features
are extracted either from the whole MIW of the signature or
from segments of signature’s MIW with the use of the
equimass sampling grid method [
        <xref ref-type="bibr" rid="ref17">14</xref>
        ]. Equimass sampling
grid segmentation provides strips of the signature with
uniform size of signature pixels instead of the trivial distance
grid segmentation which provides segments of equal area.
The result is depicted in Fig. 1. In this work the feature
vector is generated from the ‘S2’ scheme used in [
        <xref ref-type="bibr" rid="ref23">20</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>C. Alphabet Description</title>
      <p>Since, in offline signatures, signature-pixel ordering is
unknown, the ordered sequence of the pixels cannot be
estimated. This note diminish the number of queried FCB2
transition paths, in a 5x5 pixel grid window, with center
pixel each black pixel of signature’s image, to the sixteen
independent transition paths presented in Fig. 2. In this case
study only the FCB2 paths have been taken into account. It is
advantageous in our case to explicitly treat the notion of the
signature pixels indexes (i,j) as a transformation of
sequences produced by the source. As a consequence, the
feature extraction grid can be identified as a discrete space –
discrete alphabet source.</p>
    </sec>
    <sec id="sec-3">
      <title>D. Ordered Event Modeling</title>
      <p>
        Let the triad (  , Β, P) indicate the probability space on
which all the potential outcomes are identified. By definition
 is the sample space upon which a discrete digital source
transmits alphabet symbols. The source may transmit either
single symbols or sets of them (events) from a 16 symbol
alphabet as figure 2 illustrates. Let B a sigma field (the event
space) that encloses all potential occurrences of symbols
combinations from the FCB2 alphabet. That is, B is the largest
possible  -field [
        <xref ref-type="bibr" rid="ref8">23</xref>
        ] which is the collection of all subsets of
 and is called the power set. Finally, let P be the
corresponding distributions of the  -field.
      </p>
      <p>In order to evade the problem of 216 space management
 is grouped into T subsets {t }t1,,T and we define the
sub-s-fields Bt as the power sets for each t . In this work
we choose to group the 16-FCB2(i) components into
ensembles of four tetrads (call it hereafter F4-collection) thus
resulting to an early set of 4  24=64 possible event
combinations. From the complete set of all the possible
ensembles of the F4 collection only 87 orthogonal cases shall
be enabled along with their corresponding probabilities.
From a mathematical point of view the signature image is
analyzed into four major subspaces where each of them is
composed of 16 orthogonal dimensions. The term orthogonal
denotes that each symbol in a sub-alphabet space of a F4
tetrad cannot be derived as any combination of the same
subspace F4 symbols. This constraint provides each signature
with 87 different F4 orthogonal tetrad event sets, found
through exhaustive search. Fig. 3 provides the FCB2 alphabet
along with a F4 orthogonal collection. As a proof of concept,
the orthogonal F4 collection #44, selected randomly is
illustrated in figure 3.</p>
      <p>Finally, each one of the four F4 power-sets of figure 3b is
evaluated by ordering the elements of the powerset with
respect to inclusion. Fig. 4 provides a graphical explanation
of one powerset in line with the proposed modeling. In order
to illustrate the method with clarity, figure 4 has been created
which shows the powerset of the #44 F4 collection with
respect to inclusion. The indexes x, y, z, w are associated
with one tetrad’s elements of the F4 collection. For each
arrow in figure 4 there is a corresponding probability
evaluated for every segmented image. Thus, the overall
dimensionality of the feature vector for one F4 collection is
equal to 32 (4+12+12+4) for each image segment.</p>
      <p>
        According to the exposed material, a discrete source,
designated as Sn, can be defined by its transmitted set of
symbols-events which are now members of an ordered F4
collection. This novel modeling of the feature generation
process is an evolution of the previous method as it was
described in [
        <xref ref-type="bibr" rid="ref23">20</xref>
        ]. It attempts to model the distribution of the
signature pixel paths as an information source and to
associate events of ordered paths (arrows as seen in fig. 4)
along with their corresponding first order probabilities.
      </p>
    </sec>
    <sec id="sec-4">
      <title>Creation of the ordered feature vector</title>
      <p>To make this work robust a short description is provided
for generating the ordered feature components. According to
the material exposed in sections IIC, IID, each one of the
preprocessed image segments is scanned top-down and
leftright to identify its signature pixels. Let us denote with the
labels One (O) and Two (T) a conjugated pair of 5  5
moving grids with the property that their topological centers
are distant by a Euclidean distance of one. Then for each
signature pixel the {O, T} grids are imposed. Next, detection
of discrete events at both {O, T} grids is performed followed
by the evaluation of the corresponding ordered probabilities,
as described in fig. 4. In addition, fig. 5 presents in a
graphical manner the generation of a feature component
namely the {X, XY}. In this work the overall feature
dimensionality is 128 due to the selection of the
segmentation preprocessing steps.</p>
      <p>III.</p>
      <p>CLASSIFICATION PROTOCOL</p>
      <p>
        On the grounds of proofing the proposed concept and
according to the discussion exposed in section II the training
phase of the WD verification scheme follows: for each
writer, #nref reference samples of genuine along with an
equal number of simulated-forgery signature samples are
randomly chosen in order to train the classifier. The “S2”
image segmentation scheme combines the features calculated
on the whole signature image as well as the relevant 2x2
equimass segmentation grid [
        <xref ref-type="bibr" rid="ref23">20</xref>
        ]. These features supply the
classifier training section without assuming any additional
processing. The classifier used is a hard-margin two class
support vector machine (SVM) classifier using radial basis
kernel. Selection of the training samples for the genuine class
was accomplished using randomly chosen samples according
to the hold-out validation method. The remaining genuine
and simulated forgery signatures feature vectors, drawn
using the same F4 collection, feed the SVM classifier directly
for testing. The SVM output apart from the binary class
decision provides a score value which is equal to the distance
of the tested sample from the SVM separating hyperplane.
The operating parameters of the SVM have been determined
through exhaustive search. It is noted that there is a wide
area of rbf sigma values that the system has the reported
results.
      </p>
      <p>Evaluation of the verification efficiency of the system is
accomplished with the use of a global threshold on the
overall SVM output score distribution. This is achieved by
providing the system’s False Acceptance Rate (FAR:
samples not belonging to genuine writers, yet assigned to
them) and the False Rejection Rate (FRR: samples belonging
to genuine writers, yet not classified) functions. With these
two rates, the receiver operator characteristics (ROC) are
drawn by means of their FAR/FRR plot. Then, classification
performance is measured with the utilization of the system
Equal Error Rate (EER: the point which FAR equals FRR).</p>
      <p>According to the discussion presented above, FAR, FRR
and the relevant EER rates, are evaluated for (a) CORPUS 1
and and (b) CORPUS 2 with five and twelve reference
samples for both genuine and forger class. The
corresponding results are presented in Table I by means of
the mean FAR, FRR and EER values. The letters G and F in
Table I designate the genuine and skilled forgery samples
respectively. In addition, the ROC curves are presented for
both databases in fig. 6 along with their corresponding EER
defined as the cross section of the ROC curves and the
diagonal.</p>
      <p>
        Our results are compared to recently published relevant
figures. The reported results for CORPUS 1 are compared
with the results relevant to those reported in [
        <xref ref-type="bibr" rid="ref15">12</xref>
        ] for feature
level simulated forgery verification tests using ‘S2’ scheme
using (a) nref=5 and (b) the mean value of nref=10 and
nref=15 tests for comparison with our test using nref=12.
The comparison results are presented in Table II. Concerning
CORPUS 2, we present in Table III, the results of recently
reported research work using nref=5 and nref=12, along with
the results of the current approach.
      </p>
      <p>V.</p>
      <p>CONCLUSIONS</p>
      <p>
        In this work a handwritten model based on the powerset
of an ordered event topology with respect to inclusion is
considered as a tool for offline signature verification. A
number of verification experiments based on an SVM
classifier have been carried out in two signature databases
namely the GPDS and a proprietary one. Primary verification
results indicate that the proposed feature extraction method
has an appealing aspect; As a comment on the efficiency of
the method one can state that in the case of the Corpus 1 a
substantial improvement is observed while in the case of
Corpus 2 the results are comparable with those of the
literature. Since the approach described in this case study is
preliminary it is anticipated that further exhaustive research
will unveil important conclusions with respect to the
modeling of handwriting. However a number of various
other models and experimental setups including i.e. the
dissimilarity framework [
        <xref ref-type="bibr" rid="ref13">10</xref>
        ] need to be examined in order to
verify the effectiveness of the proposed approach.
      </p>
      <p>Recognition",</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>R.</given-names>
            <surname>Plamondon</surname>
          </string-name>
          and
          <string-name>
            <given-names>S. N.</given-names>
            <surname>Srihari</surname>
          </string-name>
          ,
          <article-title>"On-line and off-line handwriting recognition: A comprehensive survey,"</article-title>
          <source>IEEE Transactions on Pattern Analysis and Machine Intelligence</source>
          , vol.
          <volume>22</volume>
          , pp.
          <fpage>63</fpage>
          -
          <lpage>84</lpage>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>F.</given-names>
            <surname>Leclerc</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Plamondon</surname>
          </string-name>
          ,
          <article-title>"Automatic Signature verification: the state of the art-1989-1993"</article-title>
          ,
          <source>International Journal of Pattern Recognition and Artificial Intelligence</source>
          , vol.
          <volume>8</volume>
          , pp.
          <fpage>643</fpage>
          -
          <lpage>660</lpage>
          ,
          <year>1994</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>D.</given-names>
            <surname>Impedovo</surname>
          </string-name>
          , and
          <string-name>
            <given-names>G.</given-names>
            <surname>Pirlo</surname>
          </string-name>
          ,
          <article-title>"Automatic signature verification: The state of the art, "</article-title>
          <source>IEEE Transactions on Systems Man and Cybernetics</source>
          " vol.
          <volume>38</volume>
          , pp.
          <fpage>609</fpage>
          -
          <lpage>635</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <given-names>L.</given-names>
            <surname>Batista</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Rivard</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Sabourin</surname>
          </string-name>
          , E. Granger, and
          <string-name>
            <given-names>P.</given-names>
            <surname>Maupin</surname>
          </string-name>
          ,
          <article-title>"State of the art in off-line signature verification"</article-title>
          . In
          <string-name>
            <surname>Verma</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Blumenstein</surname>
          </string-name>
          , M. (eds.)
          <article-title>Pattern Recognition Technologies</article-title>
          and Applications: Recent Advances, pp.
          <fpage>39</fpage>
          -
          <lpage>62</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <surname>M. C. Fairhurst</surname>
          </string-name>
          ,
          <article-title>"Signature verification revisited: promoting practical exploitation of biometric technology"</article-title>
          ,
          <source>Electron. Commun. Eng. J.</source>
          ,
          <source>vol. 9</source>
          , pp.
          <fpage>273</fpage>
          -
          <lpage>280</lpage>
          ,
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <given-names>R. C.</given-names>
            <surname>Gonzalez</surname>
          </string-name>
          and
          <string-name>
            <given-names>R. E.</given-names>
            <surname>Woods</surname>
          </string-name>
          ,
          <article-title>"</article-title>
          <source>Digital Image processing"</source>
          , Addison Wesley, Reading,
          <year>1992</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <given-names>S.</given-names>
            <surname>Theodoridis</surname>
          </string-name>
          and Academic Press,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [23]
          <string-name>
            <surname>Hazewinkel</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          : Encyclopedia of Mathematics, Springer,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>V.</given-names>
            <surname>Nguyen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kawazoe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Wakabayashi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            <surname>Pal</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Blumenstein</surname>
          </string-name>
          ,
          <article-title>"Performance Analysis of the Gradient Feature and the Modified Direction Feature for Off-line Signature Verification"</article-title>
          ,
          <source>in Proc. 2010 Int Conf on Frontiers in Handwriting Recognition</source>
          , pp.
          <fpage>303</fpage>
          -
          <lpage>307</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [25]
          <string-name>
            <surname>M. B. Yilmaz</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Yanikoglu</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Tirkaz</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Kholmatov</surname>
          </string-name>
          ,
          <article-title>"Offline signature verification using classifier combination of HOG and LBP features"</article-title>
          ,
          <source>in Proc. Int Joint Conf on Biometrics</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <string-name>
            <given-names>R. O.</given-names>
            <surname>Duda</surname>
          </string-name>
          and
          <string-name>
            <given-names>P. E.</given-names>
            <surname>Hart</surname>
          </string-name>
          ,
          <article-title>Pattern classification</article-title>
          . New York: John Wiley and Sons,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <given-names>D.</given-names>
            <surname>Bertolini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. S.</given-names>
            <surname>Oliveira</surname>
          </string-name>
          , E. Justino, and
          <string-name>
            <given-names>R.</given-names>
            <surname>Sabourin</surname>
          </string-name>
          ,
          <article-title>"Reducing forgeries in writer-independent off-line signature verification through ensemble of classifiers"</article-title>
          .
          <source>Pattern Recognition</source>
          , vol.
          <volume>43</volume>
          , pp.
          <fpage>387</fpage>
          -
          <lpage>396</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>D.</given-names>
            <surname>Rivard</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Granger</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Sabourin</surname>
          </string-name>
          ,
          <article-title>"Multi feature extraction and selection in writer independent off-line signature verification"</article-title>
          ,
          <source>International Journal on Document Analysis and Recognition</source>
          , vol.
          <volume>16</volume>
          , pp.
          <fpage>83</fpage>
          -
          <lpage>103</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>V. K.</given-names>
            <surname>Madasu</surname>
          </string-name>
          , and
          <string-name>
            <given-names>B.</given-names>
            <surname>Lovell</surname>
          </string-name>
          .
          <article-title>"An Automatic Off-line Signature Verification and Forgery Detection System"</article-title>
          , in
          <string-name>
            <surname>Verma</surname>
          </string-name>
          , B.,
          <string-name>
            <surname>Blumenstein</surname>
          </string-name>
          , M. (eds.)
          <article-title>Pattern Recognition Technologies</article-title>
          and Applications: Recent Advances, pp.
          <fpage>63</fpage>
          -
          <lpage>89</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>J. F.</given-names>
            <surname>Vargas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Ferrer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. M.</given-names>
            <surname>Travieso</surname>
          </string-name>
          and
          <string-name>
            <given-names>J. B.</given-names>
            <surname>Alonso</surname>
          </string-name>
          ,
          <article-title>"Off-line signature verification based on grey level information using texture features"</article-title>
          ,
          <source>Pattern Recognition</source>
          , vol.
          <volume>44</volume>
          , pp.
          <fpage>375</fpage>
          -
          <lpage>385</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>R.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. D.</given-names>
            <surname>Sharma</surname>
          </string-name>
          , and
          <string-name>
            <given-names>B.</given-names>
            <surname>Chanda</surname>
          </string-name>
          ,
          <article-title>"Writer independent off-line signature verification using surroundedness feature"</article-title>
          ,
          <source>Pattern Recognition Letters</source>
          , vol.
          <volume>33</volume>
          , pp.
          <fpage>301</fpage>
          -
          <lpage>308</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>D.</given-names>
            <surname>Impedovo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Pirlo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Sarcinella</surname>
          </string-name>
          , E. Stasolla, and
          <string-name>
            <given-names>C. A.</given-names>
            <surname>Trullo</surname>
          </string-name>
          ,
          <article-title>"Analysis of Stability in Static Signatures using Cosine Similarity"</article-title>
          ,
          <source>in: Proc of International Conference on Frontiers in Handwriting Recognition</source>
          , pp.
          <fpage>231</fpage>
          -
          <lpage>235</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>B. H.</given-names>
            <surname>Shekar</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R. K.</given-names>
            <surname>Bharathi</surname>
          </string-name>
          ,
          <article-title>"LOG-Grid based off-line signature verification"</article-title>
          ,
          <source>in Fourth International Conference on signal and image processing</source>
          ,
          <year>2012</year>
          . S. Mohan,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Kumar</surname>
          </string-name>
          ,
          <string-name>
            <surname>S.S</surname>
          </string-name>
          . (eds),
          <source>LNEE 222</source>
          , pp.
          <fpage>321</fpage>
          -
          <lpage>330</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>J. P.</given-names>
            <surname>Swanepoel</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Coester</surname>
          </string-name>
          .
          <article-title>"Off-line signature verification using flexible grid features and classifiers fusion"</article-title>
          ,
          <source>in International Conference on Frontiers in Handwriting Recognition</source>
          , pp.
          <fpage>297</fpage>
          -
          <lpage>302</lpage>
          . ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [17]
          <string-name>
            <surname>M. K. Kalera</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Shrihari</surname>
            and
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Xu</surname>
          </string-name>
          ,
          <article-title>"Offine line signature verification using distance statistics"</article-title>
          ,
          <source>International Journal of Pattern Recognition and Artificial Intelligence</source>
          , vol.
          <volume>18</volume>
          , pp.
          <fpage>1339</fpage>
          -
          <lpage>1360</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>A.</given-names>
            <surname>Gilperez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Alonso-Fernandez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Pecharroman</surname>
          </string-name>
          , J. FierrezAguilar, and J.
          <string-name>
            <surname>Ortega-Garcia</surname>
          </string-name>
          ,
          <article-title>"Off-line signature verification using contour features"</article-title>
          ,
          <source>in International Conference on Frontiers in Handwriting Recognition ICFHR</source>
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>M.</given-names>
            <surname>Parodi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. C.</given-names>
            <surname>Gomez</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Belaid</surname>
          </string-name>
          ,
          <article-title>"A circular grid-based rotation invariant feature extraction approach for off-line signature verification"</article-title>
          ,
          <source>in 11th International Conference on Document Analysis and Recognition</source>
          , pp.
          <fpage>1289</fpage>
          -
          <lpage>1293</lpage>
          .
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>K.</given-names>
            <surname>Tselios</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. N.</given-names>
            <surname>Zois</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Siores</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Nassiopoulos</surname>
          </string-name>
          , and
          <string-name>
            <given-names>G.</given-names>
            <surname>Economou</surname>
          </string-name>
          ,
          <article-title>"Grid-based feature distributions for off-line signature verification"</article-title>
          .
          <source>IET Biometrics</source>
          , vol.
          <volume>1</volume>
          , pp.
          <fpage>72</fpage>
          -
          <lpage>81</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [21]
          <string-name>
            <surname>T. M. Cover</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A. Y.</given-names>
            <surname>Thomas</surname>
          </string-name>
          ,
          <article-title>"</article-title>
          <source>Elements of information theory"</source>
          , 2nd ed. John Wiley and Sons (
          <year>2006</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>P. R.</given-names>
            <surname>Halmos</surname>
          </string-name>
          ,
          <article-title>"Naive set theory"</article-title>
          . The University Series in Undergraduate Mathematics. van Nostrand Company, Princeton,
          <year>1960</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>