<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Off-Line Signature Verification based on Ordered Grid Features: An Evaluation</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Konstantina</forename><surname>Barkoula</surname></persName>
							<email>kbarkoula@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="department">Physics Department</orgName>
								<orgName type="institution">University of Patras</orgName>
								<address>
									<settlement>Patras</settlement>
									<country key="GR">Greece</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">George</forename><surname>Economou</surname></persName>
							<email>economou@upatras.gr</email>
							<affiliation key="aff0">
								<orgName type="department">Physics Department</orgName>
								<orgName type="institution">University of Patras</orgName>
								<address>
									<settlement>Patras</settlement>
									<country key="GR">Greece</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Elias</forename><forename type="middle">N</forename><surname>Zois</surname></persName>
							<email>ezois@teiath.gr</email>
							<affiliation key="aff1">
								<orgName type="department">Electronics Engineering Department Technological and Educational Institution</orgName>
								<address>
									<settlement>Athens, Egaleo</settlement>
									<country key="GR">Greece</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Evangelos</forename><surname>Zervas</surname></persName>
							<email>ezervas@teiath.gr</email>
							<affiliation key="aff1">
								<orgName type="department">Electronics Engineering Department Technological and Educational Institution</orgName>
								<address>
									<settlement>Athens, Egaleo</settlement>
									<country key="GR">Greece</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Off-Line Signature Verification based on Ordered Grid Features: An Evaluation</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">53ED30069AA163E9C809E2C3DF6ED53A</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T11:47+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Grid Features</term>
					<term>Power Set</term>
					<term>Ordering</term>
					<term>Signature Verification</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>A novel offline signature modeling is introduced and evaluated which attempts to advance a grid based feature extraction method uniting it with the use of an ordered powerset. Specifically, this work represents the pixel distribution of the signature trace by modeling specific predetermined paths having Chebyshev distance of two, as being members of alphabet subsets-events. In addition, it is proposed here that these events, partitioned in groups, are further explored and processed within an ordered set context. As a proof of concept, this study progresses by counting the events' first order appearance (in respect to inclusion) at a specific powerset, along with their corresponding distribution. These are considered to be the features which will be employed in a signature verification problem. The verification strategy relies on a support vector machine based classifier and the equal error rate figure. Using the new scheme verification results were derived for both the GPDS300 and a proprietary data set, while the proposed technique proved quite efficient in the handling of skilled forgeries as well.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>INTRODUCTION</head><p>Automated handwritten signature verification systems (ASVS) remain up to now an accepted way for humans to declare their identity in many application areas including civilian ones <ref type="bibr" target="#b0">[1]</ref>, <ref type="bibr" target="#b1">[2]</ref>, <ref type="bibr" target="#b2">[3]</ref>, <ref type="bibr" target="#b3">[4]</ref>. ASVS are separated into two major categories based on the method that the signature is obtained. Both online and offline ASVS must cope with the evidence that the process of creating handwritten signatures, even when they originate from a well trained genuine writer, will carry natural variations, defined as intra-writer variability <ref type="bibr" target="#b4">[5]</ref>. It is adopted that the online ASVS are generally more efficient when compared to offline. A commonly used figure of merit which is employed in order to characterize the efficiency of ASVS is the equal error rate (EER) which is calculated from the ROC or DET plots of both types of error rates.</p><p>The goal of an offline ASVS is to efficiently transform an image into a mathematical measurable space where it will be represented by means of its corresponding features <ref type="bibr" target="#b5">[6]</ref>. Next, the features are feeding computational intelligence techniques and pattern recognition classifiers which will decide, after appropriate training and testing procedures, if a signature under query belongs to a claimed writer <ref type="bibr" target="#b6">[7]</ref>, <ref type="bibr" target="#b7">[8]</ref>.</p><p>According to the experimental protocol followed, there are two major approaches which have been applied to off-line ASVS; writer dependent (WD) and writer-independent (WI). The WD approach uses an atomic classifier for each writer. The WI approach uses a classifier to match each input questioned signature to one or more reference signatures, and a single classifier is trained for all writers <ref type="bibr" target="#b8">[9]</ref>, <ref type="bibr" target="#b9">[10]</ref>.</p><p>Feature extraction is considered to be one of the most challenging tasks when ASVS are designed. An important feature extraction philosophy which attracts increasing interest, exploits the signature using a coarse or fine detail grid which is imposed upon the image. Among others, examples of grid based feature extraction can be found in the work provided by references <ref type="bibr" target="#b9">[10]</ref>, <ref type="bibr" target="#b10">[11]</ref>, <ref type="bibr" target="#b11">[12]</ref>, <ref type="bibr" target="#b12">[13]</ref>, <ref type="bibr" target="#b13">[14]</ref>, <ref type="bibr" target="#b14">[15]</ref>, <ref type="bibr" target="#b15">[16]</ref>, <ref type="bibr" target="#b16">[17]</ref>, <ref type="bibr" target="#b17">[18]</ref> and <ref type="bibr" target="#b18">[19]</ref>.</p><p>In another work provided by Tselios, Zois, Nassiopoulos and Economou <ref type="bibr" target="#b19">[20]</ref>, a grid based feature extraction method was developed which represents the signature trace by taking into account the histogram of specific pixel path transitions along predefined paths within pre-confined Chebyshev distances of two (F CB2 feature). The feature extraction concepts have been advanced by describing these paths in a way in which they can be viewed as symbols transmitted by a discrete space random source. The combination of the produced F CB2 symbols defines the message or event that the random source sends out when a certain sequence of signature pixels is accounted. They are treated according to the event concept, reported in standard set and information theory and they are complemented along with their corresponding probabilistic moments <ref type="bibr" target="#b20">[21]</ref>. In this work and in order to further increase our signature discriminating capability the potential messages-events of the F CB2 paths are organized in sub-groups of independent tetrads. Each tetrad is organized according to its ordered powerset with respect to inclusion <ref type="bibr" target="#b21">[22]</ref>. The outcome of this procedure provides an attempt to model the handwriting process in concordance with basic elements of information and coding theory.</p><p>The distributions of the now ordered transition paths in the new feature space are used to code the signature image. In the case study presented here a WD verification scheme is followed which comprises of the training and testing phase. Verification results have been drawn with the use of two databases, the GPDS300 and a proprietary one by means of the false acceptance, false rejection and the equal error rate (EER) figure of merit. The rest of this work is organized as follows: Section 2 provides the database details and the description of the feature extraction algorithm. Section 3 presents the experimental verification protocol which has been applied. Section 4 presents the comparative evaluation results while section 5 draws the conclusions.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>II. DATABASE AND FEATURE EXTRACTION PROCEDURE</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>A. Database Description</head><p>The proposed feature extraction modeling has been studied with the use of two databases of 8-bit grey scale signatures: a Greek signers' database (CORPUS1) <ref type="bibr" target="#b19">[20]</ref> and GPDS-300 (CORPUS2) <ref type="bibr" target="#b11">[12]</ref>. CORPUS1 comprises of a domestic Greek collection of 105 genuine and 21 simulated forgery signature samples for each of the 69 signers of the database. Genuine samples were acquired in a one month time frame. CORPUS2 contains 24 genuine signatures and 30 simulated forgeries for each of the 300 signers of the database and is publicly available. During the experimental process, two schemes of randomly selected training and testing samples were used for comparison with the outcomes of contemporary research in the field. In the first scheme, 12 genuine and 12 simulated-forgery reference samples per writer are used, while in the second scheme 5 genuine and 5 simulated forgery reference samples are used. The remaining samples are used for testing.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>B. Preprocessing</head><p>In order to produce the binary form of the acquired signatures the following preprocessing steps have been carried out: thresholding using Otsu's method <ref type="bibr" target="#b5">[6]</ref>, skeletonization, cropping and segmentation. This procedure is expected to reduce a number of side effects of the writing instruments variations. The result is the generation of the most informative window (MIW) of the image. The features are extracted either from the whole MIW of the signature or from segments of signature's MIW with the use of the equimass sampling grid method <ref type="bibr" target="#b13">[14]</ref>. Equimass sampling grid segmentation provides strips of the signature with uniform size of signature pixels instead of the trivial distance grid segmentation which provides segments of equal area. The result is depicted in Fig. <ref type="figure" target="#fig_0">1</ref>. In this work the feature vector is generated from the 'S2' scheme used in <ref type="bibr" target="#b19">[20]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>C. Alphabet Description</head><p>Fig. <ref type="figure" target="#fig_1">2</ref> depicts the alphabet which is defined as a set of symbols, emerging from the F CB2 description according to <ref type="bibr" target="#b11">[12]</ref>. To be more specific, F CB2 alphabet is the set of transition paths of three consecutive pixels under the constraint of having the first and third pixels restrained to a Chebyshev distance equal to two. Since, in offline signatures, signature-pixel ordering is unknown, the ordered sequence of the pixels cannot be estimated. This note diminish the number of queried F CB2 transition paths, in a 5x5 pixel grid window, with center pixel each black pixel of signature's image, to the sixteen independent transition paths presented in Fig. <ref type="figure" target="#fig_1">2</ref>. In this case study only the F CB2 paths have been taken into account. It is advantageous in our case to explicitly treat the notion of the signature pixels indexes (i,j) as a transformation of sequences produced by the source. As a consequence, the feature extraction grid can be identified as a discrete spacediscrete alphabet source.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>D. Ordered Event Modeling</head><p>Let the triad (  , Β, P) indicate the probability space on which all the potential outcomes are identified. By definition  is the sample space upon which a discrete digital source transmits alphabet symbols. The source may transmit either single symbols or sets of them (events) from a 16 symbol alphabet as figure <ref type="figure" target="#fig_1">2</ref> illustrates. Let B a sigma field (the event space) that encloses all potential occurrences of symbols combinations from the F CB2 alphabet. That is, B is the largest possible  -field [23] which is the collection of all subsets of  and is called the power set. Finally, let P be the corresponding distributions of the  -field.</p><p>In order to evade the problem of 2 16 space management</p><formula xml:id="formula_0"> is grouped into T subsets 1, , { } t t T   </formula><p>and we define the sub-s-fields B t as the power sets for each t  . In this work we choose to group the 16-F CB2 (i) components into ensembles of four tetrads (call it hereafter F 4 -collection) thus resulting to an early set of 4  2 4 =64 possible event combinations. From the complete set of all the possible ensembles of the F 4 collection only 87 orthogonal cases shall be enabled along with their corresponding probabilities. From a mathematical point of view the signature image is analyzed into four major subspaces where each of them is composed of 16 orthogonal dimensions. The term orthogonal denotes that each symbol in a sub-alphabet space of a F 4 tetrad cannot be derived as any combination of the same subspace F 4 symbols. This constraint provides each signature with 87 different F 4 orthogonal tetrad event sets, found through exhaustive search. Fig. <ref type="figure" target="#fig_2">3</ref> provides the F CB2 alphabet along with a F 4 orthogonal collection. As a proof of concept, the orthogonal F 4 collection #44, selected randomly is illustrated in figure <ref type="figure" target="#fig_2">3</ref>.  Finally, each one of the four F 4 power-sets of figure 3b is evaluated by ordering the elements of the powerset with respect to inclusion. Fig. <ref type="figure" target="#fig_3">4</ref> provides a graphical explanation of one powerset in line with the proposed modeling. In order to illustrate the method with clarity, figure <ref type="figure" target="#fig_3">4</ref> has been created which shows the powerset of the #44 F 4 collection with respect to inclusion. The indexes x, y, z, w are associated with one tetrad's elements of the F 4 collection. For each arrow in figure <ref type="figure" target="#fig_3">4</ref> there is a corresponding probability evaluated for every segmented image. Thus, the overall dimensionality of the feature vector for one F 4 collection is equal to 32 (4+12+12+4) for each image segment.</p><p>According to the exposed material, a discrete source, designated as S n , can be defined by its transmitted set of symbols-events which are now members of an ordered F 4 collection. This novel modeling of the feature generation process is an evolution of the previous method as it was described in <ref type="bibr" target="#b19">[20]</ref>. It attempts to model the distribution of the signature pixel paths as an information source and to associate events of ordered paths (arrows as seen in fig. <ref type="figure" target="#fig_3">4</ref>) along with their corresponding first order probabilities.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>E. Creation of the ordered feature vector</head><p>To make this work robust a short description is provided for generating the ordered feature components. According to the material exposed in sections II C , II D , each one of the preprocessed image segments is scanned top-down and leftright to identify its signature pixels. Let us denote with the labels One (O) and Two (T) a conjugated pair of 5  5 moving grids with the property that their topological centers are distant by a Euclidean distance of one. Then for each signature pixel the {O, T} grids are imposed. Next, detection of discrete events at both {O, T} grids is performed followed by the evaluation of the corresponding ordered probabilities, as described in fig. <ref type="figure" target="#fig_3">4</ref>. In addition, fig. <ref type="figure" target="#fig_4">5</ref> presents in a graphical manner the generation of a feature component namely the {X, XY}. In this work the overall feature dimensionality is 128 due to the selection of the segmentation preprocessing steps.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>III. CLASSIFICATION PROTOCOL</head><p>On the grounds of proofing the proposed concept and according to the discussion exposed in section II the training phase of the WD verification scheme follows: for each writer, #nref reference samples of genuine along with an equal number of simulated-forgery signature samples are randomly chosen in order to train the classifier. The "S2" image segmentation scheme combines the features calculated on the whole signature image as well as the relevant 2x2 equimass segmentation grid <ref type="bibr" target="#b19">[20]</ref>. These features supply the classifier training section without assuming any additional processing. The classifier used is a hard-margin two class support vector machine (SVM) classifier using radial basis kernel. Selection of the training samples for the genuine class was accomplished using randomly chosen samples according to the hold-out validation method. The remaining genuine and simulated forgery signatures feature vectors, drawn using the same F 4 collection, feed the SVM classifier directly for testing. The SVM output apart from the binary class decision provides a score value which is equal to the distance of the tested sample from the SVM separating hyperplane. The operating parameters of the SVM have been determined through exhaustive search. It is noted that there is a wide area of rbf sigma values that the system has the reported results.</p><p>Evaluation of the verification efficiency of the system is accomplished with the use of a global threshold on the overall SVM output score distribution. This is achieved by providing the system's False Acceptance Rate (FAR: samples not belonging to genuine writers, yet assigned to them) and the False Rejection Rate (FRR: samples belonging to genuine writers, yet not classified) functions. With these two rates, the receiver operator characteristics (ROC) are drawn by means of their FAR/FRR plot. Then, classification performance is measured with the utilization of the system Equal Error Rate (EER: the point which FAR equals FRR).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>IV. RESULTS</head><p>According to the discussion presented above, FAR, FRR and the relevant EER rates, are evaluated for (a) CORPUS 1 and and (b) CORPUS 2 with five and twelve reference  <ref type="table" target="#tab_0">I</ref> designate the genuine and skilled forgery samples respectively. In addition, the ROC curves are presented for both databases in fig. <ref type="figure" target="#fig_5">6</ref> along with their corresponding EER defined as the cross section of the ROC curves and the diagonal.</p><p>Our results are compared to recently published relevant figures. The reported results for CORPUS 1 are compared with the results relevant to those reported in <ref type="bibr" target="#b11">[12]</ref> for feature level simulated forgery verification tests using 'S2' scheme using (a) nref=5 and (b) the mean value of nref=10 and nref=15 tests for comparison with our test using nref=12. The comparison results are presented in Table <ref type="table" target="#tab_0">II</ref>. Concerning CORPUS 2, we present in Table <ref type="table" target="#tab_0">III</ref>, the results of recently reported research work using nref=5 and nref=12, along with the results of the current approach.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>V. CONCLUSIONS</head><p>In this work a handwritten model based on the powerset of an ordered event topology with respect to inclusion is considered as a tool for offline signature verification. A number of verification experiments based on an SVM classifier have been carried out in two signature databases namely the GPDS and a proprietary one. Primary verification results indicate that the proposed feature extraction method has an appealing aspect; As a comment on the efficiency of the method one can state that in the case of the Corpus 1 a substantial improvement is observed while in the case of Corpus 2 the results are comparable with those of the literature. Since the approach described in this case study is preliminary it is anticipated that further exhaustive research will unveil important conclusions with respect to the modeling of handwriting. However a number of various other models and experimental setups including i.e. the dissimilarity framework <ref type="bibr" target="#b9">[10]</ref> need to be examined in order to verify the effectiveness of the proposed approach. </p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 .</head><label>1</label><figDesc>Figure 1. Signature image with equimass made segments</figDesc><graphic coords="2,70.62,644.64,214.08,64.80" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 .</head><label>2</label><figDesc>Figure 2. F CB2 alphabet set which forms the probability space  .</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 .</head><label>3</label><figDesc>Figure 3. One F4 collection of tetrads (#44). Each horizontal tetrad is considered to form a subspace in the original 16-dimnensional feature space and consequently generates a powerset of events</figDesc><graphic coords="3,113.64,104.46,128.16,122.94" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 4 .</head><label>4</label><figDesc>Figure 4. Power set for one subspace (the first horizontal line of fig. 3) of the #44 F 4 collection ordered with respect to inclusion</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 5 .</head><label>5</label><figDesc>Figure 5. (A) One set of the #44 F 4 collection as depicted in fig. 3b. (B) left and right grids labeled as One (O) and Two (T) respectively imposed on a signature trace (mark with green shadowed pixels) and corresponding events activated. For illustration purposes the topological grids have a distance of 7 instead of 1 that is followed at the actual feature extraction method. (C) Ordered event detection is designated between the red circles and feature component update along red line. samples for both genuine and forger class. The corresponding results are presented in Table I by means of the mean FAR, FRR and EER values. The letters G and F in TableIdesignate the genuine and skilled forgery samples respectively. In addition, the ROC curves are presented for both databases in fig.6along with their corresponding EER defined as the cross section of the ROC curves and the diagonal.Our results are compared to recently published relevant figures. The reported results for CORPUS 1 are compared with the results relevant to those reported in<ref type="bibr" target="#b11">[12]</ref> for feature level simulated forgery verification tests using 'S2' scheme using (a) nref=5 and (b) the mean value of nref=10 and nref=15 tests for comparison with our test using nref=12. The comparison results are presented in TableII. Concerning CORPUS 2, we present in TableIII, the results of recently reported research work using nref=5 and nref=12, along with the results of the current approach.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 6 .</head><label>6</label><figDesc>Figure 6. ROC curves with the corresponding EER for corpuses 1, 2.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>TABLE I .</head><label>I</label><figDesc>VERIFICATION EFFICIENCY (%)</figDesc><table><row><cell cols="2">Experimental Set</cell><cell cols="2">FAR</cell><cell>FRR</cell><cell>EER</cell></row><row><cell cols="2">CORPUS 1, #nref=5 (GF)</cell><cell>2.18</cell><cell></cell><cell>3.29</cell><cell>2.79</cell></row><row><cell cols="2">CORPUS 2, #nref=5 (GF)</cell><cell cols="2">13.03</cell><cell>5.23</cell><cell>9.04</cell></row><row><cell cols="2">CORPUS 1, #nref=12 (GF)</cell><cell>1.13</cell><cell></cell><cell>1.60</cell><cell>1.45</cell></row><row><cell cols="2">CORPUS 2, #nref=12 (GF)</cell><cell>7.73</cell><cell></cell><cell>3.45</cell><cell>5.53</cell></row><row><cell>TABLE II.</cell><cell cols="4">COMPARING EER WITH APPROACH [20]</cell></row><row><cell></cell><cell cols="2">Experimental Set</cell><cell cols="2">EER (%)</cell></row><row><cell cols="2">[20] #nref=5 (GF)</cell><cell></cell><cell cols="2">9.16</cell></row><row><cell cols="3">Proposed #nref=5 (GF)</cell><cell>2.79</cell></row><row><cell cols="2">[20] #nref=12 (GF)</cell><cell></cell><cell>4.65</cell></row><row><cell cols="3">Proposed #nref=12 (GF)</cell><cell>1.45</cell></row><row><cell>TABLE III.</cell><cell cols="4">COMPARING EER WITH VARIOUS APPROACHES (%)</cell></row><row><cell cols="2">Method</cell><cell>EER</cell><cell></cell><cell>EER</cell></row><row><cell cols="2">[20] #nref=5 (GF)</cell><cell>12.32</cell><cell cols="2">Proposed</cell><cell>9.04</cell></row><row><cell cols="2">[12] GPDS-100 nref=5 (GF)</cell><cell>12.02</cell><cell cols="2">#nref=5</cell></row><row><cell cols="2">[19] #nref=13 (only G)</cell><cell>4.21</cell><cell></cell></row><row><cell cols="2">[20] for nref=12 (GF)</cell><cell>6.2</cell><cell cols="2">Proposed</cell><cell>5.53</cell></row><row><cell cols="2">[12] # ref = {10G, 15F}</cell><cell>8.26</cell><cell cols="2">#nref=12</cell></row><row><cell cols="2">[13] #refn=12 (GF)</cell><cell>13.76</cell><cell></cell></row><row><cell cols="2">[24] #nref=12 (GF)</cell><cell>15.11</cell><cell></cell></row><row><cell cols="2">[25] # nref=12 (only G)</cell><cell>15.4</cell><cell></cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">On-line and off-line handwriting recognition: A comprehensive survey</title>
		<author>
			<persName><forename type="first">R</forename><surname>Plamondon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">N</forename><surname>Srihari</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Pattern Analysis and Machine Intelligence</title>
		<imprint>
			<biblScope unit="volume">22</biblScope>
			<biblScope unit="page" from="63" to="84" />
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Automatic Signature verification: the state of the art-1989-1993</title>
		<author>
			<persName><forename type="first">F</forename><surname>Leclerc</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Plamondon</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Pattern Recognition and Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page" from="643" to="660" />
			<date type="published" when="1994">1994</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Automatic signature verification: The state of the art</title>
		<author>
			<persName><forename type="first">D</forename><surname>Impedovo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Pirlo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Systems Man and Cybernetics</title>
		<imprint>
			<biblScope unit="volume">38</biblScope>
			<biblScope unit="page" from="609" to="635" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">State of the art in off-line signature verification</title>
		<author>
			<persName><forename type="first">L</forename><surname>Batista</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Rivard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Sabourin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Granger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Maupin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Pattern Recognition Technologies and Applications: Recent Advances</title>
				<editor>
			<persName><forename type="first">B</forename><surname>Verma</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Blumenstein</surname></persName>
		</editor>
		<imprint>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="39" to="62" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Signature verification revisited: promoting practical exploitation of biometric technology</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">C</forename><surname>Fairhurst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Electron. Commun. Eng. J</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="page" from="273" to="280" />
			<date type="published" when="1997">1997</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title level="m" type="main">Digital Image processing</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">C</forename><surname>Gonzalez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">E</forename><surname>Woods</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1992">1992</date>
			<publisher>Addison Wesley</publisher>
			<pubPlace>Reading</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title level="m" type="main">Pattern Recognition</title>
		<author>
			<persName><forename type="first">S</forename><surname>Theodoridis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Koutroumbas</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2009">2009</date>
			<publisher>Academic Press</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">Pattern classification</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">O</forename><surname>Duda</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">E</forename><surname>Hart</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2001">2001</date>
			<publisher>John Wiley and Sons</publisher>
			<pubPlace>New York</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Reducing forgeries in writer-independent off-line signature verification through ensemble of classifiers</title>
		<author>
			<persName><forename type="first">D</forename><surname>Bertolini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">S</forename><surname>Oliveira</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Justino</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Sabourin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Pattern Recognition</title>
		<imprint>
			<biblScope unit="volume">43</biblScope>
			<biblScope unit="page" from="387" to="396" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Multi feature extraction and selection in writer independent off-line signature verification</title>
		<author>
			<persName><forename type="first">D</forename><surname>Rivard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Granger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Sabourin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal on Document Analysis and Recognition</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="page" from="83" to="103" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">An Automatic Off-line Signature Verification and Forgery Detection System</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">K</forename><surname>Madasu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Lovell</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Pattern Recognition Technologies and Applications: Recent Advances</title>
				<editor>
			<persName><forename type="first">B</forename><surname>Verma</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Blumenstein</surname></persName>
		</editor>
		<imprint>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="63" to="89" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Off-line signature verification based on grey level information using texture features</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">F</forename><surname>Vargas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Ferrer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">M</forename><surname>Travieso</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">B</forename><surname>Alonso</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Pattern Recognition</title>
		<imprint>
			<biblScope unit="volume">44</biblScope>
			<biblScope unit="page" from="375" to="385" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Writer independent off-line signature verification using surroundedness feature</title>
		<author>
			<persName><forename type="first">R</forename><surname>Kumar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">D</forename><surname>Sharma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Chanda</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Pattern Recognition Letters</title>
		<imprint>
			<biblScope unit="volume">33</biblScope>
			<biblScope unit="page" from="301" to="308" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Analysis of Stability in Static Signatures using Cosine Similarity</title>
		<author>
			<persName><forename type="first">D</forename><surname>Impedovo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Pirlo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Sarcinella</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Stasolla</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">A</forename><surname>Trullo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc of International Conference on Frontiers in Handwriting Recognition</title>
				<meeting>of International Conference on Frontiers in Handwriting Recognition</meeting>
		<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="231" to="235" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">LOG-Grid based off-line signature verification</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">H</forename><surname>Shekar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">K</forename><surname>Bharathi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Fourth International Conference on signal and image processing</title>
				<editor>
			<persName><forename type="first">S</forename><surname>Mohan</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><surname>Kumar</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><forename type="middle">S</forename></persName>
		</editor>
		<imprint>
			<date type="published" when="2012">2012. 2013</date>
			<biblScope unit="volume">222</biblScope>
			<biblScope unit="page" from="321" to="330" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Off-line signature verification using flexible grid features and classifiers fusion</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">P</forename><surname>Swanepoel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Coester</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Frontiers in Handwriting Recognition</title>
				<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="297" to="302" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Offine line signature verification using distance statistics</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">K</forename><surname>Kalera</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Shrihari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Xu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Pattern Recognition and Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="page" from="1339" to="1360" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Off-line signature verification using contour features</title>
		<author>
			<persName><forename type="first">A</forename><surname>Gilperez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Alonso-Fernandez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Pecharroman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Fierrez-Aguilar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Ortega-Garcia</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Frontiers in Handwriting Recognition ICFHR</title>
				<imprint>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">A circular grid-based rotation invariant feature extraction approach for off-line signature verification</title>
		<author>
			<persName><forename type="first">M</forename><surname>Parodi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">C</forename><surname>Gomez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Belaid</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">11th International Conference on Document Analysis and Recognition</title>
				<imprint>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="1289" to="1293" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Grid-based feature distributions for off-line signature verification</title>
		<author>
			<persName><forename type="first">K</forename><surname>Tselios</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">N</forename><surname>Zois</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Siores</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Nassiopoulos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Economou</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IET Biometrics</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="72" to="81" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<monogr>
		<title level="m" type="main">Elements of information theory</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">M</forename><surname>Cover</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">Y</forename><surname>Thomas</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2006">2006</date>
			<publisher>John Wiley and Sons</publisher>
		</imprint>
	</monogr>
	<note>2nd ed</note>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Naive set theory</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">R</forename><surname>Halmos</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">The University Series in Undergraduate Mathematics</title>
		<imprint>
			<date type="published" when="1960">1960</date>
			<publisher>van Nostrand Company</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Hazewinkel</surname></persName>
		</author>
		<title level="m">Encyclopedia of Mathematics</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Performance Analysis of the Gradient Feature and the Modified Direction Feature for Off-line Signature Verification</title>
		<author>
			<persName><forename type="first">V</forename><surname>Nguyen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Kawazoe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Wakabayashi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">U</forename><surname>Pal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Blumenstein</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. 2010 Int Conf on Frontiers in Handwriting Recognition</title>
				<meeting>2010 Int Conf on Frontiers in Handwriting Recognition</meeting>
		<imprint>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page" from="303" to="307" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Offline signature verification using classifier combination of HOG and LBP features</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">B</forename><surname>Yilmaz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Yanikoglu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Tirkaz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kholmatov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. Int Joint Conf on Biometrics</title>
				<meeting>Int Joint Conf on Biometrics</meeting>
		<imprint>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="1" to="7" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
