<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Exploring Transformers for On-Line Handwritten Signature Verification</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Pietro Melzi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ruben Tolosana</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ruben Vera-Rodriguez</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Paula Delgado-Santos</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Giuseppe Stragapede</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Julian Fierrez</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Javier Ortega-Garcia</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Universidad Autonoma de Madrid</institution>
          ,
          <country country="ES">Spain</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Kent</institution>
          ,
          <country country="UK">UK</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The application of mobile biometrics as a user-friendly authentication method has increased in the last years. Recent studies have proposed novel behavioral biometric recognition systems based on Transformers, which currently outperform the state of the art in several application scenarios. On-line handwritten signature verification aims to verify the identity of subjects, based on their biometric signatures acquired using electronic devices such as tablets or smartphones. This paper investigates the suitability of architectures based on recent Transformers for on-line signature verification. In particular, four diferent configurations are studied, two of them rely on the Vanilla Transformer encoder, and the two others have been successfully applied to the tasks of gait and activity recognition. We evaluate the four proposed configurations according to the experimental protocol proposed in the SVC-onGoing competition. The results obtained in our experiments are promising, and promote the use of Transformers for on-line signature verification.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;biometrics</kwd>
        <kwd>transformers</kwd>
        <kwd>signature verification</kwd>
        <kwd>pattern recognition</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        On-line handwritten signature verification is a biometric modality that aims to verify the
authenticity of subjects based on their personal signatures. Handwritten signatures have
been traditionally used for biometric personal recognition, as they contain unique behavioral
patterns that can serve as reliable identifiers [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. Early approaches focused on extracting
dynamic or local features [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ], such as pen pressure, stroke sequences, speed, and acceleration,
and leveraging machine learning and pattern recognition techniques, such as Dynamic Time
Warping (DTW) [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ] and Hidden Markov Models (HMM) [
        <xref ref-type="bibr" rid="ref6 ref7">6, 7</xref>
        ]. With the integration of Deep
Learning (DL) [
        <xref ref-type="bibr" rid="ref10 ref11 ref8 ref9">8, 9, 10, 11</xref>
        ], on-line signature verification systems have achieved remarkable
performance, exhibiting robustness against various forms of forgeries [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] and improving user
experience [13]. This technology has wide-ranging applications in areas such as e-commerce,
digital banking, and document verification, contributing to the prevention of identity fraud and
improving the overall security of on-line transactions [
        <xref ref-type="bibr" rid="ref2">2, 14</xref>
        ].
      </p>
      <p>Despite the success of DL approches based on Convolutional Neural Networks (CNNs)
and Recurrent Neural Networks (RNNs) [13], recent studies have explored the application of
Transformer architectures for other behavioral biometric traits such as gait and keystroke,
outperforming the state of the art [15, 16, 17]. Among the multiple advantages of Transformers,
we highlight the ability to capture long-term dependencies and interactions, which is especially
attractive for time series modeling [18].</p>
      <p>
        In this paper we explore the use of Transformers for on-line signature verification, in which
signatures are acquired with pen tablet devices able to capture X and Y spatial coordinates,
pen pressure, and timestamps. We investigate four diferent Transformer configurations: i) a
Vanilla Transformer encoder [19], ii) the THAT Transformer successfully applied to activity
recognition [20], iii) a Transformer successfully applied to gait recognition [15, 17], and iv)
a novel configuration based on the Temporal and Channel modules proposed in THAT [ 20],
but with the Transformer encoder proposed in Vanilla [19]. To obtain a fair comparison with
the literature, we evaluate the proposed configurations according to the experimental protocol
proposed in the SVC-onGoing competition [13]. In particular, we compare the results with our
recent Time-Aligned Recurrent Neural Network (TA-RNN) [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. TA-RNN combines the potential
of DTW and RNNs to train more robust systems against forgeries.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Methods</title>
      <p>
        We explore a Siamese architecture with four diferent Transformer configurations for on-line
signature verification. From the original time signals acquired by the device ( X and Y spatial
coordinates and pen pressure), we extract the set of 23 local features proposed in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], obtaining
additional time signals related to velocity, acceleration, geometric aspects of the signature, etc.
These time signals are used as input to our Siamese architecture.
2.1. Transformer Configurations
Diferently from other behavioral biometrics ( e.g., gait and keystroke), on-line signatures usually
consist in longer sequences. Hence, the processing of time signals with Transformer-based
architectures is computationally expensive. Similarly to some approaches proposed for voice
analysis [21, 22], we add convolutional layers prior to Transformers, to aggregate temporal
features of the input signals and reduce their dimensionality. A general representation of the
proposed architecture is provided in Figure 1.
      </p>
      <p>The CNN layers consist of a combination of 1D convolutional and MaxPooling layers.
Convolutional layers extract temporal features by combining consecutive timesteps and augment
the feature size, thanks to the 64 channels in the output. MaxPooling layers reduce timesteps,
making the signals more suitable for Transformers.</p>
      <p>Using the Siamese architecture proposed in Figure 1, we consider four diferent
configurations depending on the Transformer module selected. First, we consider the original Vanilla
Transformer encoder [19], with Gaussian Range Encoding instead of Positional Encoding, given
its suitability with the time series of interest [15]. The Vanilla encoder processes inputs with
size 250 × 64 and generates a vector of size 64 at each timestep. These vectors are processed by
a RNN, whose final state of size 92 is concatenated in the Siamese architecture (see Figure 1).</p>
      <sec id="sec-2-1">
        <title>Enrolled</title>
        <p>Signature
(23 time
signals)
n
g
i
l
A
W
T</p>
        <p>D</p>
      </sec>
      <sec id="sec-2-2">
        <title>Test</title>
        <p>Signature
(23 time
signals)
tcanoC .tr=01upooD ll-yFu tceenndoC iiSgdom</p>
        <p>The second and third approaches are based respectively on the THAT Transformer proposed
for activity recognition [20] and the Transformer proposed for gait recognition [15].</p>
        <p>Finally, we explore a novel configuration based on the Temporal and Channel modules
proposed in THAT [20], but with the Transformer encoder proposed in Vanilla [19]. The
Temporal branch is analogous to the one considered in the first configuration. The Channel
branch processes inputs with size 64 × 250 and generates a vector of size 250 for each channel.
We average these vectors and apply a Fully-Connected layer to reduce the size of the output
to 92 (the same of Temporal branch). The outputs of Temporal and Channel branches are
concatenated, being the final vector of size 184 (Figure 2).</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Experimental Setup</title>
      <p>
        We evaluate our configurations with the experimental protocol proposed in the SVC-onGoing
competition [13]. Two publicly available datasets are considered in the competition: DeepSignDB
[
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], used for development and validation, and SVC2021_EvalDB [13], used for the final evaluation.
Diferent subjects are considered in each dataset. In particular, we focus on the ofice-like
scenario where subjects had to perform signatures using a pen tablet device.
      </p>
      <p>
        To train our four configurations, we generate random pairs of matching and non-matching
signatures from the Development DeepSignDB dataset provided by the SVC-onGoing
competition. We consider both random and skilled non-matching pairs for training. Finally, following
our previous TA-RNN approach [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], for each signature comparison (i.e., genuine-genuine or
genuine-impostor) we align the 23 time signals of each signature pair with DTW, zero-padding
them to obtain a fixed length of 2,000 time samples for each signature.
92
      </p>
      <p>RNN</p>
    </sec>
    <sec id="sec-4">
      <title>4. Results</title>
      <p>The results obtained by evaluating our four Transformer configurations according to the protocol
of the SVC-onGoing competition are reported in Table 1. We consider non-match comparisons
made of random signatures (R), skilled signatures (S), and an overall combination of the two (O).
Random signatures is the type of impostors that always provide the lowest EER, except in the
case of the Vanilla encoder with Temporal and Channel branches, evaluated on SVC2021_EvalDB
that provides 4.42% EER for skilled non-match comparisons and 4.58% EER for random ones.</p>
      <p>The Transformer configurations achieve similar performance compared to the TA-RNN
previously presented. From the four Transformer configurations explored, we observe that the
Vanilla encoder achieves the best overall results, 4.64% EER and 3.80% EER for the DeepSignDB
and SVC2021_EvalDB, respectively. Focusing on the SVC2021_EvalDB dataset considered for
the final evaluation of the competition, we can observe how the Vanilla encoder achieves a
relative improvement of 7% in comparison to the TA-RNN approach (4.08% EER), showing a
better generalisation ability to the new scenarios not considered in training.</p>
      <p>The results of Table 1 show how more complex configurations do not improve the results
obtained in evaluation. Overall EERs raise from 4.64% to 5.36% for DeepSignDB and from 3.80%
to 4.49% for SVC2021_EvalDB when we add the channel branch to the configuration based
on Vanilla encoder. Similar results apply to the other two configurations considered, with the
Transformer proposed for gait recognition that only get closer to the best performances, with
overall EERs of 5.13% and 4.10% in DeepSignDB and SVC2021_EvalDB evaluations.</p>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgment</title>
      <p>This project has received funding from the European Union’s Horizon 2020 research and
innovation programme under the Marie Skłodowska-Curie grant agreement No 860813 -
TReSPAsSETN. With support also from projects INTER-ACTION (PID2021-126521OB-I00 MICINN/FEDER)
and HumanCAIC (TED2021-131787B-I00 MICINN).
Anti-Spoofing: Presentation Attack Detection (2019) Sébastien Marcel, Julian Fierrez, and
Nicholas Evans (Eds.). Springer Nature, 439–453.
[13] R. Tolosana, R. Vera-Rodriguez, C. Gonzalez-Garcia, J. Fierrez, A. Morales, J. Ortega-Garcia,
J. C. Ruiz-Garcia, S. Romero-Tapiador, S. Rengifo, M. Caruana, et al., Svc-ongoing: Signature
verification competition, Pattern Recognition 127 (2022) 108609.
[14] R. Tolosana, R. Vera-Rodriguez, J. Fierrez, A. Morales, J. Ortega-Garcia, Benchmarking
desktop and mobile handwriting across cots devices: The e-biosign biometric database,
PLOS ONE 12 (2017) e0176792.
[15] P. Delgado-Santos, R. Tolosana, R. Guest, F. Deravi, R. Vera-Rodriguez, Exploring
transformers for behavioural biometrics: A case study in gait recognition, Pattern Recognition
(2023).
[16] G. Stragapede, P. Delgado-Santos, R. Tolosana, R. Vera-Rodriguez, R. Guest, A. Morales,
Typeformer: Transformers for mobile keystroke biometrics, arXiv preprint
arXiv:2212.13075 (2022).
[17] P. Delgado-Santos, R. Tolosana, R. Guest, R. Vera-Rodriguez, J. Fierrez, M-GaitFormer:
Mobile Biometric Gait Verification using Transformers, Engineering Applications of
Artificial Intelligence (2023).
[18] Q. Wen, T. Zhou, C. Zhang, W. Chen, Z. Ma, J. Yan, L. Sun, Transformers in time series: A
survey, arXiv preprint arXiv:2202.07125 (2022).
[19] A. Vaswani, N. Shazeer, N. Parmar, J. Uszkoreit, L. Jones, A. N. Gomez, Ł. Kaiser, I.
Polosukhin, Attention is all you need, in: Proceedings of Advances in Neural Information
Processing Systems, volume 30, 2017.
[20] B. Li, W. Cui, W. Wang, L. Zhang, Z. Chen, M. Wu, Two-stream convolution augmented
transformer for human activity recognition, in: Proceedings of the AAAI Conference on
Artificial Intelligence, volume 35, 2021, pp. 286–293.
[21] K. Chen, Y. Wu, Z. Wang, X. Zhang, F. Nian, S. Li, X. Shao, Audio captioning based
on transformer and pre-trained cnn, in: Proceedings of Detection and Classification of
Acoustic Scenes and Events, 2020, pp. 21–25.
[22] Q. Kong, Y. Xu, W. Wang, M. D. Plumbley, Sound event detection of weakly labelled data
with CNN-Transformer and automatic threshold optimization, IEEE/ACM Transactions
on Audio, Speech, and Language Processing 28 (2020) 2450–2460.
[23] C. Gonzalez-Garcia, R. Tolosana, R. Vera-Rodriguez, J. Fierrez, J. Ortega-Garcia,
Introduction to Presentation Attacks in Signature Biometrics and Recent Advances, Handbook of
Biometric Anti-Spoofing: Presentation Attack Detection and Vulnerability Assessment
(2023) Sébastien Marcel, Julian Fierrez, and Nicholas Evans (Eds.). Springer Nature, 447–466.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M.</given-names>
            <surname>Diaz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Ferrer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Impedovo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. I.</given-names>
            <surname>Malik</surname>
          </string-name>
          , G. Pirlo,
          <string-name>
            <given-names>R.</given-names>
            <surname>Plamondon</surname>
          </string-name>
          ,
          <article-title>A perspective analysis of handwritten signature technology</article-title>
          ,
          <source>ACM Computing Surveys</source>
          <volume>51</volume>
          (
          <year>2019</year>
          )
          <fpage>1</fpage>
          -
          <lpage>39</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>M.</given-names>
            <surname>Faundez-Zanuy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Fierrez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Ferrer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Diaz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Tolosana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Plamondon</surname>
          </string-name>
          ,
          <article-title>Handwriting biometrics: Applications and future trends in e-security and e-health</article-title>
          ,
          <source>Cognitive Computation 12</source>
          (
          <year>2020</year>
          )
          <fpage>940</fpage>
          -
          <lpage>953</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>M.</given-names>
            <surname>Martinez-Diaz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Fierrez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. P.</given-names>
            <surname>Krish</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Galbally</surname>
          </string-name>
          ,
          <article-title>Mobile signature verification: Feature robustness and performance comparison</article-title>
          ,
          <source>IET Biometrics 3</source>
          (
          <year>2014</year>
          )
          <fpage>267</fpage>
          -
          <lpage>277</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>R.</given-names>
            <surname>Tolosana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Vera-Rodriguez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Ortega-Garcia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Fierrez</surname>
          </string-name>
          ,
          <article-title>Preprocessing and feature selection for improved sensor interoperability in online biometric signature verification</article-title>
          ,
          <source>IEEE Access 3</source>
          (
          <year>2015</year>
          )
          <fpage>478</fpage>
          -
          <lpage>489</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>R.</given-names>
            <surname>Tolosana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Vera-Rodriguez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Guest</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Fierrez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Ortega-Garcia</surname>
          </string-name>
          ,
          <article-title>Exploiting complexity in pen-and touch-based signature biometrics</article-title>
          ,
          <source>International Journal on Document Analysis and Recognition</source>
          <volume>23</volume>
          (
          <year>2020</year>
          )
          <fpage>129</fpage>
          -
          <lpage>141</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>J.</given-names>
            <surname>Fierrez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Ortega-Garcia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Ramos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Gonzalez-Rodriguez</surname>
          </string-name>
          ,
          <article-title>Hmm-based on-line signature verification: Feature extraction and signature modeling</article-title>
          ,
          <source>Pattern Recognition Letters</source>
          <volume>28</volume>
          (
          <year>2007</year>
          )
          <fpage>2325</fpage>
          -
          <lpage>2334</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>R.</given-names>
            <surname>Tolosana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Vera-Rodriguez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Fierrez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Ortega-Garcia</surname>
          </string-name>
          ,
          <article-title>Reducing the template ageing efect in on-line signature biometrics</article-title>
          ,
          <source>IET Biometrics 8</source>
          (
          <year>2019</year>
          )
          <fpage>422</fpage>
          -
          <lpage>430</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>R.</given-names>
            <surname>Tolosana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Vera-Rodriguez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Fierrez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Ortega-Garcia</surname>
          </string-name>
          ,
          <article-title>Deepsign: Deep on-line signature verification</article-title>
          ,
          <source>IEEE Transactions on Biometrics, Behavior, and Identity Science</source>
          <volume>3</volume>
          (
          <year>2021</year>
          )
          <fpage>229</fpage>
          -
          <lpage>239</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>J.</given-names>
            <surname>Jiang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Jin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhu</surname>
          </string-name>
          , Dsdtw:
          <article-title>Local representation learning with deep soft-dtw for dynamic signature verification</article-title>
          ,
          <source>IEEE Transactions on Information Forensics and Security</source>
          <volume>17</volume>
          (
          <year>2022</year>
          )
          <fpage>2198</fpage>
          -
          <lpage>2212</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>R.</given-names>
            <surname>Tolosana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Delgado-Santos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Perez-Uribe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Vera-Rodriguez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Fierrez</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . Morales, DeepWriteSYN:
          <article-title>On-line handwriting synthesis via deep short-term representations</article-title>
          ,
          <source>in: Proceedings of the AAAI Conference on Artificial Intelligence</source>
          , volume
          <volume>35</volume>
          ,
          <year>2021</year>
          , pp.
          <fpage>600</fpage>
          -
          <lpage>608</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>R.</given-names>
            <surname>Tolosana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Vera-Rodriguez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Fierrez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Ortega-Garcia</surname>
          </string-name>
          ,
          <article-title>BioTouchPass2: Touchscreen password biometrics using time-aligned recurrent neural networks</article-title>
          ,
          <source>IEEE Transactions on Information Forensics and Security</source>
          <volume>15</volume>
          (
          <year>2020</year>
          )
          <fpage>2616</fpage>
          -
          <lpage>2628</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>R.</given-names>
            <surname>Tolosana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Vera-Rodriguez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Fierrez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Ortega-Garcia</surname>
          </string-name>
          ,
          <article-title>Presentation attacks in signature biometrics: types and introduction to attack detection</article-title>
          ,
          <source>Handbook of Biometric</source>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>