<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Non-English and Non-Latin Signature Verification Systems: A Survey</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Srikanta Pal</string-name>
          <email>srikanta.pal@griffithuni.edu.au</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Michael Blumenstein</string-name>
          <email>m.blumenstein@griffith.edu.au</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Umapada Pal</string-name>
          <email>umapada@isical.ac.in</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Computer Vision and Pattern, Recognition Unit, Indian Statistical Institute</institution>
          ,
          <addr-line>Kolkata-700108</addr-line>
          ,
          <country country="IN">India.</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>School of Information and, Communication Technology, Griffith University</institution>
          ,
          <addr-line>Queensland</addr-line>
          ,
          <country country="AU">Australia.</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2011</year>
      </pub-date>
      <abstract>
        <p>- Signatures continue to be an important biometric because they remain widely used as a means of personal verification and therefore an automatic verification system is needed. Manual signature-based authentication of a large number of documents is a difficult and time consuming task. Consequently for many years, in the field of protected communication and financial applications, we have observed an explosive growth in biometric personal authentication systems that are closely connected with measurable unique physical characteristics (e.g. hand geometry, iris scan, finger prints or DNA) or behavioural features. Substantial research has been undertaken in the field of signature verification involving English signatures, but to the best of our knowledge, very few works have considered non-English signatures such as Chinese, Japanese, Arabic etc. In order to convey the state-of-the-art in the field to researchers, in this paper we present a survey of non-English and non-Latin signature verification systems.</p>
      </abstract>
      <kwd-group>
        <kwd>Off-line and On-line signature verification</kwd>
        <kwd>Biometrics</kwd>
        <kwd>Authentication systems</kwd>
        <kwd>Forgeries</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>I. INTRODUCTION</title>
      <p>
        The handwritten signature has always been one of the most
simple and accepted ways to authenticate an official
document. Research into signature verification has been
vigorously pursued for a number of years and it is being
explored especially in the off-line mode [1, 2]. The
recognition of human signatures is significantly concerned
with the improvement of the interface between human-beings
and computers [3, 4]. A signature verification system and the
associated techniques used to solve the inherent problems of
authentication can be divided into two classes: (a) on-line
methods [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
        ] to measure the sequential data such as order of
stroke, and writing speed, pen pressure and other temporal
information by utilizing intelligent algorithms [
        <xref ref-type="bibr" rid="ref10 ref9">9, 10</xref>
        ], and (b)
off-line methods [
        <xref ref-type="bibr" rid="ref11 ref12">11, 12</xref>
        ] that use an optical scanner to obtain
handwriting data written on paper. On-line signature
verification has been shown to achieve much higher
verification rates than off-line verification [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] as a
considerable amount of dynamic information is lost in the
off-line mode.
      </p>
      <p>
        Signatures are not considered as a collection of letters and
words [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. It is often difficult for a human to instantly verify
two signatures of the same person because signature samples
from the same person are similar but not identical and
signatures can change depending on elements such as mood,
fatigue, time etc. Great inconsistency can even be observed in
signatures according to country, habits, psychological or
mental state, physical and practical conditions [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
Significant research has been performed in the field of
signature verification involving English signatures, but to the
best of our knowledge, very little attention has been given
towards non-English signatures such as Chinese, Japanese,
Arabic etc. In order to convey the state-of-the-art of
nonEnglish signature verification, in this paper we present a
survey of non-English and non-Latin signature verification
systems.
      </p>
    </sec>
    <sec id="sec-2">
      <title>II. SIGNATURE VERIFICATION CONCEPT</title>
      <p>In general to deal with the problem of off-line/on-line
signature verification, researchers have investigated a
commonly used approach which is based on two different
patterns of classes: class1 and class 2. Here class1 represents
the genuine signature set, and class2 represents the forged
signature set.</p>
      <p>Usually two types of errors are considered in signature
verification system. The False Rejection, which is called a
Type-1 error and the False Acceptance, which is called a
Type-2 error. So there are two common types of error rates:
False Rejection Rate (FRR) which is the percentage of
genuine signatures treated as forgeries, and False Acceptance
Rate (FAR) which is the percentage of forged signatures
treated as genuine.</p>
    </sec>
    <sec id="sec-3">
      <title>III. TYPES OF FORGERIES</title>
      <p>
        There are usually three different types of forgeries to take
into account. According to Coetzer et al. [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], the three basic
types of forged signatures are indicated below:
1. Random forgery. The forger has no access to the genuine
signature (not even the author‟s name) and reproduces a
random one.
2. Simple forgery. The forger knows the author‟s name, but
has no access to a sample of the signature.
3. Skilled forgery. The forger has access to one or more
samples of the genuine signature and is able to reproduce it.
      </p>
      <p>
        But based on the various skilled levels of forgeries, it can
also be divided into six different subsets. The paper [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]
shows various skill levels of forgeries and these are shown
below.
1. A forged signature can be another person‟s genuine
signature. Justino et al. [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] categorized this type of forgery
as a Random Forgery.
2. A forged signature is produced with the knowledge about
the genuine writer‟s name only. Hanmandlu et al. [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]
categorized this type as a Random Forgery whereas Justino et
al. [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] categorized this type as a Simple Forgery. Weiping et
al. categorized this type as a Casual Forgery [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ].
3. A forged signature imitating a genuine signature‟s model
reasonably well is categorized as a Simulated Forgery by
Justino et al. [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ].
4. Signatures produced by inexperienced forgers without the
knowledge of their spelling after having observed the genuine
specimens closely for some time are categorized as Unskilled
Forgeries by Hanmandlu et al. [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ].
5. Signatures produced by forgers after unrestricted practice
by non-professional forgers are categorized as Simple
Forgery/Simulated Simple Forgery by Ferrer et al. [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ], and a
Targeted Forgery by Huang and Yan [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ].
6. Forgeries which are produced by a professional imposter
or person who has experience in copying Signatures are
categorized as Skilled Forgeries by Hanmandlu et al. [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ].
      </p>
      <p>IV. NON-ENGLISH SIGNATURE VERIFICATION</p>
      <p>TECHNIQUES
We think that the shape of non-English signatures and
writing styles are different to English signatures. Arabic
script is written from left to right. Most of the Japanese
signatures consist of two to six kanji, hiragana and/or
katakana component characters and they are spaced
appropriately from each other. Persian signatures are also
different from other signature types because people usually
do not use text in it and they draw a shape as their signature.
Hence in this work, non-English signature verification
systems are reported and they are described below.</p>
      <sec id="sec-3-1">
        <title>A. Chinese Signature Verification Systems</title>
        <p>
          Chinese signature consists of many strokes and these
strokes can be taken into consideration for signature
authentication. Liu [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ] discussed this issue, but he discussed
it from the point of view of identifying a signature manually.
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>Off-line Chinese Signature Verification Systems</title>
        <p>
          Lv et al. [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ] developed a Chinese off-line signature
verification system. A database of 1100 signatures was
developed for experimentation. Support Vector Machines
(SVM) are used as a classifier. Four different types of
features such as moment feature, direction feature, grey
distribution and stroke width distribution are used here.
Based on each feature, the accuracies are calculated
separately and an average accuracy was also calculated based
on all combined feature sets. An average error rate 5.10% is
found using the combined feature sets. SVM based
techniques are also proposed by Chen et al. [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ] and Meng et
al. [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ] for Chinese signature verification. Shen et al. [
          <xref ref-type="bibr" rid="ref27">27</xref>
          ]
proposed an off-line Chinese signature verification system
based on geometric features. A database of 800 signatures
was used for experimentation and obtained 96.8% accuracy.
Four main features such as: (a) Envelope of the signature (b)
Cross-count feature (c) Centre of gravity feature and
distance between vectors made from the centre of gravity (d)
Embedded white area and position are used to optimise the
verification scheme. Some similar works are also proposed
by Bajaj et al. [
          <xref ref-type="bibr" rid="ref28">28</xref>
          ] and Huang et al. [
          <xref ref-type="bibr" rid="ref29">29</xref>
          ].
        </p>
        <p>
          Lin and Li [
          <xref ref-type="bibr" rid="ref30">30</xref>
          ] proposed a Chinese signature verification
scheme using normalized Zernike moment invariants
(NZMI). A total of 210 signature samples were collected
from 35 writers. The average accuracies of 8% and 12%
are obtained for FRR and FAR, respectively. Belkasim et
al. [
          <xref ref-type="bibr" rid="ref31">31</xref>
          ] introduced a new recursive formula to derive
Zernike moments.
        </p>
        <p>
          In another work of Lin and Li [
          <xref ref-type="bibr" rid="ref32">32</xref>
          ], they utilized a set of
shape features based on special characteristics of Chinese
signatures along with high pressure feature. Their features
includes: (a) Ratio of a signature's height to its width. (b)
Ratio of a signature's height to its packed width (c) Slant (d)
Stroke width. To define the global high-pressure features
(GHP) they use Ammar et al‟s [
          <xref ref-type="bibr" rid="ref33">33</xref>
          ] dynamic threshold
selecting method. A database of 100 genuine Chinese
signatures and 50 forged signatures are collected for the
experiment. Reported FRR and FAR rates are 1.0% and
4.0%, respectively.
        </p>
        <p>
          Chang et al. [
          <xref ref-type="bibr" rid="ref34">34</xref>
          ] presented a dynamic handwritten Chinese
signature verification system based upon a Bayesian neural
network. Features such as: timing features, average velocity
feature, average length in the eight directions, width/height
ratio, left-part/right-part density ratio, upper-part/lower-part
density ratio etc are utilize in the work. Similar works are
proposed by Brault and Plamondon [
          <xref ref-type="bibr" rid="ref35">35</xref>
          ] and Lorette [
          <xref ref-type="bibr" rid="ref36">36</xref>
          ]. A
database of 1200 signature samples is collected. The
experimental results show the type I error is about 2% and
the type II error rates are approximately 0.1% and 2.5% for
“simple” and “skilled” forgeries, respectively.
        </p>
        <p>
          Ji et al. [
          <xref ref-type="bibr" rid="ref37">37</xref>
          ] developed an off-line Chinese signature
verification system based on a weighting factor of similarity
computation. Their earlier paper introduces an improved
approach to verify off-line Chinese signatures and it is
described in [
          <xref ref-type="bibr" rid="ref38">38</xref>
          ]. In their proposed scheme, seven features
such as (a) Relative horizontal centre (b) Relative vertical
centre (c) The number of points having horizontal neighbours
(d) The number of points having vertical neighbours, (e) The
number of points having positive diagonal neighbours (f) The
number of points having negative diagonal neighbours and
(g) Stroke thickness of the segments are used. This technique
for off-line Chinese signature verification based on different
weighting factors is compared with an expert on questioned
documents used to verify a signature sample [
          <xref ref-type="bibr" rid="ref39">39</xref>
          ]. The
experimental results are generated differently using different
data sets. The average ERR is 3.30% and the average EAR is
16.50% for simple forgeries when the weighting factor is
0.04.
        </p>
        <p>
          Ji and Chen [
          <xref ref-type="bibr" rid="ref40">40</xref>
          ] proposed an off-line Chinese signature
verification System. A method to solve the problem for
random forgeries and simple forgeries is presented in their
paper. The pre-processing techniques used here are described
in detail in [
          <xref ref-type="bibr" rid="ref41">41</xref>
          ]. The features are extracted in seven steps as
discussed in the paper [
          <xref ref-type="bibr" rid="ref33">33</xref>
          ]. A database of 4800 handwriting
samples from 32 participants is used in this method to
obtain a verification accuracy rate of 91%.
        </p>
        <p>
          Zuo et al. [
          <xref ref-type="bibr" rid="ref42">42</xref>
          ] proposed an off-line Chinese signature
verification scheme using Pseudo-Zernike invariant moments
as for static features due to scale and translation invariance.
High-density factors, relative gravity centre and Wavelet
Transform are used as dynamic features. A database of 290
signatures was collected. As a result of their experiments, the
FAR and FRR was 7.84% and 6.89%, respectively.
        </p>
        <p>
          Cheng et al. [
          <xref ref-type="bibr" rid="ref43">43</xref>
          ] presented a handwritten Chinese
signature verification scheme. An attributed string matching
approach based on the writing sequences of an input
signature is proposed. In order to obtain an attributed string
that is used in the string matching similarity calculation, the
input signatures are split into several segments. The stroke
attributed feature is used in their proposed technique. A large
database is used to obtain 1.5% and 3.6% for type1 and type2
error rates respectively. A similar matching method is
performed by Chen et al. [
          <xref ref-type="bibr" rid="ref44">44</xref>
          ].
        </p>
        <p>
          Ye et al. [
          <xref ref-type="bibr" rid="ref45">45</xref>
          ] developed an off-line handwritten Chinese
signature verifier with an inflection feature. Different scale
wavelet transforms are used in the curvature signature signals
transformation. The signature curves are divided into several
parts, i.e. the strokes, according to the inflections. The
distance between two corresponding strokes is measured with
a Dynamic Time Warping algorithm. A database of 3120
signatures was collected for the experiments. The rate of FRR
and FAR (skilled forgery) are 1.33 % and 6.72%,
respectively.
        </p>
      </sec>
      <sec id="sec-3-3">
        <title>On-Line Chinese Signature Verification Systems</title>
        <p>
          Xiao and Dai [
          <xref ref-type="bibr" rid="ref46">46</xref>
          ] introduced a hierarchical on-line
Chinese signature verification system. First, global features
are applied to obtain a statistical decision through comparing
their weighted distance. Secondly, the input primitive string
is matched with its reference primitive string by attributed
automaton. In their paper an attributed automaton [
          <xref ref-type="bibr" rid="ref47">47</xref>
          ] which
has four edit operations (insertion, deletion etc.) are applied
to solve the problem of inconsistency of signature
segmentation.
        </p>
        <p>
          Tseng and Huang [
          <xref ref-type="bibr" rid="ref48">48</xref>
          ] presented an on-line Chinese
signature verification scheme based on the ART Neural
Network. The verification method based on one bit quantized
pressure patterns, which constitute time domain information.
The timing information contained in the on/off motions of
handwriting is analysed by Zimmermann and Varady [
          <xref ref-type="bibr" rid="ref49">49</xref>
          ].
Carpenter and Grossberg [
          <xref ref-type="bibr" rid="ref50">50</xref>
          ] also proposed a method based
on the ART Neural Network. The error rates 4.5% and 5%
are obtained for type1 and type 2, respectively. Techniques
based on neural network expert systems to identify Chinese
signature are proposed by Ng and He [
          <xref ref-type="bibr" rid="ref51">51</xref>
          ] and He et al. [
          <xref ref-type="bibr" rid="ref52">52</xref>
          ].
        </p>
        <p>
          Cheng et al. [
          <xref ref-type="bibr" rid="ref53">53</xref>
          ] presented an on-line Chinese signature
verification system using a voting scheme. Global feature,
line segment feature, 8-directional chain code feature,
Spectral information, similarity of position sequences,
similarity of velocity sequence, similarity of attribute strings,
segment correlation, Tremor feature are used in these nine
expert steps. A database of 600 genuine signatures and 12000
forge signatures is used. Some similar types of works are
conducted by Suen et al. [
          <xref ref-type="bibr" rid="ref54">54</xref>
          ] and Jeng et al. [
          <xref ref-type="bibr" rid="ref55">55</xref>
          ] based on
neural networks and wavelet transforms respectively. Y.
Mizukami [56)] developed a handwritten Chinese character
recognition system using hierarchical displacement extraction
based on directional features. Other techniques involving
online signature verification can be obtained in [
          <xref ref-type="bibr" rid="ref57 ref58 ref59 ref60 ref61 ref62 ref63 ref64">57-64</xref>
          ].
        </p>
      </sec>
      <sec id="sec-3-4">
        <title>B. Japanese Signature Verification Systems</title>
        <p>
          The Japanese handwritten signature verification is
difficult due to the lack of stability and individuality. Only a
few articles are available on Japanese handwritten
verification and they are discussed as follows. Ueda et al.
[
          <xref ref-type="bibr" rid="ref65">65</xref>
          ] presented an off-line Japanese signature verification
system using a pattern matching technique. The similarity
between two signatures obtained by pattern matching is
affected by stroke widths. Stroke widths vary with the pen
used for signing, and even if signatures are written with the
same pen, the stroke width may also vary. In their modified
pattern matching method, the strokes of the signatures are
first thinned and then the thinned signatures are blurred by a
fixed point-spread function. A database of 2000 signatures
including 100 genuine signatures from 10 writers and 100
forged signatures from 10 writers are used. An average error
rate 9.10% is obtained. Some techniques for verification of
Japanese handwritten signatures have been proposed in
[6668].
        </p>
        <p>
          Yoshimura and Yoshimura [
          <xref ref-type="bibr" rid="ref69">69</xref>
          ] presented off-line
verification of Japanese signatures after elimination of
background patterns. Some preprocessing techniques to
eliminate the background pattern are performed as follows:
position adjustment, filtering, clipping of random noise and
smoothing for noise elimination etc. The verification stage
following the preprocessing stage is based on the Arc Pattern
Method. A small data set is used to obtain an error rate of
approximately 14%. Mizukami et al. [
          <xref ref-type="bibr" rid="ref70">70</xref>
          ] proposed an
offline Japanese signature verification system using an extracted
displacement function.
        </p>
      </sec>
      <sec id="sec-3-5">
        <title>C. Persian Signature Verification Systems</title>
        <p>
          Ghandali et al. [
          <xref ref-type="bibr" rid="ref71">71</xref>
          ] proposed an off-line Persian
signature identification and verification system based on
Discrete Wavelet Transform and image fusion. In this
method, DWT is employed to access high-frequency bands of
signature shape. Then, different samples of a person‟s
signature are fused together based on high frequency bands to
generate the signature patterns. This pattern is saved in the
learning phase. SVMs are used here as classifiers. A database
consists of 6 genuine, 1 simple forgery and 1 skilled forgery
signatures from each of the 90 signers is used. The error
rates, 8.9% and 10% are obtained for FRR and FAR,
respectively. Chalechale and Mertins [
          <xref ref-type="bibr" rid="ref72">72</xref>
          ], Chalechale et al.
[
          <xref ref-type="bibr" rid="ref73">73</xref>
          ] proposed a Persian signature recognition system using
line segment distribution. Zoghi et al. [
          <xref ref-type="bibr" rid="ref74">74</xref>
          ] introduced a
Persian signature verification system using Improved
Dynamic Time Warping-based Segmentation and
Multivariate Autoregressive Modelling. A database including
1250 genuine signatures and 750 forged signatures was used
to obtain an accuracy of 88.8% for the testing of skilled
forgery signatures. The statistical spectral estimate for each
signature segment is obtained via the use of an
AutoRegressive model [
          <xref ref-type="bibr" rid="ref75">75</xref>
          ]. The verification process is carried out
using an Artificial Neural Network with a multilayer
perceptron architecture described in [
          <xref ref-type="bibr" rid="ref76">76</xref>
          ].
        </p>
      </sec>
      <sec id="sec-3-6">
        <title>D. Arabic Signature Verification Systems</title>
        <p>
          Ismail et al. [
          <xref ref-type="bibr" rid="ref77">77</xref>
          ] proposed an off-line Arabic signature
recognition and verification technique. In the first phase
(Identification phase) some features are extracted and there
features are: area filtering, translation, extraction of the
circularity feature, normalization, image enhancement, partial
histogram (Vertical projection, Horizontal projection),
Centres of gravity, extraction of the global baseline (BSL),
extraction of the upper limit (UL) and lower limit (LL),
thinning, calculation of the global slant etc. In this phase, the
features are classified into two main groups: global features
and local features. In the second phase (Verification phase)
some other features are also extracted such as central line
features, corner line features, central circle features, corner
curve features and critical point features. A set of signature
data consisting of 220 genuine samples and 110 forged
samples is used for experimentation. Their system obtained a
95.0% recognition rate and a 98% verification rate. Other
techniques of Arabic handwritten word recognition systems
are described in [
          <xref ref-type="bibr" rid="ref78 ref79 ref80 ref81 ref82 ref83 ref84 ref85 ref86 ref87">78-87</xref>
          ].
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>V. OUR INSIGHTS AND FUTURE WORK</title>
      <p>As we could observe among the literature of non-English
signature verification research, the maximum work has been
performed for Chinese language systems. For Japanese,
Arabic and Persian only a few pieces of work have been
done. Despite the many works in this area, from this survey,
we can observe that there are still many challenges in this
research area. Signatures may be written in different
languages and we need to undertake a systematic study of
this. To the best of our knowledge there is no published work
on signatures written in Indian languages. India is a
multilingual and multi-script country and except for English, many
people write signatures in local state languages such as Hindi,
Bangla, Telugu, Tamil, etc. Thus there is a need to work on
signatures written in Indian languages. Researchers have used
different features for signature verification. Combinations of
different classifiers as well as novel and hybrid classifiers
should be explored in future work to enhance performance.
Accordingly in this survey we noted that all the published
work is based on foreground information. A combination of
background and foreground information may be considered
for obtaining better results in the future.</p>
    </sec>
    <sec id="sec-5">
      <title>VI. CONCLUSION</title>
      <p>To highlight the state-of-the-art to researchers in the field,
this paper presents a survey of the literature on non-English
and non-Latin signature verification. Different existing
approaches are discussed and compared along with their
FAR, FRR and associated accuracies. The accuracy rates
obtained so far from the available systems is not sufficiently
high, and more research on off-line signature verification as
well as on-line signature verification is required.</p>
      <p>REFRRENCES</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <given-names>S.</given-names>
            <surname>Chen</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Srihari</surname>
          </string-name>
          , “
          <article-title>Use of Exterior Contour and Shape Features in Off-line Signature Verification”</article-title>
          ,
          <source>8th ICDAR</source>
          , pp.
          <fpage>1280</fpage>
          -
          <lpage>1284</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <given-names>Hai</given-names>
            <surname>Rong</surname>
          </string-name>
          <string-name>
            <surname>Lv</surname>
          </string-name>
          , Wen Jun Yin and Jin Dong, “
          <article-title>Off-line Signature Verification based on deformable grid partition and Hidden Markov Models”</article-title>
          ,
          <source>International Conference on Multimedia and Expo. (ICME2009</source>
          ) pp.
          <fpage>374</fpage>
          -
          <lpage>377</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>B.</given-names>
            <surname>Majhi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.S.</given-names>
            <surname>Reddy</surname>
          </string-name>
          and
          <string-name>
            <given-names>D.P.</given-names>
            <surname>Babu</surname>
          </string-name>
          , “
          <article-title>Novel Features for Off-line Signature Verification”</article-title>
          <source>International Journal of Computers</source>
          ,
          <source>Communications &amp; Control</source>
          , Vol. I, No.
          <issue>1</issue>
          , pp.
          <fpage>17</fpage>
          -
          <lpage>24</lpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <surname>M.A. Ferrer</surname>
            ,
            <given-names>J.B.</given-names>
          </string-name>
          <string-name>
            <surname>Alonso</surname>
          </string-name>
          and
          <string-name>
            <surname>C. M. Travieso</surname>
          </string-name>
          ,
          <article-title>"Off-line Geometric Parameters for Automatic SignatureVerification Using Fixed-Point Arithmetic" in Pattern Analysis</article-title>
          and
          <source>Machine Intelligence</source>
          , vol.
          <volume>27</volume>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <given-names>S.</given-names>
            <surname>Madabusi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Srinivas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Bhaskaran</surname>
          </string-name>
          ,M. Balasubramanian, “
          <article-title>On-line and off-line signature verification using relative slope algorithm”</article-title>
          ,
          <source>Int Workshop on Measurement Systems for Homeland Security</source>
          ,
          <source>(IMS</source>
          <year>2005</year>
          ) , pp.
          <fpage>11</fpage>
          -
          <lpage>15</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <given-names>F. A.</given-names>
            <surname>Fernandez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Fierrez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. M.</given-names>
            <surname>Diaz</surname>
          </string-name>
          and
          <string-name>
            <given-names>J. O.</given-names>
            <surname>Garcia</surname>
          </string-name>
          , “
          <article-title>Fusion of Static Image and Dynamic Information for Signature Verification</article-title>
          ,
          <source>16th Int. Conference on, Image Processing</source>
          ,
          <source>(ICIP-2009)</source>
          , pp.
          <fpage>2725</fpage>
          -
          <lpage>2728</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Xue</given-names>
            <surname>Ling</surname>
          </string-name>
          , Yunhong Wang, Zhaoxiang Zhang and Yiding Wang, “
          <article-title>Online signature verification based on Gabor features”, Wireless and Optical Communications Conferences (WOCC-</article-title>
          <year>2010</year>
          ), pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Simina</given-names>
            <surname>Emerich</surname>
          </string-name>
          , Eugen Lupu and
          <string-name>
            <given-names>Corneliu</given-names>
            <surname>Rusu</surname>
          </string-name>
          . “
          <article-title>On-line Signature Recognition Approach Based on Wavelets and Support Vector Machines”</article-title>
          ,
          <source>Int Con on Automation Quality and Testing Robotics (AQTR-2010)</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kholmatov</surname>
          </string-name>
          , and
          <string-name>
            <given-names>B.</given-names>
            <surname>Yanikoglu</surname>
          </string-name>
          , “
          <article-title>Identity Authentication using improved online signature verification method”</article-title>
          ,
          <source>Pattern Recognition Letters</source>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>T. S.</given-names>
            <surname>Ong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W. H.</given-names>
            <surname>Khoh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. B. J.</given-names>
            <surname>Teoh</surname>
          </string-name>
          , „
          <article-title>„Dynamic Handwritten Signature Verification based on Statistical Quantization Mechanism”</article-title>
          ,
          <source>Int Conf. on Computer Engineering and Technology</source>
          ,
          <year>2009</year>
          , pp.
          <fpage>312</fpage>
          -
          <lpage>316</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>M.</given-names>
            <surname>Kalera</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Srihari</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Xu</surname>
          </string-name>
          . “
          <article-title>Offline signature verification and identification using distance statistics”</article-title>
          ,
          <source>IJPRAI- 2004</source>
          , pp.
          <fpage>1339</fpage>
          -
          <lpage>1360</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>D.</given-names>
            <surname>Bertolini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.S.</given-names>
            <surname>Oliveira</surname>
          </string-name>
          , E.Justino, R.Sabourin, “
          <article-title>Reducing forgeries in writer-independent off-line signature verification through ensemble of classifiers”</article-title>
          ,
          <source>Pattern Recognition</source>
          <volume>43</volume>
          (
          <year>2010</year>
          )
          <fpage>387</fpage>
          -
          <lpage>396</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>I.</given-names>
            <surname>Pottier</surname>
          </string-name>
          and G. Burel, „
          <article-title>„Identification and Authentication of Handwritten Signatures with a Connectionist Approach”</article-title>
          ,
          <source>In Proc. 1994 IEEE Conf. On Neural Networks</source>
          , pp.
          <fpage>2948</fpage>
          -
          <lpage>2951</lpage>
          ,
          <year>July 1994</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>B.</given-names>
            <surname>Fang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.H.</given-names>
            <surname>Leung</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.Y.</given-names>
            <surname>Tang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.W.</given-names>
            <surname>Tse</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.C.K.</given-names>
            <surname>Kwok</surname>
          </string-name>
          and
          <string-name>
            <given-names>Y.K.</given-names>
            <surname>Wong</surname>
          </string-name>
          ,
          <article-title>"Off-line signature verification by the tracking of feature and stroke positions"</article-title>
          ,
          <source>Pattern Recognition</source>
          ,
          <year>2003</year>
          , pp.
          <fpage>91</fpage>
          -
          <lpage>101</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>R.</given-names>
            <surname>Abbas</surname>
          </string-name>
          and
          <string-name>
            <given-names>V.</given-names>
            <surname>Ciesielski</surname>
          </string-name>
          , “
          <article-title>A Prototype System for Off-line Signature Verification Using Multilayered Feedforward Neural Networks”</article-title>
          ,
          <year>1995</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>J.</given-names>
            <surname>Coetzer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Herbst</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J. D.</given-names>
            <surname>Preez</surname>
          </string-name>
          , “
          <article-title>Off-line signature verification using the discrete radon transform and a hidden markov model”</article-title>
          ,
          <source>EURASIP Journal on Applied Signal Processing</source>
          ,
          <year>2004</year>
          ,
          <volume>4</volume>
          ,
          <fpage>559</fpage>
          -
          <lpage>571</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>V.</given-names>
            <surname>Nguyen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Blumenstein</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Muthukkumarasamy</surname>
          </string-name>
          and G. Leedham, “
          <article-title>Off-line Signature Verification Using Enhanced Modified Direction Features in Conjunction with Neural Classifiers and Support Vector Machines” ICDAR-</article-title>
          <year>2007</year>
          , pp.
          <fpage>734</fpage>
          -
          <lpage>738</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>E. J. R.</given-names>
            <surname>Justino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Bortolozzi</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Sabourin</surname>
          </string-name>
          ,
          <article-title>"A comparison of SVM and HMM classifiers in the off-line signature verification," Pattern Recognition Letters</article-title>
          , vol.
          <volume>26</volume>
          , pp.
          <fpage>1377</fpage>
          -
          <lpage>1385</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>M.</given-names>
            <surname>Hanmandlu</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. H. M. Yusof</surname>
            , and
            <given-names>V. K.</given-names>
          </string-name>
          <string-name>
            <surname>Madasu</surname>
          </string-name>
          ,
          <article-title>"Off-line signature verification and forgery detection using fuzzy modelling,"</article-title>
          <source>Pattern Recognition</source>
          , vol.
          <volume>38</volume>
          , pp.
          <fpage>341</fpage>
          -
          <lpage>356</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>H.</given-names>
            <surname>Weiping</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Xiufen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Kejun</surname>
          </string-name>
          ,
          <article-title>"A survey of off-line signature verification,"</article-title>
          <source>Intelligent Mechatronics and Automation</source>
          ,
          <volume>04</volume>
          ,pp.
          <fpage>536</fpage>
          -
          <lpage>541</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Ferrer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. B.</given-names>
            <surname>Alonso</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C. M.</given-names>
            <surname>Travieso</surname>
          </string-name>
          ,
          <article-title>"Offline geometric parameters for automatic signature verification using fixed-point arithmetic,"</article-title>
          <source>PAMI</source>
          , vol.
          <volume>27</volume>
          , pp.
          <fpage>993</fpage>
          -
          <lpage>997</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>K.</given-names>
            <surname>Huang</surname>
          </string-name>
          and
          <string-name>
            <given-names>H.</given-names>
            <surname>Yan</surname>
          </string-name>
          ,
          <article-title>"Off-line signature verification using structural feature correspondence,"</article-title>
          <source>PR</source>
          , vol.
          <volume>35</volume>
          , pp.
          <fpage>2467</fpage>
          -
          <lpage>2477</lpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>K.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <article-title>Handbook of seal imprint and signature verification</article-title>
          ,
          <source>Taipei</source>
          ,
          <year>1990</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>H.</given-names>
            <surname>Lv</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Zhuo</surname>
          </string-name>
          , “
          <article-title>Off-line chinese signature verification based on support vector machines</article-title>
          ,
          <source>” PRL</source>
          , pp.
          <fpage>2390</fpage>
          -
          <lpage>2399</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <surname>Xiaojing</surname>
            <given-names>Chen</given-names>
          </string-name>
          , Xiaomin Yu, Di Wu, Yong He, “
          <article-title>Application of Leastsquare Support Vector Machines in Qualitative Analysis of Visible and Near Infrared Spectra: Determination of Species and Producing Area of Panax”</article-title>
          ,
          <source>Fourth Int. Conf. on Natural Computation</source>
          ,
          <year>2008</year>
          , pp.
          <fpage>107</fpage>
          -
          <lpage>111</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>M.</given-names>
            <surname>Meng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Xi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Luo</surname>
          </string-name>
          , “
          <article-title>On-line Signature Verification Based on Support Vector Data Description and Genetic Algorithm”</article-title>
          ,
          <source>World Congress on Intelligent Control and Automation</source>
          ,
          <year>2008</year>
          , pp.
          <fpage>3778</fpage>
          -
          <lpage>3782</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Shen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Qiang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Pan</surname>
          </string-name>
          ,
          <article-title>Off-line Signature Verification Using Geometric Features Specific to Chinese Handwriting, “</article-title>
          <source>24th Int. Conf. Information Technology Interfaces”</source>
          ,
          <source>(ITI</source>
          <year>2002</year>
          ), June 24-27, Croatia.
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>R.</given-names>
            <surname>Bajaj</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Chaudhury</surname>
          </string-name>
          ,
          <article-title>Signature Verification using multiple neural classifiers</article-title>
          ,
          <source>Pattern Recognition</source>
          ,
          <year>1997</year>
          , (
          <issue>PR-1997</issue>
          ) pp.
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>K.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Yan</surname>
          </string-name>
          ,
          <article-title>Off-line signature verification based on geometric feature extraction and neural network classification, (PR-</article-title>
          <year>1997</year>
          ) pp.
          <fpage>9</fpage>
          -
          <lpage>17</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <surname>Hai</surname>
            <given-names>Lin</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hai-Zhou</surname>
            <given-names>Li</given-names>
          </string-name>
          , “
          <article-title>Chinese Signature Verification with Moment Invariants”</article-title>
          ,
          <source>Int Con on Systems, Man, and Cybernetics</source>
          ,
          <year>1996</year>
          ,pp.
          <fpage>2963</fpage>
          -
          <lpage>2968</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>S.O.</given-names>
            <surname>Belkasim</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>ShridharM</article-title>
          .Ahmadi, “
          <article-title>Pattern recognition with moment invariants: a comparative study and new results”</article-title>
          ,
          <source>PR</source>
          , pp.
          <volume>11</volume>
          <fpage>17</fpage>
          -
          <lpage>1</lpage>
          138.
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>Jun</given-names>
            <surname>Lin</surname>
          </string-name>
          and
          <article-title>Jie-gu Li, “Off-Line Chinese Signature Verification”</article-title>
          ,
          <source>Int. Conference on Image Processing</source>
          , (ICIP-1996) pp.
          <fpage>205</fpage>
          -
          <lpage>207</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>M.</given-names>
            <surname>Ammar</surname>
          </string-name>
          , Yuuji Yoshida &amp; Teruo
          <string-name>
            <surname>Fukumura</surname>
          </string-name>
          ,
          <article-title>"Off-line Pre-processing and Verification of Signature"</article-title>
          ,
          <source>IJPRAI</source>
          ,
          <year>1988</year>
          , Vol.
          <volume>2</volume>
          , pp.
          <fpage>589</fpage>
          -
          <lpage>602</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <surname>Hong-De Chang</surname>
          </string-name>
          ,
          <string-name>
            <surname>Jhing-Fa Wangt</surname>
          </string-name>
          and
          <string-name>
            <surname>Hong-Ming</surname>
            <given-names>Suent</given-names>
          </string-name>
          , “
          <article-title>Dynamic Handwritten Chinese Signature Verification”</article-title>
          ,
          <source>ICDAR-93</source>
          , pp.
          <fpage>258</fpage>
          -
          <lpage>261</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>J. J.</given-names>
            <surname>Brault</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Plamondon</surname>
          </string-name>
          ,
          <article-title>"Histogram classifier for characterization of handwritten signature dynamic"</article-title>
          ,
          <source>P RVol. 1</source>
          , pp.
          <fpage>619</fpage>
          -
          <lpage>622</lpage>
          ,
          <year>1984</year>
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>G.</given-names>
            <surname>Lorette</surname>
          </string-name>
          ,
          <article-title>"On-line handwritten signature recognition based on data analysis and clustering"</article-title>
          , P
          <string-name>
            <surname>R</surname>
          </string-name>
          , Vol.
          <volume>2</volume>
          , pp.
          <fpage>1284</fpage>
          -
          <lpage>1287</lpage>
          ,
          <year>1984</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>J</given-names>
            <surname>Ji</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Chen</surname>
          </string-name>
          and
          <string-name>
            <given-names>X.</given-names>
            <surname>Chen</surname>
          </string-name>
          , “
          <article-title>Off-line Chinese Signature Verification Using Weighting Factor on Similarity Computation”</article-title>
          ,
          <source>2nd International Conference on e-business and Information System Security (EBISS2010)</source>
          .pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [38]
          <string-name>
            <given-names>J.W.</given-names>
            <surname>Ji</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Lu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Chen</surname>
          </string-name>
          .
          <article-title>Similarity computation Based on Feature Extraction for Off-line Chinese Signature Verification</article-title>
          ,
          <source>Sixth Inter Conference on Fuzzy Systems and Knowledge Discovery</source>
          , Vol.
          <volume>1</volume>
          , pp.
          <fpage>291</fpage>
          -
          <lpage>295</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [39]
          <string-name>
            <given-names>C.</given-names>
            <surname>Santos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.J.R.</given-names>
            <surname>Justino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Bortolozzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Sabourin</surname>
          </string-name>
          ,
          <article-title>An Off-Line Signature Verification Method Based on the Questioned Document Expert‟s Approach and a Neural Network Classifier</article-title>
          , IWFHR, pp.
          <fpage>498</fpage>
          -
          <lpage>502</lpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          [40]
          <article-title>Jun-wen Ji and Xiao-su Chen, ”Off-line Chinese Signature Verification Segmentation</article-title>
          and Feature Extraction”,
          <source>International Conference on Computational Intelligence and Software Engineering”</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          .
          <fpage>2009</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          [41]
          <string-name>
            <given-names>T. H.</given-names>
            <surname>Rhee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Sung J.</given-names>
            <surname>Cho</surname>
          </string-name>
          and
          <string-name>
            <surname>Jin H. Kim</surname>
          </string-name>
          , “
          <article-title>On-Line Signature Verification Using Model-Guided Segmentation and Discriminative Feature Selection for Skilled Forgeries”, Procs</article-title>
          . of
          <string-name>
            <surname>Sixth</surname>
            <given-names>ICDAR</given-names>
          </string-name>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          [42]
          <string-name>
            <surname>Wen-ming Zuo</surname>
          </string-name>
          ,
          <article-title>Shao-fa Li and Xian-gui Zeng, “A Hybrid Scheme for Off-line Chinese Signature Verification”</article-title>
          ,
          <source>Proceedings of the IEEE Conference on Cybernetics and Intelligent Systems</source>
          ,
          <year>2004</year>
          , pp.
          <fpage>1402</fpage>
          -
          <lpage>1405</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          [43]
          <string-name>
            <given-names>N.J.</given-names>
            <surname>Cheng</surname>
          </string-name>
          , C.J.
          <string-name>
            <surname>We</surname>
            ,
            <given-names>H.F.</given-names>
          </string-name>
          <string-name>
            <surname>Yaul</surname>
          </string-name>
          , T.S.Liu, “
          <source>Handwritten Chinese Signature Verification based on Attributed String Matching of Stroke Linkage Order” Carnahan Conf. on Security Technology</source>
          ,
          <year>1998</year>
          , pp.
          <fpage>238</fpage>
          -
          <lpage>243</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          [44]
          <string-name>
            <given-names>Y. T.</given-names>
            <surname>Chen</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Z.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <article-title>"Automatic authentication of on-line signature data,"</article-title>
          <source>Proc. of National Computer Symposium</source>
          <year>1991</year>
          , pp.
          <fpage>446</fpage>
          -
          <lpage>451</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          [45]
          <string-name>
            <surname>Xiufen</surname>
            <given-names>Ye</given-names>
          </string-name>
          , Weiping Hou, Weixing Feng, “
          <article-title>Off-line Handwritten Signature Verification With Inflections Feature”</article-title>
          ,
          <source>Proc of the Int Conference on Mechatronics &amp; Automation</source>
          ,
          <year>2005</year>
          , pp.
          <fpage>787</fpage>
          -
          <lpage>792</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          [46]
          <string-name>
            <surname>Xu-Hong Xiao Ru-Wei</surname>
            <given-names>Dai</given-names>
          </string-name>
          , “
          <article-title>A Hierarchical On-line Chinese Signature Verification System”</article-title>
          ,
          <source>Proceedings of the Third International Conference on Document Analysis and Recognition</source>
          ,
          <year>1995</year>
          , pp.
          <fpage>202</fpage>
          -
          <lpage>205</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          [47]
          <string-name>
            <given-names>Y.J.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.W.</given-names>
            <surname>Dai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A Fuzzy</given-names>
            <surname>Attributed</surname>
          </string-name>
          <article-title>Automaton for Online Chinese Character Recognition</article-title>
          ,
          <source>Acta Automatica Sics</source>
          , Vol.
          <volume>14</volume>
          , No. 2,
          <string-name>
            <surname>Mar</surname>
          </string-name>
          .
          <year>1988</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          [48]
          <string-name>
            <given-names>L. Y.</given-names>
            <surname>Tseng</surname>
          </string-name>
          and
          <string-name>
            <given-names>T. H.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <source>“An Online Chinese Signature Verification Scheme Based on the ART1 Neural Network”</source>
          ,
          <year>1992</year>
          IEEE,
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          [49]
          <string-name>
            <given-names>K. P.</given-names>
            <surname>Zimmermann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. J.</given-names>
            <surname>Varady</surname>
          </string-name>
          ,
          <article-title>"Hand writer identification from onebit quantized pressure patterns"</article-title>
          ,
          <source>PR</source>
          ,
          <year>vo1</year>
          .18, no.
          <issue>1</issue>
          ,
          <issue>1985</issue>
          , pp.
          <fpage>63</fpage>
          -
          <lpage>72</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref50">
        <mixed-citation>
          [50]
          <string-name>
            <given-names>G.A.</given-names>
            <surname>Carpenter</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Grossberg</surname>
          </string-name>
          ,
          <article-title>"The ART of adaptive pattern recognition by a self organizing neural network"</article-title>
          , IEEE Computer, (
          <year>1988</year>
          ), pp.
          <fpage>77</fpage>
          -
          <lpage>88</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref51">
        <mixed-citation>
          [51]
          <string-name>
            <given-names>G.S.</given-names>
            <surname>Ng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.S.</given-names>
            <surname>Ong</surname>
          </string-name>
          , “
          <article-title>A neural network approach for offline signature verification”</article-title>
          ,
          <source>In Proc of Computer</source>
          , Communication, Control and
          <string-name>
            <given-names>Power</given-names>
            <surname>Engineering</surname>
          </string-name>
          ,
          <year>1993</year>
          .
          <source>IEEE Region 10 Conference</source>
          , vol.
          <volume>2</volume>
          pp.
          <fpage>770</fpage>
          -
          <lpage>773</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref52">
        <mixed-citation>
          [52]
          <string-name>
            <given-names>Z.Y.</given-names>
            <surname>He</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.H.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.F.</given-names>
            <surname>Chen</surname>
          </string-name>
          , “
          <article-title>A neural network expert system for Chinese handwriting-based writer identification”</article-title>
          .
          <source>In Proc. International Conference Machine Learning and Cybernetics</source>
          ,
          <year>2002</year>
          , pp.
          <fpage>2194</fpage>
          -
          <lpage>2196</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref53">
        <mixed-citation>
          [53]
          <string-name>
            <surname>Nai-Jen</surname>
            <given-names>Cheng</given-names>
          </string-name>
          , Kuei Liu, Kun-Chi Cheng, Chien-Cheng Tseng and BorShenn Jeng, “
          <article-title>On-Line Chinese Signature Verification Using Voting Scheme”</article-title>
          ,
          <source>Int. Carnahan Conf. on Security Technology-97</source>
          , pp.
          <fpage>123</fpage>
          -
          <lpage>126</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref54">
        <mixed-citation>
          [54]
          <string-name>
            <surname>H.M.Suen</surname>
            ,
            <given-names>J .F.</given-names>
          </string-name>
          <string-name>
            <surname>Wang and H. D.Huang</surname>
          </string-name>
          , “
          <article-title>Online Chinese signature verification"</article-title>
          ,
          <source>in Proc. IPPR Conf. on CVGIP</source>
          , pp.
          <fpage>29</fpage>
          -
          <lpage>36</lpage>
          , Taiwan,
          <year>1993</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref55">
        <mixed-citation>
          [55]
          <string-name>
            <given-names>B.S.</given-names>
            <surname>Jeng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.J.</given-names>
            <surname>Wen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>II.F.</given-names>
            <surname>Yan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.Y.</given-names>
            <surname>Tiug</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.C.</given-names>
            <surname>Tseng</surname>
          </string-name>
          , N.J.Cheng, “
          <article-title>Online Chinese signature verification based on the multi resolution property of wavelet transform”</article-title>
          ,
          <source>in Proc. IPPR Conf. CVGIP</source>
          , pp.
          <fpage>430</fpage>
          -
          <lpage>437</lpage>
          ,
          <year>1996</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref56">
        <mixed-citation>
          [56]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Mizukami</surname>
          </string-name>
          , “
          <article-title>A handwritten Chinese character recognition system using hierarchical displacement extraction based on directional features”</article-title>
          ,
          <source>PRL</source>
          <volume>19</volume>
          (
          <issue>7</issue>
          ),
          <year>1998</year>
          ,
          <fpage>595</fpage>
          -
          <lpage>604</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref57">
        <mixed-citation>
          [57]
          <string-name>
            <given-names>C. C.</given-names>
            <surname>Hsu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. F.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <surname>Pao-Chung Chang</surname>
          </string-name>
          and
          <string-name>
            <surname>Bor-Shenn</surname>
            <given-names>Jeng</given-names>
          </string-name>
          , “
          <article-title>On-Line Chinese Signature Verification based on Multi-Expert Strategy”</article-title>
          ,
          <source>Int Carnahan Conference on Security Technology</source>
          ,
          <year>1998</year>
          .pp.
          <fpage>169</fpage>
          -
          <lpage>173</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref58">
        <mixed-citation>
          [58]
          <string-name>
            <given-names>N. J.</given-names>
            <surname>Cheng</surname>
          </string-name>
          , C. J.
          <string-name>
            <surname>Wen</surname>
            ,
            <given-names>H. F.</given-names>
          </string-name>
          <string-name>
            <surname>Yaul</surname>
            ,
            <given-names>D. H.</given-names>
          </string-name>
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Liu</surname>
            , K. C. Cheng and
            <given-names>B.S.</given-names>
          </string-name>
          <string-name>
            <surname>Jeng</surname>
          </string-name>
          , “
          <article-title>On-line Chinese Signature Verification with Mixture of Experts”</article-title>
          ,
          <source>Proc. Inte. Carnahan Conference on Security Tech</source>
          ,
          <year>1998</year>
          , pp.
          <fpage>244</fpage>
          -
          <lpage>247</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref59">
        <mixed-citation>
          [59]
          <string-name>
            <surname>Liu</surname>
            <given-names>Fang</given-names>
          </string-name>
          , Qiao Yizheng, “
          <article-title>An on-line Chinese signature verification system using an impulse response of signature generation model”</article-title>
          ,
          <source>Pro. of the 3rd World Congress on Intelligent Control and Automation</source>
          ,
          <year>2000</year>
          ,
          <fpage>2540</fpage>
          -
          <lpage>2543</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref60">
        <mixed-citation>
          [60]
          <string-name>
            <surname>Dariusz</surname>
            <given-names>Z.</given-names>
          </string-name>
          <string-name>
            <surname>Lejtman</surname>
          </string-name>
          and Susan E. George, “
          <article-title>On-line handwritten signature verification using wavelets and back-propagation neural networks”</article-title>
          ,
          <source>Proc. Sixth International Conference on Document Analysis and Recognition</source>
          ,
          <year>2001</year>
          (ICDAR-
          <year>2001</year>
          ). Pp.
          <volume>992</volume>
          -
          <fpage>996</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref61">
        <mixed-citation>
          [61]
          <string-name>
            <surname>Zhong-Hua</surname>
            <given-names>Quan</given-names>
          </string-name>
          ,
          <string-name>
            <surname>De-Shuang</surname>
            <given-names>Huang</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kun-Hong</surname>
            <given-names>Liu</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kwok-Wing</surname>
            <given-names>Chau</given-names>
          </string-name>
          , “
          <article-title>A Hybrid HMM/ANN Based Approach for Online Signature Verification”</article-title>
          ,
          <source>Int. Joint Conf. on Neural Networks</source>
          ,
          <year>2007</year>
          pp.
          <fpage>402</fpage>
          -
          <lpage>405</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref62">
        <mixed-citation>
          [62]
          <string-name>
            <given-names>A.</given-names>
            <surname>Ahrary</surname>
          </string-name>
          ,
          <string-name>
            <surname>S.I. Kamata</surname>
          </string-name>
          , “
          <article-title>A new On-line Signature Verification Algorithm Using Hilbert Scanning Patterns”</article-title>
          ,
          <source>IEEE 13th International Symposium on Consumer Electronics</source>
          , (ISCE -
          <year>2009</year>
          ).pp.
          <fpage>276</fpage>
          -
          <lpage>279</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref63">
        <mixed-citation>
          [63]
          <string-name>
            <surname>Hao-Ran</surname>
            <given-names>Deng</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yun-Hong</surname>
            <given-names>Wang</given-names>
          </string-name>
          , “
          <article-title>On-line signature verification based on correlation image”</article-title>
          , ICMLC,
          <year>2009</year>
          , pp.
          <fpage>1788</fpage>
          -
          <lpage>1792</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref64">
        <mixed-citation>
          [64]
          <string-name>
            <given-names>J.F.</given-names>
            <surname>Aguilar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.O.</given-names>
            <surname>Garcia</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.G.</given-names>
            <surname>Rodriguez</surname>
          </string-name>
          , “
          <article-title>Target Dependent Score Normalization Techniques and Their Application to Signature Verification”</article-title>
          ,
          <source>IEEE Trans on Systems, Man, and Cybernetics</source>
          , Part C: pp.
          <fpage>418</fpage>
          -
          <lpage>425</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref65">
        <mixed-citation>
          [65]
          <string-name>
            <surname>Katsuhiko</surname>
            <given-names>Ueda</given-names>
          </string-name>
          , “
          <article-title>Investigation of Off-line Japanese Signature Verification Using a Pattern Matching”</article-title>
          ,
          <source>Proc. of the 7th‟ ICDAR</source>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref66">
        <mixed-citation>
          [66]
          <string-name>
            <given-names>I.</given-names>
            <surname>Yoshimura</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Yoshimura</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Tsukamoto</surname>
          </string-name>
          , “
          <article-title>Investigation of an automatic verification system for Japanese countersignatures on traver‟s cheques”</article-title>
          ,
          <source>Proc. of the 7th IGS Conference</source>
          , pp.
          <fpage>86</fpage>
          -
          <lpage>87</lpage>
          ,
          <year>1995</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref67">
        <mixed-citation>
          [67]
          <string-name>
            <given-names>M.</given-names>
            <surname>Yoshimura</surname>
          </string-name>
          and
          <string-name>
            <surname>I. Yoshimura</surname>
          </string-name>
          , “
          <article-title>Investigation of a verification system for Japanese countersignatures on traver‟s cheques”, Transactions of the IEICE, J80-D-II, 7</article-title>
          , pp.
          <fpage>1764</fpage>
          -
          <lpage>1773</lpage>
          ,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref68">
        <mixed-citation>
          [68]
          <string-name>
            <given-names>S.</given-names>
            <surname>Ando</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Nakajima</surname>
          </string-name>
          , “
          <article-title>An active search of local individualities for an off-line signature verification”,IEICE, J84-D-II,7</article-title>
          ,pp.
          <fpage>1339</fpage>
          -
          <lpage>1350</lpage>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref69">
        <mixed-citation>
          [69]
          <string-name>
            <given-names>I.</given-names>
            <surname>Yoshimura</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Yoshimura</surname>
          </string-name>
          , “
          <article-title>Off-line verification of Japanese signatures after elimination of background patterns”</article-title>
          ,
          <source>Progress In Automatic Signature Verification</source>
          ,
          <year>1993</year>
          , pp
          <fpage>53</fpage>
          -
          <lpage>68</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref70">
        <mixed-citation>
          [70]
          <string-name>
            <surname>Yoshiki</surname>
            <given-names>Mizukami</given-names>
          </string-name>
          , Mitsu Yoshimura, Hidetoshi Miike, Isao Yoshimura, “
          <article-title>An off-line signature verification system using an extracted displacement function”</article-title>
          ,
          <source>Proc. of the Fifth ICDAR-1999</source>
          , pp.
          <fpage>757</fpage>
          -
          <lpage>760</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref71">
        <mixed-citation>
          [71]
          <string-name>
            <given-names>S.</given-names>
            <surname>Ghandali</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.E.</given-names>
            <surname>Moghaddam</surname>
          </string-name>
          , “
          <article-title>A Method for Off-line Persian Signature Identification and Verification Using DWT</article-title>
          and
          <string-name>
            <surname>Image</surname>
            <given-names>Fusion”</given-names>
          </string-name>
          ,
          <source>(ISSPIT</source>
          <year>2008</year>
          ).pp.
          <fpage>315</fpage>
          -
          <lpage>319</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref72">
        <mixed-citation>
          [72]
          <string-name>
            <given-names>A.</given-names>
            <surname>Chalechale</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Mertins</surname>
          </string-name>
          , “
          <article-title>Persian signature recognition using line segment distribution,”</article-title>
          <source>in IEEE TENCON-2003</source>
          , pp.
          <fpage>11</fpage>
          -
          <lpage>15</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref73">
        <mixed-citation>
          [73]
          <string-name>
            <given-names>A.</given-names>
            <surname>Chalechale</surname>
          </string-name>
          , G. Naghdy, and
          <string-name>
            <given-names>P.</given-names>
            <surname>Pramaratne</surname>
          </string-name>
          ,
          <article-title>Arabic /Persian cursive signature recognition and verification using line segment distribution</article-title>
          ,
          <source>Int Con. on Information and Communication Technologies</source>
          ,
          <volume>04</volume>
          , pp.
          <fpage>475</fpage>
          -
          <lpage>476</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref74">
        <mixed-citation>
          [74]
          <string-name>
            <given-names>M.</given-names>
            <surname>Zoghi</surname>
          </string-name>
          and
          <string-name>
            <given-names>V.</given-names>
            <surname>Abolghasemi</surname>
          </string-name>
          , “
          <article-title>Persian Signature Verification Using Improved Dynamic Time Warping-based Segmentation and Multivariate Autoregressive Modeling”, (SSP-</article-title>
          <year>2009</year>
          ),
          <year>2009</year>
          pp.
          <fpage>329</fpage>
          -
          <lpage>332</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref75">
        <mixed-citation>
          [75]
          <string-name>
            <given-names>J. V.</given-names>
            <surname>Candy</surname>
          </string-name>
          “
          <string-name>
            <surname>Model-Based Signal</surname>
            Processing”,
            <given-names>A J</given-names>
          </string-name>
          .
          <source>Wiley and Sons2006.</source>
        </mixed-citation>
      </ref>
      <ref id="ref76">
        <mixed-citation>
          [76]
          <string-name>
            <given-names>N.M</given-names>
            <surname>Krishnan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.S.</given-names>
            <surname>Lee</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.J.</given-names>
            <surname>Paulik</surname>
          </string-name>
          ,
          <article-title>“Multi-Layer Neural Network Classification of On-Line Signatures”</article-title>
          ,
          <source>Proceedings of the IEEE Midwest Symposium on Circuits and Systems</source>
          , Ames,
          <year>1996</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref77">
        <mixed-citation>
          [77]
          <string-name>
            <given-names>M.A.</given-names>
            <surname>Ismail</surname>
          </string-name>
          and Samia Gad, “
          <article-title>Off-line Arabic Signature Recognition and Verification”</article-title>
          , PR,
          <year>2000</year>
          ,pp.
          <fpage>1727</fpage>
          -
          <lpage>1740</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref78">
        <mixed-citation>
          [78]
          <string-name>
            <given-names>V.</given-names>
            <surname>Margner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Pechwitz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. EI</given-names>
            <surname>Abed</surname>
          </string-name>
          ,
          <article-title>" Arabic Handwriting Recognition"</article-title>
          .
          <source>Proc. In ICDAR</source>
          ,
          <year>2005</year>
          , pp.
          <fpage>70</fpage>
          -
          <lpage>74</lpage>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref79">
        <mixed-citation>
          [79]
          <string-name>
            <given-names>L. M.</given-names>
            <surname>Lorigo</surname>
          </string-name>
          and
          <string-name>
            <given-names>V.</given-names>
            <surname>Govindaraju</surname>
          </string-name>
          ,
          <article-title>"Offline Arabic handwriting recognition: a survey"</article-title>
          ,
          <source>IEEE T-PAMI</source>
          , vol.
          <volume>28</volume>
          , pp.
          <fpage>712</fpage>
          -
          <lpage>724</lpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref80">
        <mixed-citation>
          [80]
          <string-name>
            <surname>Jawad</surname>
            <given-names>H AIKhateeb</given-names>
          </string-name>
          , Fouad Khelifi, Jianmin Jiani, Stan S Ipson, “
          <article-title>A New Approach for Off-Line Handwritten Arabic Word Recognition Using KNN Classifier”</article-title>
          ,
          <source>ICSIPA- 2009</source>
          , pp.
          <fpage>191</fpage>
          -
          <lpage>194</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref81">
        <mixed-citation>
          [81]
          <string-name>
            <given-names>M.</given-names>
            <surname>Pechwitz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Margner</surname>
          </string-name>
          .
          <article-title>HMM based approach for handwritten Arabic word recognition using the IFNIENIT database</article-title>
          .
          <source>ICDAR-03</source>
          , pp.
          <fpage>890</fpage>
          -
          <lpage>894</lpage>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref82">
        <mixed-citation>
          [82]
          <string-name>
            <given-names>Rarny</given-names>
            <surname>El-Hajj</surname>
          </string-name>
          ,
          <article-title>Laurence Likforrnan-Sulem, and Chafic Mokbel, "Arabic Handwriting Recognition Using Baseline Dependant Features and Hidden Markov Modeling,"</article-title>
          <source>ICDAR</source>
          ,pp.
          <fpage>893</fpage>
          -
          <lpage>897</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref83">
        <mixed-citation>
          [83]
          <string-name>
            <given-names>H</given-names>
            <surname>ElAbed</surname>
          </string-name>
          , and
          <string-name>
            <given-names>V.</given-names>
            <surname>Margner</surname>
          </string-name>
          .
          <article-title>Comparison of Different Preprocessing and Feature Extraction Methods for Offline Recognition of Handwritten Arabic Words</article-title>
          .
          <source>Proc. ICDAR</source>
          , vol.
          <volume>2</volume>
          , pp.
          <fpage>974</fpage>
          -
          <lpage>978</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref84">
        <mixed-citation>
          [84]
          <string-name>
            <surname>Abdallah</surname>
            <given-names>Benouareth</given-names>
          </string-name>
          , Abdellatif Ennaji, and
          <string-name>
            <given-names>Mokhtar</given-names>
            <surname>Sellami</surname>
          </string-name>
          ,
          <article-title>"HMMs with Explicit State Duration Applied to Handwritten Arabic Word Recognition,"</article-title>
          <source>Proc. ICPR</source>
          vol.
          <volume>2</volume>
          , pp.
          <fpage>897</fpage>
          -
          <lpage>900</lpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref85">
        <mixed-citation>
          [85]
          <string-name>
            <surname>Abdallah</surname>
            <given-names>Benouareth</given-names>
          </string-name>
          , Abdel Ennaji, and Mokhtar Sellami:
          <article-title>Semicontinuous HMMs with explicit state duration for unconstrained Arabic word modeling and</article-title>
          <string-name>
            <surname>recognition. P. R. L</surname>
          </string-name>
          ,
          <year>2008</year>
          ,
          <volume>29</volume>
          (
          <issue>12</issue>
          ):
          <fpage>1742</fpage>
          -
          <lpage>1752</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref86">
        <mixed-citation>
          [86]
          <string-name>
            <given-names>M.</given-names>
            <surname>Pechwitz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. S.</given-names>
            <surname>Maddouri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Margner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Ellouze</surname>
          </string-name>
          and
          <string-name>
            <given-names>H.</given-names>
            <surname>Amiri</surname>
          </string-name>
          ,
          <article-title>"IFNIENIT Database of Arabic Handwrittenwords"</article-title>
          ,
          <string-name>
            <surname>Colloque International</surname>
          </string-name>
          Franco-phone sur l'
          <source>Ecrit et IeDocument</source>
          <year>2002</year>
          , pp
          <fpage>127</fpage>
          -
          <lpage>136</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref87">
        <mixed-citation>
          [87]
          <string-name>
            <surname>J. AIKhateeb</surname>
            , J. Ren,
            <given-names>S. S.</given-names>
          </string-name>
          <string-name>
            <surname>Ipson</surname>
            and
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Jiang</surname>
          </string-name>
          <article-title>: "Knowledge based Baseline Detection and Optimal Thresholding for Words Segmentation in Efficient Pre-processing of Handwritten Arabic Text"</article-title>
          .
          <source>Proc. 5th Int. Conf. Information Technology: New Generation</source>
          , pp
          <fpage>1158</fpage>
          -
          <lpage>1159</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>