<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Evaluation of Local and Global Features for Offline Signature Verification</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Muhammad Imran Malik y</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Marcus Liwicki</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andreas Dengel y</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>German Research Center for AI (DFKI GmbH) Knowledge Management Department</institution>
          ,
          <addr-line>Kaiserslautern</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2011</year>
      </pub-date>
      <fpage>26</fpage>
      <lpage>30</lpage>
      <abstract>
        <p>-In this paper we evaluate the impact of two stateof-the-art offline signature verification systems which are based on local and global features, respectively. It is important to take into account the real world needs of Forensic Handwriting Examiners (FHEs). In forensic scenarios, the FHEs have to make decisions not only about forged and genuine signatures but also about disguised signatures, i.e., signatures where the authentic author deliberately tries to hide his/her identity with the purpose of denial at a later stage. The disguised signatures play an important role in real forensic cases but are usually neglected in recent literaure. This is the novelty of our study and the topic of this paper, i.e., investigating the performance of automated systems on disguised signatures. Two robust offline signature verification systems are slightly improved and evaluated on publicly available data sets from previous signature verification competitions. The ICDAR 2009 offline signature verification competition dataset and the ICFHR 2010 4NSigComp signatures dataset. In our experiments we observed that global features are capable of providing good results if only a detection of genuine and forged signatures is needed. Local features, however, are much better suited to solve the forensic signature verification cases when disguised signatures are also involved. Noteworthy, the system based on local features could outperform all other participants at the ICFHR 4NSigComp 2010.</p>
      </abstract>
      <kwd-group>
        <kwd>-signature verification</kwd>
        <kwd>mixture models</kwd>
        <kwd>forgeries</kwd>
        <kwd>disguised signatures</kwd>
        <kwd>forensic handwriting analysis</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>I. INTRODUCTION</title>
      <p>
        Signature verification is in focus of research for decades.
Traditionally, automated signature verification is divided
into two broad categories, online and offline signature
verification, depending on the mode of the handwritten
input. If both the spatial as well as temporal information
regarding signatures are available to the systems, verification
is performed on online data. In the case where temporal
information is not available and the systems must utilize
only the spatial information gleaned through scanned or
even camera captured documents, verification is performed
on offline data [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        The main motivation of this paper is to study the
forensic relevance of signature features and their influence on
verification. Until now online signature verification is not
a common type of criminal casework for a forensic expert
because the questioned signatures and the collected
reference signatures (known) are commonly supplied offline [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
Therefore, we focused explicitly on the offline signature
verification.
      </p>
      <p>
        In many recent works signature verification has been
considered as a two-class pattern classification problem [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
Here an automated system has to decide whether or not a
given signature belongs to a referenced authentic author. If
the system could not find enough evidence of a forgery from
the questioned signature feature vector, it simply considers
the signature as genuine belonging to the referenced
authentic author, otherwise it declares the signature as forged.
However, when talk about the forensic aspect, there is
another equally important class of signatures that also needs
to be identified, i.e., the disguised signatures.
      </p>
      <p>A disguised signature is a signature that is originally
written by the authentic reference author. However, it differs
from the genuine signatures in the authors intent when it was
written. A genuine signature is written by an author with the
intention of being positively identified by some automated
system or by an FHE. A disguised signature, on the other
hand, is written by the genuine author with the intension
of denial, that he/she has written that particular signature,
later. The purpose of making such disguised signatures can
be hundreds, e.g., a person trying to withdraw money from
his/her own bank account via offline signatures on bank
check and trying to deny the signatures after some time,
or even making a false copy of his/her will etc. Potentially
whatever the reason is, disguised signatures appear in real
world and FHEs have to face them.</p>
      <p>
        The category of disguised signatures has been addressed
during the ICFHR 4NsigComp 2010 [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. This was the first
attempt to include disguised signatures into a signature
verification competition. The systems had to decide whether
the author wrote a signature in a natural way, with an
intension of a disguise, or whether it has been forged by
another writer.
      </p>
      <p>
        In this paper we investigate two methods on two
benchmark data sets. The first method is based on global features,
i.e., a fixed number of features is extracted from signature
images. In contrast, the second method uses a local
approach, i.e., the number of features might vary - depending
on the size of the signature. The two datasets are taken
from previous signature verification competitions, i.e., the
SigComp09 data set from the ICDAR 2009 [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] and the
4NSigComp10 data set from the ICFHR 2010 [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>The rest of this paper is organized as follows. Section II
summarizes the two datasets used for this study. Section III
describes the two robust offline signature verification
systems we applied. Section IV reports on the experimental
results and provides a comparative analysis of the results.
Section V concludes the paper and gives some ideas for our
future work.</p>
    </sec>
    <sec id="sec-2">
      <title>II. DATA SETS</title>
      <sec id="sec-2-1">
        <title>A. ICDAR 2009 Signature Verification Competition</title>
        <p>
          The first data set is the training set of the SigComp09
competition [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]. This dataset contains 1; 898 signature
samples in all. There are 12 genuine authors – each one of whom
wrote 5 of his/her genuine signatures, thereby yielding 60
genuine signatures. 31 forgers were had to forge the genuine
signatures. Each forger contributed 5 forgeries for one writer
resulting in 155 forged signatures per writer.1. Note that this
dataset had no disguised signatures.
        </p>
        <p>
          It is important to note that the said data were collected at a
forensic institute where real forensic casework is performed.
During dataset generation a special focus was given to the
provision of more and more skilled forgeries since
automated systems performance could vary significantly with
how the forgeries were produced [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ].
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>B. ICFHR 2010 Signature Verification Competition</title>
        <p>These signatures were originally collected for evaluating
the knowledge of FHEs under supervision of Bryan Found
and Doug Rogers in the years 2002 and 2006, respectively.
The images were scanned at 600dpi resolution and cropped
at the Netherlands Forensic Institute.</p>
        <p>The signature collection we used in our evaluation is the
original test set of the ICFHR competition. It contains 125
signatures for one reference author. Out of this collection,
25 were the genuine signatures of reference author and
remaining 100 were the questioned signatures. These 100
questioned signatures comprised 3 genuine signatures; 90
simulated signatures (written by 34 forgers freehand copying
the signature characteristics of the referenced author after
training); and 7 disguised signatures written by the reference
author himself/herself with the intention of disguise. Note
the huge difference between authentic data (3 genuine + 7
disguised signatures) vs. simulations (90 signatures). This
did not affect our evaluation since we used the Equal
Error Rate (EER) and relied on the Receiver Operating
Characteristic curves (ROC-curves).</p>
        <p>122 of these forged signatures were not available so they have been
ignored (this results in 1,838 forged signatures in all instead of 1860)</p>
        <p>III. AUTOMATED SIGNATURE VERIFICATION SYSTEMS
In this section we provide a short description of two state
of the art offline signature verification systems we used in
this study.</p>
      </sec>
      <sec id="sec-2-3">
        <title>A. Local Features combined with GMM</title>
        <p>
          This system was originally designed by the authors of this
paper. A prior version of this system participated already
in the ICDAR 2009 signature verification competition and
achieved good results. It was not considered for participation
during the 4NSigComp 2010 since the authors of this papers
were among the organizers of this event. Our system uses
Gaussian Mixture Models (GMMs) for the classification of
the feature vector sequences. For the purpose of
completeness, a short presentation of the system will be given here.
For more details refer to [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ].
        </p>
        <p>Given a scanned image as an input, first of all binarization
is performed. Second, the image is normalized with respect
to skew, writing width and baseline location. Normalization
of the baseline location means that the body of the text
line (the part which is located between the upper and the
lower baselines), the ascender part (located above the upper
baseline), and the descender part (below the lower baseline)
is vertically scaled to a predefined size each. Writing width
normalization is performed by a horizontal scaling operation,
and its purpose is to scale the characters so that they have
a predefined average width.</p>
        <p>
          To extract the feature vectors from the normalized images,
a sliding window approach is used. The width of the window
is generally one pixel and nine geometrical features are
computed at each window position. Thus an input text line
is converted into a sequence of feature vectors in a
9dimensional feature space. The nine features correspond to
the following geometric quantities. The first three features
are concerned with the overall distribution of the pixels in
the sliding window. These are the average gray value of
the pixels in the window, the center of gravity, and the
second order moment in vertical direction. In addition to
these global features, six local features describing specific
points in the sliding window are used. These include the
locations of the uppermost and lowermost black pixel and
their positions and gradients, determined by using the
neighboring windows. Feature number seven is the black to white
transitions present within the entire window. Feature number
eight is the number of black-white transitions between the
uppermost and the lowermost pixel in an image column.
Finally, the proportion of black pixels to the number of
pixels between uppermost and lowermost pixels is used. For
a detailed description of the features see [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ].
        </p>
        <p>
          Gaussian Mixture Models [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] have been used to model
the handwriting of each person. More specifically, the
distribution of feature vectors extracted from a persons
handwriting is modeled by a Gaussian mixture density. For
a D-dimensional feature vector denoted as x, the mixture
density for a given writer (with the corresponding model A
) is defined as:
m
p(xkA) = X wipi(x)
        </p>
        <p>i=1</p>
        <p>
          In other words, the density is a weighted linear
combination of M uni-modal Gaussian densities, pi(x), each
parameterized by a D 1 mean vector, and D*D covariance
matrix. For further details refer to [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ].
        </p>
      </sec>
      <sec id="sec-2-4">
        <title>B. Global Features combined with kNN</title>
        <p>
          Our system is based on the methods introduced in [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ].
However, we have modified/optimized it in order to fit in
the scenarios presented in the datasets of the two mentioned
signature verification competitions. A short summary of the
system is given here, for further details consult [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ].
        </p>
        <p>First, the signature image is spatially smoothed followed
by binarization. In the optimized version of this approach
we used various combinations of local and global
binarization techniques. After these preprocessing steps following
operations were performed.</p>
        <p>Locating the signature image through its bounding box
Centralizing the signature image to its center of gravity.
Partitioning the image horizontally and vertically
starting at center of gravity until it is divided into 64 cells.
Finding the size of each cell of the image and
normalizing it with the total number of black pixels it has.
This constitutes the first feature vector.</p>
        <p>Calculating the angle that is made by the center point
of each cell of the image with its lower right corner to
obtain the second feature vector.</p>
        <p>Obtaining a third feature vector by calculating the angle
of inclination of each black pixel in a cell to the lower
right corner of its corresponding part of the image.
Note that the approach divides the signature into 64 small
parts, which can be seen as a local feature extraction
technique. However, since this division is based on a global
analysis and the number of extracted features is fixed,
disregarding the length of the signature, this approach is
considered as a global approach. Therefore note that a simple
disguise attempt would be to add a random character at the
end of the signature and the global approach would fail while
the local feature extraction would still find many similarities.</p>
        <p>After computing these feature vectors, thresholds are
computed using means and variances. Following that, nearest
neighbor approach is applied to decide on the result of each
feature vector and finally a voting based classification is
made. In the optimized version different voting strategies
have been applied that improved the overall performance.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>IV. EVALUATION</title>
      <p>assessing the performance of signature verification systems.
They are especially suited if there are unequal numbers of
forged and genuine signatures in the dataset as in the case
of both the ICDAR 2009 and ICFHR 2010 datasets. Results
depict that, if only accuracy is used to evaluate signature
verification systems, a system that votes by chance may
show higher accuracy that in fact is false in context of a
biometric system.</p>
      <p>On the ICDAR 2009 dataset we performed 5-fold cross
validation for each of the systems and generated
ROCcurves. Furthermore, we evaluated both the systems on
the ICFHR 2010 dataset again using the ROC-curves. The
details of these evaluations are presented in the following
sections.</p>
      <sec id="sec-3-1">
        <title>A. Results on the ICDAR 2009 Dataset</title>
        <p>
          We did 5-fold cross validation in the same way as in [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]
and [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ], i.e., for each genuine author we used only four
of his/her genuine signatures to train and then tested the
classifiers. The training set was rotated 5 times.
        </p>
        <p>
          Figure 1 shows the results of both the systems on the
ICDAR 2009 data set. It depicts the average results on all
signatures by all writers. As shown in Fig. 1 the global
features based system outperforms the local features based
system. The Equal Error Rate (EER) for the global features
based system is as low as 20 % whereas for the local features
based system it is nearly 36 %. Note that the local features
based system also participated in the ICDAR SigComp 2009.
On the test data it provided an EER of 16 % [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] and was
among the best classifiers. Since the test set is not publicly
available, therefore we evaluated our system on the training
data.
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>B. Results on the ICFHR 2010 Dataset</title>
        <p>For reporting the results we primarily use the
ROCcurves according to the evaluation procedure of the ICFHR
4NSigComp 2010. ROC-curves are a standard procedure of
We evaluated both of the systems described in Section III
according to the scenario posed by the ICFHR 4NSigComp
2010.There, the systems had to present their opinion by
means of the following two output values for each of the
questioned signatures.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>A Probability Value P between 0 and 1.</title>
      <p>A Decision Value D that could be either 1, 2 or 3.</p>
      <p>The Probability Value P was compared to a predefined
threshold t. A higher value (P &gt; t) indicated that the
questioned signature was most likely a genuine one. A lower
value (P t) indicated that the questioned signature was
not genuine, meaning that it was not written by the reference
author. A probability value of (P = t) was considered as
inconclusive. The decision value D represents the system’s
decision about the process by which the questioned signature
was most likely generated. A decision value of 1 means
that the underlying writing is natural: there is no or not
enough evidence of any simulation or disguise attempt and
the signature is written by the reference author. The decision
value 2 represents that the underlying writing process is
unnatural: there is evidence of either a simulation or disguise
attempt. Finally, a decision value 3 shows that the system
is unable to decide if the underlying writing process is
natural or unnatural: no decision could be made whether
the signature is genuine, simulated, or disguised.</p>
      <p>The output reference showing the various output
possibilities is provided as Table I. Here a value of P greater
than t with output 1 means correct genuine authorship, with
output 2, on the other hand, means that the author has
made an attempt to disguise her/his identity. If the Decision
Value is 3, then with any value of probability it is simply
inconclusive. Any value of P less than t with decision value
2 indicates that the questioned signature is a result of a
simulation or disguise process. The final assessment of the
output values is given in Table II.</p>
      <p>
        As mentioned already, the novel feature of this dataset is
the inclusion of disguised signatures. Various
state-of-theart systems participated in the competition and aimed at
correctly classifying these disguised signatures. All of these
systems failed to correctly detect the disguised signatures.
The EER of the best system was larger than 50 %. More
details of these results are provided in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. When these
systems were evaluated without considering the disguised
signatures the results of one participant were nearly perfect.
In order to make our systems’ performance comparable to
those from the ICDAR competition, we present our results in
the same manner, i.e., first without considering the disguised
signatures and then taking the disguised signatures into
account as well.
      </p>
      <p>Figure 2 shows the results when we disregard the
disguised signatures and consider only the case of forged vs.
genuine signatures. The EER of both systems is the same.
However, when considering the area under the curve, the
local feature based system is slightly better.</p>
      <p>The most important aspect of our study is the investigation
of the influence of disguised signatures. The results are
depicted in Figure 3. As shown, the local features based
GMM system performs significantly better than the global
features based system. It has an EER of 20% whereas the
global feature based system has an EER of nearly 56%.
Our point here is that, our GMM classifier performed well
because it was relying exclusively on local features. To
consolidate our thinking we also performed experimentation
with the GMM classifier by feeding it with the global
features (the same global features that are used by our NN
Classifier). The results were worse in this case. The accuracy
went below 50% and the EER was above 70%. Actually
the nature of global features is to have a fixed amount of
features while local features are not fixed. As such our GMM
based system also outperforms all the participants of ICFHR
4NsigComp 2010 in this scenario as well. An important
point to mention here is that our GMM based system was not
even optimized to work with disguised signatures explicitly.
In contrast, it was initially developed as a general-purpose
offline writer identification system. We strongly believe that
this better performance of our system is attributed to the fact
that it relies on the local features.</p>
    </sec>
    <sec id="sec-5">
      <title>V. CONCLUSION AND FUTURE WORK</title>
      <p>In this paper we have reported on the experiments
conducted to evaluate the impact of local and global features
on automated signature verification for off-line signatures
collected by the FHEs. Two state of the art offline signature
verification systems were applied on the datasets of the last
two signature verification competitions.</p>
      <p>Our experimental results show that the global
features could produce acceptable results when the traditional
paradigm of forged vs. genuine authorship is under
consideration. The actual power of local features is revealed
when considering the more realistic scenario which involves
the presence of disguised signatures among the questioned
signatures. This has been shown by using the equal error
rates achieved by a GMM based offline signature verification
system that heavily relies on the local features of offline
signature samples. We strongly believe that the main reason
for the good performance of this system is due to the
difference that this system is relying on local features.</p>
      <p>
        In future we plan to investigate more local features
approaches for signature verification. Using novel image
analysis methods like scale-invariant Speeded Up Robust
Features (SURF) [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] might be an interesting idea as well.
We also plan to combine various offline signature
verification systems based on different global and local features
through voting strategies to produce even better results.
      </p>
      <p>Furthermore, we plan to perform analyses on data which
contains signatures from more reference writers and skilled
forgers. Regarding genuine signatures, large and diverse test
sets where signatures are produced by different authors
under various different psychological and physical conditions
may also yield interesting results.</p>
    </sec>
    <sec id="sec-6">
      <title>ACKNOWLEDGMENT</title>
    </sec>
    <sec id="sec-7">
      <title>The work was supported by the ADIWA project.</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>R.</given-names>
            <surname>Plamondon</surname>
          </string-name>
          and G. Lorette, “
          <article-title>Automatic signature verification and writer identification - the state of the art,” Pattern Recognition</article-title>
          , vol.
          <volume>22</volume>
          , pp.
          <fpage>107</fpage>
          -
          <lpage>131</lpage>
          ,
          <year>1989</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>R.</given-names>
            <surname>Plamondon</surname>
          </string-name>
          and
          <string-name>
            <given-names>S. N.</given-names>
            <surname>Srihari</surname>
          </string-name>
          , “
          <article-title>On-line and off-line handwriting recognition: A comprehensive survey</article-title>
          ,
          <source>” IEEE Transactions on Pattern Analysis and Machine Intelligence</source>
          , vol.
          <volume>22</volume>
          , pp.
          <fpage>63</fpage>
          -
          <lpage>84</lpage>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>D.</given-names>
            <surname>Impedovo</surname>
          </string-name>
          and G. Pirlo, “
          <article-title>Automatic signature verification: The state of the art</article-title>
          ,
          <source>” IEEE Transactions on Systems, Man, and Cybernetics</source>
          , Part C (
          <article-title>Applications</article-title>
          and Reviews), vol.
          <volume>38</volume>
          , no.
          <issue>5</issue>
          , pp.
          <fpage>609</fpage>
          -
          <lpage>635</lpage>
          , Sep.
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>V. L.</given-names>
            <surname>Blankers</surname>
          </string-name>
          , C. E. v. d. Heuvel,
          <string-name>
            <given-names>K. Y.</given-names>
            <surname>Franke</surname>
          </string-name>
          , and
          <string-name>
            <surname>L. G. Vuurpijl.</surname>
          </string-name>
          (
          <year>2009</year>
          )
          <article-title>Call for participation:signature verification competition, on- and offline skilled forgeries</article-title>
          . [Online]. Available: http://sigcomp09.arsforensica.org/
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>M.</given-names>
            <surname>Liwicki</surname>
          </string-name>
          , C. E. van den Heuvel,
          <string-name>
            <given-names>B.</given-names>
            <surname>Found</surname>
          </string-name>
          , and
          <string-name>
            <surname>M. I. Malik</surname>
          </string-name>
          , “
          <article-title>Forensic signature verification competition 4NSigComp2010 - detection of simulated and disguised signatures</article-title>
          ,
          <source>” in 12th International Conference on Frontiers in Handwriting Recognition</source>
          ,
          <year>2010</year>
          , pp.
          <fpage>715</fpage>
          -
          <lpage>720</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>V. L.</given-names>
            <surname>Blankers</surname>
          </string-name>
          , C. E. v. d. Heuvel,
          <string-name>
            <given-names>K. Y.</given-names>
            <surname>Franke</surname>
          </string-name>
          , and
          <string-name>
            <given-names>L. G.</given-names>
            <surname>Vuurpijl</surname>
          </string-name>
          , “
          <article-title>Icdar 2009 signature verification competition</article-title>
          ,”
          <source>in Proceedings of the 2009 10th International Conference on Document Analysis and Recognition</source>
          , ser.
          <source>ICDAR '09</source>
          . Washington, DC, USA: IEEE Computer Society,
          <year>2009</year>
          , pp.
          <fpage>1403</fpage>
          -
          <lpage>1407</lpage>
          . [Online]. Available: http://dx.doi.org/10.1109/ICDAR.
          <year>2009</year>
          .216
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M.</given-names>
            <surname>Liwicki</surname>
          </string-name>
          , “
          <article-title>Evaluation of novel features and different models for online signature verification in a real-world scenario</article-title>
          ,”
          <source>in Proc. 14th Conf. of the Int. Graphonomics Society</source>
          ,
          <year>2009</year>
          , pp.
          <fpage>22</fpage>
          -
          <lpage>25</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>U.-V.</given-names>
            <surname>Marti</surname>
          </string-name>
          and
          <string-name>
            <given-names>H.</given-names>
            <surname>Bunke</surname>
          </string-name>
          ,
          <article-title>Using a statistical language model to improve the performance of an HMM-based cursive handwriting recognition systems</article-title>
          .
          <source>River Edge</source>
          , NJ, USA: World Scientific Publishing Co., Inc.,
          <year>2002</year>
          , pp.
          <fpage>65</fpage>
          -
          <lpage>90</lpage>
          . [Online]. Available: http://portal.acm.org/citation.cfm?id=
          <volume>505741</volume>
          .
          <fpage>505745</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>J.</given-names>
            <surname>Marithoz</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Bengio</surname>
          </string-name>
          , “
          <article-title>A comparative study of adaptation methods for speaker verification</article-title>
          ,”
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A.</given-names>
            <surname>Schlapbach</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Liwicki</surname>
          </string-name>
          , and
          <string-name>
            <given-names>H.</given-names>
            <surname>Bunke</surname>
          </string-name>
          , “
          <article-title>A writer identification system for on-line whiteboard data,” Pattern Recogn</article-title>
          ., vol.
          <volume>41</volume>
          , pp.
          <fpage>2381</fpage>
          -
          <lpage>2397</lpage>
          ,
          <year>July 2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>P. I. S.</given-names>
            <surname>Dr</surname>
          </string-name>
          . Daramola Samuel, “
          <article-title>Novel feature extraction technique for off-line signature verification system</article-title>
          ,”
          <source>International Journal of Engineering Science and Technology</source>
          , vol.
          <volume>2</volume>
          , pp.
          <fpage>3137</fpage>
          -
          <lpage>3143</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>H.</given-names>
            <surname>Bay</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ess</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Tuytelaars</surname>
          </string-name>
          , and
          <string-name>
            <surname>L. Van Gool</surname>
          </string-name>
          , “
          <article-title>Speededup robust features (surf),”</article-title>
          <string-name>
            <given-names>Comput. Vis. Image</given-names>
            <surname>Underst</surname>
          </string-name>
          ., vol.
          <volume>110</volume>
          , pp.
          <fpage>346</fpage>
          -
          <lpage>359</lpage>
          ,
          <year>June 2008</year>
          . [Online]. Available: http://portal.acm.org/citation.cfm?id=
          <volume>1370312</volume>
          .
          <fpage>1370556</fpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>