<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Static Signature Verification by Optical Flow Analysis</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>D. Impedovo</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Member</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>G. Pirlo</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Member</string-name>
        </contrib>
      </contrib-group>
      <pub-date>
        <year>2011</year>
      </pub-date>
      <fpage>31</fpage>
      <lpage>35</lpage>
      <abstract>
        <p>-This paper presents a new approach for static signature verification based on optical flow. In the first part of the paper, optical flow is used for estimating local stability of static signatures. In the second part, signature verification is performed by the analysis of optical flow, using an alternating decision tree. The experimental tests, carried out on signature of the GPDS database, demonstrate the validity of this approach and highlight some direction for further research.</p>
      </abstract>
      <kwd-group>
        <kwd>Static Signature Verification</kwd>
        <kwd>Local Stability</kwd>
        <kwd>Optical Flow</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>I. INTRODUCTION</title>
      <p>Hbiometrics. Unlike other biometric traits, handwritten</p>
      <p>
        ANDWRITTEN signatures occupy a very special place in
signatures have long been established as the most widespread
means of personal verification. Signatures are generally
recognized as a legal means of verifying an individual's
identity by administrative and financial institutions. Moreover,
verification by signature analysis requires no invasive
measurements and people are familiar with the use of
signatures in their daily life [
        <xref ref-type="bibr" rid="ref1 ref2 ref3">1, 2, 3</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>Unfortunately, a handwritten signature is the result of a</title>
      <p>complex generation process. The rapid writing movement
underlying signing is determined by a motor program stored
into the brain of the signer and realized though his/her writing
system (arm, hand, etc.) and writing devices (paper, pen, etc.).</p>
    </sec>
    <sec id="sec-3">
      <title>Therefore, a signature image strongly depends on the</title>
      <p>
        psychophysical state of the signer and the conditions under
which the signature apposition process occurs [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ].
      </p>
      <p>
        The net result is that signature variability is one of the most
relevant issues that must be faced to develop accurate
signature verification systems. In general, two types of
variability can be distinguished in signing: short-term
variability and long-term variability. Short-term modifications
depend on the psychological condition of the writer and on the
writing conditions. Long-term modifications depend on the
alteration of the physical writing system of the signer (arm and
hand, etc. ) as well as on the modification of the motor
program in his/her brain [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ]
      </p>
    </sec>
    <sec id="sec-4">
      <title>In literature, the approaches proposed for the analysis of local stability are mainly devoted to dynamic signatures. A</title>
      <p>
        local stability function can be obtained by using DTW to
match a genuine signature against other authentic specimens.
Each matching is used to identify the Direct Matching Points
(DMPs), that are unambiguously matched points of the
genuine signature. Thus, a DMP can indicate the presence of a
small stable region of the signature, since no significant
distortion has been locally detected. The local stability of a
point of a signature is determined as the average number of
time it is a DMP, when the signature is matched against other
genuine signatures. Following this procedure low- and
highstability regions are identified [
        <xref ref-type="bibr" rid="ref7 ref8 ref9">7, 8, 9</xref>
        ] in the selection of
reference signatures [
        <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
        ] and verification strategies [
        <xref ref-type="bibr" rid="ref12 ref13">12,
13</xref>
        ].
      </p>
      <p>
        A client-entropy measure has been also proposed to group
and characterize signatures in categories that can be related to
signature variability and complexity. The measure, that is
based on local density estimation by a HMM, can be used to
access whether a signature contains or not enough information
to be successfully processed by any verification system [
        <xref ref-type="bibr" rid="ref14 ref15 ref16">14,
15, 16</xref>
        ].
      </p>
      <p>
        Other types of approaches estimate the stability of a set of
common features and the physical characteristics of signatures
which they are most related to, in order to obtain global
information on signature repeatability which can be used to
improve the verification systems [
        <xref ref-type="bibr" rid="ref17 ref18">17, 18</xref>
        ]. In general, these
approaches have shown that there is a set of features that
remain stable over long time periods, while there are other
features which change significantly in time [
        <xref ref-type="bibr" rid="ref19 ref20">19, 20</xref>
        ]. Of course,
since intersession variability is one of the most important
causes of the deterioration of verification performances,
specific parameter-updating approaches have been considered
[
        <xref ref-type="bibr" rid="ref18 ref19 ref20">18, 19, 20</xref>
        ].
      </p>
      <p>
        Concerning static signatures, a multiple pattern-matching
strategy has been recently proposed to determine - at local
level - the degree of stability of each region of a signature [
        <xref ref-type="bibr" rid="ref21 ref22 ref23">21,
22, 23</xref>
        ]. In this paper the optical flow is used to estimate the
local stability of the signature images. In addition, the optical
flow is also considered for signature verification, using an
alternate decision tree classifier. The experimental results,
carried out on signatures of the GPDS database, demonstrate
the validity of the approach with respect to other techniques in
literature.
      </p>
    </sec>
    <sec id="sec-5">
      <title>II. STATIC SIGNATURE ANALYSIS BY OPTICAL FLOW</title>
    </sec>
    <sec id="sec-6">
      <title>Two categories of signature verification systems can be</title>
      <p>
        identified, depending on the data acquisition method [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]: static
(off-line) systems and dynamic (on-line) systems. Static
systems perform data acquisition after the writing process has
been completed. In this case, the signature is represented as a
grey level image I(x,y), where I(x,y) denotes the grey level at
the position (x,y) of the image. The results is that static
systems involve the treatment of the spatio-luminance
representation of a signature image. Therefore, no dynamic
information is available on the signing process when static
signatures are considered [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. Notwithstanding, static
signature verification is very important for many application
fields, like automatic bank-check processing, insurance form
processing, document validation and so on. When static
signatures are considered, information on local stability is an
important parameters for verification aims. In this paper local
stability is analyzed by optical flow. Optical flow can be
defined as the distribution of apparent velocities of movement
of brightness patterns in an image I. As discussed in the
excellent paper of O'Donovan [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ], optical flow has been used
for a variety of computer vision applications like autonomous
navigation, object tracking, traffic analysis, image
segmentation and stabilization.
      </p>
    </sec>
    <sec id="sec-7">
      <title>In this paper we consider the approach of Horn and Shunck for optical flow estimation [25]. In this case optical flow is determined through the minimization of the energy functional [25]:</title>
      <p>where
•</p>
    </sec>
    <sec id="sec-8">
      <title>Ix, Iy and It are the derivatives of the image intensity</title>
      <p>values along the x, y and time dimensions,
respectively;
• [uij(x,y), vij(x,y)]T is the optical flow vector;
• α is the regularization parameter.</p>
    </sec>
    <sec id="sec-9">
      <title>In other words, the functional E consists of two terms: the</title>
      <p>first term is the optical flow constraint equation and the second
is the smoothness constraint which is multiplied by the
regularization parameter α.</p>
      <p>(a)
(b)
Fig. 1. Example of Optical Flow.</p>
    </sec>
    <sec id="sec-10">
      <title>Horn and Schunk work out the previous minimization problem using a digital estimation of the Laplacian for the optical flow gradients, to get a large system with two equations for each pixel that can be solved by the Jacobi method [25].</title>
    </sec>
    <sec id="sec-11">
      <title>In the next section, optical flow analysis is applied to the</title>
      <p>analysis of regional stability of static signatures. For this
purpose, after the preprocessing phase, in which each signature
is binarized and normalized to a fixed rectangular area, the
identification of the stable regions starts.</p>
    </sec>
    <sec id="sec-12">
      <title>In particular, let be:</title>
      <p>• Igi the set of N genuine signatures of a writer,
i=1,2,,…N;
• [uij(x,y), vij(x,y)]T the optical flow between Igi
and Igj .</p>
      <sec id="sec-12-1">
        <title>Now, if we consider the i-th signature Igi of a signer, for</title>
        <p>each pixel Igi(x,y) we can consider the sets of optical flow
vectors defined as:</p>
        <p>Ui ={uij(x,y) | j=1,2,…,N; j≠i }</p>
        <p>Vi = {vij(x,y) | j=1,2,…,N; j≠i }.</p>
      </sec>
      <sec id="sec-12-2">
        <title>The stability (S) of Igi(x,y) can be estimated as:</title>
        <p>S (Iig ( x, y)) =
σ u2 + σ v2
being σu and σv the standard deviation of Ui and
respectively.</p>
        <p>Vi,</p>
      </sec>
    </sec>
    <sec id="sec-13">
      <title>IV. SIGNATURE STABILITY BY OPTICAL FLOW</title>
      <p>
        Optical flow provides useful information on local
dissimilarity among signature images. In this paper this
information is used for signature verification aims. In
particular, signature verification is performed by an alternating
decision tree (ADT). ADT, that was first introduced by Freund
and Mason [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ], consists of decision nodes and prediction
nodes. Decision nodes specifies a predicate condition,
prediction nodes contain a single number. Classification by an
ADT is performed by following all paths for which all decision
nodes are true and summing any prediction nodes that are
traversed. More precisely, in our approach, let be:
• Igi the set of N genuine signatures of a writer,
i=1,2,,…N;
• Ifp the set of M forgery signatures of a writer,
p=1,2,…,M.
      </p>
      <p>In the enrollment stage the ADT is trained by using the
optical flow vectors concerning intra-class and inter-class
variability:
• [uij(x,y), vij(x,y)]T the optical flow between Igi and Igj ,
i,j=1,2,…,N, i≠j (intra-class variability);
• [uik(x,y), vik(x,y)]T the optical flow between Igi and Igk ,
i=1,2,…,N, k=1,2,…,M (inter-class variability).
( a )
( b )</p>
      <p>
        The experimental results have been carried out using static
signatures of the GPDS database. The database contains 16200
signatures from 300 individuals: 24 genuine signatures and 30
forgeries for each individual [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ]. The result here reported
concerns only twenty-five signers since other experiments are
still in progress. For each signer the stability analysis is
performed, according to the approaches described in Section
III. Figure 2 shows a genuine specimen (a) and the result of the
stability analysis obtained by optical flow (b). High stability
regions are marked by continuous-line rectangles, low stability
regions are marked by dotted-line rectangles. In this case the
stability analysis has been achieved by considering the three
optical flows in Figure 3, obtained by computing the optical
flows between the signature in Figure 2a and other three
genuine specimens.
      </p>
    </sec>
    <sec id="sec-14">
      <title>Signature verification has been carried out by considering,</title>
      <p>for each signer, N=5 genuine signatures (Igi, i=1,…,5) and
M=4 forgeries (Ifi, i=1,..,4) for training the ADT. Therefore,
 N 
  = 10 optical flows between genuine signatures and
 2 
N⋅M=20 optical flows between genuine signatures and
forgeries are used for training. For testing, fourteen genuine
and fourteen forged signatures are considered. In the testing
stage, the optical fields [uti(x,y), vti(x,y)]T between the test
signature It and each genuine signature Igi, i=1,2,…,N, are
computed. Each one of the N optical flows is provided to the</p>
    </sec>
    <sec id="sec-15">
      <title>ADT that returns a verification results rti. The N results are</title>
      <p>combined according to the majority vote strategy, in order to
define the final verification result for the test signature It.</p>
    </sec>
    <sec id="sec-16">
      <title>The results, in terms of Type I - False Rejection Rate (FRR)</title>
      <p>and Type II - False Acceptance Rate (FAR) are reported in
Table 1. On average we register a Type I error rate equal to
23% and a Type II error rate equal to 20%. Figure 4 shows an
example of optical flow between two genuine specimens.
Figure 5 shows the optical flow between a genuine specimen
and a forgery. The great amount of deformation is clearly
visible when the optical flow is performed between a genuine
signature and a forgery.</p>
      <p>( a )
Fig. 3. Optical Flows between genuine signatures
( b )
Author
n.</p>
      <p>1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25</p>
      <p>FRR
14%
0%
29%
43%
29%
29%
0%
57%
29%
0%
21%
14%
29%
21%
0%
14%
57%
43%
0%
21%
14%
14%
57%
36%
14%</p>
      <p>FAR
36%
0%
0%
57%
14%
43%
0%
14%
57%
0%
29%
0%
50%
14%
7%
14%
29%
36%
0%
7%
0%
14%
36%
43%
7%</p>
    </sec>
    <sec id="sec-17">
      <title>Experimental Results</title>
      <p>PERFORMANCE</p>
    </sec>
    <sec id="sec-18">
      <title>VI. CONCLUSION</title>
      <p>In this paper optical flow is considered as a tool for static
signature analysis. In the first part of the paper local stability
in static signatures is analyzed by optical flow analysis. In the
second part, optical flow vectors between test signature and
genuine specimens are considered to verify the authenticity of
a test signature, using an alternate decision tree. Some results
carried out on static signatures extracted from the GPDS
database demonstrate the new approach is worth consideration
for further research. Of course, more experimental results are
necessary to verify the effectiveness of the proposed approach
and - in particular - to determine the capability of the Optical</p>
    </sec>
    <sec id="sec-19">
      <title>Flow in recognizing short-term and long-term variability as</title>
      <p>well as for evaluating the extent to which stability depends on
the signature type and signer characteristics.
Fig. 4. Optical Flow: genuine vs genuine</p>
      <p>D. Impedovo (IEEE member) received the M.Eng. degree "summa cum
laude" in Computer Engineering in 2005 and the Ph.D. degree in Computer
Engineering in 2009 from the Polytechnic of Bari (Italy). He is, currently,
with the Department of Computer Science of the University of Bari. His
research interests are in the field of pattern recognition and biometrics
(speaker recognition ad automatic signature verification). He is co-author of
more than 20 articles in these fields in both international journals and
conference proceedings.</p>
      <p>He received "The Distinction" for the best young student presentation in
May 2009 at the International Conference on Computer Recognition Systems
(CORES - endorsed by IAPR). He is reviewer for the Elsevier Pattern
Recognition journal, IET Journal on Signal Processing and IET Journal on
Image Processing and for many International Conferences including ICPR.
Dr. Impedovo is IAPR and IEEE member.</p>
      <p>G. Pirlo (IEEE member) received the Computer Science degree “cum laude”
in 1986 at the Department of Computer Science of the University of Bari.
Since then he has been carrying out research in the field of pattern recognition
and image analysis. In 1988 he received a fellowship from IBM. Since 1991
he has been Assistant Professor at the Department of Computer Science of the
University of Bari, where he is currently Associate Professor. His interests
cover the areas of biometry, pattern recognition, intelligent systems, computer
arithmetic, communication and multimedia technologies.</p>
      <p>He has developed several scientific projects and published more than 150
papers in the field of document analysis and processing, handwriting
recognition, automatic signature verification, parallel architectures for
computing, communication and multimedia technologies for collaborative
work and distance learning. He served as reviewer for many international
journals and conferences. Prof. Pirlo is member of the IEEE and of the IAPR
International Association for Pattern Recognition TC11 (Technical
Committee on “Reading Systems”). He is also in the Governing Board of the
Italian Society for e-Learning (SIe-L).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>R.</given-names>
            <surname>Plamondon</surname>
          </string-name>
          and G. Lorette, “
          <article-title>Automatic Signature Verification and Writer Identification - The State of the Art”</article-title>
          ,
          <string-name>
            <surname>Pattern</surname>
            <given-names>Recognition</given-names>
          </string-name>
          , Vol.
          <volume>22</volume>
          , No. 2,
          <string-name>
            <surname>Jan</surname>
          </string-name>
          .
          <year>1989</year>
          , pp.
          <fpage>107</fpage>
          -
          <lpage>131</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>D.</given-names>
            <surname>Impedovo</surname>
          </string-name>
          , G. Pirlo, “
          <article-title>Automatic Signature Verification - The State of the Art”</article-title>
          ,
          <source>IEEE Transactions on Systems, Man and Cybernetics</source>
          - Part C:
          <article-title>Applications and Review</article-title>
          , Vol.
          <volume>38</volume>
          , No. 5,
          <string-name>
            <surname>Sept</surname>
          </string-name>
          .
          <year>2008</year>
          , pp.
          <fpage>609</fpage>
          -
          <lpage>635</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>G.</given-names>
            <surname>Pirlo</surname>
          </string-name>
          , “
          <article-title>Algorithms for Signature Verification”</article-title>
          ,
          <source>in Proc. of NATOASI Series Fundamentals in Handwriting Recognition, S. Impedovo (Ed.)</source>
          , Springer-Verlag, Berlin,
          <year>1994</year>
          , pp.
          <fpage>433</fpage>
          -
          <lpage>454</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>R.</given-names>
            <surname>Plamondon</surname>
          </string-name>
          , “
          <article-title>A Kinematic Theory of Rapid Human Movements: Part I: Movement Representation and generation”</article-title>
          ,
          <source>Biological Cybernetics</source>
          , Vol.
          <volume>72</volume>
          , No.
          <volume>4</volume>
          ,
          <issue>1995</issue>
          , pp.
          <fpage>295</fpage>
          -
          <lpage>307</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>R.</given-names>
            <surname>Plamondon</surname>
          </string-name>
          , M. Djioua, “
          <article-title>A Multi-Level Representation Paradigm for Handwriting Stroke Generation”</article-title>
          ,
          <source>Human Movement Science</source>
          , Vol
          <volume>25</volume>
          , No.
          <fpage>4</fpage>
          -
          <issue>5</issue>
          ,
          <year>2006</year>
          , pp.
          <fpage>586</fpage>
          -
          <lpage>607</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S.</given-names>
            <surname>Impedovo</surname>
          </string-name>
          and
          <string-name>
            <given-names>G.</given-names>
            <surname>Pirlo</surname>
          </string-name>
          ,
          <article-title>"Verification of Handwritten Signatures: an Overview"</article-title>
          ,
          <source>Proc. 14th International Conference on Image Analysis and Processing - ICIAP</source>
          <year>2007</year>
          , IEEE Computer Society Press, September,
          <fpage>11</fpage>
          -
          <lpage>13</lpage>
          ,
          <year>2007</year>
          , Modena, Italy, pp.
          <fpage>191</fpage>
          -
          <lpage>196</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>G.</given-names>
            <surname>Congedo</surname>
          </string-name>
          , G. Dimauro,
          <string-name>
            <given-names>S.</given-names>
            <surname>Impedovo</surname>
          </string-name>
          , G. Pirlo, “
          <article-title>A new methodology for the measurement of local stability in dynamical signatures”</article-title>
          ,
          <source>4th International Workshop on Frontiers in Handwriting Recognition (IWFHR-4)</source>
          , Taipei, Taiwan, Dec.
          <year>1994</year>
          , pp.
          <fpage>135</fpage>
          -
          <lpage>144</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>G.</given-names>
            <surname>Dimauro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Impedovo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Modugno</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Pirlo</surname>
          </string-name>
          , L. Sarcinella, “
          <article-title>Analysis of Stability in Hand-Written Dynamic Signatures”</article-title>
          , 8th International Workshop on Frontiers in
          <article-title>Handwriting Recognition (IWFHR-8), Ontario, Niagara-on-the-</article-title>
          <string-name>
            <surname>Lake</surname>
          </string-name>
          , Canada, Aug.
          <year>2002</year>
          , pp.
          <fpage>259</fpage>
          -
          <lpage>263</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>K.</given-names>
            <surname>Huang</surname>
          </string-name>
          and
          <string-name>
            <given-names>H.</given-names>
            <surname>Yan</surname>
          </string-name>
          , “
          <article-title>Stability and style-variation modeling for online signature verification”</article-title>
          ,
          <source>Pattern Recognition</source>
          , Vol.
          <volume>36</volume>
          , No.
          <volume>10</volume>
          ,
          <string-name>
            <surname>Oct</surname>
          </string-name>
          .
          <year>2003</year>
          , pp.
          <fpage>2253</fpage>
          -
          <lpage>2270</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>G.</given-names>
            <surname>Congedo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Dimauro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.M.</given-names>
            <surname>Forte</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Impedovo</surname>
          </string-name>
          , G. Pirlo, “
          <article-title>Selecting Reference Signatures for On-Line Signature Verification”</article-title>
          ,
          <source>8th International Conference on Image Analysis and Processing (ICIAP-8)</source>
          ,
          <source>Series: Lecture Notes in Computer Science</source>
          , Vol.
          <volume>974</volume>
          , Springer-Verlag Berlin, Heidelberg,
          <string-name>
            <given-names>C.</given-names>
            <surname>Braccini</surname>
          </string-name>
          , L. De Floriani and G. Vernazza (Eds.), San Remo, Italy, Sept.
          <year>1995</year>
          , pp.
          <fpage>521</fpage>
          -
          <lpage>526</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>V.</given-names>
            <surname>Di Lecce</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Dimauro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Guerriero</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Impedovo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Pirlo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Salzo</surname>
          </string-name>
          , L. Sarcinella, “
          <article-title>Selection of Reference Signatures for Automatic Signature Verification”</article-title>
          ,
          <source>Proc. 5th International Conference on Document Analysis and Recognition (ICDAR-5)</source>
          , Bangalore, India, Sept.
          <fpage>20</fpage>
          -
          <lpage>22</lpage>
          ,
          <year>1999</year>
          , pp.
          <fpage>597</fpage>
          -
          <lpage>600</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>V.</given-names>
            <surname>Di Lecce</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Dimauro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Guerriero</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Impedovo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Pirlo</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . Salzo, “
          <article-title>A Multi-Expert System for Dynamic Signature Verification”</article-title>
          , 1st International Workshop,
          <source>Multiple Classifier Systems (MCS</source>
          <year>2000</year>
          ),
          <source>Series: Lecture Notes in Computer Science</source>
          , Springer-Verlag Berlin Heidelberg, J. Kittler and
          <string-name>
            <given-names>F.</given-names>
            <surname>Roli</surname>
          </string-name>
          (Eds.), Vol.
          <year>1857</year>
          , Cagliari, Italy,
          <year>June 2000</year>
          , pp.
          <fpage>320</fpage>
          -
          <lpage>329</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>L.</given-names>
            <surname>Bovino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Impedovo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Pirlo</surname>
          </string-name>
          , L. Sarcinella,
          <article-title>“Multi-Expert Verification of Hand-Written Signatures”</article-title>
          ,
          <source>7th International Conference on Document Analysis and Recognition (ICDAR-7)</source>
          , IEEE Computer Society, Aug.
          <year>2003</year>
          , Edinburgh, Scotland, pp.
          <fpage>932</fpage>
          -
          <lpage>936</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>N.</given-names>
            <surname>Houmani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Garcia-Salicetti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Dorizzi</surname>
          </string-name>
          ,
          <article-title>"A novel personal entropy measure confronted with online signature verification systems' performance"</article-title>
          ,
          <source>Proceedings of the 2nd IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS '08)</source>
          , Washington, DC, USA,
          <year>September 2008</year>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>S.</given-names>
            <surname>Garcia-Salicetti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Houmani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Dorizzi</surname>
          </string-name>
          ,
          <article-title>"A client-entropy measure for on-line signatures"</article-title>
          ,
          <source>Proceedings of the IEEE Biometrics Symposium (BSYM '08)</source>
          , pp.
          <fpage>83</fpage>
          -
          <lpage>88</lpage>
          , Tampa, Fla, USA,
          <year>September 2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>N.</given-names>
            <surname>Houmani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Garcia-Salicetti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Dorizzi</surname>
          </string-name>
          , “
          <article-title>On assessing the robustness of pen coordinates, pen pressure and pen inclination to time variability with personal entropy”</article-title>
          ,
          <source>Proc. of IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems</source>
          ,
          <source>2009 (BTAS '09)</source>
          , Washington, DC, Sept.
          <fpage>28</fpage>
          -
          <lpage>30</lpage>
          ,
          <year>2009</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>R.</given-names>
            <surname>Guest</surname>
          </string-name>
          , “
          <article-title>Age dependency in handwritten dynamic signature verification systems”</article-title>
          ,
          <source>Pattern Recognition Letters</source>
          , Vol.
          <volume>27</volume>
          , N.
          <volume>10</volume>
          ,
          <issue>15</issue>
          <year>July 2006</year>
          , pp.
          <fpage>1098</fpage>
          -
          <lpage>1104</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>R.M. Guest</surname>
          </string-name>
          , “The Repeatability of Signatures”,
          <source>9th International Workshop on Frontiers in Handwriting Recognition (IWFHR-9)</source>
          , Kichijoji, Japan, Oct.
          <year>2004</year>
          , pp.
          <fpage>492</fpage>
          -
          <lpage>497</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>H.</given-names>
            <surname>Lei</surname>
          </string-name>
          and
          <string-name>
            <given-names>V.</given-names>
            <surname>Govindaraju</surname>
          </string-name>
          , “
          <article-title>A comparative study on the consistency of features in on-line signature verification”</article-title>
          ,
          <source>Pattern Recognition Letters</source>
          , Vol.
          <volume>26</volume>
          ,
          <year>2005</year>
          , pp.
          <fpage>2483</fpage>
          -
          <lpage>2489</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kato</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Muramatsu</surname>
          </string-name>
          , T. Matsumoto, “
          <article-title>A Sequential Monte Carlo Algorithm for Adaptation to Intersession Variability in On-line Signature Verification”</article-title>
          ,
          <source>Proc. 10th Int. Workshop on Frontiers in Handwriting Recognition (IWFHR 10)</source>
          , La Baule, France, Oct.
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>D.</given-names>
            <surname>Impedovo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Modugno</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Pirlo</surname>
          </string-name>
          , E. Stasolla, “
          <article-title>Handwritten Signature Verification by Multiple Reference Sets”</article-title>
          ,
          <source>Proc. of the 11th International Conference on Frontiers in Handwriting Recognition (ICFHR)</source>
          ,
          <fpage>19</fpage>
          -
          <lpage>21</lpage>
          Aug.
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>D.</given-names>
            <surname>Impedovo</surname>
          </string-name>
          ,
          <string-name>
            <surname>G. Pirlo,</surname>
          </string-name>
          <article-title>" On the Measurement of Local Stability of Handwriting - An application to Static Signature Verification "</article-title>
          ,
          <source>Proc. of Biometric Measurements and Systems for Security and Medical Applications (BIOMS</source>
          <year>2010</year>
          ),
          <year>September</year>
          ,
          <volume>9</volume>
          ,
          <year>2010</year>
          , Taranto, Italy, IEEE Computer Society Press, pp.
          <fpage>41</fpage>
          -
          <lpage>44</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>D.</given-names>
            <surname>Impedovo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Pirlo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Stasolla</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.A.</given-names>
            <surname>Trullo</surname>
          </string-name>
          ,
          <article-title>"Learning Local Correspondences for Static Signature Verification”</article-title>
          ,
          <source>Proc. 11th Int. Conf. of the Italian Association for Artificial Intelligence (AI*IA</source>
          <year>2009</year>
          ), December 9-
          <issue>12</issue>
          ,
          <year>2009</year>
          ,
          <string-name>
            <given-names>Reggio</given-names>
            <surname>Emilia</surname>
          </string-name>
          , Italy.
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <surname>P. O'Donovan</surname>
          </string-name>
          , “
          <article-title>Optical Flow: Techniques and Applications”</article-title>
          , The University of Saskatchewan, T.R.
          <volume>502425</volume>
          ,
          <year>April 2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>B.K.P.</given-names>
            <surname>Horn</surname>
          </string-name>
          and
          <string-name>
            <given-names>B.G.</given-names>
            <surname>Schunck</surname>
          </string-name>
          , “Determining Optical Flow”, MIT Press,
          <source>A.I. Memo n. 572</source>
          ,
          <year>April 1980</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Freund</surname>
          </string-name>
          and
          <string-name>
            <given-names>L.</given-names>
            <surname>Mason</surname>
          </string-name>
          , “
          <article-title>The alternating decision tree learning Algorithm”</article-title>
          ,
          <source>Proceedings of the Sixteenth International Conference on Machine Learning</source>
          , Morgan Kaufmann, 199, pp.
          <fpage>124</fpage>
          -
          <lpage>133</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>J.F.</given-names>
            <surname>Vargas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.A.</given-names>
            <surname>Ferrer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.M.</given-names>
            <surname>Travieso</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.B.</given-names>
            <surname>Alonso</surname>
          </string-name>
          , “
          <article-title>Off-line Handwritten Signature GPDS-960 Corpus”</article-title>
          ,
          <source>Proc. 9th ICDAR</source>
          , Vol.
          <volume>2</volume>
          ,
          <fpage>23</fpage>
          -
          <lpage>26</lpage>
          Sept.
          <year>2007</year>
          pp.
          <fpage>764</fpage>
          -
          <lpage>768</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>