Plamondon R, Lorette G (1989) Automatic signature verification and writer identification: The state of the art. Pattern Recognit 22(2):107–131
Article
Google Scholar
Leclerc F, Plamondon R (1994) Automatic signature verification: The state of the art 1989–1993. Int J Pattern Recognit Artif Intell 8(3):643–660
Article
Google Scholar
Plamondon R, Srihari SN (2000) Online and off-line handwriting recognition: a comprehensive survey. IEEE Trans Pattern Anal Mach Intell 22(1):63–84
Article
Google Scholar
Dimauro G, Impedovo S, Lucchese MG, Modugno R, Pirlo G (2004) Recent advancements in automatic signature verification. In: Ninth international workshop on frontiers in handwriting recognition, Kokubunji, Tokyo, IEEE press, New York, pp 179–184
Chapter
Google Scholar
Lei H, Govindaraju V (2005) A comparative study on the consistency of features in on-line signature verification. Pattern Recognit Lett 15:2483–2489
Article
Google Scholar
Yang L, Widjaja BW, Prasad R (1995) Application of hidden Markov models for signature verification. Pattern Recognit 28(2):161–170
Article
Google Scholar
Fierrez J, Ortega-Garcia J, Ramos D, Gonzalez-Rodriguez J (2007) HMM-based on-line signature verification: feature extraction and signature modeling. Pattern Recognit Lett 28(16):2325–2334
Article
Google Scholar
Sakoe H, Chiba S (1978) Dynamic programming algorithm optimization for spoken word recognition. IEEE Trans Acoust Speech Signal Process 26(1):43–49
Article
MATH
Google Scholar
Kholmatov A, Yanikoglu B (2005) Identity authentication using improved online signature verification method. Pattern Recognit Lett 26(15):2400–2408
Article
Google Scholar
Faundez-Zanuy M (2007) On-line signature recognition based on VQ-DTW. Pattern Recognit 40:981–992
Article
MATH
Google Scholar
Vielhauer C, Steinmetz R (2004) Handwriting: feature correlation analysis for biometric hashes (Special issue on biometric signal processing 2004). EURASIP J Appl Signal Process 4:542–558
Google Scholar
Juels A, Sudan M (2006) A fuzzy vault scheme. Design Codes Cryptogr 38(2):237–257
Article
MATH
MathSciNet
Google Scholar
Juels A, Wattenberg M (1999) A fuzzy commitment scheme. In 6th ACM conference computer and communication security, Singapore, ACM, New York, pp 28–36
Google Scholar
Freire-Santos M, Fierrez-Aguilar J, Ortega-Garcia J (2006) Cryptographic key generation using handwritten signature. In: SPIE, defense and security symposium, biometric technologies for human identification, Orlando, vol 6202, pp 225–231
Google Scholar
Maiorana E, Campisi P, Neri A (2008) User adaptive fuzzy commitment for signature templates protection and renewability. SPIE Journal of Electronic Imaging, JEI, Section on Biometrics: Advances in Security, Usability and Interoperability 17(1): 011011-1–011011-12
Google Scholar
Maiorana E, Campisi P (2010) Fuzzy commitment for function based signature template protection. IEEE Signal Process Lett 17(3):249–252
Article
Google Scholar
Yeung DY, Chang H, Xiong Y, George S, Kashi R, Matsumoto T, Rigoll G (2004) SVC2004: first international signature verification competition. In: Proceedings of the ICBA, LNCS/3072, Springer, pp 16–22
Google Scholar
Blankers VL, Heuvel C, Franke KY, Vuurpijl LG (2009) ICDAR 2009 signature verification competition. In: 10th International conference document analysis and recognition, (ICDAR ’09), Barcelona, Spain, pp 1403–1407
Google Scholar
Houmani N, Garcia-Salicetti S, Mayoue A, Dorizzi B (2009) BioSecure signature evaluation campaign 2009 (BSEC’2009): results. http://biometrics.it-sudparis.eu%20/%20BSEC2009%20/%20downloads/BSEC2009_results.pdf (on line access August 2010)