{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:54:48Z","timestamp":1772906088487,"version":"3.50.1"},"reference-count":104,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62266044"],"award-info":[{"award-number":["62266044"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62061045"],"award-info":[{"award-number":["62061045"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61862061"],"award-info":[{"award-number":["61862061"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008845","name":"Scientific Research Initiate Program of Doctors of Xinjiang University","doi-asserted-by":"publisher","award":["BS180268"],"award-info":[{"award-number":["BS180268"]}],"id":[{"id":"10.13039\/501100008845","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Funds for Creative Groups of Higher Educational Research Plan in Xinjiang Uyghur Autonomous, China","award":["XJEDU2017TO02"],"award-info":[{"award-number":["XJEDU2017TO02"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3326471","type":"journal-article","created":{"date-parts":[[2023,10,27]],"date-time":"2023-10-27T18:00:16Z","timestamp":1698429616000},"page":"120222-120236","source":"Crossref","is-referenced-by-count":16,"title":["Advances in Offline Handwritten Signature Recognition Research: A Review"],"prefix":"10.1109","volume":"11","author":[{"given":"Zhaoya","family":"Wang","sequence":"first","affiliation":[{"name":"School of Software, Xinjiang University, &#x00DC;r&#x00FC;mqi, China"}]},{"given":"Mahpirat","family":"Muhammat","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Xinjiang University, &#x00DC;r&#x00FC;mqi, China"}]},{"given":"Nurbiya","family":"Yadikar","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Xinjiang University, &#x00DC;r&#x00FC;mqi, China"}]},{"given":"Alimjan","family":"Aysa","sequence":"additional","affiliation":[{"name":"Key Laboratory of Xinjiang Multilingual Information Technology, Xinjiang University, &#x00DC;r&#x00FC;mqi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7566-6494","authenticated-orcid":false,"given":"Kurban","family":"Ubul","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Xinjiang University, &#x00DC;r&#x00FC;mqi, China"}]}],"member":"263","reference":[{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2010.12.027"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPA.2012.6310446"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-10297-7"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/IICIP.2016.7975302"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-97909-0_78"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.3390\/e19060252"},{"key":"ref55","first-page":"1","article-title":"Open writer identification from offline handwritten signatures by jointing the one-class symbolic data analysis classifier and feature-dissimilarities","author":"djoudjai","year":"2022","journal-title":"Proc IJDAR"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31456-9_47"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICSIP.2014.19"},{"key":"ref50","first-page":"63","article-title":"Signature recognition and verification using multiple classifiers combination of Hu&#x2019;s and HOG features","author":"aravinda","year":"2019","journal-title":"Proc Int Conf Adv Mech Syst (ICAMechS)"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC3.2017.8318766"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSP.2015.7322811"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.3390\/info13100496"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICITEED.2015.7408952"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS49300.2020.9116199"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/SIU.2017.7960454"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.12.258"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1149\/10701.3069ecst"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/SPIN.2018.8474282"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.01.108"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICSIP.2014.13"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.2478\/cait-2020-0040"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SAMI.2017.7880280"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.03.027"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.9734\/arjom\/2020\/v16i130170"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114249"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2010.2040751"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-018-3854-x"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICACAT.2018.8933575"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20233-9_40"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TLA.2022.9667145"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.03.133"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/INISTA.2019.8778228"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01234-2_1"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00745"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MIPRO.2015.7160447"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-86608-2_17"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CoNTESA50436.2020.9302868"},{"key":"ref38","article-title":"Writer independent offline signature recognition using ensemble learning","author":"dipta das","year":"2019","journal-title":"arXiv 1901 06494"},{"key":"ref24","first-page":"1","article-title":"Dynamic routing between capsules","author":"sabour","year":"2017","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-7106-0"},{"key":"ref25","first-page":"84","article-title":"ImageNet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2015.0058"},{"key":"ref22","first-page":"29","article-title":"Writer-independent offline signature recognition based upon Fourier descriptors","volume":"162","author":"rajput","year":"2017","journal-title":"Int J Comput Appl"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-022-04330-w"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"ref27","article-title":"Very deep convolutional networks for large-scale image recognition","author":"simonyan","year":"2014","journal-title":"arXiv 1409 1556"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1049\/bme2.12007"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-021-03356-w"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSAI53272.2021.9609732"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.52.9.941"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICFHR.2014.112"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/SoCPaR.2009.132"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-020-05455-w"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MVIP49855.2020.9187481"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.5120\/1454-1967"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.107851"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.24843\/LKJITI.2021.v12.i02.p04"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/11949619_68"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6612969"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/DAS.2016.48"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1049\/ip-vis:20031078"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-97909-0_77"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.10.025"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1504\/IJBM.2018.090121"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/IPAS.2014.7043305"},{"key":"ref91","first-page":"6","article-title":"Signature recognition & verification using ANN","volume":"1","author":"deshmukh","year":"2012","journal-title":"Int J Innov Technol Exploring Eng"},{"key":"ref90","first-page":"790","article-title":"Offline handwritten signature verification using back propagation artificial neural network matching technique","volume":"65","author":"ebrahim","year":"2014","journal-title":"J Theor Appl Inf Technol"},{"key":"ref89","first-page":"44","article-title":"Offline signature recognition & verification using neural network","volume":"35","author":"abikoye","year":"2011","journal-title":"Int J Comput Appl"},{"key":"ref86","first-page":"40","article-title":"Offline signature verification and identification using angle feature and pixel density feature and both method together","volume":"2","author":"verma","year":"2013","journal-title":"Int J Soft Comput Eng"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1504\/IJBET.2011.038469"},{"key":"ref88","first-page":"83","article-title":"A hybrid features for signature recognition using neural network","volume":"6","author":"jabr","year":"2016","journal-title":"J Thi-Qar Sci"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/2017\/1\/012011"},{"key":"ref82","first-page":"46","article-title":"An approach for signature recognition using contours based technique","author":"aravinda","year":"2019","journal-title":"Proc Int Conf Adv Mech Syst (ICAMechS)"},{"key":"ref81","first-page":"73","article-title":"Offline signature recognition and verification system using artificial neural network","volume":"2","author":"rehman","year":"2018","journal-title":"Univ Sindh J Inf Commun Technol"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/3386723.3387884"},{"key":"ref83","first-page":"175","article-title":"An enhanced artificial neural network based offline signature verification and recognition system","volume":"2","author":"adke","year":"2013","journal-title":"Int J Eng Res Technol"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/INISTA.2011.5946065"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v4.i3.pp678-683"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63754-9_14"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-021-00591-y"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.3390\/technologies9010002"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.18178\/joig.3.1.11-15"},{"key":"ref77","first-page":"1869","article-title":"Effect of Euler number as a feature in gender recognition system from offline handwritten signature using neural networks","author":"maji","year":"2015","journal-title":"Proc 2nd Int Conf Comput Sustain Global Develop (INDIACom)"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1145\/3410352.3410820"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-04164-9_35"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.119589"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR56361.2022.9956442"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818349"},{"key":"ref71","first-page":"3887","article-title":"Signature recognition based on support vector machine and deep convolutional neural networks for multi-region of interest","volume":"98","author":"shams","year":"2020","journal-title":"J Theor Appl Inf Technol"},{"key":"ref70","first-page":"1","article-title":"Use of the shearlet transform and transfer learning in offline handwritten signature verification and recognition","volume":"17","author":"foroozandeh","year":"2020","journal-title":"Sahand Commun Math Anal"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/IranianMVIP.2010.5941179"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.4018\/IJRSDA.20210101.oa1"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25085-9_62"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/DICTA.2011.119"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ATSIP.2017.8075594"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1504\/IJAISC.2011.042717"},{"key":"ref63","first-page":"11","article-title":"Offline signature identification by fusion of multiple classifiers using statistical learning theory","author":"kisku","year":"2010","journal-title":"Proc Comput Vis Pattern Recognit"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2012.6252613"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10847-1_25"},{"key":"ref60","article-title":"Sequential minimal optimization: A fast algorithm for training support vector machines","author":"platt","year":"1998"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69923-3_80"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/HIS.2012.6421340"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10298632.pdf?arnumber=10298632","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T20:05:17Z","timestamp":1701115517000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10298632\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":104,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3326471","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}