Professional Documents
Culture Documents
j
5 standard deviation of a
y
6 standard deviation of v
y
7 (standard deviation of y)/D
y
8 N(local maxima in x)
9 standard deviation of a
x
10 standard deviation of v
x
11 j
rms
12 N(local maxima in y)
13 t(2nd pen-down) T
s
14 (average velocity v)/v
x, max
15
A
min
y
max
y
min
x
max
x
min
D
x
P
pendowns
i1
x
max ji
x
min ji
D
y
16 (x
last pen-up
x
max
) D
x
17 (x
1st pen-down
x
min
) D
x
18 (y
last pen-up
y
min
) D
y
19 (y
1st pen-down
y
min
) D
y
20 (T
w
v) (y
max
y
min
)
21 (T
w
v) (x
max
x
min
) 22 (pen-down duration T
w
)/T
s
23 v v
y, max
24 (y
last pen-up
y
max
) D
y
25
Tdy=dt =dx=dt >0
Tdy=dt =dx=dt <0
26 v v
max
27 (y
1st pen-down
y
max
) D
y
28 (x
last pen-up
x
min
) D
x
29 (velocity rms v)/v
max
30
x
max
x
min
D
y
y
max
y
min
D
x
31 (velocity correlation v
x, y
)/v
2
max
32 T(v
y
>0j pen-up) T
w
33 N(v
x
0) 34 direction histogram s
1
35 (y
2nd local max
y
1st pen-down
) D
y
36 (x
max
x
min
)/x
acquisition range
37 (x
1st pen-down
x
max
) D
x
38 T(curvature>Threshold
curv
) T
w
39 (integrated abs. centr. acc. a
Ic
)/a
max
40 T(v
x
>0) T
w
41 T(v
x
<0j pen-up) T
w
42 T(v
x
>0j pen-up) T
w
43 (x
3rd local max
x
1st pen-down
) D
x
44 N(v
y
0)
45 (acceleration rms a)/a
max
46 (standard deviation of x)/D
x
47
Tdx=dt dy=dt >0
Tdx=dt dy=dt <0
48 (tangential acceleration rms a
t
)/a
max
49 (x
2nd local max
x
1st pen-down
) D
x
50 T(v
y
<0j pen-up) T
w
51 direction histogram s
2
52 t(3rd pen-down) T
s
53 (max distance between points) A
min
54 (y
3rd local max
y
1st pen-down
) D
y
55 ( xx
min
) x 56 direction histogram s
5
57 direction histogram s
3
58 T(v
x
<0) T
w
59 T(v
y
>0) T
w
60 T(v
y
<0) T
w
61 direction histogram s
8
62 (1st t(v
x, min
))/T
w
63 direction histogram s
6
64 T(1st pen-up) T
w
65 spatial histogram t
4
66 direction histogram s
4
67 (y
max
y
min
)/y
acquisition range
68 (1st t(v
x, max
))/T
w
69 (centripetal acceleration rms a
c
)/a
max
70 spatial histogram t
1
71 y(1st to 2nd pen-down) 72 y(1st pen-down to 2nd pen-up)
73 direction histogram s
7
74 t(j
x, max
) T
w
75 spatial histogram t
2
76 j
x, max
77 y(1st pen-down to last pen-up) 78 y(1st pen-down to 1st pen-up)
79 (1st t(x
max
))/T
w
80
j
x
81 T(2nd pen-up) T
w
82 (1st t(v
max
))/T
w
1188 S Signature Features
Signature Features. Table 1 (Continued)
Ranking Feature Description Ranking Feature Description
83 j
y, max
84 y(2nd pen-down to 2nd pen-up)
85 j
max
86 spatial histogram t
3
87 (1st t(v
y, min
))/T
w
88 (2nd t(x
max
))/T
w
89 (3rd t(x
max
))/T
w
90 (1st t(v
y, max
))/T
w
91 t(j
max
) T
w
92 t(j
y, max
) T
w
93 direction change histogram c
2
94 (3rd t(y
max
))/T
w
95 direction change histogram c
4
96
j
y
97 direction change histogram c
3
98 y(initial direction)
99 y(before last pen-up) 100 (2nd t(y
max
))/T
w
Signature Features. Figure 2 Examples of genuine signatures and forgeries (left) and scatter plots of 4 different
global features from the 100-feature set presented in Table 1 (right). The signatures belong to the BioSecure database
and the Figure has been adapted from [13].
Signature Features S1189
S
Off-line signature features
Off-line signature verication systems usually rely
on image processing and shape recognition techni-
ques to extract features. As a consequence, additional
preprocessing steps such as image segmentation and
binarization must be carried out. Features are
extracted from gray-scale images, binarized images,
or skeletonized images, among other possibilities.
The proposed feature sets in the literature are nota-
bly heterogeneous, specially when compared with the
case of on-line verication systems. These include,
among others, the usage of image transforms (e.g.,
Hadamard), morphological operators, structural
representations, graphometric features [14], direc-
tional histograms, and geometric features. Readers are
referred to [15] for an exhaustive listing of off-line
signature features.
Related Entries
Feature Extraction
Off-line Signature Verication
On-line Signature Verication
Signature Matching
Signature Recognition
References
1. Plamondon, R., Lorette, G.: Automatic signature verication
and writer identication: the state of the art. Pattern Recogn.
22(2), 107131 (1989)
2. Lei, H., Govindaraju, V.: A comparative study on the consistency
of features in on-line signature verication. Pattern Recogn. Lett.
26(15), 24832489 (2005)
Signature Features. Table 2 Extended set of local features. The upper dot notation (e.g., x
n
) indicates time derivative
# Feature Description
1 x-coordinate x
n
2 y-coordinate y
n
3 Pen-pressure z
n
4 Path-tangent angle y
n
arctan(y
n
x
n
)
5 Path velocity magnitude
u
n
_ y
n
_ x
n
p
6 Log curvature radius r
n
log(1 k
n
) log(
n
_
y
n
), where k
n
is the curvature of the
position trajectory
7 Total acceleration magnitude
a
n
t
2
n
c
2
n
p
_ u
2
n
u
2
n
y
2
n
q
, where t
n
and c
n
are respectively the
tangential and centripetal acceleration components of the pen
motion
8 Pen azimuth g
n
9 Pen altitude f
n
1018 First-order derivative of features 19 x
n
, y
n
, z
n
,
_
y
n
, _ u
n
, _ r
n
, a
n
, _ g
n
,
_
f
n
1927 Second-order derivative of features 19 x
n
, y
n
,z
n
,
y
n
,u
n
, r
n
, a
n
,g
n
,
f
n
28 Ratio of the minimum over the maximum
speed over a window of 5 samples
n
r
min {
n4
, . . . ,
n
} max {
n4
, . . . ,
n
}
2930 Angle of consecutive samples and first
order difference
a
n
arctan(y
n
y
n1
x
n
x
n1
) _ a
n
31 Sine s
n
sin(a
n
)
32 Cosine c
n
cos(a
n
)
33 Stroke length to width ratio over a window
of 5 samples
r
5
n
P
kn
kn4
x
k
x
k1
2
y
k
y
k1
2
p
max x
n4
;:::;x
n
f gmin x
n4
;:::;x
n
f g
34 Stroke length to width ratio over a window
of 7 samples
r
7
n
P
kn
kn6
x
k
x
k1
2
y
k
y
k1
2
p
max x
n6
;:::;x
n
f gmin x
n6
;:::;x
n
f g
1190 S Signature Features
3. Richiardi, J., Ketabdar, H., Drygajlo, A.: Local and global feature
selection for on-line signature verication. In: Proceedings of
IAPR eighth International Conference on Document Analysis
and Recognition, ICDAR, Seoul, Korea (2005)
4. Kholmatov, A., Yanikoglu, B.: Identity authentication using im-
proved online signature verication method. Pattern Recogn.
Lett. 26(15), 24002408 (2005)
5. Fierrez, J., Ramos-Castro, D., Ortega-Garcia, J., Gonzalez-
Rodriguez, J.: HMM-based on-line signature verication: feature
extraction and signature modeling. Pattern Recogn. Lett. 28(16),
23252334 (2007)
6. Fierrez-Aguilar, J., Nanni, L., Lopez-Penalba, J., Ortega-Garcia, J.,
Maltoni, D.: An on-line signature verication system based on
fusion of local and global information. In: Proceedings of IAPR
Signature Features. Figure 3 Examples of functions from the 27-feature set presented in Table 2 for a genuine signature
(left) and a forgery (right) of a particular subject.
Signature Features S1191
S
International Conference on Audio- and Video-Based Biometric
Person Authentication, AVBPA, Springer LNCS-3546, pp. 523532
(2005)
7. Jain, A.K., Zongker, D.: Feature selection: evaluation, applica-
tion, and small sample performance. IEEE Trans. Pattern Anal.
Mach. Intell. 19(2), 153158 (1997)
8. Nelson, W., Turin, W., Hastie, T.: Statistical methods for on-line
signature verication. Int. J. Pattern Recogn. Artif. Intell. 8(3),
749770 (1994)
9. Lee, L.L., Berger, T., Aviczer, E.: Reliable on-line human signa-
ture verication systems. IEEE Trans. Pattern Anal. Mach. Intell.
18(6), 643647 (1996)
10. Dolng, J.G.A., Aarts, E.H.L., van Oosterhout, J.J.G.M.: On-line
signature verication with Hidden Markov Models. In: Proceed-
ings of the International Conference on Pattern Recognition,
IEEE Press, pp. 13091312 (1998)
11. Van, B.L., Garcia-Salicetti, S., Dorizzi, B.: On using the Viterbi
path along with HMM likelihood information for online signa-
ture verication. IEEE Trans. Syst. Man Cybern. B 37(5),
12371247 (2007)
12. Muramatsu, D., Matsumoto, T.: Effectiveness of pen pressure,
azimuth, and altitude features for online signature verication.
In: Proceedings of IAPR International Conference on
Biometrics, ICB, Springer LNCS 4642 (2007)
13. Martinez-Diaz, M., Fierrez, J., Galbally, J., Ortega-Garcia, J.: Towards
mobile authentication using dynamic signature verication: use-
ful features and performance evaluation. In: Proceedings Interna-
tional Conference on Pattern Recognition, ICPR, pp. 16 (2008)
14. Sabourin, R.: In: Off-line signature verication: recent advances
and perspectives. Lect. Notes Comput. Sci. 1339 8498 (1997)
15. Impedovo, D., Pirlo, G.: Automatic signature verication: The
state of the art. IEEE Trans. Syst. Man Cybern. C Appl. Rev.
38(5), 609635 (2008)
Signature Matching
MARCOS MARTINEZ-DIAZ
1
, JULIAN FIERREZ
1
,
SEIICHIRO HANGAI
2
1
Biometric Recognition Group - ATVS, Escuela
Politecnica Superior, Universidad Autonoma de
Madrid, Madrid, Spain
2
Department of Electrical Engineering Tokyo
University of Science, Japan
Synonyms
Signature similarity computation
Definition
The objective of signature matching techniques is to
compute the similarity between a given signature and a
signature model or reference signature set. Several pat-
tern recognition techniques have been proposed as
matching algorithms for signature recognition. In on-
line signature verication systems, signature matching
algorithms have followed two main approaches. Fea-
ture-based algorithms usually compute the similarity
among multidimensional feature vectors extracted
from the signature data with statistical classication
techniques. On the other hand, function-based algo-
rithms perform matching by computing the distance
among time-sequences extracted from the signa-
ture data with technique such as Hidden Markov Mod-
els and Dynamic Time Warping. Off-line signature
matching has followed many different approaches,
most of which are related to image processing and
shape recognition.
This essay focuses on on-line signature matching,
although off-line signature matching algorithms are
briey outlined.
Introduction
As in other biometric modalities, signature matching
techniques vary depending on the nature of the features
that are extracted from the signature data. In feature-
based systems (also known as global), each signature
is represented as a multidimensional feature vector,
while in function-based systems (also known as local)
signatures are represented by multidimensional time
sequences. Signature matching algorithms also depend
on the enrollment phase. Model-based systems estimate
a statistical model for each user from the training
signature set. On the other hand, in reference-based
systems the features extracted from the set of training
signatures are stored as a set of template signatures.
Consequently, given an input signature, in model-
based systems the matching is performed against a
statistical model, while in reference-based systems the
input signature is compared with all the signatures
available in the reference set.
Feature-Based Systems
Feature-based systems usually employ classical pattern
classication techniques. In reference-based systems, the
matching score is commonly obtained by using a dis-
tance measure between the feature vectors of input and
template signatures [1, 2], or a trained classier. Distance
1192 S Signature Matching
measures used for signature matching include Eucli
dean, weighted Euclidean, and Mahalanobis distance. In
model-based systems, trained classiers are employed,
including approaches such as Neural Networks, Gaussian
Mixture Models [3] or Parzen Windows [4].
Function-Based Systems
In these systems, multidimensional time sequences
extracted from the signature dynamics are used as fea-
tures. Given the similarity of this task to others related to
speaker recognition, the most popular approaches
in local signature verication are related to algorithms
proposed in the speech recognition community.
Among these, signature verication systems using
Dynamic Time Warping (DTW) [5, 6, 7] or Hidden
Markov Models (HMM) [8, 9, 10, 11] are the most
popular approaches in signature verication. In such
systems, the captured time functions (e.g., pen coordi-
nates, pressure, etc.) are used to model each user sig-
nature. In the following, Dynamic Time Warping and
Hidden Markov Models are outlined. An brief over-
view of other techniques is also given.
Dynamic Time Warping
Dynamic Time Warping (DTW) is an application of
the Dynamic Programming principles to the problem
of matching discrete time sequences. DTW was origi-
nally proposed for speech recognition applications
[12]. The goal of DTW is to nd an elastic match
among samples of a pair of sequences X and Y that
minimizes a predened distance measure. The algo-
rithm is described as follows. Lets dene two
sequences
X x
1
; x
2
; :::; x
i
; :::; x
I
Y y
1
; y
2
; :::; y
j
; :::; y
J
1
and a distance measure as
di; j x
i
y
j
2
between sequence samples. A warping path can be
dened as
C c
1
; c
2
; :::; c
k
; :::; c
K
3
where each c
k
represents a correspondence (i, j) be-
tween samples of X and Y. The initial condition of the
algorithm is set to
g
1
g1; 1 d1; 1 w1 4
where g
k
represents the accumulated distance after
k steps and w(k) is a weighting factor that must be
dened. For each iteration, g
k
is computed as
g
k
gi; j min
c
k1
g
k1
dc
k
wk
5
until the Ith and Jth sample of both sequences respec-
tively is reached. The resulting normalized distance is
DX; Y
g
K
P
K
k1
wk
6
where w(k) compensates the effect of the length of
the sequences.
The weighting factors w(k) are dened in order to
restrict which correspondences among samples of both
sequences are allowed. In Fig. 1a, a common denition
of w(k) is depicted, and an example of a warping path
between two sequences is given. In this case, only three
transitions are allowed in the computation of g
k
. Con-
sequently, Eq. (5) becomes
g
k
gi; j min
gi; j 1 di; j
gi 1; j 1 2di; j
gi 1; j di; j
2
4
3
5
7
which is one of the most common implementations
found in the literature. In Fig. 1b, an example of point
correspondences between two signatures is depicted to
visually show the results of the elastic alignment.
The algorithm has been further rened for signa-
ture verication by many authors [5, 7], reaching a
notable verication performance. For example, the
distance measure d(i, j) can be alternatively dened,
or other normalization techniques may be applied
to the accumulated distance g
K
among sequences.
DTW can be also applied independently for each
stroke, which may be specially well suited for oriental
signatures, since they are generally composed of seve-
ral strokes. Although the DTW algorithm has been
replaced in speech-related applications by more pow-
erful approaches such as HMMs, it remains as a highly
effective tool for signature verication as it is best
suited for small amounts of training data, which is
the common case in signature verication.
Hidden Markov Models
Hidden Markov Models (HMM) have been widely
used for speech recognition applications [13] as well
Signature Matching S1193
S
as in many handwriting recognition applications.
Several approaches using HMMs for dynamic signa-
ture verication have been proposed in the last years
[8, 9, 10, 11]. An HMM represents a double stochas-
tic process, governed by an underlying Markov
chain, with a nite number of states and a random
function set that generate symbols or observations
each of which is associated with one state [11].
Observations in each state are modeled with GMMs
in most speech and handwriting recognition applica-
tions. In fact, GMMs can be considered a single-state
HMM and have also been successfully used for signa-
ture verication [14]. Given a sequence of multi-
dimensional vectors of observations O dened as
O o
1
; o
2
; . . . ; o
N
;
corresponding to a given signature, the goal of HMM-
based signature matching is to nd the probability that
this sequence has been produced by a Hidden Markov
Model M
POjM;
where M is the signature model computed during
enrollment.
The basic structure of an HMM using GMMs to
model observations is dened by the following elements:
Number of hidden states N.
Number of Gaussian mixtures per state M.
Probability transition matrix A {a
ij
}, which con-
tains the probabilities of jumping from one state to
another or staying on the same state.
In Fig. 2, an example of a possible HMM con-
guration is shown. Hidden Markov Models are
usually trained in two steps using the enrollment
signatures. First, state transition probabilities and
observation statistical models are estimated using
a Maximum Likelihood algorithm. After this, a re-
estimation step is carried out using the Baum-Welch
algorithm. The likelihood between a trained HMM
and an input sequence (i.e., the matching score) is
computed by using the Viterbi algorithm. In [10],
the Viterbi path (that is, the most probable state tran-
sition sequence) is also used as a similarity measure.
A detailed description of Hidden Markov Models is
given in [13].
Within HMM-based dynamic signature verica-
tion, the existing approaches can be divided in regional
and local. In regional approaches, the extracted time
Signature Matching. Figure 1 (a) Optimal warping path between two sequences obtained with DTW. Point-to-point
distances are represented with different shades of gray, lighter shades representing shorter distances and darker
shades representing longer distances. (b) Example of point-to-point correspondences between two genuine
signatures obtained using DTW.
1194 S Signature Matching
sequences are further segmented and converted into
a sequence of feature vectors or observations, each
one representing regional properties of the signature
signal [9, 11]. Some examples of segmentation bound-
aries are null vertical velocity points [9] or changes in
the quantized trajectory direction [11]. On the other
hand, local approaches directly use the time functions
as observation sequences for the signature modeling
[8, 10, 14].
Finding a reliable and robust model structure for
dynamic signature verication is not a trivial task.
While too simple HMMs may not allow to model
properly the user signatures, too complex models
may not be able to model future realizations due to
overtting. On the other hand, as simple models have
less parameters to be estimated, their estimation may
be more robust than for complex models. Two main
parameters are commonly considered while selecting
an optimal model structure: the number of states and
the number of Gaussian mixtures per state [8]. Some
approaches consider a user-specic number of states
[10], proportional to the average signature duration or
a user-specic number of mixtures [14]. Most of the
proposed systems consider a left-ro-right congura-
tion without skips between states, also known as
Bakis topology (see Fig. 2).
Other Techniques
More examples of signature matching techniques in-
clude Neural Networks, in particular Bayesian,
multilayer, time-delay Neural Networks and radial-
basis functions among others have been applied for
signature matching. Other examples include Structural
approaches, which model signatures as a sequence, tree
or graph of symbols. Support Vector Machines have
also been applied for signature matching. The reader is
referred to [15] for an exhaustive list of references
related to these approaches.
Fusion of the feature- and function-based
approaches has been reported to provide better perfor-
mance than the individual systems [4].
Off-line Signature Matching
The proposed approaches for off-line signature match-
ing are notably heterogeneous compared to on-line
signature verication. These are mostly related to
image and shape recognition techniques and classical
statistical pattern recognition algorithms. They include
Neural Networks, Hidden Markov Models, Support
Vector Machines and distance-based classiers among
others. A summary of off-line signature matching tech-
niques can be found in [15].
Related Entries
Off-line Signature Verication
On-line Signature Verication
Signature Features
Signature Recognition
Signature Matching. Figure 2 Graphical representation of a left-to-right N-state HMM, with M-component GMMs
representing observations and no skips between states.
Signature Matching S1195
S
References
1. Nelson, W., Turin, W., Hastie, T.: Statistical methods for on-line
signature verication. Int. J. Pattern Recogn. Artif. Intell. 8(3),
749770 (1994)
2. Lee, L.L., Berger, T., Aviczer, E.: Reliable on-line human signa-
ture verication systems. IEEE Trans. Pattern Anal. Mach. Intell.
18(6), 643647 (1996)
3. Martinez-Diaz, M., Fierrez, J., Ortega-Garcia, J.: Universal Back-
ground Models for dynamic signature verication. In: Proceed-
ings IEEE Conference on Biometrics: Theory, Applications and
Systems, BTAS, pp. 16 (2007)
4. Fierrez-Aguilar, J., Nanni, L., Lopez-Penalba, J., Ortega-Garcia, J.,
Maltoni, D.: An on-line signature verication system based
on fusion of local and global information. In: Proceedings
of IAPR International Conference on Audio- and Video-Based
Biometric Person Authentication, AVBPA, Springer LNCS-3546,
pp. 523532 (2005)
5. Sato, Y., Kogure, K.: Online signature verication based on
shape, motion and writing pressure. In: Proceedings of sixth
International Conference on Pattern Recognition, pp. 823826
(1982)
6. Martens, R., Claesen, L.: Dynamic programming optimisation
for on-line signature verication. In: Proceedings fourth Inter-
national Conference on Document Analysis and Recognition,
ICDAR, vol. 2, pp. 653656 (1997)
7. Kholmatov, A., Yanikoglu, B.: Identity authentication using im-
proved online signature verication method. Pattern Recogn.
Lett. 26(15), 24002408 (2005)
8. Fierrez, J., Ramos-Castro, D., Ortega-Garcia, J., Gonzalez-
Rodriguez, J.: HMM-based on-line signature verication:
feature extraction and signature modeling. Pattern Recogn.
Lett. 28(16), 23252334 (2007)
9. Dolng, J.G.A., Aarts, E.H.L., van Oosterhout, J.J.G.M.: On-line
signature verication with Hidden Markov Models. In: Proceed-
ings of the International Conference on Pattern Recognition,
ICPR, pp. 13091312. IEEE CS Press (1998)
10. Van, B.L., Garcia-Salicetti, S., Dorizzi, B.: On using the Viterbi
path along with HMM likelihood information for online signa-
ture verication. IEEE Trans. Syst. Man Cybern. B 37(5),
12371247 (2007)
11. Yang, L., Widjaja, B.K., Prasad, R.: Application of Hidden
Markov Models for signature verication. Pattern Recogn.
28(2), 161170 (1995)
12. Sakoe, H., Chiba, S.: Dynamic programming algorithm optimi-
zation for spoken word recognition. IEEE Trans. Acoust. 26,
4349 (1978)
13. Rabiner, L.R.: A tutorial on Hidden Markov Models and selected
applications in speech recognition. Proceedings of the IEEE
77(2), 257286 (1989)
14. Richiardi, J., Drygajlo, A.: Gaussian Mixture Models for
on-line signature verication. In: Proceedings of ACM SIGMM
Workshop on Biometric Methods and Applications, WBMA.
pp. 115122 (2003)
15. Impedovo, D., Pirlo, G.: Automatic signature verication: The
state of the art. IEEE Trans. Syst. Man. Cybern. C Appl. Rev.
38(5), 609635 (2008)
Signature Recognition
OLAF HENNIGER
1
, DAIGO MURAMATSU
2
,
TAKASHI MATSUMOTO
3
, ISAO YOSHIMURA
4
,
MITSU YOSHIMURA
5
1
Fraunhofer Institute for Secure Information
Technology, Darmstadt, Germany
2
Seikei University, Musashino-shi, Tokyo, Japan
3
Waseda University, Shinjuku-ku, Tokyo, Japan
4
Tokyo University of Science, Shinjuku-ku, Tokyo,
Japan
5
Ritsumeikan University, Sakyo-ku, Kyoto, Japan
Synonyms
Handwritten signature recognition; signature/sign
recognition
Definition
A signature is a handwritten representation of name of
a person. Writing a signature is the established method
for authentication and for expressing deliberate deci-
sions of the signer in many areas of life, such as banking
or the conclusion of legal contracts. A related concept is
a handwritten personal sign depicting something else
than a persons name. As compared to text-independent
writer recognition methods, signature/sign recognition
goes with shorter handwriting probes, but requires to
write the same name or personal sign every time. Hand-
written signatures and personal signs belong to the
behavioral biometric characteristics as the person must
become active for signing.
Regarding the automated recognition by means of
handwritten signatures, there is a distinction between
on-line and off-line signature recognition. On-line sig-
nature data are captured using digitizing pen tablets,
pen displays, touch screens, or special pens and include
information about the pen movement over time (at
least the coordinates of the pen tip and possibly also the
pen-tip pressure or pen orientation angles over time).
In this way, on-line signature data represent the way a
signature is written, which is also referred to as signa-
ture dynamics. By contrast, off-line (or static) signa-
tures are captured as grey-scale images using devices
such as image scanners and lack temporal information.
1196 S Signature Recognition