{"id":"https://openalex.org/W2735478117","doi":"https://doi.org/10.1109/ised.2016.7977108","title":"Offline signature authentication: A back propagation-neural network approach","display_name":"Offline signature authentication: A back propagation-neural network approach","publication_year":2016,"publication_date":"2016-12-01","ids":{"openalex":"https://openalex.org/W2735478117","doi":"https://doi.org/10.1109/ised.2016.7977108","mag":"2735478117"},"language":"en","primary_location":{"id":"doi:10.1109/ised.2016.7977108","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ised.2016.7977108","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 Sixth International Symposium on Embedded Computing and System Design (ISED)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038111135","display_name":"Debajyoty Banik","orcid":"https://orcid.org/0000-0002-3756-864X"},"institutions":[{"id":"https://openalex.org/I132153292","display_name":"Indian Institute of Technology Patna","ror":"https://ror.org/01ft5vz71","country_code":"IN","type":"education","lineage":["https://openalex.org/I132153292"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Debajyoty Banik","raw_affiliation_strings":["Department of Computer Science and Engineering, Indian Institute of Technology Patna"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Indian Institute of Technology Patna","institution_ids":["https://openalex.org/I132153292"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056686829","display_name":"Riya Roy Chowdhury","orcid":null},"institutions":[{"id":"https://openalex.org/I175399479","display_name":"Haldia Institute of Technology","ror":"https://ror.org/0211bs523","country_code":"IN","type":"education","lineage":["https://openalex.org/I175399479"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Riya Roy Chowdhury","raw_affiliation_strings":["Department of Computer Science and Engineering, HIT Kolkata"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, HIT Kolkata","institution_ids":["https://openalex.org/I175399479"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5038111135"],"corresponding_institution_ids":["https://openalex.org/I132153292"],"apc_list":null,"apc_paid":null,"fwci":0.5044,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.68661427,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"334","last_page":"339"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9562000036239624,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9562000036239624,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.760295569896698},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6611398458480835},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.6492729187011719},{"id":"https://openalex.org/keywords/signature-recognition","display_name":"Signature recognition","score":0.6165988445281982},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5910592675209045},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5879865288734436},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5662527680397034},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.5423409342765808},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.5418489575386047},{"id":"https://openalex.org/keywords/handwriting-recognition","display_name":"Handwriting recognition","score":0.5312464237213135},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.5228500962257385},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.5126566290855408},{"id":"https://openalex.org/keywords/feature-vector","display_name":"Feature vector","score":0.4592324495315552},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.44519925117492676},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.4331362247467041},{"id":"https://openalex.org/keywords/handwriting","display_name":"Handwriting","score":0.4247416853904724},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.4119222164154053},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.35443899035453796},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.3172321021556854},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2503396272659302},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.1864999532699585},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11324310302734375}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.760295569896698},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6611398458480835},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.6492729187011719},{"id":"https://openalex.org/C74370796","wikidata":"https://www.wikidata.org/wiki/Q15924863","display_name":"Signature recognition","level":3,"score":0.6165988445281982},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5910592675209045},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5879865288734436},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5662527680397034},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.5423409342765808},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.5418489575386047},{"id":"https://openalex.org/C112640561","wikidata":"https://www.wikidata.org/wiki/Q2440634","display_name":"Handwriting recognition","level":3,"score":0.5312464237213135},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.5228500962257385},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.5126566290855408},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.4592324495315552},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.44519925117492676},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.4331362247467041},{"id":"https://openalex.org/C2779386606","wikidata":"https://www.wikidata.org/wiki/Q2393642","display_name":"Handwriting","level":2,"score":0.4247416853904724},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4119222164154053},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.35443899035453796},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.3172321021556854},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2503396272659302},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.1864999532699585},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11324310302734375},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ised.2016.7977108","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ised.2016.7977108","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 Sixth International Symposium on Embedded Computing and System Design (ISED)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6299999952316284}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W3003949997","https://openalex.org/W3199359807","https://openalex.org/W2110485610","https://openalex.org/W3047607512","https://openalex.org/W4390983538","https://openalex.org/W2744690920","https://openalex.org/W2107320953","https://openalex.org/W2787081548","https://openalex.org/W183832189","https://openalex.org/W2536878212"],"abstract_inverted_index":{"In":[0,64,87,144,167],"the":[1,9,32,71,76,90,99,206],"field":[2],"o":[3],"f":[4],"Information":[5],"Technology,":[6],"security":[7],"is":[8,25,78,209],"most":[10,153],"important":[11,28,154],"aspect":[12],"to":[13],"ensure":[14],"confidentiality":[15],"and":[16,75,96,136,165,175,203],"avoid":[17],"forgery.":[18],"When":[19],"we":[20,170],"think":[21],"about":[22],"security,":[23],"authentication":[24,37,48,148],"play":[26],"an":[27],"role.":[29],"To":[30],"identify":[31],"authenticated":[33],"person":[34],"various":[35],"biometric":[36],"techniques":[38,51],"are":[39,98,152],"used":[40],"(like":[41,131],"iris,":[42],"fingers":[43],"print,":[44],"plum":[45],"vain,":[46],"signature":[47,68,74,104,174,177],"etc.).":[49],"These":[50],"measures":[52],"behavioral":[53],"or":[54,61,84,117,141],"physiological":[55],"characteristics":[56],"like":[57,128],"a":[58,62,81,85,123],"voice":[59],"sample":[60],"signature.":[63,124],"case":[65],"of":[66,73,122,147],"offline":[67,103],"deals":[69],"with":[70,172,196],"image":[72,77],"acquired":[79],"by":[80],"digital":[82],"camera":[83],"scanner.":[86],"this":[88,168],"case,":[89],"handwriting":[91],"order,":[92],"writing":[93],"speed":[94],"variation":[95],"skillfulness":[97],"key":[100],"points.":[101],"Previously":[102],"was":[105,178],"verified":[106,179],"u":[107,185],"sing":[108,186],"Hidden":[109],"Markov":[110],"Model":[111],"(HMM),":[112],"Support":[113],"Vector":[114],"Machine":[115],"(SVM)":[116],"using":[118,180],"some":[119],"unique":[120,126],"features":[121],"Some":[125],"feature":[127,130,140],"global":[129],"pixel":[132,134,137],"density,":[133],"distribution":[135],"axils),":[138],"mask":[139],"grid":[142],"feature.":[143],"any":[145],"type":[146],"technique":[149],"three":[150],"things":[151],"(i)":[155],"False":[156,161],"Acceptance":[157],"Rate":[158,163],"(FAR),":[159],"(ii)":[160],"Rejection":[162],"(FRR)":[164],"(iii)Accuracy.":[166],"paper,":[169],"deal":[171],"off-line":[173],"that":[176],"Artificial":[181],"Neural":[182,189],"Network":[183],"(ANN)":[184],"Back":[187],"Propagation":[188],"Network;":[190],"obtain":[191],"satisfactory":[192],"results":[193],"when":[194],"compared":[195],"existing":[197],"approaches.":[198],"Here":[199],"after":[200],"comparing":[201],"target":[202],"predicted":[204],"output,":[205],"error":[207],"calculated":[208],"always":[210],"less":[211],"than":[212],"0.5.":[213]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
