A Smart Approach for Bimodal Biometric Authentication in Home-Exams (SABBAH Model)
Abstract
This paper presents a secure and smart model for
summative e-assessment, where exams can be conducted distantly,e.g. at home. This model aims to provide e-learning systems with an authentication approach that guarantees minimum cheating in summative e-assessment. It utilizes a combination of automatic video matching and continuous bimodal biometric authentication using fingerprint and keystroke dynamics. This ensures that the examinee is
the correct person on the other side throughout the e-examinationwithout a need for a proctor. It is based on one of the open source elearningand content management systems. Moreover, it employs amedia server, a suitable media encoder, and the necessaryapplication programming interfaces (APIs). Finally, its implementation requires
advanced algorithms of video matching and feature extraction.
Keywords
Full Text:
PDFReferences
M. Hentea, M. J. Shea, and L. Pennington, “A perspective on fulfilling the expectations of distance education,” Proc. 4th Conf. on Info. Tech. Curriculum (CITC4), Indiana, USA, pp. 160–167, October 2003.
K. Abouchedid, and G. M. Eid, “eLearning challenges in the Arab world: revelations from a case study profile,” Quality Assurance in Education, vol. 12, no. 1, pp. 15-27, 2004.
N. H. Mohd Alwi and I.-S. Fan, “Information security threats analysis for e-learning,” Proc. 1st Inter. Conf. of TECH-EDUCATION, CCIS, vol. 73, Athens, Greece, pp. 285-291, May 2010.
E. Flior and K. Kowalski, “Continuous biometric user authentication in online examinations,” 7th Inter. Conf. on Info. Tech.: New Generations (ITNG), Las Vegas, NV, pp. 488-492, April 2010.
A. Marcus, J. Raul, R. Ramirez-Velarde, and J. Nolazco-Flores, “Addressing secure assessments for Internet based distance learning still an irresolvable issue,” 9th Latin-American Congress of Edu. Comp.,Caracas, Venezuela, March 2008.
S. Alotaibi, “Using biometrics authentication via fingerprint recognition in e-exams in e-learning environment,” 4th Saudi Inter. Conf., The University of Manchester, UK, July 2010.
K. M. Apampa, G. Wills, and D. Argles, “User security issues in summative e-assessment security,” International Journal of Digital Society (IJDS), vol. 1, no. 2, June 2010.
E. Kritzinger, “Education for the 21st century- impact of ICT and digital resources”, in International Federation for Information Processing, vol.210, D. Kumar and J. Turner, Eds. Boston: Springer, 2006, pp. 345-349.
Y. Sabbah, “Comprehensive evaluation of e-learning at Al-Quds OpenUniversity,” Open Learning Center, Al-Quds Open University,Palestine, Rep. OLC-QOU II, 2010.
Y. Sabbah, “E-learning at Al-Quds Open University, current situation: a case study,” International Journal of Excellence in eLearning (IJEEL), vol. 3, no. 2, pp. 1-16, Jun. 2010.
H. A. El-Ghareeb. (2009, September). E-learning and management information systems, universities need both. E-learning Magazine [Online]. Available:
http://www.elearnmag.org/subpage.cfm section=articles&article=96-1
R. Raitman, L. Ngo, and N. Augar, “Security in the online e-learning environment,” Proc. 5th IEEE Int. Conf. on Adv. Learning Tech.(ICALT’05), Kaohsiung, Taiwan, pp. 702-706, July 2005.
W. Stallings, Data and Computer Communications. 8th ed., Prentice Hall, 2007.
S. Banerjee, “Designing a secure model of an e-learning system- a UML-based approach,” IEEE Potentials Magazine, vol. 29, no. 5, pp. 22-27, Sep.-Oct. 2010.
V. Ciriani, S. D. C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, “Combining fragmentation and encryption to protect privacy in data storage,” ACM Transactions on Information and System Security (TISSEC), vol. 13, no. 3, Article 22, July 2010.
E. R. Weippl, “In-depth tutorials: Security in e-learning,” eLearn Magazine, vol. 2005, no. 3, Mar. 2005.
K. El-Khatib, L. Korba, Y. Xu, and G. Yee, “Privacy and security in elearning”,International Journal of Distance Education, vol. 1, no. 4, pp.
-19, 2003.
J. F. Gonzalez, M. C. Rodriguez, M. L. Nistal, and L. A. Rifon,“Reverse OAuth: a solution to achieve delegated authorizations in single sign-on e-learning systems,” Computers & Security, vol. 28, no. 8, pp. 843-856, Nov. 2009.
A. Kapil and A. Garg, “Secure web access model for sensitive data,”International Journal of Computer Science & Communication (IJCSC),
vol. 1, no. 1, pp. 13-16, Jan.-June 2010.
Y. Levy and M. Ramim, “A theoretical approach for biometrics authentication of e-exams,” Chais Conf. on Instructional Tech.
Research, Raanana, Israel, pp. 93-101, 2007.
C. W. Ng, I. King and M. R. Lyu, “Video comparison using tree matching algorithms,” Proc. Int. Conf. on Imaging Science, Sys., and Tech., 2001.
G. J. Cizek, Cheating on Tests: How to Do It, Detect It, and Prevent It. Mahwah, New Jersey: Lawrence Erlbaum, 1999.
A. Lathrop and K. Foss, Student Cheating and Plagiarism in the Internet Era: A Wake-Up Call. Englewood, CO: Libraries Unlimited, 2000.
M. Dick, J. Sheard, C. Bareiss, J. Carter, D. Joyce, T. Harding, and C.Laxer, “Addressing student cheating: definitions and solutions,” ACM SIGCSE Bulletin, vol. 35, no. 2, pp. 172-184, June 2003.
N. C. Rowe. (2004, Summer). Cheating in online student assessment: beyond plagiarism. Online Journal of Distance Learning Administration [Online]. 7(2). Available:
http://www.westga.edu/~distance/ojdla/summer72/rowe72.html
K. Bushweller, “Generation of cheaters,” The American School Board
Journal, vol. 186, no. 4, pp. 24-32. April 1999.
D. L. McCabe and L. K. Trevino, “What we know about cheating in college: longitudinal trends and recent developments,” Change, vol. 28, no. 1, pp. 28-33. 1996.
D. L. McCabe and L. K. Trevino, “Academic dishonesty: honor codes and other contextual influences,” Journal of Higher Education, vol. 64, no. 5, pp. 522-539, 1993.
G. Harrison, “Computer-based assessment strategies in the teaching ofdatabases at honors degree level 1,” in Proceedings of BNCOD, Lecture Notes in Computer Science (LNCS), vol. 3112, H. Williams andL.
MacKinnon Eds. Heidelberg: Springer-Verlag Berlin, 2004, pp. 257-
E. G. Agulla, L. A. Rifon, J. L. Alba-Castro, and C. G. Mateo, “Is my student at the other side? Applying biometric web authentication to elearning environments,” Proc. 8th IEEE Int. Conf. on Adv. Learning Tech. (ICALT), Spain, 2008.
S. Kikuchi, T. Furuta, and T. Akakura, “Periodical examinees identification in e-test systems using the localized arc pattern method,”Proc. Distance Learning and Internet Conf., Tokyo, 2008, pp. 213-220.
S. Asha and C. Chellappan, “Authentication of e-learners using multimodal biometric technology,” International Symposium on Biometrics and Security Technologies (ISBAST), Islamabad, 2008.
Y. Levy and M. Ramim, “Initial development of a learners’ ratified acceptance of multibiometrics intentions model (RAMIM),” Interdisciplinary Journal of e-Learning and Learning Objects (IJELLO),vol. 5, 2009.
C. C. Ko and C. D. Cheng, “Secure internet examination system based on video monitoring,” Internet Research: Electronic Networking Applications and Policy, vol. 14, no .1, pp. 48-61, 2004.
J. A. Hernández, A. O. Ortiz, J. Andaverde, and G. Burlak, “Biometrics in online assessments: A study case in high school students,” Proc. 18th Int. Conf. on Elec., Comm. and Comp. (CONIELECOMP), Puebla,2008.
Adm. and Reg. Department, “QOU: Facts and Figures,” Al-Quds Open
University, Palestine, Rep. QOU-FF 2010-2011 [Online]. Available:
http://www.qou.edu/english/aboutUs/statistics/statis2010_201_2.pdf
Y. Sabbah, “An Interactive and Secure E-Examination Unit: A proposed model for proctoring online exams,” Pro. 10th Ro. Int. Conf.- Networking in Education and Research (RoEduNet), Iasi, Romania,Aug. 2011.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.