Behavioral biometric verification of student identity in online course assessment and authentication of authors in literary works

Keystroke and stylometry behavioral biometrics were investigated with the objective of developing a robust system to authenticate students taking online examinations. This work responds to the 2008 U.S. Higher Education Opportunity Act that requires institutions of higher learning undertake greater access control efforts, by adopting identification technologies as they become available, to assure that students of record are those actually accessing the systems and taking the exams in online courses. Performance statistics on keystroke, stylometry, and combined keystroke-stylometry systems were obtained on data from 30 students taking examinations in a university course. The performance of the keystroke system was 99.96% and 100.00%, while that of the stylometry system was considerably weaker at 74% and 78%, on test input of 500 and 1000 words, respectively. To further investigate the stylometry system, a separate study on 30 book authors achieved performance of 88.2% and 91.5% on samples of 5000 and 10000 words, respectively, and the varied performance over the population of authors was analyzed.

[1]  Rong Zheng,et al.  From fingerprint to writeprint , 2006, Commun. ACM.

[2]  John J. Leggett,et al.  Dynamic Identity Verification via Keystroke Characteristics , 1991, Int. J. Man Mach. Stud..

[3]  George Tambouratzis,et al.  A comparative study on authorship attribution classification tasks using both neural network and statistical methods , 2010, Neural Computing and Applications.

[4]  Rong Zheng,et al.  A framework for authorship identification of online messages: Writing-style features and classification techniques , 2006, J. Assoc. Inf. Sci. Technol..

[5]  Olivier de Vel,et al.  Mining E-mail Authorship , 2000 .

[6]  David L. Hoover Multivariate Analysis and the Study of Style Variation , 2003, Lit. Linguistic Comput..

[7]  Efstathios Stamatatos,et al.  A survey of modern authorship attribution methods , 2009, J. Assoc. Inf. Sci. Technol..

[8]  Claudia Picardi,et al.  Keystroke analysis of free text , 2005, TSEC.

[9]  George M. Mohay,et al.  Mining e-mail content for author identification forensics , 2001, SGMD.

[10]  Claudia Picardi,et al.  User authentication through keystroke dynamics , 2002, TSEC.

[11]  Louise Guthrie,et al.  Authorship Attribution of E-Mail: Comparing Classifiers over a New Corpus for Evaluation , 2008, LREC.

[12]  Zongkai Yang,et al.  Variable Length Character N-Gram Approach for Online Writeprint Identification , 2010, 2010 International Conference on Multimedia Information Networking and Security.

[13]  Flora S. Tsai,et al.  Authorship Identification for Online Text , 2010, 2010 International Conference on Cyberworlds.

[14]  Kazimierz Kowalski,et al.  Continuous Biometric User Authentication in Online Examinations , 2010, 2010 Seventh International Conference on Information Technology: New Generations.

[15]  Michael K. Reiter,et al.  Password hardening based on keystroke dynamics , 2002, International Journal of Information Security.

[16]  Richard Dazeley,et al.  Authorship Attribution for Twitter in 140 Characters or Less , 2010, 2010 Second Cybercrime and Trustworthy Computing Workshop.

[17]  Michael Gamon,et al.  Linguistic correlates of style: authorship classification with deep linguistic analysis features , 2004, COLING.

[18]  Liviu P. Dinu,et al.  Comparing Statistical Similarity Measures for Stylistic Multivariate Analysis , 2009, RANLP.

[19]  Yejin Choi,et al.  Syntactic Stylometry for Deception Detection , 2012, ACL.

[20]  Luiz Eduardo Soares de Oliveira,et al.  Compression and stylometry for author identification , 2009, 2009 International Joint Conference on Neural Networks.

[21]  Sung-Hyuk Cha,et al.  A Keystroke Biometric Systemfor Long-Text Input , 2010, Int. J. Inf. Secur. Priv..

[22]  Lee Luan Ling,et al.  Biometric Access Control Through Numerical Keyboards Based on Keystroke Dynamics , 2006, ICB.

[23]  Christophe Rosenberger,et al.  Keystroke dynamics with low constraints SVM based passphrase enrollment , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[24]  David Yarowsky,et al.  Stylometric Analysis of Scientific Articles , 2012, NAACL.

[25]  David L. Hoover,et al.  Statistical Stylistics and Authorship Attribution: an Empirical Investigation , 2001, Lit. Linguistic Comput..

[26]  Zongkai Yang,et al.  Feature Selection for Online Writeprint Identification Using Hybrid Genetic Algorithm , 2010, 2010 International Symposium on Computational Intelligence and Design.

[27]  Benjamin C. M. Fung,et al.  e-mail authorship verification for forensic investigation , 2010, SAC '10.

[28]  Michael K. Reiter,et al.  Password hardening based on keystroke dynamics , 1999, CCS '99.

[29]  Kenneth Revett,et al.  Behavioral Biometrics: A Remote Access Approach , 2008 .

[30]  Moshe Koppel,et al.  Exploiting Stylistic Idiosyncrasies for Authorship Attribution , 2003 .

[31]  Fuchun Peng,et al.  N-GRAM-BASED AUTHOR PROFILES FOR AUTHORSHIP ATTRIBUTION , 2003 .

[32]  Dawn Xiaodong Song,et al.  On the Feasibility of Internet-Scale Author Identification , 2012, 2012 IEEE Symposium on Security and Privacy.

[33]  Hans van Halteren,et al.  Linguistic Profiling for Authorship Recognition and Verification , 2004, ACL.

[34]  Rong Zheng,et al.  Authorship Analysis in Cybercrime Investigation , 2003, ISI.

[35]  Sung-Hyuk Cha,et al.  An investigation of keystroke and stylometry traits for authenticating online test takers , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[36]  Sung-Hyuk Cha,et al.  Recent Advances in the Development of a Long-Text-Input Keystroke Biometric Authentication System for Arbitrary Text Input , 2013, 2013 European Intelligence and Security Informatics Conference.

[37]  Norwati Mustapha,et al.  Computational Stylometic Approach Based on Frequent Word and Frequent Pair in the Text Mining Authorship Attribution , 2009 .

[38]  Rachel Greenstadt,et al.  Detecting Hoaxes, Frauds, and Deception in Writing Style Online , 2012, 2012 IEEE Symposium on Security and Privacy.

[39]  Sahin Albayrak,et al.  Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[40]  Walter Daelemans,et al.  Shallow Text Analysis and Machine Learning for Authorship Attribtion , 2005, CLIN.

[41]  Krzysztof A. Cyran Machine learning approach to authorship attribution of literary texts , 2007 .

[42]  George M. Mohay,et al.  Gender-preferential text mining of e-mail discourse , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..

[43]  Graeme Hirst,et al.  Bigrams of Syntactic Labels for Authorship Discrimination of Short Texts , 2007, Lit. Linguistic Comput..

[44]  Moshe Koppel,et al.  Authorship verification as a one-class classification problem , 2004, ICML.

[45]  James P. Titus,et al.  Security and Privacy , 1967, 2022 IEEE Future Networks World Forum (FNWF).

[46]  Adriana Kovashka,et al.  Authorship Attribution Using Probabilistic Context-Free Grammars , 2010, ACL.

[47]  Walter Daelemans,et al.  Authorship Attribution and Verification with Many Authors and Limited Data , 2008, COLING.

[48]  Vittorio Murino,et al.  Conversationally-inspired stylometric features for authorship attribution in instant messaging , 2012, ACM Multimedia.

[49]  Benjamin C. M. Fung,et al.  A novel approach of mining write-prints for authorship attribution in e-mail forensics , 2008, Digit. Investig..

[50]  Sharath Pankanti,et al.  Guide to Biometrics , 2003, Springer Professional Computing.

[51]  Sung-Hyuk Cha,et al.  A Keystroke Biometric System for Long-Text Input , 2013 .

[52]  Lior Rokach,et al.  Continuous Verification Using Keystroke Dynamics , 2010, 2010 International Conference on Computational Intelligence and Security.

[53]  Graeme Hirst,et al.  Authorship Attribution for Small Texts: Literary and Forensic Experiments , 2007, PAN.

[54]  Henrique Santos,et al.  Keystroke Dynamics for Continuous Access Control Enforcement , 2012, 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.