Towards a blob-based presence verification system in summative e-assessments

Traditionally, authentication systems are required to verify a claimed identity one time only at the initial login. However, in high-stake environments such as a summative e-assessment environment, a one-time authentication session is insufficient to guarantee security. Hence, the security of online summative assessments goes beyond ensuring that the ‘right’ student is authenticated at the initial login. More is required to verify the presence of an authenticated student for the duration of the test. In this paper, we explore potential approaches to achieving presence verification. However, these approaches have limitations that make them unsuitable for verifying presence in e-assessments. Hence, we propose an object tracking approach using a blob analysis solution. The blob analysis solution is a video processing technique that attempts to detect, verify and classify a student’s presence throughout the test session thus indicating the likelihood of acceptable or unacceptable activities. By employing the blob analysis operation, we propose a novel blob-based presence verification system which uses the geometric statistics of binary images to make inferences about an object’s presence in the video sequence. The proposed system is designed to verify the student’s presence in a noninterruptive and non-distracting fashion. Furthermore, by simulating possible student activities in test conditions, we carried out experiments to investigate the feasibility of using blob analysis for presence verification. In addition, the decisions made about a student’s presence in the test environment were driven by a set of well-defined fuzzy logic rules. The results show that the verification of a student’s presence presents valuable improvements to preserving e-assessment user security.

[1]  Fachhochschule Darmstadt A security framework for online distance learning and training , 1998 .

[2]  Harmesh Aojula,et al.  Computer-based, online summative assessment in undergraduate pharmacy teaching: The Manchester experience , 2006 .

[3]  Yongsheng Gao,et al.  Face recognition across pose: A review , 2009, Pattern Recognit..

[4]  Reinhard Klette,et al.  Object Classification and Tracking in Video Surveillance , 2003, CAIP.

[5]  Donald P. Ely,et al.  Assessing Learners Online , 2007 .

[6]  José Alberto Hernández,et al.  Biometrics in Online Assessments: A Study Case in High School Students , 2008, 18th International Conference on Electronics, Communications and Computers (conielecomp 2008).

[7]  Gregory R. Ganger,et al.  Secure Continuous Biometric-Enhanced Authentication , 2000 .

[8]  N. Rowe Cheating in Online Student Assessment: Beyond Plagiarism , 2004 .

[9]  Johannes Stallkamp,et al.  Video-based Face Recognition on Real-World Data , 2007, 2007 IEEE 11th International Conference on Computer Vision.

[10]  Gary B. Wills,et al.  Towards security goals in summative e-assessment security , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).

[11]  Sandra Kerka,et al.  Assessing Learners Online. Practitioner File. , 2000 .

[12]  Steven Furnell,et al.  Authentication and Supervision: A Survey of User Attitudes , 2000, Comput. Secur..

[13]  Takeo Kanade,et al.  A System for Video Surveillance and Monitoring , 2000 .

[14]  Chi Chung Ko,et al.  Secure Internet examination system based on video monitoring , 2004, Internet Res..

[15]  Yair Levy,et al.  Initial Development of a Learners ’ Ratified Acceptance of Multibiometrics Intentions Model ( RAMIM ) , 2009 .

[16]  P. Jonathon Phillips,et al.  Face recognition based on frontal views generated from non-frontal images , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).