Using current biometrics technologies for authentication in e-learning assessment

This paper introduces current biometric technologies that can be easily used for advanced authentication methods for remote assessment in e-learning solutions. The focus is on technologies which are not expensive and can be used without any special equipment. The main inputs of the proposed biometric analysis can be camera, microphone, keyboard or mouse. All these input devices are usually present in personal computers, laptops, tablets or smartphones. Using these inputs the system can authenticate the user statically (during the login) or dynamically (during the assessment process). The important factor for practical usage is also the liveness detection to recognize a presentation attack or frauds reported for the specific technique.

[1]  Patrick Bours,et al.  Static Audio Keystroke Dynamics , 2015, MCSS.

[2]  Elena N. Cherepovskaya,et al.  Protection methods of assessment procedures used in e-Learning , 2015, 2015 13th International Conference on Emerging eLearning Technologies and Applications (ICETA).

[3]  Christoph Busch,et al.  Altered fingerprint detection – algorithm performance evaluation , 2016, 2016 4th International Conference on Biometrics and Forensics (IWBF).

[4]  C. Chellappan,et al.  Authentication of e-learners using multimodal biometric technology , 2008, 2008 International Symposium on Biometrics and Security Technologies.

[5]  Jozef Juhar,et al.  A Study of Acoustic Features for Emotional Speaker Recognition in I-Vector Representation , 2015 .

[6]  Marinella Cadoni,et al.  Liveness detection based on 3D face shape analysis , 2013, 2013 International Workshop on Biometrics and Forensics (IWBF).

[7]  David Zhang,et al.  Automated Biometrics: Technologies and Systems , 2000 .

[8]  Bruno Crispo,et al.  Hold and Sign: A Novel Behavioral Biometrics for Smartphone User Authentication , 2016, 2016 IEEE Security and Privacy Workshops (SPW).

[9]  Patrick Bours Continuous keystroke dynamics: A different perspective towards biometric evaluation , 2012, Inf. Secur. Tech. Rep..

[10]  N. L. Clarke,et al.  e-Invigilator: A biometric-based supervision system for e-Assessments , 2013, International Conference on Information Society (i-Society 2013).

[11]  Blanka Frydrychova Klimova,et al.  Pedagogical Issues of Online Teaching: Students' Satisfaction with On-Line Study Materials and Their Preferences for a Certain Type , 2014, ICWL Workshops.

[12]  Hugo Proença,et al.  ICB-RW 2016: International challenge on biometric recognition in the wild , 2016, 2016 International Conference on Biometrics (ICB).

[13]  Jean-Luc Dugelay,et al.  Bag of soft biometrics for person identification , 2010, Multimedia Tools and Applications.

[14]  Michal Nagy,et al.  COMMUNITY BASED TRANSLATION OF ELEARNING MATERIALS , 2008 .

[15]  D. Levicky,et al.  Multimodal biometric authentication using speech and hand geometry fusion , 2008, 2008 15th International Conference on Systems, Signals and Image Processing.

[16]  Jozef Juhar,et al.  The Influence of Adaptation Database Size on the Quality of HMM-based Synthetic Voice Based on the Large Average Voice Model , 2016, Recent Advances in Nonlinear Speech Processing.

[17]  Jozef Juhar,et al.  Acoustical User Identification Based on MFCC Analysis of Keystrokes , 2015 .

[18]  Eva Kiktova,et al.  Acoustical keystroke analysis for user identification and authentication , 2016, 2016 26th International Conference Radioelektronika (RADIOELEKTRONIKA).

[19]  Mita Nasipuri,et al.  Thermal Infrared Face Recognition – A Biometric Identification Technique for Robust Security system , 2011 .

[20]  Milan Rusko,et al.  PLDA Speaker Verification with Limited Speech Data , 2015, SPECOM.

[21]  Teerakiat Kerdcharoen,et al.  Detection and Classification of Human Body Odor Using an Electronic Nose , 2009, Sensors.

[22]  Soumik Mondal,et al.  Complexity measurement of a password for keystroke dynamics: preliminary study , 2013, SIN.

[23]  José Paulo Leal,et al.  A Survey of E-learning Content Aggregation Standards , 2014, ICWL Workshops.

[24]  Mohammad S. Obaidat,et al.  Online risk-based authentication using behavioral biometrics , 2013, Multimedia Tools and Applications.

[25]  E.G. Agulla,et al.  Is My Student at the Other Side? Applying Biometric Web Authentication to E-Learning Environments , 2008, 2008 Eighth IEEE International Conference on Advanced Learning Technologies.

[26]  Soumik Mondal,et al.  Combining keystroke and mouse dynamics for continuous user authentication and identification , 2016, 2016 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA).

[27]  Sharath Pankanti,et al.  A Prototype Hand Geometry-based Verication System , 1999 .

[28]  Thierry Dutoit,et al.  Generating Robot/Agent backchannels during a storytelling experiment , 2009, 2009 IEEE International Conference on Robotics and Automation.

[29]  Inma Hernáez,et al.  Personalized synthetic voices for speaking impaired: website and app , 2015, INTERSPEECH.

[30]  Ala Abdulhakim Abdulaziz Features extraction scheme for behavioral biometric authentication in touchscreen mobile devices , 2016 .