Transparent Authentication Methodology in Electronic Education

In the context of on-line assessment in e-learning, a problem arises when a student taking an exam may wish to cheat by handing over personal credentials to someone else to take their place in an exam, Another problem is that there is no method for signing digital content as it is being produced in a computerized environment. Our proposed solution is to digitally sign the participant’s work by embedding voice samples in the transcript paper at regular intervals. In this investigation, we have demonstrated that a transparent stenographic methodology will provide an innovative and practical solution for achieving continuous authentication in an online educational environment by successful insertion and extraction of audio digital signatures.

[1]  Gary B. Wills,et al.  Towards security goals in summative e-assessment security , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).

[2]  Tyler Robison,et al.  Controlling Transparency in an Online Learning Environment , 2007, IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2007).

[3]  Charles A. Shoniregun,et al.  Applying semantic web and user behavior analysis to enforce the intrusion detection system , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).

[4]  Huaiqing Wang,et al.  Cyber warfare: steganography vs. steganalysis , 2004, CACM.

[5]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[6]  Chin-Chen Chang,et al.  Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy , 2003, Pattern Recognit..

[7]  A. P. Rovai Building classroom community at a distance: A case study , 2001 .

[8]  Hideyuki Tokuda,et al.  Active Authentication for Pervasive Computing Environments , 2002, ISSS.

[9]  Rashad J. Rasras,et al.  Advanced algorithms in audio steganography for hiding human speech signal , 2010, 2010 2nd International Conference on Advanced Computer Control.

[10]  Suthikshn Kumar Steganographic Approach to Copyright Protection of Audio , 2007 .

[11]  Bridget D. Arend Encouraging Critical Thinking in Online Threaded Discussions. , 2009 .

[12]  K. Faez,et al.  LSB data hiding detection based on gray level co-occurrence matrix (GLCM) , 2008, 2008 International Symposium on Telecommunications.

[13]  Toby Sharp,et al.  An Implementation of Key-Based Digital Signal Steganography , 2001, Information Hiding.

[14]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[15]  John C. Mitchell,et al.  Client-Side Defense Against Web-Based Identity Theft , 2004, NDSS.

[16]  David Argles,et al.  Transparent authentication in E-learning , 2011, International Conference on Information Society (i-Society 2011).

[17]  E.G. Agulla,et al.  Is My Student at the Other Side? Applying Biometric Web Authentication to E-Learning Environments , 2008, 2008 Eighth IEEE International Conference on Advanced Learning Technologies.

[18]  Brian J. Cook,et al.  Full Disclosure: The Perils and Promise of Transparency , 2007, Perspectives on Politics.

[19]  D. Weil,et al.  Full disclosure : the perils and promise of transparency , 2007 .

[20]  Akram M. Zeki,et al.  A secure audio steganography approach , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).

[22]  Sugandha Gupta A Comparative study of Usability Evaluation Methods , 2015 .

[23]  L. Bingham Full Disclosure: The Perils and Promise of Transparency, by Archon Fung, Mary Graham, and David Weil, Cambridge: Cambridge University Press, 2007, 282 pp., $28.00, hardcover. , 2008 .

[24]  Julio Cesar Sampaio do Prado Leite,et al.  Software Transparency , 2010, Bus. Inf. Syst. Eng..

[25]  Adrian Henriques,et al.  Corporate Truth: The Limits to Transparency , 2013 .

[26]  Zhiping Zhou,et al.  Steganalysis for Markov Feature of Difference Array in DCT Domain , 2009, 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery.

[27]  Chula G. King,et al.  Online Exams and Cheating: An Empirical Analysis of Business Students' Views , 2009 .

[28]  Sacha Brostoff,et al.  Transforming the ‘Weakest Link’ — a Human/Computer Interaction Approach to Usable and Effective Security , 2001 .

[29]  김인택 [서평]「Information Hiding Techniques for Steganography and Digital Watermarking」 , 2000 .

[30]  Chu-Hsing Lin,et al.  A Robust Watermark Scheme for Copyright Protection , 2008, 2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008).

[31]  Wen-Nung Lie,et al.  Data hiding in images with adaptive numbers of least significant bits based on the human visual system , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[32]  D. Artz,et al.  Digital steganography: hiding data within data , 2001 .