A Framework of Bimodal Biometrics for E-assessment Authentication Systems

The global use of the internet has improved the growth of the educational sector over the years, while electronic assessments have turn out to be one of the major tools in the development of both non-academic and academic establishments. The effective assessment of a student is mostly perceived as one of the foremost challenges that is frequently experienced during online examination in that it can be very difficult to provide accurate user authentication. The requirement to secure and authenticate a user during e-assessments owing to the high rate of misconduct has led to the proposal of this research. The purpose is to examine potential threats to student authentication during e-assessments and propose a framework which uses a bi-modal authentication approach to provide successful authentication during e-assessment. In implementing this approach, we propose a framework that provides security to improve e-assessments by introducing authentication classifiers to demonstrate its application in biometrics technologies. The proposed model was evaluated based on set of thresholds using Accuracy, FAR and FRR as performance metrics. the proposed model gave a high accuracy of 94.52%. The single-modal model of keystrokes had percentage accuracy of 92.025% and face had percentage accuracy of 92.58%. This implies that the bimodal model integrating keystrokes and face outperforms the single-modal model of keystrokes and single-modal model of face respectively. The study concludes that the proposed model contributes to existing works on e-assessment systems by integrating keystrokes and face bimodal biometric to optimally minimize fraud and impersonation thereby providing accurate authentication of a user.

[1]  Tiago C. Mota,et al.  One-Against-All-based multiclass SVM strategies applied to vehicle plate character recognition , 2009, 2009 International Joint Conference on Neural Networks.

[2]  Dwijen Rudrapal,et al.  Voice Recognition and Authentication as a Proficient Biometric Tool and its Application in Online Exam for P.H People , 2012 .

[3]  Hanif Ullah,et al.  Security Considerations and Recommendations in Computer-Based Testing , 2014, TheScientificWorldJournal.

[4]  Ali Ismail Awad,et al.  Machine Learning Techniques for Fingerprint Identification: A Short Review , 2012, AMLTA.

[5]  Gary Wills,et al.  User Security Issues in Summative E-Assessment Security , 2010 .

[6]  Claus Vielhauer,et al.  Parameter optimization for biometric fingerprint recognition using genetic algorithms , 2006, MM&Sec '06.

[7]  Wen Gao,et al.  Histogram of Gabor Phase Patterns (HGPP): A Novel Object Representation Approach for Face Recognition , 2007, IEEE Transactions on Image Processing.

[8]  Kuo-Chin Fan,et al.  Triangle-based approach to the detection of human face , 2001, Pattern Recognit..

[9]  Pradnya M. Shende A Survey Based on Fingerprint , Face and Iris Biometric Recognition System , Image Quality Assessment and Fake Biometric , 2014 .

[10]  Sharath Pankanti,et al.  Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..

[11]  S. Sangeetha,et al.  A new framework for IRIS and fingerprint recognition using SVM classification and extreme learning machine based on score level fusion , 2013, 2013 7th International Conference on Intelligent Systems and Control (ISCO).

[12]  Anil K. Jain,et al.  Biometrics of Next Generation: An Overview , 2010 .

[13]  David Zhang,et al.  Automated Biometrics: Technologies and Systems , 2000 .

[14]  Zarina Shukur,et al.  Review of user authentication methods in online examination , 2015 .

[15]  Thomas Schmitz-Rode,et al.  Advantages and Disadvantages of Electronic Assessments in Biomedical Education , 2009 .

[16]  Hannan Xiao,et al.  Using Challenge Questions for Student Authentication in Online Examination , 2012 .

[17]  Song Ying,et al.  Face recognition based on multi-class SVM , 2009, 2009 Chinese Control and Decision Conference.

[18]  Leon N. Cooper,et al.  Training Data Selection for Support Vector Machines , 2005, ICNC.

[19]  Adeetya Sawant,et al.  Iris Recognition using Support Vector Machine , 2016 .

[20]  Souheil Ben-Yacoub Multi-Modal Data Fusion for Person Authentication using SVM , 1998 .

[21]  Jamal Hussain Shah,et al.  Sub-Holistic Hidden Markov Model for Face Recognition , 2013 .

[22]  Bir Bhanu,et al.  Robust fingerprint identification , 2002, Proceedings. International Conference on Image Processing.

[23]  Ip-Shing Fan,et al.  Threats analysis for e-learning , 2010 .