Abstract
Biometric tools try model a person by means of its intrinsic properties or behaviours. Every person has a set of unique physical traits derived from genetics and vital experience. Although there are many traits that can be used to verify the identity of a learner, such as the voice, appearance, fingerprints, iris, or gait among others, most of them require the use of special sensors. This chapter presents an analysis of four biometric tools based on standard sensors and used during the TeSLA project pilots. Those tools are designed to verify the identity of the learner during an assessment activity. The data for on-site and on-line institutions is used in order to compare the performance of such tools in both scenarios.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Kryterion website: https://www.kryteriononline.com.
- 2.
ProctorU website: http://www.proctoru.com.
- 3.
Pearson VUE website: http://home.pearsonvue.com.
- 4.
Coursera website: https://www.coursera.com.
- 5.
TeSLA Project website: http://tesla-project.eu.
- 6.
Open source framework developed by authors for [12]: https://github.com/lopez-monroy/FeatureSpaceTree.
Abbreviations
- AUC:
-
Area Under the ROC Curve
- CMVN:
-
Cepstral Mean and Variance Normalization
- FA:
-
Forensic Analysis
- FN:
-
False Negative
- FP:
-
False Positive
- FPR:
-
False Positive Rate
- FR:
-
Face Recognition
- GMM:
-
Gaussian Mixture Model
- KS:
-
Keystroke Dynamic Recognition
- MFCC:
-
Mel Frequency Cepstral Coefficients
- ROC:
-
Receiver Operating Characteristic
- SVM:
-
Support Vector Machine
- TN:
-
True Negative
- TP:
-
True Positive
- TPR:
-
True Positive Rate
- VAD:
-
Voice Activity Detector
- VR:
-
Voice Recognition
References
Asha S, Chellappan C (2008) Authentication of e-learners using multimodal biometric technology. In: International symposium on biometrics and security technologies, 2008. ISBAST 2008, pp 1–6
Dalal N, Triggs B (2005) Histograms of oriented gradients for human detection. In: Proceedings of the 2005 IEEE Computer Society conference on computer vision and pattern recognition (CVPR’05), vol 1’, CVPR ’05. IEEE Computer Society, Washington, DC, USA, pp 886–893. https://doi.org/10.1109/CVPR.2005.177
Dehak N, Kenny PJ, Dehak R, Dumouchel P, Ouellet P (2011) Front-end factor analysis for speaker verification. Trans Audio Speech Lang Proc 19(4):788–798. https://doi.org/10.1109/TASL.2010.2064307
Fawcett T (2006) An introduction to ROC analysis. Pattern Recogn Lett 27(8):861–874 (ROC Analysis in Pattern Recognition) http://www.sciencedirect.com/science/article/pii/S016786550500303X
Ferreira J, Santos H, Patrao B (2011) Intrusion detection through keystroke dynamics. In: Communications and multimedia security. Springer, Berlin, Heidelberg, pp 81–90
Frantzeskou G, Stamatatos E, Gritzalis S, Chaski C, Stephen Howald B (2007) Identifying authorship by byte-level n-grams: the source code author profile (SCAP) method. In: IJDE, vol 6
Ivanova M, Bhattacharjee S, Marcel S, Rozeva A, Durcheva M (2018) Enhancing trust in eAssessment—the TeSLA system solution. In: Technology enhanced assessment conference
Kambourakis G, Damopoulos D (2013) A competent post-authentication and non-repudiation biometric-based scheme for m-learning. In: Proceedings of the 10th IASTED international conference on web-based education (WBE 2013). ACTA Press, Innsbruck, Austria, pp 821–827
Kazemi V, Sullivan J (2014) One millisecond face alignment with an ensemble of regression trees. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1867–1874
Khoury E, Kinnunen T, Sizov A, Wu Z, Marcel S (2014) Introducing I-vectors for joint anti-spoofing and speaker verification. In: The 15th annual conference of the International Speech Communication Association
Kutafina E, Laukamp D, Bettermann R, Schroeder U, Jonas SM (2012) Wearable sensors for elearning of manual tasks: using forearm EMG in hand hygiene training. Sensors (Basel) 16(8):1221
López-Monroy AP, Montes-y Gómez M, Escalante HJ, Villaseñor-Pineda L, Stamatatos E (2015) Discriminative subprofile-specific representations for author profiling in social media. Knowl-Based Syst 89:134–147
Pastor López-Monroy A, Montes-y Gómez M, Escalante HJ, Villaseñor-Pineda L, Stamatatos E (2015) Discriminative subprofile-specific representations for author profiling in social media. Knowl-Based Syst 89:134–147
Monaco J, Bakelman N, Cha S-H, Tappert C (2013) Recent advances in the development of a long-text-input keystroke biometric authentication system for arbitrary text input. In: Intelligence and security informatics conference (EISIC), 2013 European, pp 60–66
Peralta D, Galar M, Triguero I, Paternain D, García S, Barrenechea E, Benítez JM, Bustince H, Herrera F (2015) A survey on fingerprint minutiae-based local matching for verification and identification: taxonomy and experimental evaluation. Inf Sci 315:67–87
Pinto P, Patrão B, Santos H (2014) Free typed text using keystroke dynamics for continuous authentication. In: De Decker B, Zúquete A (eds) Communications and multimedia security. Springer, Berlin, Heidelberg, pp 33–45
Pirbhulal S, Zhang H, Mukhopadhyay SC, Li C, Wang Y, Li G, Wu W, Zhang Y-T (2015) An efficient biometric-based algorithm using heart rate variability for securing body sensor networks. Sensors (Basel) 15(7):15067–15089
Prasad NV, Umesh S (2013) Improved cepstral mean and variance normalization using Bayesian framework. In: 2013 IEEE workshop on automatic speech recognition and understanding, pp 156–161
Rabiner LR, Schafer RW (2007) Introduction to digital speech processing. Found Trends Signal Process 1(1):1–194. https://doi.org/10.1561/2000000001
Rabuzin K, Baca M, Sajko M (2006) E-learning: biometrics as a security factor. In: 2006 international multi-conference on computing in the global information technology - (ICCGI’06), pp 64–64
Sapijaszko GI, Mikhael WB (2012) An overview of recent window based feature extraction algorithms for speaker recognition. In: 2012 IEEE 55th international midwest symposium on circuits and systems (MWSCAS). IEEE, New York, pp 880–883
Schroff F, Kalenichenko D, Philbin J (2015) Facenet: a unified embedding for face recognition and clustering. In: 2015 IEEE conference on computer vision and pattern recognition (CVPR), pp 815–823
Sumithra M, Devika A (2012) A study on feature extraction techniques for text independent speaker identification. In: 2012 international conference on computer communication and informatics (ICCCI), pp 1–5
Tata S, Patel JM (2007) Estimating the selectivity of TF-IDF based cosine similarity predicates. SIGMOD Rec 36(2):7–12. https://doi.org/10.1145/1328854.1328855
Wagner A, Wright J, Ganesh A, Zhou Z, Mobahi H, Ma Y (2012) Toward a practical face recognition system: robust alignment and illumination by sparse representation. IEEE Trans Pattern Anal Mach Intell 34(2):372–386
Wechsler H, Phillips JP, Bruce V, Soulie FF, Huang TS (2012) Face recognition: from theory to applications, vol 163. Springer Science & Business Media, Berlin
Lee Y, Chen J, Tseng CW, Lai S-H (2016) Accurate and robust face recognition from RGB-D images with a deep learning approach. In: Richard ERH, Wilson C, Smith WAP (eds) Proceedings of the British machine vision conference (BMVC), pp 123.1–123.14
Zhong Y, Deng Y (2015) A survey on keystroke dynamics biometrics: approaches, advances, and evaluations. Recent advances in user authentication using keystroke dynamics biometrics. Science Gate Publishing
Acknowledgements
This research was supported by RTI2018-095232-B-C22 grant from the Spanish Ministry of Science, Innovation and Universities (FEDER funds), and NVIDIA Hardware grant program.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Baró, X., Muñoz Bernaus, R., Baneres, D., Guerrero-Roldán, A.E. (2020). Biometric Tools for Learner Identity in e-Assessment. In: Baneres, D., Rodríguez, M., Guerrero-Roldán, A. (eds) Engineering Data-Driven Adaptive Trust-based e-Assessment Systems. Lecture Notes on Data Engineering and Communications Technologies, vol 34. Springer, Cham. https://doi.org/10.1007/978-3-030-29326-0_3
Download citation
DOI: https://doi.org/10.1007/978-3-030-29326-0_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-29325-3
Online ISBN: 978-3-030-29326-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)