Skip to main content

Biometric Tools for Learner Identity in e-Assessment

  • Chapter
  • First Online:
Engineering Data-Driven Adaptive Trust-based e-Assessment Systems

Abstract

Biometric tools try model a person by means of its intrinsic properties or behaviours. Every person has a set of unique physical traits derived from genetics and vital experience. Although there are many traits that can be used to verify the identity of a learner, such as the voice, appearance, fingerprints, iris, or gait among others, most of them require the use of special sensors. This chapter presents an analysis of four biometric tools based on standard sensors and used during the TeSLA project pilots. Those tools are designed to verify the identity of the learner during an assessment activity. The data for on-site and on-line institutions is used in order to compare the performance of such tools in both scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Kryterion website: https://www.kryteriononline.com.

  2. 2.

    ProctorU website: http://www.proctoru.com.

  3. 3.

    Pearson VUE website: http://home.pearsonvue.com.

  4. 4.

    Coursera website: https://www.coursera.com.

  5. 5.

    TeSLA Project website: http://tesla-project.eu.

  6. 6.

    Open source framework developed by authors for [12]: https://github.com/lopez-monroy/FeatureSpaceTree.

Abbreviations

AUC:

Area Under the ROC Curve

CMVN:

Cepstral Mean and Variance Normalization

FA:

Forensic Analysis

FN:

False Negative

FP:

False Positive

FPR:

False Positive Rate

FR:

Face Recognition

GMM:

Gaussian Mixture Model

KS:

Keystroke Dynamic Recognition

MFCC:

Mel Frequency Cepstral Coefficients

ROC:

Receiver Operating Characteristic

SVM:

Support Vector Machine

TN:

True Negative

TP:

True Positive

TPR:

True Positive Rate

VAD:

Voice Activity Detector

VR:

Voice Recognition

References

  1. Asha S, Chellappan C (2008) Authentication of e-learners using multimodal biometric technology. In: International symposium on biometrics and security technologies, 2008. ISBAST 2008, pp 1–6

    Google Scholar 

  2. Dalal N, Triggs B (2005) Histograms of oriented gradients for human detection. In: Proceedings of the 2005 IEEE Computer Society conference on computer vision and pattern recognition (CVPR’05), vol 1’, CVPR ’05. IEEE Computer Society, Washington, DC, USA, pp 886–893. https://doi.org/10.1109/CVPR.2005.177

  3. Dehak N, Kenny PJ, Dehak R, Dumouchel P, Ouellet P (2011) Front-end factor analysis for speaker verification. Trans Audio Speech Lang Proc 19(4):788–798. https://doi.org/10.1109/TASL.2010.2064307

    Article  Google Scholar 

  4. Fawcett T (2006) An introduction to ROC analysis. Pattern Recogn Lett 27(8):861–874 (ROC Analysis in Pattern Recognition) http://www.sciencedirect.com/science/article/pii/S016786550500303X

    Article  MathSciNet  Google Scholar 

  5. Ferreira J, Santos H, Patrao B (2011) Intrusion detection through keystroke dynamics. In: Communications and multimedia security. Springer, Berlin, Heidelberg, pp 81–90

    Google Scholar 

  6. Frantzeskou G, Stamatatos E, Gritzalis S, Chaski C, Stephen Howald B (2007) Identifying authorship by byte-level n-grams: the source code author profile (SCAP) method. In: IJDE, vol 6

    Google Scholar 

  7. Ivanova M, Bhattacharjee S, Marcel S, Rozeva A, Durcheva M (2018) Enhancing trust in eAssessment—the TeSLA system solution. In: Technology enhanced assessment conference

    Google Scholar 

  8. Kambourakis G, Damopoulos D (2013) A competent post-authentication and non-repudiation biometric-based scheme for m-learning. In: Proceedings of the 10th IASTED international conference on web-based education (WBE 2013). ACTA Press, Innsbruck, Austria, pp 821–827

    Google Scholar 

  9. Kazemi V, Sullivan J (2014) One millisecond face alignment with an ensemble of regression trees. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1867–1874

    Google Scholar 

  10. Khoury E, Kinnunen T, Sizov A, Wu Z, Marcel S (2014) Introducing I-vectors for joint anti-spoofing and speaker verification. In: The 15th annual conference of the International Speech Communication Association

    Google Scholar 

  11. Kutafina E, Laukamp D, Bettermann R, Schroeder U, Jonas SM (2012) Wearable sensors for elearning of manual tasks: using forearm EMG in hand hygiene training. Sensors (Basel) 16(8):1221

    Article  Google Scholar 

  12. López-Monroy AP, Montes-y Gómez M, Escalante HJ, Villaseñor-Pineda L, Stamatatos E (2015) Discriminative subprofile-specific representations for author profiling in social media. Knowl-Based Syst 89:134–147

    Article  Google Scholar 

  13. Pastor López-Monroy A, Montes-y Gómez M, Escalante HJ, Villaseñor-Pineda L, Stamatatos E (2015) Discriminative subprofile-specific representations for author profiling in social media. Knowl-Based Syst 89:134–147

    Article  Google Scholar 

  14. Monaco J, Bakelman N, Cha S-H, Tappert C (2013) Recent advances in the development of a long-text-input keystroke biometric authentication system for arbitrary text input. In: Intelligence and security informatics conference (EISIC), 2013 European, pp 60–66

    Google Scholar 

  15. Peralta D, Galar M, Triguero I, Paternain D, García S, Barrenechea E, Benítez JM, Bustince H, Herrera F (2015) A survey on fingerprint minutiae-based local matching for verification and identification: taxonomy and experimental evaluation. Inf Sci 315:67–87

    Article  MathSciNet  Google Scholar 

  16. Pinto P, Patrão B, Santos H (2014) Free typed text using keystroke dynamics for continuous authentication. In: De Decker B, Zúquete A (eds) Communications and multimedia security. Springer, Berlin, Heidelberg, pp 33–45

    Chapter  Google Scholar 

  17. Pirbhulal S, Zhang H, Mukhopadhyay SC, Li C, Wang Y, Li G, Wu W, Zhang Y-T (2015) An efficient biometric-based algorithm using heart rate variability for securing body sensor networks. Sensors (Basel) 15(7):15067–15089

    Article  Google Scholar 

  18. Prasad NV, Umesh S (2013) Improved cepstral mean and variance normalization using Bayesian framework. In: 2013 IEEE workshop on automatic speech recognition and understanding, pp 156–161

    Google Scholar 

  19. Rabiner LR, Schafer RW (2007) Introduction to digital speech processing. Found Trends Signal Process 1(1):1–194. https://doi.org/10.1561/2000000001

    Article  MATH  Google Scholar 

  20. Rabuzin K, Baca M, Sajko M (2006) E-learning: biometrics as a security factor. In: 2006 international multi-conference on computing in the global information technology - (ICCGI’06), pp 64–64

    Google Scholar 

  21. Sapijaszko GI, Mikhael WB (2012) An overview of recent window based feature extraction algorithms for speaker recognition. In: 2012 IEEE 55th international midwest symposium on circuits and systems (MWSCAS). IEEE, New York, pp 880–883

    Google Scholar 

  22. Schroff F, Kalenichenko D, Philbin J (2015) Facenet: a unified embedding for face recognition and clustering. In: 2015 IEEE conference on computer vision and pattern recognition (CVPR), pp 815–823

    Google Scholar 

  23. Sumithra M, Devika A (2012) A study on feature extraction techniques for text independent speaker identification. In: 2012 international conference on computer communication and informatics (ICCCI), pp 1–5

    Google Scholar 

  24. Tata S, Patel JM (2007) Estimating the selectivity of TF-IDF based cosine similarity predicates. SIGMOD Rec 36(2):7–12. https://doi.org/10.1145/1328854.1328855

    Article  Google Scholar 

  25. Wagner A, Wright J, Ganesh A, Zhou Z, Mobahi H, Ma Y (2012) Toward a practical face recognition system: robust alignment and illumination by sparse representation. IEEE Trans Pattern Anal Mach Intell 34(2):372–386

    Article  Google Scholar 

  26. Wechsler H, Phillips JP, Bruce V, Soulie FF, Huang TS (2012) Face recognition: from theory to applications, vol 163. Springer Science & Business Media, Berlin

    Google Scholar 

  27. Lee Y, Chen J, Tseng CW, Lai S-H (2016) Accurate and robust face recognition from RGB-D images with a deep learning approach. In: Richard ERH, Wilson C, Smith WAP (eds) Proceedings of the British machine vision conference (BMVC), pp 123.1–123.14

    Google Scholar 

  28. Zhong Y, Deng Y (2015) A survey on keystroke dynamics biometrics: approaches, advances, and evaluations. Recent advances in user authentication using keystroke dynamics biometrics. Science Gate Publishing

    Google Scholar 

Download references

Acknowledgements

This research was supported by RTI2018-095232-B-C22 grant from the Spanish Ministry of Science, Innovation and Universities (FEDER funds), and NVIDIA Hardware grant program.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xavier Baró .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Baró, X., Muñoz Bernaus, R., Baneres, D., Guerrero-Roldán, A.E. (2020). Biometric Tools for Learner Identity in e-Assessment. In: Baneres, D., Rodríguez, M., Guerrero-Roldán, A. (eds) Engineering Data-Driven Adaptive Trust-based e-Assessment Systems. Lecture Notes on Data Engineering and Communications Technologies, vol 34. Springer, Cham. https://doi.org/10.1007/978-3-030-29326-0_3

Download citation

Publish with us

Policies and ethics