StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Biometrics Authentication in E-exams - Assignment Example

Cite this document
Summary
The paper “Biometrics Authentication in E-exams” analyzes E-learning as a great opportunity for the modern man. It needs to be coupled with efficient and reliable security mechanisms. Authentication of e-exam takers is of prime importance so that exams are given by fair means…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.2% of users find it useful
Biometrics Authentication in E-exams
Read Text Preview

Extract of sample "Biometrics Authentication in E-exams"

Biometrics Authentication in E-exams 1. Abstract E-learning is a great opportunity for the modern man. It needs to be coupled with efficient and reliable security mechanisms so that this medium can be established as a dependable one. Authentication of e-exam takers is of prime importance so that exams are given by fair means. A new approach shall be proposed to ensure that no unauthorized individuals are allowed to give the exams. 2. Overview With the advent of computer technology; our lives have changed and given them a new dimension. World Wide Web is also one of the inventions of the computer technology that has changed the mode of communication and information for humans. A new concept that has emerged from the World Wide Web is of education on the web: E-learning [2], [44]. As appealing as it sounds; it poses some threats, especially when exams are held online. There was a study held by King et al in 2009 [1]; the study concluded that 73.6% of the students that were selected for the sample had the point of view that it is easier to cheat in an online environment rather than in a conventional one. One of the main challenges faced for the security of e-exams and e-learning environment is to authenticate the students so that no unauthorized individuals are allowed to upload submissions or access information, respectively [3]. Some other problems faced during e-exams are double submissions from the same students [4], e-exams are not held in supervised locations because of which the individual access unauthorized areas etc [5]. 3. System Background The security system of the e-learning environment is very important so that it proves to be a reliable medium of communication [6], [34], [35]. Various systems and solutions have been proposed for the security of the e-learning environments. One approach was proposed by Apampa [4]; in which the login ID of the student was associated with an available IP address for the duration of the e-exam. This disables the student to log in after the completion of the test and modify it or even submit it later. This ensures that the submission is not done from any other computer as well. It is very important to ensure that the test is taken at the supervised location [5]. E-learning systems connect many computers to provide them access to the internet and intranet. If correct security measures are not in place then the web-clients might be able to access other services than the e-learning server. Walton [21] explained that WebCT provides a mechanism to solve this issue. A subnet mask is supplied to allow users only from a specific subnet to access the online test server. 4. Risk Analysis of Biometric System in E-exams in E-learning There are several problems and risks associated with the usage of biometrics in the authentication process. Some of them are: 4.1 Fake Input One of the most common attacks on a fingerprint authentication system is of a fake input [9], [36], because this is the easiest mode of trying to gain access. It is a common practice for intruders to try to gain authentication by means of artificial fingers. There has been much research on the subject of biometric systems accepting artificial biometric inputs (dummy fingers) so that these systems can be made more reliable. Putte and Keuning are among such researchers [12]. Widely used devices to capture fingerprints are optical and capacitive sensors; these sensors are used to detect differences present between the ridges and valleys of the fingerprints [13], [14]. 4.2 Low quality input Fingerprint matching techniques can be placed into two categories: minutae-based and correlation based. Minutiae-based techniques first find minutiae points and then map their relative placement on the finger. It is difficult to extract the minutiae points accurately when the fingerprint is of low quality. There are some drawbacks with the latter approach as well. Correlation based techniques is based on the precision of a location of the registration point, which is only possible through a clear and good quality input [15]. Therefore the quality of the fingerprint plays a great role in the authentication process [41]. 4.3 Modification to the Biometric Database The first step in any biometric recognition system is to store the template of an individual’s feature so that it can later be used for authentication purposes [43]. The place where these templates are stored is known as a database in most systems and the process in which the student will register their fingerprints for the first time is called ‘enrollment’ [16], [17], [18], [19], [20]. This database is prone to attacks as some intruders might access this secure database and make unauthorized changes or modifications in it [45]. By the help of this modification; they might be able to gain access with a fake input [8]. Therefore the database has to be secured with an efficient security system as well. 4.4 Modifications to the Feature Extractor The feature extractor may be attacked by intruders and modified such that the legitimate fingerprint may be rejected and the unauthorized ones to be accepted. 5. Solutions A new approach for authenticating individuals on the basis of their biometrics, has gained name over the years [33], [39]. William et al [8] explains that biometrics are unique physical features of an individual such as fingerprints, iris, face, palm prints etc. Fingerprint recognition systems are very common and popular due to their accuracy, ease and proven track record [9], [38], [42]. However, like any other biometric system, fingerprint also poses some threats and risks to the process of authentication [10], [11]. 5.1 Solution for low Quality Input Puiri et al [22] proposed a method in which a preprocessing function is performed on the data to reduce the blur on the image. Then, a pre-filtering operation is also performed so that the background can be reduced to a minimum. Along with these operations, segmentation of the fingerprint is also done by identifying the region of interest (ROI). Fig.1: Fingerprint scan after preprocessing operation [22] In this approach, the authors proposed that a webcam or a low cost biometric sensor can also be used for the input, but the finger needs to be positioned only a few centimeters away from the objective lens and the focal length of the lens needs to be tuned accordingly [22]. Prabhakar et al [15] also proposed a solution to improve the quality of the image. 5.2 Solution to overcome fake input Derakshani et al. [24] proposed a method to handle the fake input for fingerprint recognition system- “live-ness detection”. This term is also used by [23], [25], [26], [27], [37]. Perspiration from the fingers is considered as a sign of life which is obviously not present in fake (dummy) fingers. Firstly, a 5 seconds video of the fingerprints was taken. This served as input to a commercially available capacitive sensor, which searched for different measures to judge if the input belongs to a human or a dummy. He proposed two methods to measure the input; in the static method, the periodicity of sweat pores along the ridges is used for liveness detection. In the dynamic method, sweat diffusion pattern over time found along the ridges is measured. 5.3 Solution to overcome modification in the database A method was proposed by Ratha et al [23] and Connell et al [28] to protect templates from fraudulent usage; it involved using a distorted version of the biometric signal or the feature vector; if a specific representation of template is compromised, the distortion transform can be replaced with another one from a transform database. Data hiding and watermarking techniques have also been proposed as means of increasing the security of fingerprint images, by detecting modifications [29], by hiding one biometric into another [30]. 6. Application of Fingerprint Recognition Systems A traditional method of securing systems has been through username-password mechanism [7]. Since the widespread of powerful machines it has become obligatory to have long passwords which never seem to be practical. Therefore biometric authentication systems are widely used. They are known to be deployed at various public places and used for validation for individuals for e.g. authorization system, transaction system or ATMs, time and attendance systems in organization, point of sale identification and physical access control with authentication through fingerprint [31]. 7. Proposed New Security System After a comprehensive study of the solutions that have been proposed so far, a new approach has been devised- fingerprint biometrics solution for e-exam taker’s authentication by using intelligent security agent. The intelligent agent will be using the following devices: a. Mouse Applications There are several fingerprint scanning mouse available which will take the exam taker’s fingerprints during the examination; for e.g. Digent offers a wide range of mouse including IZZIX FM 1000, IZZIX FD1000 [31]. Fig.2: Fingerprint scan enabled mouse [31] b. Keyboards There are some keyboards also available in the market which can scan the fingerprint of the user while he is working, without any extra effort of getting his fingerprint scanned [32]. Fig.3: Fingerprint scan enabled keyboard [32] 7.1 Proposed Method The first process in any biometric recognition system is “enrollment”. All the students who are supposed to appear for the e-exam will have to ‘enroll’ their fingerprints so that they are stored in e-learning server database and biometric server database. All these fingerprint scans will be saved in an encrypted form to avoid any modifications. Fig.4 When the client initiates the e-exam, the intelligent agent assigns the student ID with an IP address so that the student cannot log in from any other PC [4]. Intelligent agent will then start extracting the fingerprint scans from the hardware devices mentioned above at every second and following steps will be performed: -Preprocessing operations shall be performed on these scans to ensure that there is minimal blur and noise present in the images. Test A- Additional live-ness detection tests will be performed by the intelligent agent to ensure that no dummy fingers are being used to pose as another student’s identity. Test B- After these initial operations, these scans will then be matched with the ‘enrolled’ scans which have been saved in the two server databases. -If either Test A or B, do not pass at any point of time, the exam will be immediately stopped for that specific student and notified to the authorities for further action. This process will continue for the duration of the exam. Fig.5 7.2 Advantages of the Proposed Solution 1. Since, the fingerprints will be extracted while the user in working on the keyboard or the mouse, therefore the pace of his work will not be affected. 2. The interval at which the fingerprints will be scanned is 1 sec which ensures that no other individual can give the exam on his behalf. 3. The scanned fingerprints will be saved in the two databases in encrypted form to mitigate attacks from intruders. 7.3 Disadvantages 1. The interval at which the fingerprints are being scanned can prove to be very small and can cause storage problems for such a huge amount of data. 2. This approach requires an initial investment of providing their students with the fingerprint scanning enabled devices. 7.4 Steps to handle these barriers As soon as the e-exam is finished, the fingerprint scans should be completely analyzed for the last time and then deleted so that the space can be available for the next exam. Another method to handle this can be to increase the time interval to at least 3 seconds so that the amount of data decreases to a reasonable degree. 8. Future Work This proposed solution shall be implemented and a study shall be conducted to analyze the results. It shall be analyzed if the work of the students is affected in any way or the pace of the work is affected. It shall also be judged if the environment has become more secure after implementing this solution. Results of such a study can provide initial investigation in an attempt to address the outgrowing phenomena of unethical conduct in e-exams. 9. Conclusion A solution has been proposed to ensure a secure e-learning environment in which e-exams can be held in an ethical manner. It is very important to properly authenticate the e-exam takers so that no unauthorized individual are allowed to access the e-learning environment. References [1] C.G. King, R.W. Guyette, C. Piotrowski, “Online exams and cheating: An empirical analysis of business students’ views”, The Journal of Educators Online, 6(1), 2009, http://www.thejeo.com/Archives/Volume6Number1/Kingetalpaper.pdf. [2] M. Alavi, D. Leidner, “Research commentary: Technology mediated learning-a call for greater depth and breadth of research”, Information Systems Research, 12(1), 1-10, 2001 [3] W. Huang, D. C. Yen, Z. X. Lin, J. H. Huang, “How to compete in a global education market effectively: A conceptual framework for designing a next generation eEducation system”, Journal of Global Information Management, 12(2), 84-107, 2004 [4] K. M. Apampa, G. B. Wills, D. Argles, E. Marais, “Electronic Integrity Issues in E-assessment Security”, 2007 [5] E. Marais, D. Argles, “Security issues specific to E-assessments”, 8th Annual Conference on WWW Applications. Conference proceedings, Bloemfontein, South Africa, 2006 [6] IS Blackboard team, (2003), “Online Assessment”, Aberystwyth Learning & Teaching Online, http://alto.aber.as.uk/caa/issues.asp [7] D. Argles, A. Pease, R. J. Walters, “An Improved Approach to Secure Authentication and Signing”, IEEE, 2007 [8] J. M. Williams, “New security paradigms”, Proceedings of the 2002 Workshop on New Security Paradigms, Virginia Beach, Virginia, 97-107, 2002 [9] U. Uludag, A. K. Jain, “Attacks on Biometric Systems: A Case Study in Fingerprints”, Proceedings of SPIE-EI, 2004 [10] N.K. Ratha, J.H. Connell, R.M. Bolle, “An analysis of minutiae matching strength”, Proc. AVBPA 2001, Third International Conference on Audio- and Video-Based Biometric Person Authentication, pp. 223-228, 2001. [11] D. Maltoni, D. Maio, A.K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition, Springer, ISBN 0-387-95431-7, 2003. [12] T. Putte and J. Keuning, “Biometrical fingerprint recognition: don’t get your fingers burned”, Proc. IFIP TC8/WG8.8, Fourth Working Conf. Smart Card Research and Adv. App., pp. 289-303, 2000. [13] S. Jung, T. R, Scheiter, K. F. Gorser, “A Low-Power and High-Performance CMOS Fingerprint Sensing and Encoding Architecture”, IEEE Journal of Solid-State Circuit, Vol. 34, No. 7 (1999). [14] S. Shigematsu, H. Morimura, Y. Tanabe, T. Adachi, K. Machida, “A Single-Chip Fingerprint Sensor and Identifier”, IEEE Journal of Solid-State Circuit, Vol. 34, No. 12, 1999 [15] S. Prabhakar, A. Jain, Fingerprint Identification, http://biometrics.cse.msu.edu/fingerprint.html [16] National science and technology council (NSTC). Fingerprint recognition [17] I. Maghiros, Y. Punie, S. Delaitre, “An Introduction to Biometrics - Fingerprint Recognition”, 2005, http://cybersecurity.jrc.ec.europa.eu/pages/ProjectlibestudyBiometrics.htm [18] N. Yoshiura, Y. Onozato, H. Kimura, "Application of one way function to biometric authentication", Transactions of the Institute of Electical Engineers of Japan, vol. 124-C, 2004. [19] A. K. Jain, "Biometric Recognition: How Do I Know Who You Are?", Department of Computer Science and Engineering, Michigan State University, 2004. [20] Y. Sutcu, H. T. Sencar, N. Memon, "Authentication protocols: A secure biometric authentication scheme based on robust hashing," 7th Workshop on Multimedia and Security at ACM Multimedia, New York, USA, 2005. [21] S. Walton, (2005), ‘KS3 ICT Onscreen Test Project’, Qualifications & Curriculum Authority, BETT 2005, http://www.qca.org.uk/downloads/6967_ks3_ict_bett_2005.pdf. [22] V. Piuri, F. Scotti, ”Fingerprint Biometrics via Low-cost Sensors and Webcams”, IEEE, 2008. [23] N.K. Ratha, J.H. Connell, and R.M. Bolle, “Enhancing security and privacy in biometrics-based authentication systems”, IBM Systems Journal, vol. 40, no. 3, pp. 614-634, 2001. [24] R. Derakhshani, S.A.C. Schuckers, L.A. Hornak, and L.O. Gorman, “Determination of vitality from a non-invasive biomedical measurement for use in fingerprint scanners”, Pattern Recognition, vol. 36, pp. 383-396, 2003. [25] S. Hoshino, H. Matsumoto, T. Matsumoto, “Mapping a Fingerprint linage to an Artificial Finger”, Technical Report of IEICE, ISEC2001-60, pp. 53-59, 2001. [26] J. Mainguet, P. Pegulu, J. B. Harris, “Fingerprint recognition based on silicon chips”, Future Generation Computer Systems, Vol. 16, No.4 pp.403-15, 1999 [27] L. O'Gorman, “Fingerprint Verification, in Biometrics: Personal Identification in Networked Society”, The Kluwer Academic Publishers, International Series in Engineering and Computer Science, Vol. 479, Chapter 2, pp. 43-64, 1999 [28] J. Connell, N. Ratha, “Cancelable Biometrics”, Biometric Consortium 2000 Conference, Sept. 13-14, 2000. [29]. S. Pankanti, M. M. Yeung, “Verification watermarks on fingerprint recognition and retrieval”, Proc. of SPIE EI, vol. 3657, pp. 66-78, 1999. [30]. A. K. Jain, U. Uludag, “Hiding biometric data”, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 25, no. 11, pp. 1494-1498, 2003. [31] Bayometric.Inc, 2009, http://www.bayometric.com/products/griaule-fingerprint-sdk.htm [32] Wayne Parslow, “Identity and access management in the NHS — improving efficiency and security around”, BJHC & JM, 2008, http://www.bjhcim.co.uk/features/2008/809001.htm [33] N. Green, G. W. Romney, “Establishing Public Confidence in the Security of Fingerprint Biometrics”, ITHET 6th Annual International Conference, IEEE, 2005 [34] R. Raitman, L. Ngo, N. Augar, W. Zhou, “Security in the Online E-learning Environment”, Proceedings of the Fifth IEEE International Conference on Advanced Learning Technologies (ICALT’05),2005 [35] T. M. Gualberto, S. D. Zorzo, “Incorporating Flexible, Configurable and Scalable Security to the Education Collaborative Environments”, 39th ASEE/IEEE Frontiers in Education Conference, San Antonio, TX, 2009 [36] T. Matsumoto, H. Matsumoto, K. Yamada, S. Hoshino, “Impact of Artificial "Gummy" Fingers on Fingerprint Systems”, Optical Security and Counterfeit Deterrence Techniques IV, Proceedings of SPIE Vol. #4677, 2002 http://www.spie.org/Conferences/Programs/02/pw/confs/4677.html [37] D. Pishva, ”Spectroscopic Approach for Liveness Detection in Biometrics Authentication”,IEEE, 2007 [38] G. Aggarwaltt, N. K. Rathat, T. Y. Jeat, R. M. Bollet, “Gradient based Textural Characterization of Fingerprints”, IEEE, 2008 [40] A. K. Jain, A. Ross, S. Prabhakar, “An Introduction to Biometric Recognition”, IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image- and Video-Based Biometrics, Vol. 14, No. 1, 2004. [41] R. K.Rowe, K. A. Nixon, S. P. Corcoran, “Multi spectral Fingerprint Biometrics”, Proceedings of the 2005 IEEE Workshop on Information Assurance and Security United States Military Academy, West Point, NY, 2005 [42] I. Ali, U. Ali, M. I. Shahzad, A. W. Malik, “Face and Fingerprint biometrics Integration Model for Person Identification Using Gabor Filter”, IEEE, 2006 [43] S. Shafaei, T. Inanc, L. G. Hassebrook, “A New Approach to Unwrap a 3-D Fingerprint to a 2-D Rolled Equivalent Fingerprint”, IEEE, 2009 [44] Y. Takahashi, T. Abiko, E. Negishi, “An Ontology-based System for Network Security”, IEEE, 2006 [45] S. Mitra, M. Savvides, A. Brockwell, “Statistical Performance Evaluation of Biometric Authentication Systems Using Random Effects Models”, IEEE, 2007 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Biometrics Authentication in E-exams Assignment, n.d.)
Biometrics Authentication in E-exams Assignment. Retrieved from https://studentshare.org/education/1731470-technical-report-of-using-biometrics-authentication-via-fingerprint-recognition-in-e-exams-in-e-learning-environments
(Biometrics Authentication in E-Exams Assignment)
Biometrics Authentication in E-Exams Assignment. https://studentshare.org/education/1731470-technical-report-of-using-biometrics-authentication-via-fingerprint-recognition-in-e-exams-in-e-learning-environments.
“Biometrics Authentication in E-Exams Assignment”, n.d. https://studentshare.org/education/1731470-technical-report-of-using-biometrics-authentication-via-fingerprint-recognition-in-e-exams-in-e-learning-environments.
  • Cited: 0 times

CHECK THESE SAMPLES OF Biometrics Authentication in E-exams

Biometric identification

Biometric identification refers to identification procedures by means of biological characteristics like facial patterns, speech or finger prints.... Today biometric identification has been implemented in to some extent in Brazil and Canada.... In the United States too, it has received mandate with the government trying to implement it. … In the United Kingdom, the House of Commons passed a bill that biometric identification cards are to be made compulsory for every citizen by the year 2010....
1 Pages (250 words) Essay

Enterprise Info Security

How can the ability to distinguish between programs and data help to construct a defense against buffer overrun/overflow attacks?... hellip; They are thus the basis of many software vulnerabilities and can be maliciously exploited Understanding the difference between data and Buffer overflow/overrun is a form of interference where a program overruns the buffer's boundary and overwrites adjacent memory, while writing data to a buffer....
8 Pages (2000 words) Essay

Community and Identity in Contemporary Physical and Virtual Spaces

Oracle included a discussion regarding an access management system in one of their white papers and stated that it was based on the authentication and verification of physical identities; the examples of physical identities that are implemented in this system are biometrics, RFID, smart cards [85].... Another example can be of biometrics that is uniquely possessed by every individual in the world.... The presentation of biometrics at a physical location and establishment of an organization will be a physical identity whereas the acquisition of the same biometric from a location of the user's choice through the internet will be considered as a virtual identity....
5 Pages (1250 words) Literature review

1.What is a false reject rate What is a false accept rate How are they related to the crossover error rate

It is the degree of probability that the biometric system will incorrectly reject the False Reject Rate False Reject Rate Biometrics, also referred to as biometric authentication, is the study through which human identity is recognized by its traits and characteristics.... Computer science biometrics, to be precise, identifies individuals and determines the level of access controls (Jain, 1999).... Computer science biometrics, to be precise, identifies individuals and determines the level of access controls (Jain, 1999)....
1 Pages (250 words) Essay

Saintis Organization and the Success of the Company

 The paper "Saints Organization and the Success of the Company" give detailed information about The SANTIS company that makes the ultimate difference for the success of an organization.... nbsp;SAINTS organization has a strong leadership background which has enhanced the success of the company....
8 Pages (2000 words) Assignment

Biometrics: a tool for information security

The researchers also say that due to rapid advancements in the areas of communication, networking, mobility, and information technology, the need to increase the use of reliable and trustworthy user authentication techniques has become essential (Jain, Ross, & Pankanti, 2006, p.... Therefore, they have proposed the use of biometrics for civilian, commercial, and forensic applications as an effective user authentication measure.... rticle: ‘biometrics: a tool for information security'In this article, the researchers have proposed the use of biometric technology as an information security measure....
2 Pages (500 words) Essay

Privacy vs Protection of Assets, Issues of Biometric Technologies in Organizations

This essay "Privacy vs Protection of Assets, Issues of Biometric Technologies in Organizations" shows an outline of biometrics when all is said in done and portrays a percentage of the issues identified with biometrics vulnerabilities and security and the assurance of one's protection.... hellip; It is clear that one cannot overlook the events of September eleventh have impelled an expanded action of private and open enthusiasm toward security and particularly, biometrics....
5 Pages (1250 words) Essay

Cash Register System Design

Ideally, the system should only prevent access if improper authentication codes are used but should not prompt the rebooting.... irst, to prevent the users from having issues with their password, the authentication should be based on a biometric system (Jain, Flynn & Ross,2008)....
7 Pages (1750 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us