Using Biometric techniques to secure online studentassessment: comparative study
Faculty of Information and Communication TechnologyIIUMKuala Lumpur, Malaysia email@example.com
Muna A. Ali, Rasheed Nassr
Faculty of Information and Communication TechnologyIIUMKuala Lumpur, Malaysia
Currently E-learning systems do not provide a tool toauthenticate student continuously during online assessment, thisraises the probability of cheating. Many proposed solutions usedifferent biometric techniques to identify and authenticatestudent continuously, they use different techniques with differentmeasures. This paper proposes certain criteria that should beavailable in any proposed biometric technique to be fitted with e-learning architecture and continues authentication of studentduring online assessment. This paper investigates some proposedsolutions to see compatibility of those solutions with the proposedcriteria.
Keywords-component; Biometric, E-learning, onlineassessment
Many educational organizations depend on E-learningsystem to conduct education; this dependency was focusing ondelivering material online and facilitating interaction amongstudents and instructors but now increases and reaches to thelevel of issuing trustful certificates as a result of that the needfor confidential and trustful security mechanism is highlyrequired. Most of current e-learning systems pay less attentionfor continues online assessment security and focus on securinginformation assets [2, 1, and 10]. E-learning system might failto guarantee the real identity of the remote user and whether does the intended student who is doing the assessment or somebody on behalf during assessment session [5, 1, 6, and12]. Current and future requirements of E-learning system mayrequire more security that use physical or/and behavioralfeatures of the learners, further details about the need for biometric security techniques in E-learning can be found in.II.
Even though Ref  deeply analyzed the challenges andopportunities of E-learning and visualized the shape of future E-learning, security challenges were not mentionedor analyzed; however Ref  reported the importance of security for E-learning; the focus was how to protect datafrom unauthorized access. As a matter of fact, E-learningsystem just resembles any other systems, needs to protectits data but the difference is the need to identify and verifystudent’s identity continuously during assessment session.Apart, Biometric devices’ prices are getting decrease andvarious biometric devices currently can be foundembedded in most of laptops; this trend may encourage E-learning system designers to consider biometricauthentication in future design [8, and 12]. Besides that,the lack of secured and granted students’ identificationsystem in e-learning online assessment could limit thesuccess and extendibility of E-learning system .Usually biometric used to control access to restricted physical environment and used rarely to authenticateremote users. Traditional authentication techniques suchas password do not prevent student’s larceny and aretransferable from user to another [8, Chang 2009; 5], because of failing to grant student’s identity by using password, it has been suggested to restrict accessingonline assessment from certain areas . However thatcannot be practical solution particularly when e-learningsystem’s boundaries exceed campus area as well as itrequires students to be locked in certain area for exam period which may be difficult to fulfill.Biometric techniques may be evaluated according toacceptance, features, durability, universality, and permanence [10, 12, and 13]. Many literatures havediscussed the flexibility, acceptance, performance andstrong and weak points of most of the biometrictechniques [10, 12, and 13]. However; it is not necessaryto be fully considered in e-learning because other featuresmay control choosing the suitable biometric for E-learning such as ability of identification process to break down into client and server procedures, requiredequipments, cost-effective and does it affect E-learning performance. In case of required equipment, Chang(2009) proposal-personalized rhythm- to authenticateusers does not require special biometric devices to verifystudent’s identity but detects student’s identity by the wayshe/he behaves with input devices- mouse, keyboard, etc.and neural network is used to decrease a chances of falseacceptance rate. Though Face recognition is not accurateas much as fingerprint , it seems the most eligible because it can prove the physical existence of the remoteuser in front of camera as well as availability of camera inmost of the current manufactured laptops strengthens itseligibility. Reference  described the process of Facerecognition for remote user by the following steps: a-extract the image portion that contains the face, b-consider other factors such as distance to make theextracted part of image comparable, c- search for
(IJCSIS) International Journal of Computer Science and Information Security,Vol. 9, No. 11, November 201141http://sites.google.com/site/ijcsis/ISSN 1947-5500