You are on page 1of 4

Survey of Biometric Authentication for E-assessment

Abstract— Problems of impersonation and other malpractices biometrics for e-assessment, Section 6 Challenges and open
of various degrees have continued to mar the electronic- issues.
assessment (e-assessment) of students at various levels. The use of
traditional methods of password and token passing for identity II. BIOMETRICS
management and control has failed to provide acceptable solution
to these problems, due to their susceptibility to theft and various
Historically, human identification of persons has been done
forms of violations. The failure of these and other methods in through various means, including visual identification, gait
identity management has propelled the emergence of different recognition, fingerprint matching, presentation of access cards,
biometric-based systems as solutions. The biometric systems use usernames and passwords, etc. Biometrics is the ability to
naturally endowed traits which include fingerprint, face, iris, identify and authenticate an individual using one or more of
voice, etc. for more reliable human identification and their behavioral or physical or chemical characteristics [3]. A
authentication. In this paper, various biometric modes are biometric recognition system relies on who you are or what you
discussed along with their application within the domain of e- do [4]. Physical biometric characteristics include face,
assessment.
fingerprint, retina, iris, etc., characteristics. Behavioral
Keywords—E-assessment; Biometrics; Multimodal Biometrics biometric characteristics includes gait recognition, keystroke
dynamics, mouse dynamics, etc. Chemical biometrics
I. INTRODUCTION characteristics involves the use of human DNA to identify a
Traditionally, the assessment process has been considered a person. A biometric system is a pattern-recognition system. The
high stake process and the inclusion of one or more proctors biometric system aims to recognize a person based on a feature
throughout the assessment process has been one of the means vector deduced from physiological or behavioral characteristic
of ensuring that the assessment is conducted in a credible that the person possesses.
manner. Proctors, also known as invigilators, are present to
address security concerns during an assessment. The C.I.A Biometrics recognition entails enrollment, authentication or
(Confidentiality, Integrity, and Availability) security goals [1] identification tasks. Enrollment associates an identity with a
which are meant to prevent the compromise of assets in biometric characteristic. In verification, an enrolled individual
computer network systems are applicable to the summative e- can proffer an identity and the system will be responsible for
assessment. Apart from the hardware and software used for the verifying the authenticity of the proffered identity based on his/
purpose of an e-assessment, the student undergoing the e- her biometric feature. An identification system identifies an
assessment too is an asset and certain threats are posed by this enrolled individual based on their biometric characteristics
asset. These threats include, an illegal or unauthorized without the individual having to claim an identity. Biometric
candidate taking an e-assessment, the dissimulation of identity recognition has become a principal method of human
detail, and the abuse, or misuse of authenticity detail [2]. identification and verification.
Due to the aforementioned threats posed by a student, the C.I.A.
goals though sufficient to protect hardware and data used for Any human traits can serve as a biometric characteristic
the e-assessment, will not adequately address the threats posed provided it satisfies the measurement requirements of:
by the student; and thus three other goals for the summative e- universality - each person should have the characteristic,
assessment process can be deduced [2]: distinctiveness - any two persons should be different in terms
 Presence – Physical and online presence, which of the characteristic, permanence - the characteristic should not
change drastically over a short period of time, collectability -
defines the state of an entity being in a particular
the characteristic should be quantitatively measurable, and for
environment.
practical purposes, in addition, performance - meet accuracy,
 Identity – The ability to distinguish one entity from
speed, and resource requirements, acceptability - accepted by
another
the intended population, and circumvention – not easily
 Authentication – Preventing the misuse of identity
hoodwinked [4, 5]. These seven measurement parameters are
detail.
used to determine the usefulness of a biometric. For the e-
In an effort to guard against the aforementioned threats and
assessment domain, the most important five of these are
achieve the goals of Presence, Identity, and Authentication,
universality, distinctiveness, permanence, collectability, and
several techniques have been proposed with the use of
circumvention.
biometrics for the authentication of learners in an e-assessment.
Tables 1 and 2 show some physiological biometrics and
The main purpose of this paper is to discuss various biometric
behavioral biometrics respectively and how they measured
modes and their application for e-assessment. This paper is
against these five parameters, on the scale of LOW (L) –
arranged as follows; Section 2 a general overview of
MEDIUM (M) – HIGH (H).
biometrics, Section 3 biometrics performance measures,
Section 4 multimodal biometrics, Section 5 applications of Table 1 Physiological biometric modes rating based on five characteristics [5]
database, correlation is used. The correlation r can be
determined by equation 1 [8]:

Distinctiveness

Circumvention
Collectability
∑𝑛𝑖=1(𝑘𝑖 ∗ 𝑡𝑖 )

Universality

Permanence
𝑟= (1)
√(∑𝑛𝑖=1(𝑘𝑡2 ) ∗ ∑𝑛𝑖=1(𝑡𝑡2 ))

Biometric Where
𝑘 = 𝑣𝑒𝑐𝑡𝑜𝑟 𝑜𝑓 𝑙𝑒𝑛𝑔𝑡ℎ 𝑛 𝑠𝑡𝑜𝑟𝑖𝑛𝑔 𝑡ℎ𝑒 𝑓𝑙𝑖𝑔ℎ𝑡 𝑡𝑖𝑚𝑒 𝑜𝑓 𝑡ℎ𝑒
Fingerprint H H M M H 𝑠𝑡𝑜𝑟𝑒𝑑 𝑡𝑒𝑚𝑝𝑙𝑎𝑡𝑒
Palmprint H H M M M 𝑡 = 𝑣𝑒𝑐𝑡𝑜𝑟 𝑜𝑓 𝑙𝑒𝑛𝑔𝑡ℎ 𝑛 𝑠𝑡𝑜𝑟𝑖𝑛𝑔 𝑡ℎ𝑒 𝑓𝑙𝑖𝑔ℎ𝑡 𝑡𝑖𝑚𝑒 𝑏𝑒𝑡𝑤𝑒𝑒𝑛
𝑘𝑒𝑦𝑠𝑡𝑟𝑜𝑘𝑒𝑠 𝑜𝑓 𝑎 𝑏𝑖𝑜𝑚𝑒𝑡𝑟𝑖𝑐 𝑠𝑎𝑚𝑝𝑙𝑒
Retina H H H L L
Iris H H H M L B. Mouse dynamics
Face H M M H L Mouse dynamics, like keystroke dynamics, is a behavioral
biometric and is also captured non-intrusively as a learner
interact with the computer (uses the mouse). Any mouse action
Table 2 Behavioural biometric modes rating based on five characteristics [5]
can be classified into one of four categories [9]:
 Mouse-Move – Any general motion of the mouse
Distinctiveness

Circumvention

 Drag-and-Drop – A mouse down action followed


Collectability
Universality

Permanence

by a mouse up action
 Point-and-Click – A mouse motion followed by a
single or double click
Biometric
 Silence – No motion
Signature H M L H M
Mouse actions are measured within 45⁰ angles of a circle.
Gait L M L H L This implies a maximum of 8 directions in which a mouse
Device Use L M L H L movement can occur.

Typing/Keystroke H M L H M Complexities associated with the use of non-standard


computer equipment for authentication are eliminated with the
Voice H M M H M use of keystroke and mouse dynamics.
C. Fingerprint biometrics
Behavioral biometrics generally suffer from low permanence The fingerprint is the most widely used biometric [10]. The
[6]. A learner’s keystroke dynamics can change drastically fingerprint biometric owes its popularity largely to its
within a short period of time as the learners gets accustomed to uniqueness. A fingerprint is made up of ridges, furrows and
the keyboard being used. Also anxiety or nervousness can have minutiae [11]. These three contribute to the uniqueness of the
an effect on the keystroke dynamics during an e-assessment. fingerprint.
An array of fingerprint sensors are in use today that are
These measurement requirements for biometric characteristics
capable of capturing the fingerprint biometric and authenticating
are necessarily to be considered in determining their suitability a person based on analysis of the ridges and furrows which make
for a given application domain. the fingerprint distinct. These devices are used for enrolment and
template matching [12]. Electro-optical sensors are used to
Next we identify some behavioral and physical biometrics and capture an image of the fingerprint and can be fitted with light
discuss how they are used. emitting polymers which can in turn be embedded into devices
such as a mouse [13].
A. Keystroke dynamics D. Facial biometrics
The keystroke dynamics biometric aims to obtain biometric Previously, facial biometrics relied on 2D images which meant
data as a learner types on the computer keyboard. In order to the individual being authenticated had to face a camera directly
authentication a learner using the keystroke biometrics the to be able to capture the biometric. Technology has since
following metrics are considered: typing speed, keystroke seek evolved enabling cameras to accurately identify individuals in
time, flight time, characteristic errors, and characteristic a crowded area. [14] describes 3D facial recognition as a more
sequences [7]. The time between keystrokes is known as a accurate and therefore reliable approach to facial biometrics.
diagraph and is a vital part of the keystroke biometric data. In [15] identify some features of the face that is measured by a 3D
matching the keystroke data obtained with templates in a
facial recognition system which are curves of the eye socket, 𝑃
𝐹𝑅𝑅 = (4)
curves of the nose, and curves of the chin. 𝑇

The authentication of a person by facial biometrics is a The accuracy of the biometric authentication is directly affected
nonintrusive process and can be done transparently. The by the values of FAR and FRR. A reduction the FAR and/or
enrollee may not even be aware that the authentication process FRR value will improve the accuracy of the biometric
is ongoing [16]. authentication. The percentage accuracy of the biometric
authentication can be calculated by [18]:
Algorithms have been developed which aim to detect a face and
track features of the face for the purpose of identification and 𝐹𝐴𝑅 + 𝐹𝑅𝑅
authentication. The Kanade-Lucas-Tomasi (KLT) algorithm is 𝐴𝑐𝑐 = (100 − )% (5)
2
one such algorithm. Images of the face can be obtained by a
camera and are represented as vectors. Where: 𝐴𝑐𝑐 = 𝑃𝑒𝑟𝑐𝑒𝑛𝑡𝑎𝑔𝑒 𝑎𝑐𝑐𝑢𝑟𝑎𝑐𝑦.

The facial biometric can be computed by finding the mean As the size of a biometric database increases, the possibility of a
Eigenvector. The Kanade-Lucas-Tomasi (KLT) algorithm is one false rejection or false acceptance also increases [19]. The
such algorithm. Images of the face can be obtained by a camera accuracy metrics are commonly used in evaluating a biometric
and are represented as vectors. system, for any given application domain, such as e-assessment.
The mean vector of the images being examined is given IV. MULTIMODAL BIOMETRICS
equation 2 [17]:
𝑁 In order to implement near absolute security within an
𝜇 = ∑ 𝑥𝑖 (2) information system using biometric features, it is necessary to
𝑖=1 combine several different biometric traits, either those
belonging to one type only or those already presenting a
Where: combination of both types mentioned [9].
𝑋 = (𝑥1 , 𝑥2 , … . , 𝑥𝑖 , … . , 𝑥𝑁 ) represents a 𝑛 × 𝑁 data matrix
N = number of facial images being examined Biometric systems can be either unimodal or multimodal.
𝑥𝑖 = a vector with dimension n made up of an 𝑝 × 𝑞 image Multimodal biometric system is the use of two or more
𝑛 = 𝑝 × 𝑞. biometric modes for recognition, while a unimodal biometric
system only employs one biometric mode for verification
III. PERFORMANCE MEASUREMENTS and/or identification. Multimodal biometric systems are more
noise resistant and less susceptible to spoofing [20].
According to [4], Two samples of the same biometric from a Minimizing noise and the risk of spoofing is of great
single individual—e.g. two samples of the same fingerprint, importance given the high stake environment of an e-
may not be exactly the same due to adverse imaging conditions, assessment. Having multiple biometric modes raises the
changes in the user’s physiological or behavioral question of how authentication can be done based on the inputs
characteristics, ambient conditions, and the user’s interaction from the multiple biometric sensors, that is, how the fusion of
with the biometric device [4]. Therefore, a biometric matching results from the multiple biometric modes can be done in an
system’s typically makes use of a matching score. Usually, a effort to authenticate a person. Biometric systems generally
threshold is used for system decision. consist of four modules, which are, the sensor module that
obtains the biometric data, the feature extraction module that
In measuring the accuracy of a biometric system, some of the obtains features sets from the raw biometric data, the matching
metrics used include: module that generates matching scores based on comparisons
 FAR (False Acceptance Rate) – The number of between the features sets ant the stored templates, and lastly the
authentications granted erroneously over time decision module that authenticates a person based on the
 FRR (False Rejection Rate) – The number of valid matching scores. Fusion can take place in the level of any of
biometric data rejected over time. these four modules [12].

Given 𝑅 as the number of persons wrongly accepted and 𝑇 the V. APPLICATION OF BIOMETRICS FOR E-ASSESSMENT
total number of false matches, FAR can be determined by [18]: [21] propose a model for continuous authentication of
learners in a virtual classroom environment. Two behavioral
𝑅 biometric modes are used for the authentication process,
𝐹𝐴𝑅 = (3)
𝑇 keystroke dynamics and mouse dynamics; along with the use of
 one physical biometric mode which is facial biometrics.
Given 𝑃 as the number of persons wrongly rejected and 𝑆 as the Authentication for each mode is designed as a subsystem which
total number of correct matches made, FRR can be determined independently performs authentication of a learner. Fusion of
by [18]:
the results of the individual subsystems is done by applying a Home-Exams (SABBAH Model)," Biometrics and
logical AND to all three results. Bioinformatics, vol. 4, pp. 32-45, 2012.
[9] employ the use of fingerprint biometrics and mouse [8] E. Flior and K. Kowalski, "Continuous biometric user
dynamics biometrics in proposing a multimodal, nonintrusive authentication in online examinations," in Information
biometric approach to enrolling and authenticating learners Technology: New Generations (ITNG), 2010 Seventh
during an e-assessment. Five factors are taken into account International Conference on Information Technology,
which makes up the mouse dynamics: Mouse movement speed, 2010, pp. 488-492.
movement direction, action type, travel distance, and elapsed [9] S. Asha and C. Chellappan, "Authentication of e-
time. The mouse is equipped with ta fingerprint sensor used for learners using multimodal biometric technology," in
obtaining the fingerprint biometric. Biometrics and Security Technologies, 2008. ISBAST
2008. International Symposium on, 2008, pp. 1-6.
[7] propose a bimodal biometric model for e-assessments;
[10] R. Saini and N. Rana, "Comparison of Various
particularly for non-proctored environments. The model
Biometric Methods," International Journal of
involves integrating with various systems including the e-
Advances in Science and Technology (IJAST), vol. 2,
assessment system. Fingerprint biometrics, keystroke dynamics
2014.
as well as video monitoring are used for the authentication
[11] D. Kumar and Y. Ryu, "A brief introduction of
process. The authentication process provides for transparent
biometrics and fingerprint payment technology,"
authentication of learners. In measuring the keystroke
International Journal of advanced science and
biometric, five metrics were considered: typing speed,
Technology, vol. 4, pp. 25-38, 2009.
keystroke seek time, flight time, characteristic errors, and
[12] A. Ross and A. K. Jain, "Multimodal biometrics: An
characteristic sequences.
overview," in Signal Processing Conference, 2004
VI. CONCLUSION AND RECOMMENDATION 12th European, 2004, pp. 1221-1224.
[13] X. Xia and L. O'Gorman, "Innovations in fingerprint
In this paper, various biometric modes were discussed and
capture devices," Pattern Recognition, vol. 36, pp.
their application within the domain of e-assessments. Given the
361-369, 2003.
continued adoption of e-assessments globally, more research
needs to be conducted to increase the accuracy of biometric [14] S. Thorat, S. Nayak, and J. P. Dandale, "Facial
authentication and the protection of a biometric system from recognition technology: An analysis with scope in
circumvention. India," arXiv preprint arXiv:1005.4263, 2010.
[15] H. Garg and S. Singh, "A Review Paper on Facial
Recognition," International Journal of Enhanced
Research in Science Technology & Engineering, vol.
REFERENCES
3, pp. 80-85, 2014.
[16] T. O. Majekodunmi and F. E. Idachaba, "A Review of
[1] A. Simmonds, P. Sandilands, and L. van Ekert, "An the Fingerprint, Speaker Recognition, Face
ontology for network security attacks," in Applied Recognition and Iris Recognition Based Biometric
Computing, ed: Springer, 2004, pp. 317-323. Identification Technologies," 2011.
[2] K. M. Apampa, G. Wills, and D. Argles, "Towards [17] X. Lu, "Image analysis for face recognition," personal
security goals in summative e-assessment security," in notes, May, vol. 5, 2003.
Internet Technology and Secured Transactions, 2009. [18] J. Malik, D. Girdhar, R. Dahiya, and G. Sainarayanan,
ICITST 2009. International Conference for, 2009, pp. "Reference Threshold Calculation for Biometric
1-5. Authentication," International Journal of Image,
[3] K. Rabuzin, M. Baca, and M. Sajko, "E-learning: Graphics and Signal Processing (IJIGSP), vol. 6, p.
Biometrics as a Security Factor," in Computing in the 46, 2014.
Global Information Technology, 2006. ICCGI '06. [19] T. Dunstone and N. Yager, Biometric system and data
International Multi-Conference on, 2006, pp. 64-64. analysis: Design, evaluation, and data mining:
[4] S. Prabhakar, S. Pankanti, and A. K. Jain, "Biometric Springer Science & Business Media, 2008.
recognition: security and privacy concerns," Security [20] A. Mishra, "Multimodal biometrics it is: need for
& Privacy, IEEE, vol. 1, pp. 33-42, 2003. future systems," International journal of computer
[5] H. A. Crawford, "A framework for continuous, applications, vol. 3, pp. 28-33, 2010.
transparent authentication on mobile devices," [21] M. K. Dehnavi and N. P. Fard, "Presenting a
University of Glasgow, 2012. multimodal biometric model for tracking the students
[6] P. S. Teh, A. B. J. Teoh, and S. Yue, "A survey of in virtual classes," Procedia-Social and Behavioral
keystroke dynamics biometrics," The Scientific World Sciences, vol. 15, pp. 3456-3462, 2011.
Journal, vol. 2013, 2013.
[7] Y. W. Sabbah, I. A. Saroit, and A. M. Kotb, "A Smart
Approach for Bimodal Biometric Authentication in

You might also like