Abstract
Virtual education has become one of the tools most widely used by students at all educational levels, not just because of its convenience and flexibility, but also because it can expand educational coverage. All these benefits also bring along multiple issues in terms of security and reliability in the evaluation the of student’s knowledge because traditional identity verification strategies, such as the combination of username and password, do not guarantee that the student enrolled in the course really takes the exam. Therefore, a system with a different type of verification strategy should be designed to differentiate valid users from impostors. This study proposes a new verification system based on distances computed among Gaussian Mixture Models created with different writing task. The proposed approach is evaluated in two different modalities namely intrusive verification and non-intrusive verification. The intrusive mode provides a false positive rate of around 16 %, while the non-intrusive mode provides a false positive rate of 12 % In addition, the proposed strategy for non-intrusive verification is compared to a work previously reported in the literature and the results show that our approach reduces the equal error rate in about 24.3 %. The implemented strategy does not need additional hardware; only the computer keyboard is required to complete the user verification, which makes the system attractive, flexible, and practical for virtual education platforms.
Publisher
Instituto Tecnologico Metropolitano (ITM)
Reference19 articles.
1. B. Means, Y. Toyama, R. Murphy, M. Bakia, and K. Jones, "Evaluation of Evidence-Based Practices in Online Learning: A Meta-Analysis and Review of Online Learning Studies,", U.S Department of Education, Estados Unidos, Report ED-04- CO-0040 Task 0006, 2009. Available: https://repository.alt.ac.uk/629/1/US_DepEdu_Final_report_2009.pdf
2. T. Bretag, Handbook of Academic Integrity. Singapore: Springer Singapore, 2016. https://doi.org/10.1007/978-981-287-098-8
3. A. K. Jain, A. Ross, and S. Prabhakar, "An Introduction to Biometric Recognition," IEEE Trans. Circuits Syst. Video Technol., vol. 14, no. 1, pp. 4-20, Jan. 2004. https://doi.org/10.1109/TCSVT.2003.818349
4. W. L. Bryan and N. Harter, "Studies in the physiology and psychology of the telegraphic language.," Psychol. Rev., vol. 4, no. 1, pp. 27-53, 1897. https://doi.org/10.1037/h0073806
5. R. Joyce and G. Gupta, "Identity authentication based on keystroke latencies," Commun. ACM, vol. 33, no. 2, pp. 168-176, Feb. 1990. https://doi.org/10.1145/75577.75582
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献