Published July 16, 2020 | Version Version 1
Journal article Open

MULTIMODAL BIOMETRIC AUTHENTICATION FOR A COMPUTER-BASED TEST (CBT) APPLICATION

  • 1. Department of Computational Engineering Sciences, Cranfield University, UK Department of Computer Science, University of Jos, Nigeria
  • 2. Department of Computer Science, University of Jos, Nigeria
  • 3. Department of Computer Science, Federal University Dutse, Nigeria
  • 1. AM Publications

Description

This paper proposed a computer-based test (CBT) mobile application with a multimodal biometric authentication. Authentication is a vital process in verifying the identity of a person based on certain input requirements. The need for such a system has become necessary due to the increasing number of examination malpractice cases during the conduct of examinations in Nigerian tertiary institutions. One of the major forms of examination malpractices identified is impersonation. The study was carried out on the state of computer-based tests in the University of Jos, Nigeria, it was implemented and used to get observations, findings, and relevant information on how the proposed system can address impersonation. In the case study, discomfort, faulty computers, network failure were part of the issues faced during the conduct of computer-based tests. The implementation of the mobile application was done with Flutter (a framework of dart programming language). Python (python facial recognition package server) was used to handle face recognition. The backend uses a No SQL database known as Firebase (Firebase collections/real-time database) which was used to store all data and carry out other related user validation functions. The work presented has rebounded to solving the problem of examination malpractice and impersonation in computer-based tests in the University of Jos as observed during validation with up to 97% level of reliability at different levels of authentication which make the solution a highly recommended system with state-of-the-earth results.

Notes

Malpractices in examinations have become a serious issue in Nigerian institutions today. This problem has led to increasing number of graduates who are not knowledgeable and are incompetent in their various fields of studies. It also makes students to lose confidence in them and depend on other students in examinations for solutions. One of such examination malpractices is impersonation, where a student claims to be another student, gets access to exam hall and writes the examinations for another student. In the University of Jos for example, impersonation during examinations has been one of the difficult forms of malpractice to handle. Other problems in line with this issue are: i. Increase in rate of imposters in examination hall. ii. Increase in dependence of students in other students. iii. Leak of examination questions and solutions. Another set of issues observed is that, in the current state of CBT examinations in the University of Jos for example, several complain have been made with regards to how examinations are conducted: i. Students complain about congestion during entrance to the examination hall due to large number of students taking the examinations. ii. Students complain about network failure during the examination sessions. iii. Students complain about power failure. iv. Faulty computers. Students complain about their computers going off during the examination which usually destabilizes them. In order to examine the problem of the study, the paper focuses on the development of a multimodal biometric recognition system for computer-based tests. This proposed a three-level authentication which could help improve the monitoring of the examinations. 1.1. Concept of biometrics The term biometrics refers to a method of identification and verification of a person based on his or her physical or behavioral traits. This method is gradually being generally accepted as a means of identification of an individual. Traditionally, individuals are verified using passwords or identification cards (ID), which can easily be bypassed. Hence, both methods are unreliable [1],[2]. In a biometric system, recognition, identification, and verification of an individual work by obtaining information from an individual through feature extraction and compares it with the model stored in a database. 1.1.1. Biometric authentication This is a computer-based method which is used to verify and grant access to an individual seeking for access into a system. Improvements were made on conventional techniques of authentication due to their poor reliability, through the development of biometric authentication which is a more reliable method for identifying persons in systems. It is considered as 'biometrics' most of the time. Reference [3] defines biometric authentication as the means of utilizing biological traits or behavioral characteristics for the purpose of authenticating a user. Similarly, [1], highlighted various factors of authentication, some of which are: fingerprint, face, iris, retina, gait and palm.

Files

02.JLCS10082.pdf

Files (1.5 MB)

Name Size Download all
md5:4363bf5ad5b20f9616dc49ace0cf2d6e
1.5 MB Preview Download

Additional details

Related works

References

  • 1. Aggarwal G., Ratha N. K., Tsai-Yang J., &Bolle R. M. (2008). Gradient based textural characterization of fingerprints. In proceedings of IEEE International conference on Biometrics: Theory, Applications and Systems.
  • 2. Akinsanmi O.A, Olatunji, T.R., &Soroyewun, M.B. (2010). Development of an E-AssessmentPlatform for Nigerian Universities, Research Journal AppliedSciences,Engineering and Technology; 2(2): 170-175.
  • 3. Alabi, A. T., Isaa, A. O., &Oyekunle R. A., (2012). The Use of Computer Based Testing Method for the Conduct of Examinations at the University of Ilorin. International Journal of Learning & Development, 2(3). 51-90.
  • 4. Al-Bayati, M.A., &Hussein, K.Q. (2008). "Generic Software of e-Exam Package for Hearing Impaired Persons (Mathematics as Case Study)", 2nd Conference on Planning & Development of Education and Scientific Research in the Arab States, 955-962.Al-Hijaili, S. (2011). Multimodal biometrics fusion techniques.
  • 5. Aronowitz, H., Hoory, R., Pelecanos, J.W., and Nahamoo, D. New Developments in Voice Biometrics for User Authentication",Book New Developments in Voice Biometrics for User Authentication" (2011),17-20.
  • 6. Ayo C. K. (2007). The Prospects of e-Examination Implementation in Nigeria. Turkish Online Journal of Distance Education-TOJDE2007; 8(1), 58-66.
  • 7. Bátiz-Lazo, B., and Reese, C. "Is the future of the ATM past?". Financial Markets and Organizational Technologies" (Springer, 2010),137-165.
  • 8. Bisandu, D. B., Prasad, R., & Liman, M. M. (2018). Clustering news articles using efficient similarity measure and N-grams. International Journal of Knowledge Engineering and Data Mining, 5(4), 333-348.
  • 9. Bisandu, D. B., Gurumdimma, N. Y., Alams, M. T., &Datiri, D. D. (2018). An enhanced text mining approach using dynamic programming.
  • 10. Bisandu, D. B., Prasad, R., & Liman, M. M. (2019). Data clustering using efficient similarity measures. Journal of Statistics and Management Systems, 22(5), 901-922.
  • 11. Bisandu, D. B., Datiri, D. D., Onokpasa, E., Thomas, G., Haruna, M. M., Aliyu, A., & Yakubu, J. Z. (2019). Diabetes Prediction Using Data Mining Techniques. International Journal of Research and Innovation in Applied Science (IJRIAS), 4(6), 103-111.
  • 12. Bisandu, D. B. (2018). Clustering news articles using K-means and N-grams (Doctoral dissertation, American University of Nigeria, School of Information, Technology and Computing).
  • 13. Boles W.W. &Boashash B. (1998). A Human Identification Technique using images of the iris and wavelet transform. IEEE Trans.Signal Process, 46(1), pp. 1185–1188.
  • 14. Chellappa R., Wilson C. L.,&Sirohey C. (1995). Human and machine recognition of faces: A survey. Proc. IEEE, 83 (5), 705-740.
  • 15. Daugman J. G. (2003). The Importance of being random: statistical principles of iris recognition. Pattern Recognition 36, pp. 279–291.
  • 16. Decoo, W. (2002). Crisis on campus: confronting academic misconduct. Cambridge, MA: MIT Press.
  • 17. Du Y., Ives R. W., Etter D. M., And Welch T. B. (2006). Use of one-dimensional iris signatures to rank iris pattern similarities. OptEng, Vol. 45, 037110–201.
  • 18. Epstein, C. (2007). Guilty bodies, productive bodies, destructive bodies: Crossing the biometric borders", International Political Sociology, 2007, 1, (2), pp. 149-164.
  • 19. Fang B., Leung C., Tang Y.Y., Kwok P., Tse K.W., And Wong I.K., (2002). Off-line Signature Verification with Generated Training Samples. IEEE Proc. Vision Image Signal Process, 149 (2), pp. 85–90.
  • 20. Flom L. And Aran S., (1987). Iris Recognition System, U.S. Patent 4,641,349.
  • 21. Jain A. K., Ross A., And Pankanti S. (2006). Biometrics: A Tool for Information Security. IEEE Transactions on Information Forensics and Security,1(2), 125 - 143.
  • 22. Jain, A., Flynn, P., and Ross, A. A. (2007). Handbook of biometrics" (Springer Science & Business Media).
  • 23. Karadeniz, S. (2009). The Impacts of Paper, Web and Mobile Based Assessment onStudents' Achievement and Perceptions. Scientific Research and Essay, 4(10), 984 – 991.
  • 24. Kennedy, K., Nowak, S., Raghuraman, R., Thomas, J., &Dacis, S. (2000). Academic dishonesty and distance learning: student and faculty views. College Student Journal, 34(2), 309- 315.
  • 25. Krawczyk, S., and Jain, A. K. (2005). Securing electronic medical records using biometric authentication, In Editor (Ed.). Book Securing electronic medical records using biometric authentication (Springer edn.),1110-1119.
  • 26. Levy, Y., and Ramim, M. M. (2007). "A Theoretical Approach for Biometrics Authentication of E-Examinations", USA: Nova Southeastern University.
  • 27. Liu L. And Zhang D. (2005). A novel palm-line detector. In Proceedings of the 5th AVBPA, pp. 563– 571.
  • 28. Lim S., Lee K., Byeon O., And Kim T (2001) Efficient iris recognition through improvement of feature vector and classifier. ETRI Journal, 23(2),61–70.
  • 29. Lupu, C., Găitan, V.-G., and Lupu, V.: "Security enhancement of internet banking applications by using multimodal biometrics", in Editor (Ed.)^(Eds.): Book Security enhancement of internet banking applications by using multimodal biometrics" (IEEE, 2015, edn.),47-52.
  • 30. Maltoni D., Maio D., Jain A. K., and Prabhkar S., (2003). Handbook of Fingerprint Recognition. Springer. 978-0-387-21587-7.
  • 31. McGinity, M. (2005). Staying connected: Let your fingers do the talking. Communications of the ACM, 48(1), 21- 23.
  • 32. McLafferty, C. L., & Foust, K. M. (2004). Electronic plagiarism as a college instructor's nightmare prevention and detection: Cyber dimensions. Journal of Education for Business, 79(3), 186-190.
  • 33. Naude, E., &Hörne, T. (2006). Cheating or collaborative work: Does it pay? Issues in Informing Science and Information Technology, 3(2), 459-466.
  • 34. Obioma, G., Junaidu, I., &Ajagun, G. (2013). The Automation of Educational Assessment in Nigeria: Challenges and Implications for Pre-service Teacher Education. A paper presented at the 39th Annual Conference of the International Association for Educational Assessment (IAEA), Tel-Aviv, Israel, October 20 – 25.
  • 35. Ogunlade, O. O., and Olafare, F. O. (n.d). Lecturers' Perceptions of Computer-Based Test in Nigerian Universities.
  • 36. Pankanti, S., Bolle, R.M., and Jain, A (2000). Biometrics: The future of identification [Guest Editors' Introduction] ", Computer, 33, (2), pp. 46-49.
  • 37. Pillsbury, C. (2004). Reflections on academic misconduct: An investigating officer's experiences and ethics supplements. Journal of American Academy of Business, 5(1/2), 446-454.
  • 38. Ross A., (2007). An Introduction to Multi-biometrics. In Proceedings of the 15th European Signal Processing conference (EUSIPCO), (Pozan, Poland).
  • 39. Schramm,T. (2008), "E-Assessments and E-Examinations for Geomatics Studies", Department of Geomatics Hafen City University.
  • 40. Hamburg Hebebrandstraße 1,22297 Hamburg, Germany.
  • 41. Shu W. And Zhang D., (1998). Automated Personal identification by Palmprint. Optical Engineering, Vol. 37(8),2359-2362.
  • 42. Siskin, A. (2012). Visa waiver program. Current Politics and Economics of the United States, Canada and Mexico, 14, (23), pp. 255.
  • 43. Sun Z., Wang Y., Tan T., and Cui J. (2005). Improving iris recognition accuracy viacascaded classifiers. IEEE Trans. Syst. Man. Cybern—Part C: Appl Rev, 35.
  • 44. Wildes R. P., 1997. Iris Recognition: An Emerging Biometric technology. Proc. IEEE, Vol. 85,1348– 1363.
  • 45. Yousiff A. A. A., Chowdhury M. U., Ray S., And Nafaa H. Y., (2007). Fingerprint Recognition System using Hybrid Matching.
  • 46. Techniques. 6th IEEE/ACIS International Conference on Computer and Information Science,234- 240.
  • 47. Yu, C., & Tsao, C. C. (2003). Web teaching: Design, security, and legal issues. Delta Pi Epsilon Journal, 45(3), 191-203.

Subjects