Abstract
The paper describes a context-aware security system for identifying users mostly during the exam phase in the e-Learning environment. The system employs soft biometric characteristics of the individual and environments parameters in order to capture patterns and later applies those on reactive base identifying the person participating in the exam including external help that could be offered to him illegally from the teacher point of view. The paper discusses how the system can be built and what methods should be implemented within the system prior to the examination in order to increase reliability of the system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
E. González-Agulla, E. Argones-Rúa, C. García-Mateo, and Ó W. M. Flórez, “Development and Implementation of a Biometric Verification System for E-learning Platforms,” EDUTECH, Computer-Aided Design Meets Computer-Aided Learning, IFIP 18th World Computer Congress, 2004, pp. 155-164.
O. Guven, S. Akyokus, M. Uysal, and A. Guven, “Enhanced password authentication through keystroke typing characteristics,” Proceedings of the 25th conference on Proceedings of the 25th IASTED International Multi-Conference: artificial intelligence and applications, 2007, pp. 317-322.
D. Kumlander, “Soft Biometrical Students Identification Method for e-Learning,” in Advances in Computer and Information Sciences and Engineering, Springer, Netherlands, 2008, p. 114 - 118
A. K. Jain, A. Ross, and S. Prabhakar, "An Introduction to Biometric Recognition,", IEEE Trans. on Circuits and Systems for Video Technology, vol. 14, no. 1, 2004, pp 4-19.
A. K. Jain, L. Hong, and S. Pankanti, “Biometric Identification”, Communications of ACM, vol. 43, no.2, 2000, pp. 91-98
J. Illonen, “Keystroke dynamics,” in Advanced Topics in Information Processing Lectures, 2003.
R. Gaines and W. Lisowski, S. Press, and N. Shapiro, “Authentication by Keystroke Timing: some preliminary results,” Rand Report R-256-NSF, Rand Corporation, 1980.
R. Joyce and G. K. Gupta, “Identity Authentication Based on Keystroke Latencies”, Commun. ACM, vol. 33, no. 2, 1990, pp. 168-176.
I.Sogukpinar and L. Yalçin, “User identification via keystroke dynamics”, Ist. Univ. Journal of Electrical and Electronic Engineering, vol. 4, no. 1, 2004, pp. 995-1005.
S. Bleha, C. Slivinsky, and B. Hussien, ”Computer-access security systems using keystroke dynamics”, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 12, 1990, pp. 1217-1222.
Y. Sheng, V. V. Phoha, and S. M. Rovnyak, “A parallel decision tree-based method for user authentication based on keystroke patterns”, IEEE Transactions on Systems, Man, and Cybernetics, vol. 35, no. 4, 2005, pp. 826-833.
E. Yu and S. Cho, “GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification”, Proceedings of the International Joint Conference on Neural Networks, vol. 3, 2003, pp. 20-2253 – 2257.
B. Hussien, R. McLaren, and S. Bleha, “An application of fuzzy algorithms in a computer access security system”, Pattern Recognition Letters, vol. 9, no. 1, pp. 39-43.
P. Chang and A. Gul, "Towards Context-Aware Web Applications," 7th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Springer, LNCS 4531, 2007, pp. 239–252.
W.Y. Lum and F.C.M. Lau, “A context-aware decision engine for content adaptation,” IEEE Pervasive Computing, vol. 1, no.3, 2002, pp. 41–49.
J. Pascoe, “Adding Generic Contextual Capabilities to Wearable Computers,” Proc. 2nd Int’l Symp. Wearable Computers, IEEE CS Press, Los Alamitos, Calif., 1998, pp. 92–99.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer Science+Business Media B.V.
About this paper
Cite this paper
Kumlander, D. (2010). A Context-Aware Biometric Security System for e- Learning Applications. In: Iskander, M., Kapila, V., Karim, M. (eds) Technological Developments in Education and Automation. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-3656-8_84
Download citation
DOI: https://doi.org/10.1007/978-90-481-3656-8_84
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-90-481-3655-1
Online ISBN: 978-90-481-3656-8
eBook Packages: Humanities, Social Sciences and LawEducation (R0)