Biometric Based Authentication System For Computer Based Assessment
Biometric Based Authentication System For Computer Based Assessment
Received Date : December 09, 2021 Accepted Date :January 11, 2022 Published Date : February 06, 2022
the authors examined the impacts, challenges and security with the system while the registration module serves as the
lapses of the existing electronic-examination system. A new backbone for pre-registration of examination takers.
system that uses data encryption for protecting the questions
and a biometric fingerprint for authentication was developed. 3.1 Verification Module
Authentication using fingerprint occurs only at login time,
which still gives room for impersonation after the initial login The verification module determines the validity of a user in
phase. It is also possible for users to contact diseases through accessing the computer based assessment system. In this
the devices. The authors of [21] proposed a continuous phase, the facial trait of a candidate is verified using some
authentication system using a multimodal biometric sequence of activities.
framework. The proposed multimodal framework combines
face, mouse dynamics, and keystroke dynamics as the PCA technique is used to determine eigen faces. For a given D
biometric technologies for authentication. The framework has dimensional data set X:
potential for promoting security of electronic examinations,
but the reliability of the methods used for the biometrics First, the mean vector μ[d] of dimensions Dx1 is computed,
authentication has not been investigated. The study in [22] where N is the number of samples in the data set:
examined the existing authentication method for the
Computer-based test system of Air Force Institute of
Technology (AFIT), Kaduna, Nigeria and proposed the
fingerprint biometric technique for authentication. The
fingerprint used for authentication does not provide a
continuous form of authentication and might result to users Compute the DxD covariance matrix C as follows:
contacting diseases. In [12], the research focused on
improving security and control by developing a platform Subtract the mean vector μ[d] from each column of
based on fingerprint-based technology for authenticating the data matrix X resulting in matrix B of DxN
electronic based examination. The platform involves the use dimension.
mathematical models for fingerprint database, enhancement,
feature extraction and pattern matching. Fingerprint
technology does not offer continuous authentication and can
be a threat to the health of users. The research carried out by
[2] addresses the issue of accuracy by proposing an image Compute the covariance matrix C of D x D dimension:
enhancement approach that uses fingerprint in conjunction
with electronic learning environments to eradicate unethical
practices with electronic examination in a university
environment. It involves extracting minutiae points of
fingerprints using the Crossing Number (CN) Concept. The
research is limited by the fact that fingerprint technology does
not guarantee continuous authentication and is also risky The eigenvectors (ed) and eigenvalues (λd) will be extracted as
given the fact that users can contact diseases from the devices follows:
involved.
Eigenvectors: compute matrix V, formed by D
3 PROPOSED BIOMETRIC COMPUTER BASED columns vectors of D length each, which
ASSESSMENT AUTHENTICATION SYSTEM. diagonalizes the covariance matrix C.
The facial trait is preferred in this research because it can V-1 C V = ^ (4)
provide a form of continuous authentication. This will solve
the problem of impersonation as it ensures that the original V = [e1 … eD] (5)
candidate is present throughout the examination period [23].
Traits such as fingerprints provide authentication only at login Eigenvalues: the diagonal values of DxD matrix L:
time, which still gives room for impersonation after the initial
login. The use of facial trait for authentication is also less
expensive, as it doesn’t require extra devices for biometric
capture. The computer system’s camera is used to capture the
face, which offers the user a convenient form of
authentication. The facial trait also offers a contactless form
of authentication in which there is no risk of contacting
diseases in an attempt to provide biometric trait. The proposed
face biometric system for computer based assessment is
shown in Figure 2.It consists of user interface, registration,
verification, computer based assessment and database
modules. The interface module facilitates visual interaction (6)
28
Achimba Terfa et al., International Journal of Advanced Trends in Computer Science and Engineering, 11(1), January - February 2022, 26 – 33
Figure 2: Proposed facial biometric authentication system for Computer Based Assessment (CBA) (adopted from [12]).
The eigenvectors with the largest eigenvalues correspond to 3.2 Assessment Module
the directions of maximum variance. Then, the L largest
eigenvalues and their corresponding eigenvectors have to be This is the module used for assessment of candidates that are
chosen, assuming that the rest of the dimension space, D-L, is authenticated successful. This assessment is done through
irrelevant information. Some information will be lost, but the taking of examinations, where candidates are required to
smaller the eigenvalues, the smaller the lost. Once the provide solutions to the questions been displayed to them. The
components (eigenvectors) have been selected, an LxL matrix module computes the result which is used for student
A with the L eigenvectors as columns has to be formed. assessment. To ensure continuous authentication, the system
Finally, the transpose of matrix A has to be taken and camera takes the picture of candidates at some specified time
multiplied by the original dataset, having previously extracted intervals. If at any interval the picture taken does not match
its mean value. with the one stored in the database, the system detects an act
of impersonation, in which the candidate will be penalized
after some warnings. This is done to avoid the situation where
X' = At . (X - µ) (7)
a candidate will be impersonated after the initial login.
The inverse transform to get the original data back can be
3.3 Database Module
achieved by applying the following back-projection.
This is the backend for hidden and background operations. It
X'' = A.X' + µ (8) stores information about the candidates, houses the biometric
templates and provides querying capabilities.
A facial image can be projected onto N' dimensions by
computing 4 SYSTEM IMPLEMENTATION
Ω = [v1v2 ...vN']T (9) The system implementation involves the use of Php and
MySql which was used for the database design. The
Where vi = edTB. vi is the ith coordinate of the facial image in environment is characterized by Window 10 operating system
the new space [24]. on Intel dual Core T6400 processor with 2G RAM and 40GB
hard disk. The system was tested by selected students of the
The Euclidean distance is minimized to determine which face department of Mathematics and Computer Science,
class provides the good description for input face image as University of Mkar, Gboko, Nigeria. The system is discussed
follows: below.
29
Achimba Terfa et al., International Journal of Advanced Trends in Computer Science and Engineering, 11(1), January - February 2022, 26 – 33
For a user to be eligible for the e-exams, he/she needs to For a user to be granted access to the exam module, he needs
provide details for registration in the registration page as to provide his registration number and face biometric. If the
shown in figure 4. face provided does not match the one stored in the database
during registration, authentication fails. If the face biometric
provided matches the one stored in the database, the user is
authenticated and then he can proceed to write exams. This is
shown in figure 5 and figure 6.
30
Achimba Terfa et al., International Journal of Advanced Trends in Computer Science and Engineering, 11(1), January - February 2022, 26 – 33
31
Achimba Terfa et al., International Journal of Advanced Trends in Computer Science and Engineering, 11(1), January - February 2022, 26 – 33
32
Achimba Terfa et al., International Journal of Advanced Trends in Computer Science and Engineering, 11(1), January - February 2022, 26 – 33
33