Identity Verification in Virtual Education Using Biometric Analysis Based on Keystroke Dynamics

Keywords: Biometrics, Identity verification, Keystroke dynamics, Virtual Education

Abstract

Virtual education has become one of the tools most widely used by students at all educational levels, not just because of its convenience and flexibility, but also because it can expand educational coverage. All these benefits also bring along multiple issues in terms of security and reliability in the evaluation the of student’s knowledge because traditional identity verification strategies, such as the combination of username and password, do not guarantee that the student enrolled in the course really takes the exam. Therefore, a system with a different type of verification strategy should be designed to differentiate valid users from impostors. This study proposes a new verification system based on distances computed among Gaussian Mixture Models created with different writing task. The proposed approach is evaluated in two different modalities namely intrusive verification and non-intrusive verification. The intrusive mode provides a false positive rate of around 16 %, while the non-intrusive mode provides a false positive rate of 12 % In addition, the proposed strategy for non-intrusive verification is compared to a work previously reported in the literature and the results show that our approach reduces the equal error rate in about 24.3 %. The implemented strategy does not need additional hardware; only the computer keyboard is required to complete the user verification, which makes the system attractive, flexible, and practical for virtual education platforms.

Author Biographies

Daniel Escobar-Grisales*, Universidad de Antioquia, Colombia

MSc. in Electronics and Telecomunications Engineering, Faculty of Engineering. Universidad de Antioquia, Medellín-Colombia, daniel.esobar@udea.edu.co

Juan. C. Vásquez-Correa , Friedrih-Alexander-Universität, Erlangen-Nürnberg- Germany

MSc. in Telecommunications engineering, Faculty of Engineering, Universidad de Antioquia; Pattern, Recognition Lab. Friedrih-Alexander-Universität, Erlangen, Nürnberg- Germany, jcamilo.vasquez@udea.edu.co

Jesús F. Vargas-Bonilla, Universidad de Antioquia, Colombia

PhD. in Cibernetcs and Telecommunications, Faculty of Engineering. Universidad de Antioquia, Medellín-Colombia, jesus.vargas@udea.edu.co

Juan Rafael Orozco-Arroyave , Universität, Erlangen-Nürnberg, Germany

PhD. in Computer Science, Faculty of Engineering, Universidad de Antioquia, Pattern Recognition Lab. Friedrih-Alexander-Universität, Erlangen, Nürnberg- Germany, rafael.orozco@udea.edu.co

References

B. Means, Y. Toyama, R. Murphy, M. Bakia, and K. Jones, “Evaluation of Evidence-Based Practices in Online Learning: A Meta-Analysis and Review of Online Learning Studies,”, U.S Department of Education, Estados Unidos, Report ED-04- CO-0040 Task 0006, 2009. Available: https://repository.alt.ac.uk/629/1/US_DepEdu_Final_report_2009.pdf

T. Bretag, Handbook of Academic Integrity. Singapore: Springer Singapore, 2016. https://doi.org/10.1007/978-981-287-098-8

A. K. Jain, A. Ross, and S. Prabhakar, “An Introduction to Biometric Recognition,” IEEE Trans. Circuits Syst. Video Technol., vol. 14, no. 1, pp. 4–20, Jan. 2004. https://doi.org/10.1109/TCSVT.2003.818349

W. L. Bryan and N. Harter, “Studies in the physiology and psychology of the telegraphic language.,” Psychol. Rev., vol. 4, no. 1, pp. 27–53, 1897. https://doi.org/10.1037/h0073806

R. Joyce and G. Gupta, “Identity authentication based on keystroke latencies,” Commun. ACM, vol. 33, no. 2, pp. 168–176, Feb. 1990. https://doi.org/10.1145/75577.75582

K. Longi, J. Leinonen, H. Nygren, J. Salmi, A. Klami, and A. Vihavainen, “Identification of programmers from typing patterns,” in Proceedings of the 15th Koli Calling Conference on Computing Education Research - Koli Calling ’15, Koli Finland, 2015. pp. 60–67. https://doi.org/10.1145/2828959.2828960

S. Krishnamoorthy, L. Rueda, S. Saad, and H. Elmiligi, “Identification of User Behavioral Biometrics for Authentication Using Keystroke Dynamics and Machine Learning,” in Proceedings of the 2018 2nd International Conference on Biometric Engineering and Applications - ICBEA ’18, Amsterdam, 2018. pp. 50–57. https://doi.org/10.1145/3230820.3230829

J. R. Young, R. S. Davies, J. L. Jenkins, and I. Pfleger, “Keystroke Dynamics: Establishing Keyprints to Verify Users in Online Courses,” Comput. Sch., vol. 36, no. 1, pp. 48–68, Jan. 2019. https://doi.org/10.1080/07380569.2019.1565905

A. Morales, M. Falanga, J. Fierrez, C. Sansone, and J. Ortega-Garcia, “Keystroke dynamics recognition based on personal data: A comparative experimental evaluation implementing reproducible research,” in 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS), Arlington, 2015. pp. 1–6. https://doi.org/10.1109/BTAS.2015.7358772

M. W. Shelly. Frankestein or, the modern Prometheus. London: Penguin, 2007. Available: https://books.google.com.co/books/about/Frankenstein_Or_The_Modern_Prometheus.html?id=4JzWAAAAMAAJ&redir_esc=y

D. Yu and L. Deng, Automatic Speech Recognition. London: Springer London, 2015. https://doi.org/10.1007/978-1-4471-5779-3

D. A. Reynolds, T. F. Quatieri, and R. B. Dunn, “Speaker Verification Using Adapted Gaussian Mixture Models,” Digit. Signal Process., vol. 10, no. 1–3, pp. 19–41, Jan. 2000. https://doi.org/10.1006/dspr.1999.0361

D. A. Reynolds and R. C. Rose, “Robust text-independent speaker identification using Gaussian mixture speaker models,” IEEE Trans. Speech Audio Process., vol. 3, no. 1, pp. 72–83, 1995. https://doi.org/10.1109/89.365379

M. Nishida and T. Kawahara, “Speaker model selection based on the Bayesian information criterion applied to unsupervised speaker indexing,” IEEE Trans. Speech Audio Process., vol. 13, no. 4, pp. 583–592, Jul. 2005. https://doi.org/10.1109/TSA.2005.848890

P. Mahalanobis, "On the generalized distance in statistic", National Institute of Science of India, vol 2, no 1, pp. 49-55, Apr. 1936. Available: http://library.isical.ac.in:8080/xmlui/bitstream/handle/123456789/6765/Vol02_1936_1_Art05-pcm.pdf?sequence=1&isAllowed=y

T. Arias-Vergara, J.C. Vásquez-Correa, J. R. Orozco-Arroyave, J. F Vargas-Bonilla and E. Nöth, “Parkinson's Disease Progression Assessment from Speech Using GMM-UBM”, Proceedings of Interspeech, pp 1933-1937, San Francisco, 2016. Available: https://www.isca-speech.org/archive/Interspeech_2016/pdfs/1122.PDF

A. Peacock, X. Ke, and M. Wilkerson, “Typing patterns: a key to user identification,” IEEE Secur. Priv. Mag., vol. 2, no. 5, pp. 40–47, Sep. 2004. https://doi.org/10.1109/MSP.2004.89

N. Garcia-Ospina, J.-R. Orozco-Arroyave, and J.-F. Vargas-Bonilla, “Speaker Verification System for Online Education Platforms,” in 2018 International Carnahan Conference on Security Technology (ICCST), Montreal, 2018. pp. 1–5. https://doi.org/10.1109/CCST.2018.8585602

X. Jiang, S. Wang, X. Xiang, and Y. Qian, “Integrating online i-vector into GMM-UBM for text-dependent speaker verification,” in 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), Kuala, 2017. pp. 1628–1632. https://doi.org/10.1109/APSIPA.2017.8282293

How to Cite
[1]
D. . Escobar Grisales, J. C. . Vásquez-Correa, J. F. Vargas-Bonilla, and J. R. . Orozco-Arroyave, “Identity Verification in Virtual Education Using Biometric Analysis Based on Keystroke Dynamics ”, TecnoL., vol. 23, no. 47, pp. 197–211, Jan. 2020.

Downloads

Download data is not yet available.
Published
2020-01-30
Section
Research Papers

Altmetric