Design of a Framework for Computer-Based Examination Invigilation Using Fingerprint and Iris Technologies

Gabriel Babatunde Iwasokun*, Omomule Taiwo Gabriel **, Rapheal Olufemi Akinyede***
*,*** Senior Lecturer, Department of Computer Science, Federal University of Technology, Akure, Nigeria.
** Assistant Lecturer, Department of Computer Science, Adekunle Ajasin University, Akungba Akoko, Ondo State, Nigeria.
Periodicity:September - November'2018
DOI : https://doi.org/10.26634/jpr.5.3.15675

Abstract

Computer-Based Examination (CBE) is a new paradigm in the assessment and measurement of knowledge and capabilities. It relies on computer and its associated technologies to provide solution to some of the problems inherent to human-based approaches to conduct of examinations and invigilation. Such problems include connivance, impersonation, external sourcing and peeking. This paper presents the design of a fingerprint and iris-based framework for CBE invigilation. The framework comprises of modules for CBE, e-invigilation and control. The CBE module comprises of a network backbone, a server and several workstations. The e-invigilation module is designed to use high definition and resolution iris scanners such as Iris Shield-USB MK and CMITech BMT series to capture the iris image of the candidates for processing while the control module will handle the tasks of fingerprint-based authentication of examinees, process monitoring and relaying of situation reports.

Keywords

CBE, e-invigilation, Iris, Fingerprint, Framework

How to Cite this Article?

Iwasokun, G. B., Omomule, T. G., and Akinyede, O. R (2018). Design of a Framework for Computer-Based Examination Invigilation Using Fingerprint and Iris Technologies. i-manager’s Journal on Pattern Recognition, 5(3), 1-9. https://doi.org/10.26634/jpr.5.3.15675

References

[1]. Apampa, K. M., Wills, G., & Argles, D. (2010). User security issues in summative e-assessment security. International Journal of Digital Society (IJDS), 1(2), 1-13.
[2]. Assaf, W., Elia, G., Fayyoumi, A., & Taurino, C. (2007, July). Prospects of e-learning: the case of Jordan. In Annual IADIS International Conference on e-Society.
[3]. Babatunde, I. G., Akinyokun, O. C., Kayode, A. B., & Olatunbosun, O. (2011). Adaptive and faster approach to fingerprint minutiae extraction and validation. International Journal of Computer Science and Security (IJCSS), 5(4), 414-424.
[4]. Bal, A., & Acharya, A. (2011, December). Biometric authentication and tracking system for online examination system. In 2011 International Conference on Recent Trends in Information Systems (pp. 209-213). IEEE.
[5]. Chowhan, S., Kulkarni, U. V., & Shinde, G. N. (2011). Iris recognition using modified fuzzy hypersphere neural network with different distance measures. International Journal of Advanced Computer Science and Applications, 2(6).
[6]. Clarke, N. L., Dowland, P., & Furnell, S. M. (2013, June). e-Invigilator: A biometric-based supervision system for e- Assessments. In International Conference on Information Society (i-Society 2013) (pp. 238-242). IEEE.
[7]. Curran, K., Middleton, G., & Doherty, C. (2011). Cheating in exams with technology. International Journal of Cyber Ethics in Education (IJCEE), 1(2), 54-62.
[8]. Eckstein, M. A. (2003). Combating academic fraud: Towards a culture of integrity. International Institute for Educational Planning.
[9]. Fayyoumi, A., & Zarrad, A. (2014). Novel solution based on face recognition to address identity theft and cheating in online examination systems. Advances in Internet of Things, 4(02), 5-12.
[10]. Gathuri, J. W., Luvanda, A., Matende, S., & Kamundi, S. (2014). Impersonation challenges associated with e-assessment of university students. Journal of Information Engineering and Applications, 4(7), 60-68.
[11]. Goswami, S. K., & Basu, S. K. (1991, January). Direct solution of distribution systems. In IEE Proceedings C (Generation, Transmission and Distribution) (Vol. 138, No. 1, pp. 78-88). IET Digital Library.
[12]. Hernández, J. A., Ortiz, A. O., Andaverde, J., & Burlak, G. (2008, March). Biometrics in online assessments: A study th case in high school students. In 18 International Conference on Electronics, Communications and Computers (conielecomp 2008) (pp. 111-116). IEEE.
[13]. Irfan, C. A., Nomura, S., Ouzzane, K., & Fukumura, Y. (2009, June). Face-based access control and invigilation tool for e-learning systems. In 2009 International Conference on Biometrics and Kansei Engineering (pp. 40-44). IEEE.
[14]. Irfan, A. C. M., Takuya, K., Nomura, S., & Yoshimi, F. (2009). An access control system for e-learning management systems. Journal of Medical Informatics & Technologies, 13.
[15]. Iwasokun, G. B., & Akinyokun, O. C. (2016). Singular minutiae points' relationship-based approach to fingerprint matching. Artificial Intelligence Research, 5(1), 78-86.
[16]. Iwasokun, G. B., Akinyokun, O. K., Akinyede, R. O., & Udoh, S. S. (2018). Fingerprint-based authorization platform for electronic-based examination. Journal of Scientific Research & Reports, 12 (6), 1-10.
[17]. Iwasokun, G. B., Akinyokun, O. C., Angaye, C. O., & Olabode, O. (2012). A multi-level model for fingerprint image enhancement. Journal of Pattern Recognition Research, 7(1), 155-174.
[18]. Ketab, S. S., Clarke, N., & Dowland, P. S. (2016). The value of the biometrics in invigilated e-assessments. In Edulearn16, the, International Conference on Education and New Learning Technologies.
[19]. Levy, Y., & Ramim, M. (2007). A theoretical approach for biometrics authentication of e-exams. Chais Conference on Instructional Technologies Research.
[20]. Levy, Y., & Ramim, M. (2009). Initial development of a learners' ratified acceptance of multibiometrics intentions model (RAMIM). Interdisciplinary Journal of ELearning and Learning Objects, 5(1), 379-397.
[21]. Maureen, I. (2016). Virtual examination supervision system for nigerian universities. International Journal of Modern Education & Computer Science, 8(9), 43-50.
[22]. Mothukuri, U. K., Jain, S., & Muralidharan, V. (2012, October). Invigilated online assessment: Various ways to minimize unauthorized help. In 2012 IEEE Symposium on E-Learning, E-Management and E-Services (pp. 1-4). IEEE.
[23]. Noeman, M., & Eric, S. (2010). Face-based einvigilation. Journal of Nursing Education, 49(2).
[24]. Onyesolu, M. O., Ejiofor, V. E., Onyeizu, M. N., & Ugoh, D. (2013). Enhancing Security in a distributed examination using Biometrics and Distributed Firewall System. International Journal of Emerging Technology and Advanced Engineering, 3(9), 65-70.
[25]. Pan, C. C., Yang, K. H., & Lee, T. L. (2004, March). Secure online examination architecture based on distributed firewall. In IEEE International Conference on e- Technology, e-Commerce and e-Service, 2004. EEE'04. 2004 (pp. 533-536). IEEE.
[26]. Ricketts, C., Filmore, P., Lowry, R., & Wilks, S. (2003). How should we measure the costs of computer aided assessment? Proceedings of the 7th Computer Assisted Assessment Conference.
[27]. Rodchua, S., Yiadom-Boakye, G., & Woolsey, R. (2011). Student Verification system for online assessments: bolstering quality and integrity of distance learning. Journal of Industrial Technology, 27(3), 1-8.
[28]. Rovai, A. P. (2000). Online and traditional assessments: What is the difference? The Internet and Higher Education, 3(3), 141-151.
[29]. Rowe, N. C. (2004). Cheating in online student assessment: Beyond plagiarism. Online Journal of Distance Learning Administration, 7(2).
[30]. Sabbah, Y., Saroit, I., & Kotb, A. (2012, March). Synchronous authentication with bimodal biometrics for e-assessment: A theoretical model. In 2012 6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT) (pp. 139-145). IEEE.
[31]. Sheard, J., & Dick, M. (2003, June). Influences on cheating practice of graduate students in IT courses: What are the factors? In ACM SIGCSE Bulletin (Vol. 35, No. 3, pp. 45-49). ACM.
[32]. Tiwari, C., Hanmandlu, M., & Vasikarla, S. (2015, October). Suspicious face detection based on eye and other facial features movement monitoring. In 2015 IEEE Applied Imagery Pattern Recognition Workshop (AIPR) (pp. 1-8). IEEE.
[33]. Wales, J., & Baraniuk, R. (2008, February). Technology opens the doors to global classrooms. The Weekend Australian Inquirer, 25.
[34]. Weippl, E. R. (2005). Security in E-Learning (Vol. 16). Springer Science & Business Media. Retrieved from http://issep.uni-lu.ac.at/material/weippl.pdf, Accessed 23/05/2010
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.