Using Aadhaar for Continuous Test-Taker Presence Verification in Online Exams

  • N. Sethu Subramanian
  • Sankaran Narayanan
  • M. D. Soumya
  • Nitheeswar Jayakumar
  • Kamal Bijlani
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 701)

Abstract

In the context of Indian higher education, deployment of online exams for summative assessments is hampered by the lack of a reliable e-assessment system that can guarantee high degree of examination integrity. Current methods for maintaining integrity of online exams largely depend on proctor-based invigilation. This cumbersome method does not fully prevent test-taker impersonation. We propose leveraging the Aadhaar biometric data to verify the presence of the test-taker throughout the entire duration of the examination. Such a continuous presence verification technique is likely to be far more successful in preventing impersonation than the conventional methods. Our method can help eventually eliminate the need for a remote proctor. We identify a set of strategies to systematically validate the effectiveness of the proposed system.

Keywords

LMS Cloud Exam cheating Proctoring e-Assessment Multimodal biometrics 

References

  1. 1.
    Perera-Diltz, D., Moe, J.: Formative and summative assessment in online education. J. Res. Innovat. Teach. 7(1), 130–142 (2014)Google Scholar
  2. 2.
    Ardid, M., Gómez-Tejedor, J.A., Meseguer-Dueñas, J.M., Riera, J., Vidaurre, A.: Online exams for blended assessment. study of different application methodologies. Comput. Educat. 81, 296–303 (2015)CrossRefGoogle Scholar
  3. 3.
    Fask, A., Englander, F., Wang, Z.: Do online exams facilitate cheating? an experiment designed to separate possible cheating from the effect of the online test taking environment. J. Acad. Ethics 12(2), 101–112 (2014)CrossRefGoogle Scholar
  4. 4.
    Harmon, O.R., Lambrinos, J., Buffolino, J.: Assessment design and cheating risk in online instruction. Online J. Dist. Learn. Administ. 13(3), n3 (2010)Google Scholar
  5. 5.
    Apampa, K.M., Wills, G., Argles, D.: User security issues in summative e-assessment security. Int. J. Digit. Soc. 1(2), 1–13 (2010)Google Scholar
  6. 6.
    Al Solami, E., Boyd, C., Clark, A., Islam, A.K.: Continuous biometric authentication: Can it be more practical? In: 2010 12th IEEE International Conference on High Performance Computing and Communications (HPCC), pp. 647–652. IEEE (2010)Google Scholar
  7. 7.
    Flior, E., Kowalski, K.: Continuous biometric user authentication in online examinations. In: 2010 Seventh International Conference on Information Technology: New Generations (ITNG), pp. 488–492. IEEE (2010)Google Scholar
  8. 8.
    Aadhar Unique Identification Authority of India (uidai)Google Scholar
  9. 9.
    Varma, P.: Building an open identity platform for India. In: 2015 Asia-Pacific Software Engineering Conference (APSEC), pp. 3–3. IEEE (2015)Google Scholar
  10. 10.
    Gil, C., Díaz, G., Castro, M.: Fingerprint identification in lms and its empirical analysis of engineer students’ views. In: 2010 IEEE Education Engineering (EDUCON), pp. 1729–1736. IEEE (2010)Google Scholar
  11. 11.
    Wildes, R.P.: Iris recognition: an emerging biometric technology. Proc. IEEE 85(9), 1348–1363 (1997)CrossRefGoogle Scholar
  12. 12.
    Kryterion Global Testing Solutions. http://www.kryteriononline.com
  13. 13.
    Clarke, N.L., Dowland, P., Furnell, S.M.: e-invigilator: a biometric-based supervision system for e-assessments. In: 2013 International Conference on Information Society (i-Society), pp. 238–242. IEEE (2013)Google Scholar
  14. 14.
    Prathish, S., Bijlani, K., et al.: An intelligent system for online exam monitoring. In: International Conference on Information Science (ICIS), pp. 138–143. IEEE (2016)Google Scholar
  15. 15.
    Krishnamoorthy, S., Soman, K.: Implementation and comparative study of image fusion algorithms. Int. J. Comput. Appl. 9(2) (2010)CrossRefGoogle Scholar
  16. 16.
    Gonzalez, N., Calot, E.P., Ierache, J.S.: A replication of two free text keystroke dynamics experiments under harsher conditions. In: 2016 International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1–6. IEEE (2016)Google Scholar
  17. 17.
    Asha, S., Chellappan, C.: Authentication of e-learners using multimodal biometric technology. In: International Symposium on Biometrics and Security Technologies, 2008. ISBAST 2008, pp. 1–6. IEEE (2008)Google Scholar
  18. 18.
    Subramanian, N.S., Anand, S., Bijlani, K.: Enhancing e-learning education with live interactive feedback system. In: Proceedings of the 2014 International Conference on Interdisciplinary Advances in Applied Computing. p. 53. ACM (2014)Google Scholar
  19. 19.
    Apampa, K.M., Wills, G., Argles, D.: An approach to presence verification in summative e-assessment security. In: 2010 International Conference on Information Society (i-Society), pp. 647–651. IEEE (2010)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • N. Sethu Subramanian
    • 1
  • Sankaran Narayanan
    • 1
  • M. D. Soumya
    • 1
  • Nitheeswar Jayakumar
    • 1
  • Kamal Bijlani
    • 1
  1. 1.Amrita e-Learning Research Lab (AERL)Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Amrita UniversityAmritapuriIndia

Personalised recommendations