Mostrar el registro sencillo del ítem
Identity Verification in Virtual Education Using Biometric Analysis Based on Keystroke Dynamics
Verificación de identidad en la educación virtual mediante análisis biométrico basado en la dinámica del tecleo
dc.creator | Escobar Grisales, Daniel | |
dc.creator | Vásquez-Correa , Juan. C. | |
dc.creator | Vargas-Bonilla, Jesús F. | |
dc.creator | Orozco-Arroyave , Juan Rafael | |
dc.date | 2020-01-30 | |
dc.identifier | https://revistas.itm.edu.co/index.php/tecnologicas/article/view/1475 | |
dc.identifier | 10.22430/22565337.1475 | |
dc.description | Virtual education has become one of the tools most widely used by students at all educational levels, not just because of its convenience and flexibility, but also because it can expand educational coverage. All these benefits also bring along multiple issues in terms of security and reliability in the evaluation the of student’s knowledge because traditional identity verification strategies, such as the combination of username and password, do not guarantee that the student enrolled in the course really takes the exam. Therefore, a system with a different type of verification strategy should be designed to differentiate valid users from impostors. This study proposes a new verification system based on distances computed among Gaussian Mixture Models created with different writing task. The proposed approach is evaluated in two different modalities namely intrusive verification and non-intrusive verification. The intrusive mode provides a false positive rate of around 16 %, while the non-intrusive mode provides a false positive rate of 12 % In addition, the proposed strategy for non-intrusive verification is compared to a work previously reported in the literature and the results show that our approach reduces the equal error rate in about 24.3 %. The implemented strategy does not need additional hardware; only the computer keyboard is required to complete the user verification, which makes the system attractive, flexible, and practical for virtual education platforms. | en-US |
dc.description | La educación virtual se ha convertido en una de las herramientas más utilizadas por los estudiantes en todos los niveles educativos, no solo por la comodidad y la flexibilidad, sino también por la posibilidad de ampliar la cobertura educativa en una población. Todos estos beneficios traen consigo múltiples problemas de seguridad y confiabilidad a la hora de evaluar el proceso de aprendizaje del estudiante, ya que las estrategias tradicionales de verificación de identidad, como la combinación de nombre de usuario y contraseña, no garantizan que el estudiante matriculado en el curso realmente realice el examen. Por lo tanto, es necesario diseñar un sistema con otro tipo de estrategia de verificación para diferenciar un usuario válido de un impostor. Este estudio propone un nuevo método de verificación, basado en el cálculo de distancias entre los modelos de mezclas gaussianas creados con diferentes tareas de escritura. El enfoque propuesto es evaluado en dos modalidades diferentes llamadas verificación intrusiva y verificación no intrusiva. El modo intrusivo proporciona una tasa de falsos positivos de 16 %, mientras el modo no intrusivo provee una tasa de falsos positivos de 12 %. Además, la estrategia propuesta para verificación no intrusiva es comparada con un trabajo previamente reportado en la literatura y los resultados muestran que nuestro enfoque reduce la tasa de error en aproximadamente un 24.3 %. La estrategia implementada no necesita hardware adicional, solo es requerido el teclado del computador para realizar la verificación, lo que hace que el sistema sea atractivo y flexible para ser usado en plataformas de educación virtual. | es-ES |
dc.format | application/pdf | |
dc.format | text/xml | |
dc.format | text/html | |
dc.language | eng | |
dc.publisher | Instituto Tecnológico Metropolitano (ITM) | en-US |
dc.relation | https://revistas.itm.edu.co/index.php/tecnologicas/article/view/1475/1526 | |
dc.relation | https://revistas.itm.edu.co/index.php/tecnologicas/article/view/1475/1600 | |
dc.relation | https://revistas.itm.edu.co/index.php/tecnologicas/article/view/1475/1615 | |
dc.relation | /*ref*/B. Means, Y. Toyama, R. Murphy, M. Bakia, and K. Jones, “Evaluation of Evidence-Based Practices in Online Learning: A Meta-Analysis and Review of Online Learning Studies,”, U.S Department of Education, Estados Unidos, Report ED-04- CO-0040 Task 0006, 2009. Available: https://repository.alt.ac.uk/629/1/US_DepEdu_Final_report_2009.pdf | |
dc.relation | /*ref*/T. Bretag, Handbook of Academic Integrity. Singapore: Springer Singapore, 2016. https://doi.org/10.1007/978-981-287-098-8 | |
dc.relation | /*ref*/A. K. Jain, A. Ross, and S. Prabhakar, “An Introduction to Biometric Recognition,” IEEE Trans. Circuits Syst. Video Technol., vol. 14, no. 1, pp. 4–20, Jan. 2004. https://doi.org/10.1109/TCSVT.2003.818349 | |
dc.relation | /*ref*/W. L. Bryan and N. Harter, “Studies in the physiology and psychology of the telegraphic language.,” Psychol. Rev., vol. 4, no. 1, pp. 27–53, 1897. https://doi.org/10.1037/h0073806 | |
dc.relation | /*ref*/R. Joyce and G. Gupta, “Identity authentication based on keystroke latencies,” Commun. ACM, vol. 33, no. 2, pp. 168–176, Feb. 1990. https://doi.org/10.1145/75577.75582 | |
dc.relation | /*ref*/K. Longi, J. Leinonen, H. Nygren, J. Salmi, A. Klami, and A. Vihavainen, “Identification of programmers from typing patterns,” in Proceedings of the 15th Koli Calling Conference on Computing Education Research - Koli Calling ’15, Koli Finland, 2015. pp. 60–67. https://doi.org/10.1145/2828959.2828960 | |
dc.relation | /*ref*/S. Krishnamoorthy, L. Rueda, S. Saad, and H. Elmiligi, “Identification of User Behavioral Biometrics for Authentication Using Keystroke Dynamics and Machine Learning,” in Proceedings of the 2018 2nd International Conference on Biometric Engineering and Applications - ICBEA ’18, Amsterdam, 2018. pp. 50–57. https://doi.org/10.1145/3230820.3230829 | |
dc.relation | /*ref*/J. R. Young, R. S. Davies, J. L. Jenkins, and I. Pfleger, “Keystroke Dynamics: Establishing Keyprints to Verify Users in Online Courses,” Comput. Sch., vol. 36, no. 1, pp. 48–68, Jan. 2019. https://doi.org/10.1080/07380569.2019.1565905 | |
dc.relation | /*ref*/A. Morales, M. Falanga, J. Fierrez, C. Sansone, and J. Ortega-Garcia, “Keystroke dynamics recognition based on personal data: A comparative experimental evaluation implementing reproducible research,” in 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS), Arlington, 2015. pp. 1–6. https://doi.org/10.1109/BTAS.2015.7358772 | |
dc.relation | /*ref*/M. W. Shelly. Frankestein or, the modern Prometheus. London: Penguin, 2007. Available: https://books.google.com.co/books/about/Frankenstein_Or_The_Modern_Prometheus.html?id=4JzWAAAAMAAJ&redir_esc=y | |
dc.relation | /*ref*/D. Yu and L. Deng, Automatic Speech Recognition. London: Springer London, 2015. https://doi.org/10.1007/978-1-4471-5779-3 | |
dc.relation | /*ref*/D. A. Reynolds, T. F. Quatieri, and R. B. Dunn, “Speaker Verification Using Adapted Gaussian Mixture Models,” Digit. Signal Process., vol. 10, no. 1–3, pp. 19–41, Jan. 2000. https://doi.org/10.1006/dspr.1999.0361 | |
dc.relation | /*ref*/D. A. Reynolds and R. C. Rose, “Robust text-independent speaker identification using Gaussian mixture speaker models,” IEEE Trans. Speech Audio Process., vol. 3, no. 1, pp. 72–83, 1995. https://doi.org/10.1109/89.365379 | |
dc.relation | /*ref*/M. Nishida and T. Kawahara, “Speaker model selection based on the Bayesian information criterion applied to unsupervised speaker indexing,” IEEE Trans. Speech Audio Process., vol. 13, no. 4, pp. 583–592, Jul. 2005. https://doi.org/10.1109/TSA.2005.848890 | |
dc.relation | /*ref*/P. Mahalanobis, "On the generalized distance in statistic", National Institute of Science of India, vol 2, no 1, pp. 49-55, Apr. 1936. Available: http://library.isical.ac.in:8080/xmlui/bitstream/handle/123456789/6765/Vol02_1936_1_Art05-pcm.pdf?sequence=1&isAllowed=y | |
dc.relation | /*ref*/T. Arias-Vergara, J.C. Vásquez-Correa, J. R. Orozco-Arroyave, J. F Vargas-Bonilla and E. Nöth, “Parkinson's Disease Progression Assessment from Speech Using GMM-UBM”, Proceedings of Interspeech, pp 1933-1937, San Francisco, 2016. Available: https://www.isca-speech.org/archive/Interspeech_2016/pdfs/1122.PDF | |
dc.relation | /*ref*/A. Peacock, X. Ke, and M. Wilkerson, “Typing patterns: a key to user identification,” IEEE Secur. Priv. Mag., vol. 2, no. 5, pp. 40–47, Sep. 2004. https://doi.org/10.1109/MSP.2004.89 | |
dc.relation | /*ref*/N. Garcia-Ospina, J.-R. Orozco-Arroyave, and J.-F. Vargas-Bonilla, “Speaker Verification System for Online Education Platforms,” in 2018 International Carnahan Conference on Security Technology (ICCST), Montreal, 2018. pp. 1–5. https://doi.org/10.1109/CCST.2018.8585602 | |
dc.relation | /*ref*/X. Jiang, S. Wang, X. Xiang, and Y. Qian, “Integrating online i-vector into GMM-UBM for text-dependent speaker verification,” in 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), Kuala, 2017. pp. 1628–1632. https://doi.org/10.1109/APSIPA.2017.8282293 | |
dc.rights | Copyright (c) 2020 TecnoLógicas | en-US |
dc.rights | http://creativecommons.org/licenses/by-nc-sa/4.0 | en-US |
dc.source | TecnoLógicas; Vol. 23 No. 47 (2020); 197-211 | en-US |
dc.source | TecnoLógicas; Vol. 23 Núm. 47 (2020); 197-211 | es-ES |
dc.source | 2256-5337 | |
dc.source | 0123-7799 | |
dc.subject | Biometrics | en-US |
dc.subject | Identity verification | en-US |
dc.subject | Keystroke dynamics | en-US |
dc.subject | Virtual Education | en-US |
dc.subject | Biometría | es-ES |
dc.subject | dinámica de tecleo | es-ES |
dc.subject | educación virtual | es-ES |
dc.subject | verificación de identidad | es-ES |
dc.title | Identity Verification in Virtual Education Using Biometric Analysis Based on Keystroke Dynamics | en-US |
dc.title | Verificación de identidad en la educación virtual mediante análisis biométrico basado en la dinámica del tecleo | es-ES |
dc.type | info:eu-repo/semantics/article | |
dc.type | info:eu-repo/semantics/publishedVersion | |
dc.type | Research Papers | en-US |
dc.type | Artículos de investigación | es-ES |
Ficheros en el ítem
Ficheros | Tamaño | Formato | Ver |
---|---|---|---|
No hay ficheros asociados a este ítem. |
Este ítem aparece en la(s) siguiente(s) colección(ones)
-
tecnologia [520]