THE APPLICATION OF FINGERPRINTS AUTHENTICATION IN DISTANCE EDUCATION
Hamid JAN
hod.csit@suit.edu.pkSarhad university of Science & Information Technology, Landi Akhund Ahmad, Ring Road, Peshawar 25000 (Poland)
Beena HAMID
(Pakistan)
Abstract
Currently the distance education has obtained a wider ever acceptance. One of the main tasks of distance education is the process of checking student’s knowledge by online examination. To conduct a fair examination and prevent unauthorized users to appear in the examination, different biometric technologies are used; we in this paper implement a fingerprint biometric system for distance education students and found by survey that the students are comfortable with fingerprint biometric system.
Keywords:
distance education, online examination, authentication, assessment, Biometric systemReferences
Aggarwaltt, G., Rathat, N. K., Jeat, T. Y., & Bollet, R. M. (2008). Gradient based Textural Characterization of Fingerprints. In 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems (pp. 1–5). Arlington, VA. https://doi.org/10.1109/BTAS.2008.4699383
DOI: https://doi.org/10.1109/BTAS.2008.4699383
Google Scholar
Agulla, E. G., Rifón, L. A., Castro, J. L. A., & Mateo, C. G. (2008). Is my student at the other side? Applying Biome tric Web Authentication to E-Learning Environments. In 2008 Eighth IEEE International Conference on Advanced Learning Technologies (pp. 551–553). Santander, Cantabria. https://doi.org/10.1109/ICALT.2008.184
DOI: https://doi.org/10.1109/ICALT.2008.184
Google Scholar
Alavi, M., & Leidner, D. (2016). Research commentary: Technology mediated learning-a call for greater depth and breadth of research. Information Systems Research, 12(1), 1–10. doi:10.1287/isre.12.1.1.9720
DOI: https://doi.org/10.1287/isre.12.1.1.9720
Google Scholar
Ali, I., Ali, U., Shahzad, M. I., & Malik, A. W. (2006). Face and fingerprint biometrics integration model for person identification using gabor filter. In IEEE International Conference on Computer Systems and Applications (pp. 140–143). Dubai, UAE. https://doi.org/10.1109/AICCSA.2006.205081
DOI: https://doi.org/10.1109/AICCSA.2006.205081
Google Scholar
Althaff, I., Syusaku, N., Karim, O., &Yoshimi, F. (2009). Face-based Access Control and Invigilation Tool for e-Learning Systems. In 2009 International Conference on Biometrics and Kansei Engineering (pp. 40–44). Cieszyn. https://doi.org/10.1109/ICBAKE.2009.43
DOI: https://doi.org/10.1109/ICBAKE.2009.43
Google Scholar
Apampa, K. M., Wills, G., & Argles, D. (2010). An approach to presence verification in summative e-assessment security. In 2010 International Conference on Information Society (pp. 647–651). London.
DOI: https://doi.org/10.1109/i-Society16502.2010.6018836
Google Scholar
Ayodele, T., Shoniregun, C. A., & Akmayeva, G. (2011). Toward e-learning security: A machine learning approach. In International Conference on Information Society (i-Society 2011) (pp. 490–492). London.
DOI: https://doi.org/10.1109/i-Society18435.2011.5978544
Google Scholar
Frischholz, R. W., & Dieckmann, U. (2000). Bioid: A Multimodal Biometric Identification System. Computer, 33(2), 64–68.
DOI: https://doi.org/10.1109/2.820041
Google Scholar
Green, N., & Romney, G. W. (2005). Establishing Public Confidence in the Security of Fingerprint Biometrics. In 005 6th International Conference on Information Technology Based Higher Education and Training (pp. S3C/15-S3C/18). Santo Domingo. https://doi.org/10.1109/ITHET.2005.1560332
DOI: https://doi.org/10.1109/ITHET.2005.1560332
Google Scholar
Hsieh, W., & Leu, J. (2011). Design of a time and location based One-Time Password authentication scheme. In 2011 7th International Wireless Communications and Mobile Computing Conference (pp. 201–206). Istanbul. https://doi.org/10.1109/IWCMC.2011.5982418
DOI: https://doi.org/10.1109/IWCMC.2011.5982418
Google Scholar
King, C. G., Guyette, R. W., & Piotrowski, C. (2009). Online exams and cheating: An empirical analysis of business students ’views’. The Journal of Educators Online, 6(1), 1–11.
DOI: https://doi.org/10.9743/JEO.2009.1.5
Google Scholar
Maltoni, D., Maio, D., Jain, A. K., & Prabhakar, S. (2003). Handbook of Fingerprint Recognition. London: Springer.
Google Scholar
Modiri, N., Farahi, A., & Ketabi, S. (2011). Providing security framework for holding electronic examination in virtual universities. In The 7th International Conference on Networked Computing and Advanced Information Management (pp. 73–79). Gyeongju.
Google Scholar
Ratha, N. K., Connell, J. H., & Bolle, R. (2001). An analysis of minutiae matching strength. In: J.Bigun & F. Smeraldi (Eds.), Audio- and Video-Based Biometric Person Authentication. AVBPA 2001. Lecture Notes in Computer Science (vol. 2091). Berlin, Heidelberg: Springer. https://doi.org/10.1007/3-540-45344-X_32
DOI: https://doi.org/10.1007/3-540-45344-X_32
Google Scholar
Takahashi, Y., Abiko, T., & Negishi, E. (2006). An Ontology-based System for Network Security. In 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers) (pp. 197–202 vol.1). Taipei, Taiwan. https://doi.org/10.1109/AINA.2005.116
DOI: https://doi.org/10.1109/AINA.2005.116
Google Scholar
Williams, J. W. (2002). Biometrics or ... biohazards? In Proceedings of the 2002 Workshop on New Security Paradigms NSPW '02 (pp. 97–107). https://doi.org/10.1145/844118.844120
DOI: https://doi.org/10.1145/844102.844120
Google Scholar
Authors
Hamid JANhod.csit@suit.edu.pk
Sarhad university of Science & Information Technology, Landi Akhund Ahmad, Ring Road, Peshawar 25000 Poland
Authors
Beena HAMIDPakistan
Statistics
Abstract views: 90PDF downloads: 20
License
This work is licensed under a Creative Commons Attribution 4.0 International License.
All articles published in Applied Computer Science are open-access and distributed under the terms of the Creative Commons Attribution 4.0 International License.
Most read articles by the same author(s)
- Hamid JAN, Amjad ALI, OPTIMIZATION OF FINGERPRINT SIZE FOR REGISTRATION , Applied Computer Science: Vol. 15 No. 2 (2019)
Similar Articles
- Elvis COUTIÑO-MORENO, Quirino ESTRADA, Daniel MALDONADO-ONOFRE, Alejandro RODRIGUEZ-MENDEZ, Julio GOMEZ-GIRON, RESOLUTION IN THE 3D MODELING OF OBJECTS FOR ADDITIVE MANUFACTURING AND REVERSE ENGINEERING – SHUTTER EFFECT , Applied Computer Science: Vol. 17 No. 1 (2021)
- Piotr WITTBRODT, Iwona ŁAPUŃKA, Gulzhan BAYTIKENOVA, Arkadiusz GOLA, Alfiya ZAKIMOVA, IDENTIFICATION OF THE IMPACT OF THE AVAILABILITY FACTOR ON THE EFFICIENCY OF PRODUCTION PROCESSES USING THE AHP AND FUZZY AHP METHODS , Applied Computer Science: Vol. 18 No. 4 (2022)
- Jacek CABAN, Grzegorz LITAK, Bartłomiej AMBROŻKIEWICZ, Leszek GARDYŃSKI, Paweł STĄCZEK, Piotr WOLSZCZAK, IMPACT-BASED PIEZOELECTRIC ENERGY HARVESTING SYSTEM EXCITED FROM DIESEL ENGINE SUSPENSION , Applied Computer Science: Vol. 16 No. 3 (2020)
- Maria TOMASIKOVA, Frantisek BRUMERČÍK, Aleksander NIEOCZYM, DESIGN AND DYNAMICS MODELING FOR ELECTRIC VEHICLE , Applied Computer Science: Vol. 13 No. 3 (2017)
- Damian KOLNY, Dorota WIĘCEK, Paweł ZIOBRO, Martin KRAJČOVIČ, APPLICATION OF A COMPUTER TOOL MONITORING SYSTEM IN CNC MACHINING CENTRES , Applied Computer Science: Vol. 13 No. 4 (2017)
- Marcin Badurowicz, Sebastian Łagowski, USAGE OF IOT EDGE APPROACH FOR ROAD QUALITY ANALYSIS , Applied Computer Science: Vol. 19 No. 1 (2023)
- Isaac FLORES-HERNÁNDEZ, Edmundo BONILLA-HUERTA, Perfecto MALAQUIAS QUINTERO-FLORES, Oscar Atriano PONCE, José Crispín HERNÁNDEZ-HERNÁNDEZ, APPLYING INTELLIGENT TECHNIQUES FOR TALENT RECRUITMENT , Applied Computer Science: Vol. 15 No. 2 (2019)
- Olutayo BOYINBODE, Paul OLOTU, Kolawole AKINTOLA, DEVELOPMENT OF AN ONTOLOGY-BASED ADAPTIVE PERSONALIZED E-LEARNING SYSTEM , Applied Computer Science: Vol. 16 No. 4 (2020)
- Józef MATUSZEK, Tomasz SENETA, Aleksander MOCZAŁA, FUZZY ASSESSMENT OF MANUFACTURABILITY DESIGN FOR MACHINING , Applied Computer Science: Vol. 15 No. 3 (2019)
- Rafał WOJSZCZYK, VERIFICATION OF ACCURACY AND COST OF USE METHODS OF QUALITY ASSESSMENT OF IMPLEMENTATION OF DESIGN PATTERNS , Applied Computer Science: Vol. 15 No. 1 (2019)
<< < 1 2 3 4 5 6 7 8 9 10 > >>
You may also start an advanced similarity search for this article.