Biometrics are distinctive for each person, and can not be given away or hacked like a password. Keystroke dynamics is a behavioral biometric characteristic that can be used as a complementary authentication step [1]. In online examinations it is difficult to make sure that each student write their own work. Keystroke dynamics from these examinations could be used to detect attempted cheating. To detect cheating attempts, a Gaussian Mixture Models with Universal Background Model (GMM-UBM) was implemented, and tested on benchmark data set recorded from online examinations written in free text. The use of a Universal Background Model (UBM) allows students to be enrolled using a limited amount of data, making the sug- gested approach suitable ...
Abstract: Gaussian Mixture Models (GMMs) has been proposed for off-line signature verification. The...
Anomaly detection methods of keystroke dynamics have been proposed for enhanced biometric security f...
In the modern day and age, credential based authentication systems no longer provide the level of se...
Keystroke and stylometry behavioral biometrics were investigated with the objective of developing a ...
Recently, behavioral biometric-based user authentication methods, such as keystroke dynamics, have b...
In this work we present: i) an analysis of biometric technologies for online student authentication;...
This work presents a case study on the application of biometric systems for student authentication s...
The 2008 Federal Higher Education Opportunity Act requires institutions of higher learning to make g...
Behavioural biometrics is the field of study related to the measure of uniquely identifying and meas...
International audienceUnlock patterns are used for authentication in mobile smart devices, yet they ...
International audienceDistant learning is an alternative solution to education when the learner is f...
In today’s age the use of computers has increased exponentially with a variety of online application...
The majority of computer systems employ a login ID and password as the principal method for access s...
This thesis relates to studying possibilities of detecting online examination cheating through the m...
With the establishment of the information society, security had become the greatest concern for Inst...
Abstract: Gaussian Mixture Models (GMMs) has been proposed for off-line signature verification. The...
Anomaly detection methods of keystroke dynamics have been proposed for enhanced biometric security f...
In the modern day and age, credential based authentication systems no longer provide the level of se...
Keystroke and stylometry behavioral biometrics were investigated with the objective of developing a ...
Recently, behavioral biometric-based user authentication methods, such as keystroke dynamics, have b...
In this work we present: i) an analysis of biometric technologies for online student authentication;...
This work presents a case study on the application of biometric systems for student authentication s...
The 2008 Federal Higher Education Opportunity Act requires institutions of higher learning to make g...
Behavioural biometrics is the field of study related to the measure of uniquely identifying and meas...
International audienceUnlock patterns are used for authentication in mobile smart devices, yet they ...
International audienceDistant learning is an alternative solution to education when the learner is f...
In today’s age the use of computers has increased exponentially with a variety of online application...
The majority of computer systems employ a login ID and password as the principal method for access s...
This thesis relates to studying possibilities of detecting online examination cheating through the m...
With the establishment of the information society, security had become the greatest concern for Inst...
Abstract: Gaussian Mixture Models (GMMs) has been proposed for off-line signature verification. The...
Anomaly detection methods of keystroke dynamics have been proposed for enhanced biometric security f...
In the modern day and age, credential based authentication systems no longer provide the level of se...