Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3486622.3493993acmconferencesArticle/Chapter ViewAbstractPublication PageswiConference Proceedingsconference-collections
short-paper
Open access

Applying Benford's Law as an Efficient and Low-cost Solution for Verifying the Authenticity of Users’ Video Streams in Learning Management Systems

Published: 13 April 2022 Publication History

Abstract

An important challenge of online learning management systems (LMS) relates to continuously verifying the identity of students even after they have successfully authenticated. Although various continuous user identification solutions exist, they are rather focused on complex examination proctoring systems. Challenges further increase within large-scale online courses, which require a strong infrastructure to support numerous real-time video streams for verifying the identity of students. Considering that the students’ input video stream is an important factor for verifying their identity, and given that naturally generated data streams have been found to adhere to a pre-defined behavior as indicated by the Benford's law, in this work we investigate whether Benford's law can be applied as a reliable, efficient and cost-effective method for the detection of authentic vs. pre-recorded input video streams during continuous students’ identity verification within online LMS. In doing so, we suggest a prediction model based on the distribution of the first digits of image Discrete Cosine Transform (DCT) coefficients from the students’ input video stream. We found that the input video stream type (authentic vs. pre-recorded) can be inferred within a few seconds in real-time. A system performance evaluation indicates that the suggested model can support up to 1000 concurrent online students using a conventional and low-cost server setup and architecture.

References

[1]
Fidas, C., Belk, M., Portugal, D., & Pitsillides, A. (2021). Privacy-preserving Biometric-driven Data for Student Identity Management: Challenges and Approaches. ACM UMAP 2021, ACM Press, 368-370.
[2]
Fenu, G., Marras, M., & Boratto, L. (2018). A multi-biometric system for continuous student authentication in e-learning platforms. Pattern Recognition Letters, 113, 83-92.
[3]
Frank, M., Biedert, R., Ma, E., Martinovic, I., & Song, D. (2012). Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE transactions on information forensics and security, 8(1), 136-148.
[4]
Shahzad, M., & Singh, M. P. (2017). Continuous authentication and authorization for the internet of things. IEEE Internet Computing, 21(2), 86-90.
[5]
Belk M., Fidas C., Germanakos P., Samaras G. (2012). Do Cognitive Styles of Users affect Preference and Performance related to CAPTCHA?. In Proceedings of Extended Abstracts on Human Factors in Computing Systems (CHI 2012), ACM Press, 1487-1492.
[6]
Fu, D., Shi, Y. Q., & Su, W. (2007). A generalized Benford's law for JPEG coefficients and its applications in image forensics. Security, Steganography, and Watermarking of Multimedia Contents, 6505, 65051L.
[7]
Bonettini, N., Bestagini, P., Milani, S., & Tubaro, S. (2020). On the use of Benford's law to detect GAN-generated images. In 2020 25th International Conference on Pattern Recognition (ICPR) (pp. 5495-5502). IEEE.
[8]
Flior, E., & Kowalski, K. (2010). Continuous biometric user authentication in online examinations. In 2010 Seventh International Conference on Information Technology: New Generations (pp. 488-492). IEEE.
[9]
Atoum, Yousef, Liping Chen, Alex X. Liu, Stephen DH Hsu, & Xiaoming Liu (2017). Automated online exam proctoring. IEEE Transactions on Multimedia 19, no. 7, 1609-1624.
[10]
Moini, A., & Madni, A. M. (2009). Leveraging biometrics for user authentication in online learning: a systems perspective. IEEE Systems Journal, 3(4), 469-476.
[11]
Agulla, E. G., Rúa, E. A., Castro, J. L. A., Jiménez, D. G., & Rifón, L. A. (2009). Multimodal biometrics-based student attendance measurement in learning management systems. In 2009 11th IEEE International Symposium on Multimedia (pp. 699-704). IEEE.
[12]
Asha, S., & Chellappan, C. (2008). Authentication of e-learners using multimodal biometric technology. In 2008 International Symposium on Biometrics and Security Technologies (pp. 1-6). IEEE.
[13]
Constantinides, A., Belk, M., Fidas, C. & Pitsillides, A., (2020). An eye gaze-driven metric for estimating the strength of graphical passwords based on image hotspots. In Proceedings of the 25th International Conference on Intelligent User Interfaces. ACM IUI 2020, ACM Press, 33-37.
[14]
Morales, A., & Fierrez, J. (2015). Keystroke biometrics for student authentication: A case study. In Proceedings of the 2015 ACM Conference on Innovation and Technology in Computer Science Education (pp. 337-337).
[15]
Fidas, C., Voyiatzis, A., Avouris, N. (2011). On the Necessity of User-Friendly CAPTCHA. In Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI 2011), ACM Press, 2623-2626.
[16]
Pasquini, C., Boato, G., & Pérez-González, F. (2014). Multiple JPEG compression detection by means of Benford-Fourier coefficients. In 2014 IEEE International Workshop on Information Forensics and Security (WIFS) (pp. 113-118). IEEE.
[17]
Acebo, E., & Sbert, M. (2005). Benford's law for natural and synthetic images. In Proceedings of the First Eurographics conference on Computational Aesthetics in Graphics, Visualization and Imaging (pp. 169-176).
[18]
Makrushin, A., Kraetzer, C., Neubert, T., & Dittmann, J. (2018). Generalized Benford's Law for Blind Detection of Morphed Face Images. In Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security (pp. 49-54).
[19]
Fidas, C., Komis, V., Avouris, N., Dimitracopoulou, A. (2002). Collaborative Problem Solving using an Open Modeling Environment. In Proceedings of Computer Support For Collaborative Learning: Foundations For A CSCL Community (CSCL 2002), Lawrence Erlbaum Associates, 654-655
[20]
Belk, M., Papatheocharous, E., Germanakos, P., Samaras G. (2013). Modeling Users on the World Wide Web based on Cognitive Factors, Navigation Behavior and Clustering Techniques. Journal of Systems and Software, Special Issue on Web 2.0 Engineering: New Practices and Emerging Challenges, 86(12), 2995-3012.
[21]
Villanueva, A., Ponz, V., Sesma-Sanchez, L., Ariz, M., Porta, S., & Cabeza, R. (2013). Hybrid method based on topography for robust detection of iris center and eye corners. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), 9(4), 1-20.
[22]
Crawford, J., Butler-Henderson, K., Rudolph, J., Malkawi, B., Glowatz, M., Burton, R., Magni, P. & Lam, S. (2020). COVID-19: 20 countries’ higher education intra-period digital pedagogy responses. Journal of Applied Learning & Teaching, 3(1), 1-20.
[23]
Constantinides, C., Constantinides, A., Belk, M., Fidas, C., & Pitsillides, A. (2021). A Comparative Study among Different Computer Vision Algorithms for Assisting Users in Picture Password Composition. ACM UMAP 2021, ACM Press, 357-362.
[24]
Pevny, T., & Fridrich, J. (2008). Detection of double-compression in JPEG images for applications in steganography. IEEE Transactions on information forensics and security, 3(2), 247-258.
[25]
Margaritis, M., Fidas, C., Avouris, N., Komis, V. (2003). A peer-to-peer architecture for synchronous collaboration over low-bandwidth networks. In Proceedings of the Panhellenic Conference on Informatics (PCI 2003), ACM Press, 231-242.
[26]
Komis, V., Avouris, N., Fidas, C. (2002). Computer-Supported Collaborative Concept Mapping: Study of Synchronous Peer Interaction. Education and Information Technologies, 7, 169-188.
[27]
Pasquini, C., Boato, G., & Pérez-González, F. (2017). Statistical detection of JPEG traces in digital images in uncompressed formats. IEEE Transactions on Information Forensics and Security, 12(12), 2890-2905.
[28]
Leonidou, P., Constantinides, A., Belk, M., Fidas, C., Pitsillides, A. (2021). Eye Gaze and Interaction Differences of Holistic Versus Analytic Users in Image-Recognition Human Interaction Proof Schemes. In Proceedings of the HCI International 2021 (HCII 2021), 27, 66-75.
[29]
Fidas C., Hussmann H., Belk M., Samaras G. (2015). iHIP: Towards a User Centric Individual Human Interaction Proof Framework. Proceedings of the Extended Abstracts on Human Factors in Computing Systems (CHI 2015), Seoul, South Korea, ACM Press, 2235-2240.
[30]
Traoré, I., Nakkabi, Y., Saad, S., Sayed, B., Ardigo, J. D., & de Faria Quinan, P. M. (2017). Ensuring online exam integrity through continuous biometric authentication. In Information Security Practices (pp. 73-81). Springer, Cham.
[31]
Milani, S., Tagliasacchi, M., & Tubaro, S. (2014). Discriminating multiple JPEG compressions using first digit features. APSIPA Transactions on Signal and Information Processing, 3.

Cited By

View all
  • (2023)Ensuring Academic Integrity and Trust in Online Learning Environments: A Longitudinal Study of an AI-Centered Proctoring System in Tertiary Educational InstitutionsEducation Sciences10.3390/educsci1306056613:6(566)Online publication date: 31-May-2023

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WI-IAT '21: IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology
December 2021
698 pages
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 April 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Benford's Law
  2. Continuous User Identification
  3. Distance Learning
  4. Image Forensics
  5. Learning Management Systems

Qualifiers

  • Short-paper
  • Research
  • Refereed limited

Funding Sources

Conference

WI-IAT '21
Sponsor:
WI-IAT '21: IEEE/WIC/ACM International Conference on Web Intelligence
December 14 - 17, 2021
VIC, Melbourne, Australia

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)158
  • Downloads (Last 6 weeks)31
Reflects downloads up to 06 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Ensuring Academic Integrity and Trust in Online Learning Environments: A Longitudinal Study of an AI-Centered Proctoring System in Tertiary Educational InstitutionsEducation Sciences10.3390/educsci1306056613:6(566)Online publication date: 31-May-2023

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media