[go: up one dir, main page]

Academia.eduAcademia.edu

Multimodal biometric authentication for a computer-based test (CBT) application

2020, International Research Journal of Computer Science

This paper proposed a computer-based test (CBT) mobile application with a multimodal biometric authentication. Authentication is a vital process in verifying the identity of a person based on certain input requirements. The need for such a system has become necessary due to the increasing number of examination malpractice cases during the conduct of examinations in Nigerian tertiary institutions. One of the major forms of examination malpractices identified is impersonation. The study was carried out on the state of computer-based tests in the University of Jos, Nigeria, it was implemented and used to get observations, findings, and relevant information on how the proposed system can address impersonation. In the case study, discomfort, faulty computers, network failure were part of the issues faced during the conduct of computer-based tests. The implementation of the mobile application was done with Flutter (a framework of dart programming language). Python (python facial recognition package server) was used to handle face recognition. The backend uses a No SQL database known as Firebase (Firebase collections/real-time database) which was used to store all data and carry out other related user validation functions. The work presented has rebounded to solving the problem of examination malpractice and impersonation in computer-based tests in the University of Jos as observed during validation with up to 97% level of reliability at different levels of authentication which make the solution a highly recommended system with state-of-the-earth results.

International Research Journal of Computer Science (IRJCS) Issue 07, Volume 07 (July 2020) ISSN: 2393-9842 https://www.irjcs.com/archives MULTIMODAL BIOMETRIC AUTHENTICATION FOR A COMPUTER-BASED TEST (CBT) APPLICATION Desmond Bala Bisandu Department of Computational Engineering Sciences, Cranfield University, UK Department of Computer Science, University of Jos, Nigeria desmond.bisandu@cranfield.ac.uk; bisandud@unijos.edu.ng Akos Shalom Department of Computer Science, University of Jos, Nigeria akosshalom@gmail.com Farouk LawanGambo Department of Computer Science, Federal University Dutse, Nigeria farouk.gambo@fud.edu.ng Publication History Manuscript Reference No: IRJCS/RS/Vol.07/Issue07/JLCS10082 Received: 05, July 2020 Accepted: 12, July 2020 Published: 16, July 2020 DOI: https://doi.org/10.26562/irjcs.2020.v0707.002 Citation: Desmond,Akos,Farouk(2020). Multimodal Biometric Authentication For a Computer-Based Test (CBT) Application.IRJCS:: International Research Journal of Computer Science, Volume VII, Issue VII,179-196. https://doi.org/10.26562/irjcs.2020.v0707.002 Peer-review: Double-blind Peer-reviewed Editor: Dr.A.Arul Lawrence Selvakumar, Chief Editor, IRJCS, AM Publications, India Copyright: ©2020 This is an open access article distributed under the terms of the Creative Commons Attribution License; Which Permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited Abstract: This paper proposed a computer-based test (CBT) mobile application with a multimodal biometric authentication. Authentication is a vital process in verifying the identity of a person based on certain input requirements. The need for such a system has become necessary due to the increasing number of examination malpractice cases during the conduct of examinations in Nigerian tertiary institutions. One of the major forms of examination malpractices identified is impersonation. The study was carried out on the state of computer-based tests in the University of Jos, Nigeria, it was implemented and used to get observations, findings, and relevant information on how the proposed system can address impersonation. In the case study, discomfort, faulty computers, network failure were part of the issues faced during the conduct of computer-based tests. The implementation of the mobile application was done with Flutter (a framework of dart programming language). Python (python facial recognition package server) was used to handle face recognition. The backend uses a No SQL database known as Firebase (Firebase collections/real-time database) which was used to store all data and carry out other related user validation functions. The work presented has rebounded to solving the problem of examination malpractice and impersonation in computer-based tests in the University of Jos as observed during validation with up to 97% level of reliability at different levels of authentication which make the solution a highly recommended system with state-of-the-earth results. Keywords: Biometrics, examination malpractice, authentication, facial recognition, fingerprint I. INTRODUCTION Malpractices in examinations have become a serious issue in Nigerian institutions today. This problem has led to increasing number of graduates who are not knowledgeable and are incompetent in their various fields of studies. It also makes students to lose confidence in them and depend on other students in examinations for solutions. One of such examination malpractices is impersonation, where a student claims to be another student, gets access to exam hall and writes the examinations for another student. _______________________________________________________________________________ __________________________________________________________________ © 2014-20, IRJCS: AM Publications, India - All Rights Reserved Page-179 International Research Journal of Computer Science (IRJCS) Issue 07, Volume 07 (July 2020) ISSN: 2393-9842 https://www.irjcs.com/archives In the University of Jos for example, impersonation during examinations has been one of the difficult forms of malpractice to handle. Other problems in line with this issue are: i. Increase in rate of imposters in examination hall. ii. Increase in dependence of students in other students. iii. Leak of examination questions and solutions. Another set of issues observed is that, in the current state of CBT examinations in the University of Jos for example, several complain have been made with regards to how examinations are conducted: i. Students complain about congestion during entrance to the examination hall due to large number of students taking the examinations. ii. Students complain about network failure during the examination sessions. iii. Students complain about power failure. iv. Faulty computers. Students complain about their computers going off during the examination which usually destabilizes them. In order to examine the problem of the study, the paper focuses on the development of a multimodal biometric recognition system for computer-based tests. This proposed a three-level authentication which could help improve the monitoring of the examinations. 1.1. Concept of biometrics The term biometrics refers to a method of identification and verification of a person based on his or her physical or behavioral traits. This method is gradually being generally accepted as a means of identification of an individual. Traditionally, individuals are verified using passwords or identification cards (ID), which can easily be bypassed. Hence, both methods are unreliable [1],[2]. In a biometric system, recognition, identification, and verification of an individual work by obtaining information from an individual through feature extraction and compares it with the model stored in a database. 1.1.1. Biometric authentication This is a computer-based method which is used to verify and grant access to an individual seeking for access into a system. Improvements were made on conventional techniques of authentication due to their poor reliability, through the development of biometric authentication which is a more reliable method for identifying persons in systems. It is considered as ‘biometrics’ most of the time. Reference [3] defines biometric authentication as the means of utilizing biological traits or behavioral characteristics for the purpose of authenticating a user. Similarly, [1], highlighted various factors of authentication, some of which are: fingerprint, face, iris, retina, gait and palm. 1.1.2. A brief history of biometric authentication systems The use of biometrics can be dated as far back as three decades ago. It was used for the purpose of capturing, analyzing and storing records of criminals. Ever since, it has evolved to become a very important aspect of authentication in diverse sectors. For instance, the attorney in advanced countries uses biometrics to take records and data of law defaulters. Similarly, The Federal Bureau of Investigation (FBI) of the United States Department of Justice makes use of a fingerprint matching system (automated) known as the IAFIS to capture rolled prints [4],[5]. The development of this technology began in 1999. It holds over fifty-five million records, which makes it the largest biometric database in the world. Most Immigration systems in foreign and advanced nations also make use of this technology. The ‘US-VISIT’ biometric authentication system is another similar project by the United States Department of Homeland Security (DHS) which is used for collecting, maintaining, and sharing information, that includes biometric identifiers on selected foreign citizens who are applying for visas or entry into the country [6], Due to lack of technological advancement in Africa caused by issues related to poverty, education, manpower, and general underdevelopment, traditional authentication methods such as user passwords and identification cards to gain access to resources in various systems are still in use. However, in more developed countries, biometric authentication systems are widely used in banking and finance sectors. Over time, there has been a little improvement lately in one of the most widely used banks in Nigeria: Diamond-Access bank. Their mobile banking application contains a fingerprint authentication method for protection of data. The use of fingerprint authentication to authenticate users in mobile applications was pioneered by the Royal Bank of Scotland (RBS) and NatWest [7]. In 2015, the Gartner Financial Services Cool Business awarded Citibank twice, for the implementation of voice recognition for identification. As a result of the increased level of security they provide, multimodal biometric authentication systems have recently got major attention. Reference [8], proposed the use of face and iris to protect medical documents. Similarly, a multimodal system which uses online digital signature and voice recognition to secure medical records was proposed by Krawczyk, [9]. Furthermore, a multimodal biometrics system which was used to secure internet banking applications was introduced by Catalin [10],[11]. There are various modes of biometric authentication systems in existence. _______________________________________________________________________________ __________________________________________________________________ © 2014-20, IRJCS: AM Publications, India - All Rights Reserved Page-180 International Research Journal of Computer Science (IRJCS) Issue 07, Volume 07 (July 2020) ISSN: 2393-9842 https://www.irjcs.com/archives 1.1.3. Modes of biometric authentication Inasmuch as there are a variety of biometric authentication mechanisms or approaches, all of them fall under one of these categories or modes: 1.1.3.1. Unimodal: There is many biometrics in use today. Most are still in the developmental stage, while others are widely used. Unimodal as the name suggests is a mode of biometrics in which its modes of operation are carried out in “one form”. We will discuss some of the biometrics that is part of this mode of operation. 1. Fingerprint: This is a biological pattern of valleys and ridges located on the tip of the finger which is used for verifying people’s identity. Its permanence, universality, accuracy, uniqueness, and low cost currently make it the leading biometric technology [1]. This technology has existed from about 7000 to 6000 BC [12]. In 1880, Henry Fault established a scientific foundation on modern fingerprint recognition by introducing the minutiae feature for fingerprint matching [12]. Currently, the classification of fingerprint recognition technique is the minutiae-based, the ridge feature-based, correlation-based [13], and the Gradient based [14].Most automated fingerprint identification systems make use of techniques which are based on minutiae points [13]. However, during acquisition of fingerprints, the noise and distortion of every finger leads to errors in minutiae extraction and hence results in missing features [15]. The ridge feature-based method is therefore used to overcome the weakness of the minutiae-based method. It makes use of features of ridges such as the frequency and orientation, shape and texture information for matching fingerprint. The ridge feature-based method also has its disadvantage. It suffers from low discrimination capability [12]. The correlation-based techniques superimpose two fingerprint images and correlate them (at the intensity level). These techniques are very sensitive to condition of the skin, non-linear distortion, different finger alignment and pressure [16]. The gradient based approach was later proposed for the purpose of capturing text related information, by splitting every minutia location into several local sections of which the histograms of oriented gradients are computed to characterize the textural information surrounding every minutiae location [17]. Regardless of the many advantages of a fingerprint biometric system, it also has several disadvantages which include vulnerability to damaged fingerprints, noise, and use of fake prints by intruders. 2. Face: this mode of recognition is difficult to bypass and very easy to use. There are a proposed number of algorithms for this method. They are divided into two: geometric feature-based and appearance-based. The geometric feature performs recognition by analyzation of specific local features alongside their geometric relationships. They are robust against determinants in illumination and viewpoints but are also very sensitive to the process of feature extraction. Because of lighting, changes in expression and poses in the image’s recognition of faces from still 2-Dimensional images is difficult. Hence, the 3dimensional face recognition has been proposed to counter these problems stated above. The disadvantages of the 3dimensional face recognition are its lack of sufficiently powerful algorithms, low accuracy for other acquisition types, decreased ease-of-use for laser sensors and high cost. 3. Voice recognition: this method uses factors related to physiology and behavior to produce patterns of that can be captured by a speech processor. Different properties are used for speech authentication. They include basic frequency, cadence, nasal tone, inflection etc. A voice recognition system is generally classified into two: the textdependent and text-independent modes. A dependent system usually performs better than a text-independent system due to the foreknowledge of what is said can be exploited to align speech signals into more discriminate classes. The text-dependent systems on the other hand need a user to pronounce specific words, which usually contains the same text as the data used for training. Voice recognition is broadly used today in diverse areas of life such as human verification systems in banks, mobile applications and lots of other verification systems. 4. Iris: It is a thin circular diaphragm which is located between the lens of the human eye and cornea. In 1987, Flom and Ara established the first concept of automated iris recognition whose implementation was further carried out [19]. Though his system is the most very popular and successful, several other systems have been developed. Reference [20], deployed an automatic algorithm for segmentation which was based on the circular Hough transform. Similarly, reference [21] extracted iris features by making use of a 1dimenional wavelet transform. There are other several which have also been developed for the iris recognition. Reference [22], proposed the use of Daugman‘s 2-Dimensional Gabor filter which contains quality measure enhancements. Furthermore, reference [23], also proposed making use of 1-Dimensional local texture patterns and [24] established making use of the moment- based iris blob for matching. 5. Palm-print: this region lies between the wrist and fingers. Its features such as ridges, minutia points, principal lines, singular points, texture and wrinkles can as well be used for verification [25]. Palm-print verification systems are of two types: the high-resolution and low-resolution palm-prints. The high-resolution systems us high resolution images, while the low-resolution systems make use of low-resolution images. The Figure 1 shows the diagram that explains the process of enrollment (registration), verification, and identification in a unimodal biometric system is done. Enrolment is the first process of registering a user’s characteristics information into the database. _______________________________________________________________________________ __________________________________________________________________ © 2014-20, IRJCS: AM Publications, India - All Rights Reserved Page-181 International Research Journal of Computer Science (IRJCS) Issue 07, Volume 07 (July 2020) ISSN: 2393-9842 https://www.irjcs.com/archives Figure 1: Workflow of a Unimodal Biometric System Required factors are scanned, which produces a signal or an image. In order to enhance the efficiency of this procedure and minimize the noise in a data, images that are scanned directly are being pre-processed. The registered template includes vector data which is used for the matching stage. Identification and verification are used interchangeably in literature sometimes, but both are distinct in nature. Identification means carrying out a one-to-many relationship (matching), where a scanned input is run through the templates of the database to get a match. Verification on the other hand simply means mapping an initially scanned input with an input that was scanned previously, thus, containing a one-to-one relationship system. 1.1.3.2. Multimodal This type of biometric system combines multiple sources of information to establish human identification. This method is highly effective and can significantly enhance accuracy. Most biometric systems used in practical applications today make use of single pieces of information for recognition which can be referred to as unimodal biometrics. Unimodal biometric systems however have several problems related to universality, prone to spoofing, noise in sensitive data, variations in intraclasses, similarities in inter-class. Some of these issues can be eliminated by making use of the multimodal systems. The multimodal systems comprise of two or more behaviors or traits to result in a more reliable system in terms of security and robustness. In this section, insight related to the architecture and implementation of biometric systems will be provided. A unimodal biometrics system generally works in three phases’ enrolment, verification and identification. Like the unimodal systems, these three processes also take place in the multimodal systems. In multimodal biometrics, fusion of information can be achieved at various levels: at the sensor level, at feature extraction level, at the matching score level and at the decision level. The sensor level fusion is barely used because it requires the obtained data from different biometric sensors to be compatible. Similarly, at the feature extraction level, fusion is not always achieved because feature sets that are used by several biometric modes might be incompatible or inaccessible. There is usually a limited amount of data available in the decision level due to its rigidity. Furthermore, as a result of the availability of enough information and ease of access and match scores combination, the matching score level is preferred [26]. Figure 2: Workflow of a Multimodal Biometric System 1.2. Computer based tests _______________________________________________________________________________ __________________________________________________________________ © 2014-20, IRJCS: AM Publications, India - All Rights Reserved Page-182 International Research Journal of Computer Science (IRJCS) Issue 07, Volume 07 (July 2020) ISSN: 2393-9842 https://www.irjcs.com/archives Computer-based test as the name implies, is the use of computers to carry out a test or assessments for students. Other terminologies that could be used interchangeably to describe Computer-Based Tests (C.B.T) include Computer Assisted Test (C.A.T), Computer Based Assessment (CBA), Online Assessment, Web-Based Assessment, Technology Enhanced Assessment, Automation Assessment, and E-Assessments or Examinations or Tests [27]. In Nigeria, the evaluation and assessment of students’ performance is traditionally carried out through paper and pen, and Computer-based tests (CBT). The paper-based test is the most common and widely used mode of assessment in Nigeria. This system is vulnerable to different forms of examination malpractices like illegal materials, writings on currency notes, spying other candidates, and altering of examination scores or grades. Other predominant modes are impersonation, leakage of exam questions to students before examinations, supervisors and school authorities conniving to cheat and writing on the body [28],[29]. Due to the highly effective tools they provide, computers and other related systems help to tackle the challenges related to the design and implementation of assessments methods that transcend the usual practices and enhance acquisition of cognitive skills and knowledge. 1.2.1. Concept and procedure of computer-based tests concept Computer-Based-Tests (CBT) is of two categories- the linear/fixed and the adaptive. The linear CBT method is a fulllength assessment. Here, the system selects different questions for a person without putting into consideration his level of performance [30]. This method is almost like the paper-based test. Reference [31], described computerbased testing as a method of administering tests in which the responses are electronically recorded, assessed, or both. Reference [32], furthermore, in a computer-based adaptive test, the difficulty level of each question given to the user is according to their ability. When each question is attempted, the computer makes use of the option to determine the next question to be presented. Compared to the traditional paper-based-examinations (PBE), computer-based-examinations (CBE) have a number of advantages which include lower cost of printing, easy administration, increased security level, rapid feedback in terms of multiple-option examinations, and a number of standard support tools [33]. In computer-based assessments, test timing can easily be managed, which ensures that every student is offered equal amount of time during each test. Unlike the paper-based tests, CBT’s which come in the format of an electronic file, makes things easy and reduces the necessity to print, keep track of, and mail tests. Then can be scored instantly, hence providing useful feedback to teachers and students. They also allow for students to access some support tools like dictionaries, text-to-speech, calculators, and permit using these tools of when appropriate and necessary [34]. Furthermore, CBE’s promote authentic and innovative assessments because of more enhanced technological performance. Some examples include using video clips and slide shows to evaluate the performance of medical students in surgeries or using computer-based simulations to evaluate social skills. However, there exist several disadvantages when carrying out CBE’s. These include the need for adequate facilities, back-up measures in the case of a technical fault, test-security, power failure and time for the staff and students to become acquainted with the new technologies. 1.2.2. Procedure During Computer-Based Tests, each student (after taking attendance or passing through verification on entrance to the examination hall) is assigned to a computer where he sits in front of, and attempts the questions presented on the computer monitor. After answering all questions, submission of answers is made using a mouse or keyboard [31]. In some CBT systems, results are displayed immediately after the student submits. For some, the results are computed afterwards, and students will see on their various notice boards. 1.3. Biometrics of computer-based examinations Over the years, the increase in the use of Computer Based Tests is very evident. However, the unethical conducts of students during e-learning has now become a major concern [35]. There is an argument that this unethical conduct has increased greatly due to the use of technology [36]. Most teachers’ focus is on one form of unethical behavior, which is known as [37],[38]. Reference [39], pointed out some mechanisms such as Turnitin.com which are used to detect and curb plagiarized works. Although, there are numerous materials on how to detect plagiarism, references [40]-[44], little effort and attention is given for preferring solutions to other unethical acts like cheating in CBTs. Yu and Tsao (2003) addressed the security issues of e-learning environments. However, their proposition focused on the aspect of shielding the infrastructures against unauthorized access. The current security procedures in elearning systems rely greatly on the use of password authorization factors. Reference [45], addressed several security related technologies which were not integrated to e-learning. One of the solutions is biometric technologies which might potentially result in an integral aspect of e-learning systems. Similarly, [46] noted that biometric technology has been commonly used to replace traditional password systems. Furthermore, Coventry, [47] noted and argued that with the needs for an increase in security, remembering passwords is becoming more difficult, whereas the fingerprints are a unique feature to a person. Yang and Verbauwhede identified a fingerprint biometric system where the fingerprint template is stored on a server when initiation takes place. _______________________________________________________________________________ __________________________________________________________________ © 2014-20, IRJCS: AM Publications, India - All Rights Reserved Page-183 International Research Journal of Computer Science (IRJCS) Issue 07, Volume 07 (July 2020) ISSN: 2393-9842 https://www.irjcs.com/archives While scanning the finger is carried out, an input device runs a biometric signal and sends it to the server, where it is later processed for matching. In the event to guard the system against security breach, Yang and Verbauwhede suggested that the fingerprint template be encrypted upon storage on the server. Fingerprints templates can be decoded whenever a matching takes place [42], [43] hereby recommended a secured procedure for fingerprints matching in a biometric system. They also argued that biometric systems provide more security than existing password systems. Biometric systems are more reliable, accurate and as well simpler to use compared to conventional password systems. Employing any biometric feature increases security to a system, especially for authentication sake. The subsequent parts of this paper are structured as such: Section 2 describing related concepts; Section 3 describing materials and methods, Section 4 describing design interface, experimental results, and discussions, and Section 5 which concludes with the future work. II. RELATED CONCEPTS The growth of the body of research which is focused on adopting better methods of managing e-examinations systems and e-learning system is rapidly increasing. Several research works have been carried out to see that there’s high efficiency in the use of computers for the sake of learning and assessments. Some of these projects are as follows: A web-based examination platform was developed and tested in Covenant University, Nigeria [5]. In this system, all registered applicants are subjected to participate in online entrance examination, to curb unethical conducts. This procedure was proposed by the examination body responsible for organizing entrance exams into Nigerian universities which is known as the Joint Admissions Matriculation Board (JAMB). Similarly, another web-based examination application is developed to curb the issues related to unethical conduct in examination. The system has a multiple-choice set of questions and on submission of answers, a student is scored and at once [5]. The application depends was designed using Microsoft technologies such as Microsoft.net, ASP.NET, C# and Microsoft SQL. It solely depends on these technologies for its operation to be achieved. A theoretical concept and approach were employed; which incorporates any available fingerprints authentication technology in collaboration with online learning environments to help in curbing any unethical conduct during the e-learning examinations [27]. This approach recommends practical solutions which could incorporate any random fingerprint authentication during e-examinations. Reference [30], described a web-based e-learning system which allowed for giving out and grading arithmetic questions, alongside the capability to accept input, return output, plot graphs dynamically and generate random mathematical expressions and digits. Reference [8], proposed an e-examination software that contained multiple options of questions, especially for the hearing impaired. This generic software is organized such that the examination materials are translated into finger spelling and sign language. The software also presents an empty template, making it possible for a teacher to employ the required exam for a topic (Mathematics, English, etc.) and any desired type of exams (Subjective or Objective etc.). Reference [20], examined how paper-based, web-based and mobile-based assessments influence the performance of students. To study the impact,38 students were used for the assessment experiment. This procedure was carried out for 3 weeks. In the first week, there was no significant different in the grades obtained by the students. However, there were observable differences that emerged in the second week. Hence, this paper brings to light that the students had a positive attitude towards using web and mobile based assessments due to their ease and simplicity of use, and feedback gotten instantly. This Section explored how computer-based tests have been carried out over time, their advantages over the traditional paper-based tests, their similarities with related literature and their drawbacks. The focus was centered on identifying certain features and functionalities that these systems possess, maximizing and integrating the key functionalities of the related work into a multimodal biometric mobile application for user authentication during computer-based tests. As observed from the literatures discussed above, all the systems mentioned are web-based applications. Therefore, this research will be focused on the mobile platform. This proposed solution is focused on enhancing the current process of authentication, by fusing fingerprint and facial recognition biometrics together to further help in curtailing examination impersonation in Nigeria. III. MATERIALS AND METHODS The method of software development which was employed for this project is the Object-Oriented Analysis and Design approach. This approach visualizes individual components of the system as objects, interacting together to produce the desired display system. In the System Development Life Cycle there is no overlapping in the phases consisting of the Analysis, Design, Implementation and Testing. Hence, this section addresses the methods and approach used to design the proposed system. _______________________________________________________________________________ __________________________________________________________________ © 2014-20, IRJCS: AM Publications, India - All Rights Reserved Page-184 International Research Journal of Computer Science (IRJCS) Issue 07, Volume 07 (July 2020) ISSN: 2393-9842 https://www.irjcs.com/archives 3.1. Proposed methodology The summary of the proposed system is explained in the subsections that follow. Figure 3 shows the framework and workflow of the developed application. The application is structured into three components. Figure 3: Conceptual model of the mobile application A. The Computer Based Test Application: This is the medium through which the student takes assessments and examinations and receives his scores for the written examinations and assessments and addresses any issue he is facing to the school. B. Image Recognition Server: This section of the application takes student details, alongside his image and fingerprint and stores in the database. The data is then retrieved during operation of the app. Image and finger recognition is then carried out during the process of logging in. C. Backend Server and Database: This is where the data retrieved from the mobile application is stored. It contains various collections (databases) which contain all information about the users, the examinations, records, assessments etc. This section is handled by Firebase (a google backend service). It also contains an admin dashboard where the admin uses to see information on the application and carries out desired or required operations. Figure 4: Workflow of a multimodal system The application makes use of the multimodal approach for biometric operations, for enrollment, verification and identification. The image recognition server and the fingerprint recognition component work together during the authentication process (Fusion), to give access to the application as shown in Figure 4. 3.1.1. Framework and method of operations For the purpose of implementation, Flutter (a framework of dart programming language), which supports objectoriented programming, was used to design the user interface and logic processes as shown if Figure 5. Figure 5: A 3-tier architecture of the CBT application _______________________________________________________________________________ __________________________________________________________________ © 2014-20, IRJCS: AM Publications, India - All Rights Reserved Page-185 International Research Journal of Computer Science (IRJCS) Issue 07, Volume 07 (July 2020) ISSN: 2393-9842 https://www.irjcs.com/archives It is designed in a way that it contains two stages of authentication the username and password, the image recognition and fingerprint. On registration in the application, alongside the username and password, the user is prompted and expected to register his photo. When the user comes to sign in, the first stage of the authentication is the username and password. If correctly entered, he’s navigated to the fingerprint recognition module. The fingerprint component on the mobile device carries out the recognition. If it matches the details, it navigates to the facial recognition module. The python server for recognition collects a captured image and matches it with the other image stored in the database during registration. If properly matched, fusion between the image recognition feature and the fingerprint takes place, and lead to a successful signing into the application. The case study will be carried out in the University of Jos, Plateau State Nigeria and it is explained in this section. 3.2.1. University of Jos current state of computer-based-tests Computer-based tests in the University of Jos is a commonly used in writing general subjects such as GST’s, computer science courses, and a good number of other courses. The university consists of about 12 faculties. Every session, students in their first and second years of studies are expected to sit for these examinations. These examinations are usually conducted in the multipurpose auditorium of the university. Before writing the examinations, the students are usually given a brief orientation on how the examination will hold, alongside other useful information regarding the examinations. Then they proceed to write the examinations. 3.2.2. Problems associated with the current method Over the years, a lot of issues have been repeatedly observed by exam officers and students with regards to the state of computer-based examinations in the school. Some of the issues are that: 1. Computers usually go off during examinations. 2. Network failure affects some of the students during the examinations, which causes their sessions to be lost while taking the exam. 3. Exhaustion in both staff and students due to the number of students that must take the examinations. 4. Impersonation is on the increase. Imposters come into the examination halls and write examinations for other students. 3.2.3. Advantages of proposed system Following the review on previously existing and current systems, it is obvious that most of them are web-based systems. The proposed system on the other hand is taking another approach, which is the mobile application system. In the current case study, the mode of taking examinations is that the students, taking the CBT’s from all faculties in the university, assemble at the multipurpose auditoriums and are being verified at the entrance before they go in to take the examinations. This process is usually tiring, time consuming and discomforting due to the number of students taking the tests. The proposed system seeks to ensure that each student is expected to have the application installed on their smart phones (with the requirements of the application). Instead of all the students to assemble at the multipurpose auditorium, the students will use their lecture halls for the examinations. In faculties or departments where the students are numerous, the lecturers will share the students in groups depending on their desired arrangements. The students will go into the halls depending on the number it can contain. At the desired time, the students will be asked to proceed the examinations or tests. This will greatly reduce stress and discomfort as mentioned above. The thought of using a mobile application to take tests and examinations seems to be a factor that would likely encourage malpractice. The user might want to minimize the application and communicate using other applications on the phone or browse answers. However, the application is designed in a way that if the user tries to leave the app once an examination or test session is going on, the application will automatically exit. This feature has countered that possibility. Also, the application will contain similar features with previously existing system such as user authentication, taking of test and examinations etc. together with more additional functionalities: It will give the user ability to see his results after writing a test or an examination, instead of trying to check it manually through boards. Since the CBT will be in form of an application, there will be a great reduction in congestion due to large number of students from different faculties coming to write the exam. Hence, the examinations will be taken in their various lecture halls or around the premises remotely. Unlike the other systems that contain one mode of biometric authentication, the proposed system consists of a more secured authentication procedure which consists of the fingerprint and facial recognition functionalities. This feature makes it almost impossible for another person to impersonate another student. In order to counter the possibility of trying to minimize the application and probably try to cheat by browsing or going through any materials on the phone, the app is designed in such a way that it exits an exam session immediately the student minimizes the application. 3.2.4. Architecture of the proposed multimodal biometric mobile application Architectural design is concerned with understanding how the system should be organized and design of the overall structure of the proposed system. It is the first stage in system development/design process. On initialization of the mobile application, the user is required to register or login if he/she already is registered. During the login process, a user is required to update a snapshot of an image, for the purpose of recognition. _______________________________________________________________________________ __________________________________________________________________ © 2014-20, IRJCS: AM Publications, India - All Rights Reserved Page-186 International Research Journal of Computer Science (IRJCS) Issue 07, Volume 07 (July 2020) ISSN: 2393-9842 https://www.irjcs.com/archives Once the process runs successfully, the user is navigated to the homepage. The system is made up of the following components: login component (which is done by the email, password and image recognition), signup components, profile, courses, examinations, tests, contact school, notification and logout. Figure 6 below shows the architecture of the mobile application. Figure 6: Architecture of the Proposed CBT application 3.2.4.1. System algorithm (Pseudocode) Pseudocode is an informal high-level description of the operating principle of a computer program or other algorithm. The pseudocode for the proposed multimodal biometric authentication mobile application from the administrators and students view is as shown in Figure 6a and Figure 6b. Figure 6a: Snippet of pseudo-code for mobile application (students view) Figure 6b: Snippet of pseudo-code for mobile application (Administrators view) _______________________________________________________________________________ __________________________________________________________________ © 2014-20, IRJCS: AM Publications, India - All Rights Reserved Page-187 International Research Journal of Computer Science (IRJCS) Issue 07, Volume 07 (July 2020) ISSN: 2393-9842 https://www.irjcs.com/archives 3.2.4.2. Entity relationship diagram (ERD) ERD is composed of entity types and the various relationships that exist between them. Figure 7 shows the entities in the system and how they relate with each other. Figure 7: Entity Relationship diagram of application 3.2.4.2. Activity diagram (AD) An activity diagram represents the sequence of activities available in an application in order to achieve a task. Figure 8a and Figure 8b shows the activity diagram of the proposed mobile application for students and administrators respectively. Figure 8a: Activity Diagram of mobile application (Student view) _______________________________________________________________________________ __________________________________________________________________ © 2014-20, IRJCS: AM Publications, India - All Rights Reserved Page-188 International Research Journal of Computer Science (IRJCS) Issue 07, Volume 07 (July 2020) ISSN: 2393-9842 https://www.irjcs.com/archives Figure 8b: Activity Diagram of mobile application (Administrators view) 3.2.4.2. Sequence diagram (SD) Sequence diagram shows the interaction between the user and the system in the order they occur. Figure 9 shows the sequence of interactions between users and the system. Figure 9: Sequence diagram of the system _______________________________________________________________________________ __________________________________________________________________ © 2014-20, IRJCS: AM Publications, India - All Rights Reserved Page-189 International Research Journal of Computer Science (IRJCS) Issue 07, Volume 07 (July 2020) ISSN: 2393-9842 https://www.irjcs.com/archives 3.2.5. System Modeling This process involves developing models (abstract) of the system. Each of these models developed present different perspectives or views of the system. It also involves the representation of the system using graphical notations which are usually based on Unified Modeling Language (UML). System models are developed as part of the requirements of engineering and design processes. The models used for developing the system is describe as follows: 3.2.5.1. Use case diagram This is an analysis concept which describes the actions of the systems from the user’s point of view. It visually represents relationships between users (actors) and the use cases, alongside documenting the intended behavior of the system which is usually focused on satisfying the goal of a user. Actors refer to entity or component that interacts with the system (i.e. a user or another system etc.). Lines and arrows are usually drawn between use cases and actors to indicate the relationships between them. A use case captures every possible way the system and user can interact towards achieving a goal as shown in Figure 10. Figure 10: CBT system case showing interaction between administrators and users use 3.2.5.2. Flow chart This is a diagram that represents an algorithm, workflow or sum of processes that describe the operation of the application as shown in Figure 11. Figure 11: Flowchart process of the CBT application _______________________________________________________________________________ __________________________________________________________________ © 2014-20, IRJCS: AM Publications, India - All Rights Reserved Page-190 International Research Journal of Computer Science (IRJCS) Issue 07, Volume 07 (July 2020) ISSN: 2393-9842 https://www.irjcs.com/archives IV. EXPERIMENTAL RESULTS AND DISCUSSIONS The discussion and results related to experiment are explained in this section. Where the various processes to check and reliability of the system and validity in real life situation was carried out and findings were recorded accordingly. 4.1. Choice of integrated development environment (IDE) and technologies An IDE (integrated development environment) is software that provides a computer programmer with tools for software development. The choice of IDE influences the speed of application development. For the sake of this research, a Microsoft technology which contains a variety of tools, integrations and programming languages known as Visual Studio Code is used. 4.2. Prototype operations The following sub sections illustrate the operation of the multimodal biometric authentication mobile application. The system consists of a 2-way mode of operation; students use the app on their phones, while the lecturer (administrator) makes use of the Firebase console dashboard to control the backend. The admin section is the medium through which questions can be pushed, notifications sent, students’ result being assessed etc. The application on the other hand, is used by the students to carry out their tests and examinations, submit, make reports to the administrator, and register for new courses and so on. 4.2.1. Registration screen The registration field contains fields which are required to be filled by the student in order to be registered in the database. Figure 12shows the registration screen for a student and the respective input fields. Figure 12: Registration page 4.2.2. Login page The login page is the first page to be displayed after the app has been launched. It contained 3 fields: the password field, the email field, and then the picture taken from the camera to be used for authenticating the user. This is shown in Figure 13. Figure 13: Login page with multimodal authentication _______________________________________________________________________________ __________________________________________________________________ © 2014-20, IRJCS: AM Publications, India - All Rights Reserved Page-191 International Research Journal of Computer Science (IRJCS) Issue 07, Volume 07 (July 2020) ISSN: 2393-9842 https://www.irjcs.com/archives 4.2.3. Home page and navigation menu After authentication is carried out successfully, the user is navigated to the homepage. By the left side is also the navigation menu which contains various pages of the app. Figure 14 shows the navigation menu which provides access to other application features and functionality. Figure 14: Side-navigation of application 4.2.4. Course page This page contains an available list of courses selected by a student during the period of registration as shown in Figure 15. Figure 15: Course page 4.2.5. Examinations page The examinations page is one of the core activities of the mobile application. It contains various courses registered by the student for the purpose of taking an examination. Figure 16 explains the examinations page. Figure 16: Examination page of the CBT application _______________________________________________________________________________ __________________________________________________________________ © 2014-20, IRJCS: AM Publications, India - All Rights Reserved Page-192 International Research Journal of Computer Science (IRJCS) Issue 07, Volume 07 (July 2020) ISSN: 2393-9842 https://www.irjcs.com/archives 4.2.6. Profile page The profile page contains all the information about the student as shown in Figure 17. Figure 17: Profile page 4.3. System testing and evaluation This section is concerned with testing the prototypes to ensure it satisfies all necessary requirement specification. Evaluation and testing are an unavoidable part of any software and information technology project. a) System reliability: This shows the capability of the software system in maintaining a desired rate of performance at a given duration in terms of recoverability, fault tolerance and maturity. System functionality b) This checks how efficient the system software is in meeting client's needs, usually in terms of how suitable, accurate, interoperable, and secure it is. Ease of use c) This criterion evaluates the effective usability of the software system; the amount of effort needed by users to properly make use of the software. 4.4. Testing The aim of this process is to identify any defect in a program. Even when the testing phase is completed, it is difficult to guarantee a hundred percent freedom from errors. The terms error, fault, bug, and defect are synonyms in the area of program testing. The goals of testing process are: a. Validation testing: this process is done to ensure that the developed software meets its intended requirements. b. Defect testing: the aim of this process is to discover and eliminate any faults, defects or errors that may be present in the software, and any behavior or component which is not in line with the intended specification. 4.5.1. System testing This process involves testing the whole system. The software system is tested through the following test stages for error detections and corrections. 4.5.2. Unit/Component testing This the lowest phase of the testing process. It involves testing individual units of the software. In this stage, the units (modules) of the software were tested to verify that each met its intended specification. 4.5.3. Integration testing This is the testing phase in which all the units are combined and are tested as functional groups. All the modules were integrated and further tested as a full system in order to make sure the specifications are met. 4.5.4. Installation testing The purpose of this process is to ensure that installation of the software is successful on various devices (android), which run on varieties of android versions and android operating systems. Table 1 shows the results of testing and issues identified on various android operating systems. Table 1 on the other hand shows the installation test plan result. Table 1: Installation test plan result S.No Android OS System Version Result 1 Android X (version 10) Installation was ok 2 Android 9.0 Installation was ok 3 Android 8.0 Installation was ok 4 Android 7.0 Installation was ok 5 Android 6.0 Installation failed _______________________________________________________________________________ __________________________________________________________________ © 2014-20, IRJCS: AM Publications, India - All Rights Reserved Page-193 International Research Journal of Computer Science (IRJCS) Issue 07, Volume 07 (July 2020) ISSN: 2393-9842 https://www.irjcs.com/archives As seen in the table above, the application was tested on different operating systems. The results of the test were collected is shown. Due to compatibility, the prototype was not able to run on all operating systems. 4.5.5. Usability testing Usability testing is done to see the ease with which software can be operated, by making use of ‘real users’ for the testing process. To determine the user experience of the software, users were given tasks to complete under supervision in case they encountered problems and experienced confusion. Traditionally testing might be done by the developer, designer or project manager. However, usability testing eliminates any possible bias by collecting feedback directly from the end user. The goal of conducting this test is to observe if users were able to complete task adequately while documenting errors they encountered. The experiment recorded the problems encountered that can be employed to ensure a more positive user experience. Thus, overcome the usability issues encountered. During the testing of the mobile application, 5 users were given the mobile application prototype to use. Table 2 and Table 3 show the expected tasks to be accomplished by each user, sum of participants for each task and the number of users that successfully completed each task respectively. S.No 1 2 3 Tasks Register new user Take an exam Submit problems Table 2: Users task description No. of Participants No. of Users to successfully Complete Task 5 4 4 4 4 4 During the testing of the mobile application, 5 users were given the mobile application prototype to use. The users’ task description table shows the expected tasks to be accomplished by each user, the sum participants for each task and the number of users that successfully completed each task respectively. User ID Tester 1 Tester 2 Tester 3 Tester 4 Tester 5 Table 3: Summary of usability testing User Complains Some parts of the user interface design were dull. User should be able to update profile. Having difficulty trying to sign in after creating an account. Poor color combination. User interface not proportional to phone screen. Observations The user had no problem with registration and taken examinations and tests. User completed tasks successfully. Registration was successful but user was unable to login with the fingerprint feature due to version compatibility. The user completed tasks successfully. Some user interface components were not proportional due to the small size of the phone. Other tasks were successfully carried out The table above shows a summary of information (feedback) obtained from the users of the prototype. As shown, the table describes the various complains, observations by users and suggestions towards making improvements on the system. 4.6. Summary of tests The testing of the prototype was done through the installation and usability tests. Installation testing and functionality testing were done by the researcher/developer to verify that the mobile application was installed successfully on android. The testing mainly involved black box testing and it is not concerned with the source code of the prototype. By providing appropriate and expected input, verifying the output and comparing the actual results with the expected results, every functionality of the software was successfully tested. The goal of the usability testing process was to identify any issues related to usability, and this was performed by the users. The complaints from the users of the mobile application were noted. Findings from the usability testing showed that some users were able to use the application with ease. Other complaints and observations were implemented, and changes were made. V.CONCLUSION AND FUTURE WORK This paper has identified the critical aspects needed to develop a multimodal biometric mobile application for computer-based tests. The features of the proposed system were obtained hence leading to the development of the final prototype that serves as a proof of concept. Furthermore, the research can be said to have achieved it targeted objectives. It is hoped that the use of this prototype addresses the problem of examination impersonation beyond University of Jos, Nigeria. _______________________________________________________________________________ __________________________________________________________________ © 2014-20, IRJCS: AM Publications, India - All Rights Reserved Page-194 International Research Journal of Computer Science (IRJCS) Issue 07, Volume 07 (July 2020) ISSN: 2393-9842 https://www.irjcs.com/archives 5.1. Future work To ensure that the system improves in performance and usability in the nearest future, the following will be considered in the future work: 1. The fingerprint authentication module will be improved and redesigned in a way that the finger ID of every user is stored on the cloud storage. (This is because the prototype makes use of local authentication to give the user access to the application). 2. Due to observations and suggestions from external sources, the user interface will be improved in order to give the user of the application a more enjoyable user experience. 3. The application was built with flutter framework which is used to build hybrid mobile applications for both iOS and android but due some limitations, restrictions, and compatibility issues with iOS devices; it was only tested on android devices. Therefore, and iOS version will be sort out in the future. REFERENCES 1. Aggarwal G., Ratha N. K., Tsai-Yang J., &Bolle R. M. (2008). Gradient based textural characterization of fingerprints. In proceedings of IEEE International conference on Biometrics: Theory, Applications and Systems. 2. Akinsanmi O.A, Olatunji, T.R., &Soroyewun, M.B. (2010). Development of an E-AssessmentPlatform for Nigerian Universities, Research Journal AppliedSciences,Engineering and Technology; 2(2): 170-175. 3. Alabi, A. T., Isaa, A. O., &Oyekunle R. A., (2012). The Use of Computer Based Testing Method for the Conduct of Examinations at the University of Ilorin. International Journal of Learning & Development, 2(3). 51-90. 4. Al-Bayati, M.A., &Hussein, K.Q. (2008). “Generic Software of e-Exam Package for Hearing Impaired Persons (Mathematics as Case Study)”, 2nd Conference on Planning & Development of Education and Scientific Research in the Arab States, 955-962.Al-Hijaili, S. (2011). Multimodal biometrics fusion techniques. 5. Aronowitz, H., Hoory, R., Pelecanos, J.W., and Nahamoo, D. New Developments in Voice Biometrics for User Authentication‟,Book New Developments in Voice Biometrics for User Authentication‟ (2011) ,17-20. 6. Ayo C. K. (2007). The Prospects of e-Examination Implementation in Nigeria. Turkish Online Journal of Distance Education-TOJDE2007; 8(1), 58-66. 7. Bátiz-Lazo, B., and Reese, C. “Is the future of the ATM past?”. Financial Markets and Organizational Technologies‟ (Springer, 2010),137-165. 8. Bisandu, D. B., Prasad, R., & Liman, M. M. (2018). Clustering news articles using efficient similarity measure and N-grams. International Journal of Knowledge Engineering and Data Mining, 5(4), 333-348. 9. Bisandu, D. B., Gurumdimma, N. Y., Alams, M. T., &Datiri, D. D. (2018). An enhanced text mining approach using dynamic programming. 10. Bisandu, D. B., Prasad, R., & Liman, M. M. (2019). Data clustering using efficient similarity measures. Journal of Statistics and Management Systems, 22(5), 901-922. 11. Bisandu, D. B., Datiri, D. D., Onokpasa, E., Thomas, G., Haruna, M. M., Aliyu, A., & Yakubu, J. Z. (2019). Diabetes Prediction Using Data Mining Techniques. International Journal of Research and Innovation in Applied Science (IJRIAS), 4(6), 103-111. 12. Bisandu, D. B. (2018). Clustering news articles using K-means and N-grams (Doctoral dissertation, American University of Nigeria, School of Information, Technology and Computing). 13. Boles W.W. &Boashash B. (1998). A Human Identification Technique using images of the iris and wavelet transform. IEEE Trans.Signal Process, 46(1), pp. 1185–1188. 14. Chellappa R., Wilson C. L.,&Sirohey C. (1995). Human and machine recognition of faces: A survey. Proc. IEEE, 83 (5), 705-740. 15. Daugman J. G. (2003). The Importance of being random: statistical principles of iris recognition. Pattern Recognition 36, pp. 279–291. 16. Decoo, W. (2002). Crisis on campus: confronting academic misconduct. Cambridge, MA: MIT Press. 17. Du Y., Ives R. W., Etter D. M., And Welch T. B. (2006). Use of one-dimensional iris signatures to rank iris pattern similarities. OptEng, Vol. 45, 037110–201. 18. Epstein, C. (2007). Guilty bodies, productive bodies, destructive bodies: Crossing the biometric borders‟, International Political Sociology, 2007, 1, (2), pp. 149-164. 19. Fang B., Leung C., Tang Y.Y., Kwok P., Tse K.W., And Wong I.K., (2002). Off-line Signature Verification with Generated Training Samples. IEEE Proc. Vision Image Signal Process, 149 (2), pp. 85–90. 20. Flom L. And Aran S., (1987). Iris Recognition System, U.S. Patent 4,641,349. 21. Jain A. K., Ross A., And Pankanti S. (2006). Biometrics: A Tool for Information Security. IEEE Transactions on Information Forensics and Security,1(2), 125 - 143. 22. Jain, A., Flynn, P., and Ross, A. A. (2007). Handbook of biometrics‟ (Springer Science & Business Media). 23. Karadeniz, S. (2009). The Impacts of Paper, Web and Mobile Based Assessment onStudents’ Achievement and Perceptions. Scientific Research and Essay, 4(10), 984 – 991. _______________________________________________________________________________ __________________________________________________________________ © 2014-20, IRJCS: AM Publications, India - All Rights Reserved Page-195 International Research Journal of Computer Science (IRJCS) Issue 07, Volume 07 (July 2020) ISSN: 2393-9842 https://www.irjcs.com/archives 24. Kennedy, K., Nowak, S., Raghuraman, R., Thomas, J., &Dacis, S. (2000). Academic dishonesty and distance learning: student and faculty views. College Student Journal, 34(2), 309- 315. 25. Krawczyk, S., and Jain, A. K. (2005). Securing electronic medical records using biometric authentication, In Editor (Ed.). Book Securing electronic medical records using biometric authentication (Springer edn.),1110-1119. 26. Levy, Y., and Ramim, M. M. (2007). “A Theoretical Approach for Biometrics Authentication of E-Examinations”, USA: Nova Southeastern University. 27. Liu L. And Zhang D. (2005). A novel palm-line detector. In Proceedings of the 5th AVBPA, pp. 563– 571. 28. Lim S., Lee K., Byeon O., And Kim T (2001) Efficient iris recognition through improvement of feature vector and classifier. ETRI Journal, 23(2),61–70. 29. Lupu, C., Găitan, V.-G., and Lupu, V.: „Security enhancement of internet banking applications by using multimodal biometrics‟, in Editor (Ed.)^(Eds.): Book Security enhancement of internet banking applications by using multimodal biometrics‟ (IEEE, 2015, edn.),47-52. 30. Maltoni D., Maio D., Jain A. K., and Prabhkar S., (2003). Handbook of Fingerprint Recognition. Springer. 978-0387-21587-7. 31. McGinity, M. (2005). Staying connected: Let your fingers do the talking. Communications of the ACM, 48(1), 2123. 32. McLafferty, C. L., & Foust, K. M. (2004). Electronic plagiarism as a college instructor’s nightmare prevention and detection: Cyber dimensions. Journal of Education for Business, 79(3), 186-190. 33. Naude, E., &Hörne, T. (2006). Cheating or collaborative work: Does it pay? Issues in Informing Science and Information Technology, 3(2), 459-466. 34. Obioma, G., Junaidu, I., &Ajagun, G. (2013). The Automation of Educational Assessment in Nigeria: Challenges and Implications for Pre-service Teacher Education. A paper presented at the 39th Annual Conference of the International Association for Educational Assessment (IAEA), Tel-Aviv, Israel, October 20 – 25. 35. Ogunlade, O. O., and Olafare, F. O. (n.d). Lecturers’ Perceptions of Computer-Based Test in Nigerian Universities. 36. Pankanti, S., Bolle, R.M., and Jain, A (2000). Biometrics: The future of identification [Guest Editors' Introduction] ‟, Computer, 33, (2), pp. 46-49. 37. Pillsbury, C. (2004). Reflections on academic misconduct: An investigating officer’s experiences and ethics supplements. Journal of American Academy of Business, 5(1/2), 446-454. 38. Ross A., (2007). An Introduction to Multi-biometrics. In Proceedings of the 15th European Signal Processing conference (EUSIPCO), (Pozan, Poland). 39. Schramm,T. (2008), “E-Assessments and E-Examinations for Geomatics Studies”, Department of Geomatics Hafen City University. 40. Hamburg Hebebrandstraße 1,22297 Hamburg, Germany. 41. Shu W. And Zhang D., (1998). Automated Personal identification by Palmprint. Optical Engineering, Vol. 37(8),2359-2362. 42. Siskin, A. (2012). Visa waiver program. Current Politics and Economics of the United States, Canada and Mexico, 14, (23), pp. 255. 43. Sun Z., Wang Y., Tan T., and Cui J. (2005). Improving iris recognition accuracy viacascaded classifiers. IEEE Trans. Syst. Man. Cybern—Part C: Appl Rev, 35. 44. Wildes R. P., 1997. Iris Recognition: An Emerging Biometric technology. Proc. IEEE, Vol. 85,1348– 1363. 45. Yousiff A. A. A., Chowdhury M. U., Ray S., And Nafaa H. Y., (2007). Fingerprint Recognition System using Hybrid Matching. 46. Techniques. 6th IEEE/ACIS International Conference on Computer and Information Science,234- 240. 47. Yu, C., & Tsao, C. C. (2003). Web teaching: Design, security, and legal issues. Delta Pi Epsilon Journal, 45(3), 191203. _______________________________________________________________________________ __________________________________________________________________ © 2014-20, IRJCS: AM Publications, India - All Rights Reserved Page-196