Sei sulla pagina 1di 6

International Journal of Research (IJR) Vol-1, Issue-7, August 2014 ISSN 2348-6848

NOVEL METHOD FOR STUDENT AUTHENTICATION IN ONLINE EXAMINATION V.Bhagat & V.Katankar
P a g e | 974
Novel method for Student
Authentication in Online Examination
V.Bhagat
1*
& V.Katankar



1
Department of information Technology, SRMCEW, Nagpur University,Maharashtra,n!ia
"
Department of information Technology, SRMCEW, Nagpur University,Maharashtra,n!ia
#E$mail% &hagat'vaishali1()yahoo'in, *atan+ar,veena)yahoo'com


A!"tract
In the recent years, internet has become
increasingly popular and used by many
people from all over the world. Online
learning is widely acceptable. Online
examination is a fundamental part of online
learning. Student work and assessment is
remotely submitted without any face to face
interaction. Student may submit already
submitted work so originality of material is
greatly defeated. Therefore Student
authentication in online examination is
seen as a one of the major problem and
challenges. This paper proposed the novel
student authentication framework for
online examination. Visual cryptography is
used to make system more secure and
reliable. The proposed system also ensures
genuine interaction of individual students
with the online examination and also
verifies the identity of online student.

Ke#$ord"%
Visual Cryptography, Share, Stego image,
Visual Secret sharing Scheme

&or 'iting thi" (a)er%
Bhagat V& Katankar V, Novel Method
For Student Authentication in Online
Examination, International Journal of
Research (IJR), Volume-1, Issue-7.
Page974-981. ISSN 2348-6848.

*ntroduction
Todays world is an internet world. Many
people from all over the world uses the
internet to transmit their confidential
information over the communication
network. Nowadays online learning has
become increasingly popular. Online
examination play very vital role in online
education. Online education material is
easily accessible and widely updatable.
Hence various educational institute,
banking sector adopt this in large scale. In
the online examination scenario, there is no
face to face interaction between students
and system administrators. Thus security
has become important issue in this scenario.
During online examination, students submit
their work remotely. So it becomes difficult
to verify the identity of person taking online
examination. Students may submit
plagiarize work as part of their assessment.
Student imitates or uses the original work
of other author. So plagiarism can be one of
the major challenges to online learning.
Online learning offer more opportunities
for cheating and academic dishonesty in
such examination. Cheating in online
examination seems to be very serious issue.
So there is necessity of more reliable and
secure student authentication system. This
paper provide more secure authentication
framework for online examination using
visual cryptography and try to overcome all
the problems occurs during examination.




International Journal of Research (IJR) Vol-1, Issue-7, August 2014 ISSN 2348-6848
NOVEL METHOD FOR STUDENT AUTHENTICATION IN ONLINE EXAMINATION V.Bhagat & V.Katankar
P a g e | 975
The proposed method uses visual
cryptography to generate shares and these
shares are encrypted separately using RSA
algorithm to provide more security to
shares. One share is kept at server database
and other is sent by email to students.
Students have to upload share at the time of
examination. Both shares are stacked
together to reveal original image
Authenticity of students is verified if both
shares are matched otherwise students is
not allowed to access the examination link.
and also report the system administrator
about the fraud.

Visual Cryptography

Visual cryptography is cryptographic
technique which allow visual information
to be encrypted in such way that decryption
can be performed by human visual system.
It is visual secret sharing scheme, where
image is broken into number of shares and
all the shares are printed separately on
transparencies. Single share does not reveal
the information .Decryption can be
performed by stacking all shares together to
produce original image. Various visual
secret sharing schemes are available to
provide more secure image transmission
over the network. The basic model of visual
cryptography proposed by Naor and Shamir
accepts a binary image I as the secret
image, and divides it into n number of
shares. Each pixel of image I is
represented by m sub pixels in each of the
n shared images. Stacking of shares
reveals the secret image but increases the
size by m times. The various black and
white visual cryptography schemes can be
summarized as follows:
1) 2 out of 2 scheme% I th!s, the sec"et
!m#$e !s %!st"!&ute o t'o sh#"es 'h!ch
#"e &oth "e(u!"e% fo" the %ec")*t!o
*"ocess+ Th!s !s %e*!cte% ! F!$u"e
1+Th!s scheme c# &e "e#,!-e% &) us!$
e!the" 2 su& *!.e,s o" / su& *!.e,s to
"e*"eset e#ch *!.e, of the sec"et
!m#$e #s e.*,#!e% &e,o'+
2 su& *!.e,s0 E#ch *!.e, !s su&%!1!%e% !to
oe &,#c2 #% e t"#s*#"et 3'h!te) su&
*!.e, #s sho' !



4 sub pixels: Each pixel is subdivided into
four sub pixels, two black and two
transparent (white)
2) n out of n scheme: In an n out of n
scheme the secret message is distributed on
n transparencies. Superimposing I
transparencies with i < n will not reveal any
information of the secret image. There exist
two possible ways to construct an n out of n
scheme by using 2n sub pixels or 2n-1 sub
pixels.
4) 2 out of scheme0 S*,!tt!$ of the sec"et
mess#$e !to sh#"es out of 'h!ch #) 2
sh#"es #"e "e(u!"e% fo" %ec")*t!o+
Cot"#") to the out of scheme, ot #,,
t"#s*#"ec!es #"e "e(u!"e% fo" the
%ec")*t!o ! th!s c#se 2 5 + I 1667,
Ate!ese, 8,u%o, 9 St!so :2; *"o*ose%
e.te%e% 1!su#, c")*to$"#*h) schemes !
'h!ch sh#"es cot#! ot o,) the sec"et
!fo"m#t!o &ut #"e #,so me#!$fu,
!m#$es


Authentication Methods

The"e #"e 1#"!ous #uthet!c#t!o metho%s
#"e %e1e,o*e% to 1e"!f) #uthet!c!t) of
use"s+ The) #"e <o',e%$e=8#se%, O&>ect=
8#se%, 8!omet"!c=8#se%, ?"of!,e 8#se%
Authet!c#t!o metho%s+ The) #"e m#!,)
&#se% o use"@s 2o',e%$e, o&>ects #%
&!omet"!c fe#tu"es #% *"of!,es.





International Journal of Research (IJR) Vol-1, Issue-7, August 2014 ISSN 2348-6848
NOVEL METHOD FOR STUDENT AUTHENTICATION IN ONLINE EXAMINATION V.Bhagat & V.Katankar
P a g e | 976
1+ *no-le!ge$.ase! /uthentication
Metho!%$
It 1e"!f!es the !%et!t) of stu%ets &#se% o
*e"so#, 2o',e%$e+ Stu%ets *"o1!%e
,o$! c"e%et!#, to #ccess o,!e
e.#m!#t!o *o"t#,+ Stu%ets m#) sh#"e
the!" c"e%et!#, to th!"% *#"t) to !m*"o1e
the!" $"#%es #% m#"2s+
2+ 0&1ect$.ase! /uthentication Metho!%$
I th!s metho%, Stu%ets ee% to *"o1!%e
*h)s!c#, o&>ect !+e e,ect"o!c ch!*, c#"%s,
#% m#$et!c c#"%s, %!$!t#, 2e) to *"o1e
the!" !%et!t) +I e,ect"o!c c#"%s
!%et!f!c#t!o fe#tu"es of stu%ets #"e
sto"e%+ At the t!me of o,!e e.#m!#t!o,
&oth et!t!es #"e "e(u!"e%+ Att#c2e" m#)
theft these c#"%s #% *"ete%s #s
#utho"!-e% use" #% uses the se"1!ces of
*o"t#,s+
4+ .iometric$&ase! /uthentication
Metho!%
I "ecet )e#"s &!omet"!c &#se%
#uthet!c#t!o s)stem &ecome mo"e
*o*u,#" #% m#) o"$#!-#t!os #%o*t th!s
to *"e1et f"#u%+ 8!omet"!c &#se% s)stem
sto"e the %!ffe"et *h)s!c#, fe#tu"es of
*eo*,e !to the!" %#t#&#se ! tem*,#te
fo"m+ Att#c2e" m#) #,te" th!s tem*,#te+ If
8!omet"!c tem*,#te !s mo%!f!e% &) #tt#c2e"
the #uthet!c#te use" m#) ot #&,e to
#ccess "esou"ces+
4.Profile-Based Authentication Method%
*n thi" method+ u"er,id+ )a""$ord and
challenge -ue"tion" are u"ed for "tudent
authentication during online
examination. Attacker ma# hack or cra"h
"tudent )rofile data!a"e. *f "tudent
)rofile data!a"e i" cra"hed or hacked !#
intruder then authori.ed "tudent ma#
not a!le to a))ear for online
examination.
A,, th!s metho%s h#1e the!" o' ,!m!t#t!o
#% #%1#t#$es+ M#! $o#, of these
metho%s to %e1e,o* stu%et
#uthet!c#t!o s)stem mo"e "e,!#&,e #%
secu"e+ I # cu""et sce#"!o, most of the
o"$#!-#t!os #% e%uc#t!o !st!tute,
8#2!$ secto" uses th!s tech!(ue to
co%uct o,!e e.#m!#t!o+ To "emo1e #,,
the sho"tcom!$ occu"s ! the #&o1e
tech!(ue, 'e *"o*ose% the stu%et
#uthet!c#t!o f"#me'o"2 to co%uct the
e.#m!#t!o mo"e smooth,) #% secu"e,)+

Proposed Work
Stu%et Authet!c#t!o
f"#me'o"2 us!$ 1!su#,
c")*to$"#*h)
I th!s f"#me'o"2, mu,t!,#)e"
#uthet!c#t!o #**"o#ch !s use%+ The
so,ut!o cos!st of mu,t!*,e *h#ses to
*"o%uce "e,!#&,e #uthet!c#t!o
f"#me'o"2 !+e+ Re$!st"#t!o *h#se, sh#"e
c"e#t!o #% $ee"#t!o *h#se, sh#"e
ec")*t!o *h#se, o,!e e.#m!#t!o
*h#se, Sh#"e %ec")*t!o *h#se #% f!#,,)
Authet!c#t!o *h#se+ I!t!#,,) stu%ets
co,,ect ,o$!=!% #% *#ss'o"% &) ete"!$
#,, *e"so#, #% #c#%em!c %et#!, !to o,!e
se"1e" #% #,so u*,o#% the!" *hoto #%
s!$#tu"e !to !t+ Du"!$ sh#"e c"e#t!o
*h#se, stu%et s!$#tu"e !m#$e #% *hoto
!m#$e #"e t#2e to$ethe" to *"o%uce ste$o




International Journal of Research (IJR) Vol-1, Issue-7, August 2014 ISSN 2348-6848
NOVEL METHOD FOR STUDENT AUTHENTICATION IN ONLINE EXAMINATION V.Bhagat & V.Katankar
P a g e | 977
!m#$e #% th!s ste$o !m#$e !s the sto"e !
o"!$!#, host !m#$e #% the $ee"#te the
sh#"es+ A,, the sh#"es #"e ec")*te% &efo"e
$!1e to stu%et &) em#!,+ The *"!m#")
focus of *"o*ose% so,ut!o to secu"e
stu%et #uthet!c#t!o fo" o,!e
e.#m!#t!os+ Ahe stu%et u*,o#% h!s
sh#"e %u"!$ #uthet!c#t!o *"ocess,
soft'#"e o se"1e" s!%e, st#c2 the sh#"es
to$ethe" 3oe #t c,!et s!%e #% othe" #t
se"1e" s!%e) to "e1e#, the host !m#$e+ I th!s
metho%, fo" ec")*t!o #% %ec")*t!o of
sh#"es, RSA #,$o"!thm !s use% to m#2e
#**"o#ch mo"e secu"e+ I the *"o*ose%
metho% 1!su#, c")*to$"#*h) tech!(ue !s
#**,!e% to stu%et #uthet!c#t!o s)stem+
S!$,e sh#"e %oes ot "e1e#, #)
!fo"m#t!o+ Hece !t *"o1!%es mo"e
secu"!t) to s)stem+

Phases of proposed work
A. Registration Phase:=The stu%et those
'ho '#t to #**,) fo" o,!e e.#ms,
1!s!t the e.#m 'e&s!te+ A% com*,ete
the "e$!st"#t!o fo"m &) f!,,!$ the
*e"so#, #% #c#%em!c %et#!,s+ The
stu%ets #,so u*,o#% the!" sc#e%
*hoto #% s!$#tu"e !m#$e oto se"1e"+
I the ,#st st#$e of th!s *h#se, stu%et
h#1e to choose the co1e" !m#$e fo"m
the set of !m#$es *"o1!%e% &) se"1e"
*o"t#, #% f!#,,) stu%et c,!c2 o the
su&m!t &utto to com*,ete the
"e$!st"#t!o *"ocess successfu,,)+
B. Share Creation and Generation Phase%$
Afte" the com*,et!o of "e$!st"#t!o
*h#se, stu%ets 'e"e ot!f!e% &) em#!,
to ,o$! #% #ccess e.#m!#t!o ,!2+
Actu#,,) &efo"e th!s, soft'#"e #t se"1e"
s!te $ee"#te the sh#"e &) h!%!$ ste$o
!m#$e !to o"!$!#, host !m#$e th#t '#s
se,ecte% &) stu%et #t the t!me of
"e$!st"#t!o+ Ste$o !m#$e cos!st of
*hoto !m#$e 'h!ch cos!st of s!$#tu"e
!m#$e #% the sh#"es #"e $ee"#te% +
C. Share Encryption Phase%$Sh#"es #"e
ec")*te% se*#"#te,) us!$ RSA
#,$o"!thm #% sh#"e1 !s set &) em#!, to
stu%ets+ RSA #,$o"!thms !s oe of the
*o*u,#" ec")*t!o #,$o"!thms+ Se"1e"
uses h!s *"!1#te 2e) to ec")*t the sh#"e'
D. Online Examination Phase:-I th!s
*h#se, use" ,o$=! to e.#m!#t!o *o"t#,
&) ete"!$ !% #% *#ss'o"% oto
*o"t#, +Use" 'e"e #s2 to com*,ete the
#utho"!-#t!o *"ocess 'he"e use" h#1e
to u*,o#% the!" sh#"e 'h!ch !s set &)
m#!,+
E. Share Decryption Phase:$Soft'#"e o
se"1e" s!%e co,,ect the sh#"e, oe f"om
stu%et #% othe" f"om se"1e" %#t#&#se
'he"e sh#"e !s sto"e% ! ec")*te% fo"m,
%ec")*t !t us!$ se"1e" *u&,!c 2e)
se*#"#te,)+ No' th!s t'o sh#"es #"e
o1e",#**e% to$ethe" to o"!$!#, host
!m#$e+ Ste$o !m#$e !s o' "e1e#, f"om
host !m#$e us!$ othe" #,$o"!thm+ ?hoto
!m#$e #% s!$#tu"e !m#$es #"e
"e1e#,e% f"om ste$o !m#$e+
F. Authentication Phase:-I th!s *h#se,
"ecost"ucte% *hoto !m#$e #%
s!$#tu"e !m#$e #"e m#tche% '!th
o"!$!#, !m#$es sto"e% ! se"1e"
%#t#&#se #t the t!me "e$!st"#t!o+ If
m#tch fou%, stu%et !s $"#te% #ccess
to o,!e e.#m!#t!o othe"'!se
stu%et #ccess !s &,oc2e% #% "e*o"te%
to s)stem #%m!!st"#to"+
All the above phases are carried out to
authenticate user. We also provide security
to shares during transmission phase. All the
shares are encrypted in such way that
attacker cannot easily detect them. If
attacker intercept the share during
transmission, cannot be able to reveal the
information inside it. This approach
provide more security to shares and
recipient also.




International Journal of Research (IJR) Vol-1, Issue-7, August 2014 ISSN 2348-6848
NOVEL METHOD FOR STUDENT AUTHENTICATION IN ONLINE EXAMINATION V.Bhagat & V.Katankar
P a g e | 978



I #&o1e %!#$"#m, o*e"#t!o !
"e$!st"#t!o *"ocess !s *"esete%+ Stu%ets
u*,o#% sc#e% *hoto #% s!$#tu"e !m#$e
#t the t!me of "e$!st"#t!o+ S!$#tu"e !m#$e
!s h!%e% ! *hoto !m#$e #% th!s !m#$e !s
c#,,e% ste$o !m#$e+ Stu%ets #,so choose
oe of the co1e" !m#$e #% sto"e ste$o
!m#$e !to !t+ t'o sh#"es #"e $ee"#te%
us!$ 1!su#, c")*to$"#*h) #% ec")*te%
us!$ RSA #,$o"!thm+ Oe ec")*te% sh#"e
!s set &) em#!, to stu%ets #% othe" !s
2e*t #t se"1e" s!%e+




I the #&o1e %!#$"#m, *"o*ose% mo%e, !s
*"esete%+ Ahe stu%ets ete" the!" ,o$=
! !% #% *#ss'o"% to s)stem, o,!e
e.#m!#t!o *o"t#, !s o*ee% 'he"e
stu%ets u*,o#% the sh#"e #% se"1e" se%
!ts co""es*o%!$ sh#"e +8oth sh#"e #"e
%ec")*te% us!$ s#me #,$o"!thms+ 8)
st#c2!$ &oth sh#"e to$ethe", O"!$!#, host
!m#$e !s est#&,!she%+ Ste$o !m#$e !s
"eco1e"e% f"om !t #,so 1e"!f) the
#uthet!c!t) of stu%et #% #,,o' them to
cot!ue othe"'!se f"#u% !s %etecte% #%
#ccess !s &,oc2e% fo" th#t stu%ets+


'onclu"ion
The *"o*ose% s)stem *"o1!%es mo"e
secu"e stu%et #uthet!c#t!o s)stem fo"
o,!e e.#m!#t!o us!$ th"ee ,#)e" of
secu"!t)+ F!"st ,#)e" *"o1!%e use"=!% #%
*#ss'o"% to stu%et 'ho #**,) fo" o,!e
e.#m!#t!o &) em#!,+ so o,) those
stu%ets h#1e ,o$=! !% #% *#ss'o"% #"e




International Journal of Research (IJR) Vol-1, Issue-7, August 2014 ISSN 2348-6848
NOVEL METHOD FOR STUDENT AUTHENTICATION IN ONLINE EXAMINATION V.Bhagat & V.Katankar
P a g e | 979
#,,o'e% to #**e#" fo" e.#m!#t!o+ Seco%
,#)e" $ee"#te the sh#"es of ste$o !m#$e,
so stu%et h#1e to u*,o#% the oe sh#"e
#% o,) $eu!e use" c# *"o1!%e th!s
sh#"e+ Othe"'!se #ccess !s ot $"#te% to
them, ! th!s '#) mo"e secu"!t) !s *"o1!%e%
&) s)stem+ Th!"% ,#)e" *"o1!%e secu"!t) to
sh#"es #,so, so o #%1e"t!se" c#ot #,te"
!ts &!t se(uece #% ot #&,e to c"e#te f#2e
sh#"es+ The *"o*ose% s)stem !s s*ec!#,,)
%e1e,o*e% to *"e1et f"#u% ! o,!e
e.#m!#t!o #% !t #,so "e%uce the
t"#sm!ss!o "!s2 $"e#t,)+

Ackno$ledgement
The author would like to thank their parents
and friends for their valuable support and
suggestion, feedback who always support
for writing this paper.
/E&E/EN'ES
213 M+ N#o" #% A+ Sh#m!", BV!su#,
c")*to$"#*h),C ! ?"oc+ EUROCRD?T, 166/,
**+ 1E12+
2"3 Ate!ese, C+ 8,u%o, A+ D+ S#t!s, #% D+ R+
St!so,BE.te%e% V!su#, C#*#&!,!t!es fo"
V!su#, C")*to$"#*h),CTheo"et!c#,
Com*ute" Sc!ece, 1o,+2FG, **+1/4=171,
2GG1
243 A%#ms2! M+, S#ee% <+ HO,!e S!$#tu"e
C,#ss!f!c#t!o #% !ts Ve"!f!c#t!o S)stemH,
Ith Com*ute" Ifo"m#t!o S)stems #%
I%ust"!#, M##$emet A**,!c#t!os2GGJ,
*+
2(3 A$$#"'#, K+, R#th# N+, Le# T+ D+, 8o,,e R+
HK"#%!et&#se% Te.tu"#, Ch#"#cte"!-#t!o
of F!$e"*"!tsH,8!omet"!cs0 Theo"),
A**,!c#t!os #% S)stems, 2GGJ,IEEE+
253 6etters, 11-12 424 32GGJ)+ A$u,,# E+ K+, R!fM
L+ A+, C#st"o L+ L+ A+, M#teo C+ K+HIs M)
Stu%et #t the Othe" S!%eN A**,)!$
8!omet"!c Ae& Authet!c#t!o to E=
Le#"!$ E1!"ometsH, E!$hth IEEE
Ite"#t!o#, Cofe"ece o A%1#ce%
Le#"!$ Techo,o$!es, 2GGJ, IEEE+
273 A,'! N+ H+ M+, F# I+ S+,HTh"e#ts ##,)s!s fo"
e,e#"!$H, nternational 8ournal of
Technology Enhance! 6earning,
2G1G,23/),4FJ=I1+
293 A*#m*# <+ M+, A!,,s K+, A"$,es D+ HA
#**"o#ch to *"esece 1e"!f!c#t!o !
summ#t!1e e=#ssessmet secu"!t)H,
Ite"#t!o#, Cofe"ece o Ifo"m#t!o
Soc!et) 3!=Soc!et) 2G1G), 2G1G, IEEE+
2:3 Sh#1e" C+ D+, Ac2e L+ HEffects of e(u!*met
1#"!#t!o o s*e#2e" "eco$!t!o e""o"
"#tesH, Ite"#t!o#, Cofe"ece o
Acoust!cs S*eech #% S!$#, ?"ocess!$
3ICASS?), 2GG6, IEEE+
2;3 U,,#h A+, X!#o H+, L!,,e) M+ H?"of!,e 8#se%
Stu%et Authet!c#t!o ! O,!e
E.#m!#t!oH, Ite"#t!o#, Cofe"ece o
Ifo"m#t!o Soc!et) 3!=Soc!et) 2G12), 2G12,
IEEE+
21<3 Oh#o P+, De M+ HThe #**,!c#t!o #%
!m*,emet#t!o of f#ce "eco$!t!o !
#uthet!c#t!o s)stem fo" %!st#ce
e%uc#t!oH, 2% Ite"#t!o#, Cofe"ece
o Net'o"2!$ #% D!$!t#, Soc!et) 3ICNDS),
2G1G, IEEE+


A!out Author"
V.Bhagat received the B.E degree in
Information Technology from Nagpur
University, Maharashtra, India in 2008 and
pursuing M. Tech (CSE). She works as a
faculty member in the Department of
Information Technology, SRMCEW,
Nagpur University, India. Her current
interest is Visual Cryptography and Digital
Image processing.


V.Katankar received the M. Tech degree
in WCC from Nagpur University, India.
She works as a faculty member in the
Department of Information Technology,
SRMCEW, Nagpur University, India. Her
current interest is Visual Cryptography and
Network security.

.

Potrebbero piacerti anche