The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - July-September (2008 vol.1)
pp: 165-175
Barry Hayes , Intel (Ireland) Ltd., Leixlip
John V. Ringwood , NUI Maynooth, Maynooth
ABSTRACT
The past decade has seen the proliferation of e-learning and distance learning programs across a wealth of discipline areas. In order to preserve maximum flexibility in outreach, student assessment based exclusively on remotely submitted work has become commonplace. However, there is also growing evidence that e-learning also provides increased opportunity for plagiarism, with obvious consequences for learning effectiveness. This paper reports on the development of a prototype student authentication system, designed for use with a graduate e-learning program. The proposed system can be used to authenticate telephone-based oral examination which can, in turn, be used to confirm a student's ability in relation to submitted assignments and on-line test results. The prototype low-cost system is shown to be sufficiently accurate to act as an effective deterrent against plagiarism.
INDEX TERMS
e-learning, plagiarism, speaker verification, distance learning
CITATION
Barry Hayes, John V. Ringwood, "Student Authentication for Oral Assessment in Distance Learning Programs", IEEE Transactions on Learning Technologies, vol.1, no. 3, pp. 165-175, July-September 2008, doi:10.1109/TLT.2009.2
REFERENCES
[1] M. Thorpe, “Assessment and ‘Third Generation’ Distance Education,” Distance Education, vol. 19, no. 2, pp. 265-286, 1998.
[2] A. Rovai, “Online and Traditional Assessments: What Is the Difference?” The Internet and Higher Education, vol. 3, no. 3, pp.141-151, 2000.
[3] J. Cordova and P. Thornhill, “Academic Honesty and Electronic Assessment: Tools to Prevent Students from Cheating Online— Tutorial Presentation,” J. Computing Sciences in Colleges, vol. 22, no. 5, pp. 141-151, 2007.
[4] F. Graf, “Providing Security for Elearning,” Computers and Graphics, vol. 26, no. 2, pp. 355-365, 2002.
[5] J. Underwood and A. Szabo, “Academic Offences and e-Learning: Individual Propensities in Cheating,” British J. Educational Technology, vol. 34, no. 4, pp. 467-477, 2003.
[6] J. Campbell, “Speaker Recognition: A Tutorial,” Proc. IEEE, vol. 85, no. 9, pp. 1437-1462, 1997.
[7] C.-H. Lee, F. Soong, and K. Paliwal, Automatic Speech and Speaker Recognition. Springer, 1996.
[8] T. Kinnunen, “Spectral Features for Automatic Text Independent Speaker Recognition,” PhD Thesis, Univ. of Joensuu, Finland, 2003.
[9] W. Holmes, Speech Synthesis and Recognition, second ed. Taylor and Francis, 2001.
[10] H. Gish and M. Schmidt, “Text-Independent Speaker Identification,” IEEE Signal Processing Magazine, vol. 11, no. 4, pp. 18-32, 1994.
[11] J. Naik, “Speaker Verification: A Tutorial,” IEEE Comm. Magazine, vol. 21, no. 1, pp. 42-48, 1990.
[12] A. Park and T.J. Hazen, “Asr Dependent Techniques for Speaker Identification,” Proc. Seventh Int'l Conf. Spoken Lang., pp. 1337-1340, Sept. 2002.
[13] R. Woo, A. Park, and T. Hazen, “The MIT Mobile Device Speaker Verification Corpus: Data Collection and Preliminary Experiments,” Proc. IEEE Odyssey: Speaker and Language Recognition Workshop, pp. 1-6, June 2006.
[14] W. Hueng and B. Rao, “Channel and Noise Compensation for Text Dependent Speaker Verification over Telephone,” Proc. Int'l Conf. Acoustics, Speech, and Signal Processing, vol. 1, pp. 337-340, May 1995.
[15] F. Bimbot, J.-F. Bonastre, C. Fredouille, G. Gravier, I. Magrin-Chagnolleau, S. Meignier, T. Merlin, J. Ortega-García, D. Petrovska-Delacrõtaz, and D.A. Reynolds, “A Tutorial on Text-Independent Speaker Verification,” EURASIP J. Applied Signal Processing, vol. 2004, no. 4, pp. 430-451, 2004.
[16] M. Dougiamas and P. Taylor, “Moodle: Using Learning Communities to Create an Open Source Course Management System,” Proc. World Conf. Educational Multimedia, Hypermedia and Telecomm., pp. 171-178, http://go.editlib.org/p13739, 2003.
[17] A. Higgins, J. Porter, and L. Bahler, YOHO Speaker Authentication—Final Report. ITT Defense Comm. Division, 1989.
[18] L.F. Lamel and J.L. Gauvain, “Speaker Verification over the Telephone,” Speech Comm., vol. 31, nos. 2-3, pp. 141-154, 2000.
[19] L. Jian-bin, Y. Ji-Kun, Z. Hui, and N. Zhong-Xia, “Two-Stage Speech/Non-Speech Classification of Telephone Signals,” Proc. Int'l Conf. Comms, Circuits and Systems, pp. 490-492, 2006.
[20] R. Martin, “Noise Power Spectral Density Estimation Based on Optimal Smoothing and Minimum Statistics,” IEEE Trans. Speech and Audio Processing, vol. 9, no. 5, pp. 504-512, 2001.
[21] V. Vuckovic, “Dynamic Time-Warping Method for Isolated Speech Sequence Recognition,” Proc. Int'l Conf. Telecomm. in Modern Satellite, Cable and Broadcasting Services (TELSIKS), pp.257-260, Sept. 2001.
[22] D. Ellis, “Matlab Audio Processing Examples,” Lab for Recognition and Organization of Speech and Audio, Columbia Univ., http://labrosa.ee.columbia.edumatlab, 2006.
[23] G. Fant, Acoustic Theory of Speech Production. Mouton, 1960.
[24] L. Rabiner and R. Schafer, Digital Processing of Speech Signals. Bell Lab., 1978.
[25] J. Gray, A. and, J. Markel, “Distance Measures for Speech Processing,” IEEE Trans. Acoustics, Speech, and Signal Processing, vol. 24, no. 5, pp. 380-391, Oct. 1976.
33 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool