<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Analysis of Approaches to Identity Verification Knowledge Assessment in E-Learning Systems During</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Oleh Shkodzinsky</string-name>
          <email>shkod@tntu.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Aleksandra Kłos-Witkowska</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mykhailo Lutskiv</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Denys Sas</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Ternopil Ivan Puluj National Technical University</institution>
          ,
          <addr-line>Ruska str., 56, Ternopil, 46001</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Bielsko-Biala</institution>
          ,
          <addr-line>Willowa St. 2, Bielsko-Biala, 43-300</addr-line>
          ,
          <country country="PL">Poland</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The article considers options for implementing proctoring tools in distance learning systems based on information and communication technologies. A comparative analysis of such systems from leading developers in this field was conducted. A classification of approaches was made and a list of functional components providing a solution to the given task was formulated. It was noted that each of the solutions has its positive sides and disadvantages, based on which the requirements for the software for the ATutor e-learning system were formulated.</p>
      </abstract>
      <kwd-group>
        <kwd>1 proctoring</kwd>
        <kwd>face recognition</kwd>
        <kwd>photo fixation</kwd>
        <kwd>knowledge testing</kwd>
        <kwd>image recognition algorithms</kwd>
        <kwd>person identification</kwd>
        <kwd>CEUR-WS</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Distance learning forms of education have been around for quite some time, but the real surge in
their popularity was due to the quarantine restrictions during the COVID-19 pandemic. This rapid
development of distance learning technologies happened thanks to the use of modern information and
communication technologies, which became its basis. And while the problem with individual
assignments was solved more or less quickly, the remote assessment of knowledge by means of
testing still raises many questions, starting with the security of personal data and ending with a
significant number of opportunities to violate the knowledge assessment procedure.</p>
      <p>An important task of developers and users of e-learning systems is the integration of automated
means of proctoring into these systems, which would provide effective control over the knowledge
assessment procedure. One of the technical components of the proctoring system, designed to solve
this problem, are specialized means of identity verification during knowledge testing.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Problem formulation</title>
      <p>Modern proctoring systems are based on multimedia technical means widely used in distance
education. The principle of their operation is commonly as follows: the user connects to the system
through a browser, and the system confirms the identity in an automated mode, collects data from the
microphone, web camera and, in some cases, from the computer screen during the knowledge
assessment. At the same time, the system can automatically decide on access denial to the test or
exam if the person recognized through the web camera does not match to the expected person or if
they have violated other conditions of passing the test. Also, the collected data is provided for the
review by the examiner, who makes final decision.</p>
      <p>Common e-learning systems were initially developed without proctoring tools, and therefore the
development of additional modules with proctoring features that would be able to integrate with these
learning management systems (Learning management system, LMS) or distance learning systems is
relevant. In some cases, integration is possible using a module already created by the system
developers, and in others - using API that allows implementing integration on your own.</p>
      <p>
        The goal of this study was to analyze the most widely used technical solutions for identity
verification in e-learning systems, to classify the main approaches and to choose the optimal option
for use in an e-learning system based on LMS ATutor for an educational institution [
        <xref ref-type="bibr" rid="ref1 ref2 ref3">1-3</xref>
        ].
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Comparative analysis of known solutions</title>
      <p>Next, the most successful solutions to the problem of identity verification during knowledge
assessment in distance learning conditions are considered, and their advantages and disadvantages are
analyzed.</p>
      <p>
        ExamOnline [
        <xref ref-type="bibr" rid="ref4 ref5">4,5</xref>
        ] is a multifunctional commercial solution for all types of online knowledge
assessment - exams and other knowledge assessment forms in educational institutions, qualification
exams at work, employee qualification assessment, certification, hiring in the company, etc. (Fig. 1).
It is a platform that implements a full range of functions from application management to online
examination, result processing and results report generation. Among the advantages: support for two
video streams for cameras with a 360-degree view; detection and recognition of faces using artificial
intelligence; sound recording from the microphone; Liveness Detection – the system detects if the
face is unnatural or does not move at all; Fake Feed Detection – any attempt to transmit a
prerecorded/fake video feed using a browser or a third-party tool is identified by the AI system and
registered as a violation; a full report with a recording of the student's actions and an automatic
assessment of integrity; detection of human speech in an audio stream; the ability to connect a real
human proctor to supervise the process of knowledge assessment; own browser with activity control
of other programs in the operating system. Among the disadvantages: the solution is commercial and
with closed source code; impossibility of embedding directly into Moodle or ATutor educational
material management system, only limited integration with Moodle is available; no integration with
LMS ATutor; works only in the Google Chrome browser.
      </p>
      <p>
        SpeedExam [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] is versatile commercial online exam software that offers several advanced features
such as automated grading and instant reporting. Among the advantages: screen recording; batch
import of test questions from Word and Excel format, Certificate Maker – creates the certificate for
the student, as well as a detailed analysis of the exams and the student’s performance. Disadvantages:
the inability to work directly embedded in the LMS – it is a separate commercial solution that
practically does not integrate with the LMSs and requires a separate import of a test questions bank
into this system or manual input (Fig. 2).
      </p>
      <p>
        OES [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] is an automatic proctoring system. This proctoring system is presented by a Kazakh
developers. The system fully controls the student's camera, microphone, screen using AI, Computer
Vision and other technologies while taking the exam. Among the advantages: high accuracy of face
recognition, detection of strangers, as well as noises and voices, detection of the presence of multiple
screens, right mouse button blocking, detection of attempts to copy or paste text, works with slow
Internet connection and low-end PCs.
      </p>
      <p>The system is able to integrate with such LMSs as Univer, Moodle, Canvas, Indigo, Sirius.</p>
      <p>
        Moodle Proctoring [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] is a LMS Moodle module for identity verification and proctoring that
allows users to take web camera photos to identify who is attempting to take a Moodle test.
Automatically captures an image every 30 seconds (configurable) and saves it as a PNG file on the
server. Also takes screenshots during the test.
      </p>
      <p>Before starting the test, the module asks for permission to access the camera and permission to
view the screen. After granting the permission, the user can see image of himself on the screen and
start answering questions. At certain intervals, snapshots from the web camera and the screen are sent
to the server, so the user can not try to do anything suspicious during assessment. Among the
advantages: the solution is completely open (open source), integrates into LMS Moodle, thanks to
which it works with the existing bank of test questions and the configured test solution of LMS
Moodle; API for external access. By connecting the Amazon Rekognition or Brainstation
Facerecognition API, it is possible to enable automatic face recognition. Among the disadvantages: it
does not automatically make a decision on granting access to the test on its own - a human is needed
to make a decision; there is no native implementation of face recognition algorithms - this function
relies on third-party commercial APIs.</p>
      <p>
        Proctortrack [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] is also an automatic proctoring system. Often used in many educational
institutions around the world. Among the advantages: in addition to face recognition, there is ID
card/student card recognition; Knuckle Scans - finger length recognition; the proctoring system is
integrated with such LMSs as Sakai, Canvas, Moodle and others. Among the disadvantages, it should
be noted: the need for sufficient lighting in the room, as the system may prevent the student from
taking the exam.
      </p>
      <p>
        Proctorio [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] is a proctoring system characterized by a high degree of information protection. All
data collected after the exam is transmitted in encrypted form to the student or the institution. Among
the advantages: automated ID verification by a person conducting the test - Automated ID
Verification, as well as the same, but by the company's support service - Live ID Verification; Desk
Scan – feature for scanning of student’s work setting; detection of plagiarism; protection of the test
screen from copying and information distribution to the public; protection to avoid secondary login so
that an unauthorized person cannot enter the system after actual student was identified and granted
access.
      </p>
    </sec>
    <sec id="sec-4">
      <title>4. Conclusion</title>
      <p>Based on the results of the analysis of known existing solutions for identity verification during
knowledge assessment, the following conclusions can be drawn:
 solutions like OES, Moodle Proctoring, Proctotrack, Proctorio allow to fully integrate them
into common electronic learning systems (LMS) to use existing database of test questions and
already configured tools for knowledge assessment, the rest do not;
 all solutions except Moodle Proctoring are commercial and closed source, and therefore do not
allow any modification, customization and improvement;
 the considered technical solutions do not have the ability of direct integration with LMS</p>
      <p>ATutor in any way;
 none of the solutions provide a guaranteed high percentage (95% or more) error-free result.</p>
      <p>In identity verification, the main task is high-accuracy face recognition, which starts with face
detection in an image, which is one of the variations of the general task of object detection. Face
recognition can be defined as determining whether a given image contains faces, and if it does,
finding the location of each face. Today, there are dozens of computer-based face detection and
recognition methods. However, these methods do not provide 100% accuracy and reliability, also at
the same time, often have limitations in recognition performance.</p>
      <p>Among the main challenges and problems that arise in the implementation of human face
recognition algorithms are: insufficient illumination conditions; variable expressions of emotions in
the faces; different types of skin tones; varying distances from the camera to the face; varying face
orientations; complex background, partial overlapping of faces with glasses, elements of clothing,
hands, hair, medical masks, etc., insufficient resolution of video equipment, etc.</p>
      <p>All these reasons determine the need for further research, with the aim of developing and
implementing a technical solution using AI technologies, which would ensure automatic and effective
verification of identity during knowledge assessment in the LMS of an educational institution, which
would be based on the use of web technologies and common (including mobile) software and
hardware of users that they use on daily basis. The desired solution should have at least 95% accuracy
and perform 1 second per identification or better. It also should be able to integrate with LMS ATutor
to use it’s test question database and knowledge assessment tools.</p>
    </sec>
    <sec id="sec-5">
      <title>5. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Shkodzinsky</surname>
            ,
            <given-names>O. K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lutskiv</surname>
            <given-names>М</given-names>
          </string-name>
          . М,
          <string-name>
            <surname>Smolii</surname>
            <given-names>I.-M. S.</given-names>
          </string-name>
          <article-title>Development of means of identity verification and other actions during knowledge control in the conditions of distance learning</article-title>
          .
          <source>Ⅹ International Scientific and Practical Conference of Young Scientists and Students «Actual Problems of Modern Technologies». Ternopil</source>
          ,
          <volume>24</volume>
          -
          <fpage>25</fpage>
          november
          <year>2021</year>
          , I,
          <fpage>138</fpage>
          -
          <lpage>139</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Lypak</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rzheuskyi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kunanets</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pasichnyk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <article-title>Formation of a Consolidated Information Resource by Means of Cloud Technologies</article-title>
          . 2018
          <source>International Scientific-Practical Conference on Problems of Infocommunications Science and Technology, PIC S and T 2018 - Proceedings</source>
          , pp.
          <fpage>157</fpage>
          -
          <lpage>160</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>V.</given-names>
            <surname>Martsenyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sverstiuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Bahrii-Zaiats</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Rudyak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Shelestovskyi</surname>
          </string-name>
          ,
          <article-title>Software complex in the study of the mathematical model of cyber-physical systems</article-title>
          ,
          <source>in: CEUR Workshop Proceedings</source>
          , volume
          <volume>2762</volume>
          ,
          <year>2020</year>
          , pp.
          <fpage>87</fpage>
          -
          <lpage>97</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Dyachuk</surname>
            ,
            <given-names>S. F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Konovalenko</surname>
            ,
            <given-names>I. V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shkodzinsky</surname>
            ,
            <given-names>O. K.</given-names>
          </string-name>
          <article-title>Virtual educational environment of TNTU on the base LMS ATutor</article-title>
          .
          <article-title>International scientific-practical seminar "Theory and practice of distance learning of foreign citizens: domestic and international experience"</article-title>
          <source>Kharkiv, 12 november</source>
          <year>2014</year>
          ,
          <volume>12</volume>
          ,
          <fpage>11</fpage>
          -
          <lpage>15</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Online</given-names>
            <surname>Exam Software</surname>
          </string-name>
          :
          <article-title>A complete Exam Management System - ExamOnline: URL: https://examonline</article-title>
          .in/,
          <volume>10</volume>
          .
          <fpage>10</fpage>
          .
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>[6] SpeedExam: Online Assessment Software: https://www.speedexam.net/</mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Proctoring system</surname>
            <given-names>OES</given-names>
          </string-name>
          : https://oes.kz/en, 10.
          <fpage>10</fpage>
          .
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <article-title>[8] Moodle plugins directory</article-title>
          . Moodle Proctoring: https://moodle.org/plugins/quizaccess_proctoring,
          <volume>10</volume>
          .
          <fpage>10</fpage>
          .
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Proctortrack</surname>
          </string-name>
          . Trusted Exam Integrity. Remote Online Proctoring: https://www.proctortrack.com,
          <volume>10</volume>
          .
          <fpage>10</fpage>
          .
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <article-title>Securing the integrity of online assessments</article-title>
          : Proctorio: https://proctorio.com,
          <volume>10</volume>
          .
          <fpage>10</fpage>
          .
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>