adaptive e-learning applications with transparent user...

11
Adaptive E-learning with Transparent User Identification Kamen Kanev, Noriaki Kamiya, Nikolay Mirenkov, Go Kanda, Akiyuki Takagi University of Aizu, Aizu-wakamatsu City, Fukishima-ken, 965-8580, Japan {kanev|kamiya|nikmir}@u-aizu.ac.jp

Upload: lamkhuong

Post on 10-Mar-2018

213 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Adaptive E-learning Applications with Transparent User ...ktm11.eng.shizuoka.ac.jp/HC2011/HC-2009_Word_version.doc · Web viewRFID-based authentication methods discussed in the previous

Adaptive E-learning with Transparent User Identification

Kamen Kanev, Noriaki Kamiya, Nikolay Mirenkov, Go Kanda, Akiyuki Takagi

University of Aizu, Aizu-wakamatsu City, Fukishima-ken, 965-8580, Japan{kanev|kamiya|nikmir}@u-aizu.ac.jp

Page 2: Adaptive E-learning Applications with Transparent User ...ktm11.eng.shizuoka.ac.jp/HC2011/HC-2009_Word_version.doc · Web viewRFID-based authentication methods discussed in the previous

Abstract

In this work we discuss methods and technologies for transparent user authentication in the context of adaptive e-learning. A new collaborative e-learning environment model with support for adaptive applications is proposed. Based on it an augmented interactive desktop that allows individual and shared use of digitally enhanced educational handouts as tangible interface components is developed. Cluster Pattern Interface (CLUSPI) enabled cards for elementary math tutoring are designed and educational activities at individual, group, and class levels are considered.

Keywords: E-learning, collaborative learning, transparent authentication, RFID, fingerprint recognition, adaptive applications.

1. Introduction

User recognition and authentication play an important role in e-learning, especially when adaptive applications are considered. Widely used password-based authentication, however, appears to be difficult to employ when quick, transparent context changes are required. Frequent user changes that naturally occur when two or more learners are collaborating and sharing an e-learning workstation, for example, can hardly be handled through password authentication. Furthermore, in adaptive applications, user context management and personalization of application interfaces and functionality have to be conducted on a continuous basis.

In our previous studies [1] we have investigated collaborative language learning in a dynamic group environment where students are free to work individually, to do pair work, or to form larger groups at any time. When learning, students could use digitally enhanced printed materials and supportive digital content, accessible through shared CLUSPI readers [2]. For gathering proper feedback about group formation, interaction in groups, and group disbanding we have suggested employing RFID tags assigned to students and compact handheld RFID readers integrated with CLUSPI devices.

In this work, along with the continued discussion of RFID-based authentication, we also consider biometric methods for user identification

and authentication [3]. Since in our experiments we work with elementary school children, we believe that the solution eliminating the need of digitally enhanced user IDs and using purely biometric data might be more suitable [4].

2. Methods and technological means for transparent user authentication

Transparent user authentication refers to recognizing people on the fly, without disturbing or interfering with their current activities. Such identification happens, for example, in quite a natural way when people interact between themselves. In human societies, we can quickly recognize each other by the way we look, by the way we speak, and by the many other distinctive features that make us unique.

For a computer system, however, recognition and authentication of humans on the fly is far from a trivial task. Consequently, instead of addressing this problem, many of the commercial user authentication systems would rather rely on digitally enhanced user IDs. Those could be in the form of badges with barcodes, magnetic stripes, embedded RFID (Radio Frequency Identification) tags, etc. RFID-based methods seem to be particularly suitable for transparent user identification, since they provide instant access to ID data without contact or clear line of sight requirements [5]. Our RFID-related studies and experimental work are reported in the following sections.

A potentially better solution for transparent user identification would be to eliminate the need of digitally enhanced user IDs and to use purely biometric data [3,4]. Here we present a non-exhaustive list of currently available biometric authentications methods that could be presumably employed for transparent user identification:

Face Recognition Voice Recognition Signature Recognition Iris Recognition Retina Recognition Fingerprint Recognition Hand Recognition Finger Geometry Palm Geometry People are good at recognizing human faces

and voices, but unfortunately currently available

Page 3: Adaptive E-learning Applications with Transparent User ...ktm11.eng.shizuoka.ac.jp/HC2011/HC-2009_Word_version.doc · Web viewRFID-based authentication methods discussed in the previous

face and voice recognition methods and algorithms lag far behind, and remain of limited practical use. Other enlisted biometric methods such as iris, retina, and signature recognition require voluntary user actions and thus are not suitable for transparent user authentication.

In human-computer interaction, the two most commonly used input devices are the keyboard and the mouse. During the interaction process, humans are constantly in contact with these input devices. Therefore, for a truly transparent user authentication, we would only need to make the computer sense and recognize human fingers or hands in the course of the input process. We thus mark the hand and finger related biometric methods on the above list as good potential candidates for more detailed studies and experiments. Further discussions and details about appropriate input devices with built-in biometric sensors, suitable for transparent user authentication will be given in the following sections.

2.1. RFID-based user authentication

Currently available RFID technologies work with passive tags of different shapes and sizes that can be sensed from a few centimeters to a few meters and with active, battery powered tags that can operate at even larger distances [6]. In contrast to optical technologies like barcoding, where a clear line of sight is always required, the RFID tags can be accessed even in presence of visual obstacles. RFID technologies are also more stable and prone to damages and errors, and do not require contact or close proximity as magnetic stripes.

In the context of e-learning, truly transparent user identification and tracking of user activities could only be achieved if users do not have to take any conscious actions to authenticate themselves. The proper selection of RFID tag types, their sensing ranges and the way users wear them thus becomes a very important issue. Limited range hand-wearable RFID tags, for example, would be most suitable for properly tracking the person currently in charge of the input. Wider range RFID badges, on the other hand, would suit for identifying members of a group, gathered in front of a computer monitor. The method that we chose to employ is based on wearable RFID rings

and on compact RFID readers, integrated with traditional input devices such as keyboards, mice, handheld scanners, and CLUSPI readers. For illustration we show in Fig.1(a) several such rings created by attaching button-type RFID tags to magic tape stripes and conventional plastic rings.

(a) (b)

Figure 1. RFID rings (a) and a RFID mouse (b).

The RFID rings can be used when operating RFID-enabled keyboards as discussed in [7] or the RFID mouse shown in Fig.1(b).

Figure 2. The combined RFID-CLUSPI reader.

For our experiments we have also prepared an integrated RFID-CLUSPI reader that combines the CLUSPI direct point-and-click functionality [8] with the RFID user identification. For illustration, a user wearing one of the rings and holding the developed RFID-CLUSPI reader is shown in Fig.2.

User identification is conducted on the fly in a transparent and unobtrusive way, whenever users interact with the RFID-enabled device. In this way collaborative groups of learners, sharing existing

Page 4: Adaptive E-learning Applications with Transparent User ...ktm11.eng.shizuoka.ac.jp/HC2011/HC-2009_Word_version.doc · Web viewRFID-based authentication methods discussed in the previous

e-learning environments, could be created and managed.

2.2. Fingerprint-based user authentication

RFID-based authentication methods discussed in the previous section require all users to wear RFID tags which may cause some inconveniences, especially when children and elderly people are involved [4]. In this context, alternative approaches, such as fingerprint identification, vascular pattern recognition and other biometrics authentication methods that do not require tagging are worth considering. Fingerprint authentication is a mature technology and affordable development systems and software kits are available from different makers. We will, therefore, continue with a more detailed discussion of some current fingerprint authentication equipment and supporting software development tools.

Figure 3. Fingerprint authentication system.

A typical fingerprint authentication system (Fig.3) consists of a fingerprint reader (1) connected to a computer (2) and fingerprint authentication software (3) that integrates with the operating system of the employed computer. In this way, fingerprint-based user authentication becomes an alternative, or a complete replacement of the standard password-based user authentication embedded in the operating system. While this is a convenient approach that establishes fingerprint-based control over the user access to system facilities, software and data, it does not allow more granular, application level access management and control. For access to such lower level

functionality appropriate SDK and tools, which are provided only at the discretion of the fingerprint reader producer, are necessary. Based on this criterion we have acquired from RATOC Systems, Inc. the fingerprint reader hardware, software and development tool set shown in Fig.4.

Figure 4. The fingerprint reader hardware, software and tools from RATOC Systems, Inc.

The currently available SDK supports only Windows-based development and thus for now we conduct all our experimental work on Microsoft Windows machines.

RegisteredUser

Database

Feature Extraction

(FAM) Fingerprint Authentication Module

(FRD) Fingerprint

Reader Device

Input ofFingerprint

Images

UserDatabaseSearch

AuthenticatedUser ID

E-learning Application User IDInput

ProfileDataInput

(UMM) User Management Module

ProfileData

Request

User Profile Data Queries

Figure 5. Structure of the developed fingerprint identification software.

The structure of the developed fingerprint identification software and its integration with separately built applications is shown in Fig.5. The Fingerprint Authentication Module (FAM) first obtains fingerprint images from the fingerprint reader through a USB connection. Feature extraction algorithms are then applied to the acquired images and, based on the result, a search in the user database is conducted. If a positive user authentication is obtained, the corresponding user

Page 5: Adaptive E-learning Applications with Transparent User ...ktm11.eng.shizuoka.ac.jp/HC2011/HC-2009_Word_version.doc · Web viewRFID-based authentication methods discussed in the previous

ID is sent to a separately built application directly or via the User Management Module (UMM) as depicted in Fig.5. Note that the FAM module operates in a continuous mode and produces a stream of authenticated user IDs as long as a properly registered user finger stays within the sensing range of the fingerprint reader device. This functionality is a basis of the core transparent user authentication that we propose and allows separately built applications to get notifications of user changes in real time.

Some fingerprint reader devices, however, appear to lack continuous fingerprint input capabilities. The device shown in Fig.6, for example, requires a sliding finger gesture to be performed for every fingerprint input. Obtaining a stream of authenticated user IDs is then only possible if the user constantly slides his finger over the sensor, which obviously does not constitute an acceptable interaction method.

Figure 6. A sliding fingerprints reader.

To implement truly transparent user authentication one would actually need a fingerprint reader device integrated with other traditional input devices in such a way that users do not even notice its presence. The fingerprint mouse shown in Fig.7 is one such example and we are considering using it for comparative studies during our experimental work. When a user holds the fingerprint mouse his thumb stays within the sensing range of the embedded fingerprint reader and thus allows continuous sensing and streaming of fingerprint images. Once the user releases the mouse, however, his thumb leaves the fingerprint

reader sensing range and the streaming of fingerprint images is interrupted. In this way multiple users could share a single mouse and still the current user would be always positively identified.

Figure 7. A fingerprint mouse.

There are also fingerprint keyboards that employ an embedded fingerprint reader for user authentication. Unfortunately, with such keyboards, fingerprint scanning and typing are two independent processes that cannot be easily integrated. It is not difficult to envisage, however, that future keyboards might have contact fingerprint scanners embedded in all their keys and then, simultaneous typing and authentication would become possible to implement.

Similarly to the fingerprint mouse in Fig.7 we are considering an integrated fingerprint-CLUSPI input device. It could be constructed by combining a compact fingerprint reader with a standard CLUSPI device in a way much similar to the one employed for building the integrated RFID-CLUSPI device shown in Fig.2. The resulting fingerprint-CLUSPI reader, although being a single integrated device, could still function as two independent devices with separate USB connections. In this way no special software for the integrated device would be need and the standard drivers and previously developed CLUSPI related and fingerprint authentication based applications could be used with no modifications.3. Digitally-enhanced collaborative e-learning

environments

We are currently developing a new collaborative e-learning environment model with extended support for adaptive applications and transparent user identification. Based on it, an augmented interactive desktop that allows shared

Page 6: Adaptive E-learning Applications with Transparent User ...ktm11.eng.shizuoka.ac.jp/HC2011/HC-2009_Word_version.doc · Web viewRFID-based authentication methods discussed in the previous

use of digitally enhanced physical objects as tangible interface components, is being constructed [9]. The augmented interactive desktop could be used in practical experiments with digitally enhanced printed handouts for elementary math tutoring and language learning [10]. A schematic diagram of the currently developed software system is shown in Fig.8.

(FAM) Fingerprint Authentication Module

(FRD) FingerprintReader Device

(UMM) User Management Module

User Profile Data Queries

(RAM) RFIDAuthentication Module

(RRD) RFIDReader Device

RAMSection

FAMSection

User Database

AdditionalAuthentication Module(s)

AdditionalAuthentication

Device(s)

OtherSection(s)U

ser Profile D

ata

Authenticated User ID

User ID Interface User Profile Access Interface

E-learning Application

E-learning Application

Figure 8. A schematic diagram of the developed software system.

The system has a modular structure and is specifically designed to support different user authentication methods. At present we have a fully functional prototype of the RFID authentication module while the fingerprint authentication module is still under implementation. Additional user identification modules will also be developed and added to the system in the future.

Since different authentication methods could employ different input devices, a default authentication method is supplied to the system during the initialization. Based on that, an appropriate user authentication module is selected and access to the corresponding user database sections is ensured.

When a user is authenticated by any of the available authentication modules its unique user ID is sent to the UMM module as explained in the previous chapters. Here we will continue with an outline of the UMM module functionality.

The UMM module is mainly responsible for providing independently developed applications with user related data, extracted from the user

database according to their needs. One application may need to know, for example, the age of the users while another may need their genders. Instead of allowing every application to query the user database independently, one could gather and process all the queries within the UMM module and thus ensure more efficient and secure database access. Following this model, applications could register the user profile parameters of interest with the UMM User Profile Access Interface. Afterwards, whenever a user is successfully authenticated, the UMM will be automatically providing the required user data to the relevant applications.

4. Experimental framework for adaptive elementary math tutoring

In this section we discuss some practical aspects of the collaborative e-learning environment model presented earlier. Our objective here is to build an experimental framework, based on the model and employing educational content directly applicable in school tutoring.

Elementary math tutoring has always been recognized as a demanding process, which is expected to set up the foundations of abstract thinking and to promote interest in exact sciences since childhood. It is important, thus, to enhance and diversify traditional math lessons so that students become more engaged through e-learning and interactive activities. In our experimental implementation of the collaborative e-learning environment model, we provide digitally enhanced educational materials for elementary math tutoring that are suitable for class work, groupwork and self-studies [10].

We implement the augmented interactive desktop as a standard tabletop with digitally enhanced picture cards and an RFID-CLUSPI reader. A single student could use the cards to answer automatically generated elementary math problems by pointing and clicking with the RFID-CLUSPI reader on the cards. In a group of two or more students, participants could take turns to formulate and to solve problems. In a class, the teacher could formulate problems, shown on a large screen and students could register their answers simultaneously. Digitally enhanced picture cards could also be used for building

Page 7: Adaptive E-learning Applications with Transparent User ...ktm11.eng.shizuoka.ac.jp/HC2011/HC-2009_Word_version.doc · Web viewRFID-based authentication methods discussed in the previous

educational games, such as the elementary math domino shown in Fig.9.

Figure 9. Elementary math domino.

In all cases, the system obtains feedback about the current user by sensing his RFID tag. This functionality is highly desirable even for individual use, since such transparent user authentication gives instant access to the user profile and his learning history. Changeable data related to the current user could be stored locally by the application, in the user database or on the RFID tag. In the first two cases, when user changes computers, e.g. a school computer and a home computer, the stored learning history has to be explicitly communicated over the network or transferred by a memory stick, etc. When the RFID tag is used, however, the user history always stays with him, embedded in his RFID, so much simpler infrastructure becomes possible.

5. Conclusions and future work

In this work we have reported a new approach for building digitally enhanced collaborative e-learning environments incorporating transparent user recognition and authentication through RFID tags and biometric data. The approach has been applied to the implemented augmented interactive desktop and will be employed in adaptive elementary math tutoring experiments in collaboration with teachers at local elementary schools.

References

[1] Kanev, K., Turk, D., Orr, T., Brine, J., A Dynamic Group Environment for Collaborative Language Learning. In Proceedings of the 15th

International Conference on Computers in Education (ICCE 2007), Hiroshima, Japan, November 5-9, 2007, pp.151-158.

[2] Kanev, K., Orr, T., Enhancing Paper Documents with Direct Access to Multimedia for an Intelligent Support of Reading, In Proceedings of the IEEE Conference on the Convergence of Technology and Professional Communication (IPCC 2006), Saratoga Springs, New York, USA, 23-25 Oct. 2006.

[3] Jain, A., Hong, L., Pankanti, S., Biometric Identification, Communications of the ACM, Vol. 43, No. 2, pp. 91-98, February, 2003.

[4] Jones, L. A., Anton, A. I., Earp, J. B., Towards Understanding User Perceptions of Authentication Technologies, In Proceedings of the 2007 ACM workshop on Privacy in electronic society WPES’07, October 29, 2007, Alexandria, Virginia, USA, pp.91-98.

[5] Want, R., The magic of RFID, Queue, Vol.2, No. 7, pp. 40-48, October, 2004.

[6] Lahiri, S., RFID Source Book, IBM Press, 2006.[7] Graafstra, A., Build It: An RFID Keyboard, PC

Magazine, August, 2006.[8] Kanev, K., Kimura, S., Direct Point-and-Click

Functionality for Printed Materials, The Journal of Three Dimensional Images, Vol. 20, No. 2, pp. 51-59, 2006.

[9] Kanev, K., Kimura, S., Kobayashi, N., Yamauchi, K., Employment of Physical Objects as Interactive Interface Components. In Proceedings of CLIHC2007 held in conjunction with the 11th IFIP TC 13 Conference on Human-Computer Interactions (INTERACT’2007), Rio de Janeiro, Brazil, September 10-14, 2007.

[10]Kanev, K., Kamiya, N., Mirenkov, N., Digitally Enhanced Printed Handouts for Elementary Math Tutoring, In Proceedings of the Fourth International Conference on New Exploratory Technologies (NEXT 2007), Seoul, Korea, October 25-27, 2007, pp.227-230.