A Secured Biometric Framework for Multimedia Content Protection
نویسندگان
چکیده
The multimedia content protection has become a boon for an IT industry nowadays. This scheme is based on layered encryption/decryption involving biometric authentication. Utilization of fingerprints as keys in encryption/decryption procedures eliminates the feasibility of illegal key sharing, which hampers the content protection schemes based solely on traditional keys. The computation times required for the necessary encryption and decryption processes are provided for AES symmetric-key system and HECC asymmetric-key system. These times show the applicability of the method. Utilization of widely available encryption/decryption systems (e.g., AES and HECC) increases the applicability even further. Custom hardware chips will reduce these times in future applications.
منابع مشابه
Multimedia content protection via biometrics-based encryption
We propose a multimedia content protection framework that is based on biometric data of the users and a layered encryption/decryption scheme. Password-only encryption schemes are vulnerable to illegal key exchange problems. By using biometric data along with hardware identifiers as keys, it is possible to alleviate fraudulent usage of protected content. A combination of symmetric and asymmetric...
متن کاملDe-identification for privacy protection in multimedia content: A survey
Privacy is one of the most important social and political issues in our information society, characterized by a growing range of enabling and supporting technologies and services. Amongst these are communications, multimedia, biometrics, big data, cloud computing, data mining, internet, social networks, and audio–video surveillance. Each of these can potentially provide the means for privacy in...
متن کاملA Novel approach for securing biometric template
Template and database are critical parts of biometric systems. Attacker usually afflict biometric template. There can be various attacks on different modules of biometrics system and communication links among them. Securing templates from these attacks have become very important or imperative issue. Security is achieved by methods of cryptography, which deals with encryption of data. Encryption...
متن کاملTitle Architectures and Technologies for Adaptation of Secured Content in Governed Multimedia Applications Affiliations and Contacts Architectures and Technologies for Adaptation of Secured Content in Governed Multimedia Applications
The wide range of media and consumer devices, currently available, has raised new security requirements for multimedia systems and their applications. Despite the wide variety of work conducted on the access control, Digital Rights Management (DRM) and adaptation areas to date, there is a lack of initiatives addressing them together. This article analyzes existing initiatives and proposes new t...
متن کاملMPEG-21: goals and achievements - Multimedia, IEEE
standards-based framework for multimedia delivery and consumption. It aims to enable the use of multimedia resources across a wide range of networks and devices. In this article, we discuss MPEG-21’s parts, achievements, ongoing activities, and opportunities for new technologies. T he appetite for content consumption and easier access to information continues to increase rapidly. Access devices...
متن کامل