Increasing security in DRM systems through biometric authentication

نویسندگان

  • Javier Ortega-Garcia
  • Josef Bigun
  • Douglas Reynolds
  • Joaquin Gonzalez-Rodriguez
چکیده

IEEE SIGNAL PROCESSING MAGAZINE 50 MARCH 2004 ecuring the exchange of intellectual property and providing protection to multimedia contents in distribution systems have enabled the advent of digital rights management (DRM) systems [5], [14], [21], [47], [51], [53]. Rights holders should be able to license, monitor, and track the usage of rights in a dynamic digital trading environment, especially in the near future when universal multimedia access (UMA) becomes a reality, and any multimedia content will be available anytime, anywhere. In such DRM systems, encryption algorithms, access control, key management strategies, identification and tracing of contents, or copy control will play a prominent role to supervise and restrict access to multimedia data, avoiding unauthorized or fraudulent operations. A key component of any DRM system, also known as intellectual property management and protection (IPMP) systems in the MPEG-21 framework, is user authentication to ensure that only those with specific rights are able to access the digital information. It is here that biometrics can play an essential role, reinforcing security at all stages where customer authentication is needed. The ubiquity of users and devices, where the same user might want to access to multimedia contents from different environments (home, car, work, jogging, etc.) and also from different devices or media (CD, DVD, home computer, laptop, PDA, 2G/3G mobile phones, game consoles, etc.) strengthens the need for reliable and universal authentication of users. Classical user authentication systems have been based in something that you have (like a key, an identification card, etc.) and/or something that you know (like a password, or a PIN). With biometrics, a new user authentication paradigm is added: something that you are (e.g., fingerprints or face) or something that you do or produce (e.g., handwritten signature or Javier Ortega-Garcia, Josef Bigun, Douglas Reynolds, and Joaquin Gonzalez-Rodriguez

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multimodal Biometrics for authentication using DRM Technique

Aim of this project is to implement a novel authentication scheme to establish Digital Rights Management (DRM) based on multimodal biometric verification and watermarking technique. Security of biometric system is a major concern. An attack on a biometric system can result in loss of privacy, monetary damage and security breach. Biometric system offer better security then existing approaches. T...

متن کامل

Biometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm

Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...

متن کامل

ارائه رویکردی برای مدیریت تشخیص سریع برخط با استفاده از فناوری بیومتریک در اینترنت اشیا

Internet of Things (IOT) is a newly developed concept in the world of technology and communication which provides the ability to transfer technological information to everything, including human, animals, or objects, through communication networks such as internet or intranet. Biometric technology offers various applications. The main objective is to provide an appropriate alternative for contr...

متن کامل

Accessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets

In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...

متن کامل

Accessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets

In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001