Abstract

This chapter reviews biometric systems, and elaborates on their applicability to the digital rights management (DRM) problem. It explains the user's reliable authentication so that only legitimate ones can access the content. User authentication can be accomplished in one or as a combination of the three schemes: token-based authentication, knowledge-based authentication, and biometrics-based authentication. A generic biometric authentication system is composed of several modules: sensor, feature extractor, matcher, and database. These modules are used in three interrelated tasks: enrollment, in which the user's biometric is converted to a template and stored in the database; verification, in which the user's template obtained online is compared to the stored template associated with the claimed identity; and identification, in which the biometric system tries to find the identity of the user by comparing the online template with all the templates stored in the database. The chapter summarizes several scenarios that aim to secure disjoint portions of the overall system––namely, delivery, player, and content.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.