Biometrics in Digital Rights Management

Publisher Summary This chapter reviews biometric systems, and elaborates on their applicability to the digital rights management (DRM) problem. It explains the user's reliable authentication so that only legitimate ones can access the content. User authentication can be accomplished in one or as a combination of the three schemes: token-based authentication, knowledge-based authentication, and biometrics-based authentication. A generic biometric authentication system is composed of several modules: sensor, feature extractor, matcher, and database. These modules are used in three interrelated tasks: enrollment, in which the user's biometric is converted to a template and stored in the database; verification, in which the user's template obtained online is compared to the stored template associated with the claimed identity; and identification, in which the biometric system tries to find the identity of the user by comparing the online template with all the templates stored in the database. The chapter summarizes several scenarios that aim to secure disjoint portions of the overall system––namely, delivery, player, and content.

[1]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[2]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[3]  Bhagavatula Vijaya Kumar,et al.  Biometric Encryption: enrollment and verification procedures , 1998, Defense + Commercial Sensing.

[4]  Qi Li,et al.  Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[5]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[6]  Anil K. Jain,et al.  FVC2002: Second Fingerprint Verification Competition , 2002, Object recognition supported by user interaction for service robots.

[7]  W. W. Peterson,et al.  Error-Correcting Codes. , 1962 .

[8]  Michael K. Reiter,et al.  Password hardening based on keystroke dynamics , 1999, CCS '99.

[9]  W. Gareth J. Howells,et al.  The autonomous document object (ADO) model , 2001, Proceedings of Sixth International Conference on Document Analysis and Recognition.

[10]  Qi Li,et al.  Using voice to generate cryptographic keys , 2001, Odyssey.

[11]  Sharath Pankanti,et al.  Fuzzy Vault for Fingerprints , 2005, AVBPA.

[12]  Kaoru Uchida Fingerprint-based user-friendly interface and pocket-PID for mobile authentication , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.

[13]  T. Charles Clancy,et al.  Secure smartcardbased fingerprint authentication , 2003, WBMA '03.

[14]  John Daugman,et al.  High Confidence Visual Recognition of Persons by a Test of Statistical Independence , 1993, IEEE Trans. Pattern Anal. Mach. Intell..

[15]  Jianying Hu,et al.  User interface for a PCS smart phone , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[16]  Anil K. Jain,et al.  Multimedia content protection via biometrics-based encryption , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[17]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..