English  |  正體中文  |  简体中文  |  Items with full text/Total items : 90069/105176 (86%)
Visitors : 6436470      Online Users : 504
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    ASIA unversity > 資訊學院 > 光電與通訊學系 > 期刊論文 >  Item 310904400/111719


    Please use this identifier to cite or link to this item: http://asiair.asia.edu.tw/ir/handle/310904400/111719


    Title: A Biometric-Based Authentication and Anonymity Scheme for Digital Rights Management System
    Authors: 李正吉;Lee, Cheng-Chi
    Contributors: 光電與通訊學系
    Date: 2018-06
    Issue Date: 2018-12-25 10:57:21 (UTC+8)
    Abstract: Due to the rapid development of computer technologies, many traditional contents have been digitized, adding to the immensity of digital contents. Through the Internet, various digital contents can be accessed and spread all over the world within the snap of a finger. However, such amazing swiftness and convenience have also brought various kinds of data security, privacy and copyright protection issues. Digital rights management (DRM) systems are access control technologies used to restrict the use, modification, and distribution of protected digital contents. The success of a DRM system relies heavily on a good user authentication mechanism, and user identity verification through biometric information check is a great idea in that the biological characteristics are unique to each user and that such a mechanism releases the user of the trouble of keeping the login info safe from being stolen or mistaken or forgotten. On the other hand, in response to modern people’s prevalent use of mobile devices, DRM systems should also support mobile digital content access. In this paper, we shall propose a novel biometric-based authentication and anonymity scheme for DRM system. To develop our new scheme, we have carefully studied Jung et al.'s scheme, a biometric-based protocol whose architecture is similar to that of a DRM system but not quite the same, and modified it to fit the requirements of a DRM system environment. Our correctness check, security analysis, and performance evaluation have proved the superiority of our new scheme over related schemes.
    Relation: INFORMATION TECHNOLOGY AND CONTROL
    Appears in Collections:[光電與通訊學系] 期刊論文

    Files in This Item:

    File SizeFormat
    index.html0KbHTML28View/Open


    All items in ASIAIR are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback