MULTILEVEL NETWORK SECURITY SYSTEM USED IN ARM PLATFORM

Sri Vasavi College, Erode Self-Finance Wing 3rd February 2017 National Conference on Computer and Communication NCCC’17

Format: Volume 5, Issue 1, No 2, 2017

Copyright: All Rights Reserved ©2017

Year of Publication: 2017

Author: G.Priya

Reference:IJCS-161

View PDF Format

Abstract

This paper presents two level data security in Network system. Cryptographic algorithm BLOWFISH and Steganography algorithm List significant Bit (LSB) are used for data security. Confidential information is encrypted by BLOWFISH algorithm, and then encrypted data hide into image by LSB algorithm of Steganography. For more security is used iris image of authorized person to hide encrypted data. The keys required for BLOWFISH algorithm is generated from same iris image. These two algorithms implemented on 32 bit ARM 7. In the result of project include memory utilization, processing time for encryption and decryption etc. this project gives better security for embedded systems like mobile, smart card, ATM etc.

References

[1] Johnson, Neil F. And Sushil Jajodia. “Exploring steganography: seeing the unseen.” IEEE computer, 32:2. 26-34. 1998. [2] Proves, N. And Honeyman, P. “Hide and Seek: An Introduction to steganography.” IEEE security &privacy, (2003). [3]William Stallings, ―Cryptography and Network Security: Principles and Practice‖, 4th Edition, Prentice Hall, 2006. [4]Alex Salkever, Open-Source Security Is Opening Eyes, BusinessWeek Online, and 19 November 2002: [5]Andrew Conry-Murray, Kerberos: Computer Security’s Hellhound, Network Magazine, 5 July 2001: [6] Menezes, A., Van Oorschot, P., and Vanstone, S. “Handbook of applied cryptography.” CRC Press, (1996). [7] Hassan Mathkour, Batool AL-sadoon, ameur touir ” a new image steganography technique”. [8] Sim hiew moi, nazeema binti abdul rahim,puteh saad, pang li sim, zalmiyah zakaria, subariah ibrahim, “iris biometric cryptography for identity document”, 2009 international conference of soft computing and pattern recognition. [9] Sujay narayana1and gaurav prasad” two new approaches for secured image steganography using cryptographic techniques and type conversions” signal & image processing: an international journal (sipij) vol.1, no.2, December 2010. [10] Mamta juneja 1, parvinder singh sandhu2 “designing of robust image steganography technique based on lsb insertion and encryption” 2009 international conference on advances in recent technologies in communication and computing.


Keywords

Network Security, Blowfish, Cryptography, Embedded System, List Significant Bit, Steganography

This work is licensed under a Creative Commons Attribution 3.0 Unported License.   

TOP
Facebook IconYouTube IconTwitter IconVisit Our Blog