Journal of Embedded Systems
ISSN (Print): 2376-7987 ISSN (Online): 2376-7979 Website: https://www.sciepub.com/journal/jes Editor-in-chief: Naima kaabouch
Open Access
Journal Browser
Go
Journal of Embedded Systems. 2015, 3(1), 11-15
DOI: 10.12691/jes-3-1-2
Open AccessArticle

Multilevel Network Security Combining Cryptography and Steganography on ARM Platform

Pallavi H. Dixit1, , Kamalesh B. Waskar1 and Uttam L. Bombale2

1Electronics and Telecommunication, Bharati Vidyapeeth College of Engineering, Kolhapur, India

2Electronics, Shivaji University, Kolhapur, India

Pub. Date: March 15, 2015

Cite this paper:
Pallavi H. Dixit, Kamalesh B. Waskar and Uttam L. Bombale. Multilevel Network Security Combining Cryptography and Steganography on ARM Platform. Journal of Embedded Systems. 2015; 3(1):11-15. doi: 10.12691/jes-3-1-2

Abstract

This paper presents two level data security in Network system. Cryptographic algorithm BLOWFISH and Steganography algorithm List significant Bit (LSB) are used for data security. Confidential information is encrypted by BLOWFISH algorithm, and then encrypted data hide into image by LSB algorithm of Steganography. For more security we used iris image of authorized person to hide encrypted data. The keys required for BLOWFISH algorithm is generated from same iris image. These two algorithms implemented on 32 bit ARM 7. In the result of project include memory utilization, processing time for encryption and decryption etc. this project gives better security for embedded systems like mobile, smart card, ATM etc.

Keywords:
network security blowfish cryptography embedded system list significant bit steganography

Creative CommonsThis work is licensed under a Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

References:

[1]  Johnson, Neil F. And Sushil Jajodia. “Exploring steganography: seeing the unseen.” IEEE computer, 32:2. 26-34. 1998.
 
[2]  Proves, N. And Honeyman, P. “Hide and Seek: An Introduction to steganography.”,IEEE security &privacy, (2003).
 
[3]  Menezes, A., Van Oorschot, P., and Vanstone, S. “Handbook of applied cryptography.” CRC Press, (1996).
 
[4]  Hassan Mathkour, Batool AL-sadoon, ameur touir ” a new image steganography technique”.
 
[5]  Sim hiew moi, nazeema binti abdul rahim,puteh saad, pang li sim, zalmiyah zakaria, subariah ibrahim, “iris biometric cryptography for identity document”, 2009 international conference of soft computing and pattern recognition.
 
[6]  Sujay narayana1and gaurav prasad” two new approaches for secured image steganography using cryptographic techniques and type conversions” signal & image processing: an international journal (sipij) vol.1, no.2, december 2010.
 
[7]  Mamta juneja 1, parvinder singh sandhu2 “designing of robust image steganography technique based on lsb insertion and encryption” 2009 international conference on advances in recent technologies in communication and computing.
 
[8]  V.v.satyanrayanarayana tallapragada, dr. E.g.rajan, “multilevel network security based on iris biometric” 2010 international conference on advances in computer engineering.
 
[9]  B. Schneier, applied cryptography, john wiley & sons, new york, 1994.
 
[10]  B. Schneier, description of a new variable-length key, 64-bit block cipher (blowfish) fast software encryption, Cambridge security workshop proceedings (December 1993), springer-verlag, 1994, pp. 191-204.
 
[11]  Zainul Abidin, Adharul Muttaqin, “A Simple Cryptography Algorithm for Microcontroller” in international journal of emerging technology and advanced engineering 2250-2459, iso 9001:2008 certified journal, volume 2, issue 12, December 2012
 
[12]  Http://lcd-linux.sourceforge.net/pdfdocs/lcd1.pdf.
 
[13]  http://lcd-linux.sourceforge.net/pdfdocs/lcd2.pdf.
 
[14]  http://www.8051projects.net/lcd-interfacing/.