Multi Level Encryption and Decryption Tool for Secure Administrator Login over the Network Delson Therambath Rajanbabu 1* and Chaithanya Raj 2 1 Electronics and Communication Department, Rajagiri School of Engineering & Technology, Kochi, Kerala, India; delsontr@rajagiritech.ac.in 2 Electronics and Communication Department, SNM Institute of Management & Technology, Kochi, Kerala, India; chaithanyasuji@gmail.com Abstract Information security and data protection is the key topic of discussion in this research paper. This provides the impor- tance of network security where the network administrator role is to prevent unauthorized or fraudulent activities on the computers connected on this network. For this, the primary task is to construct a double verification check tool for the ad- ministrator identity before getting login access to the network. We develop a Matlab based encryption tool which combines visual image encryption using template image fusion and symmetry cipher key cryptographic techniques for this purpose. This provides a reliable and also a simple algorithm tool ensuring data privacy and integrity of the information stored in the computers connected on the network. *Author for correspondence 1. Introduction Te traditional password or pin protected computer net- work is replaced by biometric security systems where the Local area network is protected by live fngerprint scanning of the administrator to ensure the prevention of unauthorized access to the computers in the net- work. However, by using low cost house hold items like gelatin, play-doh and wax, fngerprint images and fnger models are constructed and fake the fngerprint system 1 . Terefore, comes more powerful algorithms and fnger- print sensors having additional hardware to check the liveness of the fnger placed on the sensor. However, the development of the high level minutia verifcation algo- rithm and high cost models are not needed for a simple LAN owned by a network administrator. Another aspect of data protection in the computer network is to use a Indian Journal of Science and Technology, Vol 7(S4), 8–14, April 2014 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Keywords: Data Privacy and Integrity, Information Security, Image Encryption, Symmetry Key Cryptography complex cryptography methods like AES, DES etc to encrypt the administrator password while enrolling into the network and decrypting the password at the verifca- tion stage to gain access into the network. But, in this case, if an intruder receives the private key exchanged between the encryption and decryption stage, gaining access into the network is quite simple. We proposed a method by fusing the original fngerprint image of the administrator by any other template image during enrolling stage and get the maximum intensity pixel of this fused image. In addition, a substitution cipher cryptography method is adopted where this fused image is encrypted by a cipher text and a private key is generated. During the verifcation stage of the administrator, the original fngerprint image is decrypted by providing the maximum pixel value of the center row of the original image stored in the database together with decryption key to get original decrypted