Volume 2, No. 1, January 2011 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info © JGRCS 2010, All Rights Reserved 48 A Proficient mode to Transmit Secure Large Size Data with Authentication & Integrity using Double EHDES over Teeming Channel Ramveer Singh* 1 , Sanjive Tyagi 2 , Awakash Mishra 3 , Akshay Tyagi 4 , Deo Brat Ojha 5 *1 Deptt. of Information Technology, R.K.G.Institute of Technology, Gzb., U.P.(India), (Research Scholar Singhania University, jhunjhunu, Rajsthan) E-mail: ramveersingh_rana@yahoo.co.in 2 Deptt. of M.C.A., Radha Govind Engineering College, Meerut, U.P. (India), (Research Scholar Singhania University, jhunjhunu, Rajsthan) E-mail: tosanjive@gmail.com 3 (Research Scholar Singhania University, Jhunjhunu, Rajsthan) Department of M.C.A, Raj Kumar Goel Engineering College, Ghaziabad, U.P.,INDIA e-mail: awakashmishra@gmail.com 4 (Research Scholar Mewar University, Chittorgarh, Rajasthan)) Gradute School of Business & Administration, Greater Noida, U.P., INDIA e-mail: akshaytyagi@airtelmail.in 5 Deptt. Of mathematics, R. K. G. Institute of Technology, Gzb., U.P.(India), e-mail: deobratojha@rediffmail.com Abstract In this paper, we presents a Proficient mode to Transmit Secure Large Size Data with Authentication & Integrity using Double EHDES over Teeming Channel. This approach really enhances the capability and maximum utilization of busy channel. A complete transmission is always based upon correctness and delivery on time and the massage transmission is too much sensitive and crucial. In this paper, we establish the complete arrangement of combination of encryption and compression with double EHDES while transmitting over media.A lossless compression provides us integrity. Fuzzy error correction provides error less message over noisy channel. KeywordsDouble - EHDES, Cryptography, Stegnography, Compression, Image File, Error Correction Code. INTRODUCTION Steganalysis is a technology which determines the presence of a hidden message or image in cover image and attempt to disclose the actual contents of this message [1].A more erudite method of steganography is by merging the two techniques to produce more security to secure data transmission such that if intruders detect the presence of data even then message cannot be decode without the knowledge of key. The most common stegno method is the LSB approach, or Least Significant Bit. As we know digital pixels are represented by three colors: red, green and blue. These colors together form digital pictures or video. Each color of every pixel requires 1 byte or 8 bits of information. Since the first bit is the ―least significant‖ or carries the least amount of importance in the byte, this steganographic technique chooses to overwrite the first bit of successive bytes until the entire secret message is embedded into the original source file, or the cover data. Since we have only modified the least significant bits of a portion of the source file, the human eye should not be able to detect the degradation in the picture or video [2]. PRELIMINARIES 1. Stegnography: Steganography is a technique used to embed secret information into non-secret information, preventing the message from being detected by non-authorized people.[3] The purpose of steganography is to hide the very presence of communication by embedding messages into innocuous-looking cover objects, such as digital images. To accommodate a secret message, the original cover image is slightly modified by the embedding algorithm to obtain the stego image. The embedding process usually incorporates a secret stego-key that governs the embedding process and it is also needed for the extraction of the hidden message [4]. There are three basic views behind hiding information. The first is capacity, which is the amount of information that can be embedded within the cover file. An information-hiding algorithm has to be able to compactly store a message within a file. Next is security, which refers to how a third-party can detect