Volume 2, No. 1, January 2011
Journal of Global Research in Computer Science
RESEARCH PAPER
Available Online at www.jgrcs.info
© JGRCS 2010, All Rights Reserved
48
A Proficient mode to Transmit Secure Large Size Data with Authentication &
Integrity using Double –EHDES over Teeming Channel
Ramveer Singh*
1
, Sanjive Tyagi
2
, Awakash Mishra
3
, Akshay Tyagi
4
, Deo Brat Ojha
5
*1
Deptt. of Information Technology, R.K.G.Institute of Technology, Gzb., U.P.(India),
(Research Scholar Singhania University, jhunjhunu, Rajsthan)
E-mail: ramveersingh_rana@yahoo.co.in
2
Deptt. of M.C.A., Radha Govind Engineering College, Meerut, U.P. (India),
(Research Scholar Singhania University, jhunjhunu, Rajsthan)
E-mail: tosanjive@gmail.com
3
(Research Scholar Singhania University, Jhunjhunu, Rajsthan)
Department of M.C.A, Raj Kumar Goel Engineering College, Ghaziabad, U.P.,INDIA
e-mail: awakashmishra@gmail.com
4
(Research Scholar Mewar University, Chittorgarh, Rajasthan))
Gradute School of Business & Administration, Greater Noida, U.P., INDIA
e-mail: akshaytyagi@airtelmail.in
5
Deptt. Of mathematics, R. K. G. Institute of Technology, Gzb., U.P.(India),
e-mail: deobratojha@rediffmail.com
Abstract – In this paper, we presents a Proficient mode to Transmit Secure Large Size Data with Authentication & Integrity using
Double – EHDES over Teeming Channel. This approach really enhances the capability and maximum utilization of busy channel. A
complete transmission is always based upon correctness and delivery on time and the massage transmission is too much sensitive and
crucial. In this paper, we establish the complete arrangement of combination of encryption and compression with double EHDES
while transmitting over media.A lossless compression provides us integrity. Fuzzy error correction provides error less message over
noisy channel.
Keywords— Double - EHDES, Cryptography, Stegnography, Compression, Image File, Error Correction Code.
INTRODUCTION
Steganalysis is a technology which determines the
presence of a hidden message or image in cover image
and attempt to disclose the actual contents of this
message [1].A more erudite method of steganography is
by merging the two techniques to produce more security
to secure data transmission such that if intruders detect
the presence of data even then message cannot be
decode without the knowledge of key.
The most common stegno method is the LSB
approach, or Least Significant Bit. As we know digital
pixels are represented by three colors: red, green and
blue. These colors together form digital pictures or
video. Each color of every pixel requires 1 byte or 8 bits
of information. Since the first bit is the ―least
significant‖ or carries the least amount of importance in
the byte, this steganographic technique chooses to
overwrite the first bit of successive bytes until the entire
secret message is embedded into the original source file,
or the cover data. Since we have only modified the least
significant bits of a portion of the source file, the human
eye should not be able to detect the degradation in the
picture or video [2].
PRELIMINARIES
1. Stegnography:
Steganography is a technique used to embed secret
information into non-secret information, preventing the
message from being detected by non-authorized
people.[3]
The purpose of steganography is to hide the very
presence of communication by embedding messages
into innocuous-looking cover objects, such as digital
images. To accommodate a secret message, the original
cover image is slightly modified by the embedding
algorithm to obtain the stego image. The embedding
process usually
incorporates a secret stego-key that governs the
embedding process and it is also needed for the
extraction of the hidden message [4].
There are three basic views behind hiding information.
The first is capacity, which is the amount of information
that can be embedded within the cover file. An
information-hiding algorithm has to be able to
compactly store a message within a file. Next is
security, which refers to how a third-party can detect