steganography, watermarking, etc.Inthistypeof combined approach there exits somedisadvantages. Oflate inthefield ofInformation Security, wehave Inremote networking, atthetimeoftransmission of plenty ofsecurity tools whicharemadetoprotect the hidden encrypted text message, ifthesnoopers getthe transmission ofmultimedia objects. Butapproachestrack ofthehidden text, thenthey could easily getthe forthesecurity oftextmessages arecomparatively encrypted text. Nowbreaking ofencrypted codecanbe less. Inthis paper, asecurity modelisproposed which achieved byapplying somecomplex mathematical imposes theconcept ofsecrecy overprivacy fortext operation. So,thereremains someprobability of messages. Thismodelcombinescryptography, snooping ofinformation. So,this typeoftechniques steganography (taken assecurity layers) andalong requires another level ofsecurity whichcanroute the withthat anextra layer ofsecurity hasbeenimposed Cryptanalyzer orSteganalyzer inadifferent direction. inbetween them.Thisnewlyintroduced extra layer Theworkproposed hererepresents a heuristic ofsecurity changes theformatofnormalencryptedapproach tointroduce theconcept ofMulti Layer Data message andthesecurity layer followed byitembeds Security algorithm in thefieldof combined theencrypted message behind a multimedia cover Cryptography andSteganography. Thealgorithm, that object. wehaveimplemented here, will secure thetext datain multiple protection layers. Here,we haveusedthe