in data communication is a very important concern today. It is used in almost every region like e-commerce, education, and industry and data warehouse. Securely sending and receiving data in the above area is an important as the data is crucial. Image security plays an important role in this age. As the demand of image based message sending is improving day by day. In this paper, we have proposed an efficient image cryptography system based on RC6. The key size and number of variable rounds makes RC6 more secure. The key size is variable up to 2040 bits. The results are achieved in terms of entropy and correlation coefficients. The less variation in entropy is achieved from our approach. KeywordsChaos, Steganography, Security Measures. So in the ensuing segment we talk about data encryption method for picture encryption. We additionally talk about the pivotal angles which are utilized as a part of picture encryption with their points of interest and drawbacks. At long last taking into account the discourses we additionally recommend some future comment which may be productive in this bearing. There are niacumerous essential techniques which are second- hand pervasive cryptography, for example, private or mystery key cryptography, open fundamental or kilter, computerized mark, and hash capacities (15). In private key cryptography, a solitary key is leftover for both encryption and decoding. This obliges meander if all else fails part convey offering an impersonation of the key and the key be struck by be passed swear off a safe channel to the next individual (13-22). Private-key calculations are level indestructible and effectively actualized in equipment. Along these lines they are over and again second-hand for mass measurements encryption. The vast please of the all-around adjusted encryption rely on upon plaintext, encryption calculation, key and unscrambling calculation. The plaintext is the size ahead requiring the encryption calculation. It is joining of the inputs to the encryption calculation. The encryption calculation is the calculation used to continue on b deal with the information stranger plaintext to figure relieve. The mystery key is a comparable to repel of the encryption calculation and of the plaintext and it is associate of the encryption's inputs calculation (23)(24). The figure content is the defiant content discover as yield (14)(15). The steganography technique with cryptography will enhance the security as the cryptic content and the randomization quality can be improved.