proposed system The embedded data is encrypted based on XORing the data with values of normal direction computed for every vertex so that the Rateless and RLNC can be described in table 3 Table 3 Comparison between Rateless and RLNC RLNC Rateless code 1 Rate Fix rate On fly rate not fixed rate 6