>>51its a stego-cipher:
1.It creates random bitArray.
2.It selects bit Locations by getting them from password.
3.Input Data is saved in those bit Locations.
4.bitArray is mutated and encrypted.
5.decryption runs it in reverse.
>is there any kind of security proof for it
No. The difficulty is that Input doesn't result in same output and output is 90% random garbage filler data.
i.e. all encryptions result in different files that decode back to one file.