International Journal of Innovative Research in Computer and Communication Engineering

ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines

| Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI) |


TITLE Quantum-Resistant Cyber Security Apparatus
ABSTRACT Traditional cryptographic systems are becoming more vulnerable due to the rapid growth of cyber threats and the emergence of quantum computing as a global security challenge. In order to provide extremely secure and secret data transmission, this project suggests a Quantum-Resistant Cyber Security Apparatus that combines SM4-CBC encryption with Least Significant Bit (LSB) image steganography. Using a portable and offline-compatible platform, the system, which is implemented on a Raspberry Pi 4 with a Flask-based web interface, enables users to encrypt, embed, extract, and validate secret data. Tamper detection and integrity verification are guaranteed by a secure metadata header that includes payload size, type, IV, and CRC/HMAC. Additionally, the device incorporates a SQLite database for forensic analysis and system usage logging, as well as a 16x2 LCD display for real-time operation feedback. The system continuously maintains a PSNR > 45 dB, according to experimental results, guaranteeing that the stego-images remain visually identical to the original. This dual-layer security model is appropriate for military communication, IoT security, digital forensics, intelligence operations, and secure field environments because it offers strong confidentiality, covert transmission, and robust error detection.
AUTHOR SANTHOSH G P, REVANTH S, PRAJWAL, RAVI KUMARA H S, DR. MALATESH SH Student, Dept. of Computer Science and Engineering, MS Engineering College, Bengaluru, Karnataka, India HOD, Dept. of Computer Science and Engineering, MS Engineering College, Bengaluru, Karnataka, India
VOLUME 180
DOI DOI: 10.15680/IJIRCCE.2026.1401030
PDF pdf/30_Quantum-Resistant Cyber Security Apparatus.pdf
KEYWORDS
References [1] W. Li and J. Zhao, “An Improved Implementation of SM4 Algorithm for Secure Communication,” IEEE Access, vol. 8, pp. 115920–115930, 2020.
[2] H. Wang, L. Zhang, and X. Chen, “Quantum-Safe Cryptography: Survey and Future Research Directions,” IEEE Communications Surveys & Tutorials, vol. 23, no. 3, pp. 1974–2003, 2021.
[3] A. K. Singh and P. Kaur, “A Review on Image Steganography Techniques,” IEEE International Conference on Computing, Communication and Security (ICCCS), pp. 1–6, 2018.
[4] D. Das and N. Reddy, “Advanced Steganalysis and Detection of LSB-Based Steganography,” IEEE International Conference on Intelligent Computing and Control Systems (ICICCS), pp. 333–340, 2022.
[5] R. Brown, T. Morley, and A. Al-Ali, “Impact of Quantum Computing on Classical Cryptographic Algorithms,” IEEE Transactions on Quantum Engineering, vol. 2, pp. 1–12, 2021.
[6] S. Ahmed and T. A. Taha, “Lightweight Cryptographic and Cybersecurity Solutions on Raspberry Pi Devices,” IEEE International Conference on Smart Computing (SMARTCOMP), pp. 113–120, 2022.
[7] Y. Murthy, K. Rao, and R. M. Rao, “Hybrid Crypto-Stego Systems for Secure Data Hiding,” IEEE International Conference on Computing, Electronics & Communications Engineering (iCCECE), pp. 45–50, 2020.
[8] S. Patel and M. Singh, “LSB Image Steganography for Confidential Data Transmission,” IEEE International Conference on Advances in Computing and Communication Engineering (ICACCE), pp. 643–648, 2019.
[9] D. O’Neil and A. Kumar, “Web-Based Secure Information Hiding Systems: A Survey,” IEEE International Conference on Computational Intelligence and Communication Networks (CICN), pp. 562–567, 2021.
[10] Raspberry Pi Foundation, Raspberry Pi 4 Model B Technical Documentation, Raspberry Pi Trading Ltd., 2020. [Online]. Available: https://www.raspberrypi.org/documentation/
[11] G. S. Meshram and P. L. Ramteke, “Performance Analysis of LSB Steganography in Spatial Domain,” IEEE International Conference on Inventive Systems and Control (ICISC), pp. 728–733, 2020.
[12] National Institute of Standards and Technology (NIST), “Post-Quantum Cryptography Standardization,” NIST PQC Project, 2022. [Online]. Available: https://csrc.nist.gov/projects/postquantum-cryptography
[13] M. Kharrazi, H. T. Sencar, and N. Memon, “Image Steganography: Concepts and Practice,” IEEE Signal Processing Magazine, vol. 31, no. 3, pp. 66–76, 2019.
[14] B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, 20th Anniversary ed. New York, NY, USA: Wiley, 2015.
[15] P. Yi, L. Feng, and X. Li, “Secure Data Storage and Access Control Techniques for IoT Using Lightweight Encryption,” IEEE Internet of Things Journal, vol. 8, no. 5, pp. 3334–3346, 2021.
[16] J. Fridrich, “Applications of Data Hiding in Digital Images,” IEEE International Conference on Multimedia and Expo (ICME), pp. 1–6, 2018.
[17] S. Lin and G. Sun, “Efficient SM4 Implementation and Performance Optimization on ARM Platforms,” IEEE International Conference on Information Systems and Computer Aided Education (ICISCAE), pp. 315–320, 2021.
[18] D. Boneh and V. Shoup, A Graduate Course in Applied Cryptography, Stanford University, 2020. [Online]. Available: https://crypto.stanford.edu/
[19] J. Zhang and T. Kim, “Lightweight Steganographic Approaches for Embedded Systems,” IEEE Embedded Systems Letters, vol. 12, no. 2, pp. 45–50, 2020.
[20] M. J. Atallah, “Steganographic Techniques for Covert Communication,” IEEE International Conference on Information Hiding, pp. 1–10, 2019.
[21] Dr. Malatesh S. H., S. Kattimani, P. Pallabavi, V. A. P., and D. M. G., "Intruder Detection and Protection System," International Journal of Innovative Research in Technology (IJIRT), vol. 11, no. 12, p. 6287, May 2025, ISSN: 2349-6002.
image
Copyright © IJIRCCE 2020.All right reserved