Browsing by Author "Weerasinghe, K.G.H.D."
Now showing 1 - 18 of 18
- Results Per Page
- Sort Options
Item An Enhanced Multi-Channel MAC for the IEEE 1609.4 Based Vehicular Ad Hoc Networks(INFOCOM IEEE Conference on Computer Communications Workshops, 2010) Wang, Q.; Leng, S.; Fu, H.; Zang, Y.; Weerasinghe, K.G.H.D.This paper proposes a multi-channel MAC scheme for Vehicular Ad Hoc Networks (VANETs), which dynamically adjusts the intervals of Control Channel (CCH) and Service Channels (SCHs). Markov modeling is conducted to optimize the intervals based on the traffic condition. The scheme also introduces a multi-channel coordination mechanism to provide the contention-free access in SCHs. Theoretical analysis and simulation results show that the proposed scheme is able to help IEEE 1690.4 MAC improve the saturation throughput of SCHs significantly, while maintaining the prioritized transmission of critical safety information on the CCH.Item Analysis of key management in wireless sensor networks(IEEE EIT?07, 2007) Dustin, M.; Shankarappa, J.; Petrowski, M.; Weerasinghe, K.G.H.D.; Fu, H.A multitude of wireless sensor networks exist today in various fields, each having a specific objective in mind. Based on the objectives for each network, the security concerns can be different, dependent on such factors as the level of secrecy of the data being captured, the amount of computation done to the captured data, and the criticality of the data being available when needed. This paper aims to identify the various types of WSNs in existence today, review some of the key management schemes proposed by the community, and map each type of WSN to a set of these key management schemes that would be ideal to handle the security requirements for that network. Through our research, we aide in solving the question as to whether or not there exists any specific security concerns which are prevalent in a majority of WSNs in use today.Item Android smartphone operated Robot(Faculty of Computing and Technology, University of Kelaniya, Sri Lanka, 2016) Thiwanka, U.S.; Weerasinghe, K.G.H.D.In the present an open-source Android platform has been widely used in smartphones. Android platform has a complete software package consisting of an operating system, middleware layer and core applications. Android-based smartphones are becoming more powerful and equipped with several accessories that are useful for Robotics. The purpose of this project is to provide a powerful, user-friendly computational Android platform with simpler robot’s hardware architecture. This project describes the way of controlling robots, using smartphone and Bluetooth communication. Bluetooth has changed how people use digital device at home or office, and has transferred traditional wired digital devices into wireless devices. The project is mainly developed by using Google voice recognition feature which can be used to send commands to robot. Also motion of robot can be controlled by using the Accelerometer and the buttons in the Android app. Bluetooth communication has specifically used as a network interface controller. According to commands received from application, the robot motion can be controlled. The consistent output of a robotic system along with quality and repeatability are unmatched. This project aims at providing simple solutions to create a framework for building robots with very low cost but with high computational and sensing capabilities provided by the smartphone that is used as a control device. Using this project concept, we can help disabled people to do their work easily ex: Motorized wheelchair, remotely controlling some equipment using the smart phone. Also using this project, we can build Surveillance robot devices and reconnaissance devices can design home automation and can use to control any kind of device that can be controlled remotely. Many hardware components were used such as Arduino Uno, Adafruit Motor Shield Bluetooth module and Ultrasonic Distance Measuring Transducer Sensor. The Uno is a microcontroller board based on the ATmega328P. It contains everything needed to support the microcontroller; simply connect it to a Computer using a USB cable or power it with an AC-to-DC adapter or battery to get started. The Arduino use shield boards. These plug onto the top of the Arduino and make it easy to add functionality. This particular shield is the Adafruit Industries Motor / Stepper / Servo Shield. It has a very complete feature set, supporting servos, DC motors and stepper motors. The Bluetooth module is used to connect the smart phone with robot. It uses AT commands. The HC-SR04 ultrasonic sensor uses sonar to determine distance to an object like bats or dolphins do. It offers excellent non-contact range detection with high accuracy and stable readings in an easy-to-use package. From 2 cm to 400 cm or 1” to 13 feet. Its operation is not affected by sunlight or black materials. It comes with an ultrasonic transmitter and a receiver module. This system has two major parts. One is Android application and the other is robot hardware device. When developing this Android application new Android technologies were used ex: Google Voice and motion of the phone. To improve the security of this Application a voice login is added. In addition, a program is added to change login pin and to develop robot scan program and finally to develop two control programs using buttons with accelerometer and Google voice inputs. Arduino IDE and Arduino language is used to program the robot. Arduino has a simple methodology for running the source code. It has a setup function and a loop function. We can define variables and other things inside setup function. The loop function is running always according the content of the function body. AFmotor header is used to develop the code file to get functions to control the motor shield and the motors and used SoftwareSerial header file to make connection between Arduino and Bluetooth module. Using Black Box test method, integrity, usability, reliability, and correctness of the Android application is checked. Finally, user acceptance tests are done for different kind of users. A field-test is done to test whether the robot can identify the object in front of it and the distance limit is coded to the program. Today we are in the world of robotics. Knowingly or unknowingly, we have been using different types of robots in our daily life. The aim of this project is to evaluate whether we can design robots ourselves to do our work using a low budget and simple way. Finally, we think this project will be helpful for students who are interested in these areas and this will make a good solution for human matters. This project has many applications and a very good future scope. It also allows for modification of its components and parameters to get the desired output. This project allows customizing and automating our day-to-day things in our lives.Item Anonymous service access for Vehicular Ad hoc Networks(Information Assurance and Security (IAS), 2010 Sixth International Conference, 2011) Weerasinghe, K.G.H.D.; Fu, H.; Leng, S.Communications through road side units in Vehicular Ad hoc Networks (VANETs) can be used to track the location of vehicles, which makes serious threat on users' privacy. In this paper, we propose and evaluate a novel location privacy enhancement protocol for VANETs. Firstly, we propose an Anonymous Online Service Access (AOSA) protocol. Secondly, we analytically evaluate the anonymity and the unlinkability of the proposed protocol. Finally, a series of simulation studies are conducted to evaluate the performance of our protocol in the real VANET environments such as Manhattan and Urban scenarios. According to analytical evaluation and simulations, our protocol provides higher level of anonymity and location privacy for on-line service access applications. Simulation results further show that our protocol is feasible and produces better performance in real VANET environments by producing higher success ratio and smaller delay.Item Conceal Communication via MP3(Faculty of Graduate Studies, University of Kelaniya, 2015) Eranga, D.M.S.; Weerasinghe, K.G.H.D.Hiding messages for various security purposes have become highly interesting topic on now a day. Encryption provides the ability of data hiding. With development of the technology, people tend to figure out a technique which is not only capable in hiding a message, but also capable in hiding the existence of the message. The current study is conducted in order to hide a text message in an MP3 file. The major aim of this research is the ability to hide text message in MP3 and retrieve the hidden text message. The research is introduced a new system called StegMP3 v1.0. Steganography of mp3 is more challenging due to wider dynamic range of the Human Auditory System (HAS) rather than Human Visual System. Research objectives are secrecy, verification, truthfulness, assure unapparent perceptual transparency of mp3 file (cover object) and the object covering secret messages and send/receive mp3 files. Least Significant Bit (LSB) is the core tactic which changes the last bit from a byte. This system doesn‘t change the mp3 file and doesn‘t increase the size of the carrier file. Thus, the existence of the message cannot be detected. MP3 consists of packets and each packet includes header and data. The system uses unique approach to guarantee the original quality of mp3 and secrecy of the message. However, the impartiality of dispatch before and after is assured. The system facilitates to enjoy the music while processing. The system is evaluated by conducting a survey among IT professionals. The program quality has been accepted 84.37% and 89.59% accepted that the program like to be available in the internet. This program is suitable for safe and careful preservation of sensitive records. The StegMP3 v1.0 is a free, simple and quality assured software tool new to the area. In future, the system should be upgraded with cryptographic involvement and increase the message capacity support with text files rather than text.Item Crime Information Management System for Sri Lanka Police(Department of Library and Information Science, Faculty of Social Sciences, University of Kelaniya, Sri Lanka, 2016) Cooray, N.A.C.; Weerasinghe, K.G.H.D.The Sri Lanka Police is a Legal organization in Sri Lanka, and safe guard the people and country in various illegal activities. In a one single police station, it has several divisions such as Traffic, Crime, Child & women. They serve many people in a single day. Currently they manage their works in Manual System by using lots of big books and records Because of that, citizens are not happy about the Sri Lanka Police’s day to day activities. Mostly this process is not Efficient, not accurate, take long time for small works owing to the lack of access to previous records. Their manual system consists of many problems. They have been continually suffering to generating reports, maintain Crime, Criminal, Complaint details etc. As a result, the Head of the station, Officer in Charge (OIC) of the Crime Division was facing problems like data redundancy, data inaccuracy and delay in decision making due to unavailability of timely reports and information. The proposed Crime Division Automation System addresses key issues at Sri Lanka Police by providing a mechanism to help administrative decisions and information of the specific crime situation efficiently and accurately. In general, criminals always use the same way to (technique) do their crimes or illegal actions. If these is proper historical data, criminals can be tracked very easily. Also, all the crime division complains are finished through the court decision. In order to find next court hearing, and for generating reports also become easy. Avoiding lot of big books, the system tries to provide accurate and efficient historical data. This solution would help the people by producing many king of usual reports, tracking criminals and manage crime records, manage complaint details and etc. Using the system, essential information can be shared every related to crimes among the relevant authorities. The Crime Division Automation System was developed according to the Rational Unified Process model which supports Object Orientation and iterative development. The system architecture is MVC and it was developed using PHP, Java Script, Ajax and MySQL as the database server. CodeIgniter as the PHP framework, JQuery as the JS framework, Bootstrap as the CSS framework being used. The Object Oriented methodologies and Even Driven methodologies were used. In designing diagrams MS Visio 2016 were used. As for the report generation mPDF was used. Model View Controller or MVC is more popular web base system design pattern. This is very useful as a security mechanism since it separate system into three major parts. Model - The lowest level (or database) of the pattern which is responsible for maintaining data. View - This is responsible for displaying all or a portion of the data to the user. Controller – This segment controls the interactions between the Model and View. User see everything via View sending request to the Controller. Controller check the request and check any data request to response, if any, then through the Model select data from database and send it to the controller, Controller load the relevant view to user. As the future scope researchers wish to generate crime maps using historical data. Also generate various kind of analyzing charts, add a functionality to System provide, some analysis and update information about historical data like select Most Wanted. If opportunities are offered it is very easy to the researchers for automating all the divisions.Item Data centric adaptive in-network aggregation for wireless sensor networks(IEEE/ASME International Conference, 2007) Weerasinghe, K.G.H.D.; Elhajj, I.; Krsteva, A.; Najm, M.A.This paper presents and evaluates a data centric adaptive in-network aggregation algorithm for wireless sensor networks. In-Network data aggregation is used in wireless sensor networks to reduce the power consumption of sensor nodes. The accuracy of the aggregated results is highly sensitive to delays in the measurements. All existing methods use fixed time limit to accept delayed information for aggregation. The proposed method dynamically calculates the delay limit by using the historical behavior of each sensor. The presented simulation results illustrate the advantage of the developed algorithm.Item Enhancement of IEEE 802.11 modules in ns-2 and performance evaluation with error rate(Proceedings of 43rd Annual Simulation Symposium (ANSS), 2010) Jin, K.; Weerasinghe, K.G.H.D.; Fu, H.Ns-2 is being widely utilized to evaluate the wired and wireless networks on many research activities. The ns-2.33 distribution version includes an extension of IEEE 802.11 module which improves the core functions of 802.11 MAC and PHY protocols. Although this extension version provides well-designed MAC and PHY functions, it has some significant shortcomings in handling packet errors. When a packet error rate, one of the most important performance parameters in wireless network simulations, applies to the extension, a simulation program is interrupted with some fatal errors. Besides, as the packet errors are handled on the PHY layer in this version, MAC layer loses its own right of treating the packet errors. In this paper, we modify the extension version to correct the mentioned problems and verify the behavior of our modified version by simulation work. And also, we perform the ns-2 simulation to investigate the impact of error rate on IEEE 802.11p-based vehicular ad-hoc networks.Item Enhancing unlinkability in Vehicular Ad Hoc Networks(Intelligence and Security Informatics (ISI), 2011 IEEE International Conference, 2011) Weerasinghe, K.G.H.D.; Huirong, F.Communication messages in Vehicular Ad-hoc Networks (VANETs) can be used to track movement of vehicles. In this paper, we address the problem of movement tracking and enhance location privacy without affecting security and safety of vehicles. By considering unique characteristics of VANETs, we firstly propose a synchronized pseudonym changing protocol based on the concept of forming groups among neighboring vehicles. Secondly, we analytically evaluate the anonymity and unlinkability of the proposed protocol. Finally, we do a series of simulations to evaluate the performance of our protocol in real VANET environments such as Manhattan and Urban. Simulation results show that our protocol is feasible and produces excellent performances. The main advantages of our protocol compared with the existing approaches include: 1) it makes larger anonymity set and higher entropy; 2) it reduces the tracking probability; 3) it can be used in both safety and non-safety communications; and 4) Vehicles need not suspend regular communication for changing pseudonyms.Item ESAP: Efficient and scalable authentication protocol with conditional privacy for secure vehicular communications(GLOBECOM Workshops (GC Wkshps), 2010 IEEE, 2010) Weerasinghe, K.G.H.D.; Fu, H.Security mechanisms such as authentication, message integrity, and non-repudiation are extremely important features for both vehicle-to-vehicle and vehicle-to-infrastructure communications in vehicular ad hoc networks. This paper proposes an Efficient and Scalable Authentication Protocol (ESAP) that provides anonymity and conditional privacy for vehicular ad hoc networks based on the self-generated certificates. The proposed ESAP provides all required security services such as authentication, message integrity, non-repudiation and revoking malicious vehicles in an efficient and scalable manner while supporting user anonymity, location privacy and conditional privacy. Moreover, accuracy of this protocol does not depend on the availability of Road Side Units.Item Human Perception of Haptic Force Direction(IROS 2006 IEEE/RSJ International Conference, 2006) Elhajj, I.; Weerasinghe, K.G.H.D.; Dika, A.; Hansen, R.In this paper we investigate the accuracy of human perception of haptic force direction applied to the hand. Haptic interfaces are commonly used in many applications and understanding the limitations of human perception would facilitate the design of these interfaces and the associated applications. The literature contains work related to force perception; however, none of which address the issue of the accuracy of haptic force direction perception. We discuss the design and implementation of the experiment used to evaluate the accuracy. Also presented are results related to training effects, fatigue and accuracy across angular regionsItem Object Recognition Application - Mind Game(Faculty of Computing and Technology, University of Kelaniya, Sri Lanka, 2016) Senanayake, H.M.I.M.; Weerasinghe, K.G.H.D.Visualizing is one of the main methods to remember something. For students who are studying something can remember things as a story or a component of an image. This application is designed to develop this skill by giving this application as a playing game to use. How to play this game? First this app will show a sequence of images and the user should remember what he see, not only the image but also how that image is drawn. The color combinations, shape, angle and much more details are there in a single image. The more the user can remember the things in a single image can score high in this game. Now this application tests up to what average the user remember things. User will be provided a drawing canvas and a pencil tool and then he is asked to draw the first image of the sequence what he remember. And then the second canvas is given to draw the second image. Next third canvas etc. Then the application process the images and match corresponding images of the sequence and offer score to the user considering the details he remembered accurately. How this application works? Most important part of this application is object recognition part. There are many algorithms in present to recognize object and patterns such as feature based methods, appearance based methods, geometric based methods etc. Most popular and widely used techniques are edge and angle based algorithms and pixel based algorithms. Among these methods appearance and geometric based techniques are the narrowly used techniques to develop applications. So in this research I cover that area. My recognition algorithm is to identify images by converting image details into a mathematical model. First this algorithm will identify the shapes in the image and each shape will be given some sequence of values which is based on relative area, perimeter, position co-ordinates of shapes and other special characteristics which are evaluated by a standard function. Each shape in any image will have its own mathematical structure to describe the roll of it in an image. So after processing all shapes of the image as mathematical points, the image can be saved as a mathematical structure. So for each object, objects will have a unique mathematical model. When recognizing object in a new drawn image, this new image is converted into a mathematical model using the same algorithm and match with other mathematical models which are previously processed and saved. Main advantage of this method is number of values which need to be saved as image data in this mathematical model is massively low when compared with other feature based techniques. This increases the speed efficiency. So this way is considerably efficient than edge and angle based techniques to recognize images with non-discrete lines. To match the models I apply a nearest neighbor algorithm to mathematical models, then the most matching image is selected. In the developing side, previously processed mathematical models which represents the images are saved as a two dimensional matrix. Rows in the matrix represents the image identity (image name or object name) and characteristics of images. And one column in the matrix represents a single image. So the number of rows in the matrix is equal to the number of characteristics of the image plus one. And number of columns in the matrix is a variable which depends on the number of images we are saving. And the matrix is saved in a .mat (Microsoft Access Table, used by MATLAB to save data in binary data container format) file. By this method, retrieving and reading data for matching images is very easy because this single matrix represents the whole database of images. Accuracy depends on the growth of the matrix. Because if the matrix has more details about objects, then the program can identify objects accurately. To increase more the accuracy of identifying objects, simply we can increase the number of images which are drawn in different angles or different ways of same object and saving those in the matrix. For example, if the object we want to recognize is a tree, then we can save set of drawings of mango trees, coconut trees, pine tree etc. in the matrix. So any tree will be identified accurately as a tree by the program, no matter what the genre of tree is. In the gaming application these methods are used to define different gaming levels and give the user a new experience. Preliminary the objective of this research was to recognize non-discrete pencil drawing objects accurately. Secondly above techniques are used to develop the application which gives an exercise to the human brain while giving a gaming experience. Designed algorithm is flexible to process any number of images at once and convert those into mathematical models and save all those mathematical models in a single matrix. And the designed program accurately identifies the pencil drawing objects using this matrix. Later, by including more image processing techniques such as image segmentation, this method will be able to enhance more to process and recognize other complex images too.Item 'PATH FINDER' Application for android(Faculty of Graduate Studies, University of Kelaniya, 2015) Dasanayaka, D.M.N.K.; Weerasinghe, K.G.H.D.The population growth and technology development has increased traffic congestion in urban areas. If people can get traffic information before starting their journey, they can use alternative routes to avoid traffic instead of sticking in the traffic congestion. And also when it comes to long trips, it is better if the driver can roughly get an idea about how much of money will be needed to be spent on fuel. Our intention was to develop an android application which is able to find the best route between source and the destination, considering the traffic jam and the minimum distance. Additionally the proposed system will facilitate users to reach the nearest fuel filling station when fuel is running low by providing information about the fuel condition of the vehicle while they are driving. The traffic information forecasting has been done with the use of previous traffic count of selected route. Generally, prior data pattern labels have been used to train the Artificial Neural Network (ANN) to identify the traffic conditions. The shortest path is generated with the use of ‗Dijkstra's Algorithm‘. The challenge that we had to face was gathering data regarding traffic count in Sri Lankan roads at a given time because there is no proper way to collect traffic data. So we had to observe daily traffic count (vehicle count) in a selected route. We collected vehicle count during 10 days of period. According to the observation results we created simulated data set. Our total number of records was 388. In this case 70% of the data was used to train the network, 15% was used to validate and rest was used to testing purpose. The accuracy of the traffic prediction was 99.5% according to the results of data trained using ANN. Another challenge that we had to face was creating communication between neural network and the android application. To transfer data between JAVA program and the MATLAB neural network we had to use transferring medium. So to overcome this challenge we used TCP/IP socket communication which has the ability to call Java directly from within MATLAB. This application follows client server architecture where MATLAB environment is the server and android application is the client.Item Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation(International Journal of Software Engineering and Its Applications, 2008) Weerasinghe, K.G.H.D.; Fu, H.A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route requests without having active route to specified destination and drops all the receiving packets. If these malicious nodes work together as a group then the damage will be very serious. This type of attack is called cooperative black hole attack. In [9], we proposed a solution to identifying and preventing the cooperative black hole attack. Our solution discovers the secure route between source and destination by identifying and isolating cooperative black hole nodes. In this paper, via simulation, we evaluate the proposed solution and compare it with other existing solutions in terms of throughput, packet loss percentage, average end-toend delay and route request overhead. The experiments show that (1) the AODV greatly suffers from cooperative black holes in terms of throughput and packet losses, and (2) our solution proposed in [9] presents good performance in terms of better throughput rate and minimum packet loss percentage over other solutions, and (3) our solution proposed in [9] can accurately prevent the cooperative black hole attacks.Item Smart Home Automation Voice Controller.(Faculty of Computing and Technology, University of Kelaniya, Sri Lanka., 2017) Perera, P.V.S.P.; Weerasinghe, K.G.H.D.Each day we are aiming for a smart living condition and make our lives more convenient and fast. The traditional wired electrical device controlling switch is an old concept now. “Voice operated device controlling” utilizes human voice commands to control electrical appliances. This research aims to design and implement a cost effective, portable, user-friendly, secure and simpler Home automation voice controller that can be operated by using Android smart phone. It also reduces the energy usage in the residential sector. This system is also designed to assist and provide support in order to fulfill the needs of elderly and disabled in the home. This research describes the way of remote controlling and monitoring electrical household appliances using Android Smart Phone Bluetooth features and wireless Bluetooth technology module depending user voice commands. The proposed system has two main components, namely voice recognition system and clicking mode facility. When automating a home load not available in the visible range, fault identification system in this design helps the user to ensure that their home appliances had gone exactly ON or OFF. The app was designed by allowing the user to add or edit the appliances. The user had the freedom to add appliances names to this app. User can select either voice mode or clicking mode. Even he/she can check the current status. Changing the language is also available in this app. As an example device name is Fan. The user has to say “Fan” to switch ON. If user wants to switch off, again, has to say “Fan”. Google voice recognition with its voice recognition and voice command features has been used to determine the voice of the user. From the commands received from an android device, the electrical appliances’ current status can be controlled. Android Phone will convert voice into a string of data using Google voice recognition feature. This string of data will be sent to Bluetooth module and then to Arduino UNO. After that, Arduino decodes and process it. The Figure 1 expresses the system architecture of the entire system. Arduino UNO is very popular, cheap product and very easy to use. Bluetooth module, relays are interfaced to the Microcontroller. The data received by the Bluetooth module from an Android smart phone is fed as input to the controller. The controller acts accordingly on the relays of the electrical appliances. The electrical appliances in the research can be made to switch on or off using the Android phone. The application shows the status of switch whether on or off. In achieving the task, the controller is loaded with a program written using Arduino language. This system facilitates features such as automation, multi-functionality, adaptability, interactivity and efficiency for home appliances controlling. As future enhancements, hope to design input voice commands in different language and hope to design smart watch with hand gestures to control in a more user friendly.Item A Smartphone Based Traffic Information System (AFromT)(Faculty of Graduate Studies, University of Kelaniya, 2015) Amarasekara, A.A.T.M.; Weerasinghe, K.G.H.D.Today traffic congestion is a growing problem in many metropolitan areas. It can have a big impact on our lives, career, future and even our safety. Several solutions have been proposed over the years to address traffic congestion. Traffic Information Systems (TISs) can play a significant role towards creating cities with improved traffic conditions. A smartphone based traffic information system is a cost-effective way to collect traffic data, leveraging existing communication infrastructure such as the cellular network. A traffic monitoring system based on GPS-enabled smartphones exploits the comprehensive coverage provided by the cellular network, the high accuracy in position and velocity measurements provided by GPS devices, and the existing infrastructure of the communication network. In this project, Location Based Services (LBSs) was used for the purpose of getting real time traffic information. When the user gives the destination of the tour, then the system provides the optimal route with minimum traffic, from the current location, according to the average speed of the other users on all the alternative routes. Also every user can communicate with other online users to cognizance the current traffic conditions, through messages. The experimental evaluation has shown that, because of this AFromT being introduced through the GPS Navigator, road users will be able to avoid traffic jams, unpredicted short way road plans as well as any unforeseen emergency changes of roads, road block etc., will be instantly communicated to the AFromT user. In addition to these features, AFromT will automatically inform the user, when they exceed the speed limit.Item Two Tier Shield Unapparent Information Deliver along with the Visual Streams(Faculty of Computing and Technology, University of Kelaniya, Sri Lanka, 2016) Eranga, D.M.S.; Weerasinghe, K.G.H.D.Information put out of sight for various security purposes have become highly exciting topic in the industry and also academic areas. Encryption provides the ability of data hiding. With the development of the technology, people tend to figure out a technique which is not only capable in hiding a message, but also capable in hiding the actuality of the message. Steganography was introduces as a result of those researches. The current study is conducted in order to hide a file inside a video file. Generally, steganography benefits do not use in the industry or students even though it is widely discussing topic in modern information world. The major aim of this research is the ability to hide any type of file in a video file and retrieve hidden information. There are few algorithms/systems developed to embed a file into video files. It is a great challenge to extract secret information directly from the video, which is embedded already. The existing applications require a considerable time to embed a small message and some are not freeware. Focuses areas of the research are confidentiality, authentication, increase hidden data size, integrity, assure unapparent perceptual transparency of video file (cover object) and send/receive video files. Video consists of frames called I, P and B frames. Each frame uses LSB technique to hide information. This original message can be any kind of file type and almost all popular video file formats for carrier. Identifies the type of the message and encrypts the message file using AES256 with given key. Encrypted message size stores in four bytes and type of the message file stores in another four bytes. Propose algorithm decides the number of frames require to hide the secret information according to size of both carrier video and the secret message. Firstly, reads the video header to retrieve important information and skip the header. Video file Splits in to bitmap images with having pre-defined frame gap between two images, corresponding to the secret message size. Every bitmap image consists of red, green and blue colors and bitmap image pixel has 8 bit for each color and total of 24 bits called bit depth. Writes message size followed by the message type in the bitmap images. Then, writes the message. Each encoded image adds into the original video file. In the process of retrieval, skips the header frames and fetches the images from the video according to the pre-defined gap between images. Reads first eight bytes to identify the message size and type of the message respectively. Then, decodes the encrypted message and decrypts the message with same secret key, which used to encrypt the message. Carrier video file can be watched during the both process of encode and decode. This method doesn’t increase the size of the carrier, though the existence of the message cannot be detected. AES256 key size encryption supports the dual layer security of classified information. Proposed solution supports unique feature that can delete the hidden information, which concealed inside the video without affecting the video carrier. Encoded video is guaranteed the original quality of the carrier. So, this proposed way-out emerges along with an application called SilentVideo1.0. The system was tested to assure the quality of the final product. Testing focused on the accuracy of the propose algorithm, which is ability of hiding the existence of the information as well as the ability of retrieving the information correctly using the application. Test results guarantee the success rate of the proposed algorithm goes up to 85 percent. Furthermore, the application was evaluated for exactness of the input and output information by black box tests using 200 samples from different video formats. The aim of this work was propose a strong resolution for steganography in digital media with multi-tier protection. The hidden file capacity will be increased using sound track of the video file as well. Upcoming versions of the system will be upgraded with latest cryptographic involvement and increase the conceal message capacity along with the lowest encoding and decoding time frame.Item Verifying position and velocity for vehicular ad-hoc networks(Security and Communication Networks, 2011) Weerasinghe, K.G.H.D.; Tackett, R.; Fu, H.In the near future, vehicle-to-vehicle and vehicle-to-roadside infrastructure communications will enable numerous applications, such as collision avoidance, traffic management, location-based services, and infotainment for the automobile field. Position and velocity play important roles in these applications such as collision avoidance. Forged position or velocity information will make a severe impact on both performance and security of the vehicular ad-hoc network (VANET). The main challenges in developing secure position and velocity schemes for VANETs are the highly dynamic environment and cost constraints. In this paper, we propose a position and velocity verification scheme. Then via ns-2, we simulate the proposed scheme in various vehicular mobility environments including rural, urban and Manhattan. Finally, we evaluate the proposed scheme for both position and velocity verifications with automotive grade differential global positioning system (DGPS) and intentionally induced errors as well. The performance evaluation results show that (1) our scheme is very precise in both position and velocity verifications and (2) the proposed scheme is very robust in position verification for rural, urban and Manhattan scenarios even if the introduced errors are in the order of 10?m. Copyright ? 2010 John Wiley & Sons, Ltd.