Scalable Robust Video Surveillance over Constrained Networks. Real-time monitoring of large numbers of people is becoming increasingly important for applications such as efficient service delivery and security against both common crime and terrorism. The use of human operators for such tasks is infeasible due to the large amount of data collected. Existing autonomous video surveillance systems are prone to high numbers of false alarms and often require expensive hardware. This proposal seeks ....Scalable Robust Video Surveillance over Constrained Networks. Real-time monitoring of large numbers of people is becoming increasingly important for applications such as efficient service delivery and security against both common crime and terrorism. The use of human operators for such tasks is infeasible due to the large amount of data collected. Existing autonomous video surveillance systems are prone to high numbers of false alarms and often require expensive hardware. This proposal seeks to address both difficulties by using rigorous statistical signal processing methods to optimally fuse information from a network of low-cost cameras.Read moreRead less
Mathematical Foundations of Distributed Radar. Conventional military threats to Australia are large or fast moving objects such as ships and aircraft and conventional radar systems are designed to handle such threats. Recent global political shifts have changed the threats to include objects that are small and slowly moving, such as people, small vehicles and boats. Advances in radar hardware make feasible small, low-powered, devices with inherently reduced performance in comparison to deployed ....Mathematical Foundations of Distributed Radar. Conventional military threats to Australia are large or fast moving objects such as ships and aircraft and conventional radar systems are designed to handle such threats. Recent global political shifts have changed the threats to include objects that are small and slowly moving, such as people, small vehicles and boats. Advances in radar hardware make feasible small, low-powered, devices with inherently reduced performance in comparison to deployed systems. Methods for information integration over a dispersed system of such small devices, design of suitable waveform suites and clever local signal processing algorithms will be developed to achieve the performance improvements the hardware offers, to handle the new threats.Read moreRead less
Trustworthy Sensor Networks: Theory and Implementation. The fundamental importance of this project is that we are developing algorithms for wireless sensor networks (WSNs) that provide accurate and trustworthy data to Australian researchers and users, so that they have confidence in the analysis of their data. The algorithms developed in this proposal will become essential for any large scale WSN. The research significantly leverages the resources of our international partners who complement our ....Trustworthy Sensor Networks: Theory and Implementation. The fundamental importance of this project is that we are developing algorithms for wireless sensor networks (WSNs) that provide accurate and trustworthy data to Australian researchers and users, so that they have confidence in the analysis of their data. The algorithms developed in this proposal will become essential for any large scale WSN. The research significantly leverages the resources of our international partners who complement our work with several million dollars of investment. The result will put Australia on the international stage as a significant contributor to WSN technologies. By training PhD students, the project will also enrich local expertise in the technologies.Read moreRead less
Approximate authentication systems for digital information. Assurance about the origin and integrity of digital content is crucial not only in high security applications but also in everyday life scenarios such as providing proof that an X-ray image presented as part of an insurance claim is authentic, or a news clip is not tampered with. The outcomes of this project will significantly enhance trustworthiness of multimedia information systems which are increasingly used in areas such as surveil ....Approximate authentication systems for digital information. Assurance about the origin and integrity of digital content is crucial not only in high security applications but also in everyday life scenarios such as providing proof that an X-ray image presented as part of an insurance claim is authentic, or a news clip is not tampered with. The outcomes of this project will significantly enhance trustworthiness of multimedia information systems which are increasingly used in areas such as surveillance (traffic control), health, digital content production and distribution, tourism and journalism. It will also result in the development of secure biometric authentication systems which are critical in securing cyber space.Read moreRead less
Automatic audio segmentation, classification, identification, search and retrieval. The research aims to develop generic tools for automated audio segmentation, classification, identification and search, with lowest possible computational complexity and highest accuracy and speed. The tools will be applicable to audio archive management, search of audio material over WWW and personal archives of music and audio-assisted video analysis. The industry will use the tools for automated broadcast ve ....Automatic audio segmentation, classification, identification, search and retrieval. The research aims to develop generic tools for automated audio segmentation, classification, identification and search, with lowest possible computational complexity and highest accuracy and speed. The tools will be applicable to audio archive management, search of audio material over WWW and personal archives of music and audio-assisted video analysis. The industry will use the tools for automated broadcast verification and identification for copyright surveillance and calculation of royalty payments, aiming to penetrate both Australian and overseas markets. The area of real-time audio scene analysis is in its infancy and the research aims to make significant contributions to this area.Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE120102388
Funder
Australian Research Council
Funding Amount
$375,000.00
Summary
From Bayesian filtering to smoothing and prediction for multiple object systems. This project will develop new and improved algorithms for tracking multiple targets, such as tanks, submarines or planes, using the state of the art in mathematical and computational design. These will enable more efficient and accurate technologies for defence related applications including intelligence, surveillance and reconnaissance.
Parameter estimation for multi-object systems. Parameter estimation in multi-object system is essential to the application of multi-object filtering to a wider range of practical problems with social and commercial benefits. This project develops the necessary parameter estimation techniques for complete 'plug-and-play' multi-object filtering solutions that facilitates widespread applications.
Liquid crystal-based optical fibre hydrophone system for underwater surveillance and ocean monitoring. The aim of this project is to design, implement and optimise a new class of optical sensing system which targets underwater surveillance and ocean monitoring. This project is expected to lead to improved national security, broaden Australia's photonics knowledge base, and contribute to greater international scientific collaboration.
Re-engineering internet timekeeping for scalability, accuracy and trust. This project aims to define and solve problems underpinning a secure and extensible system for network timekeeping, and implement and test a prototype under realistic conditions over the Internet. All computers incorporate a software clock, essential to software applications. A network is an inexpensive and convenient way to synchronise these clocks, but the Internet currently depends on an unreliable and insecure approach. ....Re-engineering internet timekeeping for scalability, accuracy and trust. This project aims to define and solve problems underpinning a secure and extensible system for network timekeeping, and implement and test a prototype under realistic conditions over the Internet. All computers incorporate a software clock, essential to software applications. A network is an inexpensive and convenient way to synchronise these clocks, but the Internet currently depends on an unreliable and insecure approach. The expected outcome will be trusted, accurate and reliable software clocks that support applications like cloud computing, billing systems and secure communications, which could become the timekeeping system for the Internet and the Internet of Things.Read moreRead less
Data sharing with strong privacy against inference attacks. This project aims to develop theories and techniques for strong protection of personal information in sharing large datasets such as national health data or census records. It intends to achieve this through developing new information theoretic methods for synthesising datasets with proven high fidelity and protection against re-identification and inference attacks, where attackers try to learn probability of sensitive data. The expecte ....Data sharing with strong privacy against inference attacks. This project aims to develop theories and techniques for strong protection of personal information in sharing large datasets such as national health data or census records. It intends to achieve this through developing new information theoretic methods for synthesising datasets with proven high fidelity and protection against re-identification and inference attacks, where attackers try to learn probability of sensitive data. The expected outcomes are algorithms for public and private sector data curators to dial up or down their data access arrangements based on privacy risks and fidelity demands linked with different data types and uses. This project intends to enable Australians to securely benefit from valuable data in decision making.Read moreRead less