LittleBrother: Vision Systems Supporting Detection of Offenders in Public Places. Current visual surveillance systems can track people in an area only if complete camera coverage is provided. This project will develop a visual surveillance system able to track and record people's movements in a public building requiring only limited visual coverage. We will propose novel ways of matching images of a single individual from distant cameras by using features such as color histograms decomposed for ....LittleBrother: Vision Systems Supporting Detection of Offenders in Public Places. Current visual surveillance systems can track people in an area only if complete camera coverage is provided. This project will develop a visual surveillance system able to track and record people's movements in a public building requiring only limited visual coverage. We will propose novel ways of matching images of a single individual from distant cameras by using features such as color histograms decomposed for the different body parts, estimated height, and build type. Creating a record with this tracking information will effectively support security officers in the identification of responsible parties in the event of an offence.Read moreRead less
Spectral Mutli-camera Tracking. This proposal falls well within the Research Priorities: ``Frontier Technologies for Building and Transforming Australian Industries'' and ``Safegaurding Australia''. This project, will have a direct impact in the capabilities of Australian industries to develop and implement new, leading edge technology in ICT and sensing. The technology developed throughout this project can be used to protect Australia, not only from terrorism and crime, but also from pests and ....Spectral Mutli-camera Tracking. This proposal falls well within the Research Priorities: ``Frontier Technologies for Building and Transforming Australian Industries'' and ``Safegaurding Australia''. This project, will have a direct impact in the capabilities of Australian industries to develop and implement new, leading edge technology in ICT and sensing. The technology developed throughout this project can be used to protect Australia, not only from terrorism and crime, but also from pests and diseases. The potential for biosecurity applications is a great advantage of spectral imaging and makes of this project an opportunity to track not only persons but also detect pests and diseases at strategic entry points throughout Australia, such as ports and airports.Read moreRead less
Scalable Robust Video Surveillance over Constrained Networks. Real-time monitoring of large numbers of people is becoming increasingly important for applications such as efficient service delivery and security against both common crime and terrorism. The use of human operators for such tasks is infeasible due to the large amount of data collected. Existing autonomous video surveillance systems are prone to high numbers of false alarms and often require expensive hardware. This proposal seeks ....Scalable Robust Video Surveillance over Constrained Networks. Real-time monitoring of large numbers of people is becoming increasingly important for applications such as efficient service delivery and security against both common crime and terrorism. The use of human operators for such tasks is infeasible due to the large amount of data collected. Existing autonomous video surveillance systems are prone to high numbers of false alarms and often require expensive hardware. This proposal seeks to address both difficulties by using rigorous statistical signal processing methods to optimally fuse information from a network of low-cost cameras.Read moreRead less
Developing a Scalable Infrastructure for Embedded E-Security Incorporating Cryptography and Biometric Authentication. A fundamental flaw in existing embedded e-security technologies is their cryptography-plus-PIN-number infrastructure. This has generated security concerns that have proved a major obstacle to the growth of e-commerce, presently a relatively poor 2% of market share. We aim to design a new infrastructure that can solve this security problem by incorporating cryptography and biomet ....Developing a Scalable Infrastructure for Embedded E-Security Incorporating Cryptography and Biometric Authentication. A fundamental flaw in existing embedded e-security technologies is their cryptography-plus-PIN-number infrastructure. This has generated security concerns that have proved a major obstacle to the growth of e-commerce, presently a relatively poor 2% of market share. We aim to design a new infrastructure that can solve this security problem by incorporating cryptography and biometric authentication into a computing resource limited embedded e-security system. The outcomes of this project will be a set of new cryptosystems, new biometrics processing schemes and new onboard resource allocation schemes that will form the basis for the next generation of embedded systems.Read moreRead less
Automatic real-time detection of infiltrated objects for security of airports and train stations. Infiltrated objects represent a very high security threat in critical areas such as airports and train stations. In order to neutralise such a threat, this project will develop new automatic technologies capable of detecting infiltrated objects in sensitive areas in real time, analysing the movements of their original carriers in the nearby areas, and raising attention accordingly. The technologies ....Automatic real-time detection of infiltrated objects for security of airports and train stations. Infiltrated objects represent a very high security threat in critical areas such as airports and train stations. In order to neutralise such a threat, this project will develop new automatic technologies capable of detecting infiltrated objects in sensitive areas in real time, analysing the movements of their original carriers in the nearby areas, and raising attention accordingly. The technologies will be based on the automatic analysis of camera videos made by computers without the need for assessing or storing the identities of common passers-by. The potential of application is huge extending beyond airports and train stations to any public areas.Read moreRead less
Automatic Recognition of Human Activities in Surveillance Videos: Overcoming the Curse of Dimensionality. This project will deliver a technology capable of automatically recognising human activities of interest in surveillance videos. The project will tackle the challenging, huge complexity inherent in the recognition of human activities by novel statistical pattern recognition techniques. The outcome of this project will be an effective activity recognition technology that will help monitor the ....Automatic Recognition of Human Activities in Surveillance Videos: Overcoming the Curse of Dimensionality. This project will deliver a technology capable of automatically recognising human activities of interest in surveillance videos. The project will tackle the challenging, huge complexity inherent in the recognition of human activities by novel statistical pattern recognition techniques. The outcome of this project will be an effective activity recognition technology that will help monitor the security and safety of environments and support the further development of the Australian video surveillance industry.Read moreRead less
Securing Knowledge Processes in Organisations. This project will develop a methodology for identifying and comparing security risks associated with knowledge-intensive processes in organizations. The project addresses a significant area that has historically fallen between two research domains: organisational knowledge processes and systems, and critical information infrastructure protection. The project will establish a unified framework to balance the sharing and protection of information and ....Securing Knowledge Processes in Organisations. This project will develop a methodology for identifying and comparing security risks associated with knowledge-intensive processes in organizations. The project addresses a significant area that has historically fallen between two research domains: organisational knowledge processes and systems, and critical information infrastructure protection. The project will establish a unified framework to balance the sharing and protection of information and organizational knowledge. Outcomes include a framework for modelling knowledge-intensive processes to assess their security vulnerability, an associated methodology of creating security risk profiles of knowledge intensive processes and the validation of the methodology in 3 to 6 organizations.Read moreRead less
Visual tracking of multiple objects: A stochastic geometrical approach. Reliable real-time visual multiple-object tracking techniques will open up new applications that enhance the quality of life such as driving safety, traffic monitoring, home security, security and surveillance of public facilities. These new applications have huge commercial potentials, and the technology developed from this project will provide the catalyst for vibrant new industries to grow. In addition, the expertise deve ....Visual tracking of multiple objects: A stochastic geometrical approach. Reliable real-time visual multiple-object tracking techniques will open up new applications that enhance the quality of life such as driving safety, traffic monitoring, home security, security and surveillance of public facilities. These new applications have huge commercial potentials, and the technology developed from this project will provide the catalyst for vibrant new industries to grow. In addition, the expertise developed from the project will provide a competitive edge for Australian industries in aerospace, oceanography, robotics, remote sensing, and biomedical engineering. Read moreRead less
Highly Scalable Video Compression with Finely Embedded Motion Signalling. Highly scalable video compression is critical to the emergence of new applications in video distribution and management. Examples include interactive remote browsing of video and robust video surveillance over shared networks. Previous ARC funding produced fundamental breakthroughs in scalable video compression, resulting in a new paradigm which has been adopted by leading researchers in the field. The present project a ....Highly Scalable Video Compression with Finely Embedded Motion Signalling. Highly scalable video compression is critical to the emergence of new applications in video distribution and management. Examples include interactive remote browsing of video and robust video surveillance over shared networks. Previous ARC funding produced fundamental breakthroughs in scalable video compression, resulting in a new paradigm which has been adopted by leading researchers in the field. The present project addresses the two most important problems which currently limit the potential of this paradigm. Inspired by the applicant's recent discoveries, the outcomes of this project are likely to represent significant scientific breakthroughs and contribute to a new international video coding standard.Read moreRead less
Methodologies for face recognition under varying imaging conditions. Face recognition systems are heavily dependent on the nature of the input to the system. Variability in appearance due to changes in illumination, expression, pose, etc. can reduce the recognition results of the existing systems. The aim of this project is to develop new techniques to improve the recognition accuracy in natural environment where unwanted image variations exist. The development of such techniques will be of grea ....Methodologies for face recognition under varying imaging conditions. Face recognition systems are heavily dependent on the nature of the input to the system. Variability in appearance due to changes in illumination, expression, pose, etc. can reduce the recognition results of the existing systems. The aim of this project is to develop new techniques to improve the recognition accuracy in natural environment where unwanted image variations exist. The development of such techniques will be of great importance to Australia's security and safety. The outcome of this research will provide the first steps towards formulating the next generation recognition systems that will improve the suitability of the face recognition for use in security, surveillance, intelligent robotics, banking, and smart environments.Read moreRead less