Scalable Robust Video Surveillance over Constrained Networks. Real-time monitoring of large numbers of people is becoming increasingly important for applications such as efficient service delivery and security against both common crime and terrorism. The use of human operators for such tasks is infeasible due to the large amount of data collected. Existing autonomous video surveillance systems are prone to high numbers of false alarms and often require expensive hardware. This proposal seeks ....Scalable Robust Video Surveillance over Constrained Networks. Real-time monitoring of large numbers of people is becoming increasingly important for applications such as efficient service delivery and security against both common crime and terrorism. The use of human operators for such tasks is infeasible due to the large amount of data collected. Existing autonomous video surveillance systems are prone to high numbers of false alarms and often require expensive hardware. This proposal seeks to address both difficulties by using rigorous statistical signal processing methods to optimally fuse information from a network of low-cost cameras.Read moreRead less
Automatic audio segmentation, classification, identification, search and retrieval. The research aims to develop generic tools for automated audio segmentation, classification, identification and search, with lowest possible computational complexity and highest accuracy and speed. The tools will be applicable to audio archive management, search of audio material over WWW and personal archives of music and audio-assisted video analysis. The industry will use the tools for automated broadcast ve ....Automatic audio segmentation, classification, identification, search and retrieval. The research aims to develop generic tools for automated audio segmentation, classification, identification and search, with lowest possible computational complexity and highest accuracy and speed. The tools will be applicable to audio archive management, search of audio material over WWW and personal archives of music and audio-assisted video analysis. The industry will use the tools for automated broadcast verification and identification for copyright surveillance and calculation of royalty payments, aiming to penetrate both Australian and overseas markets. The area of real-time audio scene analysis is in its infancy and the research aims to make significant contributions to this area.Read moreRead less
Mathematical Foundations of Distributed Radar. Conventional military threats to Australia are large or fast moving objects such as ships and aircraft and conventional radar systems are designed to handle such threats. Recent global political shifts have changed the threats to include objects that are small and slowly moving, such as people, small vehicles and boats. Advances in radar hardware make feasible small, low-powered, devices with inherently reduced performance in comparison to deployed ....Mathematical Foundations of Distributed Radar. Conventional military threats to Australia are large or fast moving objects such as ships and aircraft and conventional radar systems are designed to handle such threats. Recent global political shifts have changed the threats to include objects that are small and slowly moving, such as people, small vehicles and boats. Advances in radar hardware make feasible small, low-powered, devices with inherently reduced performance in comparison to deployed systems. Methods for information integration over a dispersed system of such small devices, design of suitable waveform suites and clever local signal processing algorithms will be developed to achieve the performance improvements the hardware offers, to handle the new threats.Read moreRead less
Approximate authentication systems for digital information. Assurance about the origin and integrity of digital content is crucial not only in high security applications but also in everyday life scenarios such as providing proof that an X-ray image presented as part of an insurance claim is authentic, or a news clip is not tampered with. The outcomes of this project will significantly enhance trustworthiness of multimedia information systems which are increasingly used in areas such as surveil ....Approximate authentication systems for digital information. Assurance about the origin and integrity of digital content is crucial not only in high security applications but also in everyday life scenarios such as providing proof that an X-ray image presented as part of an insurance claim is authentic, or a news clip is not tampered with. The outcomes of this project will significantly enhance trustworthiness of multimedia information systems which are increasingly used in areas such as surveillance (traffic control), health, digital content production and distribution, tourism and journalism. It will also result in the development of secure biometric authentication systems which are critical in securing cyber space.Read moreRead less
Re-engineering internet timekeeping for scalability, accuracy and trust. This project aims to define and solve problems underpinning a secure and extensible system for network timekeeping, and implement and test a prototype under realistic conditions over the Internet. All computers incorporate a software clock, essential to software applications. A network is an inexpensive and convenient way to synchronise these clocks, but the Internet currently depends on an unreliable and insecure approach. ....Re-engineering internet timekeeping for scalability, accuracy and trust. This project aims to define and solve problems underpinning a secure and extensible system for network timekeeping, and implement and test a prototype under realistic conditions over the Internet. All computers incorporate a software clock, essential to software applications. A network is an inexpensive and convenient way to synchronise these clocks, but the Internet currently depends on an unreliable and insecure approach. The expected outcome will be trusted, accurate and reliable software clocks that support applications like cloud computing, billing systems and secure communications, which could become the timekeeping system for the Internet and the Internet of Things.Read moreRead less
Data sharing with strong privacy against inference attacks. This project aims to develop theories and techniques for strong protection of personal information in sharing large datasets such as national health data or census records. It intends to achieve this through developing new information theoretic methods for synthesising datasets with proven high fidelity and protection against re-identification and inference attacks, where attackers try to learn probability of sensitive data. The expecte ....Data sharing with strong privacy against inference attacks. This project aims to develop theories and techniques for strong protection of personal information in sharing large datasets such as national health data or census records. It intends to achieve this through developing new information theoretic methods for synthesising datasets with proven high fidelity and protection against re-identification and inference attacks, where attackers try to learn probability of sensitive data. The expected outcomes are algorithms for public and private sector data curators to dial up or down their data access arrangements based on privacy risks and fidelity demands linked with different data types and uses. This project intends to enable Australians to securely benefit from valuable data in decision making.Read moreRead less
Trustworthy Sensor Networks: Theory and Implementation. The fundamental importance of this project is that we are developing algorithms for wireless sensor networks (WSNs) that provide accurate and trustworthy data to Australian researchers and users, so that they have confidence in the analysis of their data. The algorithms developed in this proposal will become essential for any large scale WSN. The research significantly leverages the resources of our international partners who complement our ....Trustworthy Sensor Networks: Theory and Implementation. The fundamental importance of this project is that we are developing algorithms for wireless sensor networks (WSNs) that provide accurate and trustworthy data to Australian researchers and users, so that they have confidence in the analysis of their data. The algorithms developed in this proposal will become essential for any large scale WSN. The research significantly leverages the resources of our international partners who complement our work with several million dollars of investment. The result will put Australia on the international stage as a significant contributor to WSN technologies. By training PhD students, the project will also enrich local expertise in the technologies.Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE120100016
Funder
Australian Research Council
Funding Amount
$375,000.00
Summary
Reliable transmission for wireless control. While wireless communication can bring great benefits for control systems, current communication technologies are not competent. This project aims to revolutionise wireless control systems through novel communication strategies. The project will deliver fundamental theories and cutting-edge technologies for communications in control applications.
Video plasticity: Scalable video coding with inherently consistent motion. This project aims to improve how video coders represent motion, leading to more efficient motion descriptions and fewer distinct motion fields. The project will develop motion inference algorithms that ensure consistent motion descriptions throughout a group of pictures, allowing seamless integration of scalable video coding, motion compensated temporal filtering and motion compensated frame interpolation operations. The ....Video plasticity: Scalable video coding with inherently consistent motion. This project aims to improve how video coders represent motion, leading to more efficient motion descriptions and fewer distinct motion fields. The project will develop motion inference algorithms that ensure consistent motion descriptions throughout a group of pictures, allowing seamless integration of scalable video coding, motion compensated temporal filtering and motion compensated frame interpolation operations. The project is expected to support an efficient and interactive video browsing experience, largely decoupled from original frame rate and resolution; and deliver practical solutions that can be efficiently implemented on consumer devices.Read moreRead less
Ultrahigh-speed optical transport for sustaining the internet growth. Our society has entered an information era centred around the Internet. This project aims to study novel transport technologies to construct optical backbone networks supporting the Internet traffic. The project will keep Australia at the leading edge of exciting Terabit technologies as well as create commercial opportunities in Australia.