Novel audio watermarking techniques for tracing multimedia piracy. This project aims to develop inaudible, high-capacity audio watermarking techniques to trace the illegal copying and distribution of multimedia data containing a sound component, such as audios and sound videos. With the rapid growth of communication networks and the use of advanced multimedia technology, digital multimedia data can be easily copied, manipulated and distributed. This has led to strong demand for new techniques to ....Novel audio watermarking techniques for tracing multimedia piracy. This project aims to develop inaudible, high-capacity audio watermarking techniques to trace the illegal copying and distribution of multimedia data containing a sound component, such as audios and sound videos. With the rapid growth of communication networks and the use of advanced multimedia technology, digital multimedia data can be easily copied, manipulated and distributed. This has led to strong demand for new techniques to prevent illegal use of copyrighted data. The project is expected to advance the theory of audio watermarking and enhance Australia's international competitiveness in this field.
Read moreRead less
A provable privacy-preserving data sharing system for the cloud environment. This project aims to develop an innovative data sharing system, with a mathematically provable privacy guarantee, in a cloud environment. This will be adopted by Australian Education Management Group’s (AEMG) cloud campus to exchange data in a restricted privacy manner between partner institutions. It will be commercialised as a middleware that can be plugged into existing cloud environments to maintain required privacy ....A provable privacy-preserving data sharing system for the cloud environment. This project aims to develop an innovative data sharing system, with a mathematically provable privacy guarantee, in a cloud environment. This will be adopted by Australian Education Management Group’s (AEMG) cloud campus to exchange data in a restricted privacy manner between partner institutions. It will be commercialised as a middleware that can be plugged into existing cloud environments to maintain required privacy even when the cloud crosses various jurisdictions with different privacy policies. The outcomes will benefit educational organisations, and lay the foundations for data sharing in other communities such as the government, banks, and other industries in Australia.Read moreRead less
Privacy-Preserving Fog Info System in Infrastructure-Deficient Environments. Due to Australia’s unique geographical distribution and population density, many regional or remote areas lack infrastructural support and development, including telecommunications and electricity supply. It is important to provide information and communication services in such infrastructure-deficient environments. In this project, we will develop a first-ever commercially ready Fog information system, or FogIS in shor ....Privacy-Preserving Fog Info System in Infrastructure-Deficient Environments. Due to Australia’s unique geographical distribution and population density, many regional or remote areas lack infrastructural support and development, including telecommunications and electricity supply. It is important to provide information and communication services in such infrastructure-deficient environments. In this project, we will develop a first-ever commercially ready Fog information system, or FogIS in short, to enable localised information and communication services, while preserving users' privacy, in infrastructure-deficient environments. The deployment of this system will bring great benefits to Australia’s economic growth, the quality of life, cybersecurity, and environment control in rural and regional Australia. Read moreRead less
Enhancing privacy preserving in dynamic cyberspace. This project aims to develop a novel infrastructure operational monitoring and management strategy to reduce the redundant maintenance actions and achieve a cost-effective approach for civil infrastructure asset management. The project will use multiple social networks as a platform for the project, with the potential for the results to be extended to any dynamic cyberspace. Project outcomes will include a set of new analysis theories and tools ....Enhancing privacy preserving in dynamic cyberspace. This project aims to develop a novel infrastructure operational monitoring and management strategy to reduce the redundant maintenance actions and achieve a cost-effective approach for civil infrastructure asset management. The project will use multiple social networks as a platform for the project, with the potential for the results to be extended to any dynamic cyberspace. Project outcomes will include a set of new analysis theories and tools to facilitate government, companies, individuals, and organisations to enhance their information gathering and privacy-preserving capabilities. This is expected to enhance the credibility of the government and organisations and save the possible financial loss of companies and individuals.Read moreRead less
Trust-Oriented Social Relation Analysis and Social Relation Aware Rating Analysis in Trust Management. Trust management is an emerging field offering critical challenges on evaluating the quality and trustworthiness of objects, services and raters. Thus it requires the development of novel techniques and solutions to address these challenges both conceptually and practically. This project will develop innovative techniques to infer trust in complex social networks, detect bias in trust ratings a ....Trust-Oriented Social Relation Analysis and Social Relation Aware Rating Analysis in Trust Management. Trust management is an emerging field offering critical challenges on evaluating the quality and trustworthiness of objects, services and raters. Thus it requires the development of novel techniques and solutions to address these challenges both conceptually and practically. This project will develop innovative techniques to infer trust in complex social networks, detect bias in trust ratings and its dependencies with social relations. They can greatly contribute to breakthrough techniques enabling trust-oriented social network analysis and more objective trust management systems that can be transferred to the Australian IT industry to promote the trustworthiness of Web services and reduce monetary loss.Read moreRead less
Improving provision of a document store as a service in a public cloud. Improving provision of a document store as a service in a public cloud. This project aims to develop a model of document-oriented database correctness and performance that can be applied to cloud-hosted clusters. Many modern web applications rely on document-oriented databases hosted on clusters of virtualised servers from commercial cloud providers. Developers make difficult deployment decisions, such as how to combine data ....Improving provision of a document store as a service in a public cloud. Improving provision of a document store as a service in a public cloud. This project aims to develop a model of document-oriented database correctness and performance that can be applied to cloud-hosted clusters. Many modern web applications rely on document-oriented databases hosted on clusters of virtualised servers from commercial cloud providers. Developers make difficult deployment decisions, such as how to combine data sharding and replication to meet service requirements without any guidance on the degree of precision. This research will allow developers and database administrators to predict how systems will behave in conditions difficult to simulate directly. Ultimately, this is expected to improve the quality and efficiency of services built using document databases.Read moreRead less
Investigating identity fraud control, management and policy: Australia in a global context. Identity fraud is recognised as a serious and significant problem in Australia by Government and industry, with estimates of losses ranging up to $4 billion per annum. This project aims to research identity fraud from an organisational and social perspective by investigating control, management and policy alternatives. Outcomes will include conceptual, effects and costing models of identity fraud, succe ....Investigating identity fraud control, management and policy: Australia in a global context. Identity fraud is recognised as a serious and significant problem in Australia by Government and industry, with estimates of losses ranging up to $4 billion per annum. This project aims to research identity fraud from an organisational and social perspective by investigating control, management and policy alternatives. Outcomes will include conceptual, effects and costing models of identity fraud, successful strategies for organisational management control, new techniques to improve prevention and detection, and comparative evaluations of social, legal and privacy implications. The research program will provide the missing research partnership that will inform control, management and policy decisions of national significance.Read moreRead less
Enhancing computer user productivity of integrated enterprise wide systems: an intervention study. This project addresses a critical issue in IT investment and productivity. Current theoretical models of user training and acceptance have not contributed to the effectiveness of implementing new integrated enterprise wide systems. This study will identify key indiviudal differences that predict user motivation to learn and utilize such systems under mandatory conditions. A longitudinal study in ....Enhancing computer user productivity of integrated enterprise wide systems: an intervention study. This project addresses a critical issue in IT investment and productivity. Current theoretical models of user training and acceptance have not contributed to the effectiveness of implementing new integrated enterprise wide systems. This study will identify key indiviudal differences that predict user motivation to learn and utilize such systems under mandatory conditions. A longitudinal study in two field settings will test the impact of selected interventions on task performance following training. The outcomes will inform Australian industry on models of effective implementation and provide guidance to increase the productivity of personnel using software systems.Read moreRead less
Adaptive Key-value Store for Future Extreme Heterogeneous Systems. Safe, lasting storage of data, and efficient access to it, is vital for all aspects of computing, ranging from e-commerce applications, and data-management in governments. For the storage of data, persistent key-value stores are central in modern computing platforms. However, contemporary key-value stores have not been designed for emerging extreme heterogeneous computational systems with future hardware accelerators and storage ....Adaptive Key-value Store for Future Extreme Heterogeneous Systems. Safe, lasting storage of data, and efficient access to it, is vital for all aspects of computing, ranging from e-commerce applications, and data-management in governments. For the storage of data, persistent key-value stores are central in modern computing platforms. However, contemporary key-value stores have not been designed for emerging extreme heterogeneous computational systems with future hardware accelerators and storage capabilities, including graphics processor and flash-based memory. This project will devise an adaptive key-value store framework for heterogeneous systems. Our new framework will adaptively harvest the performance potential of future hardware such that applications can cope with fast-growing data sets.Read moreRead less
Gaze Tracking Haptic User Interface for the Blind. It is estimated over 40 million people suffer from sever visual impairment in the modern world. Although blind people are able to use the computer with the aid of a screen reader and output devices like Braille displays, it remains difficult for the blind to use many applications with Graphical User Interfaces (GUIs) due to the need for hand-eye coordination when manipulating screen objects with the mouse. This project intends to overcome this d ....Gaze Tracking Haptic User Interface for the Blind. It is estimated over 40 million people suffer from sever visual impairment in the modern world. Although blind people are able to use the computer with the aid of a screen reader and output devices like Braille displays, it remains difficult for the blind to use many applications with Graphical User Interfaces (GUIs) due to the need for hand-eye coordination when manipulating screen objects with the mouse. This project intends to overcome this difficulty by providing a means for the blind to perceive and control the GUI of typical computer applications. This potentially could provide increased computer access, job opportunities and education for the blind.Read moreRead less