Explicit methods in number theory: Computation, theory and application. This project aims to use explicit estimates to unify three problems in number theory: primitive roots, Diophantine quintuples, and linear independence of zeroes of the Riemann zeta-function. It will use computational and analytic number theory to reduce the quintuples problem to a soluble level. Pursuing relations between the zeta zeroes will overhaul many current results. This project will apply its findings about primitive ....Explicit methods in number theory: Computation, theory and application. This project aims to use explicit estimates to unify three problems in number theory: primitive roots, Diophantine quintuples, and linear independence of zeroes of the Riemann zeta-function. It will use computational and analytic number theory to reduce the quintuples problem to a soluble level. Pursuing relations between the zeta zeroes will overhaul many current results. This project will apply its findings about primitive roots to signal processing, cryptography and cybersecurity.Read moreRead less
Approximate authentication systems for digital information. Assurance about the origin and integrity of digital content is crucial not only in high security applications but also in everyday life scenarios such as providing proof that an X-ray image presented as part of an insurance claim is authentic, or a news clip is not tampered with. The outcomes of this project will significantly enhance trustworthiness of multimedia information systems which are increasingly used in areas such as surveil ....Approximate authentication systems for digital information. Assurance about the origin and integrity of digital content is crucial not only in high security applications but also in everyday life scenarios such as providing proof that an X-ray image presented as part of an insurance claim is authentic, or a news clip is not tampered with. The outcomes of this project will significantly enhance trustworthiness of multimedia information systems which are increasingly used in areas such as surveillance (traffic control), health, digital content production and distribution, tourism and journalism. It will also result in the development of secure biometric authentication systems which are critical in securing cyber space.Read moreRead less