Privacy in Genetic Databases. With the recent advances in genetic and computer technology enormous databases containing genetic information have become available for research and other purposes. An example of such databases is the Icelandic Health Database containing health and genetic records about the total population of Iceland. This has raised many privacy and ethical questions both among health professionals and the general public. Many agree that genetic information bears more ethical and ....Privacy in Genetic Databases. With the recent advances in genetic and computer technology enormous databases containing genetic information have become available for research and other purposes. An example of such databases is the Icelandic Health Database containing health and genetic records about the total population of Iceland. This has raised many privacy and ethical questions both among health professionals and the general public. Many agree that genetic information bears more ethical and privacy concerns than other health databases. In this project we shall investigate privacy and ethical issues connected to genetic information and we develop techniques to prevent a disclosure of individual values through statistical analysis.Read moreRead less
Semantic Authentication of Visual Data. Data authentication systems can detect the smallest modification to a message. Authentication systems for media objects such as images, and audio and video clips have a different requirement they must ensure authenticity of the content without needing all the changes to be detectable. The aims of this project are to develop a framework for design and analysis of image and video authentication systems, and construct secure and flexible systems that can be ....Semantic Authentication of Visual Data. Data authentication systems can detect the smallest modification to a message. Authentication systems for media objects such as images, and audio and video clips have a different requirement they must ensure authenticity of the content without needing all the changes to be detectable. The aims of this project are to develop a framework for design and analysis of image and video authentication systems, and construct secure and flexible systems that can be used in practice. This research addresses the urgent need of providing security for multimedia objects in electronic commerce and is of high importance to the acceptance of advanced communication and information services.Read moreRead less
Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the c ....Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the complexity of an algorithm that solves the appropriate system of equations. This project leads to new techniques for the design and analysis of stream ciphers.Read moreRead less
Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic ....Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic properties and later we derive a design methodology for provably secure stream ciphers. The project leads to new secure and efficient designs for stream ciphers that are the preferred cryptographic tools used in Australian industry.Read moreRead less
Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach ....Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach can be applied to design new and more powerful factoring algorithms. The project has an explosive potential to redefine the theory and practice of modern cryptography.Read moreRead less
Highly Scalable Video Compression with Finely Embedded Motion Signalling. Highly scalable video compression is critical to the emergence of new applications in video distribution and management. Examples include interactive remote browsing of video and robust video surveillance over shared networks. Previous ARC funding produced fundamental breakthroughs in scalable video compression, resulting in a new paradigm which has been adopted by leading researchers in the field. The present project a ....Highly Scalable Video Compression with Finely Embedded Motion Signalling. Highly scalable video compression is critical to the emergence of new applications in video distribution and management. Examples include interactive remote browsing of video and robust video surveillance over shared networks. Previous ARC funding produced fundamental breakthroughs in scalable video compression, resulting in a new paradigm which has been adopted by leading researchers in the field. The present project addresses the two most important problems which currently limit the potential of this paradigm. Inspired by the applicant's recent discoveries, the outcomes of this project are likely to represent significant scientific breakthroughs and contribute to a new international video coding standard.Read moreRead less
Iterative subspace expansions for space-time adaptive wireless communications, radar and sonar. This project addresses the fundamental challenge of high receiver complexity for bandwidth-efficient, high data-rate wireless communications, radar and sonar. We do this by designing the signal transmissions so that smart receivers can detect the signals in "warp speed". We expect these results to have an immediate impact on the design of next generation communications technologies. Information and Co ....Iterative subspace expansions for space-time adaptive wireless communications, radar and sonar. This project addresses the fundamental challenge of high receiver complexity for bandwidth-efficient, high data-rate wireless communications, radar and sonar. We do this by designing the signal transmissions so that smart receivers can detect the signals in "warp speed". We expect these results to have an immediate impact on the design of next generation communications technologies. Information and Communications Technology (ICT) has been recognised by the Australian Government as a National Research Priority. This research project will contribute to the intellectual property in ICT held by Australia, and help supply Australian industries with the knowledge necessary to participate in the development of frontier technologies.Read moreRead less
Non-Parametric Modelling of Motion and Depth fields with Boundary Geometry for Scalable Compression and Dissemination. Applications for large format video surveillance are about to grow rapidly, starting with military applications and then moving into the civilian arena, highlighting the importance of compression for interactive dissemination, so as to make best use of limited communication channels. This project will develop an innovative representation for motion and depth/elevation maps, whi ....Non-Parametric Modelling of Motion and Depth fields with Boundary Geometry for Scalable Compression and Dissemination. Applications for large format video surveillance are about to grow rapidly, starting with military applications and then moving into the civilian arena, highlighting the importance of compression for interactive dissemination, so as to make best use of limited communication channels. This project will develop an innovative representation for motion and depth/elevation maps, which addresses a key obstacle in the deployment of technology for efficient interactive access to large format video and geospatial imagery. These applications are relevant to Australia's defence and infrastructure for smart information use. Moreover, this is a strategic proposal to strengthen Australia's existing lead in aspects of interactive media dissemination.Read moreRead less
Private Information Retrieval. The deliverables of this project will enhance information protection which is essential for rapidly expanding e-commerce applications and network communication. It will maintain and strengthen national capability of protecting the confidential integrity of digital systems and the network infrastructure in Australia. It will contribute to maintaining Australia's leading position in telecommunications and information industries. It will enhance the quality of our ....Private Information Retrieval. The deliverables of this project will enhance information protection which is essential for rapidly expanding e-commerce applications and network communication. It will maintain and strengthen national capability of protecting the confidential integrity of digital systems and the network infrastructure in Australia. It will contribute to maintaining Australia's leading position in telecommunications and information industries. It will enhance the quality of our culture by protecting individual's privacy and providing security for sensitive data. Read moreRead less
Algebraic Properties of Cryptographic Components and their Cryptanalysis. The outcomes will enhance information and communication security, which is absolutely crucial for the rapidly growing e-commerce and e-government services in Australia. International collaboration will be strengthened by reciprocal exchange of researchers and postgraduate students leading to more attractive and productive research environment. Our project will help to maintain a high profile of Australian researchers, to i ....Algebraic Properties of Cryptographic Components and their Cryptanalysis. The outcomes will enhance information and communication security, which is absolutely crucial for the rapidly growing e-commerce and e-government services in Australia. International collaboration will be strengthened by reciprocal exchange of researchers and postgraduate students leading to more attractive and productive research environment. Our project will help to maintain a high profile of Australian researchers, to increase the capacity for consultancy and contract work, and provide a cutting-edge information technology for the Australian telecommunications industry, business and government.Read moreRead less