Analysis and classification of malicious code. Malicious software such as viruses and worms directly attacks the security, privacy and integrity of Australian e-commerce, large databases and communication channels. The recent uptake of malicious software by organised crime has made finding effective countermeasures more urgent. Around 80% of the malicious code in circulation is disguised in some way. This significantly increases the difficulty of automated detection and delays analysis. Automate ....Analysis and classification of malicious code. Malicious software such as viruses and worms directly attacks the security, privacy and integrity of Australian e-commerce, large databases and communication channels. The recent uptake of malicious software by organised crime has made finding effective countermeasures more urgent. Around 80% of the malicious code in circulation is disguised in some way. This significantly increases the difficulty of automated detection and delays analysis. Automated classification and de-obfuscation technologies are a precondition to applying more sophisticated detection heuristics. The project will be instrumental in safeguarding Australia by protecting critical infrastructure and defending us from online organised crime and information warfare.Read moreRead less
Highly Scalable Video Compression with Finely Embedded Motion Signalling. Highly scalable video compression is critical to the emergence of new applications in video distribution and management. Examples include interactive remote browsing of video and robust video surveillance over shared networks. Previous ARC funding produced fundamental breakthroughs in scalable video compression, resulting in a new paradigm which has been adopted by leading researchers in the field. The present project a ....Highly Scalable Video Compression with Finely Embedded Motion Signalling. Highly scalable video compression is critical to the emergence of new applications in video distribution and management. Examples include interactive remote browsing of video and robust video surveillance over shared networks. Previous ARC funding produced fundamental breakthroughs in scalable video compression, resulting in a new paradigm which has been adopted by leading researchers in the field. The present project addresses the two most important problems which currently limit the potential of this paradigm. Inspired by the applicant's recent discoveries, the outcomes of this project are likely to represent significant scientific breakthroughs and contribute to a new international video coding standard.Read moreRead less
Security Services for Stream-Oriented and Multicast-Based Communication. Multicast communication over lossy networks is becoming the basic for a growing number of aplications. It is therefore critical to provide sound security mechanisms for multicast communication. Yet, existing security protocols for multicast offer only partial solutions. This project is concerned with two major security problems of multicast communications: authentication and secrecy. The goal of this project is to: (1) deve ....Security Services for Stream-Oriented and Multicast-Based Communication. Multicast communication over lossy networks is becoming the basic for a growing number of aplications. It is therefore critical to provide sound security mechanisms for multicast communication. Yet, existing security protocols for multicast offer only partial solutions. This project is concerned with two major security problems of multicast communications: authentication and secrecy. The goal of this project is to: (1) develop a framework for analysis and evaluation of security services for multicast communication; (2) design efficient algorithms and protocols for securing emerging applications that are multicast-based and/or stream-oriented.
Read moreRead less
Private Information Retrieval. The deliverables of this project will enhance information protection which is essential for rapidly expanding e-commerce applications and network communication. It will maintain and strengthen national capability of protecting the confidential integrity of digital systems and the network infrastructure in Australia. It will contribute to maintaining Australia's leading position in telecommunications and information industries. It will enhance the quality of our ....Private Information Retrieval. The deliverables of this project will enhance information protection which is essential for rapidly expanding e-commerce applications and network communication. It will maintain and strengthen national capability of protecting the confidential integrity of digital systems and the network infrastructure in Australia. It will contribute to maintaining Australia's leading position in telecommunications and information industries. It will enhance the quality of our culture by protecting individual's privacy and providing security for sensitive data. Read moreRead less
Information security and digital watermarking with Latin squares. The importance of digital information is increasing constantly. Audio, video, and still image data dominate our daily lives. Such information has commercial and strategic importance. It is invaluable in crime prevention: for example, video from security cameras. The protection of commercially valuable material against piracy and sensitive information against security breaches is vital to our economy and our safety. This project ad ....Information security and digital watermarking with Latin squares. The importance of digital information is increasing constantly. Audio, video, and still image data dominate our daily lives. Such information has commercial and strategic importance. It is invaluable in crime prevention: for example, video from security cameras. The protection of commercially valuable material against piracy and sensitive information against security breaches is vital to our economy and our safety. This project addresses these issues, by developing new, secure watermarks and fingerprints to protect digital information. Such watermarks can also protect radio communication channels, which is important due to the rising demand for wireless connectivity.Read moreRead less
Mathematical Foundations of Distributed Radar. Conventional military threats to Australia are large or fast moving objects such as ships and aircraft and conventional radar systems are designed to handle such threats. Recent global political shifts have changed the threats to include objects that are small and slowly moving, such as people, small vehicles and boats. Advances in radar hardware make feasible small, low-powered, devices with inherently reduced performance in comparison to deployed ....Mathematical Foundations of Distributed Radar. Conventional military threats to Australia are large or fast moving objects such as ships and aircraft and conventional radar systems are designed to handle such threats. Recent global political shifts have changed the threats to include objects that are small and slowly moving, such as people, small vehicles and boats. Advances in radar hardware make feasible small, low-powered, devices with inherently reduced performance in comparison to deployed systems. Methods for information integration over a dispersed system of such small devices, design of suitable waveform suites and clever local signal processing algorithms will be developed to achieve the performance improvements the hardware offers, to handle the new threats.Read moreRead less