Semantic Authentication of Visual Data. Data authentication systems can detect the smallest modification to a message. Authentication systems for media objects such as images, and audio and video clips have a different requirement they must ensure authenticity of the content without needing all the changes to be detectable. The aims of this project are to develop a framework for design and analysis of image and video authentication systems, and construct secure and flexible systems that can be ....Semantic Authentication of Visual Data. Data authentication systems can detect the smallest modification to a message. Authentication systems for media objects such as images, and audio and video clips have a different requirement they must ensure authenticity of the content without needing all the changes to be detectable. The aims of this project are to develop a framework for design and analysis of image and video authentication systems, and construct secure and flexible systems that can be used in practice. This research addresses the urgent need of providing security for multimedia objects in electronic commerce and is of high importance to the acceptance of advanced communication and information services.Read moreRead less
Approximate authentication systems for digital information. Assurance about the origin and integrity of digital content is crucial not only in high security applications but also in everyday life scenarios such as providing proof that an X-ray image presented as part of an insurance claim is authentic, or a news clip is not tampered with. The outcomes of this project will significantly enhance trustworthiness of multimedia information systems which are increasingly used in areas such as surveil ....Approximate authentication systems for digital information. Assurance about the origin and integrity of digital content is crucial not only in high security applications but also in everyday life scenarios such as providing proof that an X-ray image presented as part of an insurance claim is authentic, or a news clip is not tampered with. The outcomes of this project will significantly enhance trustworthiness of multimedia information systems which are increasingly used in areas such as surveillance (traffic control), health, digital content production and distribution, tourism and journalism. It will also result in the development of secure biometric authentication systems which are critical in securing cyber space.Read moreRead less
Special Research Initiatives - Grant ID: SR0354476
Funder
Australian Research Council
Funding Amount
$20,000.00
Summary
Intelligent Applications Through The Semantic Web. The primary aim of the proposed bid is to build a network of Australian researchers and their international peers for condresearch into the fundamental as well as applied aspects of the Semantic Web. By incorporating meaning of web-content in a form that can be accessed and processed by intelligent software agents, the Semantic Web will allow computers and humans to work in cooperation. This research will address the needs of both the Australian ....Intelligent Applications Through The Semantic Web. The primary aim of the proposed bid is to build a network of Australian researchers and their international peers for condresearch into the fundamental as well as applied aspects of the Semantic Web. By incorporating meaning of web-content in a form that can be accessed and processed by intelligent software agents, the Semantic Web will allow computers and humans to work in cooperation. This research will address the needs of both the Australian government and industry that provide and make smart use of information available on the Web. It will ensure Australian preparedness for the next-generation web technology.Read moreRead less
Integrated Financial Fraud Detection in Enterprise Applications. Fraud costs the Australian economy at least $3 billion per year. The incidence of fraud within the Australian economy is increasing. Australian entities are ill-prepared to detect and prevent fraud against their businesses with very few developing or implementing any form of fraud control strategy (AS 8001-2003). The growing use of the Internet by organisations for electronic commerce increases their exposure to fraudulent activiti ....Integrated Financial Fraud Detection in Enterprise Applications. Fraud costs the Australian economy at least $3 billion per year. The incidence of fraud within the Australian economy is increasing. Australian entities are ill-prepared to detect and prevent fraud against their businesses with very few developing or implementing any form of fraud control strategy (AS 8001-2003). The growing use of the Internet by organisations for electronic commerce increases their exposure to fraudulent activities. Inevitably much of the cost of fraud is passed on to the customers and the community at large. By providing large organisations with an approach to assist in detecting fraudulent behaviour in accounting systems, it is envisaged that this research will assist in reducing the impact of fraud on society.Read moreRead less
Enhancing Privacy for Digital Communication. Protecting one's privacy in cyber world is a challenging task. Every contact to a Web server leaves a digital footprint that can be linked with other publicly available information to compile a profile of one's activities. Anonymous communication is a powerful tool for enhancing individuals' privacy and providing services such as electronic election where a person's vote must be unlinkable to him/her. However, anonymity may be misused by criminals to ....Enhancing Privacy for Digital Communication. Protecting one's privacy in cyber world is a challenging task. Every contact to a Web server leaves a digital footprint that can be linked with other publicly available information to compile a profile of one's activities. Anonymous communication is a powerful tool for enhancing individuals' privacy and providing services such as electronic election where a person's vote must be unlinkable to him/her. However, anonymity may be misused by criminals to hide their identities and engage in illegal activities. The aim of this project is to design and analyse privacy enhancing communication systems that balance individuals' privacy and accountability, and develop criteria and metrics to compare performance of these systems.Read moreRead less
Secure and Efficient Fair Exchange Protocols. Information security is becoming increasingly important in the rapidly growing field of e-commerce. This project will enable the development of secure fair exchange protocols and schemes, which will be absolutely crucial to Australia's national security. The project will also strengthen international collaboration through the reciprocal exchange of researchers leading to a more collaborative and productive research environment. Furthermore, the proje ....Secure and Efficient Fair Exchange Protocols. Information security is becoming increasingly important in the rapidly growing field of e-commerce. This project will enable the development of secure fair exchange protocols and schemes, which will be absolutely crucial to Australia's national security. The project will also strengthen international collaboration through the reciprocal exchange of researchers leading to a more collaborative and productive research environment. Furthermore, the project will help to maintain the high research profile of Australian researchers and provide cutting-edge information technology for the Australian telecommunication industry, business and government.Read moreRead less
Credential Systems and Their Applications in Securing Electronic Health Records. The expected result of this project will be frontier technologies that are essential in applications and services, whose acceptance and take-up will depend on users' assurance of their security in the cyber world. In particular, a service such as the EHR system, which is known to be a complex system, requires the use of new and innovative credential-based systems. The result will also contribute to maintaining Austr ....Credential Systems and Their Applications in Securing Electronic Health Records. The expected result of this project will be frontier technologies that are essential in applications and services, whose acceptance and take-up will depend on users' assurance of their security in the cyber world. In particular, a service such as the EHR system, which is known to be a complex system, requires the use of new and innovative credential-based systems. The result will also contribute to maintaining Australia's leading position in the telecommunication and information technology industries, which has been recognised by increased government funding levels. The resulting applications of this project will place Australia as the first country able to design and implement a secure EHR system.Read moreRead less
Secure and Practical Anonymous Electronic Payment and Applications. The expected results of this project will be frontier technologies that are essential in applications and services whose acceptance and take-up will depend on users' assurance about their security in the cyber world. The project will contribute to the economic and social advancement of Australia by allowing effective usage of advanced IT technologies. This development will also maintain Australia's leading position in the teleco ....Secure and Practical Anonymous Electronic Payment and Applications. The expected results of this project will be frontier technologies that are essential in applications and services whose acceptance and take-up will depend on users' assurance about their security in the cyber world. The project will contribute to the economic and social advancement of Australia by allowing effective usage of advanced IT technologies. This development will also maintain Australia's leading position in the telecommunication and IT industries, which is well recognised by increasing levels of government. The resulting application will place Australia as the first country able to design and implement a provably secure and practical e-payment system.Read moreRead less
Secure and Dynamic Single Identification Systems. The expected results of the project will be frontier technologies that are essential in applications and services whose acceptance and take-up will be dependent on users' assurance of their privacy. Services, such as medical information or bank information, require a secure identification scheme. Securing such services will encourage new forms of collaboration among a wider range of users with the likely impact of a more productive global economy ....Secure and Dynamic Single Identification Systems. The expected results of the project will be frontier technologies that are essential in applications and services whose acceptance and take-up will be dependent on users' assurance of their privacy. Services, such as medical information or bank information, require a secure identification scheme. Securing such services will encourage new forms of collaboration among a wider range of users with the likely impact of a more productive global economy. This impact will be particularly emphasised in Australia with its geographically disperse population. Securing vital electronic transactions will ultimately contribute to lowering costs and increasing productivity and so creating a more competitive economy.Read moreRead less
Short Signatures: Tools for Securing Digital Transactions, and Their Applications. The expected result of this project will be frontier technologies that are essential in applications and services, eg. transactions over mobile devices, whose acceptance will be dependent on users' assurance about their security in the Cyber world. The result will also contribute to maintaining Australia's leading position in the telecommunication and information technology industries, which is well recognised by ....Short Signatures: Tools for Securing Digital Transactions, and Their Applications. The expected result of this project will be frontier technologies that are essential in applications and services, eg. transactions over mobile devices, whose acceptance will be dependent on users' assurance about their security in the Cyber world. The result will also contribute to maintaining Australia's leading position in the telecommunication and information technology industries, which is well recognised by the government increasing funding levels. Using provably secure short signature schemes in the Internet world will ultimately contribute to lowering costs, increasing productivity and therefore, a more competitive economy. The project will produce high quality graduates by generating research opportunities for students.Read moreRead less