Discovery Early Career Researcher Award - Grant ID: DE150100636
Funder
Australian Research Council
Funding Amount
$375,000.00
Summary
Efficient Coding for Distributed-input Distributed-output Wireless Systems. Inter-user interference is becoming the dominant bottleneck in state-of-the-art wireless networks. This project aims to address this bottleneck problem by studying a new paradigm, referred to as a Distributed-Input Distributed-Output (DIDO) wireless system, which makes the best use of interference. Results from information theory and modern coding techniques will be advanced to develop new design principles and novel ph ....Efficient Coding for Distributed-input Distributed-output Wireless Systems. Inter-user interference is becoming the dominant bottleneck in state-of-the-art wireless networks. This project aims to address this bottleneck problem by studying a new paradigm, referred to as a Distributed-Input Distributed-Output (DIDO) wireless system, which makes the best use of interference. Results from information theory and modern coding techniques will be advanced to develop new design principles and novel physical-layer coding techniques of DIDO systems, leading to substantially improved throughput, reliability, energy efficiency and robustness. This project aims to develop fundamentally enhanced wireless infrastructure with targeted applications in cellular and wireless networks, satellite communications and wireless sensor networks.Read moreRead less
Interactive and scalable media over software defined networks. A novel API and associated algorithms will be developed to exploit the emerging technology of software defined networks (SDN) for improving the efficiency and responsiveness of interactive media browsing applications. The approach applies to conventional streaming video as well as more interactive services based on scalable media compression and communication technology, notably JPIP (IS15444-9) video. Recent advances in motion codin ....Interactive and scalable media over software defined networks. A novel API and associated algorithms will be developed to exploit the emerging technology of software defined networks (SDN) for improving the efficiency and responsiveness of interactive media browsing applications. The approach applies to conventional streaming video as well as more interactive services based on scalable media compression and communication technology, notably JPIP (IS15444-9) video. Recent advances in motion coding will be combined with new spatio-temporal transforms to develop an efficient inter-frame extension to the JPEG 2000 standard that is fully compatible with JPIP. Each of these innovations is important in its own right, but together they will facilitate a highly compelling interactive media browsing experience.Read moreRead less
Semantic Authentication of Visual Data. Data authentication systems can detect the smallest modification to a message. Authentication systems for media objects such as images, and audio and video clips have a different requirement they must ensure authenticity of the content without needing all the changes to be detectable. The aims of this project are to develop a framework for design and analysis of image and video authentication systems, and construct secure and flexible systems that can be ....Semantic Authentication of Visual Data. Data authentication systems can detect the smallest modification to a message. Authentication systems for media objects such as images, and audio and video clips have a different requirement they must ensure authenticity of the content without needing all the changes to be detectable. The aims of this project are to develop a framework for design and analysis of image and video authentication systems, and construct secure and flexible systems that can be used in practice. This research addresses the urgent need of providing security for multimedia objects in electronic commerce and is of high importance to the acceptance of advanced communication and information services.Read moreRead less
Approximate authentication systems for digital information. Assurance about the origin and integrity of digital content is crucial not only in high security applications but also in everyday life scenarios such as providing proof that an X-ray image presented as part of an insurance claim is authentic, or a news clip is not tampered with. The outcomes of this project will significantly enhance trustworthiness of multimedia information systems which are increasingly used in areas such as surveil ....Approximate authentication systems for digital information. Assurance about the origin and integrity of digital content is crucial not only in high security applications but also in everyday life scenarios such as providing proof that an X-ray image presented as part of an insurance claim is authentic, or a news clip is not tampered with. The outcomes of this project will significantly enhance trustworthiness of multimedia information systems which are increasingly used in areas such as surveillance (traffic control), health, digital content production and distribution, tourism and journalism. It will also result in the development of secure biometric authentication systems which are critical in securing cyber space.Read moreRead less
Fundamental Limits of Wireless Data Transmission over Interference Channels. This project aims to develop interference-resilient wireless data transmission techniques that can significantly improve the reliability and data rate of wireless communications. The expected outcomes of the research include new space-time coding techniques and interference coordination techniques. It is anticipated that the research will support the improvement of high-speed wireless communications and influence the de ....Fundamental Limits of Wireless Data Transmission over Interference Channels. This project aims to develop interference-resilient wireless data transmission techniques that can significantly improve the reliability and data rate of wireless communications. The expected outcomes of the research include new space-time coding techniques and interference coordination techniques. It is anticipated that the research will support the improvement of high-speed wireless communications and influence the development of broadband wireless access solutions.Read moreRead less
Information-theoretic secure communications via caching. This project aims to address the cybersecurity problem of securing telecommunication networks to prevent data leakage. Current widely-adopted data-encryption approaches to secure communications will be broken with large-scale quantum computers, and existing information-theoretic approaches rely on the channel quality of the network. To circumvent these risks, this project proposes a new information security approach using information cache ....Information-theoretic secure communications via caching. This project aims to address the cybersecurity problem of securing telecommunication networks to prevent data leakage. Current widely-adopted data-encryption approaches to secure communications will be broken with large-scale quantum computers, and existing information-theoretic approaches rely on the channel quality of the network. To circumvent these risks, this project proposes a new information security approach using information cached at devices to camouflage data. The project will future-proof secure communication systems against large-scale quantum computers, which threaten current encryption approaches. This should ensure that data transmitted over communication networks can never be revealed to interceptors or hackers, even in public WiFi.Read moreRead less
Advanced error control coding techniques for scalable blockchains. The project aims to investigate the application of error-control coding theory in blockchains, focusing on reducing the storage, computation, and communication overheads, as well as increasing the throughput of blockchain networks. The ambition is to develop coding theory in a completely new territory: decentralised, untrusted, and peer-to-peer networks. The intended outcome is to greatly extend the current state of the art of th ....Advanced error control coding techniques for scalable blockchains. The project aims to investigate the application of error-control coding theory in blockchains, focusing on reducing the storage, computation, and communication overheads, as well as increasing the throughput of blockchain networks. The ambition is to develop coding theory in a completely new territory: decentralised, untrusted, and peer-to-peer networks. The intended outcome is to greatly extend the current state of the art of the theory of error-control codes, previously investigated only in the context of centralised architectures, where a server coordinates every task. Practically, the project should provide significant benefits in terms of cost-effectiveness of blockchains, increase in their processing speed, and security enhancement. Read moreRead less
Network coding over finite rings. Wireless networks are increasing exponentially throughout the world, but are still plagued by delay, jitter, and interference. Advanced algebraic tools are the key to designing novel network coding and relaying schemes, which will overcome these issues and increase the network capacity in terms of sustainable data rates.
Enhancing Privacy for Digital Communication. Protecting one's privacy in cyber world is a challenging task. Every contact to a Web server leaves a digital footprint that can be linked with other publicly available information to compile a profile of one's activities. Anonymous communication is a powerful tool for enhancing individuals' privacy and providing services such as electronic election where a person's vote must be unlinkable to him/her. However, anonymity may be misused by criminals to ....Enhancing Privacy for Digital Communication. Protecting one's privacy in cyber world is a challenging task. Every contact to a Web server leaves a digital footprint that can be linked with other publicly available information to compile a profile of one's activities. Anonymous communication is a powerful tool for enhancing individuals' privacy and providing services such as electronic election where a person's vote must be unlinkable to him/her. However, anonymity may be misused by criminals to hide their identities and engage in illegal activities. The aim of this project is to design and analyse privacy enhancing communication systems that balance individuals' privacy and accountability, and develop criteria and metrics to compare performance of these systems.Read moreRead less
Secure and Efficient Fair Exchange Protocols. Information security is becoming increasingly important in the rapidly growing field of e-commerce. This project will enable the development of secure fair exchange protocols and schemes, which will be absolutely crucial to Australia's national security. The project will also strengthen international collaboration through the reciprocal exchange of researchers leading to a more collaborative and productive research environment. Furthermore, the proje ....Secure and Efficient Fair Exchange Protocols. Information security is becoming increasingly important in the rapidly growing field of e-commerce. This project will enable the development of secure fair exchange protocols and schemes, which will be absolutely crucial to Australia's national security. The project will also strengthen international collaboration through the reciprocal exchange of researchers leading to a more collaborative and productive research environment. Furthermore, the project will help to maintain the high research profile of Australian researchers and provide cutting-edge information technology for the Australian telecommunication industry, business and government.Read moreRead less