Novel audio watermarking techniques for tracing multimedia piracy. This project aims to develop inaudible, high-capacity audio watermarking techniques to trace the illegal copying and distribution of multimedia data containing a sound component, such as audios and sound videos. With the rapid growth of communication networks and the use of advanced multimedia technology, digital multimedia data can be easily copied, manipulated and distributed. This has led to strong demand for new techniques to ....Novel audio watermarking techniques for tracing multimedia piracy. This project aims to develop inaudible, high-capacity audio watermarking techniques to trace the illegal copying and distribution of multimedia data containing a sound component, such as audios and sound videos. With the rapid growth of communication networks and the use of advanced multimedia technology, digital multimedia data can be easily copied, manipulated and distributed. This has led to strong demand for new techniques to prevent illegal use of copyrighted data. The project is expected to advance the theory of audio watermarking and enhance Australia's international competitiveness in this field.
Read moreRead less
A provable privacy-preserving data sharing system for the cloud environment. This project aims to develop an innovative data sharing system, with a mathematically provable privacy guarantee, in a cloud environment. This will be adopted by Australian Education Management Group’s (AEMG) cloud campus to exchange data in a restricted privacy manner between partner institutions. It will be commercialised as a middleware that can be plugged into existing cloud environments to maintain required privacy ....A provable privacy-preserving data sharing system for the cloud environment. This project aims to develop an innovative data sharing system, with a mathematically provable privacy guarantee, in a cloud environment. This will be adopted by Australian Education Management Group’s (AEMG) cloud campus to exchange data in a restricted privacy manner between partner institutions. It will be commercialised as a middleware that can be plugged into existing cloud environments to maintain required privacy even when the cloud crosses various jurisdictions with different privacy policies. The outcomes will benefit educational organisations, and lay the foundations for data sharing in other communities such as the government, banks, and other industries in Australia.Read moreRead less
Developing an active defence system to identify malicious domains and websites. This project aims to develop an innovative active defence system to effectively identify malicious Internet domains and websites. It can secure the cyberspace that is essential to the daily work of Australian people, thus addresses a fundamental problem in safeguarding Australia from cyber crime and terrorism.
Next-generation spatial keyword search. Spatial keyword search is like a normal web search plus additional location information, which helps users to obtain a better ranking of results by considering the spatial proximity. The success of this project will deliver a next-generation spatial keyword search system that overcomes the severe usability limitations experienced by users today.
Reputation-based Trust Framework for Composed Services. This project aims at providing a uniform and efficient framework for bootstrapping, establishing, and propagating reputation in composed Web services. Reputation is used as a key criterion for establishing trust among composed Web services. Web services are de-facto the technology of choice for the deployment of an increasing number of Web-based solutions for such emerging applications as cloud computing. Because of the distributed and dece ....Reputation-based Trust Framework for Composed Services. This project aims at providing a uniform and efficient framework for bootstrapping, establishing, and propagating reputation in composed Web services. Reputation is used as a key criterion for establishing trust among composed Web services. Web services are de-facto the technology of choice for the deployment of an increasing number of Web-based solutions for such emerging applications as cloud computing. Because of the distributed and decentralised nature of the Web, there is a need to establish a trust framework for selecting and composing Web services. The key parameter will be based on Web service reputation in delivering services.Read moreRead less
A fast and effective automated insider threat detection and prediction system. Threats from insiders directly compromises the security, privacy and integrity of Australian e-commerce, large databases and communication channels. This project will provide an essential step in combating this criminal activity by developing methods to detect such threats and secure the public's information against exposure and identity theft.
Technological innovation and change in supply chain integration. In examining emerging technology that can transform the performance of Australian industry we address the following priority goals: better understanding the processes that will advance knowledge and facilitate the development of technological innovations; the potential application of Radio Frequency Identification (RFID) technologies across an entire supply chain; and the improved management of information in the storage, distribut ....Technological innovation and change in supply chain integration. In examining emerging technology that can transform the performance of Australian industry we address the following priority goals: better understanding the processes that will advance knowledge and facilitate the development of technological innovations; the potential application of Radio Frequency Identification (RFID) technologies across an entire supply chain; and the improved management of information in the storage, distribution, and delivery of products (smart information use). Improvement in the operational efficiency and performance of the supply chain will increase national wealth while minimising environmental impacts on the environment, for example, through the better utilisation of heavy freight carriers.Read moreRead less
Multiview video coding using cuboid data compression. This project investigates novel approaches to multiview video coding that use new data compression techniques and explicit occlusion handling. These new approaches complement the state-of-the-art, improving interactivity with instantaneous view change and VCR functionality, reducing encoding complexity, and increasing compression efficiency.
Thermo-mechanical interactive atlas of basin evolution. We propose to create a thermo-mechanical interactive atlas of basin evolution as a desktop geodynamic modelling resource for exploration geologists. The atlas will allow the user to iteratively run our 2D/3D basin modelling software ELLIPSIS to alter model parameters until they match observed basin geometries or thermal history. Model iteration will be based on interactive user evaluation of model outputs and genetic algorithms, which pr ....Thermo-mechanical interactive atlas of basin evolution. We propose to create a thermo-mechanical interactive atlas of basin evolution as a desktop geodynamic modelling resource for exploration geologists. The atlas will allow the user to iteratively run our 2D/3D basin modelling software ELLIPSIS to alter model parameters until they match observed basin geometries or thermal history. Model iteration will be based on interactive user evaluation of model outputs and genetic algorithms, which progressively modify the solution set by mimicking the evolutionary behavior of biological systems (selection, cross-over and mutation), until an acceptable result is achieved. The interactive atlas will be applied to Australian and international case studies.Read moreRead less
Methodologies for face recognition under varying imaging conditions. Face recognition systems are heavily dependent on the nature of the input to the system. Variability in appearance due to changes in illumination, expression, pose, etc. can reduce the recognition results of the existing systems. The aim of this project is to develop new techniques to improve the recognition accuracy in natural environment where unwanted image variations exist. The development of such techniques will be of grea ....Methodologies for face recognition under varying imaging conditions. Face recognition systems are heavily dependent on the nature of the input to the system. Variability in appearance due to changes in illumination, expression, pose, etc. can reduce the recognition results of the existing systems. The aim of this project is to develop new techniques to improve the recognition accuracy in natural environment where unwanted image variations exist. The development of such techniques will be of great importance to Australia's security and safety. The outcome of this research will provide the first steps towards formulating the next generation recognition systems that will improve the suitability of the face recognition for use in security, surveillance, intelligent robotics, banking, and smart environments.Read moreRead less