A new erasure resilient technique for encoding internet packets. Efficient internet communication tolerates losing some packets sent across the web by sending a bit more information than is required. Any holes in the transmission can be repaired using the redundant data. We propose a new transmission protocol that is much simpler to encode and repairs broken messages faster. This new approach, based on sending data plus summed versions of itself, has generic applicability across all packet switc ....A new erasure resilient technique for encoding internet packets. Efficient internet communication tolerates losing some packets sent across the web by sending a bit more information than is required. Any holes in the transmission can be repaired using the redundant data. We propose a new transmission protocol that is much simpler to encode and repairs broken messages faster. This new approach, based on sending data plus summed versions of itself, has generic applicability across all packet switched information networks.Read moreRead less
Data sharing with strong privacy against inference attacks. This project aims to develop theories and techniques for strong protection of personal information in sharing large datasets such as national health data or census records. It intends to achieve this through developing new information theoretic methods for synthesising datasets with proven high fidelity and protection against re-identification and inference attacks, where attackers try to learn probability of sensitive data. The expecte ....Data sharing with strong privacy against inference attacks. This project aims to develop theories and techniques for strong protection of personal information in sharing large datasets such as national health data or census records. It intends to achieve this through developing new information theoretic methods for synthesising datasets with proven high fidelity and protection against re-identification and inference attacks, where attackers try to learn probability of sensitive data. The expected outcomes are algorithms for public and private sector data curators to dial up or down their data access arrangements based on privacy risks and fidelity demands linked with different data types and uses. This project intends to enable Australians to securely benefit from valuable data in decision making.Read moreRead less
Privacy in Genetic Databases. With the recent advances in genetic and computer technology enormous databases containing genetic information have become available for research and other purposes. An example of such databases is the Icelandic Health Database containing health and genetic records about the total population of Iceland. This has raised many privacy and ethical questions both among health professionals and the general public. Many agree that genetic information bears more ethical and ....Privacy in Genetic Databases. With the recent advances in genetic and computer technology enormous databases containing genetic information have become available for research and other purposes. An example of such databases is the Icelandic Health Database containing health and genetic records about the total population of Iceland. This has raised many privacy and ethical questions both among health professionals and the general public. Many agree that genetic information bears more ethical and privacy concerns than other health databases. In this project we shall investigate privacy and ethical issues connected to genetic information and we develop techniques to prevent a disclosure of individual values through statistical analysis.Read moreRead less
Constraints in XML Schema Integration. This project will produce worldwide leading technologies for designing XML data integration system. With the technologies, the well designed integration systems will be able store data with rich semantics and thus provide accurate and understandable information to users. In this way, Australia and communities will be benefited both financially and informatively. The research of this project will also add to the research reputation of Australia in data integ ....Constraints in XML Schema Integration. This project will produce worldwide leading technologies for designing XML data integration system. With the technologies, the well designed integration systems will be able store data with rich semantics and thus provide accurate and understandable information to users. In this way, Australia and communities will be benefited both financially and informatively. The research of this project will also add to the research reputation of Australia in data integration areas. At the same time, the knowledge capacity of Australia on data integration will be enlarged which further improves frontier research activities in the area. Through the research of the project, PhD students will be trained.Read moreRead less
Semantic Authentication of Visual Data. Data authentication systems can detect the smallest modification to a message. Authentication systems for media objects such as images, and audio and video clips have a different requirement they must ensure authenticity of the content without needing all the changes to be detectable. The aims of this project are to develop a framework for design and analysis of image and video authentication systems, and construct secure and flexible systems that can be ....Semantic Authentication of Visual Data. Data authentication systems can detect the smallest modification to a message. Authentication systems for media objects such as images, and audio and video clips have a different requirement they must ensure authenticity of the content without needing all the changes to be detectable. The aims of this project are to develop a framework for design and analysis of image and video authentication systems, and construct secure and flexible systems that can be used in practice. This research addresses the urgent need of providing security for multimedia objects in electronic commerce and is of high importance to the acceptance of advanced communication and information services.Read moreRead less
Private Information Retrieval. The deliverables of this project will enhance information protection which is essential for rapidly expanding e-commerce applications and network communication. It will maintain and strengthen national capability of protecting the confidential integrity of digital systems and the network infrastructure in Australia. It will contribute to maintaining Australia's leading position in telecommunications and information industries. It will enhance the quality of our ....Private Information Retrieval. The deliverables of this project will enhance information protection which is essential for rapidly expanding e-commerce applications and network communication. It will maintain and strengthen national capability of protecting the confidential integrity of digital systems and the network infrastructure in Australia. It will contribute to maintaining Australia's leading position in telecommunications and information industries. It will enhance the quality of our culture by protecting individual's privacy and providing security for sensitive data. Read moreRead less
XML Views of Relational Databases: Semantics and Update Problems. XML is the standard for representing, publishing and exchanging data over the Internet and relational database is the dominant technology for data management. Updating XML views over relational data is fundamental to bring these two technologies together to serve Internet-based applications. Australia has been a leading country in both developing and applying internet technologies. The theoretic outcomes of this project will contr ....XML Views of Relational Databases: Semantics and Update Problems. XML is the standard for representing, publishing and exchanging data over the Internet and relational database is the dominant technology for data management. Updating XML views over relational data is fundamental to bring these two technologies together to serve Internet-based applications. Australia has been a leading country in both developing and applying internet technologies. The theoretic outcomes of this project will contribute to the advance in database and web research communities and establish us as an internationally leading group in this research area. The technological outcomes will help organisations in Australia effectively and efficiently conduct e-Business on the Internet. Read moreRead less
Searching Cohesive Subgraphs in Big Attributed Graph Data. The availability of big attributed graph data brings great opportunities for realizing big values of data. Making sense of such big attributed graph data finds many applications, including health, science, engineering, business, environment, etc. A cohesive subgraph, one of key components that captures the latent properties in a graph, is essential to graph analysis. This project aims to invent effective models of cohesive subgraphs and ....Searching Cohesive Subgraphs in Big Attributed Graph Data. The availability of big attributed graph data brings great opportunities for realizing big values of data. Making sense of such big attributed graph data finds many applications, including health, science, engineering, business, environment, etc. A cohesive subgraph, one of key components that captures the latent properties in a graph, is essential to graph analysis. This project aims to invent effective models of cohesive subgraphs and efficient algorithms for searching and monitoring cohesive subgraphs in big and dynamic attributed graphs from both structure and attribute perspectives. The methods, techniques, and prototype systems developed in this project can be deployed to facilitate the smart use of big graph data across the nation. Read moreRead less
Information security and digital watermarking with Latin squares. The importance of digital information is increasing constantly. Audio, video, and still image data dominate our daily lives. Such information has commercial and strategic importance. It is invaluable in crime prevention: for example, video from security cameras. The protection of commercially valuable material against piracy and sensitive information against security breaches is vital to our economy and our safety. This project ad ....Information security and digital watermarking with Latin squares. The importance of digital information is increasing constantly. Audio, video, and still image data dominate our daily lives. Such information has commercial and strategic importance. It is invaluable in crime prevention: for example, video from security cameras. The protection of commercially valuable material against piracy and sensitive information against security breaches is vital to our economy and our safety. This project addresses these issues, by developing new, secure watermarks and fingerprints to protect digital information. Such watermarks can also protect radio communication channels, which is important due to the rising demand for wireless connectivity.Read moreRead less
Effective and efficient keyword search for relevant entities over Extensible Markup Language (XML) data. This project aims to greatly improve the relevancy of returned XML entities by keyword queries as well as the efficiency of searching. Effective approaches and efficient algorithms for finding relevant entities from large number of XML data sources will be delivered.