Data sharing with strong privacy against inference attacks. This project aims to develop theories and techniques for strong protection of personal information in sharing large datasets such as national health data or census records. It intends to achieve this through developing new information theoretic methods for synthesising datasets with proven high fidelity and protection against re-identification and inference attacks, where attackers try to learn probability of sensitive data. The expecte ....Data sharing with strong privacy against inference attacks. This project aims to develop theories and techniques for strong protection of personal information in sharing large datasets such as national health data or census records. It intends to achieve this through developing new information theoretic methods for synthesising datasets with proven high fidelity and protection against re-identification and inference attacks, where attackers try to learn probability of sensitive data. The expected outcomes are algorithms for public and private sector data curators to dial up or down their data access arrangements based on privacy risks and fidelity demands linked with different data types and uses. This project intends to enable Australians to securely benefit from valuable data in decision making.Read moreRead less
Private Information Retrieval. The deliverables of this project will enhance information protection which is essential for rapidly expanding e-commerce applications and network communication. It will maintain and strengthen national capability of protecting the confidential integrity of digital systems and the network infrastructure in Australia. It will contribute to maintaining Australia's leading position in telecommunications and information industries. It will enhance the quality of our ....Private Information Retrieval. The deliverables of this project will enhance information protection which is essential for rapidly expanding e-commerce applications and network communication. It will maintain and strengthen national capability of protecting the confidential integrity of digital systems and the network infrastructure in Australia. It will contribute to maintaining Australia's leading position in telecommunications and information industries. It will enhance the quality of our culture by protecting individual's privacy and providing security for sensitive data. Read moreRead less
Construction methods and analysis tools for repeat-accumulate error correction codes. Error correction codes play an integral role in digital communications systems, enabling technologies such as compact-disk players, hard-disk drives, high-speed modems, digital audio broadcasting and deep-space communications. This project develops the techniques which underlie the success of next-generation error correction technologies and thus addresses an important and fundamental problem in the area of inf ....Construction methods and analysis tools for repeat-accumulate error correction codes. Error correction codes play an integral role in digital communications systems, enabling technologies such as compact-disk players, hard-disk drives, high-speed modems, digital audio broadcasting and deep-space communications. This project develops the techniques which underlie the success of next-generation error correction technologies and thus addresses an important and fundamental problem in the area of information and communications technology (ICT). The nature of the project presents significant potential for project outcomes to be beneficial to the Australian telecommunications industry in a wide range of application areas including wireless networks, mobile communications, and data storage.
Read moreRead less
Optimising Cooperation in Multiterminal Wireless Networks. With more and more of our communications networks becoming wireless, new technologies are required to ensure optimal use of limited resources. This project develops and optimises cooperation for multiterminal wireless networks to increase the transmission rate and / or lower the power consumption of wireless networks. Benefits of this research are efficient deployment and operation of high-speed wireless networks such as broadband Inter ....Optimising Cooperation in Multiterminal Wireless Networks. With more and more of our communications networks becoming wireless, new technologies are required to ensure optimal use of limited resources. This project develops and optimises cooperation for multiterminal wireless networks to increase the transmission rate and / or lower the power consumption of wireless networks. Benefits of this research are efficient deployment and operation of high-speed wireless networks such as broadband Internet and digital television, and improved lower-power wireless sensor networks for applications such as remote monitoring bushfire early warning systems.Read moreRead less
Iterative coding for next generation networks. The demands on next generation telecommunication networks can be extrapolated from the increasing use of Voice Over IP (e.g., Skype), real-time streaming media (e.g., live sporting events), and downloaded movies (e.g., the iTunes Music Store). In this data-rich environment, it is necessary to utilise the network itself intelligently. This project draws together ideas from error correction and network coding to provide the technologies that will un ....Iterative coding for next generation networks. The demands on next generation telecommunication networks can be extrapolated from the increasing use of Voice Over IP (e.g., Skype), real-time streaming media (e.g., live sporting events), and downloaded movies (e.g., the iTunes Music Store). In this data-rich environment, it is necessary to utilise the network itself intelligently. This project draws together ideas from error correction and network coding to provide the technologies that will underpin next generation communication networks. With a focus on implementable technologies, this project presents significant potential for project outcomes to impact the Australian information economy, spawning new businesses, transforming established industries, and creating new jobs. Read moreRead less
Structured low-density parity-check codes for next-generation digital communications. The promise of essentially error-free information transmission is a cornerstone of digital communications. Next-generation applications demand increasingly effective error correction, yet traditional systems fall well short of fundamental capacity limits established some fifty years ago. Exciting breakthroughs in the mid-1990s delivered capacity-approaching codes on graphs employing iterative decoding algorithm ....Structured low-density parity-check codes for next-generation digital communications. The promise of essentially error-free information transmission is a cornerstone of digital communications. Next-generation applications demand increasingly effective error correction, yet traditional systems fall well short of fundamental capacity limits established some fifty years ago. Exciting breakthroughs in the mid-1990s delivered capacity-approaching codes on graphs employing iterative decoding algorithms, including low-density parity-check (LDPC) codes. This project applies techniques from discrete mathematics to design structured LDPC coding schemes for widespread implementation. Outcomes of this research will be new LDPC codes, encoding algorithms and analysis techniques for applications including wireless networks, data storage and Internet communications.Read moreRead less
Algebraic Properties of Cryptographic Components and their Cryptanalysis. The outcomes will enhance information and communication security, which is absolutely crucial for the rapidly growing e-commerce and e-government services in Australia. International collaboration will be strengthened by reciprocal exchange of researchers and postgraduate students leading to more attractive and productive research environment. Our project will help to maintain a high profile of Australian researchers, to i ....Algebraic Properties of Cryptographic Components and their Cryptanalysis. The outcomes will enhance information and communication security, which is absolutely crucial for the rapidly growing e-commerce and e-government services in Australia. International collaboration will be strengthened by reciprocal exchange of researchers and postgraduate students leading to more attractive and productive research environment. Our project will help to maintain a high profile of Australian researchers, to increase the capacity for consultancy and contract work, and provide a cutting-edge information technology for the Australian telecommunications industry, business and government.Read moreRead less
Privacy in Genetic Databases. With the recent advances in genetic and computer technology enormous databases containing genetic information have become available for research and other purposes. An example of such databases is the Icelandic Health Database containing health and genetic records about the total population of Iceland. This has raised many privacy and ethical questions both among health professionals and the general public. Many agree that genetic information bears more ethical and ....Privacy in Genetic Databases. With the recent advances in genetic and computer technology enormous databases containing genetic information have become available for research and other purposes. An example of such databases is the Icelandic Health Database containing health and genetic records about the total population of Iceland. This has raised many privacy and ethical questions both among health professionals and the general public. Many agree that genetic information bears more ethical and privacy concerns than other health databases. In this project we shall investigate privacy and ethical issues connected to genetic information and we develop techniques to prevent a disclosure of individual values through statistical analysis.Read moreRead less
Semantic Authentication of Visual Data. Data authentication systems can detect the smallest modification to a message. Authentication systems for media objects such as images, and audio and video clips have a different requirement they must ensure authenticity of the content without needing all the changes to be detectable. The aims of this project are to develop a framework for design and analysis of image and video authentication systems, and construct secure and flexible systems that can be ....Semantic Authentication of Visual Data. Data authentication systems can detect the smallest modification to a message. Authentication systems for media objects such as images, and audio and video clips have a different requirement they must ensure authenticity of the content without needing all the changes to be detectable. The aims of this project are to develop a framework for design and analysis of image and video authentication systems, and construct secure and flexible systems that can be used in practice. This research addresses the urgent need of providing security for multimedia objects in electronic commerce and is of high importance to the acceptance of advanced communication and information services.Read moreRead less
Dynamical systems and iterative decoding of low-density parity-check codes. Modern telecommunication systems are increasingly built on principles of iteration and feedback. By contributing to the knowledge base of iterative telecommunication systems, this project addresses important fundamental problems in the area of telecommunications. The Federal Government has clearly indicated that it recognises the importance that information and communications technology (ICT) plays in the economic and so ....Dynamical systems and iterative decoding of low-density parity-check codes. Modern telecommunication systems are increasingly built on principles of iteration and feedback. By contributing to the knowledge base of iterative telecommunication systems, this project addresses important fundamental problems in the area of telecommunications. The Federal Government has clearly indicated that it recognises the importance that information and communications technology (ICT) plays in the economic and social fabric of Australia, through the recent Innovation Action Plan, Backing Australia's Ability. These technologies are key drivers of the information economy, the spawning of new businesses, the transformation of established industries, the opening up of new export markets, and the creation of new jobs.Read moreRead less