Novel audio watermarking techniques for tracing multimedia piracy. This project aims to develop inaudible, high-capacity audio watermarking techniques to trace the illegal copying and distribution of multimedia data containing a sound component, such as audios and sound videos. With the rapid growth of communication networks and the use of advanced multimedia technology, digital multimedia data can be easily copied, manipulated and distributed. This has led to strong demand for new techniques to ....Novel audio watermarking techniques for tracing multimedia piracy. This project aims to develop inaudible, high-capacity audio watermarking techniques to trace the illegal copying and distribution of multimedia data containing a sound component, such as audios and sound videos. With the rapid growth of communication networks and the use of advanced multimedia technology, digital multimedia data can be easily copied, manipulated and distributed. This has led to strong demand for new techniques to prevent illegal use of copyrighted data. The project is expected to advance the theory of audio watermarking and enhance Australia's international competitiveness in this field.
Read moreRead less
A provable privacy-preserving data sharing system for the cloud environment. This project aims to develop an innovative data sharing system, with a mathematically provable privacy guarantee, in a cloud environment. This will be adopted by Australian Education Management Group’s (AEMG) cloud campus to exchange data in a restricted privacy manner between partner institutions. It will be commercialised as a middleware that can be plugged into existing cloud environments to maintain required privacy ....A provable privacy-preserving data sharing system for the cloud environment. This project aims to develop an innovative data sharing system, with a mathematically provable privacy guarantee, in a cloud environment. This will be adopted by Australian Education Management Group’s (AEMG) cloud campus to exchange data in a restricted privacy manner between partner institutions. It will be commercialised as a middleware that can be plugged into existing cloud environments to maintain required privacy even when the cloud crosses various jurisdictions with different privacy policies. The outcomes will benefit educational organisations, and lay the foundations for data sharing in other communities such as the government, banks, and other industries in Australia.Read moreRead less
Privacy-Preserving Classification for Big-Data Driven Network Traffic. Protecting sensitive information in large network traffic flows while ensuring data usability for classification emerges as a critical problem of increasing significance. Existing techniques do not work on highly heterogeneous traffic from big-data applications for both privacy protection and classification (such as port-based and load- based methods). This project investigates new theories, methods and techniques for solving ....Privacy-Preserving Classification for Big-Data Driven Network Traffic. Protecting sensitive information in large network traffic flows while ensuring data usability for classification emerges as a critical problem of increasing significance. Existing techniques do not work on highly heterogeneous traffic from big-data applications for both privacy protection and classification (such as port-based and load- based methods). This project investigates new theories, methods and techniques for solving this problem. It proposes to develop a set of effective methods for privacy-preserving data publication through combining randomisation with anonymisation, and for classifying the published data through uncertainty leveraging by probabilistic reasoning and accuracy lifting by inter-flow correlation analysis and active learning.Read moreRead less
Reputation-based Trust Framework for Composed Services. This project aims at providing a uniform and efficient framework for bootstrapping, establishing, and propagating reputation in composed Web services. Reputation is used as a key criterion for establishing trust among composed Web services. Web services are de-facto the technology of choice for the deployment of an increasing number of Web-based solutions for such emerging applications as cloud computing. Because of the distributed and dece ....Reputation-based Trust Framework for Composed Services. This project aims at providing a uniform and efficient framework for bootstrapping, establishing, and propagating reputation in composed Web services. Reputation is used as a key criterion for establishing trust among composed Web services. Web services are de-facto the technology of choice for the deployment of an increasing number of Web-based solutions for such emerging applications as cloud computing. Because of the distributed and decentralised nature of the Web, there is a need to establish a trust framework for selecting and composing Web services. The key parameter will be based on Web service reputation in delivering services.Read moreRead less
Design and Development of a Web-based Intelligent Multimedia Mining System. Increasing amounts of digital multimedia data in the form of video is being captured and stored. However, even the most advanced storage and retrieval techniques lack the features required to be used singly, or in combination, to fulfil a wide range of user needs and rapid access to multimedia resources, even in a very large video database. The core challenges are indeed to develop efficient, smart and intelligent web-ba ....Design and Development of a Web-based Intelligent Multimedia Mining System. Increasing amounts of digital multimedia data in the form of video is being captured and stored. However, even the most advanced storage and retrieval techniques lack the features required to be used singly, or in combination, to fulfil a wide range of user needs and rapid access to multimedia resources, even in a very large video database. The core challenges are indeed to develop efficient, smart and intelligent web-based multimedia mining in Australia and elsewhere. In this project, we will explore techniques and develop algorithms for content-based multimedia retrieval and mining in multimedia databases.Read moreRead less
Developing Robust Mobile Middleware for Large Scale Distributed On-line Applications. Existing electronic commerce have shown profound limitations when dealing with key issues related to electronic commerce applications, such as data interoperability, mobility and performance. The aim of this project is to understand the complexity of the underlying problems related to electronic commerce applications, and to subsequently produce a robust and efficient infrastructure to support them. It is sig ....Developing Robust Mobile Middleware for Large Scale Distributed On-line Applications. Existing electronic commerce have shown profound limitations when dealing with key issues related to electronic commerce applications, such as data interoperability, mobility and performance. The aim of this project is to understand the complexity of the underlying problems related to electronic commerce applications, and to subsequently produce a robust and efficient infrastructure to support them. It is significant because it is expected to automate most of the tedious and complex activities of on-line transactions. The main outcome will be a set of techniques and programs that will form the basis of the commercial software, with a significant export potential.Read moreRead less
Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current comme ....Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current commercial IT product environments. The safety and security of information systems against attack and illicit usage form an essential component of ?National Information Infrastructure Protection (NIIP)?, a move to better ?e-security?. Existing commercial (untrusted) operating systems lack the critical security bases for e-security making e-applications vulnerable to tampering and bypass which can cause failures in overall system security.Read moreRead less
Computing with nearly-consistent data. This project will help programmers correctly use data that originates at various times and places, and spreads unevenly through a system. Computation will combine data that comes from different situations, and is not exactly consistent. Capability to develop high quality software on platforms with this feature will enhance the value of the Australian IT industry. As well, the industries which use the software benefit from correctly working with their data. ....Computing with nearly-consistent data. This project will help programmers correctly use data that originates at various times and places, and spreads unevenly through a system. Computation will combine data that comes from different situations, and is not exactly consistent. Capability to develop high quality software on platforms with this feature will enhance the value of the Australian IT industry. As well, the industries which use the software benefit from correctly working with their data. Sensor networks have data like this, and they play a vital role in environmental monitoring. Cloud computing platforms also have this type of data, and these allow smaller enterprises to grow smoothly, without needing large up-front investments in computing infrastructure.Read moreRead less
Integration of Object Behavior in Federated Information Systems. Integration of autonomous object-oriented systems requires the integration
of object structure and object behaviour. Research in federated information
systems has so far mainly addressed integration of object structure. This
project will investigate the integration of object behaviour, especially object
life cycles. A major application area is the integration of business processes,
which is typically required when companies me ....Integration of Object Behavior in Federated Information Systems. Integration of autonomous object-oriented systems requires the integration
of object structure and object behaviour. Research in federated information
systems has so far mainly addressed integration of object structure. This
project will investigate the integration of object behaviour, especially object
life cycles. A major application area is the integration of business processes,
which is typically required when companies merge or enter into
consumer-producer relationships and constitutes a key capability for B2B e-commerce
systems. Consistency criteria for behaviour integration
will be defined and applied in a graphical integration tool that guides the
definition of global behavioural views upon autonomous object-oriented systems.
Read moreRead less
Scalable Composition and Deployment of Business-to-Business Web-based E-Services. The ubiquity of the Internet offers far reaching opportunities for
emerging Web applications. Separate businesses may be linked into a virtual enterprise that provides a one-stop shop for users. However, there is no model available for managing electronically accessible
services (e-services) in a systematic manner which make them easy to compose and deploy. Our research proposes to address the fundamental issue ....Scalable Composition and Deployment of Business-to-Business Web-based E-Services. The ubiquity of the Internet offers far reaching opportunities for
emerging Web applications. Separate businesses may be linked into a virtual enterprise that provides a one-stop shop for users. However, there is no model available for managing electronically accessible
services (e-services) in a systematic manner which make them easy to compose and deploy. Our research proposes to address the fundamental issues related to fast and scalable composition of e-services in Web-based environments. We propose novel concepts for integrating a large number of dynamic and loosely coupled services. Another distinctive feature of our approach is the peer-to-peer collaborative execution of services.Read moreRead less