Novel audio watermarking techniques for tracing multimedia piracy. This project aims to develop inaudible, high-capacity audio watermarking techniques to trace the illegal copying and distribution of multimedia data containing a sound component, such as audios and sound videos. With the rapid growth of communication networks and the use of advanced multimedia technology, digital multimedia data can be easily copied, manipulated and distributed. This has led to strong demand for new techniques to ....Novel audio watermarking techniques for tracing multimedia piracy. This project aims to develop inaudible, high-capacity audio watermarking techniques to trace the illegal copying and distribution of multimedia data containing a sound component, such as audios and sound videos. With the rapid growth of communication networks and the use of advanced multimedia technology, digital multimedia data can be easily copied, manipulated and distributed. This has led to strong demand for new techniques to prevent illegal use of copyrighted data. The project is expected to advance the theory of audio watermarking and enhance Australia's international competitiveness in this field.
Read moreRead less
A provable privacy-preserving data sharing system for the cloud environment. This project aims to develop an innovative data sharing system, with a mathematically provable privacy guarantee, in a cloud environment. This will be adopted by Australian Education Management Group’s (AEMG) cloud campus to exchange data in a restricted privacy manner between partner institutions. It will be commercialised as a middleware that can be plugged into existing cloud environments to maintain required privacy ....A provable privacy-preserving data sharing system for the cloud environment. This project aims to develop an innovative data sharing system, with a mathematically provable privacy guarantee, in a cloud environment. This will be adopted by Australian Education Management Group’s (AEMG) cloud campus to exchange data in a restricted privacy manner between partner institutions. It will be commercialised as a middleware that can be plugged into existing cloud environments to maintain required privacy even when the cloud crosses various jurisdictions with different privacy policies. The outcomes will benefit educational organisations, and lay the foundations for data sharing in other communities such as the government, banks, and other industries in Australia.Read moreRead less
Privacy-Preserving Fog Info System in Infrastructure-Deficient Environments. Due to Australia’s unique geographical distribution and population density, many regional or remote areas lack infrastructural support and development, including telecommunications and electricity supply. It is important to provide information and communication services in such infrastructure-deficient environments. In this project, we will develop a first-ever commercially ready Fog information system, or FogIS in shor ....Privacy-Preserving Fog Info System in Infrastructure-Deficient Environments. Due to Australia’s unique geographical distribution and population density, many regional or remote areas lack infrastructural support and development, including telecommunications and electricity supply. It is important to provide information and communication services in such infrastructure-deficient environments. In this project, we will develop a first-ever commercially ready Fog information system, or FogIS in short, to enable localised information and communication services, while preserving users' privacy, in infrastructure-deficient environments. The deployment of this system will bring great benefits to Australia’s economic growth, the quality of life, cybersecurity, and environment control in rural and regional Australia. Read moreRead less
Privacy-Preserving Classification for Big-Data Driven Network Traffic. Protecting sensitive information in large network traffic flows while ensuring data usability for classification emerges as a critical problem of increasing significance. Existing techniques do not work on highly heterogeneous traffic from big-data applications for both privacy protection and classification (such as port-based and load- based methods). This project investigates new theories, methods and techniques for solving ....Privacy-Preserving Classification for Big-Data Driven Network Traffic. Protecting sensitive information in large network traffic flows while ensuring data usability for classification emerges as a critical problem of increasing significance. Existing techniques do not work on highly heterogeneous traffic from big-data applications for both privacy protection and classification (such as port-based and load- based methods). This project investigates new theories, methods and techniques for solving this problem. It proposes to develop a set of effective methods for privacy-preserving data publication through combining randomisation with anonymisation, and for classifying the published data through uncertainty leveraging by probabilistic reasoning and accuracy lifting by inter-flow correlation analysis and active learning.Read moreRead less
Reputation-based Trust Framework for Composed Services. This project aims at providing a uniform and efficient framework for bootstrapping, establishing, and propagating reputation in composed Web services. Reputation is used as a key criterion for establishing trust among composed Web services. Web services are de-facto the technology of choice for the deployment of an increasing number of Web-based solutions for such emerging applications as cloud computing. Because of the distributed and dece ....Reputation-based Trust Framework for Composed Services. This project aims at providing a uniform and efficient framework for bootstrapping, establishing, and propagating reputation in composed Web services. Reputation is used as a key criterion for establishing trust among composed Web services. Web services are de-facto the technology of choice for the deployment of an increasing number of Web-based solutions for such emerging applications as cloud computing. Because of the distributed and decentralised nature of the Web, there is a need to establish a trust framework for selecting and composing Web services. The key parameter will be based on Web service reputation in delivering services.Read moreRead less
Design and Development of a Web-based Intelligent Multimedia Mining System. Increasing amounts of digital multimedia data in the form of video is being captured and stored. However, even the most advanced storage and retrieval techniques lack the features required to be used singly, or in combination, to fulfil a wide range of user needs and rapid access to multimedia resources, even in a very large video database. The core challenges are indeed to develop efficient, smart and intelligent web-ba ....Design and Development of a Web-based Intelligent Multimedia Mining System. Increasing amounts of digital multimedia data in the form of video is being captured and stored. However, even the most advanced storage and retrieval techniques lack the features required to be used singly, or in combination, to fulfil a wide range of user needs and rapid access to multimedia resources, even in a very large video database. The core challenges are indeed to develop efficient, smart and intelligent web-based multimedia mining in Australia and elsewhere. In this project, we will explore techniques and develop algorithms for content-based multimedia retrieval and mining in multimedia databases.Read moreRead less
Embedding Enterprise Systems in IoT Fog Networks through Microservices. The project will enable automated re-engineering of enterprise systems, to allow them to reused in Internet-of-Things (IoT) applications. It will support efficient ways in which the core business logic of these large scale and monolithic systems can be extended into resource control and data sensing functions managed through the IoT. The project will develop a novel, fine-grained software architecture style suitable for loca ....Embedding Enterprise Systems in IoT Fog Networks through Microservices. The project will enable automated re-engineering of enterprise systems, to allow them to reused in Internet-of-Things (IoT) applications. It will support efficient ways in which the core business logic of these large scale and monolithic systems can be extended into resource control and data sensing functions managed through the IoT. The project will develop a novel, fine-grained software architecture style suitable for localised IoT execution, through microservices executing autonomously on nodes of IoT fog networks. It will develop new techniques for automated discovery of microservices from enterprise systems and the verification of future-state system execution based on current-state behavioural and other properties such as security.Read moreRead less
Developing Robust Mobile Middleware for Large Scale Distributed On-line Applications. Existing electronic commerce have shown profound limitations when dealing with key issues related to electronic commerce applications, such as data interoperability, mobility and performance. The aim of this project is to understand the complexity of the underlying problems related to electronic commerce applications, and to subsequently produce a robust and efficient infrastructure to support them. It is sig ....Developing Robust Mobile Middleware for Large Scale Distributed On-line Applications. Existing electronic commerce have shown profound limitations when dealing with key issues related to electronic commerce applications, such as data interoperability, mobility and performance. The aim of this project is to understand the complexity of the underlying problems related to electronic commerce applications, and to subsequently produce a robust and efficient infrastructure to support them. It is significant because it is expected to automate most of the tedious and complex activities of on-line transactions. The main outcome will be a set of techniques and programs that will form the basis of the commercial software, with a significant export potential.Read moreRead less
Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current comme ....Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current commercial IT product environments. The safety and security of information systems against attack and illicit usage form an essential component of ?National Information Infrastructure Protection (NIIP)?, a move to better ?e-security?. Existing commercial (untrusted) operating systems lack the critical security bases for e-security making e-applications vulnerable to tampering and bypass which can cause failures in overall system security.Read moreRead less
Computing with nearly-consistent data. This project will help programmers correctly use data that originates at various times and places, and spreads unevenly through a system. Computation will combine data that comes from different situations, and is not exactly consistent. Capability to develop high quality software on platforms with this feature will enhance the value of the Australian IT industry. As well, the industries which use the software benefit from correctly working with their data. ....Computing with nearly-consistent data. This project will help programmers correctly use data that originates at various times and places, and spreads unevenly through a system. Computation will combine data that comes from different situations, and is not exactly consistent. Capability to develop high quality software on platforms with this feature will enhance the value of the Australian IT industry. As well, the industries which use the software benefit from correctly working with their data. Sensor networks have data like this, and they play a vital role in environmental monitoring. Cloud computing platforms also have this type of data, and these allow smaller enterprises to grow smoothly, without needing large up-front investments in computing infrastructure.Read moreRead less