Protecting the Australian passport by developing face recognition training programs that effectively integrate human operators and machine systems. The security of the Australian passport is vital to the fight against crime and terrorism. This project will help detect identity fraud in passport applications by developing training programs drawing on the psychology of face processing to optimally combine human decision making with machine face recognition systems to maximise fraud detection.
Faces in context: A new ecological paradigm for person identification. Accurate face recognition is critical to normal social functioning of individuals and identity management processes that underpin a secure and fair Australia. Current understanding is based on tests that do not capture the rich context surrounding person identification in daily life. This project aims to introduce new methods for observing person identification in daily life and real-world tasks that are critical to border se ....Faces in context: A new ecological paradigm for person identification. Accurate face recognition is critical to normal social functioning of individuals and identity management processes that underpin a secure and fair Australia. Current understanding is based on tests that do not capture the rich context surrounding person identification in daily life. This project aims to introduce new methods for observing person identification in daily life and real-world tasks that are critical to border security, criminal investigations and the justice system. Expected outcomes include an integrated framework for person identification describing the cognitive mechanisms that link faces to surrounding visual context and the viewer’s background knowledge. Benefits in forensic, security and legal settings are expected.Read moreRead less
Towards optimal face identification systems. This project aims to improve face identification accuracy at a system level. Reliable face identification is critical in security, police and judicial processes. The project will inform policy in the recruitment, training and workflow design underpinning the secure issuance of Australian passports. Expected outcomes of the project will include social and economic gains such as improved efficiency and reliability of key government services. The knowled ....Towards optimal face identification systems. This project aims to improve face identification accuracy at a system level. Reliable face identification is critical in security, police and judicial processes. The project will inform policy in the recruitment, training and workflow design underpinning the secure issuance of Australian passports. Expected outcomes of the project will include social and economic gains such as improved efficiency and reliability of key government services. The knowledge gained as a result of the project in perceptual and cognitive processes will strengthen legal systems and national security by minimising the risk of identification errors in critical roles.Read moreRead less
Information sampling in superior face identifiers. This project aims to develop a theoretical understanding of perceptual processing that gives rise to the skill of face identification. The project intends to use innovative eye-tracking methods in order to pinpoint the visual information used by superior face identifiers, and capture qualitative differences in their visual processing. Expected outcomes include data-driven training and recruitment methods that can improve performance of professio ....Information sampling in superior face identifiers. This project aims to develop a theoretical understanding of perceptual processing that gives rise to the skill of face identification. The project intends to use innovative eye-tracking methods in order to pinpoint the visual information used by superior face identifiers, and capture qualitative differences in their visual processing. Expected outcomes include data-driven training and recruitment methods that can improve performance of professional face identification experts. Intended benefits include improved efficiency and reliability in identity verification processes, legal guidelines for interpreting identification evidence in court and training interventions for people with acquired and developmental impairments in face processing ability.Read moreRead less
Detecting identity fraud in passport applications: Improving human operator performance through better understanding of unfamiliar face processing. The passport is a vital link in the defence of Australia against terrorism and crime. In this project researchers will work with the Department of Foreign Affairs and Trade to improve the ability of staff to detect identity fraud in passport applications, thus helping to protect the integrity of the Australian passport as a trusted identity document.
Energy big data analytics from a cybersecurity perspective. This project aims to develop a framework on energy big data analytics from security and privacy perspectives. Unlike other big data analytics such as social network big data analytics, energy big data analytics involve research challenges on how to cope with real-time tight cyber-physical couplings, and security/safety of the smart grid system. This project will develop advanced data-driven algorithms that are capable of detecting coord ....Energy big data analytics from a cybersecurity perspective. This project aims to develop a framework on energy big data analytics from security and privacy perspectives. Unlike other big data analytics such as social network big data analytics, energy big data analytics involve research challenges on how to cope with real-time tight cyber-physical couplings, and security/safety of the smart grid system. This project will develop advanced data-driven algorithms that are capable of detecting coordinated cyber-attacks that will potentially lead to catastrophic cascaded failures; and develop new solutions in detecting the false data-injection attacks that are conventionally considered as unobservable. This project will provide the benefit of enhancing our national critical infrastructure's security.Read moreRead less
Towards a block-cipher circuit resistant to multiple side channel attacks. This project aims to design, implement and verify the first ever fully comprehensive countermeasure against simultaneous attacks on devices performing a cryptographic task, such as a smart card or a mobile phone used for an electronic payment, through a variety of side channels. Side channel attacks aim to obtain unauthorized access to secret cryptographic keys used by such devices, by collecting and statistically process ....Towards a block-cipher circuit resistant to multiple side channel attacks. This project aims to design, implement and verify the first ever fully comprehensive countermeasure against simultaneous attacks on devices performing a cryptographic task, such as a smart card or a mobile phone used for an electronic payment, through a variety of side channels. Side channel attacks aim to obtain unauthorized access to secret cryptographic keys used by such devices, by collecting and statistically processing measurements of by-products of the physical operation of these devices, such as the consumed power or electromagnetic radiation. Rapid proliferation of personal devices used for electronic payments or containing sensitive data makes such a comprehensive countermeasure urgently needed.Read moreRead less
Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor ....Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor authentication performance, which is not commercially applicable. This project aims to investigate innovative solutions to this issue. The intended deliverables will include deep learning based biometric feature extractor, cancellable biometrics and cloud oriented biometrics security protocols. Read moreRead less
Compression and communication of single and multi-view video based on overlapping motion hint fields. This project explores a new way of communicating motion for video and multi-view (3D) applications, facilitating efficient interactive access to content. Outcomes will include new compression methods that avoid redundant transmission of motion side information, plus client/server technology that leverages metadata from smart surveillance cameras.
Design automation for secure, reliable and energy efficient embedded processors. This project seeks to create a methodology to design and generate processors which are both secure, reliable and energy efficient for deployment in Internet of Things (IoT) systems, which require little on-going maintenance. In such systems, both security and reliability are paramount, particularly in medical devices, control devices in critical machinery, financial transactions and automotive electronics. The proje ....Design automation for secure, reliable and energy efficient embedded processors. This project seeks to create a methodology to design and generate processors which are both secure, reliable and energy efficient for deployment in Internet of Things (IoT) systems, which require little on-going maintenance. In such systems, both security and reliability are paramount, particularly in medical devices, control devices in critical machinery, financial transactions and automotive electronics. The project will use an open RISC-V processor which is sufficiently flexible to function as a base processor, with a myriad of tools such as compilers and debuggers available. Reliable computing machinery will enable systems to work in hostile environments and be functionally correct for longer.Read moreRead less