Scalable Robust Video Surveillance over Constrained Networks. Real-time monitoring of large numbers of people is becoming increasingly important for applications such as efficient service delivery and security against both common crime and terrorism. The use of human operators for such tasks is infeasible due to the large amount of data collected. Existing autonomous video surveillance systems are prone to high numbers of false alarms and often require expensive hardware. This proposal seeks ....Scalable Robust Video Surveillance over Constrained Networks. Real-time monitoring of large numbers of people is becoming increasingly important for applications such as efficient service delivery and security against both common crime and terrorism. The use of human operators for such tasks is infeasible due to the large amount of data collected. Existing autonomous video surveillance systems are prone to high numbers of false alarms and often require expensive hardware. This proposal seeks to address both difficulties by using rigorous statistical signal processing methods to optimally fuse information from a network of low-cost cameras.Read moreRead less
Developing a Scalable Infrastructure for Embedded E-Security Incorporating Cryptography and Biometric Authentication. A fundamental flaw in existing embedded e-security technologies is their cryptography-plus-PIN-number infrastructure. This has generated security concerns that have proved a major obstacle to the growth of e-commerce, presently a relatively poor 2% of market share. We aim to design a new infrastructure that can solve this security problem by incorporating cryptography and biomet ....Developing a Scalable Infrastructure for Embedded E-Security Incorporating Cryptography and Biometric Authentication. A fundamental flaw in existing embedded e-security technologies is their cryptography-plus-PIN-number infrastructure. This has generated security concerns that have proved a major obstacle to the growth of e-commerce, presently a relatively poor 2% of market share. We aim to design a new infrastructure that can solve this security problem by incorporating cryptography and biometric authentication into a computing resource limited embedded e-security system. The outcomes of this project will be a set of new cryptosystems, new biometrics processing schemes and new onboard resource allocation schemes that will form the basis for the next generation of embedded systems.Read moreRead less
Securing Knowledge Processes in Organisations. This project will develop a methodology for identifying and comparing security risks associated with knowledge-intensive processes in organizations. The project addresses a significant area that has historically fallen between two research domains: organisational knowledge processes and systems, and critical information infrastructure protection. The project will establish a unified framework to balance the sharing and protection of information and ....Securing Knowledge Processes in Organisations. This project will develop a methodology for identifying and comparing security risks associated with knowledge-intensive processes in organizations. The project addresses a significant area that has historically fallen between two research domains: organisational knowledge processes and systems, and critical information infrastructure protection. The project will establish a unified framework to balance the sharing and protection of information and organizational knowledge. Outcomes include a framework for modelling knowledge-intensive processes to assess their security vulnerability, an associated methodology of creating security risk profiles of knowledge intensive processes and the validation of the methodology in 3 to 6 organizations.Read moreRead less
Visual tracking of multiple objects: A stochastic geometrical approach. Reliable real-time visual multiple-object tracking techniques will open up new applications that enhance the quality of life such as driving safety, traffic monitoring, home security, security and surveillance of public facilities. These new applications have huge commercial potentials, and the technology developed from this project will provide the catalyst for vibrant new industries to grow. In addition, the expertise deve ....Visual tracking of multiple objects: A stochastic geometrical approach. Reliable real-time visual multiple-object tracking techniques will open up new applications that enhance the quality of life such as driving safety, traffic monitoring, home security, security and surveillance of public facilities. These new applications have huge commercial potentials, and the technology developed from this project will provide the catalyst for vibrant new industries to grow. In addition, the expertise developed from the project will provide a competitive edge for Australian industries in aerospace, oceanography, robotics, remote sensing, and biomedical engineering. Read moreRead less
Methodologies for face recognition under varying imaging conditions. Face recognition systems are heavily dependent on the nature of the input to the system. Variability in appearance due to changes in illumination, expression, pose, etc. can reduce the recognition results of the existing systems. The aim of this project is to develop new techniques to improve the recognition accuracy in natural environment where unwanted image variations exist. The development of such techniques will be of grea ....Methodologies for face recognition under varying imaging conditions. Face recognition systems are heavily dependent on the nature of the input to the system. Variability in appearance due to changes in illumination, expression, pose, etc. can reduce the recognition results of the existing systems. The aim of this project is to develop new techniques to improve the recognition accuracy in natural environment where unwanted image variations exist. The development of such techniques will be of great importance to Australia's security and safety. The outcome of this research will provide the first steps towards formulating the next generation recognition systems that will improve the suitability of the face recognition for use in security, surveillance, intelligent robotics, banking, and smart environments.Read moreRead less
Mathematical Foundations of Distributed Radar. Conventional military threats to Australia are large or fast moving objects such as ships and aircraft and conventional radar systems are designed to handle such threats. Recent global political shifts have changed the threats to include objects that are small and slowly moving, such as people, small vehicles and boats. Advances in radar hardware make feasible small, low-powered, devices with inherently reduced performance in comparison to deployed ....Mathematical Foundations of Distributed Radar. Conventional military threats to Australia are large or fast moving objects such as ships and aircraft and conventional radar systems are designed to handle such threats. Recent global political shifts have changed the threats to include objects that are small and slowly moving, such as people, small vehicles and boats. Advances in radar hardware make feasible small, low-powered, devices with inherently reduced performance in comparison to deployed systems. Methods for information integration over a dispersed system of such small devices, design of suitable waveform suites and clever local signal processing algorithms will be developed to achieve the performance improvements the hardware offers, to handle the new threats.Read moreRead less
Automatic Human Age Estimation Based on Visual Information. Age verification is important for many security applications including passport control for border security, and protecting children from adult websites, venues, or products. Accurate, reliable and practical age estimation or verification technologies would be of enormous benefit for 'Safeguarding Australia'. The ability of a machine to estimate a person's age and provide an age-appropriate interface also has benefits for the young and ....Automatic Human Age Estimation Based on Visual Information. Age verification is important for many security applications including passport control for border security, and protecting children from adult websites, venues, or products. Accurate, reliable and practical age estimation or verification technologies would be of enormous benefit for 'Safeguarding Australia'. The ability of a machine to estimate a person's age and provide an age-appropriate interface also has benefits for the young and old in our society. The outcome of this project, practical technologies for automatic human age estimation based on visual information, will dramatically change the current (non-technology based) methods of age verification and create new opportunities for customised human-machine interfaces. Read moreRead less
Reconfiguring women's professional sport - on and off the pitch. This project aims to develop a model that reconfigures how women’s professional sport is structured, valued and managed. The project intends to examine professional women’s competitions (AFL, cricket, football, Rugby League and Rugby Union), their co-existence within their respective national associations and the experiences of contracted women athletes. Expected outcomes include the development of a new model of women’s profession ....Reconfiguring women's professional sport - on and off the pitch. This project aims to develop a model that reconfigures how women’s professional sport is structured, valued and managed. The project intends to examine professional women’s competitions (AFL, cricket, football, Rugby League and Rugby Union), their co-existence within their respective national associations and the experiences of contracted women athletes. Expected outcomes include the development of a new model of women’s professional sport, advancing knowledge of inclusive gender relevancy at the individual, team and organisational levels. The adoption of strategies and policies to improve the support and playing experiences of women would position Australia globally at the forefront of changing approaches to women’s professional sport.Read moreRead less
Secure user authentication with continuous adaptive risk evaluation. Users typically authenticate to any given system only once - when they first access it (for example, through providing a password or fingerprint). The prevalence of single sign-on further allows this single authentication to be sufficient for access to multiple systems. Thus an adversary can obtain a large degree of access from stealing a single password, hijacking a user's session, or even simply borrowing their phone. This pr ....Secure user authentication with continuous adaptive risk evaluation. Users typically authenticate to any given system only once - when they first access it (for example, through providing a password or fingerprint). The prevalence of single sign-on further allows this single authentication to be sufficient for access to multiple systems. Thus an adversary can obtain a large degree of access from stealing a single password, hijacking a user's session, or even simply borrowing their phone. This project aims to develop a continuous authentication approach based on user behaviour - typical interactions plus biometrics (for example, keystroke dynamics) - combined with a risk adaptive assessment of the resources being accessed, resulting in re-authentication requests in the event of a suspected compromise.Read moreRead less
Sustainable fiscal federalism and reform of the GST distribution system. The primary source of funds for Australian States and Territories is GST revenue distributed by the Commonwealth using an equalisation formula that has proved to be politically unsustainable and in recent times manifestly inadequate to provide the revenue needed in response to crises and natural disasters. A tipping point has been reached and reform is urgently needed. Drawing on international experience with GST distributi ....Sustainable fiscal federalism and reform of the GST distribution system. The primary source of funds for Australian States and Territories is GST revenue distributed by the Commonwealth using an equalisation formula that has proved to be politically unsustainable and in recent times manifestly inadequate to provide the revenue needed in response to crises and natural disasters. A tipping point has been reached and reform is urgently needed. Drawing on international experience with GST distributions specifically and fiscal federalism more generally, the project aims to develop a reform blueprint for a sustainable and equitable fiscal federalism regime in Australia that best aligns with Australia’s current and long-term fiscal needs.Read moreRead less