Developing a Scalable Infrastructure for Embedded E-Security Incorporating Cryptography and Biometric Authentication. A fundamental flaw in existing embedded e-security technologies is their cryptography-plus-PIN-number infrastructure. This has generated security concerns that have proved a major obstacle to the growth of e-commerce, presently a relatively poor 2% of market share. We aim to design a new infrastructure that can solve this security problem by incorporating cryptography and biomet ....Developing a Scalable Infrastructure for Embedded E-Security Incorporating Cryptography and Biometric Authentication. A fundamental flaw in existing embedded e-security technologies is their cryptography-plus-PIN-number infrastructure. This has generated security concerns that have proved a major obstacle to the growth of e-commerce, presently a relatively poor 2% of market share. We aim to design a new infrastructure that can solve this security problem by incorporating cryptography and biometric authentication into a computing resource limited embedded e-security system. The outcomes of this project will be a set of new cryptosystems, new biometrics processing schemes and new onboard resource allocation schemes that will form the basis for the next generation of embedded systems.Read moreRead less
LittleBrother: Vision Systems Supporting Detection of Offenders in Public Places. Current visual surveillance systems can track people in an area only if complete camera coverage is provided. This project will develop a visual surveillance system able to track and record people's movements in a public building requiring only limited visual coverage. We will propose novel ways of matching images of a single individual from distant cameras by using features such as color histograms decomposed for ....LittleBrother: Vision Systems Supporting Detection of Offenders in Public Places. Current visual surveillance systems can track people in an area only if complete camera coverage is provided. This project will develop a visual surveillance system able to track and record people's movements in a public building requiring only limited visual coverage. We will propose novel ways of matching images of a single individual from distant cameras by using features such as color histograms decomposed for the different body parts, estimated height, and build type. Creating a record with this tracking information will effectively support security officers in the identification of responsible parties in the event of an offence.Read moreRead less
Automatic real-time detection of infiltrated objects for security of airports and train stations. Infiltrated objects represent a very high security threat in critical areas such as airports and train stations. In order to neutralise such a threat, this project will develop new automatic technologies capable of detecting infiltrated objects in sensitive areas in real time, analysing the movements of their original carriers in the nearby areas, and raising attention accordingly. The technologies ....Automatic real-time detection of infiltrated objects for security of airports and train stations. Infiltrated objects represent a very high security threat in critical areas such as airports and train stations. In order to neutralise such a threat, this project will develop new automatic technologies capable of detecting infiltrated objects in sensitive areas in real time, analysing the movements of their original carriers in the nearby areas, and raising attention accordingly. The technologies will be based on the automatic analysis of camera videos made by computers without the need for assessing or storing the identities of common passers-by. The potential of application is huge extending beyond airports and train stations to any public areas.Read moreRead less
Scalable Robust Video Surveillance over Constrained Networks. Real-time monitoring of large numbers of people is becoming increasingly important for applications such as efficient service delivery and security against both common crime and terrorism. The use of human operators for such tasks is infeasible due to the large amount of data collected. Existing autonomous video surveillance systems are prone to high numbers of false alarms and often require expensive hardware. This proposal seeks ....Scalable Robust Video Surveillance over Constrained Networks. Real-time monitoring of large numbers of people is becoming increasingly important for applications such as efficient service delivery and security against both common crime and terrorism. The use of human operators for such tasks is infeasible due to the large amount of data collected. Existing autonomous video surveillance systems are prone to high numbers of false alarms and often require expensive hardware. This proposal seeks to address both difficulties by using rigorous statistical signal processing methods to optimally fuse information from a network of low-cost cameras.Read moreRead less
Securing Knowledge Processes in Organisations. This project will develop a methodology for identifying and comparing security risks associated with knowledge-intensive processes in organizations. The project addresses a significant area that has historically fallen between two research domains: organisational knowledge processes and systems, and critical information infrastructure protection. The project will establish a unified framework to balance the sharing and protection of information and ....Securing Knowledge Processes in Organisations. This project will develop a methodology for identifying and comparing security risks associated with knowledge-intensive processes in organizations. The project addresses a significant area that has historically fallen between two research domains: organisational knowledge processes and systems, and critical information infrastructure protection. The project will establish a unified framework to balance the sharing and protection of information and organizational knowledge. Outcomes include a framework for modelling knowledge-intensive processes to assess their security vulnerability, an associated methodology of creating security risk profiles of knowledge intensive processes and the validation of the methodology in 3 to 6 organizations.Read moreRead less
Visual tracking of multiple objects: A stochastic geometrical approach. Reliable real-time visual multiple-object tracking techniques will open up new applications that enhance the quality of life such as driving safety, traffic monitoring, home security, security and surveillance of public facilities. These new applications have huge commercial potentials, and the technology developed from this project will provide the catalyst for vibrant new industries to grow. In addition, the expertise deve ....Visual tracking of multiple objects: A stochastic geometrical approach. Reliable real-time visual multiple-object tracking techniques will open up new applications that enhance the quality of life such as driving safety, traffic monitoring, home security, security and surveillance of public facilities. These new applications have huge commercial potentials, and the technology developed from this project will provide the catalyst for vibrant new industries to grow. In addition, the expertise developed from the project will provide a competitive edge for Australian industries in aerospace, oceanography, robotics, remote sensing, and biomedical engineering. Read moreRead less
Highly Scalable Video Compression with Finely Embedded Motion Signalling. Highly scalable video compression is critical to the emergence of new applications in video distribution and management. Examples include interactive remote browsing of video and robust video surveillance over shared networks. Previous ARC funding produced fundamental breakthroughs in scalable video compression, resulting in a new paradigm which has been adopted by leading researchers in the field. The present project a ....Highly Scalable Video Compression with Finely Embedded Motion Signalling. Highly scalable video compression is critical to the emergence of new applications in video distribution and management. Examples include interactive remote browsing of video and robust video surveillance over shared networks. Previous ARC funding produced fundamental breakthroughs in scalable video compression, resulting in a new paradigm which has been adopted by leading researchers in the field. The present project addresses the two most important problems which currently limit the potential of this paradigm. Inspired by the applicant's recent discoveries, the outcomes of this project are likely to represent significant scientific breakthroughs and contribute to a new international video coding standard.Read moreRead less
Methodologies for face recognition under varying imaging conditions. Face recognition systems are heavily dependent on the nature of the input to the system. Variability in appearance due to changes in illumination, expression, pose, etc. can reduce the recognition results of the existing systems. The aim of this project is to develop new techniques to improve the recognition accuracy in natural environment where unwanted image variations exist. The development of such techniques will be of grea ....Methodologies for face recognition under varying imaging conditions. Face recognition systems are heavily dependent on the nature of the input to the system. Variability in appearance due to changes in illumination, expression, pose, etc. can reduce the recognition results of the existing systems. The aim of this project is to develop new techniques to improve the recognition accuracy in natural environment where unwanted image variations exist. The development of such techniques will be of great importance to Australia's security and safety. The outcome of this research will provide the first steps towards formulating the next generation recognition systems that will improve the suitability of the face recognition for use in security, surveillance, intelligent robotics, banking, and smart environments.Read moreRead less
Automatic Recognition of Human Activities in Surveillance Videos: Overcoming the Curse of Dimensionality. This project will deliver a technology capable of automatically recognising human activities of interest in surveillance videos. The project will tackle the challenging, huge complexity inherent in the recognition of human activities by novel statistical pattern recognition techniques. The outcome of this project will be an effective activity recognition technology that will help monitor the ....Automatic Recognition of Human Activities in Surveillance Videos: Overcoming the Curse of Dimensionality. This project will deliver a technology capable of automatically recognising human activities of interest in surveillance videos. The project will tackle the challenging, huge complexity inherent in the recognition of human activities by novel statistical pattern recognition techniques. The outcome of this project will be an effective activity recognition technology that will help monitor the security and safety of environments and support the further development of the Australian video surveillance industry.Read moreRead less
Feature-Level Fusion with Incomplete Data for Automatic Person Identification. This research addresses the current key problems in automated person recognition with incomplete data using multiple traits. The outcomes of this research will not only make a significant contribution to fundamental theory but also result in a wide range of crime and terrorism preventing applications including police database searching, access control, security monitoring and surveillance. They can be used either by p ....Feature-Level Fusion with Incomplete Data for Automatic Person Identification. This research addresses the current key problems in automated person recognition with incomplete data using multiple traits. The outcomes of this research will not only make a significant contribution to fundamental theory but also result in a wide range of crime and terrorism preventing applications including police database searching, access control, security monitoring and surveillance. They can be used either by police and law enforcement agencies, or at places of airport, government buildings, military facilities and even sensitive areas in offices and factories. It will help reduce crime, enhance the security of the nation to a world-advanced level, and generate new industry and export opportunities for Australian security industry.Read moreRead less