Top Banner
AN INCOMPLETE CRASH COURSE IN DIGITAL PRESERVATION [IN 20 MIN] WITH AN EMPHASIS ON THE TRAC CRITERIA & CHECKLIST
64

Intro to Digital Preservation

Jan 15, 2015

Download

Technology

Ben Fino-radin

A very brief introduction to TDR criteria, historic context of digipres, and innovations in web based emulation.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Intro to Digital Preservation

AN INCOMPLETE CRASH COURSE IN DIGITAL PRESERVATION [IN 20 MIN]WITH AN EMPHASIS ON THE TRAC CRITERIA & CHECKLIST

Page 2: Intro to Digital Preservation

• CONTEXT• HISTORIC CASES• OVERVIEW OF TRAC CHECKLIST• TOOLS• PROJECTS OF NOTE

Page 3: Intro to Digital Preservation

LIBRARIES + ARCHIVESMUSEUMS + GALLERIESGOVERNMENTSSCIENCE & MEDICINEPRIVATE SECTORINDIVIDUALS

CONTEXTSTAKEHOLDERS

Page 4: Intro to Digital Preservation

AUTHORS + WRITERSARTISTS + COLLECTORSCORPORATE OFFICESSCIENTISTS + DOCTORS

CONTEXTDONOR COMMUNITIES

Page 5: Intro to Digital Preservation

RARE BOOKS & MANUSCRIPTSFINE ARTPERSONAL PAPERSFINANCIAL / LEGALGEOSPATIAL / MAPSRESEARCH DATA

CONTEXTMATERIALS

Page 6: Intro to Digital Preservation

HISTORIC CASES

Page 7: Intro to Digital Preservation
Page 8: Intro to Digital Preservation
Page 9: Intro to Digital Preservation
Page 10: Intro to Digital Preservation

DOOMED

Page 11: Intro to Digital Preservation

• 1986 DOMESDAY PROJECT• 1999 HARDLY ANY SYSTEMS LEFT• 1999 CAMILEON BEGINS WORK• 2001 ADRIAN PEARCE BEGINS• 2002 CAMILEON EMULATION• 2003 BBC DIGITAL MASTERS• 2004 PEARCE PUBLISHES DATA• 2008 PEARCE DIES, SO DOES SITE• PRESENT: HTTP://WWW.BBC.CO.UK/HISTORY/DOMESDAY

Page 12: Intro to Digital Preservation

AFTER A LOT OF ££ AND EFFORT

Page 13: Intro to Digital Preservation

TRAC CRITERIA & CHECKLIST

Page 14: Intro to Digital Preservation

TRAC CRITERIA & CHECKLISTWHAT IS IT ?

Page 15: Intro to Digital Preservation

A. ORGANIZATIONAL INFRASTRUCTUREA.1 GOVERNANCE AND VIABILITY

1. MISSION STATEMENT2. SUCCESSION / CONTINGENCY PLAN

Page 16: Intro to Digital Preservation

A. ORGANIZATIONAL INFRASTRUCTUREA.2 STRUCTURE AND STAFFING

1. PROPER STAFF POSITIONS2. ENOUGH STAFF3. PROFESSIONAL DEVELOPMENT

Page 17: Intro to Digital Preservation

A. ORGANIZATIONAL INFRASTRUCTUREA.3 PROCEDURAL ACCOUNTABILITY

1. COMMUNITY IDENTIFIED2. MECHANISMS FOR REVIEW OF PROCEDURE3. WRITTEN LEGAL POLICY RE: PERMISSIONS4. PERIODIC TECH UPDATE5. USER FEEDBACK6. GENERAL TRANSPARENCY & ACCOUNTABILITY

Page 18: Intro to Digital Preservation

A. ORGANIZATIONAL INFRASTRUCTUREA.4 FINANCIAL SUSTAINABILITY

1. SHORT & LONG TERM BUSINESS PLAN2. ANNUAL [AT LEAST] REVIEW OF PLAN3. TRANSPARENT & COMPLIANT FINANCIALS

Page 19: Intro to Digital Preservation

A. ORGANIZATIONAL INFRASTRUCTUREA.5 CONTRACTS, LICENSES, LIABILITIES

1. DEPOSIT AGREEMENTS [INCLUDING PRESERVATION RIGHTS] 2. TRACK AND MANAGE INTELLECTUAL PROPERTY

Page 20: Intro to Digital Preservation

B. DIGITAL OBJECT MANAGEMENTB.1 ACQUISITION AND INGEST

1. IDENTIFY PROPERTIES TO PRESERVE2. SPECIFY METADATA REQUIRED AT INGEST3. ABLE TO AUTHENTICATE SOURCE4. SUFFICIENT PHYSICAL CONTROL5. APPROPRIATE FEEDBACK TO DEPOSITOR7. RECORD OF ALL PRESERVATION ACTIONS

Page 21: Intro to Digital Preservation

B. DIGITAL OBJECT MANAGEMENTB.2 CREATING AN ARCHIVABLE PACKAGE

1. WRITTEN DEFINITION OF ALL AIP’S2. DOCUMENTATION OF SIP => AIP PROCESS3. NAMING CONVENTION FOR IDENTIFIERS 4. REPRESENTATION / FORMAT INFORMATION5. DOCUMENTED PROCESS FOR ‘RENDER’

Page 22: Intro to Digital Preservation

B. DIGITAL OBJECT MANAGEMENTB.3 PRESERVATION PLANNING

1. DOCUMENTED PRESERVATION STRATEGIES2. OBSOLESCENCE MONITORING MECHANISMS3. MEANS TO CHANGE 1 BASED ON 24. EVIDENCE OF EFFECTIVENESS

Page 23: Intro to Digital Preservation

B. DIGITAL OBJECT MANAGEMENTB.4 ARCHIVAL STORAGE

1. PRESERVE CONTENT INFORMATION2. ACTIVELY MONITOR FIXITY INFORMATION

Page 24: Intro to Digital Preservation

B. DIGITAL OBJECT MANAGEMENTB.5 INFORMATION MANAGEMENT

1. SPECIFY MINIMUM METADATA REQUIREMENTS FOR DISCOVERABILITY2. MEET THIS REQUIREMENT3. DEMONSTRABLE REFERENTIAL INTEGRITY

Page 25: Intro to Digital Preservation

B. DIGITAL OBJECT MANAGEMENTB.6 ACCESS MANAGEMENT

1. COMMUNICATE ACCESS OPTIONS2. POLICY FOR DOCUMENTATION OF ACCESS3. RESPECTFUL OF ACCESS AGREEMENTS4. DOCUMENTED ACCESS POLICIES5. LOG INAPPROPRIATE ACCESS6. DISSEMINATE COPIES OF ORIGINAL OBJECTS TRACEABLE TO THE ORIGINAL

Page 26: Intro to Digital Preservation

C. TECHNOLOGY, INFRASTRUCTURE, SECURITYC.1 SYSTEM INFRASTRUCTURE

1. REPOSITORY RUNS ON WELL SUPPORTED SYSTEMS (I.E. LINUX/UNIX)2. ADEQUATE SUPPORT FOR BACKUP3. REPOSITORY MANAGES BACKUPS5. MECHANISMS TO DETECT, REPORT, AND ACT UPON CASES OF CORRUPTION6. HARD/SOFTWAREWARE UPGRADE PROCEDURE7. MEANS TO TEST SYSTEM CHANGES

Page 27: Intro to Digital Preservation

C. TECHNOLOGY, INFRASTRUCTURE, SECURITYC.2 APPROPRIATE TECHNOLOGIES

1. HARDWARE / SOFTWARE APPROPRIATE TO DESIGNATED COMMUNITY & SERVICES

Page 28: Intro to Digital Preservation

C. TECHNOLOGY, INFRASTRUCTURE, SECURITYC.3 SECURITY

1. SYSTEMATIC ANALYSIS OF DATA, PERSONNEL, PHYSICAL PLANT, AND SECURITY NEEDS.2. STAFF HAVE AUTHORIZATION RELEVANT TO ROLE WITHIN SYSTEM3. WRITTEN DISASTER PREPAREDNESS AND RECOVERY PLAN.4. OFFSITE BACKUPS. OFFSITE RECOVERY PLAN.

Page 29: Intro to Digital Preservation

TOOLS

Page 30: Intro to Digital Preservation
Page 31: Intro to Digital Preservation
Page 32: Intro to Digital Preservation
Page 33: Intro to Digital Preservation
Page 34: Intro to Digital Preservation
Page 35: Intro to Digital Preservation
Page 36: Intro to Digital Preservation
Page 37: Intro to Digital Preservation
Page 38: Intro to Digital Preservation
Page 39: Intro to Digital Preservation

PRESERVATION PLANNINGSUSTAINABLE FORMATS

1. DISCLOSURE2. ADOPTION3. TRANSPARENCY / SELF DOCUMENTATION4. EXTERNAL DEPENDENCIES5. PATENT ISSUES6. DRM

Page 40: Intro to Digital Preservation

PRESERVATION PLANNINGSUSTAINABLE FORMATS

IDENTIFICATION?

Page 41: Intro to Digital Preservation

PRESERVATION PLANNINGSUSTAINABLE FORMATS

UNIX FILE UTILITY

DROIDFIDO

FITS

JHOVE

Page 42: Intro to Digital Preservation

This work was partially supported by the SCAPE Project. The SCAPE project is co-funded by the European Union under FP7 ICT-2009.4.1 (Grant Agreement number 270137).

Evaluation of Characterisation Tools

Part 1: Identification Authors

Johan van der Knijff, National Library of the Netherlands

Carl Wilson, British Library

September 2011

Page 43: Intro to Digital Preservation

COOL PROJECTS- OR -

OK SO YOU’VE PRESERVED THIRTY YEARS OF DISK IMAGES. NOW WHAT.

Page 44: Intro to Digital Preservation
Page 45: Intro to Digital Preservation
Page 46: Intro to Digital Preservation
Page 47: Intro to Digital Preservation
Page 48: Intro to Digital Preservation
Page 49: Intro to Digital Preservation
Page 50: Intro to Digital Preservation
Page 51: Intro to Digital Preservation

EMULATION[DEMO]

Page 52: Intro to Digital Preservation
Page 53: Intro to Digital Preservation
Page 54: Intro to Digital Preservation
Page 55: Intro to Digital Preservation
Page 56: Intro to Digital Preservation
Page 57: Intro to Digital Preservation
Page 58: Intro to Digital Preservation
Page 59: Intro to Digital Preservation
Page 60: Intro to Digital Preservation
Page 61: Intro to Digital Preservation

Council on Library and Information Resources

Washington, D.C.

Digital Forensics and Born-Digital Content in Cultural Heritage Collections

by Matthew G. Kirschenbaum

Richard Ovenden

Gabriela Redwine

with research assistance from Rachel Donahue

December 2010

Page 62: Intro to Digital Preservation

Statistical Tools for Digital Forensics

Alin C. Popescu and Hany Farid ?

Department of Computer Science at Dartmouth College

Abstract. A digitally altered photograph, often leaving no visual clues of having been tampered with, canbe indistinguishable from an authentic photograph. As a result, photographs no longer hold the uniquestature as a definitive recording of events. We describe several statistical techniques for detecting traces ofdigital tampering in the absence of any digital watermark or signature. In particular, we quantify statisticalcorrelations that result from specific forms of digital tampering, and devise detection schemes to reveal thesecorrelations.

1 Introduction

The advent of low-cost and high-resolution digital cameras, and sophisticated photo-editing software, hasmade it remarkably easy to manipulate and alter digital images. In addition, digital forgeries, often leaving novisual clues of having been tampered with, can be indistinguishable from authentic photographs. And whilethe technology to manipulate digital media is developing at break-neck speeds, the technology to contend withits ramifications is lagging behind.

Digital watermarking has been proposed as a means by which an image can be authenticated (see, for ex-ample, [12, 3] for general surveys). Within this broad area, several authentication schemes have been proposed:embedded signatures [10, 24, 25, 18, 2], erasable fragile watermarks [11, 9], semi-fragile watermarks [16, 23, 28,15], robust tell-tale watermarks [27, 14, 28], and self-embedding watermarks [8]. All of these approaches workby either inserting at the time of recording an imperceptible digital code (a watermark) into the image, orextracting at the time of recording a digital code (a signature) from the image and re-inserting it into the im-age. With the assumption that tampering will alter a watermark, an image can be authenticated by verifyingthat the extracted watermark is the same as that which was inserted. The major drawback of this approachis that a watermark must be inserted at precisely the time of recording, which would limit this approach tospecially equipped digital cameras. This method also relies on the assumption that the watermark cannot beeasily removed and reinserted — it is not yet clear whether this is a reasonable assumption (e.g., [4]).

In contrast to these approaches, we describe a class of statistical techniques for detecting traces of digitaltampering in the absence of any watermark or signature. These approaches work on the assumption that al-though digital forgeries may leave no visual clues of having been tampered with, they may, nevertheless, alterthe underlying statistics of an image. Consider, for example, the creation of a digital forgery that shows a pairof famous movie stars, rumored to have a romantic relationship, walking hand-in-hand. Such a photographcould be created by splicing together individual images of each movie star and overlaying the digitally createdcomposite onto a sunset beach. In order to create a convincing match, it is often necessary to (1) re-size, rotate,or stretch portions of the images; (2) apply luminance non-linearities (e.g., gamma correction) to portions ofthe image in order to adjust for brightness differences; (3) add small amounts of noise to conceal evidence oftampering; and (4) re-save the final image (typically with lossy compression such as JPEG). Although thesemanipulations are often imperceptible to the human eye, they may introduce specific correlations into the im-age, which when detected can be used as evidence of digital tampering. In this paper, we quantify statisticalcorrelations that result from each of these specific forms of digital tampering, and devise detection schemesto reveal the correlations. The effectiveness of these techniques is shown on a number of simple syntheticexamples and on perceptually credible forgeries.

? 6211 Sudikoff Lab, Dartmouth College, Hanover NH 03755 USA (email: [email protected]; tel/fax:603.646.2761/603.646.1672). This work was supported by an Alfred P. Sloan Fellowship, an NSF CAREER Award (IIS-99-83806), an NSF Infrastructure Grant (EIA-98-02068), and under Award No. 2000-DT-CX-K001 from the Office for Do-mestic Preparedness, U.S. Department of Homeland Security (points of view in this document are those of the author(s)and do not necessarily represent the official position of the U.S. Department of Homeland Security).

Page 63: Intro to Digital Preservation

“The Old Version Flickers More”:Digital Preservation from theUser’s PerspectiveMargaret L. Hedstrom, Christopher A. Lee, Judith S. Olson,Clifford A. Lampe

A b s t r a c t

Most criteria for evaluating digital preservation strategies are based on needs and require-ments from the archivist’s perspective. In the CAMiLEON Project, we wanted to learn whatsignificant properties users consider worth preserving. In this article, we present the results of two experiments that used human subjects to learn about user preferences for differentformats of preserved digital objects. We tested subjects’ reactions to digital materials that werepreserved using three common methods: 1) conversion to a “software-independent” format;2) migration; and 3) presenting the original bitstream using emulation. The results of thisexploratory study suggest directions for further research and help archivists understand howuser needs and preferences may inform selection of preservation methods. Further researchon the effectiveness of emulation and migration needs to account for the quality of the emulator, the impact of specific approaches to migration on document attributes and behav-iors, and numerous aspects of the original computing environment that may affect the userexperience. Research on the importance of authenticity should consider how users judgeauthenticity and the tradeoffs they are willing to make between using the original source andthe ease of access and use.

For more than forty years, archivists have debated the best strategies andmethods for preserving digital information. They hold strong opinionsabout the feasibility and effectiveness of different digital preservation

strategies, whether preserving data in software-independent formats, migra-tion, or emulation. Most evaluations of these strategies have been based on therelative merits of theoretical models, pilot projects, or practical experience in

T H E A M E R I C A N A R C H I V I S T

T h e A m e r i c a n A r c h i v i s t , V o l . 6 9 ( S p r i n g / S u m m e r 2 0 0 6 ) : 1 5 9 – 1 8 7 159

SOAA_SP10 23/5/06 3:33 PM Page 159

Page 64: Intro to Digital Preservation

A FEW PEOPLE TO FOLLOW[INCOMPLETE LIST, BUT OH WELL]

@EUANC

@MKIRSCHENBAUM@TEXTFILES@KARIKRAUS

@DOUGRESIDE

@ITPARCHIVE@AVPRESERVE@UMD_MITH@JUSPAR@JENGUILIANO@JONVOSS@EMORYDISC@READYRESOURCESAND MANY MORE……