SlideShare a Scribd company logo
1 of 13
GRANT AGREEMENT: 601138 | SCHEME FP7 ICT 2011.4.3
Promoting and Enhancing Reuse of Information throughout the Content Lifecycle taking account of Evolving
Semantics [Digital Preservation]
“This project has received funding from the European Union’s
Seventh Framework Programme for research, technological
development and demonstration under grant agreement no601138”.
Anna-Grit Eggers (University of Goettingen)
 Decapsulation is an integral part in the objective of encapsulation. A
user will at any point in time be able to access the encapsulated
information.
 The decapsulation process can be facilitated by
◦ appending additional information to the payload before the encapsulation
◦ storing the decapsulation supporting information at a location different to the
payload.
 Supporting information before decapsulation is called Restoration
Metadata.
 The storage location, format, and used encapsulation technique to store
the restoration metadata need to be handled in a defined way
 Sometimes it is not obvious which embedding algorithm was used, or even
if there is information embedded at all.
Algorithm Identifier and
Location of Restoration
Metadata
 An Algorithm Identifier can facilitate the identification
of the used encapsulation technique.
 It should best be stored at a defined and perceptible location
e.g. in a standard metadata field.
◦ It has to be defined which metadata field is used to guarantee the
recognition by the encapsulation and decapsulation tool.
◦ The original content of the metadata field has to be added to the
restoration metadata set, to be able to recover the object’s original
state.
 Alternatively, a visible encapsulation algorithm can be
used to store this information.
 For some algorithms it is necessary to store information
about the localisation of the restoration metadata.
 Some need to store other algorithm configuration options
together with the algorithm identifier.
◦ This is the case if the restoration metadata location can
vary, depending on carrier constraints and algorithm
configurations.
 The format of the localisation information can depend on the
referred algorithm.
“ALGORITHM_IDENTIFIER#LOCALISATION_INFORMATION”
 the “#” is a separator between the algorithm identifier and the
localisation information:
image_frame_expansion_E#582
 This translates to:
“The restoration metadata saved for the use of the algorithm that
expands images with an information frame towards east starts at
the pixel 582”.
 This information would suffice for an information encapsulation
tool to know which algorithm to use and where to find the
restoration information, and then to execute the decapsulation.
 It is not necessary to have an algorithm-independent format of the
locator:
audio_track_expansion#3
 Here the location information refers to the third audio track of a video
where information was embedded by adding an additional audio track to
the video.
 The localisation number at this identifier has a completely different
meaning compared to the first example
 It suffices to initiate the decapsulation process.
 Only the addressed decapsulation algorithm has to understand the
localisation information, and the IE framework has to understand the
algorithm identifier.
 For many information encapsulation techniques it is possible
to identify whether information is encapsulated, and which
encapsulation technique was used based on obvious traits at
the file.
 In this case it is not necessary to store algorithm identifier
and localisation information.
 Still, this information supports the handling of hardly
detectable techniques, and helps to distinguish between
similar techniques.
Restoration metadata
• A checksum of the original
 enables a validation of the restored information, carrier as well as payload
 it ensures consistency.
• Configuration information and parameters (including the
encapsulation process itself)
 needed to reverse the encapsulation algorithm
 to know at decapsulation time
 decisions made during the encapsulation process.
• Original file formats, encodings and paths of each file.
• If metadata fields are used, e.g. for the algorithm identifier, the
original entries of these fields need also to be saved.
• Localisation information, if they are needed.
• A ‘valid-until’ timestamp included in the restoration metadata can
indicate a date at which the payload has to be verified again.
• Other payload management information, such as semantic
annotations, to the restoration metadata can support the
handling of this information without the need to execute the
decapsulation process.
• All restoration metadata parameters have to be stored by the
encapsulation algorithms during the encapsulation process.
• Some embedding techniques, e.g. steganography, only
provide the restoration of the embedded payload, whereas
the carrier is not designed to be restored.
• Long-term preservation scenarios in which the carrier is a
valuable digital object require also the restoration of the
digital object.
• By storing additional information about the changes made on
the carrier digital object, and add a digit of the original digital
object, it could be possible to enable the digital object
restorability also for techniques which didn‘t originally provide
for this.

More Related Content

Viewers also liked

PERICLES workshop (IDCC 2016) - Policy and Quality Assurance in the Data Cont...
PERICLES workshop (IDCC 2016) - Policy and Quality Assurance in the Data Cont...PERICLES workshop (IDCC 2016) - Policy and Quality Assurance in the Data Cont...
PERICLES workshop (IDCC 2016) - Policy and Quality Assurance in the Data Cont...PERICLES_FP7
 
Pet demo script 3 - monitoring document access
Pet demo script   3 - monitoring document accessPet demo script   3 - monitoring document access
Pet demo script 3 - monitoring document accessFabio Corubolo
 
IPRES 2014 paper presentation: significant environment information for LTDP
IPRES 2014 paper presentation: significant environment information for LTDPIPRES 2014 paper presentation: significant environment information for LTDP
IPRES 2014 paper presentation: significant environment information for LTDPFabio Corubolo
 
Semi-automated metadata extraction in the long-term
Semi-automated metadata extraction in the long-termSemi-automated metadata extraction in the long-term
Semi-automated metadata extraction in the long-termPERICLES_FP7
 
PERICLES - Choice of Information Encapsulation (IE) Technique
PERICLES - Choice of Information Encapsulation (IE) TechniquePERICLES - Choice of Information Encapsulation (IE) Technique
PERICLES - Choice of Information Encapsulation (IE) TechniquePERICLES_FP7
 
PERICLES Information Packaging Techniques
PERICLES  Information Packaging TechniquesPERICLES  Information Packaging Techniques
PERICLES Information Packaging TechniquesPERICLES_FP7
 
PERICLES Information Embedding Techniques
PERICLES Information Embedding TechniquesPERICLES Information Embedding Techniques
PERICLES Information Embedding TechniquesPERICLES_FP7
 
The PeriCAT Framework
The PeriCAT FrameworkThe PeriCAT Framework
The PeriCAT FrameworkPERICLES_FP7
 
Metadata harvesting
Metadata harvestingMetadata harvesting
Metadata harvestingAndrewLIS688
 

Viewers also liked (10)

PERICLES workshop (IDCC 2016) - Policy and Quality Assurance in the Data Cont...
PERICLES workshop (IDCC 2016) - Policy and Quality Assurance in the Data Cont...PERICLES workshop (IDCC 2016) - Policy and Quality Assurance in the Data Cont...
PERICLES workshop (IDCC 2016) - Policy and Quality Assurance in the Data Cont...
 
Pet demo script 3 - monitoring document access
Pet demo script   3 - monitoring document accessPet demo script   3 - monitoring document access
Pet demo script 3 - monitoring document access
 
IPRES 2014 paper presentation: significant environment information for LTDP
IPRES 2014 paper presentation: significant environment information for LTDPIPRES 2014 paper presentation: significant environment information for LTDP
IPRES 2014 paper presentation: significant environment information for LTDP
 
Semi-automated metadata extraction in the long-term
Semi-automated metadata extraction in the long-termSemi-automated metadata extraction in the long-term
Semi-automated metadata extraction in the long-term
 
PERICLES - Choice of Information Encapsulation (IE) Technique
PERICLES - Choice of Information Encapsulation (IE) TechniquePERICLES - Choice of Information Encapsulation (IE) Technique
PERICLES - Choice of Information Encapsulation (IE) Technique
 
PERICLES Information Packaging Techniques
PERICLES  Information Packaging TechniquesPERICLES  Information Packaging Techniques
PERICLES Information Packaging Techniques
 
PERICLES Information Embedding Techniques
PERICLES Information Embedding TechniquesPERICLES Information Embedding Techniques
PERICLES Information Embedding Techniques
 
The PeriCAT Framework
The PeriCAT FrameworkThe PeriCAT Framework
The PeriCAT Framework
 
Metadata harvesting
Metadata harvestingMetadata harvesting
Metadata harvesting
 
Hemocultivo
HemocultivoHemocultivo
Hemocultivo
 

Similar to PERICLES Decapsulation and Restoration

Geoscientific Data Management Principles
Geoscientific Data Management PrinciplesGeoscientific Data Management Principles
Geoscientific Data Management PrinciplesNigelLaubsch
 
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageSecure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageIRJET Journal
 
Analysis of service-oriented traffic classification with imperfect traffic cl...
Analysis of service-oriented traffic classification with imperfect traffic cl...Analysis of service-oriented traffic classification with imperfect traffic cl...
Analysis of service-oriented traffic classification with imperfect traffic cl...IOSR Journals
 
Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...IOSR Journals
 
An improved geo encryption algorithm in location based services
An improved geo encryption algorithm in location based servicesAn improved geo encryption algorithm in location based services
An improved geo encryption algorithm in location based serviceseSAT Journals
 
Iaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an imageIaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an imageIaetsd Iaetsd
 
A Survey: Enhanced Block Level Message Locked Encryption for data Deduplication
A Survey:  Enhanced Block Level Message Locked Encryption for data DeduplicationA Survey:  Enhanced Block Level Message Locked Encryption for data Deduplication
A Survey: Enhanced Block Level Message Locked Encryption for data DeduplicationIRJET Journal
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
 
IRJET- Reversible Data Hiding using Histogram Shifting Method: A Critical Review
IRJET- Reversible Data Hiding using Histogram Shifting Method: A Critical ReviewIRJET- Reversible Data Hiding using Histogram Shifting Method: A Critical Review
IRJET- Reversible Data Hiding using Histogram Shifting Method: A Critical ReviewIRJET Journal
 
Periodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random BitsPeriodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random BitsIJTET Journal
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET Journal
 
Fault-tolerant backup storage system for confidential data in distributed ser...
Fault-tolerant backup storage system for confidential data in distributed ser...Fault-tolerant backup storage system for confidential data in distributed ser...
Fault-tolerant backup storage system for confidential data in distributed ser...TELKOMNIKA JOURNAL
 
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopIJERA Editor
 
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageIRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageIRJET Journal
 
IRJET- A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...
IRJET-  	  A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...IRJET-  	  A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...
IRJET- A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...IRJET Journal
 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET Journal
 
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET Journal
 
Privacy Preserving Data Mining Technique to Recover Association Rules Using H...
Privacy Preserving Data Mining Technique to Recover Association Rules Using H...Privacy Preserving Data Mining Technique to Recover Association Rules Using H...
Privacy Preserving Data Mining Technique to Recover Association Rules Using H...IJSRED
 

Similar to PERICLES Decapsulation and Restoration (20)

Geoscientific Data Management Principles
Geoscientific Data Management PrinciplesGeoscientific Data Management Principles
Geoscientific Data Management Principles
 
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageSecure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
 
Analysis of service-oriented traffic classification with imperfect traffic cl...
Analysis of service-oriented traffic classification with imperfect traffic cl...Analysis of service-oriented traffic classification with imperfect traffic cl...
Analysis of service-oriented traffic classification with imperfect traffic cl...
 
Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...
 
E017112028
E017112028E017112028
E017112028
 
An improved geo encryption algorithm in location based services
An improved geo encryption algorithm in location based servicesAn improved geo encryption algorithm in location based services
An improved geo encryption algorithm in location based services
 
Iaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an imageIaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an image
 
A Survey: Enhanced Block Level Message Locked Encryption for data Deduplication
A Survey:  Enhanced Block Level Message Locked Encryption for data DeduplicationA Survey:  Enhanced Block Level Message Locked Encryption for data Deduplication
A Survey: Enhanced Block Level Message Locked Encryption for data Deduplication
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
 
DataManagement_2015
DataManagement_2015DataManagement_2015
DataManagement_2015
 
IRJET- Reversible Data Hiding using Histogram Shifting Method: A Critical Review
IRJET- Reversible Data Hiding using Histogram Shifting Method: A Critical ReviewIRJET- Reversible Data Hiding using Histogram Shifting Method: A Critical Review
IRJET- Reversible Data Hiding using Histogram Shifting Method: A Critical Review
 
Periodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random BitsPeriodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random Bits
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
 
Fault-tolerant backup storage system for confidential data in distributed ser...
Fault-tolerant backup storage system for confidential data in distributed ser...Fault-tolerant backup storage system for confidential data in distributed ser...
Fault-tolerant backup storage system for confidential data in distributed ser...
 
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
 
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageIRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
 
IRJET- A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...
IRJET-  	  A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...IRJET-  	  A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...
IRJET- A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...
 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
 
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
 
Privacy Preserving Data Mining Technique to Recover Association Rules Using H...
Privacy Preserving Data Mining Technique to Recover Association Rules Using H...Privacy Preserving Data Mining Technique to Recover Association Rules Using H...
Privacy Preserving Data Mining Technique to Recover Association Rules Using H...
 

More from PERICLES_FP7

Digital Ecosystem and Process Compiler - IDCC17
Digital Ecosystem and Process Compiler - IDCC17Digital Ecosystem and Process Compiler - IDCC17
Digital Ecosystem and Process Compiler - IDCC17PERICLES_FP7
 
Technical Appraisal of Complex Digital Objects in Evolving Environments - IDC...
Technical Appraisal of Complex Digital Objects in Evolving Environments - IDC...Technical Appraisal of Complex Digital Objects in Evolving Environments - IDC...
Technical Appraisal of Complex Digital Objects in Evolving Environments - IDC...PERICLES_FP7
 
Technical appraisal and change impact analysis - IDCC17 workshop
Technical appraisal and change impact analysis - IDCC17 workshopTechnical appraisal and change impact analysis - IDCC17 workshop
Technical appraisal and change impact analysis - IDCC17 workshopPERICLES_FP7
 
ForgetIT: human memory inspired Information Model
ForgetIT: human memory inspired Information ModelForgetIT: human memory inspired Information Model
ForgetIT: human memory inspired Information ModelPERICLES_FP7
 
Data quality, preservation and access: a DANS perspective
Data quality, preservation and access: a DANS perspectiveData quality, preservation and access: a DANS perspective
Data quality, preservation and access: a DANS perspectivePERICLES_FP7
 
Proactive Evolution management in Data-centric SW ecosystems - Acting on Chan...
Proactive Evolution management in Data-centric SW ecosystems - Acting on Chan...Proactive Evolution management in Data-centric SW ecosystems - Acting on Chan...
Proactive Evolution management in Data-centric SW ecosystems - Acting on Chan...PERICLES_FP7
 
Digital Preservation in the era of Big Data - The Diachron Platform - Acting ...
Digital Preservation in the era of Big Data - The Diachron Platform - Acting ...Digital Preservation in the era of Big Data - The Diachron Platform - Acting ...
Digital Preservation in the era of Big Data - The Diachron Platform - Acting ...PERICLES_FP7
 
Detecting Semantic Drift for ontology maintenance - Acting on Change 2016
Detecting Semantic Drift for ontology maintenance - Acting on Change 2016Detecting Semantic Drift for ontology maintenance - Acting on Change 2016
Detecting Semantic Drift for ontology maintenance - Acting on Change 2016PERICLES_FP7
 
Filling the Digital Preservation Gap - Acting on Change
Filling the Digital Preservation Gap - Acting on ChangeFilling the Digital Preservation Gap - Acting on Change
Filling the Digital Preservation Gap - Acting on ChangePERICLES_FP7
 
Risk assessment for preservation in the active life of complex digital object...
Risk assessment for preservation in the active life of complex digital object...Risk assessment for preservation in the active life of complex digital object...
Risk assessment for preservation in the active life of complex digital object...PERICLES_FP7
 
Technical Appraisal Tool, MICE - Acting on Change 2016
Technical Appraisal Tool, MICE - Acting on Change 2016Technical Appraisal Tool, MICE - Acting on Change 2016
Technical Appraisal Tool, MICE - Acting on Change 2016PERICLES_FP7
 
PERICLES Workflow for the automated updating of Digital Ecosystem Models with...
PERICLES Workflow for the automated updating of Digital Ecosystem Models with...PERICLES Workflow for the automated updating of Digital Ecosystem Models with...
PERICLES Workflow for the automated updating of Digital Ecosystem Models with...PERICLES_FP7
 
Capability gap - Preservation isn't just throwing tools at the problem - Acti...
Capability gap - Preservation isn't just throwing tools at the problem - Acti...Capability gap - Preservation isn't just throwing tools at the problem - Acti...
Capability gap - Preservation isn't just throwing tools at the problem - Acti...PERICLES_FP7
 
Automatic policy application and change management - Acting on Change 2016
Automatic policy application and change management - Acting on Change 2016Automatic policy application and change management - Acting on Change 2016
Automatic policy application and change management - Acting on Change 2016PERICLES_FP7
 
Reproducibile scientific workflows - Acting on Change 2016
Reproducibile scientific workflows - Acting on Change 2016Reproducibile scientific workflows - Acting on Change 2016
Reproducibile scientific workflows - Acting on Change 2016PERICLES_FP7
 
Pro-active solutions for higher reproducibility of scientific experiments - A...
Pro-active solutions for higher reproducibility of scientific experiments - A...Pro-active solutions for higher reproducibility of scientific experiments - A...
Pro-active solutions for higher reproducibility of scientific experiments - A...PERICLES_FP7
 
PERICLES Policy management & ontology supported preservation - Acting on Chan...
PERICLES Policy management & ontology supported preservation - Acting on Chan...PERICLES Policy management & ontology supported preservation - Acting on Chan...
PERICLES Policy management & ontology supported preservation - Acting on Chan...PERICLES_FP7
 
PERICLES Modelling Policies - Acting on Change 2016
PERICLES Modelling Policies - Acting on Change 2016PERICLES Modelling Policies - Acting on Change 2016
PERICLES Modelling Policies - Acting on Change 2016PERICLES_FP7
 
PERICLES Ecosystem Modelling (NCDD use case) - Acting on Change 2016
PERICLES Ecosystem Modelling (NCDD use case) - Acting on Change 2016PERICLES Ecosystem Modelling (NCDD use case) - Acting on Change 2016
PERICLES Ecosystem Modelling (NCDD use case) - Acting on Change 2016PERICLES_FP7
 
PERICLES Process Compiler - ‘Eye of the Storm: Preserving Digital Content in ...
PERICLES Process Compiler - ‘Eye of the Storm: Preserving Digital Content in ...PERICLES Process Compiler - ‘Eye of the Storm: Preserving Digital Content in ...
PERICLES Process Compiler - ‘Eye of the Storm: Preserving Digital Content in ...PERICLES_FP7
 

More from PERICLES_FP7 (20)

Digital Ecosystem and Process Compiler - IDCC17
Digital Ecosystem and Process Compiler - IDCC17Digital Ecosystem and Process Compiler - IDCC17
Digital Ecosystem and Process Compiler - IDCC17
 
Technical Appraisal of Complex Digital Objects in Evolving Environments - IDC...
Technical Appraisal of Complex Digital Objects in Evolving Environments - IDC...Technical Appraisal of Complex Digital Objects in Evolving Environments - IDC...
Technical Appraisal of Complex Digital Objects in Evolving Environments - IDC...
 
Technical appraisal and change impact analysis - IDCC17 workshop
Technical appraisal and change impact analysis - IDCC17 workshopTechnical appraisal and change impact analysis - IDCC17 workshop
Technical appraisal and change impact analysis - IDCC17 workshop
 
ForgetIT: human memory inspired Information Model
ForgetIT: human memory inspired Information ModelForgetIT: human memory inspired Information Model
ForgetIT: human memory inspired Information Model
 
Data quality, preservation and access: a DANS perspective
Data quality, preservation and access: a DANS perspectiveData quality, preservation and access: a DANS perspective
Data quality, preservation and access: a DANS perspective
 
Proactive Evolution management in Data-centric SW ecosystems - Acting on Chan...
Proactive Evolution management in Data-centric SW ecosystems - Acting on Chan...Proactive Evolution management in Data-centric SW ecosystems - Acting on Chan...
Proactive Evolution management in Data-centric SW ecosystems - Acting on Chan...
 
Digital Preservation in the era of Big Data - The Diachron Platform - Acting ...
Digital Preservation in the era of Big Data - The Diachron Platform - Acting ...Digital Preservation in the era of Big Data - The Diachron Platform - Acting ...
Digital Preservation in the era of Big Data - The Diachron Platform - Acting ...
 
Detecting Semantic Drift for ontology maintenance - Acting on Change 2016
Detecting Semantic Drift for ontology maintenance - Acting on Change 2016Detecting Semantic Drift for ontology maintenance - Acting on Change 2016
Detecting Semantic Drift for ontology maintenance - Acting on Change 2016
 
Filling the Digital Preservation Gap - Acting on Change
Filling the Digital Preservation Gap - Acting on ChangeFilling the Digital Preservation Gap - Acting on Change
Filling the Digital Preservation Gap - Acting on Change
 
Risk assessment for preservation in the active life of complex digital object...
Risk assessment for preservation in the active life of complex digital object...Risk assessment for preservation in the active life of complex digital object...
Risk assessment for preservation in the active life of complex digital object...
 
Technical Appraisal Tool, MICE - Acting on Change 2016
Technical Appraisal Tool, MICE - Acting on Change 2016Technical Appraisal Tool, MICE - Acting on Change 2016
Technical Appraisal Tool, MICE - Acting on Change 2016
 
PERICLES Workflow for the automated updating of Digital Ecosystem Models with...
PERICLES Workflow for the automated updating of Digital Ecosystem Models with...PERICLES Workflow for the automated updating of Digital Ecosystem Models with...
PERICLES Workflow for the automated updating of Digital Ecosystem Models with...
 
Capability gap - Preservation isn't just throwing tools at the problem - Acti...
Capability gap - Preservation isn't just throwing tools at the problem - Acti...Capability gap - Preservation isn't just throwing tools at the problem - Acti...
Capability gap - Preservation isn't just throwing tools at the problem - Acti...
 
Automatic policy application and change management - Acting on Change 2016
Automatic policy application and change management - Acting on Change 2016Automatic policy application and change management - Acting on Change 2016
Automatic policy application and change management - Acting on Change 2016
 
Reproducibile scientific workflows - Acting on Change 2016
Reproducibile scientific workflows - Acting on Change 2016Reproducibile scientific workflows - Acting on Change 2016
Reproducibile scientific workflows - Acting on Change 2016
 
Pro-active solutions for higher reproducibility of scientific experiments - A...
Pro-active solutions for higher reproducibility of scientific experiments - A...Pro-active solutions for higher reproducibility of scientific experiments - A...
Pro-active solutions for higher reproducibility of scientific experiments - A...
 
PERICLES Policy management & ontology supported preservation - Acting on Chan...
PERICLES Policy management & ontology supported preservation - Acting on Chan...PERICLES Policy management & ontology supported preservation - Acting on Chan...
PERICLES Policy management & ontology supported preservation - Acting on Chan...
 
PERICLES Modelling Policies - Acting on Change 2016
PERICLES Modelling Policies - Acting on Change 2016PERICLES Modelling Policies - Acting on Change 2016
PERICLES Modelling Policies - Acting on Change 2016
 
PERICLES Ecosystem Modelling (NCDD use case) - Acting on Change 2016
PERICLES Ecosystem Modelling (NCDD use case) - Acting on Change 2016PERICLES Ecosystem Modelling (NCDD use case) - Acting on Change 2016
PERICLES Ecosystem Modelling (NCDD use case) - Acting on Change 2016
 
PERICLES Process Compiler - ‘Eye of the Storm: Preserving Digital Content in ...
PERICLES Process Compiler - ‘Eye of the Storm: Preserving Digital Content in ...PERICLES Process Compiler - ‘Eye of the Storm: Preserving Digital Content in ...
PERICLES Process Compiler - ‘Eye of the Storm: Preserving Digital Content in ...
 

Recently uploaded

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Recently uploaded (20)

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

PERICLES Decapsulation and Restoration

  • 1. GRANT AGREEMENT: 601138 | SCHEME FP7 ICT 2011.4.3 Promoting and Enhancing Reuse of Information throughout the Content Lifecycle taking account of Evolving Semantics [Digital Preservation] “This project has received funding from the European Union’s Seventh Framework Programme for research, technological development and demonstration under grant agreement no601138”. Anna-Grit Eggers (University of Goettingen)
  • 2.  Decapsulation is an integral part in the objective of encapsulation. A user will at any point in time be able to access the encapsulated information.  The decapsulation process can be facilitated by ◦ appending additional information to the payload before the encapsulation ◦ storing the decapsulation supporting information at a location different to the payload.  Supporting information before decapsulation is called Restoration Metadata.  The storage location, format, and used encapsulation technique to store the restoration metadata need to be handled in a defined way  Sometimes it is not obvious which embedding algorithm was used, or even if there is information embedded at all.
  • 3. Algorithm Identifier and Location of Restoration Metadata
  • 4.
  • 5.  An Algorithm Identifier can facilitate the identification of the used encapsulation technique.  It should best be stored at a defined and perceptible location e.g. in a standard metadata field. ◦ It has to be defined which metadata field is used to guarantee the recognition by the encapsulation and decapsulation tool. ◦ The original content of the metadata field has to be added to the restoration metadata set, to be able to recover the object’s original state.  Alternatively, a visible encapsulation algorithm can be used to store this information.
  • 6.  For some algorithms it is necessary to store information about the localisation of the restoration metadata.  Some need to store other algorithm configuration options together with the algorithm identifier. ◦ This is the case if the restoration metadata location can vary, depending on carrier constraints and algorithm configurations.  The format of the localisation information can depend on the referred algorithm.
  • 7. “ALGORITHM_IDENTIFIER#LOCALISATION_INFORMATION”  the “#” is a separator between the algorithm identifier and the localisation information: image_frame_expansion_E#582  This translates to: “The restoration metadata saved for the use of the algorithm that expands images with an information frame towards east starts at the pixel 582”.  This information would suffice for an information encapsulation tool to know which algorithm to use and where to find the restoration information, and then to execute the decapsulation.
  • 8.  It is not necessary to have an algorithm-independent format of the locator: audio_track_expansion#3  Here the location information refers to the third audio track of a video where information was embedded by adding an additional audio track to the video.  The localisation number at this identifier has a completely different meaning compared to the first example  It suffices to initiate the decapsulation process.  Only the addressed decapsulation algorithm has to understand the localisation information, and the IE framework has to understand the algorithm identifier.
  • 9.  For many information encapsulation techniques it is possible to identify whether information is encapsulated, and which encapsulation technique was used based on obvious traits at the file.  In this case it is not necessary to store algorithm identifier and localisation information.  Still, this information supports the handling of hardly detectable techniques, and helps to distinguish between similar techniques.
  • 11. • A checksum of the original  enables a validation of the restored information, carrier as well as payload  it ensures consistency. • Configuration information and parameters (including the encapsulation process itself)  needed to reverse the encapsulation algorithm  to know at decapsulation time  decisions made during the encapsulation process. • Original file formats, encodings and paths of each file. • If metadata fields are used, e.g. for the algorithm identifier, the original entries of these fields need also to be saved. • Localisation information, if they are needed. • A ‘valid-until’ timestamp included in the restoration metadata can indicate a date at which the payload has to be verified again.
  • 12. • Other payload management information, such as semantic annotations, to the restoration metadata can support the handling of this information without the need to execute the decapsulation process. • All restoration metadata parameters have to be stored by the encapsulation algorithms during the encapsulation process.
  • 13. • Some embedding techniques, e.g. steganography, only provide the restoration of the embedded payload, whereas the carrier is not designed to be restored. • Long-term preservation scenarios in which the carrier is a valuable digital object require also the restoration of the digital object. • By storing additional information about the changes made on the carrier digital object, and add a digit of the original digital object, it could be possible to enable the digital object restorability also for techniques which didn‘t originally provide for this.