Using Open Source and Free Tools for AV Digital Preservation Workflows
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Faster File Matching Using Gpgpus
Faster File Matching Using GPGPUs Deephan Mohan and John Cavazos Department of Computer and Information Sciences, University of Delaware Abstract We address the problem of file matching by modifying the MD6 algorithm that is best suited to take advantage of GPU computing. MD6 is a cryptographic hash function that is tree-based and highly parallelizable. When the message M is available initially, the hashing operations can be initiated at different starting points within the message and their results can be aggregated as the final step. In the parallel implementation, the MD6 program was partitioned and effectively parallelized across the GPU using CUDA. To demonstrate the performance of the CUDA version of MD6, we performed various experiments with inputs of different MD6 buffer sizes and varying file sizes. CUDA MD6 achieves real time speedup of more than 250X over the sequential version when executed on larger files. CUDA MD6 is a fast and effective solution for identifying similar files. Keywords: CUDA, MD6, GPU computing, File matching 1. Introduction compression level with the root being the final hash computed by the algorithm. The structure of a Merkle tree is shown in File matching is an important task in the field of forensics and Figure 1. In the MD6 implementation, the MD6 buffer size information security. Every file matching application is driven determines the number of levels in the tree and the bounds for by employing a particular hash generating algorithm. The crux parallelism. of the file matching application relies on the robustness and integrity of the hash generating algorithm. Various checksum generation algorithms like MD5[1], SHA-1[2], SHA-256[3], Tiger[4], Whirlpool[5], rolling hash have been utilized for file matching [6, 7]. -
'DIY' Digital Preservation for Audio Identify · Appraise · Organise · Preserve · Access Plan + Housekeeping
'DIY' Digital Preservation for Audio Identify · Appraise · Organise · Preserve · Access Plan + housekeeping Part 1 (10:00am-10:50am) Part 2 (11:00am-11:45am) 10:00am-10:10am Intros and housekeeping 10:50am-11:00am [10-minute comfort break] 10:10am-10:30am Digital Preservation for audio 11:00am-11:15am Organise (Migrate) What material do you care 11:15am-11:45am Store, Maintain, Access about and hope to keep?_ Discussion & Questions 10:30am-10:50am Locate, Appraise, Identify What kind of files are you working with?_ Feel free to Using Zoom swap to ‘Grid View’ when slides are not in use, to gage ‘the room’. Please use the chat Please keep function to your mic on ask questions ‘mute’ when while slides not speaking. are in use. Who are we? • Bridging the Digital Gap traineeship scheme • UK National Archives (National Lottery Heritage Fund) • bringing ‘digital’ skills into the archives sector Why are we doing these workshops? • agitate the cultural record to reflect lived experience • embrace tools that support historical self-determination among non- specialists • raise awareness, share skills, share knowledge What is digital preservation? • digital material is vulnerable in different ways to analog material • digital preservation = “a series of managed activities undertaken to ensure continued access to digital materials for as long as necessary.” Audio practices and technological dependency Image credit: Tarje Sælen Lavik Image credit: Don Shall Image credit: Mk2010 Image credit: Stahlkocher Image credit: JuneAugust Digital preservation and ‘born-digital’ audio Bitstream File(s) Digital Content Rendered Content • codecs (e.g. LPCM) • formats and containers (e.g. -
2017 W5.2 Fixity Integrity
FIXITY & DATA INTEGRITY DATA INTEGRITY DATA INTEGRITY PRESERVATION CONSIDERATIONS ▸ Data that can be rendered ▸ Data that is properly formed and can be validated ▸ DROID, JHOVE, etc. DATA DEGRADATION HOW DO FILES LOSE INTEGRITY? DATA DEGRADATION HOW DO FILES LOSE INTEGRITY? Storage: hardware issues ▸ Physical damage, improper orientation, magnets, dust particles, mold, disasters Storage: software issues ▸ "bit rot", "flipped" bits, small electronic charge, solar flares, radiation DATA DEGRADATION HOW DO FILES LOSE INTEGRITY? Transfer/Retrieval ‣ Transfer from one operating system or file system to another, transfer across network protocols, ▸ Metadata loss: example – Linux has no "Creation Date" (usually "file system" metadata) Mismanagement ▸ Permissions issues (read/write allowed), human error DATA PROTECTION VERIFICATION DATA PROTECTION VERIFICATION ▸ Material proof or evidence that data is unchanged ▸ Material proof or evidence that data is well-formed and should be renderable ▸ Example: Different vendors write code for standard formats in different ways DATA PROTECTION VERIFICATION Verify that data is well-formed using... DATA PROTECTION VERIFICATION Verify that data is well-formed using... ▸ JHOVE ▸ DROID ▸ XML Validator ▸ DVAnalyzer ▸ NARA File Analyzer ▸ BWF MetaEdit WHOLE-FILE CONSISTENCY FIXITY FIXITY BASIC METHODS Manual checks of file metadata such as... FIXITY BASIC METHODS Manual checks of file metadata such as... ▸ File name ▸ File size ▸ Creation date ▸ Modified date ▸ Duration (time-based media) FIXITY ADVANCED METHODS FIXITY -
A Forensic Database for Digital Audio, Video, and Image Media
THE “DENVER MULTIMEDIA DATABASE”: A FORENSIC DATABASE FOR DIGITAL AUDIO, VIDEO, AND IMAGE MEDIA by CRAIG ANDREW JANSON B.A., University of Richmond, 1997 A thesis submitted to the Faculty of the Graduate School of the University of Colorado Denver in partial fulfillment of the requirements for the degree of Master of Science Recording Arts Program 2019 This thesis for the Master of Science degree by Craig Andrew Janson has been approved for the Recording Arts Program by Catalin Grigoras, Chair Jeff M. Smith Cole Whitecotton Date: May 18, 2019 ii Janson, Craig Andrew (M.S., Recording Arts Program) The “Denver Multimedia Database”: A Forensic Database for Digital Audio, Video, and Image Media Thesis directed by Associate Professor Catalin Grigoras ABSTRACT To date, there have been multiple databases developed for use in many forensic disciplines. There are very large and well-known databases like CODIS (DNA), IAFIS (fingerprints), and IBIS (ballistics). There are databases for paint, shoeprint, glass, and even ink; all of which catalog and maintain information on all the variations of their specific subject matter. Somewhat recently there was introduced the “Dresden Image Database” which is designed to provide a digital image database for forensic study and contains images that are generic in nature, royalty free, and created specifically for this database. However, a central repository is needed for the collection and study of digital audios, videos, and images. This kind of database would permit researchers, students, and investigators to explore the data from various media and various sources, compare an unknown with knowns with the possibility of discovering the likely source of the unknown. -
Security 1 Lab
Security 1 Lab Installing Command-Line Hash Generators and Comparing Hashes In this project, you download different command-line hash generators to compare hash values. 1. Use your Web browser to go to https://kevincurran.org/com320/labs/md5deep.zip 2. Download this zip archive. 3. Using Windows Explorer, navigate to the location of the downloaded file. Right-click the file and then click Extract All to extract the files. 4. Create a Microsoft Word document with the line below: Now is the time for all good men to come to the aid of their country. 5. Save the document as Country1.docx in the directory containing files and then close the document. 6. Start a command prompt by clicking Start, entering cmd, and then pressing Enter. 7. Navigate to the location of the downloaded files. 8. Enter MD5DEEP64 Country1.docx to start the application that creates an MD5 hash of Country1.docx and then press Enter. What is the length of this hash? (note: If you are not working on a 64 bit machine, then simply run the MD5deep.exe 32 bit version). 9. Now enter MD5DEEP64 MD5DEEP.TXT to start the application that creates an MD5 hash of the accompanying documentation file MD5DEEP.TXT and then press Enter. What is the length of this hash? Compare it to the hash of Country1.docx. What does this tell you about the strength of the MD5 hash? 10. Start Microsoft Word and then open Country1.docx. 11. Remove the period at the end of the sentence so it says Now is the time for all good men to come to the aid of their country and then save the document as Country2.docx in the directory that contains the files. -
NCIRC Security Tools NIAPC Submission Summary “HELIX Live CD”
NATO UNCLASSIFIED RELEASABLE TO THE INTERNET NCIRC Security Tools NIAPC Submission Summary “HELIX Live CD” Document Reference: Security Tools Internal NIAPC Submission NIAPC Category: Computer Forensics Date Approved for Submission: 24-04-2007 Evaluation/Submission Agency: NCIRC Issue Number: Draft 0.01 NATO UNCLASSIFIED RELEASABLE TO THE INTERNET NATO UNCLASSIFIED RELEASABLE TO THE INTERNET TABLE of CONTENTS 1 Product ......................................................................................................................................3 2 Category ....................................................................................................................................3 3 Role ............................................................................................................................................3 4 Overview....................................................................................................................................3 5 Certification ..............................................................................................................................3 6 Company....................................................................................................................................3 7 Country of Origin .....................................................................................................................3 8 Web Link ...................................................................................................................................3 -
1 Last Date Modified: 30 April 2015 BAE SYSTEMS INFORMATION
BAE SYSTEMS INFORMATION SOLUTIONS INC. GEOSPATIAL EXPLOITATION PRODUCTS® PLATFORM SOFTWARE LICENSE AGREEMENT THIS SOFTWARE LICENSE AGREEMENT (“AGREEMENT”) APPLIES TO ANY SOFTWARE PRODUCT(S) THAT MAY BE PROVIDED BY BAE SYSTEMS INFORMATION SOLUTIONS INC. (“LICENSOR”) TO YOU (“LICENSEE”), INCLUDING BUT NOT LIMITED TO GXP XPLORER®, SOCET GXP ®, SOCET SET®, GXP WEBVIEWTM, GXP INMOTIONTM, GXP INMOTIONTM SERVER GXP JPIP SERVER AND IF APPLICABLE (AS SPECIFICALLY IDENTIFIED IN THE APPLICABLE ORDERING DOCUMENT OR CONTRACT) THE GXP XPLORER SERVER JPIP CONNECTOR FOR EXELIS IAS AND/OR THE GXP XPLORER SERVER TO DIB CONNECTOR (EACH SEPARATELY REFERRED TO BELOW AS “GXP SOFTWARE”). READ THE TERMS AND CONDITIONS OF THIS AGREEMENT CAREFULLY BEFORE (1) OPENING THE PACKAGE OR DOWNLOADING THE FILE CONTAINING THE GXP SOFTWARE, OR (2) CLICKING THE “I ACCEPT” BUTTON. THE GXP SOFTWARE AND THE ACCOMPANYING USER DOCUMENTATION (EACH REFERRED TO AS THE “PROGRAM”) ARE COPYRIGHTED AND LICENSED - NOT SOLD. BY OPENING THE SOFTWARE PACKAGE, OR CLICKING “I ACCEPT”, YOU ARE ACCEPTING AND AGREEING TO THE TERMS OF THIS AGREEMENT. IF YOU DO NOT ACCEPT THE TERMS AND CONDITIONS OF THIS AGREEMENT PROMPTLY RETURN THE UNOPENED PACKAGE TO THE PARTY FROM WHOM IT WAS ACQUIRED, CANCEL THE DOWNLOAD OR CANCEL THE INSTALLATION. IF YOU ARE A UNITED STATES (“U.S”) GOVERNMENT CUSTOMER, ACCEPTANCE OF THESE TERMS ARE EFFECTUATED BY ACCEPTANCE OF A PROPOSAL, QUOTE, OR OTHER ORDERING DOCUMENT OR CONTRACT INCORPORATING THIS AGREEMENT BY REFERENCE OR OTHERWISE OR BY CONTRACTING OFFICER EXECUTION OF THIS AGREEMENT. THIS AGREEMENT REPRESENTS THE ENTIRE AGREEMENT CONCERNING THE LICENSING OF THE PROGRAM BETWEEN LICENSEE AND LICENSOR, AND IT SUPERSEDES AND REPLACES IN ITS ENTIRETY ANY PRIOR PROPOSAL, REPRESENTATION, OR UNDERSTANDING BETWEEN THE PARTIES. -
Open Source Licenses Applicable to Hitachi's Products Earlier Versions
Open Source Licenses Applicable to Hitachi’s Products EARLIER VERSIONS Several products are listed below together with certain open source licenses applicable to the particular product. The open source software licenses are included at the end of this document. If the open source package has been modified, an asterisk (*) appears next to the name of the package. Note that the source code for packages licensed under the GNU General Public License or similar type of license that requires the licensor to make the source code publicly available (“GPL Software”) may be available for download as indicated below. If the source code for GPL Software is not included in the software or available for download, please send requests for source code for GPL Software to the contact person listed for the applicable product. The materials below are provided “AS IS,” without warranty of any kind, including, but not limited to, the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. Access to this material grants you no right or license, express or implied, statutorily or otherwise, under any patent, trade secret, copyright, or any other intellectual property right of Hitachi Vantara Corporation (“Hitachi”). Hitachi reserves the right to change any material in this document, and any information and products on which this material is based, at any time, without notice. Hitachi shall have no responsibility or liability to any person or entity with respect to any damages, losses, or costs arising from the materials -
Repository Design Report with Attached Metadata Plan
National Digital Information Infrastructure and Preservation Program Preserving Digital Public Television Project REPOSITORY DESIGN REPORT WITH ATTACHED METADATA PLAN Prepared by Joseph Pawletko, Software Systems Architect, New York University With contributions by Nan Rubin, Project Director, Thirteen/WNET-TV Kara van Malssen, Senior Research Scholar, New York University 2010-03-19 Table of Contents Executive Summary ………………………………………………………………………………………… 2 1. Background ……………………………………………………………………………………………..... 3 2. OAIS Reference Model and Terms …………………………………………………………………… 3 3. Preservation Repository Design ……………………………………………………………………….. 3 4. Core Archival Information Package Structure …………………………………………………….. 11 5. PDPTV Archival Information Package Structure …………………………………………………... 14 6. PDPTV Submission Information Packages …………………………………………………………... 17 7. PDPTV Archival Information Package Generation and Metadata Plan ……………………... 18 8. Content Transfer to the Library of Congress .……………………………………………………….. 22 9. Summary …………………………………………………………………………………………………… 23 10. Remaining Work …………………………………………………………………………………………. 30 11. Acknowledgements ……………………………………………………………………………………. 31 Appendix 1 Glossary and OAIS Operation ……………………………………………...…………… 32 Appendix 2 WNET NAAT 002405 METS File ……………………………………………………………. 37 Appendix 3 WNET NAAT 002405 PBCore File …………………………………………………………. 41 Appendix 4 WNET NAAT 002405 SD Broadcast Master PREMIS File ...……………………………. 46 Appendix 5 WNET NAAT 002405 SD Broadcast Master METSRights File …………………………. 48 Appendix 6 WGBH -
Introduction • the Ffmpeg Family • Other Open-Source Pieces Of
Open-Source Tools and Resources Summary • introduction • the FFmpeg family Reto Kromer • AV Preservation by reto.ch • other open-source pieces of software conclusion Akademie der bildenden Künste • Medienkunst: Technologie und Erhaltungsstrategien III Wien, 7.–10. Jänner 2020 1 2 CLI and/or GUI MD5 Checksums • command-line interface (CLI) Windows comes with: graphical user interface (GUI) CertUtil • macOS and Linux come with: md5 md5deep shasum 3 4 FFmpeg Components • ffmpeg • libavutil • ffplay • libavcodec FFmpeg • ffprobe • libavformat • libavdevice • libavfilter • libswscale • libswresample 5 6 Data Transformations File Transformations ffmpeg (CLI) ffmpeg.org demultiplex: libavformat ➔ decode: libavcodec FFmpeg Cookbook for Archivists filter: libavfilter ➔ avpres.net/FFmpeg/ encode: libavcodec ffmprovisr multiplex: libavformat ➔ amiaopensource.github.io/ffmprovisr/ 7 8 Metadata Extraction Media Players MediaInfo (GUI, CLI) VLC (GUI) ➔ mediaarea.net/MediaInfo ➔ www.videolan.org/vlc/ ffprobe (CLI) mpv (CLI) ➔ ffmpeg.org ➔ mpv.io ffplay (CLI) ➔ ffmpeg.org 9 10 A Graphical User Interface FFCommand Engine (GUI) ➔ github.com/ColorlabMD/FFCommand_Engine Other Software 11 12 The Missing Piece of Software avantages disavantages RAWcooked (CLI) TIFF data easier ➔ mediaarea.net/RAWcooked DPX bigger files OpenEXR to process JPEG 2000 data complexer FFV1 smaller files to process 13 14 RAWcooked Quality Control • encoding into Matroska (.mkv) using FFV1 QCTools (GUI), qcli (CLI) video codec and FLAC audio codec ➔ bavc.org/preserve-media/preservation-tools -
Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae -
Trafficmanager 7.0 User Guide
Vantage TrafficManager User Guide 7.0 TrafficManager User Guide June 2016 193946 2 Copyrights and Trademark Notices Copyright © 2016 Telestream, LLC. All rights reserved worldwide. No part of this publication may be reproduced, transmitted, transcribed, altered, or translated into any languages without the written permission of Telestream. Information and specifications in this document are subject to change without notice and do not represent a commitment on the part of Telestream. Telestream. Telestream, CaptionMaker, Episode, Flip4Mac, FlipFactory, Flip Player, Lightspeed, ScreenFlow, Switch, Vantage, Wirecast, GraphicsFactory, MetaFlip, and Split-and-Stitch are registered trademarks and Gameshow, MacCaption, e-Captioning, Pipeline, Post Producer, Tempo, TrafficManager, and VOD Producer are trademarks of Telestream, LLC. All other trademarks are the property of their respective owners. Adobe. Adobe® HTTP Dynamic Streaming Copyright © 2014 of Adobe Systems All rights reserved. Apple. QuickTime, MacOS X, and Safari are trademarks of Apple, Inc. Bonjour, the Bonjour logo, and the Bonjour symbol are trademarks of Apple, Inc. Avid. Portions of this product Copyright 2012 Avid Technology, Inc. Dolby. Dolby and the double-D symbol are registered trademarks of Dolby Laboratories. Fraunhofer IIS and Thomson Multimedia. MPEG Layer-3 audio coding technology licensed from Fraunhofer IIS and Thomson Multimedia. Google. VP6 and VP8 Copyright Google Inc. 2014 All rights Reserved. MainConcept. MainConcept is a registered trademark of MainConcept LLC and MainConcept AG. Copyright 2004 MainConcept Multimedia Technologies. Manzanita. Manzanita is a registered trademark of Manzanita Systems, Inc. MCW. HEVC Decoding software licensed from MCW. MediaInfo. Copyright © 2002-2013 MediaArea.net SARL. All rights reserved. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.