DPC Members

  • hsbc logo
  • new proni logo
  • un logo
  • portico logo
  • tate logo for website
  • standrewsblockcrest logo
  • aberystwythlogo
  • eh logo for website eh
  • llgc nlw logo
  • wg tiny logo
  • uk data archive logo
  • parliamentary archives 2012 logo
  • national library scotland logo
  • universityofyorklogotiny
  • kcl new logo
  • sac logo
  • rcuk logo for website rcuk
  • ed univ logo tiny
  • national records scotland logo
  • jisc logo for website
  • sheffield logo 200x90
  • portsmouth logo tiny
  • oclc logo for website
  • dcc logo
  • ads logo
  • ribacrest200 90pixels logo
  • cambridge logo for website
  • british library logo
  • warwicklogo
  • hull logo
  • nli tiny logo
  • uel logo
  • tcd logo for website
  • glasgowuniversitylogo
  • cerch logo for website
  • rmg logo
  • bodleian library logo
  • lbg hm fc p c logo
  • leedsuniversitylogo
  • tna logo
  • wellcome library logo
  • ara logo 2
  • rcahms for website logo
  • ulcc logo for website
  • rcahmw for website logo
  • open university logo
  • bbc logo
  • lse lib logo tiny

Media and Formats - Compression and Encryption

Attention: open in a new window. PDFPrintE-mail

File compression algorithms can substantially reduce file sizes and have been widely used in document or image transmission. Compression can either be lossless or lossy (with data loss but often higher levels of compression). Although appropriate in many cases for access and user copies, compression adds additional complexity to the preservation process and is normally not recommended for the storage of archival files.With current increases in storage capacity and reducing costs it is also less necessary. For some very large files e.g. digitised video, compressed formats may be the only viable option however for capture, storage and transmission.

In a similar way encryption is increasingly prevalent either to ensure that sensitive data is read only by the recipient or to ensure a digital product can only be used by an authorised user. Encryption also adds to the complexity of the preservation process and should be avoided if possible for archival copies.This may require strict implementation of physical and system security procedures for the archive of unencrypted files, or archival access to encryption keys.