Recherche avancée

Médias (1)

Mot : - Tags -/framasoft

Autres articles (111)

  • Support audio et vidéo HTML5

    10 avril 2011

    MediaSPIP utilise les balises HTML5 video et audio pour la lecture de documents multimedia en profitant des dernières innovations du W3C supportées par les navigateurs modernes.
    Pour les navigateurs plus anciens, le lecteur flash Flowplayer est utilisé.
    Le lecteur HTML5 utilisé a été spécifiquement créé pour MediaSPIP : il est complètement modifiable graphiquement pour correspondre à un thème choisi.
    Ces technologies permettent de distribuer vidéo et son à la fois sur des ordinateurs conventionnels (...)

  • Librairies et binaires spécifiques au traitement vidéo et sonore

    31 janvier 2010, par

    Les logiciels et librairies suivantes sont utilisées par SPIPmotion d’une manière ou d’une autre.
    Binaires obligatoires FFMpeg : encodeur principal, permet de transcoder presque tous les types de fichiers vidéo et sonores dans les formats lisibles sur Internet. CF ce tutoriel pour son installation ; Oggz-tools : outils d’inspection de fichiers ogg ; Mediainfo : récupération d’informations depuis la plupart des formats vidéos et sonores ;
    Binaires complémentaires et facultatifs flvtool2 : (...)

  • Publier sur MédiaSpip

    13 juin 2013

    Puis-je poster des contenus à partir d’une tablette Ipad ?
    Oui, si votre Médiaspip installé est à la version 0.2 ou supérieure. Contacter au besoin l’administrateur de votre MédiaSpip pour le savoir

Sur d’autres sites (6565)

  • How do I convert RTSP stream for iOS browser viewing

    27 juin 2018, par humble_coder

    TL ;DR

    I need to convert full RTSP (A/V) stream from Axis IP cameras to be viewed in a fully-contained/not-full-screen div in an iOS browser. Think : "Youtube live stream as viewed from iOS browser". I’ve seen several links that hint at the issue. . .

    . . .but they’re either "incomplete" or out of date.

    The solution must be local and remain behind site firewall (so no external services).

    MORE DETAIL

    I’m currently writing a custom "Axis IP Camera Manager" Vue/Laravel web app for a client. The initial requirements were very simple :

    1. scan network for axis devices and store addresses/info for future use

    2. display grid of MJPEG for selected camera(s).

    The initial requirements were fairly straightforward. Now, though, there are additional requirements :

    1. Record RTSP stream to [seconds] long MP4 streams.

    2. Convert an RTSP stream from AXIS IP CAMERA to something viewable in both desktop and mobile browsers with full A/V.

    I’ve successfully managed #3 by using ffmpeg to capture and store the stream to MP4. However, I’m no video aficionado, and the nature of #4 is still a bit fuzzy to me. Per my understanding I can’t watch RTSP streams in a browser in iOS, but I also can’t stream an "in-process" MP4 over HTTP. I’ve seen references to several items such as Red5, Live555, Wowza, ffserver (discontinued ?), etc. but I’m completely unfamiliar with them. In the short term, I’m looking for a quick "live" conversion solution. In the long term, I’m interested in a deeper understanding of the issue(s) at hand. Any current info/expertise/links/manuals would be appreciated.

  • How do I convert RTSP stream for iOS browser viewing

    6 mars 2017, par humble_coder

    TL ;DR

    I need to convert full RTSP (A/V) stream from Axis IP cameras to be viewed in a fully-contained/not-full-screen div in an iOS browser. Think : "Youtube live stream as viewed from iOS browser". I’ve seen several links that hint at the issue. . .

    . . .but they’re either "incomplete" or out of date.

    The solution must be local and remain behind site firewall (so no external services).

    MORE DETAIL

    I’m currently writing a custom "Axis IP Camera Manager" Vue/Laravel web app for a client. The initial requirements were very simple :

    1. scan network for axis devices and store addresses/info for future use

    2. display grid of MJPEG for selected camera(s).

    The initial requirements were fairly straightforward. Now, though, there are additional requirements :

    1. Record RTSP stream to [seconds] long MP4 streams.

    2. Convert an RTSP stream from AXIS IP CAMERA to something viewable in both desktop and mobile browsers with full A/V.

    I’ve successfully managed #3 by using ffmpeg to capture and store the stream to MP4. However, I’m no video aficionado, and the nature of #4 is still a bit fuzzy to me. Per my understanding I can’t watch RTSP streams in a browser in iOS, but I also can’t stream an "in-process" MP4 over HTTP. I’ve seen references to several items such as Red5, Live555, Wowza, ffserver (discontinued ?), etc. but I’m completely unfamiliar with them. In the short term, I’m looking for a quick "live" conversion solution. In the long term, I’m interested in a deeper understanding of the issue(s) at hand. Any current info/expertise/links/manuals would be appreciated.

  • How to verify signatures for Piwik release packages

    19 novembre 2014, par Piwik Core Team — Security

    We are proud to announce that Piwik project now cryptographically signs the Piwik releases using PGP following requests from several community members. In this post we will explain how you can verify the signatures of the Piwik release you downloaded, with instructions for Windows, Mac OS X and Linux.

    What is a signature and why should I check it ?


    How do you know that the Piwik platform you have is really the one we made ? Some software sites list sha1 hashes alongside the software on their website, so users can verify that they downloaded the file without any errors. These “checksums” help you answer the question “Did I download this file correctly from whoever sent it to me ?” They do a good job at making sure you didn’t have any random errors in your download, but they don’t help you figure out whether you were downloading it from a compromised server. The better question to answer is : “Is this file that I just downloaded the file that Piwik intended me to get ?”. Over the years several Piwik users have requested that we start signing our releases.

    Where do I get the signatures and the keys that made them ?


    Each file on our release server builds.piwik.org is accompanied by a file with the same name as the package and the extension .asc. These .asc files are GPG signatures. They allow you to verify the file you’ve downloaded is exactly the one that we intended you to get. For example, piwik-2.9.0.zip is accompanied by piwik-2.9.0.zip.asc<code>.

    Currently Matthieu Aubry is the release manager and signs the Piwik releases. His signature can be found here : builds.piwik.org/signature.asc

    How to verify signatures on Windows


    You need to have GnuPG installed before you can verify signatures. Download it from http://gpg4win.org/download.html.

    Once it’s installed, use GnuPG to import the key that signed your package. Since GnuPG for Windows is a command-line tool, you will need to use cmd.exe. Unless you edit your PATH environment variable, you will need to tell Windows the full path to the GnuPG program. If you installed GnuPG with the default values, the path should be something like this : C :\Program Files\Gnu\GnuPg\gpg.exe.

    Import Piwik Release manager Matthieu’s key (0x416F061063FEE659) by starting cmd.exe and typing :

    "C :\Program Files\Gnu\GnuPg\gpg.exe" —keyserver keys.gnupg.net —recv-keys 814E346FA01A20DBB04B6807B5DBD5925590A237

    After importing the key, you can verify that the fingerprint is correct :

    "C :\Program Files\Gnu\GnuPg\gpg.exe" —fingerprint 814E346FA01A20DBB04B6807B5DBD5925590A237

    You should see :

    pub   4096R/5590A237 2013-07-24
          Key fingerprint = 814E 346F A01A 20DB B04B  6807 B5DB D592 5590 A237
    uid                  Matthieu Aubry <matt@piwik.org>
    uid                  Matthieu Aubry <matthieu.aubry@gmail.com>
    uid                  Matthieu Aubry <matt@piwik.pro>
    sub   4096R/43F0D330 2013-07-24
    

    To verify the signature of the package you downloaded, you will need to download the ".asc" file as well. Assuming you downloaded the package and its signature to your Desktop, run :

    "C :\Program Files\Gnu\GnuPg\gpg.exe" —verify C :\Users\Alice\Desktop\piwik-2.9.0.zip.asc C :\Users\Alice\Desktop\piwik-2.9.0.zip

    The output should say "Good signature" :

    gpg : Signature made Thu 13 Nov 2014 17:42:18 NZDT using RSA key ID 5590A237
    gpg : Good signature from "Matthieu Aubry <matt@piwik.org>"
    gpg :                 aka "Matthieu Aubry <matthieu.aubry@gmail.com>"
    gpg :                 aka "Matthieu Aubry <matt@piwik.pro>"
    

    Notice that there may be a warning in case you haven’t assigned a trust index to this person. This means that GnuPG verified that the key made that signature, but it’s up to you to decide if that key really belongs to the developer. The best method is to meet the developer in person and exchange key fingerprints.

    Mac OS X and Linux


    On Linux GnuPG is usually installed by default. On Mac OS X, you need to have GnuPG installed before you can verify signatures. You can install it from http://www.gpgtools.org/.

    Once it’s installed, use GnuPG to import the key that signed your package. Matthieu Aubry signs the Piwik releases. Import his key (814E346FA01A20DBB04B6807B5DBD5925590A237) by starting the terminal (under "Applications") and typing :

    gpg —keyserver keys.gnupg.net —recv-keys 814E346FA01A20DBB04B6807B5DBD5925590A237

    After importing the key, you can verify that the fingerprint is correct :

    gpg —fingerprint 814E346FA01A20DBB04B6807B5DBD5925590A237

    You should see :

    pub   4096R/5590A237 2013-07-24
          Key fingerprint = 814E 346F A01A 20DB B04B  6807 B5DB D592 5590 A237
    uid                  Matthieu Aubry <matt@piwik.org>
    uid                  Matthieu Aubry <matthieu.aubry@gmail.com>
    uid                  Matthieu Aubry <matt@piwik.pro>
    sub   4096R/43F0D330 2013-07-24
    

    To verify the signature of the package you downloaded, you will need to download the ".asc" file as well. Assuming you downloaded the package and its signature to your Desktop, run :

    gpg —verify /Users/Alice/piwik-2.9.0.zip.asc*,

    The output should say "Good signature" :

    gpg : Signature made Thu 13 Nov 2014 17:42:18 NZDT using RSA key ID 5590A237
    gpg : Good signature from "Matthieu Aubry <matt@piwik.org>"
    gpg :                 aka "Matthieu Aubry <matthieu.aubry@gmail.com>"
    gpg :                 aka "Matthieu Aubry <matt@piwik.pro>"
    

    Notice that there may be a warning in case you haven’t assigned a trust index to this person. This means that GnuPG verified that the key made that signature, but it’s up to you to decide if that key really belongs to the developer. The best method is to meet the developer in person and exchange key fingerprints.

    That’s it ! In this article you have learnt how you can verify that the Piwik package you have downloaded on your computer was the same as the one Piwik team has officially created. We hope this helps you use Piwik with more security.

    Source : this article was copied and adapted from the great Tor Browser project website page How to verify signatures for Tor packages