SlideShare uma empresa Scribd logo
1 de 13
Baixar para ler offline
Customized materials specifications
for Imaxel Photo Solution
Customized materials specifications EN3502
 Imaxel Lab SL, 2005-2012 2
History
Date Doc version Description Author
01.03.2011 1.0 Created by Moises
Last update
Customized materials specifications EN3502
 Imaxel Lab SL, 2005-2012 3
TABLE OF CONTENTS
INDEX
INDEX 3
Introduction 4
Materials 5
ClipArt’s ...........................................................................................................................................5
Backgrounds ....................................................................................................................................6
Masks...............................................................................................................................................7
Folder Structure to deliver 13
Customized materials specifications EN3502
 Imaxel Lab SL, 2005-2012 4
Introduction
Purpose of this document is to define how the customer can make their own materials in order to
include them into Imaxel software (Image Desk and Image Web).
Imaxel will add these materials to Image Web software, while that the customer will add these
materials for Image Desk software in case of the customer has the IDesk Wizard software.
Purpose of this document is not to explain these processes in order to add these materials. Contact
with Imaxel if you need help in that respect.
Customized materials specifications EN3502
 Imaxel Lab SL, 2005-2012 5
Materials
Here we will define all the materials that the laboratory can customize.
Imaxel will provide standard materials for this purpose, but laboratory is able to create their
own materials.
These materials will be available for full laboratory without any restriction by dealer.
ClipArt’s
We agreed that the normal size of the ClipArt’s will be 50x50mm with a resolution of 254 DPI (500 x
500pix.). There are no restrictions but we don’t recommend using ClipArt’s smaller than this size.
These files should be saved in PNG format with transparent background.
Customized materials specifications EN3502
 Imaxel Lab SL, 2005-2012 6
Backgrounds
We agreed that the normal size of the backgrounds will be 50x50mm with a resolution of 254 DPI (500
x 500pix.). Take in consideration that these backgrounds will be replicated inside the design area in
order to fill full design area.
These files should be saved in PNG format. Not transparent background is required in these materials.
Customized materials specifications EN3502
 Imaxel Lab SL, 2005-2012 7
Masks
Mask implementation
Masks are made of two PNG file with alpha cannel (32 bits):
1. Motif file: Is the image printed itself on the photo.
2. Mask file: It’s an image used to mask an area of the photo.
It’s generally agreed that software applications recognize a masked file because the file name ends
with “_m”. A motif file and a mask file get associated because they share the same file name plus the
suffix “_m”. For instance, when the motif file is “1.png”, it’s mask file will be “1_m.png”
Both the motif file and the mask file are optional, so it’s possible that only the motif file (without mask)
or only the mask file (without motif file) may exist.
Both files must be in PNG format, with alpha cannel (32 bits) and must have the same pixel size, and
must share the same folder.
We agreed that the normal size of the masks will be 10x15 (102 x 152 mm) with a resolution of 254
DPI, which yields a size in pixels of 1520 x 1020 for a horizontal mask, and 1020 x 1520 for a vertical
one. These sizes are for guidance only. An application doesn’t impose restrictions to the size, provided
both files have the same size.
When a mask is applied to a photo, the editor locks the frame ratio, keeping the ratio of the applied
mask, so that the mask image doesn’t become distorted. This is why it’s recommended that the masks
they get a ratio close to the pictures one, such as 0,65 or 0,75.
Customized materials specifications EN3502
 Imaxel Lab SL, 2005-2012 8
Examples
Motif file Mask file
Horizontal mask
with motif and
mask file.
1.png 1_m.png
1520 x 1020 pixels 1520 x 1020 pixels
Vertical mask with
motif and mask
file.
4.png 4_m.png
1020 x 1520 pixels 1020 x 1520 pixels
Solid mask without
motif file.
Without motif image
4_m.png
1020 x 1520 pixels
Mask with
transparencies,
without motif file.
Without motif image
5_m.png
1020 x 1520 pixels
Customized materials specifications EN3502
 Imaxel Lab SL, 2005-2012 9
Steps to get the mask file
1. Starting from the motif file:
2. Adding a layer to the new image:
3. Filling new layer with opaque black:
Customized materials specifications EN3502
 Imaxel Lab SL, 2005-2012 10
4. Defining the visible area (not masked) and eliminating its content, by making the area
transparent. It’s recommended to leave a large margin to avoid problems when the client
reduces the size of the frame.
5. Eliminating the layer of the motif.
Customized materials specifications EN3502
 Imaxel Lab SL, 2005-2012 11
6. Getting the mask image.
7. Finally, image is saved, in PNG format, with the same name of the motif file plus the suffix
“_m”. For instance, for the motif file “1.png”, the mask file will be “1_m.png”.
Customized materials specifications EN3502
 Imaxel Lab SL, 2005-2012 12
How masking process works
When the output image for each pixel of a photo, to which a mask has been applied, is composed, the
reverse opacity value (binary negation) to the correspondent pixel value (same file and column) of the
mask file is applied. For example, for an X Y pixel of the mask with a opacity value 0 (transparent), the
output pixel value will be 255 (opaque), and for a pixel of the mask qith an opacity value of 255
(opaque), the output pixel will have an opacity value of 0 (transparent).
The value of the mask image color doesn’t take part in the process, only the opacity value (alpha
cannel).
Mask Photo Output
Transparent pixel
Alpha ch.: 0 (00000000)
Opaque pixel
Alpha ch.: 255 (11111111)
Opaque pixel
Alpha ch.: 255 (11111111)
Opaque pixel
Alpha ch.: 255 (11111111)
Opaque pixel
Alpha ch: 255 (11111111)
Transparent pixel
Alpha ch: 0 (00000000)
Tranlucent pixel
Alpha ch.: 60 (00111100)
Opaque pixel
Alpha ch.: 255 (11111111)
Tranlucent pixel
Alpha ch.: 195 (11000011)
Customized materials specifications EN3502
 Imaxel Lab SL, 2005-2012 13
Folder Structure to deliver
Graphic elements get organized in the application in this way:
Material
Cliparts
Cliparts1
Cliparts2
Cliparts3
Cliparts4
Backgrounds
Backgrounds1
Backgrounds2
Backgrounds3
Backgrounds4
Masks
Masks1
Masks2
Masks3
Masks4
Send us your materials keeping this folder structure, please.

Mais conteúdo relacionado

Semelhante a Customized materials for photo solutions

2. template files training en
2. template files training en2. template files training en
2. template files training enHeo Gòm
 
Digital Image Processing
Digital Image ProcessingDigital Image Processing
Digital Image ProcessingAnkur Nanda
 
Ultrasound Nerve Segmentation
Ultrasound Nerve Segmentation Ultrasound Nerve Segmentation
Ultrasound Nerve Segmentation Sneha Ravikumar
 
Image Classification using Deep Learning
Image Classification using Deep LearningImage Classification using Deep Learning
Image Classification using Deep LearningIRJET Journal
 
IMAGE CAPTION GENERATOR.pptx1.pptxxxxxxxxxx
IMAGE CAPTION GENERATOR.pptx1.pptxxxxxxxxxxIMAGE CAPTION GENERATOR.pptx1.pptxxxxxxxxxx
IMAGE CAPTION GENERATOR.pptx1.pptxxxxxxxxxxAtharvaTanawade
 
Blank Background Image Lossless Compression Technique
Blank Background Image Lossless Compression TechniqueBlank Background Image Lossless Compression Technique
Blank Background Image Lossless Compression TechniqueCSCJournals
 
Crypt-Steganography
Crypt-SteganographyCrypt-Steganography
Crypt-SteganographySagar Kumar
 
Lossless Huffman coding image compression implementation in spatial domain by...
Lossless Huffman coding image compression implementation in spatial domain by...Lossless Huffman coding image compression implementation in spatial domain by...
Lossless Huffman coding image compression implementation in spatial domain by...IRJET Journal
 
Seminar Report on image compression
Seminar Report on image compressionSeminar Report on image compression
Seminar Report on image compressionPradip Kumar
 
Question 6
Question 6Question 6
Question 6Sam Burt
 
IRJET- Homomorphic Image Encryption
IRJET-  	  Homomorphic Image EncryptionIRJET-  	  Homomorphic Image Encryption
IRJET- Homomorphic Image EncryptionIRJET Journal
 
Classify the advanced encryption standard-butterfly effect in protecting imag...
Classify the advanced encryption standard-butterfly effect in protecting imag...Classify the advanced encryption standard-butterfly effect in protecting imag...
Classify the advanced encryption standard-butterfly effect in protecting imag...KannanN45
 
A Study of Image Compression Methods
A Study of Image Compression MethodsA Study of Image Compression Methods
A Study of Image Compression MethodsIOSR Journals
 
DCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceDCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceIJERA Editor
 
Design and Implementation of EZW & SPIHT Image Coder for Virtual Images
Design and Implementation of EZW & SPIHT Image Coder for Virtual ImagesDesign and Implementation of EZW & SPIHT Image Coder for Virtual Images
Design and Implementation of EZW & SPIHT Image Coder for Virtual ImagesCSCJournals
 
An LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic TechniquesAn LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic TechniquesIJERA Editor
 
1 of 6 LAB 5 IMAGE FILTERING ECE180 Introduction to.docx
1 of 6  LAB 5 IMAGE FILTERING ECE180 Introduction to.docx1 of 6  LAB 5 IMAGE FILTERING ECE180 Introduction to.docx
1 of 6 LAB 5 IMAGE FILTERING ECE180 Introduction to.docxmercysuttle
 

Semelhante a Customized materials for photo solutions (20)

2. template files training en
2. template files training en2. template files training en
2. template files training en
 
Digital Image Processing
Digital Image ProcessingDigital Image Processing
Digital Image Processing
 
Ultrasound Nerve Segmentation
Ultrasound Nerve Segmentation Ultrasound Nerve Segmentation
Ultrasound Nerve Segmentation
 
Image Classification using Deep Learning
Image Classification using Deep LearningImage Classification using Deep Learning
Image Classification using Deep Learning
 
IMAGE CAPTION GENERATOR.pptx1.pptxxxxxxxxxx
IMAGE CAPTION GENERATOR.pptx1.pptxxxxxxxxxxIMAGE CAPTION GENERATOR.pptx1.pptxxxxxxxxxx
IMAGE CAPTION GENERATOR.pptx1.pptxxxxxxxxxx
 
Blank Background Image Lossless Compression Technique
Blank Background Image Lossless Compression TechniqueBlank Background Image Lossless Compression Technique
Blank Background Image Lossless Compression Technique
 
Crypt-Steganography
Crypt-SteganographyCrypt-Steganography
Crypt-Steganography
 
Lossless Huffman coding image compression implementation in spatial domain by...
Lossless Huffman coding image compression implementation in spatial domain by...Lossless Huffman coding image compression implementation in spatial domain by...
Lossless Huffman coding image compression implementation in spatial domain by...
 
Seminar Report on image compression
Seminar Report on image compressionSeminar Report on image compression
Seminar Report on image compression
 
Log polar coordinates
Log polar coordinatesLog polar coordinates
Log polar coordinates
 
Question 6
Question 6Question 6
Question 6
 
IRJET- Homomorphic Image Encryption
IRJET-  	  Homomorphic Image EncryptionIRJET-  	  Homomorphic Image Encryption
IRJET- Homomorphic Image Encryption
 
Classify the advanced encryption standard-butterfly effect in protecting imag...
Classify the advanced encryption standard-butterfly effect in protecting imag...Classify the advanced encryption standard-butterfly effect in protecting imag...
Classify the advanced encryption standard-butterfly effect in protecting imag...
 
A Study of Image Compression Methods
A Study of Image Compression MethodsA Study of Image Compression Methods
A Study of Image Compression Methods
 
DCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceDCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video Sequence
 
C010511420
C010511420C010511420
C010511420
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
Design and Implementation of EZW & SPIHT Image Coder for Virtual Images
Design and Implementation of EZW & SPIHT Image Coder for Virtual ImagesDesign and Implementation of EZW & SPIHT Image Coder for Virtual Images
Design and Implementation of EZW & SPIHT Image Coder for Virtual Images
 
An LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic TechniquesAn LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic Techniques
 
1 of 6 LAB 5 IMAGE FILTERING ECE180 Introduction to.docx
1 of 6  LAB 5 IMAGE FILTERING ECE180 Introduction to.docx1 of 6  LAB 5 IMAGE FILTERING ECE180 Introduction to.docx
1 of 6 LAB 5 IMAGE FILTERING ECE180 Introduction to.docx
 

Mais de Heo Gòm

Windows 8 1_power user guide
Windows 8 1_power user guideWindows 8 1_power user guide
Windows 8 1_power user guideHeo Gòm
 
Windows to go a guide for education
Windows to go   a guide for educationWindows to go   a guide for education
Windows to go a guide for educationHeo Gòm
 
Windows store apps a deployment guide for education
Windows store apps   a deployment guide for educationWindows store apps   a deployment guide for education
Windows store apps a deployment guide for educationHeo Gòm
 
Windows 8 1
Windows 8 1Windows 8 1
Windows 8 1Heo Gòm
 
Windows 8.1 deployment to p cs a guide for education
Windows 8.1 deployment to p cs   a guide for educationWindows 8.1 deployment to p cs   a guide for education
Windows 8.1 deployment to p cs a guide for educationHeo Gòm
 
Windows 8.1 deployment planning a guide for education
Windows 8.1 deployment planning   a guide for educationWindows 8.1 deployment planning   a guide for education
Windows 8.1 deployment planning a guide for educationHeo Gòm
 
Windows 8 product guide business english
Windows 8 product guide business englishWindows 8 product guide business english
Windows 8 product guide business englishHeo Gòm
 
Win8 accessibility tutorials
Win8 accessibility tutorialsWin8 accessibility tutorials
Win8 accessibility tutorialsHeo Gòm
 
W8 brochure download
W8 brochure downloadW8 brochure download
W8 brochure downloadHeo Gòm
 
Sharepoint adoption guide
Sharepoint adoption guideSharepoint adoption guide
Sharepoint adoption guideHeo Gòm
 
Office365 midsizebusinessquickdeploymentguide
Office365 midsizebusinessquickdeploymentguideOffice365 midsizebusinessquickdeploymentguide
Office365 midsizebusinessquickdeploymentguideHeo Gòm
 
Moodle plugininstallguide v1
Moodle plugininstallguide v1Moodle plugininstallguide v1
Moodle plugininstallguide v1Heo Gòm
 
Moodle andoffice365withadfs
Moodle andoffice365withadfsMoodle andoffice365withadfs
Moodle andoffice365withadfsHeo Gòm
 
How to recover office doc
How to recover office docHow to recover office doc
How to recover office docHeo Gòm
 
Getting to know_office_365
Getting to know_office_365Getting to know_office_365
Getting to know_office_365Heo Gòm
 
Explore share point-2013
Explore share point-2013Explore share point-2013
Explore share point-2013Heo Gòm
 
Discover share point
Discover share pointDiscover share point
Discover share pointHeo Gòm
 
Deployment guide-for-share point-2013
Deployment guide-for-share point-2013Deployment guide-for-share point-2013
Deployment guide-for-share point-2013Heo Gòm
 
Deployment guide-for-office-2013
Deployment guide-for-office-2013Deployment guide-for-office-2013
Deployment guide-for-office-2013Heo Gòm
 
3671 explore windows-8.1_update_wsg_external
3671 explore windows-8.1_update_wsg_external3671 explore windows-8.1_update_wsg_external
3671 explore windows-8.1_update_wsg_externalHeo Gòm
 

Mais de Heo Gòm (20)

Windows 8 1_power user guide
Windows 8 1_power user guideWindows 8 1_power user guide
Windows 8 1_power user guide
 
Windows to go a guide for education
Windows to go   a guide for educationWindows to go   a guide for education
Windows to go a guide for education
 
Windows store apps a deployment guide for education
Windows store apps   a deployment guide for educationWindows store apps   a deployment guide for education
Windows store apps a deployment guide for education
 
Windows 8 1
Windows 8 1Windows 8 1
Windows 8 1
 
Windows 8.1 deployment to p cs a guide for education
Windows 8.1 deployment to p cs   a guide for educationWindows 8.1 deployment to p cs   a guide for education
Windows 8.1 deployment to p cs a guide for education
 
Windows 8.1 deployment planning a guide for education
Windows 8.1 deployment planning   a guide for educationWindows 8.1 deployment planning   a guide for education
Windows 8.1 deployment planning a guide for education
 
Windows 8 product guide business english
Windows 8 product guide business englishWindows 8 product guide business english
Windows 8 product guide business english
 
Win8 accessibility tutorials
Win8 accessibility tutorialsWin8 accessibility tutorials
Win8 accessibility tutorials
 
W8 brochure download
W8 brochure downloadW8 brochure download
W8 brochure download
 
Sharepoint adoption guide
Sharepoint adoption guideSharepoint adoption guide
Sharepoint adoption guide
 
Office365 midsizebusinessquickdeploymentguide
Office365 midsizebusinessquickdeploymentguideOffice365 midsizebusinessquickdeploymentguide
Office365 midsizebusinessquickdeploymentguide
 
Moodle plugininstallguide v1
Moodle plugininstallguide v1Moodle plugininstallguide v1
Moodle plugininstallguide v1
 
Moodle andoffice365withadfs
Moodle andoffice365withadfsMoodle andoffice365withadfs
Moodle andoffice365withadfs
 
How to recover office doc
How to recover office docHow to recover office doc
How to recover office doc
 
Getting to know_office_365
Getting to know_office_365Getting to know_office_365
Getting to know_office_365
 
Explore share point-2013
Explore share point-2013Explore share point-2013
Explore share point-2013
 
Discover share point
Discover share pointDiscover share point
Discover share point
 
Deployment guide-for-share point-2013
Deployment guide-for-share point-2013Deployment guide-for-share point-2013
Deployment guide-for-share point-2013
 
Deployment guide-for-office-2013
Deployment guide-for-office-2013Deployment guide-for-office-2013
Deployment guide-for-office-2013
 
3671 explore windows-8.1_update_wsg_external
3671 explore windows-8.1_update_wsg_external3671 explore windows-8.1_update_wsg_external
3671 explore windows-8.1_update_wsg_external
 

Último

5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 

Último (20)

Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 

Customized materials for photo solutions

  • 2. Customized materials specifications EN3502  Imaxel Lab SL, 2005-2012 2 History Date Doc version Description Author 01.03.2011 1.0 Created by Moises Last update
  • 3. Customized materials specifications EN3502  Imaxel Lab SL, 2005-2012 3 TABLE OF CONTENTS INDEX INDEX 3 Introduction 4 Materials 5 ClipArt’s ...........................................................................................................................................5 Backgrounds ....................................................................................................................................6 Masks...............................................................................................................................................7 Folder Structure to deliver 13
  • 4. Customized materials specifications EN3502  Imaxel Lab SL, 2005-2012 4 Introduction Purpose of this document is to define how the customer can make their own materials in order to include them into Imaxel software (Image Desk and Image Web). Imaxel will add these materials to Image Web software, while that the customer will add these materials for Image Desk software in case of the customer has the IDesk Wizard software. Purpose of this document is not to explain these processes in order to add these materials. Contact with Imaxel if you need help in that respect.
  • 5. Customized materials specifications EN3502  Imaxel Lab SL, 2005-2012 5 Materials Here we will define all the materials that the laboratory can customize. Imaxel will provide standard materials for this purpose, but laboratory is able to create their own materials. These materials will be available for full laboratory without any restriction by dealer. ClipArt’s We agreed that the normal size of the ClipArt’s will be 50x50mm with a resolution of 254 DPI (500 x 500pix.). There are no restrictions but we don’t recommend using ClipArt’s smaller than this size. These files should be saved in PNG format with transparent background.
  • 6. Customized materials specifications EN3502  Imaxel Lab SL, 2005-2012 6 Backgrounds We agreed that the normal size of the backgrounds will be 50x50mm with a resolution of 254 DPI (500 x 500pix.). Take in consideration that these backgrounds will be replicated inside the design area in order to fill full design area. These files should be saved in PNG format. Not transparent background is required in these materials.
  • 7. Customized materials specifications EN3502  Imaxel Lab SL, 2005-2012 7 Masks Mask implementation Masks are made of two PNG file with alpha cannel (32 bits): 1. Motif file: Is the image printed itself on the photo. 2. Mask file: It’s an image used to mask an area of the photo. It’s generally agreed that software applications recognize a masked file because the file name ends with “_m”. A motif file and a mask file get associated because they share the same file name plus the suffix “_m”. For instance, when the motif file is “1.png”, it’s mask file will be “1_m.png” Both the motif file and the mask file are optional, so it’s possible that only the motif file (without mask) or only the mask file (without motif file) may exist. Both files must be in PNG format, with alpha cannel (32 bits) and must have the same pixel size, and must share the same folder. We agreed that the normal size of the masks will be 10x15 (102 x 152 mm) with a resolution of 254 DPI, which yields a size in pixels of 1520 x 1020 for a horizontal mask, and 1020 x 1520 for a vertical one. These sizes are for guidance only. An application doesn’t impose restrictions to the size, provided both files have the same size. When a mask is applied to a photo, the editor locks the frame ratio, keeping the ratio of the applied mask, so that the mask image doesn’t become distorted. This is why it’s recommended that the masks they get a ratio close to the pictures one, such as 0,65 or 0,75.
  • 8. Customized materials specifications EN3502  Imaxel Lab SL, 2005-2012 8 Examples Motif file Mask file Horizontal mask with motif and mask file. 1.png 1_m.png 1520 x 1020 pixels 1520 x 1020 pixels Vertical mask with motif and mask file. 4.png 4_m.png 1020 x 1520 pixels 1020 x 1520 pixels Solid mask without motif file. Without motif image 4_m.png 1020 x 1520 pixels Mask with transparencies, without motif file. Without motif image 5_m.png 1020 x 1520 pixels
  • 9. Customized materials specifications EN3502  Imaxel Lab SL, 2005-2012 9 Steps to get the mask file 1. Starting from the motif file: 2. Adding a layer to the new image: 3. Filling new layer with opaque black:
  • 10. Customized materials specifications EN3502  Imaxel Lab SL, 2005-2012 10 4. Defining the visible area (not masked) and eliminating its content, by making the area transparent. It’s recommended to leave a large margin to avoid problems when the client reduces the size of the frame. 5. Eliminating the layer of the motif.
  • 11. Customized materials specifications EN3502  Imaxel Lab SL, 2005-2012 11 6. Getting the mask image. 7. Finally, image is saved, in PNG format, with the same name of the motif file plus the suffix “_m”. For instance, for the motif file “1.png”, the mask file will be “1_m.png”.
  • 12. Customized materials specifications EN3502  Imaxel Lab SL, 2005-2012 12 How masking process works When the output image for each pixel of a photo, to which a mask has been applied, is composed, the reverse opacity value (binary negation) to the correspondent pixel value (same file and column) of the mask file is applied. For example, for an X Y pixel of the mask with a opacity value 0 (transparent), the output pixel value will be 255 (opaque), and for a pixel of the mask qith an opacity value of 255 (opaque), the output pixel will have an opacity value of 0 (transparent). The value of the mask image color doesn’t take part in the process, only the opacity value (alpha cannel). Mask Photo Output Transparent pixel Alpha ch.: 0 (00000000) Opaque pixel Alpha ch.: 255 (11111111) Opaque pixel Alpha ch.: 255 (11111111) Opaque pixel Alpha ch.: 255 (11111111) Opaque pixel Alpha ch: 255 (11111111) Transparent pixel Alpha ch: 0 (00000000) Tranlucent pixel Alpha ch.: 60 (00111100) Opaque pixel Alpha ch.: 255 (11111111) Tranlucent pixel Alpha ch.: 195 (11000011)
  • 13. Customized materials specifications EN3502  Imaxel Lab SL, 2005-2012 13 Folder Structure to deliver Graphic elements get organized in the application in this way: Material Cliparts Cliparts1 Cliparts2 Cliparts3 Cliparts4 Backgrounds Backgrounds1 Backgrounds2 Backgrounds3 Backgrounds4 Masks Masks1 Masks2 Masks3 Masks4 Send us your materials keeping this folder structure, please.