scispace - formally typeset
Search or ask a question
Topic

Alpha compositing

About: Alpha compositing is a research topic. Over the lifetime, 482 publications have been published within this topic receiving 11035 citations. The topic is also known as: alpha blend & alpha channel.


Papers
More filters
Patent
15 Jul 2011
TL;DR: In this article, the problem of printing an appropriate alpha-blended image even with a printer not supporting alpha blending processing by appropriately performing alpha blending on the printer driver side is addressed.
Abstract: PROBLEM TO BE SOLVED: To print an appropriate alpha-blended image even with a printer not supporting alpha blending processing by appropriately performing alpha blending processing on the printer driver side.SOLUTION: A printing control program causes a computer to execute: a drawing reception step of receiving a page start instruction and drawing instructions from an OS; a generation step of generating a bit map in response to reception of the page start instruction; a transmission processing step of, if the drawing instructions include an alpha channel image, drawing the alpha channel image on the bit map by alpha blending to duplicate alpha-blended transparent areas when drawing an image on the bit map in accordance with the drawing instructions; and a drawing processing step of converting drawing instructions for the alpha channel image to printing commands for drawing the transparent areas when converting the drawing instructions to printing commands.
15 Feb 2016
TL;DR: A new steganography approach is proposed based on LSB technique by using Alpha channel on JPG cover images and Bit-slicing decomposition and AES ( Advanced Encryption Standard) on the secrete image.
Abstract: With the spread of digital data around the world through the internet, the security of the data has raised a concern to the people. Many methods are coming up to protect the data from going into the hands of the unauthorized person. Steganography and cryptography are two different techniques for data security . The main purpose in cryptography is to make message concept unintelligible, while steganography aims to hide secret message. Digital images are excellent carriers of hidden information. In this paper a new steganography approach proposed based on LSB technique by using Alpha channel on JPG cover images and Bit-slicing decomposition and AES ( Advanced Encryption Standard) on the secrete image. for this method first the secrete image decomposed to bit streams and the data encrypted using AES algorithm. On the cover side, an alpha channel is attached to the cover image and the data embedded into LSBs of RGBA channels. The method was implemented and tested by using MATLAB® (R2011a).
Journal ArticleDOI
TL;DR: This research paper proposes Sabiomha, an image forgery technique that make use of image steganography that can easily validate originality of a digital image by exposing any tampering.
Abstract: Digital images are a very popular way of transfer-ring media. However, their integrity remains challenging because these images can easily be manipulated with the help of software tools and such manipulations cannot be verified through a naked-eye. Although there exist some techniques to validate digital images, but in practice, it is not a trivial task as the existing approaches to forgery detection are not very effective. Therefore, there is need for a simple and efficient solution for the challenge. On the other hand, digital image steganography is the concealing of a message within an image file. The secret message can be retrieved afterwards by the author to check the image file for its veracity. This research paper proposes Sabiomha, an image forgery technique that make use of image steganography. The proposed technique is also supported by a software tool to demonstrate its usefulness. Sabiomha works by inserting an invisible watermark to certain alpha bits of the image file. The watermark we have used to steganograph an image is composed of a combination of text inputs the author can use to sign the image. Any attempts to tamper the image would distort the sequence of the bits of the image pixel. Hence, the proposed technique can easily validate originality of a digital image by exposing any tampering. The usability of our contribution is demonstrated by using the software tool we developed to automate the proposed technique. The experiment which we performed to further validate our technique suggested that Sabimoha could be flawlessly applied to image files.
Patent
15 Feb 2019
TL;DR: In this paper, a video generation method consisting of acquiring at least two frames of the first image, acquiring a corresponding second image, and acquiring an Alpha channel information of the second image was presented.
Abstract: The application discloses a video generation method and device, a video playing method and device, electronic equipment and a storage medium, and relates to the technical field of the image processing The video generation method comprises the following steps: acquiring at least two frames of first images; for each frame of first image, acquiring a corresponding second image, and acquiring an Alpha channel information of the first image, wherein the second image is the image corresponding to the RGB channel information of the first image; converting the Alpha channel information of the first image into a third image in a RGB channel format; synthesizing a fourth image based on the second image and the third image; and encoding at least two frames of fourth images as a target video by adopting a preset compression way, wherein the preset compression way supports the image compression in the RGB channel format The loss of the Alpha channel information in the first image in the video generation process is avoided, a target video generation terminal is free from installing a specific encoder, a playing terminal is unnecessary to installing a specific decoder, the CPU use is reduced, and the software lagging is avoided
Journal ArticleDOI
31 Jan 2019
TL;DR: The proposed scheme is capable of repairing the content of the given stego-image if attacked by the methods mentioned above, and can be completed by the popular image editing software Adobe Photoshop.
Abstract: Image authentication is one of the methods which can detect the any tampering data. The original grayscale document image is converted into stego image by adding the alpha channel plane. The stego image is in the Portable Network Graphics (PNG) format. This stego image is transmitted over the network. The authentication process is applied on the stego image on the receiver side. In the authentication process the data extracted from this stego image is compared with the data computed from the binary version of the stego image. If the data is matched the image is considered to be authentic. Else the tampered blocks are marked and the image is self-repaired using inverse secret sharing scheme.but in other methods they cannot resist the self substitution attack, the same-position-substitution attack, or the cut- off attack. Furthermore, those attacks can be completed by the popular image editing software Adobe Photoshop. We proposed security enhanced authentication scheme. Our proposed scheme is capable of repairing the content of the given stego-image if attacked by the methods mentioned above.

Network Information
Related Topics (5)
Rendering (computer graphics)
41.3K papers, 776.5K citations
77% related
Mobile device
58.6K papers, 942.8K citations
72% related
Mobile computing
51.3K papers, 1M citations
71% related
User interface
85.4K papers, 1.7M citations
70% related
Feature (computer vision)
128.2K papers, 1.7M citations
70% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20221
20219
20208
201913
201821
201723