scispace - formally typeset
Search or ask a question
Topic

Alpha compositing

About: Alpha compositing is a research topic. Over the lifetime, 482 publications have been published within this topic receiving 11035 citations. The topic is also known as: alpha blend & alpha channel.


Papers
More filters
Proceedings ArticleDOI
01 Mar 2019
TL;DR: The image counterpane algorithm, texture synthesis and texture transfer are presented and it is shown that this image processing is widely gaining attention in various fields like computer vision, deterministic process based on the geological models, stochastic simulation of meandering rivers.
Abstract: Image is the collection and representation of pixels. The details of the image involves with the overlapping of adjacent pixels. Image Stitching is a process of combining many individual images to get a detailed information. Eventually, a good resolution image with details emerges. Analysing the maps of the complete world can be the best example of image stitching process. In digitally sewing the pictures or data, there may occur stitching errors. This flaw can overcome with software emerging now along with the reference data available. Image stitching can also be called Image Counterpane. This image processing is widely gaining attention in various fields like computer vision, deterministic process based on the geological models, stochastic simulation of meandering rivers. In this paper, image counterpane algorithm, texture synthesis and texture transfer are presented.
Journal ArticleDOI
TL;DR: A fragile watermarking algorithm for the protection of the integrity of color images with alpha channel that is able to identify modified areas with very high probability, even with small color or transparency changes.
Abstract: This paper presents a fragile watermarking algorithm`m for the protection of the integrity of color images with alpha channel. The system is able to identify modified areas with very high probability, even with small color or transparency changes. The main characteristic of the algorithm is the embedding of the watermark by modifying the alpha channel, leaving the color channels untouched and introducing a very small error with respect to the host image. As a consequence, the resulting watermarked images have a very high peak signal-to-noise ratio. The security of the algorithm is based on a secret key defining the embedding space in which the watermark is inserted by means of the Karhunen–Loeve transform (KLT) and a genetic algorithm (GA). Its high sensitivity to modifications is shown, proving the security of the whole system.
Patent
01 Jul 2012
TL;DR: An alpha compositing method adapted to a plurality of compositing layers and a background layer including the following steps is provided in this article, where the RGB channel of the background is preceded to a background compositing calculation with the merging alpha channel data and the merging RGB channel data.
Abstract: An alpha compositing method adapted to a plurality of compositing layers and a background layer including the following steps is provided. Firstly, alpha channel data and RGB channel data of the compositing layer and RGB channel data of the background layer are obtained. Next, a merging alpha channel data is calculated according to the alpha channel data of the composting layers. Then, a merging RGB channel data is calculated according to the merging alpha channel data and the RGB channel data of the compositing layers. Afterwards, the RGB channel of the background is preceded to a background compositing calculation with the merging alpha channel data and the merging RGB channel data to generate an output RGB channel data of the background layer.
Journal ArticleDOI
TL;DR: A blind authentication method which is based on the secret sharing technique with a data repair capability for document images with the use of the PNG image and a measure to protect the security of the data hidden in the alpha channel is proposed.
Abstract: 1,2 RCET, Bhilai Abstract: In this paper, we are introducing a blind authentication method which is based on the secret sharing technique with a data repair capability for document images with the use of the PNG image. We generate an authentication signal for each block of a document image which, together with the block content in binary form, is transformed into several shares using the Shamir secret sharing scheme. These parameters are carefully chosen so that a large number of shares possible are generated and embedded into an alpha channel plane. Now the alpha channel plane is combined with the original image to form a PNG image. In the process of image authentication, an image block is marked as tampered if the authentication signal computed from the current block content does not match the one extracted from the shares embedded in the alpha channel plane. Repairing of data is now done to each tampered block by a reverse Shamir technique after collecting any two or more shares from unmarked blocks. Also a measure to protect the security of the data hidden in the alpha channel is proposed.
Proceedings ArticleDOI
Yu Chu1, Chunxia Xiao1, Yong Tian1, Xunhua Yang1, Guangpu Feng1 
18 Sep 2009
TL;DR: This work presents a fast gradient domain video compositing using hierarchical data structure which subdivides the compositing region into an octree data structure, which significantly reduces the variables.
Abstract: We present a fast gradient domain video compositing using hierarchical data structure which subdivides the compositing region into an octree data. To handle large video compositing by solving a 3D Poisson equation, the derived linear system is usually large. To solve the system requires large memory space and long computational time, which makes it intractable on a standard computer. To address the scalability problem, rather than compositing the video in the gradient-domain pixel by pixel, we perform the video compositing in a reduced space using octree data structure, which significantly reduces the variables. We show that the proposed octree approach is efficient in both seamless and mixing gradient-domain video compositing. Our method enables to perform video compositing in greatly reduced computational time and memory space, while receiving visually identical results with that computed from the full solution.

Network Information
Related Topics (5)
Rendering (computer graphics)
41.3K papers, 776.5K citations
77% related
Mobile device
58.6K papers, 942.8K citations
72% related
Mobile computing
51.3K papers, 1M citations
71% related
User interface
85.4K papers, 1.7M citations
70% related
Feature (computer vision)
128.2K papers, 1.7M citations
70% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20221
20219
20208
201913
201821
201723