Image manipulation with Fotoxx
Fotoxx includes the ability to straighten up sloping lines that occur, for example, when the edges of the subject you are taking a picture of are not parallel to the camera's geometry, such as a tall building. To fix undesirable effects like this, click unbend and then experiment with the values for vertical unbend and horizontal unbend. Fotoxx does not offer a real-time preview. Instead, you must Apply the settings to the image first, and you can then make changes before pressing Finish to permanently apply the changes to the image.
If I had just used the program's special features, it would have faired well – the HDR and panorama features work perfectly, but users would probably appreciate more transparency in the approach. Unfortunately, Fotoxx's basic functions are spartan and the unusual controls are just plain pesky. On top of this, the program could be far faster. If you want to retouch images, stick with GIMP, but if you want to experiment with HDR and panoramic images, check out Fotoxx.
- Fotoxx: http://www.kornelix.com/fotoxx
- Wikipedia on DRI: http://en.wikipedia.org/wiki/High_dynamic_range_imaging
- Wikipedia on tone mapping: http://en.wikipedia.org/wiki/Tone_Mapping
- GIMP exposure-blend plugin: http://turtle.as.arizona.edu/jdsmith/exposure_blend.php
- Photo stitching projects: http://www.linux-magazine.com/issues/2008/93/projects_on_the_move
Buy this article as PDF
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm