ABSTRACT
The class presented here will place a watermark on an image. It takes a Bitmap object and returns another Bitmap with a string drawn diagonally (top-left to bottom-right) across it. An instance of the class is constructed with the actual text to place, font properties, maximum wanted font size (more on this in a bit), Color and transparency (byte). This may sound fairly trivial but calculating the angle of the diagonal line through a Rectangle of unknown Size at design time (big d'oh! if there's a library method that already does this!) and autosizing the font to fill as much of the bitmap as possible, without being clipped involves Trigonometry and Pythagoras.
TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION
APPROVAL
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENTS
CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF PROBLEM
1.2 PURPOSE OF STUDY
1.3 AIMS AND OBJECTIVES
1.4 SCOPE/DELIMITATIONS
1.5 LIMITATIONS/CONSTRAINTS
1.6 DEFINITION OF TERMS
CHAPTER TWO
2.0 LITERATURE REVIEW
CHAPTER THREE
3.0 METHODS FOR FACT FINDING AND DETAILED DISCUSSIONS OF THE SYSTEM
3.1 METHODOLOGIES FOR FACT-FINDING
3.2 DISCUSSIONS
CHAPTER FOUR
4.0 FUTURES, IMPLICATIONS AND CHALLENGES OF THE SYSTEM
4.1 FUTURES
4.2 IMPLICATIONS
4.3 CHALLENGES
CHAPTER FIVE
5.0 RECOMMENDATIONS, SUMMARY AND CONCLUSION
5.1 RECOMMENDATION
5.2 SUMMARY
5.3 CONCLUSION
REFERENCES
The class presented here will place a watermark on an image. It takes a Bitmap object and returns another Bitmap with a string drawn diagonally (top-left to bottom-right) across it. An instance of the class is constructed with the actual text to place, font properties, maximum wanted font size (more on this in a bit), Color and transparency (byte). This may sound fairly trivial but calculating the angle of the diagonal line through a Rectangle of unknown Size at design time (big d'oh! if there's a library method that already does this!) and autosizing the font to fill as much of the bitmap as possible, without being clipped involves Trigonometry and Pythagoras.
TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION
APPROVAL
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENTS
CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF PROBLEM
1.2 PURPOSE OF STUDY
1.3 AIMS AND OBJECTIVES
1.4 SCOPE/DELIMITATIONS
1.5 LIMITATIONS/CONSTRAINTS
1.6 DEFINITION OF TERMS
CHAPTER TWO
2.0 LITERATURE REVIEW
CHAPTER THREE
3.0 METHODS FOR FACT FINDING AND DETAILED DISCUSSIONS OF THE SYSTEM
3.1 METHODOLOGIES FOR FACT-FINDING
3.2 DISCUSSIONS
CHAPTER FOUR
4.0 FUTURES, IMPLICATIONS AND CHALLENGES OF THE SYSTEM
4.1 FUTURES
4.2 IMPLICATIONS
4.3 CHALLENGES
CHAPTER FIVE
5.0 RECOMMENDATIONS, SUMMARY AND CONCLUSION
5.1 RECOMMENDATION
5.2 SUMMARY
5.3 CONCLUSION
REFERENCES
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2014, 08). Using Trigonometry And Pythagoras To Watermark An Image.. ProjectStoc.com. Retrieved 08, 2014, from https://projectstoc.com/read/2680/using-trigonometry-and-pythagoras-to-watermark-an-image-4329
"Using Trigonometry And Pythagoras To Watermark An Image." ProjectStoc.com. 08 2014. 2014. 08 2014 <https://projectstoc.com/read/2680/using-trigonometry-and-pythagoras-to-watermark-an-image-4329>.
"Using Trigonometry And Pythagoras To Watermark An Image.." ProjectStoc.com. ProjectStoc.com, 08 2014. Web. 08 2014. <https://projectstoc.com/read/2680/using-trigonometry-and-pythagoras-to-watermark-an-image-4329>.
"Using Trigonometry And Pythagoras To Watermark An Image.." ProjectStoc.com. 08, 2014. Accessed 08, 2014. https://projectstoc.com/read/2680/using-trigonometry-and-pythagoras-to-watermark-an-image-4329.
- Related Works
- Ip Spoofing: A Network Threat
- Design And Implementation Of A Web-based Legal Practitioner Application System
- Design And Implementation Of Query Routing Optimization In Sensor Communication Network
- Intrusion Detection Prevention And Trace Back System
- Design And Implementation Of An Online Voting System
- Design And Implementation Of A Computerised Quality Control System For A Manufacturing Organisation (a Case Study Of S.e.d.i Enugu)
- Intrusion Detection And Prevention System
- Design And Implementation Of An On-line Entrance Examination System. (a Case Study Of Enugu State Poset –primary Education Board )
- Design And Implementation Of Computerized Verification System For Tertiary Institutions (a Case Study Of Imt Enugu)
- Design And Implementation Of A Computerized Budgeting System (a Case Study Of I.m.t., Enugu)
