ABSTRACT
The class presented here will place a watermark on an image. It takes a Bitmap object and returns another Bitmap with a string drawn diagonally (top-left to bottom-right) across it. An instance of the class is constructed with the actual text to place, font properties, maximum wanted font size (more on this in a bit), Color and transparency (byte). This may sound fairly trivial but calculating the angle of the diagonal line through a Rectangle of unknown Size at design time (big d'oh! if there's a library method that already does this!) and autosizing the font to fill as much of the bitmap as possible, without being clipped involves Trigonometry and Pythagoras.
TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION
APPROVAL
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENTS
CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF PROBLEM
1.2 PURPOSE OF STUDY
1.3 AIMS AND OBJECTIVES
1.4 SCOPE/DELIMITATIONS
1.5 LIMITATIONS/CONSTRAINTS
1.6 DEFINITION OF TERMS
CHAPTER TWO
2.0 LITERATURE REVIEW
CHAPTER THREE
3.0 METHODS FOR FACT FINDING AND DETAILED DISCUSSIONS OF THE SYSTEM
3.1 METHODOLOGIES FOR FACT-FINDING
3.2 DISCUSSIONS
CHAPTER FOUR
4.0 FUTURES, IMPLICATIONS AND CHALLENGES OF THE SYSTEM
4.1 FUTURES
4.2 IMPLICATIONS
4.3 CHALLENGES
CHAPTER FIVE
5.0 RECOMMENDATIONS, SUMMARY AND CONCLUSION
5.1 RECOMMENDATION
5.2 SUMMARY
5.3 CONCLUSION
REFERENCES
The class presented here will place a watermark on an image. It takes a Bitmap object and returns another Bitmap with a string drawn diagonally (top-left to bottom-right) across it. An instance of the class is constructed with the actual text to place, font properties, maximum wanted font size (more on this in a bit), Color and transparency (byte). This may sound fairly trivial but calculating the angle of the diagonal line through a Rectangle of unknown Size at design time (big d'oh! if there's a library method that already does this!) and autosizing the font to fill as much of the bitmap as possible, without being clipped involves Trigonometry and Pythagoras.
TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION
APPROVAL
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENTS
CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF PROBLEM
1.2 PURPOSE OF STUDY
1.3 AIMS AND OBJECTIVES
1.4 SCOPE/DELIMITATIONS
1.5 LIMITATIONS/CONSTRAINTS
1.6 DEFINITION OF TERMS
CHAPTER TWO
2.0 LITERATURE REVIEW
CHAPTER THREE
3.0 METHODS FOR FACT FINDING AND DETAILED DISCUSSIONS OF THE SYSTEM
3.1 METHODOLOGIES FOR FACT-FINDING
3.2 DISCUSSIONS
CHAPTER FOUR
4.0 FUTURES, IMPLICATIONS AND CHALLENGES OF THE SYSTEM
4.1 FUTURES
4.2 IMPLICATIONS
4.3 CHALLENGES
CHAPTER FIVE
5.0 RECOMMENDATIONS, SUMMARY AND CONCLUSION
5.1 RECOMMENDATION
5.2 SUMMARY
5.3 CONCLUSION
REFERENCES
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2014, 08). Using Trigonometry And Pythagoras To Watermark An Image.. ProjectStoc.com. Retrieved 08, 2014, from https://projectstoc.com/read/2680/using-trigonometry-and-pythagoras-to-watermark-an-image-4329
"Using Trigonometry And Pythagoras To Watermark An Image." ProjectStoc.com. 08 2014. 2014. 08 2014 <https://projectstoc.com/read/2680/using-trigonometry-and-pythagoras-to-watermark-an-image-4329>.
"Using Trigonometry And Pythagoras To Watermark An Image.." ProjectStoc.com. ProjectStoc.com, 08 2014. Web. 08 2014. <https://projectstoc.com/read/2680/using-trigonometry-and-pythagoras-to-watermark-an-image-4329>.
"Using Trigonometry And Pythagoras To Watermark An Image.." ProjectStoc.com. 08, 2014. Accessed 08, 2014. https://projectstoc.com/read/2680/using-trigonometry-and-pythagoras-to-watermark-an-image-4329.
- Related Works
- Web Base Proxy Server An Overviewed Of Issues And Prospects
- Location Aided Routing For Mobile Ad-hoc Networks (case Study Of Easy Link Cafee)
- Design And Implementation Of A Computerised Human Resources Management System (a Case Study Of Emenite Plc)
- Design And Implementation Of Xtc: A Practical Topology Control Algorithm For Ad-hoc Networks (case Study Of Mtn Nigeria)
- Design And Implementation Of A Computerized System For Immigration Service (a Case Study Of Federal Government Secretariat Enugu)
- An Analysis Of A Virtual Library System (case Study Of National Library Of Nigeria, Enugu State)
- Design And Implementation Of A Computerized Procedure For Privatization Of A Corporate Enterprise (a Case Study Of Nitel Ltd Enugu)
- Design And Implementation Of Steganography For Hiding Data In Audio Film (case Study Of Woman Of Faith)
- Design And Simulation Of A Personnal Computer Temperation Control System
- Design And Implementation Of A Computerised Traffic Offence Documentation System. (case Study Of Federal Road Safety Commissioner, Enugu)