ABSTRACT
The class presented here will place a watermark on an image. It takes a Bitmap object and returns another Bitmap with a string drawn diagonally (top-left to bottom-right) across it. An instance of the class is constructed with the actual text to place, font properties, maximum wanted font size (more on this in a bit), Color and transparency (byte). This may sound fairly trivial but calculating the angle of the diagonal line through a Rectangle of unknown Size at design time (big d'oh! if there's a library method that already does this!) and autosizing the font to fill as much of the bitmap as possible, without being clipped involves Trigonometry and Pythagoras.
TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION
APPROVAL
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENTS
CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF PROBLEM
1.2 PURPOSE OF STUDY
1.3 AIMS AND OBJECTIVES
1.4 SCOPE/DELIMITATIONS
1.5 LIMITATIONS/CONSTRAINTS
1.6 DEFINITION OF TERMS
CHAPTER TWO
2.0 LITERATURE REVIEW
CHAPTER THREE
3.0 METHODS FOR FACT FINDING AND DETAILED DISCUSSIONS OF THE SYSTEM
3.1 METHODOLOGIES FOR FACT-FINDING
3.2 DISCUSSIONS
CHAPTER FOUR
4.0 FUTURES, IMPLICATIONS AND CHALLENGES OF THE SYSTEM
4.1 FUTURES
4.2 IMPLICATIONS
4.3 CHALLENGES
CHAPTER FIVE
5.0 RECOMMENDATIONS, SUMMARY AND CONCLUSION
5.1 RECOMMENDATION
5.2 SUMMARY
5.3 CONCLUSION
REFERENCES
The class presented here will place a watermark on an image. It takes a Bitmap object and returns another Bitmap with a string drawn diagonally (top-left to bottom-right) across it. An instance of the class is constructed with the actual text to place, font properties, maximum wanted font size (more on this in a bit), Color and transparency (byte). This may sound fairly trivial but calculating the angle of the diagonal line through a Rectangle of unknown Size at design time (big d'oh! if there's a library method that already does this!) and autosizing the font to fill as much of the bitmap as possible, without being clipped involves Trigonometry and Pythagoras.
TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION
APPROVAL
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENTS
CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF PROBLEM
1.2 PURPOSE OF STUDY
1.3 AIMS AND OBJECTIVES
1.4 SCOPE/DELIMITATIONS
1.5 LIMITATIONS/CONSTRAINTS
1.6 DEFINITION OF TERMS
CHAPTER TWO
2.0 LITERATURE REVIEW
CHAPTER THREE
3.0 METHODS FOR FACT FINDING AND DETAILED DISCUSSIONS OF THE SYSTEM
3.1 METHODOLOGIES FOR FACT-FINDING
3.2 DISCUSSIONS
CHAPTER FOUR
4.0 FUTURES, IMPLICATIONS AND CHALLENGES OF THE SYSTEM
4.1 FUTURES
4.2 IMPLICATIONS
4.3 CHALLENGES
CHAPTER FIVE
5.0 RECOMMENDATIONS, SUMMARY AND CONCLUSION
5.1 RECOMMENDATION
5.2 SUMMARY
5.3 CONCLUSION
REFERENCES
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2014, 08). Using Trigonometry And Pythagoras To Watermark An Image.. ProjectStoc.com. Retrieved 08, 2014, from https://projectstoc.com/read/2680/using-trigonometry-and-pythagoras-to-watermark-an-image-4329
"Using Trigonometry And Pythagoras To Watermark An Image." ProjectStoc.com. 08 2014. 2014. 08 2014 <https://projectstoc.com/read/2680/using-trigonometry-and-pythagoras-to-watermark-an-image-4329>.
"Using Trigonometry And Pythagoras To Watermark An Image.." ProjectStoc.com. ProjectStoc.com, 08 2014. Web. 08 2014. <https://projectstoc.com/read/2680/using-trigonometry-and-pythagoras-to-watermark-an-image-4329>.
"Using Trigonometry And Pythagoras To Watermark An Image.." ProjectStoc.com. 08, 2014. Accessed 08, 2014. https://projectstoc.com/read/2680/using-trigonometry-and-pythagoras-to-watermark-an-image-4329.
- Related Works
- Advantages And Disadvantages Of Off The Shelf Software And Customized Software
- Design And Implementation Of A Computerized Personnel Database For A Tertiary Institution (a Case Study Of Imt, Enugu)
- Protocol Scrubbing Network Security Through Transparent Flow Modification (case Study Of Pressure World Cafe)
- Design And Implementation Of A Web-based Legal Practitioner Application System
- Efficient Network Routing Protocol With Effective Data Transfer Without Packet Loss Over The Ad Hoc Network (a Case Study Of Uba Enugu)
- Smart Knowledge Provider
- Neural Network Based Character Pattern Identification System
- Design And Implementation Of A Computerized Hotel Business Billing System. (a Case Study Of Modotel Hotel Limited Enugu)
- Dynamic Signature Verification Using Pattern Recognition
- Design And Implementation Of An On-line Vehicle Registration (a Case Study Of Motor Licensing Office, Enugu South)