Solved

Making stereograms

Posted on 1998-09-12
4
184 Views
Last Modified: 2010-04-16
Can someone send me a code in Turbo PASCAL 6.0 for making stereograms?
0
Comment
Question by:mmilan
  • 3
4 Comments
 
LVL 1

Expert Comment

by:ow
ID: 1215532
There is an article about stereograms in the german magazine c't (1994:7:230-238).
A complete package for Windows with source in Pascal you may find in "sirdskmp.zip" on "http://www.heise.de/ct/ftp/listings.shtml".
0
 
LVL 5

Accepted Solution

by:
scrapdog earned 50 total points
ID: 1215534
http://www.ucl.ac.uk/~ucapwas/stech.html

contains a detailed description of how stereograms are made.  The source code is in C, but it is not very long, and the algorithms are explained well, so you could easily convert this to pascal.
0
 
LVL 5

Expert Comment

by:scrapdog
ID: 1215535
P.S.  If there is anything in the C code that you can't convert to pascal, post the particular line/statement here and I will convert it.
0
 
LVL 5

Expert Comment

by:scrapdog
ID: 1215536
These two sites contain different versions of source code for creating stereograms in *pascal*:

http://www.sci.muni.cz/~smid/download.html
http://www.inf.upol.cz/~lount/stereogramy/


This site might also be of use to you:

http://www.etba.gr/etba/op/jim/sirds/general.html
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Rave Reports - Adding a Data Band 1 1,018
audio record to file 4 1,114
Get pixel color of a jpg in a TImage 1 2,699
Lazarus (freePascal) DB Project Assistance 14 481
This article describes my battle tested process for setting up delegation. I use this process anywhere that I need to setup delegation. In the article I will show how it applies to Active Directory
Giving access to ESXi shell console is always an issue for IT departments to other Teams, or Projects. We need to find a way so that teams can use ESXTOP for their POCs, or tests without giving them the access to ESXi host shell console with a root …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

839 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question