Solved

Greyscale or not

Posted on 2001-08-29
6
145 Views
Last Modified: 2010-04-06
hi .. everyone ...
i have a problem here about the algorithm
for classifiying an image into grayscale
image and not. And if there is Delphi
source code please tell me ok ...

Regards,
Billy
0
Comment
Question by:Bilce
  • 2
  • 2
  • 2
6 Comments
 
LVL 11

Expert Comment

by:robert_marquardt
ID: 6439498
Now what IS the problem?
A picture is grayscale if for all pixels the R, G and B values are the same.
Making a colored picture grayscale is calculating the brightness of the pixel. A formula which i do not know.
0
 
LVL 11

Expert Comment

by:robert_marquardt
ID: 6439502
That is for each pixel R, G and B value of this pixel has to be the same.
0
 
LVL 5

Expert Comment

by:scrapdog
ID: 6439731
to convert from color to greyscale:

brightness = (R + G + B) / 3

set R, G, and B to the value in brightness

0
How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

 
LVL 6

Accepted Solution

by:
edey earned 50 total points
ID: 6441695
Actually you'd prob. want to at least weight your rgb values, something like this:

brightness := round(sqrt((r*r+g*g+b*b)/3));

Better yet you'd convert to HSV, extract the V & convert back to RGB.  This results in much better contrast & picture quality.  I believe this is because we aren't equaly sensitive to all three primary colours. Here's a pretty good approximation I found at Earl Glynn's site: http://www.efg2.com (great site BTW):

brightness :=((r Shl 5)+(g Shl 6)+(b*12)) Div 108;


GL
Mike
0
 
LVL 5

Expert Comment

by:scrapdog
ID: 6444614
Thanks edey for that HSV formula.  I used it and did notice an improvement.
0
 
LVL 6

Expert Comment

by:edey
ID: 6444764
Excellent, Glad to be of service :)

Gl
Mike
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

The uses clause is one of those things that just tends to grow and grow. Most of the time this is in the main form, as it's from this form that all others are called. If you have a big application (including many forms), the uses clause in the in…
Objective: - This article will help user in how to convert their numeric value become words. How to use 1. You can copy this code in your Unit as function 2. than you can perform your function by type this code The Code   (CODE) The Im…
This video discusses moving either the default database or any database to a new volume.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now