Image Processing with QccPack and Python
Python, xv and the PIL package are essential for Python image processing programming. Run these commands to build PIL in Linux:
python setup.py build_ext -i python selftest.py
The most important class in the Python Imaging Library is the Image class, defined in the module with the same name. We create instances of this class in several ways: by loading images from files, processing other images or creating images from scratch.
To load an image from a file, use the open function in the Image module:
>>> import Image >>> im = Image. open ("lenna.ppm")
The Python Imaging Library supports a wide variety of image file formats. The library automatically determines the format based on the contents of the file or the extension.
Listing 1. Convert Files to JPEG
import os, sys import Image for infile in sys.argv[1:]: outfile = os.path.splitext(infile) + ".jpg" if infile != outfile: try: Image.open(infile).save(outfile) except IOError: print "cannot convert", infile
The next example (Listing 2) shows how the Image class contains methods to resize and rotate an image.
Listing 2. Simple Geometry Transforms
out = im.resize((128, 128)) out = im.rotate(45) out = im.transpose(Image.ROTATE_90)
The Python Imaging Library allows you to convert images between different pixel representations using the convert function—for example, converting between modes:
im = Image.open("lenna.ppm").convert ("L")
The library supports transformations between each supported mode and the L and RGB modes. To convert between other modes, you may have to use an intermediate image.
The ImageFilter module contains a number of predefined enhancement filters that can be used with the filter method. For example, from the Python prompt, do the following:
>>> import ImageFilter >>> out = im.filter(ImageFilter.DETAIL)
Once you have imported the module, you can use any of these filters:
Some decoders allow you to manipulate an image while reading it from a file. This often can be used to speed up decoding when creating thumbnails and printing to a monochrome laser printer. The draft method manipulates an opened but not yet loaded image so it matches the given mode and size as closely as possible. Reconfiguring the image decoder does this. See Listing 3 for an example of how to read an image in draft mode.
Listing 3. Reading in Draft Mode
im = Image.open (file) print "original =", im.mode, im.size im.draft("L", (100, 100)) print "draft =", im.mode, im.size This prints something like: original = RGB (512, 512) draft = L (128, 128)
Listing 4 shows how the ImageDraw module provides basic graphics support for Image objects.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- The Humble Hacker?
- Server Hardening
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- The Death of RoboVM
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The US Government and Open-Source Software
- ACI Worldwide's UP Retail Payments
- Open-Source Project Secretly Funded by CIA
- Varnish Software's Hitch
- New Container Image Standard Promises More Portable Apps
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide