Image Conversion In Computers

JPEG, GIFF/JIFF, BMP, and TIFF are the most commonly used formats for storing still image files such as photographs, graphics, and drawings. JPEG stands for Joint Photographic Experts Group and is a standard for image compression.

However, some amount of data/detail is lost in the process. JPEG therefore is characterized by a glossy compression technique for still color images, just as MPEG is used for compressing motion picture files.

GIFF/JIFF stands for Graphics Interchange format, which is a bit-mapped graphics file format.

Its storage is limited to about 256 colors as against 16 million colors in JPEG. GIFF therefore is more suitable to store illustrations rather than color photos.

Other popular formats for storing bit-mapped images are TIFF (Tagged image file format), BMP,and PCX. You'll also see GIF and JPG. You may be wondering what a bit-map is? A bit-map graphic is composed of a pattern of dots (each dot containing bits of data). Vector graphics, on the other hand, use geometrical formulas to represent images. The latter can be scaled i.e. the object size can be changed while maintaining its shape. Vector images are thus more flexible than bit-maps. Also vector imageslook better on higher resolution and require less memory. This brings us to the difference between Paint programs and Draw programs. In Paint program the drawings are represented as bit-maps. Draw programs, on the other hand, represent images as vector graphics.

Why we need to convert images from one format to another?

? Converting GIFF files to JPEG can compress the files to a considerable extent. The uncompressed data is normally 24 bits/pixel for full-color images. JPEG can achieve 10:1 to 20:1 compression without apparent loss, 30:1 to 50:1 compression with small to moderate defects, and 100:1 for very low quality purposes like archiving. These smaller size files increase storage capacity and take lesser transmission time across networks.

? JPEG files are extremely useful for image archiving purposes. JPEG files store a full color range (24 bits/pixel as against 8 bits/pixels in GIFF).The display of images is particularly good on full-color hardware that is becoming common now.

Conversion rules:

? Large, high-quality, real-world scanned photos are the best material for conversion to JPEG format.

? Do not convert black and white images to JPEG that works best with smooth and subtle color palette. B&W images are best on GIF.

? Even on colored images make sure to smoothen out the sharp edges before carrying out the conversion. A gray-scale image is much easier for a JPEG format.

? Avoid converting images that have already been converted before. Re-conversion spoils the quality of images. It's best to work with original scanned images here.

To explain how format conversion is carried out here's an example:

1. In a Windows operating system go to Start menu ? Accessories ? Paint

2. Create an image with the program and save it in BMP format. Now Close the file

3. To convert it into say JPEG, re-open the file

4. Go to File menu and click Save As

5. Rename the file in File name box and in Save as Type drop down box click on the format you want it to be converted to. In this case "JPEG File Interchange Format (*.jpg, *. jpeg,)"

6. Click on the Save button. Your file is now converted from BMP to JPEG.

If you want to change BMP to GIF, follow the same procedure except that in Save as Type box click on "Graphics Interchange Format (.gif)"

Once an image has been converted from one format to another, say GIF to JPEG, some of the information is lost. You can't go back to the original file. Therefore it is always advisable that you make a copy of the original file before converting it.

Krish is striving to offer best quality ebooks to the readers. He doesn't compromise anything with quality. He always wants that his readers should have maximum satisfaction on reading his eBooks.

KRISH is a writer and seller of high quality ebooks.

KRISH is selling High quality eBooks covering various topics.The ebook "Tame Your Personal Computer" explains in a simple language about Personal Computers. Please join our mailing list mailto:ananthcbe@hotmail.com http://www.ebook-retailers.com/tame/

experienced cleaning professionals Northbrook ..
In The News:

Cybersecurity experts warn about one of the largest credential compilations ever found, urging users to check "Have I Been Pwned" and change passwords immediately.
Quick iPhone and Android battery optimization techniques help your device stay powered all day by turning off hidden features that secretly drain power in the background.
Kodiak Driver autonomous truck achieves perfect 98 safety score, matching top human fleets in groundbreaking AI evaluation by Nauto's VERA system.
New 401k catch-up contribution rules in 2026 will change taxes for high earners over 50. Learn how scammers exploit these changes and protect your retirement savings.
Kurt Knutsson's guide covers social media privacy protection through location settings, account privacy controls and two-factor authentication to prevent scams and data breaches.
Revolutionary retinal implant restores central vision in 80% of patients with advanced macular degeneration, offering hope where treatments once only slowed blindness.
Learn how to use passkeys on Windows and Mac computers without cameras or fingerprint readers. Discover secure authentication methods that replace passwords.
Tesla's FSD v14.1.2 update reintroduces Mad Max mode, enabling higher speeds and more frequent lane changes than the standard Hurry profile setting.
A phishing email scam targeting American Express customers shows how cybercriminals use fake urgent messages to steal personal and financial information.
Facebook's new Meta AI feature analyzes your camera roll photos to create polished collages automatically, but requires cloud processing and raises privacy concerns.
A New Jersey teenager filed a major lawsuit against AI/Robotics Venture Strategy 3 Ltd. over ClothOff, an AI tool that created fake nude images from her social media photos.
Microsoft reports Storm-2657 cybercriminals sent phishing emails to 6,000 addresses at 25 universities to steal payroll credentials and redirect funds.
Astronomers have discovered asteroid 2025 SC79, a skyscraper-sized space rock orbiting the sun in just 128 days. the second-fastest known.
The Fox News AI Newsletter delivers the latest developments form the world of artificial intelligence, including the technology's challenges and opportunities.
A cyberattack on SimonMed Imaging exposed personal information of 1.2 million patients, including medical records, financial details and identity papers.
Spotify's managed accounts for kids under 13 now available in at least seven countries, allowing parents to filter and block explicit content and songs.
Friendly text conversations about BBQs and social events can lead to WEEX gold trading scams that target older adults with fake investment opportunities.
California company Skyeports creates self-healing glass spheres from Moon regolith that generate solar power and support plant growth for sustainable lunar living.
Cleafy researchers discover fake VPN streaming app Mobdro Pro that installs Klopatra banking Trojan, giving attackers full control over Android devices.
Police departments across the U.S. and Canada are adopting virtual reality training to better prepare officers for high-pressure, real-world situations.
House Bill 469 would prevent AI systems from owning property, serving as executives, or gaining legal personhood in Ohio under Representative Thaddeus Claggett's proposal.
Public voter records expose retirees' personal details to election scammers who create targeted cons using names, addresses, and voting history data.
Instead of fearing what comes next with artificial intelligence, think outside the box. Here are high-earning AI jobs that don't require a computer science degree.
OpenAI CEO Sam Altman says polite words like "please" and "thank you" cost millions annually, while direct prompts may improve ChatGPT accuracy by several points.
Chattee Chat and GiMe Chat exposed intimate conversations and photos, revealing users spent up to $18,000 on AI companions before the breach.

The Many Benefits of Owning a DVR

Has This Ever Happened To You? OK.. it's Friday night,... Read More

Smart Apple iPod Tips and Techniques

Are you thinking of buying an Apple iPod? Or have... Read More

Have You Invited A Spy Into Your Computer?

Yes, it's true. You may have inadvertently invited a spy... Read More

How to Buy a Plasma Television Set

Most people think that all you have to do to... Read More

Cisco Certification: A Survival Guide To The Cisco Cable Jungle

One of the most confusing parts of beginning your Cisco... Read More

How to Place Home Theater Speakers

You have your television and home theater receiver; you just... Read More

Simple Overview Of Computer

Computer is an electronic machine work on the instructions of... Read More

How To Search Your PC With Google Desktop

In this era of Internet, most people are frequent users... Read More

How to Protect your PC from Spyware in the Cyber Age

Wouldn't you be shocked to find that your personal sensitive... Read More

5 Simple Ways To Increase Your Computer Speed & Help Your Computer Run More Efficiently!

If you're a computer expert, you'll probably already know about... Read More

The Importance Of Email Backup

Viruses, software failures, power failures, human errors, hard drive failures... Read More

Plasma TV vs LCD TV

For those seeking to buy their first flat panel TV... Read More

How Does My PC Get Hot

There are many sources of heat that can raise the... Read More

Quick System Restore with ASR Backups

ASR (Automated System Recovery) is a feature available on the... Read More

What are the Main Components of Any Computer, and Which are the Most Critical to Its Performance?

Computers are everywhere, and vary in specification, brands, sizes, shaped,... Read More

HTML Explained: Part 1

Want to save money while promoting your web-based business? Of... Read More

Best PC Pocket GPS

Stop Getting LostOne of the greatest uses for a pocket... Read More

Linux Power Tools - Great Tools to Make System Administration Easy

World War II - Germany decided to attack Poland. Poland... Read More

How To Speed Up Your Aging PC And Make It Healthier Too

With a little tweaking and with proper tools, you can... Read More

Lives With Games Tradition and Industry

The United States Of America citizen feels that games is... Read More

Help, I Need a New HDTV! (Part 2 of 5)

Feeling overwhelmed in selecting a new TV? With all the... Read More

Things You Can Do To Speed Up Your Computer

Upgrading your processor will always speed up your computer, but... Read More

HTML Explained: Part 2

Get started creating web pages using text files and HTML... Read More

Consumer Electronic Information: The Basics of the DLP Projector

Projectors have come a long way in the past few... Read More

A Peek Into the Near Future of Electronics Technology

How long do you think DVDs have around? 20 years?... Read More

best value cleaning service Northbrook ..