Adobe Photoshop CS3: Top 5 Standout New Features

Upon first digging into Adobe Photoshop CS3, a few features have really popped out at me as incredibly useful. I would like to offer a brief overview of some of these new ways of attacking your creative challenges using the latest version of Adobe's flagship app. PsCS3 will run you about $649 to buy it outright if you do not own any previous versions. If you own Photoshop 7, CS, or CS2, you are eligible for upgrade pricing - looks like $199 for the upgrade. Check Adobe's store on their website for more info. For more information about what comes in the different versions of CS3, and what your suite configuration options are, see my previous post.

My current favorite five new PsCS3 features in order are:

1. Nondestructive Smart Filters
2. Quick Selection Tool & Refine Edge
3. Photomerge with advanced alignment and blending
4. Automatic layer alignment and blending
5. Vanishing Point with adjustable angle

Feature Overviews:

* Nondestructive Smart Filters

Adobe has finally given us non-linear, nondestructive filters. Can I just say "HOORAY!" In the past, you applied filters and effects in a linear order: one filter would alter your image, and the second filter would alter your now altered image, and a third filter would alter the altered altered image. The problem with that workflow is that if you decide you want to slightly tweak the second filter, you'd have to either undo back to that point (losing your subsequent edits), or use the history palette to step directly "back in time" to the point before you added the second filter, add your "revised" second filter and then add your third manually. All too often, you don't quite remember what exact parameters you had set on that third one - or worse, your real world project involved applying 20 filters instead of the 3 in my example and changing the second filter would mean redoing the 18 that follow it. What a drag. Because of this issue, people developed many work arounds (often involving saving off multiple "partially completed" versions of files all over your hard drive with iterative file names, hoping that if you needed to go back to a certain point in time you'd be able to figure out where you needed to be), and while these workarounds were clever and well-conceived in many cases, there was a perfect, real solution, waiting to happen.

The real solution to all this is what we have been given in CS3: Nondestructive Smart Filters. In this new version, each filter and effect that you apply to a layer, remains live and continually re-editable, in real time, and the parameters that you adjust will all cascade down through whatever subsequent filters or effects you might have added to your layer. These are savable, movable, copy and pastable, and most importantly scalable.

* Quick Selection tool & Refine Edge

A design mentor of mine once told me "Photoshop is all about the selection. You select something, and then you do something with the selection. Nothing more, nothing less. Remember that, and you'll never go wrong using this app." Almost 10 years later, I must say she was absolutely correct. Using Photoshop is all about "the selection." There are more tools in Photoshop for selecting than for any other single task.

As in just about every version of Photoshop that has ever been released, CS3 has made even greater strides in the area of "making your selection" than comes to memory in recent years. The new Quick Selection Tool used in combination with the Refine Edge palette is about the most helpful and clean way of selecting the edges of an object in your image that I have ever seen. This new revised Quick Selection tool is so smooth. You basically set the parameters of your Quick Selection tool - as if it were a brush - and paint the general area of your image edges (like trying to select just a kid and his soccer ball out of the photo of the big game) and Photoshop is watching what you do, and interpreting what you consider to be the general edges of what you are wanting to select and it figures out what's kid and ball and what's grass and goal posts and sky and crowd and selects just what you want it to. It's VERY fast and clean. Then, you can invoke the Refine Edge palette, and you have seemingly infinite control over exactly how the edges of that selection behave. Check out the palette to the right to get an idea of what you could do to "refine" that edge. With radius, feathering, smoothing, and various display settings, I believe this new combo will cut down on my masking and selecting time in a quantifiable way.

* Photomerge with advanced alignment and blending

Ever tried to stitch together a series of images that you took, that you intended to "put together" into a panorama? Even with some of the stand alone tools that have been available over the years—even those for doing quicktime VR's—are clunky and difficult to use - with mixed results at times. I have always wanted something built into Photoshop to let me do these "photo merges" - I never expected that Photoshop would actually be able to automatically do it for me. This feature floored me. The technologies involved in my number four choice "Automatic layer alignment and blending" are at work here in this feature as well, and the new auto layer alignment features in CS3 are far-reaching and crop up again and again in different areas of the application. It's really one of the revolutionary things about this new version.

All of the things that have made making panoramas a difficult task in the past are all done automatically. The primary among these being 1. those times when you have to actually distort, rotate, skew or transform one of your elements because the perspective is screwy, 2. those times when the sun or lighting or a window made the white balance, color space or over all wash of brightness and contrast different from one image to the next (especially when doing 360's) and of course 3. actually finding and aligning those overlapping areas of consecutive elements. Photoshop CS3 does these all for you and with surprisingly amazing results. It's not just about the typical "panorama" either... I saw a demo of someone standing "too close" to a building, and taking pictures zoomed all the way out, of the front door, windows and window-boxes, front brick walk way, tilting upward and taking a picture of the balcony and roof line of the second floor - in other words, many elements that were WAY out of whack in terms of perspective, lighting and color space, and these 4 or 5 images were distorted, tweaked, rotated, matched, blended, lighting and color density matched... and I was amazed in like 5 seconds, there was this "wide angle" almost "fisheye" photomerge of the front of the building, from brick walkway to roof-line, and it looked incredible.

* Automatic layer alignment and blending

Another powerful application of this new alignment and blending technology is with a series or stack of images of the same subject. Let's say you wanted to take a picture of a statue in a park somewhere, or a huge fountain, or the front of a monument or building. There are always people walking through the frame - if you can't close down the area and still need a picture of the statue, in the park, in it's beautiful setting, but with no people or birds or random elements - what are you to do? In the past, it was a painstaking process of shooting a bunch of images, selecting the "closest" one to your vision of a nice, clean, tourist-less frame, and begin the hours and hours of painting, cloning, healing, brushing etc., to remove all of your "randoms." There are artists who are very good at this process, but I'm fairly certain they would agree that if there was a way to not have to spend all that time, they'd take it. Well, it's here. Photoshop CS3 can take your stack of images and by analyzing all of them, figure out which things are permanent (things that appear in all the images like that building in the distance, the big tree, the sidewalk, and which parts of the image are obscured in one of the frames but not all of them, are healed automatically by borrowing pixels from other images in the stack and building an advanced composite of all the images and doing 90% or more of the work for you. There's even a set of "fuzziness" sliders letting you say "eleminate things that are in X% of the images in the stack or less." This is so impressive to see in action. You have to try it on some of your own images. It's really hard to believe that it's this easy to do this sort of process now. This is one of those new areas that I'm sure we'll see artists finding incredibly creative ways to utilize this feature. Again, this one floored me when I first saw it.

* Vanishing Point with adjustable angle

One of the most powerful new features of Adobe CS2 was the vanishing point feature. One limitation it had was that you only had one set of right angles to work with in the vanishing point interface. Adobe took it one exponential step further by adding multiple, adjustable angle perspective planes to this vanishing point feature. What this enables you to do is copy, paste and clone in far more complex image planes than just the "clone parts of a building in perspective" job that the first iteration of this feature offered (impressive and powerful, but not very flexible). One of the big examples Adobe is pushing with this feature is to simulate 3D packaging and work on multiple planes at various angles in the same image. Like an open box for a new product, or even for experimenting with your final package art by seeing it in its real-world context. Again I think this feature has so many far reaching implications for inventors, prototypers, 3D modelers, visual effects artists... and can give Photoshop artists the ability to render full blown mockups of product packaging art for clients in a whole new way - getting us to sign-off, green-light and on to the next project at hand much more quickly. I like that a lot.

There are numerous new features in the application, especially when you dig down deep into the Photoshop Extended editions (sounds like a Peter Jackson DVD...) and as the week progresses here, I'd like to look into some of what PsCS3 Extended has to offer. The versions of PsCS3 that are available are the Film & Video, Medical & Science, AEC (Architecture, Engineering & Construction), and Manufacturing editions.

RFID, its implications and how to defeat

Imagine a future in which your every belonging is marked with a unique number identifiable with the swipe of a scanner, where the location of your car is always pinpoint-able and where signal-emitting microchips storing personal information are implanted beneath your skin or embedded in your inner organs.

This is the possible future of radio frequency identification (RFID), a technology whose application has so far been limited largely to supply-chain management (enabling companies, for example, to keep track of the quantity of a given product they have in stock) but is now being experimented with for passport tracking, among other things. RFID is set to be applied in a whole range of consumer settings. Already being tested in products as innocuous as shampoo, lip balm, razor blades, clothing and cream cheese, RFID-enabled items are promoted by retailers and marketers as the next revolution in customer convenience. Consumer advocates say this is paving the way for a nightmarish future where personal privacy is a quaint throwback.

How RFID works
There are two types of RFID tags: active and passive. When most people talk about RFID, they talk about passive tags, in which a radio frequency is sent from a transmitter to a chip or card which has no power cell per se, but uses the transmitted signal to power itself long enough to respond with a coded identifier. This numeric identifier really carries no information other than a unique number, but keyed against a database that associates that number with other data, the RFID tag's identifier can evoke all information in the database keyed to that number.

An active tag has its own internal power source and can store as well as send even more detailed information.

The RFID value chain involves three parts: the tags, the readers and the application software that powers these systems. From there, the data generated by the application software can interface with other systems used in an enterprise, or, if they obtain the information or collect it themselves, concievably by governments or more nefarious organizations.

Where it’s used today
Global companies such as Gillette, Phillips, Procter & Gamble, Wal-Mart and others see huge savings to be made from the use of RFID, and there are numerous pilot projects underway which are indicating savings in supply chains as well as the ability to add value to both product owner, product reseller and customer.

But they’re just pilots, mostly. RFID is a long way from being everywhere, so far. Pharmaceutical tracking has long been held out as one of the flagship applications of RFID in the short term, yet just some 10 medications are expected be tagged using RFID technology on a large scale in the U.S. during 2006, analysts predict. Slow roll-outs are contrasting sharply with the optimism of a year ago, when evidence suggested tripling or even quadrupling of RFID for consumer goods tracking. Why? Uncertainty over pending legislation. There are a complex mixture of federal and new state laws (in particular Florida and California) intended to combat drug theft and counterfeiting that have implications for RFID. The details are still being worked out.

Where it’s likely to be used tomorrow
Depending which analysts you believe, the market for RFID technology will represent between 1.5 and 30 Billion USD by the year 2010. Analyst firm IDTechEx, which tracks the RFID industry, believes more than 585 billion tags will be delivered by 2016. Among the largest growth sectors, IDTechEx forsees the tagging of food, books, drugs, tires, tickets, secure documents (passports and visas), livestock, baggage and more.

Buses and subways in some parts of the world are being equipped with RFID readers, ready for multi-application e-tickets. These are expected to make things easier for the commuter, and help stem the fraud from the current paper-ticket system. However the biggest problem facing rollouts of RFID for commercial micropayment tracking is apparently not technical, but involves agreeing on the fees charged by the clearing house and how credit from lost and discarded tickets will be divided.

Passport tracking
One of the highest profile uses of RFID will be passport tracking. Since the terrorist attacks of 2001, the U.S. Department of Homeland Security has wanted the world to agree on a standard for machine-readable passports. Countries whose citizens currently do not have visa requirements to enter the United States will have to issue passports that conform to the standard or risk losing their non-visa status.

American and other passports are being developed that include RFID-based chips which allow the storage of considerable amounts of data such as fingerprints and digitized photographs. In the U.S., these passports are due to start being issued in October of 2006. Early in the development of these passports there were gaping security holes, such as the capability of being read by any reader, not just the ones at passport control (the upshot of this was that travelers carrying around RFID passports would have been openly broadcasting their identity, making it easy for wrongdoers to easily – and surreptitiously – pick Americans or nationals of other participating countries out of a crowd.)

Those security blunders were initially corrected by adding metal shielding to the passport cover to minimize its readability when closed, dialing back the range of the electronics and adding a special electronic protocol called Basic Access Control (or BAC). This scheme required the passport to be opened and scanned before its data could have been properly interpreted by an RFID receiver. Unfortunately, in early February 2006, Dutch security experts managed to “listen in” on the communications between a prototype BAC-protected passport and a receiver and cracked the protocol. Which means the international authority developing this new global passport standard may need to go back to the drawing board as of this writing, because ‘bad guys’ could clearly stand in line at passport control and capture passport information. Details of the Dutch hack here.

Implications for privacy seekers
RFID has clear implications for those who are worried about their privacy and safety. Some of them are obvious, and some of them are not.

- Can be read without your knowledge – Since the tags can be read without being swiped or obviously scanned (as is the case with magnetic strips or barcodes), anyone with an RFID tag reader can read the tags embedded in your clothes and other consumer products without your knowledge. For example, you could be scanned before you enter the store, just to see what you are carrying. You might then be approached by a clerk who knows what you have in your backpack or purse, and can suggest accessories or other items.
- Can be read a greater distances with a high-gain antenna – For various technical reasons, RFID reader/tag systems are designed so that distance between the tag and the reader is kept to a minimum. However, a high-gain antenna can actually read tags from much further away, leading to privacy problems. Governments or others could punch through privacy screens and keep tabs on people.
- Difficult to remove – RFID tags are hard for consumers to remove; some are very small (less than a half-millimeter square, and as thin as a sheet of paper) - others may be hidden or embedded inside a product where consumers cannot see them. New technologies allow RFID tags to be printed right on a product and may not be removable at all
- Disruptions if maliciously jammed – RF signals can be jammed, which could complicate everyday life if RFID tags became essential. Imagine a central bus or train station, maybe an airport, where suddenly everyone could neither be ID'd or access their cash accounts. A single hour of jamming during morning rush over a large area could cost a large city untold millions of dollars in delayed commerce and transport. It would be worse than a mass-transit strike, and easier to repeat.
- Could be linked to a credit card number – The Universal Product Code (UPC) implemented with barcodes allows each product sold in a store to have a unique number that identifies that product. Work is proceeding on a global system of product identification that would allow each individual item to have its own number. When the item is scanned for purchase and is paid for, the RFID tag number for a particular item can be associated with the credit card number it was purchased with.
- Potential for counterfeit – If an RFID tag is being used to authenticate someone, anyone with access to an RFID reader can easily capture and fake someone else’s unique numeric identifier, and therefore, in essence, their electronic 'signature'. If an RFID-tagged smartcard is used for shopping, for instance, anyone who intercepted and reverse-engineered your number, and programmed another card with it, could make charges on your account.
- Marking for crime – Even after you leave a store, any RFID devices in things you buy are still active. A thief could walk past you in the mall and know exactly what you have in your bags, marking you as a potential victim. Someone could even circle your house with an RFID scanner and pull up data on what you have in your house before robbing it. As a result, there are now discussions of “zombie” RFID tags that expire upon leaving the store and reanimate if the product is ever returned to the store and returned to the supply chain.
- Marking for violence – Military hardware and even clothing are beginning to make use of RFID tags to help track these items through supply chains. RFID is being used today by the U.S. military to track materials in Iraq and Afghanistan. Some analysts are concerned about particular items being associated with high-level officers that could trigger roadside bombs via an RFID scan of cars going by. (Thankfully, RFID tags retained close to the body can rarely be scanned. For instance, UHF tags, the kind being most widely deployed, are virtually unreadable near the body because of its high water content.)
Some have suggested that mobile phones are already as great a threat to privacy as RFID. In the case of mobile phones, information about your whereabouts and calling patterns is regularly available to your service provider, a centralized and highly regulated source of information gathering. An adversary with special-purpose equipment would also have the capability of tracking your mobile phone, but this would require significant expertise and investment. See our separate article "Cell phone hazards".

What makes RFID a more significant privacy threat than mobile phones is the fact that readers will be readily available and ubiquitously deployed. In other words, RFID readers will soon be an accepted element of everyday life, while eavesdropping equipment for mobile phones is unlikely to be.

How to thwart RFID technology
There are a few approaches you can take to thwart RFID tags ... but before you take proactive steps, note that sometimes the very absence of a tag or its signal in places it’s expected could arouse suspicion. For instance, if you’re carrying what is expected to be an RFID-tagged passport and your tag isn’t working, say, you may invite unwanted scrutiny. Be careful which tags you choose to disrupt.

The simplest, most permanent approach to disable RFID tags is to destroy them. If you can detect them and wish to permanently render them useless, remove them and smash the small chip component with a hammer. If you’re not sure whether a product you own contains a tag, consider putting it in a microwave to destroy the tag if the object is otherwise safe to be microwaved. Be careful with some plastics. Note there have been reports of RFID materials catching fire in microwaves.

If removing the tag is not practical, there are four general ways to disrupt RFID tag detection.
- Blocking – Construct a conductive foil box (even tin foil is good) around the tag. If you are concerned about RFID emissions from work badges, school IDs, new generation drivers licenses, credit cards, and even cash in the future containing RFID tags, buy or make an RFID-proof wallet. RFID wallet project details are easy to find on the Internet.
- Jamming – Since RFID systems make use of the electromagnetic spectrum like wireless networks or cellphones, they are relatively easy to jam using a strong radio signal at the same frequency the tag operates. Although this would only be an inconvenience for consumers in stores (longer waits at the checkout), it could be disastrous in other environments where RFID is increasingly being used, like hospitals, or in military combat situations. Such jamming devices, however, would in most cases violate government regulations on radio emissions. A group of researchers in Amsterdam have theorized that a personal RFID jammer is possible (their paper is linked to from the version of this article that lives at our web site, www.powerprivacy.com) but the device seems only theoretical at this time.
- Repeated interrogation – Active RFID tags that use a battery to increase the range of the system can be repeatedly interrogated to wear the battery down, disrupting the system.
- Popping – Generating a very strong pulse of radiation at the right frequency can cause RFID tags to resonate and break.

What strategy you should pursue depends on what RFID privacy threats you are trying to thwart and your technical expertise.

Safex.org - Nutritional Health Blog
Innerdemonsmovie.com - Movie News
SMKN 1 Singosari
15persen

Contact Us

Name

Email *

Message *