"Tools for Image Collectors" is a toolset that aids in acquiring, organizing, and identifying duplicate images. Ideal for image collectors, it streamlines the management process.
Similar is one such tool that utilizes a database of characteristic color samples to compare submitted pictures, and it depends on libjpeg and ImageMagick's convert. It can store images in a usual filesystem or a MySQL database while also containing a MySQL UDF extension to compare image samples within SQL queries. Similar also comes with a communications module, as described in Sagent.
Simv is another tool in the Stic bundle that performs file management on an image collection. Its main function is to coordinate file movements with the content of similar's database. It depends on an external image viewer such as ImageMagick's display or John Bradley's XV. Additionally, it comes equipped with a communication module, as described in Sagent.
Speaking of which, Sagent is a standalone version of the communications module used in both Similar and Simv. It is capable of receiving input from multiple clients, distributing different types of output back to them, and acting as a client itself. Sagent comes equipped with an encryption layer that provides user authentication using Blowfish technology with 128-bit keys.
Snntpbatch rounds out the Stic collection as a command-line-based NNTP client that can automatically download images using a filter language. It also converts message texts to HTML code that includes the downloaded images and can post sets of images to newsgroups.
All of Stic's tools are designed to be relatively system independent, and any program activity possible in dialog can also be performed in batch runs, making it perfect for users who enjoy automating boring tasks and simplifying manual ones. Furthermore, all of the code associated with Stic is open-source and distributed under a BSD license.
In the most recent update, Stic has added the encrypted protocol version 0.2, which utilizes SHA-1 seal, 256-bit keys, and a variable chaining initialization vector. The protocol is chosen by the client and may or may not be accepted by the server. Check out the Sagent command-security options clientprotocol and serverprotocol for more information. Lastly, example images are available, credited to the U.S. Fish and Wildlife Service (see images/CREDITS).
Version 0.7: N/A