Skip to main content
All CollectionsAdvanced Tutorials Collection
Analyzing Suspected Issues in FACS Images with Proofig: Best Practices and Tips
Analyzing Suspected Issues in FACS Images with Proofig: Best Practices and Tips

Learn the best practices and tips for analyzing FACS images, focusing on the use of Proofig's color map filters to enhance image analysis.

D
Written by Dekel Faruhi
Updated over 3 weeks ago

Introduction

Welcome to Proofig AI's tutorial on best practices and tips for analyzing FACS images. This guide will provide you with the recommended tools and techniques to ensure accurate and thorough image analysis.



Recommended Tools - Color Map Filters

For analyzing FACS images, we recommend using the color map filters in Proofig. These filters can uncover different aspects and highlight various features of the image.
​


Recommended Color Maps

We specifically recommend the Invert, Greys, Jet, and HSV color maps. These filters can help reveal hidden details and ensure a comprehensive analysis.
​


Practical Application with an Example

Let's see how these filters can be applied to a FACS image to highlight suspected issues. Here's an example of a FACS image with a partial overlap between two sub-images.

Now, let's apply the HSV color map.

Using the HSV color map, we can clearly see that the highlighted dots and other features match exactly between the two sub-images, making it easier to confirm that a portion of the image has been reused. This type of analysis is particularly relevant for detecting duplication and reuse. To learn more, visit our page on duplication and reuse detection.


Exploring Other Color Maps

In addition to the recommended filters, Proofig offers a variety of other color maps. We encourage you to explore these options to find the one most suitable for your specific needs.
​




What Next

Using the right tools and techniques is essential for accurate FACS image analysis. For a more detailed explanation of our detection tools, what they are, and how they work, please refer to our 'Key Detection Filters and Tools' article.

Did this answer your question?