Browse Definitions :
Definition

green screen (blue screen)

Green screen (also blue screen) is the use of a single color as a backdrop in filming to make it simpler and easier to add backgrounds, characters or other images.

The pure, uniform green or blue color is easily taken out of the resulting visual content with automatic software color selection and removal tools and the desired background inserted in its place. Green and blue screens are most commonly used, although any color could work in the same way. Bright green is often chosen because it's not a color that people wear very often.

One familiar use of green screens is to add maps to the background in weather reporting, behind meteorologists. Green screens are often used in movies to present created environments or simulate real locations. In films depicting far away or imaginary places, compositing may be used along with green screens to create convincing background visuals. Compositing is the combination of multiple layers of images or video elements to render a final still or moving image. 

CGI (computer graphics imagery) effects are added to films with compositing as well. Adding the 3D rendered image files for backgrounds is accomplished with green screens. The addition of rendered objects or characters to filmed scenes does not require a green screen, however, as the frames are rendered with transparency information included.

The only caveat of green screening is a warning that subjects should not wear the background color or those parts of their bodies will vanish on screen.

The use of green screens in movies and how it works:

This was last updated in July 2016

Continue Reading About green screen (blue screen)

SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • Extensible Authentication Protocol (EAP)

    The Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by ...

  • session key

    A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session ...

  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed ...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close