Pamrgbtopng User Manual

Pamrgbtopng User Manual



pamrgbatopng - convert PAM color/transparency image to PNG


pamrgbatopng [pamfile]

Minimum unique abbreviation of option is acceptable. You may use double hyphens instead of single hyphen to denote options. You may use white space in place of the equals sign to separate an option name from its value.


This program is part of Netpbm(1)

pamrgbatopng reads a PAM image with the RGB_ALPHA tuple type (a color visual image with transparency) and produces an equivalent PNG image as output.

The input image if from the file named by the pamfile argument, or Standard Input if you don’t specify pamfile. The output goes to Standard Output.

The maxval of the input image must be 255. You can use pamdepth to change the maxval of an image to 255 if necessary.

is a much more powerful program for generating PNG images from Netpbm images, but it cannot take PAM images with transparency as input. To supply transparency information, you must supply it in a separate PGM image. That makes it considerably less convenient to use.

(But note that pnmtopng takes PAM images, even with RGB_ALPHA tuple type just fine -- it just ignores the alpha plane).

Netpbm’s strategic direction is to add to pnmtopng all the capabilities of pamrgbatopng and retire pamrgbatopng. But there’s no telling when that will happen.








pamrgbatopng was new in Netpbm 10.30 (October 2005).

More Linux Commands

start-pulseaudio-x11(1) - PulseAudio Sound Server X11 Startu
This script starts pulseaudio (if not already running) and loads modules to publish access credentials to the PulseAudio server in the X11 root window and to sy

grub2-mkfont(1) make GRUB font files - Linux manual page....
Convert common font file formats into PF2 -a, --force-autohint force autohint -b, --bold convert to bold font -c, --asce=NUM set font ascent -d, --desc=NUM set

ypmatch(1) - print the values of one or more keys from a NIS
ypmatch prints the values of one or more keys from the NIS database specified by mapname, which may be a map name or a map nickname. OPTIONS -d domain Specify a

systemd-inhibit(1) Execute a program with an inhibition lock
systemd-inhibit may be used to execute a program with a shutdown, sleep or idle inhibitor lock taken. The lock will be acquired before the specified command lin

addchstr(3ncurses) - add a string of characters (and attribu
These functions copy the (null-terminated) chstr array into the window image structure starting at the current cursor position. The four functions with n as the

Tk_Draw3DRectangle(3) - draw borders with three-dimensional
These procedures provide facilities for drawing window borders in a way that produces a three-dimensional appearance. Tk_Alloc3DBorderFromObj allocates colors a

crypt_rn(3) - password hashing (Library - Linux man page)...
The crypt, crypt_r, crypt_rn, and crypt_ra functions calculate a cryptographic hash function of key with one of a number of supported methods as requested with

ifsysctl(5) - (unknown subject) (Formats - Linux man page)
These files are intended to contain sysctl settings, that should be applied when a network interface is created. This are usually interface specific settings, l

neomagic(4) - Neomagic video driver - Linux manual page.....
neomagic is an Xorg driver for the Neomagic graphics chipsets found in many laptop computers. SUPPORTED HARDWARE neomagic supports the following chipsets: Magic

lvmchange(8) - change attributes of the logical volume manag
lvmchange is not currently supported under LVM2, although dmsetup(8) has a remove_all command. SEE ALSO dmsetup(8) lvmchange.8 (Administration - Linux manual p

XcmsCreateCCC(3) - creating and destroying CCCs (Man Page)
The XcmsCreateCCC function creates a CCC for the specified display, screen, and visual. The XcmsFreeCCC function frees the memory used for the specified CCC. No

sgetspent(3) - get shadow password file entry (Man Page)....
Long ago it was considered safe to have encrypted passwords openly visible in the password file. When computers got faster and people got more security-consciou

We can't live, work or learn in freedom unless the software we use is free.