Skip to main content

Photo Composition

Rules are made to be broken but are also made for a reason. Our ‘go to’ is the widely known ‘rule of thirds’ and is considered in the majority of our intentional compositions. But what other compositions do we use?

1 - Golden Spiral :
Based on the Fibonacci numbers, this composition uses arcs infinitely resembling a spiral shape, which can be used to create balanced and aesthetically pleasing photos.


2 - Cross :
A simple but harmonious composition using two lines, creating a midsection crosshair with the subject in the center of the frame.


3 - Tunnel :
Similar to ‘leading lines’ tunnel composition is used to draw your eye to a subject using depth.


4 - L Shape :
The L-shape composition appears when the elements create the “L” shape which can be (and often is) multiplied. The static horizontal and vertical lines this kind of composition presents create the feeling of rest, stillness, and harmony.


5 - S Curve :
The curved lines in an S-curve composition add a sense of movement to an otherwise static image. Sometimes, they can even add visual depth and perspective to the shot.


6 - V Shape :
Not only can a V lead the eye quickly to the focal point, but it can also lock the viewer’s focus on the subject.


7 - Circular :
A circle offers a different path to composition, a path where curves in the scene work well, but straight lines can tend to be at odds with the border. The circle represents a framing element that is far closer to how we actually see the world.


8 - Pyramid :
With the stable triangle composition, there is a symmetric arrangement of elements. Our example shown above is quite ‘literal’ but this composition can work using multiple elements within a frame making a ‘pyramid’ shape to keep the attention at the image axis.


9 - Rule of Thirds :
A grid is used to divide a photo into nine equal parts, offering four crosshairs for placing important subjects. This guide helps balance your main subject with negative space.


10 - Balanced :
If you think of each element in your frame as having actual weight, a balanced composition offers two focus points of the same ‘weight’ i.e. size, sharpness, and color. An evenly balanced composition creates a feeling of calmness and peacefulness.


11 - Unbalanced :
This composition often relies on depth and asymmetry and can create emphasis in a photo by prioritizing one focus point over another.


12 - Diagonal :
We often use diagonal lines to lead the eyes of the viewer through the scene, towards the subject. Therefore diagonal lines can create a sense of dynamism and action.


13 - Double Diagonal :
You can use more than one diagonal line in your frame, especially when they work together to create harmonious leading lines to highlight your subject.


14 - Golden Triangle :
This rule is somewhat like the rule of thirds, but instead of straight lines, a series of diagonal lines form right-angle triangles. The main subject(s) should sit at the intersection of these triangles.


15 - Radiating :
Elements within your composition radiate outwards or inwards from a central point, adding depth and visual movement to the photo. This composition can create a sense of unity and fluid motion.

A good photographic composition is the foundation of an image and relies on the placement of the subject within its frame. Implementing these rules, and intentionally considering them can seriously up your photography!





Post Collected From Facebook - #fireandice
#weddingphotography #weddingphotographer #weddingphoto #photocomposition #goldenratio #goldenspiral #ruleofthirds #photography #photographytips #SharmaGuides

Comments

Popular posts from this blog

Languages in DBMS

Languages in DBMS Structured Query Language(SQL) as we all know is the database language by the use of which we can perform certain operations on the existing database and also we can use this language to create a database. SQL uses certain commands like Create, Drop, Insert, etc. to carry out the required tasks. These SQL commands are mainly categorized into five categories as: DDL – Data Definition Language DQL – Data Query Language DML – Data Manipulation Language DCL – Data Control Language TCL – Transaction Control Language Now, we will see all of these in detail. DDL (Data Definition Language): DDL or Data Definition Language actually consists of the SQL commands that can be used to define the database schema. It simply deals with descriptions of the database schema and is used to create and modify the structure of database objects in the database. DDL is a set of SQL commands used to create, modify, and delete database structures but not data. These commands are normally ...

Indexing in DBMS

Indexing in DBMS Indexing is used to optimize the performance of a database by minimizing the number of disk accesses required when a query is processed.  The index is a type of data structure. It is used to locate and access the data in a database table quickly. Index structure: Indexes can be created using some database columns. The first column of the database is the search key that contains a copy of the primary key or candidate key of the table. The values of the primary key are stored in sorted order so that the corresponding data can be accessed easily.  The second column of the database is the data reference. It contains a set of pointers holding the address of the disk block where the value of the particular key can be found. Indexing Methods Ordered indices The indices are usually sorted to make searching faster. The indices which are sorted are known as ordered indices. Example: Suppose we have an employee table with thousands of record and each of which is 10 byte...

SQL Injection

SQL Injection The SQL Injection is a code penetration technique that might cause loss to our database. It is one of the most practiced web hacking techniques to place malicious code in SQL statements, via webpage input. SQL injection can be used to manipulate the application's web server by malicious users. SQL injection generally occurs when we ask a user to input their username/userID. Instead of a name or ID, the user gives us an SQL statement that we will unknowingly run on our database. For Example - we create a SELECT statement by adding a variable "demoUserID" to select a string. The variable will be fetched from user input (getRequestString). demoUserI = getrequestString("UserId"); demoSQL = "SELECT * FROM users WHERE UserId =" +demoUserId; Types of SQL injection attacks SQL injections can do more harm other than passing the login algorithms. Some of the SQL injection attacks include: Updating, deleting, and inserting the data: An attack can mo...