Hi Berhard

On Sat, 1 May 2021 at 22:59, Bernhard <darkta...@intervalsignals.org> wrote:

>
> this is simple: what you see in-camera is the in-camera-jpg provided by
> the in-camera-engine.
> These in-camera-jpg are embedded in the raw also and can be extracted
> using exiftool
>
> https://exiftool.org/examples.html
>
> exiftool -b -JpgFromRaw -w _JFR.JPG -ext NEF -r .
>
>
> darktable reads the raw data and expects YOU to work with them
>
> Thanks - so 1 method would be to extract the JPEG and use that avoiding
all the Raw processing

or maybe my bad photography skills are being hidden by the camera :-)

will read up the inks

However is there a way to "replicate " what the camera is doing through
dark table

ram

___________________________________________________________________________
darktable developer mailing list
to unsubscribe send a mail to darktable-dev+unsubscr...@lists.darktable.org

Reply via email to