Search Icon Menu Icon

Key Correct Academic

Key Correct Academic

SKU: KEYCORRECTEDUBrand: Red Giant Software

$ 220.99

Free Shipping!


In Stock

Brand New


Key Correct is an integral part of keeping your composite look natural and realistic. This set of 15 plug-ins can be used to soften alpha channels, match foreground and background colors, fix outlines, and clean up noise. Key Correct is the secret ingrediant for top-quality results from popular keyers like Primatte Keyer (our favorite!), Keylight and Ultimatte.


Fine-tune Alphas
Easily softens and feathers alpha channels for accurate blending from any keyer

Color Matching
Automatically color-match foreground objects with any background image

Sophisticated Edge Controls
Lighten and outline the edges of objects to create realistic edge lighting and edge outlines

High Bit Depths
All plug-ins work with 8-bit or 16-bit projects for DV, HD and film output

Wire/Rig Remover
Powerful tool offers 5 different ways to erase unwanted elements

Matte Feather EZ Filter
Gives you just the controls you need to soften mattes

New Super Rack Focus Feature
See how the depth of field area is created

New Zone HLS Filter
Indicates highlight, midtone and shadow regions to simplify color adjustment

Speedy Blur Plug-in
Offers three different levels of smoothness, horizontal and vertical blurs, and per-channel blur options.


What's In The Box

Key Correct Academic

Frequently Asked Questions

Why should I buy from
The founders of have been in the camera business for over 20 years. Carrying the top brands, is committed to providing customers with amazing deals on the highest quality equipment on the market.

What is's Shipping Policy?
Almost all of our products ship FREE throughout United States! This shipping usually takes between 5-8 business days. You also have the option to expedite your order for a small fee. Add an item to the cart to see what it would cost to get your item a little faster!

Is your site secure?
All customer data that is gathered on is protected against unauthorized access or use through encryption and other security protocol. The software we use on our secure server uses the security protocol, Secure Sockets Layer (SSL).