Extracting the Thumbnails and EXIF Information of JPEG Files

This program shows how it is easy to extract information complementary to JPEG files. In particular, it work with the thumbnails, which are easier and more rapid to extract and to recompute.

Extracting this information is even essential because this information makes it possible to direct the photograph correctly. Indeed, certain digital camera manufacturers always place the image in a JPEG file in landscape mode, and offer additional information. EXIF indicates how to turn the image to represent it in the proper orientation.

This program also illustrates the use of MFC architecture to carry out a presentation in the Windows Explorer style within the left-hand window of an arborescent presentation of the files' structure. The right-hand window presents either the thumbnails put in a table, or, in a full window, the selected image.

In this mode, it is possible to present EXIF information relating to the posted image.

It should be noted that, for this presentation, in the table the CListView class is not used because it is a capricious operation with imagettes of larger-size presentations. To finish this illustration, the functions of the impression are to print with the choice of either the table of the imagettes or the selected image in full page mode.



About the Author

Georges Dumond

Courbevoie (France)

Downloads

Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Live Event Date: February 25, 2015 @ 2:00 p.m. ET / 11:00 a.m. PT Secure Shell (SSH) keys provide unmitigated access for privileged users and applications. However, managing and securing these critical privileged credentials poses a real challenge for organizations, putting sensitive data at risk. In fact, more than 50% of organizations report experiencing an SSH Key related compromise. Check out this upcoming eSeminar and join Adam Bosnian, EVP of Global Business Development at CyberArk, as he discusses the …

  • Relying on outside companies to manage your network and server environments for your business and applications to meet the needs and demands of your users can be stressful. This is especially true as many Managed Hosting organizations fail to meet their service level agreements. Read this Forrester total economic impact report and learn what makes INetU different and how they exceed their customers' managed hosting expectations.

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date