Extracting the Thumbnails and EXIF Information of JPEG Files

This program shows how it is easy to extract information complementary to JPEG files. In particular, it work with the thumbnails, which are easier and more rapid to extract and to recompute.

Extracting this information is even essential because this information makes it possible to direct the photograph correctly. Indeed, certain digital camera manufacturers always place the image in a JPEG file in landscape mode, and offer additional information. EXIF indicates how to turn the image to represent it in the proper orientation.

This program also illustrates the use of MFC architecture to carry out a presentation in the Windows Explorer style within the left-hand window of an arborescent presentation of the files' structure. The right-hand window presents either the thumbnails put in a table, or, in a full window, the selected image.

In this mode, it is possible to present EXIF information relating to the posted image.

It should be noted that, for this presentation, in the table the CListView class is not used because it is a capricious operation with imagettes of larger-size presentations. To finish this illustration, the functions of the impression are to print with the choice of either the table of the imagettes or the selected image in full page mode.



About the Author

Georges Dumond

Courbevoie (France)

Downloads

Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Enterprise endpoint backup can satisfy data collection and preservation requirements in a more streamlined and cost-effective manner than traditional e-discovery methods. Enterprise IT teams face increasing challenges as the amount of valuable data living on endpoints continues to grow. Due to the exploding volume, mobility and compliance requirements of enterprise data, the need to collect and preserve that data for the purpose of e-discovery becomes more critical--and more difficult. Traditionally, …

  • In the words of epic book series Game of Thrones, "Winter is coming," and there's never been a better time to be on your guard. After all, we live in a world of vicious attacks, scary data breaches, unpredictable weather, and other factors that can threaten the very existence of both your applications and your precious data. Like any enterprise or organization, Westeros is endangered by a lack of continuity and poor disaster recovery plans. This white paper explores why disaster recovery should become a …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date