Extracting the Thumbnails and EXIF Information of JPEG Files

This program shows how it is easy to extract information complementary to JPEG files. In particular, it work with the thumbnails, which are easier and more rapid to extract and to recompute.

Extracting this information is even essential because this information makes it possible to direct the photograph correctly. Indeed, certain digital camera manufacturers always place the image in a JPEG file in landscape mode, and offer additional information. EXIF indicates how to turn the image to represent it in the proper orientation.

This program also illustrates the use of MFC architecture to carry out a presentation in the Windows Explorer style within the left-hand window of an arborescent presentation of the files' structure. The right-hand window presents either the thumbnails put in a table, or, in a full window, the selected image.

In this mode, it is possible to present EXIF information relating to the posted image.

It should be noted that, for this presentation, in the table the CListView class is not used because it is a capricious operation with imagettes of larger-size presentations. To finish this illustration, the functions of the impression are to print with the choice of either the table of the imagettes or the selected image in full page mode.



About the Author

Georges Dumond

Courbevoie (France)

Downloads

Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • As virtualization becomes the norm throughout organizations of nearly all sizes, and as more organizations look to private cloud solutions, IT decision makers are increasingly in need of ways to keep storage costs and complexity under control in the face of often-runaway virtual machine (VM) sprawl. Application-aware storage is designed to help achieve these important goals. Read this white paper to learn how application-aware storage allows you to gain VM-level visibility into application performance and …

  • Who can you trust? Learn from the IBM X-Force team in this new quarterly report how the Internet of Things and IP reputation tracking are transforming the security landscape.

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date