Extracting the Thumbnails and EXIF Information of JPEG Files

This program shows how it is easy to extract information complementary to JPEG files. In particular, it work with the thumbnails, which are easier and more rapid to extract and to recompute.

Extracting this information is even essential because this information makes it possible to direct the photograph correctly. Indeed, certain digital camera manufacturers always place the image in a JPEG file in landscape mode, and offer additional information. EXIF indicates how to turn the image to represent it in the proper orientation.

This program also illustrates the use of MFC architecture to carry out a presentation in the Windows Explorer style within the left-hand window of an arborescent presentation of the files' structure. The right-hand window presents either the thumbnails put in a table, or, in a full window, the selected image.

In this mode, it is possible to present EXIF information relating to the posted image.

It should be noted that, for this presentation, in the table the CListView class is not used because it is a capricious operation with imagettes of larger-size presentations. To finish this illustration, the functions of the impression are to print with the choice of either the table of the imagettes or the selected image in full page mode.



About the Author

Georges Dumond

Courbevoie (France)

Downloads

Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Bonita BPM 7 is here! And for you, an in-depth tour of its innovation. In this webinar, we'll guide you through the brand-new features of this release and demonstrate them live. You will: Discover how business application implementation and maintenance is now even easier, with decoupling of process logic, business data and user interface Learn how to create "living applications" for business processes which present business data in custom views We recommend that you watch the half-hour recording of our …

  • Do you spend a lot of time thinking about your enemies? Attacker attribution - figuring out who's out to get you - is one of the most important things an organization can do to protect itself.  Because you have no hope of defending yourself if you don't understand who the attackers are. Good news? Every organization isn't targeted by all the attackers. Bad news? No one can identify your potential attackers as well as you. Read this graphics-rich threat summary for 2014 to determine who might be your next …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date