Extracting the Thumbnails and EXIF Information of JPEG Files

This program shows how it is easy to extract information complementary to JPEG files. In particular, it work with the thumbnails, which are easier and more rapid to extract and to recompute.

Extracting this information is even essential because this information makes it possible to direct the photograph correctly. Indeed, certain digital camera manufacturers always place the image in a JPEG file in landscape mode, and offer additional information. EXIF indicates how to turn the image to represent it in the proper orientation.

This program also illustrates the use of MFC architecture to carry out a presentation in the Windows Explorer style within the left-hand window of an arborescent presentation of the files' structure. The right-hand window presents either the thumbnails put in a table, or, in a full window, the selected image.

In this mode, it is possible to present EXIF information relating to the posted image.

It should be noted that, for this presentation, in the table the CListView class is not used because it is a capricious operation with imagettes of larger-size presentations. To finish this illustration, the functions of the impression are to print with the choice of either the table of the imagettes or the selected image in full page mode.



About the Author

Georges Dumond

Courbevoie (France)

Downloads

Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Live Event Date: May 11, 2015 @ 1:00 p.m. ET / 10:00 a.m. PT One of the languages that have always been supported with the Intel® RealSense™ SDK (Software Developer Kit) is JavaScript, specifically so that web-enabled apps could be created. Come hear from Intel Expert Bob Duffy as he reviews his own little "space shooting" game where the orientation of your face controls the aiming reticle to help teach developers how to write apps and games in JavaScript that can use facial and gesture …

  • Discover how to quickly remediate aggressive security threats. Read this report from Forrester Research and get the facts about new automated compliance processes and how they will reduce your organization's vulnerability and risk. Learn to: Adopt a set of cyber "Rules of Engagement" Define the appropriate response through the "Response Index" Create actionable response metrics Ensure multiple levels of audit and reinforcement Plus, find out how to better align security and operations teams and put the …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date