Creating the CBitmapPicture Object

      

Environment:

CBitmapPicture is derived from CBitmap. It allows the user to load jpg, gif, bmp, and dib formats from a file or from the resouce and store them as a CBitmap object.

Public Operations

  • Load from file given supplied path
  • BOOL Load(CString sFilePathName);
  • Load from resouce; give ResourceName and Type
  • BOOL Load(UINT ResourceName, CString ResourceType);
  • Display CFileDialog and choose from supported image types
  • BOOL SelectFileAndLoad();

CBitmapPicture uses the IPicture interface just as Internet Explorer does to load jpg and gif files. The IPicture interface is then converted to a bitmap interface.

CBitmpaPicture utilizes code from:
class CPicture—Author: Dr. Yovav Gad, EMail: Sources@SuperMain.com, Web: www.SuperMain.com
function LoadBMPImage—Author: Zafir Anjum

Example Usage

  • Load a job from resource; then Select it into CStatic Image object m_Display
  • Picture.Load(IDR_JPG_SPACE31,"JPG")
    m_Display.SetBitmap((HBITMAP)Picture.GetSafeHandle());
  • Select and Load file; then Select into CStatic Image object m_Display
  • if(Picture.SelectFileAndLoad())
    m_Display.SetBitmap((HBITMAP)Picture.GetSafeHandle());

Downloads

Download demo project and source files - 1.15 Mb


Comments

  • requarements to run this code?

    Posted by Joe on 06/22/2012 10:30am

    You could at least tell us in which library are this functions. I tried to compile yours program on gcc and I got plenty of errors. C:\Users\amd\Downloads\CBitmapPicture\stdafx.h|15|error: afxwin.h: No such file or directory|

    Reply
Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Today, users, applications, and data exist in more places than ever before, creating an unprecedented challenge for IT. How can IT achieve the flexibility and agility it needs to offer multiple types of applications in multiple locations? To better serve business demands for information everywhere, enterprises must develop new strategies for optimizing multiple kinds of networks. Read this white paper to learn how hybrid networks provide an unprecedented level of network dynamism, enterprise agility, and the …

  • Although much publicity around computer security points to hackers and other outside attacks, insider threats can be particularly insidious and dangerous, whether caused by malice or employee negligence. In this report, you learn the eight most significant cybersecurity threats that could impact your organization (at any time), Forbes cited internal threats as No. 3, noting that internal attacks can be "the most devastating" due to the amount of damage privileged users can inflict and the type of data they can …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date