Creating the CBitmapPicture Object

      

Environment:

CBitmapPicture is derived from CBitmap. It allows the user to load jpg, gif, bmp, and dib formats from a file or from the resouce and store them as a CBitmap object.

Public Operations

  • Load from file given supplied path
  • BOOL Load(CString sFilePathName);
  • Load from resouce; give ResourceName and Type
  • BOOL Load(UINT ResourceName, CString ResourceType);
  • Display CFileDialog and choose from supported image types
  • BOOL SelectFileAndLoad();

CBitmapPicture uses the IPicture interface just as Internet Explorer does to load jpg and gif files. The IPicture interface is then converted to a bitmap interface.

CBitmpaPicture utilizes code from:
class CPicture—Author: Dr. Yovav Gad, EMail: Sources@SuperMain.com, Web: www.SuperMain.com
function LoadBMPImage—Author: Zafir Anjum

Example Usage

  • Load a job from resource; then Select it into CStatic Image object m_Display
  • Picture.Load(IDR_JPG_SPACE31,"JPG")
    m_Display.SetBitmap((HBITMAP)Picture.GetSafeHandle());
  • Select and Load file; then Select into CStatic Image object m_Display
  • if(Picture.SelectFileAndLoad())
    m_Display.SetBitmap((HBITMAP)Picture.GetSafeHandle());

Downloads

Download demo project and source files - 1.15 Mb


Comments

  • requarements to run this code?

    Posted by Joe on 06/22/2012 10:30am

    You could at least tell us in which library are this functions. I tried to compile yours program on gcc and I got plenty of errors. C:\Users\amd\Downloads\CBitmapPicture\stdafx.h|15|error: afxwin.h: No such file or directory|

    Reply
Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Discover how to quickly remediate aggressive security threats. Read this report from Forrester Research and get the facts about new automated compliance processes and how they will reduce your organization's vulnerability and risk. Learn to: Adopt a set of cyber "Rules of Engagement" Define the appropriate response through the "Response Index" Create actionable response metrics Ensure multiple levels of audit and reinforcement Plus, find out how to better align security and operations teams and put the …

  • Live Webinar June 2, 2015 - 11 am PST / 2 pm EST Your organization and brand are increasingly digital today, proliferating across websites, media outlets, social networks, search engines, mobile apps, online marketplaces and more. Each digital touch point not only enhances the value of your brand, but also represents far greater risk for your company. They increase opportunities for brand defamation and data leakage; act as discreet places to conspire and collude; and open the door to new security …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date