Creating the CBitmapPicture Object

      

Environment:

CBitmapPicture is derived from CBitmap. It allows the user to load jpg, gif, bmp, and dib formats from a file or from the resouce and store them as a CBitmap object.

Public Operations

  • Load from file given supplied path
  • BOOL Load(CString sFilePathName);
  • Load from resouce; give ResourceName and Type
  • BOOL Load(UINT ResourceName, CString ResourceType);
  • Display CFileDialog and choose from supported image types
  • BOOL SelectFileAndLoad();

CBitmapPicture uses the IPicture interface just as Internet Explorer does to load jpg and gif files. The IPicture interface is then converted to a bitmap interface.

CBitmpaPicture utilizes code from:
class CPicture—Author: Dr. Yovav Gad, EMail: Sources@SuperMain.com, Web: www.SuperMain.com
function LoadBMPImage—Author: Zafir Anjum

Example Usage

  • Load a job from resource; then Select it into CStatic Image object m_Display
  • Picture.Load(IDR_JPG_SPACE31,"JPG")
    m_Display.SetBitmap((HBITMAP)Picture.GetSafeHandle());
  • Select and Load file; then Select into CStatic Image object m_Display
  • if(Picture.SelectFileAndLoad())
    m_Display.SetBitmap((HBITMAP)Picture.GetSafeHandle());

Downloads

Download demo project and source files - 1.15 Mb


Comments

  • requarements to run this code?

    Posted by Joe on 06/22/2012 10:30am

    You could at least tell us in which library are this functions. I tried to compile yours program on gcc and I got plenty of errors. C:\Users\amd\Downloads\CBitmapPicture\stdafx.h|15|error: afxwin.h: No such file or directory|

    Reply
Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • New IT trends to support worker mobility -- such as VDI and BYOD -- are quickly gaining interest and adoption. But just as with any new trend, there are concerns and pitfalls to avoid. Download this paper to learn the most important considerations to keep in mind for your VDI project.

  • Live Event Date: February 25, 2015 @ 2:00 p.m. ET / 11:00 a.m. PT Secure Shell (SSH) keys provide unmitigated access for privileged users and applications. However, managing and securing these critical privileged credentials poses a real challenge for organizations, putting sensitive data at risk. In fact, more than 50% of organizations report experiencing an SSH Key related compromise. Check out this upcoming eSeminar and join Adam Bosnian, EVP of Global Business Development at CyberArk, as he discusses the …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date