Solved

"Acquire" image from scanner...

Posted on 1998-02-04
3
392 Views
Last Modified: 2011-09-20
I want to be able to start the scanner-software from my app.  How do I do it?
I also want to place the scanned image in my app.
Please give me some hints here...

I use Delphi Developer 2.0..
Thanx!

Erik N.
0
Comment
Question by:Erik N
3 Comments
 
LVL 5

Expert Comment

by:inter
ID: 1358249
Dear Erik N.,

I want to repeat my comment to one of the previous questions from
gipa:


This might be a hard question upon what you want to do. If you want just to start the scanning application (e.g. deskscan.exe for HP ScanJet clone) it is not complicated and you can do it by
WinExec; However if you want to start deskscan and get the scanned data you'd better use TWAIN which is a uniform interface to the scanning devices(by this way you can use any TWAIN compatible scanner device). Calling the twain to perform data transfer task is not easy. Another way (only if the scanner vendor provides this kind of interface) is using OLE. If your scanning software register itself as an OLE server, you can write an OLE client application which connects it. An when, from the scanning application 'update' is selected, you ole client control receives the data. The last way I know is to use the third parth component (for example ImageGear OCX from accusoft is excellent) but it requires that you pay for it.


Igor
0
 
LVL 8

Accepted Solution

by:
ZifNab earned 20 total points
ID: 1358250
Here is a free example of calling the twain-api :

 ftp://delphiexchange.com/pub/free/deztwain.zip

Good luck,
Zif.
0
 

Author Comment

by:Erik N
ID: 1358251
Dear Igor.
I will not try to "Get" the scanned data from a scanner-device, since it seems to be hard to accomplish. I will instead make it possible to start any scanner-program, using Winexec or Create- process..
Thanks for your comment, Igor...

Thank you also to ZifNab....

Erik N.

0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

The uses clause is one of those things that just tends to grow and grow. Most of the time this is in the main form, as it's from this form that all others are called. If you have a big application (including many forms), the uses clause in the in…
Hello everybody This Article will show you how to validate number with TEdit control, What's the TEdit control? TEdit is a standard Windows edit control on a form, it allows to user to write, read and copy/paste single line of text. Usua…
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…
Concerto provides fully managed cloud services and the expertise to provide an easy and reliable route to the cloud. Our best-in-class solutions help you address the toughest IT challenges, find new efficiencies and deliver the best application expe…

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now