Solved

Source Code for saving to JPEG

Posted on 1998-08-24
7
135 Views
Last Modified: 2010-04-04
I need to find source code or a Delphi component that I can compile into my EXE. Source can be C, C++ but preferably Delphi object pascal

thank you
0
Comment
Question by:d_kiernan
  • 4
  • 2
7 Comments
 
LVL 10

Expert Comment

by:viktornet
ID: 1337507
Do you need a component or just a source code on how to work with JPG???

Regards,
Viktor Ivanov
0
 
LVL 4

Expert Comment

by:erajoj
ID: 1337508
Using Delphi 3 or 4?

/// John
0
 

Author Comment

by:d_kiernan
ID: 1337509
I am currently using Delphi 3 and C++ Builder 3 and what I need is code (source prefrerrably) to save a bitmap out to JPEG. I can't use DLL's I need all the code to be within the EXE.

Donagh
0
Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

 
LVL 10

Accepted Solution

by:
viktornet earned 30 total points
ID: 1337510
here is what you need...

var
  MyJpeg: TJpegImage;
  Image1: TImage;
begin
  Image1:= TImage.Create;
  MyJpeg:= TJpegImage.Create;
  Image1.LoadFromFile('TestImage.BMP');
  MyJpeg.Assign(Image1.Picture.Bitmap);  
object
  MyJpeg.SaveToFile('MyJPEGImage.JPG');
end;
Hope this helps..
Regards,
Viktor Ivanov
0
 
LVL 10

Expert Comment

by:viktornet
ID: 1337511
There is a word object which is not suppose to be there,....just erase it =)

Regards,
Viktor Ivanov
0
 
LVL 10

Expert Comment

by:viktornet
ID: 1337512
One more thing ...don't forget to free the objects you created when you finish working with then..like this....

Image1.Free;
MyJpeg.Free;

Regards,
Viktor Ivanov
0
 

Author Comment

by:d_kiernan
ID: 1337513
Thanks experts, that should do the trick

regards
Donagh
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Introduction The parallel port is a very commonly known port, it was widely used to connect a printer to the PC, if you look at the back of your computer, for those who don't have newer computers, there will be a port with 25 pins and a small print…
Have you ever had your Delphi form/application just hanging while waiting for data to load? This is the article to read if you want to learn some things about adding threads for data loading in the background. First, I'll setup a general applica…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now