Solved

Copy Window's DC to a buffer

Posted on 2002-07-10
3
447 Views
Last Modified: 2013-11-20
I have a window's handle that is displaying an image. I know this image's size. How can I copy the data of that image to a buffer? I know how to use the bitblt function to copy from window to window.
0
Comment
Question by:skibud2
  • 2
3 Comments
 
LVL 23

Accepted Solution

by:
Roshan Davis earned 40 total points
ID: 7145188
Use GetDIBits API.

Roshmon
0
 

Author Comment

by:skibud2
ID: 7146592
what do I use for the handle of the bit map?
0
 
LVL 23

Expert Comment

by:Roshan Davis
ID: 7148246
create a bitmap compatible to hDC using CreateCompatibleBitmap API

Roshmon
0

Featured Post

NAS Cloud Backup Strategies

This article explains backup scenarios when using network storage. We review the so-called “3-2-1 strategy” and summarize the methods you can use to send NAS data to the cloud

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Unix / Linux grid computing 5 157
Macro to save highlighted rows as a separate file 5 43
Expand data scrubbing tool 13 32
How to determine file rename from EventLog ? 2 49
Introduction: Displaying information on the statusbar.   Continuing from the third article about sudoku.   Open the project in visual studio. Status bar – let’s display the timestamp there.  We need to get the timestamp from the document s…
Introduction: Finishing the grid – keyboard support for arrow keys to manoeuvre, entering the numbers.  The PreTranslateMessage function is to be used to intercept and respond to keyboard events. Continuing from the fourth article about sudoku. …
This video will show you how to get GIT to work in Eclipse.   It will walk you through how to install the EGit plugin in eclipse and how to checkout an existing repository.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question