Free EXIF Viewer & Image Metadata Privacy Analyzer
What's really hidden in your photos? Uncover GPS location, device info, forensic traces, and more
What Hidden Metadata Do Your Photos Contain?
Every digital photo contains hidden metadata — EXIF data, XMP properties, and IPTC fields embedded by your camera, phone, or editing software. This metadata can reveal your exact GPS location, the device you used, when the photo was taken, and even whether it was generated or edited by AI. Our free EXIF viewer lets you see everything before you share.
Complete Image Metadata & Forensic Analysis
GPS Location & Map View
Extract exact GPS coordinates embedded in EXIF data. View the photo's location on an interactive map with reverse geocoding to show the full address. Most smartphone photos contain precise latitude and longitude.
EXIF Data & Device Info
View complete EXIF metadata including camera make, model, serial number, lens info, aperture, shutter speed, ISO, focal length, and software version. This data can uniquely identify your device.
Timestamps & XMP/IPTC Data
See creation dates, modification timestamps, and editing history. View XMP metadata from Adobe tools and IPTC fields including copyright, author, caption, and keywords embedded in the image.
Embedded Thumbnails
Find hidden embedded thumbnails that may reveal a different crop of the original scene. Thumbnails can persist even after cropping or editing, potentially leaking the original unedited image.
Error Level Analysis (ELA)
Forensic ELA detects photo manipulation by re-compressing the image and comparing error levels. Edited regions show different compression artifacts, revealing splicing, cloning, or retouching.
Steganography Detection
Scan for hidden data embedded in image pixels using Least Significant Bit (LSB) analysis and chi-square statistical tests. Detect covert messages or files hidden inside ordinary-looking photos.
Face Detection
AI-powered face detection identifies people in your photos with bounding boxes and confidence scores. Faces can be used for facial recognition, identity tracking, and building biometric profiles without consent.
Text Detection (OCR)
Cloud-powered OCR scans for readable text in images including emails, phone numbers, street addresses, license plates, and other personally identifiable information (PII) that could be extracted.
Shutter Count Checker
Extract the shutter actuation count from your camera's EXIF data — the "odometer" for DSLRs and mirrorless cameras. Essential for buying or selling used camera bodies.
How to View EXIF Data & Analyze Image Metadata
Upload — Drop any JPEG, PNG, WebP, or HEIC image
Analyze — View EXIF, GPS, and privacy risk score
Forensics — ELA, steganography, faces, and OCR
Export — PDF report or strip metadata in one click
Why Check Image Metadata Before Sharing?
When you share photos on social media, messaging apps, or websites, the embedded metadata travels with the image. While some platforms strip EXIF data on upload, many do not — and even those that do may retain the data server-side. Here's what's at risk:
- Location tracking — GPS coordinates in photos can reveal your home address, workplace, children's school, or travel patterns
- Device fingerprinting — Camera serial numbers and unique device identifiers can link photos across platforms to build a profile of you
- Activity timeline — Timestamps create a detailed log of when and where you take photos throughout the day
- Editing history exposure — Software tags, editing timestamps, and embedded thumbnails can reveal what tools you used and what the original uncropped image looked like
- Hidden information — Embedded thumbnails, editing history, and steganographic data can leak information you thought was removed
Our image metadata analyzer runs entirely in your browser — your photos are never uploaded to any server. The EXIF viewer, GPS extraction, and forensic analysis all happen client-side for complete privacy. Only the optional OCR scan uses a cloud API for better accuracy.
Supported Image Formats
Our EXIF viewer and metadata analyzer supports all major image formats: JPEG (JPG), PNG, WebP, HEIC (iPhone photos), HEIF, TIFF, AVIF, BMP, and GIF. HEIC files from iPhones are automatically converted for analysis. The tool reads EXIF, XMP, IPTC, ICC Profile, and JFIF metadata standards.
What Can Someone Do With Your Photo Metadata?
Most people don't think twice before sharing a photo online. But the hidden data inside that image can be used in ways you'd never expect:
- Stalking and harassment — GPS coordinates in your photos can reveal your home address, daily routine, and the places you visit most. A single photo taken at home is enough for someone to find where you live.
- Doxxing — Combining device info, timestamps, and location data from multiple photos makes it easy to build a detailed profile of someone and expose their identity online.
- Corporate espionage — Photos taken inside offices or factories can leak device serial numbers, software versions, and location data that competitors or bad actors can exploit.
- Insurance and legal investigations — Lawyers and insurance companies routinely check photo metadata to verify when and where images were taken. Metadata can prove — or disprove — claims in court.
- Identity tracking across platforms — Your camera's unique serial number is embedded in every photo you take. Someone can use this to link photos you posted on different platforms back to you, even anonymous ones.
Which Social Media Platforms Strip Photo Metadata?
Not all platforms treat your photo metadata the same way. Some strip it on upload, others keep everything. Here's what happens to your EXIF data on popular platforms:
- Instagram — Strips all EXIF and GPS data from uploaded photos
- Facebook — Strips visible metadata but stores it on their servers for internal use
- Twitter / X — Strips EXIF data including GPS on upload
- Discord — Does not strip metadata. Photos shared on Discord keep all EXIF data intact, including GPS coordinates
- WhatsApp — Strips GPS location data but may keep some camera info
- iMessage — Keeps all metadata intact. Photos sent via iMessage contain full EXIF, GPS, and device data
- Email attachments — Keep all metadata. Emailing a photo sends every bit of hidden data along with it
- Reddit — Strips EXIF data on image uploads
The safest approach is to always check and strip metadata before sharing, regardless of the platform. Even platforms that strip data may change their policy, and they often retain the data on their servers even if they remove it from the visible image.
What Is Error Level Analysis (ELA) and Why Does It Matter?
Error Level Analysis — or ELA — is a simple but powerful way to check if a photo has been edited or tampered with. Here's how it works in plain English:
When you save a JPEG photo, the image gets compressed. If you save it again, it gets compressed a second time. The key insight is that parts of the image that have been edited will compress differently than parts that haven't been touched.
ELA works by re-saving the image at a specific quality level and then comparing the "error" — the difference between the original and the re-saved version. In an unedited photo, the error levels are roughly the same across the whole image. But if someone pasted in a face, added an object, or cloned part of the background, those edited areas will show up with noticeably different error levels.
This technique is used by journalists to verify news photos, fact-checkers to spot manipulated images on social media, forensic investigators in legal cases, and content moderators to detect doctored images. Our tool runs ELA right in your browser so you can check any photo instantly.
Note: ELA works best on photos that haven't been re-saved multiple times. Screenshots, images from Canva, or heavily re-compressed images may not show clear results because the entire image has been uniformly compressed.
What Is Steganography? Hidden Messages Inside Photos
Steganography is the art of hiding secret information inside an ordinary-looking image. The word comes from Greek, meaning "covered writing." Unlike encryption (which scrambles data so it's unreadable), steganography hides data so you don't even know it's there.
Here's how it works: every pixel in a digital image is stored as a number. A tiny change to that number — like changing the very last digit — is invisible to the human eye but can encode hidden data. By making these tiny tweaks across thousands of pixels, you can hide entire text messages, files, or even other images inside a single photo.
This might sound like something out of a spy movie, but steganography is used more often than you'd think:
- Tracking and watermarking — Companies embed invisible tracking codes in images to identify who leaked a document or photo
- Covert communication — Hidden messages can be embedded in innocent-looking photos shared on public forums
- Malware delivery — Attackers have hidden malicious code inside image files to bypass security scanners
- Copyright protection — Photographers embed invisible watermarks to prove ownership of their images
Our steganography detector analyzes the hidden bits of your image and uses statistical tests to flag anything suspicious. If the pattern of those tiny pixel changes doesn't look random, there might be something hidden inside.
What Are Hidden Thumbnails and Why Should You Care?
When your camera or phone takes a photo, it often saves a small preview image — called a thumbnail — inside the photo file itself. This thumbnail is used to show quick previews in file browsers and galleries. Sounds harmless, right?
The problem is that this thumbnail is created at the moment the photo is taken, and it doesn't always get updated when you edit the photo. This means:
- If you crop out a person from a photo, the original uncropped image may still be visible in the embedded thumbnail
- If you blur sensitive information like a license plate or address, the thumbnail may still show the unblurred version
- If you edit or retouch a photo, the thumbnail might reveal what the original looked like before your changes
This has caused real privacy incidents — people have shared "cropped" photos online, not realizing the embedded thumbnail still showed the full original image. Our analyzer extracts and displays any embedded thumbnails so you can compare them with the main image and spot any differences before sharing.
What Is Shutter Count and How to Check It
Every DSLR and mirrorless camera has a mechanical shutter — a physical curtain that opens and closes each time you take a photo. The shutter count (also called "actuation count") is the total number of times this shutter has fired. Think of it as the odometer on a car.
Why does it matter? Mechanical shutters have a limited lifespan:
- Entry-level DSLRs — typically rated for 100,000–150,000 actuations
- Mid-range cameras — usually rated for 150,000–200,000 actuations
- Professional bodies (Canon 1DX, Nikon D6) — rated for 400,000–500,000 actuations
When buying or selling a used camera, shutter count is the single most important number. A Canon R5 with 10,000 actuations is worth significantly more than one with 200,000. Some cameras embed this count directly in the EXIF metadata of every photo they take — our analyzer extracts it automatically.
Note: Not all cameras store shutter count in accessible EXIF fields. Canon and Nikon DSLRs typically do, while Sony and many mirrorless cameras store it in proprietary MakerNote fields that may require manufacturer-specific software to read. Smartphones do not track shutter count.
EXIF vs XMP vs IPTC — What's the Difference?
Photos can contain several different types of metadata. Here's a quick breakdown of the three main standards:
- EXIF (Exchangeable Image File Format) — The most common type. Added automatically by your camera or phone. Contains technical data like camera model, shutter speed, ISO, GPS location, and timestamps. You can't control what goes in — your device writes it automatically.
- XMP (Extensible Metadata Platform) — Created by Adobe. Used by editing tools like Photoshop, Lightroom, and Canva. Contains editing history, color profiles, and software information. If you've ever edited a photo in any Adobe tool, XMP data is probably embedded.
- IPTC (International Press Telecommunications Council) — Used mainly by photographers, news agencies, and stock photo sites. Contains fields like photographer name, copyright info, captions, and keywords. If you've ever downloaded a stock photo, it likely has IPTC data.
Our analyzer reads all three standards plus ICC color profiles and JFIF headers, giving you a complete picture of everything hidden inside your image file.
Who Uses Image Forensic Analysis?
Image forensics isn't just for tech experts. A wide range of people rely on metadata analysis and image forensic tools every day:
- Journalists and fact-checkers — Verify whether a news photo is authentic or manipulated before publishing
- Law enforcement — Extract GPS coordinates and timestamps from photos as evidence in investigations
- Insurance investigators — Check if claim photos were actually taken when and where the claimant says
- Content moderators — Detect doctored or misleading images on social platforms
- Photographers — Protect their copyright by checking for unauthorized use and verifying image authenticity
- Privacy-conscious individuals — Anyone who wants to know what personal data they're exposing before sharing photos online
Frequently Asked Questions
What is EXIF data in a photo?
EXIF (Exchangeable Image File Format) is metadata automatically embedded in photos by cameras and smartphones. It includes technical details like camera model, aperture, shutter speed, ISO, and focal length, as well as GPS coordinates, timestamps, and software information. EXIF data is invisible when viewing the image but can be read by anyone with the right tools.
Can someone find my location from a photo?
Yes. If GPS geotagging is enabled on your phone (it is by default on most devices), every photo you take contains exact latitude and longitude coordinates. Anyone who downloads the image can extract these GPS coordinates and pinpoint where the photo was taken — often accurate to within a few meters. Our analyzer shows you exactly what GPS data is embedded and maps the location.
What is Error Level Analysis (ELA)?
Error Level Analysis is a forensic technique used to detect image manipulation. It works by re-compressing the image at a known quality level and comparing the result with the original. Regions that have been edited will show different error levels than the rest of the image because they've been through a different number of compression cycles. ELA is widely used by journalists, fact-checkers, and forensic investigators.
Is my image uploaded to a server?
No. All metadata analysis, EXIF reading, GPS extraction, ELA, steganography detection, and face detection run entirely in your browser using JavaScript. Your images never leave your device. The only exception is the optional OCR text detection, which uses a cloud API for better accuracy — but you must click "Run OCR" to activate it.
What is steganography in images?
Steganography is the practice of hiding secret data inside ordinary-looking images by modifying the least significant bits of pixel values. The changes are invisible to the human eye but can encode hidden messages, files, or tracking data. Our steganography detector analyzes the hidden bits and uses statistical tests to identify suspicious patterns.
How do I remove metadata from my photos?
After analyzing your image, click the "Clean This Image" button to automatically transfer it to our AI Metadata Cleaner. The cleaner strips all EXIF, XMP, IPTC, and GPS data, applies subtle pixel modifications to defeat AI detection and reverse image search, and exports a clean JPEG — all in your browser.
Do screenshots contain EXIF data?
Screenshots typically contain much less metadata than camera photos. They usually include the device model and a timestamp, but no GPS location, camera settings, or lens info. However, screenshots from some phones may still include device identifiers. It's always worth checking.
Does WhatsApp remove photo metadata?
WhatsApp strips GPS location data when you send a photo, but may keep some camera information. However, if you send a photo as a "document" attachment instead of an image, WhatsApp preserves all original metadata including GPS. The safest approach is to strip metadata yourself before sending.
Can EXIF data be faked or edited?
Yes. EXIF data can be modified or completely rewritten using various tools. Someone could change the GPS coordinates, timestamps, or camera info in a photo. This is why forensic analysis (like ELA) is important — it looks at the actual pixel data rather than trusting the metadata, which can be forged.
What is an embedded thumbnail in a photo?
An embedded thumbnail is a small preview image stored inside the photo file. It's created when the photo is taken and is used for quick previews. The problem is that editing or cropping the main image doesn't always update the thumbnail — so the original uncropped or unedited version may still be visible inside the file.
How do I check my camera's shutter count?
Upload any recent photo from your camera to our analyzer. If your camera embeds shutter count in its EXIF data (most Canon and Nikon DSLRs do), we'll extract and display it automatically. The shutter count tells you how many photos the camera has taken — like an odometer on a car. This is essential when buying or selling used camera bodies.
