Forensic Image EXIF Reader Free

Read EXIF, GPS coordinates, XMP edit history, IPTC copyright, and maker notes from JPEG, HEIC, TIFF, and RAW photos. Detect duplicates, compare metadata side-by-side, and export to CSV, KML, GeoJSON, or PDF. 100% client-side — your images never leave your browser.

No Upload RequiredGPS MapsEdit HistorySide-by-Side CompareCSV / KML / GeoJSON / PDFAnomaly Detection
info3 of 3 free uses remaining· Sign up free for 100 uses/month — no credit card required

save Saved locally in your browser. Never uploaded. Included in all reports.

image_search

Drop image files or folders here

Tap to add image files

JPEG, HEIC, TIFF, DNG, CR2, NEF, ARW, and more

JPEG · HEIC/HEIF · TIFF · DNG · CR2 (Canon) · NEF (Nikon) · ARW (Sony) · ORF (Olympus) · RW2 (Panasonic) · RAF (Fujifilm) · PNG* · WebP*

* PNG/WebP: only if EXIF was embedded at capture time

lock100% private. Images never leave your browser. No upload. No server.

Add image files to begin extracting metadata. Results appear here as each file is parsed.

How to Read and Analyze Image EXIF Data

1

Load your image files

Drag JPEG, HEIC, TIFF, DNG, or RAW files onto the drop zone, or use the Add Images / Add Folder buttons. Multiple files and entire folders are supported. Always work from forensic copies to preserve the original evidence.

2

Triage with the results table

Each file shows its camera, date, GPS status, and anomaly flags at a glance. Rows are tinted red for critical anomalies and amber for warnings like duplicate files. Sort by any column to prioritize what matters. Hover thumbnails for a quick 300px preview.

3

Deep-dive in the detail overlay

Click any file to open nine collapsible sections: capture settings (aperture, ISO, focal length including 35mm equivalent), camera & lens serial numbers, timestamps with timezone conversion, interactive GPS map, image properties, copyright & IPTC, XMP edit history, ICC color profile, and the full raw EXIF dump.

4

Detect anomalies and duplicates

The tool automatically flags future dates, timestamp conflicts, edit software, GPS gaps, and duplicate files (matched by SHA-256 hash). The modification date delta card shows exactly how long after capture a file was edited, helping you assess image authenticity.

5

Compare two files side-by-side

Select exactly two files and click Compare to see a field-by-field diff across 20 metadata attributes. Matching fields are highlighted green and mismatches red, making it easy to spot differences in camera, settings, GPS location, or timestamps between two images.

6

Export and cross-reference

Export to CSV for spreadsheet analysis, KML or GeoJSON for mapping GPS locations in Google Earth or QGIS, PDF for printable forensic reports, or JSON for the complete raw data. Cross-reference timestamps with the Timestamp Decoder and coordinates with the IP Lookup tool.

What EXIF Data Can This Tool Extract?

camera_alt

Camera & Capture Settings

Make, model, lens, aperture (f-stop), shutter speed, ISO, focal length, 35mm equivalent focal length, flash, white balance, metering mode, and exposure program. Identifies the exact device and settings used for each shot.

gps_fixed

GPS Geolocation

Latitude, longitude, altitude, speed, direction, satellite count, HDOP precision, and GPS timestamp. View locations on an interactive map and export to KML for Google Earth or GeoJSON for GIS tools.

schedule

Timestamps & Timezone Analysis

Date taken, date digitized, XMP modify date, metadata date, and create date. Convert between UTC and any timezone. The modification delta shows exactly when a file was edited relative to capture.

fingerprint

Device Identity & Serial Numbers

Camera body serial number, lens serial number, firmware version, and maker-note fields. Links images to specific physical devices for authentication and chain-of-custody analysis.

edit_note

Edit History & Software Detection

XMP edit history with action, timestamp, and software agent for each operation. Detects Photoshop, Lightroom, GIMP, Snapseed, Affinity Photo, and other editing applications. Shows XMP document IDs for tracking derivative works.

copyright

Copyright, IPTC & ICC Profiles

Artist, copyright notice, credit, source, headline, caption, keywords, city, state, and country from IPTC. ICC color profile name, color space, rendering intent, and profile creator for color management forensics.

Frequently Asked Questions

info
Not a replacement for ExifTool. This tool extracts EXIF, GPS, XMP, IPTC, and maker notes from common image formats entirely in your browser. For deeper RAW analysis, vendor-specific proprietary data, or 300+ supported formats, use Phil Harvey's ExifTool, the definitive command-line tool trusted by digital forensics professionals worldwide. exiftool.org

An EXIF reader extracts hidden metadata embedded inside image files. When a camera or phone takes a photo, it records technical details like camera model, lens, aperture, shutter speed, ISO, GPS coordinates, and timestamps directly into the file. This tool reads all of that data from JPEG, HEIC, TIFF, DNG, and RAW files without uploading anything to a server.

JPEG, HEIC/HEIF, TIFF, DNG, CR2/CR3 (Canon), NEF/NRW (Nikon), ARW (Sony), ORF (Olympus), RW2 (Panasonic), RAF (Fujifilm), SRW (Samsung), PEF (Pentax), and other RAW formats. PNG and WebP have partial support when EXIF data was embedded at capture time. This tool is designed for image files only—it does not read metadata from PDFs, Word documents, or video files.

No. Everything runs entirely in your browser using the exifr library inside a Web Worker. Your images never leave your device. SHA-256 hashes are computed using the browser's built-in Web Crypto API. You can verify this by disconnecting from the internet and using the tool normally—all features continue to work offline.

GPS coordinates embedded in EXIF data place a camera at a specific location at a specific time. Investigators use this to corroborate witness accounts, map subject movements, or verify where a photo was taken. The GPS satellite timestamp can be compared against the camera clock to detect clock manipulation. This tool also calculates the distance and time elapsed between consecutive photos in the report timeline, which can reveal travel patterns.

Yes. Facebook, Twitter/X, Instagram, Reddit, and most platforms strip EXIF data from uploaded images to protect user privacy. If you receive an image that passed through social media, expect the metadata to be gone. However, original images shared via email, messaging apps (Signal, Telegram, WhatsApp when sent as documents), cloud storage (Google Drive, Dropbox), or direct download typically retain their full EXIF data.

The "Edited" badge appears when the Software or CreatorTool field contains the name of a known photo editing application—Adobe Photoshop, Lightroom, GIMP, Snapseed, Affinity Photo, Capture One, Canva, Pixelmator, and others. This means the image was processed after capture. The original camera metadata is usually still present, but the pixel content may have been altered. Check the XMP edit history section for a step-by-step log of every saved edit.

The tool computes a SHA-256 hash of each file's raw bytes. When two or more files share the same hash, they are byte-for-byte identical copies. These files are flagged with an amber "DUPLICATE" badge in the table and appear as a warning anomaly. This helps identify re-saved copies in evidence collections and can reveal when the same image appears under different filenames.

Select exactly two files using the checkboxes and click "Compare." The comparison overlay shows 20 metadata fields—filename, type, size, dimensions, camera, lens, serials, dates, software, exposure settings, focal length, GPS, hash, and anomalies—in a two-column table. Matching values are highlighted green and differences red, so you can quickly identify what changed between two versions of an image or two images from different cameras.

Camera manufacturers embed body and lens serial numbers in proprietary maker note fields within the EXIF data. These serials link a specific image to a specific physical device. In forensic investigations, matching serial numbers across multiple images can prove they came from the same camera. This is valuable for authentication, chain of custody, and linking a suspect's device to a set of images.

Always work from a forensic copy, never the original file. Use the SHA-256 hash displayed in this tool to verify the file was not modified during analysis. Export the full metadata to JSON for a machine-readable record. Generate a PDF or printable HTML report that includes the hash, methodology, and analysis date. Document your tool, version, and the date of extraction. For court submissions, corroborate findings with a validated forensic tool like ExifTool.

CSV — Spreadsheet-compatible table of all extracted fields. JSON — Complete raw EXIF/XMP/IPTC/ICC data for programmatic analysis. KML — GPS locations for Google Earth, Apple Maps, and QGIS. GeoJSON — GPS locations in the standard GIS format used by Leaflet, Mapbox, and other mapping tools. PDF — Printable forensic report with thumbnails, maps, and methodology section. HTML — Standalone report file with interactive Leaflet maps.

When a file has both a DateTimeOriginal (when the photo was taken) and an XMP ModifyDate or MetadataDate (when it was last edited), the tool calculates the time difference between them. This "modification delta" tells you exactly how long after capture the file was modified. A large gap—days, weeks, or months—may indicate the image was edited well after it was taken. A modification date that predates the capture date is flagged as anomalous.

Phil Harvey's ExifTool supports over 300 file formats (including video, audio, PDF, and Office documents), reads deeply embedded vendor-proprietary tags, and handles edge cases that browser-based parsers cannot reach. This tool covers the most commonly needed forensic fields for JPEG, HEIC, TIFF, and major RAW formats in a convenient, zero-install browser interface. For comprehensive analysis, unusual formats, or command-line batch workflows, ExifTool remains the industry standard.

Yes. Use the Timestamp Decoder to compare EXIF timestamps against timestamps from URLs, APIs, social media snowflake IDs, or Unix epoch values. Use the IP Lookup tool to correlate GPS coordinates with network-level geolocation data from the same investigation. Export GPS locations to GeoJSON and overlay them with other geospatial data in QGIS or Leaflet.

menu_book

Learn More: What Is EXIF Data and Why It Matters

A comprehensive guide covering GPS coordinates in photos, timestamp analysis, camera identification, how EXIF data gets removed or modified, and best practices for handling EXIF evidence in investigations.

Read the Full Guide arrow_forward

From EXIF Data to Complete Investigation

GPS coordinates, camera serials, and timestamps extracted from images are one piece of the puzzle. The Forensic OSINT browser extension lets you capture web pages, annotate screenshots, and build investigation timelines that tie your metadata findings to the broader picture.

Minimum Requirements:

  • 8 Characters
  • 1 Upper
  • 1 Lower
  • 1 Digit