Forensic Image EXIF Reader Free
Read EXIF, GPS coordinates, XMP edit history, IPTC copyright, and maker notes from JPEG, HEIC, TIFF, and RAW photos. Detect duplicates, compare metadata side-by-side, and export to CSV, KML, GeoJSON, or PDF. 100% client-side — your images never leave your browser.
Drop image files or folders here
Tap to add image files
JPEG, HEIC, TIFF, DNG, CR2, NEF, ARW, and more
JPEG · HEIC/HEIF · TIFF · DNG · CR2 (Canon) · NEF (Nikon) · ARW (Sony) · ORF (Olympus) · RW2 (Panasonic) · RAF (Fujifilm) · PNG* · WebP*
* PNG/WebP: only if EXIF was embedded at capture time
Add image files to begin extracting metadata. Results appear here as each file is parsed.
How to Read and Analyze Image EXIF Data
Load your image files
Drag JPEG, HEIC, TIFF, DNG, or RAW files onto the drop zone, or use the Add Images / Add Folder buttons. Multiple files and entire folders are supported. Always work from forensic copies to preserve the original evidence.
Triage with the results table
Each file shows its camera, date, GPS status, and anomaly flags at a glance. Rows are tinted red for critical anomalies and amber for warnings like duplicate files. Sort by any column to prioritize what matters. Hover thumbnails for a quick 300px preview.
Deep-dive in the detail overlay
Click any file to open nine collapsible sections: capture settings (aperture, ISO, focal length including 35mm equivalent), camera & lens serial numbers, timestamps with timezone conversion, interactive GPS map, image properties, copyright & IPTC, XMP edit history, ICC color profile, and the full raw EXIF dump.
Detect anomalies and duplicates
The tool automatically flags future dates, timestamp conflicts, edit software, GPS gaps, and duplicate files (matched by SHA-256 hash). The modification date delta card shows exactly how long after capture a file was edited, helping you assess image authenticity.
Compare two files side-by-side
Select exactly two files and click Compare to see a field-by-field diff across 20 metadata attributes. Matching fields are highlighted green and mismatches red, making it easy to spot differences in camera, settings, GPS location, or timestamps between two images.
Export and cross-reference
Export to CSV for spreadsheet analysis, KML or GeoJSON for mapping GPS locations in Google Earth or QGIS, PDF for printable forensic reports, or JSON for the complete raw data. Cross-reference timestamps with the Timestamp Decoder and coordinates with the IP Lookup tool.
What EXIF Data Can This Tool Extract?
Camera & Capture Settings
Make, model, lens, aperture (f-stop), shutter speed, ISO, focal length, 35mm equivalent focal length, flash, white balance, metering mode, and exposure program. Identifies the exact device and settings used for each shot.
GPS Geolocation
Latitude, longitude, altitude, speed, direction, satellite count, HDOP precision, and GPS timestamp. View locations on an interactive map and export to KML for Google Earth or GeoJSON for GIS tools.
Timestamps & Timezone Analysis
Date taken, date digitized, XMP modify date, metadata date, and create date. Convert between UTC and any timezone. The modification delta shows exactly when a file was edited relative to capture.
Device Identity & Serial Numbers
Camera body serial number, lens serial number, firmware version, and maker-note fields. Links images to specific physical devices for authentication and chain-of-custody analysis.
Edit History & Software Detection
XMP edit history with action, timestamp, and software agent for each operation. Detects Photoshop, Lightroom, GIMP, Snapseed, Affinity Photo, and other editing applications. Shows XMP document IDs for tracking derivative works.
Copyright, IPTC & ICC Profiles
Artist, copyright notice, credit, source, headline, caption, keywords, city, state, and country from IPTC. ICC color profile name, color space, rendering intent, and profile creator for color management forensics.
Frequently Asked Questions
An EXIF reader extracts hidden metadata embedded inside image files. When a camera or phone takes a photo, it records technical details like camera model, lens, aperture, shutter speed, ISO, GPS coordinates, and timestamps directly into the file. This tool reads all of that data from JPEG, HEIC, TIFF, DNG, and RAW files without uploading anything to a server.
JPEG, HEIC/HEIF, TIFF, DNG, CR2/CR3 (Canon), NEF/NRW (Nikon), ARW (Sony), ORF (Olympus), RW2 (Panasonic), RAF (Fujifilm), SRW (Samsung), PEF (Pentax), and other RAW formats. PNG and WebP have partial support when EXIF data was embedded at capture time. This tool is designed for image files only—it does not read metadata from PDFs, Word documents, or video files.
No. Everything runs entirely in your browser using the exifr library inside a Web Worker. Your images never leave your device. SHA-256 hashes are computed using the browser's built-in Web Crypto API. You can verify this by disconnecting from the internet and using the tool normally—all features continue to work offline.
GPS coordinates embedded in EXIF data place a camera at a specific location at a specific time. Investigators use this to corroborate witness accounts, map subject movements, or verify where a photo was taken. The GPS satellite timestamp can be compared against the camera clock to detect clock manipulation. This tool also calculates the distance and time elapsed between consecutive photos in the report timeline, which can reveal travel patterns.
Yes. Facebook, Twitter/X, Instagram, Reddit, and most platforms strip EXIF data from uploaded images to protect user privacy. If you receive an image that passed through social media, expect the metadata to be gone. However, original images shared via email, messaging apps (Signal, Telegram, WhatsApp when sent as documents), cloud storage (Google Drive, Dropbox), or direct download typically retain their full EXIF data.
The "Edited" badge appears when the Software or CreatorTool field contains the name of a known photo editing application—Adobe Photoshop, Lightroom, GIMP, Snapseed, Affinity Photo, Capture One, Canva, Pixelmator, and others. This means the image was processed after capture. The original camera metadata is usually still present, but the pixel content may have been altered. Check the XMP edit history section for a step-by-step log of every saved edit.
The tool computes a SHA-256 hash of each file's raw bytes. When two or more files share the same hash, they are byte-for-byte identical copies. These files are flagged with an amber "DUPLICATE" badge in the table and appear as a warning anomaly. This helps identify re-saved copies in evidence collections and can reveal when the same image appears under different filenames.
Select exactly two files using the checkboxes and click "Compare." The comparison overlay shows 20 metadata fields—filename, type, size, dimensions, camera, lens, serials, dates, software, exposure settings, focal length, GPS, hash, and anomalies—in a two-column table. Matching values are highlighted green and differences red, so you can quickly identify what changed between two versions of an image or two images from different cameras.
Camera manufacturers embed body and lens serial numbers in proprietary maker note fields within the EXIF data. These serials link a specific image to a specific physical device. In forensic investigations, matching serial numbers across multiple images can prove they came from the same camera. This is valuable for authentication, chain of custody, and linking a suspect's device to a set of images.
Always work from a forensic copy, never the original file. Use the SHA-256 hash displayed in this tool to verify the file was not modified during analysis. Export the full metadata to JSON for a machine-readable record. Generate a PDF or printable HTML report that includes the hash, methodology, and analysis date. Document your tool, version, and the date of extraction. For court submissions, corroborate findings with a validated forensic tool like ExifTool.
CSV — Spreadsheet-compatible table of all extracted fields. JSON — Complete raw EXIF/XMP/IPTC/ICC data for programmatic analysis. KML — GPS locations for Google Earth, Apple Maps, and QGIS. GeoJSON — GPS locations in the standard GIS format used by Leaflet, Mapbox, and other mapping tools. PDF — Printable forensic report with thumbnails, maps, and methodology section. HTML — Standalone report file with interactive Leaflet maps.
When a file has both a DateTimeOriginal (when the photo was taken) and an XMP ModifyDate or MetadataDate (when it was last edited), the tool calculates the time difference between them. This "modification delta" tells you exactly how long after capture the file was modified. A large gap—days, weeks, or months—may indicate the image was edited well after it was taken. A modification date that predates the capture date is flagged as anomalous.
Phil Harvey's ExifTool supports over 300 file formats (including video, audio, PDF, and Office documents), reads deeply embedded vendor-proprietary tags, and handles edge cases that browser-based parsers cannot reach. This tool covers the most commonly needed forensic fields for JPEG, HEIC, TIFF, and major RAW formats in a convenient, zero-install browser interface. For comprehensive analysis, unusual formats, or command-line batch workflows, ExifTool remains the industry standard.
Yes. Use the Timestamp Decoder to compare EXIF timestamps against timestamps from URLs, APIs, social media snowflake IDs, or Unix epoch values. Use the IP Lookup tool to correlate GPS coordinates with network-level geolocation data from the same investigation. Export GPS locations to GeoJSON and overlay them with other geospatial data in QGIS or Leaflet.
Learn More: What Is EXIF Data and Why It Matters
A comprehensive guide covering GPS coordinates in photos, timestamp analysis, camera identification, how EXIF data gets removed or modified, and best practices for handling EXIF evidence in investigations.
Read the Full GuideFrom EXIF Data to Complete Investigation
GPS coordinates, camera serials, and timestamps extracted from images are one piece of the puzzle. The Forensic OSINT browser extension lets you capture web pages, annotate screenshots, and build investigation timelines that tie your metadata findings to the broader picture.

