Image Metadata Viewer
View file info, dimensions, aspect ratio, and basic EXIF data from any image.
Reviewed by Aygul Dovletova · Last reviewed
Drop an image here or click to upload
View file metadata and basic EXIF data
How to Use the Image Metadata Viewer
- Drop or pick any image. The File API exposes name, size, type, and last-modified date without reading pixel content.
- Review the file facts panel: MIME type as detected by the browser, byte size, last-modified timestamp, and readable name.
- Check the dimensions panel: width and height in pixels (read by decoding the image to an ImageBitmap), derived aspect ratio, and megapixel count.
- Scroll to the EXIF panel for JPEG inputs. The tool parses the raw ArrayBuffer to find the APP1 marker and pull out camera make, model, orientation, software used, and full datetime.
- Inspect GPS coordinates if they are embedded. Phone cameras often record latitude and longitude in EXIF - this panel surfaces them as decimal degrees so you can see what leaks with the file.
What Is Actually Stored in an Image File
An image file is not just pixels - it is a container with a structured header, optional metadata blocks, and a compressed pixel payload. JPEG files (JFIF container, ISO/IEC 10918-1) begin with the SOI marker 0xFFD8, followed by a chain of "APP" segments: APP0 is the JFIF thumbnail, APP1 usually holds EXIF (and sometimes XMP), APP2 often carries the ICC color profile, and APP13 is Photoshop/IPTC data. The EXIF 2.32 specification defines a TIFF-style IFD (Image File Directory) inside APP1 with numbered tags: 0x010F for camera make, 0x0110 for model, 0x0132 for datetime, 0x8825 for the GPS sub-IFD containing latitude and longitude.
We parse these structures directly in the browser by reading the file into an ArrayBuffer with FileReader, then walking the byte stream to find markers and decode the tagged values. No EXIF library is downloaded at runtime - the parser is custom and minimal. PNG files use a different layout (IHDR, tEXt, zTXt, iTXt chunks per the W3C PNG specification), and WebP stores metadata in RIFF chunks (EXIF, XMP, ICCP), so the displayed data differs by format.
When Metadata Inspection Matters
- Verifying an uploaded photo is genuinely from the claimed camera and was not a screenshot of someone else\'s work (forensic check).
- Auditing your own photo library before a public post to see exactly what would leak if you forget to strip EXIF.
- Journalism: confirming the capture timestamp on a source\'s photo to corroborate timing of events.
- Real estate or architecture: reading dimensions and DPI from a scan to know whether the image will hold up at print size.
- Debugging why an image looks different on two devices - the embedded ICC profile and color tags are often the culprit.
- Recovering the approximate shot location from a photo someone sent you, via embedded GPS tags.
The Privacy Side of EXIF Data
- GPS coordinates reveal where you were. A phone photo uploaded directly to a blog or forum can include latitude and longitude accurate to a few meters - enough to identify your home, a friend\'s apartment, a hotel room, or the exact spot you took a wildlife shot.
- Camera serial numbers tie photos to devices. EXIF tag 0xA431 stores a body serial number. If you have ever posted any photo from that camera with other metadata (your name, your gallery profile), a serial correlation can deanonymize future "anonymous" posts.
- Timestamps reveal patterns. The DateTimeOriginal tag shows capture time to the second. Over many photos this builds a surprisingly detailed schedule of your day.
- Software history is there too. The Software tag often says "Adobe Photoshop 2025" or "VSCO 6.2" or "Snapseed 2.21", exposing your editing toolchain.
- Thumbnail embedded. EXIF can include a small thumbnail that was set at capture. If you edit the main image but not the thumbnail, the thumbnail can reveal pre-edit content - a classic forensic trick.
- Many platforms strip EXIF automatically. Instagram, Facebook, Twitter, and Discord remove most EXIF on upload. Reddit, forum software, self-hosted blogs, and direct email attachments do not. Assume nothing is stripped unless you have verified it.
Why EXIF Exists in the First Place
EXIF (Exchangeable Image File Format) was standardized in 1995 by JEIDA as a way for consumer cameras to embed shooting parameters - exposure, aperture, shutter speed, focal length, ISO - into the photo file itself. The spec grew to cover GPS (EXIF 2.2, 2002), lens ID, and color intent; EXIF 2.32 (2019) adds HDR gain-map support. Adjacent standards coexist in the same file: XMP (Adobe Extensible Metadata Platform, ISO 16684-1) uses RDF/XML for editable metadata; IPTC carries caption and byline data for photojournalists; ICC profiles (ISO 15076) carry the color space definition. A single JPEG from a modern phone may contain all four systems at once.
How This Compares to Desktop Inspectors
ExifTool by Phil Harvey is the gold standard on the command line: it reads and writes hundreds of tag types across every image and video format, including maker-specific tags that document proprietary camera internals. Adobe Bridge, Photo Mechanic, and digiKam provide graphical metadata editors with batch support. Mac Preview\'s "Show Inspector" panel and Windows Explorer\'s Properties > Details tab show the common tags. This tool covers the 80% use case - "what does my photo reveal?" - in a browser tab without installing anything. For deep forensic inspection or editing metadata in place, switch to ExifTool.
Frequently Asked Questions
Does the tool upload my image to read its metadata?
No. The file is read into an ArrayBuffer via the local FileReader API, and the EXIF, PNG, and WebP parsers walk the bytes in your browser without any network call. None of the metadata, pixel data, or embedded GPS coordinates are transmitted anywhere. You can test this with DevTools open: the Network tab stays silent throughout the read.
Why does my screenshot show no EXIF data?
EXIF tags are written by cameras at capture time, and operating system screenshot tools do not generate them. macOS Screenshot, Windows Snipping Tool, and Linux GNOME Screenshot all produce PNG files with only the bare PNG chunks (IHDR for dimensions, IDAT for pixels) and no EXIF. The absence of EXIF on a "photo" is itself a forensic signal that it was a screenshot or re-save, not an original camera capture.
Can someone really find my home from GPS coordinates in a photo?
Yes, when they are present. Phone cameras record latitude and longitude accurate to within a few meters in the EXIF GPS sub-IFD. A photo you posted of your dog in the living room contains the coordinates of your living room. Mapping those coordinates in Google Maps typically resolves to a specific street address. Always strip EXIF before posting location-sensitive photos publicly.
How do I strip EXIF after reviewing it here?
Re-saving the image through the Image Format Converter or Image Compressor in this tool suite drops all EXIF data, because the Canvas re-encode starts from raw pixels with no metadata. On the command line, <code>exiftool -all= photo.jpg</code> strips every tag in place, and ImageMagick's <code>magick input.jpg -strip output.jpg</code> does the same. On mobile, Apple's iOS 15+ "Share > Options > Location: Off" strips GPS at share time.
What EXIF fields does the tool actually display?
Camera make (tag 0x010F), camera model (0x0110), software used (0x0131), datetime of original capture (0x9003), the main image datetime (0x0132), orientation (0x0112), X and Y resolution (0x011A, 0x011B), and if present, GPS latitude and longitude from the GPS IFD (0x8825). More exotic maker-specific tags are not parsed - use ExifTool for full coverage.
Why is there no EXIF on my PNG file?
PNG has its own metadata container (tEXt, zTXt, iTXt chunks defined in the W3C PNG specification) which is used rarely and rarely holds camera data. PNG was designed for graphics and screenshots, not photography, so the ecosystem never really embedded EXIF into it. Recent PNG specifications do allow an eXIf chunk, but support is spotty. If you see no EXIF on a PNG, that is expected - not a bug.
What is an ICC color profile and why does it matter?
An ICC profile (ISO 15076-1) describes the color space the image data is encoded in - sRGB, Display P3, Adobe RGB, ProPhoto RGB, or a custom monitor profile. Without the profile, software assumes sRGB and may display your wide-gamut photo with flat, desaturated colors. A photo tagged Display P3 on an iPhone looks vivid on a P3 display and muddy on a non-color-managed browser. Inspecting the profile helps debug cross-device color differences.
How does the tool detect image dimensions?
We create an ImageBitmap via <code>createImageBitmap(file)</code>, which triggers the browser to decode just enough of the image header to know its width and height. For JPEG this is the SOF0 or SOF2 marker, for PNG it is the IHDR chunk, for WebP the VP8/VP8L/VP8X chunks. The pixels are decoded into an off-screen bitmap, but that bitmap never becomes a canvas or a network payload - we just read two numbers from it.
Can metadata be forged or manipulated?
Yes, trivially. ExifTool can rewrite any tag to any value - fake a camera model, forge a timestamp, lie about GPS coordinates. Metadata inspection is useful for spotting accidental leaks and for plausible provenance, but it is not a forensic guarantee of authenticity. Cryptographic standards like C2PA (Content Credentials) add signed provenance chains that are tamper-evident, which this tool does not yet parse.
More Image Tools
Base64 to Image Converter
Decode a Base64 string or data URL back into a viewable image and download it as PNG, JPG, WebP or GIF. Runs in your browser.
Open toolFavicon Generator
Generate favicons in all standard sizes (16x16 to 512x512) for websites and PWAs.
Open toolImage Blur & Pixelate
Apply blur or pixelation effects to images with adjustable intensity.
Open toolImage Color Picker
Upload an image and pick colors in HEX, RGB, and HSL with a visual color history.
Open toolImage Compressor
Compress images by adjusting quality to reduce file size without losing visual clarity.
Open toolImage Cropper
Crop images with preset aspect ratios like 1:1, 16:9, and 4:3 using a visual editor.
Open tool