2025-05-21: ExifTool 12.85 is now available
exiftool -m -P -overwrite_original -Canon:ThumbnailImage= movie.mov
exiftool -m -overwrite_original -api LargeFileSupport=1 -api QuickTimeUTC=1 '-QuickTime:CreateDate=2001:01:01 12:00:00' '-Keys:CreationDate=2001:01:01 12:00:00-05:00' movie.mov
exiftool -m -overwrite_original -api LargeFileSupport=1 -api QuickTimeUTC=1 -api TimeZone=America/New_York '-QuickTime:Time:All=2001:01:01 12:00:00' '-Keys:CreationDate=2001:01:01 12:00:00-05:00' movie.mov
exiftool -ThumbnailImage -b movie.mov | exiftool -Time:All='2020:01:01 12:00:00' -timezone='+02:00' -wm w - | exiftool -ThumbnailImage'<=-' movie.mov
Every night I have my mobile phones move the pictures into a folder on my NAS. That folder (for this exercise) is Z:/Incoming/PhotosTest.
What I want to achieve is:
1. Rename the photo files as this example:
23-10-2022-21-29-46-001
23-10-2022-21-29-49-002
24-04-2024-15-09-04-001
24-04-2024-15-09-22-002
where the numbers at the end (001, 002) always starts from 001 for each month.
2. Next I want to create folders like Year and Month (month to be like 01-Jan-2024 for example) in the final path where the photos will "live" and from where they will be backed up to external USB and cloud.
The final folder structure will look like this:
2024
04-Apr-2024
24-04-2024-15-09-04-001
24-04-2024-15-09-22-002
10-Oct-2024
24-10-2024-15-09-04-001
24-10-2024-15-09-22-002
2023
01-Jan-2023
24-01-2024-15-09-04-001
24-01-2024-15-09-22-002
10-Dec-2024
24-12-2024-15-09-04-001
24-12-2024-15-09-22-002
3. Photos might be moved at a later date into already existing year folders and month sub-folders in the final destination directories.
Quote from: Phil Harvey on February 18, 2023, 09:34:33 AMCanon specifically writes metadata to the thumbnailimage. I think you may be able to write this by extracting the thumbnail, editing it, then writing it back again.
In case it matters, most other software won't even know this metadata exists.
Quote from: StarGeek on May 22, 2024, 10:00:31 AMI used the -v5 (-verbose5) option to get a hex dump of the APP4 section. There are way too many null characters 0x00 for it to be image data, IMO. There are about 2,525 null characters out of the 6,520 characters in that section.