Hello
After reading FAQ and lots of posts here I wasn't able to find solution for my problem....maybe someone here can help.
I have 3 images which contains some binary data in UserComment EXIF tag (its strange I know....it is from mystery geocache and i believe cache owner used some cypher to hide cache coordinates in EXIF)
If I use -v5 or -htmldump I can see the data but in the first case its not exact binary representation and in the second case its formated (added line breaks).
1st image: http://img30.rajce.idnes.cz/d3001/14/14843/14843362_6a3361b60d3aa5cc1bb6ec5202eb3f2f/images/A.jpg?ver=0
Part of UserComment as seen using verbose output: ASCII.ALCSIIF5....o..eL.X-.............0..0........S.......Q.WR.W..3...W.\.......W.R.X.RX..........G.........k..ALCEFAFA.......FAFA'...9.X.3...0...0..p3...7..|:..V=...@.am4.I.A.I.A.I.A.I.A.I.A.I.A.I.A.I.A.I.A.I.A.
....etc.
Im trying to extract exact binary data using exiftool.exe -binary -ExifIFD:UserComment -n -w! tmp/UserComment_%f_%e.txt *.jpg
I was expecting -binary switch to export whole tag data unmodified but ouput files contains only one character (0x0a) which is 9th byte of the tag (1st after 8 byte UserComment encoding specification) and nothing else....
I'm using v11.51 on Windows 10 x64
Any idea?
Thanks
This post (https://exiftool.org/forum/index.php/topic,8250.msg42322.html#msg42322) contains a config file that allows you to extract binary UserCommand data.
- Phil
Thank you very much Phil, also for your amazing tool....
Missed that one. Works like a charm.
Unfortunately for me it seems like its just some sort of bug in some Samsung phone's photo apps storing this garbage in UserComment. Back to drawing board :)
Thanks again!