ExifTool Forum

General => Metadata => Topic started by: e@e@ on May 12, 2024, 05:17:55 AM

Title: Samsung metadata
Post by: e@e@ on May 12, 2024, 05:17:55 AM
I'm trying to analyze some Samsung device's metadata (S23, Note20.. etc) and noticed that there is a repeating APP4 segment that is shown in the devices image file as "unknown metadata segment". Their content is not consistent as I checked binary.
Does anyone know to say something about this issue?
I also found APP11 segments in some images...
Title: Re: Samsung metadata
Post by: Phil Harvey on May 12, 2024, 08:34:22 PM
While I don't know for sure about this camera, repeated large APP segments tend to be raw data for preview images. 

- Phil
Title: Re: Samsung metadata
Post by: e@e@ on May 13, 2024, 04:28:49 AM
Quote from: Phil Harvey on May 12, 2024, 08:34:22 PMWhile I don't know for sure about this camera, repeated large APP segments tend to be raw data for preview images. 

- Phil


Thank you Phil.
Is there any way to save this raw data and display it as an image?
Title: Re: Samsung metadata
Post by: Phil Harvey on May 13, 2024, 01:25:28 PM
Without seeing a sample I can't even be sure this is image data.

- Phil
Title: Re: Samsung metadata
Post by: e@e@ on May 22, 2024, 08:40:02 AM
Quote from: Phil Harvey on May 13, 2024, 01:25:28 PMWithout seeing a sample I can't even be sure this is image data.

- Phil

it does not look like an image, but here is a link to an image I found on the web with this kind of APP4:
(https://fdn.gsmarena.com/imgroot/reviews/23/samsung-galaxy-s23/camera/gsmarena_006.jpg)


Title: Re: Samsung metadata
Post by: StarGeek on May 22, 2024, 10:00:31 AM
I used the -v5 (-verbose5) option (https://exiftool.org/exiftool_pod.html#v-NUM--verbose) to get a hex dump of the APP4 section.  There are way too many null characters 0x00 for it to be image data, IMO. There are about 2,525 null characters out of the 6,520 characters in that section.
Title: Re: Samsung metadata
Post by: e@e@ on May 22, 2024, 03:17:07 PM
Quote from: StarGeek on May 22, 2024, 10:00:31 AMI used the -v5 (-verbose5) option (https://exiftool.org/exiftool_pod.html#v-NUM--verbose) to get a hex dump of the APP4 section.  There are way too many null characters 0x00 for it to be image data, IMO. There are about 2,525 null characters out of the 6,520 characters in that section.

Yes, that's what I thought too...
So what else can it be? I saw this kind of APP4 on some Samsung devices, in each picture they are a little different, but contain a lot of nulls...