ExifTool Forum

ExifTool => The "exiftool" Application => Topic started by: PixelDoctor on December 13, 2024, 12:11:38 PM

Title: Extracting the payload of a JPEG marker
Post by: PixelDoctor on December 13, 2024, 12:11:38 PM
I have a JPEG file from a custom application that puts a proprietary binary blob in an APP3 marker. Is there a way by which I can exiftool to extract that marker payload?

I tried exiftool -G -s -U -v my_image.jpg, which shows that it's present with the right size:

JPEG APP3 (345 bytes):
  Warning = [minor] Unknown APP3 segment


I just need to have it dump it to stdout (as binary) so I can pipe it to a file for downstream processing.

Thanks!
Title: Re: Extracting the payload of a JPEG marker
Post by: Phil Harvey on December 13, 2024, 12:24:24 PM
Adding -v4 should show you the contents in hex, but there is currently no way to dump this in binary.

- Phil
Title: Re: Extracting the payload of a JPEG marker
Post by: PixelDoctor on December 13, 2024, 04:17:43 PM
Cool, that works. Alas, I'll whip up a C program to actually dump the payload in binary. Thanks Phil!