I was wondering which field i could use to insert a web page url but it could only be read by the exif tool. I dont want it to be visible when viewed with windows explorer\file properties\details\ but only by the people who would suspect it would be there....
You could set the XMPToolkit property. This is generally used to indicate the software that wrote the XMP and isn't commonly displayed, but ExifTool lets you set this to whatever you want.
- Phil
See the Windows Metadata (http://exiftool.org/forum/index.php/topic,6591.msg32875.html#msg32875) post for what tags that Windows 10 reads. You wouldn't want to use anything on that list. I'm pretty sure that Windows 11 has changed some of the data, but I don't have access to that.
Any XMP data is visible in Adobe Bridge, but only if you know how to look for it. I assume that other Adobe products are the same.
I used the tag from this post (https://exiftool.org/forum/index.php?msg=66714) to add ProductName tag, which appears to be a personal tag for that poster. I then Right-click→File Info→Raw Data, and the tag is visible in the raw data.
Adobe_Bridge-2025-01-01_07.01.42.png
If you really want to hide it, you would create a new EXIF or IPTC tag. Those would only be visible (short of looking at it in a hex editor) by using the -u (-unknown) option (https://exiftool.org/exiftool_pod.html#u--unknown) or with the config file used to create them.
Well, i did not realise what i was asking for when "but it could only be read by the exif tool"...
trying exiftool "filepath" was enough to lay it all out , not so "spy"ish at all but useful none the less.
i could have two urls as
-XMPToolkit=
or
-XMP-dc:Source
with
"https://example.com/url1 https://example2.com/url2" which could easily split by whitespace
and will go for it but really curious about the field that does not show up even with exiftool righaway.
Quote from: StarGeek on January 01, 2025, 10:11:33 AMIf you really want to hide it, you would create a new EXIF or IPTC tag. Those would only be visible (short of looking at it in a hex editor
btw, this tool is god send and this message will erase it self in...
Most unknown tags like this can be extracted with ExifTool, but require that you add the -u option
- Phil