Hi there,
I am a student, studying computer forensics at university and I've got the pleasure of testing exiftool. It's a great tool and it has helped me on numerous occasions. Now I'm looking at it from a forensic point of view. If I alter metadata in a photograph, lets say, GPS data, does Exiftool leave any trace? Something which I can look at, at hex level if need-be, and be able to know that exiftool was used?
I look forward to your replies,
Thank you.
Use the -htmlDump option to see the structure. You may notice differences in an ExifTool-edited image, depending on the software that wrote the original. One obvious change is that unused space will be removed.
- Phil
Thanks for the quick reply. I didn't know about -htmlDump
I am surprised that the ExifTool -htmlDump option isn't better known. I don't know of any other tool for visualizing the EXIF/TIFF structure, and I would have thought this would be very useful for forensics, because often a piece of software will impose a distinctive structure to the EXIF. (Usually very different than the metadata straight from a digital camera.)
- Phil
How do I exactly do this? Sorry but I am really new.
Just use the -HTMLDump option with exiftool and open the resulting output in a web browser. There you will see a nice dump of all the exif data, including how it is structured in the file. As Phil suggested, any software alterations will very likely (heavily) alter this structure so this should be easy to spot.
As a side note: Many Nikon DSLRs have an option to mark files so that any tampering can be determined after the fact (by the Nikon "Image Authentication" application). This is probably one of the reasons most forensics around the world shoot Nikon... Look for an option called "Image Authentication" in the camera setup menu to see if a camera offers this feature.
The command would look something like this:
exiftool -htmldump image.jpg > out.html
...then open "out.html" in a web browser.
- Phil
Quote from: Phil Harvey on November 09, 2014, 06:45:22 PM
The command would look something like this:
exiftool -htmldump image.jpg > out.html
...then open "out.html" in a web browser.
- Phil
Presumably
diff original_out.html changed_out.htmlwould give you an, albeit ugly, list of changes?
I haven't tried diff-ing the -htmlDump output. I do sometimes diff the -v3 output, but typically a lot changes if the offsets change at all, so you have to ignore the changed offsets if you are looking for other differences.
- Phil