SEFT "PEg_Info"

Started by Neal Krawetz, July 17, 2024, 11:12:36 AM

Previous topic - Next topic

Neal Krawetz

The Samsung trailer (SEFT) "PEg_Info" contains a JSON. It usually denotes an AI-altered or AI-generated image.

Sample image: https://fotoforensics.com/analysis.php?id=7802315245deb080d26bddd7d74021bbb8d5d245.2997035&fmt=orig

Phil Harvey

Interesting.  Thanks for the sample.  I'll add support for this.

- Phil
...where DIR is the name of a directory/folder containing the images.  On Mac/Linux/PowerShell, use single quotes (') instead of double quotes (") around arguments containing a dollar sign ($).

Neal Krawetz

Also, "Remaster_Info" contains a string.

E.g.:
https://fotoforensics.com/analysis.php?id=65ba3ef3bdd779864bb5544c5e38699c759356d7.934377&fmt=orig
(FotoForensics gets some of the weirdest images!)

Neal Krawetz

Samsung_Capture_Info is also a string.
So far, I've only seen "Screenshot" or "Smart select".

Phil Harvey

OK.  I'll add support for these too.  (I have the TagID for Samsung_Capture_Info from your other thread.)

- Phil
...where DIR is the name of a directory/folder containing the images.  On Mac/Linux/PowerShell, use single quotes (') instead of double quotes (") around arguments containing a dollar sign ($).