Web iconSSL Lock icon / Tor Logo / I2P Logo — Browsing Safely ( read more )
snapWONDERS is modernising — introducing Vaultify, our new platform for hiding files inside photos and videos. Try Vaultify → What’s changing →

Deep Media Forensics

Exhaustive forensic and privacy analysis to surface hidden metadata, detect digital tampering, and provide transparency into media creation.

No account needed

Upload and analyse instantly — no registration or login required.

You control retention

Choose how long your private report link stays active before it expires.

Three networks

Available on clearnet, Tor (.onion), and I2P — use whichever suits your threat model.

Images & Video

21 image formats — 8 standard (JPEG, PNG, WebP, GIF, HEIC, AVIF, JXL, TIFF) and 13 camera RAW families. 350+ video variants including MP4, MKV, WebM and AVI.

1. Privacy

Location, identity, and personal information that can expose the subject, device owner, or capture context.

GPS & Location Data Images & Video

Detects: Precise coordinates, altitude, speed, and direction of capture.

Extracts GPS data embedded by smartphones and cameras, including latitude, longitude, altitude, GPS timestamp, and the compass bearing at capture time. Displays a map link. Video GPS is parsed from ©xyz and udta atoms.

snapWONDERS helps: Flags GPS as the highest-severity privacy risk and shows what a recipient can infer about where you live or work.

Face Detection Images

Detects: Presence of human faces in the image frame.

Runs a neural face-detector on the image to count and locate human faces. Even after stripping EXIF, the pixel content itself can identify people. Reports face count and likelihood grades.

snapWONDERS helps: Warns when a file contains identifiable faces, prompting review before sharing.

Tracking & Unique Identifiers Images & Video

Detects: Camera serial numbers, lens serials, and owner names.

Identifies tags that can uniquely link a file to a specific device or owner: SerialNumber, LensSerialNumber, CameraOwnerName, OwnerName, and equivalent fields from manufacturer MakerNotes. These persist through re-saves that strip standard EXIF.

snapWONDERS helps: Flags tracking-level identifiers at the highest severity — a camera serial can identify a specific device across thousands of images.

Device Identity & MakerNote Extraction Images

Detects: Make, model, firmware, and manufacturer-private metadata.

Decodes the manufacturer-specific MakerNote block from Canon, Nikon, Sony, Fujifilm, Panasonic, Olympus, Pentax, and Apple. These fields carry camera serial numbers, registered owner names, lens serial numbers, and firmware version — data that survives re-saves that strip other EXIF. Also decodes DNG private IFDs with OriginalRawFileName, RawDataUniqueID, and calibration provenance.

snapWONDERS helps: Extracts hidden ownership data from 8 MakerNote brands, surfacing fields invisible to standard EXIF viewers.

Date & Time Exposure Images & Video

Detects: Original capture timestamps, timezone, and creation history.

Extracts all embedded timestamps including EXIF DateTimeOriginal, DateTimeDigitized, XMP history dates, and video creation/modification atoms. A recipient can determine when and where (via timezone offset) a photo was taken even if GPS is absent.

snapWONDERS helps: Lists every timestamp field found, sorted by source, with a clear privacy grade.

Comments, Descriptions & Authoring Images & Video

Detects: Embedded captions, author names, copyright strings, and editing notes.

Extracts free-text fields from EXIF, IPTC, XMP, and video tags: ImageDescription, UserComment, Artist, Copyright, XPAuthor, XPComment, and video ©ART/©nam fields. Windows Explorer silently writes the logged-in username into XPAuthor.

snapWONDERS helps: Flags identity-containing free-text, including Windows XP username leaks that persist across most social platforms.

Text in Video Frames Video

Detects: On-screen text, subtitles, and overlaid captions in video content.

Runs OCR on sampled frames to detect visible text embedded in the video pixel stream: timestamps burned into surveillance footage, channel watermarks, location overlays, or subtitle burn-ins that could identify the source device or location.

snapWONDERS helps: Reports the number of frames containing detected text so you can review content before sharing.

Embedded Thumbnails Images & Video

Detects: Hidden preview images carrying original content after main image edit.

Extracts embedded thumbnails from EXIF ThumbnailOffset and video cover-art atoms. When the main image is edited (e.g., faces blacked out), the original thumbnail is often left intact — revealing the pre-edit content to anyone who extracts it.

snapWONDERS helps: Extracts and displays all thumbnails, flagging cases where the thumbnail exposes content removed from the main file.

GPS Timezone Triangle Images

Detects: GPS coordinates inconsistent with the EXIF timestamp timezone.

Reverse-geocodes the embedded GPS coordinate to determine the expected local timezone, then compares it against the EXIF DateTimeOriginal. Impossible combinations — e.g., GPS places the photo in Tokyo but the timestamp is midnight UTC in winter (JST+9) — are flagged as strong signals of metadata editing or GPS spoofing. Uses timezonefinder with no external API dependency.

snapWONDERS helps: Surfaces timezone / coordinate mismatches: >90 s offset = suspect, >900 s = likely tampered.

2. Origin

Evidence that a file came directly from a capture device rather than being re-encoded, converted, or generated by software.

Original Photo / Video from Camera Images & Video

Detects: Whether a file is an unprocessed camera original.

Evaluates a combination of signals — presence of MakerNote, original file name structure, GPS correlation, encoding chain, and absence of re-encoding artefacts — to give a holistic verdict on whether this is likely a direct camera capture or a processed/re-encoded file.

snapWONDERS helps: Summarises the overall origin verdict with a clear explanation of which signals contributed.

DQT JPEG Encoder Fingerprinting Images

Detects: Specific encoder or software used to save the JPEG.

Analyses the Define Quantisation Table used by the JPEG encoder. Every major encoder (camera firmware, Photoshop, GIMP, Lightroom, iOS, Android) uses a characteristic DQT pattern. Matches against a growing fingerprint database to identify the last encoder in the chain.

snapWONDERS helps: Names the encoder matched in the database — e.g. libjpeg q87, Photoshop, iOS camera.
Origin score: Software encoder match raises Origin risk. Camera firmware match as a clean-origin confirmation signal Coming Soon — requires encoder type classification in fingerprint database.

DQT Thumbnail Cross-Check Images

Detects: Main image re-saved by a different encoder than the embedded thumbnail.

Compares the DQT fingerprint of the main JPEG image against the DQT fingerprint of the embedded EXIF thumbnail. Cameras write both using the same firmware quantisation tables. When the main image is opened and re-saved by Photoshop or another editor, the main DQT changes while the camera thumbnail DQT remains — a reliable re-save signal with near-zero false positive rate.

snapWONDERS helps: Flags DQT mismatch between main image and thumbnail as strong evidence of post-capture re-encoding.

Progressive JPEG Encoding Detection Images

Detects: Software re-encoding via progressive scan JPEG (SOF2).

No camera firmware produces progressive JPEG — every camera uses baseline sequential encoding (SOF0). Progressive JPEG is exclusively produced by optimisation tools (ImageMagick, jpegoptim, jpegtran, web CDNs) and certain editing workflows. A SOF2 marker is therefore a definitive re-encoding signal.

snapWONDERS helps: Detects SOF2 progressive encoding and flags it as a hard indicator of software post-processing.

Chroma Subsampling Analysis Images

Detects: Non-camera chroma subsampling patterns indicating software re-encoding.

Camera firmware uses a small set of known chroma subsampling ratios specific to each manufacturer. Software encoders (Photoshop, web tools, mobile apps) use different default ratios — notably 4:4:4 at high quality and 4:2:0 at low quality. The subsampling ratio, combined with DQT tables, provides a two-factor encoder fingerprint.

snapWONDERS helps: Extracts the chroma subsampling ratio and cross-references it against known camera and software patterns.

Video Encoder Fingerprinting Video

Detects: Desktop encoding software vs camera firmware.

Analyses bitstream structure and metadata tags like ©too, ©swr, and Encoder to identify the true underlying encoder. Matches against a fingerprint database of FFmpeg, HandBrake, DaVinci Resolve, Premiere, VLC, and mobile/camera encoders. Flags known desktop tools as evidence of post-capture processing.

snapWONDERS helps: Identifies whether a video was encoded by camera firmware or re-processed by editing software.

C2PA Content Credentials Images & Video

Detects: Cryptographically-signed provenance manifests from cameras, phones, and AI tools.

Detects and parses C2PA (Coalition for Content Provenance and Authenticity) manifests embedded by cameras (Leica M11-P, Sony), Adobe products, and AI generators (DALL-E, Midjourney via Adobe Firefly). A manifest records the capture device, software applied, and a cryptographic assertion chain. Presence of a manifest is itself a strong origin signal.

snapWONDERS helps: Surfaces the full C2PA assertion list, signer identity, and manifest structure so you can evaluate the provenance chain.

Camera RAW Private Tag Analysis Images

Detects: Original filenames, unique capture IDs, and calibration provenance from RAW files.

Adobe DNG files carry private IFD0 tags that reveal the original RAW filename before DNG conversion (OriginalRawFileName), a 16-byte unique capture ID (RawDataUniqueID), and calibration signatures. Canon CR2 carries the full Canon MakerNote plus the CR2Slice strip geometry. Canon CR3 stores metadata in CMT1–CMT4 ISOBMFF boxes inside moov — EXIF, Canon MakerNote, and GPS are each in a separate box. These fields are invisible in standard EXIF viewers.

snapWONDERS helps: Surfaces DNG edit provenance, unique file IDs, and calibration origin — exposing full conversion history when decoded correctly.

AVI ISFT Encoder Leak Video

Detects: Desktop editing software signature embedded in AVI containers.

AVI files carry an optional RIFF LIST INFO block with an ISFT (Software) tag written by the muxer. FFmpeg writes Lavf58.x, VirtualDub writes its own version string, OBS writes obs-output. The codec FourCC from the stream header is also fingerprinted — MJPEG indicates a webcam or IP camera; XVID/DIVX indicates legacy PC encoding.

snapWONDERS helps: Decodes the ISFT tag and codec FourCC, cross-checks against the encoder fingerprint database, and flags desktop-encoded AVI as processed rather than camera-original.

H.264 SPS Profile & Level Extraction Video

Detects: Encoding constraints that reveal the true encoder tool or workflow.

Parses the H.264 Sequence Parameter Set (SPS) from CodecPrivate in MKV tracks. Extracts profile_idc (Baseline / Main / High / Extended), level_idc, and constraint flags. Consumer camera firmware never produces Extended or Scalable profiles — their presence in a file claiming to be an unedited phone capture flags a re-encode.

snapWONDERS helps: Extracts the true H.264 encode parameters, exposing discrepancies between claimed device and actual encoding constraints.

XMP Namespace Tool Fingerprint Images

Detects: The specific software tool that last wrote XMP metadata.

Every XMP writer registers its own namespace URI and writes a characteristic set of properties. Photoshop leaves photoshop:History, Lightroom leaves lr: namespace, iOS Photos leaves apple_desktop:. The combination of namespaces present is a reliable tool fingerprint even when the xmp:CreatorTool field has been cleared.

snapWONDERS helps: Maps the namespace set to a known tool, providing a secondary encoder fingerprint independent of DQT analysis.

Serial Number Format Verification Images

Detects: Forged or malformed camera serial numbers.

Each camera manufacturer uses a documented serial number format and length. Canon uses 10-digit numerics; Nikon DSLR/mirrorless models use 7 or 10-digit numerics while compact models use 8 or 9-digit numerics; Sony uses a 9-digit alphanumeric. A serial number that doesn't match the expected format for the declared Make/Model is a strong indicator of metadata forgery.

snapWONDERS helps: Validates the embedded serial number format against the manufacturer specification and flags structural inconsistencies.

Temporal Plausibility Check Images

Detects: Timestamps that predate or postdate the claimed device model.

Cross-references the EXIF DateTimeOriginal against the known release date of the camera model declared in Make/Model. A photo claiming to have been taken in 2019 by a camera released in 2022 is impossible — a clear sign of metadata forgery or device-field manipulation.

snapWONDERS helps: Flags temporally impossible device/date combinations as high-confidence metadata forgery signals.

Huffman Table Fingerprinting Coming Soon Images

Detects: Non-standard Huffman coding patterns left by specific encoders.

Beyond DQT tables, the Huffman coding tables embedded in a JPEG DHT segment are characteristic of the encoder that wrote them. Camera firmware uses optimised custom tables; standard encoders use JPEG Annex K default tables. A mismatch between DQT and DHT origin is evidence of partial re-encoding.

snapWONDERS will help: Fingerprints the DHT segment independently of the DQT, providing a two-table encoder verification.

C2PA Cryptographic Validation Coming Soon Images & Video

Detects: Tampered or invalid C2PA manifest signatures.

Goes beyond detecting a C2PA manifest to cryptographically verifying the signature chain. A manifest can be copied from a genuine file into a forged one — only signature verification using the issuer's public key proves the manifest is authentic and covers the actual file content via the bound hash.

snapWONDERS will help: Performs full COSE signature verification against the C2PA trust list, confirming whether the manifest is cryptographically bound to this specific file.

3. Manipulation

Statistical, frequency-domain, and bitstream analysis for signs of pixel editing, compositing, re-encoding, or timeline modification.

Error Level Analysis (ELA) Images

Detects: Digital modifications, compositing, or selective editing.

Re-compresses the image at a known quality and measures per-pixel differences. Authentic JPEG images show uniform error across the frame; modified regions compress differently from the surrounding original and appear as bright artefacts on the ELA map.

snapWONDERS helps: Generates an ELA map and calculates a "high fraction" metric to give a quantified verdict on edit likelihood.

Histogram Gap Analysis Images & Video

Detects: Re-encoding and post-processing operations.

Analyses the colour/luminance distribution. Brightness or contrast adjustments, and re-saves at different quality, leave characteristic zero-bins ("gaps") or comb patterns in the histogram. A continuous histogram is expected from a camera original; gaps indicate processing steps.

snapWONDERS helps: Provides high-resolution histograms, gap density counts, and comb-pattern detection for a quantified verdict.

Double JPEG Compression Probe Images

Detects: Re-saving an edited image as a JPEG.

Analyses the re-compression error curve across multiple quality factors. When a JPEG is edited and re-saved, a statistical ghost of the original quality factor appears in the error curve — a robust signal that survives even substantial image modifications.

snapWONDERS helps: Uses an in-memory probe for a fast binary signal indicating whether this is a first-generation or re-saved JPEG.

JPEG Ghost — Prior Save Quality Images

Detects: Up-sampling or re-saving at a different quality.

Sweeps every potential quality factor (1–100) and computes the residual error at each step. A sharp minimum in the error curve identifies the exact quality factor at which the image was originally compressed — even if it has since been re-saved at a different quality.

snapWONDERS helps: Identifies the specific prior quality, providing proof of a re-save cycle and a lower bound on how many times the image has been compressed.

Clone / Copy-Move Detection Images

Detects: "Healing" or cloning used to hide or duplicate objects.

Searches for regions that are identical or near-identical to other regions within the same image. Clone-stamp, healing brush, and content-aware fill operations all leave mathematically similar blocks. The detection works even if cloned regions have been slightly blurred or colour-shifted.

snapWONDERS helps: Uses block-based DCT matching to find clones and generates a heat-map of suspicious regions.

Resampling & Interpolation Detection Images

Detects: Scaling, rotation, or geometric transformation.

Resampling introduces periodic correlations between neighbouring pixels that leave a detectable frequency-domain pattern. Analysing these correlations identifies up-scaled or rotated images masquerading as high-resolution originals, or composited regions at a different scale.

snapWONDERS helps: Detects interpolation artefacts in the frequency domain and classifies the likely transformation type.

Thumbnail vs Main Image Mismatch Images

Detects: Deliberate main-image replacement after capture.

Compares the embedded EXIF thumbnail to the main image pixel content. When a main image is replaced (e.g., a different photo swapped in while retaining the original metadata), the thumbnail retains the original and mismatches the main — a definitive forgery signal.

snapWONDERS helps: Automatically extracts and perceptually compares the thumbnail to the main image, flagging mismatches with a similarity score.

Metadata Field Consistency Cross-Check Images

Detects: Contradictions between metadata fields indicating selective editing.

Compares metadata fields that should agree: EXIF vs XMP timestamps, GPS timezone vs datetime offset, orientation tag vs image dimensions, flash tag vs focal length. Each inconsistency indicates a field was edited independently of others — a pattern not produced by cameras.

snapWONDERS helps: Runs a full cross-field validation pass and reports every inconsistency with a severity classification.

Orientation & Flash Tag Consistency Images

Detects: Rotation or flash-field editing inconsistent with the image content.

The orientation tag should agree with image dimensions (a portrait image should have portrait orientation). The flash tag should be plausible for the reported focal length and exposure values. Metadata editors that change one field without updating related fields leave detectable inconsistencies.

snapWONDERS helps: Cross-checks orientation against dimensions and flash against exposure parameters, flagging field-level metadata editing.

GOP (Group of Pictures) Structure Analysis Video

Detects: Trimming, joining, or re-encoding of video.

Analyses the keyframe (I-frame) interval distribution. Camera-encoded video has a consistent, regular GOP structure. Edited videos often have irregular intervals, broken GOPs at splice points, or atypical keyframe spacing produced by re-encoding tools. Measures standard deviation of GOP size as a quantified irregularity score.

snapWONDERS helps: Flags statistically irregular GOP structure with a severity score based on keyframe spacing deviation.

Inter-frame Tampering — Spike Analysis Video

Detects: Cuts, splices, or frame insertions.

Measures the statistical difference (MSE) between adjacent sampled frames across the video. Authentic footage shows a gradual, continuous change. Tampered videos show abrupt "spikes" at edit points where two non-contiguous segments have been joined. Spike count and magnitude determine the verdict severity.

snapWONDERS helps: Samples frames across the full video timeline and flags exact positions of discontinuities with spike counts.

Frame Duplication & Freeze Detection Video

Detects: "Frame freezing" or conversion artefacts.

Searches for duplicate or near-duplicate frames using perceptual hashing (pHash). In natural footage, consecutive frames always differ. Frozen frames — where content is repeated — are produced by frame insertion, conversion artefacts, or deliberate duplication to cover for removed content.

snapWONDERS helps: Uses pHash to detect duplicates even in the presence of encoding noise, reporting duplicate count and positions.

Audio Codec & Sample Rate Forensics Video

Detects: Audio tracks replaced, re-muxed, or sourced from broadcast or streaming content.

Analyses audio track metadata from MP4 (stsd box) and MKV track headers without decoding the audio stream. Consumer cameras universally record at 48 kHz; a 44.1 kHz sample rate is the CD and music studio standard and strongly indicates the audio was replaced after capture. Dolby Digital (AC-3/E-AC-3) is a broadcast distribution codec not written by consumer cameras. Opus audio inside an MP4 container indicates re-muxing with an internet-streaming or VoIP tool.

snapWONDERS helps: Flags three container-level audio signals — 44.1 kHz sample rate, Dolby Digital codec, and Opus-in-MP4 — that are invisible to video-frame analysis but reliably indicate post-capture audio substitution or re-muxing.

Edit List (elst) Analysis Video

Detects: Trimming and non-destructive editing in MP4/MOV containers.

Parses the internal Edit List atom (elst) in MP4/MOV containers, which instructs players to skip or delay media data. Multiple edit segments with non-zero media offsets indicate the video was assembled from non-contiguous portions of the original stream — strong evidence of trimming or splicing.

snapWONDERS helps: Surfaces the elst structure and distinguishes between innocent encoder delay edits and genuine content trimming.

AVI Header Integrity Checks Video

Detects: Tampered or inconsistent AVI container headers.

The AVI main header (avih) stream count and frame rate must match the actual strl stream blocks and per-stream strh rate. A mismatch reveals partial re-muxing, truncation, or two-tool editing. The ICRD creation date in the INFO block is extracted and compared with filesystem metadata.

snapWONDERS helps: Cross-checks stream count, frame rate, and index presence; surfaces the ICRD timestamp for comparison with file modification dates.

HDR Metadata as Tampering Signal Video (MKV/WebM)

Detects: Impossible HDR claims and mismatched colour science.

Parses ColourPrimaries, TransferCharacteristics (PQ/HLG), MaxCLL, and MaxFALL from MKV and WebM video tracks. HDR10 metadata in a VP8 stream is physically impossible — VP8 predates HDR colour models. SDR characteristics paired with SMPTE ST 2086 mastering data is equally invalid and signals a professional post-processing pipeline.

snapWONDERS helps: Flags HDR/SDR metadata contradictions and surfaces mastering display data from professional workflows embedded in allegedly unedited footage.

Anti-Forensics Detection Images

Detects: Metadata stripping tools, anonymization software, and forensic trace removal.

Identifies files that have been processed by metadata-stripping tools to remove forensic evidence. Recognises patterns left by MAT2 (Metadata Anonymisation Toolkit), ExifTool batch-stripping (near-empty XMP envelopes, APP1 blocks under 100 bytes), JFIF and EXIF marker coexistence that indicates metadata re-writing, and complete metadata absence in PNG files that typically carry software signatures. Also detects reset-timestamp patterns where all date fields are identical — a common artefact of timestamp-wiping tools.

snapWONDERS helps: Recognises 6 distinct anti-forensic patterns left by metadata-stripping tools and flags them as evidence of deliberate forensic trace removal.

Noise Inconsistency Detection Images

Detects: Spliced or composited regions with different sensor noise profiles.

Analyses the sensor noise field of the image using 3-level db8 wavelet decomposition. Authentic photographs have a spatially uniform noise profile from a single sensor. Composited images contain regions from different sources and show localised noise inconsistencies — measured by the coefficient of variation of per-region MAD estimates across the finest-scale diagonal subband.

snapWONDERS helps: Computes a noise CoV score across 64 image regions — elevated CoV (≥ 0.3) triggers a Manipulation warning; strongly elevated (≥ 0.6) triggers a bad verdict.

Printer Artifact Detection (FFT) Images

Detects: Printed and re-scanned documents masquerading as digital originals.

Applies 2D FFT analysis to detect the periodic halftone pattern introduced by inkjet and laser printing. A printed and re-scanned image shows a characteristic frequency-domain peak in the radial power spectrum from the printer dot matrix — absent in purely digital images. The peak-to-mean ratio of the azimuthally-averaged spectrum is measured against a threshold.

snapWONDERS helps: Flags printed-then-scanned images — a common technique to defeat digital watermarks and provenance chains — as a Manipulation warning.

NSS Benford Analysis Images

Detects: Statistical anomalies in DCT coefficient distribution indicating tampering.

Natural Scene Statistics (NSS) predict that the leading digits of JPEG 8×8 block DCT AC coefficients follow Benford’s Law (Benford 1938). Heavily processed or synthetic images deviate from the expected digit distribution. A chi-squared test against the expected Benford probabilities (8 degrees of freedom) measures the deviation across all blocks.

snapWONDERS helps: Produces a chi-squared deviation score — high deviation flags possible synthetic generation, aggressive processing, or compositing in the Manipulation check group.

JPEG Block Grid Alignment Images

Detects: Composited or cropped regions with a misaligned 8×8 DCT block grid.

JPEG compression divides the image into an 8×8 pixel block grid anchored at the top-left corner. When a region from a different image is pasted in — or when the image has been cropped to a non-8-pixel boundary — its block grid is offset relative to the background. Detecting this misalignment reveals splice boundaries even when visual editing is seamless.

snapWONDERS helps: Detects non-zero row/column grid offset (threshold: 2 px) — a geometric signal of cropping or compositing.

Audio Track Anomaly Detection Video

Detects: Audio codec and sample rate inconsistent with consumer camera capture.

Examines the audio track codec and sample rate reported in the container metadata. Consumer cameras record in AAC or PCM at 48 kHz. Cinema-grade codecs (AC-3, E-AC-3) and unusual container pairings (Opus in MP4) indicate post-production replacement. A 44.1 kHz sample rate (CD / studio standard) is characteristic of audio that was recorded outside the camera and added in editing.

snapWONDERS helps: Flags AC-3/E-AC-3, Opus-in-MP4, and 44.1 kHz audio tracks as manipulation signals — no audio decoding required.

Audio Splice & Discontinuity Detection Coming Soon Video

Detects: Audio edits, cuts, and phase discontinuities in the audio track.

Analyses the audio waveform for abrupt energy changes, phase discontinuities, and background noise inconsistencies that indicate edit points in the audio track. Audio splicing is often used to fabricate conversations or remove incriminating content while keeping the video track intact.

snapWONDERS will help: Flags audio edit points independently of the video track, detecting tampering that video-only analysis misses.
We have tested with photos from 3369 different Camera Models / Mobiles and still counting…

camera / mobile photos from popular manufacturers and brands — see full list

Google LogoZTE LogoWE LogoMicromax LogoCannon LogoApple LogoLenovo LogoHotwav LogoCubot LogoMeizu Logo

4. Security

Hidden data channels, steganographic payloads, and concealed embedded content that exist outside standard metadata blocks.

LSB Steganography Detection Images

Detects: Hidden messages encoded in the least significant bits of pixel data.

LSB (Least Significant Bit) steganography encodes a payload by modifying the least significant bits of pixel colour channels — changes invisible to the human eye. Statistical analysis of bit-plane distributions, chi-square tests, and RS (Regular/Singular) analysis detect the bias introduced by hidden payloads.

snapWONDERS helps: Runs three independent statistical tests and combines them into a suspicion grade (Low / High) with per-channel breakdown.

Digital Watermark Detection Images & Video

Detects: Invisible ownership or tracking watermarks embedded in media.

Runs a perceptual watermark detector looking for signatures of common invisible watermarking systems (StegaStamp, Stable Signature, and commercial SD watermarking schemes used by Adobe, Shutterstock, and other stock platforms). Invisible watermarks can uniquely identify the original licensee even after heavy editing.

snapWONDERS helps: Detects the presence of invisible watermarks and reports which watermarking system appears to have been used.

Polyglot / Hidden Archive Detection Images

Detects: Files simultaneously valid as two different formats.

A polyglot file is crafted to be parsed as two different formats simultaneously — the classic example is a JPEG that is also a valid ZIP archive (and can contain any payload). This technique is used to bypass file-type filters. Tests for JPEG+ZIP, JPEG+PDF, PNG+ZIP, and other common polyglot combinations by checking for valid secondary format headers within the file.

snapWONDERS helps: Probes for known polyglot combinations and flags files that pass as multiple format types.

Trailing Data (Overlay) Detection Images

Detects: "Zip-in-JPG", hidden archives, or arbitrary payloads after the image EOF.

Checks for data appended after the standard End-Of-Image marker (FFD9 for JPEG, IEND for PNG). This technique — used to conceal ZIP archives, PDFs, executables, and other files — is the simplest form of image-based data hiding. The appended data is typically invisible to image viewers but accessible to file utilities.

snapWONDERS helps: Measures the exact amount of trailing data and classifies its likely type.

Free / Skip / Wide Box Detection Video

Detects: Unused space boxes in MP4/MOV containers that may carry hidden data.

free, skip, and wide boxes in the MP4/MOV container are reserved for padding but can be used to embed arbitrary data within a valid video file. Their content is ignored by all players. Unlike trailing data, this technique hides the payload inside the container structure itself.

snapWONDERS helps: Detects all free/skip/wide boxes, reports their count and total size, and flags unexpectedly large padding as suspicious.

DRM & Encrypted Track Detection Video

Detects: Commercially protected or encrypted content.

Identifies internal encryption markers in MP4 (pssh boxes, sinf/schm/schi scheme atoms) and MKV (ContentEncoding with Encryption type). Reports the specific DRM system detected: Widevine, PlayReady, FairPlay, or generic encryption. DRM-packaged content cannot have originated directly from a camera.

snapWONDERS helps: Identifies DRM system and encryption scheme, confirming that content passed through a commercial distribution pipeline.

MKV Attachments Detection Video (MKV)

Detects: Arbitrary files embedded inside a Matroska container.

The Matroska container allows an Attachments element that can carry any file type — fonts, thumbnails, documents, or arbitrary data. Unlike standard metadata, attachments can be large and are not rendered by video players, making them a covert data channel. WebM explicitly prohibits attachments; their presence in a WebM file is also a schema violation.

snapWONDERS helps: Reports the presence, count, and total size of attachments embedded in MKV files.

Binary String Extraction Images

Detects: Embedded strings, URLs, email addresses, and identifiers in raw JPEG header bytes.

Scans the JPEG binary data before the Start-Of-Scan marker for printable ASCII sequences matching URLs, email addresses, filesystem paths, and IP addresses — content unlikely to appear in genuine camera EXIF and that may indicate embedded payloads, tool attribution, or hidden communication channels.

snapWONDERS helps: Surfaces strings that standard metadata viewers miss, exposing software provenance or embedded contact information hidden in the JPEG binary header.

5. Format & Structure

Container integrity, format-level validation, and informational metadata analysis across image and video formats.

Privacy Category Taxonomy Images & Video

Detects: Identity leaks, location tracking, and technical fingerprints across all metadata.

A classification engine that groups thousands of metadata tags into high-level categories — GPS, Device, Tracking, DateTime, Author, Comments, Text, Copyright — ranked by privacy risk severity. Transforms raw tag dumps into a prioritised privacy audit with plain-language risk explanations for each category.

snapWONDERS helps: Gives you an at-a-glance picture of what information is exposed without needing to understand raw EXIF tags.

Advanced Forensic Markers & Edit History Images

Detects: Adobe transforms, PNG signatures, and XMP edit history.

Deep inspection of high-signal metadata blocks: XMP xmpMM:History records every save operation with timestamps and software versions; Adobe photoshop:ICCProfile reveals colour space conversions; PNG tEXt/iTXt chunks carry software identifiers and creation timestamps that survive format conversion.

snapWONDERS helps: Surfaces the XMP history chain and technical blocks usually ignored by standard viewers, providing a paper trail of the file's digital life.

Hidden Animation Stream Detection Images

Detects: Hidden or subliminal frames in APNG, WebP, and GIF.

Parses animated image formats to find frames too short for the human eye to see — including GIF frames with delays of ≤10 ms and non-looping frames that appear only once at imperceptible speed. Single-frame GIFs and WebPs that declare animation metadata are flagged for manual inspection.

snapWONDERS helps: Surfaces the properties of every internal frame to ensure nothing is hidden in the animation stream.

JPEG XL Repack Detection Images

Detects: JPEG files disguised as JPEG XL (JXL) images.

JXL supports lossless JPEG recompression — the original JPEG bitstream is stored verbatim inside the JXL container. A jbrd box means the submission is a repacked JPEG, not a native JXL capture from a camera. The original JPEG can be reconstructed byte-for-byte from the wrapper, which means any original JPEG forensic signals are preserved inside.

snapWONDERS helps: Detects naked codestream and ISOBMFF container JXL files and flags the JPEG Bitstream Reconstruction Data box with a clear forensic verdict.

Container Offset Tampering Video (MKV/WebM)

Detects: Byte insertion, removal, or re-packaging of Matroska/WebM files.

Validates the SeekHead element directory — an internal map that declares the exact byte position of every top-level block. If any declared position doesn't match the actual position in the file, bytes have been inserted, removed, or the file was re-packaged by a tool that didn't update the index.

snapWONDERS helps: Cross-checks every SeekHead entry against the real element locations and reports mismatches with exact byte deltas.

Mislabelled Container Detection Video (WebM)

Detects: Re-muxed or deliberately mislabelled WebM files.

WebM is a strict subset of Matroska — only VP8, VP9, or AV1 video and Vorbis or Opus audio, with no Chapters or Attachments elements. A file declaring DocType=webm but containing Matroska-only content was relabelled after creation, either by a re-mux tool or deliberately.

snapWONDERS helps: Validates every track codec and container element against the WebM specification and lists all violations found.

Document Steganography & Extraction Coming Soon

Detects: Media hidden inside PDF, DOCX, XLSX, PPTX documents.

PDF and DOCX containers embed images and videos verbatim as binary streams. Deep inspection surfaces every embedded media stream and runs the full forensic pipeline on each one. PDF also has a structural steganography surface — hidden objects, unused cross-reference entries, and incremental update layers that survive standard viewers.

snapWONDERS will help: Will extract every embedded image/video from document containers and surface structural anomalies that indicate hidden or manipulated content.

Frequently Asked Questions

Technical questions about how the forensic analysis checks work.

What is Error Level Analysis (ELA) and how does it detect photo manipulation? +

Error Level Analysis (ELA) re-compresses an image at a known quality level and measures the per-pixel difference between the original and the re-compressed version. Authentic JPEG images have been through a single compression pass and show uniform error across the entire frame. Modified regions — where pixels were edited, painted over, or composited in — have a different compression history, so they compress to a different error level and appear as bright artefacts on the ELA map.

snapWONDERS generates an ELA heat-map and calculates a quantified "high fraction" metric to give a verdict on edit likelihood — moving beyond a visual inspection to a measurable score.

What is DQT JPEG encoder fingerprinting and what can it reveal? +

DQT (Define Quantisation Table) fingerprinting analyses the quantisation tables embedded in every JPEG file. Each encoder — camera firmware, Photoshop, GIMP, Lightroom, iOS, Android — uses a characteristic DQT pattern as unique as a fingerprint. Matching it against a database of known encoders identifies the last software or firmware that wrote the file.

snapWONDERS also cross-checks the main image DQT against the embedded thumbnail DQT. Cameras write both using the same firmware tables, so a mismatch between them is strong evidence that the main image was re-saved by editing software after capture — a near-zero false positive signal.

What hidden metadata can photos and videos contain? +

Far more than most people expect. Photos can embed: precise GPS coordinates, altitude, speed and bearing at capture time; camera make, model, serial number, and lens serial; the registered owner name; all capture timestamps including timezone offset; manufacturer MakerNote data (often containing fields invisible to standard EXIF viewers); XMP edit history recording every software save operation with timestamps; and on Windows, the logged-in username written silently by Windows Explorer into the XPAuthor field.

Videos add audio codec and sample rate, encoder software strings, and location data in MP4 udta atoms. Embedded thumbnails can also retain original content after the main image has been edited — revealing the pre-edit version to anyone who extracts them.

What is steganography and how can it be detected in images? +

Steganography is the practice of hiding a secret payload inside an ordinary-looking carrier file. The most common technique is LSB (Least Significant Bit) steganography: encoding data by modifying the least significant bits of pixel colour values in a way that is invisible to the human eye. Statistical analysis can detect the bias this introduces — via chi-square tests on bit-plane distributions, RS (Regular/Singular) group analysis, and sample-pair analysis.

snapWONDERS runs three independent statistical tests and combines them into a suspicion grade with per-channel breakdown. Beyond pixel-level hiding, the forensic pipeline also detects data appended after the image end-of-file marker ("zip-in-JPG"), polyglot files that are simultaneously valid as two different formats, and arbitrary data concealed inside video container free/skip boxes.

Can forensic analysis detect if a photo has been AI-generated? +

Several forensic signals correlate with AI-generated images. C2PA provenance manifests from tools such as DALL-E, Midjourney (via Adobe Firefly), and Stable Diffusion record the generating tool's identity and are detected and parsed. NSS Benford analysis of JPEG DCT coefficient distributions flags statistical patterns inconsistent with natural scene statistics. Noise field uniformity — measured via wavelet decomposition across 64 image regions — is characteristically high in AI images that lack real sensor noise.

The complete absence of any camera metadata (no MakerNote, no GPS, no device serial, no firmware version) alongside unusual encoder fingerprints is also a strong combined signal. No single check is conclusive — no free tool currently provides a definitive AI detection verdict — but the full 40+ check pipeline provides a comprehensive picture of what the evidence supports.

What image and video formats does snapWONDERS forensic analysis support? +

Standard image formats (8): JPEG, PNG, WebP, GIF, HEIC, AVIF, JXL, TIFF. APNG (animated PNG) is also handled — hidden-frame detection runs on all PNG files.

Camera RAW formats (13 families): Canon CR2/CR3, Nikon NEF/NRW, Sony ARW/SR2/SRF, Fujifilm RAF, Olympus ORF, Panasonic RW2, Pentax PEF, Samsung SRW, Hasselblad 3FR/FFF, Leica RWL, Epson ERF, Kodak DCR, Adobe DNG.

Video (350+ variants): MP4, MOV, MKV, WebM, and AVI containers, with H.264, H.265/HEVC, VP8, VP9, AV1, and MJPEG codecs. All analysis runs on clearnet, Tor (.onion), and I2P — no account or login required.

Is my media stored after analysis? Is the analysis private? +

You control retention. When you submit media for analysis, you choose how long your private report link stays active before the file and report are permanently deleted — options range from minutes to days. No account is required. Your report is accessible only via the unique private link generated for your specific upload; it is not indexed or shared.

For users requiring network-level anonymity, snapWONDERS is available on Tor (.onion) and I2P in addition to the clearnet — your upload traffic never leaves the anonymity network.

What is a camera device fingerprint and how does snapWONDERS build one? +

A camera device fingerprint is a profile built from multiple forensic signals that together characterise the camera model that captured a photo: DQT quantisation tables, Huffman table structure, chroma subsampling ratio, MakerNote block layout, serial number format, and H.264 SPS encoding constraints. Each camera model produces a characteristic combination of these signals.

snapWONDERS accumulates these signals from real uploads and matches them against a growing device profile database to verify whether a photo's declared Make and Model fields are consistent with its actual encoding characteristics — or whether the device fields have been forged. Device profiles are browsable at snapWONDERS Devices.

Ready to analyse your media?

Start your deep analysis now and expose what's hidden.

Analyse Photos »    Analyse Videos »

Want to protect your media after analysing it?

Hide & Conceal with Vaultify →    Learn more about Vaultify →
snapWONDERS Vaultify Hide & conceal files inside any photo — free to try, no account needed. Hide a file → Learn more about Vaultify →