Upload and analyse instantly — no registration or login required.
Choose how long your private report link stays active before it expires.
Available on clearnet, Tor (.onion), and I2P — use whichever suits your threat model.
JPEG · PNG · WebP · APNG · MP4 · MOV · MKV and more.
Visual and statistical properties analysis to identify edits and inconsistencies.
Identifies areas of an image that are at different compression levels. Modified areas typically show a higher error level.
Analyses the Define Quantisation Table used by the JPEG encoder to identify if an image was last saved by Photoshop or camera firmware.
Compares the embedded thumbnail to the main image to ensure they match. A mismatch indicates the main image was likely replaced.
Statistical analysis of colour distribution. Brightness or contrast adjustments leave detectable "gaps" in the histogram.
Analyses the re-compression error curve across multiple quality factors to find statistical "ghosts."
Sweeps every potential quality factor to find the exact original quality at which an image was first compressed.
Searches for regions of an image that are identical or near-identical to other regions in the same image.
Analysis of periodic correlations between neighbouring pixels which leave a detectable mathematical grid.
Temporal domain analysis checking for consistency across frames and containers.
Analyses bitstream structure and metadata tags like `©too` to identify the true underlying encoder.
Analyses how I, P, and B-frames are organised. Edited videos often have irregular intervals or "broken" GOPs.
Measures the statistical difference between adjacent frames. Tampered videos show abrupt "spikes" at edit points.
Parses the internal "Edit List" atom in MP4/MOV containers which instructs players to skip media data.
Searches for duplicate frames in a sequence where content should be fluid.
Identifies internal encryption markers like `pssh` boxes in MP4 or ContentEncoding in MKV.
Deep inspection of "data about data" to prevent inadvertent sensitive information leaks.
A classification engine that groups thousands of metadata tags into 13 high-level categories ranked by severity.
Compares different metadata fields (e.g., GPS timezone vs file timestamp) to catch contradictions.
Deep inspection of high-signal metadata blocks that provide a "paper trail" of the file's digital life.
Specifically targets the `XPAuthor` and related tags that Windows Explorer silently writes into files.
Analysing file formats to find hidden data or "extra" appended content.
Checks for data appended after the standard "End of File" marker of a media file.
Parses advanced image formats to find frames too short for the human eye to see.
Deep inspection of document containers for embedded streams, structural gaps, or hidden XML.
Start your deep analysis now and expose what's hidden.
Analyse Photos » Analyse Videos »Want to protect your media after analysing it?
Hide & Conceal with Vaultify → Learn more about Vaultify →
New: Hide & conceal files inside any photo — free to try, no account needed.
Hide a file →
Learn more about Vaultify →