How-To & Life · Guide · Audio, Video & Voice
How to View EXIF Metadata in Photos
Reading EXIF fields, verifying camera settings, catching edited-but-not-stripped photos, and timezone gotchas in capture time.
EXIF metadata is a goldmine if you know what to look for: it reveals when and where a photo was taken, with what camera and settings, and whether the file has been edited or processed. Photographers use it to learn from their own work; journalists and investigators use it to verify authenticity; privacy-conscious users use it to check what personal information a photo is carrying before they share it. This guide covers the EXIF fields worth reading, how to interpret them, and the most common gotchas — timezone drift, edited-but-unstripped files, and metadata that’s been forged.
Advertisement
The essential EXIF fields
A photo can carry dozens of fields, but a handful do most of the work:
- Make, Model: the camera that took the shot.
- LensModel, FocalLength: the lens and zoom setting.
- FNumber, ExposureTime, ISO: the exposure triangle.
- DateTimeOriginal: when the shutter fired.
- GPSLatitude, GPSLongitude, GPSAltitude: where it happened.
- Orientation: display rotation (1 = upright, 6 = phone portrait).
- Flash: whether and how the flash fired.
- Software: the app that last saved the file.
- Artist, Copyright: authorship info if the camera or user set it.
Reading camera settings
For photographers studying their own work, the exposure trio tells you what decisions the camera (or you) made:
FNumber: f/2.8 ExposureTime: 1/125 s ISO: 400 FocalLength: 50 mm Flash: Did not fire
A wide aperture (low f-number) and moderate ISO with a fast shutter implies natural light at a dim-ish venue. High ISO with a slow shutter implies low light without flash. Reading the pattern across a gallery shows your habits — maybe you shoot too wide open, or your ISO defaults are too conservative.
Timestamps and the timezone trap
The DateTimeOriginal field stores local time at capture, but most cameras don’t record the timezone. If you shot the photo at 2 p.m. in Tokyo and later uploaded it in New York, the timestamp still reads 2 p.m. — but you don’t know if that was Tokyo local or New York local without other context.
Modern phones often add an OffsetTimeOriginal field (e.g. +09:00) that disambiguates. Older cameras almost never do. If chronology matters, check both fields.
GPS precision and format
GPS fields come as degrees-minutes-seconds or decimal degrees. A typical reading:
GPSLatitude: 40 deg 44' 55.85" N GPSLongitude: 73 deg 59' 11.35" W GPSAltitude: 21.3 m Above Sea Level
That’s Midtown Manhattan, accurate to a few meters. Paste the decimal form (40.748847, -73.985368) into any map tool and you can see the exact building. This precision is why GPS stripping matters before sharing.
Not every photo has GPS — phones record it by default but cameras need to pair with a smartphone or have built-in GPS enabled. Missing GPS doesn’t mean the photo is anonymous; it means the device didn’t record a location.
Spotting edited-but-unstripped photos
The Software field reveals the last processor of a file. If a photo claims to be a straight-from-camera snapshot but the Software field reads Adobe Photoshop 25.0, someone has been editing.
Other giveaways:
- Mismatched Make/Model: the lens in the metadata doesn’t exist for the claimed camera body.
- Unusual DateTimeDigitized versus DateTimeOriginal: a large gap suggests post-processing or scan-from-print.
- Missing EXIF entirely: either stripped, or the file was re-saved by a tool that dropped metadata. A “raw camera JPEG” without EXIF is suspicious.
- Thumbnail mismatch: some files store a small preview; if it differs from the full image, the full image was edited.
Verifying authenticity
Journalists and investigators use EXIF as one layer of authenticity checks. A photo claiming to be from a specific location but with GPS pointing elsewhere is a red flag. A timestamp that predates the event it claims to depict is another.
Note that EXIF is trivially forgeable — any determined actor can rewrite the fields. EXIF analysis is useful as a starting point, not proof. Combine with reverse-image search, shadow-angle analysis, and context.
IPTC and XMP beyond EXIF
Beyond EXIF, professional photo workflows embed IPTC (caption, keywords, copyright, byline) and XMP (Adobe’s edit history and ratings) blocks. A good viewer displays all three side by side. Reading IPTC copyright tells you who claims authorship; reading XMP reveals the edit history as Lightroom saved it.
A scanner output will often have XMP indicating the scan software; a heavily edited file will show layers, ratings, and export settings.
Orientation and why photos are sideways
The Orientation tag reveals whether a “sideways” looking photo is actually a landscape pixel buffer meant to be rotated on display. Value 1 means upright, 6 means rotate 90° clockwise for display (standard portrait iPhone), 8 means rotate 270° clockwise (portrait held the other way).
If a photo looks right in some apps but sideways in others, the Orientation tag is the explanation. Apps that respect it show upright; apps that don’t show raw pixels.
Reading EXIF privately
A browser-based viewer that processes files locally doesn’t upload your photo anywhere — important when the image might contain sensitive information. If a viewer demands a file upload, think twice before feeding it a family or medical photo.
For true offline inspection, the exiftool command-line utility is the gold standard. A good web viewer uses the same parsing library compiled to WebAssembly and runs it in your browser.
Practical uses beyond privacy
Some everyday wins from checking EXIF:
- Diagnosing why phone photos “look soft” — check ISO and shutter speed.
- Confirming a stock photo is actually as recent as claimed.
- Identifying the exact lens on a great shot you want to emulate.
- Verifying that a real-estate listing photo is from this year, not five years ago.
- Investigating whether a forwarded photo has been processed.
When EXIF is missing
A file with no EXIF at all has been stripped, converted through a tool that drops metadata, or re-saved by a social platform. Don’t assume “no EXIF” means “original.” The opposite is usually true: originals have the most metadata, and derivatives lose it.
Comparing EXIF across a batch
A spreadsheet view of EXIF across a folder of photos is powerful for auditing:
- Sort by DateTimeOriginal to build a timeline even without filename dates.
- Group by Make/Model to see which camera produced which images.
- Filter by GPS presence to spot unstripped location data.
- Sort by ISO to find the high-noise shots worth editing.
- Cross-check Software field to catch files passed through editing tools.
Command-line exiftool can export CSV for this; web tools increasingly offer the same as a “batch info” mode.
Raw files and proprietary metadata
Camera raw files (CR3, NEF, ARW, DNG) contain far richer metadata than JPEGs — white balance as set, autofocus point used, image stabilization state, even the exact orientation sensor readings. Most web viewers strip these proprietary fields or fail to parse them. For deep raw analysis, use the camera vendor’s software or exiftool.
Most day-to-day needs don’t require raw-level metadata — JPEG EXIF has everything except the nichest fields. But if you’re diagnosing a missed-focus issue or verifying a specific shot setting, the raw carries the full record.
Common mistakes
Treating EXIF as ground truth — forgetting that every field is editable with the right tool. Reading timestamps without accounting for timezone offset. Assuming GPS absence means the photo can’t be geolocated (reverse image search and visual cues often can). Ignoring the Orientation tag and being confused by “sideways” raw pixels. Uploading a photo to an “EXIF viewer” service that secretly logs the file — prefer tools that process locally in the browser. And confusing the EXIF-embedded thumbnail with the actual image; they can differ significantly on edited files.
Run the numbers
Our EXIF viewer reads all EXIF, IPTC, and XMP fields locally in the browser — files never leave your device. If your goal after inspection is to strip sensitive fields, the EXIF remover is the next step. And for a quick sanity check on whether an image is even the size you think it is, the image dimensions checker gives you width, height, and file size at a glance.
Advertisement