Digital Image Authentication from JPEG Headers Eric Kee, Micah K

Total Page:16

File Type:pdf, Size:1020Kb

Digital Image Authentication from JPEG Headers Eric Kee, Micah K 1 Digital Image Authentication from JPEG Headers Eric Kee, Micah K. Johnson and Hany Farid Abstract— It is often desirable to determine if an image has several features of the JPEG format not previously considered, been modified in any way from its original recording. The namely properties of the run-length encoding employed by the JPEG format affords engineers many implementation trade-offs JPEG standard, and aspects of the EXIF header format. This which give rise to widely varying JPEG headers. We exploit these variations for image authentication. A camera signature analysis is validated on over 1:3 million images spanning 33 is extracted from a JPEG image consisting of information different camera manufacturers and 773 different camera and about quantization tables, Huffman codes, thumbnails, and EXIF cellphone models. format. We show that this signature is highly distinct across 1:3 million images spanning 773 different cameras and cellphones. Specifically, 62% of images have a signature that is unique to II. METHODS a single camera, 80% of images have a signature that is shared The JPEG file format has emerged as a universal image by three or fewer cameras, and 99% of images have a signature standard employed by nearly all commercial digital cam- that is unique to a single manufacturer. The signature of Adobe Photoshop is also shown to be unique relative to all 773 cameras. eras [30], [31]. As such, we consider the details of this These signatures are simple to extract and offer an efficient encoding scheme, and how these details vary among cameras method to establish the authenticity of a digital image. of different make, model, resolution, and quality. Cameras often support multiple resolutions and qualities, each of which yield images with different JPEG compression parameters. We I. INTRODUCTION will, therefore, explore the JPEG parameters used by cameras Digital images are now routinely introduced as evidence of different make and model, and by each camera under into a court of law. It has, therefore, become critical to different resolution and quality settings. verify the integrity of this digital evidence. Digital forensic We begin by describing the JPEG compression standard and techniques have been developed to detect various traces of file format. Given a three channel color image (RGB), com- tampering: region duplication [1], [2], [3], [4]; resampling [5], pression proceeds as follows. An image is first transformed [6]; color filter array artifacts [7], [8]; inconsistencies in from RGB into luminance/chrominance space (YCbCr). The camera response function [9]; inconsistencies in lighting and two chrominance channels (CbCr) are typically subsampled shadows [10], [11], [12], [13]; inconsistencies in chromatic by a factor of two relative to the luminance channel (Y). Each aberrations [14], [15]; inconsistencies in sensor noise [16], channel is then partitioned into 8×8 pixel blocks. These values [17]; and inconsistencies in statistical features [18]. See [19] are converted from unsigned to signed integers (e.g., from for a general survey. However, relatively benign modifications [0;255] to [−128;127]). Each block, fc(·), is converted to either cannot be detected by these techniques, or render these frequency space, Fc(·), using a 2-D discrete cosine transform techniques ineffective. (DCT): It is often desirable to determine if a digital image has 7 7 X X (2x + 1)uπ (2y + 1)vπ been altered in any way from the time of its recording, Fc(u;v) = αu;v fc(x;y) cos cos ; (1) 16 16 including manipulations as simple as cropping. Previous work x=0 y=0 in detecting double JPEG compression holds some promise to where c denotes a specific image channel, α is a normal- detect any form of image manipulation [20], [21], [22], [23], u;v izing scale factor, and f (·) is the underlying pixel values. [24]. These techniques require fairly sophisticated models c Depending on the specific frequency u;v and channel c, each and analysis schemes, can be vulnerable to simple counter- DCT coefficient, F (·), is quantized by an amount q (·): measures such as additive noise or down-sampling, and can c c be computationally intensive. In contrast, it has been previ- Fc(u;v) F^c(u;v) = round : (2) ously shown that EXIF headers [25] and JPEG quantization qc(u;v) tables [26], [27], [28], [29] used by cameras and software This stage is the primary source of data reduction and infor- manufacturers are somewhat distinct, and can therefore be mation loss. used to determine if an image has been altered from its With some variations, the above sequence of steps is em- original recording. Building on this earlier work, we describe ployed by all JPEG encoders. The primary source of variation how various aspects of the JPEG format can be used for in these encoders is the choice of quantization values q (·). authentication. Unlike previous work, this approach considers c The quantization is specified as a set of three 8 × 8 tables E. Kee ([email protected]) and H. Farid ([email protected]) associated with each frequency and image channel (YCbCr). are with the Department of Computer Science at Dartmouth College, 6211 For low compression rates, the values in these tables tend Sudikoff Lab, Hanover NH 03755. M.K. Johnson ([email protected]) is towards 1, and increase for higher compression rates. Shown with the Computer Science and Artificial Intelligence Laboratory at the Massachusetts Institute of Technology, 32 Vassar Street, 32-D462 Cambridge, in top portion of Fig. 2, for example, are the quantization MA 02139. tables employed by a Canon and Nikon digital camera. Shown, 2 from top to bottom, are the tables for the luminance and B. Thumbnail Parameters chrominance channels. As is typical, the quantization for A thumbnail version of the full resolution image is often the luminance channel is less than for the two chrominance embedded in the JPEG header. The next three components channels, and the quantization is less for the lower frequency of our camera signature are extracted from this thumbnail components (the frequency in each table is specified in stan- image. A thumbnail is typically no larger in size than a few dard zig-zag order with the lowest frequency in the top left hundred square pixels, and is created by cropping, filtering corner, and the highest frequency in the bottom right corner). and down-sampling the full-resolution image. The thumbnail After quantization, the DCT coefficients are subjected to is then typically compressed and stored in the header as a entropy encoding (typically Huffman coding). Huffman coding JPEG image. As such, we can extract the same components is a variable-length encoding scheme that encodes frequently from the thumbnail as from the full resolution image described occurring values with shorter codes, and less frequently oc- in the previous section. As with the full resolution image, we curring values with longer codes. This lossless compression have found that the chrominance channels are encoded with scheme exploits the fact that the quantization of DCT coef- the same parameters. ficients yields many zero coefficients, which can in turn be Some camera manufacturers do not create a thumbnail efficiently encoded. Motivated by the fact that the statistics image, or do not encode them as a JPEG image. In such 1 of the DC and AC DCT coefficients are different , the JPEG cases, we simply assign a value of zero to all of the thumbnail standard allows for different Huffman codes for the DC and parameters. Rather than being a limitation, we consider the AC coefficients. This entropy encoding is applied separately lack of a thumbnail as a characteristic property of a camera. to each YCbCr channel, employing separate codes for each In total, we extract 284 values from the thumbnail image: channel. 2 thumbnail dimensions, 192 quantization values, and 90 The JPEG standard does not enforce any specific quantiza- Huffman codes. tion table or Huffman code. Camera and software engineers are therefore free to balance compression and quality to their own needs and tastes. The specific quantization tables and Huffman C. EXIF Metadata Parameters codes needed to decode a JPEG file are embedded into the The final component of our camera signature is extracted JPEG header. In the following sections we describe how the from an image’s EXIF metadata [32]. The metadata, found JPEG quantization table and Huffman codes along with other in the JPEG header, stores a variety of information about the data extracted from the JPEG header form a distinct camera camera and image. According to the EXIF standard, there are signature which can be used for authentication. five main image file directories (IFDs) into which the metadata is organized: (1) Primary; (2) Exif; (3) Interoperability; (4) A. Image Parameters Thumbnail; and (5) GPS. Camera manufacturers are free to embed any (or no) information into each IFD. We extract a The first three components of our camera signature are the compact representation of their choice by counting the number image dimensions, quantization table, and Huffman code. The of entries in each of these five IFDs. image dimensions are used to distinguish between cameras Because the EXIF standard allows for the creation of addi- with different sensor resolution. In order to compensate for tional IFDs, we also count the total number of any additional landscape and portrait images, the image dimensions are spec- IFDs, and the total number of entries in each of these. Some ified as the minimum dimension followed by the maximum camera manufacturers customize their metadata in ways that dimension. The set of three 8 × 8 quantization tables are do not conform to the EXIF standard. These customizations specified as a one dimensional array of 192 values: each yield errors when parsing the metadata.
Recommended publications
  • Adobe's Extensible Metadata Platform (XMP): Background [DRAFT -- Caroline Arms, 2011-11-30]
    Adobe's Extensible Metadata Platform (XMP): Background [DRAFT -- Caroline Arms, 2011-11-30] Contents • Introduction • Adobe's XMP Toolkits • Links to Adobe Web Pages on XMP Adoption • Appendix A: Mapping of PDF Document Info (basic metadata) to XMP properties • Appendix B: Software applications that can read or write XMP metadata in PDFs • Appendix C: Creating Custom Info Panels for embedding XMP metadata Introduction Adobe's XMP (Extensible Metadata Platform: http://www.adobe.com/products/xmp/) is a mechanism for embedding metadata into content files. For example. an XMP "packet" can be embedded in PDF documents, in HTML and in image files such as TIFF and JPEG2000 as well as Adobe's own PSD format native to Photoshop. In September 2011, XMP was approved as an ISO standard.[ ISO 16684-1: Graphic technology -- Extensible metadata platform (XMP) specification -- Part 1: Data model, serialization and core properties] XMP is an application of the XML-based Resource Description Framework (RDF; http://www.w3.org/TR/2004/REC-rdf-primer-20040210/), which is a generic way to encode metadata from any scheme. RDF is designed for it to be easy to use elements from any namespace. An important application area is in publication workflows, particularly to support submission of pictures and advertisements for inclusion in publications. The use of RDF allows elements from different schemes (e.g., EXIF and IPTC for photographs) to be held in a common framework during processing workflows. There are two ways to get XMP metadata into PDF documents: • manually via a customized File Info panel (or equivalent for products from vendors other than Adobe).
    [Show full text]
  • XMP SPECIFICATION PART 3 STORAGE in FILES Copyright © 2016 Adobe Systems Incorporated
    XMP SPECIFICATION PART 3 STORAGE IN FILES Copyright © 2016 Adobe Systems Incorporated. All rights reserved. Adobe XMP Specification Part 3: Storage in Files NOTICE: All information contained herein is the property of Adobe Systems Incorporated. No part of this publication (whether in hardcopy or electronic form) may be reproduced or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written consent of Adobe Systems Incorporated. Adobe, the Adobe logo, Acrobat, Acrobat Distiller, Flash, FrameMaker, InDesign, Illustrator, Photoshop, PostScript, and the XMP logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries. MS-DOS, Windows, and Windows NT are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Apple, Macintosh, Mac OS and QuickTime are trademarks of Apple Computer, Inc., registered in the United States and other countries. UNIX is a trademark in the United States and other countries, licensed exclusively through X/Open Company, Ltd. All other trademarks are the property of their respective owners. This publication and the information herein is furnished AS IS, is subject to change without notice, and should not be construed as a commitment by Adobe Systems Incorporated. Adobe Systems Incorporated assumes no responsibility or liability for any errors or inaccuracies, makes no warranty of any kind (express, implied, or statutory) with respect to this publication, and expressly disclaims any and all warranties of merchantability, fitness for particular purposes, and noninfringement of third party rights. Contents 1 Embedding XMP metadata in application files .
    [Show full text]
  • Digital Forensics Tool Testing – Image Metadata in the Cloud
    Digital Forensics Tool Testing – Image Metadata in the Cloud Philip Clark Master’s Thesis Master of Science in Information Security 30 ECTS Department of Computer Science and Media Technology Gjøvik University College, 2011 Avdeling for informatikk og medieteknikk Høgskolen i Gjøvik Postboks 191 2802 Gjøvik Department of Computer Science and Media Technology Gjøvik University College Box 191 N-2802 Gjøvik Norway Digital Forensics Tool Testing – Image Metadata in the Cloud Abstract As cloud based services are becoming a common way for users to store and share images on the internet, this adds a new layer to the traditional digital forensics examination, which could cause additional potential errors in the investigation. Courtroom forensics evidence has historically been criticised for lacking a scientific basis. This thesis aims to present an approach for testing to what extent cloud based services alter or remove metadata in the images stored through such services. To exemplify what information which could potentially reveal sensitive information through image metadata, an overview of what information is publically shared will be presented, by looking at a selective section of images published on the internet through image sharing services in the cloud. The main contributions to be made through this thesis will be to provide an overview of what information regular users give away while publishing images through sharing services on the internet, either willingly or unwittingly, as well as provide an overview of how cloud based services handle Exif metadata today, along with how a forensic practitioner can verify to what extent information through a given cloud based service is reliable.
    [Show full text]
  • RASPBERRY PI PROJECTS Civilization: Beyond Earth Is Coming to Linux
    CONTENTS September LV006 The ninth project: create 115 page of awesome. Mission accomplished! 18 REGULARS SUBSCRIBE 06 News ON PAGE 60 The NSA is watching us drool over the new Model B Raspberry Pi. 08 Distrohopper Try Voyager 14.04, Netrunner and RHEL; and think on when 8 you name your next project. 10 Gaming RASPBERRY PI PROJECTS Civilization: Beyond Earth is coming to Linux. All other Track a space station, program activity rendered pointless. Minecraft, set up a security cam and 12 Speak your brains Let us know what’s going on in more. What are you waiting for? your precious cerebral cortex. Not you, Crown Prince Ekoku! 16 LV on tour The grapevine tingles with news from Edinburgh, Verona 30 and Bristol. 40 Interview Daniel Stone, one of the movers and shakers behind the Wayland display server. 54 Group test Do your productivity a favour by switching to one of these tiling window managers. 60 Subscribe! And whet your appetite for the feast of Free Software to come in LV007. Why KDE 5 is going to rock, and avoid the 62 Cloud admin Build, ship and run blunders of early 4.x releases distributed applications with containers and Docker. 64 Core technologies More arcane lore from Dr Chris Brown’s compendium of Linux. 68 FOSSpicks Picks so free, they’re freer than a bird dressed up as William Wallace. 110 Masterclass 34 38 26 Keep tabs on your hard FORK IT FAQ: KRITA SLACKWARE drive with Smart and Projects sometimes Apart from being Meet the oldest distro GSmartControl.
    [Show full text]
  • Development of National Digital Evidence Metadata
    JOIN (Jurnal Online Informatika) Volume 4 No. 1 | Juni 2019 : 24-27 DOI: 10.15575/join.v4i1.292 Development of National Digital Evidence Metadata Bambang Sugiantoro Magister of Informatics, UIN Sunan Kalijaga, Yogyakarta, Indonesia [email protected] Abstract- The industrial era 4.0 has caused tremendous disruption in many sectors of life. The rapid development of information and communication technology has made the global industrial world undergo a revolution. The act of cyber-crime in Indonesia that utilizes computer equipment, mobile phones are increasingly increasing. The information in a file whose contents are explained about files is called metadata. The evidence items for cyber cases are divided into two types, namely physical evidence, and digital evidence. Physical evidence and digital evidence have different characteristics, the concept will very likely cause problems when applied to digital evidence. The management of national digital evidence that is associated with continued metadata is mostly carried out by researchers. Considering the importance of national digital evidence management solutions in the cyber-crime investigation process the research focused on identifying and modeling correlations with the digital image metadata security approach. Correlation analysis reads metadata characteristics, namely document files, sounds and digital evidence correlation analysis using standard file maker parameters, size, file type and time combined with digital image metadata. nationally designed the highest level of security is needed. Security-enhancing solutions can be encrypted against digital image metadata (EXIF). Read EXIF Metadata in the original digital image based on the EXIF 2.3 Standard ID Tag, then encrypt and insert it into the last line.
    [Show full text]
  • JPEG Standard
    JPEG standard JPEG: “Joint Photographic Experts Group” Formally: ISO/IEC JTC1/SC29/WG10 Working Group 10 International (JBIG, JPEG) Organization for Subcommittee 29 Standardization Joint ISO/IEC (Coding of Audio, Technical International Picture, Multimedia Committee Electrotechnical and Hypermedia (Information Commission Information) Technology) Joint effort with CCITT (International Telephone and Telegraph Consultative Committee, now ITU-T) Study Group VIII Work commenced in 1986 International standard ISO/IEC 10918-1 and CCITT Rec. T.81 in 1992 Widely used for image exchange, WWW, and digital photography Motion-JPEG is de facto standard for digital video editing Bernd Girod: EE398A Image and Video Compression JPEG standard no. 1 JPEG: image partition into 8x8 block 8x8 blocks Padding of right boundary blocks Padding of lower boundary blocks Bernd Girod: EE398A Image and Video Compression JPEG standard no. 2 Baseline JPEG coder DC Huffman tables dc quantization indices Differential coding VLC Level 8x8 Uniform Compressed scalar image data input offset DCT quantization image Zig-zag Run-level scan coding VLC Compressed image data ac quantization indices Quantization tables AC Huffman tables Bernd Girod: EE398A Image and Video Compression JPEG standard no. 3 Recommended quantization tables Based on psychovisual threshold experiments Luminance Chrominance, subsampled 2:1 16 11 10 16 24 40 51 61 17 18 24 47 99 99 99 99 12 12 14 19 26 58 60 55 18 21 26 66 99 99 99 99 14 13 16 24 40 57 69 56 24 26 56 99 99 99 99 99 14 17 22 29 51 87 80 62 47 66 99 99 99 99 99 99 18 22 37 56 68 109 103 77 99 99 99 99 99 99 99 99 24 36 55 64 81 104 113 92 99 99 99 99 99 99 99 99 49 64 78 87 103 121 120 101 99 99 99 99 99 99 99 99 72 92 95 98 112 100 103 99 99 99 99 99 99 99 99 99 [JPEG Standard, Annex K] Bernd Girod: EE398A Image and Video Compression JPEG standard no.
    [Show full text]
  • EXIF: a Format Is Worth a Thousand Words
    NATIONAL LAW ENFORCEMENT AND CORRECTIONS TECHNOLOGY CENTER A program of the Office of Justice Programs’ National Institute of Justice From Winter 2007 TechBeat TECH b • e • a • t Dedicated to Reporting Developments in Technology for Law Enforcement, Corrections, and Forensic Sciences EXIF: A Format Is Worth A Thousand Words he National Center for Missing & Exploited Children if they are used only to open the file. If, however, these T revealed in a June 2005 study that 40 percent of arrest- programs are used to modify an image, they can destroy ed child pornography possessors had both sexually the Exif data. victimized children and were in possession of child pornog- The most important data may be the thumbnail image raphy. Due in part to the increasing prevalence of child exploitation and pornography, the digital photograph has linked to the photograph. Thumbnails are saved in their now become a fixture in gathering and examining forensic own hidden file (a thumbs.db file placed in folders con- evidence in such cases. taining images on the computer), and changes to an image may not always transfer to the corresponding Investigators who frequently handle child pornogra- thumbnail. If an original image is wiped from a disk using phy cases usually have (or know where to access) the a program such as Secure Clean™ or BCWipe®, the thumb- tools and the knowledge to obtain evidence associated nail may still be available. Officers have encountered situ- with contraband images. Nevertheless, law enforcement ations in which the victim’s or perpetrator’s face was officers who do not handle these cases on a regular basis blurred or concealed in the full image, but the thumbnail may be unaware of the important data that can be depicted an older version that revealed the obscured derived from digital images.
    [Show full text]
  • Digital Negative (DNG) Specification
    Digital Negative (DNG) Ë Specification Version 1.1.0.0 February 2005 ADOBE SYSTEMS INCORPORATED Corporate Headquarters 345 Park Avenue San Jose, CA 95110-2704 (408) 536-6000 http://www.adobe.com Copyright © 2004-2005 Adobe Systems Incorporated. All rights reserved. NOTICE: All information contained herein is the property of Adobe Systems Incorporated. No part of this publication (whether in hardcopy or electronic form) may be reproduced or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written consent of Adobe Systems Incorporated. Adobe, the Adobe logo, and Photoshop are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries. All other trademarks are the property of their respective owners. This publication and the information herein is furnished AS IS, is subject to change without notice, and should not be construed as a commitment by Adobe Systems Incorporated. Adobe Systems Incorporated assumes no responsibility or liability for any errors or inaccuracies, makes no warranty of any kind (express, implied, or statutory) with respect to this publication, and expressly disclaims any and all warranties of merchantability, fitness for particular purposes, and noninfringement of third party rights. Table of Contents Preface . .vii About This Document . vii Audience . vii How This Document Is Organized . vii Where to Go for More Information . viii Chapter 1 Introduction . 9 The Pros and Cons of Raw Data. 9 A Standard Format . 9 The Advantages of DNG . 10 Chapter 2 DNG Format Overview . .11 File Extensions . 11 SubIFD Trees . 11 Byte Order . 11 Masked Pixels .
    [Show full text]
  • Image Formats
    Image Formats Ioannis Rekleitis Many different file formats • JPEG/JFIF • Exif • JPEG 2000 • BMP • GIF • WebP • PNG • HDR raster formats • TIFF • HEIF • PPM, PGM, PBM, • BAT and PNM • BPG CSCE 590: Introduction to Image Processing https://en.wikipedia.org/wiki/Image_file_formats 2 Many different file formats • JPEG/JFIF (Joint Photographic Experts Group) is a lossy compression method; JPEG- compressed images are usually stored in the JFIF (JPEG File Interchange Format) >ile format. The JPEG/JFIF >ilename extension is JPG or JPEG. Nearly every digital camera can save images in the JPEG/JFIF format, which supports eight-bit grayscale images and 24-bit color images (eight bits each for red, green, and blue). JPEG applies lossy compression to images, which can result in a signi>icant reduction of the >ile size. Applications can determine the degree of compression to apply, and the amount of compression affects the visual quality of the result. When not too great, the compression does not noticeably affect or detract from the image's quality, but JPEG iles suffer generational degradation when repeatedly edited and saved. (JPEG also provides lossless image storage, but the lossless version is not widely supported.) • JPEG 2000 is a compression standard enabling both lossless and lossy storage. The compression methods used are different from the ones in standard JFIF/JPEG; they improve quality and compression ratios, but also require more computational power to process. JPEG 2000 also adds features that are missing in JPEG. It is not nearly as common as JPEG, but it is used currently in professional movie editing and distribution (some digital cinemas, for example, use JPEG 2000 for individual movie frames).
    [Show full text]
  • EXIF Estimation with Convolutional Neural Networks
    EXIF Estimation With Convolutional Neural Networks Divyahans Gupta Sanjay Kannan Stanford University Stanford University [email protected] [email protected] Abstract 1.1. Motivation While many computer vision tasks focus on recognizing In this paper, we explore a novel application of convolu- aspects of a scene, we want to focus instead on aspects of tional neural networks (CNNs): the task of estimating pho- the photography. Determining EXIF data from raw image tographic metadata. Given the raw pixels of a digital pho- pixels has several potential uses, including artistic imitation tograph, we attempt to predict the camera settings it was and digital forensics. Most images on the web are actually taken with, including shutter speed, aperture size, and ISO stripped of this data for this reason. level. We present some baseline results on this task using Moreover, solving this task may provide insight on what the MIRFLICKR dataset. We further contextualize these re- constitutes an image’s form, rather than its content. sults in the realm of photography. 1. Introduction Modern digital cameras store metadata, known as EXIF data, with every photo they capture. EXIF data stores infor- mation about the way a photo was taken, such as a camera’s shutter speed, exposure level, and aperture size, as well as the particular setting (time and place). Figure 2: Visual manifestations of aperture variance. The EXIF fields store significant properties of an image photograph on the left is taken with a small aperture while (depth of field and brightness, to name two examples) that the photograph on the right is taken with a large aperture.
    [Show full text]
  • Potential Use of Image Description Metadata for Accessibility
    DIAGRAM Center Working Paper – April 2011 Potential Use of Image Description Metadata for Accessibility This working paper outlines the current barriers and opportunities for providing image description within publishing tools, technologies, and production processes. Ongoing discussion with standards groups, Adobe and other tool developers is exploring the feasibility of extending support for alt text and longdesc within image formats and authoring tools. Background................................................................................................................................................................... 1 Image Metadata Specifications and Related Standards Organizations................................................. 3 Table 1 – Typical Camera Metadata................................................................................................................ 3 Table 2 – Metadata Formats Supported in Image Formats................................................................... 7 Opportunities for Image Description in Metadata Specifications.......................................................... 7 Table 3 – Metadata Working Group Description Field Cross References........................................ 8 Metadata Handling within Existing Tools ..................................................................................................... 10 Image Creation and Editing Tools................................................................................................................. 11 Image Management
    [Show full text]
  • The Showfoto Handbook the Showfoto Handbook
    The Showfoto Handbook The Showfoto Handbook 2 Contents 1 Introduction 13 1.1 Background . 13 1.1.1 About Showfoto . 13 1.1.2 Reporting Bugs . 13 1.1.3 Support . 13 1.1.4 Getting Involved . 13 1.2 Supported Image Formats . 14 1.2.1 Introduction . 14 1.2.2 Still Image Compression . 14 1.2.3 JPEG . 14 1.2.4 TIFF . 15 1.2.5 PNG . 15 1.2.6 PGF . 15 1.2.7 RAW . 15 2 The Showfoto sidebar 17 2.1 The Showfoto Right Sidebar . 17 2.1.1 Introduction to the Right Sidebar . 17 2.1.2 Properties . 17 2.1.3 Metadata . 18 2.1.3.1 EXIF Tags . 19 2.1.3.1.1 What is EXIF . 19 2.1.3.1.2 How to Use EXIF Viewer . 19 2.1.3.2 Makernote Tags . 20 2.1.3.2.1 What is Makernote . 20 2.1.3.2.2 How to Use Makernote Viewer . 20 2.1.3.3 IPTC Tags . 20 2.1.3.3.1 What is IPTC . 20 2.1.3.3.2 How to Use IPTC Viewer . 21 2.1.3.4 XMP Tags . 21 2.1.3.4.1 What is XMP . 21 2.1.3.4.2 How to Use XMP Viewer . 21 2.1.4 Colors . 21 The Showfoto Handbook 2.1.4.1 Histogram Viewer . 21 2.1.4.2 How To Use an Histogram . 23 2.1.5 Maps . 25 2.1.6 Captions . 26 2.1.6.1 Introduction .
    [Show full text]