snapWONDERS Vaultify is in early βeta — you may encounter rough edges or unexpected behaviour. Found a bug? Let us know and we'll fix it.

What Photos & Videos
Secretly Reveal

Every image and video carries invisible forensic data — GPS coordinates, device fingerprints, editing history, and sometimes concealed payloads. Below are the six evidence categories our analysis pipeline surfaces. Curated real-world cases are being added now.

GPS & Location Camera Fingerprints ELA Splice Detection Metadata & Identity Encoding Anomalies Steganography

Six categories of forensic evidence

Our analysis pipeline examines photos and videos across six distinct evidence layers — each with real-world privacy and authenticity implications. Cases demonstrating each category are being published now.

GPS Location & Movement Data

Smartphones embed precise latitude and longitude into every photo they capture. A single image can silently expose a home address, workplace, or the location of a private meeting — often without the photographer ever knowing it is there. Our analysis resolves GPS coordinates to named locations and flags proximity to sensitive sites.

Camera & Device Fingerprinting

JPEG files contain quantisation tables (DQT) unique to each camera model, sensor, and firmware revision. By matching these signatures against a database of thousands of devices, we detect mismatches between the claimed camera and the actual encoder — exposing re-encoding, software conversion, and AI-generated imagery masquerading as a real photograph.

Error Level Analysis — Splice Detection

Re-saving a JPEG after editing alters the local compression entropy in mathematically detectable ways. ELA maps these compression-level differences across the image, highlighting pasted regions, inserted objects, removed elements, and text overlays that carry a different error signature from the surrounding original content.

Metadata & Identity Leaks

Photo editing software embeds author names, computer usernames, email addresses, and editing timestamps directly into image file headers. These fields frequently survive social media re-uploads and can reveal the real identity of an anonymous poster, the complete editing history of a manipulated image, or the organisation that produced it.

Encoding Anomalies & Signal Mismatches

Inconsistencies between encoder fingerprints, quantisation profiles, colour spaces, and EXIF data indicate post-processing, format conversion, screenshot capture, or AI generation. Each mismatch type carries a specific forensic implication — from social media re-compression to deliberate metadata stripping — with a calibrated severity rating.

Steganography — Hidden Content Detection

Steganography conceals data inside ordinary images or videos, hiding the very existence of the payload rather than just its meaning. Our proprietary detection engine identifies statistical anomalies consistent with LSB and frequency-domain hidden payloads — including Vaultify-encoded content — even when the file passes all standard format validation checks.

Coming Soon

Real Forensic Case Studies

snapWONDERS is actively being expanded and modernised. We are preparing curated real-world cases — actual analysis results with full editorial commentary explaining exactly what was found and why it matters. The first cases below are in preparation now.

vaultify.snapwonders.com/forensic-examples/gps-home-address
F · CRITICAL GPS Coordinates Revealing a Home Address
GPS · CriticalCoordinates resolve to a residential address. Exact street-level location exposed.
Camera · HighCanon EOS R5 · Serial: 1234567 · owner tag present
Metadata · ModerateAdobe Lightroom 12.4 · Windows XP Author field present
DQT · InformationalQuantisation table matches Canon firmware v1.8.0
Read full analysis →

Above: preview of the case study format currently being built. Published cases will show full editorial commentary and actual analysis results.

In preparation
GPS & Location

GPS Coordinates Revealing a Home Address

A photograph shared publicly — the EXIF GPS field contained exact residential coordinates. Full analysis with map resolution and severity breakdown.

Case being prepared — 70% complete

In preparation
ELA Splice Detection

ELA Anomaly Exposing a Composited Region

An image presented as unedited. ELA surface map identified a pasted region with mismatched compression entropy. The splice boundary and severity score explained.

Case being prepared — 50% complete

In preparation
Camera Fingerprint

DQT Mismatch — Claimed Camera vs Actual Encoder

A file with EXIF claiming a specific camera model. The DQT signature matched a desktop photo editor, not the stated device. What this reveals about editing provenance.

Case being prepared — 40% complete

More cases covering metadata identity leaks, encoding anomalies, and steganography detection are being added.

Share the ♥

Browsing Safely
Web SSL Web Browser over SSL
/
Tor
/
I2P

Same snapWONDERS Vaultify services on all three networks. Read more ↗

Get the App
Download on the
App Store
Get it on
Google Play
Join the waitlist →

Join the Movement

Updates on new API features, privacy tools, and dark web access improvements — nothing else.

Follow the ♥

© 2026 snapWONDERS · All rights reserved.

ABN: 72 080 510 827

Vaultify snapWONDERS.com Vaultify

Vaultify all your Digital Media

Protect / Hide & Conceal / Lock : photos + images + videos

Brought to you by the team at:
goldenSoftwareENGINEERS®