Skip to content

Radheshyam00/ImageAnalyzer00

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

82 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Advanced Image Metadata & Security Analyzer(AIMSA)

Unlock Insights, Transform Images, Empower Decisions

Last Commit Commit Time Python Languages

Built with the tools and technologies:

Markdown Streamlit Scikit-learn Folium NumPy Python SciPy Plotly pandas

Overview

AIMSA (Advanced Image Metadata & Security Analyzer) is a comprehensive Streamlit-based application designed for in-depth image analysis. Perfect for digital forensics professionals, cybersecurity experts, and privacy-conscious users who need to thoroughly examine image files for metadata, security threats, and hidden content.


Key Features

Comprehensive Analysis

  • File Information: Complete file details including name, size, MIME type, MD5/SHA256 hashes, and magic bytes
  • EXIF & Metadata Extraction: Camera information, timestamps, GPS coordinates, and exposure settings
  • Header Analysis: File type validation and structural integrity checks

Metadata Management

  • Metadata Editor: Modify EXIF data in JPEG files
  • Metadata Removal: Strip sensitive information for privacy protection
  • ICC Profile Analysis: Extract color space and format specifications

Security Features

  • VirusTotal Integration: Real-time malware scanning (API key required)
  • Steganography Detection: Identify hidden data, embedded archives, and entropy anomalies
  • JFIF Metadata Analysis: Detailed format information extraction

Export & Reporting

  • JSON Reports: Export complete analysis results
  • Downloadable Formats: Save cleaned images and reports

Supported File Formats

Format Extensions Features
JPEG .jpg, .jpeg Full metadata editing, EXIF extraction
PNG .png Metadata analysis, transparency info
TIFF .tiff, .tif Multi-page support, compression details
BMP .bmp Basic analysis, header validation
WebP .webp Modern format support
GIF .gif Animation frame analysis

Project Structure

ImageAnalyzer00/
├── app.py                  # Main application file
├── requirements.txt        # Python dependencies
├── .env                    # Environment variables (create this)
├── LICENSE                 # BSD 3-Clause License
├── README.md               # This file
├── pages/
│   ├── file.py             # Handles file upload and processing logic
│   ├── forensic.py         # Image forensic analysis features
│   └── metadata.py         # Metadata extraction and processing
└── assets/                 # Additional resources

Quick Start

Prerequisites

  • Python 3.8 or higher
  • pip package manager

Installation

  1. Clone the repository

    git clone https://github.com/Radheshyam00/ImageAnalyzer00.git
    cd ImageAnalyzer00
  2. Set up virtual environment

    # Create virtual environment
    python -m venv venv
    
    # Activate (Linux/Mac)
    source venv/bin/activate
    
    # Activate (Windows)
    venv\Scripts\activate
  3. Install dependencies

    pip install -r requirements.txt
  4. Configure environment (Optional)

    # Create .env file for additional features
    echo "MONGO_URI=your_mongodb_uri" > .env
    echo "VIRUSTOTAL_API_KEY=your_api_key" >> .env

Running the App

streamlit run app.py

Open your browser to http://localhost:8501


Use Cases

Digital Forensics

  • Investigate image authenticity and origin
  • Extract hidden metadata for evidence
  • Analyze file structure for tampering

Privacy Protection

  • Remove GPS coordinates before sharing
  • Strip camera information from photos
  • Clean metadata for anonymous publishing

Cybersecurity

  • Detect steganographic payloads
  • Scan for embedded malware
  • Analyze suspicious image files

Content Management

  • Audit photo collections for sensitive data
  • Batch process metadata removal
  • Validate file integrity

Configuration

VirusTotal Integration

To enable malware scanning:

  1. Sign up for a VirusTotal API key
  2. Add your API key to the .env file or enter it in the application interface

MongoDB Integration (Optional)

For enhanced file tracking with File Inspector Pro:

MONGO_URI=mongodb://username:password@host:port/database

Contributing

We welcome contributions! Please feel free to submit a Pull Request. For major changes, please open an issue first to discuss what you would like to change.

  1. Fork the repository
  2. Create your feature branch (git checkout -b feature/AmazingFeature)
  3. Commit your changes (git commit -m 'Add some AmazingFeature')
  4. Push to the branch (git push origin feature/AmazingFeature)
  5. Open a Pull Request

License

This project is licensed under the BSD 3-Clause License - see the LICENSE file for details.


Support

If you encounter any issues or have questions:

  • Open an issue on GitHub Issues
  • Check existing issues for solutions
  • Review the documentation

Made with dedication for the cybersecurity and digital forensics community

Star this repository if you find it helpful!

About

Develop a web-based application designed for performing image forensic analysis and extracting detailed metadata from images.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages