EXIF vs XMP vs IPTC: What's Actually Hiding in Your Files?
When we talk about “hidden data” in photos, we usually use the term EXIF. But EXIF is just one of three major metadata standards that live inside your image files. To truly sanitize a photo, you need to understand the trio: EXIF, XMP, and IPTC.
If your metadata remover only targets EXIF, you are leaving behind a significant forensic trail that can still be used to identify your device and your identity.
TL;DR / Key Takeaways
- **EXIF** handles camera hardware settings (GPS, ISO, Shutter).
- **IPTC** handles descriptive data (Author, Keywords, Copyright).
- **XMP** is the modern, extensible standard that can mirror both and add even more data.
- Strip: Photo Metadata Remover identifies and cleans all three simultaneously.
EXIF: The Hardware Fingerprint
EXIF (Exchangeable Image File Format) is the most common metadata type. It is automatically generated by your camera hardware at the moment of capture.
What it hides:
- Precise GPS coordinates.
- Camera make, model, and serial number.
- Lens information and technical settings.
- Exact date and time (down to the millisecond).
IPTC: The Identity Layer
IPTC (International Press Telecommunications Council) data is often added after the photo is taken, but some professional Android camera apps can embed it instantly.
What it hides:
- Your name or business name.
- Copyright notices.
- Specific keywords and categories.
- Contact information (email/phone) if you’ve set up a professional profile.
XMP: The Modern Super-Tag
XMP (Extensible Metadata Platform) was created by Adobe to be a more flexible way to store metadata. It uses XML to wrap all kinds of information — including copies of the EXIF and IPTC data.
The danger of XMP is that many “privacy” tools forget to look for it. You might clean the EXIF GPS tag, but the XMP tag still holds a copy of those same coordinates.
Audit every hidden tag.
Strip identifies and removes EXIF, XMP, and IPTC in one pass.
Download on Google PlayWhy Most Apps Fail the Test
The “Metadata Remover” apps found on most app stores often use a simple library that only knows how to handle EXIF. When you use these tools, your photo might look clean to a basic viewer, but a forensic tool or an AI scraper can still extract your identity from the IPTC or XMP headers.
Frequently Asked Questions
Does removing EXIF also remove XMP?
Not necessarily. They are stored in different sections of the file’s header. A complete privacy tool must specifically target all three sections to ensure a file is truly sanitized.
Why do we need three different standards?
Legacy. EXIF is for hardware, IPTC is for professional workflows, and XMP is the modern bridge that handles both. Unfortunately for privacy, they all record sensitive data.
Can I see these tags on my phone?
Android’s default gallery usually only shows you a few EXIF tags (like date and location). To see the full forensic profile of your photos, you need an inspector like the one built into Strip.
Recommended Reading:
Browse more guides: Back to Blog