Skip to main content
Disinformation campaigns rely on manipulated or repurposed media. The tools and process below help investigators determine whether an image or video is authentic, has been altered, or has appeared in a different context.

Fact-checking tools

ToolFunctionURLType
InVID & WeVerifyVideo verification pluginhttps://weverify.eu/verification-pluginExtension
FotoForensicsELA image analysishttps://fotoforensics.comWeb
ForensicallyVisual analysis suitehttps://29a.ch/photo-forensicsWeb
HyperVerge Deepfake DetectorAI detectionhttps://hyperverge.coAPI
Sensity AIDeepfakes detectionhttps://sensity.aiProfessional
Content Authenticity InitiativeOrigin verificationhttps://contentauthenticity.orgStandard

Verification process

1

Extract metadata with ExifTool

Run exiftool on the file to extract embedded metadata including creation date, GPS coordinates, device model, and software edits. Inconsistencies between claimed and embedded data are a strong indicator of manipulation.
2

Analyze with FotoForensics (ELA)

Upload the image to FotoForensics for Error Level Analysis (ELA). Areas of the image that have been altered will show a different compression error level from the rest of the picture.
3

Check consistencies with Forensically

Use Forensically’s suite of tools — including clone detection, noise analysis, and JPEG ghost detection — to identify copy-paste manipulation or compositing artifacts.
4

For video: use InVID for keyframes

Install the InVID & WeVerify browser extension and submit the video URL to extract keyframes for reverse image searching, metadata reading, and magnification analysis.
5

Reverse image search in TinEye/Google

Run a reverse image search on the extracted keyframe or original image in TinEye and Google Images to find earlier appearances of the same image in different contexts or with different captions.

Build docs developers (and LLMs) love