Navigator

A Theme for DokuWiki

User Tools

Site Tools


windows:how_to_inspect_metadata_in_a_pasted_image

How do I inspect metadata in an image I’ve pasted?

here’s the clean, practical way to inspect metadata in an image you’ve pasted — especially when you want to confirm that a Snipping Tool capture is really metadata‑free.

Below are the reliable methods, based on what’s actually possible in Windows 11 and what the tools from the search results support.

🔍 1. Use a clipboard‑inspection tool (best method)

These tools let you see exactly what formats and data Windows stored when you copied the snip.

InsideClipboard (NirSoft)

Shows every clipboard format currently stored — including bitmap, PNG, DIB, HTML, etc.

You can inspect the raw binary content too.

Clipboard Inspector (modern UI)

A newer, Windows‑11‑style clipboard viewer that shows:

  • all formats
  • previews
  • raw data
  • HTML content
[[https://github.com/nerocui/Clipboard-Inspector|GitHub]]

These tools reveal whether the clipboard contains only pixel data (typical for Snipping Tool) or whether any extra metadata formats were added by the receiving app.

🖼️ 2. Paste the image into Paint and inspect the saved file

Paint strips metadata, so this is also a verification method:

  1. Paste the snip into Paint.
  2. Save as PNG.
  3. Right‑click → Properties → Details.

If the Details tab is empty (it usually is), the image contains no EXIF or hidden metadata.

This method checks the file, not the clipboard — but it’s a reliable sanity check.

🧪 3. Use a metadata viewer on the saved image

If you want to double‑check:

  • ExifTool (open‑source)
  • Exiv2 (open‑source)
  • Online EXIF viewers (safe if the image is not sensitive)

These tools confirm whether the image contains:

  • EXIF
  • ICC profiles
  • timestamps
  • GPS
  • camera data

Snipping Tool images normally contain none of these.

🧩 4. Inspect clipboard formats directly (advanced)

If you want to see the raw clipboard formats without pasting:

  • Tools like InsideClipboard show the list of formats (CF_BITMAP, PNG, DIB, etc.).
  • This is useful if you want to confirm that the clipboard contains only pixel formats and nothing like:
    • HTML
    • RTF
    • OLE objects
    • proprietary containers

This is the most precise way to confirm privacy.

[[https://www.w3tutorials.net/blog/show-contents-of-the-windows-clipboard/|How To Show Contents of The Windows Clipboard]]
🌿 What you’ll usually find with Snipping Tool

When you copy a snip, the clipboard typically contains:

  • DIB (Device Independent Bitmap)
  • PNG
  • Bitmap
  • Optional thumbnail

And no EXIF, no GPS, no timestamps, no author info.

If you paste into a program that adds metadata (Word, OneNote, Outlook), the document may contain metadata — but the image itself does not.

✔️ Summary

To inspect metadata from a pasted Snipping Tool image:

Best method:

Use a clipboard inspector (InsideClipboard or Clipboard Inspector) to see exactly what formats and data were stored.

[[https://www.nirsoft.net/utils/inside_clipboard.html|NirSoft]]

Second method:

Paste into Paint → save → check Properties → Details.

Both will confirm that Snipping Tool images are essentially pure pixel data.


If you want, I can walk you through:

how to interpret the clipboard formats you’ll see

how to check whether a specific app added metadata

how to build a “privacy‑safe paste” workflow for your writing tools


windows/how_to_inspect_metadata_in_a_pasted_image.txt · Last modified: by editor