How to Verify Any Screenshot or Image Online

Screenshots are everywhere — but are they real? This guide will teach you how to check a screenshot for authenticity using practical tools and safe methods.

Step 1: Check the Source


Step 2: Examine Metadata

  • Use ExifTool to view metadata:

exiftool screenshot.png
  • Check timestamps, device model, and editing software.

Tip: Screenshots from apps like WhatsApp or Twitter may remove metadata — always combine methods.


Step 3: Compare With Known Sources

After checking the source and examining metadata, the next step is to cross-check the content with trusted references. This step helps you spot subtle manipulations in screenshots, images, or web content.

1️⃣ Use Official Accounts

  • Social Media Posts:

    • If the screenshot is from a social media platform (Twitter/X, Facebook, LinkedIn), visit the official account of the person or organization.

    • Look for the same post or announcement.

    • Check for:

      • Timestamp differences

      • Text formatting changes

      • Missing comments or likes

Tools:

2️⃣ Compare With News Outlets

  • Check credible news sources that cover the same topic.

  • Look for differences in:

    • Wording of statements

    • Formatting or layout

    • Screenshots embedded in articles

Tips:

  • Avoid sources known for low credibility or clickbait.

  • Use multiple sources to triangulate information.

3️⃣ Analyze Visual Layout

  • Compare fonts, spacing, and colors with original platforms.

  • Screenshots that are faked often have subtle misalignments:

    • Text slightly shifted

    • Buttons missing or in wrong color

    • Logos slightly different

Tools:

  • Image editing software (Photoshop, GIMP, or even Paint) to overlay images and spot differences.

  • FotoForensics for detecting alterations.

4️⃣ Check Context

  • Search for the event, statement, or announcement online.

  • Look for:

    • Original press releases

    • Archived social media posts

    • Trusted blogs or official sites

Example:

  • Screenshot claims “Company X launched a new product today.”

  • Cross-check: Visit the company’s official website or press page. If it’s not there, the screenshot may be fake.


Step 4: Analyze Visual Signs

Once you’ve checked the source, metadata, and compared with known sources, the next step is to analyze the visual aspects of the content. Fakes often have subtle visual errors that are easy to miss if you don’t know what to look for.

1️⃣ Check for Irregular Fonts

  • Fake screenshots often use slightly different fonts than the original platform.

  • Look for:

    • Font size inconsistencies

    • Different font styles (bold, italic)

    • Letters that are unevenly spaced or misaligned

Tools:

  • Use your browser’s inspection tool (right-click → Inspect) to see the platform’s standard font.

  • Overlay the fake screenshot with a known source using an image editor (GIMP, Photoshop, or even PowerPoint).

2️⃣ Identify Color Mismatches

  • Look for colors that don’t match the original interface.

  • Common mistakes include:

    • Slightly different shades of buttons or text

    • Background colors that don’t align

    • Hover or highlight effects missing

Tip: Zoom in to check hex codes or pixel colors using an eyedropper tool.

3️⃣ Spot Cut/Paste Artifacts

  • Manipulated images often have visual artifacts from copy-paste:

    • Blurry edges around objects

    • Slightly misaligned text boxes

    • Inconsistent shadows or borders

Tools:

  • FotoForensics Error Level Analysis (ELA): https://fotoforensics.comarrow-up-right

    • Upload the image to see areas with different compression levels (higher ELA differences may indicate edits).

  • Overlay images in an editor to see mismatches in alignment.

4️⃣ Check for Inconsistent Details

  • Time, date, and UI elements: small details like icons, notification badges, or cursor positions may reveal edits.

  • Look for repeated patterns or textures that appear unnatural.


Step 5: Use Safe Verification Tools

After checking the source, metadata, visual signs, and known sources, it’s time to leverage specialized tools to verify files safely. This step ensures you don’t accidentally open malicious content and gives objective confirmation.

1️⃣ VirusTotal — Scan for Known Threats

  • What it does: VirusTotal checks files or URLs against hundreds of antivirus engines and malware databases.

  • How to use:

    1. Upload the file (image, document, or executable) or paste a URL.

    2. Review the results:

      • Green = clean

      • Red = flagged by one or more engines

    3. Note: A single flag doesn’t always mean malicious, but multiple flags are strong evidence.

Example:

  • A suspicious screenshot file is uploaded to VirusTotal. It shows zero detections → likely safe to continue analysis.

2️⃣ Compare Checksums for Multiple Versions

  • Why: Files can be slightly altered to look identical. Comparing checksums ensures content is identical.

  • How to use:

    1. Compute file hash using tools like:

      • Windows: certutil -hashfile filename.png SHA256

      • Mac/Linux: shasum -a 256 filename.png

    2. Compare hash of suspected file with original or known-good versions.

    3. If the hashes differ → the file has been modified.

Tip: Keep a library of original checksums for trusted sources to speed up verification.

3️⃣ Safe Practices

  • Sandbox or Virtual Machine: Open suspicious files in a controlled environment.

  • Never share sensitive data until verification is complete.

  • Combine with previous steps: Metadata, visual analysis, and cross-checking with sources.


Resources & Tools

Last updated