How to Verify Any Screenshot or Image Online
Screenshots are everywhere — but are they real? This guide will teach you how to check a screenshot for authenticity using practical tools and safe methods.
Step 1: Check the Source
Identify where the screenshot came from.
Look for original publication, author, or timestamp.
Use reverse image search:
Step 2: Examine Metadata
Use ExifTool to view metadata:
exiftool screenshot.pngCheck timestamps, device model, and editing software.
Tip: Screenshots from apps like WhatsApp or Twitter may remove metadata — always combine methods.
Step 3: Compare With Known Sources
After checking the source and examining metadata, the next step is to cross-check the content with trusted references. This step helps you spot subtle manipulations in screenshots, images, or web content.
1️⃣ Use Official Accounts
Social Media Posts:
If the screenshot is from a social media platform (Twitter/X, Facebook, LinkedIn), visit the official account of the person or organization.
Look for the same post or announcement.
Check for:
Timestamp differences
Text formatting changes
Missing comments or likes
Tools:
Wayback Machine for older posts
2️⃣ Compare With News Outlets
Check credible news sources that cover the same topic.
Look for differences in:
Wording of statements
Formatting or layout
Screenshots embedded in articles
Tips:
Avoid sources known for low credibility or clickbait.
Use multiple sources to triangulate information.
3️⃣ Analyze Visual Layout
Compare fonts, spacing, and colors with original platforms.
Screenshots that are faked often have subtle misalignments:
Text slightly shifted
Buttons missing or in wrong color
Logos slightly different
Tools:
Image editing software (Photoshop, GIMP, or even Paint) to overlay images and spot differences.
FotoForensics for detecting alterations.
4️⃣ Check Context
Search for the event, statement, or announcement online.
Look for:
Original press releases
Archived social media posts
Trusted blogs or official sites
Example:
Screenshot claims “Company X launched a new product today.”
Cross-check: Visit the company’s official website or press page. If it’s not there, the screenshot may be fake.
Step 4: Analyze Visual Signs
Once you’ve checked the source, metadata, and compared with known sources, the next step is to analyze the visual aspects of the content. Fakes often have subtle visual errors that are easy to miss if you don’t know what to look for.
1️⃣ Check for Irregular Fonts
Fake screenshots often use slightly different fonts than the original platform.
Look for:
Font size inconsistencies
Different font styles (bold, italic)
Letters that are unevenly spaced or misaligned
Tools:
Use your browser’s inspection tool (right-click → Inspect) to see the platform’s standard font.
Overlay the fake screenshot with a known source using an image editor (GIMP, Photoshop, or even PowerPoint).
2️⃣ Identify Color Mismatches
Look for colors that don’t match the original interface.
Common mistakes include:
Slightly different shades of buttons or text
Background colors that don’t align
Hover or highlight effects missing
Tip: Zoom in to check hex codes or pixel colors using an eyedropper tool.
3️⃣ Spot Cut/Paste Artifacts
Manipulated images often have visual artifacts from copy-paste:
Blurry edges around objects
Slightly misaligned text boxes
Inconsistent shadows or borders
Tools:
FotoForensics Error Level Analysis (ELA): https://fotoforensics.com
Upload the image to see areas with different compression levels (higher ELA differences may indicate edits).
Overlay images in an editor to see mismatches in alignment.
4️⃣ Check for Inconsistent Details
Time, date, and UI elements: small details like icons, notification badges, or cursor positions may reveal edits.
Look for repeated patterns or textures that appear unnatural.
Step 5: Use Safe Verification Tools
After checking the source, metadata, visual signs, and known sources, it’s time to leverage specialized tools to verify files safely. This step ensures you don’t accidentally open malicious content and gives objective confirmation.
1️⃣ VirusTotal — Scan for Known Threats
What it does: VirusTotal checks files or URLs against hundreds of antivirus engines and malware databases.
How to use:
Upload the file (image, document, or executable) or paste a URL.
Review the results:
Green = clean
Red = flagged by one or more engines
Note: A single flag doesn’t always mean malicious, but multiple flags are strong evidence.
Example:
A suspicious screenshot file is uploaded to VirusTotal. It shows zero detections → likely safe to continue analysis.
2️⃣ Compare Checksums for Multiple Versions
Why: Files can be slightly altered to look identical. Comparing checksums ensures content is identical.
How to use:
Compute file hash using tools like:
Windows:
certutil -hashfile filename.png SHA256Mac/Linux:
shasum -a 256 filename.png
Compare hash of suspected file with original or known-good versions.
If the hashes differ → the file has been modified.
Tip: Keep a library of original checksums for trusted sources to speed up verification.
3️⃣ Safe Practices
Sandbox or Virtual Machine: Open suspicious files in a controlled environment.
Never share sensitive data until verification is complete.
Combine with previous steps: Metadata, visual analysis, and cross-checking with sources.
Resources & Tools
ExifTool: https://exiftool.org
TinEye: https://tineye.com/
Google Images: https://images.google.com/
FotoForensics: https://fotoforensics.com
Last updated