Can the Chinese government figure out who took those Tibet pictures?

Answers to your questions about the news.
March 21 2008 7:31 AM

Who Took Those Tibet Pictures?

Can the Chinese government track them down?

The Chinese government has restricted foreign reporters from entering Tibet, but amateur photos and videos of protesters have found their way onto YouTube and various media sites outside the Great Firewall. Is it possible to trace who took those pictures?

Probably not, unless the owner registered the camera with the manufacturer. A little detective work can easily pinpoint the make and model of the camera that took them, but it would be hard to extract identifying information from the digital images themselves.


Most JPEG files include pieces of information called metadata that cover everything from when the photo was taken to how long the exposure lasted. Manufacturers usually include the make and model of the camera as part of this information, but it's easy to delete or falsify these tags by using editing software like Photoshop. Listing the camera's serial number is less common, but, when available, this tidbit can be used to track down the country where the device was sold, or even, if there's a superb paper trail, the store. When the final Harry Potter novel was leaked online after a fan photographed every single page last summer, investigators gathered from the metadata that a Canon Rebel 350 was used to take the pictures. Some Canon models also automatically include the camera's serial number in the metadata, but it's not clear if the culprit was ever caught. Of course, if you've registered the device with the manufacturer, a photo's metadata can lead straight to you.

It's harder to generalize about tracing cell-phone pictures, since manufacturers may choose to include less metadata because of space considerations. U.S. cellular plans make it a bit easier to connect phones with their owners, but this is less true in Asia, where people buy minutes of air time rather than subscription plans. If, however, the metadata on a photo includes a piece of information known as the IMEI number, it's theoretically possible to track down the camera phone while it is turned on, triangulate the position of the person carrying it to within a mile, then chase him down.

Even if all the metadata has been erased, you can still uncover the camera's make and model. To do this, search the JPEG file for something called the quantization table. This series of numbers reflects the way the image has been compressed. Since manufacturers use different compression methods, a quantization table can narrow the field to a few camera models. (Something else that's also embedded into digital files from certain cameras: a thumbnail of the original photo. Even if you edit out faces from the photo, a low-resolution copy of the undoctored image will still be available.)

If you have a lot of digital images (say, 100 photos or five minutes of video) and a suspected camera on hand, a process similar to handgun ballistics is an option. To prove that a particular camera took those photos, you'd need to examine the "noise" patterns in the pictures. Sensors aren't perfect, so each pixel of color contains tiny variations—say, random colors when the whole pixel should be sky blue. If you tease out the noise from each photo and then average the noise to form a pattern, you may be able to match them to new photos from the camera.

Got a question about today's news? Ask the Explainer.

Explainer thanks Donald Allison of Stroz Friedberg, LLC; Hany Farid of Dartmouth College; and Nasir Memon of Polytechnic University.

Michelle Tsai is a Beijing-based writer working on a book about Chinatowns on six continents. She blogs at


The World

How Canada’s Shooting Tragedies Have Shaped Its Gun Control Politics

Where Ebola Lives Between Outbreaks

Gunman Killed Inside Canadian Parliament; Soldier Shot at National Monument Dies

Sleater-Kinney Was Once America’s Best Rock Band

Can it be again?

Paul Farmer: Up to 90 Percent of Ebola Patients Should Survive

Is he right?


“I’m Not a Scientist” Is No Excuse

Politicians brag about their ignorance while making ignorant decisions.


Driving in Circles

The autonomous Google car may never actually happen.

In Praise of 13th Grade: Why a Fifth Year of High School Is a Great Idea 

PowerPoint Is the Worst, and Now It’s the Latest Way to Hack Into Your Computer

  News & Politics
Oct. 22 2014 9:42 PM Landslide Landrieu Can the Louisiana Democrat use the powers of incumbency to save herself one more time?
Continuously Operating
Oct. 22 2014 2:38 PM Crack Open an Old One A highly unscientific evaluation of Germany’s oldest breweries.
Gentleman Scholar
Oct. 22 2014 5:54 PM May I Offer to Sharpen My Friends’ Knives? Or would that be rude?
  Double X
The XX Factor
Oct. 22 2014 4:27 PM Three Ways Your Text Messages Change After You Get Married
  Slate Plus
Tv Club
Oct. 22 2014 5:27 PM The Slate Walking Dead Podcast A spoiler-filled discussion of Episodes 1 and 2.
Brow Beat
Oct. 22 2014 9:19 PM The Phone Call Is Twenty Minutes of Pitch-Perfect, Wrenching Cinema
Future Tense
Oct. 22 2014 5:33 PM One More Reason Not to Use PowerPoint: It’s The Gateway for a Serious Windows Vulnerability
  Health & Science
Wild Things
Oct. 22 2014 2:42 PM Orcas, Via Drone, for the First Time Ever
Sports Nut
Oct. 20 2014 5:09 PM Keepaway, on Three. Ready—Break! On his record-breaking touchdown pass, Peyton Manning couldn’t even leave the celebration to chance.