Cyber security

Photo Location Finder: Using Google Cloud Vision API to Detect Landmarks and Labels in Images

This is a Python code to detect landmarks, labels and web entities in a set of images using Google Cloud Vision API. The code takes a JSON configuration file that contains the API key and credentials file path for the Google Cloud Vision API, as well as other optional parameters, such as the directory for image files.

The code processes each image file and extracts landmark, label, and web entity information from it using the aforementioned API. The results are stored in a JSON file in the following structure:

Prerequisites

Before running the program, the user needs to have:

  • A valid Google Cloud API key
  • Google Cloud credentials file
  • A Directory with Images for landmark detection
  • All required libraries and packages

Installation

  1. To clone the repository onto your local machine, open a terminal or command prompt and enter the following command:

git clone https://github.com/PierrunoYT/photo-location-finder

Alternatively, you can download the zip file from GitHub by clicking on the green “Code” button and selecting “Download ZIP”.

  1. To ensure that you have Python 3.7 or later installed on your local machine, enter the following command in your terminal or command prompt:

python --version

If you don’t have Python 3.7 or later installed, you can download it from the official Python website.

  1. Next, navigate to the root directory of the project where the requirements.txt file is located, and run the following command to install all the required packages:

pip install -r requirements.txt

  1. Obtain API keys for Google Cloud Vision API and Google Maps API by following the documentation provided by each respective API.
  2. Set up the authentication credentials for Google Cloud Vision API by creating a service account and storing the private key JSON file in a secure location. Follow the instructions provided in the Google Cloud Vision Official Documentation

Open the config.json and replace the YOUR_API_KEY_HERE placeholder with your actual Google Maps API key, and the PATH_TO_YOUR_CREDENTIALS_FILE placeholder with the path to the private key JSON file you created earlier. Update other parameters in the configuration file if necessary.

  1. Store the images you want to analyze in the directory mentioned in the image_dir parameter specified in the config.json file.
  2. To run the script, navigate to the root directory of the project in your terminal or command prompt, and type in the following command:

python main.py

The detection process will start, and you will see output in the terminal or command prompt indicating the status of each image being processed. When the process is complete, you will find a result.json file in the current working directory containing the results of the object detection.

Varshini

Tamil has a great interest in the fields of Cyber Security, OSINT, and CTF projects. Currently, he is deeply involved in researching and publishing various security tools with Kali Linux Tutorials, which is quite fascinating.

Recent Posts

Kali Linux 2024.4 Released, What’s New?

Kali Linux 2024.4, the final release of 2024, brings a wide range of updates and…

5 hours ago

Lifetime-Amsi-EtwPatch : Disabling PowerShell’s AMSI And ETW Protections

This Go program applies a lifetime patch to PowerShell to disable ETW (Event Tracing for…

6 hours ago

GPOHunter – Active Directory Group Policy Security Analyzer

GPOHunter is a comprehensive tool designed to analyze and identify security misconfigurations in Active Directory…

2 days ago

2024 MITRE ATT&CK Evaluation Results – Cynet Became a Leader With 100% Detection & Protection

Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders…

5 days ago

SecHub : Streamlining Security Across Software Development Lifecycles

The free and open-source security platform SecHub, provides a central API to test software with…

1 week ago

Hawker : The Comprehensive OSINT Toolkit For Cybersecurity Professionals

Don't worry if there are any bugs in the tool, we will try to fix…

1 week ago