{"id":27503,"date":"2025-10-09T15:12:55","date_gmt":"2025-10-09T15:12:55","guid":{"rendered":"https:\/\/plagiarismcheck.org\/blog\/?p=27503"},"modified":"2025-10-09T15:13:10","modified_gmt":"2025-10-09T15:13:10","slug":"how-to-find-stolen-images-online-the-most-effective-techniques-to-try","status":"publish","type":"post","link":"https:\/\/plagiarismcheck.org\/blog\/how-to-find-stolen-images-online-the-most-effective-techniques-to-try\/","title":{"rendered":"How to Find Stolen Images Online: The Most Effective Techniques to Try"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">It is no secret that plagiarism, academic integrity, and AI assistance have become some of the most discussed issues in the modern world. Today, learners and researchers can enjoy all the benefits of such assistants, but at the same time, they still need to submit 100% original work. This is where tools like an <\/span><a href=\"https:\/\/plagiarismcheck.org\/ai-detector\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">AI detector<\/span><\/a><span style=\"font-weight: 400;\"> or an <\/span><a href=\"https:\/\/plagiarismcheck.org\/grammar-checker\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">AI grammar checker<\/span><\/a><span style=\"font-weight: 400;\"> hit the scene, as they help experts assess your work and see if you are the real author.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We are used to the idea that plagiarism is mostly about writing, but actually, this is a much larger issue, and visuals can also be affected by this problem. In this article, we will talk about image plagiarism, discuss the most effective techniques for finding stolen images, pay attention to some outdated and weak methods that don\u2019t work well, and finally, provide you with the most effective tips for preventing the issue. Whether you want to protect your copyright or are just wondering how to make sure no one uses your work without permission, this guide is for you!<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Why Stolen Images Matter<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">In today\u2019s digital world, images travel faster than ever. With a single click, your carefully crafted graphic can appear on someone else\u2019s website, social media profile, or any other online source, and in most cases, this will happen without your consent. Actually, this isn\u2019t just an annoyance; it\u2019s a problem with real <\/span><a href=\"https:\/\/plagiarismcheck.org\/blog\/what-are-the-consequences-of-plagiarism\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">consequences<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Financial issues<\/b><span style=\"font-weight: 400;\">. Photographers and businesses often lose licensing fees when their work is reused without credit.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Brand blurring<\/b><span style=\"font-weight: 400;\">. When your visual is copied by a fraudster, for example, your customers may associate you with poor quality.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Legal issues<\/b><span style=\"font-weight: 400;\">. Image theft can result in disputes, takedown requests, and, in <\/span><a href=\"https:\/\/plagiarismcheck.org\/blog\/plagiarism-vs-copyright-infringement\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">severe cases<\/span><\/a><span style=\"font-weight: 400;\">, even lawsuits.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Many people want to know <\/span><span style=\"font-weight: 400;\">how to reverse image search<\/span><span style=\"font-weight: 400;\"> so they can track down instances of unauthorized use, but they don\u2019t know where to begin. Whether you\u2019re a student who\u2019s posted artwork online, a business with branded visuals, or a photographer who wants to protect their portfolio, you have to know how to find stolen images, and in this article, we will give you the answers you need.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">The Powerful Techniques: 7 Methods That Work<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Today, there are many ways to track stolen content; one can use an <\/span><a href=\"https:\/\/plagiarismcheck.org\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">AI plagiarism checker<\/span><\/a><span style=\"font-weight: 400;\"> for text files and some other tools to track images. Below, you will find seven techniques that we have highlighted because they stand out for their effectiveness and practicality.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Google Images &amp; Google Lens<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">When people wonder <\/span><span style=\"font-weight: 400;\">how to do a reverse image search,<\/span><span style=\"font-weight: 400;\"> Google Images is usually their first stop, as this technique is also known as the classic image search. You simply need to upload your image to Google Images, and the search engine will match the visual patterns provided against billions of indexed pictures. Well, this is a perfect first sweep for finding obvious duplicates, but uploading a clear version of your image is essential.<\/span><\/p>\n<h4><span style=\"font-weight: 400;\">How it works<\/span><\/h4>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Go to <\/span><a href=\"http:\/\/images.google.com\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">images.google.com<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Click the camera icon.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Upload your photo.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Review any visually similar images and the pages that include them.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">\u2705 It is free, quick, and widely indexed.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u274c The tool often struggles with cropped or edited versions. Thus, try uploading cropped sections if the whole image yields no results.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">TinEye<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">TinEye is a dedicated <\/span><span style=\"font-weight: 400;\">reverse image lookup<\/span><span style=\"font-weight: 400;\"> service that specializes in finding resized or cropped versions of images. The tool will create a digital fingerprint of your photo and look for matches. If you want to track even edited versions of your visual, such as images that have been resized or modified with filters, this is the best helper for your needs.<\/span><\/p>\n<h4><span style=\"font-weight: 400;\">How it works<\/span><\/h4>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Go to <\/span><a href=\"http:\/\/tineye.com\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">tineye.com<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Upload your image.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Sort results by \u201cBest Match\u201d or \u201cMost Changed.\u201d<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">\u2705 It is a great alternative for finding altered images, and it shows a usage timeline.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u274c The tool has a smaller index than Google, and the complete list of features requires a subscription.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Alternative search engines<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Not all search engines crawl the same spaces. Bing, for example, is a tool that\u2019s similar to Google, but with different coverage and a visually oriented approach. So, when Google and TinEye come up empty, you should definitely try this alternative.<\/span><\/p>\n<h4><span style=\"font-weight: 400;\">How it works<\/span><\/h4>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Go to <\/span><a href=\"http:\/\/bing.com\/images\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">bing.com\/images<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Upload your photo.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Explore the visually similar matches.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">\u2705 It can help you expand your search\u2019s reach.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u274c The results vary by region.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Social media searches<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Sometimes, stolen images circulate mainly on social media platforms. While Instagram and Facebook don\u2019t offer full <\/span><span style=\"font-weight: 400;\">reverse image search tools<\/span><span style=\"font-weight: 400;\">, there are workarounds. You can use Pinterest Lens, Instagram search with keywords or hashtags, and perform manual checking. In this case, you may need platform access, an account, and related hashtags.<\/span><\/p>\n<h4><span style=\"font-weight: 400;\">How it works<\/span><\/h4>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><i><span style=\"font-weight: 400;\">On Pinterest<\/span><\/i><span style=\"font-weight: 400;\">, upload your photo and see related pins.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><i><span style=\"font-weight: 400;\">On Instagram<\/span><\/i><span style=\"font-weight: 400;\">, search hashtags linked to your brand.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><i><span style=\"font-weight: 400;\">On TikTok<\/span><\/i><span style=\"font-weight: 400;\">, search for trending hashtags where your image might appear.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">\u2705 This technique can help you catch reposts where they\u2019re most likely.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u274c This method is pretty time-consuming, and you won\u2019t be able to see matches that appear in private accounts.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Perceptual hashing<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">For the technically curious, perceptual hashing offers a powerful method for detecting even heavily altered versions of an image. The tool generates a hash (unique \u201cfingerprint\u201d) of the image based on its visual features and detects images with similar hashes. In this case, even images that have been resized, cropped, or filtered can be easily detected, but you will need some basic coding knowledge or access to open-source tools.<\/span><\/p>\n<h4><span style=\"font-weight: 400;\">How it works<\/span><\/h4>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Install pHash or ImageMagick.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Generate hashes of original images.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Compare these hashes against the dataset.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">\u2705 The tool is robust against edits.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u274c You will require technical skills.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Image forensics<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Beyond searching, forensic tools help confirm originality and edits. Tools like FotoForensics analyze compression levels (Error Level Analysis), and EXIF readers show metadata like camera model, location, and timestamp. This is a perfect technique for proving ownership and showing when an image was first captured.<\/span><\/p>\n<h4><span style=\"font-weight: 400;\">How it works<\/span><\/h4>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Upload an image to FotoForensics.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Run an EXIF data check with free readers.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Save the reports for evidence.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">\u2705 It is valuable in disputes or takedowns.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u274c Many sites strip EXIF metadata.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Professional monitoring<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">If stolen images are a recurring problem, services like Pixsy or ImageRights can help. You can upload your portfolio, and the service will scan the web. Some platforms even send takedown notices automatically. Just keep in mind that you will need a subscription or a commission-based payment.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2705 This is a legally supported tool.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u274c It is paid, so it may not be affordable for everyone, especially if you only need it to deal with occasional theft.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Weak Techniques to Avoid<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">When searching for stolen images, it\u2019s tempting to try quick fixes, but not all methods are effective. Some of them are just outdated or unreliable. We have gathered some weak techniques that you should be aware of not to waste your time and effort on something that does not work; instead, focus on methods that actually give results.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\ud83d\udc4e <\/span><b>Filename search<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Searching for a visual by its filename may seem logical, but it rarely works. Websites usually rename files automatically or compress them into different formats. Even if the original filename is unique, platforms are more than likely to alter it.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\ud83d\udc4e <\/span><b>Text-only search<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Searching by descriptions such as \u201cdog running in a park\u201d can offer hundreds of results, but rarely the exact stolen image. Thieves are pretty savvy users, rarely keeping the same text, and oftentimes, images circulate without consistent descriptions. A better approach is to combine descriptive keywords with reverse image lookup tools.<\/span><\/p>\n<p><b>\ud83d\udc4e Relying on thumbnails<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Using small, low-resolution previews in searches can reduce accuracy. Conversely, reverse image search tools rely on details like textures, colors, and shapes to analyze images. Thumbnails usually strip away this information, leaving only vague outlines that confuse algorithms and produce irrelevant results. If possible, upload the highest-quality version of your photo you can; even a cropped but detailed section can work better than a tiny, blurry preview.<\/span><\/p>\n<p><b>\ud83d\udc4e Checking only one search engine<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Many people rely solely on Google Images because they believe that it covers the entire internet. Of course, it is known as today\u2019s most powerful tool, but remember that no single search engine indexes everything. Google and Bing often cover different sites; thus, it is much wiser to use different platforms at once in order to avoid incomplete results and catch image misuse across more platforms and regions.<\/span><\/p>\n<p><b>\ud83d\udc4e Trusting automated flags blindly<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Platforms like e-commerce sites use automated systems to detect duplicate content, but these are far from foolproof. They sometimes misidentify innocent uploads as stolen, but at the same time, genuine instances of theft can slip through undetected. By relying solely on these systems, you risk facing false positives. Remember to always verify suspicious results with manual checks and reverse image search tools before taking action against possible copyright infringement.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Prevention Is a Key Tool for Avoiding Potential Issues<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Finding stolen images is only part of the solution, but preventing theft is just as important. While no method guarantees full protection, smart practices can provide strong proof if disputes arise. These techniques are suitable for everyone, from hobbyists to professionals, and focus on balancing ease of use with effectiveness. Thus, think of prevention as a shield and monitoring as a net, remembering that you need both to protect your creative work.<\/span><\/p>\n<p><b>\u2705 Use visible or semi-transparent watermarks<\/b><\/p>\n<p><span style=\"font-weight: 400;\">If you add a watermark, it is harder for thieves to present images as their own. Well, visible marks deter casual misuse, while semi-transparent ones protect without overwhelming the artwork. For example, you can use your logo, name, or website link as a watermark. This way, you will not only safeguard your image but also promote your brand if the image spreads online.<\/span><\/p>\n<p><b>\u2705 Upload lower-resolution previews<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Sharing reduced-size images can prevent high-quality theft. In this case, thieves can still copy your work, but these images will be less useful for commercial purposes like printing or resale, and you will be able to keep the high-resolution originals safe. This approach works well for portfolios, blogs, and online shops, where a preview is enough to showcase your work.<\/span><\/p>\n<p><b>\u2705 Add copyright notices on your website<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Simple text like \u201c\u00a9 Your Name, All Rights Reserved\u201d reminds visitors that your content is legally protected. While it won\u2019t stop determined thieves, it still strengthens your claim if any plagiarism disputes arise. Additionally, such copyright notices can educate casual users who may not realize that image copying without permission is against the law.<\/span><\/p>\n<p><b>\u2705 Keep originals with EXIF intact for proof<\/b><\/p>\n<p><span style=\"font-weight: 400;\">EXIF data contains information such as the date, time, and camera details; this is your chance to provide solid proof of ownership. Even if thieves erase the metadata from stolen versions, you still have the original source. Backing up your EXIF-protected originals ensures you always have evidence to support your copyright.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">When Your Visuals Are Live: Top Long-Term Monitoring Techniques<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Prevention reduces theft, but ongoing monitoring ensures you can quickly detect misuse. Many cases of image theft occur months or even years after publication, so keeping watch is crucial. While advanced users usually benefit from professional platforms, if you are a beginner, you can start with simple free tools. Here are practical, beginner-friendly strategies for monitoring your images.<\/span><\/p>\n<p><b>\u261d\ufe0f Set up Google Alerts for image-related text<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Google Alerts can notify you when certain keywords, like your name, website, or brand, appear online. Unfortunately, it won\u2019t catch visual theft directly, but it can help identify pages where your work might be being used without credit. For the best results, combine text alerts with regular <\/span><span style=\"font-weight: 400;\">reverse image search<\/span><span style=\"font-weight: 400;\"> to cover both written and visual mentions.<\/span><\/p>\n<p><b>\u261d\ufe0f Subscribe to Pixsy or ImageRights<\/b><\/p>\n<p><span style=\"font-weight: 400;\">These services specialize in image monitoring and enforcement and can scan the internet for matches to your work. These can notify you of possible theft and even assist in legal actions. These are great helpers for photographers and artists who don\u2019t want to handle manual searches. These subscriptions can save a significant amount of time and effort on tracking, so do not neglect such an opportunity.<\/span><\/p>\n<p><b>\u261d\ufe0f Build a personal pHash script if you\u2019re technically inclined<\/b><\/p>\n<p><span style=\"font-weight: 400;\">As we have already mentioned, perceptual hashing creates a unique fingerprint of your image, and this can help you detect duplicates even when they\u2019re altered. This approach is more advanced but highly effective for spotting even heavily edited versions of your visuals.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Bottom Line<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Learning how to do reverse image search is now a vital skill. With the right tools, you can quickly spot cases of unauthorized use, protect your brand, and reclaim your work. The same technological world that gives us an <\/span><a href=\"https:\/\/plagiarismcheck.org\/essay-grader\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">essay grader<\/span><\/a><span style=\"font-weight: 400;\"> or an <\/span><a href=\"https:\/\/plagiarismcheck.org\/topic-generator\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">essay topic generator<\/span><\/a><span style=\"font-weight: 400;\"> to help assess our skills also has tools that can safeguard academic integrity. At the same time, we have access to a large number of powerful instruments to protect visual integrity, which has become a pretty common issue in the modern world. Just as students and professionals use these AI-driven systems to ensure originality in writing, businesses can use reverse image lookup methods to defend originality in visuals to make sure their rights are safeguarded.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"It is no secret that plagiarism, academic integrity, and AI assistance have become some of the most discussed issues in the modern world. Today, learners and researchers can enjoy all the benefits of such assistants, but at the same time, they still need to submit 100% original work. This is where tools like an AI [&hellip;]","protected":false},"author":19,"featured_media":27505,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[355],"tags":[],"plag_author":[385],"class_list":["post-27503","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","plag_author-samuel-lee"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/plagiarismcheck.org\/blog\/wp-json\/wp\/v2\/posts\/27503","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/plagiarismcheck.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/plagiarismcheck.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/plagiarismcheck.org\/blog\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/plagiarismcheck.org\/blog\/wp-json\/wp\/v2\/comments?post=27503"}],"version-history":[{"count":1,"href":"https:\/\/plagiarismcheck.org\/blog\/wp-json\/wp\/v2\/posts\/27503\/revisions"}],"predecessor-version":[{"id":27507,"href":"https:\/\/plagiarismcheck.org\/blog\/wp-json\/wp\/v2\/posts\/27503\/revisions\/27507"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/plagiarismcheck.org\/blog\/wp-json\/wp\/v2\/media\/27505"}],"wp:attachment":[{"href":"https:\/\/plagiarismcheck.org\/blog\/wp-json\/wp\/v2\/media?parent=27503"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/plagiarismcheck.org\/blog\/wp-json\/wp\/v2\/categories?post=27503"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/plagiarismcheck.org\/blog\/wp-json\/wp\/v2\/tags?post=27503"},{"taxonomy":"plag_author","embeddable":true,"href":"https:\/\/plagiarismcheck.org\/blog\/wp-json\/wp\/v2\/plag_author?post=27503"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}