Browse > Article
http://dx.doi.org/10.21219/jitam.2017.24.1.001

Big Signature Method for Plagiarism Detection  

Kim, Woosaeng (Department of Computer Software, Kwangwoon University)
Kang, Kyucheol (Department of Computer Software, Kwangwoon University)
Publication Information
Journal of Information Technology Applications and Management / v.24, no.1, 2017 , pp. 1-10 More about this Journal
Abstract
Recently, the problem of plagiarism has emerged as a big social issue because not only literature but also thesis become the target of plagiarism. Even the government requires conformation for plagiarism of high-ranking official's thesis as a standard of their ethical morality. Plagiarism is not just direct copy but also paraphrasing, rewording, adapting parts, missing references or wrong citations. This makes the problem more difficult to handle adequately. We propose a plagiarism detection scheme called a bit signature in which each unique word of document is represented by 0 or 1. The bit signature scheme can find the similar documents by comparing their absolute and relative bit signatures. Experiments show that a bit signature scheme produces better performance for document copy detection than existing similar schemes.
Keywords
Plagiarism; Bit Signature;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Donaldson, J., Lancaster, A., and Sposato, P., "A plagiarism detection system", In Proceedings of the 20th SIGCSE Technical Symposium on Computer Science Education, 1981.
2 Gitchell, D. and Tran, N., "Sim : a utility for detecting similarity in computer programs", In SIGCSE '99 : The proceedings of the thirtieth SIGCSE technical symposium on Computer science education, 1999.
3 Go, E. and Lee, J., "An Efficient Set-based POI Search Algorithm", Journal of KIISE : Computing Practices and Letters, 2013.
4 Go, E. and Lee, J, "Sentence Similarity Measurement Method Using a Set-based POI Data Search", KIISE Transactions on Computing Practices, Vol. 20, No. 12, 2014, pp. 711-716.   DOI
5 Ji, H., Jo. J., and Lim, H., "A Detection Method of Similar Sentences Considering Plagiarism Patterns of Korean Sentence", Journal of the Korean Association of Computer Education, Vol. 13, No. 6, 2010, pp. 79-89.
6 Jang, S., Seo, S., and Lee, K., "Clone Checker : A Program Similarity Checker", Proceedings of the 28th KIISE Fall Conference, 2001.
7 Kim, H. and Cho, H., "Improving Preprocessing step for Document retrieval system based on String Alignment", Proceedings of the 35th KIISE Spring Conference, 2008.
8 Ryu, C., Kim, H., and Cho, H., "Developing of Text Plagiarism Detection Model using Korean Corpus Data", KIISE Transactions on Computing Practices, Vol. 14, No. 2, 2008, pp. 231-235.
9 Salton, G., "The state of retrieval system evaluation", Information Processing and Management, Vol. 28, No. 4, 1992, pp. 441-449.   DOI
10 Schleimer, S., Wilkerson, D. S., and Aiken, A., "Winnowing : local algorithms for document fingerprinting", In Proceedings of the 2003 ACM SIGMOD international Conference on Management of Data, 2003.
11 Shivakumar, N. and Garcia-Molina, H., "SCAM : A copy detection mechanism for digital documents", The 2nd International Conference on Theory and Practice of Digital Libraries, 1995.
12 Wise, "YAP3 : Improved detection of similarities in computer program and other texts", SIGCSEB : SIGCSE Bulletin, 1996.