2012
DOI: 10.7763/ijcte.2012.v4.447
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Plagiarism Detection Systems

Abstract: Abstract--Being a growing problem, plagiarism is generally defined as "literary theft" and "academic dishonesty" in the literature, and it is really has to be well-informed on this topic to prevent the problem and stick to the ethical principles. This paper presents a survey on plagiarism detection systems, a summary of several plagiarism types, techniques, and algorithms is provided. Common feature of deferent detection systems are described. At the end of this paper authors propose a web enabled system to de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0
4

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(27 citation statements)
references
References 16 publications
0
22
0
4
Order By: Relevance
“… Replacing the original author's name  Copying ideas, phrases, concepts, research proposals, articles, reports, computer program designs, websites, and the internet and other electronic resources without citing the author's name  Lack of citation regarding quotation  False referencing or referencing the nonexisting resources  Translation plagiarism, where the translated text is submitted without reference to the original text  Artistic plagiarism, where different media including images and videos are used for other works without (a) proper reference(s) to the resource(s) [2,4]. There are two major methods that can be used to reduce literary pirating: plagiarism detection and plagiarism prevention [3,4].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“… Replacing the original author's name  Copying ideas, phrases, concepts, research proposals, articles, reports, computer program designs, websites, and the internet and other electronic resources without citing the author's name  Lack of citation regarding quotation  False referencing or referencing the nonexisting resources  Translation plagiarism, where the translated text is submitted without reference to the original text  Artistic plagiarism, where different media including images and videos are used for other works without (a) proper reference(s) to the resource(s) [2,4]. There are two major methods that can be used to reduce literary pirating: plagiarism detection and plagiarism prevention [3,4].…”
Section: Introductionmentioning
confidence: 99%
“…There are two major methods that can be used to reduce literary pirating: plagiarism detection and plagiarism prevention [3,4]. An attempt is made in this work to adapt the detection method.…”
Section: Introductionmentioning
confidence: 99%
“…Semantic similarity received less attention for the inherent difficulties of representing semantics and the limitations on assessment coverage of user studies [54] [72]. Commonly used methods for determination of similarity include fingerprinting [21], Information Retrieval [28] and other hybrid techniques [24] [44]. In Information Retrieval models, more emphasis was put on representing documents by their words and word frequencies.…”
Section: Related Workmentioning
confidence: 99%
“…The multiple lingualism of such data explosion further necessitates the need for more robust, efficient and generalized tools and techniques to facilitate the utilization of available content. Text representations and processing have become an important backbone of many tools and applications including text mining [5] [6], summarization [7]- [17], clustering [18], categorization [19] [20], copy-detection [21] [22] [23], plagiarism [24] [25], web-search [26] [27], information retrieval [28] and computational biology [29] [30] [31].…”
Section: Introductionmentioning
confidence: 99%
“…A survey on plagiarism detection [12] outlined the application of attribute counting techniques based on average line length, file size, and average number of commas per line to derive file fingerprints. The resulting fingerprint is then used to estimate the degree of plagiarism.…”
Section: Related Researchmentioning
confidence: 99%