Skip to main content

Who’s the Thief? Automatic Detection of the Direction of Plagiarism

  • Conference paper
Computational Linguistics and Intelligent Text Processing (CICLing 2010)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6008))

Abstract

Determining the direction of plagiarism (who plagiarized whom in a given pair of documents) is one of the most interesting problems in the field of automatic plagiarism detection. We present here an approach using an extension of the method Encoplot, which won the 1st international competition on plagiarism detection in 2009. We have tested it on a large-scale corpus of artificial plagiarism, with good results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Project Gutenberg (1971), http://www.gutenberg.org

  2. Baker, R.K., Thornton, B., Adams, M.: An Evaluation of The Effectiveness of Turnitin. Com As A Tool For Reducing Plagiaris in Graduate Student Term Papers. College Teaching Methods & Styles Journal 4(9) (2008)

    Google Scholar 

  3. Basile, C., Cristadoro, G., Benedetto, D., Caglioti, E., Degli Esposti, M.: A plagiarism detection procedure in three steps: selection, matches and squares. In: 3rd Pan Workshop. Uncovering Plagiarism, Authorship and Social Software Misuse, p. 19

    Google Scholar 

  4. Clough, P.: Old and new challenges in automatic plagiarism detection. National Plagiarism Advisory Service (2003)

    Google Scholar 

  5. Corry, L., Renn, J., Stachel, J.: Belated decision in the Hilbert-Einstein priority dispute. Science 278(5341), 1270 (1997)

    Article  MathSciNet  Google Scholar 

  6. Errami, M., Hicks, J.M., Fisher, W., Trusty, D., Wren, J.D., Long, T.C., Garner, H.R.: Deja vu A study of duplicate citations in Medline. Bioinformatics 24(2), 243 (2008)

    Article  Google Scholar 

  7. Freire, M., Cebrian, M.: Design of the AC Academic Plagiarism Detection System. Technical report, Tech. rep., Escuela Politecnica Superior, Universidad Autonoma de Madrid, Madrid, Spain (November 2008)

    Google Scholar 

  8. Grozea, C.: Plagiarism detection with state of the art compression programs. Report CDMTCS-247, Centre for Discrete Mathematics and Theoretical Computer Science, University of Auckland, Auckland, New Zealand (August 2004)

    Google Scholar 

  9. Grozea, C., Gehl, C., Popescu, M.: ENCOPLOT: Pairwise Sequence Matching in Linear Time Applied to Plagiarism Detection. In: 3rd Pan Workshop. Uncovering Plagiarism, Authorship and Social Software Misuse, p. 10

    Google Scholar 

  10. Potthast, M., Stein, B., Eiselt, A., Barrón-Cedeño, A., Rosso, P.: Overview of the 1st International Competition on Plagiarism Detection. In: 3rd Pan Workshop. Uncovering Plagiarism, Authorship and Social Software Misuse, p. 1

    Google Scholar 

  11. Roos, T., Heikkila, T.: Evaluating methods for computer-assisted stemmatology using artificial benchmark data sets. Literary and Linguistic Computing 24(4) (2009)

    Google Scholar 

  12. Ryu, C.K., Kim, H.J., Cho, H.G.: A detecting and tracing algorithm for unauthorized internet-news plagiarism using spatio-temporal document evolution model. In: Proceedings of the 2009 ACM symposium on Applied Computing, pp. 863–868. ACM, New York (2009)

    Chapter  Google Scholar 

  13. Ryu, C.K., Kim, H.J., Ji, S.H., Woo, G., Cho, H.G.: Detecting and tracing plagiarized documents by reconstruction plagiarism-evolution tree. In: CIT, p. 119 (2008)

    Google Scholar 

  14. Sauer, T.: Einstein Equations and Hilbert Action: What is missing on page 8 of the proofs for Hilbert’s First Communication on the Foundations of Physics?. Archive for history of exact sciences 59(6), 577–590 (2005)

    Article  MATH  MathSciNet  Google Scholar 

  15. Webis at Bauhaus-Universität Weimar and NLEL at Universidad Politécnica de Valencia. In: Potthast, M., Eiselt, A., Stein, B., Cedeño, A.B., Rosso, P. (eds.) PAN Plagiarism Corpus PAN-PC 2009 (2009), http://www.webis.de/research/corpora

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Grozea, C., Popescu, M. (2010). Who’s the Thief? Automatic Detection of the Direction of Plagiarism. In: Gelbukh, A. (eds) Computational Linguistics and Intelligent Text Processing. CICLing 2010. Lecture Notes in Computer Science, vol 6008. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12116-6_59

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-12116-6_59

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-12115-9

  • Online ISBN: 978-3-642-12116-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics