skip to main content
10.1145/2023607.2023678acmotherconferencesArticle/Chapter ViewAbstractPublication PagescompsystechConference Proceedingsconference-collections
research-article

Obfuscating plagiarism detection: vulnerabilities and solutions

Published:16 June 2011Publication History

ABSTRACT

Plagiarism among student term papers is considered as a major problem these days. To successfully identify this kind of cheating we have to perform check on submitted papers for plagiarism. This has to be done with appropriate plagiarism detection software. In this paper we describe the most common ways how to deceive this software by introducing four obfuscation categories. We take several existing plagiarism detection tools and test their resistance against simple but effective obfuscations. Proposing our own method and implementing it into a plagiarism detection system we identify obfuscated documents.

References

  1. Batane, T.: Turning to Turnitin to Fight Plagiarism among University Students. Educational Technology and Society, (2010), vol. 1, no. 2, pp. 1--12.Google ScholarGoogle Scholar
  2. Burrows, S., Tahaghoghi, M. M. S., Zobel, J.: Efficient plagiarism detection for large code repositories, Software - Practice and Experience, vol. 37 (2007), pp. 151--175. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Clough, P.: Plagiarism in natural and programming languages: an overview of current tools and technologies, The University of Sheffield, Department of Computer Science, Research Memoranda: CS-00-05, June 2000.Google ScholarGoogle Scholar
  4. Chudá, D., Návrat, P.: Support for checking plagiarism in e-learning, Procedia -Social and Behavioral Sciences, Volume 2, Issue 2, Innovation and Creativity in Education, (2010), Pages 3140--3144, ISSN 1877--0428.Google ScholarGoogle ScholarCross RefCross Ref
  5. Chudá, D., Návrat, P., Kováčová, B., Humay, P.: The Issue of (Software)Plagiarism: A Students' View, IEEE Transactions on Education, Volume: PP Issue:99, ISSN: 0018-9359, 2011 Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Deerwester, S., Dumais, T. S., Harshman, R.: Indexing by Latent Semantic Analyses. In: Journal of the American Society of Information Science, vol. 41, no. 6 (1990), pp. 391--407.Google ScholarGoogle ScholarCross RefCross Ref
  7. Jones, O. K., Moore, A. T.: Turnitin is not the primary weapon in the campaign against plagiarism. CompSysTech 2010: 425--429. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Malkin, M., Venkatesan, R.: Comparison of Texts Streams in the Presence of Mild Adversaries. In: Proc. Of the Third Australasian Information Security Workshop (AISW 2005), Newcastle, Australia, (2005), pp. 179--186. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Maurer, H., Kappe, F., Zaka, B.: Plagiarism -- A Survey. Journal of Universal Computer Science, vol. 12, no. 8 (2006), pp. 1050--1084.Google ScholarGoogle Scholar
  10. Palkovskii, Y.: "Counter plagiarism detection software" and "Counter counter plagiarism detection" methods. In: 25th annual conference of the Spanish society for Natural Language processing, pp. 67--68, 2009Google ScholarGoogle Scholar
  11. Potthast, M., Stein, B., Barrón-Cedeño, A., Rosso, P.: An Evaluation Framework for Plagiarism Detection. In: Proceedings of the 23rd International Conference on Computational Linguistics, Beijing, 2010, pp. 997--1005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Su, Z., Ahn, R. B., Eom, Y. K., Kang, K. M., Kim, P. J., Kim, K. M.: Plagiarism Detection Using the Levenshtein Distance and Smith-Waterman Algorithm. In: Proceedings of the 2008 3rd International Conference on Innovative Computing Information and Control, Washington, DC, USA, (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Štefánik, J., Rusko, M., Považanec, D.: The Frequency of Words, Graphemes, Phones and Other Elements in Slovak {In Slovak: Frekvencia slov, grafém, hlások a d'alších elementov slovenského jazyka}. Jazykovedný časopis, (1999), vol. 50, no. 2, pp. 81--93.Google ScholarGoogle Scholar

Index Terms

  1. Obfuscating plagiarism detection: vulnerabilities and solutions

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            CompSysTech '11: Proceedings of the 12th International Conference on Computer Systems and Technologies
            June 2011
            688 pages
            ISBN:9781450309172
            DOI:10.1145/2023607

            Copyright © 2011 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 16 June 2011

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            Overall Acceptance Rate241of492submissions,49%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader