SlideShare a Scribd company logo
1 of 21
KIET SCHOOL OF ENGINEERING &
TECHNOLOGY
DEPARTMENT OF COMPUTER APPICATIONS
PRESENTATION ON
Plagiarism-Detection-Technique
SUBMITTED BY
ROLL NO. :- 1102914084
NAME :- Rishabh Dixit
SEMESTER :- 6th sem
SECTION :- B
1
 Introduction
 Describing Plagiarism
 Plagiarism Detection
 Software Aided Detection
 Approaches
 Disadvantage of the Plagiarism
 Conclusion
 References
2
 Plagiarism is a significant problem on almost every
college and university campus. The problems of
plagiarism go beyond the campus, and have become an
issue in industry, journalism, and government activities.
 Plagiarism refers to “the act of copying materials
without actually acknowledging the original source”.
3
Plagiarism can be described as:
 Turning in someone else's work as your own.
 Copying words or ideas from someone else without
giving credit.
 Giving incorrect information about the source of a
quotation.
 Changing words but copying the sentence structure of a
source without giving
credit.
4
5
 collection stage may be defined as the process of
electronically collecting and pre-processing student
submissions into a suitable format.
 Analysis is defined as “where the submissions are
compared with each other and with Documents
obtained from the Web and the list of those submissions,
or pairs, the list of those submissions, or pairs,
that require further investigation is produced.”
6
 Verification (confirmation) is required to ensure that
those pairs reported as being suspicious are worth
investigating with a view to possible disciplinary action
(this is a task normally undertaken by humans, since
value judgements May be involved).
 The final stage, investigation, will determine the extent
of the alleged misconduct and will “also involve the
process of deciding culpability and possible penalties.”
7
8
 Computer-assisted plagiarism detection (CaPD) is an
Information retrieval (IR) task supported by
specialized IR systems, referred to as plagiarism
detection systems (PDS).
9
10
Fingerprinting:-
 Fingerprinting is currently the most widely applied
approach to plagiarism detection.
 The sets represent the fingerprints and their elements
are called minutiae.
 A suspicious document is checked for plagiarism by
computing its fingerprint and querying minutiae with a
precomputed index of fingerprints for all documents of
a reference collection.
11
String matching :-
 String matching is a prevalent approach used in
computer science.
 Checking a suspicious document in this setting requires
the computation and storage of efficiently comparable
representations for all documents in the reference
collection to compare them pairwise.
12
Bag of words:-
 Bag of words analysis represent the adoption of vector
space retrieval, a traditional IR concept, to the domain
of plagiarism detection.
 Documents are represented as one or multiple
vectors, e.g. for different document parts, which are
used for pair wise similarity computations.
13
TurnItIn:
 Four UC Berkeley graduate students designed a peer
review application to use for their classes — thus,
TurnItIn was born. Eventually, that prototype
developed into one of the most recognizable names in
plagiarism detection.
 Students can use TurnItIn's WriteCheck service to
maintain proper citations and to access various
writing tools. Teachers can ask students to submit
their papers through the service as a first measure.
14
Viper:
 Viper calls itself the "Free TurnItIn
Alternative." It scans a large database of
academic essays and other online sources,
offering side-by-side comparisons for
plagiarism.
15
Plagiarism Detection systems are built based on a few
languages. To check for plagiarism with the Same
software can be difficult.
 Most of the detection software checking is done with
some repository situated in an organization .Other people
are unable to access it and verify for plagiarism.
 As the number of digital copies are going up the repository
size should be large and the plagiarism Detection software
should be able to handle it.
16
 There is some plagiarism detection software available
which ask us to load a file to their link. Once done the
file is copied to their database and then checked for
plagiarism. This also comes with an inherent
chance of our data being leaked or hacked for other
purposes.
17
18
 Plagiarism is rampant now. With most of the data
available to us in digital format the venues for
plagiarism is opening up.
 To avoid this kind of cheating and to acknowledge
the originality of the author new detection techniques
are to be created.
 To protect the intellectual property source code new
techniques are to be developed and implemented.
19
[1] Steven Burrows 1, Seyed M. M. Tahaghoghi 1 &
Justin Zobel , Proceedings of the Second Australian
Undergraduate Students' Computing Conference, 2004
http://citeseerx.ist.psu.edu/viewdoc/download?doi=
10.1.1.69.4500&rep=rep1&type=pdf
[2] Georgina Cosma , Mike Joy, Daniel White and Jane
Yau, 9th August 2007 ,ICS University of Ulster.
http://www.ics.heacademy.ac.uk/resources/assessment/p
lagiarism/
[3] Plagiarism detection software, How effective it is?,
20
CSHE,
http://www.cshe.unimelb.edu.au/assessinglearning/docs/
PlagSoftware.pdf
[4] Maeve Paris, School of Computing & Intelligent
Systems, University of Ulster
http://www.ics.heacademy.ac.uk/Events/conf2003/
maeve.htm
[5] S.A.F.E,
http://www.safe-corp.biz/products_codesuite.htm
21

More Related Content

What's hot

What's hot (20)

Software tools for checking plagiarism
Software tools for checking plagiarismSoftware tools for checking plagiarism
Software tools for checking plagiarism
 
Plagiarism powerpoint
Plagiarism powerpointPlagiarism powerpoint
Plagiarism powerpoint
 
PLAGIARISM_THE BASICS FOR UNDERGRAD STUDENTS
PLAGIARISM_THE BASICS FOR UNDERGRAD STUDENTSPLAGIARISM_THE BASICS FOR UNDERGRAD STUDENTS
PLAGIARISM_THE BASICS FOR UNDERGRAD STUDENTS
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 
plagiarism detection tools and techniques
plagiarism detection tools and techniquesplagiarism detection tools and techniques
plagiarism detection tools and techniques
 
Unit 5
Unit  5Unit  5
Unit 5
 
What Is Plagiarism?
What Is Plagiarism?What Is Plagiarism?
What Is Plagiarism?
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 
How to Avoid Plagiarism
How to Avoid PlagiarismHow to Avoid Plagiarism
How to Avoid Plagiarism
 
Plagiarism: What's the BIG DEAL?
Plagiarism: What's the BIG DEAL?Plagiarism: What's the BIG DEAL?
Plagiarism: What's the BIG DEAL?
 
Plagiarism ppt 1 (2)
Plagiarism ppt 1 (2)Plagiarism ppt 1 (2)
Plagiarism ppt 1 (2)
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 
TURNITIN: A Tool to test the Plagiarism/Similarity
TURNITIN: A Tool to test the Plagiarism/Similarity TURNITIN: A Tool to test the Plagiarism/Similarity
TURNITIN: A Tool to test the Plagiarism/Similarity
 
Plagiarism and its consequences dr.c.thanavathi
Plagiarism and its consequences dr.c.thanavathiPlagiarism and its consequences dr.c.thanavathi
Plagiarism and its consequences dr.c.thanavathi
 
Thesis plagiarism checker
Thesis plagiarism checkerThesis plagiarism checker
Thesis plagiarism checker
 
Plagiarism 4
Plagiarism 4Plagiarism 4
Plagiarism 4
 
Ugc care 2020
Ugc care 2020Ugc care 2020
Ugc care 2020
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 

Viewers also liked

Using Technology To Detect Plagiarism
Using Technology To Detect PlagiarismUsing Technology To Detect Plagiarism
Using Technology To Detect Plagiarismguestf17a2e
 
Plagiarism PowerPoint Presentation
Plagiarism PowerPoint PresentationPlagiarism PowerPoint Presentation
Plagiarism PowerPoint PresentationSteve Nelson
 
Plagiarism Ppt Teachers
Plagiarism Ppt TeachersPlagiarism Ppt Teachers
Plagiarism Ppt TeachersTedine Soule
 
Plagiarism Detection Tools
Plagiarism Detection ToolsPlagiarism Detection Tools
Plagiarism Detection ToolsKristen T
 
Choosing The Right Tool For The Job; How Maastricht University Is Selecting...
Choosing The Right Tool For The Job; How  Maastricht  University Is Selecting...Choosing The Right Tool For The Job; How  Maastricht  University Is Selecting...
Choosing The Right Tool For The Job; How Maastricht University Is Selecting...Maarten van Wesel
 
My Graduation Project Documentation: Plagiarism Detection System for English ...
My Graduation Project Documentation: Plagiarism Detection System for English ...My Graduation Project Documentation: Plagiarism Detection System for English ...
My Graduation Project Documentation: Plagiarism Detection System for English ...Ahmed Mater
 
Authorship attribution
Authorship attributionAuthorship attribution
Authorship attributionReza Ramezani
 
Automatic plagiarism detection system for specialized corpora
Automatic plagiarism detection system for specialized corporaAutomatic plagiarism detection system for specialized corpora
Automatic plagiarism detection system for specialized corporaTraian Rebedea
 
Authorship Attribution and Forensic Linguistics with Python/Scikit-Learn/Pand...
Authorship Attribution and Forensic Linguistics with Python/Scikit-Learn/Pand...Authorship Attribution and Forensic Linguistics with Python/Scikit-Learn/Pand...
Authorship Attribution and Forensic Linguistics with Python/Scikit-Learn/Pand...PyData
 
Google searching techniques
Google searching techniquesGoogle searching techniques
Google searching techniquesabbas mohd
 
The routledge handbook of forensic linguistics routledge handbooks in applied...
The routledge handbook of forensic linguistics routledge handbooks in applied...The routledge handbook of forensic linguistics routledge handbooks in applied...
The routledge handbook of forensic linguistics routledge handbooks in applied...yosra Yassora
 
Authorship analysis using function words forensic linguistics
Authorship analysis using function words forensic linguisticsAuthorship analysis using function words forensic linguistics
Authorship analysis using function words forensic linguisticsVlad Mackevic
 
NLP & Machine Learning - An Introductory Talk
NLP & Machine Learning - An Introductory Talk NLP & Machine Learning - An Introductory Talk
NLP & Machine Learning - An Introductory Talk Vijay Ganti
 
Support Vector Machine (SVM) Based Classifier For Khmer Printed Character-set...
Support Vector Machine (SVM) Based Classifier For Khmer Printed Character-set...Support Vector Machine (SVM) Based Classifier For Khmer Printed Character-set...
Support Vector Machine (SVM) Based Classifier For Khmer Printed Character-set...osify
 
Machine Learning for NLP
Machine Learning for NLPMachine Learning for NLP
Machine Learning for NLPbutest
 
Artificial Intelligence, Machine Learning and Deep Learning
Artificial Intelligence, Machine Learning and Deep LearningArtificial Intelligence, Machine Learning and Deep Learning
Artificial Intelligence, Machine Learning and Deep LearningSujit Pal
 
Forensic linguistics
Forensic linguisticsForensic linguistics
Forensic linguisticsAbbou Zohra
 
Forensic Linguistics:The Practical Applications
Forensic Linguistics:The Practical ApplicationsForensic Linguistics:The Practical Applications
Forensic Linguistics:The Practical Applicationsdahveed123
 

Viewers also liked (20)

Using Technology To Detect Plagiarism
Using Technology To Detect PlagiarismUsing Technology To Detect Plagiarism
Using Technology To Detect Plagiarism
 
Plagiarism PowerPoint Presentation
Plagiarism PowerPoint PresentationPlagiarism PowerPoint Presentation
Plagiarism PowerPoint Presentation
 
Plagiarism Ppt Teachers
Plagiarism Ppt TeachersPlagiarism Ppt Teachers
Plagiarism Ppt Teachers
 
Plagiarism Detection Tools
Plagiarism Detection ToolsPlagiarism Detection Tools
Plagiarism Detection Tools
 
Choosing The Right Tool For The Job; How Maastricht University Is Selecting...
Choosing The Right Tool For The Job; How  Maastricht  University Is Selecting...Choosing The Right Tool For The Job; How  Maastricht  University Is Selecting...
Choosing The Right Tool For The Job; How Maastricht University Is Selecting...
 
My Graduation Project Documentation: Plagiarism Detection System for English ...
My Graduation Project Documentation: Plagiarism Detection System for English ...My Graduation Project Documentation: Plagiarism Detection System for English ...
My Graduation Project Documentation: Plagiarism Detection System for English ...
 
Authorship attribution
Authorship attributionAuthorship attribution
Authorship attribution
 
Automatic plagiarism detection system for specialized corpora
Automatic plagiarism detection system for specialized corporaAutomatic plagiarism detection system for specialized corpora
Automatic plagiarism detection system for specialized corpora
 
Authorship Attribution and Forensic Linguistics with Python/Scikit-Learn/Pand...
Authorship Attribution and Forensic Linguistics with Python/Scikit-Learn/Pand...Authorship Attribution and Forensic Linguistics with Python/Scikit-Learn/Pand...
Authorship Attribution and Forensic Linguistics with Python/Scikit-Learn/Pand...
 
Google searching techniques
Google searching techniquesGoogle searching techniques
Google searching techniques
 
Searching techniques
Searching techniquesSearching techniques
Searching techniques
 
The routledge handbook of forensic linguistics routledge handbooks in applied...
The routledge handbook of forensic linguistics routledge handbooks in applied...The routledge handbook of forensic linguistics routledge handbooks in applied...
The routledge handbook of forensic linguistics routledge handbooks in applied...
 
Authorship analysis using function words forensic linguistics
Authorship analysis using function words forensic linguisticsAuthorship analysis using function words forensic linguistics
Authorship analysis using function words forensic linguistics
 
NLP & Machine Learning - An Introductory Talk
NLP & Machine Learning - An Introductory Talk NLP & Machine Learning - An Introductory Talk
NLP & Machine Learning - An Introductory Talk
 
Support Vector Machine (SVM) Based Classifier For Khmer Printed Character-set...
Support Vector Machine (SVM) Based Classifier For Khmer Printed Character-set...Support Vector Machine (SVM) Based Classifier For Khmer Printed Character-set...
Support Vector Machine (SVM) Based Classifier For Khmer Printed Character-set...
 
Machine Learning for NLP
Machine Learning for NLPMachine Learning for NLP
Machine Learning for NLP
 
Artificial Intelligence, Machine Learning and Deep Learning
Artificial Intelligence, Machine Learning and Deep LearningArtificial Intelligence, Machine Learning and Deep Learning
Artificial Intelligence, Machine Learning and Deep Learning
 
Plagiarism Powerpoint
Plagiarism PowerpointPlagiarism Powerpoint
Plagiarism Powerpoint
 
Forensic linguistics
Forensic linguisticsForensic linguistics
Forensic linguistics
 
Forensic Linguistics:The Practical Applications
Forensic Linguistics:The Practical ApplicationsForensic Linguistics:The Practical Applications
Forensic Linguistics:The Practical Applications
 

Similar to Plag detection

The Plagiarism Detection Systems for Higher Education - A Case Study in Saudi...
The Plagiarism Detection Systems for Higher Education - A Case Study in Saudi...The Plagiarism Detection Systems for Higher Education - A Case Study in Saudi...
The Plagiarism Detection Systems for Higher Education - A Case Study in Saudi...ijseajournal
 
A Review Of Plagiarism Detection Based On Lexical And Semantic Approach
A Review Of Plagiarism Detection Based On Lexical And Semantic ApproachA Review Of Plagiarism Detection Based On Lexical And Semantic Approach
A Review Of Plagiarism Detection Based On Lexical And Semantic ApproachCourtney Esco
 
Malicious-URL Detection using Logistic Regression Technique
Malicious-URL Detection using Logistic Regression TechniqueMalicious-URL Detection using Logistic Regression Technique
Malicious-URL Detection using Logistic Regression TechniqueDr. Amarjeet Singh
 
A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsSamantha Vargas
 
Literature Review.docx
Literature Review.docxLiterature Review.docx
Literature Review.docxAliAgral2
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 yearsMehedi Hasan
 
A Survey On Plagiarism Detection
A Survey On Plagiarism DetectionA Survey On Plagiarism Detection
A Survey On Plagiarism DetectionKarla Adamson
 
A framework for plagiarism
A framework for plagiarismA framework for plagiarism
A framework for plagiarismcsandit
 
cyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometricscyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometricsMayank Diwakar
 
PHISHING DETECTION
PHISHING DETECTIONPHISHING DETECTION
PHISHING DETECTIONumme ayesha
 
Optimised Malware Detection in Digital Forensics
Optimised Malware Detection in Digital Forensics Optimised Malware Detection in Digital Forensics
Optimised Malware Detection in Digital Forensics IJNSA Journal
 
Artificial intelligence presentation slides.pptx
Artificial intelligence presentation slides.pptxArtificial intelligence presentation slides.pptx
Artificial intelligence presentation slides.pptxrakhicse
 
Optimised malware detection in digital forensics
Optimised malware detection in digital forensicsOptimised malware detection in digital forensics
Optimised malware detection in digital forensicsIJNSA Journal
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco Security
 
CYBERCRIME INVESTIGATION AND ANALYSIS.pptx
CYBERCRIME INVESTIGATION AND ANALYSIS.pptxCYBERCRIME INVESTIGATION AND ANALYSIS.pptx
CYBERCRIME INVESTIGATION AND ANALYSIS.pptxOlusegun Mosugu
 
Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docx
Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docxAssignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docx
Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docxcarlibradley31429
 
Phishing Websites Detection Using Back Propagation Algorithm: A Review
Phishing Websites Detection Using Back Propagation Algorithm: A ReviewPhishing Websites Detection Using Back Propagation Algorithm: A Review
Phishing Websites Detection Using Back Propagation Algorithm: A Reviewtheijes
 
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeComputer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeCSCJournals
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 

Similar to Plag detection (20)

The Plagiarism Detection Systems for Higher Education - A Case Study in Saudi...
The Plagiarism Detection Systems for Higher Education - A Case Study in Saudi...The Plagiarism Detection Systems for Higher Education - A Case Study in Saudi...
The Plagiarism Detection Systems for Higher Education - A Case Study in Saudi...
 
A Review Of Plagiarism Detection Based On Lexical And Semantic Approach
A Review Of Plagiarism Detection Based On Lexical And Semantic ApproachA Review Of Plagiarism Detection Based On Lexical And Semantic Approach
A Review Of Plagiarism Detection Based On Lexical And Semantic Approach
 
Malicious-URL Detection using Logistic Regression Technique
Malicious-URL Detection using Logistic Regression TechniqueMalicious-URL Detection using Logistic Regression Technique
Malicious-URL Detection using Logistic Regression Technique
 
A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis Tools
 
Literature Review.docx
Literature Review.docxLiterature Review.docx
Literature Review.docx
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 years
 
A Survey On Plagiarism Detection
A Survey On Plagiarism DetectionA Survey On Plagiarism Detection
A Survey On Plagiarism Detection
 
A framework for plagiarism
A framework for plagiarismA framework for plagiarism
A framework for plagiarism
 
cyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometricscyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometrics
 
PHISHING DETECTION
PHISHING DETECTIONPHISHING DETECTION
PHISHING DETECTION
 
Optimised Malware Detection in Digital Forensics
Optimised Malware Detection in Digital Forensics Optimised Malware Detection in Digital Forensics
Optimised Malware Detection in Digital Forensics
 
Artificial intelligence presentation slides.pptx
Artificial intelligence presentation slides.pptxArtificial intelligence presentation slides.pptx
Artificial intelligence presentation slides.pptx
 
Optimised malware detection in digital forensics
Optimised malware detection in digital forensicsOptimised malware detection in digital forensics
Optimised malware detection in digital forensics
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 
CYBERCRIME INVESTIGATION AND ANALYSIS.pptx
CYBERCRIME INVESTIGATION AND ANALYSIS.pptxCYBERCRIME INVESTIGATION AND ANALYSIS.pptx
CYBERCRIME INVESTIGATION AND ANALYSIS.pptx
 
Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docx
Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docxAssignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docx
Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docx
 
Phishing Websites Detection Using Back Propagation Algorithm: A Review
Phishing Websites Detection Using Back Propagation Algorithm: A ReviewPhishing Websites Detection Using Back Propagation Algorithm: A Review
Phishing Websites Detection Using Back Propagation Algorithm: A Review
 
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeComputer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 

Recently uploaded

Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 

Recently uploaded (20)

Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 

Plag detection

  • 1. KIET SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER APPICATIONS PRESENTATION ON Plagiarism-Detection-Technique SUBMITTED BY ROLL NO. :- 1102914084 NAME :- Rishabh Dixit SEMESTER :- 6th sem SECTION :- B 1
  • 2.  Introduction  Describing Plagiarism  Plagiarism Detection  Software Aided Detection  Approaches  Disadvantage of the Plagiarism  Conclusion  References 2
  • 3.  Plagiarism is a significant problem on almost every college and university campus. The problems of plagiarism go beyond the campus, and have become an issue in industry, journalism, and government activities.  Plagiarism refers to “the act of copying materials without actually acknowledging the original source”. 3
  • 4. Plagiarism can be described as:  Turning in someone else's work as your own.  Copying words or ideas from someone else without giving credit.  Giving incorrect information about the source of a quotation.  Changing words but copying the sentence structure of a source without giving credit. 4
  • 5. 5
  • 6.  collection stage may be defined as the process of electronically collecting and pre-processing student submissions into a suitable format.  Analysis is defined as “where the submissions are compared with each other and with Documents obtained from the Web and the list of those submissions, or pairs, the list of those submissions, or pairs, that require further investigation is produced.” 6
  • 7.  Verification (confirmation) is required to ensure that those pairs reported as being suspicious are worth investigating with a view to possible disciplinary action (this is a task normally undertaken by humans, since value judgements May be involved).  The final stage, investigation, will determine the extent of the alleged misconduct and will “also involve the process of deciding culpability and possible penalties.” 7
  • 8. 8
  • 9.  Computer-assisted plagiarism detection (CaPD) is an Information retrieval (IR) task supported by specialized IR systems, referred to as plagiarism detection systems (PDS). 9
  • 10. 10
  • 11. Fingerprinting:-  Fingerprinting is currently the most widely applied approach to plagiarism detection.  The sets represent the fingerprints and their elements are called minutiae.  A suspicious document is checked for plagiarism by computing its fingerprint and querying minutiae with a precomputed index of fingerprints for all documents of a reference collection. 11
  • 12. String matching :-  String matching is a prevalent approach used in computer science.  Checking a suspicious document in this setting requires the computation and storage of efficiently comparable representations for all documents in the reference collection to compare them pairwise. 12
  • 13. Bag of words:-  Bag of words analysis represent the adoption of vector space retrieval, a traditional IR concept, to the domain of plagiarism detection.  Documents are represented as one or multiple vectors, e.g. for different document parts, which are used for pair wise similarity computations. 13
  • 14. TurnItIn:  Four UC Berkeley graduate students designed a peer review application to use for their classes — thus, TurnItIn was born. Eventually, that prototype developed into one of the most recognizable names in plagiarism detection.  Students can use TurnItIn's WriteCheck service to maintain proper citations and to access various writing tools. Teachers can ask students to submit their papers through the service as a first measure. 14
  • 15. Viper:  Viper calls itself the "Free TurnItIn Alternative." It scans a large database of academic essays and other online sources, offering side-by-side comparisons for plagiarism. 15
  • 16. Plagiarism Detection systems are built based on a few languages. To check for plagiarism with the Same software can be difficult.  Most of the detection software checking is done with some repository situated in an organization .Other people are unable to access it and verify for plagiarism.  As the number of digital copies are going up the repository size should be large and the plagiarism Detection software should be able to handle it. 16
  • 17.  There is some plagiarism detection software available which ask us to load a file to their link. Once done the file is copied to their database and then checked for plagiarism. This also comes with an inherent chance of our data being leaked or hacked for other purposes. 17
  • 18. 18
  • 19.  Plagiarism is rampant now. With most of the data available to us in digital format the venues for plagiarism is opening up.  To avoid this kind of cheating and to acknowledge the originality of the author new detection techniques are to be created.  To protect the intellectual property source code new techniques are to be developed and implemented. 19
  • 20. [1] Steven Burrows 1, Seyed M. M. Tahaghoghi 1 & Justin Zobel , Proceedings of the Second Australian Undergraduate Students' Computing Conference, 2004 http://citeseerx.ist.psu.edu/viewdoc/download?doi= 10.1.1.69.4500&rep=rep1&type=pdf [2] Georgina Cosma , Mike Joy, Daniel White and Jane Yau, 9th August 2007 ,ICS University of Ulster. http://www.ics.heacademy.ac.uk/resources/assessment/p lagiarism/ [3] Plagiarism detection software, How effective it is?, 20
  • 21. CSHE, http://www.cshe.unimelb.edu.au/assessinglearning/docs/ PlagSoftware.pdf [4] Maeve Paris, School of Computing & Intelligent Systems, University of Ulster http://www.ics.heacademy.ac.uk/Events/conf2003/ maeve.htm [5] S.A.F.E, http://www.safe-corp.biz/products_codesuite.htm 21