Copy detection mechanisms for digital documents

@inproceedings{Brin1995CopyDM,
  title={Copy detection mechanisms for digital documents},
  author={S. Brin and James Davis and H. Garcia-Molina},
  booktitle={SIGMOD '95},
  year={1995}
}
In a digital library system, documents are available in digital form and therefore are more easily copied and their copyrights are more easily violated. This is a very serious problem, as it discourages owners of valuable information from sharing it with authorized users. There are two main philosophies for addressing this problem: prevention and detection. The former actually makes unauthorized use of documents difficult or impossible while the latter makes it easier to discover such activity… Expand
SCAM: A Copy Detection Mechanism for Digital Documents
TLDR
A new scheme for detecting copies based on comparing the word frequency occurrences of the new document against those of registered documents, and an experimental comparison between this scheme and COPS, a detection scheme based on sentence overlap is reported on. Expand
A document comparison scheme for secure duplicate detection
TLDR
A duplicate detection scheme that is able to determine, with a particularly high accuracy, the degree to which one document is similar to another, and which presents a good level of security in the protection of intellectual property while improving the availability of the data stored in the digital library and the correctness of the search results. Expand
Document Fingerprint Detection System
TLDR
Document Fingerprint Detection system has used most suitable hash function, algorithm, searching method and comparison methods to improve producing of most accurate results than existing systems. Expand
Evaluation of Document Comparing Mechanisms
Digital libraries have made access to documents very easy but this also makes documents vulnerable to being copied. The illegal distribution of documents discourages authors/ news feed services toExpand
A Copy Detection Method Based on SCAM and PPCHECKER
TLDR
A schema for detecting copies including partial copies is proposed based on SCAM and PPCHECKER methods, that benefits advantages of both methods. Expand
Plagiarism-detection framework for digital libraries
TLDR
A copy detection mechanism which could eliminate unnecessary comparisons between documents describing different topics by pre-parsing the documents to quantify their semantic meanings and it will not serve any purpose to copy from a document describing an unrelated topic. Expand
CHECK: a document plagiarism detection system
TLDR
This paper proposes a copy detection mechanism called CHECK, based on the observation that comparisons between two documents addressing different subjects are not necessary, and describes the design and implementation of this mechanism. Expand
Copy detection systems for digital documents
TLDR
A copy detection system to automate the detection of application in digital documents is presented and proposes an intuitive definition of similarity between documents and produces the distribution of overlap that exists between overlapping documents. Expand
Building a scalable and accurate copy detection mechanism
TLDR
This paper study's the performance of various copy detection mechanisms, including the disk storage requirements, main memory requirements, response times for registration, and response time for querying, and contrast performance to the accuracy of the mechanisms (how well they detectpartial copies). Expand
Partial Plagiarism Detection Using String Matching with Mismatches
TLDR
This work proposes the method that detects partial copies from documents without query, and some partial copies were detected from test documents. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 23 REFERENCES
Electronic Marking and Identification Techniques to Discourage Document Copying
TLDR
This paper proposes techniques that discourage unauthorized distribution by embedding each document with a unique codeword, and describes one in detail, and presents experimental results showing that the identification techniques are highly reliable, even after documents have been photocopied. Expand
Electronic marking and identification techniques to discourage document copying
TLDR
Three coding methods are proposed that discourage illicit distribution by embedding each document with a unique codeword, yet enable one to identify the sanctioned recipient of a document by examination of a recovered document. Expand
Finding Similar Files in a Large File System
TLDR
Application of sif can be found in file management, information collecting, program reuse, file synchronization, data compression, and maybe even plagiarism detection. Expand
Document marking and identification using both line and word shifting
TLDR
A study of document marking to deter illicit dissemination reveals that the distortion on the photocopy of a document is very different in the vertical and horizontal directions, leading to the strategy that marks a text line both vertically using line shifting and horizontally using word shifting. Expand
Copyright protection for electronic publishing over computer networks
TLDR
The authors explore the use of cryptographic protocols to discourage the distribution of illicit electronic copies, and propose an architecture and two separate strategies for making electronic document distribution secure. Expand
Encryption and Secure Computer Networks
TLDR
Key management, network encryption protocols, digital signatures, and the utility of conventional or public-key encryptlon methods are each discussed. Expand
Computer algorithms for plagiarism detection
TLDR
A survey of computer algorithms used for the detection of student plagiarism is presented and common features of the different plagiarism detection algorithms are described. Expand
Document marking and identiication using both line and word shifting May be obtained from ftp
  • Document marking and identiication using both line and word shifting May be obtained from ftp
  • 1994
Finding similar les in a large le system
  • In USENIX,
  • 1994
A method for protecting copyright o n networks
  • Joint Harvard MIT Workshop on Technology Strategies for Protecting Intellectual Property in the Networked Multimedia Environment
  • 1993
...
1
2
3
...