Turnitoff: identifying and fixing a hole in current plagiarism detection software

  title={Turnitoff: identifying and fixing a hole in current plagiarism detection software},
  author={James Heather},
  journal={Assessment \& Evaluation in Higher Education},
  pages={647 - 660}
  • J. Heather
  • Published 2010
  • Computer Science
  • Assessment & Evaluation in Higher Education
In recent times, plagiarism detection software has become popular in universities and colleges, in an attempt to stem the tide of plagiarised student coursework. Such software attempts to detect any copied material and identify its source. The most popular such software is Turnitin, a commercial system used by thousands of institutions in more than 100 countries. Here, we show how to fix a loophole in Turnitin's current plagiarism detection process. We demonstrate that, in its current… Expand
Performance Evaluation of Free Anti-plagiarism Software
Results from the study indicate that there is no one anti-plagiarism software that can meet all user needs, but there are software that are superior for certain categories. Expand
Back translation: an emerging sophisticated cyber strategy to subvert advances in ‘digital age’ plagiarism detection and prevention
Advances have been made in detecting and deterring the student plagiarism that has accompanied the uptake and development of the internet. Many authors from the late 1990s onwards grappled withExpand
Detecting visual spoofing using classical cryptanalysis methods in plagiarism detection systems
The use of classical cryptanalysis methods are investigated to facilitate the identification of visually spoofed documents in automated plagiarism detection systems. Expand
State-of-the-art in detecting academic plagiarism
In the future, plagiarism detection systems may benefit from combining traditional character-based detection methods with these emerging detection approaches, including intrinsic, cross-lingual and citation-based plagiarism Detection. Expand
Plagiarism Detection in Texts Obfuscated with Homoglyphs
Two alternative approaches for detecting plagiarism in homoglyph obfuscated texts are presented: the first approach utilizes the Unicode list of confusables to replaceHomoglyphs with visually identical letters, while the second approach uses a similarity score computed using normalized hamming distance to match homoglyPH obfuscated words with source words. Expand
PDFPhantom: Exploiting PDF Attacks Against Academic Conferences' Paper Submission Process with Counterattack
  • Dat Tran, Chetan Jaiswal
  • Computer Science
  • 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)
  • 2019
A method to avoid content masking attacks against the automatic reviewers' assignment process at large academic conferences by preventing attackers from getting true topic information from PDF documents is introduced. Expand
Minimizing Cyber-Plagiarism through Turnitin: Faculty’s & Students’ Perspectives
This is an attempt to investigate and evaluate students’ and faculty’s experiences and understanding to the strengths and limitations of anti-plagiarism software, specifically, Turnitin and how itExpand
PDF Mirage: Content Masking Attack Against Information-Based Online Services
We present a new class of content masking attacks against the Adobe PDF standard, causing documents to appear to humans dissimilar to the underlying content extracted by information-based services.Expand
Spinning-translation and the act of plagiarising: how to avoid and resist
ABSTRACT Much progress has been made in the areas of diminishing, avoiding, and resisting plagiarism, due to the recent development of plagiarism tools. Many scholars/authors across the globe haveExpand
On the use of character n-grams as the only intrinsic evidence of plagiarism
It is demonstrated empirically that the low- and the high-frequency n-grams are not equally relevant for intrinsic plagiarism detection, but their performance depends on the way they are exploited. Expand


Staying out of trouble: Apparent plagiarism and academic survival
Abstract Textual borrowing by second language students in academic settings has traditionally been viewed as an intentional violation of Western norms and practices. As we have learned from recentExpand
Borrowing Others' Words: Text, Ownership, Memory, and Plagiarism
In this article, I attempt to deal with some of the complexities of text, ownership, memorization, and plagiarism. Arguing that plagiarism cannot be cast as a simple black-and-white issue, theExpand
Beyond the accusation of plagiarism
The paper explores the complexity of the notion of plagiarism from sociocultural and psychological perspectives. Plagiarism is a dynamic and multi-layered phenomenon (Russikoff et al., 2003;Expand
Cultural Values, Plagiarism, and Fairness: When Plagiarism Gets in the Way of Learning
The dramatic increase in the number of overseas students studying in the United Kingdom and other Western countries has required academics to reevaluate many aspects of their own, and theirExpand
Telling humans and computers apart automatically
How lazy cryptographers do AI.
CAPTCHA: Telling humans and computers apart
  • Advances in cryptology, Eurocrypt ’03, Vol. 2656 of lecture notes in computer science, ed. E. Biham, 294–311. New York: Springer-Verlag.
  • 2003
Plagiarism detection software report for Joint Information Systems Committee Plagiarism Advisory Service
  • September
  • 2007
Plagiarism detection software report for Joint Information Systems Committee Plagiarism Advisory Service (Technical report, NCC Group, Manchester), September
  • http://www.jiscpas.ac.uk/documents/resources/PDReview-Reportv1_5.pdf.
  • 2007
September. Plagiarism Detection Software Report for Joint Information Systems Committee Plagiarism Advisory Service
  • 2007
We here use t1.cmap as the starting point rather than ot1.cmap because some older distributions do not contain the latter