SOFTWARE PLAGIARISM DETECTION

Authors

  • Pooja Patil Computer Science, AISSMS’s Institute of Information Technology
  • Kajal Thapa Computer Science, AISSMS’s Institute of Information Technology
  • Rohit Patil Computer Science, AISSMS’s Institute of Information Technology
  • Aniruddha Wathare Computer Science, AISSMS’s Institute of Information Technology

Keywords:

Plagiarism, Birth-marking, Jaccard, Cosine, Dice, Reflect API, feature set

Abstract

With the development of internet and electronic devices, software plagiarism
hasbecomeprevalentinsoftwareindustriesaswellaseducationalinstitutes, violating one’s intellectual integrity. Certain
techniques such as watermarking and semantics-preserving code obfuscations were introduced to tackle this issue.
However, besides the need to insert additional data in the original program, code obfuscations can often destroy
watermarks. Also, it was found that a sufficiently determined attacker may be able to destroy any watermark. In order to
overcome these issues, birth-marking technique is proposed, which extracts a set of characteristics that uniquely identify
the original program. Our work focuses on extracting birthmarks from source codes, implementing algorithms to
measure the similarity between them and displaying the results on a dedicated user interface with respect to a pre-set
threshold.

Published

2022-08-23

How to Cite

SOFTWARE PLAGIARISM DETECTION. (2022). International Journal of Advance Engineering and Research Development (IJAERD), 3(13), -. https://www.ijaerd.org/index.php/IJAERD/article/view/5858

Similar Articles

1-10 of 746

You may also start an advanced similarity search for this article.