skip to main content
article
Free Access

Copy detection mechanisms for digital documents

Authors Info & Claims
Published:22 May 1995Publication History
Skip Abstract Section

Abstract

In a digital library system, documents are available in digital form and therefore are more easily copied and their copyrights are more easily violated. This is a very serious problem, as it discourages owners of valuable information from sharing it with authorized users. There are two main philosophies for addressing this problem: prevention and detection. The former actually makes unauthorized use of documents difficult or impossible while the latter makes it easier to discover such activity.In this paper we propose a system for registering documents and then detecting copies, either complete copies or partial copies. We describe algorithms for such detection, and metrics required for evaluating detection mechanisms (covering accuracy, efficiency, and security). We also describe a working prototype, called COPS, describe implementation issues, and present experimental results that suggest the proper settings for copy detection parameters.

References

  1. 1 C. Anderson. Robocops: Stewart and Feder's mechanized misconduct search. Nature, 350(6318}:454-455, April 1991.]]Google ScholarGoogle Scholar
  2. 2 J. Brassil, S. Low, N. Maxemchuk, and L.O'Gorman. Document marking and identification using both line and word shifting. Technical report, AT&T Bell Labratories, 1994. May be obtained from ftp://ft p. research, at t. co m / dist / brassil / do cmark 2 .ps.]]Google ScholarGoogle Scholar
  3. 3 J. Brassil, S. Low, N. Maxemchuk, and L.O'Gorman. Electronic marking and identification techniques to discourage document copying. Technical report, AT&T Bell Labratories, 1994.]]Google ScholarGoogle Scholar
  4. 4 A. Choudhury, N. Maxemchuk, S. Paul, and H. Schulzrinne. Copyright protection for electronic publishing over computer networks. Technical report, AT&T Bell Labratories, 1994. Submitted to IEEE Network Magazine June 1994.]]Google ScholarGoogle Scholar
  5. 5 J. R. Garrett and J. S. Alen. Toward a copyright management system for digital libraries. Technical report, Copyright Clearance Center, 1991.]]Google ScholarGoogle Scholar
  6. 6 G. N. Griswold. A method for protecting copyright on networks. In Joint Harvard MIT Workshop on Technology Strategies/or Protecting Intellectual Property in the Networked Multimedia Environment, April 1993.]]Google ScholarGoogle Scholar
  7. 7 M. B. Jensen. Making copyright work in electronic publishing models. Serials Review, 18(1-2):62-66, 1992.]]Google ScholarGoogle ScholarCross RefCross Ref
  8. 8 R. E. Kahn. Deposit, registration and recordation in an electronic copyright management system. Technical report, Corporation for National Research Initiatives, Reston, Virginia, August 1992.]]Google ScholarGoogle Scholar
  9. 9 P. A. Lyons. Knowledge-based systems and copyright. Serials Review, 18(1-2):88-91, 1992.]]Google ScholarGoogle ScholarCross RefCross Ref
  10. 10 U. Manber. Finding similar files in a large file system. In USENIX, pages 1-10, San Francisco, CA, January 1994.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11 A. Parker and J. O. Hamblen. Computer algorithms for plagiarism detection. IEEE Trasnactions on Education, 32(2):94-99, May 1989.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12 G.J. Popek and C.S. Kline. Encryption and secure computer networks. ACM Computing Surveys, 11(4):331- 356, December 1979.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13 D. Wheeler. Computer networks are said to offer new opportunities for plagarists. The Chronicle of Hzgher Education, pages 17, 19, June 1993.]]Google ScholarGoogle Scholar

Index Terms

  1. Copy detection mechanisms for digital documents

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM SIGMOD Record
            ACM SIGMOD Record  Volume 24, Issue 2
            May 1995
            490 pages
            ISSN:0163-5808
            DOI:10.1145/568271
            Issue’s Table of Contents
            • cover image ACM Conferences
              SIGMOD '95: Proceedings of the 1995 ACM SIGMOD international conference on Management of data
              June 1995
              508 pages
              ISBN:0897917316
              DOI:10.1145/223784

            Copyright © 1995 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 22 May 1995

            Check for updates

            Qualifiers

            • article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader