{"id":"https://openalex.org/W4310354418","doi":"https://doi.org/10.1109/fie56618.2022.9962396","title":"Enhancement of Plagiarism Detection Techniques via Watermarking","display_name":"Enhancement of Plagiarism Detection Techniques via Watermarking","publication_year":2022,"publication_date":"2022-10-08","ids":{"openalex":"https://openalex.org/W4310354418","doi":"https://doi.org/10.1109/fie56618.2022.9962396"},"language":"en","primary_location":{"id":"doi:10.1109/fie56618.2022.9962396","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fie56618.2022.9962396","pdf_url":null,"source":{"id":"https://openalex.org/S4363607793","display_name":"2022 IEEE Frontiers in Education Conference (FIE)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Frontiers in Education Conference (FIE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008313343","display_name":"Dylan Ryman","orcid":null},"institutions":[{"id":"https://openalex.org/I63135867","display_name":"University of Cincinnati","ror":"https://ror.org/01e3m7079","country_code":"US","type":"education","lineage":["https://openalex.org/I63135867"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Dylan Ryman","raw_affiliation_strings":["University of Cincinnati,Department of Engineering Education,Cincinnati,OH,USA","Department of Engineering Education, University of Cincinnati, Cincinnati, OH, USA"],"affiliations":[{"raw_affiliation_string":"University of Cincinnati,Department of Engineering Education,Cincinnati,OH,USA","institution_ids":["https://openalex.org/I63135867"]},{"raw_affiliation_string":"Department of Engineering Education, University of Cincinnati, Cincinnati, OH, USA","institution_ids":["https://openalex.org/I63135867"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111882060","display_name":"P.K. Imbrie","orcid":null},"institutions":[{"id":"https://openalex.org/I63135867","display_name":"University of Cincinnati","ror":"https://ror.org/01e3m7079","country_code":"US","type":"education","lineage":["https://openalex.org/I63135867"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"P.K. Imbrie","raw_affiliation_strings":["University of Cincinnati,Department of Engineering Education,Cincinnati,OH,USA","Department of Engineering Education, University of Cincinnati, Cincinnati, OH, USA"],"affiliations":[{"raw_affiliation_string":"University of Cincinnati,Department of Engineering Education,Cincinnati,OH,USA","institution_ids":["https://openalex.org/I63135867"]},{"raw_affiliation_string":"Department of Engineering Education, University of Cincinnati, Cincinnati, OH, USA","institution_ids":["https://openalex.org/I63135867"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109217999","display_name":"Jeff Kastner","orcid":null},"institutions":[{"id":"https://openalex.org/I63135867","display_name":"University of Cincinnati","ror":"https://ror.org/01e3m7079","country_code":"US","type":"education","lineage":["https://openalex.org/I63135867"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jeff Kastner","raw_affiliation_strings":["University of Cincinnati,Department of Engineering Education,Cincinnati,OH,USA","Department of Engineering Education, University of Cincinnati, Cincinnati, OH, USA"],"affiliations":[{"raw_affiliation_string":"University of Cincinnati,Department of Engineering Education,Cincinnati,OH,USA","institution_ids":["https://openalex.org/I63135867"]},{"raw_affiliation_string":"Department of Engineering Education, University of Cincinnati, Cincinnati, OH, USA","institution_ids":["https://openalex.org/I63135867"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5008313343"],"corresponding_institution_ids":["https://openalex.org/I63135867"],"apc_list":null,"apc_paid":null,"fwci":0.1929,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.56537753,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11492","display_name":"Academic integrity and plagiarism","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11492","display_name":"Academic integrity and plagiarism","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9764999747276306,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9333999752998352,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/plagiarism-detection","display_name":"Plagiarism detection","score":0.9531221389770508},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.7992194294929504},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7666248083114624},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6166583299636841},{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.5606604814529419},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5107431411743164},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.42656978964805603},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.41653960943222046},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.35483992099761963},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3367697298526764},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32963109016418457},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.31311386823654175},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.15793129801750183},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.11903876066207886},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.11891332268714905}],"concepts":[{"id":"https://openalex.org/C2780907237","wikidata":"https://www.wikidata.org/wiki/Q2986238","display_name":"Plagiarism detection","level":2,"score":0.9531221389770508},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.7992194294929504},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7666248083114624},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6166583299636841},{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.5606604814529419},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5107431411743164},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.42656978964805603},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.41653960943222046},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.35483992099761963},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3367697298526764},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32963109016418457},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.31311386823654175},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.15793129801750183},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.11903876066207886},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.11891332268714905},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/fie56618.2022.9962396","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fie56618.2022.9962396","pdf_url":null,"source":{"id":"https://openalex.org/S4363607793","display_name":"2022 IEEE Frontiers in Education Conference (FIE)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Frontiers in Education Conference (FIE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/4","score":0.8299999833106995,"display_name":"Quality Education"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1423699859","https://openalex.org/W1623473672","https://openalex.org/W1640692037","https://openalex.org/W1979637212","https://openalex.org/W1983084248","https://openalex.org/W2003728784","https://openalex.org/W2237711973","https://openalex.org/W2338002573","https://openalex.org/W2396553721","https://openalex.org/W2462218878","https://openalex.org/W2551754775","https://openalex.org/W2588990876","https://openalex.org/W2891514518","https://openalex.org/W2945111072","https://openalex.org/W2971983965","https://openalex.org/W3086693070","https://openalex.org/W3117649022","https://openalex.org/W6636406266","https://openalex.org/W6636559413","https://openalex.org/W6703609118","https://openalex.org/W6712588878","https://openalex.org/W6783002377"],"related_works":["https://openalex.org/W2361629745","https://openalex.org/W2107922825","https://openalex.org/W3094285444","https://openalex.org/W2381262728","https://openalex.org/W2111592878","https://openalex.org/W4287126803","https://openalex.org/W1568204688","https://openalex.org/W2122982227","https://openalex.org/W1971922616","https://openalex.org/W3145472249"],"abstract_inverted_index":{"Plagiarism":[0,64],"in":[1,29,73,90,111,123],"student":[2,46,74],"submissions":[3,172],"is":[4,52,85,152,189],"a":[5,26],"continual":[6],"threat":[7],"to":[8,57,69,94,140,184],"the":[9,18,30,53,102,124],"integrity":[10],"of":[11,20,23,32,55,104,126,138,162,166,171],"engineering":[12],"education.":[13],"Online":[14],"learning":[15,47],"environments":[16],"enhance":[17],"accessibility":[19],"many":[21],"forms":[22],"plagiarism,":[24],"and":[25,49,76,148,169,180],"corresponding":[27],"increase":[28],"prevalence":[31],"academic":[33],"misconduct":[34],"has":[35,41,80],"been":[36],"observed.":[37],"When":[38],"unmitigated,":[39],"plagiarism":[40,59,98,127],"severe":[42],"detrimental":[43],"effects":[44],"on":[45],"outcomes,":[48],"therefore":[50],"it":[51],"responsibility":[54],"instructors":[56],"detect":[58],"by":[60,129],"all":[61],"practical":[62],"means.":[63],"identification":[65],"techniques":[66,119],"typically":[67],"seek":[68],"discover":[70],"abnormal":[71],"similarities":[72],"submissions,":[75],"although":[77],"imperfect,":[78],"research":[79],"shown":[81],"that":[82],"this":[83,155,186],"approach":[84],"highly":[86],"effective.":[87],"This":[88,113],"work":[89,182],"progress":[91],"paper":[92,114,156],"seeks":[93],"augment":[95],"traditional":[96],"similarity-focused":[97],"detection":[99,128],"strategies":[100],"through":[101],"use":[103],"watermarks,":[105],"or":[106],"student-specific":[107],"unique":[108],"identifiers":[109],"embedded":[110],"files.":[112,135],"shows":[115],"how":[116],"existing":[117],"watermarking":[118,139],"can":[120],"be":[121],"applied":[122],"context":[125],"integrating":[130],"watermarks":[131],"into":[132],"assignment":[133],"template":[134],"The":[136],"applicability":[137],"multiple":[141],"submission":[142],"types,":[143],"including":[144],"source":[145],"code":[146],"files":[147],"Microsoft":[149],"Office":[150],"documents,":[151],"demonstrated.":[153],"Additionally,":[154],"presents":[157],"methods":[158],"for":[159,173],"automated":[160],"generation":[161],"watermarked":[163],"templates,":[164],"distribution":[165],"marked":[167],"files,":[168],"evaluation":[170],"plagiarism.":[174],"Finally,":[175],"preliminary":[176],"results":[177],"are":[178],"presented,":[179],"future":[181],"necessary":[183],"complete":[185],"in-progress":[187],"project":[188],"discussed.":[190]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2026-02-27T16:54:17.756197","created_date":"2025-10-10T00:00:00"}
