=Paper=
{{Paper
|id=Vol-1737/T4-9
|storemode=property
|title=Graph-based Approach to Text Alignment for Plagiarism Detection in Persian Documents
|pdfUrl=https://ceur-ws.org/Vol-1737/T4-9.pdf
|volume=Vol-1737
|authors=Mozhgan Momtaz,Kayvan Bijari,Mostafa Salehi,Hadi Veisi
|dblpUrl=https://dblp.org/rec/conf/fire/MomtazBSV16
}}
==Graph-based Approach to Text Alignment for Plagiarism Detection in Persian Documents==
Graph-based Approach to Text Alignment for Plagiarism Detection in Persian Documents Mozhgan Momtaz Kayvan Bijari Mostafa Salehi Hadi Veisi Faculty of New Sciences and Faculty of New Sciences and Faculty of New Sciences and Faculty of New Sciences and Technologies Technologies Technologies Technologies University of Tehran, University of Tehran, University of Tehran, University of Tehran, Tehran Tehran Tehran Tehran m.momtaz92@ut.ac.ir kayvan.bijari@ut.ac.ir mostafa_salehi@ut.ac.ir h.veisi@ut.ac.ir ABSTRACT Categories of text alignment dataset are based on PAN This paper presents a new approach for Persian plagiarism Competitions [12]. detection. This approach uses a graph structure as well as one of the graph similarity methods (iterative methods) for similarity detection of two Persian documents. In this approach, documents are represented by a graph with specified length, then each part of Monolingual Source Retrieval suspicious document is compared to that of the source document. Different The graph is made if these parts have more common bigrams than kinds of a predefined threshold. Once graphs are made, an iterative method documents is used to find analogous nodes in graphs. Two graphs are marked plagiarism Cross-language Text alignment as similar if they contain at least a certain number of similar nodes. In order to evaluate the proposed method, it was run on PAN2015 and PAN2016 Persian Text Alignment dataset. The Plagdet score is defined to evaluate plagiarism detection methods in PAN contest. The gained Plagdet of proposed method is 90% on PAN2015 and 87% on PAN2016. Translation Obfuscation None Obfuscation Summary Obfuscation Random Obfuscation None plagiarism CCS Concepts • Information systems➝ Plagiarism Detection software • Computing methodologies➝ Graph-based Keywords Plagiarism Detection, Text Based Graph Representation, Text Alignment. Figure 1- Different kinds of documents plagiarism 1. INTRODUCTION Nowadays, a large volume of information is a compound of The proposed method, converts every document to a number of different types of contextual data such as books, articles and other parts with specific length using the graph approach idea and then documents and this volume is growing increasingly. In many if necessary, it converts each part to a graph for precise plagiarism cases, we need to identify either the duplicated documents or the examination, which creates graph based on simultaneous ones which are near-copy documents among the many cases. In occurrence of the words in fixed window size. After this step, the this regard, Plagiarism detection in documents is one of the main similarity between two graphs measured using node similarity topics which gained attention among researchers in the recent measures, if the rate of similarity is more than the specified years. The act of plagiarism is to use other author's writing or threshold, then that part is labeled as plagiarism. The proposed ideas, without proper appreciation to the author or proper citation method was run on the PAN2015 dataset [6] and PAN2016 to the original source [3]. In the recent years, identifying dataset (Persian Plagdet2016 contest [5]). plagiarism has become easier using different systems, but The rest of paper is organized as follows: Section 2 is devoted to different types of plagiarism is still an issue. In some types of related works; Section 3 presents the graph-based methodology plagiarism, the structure of the document is changed by for plagiarism detection. In Section 4, experimental evaluation of rearranging the words or using synonym words. Therefore, the the proposed method is given, and finally Section 5 ends the paper results of basic plagiarism detection methods are not acceptable. with conclusion and future works. So the need for more sophisticated methods for plagiarism detection is growing. Different kinds of plagiarism are shown in figure 1. 2. RELATED WORK model and the solutions based on graph model are summarized in In order to detect monolingual plagiarism, various methods have table 1. been proposed. In this section, each of these methods is explained Table1- Some issues of the bag-of-words model and the briefly. solutions based on graph-based model for plagiarism Character-based methods: The most important method is the detection applications fingerprint method. Fingerprint algorithms [20] consider the text Issues of bag-of-words Graph-based solution as a series of characters and then they divide the characters in n- methods to model text for series groups, the most important algorithms include 16-gram, 8- plagiarism detection gram and 5-gram methods. In this method, the degree of similarity applications depends on the number of similar characters in a string. Although this method ends up with a good result in detecting plagiarism, but Ignoring order of the words Using directed graph (step 3 when plagiarism has some paraphrasing or modified words, this of proposed method) method does not act in an effective way to detect plagiarism. Ignoring the structure of the Considering the whole Structural-based methods: In the previous method, the only text sentence as a graph (step 2 attention is on words as features of the document. However, in the and 3 of proposed method) structural-based methods [9], pays attention to the titles, Neglecting word synonyms Ability to add synonyms to paragraphs, sections and resources. One of the most famous the graph corresponding text structural-based methods is tree-based method, which gained (step 3 of proposed method) much attention in the recent years. In the tree-structured model, a two-layer model is defined that the top layer is for retrieving documents and the bottom layer is considered for detecting plagiarism between retrieved documents using the methods of 3. METHODOLOGY similarity detection such as cosine similarity method. Any textual document can be presented via a corresponding graph. Graph based representation of text is important because it Classification-based methods: In this method the documents enables us to turn an unstructured text into a structural text, and are classified based on specific words (or keywords) [19]. The then the advantageous of graph representation can be applied to primary goal in this approach is to retrieve similar documents and text summarization, identifying similarities of the documents, and to speed up the process of plagiarism detection. applications of text mining. For natural language processing Semantic-Based methods: This method uses lexical network applications text graph of documents should be built. In a text in order to find semantic similarity for plagiarism detection [17]. graph, nodes represent words of the document, and the edges The most famous lexical network in English language is WordNet present the relation between different words. The relation of [8]. By means of WordNet, it is possible to achieve more words can vary from application to application. The proposed information about a special word. This method is effective when plagiarism detection method is consist of 5 steps that will be plagiarism is done using synonym words. FarsNet [15] the Persian discussed further in the following. equivalent of WordNet, is also proposed for Persian language. Step 1. preprocessing: normalization is one of the basic steps Graph-based methods: In this method, the text will be in text mining and text processing. In the normalization process, converted into a graph. Nodes in the graph can be words, phrases punctuations and stop words are removed. In this paper, we have or even sentences of the text. Edges in the graph represent the link used Hazm package [10] for Persian text normalization. or relation between nodes and they can show the semantic link Step 2. turn text to set of clauses: suspicious document and between words or the simultaneous occurrence in one sentence the reference document are divided to a series of sentences. Each [16]. This method will be discussed more in the proposed method sentence of the suspected document will be compared to all the section. Converting a text into a graph, enables us to detect sentences of the reference document. In this step, a filtering will plagiarism using the advantages of graph similarity algorithms be done on sentences in order to reduce runtime. Finally, if the [7]. two sentences at least have the cosine similarity of 0.4, then they In this paper, the proposed method is a combination of structural- go to the step of graph making process (this value is obtained based method and graph-based method. Paying attention to the experimentally), otherwise the comparison will continue to other structure of the text leads to detection of plagiarism in the sentences of the reference document. document even if the plagiarism is the type in which the structure Step 3. creating corresponding graph: in graph creation of the text is changed. step, each sentence will be converted to a graph. The nodes of the One common and standard approach to model text document is graph are main and unique words, and in this graph, an edge will bag-of-words. This model is suitable for capturing word be established between a specific word and 4 words before and frequency [16]. Assuming that order of the word’s occurrence has after it in the document. Igraph package [11] is used for graph nothing to do with its meaning; this model has a proper result in creation in this paper. information retrieval. The drawback of this model is when it tries Step 4. plagiarism detection: when graph creation is to find the reused text and plagiarism between different parts of complete, we are looking for nodes in the suspected document the text, if a reused text is occurring by using synonym words then that is common with the node of the reference document. An this model could not properly detect the reused text. Furthermore, iterative method based on simple idea indicates that the two this model doesn’t express the meaning and the structure of the graphs are similar when they have similar nodes, and nodes are text [16]. However, Graph representation is mathematical similar if they have analogous neighbors [18]. We use this method constructs and can model different word’s relation and textual for our specific graph. Then we find their similarity using structure of the documents [16]. Some issues of the bag-of-words equation 1: the two nodes. In this case, if plagiarism is done by add and ( ) ( ( ) ( )) )1( removal of the words, by considering minimum similarity threshold, these changes do not have much negative impact on Where B is primary neighbors of the common node in the plagiarism detection. The result of Persian Plagdet contest is also graph of reference document. And A is primary neighbors reported in [1]. of the common node in the graph of suspicious document. If the similarities between two nodes is greater than the threshold α (α = 0.4), then that node is selected as the similar node. Finally, Preprocessing if a sentence has more similar nodes than the threshold β (β=1/3(the number of key words in suspicious document)), that statement is labeled as one of the sentences which plagiarism has Document suspected Reference documents occurred. α and β are thresholds that are achieved experimentally of plagiarism in the database and they are based on performances of the system. Step 5. Integrate plagiarism labeled Sentences: In this Separating text to a set of sentences step, we integrate sentences with plagiarism label (output of step 4 of the algorithm) based on start and end offset of sentences in text. This step important for granularity measure1 [2]. If there exist no labeled sentences, we can assume that no plagiarism is occurred. Sentence 1 of suspected Sentence 1 of reference document document 4. EXPERIMENTAL EVALUATION In this section the results of the implementation of the proposed method on the plagiarism data sets are given. Moreover, in the following we are going to focus on analyzing results. The two Choosing words to build a graph based data sets that were used for analyzing the proposed method are as on minimum similarity follows. 1. Persian Text alignment dataset PAN2015: This dataset is published on the website of PAN contest. Comparing paired generated graphs with each other and 2. Persian Text Alignment dataset PAN2016: This dataset identify similar graphs. (Sentences of the similar graphs contains 2749 training and testing documents and are related to will get similarity label). And Aggregation of similar Persian Plagdet2016 international contest [14, 4, 13], which was labeled Sentences organized by the Institute of Information and Communication Technology (ICTRC) and contest results are available at the contest site. Detecting the existence of plagiarism 4.1 Experimental Results or not Table 2 shows the results of the implementation of the proposed Figure 2- diagram of detecting plagiarism method on the datasets. Table2- Experimental Results on Persian document dataset 5. CONCLUSION AND FUTURE WORK Using a graph structure, we proposed a method to convert dataset Precision Recall Palgdet unstructured text into graphs, Graph-based approach provides the ability that takes advantage of the benefits of graph algorithms PAN2015 0.91 0.89 0.90 and use them in natural language processing algorithms. In this PAN2016(training) 0.90 0.89 0.89 paper, we discussed and analyzed the results of the generalized method to detect plagiarism on the inner levels (Text Alignment). PAN2016(contest) 0.89 0.85 0.87 By achieving the Benchmark of Plagdet 87% without using linguistic corpora and grammatical rules, it is expected that more works in graph based approaches achieve better results in As shown in the results, according to the evaluation criteria, the plagiarism detection. Furthermore, being independent from rules graph-based method has achieved favorable results without using and corpora enables this method to detect plagiarism in other linguistic corpora and only due to the structure of the text. Graph languages. As a future work we want to increase the accuracy of approach has unique features to detect similar documents. Among the algorithm to detect semantic plagiarism using FarsNet lexical these features, one can mention paying attention to non-adjacent network. Since it is possible to add word's synonyms to the words in a sentence. This feature makes plagiarism detection easy, corresponding graph of the document, by adding synonym words, because plagiarism is done by rearranging words, but in the the accuracy of detecting semantic plagiarism is increased. character-based methods attention is just on the relationship Another important category of modern plagiarism, is plagiarism between adjacent words. Furthermore, another feature of the on summary of a text. Due to the flexibility of graph approach in graph is considering the minimum threshold of similarity between detecting plagiarism, graph approach is also efficient in detecting plagiarism on summary of a text. 1 The logarithm of the granularity to smooth its influence on the overall score. 5. REFERENCES Overview of the 5th international competition on plagiarism detection, in CLEF Conference on Multilingual and Multimodal Information Access Evaluation, CELCT. [1] Asghari, H., Mohtaj, S., Fatemi, O., Faili, H., Rosso, P., and Potthast, M., 2016. Algorithms and Corpora for Persian [13] Potthast, M., Gollub, T., Rangel, F., Rosso, P., Stamatatos, E. Plagiarism Detection: Overview of PAN at FIRE 2016. In and Stein, B., 2014, September. Improving the Working notes of FIRE 2016 - Forum for Information Reproducibility of PAN’s Shared Tasks. In International Retrieval Evaluation, Kolkata, India, December 7-10, 2016, Conference of the Cross-Language Evaluation Forum for CEUR Workshop Proceedings, CEUR-WS.org. European Languages (pp. 268-299). Springer International Publishing. [2] Barrón-Cedeño, A., Potthast, M., Rosso, P., Stein, B., and Eiselt, A. 2010. Corpus and Evaluation Measures for [14] Potthast, M., Stein, B., Barrón-Cedeño, A. and Rosso, P., Automatic Plagiarism Detection, In LREC. 2010, August. An evaluation framework for plagiarism detection. In Proceedings of the 23rd international [3] Flowerdew, J and Li, Y. 2007. Plagiarism and second conference on computational linguistics: Posters (pp. 997- language writing in an electronic age, Annual Review of 1005). Association for Computational Linguistics. Applied Linguistics, vol. 27, pp. 161--183. [15] Shamsfard, M., 2008. Developing FarsNet: A lexical [4] Gollub, T., Stein, B. and Burrows, S., 2012, August. Ousting ontology for Persian. In 4th Global WordNet Conference, ivory tower research: towards a web framework for Szeged, Hungary. providing experiments as a service. In Proceedings of the 35th international ACM SIGIR conference on Research and [16] Sonawane, S.S. and Kulkarni, P.A., 2014. Graph based development in information retrieval (pp. 1125-1126). ACM. Representation and Analysis of Text Document: A Survey of Techniques. International Journal of Computer [5] ICT Research Institute, ACECR ,Iran, 2016. [Online]. Applications, 96(19). Available: http://ictrc.ac.ir/plagdet/. [17] Torres, S. and Gelbukh, A., 2009. Comparing similarity [6] Khoshnavataher, K., Zarrabi, V., Mohtaj, S., and Asghari, H. measures for original WSD lesk algorithm. Research In 2015. Developing Monolingual Persian Corpus for Extrinsic Computing Science, 43, pp.155-166. Plagiarism Detection Using Artificial Obfuscation. Notebook for PAN at CLEF2015, 8-11 September, Toulouse, France. [18] Zager, L., 2005. Graph similarity and matching (Doctoral dissertation, Massachusetts Institute of Technology). [7] Kumar, N. 2014.A Graph Based Automatic Plagiarism Detection Technique to Handle Artificial Word Reordering [19] Zini ,M. 2006 Plagiarism Detection through Multilevel Text and Paraphrasing, Computational Linguistics and Intelligent Comparison, In Automated Production of Cross Media Text Processing, pp. 481--494. Content for Multi-Channel Distribution,Second International Conference. [8] Leacock, C., Miller, G.A. and Chodorow, M., 1998. Using corpus statistics and WordNet relations for sense [20] Zini, M., Fabbri, M., Moneglia, M., and Panunzi. 2006. identification. Computational Linguistics, 24(1), pp.147-165. Alessandro, Plagiarism detection through multilevel text comparison, In Second International Conference, IEEE. [9] Leilei, K., Haoliang, Q., Shuai, W., Cuixia, D., Suhong, W., and Yong, H. 2012. Approaches for candidate document retrieval and detailed comparison of plagiarism detection, in Notebook for PAN at CLEF 2012. [10] [Online]. Available: hazm package, http://www.sobhe.ir/hazm. [Accessed 2015-04-30]. [11] [Online]. Available: igraph package, http://igraph.org/python/. [Accessed 2015-03-15]. [12] Potthast, M and Hagen, M ., Gollub, T., Tippmann, M., Kiesel, J., Rosso, P., Stamatatos, E., and Stein, B. 2013.