{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T15:14:58Z","timestamp":1726413298927},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,5,12]],"date-time":"2022-05-12T00:00:00Z","timestamp":1652313600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,5,12]],"date-time":"2022-05-12T00:00:00Z","timestamp":1652313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Data Min Knowl Disc"],"published-print":{"date-parts":[[2022,7]]},"abstract":"Abstract<\/jats:title>Plagiarism<\/jats:italic> is a controversial and debated topic in different fields, especially in the Music<\/jats:italic> one, where the commercial market generates a huge amount of money. The lack of objective metrics to decide whether a song is a plagiarism, makes music plagiarism detection a very complex task: often decisions have to be based on subjective argumentations. Automated music analysis methods that identify music similarities can be of help. In this work, we first propose two novel such methods: a text similarity-based<\/jats:italic> method and a clustering-based<\/jats:italic> method. Then, we show how to combine them to get an improved (hybrid) method. The result is a novel adaptive meta-heuristic<\/jats:italic> for music plagiarism detection. To assess the effectiveness of the proposed methods, considered both singularly and in the combined meta-heuristic, we performed tests on a large dataset of ascertained plagiarism and non-plagiarism cases. Results show that the meta-heuristic outperforms existing methods. Finally, we deployed the meta-heuristic into a tool<\/jats:italic>, accessible as a Web application, and assessed the effectiveness, usefulness, and overall user acceptance of the tool by means of a study involving 20 people, divided into two groups, one of which with access to the tool. The study consisted in having people decide which pair of songs, in a predefined set of pairs, should be considered plagiarisms and which not. The study shows that the group supported by our tool successfully identified all plagiarism cases, performing all tasks with no errors. The whole sample agreed about the usefulness of an automatic tool that provides a measure of similarity between two songs.<\/jats:p>","DOI":"10.1007\/s10618-022-00835-2","type":"journal-article","created":{"date-parts":[[2022,5,12]],"date-time":"2022-05-12T12:06:05Z","timestamp":1652357165000},"page":"1301-1334","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["An adaptive meta-heuristic for music plagiarism detection based on text similarity and clustering"],"prefix":"10.1007","volume":"36","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-2693-0196","authenticated-orcid":false,"given":"Delfina","family":"Malandrino","sequence":"first","affiliation":[]},{"given":"Roberto","family":"De Prisco","sequence":"additional","affiliation":[]},{"given":"Mario","family":"Ianulardo","sequence":"additional","affiliation":[]},{"given":"Rocco","family":"Zaccagnino","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,12]]},"reference":[{"key":"835_CR1","doi-asserted-by":"crossref","unstructured":"Al-Musawi M, Ledesma A, Nieminen H, Korhonen I (2016) Implementation and user testing of a system for visualizing continuous health data and events. In: 2016 IEEE-EMBS international conference on biomedical and health informatics (BHI), pp 156\u2013159","DOI":"10.1109\/BHI.2016.7455858"},{"issue":"1","key":"835_CR2","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1080\/13600869.2012.646786","volume":"26","author":"RJ Cason","year":"2012","unstructured":"Cason RJ, M\u00fcllensiefen D (2012) Singing from the same sheet: computational melodic similarity measurement and copyright law. Int Rev Law Comput Technol 26(1):25\u201336","journal-title":"Int Rev Law Comput Technol"},{"key":"835_CR3","first-page":"71","volume":"11","author":"T Crawford","year":"1998","unstructured":"Crawford T, Iliopoulos CS, Raman R (1998) String-matching techniques for musical similarity and melodic recognition. Comput Musicol 11:71\u2013100","journal-title":"Comput Musicol"},{"issue":"3","key":"835_CR4","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/BF02310555","volume":"16","author":"LJ Cronbach","year":"1951","unstructured":"Cronbach LJ (1951) Coefficient alpha and the internal structure of tests. Psychometrika 16(3):297\u2013334","journal-title":"Psychometrika"},{"issue":"3","key":"835_CR5","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"FD Davis","year":"1989","unstructured":"Davis FD (1989) Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q 13(3):319\u2013340","journal-title":"MIS Q"},{"key":"835_CR6","doi-asserted-by":"crossref","unstructured":"De\u00a0Prisco R, Lettieri N, Malandrino D, Pirozzi D, Zaccagnino G, Zaccagnino R (2016) Visualization of music plagiarism: analysis and evaluation. In: 20th international conference information visualisation, IV 2016, Lisbon, Portugal, July 19\u201322, 2016, pp 177\u2013182","DOI":"10.1109\/IV.2016.56"},{"key":"835_CR7","doi-asserted-by":"crossref","unstructured":"De\u00a0Prisco R, Esposito A, Lettieri N, Malandrino D, Pirozzi D, Zaccagnino G, Zaccagnino R (2017a) Music plagiarism at a glance: metrics of similarity and visualizations. In: 2017 21st international conference information visualisation (IV). IEEE, pp 410\u2013415","DOI":"10.1109\/iV.2017.49"},{"issue":"2","key":"835_CR8","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1177\/1473871616655468","volume":"16","author":"R De Prisco","year":"2017","unstructured":"De Prisco R, Malandrino D, Pirozzi D, Zaccagnino G, Zaccagnino R (2017) Understanding the structure of musical compositions: is visualization an effective approach? Inf Vis 16(2):139\u2013152","journal-title":"Inf Vis"},{"key":"835_CR9","doi-asserted-by":"crossref","unstructured":"De\u00a0Prisco R, Malandrino D, Zaccagnino G, Zaccagnino R (2017c) Fuzzy vectorial-based similarity detection of music plagiarism. In: 2017 IEEE international conference on fuzzy systems (FUZZ-IEEE). IEEE, pp 1\u20136","DOI":"10.1109\/FUZZ-IEEE.2017.8015655"},{"key":"835_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.114951","volume":"177","author":"R De Prisco","year":"2021","unstructured":"De Prisco R, Guarino A, Lettieri N, Malandrino D, Zaccagnino R (2021) Providing music service in ambient intelligence: experiments with gym users. Expert Syst Appl 177:114951","journal-title":"Expert Syst Appl"},{"key":"835_CR11","unstructured":"Downie JS (1999) Evaluating a simple approach to music information retrieval: conceiving melodic n-grams as text"},{"key":"835_CR12","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.jvlc.2017.11.002","volume":"44","author":"U Erra","year":"2018","unstructured":"Erra U, Malandrino D, Pepe L (2018) A methodological evaluation of natural user interfaces for immersive 3d graph explorations. J Vis Lang Comput 44:13\u201327","journal-title":"J Vis Lang Comput"},{"key":"835_CR13","unstructured":"Flexer A (2014) On inter-rater agreement in audio music similarity. In: ISMIR, Citeseer, pp 245\u2013250"},{"issue":"3","key":"835_CR14","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1080\/09298215.2016.1200631","volume":"45","author":"A Flexer","year":"2016","unstructured":"Flexer A, Grill T (2016) The problem of limited inter-rater agreement in modelling music similarity. J New Music Res 45(3):239\u2013251","journal-title":"J New Music Res"},{"key":"835_CR15","unstructured":"Flexer A, Lallai T (2019) Can we increase inter-and intra-rater agreement in modeling general music similarity?. In: ISMIR, pp 494\u2013500"},{"issue":"13","key":"835_CR16","first-page":"13","volume":"68","author":"WH Gomaa","year":"2013","unstructured":"Gomaa WH, Fahmy AA et al (2013) A survey of text similarity approaches. Int J Comput Appl 68(13):13\u201318","journal-title":"Int J Comput Appl"},{"issue":"1","key":"835_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0010-0277(02)00184-1","volume":"87","author":"U Hahn","year":"2003","unstructured":"Hahn U, Chater N, Richardson LB (2003) Similarity as transformation. Cognition 87(1):1\u201332","journal-title":"Cognition"},{"key":"835_CR18","volume-title":"Construction and assessment of classification rules","author":"DJ Hand","year":"1997","unstructured":"Hand DJ et al (1997) Construction and assessment of classification rules. Wiley, Hoboken"},{"key":"835_CR19","unstructured":"Hussain SAA, Moosavinasab S, Sezgin E, Huang Y, Lin SM (2018) Char2vec: learning the semantic embedding of rare and unseen words in the biomedical literature. In: AMIA"},{"key":"835_CR20","volume-title":"Psychometric theory","author":"C Jum","year":"1994","unstructured":"Jum C, Nunnally IHB (1994) Psychometric theory. McGraw-Hill, New York"},{"key":"835_CR21","volume-title":"Research methods in human-computer interaction","author":"J Lazar","year":"2017","unstructured":"Lazar J, Feng JH, Hochheiser H (2017) Research methods in human-computer interaction. Morgan Kaufmann, Burlington"},{"key":"835_CR22","doi-asserted-by":"crossref","unstructured":"Leon P, Ur B, Shay R, Wang Y, Balebako R, Cranor L (2012) Why Johnny can\u2019t opt out: a usability evaluation of tools to limit online behavioral advertising. In: Proceedings of the SIGCHI conference on human factors in computing systems, pp 589\u2013598","DOI":"10.1145\/2207676.2207759"},{"issue":"3","key":"835_CR23","first-page":"161","volume":"24","author":"M Mongeaul","year":"1990","unstructured":"Mongeaul M, Sankoff D (1990) Comparison of musical sequences. Comput Humanit 24(3):161\u2013175","journal-title":"Comparison of musical sequences. Comput Humanit"},{"key":"835_CR24","doi-asserted-by":"crossref","unstructured":"M\u00fcllensiefen D, Pendzich M (2009) Court decisions on music plagiarism and the predictive value of similarity algorithms. Musicae Scientiae 13(1-suppl):257\u2013295","DOI":"10.1177\/102986490901300111"},{"key":"835_CR25","unstructured":"M\u00fcllensiefen D, Frieler K et\u00a0al (2004) Cognitive adequacy in the measurement of melodic similarity: algorithmic vs. human judgments. Comput Musicol 13(2003):147\u2013176"},{"key":"835_CR26","first-page":"65","volume":"11","author":"D \u00d3\u2019Maidin","year":"1998","unstructured":"\u00d3\u2019Maidin D (1998) A geometrical algorithm for melodic difference in melodic similarity. Melodic Similarity Concepts Proced Appl Comput Musicol 11:65\u201372","journal-title":"Melodic Similarity Concepts Proced Appl Comput Musicol"},{"key":"835_CR27","unstructured":"Park S, Kwon T, Lee J, Kim J, Nam J (2019) A cross-scape plot representation for visualizing symbolic melodic similarity. In: ISMIR, pp 423\u2013430"},{"key":"835_CR28","unstructured":"Robine M, Hanna P, Ferraro P, Allali J (2007) Adaptation of string matching algorithms for identification of near-duplicate music documents. In: Workshop on plagiarism analysis, authorship identification, and near-duplicate detection (PAN07), pp 37\u201343"},{"key":"835_CR29","doi-asserted-by":"crossref","unstructured":"Sculley D (2010) Web-scale k-means clustering. In: Proceedings of the 19th international conference on World wide web, pp 1177\u20131178","DOI":"10.1145\/1772690.1772862"},{"issue":"3\/4","key":"835_CR30","doi-asserted-by":"publisher","first-page":"591","DOI":"10.2307\/2333709","volume":"52","author":"SS Shapiro","year":"1965","unstructured":"Shapiro SS, Wilk MB (1965) An analysis of variance test for normality (complete samples). Biometrika 52(3\/4):591\u2013611","journal-title":"Biometrika"},{"issue":"4","key":"835_CR31","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/BF02288967","volume":"22","author":"RN Shepard","year":"1957","unstructured":"Shepard RN (1957) Stimulus and response generalization: a stochastic model relating generalization to distance in psychological space. Psychometrika 22(4):325\u2013345","journal-title":"Psychometrika"},{"issue":"4","key":"835_CR32","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1037\/0033-295X.84.4.327","volume":"84","author":"A Tversky","year":"1977","unstructured":"Tversky A (1977) Features of similarity. Psychol Rev 84(4):327","journal-title":"Psychol Rev"},{"key":"835_CR33","doi-asserted-by":"crossref","unstructured":"Typke R, Wiering F, Veltkamp RC (2007) Transportation distances and human perception of melodic similarity. Musicae Scientiae 11(1-suppl):153\u2013181","DOI":"10.1177\/102986490701100107"},{"key":"835_CR34","unstructured":"Uitdenbogerd AL (2002) Music information retrieval technology. Ph.D. thesis, RMIT University Melbourne Victoria, Australia"},{"key":"835_CR35","doi-asserted-by":"crossref","unstructured":"Wang S, Song J, Guo R (2018) Char-level neural network for network anomaly behavior detection. In: International conference on human centered computing. Springer, pp 60\u201368","DOI":"10.1007\/978-3-030-15127-0_6"},{"key":"835_CR36","unstructured":"Wolf A, M\u00fcllensiefen D (2011) The perception of similarity in court cases of melodic plagiarism and a review of measures of melodic similarity. In: Int. conf. of students of sustematic musicology, 2011, Citeseer"},{"issue":"3","key":"835_CR37","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1109\/TNN.2005.845141","volume":"16","author":"R Xu","year":"2005","unstructured":"Xu R, Wunsch D (2005) Survey of clustering algorithms. IEEE Trans Neural Netw 16(3):645\u2013678","journal-title":"IEEE Trans Neural Netw"},{"key":"835_CR38","doi-asserted-by":"crossref","unstructured":"Yuan Y, Oishi S, Cronin C, M\u00fcllensiefen D, Atkinson Q, Fujii S, Savage PE (2020) Perceptual vs. automated judgments of music copyright infringement","DOI":"10.31234\/osf.io\/tq7v5"},{"issue":"2","key":"835_CR39","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1145\/235968.233324","volume":"25","author":"T Zhang","year":"1996","unstructured":"Zhang T, Ramakrishnan R, Livny M (1996) Birch: an efficient data clustering method for very large databases. ACM Sigmod Record 25(2):103\u2013114","journal-title":"ACM Sigmod Record"}],"container-title":["Data Mining and Knowledge Discovery"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-022-00835-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10618-022-00835-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-022-00835-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,2]],"date-time":"2022-10-02T01:07:09Z","timestamp":1664672829000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10618-022-00835-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,12]]},"references-count":39,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["835"],"URL":"https:\/\/doi.org\/10.1007\/s10618-022-00835-2","relation":{},"ISSN":["1384-5810","1573-756X"],"issn-type":[{"type":"print","value":"1384-5810"},{"type":"electronic","value":"1573-756X"}],"subject":[],"published":{"date-parts":[[2022,5,12]]},"assertion":[{"value":"14 August 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 April 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 May 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 September 2022","order":4,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Update","order":5,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Missing Open Access funding information has been added in the Funding Note","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there is no conflict of interest regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}}]}}