Logo
Sign in
Product Logo
Turnitin SimilarityTurnitin

Prevent plagiarism to protect institutional reputation and promote original writing.

Product details

Comprehensive plagiarism detection with

Turnitin Similarity

Protect against plagiarism and student collusion to safeguard your institution’s reputation and teach the value of original writing.

Unlock the benefits of Turnitin Similarity

Protect your reputation

Avoid the lasting damage of academic misconduct and uphold academic standards by identifying when likely instances of plagiarism are present in student writing.

Safeguard academic integrity

Transform plagiarism into a teachable moment by guiding students on how to maintain originality, helping them understand the ethical use of sources.

Streamline your institutional workflows

Boost productivity by adopting a solution that integrates effortlessly into your institution’s existing workflows, reducing administrative burdens and enhancing the overall educational experience.

How Turnitin Similarity upholds academic integrity in every assignment

Comprehensive database

Assess originality with the Similarity Report, which compares student work against a vast collection of student submissions, premium publications, and 20+ years of internet content—all in an intuitive, integrated interface.

Enhanced Similarity Report

View an assignment’s similarity score and get color-coded results and side-by-side comparisons to sources. Plus, exclude any unnecessary matches to further refine the report.

Similarity flags panel

Go deeper into a document to assess whether a student has made text modifications such as white text, inserted characters, and character swapping to circumvent plagiarism checks.

Seamless integration

Turnitin Similarity integrates with all the top learning management systems, collaboration tools, and single-sign-on services.

Choose the Turnitin Similarity features that work for you

Core features

  • Enhanced Similarity Report with Match Group categorization* for clearer organization of matches and quicker interpretation of results
  • Flags Panel highlighting potentially manipulated text such as replaced or hidden characters.
  • Compare work against an unparalleled repository of student papers, current and archived web pages, and premium subscription articles from top publishers across 170 languages
  • Formative resubmissions via LMS
  • Exclude templates (e.g, a cover sheet or instructions, questions, and tables in an assignment) from the Similarity Report via LTI integration

Add-ons

  • Turnitin Originality: AI writing and AI paraphrasing detection, insights into contract cheating, ProQuest Theses and Dissertations database access *Feature available in English only

Who Turnitin Similarity supports

Students

Help students understand similarities between their work and existing sources, providing an opportunity to correct integrity issues such as citation or paraphrasing errors and improve the originality of their work before final submission.

Instructors

Compare student work against an unparalleled content database, using the Similarity Report to review and filter matches and flag attempts to bypass similarity checks. Guide students toward better research and writing practices and turn plagiarism into a teachable moment.

Administrators

Equip instructors to identify potential plagiarism at scale as part of their existing workflow. Promote a culture of academic integrity and mitigate the risk of reputational damage from undetected cases of plagiarism and student collusion.

Seamless integration with your institution’s ecosystem

Turnitin Similarity can be used through the web, integrated natively or via API and LTI 1.3 into most popular Learning Management Systems. This includes D2L, Canvas, Microsoft Teams, Moodle, Sakai, and others, fitting seamlessly into student, instructor, and administrator workflows. Turnitin vigorously protects your personal data and works hard to achieve extremely high levels of security, including GDPR compliance. Data is stored with robust physical, digital, and procedural safeguards in place, including the use of SSL encryption, redundant servers, and SOC2-certified data centers.