Evaluation of Writeprints Technique for Authorship Recognition in Adversarial Settings

Sadia Afroz Department of Computer Science Drexel University Philadelphia, PA 19104 [email protected]

Abstract Authorship recognition is used to identify authors of written documents using stylistic features. With the increasing use of authorship recognition techniques, it is necessary to consider security aspect of these methods to understand the security threats of these methods. In this project we implemented a highly accurate authorship recognition method, WritePrint, to evaluate it against two simple adversarial attacks- obfuscation attack where author deliberately hides his writing style and imitation attack where author imitates other authors. Results shows that writeprint method which is highly accurate in authorship attribution fails in these simple attacks.

1

Introduction

Authorship recognition is a process of categorizing articles by authors’ writing style. In stylometry only textual elements of a written documents are considered, not the handwriting or paper used or any other physical materials are considered. Recognizing authors based on only written documents are necessary in many cases, for example in resolving issues of disputed authorship (e.g. the Federalist papers, Shakespeare’s plays), in detecting plagiarism and authorship of computer viruses, in forensic setting, criminal investigations, e.g. to detect genuine confessions, suicide notes. Stylistic features revealed in the written documents are often sufficient to distinguish an author from other authors. One argument supporting this theory is, as Patrick Juola [5] said, that as each person learns language by themselves, each learns language slightly differently than others and each person develops a unique distinct style of communicating with others based on how he learned language. By recognizing this unique style it is possible to identify authors. This is why many researchers compared author’s writing style with fingerprints as like fingerprints it can be used to identify authors. Authorship recognition methods have been used in forensic settings to identify criminal investigations and confessions. To use it more successfully and indubiously, it is necessary to consider security threats like deception and privacy attacks against these methods. What if an author, aware of his writing style, deliberately hides it or imitate other author’s writing style to frame him, how hard or easy it is for the authorship recognizers to identify authors in those cases. Previous researches showed that although many stylometric approaches are available for identifying authors of unknown documents, most of them are vulnerable against simple adversarial attacks [2]. There are also many cases where innocent users need anonymity and privacy to be able to share information freely and safely in online communities or public forums. Many users use anonymity softwares and proxy setting to hide their location indicators, disable browser plugins and scripting to hide their system configuration but almost no one consider about their writing style which along can reveal their identity. How to hide stylistic features and how much changes are needed to obfuscate an authorship recognizer are another important research aspect in this area. 1

Many machine learning approaches have been developed to recognize author’s writing style. Writeprints[1] is one of the methods that has been proved to be superior than others because of its ability to categorize large corpus of writings from many different authors in many different contexts including online chat messages, ebay comments, email messages. It is an unsupervised method that can be used for both authorship recognition of known authors and similarity detection among unknown authored documents. This approach is significant in the field of stylometry because of its use of individual author-level feature sets and pattern disruption and also because of its high accuracy in authorship recognition. Goal of this project is to evaluate the Writeprints technique in cases of adversarial attacks including obfuscation attacks, where an author attempts to hide his identity and imitation attacks, where an author attempts to frame another subject by imitating his writing style.

2

Related Works

Few recent researches had been looked into adversarial attacks in authorship recognition. Brennan et al [2] analyzed three widely used authorship recognition methods: statistical approach, neural network and synonym based approach and proved that machine learning methods in this sector are vulnerable to adversarial attacks. Their research showed that obfuscation attack can reduce the effectiveness of author recognition to the level of random guessing and imitation attack can succeed with 68-91% probability. Kacmarcik, G. et al [4] performed various analysis of linguistic features used in authorship recognition to understand the type and number of changes necessary to obfuscate the authorship information from a document. They used decision tree to select feature with highest information gain, removed occurrences of that feature from the written documents and used SVM to classify the modified documents. They showed that only 14 changes per 1000 words could reduce the chances of identifying the true author by 83%. J. R. Rao and P. Rohatgi [3] showed that simple automated task like round trip translation (English− >other language− >English) can obscure original authors style. Writeprints techniques differs from the common authorship recognition methods in two ways: use of individual author level feature sets instead of same features for all authors and use of pattern disruption to model zero frequency features. It would be interesting to see the impact of these features in authorship recognition against adversarial attacks.

3

Approach

The design of Writeprints Technique for authorship recognition has three steps, feature extraction, classifier construction and author identification. 3.1

Feature Extraction

Various features are extracted from the written documents of individual authors to construct the individual author-level feature sets. This feature set contains lexical, syntactic, structural, content specific features. Lexical features include total words, number of character per words, total characters, number of characters per message, count of letters, word length distributions. Syntactic features includes frequency of function words, occurrence of punctuation. Structural features include number of paragraphs, paragraph lengths. Content specific features include individual words, word bigrams . Feature list is given in table 1. Total number of features was around 1500. 3.2

Classifier Construction

The Writeprints technique constructs a single classifier using the individual author-level feature sets. The method has two major parts: creation and pattern disruption. The creation part is concerned with the steps relating to the construction of patterns reflective of an author’s writing-style variation. The pattern disruption part describes how zero usage features can be used to decrease the level of stylistic similarity between two separate authors. 2

Group Lexical Lexical Lexical Lexical Lexical Lexical Lexical Lexical Syntactic Syntactic Syntactic Content

Category Word level Character level Special Character Letters Character bigram Word length Vocabulary Richness Readability Function Words POS tags Punctuation Words

Table 1: Feature Set Used Description Total words, frequency of large words,unique words Total characters, character frequency, Occurence of special characters Letter frequency Percentage of common bigrams Percentage word length choice of special words Readability frequency of function words Frequency of Parts of speech tag Frequency and percentage of colon, comma Bag of word

The overall approach (shown in figure 1) of classifier construction is described below:

Figure 1: Overall Writeprints Classifier Construction Approach, as described in [1]

1. For all identity features with occurrence frequency> 0. (a) Extract feature vectors for each sliding window instance. (b) Derive basis matrix (set of eigenvectors) from feature usage covariance matrix using Karhunen-Loeve transforms. (c) Compute window instance coordinates (principal components) by multiplying window feature vectors with basis. Window instance points in n dimensional space represent author Writeprint pattern. 2. For all author features with occurrence frequency = 0. (a) Compute feature disruption value as product of information gain, synonymy usage, and disruption constant K. (b) Append features disruption values to basis matrix. (c) Apply disruptor based on pattern orientations. 3. Repeat steps 1-2 for each identity. 3.3

Writeprint creation

For each author, a writeprint is created to model individual author level features. Karhunen-Loeve transform has been used to create writeprint. After extracting features from an author’s documents, eigenvector of the covariance of feature vector is calculated which is called Basis Matrix. Basis 3

matrix is then multiplied with the feature vector to project each document in n-dimensional space. Author’s writeprint is consist of all the document’s instance points in n-dimentional space. 3.4

Pattern disruption

When comparing one authors A with other authors, author A’s zero frequency features are important to distinguish author A from other authors who use those features. These zero frequency features are called “pattern disruptors”. To increase distance between two authors’ writeprint in n-dimensional space, pattern disruptors are appended to the author’s bass matrix. Value of the pattern disruptors are computed using following equation: dp = IG(c, p) ∗ K ∗ (syntotal + 1)(synused + 1)

(1)

where, dp = pattern disruption value for feature p IG(c,p) = Information gain of feature p across all the classes c K = disruption constant = 2 syntotal = total number of synonyms of p, if p is a word feature synused = total number of synonyms of p used by the author, if p is a word feature

3.5

Identification and Similarity Detection

To compare two authors A and B’s writing style, we need to construct a pattern for identity B using Bs text with As feature set and basis matrix (Pattern B) and vice versa. The overall similarity between identities A and B is the sum of the average n-dimensional Euclidean distance between Writeprint A and pattern B and Writeprint B and pattern A (Figure 2).

Figure 2: Similarity detection between author A and author B [1]

4

Evaluation

The Writeprints method will be evaluated for the following tasks. 1. Identification and similarity detection: Identify authors in documents written in their regular writing style. 2. Identification in imitation attack: Identify authors in documents where they imitated other authors. 3. Identification in obfuscation attack: Identify authors in documents where they deliberately hided their writing style. For all three tasks, classification accuracy and false positive rate will be calculated.

5

Data Collection

Dataset used for Brennan, M. et al work [3] will be used for this project. The dataset includes regular writing as well as imitated writing and obfuscated writing samples of 13 participants . The corpus 4

has at least eight sample documents per participants, each of the documents consists of at least 500 words. All documents in this corpus are written in English with few/no foreign words. This project was initiated as a class project so all the participents are college level students who are also native English speakers. Contexts of these sample documents are varied from software specification to resume cover letters, description of neighborhood or college level writing assignments. Participents were told to provide any writing samples of their choice, no restrictions (except the word limit) were given. In the imitated writing, participants imitated the writing style of Cormac McCarthy in describing their neighborhood. Cormac McCarthy was chosen for his distinctive expressive writing style. In the obfuscation task, participants are instructed to obfuscate their writing style by dumbing their writing style using shorter, less descriptive words.

6

Experimental Setup

For the identification task, each authors text was split into two identities: one known and one anonymous identity. Writeprint method was trained using known identities and tested on anonymous identity. All authors sample set was tested on five fold cross-validation by by splitting author’s sample documents into 5 different sets, each contains 4 documents for known entity and 4 documents for anonymous identity. For example, in fold 1, documents 1- 4 are used for the known entity and documents 4-7 are for the anonymous identity; in fold 2, in parts 2 - 5 are used for the known entity while parts 1 and 6 - 8, are for the anonymous identity. The overall accuracy is then computed by taking the average classification accuracy across all 5 folds of where the classification accuracy is computed as follows. Classif ication Accuracy =

N umber of correctly classif ied total number of identities

(2)

7

Results and Discussion

Writeprint worked well on our data set giving on average 79.99% accuracy with highest accuracy of 92.3% for 13 authors 3. The original writeprint method has slightly better accuracy than our method, the reason for that could be the choice of feature sets and number of features chosen. In original case there were over 5000 features considered but in this project only about 1500 features are considered. 100
 90
 80
 70
 60


Imita3on


50


Obfusca3on


40


No
a
30
 20
 10
 0
 set1


set2


set3


set4


set5


Figure 3: Accuracy in regular and adversarial settings Writeprint method failed to recognize authors in adversarial cases. For both obfuscation and imitation attack its accuracy dropped to almost 0% 3. This result is expected in a sense that writeprint 5

method depends on authors stylislic features to identify authors. In obfuscation and imitation tasks authors tried to hide their writing style, so it is hard for writeprint methods to identify documents based on features gathered from previous samples.

8

Conclusion and Future works

In this project we evaluated Writeprint authorship recognition method which has been highly accurate to identify many authors from varied contexts. Evaluation of the writeprint method showed that it is hard to recognize author’s written text when author is trying to hide it. By adding more author level features, accuracy in those cases might be possible to improve. An interesting research question in this sector would be to determine contribution of each feature on authorship identification and identify key features which need to be removed to anonymize a document. Future works should also incorporated the determination of features which are harder or easier than other features to hide writing style. Authorship recognition in adversarial settings is a challenging research field which need to be explored further to answer these open questions. Acknowledgments This work is an extension of Brennan et al research “Practical Attacks Against Authorship Recognition Techniques” [2]. References [1] Abbasi, A. & Chen, H. (2008) Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace. ACM Trans. Inf. Syst. 26, 2 (Mar. 2008), 1-29. [2] Brennan, M., & Greenstadt, R. (2009) Practical Attacks Against Authorship Recognition Techniques. Innovative Applications of Artificial Intelligence, North America, apr. 2009. [3] Josyula R. Rao and Pankaj Rohatgi. Can pseudonymity really guarantee privacy? In SSYM00: Proceedings of the 9th conference on USENIX Security Symposium, Berkeley, CA, USA, 2000. USENIX Association. [4]Kacmarcik, G., and Gamon, M. 2000. Obfuscating document stylometry to preserve author anonymity. Proceedings of the 9th USENIX Security Symposium 9:77. [5] Patrick Juola. Authorship attribution. Foundations and Trends in information Retrieval, 1(3):233334, 2008.

6

Evaluation of Writeprints Technique for Authorship Recognition in ...

authorship recognition method, WritePrint, to evaluate it against two simple ad- versarial attacks- obfuscation attack .... Frequency of Parts of speech tag. Syntactic. Punctuation. Frequency and ... (c) Compute window instance coordinates (principal components) by multiplying win- dow feature vectors with basis. Window ...

463KB Sizes 0 Downloads 214 Views

Recommend Documents

FOUR SUTURE TECHNIQUE FOR EVALUATION OF TIP ...
FOUR SUTURE TECHNIQUE FOR EVALUATION OF TIP DYNAMICS IN RHINOPLASTY.pdf. FOUR SUTURE TECHNIQUE FOR EVALUATION OF TIP ...

Water Bath Evaluation Technique for Emergency Ultrasound of Painful ...
Researchers have described the use of bedside emergency ultrasound as an effective way to evaluate for and accurately drain potential ab- scesses. Similarly ...

Performance Evaluation of OFDM Technique for High ...
PRS. Phase reference symbol for DAB. PBCC. Packet Binary Convolutional Coding. PHY. Physical Layer. QAM. Quadrature Amplitude Modulation. QoS.

Preliminary evaluation of speech/sound recognition for ...
application in a real environment. Michel Vacher1, Anthony Fleury2, Jean-François Serignat1, Norbert Noury2, Hubert Glasson1. 1Laboratory LIG, UMR ...

Authorization of Face Recognition Technique Based On Eigen ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, ..... computationally expensive but require a high degree of correlation between the ...

Authorization of Face Recognition Technique Based On Eigen ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, ..... computationally expensive but require a high degree of correlation between the ...

Robust Speech Recognition in Noise: An Evaluation ...
CSLR: Center for Spoken Language Research; Robust Speech Processing Laboratory ... parallel banks of speech recognizers can improve recognition.

Automatic Motion Recognition and Skill Evaluation for ...
2 Johns Hopkins Medical Institutions, Cardiac Surgery, 600 N. Wolfe Street, ... using hidden Markov models (HMMs) to recognize motions performed in a vir- ... to develop meaningful and objective metrics for skill, but in many applications the.

The-Professions-Of-Authorship-Essays-In-Honor-Of-Matthew-J ...
The-Professions-Of-Authorship-Essays-In-Honor-Of-Matthew-J-Bruccoli.pdf. The-Professions-Of-Authorship-Essays-In-Honor-Of-Matthew-J-Bruccoli.pdf. Open.

Authorship of new names proposed in papers by ... - Indian Birds
Indian BIRDS 6 (6): 158–161. Aasheesh Pittie, B-4 ... 14, Banjara Hills, Hyderabad 500034, India. ..... ate. V ol.: p. New name. Text entry. V ol.: p. Author(s) p. Author(s) p. Author(s). 1. 5.2.3 ..... While processing the data for publication, I

program evaluation and review technique pert pdf
technique pert pdf. Download now. Click here if your download doesn't start automatically. Page 1 of 1. program evaluation and review technique pert pdf.

Attributing Authorship of Revisioned Content
transposed from one location to another, or from one file to another — changes ..... A1 in presence of a delete-and-restore attack, as common on. Wikipedia, and of a ..... rithm may have been inactive at times (due to system main- tenance), or ...

program evaluation and review technique pert pdf
technique pert pdf. Download now. Click here if your download doesn't start automatically. Page 1 of 1. program evaluation and review technique pert pdf.

A System for Recognition of Biological Patterns in ...
A System for Recognition of Biological Patterns in Toxins Using. Computational Intelligence. Bernardo Penna Resende de Carvalho, Thais Melo Mendes, Ricardo de Souza Ribeiro,. Ricardo Fortuna, José Marcos Veneroso and Maurıcio de Alvarenga Mudado. A

Authorship in Global Mental Health Research - Sujen Man Maharjan
residents in the Torres Strait or Java in the analysis and dissemination of ..... applicable, especially if the software is open source and can be used by others. ... data analysis programs have functions to do this, and figures can be created ...

Mind your corpus: systematic errors in authorship ...
The goal of the third experiment was to test how much 'authorial' data a given text needs to ... timent analysis, translation studies, assessing stylis- tic changes ...

Evaluation of Vocabulary Trees for Localization in ...
to build a vocabulary and to index images, which means a query image is represented by a vector. In addition, we consider memory occupancy. We use ukbench[3] for the dataset and oxford5k[7] for vocabulary learning. These are the most popular datasets

BINAURAL PROCESSING FOR ROBUST RECOGNITION OF ...
ing techniques mentioned above, this leads to significant im- provements in binaural speech recognition. Index Terms—. Binaural speech, auditory processing, ...

Authorship in Global Mental Health Research - Sujen Man Maharjan
themes (qualitative paper). Proposed univariate and bivariate tests: independent and dependent variables, test type (quantitative);. Proposed themes for coding.

A Novel Technique A Novel Technique for High ...
data or information within the cover media such that it does not draw the diligence of an unsanctioned persons. Before the wireless communication data security was found. Processing and transmission of multimedia content over insecure network gives s

Mind your corpus: systematic errors in authorship ...
can be extracted from a population that seems to contain nothing but noise. However, it does not mean that one can overcome the impact of randomness: noise ...

Free Visual Authorship Creativity and Intentionality in ...
Money Marketing and Success Principles for Skin Care Accessories On-line Businesses 3. Course Pack Handle Proxy - Linkstorm S Handle System Proxy Server. The web form below will enable you to resolve individual handles and view their associated value