Skip to main content

Email Authorship Attribution

  • Conference paper
  • First Online:
Innovations in Electronics and Communication Engineering

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 65))

Abstract

Email correspondence is regularly manhandled for directing social designing assaults including spamming, phishing, data fraud, and circulating malware. This is to a great extent credited to the issue of obscurity intrinsic. Finding the authorship of email which can be stated as attribution problem is contemplated as content classification issue where the styles of writing of people are displayed in view of their already composed documents. In this paper, Multiple Association Rules for Authorship Attribution (CMARAA) is proposed to solve the problem of authorship attribution. The proposed method makes the remarkable composition style of features of a person. The experimental evaluation shows that CMARAA classifies with 92% of accuracy being the most accurate algorithm when compared to other classification algorithms for different combinations of authors.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Casey E (2010) Handbook of digital forensics and investigation. Elsevier

    Google Scholar 

  2. de Vel O (2000) Mining e-mail authorship. KDD workshop on text mining

    Google Scholar 

  3. Iqbal F, Khan LA, Fung BCM, Debbabi M (2010) E-mail authorship verification for forensic investigation. In: Proceedings of the 25th ACM SIGAPP symposium on applied computing (SAC), ACM Press

    Google Scholar 

  4. Koppel M, Schler J, Argamon S, Messeri E (2006) Authorship attribution with thousands of candidate authors. In: Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval

    Google Scholar 

  5. Stamatatos E (2009) A survey of modern authorship attribution methods. J Am Soc Inf Sci Technol (JASIST)

    Google Scholar 

  6. Grieve J (2007) Quantitative authorship attribution: an evaluation of techniques. Lit Linguist Comput

    Google Scholar 

  7. Abbasi A, Chen H (2008) Writeprints: a stylometric approach to identity-level identification and similarity detection in cyberspace. ACM Trans Inf Syst 26(2):7

    Article  Google Scholar 

  8. Mendenhall TC (1887) The characteristic curves of composition. JSTOR

    Google Scholar 

  9. de Vel O, Anderson A, Corney M, Mohay G (2001) Multi-topic e-mail authorship attribution forensics. In: Proceedings of ACM conference on computer security e workshop on data mining for security

    Google Scholar 

  10. de Vel O, Anderson A, Corney M, Mohay G (2001) Mining e-mail content for author identification forensics. SIGMOD

    Google Scholar 

  11. Ledger GR, Merriam TVN (1994) Shakespeare, fletcher, and the two noble kinsmen. Lit Linguist Comput

    Google Scholar 

  12. Iqbal F, Binsalleeh H, Fung BCM, Debbabi M (2010) Mining writeprints from anonymous e-mails for forensic investigation. Digit Investing

    Google Scholar 

  13. Iqbal F, Binsalleeh H, Fung BCM, Debbabi M (2013) A unified data mining solution for authorship analysis in anonymous textual communications. Inf Sci Special Issue Data Min Inf Secure

    Google Scholar 

  14. Teng G, Lai M, Ma J, Li Y (2004) E-mail authorship mining based on SVM for computer forensic. In: Proceedings of the 3rd international conference on machine learning and cyhemetics

    Google Scholar 

  15. Corney M, de Vel O, Anderson A, Mohay G (2002) Gender-preferential text mining of e-mail discourse. In: Proceedings of the 18th annual computer security applications conference (ACSAC)

    Google Scholar 

  16. Ding SHH, Fung BCM, Debbabi M (2015) A visualizable evidence-driven approach for authorship attribution. ACM Trans Inf Syst Secur (TISSEC)

    Google Scholar 

Download references

Acknowledgements

The authors would like to acknowledge and thank technical education quality improvement program TEQIP phase III, BMS College of Engineering for funding this research work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Suman Patil .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Patil, S., Nadimpalli, S.V., Yadav, P.K. (2019). Email Authorship Attribution. In: Saini, H., Singh, R., Kumar, G., Rather, G., Santhi, K. (eds) Innovations in Electronics and Communication Engineering. Lecture Notes in Networks and Systems, vol 65. Springer, Singapore. https://doi.org/10.1007/978-981-13-3765-9_47

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-3765-9_47

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-3764-2

  • Online ISBN: 978-981-13-3765-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics