Abstract
Anonymous authoring includes writing reviews, comments and blogs, using pseudonyms with the general assumption that using these pseudonyms will protect the real identity of authors and allows them to freely express their views. It has been shown, however, that writing style may be used to trace authors across multiple Websites. This is a serious threat to privacy and may even result in revealing the authors’s identities. In obfuscating authors’ writing style, an authored document is modified to hide the writing characteristics of the author. In this paper we first show that existing obfuscation systems are insecure and propose a general approach for constructing obfuscation algorithms, and then instantiate the framework to give an algorithm that semi-automatically modifies an author’s document. We provide a secure obfuscation scheme that is able to hide an author’s document securely among other authors’ documents in a corpus. As part of our obfuscation algorithm we present a new algorithm for identifying an author’s unique words that would be of independent interest.
We present a security model and use it to analyze our scheme and also the previous schemes. We implement our scheme and give its performances through experiments. We show that our algorithm can be used to obfuscate documents securely and effectively.
A. Galib—This work is supported in part by Alberta Innovates Technology Futures, in the Province of Alberta, Canada.
Chapter PDF
References
Narayanan, A., Paskov, H., Gong, N.Z., Bethencourt, J., Chul, E., Shin, R., Song, D.: On the feasibility of internet-scale author identification. In: Proceedings of the 33rd Conference on IEEE Sympsoium on Security and Privacy. IEEE (2012)
Stamatatos, E.: A survey of modern authorship attribution methods. J. Am. Soc. Inf. Sci. Technol. 60, 538–556 (2009)
Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: Proceedings of the 2008 IEEE Symposium on Security and Privacy, SP 2008, pp. 111–125. IEEE Computer Society, Washington, D.C. (2008)
Mishari, M.A., Tsudik, G.: Exploring linkablility of community reviewing. CoRR, vol. abs/1111.0338 (2011)
Kacmarcik, G., Gamon, M.: Obfuscating document stylometry to preserve author anonymity. In: Proceedings of the COLING/ACL on Main Conference Poster Sessions, COLING-ACL 2006, pp. 444–451. Association for Computational Linguistics, Stroudsburg (2006)
McDonald, A.W.E., Afroz, S., Caliskan, A., Stolerman, A., Greenstadt, R.: Use fewer instances of the letter “i”: toward writing style anonymization. In: Fischer-Hübner, S., Wright, M. (eds.) PETS 2012. LNCS, vol. 7384, pp. 299–318. Springer, Heidelberg (2012)
Rao, J.R., Rohatgi, P.: Can pseudonymity really guarantee privacy? In: Proceedings of the 9th Conference on USENIX Security Symposium, SSYM 2000, vol 9, pp. 7–7. USENIX Association, Berkeley (2000)
Khosmood, F., Levinson, R.A.: Automatic natural language style classification and transformation. In: Proceedings of the 2008 BCS-IRSG Conference on Corpus Profiling, IRSG 2008, pp. 3–3. British Computer Society, Swinton (2008)
Khosmood, F., Levinson, R.: Automatic synonym and phrase replacement show promise for style transformation. In: Proceedings of the 2010 Ninth International Conference on Machine Learning and Applications, ICMLA 2010, pp. 958–961. IEEE Computer Society, Washington, D.C. (2010)
Brennan, M., Greenstadt, R., Brennan, M., Greenstadt, R.: Practical attacks against authorship recognition techniques emerging applications track
Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The weka data mining software: An update. SIGKDD Explor. Newsl. 11, 10–18 (2009)
Mitchell, T.M.: Machine learning. McGraw Hill, New York (1997)
Le Thi, H., Safavi-Naini, R.: An information theoretic framework for web inference detection. In: Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, AISec 2012, pp. 25–36. ACM, New York (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 IFIP International Federation for Information Processing
About this paper
Cite this paper
Le, H., Safavi-Naini, R., Galib, A. (2015). Secure Obfuscation of Authoring Style. In: Akram, R., Jajodia, S. (eds) Information Security Theory and Practice. WISTP 2015. Lecture Notes in Computer Science(), vol 9311. Springer, Cham. https://doi.org/10.1007/978-3-319-24018-3_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-24018-3_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-24017-6
Online ISBN: 978-3-319-24018-3
eBook Packages: Computer ScienceComputer Science (R0)