Skip to main content

Identifying Chinese E-Mail Documents’ Authorship for the Purpose of Computer Forensic

  • Conference paper
Book cover Intelligence and Security Informatics (ISI 2008)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5075))

Included in the following conference series:

Abstract

Nowadays, computer crimes involving e-mail increases rapidly. To prevent these phenomena from happening, the authorship identification methods for Chinese e-mail documents were described in this paper, which could provide evidence for the purpose of computer forensic. The theoretical framework was presented. Various style features including linguistic features, structural characteristics and format features were analyzed. The support vector machine algorithm was used for learning algorithm. To validate the methods, experiments were made on limited dataset. The results were satisfying, which proved that the methods were effective and feasible to apply to computer forensic.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mosteller, F., Wallace, D.L.: Inference and Disputed Authorship. Addison-Wesley Publishing Company, Inc., Reading (1964)

    MATH  Google Scholar 

  2. Elliot, W., Valenza, R.: Was the Earl of Oxford the true Shakespeare? Notes and Queries 38, 501–506 (1991)

    Google Scholar 

  3. Krsul, I.: Authorship analysis: Identifying the author of a program. Technical report, Department of Computer Science, Purdue University (1994)

    Google Scholar 

  4. Krsul, I., Spafford, E.: Authorship analysis: Identifying the author of a program. Computers and Security 16, 248–259 (1997)

    Article  Google Scholar 

  5. Sallis, P., MacDonell, S., MacLennan, G., Gray, A., Kilgour, R.: Identified: Software Authorship Analysis with Case-Based Reasoning. In: Proc. Addendum Session Int. Conf. Neural Info. Processing and Intelligent Info. Systems, pp. 53–56 (1997)

    Google Scholar 

  6. Crain, C.: The Bard’s fingerprints. Lingua Franca, pp. 29–39 (1998)

    Google Scholar 

  7. Abbasi, A., Chen, H.: Applying Authorship Analysis to Extremist-Group Web Forum Messages. IEEE Intelligent System 20(5), 67–75 (2005)

    Article  Google Scholar 

  8. Zheng, R., Qin, Y., Huang, Z., Chen, H.: A Framework for Authorship Analysis of Online Messages: Writing-style Features and Techniques. Journal of the American Society for Information Science and Technology 57(3), 378–393 (2006)

    Article  Google Scholar 

  9. de Olivier, V.: Mining E-mail Authorship. In: KDD 2000 Workshop on Text Mining, ACM International conference on knowledge Discovery and Data Mining, Boston, MA, USA (2000)

    Google Scholar 

  10. de Olivier, V., Anderson, A., Corney, M., Mohay, G.: Multi-Topic E-mail Authorship Attribution Forensics. In: ACM Conference on Computer Security - Workshop on Data Mining for Security Applications, Philadelphia, PA (2001)

    Google Scholar 

  11. Tsuboi, Y.: Authorship Identification for Heterogeneous Documents. Nara Institute of Science and Technology, University of Information Science, Japanese (2002)

    Google Scholar 

  12. Yang, Y.: An evaluation of statistical approaches to text categorization. Journal of Information Retrieval 1, 67–88 (1999)

    Article  Google Scholar 

  13. Vapnik, V.: The Nature of Statistical Learning Theory. Wiley, New York (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ma, J., Li, Y., Teng, G. (2008). Identifying Chinese E-Mail Documents’ Authorship for the Purpose of Computer Forensic. In: Yang, C.C., et al. Intelligence and Security Informatics. ISI 2008. Lecture Notes in Computer Science, vol 5075. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69304-8_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69304-8_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69136-5

  • Online ISBN: 978-3-540-69304-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics