A Girl Has No Name: Automated Authorship Obfuscation using Mutant-X

Open access

Abstract

Stylometric authorship attribution aims to identify an anonymous or disputed document’s author by examining its writing style. The development of powerful machine learning based stylometric authorship attribution methods presents a serious privacy threat for individuals such as journalists and activists who wish to publish anonymously. Researchers have proposed several authorship obfuscation approaches that try to make appropriate changes (e.g. word/phrase replacements) to evade attribution while preserving semantics. Unfortunately, existing authorship obfuscation approaches are lacking because they either require some manual effort, require significant training data, or do not work for long documents. To address these limitations, we propose a genetic algorithm based random search framework called Mutant-X which can automatically obfuscate text to successfully evade attribution while keeping the semantics of the obfuscated text similar to the original text. Specifically, Mutant-X sequentially makes changes in the text using mutation and crossover techniques while being guided by a fitness function that takes into account both attribution probability and semantic relevance. While Mutant-X requires black-box knowledge of the adversary’s classifier, it does not require any additional training data and also works on documents of any length. We evaluate Mutant-X against a variety of authorship attribution methods on two different text corpora. Our results show that Mutant-X can decrease the accuracy of state-of-the-art authorship attribution methods by as much as 64% while preserving the semantics much better than existing automated authorship obfuscation approaches. While Mutant-X advances the state-of-the-art in automated authorship obfuscation, we find that it does not generalize to a stronger threat model where the adversary uses a different attribution classifier than what Mutant-X assumes. Our findings warrant the need for future research to improve the generalizability (or transferability) of automated authorship obfuscation approaches.

If the inline PDF is not rendering correctly, you can download the PDF file here.

  • [1] PAN. https://pan.webis.de/tasks.html.

  • [2] Modalities – FBI. https://www.fbi.gov/services/cjis/fingerprints-and-other-biometrics/biometric-center-of-excellence/modalities.

  • [3] I Am Part of the Resistance Inside the Trump Administration. Opinion The New York Times. https://www.nytimes.com/2018/09/05/opinion/trump-white-house-anonymous-resistance.html 2018.

  • [4] Author Obfuscation. https://pan.webis.de/clef18/pan18-web/author-obfuscation.html 2018.

  • [5] A. Abbasi and H. Chen. Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace. ACM Transactions on Information Systems (TOIS) 26(2):7 2008.

  • [6] S. Afroz A. C. Islam A. Stolerman R. Greenstadt and D. McCoy. Doppelgänger finder: Taking stylometry to the underground. In IEEE Symposium on Security and Privacy (IEEE S&P) pages 212–226. IEEE 2014.

  • [7] M. Almishari D. Kaafar G. Tsudik and E. Oguz. Stylometric linkability of tweets. In Proceedings of the 13th Workshop on Privacy in the Electronic Society (WPES 2014) pages 205–208. ACM 2014.

  • [8] M. Almishari E. Oguz and G. Tsudik. Fighting Authorship Linkability with Crowdsourcing. In ACM Conference on Online Social Networks (COSN) 2014.

  • [9] M. AlSallal R. Iqbal S. Amin A. James and V. Palade. An Integrated Machine Learning Approach for Extrinsic Plagiarism Detection. In 9th International Conference on Developments in eSystems Engineering. IEEE 2016.

  • [10] Anonymous. I’m an Amazon Employee. My Company Shouldn’t Sell Facial Recognition Tech to Police. https://medium.com/s/powertrip/im-an-amazon-employee-my-company-shouldn-t-sell-facial-recognition-tech-to-police-36b5fde934ac 2018.

  • [11] Anonymous. An Open Letter to Microsoft: Don’t Bid on the US Military’s Project JEDI. https://medium.com/s/story/an-open-letter-to-microsoft-dont-bid-on-the-us-military-s-project-jedi-7279338b7132 2018.

  • [12] S. Borenstein. Close Look at Word Choice Could ID Anonymous NYT Columnist: Word Detectives. https://www.nbcchicago.com/news/politics/Science-May-Help-Identify-Opinion-Columnist-492649561.html 2018.

  • [13] M. Brennan and R. Greenstadt. Practical Attacks Against Authorship Recognition Techniques. In Proceedings of the Twenty-First Conference on Innovative Applications of Artificial Intelligence 2009.

  • [14] M. Brennan S. Afroz and R. Greenstadt. Adversarial stylometry: Circumventing authorship recognition to preserve privacy and anonymity. In ACM Transactions on Information and System Security (TISSEC) volume 15 2012.

  • [15] D. Castro-Castro R. O. Bueno and R. Munoz. Author Masking by Sentence Transformation. In Notebook for PAN at CLEF 2017.

  • [16] J. H. Clark and C. J. Hannon. An Algorithm for Identifying Authors Using Synonyms. In Eighth Mexican International Conference on Current Trends in Computer Science (ENC 2007) pages 99–104. IEEE 2007.

  • [17] M. Denkowski and A. Lavie. Meteor universal: Language specific translation evaluation for any target language. In Proceedings of the Ninth Workshop on Statistical Machine Translation pages 376–380 Baltimore Maryland USA June 2014. Association for Computational Linguistics. 10.3115/v1/W14-3348. URL https://www.aclweb.org/anthology/W14-3348.

  • [18] M. Ebrahimpour T. J. Putnins M. J. Berryman A. Allison B. W.-H. Ng and D. Abbott. Automated Authorship Attribution Using Advanced Signal Classification Techniques. PLOS ONE 2013. URL https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0054998.

  • [19] O. Ehmoda and E. Charniak. Statistical Stylometrics and the Marlowe-Shakespeare Authorship Debate. Master’s thesis Department of Cognitive Linguistic & Psychological Sciences Brown University 2012.

  • [20] C. Emmery E. Manjavacas and G. Chrupala. Style Obfuscation by Invariance. In Proceedings of the 27th International Conference on Computational Linguistics 2018.

  • [21] D. E. Goldberg. Genetic Algorithms in Search Optimization and Machine Learning. Addison-Wesley Longman Publishing Co. Inc. Boston MA USA 1989.

  • [22] R. Gunning. The Fog Index After Twenty Years. International Journal of Business Communication 1969.

  • [23] J. Guo S. Lu H. Cai W. Zhang and Y. Yu. Long text generation via adversarial training with leaked information. In AAAI 2018.

  • [24] D. I. Holmes and R. S. Forsyth. The Federalist revisited: New directions in authorship attribution. PhD thesis Department of Mathematical Sciences University of the West of England Bristol UK 1995.

  • [25] J. Howard and S. Ruder. Universal Language Model Fine-tuning for Text Classification. In Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics volume abs/1801.06146 2018.

  • [26] G. Karadzhov T. Mihaylova Y. Kiprov G. Georgiev I. Koychev and P. Nakov. The case for being average: A mediocrity approach to style masking and author obfuscation. In International Conference of the Cross-Language Evaluation Forum for European Languages pages 173–185. Springer 2017.

  • [27] Y. Keswani H. Trivedi P. Mehta and P. Majumder. Author Masking through Translation. In Notebook for PAN at CLEF 2016 pages 890–894 2016.

  • [28] M. Mansoorizadeh T. Rahgooy M. Aminiyan and M. Eskandari. Author obfuscation using WordNet and language models. In Notebook for PAN at CLEF 2016 2016.

  • [29] A. W. McDonald S. Afroz A. Caliskan A. Stolerman and R. Greenstadt. Use fewer instances of the letter ‘i’: Toward writing style anonymization. In International Symposium on Privacy Enhancing Technologies Symposium pages 299–318. Springer 2012.

  • [30] A. W. McDonald J. Ulman M. Barrowclift and R. Greenstadt. Anonymouth Revamped: Getting Closer to Stylometric Anonymity. In PETools: Workshop on Privacy Enhancing Tools volume 20 2013.

  • [31] L. McInnes J. Healy and J. Melville. UMAP: Uniform Manifold Approximation and Projection for Dimension Reduction. ArXiv e-prints Feb. 2018.

  • [32] T. Mikolov I. Sutskever K. Chen G. S. Corrado and J. Dean. Distributed Representations of Words and Phrases and their Compositionality. In Advances in Neural Information Processing Systems pages 3111–3119 2013.

  • [33] G. A. Miller. WordNet: a lexical database for English. Communications of the ACM 38(11):39–41 1995.

  • [34] F. Mosteller and D. Wallace. Inference and disputed authorship: The Federalist. 1964.

  • [35] A. Narayanan H. Paskov N. Z. Gong J. Bethencourt E. Stefanov E. C. R. Shin and D. Song. On the Feasibility of Internet-Scale Author Identification. In IEEE Symposium on Security and Privacy (SP) pages 300–314. IEEE 2012.

  • [36] R. Overdorf and R. Greenstadt. Blogs twitter feeds and reddit comments: Cross-domain authorship attribution. 2016.

  • [37] E. Pitler and A. Nenkova. Revisiting Readability: A Unified Framework for Predicting Text Quality. In Empirical Methods in Natural Language Processing (EMNLP) 2008.

  • [38] S. Potthast and S. Hagen. Overview of the Author Obfuscation Task at PAN 2018: A New Approach to Measuring Safety. In Notebook for PAN at CLEF 2018 2018.

  • [39] P. Rajapaksha R. Farahbakhsh and N. Crespi. Identifying Content Originator in Social Networks. In IEEE Global Communications Conference pages 1–6. IEEE 2017.

  • [40] S. Ruder P. Ghaffari and J. G. Breslin. Character-level and multi-channel convolutional neural networks for large-scale authorship attribution. arXiv:1609.06686 2016. URL https://arxiv.org/abs/1609.06686.

  • [41] J. Schler M. Koppel S. Argamon and J. W. Pennebaker. Effects of age and gender on blogging. In AAAI spring symposium: Computational approaches to analyzing weblogs volume 6 pages 199–205 2006.

  • [42] U. Shahid S. Farooqi R. Ahmad Z. Shafiq P. Srinivasan and F. Zaffar. Accurate detection of automatically spun content via stylometric analysis. In Data Mining (ICDM) 2017 IEEE International Conference on pages 425–434. IEEE 2017.

  • [43] R. Shetty B. Schiele and M. Fritz. A4NT: Author Attribute Anonymity by Adversarial Training of Neural Machine Translation. In USENIX Security Symposium 2018.

  • [44] A. Stolerman R. Overdorf S. Afroz and R. Greenstadt. Classify but verify: Breaking the closed-world assumption in stylometric authorship attribution. In IFIP Working Group volume 11 page 64 2013.

  • [45] D. Tang F. Wei N. Yang M. Zhou T. Liu and B. Qin. Learning sentiment-specific word embedding for twitter sentiment classification. In Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers) volume 1 pages 1555–1565 2014.

  • [46] L.-C. Yu J. Wang K. R. Lai and X. Zhang. Refining word embeddings using intensity scores for sentiment analysis. In IEEE/ACM Transactions on Audio Speech and Language Processing 2018.

Search
Journal information
Metrics
All Time Past Year Past 30 Days
Abstract Views 0 0 0
Full Text Views 51 51 41
PDF Downloads 38 38 27