A Systematic Review on Author Identification Methods

Author Identification is a technique for identifying author of anonymous text. It has near about 130 year’s long history, started with the work by Mendenhall 1987. Applications of Author identification include plagiarism detection, detecting anonymous author, in forensics and so on. In this paper the authors outline features used for Author identification like vocabulary, syntactic and others. Researchers worked on various methods for Author identification they also outline this paper on types of Author Identification methods that include 1. Profile-based Approaches which includes Probabilistic Models, Compression Models, Common n-Grams (CNG) approach, 2. Instance-based Approaches which includes Vector Space Models, Similarity-based Models, Meta-learning Models and 3. Hybrid Approaches. At the end the authors conclude this paper with observations and future scope. KeywoRDS Attribution Method, Author Identification, Feature Set, Text Features, Text Mining

[1]  Dmitry V. Khmelev,et al.  Using Literal and Grammatical Statistics for Authorship Attribution , 2001, Probl. Inf. Transm..

[2]  Akhil Sanjeev Gokhale,et al.  Review and Study of Different Methods for Author Identification , 2012 .

[3]  Vittorio Loreto,et al.  Language trees and zipping. , 2002, Physical review letters.

[4]  David Sharp,et al.  Ngram and Bayesian Classification of Documents for Topic and Authorship , 2003, Lit. Linguistic Comput..

[5]  Ido Dagan,et al.  Feature instability as a criterion for selecting potential style markers , 2006, J. Assoc. Inf. Sci. Technol..

[6]  George M. Mohay,et al.  Mining e-mail content for author identification forensics , 2001, SGMD.

[7]  Jack Grieve,et al.  Quantitative Authorship Attribution: An Evaluation of Techniques , 2007, Lit. Linguistic Comput..

[8]  John Burrows,et al.  Word-Patterns and Story-Shapes: The Statistical Analysis of Narrative Style , 1987 .

[9]  Sharmistha Bhattacharya Halder A Study on Bayesian Decision Theoretic Rough Set , 2014, Int. J. Rough Sets Data Anal..

[10]  John Burrows,et al.  Questions of Authorship: Attribution and Beyond A Lecture Delivered on the Occasion of the Roberto Busa Award ACH-ALLC 2001, New York , 2003, Comput. Humanit..

[11]  P. K. Nizar Banu,et al.  Performance Analysis of Hard and Soft Clustering Approaches For Gene Expression Data , 2015, Int. J. Rough Sets Data Anal..

[12]  Louis Kruh,et al.  The Beale Cipher as a Bamboozlement - Part II , 1988, Cryptologia.

[13]  Louis Kruh,et al.  A Basic Probe of the Beale Cipher as a Bamboozlement , 1982, Cryptologia.