Email Authorship Attribution

  • Suman PatilEmail author
  • Sandeep Varma Nadimpalli
  • Pavithra K. Yadav
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 65)


Email correspondence is regularly manhandled for directing social designing assaults including spamming, phishing, data fraud, and circulating malware. This is to a great extent credited to the issue of obscurity intrinsic. Finding the authorship of email which can be stated as attribution problem is contemplated as content classification issue where the styles of writing of people are displayed in view of their already composed documents. In this paper, Multiple Association Rules for Authorship Attribution (CMARAA) is proposed to solve the problem of authorship attribution. The proposed method makes the remarkable composition style of features of a person. The experimental evaluation shows that CMARAA classifies with 92% of accuracy being the most accurate algorithm when compared to other classification algorithms for different combinations of authors.


Authorship attribution Email classification Association mining Stylometric features 



The authors would like to acknowledge and thank technical education quality improvement program TEQIP phase III, BMS College of Engineering for funding this research work.


  1. 1.
    Casey E (2010) Handbook of digital forensics and investigation. ElsevierGoogle Scholar
  2. 2.
    de Vel O (2000) Mining e-mail authorship. KDD workshop on text miningGoogle Scholar
  3. 3.
    Iqbal F, Khan LA, Fung BCM, Debbabi M (2010) E-mail authorship verification for forensic investigation. In: Proceedings of the 25th ACM SIGAPP symposium on applied computing (SAC), ACM PressGoogle Scholar
  4. 4.
    Koppel M, Schler J, Argamon S, Messeri E (2006) Authorship attribution with thousands of candidate authors. In: Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrievalGoogle Scholar
  5. 5.
    Stamatatos E (2009) A survey of modern authorship attribution methods. J Am Soc Inf Sci Technol (JASIST)Google Scholar
  6. 6.
    Grieve J (2007) Quantitative authorship attribution: an evaluation of techniques. Lit Linguist ComputGoogle Scholar
  7. 7.
    Abbasi A, Chen H (2008) Writeprints: a stylometric approach to identity-level identification and similarity detection in cyberspace. ACM Trans Inf Syst 26(2):7CrossRefGoogle Scholar
  8. 8.
    Mendenhall TC (1887) The characteristic curves of composition. JSTORGoogle Scholar
  9. 9.
    de Vel O, Anderson A, Corney M, Mohay G (2001) Multi-topic e-mail authorship attribution forensics. In: Proceedings of ACM conference on computer security e workshop on data mining for securityGoogle Scholar
  10. 10.
    de Vel O, Anderson A, Corney M, Mohay G (2001) Mining e-mail content for author identification forensics. SIGMODGoogle Scholar
  11. 11.
    Ledger GR, Merriam TVN (1994) Shakespeare, fletcher, and the two noble kinsmen. Lit Linguist ComputGoogle Scholar
  12. 12.
    Iqbal F, Binsalleeh H, Fung BCM, Debbabi M (2010) Mining writeprints from anonymous e-mails for forensic investigation. Digit InvestingGoogle Scholar
  13. 13.
    Iqbal F, Binsalleeh H, Fung BCM, Debbabi M (2013) A unified data mining solution for authorship analysis in anonymous textual communications. Inf Sci Special Issue Data Min Inf SecureGoogle Scholar
  14. 14.
    Teng G, Lai M, Ma J, Li Y (2004) E-mail authorship mining based on SVM for computer forensic. In: Proceedings of the 3rd international conference on machine learning and cyhemeticsGoogle Scholar
  15. 15.
    Corney M, de Vel O, Anderson A, Mohay G (2002) Gender-preferential text mining of e-mail discourse. In: Proceedings of the 18th annual computer security applications conference (ACSAC)Google Scholar
  16. 16.
    Ding SHH, Fung BCM, Debbabi M (2015) A visualizable evidence-driven approach for authorship attribution. ACM Trans Inf Syst Secur (TISSEC)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Suman Patil
    • 1
    Email author
  • Sandeep Varma Nadimpalli
    • 1
  • Pavithra K. Yadav
    • 1
  1. 1.Department of Information Science and EngineeringBMS College of EngineeringBengaluruIndia

Personalised recommendations