177
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Identifying concealed messages using authorship attribution

References

  • Bird, S., E. Klein, and E. Loper. 2009. Natural language processing with Python – Analyzing text with the Natural Language Toolkit. www.nltk.org/book.
  • Federal Bureau of Investigation. Cryptanalysts: Breaking codes to stop crime. Last modified March 21, 2011. Accessed December 11, 2019. https://www.fbi.gov/news/stories/breaking-codes-to-stop-crime-part-1.
  • Kahn, D. 1996. The codebreakers: The comprehensive history of secret communication from ancient times to the Internet. New York: Scribner.
  • Mosteller, F., and D. L. Wallace. 1963. Inference in an authorship problem. Journal of the American Statistical Association 58 (302):275–309. doi:10.2307/2283270.
  • Peng, R. D., and N. W. Hengartner. 2002. Quantitative analysis of literary styles. The American Statistician 56 (3):175–85. doi:10.1198/000313002100.
  • Sarndal, C. 1967. On deciding cases of disputed authorship. (Applied Statistics) 16 (3):251–68. doi:10.2307/2985921.
  • Savoy, J. 2016. Estimating the probability of authorship attribution. Journal of the Association for Information Science and Technology 67 (6):1462–72. doi:10.1002/asi.23455.
  • Stamatatos, E. 2009. A survey of modern authorship attribution methods. Journal of the American Society for Information Science and Technology 60 (3):538–56. doi:10.1002/asi.21001.
  • Wrixton, F. 1998. Codes, ciphers, and other cryptic and clandestine communication: Making and breaking secret messages from hieroglyphics to the Internet. New York: Black Dog & Levanthal.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.