Feeds

Open source app can detect text's authors

Bible, US constitution analysed. Next: your kids school work and your email

Top 5 reasons to deploy VMware with Tegile

A group of Adelaide researchers has released an open-source tool that helps identify document authorship by comparing texts.

While their own test cases – and therefore the headlines – concentrated on identifying the authors of historical documents, it seems to The Register that any number of modern uses of such a tool might arise.

The two test cases the researchers drew on in developing their software, on Github here, were a series of US essays called The Federalist Papers, and the Letter to the Hebrews in the New Testament.

The Federalist Paper essays were written in the lead-up to the drafting of the US Constitution, by Alexander Hamilton, James Madison and John Jay. Of the 85 essays, the authorship of 12 is disputed and one has generally been attributed to Jay.

Professor Derek Abbott of the University of Adelaide explains the results: “We’ve shown that one of the disputed texts, Essay 62, is indeed written by James Madison with a high degree of certainty.

“But the other 12 essays cannot be allocated to any of the three authors with a similarly strong likelihood. We believe they are probably the result of a certain degree of collaboration between the authors, which would also explain why there hasn’t been scholarly consensus to date.”

As for the Letter to the Hebrews, the analysis suggests it should be attributed to the Apostle Paul, but there’s enough evidence of someone else’s hand that it could either be a false positive, or it may indicate the personality of a translator as well as the author.

In the research paper, published in full at PLOSOne, the group notes that author attribution is a question that’s stretching beyond academia in the modern era.

“Due to an increase in the amount of data in various forms including emails, blogs, messages on the internet and SMS, the problem of author attribution has received more attention. In addition to its traditional application for shedding light on the authorship of disputed texts in the classical literature, new applications have arisen such as plagiarism detection, web searching, spam email detection, and finding the authors of disputed or anonymous documents in forensics against cyber crime,” the researchers write.

They note that further research would be needed to test their methodology against modern texts – but with the software offered for free, The Register can easily imagine the software getting a workout by any number of interested parties. ®

Security for virtualized datacentres

More from The Register

next story
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
iOS 8 release: WebGL now runs everywhere. Hurrah for 3D graphics!
HTML 5's pretty neat ... when your browser supports it
Mathematica hits the Web
Wolfram embraces the cloud, promies private cloud cut of its number-cruncher
Mozilla shutters Labs, tells nobody it's been dead for five months
Staffer's blog reveals all as projects languish on GitHub
'People have forgotten just how late the first iPhone arrived ...'
Plus: 'Google's IDEALISM is an injudicious justification for inappropriate biz practices'
SUSE Linux owner Attachmate gobbled by Micro Focus for $2.3bn
Merger will lead to mainframe and COBOL powerhouse
iOS 8 Healthkit gets a bug SO Apple KILLS it. That's real healthcare!
Not fit for purpose on day of launch, says Cupertino
Netscape plugins about to stop working in Chrome for Mac
Google kills off 32-bit Chrome, only on Mac
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.