Adversarial stylometry is the practice of altering writing style to reduce the potential for
stylometry
Stylometry is the application of the study of linguistic style, usually to written language. It has also been applied successfully to music and to fine-art paintings as well. Argamon, Shlomo, Kevin Burns, and Shlomo Dubnov, eds. The structure of ...
to discover the author's identity or their characteristics. This task is also known as authorship obfuscation or authorship anonymisation. Stylometry poses a significant
privacy
Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.
The domain of privacy partially overlaps with security, which can include the concepts of a ...
challenge in its ability to unmask
anonymous
Anonymous may refer to:
* Anonymity, the state of an individual's identity, or personally identifiable information, being publicly unknown
** Anonymous work, a work of art or literature that has an unnamed or unknown creator or author
* Anonym ...
authors or to link
pseudonym
A pseudonym (; ) or alias () is a fictitious name that a person or group assumes for a particular purpose, which differs from their original or true name (orthonym). This also differs from a new name that entirely or legally replaces an individua ...
s to an author's other identities, which, for example, creates difficulties for
whistleblowers
A whistleblower (also written as whistle-blower or whistle blower) is a person, often an employee, who reveals information about activity within a private or public organization that is deemed illegal, immoral, illicit, unsafe or fraudulent. Whi ...
, activists, and
hoax
A hoax is a widely publicized falsehood so fashioned as to invite reflexive, unthinking acceptance by the greatest number of people of the most varied social identities and of the highest possible social pretensions to gull its victims into pu ...
ers and
fraud
In law, fraud is intentional deception to secure unfair or unlawful gain, or to deprive a victim of a legal right. Fraud can violate civil law (e.g., a fraud victim may sue the fraud perpetrator to avoid the fraud or recover monetary compen ...
sters. The privacy risk is expected to grow as
machine learning
Machine learning (ML) is a field of inquiry devoted to understanding and building methods that 'learn', that is, methods that leverage data to improve performance on some set of tasks. It is seen as a part of artificial intelligence.
Machine ...
techniques and
text corpora
In linguistics, a corpus (plural ''corpora'') or text corpus is a language resource consisting of a large and structured set of texts (nowadays usually electronically stored and processed). In corpus linguistics, they are used to do statistical a ...
develop.
All adversarial stylometry shares the core idea of faithfully
paraphrasing
A paraphrase () is a restatement of the meaning of a text or passage using other words. The term itself is derived via Latin ', . The act of paraphrasing is also called ''paraphrasis''.
History
Although paraphrases likely abounded in oral tr ...
the source text so that the meaning is unchanged but the stylistic signals are obscured. Such a faithful paraphrase is an
adversarial example for a stylometric classifier. Several broad approaches to this exist, with some overlap: ''imitation'', substituting the author's own style for another's; ''translation'', applying
machine translation
Machine translation, sometimes referred to by the abbreviation MT (not to be confused with computer-aided translation, machine-aided human translation or interactive translation), is a sub-field of computational linguistics that investigates t ...
with the hope that this eliminates characteristic style in the source text; and ''obfuscation'', deliberately modifying a text's style to make it not resemble the author's own.
Manually obscuring style is possible, but laborious; in some circumstances, it is preferable or necessary. Automated tooling, either semi- or fully-automatic, could assist an author. How best to perform the task and the design of such tools is an open research question. While some approaches have been shown to be able to defeat particular stylometric analyses, particularly those that do not account for the potential of adversariality, establishing safety in the face of unknown analyses is an issue. Ensuring the faithfulness of the paraphrase is a critical challenge for automated tools.
It is uncertain if the practice of adversarial stylometry is detectable in itself. Some studies have found that particular methods produced signals in the output text, but a stylometrist who is uncertain of what methods may have been used may not be able to reliably detect them.
History
, an early work in adversarial stylometry, identified machine translation as a possibility, but noted that the quality of translators available at the time presented severe challenges. is another early work. performed the first evaluation of adversarial stylometric methods on actual texts.
introduced the first corpus of adversarially authored texts specifically for evaluating stylometric methods; other corpora include the
International Imitation Hemingway Competition
The International Imitation Hemingway Competition, also known as the Bad Hemingway Contest, was an annual writing competition begun in Century City, California. Started in 1977 as a "promotional gag",Schwartz, Amy E. (August 12, 1994)Homage to Pop ...
, the
Faux Faulkner contest, and the hoax blog ''
A Gay Girl in Damascus
''A Gay Girl In Damascus'' was a weblog purportedly by Amina Abdallah Arraf al Omari who was in fact a fictional character and hoax persona created and maintained by American Tom MacMaster. The identity was presented as a Syrian-American blogge ...
''.
Motivations
suggest that short, unattributed documents (i.e.,
anonymous posts) are not at risk of stylometric identification, but
pseudonymous
A pseudonym (; ) or alias () is a fictitious name that a person or group assumes for a particular purpose, which differs from their original or true name (orthonym). This also differs from a new name that entirely or legally replaces an individua ...
authors who have not practiced adversarial stylometry in producing corpuses of thousands of words may be vulnerable. attempted large-scale deanonymisation of 100,000 blog authors with mixed results: the identifications were significantly better than chance, but only accurately matched the blog and author a fifth of the time; identification improved with the number of posts written by the author in the corpus. Even if an author is not identified, some of their characteristics may still be deduced stylometrically, or stylometry may narrow the
anonymity set
Anonymity describes situations where the acting person's identity is unknown. Some writers have argued that namelessness, though technically correct, does not capture what is more centrally at stake in contexts of anonymity. The important idea he ...
of potential authors sufficiently for other information to complete the identification. Detecting author characteristics (e.g., gender or age) is often simpler than identifying an author from a large, possibly open, set of candidates.
Modern
machine learning
Machine learning (ML) is a field of inquiry devoted to understanding and building methods that 'learn', that is, methods that leverage data to improve performance on some set of tasks. It is seen as a part of artificial intelligence.
Machine ...
techniques offer powerful tools for identification; further development of corpora and computational stylometric techniques are likely to raise further privacy issues. say that the general validity of the hypothesis underlying stylometry—that authors have invariant, content-independent 'style fingerprints'—is uncertain, but "the deanonymisation attack is a real privacy concern".
Those interested in practicing adversarial stylometry and stylistic deception include
whistleblowers
A whistleblower (also written as whistle-blower or whistle blower) is a person, often an employee, who reveals information about activity within a private or public organization that is deemed illegal, immoral, illicit, unsafe or fraudulent. Whi ...
avoiding retribution; journalists and activists; perpetrators of
fraud
In law, fraud is intentional deception to secure unfair or unlawful gain, or to deprive a victim of a legal right. Fraud can violate civil law (e.g., a fraud victim may sue the fraud perpetrator to avoid the fraud or recover monetary compen ...
s and
hoax
A hoax is a widely publicized falsehood so fashioned as to invite reflexive, unthinking acceptance by the greatest number of people of the most varied social identities and of the highest possible social pretensions to gull its victims into pu ...
es; authors of
fake reviews;
literary forgers; criminals disguising their identity from investigators; and, generally, anyone with a desire for
anonymity or pseudonymity. Authors, or agents acting on behalf of authors, may also attempt to remove stylistic clues to author characteristics (e.g., race or gender) so that knowledge of those characteristics cannot be used for discrimination (e.g., through
algorithmic bias). Another possible use for adversarial stylometry is in disguising
automatically generated text as human-authored.
Methods
With imitation, the author attempts to mislead stylometry by matching their style to another author's. An incomplete imitation, where some of the true author's unique characteristics appear alongside the imitated author's, can be a detectable signal for the use of adversarial stylometry. Imitation can be performed automatically with
style transfer systems, though this typically requires a large corpus in the target style for the system to learn from.
Another approach is translation, which employs
machine translation
Machine translation, sometimes referred to by the abbreviation MT (not to be confused with computer-aided translation, machine-aided human translation or interactive translation), is a sub-field of computational linguistics that investigates t ...
of a source text to eliminate characteristic style, often through multiple translators in sequence to produce a
round-trip translation
Round-trip translation (RTT), also known as back-and-forth translation, recursive translation and bi-directional translation, is the process of translating a word, phrase or text into another language (forward translation), then translating the re ...
. Such chained translation can lead to texts being significantly altered, even to the point of incomprehensibility; improved translation tools reduce this risk. More simply-structured texts can be easier to machine translate without losing the original meaning. Machine translation blurs into direct stylistic imitation or obfuscation achieved through automated style transfer, which can be viewed as a "translation" with the same language as input and output. With low-quality translation tools, an author can be required to manually correct major translation errors while avoiding the hazard of re-introducing stylistic characteristics. found that gross errors introduced by
Google Translate
Google Translate is a multilingual neural machine translation service developed by Google to translate text, documents and websites from one language into another. It offers a website interface, a mobile app for Android and iOS, and an A ...
were rare, but more common with several intermediate translations—however, occasional simple or short sentences and misspellings in the source text appeared verbatim in the output, potentially providing an identifying signal. Chain translation can leave characteristic traces of its application in a document, which may allow reconstruction of the intermediate languages used and the number of translation steps performed.
Obfuscation involves deliberately changing the style of a text to reduce its similarity to other texts by some metric; this may be performed at the time of writing by conscious modification, or as part of a revision process with feedback from the metric being targeted as an input to decide when the text has been sufficiently obfuscated. In contrast to translation, complex texts can offer more opportunities for effective obfuscation without altering meaning, and likewise genres with more permissible variation allow more obfuscation. However, longer texts are harder to thoroughly obfuscate. Obfuscation can blend into imitation if the author develops a novel target style, distinct from their original style. With respect to masking author characteristics, obfuscation may aim to achieve a union (adding signals for imitated characteristics) or an intersection (removing signals and normalising) of other authors' styles. Avoiding the author's own idiosyncrasies and producing a "normalised" text is a critical obfuscatory step: an author may have a unique tendency to misspell certain words, use particular variants, or to format a document in a characteristic way. Stylometric signals vary in how simply they can be adversarially masked; an author may easily change their vocabulary by conscious choice, but altering the pattern of grammar or the
letter frequency
Letter frequency is the number of times letters of the alphabet appear on average in written language. Letter frequency analysis dates back to the Arab mathematician Al-Kindi (c. 801–873 AD), who formally developed the method to brea ...
in their text may be harder to achieve, though report that imitation typically succeeds at masking more characteristics than obfuscation. Automated obfuscation may require large amounts of training data written by the author.
Concerning automated implementations of adversarial stylometry, two possible implementations are
rule-based system
In computer science, a rule-based system is used to store and manipulate knowledge to interpret information in a useful way. It is often used in artificial intelligence applications and research.
Normally, the term ''rule-based system'' is appli ...
s for paraphrasing; and encoder–decoder architectures, where the text passes through an intermediate format that is (intended to be) style-neutral. Another division in automated methods is whether there is feedback from an identification system or not. With such feedback, finding paraphrases for author masking has been characterised as a
heuristic
A heuristic (; ), or heuristic technique, is any approach to problem solving or self-discovery that employs a practical method that is not guaranteed to be optimal, perfect, or rational, but is nevertheless sufficient for reaching an immediat ...
search problem
In computational complexity theory and computability theory, a search problem is a type of computational problem represented by a binary relation. If ''R'' is a binary relation such that field(''R'') ⊆ Γ+ and ''T'' is a Turing machine, then '' ...
, exploring textual variants until the result is stylistically sufficiently far (in the case of obfuscation) or near (in the case of imitation), which then constitutes an
adversarial example for that identification system.
Evaluation
How to best mask stylometric characteristics in practice, and what tasks to perform manually, what with tool assistance, and what fully automatically, is an open field of research, especially in short documents with limited potential variability. Manual adversarial stylometry can be preferred or even required if the author does not trust available computers with the task (as may be the case for a whistleblower, for example). Software tools require
maintenance
Maintenance may refer to:
Biological science
* Maintenance of an organism
* Maintenance respiration
Non-technical maintenance
* Alimony, also called ''maintenance'' in British English
* Champerty and maintenance, two related legal doctrine ...
; report that there is no maintained obfuscatory software suitable for general use. identify DS-PAN and Mutant-X as the 2022 state of the art in automated obfuscation. Manual stylistic modulation is a significant effort, with poor
scalability
Scalability is the property of a system to handle a growing amount of work by adding resources to the system.
In an economic context, a scalable business model implies that a company can increase sales given increased resources. For example, a ...
properties; tool assistance can reduce the burden to varying degrees. Deterministic automated methods can lose effectiveness against a classifier
trained adversarially, where output from the style transfer program is used in the classifier's training set.
give three criteria for use in evaluation of adversarial stylometry methods: ''safety'', meaning that stylistic characteristics are reliably eliminated; ''soundness'', meaning that the semantic content of the text is not unacceptably altered; and ''sensible'', meaning that the output is "well-formed and inconspicuous". Compromising any too deeply is typically an unacceptable result, and the three trade off against each other in practice. find that automatically evaluating sensibility, and specifically whether output is acceptably grammatical and well-formed, is difficult; automated evaluation of soundness is somewhat more promising, but manual review is the best method.
Despite safety being an important property of an adversarial stylometry method, it can still be usefully traded away if the conceded stylometric identification potential is otherwise possible by non-stylometric analysis—for example, an author discussing their own upbringing in Britain is unlikely to care if stylometry can reveal that their text is typical of
British English
British English (BrE, en-GB, or BE) is, according to Lexico, Oxford Dictionaries, "English language, English as used in Great Britain, as distinct from that used elsewhere". More narrowly, it can refer specifically to the English language in ...
.
Evaluating the safety of different approaches is complicated by how identification-resistance fundamentally depends on the methods of identification under consideration. The property of being resilient to unknown analyses is called ''transferability''. identify four different
threat model Threat modeling is a process by which potential threats, such as structural vulnerabilities or the absence of appropriate safeguards, can be identified and enumerated, and countermeasures prioritized. The purpose of threat modeling is to provide de ...
s for authors, varying with their knowledge of how their text will be analysed and what
training data will be used: ''query access'', with the weakest analyst and the strongest author who knows both the methods of analysis and the training data; ''architecture access'', where the author knows the analysis methods but not the training data; ''data access'', where the author knows the training data but not the analysis methods; and ''surrogate access'', with the weakest author and the strongest analyst, where the author does not know the methods of analysis nor the training data. Further, when an author chooses a method, they must rely on their threat model and trust that it is valid, and that unknown analyses able to detect remaining stylistic signals cannot or will not be performed, or that the masking successfully transfers; a stylometrist with knowledge of how the author attempted to mask their style, however, may be able to exploit some weakness in the method and render it unsafe. Much of the research into automated methods has assumed that the author has query access, which may not generalise to other settings. Masking methods that internally use an
ensemble of different analyses as a model for its adversary may transfer better against unseen analyses.
A thorough soundness loss defeats the purpose of communication, though some degree of meaning change may be tolerable if the core message is preserved; requiring only
textual entailment Textual entailment (TE) in natural language processing is a directional relation between text fragments. The relation holds whenever the truth of one text fragment follows from another text. In the TE framework, the entailing and entailed texts are ...
or allowing
automatic summarisation
Automatic summarization is the process of shortening a set of data computationally, to create a subset (a Abstract (summary), summary) that represents the most important or relevant information within the original content. Artificial intelligence ...
are other options to lose some meaning in a possibly-tolerable way. Rewriting an input text to defeat stylometry, as opposed to consciously removing stylistic characteristics during composition, poses challenges in retaining textual meaning. assess the problem of unsoundness as "the most important challenge" for research into fully automatic approaches.
For sensibility, if a text is so ungrammatical as to be incomprehensible or so ill-formed that it cannot fit in to its genre then the method has failed, but compromises short of that point may be useful. If inconspicuity is partially lost, then there is the possibility that more expensive and less scalable analyses will be performed (e.g., consulting a forensic linguist) to confirm suspicions or gather further evidence. The impact of a total inconspicuity failure varies depending on the motivation for performing adversarial stylometry: for someone simply attempting to stay anonymous (e.g., a whistleblower), detection may not be an issue; for a literary forger, however, detection would be disastrous. Adversarial stylometry can leave evidence of its practice, which is an inconspicuity failure. In the Brennan–Greenstadt corpus, the texts have been found to share a common "style" of their own. However, assess existing evidence as insufficient to prove that adversarial stylometry is always detectable, with only limited methods having been studied. Improving the smoothness of the output text may reduce the detectability of automated tools. The overall detectability of adversarial authorship has not been thoroughly studied; if the methods available to be used by the author are unknown to the stylometrist, it may be impossible.
The problems of author identification and verification in an adversarial setting are greatly different from recognising naïve or cooperative authors. Deliberate attempts to mask authorship are described by as a "problem for the current state of stylometric art", and state that, despite stylometry's high performance in identifying non-adversarial authors, manual application of adversarial methods render it unreliable.
observe that low-dimensional stylometric models which operate on small numbers of features are less resistant to adversarial stylometry. Research has found that authors vary in how well they are able to modulate their style, with some able to successfully perform the task even without training. , a replication and reproduction of , found that all three of imitation, translation and obfuscation meaningfully reduced the effectiveness of authorship attribution, with manual obfuscation being somewhat more effective than manual imitation or translation, which performed similarly to each other; the original study found that imitation was superior. reported that even simple automated methods of adversarial stylometry caused major difficulties for state-of-the-art authorship identification systems, though at significant soundness and sensibility cost. Adversarially-aware identification systems can perform much better against adversarial stylometry provided that they know which potential obfuscation methods were used, even if the identifier makes mistakes in analysing which anonymisation method was used.
See also
*
Adversarial machine learning
Adversarial machine learning is the study of the attacks on machine learning algorithms, and of the defenses against such attacks. A recent survey exposes the fact that practitioners report a dire need for better protecting machine learning syste ...
*
Author profiling
Author profiling is the analysis of a given set of texts in an attempt to uncover various characteristics of the author based on stylistic- and content-based features, or to identify the author. Characteristics analysed commonly include age and ...
*
De-identification
*
Digital watermarking
A digital watermark is a kind of marker covertly embedded in a noise-tolerant signal such as audio, video or image data. It is typically used to identify ownership of the copyright of such signal. "Watermarking" is the process of hiding digital inf ...
*
Online identity management Online identity management (OIM), also known as online image management, online personal branding, or personal reputation management (PRM), is a set of methods for generating a distinguished Web presence of a person on the Internet. Online identity ...
*
Operational security
Operations security (OPSEC) is a process that identifies critical information to determine if friendly actions can be observed by enemy intelligence, determines if information obtained by adversaries could be interpreted to be useful to them, a ...
*
Steganography
Steganography ( ) is the practice of representing information within another message or physical object, in such a manner that the presence of the information is not evident to human inspection. In computing/electronic contexts, a computer file, ...
References
Bibliography
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
* {{ Cite book , doi = 10.18653/v1/2022.acl-long.509 , doi-access = free , arxiv = 2203.11849 , chapter = A Girl Has A Name, And It's ... Adversarial Authorship Attribution for Deobfuscation , title = Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers) , year = 2022 , last1 = Zhai , first1 = Wanyue , last2 = Rusert , first2 = Jonathan , last3 = Shafiq , first3 = Zubair , last4 = Srinivasan , first4 = Padmini , pages = 7372–7384 , s2cid = 248780012
Computational fields of study
Computational linguistics
Data anonymization techniques
Digital humanities
Counter-forensics
Information privacy
Natural language processing
Quantitative linguistics
Personal identification
Stylistics