@inproceedings{14bcf51e7c314463ab114d363a5a8ecf,
title = "A comparative study of likelihood ratio based forensic text comparison procedures: Multivariate kernel density with lexical features vs. word N-grams vs. character N-grams",
abstract = "This is a comparative study to empirically investigate the performances of three different procedures for calculating authorship attribution likelihood ratios (LR). The procedures to be compared are: 1) a procedure based on multivariate kernel density (MVKD) with lexical features; 2) a procedure based on word N-grams; and 3) a procedure based on character N-grams. Furthermore, the best-performing LRs of these three procedures are fused into combined single LRs using a logistic-regression fusion, in order to investigate the extent of the improvement/deterioration that the fusion brings about. This study uses chatlog messages, which were presented as evidence to prosecute paedophiles, for testing. The numbers of word tokens used to model the authorship attribution of each message group are 500 and 1000 words. This was done to examine the effect of sample size on the performance of a system. The performance of a system is assessed with regard to its validity (= accuracy) and reliability (= precision) using the log-likelihood-ratio cost (Cllr) and 95% credible intervals (CI), respectively. While describing the different characteristics of these three procedures in their outcomes, this study demonstrates that the MVKD procedure was the best-performing procedure out of the three in terms of Cllr. This study also demonstrates that a logistic-regression fusion is useful for combining the LRs obtained from the three procedures in question, resulting in a good improvement in performance.",
keywords = "95% credible intervals, Tippett plots, character N-grams, forensic text comparison, lexical features, likelihood ratio, log likelihood ratio cost, logistic-regression fusion, multivariate kernel density, word N-grams",
author = "Shunichi Ishihara",
note = "Publisher Copyright: {\textcopyright} 2014 IEEE.; 5th Cybercrime and Trustworthy Computing Conference, CTC 2014 ; Conference date: 24-11-2014 Through 25-11-2014",
year = "2015",
month = apr,
day = "15",
doi = "10.1109/CTC.2014.9",
language = "English",
series = "Proceedings - 5th Cybercrime and Trustworthy Computing Conference, CTC 2014",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "1--11",
booktitle = "Proceedings - 5th Cybercrime and Trustworthy Computing Conference, CTC 2014",
address = "United States",
}