{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T00:28:40Z","timestamp":1777854520069,"version":"3.51.4"},"reference-count":63,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2021,5,11]],"date-time":"2021-05-11T00:00:00Z","timestamp":1620691200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Science"],"published-print":{"date-parts":[[2023,4]]},"abstract":"<jats:p>Authorship verification (AV) is one of the main problems of authorship analysis and digital text forensics. The classical AV problem is to decide whether or not a particular author wrote the document in question. However, if there is one and relatively short document as the author\u2019s known document, the verification problem becomes more difficult than the classical AV and needs a generalised solution. Regarding to decide AV of the given two unlabeled documents (2D-AV), we proposed a system that provides an author-independent solution with the help of a Binary Background Model (BBM). The BBM is a supervised model that provides an informative background to distinguish document pairs written by the same or different authors. To evaluate the document pairs in one representation, we also proposed a new, simple and efficient document combination method based on the geometric mean of the stylometric features. We tested the performance of the proposed system for both author-dependent and author-independent AV cases. In addition, we introduced a new, well-defined, manually labelled Turkish blog corpus to be used in subsequent studies about authorship analysis. Using a publicly available English blog corpus for generating the BBM, the proposed system demonstrated an accuracy of over 90% from both trained and unseen authors\u2019 test sets. Furthermore, the proposed combination method and the system using the BBM with the English blog corpus were also evaluated with other genres, which were used in the international PAN AV competitions, and achieved promising results.<\/jats:p>","DOI":"10.1177\/01655515211007710","type":"journal-article","created":{"date-parts":[[2021,5,11]],"date-time":"2021-05-11T03:47:31Z","timestamp":1620704851000},"page":"448-464","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":4,"title":["Binary background model with geometric mean for author-independent authorship verification"],"prefix":"10.1177","volume":"49","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8067-3365","authenticated-orcid":false,"given":"Pelin","family":"Canbay","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, Kahramanmaras Sutcu Imam University, Turkey"}]},{"given":"Ebru A","family":"Sezer","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Hacettepe University, Turkey"}]},{"given":"Hayri","family":"Sever","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Cankaya University, Turkey"}]}],"member":"179","published-online":{"date-parts":[[2021,5,11]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/13.3.111"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21001"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1561\/1500000005"},{"key":"e_1_3_2_5_2","first-page":"1","volume-title":"2013 international conference on computer, information and telecommunication systems, CITS","author":"Brocardo ML","unstructured":"Brocardo ML, Traore I, Saad S, et al. Authorship verification for short messages using stylometry. In: 2013 international conference on computer, information and telecommunication systems, CITS, Athens, 7\u20138 May 2013, pp. 1\u20136. New York: IEEE."},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20961"},{"key":"e_1_3_2_7_2","first-page":"185","article-title":"Breaking the closed-world assumption in stylometric authorship attribution","volume":"730","author":"Stolerman A","year":"2014","unstructured":"Stolerman A, Overdorf R, Afroz S, et al. Breaking the closed-world assumption in stylometric authorship attribution. IFIP Adv Inform Commun Tech 2014; 730: 185\u2013205.","journal-title":"IFIP Adv Inform Commun Tech"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1080\/0013838X.2012.668794"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1162\/089120100750105920"},{"key":"e_1_3_2_10_2","first-page":"313","volume-title":"Hellenic conference on artificial intelligence","author":"Potha N","unstructured":"Potha N, Stamatatos E. A profile-based method for authorship verification. In: Hellenic conference on artificial intelligence (Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)), Ioannina, 15\u201317 May 2014, pp. 313\u2013326. New York: Springer."},{"key":"e_1_3_2_11_2","first-page":"654","volume-title":"Proceedings of the 2019 conference of the North American chapter of the association for computational linguistics: human language technologies, Volume 1 (Long and Short Papers)","author":"Bevendorff J","unstructured":"Bevendorff J, Stein B, Hagen M, et al. Generalizing unmasking for short texts. In: Proceedings of the 2019 conference of the North American chapter of the association for computational linguistics: human language technologies, Volume 1 (Long and Short Papers), Minneapolis, MN, 2\u20137 June 2019, pp. 654\u2013659. Reston, VA: ACL."},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1002\/asi.22954"},{"key":"e_1_3_2_13_2","volume-title":"CEUR workshop proceedings","author":"Pacheco ML","unstructured":"Pacheco ML, Fernandes K, Porco A. Random forest with increased generalization: a universal background approach for authorship verification. In: CEUR workshop proceedings, Turin, 28\u201329 September 2015."},{"key":"e_1_3_2_14_2","volume-title":"CEUR workshop proceedings","author":"H\u00fcrlimann M","unstructured":"H\u00fcrlimann M, Weck B, Van Den Berg E, et al. GLAD: Groningen lightweight authorship detection. In: CEUR workshop proceedings, Turin, 28\u201329 September 2015."},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.13053\/rcs-123-1-1"},{"key":"e_1_3_2_16_2","first-page":"270","volume-title":"Proceedings \u2013 2018 international conference on biometrics, ICB","author":"Neal T","unstructured":"Neal T, Sundararajan K, Woodard D. Exploiting linguistic style as a cognitive biometric for continuous verification. In: Proceedings \u2013 2018 international conference on biometrics, ICB, Gold Coast, QLD, Australia, 20\u201323 February 2018, pp. 270\u2013276. New York: IEEE."},{"key":"e_1_3_2_17_2","volume-title":"CEUR workshop proceedings","author":"Stamatatos E","year":"2015","unstructured":"Stamatatos E, Daelemans W, Verhoeven B, et al. Overview of the author identification task at PAN 2015. In: CEUR workshop proceedings, Turin, 28\u201329 September2015."},{"key":"e_1_3_2_18_2","first-page":"34","volume-title":"Proceedings \u2013 international workshop on database and expert systems applications","author":"Stein B","unstructured":"Stein B, Lipka N, Zu Eissen SM. Meta analysis within authorship verification. In: Proceedings \u2013 international workshop on database and expert systems applications, Turin, 1\u20135 September 2008, pp. 34\u201339. New York: IEEE."},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2604213"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2016.01.006"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2007.05.012"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23648"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10579-009-9111-2"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/fqq013"},{"key":"e_1_3_2_25_2","unstructured":"Stamatatos E Daelemans W Verhoeven B et al. Overview of the author identification task at PAN 2014. In: CEUR workshop proceedings 2014 pp. 877\u2013897 http:\/\/ceur-ws.org\/Vol-1180\/CLEF2014wn-Pan-StamatosEt2014.pdf"},{"key":"e_1_3_2_26_2","first-page":"489","volume-title":"Proceedings, Twenty-first International Conference on Machine Learning, ICML","author":"Koppel M","unstructured":"Koppel M, Schler J. Authorship verification as a one-class classification problem. In: Proceedings, Twenty-first International Conference on Machine Learning, ICML, Banff, AB, Canada, 4\u20138 July 2004, pp. 489\u2013495. New York: ACM."},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.3115\/1610075.1610142"},{"key":"e_1_3_2_28_2","unstructured":"Seidman S. Authorship verification using the impostors method: notebook for PAN at CLEF 2013. In: CEUR workshop proceedings 2013 https:\/\/www.semanticscholar.org\/paper\/Authorship-Verification-Using-the-Impostors-Method-Seidman\/5a187ab7408799a4f8dbe141ea50e961b1a2f862"},{"key":"e_1_3_2_29_2","first-page":"138","volume-title":"International conference of the cross-language evaluation forum for European Languages","author":"Potha N","unstructured":"Potha N, Stamatatos E. An improved impostors method for authorship verification. In: International conference of the cross-language evaluation forum for European Languages (Lecture Notes in Computer Science), Dublin, Ireland, 11\u201314 September 2017, pp138\u2013144. New York: Springer."},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-019-01408-4"},{"key":"e_1_3_2_31_2","volume-title":"CLEF 2013 evaluation labs and workshop \u2013 working notes papers","author":"Juola P","unstructured":"Juola P, Stamatatos E. Overview of the author identification task. In: CLEF 2013 evaluation labs and workshop \u2013 working notes papers, Valencia, 23\u201326 September 2013."},{"key":"e_1_3_2_32_2","unstructured":"PAN. Authorship Verification2020 2020 https:\/\/pan.webis.de\/clef20\/pan20-web\/author-identification.html"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1002\/asi.24163"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23968"},{"key":"e_1_3_2_35_2","first-page":"289","volume-title":"International conference on computational linguistics and intelligent text processing","author":"Markov I","unstructured":"Markov I, Stamatatos E, Sidorov G. Improving cross-topic authorship attribution: the role of pre-processing. In: International conference on computational linguistics and intelligent text processing, Budapest, 17\u201323 April 2017, pp. 289\u2013302. New York: Springer."},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0021"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1006\/dspr.1999.0361"},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6393(95)00009-D"},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/fqi067"},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/fqm020"},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/1187415.1187416"},{"key":"e_1_3_2_42_2","volume-title":"CEUR Workshop Proceedings","author":"Halvani O","unstructured":"Halvani O, Steinebach M, Zimmermann R. Authorship verification via k-nearest neighbor estimation: notebook for PAN at CLEF 2013. In: CEUR Workshop Proceedings, Valencia, 23\u201326 September 2013."},{"key":"e_1_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1023\/B:CHUM.0000009225.28847.77"},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1177\/0165551515620551"},{"key":"e_1_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20750"},{"key":"e_1_3_2_46_2","first-page":"86","article-title":"Surveying stylometry techniques and applications","volume":"50","author":"Neal T","year":"2017","unstructured":"Neal T, Sundararajan K, Fatima A, et al. Surveying stylometry techniques and applications. ACM Comput Surv 2017; 50: 86.","journal-title":"ACM Comput Surv"},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2603960"},{"key":"e_1_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.1038\/119152a0"},{"key":"e_1_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.70"},{"key":"e_1_3_2_50_2","volume-title":"33rd international conference on machine learning, ICML","author":"Zadeh PH","unstructured":"Zadeh PH, Hosseini R, Sra S. Geometric mean metric learning. In: 33rd international conference on machine learning, ICML, New York, 19\u201324 June 2016."},{"key":"e_1_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.02.032"},{"key":"e_1_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-018-7319-2"},{"key":"e_1_3_2_53_2","volume-title":"AAAI spring symposium \u2013 technical report","author":"Schler J","unstructured":"Schler J, Koppel M, Argamon S, et al. Effects of age and gender on blogging. In: AAAI spring symposium \u2013 technical report, Stanford, CA, 27\u201329 March 2006."},{"key":"e_1_3_2_54_2","unstructured":"Bischoff S Deckers N Schliebs M et al. The importance of suppressing domain style in authorship analysis 2005 https:\/\/arxiv.org\/abs\/2005.14714"},{"key":"e_1_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98734-7_8"},{"key":"e_1_3_2_56_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2014.12.019"},{"key":"e_1_3_2_57_2","volume-title":"Proceedings of the 12th international conference on availability, reliability and security","author":"Halvani O","unstructured":"Halvani O, Winter C, Graner L. On the usefulness of compression models for authorship verification. In: Proceedings of the 12th international conference on availability, reliability and security, Reggio Calabria, 27\u201330 August 2017."},{"key":"e_1_3_2_58_2","volume-title":"CEUR workshop proceedings","author":"Bagnall D","unstructured":"Bagnall D. Author identification using multi-headed recurrent neural networks. In: CEUR workshop proceedings, Turin, 28\u201329 September 2015."},{"key":"e_1_3_2_59_2","unstructured":"Castro D Adame Y Pelaez M et al. Authorship verification combining linguistic features and different similarity functions Notebook for PAN at CLEF 2015. In: Work Notes CLEF 2015 https:\/\/pan.webis.de\/downloads\/publications\/papers\/castro_2015.pdf"},{"key":"e_1_3_2_60_2","volume-title":"CEUR workshop proceedings","author":"Gutierrez J","unstructured":"Gutierrez J, Casillas J, Ledesma P, et al. Homotopy based classification for author verification task. In: CEUR workshop proceedings, Turin, 28\u201329 September 2015."},{"key":"e_1_3_2_61_2","volume-title":"CEUR workshop proceedings","author":"Kocher M","unstructured":"Kocher M, Savoy J. UniNE at CLEF 2015: author identification. In: CEUR workshop proceedings, Turin, 28\u201329 September 2015."},{"key":"e_1_3_2_62_2","volume-title":"CEUR workshop proceedings","author":"Moreau E","unstructured":"Moreau E, Jayapal A, Lynch G, et al. Author verification: basic stacked generalization applied to predictions from a set of heterogeneous learners. In: CEUR workshop proceedings, Turin, 28\u201329 September 2015."},{"key":"e_1_3_2_63_2","volume-title":"CEUR workshop proceedings","author":"Mechti S","unstructured":"Mechti S, Jaoua M, Faiz R, et al. On the empirical evaluation of author identification hybrid method. In: CEUR workshop proceedings, Turin, 28\u201329 September 2015."},{"key":"e_1_3_2_64_2","doi-asserted-by":"crossref","unstructured":"Bevendorff J Ghanem B Giachanou A et al. Overview of PAN 2020: Authorship Verification Celebrity Profiling Profiling Fake News Spreaders on Twitter and Style Change Detection 2020 https:\/\/pan.webis.de\/downloads\/publications\/papers\/bevendorff_2020.pdf","DOI":"10.1007\/978-3-030-58219-7_25"}],"container-title":["Journal of Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/01655515211007710","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/01655515211007710","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/01655515211007710","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T23:09:17Z","timestamp":1777504157000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/01655515211007710"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,11]]},"references-count":63,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["10.1177\/01655515211007710"],"URL":"https:\/\/doi.org\/10.1177\/01655515211007710","relation":{},"ISSN":["0165-5515","1741-6485"],"issn-type":[{"value":"0165-5515","type":"print"},{"value":"1741-6485","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,11]]}}}