Masks and Mimicry: Strategic Obfuscation and Impersonation Attacks on Authorship Verification