Skip to main content

Automatic Extraction of Deceptive Behavioral Cues from Video

  • Chapter
Terrorism Informatics

Part of the book series: Integrated Series In Information Systems ((ISIS,volume 18))

This chapter provides an overview of an initial investigation into a novel approach for deriving indicators of deception from video-taped interactions. The team utilized two-dimensional spatial inputs extracted from video to construct a set of discrete and inter-relational features. The features for thirty-eight video interactions were then analyzed using discriminant analysis. Additionally, features were used to build a multivariate regression model. Through this exploratory research, the team established the validity of the approach and identified a number of promising features and future research directions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Ben-Shakhar, G. and E. Elaad (2003). "The Validity of Psychophysiological Detection of Information with the Guilty Knowledge Test: A Meta-Analytic Review." Journal of Applied Psychology 88(1): 131-151.

    Article  Google Scholar 

  • Buller, D., J. Burgoon, et al. (1994). "Interpersonal Deception: VII. Behavioral Profiles of Falsification, Equivocation and Concealment." Journal of Language and Social Psychology 13(4): 366-395.

    Article  Google Scholar 

  • Buller, D. B. and J. K. Burgoon (1994). Deception: Strategic and nonstrategic communication. Strategic interpersonal communication. J. A. Daly and J. M. Wiemann. Hillsdale, NJ, Erlbaum: 191-223.

    Google Scholar 

  • Buller, D. B. and J. K. Burgoon (1996). "Interpersonal Deception Theory." Communication Theory 6: 203-242.

    Article  Google Scholar 

  • Burgoon, J. K., M. Adkins, et al. (2005). An Approach for Intent Identification by Building on Deception Detection. Hawaii International Conference on System Science (HICSS'05), Hawaii.

    Google Scholar 

  • Burgoon, J. K., J. P. Blair, et al. (2003). Effects of Communication Modality on Arousal, Cognitive Complexity, Behavioral Control and Deception Detection During Deceptive Episodes. Annual Meeting of the National Communication Association, Miami Beach, Florida.

    Google Scholar 

  • Burgoon, J. K., J. P. Blair, et al. (2003). Detecting Deception through Linguistic Analysis. NSF/NIJ Symposium on Intelligence and Security Informatics.

    Google Scholar 

  • DePaulo, B., J. Lindsay, et al. (2003). "Cues To Deception." Psychological Bulletin 129(1): 74-118.

    Article  Google Scholar 

  • Duda, R. O., P. E. Hart, et al. (2001). Pattern Classification. New York, Wiley.

    Google Scholar 

  • Ekman, P. and W. V. Friesen (1969). "Nonverbal Leakage and Clues to Deception." Psychiatry 32: 88-105.

    Google Scholar 

  • Ganis, G., S. M. Kosslyn, et al. (2003). "Neural Correlates of Different Types of Deception: An fMRI Investigation." Cerebral Cortex 13(8): 830-836.

    Article  Google Scholar 

  • Izzetoglu, K., G. Yurtsever, et al. (2003). NIR spectroscopy measurements of cognitive load elicited by GKT and target categorization.

    Google Scholar 

  • Jensen, M. L., T. O. Meservy, et al. (2005). Identification of Deceptive Behavioral Cues Extracted from Video. International IEEE Conference on Intelligent Transportation Systems, Vienna, Austria.

    Google Scholar 

  • Johnson, R., J. Barnhardt, et al. (2004). "The contribution of executive processes to deceptive responding." Neuropsychologia 42: 878-901.

    Article  Google Scholar 

  • Levine, T. R., T. H. Feeley, et al. (2005). "Testing the Effects of Nonverbal Behavior Training on Accuracy in Deception Detection with the Inclusion of a Bogus Training Control Group." Western Journal of Communication 69(3): 203-217.

    Article  Google Scholar 

  • Lu, S., G. Tsechpenakis, et al. (2005). Blob Analysis of the Head and Hands: A Method for Deception Detection. Hawaii International Conference on System Science (HICSS'05), Hawaii.

    Google Scholar 

  • Maruven, M. and R. F. Baumeister (2000). "Self-Regulation and Depletion of Limited Resources: Does Self-Control Resemble a Muscle." Psyhcological Bulletin 126(2): 247.

    Article  Google Scholar 

  • Masip, J., E. Garrido, et al. (2004). "Defining deception." Anales de Psicología 20(1): 147-171.

    Google Scholar 

  • Meservy, T., M. L. Jensen, et al. (2005). "Deception Detection through Automatic, Unobtrusive Analysis of Nonverbal Behavior." IEEE Intelligent Systems (September/October).

    Google Scholar 

  • Meservy, T. O., M. L. Jensen, et al. (2006). Detecting Deception in a Security Screening Scenario. Thirty-Ninth Annual Hawaii International Conference on System Sciences (CD/ROM), Kauai, Hawaii, IEEE Computer Society Press.

    Google Scholar 

  • Schacter, D. L., K. A. Norman, et al. (1998). "The cognitive neuroscience of constructive memory." Annual Review of Psychology 49(30): 289.

    Article  Google Scholar 

  • Tippett, R. G. (1994). "A Comparison Between Decision Accuracy Rates Obtained Using the Polygraph Instrument and the Computer Voice Stress Analyzer in the Absence of Jeopardy." Retrieved September, 2003, from: http://campus.umr.edu/police/cvsa/compar1.htm.

  • Villringer, A. (1993). "Near infrared spectroscopy (NIRS): a new tool to study hemodynamic changes during activation of brain function in human adults." Neuroscience Letters 154: 101.

    Article  Google Scholar 

  • Vrij, A. (2000). Detecting Lies and Deceit: The Psychology of Lying and the Implications for Professional Practice. West Sussex, John Wily & Sons Ltd.

    Google Scholar 

  • Vrij, A., K. Edward, et al. (2000). "Detecting Deceit via Analysis of Verbal and Nonverbal Behavior." Journal of Nonverbal Behavior 24(4): 239 - 263.

    Article  Google Scholar 

  • Zuckerman, M., B. M. DePaulo, et al. (1981). Verbal and nonverbal communication of deception. Advances in Experimental Social Psychology. L. Berkowitz. New York, Academic: 1-59.

    Google Scholar 

  • Zuckerman, M. and R. E. Driver (1985). Telling Lies: Verbal and Nonverbal Correlates of Deception. Nonverbal Communication: An Integrated Perspective. A. W. Siegman and S. Feldstein. Hillsdale, NJ, Erlbaum: 129-147.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Meservy, T.O., Jensen, M.L., Kruse, W.J., Burgoon, J.K., Nunamaker, J.F. (2008). Automatic Extraction of Deceptive Behavioral Cues from Video. In: Chen, H., Reid, E., Sinai, J., Silke, A., Ganor, B. (eds) Terrorism Informatics. Integrated Series In Information Systems, vol 18. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-71613-8_23

Download citation

Publish with us

Policies and ethics