[1]XIA Fan,WANG Hong.Methodologies for deception detection based on abnormal b ehavior[J].CAAI Transactions on Intelligent Systems,2007,2(5):12-19.
Copy

Methodologies for deception detection based on abnormal b ehavior

References:
[1] GUGAS C. The silent witness[M]. PrenticeHall, 1979.
[2]MASCHKE G W, SCALABRINI G J. The lie behind the lie detector[M]. 4th ed . AntiPolygraph.org, 2005.
[3]GAVRILA D. The visual analysis of human movement: A survey[J]. Compute r Vis ion and Image Understanding, 1999, 73(1):82-98.
[4]FREEMAN W, WEISSMAN C. Television control by hand gestures[A]. Proc Inte rnat ional Conference on Automatic Face and Gesture Recognition[C]. Zurich, Switzer land, 1995.
[5]REMAGNINO P, TAN T, BAKER K.MultiAgent visual surveillance of dynamic sc enes[J]. Image and Vision Computing, 1998, 16(8):529-532
[6]DEPAULO B, LINDSAY J, MALONE B, et al. Cues to deception[J]. Psychologica l Bulletin, 2003, 129:74-118.
[7]EKMAN P, FRIESEN W V. Nonverbal leakage and clues to deception[J]. Psyc hiatry, 1969, 32:88-106.
[8]ZUCKERMAN M, DRIVER R. Telling lies: verbal and nonverbal correlates of de ce ption[A]. Nonverbal Communication: An Integrated Perspective[C]. Hillsdale, NJ: Erlbaum, 1985.
[9]BULLER D B, BURGOON J K, WHITE C, et al. Interpersonal deception: VII. beha vi oral profiles of falsification, equivocation and concealment[J]. Journal of La nguage and Social Psychology, 1994, 13:366-395.
[10]VRIJ A, EDWARD K, ROBERTS K, et al. Detecting deceit via analysis of verba l and nonverbal behavior[J]. Journal of Nonverbal Behavior, 2000, 24:239-263. 
[11]VRIJ A. Detecting lies and deceit: the psychology of lying and its implica tions for professional practice[M]. Chichester, UK: John Wiley, 2000.
[12]EKMAN P. Telling lies: Clues to deceit in the marketplace, politics, and marriage[M]. New York: WW Norton and Company, 2001.
[13]LINDSAY J, MALONE B, MUHLENBRUCK L, et al. Cues to deception[J]. Psycho logical Bulletin, 2003, 129:74-118.
[14]ZUCKERMAN M, DEPAULO B, ROSENTHAL R. Verbal and nonverbal communication o f deception[J]. Advances in Experimental Social Psychology, 1981, 14:1-59.
[15]BULLER D, BURGOON J. Interpersonal deception theory[J]. Communication T heory, 1996, 6:203-242.
[16]GEORGE J, BIROS D P, BURGOON J K, et al. Training professionals to detect d eception[A]. NSF/NIJ Symposium on Intelligence and Security Informatics[C]. Tucson , AZ, 2003.
[17]MATTHEW L J, THOMAS O M, JOHN K, et al. Identification of deceptive beh av ioral cues extracted from video[A]. Proc IEEE International Conference on Inte lligent Transportation Systems[C] .Vienna, Austria, 2005.
[18]BURGOON J K, BLAIR J P, MOYER E. Effects of communication modality on arou sa l, cognitive complexity, behavioral control and deception detection during decep tive episodes[A]. Annual Meeting of the National Communication Association[C ]. Miami Beach, USA, 2003.
[19]BURGOON J K, ADKINS J, KRUSE M, et al. An approach for intent identificat io n by building on deception detection[A]. Proc Hawaii International Conference on System Sciences[C].Hawaii, USA, 2005.
[20]THOMAS O M, MATTHEW L J. Deception detection through automatic, unob trusi ve analysis of nonverbal behavior[J]. IEEE Intelligent Systems, 2005, 20(5):36-4 3.
[21]TSECHPENAKIS G, METAXAS D, ADKINS M, et al. HMM-based deception recogniti on from visual cues[A]. IEEE International Conference on Multimedia and Expo[C ]. Amsterdam, Netherlands,2005.
[22]SHAN L, TSECHPENAKIS G, METAXAS D N. Blob analysis of the head and hands: a method for deception detection[A]. Proc Hawaii International Conference on Sy stem Sciences[C]. Hawaii, USA, 2005.
[23]DENTE E, NG J, VRIJ A, et al. Tracking small hand movements in interview si tuations[J]. IEEE International Symposium on Imaging for Crime Detection and P revention, 2005, 35(2):55-60.
[24]BUDDHARAJU P, DOWDALL J,TSIAMYRTZIS G, et al. Automatic thermal monitori ng system (ATHEMOS) for deception detection[A]. Proc IEEE Computer Society Confe rence on Computer Vision and Pattern Recognition[C]. Washington, DC, USA, 2005 .
[25]WYSZECKI G, STILES W. Color science: concepts and methods, quantitative d ata and formulae[M]. 2nd ed. Chichester: John Wiley & Sons , 2000.
[26]YAO H, LIU M, GAO W, et al. Method of face locating and tracking based o n chromatic coordinates transformation of color images[J]. Chinese J Computers, 2000, 23(2):158-165.
[27]LIEVIN M, LUTHON F. Nonlinear color space and spatiotemporal MRF for hier ar chical segmentation of face features in video[J]. IEEE Transactions on Image P rocessing, 2004, 13(1):63-67.
[28]FORD A, ROBERTS A. Colour space conversions[R]. Westm inster University, London, 1998.
[29]HSU L, ABDEL M, JAIN A. Face detection in color images[J]. IEEE Transac tions on Pattern Analysis and Machine Intelligence, 2002, 24(5):696-706.
[30]LEE J Y, YOO S I. An elliptical boundary model for skin color detection[ A]. Proc International Conference on Imaging Science, Systems and Technology[C]. Las Vegas, USA, 2 002.
[31]VEZHNEVETS V, SAZONOV V, ANDREEVA A. A survey on pixel-based skin color d etection techniques[A]. Proc Graphicon-2003[C]. Moscow, Russia, 2003.
[32]PHUNG S L, BOUZERDOUM A, CHAI D. Skin segmentation using color and edge i nf ormation[A]. Proc Int Symposium on Signal Processing and its Applications[C] . Paris, France, 2003.
[33]RUIZ DEL S, VERSCHAE R. Skin detection using neighborhood informati on [A]. Proc IEEE International Conference on Automatic Face and Gesture Recognit ion [C]. Seoul, Korea, 2004.
[34]CHEN Y, CHEN F. Skin detection based on color and texture[J]. Computer Aided Engineering, 2006, 15(2):
[35]WELCH G, BISHOP G. An introduction to the Kalman filter[R]. SIGGRAPH Cou rse Notes, Los Angeles, California, USA, 2001. 
[36]ISARD M , BLAKE A. Condensationconditional density propagation for visua l tracking[J]. International Journal of Computer Vision, 1998, 29(1):5-28.
[37]PAVLOVICC V, REHG J, CHAM T J , et al. A dynamic bayesian network approac h to figure tracking using learned dynamic models[A]. Proc IEEE International Co nference on Computer Vision[C]. Corfu, Greece, 1999.
[38]WANG L, HU W, TAN T. A survey of visual analysis of human motion[J]. Ch inese Journal of Computers, 2002, 25(3):225-237.
[39]PARAGIOS N, DERICHE R. Geodesic active contours and level sets for the d et ection and tracking of moving objects[J]. IEEE Trans Pattern Analysis and Mach ine Intelligence, 2000, 22(3):266-280.
[40]MYERS C, RABINIER L, ROSENBERG A. Performance tradeoffs in dynamic time w ar ping algorithms for isolated word recognition[J]. IEEE Trans Acoustics, Speech , and Signal Processing, 1980, 28(6):623-635.
[41]BOBICK A, WILSON A. A statebased technique for the summarization and rec og nition of gesture[A]. Proc International Conference on Computer Vision[C]. C ambridge, 1995.
[42]TAKAHASHI K, SEKI S, et al. Recognition of dexterous manipulations from t im e varying images[A]. Proc IEEE Workshop on Motion of Non-Rigid and Articulated Objects[C].Austin, 1994.
【43]PORITZ A. Hidden Markov models: a guided tour[A]. Proc IEEE Internati on al Conference on Acoustics, Speech and Signal Processing[C]. New York, 1988.
[44]RABINIER L. A tutorial on hidden Markov models and selected applications in speech recognition[J]. Proceedings of the IEEE, 1989, 77(2):257-285.
[45]STARNER T, PENTLAND A. Realtime american sign language recognition from vi deo using hidden Markov models[A]. Proc International Symposium on Computer Vi sion[C]. Cral Gables, Florida, 1995.
[46]ROSENBLUM M, YACOOB Y, DAVIS L. Human emotion recognition from motion usi ng a radial basis function network architecture[A]. Proc IEEE Workshop on Motion of NonRigid and Articulated Objects[C].Austin, 1994.
[47]KOJIMA. Generating natural language description of human behaviors fr om video images[A]. Proc IEEE International Conference on Pattern Recognition [C]. Barcelona, 2000.
[48]BOIMAN O, IRANI M. Detecting irregularities in images and in video[A]. Proc IEEE International Conf on Computer Vision[C]. Beijing, China, 2005.
[49]KILLBAR. Rules of mafia game[EB/OL]. [2007110]. http://www.killbar.com/intro.htm.
Similar References:

Memo

-

Last Update: 2009-05-07

Copyright © CAAI Transactions on Intelligent Systems