Covert lie detection using keyboard dynamics.

作者: Merylin Monaro , Chiara Galante , Riccardo Spolaor , Qian Qian Li , Luciano Gamberini

DOI: 10.1038/S41598-018-20462-6

关键词: Lie detectionCovertNatural language processingDynamics (music)Artificial intelligenceKeystroke dynamicsIdentity (object-oriented programming)Computer keyboardKeystroke analysisComputer scienceDeception

摘要: Identifying the true identity of a subject in absence external verification criteria (documents, DNA, fingerprints, etc.) is an unresolved issue. Here, we report experiment on fake identities, identified by means their specific keystroke dynamics as analysed written response using computer keyboard. Results indicate that analysis can distinguish liars from truth tellers with high degree accuracy - around 95% thanks to use unexpected questions efficiently facilitate emergence deception clues.

参考文章(32)
Frank Horvath, Detecting deception: the promise and the reality of voice stress analysis. Journal of Forensic Sciences. ,vol. 27, pp. 340- 351 ,(1982) , 10.1520/JFS11488J
M. Karnan, M. Akila, N. Krishnaraj, Review Article: Biometric personal authentication using keystroke dynamics: A review soft computing. ,vol. 11, pp. 1565- 1573 ,(2011) , 10.1016/J.ASOC.2010.08.003
Kathryn Hempstalk, Eibe Frank, Ian H. Witten, One-Class Classification by Combining Density and Class Probability Estimation european conference on machine learning. ,vol. 5211, pp. 505- 519 ,(2008) , 10.1007/978-3-540-87479-9_51
John C. Platt, Fast training of support vector machines using sequential minimal optimization Advances in kernel methods. pp. 185- 208 ,(1999)
John R. Douceur, The Sybil Attack international workshop on peer to peer systems. pp. 251- 260 ,(2002) , 10.1007/3-540-45748-8_24
Gary L. J. Lancaster, Aldert Vrij, Lorraine Hope, Bridget Waller, Sorting the liars from the truth tellers: the benefits of asking unanticipated questions on lie detection Applied Cognitive Psychology. ,vol. 27, pp. 107- 114 ,(2013) , 10.1002/ACP.2879
Bruno Verschuere, Bennett Kleinberg, ID-Check: Online Concealed Information Test Reveals True Identity. Journal of Forensic Sciences. ,vol. 61, pp. 237- 240 ,(2016) , 10.1111/1556-4029.12960
Niels Landwehr, Mark Hall, Eibe Frank, Logistic Model Trees Machine Learning. ,vol. 59, pp. 161- 205 ,(2005) , 10.1007/S10994-005-0466-3
Fei Tony Liu, Kai Ming Ting, Zhi-Hua Zhou, Isolation-Based Anomaly Detection ACM Transactions on Knowledge Discovery from Data. ,vol. 6, pp. 1- 39 ,(2012) , 10.1145/2133360.2133363
M. Conti, R. Poovendran, M. Secchiero, FakeBook: Detecting Fake Profiles in On-Line Social Networks advances in social networks analysis and mining. pp. 1071- 1078 ,(2012) , 10.1109/ASONAM.2012.185