Lie Detection

From
Jump to: navigation, search

YouTube search... ...Google search

Predictions of high-level micro-expressions can be used as features for deception prediction. Surprisingly, IDT (Improved Dense Trajectory) features which have been widely used for action recognition, are also very good at predicting deception. DARE: Deception Analysis and Reasoning Engine | Z. Wu, B. Singh, L.S. Davis, and V. S. Subrahmanian

1eIfH2F.png

iBorderCtrl

...Google search

“lie detection” is just a portion of what iBorderCtrl does.

iborderctrl.jpg

The main modules that consist the overall solution are the following:

  • The Automatic Deception Detection System (ADDS)* performs, controls and assesses the pre-registration interview by sequencing a series of questions posed to travellers by an Avatar. ADDS quantifies the probability of deceit in interviews by analysing interviewees non-verbal micro expressions. This, coupled with an avatar, moves this novel approach to deception detection to the pre-registration phase resulting in its deployment without an impact to the time spend at the border crossing by the traveller. The avatar also allows for a consistent and controllable stimuli across interviews in terms of both the verbal and non-verbal from the direction of the avatar agent to the traveller personalized to gender and language of the traveller, reducing variability compared to human interviewers and potentially improving the accuracy of the system. Despite the large use of biometrics on security applications including in border control with the advent of digital passports that contain fingerprints digital images and physical characteristics of individuals, a traveller with ill intentions using own documents, biomarkers would not reveal their attempted deceit. iBorderCtrl deploys well established as well as novel technologies together to collect data that will move beyond biometrics and onto biomarkers of deceit.
  • The Biometrics Module incorporating fingerprints and palm vein technologies (BIO module), for the biometric identity validation of the traveller. The BIO module is used at the Border Crossing and two different scanners are used respectively. In both cases the fingerprints and/or palm vein images are compared to the relevant information stored in databases (legacy systems in the case of fingerprints and creation of a baseline database for palm vein images) in order to assist the Border Guards to validate the traveller’s identity.
  • the Face Matching Tool (FMT), receives images of the traveller (both video type and photo) in order to create at first their biometric signature. This biometric model is compared with future images of similar type obtained from the traveller during both pre-registration phase and border crossing, in order to provide a matching score.
  • The Document Authenticity Analytics Tool (DAAT) is used both at the pre-registration and the border control procedures. DAAT is responsible for the verification procedure of travel documents which the traveller provided himself during the pre-registration procedure and the border guards scanned during the border control check. The security features of travel documents (passport, visa) are examined by DAAT against fraud characteristics in an automated way. Thus, a matching score concerning the validation of the documents authenticity is derived to facilitate the Border Guards to identify fraud characteristics.
  • The Hidden Human Detection Tool (HHD) supports the Border Guard in searching and detecting hidden people inside various vehicles (i.e. passengers attempting illegal border crossing). This tool is foreseen for the Border Crossing procedure to assist the Border Guard in the field. The functionality provided is the detection of humans hidden within vehicles such as cars or closed compartments (containers carried on trucks or train wagons).
  • The External Legacy and Social interfaces system (ELSI), is used to crosscheck the traveller’s information from legacy systems, such as SIS II, providing the necessary interoperability interfaces.
  • The Risk Based Assessment Tool (RBAT), implements a risk–assessment routine which aggregates and correlates the risks estimations received by the processing of the travellers’ data and documents supporting the decision-making of the border guard. RBAT enables a common, harmonised model for risk management and implements a systematic process to stimulate compliance and prevent and/or treat the risk of non-compliance, including risk of fraud and any other risk which appears to threaten the Authorities objectives. RBAT will also identify cases that deserve further investigation, facilitating in this way better resources allocation for the Border Managers and Agents. These risks are key to the performance of the system as they declutter the information provided to the agent by compressing all data into meaningful actionable risk scores that help the agent at the border target any follow up checks and questioning to the traveller.
  • The Integrated Border Control Analytics Tool (BCAT) enables advanced post-hoc analytics that will help identify new patterns and knowledge allowing the iBorderCtrl system to adapt quickly to new situations. At the same time, BCAT will evaluate the performance of each iBorderCtrl system and its effectiveness. BCAT will also discover key patterns in the data associated with either false accept or false rejects of travellers, which can be used for better decision making at border control. BCAT will also provide analysis on traffic data, so that it can provide the traffic history and the expected traffic for certain dates.

iborderctrl-details-1024x700.png