2018
DOI: 10.1038/s41598-018-20462-6
|View full text |Cite
|
Sign up to set email alerts
|

Covert lie detection using keyboard dynamics

Abstract: Identifying the true identity of a subject in the absence of external verification criteria (documents, DNA, fingerprints, etc.) is an unresolved issue. Here, we report an experiment on the verification of fake identities, identified by means of their specific keystroke dynamics as analysed in their written response using a computer keyboard. Results indicate that keystroke analysis can distinguish liars from truth tellers with a high degree of accuracy - around 95% - thanks to the use of unexpected questions … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

2
30
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
4
1

Relationship

3
6

Authors

Journals

citations
Cited by 38 publications
(33 citation statements)
references
References 31 publications
2
30
0
1
Order By: Relevance
“…In order to avoid model hacking, one strategy is to verify that classification accuracy is not changing much among different classes of classifiers (see Monaro et al, 2018) as follows: if similar results are obtained by ML models relying on radically different assumptions, we may be relatively confident that the results are not dependent on such assumptions. Additionally, model stability may be addressed by combining different classifiers into an ensemble classifier that indeed reduces the variance in out-of-sample predictions and therefore gives more reliable predictions.…”
Section: Model-hacking In Machine Learningmentioning
confidence: 99%
See 1 more Smart Citation
“…In order to avoid model hacking, one strategy is to verify that classification accuracy is not changing much among different classes of classifiers (see Monaro et al, 2018) as follows: if similar results are obtained by ML models relying on radically different assumptions, we may be relatively confident that the results are not dependent on such assumptions. Additionally, model stability may be addressed by combining different classifiers into an ensemble classifier that indeed reduces the variance in out-of-sample predictions and therefore gives more reliable predictions.…”
Section: Model-hacking In Machine Learningmentioning
confidence: 99%
“…The above reported examples refer to the recent applications of ML and Deep Learning methods in psychological science that are emerging mainly outside the academic arena. However, the number of experiments reported in academic journals that use ML as analytical tools to complement statistical analysis is also increasing (Kosinski et al, 2013;Monaro et al, 2018;Pace et al, 2019). Machine learning has been successfully applied, for example, in the analysis of imaging data in order to classify psychiatric disorders (Orrù et al, 2012;Vieira et al, 2017), in genetics (Libbrecht and Noble, 2015;Navarin and Costa, 2017), in clinical medicine (Obermeyer and Emanuel, 2016), in forensic sciences (Pace et al, 2019) etc.…”
Section: Introductionmentioning
confidence: 99%
“…Cognitive-based lie detection capitalizes on the additional cognitive effort that lying requires compared with truth telling. To date, three main cognitive-based lie techniques have been applied to faked identity detection: the Concealed Information Test (CIT-RT; Verschuere and Kleinberg, 2016 ), the autobiographical Implicit Association Test (aIAT; Agosta and Sartori, 2013 ), and the technique of unexpected questions merged with mouse dynamics or keystroke dynamics (Monaro et al, 2017b , 2018 ). Both the CIT-RT (Verschuere et al, 2011 ) and aIAT (Sartori et al, 2008 ) are memory detection techniques.…”
Section: Introductionmentioning
confidence: 99%
“…In the most recent literature about deception, a certain number of studies have focused on the detection of faked identity (Monaro et al, 2017c;Monaro et al, 2017d;Monaro et al, 2018a;Verschuere & Kleinberg, 2016). This trend follows the growing need to detect people who cross international borders using fraudulent documents (Hickey, 2015).…”
Section: Introductionmentioning
confidence: 99%