• Title/Summary/Keyword: 거짓 탐지

Search Result 61, Processing Time 0.025 seconds

Subjective Indicators of Deception Detection in High/Low Stake Situations: Comparison among University Students and Prison Officers and Prisoners (이해득실 상황에 따른 거짓말 탐지에 대한 주관적 지표 - 대학생, 교도관, 재소자들을 대상으로 -)

  • Woo Byoung Jhon;Si Up Kim
    • Korean Journal of Culture and Social Issue
    • /
    • v.11 no.4
    • /
    • pp.1-22
    • /
    • 2005
  • Purposes of this study was as following; What differences do subjective indicators of deception detection according to high and low stake situations? Does groups difference appear in beliefs about deception cues? Is what differences between objective indicators and subjective indicators of deceptions? Participants of this study were consisted of university students, prison officers, prisoners. They completed a questionnaire concerning beliefs about 21 verbal and nonverbal behaviours in high/low-stake situations. For each behaviour, they were asked to rate on a seven-point scale how are these behaviours changed comparing to normal times. The results were that subjective indicators of deception were no differences between high-stake and low-stake situations, and no differences among groups. Also, it appeared that the subjective indicators of deception were substantly different from the objective indicators of deception.

Fuzzy based Path Selection Method for Improving Detection Power in Sensor Networks (센서 네트워크에서 거짓 보고서 탐지 능력을 향상시키기 위한 퍼지 기반의 경로 선택 방법)

  • Seon, Cheong-Il;Jo, Dae-Ho
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2007.11a
    • /
    • pp.304-307
    • /
    • 2007
  • 센서 네트워크 응용 분야에서 센서 노드들은 무인 환경에서 배치되므로, 물리적인 공격들과 노드가 가진 암호 키들이 손상되기 쉬운 취약성을 가진다. 공격자는 노드를 훼손시켜 위조 보고서를 침투 시킬 수 있고, 이는 거짓 경보를 유발시켜 네트워크의 제한된 에너지의 고갈을 야기한다. 이러한 문제점을 보안하기 위해 최근 연구자들은 통계적 여과 기법을 통해서 위조 보고서를 탐지하고 도중에 여과시키는 방안을 제시하였다. 이 제안된 방안에서 각 노드는 검증을 위한 일정한 양의 정보를 가지며, 탐지 능력은 라우팅 경로의 선택에 의해 영향을 받는다. 본 논문에서는, 퍼지를 사용하여 통계적 여과 기법의 위조 보고서 탐지 능력 향상을 위해 네트워크 전체 상황을 고려하여 거짓 보고서 침투 공격에 대해 가장 안전한 경로를 선택하는 방법을 제안한다.

  • PDF

Detecting lies through suspect's nonverbal behaviors in the investigation scene (군 수사현장에서 용의자의 비언어적 행동을 이용한 거짓말 탐지)

  • Si Up Kim;Woo Byoung Jhon;Chung Hyun Jeon
    • Korean Journal of Culture and Social Issue
    • /
    • v.12 no.2
    • /
    • pp.101-114
    • /
    • 2006
  • This study was examined the effective nonverbal behavior cues of detecting suspects' lies in the investigation scene. In order to search the suspects who drank the alcohol liquor without a permission, 18 soldiers were interviewed. 8 solders had drunken alcohol and had lied when was asked(lie group). The other 10 soldiers hadn't drunken alcohol and had told the truth(truth group). The mean frequencies of nonverbal behaviors were compared lie group with truth group. The following behaviors were measured by frequency: vocal characteristics (high pitch of voice, speech hesitations, speech error, frequency of pauses, period of pauses, latency period), facial characteristics (gaze, smile, touching face, blinking, facial micro-expression), body movement (illustrators, hand and finger movement, leg and foot movement, head movement, trunk movement, shifting position). As results, this study found that deception cues were periods and frequencies of pause, micro-expression, head movements. The lie group had less periods and frequencies of pause, and more micro-expression, head movements than truth group. But, this study didn't found Othello's error cues.

The Difference in Pupil Size Responding to Cognitive Load and Emotional Arousal Questions between Guilty and Innocent Groups (유죄 및 무죄 집단 간 인지적 부하 및 정서적 각성 질문에 따른 동공크기의 변화의 차이)

  • Cho, Ara;Kim, Kiho;Lee, Jang-Han
    • Korean Journal of Forensic Psychology
    • /
    • v.11 no.2
    • /
    • pp.155-171
    • /
    • 2020
  • The purpose of this study is to examine the effects of emotional arousal and cognitive load on pupil diameter during a lie detection interview. The guilty group (n = 30) committed a mock crime (i.e., stealing cash) and the innocent group (n = 30) performed a mission (i.e., sending a message) in the research assistant's office. After that, their pupil size was measured using a wearable eye-tracker during the interview. The interview questions were classified with the three cognitive load, three emotional arousal, and three neutral questions. The results indicate that the main effects of group and time were not significant, but the interaction between group and time was significant. It means that when answering cognitive load questions, the guilty group showed larger increase in pupil diameter than the innocent group. The present study suggests that inducing cognitive load is more effective than inducing emotional arousal during an interview when using pupil diameter as an index of deception, and it is expected to improve the accuracy of lie detection.

  • PDF

Lie detector using impedance and pulse signal for smart phone application (생체신호를 이용한 거짓말 탐지기 안드로이드 어플리케이션 제작)

  • Jung, Su-Min;Yang, Yeong-Joong;Eom, Yeong-Seung;Park, Jin-Ho;Ahn, Chang-Beom
    • Proceedings of the KIEE Conference
    • /
    • 2011.07a
    • /
    • pp.17-18
    • /
    • 2011
  • 본 논문에서는 일반적으로 뇌파, 호흡운동, 표정변화, 심전도, 산소포화도, 인체의 땀 등을 이용하여 거짓말 탐지를 하는 것을 근간으로 하여 일상생활에서 쉽게 거짓말 탐지를 할 수 있는 시스템을 제작하여 제시한다. 이 거짓말 탐지기 시스템 제작을 통해 생체신호를 스마트폰과 연동함으로써 건강기기의 또 다른 방향을 제시할 것으로 기대된다.

  • PDF

Design of Real-Time Tracking Filter Function for False Target Elimination (거짓 표적 실시간 제거를 위한 추적 필터 기능 설계)

  • Jeong-Seok Kim;Chae-Hyeon Lim;Dae-Yeon Kim
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.565-566
    • /
    • 2023
  • 적외선 영상에서 정확하게 표적을 포착하기 위해서는 수많은 거짓 표적과 참표적을 실시간으로 구별하고, 최종적으로 참 표적 하나만을 추적 할 수 있어야 한다. 본 논문에서는 추적 게이트의 이동거리 및 이동 방향을 실시간 감시하여 추적 게이트의 이상 움직임 유무를 확인하고, 추적 필터가 설정한 임계값 대비 높은 수치로 이동하거나, 한 방향이 아닌 다양한 방향으로 움직일 경우 해당 게이트를 신속하게 제거하여 거짓 표적에 대한 추적을 방지하도록 하였다. 또한 추적 게이트 이동 거리 및 확장 크기를 동적으로 조절함으로써 표적의 크기 변화와 표적의 움직임에 강인하게 추적 필터가 동작 되도록 설계하였다.

  • PDF

Automated Unit-test Generation for Detecting Vulnerabilities of Android Kernel Modules (안드로이드 커널 모듈 취약점 탐지를 위한 자동화된 유닛 테스트 생성 기법)

  • Kim, Yunho;Kim, Moonzoo
    • Journal of KIISE
    • /
    • v.44 no.2
    • /
    • pp.171-178
    • /
    • 2017
  • In this study, we propose an automated unit test generation technique for detecting vulnerabilities of Android kernel modules. The technique automatically generates unit test drivers/stubs and unit test inputs for each function of Android kernel modules by utilizing dynamic symbolic execution. To reduce false alarms caused by function pointers and missing pre-conditions of automated unit test generation technique, we develop false alarm reduction techniques that match function pointers by utilizing static analysis and generate pre-conditions by utilizing def-use analysis. We showed that the proposed technique could detect all existing vulnerabilities in the three modules of Android kernel 3.4. Also, the false alarm reduction techniques removed 44.9% of false alarms on average.

Detecting Deception Using Neuroscience : A Review on Lie Detection Using Functional Magnetic Resonance Imaging (거짓 탐지와 뇌과학 : 기능적 자기공명영상을 활용한 거짓 탐지)

  • Choi, Yera;Kim, Sangjoon;Do, Hyein;Shin, Kyung-Shik;Kim, Jieun E.
    • Korean Journal of Biological Psychiatry
    • /
    • v.22 no.3
    • /
    • pp.109-112
    • /
    • 2015
  • Since the early 2000s, there has been a continued interest in lie detection using functional magnetic resonance imaging (fMRI) in neuroscience and forensic sciences, as well as in newly emerging fields including neuroethics and neurolaw. Related fMRI studies have revealed converging evidence that brain regions including the prefrontal cortex, anterior cingulate cortex, parietal cortex, and anterior insula are associated with deceptive behavior. However, fMRI-based lie detection has thus far not been generally accepted as evidence in court, as methodological shortcomings, generalizability issues, and ethical and legal concerns are yet to be resolved. In the present review, we aim to illustrate these achievements and limitations of fMRI-based lie detection.

Sybil Attack Detection with Energy Efficiency in Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율적인 시빌 공격 탐지)

  • Heo, Junyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.115-120
    • /
    • 2013
  • There are lots of vulnerability and chance to be attacked in wireless sensor networks, which has many applications. Among those attacks, sybil attack is to generate a lot of false node and to inject false information into networks. When a user uses such false information without recognizing the attack, there might be a disaster. Although authentication method can be used to protect such attack, the method is not a good choice in wireless sensor networks, where sensor nodes have a limited battery and low power. In this paper, we propose a novel method to detect sybil attack with a little extra overhead. The proposed method use the characteristics that there is a weak connection between a group of normal nodes and a group of false nodes. In addition, the method uses energy aware routing based on random routing and adds a little information into the routing. Experimental results show that the proposed method detects false node by more than 90% probability with a little energy overhead.

Performance Evaluation of Review Spam Detection for a Domestic Shopping Site Application (국내 쇼핑 사이트 적용을 위한 리뷰 스팸 탐지 방법의 성능 평가)

  • Park, Jihyun;Kim, Chong-kwon
    • Journal of KIISE
    • /
    • v.44 no.4
    • /
    • pp.339-343
    • /
    • 2017
  • As the number of customers who write fake reviews is increasing, online shopping sites have difficulty in providing reliable reviews. Fake reviews are called review spam, and they are written to promote or defame the product. They directly affect sales volume of the product; therefore, it is important to detect review spam. Review spam detection methods suggested in prior researches were only based on an international site even though review spam is a widespread problem in domestic shopping sites. In this paper, we have presented new review features of the domestic shopping site NAVER, and we have applied the formerly introduced method to this site for performing an evaluation.