{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:31:59Z","timestamp":1725564719133},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642155666"},{"type":"electronic","value":"9783642155673"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15567-3_34","type":"book-chapter","created":{"date-parts":[[2010,9,5]],"date-time":"2010-09-05T10:56:26Z","timestamp":1283684186000},"page":"462-475","source":"Crossref","is-referenced-by-count":21,"title":["Motion Profiles for Deception Detection Using Visual Cues"],"prefix":"10.1007","author":[{"given":"Nicholas","family":"Michael","sequence":"first","affiliation":[]},{"given":"Mark","family":"Dilsizian","sequence":"additional","affiliation":[]},{"given":"Dimitris","family":"Metaxas","sequence":"additional","affiliation":[]},{"given":"Judee K.","family":"Burgoon","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","volume-title":"Telling lies: Clues to deceit in the marketplace, politics, and marriage","author":"P. Ekman","year":"1992","unstructured":"Ekman, P.: Telling lies: Clues to deceit in the marketplace, politics, and marriage, vol.\u00a02. WW Norton and Company, New York (1992)"},{"key":"34_CR2","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Singh, V., Slowe, T.E., Tulyakov, S., Govindaraju, V.: Real-time automatic deceit detection from involuntary facial expressions. In: IEEE CVPR (2007)","DOI":"10.1109\/CVPR.2007.383383"},{"key":"34_CR3","doi-asserted-by":"crossref","unstructured":"George, J., Biros, D.P., Burgoon, J.K., Nunamaker, J.: Training professionals to detect deception. In: NSF\/NIJ Symposium on Intelligence and Security Informatics, Tucson, AZ (2003)","DOI":"10.1007\/3-540-44853-5_31"},{"key":"34_CR4","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1037\/0033-2909.129.1.74","volume":"129","author":"B. DePaulo","year":"2003","unstructured":"DePaulo, B., Lindsay, J., Muhlenbruck, L., Charlton, K., Cooper, H.: Cues to deception. Psychological Bulletin\u00a0129, 74\u2013118 (2003)","journal-title":"Psychological Bulletin"},{"key":"34_CR5","volume-title":"Detecting lies and deceit: The psychology of lying and its implications for professional practice","author":"A. Vrij","year":"2000","unstructured":"Vrij, A.: Detecting lies and deceit: The psychology of lying and its implications for professional practice. Wiley, Chichester (2000)"},{"key":"34_CR6","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1177\/0261927X94134002","volume":"13","author":"D. Buller","year":"1994","unstructured":"Buller, D., Burgoon, J., White, C., Ebesu, A.: Interpersonal deception: VII. Behavioral Profiles of Falsification, Equivocation and Concealment. Journal of Language and Social Psychology\u00a013, 366\u2013395 (1994)","journal-title":"Journal of Language and Social Psychology"},{"key":"34_CR7","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/BF00987486","volume":"12","author":"P. Ekman","year":"1988","unstructured":"Ekman, P.: Lying and nonverbal behavior: Theoretical issues and new findings. Journal of Nonverbal Behavior\u00a012, 163\u2013176 (1988)","journal-title":"Journal of Nonverbal Behavior"},{"key":"34_CR8","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1023\/A:1006610329284","volume":"24","author":"A. Vrij","year":"2000","unstructured":"Vrij, A., Edward, K., Roberts, K., Bull, R.: Detecting deceit via analysis of verbal and nonverbal behavior. Journal of Nonverbal Behavior\u00a024, 239\u2013263 (2000)","journal-title":"Journal of Nonverbal Behavior"},{"key":"34_CR9","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1111\/j.1468-2958.1978.tb00603.x","volume":"4","author":"J.K. Burgoon","year":"1978","unstructured":"Burgoon, J.K.: A communication model of personal space violations: Explication and an initial test. Human Communication Research\u00a04, 129\u2013142 (1978)","journal-title":"Human Communication Research"},{"key":"34_CR10","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1111\/j.1468-2885.1996.tb00127.x","volume":"6","author":"D. Buller","year":"1996","unstructured":"Buller, D., Burgoon, J.: Interpersonal deception theory. Communication Theory\u00a06, 203\u2013242 (1996)","journal-title":"Communication Theory"},{"key":"34_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1007\/11427995_16","volume-title":"Intelligence and Security Informatics","author":"T.O. Meservy","year":"2005","unstructured":"Meservy, T.O., Jensen, M.L., Kruse, J., Burgoon, J.K., Nunamaker, J.F.: Automatic Extraction of Deceptive Behavioral Cues from Video. In: Kantor, P., Muresan, G., Roberts, F., Zeng, D.D., Wang, F.-Y., Chen, H., Merkle, R.C. (eds.) ISI 2005. LNCS, vol.\u00a03495, pp. 198\u2013208. Springer, Heidelberg (2005)"},{"key":"34_CR12","first-page":"1179","volume":"2","author":"P. Buddharaju","year":"2005","unstructured":"Buddharaju, P., Dowdall, J., Tsiamyrtzis, P., Shastri, D., Pavlidis, I., Frank, M.G.: Automatic thermal monitoring system (ATHEMOS) for deception detection. IEEE CVPR\u00a02, 1179 (2005)","journal-title":"IEEE CVPR"},{"key":"34_CR13","doi-asserted-by":"publisher","first-page":"878","DOI":"10.1016\/j.neuropsychologia.2003.12.005","volume":"42","author":"R. Johnson","year":"2004","unstructured":"Johnson, R., Barnhardt, J., Zhu, J.: The contribution of executive processes to deceptive responding. Neuropsychologia\u00a042, 878\u2013901 (2004)","journal-title":"Neuropsychologia"},{"key":"34_CR14","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1016\/j.biopsych.2005.07.040","volume":"58","author":"F.A. Kozel","year":"2005","unstructured":"Kozel, F.A., Johnson, K.A., Mu, Q., Grenesko, E.L., Laken, S.J., George, M.S.: Detecting deception using functional magnetic resonance imaging. Biological Psychiatry\u00a058, 605\u2013613 (2005)","journal-title":"Biological Psychiatry"},{"key":"34_CR15","doi-asserted-by":"publisher","first-page":"830","DOI":"10.1093\/cercor\/13.8.830","volume":"13","author":"G. Ganis","year":"2003","unstructured":"Ganis, G., Kosslyn, S.M., Stose, S., Thompson, W.L., Yurgelun-Todd, D.A.: Neural correlates of different types of deception: An fmri investigation. Cerebral Cortex\u00a013, 830\u2013836 (2003)","journal-title":"Cerebral Cortex"},{"key":"34_CR16","volume-title":"Hawaii International Conference on System Sciences","author":"S. Lu","year":"2005","unstructured":"Lu, S., Tsechpenakis, G., Metaxas, D., Jensen, M.L., Kruse, J.: Blob analysis of the head and hands: A method for deception detection and emotional state identification. In: Hawaii International Conference on System Sciences, Big Island, Hawaii (2005)"},{"key":"34_CR17","first-page":"824","volume-title":"IEEE ICME","author":"G. Tsechpenakis","year":"2005","unstructured":"Tsechpenakis, G., Metaxas, D., Adkins, M., Kruse, J., Burgoon, J., Jensen, M., Meservy, T., Twitchell, D., Deokar, A., Nunamaker, J.: HMM-based deception recognition from visual cues. In: IEEE ICME, pp. 824\u2013827. IEEE, Los Alamitos (2005)"},{"key":"34_CR18","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/5.18626","volume":"77","author":"L.R. Rabiner","year":"1989","unstructured":"Rabiner, L.R.: A tutorial on hidden markov models and selected applications in speech recognition. Proceedings of the IEEE\u00a077, 257\u2013286 (1989)","journal-title":"Proceedings of the IEEE"},{"key":"34_CR19","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1080\/00332747.1969.11023575","volume":"32","author":"P. Ekman","year":"1969","unstructured":"Ekman, P., Friesen, W.V.: Nonverbal leakage and clues to deception. Psychiatry\u00a032, 88\u2013106 (1969)","journal-title":"Psychiatry"},{"key":"34_CR20","doi-asserted-by":"crossref","first-page":"396","DOI":"10.1177\/0261927X94134003","volume":"13","author":"D.B. Buller","year":"1994","unstructured":"Buller, D.B., Burgoon, J.K., Buslig, A., Roiger, J.: Interpersonal deception: Viii. nonverbal and verbal correlates of equivocation from the bavelas et al (1990); research. Journal of Language and Social Psychology\u00a013, 396\u2013417 (1994)","journal-title":"Journal of Language and Social Psychology"},{"key":"34_CR21","doi-asserted-by":"crossref","unstructured":"Kanaujia, A., Huang, Y., Metaxas, D.: Tracking facial features using mixture of point distribution models. In: ICVGIP (2006)","DOI":"10.1007\/11949619_44"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2010"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15567-3_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,2]],"date-time":"2019-12-02T08:39:09Z","timestamp":1575275949000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15567-3_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642155666","9783642155673"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15567-3_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}