Skip to main content

Poker Bluff Detection Dataset Based on Facial Analysis

  • Conference paper
  • First Online:
Image Analysis and Processing – ICIAP 2022 (ICIAP 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13233))

Included in the following conference series:

  • 1357 Accesses

Abstract

Unstaged data with people acting naturally in real-world scenarios is essential for high-stakes deception detection (HSDD) research. Unfortunately, multiple HSDD studies involve staged scenarios in controlled settings with subjects who were instructed to lie. Using in-the-wild footage of subjects and analyzing facial expressions instead of invasive tracking of biological processes enables the collection of real-world data. Poker is a high-stakes game involving a deceptive strategy called bluffing and is an ideal research subject for improving HSDD techniques. Videos of professional poker tournaments online provide a convenient data source. Because proficiency in HSDD generalizes well for different high-stakes situations, findings from poker bluff detection research have the potential to transfer well to other more practical HSDD applications like interrogations and customs inspections. In the hopes of encouraging additional research on real-world HSDD, we present a novel in-the-wild dataset for poker bluff detection. To verify the quality of our dataset, we test its regression accuracy and achieve a Mean Square Error of 0.0288 with an InceptionV3 model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Avola, D., Cinque, L., Foresti, G.L., Pannone, D.: Automatic deception detection in RGB videos using facial action units. In: Proceedings of the 13th International Conference on Distributed Smart Cameras, pp. 1–6 (2019)

    Google Scholar 

  2. Barreto, A.: Application of facial expression studies on the field of marketing. Brain Face 9, 163–189 (2017)

    Google Scholar 

  3. Bradski, G.: The openCV library. Dr. Dobb’s J. Softw. Tools 25, 120–123 (2000)

    Google Scholar 

  4. Cosentino, S., Randria, E.I.S., Lin, J.Y., Pellegrini, T., Sessa, S., Takanishi, A.: Group emotion recognition strategies for entertainment robots. In: 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), pp. 813–818 (2018). https://doi.org/10.1109/IROS.2018.8593503

  5. Deng, J., Dong, W., Socher, R., Li, L.J., Li, K., Fei-Fei, L.: ImageNet: a large-scale hierarchical image database. In: 2009 IEEE Conference on Computer Vision and Pattern Recognition, pp. 248–255. IEEE (2009)

    Google Scholar 

  6. Deng, J., Guo, J., Xue, N., Zafeiriou, S.: ArcFace: additive angular margin loss for deep face recognition. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), June 2019

    Google Scholar 

  7. Dhall, A., Goecke, R., Joshi, J., Sikka, K., Gedeon, T.: Emotion recognition in the wild challenge 2014: baseline, data and protocol. In: Proceedings of the 16th International Conference on Multimodal Interaction, pp. 461–466. ICMI 2014, Association for Computing Machinery, New York, NY, USA (2014)

    Google Scholar 

  8. Dubey, N.S.S.: Deception detection using artificial neural network and support vector machine. In: 2018 Second International Conference on Electronics, Communication; Aerospace Technology (ICECA), pp. 1205–1208 (2018)

    Google Scholar 

  9. Frank, M.G., Ekman, P.: The ability to detect deceit generalizes across different types of high-stake lies. J. Person. Soc. Psychol. 72(6), 1429–1439 (1997). https://doi.org/10.1037/0022-3514.72.6.1429

  10. Geisheimer, J., Greneker, E.: A non-contact lie detector using radar vital signs monitor (RVSM) technology. IEEE Aerosp. Electron. Syst. Mag. 16(8), 10–14 (2001). https://doi.org/10.1109/62.942213

    Article  Google Scholar 

  11. Vinkemeier, D., Valstar, M., Gratch, J.: Predicting folds in poker using action unit detectors and decision trees. In:2018 13th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2018), pp. 504–511 (2018). https://doi.org/10.1109/FG.2018.00081

  12. Gregory, D.D.B.T.: Evolution flies. Science (1999)

    Google Scholar 

  13. Kay, A.: Tesseract: an open-source optical character recognition engine. Linux J. 2007(159), 2 (2007)

    Google Scholar 

  14. Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. In: Bengio, Y., LeCun, Y. (eds.) 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, 7–9 May 2015, Conference Track Proceedings (2015). http://arxiv.org/abs/1412.6980

  15. Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. In: Pereira, F., Burges, C.J.C., Bottou, L., Weinberger, K.Q. (eds.) Advances in Neural Information Processing Systems, vol. 25, Curran Associates, Inc. (2012)

    Google Scholar 

  16. Le, T.L., Dong, V.T.: Toward a vietnamese facial expression recognition system for human-robot interaction. In: The 2011 International Conference on Advanced Technologies for Communications (ATC 2011), pp. 252–255 (2011)

    Google Scholar 

  17. Liu, Z., et al.: A facial expression emotion recognition based human-robot interaction system. IEEE/CAA J. Autom. Sin. 4(4), 668–676 (2017)

    Article  Google Scholar 

  18. Liu, Z., Luo, P., Wang, X., Tang, X.: Deep learning face attributes in the wild. In: 2015 IEEE International Conference on Computer Vision (ICCV), pp. 3730–3738 (2015). https://doi.org/10.1109/ICCV.2015.425

  19. Mathur, L., Matarić, M.J.: Unsupervised audio-visual subspace alignment for high-stakes deception detection. In: ICASSP 2021–2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2255–2259 (2021)

    Google Scholar 

  20. Moetesum, M., Aslam, T., Saeed, H., Siddiqi, I., Masroor, U.: Sketch-based facial expression recognition for human figure drawing psychological test. In: 2017 International Conference on Frontiers of Information Technology (FIT), pp. 258–263 (2017). https://doi.org/10.1109/FIT.2017.00053

  21. Ozbulak, U.: PyTorch CNN visualizations (2019). https://github.com/utkuozbulak/pytorch-cnn-visualizations

  22. Payne, G.P.J.: The Hawthorne effect. In: Key Concepts in Social Research, pp. 108–111. SAGE Publications, Ltd. (2004). https://doi.org/10.4135/9781849209397.n22

  23. Rill-Garcia, R., Jair Escalante, H., Villasenor-Pineda, L., Reyes-Meza, V.: High-level features for multimodal deception detection in videos. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops, June 2019

    Google Scholar 

  24. Samik, R.: Introduction to Monte Carlo simulation. In: 2008 Winter Simulation Conference, pp. 91–100 (2008). https://doi.org/10.1109/WSC.2008.4736059

  25. State of California Department of Justice: Texas hold’em. https://oag.ca.gov/sites/all/files/agweb/pdfs/gambling/BGC_texas.pdf. Accessed 15 Sep 2021

  26. Su, L., Levine, M.D.: High-stakes deception detection based on facial expressions. In: 2014 22nd International Conference on Pattern Recognition, pp. 2519–2524 (2014). https://doi.org/10.1109/ICPR.2014.435

  27. Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., Wojna, Z.: Rethinking the inception architecture for computer vision. CoRR abs/1512.00567 (2015). http://arxiv.org/abs/1512.00567

  28. Wang, H., Du, M., Yang, F., Zhang, Z.: Score-CAM: improved visual explanations via score-weighted class activation mapping. CoRR abs/1910.01279 (2019). http://arxiv.org/abs/1910.01279

  29. Wang, Q., Jia, K., Liu, P.: Design and implementation of remote facial expression recognition surveillance system based on PCA and KNN algorithms. In: 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp. 314–317 (2015). https://doi.org/10.1109/IIH-MSP.2015.54

  30. Wu, Z., Singh, B., Davis, L., Subrahmanian, V.: Deception detection in videos. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 32(1), April 2018

    Google Scholar 

  31. Guo, J., Deng, J., An, X., Yu, J.: Insightface. https://github.com/deepinsight/insightface. Accessed 21 Aug 2020

  32. Zhou, L., Twitchell, D.P., Qin, T., Burgoon, J.K., Nunamaker, J.F.: An exploratory study into deception detection in text-based computer-mediated communication. In: Proceedings of the 36th Annual Hawaii International Conference on System Sciences, 2003, p. 10. IEEE (2003)

    Google Scholar 

  33. Rajoub, B.A., Zwiggelaar, R.: Thermal facial analysis for deception detection. IEEE Trans. Inf. Forens. Secur. 9(6), 1015–1023 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jacob Barkovitch .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Feinland, J., Barkovitch, J., Lee, D., Kaforey, A., Ciftci, U.A. (2022). Poker Bluff Detection Dataset Based on Facial Analysis. In: Sclaroff, S., Distante, C., Leo, M., Farinella, G.M., Tombari, F. (eds) Image Analysis and Processing – ICIAP 2022. ICIAP 2022. Lecture Notes in Computer Science, vol 13233. Springer, Cham. https://doi.org/10.1007/978-3-031-06433-3_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-06433-3_34

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-06432-6

  • Online ISBN: 978-3-031-06433-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics