IDEAS home Printed from https://ideas.repec.org/h/spr/sprchp/978-3-031-83157-7_20.html
   My bibliography  Save this book chapter

Multimodal Deception Detection Using Linguistic and Acoustic Features

In: Machine Learning, Deep Learning and AI for Cybersecurity

Author

Listed:
  • Tien Nguyen

    (San José State University)

  • Faranak Abri

    (San José State University)

  • Akbar Siami Namin

    (Texas Tech University)

  • Keith S. Jones

    (Texas Tech University)

Abstract

Recently, there has been a growing interest among researchers in the automatic detection of deceptive behavior, actions, and contents. This surge in attention is driven by the wide-ranging applications of deception detection, particularly in criminology and cybersecurity. To advance this line of research, this study investigates both text and audio data derived from speeches in natural languages. We evaluate traditional linguistic models alongside deep models and advanced Large Language Models (LLMs), utilizing Natural Language Processing (NLP) techniques to model deception detection. Furthermore, we employ various feature selection methods to determine the significance of linguistic features. Through extensive experimentation, we assess the effectiveness of both conventional and advanced deep models on transcribed data while also applying deep models to audio data, thus leveraging both types of data to build a multimodal model for deception and lie detection. Our findings indicate that the Bidirectional Long Short-Term Memory (BiLSTM) model excels in processing textual data. On the other hand, the ResNet50 model performs best with audio data. By combining these models in a late fusion approach, we achieve a model that outperforms individual text and audio models.

Suggested Citation

  • Tien Nguyen & Faranak Abri & Akbar Siami Namin & Keith S. Jones, 2025. "Multimodal Deception Detection Using Linguistic and Acoustic Features," Springer Books, in: Mark Stamp & Martin Jureček (ed.), Machine Learning, Deep Learning and AI for Cybersecurity, pages 565-598, Springer.
  • Handle: RePEc:spr:sprchp:978-3-031-83157-7_20
    DOI: 10.1007/978-3-031-83157-7_20
    as

    Download full text from publisher

    To our knowledge, this item is not available for download. To find whether it is available, there are three options:
    1. Check below whether another version of this item is available online.
    2. Check on the provider's web page whether it is in fact available.
    3. Perform a
    for a similarly titled item that would be available.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:sprchp:978-3-031-83157-7_20. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.