The P300 is sensitive to concealed face recognition |
| |
Affiliation: | 1. Department of Biomedical Engineering, Faculty of Engineering, Shahed University, P.O.Box: 3319118651, Tehran, Iran;2. Department of Biomedical Engineering, Faculty of Engineering, Amirkabir University of Technology, P.O.Box: 4413-15875, Tehran, Iran;3. Research Center of Intelligent Signal Processing, P.O.Box: 16765-3739, Tehran, Iran;1. Department of Psychology, Faculty of Education, Hubei University, Wuhan, China;2. Department of Psychology, Institute for Neuroscience, Northwestern University, Evanston, IL, USA;1. Medical Research Council Cognition and Brain Sciences Unit, University of Cambridge, United Kingdom;2. Perception in Action Research Centre and Department of Cognitive Science Macquarie University, Australia;3. Department of Computer Science, School of Mathematics, Statistics, and Computer Science, University of Tehran, Iran;4. Neuroscience Program, Biomedicine Discovery Institute, Monash University, Australia;1. Department of Cognitive and Neuropsychology, Institute of Psychology, Faculty of Arts, University of Szeged, Egyetem u. 2, 6722 Szeged, Hungary;2. Brain Imaging Centre, Research Centre for Natural Sciences, Hungarian Academy of Sciences, Magyar Tudósok körútja 2, 1117 Budapest, Hungary;3. Department of Psychology, University of Tromsø, Huginbakken 32, 9037 Tromsø, Norway |
| |
Abstract: | In two experiments, we investigated whether a P300 based Concealed Information Test (CIT) can be used to detect concealed face recognition. The results show that detection of concealed face recognition is highly successful when stimuli depict persons who are personally highly familiar, and instructions to conceal recognition are given. When pictures depict recognized, but personally less familiar faces, and no specific instructions to conceal recognition are given, detection is unsuccessful. These findings indicate that pictures of faces can be used in a P300 based CIT, and that mere recognition is not sufficient for successful detection of concealed information. |
| |
Keywords: | |
本文献已被 ScienceDirect 等数据库收录! |
|