Skip to main content

Don't lie to my eyes (II.)

In my last post, I was talking about pupil of the eye. When you are measuring the pupil, you are probably using an eye tracker. And the eye-tracker provides us with more data than just pupil diameter. So today, we are going to look at the other data and what can be done with it.

Fixation and saccades

The measures the most eye-trackers can give as are gaze location, blinking frequency, time of the fixation and pupil dilation. This information can help us understand what information people acquire and where their focus is. This can be done using the measurement of fixations and saccaddes, [1]

Saccade is the time when your eyes are moving and it lasts about 15 - 40 ms. During this time, you are acquiring no information. Fixation is the time when your eyes stop and focus on a point. This is when your brain is processing the visual data. In silent reading fixation duration is on average 225 ms but may differentiate from 100 ms to 500 ms depending on the text. [2]

Cues to deception

When detecting deceptions, from the physiological signals that were tested in most studies, these eighteen were most successful; response length, details, response latency, rate of speaking, illustrators, eye contact, non-ah speech disturbances, silent pauses, filled pauses, posture shifts, hand movements, foot or leg movements, smiling (undifferentiated), nervous, pitch, blinking, self-fidgeting, and fidgeting (undifferentiated). [3]

Blinking can be evidence for deception in a way, that increased blinking can indicate anxiety or arousal, decreased blinking can on the other hand indicate greater cognitive effort. In non-interactive context liars blink significantly more than truth-tellers, in interactive context there was little difference. [3,4]

Gaze of the eyes can too be a clue for deception. Liars maintain less eye-contact with their interaction partner. If people are motivated to succeed in lying, they are more likely to decrease eye-contact. However if there is no special motivation, this effect is not present. [3,4]

Deception detection

When we are looking on the order of the fixations using saccades between the fixations, we can reconstruct how people conducted their task. This can tell us if people are trying to deceive us. In an experiment regarding personality evaluation, if people were trying to look good, they were more likely to first look at the more outermost answers within multi-choice scale question. On the opposite, when answering truthfully, the first gaze was focused more often on the center answers. [2]

Response time can be also obtained using eye-tracker. Eye-tracker can tell you when the subject have read the question and how long took him to answer it, you just have to log the time of the answer. This can too be helpful when detecting deception, because lying people are more likely to answer quicker or slower compared to telling truth, based on the task formulation. [2]

If lying is cognitively more complex than telling the truth, the number of fixations is expected to be higher while lying, because increase in fixation indicates increased cognitive load. [2]


There is no complex research or theory regarding detecting faking results in test, so we have to use methods and metrics created in research focused on general deception and lying. [2]

Gaze behavior and blinking are not so easily classified as pupil dilation and depend mainly on social scenario and experiment context. [4]

For gaze-contingent experiments, it is suggested that the experiment should be displayed on large high-refreshing (85-100Hz) CRT monitors instead of LCD panels. Due to physical limitations of liquid crystals, most LCD panels have a refresh rate of 60-75Hz. This would cause visual delay in gaze-contingent experiments. [1]


Response times, blinking and gaze detection can be useful clues for deception detection. From this measures, blinking was shown to be most successful in non-interactive measurements [4] so can be most useful for our project regarding online questionnaires.

Gaze detection in this context is not so useful, but based on the experiment can provide useful clues as the order of the fixations [2].

Response time can too be useful clue, but we have to be able to determine if the task is more or less cognitively demanding than telling the truth. [2]


[1] J. Wang, “Pupil dilation and eye tracking,” in A handbook of process tracing methods for decision research: A critical review and user’s guide, 2011, pp. 185–204.

[2] E. a. J. van Hooft and M. P. Born, “Intentional response distortion on personality tests: Using eye-tracking to understand response processes when faking.,” J. Appl. Psychol., vol. 97, no. 2, pp. 301–316, 2012.

[3] B. M. DePaulo, J. J. Lindsay, B. E. Malone, L. Muhlenbruck, K. Charlton, and H. Cooper, “Cues to deception.,” Psychol. Bull., vol. 129, no. 1, pp. 74–118, 2003.

[4] W. Steptoe, a Steed, a Rovira, and J. Rae, “Lie Tracking: Social Presence, Truth and Deception in Avatar-Mediated Telecommunication,” pp. 1039–1048, 2010.


Popular posts from this blog

ProLinks #57 - Truth, Wayland and Sex Tapes

Tech Let's talk about Wayland ... This is the fundamental principle of every single product (including security products). If you cannot use a thing, because its "safety" or "security" mechanisms prevents the core functionality from being utilized in the intended fashion, the product is useless. For example, a Web browser without an Internet connection is possibly very secure from Internet exploits - but it also doesn't do its main function - let people browse the Internet Speed is the killer feature When you touched a Razr or a Palm phone, there was a delay. It felt sluggish and slow. Apple removed the delay between your finger tapping the screen and something happening. Your finger could finally manipulate the UI in realtime, just like in the real world. It felt magical. If there was even a slight delay, the whole experience fell apart. Everything is broken, and it’s okay Every car you’ve ever ridden in, every elevator you’ve ever taken, every s

ProLinks #65 - North Korea, Cryptocurrencies, Propaganda and more

Tech The Incredible Rise of North Korea’s Hacking Army He was right. As the newspapers soon reported, more than sixteen million dollars was withdrawn from roughly seventeen hundred 7-Eleven A.T.M.s across Japan that morning, using data stolen from South Africa’s Standard Bank. The newspapers surmised that 7-Elevens had been targeted because they were the only convenience stores in Japan whose cash terminals all accepted foreign cards. Soon after the raids, the withdrawal limit for many A.T.M.s in the country was reduced to fifty thousand yen Why Cryptocurrency Is A Giant Fraud ❧ Current Affairs Schweikert is partly right: “selling it as a revolution” is a hugely important part of why cryptocurrency is succeeding. But as is generally the case when someone is trying to sell you something, the whole thing should seem extremely fishy. In fact, much of the cryptocurrency pitch is worse than fishy. It’s downright fraudulent, promising people benefits that they will not get and trying

ProLinks #64 - Cookies, How to Survive Apocalypse, Fall of Rome and more

Tech Ubuntu 21.04 is here Ubuntu machines can join an Active Directory (AD) domain at installation for central configuration. AD administrators can now manage Ubuntu workstations, which simplifies compliance with company policies. Data Brokers Are a Threat to Democracy The Arkansas firm claims to have data on 2.5 billion people around the world. And in the US, if someone’s interested in that information, there are virtually no restrictions on their ability to buy and then use it. How to fight back against Google FLoC Federated Learning of Cohorts (FLoC) proposes a new way for businesses to reach people with relevant content and ads by clustering large groups of people with similar interests. This approach effectively hides individuals “in the crowd” and uses on-device processing to keep a person’s web history private on the browser. How Live TV Works Do Neural Networks Think Like Our Brain? OpenAI Answers! 🧠 koush Difficult to quantify what an ecological disaster Bitcoin

ProLinks #58 - Evangelicals, Screen time and BASE Jumping

Tech The technical interview practice gap, and how it keeps underrepresented groups out of software engineering MIT gave me was a big stamp on my forehead that, to this day, makes strangers think I’m smart. But there was another, more relevant gift that gave me a serious advantage over students who did not attend an elite computer science institution: boundless access to technical interview practice. Not only was there a multi-week course during the month-long break between Fall and Spring semesters that was dedicated exclusively to passing technical interviews, but all of my peers were going through exactly the same thing at the same time Clone Wars - Open source clones of popular sites 70+ open-source clones of popular sites like Airbnb, Amazon, Instagram, Netflix, Tiktok, Spotify, Trello, Whatsapp, Youtube, etc. List contains source code, demo links, tech stack, and, GitHub stars count. Great for learning purpose!  “Well, it seems great to me” But if your music, your graphic

ProLinks #59 - Terrible men, Facebook and SOCOM

Tech You’re Doing It Wrong: Notes on Criticism and Technology Hype What is less obvious is why Shoshana Zuboff, an emerita professor of Harvard Business School, so uncritically repeats the digital industry’s marketing materials, nor why she never points to or assesses evidence that goes against her argument. Yet her writings are full of hyperbole that sounds like she took press releases from Facebook’s and Google’s PR departments and rewrote them to be alarming, How Facebook got addicted to spreading misinformation Zuckerberg’s obsession with getting the whole world to use Facebook had found a powerful new weapon. Teams had previously used design tactics, like experimenting with the content and frequency of notifications, to try to hook users more effectively. Their goal, among other things, was to increase a metric called L6/7, the fraction of people who logged in to Facebook six of the previous seven days. L6/7 is just one of myriad ways in which Facebook has measured “e