BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Talks.cam//talks.cam.ac.uk//
X-WR-CALNAME:Talks.cam
BEGIN:VEVENT
SUMMARY:Image-triage\, Brain Computer Interaction and Deception Detection 
 using EEG - Prof Howard Bowman - Univs Kent & Birmingham
DTSTART:20151104T140000Z
DTEND:20151104T150000Z
UID:TALK61492@talks.cam.ac.uk
CONTACT:David Greaves
DESCRIPTION:The human brain has an extraordinary capacity to “pre-consci
 ously locate" stimuli that are salient to\nit. A particularly compelling d
 emonstration is Rapid Serial Visual Presentation (RSVP)\, in which the \nv
 ast majority of stimuli presented are not consciously perceived\, but ones
  that are salient \nbreakthrough into awareness [Bowman\,13]. Importantly\
 , we have shown that it is possible to \ndetermine which stimuli in an RSV
 P stream an individual finds salient by monitoring the electrical \nrespon
 se from their brain. We do this by looking for a P3 component with EEG. Th
 is gives us a \nmeans to present a lot of stimuli very rapidly to an indiv
 idual and determine which they find salient \nfrom their brain activity. W
 e call this the Fringe-P3 method\, since stimuli are presented on the \n
 “fringe” of awareness.\n\nI will discuss a number of applications of t
 his Fringe-P3 method that cross a number of disciplines\, \nincluding Comp
 uting and Forensics. In particular\, I will consider how the method can be
  used as an \nalternative to image processing methods in image triage\, an
 d how it can provide a brain-computer \ninterface [Chennu\,13]\, i.e. be u
 sed to control a computer directly from brain activity. We will \nparticul
 arly focus on the method’s use as a concealed information test in decept
 ion detection\, where \nwe have shown it to be resistant to countermeasure
 s [Bowman\,14]. Finally\, if time permits\, I will \ndiscuss the computati
 onal statistics methods we use in our EEG analyses\, which are focussed on
  \nMonte Carlo resampling and Fisher combining.\n\n\n[Bowman\,13] Bowman\,
  H.\, Filetti\, M.\, Janssen\, D.\, Su\, L.\, Alsufyani\, A.\, & Wyble\, B
 . (2013). \nSubliminal salience search illustrated: EEG identity and decep
 tion detection on the fringe of awareness. PloS one\, 8(1)\, 1-21.\n\n[Bow
 man\,14] Bowman\, H.\, Filetti\, M.\, Alsufyani\, A.\, Janssen\, D.\, & Su
 \, L. (2014). Countering countermeasures: Detecting identity lies by detec
 ting conscious breakthrough. PloS one\, 9(3)\, e90595.\n\n[Chennu\,13] Che
 nnu\, S.\, Alsufyani\, A.\, Filetti\, M.\, Owen\, A. M.\, & Bowman\, H. (2
 013). The cost of space independence in P300-BCI spellers. J. Neuroeng. Re
 habil\, 10.
LOCATION:Lecture Theatre 1\, Computer Laboratory
END:VEVENT
END:VCALENDAR
