Research Experiment of
Image-based Behavioral Analysis

SANKEN Area

Privacy Policy


The Yagi Laboratory (The Institute of Scientific and Industrial Research [SANKEN], Osaka University, a national university corporation) will conduct a research on the behavior of multiple unspecified individuals as part of our Research Experiment of Image-based Behavioral Analysis at SANKEN (hereafter, "this research"). Given the importance of protecting personal information, personal information, which could be used to identify specific individuals (hereafter, "the information"), we will endeavor to handle the information based on the policy described below in order to ensure proper management.


Open all▼

Research Experiment of Image-based Behavioral Analysis at SANKEN

The Yagi Laboratory (The Institute of Scientific and Industrial Research, Osaka University, a national university corporation)

This research will be conducted for the following purposes to apply human image analysis technology (which uses many image sensors [cameras]) and a human flow monitoring system based on such technology to the fields of disaster risk reduction, crime prevention, etc.

  • Review and verify the possibilities of improving the accuracy of the human image analysis technology
  • Review and verify the possibilities of improving the human image analysis technology that helps monitor the flow of people and understand human behavior in the actual environment (e.g. event venues, station facilities, commercial facilities) where silhouettes of individuals often overlap.

    • Develop and evaluate the person re-identification method based on quantitative facial characteristics analysis, gait analysis techniques, etc. by taking into account the overlapping silhouettes of individuals and differences in the relative positions of cameras and pedestrians.
    • Develop and evaluate the highly accurate person re-identification and authentication method by applying multiple analysis techniques.
    • Develop and evaluate methods to analyze human behavior, actions, and conditions within specific areas.

  • Conduct a research experiment to collect data
  • Conduct a research experiment to collect image data that are required for the above purposes, and analyze and review factors that hinder efforts to gain public consensus on data collection, etc.

The information acquired through this research will be used only within the scope necessary to fulfill the purposes (among the purposes of the research listed above) that are notified when acquiring the data.

The human image data will be acquired using cameras and will be used for this research. When acquiring data, we will clearly indicate the purpose of use, etc. in accordance with the policy below, and will not acquire the information by false and other unlawful means.

(1) Camera positions and captured areas

In this research, cameras will be installed on the premises of SANKEN, Osaka University. Types of cameras, installation positions, and captured areas will be disclosed on this experiment website, etc. The following information will be indicated on the cameras using labels, etc.

  • Japanese name of this research
  • Contact person(s), extension number
  • Camera number

(2) Targets

The targets are individuals within the captured areas when cameras are operated during this experiment.

(3) Notification method when the experiment is conducted

The monthly experiment plan will be compiled and posted on this experiment website and bulletin board on the laboratory premises by the 20th day of the month before the experiment is conducted. Notice will also be given via the mailing list for SANKEN members and stakeholders. If the notified experiment plan is changed, notice will be given on this experiment website and via the mailing list at least one week before the experiment.

During the experiment, signboards will be set up before areas captured by cameras to inform that the experiment is being conducted. The notice (hereafter, "advance notice") will include the following information:

  • Purpose of the research
  • Purpose and details of the experiment
  • Hours and locations of the experiment (using cameras) and captured areas
  • Method of using and managing the data
  • How to request deletion of data
  • Contact information (department name, staff in charge, telephone number, URL, email address)

Meetings about the experiment will be held on a regular basis.

(1) Personal information to be acquired

The information listed below will be acquired and used in this research. The information will be handled only within the scope necessary to fulfill the purposes (among the purposes of the research listed above) that are notified when acquiring the data, and will not be used for other purposes.

  • Image data: Human behavioral image data captured by cameras
  • Quantitative features: Features (based which individuals can be identified) extracted by processing the image data

(2) Joint use (provision to third parties)

Unless otherwise specified in laws and regulations, the information will not be subject to joint use or provided to third parties.

(3) Response to requests for deletion

To request deletion of information, applicants are requested to fill out a deletion request form (giving the applicant's name, affiliation, contact information, date and time, camera position) and send or submit the completed form to the contact persons. We will follow a reasonable procedure to remove the data from analysis and processing within the feasible scope. The data outside the scope of analysis will be deleted. The deletion request form is available from the experiment website.

(4) Response to complaints

If there are complaints about improper handling of the information, we will endeavor to ensure appropriate processing in this research.

This research will be conducted in compliance with the Act on the Protection of Personal Information Held by Independent Administrative Agencies, etc.

To ensure secure management of the information in this research, appropriate technical and organizational measures will be implemented to protect the information.

[Technical measures]

(1) Management of access to the information

  1. Servers and storage devices (hereafter, "the servers") will be installed to store the information handled in this research. The information will be stored in the servers. The servers will be installed in a lockable server rack in a lockable room to ensure security.
  2. The data users who are authorized to have access to the servers (hereafter, "the data users") will be restricted. Unique IDs and passwords will be assigned to respective data users to restrict access. The data users will be determined based on approval given by the information management supervisors. A list of data users will be created and managed by the information management supervisors.
  3. An access log will be recorded and stored to monitor access to the servers.

(2) Restriction on removing the information from the campus of Osaka University

Copying and moving the information from the servers and storing it in an external storage device will require the consent of the information management supervisors. The information will be encrypted for storage and movement. Even when the normal procedure is followed, the external storage device in which the encrypted information is stored will not be removed from the campus of Osaka University.

The information management supervisors will create and manage a list of copies created in external storage devices. When the data users copy the information to other PCs, they will be required to apply to the information management supervisors in writing and obtain approval. The PCs that store the copied information will be protected by IDs and passwords to enable use only by the data users, and will not be connected to other networks.

(3) Measures to prevent unauthorized access

A dedicated network will be established for this research, and will consist only of cameras, servers, and storage devices as well as PCs for access approved by the information management supervisors. The PCs for access will be protected by ID and passwords to enable use only by the data users. A list of access PCs will be created and managed.

[Organizational measures]

(1) Designation of information management supervisors

Two information management supervisors will be appointed as the persons responsible for managing access to the information. The information management supervisors will implement measures to prevent leakage and ensure proper management of the information in this research.

(2) Education/training for secure management

The data users will be informed of the importance of protecting the information and will receive education/training about information management on a regular basis (as needed for new data users) to prevent data leakage and ensure information management.

(3) Establishment of a reporting system

In the event of leakage (including loss and theft) of the information for this research, the data users will promptly report it to the information management supervisors and to the general information protection manager in accordance with the Osaka University regulations. The information management supervisors will check the status, investigate the cause of leakage, and implement measures to prevent recurrence.

This privacy policy will be reviewed on a regular basis and improved as necessary. Any improvements will be promptly posted on this experiment website.

Staff in charge of the experiment
Yagi Laboratory, The Institute of Scientific and Industrial Research, Osaka University
8-1 Mihogaoka, Ibaraki City, Osaka Prefecture 567-0047, Japan
Phone: +81-6-6879-8422
Fax: +81-6-6877-4375
Email address: gait-info(at)am.sanken.osaka-u.ac.jp
Experiment website: http://www.am.sanken.osaka-u.ac.jp/SankenExperiment/index.html