2011
DOI: 10.1117/12.877989
|View full text |Cite
|
Sign up to set email alerts
|

Open source tools for standardized privacy protection of medical images

Abstract: In addition to the primary care context, medical images are often useful for research projects and community healthcare networks, so-called "secondary use". Patient privacy becomes an issue in such scenarios since the disclosure of personal health information (PHI) has to be prevented in a sharing environment. In general, most PHIs should be completely removed from the images according to the respective privacy regulations, but some basic and alleviated data is usually required for accurate image interpretatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…Without a greater confidence in the image de-identification process, open-access DICOM archives that can be queried to correlate with genetics will never achieve their potential. Some international efforts besides those described in this paper are ongoing with the intent to achieve similar ends [25]. In the absence of community consensus on image de-identification and userfriendly tools and SOPs, researchers have been understandably reluctant to create publicly accessible image archives.…”
Section: Resultsmentioning
confidence: 97%
“…Without a greater confidence in the image de-identification process, open-access DICOM archives that can be queried to correlate with genetics will never achieve their potential. Some international efforts besides those described in this paper are ongoing with the intent to achieve similar ends [25]. In the absence of community consensus on image de-identification and userfriendly tools and SOPs, researchers have been understandably reluctant to create publicly accessible image archives.…”
Section: Resultsmentioning
confidence: 97%
“…deface brain magnetic resonance images (MRI) as demonstrated in Fig. 2 For further analysis of a selection of tools highlighted in Table 1, we point to the analyses provided by Lien et al [47], Aryanto et al [48], and Gonzalez et al [38] that may further assist the interested reader to match specific tool requirements with specific tool capabilities.…”
Section: Image De-identification Toolsmentioning
confidence: 99%