Cargando…
Image De-Identification Methods for Clinical Research in the XDS Environment
To investigate possible de-identification methodologies within the Cross-Enterprise Document Sharing for imaging (XDS-I) environment in order to provide strengthened support for image data exchange as part of clinical research projects. De-identification, using anonymization or pseudonymization, is...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer US
2016
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4728177/ https://www.ncbi.nlm.nih.gov/pubmed/26811074 http://dx.doi.org/10.1007/s10916-016-0431-7 |
_version_ | 1782412071319633920 |
---|---|
author | Aryanto, K. Y. E. van Kernebeek, G. Berendsen, B. Oudkerk, M. van Ooijen, P. M. A. |
author_facet | Aryanto, K. Y. E. van Kernebeek, G. Berendsen, B. Oudkerk, M. van Ooijen, P. M. A. |
author_sort | Aryanto, K. Y. E. |
collection | PubMed |
description | To investigate possible de-identification methodologies within the Cross-Enterprise Document Sharing for imaging (XDS-I) environment in order to provide strengthened support for image data exchange as part of clinical research projects. De-identification, using anonymization or pseudonymization, is the most common method to perform information removal within DICOM data. However, it is not a standard part of the XDS-I profiles. Different methodologies were observed to define how and where de-identification should take place within an XDS environment used for scientific research. De-identification service can be placed in three locations within the XDS-I framework: 1) within the Document Source, 2) between the Document Source and Document Consumer, and 3) within the Document Consumer. First method has a potential advantage with respect to the exposure of the images to outside systems but has drawbacks with respect to additional hardware and configuration requirements. Second and third method have big concern in exposing original documents with all identifiable data being intact after leaving the Document Source. De-identification within the Document Source has more advantages compared to the other methods. On the contrary, it is less recommended to perform de-identification within the Document Consumer since it has the highest risk of the exposure of patients identity due to the fact that images are exposed without de-identification during the transfers. |
format | Online Article Text |
id | pubmed-4728177 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2016 |
publisher | Springer US |
record_format | MEDLINE/PubMed |
spelling | pubmed-47281772016-02-03 Image De-Identification Methods for Clinical Research in the XDS Environment Aryanto, K. Y. E. van Kernebeek, G. Berendsen, B. Oudkerk, M. van Ooijen, P. M. A. J Med Syst Systems-Level Quality Improvement To investigate possible de-identification methodologies within the Cross-Enterprise Document Sharing for imaging (XDS-I) environment in order to provide strengthened support for image data exchange as part of clinical research projects. De-identification, using anonymization or pseudonymization, is the most common method to perform information removal within DICOM data. However, it is not a standard part of the XDS-I profiles. Different methodologies were observed to define how and where de-identification should take place within an XDS environment used for scientific research. De-identification service can be placed in three locations within the XDS-I framework: 1) within the Document Source, 2) between the Document Source and Document Consumer, and 3) within the Document Consumer. First method has a potential advantage with respect to the exposure of the images to outside systems but has drawbacks with respect to additional hardware and configuration requirements. Second and third method have big concern in exposing original documents with all identifiable data being intact after leaving the Document Source. De-identification within the Document Source has more advantages compared to the other methods. On the contrary, it is less recommended to perform de-identification within the Document Consumer since it has the highest risk of the exposure of patients identity due to the fact that images are exposed without de-identification during the transfers. Springer US 2016-01-26 2016 /pmc/articles/PMC4728177/ /pubmed/26811074 http://dx.doi.org/10.1007/s10916-016-0431-7 Text en © The Author(s) 2016 Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. |
spellingShingle | Systems-Level Quality Improvement Aryanto, K. Y. E. van Kernebeek, G. Berendsen, B. Oudkerk, M. van Ooijen, P. M. A. Image De-Identification Methods for Clinical Research in the XDS Environment |
title | Image De-Identification Methods for Clinical Research in the XDS Environment |
title_full | Image De-Identification Methods for Clinical Research in the XDS Environment |
title_fullStr | Image De-Identification Methods for Clinical Research in the XDS Environment |
title_full_unstemmed | Image De-Identification Methods for Clinical Research in the XDS Environment |
title_short | Image De-Identification Methods for Clinical Research in the XDS Environment |
title_sort | image de-identification methods for clinical research in the xds environment |
topic | Systems-Level Quality Improvement |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4728177/ https://www.ncbi.nlm.nih.gov/pubmed/26811074 http://dx.doi.org/10.1007/s10916-016-0431-7 |
work_keys_str_mv | AT aryantokye imagedeidentificationmethodsforclinicalresearchinthexdsenvironment AT vankernebeekg imagedeidentificationmethodsforclinicalresearchinthexdsenvironment AT berendsenb imagedeidentificationmethodsforclinicalresearchinthexdsenvironment AT oudkerkm imagedeidentificationmethodsforclinicalresearchinthexdsenvironment AT vanooijenpma imagedeidentificationmethodsforclinicalresearchinthexdsenvironment |