2012
DOI: 10.4018/jcmam.2012040104
|View full text |Cite
|
Sign up to set email alerts
|

Systematic Redaction for Neuroimage Data

Abstract: In neuroscience, collaboration and data sharing are undermined by concerns over the management of protected health information (PHI) and personal identifying information (PII) in neuroimage datasets. The HIPAA Privacy Rule mandates measures for the preservation of subject privacy in neuroimaging studies. Unfortunately for the researcher, the management of information privacy is a burdensome task. Wide scale data sharing of neuroimages is challenging for three primary reasons: (i) A dearth of tools to systemati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 18 publications
0
1
0
Order By: Relevance
“…The final method, defacing, is similar to facial blurring, except that voxels containing facial features are removed, rather than blurred, eliminating the possibility of reversing the deidentification ( 20 ). There have been numerous, publicly available software algorithms that have been developed using this method ( 13 , 21 – 23 ) (descriptions in Table 2 ), and while there have been a few reports on the success of individual defacers ( 13 , 24 ), there has not been a systematic review of the available choices and how they perform across scans in different populations. In this study, we sought to fill that gap, by examining the performance of different defacing algorithms across a wide range of structural scans.…”
Section: Introductionmentioning
confidence: 99%
“…The final method, defacing, is similar to facial blurring, except that voxels containing facial features are removed, rather than blurred, eliminating the possibility of reversing the deidentification ( 20 ). There have been numerous, publicly available software algorithms that have been developed using this method ( 13 , 21 – 23 ) (descriptions in Table 2 ), and while there have been a few reports on the success of individual defacers ( 13 , 24 ), there has not been a systematic review of the available choices and how they perform across scans in different populations. In this study, we sought to fill that gap, by examining the performance of different defacing algorithms across a wide range of structural scans.…”
Section: Introductionmentioning
confidence: 99%