Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2012 Apr;3(2):10.4018/jcmam.2012040104.
doi: 10.4018/jcmam.2012040104.

Systematic Redaction for Neuroimage Data

Affiliations

Systematic Redaction for Neuroimage Data

Matt Matlock et al. Int J Comput Models Algorithms Med. 2012 Apr.

Abstract

In neuroscience, collaboration and data sharing are undermined by concerns over the management of protected health information (PHI) and personal identifying information (PII) in neuroimage datasets. The HIPAA Privacy Rule mandates measures for the preservation of subject privacy in neuroimaging studies. Unfortunately for the researcher, the management of information privacy is a burdensome task. Wide scale data sharing of neuroimages is challenging for three primary reasons: (i) A dearth of tools to systematically expunge PHI/PII from neuroimage data sets, (ii) a facility for tracking patient identities in redacted datasets has not been produced, and (iii) a sanitization workflow remains conspicuously absent. This article describes the XNAT Redaction Toolkit-an integrated redaction workflow which extends a popular neuroimage data management toolkit to remove PHI/PII from neuroimages. Quickshear defacing is also presented as a complementary technique for deidentifying the image data itself. Together, these tools improve subject privacy through systematic removal of PII/PHI.

Keywords: HIPAA Privacy Rule; Neuroimage Data; Neuroscience; XNAT Redaction Toolkit.

PubMed Disclaimer

Figures

Figure 1
Figure 1. XNAT and the role of redaction
Figure 2
Figure 2. XNAT redaction process
Figure 3
Figure 3. Detailed view of the privacy and identity management process
Figure 4
Figure 4. Quickshear defacing illustrated
Figure 5
Figure 5. Volume rendering after Quickshear defacing is applied

References

    1. Barclay A, Schimke N, Hale J. Comprehensive neuroimage redaction; Poster presented at the USENIX Security Symposium; Montreal, QC, Canada. Aug, 2009.
    1. Barclay A, Schimke N, Hale J. Redacting PHI in neurological images using XNAT. Comprehensive neuroimage redaction; Poster presented at the USENIX Security Symposium; Washington, DC. Aug, 2010.
    1. Bischoff-Grethe A, Ozyurt IB, Busa E, Quinn BT, Fennema-Notestine C, Clark CP. A technique for the deidentification of structural brain MR images. Human Brain Mapping. 2007;28:892–903. doi:10.1002/hbm.20312. - PMC - PubMed
    1. Costafreda SG. Pooling fMRI data: Metaanalysis, mega-analysis and multi-center studies. Frontiers in Neuroinformatics. 2009;3(33) - PMC - PubMed
    1. Fennema-Notestine C, Ozyurt IB, Clark CP, Morris S, Bischoff-Grethe A, Bondi MW. Quantitative evaluation of automated skull-stripping methods applied to contemporary and legacy images: Effects of diagnosis, bias correction, and slice location. Human Brain Mapping. 2006;27:99–113. doi:10.1002/hbm.20161. - PMC - PubMed

LinkOut - more resources