Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Prototype of a JAVA/DICOM Image Server with Integrated Findings and Data Security

View through CrossRef
The transfer of medical data within heterogeneous hard- and software infrastructures requires platform-independent standardized protocols and data formats such as DICOM. To avoid costly vendor-specific solutions a DICOM server was implemented in JAVA thereby enabling the data access via internet browser technology. The most important patient and image acquisition information were extracted from the DICOM images and stored into a relational database. For an integrated view patient information such as radiological findings were transferred from the Radiological Information System (RIS) into the data base. Image data were accessed either by a fast preview tool or using a DICOM viewer. Since DICOM does not include inherent data security mechanisms, a second tool allowed the DICOM-conform encryption of DCIOM data for a secure long term storage on CD-R or across unsecure networks.
Title: Prototype of a JAVA/DICOM Image Server with Integrated Findings and Data Security
Description:
The transfer of medical data within heterogeneous hard- and software infrastructures requires platform-independent standardized protocols and data formats such as DICOM.
To avoid costly vendor-specific solutions a DICOM server was implemented in JAVA thereby enabling the data access via internet browser technology.
The most important patient and image acquisition information were extracted from the DICOM images and stored into a relational database.
For an integrated view patient information such as radiological findings were transferred from the Radiological Information System (RIS) into the data base.
Image data were accessed either by a fast preview tool or using a DICOM viewer.
Since DICOM does not include inherent data security mechanisms, a second tool allowed the DICOM-conform encryption of DCIOM data for a secure long term storage on CD-R or across unsecure networks.

Related Results

The Role of Standards in Accelerating the Uptake of Artificial Intelligence in Dermatology (Preprint)
The Role of Standards in Accelerating the Uptake of Artificial Intelligence in Dermatology (Preprint)
BACKGROUND The use of artificial intelligence (AI) for dermatology is showing great promise in research contexts. However, the clinical use of AI in dermato...
How Third Party Observers Respond to Overheard Service Failures: Implications for Frontline Service Employees and the Firm
How Third Party Observers Respond to Overheard Service Failures: Implications for Frontline Service Employees and the Firm
Frontline service employees and unhappy customers have generally been the main focus of the service failures research. It is established that service failures are difficult to prev...
CytometryML, an XML format based on DICOM and FCS for analytical cytology data
CytometryML, an XML format based on DICOM and FCS for analytical cytology data
AbstractBackgroundFlow Cytometry Standard (FCS) was initially created to standardize the software researchers use to analyze, transmit, and store data produced by flow cytometers a...
Web Validation Service for Ensuring Adherence to the DICOM Standard
Web Validation Service for Ensuring Adherence to the DICOM Standard
The DICOM Standard has been fundamental for ensuring the interoperability of Picture Archive and Communications Systems (PACS). By compiling rigorously to the standard, medical ima...
Automatic Selective Encryption of DICOM Images
Automatic Selective Encryption of DICOM Images
Securing DICOM images is essential to protect the privacy of patients, especially in the era of telemedicine and eHealth/mHealth. This increases the demand for rapid security. Neve...
Reversible Anonymization of DICOM Images Using Automatically Generated Policies
Reversible Anonymization of DICOM Images Using Automatically Generated Policies
Many real-world applications in the area of medical imaging like case study databases require separation of identifying (IDATA) and non-identifying (MDATA) data, specifically those...
Development Tasks of AI-based Security Industry
Development Tasks of AI-based Security Industry
Recently, the government's interest in industries utilizing AI has been amplified, with initiatives such as announcing a roadmap aiming to achieve the goal of becoming the world's ...

Back to Top