DVTK DICOM Anonymizer User Manual
DVTK DICOM Anonymizer User Manual
Table of Contents
1 Introduction ................................................................... 3
1.1 Revision History ................................................................................................. 3
1.2 General................................................................................................................ 3
1.3 System Requirements.......................................................................................... 3
1.3.1 Operating system ........................................................................................ 3
1.3.2 Software requirements ................................................................................ 4
2 Software installation...................................................... 5
2.1 Installation of Microsoft .NET Framework R 1.1............................................... 5
2.2 Installation of the DCM Anonymizer software. ................................................. 5
3 Anonymization.............................................................. 6
3.1 Types of anonymization :.................................................................................... 6
3.2 Table of attributes to be anonymized :................................................................ 6
4 Anonymization by User Interface ................................. 8
4.1 Anonymize a File...................................................................................................... 8
4.2 Anonymize a Directory.......................................................................................... 10
5 Anonymization by Command Line Version................ 13
5.1 Anonymize a file and directory via basic anonymization...................................... 14
5.2 Anonymize a file and directory via complete anonymization ............................... 14
2
User Manual – DCM Anonymizer 1.7.1
1 Introduction
1.1 Revision History
Version Date Description
1.7.1 May 12 , 2007 First version of this document, describing the
functionality of version 2.1.1.
1.2 General
DCM Anonymizer is a GUI based application used to anonymize the Clinical
data It is targeted toward creating a special purpose, de-identified version of an already-
existing Data Set. It is not intended to replace the original SOP Instance from which the
de-identified SOP Instance is created, nor is it intended to act as the primary
representation of clinical Data Sets in image archives. The de-identified SOP Instances
are useful, for example, in creating teaching or research files, where the identity of the
patient should be protected, but still be accessible to authorized personnel.
3
User Manual – DCM Anonymizer 1.7.1
4
User Manual – DCM Anonymizer 1.7.1
2 Software installation
The software installation procedure of the DCM Anonymizer tool consists of the
following steps:
Download or copy the file DCM Anonymizer.zip to a temp directory on the PC.
Double click (left mouse button) on the DCM Anonymizer.zip and extract the file DCM
Anonymizer.exe to the temp directory.
Start the installation procedure by double clicking with the left mouse button on the file
DCM Anonymizer.exe.
In the window “ Microsoft .NET Framework 1.1 setup” select “ I agree” to accept the
license agreement. Press “install” to start the installation process. At the end of the
installation procedure press “OK”
The Microsoft .NET Framework R1.1 software is installed.
After the .NET Framework software is installed, the installer package continues with the
installation of the DCM Anonymizer software.
Follow the instruction in the installer window and accept the license agreement.
After the button “install” is pressed, the installation will start. At the end, press the
“Finish “ button. The DCM Anonymizer package is installed.
5
User Manual – DCM Anonymizer 1.7.1
In windows “All programs” there is an entry created “DVTK”. When selecting DVTK, a
submenu with all installed DVTK applications will be opened. From this submenu the
DCM Anonymizer tool can be started.
3 Anonymization
The Table Below Mentions the Attributes which needs to be de-identified for basic
Anonymization .
6
User Manual – DCM Anonymizer 1.7.1
Patient’s Sex (0010,0040) CS Make Sex “Other” (O)
Other Patient Ids (0010,1000) LO Make Empty
Other Patient Names (0010,1001) PN Make Empty
Patient’s Age (0010,1010) AS Make Empty
Patient’s Size (0010,1020) DS Make Empty
Patient’s Weight (0010,1030) DS Make Empty
Medical Record Locator (0010,1090) LO Make Empty
Ethnic Group (0010,2160) SH Make Empty
Occupation (0010,2180) SH Make Empty
Additional Patient’s History (0010,21B0) LT Make Empty
Patient Comments (0010,4000) LT Make Empty
Device Serial Number (0018,1000) LO Make Empty
Request Attributes Sequence (0040,0275) SQ Make Empty
Storage Media File-set UID (0088,0140) UI Make Empty
7
User Manual – DCM Anonymizer 1.7.1
There is an option provided in the UI and Cmd versions to select whether basic or
complete anonymization.
In the UI the user can choose to do one of the anonymizations by selecting a radio button.
Once the user clicks it , the File Dialog for the to be anonymized is Opened.
8
User Manual – DCM Anonymizer 1.7.1
9
User Manual – DCM Anonymizer 1.7.1
Once the user clicks it , the File Dialog for the to be anonymized is Opened.
10
User Manual – DCM Anonymizer 1.7.1
Once the user selects the directory a screen is shown giving an indication that
anonymization has started.
Once the Anonymization is completed the user can see an overview of the results.
11
User Manual – DCM Anonymizer 1.7.1
For the details of the specific image user can click on the link of that particular image.
12
User Manual – DCM Anonymizer 1.7.1
On each Indivual result File an option of Home is provided to return to the main page.
13
User Manual – DCM Anonymizer 1.7.1
Usage:
AnonymizerCmd -h
Provides the Help File.
AnonymizerCmd -anonymize
<InputFileName or Input Directory>
or
AnonymizerCmd -completeanonymize
<InputFileName or Input Directory>";
To do a basic anonymization of a File or directory the user has to use the option of
“anonymize”
To do a complete anonymization of a File or directory the user has to use the option of
“completeanonymize”
14