Innovative De-identification & Data Management Platform

De-identification: A Complete Solution

DeIdentifier offers a robust and comprehensive way to remove Protected Health Information (PHI) across multiple modalities while maintaining the research value of the data.

Study Interval Retention

  • Automatically shift all dates within DICOM headers and clinical data using a patient-specific random number.

Redundancy Checks

  • Multi-stage secure checks during de-identification prevent unexpected PHI leaks from all DICOM headers.

Burned-in Text Removal

  • Text detection via natural language processing removes PHI text & retains key information, such as orientations.

Masked-Based Defacing

  • Patented mask-based defacing algorithm yields minimal distortion & retains main radiomics features.

Report De-identification

  • Text-based reports can be uploaded, added to a project, and automatically de-identified to remove PHI using DeIdentifier’s state-of-the-art large language model.

Convenient & Secure Data Management

DeIdentifier’s workflow will seamlessly streamline your research process.

Efficient Data Importing

  • DeIdentifier supports all formats of imaging (DICOM, NIFTI) and clinical data.
  • Batch retrieval uses CSV and REDCap files to allow users to pull data from PACS at once.

Project Management

  • Project-based data management allows for the selection of different user roles, de-identification settings, and accessibility options in a multi-user environment.

Custom De-identification

  • Options are configurable within each project before and after creation.
  • Details of the study and de-identification results are easy to access using the study expansion and built-in viewer features.

Built-in Annotation Tools

  • Define regions of interest & create annotations manually or using the AI-driven Smart Interpolation tool.

Report De-identification

  • Easily share de-identified data between institutions and local users.

Thoroughly Secure All Your Data

DeIdentifier is installed locally within your institution’s firewall in order to prevent any external party from directly accessing the application and the PHI data.