KEYWORDS: Visualization, Medical imaging, 3D image processing, Image processing, Image visualization, Data processing, Medical image visualization, 3D displays, C++, Open source software
PACS display workstations usually display medical image volumes in one single pattern at one time. Though some
image workstations may offer three orthogonal views for orientation, users are not allowed to view different patterns of
three dimensional objects simultaneously. In this paper, we propose a novel framework that integrates different
rendering methods by utilizing the pipeline mechanism of Visualization Toolkit (VTK). VTK is an open source software
system for 3D computer graphics, image processing, and visualization. On the basis of VTK, this image display
framework can display multidimensional medical images in two different patterns, Multi-Planar Reformation (MPR) and
Maximum/Minimum Intensity Projection (MIP), at the same time with most freedom by allowing users to configure
viewpoint freely, what we call Free-MPR, and to shift between different patterns unlimitedly. Furthermore, the
framework can be easily applied to medical image workstation or Web-based network application for it is provide as a
plug-in that can be integrated conveniently. The preliminary testing results showed that our developed MedViewCtrl
display framework can be integrated into any Windows Program based display software or Internet Explore Web
Browser to provide multiwindow and multidimensional medical image visualization functionality for higher volume
medical image data sets.
KEYWORDS: Computer security, Information security, Picture Archiving and Communication System, Image processing, Medical imaging, Medicine, Image encryption, Surgery, Algorithm development, Standards development
In this paper, we developed security approach to provide security measures and features in PACS image acquisition and Tele-radiology image transmission. The security processing on medical images was based on public key infrastructure (PKI) and including digital signature and data encryption to achieve the security features of confidentiality, privacy, authenticity, integrity, and non-repudiation. There are many algorithms which can be used in PKI for data encryption and digital signature. In this research, we select several algorithms to perform security processing on different DICOM images in PACS environment, evaluate the security processing performance of these algorithms, and find the relationship between performance with image types, sizes and the implementation methods.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.