{"id":15071,"date":"2021-09-23T12:36:13","date_gmt":"2021-09-23T16:36:13","guid":{"rendered":"http:\/\/www.iri.com\/blog\/?p=15071"},"modified":"2025-12-05T11:00:33","modified_gmt":"2025-12-05T16:00:33","slug":"masking-phi-in-dicom-darkshield-api","status":"publish","type":"post","link":"https:\/\/www.iri.com\/blog\/data-protection\/masking-phi-in-dicom-darkshield-api\/","title":{"rendered":"Masking PHI in DICOM Files"},"content":{"rendered":"<p><b><i>Abstract:<\/i><\/b> <i>With hundreds of thousands of medical imaging devices in use, DICOM is one of the most widely deployed healthcare messaging standards in the world; billions of DICOM images are currently in use for clinical care. This article describes the search and de-identification of Protected Health Information (PHI) in DICOM file metadata and imagery using the <\/i><a href=\"https:\/\/www.iri.com\/products\/darkshield\"><i>IRI DarkShield<\/i><\/a><i> data masking tool, and its REST API for files in particular. <\/i><\/p>\n<p><i><strong>DarkShield can also perform the same data discovery and de-identification of PHI for DICOM metadata and burned-in pixels from the <a href=\"https:\/\/www.iri.com\/products\/workbench\/darkshield-gui\/file-masking\">DarkShield GUI<\/a> or <a href=\"https:\/\/www.iri.com\/blog\/data-protection\/running-darkshield-from-the-command-line\/\">CLI<\/a>. See this <a href=\"https:\/\/www.youtube.com\/watch?v=Vne4ndlqDUg\">video demonstration<\/a>.<\/strong><\/i><\/p>\n<h6><b>Introduction to DICOM<\/b><\/h6>\n<p>DICOM, or Digital Imaging and Communications in Medicine, is a standard for the communication and management of medical imaging information and related data. DICOM is implemented in almost every radiology, cardiology imaging, and radiotherapy device (X-ray, CT, MRI, PET, Ultrasound, etc.), and increasingly in devices in other medical domains such as ophthalmology and dentistry.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-18782\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/Digital-Imaging-and-Communications-in-Medicine-300x282.png\" alt=\"\" width=\"440\" height=\"414\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/Digital-Imaging-and-Communications-in-Medicine-300x282.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/Digital-Imaging-and-Communications-in-Medicine-768x723.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/Digital-Imaging-and-Communications-in-Medicine.png 1019w\" sizes=\"(max-width: 440px) 100vw, 440px\" \/><\/p>\n<p>DICOM defines individual files (typically having a .dcm file extension) that have a unique binary structure consisting of a header and a data set consisting of a list of attributes. The attributes include information about the scan such as the patient name. The final attribute is the actual pixel data (imagery) of the scan.<\/p>\n<p>DICOM also defines a directory structure that organizes scans based on patient, study, and series. This directory structure contains metadata in CSV format at the root of the directory.<\/p>\n<p>DICOM files cannot be easily edited with a text editor nor viewed with a typical image viewer due to their unique binary structure.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-18783\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/Dicom-300x164.png\" alt=\"\" width=\"490\" height=\"268\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/Dicom-300x164.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/Dicom-1024x558.png 1024w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/Dicom-768x419.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/Dicom-1536x837.png 1536w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/Dicom.png 1110w\" sizes=\"(max-width: 490px) 100vw, 490px\" \/><\/p>\n<p>Individual DICOM files contain a list of attributes. Attributes include information pertaining to the scan such as patient name, date of birth, hospital name, etc. along with the pixel data of the scan as the final attribute in the sequence. Some attributes are optional, and all can be identified with a tag.<\/p>\n<p>A DICOM viewing program will typically display the pixel data as an image with the other attributes overlaid onto the image, even though these other attributes are actually separate from the pixel data itself. The other attributes are still a part of a DICOM file, but not a part of the pixel data. It is possible for DICOM files to have burned-in text embedded in the pixel data.<\/p>\n<h6><b>Masking Sensitive DICOM Data with the DarkShield API<\/b><\/h6>\n<p>The restful <a href=\"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-files-rpc-api\/\">DarkShield API for files<\/a> now supports searching and masking sensitive attributes in a DICOM file, which builds on some of the existing file handling capabilities already in the API, including <a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/hipaa\">HL7, FHIR and X12 EDI files<\/a>:<\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2021\/01\/DarkShield-files-api-diagram.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-14221 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2021\/01\/DarkShield-files-api-diagram.png\" alt=\"\" width=\"550\" height=\"372\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/01\/DarkShield-files-api-diagram.png 861w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/01\/DarkShield-files-api-diagram-300x203.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/01\/DarkShield-files-api-diagram-768x519.png 768w\" sizes=\"(max-width: 550px) 100vw, 550px\" \/><\/a><\/p>\n<p>Pixel data is just one of many attributes that may be contained in a DICOM file, and is separate from other attributes that may contain key- or quasi-identifiers such as patient name, date of birth, and hospital. DarkShield will search through all attributes that are not a part of the pixel data.<\/p>\n<p>A DICOM directory may contain CSV metadata at the root of the directory, as shown in the image below. A calling program can traverse this directory and send the CSV metadata as well as the DICOM files to the DarkShield Files API.<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/10\/csv-data-darkshield-api.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-15081 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2021\/10\/csv-data-darkshield-api-1024x115.png\" alt=\"\" width=\"1024\" height=\"115\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/10\/csv-data-darkshield-api-1024x115.png 1024w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/10\/csv-data-darkshield-api-300x34.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/10\/csv-data-darkshield-api-768x86.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/10\/csv-data-darkshield-api.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><i>Original CSV metadata file with information about each study.<\/i><\/p>\n<p>Additionally, a series of black boxes may be specified in a file mask context to redact known portions of pixel data that may have sensitive information in burned-in text. The height, width, and X and Y coordinates of each black box can be specified in the configuration or automatically discovered.<\/p>\n<h6><b>Example of DarkShield Masking<\/b><\/h6>\n<p>See <a href=\"https:\/\/www.youtube.com\/watch?v=Vne4ndlqDUg\">this video<\/a> for the GUI approach.<\/p>\n<p>A demo calling program available on <a href=\"https:\/\/github.com\/TeamIRI\/darkshield-api-demos\/tree\/master\/dicom\">GitHub<\/a> also demonstrates how the contents of a DICOM directory could be masked using the DarkShield API. In this program, a whole directory is traversed to have the CSV metadata, folder names, and individual DICOM files searched and masked. The resulting masked DICOM directory is written to a separate folder.<\/p>\n<p>The image shown below is one of the original DICOM files within the unmasked DICOM directory:<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/10\/dicom_original_file.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-15078 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2021\/10\/dicom_original_file-1024x534.png\" alt=\"\" width=\"698\" height=\"364\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/10\/dicom_original_file-1024x534.png 1024w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/10\/dicom_original_file-300x157.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/10\/dicom_original_file-768x401.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/10\/dicom_original_file.png 1110w\" sizes=\"(max-width: 698px) 100vw, 698px\" \/><\/a><i>Original DICOM file with burned-in text contained in the pixel data, displayed in a DICOM viewer.<\/i><\/p>\n<p>These DICOM files, along with others in the directory structure, the metadata in the root of the DICOM directory, and the folder names will be searched and masked. All sensitive information defined by search matchers and masking rules is treated consistently. Each search matcher is associated with a type of data, and each data type is masked based on the masking rules associated with each matcher.<\/p>\n<p>The following image shows the same file in a DICOM viewer after the PHI attributes have been found and masked. In this case, a black box was applied to an area of the pixel data to redact specific portions of the burned-in text, permanently obfuscating the patient\u2019s identity:<\/p>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/10\/dicom_black_box_burned_in_text_redacted.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-15077 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2021\/10\/dicom_black_box_burned_in_text_redacted-1024x534.png\" alt=\"\" width=\"700\" height=\"365\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/10\/dicom_black_box_burned_in_text_redacted-1024x534.png 1024w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/10\/dicom_black_box_burned_in_text_redacted-300x157.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/10\/dicom_black_box_burned_in_text_redacted-768x401.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/10\/dicom_black_box_burned_in_text_redacted.png 1110w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/a><\/p>\n<p>The CSV metadata in the directory was searched through and masked as well. The results are shown below.<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/10\/csv-masked-darkshield-api.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-15080 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2021\/10\/csv-masked-darkshield-api-1024x90.png\" alt=\"\" width=\"1024\" height=\"90\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/10\/csv-masked-darkshield-api-1024x90.png 1024w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/10\/csv-masked-darkshield-api-300x26.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/10\/csv-masked-darkshield-api-768x68.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/10\/csv-masked-darkshield-api.png 1110w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><i>Masked CSV metadata file &#8212; sensitive information is de-identified with format-preserving encryption<\/i><\/p>\n<h6><b>Auditing the Search and Masking Results<\/b><\/h6>\n<p>DarkShield returns search annotations as a part of its response when one of the search endpoints is called. Additionally, results of masking are returned as a part of the response to masking endpoints. The masking results and search annotations are in a friendly JSON format that can be aggregated in BI tools to gain insight from the contents.<\/p>\n<p>For example, what sensitive data matches were found, and what search matchers found these matches, can be aggregated and displayed in a visual way. Visualization is an intuitive to gain insights from these results, especially if they are large in size.<\/p>\n<p style=\"text-align: center;\"><a href=\"\/blog\/wp-content\/uploads\/2021\/10\/PowerBI-json-visual.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-15076 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2021\/10\/PowerBI-json-visual.png\" alt=\"\" width=\"700\" height=\"438\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/10\/PowerBI-json-visual.png 781w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/10\/PowerBI-json-visual-300x188.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/10\/PowerBI-json-visual-768x481.png 768w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/a><i>Visualization of JSON results in Microsoft Power BI, returned as a part of the response from the DarkShield API when sending text or a file to mask. This image shows the most common sensitive values found, and the associated search matchers that were used to find them.<\/i><\/p>\n<p>Inspecting visualizations of annotations and masked results can help confirm that the results are as expected. Other information included in the search annotations and masked results include the file name, any failed masking results, and where within the file the sensitive data was found.<\/p>\n<h6><b>Conclusion<\/b><\/h6>\n<p>DICOM is a key standard for storing personally-identifying data and images in the healthcare industry, but de-identifying DICOM files can be a difficult task due to their complexity. Nevertheless, data privacy laws such as those promulgated under HIPAA must be followed to de-identify or anonymize the PHI held in the data sources and silos you control, including DICOM files.<\/p>\n<p>Fines and tarnished reputations have resulted in cases of PHI data breaches. DarkShield offers effective, easily integrated solutions to address these challenges and regulations at the same time.<\/p>\n<section>\n<div class=\"container plain-width\">\n<div class=\"faq-section\">\n<h6>Frequently Asked Questions (FAQs)<\/h6>\n<div class=\"faq-item\">\n<div class=\"faq-question\">1. What is PHI and why does it need to be masked in DICOM files? <i class=\"faq-icon fa fa-plus\"><\/i><i class=\"faq-icon fa fa-minus\"><\/i><\/div>\n<div class=\"faq-answer\">Protected Health Information (PHI) refers to data that can identify a patient, such as name, date of birth, or patient ID #. Masking PHI in DICOM medical imaging studies is critical for protecting patient privacy and complying with regulations like HIPAA, which require healthcare organizations to de-identify data before sharing or using it in non-clinical contexts.<\/div>\n<\/div>\n<div class=\"faq-item\">\n<div class=\"faq-question\">2. What is DICOM and why is it a challenging format for patient de-identification? <i class=\"faq-icon fa fa-plus\"><\/i><i class=\"faq-icon fa fa-minus\"><\/i><\/div>\n<div class=\"faq-answer\">DICOM (Digital Imaging and Communications in Medicine) is a widely used standard for storing and sharing medical images. Its unique binary structure, which contains both metadata attributes and image pixel data, makes manual editing difficult. Specialized tools like DarkShield are required to identify and mask sensitive information correctly.<\/div>\n<\/div>\n<div class=\"faq-item\">\n<div class=\"faq-question\">3. How does IRI DarkShield mask PHI in DICOM files? <i class=\"faq-icon fa fa-plus\"><\/i><i class=\"faq-icon fa fa-minus\"><\/i><\/div>\n<div class=\"faq-answer\">The underlying IRI DarkShield API (REST or RPC API for files) \u2013 called programmatically or from the IRI Workbench <a href=\"https:\/\/www.iri.com\/products\/workbench\/darkshield-gui\/file-masking\">GUI for DarkShield<\/a> \u2013 will search through all DICOM metadata and image components that may contain PHI and applies masking rules to de-identify the data. It can also black-box portions of pixel data to redact burned-in text, ensuring patient identity is permanently hidden.<\/div>\n<\/div>\n<div class=\"faq-item\">\n<div class=\"faq-question\">4. How does DarkShield handle burned-in text in DICOM pixel data? <i class=\"faq-icon fa fa-plus\"><\/i><i class=\"faq-icon fa fa-minus\"><\/i><\/div>\n<div class=\"faq-answer\">DarkShield allows users to specify black box regions by defining X and Y coordinates, height, and width for areas containing sensitive text. These boxes are applied to the image pixel data to obscure PHI permanently.<\/div>\n<\/div>\n<div class=\"faq-item\">\n<div class=\"faq-question\">5. Can DarkShield process entire DICOM directories at once? <i class=\"faq-icon fa fa-plus\"><\/i><i class=\"faq-icon fa fa-minus\"><\/i><\/div>\n<div class=\"faq-answer\">Yes. DarkShield can traverse entire DICOM directories, searching through all files, folders, and associated CSV metadata. The resulting masked files are written to a new output directory, preserving the directory structure while protecting PHI.<\/div>\n<\/div>\n<div class=\"faq-item\">\n<div class=\"faq-question\">6. How does the DarkShield API return masking results? <i class=\"faq-icon fa fa-plus\"><\/i><i class=\"faq-icon fa fa-minus\"><\/i><\/div>\n<div class=\"faq-answer\">The API returns search annotations and masking results in JSON format. These results include details such as which data was found, which search matcher detected it, where in the file it was located, and whether masking succeeded or failed.<\/div>\n<\/div>\n<div class=\"faq-item\">\n<div class=\"faq-question\">7. Can I visualize search and masking results? <i class=\"faq-icon fa fa-plus\"><\/i><i class=\"faq-icon fa fa-minus\"><\/i><\/div>\n<div class=\"faq-answer\">Yes. The JSON results returned by the DarkShield jobs can be displayed in purpose-built <a href=\"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-pii-discovery-masking-charts\/\">dashboard charts<\/a> you can configure in IRI Workbench. You can also import DarkShield\u2019s machine-readable logs into analytic tools like <a href=\"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-splunk-es\/\">Splunk ES<\/a> or Microsoft Power BI to generate visuals that can also help confirm that all PHI was discovered and masked as expected.<\/div>\n<\/div>\n<div class=\"faq-item\">\n<div class=\"faq-question\">8. What types of sensitive data can be discovered in DICOM files? <i class=\"faq-icon fa fa-plus\"><\/i><i class=\"faq-icon fa fa-minus\"><\/i><\/div>\n<div class=\"faq-answer\">Types of sensitive data, also known as data classes, may include patient names, dates of birth, hospital names, study IDs, and any other identifying information stored in the metadata or burned into the image pixels. DarkShield uses search matchers to locate each type of PHI and apply consistent masking rules through the <a href=\"https:\/\/www.iri.com\/blog\/data-protection\/iri-data-classification\/\">Data Class and Rules Library<\/a>.<\/div>\n<\/div>\n<div class=\"faq-item\">\n<div class=\"faq-question\">9. How do I configure masking rules for DICOM data? <i class=\"faq-icon fa fa-plus\"><\/i><i class=\"faq-icon fa fa-minus\"><\/i><\/div>\n<div class=\"faq-answer\">Masking rules are defined in an <a href=\"https:\/\/www.iri.com\/blog\/data-protection\/iri-data-classification\/\">IRI Data Class and Rule Library<\/a>. Each data class represents a type of sensitive data, such as patient name, and is paired with a masking function like encryption, redaction, or pseudonymization. These rules are applied automatically during processing.<\/div>\n<\/div>\n<div class=\"faq-item\">\n<div class=\"faq-question\">10. Can the DarkShield API work with CSV metadata files? <i class=\"faq-icon fa fa-plus\"><\/i><i class=\"faq-icon fa fa-minus\"><\/i><\/div>\n<div class=\"faq-answer\">Yes. DarkShield can search through and mask sensitive data in CSV metadata files found at the root of DICOM directories. This ensures that all associated study information is de-identified consistently with the DICOM files.<\/div>\n<\/div>\n<div class=\"faq-item\">\n<div class=\"faq-question\">11. What are the benefits of using DarkShield over manual de-identification? <i class=\"faq-icon fa fa-plus\"><\/i><i class=\"faq-icon fa fa-minus\"><\/i><\/div>\n<div class=\"faq-answer\">Manual de-identification is time-consuming, error-prone, and may miss PHI embedded in metadata or image pixels. DarkShield automates the process, ensures consistency, and provides audit logs and visualization options to verify compliance.<\/div>\n<\/div>\n<div class=\"faq-item\">\n<div class=\"faq-question\">12. How does masking PHI in DICOM help with regulatory compliance? <i class=\"faq-icon fa fa-plus\"><\/i><i class=\"faq-icon fa fa-minus\"><\/i><\/div>\n<div class=\"faq-answer\">Masking PHI ensures that shared or archived DICOM data is de-identified in accordance with <a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/hipaa\">HIPAA<\/a> and other data privacy regulations. This reduces the risk of penalties and reputational damage from data breaches.<\/div>\n<\/div>\n<div class=\"faq-item\">\n<div class=\"faq-question\">13. Can DarkShield be used in automated workflows for DICOM processing? <i class=\"faq-icon fa fa-plus\"><\/i><i class=\"faq-icon fa fa-minus\"><\/i><\/div>\n<div class=\"faq-answer\">Yes. The DarkShield API can be integrated into automated pipelines, enabling continuous de-identification of DICOM files as they are generated or received from imaging devices.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>Abstract: With hundreds of thousands of medical imaging devices in use, DICOM is one of the most widely deployed healthcare messaging standards in the world; billions of DICOM images are currently in use for clinical care. This article describes the search and de-identification of Protected Health Information (PHI) in DICOM file metadata and imagery using<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/masking-phi-in-dicom-darkshield-api\/\" title=\"Masking PHI in DICOM Files\">Read More<\/a><\/div>\n","protected":false},"author":119,"featured_media":15077,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8,34],"tags":[2139,1494,1496,20,14,1305,1301,12,1547,2251,2253,1548,2252,2254,603,1551,1388,1552,412,2021,1549,2129,149,95,1432],"class_list":["post-15071","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-business","tag-clinical-data-anonymization","tag-darkshield-api","tag-darkshield-rpc-api","tag-data-anonymization","tag-data-masking","tag-data-masking-tools","tag-de-id-phi","tag-de-identification","tag-dicom","tag-dicom-anonymization","tag-dicom-data-protection","tag-dicom-masking","tag-dicom-obfuscation","tag-dicom-pixel-masking","tag-hipaa","tag-image-redaction","tag-iri-darkshield","tag-patient-privacy","tag-phi","tag-phi-anonymization","tag-phi-masking","tag-phi-protection","tag-pii","tag-redaction","tag-unstructured-data-masking"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v23.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Masking PHI in DICOM Files - IRI<\/title>\n<meta name=\"description\" content=\"Learn how to easily find and de-identify PHI in DICOM studies, the standard for medical imaging, using the DarkShield data masking tool.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/masking-phi-in-dicom-darkshield-api\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Masking PHI in DICOM Files\" \/>\n<meta property=\"og:description\" content=\"Learn how to easily find and de-identify PHI in DICOM studies, the standard for medical imaging, using the DarkShield data masking tool.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.iri.com\/blog\/data-protection\/masking-phi-in-dicom-darkshield-api\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-23T16:36:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-05T16:00:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/10\/dicom_black_box_burned_in_text_redacted.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1110\" \/>\n\t<meta property=\"og:image:height\" content=\"579\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Devon Kozenieski\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Devon Kozenieski\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-phi-in-dicom-darkshield-api\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-phi-in-dicom-darkshield-api\/\"},\"author\":{\"name\":\"Devon Kozenieski\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/de972c035aaeecfc40a3ae2ea5ff7ba1\"},\"headline\":\"Masking PHI in DICOM Files\",\"datePublished\":\"2021-09-23T16:36:13+00:00\",\"dateModified\":\"2025-12-05T16:00:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-phi-in-dicom-darkshield-api\/\"},\"wordCount\":1795,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-phi-in-dicom-darkshield-api\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/10\/dicom_black_box_burned_in_text_redacted.png\",\"keywords\":[\"Clinical Data Anonymization\",\"Darkshield API\",\"DarkShield RPC API\",\"data anonymization\",\"data masking\",\"data masking tools\",\"de-id phi\",\"de-identification\",\"DICOM\",\"DICOM anonymization\",\"DICOM data protection\",\"DICOM masking\",\"DICOM obfuscation\",\"DICOM pixel masking\",\"HIPAA\",\"image redaction\",\"IRI DarkShield\",\"patient privacy\",\"PHI\",\"PHI anonymization\",\"PHI masking\",\"PHI Protection\",\"PII\",\"redaction\",\"unstructured data masking\"],\"articleSection\":[\"Data Masking\/Protection\",\"IRI Business\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/masking-phi-in-dicom-darkshield-api\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-phi-in-dicom-darkshield-api\/\",\"url\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-phi-in-dicom-darkshield-api\/\",\"name\":\"Masking PHI in DICOM Files - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-phi-in-dicom-darkshield-api\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-phi-in-dicom-darkshield-api\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/10\/dicom_black_box_burned_in_text_redacted.png\",\"datePublished\":\"2021-09-23T16:36:13+00:00\",\"dateModified\":\"2025-12-05T16:00:33+00:00\",\"description\":\"Learn how to easily find and de-identify PHI in DICOM studies, the standard for medical imaging, using the DarkShield data masking tool.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-phi-in-dicom-darkshield-api\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/masking-phi-in-dicom-darkshield-api\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-phi-in-dicom-darkshield-api\/#primaryimage\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/10\/dicom_black_box_burned_in_text_redacted.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/10\/dicom_black_box_burned_in_text_redacted.png\",\"width\":1110,\"height\":579},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-phi-in-dicom-darkshield-api\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Masking PHI in DICOM Files\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.iri.com\/blog\/#website\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/de972c035aaeecfc40a3ae2ea5ff7ba1\",\"name\":\"Devon Kozenieski\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4c421588c1a85dd9a76146fe15528f7?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4c421588c1a85dd9a76146fe15528f7?s=96&d=blank&r=g\",\"caption\":\"Devon Kozenieski\"},\"url\":\"https:\/\/www.iri.com\/blog\/author\/devonk\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Masking PHI in DICOM Files - IRI","description":"Learn how to easily find and de-identify PHI in DICOM studies, the standard for medical imaging, using the DarkShield data masking tool.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.iri.com\/blog\/data-protection\/masking-phi-in-dicom-darkshield-api\/","og_locale":"en_US","og_type":"article","og_title":"Masking PHI in DICOM Files","og_description":"Learn how to easily find and de-identify PHI in DICOM studies, the standard for medical imaging, using the DarkShield data masking tool.","og_url":"https:\/\/www.iri.com\/blog\/data-protection\/masking-phi-in-dicom-darkshield-api\/","og_site_name":"IRI","article_published_time":"2021-09-23T16:36:13+00:00","article_modified_time":"2025-12-05T16:00:33+00:00","og_image":[{"width":1110,"height":579,"url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/10\/dicom_black_box_burned_in_text_redacted.png","type":"image\/png"}],"author":"Devon Kozenieski","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Devon Kozenieski","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-phi-in-dicom-darkshield-api\/#article","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-phi-in-dicom-darkshield-api\/"},"author":{"name":"Devon Kozenieski","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/de972c035aaeecfc40a3ae2ea5ff7ba1"},"headline":"Masking PHI in DICOM Files","datePublished":"2021-09-23T16:36:13+00:00","dateModified":"2025-12-05T16:00:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-phi-in-dicom-darkshield-api\/"},"wordCount":1795,"commentCount":1,"publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-phi-in-dicom-darkshield-api\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/10\/dicom_black_box_burned_in_text_redacted.png","keywords":["Clinical Data Anonymization","Darkshield API","DarkShield RPC API","data anonymization","data masking","data masking tools","de-id phi","de-identification","DICOM","DICOM anonymization","DICOM data protection","DICOM masking","DICOM obfuscation","DICOM pixel masking","HIPAA","image redaction","IRI DarkShield","patient privacy","PHI","PHI anonymization","PHI masking","PHI Protection","PII","redaction","unstructured data masking"],"articleSection":["Data Masking\/Protection","IRI Business"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.iri.com\/blog\/data-protection\/masking-phi-in-dicom-darkshield-api\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-phi-in-dicom-darkshield-api\/","url":"https:\/\/www.iri.com\/blog\/data-protection\/masking-phi-in-dicom-darkshield-api\/","name":"Masking PHI in DICOM Files - IRI","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-phi-in-dicom-darkshield-api\/#primaryimage"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-phi-in-dicom-darkshield-api\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/10\/dicom_black_box_burned_in_text_redacted.png","datePublished":"2021-09-23T16:36:13+00:00","dateModified":"2025-12-05T16:00:33+00:00","description":"Learn how to easily find and de-identify PHI in DICOM studies, the standard for medical imaging, using the DarkShield data masking tool.","breadcrumb":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-phi-in-dicom-darkshield-api\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.iri.com\/blog\/data-protection\/masking-phi-in-dicom-darkshield-api\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-phi-in-dicom-darkshield-api\/#primaryimage","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/10\/dicom_black_box_burned_in_text_redacted.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/10\/dicom_black_box_burned_in_text_redacted.png","width":1110,"height":579},{"@type":"BreadcrumbList","@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-phi-in-dicom-darkshield-api\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Masking PHI in DICOM Files"}]},{"@type":"WebSite","@id":"https:\/\/www.iri.com\/blog\/#website","url":"https:\/\/www.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.iri.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/www.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/de972c035aaeecfc40a3ae2ea5ff7ba1","name":"Devon Kozenieski","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4c421588c1a85dd9a76146fe15528f7?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4c421588c1a85dd9a76146fe15528f7?s=96&d=blank&r=g","caption":"Devon Kozenieski"},"url":"https:\/\/www.iri.com\/blog\/author\/devonk\/"}]}},"jetpack_featured_media_url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/10\/dicom_black_box_burned_in_text_redacted.png","_links":{"self":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/15071"}],"collection":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/users\/119"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=15071"}],"version-history":[{"count":20,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/15071\/revisions"}],"predecessor-version":[{"id":18788,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/15071\/revisions\/18788"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media\/15077"}],"wp:attachment":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=15071"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=15071"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=15071"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}