skip to main content
10.1145/3278576.3281274acmconferencesArticle/Chapter ViewAbstractPublication PageschConference Proceedingsconference-collections
research-article

CyberPDF: smart and secure coordinate-based automated health PDF data batch extraction

Published:22 January 2020Publication History

ABSTRACT

Data extraction from files is a prevalent activity in today's electronic health record systems which can be laborious. When document analysis is repetitive (e.g., processing a series of files with the same layout and extraction requirements), relying on data-entry staff to manually perform such tasks is costly and highly insecure. Particularly analyzing a large list of PDF files (as a widely used format) to extract specific data and migrate them to other destinations for later use is both tedious and frustrating to do manually. This paper addresses a very practical requirement of batch extracting data from PDF files in health data document analysis and beyond. Specifically, we propose a Coordinate Based Information Extraction System (CBIES) to instrument a smart and automatic PDF batch data extraction tool, releasing health organizations from duplicate efforts and reducing labor costs. The proposed technique enables users to query a representative PDF document and extract the same data from a series of files in the batch analysis manner swiftly. Furthermore, since security and privacy considerations are essential part of any health record systems, it is included in our approach. Based on CBIES, we implement a prototype tool for PDF batch data extraction technique named, CyberPDF. The tool exhibits great efficiency, security and accuracy in multi-file data processing.

References

  1. B. Yildiz, K. Kaiser, S. Miksch, pdf2table: A Method to Extract Table Information from PDF Files, Proceedings of the 2nd Indian International Conference on Artificial Intelligence, 1773--1785 (2005).Google ScholarGoogle Scholar
  2. N A. Rosenberg, DISTRUCT: a program for the graphical display of population structure, Molecular Ecology Resources, 4(1), 137--138 (2004)Google ScholarGoogle Scholar
  3. L. Leurs, The history of PDF, Retrieved on, 9--19 (2007)Google ScholarGoogle Scholar
  4. D. Johnson, The 8 most popular document formats on the web, Retrieved, 2, 14--30 (2014)Google ScholarGoogle Scholar
  5. A L. DeFranco, R S. Schmidgall, Cash Budgets, Controls, and Management in Clubs, The Journal of Hospitality Financial Management, 25(2), 112--122 (2017)Google ScholarGoogle ScholarCross RefCross Ref
  6. C. Ramakrishnan, A. Patnia, E. Hovy, Layout-aware text extraction from full-text PDF of scientific articles, Source code for biology and medicine, 7(1), 7 (2012)Google ScholarGoogle Scholar
  7. D. Jiang, X. Yang, Converting PDF to HTML approach based on Text Detection, Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human, 982--985 (2009)Google ScholarGoogle Scholar
  8. M. Aiello, C.Monz, L.Todoran, M.Worring, Document understanding for a broad class of documents, International Journal on Document Analysis and Recognition, 5(1), 1--16 (2002)Google ScholarGoogle Scholar
  9. E. Bart, P.Sarkar, Information extraction by finding repeated structure, Proceedings of the 9th IAPR International Workshop on Document Analysis Systems, ACM, 175--182 (2010)Google ScholarGoogle Scholar
  10. KC. Santosh, A.Bela, Pattern-based approach to table extraction, Iberian Conference on Pattern Recognition and Image Analysis,Springer, 766--773 (2013)Google ScholarGoogle Scholar
  11. T. Hassan and R. Baumgartner, Table Recognition and Understanding from PDF Files, Ninth International Conference on Document Analysis and Recognition (ICDAR 2007), 1143--1147 (2007).Google ScholarGoogle ScholarCross RefCross Ref
  12. D. Maiorca, I. Corona, G. Giacinto, Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious pdf files detection, Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, 119--130 (2013)Google ScholarGoogle Scholar
  13. A. Lin, S. Prish, S. Der, Associating captured image data with a spreadsheet, U.S. Patent, 9,042,653 (2015)Google ScholarGoogle Scholar
  14. G G Parker, Alstyne Van, Two-sided network effects: A theory of information product design, Management science, 51(10), 1494--1504 (2005)Google ScholarGoogle Scholar
  15. B C. Lear, C E. Merrill, J M. Lin, AG protein-coupled receptor, groom-of-PDF, is required for PDF neuron action in circadian behavior, Neuron, 48(2), 221--227 (2005)Google ScholarGoogle ScholarCross RefCross Ref
  16. Y. Aytar, A. Zisserman, Tabula rasa: Model transfer for object category detection, Proceedings of the IEEE International Conference on Computer Vision (ICCV). IEEE, 2252--2259 (2011)Google ScholarGoogle Scholar
  17. PDFBox A, Apache PDFBox (2017)Google ScholarGoogle Scholar
  18. C L R. MendonÃğa, A M R. Vincenzi, DÃvida TÃlcnica: um estudo de caso com produtos de cÃşdigo aberto, thesis (2014)Google ScholarGoogle Scholar
  19. Apache P O I, Java A P I, To Access Microsoft Format Files, http://poi.apache.org (2009)Google ScholarGoogle Scholar
  20. P. Gobin, H H. Hall, C R. Hauryluck, Web based integrated customer interface for invoice reporting, U.S. Patent, 6,745,229 (2004)Google ScholarGoogle Scholar
  21. A. Alorf, A L. Abbott, Improved Face and Head Detection Based on Traditional Middle Eastern Clothing, International Conference Image Analysis and Recognition, 389--398 (2017)Google ScholarGoogle Scholar
  22. Kruse, C. S., Smith, B., Vanderlinden, H., & Nealand, A. (2017). Security Techniques for the Electronic Health Records. Journal of Medical Systems, 41(8), 127. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. S. Walker-Roberts, M. Hammoudeh and A. Dehghantanha, "A Systematic Review of the Availability and Efficacy of Countermeasures to Internal Threats in Healthcare Critical Infrastructure," in IEEE Access, vol. 6, pp. 25167--25177, 2018.Google ScholarGoogle Scholar
  24. W. Meng, K. K. R. Choo, S. Furnell, A. V. Vasilakos and C. W. Probst, "Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks," in IEEE Transactions on Network and Service Management, vol. 15, no. 2, pp. 761--773, 2018.Google ScholarGoogle Scholar
  25. Maiorca, D., Corona, I., & Giacinto, G. Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious pdf files detection. In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, pp. 119--130 (2013).Google ScholarGoogle Scholar
  26. Reza M. Parizi, Abdul Azim Ghani, Sai Peck Lee, and Saif Ur Khan. 2017. RAMBUTANS: automatic AOP-specific test generation tool. Int. J. Softw. Tools Technol. Transf. 19, 6 (November 2017), 743--761. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Reza M. Parizi, Abdul Azim Ghani, "Architectural Knowledge Sharing (AKS) Approaches: a Survey ResearchâĂİ, Journal of Theoretical and Applied Information Technology, 1224--1235 (2008).Google ScholarGoogle Scholar

Index Terms

  1. CyberPDF: smart and secure coordinate-based automated health PDF data batch extraction

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHASE '18: Proceedings of the 2018 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies
      September 2018
      139 pages
      ISBN:9781450359580
      DOI:10.1145/3278576

      Copyright © 2018 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 22 January 2020

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader