
Product
Announcing Socket Certified Patches: One-Click Fixes for Vulnerable Dependencies
A safer, faster way to eliminate vulnerabilities without updating dependencies
@niivue/dcm2niix
Advanced tools
A javascript library to easily use the WASM build of Chris Rorden's dcm2niix command line program but in the browser.
@niivue/dcm2niix is a JavaScript + WASM library for converting DICOM files to nifti. This library is intended to be used in the browser, not in a Node.js environment.
All operations are performed using the WASM build of dcm2niix. The processing takes place in a separate worker thread, so it won't block the main thread in your application.
The @niivue/dcm2niix JavaScript library offers an object oriented API for working with the dcm2niix CLI. Since dcm2niix is a CLI tool, the API implemented in @niivue/dcm2niix is just a wrapper around the CLI options and arguments.
// assuming you have an html input element to get directories.
// <input type="file" id="fileInput" webkitdirectory multiple>
import { Dcm2niix } from '@niivue/dcm2niix';
// use the jpeg import to load jpegls and j2k build of dcm2niix
// import { Dcm2niix } from '@niivue/dcm2niix/jpeg';
const dcm2niix = new Dcm2niix();
// call the init() method to load the wasm before processing any data
await dcm2niix.init();
// fileInput is the id of the input element with options: webkitdirectory and multiple
fileInput.addEventListener('change', async (event) => {
inputFileList = event.target.files;
});
// inputFileList is the value from the input element with options: webkitdirectory and multiple
const resultFileList = await dcm2niix.input(inputFileList).run()
console.log(resultFileList);
// Do something with the resultFileList (normal browser File Objects)
// perhaps view them with @niivue/niivue :)
To install @niivue/dcm2niix in your project, run the following command:
npm install @niivue/dcm2niix
Fist, cd into the js directory of the dcm2niix repository.
# from dcm2niix root directory
cd js
To install a local build of the library, run the following command:
npm run build
Then, install the library using the following command:
npm pack # will create a .tgz file in the root directory
Then, install the @niivue/dcm2niix library in your application locally using the following command:
npm install /path/to/niivue-dcm2niix.tgz
You will need:
Pixi is used to create the environment for building the WASM port of dcm2niix. To install pixi, follow their instructions.
Note: on macos-arm64, you can get emscripten using homebrew since there is not yet a native arm64 version of emscripten on conda-forge (which is where pixi searches for packages).
pixi run wasm
pixi run clean
First cd into the js directory of the dcm2niix repository.
# from dcm2niix root directory
cd js
To install the dependencies, run the following command:
npm install
To build the library, run the following command
npm run build
To run the tests, run the following command:
npm run test
To test that the @niivue/dcm2niix library is working correctly, you can run the following command:
npm run demo
FAQs
A javascript library to easily use the WASM build of Chris Rorden's dcm2niix command line program but in the browser.
The npm package @niivue/dcm2niix receives a total of 211 weekly downloads. As such, @niivue/dcm2niix popularity was classified as not popular.
We found that @niivue/dcm2niix demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Product
A safer, faster way to eliminate vulnerabilities without updating dependencies

Product
Reachability analysis for Ruby is now in beta, helping teams identify which vulnerabilities are truly exploitable in their applications.

Research
/Security News
Malicious npm packages use Adspect cloaking and fake CAPTCHAs to fingerprint visitors and redirect victims to crypto-themed scam sites.