Skip to main content

ITK is an open-source toolkit for multidimensional image analysis

Project description

itk

ITK is an open-source, cross-platform library that provides developers with an extensive suite of software tools for image analysis. Developed through extreme programming methodologies, ITK employs leading-edge algorithms for registering and segmenting multidimensional scientific images.

ITK - The Insight Toolkit

ITK: The Insight Toolkit

GitHub release PyPI Wheels License DOI Powered by NumFOCUS

C++ Python
Linux Build Status Build Status
macOS Build Status Build Status
Windows Build Status Build Status
Linux (Code coverage) Build Status

Links

About

The Insight Toolkit (ITK) is an open-source, cross-platform toolkit for N-dimensional scientific image processing, segmentation, and registration. Segmentation is the process of identifying and classifying data found in a digitally sampled representation. Typically the sampled representation is an image acquired from such medical instrumentation as CT or MRI scanners. Registration is the task of aligning or developing correspondences between data. For example, in the medical environment, a CT scan may be aligned with a MRI scan in order to combine the information contained in both.

The ITK project uses an open governance model and is fiscally sponsored by NumFOCUS. Consider making a tax-deductible donation to help the project pay for developer time, professional services, travel, workshops, and a variety of other needs.


ITK is distributed in binary Python packages. To install:

pip install itk

or

conda install -c conda-forge itk

The cross-platform, C++ core of the toolkit may be built from source using CMake.

Copyright

NumFOCUS holds the copyright of this software. NumFOCUS is a non-profit entity that promotes the use of open source scientific software for educational and research purposes. NumFOCUS delegates project governance to the Insight Software Consortium Council, an educational consortium dedicated to promoting and maintaining open-source, freely available software for medical image analysis. This includes promoting such software in teaching, research, and commercial applications, and maintaining webpages and user and developer communities. ITK is distributed under a license that enables use for both non-commercial and commercial applications. See LICENSE and NOTICE files for details.

Supporting ITK

ITK is a fiscally sponsored project of NumFOCUS, a non-profit dedicated to supporting the open source scientific computing community. If you want to support ITK's mission to develop and maintain open-source, reproducible scientific image analysis software for education and research, please consider making a donation to support our efforts.

NumFOCUS is 501(c)(3) non-profit charity in the United States; as such, donations to NumFOCUS are tax-deductible as allowed by law. As with any donation, you should consult with your personal tax adviser or the IRS about your particular tax situation.

Professional Services

Kitware provides professional services for ITK, including custom solution creation, collaborative research and development, development support, and training.

Citation

To cite ITK, please reference, as appropriate:

The papers

McCormick M, Liu X, Jomier J, Marion C, Ibanez L. ITK: enabling reproducible research and open science. Front Neuroinform. 2014;8:13. Published 2014 Feb 20. doi:10.3389/fninf.2014.00013

Yoo TS, Ackerman MJ, Lorensen WE, Schroeder W, Chalana V, Aylward S, Metaxas D, Whitaker R. Engineering and Algorithm Design for an Image Processing API: A Technical Report on ITK – The Insight Toolkit. In Proc. of Medicine Meets Virtual Reality, J. Westwood, ed., IOS Press Amsterdam pp 586-592 (2002).

The books

Johnson, McCormick, Ibanez. "The ITK Software Guide: Design and Functionality." Fourth Edition. Published by Kitware, Inc. 2015 ISBN: 9781-930934-28-3.

Johnson, McCormick, Ibanez. "The ITK Software Guide: Introduction and Development Guidelines." Fourth Edition. Published by Kitware, Inc. 2015 ISBN: 9781-930934-27-6.

Specific software version

DOI

Once your work has been published, please create a pull request to add the publication to the ITKBibliography.bib file.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distributions

No source distribution files available for this release.See tutorial on generating distribution archives.

Built Distributions

itk-5.3rc4.post3-cp310-cp310-win_amd64.whl (8.4 kB view details)

Uploaded CPython 3.10 Windows x86-64

itk-5.3rc4.post3-cp310-cp310-manylinux_2_28_x86_64.whl (8.4 kB view details)

Uploaded CPython 3.10 manylinux: glibc 2.28+ x86-64

itk-5.3rc4.post3-cp310-cp310-manylinux2014_x86_64.manylinux_2_17_x86_64.whl (8.4 kB view details)

Uploaded CPython 3.10 manylinux: glibc 2.17+ x86-64

itk-5.3rc4.post3-cp310-cp310-macosx_11_0_arm64.whl (8.4 kB view details)

Uploaded CPython 3.10 macOS 11.0+ ARM64

itk-5.3rc4.post3-cp310-cp310-macosx_10_9_x86_64.whl (8.4 kB view details)

Uploaded CPython 3.10 macOS 10.9+ x86-64

itk-5.3rc4.post3-cp39-cp39-win_amd64.whl (8.4 kB view details)

Uploaded CPython 3.9 Windows x86-64

itk-5.3rc4.post3-cp39-cp39-manylinux_2_28_x86_64.whl (8.4 kB view details)

Uploaded CPython 3.9 manylinux: glibc 2.28+ x86-64

itk-5.3rc4.post3-cp39-cp39-manylinux2014_x86_64.manylinux_2_17_x86_64.whl (8.4 kB view details)

Uploaded CPython 3.9 manylinux: glibc 2.17+ x86-64

itk-5.3rc4.post3-cp39-cp39-macosx_11_0_arm64.whl (8.4 kB view details)

Uploaded CPython 3.9 macOS 11.0+ ARM64

itk-5.3rc4.post3-cp39-cp39-macosx_10_9_x86_64.whl (8.4 kB view details)

Uploaded CPython 3.9 macOS 10.9+ x86-64

itk-5.3rc4.post3-cp38-cp38-win_amd64.whl (8.4 kB view details)

Uploaded CPython 3.8 Windows x86-64

itk-5.3rc4.post3-cp38-cp38-manylinux_2_28_x86_64.whl (8.4 kB view details)

Uploaded CPython 3.8 manylinux: glibc 2.28+ x86-64

itk-5.3rc4.post3-cp38-cp38-manylinux2014_x86_64.manylinux_2_17_x86_64.whl (8.4 kB view details)

Uploaded CPython 3.8 manylinux: glibc 2.17+ x86-64

itk-5.3rc4.post3-cp38-cp38-macosx_10_9_x86_64.whl (8.4 kB view details)

Uploaded CPython 3.8 macOS 10.9+ x86-64

itk-5.3rc4.post3-cp37-cp37m-win_amd64.whl (8.4 kB view details)

Uploaded CPython 3.7m Windows x86-64

itk-5.3rc4.post3-cp37-cp37m-manylinux_2_28_x86_64.whl (8.4 kB view details)

Uploaded CPython 3.7m manylinux: glibc 2.28+ x86-64

itk-5.3rc4.post3-cp37-cp37m-manylinux2014_x86_64.manylinux_2_17_x86_64.whl (8.5 kB view details)

Uploaded CPython 3.7m manylinux: glibc 2.17+ x86-64

itk-5.3rc4.post3-cp37-cp37m-macosx_10_9_x86_64.whl (8.4 kB view details)

Uploaded CPython 3.7m macOS 10.9+ x86-64

File details

Details for the file itk-5.3rc4.post3-cp310-cp310-win_amd64.whl.

File metadata

File hashes

Hashes for itk-5.3rc4.post3-cp310-cp310-win_amd64.whl
Algorithm Hash digest
SHA256 289795c182c780b228b504d0c71e23b15034340f3fd63120c4a158e95b5e22fb
MD5 4a3fd466a03f7e38200bf1e2ca503eee
BLAKE2b-256 e0f10be5e4f238d289ba927122d87f7ca2e6d3d3e68ceea6ea2c60e8db575878

See more details on using hashes here.

Provenance

File details

Details for the file itk-5.3rc4.post3-cp310-cp310-manylinux_2_28_x86_64.whl.

File metadata

File hashes

Hashes for itk-5.3rc4.post3-cp310-cp310-manylinux_2_28_x86_64.whl
Algorithm Hash digest
SHA256 b3dd8c8dd8b4fb1ff79b598be441f7a5f4241cf1e00aacfb94811b5ac61934e8
MD5 035d710e00e44c7eb07cf6ee30cb0c15
BLAKE2b-256 6b2534a0f981126940c37bb5b58ff639b0612891f269f8cd6d6a77fdf13823c6

See more details on using hashes here.

Provenance

File details

Details for the file itk-5.3rc4.post3-cp310-cp310-manylinux2014_x86_64.manylinux_2_17_x86_64.whl.

File metadata

File hashes

Hashes for itk-5.3rc4.post3-cp310-cp310-manylinux2014_x86_64.manylinux_2_17_x86_64.whl
Algorithm Hash digest
SHA256 d4f5b16a850a4824a90adb4ddf33cb3fe96bd1f2947579b60b138fc03cd4702d
MD5 9df8c4b3395ad4e67abdfb21845b364b
BLAKE2b-256 c93dfc262ffddd19150caa4404286fc07f81f1dbda59d12df823431de7072929

See more details on using hashes here.

Provenance

File details

Details for the file itk-5.3rc4.post3-cp310-cp310-macosx_11_0_arm64.whl.

File metadata

File hashes

Hashes for itk-5.3rc4.post3-cp310-cp310-macosx_11_0_arm64.whl
Algorithm Hash digest
SHA256 26e2b872c38618b1b53d02c772b200b32df8634040b7347afd97e5f786ff1e29
MD5 90c7a4f324d9a186d76d0a281ab45cb7
BLAKE2b-256 c95465e440d0883ea173f1d21bf8423891dd545a3b5589545136a06c3a7c9bed

See more details on using hashes here.

Provenance

File details

Details for the file itk-5.3rc4.post3-cp310-cp310-macosx_10_9_x86_64.whl.

File metadata

File hashes

Hashes for itk-5.3rc4.post3-cp310-cp310-macosx_10_9_x86_64.whl
Algorithm Hash digest
SHA256 37247c10283c7af2e42487d72f308bf5a2a7f09ff336aa47898482995509858d
MD5 6ca02103acd60aef0d282ca4861e2778
BLAKE2b-256 c94e6b61004809eb80be0f5c152a5a97905c3fcfb6ad73d3e70a5c99d983df19

See more details on using hashes here.

Provenance

File details

Details for the file itk-5.3rc4.post3-cp39-cp39-win_amd64.whl.

File metadata

File hashes

Hashes for itk-5.3rc4.post3-cp39-cp39-win_amd64.whl
Algorithm Hash digest
SHA256 c90ba38e60b0c042c411afbd39d74636ba6a93fc571d741b78678e2bd3e31305
MD5 20eafab32a9dde1e200d0169a728a2e7
BLAKE2b-256 40fce719df97c1d5f2f4aeec78f26d2a4a4b5501ab146bc1990771cb35398fe6

See more details on using hashes here.

Provenance

File details

Details for the file itk-5.3rc4.post3-cp39-cp39-manylinux_2_28_x86_64.whl.

File metadata

File hashes

Hashes for itk-5.3rc4.post3-cp39-cp39-manylinux_2_28_x86_64.whl
Algorithm Hash digest
SHA256 63f8e800e1ac4961a688dbc83c705beea3e922660ec48df6b0663a7e48bc8348
MD5 5c28a1ea0b02f2a8cb70606d658322a6
BLAKE2b-256 9b514df1942c5a4e66de85e5a36825c1c1bc89ac82c81fcb186e116ae289d64a

See more details on using hashes here.

Provenance

File details

Details for the file itk-5.3rc4.post3-cp39-cp39-manylinux2014_x86_64.manylinux_2_17_x86_64.whl.

File metadata

File hashes

Hashes for itk-5.3rc4.post3-cp39-cp39-manylinux2014_x86_64.manylinux_2_17_x86_64.whl
Algorithm Hash digest
SHA256 6c03ea0ba32a4a81f1f3af0a02a9b0c67841523d32745039fda52feb782644c4
MD5 f262415970c8514c2b4ed7c3f37aebc0
BLAKE2b-256 e570b3d921c9d114a58921850ce475ec952972711ffc02bbed0e83f343ff7cb9

See more details on using hashes here.

Provenance

File details

Details for the file itk-5.3rc4.post3-cp39-cp39-macosx_11_0_arm64.whl.

File metadata

File hashes

Hashes for itk-5.3rc4.post3-cp39-cp39-macosx_11_0_arm64.whl
Algorithm Hash digest
SHA256 9fffdc3d90abb658e9e93490031d655d6c6a15d4234afd3744af0f1a5621b182
MD5 5cba03698f329f5decc291e9ca396d0b
BLAKE2b-256 fd37c586e111158b0d8187ce517ade1cf62c65f9220d2902ce3c22576fe3c131

See more details on using hashes here.

Provenance

File details

Details for the file itk-5.3rc4.post3-cp39-cp39-macosx_10_9_x86_64.whl.

File metadata

File hashes

Hashes for itk-5.3rc4.post3-cp39-cp39-macosx_10_9_x86_64.whl
Algorithm Hash digest
SHA256 c5be86f2be48efb050fdbf86277e96136f8d729262420a046398b19c984049e6
MD5 63f094d02b85ccb8369faf83dc30d32c
BLAKE2b-256 aa4e4e8b7f3ec9190ce71d1a4e3ddb05a2eb073d9aa3b3b3923ffae4a0d9a670

See more details on using hashes here.

Provenance

File details

Details for the file itk-5.3rc4.post3-cp38-cp38-win_amd64.whl.

File metadata

File hashes

Hashes for itk-5.3rc4.post3-cp38-cp38-win_amd64.whl
Algorithm Hash digest
SHA256 360ae1c17ef89009ed6996f6c8e3f1e04c707fd1cc04a5a8550fab042a44f25e
MD5 b3e896330afdf8925722f3077deeecb1
BLAKE2b-256 b1f7ffa8608f67c56ff72a245f3f761af568a3ceac0319b2abe118757fb1e020

See more details on using hashes here.

Provenance

File details

Details for the file itk-5.3rc4.post3-cp38-cp38-manylinux_2_28_x86_64.whl.

File metadata

File hashes

Hashes for itk-5.3rc4.post3-cp38-cp38-manylinux_2_28_x86_64.whl
Algorithm Hash digest
SHA256 fb7815eb20a1d3c04bc34f544ee2f00a53cb844e5ee9f00ac0fefd17a3452bae
MD5 e4c36f01e5b398b6d2452f2b0ed0c71d
BLAKE2b-256 8c8fd938c39f544cfb6ee790555399377ab96185cc3b35b0146f6b0d0d9e01cd

See more details on using hashes here.

Provenance

File details

Details for the file itk-5.3rc4.post3-cp38-cp38-manylinux2014_x86_64.manylinux_2_17_x86_64.whl.

File metadata

File hashes

Hashes for itk-5.3rc4.post3-cp38-cp38-manylinux2014_x86_64.manylinux_2_17_x86_64.whl
Algorithm Hash digest
SHA256 b2d46fb8823b24f9ef22dfa65c16c2e6c01737ce01a0c17dda03b232298f40e0
MD5 f0f6c18263baed568a60a2e1dd1b0d89
BLAKE2b-256 f55e17a733639774ce8a97a3c71733495e6b36abc6d0dbbee4637cd533d126a7

See more details on using hashes here.

Provenance

File details

Details for the file itk-5.3rc4.post3-cp38-cp38-macosx_10_9_x86_64.whl.

File metadata

File hashes

Hashes for itk-5.3rc4.post3-cp38-cp38-macosx_10_9_x86_64.whl
Algorithm Hash digest
SHA256 8ffb39ee97bdc6ea53ce31100d4188eb02e66be4d84e1f40014ce5b9b70326bb
MD5 e4620c61ba72db04ce101210bb623153
BLAKE2b-256 9cd15efbce73a64fddb10860afb4e610e4383d8df9efb4485f04a19992dac5e0

See more details on using hashes here.

Provenance

File details

Details for the file itk-5.3rc4.post3-cp37-cp37m-win_amd64.whl.

File metadata

File hashes

Hashes for itk-5.3rc4.post3-cp37-cp37m-win_amd64.whl
Algorithm Hash digest
SHA256 247baed83e77c38d06bc098e7bad3b241762b7869ecb17960c03a3995034d7d6
MD5 29db5f211d2d429ee3cb12c02558aa52
BLAKE2b-256 465abc2baa106420f3847ae193d690d6c7ccd3449916acaa946c8718997a5b99

See more details on using hashes here.

Provenance

File details

Details for the file itk-5.3rc4.post3-cp37-cp37m-manylinux_2_28_x86_64.whl.

File metadata

File hashes

Hashes for itk-5.3rc4.post3-cp37-cp37m-manylinux_2_28_x86_64.whl
Algorithm Hash digest
SHA256 932f76f1156f589d8a62fbe8848776438200abb5a5aede558915b84330aceb0b
MD5 74ede64845fe8109f1d3326e33db0b14
BLAKE2b-256 bdf1b2e25c9330b56cc871f05555f4213fd3773f7948f3156501c8f6a8211300

See more details on using hashes here.

Provenance

File details

Details for the file itk-5.3rc4.post3-cp37-cp37m-manylinux2014_x86_64.manylinux_2_17_x86_64.whl.

File metadata

File hashes

Hashes for itk-5.3rc4.post3-cp37-cp37m-manylinux2014_x86_64.manylinux_2_17_x86_64.whl
Algorithm Hash digest
SHA256 6e2bed9047a9b020a45898bc4b358e38793524cefc4562d046b5458faaf49a85
MD5 1d84eab71970572f64758af15ba38927
BLAKE2b-256 44bb4c8085d84f6f7bb0c55ade03586416fef46b5b952c916ab54851d96378f6

See more details on using hashes here.

Provenance

File details

Details for the file itk-5.3rc4.post3-cp37-cp37m-macosx_10_9_x86_64.whl.

File metadata

File hashes

Hashes for itk-5.3rc4.post3-cp37-cp37m-macosx_10_9_x86_64.whl
Algorithm Hash digest
SHA256 edd6c8d010038fabc72ec36fafc6c39c296c37a4b49ddf52718e006693277299
MD5 7fd09ddb10fbd4ee2f026041f6ef1ec8
BLAKE2b-256 611a2c77a2522bfb16611939b0f6a50593af37da82d9828790ffd6796b5f7eef

See more details on using hashes here.

Provenance

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page