Return to Article Details Data Privacy Preserving using Perturbation Technique Download Download PDF