Return to Article Details Proposed method for privacy preservation using perturbation and cryptography Download Download PDF