Return to Article Details Comparison of various Anonymization Technique Download Download PDF