Return to Article Details Comparative Study on Perturbation Techniques in Privacy Preserving Data Mining on Two Numeric Datasets Download Download PDF