Fig. 1From: An efficient reversible privacy-preserving data mining technology over data streamsSchematic diagram of CRP data protectionBack to article page