Fig. 4From: An efficient reversible privacy-preserving data mining technology over data streamsAnalysis of PIL valuesBack to article page