Research Article

A Trajectory Privacy Protect Method Based on Location Pair Reorganization

Figure 4

Example of constructing fake trajectory.