Research Article

A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points

Figure 11

Trajectory leakage probability comparison. (a) Regardless of the safety of the start- and end-points. (b) Considering the safety of the start- and end-points.
(a)
(b)