Fig. 6From: An anonymous entropy-based location privacy protection scheme in mobile social networksComparison of anonymous processes between Casper algorithm and K-DDCA algorithm. It depicts the anonymization process of the Casper algorithm and the K-DDCA algorithm. Subgraph a shows the Casper anonymous process, and subgraph b indicates the K-DDCA algorithm anonymous process. The shaded area represents the anonymous region. Assume that there is a LBS request req and k=2Back to article page