Conventional methods implement processes of de-identification by the use of hashing methods applied to strings of characters generated from private data elements in data records. These conventional ...