From: A covert authentication and security solution for GMOs
Feature | [11] | [13] | [14] | [15] | [16] | Our method |
---|---|---|---|---|---|---|
Added security features in addition to the sequences | yes | no | no | n/a | no | yes |
Source compression (via any cryptographic encoding, substitution cipher, or coding theory) | yes | yes | yes | n/a | n/a | yes |
Explicit formulation and identification of broader security requirements and goals | no | no | no | n/a | no | yes |
Adaptation and incorporation of novel cryptographic techniques to ensure that sensitive information remains concealed during the verification process | no | no | no | no | no | yes |