Skip to main content

Table 1 Comparison with other work

From: A covert authentication and security solution for GMOs

Feature [11] [13] [14] [15] [16] Our method
Added security features in addition to the sequences yes no no n/a no yes
Source compression (via any cryptographic encoding, substitution cipher, or coding theory) yes yes yes n/a n/a yes
Explicit formulation and identification of broader security requirements and goals no no no n/a no yes
Adaptation and incorporation of novel cryptographic techniques to ensure that sensitive information remains concealed during the verification process no no no no no yes