Skip to main content

Table 1 Comparison with other work

From: A covert authentication and security solution for GMOs

Feature

[11]

[13]

[14]

[15]

[16]

Our method

Added security features in addition to the sequences

yes

no

no

n/a

no

yes

Source compression (via any cryptographic encoding, substitution cipher, or coding theory)

yes

yes

yes

n/a

n/a

yes

Explicit formulation and identification of broader security requirements and goals

no

no

no

n/a

no

yes

Adaptation and incorporation of novel cryptographic techniques to ensure that sensitive information remains concealed during the verification process

no

no

no

no

no

yes