Background: Spices and herbs are food categories regularly cited as highly susceptible to be adulterated. To detect potential adulteration with undeclared species, DNA-based methods are considered the most suitable tools.
Objective: In this study, the performance of the ready-to-use Thermo Scientificâ„¢ NGS Food Authenticity Workflow (Thermo Fisher Scientific)-a commercial DNA metabarcoding approach-is described.
Japanese hop (Humulus scandens) is a non-native, invasive plant that colonizes disturbed riparian areas throughout the eastern United States and Canada, forming dense, monocultural stands that displace native plant communities due to a high reproductive rate, rapid growth, climbing bines, and dense shading (Balogh and Dancza 2008). It is capable of serving as a reservoir for agronomically important plant pathogens, such as the Tomato spotted wilt virus and powdery mildew species that infect commercial hemp and hop fields (Yoon et al. 2018; Weldon et al.
View Article and Find Full Text PDFThe morphological transformation of beef tissues after various processing treatments facilitates the addition of cheap offal products. Undetectable to the naked eye, analytical techniques are required to identify such scenarios within minced and processed products. DNA methodologies are ill-equipped to detect adulteration of offal cuts from the same species and vibrational spectroscopic studies, although rapid and non-destructive, have proved inconclusive as to whether the specific adulterant can be identified.
View Article and Find Full Text PDFMeat has been identified as one of the food categories at most risk of food fraud. Meat species substitution has been in the spotlight with the European horse meat scandal in 2013. Analysis of cases reported on the web shows that incidents of meat substitution are still recurring worldwide.
View Article and Find Full Text PDFA brief overview of the main analytical approaches and practices to determine food authenticity is presented, addressing, as well, food supply chain and future requirements to more effectively mitigate food fraud. Food companies are introducing procedures and mechanisms that allow them to identify vulnerabilities in their food supply chain under the umbrella of a food fraud prevention management system. A key step and first line of defense is thorough supply chain mapping and full transparency, assessing the likelihood of fraudsters to penetrate the chain at any point.
View Article and Find Full Text PDF