Since adulteration can have serious consequences on human health, it affects market growth by destroying consumer confidence. Therefore, authentication of food is important for food processors, retailers and consumers, but also for regulatory authorities. However, a complex nature of food and an increase in types of adulterants make their detection difficult, so that food authentication often poses a challenge. This review focuses on analytical approaches to authentication of food of animal origin, with an emphasis put on determination of specific ingredients, geographical origin and adulteration by virtue of substitution. This review highlights a current overview of the application of target approaches in cases when the compound of interest is known and non-target approaches for screening issues. Papers cited herein mainly concern milk, cheese, meat and honey. Moreover, advantages, disadvantages as well as challenges regarding the use of both approaches in official food control but also in food industry are investigated.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.1016/j.foodchem.2017.11.007 | DOI Listing |
Insects
January 2025
Department of Biology, Faculty of Science, Chiang Mai University, Chiang Mai 50200, Thailand.
The four honeybee species native to Cambodia-, , , -play a vital role in ecosystem health and agricultural productivity through their pollination activities. Beekeeping in Cambodia has primarily developed around the introduced species . However, it remains underdeveloped compared to neighboring countries, with wild honey collection continuing to play a significant role.
View Article and Find Full Text PDFAnimals (Basel)
January 2025
Section of Genova e Portualità Marittima, Istituto Zooprofilattico Sperimentale del Piemonte, Liguria e Valle d'Aosta, Piazza Borgo Pila 39/24, 16129 Genoa, GE, Italy.
Milk has been consumed by humans for thousands of years for its nutritional properties. In recent years, raw milk demand has increased, valued for its authenticity and connection to local traditions. In Italy, the sale of raw milk is allowed exclusively through direct sale from the producing farm to the final consumer, either at the producing farm itself or through vending machines.
View Article and Find Full Text PDFFoods
January 2025
Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China.
The food and agriculture sector is a cornerstone of critical infrastructure (CI), underpinning global food security, public health, and economic stability. However, the increasing digitalization and connectivity of operational technologies (OTs) in this sector expose it to significant cybersecurity risks. Blockchain technology (BT) has emerged as a transformative solution for addressing these challenges by enhancing network security, traceability, and system resilience.
View Article and Find Full Text PDFFoods
January 2025
Department of Agro-Food Resources, National Institute of Agricultural Sciences, Rural Development Administration, Wanju 55365, Republic of Korea.
In this study, anthocyanin glycosides from nine cultivars of highbush blueberries grown in Korea were characterized using UPLC-DAD-QToF/MS and UPLC-Qtrap-MS/MS. A total of twenty-two derivatives were identified, consisting of mono-glycosides and acetyl-glycosides attached to aglycones, such as cyanidin, peonidin, delphinidin, petunidin, and malvidin. Among them, seven acetylated glycosides were tentatively determined by comparing the related authentic standards and previous reports and presented mass fragmentation, in which the acetyl group remained as the form attached to the sugar without de-esterification in positive ionization mode.
View Article and Find Full Text PDFACS Nano
January 2025
Department of Clinical Laboratory of Sir Run Run Shaw Hospital, College of Biosystems Engineering and Food Science, Zhejiang University School of Medicine, Hangzhou 310058, People's Republic of China.
The escalating growth in computing power and the advent of quantum computing present a critical threat to the security of modern cryptography. Two-factor authentication strategies can effectively resist brute-force attacks to improve the security of access control. Herein, we proposed a two-factor and two-authentication entity strategy based on the trans-cleavage activity of CRISPR-Cas and the "dual-step" sequence-specific cleavage of Argonaute.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!