Since adulteration can have serious consequences on human health, it affects market growth by destroying consumer confidence. Therefore, authentication of food is important for food processors, retailers and consumers, but also for regulatory authorities. However, a complex nature of food and an increase in types of adulterants make their detection difficult, so that food authentication often poses a challenge. This review focuses on analytical approaches to authentication of food of animal origin, with an emphasis put on determination of specific ingredients, geographical origin and adulteration by virtue of substitution. This review highlights a current overview of the application of target approaches in cases when the compound of interest is known and non-target approaches for screening issues. Papers cited herein mainly concern milk, cheese, meat and honey. Moreover, advantages, disadvantages as well as challenges regarding the use of both approaches in official food control but also in food industry are investigated.

Download full-text PDF

Source
http://dx.doi.org/10.1016/j.foodchem.2017.11.007DOI Listing

Publication Analysis

Top Keywords

authentication food
12
food
8
food animal
8
animal origin
8
origin adulteration
8
analytical methods
4
authentication
4
methods authentication
4
adulteration serious
4
serious consequences
4

Similar Publications

The four honeybee species native to Cambodia-, , , -play a vital role in ecosystem health and agricultural productivity through their pollination activities. Beekeeping in Cambodia has primarily developed around the introduced species . However, it remains underdeveloped compared to neighboring countries, with wild honey collection continuing to play a significant role.

View Article and Find Full Text PDF

Microbiological Analysis Conducted on Raw Milk Collected During Official Sampling in Liguria (North-West Italy) over a Ten-Year Period (2014-2023).

Animals (Basel)

January 2025

Section of Genova e Portualità Marittima, Istituto Zooprofilattico Sperimentale del Piemonte, Liguria e Valle d'Aosta, Piazza Borgo Pila 39/24, 16129 Genoa, GE, Italy.

Milk has been consumed by humans for thousands of years for its nutritional properties. In recent years, raw milk demand has increased, valued for its authenticity and connection to local traditions. In Italy, the sale of raw milk is allowed exclusively through direct sale from the producing farm to the final consumer, either at the producing farm itself or through vending machines.

View Article and Find Full Text PDF

A Review on Blockchain Applications in Operational Technology for Food and Agriculture Critical Infrastructure.

Foods

January 2025

Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China.

The food and agriculture sector is a cornerstone of critical infrastructure (CI), underpinning global food security, public health, and economic stability. However, the increasing digitalization and connectivity of operational technologies (OTs) in this sector expose it to significant cybersecurity risks. Blockchain technology (BT) has emerged as a transformative solution for addressing these challenges by enhancing network security, traceability, and system resilience.

View Article and Find Full Text PDF

In this study, anthocyanin glycosides from nine cultivars of highbush blueberries grown in Korea were characterized using UPLC-DAD-QToF/MS and UPLC-Qtrap-MS/MS. A total of twenty-two derivatives were identified, consisting of mono-glycosides and acetyl-glycosides attached to aglycones, such as cyanidin, peonidin, delphinidin, petunidin, and malvidin. Among them, seven acetylated glycosides were tentatively determined by comparing the related authentic standards and previous reports and presented mass fragmentation, in which the acetyl group remained as the form attached to the sugar without de-esterification in positive ionization mode.

View Article and Find Full Text PDF

A CRISPR-Cas and Argonaute-Driven Two-Factor Authentication Strategy for Information Security.

ACS Nano

January 2025

Department of Clinical Laboratory of Sir Run Run Shaw Hospital, College of Biosystems Engineering and Food Science, Zhejiang University School of Medicine, Hangzhou 310058, People's Republic of China.

The escalating growth in computing power and the advent of quantum computing present a critical threat to the security of modern cryptography. Two-factor authentication strategies can effectively resist brute-force attacks to improve the security of access control. Herein, we proposed a two-factor and two-authentication entity strategy based on the trans-cleavage activity of CRISPR-Cas and the "dual-step" sequence-specific cleavage of Argonaute.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!