Skip to main content
. 2021 Oct 2;22:712. doi: 10.1186/s12864-021-07996-2

Fig. 9.

Fig. 9

Workflow of the unmasking method, where the BDIFF file is decrypted and used to unmask the masked BAM file to restore the personal BAM file