Fig. 9From: Privacy-preserving storage of sequenced genomic dataWorkflow of the unmasking method, where the BDIFF file is decrypted and used to unmask the masked BAM file to restore the personal BAM fileBack to article page