{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T04:36:37Z","timestamp":1776918997734,"version":"3.51.2"},"reference-count":45,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100015659","name":"Southern Federal University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100015659","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006769","name":"Russian Science Foundation","doi-asserted-by":"publisher","award":["25-76-31013"],"award-info":[{"award-number":["25-76-31013"]}],"id":[{"id":"10.13039\/501100006769","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Security and Applications"],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1016\/j.jisa.2025.104323","type":"journal-article","created":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T07:54:22Z","timestamp":1769673262000},"page":"104323","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Zerovision: A privacy-preserving iris authentication framework using zero knowledge proofs and steganographic safeguards"],"prefix":"10.1016","volume":"98","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-3383-2209","authenticated-orcid":false,"given":"Khushil","family":"Godhani","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-5059-3637","authenticated-orcid":false,"given":"Nihhar","family":"Shukla","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-9772-5253","authenticated-orcid":false,"given":"Janam","family":"Patel","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3298-4238","authenticated-orcid":false,"given":"Rajesh","family":"Gupta","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1776-4651","authenticated-orcid":false,"given":"Sudeep","family":"Tanwar","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jisa.2025.104323_bib0001","unstructured":"Center I. T. R.. 2023 data breach report. Tech. Rep.; Identity Theft Resource Center; 2023. Accessed: 2025-05-10; https:\/\/www.identitytheft.org\/data-breaches."},{"issue":"2","key":"10.1016\/j.jisa.2025.104323_bib0002","first-page":"32","article-title":"Biometric identification","volume":"51","author":"Jain","year":"2008","journal-title":"Commun ACM"},{"issue":"1","key":"10.1016\/j.jisa.2025.104323_bib0003","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/TCSVT.2003.818350","article-title":"How iris recognition works","volume":"14","author":"Daugman","year":"2004","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"4","key":"10.1016\/j.jisa.2025.104323_bib0004","doi-asserted-by":"crossref","first-page":"693","DOI":"10.3390\/eng3040047","article-title":"Real-time human authentication system based on iris recognition","volume":"3","author":"Hafeez","year":"2022","journal-title":"Eng"},{"issue":"27","key":"10.1016\/j.jisa.2025.104323_bib0005","doi-asserted-by":"crossref","first-page":"19215","DOI":"10.1007\/s11042-020-08680-5","article-title":"Privacy-preserving iris authentication using fully homomorphic encryption","volume":"79","author":"Morampudi","year":"2020","journal-title":"Multimed Tools Appl"},{"key":"10.1016\/j.jisa.2025.104323_bib0006","series-title":"Advances in cryptology \u2013 EUROCRYPT 2016","first-page":"305","article-title":"On the size of pairing-based non-interactive arguments","author":"Groth","year":"2016"},{"key":"10.1016\/j.jisa.2025.104323_bib0007","series-title":"Proceedings of the 2021\u202fACM SIGSAC conference on computer and communications security","first-page":"2968","article-title":"Zkcnn: zero knowledge proofs for convolutional neural network predictions and accuracy","author":"Liu","year":"2021"},{"key":"10.1016\/j.jisa.2025.104323_bib0008","doi-asserted-by":"crossref","first-page":"2218","DOI":"10.1109\/TIFS.2023.3262932","article-title":"Pvcnn: privacy-preserving and verifiable convolutional neural network testing","volume":"18","author":"Weng","year":"2023","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"10.1016\/j.jisa.2025.104323_bib0009","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1109\/TCC.2024.3350233","article-title":"Psvcnn: a zero-knowledge cnn prediction integrity verification strategy","volume":"12","author":"Fan","year":"2024","journal-title":"IEEE Trans Cloud Comput"},{"issue":"6","key":"10.1016\/j.jisa.2025.104323_bib0010","doi-asserted-by":"crossref","first-page":"5185","DOI":"10.1109\/TDSC.2024.3371643","article-title":"ValidCNN: a large-scale CNN predictive integrity verification scheme based on zk-SNARK","volume":"21","author":"Fan","year":"2024","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"10.1016\/j.jisa.2025.104323_bib0011","first-page":"1","article-title":"A privacy-preserving biometric authentication system with binary classification in a zero knowledge proof protocol","volume":"3","author":"Tran","year":"2021","journal-title":"IEEE Open J Comp Soc"},{"issue":"2","key":"10.1016\/j.jisa.2025.104323_bib0012","doi-asserted-by":"crossref","first-page":"1744","DOI":"10.1109\/TDSC.2022.3162623","article-title":"Attacks and countermeasures on privacy-preserving biometric authentication schemes","volume":"20","author":"Wu","year":"2022","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"6","key":"10.1016\/j.jisa.2025.104323_bib0013","doi-asserted-by":"crossref","first-page":"5056","DOI":"10.1109\/TDSC.2023.3239611","article-title":"Privacy-preserving biometric authentication: cryptanalysis and countermeasures","volume":"20","author":"Zhang","year":"2023","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"2-2","key":"10.1016\/j.jisa.2025.104323_bib0014","doi-asserted-by":"crossref","first-page":"531","DOI":"10.30630\/joiv.6.2-2.1091","article-title":"An improved approach of iris biometric authentication performance and security with cryptography and error correction codes","volume":"6","author":"Moi","year":"2022","journal-title":"JOIV: Int J Inform Visual"},{"key":"10.1016\/j.jisa.2025.104323_bib0015","article-title":"Efficient private key generation from iris data for privacy and security applications","volume":"75","author":"Dash","year":"2023","journal-title":"J Inform Secur Appl"},{"key":"10.1016\/j.jisa.2025.104323_bib0016","series-title":"2022\u202fIEEE International joint conference on biometrics (IJCB)","first-page":"1","article-title":"Sian: secure iris authentication using noise","author":"Manvi","year":"2022"},{"key":"10.1016\/j.jisa.2025.104323_bib0017","unstructured":"Kothari P., Chopra D., Singh M., Bhardwaj S., Dwivedi R.. Incorporating zero-knowledge succinct non-interactive argument of knowledge for blockchain-based identity management with off-chain computations. arXiv preprint arXiv:231019452(2023)."},{"issue":"6","key":"10.1016\/j.jisa.2025.104323_bib0018","doi-asserted-by":"crossref","first-page":"1833","DOI":"10.1007\/s10207-023-00721-y","article-title":"Privacy-preserving continuous authentication using behavioral biometrics","volume":"22","author":"Baig","year":"2023","journal-title":"Int J Inf Secur"},{"issue":"1","key":"10.1016\/j.jisa.2025.104323_bib0019","doi-asserted-by":"crossref","DOI":"10.1155\/2024\/8112209","article-title":"A novel multimodal biometric person authentication system based on ecg and iris data","volume":"2024","author":"Ashwini","year":"2024","journal-title":"Biomed Res Int"},{"key":"10.1016\/j.jisa.2025.104323_bib0020","article-title":"An effective authentication scheme for a secured IRIS recognition system based on a novel encoding technique","volume":"25","author":"Harikrishnan","year":"2023","journal-title":"Measurement"},{"key":"10.1016\/j.jisa.2025.104323_bib0021","article-title":"Privacy preserving steganography based biometric authentication system for cloud computing environment","volume":"24","author":"Prabhu","year":"2022","journal-title":"Measurement"},{"key":"10.1016\/j.jisa.2025.104323_bib0022","series-title":"Advances in communication, devices and networking: proceedings of ICCDN 2021","first-page":"233","article-title":"Reliable biometric authentication with privacy protection","author":"Sharma","year":"2022"},{"key":"10.1016\/j.jisa.2025.104323_bib0023","doi-asserted-by":"crossref","first-page":"1840","DOI":"10.1109\/ACCESS.2022.3233828","article-title":"Privacy-preserving identity management system on blockchain using zk-SNARK","volume":"11","author":"Luong","year":"2023","journal-title":"IEEE Access"},{"key":"10.1016\/j.jisa.2025.104323_bib0024","series-title":"2024 2Nd international conference on information and communication technology (ICICT)","first-page":"100","article-title":"Enhanced CNN approaches for multi-image embedding in image steganography","author":"Hossain","year":"2024"},{"key":"10.1016\/j.jisa.2025.104323_bib0025","series-title":"Proceedings of the european conference on computer vision (ECCV) workshops","article-title":"End-to-end trained CNN encoder-decoder networks for image steganography","author":"Rahim","year":"2018"},{"issue":"4","key":"10.1016\/j.jisa.2025.104323_bib0026","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/TIP.2003.819861","article-title":"Image quality assessment: from error visibility to structural similarity","volume":"13","author":"Wang","year":"2004","journal-title":"IEEE Trans Image Process"},{"issue":"13","key":"10.1016\/j.jisa.2025.104323_bib0027","doi-asserted-by":"crossref","first-page":"800","DOI":"10.1049\/el:20080522","article-title":"Scope of validity of PSNR in image\/video quality assessment","volume":"44","author":"Huynh-Thu","year":"2008","journal-title":"Electron Lett"},{"key":"10.1016\/j.jisa.2025.104323_bib0028","series-title":"Efficient enhancement and matching for iris recognition using SURF","author":"Ibrahim","year":"2015"},{"issue":"1","key":"10.1016\/j.jisa.2025.104323_bib0029","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1080\/10867651.2004.10487596","article-title":"An image inpainting technique based on the fast marching method","volume":"9","author":"Telea","year":"2004","journal-title":"J Graph Tool"},{"issue":"9","key":"10.1016\/j.jisa.2025.104323_bib0030","doi-asserted-by":"crossref","first-page":"1348","DOI":"10.1109\/5.628669","article-title":"Iris recognition: an emerging biometric technology","volume":"85","author":"Wildes","year":"2002","journal-title":"Proc IEEE"},{"key":"10.1016\/j.jisa.2025.104323_bib0031","series-title":"The essential guide to image processing","first-page":"715","article-title":"How iris recognition works","author":"Daugman","year":"2009"},{"key":"10.1016\/j.jisa.2025.104323_bib0032","unstructured":"Toft P.A.. The radon transform-theory and implementation1996."},{"issue":"3","key":"10.1016\/j.jisa.2025.104323_bib0033","first-page":"20","article-title":"New full iris recognition system and iris segmentation technique using image processing and deep convolutional neural network","volume":"6","author":"Moslhi","year":"2020","journal-title":"Int J Scient Res Multidiscipl Stud"},{"key":"10.1016\/j.jisa.2025.104323_bib0034","doi-asserted-by":"crossref","first-page":"546","DOI":"10.1016\/j.patcog.2019.04.010","article-title":"A deep learning based unified framework to detect, segment and recognize irises using spatially corresponding features","volume":"93","author":"Zhao","year":"2019","journal-title":"Pattern Recognit"},{"key":"10.1016\/j.jisa.2025.104323_bib0035","series-title":"2016\u202fIEEE Signal processing in medicine and biology symposium (SPMB)","first-page":"1","article-title":"An experimental study of deep convolutional features for iris recognition","author":"Minaee","year":"2016"},{"key":"10.1016\/j.jisa.2025.104323_bib0036","series-title":"2019\u202fIEEE 10Th international conference on biometrics theory, applications and systems (BTAS)","first-page":"1","article-title":"Deep learning-based feature extraction in iris recognition: use existing models, fine-tune or train from scratch?","author":"Boyd","year":"2019"},{"key":"10.1016\/j.jisa.2025.104323_bib0037","unstructured":"Kingma D.P., Ba J.. Adam: A method for stochastic optimization2014, arXiv preprint arXiv:14126980."},{"key":"10.1016\/j.jisa.2025.104323_bib0038","series-title":"Proceedings of the seventeenth annual ACM symposium on theory of computing","isbn-type":"print","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1145\/22145.22178","article-title":"The knowledge complexity of interactive proof-systems","author":"Goldwasser","year":"1985","ISBN":"https:\/\/id.crossref.org\/isbn\/0897911512"},{"key":"10.1016\/j.jisa.2025.104323_bib0039","series-title":"Proceedings of the 3rd innovations in theoretical computer science conference","first-page":"326","article-title":"From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again","author":"Bitansky","year":"2012"},{"key":"10.1016\/j.jisa.2025.104323_bib0040","series-title":"Annual cryptology conference","first-page":"90","article-title":"Snarks for c: verifying program executions succinctly and in zero knowledge","author":"Ben-Sasson","year":"2013"},{"issue":"2","key":"10.1016\/j.jisa.2025.104323_bib0041","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1145\/2856449","article-title":"Pinocchio: nearly practical verifiable computation","volume":"59","author":"Parno","year":"2016","journal-title":"Commun ACM"},{"key":"10.1016\/j.jisa.2025.104323_bib0042","article-title":"Making groth\u2019s zk-snark simulation extractable in the random oracle model","author":"Bowe","year":"2018","journal-title":"Cryptol ePrint Arch"},{"key":"10.1016\/j.jisa.2025.104323_bib0043","series-title":"Advances in cryptology\u2013EUROCRYPT 2020: 39th annual international conference on the theory and applications of cryptographic techniques, zagreb, croatia, may 10\u201314, 2020, proceedings, part i 39","first-page":"769","article-title":"Fractal: post-quantum and transparent recursive proofs from holography","author":"Chiesa","year":"2020"},{"key":"10.1016\/j.jisa.2025.104323_bib0044","unstructured":"C. A. of Sciences Institute of Automation. Casia iris image database. 2010,CASIA-IrisV4-Thousand subset."},{"key":"10.1016\/j.jisa.2025.104323_bib0045","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (CVPR)","first-page":"4401","article-title":"A style-based generator architecture for generative adversarial networks","author":"Karras","year":"2019"}],"container-title":["Journal of Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S221421262500359X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S221421262500359X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T03:46:09Z","timestamp":1776915969000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S221421262500359X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,5]]},"references-count":45,"alternative-id":["S221421262500359X"],"URL":"https:\/\/doi.org\/10.1016\/j.jisa.2025.104323","relation":{},"ISSN":["2214-2126"],"issn-type":[{"value":"2214-2126","type":"print"}],"subject":[],"published":{"date-parts":[[2026,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Zerovision: A privacy-preserving iris authentication framework using zero knowledge proofs and steganographic safeguards","name":"articletitle","label":"Article Title"},{"value":"Journal of Information Security and Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jisa.2025.104323","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"104323"}}