Design and Implementation of Two-Factor Authentication (2FA) through Facial Recognition and Password/Code for Social Media


Authors : Olalekan Ihinkalu; Alfa Solomon; Solomon J. Shigaba; Okidi O. Joshua; Victor Emmanuel; Shaibu S. Victor

Volume/Issue : Volume 10 - 2025, Issue 3 - March


Google Scholar : https://tinyurl.com/2h5c5zcv

Scribd : https://tinyurl.com/mr4ceh7h

DOI : https://doi.org/10.38124/ijisrt/25mar438

Google Scholar

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.

Note : Google Scholar may take 15 to 20 days to display the article.


Abstract : The social media has become a platform for individual, group of companies and people to interact with one another and also as sources of relevant information. It has aided interaction between individual and business services made through social networks. Some commonly used social media applications are Facebook, WhatsApp, Instagram, Snapchat, Twitter, and WeChat etc. The challenge with the social media is the possibility of people using other people’s password to gain access to their account, however, the focus of this research work is to design and implement a 2FA authentication using password and facial recognition system to aid security on this application. Two factor authentication system is an authentication system in computer which uses a two-way verification mechanism for the person who wants to gain access to his/her personal account. The two factors which is used in this research are security code or password which is the first factor authentication and facial recognition system which is the second factor authentication. This research focuses on how the face recognition is use to identify the authentic owner of the account through web cam before given access to the user. The methodology used was Agile and the application was developed with PHP, CSS, BOOTSTRAP AND HTML technologies for the frontend and Django, MYSQL frame work for the backend.

Keywords : Authentication, Facial Recognition System, Automated Teller Machines, Social Media Network, Two-Factor Authentication, Point of Sale and Media platform.

References :

  1.  Agbo F. J., Adewumi S. E.  & Olalekan I.”  Computer Viruses: A framework for modeling infection Susceptibility of Workstations”, Advance in Computer Science and Engineering, Vol.14, Number 2, 2015, pages 97-109. ISSN: 0973-6999; http://dx.doi.org/10.17654/ACSEMay2015_097_109
  2. Ogbuju E., Ejiorfor V., & Olalekan I. “Sentiment Analysis for Rules –driven Instant Messaging”, Confluence Journal of pure and applied sciences. Vol.1, No.1, Nov. 2017, www.cjpas.fulokoja.edu.ng
  3. Olalekan I. & Chefranov A. G.  “Analysis, Design and Implementation of a Voting System Using a Novel Oblivious and Proxy Signature”, Eastern Mediterranean University Institutional Repository, Vol. 7, 2019, http://irep.emu.edu.tr:8080/jspui/bitstream/11129/5005/1/Ebenezerolalekan.pdf
  4. Olalekan I. & Chefranov A. G., “Voting System Using Oblivious and Proxy Signature: A Privacy Flaw and its Fix,” http://www.pphmj.com;  Advance in Computer Science and Engineering, Vol.19, June 2022, http://dx.doi.org/10.17654/0973699922001,
  5. Olalekan I., Adewumi S. E & Helen E. O., “Adopting EVS as Solution to Nigeria Election using Proxy, Oblivious and Blind Signature, International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) Vol. 11, Issue 9, September 2022 DOI:10.17148/IJARCCE.2022.11901
  6. Olayiwola B., Olalekan I. & Veronica C., “Application of hourglass matrix in GoldreichGoldwasser-Halevi encryption scheme: Journal of the Nigerian Society of Physical Sciences (JNSPS). Vol.4, October 2022, DOI:10.46481/jnsps.2022.874
  7. Abayomi-Zannu, T. P., Odun-Ayo, I., Tatama, B. F., & Misra, S. Implementing a MobileVoting System Utilizing Blockchain Technology and Two-Factor Authentication in Nigeria. Lecture Notes in Networks and Systems,(2020),pg. 857–872. https://doi.org/10.1007/978-981-15-3369-3_63.
  8. Alese, T., Owolafe, O., Thompson, A., & Alese, B. A User Identity Management System for Cybercrime Control. Nigerian Journal of Technology, Vol. 40(1), (2021), pg. 129–139. https://doi.org/10.4314/njt.v40i1.17
  9. Ekundayo, H. A., Aminu, E. F., & Alabelewe, O. R. A Two Factor Authentication Protective System for Managing User Login Credentials. AICCTRA2019, (2019), pg. 95–100. Retrieved from http://repository.futminna.edu.ng:8080/jspui/handle/123456789/3539.
  10. Majid, I., & Kouser, S. Social media and security: how to ensure safe social networking. International Journal of Humanities and Education Research, Vol. 1(1), 2019, pg. 35–38. Retrieved from http://www.humanitiesjournal.net/
  11. Manoj, D. K. S. Cyber-Security: Detecting Identity Deception on Social Media Platforms. International Journal of Electrical Engineering and Technology (IJEET), Vol.12(1), (2021), pg. 98–108. https://doi.org/10.34218/IJEET.12.1.2021.011
  12. Ojewale, M. A., & Yomsi, P. M. Multi-Factor Authentication and Fingerprint-based Debit Card System. U.Porto Journal of Engineering, Vol. 5(2), (2019), pg. 19–28. https://doi.org/10.24840/2183-6493_005.002_0003
  13. Sharma, M. K., & Nene, M. J. Two factor authentication using biometric based quantum operations. Security and Privacy, Vol. 3(3), (2020). https://doi.org/10.1002/spy2.102
  14. Singh, C., Katiyar, D., & Goel, G. SOCIAL MEDIA SECURITY. International Research Journal of Engineering and Technology (IRJET), Vol. 7(5), (2020), pg. 1196–1198. Retrieved from http://www.irjet.net/
  15. System Architecture” [online] Available: https://reinvently.com/blog/fundamentalsweb-application-architecture/ [Accessed 20/12/2022]. 

The social media has become a platform for individual, group of companies and people to interact with one another and also as sources of relevant information. It has aided interaction between individual and business services made through social networks. Some commonly used social media applications are Facebook, WhatsApp, Instagram, Snapchat, Twitter, and WeChat etc. The challenge with the social media is the possibility of people using other people’s password to gain access to their account, however, the focus of this research work is to design and implement a 2FA authentication using password and facial recognition system to aid security on this application. Two factor authentication system is an authentication system in computer which uses a two-way verification mechanism for the person who wants to gain access to his/her personal account. The two factors which is used in this research are security code or password which is the first factor authentication and facial recognition system which is the second factor authentication. This research focuses on how the face recognition is use to identify the authentic owner of the account through web cam before given access to the user. The methodology used was Agile and the application was developed with PHP, CSS, BOOTSTRAP AND HTML technologies for the frontend and Django, MYSQL frame work for the backend.

Keywords : Authentication, Facial Recognition System, Automated Teller Machines, Social Media Network, Two-Factor Authentication, Point of Sale and Media platform.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe