Authors :
Olalekan Ihinkalu; Alfa Solomon; Solomon J. Shigaba; Okidi O. Joshua; Victor Emmanuel; Shaibu S. Victor
Volume/Issue :
Volume 10 - 2025, Issue 3 - March
Google Scholar :
https://tinyurl.com/2h5c5zcv
Scribd :
https://tinyurl.com/mr4ceh7h
DOI :
https://doi.org/10.38124/ijisrt/25mar438
Google Scholar
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Note : Google Scholar may take 15 to 20 days to display the article.
Abstract :
The social media has become a platform for individual, group of companies and people to interact with one another
and also as sources of relevant information. It has aided interaction between individual and business services made through
social networks. Some commonly used social media applications are Facebook, WhatsApp, Instagram, Snapchat, Twitter,
and WeChat etc. The challenge with the social media is the possibility of people using other people’s password to gain access
to their account, however, the focus of this research work is to design and implement a 2FA authentication using password
and facial recognition system to aid security on this application. Two factor authentication system is an authentication system
in computer which uses a two-way verification mechanism for the person who wants to gain access to his/her personal
account. The two factors which is used in this research are security code or password which is the first factor authentication
and facial recognition system which is the second factor authentication. This research focuses on how the face recognition is
use to identify the authentic owner of the account through web cam before given access to the user. The methodology used
was Agile and the application was developed with PHP, CSS, BOOTSTRAP AND HTML technologies for the frontend and
Django, MYSQL frame work for the backend.
Keywords :
Authentication, Facial Recognition System, Automated Teller Machines, Social Media Network, Two-Factor Authentication, Point of Sale and Media platform.
References :
- Agbo F. J., Adewumi S. E. & Olalekan I.” Computer Viruses: A framework for modeling infection Susceptibility of Workstations”, Advance in Computer Science and Engineering, Vol.14, Number 2, 2015, pages 97-109. ISSN: 0973-6999; http://dx.doi.org/10.17654/ACSEMay2015_097_109
- Ogbuju E., Ejiorfor V., & Olalekan I. “Sentiment Analysis for Rules –driven Instant Messaging”, Confluence Journal of pure and applied sciences. Vol.1, No.1, Nov. 2017, www.cjpas.fulokoja.edu.ng
- Olalekan I. & Chefranov A. G. “Analysis, Design and Implementation of a Voting System Using a Novel Oblivious and Proxy Signature”, Eastern Mediterranean University Institutional Repository, Vol. 7, 2019, http://irep.emu.edu.tr:8080/jspui/bitstream/11129/5005/1/Ebenezerolalekan.pdf
- Olalekan I. & Chefranov A. G., “Voting System Using Oblivious and Proxy Signature: A Privacy Flaw and its Fix,” http://www.pphmj.com; Advance in Computer Science and Engineering, Vol.19, June 2022, http://dx.doi.org/10.17654/0973699922001,
- Olalekan I., Adewumi S. E & Helen E. O., “Adopting EVS as Solution to Nigeria Election using Proxy, Oblivious and Blind Signature, International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) Vol. 11, Issue 9, September 2022 DOI:10.17148/IJARCCE.2022.11901
- Olayiwola B., Olalekan I. & Veronica C., “Application of hourglass matrix in GoldreichGoldwasser-Halevi encryption scheme: Journal of the Nigerian Society of Physical Sciences (JNSPS). Vol.4, October 2022, DOI:10.46481/jnsps.2022.874
- Abayomi-Zannu, T. P., Odun-Ayo, I., Tatama, B. F., & Misra, S. Implementing a MobileVoting System Utilizing Blockchain Technology and Two-Factor Authentication in Nigeria. Lecture Notes in Networks and Systems,(2020),pg. 857–872. https://doi.org/10.1007/978-981-15-3369-3_63.
- Alese, T., Owolafe, O., Thompson, A., & Alese, B. A User Identity Management System for Cybercrime Control. Nigerian Journal of Technology, Vol. 40(1), (2021), pg. 129–139. https://doi.org/10.4314/njt.v40i1.17
- Ekundayo, H. A., Aminu, E. F., & Alabelewe, O. R. A Two Factor Authentication Protective System for Managing User Login Credentials. AICCTRA2019, (2019), pg. 95–100. Retrieved from http://repository.futminna.edu.ng:8080/jspui/handle/123456789/3539.
- Majid, I., & Kouser, S. Social media and security: how to ensure safe social networking. International Journal of Humanities and Education Research, Vol. 1(1), 2019, pg. 35–38. Retrieved from http://www.humanitiesjournal.net/
- Manoj, D. K. S. Cyber-Security: Detecting Identity Deception on Social Media Platforms. International Journal of Electrical Engineering and Technology (IJEET), Vol.12(1), (2021), pg. 98–108. https://doi.org/10.34218/IJEET.12.1.2021.011
- Ojewale, M. A., & Yomsi, P. M. Multi-Factor Authentication and Fingerprint-based Debit Card System. U.Porto Journal of Engineering, Vol. 5(2), (2019), pg. 19–28. https://doi.org/10.24840/2183-6493_005.002_0003
- Sharma, M. K., & Nene, M. J. Two
factor authentication using biometric based quantum operations. Security and Privacy, Vol. 3(3), (2020). https://doi.org/10.1002/spy2.102
- Singh, C., Katiyar, D., & Goel, G. SOCIAL MEDIA SECURITY. International Research Journal of Engineering and Technology (IRJET), Vol. 7(5), (2020), pg. 1196–1198. Retrieved from http://www.irjet.net/
- “System Architecture” [online] Available: https://reinvently.com/blog/fundamentalsweb-application-architecture/ [Accessed 20/12/2022].
The social media has become a platform for individual, group of companies and people to interact with one another
and also as sources of relevant information. It has aided interaction between individual and business services made through
social networks. Some commonly used social media applications are Facebook, WhatsApp, Instagram, Snapchat, Twitter,
and WeChat etc. The challenge with the social media is the possibility of people using other people’s password to gain access
to their account, however, the focus of this research work is to design and implement a 2FA authentication using password
and facial recognition system to aid security on this application. Two factor authentication system is an authentication system
in computer which uses a two-way verification mechanism for the person who wants to gain access to his/her personal
account. The two factors which is used in this research are security code or password which is the first factor authentication
and facial recognition system which is the second factor authentication. This research focuses on how the face recognition is
use to identify the authentic owner of the account through web cam before given access to the user. The methodology used
was Agile and the application was developed with PHP, CSS, BOOTSTRAP AND HTML technologies for the frontend and
Django, MYSQL frame work for the backend.
Keywords :
Authentication, Facial Recognition System, Automated Teller Machines, Social Media Network, Two-Factor Authentication, Point of Sale and Media platform.