CNN-Based Multi-Factor Authentication System for Mobile Devices Using Faces and Passwords

J Han - Applied Sciences, 2024 - mdpi.com
Multi-factor authentication (MFA) is a system for authenticating an individual's identity using
two or more pieces of data (known as factors). The reason for using more than two factors is …

Beyond passwords: A multi‐factor authentication approach for robust digital security

K Simha. R, R HK, A Prabhu, P Joshi - Internet Technology Letters - Wiley Online Library
Abstract Multi‐Factor Authentication (MFA) strengthens digital security by necessitating
users to verify their identity. It uses various authentication methods like adding an extra layer …

A novel multi-factor authentication algorithm based on image recognition and user established relations

D Carrillo-Torres, JA Pérez-Díaz… - Applied Sciences, 2023 - mdpi.com
Conventional authentication methods, like simple text-based passwords, have shown
vulnerabilities to different types of security attacks. Indeed, 61% of all breaches involve …

Faceture ID: face and hand gesture multi-factor authentication using deep learning

ERM Aleluya, CT Vicente - Procedia Computer Science, 2018 - Elsevier
Access control is the act of providing privacy to a resource, and authentication through a
single factor is no longer reliable to provide robust protection against unauthorized access …

Secure image based multi-factor authentication (SIMFA): A novel approach for web based services

M Misbahuddin - 2010 - shodhganga.inflibnet.ac.in
Authentication is the entry point for any network including internet for accessing resources
on the server. Since last few years there has been an increasing focus on strengthening the …

Multifactor authentication system based on color visual cryptography, facial recognition, and dragonfly optimization

DR Ibrahim, JS Teh, R Abdullah - Information Security Journal: A …, 2021 - Taylor & Francis
Facial recognition as an authentication factor requires that facial images and features are
tamper-free. Visual cryptography (VC) is commonly used for this purpose but leads to …

Four-Factor Authentication with Emerging Cybersecurity for Mobile Transactions

S Jain, R Gautam, S Sharma, R Tomar… - Innovations in Cyber …, 2021 - Springer
Cybersecurity is very much essential for Mobile Transactions to complete seamlessly.
Mobile Commerce (Mcom.) is the very basic transaction type, which is very commonly used …

A review of Two Factor Authentication Security Challenges in the Cyberspace

J Kamau, M Mgala - International Journal of Advanced Computer …, 2022 - ijact.org
Today, single-factor authentication, eg Passwords, is no longer considered secure on the
cyberspace and electronic learning environment. With the advancement of technology …

A Comprehensive Analysis on using Multifactor Authentication System for Three Level Security

R Kantipudi, ASK Mallavarapu… - … on Intelligent Data …, 2024 - ieeexplore.ieee.org
In the era of digitalization, authentication is a vital part of modern society's security. Multi-
factor authentication (MFA) is a vital solution that offers fast, simple, and trustworthy …

A survey on trends of two-factor authentication

D Tirfe, VK Anand - Contemporary Issues in Communication, Cloud and …, 2022 - Springer
The rapid increase of cybercriminals on identity theft and data breaches due to weak
authentication schemes, user's poor password management experience, and attacks such …