Reinventing Authentication through User-Centric Two-Factor Security and Personalized Image Verification

Authors

  • J Sivarani Department of CSE (IoT and Cyber Security including Block Chain Technology), Annamacharya Institute of Technology & Sciences (Autonomous), Tirupati, A.P, India.
  • D Lashya Kumari Department of CSE (IoT and Cyber Security including Block Chain Technology), Annamacharya Institute of Technology & Sciences (Autonomous), Tirupati, A.P, India.
  • A Jyothsna Department of CSE (IoT and Cyber Security including Block Chain Technology), Annamacharya Institute of Technology & Sciences (Autonomous), Tirupati, A.P, India.
  • S K Mohammed Khaif Department of CSE (IoT and Cyber Security including Block Chain Technology), Annamacharya Institute of Technology & Sciences (Autonomous), Tirupati, A.P, India.
  • I Hithaishi Department of CSE (IoT and Cyber Security including Block Chain Technology), Annamacharya Institute of Technology & Sciences (Autonomous), Tirupati, A.P, India.

DOI:

https://doi.org/10.5281/zenodo.18683037

Keywords:

Two-Factor Authentication, User-Centric Security, Image-Based Authentication, Graphical Passwords, Cybersecurity, Access Control, Personalized Authentication

Abstract

In the wake of the rising digital world, traditional username/password-based authentications are facing an increased risk of being compromised by various cyber attacks, including phishing, brute force attacks, credential stuffing, and artificial intelligence-based impersonation attacks. While traditional two-factor authentications provide better security than traditional username/password-based authentications, these methods often bring their own set of problems, including usability issues. To overcome the limitations of traditional two-factor authentication, this paper proposes a two-factor authentication system based on traditional username/password-based authentication and image/keyword-based authentication. The system utilizes the capabilities of human visual memory to provide better security with minimal cognitive overhead for the users. The system utilizes secure cryptographic techniques to ensure the security of the system, keyword-based image verification to prevent replay attacks, and device-based restriction techniques to prevent brute force attacks. The system is developed based on the client-server model using the Django framework. The experimental results confirm that the proposed authentication system achieves an optimal balance between usability and security, making it a feasible solution for web application security.

References

Allafi, R., & Darem, A. A. (2025). Usability and security in online authentication systems. International Journal of Advanced and Applied Sciences, 12(6), 1–12. https://doi.org/10.21833/ijaas.2025.06.001

Alotaibi, A. (2025). A review of the authentication techniques for Internet of Things in smart cities. Sensors, 25(6), 1649.

Andriotis, P., Kirby, M., & Takasu, A. (2023). Bu-Dash: A universal and dynamic graphical password scheme (extended version). International Journal of Information Security, 22(2), 381–401.

Anjaneyulu, P., Priyanka, D., Chalapathi, T., Samanvi, B., & Mounika, B. (2023). Image selection for graphical password authentication. In Proceedings of the International Conference on Machine Learning and Big Data Analytics (pp. 89–101). Springer.

Asif, M., Abrar, M., Salam, A., Amin, F., Ullah, F., Shah, S., & AlSalman, H. (2025). Intelligent two-phase dual authentication framework for Internet of Medical Things. Scientific Reports, 15, Article 1760. https://doi.org/10.1038/s41598-024-84713-5

Chihi, H., Chahboun, A., & Mezroui, S. (2025). Alternative of traditional password systems using enhanced visual cryptography. Discover Computing, 28(1), 287.

Dhinesh, M., Geetha, B., P., S., Saravanakumar, L., Jude, P. S. V., & Balaram, A. (2025). ImageGuard: Advanced user authentication via dynamic graphical password manipulation and secured image sequences. In Proceedings of the 4th International Conference on Sentiment Analysis and Deep Learning (ICSADL) (pp. 377–384). https://doi.org/10.1109/ICSADL65848.2025.10933219

Dias, N. I., Kumaresan, M. S., & Rajakumari, R. S. (2023). Deep learning based graphical password authentication approach against shoulder-surfing attacks. Multiagent and Grid Systems, 19(1), 99–115.

Ganmati, A., Afdel, K., & Koutti, L. (2025). Deep learning-based multi-factor authentication: A survey of biometric and smart card integration approaches. arXiv. https://arxiv.org/abs/2510.05163

Gilbert, C., & Gilbert, M. A. (2025). Continuous user authentication on mobile devices. International Research Journal of Advanced Engineering and Science, 10(1), 158–173.

Ibrahim, R. M. (2025). Enhancing multifactor authentication using machine learning techniques. Mesopotamian Journal of CyberSecurity, 5(2), 899–912.

Lengert, A. (2025). 2FA: Navigating the challenges and solutions for inclusive access. arXiv. https://arxiv.org/abs/2502.11737

Qin, X., Li, W., & Rosenberg, P. (2025). RoundImage: Towards secure graphical password authentication via rounded image selection in IoT. IEEE Internet of Things Journal.

Ramcharan, H. (2025). The effective integration of multi-factor authentication (MFA) with zero trust security. American Journal of Mathematical and Computational Modeling, 10(1), 1–5. https://doi.org/10.11648/j.ajmcm.20251001.11

Ray, P., Giri, D., Meng, W., & Hore, S. (2024). GPOD: An efficient and secure graphical password authentication system by fast object detection. Multimedia Tools and Applications, 83(19), 56569–56618.

Ray, P., Giri, D., Obaidat, M. S., Jana, M., Sasmal, M., & Alenazi, M. J. F. (2025). GPNST: An improved graphical password authentication scheme leveraging neural style transfer technique on smartphones. International Journal of Information Security, 24(3)*, Article 138.

Rasheed, A. F., Zarkoosh, M., & Elia, F. R. (2024). Enhancing graphical password authentication system with deep learning-based Arabic digit recognition. International Journal of Information Technology, 16(3), 1419–1427.

Suru, H. U. (2024). Improving the usability of graphical authentication systems using subject-based images.

Tran-Truong, P. T., Pham, M. Q., Son, H. X., et al. (2025). A systematic review of multi-factor authentication in digital payment systems: NIST standards alignment and industry implementation analysis. Journal of Systems Architecture, 162, 103402.

Zeeshan, N. (2025). Continuous authentication in resource-constrained environments. Sensors, 25(18), 5711.

Ahmed, S. T., Fathima, A. S., Mathivanan, S. K., Jayagopal, P., Saif, A., Gupta, S. K., & Sinha, G. (2024). iLIAC: An approach of identifying dissimilar groups on unstructured numerical image dataset using improved agglomerative clustering technique. Multimedia Tools and Applications, 83(39), 86359-86381.

Fathima, S. N., Rekha, K. B., Safinaz, S., & Ahmed, S. T. (2024). Computational techniques, classification, datasets review and way forward with modern analysis of epileptic seizure–a study. Multimedia Tools and Applications, 83(38), 85685-85701.

Khan, S. B., Tikotikar, A., DR, K. R., Ahmed, S. T., Albalawi, E., Qusaim, T., & Basheer, S. (2025). Telemedicine via Edge-Cloud Healthcare: A Federated Semi Supervised Learning Resource Recommendation Approach towards Building Sustainable Framework. IEEE Transactions on Consumer Electronics.

Downloads

Published

2026-02-18

How to Cite

J Sivarani, D Lashya Kumari, A Jyothsna, S K Mohammed Khaif, & I Hithaishi. (2026). Reinventing Authentication through User-Centric Two-Factor Security and Personalized Image Verification. International Journal of Human Computations and Intelligence, 5(3), 756–767. https://doi.org/10.5281/zenodo.18683037