A Novel Two-Factor Authentication Scheme Based on QR Code Prompt
Abstract
1. Introduction
2. Related Work
2.1. Various Two-Factor Authentication Methods
2.2. Uses of QR Codes
2.3. QR Code-Based Authentication
3. Research Methodology for Geometrical Patterns Design
4. The Proposed Authentication Method with QR Code Prompt
4.1. Authentication Through QR Code System
| Algorithm 1: QR Code-Based Two-Factor Authentication with Geometric Prompts |
| Input: User_ID, Server_Secret, Device_ID |
| Output: Authentication Success/Failure |
| 1. Server generates OTP ← HMAC(Server_Secret, User_ID, Timestamp) |
| 2. QR_Data ← Encode(User_ID||OTP||Session_ID) |
| 3. QR_Code ← GenerateQRCode(QR_Data, Version) |
| 4. Embed geometric shape S with outline width w at position P based on QR version |
| 5. Display QR_Code to user |
| 6. User scans QR_Code via mobile device |
| 7. Extract QR_Data and verify scannability |
| 8. Device_Hash ← SHA-256(Device_ID) |
| 9. Send {OTP, Device_Hash, Shape_Response} to server via TLS 1.3 |
| 10. Server validates OTP, session freshness, and device hash |
| 11. Server verifies user response to geometric prompt |
| 12. If all checks pass → Authentication = SUCCESS |
| 13. Else → Authentication = FAILURE |
4.1.1. Formal Security Analysis
4.1.2. Informal Security Analysis
4.1.3. Computational Complexity Analysis
4.2. Experimental Process
4.2.1. User’s Perception Survey
- Outline Widths: ranging from 1 to 5, representing different levels of thickness.
- Geometric Shapes: circles, squares, and triangles.
- Colors: black and white to maintain optimal contrast.
- Positional Placements: each shape was strategically placed in three distinct positions within the QR code (P1, P2, and P3) to study its impact on visibility and usability.
- Clarity: the ease with which geometric shapes could be distinguished within the QR code structure.
- Visual Esthetics: which outline widths and design combinations were visually appealing while maintaining the integrity of the QR code.
- Usability: how the outline width influenced the scanning performance and ease of decoding the QR code.
4.2.2. Participant Recruitment and Sample Size Justification
4.2.3. Scannability Tests
- In addition to subjective evaluations, decoding tests were performed using three mobile devices—iPhone 14 Pro Max, Samsung S23, and Asus ROG Phone 7. QR codes were scanned from a desktop screen with 1920 × 1080 resolution, 60 Hz refresh rate, 8-bit color depth, RGB color format, and standard dynamic range, as detailed in Table 3. The tests considered the following conditions:
- Distance Variations: Scans were conducted at three distances—close (10 cm), medium (50 cm), and far (100 cm)—to assess the impact of outline width on decoding performance.
- Lighting Conditions: Scans were performed under low, medium, and bright lighting to evaluate how different outline widths affected readability in varying environments.
4.2.4. Extended Experimental Design: Multiple Geometrical Shapes
4.3. Attack Resistance Analysis
5. Results and Discussion
5.1. Preferences for Outline Widths
- Black Shapes
- Circles: Preferred outline widths were concentrated around 2 to 4, with a mean of 2.9 and a standard deviation of 0.85 as shown in Figure 6.
- Triangles: Outline widths of 2 to 4 dominated the responses, with a mean of 2.8 and lower variability (standard deviation = 0.69), as shown in Figure 6.
- Squares: Participants preferred widths of 4 and 5, with a higher mean of 4.2 and more variation (standard deviation = 0.89), as shown in Figure 7.
- White Shapes
- Circles: Preferred outline widths ranged from 3 to 5, with a mean of 4.0 and standard deviation of 0.91, as shown in Figure 8.
- Triangles: Outline widths of 4 to 5 were dominant, yielding a mean of 4.1 with minimal deviation (standard deviation = 0.71), as shown in Figure 8.
- Squares: Thicker widths of value 4 and 5 were preferred, with a mean of 4.1 and standard deviation of 0.91 as shown in Figure 8.
5.2. Decoding Tests Results
5.3. Implications for QR Code Design
5.4. Multiple Shapes
5.5. Comparative Analysis with Existing 2FA Systems
5.6. Scalability and Performance Analysis
6. Limitations and Future Work
7. Conclusions
Supplementary Materials
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- İşler, D.; Küpçü, A.; Coskun, A. User Study on Single Password Authentication. IACR Cryptol. ePrint Arch. 2018, 1, 1–31. [Google Scholar]
- Saxena, N.; Voris, J. Exploring Mobile Proxies for Better Password Authentication. In Information and Communications Security; ICICS, Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2012; pp. 293–302. [Google Scholar] [CrossRef]
- Saltzer, J.H.; Schroeder, M.D. The protection of information in computer systems. Proc. IEEE 1975, 63, 1278–1308. [Google Scholar] [CrossRef]
- Conklin, A.; Dietrich, G.; Walz, D. Password-based authentication: A system perspective. In Proceedings of the 37th Annual Hawaii International Conference on System Sciences; IEEE Computer Society: Washington, DC, USA, 2004; pp. 2645–2654. [Google Scholar]
- Jang-Jaccard, J.; Nepal, S. A survey of emerging threats in cybersecurity. J. Comput. Syst. Sci. 2014, 80, 973–993. [Google Scholar] [CrossRef]
- Aslan, Ö.; Aktuğ, S.S.; Ozkan-Okay, M.; Yilmaz, A.A.; Akin, E. A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions. Electronics 2023, 12, 1333. [Google Scholar] [CrossRef]
- Carlos Arcila, L.R.; Pritam, N. RSA Breach Leaks Data for Hacking SecurID Tokens. 2023. Available online: https://inquest.net/wp-content/uploads/2023-data-breach-investigations-report-dbir.pdf (accessed on 28 December 2023).
- Djeki, E.; Dégila, J.; Alhassan, M.H. Reimagining Authentication: A User-Centric Two-Factor Authentication with Personalized Image Verification. In 2024 ASU International Conference in Emerging Technologies for Sustainability and Intelligent Systems, ICETSIS; Institute of Electrical and Electronics Engineers Inc.: Piscataway, NJ, USA, 2024; pp. 281–285. [Google Scholar] [CrossRef]
- Ometov, A.; Bezzateev, S.; Mäkitalo, N.; Andreev, S.; Mikkonen, T.; Koucheryavy, Y. Multi-Factor Authentication: A Survey. Cryptography 2018, 2, 1. [Google Scholar] [CrossRef]
- Goel, S.; Williams, K.; Dincelli, E. Got Phished? Internet Security and Human Vulnerability. J. Assoc. Inf. Syst. 2017, 18, 22–44. [Google Scholar] [CrossRef]
- Papathanasiou, A.; Liontos, G.; Liagkou, V.; Glavas, E. Business Email Compromise (BEC) Attacks: Threats, Vulnerabilities and Countermeasures—A Perspective on the Greek Landscape. J. Cybersecur. Priv. 2023, 3, 610–637. [Google Scholar] [CrossRef]
- Naomi, J.M.D.; Lefkovitz, B. Digital Identity Guidelines: Authentication and Lifecycle Management. Natl. Inst. Stand. Technol. J. 2017, 800–863B, 1–79. [Google Scholar] [CrossRef]
- Jarecki, S.; Jubur, M.; Krawczyk, H.; Saxena, N.; Shirvanian, M. Two-factor Password-authenticated Key Exchange with End-to-end Security. ACM Trans. Priv. Secur. 2021, 24, 1–37. [Google Scholar] [CrossRef]
- Bhanderi, D.; Kavathiya, M.; Bhut, T.; Kaur, H.; Mehta, M. Impact of Two-Factor Authentication on User Convenience and Security. In Proceedings of the 2023 10th International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 15–17 March 2023; pp. 617–622. Available online: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10112421 (accessed on 15 March 2023).
- Paul Kirvan, M.C.; Loshin, P. What is Two-Factor Authentication (2FA)? Techtarget. Available online: https://www.techtarget.com/searchsecurity/definition/two-factor-authentication (accessed on 28 December 2023).
- Wu, Y.; Pang, M.; Ma, J.; Ou, W.; Yue, Q.; Han, W. An Identity Management Scheme Based on Multi-Factor Authentication and Dynamic Trust Evaluation for Telemedicine. Sensors 2025, 25, 2118. [Google Scholar] [CrossRef]
- Ali, G.; Dida, M.A.; Sam, A.E. A Secure and Efficient Multi-Factor Authentication Algorithm for Mobile Money Applications. Futur. Internet 2021, 13, 299. [Google Scholar] [CrossRef]
- Nanzatov, A.; Peña-Castillo, L.; Meruvia-Pastor, O. NRXR-ID: Two-Factor Authentication (2FA) in VR Using Near-Range Extended Reality and Smartphones. Electronics 2025, 14, 3368. [Google Scholar] [CrossRef]
- Čižiūnienė, K.; Prokopovič, M.; Zaranka, J.; Matijošius, J. Biometric Breakthroughs for Sustainable Travel: Transforming Public Transportation through Secure Identification. Sustainability 2024, 16, 5071. [Google Scholar] [CrossRef]
- Wen, Y.; Su, Y.; Li, W. Post-Quantum Secure Multi-Factor Authentication Protocol for Multi-Server Architecture. Entropy 2025, 27, 765. [Google Scholar] [CrossRef]
- Tran-Truong, P.T.; Pham, M.Q.; Son, H.X.; Nguyen, D.L.; Nguyen, M.B.; Tran, K.L.; Van, L.C.; Le, K.T.; Vo, K.H.; Kim, N.N.; et al. A systematic review of multi-factor authentication in digital payment systems: NIST standards alignment and industry implementation analysis. J. Syst. Arch. 2025, 162, 103402. [Google Scholar] [CrossRef]
- Krishnaprabha, R. Secure multi-factor authentication and digital identity management using twisted group ring-based cryptography. Int. J. Inf. Technol. 2025, 1, 1–15. [Google Scholar] [CrossRef]
- Sun, N.; Liu, Y.; Zhang, Y.; Liu, Y. Decoupling Online Ride-Hailing Services: A Privacy Protection Scheme Based on Decentralized Identity. Electronics 2024, 13, 4060. [Google Scholar] [CrossRef]
- AlJanah, S.; Zhang, N.; Tay, S.W. Optimizing Group Multi-Factor Authentication for Secure and Efficient IoT Device Communications. Cryptography 2025, 9, 35. [Google Scholar] [CrossRef]
- Manowska, A.; Boros, M.; Hassan, M.W.; Bluszcz, A.; Tobór-Osadnik, K. A Modern Approach to Securing Critical Infrastructure in Energy Transmission Networks: Integration of Cryptographic Mechanisms and Biometric Data. Electronics 2024, 13, 2849. [Google Scholar] [CrossRef]
- Chen, T.-H.; Huang, J.-C. A novel user-participating authentication scheme. J. Syst. Softw. 2010, 83, 861–867. [Google Scholar] [CrossRef]
- Sain, M.; Kim, K.-H.; Kang, Y.-J.; Lee, H.J. An Improved Two Factor User Authentication Framework Based on CAPTCHA and Visual Secret Sharing. In The 22nd IEEE International Conference on Computational Science and Engineering, the 17th IEEE International Conference on Embedded and Ubiquitous Computing CSE/EUC 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 171–175. [Google Scholar]
- Wilkinson, D. SMS or Email for Two-Factor Authentication? SimpleTexting. Available online: https://simpletexting.com/blog/sms-vs-email-2fa/ (accessed on 28 December 2023).
- Gill, A. Using Geo-Location Data in the Authentication Process. CURITY. Available online: https://curity.io/resources/learn/geolocation-overview/ (accessed on 28 December 2023).
- Doctro, K. Introduction to Cyber Security: Stay Safe Online. The Open University|OpenLearn. Available online: https://www.open.edu/openlearn/mod/oucontent/view.php?id=48261 (accessed on 28 December 2023).
- David Kopack, B.S. Secure QR Code Authentication, Version 1.0; OASIS Open: Woburn, MA, USA, 2022; Volume 1, 1–25. Available online: https://docs.oasis-open.org/esat/sqrap/v1.0/csd01/sqrap-v1.0-csd01.html (accessed on 20 March 2023).
- Okazaki, S.; Li, H.; Hirose, M. Benchmarking the Use of QR Code in Mobile Promotion. J. Advert. Res. 2012, 52, 102–117. [Google Scholar] [CrossRef]
- Chang, J.H. An introduction to using QR codes in scholarly journals. Sci. Ed. 2014, 1, 113–117. [Google Scholar] [CrossRef]
- Chow, Y.-W.; Susilo, W.; Wang, J.; Buckland, R.; Baek, J.; Kim, J.; Li, N. Utilizing QR codes to verify the visual fidelity of image datasets for machine learning. J. Netw. Comput. Appl. 2021, 173, 102834. [Google Scholar] [CrossRef]
- Tirfe, D.; Anand, V.K. A Survey on Trends of Two-Factor Authentication. Lect. Notes Netw. Syst. 2022, 281, 285–296. [Google Scholar] [CrossRef]
- AlQahtani, A.A.S.; Alamleh, H.; Gourd, J. BF2FA: Beacon Frame Two-factor Authentication. In Proceedings of the 2020 IEEE International Conference on Communication, Networks and Satellite (Comnetsat), Batam, Indonesia, 17–18 December 2020; pp. 357–361. [Google Scholar]
- Shirvanian, M.; Agrawal, S. 2D-2FA: A New Dimension in Two-Factor Authentication. In ACSAC ’21: Proceedings of the 37th Annual Computer Security Applications Conference; Association for Computing Machinery: New York, NY, USA, 2021; pp. 482–496. [Google Scholar] [CrossRef]
- von Ahn, L.; Blum, M.; Hopper, N.J.; Langford, J. CAPTCHA: Using Hard AI Problems for Security. In Advances in Cryptology—EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques; Springer: Berlin/Heidelberg, Germany, 2003; pp. 294–311. [Google Scholar] [CrossRef]
- Aloul, F.; Zahidi, S.; El-Hajj, W. Two Factor Authentication Using Mobile Phones. In Proceedings of the IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2009, Rabat, Morocco, 10–13 May 2009; pp. 641–644. [Google Scholar] [CrossRef]
- Erdem, E.; Sandikkaya, M.T. OTPaaS—One Time Password as a Service. IEEE Trans. Inf. Forensics Secur. 2019, 14, 743–756. [Google Scholar] [CrossRef]
- Collin Mulliner, J.-P.S.; Borgaonkar, R.; Stewin, P.; Seifert, P. SMS-based one-time passwords: Attacks and defense. In Detection of Intrusions and Malware, and Vulnerability Assessment: 10th International Conference, DIMVA 2013, Berlin, Germany, 18–19 July 2013; Association for Computing Machinery: New York, NY, USA, 2013; pp. 150–159. [Google Scholar] [CrossRef]
- Putra, D.S.K.; Sadikin, M.A.; Windarta, S. S-Mbank: Secure Mobile Banking Authentication Scheme Using Signcryption, Pair Based Text Authentication, and Contactless Smartcard Susila Windarta. In Proceedings of the 2017 15th International Conference on Quality in Research (QiR): International Symposium on Electrical and Computer Engineering; IEEE Inc.: Piscataway, NJ, USA, 2017; pp. 230–234. [Google Scholar] [CrossRef]
- Hedberg, T.D.; Krima, S.; Camelio, J.A. Embedding X.509 Digital Certificates in Three-Dimensional Models for Authentication, Authorization, and Traceability of Product Data. J. Comput. Inf. Sci. Eng. 2017, 17, 011008. [Google Scholar] [CrossRef] [PubMed]
- Rodrigues, B.; Chaudhari, A.; More, S. Two factor verification using QR-code: A unique authentication system for Android smartphone users. In Proceedings of the 2016 2nd International Conference on Contemporary Computing and Informatics, IC3I 2016; Institute of Electrical and Electronics Engineers Inc.: Piscataway, NJ, USA, 2016; pp. 457–462. [Google Scholar] [CrossRef]
- Fu, Z.; Cheng, Y.; Liu, S.; Yu, B. A new two-level information protection scheme based on visual cryptography and QR code with multiple decryptions. Measurement 2019, 141, 267–276. [Google Scholar] [CrossRef]
- Mathivanan, P.; Balaji Ganesh, A. QR code based color image stego-crypto technique using dynamic bit replacement and logistic map. Optik 2021, 225, 165838. [Google Scholar] [CrossRef]
- Yang, J.; Peng, H.; Liu, L.; Lu, L. 3D printed perforated QR codes. Comput. Graph. 2019, 81, 117–124. [Google Scholar] [CrossRef]
- Yang, J.; Zhang, Y.; Lanting, C.J.M. Exploring the Impact of QR Codes in Authentication Protection: A Study Based on PMT and TPB. Wirel. Pers. Commun. 2017, 96, 5315–5334. [Google Scholar] [CrossRef]
- Aciobanitei, I.; Buhus, I.C.; Pura, M.-L. Using Cryptography in the Cloud for Lightweight Authentication Protocols Based on QR Codes. In SACI 2018—IEEE 12th International Symposium on Applied Computational Intelligence and Informatics, Proceedings, 17–19 May 2018, Timisoara, Romania; IEEE Inc.: Piscataway, NJ, USA, 2018; pp. 539–542. [Google Scholar] [CrossRef]
- Hicks, C.; Mavroudis, V.; Crowcroft, J. SIMple ID: QR Codes for Authentication Using Basic Mobile Phones in Developing Countries. In Security and Trust Management; STM 2022. Lecture Notes in Computer Science; Lenzini, G., Meng, W., Eds.; Springer Science and Business Media Deutschland GmbH: Berlin/Heidelberg, Germany, 2023; pp. 3–23. [Google Scholar] [CrossRef]
- Alam, N.; Sagar, A.S.M.S.; Zhang, W.; Jin, T.; Dosset, A.; Dang, L.M.; Moon, H. A comprehensive study on enhanced QR extraction techniques with deep learning-based verification. Appl. Intell. 2025, 55, 676. [Google Scholar] [CrossRef]
- Wang, R.; Huang, L.; Madden, K.; Wang, C. Enhancing QR Code System Security by Verifying the Scanner’s Gripping Hand Biometric. In WiSec ’24: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks; Association for Computing Machinery: New York, NY, USA, 2024; pp. 42–53. [Google Scholar] [CrossRef]
- Li, C.; Jin, Z.; Wang, F.; Zhang, Z.; Liu, B.; Guo, Y. A Novel QR Code-Based Solution for Secure Electronic Health Record Transfer in VTE Home Rehabilitation Management: The QRST-AB algorithm (Preprint). JMIR Rehabil. Assist. Technol. 2025, 12, e69230. [Google Scholar] [CrossRef]
- Kuligowska, K.; Huć, A. Innovative QR code-based product authenticity safeguards: Case study of design considerations and technological challenges. Humanit. Soc. Sci. Rev. 2024, 12, 72–80. [Google Scholar] [CrossRef]
- Husni, I.; Al Amin, I.H.; Lusiana, V.; Hartono, B.; Wahyu, D. QR Code-Based Attendance System for Contact Tracking Post-Pandemic. CogITo Smart J. 2024, 10, 15–29. [Google Scholar] [CrossRef]
- Alsuhibany, S.A. Innovative QR Code System for Tamper-Proof Generation and Fraud-Resistant Verification. Sensors 2025, 25, 3855. [Google Scholar] [CrossRef] [PubMed]
- Silva, L.; Pimentel, B.; Duarte, B.; Escarpini, R.; Sousa, L.; Cruz, N.; Silva, R. Accessibility by Design: A Systematic Review of Inclusive E-Book Standards, Tools, and Practices. Sustainability 2025, 17, 11173. [Google Scholar] [CrossRef]










| Reference | Method | Benefits | Drawbacks | Cost | Efficiency | Applications |
|---|---|---|---|---|---|---|
| [35] | OTP, Biometrics, Digital Certificates | Strong security, prevents data breaches | Vulnerable to phishing, man-in-the-middle attacks, weak credentials | Moderate | High | Secure login, access control |
| [36] | RSSI for Location-Based Authentication | Strong security, uses existing infrastructure, non-intrusive | Requires multiple hardware, Wi-Fi dependent, privacy concerns | High | Moderate | Location-sensitive access control |
| [37] | 2D-2FA with High-Entropy PIN | Enhanced security, user engagement, automated PIN transmission | Requires additional devices, synchronization issues, network dependency | Moderate | High | Secure online transactions |
| [38] | CAPTCHA for User Verification | Effective bot detection, dual-layer verification, cognitive challenge | Time-consuming, prone to errors, by-passable by AI tools, scalability issues | Low | Moderate | Web-based authentication |
| [39] | Mobile Phones as Software Tokens (OTPs) | Familiar to users, backup via SMS, effective for short durations | Phone dependency, theft/loss risks, battery/connectivity issues | Low | High | Online banking, ATM transactions |
| [40] | Cloud-Based OTP | No SMS dependency, faster, integrates with cloud services | Internet dependency, cloud service vulnerabilities, software requirements | Moderate | High | Cloud-based systems, enterprise access |
| [41] | SMS-Based OTP | Works on all phones, no internet needed | SIM swapping, cellular coverage issues, SMS interception risks | Low | Moderate | General-purpose 2FA |
| [42] | Contactless Smart Card with PIN | Secure against SMS vulnerabilities, mutual authentication | Specialized hardware required, theft/loss of card, high cost | High | High | Mobile banking, secure enterprise access |
| [43] | Embedding X.509 Certificates in 3D Models | Enhances trust, authentication, and traceability of product data | Limited adoption, implementation challenges | Moderate | High | Aerospace, PLM workflows |
| [44] | QR Code with Encrypted IMEI | Resistant to phishing, secure matching of device identifiers | Requires device compatibility, QR code decoding issues | Moderate | High | Device-based authentication |
| [45] | QR Code with Visual Cryptography | Dual-layer protection, enhanced decryption techniques | Computational complexity, hardware dependency | High | Moderate | Data security, secure communications |
| [46] | QR Code for Multi-Level Security | High robustness, data embedding, encryption | High processing power required, decoding challenges | Moderate | High | Digital watermarking, secure communication |
| [47] | 3D Printable QR Code | Low visual alteration, high decoding robustness | Requires 3D printing infrastructure, design complexity | High | Moderate | 3D modeling, secure physical tagging |
| [49] | QR Code-Based Authentication with Cloud Cryptography | Increases security, reduces smartphone computational load | Requires reliable internet and cloud infrastructure | Moderate | High | Authentication systems |
| [50] | Extending SIM Card Standards to Generate QR Codes for Authentication | Secure, biometrics-free, and privacy-preserving | Limited to feature phones, dependent on SIM card infrastructure | Low | Moderate | Foundational eID systems |
| Proposed Method | QR Codes with Geometrical Shapes | Enhances security and usability, resistant to phishing and man-in-the-middle attacks, faster recognition, seamless integration | Potential challenges with QR code readability and implementation complexity | Low to Moderate | High | Secure authentication systems |
| Outline Width | Shapes | Colors | Positions | Users | User’s Perception |
|---|---|---|---|---|---|
| 1–5 | Square, Circle, Triangle | Black, White | 3 | Male = 10 Female = 10 | Clarity, Visual Esthetics, Usability |
| Screen Details | Mobile Used | Distance (cm) | Lighting |
|---|---|---|---|
| 1920 × 1080, 60 Hz, RGB color | iPhone 14 ProMax, Samsung S23, and Asus ROG phone 7 | 10, 50 and 100 | Low, Medium, and Bright |
| Statistic | Circle | Triangle | Square |
|---|---|---|---|
| Count | 20.0 | 20.0 | 20.0 |
| Mean | 2.9 | 2.8 | 4.2 |
| Std | 0.8522 | 0.6959 | 0.8944 |
| Min | 2.0 | 2.0 | 3.0 |
| 25% | 2.0 | 2.0 | 3.0 |
| 50% | 3.0 | 3.0 | 4.5 |
| 75% | 4.0 | 3.0 | 5.0 |
| Max | 4.0 | 4.0 | 5.0 |
| Statistic | Circle | Triangle | Square |
|---|---|---|---|
| Count | 20.0 | 20.0 | 20.0 |
| Mean | 4.0 | 4.1 | 4.1 |
| Std | 0.9177 | 0.7182 | 0.9119 |
| Min | 3.0 | 3.0 | 3.0 |
| 25% | 3.0 | 4.0 | 3.0 |
| 50% | 4.0 | 4.0 | 4.0 |
| 75% | 5.0 | 5.0 | 5.0 |
| Max | 5.0 | 5.0 | 5.0 |
| Shape | Color | Outline Width | Optimal Conditions |
|---|---|---|---|
| Circle | Black | 2–4 | All lighting conditions |
| Triangle | Black | 2–3 | All distances |
| Square | Black | 4 and 5 | Medium-light, central placement preferred |
| Cricle | White | 3–5 | High contrast required in bright lighting |
| Triangle | White | 4 and 5 | High contrast required in bright lighting |
| Square | White | 4 and 5 | High contrast required in bright lighting |
| 2FA Method | Authentication Time (s) | Deployment Cost | User Convenience | Offline Capability | Security Level |
|---|---|---|---|---|---|
| SMS-based OTP | 12.5 ± 3.2 | Low initial/High per-user | Medium | No | Medium |
| Email OTP | 10.2 ± 2.9 | Low | Medium | No | Medium |
| Hardware Tokens | 8.1 ± 2.1 | High | Low | Yes | High |
| Biometric | 6.4 ± 1.8 | High | High | Yes | High |
| TOTP Apps | 5.3 ± 1.4 | Medium | High | Limited | High |
| QR Code-based (Proposed) | 3.2 ± 0.8 | Low | Very High | Yes | High |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Share and Cite
Abbas, M.; Wang, R.-Z. A Novel Two-Factor Authentication Scheme Based on QR Code Prompt. Symmetry 2026, 18, 69. https://doi.org/10.3390/sym18010069
Abbas M, Wang R-Z. A Novel Two-Factor Authentication Scheme Based on QR Code Prompt. Symmetry. 2026; 18(1):69. https://doi.org/10.3390/sym18010069
Chicago/Turabian StyleAbbas, Maisam, and Ran-Zan Wang. 2026. "A Novel Two-Factor Authentication Scheme Based on QR Code Prompt" Symmetry 18, no. 1: 69. https://doi.org/10.3390/sym18010069
APA StyleAbbas, M., & Wang, R.-Z. (2026). A Novel Two-Factor Authentication Scheme Based on QR Code Prompt. Symmetry, 18(1), 69. https://doi.org/10.3390/sym18010069

