Difficulty in distinguishing military personnel and guest based on wearing typical
or casual outfits.
Identifying an impostor or a spy within the military base.
Spoofing attacks to impersonate a military personnel and defeat the biometric
authentication mechanism.
Failure to enroll a user within the biometric database system.
Liveness detection of the users biometric data such as fingerprints.
Insecurity of military personal data and privacy concerns.
Solutions
Use of facial features or patterns for the authentication or recognition of an
individuals identity. Most face recognition systems either use eigenfaces or local feature analysis. To combat spoofing attacks, use different and multiple biometric technologies to prevent identity theft such as use of iris and retina recognition External factors that influence the accuracy, such as sunlight and the quality and cleanliness of the sensor should be considered. To combat military personnel data, design biometric interface that does not synchronize personal data of the military personnel or guest unless the user activates it. In a serious confidential scenario, usage of DNA matching pattern by synchronizing users personal information within the DNA management database with the biometric system for identification.