This document presents a case study on face spoof detection. It discusses various types of spoofing attacks against facial recognition systems, including photo, video, and mask attacks. It also reviews literature on existing face spoof detection methods, which include approaches based on face motion analysis, texture analysis, 3D depth analysis, image quality analysis, and frequency domain analysis. The document also describes several popular datasets used to evaluate face spoof detection techniques, such as the NUAA Photo Imposter Database, Replay-Attack Database, and CASIA Face Anti-spoofing Database. The goal of the case study is to provide an overview of spoofing attacks and evaluate existing countermeasures for visual light face recognition systems.