This document summarizes research on the effect of face tampering on face recognition. It discusses four categories of face recognition algorithms (PCA, iSVM, LBP, SIFT) and their accuracy rates under different tampering protocols using a novel tampered face image database. The conclusion is that it is unpredictable which algorithm will perform best for tampered face recognition. Motion analysis, texture analysis, and liveness detection techniques in prior research aimed to detect spoofing but may not distinguish tampered from real faces.