Spoof Attack in Facial Recognition: Understanding Risks