Fig. 6From: Vulnerability issues in Automatic Speaker Verification (ASV) systemsGame between an attacker and VP system. After [66]Back to article page