Fig. 15From: Voice spoofing countermeasure for voice replay attacks using deep learningComparison with other approachesBack to article page