Fig. 2From: Vulnerability issues in Automatic Speaker Verification (ASV) systemsClassifying various attacks on an ASV system. After [16]Back to article page