215019.fig.002
Figure 2: Example that shows a voice-biometric system is compromised, and a voiceprint is counterfeited.