Abstract
Voice-based authentication systems have been increasingly used due to their simplicity in relation to the necessary equipment and their versatility, as any smartphone can be used to remotely authenticate an individual. However, this type of system is vulnerable to spoofing attacks, since an impostor can use a recorded voice to be properly authenticated as an authentic user, which is known…