Database dependence comparison in detection of physical access voice spoofing attacks | Publicación