Vulnerability of speaker verification to voice mimicking | IEEE Conference Publication | IEEE Xplore