Preventing replay attacks on speaker verification systems | IEEE Conference Publication | IEEE Xplore