Voice Spoofing Explained and Defense Strategies for Models