That is not exactly it, but it is a bit similar.
Simply put, IP spoofing consists of forging specific network packets to impersonate a legitimate person or a system using this IP. While some use cases of this attack are aiming gaining access to a network segment (bypass authentication), others will target DDoS or botnets to disguise the source of the traffic related to an attack.
In other words, the objective of a threat actor is to tamper the header of the packet, which would be done by modifying the IP source address. On the receiving end, the packet looks from a trusted source so, most of the time, it will accept the communication if there is no robust verification or monitoring set up.
While it is quite difficult to detect, many strategies can be implemented to minimize the risk of this attack, such as deploying packet filtering which will inspect the headers and drop conflicting data. Another obvious measure would be to make sure the communications between the systems are encrypted with robust protocols, so that the probability of data tampering in transit is decreased.