• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Reversible Data Hiding for Medical Images in Cloud Computing Environments Based on Chaotic Hénon Map

    2013-06-09 15:46:04LiChinHuangMinShiangHwangandLinYuTseng

    Li-Chin Huang, Min-Shiang Hwang, and Lin-Yu Tseng

    Reversible Data Hiding for Medical Images in Cloud Computing Environments Based on Chaotic Hénon Map

    Li-Chin Huang, Min-Shiang Hwang, and Lin-Yu Tseng

    —Reversible data hiding techniques are capable of reconstructing the original cover image from stego-images. Recently, many researchers have focused on reversible data hiding to protect intellectual property rights. In this paper, we combine reversible data hiding with the chaotic Hénon map as an encryption technique to achieve an acceptable level of confidentiality in cloud computing environments. And, Haar digital wavelet transformation (HDWT) is also applied to convert an image from a spatial domain into a frequency domain. And then the decimal of coefficients and integer of high frequency band are modified for hiding secret bits. Finally, the modified coefficients are inversely transformed to stego-images.

    Index Terms—Cloud computing environments, encryption, Haar digital wavelet transformation, Hénon map, reversible data embedding.

    1. Introduction

    With the development of Internet, cloud computing is going to be applied in large data centers. Considering security issues, it is important to manage the data and services in cloud computing environments safely. Techniques of reversible data hiding[1]–[3]are more efficient and cheaper than intrusion detection system (IDS)[4]solutions in image security. To improve security in clinical information such as medical history, radiology images, and personal states, many reversible schemes are getting more and more important via Internet and cloud computing environments. After the process of embedding secrets, data hiding schemes[5]?[7]which can restore the original image and extract secrets from stego-images without distortion are known as reversible schemes[8],[9]. The applications of reversible techniques have already been adopted by variety of high precision systems such as the health care system, artwork, and science.

    In the transform domain schemes[1],[10], the cover image will be transformed to a set of coefficients modified for embedding secrets and then the modified coefficients perform the inverse transformation to construct stego-images. An integer discrete cosine transform reversible data hiding scheme was presented by Yanget al.[11]. Based on the compressed domain[12], reversible data hiding schemes have already developed by joint photographic experts group (JPEG)[13], vector quantization[14], and block truncation coding[15]. In spatial domains, there are three schemes: difference expansion (DE), histogram shifting, and cryptography base schemes[16]. DE techniques[17]are based on checking the redundancy between the two neighboring pixels to obtain a high capacity and low distortion data hiding. In 2009, Louet al.[18]developed a reduction DE method to adjust the expansion difference and embed data into multiple layers in medical images to increase capacity. The histogram shifting techniques[19]are adopted to search the peak and zero points in the cover image histogram. Then, the bins between the peak and zero points will be shifted with one level to empty the peak point for hiding secrets. Cryptography-based reversible data hiding techniques[20]consider steganography as a cryptography. Therefore, a variety of secret communications messages can be embedded in stegoimages.

    Reversible data hiding techniques play a critical role in medical images. To provide some preliminary diagnosis for health care[21],[22]without the restoration of the original medical images, some data hiding schemes[19]embedded secrets into the region of non-interest (RONI) and less secret bits are embedded into the region of interest (ROI). In mobile healthcare applications, Rochanet al.[23]adopted an arithmetic coding and cryptography to embed data in medical images.

    Haar digital wavelet transformation (HDWT) is an important technique to transform an image from a spatial domain to a frequency domain composed of different frequency bands. Since human eyes are less sensitive to change the image of the high-frequency coefficients, Changet al.[1]adopted this property to conceal secret data.

    With the advent of cloud computing environments, confidentiality of data becomes more and more important. In 2011, Abbasyet al.[24]presented a data hiding based on deoxyribonucleic acid (DNA) sequences to encrypt in cloud computing environments. Conventional cryptography utilizes a long bit strings encryption key. However, it is hard to be applied in high resolution images and huge amount of data. Patidaret al.[25]adopted an efficient substitution-diffusion image cipher using chaotic standard and logistic maps. In this paper, we apply the Hénon map[26]and chaotic-based cryptosystems to data hiding.

    This paper is organized as follows. Section 2 demonstrates our method. Section 3 presents the experimental results. And conclusions are drawn in Section 4.

    2. Proposed Method

    HDWT-based reversible image hiding is applied to embednbits secret messages for each block in this paper. In the application of compression and data hiding, two-dimensional discrete wavelet transform (DWT) is often adopted to transform the spatial domain to the frequency domain. We apply also HDWT to transform an image in the frequency domain for data hiding described as follows.

    2.1 Embedding Secret Phase

    Let a one-level HDWT decomposition transform a spatial domain cover image into a frequency domain cover image. Further, each coefficient of the image is divided two parts: integer and decimal. In Fig. 1 and Fig. 2, there are 4 types of decimal fractions: 0, 0.25, 0.5, and 0.75. In this paper, we adopt decimal 0 and 0.5 to embed secret.

    At preliminary process, we select four decimal fractions (D1,D2,D3,D4) whereD1,D2,D3,D4∈{0, 0.5}. And four decimal fractions satisfy the relationRdescribed as follow.

    Let (D1,D2,D3,D4) be a set of candidate decimal fractions. Candidate decimal fractions will be generated as {(0, 0, 0, 0), (0, 0, 0.5, 0.5), (0, 0.5, 0, 0.5), (0, 0.5, 0.5, 0)}. Thus, decimal secret code provides 2 bits embedding shown in Table 1.

    Step 1: Image partition with non-overlapping image blocks.

    AssumeHbe a 16-bit depth gray scale medical HD WT images with sizem×nwheremis the image width andnis the image height. We partition imageHinto a set of 4×4 blocks. Thus, many blocks will be generated in imageH.

    Step 2: Embed secret bits to the decimal part.

    1) Apply one-level HDWT operation.

    We apply one-level HDWT to the original image demonstrated in Fig. 3. The cover imageHis transformed to values with decimal shown in Fig. 1 (c).

    Fig. 1. Results of two dimensional image transform, (a) original image (b) values of the ROI in the medical image, and (c) coefficients of the ROI after one-level HDWT operation.

    Fig. 2. Division of HDWT images into three matrices:HI,HS, andHD.

    Fig. 3. Flowcharts of the data embedding.

    2) Retrieve decimal codes according to secret bits.

    For each secret bits, we retrieve decimal codes (D1,D2,D3,D4) from decimal codes table shown in Table 1. For instance, we will get the decimal codes (0, 0, 0.5, 0.5) if the embed bit is 01.

    3) Alter decimal value in the HDWT images to embed data.

    In our method, we partition the HDWT coefficients into three parts: integer, sign, and decimal. Then, integer matrixHI, sign matrixHS, and decimal matrixHDwill be generated, as shown in Fig. 4. We merge decimal codes with integer matrixHIand sign matrixSIdescribed as follows.

    ? Select four sets of integers from integer matrixHIby

    wheni=1 andj=2, the sets of integers areHI(1, 2),HI(1, 4),HI(3, 2), andHI(3, 4). According to (2), four sets of integer (582, 0, 1, 0), (585, 0, 0, 0), (582, 0, 1, 1) and (585, 0, 0, 1) will be produced from integer matrixHIfor embedding shown in Fig. 4.

    ? Modify decimal values in HDWT images.

    When we embed 2 secret digits 10, the set of the decimal codes (0, 0.5, 0, 0.5) will be retrieved from the decimal code table shown in Table 1. The values of unsigned HDWT images are a set of integers and decimal codes. Then, new HDWT images are unsigned HDWT images withHSmatrix shown in (3).

    wherei,j∈{1, 2}. Therefore, each pixel of new HDWT images combines decimal codes of secret bits andHI. Suppose the casei=1,j=2 will retrieveHI=(585, 0, 0, 0), we combineHIand the set of the decimal codes (0, 0.5, 0, 0.5) shown in Fig. 4 and Table 1. New HDWT images are obtained as follows.

    Suppose the case (i,j)={(1, 1), (1, 2), (2,1), (2, 2)} in (3) embed secret bits ‘01’→{(0, 0, 0.5, 0.5)}, ‘11’→{(0, 0.5, 0.5, 0)} , ‘01’→{(0, 0, 0.5, 0.5)} and ‘00’→{(0, 0, 0, 0)} from Table 1, respectively. The new HDWT images will be obtained as demonstrated in Table 2.

    ? RecordHDmatrix.

    TheHDmatrix will be recorded in order to restore original image at the extraction stage shown in Fig. 4. We also utilize the arithmetic coding method[1]to compress theHDmatrix and embed them to cover images.

    Step 3: Embed secret bits to integer part of high-frequency band.

    The coefficients of high-frequency band which are presented in Fig. 4 (c), HH area, will influence the subtle texture after applying one-level HDWT decomposition. Further, most coefficients are utilized in the data compression method. In our scheme, the secret bits are embedded to the integer part.

    Table 1: Decimal codes with 2 bits coding

    Fig. 4. Two dimensional HDWT: (a) original image, (b) horizontal operation of (a) in 4×4 block image, (c) vertical operation of (b), and (d) invert two dimensional HDWT.

    Table 2: New HDWT images combines decimal codes andHIwithHS

    Table 3: Invert transform of new HDWT images

    Step 4: Invert one-level HDWT.

    Two dimensional Haar discrete wavelet invert high-frequency band will be chosen to 0[1]. Transformation is applied to HDWT images after the embedding process in decimal and high-frequency band described in Step 2, Step 3, Fig. 4 (d), and Table 3.

    Step 5: Construct invert one-level HDWT images blocks.

    In order to get the stego-images, the invert one-level HDWT images blocks are constructed.

    Step 6: Process the underflow/overflow problem.

    In this scheme, there are two kinds of medical image formats: signed bit and unsigned bit. We adjust image histograms to prevent overflow/underflow problems. At first, we compute intensity rate by the range of intensity and bit-depth of image. The range of intensity is the difference of maximum and minimum intensity in the whole image. Bit-depth is the number of bits utilized to indicate the gray of a single pixel. In the next step, the underflow rate (or overflow rate) is calculated by the value of underflow (or overflow) and bit-depth. The value of underflow (or overflow) is the minimum (or maximum) value in the whole image. Finally, the utilization rate is the sum of the absolute values of intensity rate and underflow (or overflow) rate. The formulas are demonstrated as follows.

    The utilization rate = |intensity rate| +|underflow/overflow rate|.

    On low underflow/overflow rates of high bit-depth medical images, unsinged bit images will produce underflow problems. And it is hard to find the underflow/overflow problem in the signed bit images.

    Step 7: Generate chaotic image.

    This step is to disarrange the stego-images for cloud computing environments. We adopt chaotic Hénon map to construct a cryptographic application scheme. At first, pseudo-random sequence is generated by Hénon map[26], as shown in Fig. 5.

    2.2 Data Extraction Phase

    Fig. 5. Produce chaotic image byrotate and Hash by Hénon map: (a) partition stego-images, (b) rotate each blocks with Hénon map sequence, (c) disarrange each blocks by SHA-512, and (d) disarrange each block by Hénon map sequence.

    In order to extract secret bits, many parameters from embedding phase are needed such as decimal codes table, block size, and shift distance for underflow/overflow. The data extraction is able to extract secrets correctly and obtain the original image without any distortions. The details are described below. At the first step, chaotic images are downloaded from cloud computing environments and perform the invert chaotic Hénon map procedure to obtain stego-images. Then, the invert underflow/overflow process is performed by shifting back histogram. The whole image is partitioned into 4×4 non-overlaying block size like the data embedding process. The next step is one-level Haar discrete wavelet transformation for each block as shown in Fig. 4. Then, the digit of integer part in high-frequency band (HH) is extracted as secret bits. As the similar way in data embedding, secrets are extracted from the decimal and restore the decimal by the original decimal. At the final step, the block image performs the invert transform of the one-level HDWT to obtain the original image.

    3. Experimental Results

    Our scheme is performed at two kinds of high quality computer tomography (CT) and magnetic resonance imaging (MRI) medical images with digital imaging and communications in medicine (DICOM) from the National Cancer Imaging Archive[15]. This method is implemented by MATLAB and experimented on Notebook with 2.67 GHz processor and 4.0 GB RAM. In general, the quality of stego-images is measured by peak signal to noise ratio (PSNR) and mean square error (MSE). The definition of MSE is described as follows.

    where an image bit depth may be set to 16 (or 12). The parameters ofmandnare the width and height of the image. Bothare intensities of the pixels located in cover and stego-images, respectively. We experiment onCT and MRI medical images with 16-bit depth. The capacity and bpp (bit per pixel) will depend on PSNR. In Table 4 and Table 5, the embedded bits in integer and decimal part are 7 and 2, respectively. Because theHDmatrix and decimal code tale are stored in the embedding phase, the overload of capacity will reduce capacity as shown in Table 4, Table 5, and Step 2. For example, slice 1.3.6.1.4.1.9328.50.14.1141.dcm can embed 294725 bits to cover image with overload of capacity 169703. In Table 5, there are underflow problems with distance_O about intensity value 126 to 128. In order to process underflow/overflow problems, the histogram shifts to rightward with distance_O.

    4. Conclusions

    In this paper, we present a reversible image data hiding method by modifying the decimal and integer of coefficients of HDWT, and a Hénon map is adopted to transform stego-images into chaotic image to achieve an acceptable level of confidentiality in cloud computing environments.

    Table 4: Rsults for sign 16-bit grayscale medical image with secret decimal 4-bit

    Table 5: Results for sign 16-bit grayscale medicalimage

    Generally, HDWT is a popular method to convert an image from spatial domain to frequency domain which is composed of different frequency bands as LL, LH, HL, and HH. The HH bands will be embedded with secret bits.

    Changet al.[1]adopted HH bands to embed secret bits in zeros of Integer part. In our scheme, we embed secret bits to both decimal part and integer part in HH bands. The result of capacity and the quality of image are demonstrated on Table 4 and Table 5. Although the overhead of the recordingHDmatrix will reduce capacity, the best capacity is still reach 0.96 bpp (bit per pixel) as shown in Table 4. In cloud computing environments, the most of important problem is data confidentiality. The Hénon map is a simple and efficiency method to disarrange stago-images.

    Acknowledgment

    We would like to thank National Cancer Institute for providing the CT image data used in this study.

    [1] C.-C. Chang, P.-Y. Pai, C.-M. Yeh, and Y.-K. Chan, “A high payload frequency-based reversible image hiding method,”Information Sciences, vol. 180, pp. 2286–2298, Jun. 2010.

    [2] L.-C. Huang, L.-Y. Tseng, and M.-S. Hwang, “The study of data hiding in medical image,”Int. Journal of Network Security, vol. 14, no. 5, pp. 243–251, 2012.

    [3] S. S. Sujatha and M. M. Sathik, “A novel DWT based blind watermarking for image authentication,”Int. Journal of Network Security, vol. 14, no. 4, pp. 223–228, 2012.

    [4] L.-C. Huang and M.-S. Hwang, “The study of intrusion detection system,”Journal of Electronic Science and Technology, vol. 10, no. 3, pp. 269–275, 2012.

    [5] C.-M. Wang, N.-I. Wu, C.-S. Tsai, and M.-S. Hwang, “A high quality steganographic method with pixel-value differencing and modulus function,”The Journal of Systems and Software, vol. 81, no. 1, pp. 150–158, 2008.

    [6] C.-C. Wu, S.-J. Kao, and M.-S. Hwang, “A high quality image sharing with steganography and adaptive authentication scheme,”The Journal of Systems and Software, vol. 84, pp. 2196–2207, Dec. 2011.

    [7] C.-C. Wu, M.-S. Hwang, and S.-J. Kao, “A new approach to the secret image sharing with steganography and authentication,”The Imaging Science Journal, vol. 57, no. 3, pp. 140–151, 2009.

    [8] L.-C. Huang, L.-Y. Tseng, and M.-S. Hwang, “A reversible data hiding method by histogram shifting in high quality medical images,”The Journal of Systems and Software, vol. 86, pp. 716–727, Mar. 2013.

    [9] L.-C. Huang, M.-S. Hwang, and L.-Y. Tseng, “Reversible and high-capacity data hiding in high quality medical images,”KSII Trans. on Internet and Information Systems, vol. 7, no. 1, pp. 132–148, 2013.

    [10] G.-R. Xuan, Y.-Q. Shi, Q.-M. Yao, Z.-C. Ni, C.-Y. Yang, J.-J. Gao, and P.-Q. Chai, “Lossless data hiding using histogram shifting method based on integer wavelets,”Lecture Notes in Computer Science, vol. 4283, pp. 323–332, Aug. 2006.

    [11] B. Yang, M. Schmucker, X. Niu, C. Busch, and S. Sun,“Integer-DCT-based reversible image watermarking by adaptive coefficient modification,”Proc. of the SPIE, vol. 5681, pp. 218–229, Jan. 2005.

    [12] C.-C. Chang, C.-Y. Lin, and Y.-P. Hsieh, “Data hiding for vector quantization images using mixed-based notation and dissimilar patterns without loss of fidelity,”Information Sciences, vol. 201, pp. 70–79, Oct. 2012.

    [13] C.-C. Chang, C.-C. Lin, C.-S. Tseng, and W.-L. Tai,“Reversible hiding in DCT-based compressed images,”Information Sciences, vol. 177, no. 13, pp. 2768–2786, 2007.

    [14] Z.-M. Lu, J.-X. Wang, B.-B. Liu, “An improved lossless data hiding scheme based on image VQ-index residual value coding,”The Journal of Systems and Software, vol. 82, no. 6, pp. 1016–1024, 2009.

    [15] C.-C. Chang, C.-C. Lin, and Y.-H. Fan, “Lossless data hiding for color images based on block truncation coding,”Pattern Recognition, vol. 41, pp. 2347–2357, Jul. 2008.

    [16] L.-C. Huang and M.-S. Hwang, “Two-party authenticated multiple-key agreement based on elliptic curve discrete logarithm problem,”Int. Journal of Smart Home, vol. 7, no. 1, pp. 9–18, 2013.

    [17] J. Tian, “Reversible data embedding using a difference expansion,”IEEE Trans. on Circuits System Video Technology, vol. 13, no. 8, pp. 890–896, 2003.

    [18] D.-C. Lou, M.-C. Hu, and J.-L. Liu, “Multiple layer data hiding scheme for medical images,”Computer Standards and Interfaces, vol. 31, pp. 329–335, Feb. 2009.

    [19] M. Fallahpour, D. Megias, and M. Ghanbari, “Reversible and high-capacity data hiding in medical images,”IET Image Processing, vol. 5, no. 2, pp. 190–197, 2011.

    [20] S. M. C. Vigila and K. Muneeswaran, “Nonce based elliptic curve cryptosystem for text and image applications,”Int. Journal of Network Security, vol. 14, no. 4, pp. 236–242, 2012.

    [21] L.-Y. Tseng and L.-C. Huang, “An adaptive thresholding method for automatic lung segmentation in CT images,” inProc. of IEEE AFRICON 2009, Nairobi, 2009, pp. 1–5.

    [22] L.-Y. Tseng and L.-C. Huang, “Automatic fissure detection in CT images based on the genetic algorithm,” inProc. of the 2010 Int. Conf. on Machine Learning and Cybernetics, Taipei, 2010, pp. 2583–2588.

    [23] M. Rochan, S. Hariharan, and K. Rajamani, “Data hiding scheme for medical images using lossless code for mobile HIMS,” inProc. of the 3rd Int. Conf. on Communication Systems and Networks, Bangalore, 2011, pp. 1–4.

    [24] M. Reza Abbasy and B. Shanmugam, “Enabling data hiding for resource sharing in cloud computing environments based on DNA sequences,” inProc. of 2011 IEEE World Congress on Services, Washington, DC, 2011, pp. 385–390.

    [25] V. Patidar, N. K. Pareek, G. Purohit, and K. K. Sud,“Modified substitution-diffusion image cipher using chaotic standard and logistic maps,”Communications in Nonlinear Science and Numerical Simulation, vol. 15, no. 10, pp.2755–2765, 2010.

    [26] M. Suneel, “Cryptographic pseudo-random sequences form the chaotic Hénon map,”Indian Academy of Sciences, vol. 34, pp. 689–701, Oct. 2009.

    Min-Shiang Hwangreceived the B.S. degree in electronic engineering from National Taipei Institute of Technology, Taipei in 1980, the M.S. degree in industrial engineering from National Tsing Hua University in 1988, and the Ph.D. degree in computer and information science from National Chiao Tung University in 1995. He also studied applied mathematics with National Cheng Kung University from 1984 to 1986. He was the Chairman with the Department of Information Management, CYUT during 1999 to 2002. He is currently a professor with the Department of Management Information System, NCTU. He is a member of IEEE, ACM, and Chinese Information Security Association. Dr. Hwang had published more than 170 articles on the above research fields in international journals. His current research interests include electronic commerce, database and data security, cryptography, image compression, and mobile computing.

    Lin-Yu Tsengreceived the B.S. degree in mathematics from the National Taiwan University in 1975, the M.S. degree in computer science from the National Chiao Tung University in 1978, and the Ph.D. degree in computer science from National TsingHua University in 1988. He is presently a professor with the Department of Computer Science and Communication Engineering, Providence University. His research interests include evolutionary computation, neural network, multimedia systems, image processing, pattern recognition, and bioinformatics.

    uang

    the B.S. and M.S. degrees in information management both from Chaoyang University of Technology (CYUT), Taichung in 2001 and 2003, respectively. She is currently working towards the Ph.D. degree with the Department of Computer Science and Engineering, the National Chung Hsing University (NCTU). Her current research interests include information security, cryptography, medical image, and mobile communications.

    Manuscript received October 20, 2012; revised March 13, 2013.

    L.-C. Huang is with National Land Surveying and Mapping Center, Taichung (e-mail: lsb55239@gmail.com).

    M.-S. Hwang is with the Department of Computer Science & Information Engineering, Asia University, Taichung (Corresponding author e-mail: mshwang@asia.edu.tw).

    L.-Y. Tseng is with Department of Computer Science and Communication Engineering, Providence University, Taichung (e-mail: lytseng@pu.edu.tw).

    Digital Object Identifier: 10.3969/j.issn.1674-862X.2013.02.019

    一个人看视频在线观看www免费| 亚洲欧洲国产日韩| 1000部很黄的大片| 国产av在哪里看| 亚洲第一区二区三区不卡| 22中文网久久字幕| 九草在线视频观看| 亚洲在久久综合| 欧美三级亚洲精品| 亚洲国产精品sss在线观看| 美女大奶头视频| 国产精品,欧美在线| 亚洲无线在线观看| 国产成年人精品一区二区| 岛国在线免费视频观看| 麻豆国产97在线/欧美| 欧美性猛交╳xxx乱大交人| 久久综合国产亚洲精品| 亚洲综合色惰| 国产精品女同一区二区软件| 亚洲av熟女| 插阴视频在线观看视频| 国产淫片久久久久久久久| 一进一出抽搐动态| 欧美另类亚洲清纯唯美| kizo精华| 三级经典国产精品| 国产成人精品久久久久久| 悠悠久久av| 天天躁夜夜躁狠狠久久av| 亚洲自拍偷在线| 搡老妇女老女人老熟妇| 成人三级黄色视频| 国产精品国产三级国产av玫瑰| 国产高清有码在线观看视频| 国产真实乱freesex| 午夜精品国产一区二区电影 | 色综合色国产| av.在线天堂| 白带黄色成豆腐渣| 成人毛片60女人毛片免费| 美女脱内裤让男人舔精品视频 | 女人十人毛片免费观看3o分钟| 毛片一级片免费看久久久久| 亚洲aⅴ乱码一区二区在线播放| 丝袜美腿在线中文| 美女cb高潮喷水在线观看| 午夜爱爱视频在线播放| 国产一级毛片在线| 亚洲性久久影院| 神马国产精品三级电影在线观看| 综合色丁香网| 成人二区视频| 国语自产精品视频在线第100页| eeuss影院久久| 天美传媒精品一区二区| 亚洲成a人片在线一区二区| 人人妻人人看人人澡| 日韩人妻高清精品专区| 偷拍熟女少妇极品色| 免费在线观看成人毛片| 国产伦在线观看视频一区| 亚洲av中文av极速乱| 欧美一区二区国产精品久久精品| 国产成人aa在线观看| 99热精品在线国产| av天堂在线播放| 国国产精品蜜臀av免费| 日本黄色片子视频| 亚洲色图av天堂| 亚洲欧美成人综合另类久久久 | 人妻久久中文字幕网| 两性午夜刺激爽爽歪歪视频在线观看| 午夜a级毛片| 夜夜爽天天搞| 亚洲在线自拍视频| 国产精品综合久久久久久久免费| 偷拍熟女少妇极品色| 国产亚洲欧美98| 欧美激情国产日韩精品一区| 美女国产视频在线观看| 久久午夜亚洲精品久久| 成人美女网站在线观看视频| 日韩精品青青久久久久久| 91久久精品国产一区二区三区| 最近2019中文字幕mv第一页| 亚洲欧美成人精品一区二区| 男女下面进入的视频免费午夜| 99久久无色码亚洲精品果冻| 国内久久婷婷六月综合欲色啪| 变态另类成人亚洲欧美熟女| 长腿黑丝高跟| 国产视频内射| 网址你懂的国产日韩在线| 草草在线视频免费看| 69av精品久久久久久| 精品99又大又爽又粗少妇毛片| 看十八女毛片水多多多| 精品午夜福利在线看| 日韩亚洲欧美综合| 波多野结衣巨乳人妻| 日日啪夜夜撸| 两个人视频免费观看高清| 女的被弄到高潮叫床怎么办| 亚洲中文字幕日韩| 亚洲最大成人av| 国产69精品久久久久777片| 国产探花极品一区二区| 久久精品国产清高在天天线| 欧美xxxx性猛交bbbb| 国产成人午夜福利电影在线观看| 国产三级在线视频| 亚洲av第一区精品v没综合| 中文字幕制服av| 一个人看的www免费观看视频| 男女做爰动态图高潮gif福利片| videossex国产| 男女那种视频在线观看| 欧美又色又爽又黄视频| 国产成人a∨麻豆精品| 国产乱人偷精品视频| 亚洲人成网站在线播放欧美日韩| 色综合站精品国产| 中文字幕制服av| 欧美最新免费一区二区三区| 色哟哟·www| 人妻系列 视频| 亚洲性久久影院| 国产不卡一卡二| 97热精品久久久久久| 99热这里只有是精品50| 亚洲欧美日韩无卡精品| 日日干狠狠操夜夜爽| 色视频www国产| kizo精华| 国产精品久久久久久亚洲av鲁大| 国产精品人妻久久久影院| 久久韩国三级中文字幕| 狂野欧美白嫩少妇大欣赏| 天堂影院成人在线观看| 久久亚洲国产成人精品v| 九九在线视频观看精品| 亚洲精品成人久久久久久| 两个人视频免费观看高清| 日本在线视频免费播放| 欧美+亚洲+日韩+国产| 国产黄色小视频在线观看| 亚洲人成网站在线播| av.在线天堂| 亚洲国产欧美人成| 内地一区二区视频在线| 欧美日韩一区二区视频在线观看视频在线 | 日本与韩国留学比较| 91在线精品国自产拍蜜月| 久久久久久久久久久丰满| 麻豆精品久久久久久蜜桃| 精品久久久噜噜| 午夜福利在线观看免费完整高清在 | 中国美女看黄片| 99久久成人亚洲精品观看| 亚洲经典国产精华液单| 国内揄拍国产精品人妻在线| 日日干狠狠操夜夜爽| 老司机福利观看| 久久久久国产网址| 男女下面进入的视频免费午夜| 卡戴珊不雅视频在线播放| 精品日产1卡2卡| 欧美日本视频| 欧美一区二区精品小视频在线| 国产黄a三级三级三级人| 麻豆精品久久久久久蜜桃| 国产精品一区二区三区四区免费观看| 有码 亚洲区| 成人二区视频| 12—13女人毛片做爰片一| 偷拍熟女少妇极品色| 在线播放国产精品三级| 91久久精品电影网| 国产黄色小视频在线观看| 午夜久久久久精精品| 又粗又爽又猛毛片免费看| 国产高清有码在线观看视频| 99精品在免费线老司机午夜| avwww免费| 美女cb高潮喷水在线观看| 欧美高清成人免费视频www| 国产一区二区在线观看日韩| 精品人妻熟女av久视频| 伊人久久精品亚洲午夜| 99在线人妻在线中文字幕| 欧美色欧美亚洲另类二区| 亚洲经典国产精华液单| 欧美性猛交╳xxx乱大交人| 国产久久久一区二区三区| 日本黄大片高清| 在线观看美女被高潮喷水网站| 在线播放国产精品三级| 人人妻人人澡欧美一区二区| 毛片女人毛片| 九草在线视频观看| 狂野欧美激情性xxxx在线观看| 成人亚洲精品av一区二区| 全区人妻精品视频| 国产黄片视频在线免费观看| 成人一区二区视频在线观看| 美女大奶头视频| 给我免费播放毛片高清在线观看| 91狼人影院| 久久久成人免费电影| 熟女人妻精品中文字幕| 国产精品一区二区在线观看99 | 国产一级毛片七仙女欲春2| 黄色视频,在线免费观看| 欧洲精品卡2卡3卡4卡5卡区| 2021天堂中文幕一二区在线观| 久久午夜福利片| 国产欧美日韩精品一区二区| 色噜噜av男人的天堂激情| 国产亚洲精品久久久com| 国产午夜精品一二区理论片| 婷婷六月久久综合丁香| 国产日本99.免费观看| 99视频精品全部免费 在线| 淫秽高清视频在线观看| 十八禁国产超污无遮挡网站| 国内揄拍国产精品人妻在线| 国产69精品久久久久777片| 成人特级黄色片久久久久久久| 黄色视频,在线免费观看| 一本精品99久久精品77| 91av网一区二区| 给我免费播放毛片高清在线观看| 白带黄色成豆腐渣| 欧美性猛交╳xxx乱大交人| 又爽又黄a免费视频| 日产精品乱码卡一卡2卡三| 最后的刺客免费高清国语| 看黄色毛片网站| 日韩精品有码人妻一区| 桃色一区二区三区在线观看| 成人毛片a级毛片在线播放| 亚洲av熟女| av黄色大香蕉| 悠悠久久av| 日日干狠狠操夜夜爽| 可以在线观看毛片的网站| 国产高清激情床上av| 国产麻豆成人av免费视频| 网址你懂的国产日韩在线| 国产精品爽爽va在线观看网站| 99久久成人亚洲精品观看| 欧美日本亚洲视频在线播放| av女优亚洲男人天堂| 伦理电影大哥的女人| 久久久久久大精品| 联通29元200g的流量卡| 精品国产三级普通话版| 91精品国产九色| 午夜福利高清视频| 亚洲欧美清纯卡通| 少妇高潮的动态图| 一个人免费在线观看电影| 免费人成在线观看视频色| 婷婷六月久久综合丁香| 亚洲av不卡在线观看| 91午夜精品亚洲一区二区三区| 久久久久九九精品影院| 欧美最新免费一区二区三区| 日日摸夜夜添夜夜爱| a级一级毛片免费在线观看| 日韩欧美一区二区三区在线观看| 校园春色视频在线观看| 成人三级黄色视频| 成年免费大片在线观看| 亚洲中文字幕一区二区三区有码在线看| а√天堂www在线а√下载| 国产av麻豆久久久久久久| 亚洲综合色惰| 国产v大片淫在线免费观看| 精品不卡国产一区二区三区| 国产私拍福利视频在线观看| 国产精品久久久久久久电影| 亚洲av免费在线观看| 99在线视频只有这里精品首页| 青春草视频在线免费观看| 国产女主播在线喷水免费视频网站 | 一边摸一边抽搐一进一小说| 国产大屁股一区二区在线视频| .国产精品久久| 国产精品三级大全| 欧美丝袜亚洲另类| 少妇熟女aⅴ在线视频| 国产精品av视频在线免费观看| 日本一二三区视频观看| av专区在线播放| 久久人人精品亚洲av| 99久久无色码亚洲精品果冻| 日本一本二区三区精品| 国产爱豆传媒在线观看| 听说在线观看完整版免费高清| 欧美成人免费av一区二区三区| 在线a可以看的网站| 精品午夜福利在线看| 久久99热6这里只有精品| 天天一区二区日本电影三级| 美女国产视频在线观看| 国产片特级美女逼逼视频| 国产精品99久久久久久久久| 亚洲综合色惰| 非洲黑人性xxxx精品又粗又长| 亚洲性久久影院| 国产蜜桃级精品一区二区三区| 国产精品久久久久久精品电影小说 | 在线观看美女被高潮喷水网站| 国内精品宾馆在线| 国产人妻一区二区三区在| 欧美激情久久久久久爽电影| 亚洲成人中文字幕在线播放| 精品久久国产蜜桃| 一级av片app| 人体艺术视频欧美日本| or卡值多少钱| 99热这里只有精品一区| 午夜福利在线观看免费完整高清在 | 一本一本综合久久| 91狼人影院| 日韩欧美三级三区| 欧美丝袜亚洲另类| av天堂中文字幕网| 久久精品综合一区二区三区| 女的被弄到高潮叫床怎么办| 国产免费一级a男人的天堂| 我要搜黄色片| 国产在线精品亚洲第一网站| 国产av在哪里看| 一级毛片我不卡| 91精品一卡2卡3卡4卡| 菩萨蛮人人尽说江南好唐韦庄 | 两个人视频免费观看高清| 精品久久久久久久久久免费视频| 日本与韩国留学比较| 午夜老司机福利剧场| 看黄色毛片网站| 色综合亚洲欧美另类图片| 最近2019中文字幕mv第一页| 九草在线视频观看| 成年女人永久免费观看视频| 人妻久久中文字幕网| av在线蜜桃| 亚洲欧美日韩卡通动漫| 级片在线观看| av在线观看视频网站免费| 在线观看午夜福利视频| 日韩欧美在线乱码| 亚洲综合色惰| 秋霞在线观看毛片| 国产黄片美女视频| 国产一区二区亚洲精品在线观看| 国产v大片淫在线免费观看| 亚洲欧美精品自产自拍| 免费观看人在逋| 久久人妻av系列| 日本五十路高清| 欧美在线一区亚洲| 国产在线男女| 日本五十路高清| 日韩高清综合在线| 成人美女网站在线观看视频| 12—13女人毛片做爰片一| 国产精品一区二区三区四区久久| 能在线免费观看的黄片| 免费看光身美女| avwww免费| 国产精品美女特级片免费视频播放器| 一级毛片aaaaaa免费看小| 欧美又色又爽又黄视频| 91在线精品国自产拍蜜月| 99久久人妻综合| 亚洲一区二区三区色噜噜| 3wmmmm亚洲av在线观看| 性色avwww在线观看| 国产大屁股一区二区在线视频| 久久精品91蜜桃| 日本免费a在线| 中文字幕制服av| 国产免费一级a男人的天堂| 又粗又硬又长又爽又黄的视频 | 最近2019中文字幕mv第一页| 欧美极品一区二区三区四区| 欧美激情久久久久久爽电影| 亚洲内射少妇av| 亚洲成人久久爱视频| www.av在线官网国产| 久久久成人免费电影| 国产精品女同一区二区软件| 久久精品国产亚洲网站| 久久久久久久久久成人| 国产高清视频在线观看网站| 日韩成人av中文字幕在线观看| 人妻久久中文字幕网| 在线观看av片永久免费下载| 色综合站精品国产| 蜜桃久久精品国产亚洲av| 在线观看66精品国产| a级毛片a级免费在线| 麻豆av噜噜一区二区三区| 久久久久国产网址| 亚洲内射少妇av| 嘟嘟电影网在线观看| ponron亚洲| 日日干狠狠操夜夜爽| 亚洲国产精品久久男人天堂| 亚洲精品亚洲一区二区| 搡老妇女老女人老熟妇| 啦啦啦韩国在线观看视频| 91av网一区二区| 午夜爱爱视频在线播放| a级一级毛片免费在线观看| 蜜臀久久99精品久久宅男| 97热精品久久久久久| 人人妻人人看人人澡| 国产精品国产三级国产av玫瑰| 国产成人aa在线观看| 九草在线视频观看| 天堂√8在线中文| 桃色一区二区三区在线观看| 欧美日韩综合久久久久久| 狂野欧美激情性xxxx在线观看| 最近最新中文字幕大全电影3| 国产熟女欧美一区二区| 嫩草影院新地址| 亚洲精品乱码久久久v下载方式| 麻豆一二三区av精品| 亚洲成人精品中文字幕电影| a级毛片a级免费在线| 久久久a久久爽久久v久久| 人妻夜夜爽99麻豆av| 美女xxoo啪啪120秒动态图| 欧美丝袜亚洲另类| 国产精品国产高清国产av| 国产成人福利小说| 久久久久性生活片| 日本成人三级电影网站| 男女做爰动态图高潮gif福利片| 六月丁香七月| 成熟少妇高潮喷水视频| 精品人妻偷拍中文字幕| 国内精品宾馆在线| 国产精品99久久久久久久久| 久久久久久伊人网av| 国产亚洲欧美98| 在线观看免费视频日本深夜| 91久久精品国产一区二区三区| 国产探花在线观看一区二区| 欧美又色又爽又黄视频| 最近手机中文字幕大全| 美女被艹到高潮喷水动态| 色噜噜av男人的天堂激情| 欧美成人a在线观看| 国产成人a区在线观看| 国产三级在线视频| 乱人视频在线观看| 国产乱人偷精品视频| 身体一侧抽搐| 久久久久国产网址| 天天躁夜夜躁狠狠久久av| 亚洲av一区综合| 欧美最黄视频在线播放免费| 精品人妻偷拍中文字幕| 最后的刺客免费高清国语| 欧美变态另类bdsm刘玥| 日日啪夜夜撸| 好男人在线观看高清免费视频| 精品少妇黑人巨大在线播放 | 欧美三级亚洲精品| 91久久精品国产一区二区成人| 日韩大尺度精品在线看网址| 国产私拍福利视频在线观看| 日韩一区二区三区影片| 身体一侧抽搐| 国产黄片视频在线免费观看| 天堂影院成人在线观看| 亚洲乱码一区二区免费版| 日韩欧美精品免费久久| 黄色日韩在线| 成人特级av手机在线观看| 亚洲人成网站高清观看| 免费观看a级毛片全部| 99热全是精品| 你懂的网址亚洲精品在线观看 | 亚洲av男天堂| 青春草国产在线视频 | 亚洲av中文av极速乱| 国产淫片久久久久久久久| 波多野结衣巨乳人妻| 国产成人福利小说| 亚洲人成网站高清观看| 国产极品天堂在线| 简卡轻食公司| 国产精品一区二区性色av| 一本久久中文字幕| 色5月婷婷丁香| 久久久久久大精品| 美女被艹到高潮喷水动态| 亚洲国产精品sss在线观看| 99热这里只有是精品在线观看| 国产精品99久久久久久久久| 国产一区亚洲一区在线观看| 国产亚洲精品久久久com| 三级男女做爰猛烈吃奶摸视频| 亚洲精品国产成人久久av| 亚洲丝袜综合中文字幕| av免费在线看不卡| 中文在线观看免费www的网站| av国产免费在线观看| 麻豆av噜噜一区二区三区| 国产精品一区二区性色av| 给我免费播放毛片高清在线观看| 国内精品一区二区在线观看| 91久久精品国产一区二区三区| 最近2019中文字幕mv第一页| 国产精品.久久久| 嫩草影院新地址| 中文字幕av在线有码专区| 久久久久久久午夜电影| 蜜桃亚洲精品一区二区三区| 国产老妇女一区| 久久韩国三级中文字幕| 人人妻人人看人人澡| 淫秽高清视频在线观看| 欧美潮喷喷水| 国产一区二区在线av高清观看| 男女那种视频在线观看| 日韩三级伦理在线观看| 午夜精品国产一区二区电影 | 国产精品久久久久久久久免| 国内精品美女久久久久久| 国产精品嫩草影院av在线观看| 免费av不卡在线播放| 欧美一区二区亚洲| 国产成人一区二区在线| 亚洲精品粉嫩美女一区| av专区在线播放| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 高清午夜精品一区二区三区 | 日韩精品有码人妻一区| 亚洲五月天丁香| 亚洲中文字幕日韩| 好男人视频免费观看在线| 岛国毛片在线播放| 男女边吃奶边做爰视频| 联通29元200g的流量卡| 久久这里只有精品中国| 麻豆精品久久久久久蜜桃| 久久人人精品亚洲av| 精品一区二区三区视频在线| 在线观看av片永久免费下载| 一本一本综合久久| 在线观看av片永久免费下载| 亚洲最大成人手机在线| 国产免费一级a男人的天堂| 最后的刺客免费高清国语| 欧美不卡视频在线免费观看| 偷拍熟女少妇极品色| 国产伦一二天堂av在线观看| 九九热线精品视视频播放| 中文字幕av在线有码专区| av免费在线看不卡| 日韩视频在线欧美| 日韩制服骚丝袜av| 国产综合懂色| 亚洲av.av天堂| 国产视频内射| 色哟哟哟哟哟哟| 精品久久久久久久人妻蜜臀av| 欧美日韩精品成人综合77777| 可以在线观看的亚洲视频| 日韩精品青青久久久久久| 麻豆国产av国片精品| 波多野结衣巨乳人妻| 久久久久久久久大av| 边亲边吃奶的免费视频| 久久久久网色| av在线观看视频网站免费| 精品日产1卡2卡| 国产精品一及| 免费人成在线观看视频色| 我要看日韩黄色一级片| 久久久久国产网址| 能在线免费看毛片的网站| 日韩欧美 国产精品| 一进一出抽搐动态| 精品人妻视频免费看| 亚洲国产精品久久男人天堂| 欧美一区二区国产精品久久精品| 美女被艹到高潮喷水动态| 一边亲一边摸免费视频| 国产大屁股一区二区在线视频| 亚洲av成人av| 久久久久免费精品人妻一区二区| 一区二区三区四区激情视频 | 免费不卡的大黄色大毛片视频在线观看 | 国产高潮美女av| 日韩亚洲欧美综合| 国产乱人视频| 女人被狂操c到高潮| 亚洲欧美成人综合另类久久久 | 国产综合懂色| 久久久精品94久久精品| 欧美激情国产日韩精品一区| 久久午夜福利片| 天堂中文最新版在线下载 | 免费在线观看成人毛片| 看非洲黑人一级黄片|