• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Data Hiding in DNA for Authentication of Plant Variety Rights

    2013-07-29 09:43:08WeiLiangTaiCharlesWangPhillipSheuandJeffreyTsai

    Wei-Liang Tai,Charles C.N.Wang,Phillip C.Y.Sheu,and Jeffrey J.P.Tsai

    1.Introduction

    Living organisms have been excluded from patent laws for over two hundred years.Living organism forms were always considered as a product of nature and not a human invention in the past.Before 1930,plant breeders who created new types of plants had no claim to the marketing rights or sales of their plants,even though they have taken a lot of time and effort to breed a new plant.The non-patentable status of plants changed with the Plant Patent Act of 1930.According to the U.S.Department of Agriculture(USDA),the Plant Patent Act was enacted in 1930 and provided,for the first time,patent protection for new and distinct varieties of asexually reproduced plants[1].Now plant breeders have a financial incentive to perform plant breeding experiments and exercise control over their discoveries.

    Although more than 68 countries protect new plant varieties by the plant breeder’s right,a few countries such as USA,European Union,Japan,and Australia do not exclude plant varieties from the patent right.The use of plant patents is becoming more and more common.In theory,molecular markers provide a method for helping to enforce plant patent rights.However,they are currently available for only a few breeders’ crop species since molecular marker libraries are expensive to develop.Furthermore,molecular markers represent a sample of the deoxyribose nucleic acid(DNA)from an organism rather than its entire genetic composition.Thus,molecular markers can easily demonstrate that two plants are different but hard to prove two plants are the same.For example,it may be difficult to find markers that differentiate a sport from the original cultivar,for the sport only differs from the original cultivar in a few genes.

    Data hiding provide another efficient way for authentication and annotation of plant patents.Digital watermarking techniques have been proposed for extensive applications,such as ownership protection,copy control,annotation,and authentication.Most past work is designed for digital images where the pixels take on a wide range of colors or brightness levels.Nowadays,there are many plants are increasingly commonly seen in our life,such as rose,phalaenopsis,and vegetables.Having the capability of hiding data in DNA can facilitate the authentication,annotation,and tracking of these plants.However,hiding data in DNA is much more difficult than in digital images.For DNA sequences,the genetic codes take values from only four bases:adenine(A),guanine(G),cytosine(C),and thymine(T),and they are drastically different in functionalities.As a result,hiding data in DNA without changing the functionalities becomes more difficult.

    Recently,hiding data in DNA becomes an interesting research topic because of biological property.In 2000,Leier et al.[2]proposed a special key sequence,called a primer,to decode an encrypted DNA sequence.They need to send a selected primer and an encrypted sequence to the receiver.Without the primers and the designated sequences,it is not possible to correctly decode the secret.Peterson[3]proposed a method to hide data in DNA sequences by substituting three consecutive bases as a character.However,there are at most 64 characters can be encoded in DNA.Further,high frequency of characters E and I can lead to the reveal of secret.

    Chang et al.[4]proposed two schemes to hide data in DNA sequences with the reversibility.The first scheme compressed the decimal formatted DNA sequence using a lossless compression method and then appended the secret message to the end of the compression stream.Finally,the bit stream was converted back to nucleotides.The second scheme used the difference-expansion(DE)based reversible data hiding technique to conceal a secret bit in two neighboring words.In 2010,Shiu et al.[5]proposed three data hiding methods based upon properties of DNA sequences.These three methods are:the insertion method,the complementary pair method,and the substitution method.

    Unfortunately,the robustness is low for some existing methods,which may result in inauthenticity and un-integrity of plant variety rights.Besides,these methods change not only the functionalities but also the original DNA sequence.Therefore,we propose a high capacity data hiding scheme for DNA without changing the functionalities of DNA sequences.This scheme adaptively varies the embedding process according to the amount of hidden data.

    To make this paper self-contained,in Section 2,we describe the concepts from DNA that will be needed for the rest of the paper.Section 3 contains a detailed exposition of the proposed algorithm.In Section 4,we experimentally investigate the relationship between the capacity & hiding performance and the influence of variant DNA on the capacity.We also compare performance with existing schemes and analyze the robustness and security issues in this section.Finally,we conclude the paper in Section 5.

    2.DNA

    Recent advances and development in biological techniques research become more and more popular.In this section,we describe the DAN to functional protein called the central dogma as shown in Fig.1.The dogma is a framework for understanding the transfer of DNA sequence information.DNA is a molecule polymer of nucleotides that are collectively called the deoxyribose nucleic acid,which controls all biological life.The ribonucleic acid(RNA)is similar to DNA in structure,but in the fact that RNA contains the sugar ribose as opposed to “deoxyribose”.DNA has hydrogen at the second carbon atom on the ring,and RNA has hydrogen linked through an oxygen atom.

    Fig.1.Central dogma of molecular biology.

    In DNA and RNA,there are four nucleotide bases.Three of these bases are the same:A,G,and C.The fourth base for DNA is T,whereas in RNA,the fourth base lacks a methyl group and is called uracil(U).Each base has two points at which it can join covalently to two other bases on either end,forming a linear chain of monomers.

    In general,RNA copies of DNA are made by a process known as “transcription”.Transcription is the conversion of information from DNA to RNA and is straightforward because of the direct correspondence between the four nucleotide bases of DNA and those of RNA.For most purposes,RNA can be regarded as the working copy of the DNA master template.There is usually one or a very small number of examples of DNA in the cell,whereas there are multiple copies of the transcribed RNA.The transcript RNA(tRNA)is referred to message RNA(mRNA)by discarding the intervening sequence of RNA.

    In the protein-coding region of mRNA,three successive nucleotide bases,called triplets or codons,are used to code for each individual amino acid.Three bases are needed because there are 20 different types of amino acids shown in Table 1 but only four nucleotide bases:with one base there are four possible combinations; with two,16(42);with three,64(43),which is more than the number of amino acids.

    The RNA transcription is used by a complex molecular machine called the ribosome to translate the order of successive codons into the corresponding order of amino acids.Special “stop” codons,such as UAA,UAG,and UGA,induce the ribosome to terminate the elongation of the polypeptide chain at a particular point.Similarly,the codon for the amino acid methionine is often used as the start signal for translation.

    For plant variety rights,in the US the Plant Patent Act of 1930 initially allowed seed developers to take out patents on seeds they had developed by artificial selection.Now,the Act extends to the patenting of genetically modified(GM)crops by large multinational companies.It has succeeded in implementing similar patent laws in other countries.

    Genetically modified crops have been around for over 20 years and have met with variable successes across the globe.Essentially,genetic modification involves inserting a section of DNA carrying a desirable gene of one species into the DNA of another.In crop plants,some of the beneficial features are achieved by using this method,including insect resistance,herbicide resistance(bar[6],aroA[7],bxn[8],sul,and tfdA[9]),nutritional value(OsNAS1,OsNAS2,and OsNAS3[10]),pest resistance,allergy resistance,higher yields,longer shelf life,and improved flavour.Therefore,in order to avoid altering DNA functionally,we propose a watermarking scheme based on mRNA sequences for copyright protection.

    3.Proposed Scheme

    An ideal watermarking system protects the data without altering it functionally.However,how can change DNA and still make the protein product come out the same? The only way is redundancy.Thus,we use the codon redundancy to hide data in mRNA sequence.A mRNA sequence is 3 bases long.There are 4 possible bases,U,C,A,and G.Clearly,64 unique codes can be generated.However,only 20 amino acids are encoded.There is redundancy in the mRNA to amino acid mapping.The redundancy can be used to hide data into the sequence without altering its function or length.

    As shown in Table 1,there can be sets of 1,2,3,4 or 6 codons representing the same amino acid.Thus,we first take a binary secret sequence and convert it to a decimal number.Then we take the amino acid sequence that would be generated by the original mRNA,and generate a list of all possible codons that lead to the same sequence.The number of codon combinations for each amino acid is used to hide data.Having explained our background logic,we now outline the principle of the proposed data hiding algorithm.

    3.1 Embedding Process

    Input:a mRNA sequence with four possible bases,U,C,A,G,and a secret bit stream S={s1,s2,··,sn} where si∈{0,1} and 1≤i≤n.

    Output:a watermarked mRNA sequence W={W'1,W'2,··,W'n} with the secret message S hidden.

    Step 1.Translate the mRNA sequence into the amino acid sequence A={A1,A2,··,Am},which represents where Aiis a mRNA codon.

    Step 2.Transform the secret bit stream to an unsigned integer B:

    Step 3.Generate P={P1,P2,··,Pm} where Piis the number of codon combinations for each amino acid Aiin the sequence.

    Step 4.Calculate the number T of all possible assignments for the input mRNA sequence based on the codon combinations until T>B:

    where 1≤k≤m.

    Step 5.According to the value of B,find the corresponding assignment of codons W'ifor all amino acids Ai,1≤i≤k,and output their codons:

    Note that the number k should be used as a secret key for secure transmission.To show how this works,we take a sample message and embed it into a short sequence.Assume that the secret bit stream S={10011011} and the given mRNA sequence is “GCG CAG UUA GUA”.We first translate the mRNA sequence into the amino acid sequence A={Ala,Gln,Leu,Val}.The secret bit stream is transformed to an unsigned integer B=155.Then,we generate the number of codon combinations for each amino acid Aiin the sequence,P={4,2,6,4}.As shown in Step 4,we can obtain the number T=192 and k=4.Finally,as illustrated in Fig.2,we find the corresponding assignment of codons for all amino acids Ai,1≤i≤k,and output their codons.

    Table 1:Genetic code

    Fig.2.Embedding example.

    This process has generated the new mRNA sequence“GCU CAA CUC GUU”.Therefore,following the highlighted path we get “GCU CAA CUC GUU”,which codes for the same amino acid sequence as the original mRNA,and also contains the hidden watermark.Note that there is adequate space to encrypt and embed a strong and repetitive watermark into living sequences since they consist of many thousands of base pairs.As a result,we use this technique in a retrovirus vector,that is,the message will transfer through the reverse transcription pathway and will be embedded in the DNA of the target cell in a complementary form.

    3.2 Extraction Process

    Input:a watermarked mRNA sequence and number k.

    Output:secret message S.

    Step 1.Calculate the series number B from the selected k codons.

    Step 2.Transform the unsigned integer B to the secret bit stream si=(B/2n-i)mod 2,and output the bit stream.

    The DNA sequence is deemed authentic only if the embedded authentication code matches the extracted information.

    4.Experimental Results

    To obtain a better understanding of how different host DNA sequences affect the performance of the proposed watermarking scheme,we present some results in a table form.All experiments were performed with eight significantly used genes:bar,aroA,BXN,sul,TfdA,OsNAS1,OsNAS2,and,OsNAS3,as shown in Table 2.These genes are commonly used for genetic modification in crop plants.Some of the beneficial features include insect resistance,herbicide resistance(bar[6],aroA[7],bxn[8],sul,and tfdA[9]),nutritional value(OsNAS1,OsNAS2,and OsNAS3[10]),pest resistance,allergy resistance,higher yields,longer shelf life,and improved flavour.The investment plants should be protected from any other acts that may be prescribed by the provisions of the Plant Varieties Act 1997.

    Table 2:Eight test DNA sequences

    Table 3:Hiding performance of the proposed scheme

    4.1 Capacity versus Distortion Performance

    Table 3 gives an example of how different DNA sequences influence the payload Cap and the hiding performance bpn(bit per nucleotide),which is defined as

    The real capacity that can be achieved depends on the nature of the DNA sequence itself.We notice that the average hiding performance is bpn=0.57.As a result,different DNA sequences do not influence the hiding performance.Our proposed scheme provides a stable hiding performance for authentication of plant variety rights.

    4.2 Comparison with Other Schemes

    Table 4 compares the hiding performance delivered by the proposed scheme and other existing schemes[4],[5].Note that the proposed scheme does not change the functionalities of DNA sequences,whereas schemes in [4]and [5]destroyed DNA sequences,which induces morphological changes in biological patterns.As Table 4 shows,the insertion method in [5]derived better performance.However,they did not preserve original characteristics of living organisms,which is unable to protect the copyright due to the functionalities change of genes.The evaluation results show that the proposed scheme achieves relatively high hiding performance than existing schemes.Further,our proposed scheme preserves the functionalities of genes,which ensure the copyright protection.

    Table 4:Performance comparison with schemes[4],[5]

    Fig.3.More robust variation in embedding process.

    4.3 Robustness and Security

    Security issues need to be handled by top layers in authentication applications.The major objective of an adversary is to forge authentication data so that an altered DNA can still pass authentication tests.Hence,it is important to study the following two problems for authentication applications:1)the probability of making DNA alterations while preserving the m-bit embedded authentication data,and 2)the possibility for an adversary to hide specific data in a DNA sequence.

    In the mRNA sequence,there are 64 unique codes that can be generated in which there can be sets of 1,2,3,4 or 6 codons representing the same amino acid.In the proposed scheme,if a single codon is changed,the probability of getting a correctly decoded bit is

    For the first issue,if the altered codons number is large,the probability of getting the decoded data to be exactly the same as the originally embedded one is approximately 2-3m,where m is the embedded payload size,which is very small as long as m is large.Therefore,the threat of making DNA alterations while preserving the m-bit embedded authentication data is very low.

    The second issue depends on whether adversaries can derive information regarding the correspondence of codons and the carried bit by studying the difference between those copies,hence creating a new DNA sequence embedded with data when they will.Hence,assuming adversaries collect sufficient copies and know what data is embedded in each copy,they will be able to identify the correspondence of codons and the carried bit,and to hide their desired data by manipulating the corresponding codons.To prevent the above mentioned attack,we have to introduce more uncertainty.A good solution for dealing with this is to arrange the nucleotide randomly by using a secret key.As shown in Fig.3,instead of starting from the first codon chosen alphabetically as presented earlier,we can randomly number the codon before the watermark.This would result in a completely different sequence,but the information conveyed would be the same.This step keeps the process unambiguous,and at the same time ensures that it is difficult for an adversary to identify the congruent relationships of codons and the carried bits.

    5.Conclusions

    Hiding data in DNA can be applied to protecting the intellectual property in the gene therapy,transgenic crops,tissue cloning,and DNA computing.Data can also be hidden to verify the integrity of DNA sequences,authentication,and annotation for copyrights.Nowadays,molecular markers provide a method for helping to enforce copyrights.However,molecular markers can easily demonstrate that two plants are different but hard to prove two plants are the same.Therefore,we propose a watermarking scheme for authentication of DNA rights.To avoid changing the functionalities of genes,we embed data in the mRNA sequence by exploring the codon redundancy.We also address the robust and security issues and offer several additional steps to strengthen the watermark.As a result,the proposed scheme can actually be used to embed data directly into active genetic segments for copyright protection.In the other direction,one can generate an appropriate DNA sequence,when transcribed,which can create the mRNA strand with the embedded message.The practical usefulness of such a technique can be enormous.

    [1]J.Chen,“The parable of the seeds:interpreting the plant variety protection act in furtherance of innovation policy,”Notre Dame Law Review,vol.81,no.4,pp.105-166,2006.

    [2]A.Leier,C.Richter,W.Banzhaf,and H.Rauhe,“Cryptography with DNA binary strands,” BioSystems,vol.57,no.1,pp.13-22,2000.

    [3]I.Peterson.Hiding in DNA.[Online].Available:http://www.maa.org/mathland/mathtrek_4_10_00.html

    [4]C.-C.Chang,T.-C.Lu,Y.-F.Chang,and R.C.T.Lee,“Reversible data hiding schemes for deoxyribonucleic acid(DNA)medium,” Int.Journal of Innovative Computing,Information and Control,vol.3,no.5,pp.1-16,Oct.2007.

    [5]H.-J.Shiu,K.-L.Ng,J.-F.Fang,R.C.T.Lee,and C.-H.Huang,“Data hiding methods based upon DNA sequences,”Information Sciences,vol.180,no.11,pp.2196-2208,Jun.2010.

    [6]K.S.Rathore,V.K.Chowdhury,and T.K.Hodges,“Use of bar as a selectable marker gene and for the production of herbicide-resistant rice plants from protoplasts,” Plant Molecular Biology,vol.21,no.5,pp.871-884,Mar.1993.

    [7]L.Comai,L.C.Sen,and D.M.Stalker,“An altered aroA gene product confers resistance to the herbicide glyphosate,”Science,vol.221,no.4608,pp.370-371,Jul.1983.

    [8]D.M.Stalker,K.E.McBride,and L.D.Malyj,“Herbicide resistance in transgenic plants expressing a bacterial detoxification gene,” Science,vol.242,no.4877,pp.419-423,Oct.1988.

    [9]J.F.Rice,F.M.Menn,A.G.Hay,J.Sanseverino,and G.S.Sayler,“Natural selection for 2,4,5-trichlorophenoxyacetic acid mineralizing bacteria in agent orange contaminated soil,” Biodegradation,vol.16,no.6,pp.501-512,Dec.2005.

    [10]H.Inoue,K.Higuchi,M.Takahashi,H.Nakanishi,S.Mori,and H.K.Nishizawa,“Three rice nicotianamine synthase genes,OsNAS1,OsNAS2,and OsNAS3 are expressed in cells involved in long-distance transport of iron and differentially regulated by iron,” Plant Journal,vol.36,no.3,pp.366-381,Nov.2003.

    啦啦啦 在线观看视频| 极品人妻少妇av视频| 久久久国产一区二区| 日日夜夜操网爽| 岛国在线观看网站| av线在线观看网站| 少妇被粗大的猛进出69影院| 电影成人av| 在线av久久热| 咕卡用的链子| 亚洲精品在线观看二区| 91麻豆精品激情在线观看国产 | 免费观看人在逋| 亚洲人成电影免费在线| 在线播放国产精品三级| 亚洲一区二区三区不卡视频| 久久久久久久国产电影| 久久精品国产清高在天天线| 久久久久国内视频| 老司机福利观看| 脱女人内裤的视频| 女同久久另类99精品国产91| 午夜福利乱码中文字幕| 亚洲中文av在线| 18在线观看网站| 人妻久久中文字幕网| 王馨瑶露胸无遮挡在线观看| 日本五十路高清| 成年人免费黄色播放视频| 在线观看午夜福利视频| 精品欧美一区二区三区在线| 少妇猛男粗大的猛烈进出视频| 久久香蕉精品热| 亚洲国产看品久久| 国内毛片毛片毛片毛片毛片| 亚洲精品乱久久久久久| 在线国产一区二区在线| 丝袜在线中文字幕| 国产精品免费一区二区三区在线 | 亚洲中文日韩欧美视频| 国产精品久久久久久精品古装| 国产av一区二区精品久久| 欧美日韩乱码在线| 国产成人av教育| 高潮久久久久久久久久久不卡| 在线观看66精品国产| 天天影视国产精品| 黑丝袜美女国产一区| 亚洲人成电影免费在线| 高潮久久久久久久久久久不卡| 国产亚洲精品久久久久久毛片 | 我的亚洲天堂| 久久久久久免费高清国产稀缺| 亚洲视频免费观看视频| 欧美精品人与动牲交sv欧美| 成人18禁在线播放| 一边摸一边抽搐一进一出视频| 国产亚洲精品第一综合不卡| 免费女性裸体啪啪无遮挡网站| 亚洲人成伊人成综合网2020| 精品久久久精品久久久| 日韩制服丝袜自拍偷拍| 在线天堂中文资源库| 成年人黄色毛片网站| 成人影院久久| 成人av一区二区三区在线看| 国产精品.久久久| av福利片在线| 亚洲av成人一区二区三| 成人国产一区最新在线观看| 成在线人永久免费视频| 99久久国产精品久久久| 男男h啪啪无遮挡| 黑人巨大精品欧美一区二区蜜桃| 女性生殖器流出的白浆| 午夜老司机福利片| 国产在线观看jvid| 99re6热这里在线精品视频| a级毛片在线看网站| 成人国语在线视频| 在线国产一区二区在线| 999久久久国产精品视频| 午夜福利,免费看| 亚洲精华国产精华精| 女人被狂操c到高潮| 午夜日韩欧美国产| 美女视频免费永久观看网站| 99在线人妻在线中文字幕 | 黑人巨大精品欧美一区二区mp4| 免费少妇av软件| 黄频高清免费视频| 99热网站在线观看| 视频在线观看一区二区三区| 最近最新中文字幕大全电影3 | 日韩欧美一区视频在线观看| 免费女性裸体啪啪无遮挡网站| 久久久精品国产亚洲av高清涩受| 国产成人精品久久二区二区免费| 大型黄色视频在线免费观看| 香蕉丝袜av| 很黄的视频免费| 国产精品电影一区二区三区 | 人人妻人人澡人人看| 在线观看免费午夜福利视频| 一级毛片女人18水好多| 999精品在线视频| 美女高潮喷水抽搐中文字幕| 亚洲人成电影免费在线| 中文字幕av电影在线播放| 国产无遮挡羞羞视频在线观看| 1024香蕉在线观看| 久久精品91无色码中文字幕| 国产aⅴ精品一区二区三区波| 亚洲午夜精品一区,二区,三区| 在线视频色国产色| 精品免费久久久久久久清纯 | 精品国产美女av久久久久小说| a在线观看视频网站| 国产日韩一区二区三区精品不卡| 国产高清视频在线播放一区| 黄色视频,在线免费观看| 欧美丝袜亚洲另类 | 亚洲一码二码三码区别大吗| 黄色丝袜av网址大全| 亚洲三区欧美一区| 99国产精品免费福利视频| 欧美日韩一级在线毛片| 午夜日韩欧美国产| 免费少妇av软件| 午夜福利在线观看吧| xxx96com| 涩涩av久久男人的天堂| 在线看a的网站| 免费av中文字幕在线| 久久久久久免费高清国产稀缺| 国产精品.久久久| 在线av久久热| 精品国产亚洲在线| 亚洲精品美女久久久久99蜜臀| 桃红色精品国产亚洲av| 老司机午夜福利在线观看视频| 精品国产国语对白av| 国产一区在线观看成人免费| 免费观看人在逋| 少妇的丰满在线观看| 国产极品粉嫩免费观看在线| 国产精品久久久久成人av| 午夜福利,免费看| 欧美日韩福利视频一区二区| 国产免费男女视频| 他把我摸到了高潮在线观看| 欧美乱妇无乱码| 久久人妻av系列| 天天躁夜夜躁狠狠躁躁| 在线天堂中文资源库| 成人国语在线视频| 不卡av一区二区三区| 午夜免费观看网址| 日韩欧美一区视频在线观看| 男女下面插进去视频免费观看| 免费av中文字幕在线| 国产高清视频在线播放一区| 欧美日本中文国产一区发布| aaaaa片日本免费| 午夜日韩欧美国产| av中文乱码字幕在线| 99国产精品一区二区蜜桃av | 美女午夜性视频免费| 人成视频在线观看免费观看| 久久影院123| 成人国产一区最新在线观看| 国产一区二区三区在线臀色熟女 | 热re99久久国产66热| 三上悠亚av全集在线观看| 欧美日本中文国产一区发布| 久久精品国产99精品国产亚洲性色 | 男女高潮啪啪啪动态图| 中文字幕精品免费在线观看视频| 国产又爽黄色视频| 一区二区三区精品91| 久久久久久久久免费视频了| 一区二区三区激情视频| 欧美日本中文国产一区发布| 成年女人毛片免费观看观看9 | 岛国毛片在线播放| 日本一区二区免费在线视频| 国精品久久久久久国模美| 每晚都被弄得嗷嗷叫到高潮| 日韩欧美三级三区| 亚洲欧美激情综合另类| 欧美乱码精品一区二区三区| 久久国产精品男人的天堂亚洲| 亚洲国产欧美一区二区综合| 国产日韩一区二区三区精品不卡| 精品人妻1区二区| 国内毛片毛片毛片毛片毛片| 黄色丝袜av网址大全| 国产精品亚洲一级av第二区| 亚洲精品国产精品久久久不卡| 热99re8久久精品国产| 脱女人内裤的视频| 纯流量卡能插随身wifi吗| 大香蕉久久网| 久久草成人影院| 国产精品1区2区在线观看. | 亚洲综合色网址| 国产精品国产高清国产av | 国产男女内射视频| 亚洲va日本ⅴa欧美va伊人久久| 18禁国产床啪视频网站| 欧美色视频一区免费| 精品卡一卡二卡四卡免费| 国产主播在线观看一区二区| 欧美日韩福利视频一区二区| 欧美性长视频在线观看| 久久狼人影院| 欧美丝袜亚洲另类 | 高清黄色对白视频在线免费看| 久久久久久亚洲精品国产蜜桃av| 黑人欧美特级aaaaaa片| 精品国产乱码久久久久久男人| 黑人巨大精品欧美一区二区蜜桃| 国产精品综合久久久久久久免费 | 久久久久精品人妻al黑| 最近最新免费中文字幕在线| 欧美最黄视频在线播放免费 | 丰满饥渴人妻一区二区三| 亚洲av成人av| 久久久精品国产亚洲av高清涩受| 好看av亚洲va欧美ⅴa在| 日韩成人在线观看一区二区三区| 日韩大码丰满熟妇| 亚洲在线自拍视频| 国产精品久久久av美女十八| 中国美女看黄片| 黄色a级毛片大全视频| 精品电影一区二区在线| 日韩视频一区二区在线观看| 熟女少妇亚洲综合色aaa.| 嫩草影视91久久| а√天堂www在线а√下载 | 黄色视频不卡| 亚洲一卡2卡3卡4卡5卡精品中文| 亚洲五月色婷婷综合| 亚洲精品美女久久av网站| 性少妇av在线| 亚洲熟女毛片儿| www.999成人在线观看| 国产亚洲欧美精品永久| 亚洲精品在线美女| videosex国产| 亚洲欧洲精品一区二区精品久久久| 久久婷婷成人综合色麻豆| 一个人免费在线观看的高清视频| 国内久久婷婷六月综合欲色啪| av线在线观看网站| 一级片免费观看大全| 黑人欧美特级aaaaaa片| 久久久国产欧美日韩av| 黄片大片在线免费观看| 亚洲av片天天在线观看| 精品国产一区二区三区四区第35| 一夜夜www| 91精品国产国语对白视频| 久久精品熟女亚洲av麻豆精品| 男人的好看免费观看在线视频 | 9色porny在线观看| 久久国产乱子伦精品免费另类| av超薄肉色丝袜交足视频| xxx96com| 国产日韩欧美亚洲二区| 久久天躁狠狠躁夜夜2o2o| 91精品国产国语对白视频| 欧美在线黄色| 欧美成狂野欧美在线观看| 成年人午夜在线观看视频| 99re6热这里在线精品视频| 国产色视频综合| 淫妇啪啪啪对白视频| 欧美日韩黄片免| 日韩视频一区二区在线观看| 正在播放国产对白刺激| 日韩欧美国产一区二区入口| 黑丝袜美女国产一区| 精品久久久久久久久久免费视频 | 午夜影院日韩av| 又大又爽又粗| 99国产精品一区二区三区| 欧美老熟妇乱子伦牲交| 日本wwww免费看| 日韩免费高清中文字幕av| 亚洲第一av免费看| 欧美乱妇无乱码| 多毛熟女@视频| 国产精品影院久久| 久久亚洲真实| 99久久99久久久精品蜜桃| 丰满的人妻完整版| 熟女少妇亚洲综合色aaa.| 少妇粗大呻吟视频| 最近最新中文字幕大全免费视频| 一级毛片高清免费大全| 久久精品国产亚洲av香蕉五月 | 色在线成人网| 欧美精品一区二区免费开放| 久久精品亚洲精品国产色婷小说| 亚洲成人国产一区在线观看| 熟女少妇亚洲综合色aaa.| 纯流量卡能插随身wifi吗| 国产精品久久久久久人妻精品电影| 久久青草综合色| 国产精品久久久av美女十八| 热99re8久久精品国产| 黄色 视频免费看| 男女之事视频高清在线观看| 久久 成人 亚洲| av在线播放免费不卡| 久9热在线精品视频| 精品卡一卡二卡四卡免费| 国产免费av片在线观看野外av| 免费观看a级毛片全部| 午夜日韩欧美国产| 亚洲中文av在线| 亚洲精品国产一区二区精华液| 国产野战对白在线观看| 在线观看免费日韩欧美大片| 9热在线视频观看99| 女人久久www免费人成看片| 黑人欧美特级aaaaaa片| 国产又色又爽无遮挡免费看| 午夜老司机福利片| 男人舔女人的私密视频| 一级,二级,三级黄色视频| 亚洲午夜精品一区,二区,三区| 视频区欧美日本亚洲| 夫妻午夜视频| 国产在线一区二区三区精| 色精品久久人妻99蜜桃| 亚洲一区二区三区不卡视频| 亚洲熟妇熟女久久| 淫妇啪啪啪对白视频| 国产成人系列免费观看| 精品无人区乱码1区二区| 精品少妇一区二区三区视频日本电影| 亚洲av日韩在线播放| 人人妻人人添人人爽欧美一区卜| 国产精品香港三级国产av潘金莲| 久久草成人影院| 18禁观看日本| 欧美日韩一级在线毛片| 日本黄色视频三级网站网址 | 无限看片的www在线观看| 成人免费观看视频高清| 久久午夜综合久久蜜桃| 男人舔女人的私密视频| 99久久国产精品久久久| 动漫黄色视频在线观看| 电影成人av| 水蜜桃什么品种好| 亚洲性夜色夜夜综合| 久久人妻av系列| 美女午夜性视频免费| av网站在线播放免费| 伊人久久大香线蕉亚洲五| 亚洲五月天丁香| av电影中文网址| 色老头精品视频在线观看| 国产三级黄色录像| 美女福利国产在线| 深夜精品福利| 丰满人妻熟妇乱又伦精品不卡| 久久精品国产亚洲av香蕉五月 | 亚洲午夜理论影院| 久久久久久久午夜电影 | 无人区码免费观看不卡| 亚洲专区中文字幕在线| 亚洲熟女精品中文字幕| 一级黄色大片毛片| 亚洲熟妇中文字幕五十中出 | 国产亚洲欧美98| 男人舔女人的私密视频| 中文欧美无线码| 曰老女人黄片| 香蕉丝袜av| 欧美 亚洲 国产 日韩一| 久久精品人人爽人人爽视色| 人妻久久中文字幕网| 男女午夜视频在线观看| 女警被强在线播放| www.自偷自拍.com| 69精品国产乱码久久久| 日韩中文字幕欧美一区二区| а√天堂www在线а√下载 | 交换朋友夫妻互换小说| 9191精品国产免费久久| 天堂动漫精品| 正在播放国产对白刺激| 欧美日韩亚洲高清精品| 黄频高清免费视频| 久久人妻av系列| 男女午夜视频在线观看| 麻豆av在线久日| 91老司机精品| 国产精品国产av在线观看| 中文字幕色久视频| www.自偷自拍.com| 如日韩欧美国产精品一区二区三区| 精品国产亚洲在线| 夜夜爽天天搞| 欧美精品亚洲一区二区| 欧美激情高清一区二区三区| 手机成人av网站| 欧美日韩亚洲综合一区二区三区_| 亚洲精品久久午夜乱码| 亚洲男人天堂网一区| 最新在线观看一区二区三区| 精品亚洲成a人片在线观看| 麻豆国产av国片精品| 变态另类成人亚洲欧美熟女 | 麻豆成人av在线观看| 国产成人精品久久二区二区91| 黑人操中国人逼视频| 日本黄色日本黄色录像| 亚洲中文日韩欧美视频| 岛国毛片在线播放| 国产高清videossex| 久久久国产欧美日韩av| 免费久久久久久久精品成人欧美视频| 精品亚洲成a人片在线观看| 美女 人体艺术 gogo| 久久久久久人人人人人| 成人手机av| 亚洲专区中文字幕在线| 久99久视频精品免费| 精品国产亚洲在线| 中国美女看黄片| 欧美日韩黄片免| 黄片大片在线免费观看| 激情在线观看视频在线高清 | 国产亚洲精品久久久久久毛片 | 变态另类成人亚洲欧美熟女 | 国产乱人伦免费视频| 久久精品成人免费网站| 国产精品一区二区精品视频观看| 久久久久久久久久久久大奶| 免费在线观看日本一区| av有码第一页| 99精品在免费线老司机午夜| www.999成人在线观看| 国产成人精品久久二区二区免费| 国产成人精品在线电影| 在线国产一区二区在线| 久久99一区二区三区| 美国免费a级毛片| 精品久久久久久久毛片微露脸| av超薄肉色丝袜交足视频| 午夜91福利影院| 日韩熟女老妇一区二区性免费视频| 9色porny在线观看| 国产不卡av网站在线观看| 免费av中文字幕在线| 精品人妻在线不人妻| 夜夜躁狠狠躁天天躁| 亚洲成av片中文字幕在线观看| 黑人欧美特级aaaaaa片| 亚洲精品美女久久av网站| 欧美乱码精品一区二区三区| 国产成人精品在线电影| 午夜91福利影院| videosex国产| 岛国在线观看网站| 一级片免费观看大全| 国产精品1区2区在线观看. | 又黄又粗又硬又大视频| 男女免费视频国产| av不卡在线播放| 99国产综合亚洲精品| 国产亚洲精品一区二区www | av天堂久久9| 亚洲熟妇中文字幕五十中出 | 国产精品99久久99久久久不卡| 一夜夜www| 欧美精品啪啪一区二区三区| 欧美日韩亚洲综合一区二区三区_| 777久久人妻少妇嫩草av网站| 亚洲一码二码三码区别大吗| 欧美日韩精品网址| 在线观看日韩欧美| 99国产极品粉嫩在线观看| 国产成人av教育| 乱人伦中国视频| www.精华液| 在线永久观看黄色视频| 9色porny在线观看| 日本黄色日本黄色录像| 日日爽夜夜爽网站| 精品国产乱码久久久久久男人| 精品高清国产在线一区| 美女高潮喷水抽搐中文字幕| 免费一级毛片在线播放高清视频 | 老熟妇仑乱视频hdxx| 操出白浆在线播放| 久久人人97超碰香蕉20202| 99热国产这里只有精品6| 欧美在线黄色| 丰满人妻熟妇乱又伦精品不卡| 91麻豆精品激情在线观看国产 | 一本综合久久免费| 亚洲精品中文字幕一二三四区| 老司机亚洲免费影院| 桃红色精品国产亚洲av| 麻豆乱淫一区二区| 午夜精品在线福利| 亚洲第一av免费看| 国产片内射在线| 亚洲第一青青草原| 国产成+人综合+亚洲专区| 久久99一区二区三区| 777久久人妻少妇嫩草av网站| 一级片免费观看大全| 天天躁夜夜躁狠狠躁躁| 精品无人区乱码1区二区| 久久久国产欧美日韩av| 热99re8久久精品国产| 一区二区日韩欧美中文字幕| 国内久久婷婷六月综合欲色啪| 精品乱码久久久久久99久播| 国产日韩一区二区三区精品不卡| 亚洲九九香蕉| 亚洲av电影在线进入| 亚洲av片天天在线观看| 国产亚洲精品久久久久5区| 亚洲一区二区三区不卡视频| 男女之事视频高清在线观看| 国产精品98久久久久久宅男小说| 在线观看免费日韩欧美大片| 亚洲国产精品sss在线观看 | 另类亚洲欧美激情| 一级毛片高清免费大全| 亚洲精品中文字幕一二三四区| 国产精品99久久99久久久不卡| bbb黄色大片| 三上悠亚av全集在线观看| 国产成人av教育| 久久久国产欧美日韩av| 精品国产乱子伦一区二区三区| 在线天堂中文资源库| 99久久99久久久精品蜜桃| 亚洲精品国产精品久久久不卡| 老司机在亚洲福利影院| 十八禁人妻一区二区| 久久国产乱子伦精品免费另类| 久久精品国产99精品国产亚洲性色 | www.自偷自拍.com| e午夜精品久久久久久久| 国产深夜福利视频在线观看| 很黄的视频免费| 亚洲精品一二三| 中文字幕av电影在线播放| 欧美日韩亚洲综合一区二区三区_| 成人特级黄色片久久久久久久| 18禁黄网站禁片午夜丰满| 日韩成人在线观看一区二区三区| 国产精品久久电影中文字幕 | 午夜精品久久久久久毛片777| 十八禁高潮呻吟视频| av片东京热男人的天堂| 亚洲精品久久成人aⅴ小说| 色播在线永久视频| 亚洲av日韩在线播放| 侵犯人妻中文字幕一二三四区| 久久香蕉激情| 久久久国产欧美日韩av| 国产麻豆69| 美女高潮喷水抽搐中文字幕| 看黄色毛片网站| 中文字幕另类日韩欧美亚洲嫩草| 亚洲午夜精品一区,二区,三区| 久久亚洲真实| 国产成人欧美| 大片电影免费在线观看免费| 日韩欧美三级三区| 少妇猛男粗大的猛烈进出视频| 亚洲一区二区三区欧美精品| 午夜精品国产一区二区电影| 18禁裸乳无遮挡动漫免费视频| 久久精品熟女亚洲av麻豆精品| 淫妇啪啪啪对白视频| 99精国产麻豆久久婷婷| 亚洲一区中文字幕在线| 国产成人一区二区三区免费视频网站| 丁香欧美五月| 免费久久久久久久精品成人欧美视频| 国产欧美日韩精品亚洲av| 国产精品一区二区免费欧美| 国产男女超爽视频在线观看| 超碰97精品在线观看| 久久这里只有精品19| 在线观看免费视频网站a站| 亚洲成人手机| 男女之事视频高清在线观看| 麻豆乱淫一区二区| 久99久视频精品免费| 搡老岳熟女国产| 亚洲情色 制服丝袜| 国产精品久久久久久人妻精品电影| 欧美亚洲日本最大视频资源| 免费不卡黄色视频| 亚洲av成人av| 国产免费男女视频| 嫁个100分男人电影在线观看| 午夜福利欧美成人| xxxhd国产人妻xxx| 这个男人来自地球电影免费观看| 亚洲专区中文字幕在线|