• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Data Hiding in DNA for Authentication of Plant Variety Rights

    2013-07-29 09:43:08WeiLiangTaiCharlesWangPhillipSheuandJeffreyTsai

    Wei-Liang Tai,Charles C.N.Wang,Phillip C.Y.Sheu,and Jeffrey J.P.Tsai

    1.Introduction

    Living organisms have been excluded from patent laws for over two hundred years.Living organism forms were always considered as a product of nature and not a human invention in the past.Before 1930,plant breeders who created new types of plants had no claim to the marketing rights or sales of their plants,even though they have taken a lot of time and effort to breed a new plant.The non-patentable status of plants changed with the Plant Patent Act of 1930.According to the U.S.Department of Agriculture(USDA),the Plant Patent Act was enacted in 1930 and provided,for the first time,patent protection for new and distinct varieties of asexually reproduced plants[1].Now plant breeders have a financial incentive to perform plant breeding experiments and exercise control over their discoveries.

    Although more than 68 countries protect new plant varieties by the plant breeder’s right,a few countries such as USA,European Union,Japan,and Australia do not exclude plant varieties from the patent right.The use of plant patents is becoming more and more common.In theory,molecular markers provide a method for helping to enforce plant patent rights.However,they are currently available for only a few breeders’ crop species since molecular marker libraries are expensive to develop.Furthermore,molecular markers represent a sample of the deoxyribose nucleic acid(DNA)from an organism rather than its entire genetic composition.Thus,molecular markers can easily demonstrate that two plants are different but hard to prove two plants are the same.For example,it may be difficult to find markers that differentiate a sport from the original cultivar,for the sport only differs from the original cultivar in a few genes.

    Data hiding provide another efficient way for authentication and annotation of plant patents.Digital watermarking techniques have been proposed for extensive applications,such as ownership protection,copy control,annotation,and authentication.Most past work is designed for digital images where the pixels take on a wide range of colors or brightness levels.Nowadays,there are many plants are increasingly commonly seen in our life,such as rose,phalaenopsis,and vegetables.Having the capability of hiding data in DNA can facilitate the authentication,annotation,and tracking of these plants.However,hiding data in DNA is much more difficult than in digital images.For DNA sequences,the genetic codes take values from only four bases:adenine(A),guanine(G),cytosine(C),and thymine(T),and they are drastically different in functionalities.As a result,hiding data in DNA without changing the functionalities becomes more difficult.

    Recently,hiding data in DNA becomes an interesting research topic because of biological property.In 2000,Leier et al.[2]proposed a special key sequence,called a primer,to decode an encrypted DNA sequence.They need to send a selected primer and an encrypted sequence to the receiver.Without the primers and the designated sequences,it is not possible to correctly decode the secret.Peterson[3]proposed a method to hide data in DNA sequences by substituting three consecutive bases as a character.However,there are at most 64 characters can be encoded in DNA.Further,high frequency of characters E and I can lead to the reveal of secret.

    Chang et al.[4]proposed two schemes to hide data in DNA sequences with the reversibility.The first scheme compressed the decimal formatted DNA sequence using a lossless compression method and then appended the secret message to the end of the compression stream.Finally,the bit stream was converted back to nucleotides.The second scheme used the difference-expansion(DE)based reversible data hiding technique to conceal a secret bit in two neighboring words.In 2010,Shiu et al.[5]proposed three data hiding methods based upon properties of DNA sequences.These three methods are:the insertion method,the complementary pair method,and the substitution method.

    Unfortunately,the robustness is low for some existing methods,which may result in inauthenticity and un-integrity of plant variety rights.Besides,these methods change not only the functionalities but also the original DNA sequence.Therefore,we propose a high capacity data hiding scheme for DNA without changing the functionalities of DNA sequences.This scheme adaptively varies the embedding process according to the amount of hidden data.

    To make this paper self-contained,in Section 2,we describe the concepts from DNA that will be needed for the rest of the paper.Section 3 contains a detailed exposition of the proposed algorithm.In Section 4,we experimentally investigate the relationship between the capacity & hiding performance and the influence of variant DNA on the capacity.We also compare performance with existing schemes and analyze the robustness and security issues in this section.Finally,we conclude the paper in Section 5.

    2.DNA

    Recent advances and development in biological techniques research become more and more popular.In this section,we describe the DAN to functional protein called the central dogma as shown in Fig.1.The dogma is a framework for understanding the transfer of DNA sequence information.DNA is a molecule polymer of nucleotides that are collectively called the deoxyribose nucleic acid,which controls all biological life.The ribonucleic acid(RNA)is similar to DNA in structure,but in the fact that RNA contains the sugar ribose as opposed to “deoxyribose”.DNA has hydrogen at the second carbon atom on the ring,and RNA has hydrogen linked through an oxygen atom.

    Fig.1.Central dogma of molecular biology.

    In DNA and RNA,there are four nucleotide bases.Three of these bases are the same:A,G,and C.The fourth base for DNA is T,whereas in RNA,the fourth base lacks a methyl group and is called uracil(U).Each base has two points at which it can join covalently to two other bases on either end,forming a linear chain of monomers.

    In general,RNA copies of DNA are made by a process known as “transcription”.Transcription is the conversion of information from DNA to RNA and is straightforward because of the direct correspondence between the four nucleotide bases of DNA and those of RNA.For most purposes,RNA can be regarded as the working copy of the DNA master template.There is usually one or a very small number of examples of DNA in the cell,whereas there are multiple copies of the transcribed RNA.The transcript RNA(tRNA)is referred to message RNA(mRNA)by discarding the intervening sequence of RNA.

    In the protein-coding region of mRNA,three successive nucleotide bases,called triplets or codons,are used to code for each individual amino acid.Three bases are needed because there are 20 different types of amino acids shown in Table 1 but only four nucleotide bases:with one base there are four possible combinations; with two,16(42);with three,64(43),which is more than the number of amino acids.

    The RNA transcription is used by a complex molecular machine called the ribosome to translate the order of successive codons into the corresponding order of amino acids.Special “stop” codons,such as UAA,UAG,and UGA,induce the ribosome to terminate the elongation of the polypeptide chain at a particular point.Similarly,the codon for the amino acid methionine is often used as the start signal for translation.

    For plant variety rights,in the US the Plant Patent Act of 1930 initially allowed seed developers to take out patents on seeds they had developed by artificial selection.Now,the Act extends to the patenting of genetically modified(GM)crops by large multinational companies.It has succeeded in implementing similar patent laws in other countries.

    Genetically modified crops have been around for over 20 years and have met with variable successes across the globe.Essentially,genetic modification involves inserting a section of DNA carrying a desirable gene of one species into the DNA of another.In crop plants,some of the beneficial features are achieved by using this method,including insect resistance,herbicide resistance(bar[6],aroA[7],bxn[8],sul,and tfdA[9]),nutritional value(OsNAS1,OsNAS2,and OsNAS3[10]),pest resistance,allergy resistance,higher yields,longer shelf life,and improved flavour.Therefore,in order to avoid altering DNA functionally,we propose a watermarking scheme based on mRNA sequences for copyright protection.

    3.Proposed Scheme

    An ideal watermarking system protects the data without altering it functionally.However,how can change DNA and still make the protein product come out the same? The only way is redundancy.Thus,we use the codon redundancy to hide data in mRNA sequence.A mRNA sequence is 3 bases long.There are 4 possible bases,U,C,A,and G.Clearly,64 unique codes can be generated.However,only 20 amino acids are encoded.There is redundancy in the mRNA to amino acid mapping.The redundancy can be used to hide data into the sequence without altering its function or length.

    As shown in Table 1,there can be sets of 1,2,3,4 or 6 codons representing the same amino acid.Thus,we first take a binary secret sequence and convert it to a decimal number.Then we take the amino acid sequence that would be generated by the original mRNA,and generate a list of all possible codons that lead to the same sequence.The number of codon combinations for each amino acid is used to hide data.Having explained our background logic,we now outline the principle of the proposed data hiding algorithm.

    3.1 Embedding Process

    Input:a mRNA sequence with four possible bases,U,C,A,G,and a secret bit stream S={s1,s2,··,sn} where si∈{0,1} and 1≤i≤n.

    Output:a watermarked mRNA sequence W={W'1,W'2,··,W'n} with the secret message S hidden.

    Step 1.Translate the mRNA sequence into the amino acid sequence A={A1,A2,··,Am},which represents where Aiis a mRNA codon.

    Step 2.Transform the secret bit stream to an unsigned integer B:

    Step 3.Generate P={P1,P2,··,Pm} where Piis the number of codon combinations for each amino acid Aiin the sequence.

    Step 4.Calculate the number T of all possible assignments for the input mRNA sequence based on the codon combinations until T>B:

    where 1≤k≤m.

    Step 5.According to the value of B,find the corresponding assignment of codons W'ifor all amino acids Ai,1≤i≤k,and output their codons:

    Note that the number k should be used as a secret key for secure transmission.To show how this works,we take a sample message and embed it into a short sequence.Assume that the secret bit stream S={10011011} and the given mRNA sequence is “GCG CAG UUA GUA”.We first translate the mRNA sequence into the amino acid sequence A={Ala,Gln,Leu,Val}.The secret bit stream is transformed to an unsigned integer B=155.Then,we generate the number of codon combinations for each amino acid Aiin the sequence,P={4,2,6,4}.As shown in Step 4,we can obtain the number T=192 and k=4.Finally,as illustrated in Fig.2,we find the corresponding assignment of codons for all amino acids Ai,1≤i≤k,and output their codons.

    Table 1:Genetic code

    Fig.2.Embedding example.

    This process has generated the new mRNA sequence“GCU CAA CUC GUU”.Therefore,following the highlighted path we get “GCU CAA CUC GUU”,which codes for the same amino acid sequence as the original mRNA,and also contains the hidden watermark.Note that there is adequate space to encrypt and embed a strong and repetitive watermark into living sequences since they consist of many thousands of base pairs.As a result,we use this technique in a retrovirus vector,that is,the message will transfer through the reverse transcription pathway and will be embedded in the DNA of the target cell in a complementary form.

    3.2 Extraction Process

    Input:a watermarked mRNA sequence and number k.

    Output:secret message S.

    Step 1.Calculate the series number B from the selected k codons.

    Step 2.Transform the unsigned integer B to the secret bit stream si=(B/2n-i)mod 2,and output the bit stream.

    The DNA sequence is deemed authentic only if the embedded authentication code matches the extracted information.

    4.Experimental Results

    To obtain a better understanding of how different host DNA sequences affect the performance of the proposed watermarking scheme,we present some results in a table form.All experiments were performed with eight significantly used genes:bar,aroA,BXN,sul,TfdA,OsNAS1,OsNAS2,and,OsNAS3,as shown in Table 2.These genes are commonly used for genetic modification in crop plants.Some of the beneficial features include insect resistance,herbicide resistance(bar[6],aroA[7],bxn[8],sul,and tfdA[9]),nutritional value(OsNAS1,OsNAS2,and OsNAS3[10]),pest resistance,allergy resistance,higher yields,longer shelf life,and improved flavour.The investment plants should be protected from any other acts that may be prescribed by the provisions of the Plant Varieties Act 1997.

    Table 2:Eight test DNA sequences

    Table 3:Hiding performance of the proposed scheme

    4.1 Capacity versus Distortion Performance

    Table 3 gives an example of how different DNA sequences influence the payload Cap and the hiding performance bpn(bit per nucleotide),which is defined as

    The real capacity that can be achieved depends on the nature of the DNA sequence itself.We notice that the average hiding performance is bpn=0.57.As a result,different DNA sequences do not influence the hiding performance.Our proposed scheme provides a stable hiding performance for authentication of plant variety rights.

    4.2 Comparison with Other Schemes

    Table 4 compares the hiding performance delivered by the proposed scheme and other existing schemes[4],[5].Note that the proposed scheme does not change the functionalities of DNA sequences,whereas schemes in [4]and [5]destroyed DNA sequences,which induces morphological changes in biological patterns.As Table 4 shows,the insertion method in [5]derived better performance.However,they did not preserve original characteristics of living organisms,which is unable to protect the copyright due to the functionalities change of genes.The evaluation results show that the proposed scheme achieves relatively high hiding performance than existing schemes.Further,our proposed scheme preserves the functionalities of genes,which ensure the copyright protection.

    Table 4:Performance comparison with schemes[4],[5]

    Fig.3.More robust variation in embedding process.

    4.3 Robustness and Security

    Security issues need to be handled by top layers in authentication applications.The major objective of an adversary is to forge authentication data so that an altered DNA can still pass authentication tests.Hence,it is important to study the following two problems for authentication applications:1)the probability of making DNA alterations while preserving the m-bit embedded authentication data,and 2)the possibility for an adversary to hide specific data in a DNA sequence.

    In the mRNA sequence,there are 64 unique codes that can be generated in which there can be sets of 1,2,3,4 or 6 codons representing the same amino acid.In the proposed scheme,if a single codon is changed,the probability of getting a correctly decoded bit is

    For the first issue,if the altered codons number is large,the probability of getting the decoded data to be exactly the same as the originally embedded one is approximately 2-3m,where m is the embedded payload size,which is very small as long as m is large.Therefore,the threat of making DNA alterations while preserving the m-bit embedded authentication data is very low.

    The second issue depends on whether adversaries can derive information regarding the correspondence of codons and the carried bit by studying the difference between those copies,hence creating a new DNA sequence embedded with data when they will.Hence,assuming adversaries collect sufficient copies and know what data is embedded in each copy,they will be able to identify the correspondence of codons and the carried bit,and to hide their desired data by manipulating the corresponding codons.To prevent the above mentioned attack,we have to introduce more uncertainty.A good solution for dealing with this is to arrange the nucleotide randomly by using a secret key.As shown in Fig.3,instead of starting from the first codon chosen alphabetically as presented earlier,we can randomly number the codon before the watermark.This would result in a completely different sequence,but the information conveyed would be the same.This step keeps the process unambiguous,and at the same time ensures that it is difficult for an adversary to identify the congruent relationships of codons and the carried bits.

    5.Conclusions

    Hiding data in DNA can be applied to protecting the intellectual property in the gene therapy,transgenic crops,tissue cloning,and DNA computing.Data can also be hidden to verify the integrity of DNA sequences,authentication,and annotation for copyrights.Nowadays,molecular markers provide a method for helping to enforce copyrights.However,molecular markers can easily demonstrate that two plants are different but hard to prove two plants are the same.Therefore,we propose a watermarking scheme for authentication of DNA rights.To avoid changing the functionalities of genes,we embed data in the mRNA sequence by exploring the codon redundancy.We also address the robust and security issues and offer several additional steps to strengthen the watermark.As a result,the proposed scheme can actually be used to embed data directly into active genetic segments for copyright protection.In the other direction,one can generate an appropriate DNA sequence,when transcribed,which can create the mRNA strand with the embedded message.The practical usefulness of such a technique can be enormous.

    [1]J.Chen,“The parable of the seeds:interpreting the plant variety protection act in furtherance of innovation policy,”Notre Dame Law Review,vol.81,no.4,pp.105-166,2006.

    [2]A.Leier,C.Richter,W.Banzhaf,and H.Rauhe,“Cryptography with DNA binary strands,” BioSystems,vol.57,no.1,pp.13-22,2000.

    [3]I.Peterson.Hiding in DNA.[Online].Available:http://www.maa.org/mathland/mathtrek_4_10_00.html

    [4]C.-C.Chang,T.-C.Lu,Y.-F.Chang,and R.C.T.Lee,“Reversible data hiding schemes for deoxyribonucleic acid(DNA)medium,” Int.Journal of Innovative Computing,Information and Control,vol.3,no.5,pp.1-16,Oct.2007.

    [5]H.-J.Shiu,K.-L.Ng,J.-F.Fang,R.C.T.Lee,and C.-H.Huang,“Data hiding methods based upon DNA sequences,”Information Sciences,vol.180,no.11,pp.2196-2208,Jun.2010.

    [6]K.S.Rathore,V.K.Chowdhury,and T.K.Hodges,“Use of bar as a selectable marker gene and for the production of herbicide-resistant rice plants from protoplasts,” Plant Molecular Biology,vol.21,no.5,pp.871-884,Mar.1993.

    [7]L.Comai,L.C.Sen,and D.M.Stalker,“An altered aroA gene product confers resistance to the herbicide glyphosate,”Science,vol.221,no.4608,pp.370-371,Jul.1983.

    [8]D.M.Stalker,K.E.McBride,and L.D.Malyj,“Herbicide resistance in transgenic plants expressing a bacterial detoxification gene,” Science,vol.242,no.4877,pp.419-423,Oct.1988.

    [9]J.F.Rice,F.M.Menn,A.G.Hay,J.Sanseverino,and G.S.Sayler,“Natural selection for 2,4,5-trichlorophenoxyacetic acid mineralizing bacteria in agent orange contaminated soil,” Biodegradation,vol.16,no.6,pp.501-512,Dec.2005.

    [10]H.Inoue,K.Higuchi,M.Takahashi,H.Nakanishi,S.Mori,and H.K.Nishizawa,“Three rice nicotianamine synthase genes,OsNAS1,OsNAS2,and OsNAS3 are expressed in cells involved in long-distance transport of iron and differentially regulated by iron,” Plant Journal,vol.36,no.3,pp.366-381,Nov.2003.

    久久久久久久国产电影| a级毛色黄片| 男男h啪啪无遮挡| 美女cb高潮喷水在线观看| 简卡轻食公司| 99热这里只有是精品在线观看| 亚洲美女搞黄在线观看| 伊人久久国产一区二区| 精品视频人人做人人爽| 亚洲在久久综合| 大香蕉久久网| av在线蜜桃| 亚洲欧美精品专区久久| 中文字幕av成人在线电影| 日韩伦理黄色片| 一级片'在线观看视频| 欧美性猛交╳xxx乱大交人| 亚洲欧美清纯卡通| 男人和女人高潮做爰伦理| 欧美zozozo另类| 国产成年人精品一区二区| 少妇裸体淫交视频免费看高清| 亚洲婷婷狠狠爱综合网| 亚洲国产色片| 卡戴珊不雅视频在线播放| 波野结衣二区三区在线| 国产女主播在线喷水免费视频网站| 蜜臀久久99精品久久宅男| 各种免费的搞黄视频| 在线观看国产h片| 国产男女内射视频| 美女xxoo啪啪120秒动态图| 91精品伊人久久大香线蕉| 久久久久国产精品人妻一区二区| 久久精品国产亚洲av天美| 美女被艹到高潮喷水动态| 一个人看的www免费观看视频| 午夜福利在线观看免费完整高清在| 黄片无遮挡物在线观看| 国产精品成人在线| 婷婷色综合大香蕉| 高清av免费在线| 国内揄拍国产精品人妻在线| 欧美另类一区| 日韩欧美精品免费久久| 干丝袜人妻中文字幕| 成年女人在线观看亚洲视频 | 白带黄色成豆腐渣| 全区人妻精品视频| 深夜a级毛片| 国产黄色免费在线视频| 最近最新中文字幕免费大全7| 久久精品综合一区二区三区| 一区二区三区乱码不卡18| 日韩 亚洲 欧美在线| 最近2019中文字幕mv第一页| 香蕉精品网在线| 亚洲丝袜综合中文字幕| 天堂网av新在线| 午夜视频国产福利| 久久久久久久久久久免费av| 色5月婷婷丁香| 伦精品一区二区三区| 国产白丝娇喘喷水9色精品| 久久精品国产亚洲av涩爱| 国产毛片a区久久久久| 国产精品.久久久| 天堂中文最新版在线下载 | 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 国产精品国产三级国产av玫瑰| 亚洲成人精品中文字幕电影| 国产午夜精品久久久久久一区二区三区| 男女下面进入的视频免费午夜| 国产欧美另类精品又又久久亚洲欧美| 亚洲av一区综合| 日日摸夜夜添夜夜爱| 在现免费观看毛片| 高清在线视频一区二区三区| 伦精品一区二区三区| 免费看光身美女| av.在线天堂| 91久久精品电影网| 国产乱人视频| 日日啪夜夜撸| 菩萨蛮人人尽说江南好唐韦庄| 亚洲国产欧美在线一区| 嫩草影院入口| 极品教师在线视频| 精品视频人人做人人爽| 国产毛片a区久久久久| 网址你懂的国产日韩在线| 免费av不卡在线播放| 老司机影院毛片| 亚洲激情五月婷婷啪啪| 久久国产乱子免费精品| 日本午夜av视频| 国产成人精品婷婷| 亚洲精品国产色婷婷电影| 一级二级三级毛片免费看| 久久韩国三级中文字幕| 国产精品熟女久久久久浪| 啦啦啦啦在线视频资源| 久久精品国产鲁丝片午夜精品| 一级爰片在线观看| 亚洲无线观看免费| 国产精品.久久久| 边亲边吃奶的免费视频| 制服丝袜香蕉在线| 自拍偷自拍亚洲精品老妇| 亚洲国产欧美在线一区| 久久人人爽av亚洲精品天堂 | 在线观看三级黄色| 欧美性猛交╳xxx乱大交人| 亚洲国产精品成人综合色| 日本爱情动作片www.在线观看| 国产精品熟女久久久久浪| 嘟嘟电影网在线观看| 国产成人午夜福利电影在线观看| 黄色配什么色好看| 亚洲电影在线观看av| 纵有疾风起免费观看全集完整版| 精品久久久久久久久亚洲| 久久99热这里只有精品18| 亚洲av免费在线观看| 亚洲aⅴ乱码一区二区在线播放| 热99国产精品久久久久久7| 美女高潮的动态| 日韩一区二区视频免费看| 精品国产露脸久久av麻豆| 美女国产视频在线观看| 日韩成人av中文字幕在线观看| 国产精品一二三区在线看| 国产精品人妻久久久久久| 在线看a的网站| 国产乱人视频| 欧美国产精品一级二级三级 | 哪个播放器可以免费观看大片| 国产精品精品国产色婷婷| 五月天丁香电影| 精品视频人人做人人爽| 麻豆久久精品国产亚洲av| 七月丁香在线播放| 免费观看无遮挡的男女| 亚洲成人一二三区av| 精品视频人人做人人爽| 制服丝袜香蕉在线| 亚洲精品乱久久久久久| 国产黄片视频在线免费观看| 日韩一区二区三区影片| 午夜免费观看性视频| 亚洲第一区二区三区不卡| 黄片无遮挡物在线观看| 大片电影免费在线观看免费| 国产精品久久久久久av不卡| 最后的刺客免费高清国语| 亚洲国产成人一精品久久久| 少妇猛男粗大的猛烈进出视频 | 午夜精品国产一区二区电影 | 中文字幕av成人在线电影| 亚洲国产精品专区欧美| 综合色丁香网| 校园人妻丝袜中文字幕| 2021天堂中文幕一二区在线观| 亚洲精品成人久久久久久| 国产黄a三级三级三级人| 国语对白做爰xxxⅹ性视频网站| 人妻少妇偷人精品九色| 国产乱人偷精品视频| 不卡视频在线观看欧美| 免费观看av网站的网址| 边亲边吃奶的免费视频| 亚洲av成人精品一二三区| 国产成年人精品一区二区| av卡一久久| 女的被弄到高潮叫床怎么办| 精品人妻一区二区三区麻豆| 国产又色又爽无遮挡免| 人妻夜夜爽99麻豆av| 免费不卡的大黄色大毛片视频在线观看| 欧美日韩视频高清一区二区三区二| 一区二区三区乱码不卡18| 蜜桃久久精品国产亚洲av| 少妇的逼水好多| 欧美日韩综合久久久久久| 久久久亚洲精品成人影院| 夫妻午夜视频| 国产成人免费无遮挡视频| 国产成人免费无遮挡视频| 国产视频内射| 免费黄频网站在线观看国产| 看十八女毛片水多多多| 91aial.com中文字幕在线观看| 国产成年人精品一区二区| 91在线精品国自产拍蜜月| 97精品久久久久久久久久精品| 精品久久久噜噜| 寂寞人妻少妇视频99o| 97超视频在线观看视频| 亚洲欧美清纯卡通| 极品少妇高潮喷水抽搐| h日本视频在线播放| 久久国产乱子免费精品| 91久久精品国产一区二区三区| 简卡轻食公司| 男人添女人高潮全过程视频| 免费观看av网站的网址| 菩萨蛮人人尽说江南好唐韦庄| 国产成人免费无遮挡视频| 亚洲av不卡在线观看| 国产精品国产av在线观看| 男人添女人高潮全过程视频| 精品熟女少妇av免费看| 亚洲av.av天堂| 一区二区三区乱码不卡18| 在线观看人妻少妇| 午夜福利在线观看免费完整高清在| 久久人人爽人人爽人人片va| av女优亚洲男人天堂| 久久国产乱子免费精品| 国产一区二区在线观看日韩| 亚洲精品影视一区二区三区av| 热99国产精品久久久久久7| 香蕉精品网在线| 99视频精品全部免费 在线| av又黄又爽大尺度在线免费看| av国产免费在线观看| 免费观看的影片在线观看| 久久这里有精品视频免费| 日韩欧美精品v在线| 性色avwww在线观看| 精品一区二区三卡| 免费看a级黄色片| 亚洲欧洲日产国产| 国产69精品久久久久777片| 国产欧美亚洲国产| 精品一区二区免费观看| 亚洲最大成人手机在线| 欧美一级a爱片免费观看看| h日本视频在线播放| 免费播放大片免费观看视频在线观看| 亚洲国产精品成人综合色| 欧美成人午夜免费资源| 黄色一级大片看看| 国产白丝娇喘喷水9色精品| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 性色avwww在线观看| 国产精品久久久久久精品古装| 成人欧美大片| 2021天堂中文幕一二区在线观| 久久久久久久精品精品| 国产91av在线免费观看| 波野结衣二区三区在线| 国产黄a三级三级三级人| 成人亚洲精品av一区二区| 大话2 男鬼变身卡| 啦啦啦中文免费视频观看日本| 高清毛片免费看| 在线看a的网站| 日本与韩国留学比较| 国产精品国产三级专区第一集| 欧美激情在线99| 在线观看一区二区三区激情| 国产爱豆传媒在线观看| 久久97久久精品| 国产精品麻豆人妻色哟哟久久| 男人舔奶头视频| av在线播放精品| 新久久久久国产一级毛片| 中文天堂在线官网| 69av精品久久久久久| 男女那种视频在线观看| 日韩av不卡免费在线播放| 日韩成人av中文字幕在线观看| 中文在线观看免费www的网站| 免费高清在线观看视频在线观看| 国产免费视频播放在线视频| 尤物成人国产欧美一区二区三区| 男的添女的下面高潮视频| 国产综合精华液| 欧美成人午夜免费资源| 精品国产一区二区三区久久久樱花 | 国产av不卡久久| 青春草亚洲视频在线观看| 国产精品久久久久久精品古装| 夫妻性生交免费视频一级片| av国产免费在线观看| 丰满少妇做爰视频| 国产探花在线观看一区二区| 91aial.com中文字幕在线观看| 国语对白做爰xxxⅹ性视频网站| 日韩一区二区视频免费看| 国产真实伦视频高清在线观看| 亚洲高清免费不卡视频| 80岁老熟妇乱子伦牲交| 深夜a级毛片| 免费观看的影片在线观看| 熟女av电影| 日韩三级伦理在线观看| 国产精品久久久久久精品古装| 看十八女毛片水多多多| 黑人高潮一二区| 超碰97精品在线观看| 白带黄色成豆腐渣| 国产黄a三级三级三级人| 晚上一个人看的免费电影| 伦理电影大哥的女人| 国产成年人精品一区二区| 色视频www国产| 全区人妻精品视频| 精品一区在线观看国产| 精品人妻一区二区三区麻豆| 久久久久久九九精品二区国产| 一区二区三区免费毛片| 欧美97在线视频| 亚洲美女视频黄频| 好男人在线观看高清免费视频| 欧美人与善性xxx| 久久久久久久久大av| 丝袜脚勾引网站| 亚洲经典国产精华液单| 丰满乱子伦码专区| 又爽又黄无遮挡网站| 国产精品.久久久| 2018国产大陆天天弄谢| 久久精品国产亚洲网站| 肉色欧美久久久久久久蜜桃 | tube8黄色片| 亚洲精品久久久久久婷婷小说| 一个人观看的视频www高清免费观看| 中文字幕久久专区| 国产精品av视频在线免费观看| 亚洲人与动物交配视频| 人妻制服诱惑在线中文字幕| 啦啦啦在线观看免费高清www| 婷婷色综合www| 免费看不卡的av| av在线蜜桃| 日韩成人av中文字幕在线观看| 欧美97在线视频| 2021天堂中文幕一二区在线观| 国模一区二区三区四区视频| 久久久a久久爽久久v久久| 国内少妇人妻偷人精品xxx网站| 男男h啪啪无遮挡| 午夜免费观看性视频| 亚洲av成人精品一二三区| 中文乱码字字幕精品一区二区三区| 九九爱精品视频在线观看| 美女脱内裤让男人舔精品视频| 在线观看国产h片| 蜜桃久久精品国产亚洲av| 神马国产精品三级电影在线观看| 啦啦啦中文免费视频观看日本| 一级毛片aaaaaa免费看小| 国产亚洲av片在线观看秒播厂| 三级男女做爰猛烈吃奶摸视频| 国产黄a三级三级三级人| 嘟嘟电影网在线观看| 精品国产露脸久久av麻豆| 2018国产大陆天天弄谢| 在线亚洲精品国产二区图片欧美 | 国产精品国产三级专区第一集| 美女cb高潮喷水在线观看| 人妻一区二区av| 美女主播在线视频| 国产淫片久久久久久久久| 一个人看的www免费观看视频| 中国国产av一级| 男女那种视频在线观看| 成人黄色视频免费在线看| 日本欧美国产在线视频| 一个人看视频在线观看www免费| 777米奇影视久久| 中文字幕亚洲精品专区| 99精国产麻豆久久婷婷| 亚洲av福利一区| 建设人人有责人人尽责人人享有的 | 99久久精品国产国产毛片| 三级经典国产精品| 日韩强制内射视频| 免费看日本二区| 亚洲第一区二区三区不卡| 青春草亚洲视频在线观看| 高清毛片免费看| 亚洲av中文av极速乱| 午夜福利视频精品| 成人亚洲精品av一区二区| 夜夜爽夜夜爽视频| 看非洲黑人一级黄片| 热99国产精品久久久久久7| 国产毛片a区久久久久| 搡老乐熟女国产| 最近最新中文字幕大全电影3| 亚洲精品亚洲一区二区| 色播亚洲综合网| 大又大粗又爽又黄少妇毛片口| 少妇人妻 视频| 男插女下体视频免费在线播放| 国产精品不卡视频一区二区| 高清日韩中文字幕在线| 香蕉精品网在线| 久久精品人妻少妇| 日韩欧美精品免费久久| 九草在线视频观看| 国产黄片视频在线免费观看| 国产成人一区二区在线| 听说在线观看完整版免费高清| 最近最新中文字幕大全电影3| 亚洲熟女精品中文字幕| 好男人在线观看高清免费视频| 女人久久www免费人成看片| 91久久精品国产一区二区三区| 真实男女啪啪啪动态图| 精华霜和精华液先用哪个| 午夜激情福利司机影院| 午夜福利在线观看免费完整高清在| 亚洲aⅴ乱码一区二区在线播放| 波多野结衣巨乳人妻| 国产精品人妻久久久影院| 免费黄网站久久成人精品| 男人舔奶头视频| 亚洲国产精品成人久久小说| 国产熟女欧美一区二区| 九色成人免费人妻av| 久久精品国产a三级三级三级| 日韩欧美精品v在线| 亚洲av免费高清在线观看| 亚洲精品一二三| 免费播放大片免费观看视频在线观看| 国模一区二区三区四区视频| 久久精品熟女亚洲av麻豆精品| 久久国产乱子免费精品| 黄色视频在线播放观看不卡| 人体艺术视频欧美日本| 亚洲美女搞黄在线观看| 欧美日韩在线观看h| 欧美日韩亚洲高清精品| 永久免费av网站大全| 一本久久精品| 欧美高清成人免费视频www| 99久久精品热视频| 又爽又黄无遮挡网站| 神马国产精品三级电影在线观看| 好男人在线观看高清免费视频| 久久久久网色| 夫妻性生交免费视频一级片| 久久精品综合一区二区三区| 夜夜爽夜夜爽视频| 高清日韩中文字幕在线| 内地一区二区视频在线| 国产精品无大码| 三级国产精品片| 91午夜精品亚洲一区二区三区| 最近手机中文字幕大全| 国产精品.久久久| 国产黄片视频在线免费观看| 国产精品国产av在线观看| 一区二区av电影网| 热re99久久精品国产66热6| 日日啪夜夜撸| 狂野欧美白嫩少妇大欣赏| 制服丝袜香蕉在线| 午夜福利视频1000在线观看| 久久久久国产网址| 黄色怎么调成土黄色| 亚洲精华国产精华液的使用体验| 2018国产大陆天天弄谢| 联通29元200g的流量卡| 日韩伦理黄色片| 秋霞在线观看毛片| 交换朋友夫妻互换小说| 毛片女人毛片| 国产有黄有色有爽视频| 欧美成人a在线观看| 国产伦精品一区二区三区四那| 国产成人福利小说| 观看免费一级毛片| 一区二区av电影网| 丝瓜视频免费看黄片| 精品久久久久久久久亚洲| a级毛色黄片| 亚洲精品久久久久久婷婷小说| 国产美女午夜福利| 边亲边吃奶的免费视频| 中文乱码字字幕精品一区二区三区| 国产免费福利视频在线观看| 亚洲欧美清纯卡通| 最近中文字幕2019免费版| 午夜福利视频精品| 亚洲最大成人中文| 午夜激情久久久久久久| 日本一本二区三区精品| 亚洲美女视频黄频| 国产91av在线免费观看| 身体一侧抽搐| 国产精品嫩草影院av在线观看| 99视频精品全部免费 在线| 国产精品国产三级国产av玫瑰| 亚洲国产精品国产精品| 少妇人妻 视频| 亚洲人成网站在线播| 国产一区二区三区av在线| 又爽又黄无遮挡网站| 国产精品福利在线免费观看| 国产精品一二三区在线看| 神马国产精品三级电影在线观看| 最近2019中文字幕mv第一页| 日韩一本色道免费dvd| 丝袜脚勾引网站| av网站免费在线观看视频| 久久久久网色| 永久免费av网站大全| av女优亚洲男人天堂| 欧美精品一区二区大全| 国产精品一区www在线观看| 亚洲av欧美aⅴ国产| av女优亚洲男人天堂| 日韩一本色道免费dvd| 久久精品夜色国产| av网站免费在线观看视频| 简卡轻食公司| 中文天堂在线官网| 狂野欧美白嫩少妇大欣赏| 亚洲激情五月婷婷啪啪| 少妇人妻精品综合一区二区| 亚洲av中文av极速乱| 韩国高清视频一区二区三区| 黄片无遮挡物在线观看| 超碰97精品在线观看| 男人狂女人下面高潮的视频| av免费观看日本| 国产精品伦人一区二区| av免费观看日本| 国产91av在线免费观看| 精品国产三级普通话版| 中文字幕免费在线视频6| 久久精品久久久久久噜噜老黄| 亚洲人成网站在线播| 草草在线视频免费看| 一级av片app| 日韩精品有码人妻一区| 内地一区二区视频在线| 久久久久久久久大av| 国产成人精品一,二区| 一级片'在线观看视频| 久热这里只有精品99| 一级片'在线观看视频| 80岁老熟妇乱子伦牲交| 日韩强制内射视频| 内射极品少妇av片p| 免费观看性生交大片5| 五月开心婷婷网| 97热精品久久久久久| 高清午夜精品一区二区三区| 免费观看的影片在线观看| 国内精品美女久久久久久| 下体分泌物呈黄色| 午夜福利高清视频| 麻豆精品久久久久久蜜桃| 日韩欧美精品v在线| 中文字幕制服av| 精品一区二区免费观看| 极品少妇高潮喷水抽搐| 五月玫瑰六月丁香| 国产淫语在线视频| 18禁在线播放成人免费| 久久鲁丝午夜福利片| 六月丁香七月| 三级男女做爰猛烈吃奶摸视频| 国语对白做爰xxxⅹ性视频网站| 亚洲国产高清在线一区二区三| 成年人午夜在线观看视频| 亚洲激情五月婷婷啪啪| 99热这里只有是精品在线观看| 亚洲激情五月婷婷啪啪| 2021少妇久久久久久久久久久| 成人亚洲欧美一区二区av| 成人无遮挡网站| 一个人看视频在线观看www免费| 亚洲国产欧美人成| 人体艺术视频欧美日本| 亚洲高清免费不卡视频| 亚洲电影在线观看av| 狂野欧美激情性bbbbbb| 国产极品天堂在线| 久久精品久久久久久久性| 少妇被粗大猛烈的视频| 又爽又黄a免费视频| 成人国产av品久久久| 欧美+日韩+精品| 91久久精品国产一区二区成人| 网址你懂的国产日韩在线| 国产亚洲精品久久久com| 在线观看av片永久免费下载| 久久精品夜色国产| 久久国产乱子免费精品| 久久久久久久久久久丰满| 亚洲国产欧美在线一区| 国产精品国产av在线观看| 欧美zozozo另类| 国产有黄有色有爽视频| 国产黄色视频一区二区在线观看| 午夜日本视频在线| 国产一级毛片在线| 国产精品av视频在线免费观看| 亚洲av成人精品一区久久| 国产亚洲午夜精品一区二区久久 | 国产亚洲午夜精品一区二区久久 | 在线观看国产h片| 国产毛片a区久久久久| 亚洲精品国产av成人精品| 中文天堂在线官网| 女人被狂操c到高潮| 亚洲伊人久久精品综合| 日韩视频在线欧美|