• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Data Hiding in DNA for Authentication of Plant Variety Rights

    2013-07-29 09:43:08WeiLiangTaiCharlesWangPhillipSheuandJeffreyTsai

    Wei-Liang Tai,Charles C.N.Wang,Phillip C.Y.Sheu,and Jeffrey J.P.Tsai

    1.Introduction

    Living organisms have been excluded from patent laws for over two hundred years.Living organism forms were always considered as a product of nature and not a human invention in the past.Before 1930,plant breeders who created new types of plants had no claim to the marketing rights or sales of their plants,even though they have taken a lot of time and effort to breed a new plant.The non-patentable status of plants changed with the Plant Patent Act of 1930.According to the U.S.Department of Agriculture(USDA),the Plant Patent Act was enacted in 1930 and provided,for the first time,patent protection for new and distinct varieties of asexually reproduced plants[1].Now plant breeders have a financial incentive to perform plant breeding experiments and exercise control over their discoveries.

    Although more than 68 countries protect new plant varieties by the plant breeder’s right,a few countries such as USA,European Union,Japan,and Australia do not exclude plant varieties from the patent right.The use of plant patents is becoming more and more common.In theory,molecular markers provide a method for helping to enforce plant patent rights.However,they are currently available for only a few breeders’ crop species since molecular marker libraries are expensive to develop.Furthermore,molecular markers represent a sample of the deoxyribose nucleic acid(DNA)from an organism rather than its entire genetic composition.Thus,molecular markers can easily demonstrate that two plants are different but hard to prove two plants are the same.For example,it may be difficult to find markers that differentiate a sport from the original cultivar,for the sport only differs from the original cultivar in a few genes.

    Data hiding provide another efficient way for authentication and annotation of plant patents.Digital watermarking techniques have been proposed for extensive applications,such as ownership protection,copy control,annotation,and authentication.Most past work is designed for digital images where the pixels take on a wide range of colors or brightness levels.Nowadays,there are many plants are increasingly commonly seen in our life,such as rose,phalaenopsis,and vegetables.Having the capability of hiding data in DNA can facilitate the authentication,annotation,and tracking of these plants.However,hiding data in DNA is much more difficult than in digital images.For DNA sequences,the genetic codes take values from only four bases:adenine(A),guanine(G),cytosine(C),and thymine(T),and they are drastically different in functionalities.As a result,hiding data in DNA without changing the functionalities becomes more difficult.

    Recently,hiding data in DNA becomes an interesting research topic because of biological property.In 2000,Leier et al.[2]proposed a special key sequence,called a primer,to decode an encrypted DNA sequence.They need to send a selected primer and an encrypted sequence to the receiver.Without the primers and the designated sequences,it is not possible to correctly decode the secret.Peterson[3]proposed a method to hide data in DNA sequences by substituting three consecutive bases as a character.However,there are at most 64 characters can be encoded in DNA.Further,high frequency of characters E and I can lead to the reveal of secret.

    Chang et al.[4]proposed two schemes to hide data in DNA sequences with the reversibility.The first scheme compressed the decimal formatted DNA sequence using a lossless compression method and then appended the secret message to the end of the compression stream.Finally,the bit stream was converted back to nucleotides.The second scheme used the difference-expansion(DE)based reversible data hiding technique to conceal a secret bit in two neighboring words.In 2010,Shiu et al.[5]proposed three data hiding methods based upon properties of DNA sequences.These three methods are:the insertion method,the complementary pair method,and the substitution method.

    Unfortunately,the robustness is low for some existing methods,which may result in inauthenticity and un-integrity of plant variety rights.Besides,these methods change not only the functionalities but also the original DNA sequence.Therefore,we propose a high capacity data hiding scheme for DNA without changing the functionalities of DNA sequences.This scheme adaptively varies the embedding process according to the amount of hidden data.

    To make this paper self-contained,in Section 2,we describe the concepts from DNA that will be needed for the rest of the paper.Section 3 contains a detailed exposition of the proposed algorithm.In Section 4,we experimentally investigate the relationship between the capacity & hiding performance and the influence of variant DNA on the capacity.We also compare performance with existing schemes and analyze the robustness and security issues in this section.Finally,we conclude the paper in Section 5.

    2.DNA

    Recent advances and development in biological techniques research become more and more popular.In this section,we describe the DAN to functional protein called the central dogma as shown in Fig.1.The dogma is a framework for understanding the transfer of DNA sequence information.DNA is a molecule polymer of nucleotides that are collectively called the deoxyribose nucleic acid,which controls all biological life.The ribonucleic acid(RNA)is similar to DNA in structure,but in the fact that RNA contains the sugar ribose as opposed to “deoxyribose”.DNA has hydrogen at the second carbon atom on the ring,and RNA has hydrogen linked through an oxygen atom.

    Fig.1.Central dogma of molecular biology.

    In DNA and RNA,there are four nucleotide bases.Three of these bases are the same:A,G,and C.The fourth base for DNA is T,whereas in RNA,the fourth base lacks a methyl group and is called uracil(U).Each base has two points at which it can join covalently to two other bases on either end,forming a linear chain of monomers.

    In general,RNA copies of DNA are made by a process known as “transcription”.Transcription is the conversion of information from DNA to RNA and is straightforward because of the direct correspondence between the four nucleotide bases of DNA and those of RNA.For most purposes,RNA can be regarded as the working copy of the DNA master template.There is usually one or a very small number of examples of DNA in the cell,whereas there are multiple copies of the transcribed RNA.The transcript RNA(tRNA)is referred to message RNA(mRNA)by discarding the intervening sequence of RNA.

    In the protein-coding region of mRNA,three successive nucleotide bases,called triplets or codons,are used to code for each individual amino acid.Three bases are needed because there are 20 different types of amino acids shown in Table 1 but only four nucleotide bases:with one base there are four possible combinations; with two,16(42);with three,64(43),which is more than the number of amino acids.

    The RNA transcription is used by a complex molecular machine called the ribosome to translate the order of successive codons into the corresponding order of amino acids.Special “stop” codons,such as UAA,UAG,and UGA,induce the ribosome to terminate the elongation of the polypeptide chain at a particular point.Similarly,the codon for the amino acid methionine is often used as the start signal for translation.

    For plant variety rights,in the US the Plant Patent Act of 1930 initially allowed seed developers to take out patents on seeds they had developed by artificial selection.Now,the Act extends to the patenting of genetically modified(GM)crops by large multinational companies.It has succeeded in implementing similar patent laws in other countries.

    Genetically modified crops have been around for over 20 years and have met with variable successes across the globe.Essentially,genetic modification involves inserting a section of DNA carrying a desirable gene of one species into the DNA of another.In crop plants,some of the beneficial features are achieved by using this method,including insect resistance,herbicide resistance(bar[6],aroA[7],bxn[8],sul,and tfdA[9]),nutritional value(OsNAS1,OsNAS2,and OsNAS3[10]),pest resistance,allergy resistance,higher yields,longer shelf life,and improved flavour.Therefore,in order to avoid altering DNA functionally,we propose a watermarking scheme based on mRNA sequences for copyright protection.

    3.Proposed Scheme

    An ideal watermarking system protects the data without altering it functionally.However,how can change DNA and still make the protein product come out the same? The only way is redundancy.Thus,we use the codon redundancy to hide data in mRNA sequence.A mRNA sequence is 3 bases long.There are 4 possible bases,U,C,A,and G.Clearly,64 unique codes can be generated.However,only 20 amino acids are encoded.There is redundancy in the mRNA to amino acid mapping.The redundancy can be used to hide data into the sequence without altering its function or length.

    As shown in Table 1,there can be sets of 1,2,3,4 or 6 codons representing the same amino acid.Thus,we first take a binary secret sequence and convert it to a decimal number.Then we take the amino acid sequence that would be generated by the original mRNA,and generate a list of all possible codons that lead to the same sequence.The number of codon combinations for each amino acid is used to hide data.Having explained our background logic,we now outline the principle of the proposed data hiding algorithm.

    3.1 Embedding Process

    Input:a mRNA sequence with four possible bases,U,C,A,G,and a secret bit stream S={s1,s2,··,sn} where si∈{0,1} and 1≤i≤n.

    Output:a watermarked mRNA sequence W={W'1,W'2,··,W'n} with the secret message S hidden.

    Step 1.Translate the mRNA sequence into the amino acid sequence A={A1,A2,··,Am},which represents where Aiis a mRNA codon.

    Step 2.Transform the secret bit stream to an unsigned integer B:

    Step 3.Generate P={P1,P2,··,Pm} where Piis the number of codon combinations for each amino acid Aiin the sequence.

    Step 4.Calculate the number T of all possible assignments for the input mRNA sequence based on the codon combinations until T>B:

    where 1≤k≤m.

    Step 5.According to the value of B,find the corresponding assignment of codons W'ifor all amino acids Ai,1≤i≤k,and output their codons:

    Note that the number k should be used as a secret key for secure transmission.To show how this works,we take a sample message and embed it into a short sequence.Assume that the secret bit stream S={10011011} and the given mRNA sequence is “GCG CAG UUA GUA”.We first translate the mRNA sequence into the amino acid sequence A={Ala,Gln,Leu,Val}.The secret bit stream is transformed to an unsigned integer B=155.Then,we generate the number of codon combinations for each amino acid Aiin the sequence,P={4,2,6,4}.As shown in Step 4,we can obtain the number T=192 and k=4.Finally,as illustrated in Fig.2,we find the corresponding assignment of codons for all amino acids Ai,1≤i≤k,and output their codons.

    Table 1:Genetic code

    Fig.2.Embedding example.

    This process has generated the new mRNA sequence“GCU CAA CUC GUU”.Therefore,following the highlighted path we get “GCU CAA CUC GUU”,which codes for the same amino acid sequence as the original mRNA,and also contains the hidden watermark.Note that there is adequate space to encrypt and embed a strong and repetitive watermark into living sequences since they consist of many thousands of base pairs.As a result,we use this technique in a retrovirus vector,that is,the message will transfer through the reverse transcription pathway and will be embedded in the DNA of the target cell in a complementary form.

    3.2 Extraction Process

    Input:a watermarked mRNA sequence and number k.

    Output:secret message S.

    Step 1.Calculate the series number B from the selected k codons.

    Step 2.Transform the unsigned integer B to the secret bit stream si=(B/2n-i)mod 2,and output the bit stream.

    The DNA sequence is deemed authentic only if the embedded authentication code matches the extracted information.

    4.Experimental Results

    To obtain a better understanding of how different host DNA sequences affect the performance of the proposed watermarking scheme,we present some results in a table form.All experiments were performed with eight significantly used genes:bar,aroA,BXN,sul,TfdA,OsNAS1,OsNAS2,and,OsNAS3,as shown in Table 2.These genes are commonly used for genetic modification in crop plants.Some of the beneficial features include insect resistance,herbicide resistance(bar[6],aroA[7],bxn[8],sul,and tfdA[9]),nutritional value(OsNAS1,OsNAS2,and OsNAS3[10]),pest resistance,allergy resistance,higher yields,longer shelf life,and improved flavour.The investment plants should be protected from any other acts that may be prescribed by the provisions of the Plant Varieties Act 1997.

    Table 2:Eight test DNA sequences

    Table 3:Hiding performance of the proposed scheme

    4.1 Capacity versus Distortion Performance

    Table 3 gives an example of how different DNA sequences influence the payload Cap and the hiding performance bpn(bit per nucleotide),which is defined as

    The real capacity that can be achieved depends on the nature of the DNA sequence itself.We notice that the average hiding performance is bpn=0.57.As a result,different DNA sequences do not influence the hiding performance.Our proposed scheme provides a stable hiding performance for authentication of plant variety rights.

    4.2 Comparison with Other Schemes

    Table 4 compares the hiding performance delivered by the proposed scheme and other existing schemes[4],[5].Note that the proposed scheme does not change the functionalities of DNA sequences,whereas schemes in [4]and [5]destroyed DNA sequences,which induces morphological changes in biological patterns.As Table 4 shows,the insertion method in [5]derived better performance.However,they did not preserve original characteristics of living organisms,which is unable to protect the copyright due to the functionalities change of genes.The evaluation results show that the proposed scheme achieves relatively high hiding performance than existing schemes.Further,our proposed scheme preserves the functionalities of genes,which ensure the copyright protection.

    Table 4:Performance comparison with schemes[4],[5]

    Fig.3.More robust variation in embedding process.

    4.3 Robustness and Security

    Security issues need to be handled by top layers in authentication applications.The major objective of an adversary is to forge authentication data so that an altered DNA can still pass authentication tests.Hence,it is important to study the following two problems for authentication applications:1)the probability of making DNA alterations while preserving the m-bit embedded authentication data,and 2)the possibility for an adversary to hide specific data in a DNA sequence.

    In the mRNA sequence,there are 64 unique codes that can be generated in which there can be sets of 1,2,3,4 or 6 codons representing the same amino acid.In the proposed scheme,if a single codon is changed,the probability of getting a correctly decoded bit is

    For the first issue,if the altered codons number is large,the probability of getting the decoded data to be exactly the same as the originally embedded one is approximately 2-3m,where m is the embedded payload size,which is very small as long as m is large.Therefore,the threat of making DNA alterations while preserving the m-bit embedded authentication data is very low.

    The second issue depends on whether adversaries can derive information regarding the correspondence of codons and the carried bit by studying the difference between those copies,hence creating a new DNA sequence embedded with data when they will.Hence,assuming adversaries collect sufficient copies and know what data is embedded in each copy,they will be able to identify the correspondence of codons and the carried bit,and to hide their desired data by manipulating the corresponding codons.To prevent the above mentioned attack,we have to introduce more uncertainty.A good solution for dealing with this is to arrange the nucleotide randomly by using a secret key.As shown in Fig.3,instead of starting from the first codon chosen alphabetically as presented earlier,we can randomly number the codon before the watermark.This would result in a completely different sequence,but the information conveyed would be the same.This step keeps the process unambiguous,and at the same time ensures that it is difficult for an adversary to identify the congruent relationships of codons and the carried bits.

    5.Conclusions

    Hiding data in DNA can be applied to protecting the intellectual property in the gene therapy,transgenic crops,tissue cloning,and DNA computing.Data can also be hidden to verify the integrity of DNA sequences,authentication,and annotation for copyrights.Nowadays,molecular markers provide a method for helping to enforce copyrights.However,molecular markers can easily demonstrate that two plants are different but hard to prove two plants are the same.Therefore,we propose a watermarking scheme for authentication of DNA rights.To avoid changing the functionalities of genes,we embed data in the mRNA sequence by exploring the codon redundancy.We also address the robust and security issues and offer several additional steps to strengthen the watermark.As a result,the proposed scheme can actually be used to embed data directly into active genetic segments for copyright protection.In the other direction,one can generate an appropriate DNA sequence,when transcribed,which can create the mRNA strand with the embedded message.The practical usefulness of such a technique can be enormous.

    [1]J.Chen,“The parable of the seeds:interpreting the plant variety protection act in furtherance of innovation policy,”Notre Dame Law Review,vol.81,no.4,pp.105-166,2006.

    [2]A.Leier,C.Richter,W.Banzhaf,and H.Rauhe,“Cryptography with DNA binary strands,” BioSystems,vol.57,no.1,pp.13-22,2000.

    [3]I.Peterson.Hiding in DNA.[Online].Available:http://www.maa.org/mathland/mathtrek_4_10_00.html

    [4]C.-C.Chang,T.-C.Lu,Y.-F.Chang,and R.C.T.Lee,“Reversible data hiding schemes for deoxyribonucleic acid(DNA)medium,” Int.Journal of Innovative Computing,Information and Control,vol.3,no.5,pp.1-16,Oct.2007.

    [5]H.-J.Shiu,K.-L.Ng,J.-F.Fang,R.C.T.Lee,and C.-H.Huang,“Data hiding methods based upon DNA sequences,”Information Sciences,vol.180,no.11,pp.2196-2208,Jun.2010.

    [6]K.S.Rathore,V.K.Chowdhury,and T.K.Hodges,“Use of bar as a selectable marker gene and for the production of herbicide-resistant rice plants from protoplasts,” Plant Molecular Biology,vol.21,no.5,pp.871-884,Mar.1993.

    [7]L.Comai,L.C.Sen,and D.M.Stalker,“An altered aroA gene product confers resistance to the herbicide glyphosate,”Science,vol.221,no.4608,pp.370-371,Jul.1983.

    [8]D.M.Stalker,K.E.McBride,and L.D.Malyj,“Herbicide resistance in transgenic plants expressing a bacterial detoxification gene,” Science,vol.242,no.4877,pp.419-423,Oct.1988.

    [9]J.F.Rice,F.M.Menn,A.G.Hay,J.Sanseverino,and G.S.Sayler,“Natural selection for 2,4,5-trichlorophenoxyacetic acid mineralizing bacteria in agent orange contaminated soil,” Biodegradation,vol.16,no.6,pp.501-512,Dec.2005.

    [10]H.Inoue,K.Higuchi,M.Takahashi,H.Nakanishi,S.Mori,and H.K.Nishizawa,“Three rice nicotianamine synthase genes,OsNAS1,OsNAS2,and OsNAS3 are expressed in cells involved in long-distance transport of iron and differentially regulated by iron,” Plant Journal,vol.36,no.3,pp.366-381,Nov.2003.

    一级毛片aaaaaa免费看小| 美女主播在线视频| 国产综合懂色| 男人爽女人下面视频在线观看| 91午夜精品亚洲一区二区三区| videos熟女内射| 观看美女的网站| 日韩欧美 国产精品| 男女那种视频在线观看| 啦啦啦中文免费视频观看日本| 日韩人妻高清精品专区| 精品人妻一区二区三区麻豆| 一区二区av电影网| 欧美人与善性xxx| 亚洲欧美日韩另类电影网站 | 看非洲黑人一级黄片| 看黄色毛片网站| 国产精品久久久久久精品电影小说 | 免费av毛片视频| 亚洲av中文字字幕乱码综合| 69人妻影院| 亚洲自拍偷在线| 国产在线男女| 国产亚洲av嫩草精品影院| 久久人人爽人人爽人人片va| 九草在线视频观看| 麻豆精品久久久久久蜜桃| 久久人人爽人人爽人人片va| 欧美三级亚洲精品| 久久精品国产a三级三级三级| 亚洲最大成人av| 国产乱人视频| 精品视频人人做人人爽| 久久韩国三级中文字幕| 国产精品一区二区在线观看99| 欧美日韩亚洲高清精品| 日本爱情动作片www.在线观看| .国产精品久久| 中文字幕免费在线视频6| 日韩成人av中文字幕在线观看| 深夜a级毛片| 欧美老熟妇乱子伦牲交| 久久人人爽人人片av| 哪个播放器可以免费观看大片| 日日摸夜夜添夜夜添av毛片| 一本一本综合久久| 中文精品一卡2卡3卡4更新| 国产av码专区亚洲av| 高清在线视频一区二区三区| 亚洲四区av| 亚洲国产av新网站| 你懂的网址亚洲精品在线观看| 中文在线观看免费www的网站| 免费观看的影片在线观看| 插阴视频在线观看视频| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 国产片特级美女逼逼视频| 午夜福利在线在线| 久久亚洲国产成人精品v| 禁无遮挡网站| 大片电影免费在线观看免费| 亚洲av欧美aⅴ国产| 欧美一级a爱片免费观看看| 国产精品久久久久久av不卡| 亚洲欧美成人综合另类久久久| 亚洲人成网站在线观看播放| 97精品久久久久久久久久精品| 97在线视频观看| 18+在线观看网站| 国精品久久久久久国模美| 不卡视频在线观看欧美| 在线观看美女被高潮喷水网站| 九草在线视频观看| 久久久色成人| 九九久久精品国产亚洲av麻豆| 日日啪夜夜爽| 春色校园在线视频观看| 日本与韩国留学比较| 蜜桃亚洲精品一区二区三区| 欧美精品国产亚洲| 中国美白少妇内射xxxbb| 一区二区三区四区激情视频| 亚洲怡红院男人天堂| 国产永久视频网站| 九草在线视频观看| 99久久人妻综合| 天天躁日日操中文字幕| 成人国产av品久久久| 欧美日韩国产mv在线观看视频 | 天堂网av新在线| 狂野欧美白嫩少妇大欣赏| 欧美成人一区二区免费高清观看| 综合色av麻豆| 亚洲怡红院男人天堂| 日韩av不卡免费在线播放| 国产老妇女一区| 国产伦在线观看视频一区| 国产探花在线观看一区二区| 少妇 在线观看| 69人妻影院| 麻豆国产97在线/欧美| 国产精品福利在线免费观看| 三级男女做爰猛烈吃奶摸视频| 人妻 亚洲 视频| 中文字幕制服av| 美女cb高潮喷水在线观看| av在线天堂中文字幕| 国产男人的电影天堂91| 国产精品久久久久久久电影| 欧美3d第一页| 观看美女的网站| 26uuu在线亚洲综合色| 大又大粗又爽又黄少妇毛片口| 国产精品嫩草影院av在线观看| 亚洲精品日韩av片在线观看| 99视频精品全部免费 在线| 亚洲在线观看片| 久久99热6这里只有精品| 国产淫片久久久久久久久| 777米奇影视久久| 日韩一本色道免费dvd| 波多野结衣巨乳人妻| 欧美 日韩 精品 国产| 国语对白做爰xxxⅹ性视频网站| 夫妻午夜视频| 汤姆久久久久久久影院中文字幕| 亚洲最大成人中文| 亚洲av不卡在线观看| 日韩免费高清中文字幕av| 2018国产大陆天天弄谢| 国产精品无大码| 久久久久久久久久久免费av| 最近最新中文字幕大全电影3| 国产成人aa在线观看| 欧美性感艳星| 午夜福利在线在线| 欧美激情久久久久久爽电影| 欧美97在线视频| 亚洲成人久久爱视频| av又黄又爽大尺度在线免费看| 九九在线视频观看精品| 中文字幕免费在线视频6| 精品人妻熟女av久视频| 亚洲精品久久午夜乱码| 亚洲av男天堂| 国产亚洲5aaaaa淫片| 国产精品一区二区在线观看99| 国产欧美日韩精品一区二区| 国产69精品久久久久777片| 日韩一区二区三区影片| 国产亚洲午夜精品一区二区久久 | 亚洲天堂av无毛| 国产午夜精品久久久久久一区二区三区| 91aial.com中文字幕在线观看| 免费观看a级毛片全部| 亚洲怡红院男人天堂| 爱豆传媒免费全集在线观看| 精品一区在线观看国产| 国产国拍精品亚洲av在线观看| 精品久久久久久电影网| 国产爱豆传媒在线观看| 国产白丝娇喘喷水9色精品| 伊人久久国产一区二区| 久热久热在线精品观看| 亚洲国产成人一精品久久久| 男人狂女人下面高潮的视频| 一级黄片播放器| 最近2019中文字幕mv第一页| 精品一区二区三区视频在线| 日韩欧美一区视频在线观看 | 国产黄频视频在线观看| av在线蜜桃| 欧美三级亚洲精品| 最近中文字幕2019免费版| 国产av码专区亚洲av| 网址你懂的国产日韩在线| 久久久久久久久久成人| 国产高清三级在线| 91精品国产九色| 国产成人aa在线观看| 久久精品久久精品一区二区三区| 一级片'在线观看视频| 国产精品久久久久久精品电影| 深夜a级毛片| 精品熟女少妇av免费看| 天天躁夜夜躁狠狠久久av| 边亲边吃奶的免费视频| 欧美精品一区二区大全| 人妻夜夜爽99麻豆av| 精品人妻偷拍中文字幕| 午夜福利网站1000一区二区三区| 久久久久久久久久人人人人人人| 日本熟妇午夜| 中文字幕人妻熟人妻熟丝袜美| 国产美女午夜福利| 国产精品嫩草影院av在线观看| 王馨瑶露胸无遮挡在线观看| 中文精品一卡2卡3卡4更新| 美女国产视频在线观看| 最近最新中文字幕免费大全7| 深夜a级毛片| 一级毛片黄色毛片免费观看视频| 亚洲,欧美,日韩| 97在线人人人人妻| 晚上一个人看的免费电影| 亚洲美女搞黄在线观看| 久久人人爽人人片av| 国产在视频线精品| 能在线免费看毛片的网站| 国产在视频线精品| 99九九线精品视频在线观看视频| 国产精品爽爽va在线观看网站| 嫩草影院精品99| 色播亚洲综合网| 大香蕉97超碰在线| 人妻少妇偷人精品九色| 亚洲欧美一区二区三区国产| 国产精品久久久久久久久免| 国产久久久一区二区三区| 国产 一区 欧美 日韩| 在线观看一区二区三区激情| 可以在线观看毛片的网站| 精品少妇黑人巨大在线播放| 国产成人a区在线观看| 别揉我奶头 嗯啊视频| 午夜精品国产一区二区电影 | 日韩制服骚丝袜av| 哪个播放器可以免费观看大片| 少妇人妻一区二区三区视频| 欧美日韩一区二区视频在线观看视频在线 | 日本熟妇午夜| 国产精品久久久久久精品电影小说 | 91精品一卡2卡3卡4卡| 国产黄色视频一区二区在线观看| 视频中文字幕在线观看| 黄片无遮挡物在线观看| 日本-黄色视频高清免费观看| 亚洲人成网站在线播| 午夜亚洲福利在线播放| 亚洲av男天堂| 99精国产麻豆久久婷婷| 国产成人精品一,二区| 国模一区二区三区四区视频| 最新中文字幕久久久久| 欧美日韩综合久久久久久| 欧美人与善性xxx| 免费看光身美女| 九草在线视频观看| 久久女婷五月综合色啪小说 | 男女那种视频在线观看| 观看免费一级毛片| 亚洲人成网站高清观看| 大话2 男鬼变身卡| 天天一区二区日本电影三级| 特级一级黄色大片| 夜夜爽夜夜爽视频| 青春草视频在线免费观看| 赤兔流量卡办理| 精品一区二区三卡| 精品久久久久久电影网| 伊人久久精品亚洲午夜| 国产成人午夜福利电影在线观看| 不卡视频在线观看欧美| 色网站视频免费| av福利片在线观看| 三级经典国产精品| 97人妻精品一区二区三区麻豆| 日本wwww免费看| 中国国产av一级| 欧美xxxx性猛交bbbb| 80岁老熟妇乱子伦牲交| 免费观看在线日韩| 自拍偷自拍亚洲精品老妇| 亚洲av成人精品一二三区| 亚洲自偷自拍三级| 免费大片18禁| 国产在视频线精品| 在线亚洲精品国产二区图片欧美 | 中文乱码字字幕精品一区二区三区| 一级毛片久久久久久久久女| 亚州av有码| 亚洲一级一片aⅴ在线观看| www.色视频.com| 日韩av在线免费看完整版不卡| 国产有黄有色有爽视频| 五月开心婷婷网| 九草在线视频观看| 成年版毛片免费区| 国产成人精品久久久久久| 免费观看av网站的网址| 国产成人精品久久久久久| 在线观看av片永久免费下载| 亚洲电影在线观看av| 国产老妇女一区| 少妇的逼水好多| 亚洲天堂国产精品一区在线| 欧美 日韩 精品 国产| 少妇熟女欧美另类| 久久久色成人| 日韩欧美精品免费久久| 黄色怎么调成土黄色| 精品少妇久久久久久888优播| 嫩草影院新地址| 午夜福利视频精品| 日本黄色片子视频| 国产精品不卡视频一区二区| 两个人的视频大全免费| av播播在线观看一区| 国产精品av视频在线免费观看| 91久久精品国产一区二区三区| 久久久久久久精品精品| 一级毛片我不卡| 下体分泌物呈黄色| 精品亚洲乱码少妇综合久久| 久久久久久久久久成人| 中文字幕av成人在线电影| 哪个播放器可以免费观看大片| 欧美国产精品一级二级三级 | av网站免费在线观看视频| 在线观看三级黄色| 成年人午夜在线观看视频| 亚洲人成网站高清观看| 亚洲精品aⅴ在线观看| 国产av不卡久久| 国产亚洲精品久久久com| 国产成人a区在线观看| 中国美白少妇内射xxxbb| 成人毛片a级毛片在线播放| 免费av毛片视频| 久久久久久久精品精品| 日本黄大片高清| 国产成年人精品一区二区| 一本一本综合久久| videos熟女内射| 黄色日韩在线| 哪个播放器可以免费观看大片| 九色成人免费人妻av| 亚洲婷婷狠狠爱综合网| 精品99又大又爽又粗少妇毛片| 日本黄大片高清| 在线观看三级黄色| 久久午夜福利片| 成年av动漫网址| 色综合色国产| 国产极品天堂在线| 在线观看国产h片| 啦啦啦啦在线视频资源| 中文字幕久久专区| 不卡视频在线观看欧美| 亚洲av欧美aⅴ国产| 一本色道久久久久久精品综合| 美女内射精品一级片tv| 精品99又大又爽又粗少妇毛片| 国产精品99久久久久久久久| 亚洲精品自拍成人| 激情五月婷婷亚洲| 欧美xxxx性猛交bbbb| 日韩欧美一区视频在线观看 | 国产精品久久久久久精品古装| 亚洲精华国产精华液的使用体验| 成人毛片a级毛片在线播放| 日日撸夜夜添| 丰满少妇做爰视频| av在线app专区| 国产男女超爽视频在线观看| 97人妻精品一区二区三区麻豆| 日本av手机在线免费观看| 五月天丁香电影| 午夜激情福利司机影院| 国产精品久久久久久精品古装| 九九爱精品视频在线观看| 国产免费又黄又爽又色| 小蜜桃在线观看免费完整版高清| 99re6热这里在线精品视频| 黄色日韩在线| 国产成人精品久久久久久| 日日啪夜夜撸| 精品国产乱码久久久久久小说| 99久久中文字幕三级久久日本| 午夜激情久久久久久久| 欧美另类一区| 嫩草影院精品99| 嫩草影院入口| 国产人妻一区二区三区在| 成人欧美大片| 久久精品人妻少妇| 欧美性猛交╳xxx乱大交人| 国产亚洲一区二区精品| 国产精品99久久久久久久久| 久久精品国产自在天天线| 亚洲,一卡二卡三卡| 国产一级毛片在线| 伦理电影大哥的女人| 搡女人真爽免费视频火全软件| 毛片女人毛片| 另类亚洲欧美激情| 亚洲欧美日韩无卡精品| 一区二区三区免费毛片| 国产伦精品一区二区三区四那| 2021天堂中文幕一二区在线观| 国产黄片视频在线免费观看| 久久久久久久国产电影| 大陆偷拍与自拍| 国产亚洲午夜精品一区二区久久 | 亚洲av欧美aⅴ国产| av在线天堂中文字幕| 午夜精品国产一区二区电影 | 国产精品一区二区在线观看99| 我的女老师完整版在线观看| 在线免费观看不下载黄p国产| 不卡视频在线观看欧美| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 熟妇人妻不卡中文字幕| 汤姆久久久久久久影院中文字幕| 成人无遮挡网站| 国产高清三级在线| 国产高潮美女av| 日本爱情动作片www.在线观看| 精品亚洲乱码少妇综合久久| 国产精品无大码| 男人爽女人下面视频在线观看| av在线亚洲专区| 亚洲国产精品专区欧美| 下体分泌物呈黄色| 国产一区二区三区综合在线观看 | 女的被弄到高潮叫床怎么办| 黄色一级大片看看| 国产精品av视频在线免费观看| 精品久久久精品久久久| 人人妻人人看人人澡| 亚洲av男天堂| 美女高潮的动态| 你懂的网址亚洲精品在线观看| 夫妻午夜视频| 国产综合懂色| 在线观看一区二区三区| 乱系列少妇在线播放| 黄色日韩在线| 精品一区在线观看国产| av黄色大香蕉| 日韩欧美 国产精品| 久久精品久久精品一区二区三区| 亚洲av中文字字幕乱码综合| 日韩精品有码人妻一区| 欧美成人a在线观看| 国语对白做爰xxxⅹ性视频网站| 大又大粗又爽又黄少妇毛片口| 男女啪啪激烈高潮av片| 黄色怎么调成土黄色| 免费黄频网站在线观看国产| 亚洲激情五月婷婷啪啪| 久久久久网色| 欧美区成人在线视频| a级毛片免费高清观看在线播放| 亚洲精品成人av观看孕妇| av天堂中文字幕网| a级毛片免费高清观看在线播放| 国产爽快片一区二区三区| 全区人妻精品视频| 18禁在线播放成人免费| 联通29元200g的流量卡| 欧美bdsm另类| 国产亚洲av嫩草精品影院| 黄色一级大片看看| 噜噜噜噜噜久久久久久91| 极品少妇高潮喷水抽搐| 国产午夜精品久久久久久一区二区三区| 亚洲精品国产av成人精品| 国产伦在线观看视频一区| 自拍欧美九色日韩亚洲蝌蚪91 | 免费观看的影片在线观看| 国产毛片在线视频| 亚洲国产欧美在线一区| 午夜精品国产一区二区电影 | 黑人高潮一二区| 精品99又大又爽又粗少妇毛片| 亚洲一区二区三区欧美精品 | 三级经典国产精品| 亚洲精品国产色婷婷电影| 午夜精品一区二区三区免费看| 在线观看一区二区三区| 久久精品国产亚洲网站| 日韩欧美 国产精品| 精品久久久久久久末码| 久久久久国产网址| 国产午夜精品久久久久久一区二区三区| 久久精品久久精品一区二区三区| 国产综合懂色| 91午夜精品亚洲一区二区三区| 禁无遮挡网站| 日韩一区二区视频免费看| 国产精品成人在线| 精品久久久精品久久久| 久久久a久久爽久久v久久| 男女边摸边吃奶| 国产在视频线精品| 国产伦在线观看视频一区| 2018国产大陆天天弄谢| 中文字幕免费在线视频6| 汤姆久久久久久久影院中文字幕| 日韩免费高清中文字幕av| 色5月婷婷丁香| 久久人人爽人人爽人人片va| 国产日韩欧美亚洲二区| 国产真实伦视频高清在线观看| 亚洲成人久久爱视频| 夫妻性生交免费视频一级片| 日本爱情动作片www.在线观看| 人人妻人人看人人澡| 久久久成人免费电影| 国产 精品1| 成年女人看的毛片在线观看| 国产成人a∨麻豆精品| 日本熟妇午夜| 久久久久久国产a免费观看| 久久久a久久爽久久v久久| 国产精品无大码| 在线免费观看不下载黄p国产| 欧美日韩一区二区视频在线观看视频在线 | 精品国产乱码久久久久久小说| 99热这里只有是精品在线观看| 成人毛片a级毛片在线播放| 男插女下体视频免费在线播放| 波野结衣二区三区在线| 综合色丁香网| 欧美97在线视频| 一本色道久久久久久精品综合| 亚洲av在线观看美女高潮| 在线观看av片永久免费下载| 美女内射精品一级片tv| 亚洲国产精品999| 狂野欧美激情性xxxx在线观看| 亚洲在线观看片| 亚洲av男天堂| 丝瓜视频免费看黄片| 亚洲熟女精品中文字幕| 国产精品国产三级国产专区5o| 91久久精品电影网| 国产人妻一区二区三区在| 久久久久久九九精品二区国产| 丝袜脚勾引网站| 我的老师免费观看完整版| 亚洲综合精品二区| 欧美日韩综合久久久久久| 欧美成人a在线观看| 亚洲av二区三区四区| 精品久久久久久久末码| 女人久久www免费人成看片| 欧美zozozo另类| 久久久久国产网址| 一区二区三区四区激情视频| 欧美人与善性xxx| 天美传媒精品一区二区| 国产伦理片在线播放av一区| 男女国产视频网站| 亚洲人成网站在线观看播放| 亚洲精品国产色婷婷电影| 麻豆成人av视频| 日本爱情动作片www.在线观看| 看黄色毛片网站| 国产av不卡久久| 男女无遮挡免费网站观看| 国产男人的电影天堂91| av在线app专区| www.色视频.com| 亚洲精品国产av蜜桃| 亚洲精品成人久久久久久| 成人鲁丝片一二三区免费| 91aial.com中文字幕在线观看| 久久精品夜色国产| 22中文网久久字幕| 狂野欧美激情性bbbbbb| 男女啪啪激烈高潮av片| 少妇人妻精品综合一区二区| 亚洲精品自拍成人| 韩国高清视频一区二区三区| 亚洲精品日韩av片在线观看| 国产在线一区二区三区精| 亚洲av.av天堂| 真实男女啪啪啪动态图| 大片电影免费在线观看免费| 成人一区二区视频在线观看| 亚洲精品国产色婷婷电影| 尾随美女入室| 欧美激情在线99| 免费av不卡在线播放| 欧美xxxx黑人xx丫x性爽| 日本免费在线观看一区| 99久国产av精品国产电影| 亚洲电影在线观看av| 2021少妇久久久久久久久久久| 国产精品久久久久久久电影| 久久久久九九精品影院| 精品国产露脸久久av麻豆| 日韩免费高清中文字幕av| 国内少妇人妻偷人精品xxx网站| 日韩亚洲欧美综合| 亚洲av日韩在线播放| 99久国产av精品国产电影| 大话2 男鬼变身卡| 老司机影院成人| 三级国产精品欧美在线观看| 热99国产精品久久久久久7| av在线蜜桃| 亚洲成人久久爱视频| 午夜福利在线在线| 免费看av在线观看网站| 免费高清在线观看视频在线观看| 免费在线观看成人毛片| 亚洲熟女精品中文字幕| 丝瓜视频免费看黄片| 又大又黄又爽视频免费| 乱码一卡2卡4卡精品| 在线观看一区二区三区| 精品99又大又爽又粗少妇毛片|