• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Novel(n,n)Secret Image Sharing Scheme Based on Sudoku

    2013-07-29 09:42:20ZhiHuiWangChengGuoandChinChenChang

    Zhi-Hui Wang,Cheng Guo,and Chin-Chen Chang

    1.Introduction

    A secret sharing scheme is a technique to share secret data among a group of participants.It is mainly used to protect secret information from being lost,destroyed,or modified.In 1979,the first(t,n)threshold secret sharing schemes,based on Lagrange interpolating and linear project geometry,were proposed by Shamir[1]and Blakley[2],respectively.In the(t,n)threshold schemes,at least t honest participants can reconstruct the shared secret,but(t-1)or fewer participants can obtain nothing about the secret.

    With the rapid development of computer networking and digital multi-media technology,transmitting digital images over the Internet has become convenient and popular.However,some important images,such as military maps,medical images,and commercial images,must be kept secret.But the Internet is an open environment,which means that it is vulnerable to a variety of attacks.For example,the transmitted image can be tampered or stolen.

    Recently,many image-protection techniques,such as data hiding and data encryption,have been developed.It is well known that the secret-sharing mechanism has been applied extensively to protect secret data.The purpose of secret sharing is to recover the important information when some shadows are lost or tampered by a malicious attacker.Therefore,the secret-sharing technique can be utilized to design a mechanism to protect important images.

    In 1995,Naor and Shamir[3]designed a visual,secret-sharing mechanism called visual cryptography(VC).In their scheme,the shadow data can be photocopied on transparencies,and the secret image can be decoded visually through the human visual system only by stacking a sufficient number of transparencies.The interested reader can find more on visual cryptography in [4]–[8].However,the shadow images consist of many noisy,black dots,and they are meaningless.In 2003,Thien and Lin[9]utilized the Lagrange-interpolating,polynomial-based,Shamir’s secretsharing scheme to embed the secret image into a cover image.The generated shadow images are meaningful,and the distortion between the shadow image and the cover image is imperceptible.In 2004,Lin and Tsai[10]proposed a new secret image sharing scheme in which the shared bits and the authentication bit are embedded in a four-pixel block.Lin and Tsai’s scheme combined steganography and authentication features.In 2007,Yang,Chen,Yu,and Wang[11]presented an improved secret sharing scheme for images that improved the ability to authenticate the shadow images and improved the quality of the shadow images compared to that of Lin and Tsai’s scheme.In 2008,Chang,Hsieh,and Lin[12]also proposed a novel secret image sharing scheme combining steganography and authentication based on the Chinese remainder theorem(CRT).Their scheme improved the ability to authenticate the shadow images and enhanced their visual quality.In 2009,Lin,Lee,and Chang[13]proposed a new secret image sharing scheme that utilized the modulus operator to embed the secret image into a cover image.In their scheme,the secret image can be reconstructed losslessly,and the cover image also can be recovered without distortion.Their method can be used for calligraphy images,which often lead to underflow or overflow in image processing.In 2010,Lin and Chan[14]proposed an invertible secret image sharing scheme.They were able to retrieve the lossless secret image and reverse the shadow image to the cover image without distortion.And,their scheme achieved an excellent combination of embedding capacity and quality of the shadow images.Secret image sharing has been studied further in recent research[15]–[18].

    In 2010,Chang,Lin,Wang,and Li[19]proposed a Sudoku-based secret image sharing scheme.Their scheme utilized the concept of Sudoku and Shamir’s secret sharing scheme to embed the secret image into the cover image for the purpose of generating shadow images.In their scheme,the secret image can be retrieved without distortion,and the cover image also can be recovered losslessly.Their proposed reversible secret image sharing scheme offered a large embedding capacity compared with related camouflage image sharing schemes.Furthermore,due to the fact that the camouflaged pixel pair ranged within the Sudoku block,i.e.,the pixel values are limited in the grayscale boundary,their scheme solved the overflow and underflow problem effectively.

    In this paper,we propose a novel Sudoku-based(n,n)secret image sharing scheme with high quality shadow images and large embedding capacity.In the proposed scheme,(n,n)secret image sharing works by deriving n shadow images from the secret image and the n cover images by using a sharing method in which the n cover images can be different.Given n shadow images,the secret image can be reconstructed losslessly.And,n-1 or fewer shadow images cannot cooperate to obtain any information about the secret image.The key features of our proposed secret image sharing scheme are summarized below.

    1)The secret image can be reconstructed without distortion.

    2)The embedding capacity is large.

    3)The shadow images are meaningful,and the visual quality of the shadow images is satisfactory.

    4)The secret image can be embedded into different cover images for the purpose of generating different meaningful shadow images.

    5)The proposed scheme can solve the overflow and underflow problem.

    The rest of the paper is organized as follows.In Section 2,the basic definition of Sudoku is introduced.The proposed scheme is presented in Section 3.Section 4 presents some experimental results and discussion.Our conclusions are presented in Section 5.

    2.Preliminary

    In this section,we briefly introduce the definition of Sudoku,which is the major building block of our proposed scheme.

    Sudoku is a logic-based number placement puzzle,which is most frequently a 9×9 grid that is made up of 3×3 sub-grids called “regions” or “blocks.” Some cells already contain numbers,known as “givens.” The goal is to place one number in each of the empty cells so that every column,row,and region contain the digits from 1 to 9 exactly once.Fig.1 shows an example of Sudoku from Wikipedia.Fig.1(a)is an original Sudoku grid in which some elements have been assigned by digits within 1 to 9,and Fig.1(b)is one of the Sudoku solutions of Fig.1(a).

    The Sudoku puzzle was invented by Garns in 1979,and Dell Magazines published it under the name “Number Place.” Sudoku was made popular in Japan in 1986 by the publisher Nikoli,and the Sudoku puzzle became popular internationally in 2005.In 2005,Felgenhauer and Javis[20]showed that the total number of possible solutions in a classic 9×9 Sudoku is 6,670,903,752,021,072,936,960≈6.671×1021.In 2007,Russell and Jarvis illustrated that if the various possible symmetric solutions are removed,the total number of fundamental solutions of a classic 9×9 Sudoku is still 5,472,730,538.Therefore,there is an extremely large number of possible solutions to the Sudoku puzzle.Based on the characteristics of the Sudoku puzzle,some researchers developed some novel methods[21]–[23]to embed secret information into the host image.

    Fig.1.Example of a 9×9 Sudoku puzzle:(a)an 9×9 Sudoku puzzle and(b)one of the solutions of(a).

    3.Proposed Scheme

    In this section,we propose a novel(n,n)secret image sharing scheme based on Sudoku.In our scheme,a dealer is responsible for generating n shadow images from a secret image and n different cover images.And then,only given n shadow images,the secret image can be reconstructed without distortion.

    In our scheme,let O={O1,O2,…,On} denote a set of cover images.Each Onpossesses M×N pixels,Oi={Oi,1,Oi,2,…,Oi,M×N}.Assume that an Ms×Nssecret image S is to be shared among n shadow imagesof size M×N.Let S={sj| j=1,2,…,MS×NS}.

    The proposed scheme consists of three phases:1)the preliminary phase,2)the secret image sharing phase,and 3)the secret image retrieving phase.

    3.1 Preliminary Phase

    In the proposed scheme,we utilize Sudoku to embed the secret image into n cover images.

    Step 1.The dealer selects a Sudoku grid with size 16×16,and divides it into sixteen 4×4 blocks.The dealer fills these grids using the digits from 0 to 15.Fig.2 demonstrates an instance of a 16×16 Sudoku grid.

    Step 2.The dealer transforms all pixels of the secret image into binary representation.For instance,if the pixel value of the secret image is sj=54,we obtain the binary representation as sj=(00110110).

    Step 3.The dealer divides the binary representation of the pixel values of the secret image sjinto two equal portions.And then,the dealer transforms each portion into base-16 representation.For instance,if sj=(00110110),first,we divide the sjinto two equal portions,such as sj=(0011||0110),sj1=(0011),and sj2=(0110).Then,we obtain sj1=(3)16and sj2=(6)16,and sjcan be represented as sj=(3||6)16.Then,S={ sj| j=1,2,…,MS×NS}can be transformed into a base-16 digits stream,i.e.,S={ s′j| j=1,2,…,2 ×MS×NS} where s′jdenotes base-16 numeral system digits.

    Fig.2.Instance of 16×16 Sudoku grid using the digits from 0 to 15.

    3.2 Secret Image Sharing Phase

    Without loss of generality,assume that we want to embed a base-16 digit streaminto n different cover images to generate n shadow images.The dealer performs the following steps.

    Step 1.First,the dealer constructs a matrix M with the size of 256×256 consisting of Sudoku grids with the size 16×16,as shown in Fig.2.Fig.3 shows an instance of a 256×256 matrix M.

    Step 3.We can obtain the value m of the Sudoku digit by mapping the row Oiaand column Oibat the matrix M.In the proposed scheme,we denote C as the mapping function from the pixel pair (Oia,Oib) to a Sudoku digit.

    Then,we select a Sudoku digit m′ that is equal toand for which the Euclidean distance between the Sudoku digit m′ and m is the shortest.

    Step 4.We define the function C-1as

    From the located Sudoku digit m′,we can obtain a new embedded pairby using the mapping function C-1.Then,the corresponding pixel pair of the shadow image is.

    Fig.4 illustrates an example of the camouflage process.Assume that the pixel pair of the cover image (Oia,Oib)is(10,6)and that.We can obtain a base-16 digit 12 by mapping 12=C(10,6).We locate this point in this Sudoku grid and then we can find a Sudoku digit m′ that is equal to 10 and for which the distance between the digit 12 and the Sudoku digit m′ is the shortest.We can obtain a new pixel pair for the shadow image by mapping(11,5)=C-1(m′).

    Fig.3.Instance of 256×256 matrix M.

    Fig.4.Instance of camouflage results.

    Step 6.Repeat the above steps until all pixel values of the secret image are camouflaged.

    3.3 Secret Image Retrieving Phase

    In the proposed(n,n)secret image sharing scheme,given n shadow images,the shared secret image can be reconstructed losslessly.We must retrieve the base-16 digits from all shadow images.The details are as follows.

    Step 1.First,we obtain the first pixel pairfrom the first shadow imageand compute a Sudoku digit s11by mapping s11=C(O11′,O11′).Then,we compute s12from the second shadow image O2′ by mapping

    Step 2.We transform s11and s12into their binary representations and merge them into a binary number.Then,we transform this binary number into base-10 representation.The obtained number is the first pixel value of the secret image.

    Step 3.Repeat the above steps until all pixel values of the secret image are extracted.

    4.Experimental Results and Analysis

    In this section,we present the results of some experiments that were conducted to evaluate the performance of the proposed(n,n)secret image sharing scheme.Herein,we set the system parameter as n = 2.

    4.1 Simulation Results

    We used 15 grayscale images with size of 512×512 pixels as the test images,as shown in Fig.5.Fig.6 shows the two secret images with 256×256 pixels and 512×256 pixels,respectively.To estimate the visual quality of the shadow images,the peak signal-to-noise ratio(PSNR)was used:

    The mean square error(MSE)between the cover image with M×N pixels and the shadow image is defined as

    where Oi,jis the pixel value of the ith cover image,andis the pixel value of the corresponding shadow image.

    Fig.5.Test images(512×512):(a)Airplane,(b)Cameraman,(c)Clown,(d)Couple,(e)Elaine,(f)Goldhill,(g)House,(h)Lena,(i)Mandrill,(j)Peppers,(k)Sailboat,(l)Splash,(m)Tiffany,(n)Toys,and(o)Zelda.

    Fig.6.Secret images.

    Table 1:PSNR of the shadow images of(2,2)secret sharing scheme for various images(capacity=256×256×8 bits)

    Table 1 lists the visual qualities of the shadow images with various test images and the 256×256 pixels secret image using the(2,2)secret image sharing scheme.It is clear that,regardless of what we use as the cover images,the PSNR values of the shadow images remain satisfactory.

    Table 2 displays the visual qualities of the shadow images with various test images.Since more secret bits are embedded into the cover images,the PSNR values of the shadow images are slightly lower than those of the last experiment.However,it is obvious that when we embedded the secret image with size of 512×256 pixels,the PSNR values of the shadow images were still satisfactory.

    In order to demonstrate the visual perception of the shadow images,we utilized ‘Lena and House’ as the cover images.Fig.7(a)to Fig.7(d)show the cover images and the shadow images,and Fig.7(e)shows the reconstructed secret image with 256×256 pixels.We can see that the distortions are slight,and it is difficult to distinguish between the cover images and the shadow images.

    Table 2:PSNR of the shadow images of(2,2)secret sharing scheme for various images(capacity=512×256×8 bits)

    Fig.8 shows the case in which we embedded the secret image with 512×256 pixels into the cover images ‘Lena’and ‘House’.Judging from the visual perception of these two shadow images and the two cover images,our scheme can successfully camouflage shadow images.

    Fig.7.Results of Lena and House as cover images for 256×256 sized secret image:(a)original cover image 1,(b)original cover image 2(c)shadow image1,PSNR= 48.80 dB,(d)shadow image 2,PSNR= 48.85 dB,and(e)extracted secret image.

    Fig.8.Results of Lena and House as cover images for 512×256 pixels sized secret image:(a)original cover image 1,(b)original cover image 2,(c)shadow image 1,PSNR= 45.84 dB,(d)shadow image 2,PSNR= 45.84 dB,and(e)extracted secret image.

    Fig.9.Secret capacity (n×H ×W)/4(pixels)with different n,where H=512,W=512 in this figure.

    Fig.10.Shadow image quality obtained by sharing 256×256 sized secret image with different test images.

    4.2 Discussion

    In this section,we address embedding capacity and compare the visual quality of the shadow images of our scheme with those of related works[10]–[12],[19].

    In a secret image sharing scheme,an embedding capacity is an important consideration.According to the embedding mechanism of the proposed scheme,the embedding capacity is proportional to the increase of n.Fig.9 compares the capacity of the embedded data for [10]–[12],[19]with that of our scheme for n=2,3,…,16.It is clear that the proposed scheme has a larger embedding capacity than the related schemes.

    Fig.10 compares the PSNR values of the shadow images of our proposed(n,n)secret image sharing scheme with those of related works.The figure shows that our proposed scheme results in better visual quality than other schemes[10]–[12],[19].

    5.Conclusions

    In this paper,based on Sudoku,we propose a novel(n,n)secret image sharing scheme.We extended Chang et al.’s(t,n)secret image sharing scheme,in which only one cover image can be used to camouflage the secret image.In our scheme,we can generate n shadow images by embedding the secret image into n different cover images.Given only these n shadow images,the secret image can be reconstructed losslessly.The experimental results demonstrated that the proposed scheme offers a large embedding capacity compared with related secret image sharing schemes,and the visual quality of the shadow images is satisfactory.

    [1]A.Shamir,“How to share a secret,” Communications of the ACM,vol.22,no.11,pp.612–613,1979.

    [2]G.Blakley,“Safeguarding cryptographic keys,” in Proc.of the National Computer Conf.,Montvale,1979,pp.313–317.

    [3]N.Noar and A.Shamir,“Visual cryptography,” in Proc.of Eurocrypt'94,Perugia,1995,pp.1–12.

    [4]C.-C.Thien and J.-C.Lin,“Secret image sharing,”Computers & Graphics,vol.26,no.5,pp.765–770,2002.

    [5]C.-N.Yang,“New visual secret sharing schemes using probabilistic method,” Pattern Recognition Letters,vol.25,no.4,pp.481–494,2004.

    [6]R.-Z.Wang and C.-H.Su,“Secret image sharing with smaller shadow images,” Pattern Recognition Letters,vol.27,no.6,pp.551–555,2006.

    [7]D.Wang,L.Zhang,N.Ma,and X.Li,“Two secret sharing schemes based on Boolean operations,” Pattern Recognition,vol.40,no.10,pp.2776–2785,2007.

    [8]C.-C.Chang,C.-C.Lin,T.H.N.Le,and H.-B.Le,“Sharing a verifiable secret image using two shadows,” Pattern Recognition,vol.42,no.11,pp.3097–3114,2009.

    [9]C.-C.Thien and J.-C.Lin,“An image-sharing method with user-friendly shadow images,” IEEE Trans.on Circuits and Systems for Video Technology,vol.13,no.12,pp.1161–1169,2003.

    [10]C.Lin and W.Tsai,“Secret image sharing with steganography and authentication,” The Journal of Systems and Software,vol.73,no.3,pp.405–414,2004.

    [11]C.-N.Yang,T.-S.Chen,K.-H.Yu,and C.-C.Wang,“Improvements of image sharing with steganography and authentication,” The Journal of Systems and Software,vol.80,no.7,pp.1070–1076,2007.

    [12]C.-C.Chang,Y.-P.Hsieh,and C.-H.Lin,“Sharing secrets in stego images with authentication,” Pattern Recognition,vol.41,no.10,pp.3130–3137,2008.

    [13]P.-Y.Lin,J.-S.Lee,and C.-C.Chang,“Distortion-free secret image sharing mechanism using modulus operator,” Pattern Recognition,vol.42,no.5,pp.886–895,2009.

    [14]P.-Y.Lin and C.-S.Chan,“Invertible secret image sharing with steganography,” Pattern Recognition Letters,vol.31,no.13,pp.1887–1893,2010.

    [15]C.-S.Tsai,C.-C.Chang,and T.-S.Chen,“Sharing multiple secrets in digital images,” The Journal of Systems and Software,vol.64,no.2,pp.163–170,2002.

    [16]J.-B.Feng,H.-C.Wu,and C.-S.Tsai,“A new multi-secret images sharing scheme using Largrange’s interpolation,”The Journal of Systems and Software,vol.76,no.3,pp.327–359,2005.

    [17]Z.Eslami,S.H.Razzaghi,and J.Z.Ahmadabadi,“Secret image sharing based on cellular automata and steganography,” Pattern Recognition,vol.43,no.1,pp.397–404,2010.

    [18]Z.Eslami and J.Z.Ahmadabadi,“Secret image sharing with authentication-chaining and dynamic embedding,” The Journal of Systems and Software,vol.84,no.5,pp.803–809,2011.

    [19]C.-C.Chang,P.-Y.Lin,Z.-H.Wang,and M.-C.Li,“A Sudoku-based secret image sharing scheme with reversibility,” Journal of Communications,vol.5,no.1,pp.5–12,2010.

    [20]B.Felgenhauer and F.Jarvis,“Mathematics of Sudoku,”Mathematical Spectrum,vol.39,no.1,pp.15–22,2006.

    [21]C.-C.Chang,Y.-C.Chou,and T.-D.Kieu,“An information hiding scheme using Sudoku,” in Proc.of the 3rd Int.Conf.on Innovative Computing Information and Control,Dalian,2008,pp.17–21.

    [22]W.Hong,T.-S.Chen,and C.-W.Shiu,“Steganography using Sudoku revisited,” in Proc.of the Second Int.Symposium on Intelligent Information Technology Application,Shanghai,2008,pp.935–939.

    [23]C.-C.Chang,Y.-C.Chou,and T.-D.Kieu,“Embedding data and sharing original image in two stego images using Sudoku,” in Proc.of the 2010 IET Int.Conf.on Frontier Computing,Theory,Technologies and Applications,Taichung,2010,pp.163–168.

    亚洲精品中文字幕在线视频 | 国产男女超爽视频在线观看| 日本三级黄在线观看| 麻豆精品久久久久久蜜桃| 亚洲综合精品二区| 国产成人a∨麻豆精品| 欧美日韩视频高清一区二区三区二| 精品久久国产蜜桃| 亚洲精品国产av成人精品| 亚洲精品国产成人久久av| 日韩av免费高清视频| 最新中文字幕久久久久| 99久久精品热视频| 国产成人91sexporn| av免费在线看不卡| 中国三级夫妇交换| 五月伊人婷婷丁香| 在线观看一区二区三区| 久久精品国产自在天天线| 午夜福利在线在线| 日产精品乱码卡一卡2卡三| 国产黄频视频在线观看| 亚洲欧美日韩无卡精品| 国产极品天堂在线| 国产 一区精品| 少妇丰满av| 亚洲精品成人久久久久久| 国产极品天堂在线| 自拍偷自拍亚洲精品老妇| 婷婷色麻豆天堂久久| 久久精品人妻少妇| 国产一区二区三区av在线| 亚洲欧美日韩无卡精品| 日韩中字成人| 男女下面进入的视频免费午夜| 日韩中字成人| 日韩精品有码人妻一区| 日本wwww免费看| 亚洲精品日韩av片在线观看| 国产一区二区在线观看日韩| 精华霜和精华液先用哪个| 五月伊人婷婷丁香| 欧美bdsm另类| 一级毛片 在线播放| 精品午夜福利在线看| 亚洲内射少妇av| 爱豆传媒免费全集在线观看| 国产黄a三级三级三级人| 国产成人福利小说| 国产亚洲午夜精品一区二区久久 | 成人亚洲精品av一区二区| 免费黄网站久久成人精品| 99热这里只有精品一区| 黄色欧美视频在线观看| 久久久欧美国产精品| 97超碰精品成人国产| 搞女人的毛片| 亚洲成色77777| 在线a可以看的网站| 亚洲成人av在线免费| 肉色欧美久久久久久久蜜桃 | 久久久久网色| 国产中年淑女户外野战色| 国产视频内射| 亚洲久久久久久中文字幕| 国产大屁股一区二区在线视频| 免费人成在线观看视频色| 国产伦精品一区二区三区四那| 中国美白少妇内射xxxbb| 不卡视频在线观看欧美| 三级经典国产精品| 国产毛片a区久久久久| 欧美日韩综合久久久久久| 日本-黄色视频高清免费观看| 国产免费一级a男人的天堂| 国产精品无大码| 美女国产视频在线观看| 精品一区在线观看国产| 丝袜美腿在线中文| 日韩 亚洲 欧美在线| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | www.色视频.com| 又粗又硬又长又爽又黄的视频| 日本av手机在线免费观看| 中文乱码字字幕精品一区二区三区| 亚洲精品456在线播放app| tube8黄色片| 五月开心婷婷网| 亚洲自拍偷在线| 国产高清国产精品国产三级 | 欧美成人a在线观看| 成人二区视频| 赤兔流量卡办理| 国产一区二区三区综合在线观看 | 高清在线视频一区二区三区| 狂野欧美白嫩少妇大欣赏| 又爽又黄无遮挡网站| 成年av动漫网址| 中文在线观看免费www的网站| 国产日韩欧美在线精品| av在线老鸭窝| 国产淫语在线视频| 亚洲欧美日韩东京热| av福利片在线观看| 91久久精品电影网| 免费观看性生交大片5| 婷婷色麻豆天堂久久| 自拍偷自拍亚洲精品老妇| 国内揄拍国产精品人妻在线| 国产欧美另类精品又又久久亚洲欧美| 欧美少妇被猛烈插入视频| 在线观看国产h片| 久久6这里有精品| 日本欧美国产在线视频| 国产精品99久久99久久久不卡 | 亚洲av福利一区| 亚洲自偷自拍三级| 18禁在线播放成人免费| 久久久精品欧美日韩精品| 日本爱情动作片www.在线观看| 男男h啪啪无遮挡| 在线免费观看不下载黄p国产| 亚洲精品456在线播放app| 亚洲不卡免费看| 日韩视频在线欧美| 熟女av电影| 久久久久久久久久久免费av| 在线a可以看的网站| 日韩av不卡免费在线播放| 亚洲自拍偷在线| av又黄又爽大尺度在线免费看| 日韩成人av中文字幕在线观看| 婷婷色综合www| 成年免费大片在线观看| 狠狠精品人妻久久久久久综合| 亚洲人成网站高清观看| 久久精品国产亚洲av涩爱| 三级经典国产精品| 1000部很黄的大片| 亚洲欧洲国产日韩| 久久ye,这里只有精品| 性插视频无遮挡在线免费观看| 国产人妻一区二区三区在| 91精品国产九色| 国产大屁股一区二区在线视频| 在线播放无遮挡| 国产精品久久久久久久电影| 国产一区二区三区av在线| 久久人人爽人人爽人人片va| 王馨瑶露胸无遮挡在线观看| 丝袜脚勾引网站| 热re99久久精品国产66热6| 久久精品国产鲁丝片午夜精品| 国产淫语在线视频| 色综合色国产| 91午夜精品亚洲一区二区三区| 日本wwww免费看| 日韩成人av中文字幕在线观看| 亚洲欧美中文字幕日韩二区| 如何舔出高潮| 免费看不卡的av| 午夜福利在线观看免费完整高清在| 街头女战士在线观看网站| 亚洲伊人久久精品综合| 久久久久久国产a免费观看| 精品少妇久久久久久888优播| 禁无遮挡网站| 干丝袜人妻中文字幕| 成人美女网站在线观看视频| 伊人久久精品亚洲午夜| 麻豆久久精品国产亚洲av| 97人妻精品一区二区三区麻豆| 久久人人爽人人爽人人片va| 久久韩国三级中文字幕| 久久久久性生活片| 国产精品麻豆人妻色哟哟久久| 日韩国内少妇激情av| 欧美xxⅹ黑人| 黄片无遮挡物在线观看| 爱豆传媒免费全集在线观看| 性插视频无遮挡在线免费观看| 欧美成人午夜免费资源| 久久久欧美国产精品| 国产免费福利视频在线观看| 国产一区二区三区av在线| 欧美国产精品一级二级三级 | 制服丝袜香蕉在线| 亚洲天堂av无毛| 激情五月婷婷亚洲| 国产人妻一区二区三区在| 老女人水多毛片| 国产伦在线观看视频一区| 成人高潮视频无遮挡免费网站| 日韩av不卡免费在线播放| 久久久久久伊人网av| 久久人人爽人人爽人人片va| 校园人妻丝袜中文字幕| 在线观看美女被高潮喷水网站| 热99国产精品久久久久久7| 超碰97精品在线观看| 久久人人爽人人片av| 国产高清三级在线| 亚洲,欧美,日韩| 久久久久久九九精品二区国产| 亚洲综合色惰| 国产黄片视频在线免费观看| 丝袜脚勾引网站| 精品亚洲乱码少妇综合久久| 国产精品99久久久久久久久| 天天躁夜夜躁狠狠久久av| 中文精品一卡2卡3卡4更新| 嫩草影院入口| a级一级毛片免费在线观看| 国产成人freesex在线| 国产黄色免费在线视频| 自拍欧美九色日韩亚洲蝌蚪91 | 人人妻人人澡人人爽人人夜夜| 日本与韩国留学比较| 国国产精品蜜臀av免费| 性色avwww在线观看| 干丝袜人妻中文字幕| 午夜免费男女啪啪视频观看| 成人毛片60女人毛片免费| 亚洲av男天堂| 69av精品久久久久久| 性色av一级| 久热这里只有精品99| 亚洲av日韩在线播放| www.色视频.com| 少妇裸体淫交视频免费看高清| 免费黄色在线免费观看| 男女那种视频在线观看| 久久久久久久久久久免费av| 国产精品国产三级专区第一集| 2018国产大陆天天弄谢| 国模一区二区三区四区视频| 欧美极品一区二区三区四区| 免费av观看视频| 国内精品美女久久久久久| 少妇人妻 视频| 最近中文字幕高清免费大全6| 青春草国产在线视频| 秋霞伦理黄片| 我的老师免费观看完整版| 丰满人妻一区二区三区视频av| av在线播放精品| 国产精品久久久久久久久免| 国产又色又爽无遮挡免| 91久久精品电影网| 国产国拍精品亚洲av在线观看| 2021少妇久久久久久久久久久| 国产亚洲av片在线观看秒播厂| 亚洲色图av天堂| 国产午夜精品久久久久久一区二区三区| 丰满乱子伦码专区| 国产精品熟女久久久久浪| 又爽又黄a免费视频| 欧美日韩综合久久久久久| 一级毛片 在线播放| 亚洲va在线va天堂va国产| 成人亚洲精品av一区二区| 晚上一个人看的免费电影| 天美传媒精品一区二区| 午夜福利在线观看免费完整高清在| 乱码一卡2卡4卡精品| 噜噜噜噜噜久久久久久91| 亚洲激情五月婷婷啪啪| 欧美精品一区二区大全| av网站免费在线观看视频| 国产精品一及| 91久久精品国产一区二区成人| 热re99久久精品国产66热6| 亚洲精品一二三| 亚洲真实伦在线观看| av在线天堂中文字幕| 男人狂女人下面高潮的视频| 成人午夜精彩视频在线观看| 永久免费av网站大全| 亚洲精品乱久久久久久| 18禁在线无遮挡免费观看视频| 成人鲁丝片一二三区免费| 91狼人影院| 亚洲成人中文字幕在线播放| 深爱激情五月婷婷| 国内精品宾馆在线| 久久精品国产a三级三级三级| 黄色配什么色好看| 自拍偷自拍亚洲精品老妇| 一级二级三级毛片免费看| 久久久久国产精品人妻一区二区| 一级毛片aaaaaa免费看小| 三级国产精品欧美在线观看| 18禁裸乳无遮挡动漫免费视频 | 岛国毛片在线播放| 一区二区三区精品91| 超碰av人人做人人爽久久| 成人二区视频| 亚洲成色77777| 免费av毛片视频| 王馨瑶露胸无遮挡在线观看| 中文字幕人妻熟人妻熟丝袜美| 最近中文字幕2019免费版| 九九久久精品国产亚洲av麻豆| 日韩欧美精品免费久久| 国产免费又黄又爽又色| 国产免费一级a男人的天堂| 国产男人的电影天堂91| 免费观看的影片在线观看| 欧美潮喷喷水| 男的添女的下面高潮视频| 亚州av有码| 国产精品久久久久久精品电影小说 | 大香蕉久久网| 精品熟女少妇av免费看| 99久久精品热视频| 卡戴珊不雅视频在线播放| 亚洲精品一区蜜桃| 欧美日韩一区二区视频在线观看视频在线 | 九草在线视频观看| 亚洲成人中文字幕在线播放| 大片免费播放器 马上看| av线在线观看网站| 国产有黄有色有爽视频| 视频区图区小说| 亚洲高清免费不卡视频| 97在线人人人人妻| 午夜福利在线观看免费完整高清在| 舔av片在线| 国产爽快片一区二区三区| 全区人妻精品视频| 亚洲精品一区蜜桃| 国产午夜福利久久久久久| 少妇裸体淫交视频免费看高清| 亚洲天堂国产精品一区在线| 亚洲欧美精品专区久久| 日本欧美国产在线视频| 日韩成人伦理影院| 国产精品人妻久久久影院| 婷婷色av中文字幕| 大香蕉久久网| 五月伊人婷婷丁香| 亚洲欧美日韩卡通动漫| 亚洲精品第二区| 黄色欧美视频在线观看| av在线观看视频网站免费| 激情 狠狠 欧美| 久久精品国产亚洲av天美| 欧美区成人在线视频| 七月丁香在线播放| 亚洲精品日本国产第一区| 中文字幕久久专区| 亚洲av国产av综合av卡| 天美传媒精品一区二区| 伊人久久国产一区二区| av在线蜜桃| 男女国产视频网站| 国产精品一二三区在线看| 亚洲性久久影院| 日韩精品有码人妻一区| 男插女下体视频免费在线播放| 人妻 亚洲 视频| av免费观看日本| 久久午夜福利片| 国产日韩欧美亚洲二区| 成人毛片60女人毛片免费| 青青草视频在线视频观看| 亚洲美女搞黄在线观看| 亚洲国产高清在线一区二区三| 男女国产视频网站| 超碰97精品在线观看| 欧美最新免费一区二区三区| 国产成人福利小说| 韩国高清视频一区二区三区| 人体艺术视频欧美日本| 国产一区亚洲一区在线观看| 国产精品一区www在线观看| 日韩国内少妇激情av| 一区二区av电影网| 水蜜桃什么品种好| 免费av观看视频| 又大又黄又爽视频免费| av国产久精品久网站免费入址| 国产色婷婷99| 男女边摸边吃奶| 日日摸夜夜添夜夜爱| 亚洲人成网站高清观看| 久久久午夜欧美精品| 一二三四中文在线观看免费高清| 极品少妇高潮喷水抽搐| 欧美精品人与动牲交sv欧美| 偷拍熟女少妇极品色| 免费看av在线观看网站| 成人免费观看视频高清| 各种免费的搞黄视频| 男人爽女人下面视频在线观看| 欧美激情国产日韩精品一区| 草草在线视频免费看| 精品人妻熟女av久视频| 欧美人与善性xxx| 99久久中文字幕三级久久日本| 老司机影院成人| 亚洲,欧美,日韩| 亚洲一级一片aⅴ在线观看| 国产精品熟女久久久久浪| av在线亚洲专区| 97超视频在线观看视频| 国产老妇伦熟女老妇高清| 午夜免费男女啪啪视频观看| 99久久精品热视频| 国产成人aa在线观看| 国产成人精品福利久久| 国产黄a三级三级三级人| 免费黄网站久久成人精品| 日韩欧美 国产精品| av在线播放精品| 在线播放无遮挡| 99久久中文字幕三级久久日本| 日本黄色片子视频| 国产毛片a区久久久久| 久久人人爽人人爽人人片va| 蜜桃亚洲精品一区二区三区| 高清午夜精品一区二区三区| 99九九线精品视频在线观看视频| 免费黄频网站在线观看国产| 亚洲欧美日韩无卡精品| 好男人视频免费观看在线| 国产精品国产av在线观看| 亚洲伊人久久精品综合| 在线免费观看不下载黄p国产| 欧美+日韩+精品| 国产男人的电影天堂91| 亚洲久久久久久中文字幕| 午夜日本视频在线| 久久综合国产亚洲精品| 99热这里只有精品一区| 我的老师免费观看完整版| 国产高清有码在线观看视频| 国产成人精品一,二区| 亚洲成人精品中文字幕电影| 禁无遮挡网站| 久久鲁丝午夜福利片| 男女边吃奶边做爰视频| 精品人妻一区二区三区麻豆| 蜜臀久久99精品久久宅男| 婷婷色综合www| 日韩,欧美,国产一区二区三区| 自拍欧美九色日韩亚洲蝌蚪91 | 边亲边吃奶的免费视频| 免费观看无遮挡的男女| 久热这里只有精品99| 草草在线视频免费看| 秋霞在线观看毛片| 人体艺术视频欧美日本| av国产精品久久久久影院| 99热这里只有是精品50| 午夜福利网站1000一区二区三区| 人妻一区二区av| 免费看a级黄色片| 欧美xxxx性猛交bbbb| 不卡视频在线观看欧美| 男女边吃奶边做爰视频| 中文字幕人妻熟人妻熟丝袜美| 少妇人妻一区二区三区视频| 久久人人爽人人片av| 天天躁夜夜躁狠狠久久av| 美女cb高潮喷水在线观看| 岛国毛片在线播放| 亚洲av电影在线观看一区二区三区 | 国产在线男女| 国产成人精品婷婷| 免费黄网站久久成人精品| 国产午夜精品久久久久久一区二区三区| 国产精品嫩草影院av在线观看| 国产精品一区二区在线观看99| 日本av手机在线免费观看| 国产淫语在线视频| 菩萨蛮人人尽说江南好唐韦庄| 热re99久久精品国产66热6| 亚洲精品日韩在线中文字幕| 亚洲va在线va天堂va国产| 小蜜桃在线观看免费完整版高清| 亚州av有码| 亚洲精品一区蜜桃| 国产精品无大码| 亚洲欧美日韩另类电影网站 | 国产淫语在线视频| 亚洲精品乱久久久久久| 精品人妻一区二区三区麻豆| 欧美日韩在线观看h| 一级黄片播放器| 成人毛片a级毛片在线播放| 少妇猛男粗大的猛烈进出视频 | 在线观看国产h片| 99久久精品一区二区三区| 午夜激情久久久久久久| 国产大屁股一区二区在线视频| 国产精品av视频在线免费观看| 香蕉精品网在线| 午夜福利在线观看免费完整高清在| 亚洲高清免费不卡视频| 国产精品99久久久久久久久| 久久ye,这里只有精品| 免费人成在线观看视频色| 国产一区亚洲一区在线观看| 尤物成人国产欧美一区二区三区| 日韩精品有码人妻一区| 亚洲国产成人一精品久久久| 国产 一区精品| 美女高潮的动态| 神马国产精品三级电影在线观看| 成年人午夜在线观看视频| 亚洲第一区二区三区不卡| 18禁裸乳无遮挡免费网站照片| 国产精品99久久久久久久久| 99九九线精品视频在线观看视频| 免费av观看视频| 亚洲精品国产成人久久av| 久久这里有精品视频免费| 国产亚洲91精品色在线| 精品人妻一区二区三区麻豆| 免费播放大片免费观看视频在线观看| 国产一级毛片在线| 欧美日韩视频精品一区| 三级国产精品片| 天天躁夜夜躁狠狠久久av| 国产片特级美女逼逼视频| 亚洲精品aⅴ在线观看| 一区二区三区乱码不卡18| 国产一区二区三区综合在线观看 | 日韩av在线免费看完整版不卡| 王馨瑶露胸无遮挡在线观看| 黄色日韩在线| 大片免费播放器 马上看| 欧美最新免费一区二区三区| 国产精品久久久久久av不卡| 亚洲色图av天堂| 国产高清有码在线观看视频| 国产伦理片在线播放av一区| 一级毛片久久久久久久久女| 麻豆成人av视频| 午夜免费鲁丝| 国产伦理片在线播放av一区| 在线观看美女被高潮喷水网站| 人妻一区二区av| 青青草视频在线视频观看| 内射极品少妇av片p| 久久精品久久精品一区二区三区| 尾随美女入室| 18禁在线播放成人免费| 色5月婷婷丁香| 日韩成人av中文字幕在线观看| 久久精品国产亚洲av涩爱| 少妇裸体淫交视频免费看高清| 尾随美女入室| 久久99热这里只频精品6学生| 久久亚洲国产成人精品v| 亚洲av电影在线观看一区二区三区 | 精品国产一区二区三区久久久樱花 | 成年女人看的毛片在线观看| 热99国产精品久久久久久7| 大话2 男鬼变身卡| 高清欧美精品videossex| 国产免费福利视频在线观看| 春色校园在线视频观看| 亚洲电影在线观看av| 成人无遮挡网站| 国产av码专区亚洲av| 国产亚洲精品久久久com| 免费观看在线日韩| 国产老妇伦熟女老妇高清| 午夜福利高清视频| 韩国av在线不卡| 亚洲精品,欧美精品| 国产一级毛片在线| 久久久久精品久久久久真实原创| av线在线观看网站| 亚洲一级一片aⅴ在线观看| 午夜精品一区二区三区免费看| 国产男人的电影天堂91| 亚洲av中文字字幕乱码综合| 亚洲av福利一区| 久热这里只有精品99| 久久影院123| 在线精品无人区一区二区三 | 91在线精品国自产拍蜜月| 人妻一区二区av| 嫩草影院新地址| 亚洲av二区三区四区| 丰满少妇做爰视频| 亚洲av日韩在线播放| 国产成人aa在线观看| 自拍偷自拍亚洲精品老妇| 91精品国产九色| 一区二区av电影网| 免费黄频网站在线观看国产| 亚洲内射少妇av| 国产精品不卡视频一区二区| 精品少妇久久久久久888优播| 国产白丝娇喘喷水9色精品| 国产免费一区二区三区四区乱码| 亚洲国产高清在线一区二区三| 亚洲欧美中文字幕日韩二区| 亚洲真实伦在线观看| 男人狂女人下面高潮的视频| 国产黄频视频在线观看| 欧美丝袜亚洲另类| 精品人妻偷拍中文字幕| 狂野欧美激情性bbbbbb| 精品人妻视频免费看| 九九爱精品视频在线观看| 日韩三级伦理在线观看| 美女被艹到高潮喷水动态| 深爱激情五月婷婷| 伦理电影大哥的女人| 能在线免费看毛片的网站|