• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Anti-JPEG Compression Steganography Based on the High Tense Region Locating Method

    2019-04-29 03:21:34YangWuWeipingShangandJiahaoChen
    Computers Materials&Continua 2019年4期

    Yang Wu, Weiping Shang and Jiahao Chen

    Abstract: Robust data hiding techniques attempt to construct covert communication in a lossy public channel. Nowadays, the existing robust JPEG steganographic algorithms cannot overcome the side-information missing situation. Thus, this paper proposes a new robust JPEG steganographic algorithm based on the high tense region location method which needs no side-information of lossy channel. First, a tense region locating method is proposed based on the Harris-Laplacian feature point. Then, robust cover object generating processes are described. Last, the advanced embedding cost function is proposed. A series of experiments are conducted on various JPEG image sets and the results show that the proposed steganographic algorithm can resist JPEG compression efficiently with acceptable performance against steganalysis statistical detection libraries GFR (Gabor Filters Rich model) and DCTR (Discrete Cosine Transform Residual).

    Keywords: Robust data hiding, steganography, JPEG compression resistant, Harris-Laplacian feature.

    1 Introduction

    Steganography is now a fairly standard concept in computer science [Ker, Bas, B?hme et al. (2013)]. It focuses on establishing a stable and effective covert channel by using the public channel [Fridrich (2009)]. Thus, the secret information can be transmitted through public carrier with a supervising monitor by steganographic (stego) technology(especially in an enemy-controlled environment). At present, social and blog-like networks are gradually entering the daily life of human beings, and the images (most images are JPEG format in social networks) transmitted therein are of mass amount and spread widely. Thus, it is easy to cover up the stego images and the identities of covert communication users when the covert channel is established on such networks. However,such networks tend to use lossy compression algorithms to save computing power and network bandwidth in the transmitting process [Zhang, Luo, Yang et al. (2016)]. How to reduce the influence of such lossy operations on the embedded information is an essential problem of applying steganography in social networks.

    On this problem, Zhang et al. [Zhang, Luo, Yang et al. (2016)] first proposed the a steganography algorithm DCRAS (Discrete Cosine Relationship Adaptive Steangography)which is based on the relative relationship between DCT coefficients of adjacent8× 8 blocks in the same in-block position of JPEG images; Then, FRAS (Feature Region based Adaptive Steganography) algorithm [Zhang, Luo, Yang et al. (2017)] is proposed based on the invariant-feature-point region where the modified elements are concentrated in the hard-to-detect area to reach higher resisting performance against steganographic statistical detections [Pevny and Fridrich (2007); Kodovsky, Pevny and Fridrich (2010);Holub and Fridrich (2015); Denemark, Boroumand and Fridrich (2016); Ma, Luo, Li et al.(2018)]. In the JPEG compression channel, DCRAS and FRAS algorithms can extract the embedded information correctly with much higher probability than the traditional adaptive JPEG steganographic algorithms, such as NPQ (New Perturbed Quantization) [Huang, Luo,Huang et al. (2012)], UED (Uniform Embedding Distortion) [Guo, Ni and Shi (2012)], JUNIWARD (JPEG image UNIversal WAvelet Relative Distortion) [Holub, Fridrich and Denemark (2014)] and so on. It is worth noting that, as stated in the literature [Zhang, Luo,Yang et al. (2016); Zhang, Luo, Yang et al. (2017)], a necessary condition of the DCRAS and FRAS algorithms is that the sender needs to know the quality factor value of JPEG compression used in the lossy channel (named as side information). Furthermore, the generated stego image can only resist the JPEG compression whose quality factor value is same to the side information. When the side information is missing, the DCRAS and FRAS algorithms can hardly work properly in many compression situations [Zhang, Qin, Zhang et al. (2018); Bao, Luo, Zhang et al. (2018)].

    To improve the resistance against JPEG compression of steganography without the side information, an anti-JPEG compression steganography algorithm is designed in this manuscript. First, the region with strong anti-JPEG compression is proposed based on Harris-Laplacian transform. Second, the anti-JPEG cover generation method for borderless information and the corresponding embedding distortion function are given.Last, the concatenated error correction code is combined to elevate the extraction accuracy. The effectiveness of the proposed algorithm is verified by a series of comparative experiments on the standard steganalysis image library BOSSbase 1.01 against existing JPEG adaptive steganography, robust watermarking, DCRAS algorithm and FRAS algorithm for anti-JPEG compression and anti-statistical detection. The results imply that the proposed method can effectively resist JPEG compression under the condition of missing quality factor information with acceptable resistance performance to statistical detection.

    The paper has a simple structure. The knowledge of adaptive JPEG steganography and matrix embedding coding are introduced in Section 2 first. Then, Section 3 describes the details of proposed method. Last, the experimental results and conclusions are presented in Section 4 and Section 5 respectively.

    2 Related works

    In this section, the adaptive JPEG steganography and matrix embedding coding methods are briefly introduced in the following subsections.

    2.1 Adaptive JPEG steganography

    JPEG format is popular in the social networks for the high image quality and compression performance. Usually, most JPEG steganographic algorithms such as NPQ,UED and J-UNIWARD embed the secret message into the cover JPEG image by modifying the DCT (Discrete Cosine Transform) coefficients of it.

    In general, the original spatial image needs to perform color space conversion (from RGB domain to YUV domain) and down-sampling operation first. Then the three independent YUV sub-images are divided into continuous non-overlapping8× 8blocks respectively,and then independently perform discrete cosine transformation operation. The ready to stored DCT coefficients are gained after quantization and rounding processes. Because the inter-relationship between elements of U sub-image and V sub-image is sensitive, it is suggested to apply embedding process on Y sub-image to increase the security.Meanwhile, the Y sub-image store the luminance information, and researchers try to brief the JPEG image. Thus, the experiments of existing researches on JPEG steganography are focused on grayscale images which can ignore the effects of color space conversion and down-sampling processes. The experiments of this manuscript will also follow this setting and focus on grayscale images.

    At present, most popular JPEG adaptive steganographic algorithms consist of embedding cost function and steganographic embedding encoder. This framework is based on the minimum distortion model introduced by Fridrich et al. [Fridrich and Filler (2007)]. This architecture can concentrate the modifications caused by embedding on the DCT coefficients of smaller “cost value” in the embedding cost function. The anti-statistical detection capability of the algorithm is increased if the embedding cost function is well defined. Therefore, the anti-statistical detection capability of the JPEG steganographic algorithm under the framework is closely related to the embedding cost function. On this research, Holub et al. [Holub, Fridrich and Denemark (2014)] proposed the JPEG adaptive steganography algorithm J-UNIWARD, which is defined by The embedded distortion function is composed of decomposition coefficients of a plurality of twodimensional wavelets (two of which are perpendicular to each other), which can finely describe the smoothness of pixels in multiple directions, so that the embedded modification can be more concentrated to be difficult to detect. On the element, the embedded distortion function can be defined as:

    The symbolsXandYrepresent cover object and stego object respectively, the symbol J-1(.)represents the inverse DCT from the frequency domain to the spatial domain, and the symbolrepresents the uv-th decomposition coefficient of the r-th (r=1, 2, 3)wavelet (u and v represent the position of the two sub-waveletrespectively),ε>0is a constant value which is used to prevent the divisor from appearing 0, it is usually set to a small value, such asε=10-5.

    2.2 Robust steganography

    Zhang et al. [Zhang, Luo, Yang et al. (2016)] proposed a framework for designing robust steganography algorithm. This framework combines the traditional JPEG adaptive steganography algorithm with a famous robust watermarking algorithm, and tries to reach the goal of resisting the statistical detection and JPEG compression.

    Under this framework, on the sender:

    1 Determining the domain in which the robust steganographic embedding modification is performed.

    2 Determining the specific modification measurement on the domain in Step 1 to make the embedded information can effectively resist the lossy JPEG compression operation.

    3 Defining the embedding cost function according to the embedded modification measurement to reduce the influence on statistical aspect.

    4 Encoding the embedded secret information by using the error correction code to improve the robustness.

    5 Embedding secret information by STCs embedding algorithm and packaging the stego object to JPEG format.

    For the receiver, after receiving the JPEG image transmitted over the lossy channel:

    1 Reading the JPEG format image and the corresponding stego object in the domain.

    2 Extracting the information using the STCs extraction algorithm.

    3 Correcting the errors in the extracted information by the error correcting code, and finally obtaining the original embedded information.

    Under the framework above, the DCRAS and FRAS algorithms are proposed [Zhang,Luo, Yang et al. (2016); Zhang, Luo, Yang et al. (2017)], they can protect the embedded information against JPEG compression and statistical detection well. Nevertheless, the QF (quality factor) of JPEG compression used by the lossy channel should be known in advance (regard as side information) nor leading to significant decline in resisting JPEG compression, and the generated stego object can only resist the specific JPEG compression whose QF value is same to the pre-known QF.

    2.3 Harris-Laplacian feature

    At present, in the research of robust watermarking algorithms, the information embedding method for information protection through local image feature points has become one of its hot spots. The robust watermarking algorithm calculates the invariant feature points of the watermark carrier image, and then uses the feature point as a center point to generate a watermark embedded region and hides the information. The literature[Lu, Lu and Chung (2010)] uses filtering residuals to calculate and locate the feature points of the carrier image, and gives a normalization method for the regions delimited by the feature points, which can better guarantee the robustness of the embedded information. Using the idea of invariant feature points, a robust watermarking algorithm based on image Harris-Laplacian feature points are proposed in Tsai et al. [Tsai, Huang and Kuo (2011)]. It performs Harris-Laplacian transformation of the image and calculates its corresponding feature points, and selects feature regions to resist specific ones. Lossy operation improves the ability of the watermark information to resist multiple types of lossy attacks. At the same time, the literature [Tsai, Huang, Kuo et al. (2012)]demonstrates the effectiveness of such Harris-Laplacian transform image features in robust watermarking, and proposes a more robust and secure one based on the literature[Lu, Lu and Chung (2010)].

    3 Proposed method

    On the problem of eliminating QF side information in robust steganography and resisting JPEG compression with multiple QF values, a new anti-JPEG steganography based on a region location method is proposed in this section. Frist, the proposed region location method is proposed. Then, the improved cover generation method is described. Last, the proposed embedding cost function and the error correction method setting is briefly introduced.

    Notice that the proposed anti-JPEG steganography is under the framework in Section 2.2,and the diagram is shown in Fig. 1.

    Figure 1: Diagram of the proposed algorithm

    3.1 High tense region locating method based on Harris-Laplacian feature point

    A natural thought is that the complex-area of image will lose more information than the plain-area after processing JPEG compression. It is reasonable because the discrete cosine transform will concentrate the “energy” of image to the low frequency area, and the quantization and rounding processes cut the details of image to reach the goal of compression.

    However, in literature Lu et al. [Lu, Lu and Chung (2010)], a new idea is pointed that the edges of object in image owns strong robustness because they contains much more information about the corresponding object. Furthermore, the pixels of object edges in image are more suitable to be modified than the plain area pixels in most adaptive steganographic algorithms. Thus, this sub-section proposes a high tense region locating method based on the Harris-Laplacian feature point that can be rebuilt the embedding region after the stego image is compressed and the modified elements are concentrated in the complex-area.4

    The processes of the method are presented as follows:

    Step 1. Functions that convert image I into scale space L are defined as:

    where symbola=(i, j)denotes the spatial coordinates of a certain pixel of the image,function G denotes a standard Gaussian kernel function,σDdenotes a scale parameter of the kernel function, and “*” denotes a convolution calculation operation.

    Step 2. In order to characterize the local structure of the image in the scale space, the autocorrelation matrix is defined in the scale space obtained in Step 1:

    whereσIis the integral scale and Lxand Lyrepresent the first-order derivative function of the x-axis and y-axis directions, respectively, in the scale space.

    Step 3. An angle response functionc(a, σI, σD)is designed based on μ(a,σI,σD)to quantify the local curvature amplitude of the image(i, j)position pixel:

    where “det” represents matrix determinant, and symbol tr represents the trace of the matrix.The larger the value of the angle response function is, the greater the probability that the corresponding image pixel can be repositioned after being subjected to a lossy attack.

    Step 4. Laplacian-of-Gaussian operationLoG(a,σn)and combining the angle response functionc(a, σI, σD)are used to find the robust edgepixels of the object in multiple dimensions in the image. Selecting the pixels with the largest 1% value of the angle response functionc(a, σI, σD)in the image to be candidate points first. Then, the extreme point of the absolute value of the Gaussian-LaplacianLoG(a,σn)on σn∈{(1.1)i×1.5|i=1,2,...,n}is selected. The measure of determining the extreme points is: supposeσD=0.7, n=15 when f satisfies:

    The pixels selected by the above algorithm is named as “featurepixel with scale value σc=(1.1)i×1.5”, and form a sequence set C={a1,a2,...,ak}in order from left to right in the image from top to bottom.

    Step 5. The radius value r of several same-radius circles whose centers are the elements ofC={a1,a2,...,ak}are determined, and the embedding area are within the circles. The method of determining r iteratively is given by setting the initial value of r to 1 (the unit is the minimal distance between two pixels), and the t-th iteration steps are:

    (1) Counting the numberntof pixels within the circles whose centers are located by the feature pixels of the setCand the radius is the r of this literation.

    (2) If the length m of information to be embedded satisfies m ≥nt/3, then r=r+1 and enters the t+1 iteration.

    (3) If the length m of information to be embedded satisfies m

    This ensures that there are enough embedded points in the selected area.

    3.2 Generating cover object and modifying method

    To against the JPEG compression operation, a cover generating (Step 1 and Step 2) and the corresponding modifying method (Step 3 to Step 5) without side information is described as follows:

    Step 1. A set of non-overlapping8× 8DCT coefficient-blocks is obtained from the JPEG cover image. SymbolDk={Dk(i),i=1,2,...,64},k=1,2,...,mis used to denote the set where m is the number of DCT blocks, and scalars i and k denote the i-th coefficient in the k-th block (in order from left to right, up to bottom).

    Step 2. A n-element robust cover objectX={x1,x2,...,xn}is generated by:

    whereMkiis the rounded mean value of three neighbor-blocked DCT coefficients Dk1(i),Dk2(i),Dk3(i).

    Step 3. The robust virtual stego object Yobtained by modifying element values of cover objectX , and the mapping rule of applying the modifications to {Dk}1≤k≤Bis expressed by:

    Step 4. The stego object after suffering JPEG compression operation is denoted by symbol Y whose element,(1≤ j≤n)is:

    where the symbols D,Dk={(i),i=1,2,...,64} and {}k,irespectively denote the sets of DCT coefficients,8× 8blocks and neighboring mean values after JPEG compression.Step 5. The value ofσkiis obtained on:

    3.3 Design of embedding cost function and error correction method setting

    After the cover object is generated by Section 3.2, the embedding process and error correction method are applied to concentrate the modifications on the hard-to-detect area and increase the robustness.

    According to the typical steganographic scheme, the design of embedding cost function effects the detection resisting performance a lot because the embedding encoder STCs nearly reach the bound. The construction of embedding cost function used in Bao et al.[Bao, Luo, Zhang et al. (2018)] achieves good performance and it is expressed as:

    Even though xj=yj, the function value calculated by formula (10) is not “0” when xj=yj=1&Dk( i)<Mki+σkiand xj=yj=0&Dk( i)>Mki-σki.

    Because the STCs embedding encoder tries to concentrate the modifications on lowfunction-value elements, thus the element in the situations above cannot be fully used.Thus, a new embedding cost function DFpro(xj,yj)is proposed as follows:

    Then, error correction encoder RS (Reed and Solomon) is applied on secret information before using STCs algorithm. RS is set to parameter (40, 90) which means 40 input elements encoded to 90 output elements, and error diffusion method proposed in Bao et al.[Bao, Luo, Zhang et al. (2018)] are also used in this process to increase the robustness of cover object to against JPEG compression.

    4 Experiments

    In order to verify the effectiveness of the proposed method, experiments were conducted based on BOSSbase image library. First, the experimental setups and the used image database are introduced. Then, the anti-JPEG compression performance and anti-statistical detection performance of the proposed method are compared with the JPEG adaptive steganography algorithm J-UNIWARD [Holub, Fridrich and Denemark (2014)], robust watermarking algorithm [Chen, Ouhyoung and Wu (2000)], robust steganography algorithm DCRAS [Zhang, Luo, Yang et al. (2016)] and FRAS [Zhang, Luo, Yang et al. (2017)].

    4.1 Setups

    All the experiments presented in this section were performed on a personal computer equipped with Intel Core i7-8700 CPU (3.2 GHz) and Windows 10 system. The software used in the experiment is MATLAB R2017a, and the spatial image library used is BOSSbase 1.01 (proposed by Patrick Bas, Tomas Filler, Tomas Pevny on ICASSP 2013,the download address is: http://agents.fel.cvut.cz/stegodata/).

    In the experiment of anti-JPEG compression, the embedded information in the stego image is extracted after lossy compression of JPEG. The error rate of information extraction is used to measure the resistance of robust steganographic algorithm to JPEG compression. It is defined as the rate of error bits number in extracting information to the total bits number of embedded information.

    In the anti-detection performance experiment, two famous JPEG image statistical detection feature libraries GFR (Gabor Filters Rich model [Song, Liu, Yang et al. (2015)]) and DCTR (Discrete Cosine Transform Residual [Holub and Fridrich (2015)]) are used with ensemble classifier [Kodovsky, Fridrich and Holub (2012)]. Last, the test error of the ensemble classifier is used to measure the anti-detection performance of the steganography algorithm. The closer value to 50% means the stronger anti-detection performance.

    4.2 Anti-JPEG compression experiments

    In this section, the 10,000 JPEG images compressed with QF=75 is generated from BOSSbase 1.01 image database. The steganographic information is embedded by JUNIWARD [Holub, Fridrich and Denemark (2014)], robust watermarking algorithm[Chen, Ouhyoung and Wu (2000)], robust steganography algorithm DCRAS [Zhang, Luo,Yang et al. (2016)], FRAS [Zhang, Luo, Yang et al. (2017)] and the proposed method in this manuscript. The embedding rate is varied from 0.01 bpnzAC (bits per non-zero Alternating Current coefficient) to 0.10 bpnzAC with 0.01 interval on the BOSSbase library with the 5 different algorithms mentioned above. Each setting generates 10,000 stego images and they are JPEG compressed by quality factors of 65, 75 and 85. Then,the embedded information is extracted to count the error rate. It is worth noting that in order to simulate the lossy transmission of unbounded information, the side information used by the carrier generated by DCRAS algorithm in the experiment is QF=90. The error extraction rate counting results of JPEG compression attacks with QF=75, 85 and 95 are shown in Fig. 2.

    From the Figs. 2(a), 2(b), 2(c), we can see that the error rates of extracted information of J-UNIWARD, DCRAS and FRAS are about 50%. It means that they can hardly resist the damage on embedded information from JPEG compression. The DCRAS and FRAS lost the ability of resisting JPEG compressing when the side-information is missing. The proposed algorithm and the robust watermarking algorithm both have low error rate of information extraction under most JPEG compression conditions. Among different compression settings, the error extraction rates of the proposed algorithm in this manuscript can be reduced by 9.47% at most (JPEG compression attack with QF=65)compared with that of the watermarking algorithm. It is also noted that the error extraction rates decreases with the increase of the quality factor of JPEG compression attacks. In JPEG compression attacks with QF=75 and 85, the proposed algorithm can also guarantee the low error extraction rate. This is because the higher the quality factor of JPEG compression, the less image information lost during compression.

    Figure 2: Experimental results of anti-JPEG compression attack on different steganographic and robust watermarking algorithms: (a), (b) and (c) present the results under JPEG compression attack of quality factor=65, 75 and 85 respectively

    4.3 Statistical detection experiments

    In this section, a set of carrier images with a quality factor of 75 and 85 is generated from all 10,000 spatial images in the BOSSbase 1.01 image database, and then random secret information is embedded using robust watermarking algorithm [Chen, Ouhyoung and Wu(2000)], DCRAS [Zhang, Luo, Yang et al. (2016)], FRAS [Zhang, Luo, Yang et al.(2017)] algorihtmsand and the proposed algorithm. The embedding rate is varied from 0.01 bpnzAC to 0.10 bpnzAC with 0.01 interval, and 10,000 stego images are generated of each different embedding algorithms with different embedding rates. Then, we use two statistical detection features of GFR (contains 17,000 features) and DCTR (contains 8,000 features) to extract the features of the carrier and the carrier image. Then we use the extracted features from 5,000 random chosen cover-stego pairs to train the ensemble linear classifier, and then the trained classifier is applied on the remained 10,000 images(5,000 cover images and 5,000) in the image database. Distribution) is used to classify the ensemble classifier. The test error rates of classifier with GFR and DCTR features are shown in Tab. 1 and Tab. 2 respectively.

    Table 1: Experimental results of statistical detection under GFR feature library against different steganographic and robust watermarking algorithms (The QF of cover JPEG image=75 and 85, and the bolt numbers denotes the results under QF=85)

    Table 2: Experimental results of statistical detection under DCTR feature library against different steganographic and robust watermarking algorithms (The QF of cover JPEG image=75 and 85, and the bolt numbers denotes the results under QF=85)

    FRAS [Zhang, Luo, Yang et al. (2017)]0.4189 0.4328 0.3355 0.3543 0.2738 0.2821 0.2096 0.2245 0.1749 0.1803 Proposed Algorithm 0.3914 0.4108 0.1645 0.1539 Methods Embedding Rate (bpdzAC)0.2926 0.3104 0.2020 0.2177 0.1619 0.1765 0.06 0.07 0.08 0.09 0.1 Robust Watermarking Algorithm [Chen,Ouhyoung and Wu (2000)]0.0016 0.0016 0.0013 0.0014 0.0011 0.0013 0.001 0.0001 0.001 0.001 0.0517 0.0529 FRAS [Zhang, Luo, Yang et al. (2017)]DCRAS [Zhang, Luo, Yang et al. (2016)]0.1370 0.1448 0.1127 0.1202 0.0909 0.1001 0.0694 0.0721 0.0574 0.0627 Proposed Algorithm 0.1101 0.1143 0.1413 0.1487 0.1175 0.1259 0.0992 0.1051 0.0741 0.0793 0.0829 0.0903 0.0613 0.0676 0.0424 0.0471 0.0115 0.0109

    From the results of Tab. 1 and Tab. 2, it can be seen that the detection error rate of robust watermarking algorithm is very low. It is due to the primal design of watermarking is to make the embedded message can be detected even after suffering JPEG compression operation. Therefore, the stego image generated by the robust watermarking algorithm can be easily detected by statistical detection method. Compared with the side informed robust steganography algorithms DCRAS and FRAS, the proposed robust steganography algorithm loss little detection resistance at low embedding rate, while a sharp decline in detection resistance occurs at embedding rate higher than 0.05 bpnzAC. This phenomenon may be caused by the embedding regions selected by proposed method in 3.1 are nearly to the full image. It means that the region select strategy becomes useless in this case. Thus, to ensure security, the proposed robust steganography is suggested to work at a low embedding rate which owns strong anti-statistical detection ability.

    5 Conclusions

    In order to design robust steganography against JPEG compression without side information, this manuscript proposed a robust watermarking algorithm based on the high tense region method. The region locating method combines the LoG operator and robust steganography and cover generating method without side information is described. New embedding cost function is proposed on overcoming the defects of the existing function.Comparative experimental results show that the proposed algorithm can reach a high compression resistance on sacrifice a small part of the anti-statistical detection ability.How to overcome the resistance decline problem in high embedding rates and more kinds of lossy operation are our further researching interests.

    Acknowledgement:This work was supported by the National Key Research and Development Program (2016YFB0801601) and the Pilot Technology Transfer Innovation Reform of Xidian University (No. 90904180001).

    九九爱精品视频在线观看| 人妻制服诱惑在线中文字幕| 亚洲人与动物交配视频| www日本黄色视频网| 免费在线观看影片大全网站| 国语自产精品视频在线第100页| 国产精品亚洲美女久久久| 亚洲欧美成人精品一区二区| 成人永久免费在线观看视频| 日本熟妇午夜| 精品少妇黑人巨大在线播放 | 久久婷婷人人爽人人干人人爱| 国产真实伦视频高清在线观看| 国产男靠女视频免费网站| 久久久午夜欧美精品| 人妻夜夜爽99麻豆av| 日韩人妻高清精品专区| 亚洲精品日韩在线中文字幕 | 中文亚洲av片在线观看爽| 99久久久亚洲精品蜜臀av| 两个人的视频大全免费| 久久精品91蜜桃| 熟女电影av网| 亚洲欧美精品自产自拍| 夜夜看夜夜爽夜夜摸| 欧美三级亚洲精品| 国产精品一区二区性色av| 国产三级中文精品| 亚洲真实伦在线观看| 免费看a级黄色片| 日本与韩国留学比较| 一a级毛片在线观看| 99久久精品热视频| 91麻豆精品激情在线观看国产| 日日撸夜夜添| 国产国拍精品亚洲av在线观看| 十八禁网站免费在线| 床上黄色一级片| 久久久久久国产a免费观看| or卡值多少钱| 日韩成人av中文字幕在线观看 | 尤物成人国产欧美一区二区三区| 又爽又黄a免费视频| 级片在线观看| 国产高清三级在线| 国产亚洲精品综合一区在线观看| 欧美+日韩+精品| 熟妇人妻久久中文字幕3abv| 内射极品少妇av片p| 国产麻豆成人av免费视频| 日韩 亚洲 欧美在线| 免费看av在线观看网站| 精品久久久久久成人av| 国产av一区在线观看免费| 国产综合懂色| 天堂av国产一区二区熟女人妻| 成人永久免费在线观看视频| 国产精品99久久久久久久久| 18+在线观看网站| 十八禁国产超污无遮挡网站| 少妇的逼水好多| 久久鲁丝午夜福利片| 成人特级黄色片久久久久久久| 人妻夜夜爽99麻豆av| 无遮挡黄片免费观看| 国内揄拍国产精品人妻在线| 国产精品国产三级国产av玫瑰| 久久久久久九九精品二区国产| 成人美女网站在线观看视频| 中文字幕人妻熟人妻熟丝袜美| 久久久a久久爽久久v久久| 国产伦精品一区二区三区四那| 伦精品一区二区三区| 婷婷精品国产亚洲av| 亚洲欧美精品自产自拍| 日韩精品青青久久久久久| 亚洲精品一区av在线观看| 精品人妻视频免费看| www.色视频.com| 国产一区二区在线av高清观看| 我要搜黄色片| 久久九九热精品免费| 日本黄色片子视频| 国产av一区在线观看免费| 精品久久久久久久久久久久久| 国产伦精品一区二区三区四那| 免费av观看视频| 日本熟妇午夜| 欧美区成人在线视频| 两个人的视频大全免费| av在线观看视频网站免费| 久久久久久久久大av| 99热只有精品国产| 成人漫画全彩无遮挡| 偷拍熟女少妇极品色| videossex国产| 麻豆成人午夜福利视频| 午夜福利成人在线免费观看| 国产探花在线观看一区二区| 精品久久久久久久久久免费视频| 国产在线男女| 欧美不卡视频在线免费观看| 两个人的视频大全免费| 2021天堂中文幕一二区在线观| 婷婷色综合大香蕉| 免费高清视频大片| 亚洲av第一区精品v没综合| 99久久无色码亚洲精品果冻| 久99久视频精品免费| 午夜福利成人在线免费观看| 又黄又爽又刺激的免费视频.| 91狼人影院| 亚洲精品一卡2卡三卡4卡5卡| 成年女人看的毛片在线观看| 99国产极品粉嫩在线观看| 日本 av在线| 亚洲av成人av| 免费大片18禁| 国产精品久久视频播放| 日本欧美国产在线视频| 国产视频内射| 色尼玛亚洲综合影院| 国产精品电影一区二区三区| 黄色一级大片看看| 亚洲精品日韩在线中文字幕 | 99久久九九国产精品国产免费| 寂寞人妻少妇视频99o| 亚洲精品日韩在线中文字幕 | 美女黄网站色视频| 亚洲无线在线观看| 亚洲婷婷狠狠爱综合网| 人妻少妇偷人精品九色| 亚洲美女搞黄在线观看 | 国产精品一及| 欧美性猛交╳xxx乱大交人| 免费人成视频x8x8入口观看| 国产美女午夜福利| 欧美高清性xxxxhd video| 亚洲人成网站在线观看播放| 免费无遮挡裸体视频| 欧美一区二区精品小视频在线| 九九久久精品国产亚洲av麻豆| 中文字幕熟女人妻在线| 亚洲va在线va天堂va国产| 国产日本99.免费观看| 日本撒尿小便嘘嘘汇集6| 淫妇啪啪啪对白视频| 国内精品一区二区在线观看| 日韩欧美 国产精品| 少妇丰满av| 激情 狠狠 欧美| 日韩av在线大香蕉| 精品欧美国产一区二区三| 亚洲久久久久久中文字幕| 97超碰精品成人国产| 精品不卡国产一区二区三区| 亚洲自拍偷在线| 日韩欧美三级三区| 激情 狠狠 欧美| 亚洲av免费高清在线观看| 欧美高清性xxxxhd video| av在线亚洲专区| 老熟妇仑乱视频hdxx| 欧美bdsm另类| 男女边吃奶边做爰视频| 国产一区二区三区在线臀色熟女| 国产一区二区激情短视频| 国模一区二区三区四区视频| 亚洲成a人片在线一区二区| 日本一本二区三区精品| 久久鲁丝午夜福利片| 天天躁夜夜躁狠狠久久av| 我的女老师完整版在线观看| 18禁在线播放成人免费| 午夜爱爱视频在线播放| 99久久成人亚洲精品观看| 欧美一区二区精品小视频在线| 在线观看一区二区三区| 国产一区二区三区在线臀色熟女| 俺也久久电影网| 免费看日本二区| 国产精品野战在线观看| 国产精品久久久久久久电影| 一区福利在线观看| 综合色av麻豆| 日本欧美国产在线视频| 桃色一区二区三区在线观看| 中文字幕av在线有码专区| 久久精品91蜜桃| 97人妻精品一区二区三区麻豆| 97在线视频观看| 99久久无色码亚洲精品果冻| 精品无人区乱码1区二区| 亚洲第一电影网av| 亚洲成av人片在线播放无| 变态另类成人亚洲欧美熟女| 在线观看av片永久免费下载| 日韩欧美三级三区| 99久久无色码亚洲精品果冻| 成人二区视频| 青春草视频在线免费观看| 欧美最新免费一区二区三区| 大型黄色视频在线免费观看| 国产私拍福利视频在线观看| 欧美zozozo另类| 国产日本99.免费观看| 国内精品久久久久精免费| 插逼视频在线观看| 亚洲精品日韩av片在线观看| 长腿黑丝高跟| 一区二区三区四区激情视频 | 在线免费观看不下载黄p国产| 日本一本二区三区精品| 白带黄色成豆腐渣| 美女大奶头视频| 久久久精品欧美日韩精品| 18禁裸乳无遮挡免费网站照片| 人妻久久中文字幕网| 国产精品不卡视频一区二区| 亚洲人成网站在线播放欧美日韩| 亚洲欧美成人综合另类久久久 | 人人妻人人看人人澡| 亚洲欧美精品自产自拍| 免费av毛片视频| 亚洲五月天丁香| 亚洲成a人片在线一区二区| 日韩大尺度精品在线看网址| 免费观看在线日韩| 婷婷六月久久综合丁香| 免费观看人在逋| 国产精品一区www在线观看| 真实男女啪啪啪动态图| 亚洲专区国产一区二区| 国产午夜精品久久久久久一区二区三区 | 中国美白少妇内射xxxbb| 国产免费一级a男人的天堂| 亚洲18禁久久av| 成人无遮挡网站| 亚洲久久久久久中文字幕| 欧美人与善性xxx| 亚洲精品在线观看二区| 哪里可以看免费的av片| 在现免费观看毛片| 晚上一个人看的免费电影| 久久久久久久久久成人| 日韩一本色道免费dvd| 国产精品久久久久久精品电影| 久久天躁狠狠躁夜夜2o2o| 18禁裸乳无遮挡免费网站照片| 美女cb高潮喷水在线观看| 久久久精品欧美日韩精品| 国产一区亚洲一区在线观看| 日韩精品青青久久久久久| av在线亚洲专区| a级一级毛片免费在线观看| 一本精品99久久精品77| 久99久视频精品免费| 人妻久久中文字幕网| 国产亚洲精品av在线| 亚洲精品在线观看二区| 97在线视频观看| 春色校园在线视频观看| 欧美成人精品欧美一级黄| 国产精品一区二区免费欧美| 婷婷亚洲欧美| 亚洲真实伦在线观看| 欧美一区二区国产精品久久精品| 国产黄色视频一区二区在线观看 | 麻豆国产97在线/欧美| 精品久久久久久久末码| 亚洲人成网站在线播| 国产免费男女视频| 蜜臀久久99精品久久宅男| 国产精品日韩av在线免费观看| 久久久久九九精品影院| 亚洲天堂国产精品一区在线| 精品一区二区三区视频在线观看免费| 高清日韩中文字幕在线| 免费人成视频x8x8入口观看| 久久精品夜色国产| 亚洲欧美成人精品一区二区| 中文字幕av成人在线电影| 麻豆国产97在线/欧美| 成人性生交大片免费视频hd| 精品久久久噜噜| 你懂的网址亚洲精品在线观看 | 亚洲av成人精品一区久久| 夜夜看夜夜爽夜夜摸| 亚洲自偷自拍三级| 18禁在线播放成人免费| 97超级碰碰碰精品色视频在线观看| 99久久精品一区二区三区| 国内精品美女久久久久久| 精品乱码久久久久久99久播| 97热精品久久久久久| 国产久久久一区二区三区| 国产精品国产高清国产av| 久久精品国产自在天天线| 丝袜美腿在线中文| 亚洲久久久久久中文字幕| 白带黄色成豆腐渣| 久久亚洲精品不卡| 嫩草影院入口| 国产av一区在线观看免费| 国产老妇女一区| 国产私拍福利视频在线观看| 春色校园在线视频观看| 亚洲欧美日韩高清在线视频| 成人av一区二区三区在线看| 天堂动漫精品| 午夜爱爱视频在线播放| 国产亚洲精品综合一区在线观看| 中文字幕av成人在线电影| 日韩强制内射视频| 亚洲人与动物交配视频| 国产av麻豆久久久久久久| 亚洲精品在线观看二区| 美女xxoo啪啪120秒动态图| 久久草成人影院| 黄色日韩在线| 日韩欧美三级三区| 能在线免费观看的黄片| 免费av观看视频| 亚洲自拍偷在线| 综合色丁香网| 美女高潮的动态| 中国美白少妇内射xxxbb| 亚洲乱码一区二区免费版| 成人午夜高清在线视频| 亚洲美女搞黄在线观看 | 欧美zozozo另类| av黄色大香蕉| 免费在线观看影片大全网站| 欧美精品国产亚洲| 欧美色视频一区免费| 日日摸夜夜添夜夜添小说| 亚洲精品在线观看二区| 日本免费a在线| 色av中文字幕| 国产精品亚洲一级av第二区| 久久久成人免费电影| 久久九九热精品免费| 一级毛片aaaaaa免费看小| 日韩一本色道免费dvd| 深爱激情五月婷婷| 成人二区视频| 亚洲av二区三区四区| 免费高清视频大片| 亚洲成a人片在线一区二区| 成人永久免费在线观看视频| 精品国产三级普通话版| 欧美成人一区二区免费高清观看| 淫妇啪啪啪对白视频| 亚洲av中文av极速乱| 噜噜噜噜噜久久久久久91| 成年女人毛片免费观看观看9| 国产精品1区2区在线观看.| 深夜精品福利| 韩国av在线不卡| 亚洲无线观看免费| 亚洲成人中文字幕在线播放| 91在线精品国自产拍蜜月| 国产单亲对白刺激| 久久久久久久久久成人| 搡女人真爽免费视频火全软件 | 亚洲精品456在线播放app| 亚洲欧美日韩东京热| 亚洲综合色惰| 日韩亚洲欧美综合| 日日摸夜夜添夜夜添av毛片| 日本 av在线| 男人和女人高潮做爰伦理| 99热精品在线国产| av在线观看视频网站免费| 成人午夜高清在线视频| 精品久久久久久久久久久久久| ponron亚洲| 一个人免费在线观看电影| 亚洲久久久久久中文字幕| 全区人妻精品视频| 丰满乱子伦码专区| 成年免费大片在线观看| 黄色一级大片看看| 97超视频在线观看视频| 男人和女人高潮做爰伦理| 啦啦啦韩国在线观看视频| 亚洲国产精品sss在线观看| 插阴视频在线观看视频| 欧美一级a爱片免费观看看| 国产乱人视频| 日日摸夜夜添夜夜爱| 校园春色视频在线观看| 国产亚洲精品久久久久久毛片| 国产国拍精品亚洲av在线观看| 久久草成人影院| 午夜福利在线观看免费完整高清在 | 久久久久国产网址| 精品午夜福利在线看| 午夜激情欧美在线| 亚洲av五月六月丁香网| 精品国产三级普通话版| 日本一二三区视频观看| 真人做人爱边吃奶动态| 午夜a级毛片| av女优亚洲男人天堂| 国产免费男女视频| 久久久久久久久久黄片| 99热6这里只有精品| 看十八女毛片水多多多| 国产成人福利小说| 成年av动漫网址| 日本黄大片高清| 搡老妇女老女人老熟妇| 精品久久久噜噜| 国产精品福利在线免费观看| 免费大片18禁| 久久精品国产鲁丝片午夜精品| 一级黄色大片毛片| 国产国拍精品亚洲av在线观看| 麻豆精品久久久久久蜜桃| 人妻制服诱惑在线中文字幕| 国产精品久久久久久精品电影| 午夜精品在线福利| 欧美绝顶高潮抽搐喷水| 精品乱码久久久久久99久播| 国产精品一二三区在线看| 插逼视频在线观看| 国产一区二区激情短视频| 成年版毛片免费区| 亚洲国产欧洲综合997久久,| 国产v大片淫在线免费观看| 亚洲欧美精品自产自拍| 国产高清有码在线观看视频| 赤兔流量卡办理| 久久这里只有精品中国| 非洲黑人性xxxx精品又粗又长| h日本视频在线播放| 亚洲精品国产成人久久av| 久久精品国产亚洲av天美| 久久热精品热| 狠狠狠狠99中文字幕| 国内精品久久久久精免费| 美女大奶头视频| 国产片特级美女逼逼视频| 色综合色国产| 中国国产av一级| 国产精品一区二区免费欧美| 美女免费视频网站| 成人av在线播放网站| 亚洲欧美日韩东京热| 亚洲国产欧洲综合997久久,| 国产精品久久电影中文字幕| 国产乱人视频| 春色校园在线视频观看| 国产av一区在线观看免费| 免费在线观看成人毛片| 中文亚洲av片在线观看爽| 日日干狠狠操夜夜爽| 欧美潮喷喷水| www日本黄色视频网| 国产成人aa在线观看| 亚洲成人av在线免费| 欧美日韩乱码在线| 天堂网av新在线| 日韩欧美精品v在线| 国产人妻一区二区三区在| 国产高清不卡午夜福利| 成人漫画全彩无遮挡| 国产精品一区二区免费欧美| 97人妻精品一区二区三区麻豆| 国产真实乱freesex| av福利片在线观看| 一级毛片久久久久久久久女| 99热精品在线国产| www.色视频.com| 性欧美人与动物交配| 午夜福利高清视频| 免费观看的影片在线观看| 日本熟妇午夜| 国产精品爽爽va在线观看网站| 国产色爽女视频免费观看| 一a级毛片在线观看| 亚洲成人久久爱视频| 小说图片视频综合网站| 一夜夜www| 赤兔流量卡办理| 国产精品一区二区三区四区久久| 亚洲精品乱码久久久v下载方式| 日产精品乱码卡一卡2卡三| 久久午夜亚洲精品久久| 在线a可以看的网站| 国产黄色小视频在线观看| 国产精品不卡视频一区二区| 欧美精品国产亚洲| 中文字幕人妻熟人妻熟丝袜美| 搡老岳熟女国产| 午夜激情福利司机影院| av在线蜜桃| 最近手机中文字幕大全| 精品福利观看| 狠狠狠狠99中文字幕| 中文资源天堂在线| 床上黄色一级片| 男女那种视频在线观看| 男女做爰动态图高潮gif福利片| 欧美成人精品欧美一级黄| 97碰自拍视频| 在线免费十八禁| 免费观看在线日韩| 最后的刺客免费高清国语| 看十八女毛片水多多多| 日韩成人av中文字幕在线观看 | 国产一区二区三区av在线 | 99热全是精品| 日韩人妻高清精品专区| 国产欧美日韩一区二区精品| 在线天堂最新版资源| 国产精品久久久久久av不卡| 国产探花极品一区二区| 黄色视频,在线免费观看| 可以在线观看毛片的网站| 99热只有精品国产| 精品久久久久久久久久久久久| 最新中文字幕久久久久| 特大巨黑吊av在线直播| 国产 一区精品| 欧美中文日本在线观看视频| 日本五十路高清| 亚洲成人久久爱视频| 精品熟女少妇av免费看| 亚洲精品影视一区二区三区av| 黄色配什么色好看| 女人十人毛片免费观看3o分钟| 色5月婷婷丁香| av在线天堂中文字幕| 欧美日本视频| 99在线人妻在线中文字幕| 乱码一卡2卡4卡精品| 99热网站在线观看| 亚洲国产精品久久男人天堂| 一a级毛片在线观看| 成熟少妇高潮喷水视频| www日本黄色视频网| 干丝袜人妻中文字幕| 此物有八面人人有两片| 美女 人体艺术 gogo| 22中文网久久字幕| 热99re8久久精品国产| 欧美+亚洲+日韩+国产| 乱系列少妇在线播放| 国产高清视频在线播放一区| 国产伦精品一区二区三区四那| www日本黄色视频网| 精品日产1卡2卡| 在线观看一区二区三区| 亚洲人成网站在线播| 欧美日韩精品成人综合77777| 91精品国产九色| 久久精品国产自在天天线| 99热这里只有精品一区| 热99在线观看视频| 高清毛片免费看| 国产成人91sexporn| 精品人妻一区二区三区麻豆 | av在线播放精品| 亚洲欧美日韩东京热| 天美传媒精品一区二区| 欧美+日韩+精品| 日本免费a在线| 国产伦在线观看视频一区| 综合色av麻豆| 午夜视频国产福利| 国产一区二区三区在线臀色熟女| 日韩在线高清观看一区二区三区| 国产精品精品国产色婷婷| 国产精品99久久久久久久久| 搡老妇女老女人老熟妇| 色综合色国产| 亚洲婷婷狠狠爱综合网| 日本成人三级电影网站| 99riav亚洲国产免费| 女同久久另类99精品国产91| 高清毛片免费观看视频网站| 国产成人精品久久久久久| 亚洲欧美日韩高清专用| 我的老师免费观看完整版| 国产真实乱freesex| 22中文网久久字幕| 夜夜夜夜夜久久久久| 国产真实伦视频高清在线观看| 精品午夜福利视频在线观看一区| 男女下面进入的视频免费午夜| 亚洲精品乱码久久久v下载方式| 久久99热这里只有精品18| 久久久久精品国产欧美久久久| 99久久中文字幕三级久久日本| 丝袜喷水一区| 国产亚洲91精品色在线| 18+在线观看网站| av在线播放精品| 成人亚洲欧美一区二区av| 毛片女人毛片| 男女啪啪激烈高潮av片| 国产中年淑女户外野战色| 午夜影院日韩av| 中出人妻视频一区二区| 欧美bdsm另类| 国产综合懂色| 国产一区二区激情短视频| 亚洲性久久影院| 亚洲国产精品成人综合色| 国产视频一区二区在线看| 男插女下体视频免费在线播放| 人妻夜夜爽99麻豆av| 国产中年淑女户外野战色|