• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Steganography Using Reversible Texture Synthesis Based on Seeded Region Growing and LSB

    2018-06-01 11:12:25QiliZhouYongbinQiuLiLiJianfengLuWenqiangYuanXiaoqingFengandXiaoyangMao
    Computers Materials&Continua 2018年4期

    Qili Zhou, Yongbin Qiu, Li Li, , Jianfeng Lu , Wenqiang Yuan,Xiaoqing Feng and Xiaoyang Mao

    1 Introduction

    With the development of media and information technology [Gurusamy and Subramaniam(2017); Pradeep, Mridula and Mohanan (2016)], digital multimedia is popular in network transmission. Users are benefitted but information security is challenged. Information hiding technology has be-come a hot topic in the field of information security. Information hiding has been used in data confidentiality, identity authentication, copyright protection,piracy tracking and so on. Information hiding technology is accompanied with benchmarks such as insensitivity, robustness, and so on. Information hiding is divided into information hiding of image, video, audio, text and so on according to different carriers.Digital images are ideal as information hiding carrier because they are popular and contain a lot of information. Methods include space domain and transform domain depending on the current image information hiding scheme. Least Significant Bit (LSB) is one of the classical spatial domain algorithms, whereas the representative of the frequency domain algorithms is the spread spectrum algorithm proposed by Cox et al. [Cox, Kilian, Leighton et al. (1996)].

    In order to fundamentally resist the detection of all kinds of cryptographic analysis algorithms, the Coverless Image Steganography Without Embedding information hiding has been proposed in recent years. Compared with classical information hiding, coverless images do not need extra carriers except image itself, gets secret information directly from stego carriers. However, it is hard to fast and effectively hide of secret information, because there is no perfect image feature description method to map the original image with secret information.

    The generated or synthetic images with digital image processing are used in in-formation hiding besides the classic images. The texture images are resampled based on pixels or texture blocks to generate synthetic texture images with similar local appearance and arbitrary size. Secret information is embedded in the process of synthesis.

    We improve steganography using reversible texture synthesis [Wu and Wang (2014)].Firstly, the secret information is encrypted with RSA Asymmetrical Encryption Algorithm.Secondly, stego synthetic texture is constructed according to the secret information.Thirdly, the seeded region growing method is used as synthetic algorithm of texture blocks to increase the rationality of the texture. Finally, parameters for secret information extraction are embedded by the LSB method in the synthetic texture. The experimental results show that our synthetic texture is natural and has a good display effect.

    2 Related work

    Improvements to classical steganography methods yield good results. Zheng et al. [Zheng and Chen (2010)] proposed an improved bit-plane information hiding algorithm based on RGB color space. The secret information is embedded in blocks of RGB channels, because human eyes have different visual sensitivity to RGB. Their result has advantages over the direct bit-plane replacement algorithm, and information embedding capacity is higher. The algorithm meets the requirement of information hiding, but it is hard to keep robustness.Huang et al. [Huang and Yang (2011)] discussed the superiority and insufficiency about Image Information Hiding Technology based on LSB. Secret information is randomly embedded in the lowest level of the 8-bit plane of insignificant pixels. The secret information is made invisible. However, the algorithm is less robust and vulnerable to external attack due to the usage of insignificant pixels.

    Niu et al. [Niu and Zhang (2017)] proposed a reversible data hiding algorithm based on image interpolation. The scheme has a high embedding capacity and security. This method is limited by the need for adaptive prediction of texture images, and some image pixels are deleted in the process.

    As to coverless image steganography without embedding, Zhou et al. [Zhou, Sun, Harit et al. (2016)] proposed a coverless image steganography framework. It need not employ designated cover image for embedding secret information. Image hash sequence is generated when the sum of pixels between two blocks in the same image is compared. An image is represented by a single hash sequence. A series of images are found according to the secret information. These images are regarded as stego images since they already contain secret data. The disadvantage of this approach is that the hidden data are limited to 8 bits each image.

    As to robustness, Zheng et al. [Zheng, Wang, Ling et al. (2017)] proposed a new coverless steganography method based on SIFT features. Image hash sequence is generated with the orientation information of the SIFT feature points. Images containing secret information and an additional image are transmitted to receiver. Some important parameters are carried by the additional image. Based on the same principle, Zhou et al. [Zhou, Cao and Sun(2016)] introduced a coverless information hiding method based on the bag-of-words model(BOW). A set of sub-images related to the text information is found to be sent. These methods need additional information to transmit the necessary parameters and it is a conundrum to have a better algorithm to match images and secret information.

    In recent years, texture construction is used to hide information [Qian, Zhou, Zhang et al.(2017)]. Pan et al. [Pan, Qian and Zhang (2016)] proposed a new steganography method using texture construction. The principle is algorithm selects different shapes and background elements according to the secret information. With pre-defined transforming functions, the data-hider transforms the painted image to construct a stego image. The constructed stego image has good visual eあects, secret messages are properly hidden in the image. Different volumes of information can be hidden with different shape parameters.Wu et al. [Wu and Wang (2014)] proposed a novel approach for steganography using a reversible texture synthesis. A texture set is resampling the smaller collection of texture images, and the texture set is made up of similar local appearance of new texture image.Steganography and texture synthesis are combined to hide secret information. Compared with the method of using the cover image to hide information, their algorithm hides the source texture image and embed the secret information through the process of texture synthesis, allows recovery of the source texture during the process of message extraction.Different quantities of embedding capacity are made to produce a visually plausible texture image.

    Based on classical steganography, texture synthesis and coverless image steganography,we propose the steganography using reversible texture synthesis based on seeded region growing and LSB. While the secret information is hidden in the stego texture image, the stego texture image still has similar properties to the source texture. By using seeded region growing method to synthesize texture, image remains natural and realistic, has good display effect. We give details in the next sections.

    3 Proposed method

    The work by Wu et al. [Wu and Wang (2014)] is a path breaking study on steganography.However, we put forward a few problems. Firstly, secret messages are not encrypted and therefore vulnerable. Secondly, texture synthesis capacity is not fully used because the length of the secret message is variable. Thirdly, the visual effect of the texture image is impacted because the similarity among texture patches is only simply evaluated. And what is more, there is risk in the image transmission because not only the synthetic texture, but also some additional parameters need to be transmitted.

    The above problems considered, we propose an approach for steganography using a reversible texture synthesis based on seeded region growing and LSB. The synthetic texture is obtained by reassembling the current texture while secret messages are embedded.Security is important, the secret messages are transformed into strings using of image splitting is used in texture synthesis, the visual effect is therefore improved for the synthetic texture. Additional parameters are concealed using LSB based on the characteristics of PNG image, the security in the transmission of the encrypted strings is enhanced.

    3.1 Message embedding procedure

    The message embedding process is shown in Fig. 1. Details are described in the next five sections.

    Figure 1: The flowchart of secret messages embedding procedure

    A brief introduction to the symbols and parameters in Fig. 2 is as follows. As shown in Fig.2(a), the source texture is split into kernel blocks (Kw× Kh). KB represents the set of kernel blocks. Pdrepresents the size of the overlaid boundary. As shown in Fig. 2(b) and Fig. 2(c),these patches (Pw× Ph) are the source patches which is obtained by extending kernel blocks. The set of the patches is represented by SP, the number of elements in the set SP is represented by SPnwhich is ‖SP‖.As shown in Fig. 2(d), the mirror image that has the same size in the kernel block is copied to the ex-tended area if kernel block is located in the source texture’s boundary (the cases of kb1and kb5) in the process of extending boundary. w, the step length of alternative blocks, is then determined. CP represents the set alternative blocks (Pw× Ph) and it is obtained according to w in the extended source texture. The number of elements in the set CP is represented by CPnwhich is ‖CP‖.

    Figure 2: (a) Kernel blocks. (b) Source patch. (c) Extended kernel block and (d) Mirror extension. (a) Segmentation of non-overlapping kernel blocks from source texture; (b) The inner part of the dotted line is the kernel block, and the peripheral area is the extended boundary; (c) The source texture is extended from the kernel block to get the source patches;because the kb1 is located at the source texture boundary, the left and the upper part needs boundary expansion; (d) The red area mirrors and is copied to the green area

    3.2 Secret messages encryption based on asymmetric encryption

    The asymmetric encryption, RSA, is selected in the secret messages encryption [Zhang and Liu (2011)]. A pair of keys (public key and private key) is used in the asymmetric encryption. And their names (public and private) explicitly illustrate their functions.

    The receiver publishes its public key on the net whereas keeps its private key. The sender uses this public key (on the net by the receiver) to encrypt secret message M (digital string)and encrypted string E (digital string) is obtained. The receiver decrypts E using the private key and the secret message M is recovered. This process is shown in Fig. 3.

    Figure 3: Information transmission via public key and private key

    3.3 Encrypted string E segmentation with a square matrix

    String E is segmented with a square matrix (a matrix with the same number of rows and columns). The encrypted string E consists of decimal digits. Every digit is a character of the secret message and embedded into synthesized texture, as shown in Fig. 4(a). It results in redundancy of non-embedded blocks, if only one character of E is embedded. The redundancy in turn results in space waste and increase extraction difficulty. E is segmented in such groups, as shown in Fig. 4(b).

    Figure 4: (a) Embed directly and (b) Segment with a square matrix

    Assume that M is ′2926102129', and SPnis 2, the process of segmenting E is as follows.

    1) The length of E is: len is 10, from Eq. (1) and (2), the size of square matrix is: Tpw×Tphis 3 × 3, the capacity of matrix is: TPnis 9.

    2) From Eq. 3, capacity of stego texture synthesis is: TSnis 7. Because TSn≤ len, the texture synthesis does not have enough space for every digit.

    3) From Eq. 4, the delta of capacity is: dtis 7, dtdigits of the secret message need to be merged.

    4) Locating suitable digits for the mergence. Find digit ‘1’ and merge ‘1’ with the next digit. The number of digit ‘1’ in M is 2, c1is 2. The set of digit ‘1’ merged with the next digit is Q1= {10,12}. The elements in Q1are listed in ascending order. Q1is referred in sorting if c1≤ dt, and updated dtis dt? c1. Only the front dtelements in Q1are sorted if c1> dt, and updated dt≤ 0.

    5) M are further merged as follows. Step 4) is repeated, miis merged with the next digit, ‘mi’ {mi|i = 2,3,…,9}. The process does not stop till dt≤ 0. The result of splitting M is as follows:

    This mergence effectively decreases the space for embedding data and guarantees the digits are as small as possible after the mergence. The quality of texture synthesis is guaranteed and the impact to the final selecting Rank in CP blocks.

    3.4 Index matrix construction and workbench for texture synthesis

    An index square matrix and the workbench for texture synthesis should be constructed before the encrypted string E is embedded into texture synthesis. The index matrix records the location of the texture blocks in texture synthesis. Texture synthesis space is the storage for the texture blocks recorded in the index matrix. Index square matrix (Tpw× Tph) is obtained in pre-processing secret messages. Through the known overlaid boundary Pdand the size of the source texture block(Sw× Sh), the synthetic texture size (Tw× Th) can be calculated by Eq. (5). And each coordinate in the index matrix is related to a region in the corresponding texture area (Sw× Sh). An example of the index square matrix and the synthetic texture workbench is shown in Fig. 5.

    As shown in Fig. 5(a), the grey cells in the index square matrix is numbered pi{pi|i = 1,2,…,TPn}, the texture block sequence number represents the embedding order.The texture blocks are embedded according to the number in the index matrix, as shown in Fig. 5(b). The regions related with the cells with initialized ‘-1’ are not embedded with the texture. The black border is the overlaid region of texture blocks, the width of the black border is Pd, as shown in Fig. 5(b). An index matrix and the synthetic texture workbench are obtained in this way.

    Figure 5: An example of index matrix and synthetic texture workbench. (a) Index matrix construction and (b) Workbench for texture synthesis

    3.5 Embedding encrypted string and synthetic texture through seeded region growing algorithm

    Seeded region growing algorithm is used as texture synthesis strategy in encrypted string embedding process. We made improvement to texture block embedding [Wu and Wang(2014)]. The seeded region growing is used, the starting points are several randomly distributed seeds (a block with embedded texture) and grow synchronously. The character in-formation that is suitable for encrypted string E is selected. The CP block that is the nearest to the embedded texture is embedded into workbench. This helps the synthetic texture with good visual effect. Steps are as follows.

    1) Initialize index matrix with source texture. SPnblocks are assigned with the coordinate of seed point, the label of every seed point is pi{pi|i = 1, 2, …,TPn} and is recorded in index matrix. The labelled source texture blocks are embedded into workbench.

    2) Source texture blocks serve as starting points. The texture blocks (with piis 1) are the starting point and grow sideward in all four-directions. BFS (Breadth-First Search) is used and four neighbors are optional in the growth process, as shown in Fig. 6. One of the four directions is selected as starting direction. The sequence in our experiment is up-down-left-right. A round of growth consists of growth once in every of these four directions. The new starting point becomes pi+1 after the previous growth round. Any grown block is skipped if it is met by BFS.

    Figure 6: Seeded region growing strategy

    3) Embed encrypted string E. Alternative blocks in the set of CP are selected and overlaid with embedded texture. Information is embedded in the overlay process.As shown in Fig. 7, the embedding block CPiis overlaid with the embedded texture in the black area. MSE in black area of both block CPiand the embedded texture is calculated. The set of CP is sorted in ascending order of MSE. Rank is assigned according to ri{ri|i = 0, 1, …,CPn- 1}. The next selected embedding block is riaccording to the contents of encrypted string E. The label of this is pi{pi|i=SPn+1,SPn+2,…,TPn}.

    Figure 7: Overlay of embedding texture block with embedded texture

    4) Step 2) and 3) are repeated according to the sequence in the index matrix till the embedding in synthetic texture workbench is completed. The stego synthetic texture is obtained.

    3.6 PNG transparent layer parameters hiding based on LSB

    The size of kernel block (Kw× Kh), the size of source texture (Pw× Ph), and the sliding window size of the selected alternative block w need to be transmitted additionally when the synthetic texture image is transmitted in [Wu and Wang (2014)]. The additional transmission is harmful to security. So, we hide these additional parameters based on LSB.LSB is used to hide parameters in PNG transparent Alpha layer. The visual effect is never impacted because no pixel in the synthetic texture is changed. The steps are as follows.

    1) Convert parameters Kw, Pd, w, Tcinto binary form. Tcis obtained by Eq. (6). The elements in Tcdenote the coordinate (Tpw× Tph) of each stego texture of SP.

    2) Obtain the step length of parameter extraction Ewand converting it into binary form.The step length of parameter extraction is the same as the binary parameter string extraction. Ewis the longest among all step lengths. Every parameter is padded with‘0’ according to Ew.

    3) Concatenate parameters in Tcand obtains its length. The elements in the set of Tcis obtained. Kw, Pd, w and Tcform a binary string ts. Its length lentis also converted into binary form.

    4) A zeros square matrix Atwith dimension (Tpw× Tph) is used as PNG transparent layer, as shown in Fig. 8(a).

    Figure 8: (a) Zeros square matrix and (b) LSB embedding and extracting method

    5) Embed parameters. The splitting step length and string length are embedded into the end of the first and second row in At. tsis embedded from the beginning of the third row and onwards. It is easy for extraction to embed the binary string in the end, as shown in Fig. 8(b).

    6) Extraction starts when the first ‘1’ is accessed. The process is easy because the length of every string need not to be record.

    7) Synthesize PNG texture. The image with four channels is synthesized with stego texture after calculating 255?At. The PNG image with synthetic texture is obtained.

    3.7 Secret messages extraction

    The receiver gets a synthetic texture image with no additional information, as shown in Fig.9. Message extraction mainly consists of five steps: obtaining parameters, generating index tables, recovering source texture, texture seed point embedding and texture synthesis,extracting and verifying E in hidden synthetic texture, and recovering secret messages M through key.

    Figure 9: The flowchart of secret messages extracting procedure

    The steps of the extraction are as follows:

    1) The RGB three channels and the transparent Alpha channel are separated from the synthetic texture, and the additional parameters Kw, Pd, w, tsare obtained through the LSB extraction method.

    2) Source texture and index matrix recovery. The index matrix is reconstructed by the obtained additional parameters. The coordinates of the source texture block (Pw×Ph) in the matrix is obtained by reversed operation to the Tcset. The corresponding kernel blocks (Kw× Kh) are extracted from the synthetic texture according to these coordinates. The kernel blocks are arranged in order to obtain a recovered source texture which is exactly as same as the source texture.

    3) According to step 1) the parameters extracted and the source texture is rebuilt. The source patches setand candidate blocks setare generated by the new source texture.is embedded into the new workbench. The recovered synthetic texture is generated by seeded region growing. In the process of synthesis,is arranged in ascending order, so as to get the same Rank.

    4) Extract the encrypted string E. Unlike the embedding candidate blocks, the kernel

    block (Kw× Kh) is extracted from the synthetic texture block (Pw× Ph) at the same coordinates. The extracted kernel block is checked whether it is the same as any kernel block of the candidate blocks in the CP. If the same block is found, the corresponding Rank of the candidate block is the character of the encrypted string E. Otherwise, the embedded block is tampered or damaged and the encrypted string E is not valid.

    5) The receiver decrypts the acquired encrypted string E with the private key. The original secret information M is obtained.

    4 Experimental results

    Our proposed algorithm is compared to the previous work. The secret information of either 50-bit or 150-bit decimal is embedded in the 128×128 source texture. The kernel blocks of 32×32 are selected, and the extended boundary Pdis 8. The stego synthetic textures are generated according to the embedding algorithm in Section 3. The synthetic textures are shown in Tab. 1.

    Table 1: Results of stego synthetic textures

    ?

    Compared with Wu et al. [Wu and Wang (2014)], we have made improvement in the aspects in Tab. 2.

    Table 2: A fundamental of five differences between method in Wu et al. [Wu and Wang(2014)] and ours

    5 Conclusions and future work

    Our research makes improvement to steganography using reversible texture synthesis. This method is different from traditional steganography or texture synthesis. The texture is reorganized by using the seeded region growing algorithm, and the secret information is embedded in the process of synthesizing the texture. By using the LSB method, the important parameters are transferred together with the synthetic texture for the extraction of secret information. In further research, we will improve the selection strategy for the candidate blocks and increase the continuity of texture between the texture blocks.

    Acknowledgments:This work was mainly supported by National Natural Science Foundation of China (No.61370218), Public Welfare Technology and Industry Project of Zhejiang Provincial Science Technology Department (No. 2016C31081, No. LGG18F020013)

    Cox, I. J.; Kilian, J.; Leighton, F. T.; Shamoon, T.(1996): A secure, robust watermark for multimedia. Information Hiding, vol. 1174, pp. 185-206.

    Gurusamy, R.; Subramaniam, V.(2017): A machine learning approach for MRI brain tumor classification. Computers, Materials & Continua, vol. 53, no. 2, pp. 91-109.

    Huang, H.; Yang, S.(2011): Research on image information hiding technology based on LSB. Office Automation, no. 6, pp. 32-34 (In Chinese).

    Niu, X.; Zhang, M.(2017): A study of invertible information hiding algorithm based on interpolation images. Technology and Application in Web Security, vol. 43, no. 12, pp.120-129 (In Chinese).

    Pan, L.; Qian, Z.; Zhang, X.(2016): Digital steganography based on constructive texture image. Journal of applied science, vol. 34, no. 5, pp. 625-632 (In Chinese).

    Pradeep, A.; Mridula, S.; Mohanan, P.(2016): High security identity tags using spiral resonators. Computers, Materials & Continua, vol. 52, no. 3, pp. 185-195.

    Qian, Z.; Zhou, H.; Zhang, W.; Zhang, X.(2017). Robust steganography using texture synthesis. Advances in Intelligent Information Hiding and Multimedia Signal Processing.Springer International Publishing, vol. 63, pp. 25-33.

    Wu, K.; Wang, C.(2014): Steganography using reversible texture synthesis. IEEE Transactions on Image Processing A Publication of the IEEE Signal Processing Society, vol. 24, no. 1, pp. 130-139.

    Zhang, W.; Liu, C.(2011). Public key and private key in electronic commerce. Wealth of science and technology in China, no. 12, pp. 234-236 (In Chinese).

    Zheng, C.; Chen, J.(2010): A bit plane replacement information hiding algorithm based on RGB color space. Information System Engineering, no. 9, pp. 76-77 (In Chinese).

    Zheng, S.; Wang, L.; Ling, B.; Hu, D.(2017): Coverless information hiding based on robust image hashing. Intelligent Computing Methodologies, vol. 10363, pp. 536-547.

    Zhou, Z.; Cao, Y.; Sun, X.(2016): Coverless image information hiding based on image bag-of-words model. Journal of applied science, vol. 34, no. 5, pp. 527-536 (In Chinese).

    Zhou, Z.; Sun, H.; Harit, R.; Chen, X.; Sun, X.(2015): Coverless image steganography without embedding. International Conference on Cloud Computing and Security, vol.9483, pp. 123-132.

    三级毛片av免费| 久久国产精品大桥未久av| 亚洲精品国产区一区二| 国产无遮挡羞羞视频在线观看| 久久久久久人人人人人| 悠悠久久av| 精品人妻1区二区| 久久狼人影院| 久久久水蜜桃国产精品网| 18禁美女被吸乳视频| 91成年电影在线观看| 欧美日韩成人在线一区二区| 美女扒开内裤让男人捅视频| 无限看片的www在线观看| 日韩欧美国产一区二区入口| 精品人妻熟女毛片av久久网站| a在线观看视频网站| 国产精品久久电影中文字幕 | 亚洲欧美精品综合一区二区三区| 亚洲国产看品久久| 51午夜福利影视在线观看| 99久久精品国产亚洲精品| 搡老乐熟女国产| 国产精品1区2区在线观看. | 婷婷丁香在线五月| 欧美精品啪啪一区二区三区| 久久狼人影院| 亚洲精品自拍成人| 法律面前人人平等表现在哪些方面| 亚洲午夜理论影院| 十八禁高潮呻吟视频| 女性生殖器流出的白浆| 亚洲熟女精品中文字幕| 久久ye,这里只有精品| 一边摸一边抽搐一进一出视频| 老司机靠b影院| 久久久国产欧美日韩av| 91成年电影在线观看| 桃红色精品国产亚洲av| 国产av又大| 一本大道久久a久久精品| 久久 成人 亚洲| 免费在线观看黄色视频的| 国产亚洲精品久久久久5区| 亚洲精品粉嫩美女一区| 极品教师在线免费播放| 久久久久久久精品吃奶| 欧美色视频一区免费| 国产单亲对白刺激| 亚洲第一欧美日韩一区二区三区| 欧美大码av| 亚洲欧美一区二区三区久久| 侵犯人妻中文字幕一二三四区| 日韩欧美国产一区二区入口| 一区二区日韩欧美中文字幕| 国产精品九九99| 亚洲精华国产精华精| 亚洲人成伊人成综合网2020| 制服人妻中文乱码| 又黄又粗又硬又大视频| 国产精品综合久久久久久久免费 | 中文字幕人妻丝袜制服| 久久午夜亚洲精品久久| 亚洲一码二码三码区别大吗| 久久国产乱子伦精品免费另类| 人妻久久中文字幕网| bbb黄色大片| 欧美另类亚洲清纯唯美| 人人澡人人妻人| 久久 成人 亚洲| 久久久久国产精品人妻aⅴ院 | 激情视频va一区二区三区| 久久久国产成人精品二区 | 亚洲综合色网址| 丰满人妻熟妇乱又伦精品不卡| 人人妻人人添人人爽欧美一区卜| 午夜91福利影院| 一本综合久久免费| 午夜免费成人在线视频| 日韩精品免费视频一区二区三区| 国产av一区二区精品久久| 精品视频人人做人人爽| 亚洲少妇的诱惑av| 欧美另类亚洲清纯唯美| 亚洲在线自拍视频| 丁香六月欧美| 91九色精品人成在线观看| 日本一区二区免费在线视频| 女人被狂操c到高潮| 欧美日韩福利视频一区二区| 国产成人免费观看mmmm| 欧美久久黑人一区二区| 又黄又粗又硬又大视频| 老汉色∧v一级毛片| 亚洲国产精品sss在线观看 | 亚洲欧美激情在线| 啦啦啦免费观看视频1| 久久香蕉国产精品| 老鸭窝网址在线观看| 免费在线观看亚洲国产| 精品第一国产精品| 757午夜福利合集在线观看| 亚洲精品在线观看二区| 久久精品aⅴ一区二区三区四区| 国产欧美亚洲国产| 在线观看66精品国产| 欧美日韩瑟瑟在线播放| 久久婷婷成人综合色麻豆| 日韩免费av在线播放| 亚洲成人免费av在线播放| 男女床上黄色一级片免费看| 亚洲黑人精品在线| 日本撒尿小便嘘嘘汇集6| 欧美久久黑人一区二区| 在线观看66精品国产| 丁香欧美五月| 亚洲九九香蕉| 99香蕉大伊视频| 亚洲欧洲精品一区二区精品久久久| 王馨瑶露胸无遮挡在线观看| 国产精品久久久久久精品古装| 人人妻,人人澡人人爽秒播| 老熟女久久久| 欧美在线黄色| 国产又色又爽无遮挡免费看| 叶爱在线成人免费视频播放| 国产国语露脸激情在线看| 我的亚洲天堂| 老司机亚洲免费影院| 国产精品国产高清国产av | 亚洲精品美女久久av网站| 久久天躁狠狠躁夜夜2o2o| 老司机午夜福利在线观看视频| 欧美不卡视频在线免费观看 | 老司机午夜十八禁免费视频| xxx96com| 精品福利观看| 国产真人三级小视频在线观看| 久久中文字幕人妻熟女| 国产真人三级小视频在线观看| 丰满的人妻完整版| 午夜精品久久久久久毛片777| 精品一区二区三区av网在线观看| www.自偷自拍.com| 交换朋友夫妻互换小说| 最近最新中文字幕大全电影3 | 亚洲五月天丁香| 中文字幕最新亚洲高清| 不卡一级毛片| 老熟妇仑乱视频hdxx| 国产精品98久久久久久宅男小说| 亚洲欧美激情在线| 免费黄频网站在线观看国产| av有码第一页| 国产精华一区二区三区| 亚洲欧洲精品一区二区精品久久久| av免费在线观看网站| 国产野战对白在线观看| 啦啦啦 在线观看视频| 十八禁人妻一区二区| 欧美中文综合在线视频| 一本综合久久免费| 极品少妇高潮喷水抽搐| 美女高潮到喷水免费观看| 国产成人影院久久av| 久久久久久亚洲精品国产蜜桃av| 亚洲成人手机| 国产亚洲av高清不卡| 日韩欧美三级三区| 日本vs欧美在线观看视频| 久久精品国产综合久久久| 国产又色又爽无遮挡免费看| 99久久国产精品久久久| 一级a爱视频在线免费观看| 国产欧美亚洲国产| av网站在线播放免费| 国产精品99久久99久久久不卡| 免费在线观看完整版高清| 国产成人一区二区三区免费视频网站| 国产视频一区二区在线看| 19禁男女啪啪无遮挡网站| 国产亚洲欧美98| 久久久久国产精品人妻aⅴ院 | 精品无人区乱码1区二区| 女性被躁到高潮视频| 亚洲男人天堂网一区| 免费在线观看亚洲国产| 亚洲三区欧美一区| 成在线人永久免费视频| 日韩欧美在线二视频 | e午夜精品久久久久久久| 97人妻天天添夜夜摸| 天堂动漫精品| √禁漫天堂资源中文www| 少妇粗大呻吟视频| 电影成人av| 欧美精品av麻豆av| 国产野战对白在线观看| 这个男人来自地球电影免费观看| 日韩免费高清中文字幕av| 国产欧美日韩一区二区三| 在线观看日韩欧美| 欧美不卡视频在线免费观看 | 很黄的视频免费| 久热爱精品视频在线9| 成年人免费黄色播放视频| 国产成人欧美在线观看 | 无人区码免费观看不卡| 一边摸一边做爽爽视频免费| 狠狠婷婷综合久久久久久88av| 精品第一国产精品| 国产淫语在线视频| 日韩有码中文字幕| 国产亚洲av高清不卡| 90打野战视频偷拍视频| 伦理电影免费视频| 女人高潮潮喷娇喘18禁视频| 两性夫妻黄色片| 午夜91福利影院| 欧美午夜高清在线| 狂野欧美激情性xxxx| 一级黄色大片毛片| 国产免费现黄频在线看| 国产高清国产精品国产三级| 日本欧美视频一区| 久9热在线精品视频| 免费一级毛片在线播放高清视频 | 欧美精品亚洲一区二区| 99国产综合亚洲精品| 亚洲欧洲精品一区二区精品久久久| 人人妻,人人澡人人爽秒播| 99riav亚洲国产免费| 亚洲专区字幕在线| 美女高潮到喷水免费观看| 欧美一级毛片孕妇| 午夜视频精品福利| 欧美亚洲 丝袜 人妻 在线| 91九色精品人成在线观看| 国产亚洲精品第一综合不卡| 天天添夜夜摸| 亚洲中文字幕日韩| 天天躁夜夜躁狠狠躁躁| 久久中文字幕一级| 69精品国产乱码久久久| 怎么达到女性高潮| 亚洲精品在线观看二区| 母亲3免费完整高清在线观看| 国产精品电影一区二区三区 | 午夜福利免费观看在线| 99久久综合精品五月天人人| 一本综合久久免费| 久久天堂一区二区三区四区| 99久久国产精品久久久| 国产乱人伦免费视频| 国产一区在线观看成人免费| 中文字幕人妻丝袜制服| 一级作爱视频免费观看| 美女扒开内裤让男人捅视频| 一二三四在线观看免费中文在| 国产av一区二区精品久久| 欧美成狂野欧美在线观看| 国精品久久久久久国模美| 久久精品国产a三级三级三级| 俄罗斯特黄特色一大片| 91麻豆av在线| 久热爱精品视频在线9| 男女床上黄色一级片免费看| 人人妻人人澡人人看| 国产在视频线精品| 在线观看免费视频网站a站| 欧美亚洲 丝袜 人妻 在线| 亚洲色图综合在线观看| 精品亚洲成国产av| 色精品久久人妻99蜜桃| 精品久久久久久久久久免费视频 | 欧美日韩av久久| 亚洲av电影在线进入| 高清在线国产一区| av线在线观看网站| 男女之事视频高清在线观看| 欧美日韩福利视频一区二区| 午夜福利乱码中文字幕| 成人亚洲精品一区在线观看| 久久精品亚洲av国产电影网| 淫妇啪啪啪对白视频| 嫩草影视91久久| 性色av乱码一区二区三区2| 亚洲精品国产一区二区精华液| 亚洲欧美日韩另类电影网站| 19禁男女啪啪无遮挡网站| 免费不卡黄色视频| 欧美人与性动交α欧美软件| 两个人免费观看高清视频| 欧美精品一区二区免费开放| 久久精品国产综合久久久| 久久狼人影院| 欧美精品一区二区免费开放| 9191精品国产免费久久| 亚洲片人在线观看| 如日韩欧美国产精品一区二区三区| 国产成人精品久久二区二区免费| 一区二区日韩欧美中文字幕| 国产欧美日韩一区二区精品| 欧美日韩瑟瑟在线播放| 久久中文字幕一级| 精品高清国产在线一区| 国产欧美亚洲国产| 国精品久久久久久国模美| 日韩欧美三级三区| 黑人欧美特级aaaaaa片| 亚洲视频免费观看视频| 午夜成年电影在线免费观看| 国产真人三级小视频在线观看| 日韩一卡2卡3卡4卡2021年| 亚洲国产欧美日韩在线播放| 两性夫妻黄色片| 久热爱精品视频在线9| 日本a在线网址| 在线观看舔阴道视频| 99在线人妻在线中文字幕 | 国产主播在线观看一区二区| 夫妻午夜视频| 亚洲精品久久成人aⅴ小说| 久久久久国产一级毛片高清牌| 人人妻,人人澡人人爽秒播| 制服诱惑二区| 不卡av一区二区三区| 亚洲少妇的诱惑av| 美女视频免费永久观看网站| 极品少妇高潮喷水抽搐| 精品久久久久久久毛片微露脸| 91麻豆av在线| 亚洲色图av天堂| 亚洲中文av在线| 精品一区二区三区av网在线观看| 欧美午夜高清在线| 久久人妻av系列| 精品国产美女av久久久久小说| 欧美中文综合在线视频| 日韩欧美一区二区三区在线观看 | 在线观看66精品国产| 国产精品久久久久久人妻精品电影| 99国产精品一区二区三区| 精品国产乱码久久久久久男人| 亚洲午夜理论影院| 国内毛片毛片毛片毛片毛片| 国产免费男女视频| 亚洲av熟女| 不卡av一区二区三区| 午夜亚洲福利在线播放| av不卡在线播放| 黄频高清免费视频| 免费日韩欧美在线观看| 香蕉丝袜av| 久久精品国产综合久久久| 亚洲av电影在线进入| 国产成人精品久久二区二区免费| 极品教师在线免费播放| 欧美 亚洲 国产 日韩一| 久久人妻福利社区极品人妻图片| 亚洲专区字幕在线| 男女下面插进去视频免费观看| 亚洲va日本ⅴa欧美va伊人久久| 狠狠婷婷综合久久久久久88av| 亚洲专区字幕在线| 国产成人精品久久二区二区91| 国产精品乱码一区二三区的特点 | videosex国产| 久久精品国产综合久久久| 成在线人永久免费视频| 欧美 亚洲 国产 日韩一| 51午夜福利影视在线观看| 9191精品国产免费久久| 久久人妻熟女aⅴ| 久久精品亚洲熟妇少妇任你| 亚洲一码二码三码区别大吗| 在线观看66精品国产| 免费看十八禁软件| 不卡一级毛片| 视频区图区小说| 久久精品国产a三级三级三级| 性少妇av在线| 欧美在线黄色| 正在播放国产对白刺激| 亚洲熟妇中文字幕五十中出 | 91字幕亚洲| 免费在线观看黄色视频的| 久久人人97超碰香蕉20202| 午夜老司机福利片| 国产一区有黄有色的免费视频| 两人在一起打扑克的视频| 涩涩av久久男人的天堂| 亚洲综合色网址| 在线观看免费视频网站a站| 免费av中文字幕在线| 国产不卡av网站在线观看| 久久影院123| 高清视频免费观看一区二区| 9色porny在线观看| 搡老岳熟女国产| 亚洲一区二区三区欧美精品| 一边摸一边抽搐一进一小说 | 日本精品一区二区三区蜜桃| 亚洲欧洲精品一区二区精品久久久| 国产淫语在线视频| 久久久久久亚洲精品国产蜜桃av| 国产欧美日韩一区二区三区在线| 最新的欧美精品一区二区| 亚洲色图av天堂| 欧美日韩亚洲综合一区二区三区_| 人妻丰满熟妇av一区二区三区 | 欧美日韩一级在线毛片| 亚洲精品成人av观看孕妇| 最近最新免费中文字幕在线| 下体分泌物呈黄色| 最近最新中文字幕大全免费视频| 精品卡一卡二卡四卡免费| 91成年电影在线观看| 怎么达到女性高潮| 精品久久久精品久久久| 日韩精品免费视频一区二区三区| 国产成人一区二区三区免费视频网站| 亚洲五月色婷婷综合| 亚洲av日韩在线播放| 韩国av一区二区三区四区| 宅男免费午夜| 人妻久久中文字幕网| 身体一侧抽搐| 天天操日日干夜夜撸| 亚洲午夜理论影院| 人人妻人人爽人人添夜夜欢视频| 99久久综合精品五月天人人| 亚洲精品国产区一区二| 一级片免费观看大全| 天天躁日日躁夜夜躁夜夜| 一二三四社区在线视频社区8| 国产成人啪精品午夜网站| 国产精品影院久久| 男人操女人黄网站| 午夜福利免费观看在线| 香蕉久久夜色| 亚洲中文av在线| 久久久久久久久免费视频了| av视频免费观看在线观看| 亚洲精品乱久久久久久| 丝瓜视频免费看黄片| 久久香蕉激情| 国产无遮挡羞羞视频在线观看| 一边摸一边抽搐一进一小说 | 国产亚洲欧美在线一区二区| 黄片播放在线免费| 国产91精品成人一区二区三区| 成人三级做爰电影| 国产一区有黄有色的免费视频| 99热网站在线观看| 99国产极品粉嫩在线观看| 99香蕉大伊视频| 亚洲精品中文字幕在线视频| 国产黄色免费在线视频| 欧美精品亚洲一区二区| 啪啪无遮挡十八禁网站| 热99国产精品久久久久久7| 免费观看人在逋| 香蕉久久夜色| 叶爱在线成人免费视频播放| 99久久99久久久精品蜜桃| 国产免费现黄频在线看| 亚洲 欧美一区二区三区| 人妻一区二区av| 最新美女视频免费是黄的| 91麻豆精品激情在线观看国产 | 精品卡一卡二卡四卡免费| 国产精品自产拍在线观看55亚洲 | 男女下面插进去视频免费观看| 老熟妇乱子伦视频在线观看| 男女免费视频国产| 两性午夜刺激爽爽歪歪视频在线观看 | 国产成人av激情在线播放| 日韩欧美三级三区| 久久久国产精品麻豆| 久久国产精品人妻蜜桃| 欧美黄色片欧美黄色片| 女警被强在线播放| 日韩免费av在线播放| 精品熟女少妇八av免费久了| 婷婷成人精品国产| 青草久久国产| 亚洲精品在线美女| 欧美激情高清一区二区三区| 精品久久久久久久久久免费视频 | a级毛片黄视频| 男女之事视频高清在线观看| 精品国产国语对白av| 美女高潮到喷水免费观看| 夜夜躁狠狠躁天天躁| www.999成人在线观看| 夜夜躁狠狠躁天天躁| 十八禁网站免费在线| 我的亚洲天堂| 国产一区二区三区综合在线观看| 亚洲精品av麻豆狂野| 一二三四社区在线视频社区8| 人妻丰满熟妇av一区二区三区 | 国产精品秋霞免费鲁丝片| 18禁观看日本| 99热国产这里只有精品6| 天天躁夜夜躁狠狠躁躁| 视频区图区小说| www.自偷自拍.com| 亚洲人成伊人成综合网2020| 91成人精品电影| 大码成人一级视频| 精品国产一区二区三区四区第35| 99久久综合精品五月天人人| 国产又色又爽无遮挡免费看| 免费久久久久久久精品成人欧美视频| 国产精品香港三级国产av潘金莲| 日韩欧美在线二视频 | 正在播放国产对白刺激| 1024香蕉在线观看| 人人澡人人妻人| 亚洲熟妇熟女久久| 少妇猛男粗大的猛烈进出视频| 国产精品一区二区在线观看99| 午夜91福利影院| 天堂中文最新版在线下载| 岛国在线观看网站| 最近最新免费中文字幕在线| 国产精品亚洲一级av第二区| 香蕉国产在线看| 久久久久久久国产电影| 精品无人区乱码1区二区| 精品久久久久久,| 成熟少妇高潮喷水视频| 在线永久观看黄色视频| 久久影院123| 十八禁网站免费在线| 国产成人精品久久二区二区免费| 亚洲熟妇中文字幕五十中出 | 欧美色视频一区免费| 999久久久精品免费观看国产| 欧美色视频一区免费| 18禁观看日本| 久久久久视频综合| 美女午夜性视频免费| 中文字幕最新亚洲高清| 人人妻人人爽人人添夜夜欢视频| 50天的宝宝边吃奶边哭怎么回事| 亚洲精品粉嫩美女一区| 精品久久久精品久久久| 男女下面插进去视频免费观看| 亚洲专区国产一区二区| 中国美女看黄片| 久久久精品区二区三区| 别揉我奶头~嗯~啊~动态视频| 国产精品影院久久| 亚洲综合色网址| 日本黄色日本黄色录像| av一本久久久久| 亚洲中文日韩欧美视频| 啦啦啦 在线观看视频| 成人精品一区二区免费| 欧美激情 高清一区二区三区| 国产日韩一区二区三区精品不卡| 99re6热这里在线精品视频| 99精品在免费线老司机午夜| 成在线人永久免费视频| 欧美 亚洲 国产 日韩一| 亚洲人成77777在线视频| 欧美乱码精品一区二区三区| 色94色欧美一区二区| 亚洲色图综合在线观看| 国产三级黄色录像| 美女福利国产在线| 一二三四社区在线视频社区8| 啦啦啦视频在线资源免费观看| 日韩熟女老妇一区二区性免费视频| 成人精品一区二区免费| 51午夜福利影视在线观看| 久久国产精品影院| 国产欧美日韩一区二区精品| 国产精品影院久久| 国产区一区二久久| 久久国产精品男人的天堂亚洲| 在线播放国产精品三级| 在线观看免费视频网站a站| 国内久久婷婷六月综合欲色啪| 国产精品国产av在线观看| 国产激情久久老熟女| 国产精品香港三级国产av潘金莲| 欧洲精品卡2卡3卡4卡5卡区| 久久精品熟女亚洲av麻豆精品| 夫妻午夜视频| 在线免费观看的www视频| 国产激情欧美一区二区| 久久精品人人爽人人爽视色| 脱女人内裤的视频| 黄色视频,在线免费观看| 激情在线观看视频在线高清 | 香蕉久久夜色| 亚洲精品自拍成人| 亚洲 国产 在线| 777米奇影视久久| 美女高潮喷水抽搐中文字幕| 亚洲欧美一区二区三区久久| 久久天躁狠狠躁夜夜2o2o| 一进一出抽搐gif免费好疼 | 黄色怎么调成土黄色| 精品国产乱码久久久久久男人| 麻豆乱淫一区二区| 精品无人区乱码1区二区| 日韩成人在线观看一区二区三区| 两人在一起打扑克的视频| 国产高清激情床上av| 久久青草综合色|