• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Efficient Secure Data Provenance Scheme in Multimedia Outsourcing and Sharing

    2018-08-15 10:38:20ZhenYangYongfengHuangXingLiandWenyuWang
    Computers Materials&Continua 2018年7期

    Zhen Yang , Yongfeng Huang , , Xing Li and Wenyu Wang

    Abstract: To cope with privacy leakage caused by multimedia outsourcing and sharing,data provenance is used to analyze leaked multimedia and provide reactive accountability.Existing schemes of multimedia provenance are based on watermarking protocols. In an outsourcing scenario, existing schemes face two severe challenges: 1) when data leakage occurs, there exists a probability that data provenance results can be repudiated, in which case data provenance tracking fails; and 2) when outsourced data are shared, data encryption transfer causes key management burden outside the schemes, and privacy leakage threatens users. In this paper, we propose a novel data provenance scheme with an improved LUT-based fingerprinting protocol, which integrates an asymmetric watermarking protocol, robust watermark algorithm and homomorphic encryption and digital signatures to achieve full non-repudiation provenance. We build an in-scheme stream cipher to protect outsourced multimedia data from privacy leakage and complicated key management. Our scheme is also lightweight and easy to deploy. Extensive security and performance analysis compares our scheme with the state of the art. The results show that our scheme has not only better provenance security and data confidentiality but also higher efficiency for multimedia outsourcing, sharing and provenance.

    Keywords: Data provenance, asymmetric fingerprint protocol, digital watermarking,multimedia outsourcing.

    1 Introduction

    In multimedia data distribution, copyright violation disputes become an important problem because of illegal redistribution. To solve this problem, data provenance has been introduced to “construct a disclosure chain of given data” [Wohlgemuth, Echizen,Soneharaand et al. (2010)]. Data provenance identifies “where a piece of data came from and the process by which it arrived in a database” [Buneman, Khanna and Tan (2001)]. In the most common case, multimedia data provenance involves letting the Data Provider embed a distinctive robust digital watermark, called a fingerprint, into each authorized users’ data. Every distribution’s copyright information can be extracted from the fingerprint, which makes illegal redistribution identifiable.

    Recently, data outsourcing services, such as cloud storage, have become more and more popular. However, while data are outsourced, data control is also outsourced. Thus, data leakage threats are becoming more and more serious [Sundareswaran, Squicciarini, Lin et al. (2011)]. When outsourced data leakage occurs, users have to resort to data provenance for accountability.

    Among the varieties of approaches of data provenance, watermarking protocols play an important role, especially for multimedia data. A basic problem is the issue of the customer’s rights. When the watermark is embedded by the Data Provider, a customer whose watermark has been found on unauthorized copies can claim that he has been framed by a malicious Data Provider who has embedded his identity in an arbitrary object[Bianchi and Piva (2013)]. To cope with this customer’s rights problem, an asymmetric watermarking protocol has been proposed whereby only the customer has access to the watermarked data, and thus the Data Provider can later prove that a found copy of data has been shared by the customer. Several such suitable protocols include Buyer-Seller Watermarking Protocols (BSWP) [Memon and Wong (2001); Kuribayashi and Tanaka(2005); Prins, Erkin and Lagendijk (2007)], Zero-Knowledge Watermarking Protocols(ZKWP) [Wohlgemuth, Echizen, Soneharaand et al. (2010); Tharaud, Wohlgemuth,Echizen et al. (2010)], and Oblivious Transfer Watermarking Protocols (OTWP) [Backes,Grimm and Kate (2014)].

    Existing watermarking techniques for outsourced data provenance have been developed to address two significant practical issues. The security problem is related to data provenance’s non-repudiation. With a robust watermark (usually called a fingerprint)embedded into the multimedia data, the data copy can be used to identify the user corresponding with the fingerprint. To ensure data provenance’s non-repudiation, the watermarking protocol should protect the watermarked data so that it is only touched by the user that the watermark identifies. Although ZKWP and OTWP [Wohlgemuth,Echizen, Sonehara et al. (2011); Backes (2016)] have been proposed, non-repudiation is still not fully ensured in outsourcing data sharing scenarios.

    The second issue is related to the privacy protection of multimedia data. When outsourced multimedia data are shared, the Data Provider needs to transfer data to another user. To protect data privacy, the Data Provider has to use an encryption algorithm, which is not considered in existing multimedia provenance schemes[Wohlgemuth, Echizen, Sonehara et al. (2011); Backes, Grimm and Kate (2016)]. Even without considering the encryption and decryption computation burden, key management is quite complicated: Data encryption usually needs mixed encryption in which symmetric and asymmetric keys are both used, and data provenance needs to use other keys in the scheme as well. Complicated key management schemes always face privacy leakage attacks, which can be caused by key misuse.

    In our work, we propose a novel multimedia provenance scheme to cope with the nonrepudiation problem, especially in the scenario of outsourcing data sharing. On the basis of LUT-based watermark embedding [Bianchi and Piva (2014)], we present an LUT-based fingerprinting protocol that fuses asymmetric watermarking protocol, robust watermark, homomorphic encryption and digital signature, and achieve non-repudiation for every participant. In consideration of key management, we bring about a stream cipher in our provenance scheme to implement multimedia encryption for outsourcing,which controls all keys in our scheme and protects multimedia data privacy from leakage.Moreover, we make some reductions to make the protocol efficient with regard to computational cost. Our contribution in this work can be summarized as the following three aspects:

    1) We provide a multimedia provenance scheme with an improved LUT-based fingerprinting protocol. The scheme ensures full non-repudiation for every participant in a multimedia outsourcing scenario.

    2) We design a stream cipher for multimedia data that is seamless integrated in the provenance scheme to control key management in multimedia outsourcing and sharing and to prevent privacy leakage caused by key abuse.

    3) Our scheme has not only stronger security but also greater efficiency than the state of the art, and can be adapted for various watermarking algorithms. The efficiency and usability makes our protocol easy to deploy in reality.

    The rest of the paper is organized as follows: Section 2 overviews the related work and Section 3 offers preliminaries. Then, we introduce the problem statement in Section 4,followed by the detailed description of our scheme in Section 5. Section 6 analyze system security. Then, Section 7 gives the performance evaluation. Finally, Section 8 presents the paper’s conclusions.

    2 Related work

    As data provenance has a great influence on accountability for data leakage, many different approaches have been proposed. There are two main directions for building data provenance among these approaches: Reliable logging and asymmetric watermarking protocols. We review the two approaches below.

    2.1 Reliable logging schemes

    Reliable logging based schemes was proposed for secure provenance in Hasan et al.[Hasan, Sion and Winslett (2009)]. The scheme adopted a hash chain to generate associated logs for data provenance, but only supported record of data writing.

    In 2011, data-centric log mechanism was designed to record several normal data operations [Ko, Kirchberg and Lee (2011)]. Later, an automated logging mechanism was proposed to be executed by data itself [Sundareswaran, Squicciarini, Lin et al. (2011)]. In the scheme, data operation can be recorded into logs by a JAR that encloses the data. An extension work adapted an automated logging scheme to the cloud storage environment and improved log generation and storage efficiency [Yang, Wang and Huang (2017)].

    However, logs can still be tampered to disable the above provenance schemes. Their alternative solutions involve finding a responsible party for the attack, which is not the leakage provenance.

    2.2 Asymmetric watermarking protocols

    To resist malicious deletion attacks, robust digital watermark was used to save provenance information [Wohlgemuth, Echizen, Sonehara et al. (2010)]. Thus they proposed a provenance scheme of robust digital watermark tags that are embedded into data.

    In the data distribution, we still require asymmetric watermarking protocol in which every participant (distributor or receiver) only holds a data copy embedded into his watermark. Subsequently, Wohlgemuth et al. [Wohlgemuth, Echizen, Sonehara et al.(2011)] put forward an asymmetric watermarking protocol based on commitment of a zero knowledge proof. Although provenance security is ensured, commitment computation yields heavy burden on practical deployment.

    Backes et al. [Backes, Grimm and Kate (2014); Backes, Grimm and Kate (2016)]proposed an oblivious-transfer-based watermarking protocol to trace the provenance of multimedia data. They proved that this scheme is obviously lightweight with regard to both time and space costs. However, the scheme just has a possible security, which is not secure enough.

    3 Preliminaries

    3.1 LUT-Based watermark embedding

    Given a vector x=(x1,x2,…,xM) representing a set of features of the original data and a hidden fingerprint of user U represented as a binary vector bU= (bU1,…,bUL), an embedder inserts the fingerprint bUinto host signal data to produce watermarked data y.Often bUis transferred to the same size of x as a watermark signal w, so the watermarking can be expressed simply as y=x+w.

    In LUT-Based Watermark Embedding [Celik, Lemma, Katzenbeisser et al. (2008)], the Data Provider generates a long-term Look-Up Table (LUT) E with size T for the master encode, whose entries are i.i.d. random variables following a Gaussian distribution N(0,). Then, the Data Provider generates an LUT WUwith size T from bU. With E and WU, the Data Provider can calculate the personalized decode LUT DUwith size T:

    Then with a session key, an M × R set of values ti?is generated featuring integers between 1 and T for i=1,… ,M and ? =1,… ,R. Calculated with a perceptual mask vector pm=(pm0,…,pmM) that ranges within [0,1], each of the M data features x can be encoded by adding R perceptual masked entries of the encoding LUT E identified by the indexes ti1,…,tiR, obtaining the encoded feature as follows:

    Then, the data consumer can also use the session key to get ti?. Each of the M encoded features c can be decoded by adding R entries of the decoding LUT DUidentified by the indexes ti1,…,tiR, obtaining the decoded feature as follows:

    3.2 Homomorphic cryptosystem

    A homomorphic cryptosystem has an operator Φ( · ,· ) in a ciphertext field related to an operator ? in a plaintext field such that, for any two plain messages m1and m2, we have:Φ(?m1?,?m2?)= ?m1?m2?, where ? · ? denotes the encryption operator. Homomorphic encryption allows a set of operations to be performed by working on encrypted data. In particular, an additively homomorphic cryptosystem usually maps an addition in the plaintext domain to a multiplication in the ciphertext domain, which means that ?m1???m2? = ?m1+m2?. Then, for a constant integer a, ?m?a= ?m ?a?. A well-known additively homomorphic asymmetric encryption scheme was proposed by Paillier[Paillier (1999)].

    3.3 Robust spread spectrum watermark

    Cox et al. [Cox, Kilian, Leighton et al. (1997)] proposed a popular robust watermark with spread spectrum, which shows strong resilience to lossy operations, such as aggressive scale changes, JPEG compression, dithering and data conversion. The watermark vector has a distribution of N(0,σw2).

    Before watermark embedding, the original image img needs to be preprocessed with a DCT transformation and zigzag scan. We use dctimg to represent the preprocessed vector.

    The watermark vector is embedded into a subset of dctimg, the lowest frequency DCT AC coefficients, to ensure robustness without causing perceptible artifacts.

    4 Problem statement

    4.1 System model

    Fig. 1 shows a multimedia data outsourcing and sharing architecture including three entities as follows.

    Figure 1: Architecture of data outsourcing and sharing

    Data Provider (DP): An entity that outsources its data to an Outsourcing Server can authorize other users as Data Consumers to access that outsourced data. For any given piece of data, there is only one data provider.

    Outsourcing Server (OS): An entity that stores data from the Data Provider can transfer data to authorized users (Data Consumers) at their request.

    Data Consumer (DC): An entity that hopes to access data on an Outsourcing Server can ask the Data Provider for authorization and ask the Outsourcing Server for data. For any given piece of data, there may be several data consumers.

    In the architecture above, the DP hopes that every data copy can be embedded into the fingerprint of a related authorized DC. Once the data leaks, the DP can use a leaked data copy to trace the provenance, ensure accountability and compensate for its loss.

    4.2 Security model

    We consider a secure scheme to exhibit the following characteristics. 1) No cross-holding:The DC cannot access the original data, whereas the DP cannot access the data copy that embeds the DC’s fingerprint. Moreover, neither the original data nor the DC’s data copy can be accessed by the OS. 2) No framing: When a user has not leaked data, he cannot be framed by anyone as the leakage provenance.

    With these two properties achieved, a data provenance scheme definitely exhibits nonrepudiation, which means that no suspect can deny the leakage. As the security definitions given by Wohlgemuth et al. [Wohlgemuth, Echizen, Sonehara et al. (2011);Backes, Grimm and Kate (2016)] both express no denial and no framing, our security model builds these properties based on a more specific trust assumption as below.

    The DP first hopes that every shared data copy can be traced for provenance. On the condition that the provenance principle is not violated, the DP may collude with other participants to frame another user.

    Based on this trust assumption, our security model ensures strong results, i.e. correctness and non-repudiation of data provenance. In addition, the OS is introduced that enables our security model to be more suitable for a practical three-party system model.

    5 The proposed scheme

    This section presents our data provenance scheme in detail. We start from an overview of the entire scheme framework. Then, we introduce three underlying protocols to show how non-repudiation is achieved in our scheme design.

    In our scheme, we assume that there is a PKI in our framework, which means that each participant (DP/OS/DC) has a pair consisting of a public key and private key. For the purpose of our discussion, we take an image file as an example of multimedia data.Running our outsourcing multimedia provenance protocol includes three phases:

    Secure Outsourcing: The DP encrypts the original data with an LUT-based stream cipher and then uploads the ciphertext data to the OS.

    Secure Sha ring: The DC sends a data request to the DP. After the DP permits authorization of the DC, the DP sends a stream key to the DC for data decryption.

    Data Provenance: When the DP finds a leaked copy of its data, it extracts the fingerprint from the leaked copy. With the extracted fingerprint, the DP can identify the leakage data provenance.

    5.1 Improved LUT-based fingerprint enabled secure outsourcing

    In our architecture, as Fig. 1 shows, multimedia data outsourcing needs both encryption preprocessing for confidentiality and fingerprinting for accountability.

    Although classical LUT-based watermarking enables watermark vector embedding between the DP and DC directly, neither transferring the fingerprint into the watermark vector nor encrypting the watermarked data are included. Therefore, we integrate these two parts seamlessly to propose our improved LUT-based fingerprinting for secure outsourcing.

    The user first uses binary antipodal modulation to generate the fingerprint message with L-bit fingerprint b: fm=σw·(2b?1) . Then, a T×L generation matrix G is used to process fm to get W, which is subject to N(0,): W=G ·fm.

    G is a matrix of linear block code. Note that G can be derived with repetition code, which means that G only has one entry equal to 1 in each row and approximately T/L entries equal to 1 in each column. Another means of generating G is that all entries of G are subject to N(0,1/L) i.i.d., which is called Gaussian random code.

    Thus, the Decode LUT for fingerprinting can be derived as below:

    we remove ti?in LUT-based watermark embedding to enhance efficiency:

    Then we use a session key sek to generate the mask vector Emask, whose length is that of dctimg minus that of the encode LUT E. Thus, we concatenate E and Emaskto generate a vector Efull, which has the same length as the AC coefficients of dctimg:Efull=E|Emask. Then, we embed Efullinto dctimg, which means that E is embedded into the real watermark frequency band and that Emaskis embedded into all other frequency bands: encdctimg=dctimg+α·Efull, and this encdctimgis the ciphertext image. Thus, we use sek and the watermark approach to build a stream cipher on a multimedia image. For non-image multimedia data, we can take advantage of the corresponding frequency transformation domain to embed in all frequencies of the data.To protect the encdctimgreal watermark frequency band from recognition for malicious tampering, the DP chooses E and Emasksubject to the same distribution N(0,σE2) i.i.d.To ensure that encdctimgis incomprehensible, σEis identified as a large number.

    Finally, the DP can outsource encdctimgto the OS directly.

    5.2 Secure sharing protocol

    In the data outsourcing scenario, the Data Consumer (DC) shares data from the Data Provider (DP). This process includes three sub-protocols: Fingerprint generation,authorization granting, and data decoding. All messages sent and received are protected with signature and verification.

    5.2.1 Fingerprint generation

    First, we give a description of our fingerprint structure: DP-ID, DC-ID, Timestamp,Random, SignatureDC, as shown in Fig. 2. The first 4 fields can be called fingerprint core.

    Figure 2: Fingerprint structure

    Here DP-ID represents the identity of the Data Provider, and DC-ID represents the identity of the Data Consumer. The Timestamp field expresses the time of fingerprint generation. The Random field is a random number given by the DC. The last field is DC’s signature of the fingerprint core. The fingerprint generation sub-protocol is shown in Fig. 3.

    Figure 3: Fingerprint generation process

    In the fingerprint generation protocol, the DC first generates a random number and encrypts it with his public key and sends it to the OS.

    The OS then finds the DP-ID to whom the request data belongs and records the current time as the timestamp. Next, the OS encrypts the DP-ID, DC-ID, and timestamp with the DC’s public key and concatenates these three ciphertext fields and ?random? to derive the ciphertext fingerprint core. Then these information is sent to the DC.

    The DC then checks whether the DC-ID and timestamp in the fingerprint core are correct.When the DC ensures the legality of the fingerprint core, the DC makes the ciphertext full fingerprint with signature and encryption. Then the ciphertext full fingerprint are sent to the OS.

    The OS then compares its ciphertext fingerprint core with that from the DC. When comparison shows that both of the two ciphertext fingerprint cores are exactly the same,the OS forwards the message sent by the DC to the DP.

    If any verification step of the process fails, the process terminates.

    5.2.2 Authorization granting

    After fingerprint generation, the Data Provider will decide whether to grant authorization to the DC. We demonstrate the authorization granting process in Fig. 4.

    Figure 4: Authorization granting process

    When the DP receives a legal ciphertext fingerprint and accepts request, he calculates the ciphertext decode LUT D for DC with the ciphertext fingerprint.

    As watermarking and LUT encoding are both linear, the decode LUT D can be generated through additive homomorphic encryption in the ciphertext domain. Here we use ?b? to express the ciphertext fingerprint that is encrypted by the Paillier homomorphic algorithm.Thus, ?m? can be derived as below:

    Then, the ciphertext watermark can be expressed as

    The ciphertext Decode LUT D is then expressed with E and W as

    The DP encrypts session key sek with its public key. It sends ?D?, ?sek? to the DC.Then the DC decrypts the message with its secret key and gets the decode LUT D and session key sek.

    5.2.3 Data decoding

    After authorization, the DC is able to download and decode the outsourced data. Fig. 5 shows the data decoding process.

    Figure 5: Outsourced data decoding process

    The DC first sends download request to the OS. Then he waits for the encoded data from the OS. The DC then decodes the data with the LUT D and session key sek as below: Emask= generate(sek), Dfull= D|?Emask.

    Here, decencdctimgis the image DCT vector in which the DC’s fingerprint b is embedded. After performing the inverse zigzag scan and inverse DCT tranform on decencdctimg, the DC gets imgDC, in which its fingerprint b is embedded.

    5.3 Multimedia tracing provenance

    Data leakage often occurs in the data outsourcing scenario. If the DP outsources and shares its data with our secure outsourcing and sharing, then the DP can trace the provenance of leaked data from the fingerprint in the leaked data copy. We show our multimedia tracing provenance protocol in Fig. 6.

    Figure 6: Tracing leakage provenance process

    Here, we use imgleakto express a leaked data copy. When the DP wants to trace the provenance of imgleak, he first extracts the watermark from imgleak:

    Then, the DP extracts the binary fingerprint vector from Wleakwith matched filter (MF)decoder:

    or pseudo-inverse (PI) decoder:

    The DP first checks whether the signature in bleakis correct. If the result is no, the leaked data copy may be damaged and cannot be used to trace the provenance.

    Otherwise, the DP extracts the DC-ID from bleakand sends bleakwith signatureDPto the DC. If the DC verifies that the message signature or received fingerprint signature is incorrect, the DC declines to answer this message. Otherwise, the DC sends its imgDCand its signature to the DP. If the DP checks that the signatureDCis incorrect with imgDC, DP can conclude that the DC-ID in bleakis the leakage provenance.

    If the DP verifies that signatureDCis correct, the DP then extracts bDCfrom imgDCand checks whether the signature in bDCis correct. If the signature in bDCfails the check, the DC-ID in bleakis also determined to be the provenance of the leaked copy.

    If the signature in bDCis correct, the DP compares the fingerprint cores of bleakand bDC.If these two are the same, then the DC-ID in bleakis the provenance of the leakage.Otherwise, the DC-ID in bleakis innocent, and its secret key must have been leaked.

    6 Security analysis

    6.1 Multimedia encryption security

    Encoded data is the ciphertext of the stream cipher, which satisfies the security needs of users in the data outsourcing scenario.

    Encoded data generation includes the DCT transform, zigzag scan, and EfullLUT embedding. The first 2 steps require no parameters, whereas the last step needs the stream key sek to generate. Our sek generation cycle is 1019.2M, which is much bigger than global data scale 3.52×1023bits from IDC statistics. And sek is transmitted with Paillier encrypted, so content of sek has semantic security against chosen-plaintext attacks (CPA) [Paillier (1999)]. Thus, encoded data is secure.

    6.2 No cross-holding

    1) The DC cannot hold the original data img. He cannot obtain the original data img from the encoded data encdctimg, because he cannot guess out or decrypt the correct content of sek.

    2) The DP cannot hold the data copy imgDCthat is embedded with the DC’s fingerprint.From fingerprinting process, we know that b is protected by Paillier cryptosystem, Thus the DP cannot derive imgDC.

    3) The OS cannot hold both img and imgDC. The OS cannot obtain a correct content of sek, so he cannot hold img. The OS also cannot break Paillier cryptosystem to get b, so he cannot hold imgDC.

    6.3 No framing

    1) The DP cannot frame the DC. Because DC’s fingerprint b includes a signature field,DP cannot forge b. Thus, the DP cannot frame a DC.

    2) A DC cannot frame another DC. Also because of the DC’s signature field in fingerprint b, the DC cannot frame another DC.

    Tab. 1 shows a security comparison between our scheme, the ZKWP-based scheme[Wohlgemuth, Echizen, Sonehara et al. (2011)] and the OTWP-based scheme [Backes,Grimm and Kate (2016)]. In terms of data encryption, the ZKWP-based scheme and OTWP-based scheme have to encrypt data outside the scheme, whereas we enable a stream cipher in our scheme. Our scheme enables data encryption to be convenient and efficient on the premise of being provably secure.

    Table 1: Security comparison between three schemes

    In terms of no cross-holding, our scheme relies on irreversible Paillier encryption computation, whereas the ZKWP-based scheme relies on an irreversible blinding process.These two both have strong security with regard to no cross-holding. However, the OTWP-based scheme relies on a low probability of cheating. OTWP has a cheating probability of 1/2n, in which n is the number of data divided parts. Technically, the value of n cannot be too large because multimedia data cannot be divided into too many parts and the time cost of sharing and provenance in the OTWP-based scheme increases very quickly along with increasing n. Thus, the OTWP-based scheme has just weak security with regard to no cross-holding.

    In terms of no framing, the ZKWP-based scheme relies on unforgeable commitment. The OTWP-based scheme relies on the unforgeable signature of the DC. Our scheme enhances security with the unforgeable signature of the DC and information certification of the OS. Thus, our scheme exhibits stronger security and more convenience.

    7 Performance

    We compare our secure data provenance scheme performance with the OTWP-based scheme. For the oblivious transfer watermarking protocol, we adopt the protocol of Naor et al. [Naor and Pinkas (2001)]. For the asymmetric encryption and signature algorithm,we make use of the Paillier cryptosystem [Paillier (1999)]. For our watermark generation and embedding, we use the Cox spread spectrum watermark [Cox, Kilian, Leighton et al.(1997)] and LUT-based watermark embedding algorithm [Celik, Lemma, Katzenbeisser et al. (2008)], respectively. We use the Lenna image as our test multimedia data, which has four different image sizes: 128×128, 256×256, 512×512, 1024×1024. Our fingerprint core has 128 bits including timestamp (40 bits), DP-ID (34 bits), DC-ID (34 bits) and random (20 bits).

    In our experiments, we use a powerful server with an Intel Xeon X3430 CPU (4-core, 2.4 GHz) and 8 GB of RAM to act as the OS. Moreover, we use two equivalent common PCs with an Intel i5 2430 M CPU (2-core, 2.4 GHz) and 4 GB of RAM to act as the DP and DC. All these computers are in our experimental LAN. The experiments below are implemented in Java.

    7.1 Data outsourcing

    We select the length of the encode LUT E as T=4096. Suppose that the test data is the 128×128 Lenna image, then the length of Emaskis 128×128?4096?1=12287.E and Emaskare both subject to the same zero-mean Gaussian distribution, whose standard deviation is selected as σE=3000.

    Fig. 7 shows the original image and outsourced image encrypted by our stream cipher.Compared to the original image, the PSNR of outsourced image is only 27.1727, which means great degradation of image quality. Almost no information of original image can be obtained from the encoded data in the right.

    Figure 7: Images before and after stream cipher encoding

    Figure 8: Multimedia encryption computation cost

    To evaluate the stream cipher efficiency, we compare the encryption time cost of our stream cipher with the widely used AES encryption algorithm on different data sizes,which is shown in Fig. 8. When the image size is small, our stream cipher computation cost is very close to AES encryption. As image size enlarges, our stream cipher computation cost increases slower than AES. When the image size is 1024×1024, our scheme only costs 48.2% of the time of AES encryption.

    For the space cost, if we use px to represent the image pixel unit, then the AES encrypted image has 64 px bits. Alternately, our outsourced data encoded by the stream cipher also has 64 px bits. The space efficiencies of the two are basically equal.

    These results shows that our stream cipher enables high-efficiency data outsourcing for the DP.

    7.2 Data sharing

    In data sharing protocols, after the 128-bit fingerprint is generated, the DC signs the fingerprint core with a 1024-bit signature. Thus, our full fingerprint length is 1152 bits.Our watermark vector is subject to a zero-mean Gaussian distribution, whose standard deviation is σw=1000. To locate a certain piece of data in the outsourcing storage, the DataID is used as an 80-bit vector.

    Fig. 9 shows a comparison between the 128×128 original image and its fingerprinted copy. The PSNR of the fingerprinted copy compared with the original image is 34.2178,which indicates quite high fidelity.

    Figure 9: Comparison of original and fingerprinted images

    Figure 10: Multimedia sharing computation cost

    In a data sharing protocol, the main computation time of our scheme is spent on many homomorphic computations in the Paillier ciphertext domain. We measure the data sharing computation time on different image sizes and make a comparison with the OTWP-based scheme, as shown in Fig. 10. Because the data sharing computation cost of the OTWP-based scheme is positively correlated with the number of parts of data division, we test data divided into 4, 16, 64 and 256 parts for the OTWP-based scheme.To make the figure clear, the logarithmic coordinates are used on the vertical axis. In the figure, as the data size increases, our LUT-based watermark embedding data sharing protocol maintains a slow increase of computation time cost, whereas the OTWP-based scheme’s data sharing computation cost enlarges rapidly. On the 1024 × 1024 image,our scheme achieves only 10.1%~11.7% of the computation time cost of data sharing compared to the OTWP-based scheme, which is a significant reduction.

    Then, we analyze the communication cost of the three steps. In the fingerprint generation step, the DC sends 2 messages whose total volume is 1024×2+34+80+1024×3+34=5268 bits; the OS sends 2 messages, whose total volume is 1024×2+34+1024×3+34=5188 bits. In the authorization granting step, the DP sends 1 message,whose total volume is 1024×T+1024×2+34=1024 T+2082 bits. In the final step of data decoding, the DC sends 1 message, which includes 80+34+1024=1138 bits in total; the OS also sends 1 message, which includes 64 px+1024 bits. In summary, the DC sends 6406 bits; the OS sends 64 px+6212 bits; and the DC sends 1024 T+2082 bits. For our example of the image with size 128×128 and T=4096,the communication cost of the OS is 128.75 KB, and the communication cost of the DC is 512.25 KB, which is practical in outsourcing scenario.

    In general, data sharing in our scheme has high computational efficiency and practical communication efficiency.

    7.3 Data provenance

    Because the Cox spread spectrum watermark is a non-blind watermark algorithm, data provenance should only be conducted by the party that can access the original data. Thus,it has to be the DP itself or a particular server that is fully trusted by the DP.

    The correctness of provenance is ensured first by the Cox robust watermark. Moreover,the generation matrix G, which is repetition code or Gaussian random code, can assure that GTG is a strict diagonal dominance matrix. Thus, either an MF or PI receiver can extract the correct fingerprint from a robust watermark.

    Figure 11: Data provenance tracking computation cost

    Here, we implement the process in Fig. 6 to compare the provenance time with the OTWP-based provenance scheme, as shown in Fig. 11. As stated before, the logarithmic coordinates are also used here on the vertical axis. Our scheme shows a slower increasing trend along with increasing image size and achieves better efficiency, which costs only 1.7%~61.9% of the time.

    For the communication cost of data provenance, the data volume from the DP is 1152+1024=2176 bits; the data volume from the DC is 64 px+1024 bits. Taking the 128×128 image as an example, the communication data volume of the DC in the provenance phase is 128.13 KB.

    In summary, data provenance in our scheme has higher time efficiency and reasonable communication efficiency.

    8 Conclusion

    We present a multimedia data provenance scheme that can track the provenance of leaked multimedia data securely and efficiently. We regulate system participants and security definitions, and propose an improved LUT-based fingerprinting protocol. Simultaneously,we present a stream cipher embedded in our scheme to provide a secure and efficient data outsourcing algorithm. We prove that multimedia data provenance can satisfy our security regulations and achieve better efficiency performance.

    Although our scheme cannot prevent data leakage from occurring, reactive accountability is ensured by our scheme. The system model and security model are both suitable for practical data outsourcing circumstances, which makes our provenance scheme convincible for a neutral entity, such as a judge.

    Acknowledgement:The authors would like to thank the anonymous referees for their valuable comments and helpful suggestions. The work is supported by the National Key Research and Development Program of China (No. 2016YFB0800402) and the National Natural Science Foundation of China (No. U1405254, No. U1536207).

    丰满迷人的少妇在线观看| 视频区图区小说| 欧美激情极品国产一区二区三区 | 色94色欧美一区二区| a级片在线免费高清观看视频| 青春草视频在线免费观看| 熟妇人妻不卡中文字幕| a 毛片基地| 免费观看无遮挡的男女| 国国产精品蜜臀av免费| 亚洲综合色惰| 男女边摸边吃奶| 在线精品无人区一区二区三| 考比视频在线观看| 国产日韩欧美在线精品| 三上悠亚av全集在线观看| 久久久久网色| 午夜91福利影院| 欧美另类一区| 亚洲av中文av极速乱| 久久久久久久国产电影| 亚洲人与动物交配视频| av电影中文网址| 亚洲高清免费不卡视频| 综合色丁香网| 视频中文字幕在线观看| 激情五月婷婷亚洲| 男女边吃奶边做爰视频| 少妇的逼好多水| 九色成人免费人妻av| 国产成人精品婷婷| 色吧在线观看| 最近最新中文字幕免费大全7| 极品人妻少妇av视频| 久久这里只有精品19| 日本wwww免费看| 免费播放大片免费观看视频在线观看| 两性夫妻黄色片 | 午夜激情久久久久久久| 日本猛色少妇xxxxx猛交久久| 色哟哟·www| 美女福利国产在线| 国产亚洲欧美精品永久| 亚洲内射少妇av| 欧美精品av麻豆av| 国产精品女同一区二区软件| 欧美国产精品一级二级三级| 你懂的网址亚洲精品在线观看| 成人二区视频| 有码 亚洲区| 午夜免费鲁丝| av免费在线看不卡| 一级毛片 在线播放| 国产欧美另类精品又又久久亚洲欧美| 一本色道久久久久久精品综合| 亚洲精品日韩在线中文字幕| 丝袜在线中文字幕| 欧美日韩av久久| 日韩欧美精品免费久久| 久久97久久精品| 午夜免费鲁丝| 亚洲精品,欧美精品| 制服丝袜香蕉在线| www.av在线官网国产| 女人久久www免费人成看片| 成人午夜精彩视频在线观看| 亚洲精品一二三| 久热这里只有精品99| 91成人精品电影| 久热久热在线精品观看| 如何舔出高潮| 狂野欧美激情性bbbbbb| 国内精品宾馆在线| 久久国内精品自在自线图片| 精品久久国产蜜桃| 国产国语露脸激情在线看| 一区二区三区精品91| 一级毛片黄色毛片免费观看视频| 成人综合一区亚洲| 欧美丝袜亚洲另类| 亚洲欧美清纯卡通| 高清不卡的av网站| 欧美少妇被猛烈插入视频| 精品国产一区二区久久| 亚洲精品日韩在线中文字幕| 国产成人精品在线电影| 精品视频人人做人人爽| 久久久久国产精品人妻一区二区| 国产1区2区3区精品| 一边亲一边摸免费视频| 亚洲av日韩在线播放| kizo精华| 欧美成人午夜免费资源| 久久久久人妻精品一区果冻| 欧美人与性动交α欧美精品济南到 | 99香蕉大伊视频| 在线天堂最新版资源| 另类亚洲欧美激情| 高清毛片免费看| 丝袜脚勾引网站| 少妇猛男粗大的猛烈进出视频| 国产精品人妻久久久影院| 亚洲熟女精品中文字幕| a级毛片在线看网站| 色网站视频免费| 蜜桃在线观看..| 一级爰片在线观看| av在线老鸭窝| 国产精品久久久久久精品古装| 麻豆乱淫一区二区| 51国产日韩欧美| 午夜激情av网站| 欧美国产精品一级二级三级| 大片电影免费在线观看免费| 亚洲国产av新网站| av播播在线观看一区| 亚洲欧美精品自产自拍| 18禁国产床啪视频网站| 日韩一区二区视频免费看| 久久99热6这里只有精品| 亚洲高清免费不卡视频| 亚洲成人手机| 色哟哟·www| 大香蕉久久成人网| 国产女主播在线喷水免费视频网站| 18+在线观看网站| 一级a做视频免费观看| 各种免费的搞黄视频| 丰满迷人的少妇在线观看| 亚洲欧洲国产日韩| av片东京热男人的天堂| 日韩中字成人| 草草在线视频免费看| 国产欧美另类精品又又久久亚洲欧美| 各种免费的搞黄视频| 国产男人的电影天堂91| 男女国产视频网站| 男男h啪啪无遮挡| 热re99久久国产66热| 天美传媒精品一区二区| 美女国产高潮福利片在线看| 精品一区二区三区视频在线| 99久久精品国产国产毛片| 少妇 在线观看| 97精品久久久久久久久久精品| 国产精品一区www在线观看| 丝袜脚勾引网站| 春色校园在线视频观看| 国产69精品久久久久777片| 一二三四中文在线观看免费高清| 日日摸夜夜添夜夜爱| 国产精品偷伦视频观看了| 如日韩欧美国产精品一区二区三区| 欧美精品一区二区免费开放| 免费高清在线观看视频在线观看| 1024视频免费在线观看| 国产高清不卡午夜福利| 免费观看在线日韩| 91国产中文字幕| 欧美日韩视频精品一区| 日韩大片免费观看网站| 各种免费的搞黄视频| 一级毛片电影观看| 欧美日韩视频高清一区二区三区二| 午夜av观看不卡| 汤姆久久久久久久影院中文字幕| av在线观看视频网站免费| 亚洲色图 男人天堂 中文字幕 | 免费女性裸体啪啪无遮挡网站| 在线天堂中文资源库| 免费av不卡在线播放| 满18在线观看网站| 日本黄大片高清| 成人毛片60女人毛片免费| 国产国语露脸激情在线看| 国产精品秋霞免费鲁丝片| av片东京热男人的天堂| xxx大片免费视频| 国产视频首页在线观看| 日本av手机在线免费观看| av卡一久久| 夜夜骑夜夜射夜夜干| 水蜜桃什么品种好| 如何舔出高潮| 亚洲五月色婷婷综合| 建设人人有责人人尽责人人享有的| 女人被躁到高潮嗷嗷叫费观| 另类亚洲欧美激情| 国产高清不卡午夜福利| 视频在线观看一区二区三区| 婷婷色综合大香蕉| 香蕉国产在线看| 国产成人免费观看mmmm| 一边亲一边摸免费视频| 一区二区三区乱码不卡18| 少妇 在线观看| 久久久久久人人人人人| 久久久精品免费免费高清| 国产一区二区三区综合在线观看 | 亚洲,欧美精品.| 精品人妻一区二区三区麻豆| 黄色 视频免费看| 国产深夜福利视频在线观看| 久久狼人影院| 国产乱人偷精品视频| 香蕉精品网在线| 日日爽夜夜爽网站| 欧美精品av麻豆av| 美女内射精品一级片tv| 高清不卡的av网站| 欧美少妇被猛烈插入视频| 久久久精品94久久精品| 欧美少妇被猛烈插入视频| 亚洲精品久久午夜乱码| 高清欧美精品videossex| 侵犯人妻中文字幕一二三四区| 亚洲三级黄色毛片| 成年人免费黄色播放视频| 色94色欧美一区二区| 免费观看在线日韩| 亚洲av男天堂| 黑人猛操日本美女一级片| 国国产精品蜜臀av免费| 视频中文字幕在线观看| 国产乱来视频区| 日本欧美视频一区| 日本黄色日本黄色录像| 只有这里有精品99| 日本vs欧美在线观看视频| 亚洲情色 制服丝袜| 日日爽夜夜爽网站| 国产精品熟女久久久久浪| 成人二区视频| 久久久久久人妻| 捣出白浆h1v1| 熟女电影av网| 国产精品成人在线| 成人国语在线视频| 人人澡人人妻人| 天堂俺去俺来也www色官网| 国产乱人偷精品视频| 热99久久久久精品小说推荐| 国产在线免费精品| 久久免费观看电影| 精品久久蜜臀av无| 日本av手机在线免费观看| 中文乱码字字幕精品一区二区三区| 一边摸一边做爽爽视频免费| 久久这里有精品视频免费| 伦理电影大哥的女人| 日韩人妻精品一区2区三区| 亚洲色图 男人天堂 中文字幕 | 国产精品人妻久久久影院| 久久影院123| 日韩欧美精品免费久久| 欧美3d第一页| 亚洲在久久综合| 寂寞人妻少妇视频99o| 国产精品 国内视频| 日韩制服骚丝袜av| 国产片内射在线| 91精品国产国语对白视频| 日韩 亚洲 欧美在线| 高清在线视频一区二区三区| 少妇的逼水好多| 五月开心婷婷网| 亚洲精品视频女| 国产精品国产三级国产av玫瑰| 精品少妇久久久久久888优播| 中文乱码字字幕精品一区二区三区| 亚洲av免费高清在线观看| 欧美日韩av久久| 国产一级毛片在线| 亚洲国产精品国产精品| 少妇被粗大的猛进出69影院 | 日本黄色日本黄色录像| 亚洲中文av在线| 边亲边吃奶的免费视频| 国产永久视频网站| 日本午夜av视频| av片东京热男人的天堂| 少妇的逼好多水| 久久久精品94久久精品| 精品国产国语对白av| 欧美国产精品va在线观看不卡| 国产欧美日韩一区二区三区在线| 一个人免费看片子| 日韩电影二区| kizo精华| 国产白丝娇喘喷水9色精品| 国产精品久久久久久久电影| 亚洲av电影在线进入| 日本黄大片高清| 亚洲精品美女久久av网站| 大陆偷拍与自拍| 制服诱惑二区| 久久99蜜桃精品久久| 久久精品国产自在天天线| 国产成人91sexporn| 一级片'在线观看视频| 高清不卡的av网站| 欧美国产精品va在线观看不卡| 久久久精品区二区三区| 18禁观看日本| 秋霞在线观看毛片| 婷婷成人精品国产| 亚洲第一av免费看| 国产精品久久久av美女十八| 成人午夜精彩视频在线观看| 99精国产麻豆久久婷婷| 永久免费av网站大全| 午夜日本视频在线| 婷婷色综合大香蕉| 一本—道久久a久久精品蜜桃钙片| 国产亚洲午夜精品一区二区久久| av国产精品久久久久影院| 美国免费a级毛片| av不卡在线播放| 日韩 亚洲 欧美在线| 超碰97精品在线观看| 精品99又大又爽又粗少妇毛片| 午夜福利视频在线观看免费| 亚洲精华国产精华液的使用体验| 性高湖久久久久久久久免费观看| 国产黄色免费在线视频| 少妇被粗大猛烈的视频| xxx大片免费视频| 成人漫画全彩无遮挡| 婷婷色综合大香蕉| 国产成人精品婷婷| 亚洲国产精品一区三区| 亚洲av电影在线观看一区二区三区| 黑人巨大精品欧美一区二区蜜桃 | 日韩欧美一区视频在线观看| 捣出白浆h1v1| 日韩av不卡免费在线播放| 日韩制服骚丝袜av| 日本爱情动作片www.在线观看| 麻豆精品久久久久久蜜桃| 久久婷婷青草| 日韩,欧美,国产一区二区三区| 欧美人与性动交α欧美精品济南到 | 国产精品一区二区在线观看99| 中文欧美无线码| 国产精品欧美亚洲77777| 婷婷色综合www| 极品少妇高潮喷水抽搐| 成年人免费黄色播放视频| 又大又黄又爽视频免费| 啦啦啦中文免费视频观看日本| 秋霞在线观看毛片| 成人午夜精彩视频在线观看| 亚洲av日韩在线播放| 日韩中文字幕视频在线看片| 欧美少妇被猛烈插入视频| 午夜福利视频精品| 中文字幕精品免费在线观看视频 | 一区二区日韩欧美中文字幕 | 在线亚洲精品国产二区图片欧美| 亚洲图色成人| 极品少妇高潮喷水抽搐| 久久久精品免费免费高清| 最近中文字幕2019免费版| 香蕉国产在线看| 大码成人一级视频| 激情五月婷婷亚洲| 午夜福利影视在线免费观看| 欧美3d第一页| 久久婷婷青草| 亚洲,欧美,日韩| 亚洲一码二码三码区别大吗| 各种免费的搞黄视频| 九色成人免费人妻av| www日本在线高清视频| 亚洲成人一二三区av| 久久狼人影院| 欧美日韩综合久久久久久| 婷婷色综合大香蕉| 制服人妻中文乱码| 9热在线视频观看99| 久久国产精品男人的天堂亚洲 | 国产探花极品一区二区| 久久久久久久久久久久大奶| 有码 亚洲区| 一本大道久久a久久精品| 亚洲av在线观看美女高潮| 成人亚洲欧美一区二区av| 一区在线观看完整版| 免费高清在线观看视频在线观看| xxx大片免费视频| 中文字幕av电影在线播放| 另类精品久久| 日日啪夜夜爽| 大陆偷拍与自拍| 日日撸夜夜添| 18禁在线无遮挡免费观看视频| 女的被弄到高潮叫床怎么办| 人妻 亚洲 视频| 99视频精品全部免费 在线| 久久久久久久久久人人人人人人| 日本免费在线观看一区| 国产精品秋霞免费鲁丝片| 久久久久人妻精品一区果冻| av不卡在线播放| 熟妇人妻不卡中文字幕| 久久久久久久久久成人| 亚洲精品视频女| 国产激情久久老熟女| 免费观看在线日韩| 免费不卡的大黄色大毛片视频在线观看| 日韩免费高清中文字幕av| 欧美精品亚洲一区二区| 欧美3d第一页| 久久精品国产鲁丝片午夜精品| videos熟女内射| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 在线精品无人区一区二区三| 日韩一本色道免费dvd| 日本wwww免费看| 国产精品女同一区二区软件| 一级黄片播放器| 日日啪夜夜爽| 亚洲国产色片| 久久精品久久久久久久性| 欧美97在线视频| 女性生殖器流出的白浆| 国产成人精品久久久久久| 99精国产麻豆久久婷婷| 99热国产这里只有精品6| 日韩制服骚丝袜av| 精品久久国产蜜桃| 国产免费视频播放在线视频| 老司机影院成人| 美女视频免费永久观看网站| 久久亚洲国产成人精品v| 欧美xxⅹ黑人| 少妇高潮的动态图| 亚洲一码二码三码区别大吗| 99热网站在线观看| 99久国产av精品国产电影| 黄色一级大片看看| 国产亚洲最大av| 熟妇人妻不卡中文字幕| 国产永久视频网站| av国产久精品久网站免费入址| 在线观看免费视频网站a站| 91国产中文字幕| 2021少妇久久久久久久久久久| 亚洲成av片中文字幕在线观看 | 免费黄网站久久成人精品| 免费观看av网站的网址| 成人国语在线视频| 国产精品久久久久久av不卡| 又黄又粗又硬又大视频| 久久久久久人妻| 色5月婷婷丁香| 久久久久久久久久人人人人人人| 成人黄色视频免费在线看| 亚洲精品国产色婷婷电影| 国产无遮挡羞羞视频在线观看| 蜜桃在线观看..| 日产精品乱码卡一卡2卡三| 免费av中文字幕在线| 欧美成人午夜精品| 亚洲精品久久成人aⅴ小说| 中文天堂在线官网| 搡老乐熟女国产| 如何舔出高潮| 插逼视频在线观看| 在线观看三级黄色| 国产片内射在线| 18禁在线无遮挡免费观看视频| 久久狼人影院| 亚洲av国产av综合av卡| 国产成人av激情在线播放| 久久精品国产鲁丝片午夜精品| 性高湖久久久久久久久免费观看| 久久精品人人爽人人爽视色| 国产探花极品一区二区| av黄色大香蕉| 久久精品国产a三级三级三级| 免费黄色在线免费观看| 一个人免费看片子| 最近最新中文字幕大全免费视频 | 久久久精品94久久精品| 一边摸一边做爽爽视频免费| kizo精华| 国产熟女午夜一区二区三区| 人人妻人人添人人爽欧美一区卜| 国产精品久久久久久精品古装| 久久国产精品大桥未久av| 成人国产av品久久久| 日日撸夜夜添| 午夜福利影视在线免费观看| 秋霞伦理黄片| 国产精品无大码| 丝袜美足系列| 丁香六月天网| 亚洲第一av免费看| 亚洲av电影在线进入| 成人手机av| 夫妻午夜视频| 少妇熟女欧美另类| 高清视频免费观看一区二区| 日韩伦理黄色片| 免费观看性生交大片5| av在线老鸭窝| 日韩av不卡免费在线播放| 天美传媒精品一区二区| 国产亚洲av片在线观看秒播厂| 母亲3免费完整高清在线观看 | 国产成人欧美| 精品国产露脸久久av麻豆| 女人精品久久久久毛片| xxxhd国产人妻xxx| 日本91视频免费播放| 日本色播在线视频| 狂野欧美激情性xxxx在线观看| 国语对白做爰xxxⅹ性视频网站| 国产高清三级在线| 欧美xxⅹ黑人| 2018国产大陆天天弄谢| 纯流量卡能插随身wifi吗| 国产精品一区二区在线观看99| 在线观看国产h片| 丝瓜视频免费看黄片| 亚洲av国产av综合av卡| 亚洲色图综合在线观看| 久久狼人影院| 免费观看a级毛片全部| 在线 av 中文字幕| 男人添女人高潮全过程视频| 观看av在线不卡| 亚洲人与动物交配视频| 久久国产精品大桥未久av| 9色porny在线观看| 国产69精品久久久久777片| 免费高清在线观看日韩| 欧美性感艳星| 精品一区二区三卡| 欧美人与性动交α欧美精品济南到 | 校园人妻丝袜中文字幕| 国产色爽女视频免费观看| 日本午夜av视频| 成年人午夜在线观看视频| 赤兔流量卡办理| av免费在线看不卡| 国产精品久久久久久久久免| 美女大奶头黄色视频| 大片免费播放器 马上看| 国产精品人妻久久久久久| 久久精品久久久久久噜噜老黄| 亚洲人与动物交配视频| 国产有黄有色有爽视频| 日韩成人av中文字幕在线观看| 国产成人精品一,二区| 波多野结衣一区麻豆| 九色亚洲精品在线播放| 人妻人人澡人人爽人人| 亚洲性久久影院| 丰满迷人的少妇在线观看| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 欧美日本中文国产一区发布| 丰满乱子伦码专区| 久久久欧美国产精品| 国产视频首页在线观看| 亚洲精品久久成人aⅴ小说| 国产激情久久老熟女| 久久精品熟女亚洲av麻豆精品| 五月玫瑰六月丁香| 亚洲第一av免费看| 欧美精品国产亚洲| 在线观看免费视频网站a站| 夫妻午夜视频| 欧美老熟妇乱子伦牲交| 美女xxoo啪啪120秒动态图| 一区二区日韩欧美中文字幕 | 2021少妇久久久久久久久久久| 你懂的网址亚洲精品在线观看| 人妻人人澡人人爽人人| 在线天堂最新版资源| 亚洲四区av| 亚洲第一区二区三区不卡| 亚洲欧美中文字幕日韩二区| 亚洲av日韩在线播放| 国产精品一区www在线观看| 男女边摸边吃奶| 青春草国产在线视频| 一区二区三区精品91| 一级黄片播放器| 在线观看免费日韩欧美大片| 女的被弄到高潮叫床怎么办| 哪个播放器可以免费观看大片| 欧美成人午夜免费资源| 人人妻人人澡人人看| 免费黄网站久久成人精品| 人人妻人人澡人人看| 日日啪夜夜爽| 18禁裸乳无遮挡动漫免费视频| 精品视频人人做人人爽| 国产亚洲最大av| 赤兔流量卡办理| 国产日韩一区二区三区精品不卡| 亚洲成av片中文字幕在线观看 | 汤姆久久久久久久影院中文字幕| 国产精品国产三级国产专区5o| 两性夫妻黄色片 | 日韩电影二区| 国产亚洲午夜精品一区二区久久| 午夜福利乱码中文字幕| 中文字幕最新亚洲高清| 亚洲成av片中文字幕在线观看 | 超色免费av| 婷婷成人精品国产| 成人国产麻豆网|