• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Novel Quantum Stegonagraphy Based on Brown States

    2018-08-15 10:38:24ZhiguoQuTianchengZhuJinweiWangandXiaojunWang
    Computers Materials&Continua 2018年7期

    Zhiguo Qu , Tiancheng Zhu, Jinwei Wang and Xiaojun Wang

    Abstract: In this paper, a novel quantum steganography protocol based on Brown entangled states is proposed. The new protocol adopts the CNOT operation to achieve the transmission of secret information by the best use of the characteristics of entangled states. Comparing with the previous quantum steganography algorithms, the new protocol focuses on its anti-noise capability for the phase-flip noise, which proved its good security resisting on quantum noise. Furthermore, the covert communication of secret information in the quantum secure direct communication channel would not affect the normal information transmission process due to the new protocol’s good imperceptibility.If the number of Brown states transmitted in carrier protocol is many enough, the imperceptibility of the secret channel can be further enhanced. In aspect of capacity, the new protocol can further expand its capacity by combining with other quantum steganography protocols. Due to that the proposed protocol does not require the participation of the classic channel when it implements the transmission of secret information, any additional information leakage will not be caused for the new algorithm with good security. The detailed theoretical analysis proves that the new protocol can own good performance on imperceptibility, capacity and security.

    Keywords: Quantum steganography, quantum secure direct communication, entanglement,anti-noise robustness.

    1 Introduction

    With the development of network technology [Qu, Keeney, Robitzsch et al. (2016)],information security [Liu, Wang, Yuan et al. (2016)] becomes more and more important,especially to information hiding. Quantum steganography as a quantum version of steganography, is one of quantum information security techniques by transmitting classical or quantum information through public quantum channels. At present, quantum key distribution (QKD), quantum key agreement (QKA) [Liu, Xu, Yang et al. (2018)],quantum secure direct communication (QSDC) and quantum secret sharing (QSS) are four regular quantum information security techniques. Comparing with other quantum quantum information security techniques, quantum secure direct communication mainly protects transmitted information by preventing from various eavesdropping attacks. By comparison, quantum steganography builds up the hidden channel for covert communication based on various open quantum secure communication channels, which can achieve high level security for secret information transmitted. Quantum steganography has three important parameters, imperceptibility, capacity and security. In detail, imperceptibility means that the hidden channel cannot be detected or is hardly detected to prevent supervisors or attackers from eavesdropping or attacking it. Capacity denotes maximum quantity of secret messages transmitted per round of covert communication. And security refers to that the protocol can prevent most of the possible quantum attacks or eavesdropping on secret information, even if the hidden channel has been exposed. Among them, imperceptibility is one of the most important performance parameters for quantum steganography.

    In general, quantum steganography can be divided into two categories. One is called as Quantum Multi-secret Sharing (QMS) [Chattopadhyay and Sarkar (2007); DiVincenzo(2002); Eggeling and Werner (2002); Gottesman (2000); Guo and Guo (2003); Hayden,Leung and Smith (2005); Hillery, Buzek and Berthiaume (1999); Terhal, Divincenzo and Leung (2001)] which can be generalized to hide the classical information bits in multipartite quantum states for sharing secret information. Participants in this type of steganography can extract embedded secret information through local operations and classic channel. And the other category is called as Quantum Data Hiding (QDH) [Martin(2007); Matthews, Wehner and Winter (2009)] which builds up the hidden channel within the public quantum channel to transmit secret information. Comparing with QMS,QDH is more close to the classical steganography and can more effectively transmit classical secret information. In recent years, quantum steganography has been extensively investigated and achieved a series of achievements. In early stage, many quantum steganography achievements are immature, such as Natori [Natori (2006); Qu, Chen,Zhong et al. (2010); Qu, Chen, Zhong et al. (2011)] by using super-dense coding and[Geabanacloche (2002)] by using quantum error-correcting codes. Although these protocols can transmit secret information securely between parties indeed, these achievements did not clearly describe how to embed secret information into the carrier. In 2007, Martin [Martin (2007)] presented a novel quantum steganography protocol. It was believed as the first quantum steganography protocol to establish one hidden channel within public quantum channel with concrete quantum embedding method. In 2009,Banacloche [Banacloche (2009)] adopted Quantum Error Correcting Code (QECC) to hide secret messages as errors in arbitrary quantum data files. The protocol was mainly based on the BB84 protocol. It analyzed imperceptibility and security in detail, and accurately calculated the capacity of its hidden channel. In 2010, Qu et al. [Qu, Chen,Zhong et al. (2010)] proposed a novel quantum steganographic protocol with large payload. The protocol using entanglement swapping of Bell states for steganography is based on the improved ping-pong protocol. In 2011, Qu et al. [Qu, Chen, Zhong et al.(2011)] using the entanglement of the-state with the similar method was proposed with larger capacity and security. In 2015, quantum steganography using prior entanglement was proposed in Mihara [Mihara (2015)]. This protocol embeds the secret information into the carrier information through CNOT operation by using entanglement between the particles. However, due to that its carrier in this protocol is unavailable for both parties and its hidden channel was not built on any public quantum channels, it was with obvious drawback of lacking of imperceptibility considerations.

    For most of the current achievements, it usually is assumed that secret information will be transmitted in the ideal noiseless channel. However, in the reality, the public quantum channel is unavoidably noisy, so that most of the current protocols become invalid. In order to resolve this terrible issue, this paper proposes a novel quantum steganography protocol based on QSDC by using Brown states. As with Mihara [Mihara (2015)], the new protocol also adopts prior entanglement to embed or extract secret information through CNOT operations, by making the hidden channel independent of the other carrier channels. As a result, the new protocol has a strong anti-noise robustness and can effectively protect the secret information from many typical quantum noises, especially to the phase-flip noise. With the anti-noise robustness, the new protocol can accurately transmit secret information in quantum noisy channel. Moreover, due to the hidden channel is randomly selected and built, the probability that the attacker detects the hidden channel can be arbitrarily reduced by increasing the transmission scale of the carrier.Therefore, the hidden channel of the new protocol can be considered as very difficult or even impossible to be detected for attackers or eavesdroppers. From the perspective of capacity, there is a great potential for expansion to the new protocol's capacity by combining it with other powerful quantum secure communication protocols. In addition,since the hidden channel of the new protocol will be built up within public quantum carrier protocols with great security, the new protocol's security can be better guaranteed as natural inheritance.

    The rest of this paper is organized as follows. In Section 2, we will introduce the operations and preparations of the new protocol as the preliminary knowledge. In Section 3, the specific steps of the new proposed protocol are presented in detail. The anti-noise robustness, imperceptibility, capacity and security of the new protocol will be analyzed in Section 4. The conclusions are given in Section 5.

    2 Preliminaries

    In this section, the related notations, quantum states and the main operations' definitions are given. And the fundamental methods of embedding and extracting secret information by CNOT operations are also presented in detail as follows.

    Firstly, the carrier information |c0>used in the protocol is the Brown state. And its specific form is shown in the Eq. (1), where the subscripts represent the different qubits.

    The Brown state |ψ5>can also be written in the following form.

    Here, |Gijk>is one of the three particle GHZ states, and its specific form is given as follow.

    Here, i, j, k={0,1} and ⊕means the modulo-2 addition operation. If the Pauli operations are performed on the qubits 1, 2 and 5 of the Brown state, as shown in the Eq. (2), the state will turn to be

    All of these states as shown in the Eq. (4) can construct a mutually orthogonal basiswhich satisfies the condition

    If one makes a measurement on the qubits 3 and 4 under the basisthe state will collapse and the other particles will end up in a corresponding three-qubit entangled state. The state |5ψ>can be rewritten as

    Let | c0>=| φ0>+ |φ1>, and |φb>means its last bit is b. For example, if |c0>=|ψ5>,then|11>)12534. It is worth to be noted here that if the particle 5 and the particle 4 are bitflipped and the particle 5 are phase-flipped at the same time, |φ0>and |φ1>can be converted to each other.

    Then, let describe how to prepare the initial state in detail. Firstly, it is assumed that Alice is the sender of secret information, while Bob is the receiver. And they share an entanglement state beforehand, that is given as follow.

    Here, the subscript indicates the holder of the particle. If Alice wants to send a bit of secret information |b>to Bob, Alice will prepare astate as the carrier information |c0>firstly, and then Alice obtains the following state. Here, in order to facilitate understanding, we number all the particles, while Alice holds the particles 0-5 and particle 7, and Alice holds the particle 6.

    Next, Alice applies the CNOT operation, while the particle 4 is the control qubit and the particle 7 is the target qubit. Then, the state will turn to be

    Here, let put Alice’s entangled qubit (the particle 7) as the first position to simplify the representation. After Alice applies the CNOT operation, the particle 7 becomes the control qubit and the particle 0 is the target qubit. Then, the state will turn to be

    Finally, Alice applies the CNOT operation, while the particle 0 is the control qubit and the particles 4, 5 and 7 are the target qubits. And then, she also applies the QCPG operation, while the particle 0 is the control qubit and the particles 5 is the target qubit,and the state becomes

    After removing the particles 0 and 7, the rest exactly is the initial state that will be used in this protocol, shown as the Eq. (13).

    Following the steps given above, Alice also can implement the embedding process of secret information. If Bob wants to extract secret information, he only needs to apply the CNOT operation again, while the particle 4 is the control qubit and the particle 6 is the target qubit. Then, the state will turn to be

    As shown in the Eq. (14), Bob can receive the secret information particle |b>and then extract secret information that Alice wants to send to him, by using projection measurement ofbasis on the particle.

    3 The proposed quantum steganography protocol

    The carrier protocol [Lin, Gao and Liu (2011)] used in the new protocol is a protocol of quantum secure direct communication [Cai (2003); Wó jcik (2003); Bennett and Wiesner(1992); Wang, Deng, Li et al. (2005)]. This protocol is required to transmit two quantum sequences for communicating secret information. So that, the hidden channel can be built up within the carrier protocol. In this case, the hidden channel’s security can be perfectly guaranteed by virtue of the carrier protocol’s great security.

    Now, let describe the proposed quantum steganography protocol in detail.

    Step (1) To guarantee the security of the secret message, Alice (the sender) and Bob (the receiver) firstly agree on a one-way hash function h :{0,1}k→{0,1}l. According to her secret information m, Alice constructs a sent message s, which consists of the secret information and an authentication message h( m), i.e. s = m +h( m).

    Step (2) Next, Alice prepares the initial state shown in the Eq. (12) by following the process in Section 2.

    Step (3) Then, Alice prepares n (n is large enough) |ψ5>. After that, Alice mixes the first five qubits of the initial state into all the quantum states that will be used in the carrier protocol and records the position m of these five qubits, which is denoted as|ψ5>m. As a follow, Alice divides all the states into five particle sequences. Every particle sequence is denoted asHere, Pirepresents the i-th particle of the Brown state, and the superscript represents the position of the corresponding Brown state in the particle sequence. At last, Alice sends the particle sequence C3and C4to Bob.

    Step (4) After Bob receives C3and C4, Alice randomly determines to enter the control mode or secret information transmission mode. If Alice determines to enter the control mode, she will select a part of particles from C1, C2andC5for reliable eavesdropping detection.

    Step (5) Control mode: Alice firstly selects a part of particles from C1, C2andC5, then she measures the particle 1, 2 and 5 under the basis AM1or AM2, and publishes her measurement basis and corresponding measurement results through the classical channel.After getting Alice’s results, Bob measures his corresponding particles 3 and 4 from C3and C4under the basis BM1or BM2and compares his results with that of Alice to detect eavesdropping. If Alice finds out that the eavesdropping exists, she will abort the communication. Otherwise, their communication will enter the secret information transmission mode or the normal information transmission mode.

    Figure 1: The secret information transmission process

    Step (6) Secret information transmission mode: Bob finds out the qubit(Alice sents m to Bob by implementing QKD or one-time pad through classical channel in advance),and then he applies the CNOT operation on the state, whileis the control qubit andis the target qubit, as shown in the Fig. 1. After that, the state is shown as the Eq.(13), wherebecomes |b>by removing the entanglement with the carrier state |c0>.Here, |b>is the carrier particle of secret information received by Alice. It is worth noting that, all these operations do not change the carrier state |c0>, and the carrier state|c0>has no difference with other Brown states after the secret message transmission.As a result, we still can use |c0>to transmit normal information.

    Step (7) Normal information transmission mode: According to the bit sequence s, Alice performs the corresponding unitary operations on C1, C2and C5. Supposing that the sent message s isAlice performs operationsandon the qubits 1, 2, and 5, respectively. The process in this mode is also shown as the Fig. 1. Then, Alice transmits these particles to Bob. After receiving these encoding particles, Bob measures the entangled pairs in the basis FMB and decodes the received message s '= m'+h( m)'. Only when h( m ')= h( m)', Bob can sure that he has received the whole secret message m=m'. Otherwise, he thinks that the secret message is tampered with during the transmission and discards the received message.

    4 The performance analysis

    4.1 Anti-noise robustness

    Unlike most of the previous quantum steganography protocols, the new protocol has a good security resisting on quantum noises. By virtue of this capability, the new protocol can still transmit secret information accurately in quantum noisy channel. The quantum channel in reality is always noisy, so the security resisting on quantum noise is very important for quantum steganography. It can effectively prevent the secret information from affected or destroyed by quantum noise. Due to its own characteristics of the new protocol, it can be immune to the phase-flip noise. In this case, even though in the quantum channels of these noises, the new protocol can still accurately transmit secret information.

    As described above, assuming that the secret information b=0, the initial state before transmission of the secret protocol is as follows.

    If there is no noise in the channel, the above state will keep intact. In this case, Bob can receive secret information by performing a simple CNOT operation. Otherwise, if there is the phase-flip noise in the channel, the state which Bob’s received will changed. If particle 3 and 4 are both affected by noise and phase flip occurs, the phase flip will be cancelled, the system will not change, and the secret information will not change, either.If the particle 3 or 4 is affected by quantum noise, the system state is given as follow.

    If the secret information is extracted in the changed state (as shown in the Eq. (16)), Bob can still receive the secret information b correctly after applying CNOT operation by adopting the same method. It can be seen that the new protocol is completely immune to phase-flip noises. In addition, both the amplitude-damping noise and the depolarized noise are superimposed with components of the bit-flip noise and the phase-flip noise. In other words, the amplitude-damping noise and the depolarized noise can be regarded as the combination of the bit-flip noise and the phase-flip noise in different proportional components, and the components of the phase-flip noise will be immune to the proposed protocol. Therefore, the new protocol also has good security resisting on the bit-flip,depolarization and amplitude-damping noises respectively.

    In summary, the new protocol can be completely immune to the phase-flip noise.Moreover, since the effect of various noises will cancel each other partially, the security of secret information can be further better than that of the theoretical analysis. From this point of view, the new protocol has good security resisting on quantum noise.

    4.2 Imperceptibility

    Quantum steganography protects the security of secret information mainly by hiding quantum channel of secret information transmission. As a result, it is easy to know that imperceptibility is the most significant performance parameter for quantum steganography.Fortunately, comparing to the classical steganography, the imperceptibility of quantum steganography has more innate advantages, due to the quantum uncertainty theorem and no-cloning theorem. If the attacker Eve tries to detect the hidden quantum channel between Alice and Bob, there are two optional approaches for him. One is to observe abnormity caused by covert communication, the other is to initiatively discover abnormity caused by covert communication by performing measurement on intercepted particles. Since embedding secret information will not change the state of the carrier information in the new protocol, so there is no chance to detect the hidden channel for Eve by adopting the first option. For the second option, Eve does have a certain probability of getting some useful information about secret information. However, because it is impossible to know the position value of m, or the right particles’ location, or even correct measurement basis in advance, Eve can only get random measurement outcomes on intercepted particles for him.From the theorem of quantum uncertainty, it is easy to know these measurement outcomes could not produce the so-called abnormity, which can be used to find out the hidden channel. In addition, according to the theorem of quantum non-cloning, if Eve carried out measurement on more transmitted particles, his actions will definitely disturb the normal quantum communication, and consequently will be detected by Alice and Bob, followed by the process to abort communication. As mentioned above, it is almost impossible for Eve to find the hidden channel by random measurement. In fact, the only available way that Eve can discover the hidden channel, is to obtain the correct position value m and perform the correct measurement on the right particles in the proper basis. So the critical step of detecting hidden channel for Eve is to obtain m.

    Then, let us further consider the possibility of obtaining m for Eve. According to the detailed steps of the new protocol, the value of m has nothing to do with the information sequence, and there is no need to satisfy any conditions, m is completely random for Alice to choose. Moreover, m can be sent to Bob by implementing QKD or one time one pad through in classical channel, which have been proved to be absolutely safety. In addition, according to Shannon's information theory, random probability distributions of the information will make m's uncertainty best, which means it is extremely difficult for Eve to obtain m. So that, the imperceptibility of our protocol can be further enhanced. In term of this conclusion, it is very reasonable to randomize the information m by presetting it as a random sequence or by adopting a pseudo-random sequence encryption method to generate it. As a result, the only way to obtain m for Eve is to randomly guess with the possibility of 1/n, since it is nearly impossible to obtain the information sent by Alice to Bob in advance.

    Moreover, unlike most of the QKD protocols and some QSDC protocols, there is no need of extra information’s transmission through a classical channel during information transmission for the new protocol. Therefore, the new protocol's imperceptibility can be better guaranteed.

    Based on the above analysis, it is proved that the new protocol has good imperceptibility.The attacker almost impossible to find the hidden channel.

    4.3 Capacity

    Capacity characterizes maximum quantity of secret information transmitted per round of covert communication. It means that the larger the capacity is, the more secret information can be transmitted. According to the new protocol, it is easy to know there is one bit secret information transmitted in per round of covert communication, which means the capacity of the new protocol is equal to one, as the same as most of the previous quantum steganography protocols. However, since the location of the hidden channel in the covert information is completely random and independent of the normal information transmission, the number of the hidden channel can be appropriately increased per round. As a result, the capacity of the new protocol can be increased correspondingly.

    Because the hidden channel is built up by applying CNOT operation and it is independent of the states used by the carrier protocol, this protocol has a strong scalability and can be combined with many other QSDC protocols. If it combined with a large-capacity steganography protocol, the capacity of the combined protocol will be larger than the large-capacity protocol. In addition, since the transmission of the secret information does not change the entanglement state of the carrier protocol, the entanglement exchange and super-dense coding can be used to extend the covert channel and transmit more secret information. The specific operation is similar to Qu et al. [Qu, Chen, Luo et al. (2011)].After the expansion, the capacity of the protocol will increase further.

    In short, the capacity of the new protocol is the same as most of the previous quantum steganography protocol, but it is available to expand its capacity without affecting the transmission of secret information by extending to more powerful quantum steganography or QSDC protocols using Brown state. It must be noted that there is always a reciprocal balance between capacity and imperceptibility. Therefore, the choice to expand an appropriate capacity requires a comprehensive consideration to imperceptibility.

    4.4 Security

    Security means that the protocol can effectively resist on most of eavesdropping attacks or various quantum noises’ effect, so that the secret information can be transmitted securely. Therefore, security is also a very important performance parameter to quantum steganography. In this section, the security resisting on quantum noises has been analyzed and proved in detail. As for the security resisting on eavesdropping attacks, due to the new protocol is based on the QSDC protocol [Lin, Gao and Liu (2011)], the hidden channel built up within it can be effectively proved by its good security, which had been analyzed in detail in Lin et al. [Lin, Gao and Liu (2011)].

    From the point of view of eavesdroppers, there is still no chance or nearly impossible to obtain secret information for them. It is because secret information is only embedded in the hidden channel, and there are only two particles as the travel particles during the covert communication. Even if eavesdroppers enable to intercept and obtains these travel particles, since only a part of particles of Brown state in their hand is not available to achieve the whole information of this Brown state, so they could not obtain secret information yet. Moreover, because the secret information mainly depends on the last two particles of the initial state, even if eavesdroppers measure the travel particles, they also could not interfere the transmission of secret information, so secret information still can be transmitted securely.

    Overall, the security of the new protocol is proved to be excellent.

    5 Conclusion

    In this paper, a novel anti-noise quantum steganography protocol based on Brown states is proposed. It embeds and extracts secret information by applying CNOT operation. The obvious advantage of the new protocol is its good security resisting on quantum noises comparing with the previous achievements. By virtue of the cover of carrier protocol, the new protocol has a good imperceptibility. In addition, the transmission scale of the carrier protocol can be arbitrarily increased, so that the imperceptibility of the new protocol can be further enhanced. As for security, due to the carrier protocol owns the high level security as the QSDC protocol, so the new protocol can effectively deal with various eavesdropping attacks, as the same as the carrier protocol. In aspect of capacity, the new protocol can further expand its capacity by combining with other powerful quantum secure communication protocols. Furthermore, the independence of the hidden channel in the new protocol makes it own good scalability and practicability, either.

    However, since a certain number of particles are needed during the preparation of the initial state, as well as some auxiliary particles during the processes of embedding and extracting secret information, so the consumption of the new protocol is a little bit higher.In order to make up for this defect, how to reduce the consumption without performance degradation for the protocol will be the next step of our research in the future.

    Acknowledgement:This work was supported by the National Natural Science Foundation of China (No. 61373131, 61303039, 61232016, 61501247), the Six Talent Peaks Project of Jiangsu Province (Grant No. 2015-XXRJ-013), Natural Science Foundation of Jiangsu Province (Grant No. BK20171458), the Natural Science Foundation of the Higher Education Institutions of Jiangsu Province (China under Grant No. 16KJB520030), Sichuan Youth Science and Technique Foundation (No. 2017JQ0048), NUIST Research Foundation for Talented Scholars (2015r014), PAPD and CICAEET funds.

    超碰成人久久| 亚洲欧美日韩高清在线视频 | 国产精品自产拍在线观看55亚洲 | 人妻久久中文字幕网| 9191精品国产免费久久| 国产深夜福利视频在线观看| 啦啦啦 在线观看视频| 国产黄色免费在线视频| 国产精品一区二区在线不卡| 亚洲精品成人av观看孕妇| 国产真人三级小视频在线观看| 欧美日韩亚洲综合一区二区三区_| 免费在线观看黄色视频的| 国产成人av激情在线播放| 国产亚洲av高清不卡| 亚洲精品久久成人aⅴ小说| 亚洲九九香蕉| 久久精品国产99精品国产亚洲性色 | 黑人欧美特级aaaaaa片| 超碰97精品在线观看| 国产91精品成人一区二区三区 | 热re99久久精品国产66热6| 国产精品国产av在线观看| 久久99一区二区三区| 一本—道久久a久久精品蜜桃钙片| 色播在线永久视频| 999久久久国产精品视频| 91精品三级在线观看| 18在线观看网站| 久久久久精品国产欧美久久久| 欧美日韩av久久| 成年动漫av网址| 在线看a的网站| 女人精品久久久久毛片| 老司机深夜福利视频在线观看| 一个人免费看片子| 999精品在线视频| 国产一卡二卡三卡精品| 久久香蕉激情| 两个人看的免费小视频| 美国免费a级毛片| 九色亚洲精品在线播放| 在线观看www视频免费| 999精品在线视频| 男女午夜视频在线观看| 久久久国产欧美日韩av| 亚洲精品久久成人aⅴ小说| 十八禁网站免费在线| 免费高清在线观看日韩| 最近最新中文字幕大全免费视频| 亚洲五月婷婷丁香| 亚洲国产av新网站| 黑人猛操日本美女一级片| 一级毛片女人18水好多| 色老头精品视频在线观看| 午夜免费成人在线视频| 黄频高清免费视频| 黑人猛操日本美女一级片| 一级a爱视频在线免费观看| 久久亚洲精品不卡| 亚洲五月婷婷丁香| 青青草视频在线视频观看| 精品国产超薄肉色丝袜足j| 久久av网站| 久久性视频一级片| 真人做人爱边吃奶动态| 在线观看一区二区三区激情| 男女边摸边吃奶| 国产片内射在线| 麻豆成人av在线观看| 国产免费av片在线观看野外av| 午夜福利在线观看吧| 亚洲avbb在线观看| 国产亚洲av高清不卡| 亚洲精品一二三| 欧美亚洲 丝袜 人妻 在线| 精品第一国产精品| 国产成人欧美| 美女高潮到喷水免费观看| 久久久精品国产亚洲av高清涩受| 黄片播放在线免费| 在线观看免费视频日本深夜| 热99久久久久精品小说推荐| 亚洲九九香蕉| 精品午夜福利视频在线观看一区 | 久久久水蜜桃国产精品网| 69精品国产乱码久久久| 人人妻人人添人人爽欧美一区卜| 12—13女人毛片做爰片一| 国产午夜精品久久久久久| 两性夫妻黄色片| 窝窝影院91人妻| 亚洲全国av大片| 老司机影院毛片| 精品久久久久久电影网| 国产在视频线精品| 巨乳人妻的诱惑在线观看| 人成视频在线观看免费观看| 久久99热这里只频精品6学生| 欧美日韩亚洲高清精品| 国产免费现黄频在线看| 国产男女内射视频| 亚洲中文字幕日韩| 老司机影院毛片| 国产单亲对白刺激| 在线观看66精品国产| 免费在线观看完整版高清| 麻豆国产av国片精品| 午夜福利视频精品| 国产精品麻豆人妻色哟哟久久| 亚洲欧美一区二区三区黑人| 淫妇啪啪啪对白视频| 亚洲精品国产区一区二| 国产一区二区三区在线臀色熟女 | 国产av又大| 脱女人内裤的视频| 丁香欧美五月| 久久精品成人免费网站| 色播在线永久视频| 考比视频在线观看| 美女主播在线视频| 757午夜福利合集在线观看| 久久精品aⅴ一区二区三区四区| 中国美女看黄片| 黄色a级毛片大全视频| 天天躁夜夜躁狠狠躁躁| av网站免费在线观看视频| 成人18禁高潮啪啪吃奶动态图| 亚洲精品国产区一区二| 大陆偷拍与自拍| 精品午夜福利视频在线观看一区 | 日韩视频一区二区在线观看| 国产亚洲午夜精品一区二区久久| 三上悠亚av全集在线观看| 俄罗斯特黄特色一大片| 欧美精品av麻豆av| 纯流量卡能插随身wifi吗| 极品教师在线免费播放| 国产日韩一区二区三区精品不卡| 亚洲美女黄片视频| 日韩人妻精品一区2区三区| 色视频在线一区二区三区| 18禁观看日本| 中亚洲国语对白在线视频| 色视频在线一区二区三区| 国产在线一区二区三区精| 久久99一区二区三区| 久久热在线av| 欧美av亚洲av综合av国产av| 久久久国产成人免费| 91九色精品人成在线观看| 精品一品国产午夜福利视频| 黄色片一级片一级黄色片| 欧美国产精品va在线观看不卡| 国产一卡二卡三卡精品| 18禁裸乳无遮挡动漫免费视频| 久久国产精品影院| 久久中文字幕一级| 黄色怎么调成土黄色| 国产亚洲精品第一综合不卡| 两性夫妻黄色片| 91九色精品人成在线观看| 一区二区日韩欧美中文字幕| 久久久精品国产亚洲av高清涩受| 一边摸一边做爽爽视频免费| 国内毛片毛片毛片毛片毛片| 精品国产乱子伦一区二区三区| videos熟女内射| 一级,二级,三级黄色视频| 99精品在免费线老司机午夜| 久久久精品免费免费高清| 99精品久久久久人妻精品| 欧美 亚洲 国产 日韩一| 视频区欧美日本亚洲| 狂野欧美激情性xxxx| 黄网站色视频无遮挡免费观看| 午夜福利在线免费观看网站| 亚洲情色 制服丝袜| 97在线人人人人妻| 国产精品av久久久久免费| 国产欧美日韩一区二区精品| 高清av免费在线| 曰老女人黄片| 亚洲久久久国产精品| 午夜老司机福利片| 手机成人av网站| 亚洲熟妇熟女久久| 久久久久精品国产欧美久久久| 91字幕亚洲| 国产精品久久久久久人妻精品电影 | 国产精品麻豆人妻色哟哟久久| 国产黄色免费在线视频| 亚洲自偷自拍图片 自拍| 亚洲第一青青草原| 日韩大片免费观看网站| 午夜精品国产一区二区电影| 纵有疾风起免费观看全集完整版| 9191精品国产免费久久| www.999成人在线观看| 亚洲成国产人片在线观看| 黄网站色视频无遮挡免费观看| 成在线人永久免费视频| 免费在线观看日本一区| 久久久欧美国产精品| 亚洲伊人久久精品综合| 黄色 视频免费看| 亚洲欧美一区二区三区黑人| 国产成人精品久久二区二区免费| 考比视频在线观看| 大码成人一级视频| 精品亚洲乱码少妇综合久久| 大香蕉久久成人网| 777久久人妻少妇嫩草av网站| 久久久国产精品麻豆| 一级毛片电影观看| 国产又爽黄色视频| 99久久精品国产亚洲精品| 麻豆乱淫一区二区| 人成视频在线观看免费观看| 久久精品国产综合久久久| 欧美老熟妇乱子伦牲交| 久久久国产一区二区| 纯流量卡能插随身wifi吗| 久久久久久久久久久久大奶| 王馨瑶露胸无遮挡在线观看| 在线天堂中文资源库| 亚洲国产中文字幕在线视频| 久久久国产欧美日韩av| 日本一区二区免费在线视频| 欧美日韩黄片免| 性色av乱码一区二区三区2| 人人妻人人添人人爽欧美一区卜| 日韩精品免费视频一区二区三区| 一本—道久久a久久精品蜜桃钙片| 亚洲精品国产区一区二| 久久久久国内视频| 激情在线观看视频在线高清 | aaaaa片日本免费| 又紧又爽又黄一区二区| 99国产精品一区二区蜜桃av | 精品亚洲乱码少妇综合久久| 别揉我奶头~嗯~啊~动态视频| 精品福利观看| 性高湖久久久久久久久免费观看| 自拍欧美九色日韩亚洲蝌蚪91| 最新在线观看一区二区三区| 超色免费av| 中文字幕最新亚洲高清| 亚洲午夜精品一区,二区,三区| avwww免费| 少妇裸体淫交视频免费看高清 | 欧美精品一区二区免费开放| 在线播放国产精品三级| 亚洲精品成人av观看孕妇| h视频一区二区三区| 久久人妻福利社区极品人妻图片| 久久久国产一区二区| 午夜视频精品福利| 久久久久久久精品吃奶| 精品久久蜜臀av无| 99国产精品一区二区三区| 久久中文看片网| 国产极品粉嫩免费观看在线| 不卡av一区二区三区| 国产伦理片在线播放av一区| 99久久精品国产亚洲精品| 手机成人av网站| 女人高潮潮喷娇喘18禁视频| 亚洲人成电影观看| 怎么达到女性高潮| 在线观看一区二区三区激情| 欧美成狂野欧美在线观看| 在线观看舔阴道视频| 亚洲欧美色中文字幕在线| av网站免费在线观看视频| 一区二区三区国产精品乱码| 午夜福利一区二区在线看| 国产极品粉嫩免费观看在线| 久久精品亚洲精品国产色婷小说| 午夜福利一区二区在线看| 极品人妻少妇av视频| 日韩中文字幕欧美一区二区| 久久中文字幕一级| 黄色丝袜av网址大全| 老熟妇仑乱视频hdxx| 人成视频在线观看免费观看| 热re99久久国产66热| 欧美老熟妇乱子伦牲交| 18禁裸乳无遮挡动漫免费视频| 老汉色∧v一级毛片| 亚洲av第一区精品v没综合| 久久国产精品人妻蜜桃| 丝瓜视频免费看黄片| 大香蕉久久成人网| 精品少妇内射三级| 一区福利在线观看| 一区二区av电影网| 一区二区三区激情视频| 免费观看av网站的网址| www.熟女人妻精品国产| 国产精品久久久久久精品电影小说| 91麻豆精品激情在线观看国产 | 国产男女超爽视频在线观看| 亚洲成国产人片在线观看| 亚洲精品成人av观看孕妇| 一个人免费在线观看的高清视频| 久久久久视频综合| 午夜激情av网站| 国产av精品麻豆| 亚洲情色 制服丝袜| 韩国精品一区二区三区| a在线观看视频网站| 国产精品熟女久久久久浪| 久久久水蜜桃国产精品网| 日韩中文字幕视频在线看片| 午夜两性在线视频| 国产欧美日韩一区二区三| 汤姆久久久久久久影院中文字幕| av电影中文网址| 亚洲精品粉嫩美女一区| 久久ye,这里只有精品| 岛国在线观看网站| 亚洲视频免费观看视频| 桃花免费在线播放| 日韩中文字幕欧美一区二区| 狠狠狠狠99中文字幕| 丝袜美足系列| 91精品三级在线观看| 色尼玛亚洲综合影院| 日韩成人在线观看一区二区三区| 精品熟女少妇八av免费久了| 麻豆乱淫一区二区| 日本a在线网址| 亚洲精品av麻豆狂野| 久久狼人影院| 久久午夜亚洲精品久久| 女人爽到高潮嗷嗷叫在线视频| 两个人免费观看高清视频| 欧美日韩视频精品一区| 99久久99久久久精品蜜桃| 久久亚洲精品不卡| 国产欧美日韩一区二区精品| 欧美乱码精品一区二区三区| 国产精品国产av在线观看| 午夜精品久久久久久毛片777| 中文字幕精品免费在线观看视频| a级片在线免费高清观看视频| 久久久精品国产亚洲av高清涩受| 成年版毛片免费区| 亚洲精品粉嫩美女一区| 久久久久视频综合| 美女视频免费永久观看网站| 亚洲欧美一区二区三区黑人| 法律面前人人平等表现在哪些方面| 国产欧美日韩一区二区三区在线| 一区在线观看完整版| 亚洲精品在线美女| 中文字幕人妻熟女乱码| www.自偷自拍.com| 桃花免费在线播放| 日本欧美视频一区| 老司机福利观看| 99re在线观看精品视频| 国产精品 欧美亚洲| h视频一区二区三区| 欧美中文综合在线视频| 国产一卡二卡三卡精品| 色视频在线一区二区三区| 欧美黑人欧美精品刺激| 国产精品电影一区二区三区 | av福利片在线| 99久久人妻综合| aaaaa片日本免费| 涩涩av久久男人的天堂| 欧美一级毛片孕妇| 人妻 亚洲 视频| 一级毛片电影观看| 美女高潮喷水抽搐中文字幕| 国产精品电影一区二区三区 | 极品人妻少妇av视频| 亚洲精品在线观看二区| 可以免费在线观看a视频的电影网站| 丝袜喷水一区| 亚洲avbb在线观看| 国产一卡二卡三卡精品| 一级毛片女人18水好多| 90打野战视频偷拍视频| 老司机深夜福利视频在线观看| 精品免费久久久久久久清纯 | 两个人免费观看高清视频| 一级毛片电影观看| 男女床上黄色一级片免费看| 在线观看免费高清a一片| 人人妻人人澡人人爽人人夜夜| netflix在线观看网站| 国产有黄有色有爽视频| 曰老女人黄片| 免费人妻精品一区二区三区视频| 女人被躁到高潮嗷嗷叫费观| 日本撒尿小便嘘嘘汇集6| 久久久国产欧美日韩av| 亚洲精品国产一区二区精华液| 一区二区日韩欧美中文字幕| 两个人看的免费小视频| 女人久久www免费人成看片| 亚洲中文日韩欧美视频| 国产伦人伦偷精品视频| 九色亚洲精品在线播放| 成年人黄色毛片网站| 国产高清视频在线播放一区| av片东京热男人的天堂| 精品视频人人做人人爽| 最近最新中文字幕大全电影3 | 亚洲精品中文字幕一二三四区 | 中文字幕人妻熟女乱码| 国产日韩欧美亚洲二区| 国产男女内射视频| 久久av网站| 国产99久久九九免费精品| 久久精品人人爽人人爽视色| 99国产精品一区二区三区| 啪啪无遮挡十八禁网站| 亚洲精品在线美女| 国产成人av教育| 精品亚洲成国产av| 午夜成年电影在线免费观看| 国产精品二区激情视频| 精品卡一卡二卡四卡免费| 国产亚洲精品久久久久5区| 手机成人av网站| 亚洲人成电影观看| 18禁观看日本| av福利片在线| 超碰97精品在线观看| 日韩大码丰满熟妇| 91麻豆av在线| 大码成人一级视频| 美女午夜性视频免费| 国产国语露脸激情在线看| 老熟妇仑乱视频hdxx| 最黄视频免费看| 黄网站色视频无遮挡免费观看| 亚洲一区二区三区欧美精品| 97人妻天天添夜夜摸| 纵有疾风起免费观看全集完整版| 亚洲欧美一区二区三区久久| 亚洲精品美女久久av网站| 国产高清国产精品国产三级| av视频免费观看在线观看| 国产亚洲午夜精品一区二区久久| 80岁老熟妇乱子伦牲交| 黑丝袜美女国产一区| 老司机福利观看| 丝袜喷水一区| 国产区一区二久久| 亚洲成人免费av在线播放| 性少妇av在线| 老熟女久久久| 国产成人一区二区三区免费视频网站| 天堂俺去俺来也www色官网| 久久天躁狠狠躁夜夜2o2o| 超碰成人久久| 免费高清在线观看日韩| 久久99热这里只频精品6学生| 考比视频在线观看| 成人三级做爰电影| 欧美av亚洲av综合av国产av| 性少妇av在线| www.自偷自拍.com| 99热国产这里只有精品6| 国产成人欧美| 国产色视频综合| 亚洲三区欧美一区| 亚洲精品自拍成人| 午夜激情av网站| cao死你这个sao货| 超碰成人久久| 精品国产乱码久久久久久男人| 99九九在线精品视频| 亚洲av电影在线进入| 热re99久久国产66热| 岛国毛片在线播放| 午夜免费鲁丝| 日韩熟女老妇一区二区性免费视频| 国产精品久久久久成人av| 久久久久国内视频| 99久久人妻综合| 国产成人啪精品午夜网站| 一二三四社区在线视频社区8| 天天躁日日躁夜夜躁夜夜| 中亚洲国语对白在线视频| 亚洲国产欧美日韩在线播放| 精品久久蜜臀av无| 亚洲成av片中文字幕在线观看| 欧美乱码精品一区二区三区| 又大又爽又粗| 亚洲伊人色综图| √禁漫天堂资源中文www| 日本黄色日本黄色录像| 在线天堂中文资源库| 午夜福利影视在线免费观看| 欧美亚洲 丝袜 人妻 在线| 亚洲av成人不卡在线观看播放网| 亚洲欧洲日产国产| 国产亚洲欧美在线一区二区| 下体分泌物呈黄色| 欧美日韩福利视频一区二区| 国产淫语在线视频| 日日爽夜夜爽网站| 精品福利永久在线观看| 久久久久久久国产电影| 午夜久久久在线观看| 亚洲精品一二三| 王馨瑶露胸无遮挡在线观看| 久久精品成人免费网站| 午夜免费成人在线视频| 国产精品一区二区在线不卡| 精品国产一区二区三区久久久樱花| 少妇 在线观看| 国产麻豆69| 国产免费av片在线观看野外av| 99国产精品99久久久久| 久久免费观看电影| 日韩欧美国产一区二区入口| av一本久久久久| 国产精品一区二区在线观看99| av免费在线观看网站| 国产成人av教育| 久热这里只有精品99| 一级毛片精品| 国产精品 国内视频| 好男人电影高清在线观看| 国产精品欧美亚洲77777| 日韩熟女老妇一区二区性免费视频| 老司机在亚洲福利影院| 亚洲天堂av无毛| 在线观看一区二区三区激情| 免费在线观看日本一区| 大型av网站在线播放| 国产欧美日韩一区二区三区在线| 亚洲欧洲日产国产| 午夜福利在线免费观看网站| 亚洲成人免费电影在线观看| 一本—道久久a久久精品蜜桃钙片| 美女高潮喷水抽搐中文字幕| 国产精品熟女久久久久浪| 久久久国产成人免费| 精品视频人人做人人爽| 99国产精品99久久久久| 久久精品成人免费网站| 91成人精品电影| 青青草视频在线视频观看| 51午夜福利影视在线观看| 亚洲国产欧美日韩在线播放| 国产精品久久电影中文字幕 | 精品人妻熟女毛片av久久网站| 国产老妇伦熟女老妇高清| 亚洲人成电影免费在线| 国产免费av片在线观看野外av| 黑人操中国人逼视频| 在线观看免费日韩欧美大片| 免费少妇av软件| 中文字幕av电影在线播放| 色精品久久人妻99蜜桃| 国产日韩欧美亚洲二区| 国产成人av激情在线播放| 国产成人精品久久二区二区91| 在线亚洲精品国产二区图片欧美| 色尼玛亚洲综合影院| 精品国产一区二区三区久久久樱花| 激情视频va一区二区三区| 亚洲第一欧美日韩一区二区三区 | 精品第一国产精品| 亚洲av第一区精品v没综合| 纯流量卡能插随身wifi吗| 久久久精品94久久精品| 国内毛片毛片毛片毛片毛片| 国产成人欧美| 欧美国产精品一级二级三级| 久久中文字幕人妻熟女| 黄色 视频免费看| 多毛熟女@视频| 叶爱在线成人免费视频播放| 久久婷婷成人综合色麻豆| 午夜成年电影在线免费观看| 极品教师在线免费播放| 老汉色∧v一级毛片| 午夜成年电影在线免费观看| 大陆偷拍与自拍| 老汉色∧v一级毛片| 多毛熟女@视频| 丝袜美腿诱惑在线| 成人av一区二区三区在线看| www.精华液| 国产精品av久久久久免费| 悠悠久久av| 国产高清videossex| 天堂中文最新版在线下载| 男人舔女人的私密视频| 精品第一国产精品| cao死你这个sao货| 日本五十路高清| 看免费av毛片| 久久精品成人免费网站| 丁香欧美五月| 丝袜美足系列| 欧美乱妇无乱码| 久热这里只有精品99| 成人永久免费在线观看视频 | 久久精品熟女亚洲av麻豆精品| 99久久99久久久精品蜜桃| 国产av又大| 另类亚洲欧美激情| 热99国产精品久久久久久7| 午夜精品久久久久久毛片777|