• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Novel Universal Steganalysis Algorithm Based on the IQM and the SRM

    2018-09-11 05:13:44YuYangYuweiChenYulingChenandWeiBi
    Computers Materials&Continua 2018年8期

    Yu Yang , Yuwei Chen Yuling Chen and Wei Bi

    Abstract: The state-of-the-art universal steganalysis method, spatial rich model (SRM),and the steganalysis method using image quality metrics (IQM) are both based on image residuals, while they use 34671 and 10 features respectively. This paper proposes a novel steganalysis scheme that combines their advantages in two ways. First, filters used in the IQM are designed according to the models of the SRM owning to their strong abilities for detecting the content adaptive steganographic methods. In addition, a total variant (TV)filter is also used due to its good performance of preserving image edge properties during filtering. Second, due to each type of these filters having own advantages, the multiple filters are used simultaneously and the features extracted from their outputs are combined together. The whole steganalysis procedure is removing steganographic noise using those filters, then measuring the distances between images and their filtered version with the image quality metrics, and last feeding these metrics as features to build a steganalyzer using either an ensemble classifier or a support vector machine. The scheme can work in two modes, the single filter mode using 9 features, and the multi-filter mode using 639 features. We compared the performance of the proposed method, the SRM and the maxSRMd2. The maxSRMd2 is the improved version of the SRM. The simulated results show that the proposed method that worked in the multi-filter mode was about 10% more accurate than the SRM and maxSRMd2 when the data were globally normalized, and had similar performance with the SRM and maxSRMd2 when the data were locally normalized.

    Keywords: Image steganalysis, IQM, SRM, total variation, universal image steganalysis.

    1 Introduction

    Methods that can discover steganographic images are called steganalysis algorithms [Ker(2007a, 2007b); Li, Zeng and Yang (2008); Peony (2007); Ker and Lubenko (2009); Xia,Wang, Sun et al. (2016, 2014)]. The steganalysis methods that are not limited to detect the particular information hiding tools are universal steganalysis algorithms, or blind steganalysis algorithms [Tan and Li (2014); Chen and Shi (2008); Broda, Levicky,Banoci et al. (2014)]. Here, the term universal means that the methods are effective for many different steganography algorithms and the term blind emphasizes that the analysis is carried out without the knowledge of the used hiding methods.

    Considering the rapid speed at which the variant or new hiding methods have spawned,the universal steganalysis methods are very important to identify potential threats from messages covered by huge amount of images on the internet. A universal steganalysis method should detect as many steganography methods and should have as low dimension of a feature vector as it can. However, current blind steganalysis methods are not yet good enough in these regards.

    The state-of-the-art blind steganalysis technique is the spatial rich model (SRM) [Fridrich and Kodovsky (2012)] designed by Fridrich. This method evolved from the subtractive pixel adjacency matrix (SPAM) algorithm [Pevny, Bas and Fridrich (2010)], which focused on relationships between neighboring pixels. The SPAM method utilizes a highorder Markov chain and a transition probability matrix to discover distortions due to steganographic embedding. The SRM replaces these simple multi-directional differences with various types of residuals obtained by linear and nonlinear filters. The SRM can accurately detect most challenging steganographic algorithms such as least significant bit matching (LSBM), edge-adaptive (EA) [Luo, Huang and Huang (2010)], and highly undetectable steganography (HUGO) [Pevny, Filler and Bas (2010)]. However, the SRM uses 34671 features, which means that its procedures of feature extraction and machine learning are time-consuming. Although there are many improved algorithms based on the SRM, the essential problem remains. For example, depending on embedding possibilities of pixels, Tang et al. [Tang, Li, Luo et al. (2015)] assigned different weights to these pixels during feature extraction. Yu et al. [Yu, Li, Cheng et al. (2016)] proposed another feature called contrast feature, which consists of the residual angle and norm. These methods improve SRM’s detection accuracy for the low embedding rate adaptive steganography methods, such as WOW [Holub and Fridrich (2012)] and UNIWARD[Holub, Fridrich and Denemark (2014)], but the feature dimensionalities of these methods are still high.

    Based on two considerations, another kind of prevailing steganalysis methods [Ye, Ni and Yi (2017); Xu, Wu, Shi et al. (2016); Zeng, Tan and Huang (2018)] uses deep learning approaches. The first is that the abilities of feature auto-extraction of the deep learning networks can easy the design of the steganalysis feature. The second is that the deep learning architectures are similar to the mechanism of the SRM so they have the potential to replace the SRM with better performance. However the deep learning based steganalysis method are still being explored, and the complexity of these methods remain high.

    The steganalysis method using image quality metrics [Avcbas, Memon and Sankur(2003)], called IQM, also focuses on residuals and uses much fewer features. However,the IQM-based approaches [Xu, Wang and Liu (2007); Geetha, Sindhu and Kamaraj(2008, 2007)] are only valid for some steganographic tools because the filter is only applicable to some types of steganographic noise. This paper presents a novel universal blind algorithm based on the IQM and the SRM, which uses at most 639 features to achieve similar or better detection performance than the SRM using 34671 features.Novel zero-watermarking scheme based on DWT-DCT [Yang, Lei, Liu et al. (2016)] and discrete cosine transform (DCT) is discussed. An overview of general theory of security[Lei, Yang, Niu et al. (2017)] which is devoted to constructing a comprehensive model of network security is discussed.

    This paper is organized as follows. Section 2 describes the proposed method and details the design of the filters, distance measures, classifying method, and etc. Section 3 presents the results of simulation and analyzes the performance of the proposed method.Finally, a brief conclusion is given in Section 4.

    2 The proposed algorithm

    The proposed method is based on the IQM, and the main idea of which is that the distribution of distances between a natural image and its filtered version is different from the distribution of distances between a steganographic image and its denoised version. As shown in Fig. 1, in order to detect whether an image X∈?M×?Ncontains a secret message, the method first filters X using the function ?(X), then uses a set of functions mk(X,) to evaluate the distances dkbetween the image X and its filtered versionand finally provides a vector d composed of dkto the classifier c. Similar to most common universal steganalysis methods, the classifier is trained using machine learning methods. The main points of this approach are the design of filters, distance measures,and classifiers. We will discuss them one by one in the following.

    Figure 1: The mechanism of the proposed method. An estimated image X? is got by filtering the image X to be detected. The image quality metrics dk between them are used as the feature vector d that feed to the classifier c(.)

    2.1 The filters

    The choice of filters is important to the performance of the method. A good filter preserves natural image characteristics as much as possible while removing steganographic noise,which helps the algorithm achieve higher accuracy. In addition to the basic filters, such as the Gaussian and Wiener filter, two more types of filters are used. One of them is a total variation (TV) [Wahid and Lee (2017)] filter called the TV filter. The total variation denoising technique is based on the fact that the noise image has a higher TV value.Therefore, image denoising can be achieved by minimizing the TV value of the image.The TV filter is chosen because it is not only valid for removing noise, but also good at preserving image edge properties.

    The other type is SRM-based filter. The SRM [Fridrich and Kodovsky (2012)] uses the high pass filters to get residuals. Since these residuals are very useful for capturing discontinuities introduced by steganography methods, the first- and second-order filters are also used in this proposed approach. For example, according to the SRM secondorder residual, which is defined as R(i,j)=(X(i,j+1)+X(i,j-1))-2X(i,j), this method designs and uses the filter defined as ?(X(i,j))=(X(i,j+1)+X(i,j-1))/2.The nonlinear filters that taking the minimum (or maximum) of the linear filters’ outputs,such as

    ?(X(i,j))=min(?1(X(i,j)),?2(X(i,j)))=min((X(i,j+1)+X(i,j-1))/2,(X(i+1,j)+X(i-1,j))/2), are utilized too. Some filters have four direction forms that they start from the initial forms and rotate counterclockwise in step of 90 degrees until back to the beginning position. For example, the four direction forms of ?(X(i,j))=X(i+1,j)are?(X(i,j))=X(i,j+1), ?(X(i,j))=X(i-1,j), ?(X(i,j))=X(i,j-1),and ?(X(i,j))=X(i+1,j). As a result, this approach uses 71 SRM-based filters in total.

    2.2 The distance measures

    Embedding messages in the carrier images increases their degree of discontinuity, which means the distances between a steganographic image and its filtered one are greater than the distances between a natural and its filtered version. Let= ?(X) be the filtered image of an image X, the distances are evaluated using the image quality metrics [Tang,Li, Luo et al. (2016)] dk=mk(X,) listed in Tab. 1. These quality metrics are selected according to their accuracies, consistencies and monotonicity.

    Table 1: Image quality measures

    2.3 The Classifying method

    The support vector machine (SVM) is an effective classification method for small data sets. The main idea is to transform the original input data set into a high-dimensional feature space by using a kernel function and then to optimize the classification in this new feature space under the assumption of linear separability. Because of the small number of features that the proposed algorithm uses, a SVM classifier is a suitable classifier.

    The optimal parameters of the SVM is obtained by grid searching, which is timeconsuming when the searching range is large. Therefore, the method also examines the ensemble classifier. We use the same ensemble classifier as the SRM does, which is a random forest. It consists of many fisher linear discriminants (FLDs) that work as base learners, and each of them is trained on a randomly chosen different-dimensional subspace of the feature space. The final decision of the classifier is made using majority voting according to the decisions of all base learners. Both of the two classifiers can work well and should be chosen according to the application environment.

    2.4 The working modes

    The proposed method works in two modes, a single filter mode and multi-filter mode.Among all of the aforementioned filters, the single filter mode selects the TV filter because of its ability of removing steganographic noise and preserving the image edge properties at the same time. As using only one filter, this mode uses a 9-dimensinal feature vector. In contrast to the single filter mode, the multi-filter mode uses all these filters because they each have their own advantages. This mode combines all the measures corresponding to each filter. As there are 71 filters, each of which corresponding to 9 measures, therefore the multi-filter mode uses a 639-dimensional feature vector. Both modes can use either the ensemble classifier or the SVM classifier.

    3 Simulation results and analysis

    In order to study the performance of all the candidate filters, four typical space domain steganography methods and one transform domain steganography method were used.They were LSB, EA [Luo, Huang and Huang (2010)], syndrome-trellis codes (STC)[Filler, Judas and Fridrich (2011)], HUGO [Pevny, Filler and Bas (2010)], and QIM[Chen and Wornell (2001)]. EA may be the first steganography method that introduce content adaptive design idea. HUGO improves EA and fully utilizes the knowledge about the steganalysis methods. STC goes further and becomes as the foundation of the current most secure steganography methods, which are content adaptive methods including WOW [Holub and Fridrich (2012)], S-UNIWARD [Holub, Fridrich and Denemark(2014)] and etc. Therefore, we chose HUGO, WOW and S-UNIWARD to verify the performance of the proposed method.

    The carrier images were chosen from the BOSSbase version 1.01 database [Filler, Pevny and Bas (2010)]. For each embedding rate and steganography method, 500 natural images and their corresponding steganographic images were prepared, which yielded a total of 1000 samples per steganography method per payload. These samples were divided into two equal groups, one for training and the other one for testing.

    We used a SVM and ensemble classifier. The SVM classifier used a RBF kernel, and the RBF scaling factor γ and the box constraint C were optimized by grid search. The searching range for γ was e-10to e10with a step of e0.1, and for C, it was e0to e10with a step of e0.1.

    The steganographic images were generated with a series of different embedding rates.The embedding rate is defined as lm/lsin units of bits per pixel (bpp), here, lmis the length of hidden message, and lsis the total number of the cover image pixels. In addition, the images produced by different steganography methods have different transparencies even at the same embedding rates, and therefore the pitch signal-to-noise ratio (PSNR) was also used to analyze the capability of our method. We also used the accuracy rate (AR) for evaluation. AR is defined as (nc+ns)/n, where n is the total number of the samples, and, ncand nsare the number of the natural and steganographic images, respectively, correctly classified.

    3.1 Performance analysis of the filters

    Different filters are sensitive to different types of steganographic noise. To compare their performance, we used one filter at a time to construct detectors in turn. We studied the accuracy rates of the detectors using the Gaussian, Wiener, TV, first-order, and secondorder filter, respectively. In order to further examine the performance of these filters, we analyzed the simulation result from two perspectives, that is, the relationship between transparency and detection accuracy, and the relationship between a steganography method and detection accuracy.

    We sorted the detection accuracy in the ascending order of the PSNRs. Fig. 2 clearly shows the relationship between transparency and detection accuracy. The results of the detectors using the Gaussian, Wiener and TV filters are shown in Fig. 2(a), and those of the detectors using the first-order, second-order, and TV filters are shown in Fig. 2(b). In general, a small PSNR means a high embedding ratio, so the smaller the PSNR, the higher the detection accuracy. In particular, the detector using the TV filter had high detection accuracy even at low embedding rates. This good detection performance mainly benefited from the fact that TV filters introduce very little secondary noise when removing steganographic noise. The detectors that use the first- or second-order filters were less accurate than that using the TV filter but were more accurate than those that use the Gaussian or the Wiener filter.

    Figure 2: The relationship between the transparency and accuracy. The higher the peak signal-to-noise ratio between the nature and steganographic images were, the less the effect on the nature images were casted by the steganography methods, and therefore the more difficult the detection was. Among all detectors, the detector using the TV filter achieved the best detection accuracy

    To examine the relationship between a steganography algorithm and detection accuracy,we compared the detection performance of these detectors, as shown in Fig. 3. The steganography methods using special techniques such as the matrix coding generated images with higher PSNRs than those generated by the other methods, and therefore were more difficult to detect. For the LSB, EA, HUGO, and STC algorithms, the first three most accurate detectors were the ones using the TV, first-, and second-order filters.

    In conclusion, the detector using a TV filter was capable to discover all these steganography methods, and using multiple types of filters could improve the performance.

    Figure 3: The relationships between the accuracy and steganography methods. The detection accuracy was related with the embedding payload and methods. The higher the embedding payload was, the easier the detection was. The most challenging steganography method was the HUGO. On most conditions, the first three most accurate methods separately used the TV, 1st- and 2nd-filter

    3.2 Performance comparison of the steganalysis methods

    We compared the proposed method with the SRM and maxSRMd2. The single filter mode and multi-filter mode of this method use 9 and 639 features respectively. For convenience, in Tab. 2, we denoted the single filter mode, the multi-filter mode, the SRM and the maxSRMd2 as A1, A2, A3, and A4 respectively. Here, the SVM classifier was used for the single filter mode, and the ensemble classifier [Kodovsky, Fridrich and Holub (2012)] was used in the multi-filter mode. In addition, the performance data for the SRM and maxSRMd2 is quoted from the literature [Tang, Li, Luo et al. (2015)].

    Table 2: The accuracy comparison

    According to the content adaptive steganalysis techniques, the maxSRMd2 assigns higher weights to those complex texture areas. As a result, the maxSRMd2 was more accurate than the SRM especially at the low embedding rate. Owning to the combining the advantages of the SRM and the IQM, for the HUGO, WOW, and S-UNIWARD algorithms, the multi-filter mode was more accurate than the SRM and maxSRMd2. As only one filter is used, the single filter mode poorly performed at 0.3 bpp or lower embedding rate.

    At the embedding rate of 0.1 bpp, the multi-filter mode detected all the steganography methods with the accuracy of at least 79%. The single filter mode could accurately detect the HUGO algorithm with a capacity above 0.3 bpp, and the WOW algorithm with a capacity above 0.4 bpp. The result shows the single filter mode is suitable for computing resource-limited environments, while the multi-filter mode is suitable for applications that require higher detection accuracy.

    3.3 Effects analysis of data normalization

    Data normalization is necessary and important. In the case of a large variation in the dynamic ranges of the different features, normalization makes each feature work instead of being masked due to its smaller dynamic range. Second, normalization can improve the convergence rate of the gradient descent algorithm. When normalizing, we adjusted a variable x∈[a,b] into the new range [c,d] using the linear function g(x)=c+where the new dynamic range [c,d] was [0,1].

    According the range of data normalization, three methods were used. The first method normalized the each feature among the whole data set and then randomly segmented the normalized features into the training and testing set. The first method is actually a global normalization method, so the result obtained by this method is denoted as GN in Tab. 3.The second method normalized the each feature among the training set, and recorded their maximum and minimum values. These values were then used to normalize the features among the testing set. The third method normalized the each feature among the training set and testing set respectively. These two methods are both local normalization methods, and the second method has a more stable and superior performance. Therefore,only the result under the second method is listed in Tab. 3 and denoted as LN.

    It is shown in Tab. 3 that normalizing features could improve the accuracy a lot and global normalization performs better than local normalization. However, the second normalization method still performs better than the SRM, and it is easier to implement in actual operation.

    Table 3: The effect of the normalization methods

    4 Conclusion

    This paper presented a novel steganalysis method based on the IQM and the SRM.Compared with the SRM, the IQM uses the distances between the image and its filtered version as the features, which are actually various weighted multi-domain accumulative sum of the residuals and are more conducive to reflecting the steganographic noise.

    Because of the fact that the total variation technique introduces less secondary noise when removing steganographic noise, the single filter mode only uses the TV filter. This mode therefore uses only 9 features but achieved similar performance to the SRM. This characteristic helps to extend the application of steganalysis to the computing resourcelimited environments.

    Inspired by the SRM, the multi-filter mode uses multiple types of filters including the first- and second-order filters used by the SRM, and combines respective outputting measure as the feature vector. Although the number of the features thus increases to 639,a higher detection accuracy is achieved, resulting in an average accuracy of higher than 79% even at embedding rates as low as 0.1 bpp.

    The data normalization method heavily influents the performance of the proposed method especially for the content adaptive steganography method at low embedding rate. Future study will focus on improving data normalization method and optimizing the proposed method with content adaptive steganalysis techniques.

    Acknowledgement:This work is supported by the National Key R&D Program of China(2017YFB0802703), the Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data (2017BDKFJJ017) and CCF-Venustech Hongyan Research Initiative (2017-004).

    91精品伊人久久大香线蕉| 亚洲精品第二区| 久久99热这里只频精品6学生| 成年人午夜在线观看视频| 亚洲 国产 在线| 日韩欧美一区视频在线观看| 香蕉丝袜av| 国产成人一区二区三区免费视频网站| 窝窝影院91人妻| 一级a爱视频在线免费观看| 久久久国产欧美日韩av| 国产高清视频在线播放一区 | 免费高清在线观看视频在线观看| 亚洲欧洲日产国产| 亚洲一区中文字幕在线| 久久亚洲精品不卡| 亚洲性夜色夜夜综合| 最黄视频免费看| 男女下面插进去视频免费观看| 国产欧美日韩综合在线一区二区| 久久影院123| 天天躁日日躁夜夜躁夜夜| 啦啦啦啦在线视频资源| 狠狠婷婷综合久久久久久88av| 亚洲国产欧美一区二区综合| 两性夫妻黄色片| 久久久国产一区二区| 人人妻人人添人人爽欧美一区卜| 国产精品免费视频内射| av线在线观看网站| 亚洲国产日韩一区二区| 欧美日韩成人在线一区二区| 2018国产大陆天天弄谢| 搡老熟女国产l中国老女人| 欧美日韩av久久| 老熟女久久久| 亚洲精品粉嫩美女一区| 国产精品久久久久久人妻精品电影 | 成年动漫av网址| 性高湖久久久久久久久免费观看| 欧美人与性动交α欧美精品济南到| www.熟女人妻精品国产| 久久久久网色| 97在线人人人人妻| 国产免费现黄频在线看| 久久久精品国产亚洲av高清涩受| av在线播放精品| 国产精品一二三区在线看| 啦啦啦免费观看视频1| 欧美激情极品国产一区二区三区| 交换朋友夫妻互换小说| 亚洲第一欧美日韩一区二区三区 | 视频区图区小说| 欧美精品av麻豆av| 777久久人妻少妇嫩草av网站| 国产亚洲av片在线观看秒播厂| 国产欧美日韩精品亚洲av| 亚洲精品自拍成人| 正在播放国产对白刺激| 国产日韩欧美视频二区| 在线永久观看黄色视频| 纵有疾风起免费观看全集完整版| 欧美日韩一级在线毛片| av天堂久久9| 免费日韩欧美在线观看| 午夜影院在线不卡| 精品国产乱码久久久久久男人| 女警被强在线播放| 精品少妇久久久久久888优播| 国产精品1区2区在线观看. | 99精品久久久久人妻精品| 亚洲欧洲精品一区二区精品久久久| 欧美国产精品va在线观看不卡| 老熟女久久久| 日韩欧美免费精品| 国产麻豆69| 50天的宝宝边吃奶边哭怎么回事| 黄色 视频免费看| 欧美老熟妇乱子伦牲交| 亚洲精品日韩在线中文字幕| 欧美大码av| 欧美日韩av久久| 啦啦啦免费观看视频1| 日韩欧美免费精品| 欧美一级毛片孕妇| 国产精品久久久久成人av| 日韩制服丝袜自拍偷拍| 女人久久www免费人成看片| 国产精品成人在线| av在线播放精品| 亚洲精品国产区一区二| 99国产精品99久久久久| 动漫黄色视频在线观看| 中文字幕人妻丝袜一区二区| 亚洲色图 男人天堂 中文字幕| 亚洲精品国产色婷婷电影| www日本在线高清视频| 精品人妻一区二区三区麻豆| 涩涩av久久男人的天堂| 亚洲av电影在线进入| 精品熟女少妇八av免费久了| 久久青草综合色| 女性被躁到高潮视频| 免费黄频网站在线观看国产| 国产免费福利视频在线观看| 亚洲av男天堂| 日韩免费高清中文字幕av| 欧美av亚洲av综合av国产av| 国产福利在线免费观看视频| 伦理电影免费视频| 999久久久精品免费观看国产| 1024香蕉在线观看| 免费人妻精品一区二区三区视频| 亚洲情色 制服丝袜| 国产亚洲av高清不卡| 美女中出高潮动态图| 久久99一区二区三区| 桃花免费在线播放| 国产精品久久久久成人av| 久久久国产欧美日韩av| 国产伦人伦偷精品视频| 亚洲欧洲日产国产| 国产精品99久久99久久久不卡| 在线观看免费视频网站a站| 欧美精品人与动牲交sv欧美| 国产区一区二久久| 午夜91福利影院| 人人妻,人人澡人人爽秒播| 视频区欧美日本亚洲| 两性夫妻黄色片| 亚洲情色 制服丝袜| 建设人人有责人人尽责人人享有的| 国产精品国产av在线观看| 精品久久久久久久毛片微露脸 | 淫妇啪啪啪对白视频 | 久久亚洲精品不卡| 国产精品成人在线| 午夜福利视频精品| 少妇精品久久久久久久| 伊人亚洲综合成人网| 精品国产国语对白av| 十八禁高潮呻吟视频| 国产免费福利视频在线观看| 99久久国产精品久久久| 亚洲 欧美一区二区三区| 成年av动漫网址| 少妇裸体淫交视频免费看高清 | 少妇被粗大的猛进出69影院| 精品国产一区二区三区久久久樱花| 十分钟在线观看高清视频www| 9热在线视频观看99| 在线永久观看黄色视频| 午夜老司机福利片| 亚洲一区中文字幕在线| 视频区欧美日本亚洲| 91麻豆av在线| 国产高清视频在线播放一区 | 国产精品一二三区在线看| 性高湖久久久久久久久免费观看| www.熟女人妻精品国产| 精品人妻一区二区三区麻豆| 麻豆av在线久日| 啦啦啦中文免费视频观看日本| videos熟女内射| 久久久久久久久久久久大奶| xxxhd国产人妻xxx| 欧美黑人精品巨大| 国产麻豆69| 欧美日韩精品网址| 日本黄色日本黄色录像| 国产激情久久老熟女| 婷婷色av中文字幕| 欧美在线一区亚洲| 亚洲成人手机| 久久精品aⅴ一区二区三区四区| tocl精华| 日韩免费高清中文字幕av| 国产又色又爽无遮挡免| 18禁黄网站禁片午夜丰满| 两性午夜刺激爽爽歪歪视频在线观看 | 操出白浆在线播放| 岛国在线观看网站| 亚洲精品美女久久av网站| 最新在线观看一区二区三区| 美女视频免费永久观看网站| 中文字幕人妻丝袜制服| 久久国产精品人妻蜜桃| 国产又爽黄色视频| 99精品久久久久人妻精品| 久久精品亚洲熟妇少妇任你| 美女高潮到喷水免费观看| 色综合欧美亚洲国产小说| 不卡一级毛片| 一级片免费观看大全| 看免费av毛片| 久久久精品免费免费高清| 欧美人与性动交α欧美精品济南到| 亚洲自偷自拍图片 自拍| 黄片小视频在线播放| 国产精品秋霞免费鲁丝片| 一边摸一边抽搐一进一出视频| 亚洲精品美女久久久久99蜜臀| 中文字幕色久视频| 男人舔女人的私密视频| 国产成人影院久久av| 国产免费一区二区三区四区乱码| 美女高潮喷水抽搐中文字幕| av网站在线播放免费| 蜜桃国产av成人99| 久久天躁狠狠躁夜夜2o2o| 在线观看免费高清a一片| 日韩精品免费视频一区二区三区| 亚洲国产av影院在线观看| 欧美精品亚洲一区二区| 久久国产精品大桥未久av| 精品一区在线观看国产| 在线观看一区二区三区激情| 一进一出抽搐动态| 激情视频va一区二区三区| 欧美激情高清一区二区三区| 丁香六月欧美| 欧美激情 高清一区二区三区| 久久久久久亚洲精品国产蜜桃av| 国产亚洲一区二区精品| 一级片免费观看大全| 热re99久久国产66热| 久久久欧美国产精品| 99久久精品国产亚洲精品| 国产精品一二三区在线看| 免费观看av网站的网址| 丝袜美足系列| 1024香蕉在线观看| 日本猛色少妇xxxxx猛交久久| 亚洲 国产 在线| 亚洲精品自拍成人| 久久久久网色| 少妇裸体淫交视频免费看高清 | 久久天堂一区二区三区四区| 高清av免费在线| 中文字幕制服av| 国产精品 国内视频| 99久久99久久久精品蜜桃| 国产不卡av网站在线观看| 操美女的视频在线观看| 成年av动漫网址| 亚洲人成电影观看| 国产亚洲精品一区二区www | 1024香蕉在线观看| 免费久久久久久久精品成人欧美视频| 丝袜喷水一区| 久9热在线精品视频| 不卡av一区二区三区| 欧美日本中文国产一区发布| 两个人看的免费小视频| 久久精品aⅴ一区二区三区四区| 老司机午夜十八禁免费视频| 欧美 日韩 精品 国产| 伊人亚洲综合成人网| netflix在线观看网站| 国产伦理片在线播放av一区| 欧美另类一区| 美女午夜性视频免费| 国产极品粉嫩免费观看在线| 黄网站色视频无遮挡免费观看| 狠狠狠狠99中文字幕| 久久 成人 亚洲| 亚洲视频免费观看视频| 欧美中文综合在线视频| 亚洲第一av免费看| 国产成人免费观看mmmm| 成人国产一区最新在线观看| 久久香蕉激情| 老汉色∧v一级毛片| 老鸭窝网址在线观看| 99九九在线精品视频| 在线精品无人区一区二区三| av天堂久久9| 男人添女人高潮全过程视频| 日韩制服骚丝袜av| 每晚都被弄得嗷嗷叫到高潮| 久久久久久免费高清国产稀缺| 亚洲一码二码三码区别大吗| 亚洲精品日韩在线中文字幕| 亚洲av电影在线观看一区二区三区| 亚洲专区中文字幕在线| 女性被躁到高潮视频| 每晚都被弄得嗷嗷叫到高潮| 捣出白浆h1v1| 黄色片一级片一级黄色片| 啦啦啦在线免费观看视频4| av线在线观看网站| 日本av免费视频播放| 欧美日韩精品网址| 欧美精品一区二区大全| 免费在线观看视频国产中文字幕亚洲 | 亚洲av国产av综合av卡| 97人妻天天添夜夜摸| 欧美日韩亚洲综合一区二区三区_| 午夜免费鲁丝| 欧美老熟妇乱子伦牲交| 美女扒开内裤让男人捅视频| 国产又爽黄色视频| 国产区一区二久久| 女人高潮潮喷娇喘18禁视频| 亚洲欧美成人综合另类久久久| 国产亚洲一区二区精品| 黄片大片在线免费观看| 少妇 在线观看| 大型av网站在线播放| 精品国产国语对白av| 在线天堂中文资源库| 丰满迷人的少妇在线观看| 午夜免费观看性视频| 首页视频小说图片口味搜索| 91成人精品电影| 99香蕉大伊视频| 麻豆乱淫一区二区| 1024视频免费在线观看| 精品福利观看| 母亲3免费完整高清在线观看| 国产亚洲精品一区二区www | 国产精品九九99| 久久国产精品人妻蜜桃| 国产伦理片在线播放av一区| 国产高清国产精品国产三级| 他把我摸到了高潮在线观看 | 欧美日韩精品网址| 日韩人妻精品一区2区三区| 天天躁日日躁夜夜躁夜夜| 日韩熟女老妇一区二区性免费视频| 淫妇啪啪啪对白视频 | 欧美中文综合在线视频| 人妻 亚洲 视频| 美女扒开内裤让男人捅视频| 精品人妻在线不人妻| 亚洲国产欧美在线一区| 青春草视频在线免费观看| 18禁裸乳无遮挡动漫免费视频| av天堂在线播放| 国产成人精品久久二区二区免费| 亚洲av美国av| 国产成人av激情在线播放| 欧美老熟妇乱子伦牲交| 国产一区二区 视频在线| 国产精品久久久人人做人人爽| www.精华液| 精品国产一区二区三区四区第35| 欧美另类亚洲清纯唯美| 午夜福利一区二区在线看| 国产激情久久老熟女| 国产精品香港三级国产av潘金莲| 国产精品 欧美亚洲| 久久精品熟女亚洲av麻豆精品| 91麻豆av在线| 一区二区日韩欧美中文字幕| 国产人伦9x9x在线观看| 人人妻人人爽人人添夜夜欢视频| 午夜免费鲁丝| 成人免费观看视频高清| netflix在线观看网站| 免费高清在线观看日韩| 美国免费a级毛片| 国产精品av久久久久免费| 国产成人a∨麻豆精品| 捣出白浆h1v1| 亚洲成人手机| 国产精品.久久久| 窝窝影院91人妻| 国产在线免费精品| 99九九在线精品视频| 天天添夜夜摸| 99九九在线精品视频| 国产av精品麻豆| 99九九在线精品视频| 成在线人永久免费视频| 亚洲va日本ⅴa欧美va伊人久久 | 久久99热这里只频精品6学生| 老汉色av国产亚洲站长工具| 久久国产亚洲av麻豆专区| 亚洲精品粉嫩美女一区| 精品国产国语对白av| 最近中文字幕2019免费版| 女人爽到高潮嗷嗷叫在线视频| 黑丝袜美女国产一区| 亚洲国产欧美网| 亚洲av电影在线进入| 亚洲av片天天在线观看| 精品国产乱码久久久久久男人| 王馨瑶露胸无遮挡在线观看| 中文字幕另类日韩欧美亚洲嫩草| 欧美 亚洲 国产 日韩一| 亚洲国产精品一区二区三区在线| 一级a爱视频在线免费观看| 久久久久国内视频| 国产一级毛片在线| 亚洲国产av新网站| 少妇精品久久久久久久| 国产精品欧美亚洲77777| 国产精品久久久人人做人人爽| 国产高清国产精品国产三级| 捣出白浆h1v1| 亚洲欧美一区二区三区久久| 狠狠狠狠99中文字幕| 老熟妇乱子伦视频在线观看 | 亚洲va日本ⅴa欧美va伊人久久 | 国产精品熟女久久久久浪| 久久精品国产亚洲av高清一级| 手机成人av网站| 免费看十八禁软件| 丝袜在线中文字幕| 性少妇av在线| 国产日韩欧美在线精品| 精品一区在线观看国产| 美女高潮喷水抽搐中文字幕| 男男h啪啪无遮挡| 亚洲九九香蕉| 777久久人妻少妇嫩草av网站| 18在线观看网站| 超碰97精品在线观看| 99精品久久久久人妻精品| 亚洲av成人不卡在线观看播放网 | 18禁国产床啪视频网站| 啦啦啦中文免费视频观看日本| 久久精品人人爽人人爽视色| 高清欧美精品videossex| 国产福利在线免费观看视频| 国产精品国产三级国产专区5o| 亚洲美女黄色视频免费看| 狠狠精品人妻久久久久久综合| 日本撒尿小便嘘嘘汇集6| 国产日韩欧美在线精品| 正在播放国产对白刺激| 欧美激情极品国产一区二区三区| av电影中文网址| 大型av网站在线播放| 亚洲五月色婷婷综合| 国产色视频综合| 伊人久久大香线蕉亚洲五| 久久久久久亚洲精品国产蜜桃av| 久久精品aⅴ一区二区三区四区| 丰满迷人的少妇在线观看| 亚洲精品粉嫩美女一区| 我要看黄色一级片免费的| 亚洲精品粉嫩美女一区| 丝袜美足系列| 满18在线观看网站| 亚洲精品在线美女| 三级毛片av免费| 亚洲国产毛片av蜜桃av| 亚洲精品国产色婷婷电影| 中文字幕人妻丝袜一区二区| 欧美日韩国产mv在线观看视频| 国产一区二区三区av在线| 国产欧美日韩一区二区三区在线| 成人国产av品久久久| 成年人免费黄色播放视频| 午夜福利视频精品| 国产福利在线免费观看视频| 久久久精品区二区三区| 少妇人妻久久综合中文| 美女中出高潮动态图| 久久午夜综合久久蜜桃| 性高湖久久久久久久久免费观看| www日本在线高清视频| 1024视频免费在线观看| 999久久久国产精品视频| 18禁裸乳无遮挡动漫免费视频| 久久精品aⅴ一区二区三区四区| 亚洲情色 制服丝袜| 国产免费现黄频在线看| 手机成人av网站| 如日韩欧美国产精品一区二区三区| 国产精品影院久久| 亚洲精品国产一区二区精华液| 美女高潮喷水抽搐中文字幕| 欧美日韩国产mv在线观看视频| 香蕉丝袜av| 久久久久国产精品人妻一区二区| 别揉我奶头~嗯~啊~动态视频 | 欧美精品av麻豆av| 性高湖久久久久久久久免费观看| 色老头精品视频在线观看| 久久精品亚洲av国产电影网| 99国产极品粉嫩在线观看| 久久久国产一区二区| 亚洲成av片中文字幕在线观看| 精品卡一卡二卡四卡免费| 国产成人精品久久二区二区91| 激情视频va一区二区三区| 久久久精品国产亚洲av高清涩受| 亚洲精品久久成人aⅴ小说| 淫妇啪啪啪对白视频 | 男女边摸边吃奶| 亚洲精品中文字幕在线视频| 亚洲免费av在线视频| 国产免费av片在线观看野外av| 亚洲精品av麻豆狂野| 国产亚洲精品久久久久5区| 国产亚洲av高清不卡| 国产成人一区二区三区免费视频网站| 一区福利在线观看| 脱女人内裤的视频| 亚洲欧美精品自产自拍| 不卡一级毛片| 老司机午夜福利在线观看视频 | 最近中文字幕2019免费版| 一二三四在线观看免费中文在| 亚洲一卡2卡3卡4卡5卡精品中文| 在线观看一区二区三区激情| 淫妇啪啪啪对白视频 | 男男h啪啪无遮挡| 欧美在线一区亚洲| 女人被躁到高潮嗷嗷叫费观| 人妻久久中文字幕网| 欧美黑人欧美精品刺激| 人妻人人澡人人爽人人| 桃红色精品国产亚洲av| 女人高潮潮喷娇喘18禁视频| 久久午夜综合久久蜜桃| 亚洲人成77777在线视频| 无限看片的www在线观看| 亚洲精华国产精华精| 亚洲专区中文字幕在线| 国产精品欧美亚洲77777| 性高湖久久久久久久久免费观看| 美女国产高潮福利片在线看| 91国产中文字幕| 精品人妻一区二区三区麻豆| 成人18禁高潮啪啪吃奶动态图| 90打野战视频偷拍视频| 国产精品免费视频内射| 菩萨蛮人人尽说江南好唐韦庄| 日韩精品免费视频一区二区三区| 国产高清videossex| 90打野战视频偷拍视频| 亚洲精品成人av观看孕妇| 精品一区二区三区四区五区乱码| 考比视频在线观看| 精品国产国语对白av| 日韩大码丰满熟妇| 国产亚洲av片在线观看秒播厂| 欧美久久黑人一区二区| 久久中文字幕一级| 妹子高潮喷水视频| 自拍欧美九色日韩亚洲蝌蚪91| 日韩,欧美,国产一区二区三区| 男人爽女人下面视频在线观看| 成人黄色视频免费在线看| 亚洲国产毛片av蜜桃av| 免费在线观看日本一区| cao死你这个sao货| 韩国精品一区二区三区| 亚洲精品国产色婷婷电影| 99精国产麻豆久久婷婷| 一区二区三区激情视频| av又黄又爽大尺度在线免费看| 亚洲精品美女久久久久99蜜臀| 五月天丁香电影| 午夜精品久久久久久毛片777| 美女中出高潮动态图| 91精品国产国语对白视频| 啪啪无遮挡十八禁网站| 成人国产一区最新在线观看| 成人影院久久| 中文字幕人妻丝袜制服| 悠悠久久av| 免费久久久久久久精品成人欧美视频| 黄色视频不卡| av免费在线观看网站| 亚洲av男天堂| 十八禁网站免费在线| 曰老女人黄片| 国产精品秋霞免费鲁丝片| 欧美老熟妇乱子伦牲交| 热99国产精品久久久久久7| 最黄视频免费看| 欧美变态另类bdsm刘玥| 丰满少妇做爰视频| 久久精品亚洲av国产电影网| 久久国产精品男人的天堂亚洲| 日日摸夜夜添夜夜添小说| a级毛片在线看网站| 国产日韩欧美亚洲二区| 人人妻人人添人人爽欧美一区卜| 天天操日日干夜夜撸| 好男人电影高清在线观看| 丰满人妻熟妇乱又伦精品不卡| 亚洲九九香蕉| 欧美 日韩 精品 国产| www.熟女人妻精品国产| 日韩欧美免费精品| 午夜视频精品福利| √禁漫天堂资源中文www| 叶爱在线成人免费视频播放| 黄色 视频免费看| 一级毛片电影观看| 中文字幕另类日韩欧美亚洲嫩草| 久久久久久人人人人人| 久久ye,这里只有精品| 免费女性裸体啪啪无遮挡网站| 三上悠亚av全集在线观看| www.熟女人妻精品国产| 肉色欧美久久久久久久蜜桃| 欧美 日韩 精品 国产| 亚洲精品国产色婷婷电影| 欧美xxⅹ黑人| 伊人久久大香线蕉亚洲五| 久久热在线av| 纵有疾风起免费观看全集完整版| 99国产极品粉嫩在线观看| 黄色怎么调成土黄色| av视频免费观看在线观看| 人妻人人澡人人爽人人| 最黄视频免费看| 宅男免费午夜|