• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Embedding Image Through Generated Intermediate Medium Using Deep Convolutional Generative Adversarial Network

    2018-09-11 05:13:48ChuanlongLiYumengJiangandMartaCheslyar
    Computers Materials&Continua 2018年8期

    Chuanlong Li , Yumeng Jiang and Marta Cheslyar

    Abstract: Deep neural network has proven to be very effective in computer vision fields.Deep convolutional network can learn the most suitable features of certain images without specific measure functions and outperform lots of traditional image processing methods. Generative adversarial network (GAN) is becoming one of the highlights among these deep neural networks. GAN is capable of generating realistic images which are imperceptible to the human vision system so that the generated images can be directly used as intermediate medium for many tasks. One promising application of using GAN generated images would be image concealing which requires the embedded image looks like not being tampered to human vision system and also undetectable to most analyzers.Texture synthesizing has drawn lots of attention in computer vision field and is used for image concealing in steganography and watermark. The traditional methods which use synthesized textures for information hiding mainly select features and mathematic functions by human metrics and usually have a low embedding rate. This paper takes advantage of the generative network and proposes an approach for synthesizing complex texture-like image of arbitrary size using a modified deep convolutional generative adversarial network (DCGAN), and then demonstrates the feasibility of embedding another image inside the generated texture while the difference between the two images is nearly invisible to the human eyes.

    Keywords: GAN, CNN, texture synthesis, steganography, watermark, image concealing,information hiding.

    1 Introduction

    Deep learning is great for computer vision related tasks because its high complexity and self-learning scheme. Computer itself can detect and find their own objective features by consistent computing while the image features which used to solve a certain task are hard to define by humans sometimes. Concealing image inside another image is an appealing research field in computer vision and information hiding which can be applied on artworks which need strict protection of the original art piece. However, hiding image in another image is difficult because the hidden capacity is too much to be easily discovered directly by human eyes. Texture synthesizing has drawn lots of attention in computer vision related field and information hiding such as steganography and watermark [Jetchev,Bergmann and Vollgraf (2016); Yuan, Xia and Sun (2017)]. Both steganography and watermark are the kind of technology which embed secret messages into another carrier medium [Wang, Lian and Shi (2017); Xia, Wang, Zhang et al. (2016); Zhou, Wu, Yang et al. (2017)]. The carrier used to hide message is typically an image which is best known to be a complex texture. The stego image is known as the one combines the carrier image and secret image but looks identical to the original image so as not to be easily suspected by the middle attacker. Embedding a secret message into another cover image can easily change the appearance of the original cover image, not to mention embedding a full-size image into another. Thus, when embedding secret into another cover, we need to find the suitable place of the cover image to embed information in, typically means the complex details of an image [Cheng and Wang (2006); Xiong, Xu and Shi (2018)]. And the reason why texture image is getting more attention is because their consistent appearance is less detectable to human vision system and steganographic detection systems [Zhou, Chen,Zhang et al. (2018)].

    There are researchers that using computer synthesized images to hide secret message[Efros and Freeman (2001); Gatys, Ecker and Bethge (2015); Jaru?ek, Volna and Kotyrba(2015); Wu and Wang (2015)]. They usually hide the secret in areas selected by human metrics and suffer from low hidden capacity [Li, Wei, Ferreira et al. (2018); Qian, Dong,Wang et al. (2015); Wang, Lian and Shi (2017)]. Deep convolutional neural network is more suitable for computers to extract image features themselves [Dong, Loy, He et al.(2016)] and generative neural network [Goodfellow, Pouget-Abadie, Mirza et al. (2014);Ledig, Theis, Huszár et al. (2017); Radford, Metz and Chintala (2015)] can be used to generate image which is almost impossible for humans to recognize whether it is a real image. And by defining a small moving patch inside the image, the generative network can generate similar texture-like image as the original one. The idea used in this paper comes from two simple ideas. First is that the cover image used to hide another image is a complex texture-like image completely generated through a network model which is hard to retrieve by a middle attacker. Second is because the network is completely data-driven,the network itself can learn the best possible ways to embed an image inside another complex texture image.

    The remainder of this paper is organized as follows. Section II discusses some related works. The proposed architecture and demonstrations are described in section III. Some experiments and results are shown in Section IV. Section V concludes this paper and puts forward some future work.

    2 Related works

    Baluja [Baluja (2017)] discovers a method of using deep neural networks to hide image inside another image. In their study, they conceal the secret image inside another image called cover image and then obtain an image named container image. The image transition in the process is mainly through three simple deep neural networks. The first network is called Prep Network which is used to preprocess the hidden image. The second network is called Hiding Network which is also the main network among the entire architecture. This network takes the output of the Hiding Network and a new image which serves as cover image as input, and creates another image contains the secret image which looks alike to the input cover image. The third network called Reveal Network which is used for revealing the secret image from the container image. The author also points out that the whole network system is more like an auto encoder which is most commonly used in image compression. The three parts are trained as a single network with two different losses. The whole network works by learning how to compress the secret image information into the least noticeable parts of the input cover image. The dataset they use is from tiny-imagenet and only this one dataset for both cover images and secret images.

    The method proposed by Baluja does not include a complete steganographic system and may also not be resistant to a steganalysis. Hayes et al. [Hayes and Danezis (2017)] presents a new method using generative neural network to generate stego images. They train the discriminator as a corresponding steganalysis in order to decide whether a secret message is contained within an image. By implementing consistent training procedure, the generative network keeps generating stego images so as to fool the discriminator into un-altered images while the discriminator keeps distinguishing whether the image is an embedded secret image or just an ordinary image. Both the generative network and the discriminator network can keep improving their own capability until they reach a certain balance in the competition. At last the generative network would generate real enough images that the discriminator network cannot decide whether it is real or embedded with secret.

    Texture synthesis in computer vision is quite popular these days. But using synthesized texture in steganography is quite a few. Wu et al. [Wu and Wang (2015)] propose a patch-based method which can generate steganography using reversible texture synthesis.Their approach can synthesize arbitrary size of texture images and the hidden capacity can be increased proportional to the size of the texture image. The original source texture can also be recovered due to the reversible capacity. Also, the stego texture image is comprised of a source texture instead of modifying the original image contents can provide better visual result than pixel-based algorithms [Efros and Leung (1999); Liang,Liu, Xu et al. (2001)]. However, the existing texture related steganography method usually has low embedding capacity and the features they use to synthesize the texture image are selected in a manually designed manner.

    3 Proposed method

    The whole network architecture has two specific designs which correspond to two different application scenarios. The first architecture is designed by separating the texture image generation and the secret image embedding process. The texture-like image is generated by a deep convolutional generative neural network and then served as the input image of the concealing network for image hiding. The architecture of the concealing network is adopted from the one proposed by Google research team but with different network designs. The second method integrates the concealing network with the deep convolutional generative network. In this way, the whole network can generate a texture image while embedding another image in process. Moreover, the first architecture is easier to train and can be used afterwards while the training process for the second architecture is difficult because the two networks have different data input and thus cannot be used in a more common scenario. The trained model of the first architecture can be used multiple times without re-training while the second is more suitable for onetime end-to-end scenario.

    The general framework is shown in Fig. 1. The generative network first generates a texture like image served as the input of the concealing network. The generated image and the GAN model should be inaccessible to a third party in practice. Thus, the middle attacker cannot obtain the image used as cover and therefore increase the difficulty for them to distinguish whether an image contains information. Also, because the cover image is purely generated, it is hard for an attacker to restore the embedded image without the model.

    Figure 1: General layer architecture for the concealing network

    3.1 Texture generation

    Generative adversarial network works by having the generator generates realistic image which is then used to deceive the discriminator. The generator receives a random noise at first and then tries to capture the distribution of the sample images as the discriminator focuses on differentiating the generated image from the real image. The traditional GANs are often unstable to train and can result in unexpected generative outputs. Deep convolutional generative adversarial network improves the performance of traditional GAN by combining Convolutional neural network with traditional GAN concept. The loss function of the proposed GAN network is adopted from the SGAN with minor modification as shown in formula (1).

    Here,landmare the spatial dimensions,X’is a random selectedrectangular patch of original texture. The discriminator calculates the probabilities oflmsize field which can be used to determine whether an input is real or generated.Pdatais the true data distribution andX’has the same size as the generated texture images.

    Also, batch normalization has proven to be very efficient for the training process, it can decrease the side effect because of the bad initialization and help the stochastic gradient descents more smoothly and effectively. Batch normalization is used on all layers in generator network except the output layer and so is the discriminator network but also exclude the input layer.

    The GAN architecture is shown in Fig. 2. The input to the generative network is aNdimensional noise and then maps to a small patch selected from the original texture image. Then the input tensor flows into several transposed convolution layers with upscaling. All the layers above are applied batch normalization and activated usingReLUfunction. The last layer of the generative network is activated usingTanhfunction without batch normalization. The discriminator used in this GAN architecture is similar as the common GANs. It down samples the first layer and then convolves the next fewer layers with batch normalization andLReLUactivation function except the output layer.The output layer of the discriminator is activated using sigmoid function and applies no batch normalization. Fully-connected layers are all abandoned in the network architecture for more flexibility and less parameters, but no effect on the outcome since we mainly use the convolutional layers for feature extraction.

    Figure 2: Texture generation network

    3.2 Concealing process

    The network used for image concealing consists of two parts. The first part is used to conceal the image inside another texture image, the second is used to restore the concealed image as closely as possible. The general network structure is shown in Fig. 3.

    Figure 3: General layer architecture for the concealing network

    The feature of texture images is relative simple in this application scenario, for only a small fraction of the details are all we need. Thus, in order to achieve better results, the concealing network only contains convolutional layers and no other layers like pooling or batch normalization layer. The loss function used for the concealing process includes two:SSIM and MSE. SSIM is short for the Structual Similarity index and is great for measuring the similarity between two images. Using SSIM as a loss function to train the concealing network would improve great performance theoriatically. However, it is hard to train the model in practice because of the initial difference between two images are too much. Thus, mean squared error is preffered in this architecture to achieve the optimal performance while reserving good results. The formula of MSE and SSIM are shown below as formula (2) and formula (3) respectively.

    4 Experiment

    Two different datasets are used for the experiment. The first dataset is extracted from the DTD dataset [Cimpoi, Maji, Kokkinos et al. (2014)] and reformatted into different categories for better training results. DTD dataset includes multiple kinds of texture images which is great for our texture generation process. The concealing network uses 4135 reformatted training images from DTD dataset and 4135 images from the COCO2017 training dataset [Lin, Maire, Belongie et al. (2014)] to train a model for image concealing.The original texture for image synthesize is picked from the DTD dataset with random choice. The texture generation network is trained using one Nvidia GTX1080Ti GPU and the concealing network is trained using four Nvidia GTX1080Ti GPUs. The concealing network is trained for 230 epochs by minimizing the mean square error of pixels between the original image and the concealed image despite SSIM is more suitable and the training epoch of the generation network varies depending on the texture images. Several different network architectures are tested with different kernel size and different number of network layers. All the code is written in Keras with TensorFlow backend.

    4.1 Generated texture-like image

    The first texture generation experiment uses only one original texture image and then synthesize another texture-like image which resembles the style of the original texture.Some generated examples are shown in Fig. 3 and Fig. 4. In Fig. 3, the first row represents the original images, the second row represents the generated textures. Note that the first two images on the second row are both generated using the same original texture, but with different convolutional layers and training epochs. When the original texture is sparse and complex, the filter number and patch dimension should also be increased accordingly. By modifying the spatial dimension of the random noise, the network can generate image of different size. In Fig. 4, the textures at last row are generated using multiple source textures. The network learns the common features and styles of the original source textures and generates the synthesized texture.

    Figure 4: Original source textures and synthesized texture-like images

    Figure 5: Multiple source textures synthesize one texture-like image

    4.2 Image concealing

    Texture image shares little feature similarities with the image to be hidden, thus it is difficult to train the concealing network to reach a good result. The network which achieves the best performance in the experiment uses kernel of50 kernels of each size in each layer. The restored image may lose some of the details or suffer from color distortion when the two images differ too much. For the main purpose of the architecture is to conceal image with the minus notice, we implement the conceal network to try to minimize the pixel difference between the texture image and the embedded image, while sacrifice some clarity of the restored image as shown in Fig. 6(From left to right: Secret image, embedded texture-like image, restored-secret, residual for texture image, residual for secret image). We also did experiments regarding the second framework, but the results turn out to be not very ideal. The restored image often suffers severe color distortion when the two images differ too much. One reason maybe because the training images are too few for the network to learn enough feature expressions. The generated texture which embeds secret image is also sent to a steganalysis tool for anomaly detection. We refer to the embedded image as stego image under this circumstance and get a detection rate at 0.02%. Despite the steganalysis tool mainly focuses on the lowest bit anomaly detection, we still can argue that the generated texture and the secret merge well with each other across the whole image area. The image pixel is rescaled between 0 and 255 during pixel error calculation for better clarity. The results of the detection and pixel difference are shown in Tab. 1.

    Figure 6: Generated texture image concealing results

    Table 1: Embedding result and detection rate

    5 Conclusion

    Currently the generative network is specialized for texture image generation which is simpler than nature image generation. And the texture image generated by the GAN network has to have the same width and height as the secret image to the concealing network. Although this seems less important because the GAN network can generate arbitrary size of image, one can see that allow arbitrary size of secret image embedded in a cover image is much more sophisticated and can reach less detective rate. Also, the current network does not use any sophisticated architecture and it is possible to improve the performance by altering the network structure. The feature extraction process can be better achieved by using more complex and sophisticated network designs such as inception and residual network. The image embedding process can be integrated into the texture image generation process which can achieve more natural looking images and less detection rate.

    Acknowledgement:This work is supported by the National Key R&D Program of China under grant 2018YFB1003205; by the National Natural Science Foundation of China under grant U1536206, U1405254, 61772283, 61602253, 61672294, 61502242; by the Jiangsu Basic Research Programs-Natural Science Foundation under grant numbers BK20150925 and BK20151530; by the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD) fund; by the Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET) fund,China.

    精品国产露脸久久av麻豆| 如何舔出高潮| 各种免费的搞黄视频| 欧美人与性动交α欧美精品济南到 | 一级爰片在线观看| 亚洲综合色惰| 日韩制服骚丝袜av| 欧美日韩一区二区视频在线观看视频在线| 少妇被粗大的猛进出69影院 | 狂野欧美白嫩少妇大欣赏| 亚洲av免费高清在线观看| 欧美 亚洲 国产 日韩一| 免费久久久久久久精品成人欧美视频 | 成年av动漫网址| 夜夜骑夜夜射夜夜干| 18在线观看网站| 国产亚洲av片在线观看秒播厂| 中文字幕精品免费在线观看视频 | 亚洲第一区二区三区不卡| 久久这里有精品视频免费| 在线观看国产h片| 九九在线视频观看精品| 国产精品嫩草影院av在线观看| 日韩伦理黄色片| 亚洲在久久综合| 秋霞伦理黄片| 国产午夜精品一二区理论片| 蜜桃国产av成人99| 亚洲欧美色中文字幕在线| 欧美人与善性xxx| 日本黄大片高清| 视频在线观看一区二区三区| 99久久中文字幕三级久久日本| 国产成人av激情在线播放 | 少妇被粗大的猛进出69影院 | 性高湖久久久久久久久免费观看| 精品国产露脸久久av麻豆| 亚洲色图 男人天堂 中文字幕 | 日韩av不卡免费在线播放| 午夜福利网站1000一区二区三区| 满18在线观看网站| av免费观看日本| 欧美bdsm另类| 亚洲av电影在线观看一区二区三区| 性色avwww在线观看| 亚洲av综合色区一区| 欧美97在线视频| 亚洲欧美成人精品一区二区| 日本黄色日本黄色录像| 黄色配什么色好看| 91久久精品电影网| 婷婷色麻豆天堂久久| 精品酒店卫生间| 精品久久久噜噜| 大又大粗又爽又黄少妇毛片口| 国产av一区二区精品久久| 亚洲无线观看免费| 在线精品无人区一区二区三| 伦理电影大哥的女人| 看免费成人av毛片| 伦精品一区二区三区| 欧美激情国产日韩精品一区| 99re6热这里在线精品视频| 在线免费观看不下载黄p国产| 国产亚洲精品久久久com| 亚洲av免费高清在线观看| 99热全是精品| 国产成人a∨麻豆精品| 校园人妻丝袜中文字幕| 嫩草影院入口| 午夜91福利影院| av电影中文网址| 下体分泌物呈黄色| 久久久精品区二区三区| 女性被躁到高潮视频| 亚洲精品国产av成人精品| 国产精品女同一区二区软件| 亚洲精品国产色婷婷电影| 亚洲av福利一区| 免费不卡的大黄色大毛片视频在线观看| av福利片在线| 国产伦精品一区二区三区视频9| 观看av在线不卡| 成人国产av品久久久| 99视频精品全部免费 在线| 黑人巨大精品欧美一区二区蜜桃 | √禁漫天堂资源中文www| 午夜日本视频在线| a级片在线免费高清观看视频| 成人二区视频| av电影中文网址| 97在线视频观看| av播播在线观看一区| 一区二区日韩欧美中文字幕 | 免费观看无遮挡的男女| 久久精品久久精品一区二区三区| 午夜激情久久久久久久| 一区二区av电影网| 天美传媒精品一区二区| 国产精品久久久久久久久免| 日韩熟女老妇一区二区性免费视频| 亚洲色图 男人天堂 中文字幕 | 日韩欧美精品免费久久| 精品99又大又爽又粗少妇毛片| 日韩一区二区视频免费看| 纵有疾风起免费观看全集完整版| 国产成人av激情在线播放 | 日韩人妻高清精品专区| 18禁裸乳无遮挡动漫免费视频| 国内精品宾馆在线| kizo精华| 亚洲av中文av极速乱| 亚州av有码| 亚洲欧美清纯卡通| 日韩视频在线欧美| 狠狠婷婷综合久久久久久88av| 亚洲综合色惰| 一二三四中文在线观看免费高清| 精品国产国语对白av| 久久99一区二区三区| 九草在线视频观看| 91成人精品电影| 天天影视国产精品| 亚洲图色成人| 久热这里只有精品99| 女性生殖器流出的白浆| 亚洲国产精品一区二区三区在线| 日本av免费视频播放| 亚洲av成人精品一二三区| 国产精品 国内视频| 少妇被粗大猛烈的视频| 久久久久久伊人网av| 美女国产视频在线观看| av免费在线看不卡| 中国三级夫妇交换| 国国产精品蜜臀av免费| 狂野欧美激情性xxxx在线观看| 一区二区三区四区激情视频| 好男人视频免费观看在线| av国产久精品久网站免费入址| 欧美 亚洲 国产 日韩一| 天堂俺去俺来也www色官网| 久久精品国产鲁丝片午夜精品| 国产一区有黄有色的免费视频| 91精品一卡2卡3卡4卡| 人人妻人人爽人人添夜夜欢视频| 亚洲av日韩在线播放| 日本vs欧美在线观看视频| 精品卡一卡二卡四卡免费| 老女人水多毛片| 两个人的视频大全免费| 日韩成人av中文字幕在线观看| 日本黄色片子视频| 国产精品一区二区在线观看99| 精品午夜福利在线看| 最近2019中文字幕mv第一页| 欧美激情国产日韩精品一区| 日韩中文字幕视频在线看片| 国产69精品久久久久777片| 性高湖久久久久久久久免费观看| 亚洲精品乱久久久久久| 色婷婷久久久亚洲欧美| 精品少妇黑人巨大在线播放| 成人国产麻豆网| 99久久综合免费| 国产精品麻豆人妻色哟哟久久| 日韩av不卡免费在线播放| 国产精品三级大全| 香蕉精品网在线| 精品国产露脸久久av麻豆| 伦理电影免费视频| 久久精品国产鲁丝片午夜精品| 亚洲经典国产精华液单| av又黄又爽大尺度在线免费看| 老司机影院成人| 美女中出高潮动态图| 亚洲av国产av综合av卡| 日日摸夜夜添夜夜爱| 亚洲不卡免费看| 国产精品久久久久久久电影| 色视频在线一区二区三区| 高清在线视频一区二区三区| 最近中文字幕2019免费版| 久久精品国产亚洲av涩爱| 最近中文字幕2019免费版| 三级国产精品欧美在线观看| 日产精品乱码卡一卡2卡三| 国产精品一国产av| 我的女老师完整版在线观看| 黄色怎么调成土黄色| 简卡轻食公司| 亚洲精品一区蜜桃| 欧美97在线视频| 亚洲,欧美,日韩| 人妻夜夜爽99麻豆av| av福利片在线| 夫妻午夜视频| 少妇人妻 视频| 18禁在线播放成人免费| 国产片内射在线| 一本大道久久a久久精品| 欧美成人午夜免费资源| 国产色婷婷99| 久久精品人人爽人人爽视色| 亚洲一区二区三区欧美精品| 亚洲av福利一区| 有码 亚洲区| 亚洲成人手机| 晚上一个人看的免费电影| 天天影视国产精品| 国产在线免费精品| 午夜日本视频在线| 国产极品粉嫩免费观看在线 | 欧美日韩视频高清一区二区三区二| 久久国产亚洲av麻豆专区| 简卡轻食公司| 精品99又大又爽又粗少妇毛片| 飞空精品影院首页| 午夜福利,免费看| 免费观看av网站的网址| www.色视频.com| 简卡轻食公司| 亚洲第一区二区三区不卡| 99九九线精品视频在线观看视频| 高清毛片免费看| 久久精品人人爽人人爽视色| 国产高清国产精品国产三级| 男人添女人高潮全过程视频| 成人国产麻豆网| 亚洲欧美中文字幕日韩二区| h视频一区二区三区| 3wmmmm亚洲av在线观看| 99热全是精品| 伦理电影大哥的女人| 日韩av免费高清视频| 99热6这里只有精品| 女人久久www免费人成看片| 大码成人一级视频| 建设人人有责人人尽责人人享有的| 精品国产露脸久久av麻豆| 青春草亚洲视频在线观看| 如何舔出高潮| 男女边摸边吃奶| 久久综合国产亚洲精品| 午夜影院在线不卡| 少妇被粗大猛烈的视频| 韩国高清视频一区二区三区| 99精国产麻豆久久婷婷| 亚洲,一卡二卡三卡| 亚洲三级黄色毛片| 少妇人妻久久综合中文| 如何舔出高潮| 亚洲精品自拍成人| 丰满少妇做爰视频| 午夜免费观看性视频| 在线天堂最新版资源| 亚洲av福利一区| 插阴视频在线观看视频| 亚洲国产成人一精品久久久| 热99久久久久精品小说推荐| 母亲3免费完整高清在线观看 | 三级国产精品片| 丝瓜视频免费看黄片| 久久久久久久久久成人| 国产永久视频网站| 亚洲国产欧美在线一区| 啦啦啦中文免费视频观看日本| 亚洲欧美中文字幕日韩二区| tube8黄色片| 精品国产露脸久久av麻豆| 女人精品久久久久毛片| 丰满少妇做爰视频| 久久久久久久大尺度免费视频| 日韩视频在线欧美| 狠狠婷婷综合久久久久久88av| 日日撸夜夜添| 国产亚洲精品久久久com| 久久久国产欧美日韩av| 狠狠婷婷综合久久久久久88av| 国产精品三级大全| 国产亚洲av片在线观看秒播厂| 91aial.com中文字幕在线观看| 男男h啪啪无遮挡| 高清视频免费观看一区二区| 久久ye,这里只有精品| 久久久a久久爽久久v久久| 精品人妻偷拍中文字幕| 久久国内精品自在自线图片| 成人亚洲欧美一区二区av| 黑人猛操日本美女一级片| 99久久人妻综合| 国产成人精品无人区| 18禁在线无遮挡免费观看视频| 又黄又爽又刺激的免费视频.| 国产极品天堂在线| videossex国产| 午夜福利,免费看| √禁漫天堂资源中文www| 亚洲精品一区蜜桃| 中文欧美无线码| 欧美 亚洲 国产 日韩一| 国产一区二区三区综合在线观看 | 免费黄色在线免费观看| av有码第一页| 国产综合精华液| 一个人免费看片子| 久久久久久伊人网av| 飞空精品影院首页| 午夜av观看不卡| 精品人妻熟女av久视频| 国产永久视频网站| 国产在视频线精品| 伦理电影大哥的女人| 国产综合精华液| 亚洲精品一区蜜桃| 日韩中字成人| 晚上一个人看的免费电影| 我的老师免费观看完整版| 99九九在线精品视频| 看免费成人av毛片| 欧美日韩视频高清一区二区三区二| 黄色欧美视频在线观看| 18禁裸乳无遮挡动漫免费视频| 精品99又大又爽又粗少妇毛片| 纵有疾风起免费观看全集完整版| 大香蕉97超碰在线| 麻豆成人av视频| 高清av免费在线| 久久精品国产亚洲网站| 欧美+日韩+精品| 国产一区二区三区av在线| 久久午夜综合久久蜜桃| 九九爱精品视频在线观看| 九九在线视频观看精品| 极品人妻少妇av视频| videossex国产| 国产一区有黄有色的免费视频| 美女大奶头黄色视频| 91久久精品国产一区二区成人| 91精品国产九色| 老司机影院毛片| 国产熟女午夜一区二区三区 | 夫妻性生交免费视频一级片| 国产精品无大码| 黄色毛片三级朝国网站| 夜夜爽夜夜爽视频| 满18在线观看网站| 青青草视频在线视频观看| 亚洲国产欧美日韩在线播放| 肉色欧美久久久久久久蜜桃| 欧美国产精品一级二级三级| 香蕉精品网在线| 狠狠婷婷综合久久久久久88av| 国产高清国产精品国产三级| 在线亚洲精品国产二区图片欧美 | a 毛片基地| 亚洲中文av在线| 成人漫画全彩无遮挡| 香蕉精品网在线| 午夜福利在线观看免费完整高清在| 中文字幕精品免费在线观看视频 | 国产日韩欧美亚洲二区| 狠狠婷婷综合久久久久久88av| 在线观看美女被高潮喷水网站| 狠狠精品人妻久久久久久综合| 日韩,欧美,国产一区二区三区| 菩萨蛮人人尽说江南好唐韦庄| 免费观看无遮挡的男女| 丝瓜视频免费看黄片| 大陆偷拍与自拍| av免费在线看不卡| 少妇 在线观看| 精品酒店卫生间| 18禁裸乳无遮挡动漫免费视频| 日韩一区二区三区影片| 国产欧美亚洲国产| 精品久久久久久久久av| 如何舔出高潮| 91久久精品电影网| xxxhd国产人妻xxx| 国产日韩欧美在线精品| 男女边摸边吃奶| 美女xxoo啪啪120秒动态图| 久久精品国产亚洲av天美| 久久久午夜欧美精品| 热99国产精品久久久久久7| 熟女电影av网| 老司机亚洲免费影院| 国产成人精品久久久久久| 男男h啪啪无遮挡| 国产成人精品福利久久| 中文字幕av电影在线播放| videosex国产| 国产免费一区二区三区四区乱码| 你懂的网址亚洲精品在线观看| 观看美女的网站| 国产成人一区二区在线| xxxhd国产人妻xxx| 欧美最新免费一区二区三区| 日韩免费高清中文字幕av| 在线天堂最新版资源| 一本久久精品| 夫妻性生交免费视频一级片| 少妇猛男粗大的猛烈进出视频| 看免费成人av毛片| 18禁在线无遮挡免费观看视频| 色94色欧美一区二区| 精品卡一卡二卡四卡免费| 亚洲成人av在线免费| 日本爱情动作片www.在线观看| 亚洲精华国产精华液的使用体验| 一级a做视频免费观看| 精品久久久噜噜| xxx大片免费视频| 一个人免费看片子| 五月玫瑰六月丁香| 国产色婷婷99| 成人国产av品久久久| 啦啦啦视频在线资源免费观看| 日韩成人在线观看一区二区三区| 久久免费观看电影| 久久久久精品国产欧美久久久| 欧美 日韩 精品 国产| 日本a在线网址| 男男h啪啪无遮挡| 少妇被粗大的猛进出69影院| 久久午夜亚洲精品久久| 成年人午夜在线观看视频| 91成年电影在线观看| 夫妻午夜视频| 男人舔女人的私密视频| 亚洲九九香蕉| 中文字幕最新亚洲高清| 成人国产一区最新在线观看| 中国美女看黄片| av不卡在线播放| 国产亚洲欧美在线一区二区| 色视频在线一区二区三区| 两个人免费观看高清视频| 国产欧美日韩综合在线一区二区| 亚洲色图av天堂| 天堂中文最新版在线下载| 精品国内亚洲2022精品成人 | 中文字幕最新亚洲高清| 纯流量卡能插随身wifi吗| 国产免费福利视频在线观看| 两人在一起打扑克的视频| 欧美性长视频在线观看| 国产免费av片在线观看野外av| 最近最新免费中文字幕在线| 亚洲精品av麻豆狂野| 欧美在线黄色| 美女主播在线视频| 中文亚洲av片在线观看爽 | 中国美女看黄片| 中文字幕精品免费在线观看视频| 免费在线观看完整版高清| 一边摸一边抽搐一进一出视频| 黄色视频,在线免费观看| 欧美性长视频在线观看| 麻豆av在线久日| 精品高清国产在线一区| 精品免费久久久久久久清纯 | 久久久欧美国产精品| 人人澡人人妻人| 在线永久观看黄色视频| 青青草视频在线视频观看| videosex国产| 王馨瑶露胸无遮挡在线观看| 高清黄色对白视频在线免费看| 免费日韩欧美在线观看| 国产精品 国内视频| 精品少妇一区二区三区视频日本电影| 久久午夜亚洲精品久久| videos熟女内射| 成人三级做爰电影| 亚洲视频免费观看视频| 男女高潮啪啪啪动态图| 欧美老熟妇乱子伦牲交| xxxhd国产人妻xxx| 深夜精品福利| 丰满迷人的少妇在线观看| 19禁男女啪啪无遮挡网站| 大片免费播放器 马上看| 亚洲av第一区精品v没综合| 国产精品99久久99久久久不卡| 免费人妻精品一区二区三区视频| 伊人久久大香线蕉亚洲五| bbb黄色大片| 午夜福利视频在线观看免费| 一本—道久久a久久精品蜜桃钙片| 99re在线观看精品视频| 黑人欧美特级aaaaaa片| 深夜精品福利| 人人妻人人添人人爽欧美一区卜| 美女高潮到喷水免费观看| 精品国产国语对白av| 男女免费视频国产| 亚洲精品成人av观看孕妇| 成年人黄色毛片网站| 免费看a级黄色片| 精品久久久久久电影网| 少妇粗大呻吟视频| 午夜福利在线观看吧| 成年人午夜在线观看视频| 欧美激情高清一区二区三区| 久久精品国产综合久久久| 中文字幕高清在线视频| 中文亚洲av片在线观看爽 | 午夜精品国产一区二区电影| 国产精品一区二区在线观看99| 精品欧美一区二区三区在线| 亚洲专区国产一区二区| 亚洲成av片中文字幕在线观看| 操美女的视频在线观看| 黑人巨大精品欧美一区二区mp4| 在线天堂中文资源库| 午夜精品久久久久久毛片777| 99九九在线精品视频| 91成人精品电影| av超薄肉色丝袜交足视频| 欧美日韩亚洲国产一区二区在线观看 | 国产欧美日韩一区二区三区在线| 国产欧美亚洲国产| aaaaa片日本免费| 一级毛片精品| 女人高潮潮喷娇喘18禁视频| 午夜福利免费观看在线| 中文字幕色久视频| 黄色成人免费大全| 日本欧美视频一区| 日本一区二区免费在线视频| 亚洲一区中文字幕在线| 丝瓜视频免费看黄片| 色精品久久人妻99蜜桃| 欧美大码av| 国产日韩欧美亚洲二区| 日本撒尿小便嘘嘘汇集6| www.自偷自拍.com| 亚洲天堂av无毛| 12—13女人毛片做爰片一| 欧美黄色淫秽网站| 久久中文看片网| 一级毛片精品| 国产成人精品无人区| 又紧又爽又黄一区二区| 亚洲精品自拍成人| 亚洲五月色婷婷综合| 国产熟女午夜一区二区三区| 国产高清视频在线播放一区| 少妇的丰满在线观看| 日本欧美视频一区| 黄色a级毛片大全视频| 91av网站免费观看| 在线观看免费视频日本深夜| 老司机午夜十八禁免费视频| 两个人免费观看高清视频| 国产在线精品亚洲第一网站| 精品免费久久久久久久清纯 | 亚洲视频免费观看视频| 久久 成人 亚洲| 亚洲黑人精品在线| 悠悠久久av| 成人三级做爰电影| 日韩三级视频一区二区三区| 精品福利观看| 后天国语完整版免费观看| 在线观看一区二区三区激情| 亚洲欧美日韩高清在线视频 | 亚洲精品中文字幕在线视频| 久久久国产成人免费| 日韩精品免费视频一区二区三区| 亚洲免费av在线视频| 18禁国产床啪视频网站| 亚洲成人手机| 视频在线观看一区二区三区| 免费在线观看影片大全网站| 亚洲国产欧美在线一区| 五月开心婷婷网| 欧美 亚洲 国产 日韩一| 色精品久久人妻99蜜桃| 99久久人妻综合| 久久热在线av| 国产高清激情床上av| 高清在线国产一区| 国产精品国产av在线观看| 国产片内射在线| 一个人免费看片子| 首页视频小说图片口味搜索| 波多野结衣av一区二区av| 香蕉国产在线看| 手机成人av网站| 色精品久久人妻99蜜桃| 一二三四在线观看免费中文在| 欧美日韩亚洲综合一区二区三区_| 午夜福利影视在线免费观看| 久久精品国产亚洲av高清一级| 亚洲av片天天在线观看| 免费高清在线观看日韩| 久久 成人 亚洲| 久久中文字幕人妻熟女| 免费在线观看视频国产中文字幕亚洲| 国产福利在线免费观看视频| 欧美人与性动交α欧美软件| 亚洲av电影在线进入| 亚洲 欧美一区二区三区| 亚洲视频免费观看视频| 国产片内射在线| 国产精品国产av在线观看| 久久热在线av| 免费在线观看完整版高清| 黄色丝袜av网址大全| 高清视频免费观看一区二区| 亚洲av成人一区二区三| 高清黄色对白视频在线免费看|