• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Increasing Distance Increasing Bits Substitution (IDIBS)Algorithm for Implementation of VTVB Steganography

    2018-10-30 06:00:02SahibKhanArslanArifSyedTahirHussainRizviandNasirAhmad

    Sahib Khan , Arslan Arif Syed Tahir Hussain Rizvi and Nasir Ahmad

    Abstract: Cryptography and steganography are two important and related fields of informationsecurity. But, steganography is slightly different in the sense that it hides the existenceof secret information from unauthorized users. It is one of the most appealingresearch domains, have applications like copyright protection, data integrity protection andmanipulation detection. Several steganography techniques have been proposed in literature.But, in this work a new information hiding algorithm is presented. The proposed techniquede-correlates frequency components of cover image using discrete cosine transform anduses the least significant bits of frequency components for hiding secret information. Thetech-nique hides variable number of bits of secret message in different frequencycomponents. Therefore, it hides different amount of secret information in different regionsof cover im-age and results in enhancement of security. The algorithm has the flexibilityto change the hiding capacity and quality of final stego image. It has been observedfrom experimental results that a hiding a capacity from 3% to 43% can be achievedwith significantly good quality of 41 dB to 37 dB in term of peak signal to noise ratio.The successful recovery of the hidden information need the pattern, called stego key, inwhich is used in hiding process. The algorithm provides twofold security; hidingkeeps the existence of hidden information secret and the large key size makes the retrievalof hidden information difficult for intruders.

    Keywords: VTVB steganography, image processing, information security, data hiding.

    1 Introduction

    Cryptography [Bender, Gruhl, Morimot et al.(1996); Dodis (2017)] and steganography[Karabatak and Yigit (2018); Jain, Trivedi and Tiwari (2008)] are two most prominent and broad sets of techniques used for securing information.Especially, in case of communication of secret messages using sensitive systems, to stop the unauthorized access and attempt to get access to the secret information and also protect information while store on any storage media.In cryptography, the encryption mechanism is used to convert plane message to cipher message also called encrypted message.The encryption convert message from readable format to an unreadable format before transmission or storage.The authorized user accesses the encrypted message by decrypting it through the secret key[Ferguson and Schneier(1982);Schneier(2007);Stallings(2010)].The cryptographic technique,does not hide the presence of hidden information,rather,it convert secret information in other unreadable format and changes made can be detected by experts and attempts can be made to decrypt the information back[Cheddad,Condell,Curran et al.(2010)].

    Steganography focuses on hiding,contrary to cryptography,and keep the existence of secret information undetectable.Therefore,it is a skill of hiding the secret message in a cover medium without attracting suspect of attackers.It keeps the existence of the veiled message un-perceivable[Fridrich(2009)].There are different kinds of covering medium used in steganography namely text,audio,image and video.However,Images attracted the intention of steganographers the most,due to high level redundant of bits.Moreover,it is easy to achieve a reasonable hiding capacity and significantly high image quality and distortion tolerance[Katzenbeisser and Petitcolas(2000)].Compared with cryptography,steganography has a high privacy measures and security by making secret message,on the whole,invisible.

    The exclusive aim of steganography is to keep secret message imperceptible to human visual systems(HVS)[Khan,Ahmad,Ismail et al.(2015)].To hide data efficiently,Steganographers developed different techniques by embedding secret message in the least significant bits(LSB)of image pixels in spatial domain.These methods include 4 LSB steganography[Bhattacharyya,Kim and Dutta(2012)],VLSB steganography[Khan,Yousaf and Akram(2011);Khan and Yousaf(2013);Khan,Ahmad and Wahid(2016)],data hiding in Edges[Khan,Ahmad,Ismail et al.(2015)]and others.Along with spatial domain technique,researchers also made use of different transform for data hiding.Discrete cosine transform(DCT)[Chang,Lin,Tseng et al.(2007);Li and Wang(2007);Lin(2012)]and wavelet transform[Amirtharajan and Rayappan(2012);Xie,Lin and Chang(2018)]are broadly used for data hiding.In transform domain,transformed coefficients are in charge of the secret content.These techniques have advantage of robustness to withstand different image processing technique as rotations or cropping.

    For example,secret messages were hidden in the DCT coefficients,for hiding data in image exploits how the HVS perceived images.HVS is more sensitive to lower frequency components.The HVS drowns higher frequency components of an image and emphasizes lower frequencies.To convert image to its frequency components,DCT is used.DCT is used to transform cover image to frequencies coefficients.This is a de-correlation process and divide image details into high medium and low frequency coefficients.The DCT transform represent all the details of image but,in terms of frequency coefficients instead of pixel values.High DCT coefficients represent the texture details of cover image while.low coefficients have energy details.

    It has been observed that the DC and first few AC coefficients are of great importance.The low frequency coefficients of DCT,even less than 25%,contain most of the energy of image[Khan,Khan,Iqbal et al.(2013);Saha,Ghosal,Chakraborty et al.(2018)].So,to keep these energy in mind the 75% DCT coefficients are less significant and using them for data hiding does not affect image quality significantly.The aim of image steganography in DCT domain is to exploit these characteristics of DCT coefficients.The insignificant DCT coefficients are used for data hiding using image as cover media.

    In this paper a new method, increasing distance increasing bits substitution(IDIBS) algorithm, is presented to implement variable tone varying bits (VTVB) steganography.The IDIBSA hide data in higher DCT coefficient than lower coefficient.Hence, the smooth region of cover image is less affected than complex region.Which makes the presence of hidden information invisible and results in a quality stego image.Besides this the hiding capacity can be increased/decreased depending on applications.

    2 VTVB steganography

    Steganography is an important field of information security and has a wide range of applications in the modern era of communication [Lu, He, Yeung et al.(2018)].It is used in information protection [Ulker and Arslan (2018)], copyright protection [Hussain, Wahab,Idris et al.(2018)] and data integrity protection [Sharma, Srivastava and Mathur (2018)].Some state of the art data hiding techniques are focused on achieving high quality stego images, while some other techniques aim to protect information from statistical attacks and steganalysis [Lu, He, Yeung et al.(2018)].However, the information hiding technique proposed in this paper is focused on hiding secret information the DCT frequency components of the image used as cover media, in a distributed manner.The distribution of secret message bits, is done completely on distance basis.The coefficients near to reference points are subjected to less number of bits substitution and far coefficients are used to hide more bits.The technique is termed as variable tone variable bits (VTVB) steganography [Khan,Khan, Iqbal et al.(2013)].In this paper an efficient algorithm named, increasing distance increasing bits substitution algorithm, is presented to implement VTVB steganography.As reported in literature and proved experimentally, most of cover image energy is limited to low frequency components of DCT; which appear in top left corner of DCT coefficients[Khan, Khan, Iqbal et al.(2013)].While, high frequency components of DCT have a very little amount of total energy.From data hiding perspective, a little change in low frequency components is more vulnerable and detectable to HVS, while changes in high frequency component is invisible to HVS.Therefore, the high frequency components of DCT are used for information embedding purpose.VTVB steganography is such a technique that hides different number of information bits in various DCT components of cover image.In contrast to fixed data hiding, VTVB steganography embed different amount secret data in different frequency components of cover image.The DCT coefficients are represented in double i.e.16 bits format and VTVB steganography utilizes any number of bits, from 0 to 16, for data hiding.

    The number bits of a DCT coefficient, used for data hiding are the key factor for the implementation of VTVB steganography.This work presents an algorithm, IDIBSA, for the implementation of VTVB steganography.This algorithm divides DCT components of the cover image in various sectors on the basis of distance from a reference point (reference DCT coefficient) and different amount of secret information is hidden in each sector.The number of cover bits used for data embedding is decided, depending on the distance of a specific sector from the reference point.The number of bits increases with the increasing distance of the sector from the reference point.

    Here it is worth mentioning that the number of bits used for embedding secret information play a key role and is totaly decided by the user according to application and requirements,i.e.hiding capacity, peak signal to noise ratio (PSNR) and mean square error (MSE) Jain,Trivedi and Tiwari (2008); Bhattacharyya, Kim and Dutta (2012).Larger this number,larger the hiding capacity and indeed larger the MSE and vice versa.The number of bits vary from 0 bits i.e.no hiding, to 16 bits and play as a key to recover the hidden information, and shows the distinction of the proposed technique and make it secure than other steganography techniques.

    3 Increasing distance increasing bits substitution algorithm

    As discussed in the previous section VTVB steganography hide secret information in a distributed way in LSB of DCT components of cover image and hide different number bits in different coefficients.But, how can we hide and how these information be recovered is important question.For this VTVB steganography needs a an effective and efficient algorithm.The algorithm must decide how the variable data hiding can be done on sender side to make information secure and how can it be recovered on the receiver side by the intended received only.Here, in section new algorithm to implement VTVB steganograpgy is presented.This algorithm is named as increasing distance increasing bits substitution(IDIBS) algorithm.IDIBS algorithm hides different amount of secret data in different coefficients.It divides the coefficients in different number of sectors.The coefficients are classified on the basis of their distances from the reference point i.e.reference coefficient.LetCoveris the cover image ofR×C, where,RandCrepresent the number of rows and columns of the cover image.After processing complete cover image,an array of DCT coefficientsDis obtained.The array has a size the same as that of the cover imageCover.This is shown mathematically in Eq.(1).

    The DCT coefficients are then divided inNsnumber of sectors,where TheNsranges from 1 to 17.The IDIBS algorithm considers first coefficient as reference and the maximum possible distancedmax,i.e.the distance of the reference point to bottom left coefficient,is calculated.Here toD(1,1)is considered as reference point andD(R,C)is far most DCT coefficient in the array.Thedmaxis calculated according to Eq.(2).

    The DCT coefficients are divided into a number of sector of equal size.The sector sizeWsis calculated as given by Eq.(3).

    Then,the distancedijof each and every individual DCT coefficientD(i,j)from the reference pointD(1,1),is calculated,illustrated in Eq.(4).

    Now, DCT coefficients are classified on the basis of their distances from the reference point.Each DCT coefficient is a ssigned to sector and the number of bits to beused for data hiding is also decided for each sector.The sector near to the reference point is subjected to less data embedding, as it has the coefficients having most the cover im-age energy.There fore, these coefficients are subjected to less number of bits substitu-tion to preserve image quality and avoid distortion to a large extent.The number of bits used for data hiding in a sector increases as sector distance form the reference point in-creases.This procedure affects the smooth area of the cover image at minimum, while hide more data in complex regions of the cover image.The process is explained here as: Where in Fig.1, k and N are defined as under:

    · k is the sector number and 0≤k≤(N-1)

    · N is the number of bits substituted inNthsector

    The allocation of a DCT coefficientD(i,j) to a specific sector depends on the distance of the coefficient from the reference point.That is why the assignment is done completely on the basis of the distance and the total number of sectors and sector size individual sector size plays important rule in hiding process.The sector allocation is given in Eq.(5).

    Where,S1,S2,S3,...,SN,represent the individual sectors i.e.Sector 1,Sector 2,Sector 3,....,and Sector N,respectively.The DCT coefficients are the processed for information hiding using the increasing distance increasing bits substitution algorithm.The a number of least significant bits of a DCT coefficientD(i,j)are substituted with secret message bits.This substitution results in new coefficientSteg_dctijcalled stego DCT coefficient.The number of bits to be substituted get increase as the distance of the coefficient increases with respect to reference point.The hiding procedure is explained in Eq.(6).

    Figure 1:Block diagram implementation of IDIBS Algorithm

    Where,mo,m1,m2,...,mNshow the number of secret message bits hidden in the least significant bits of Sector 1, Sector 2, Sector 3,..., and Sector N, respectively.AndNis thenthsector.After processing all the DCT coefficients a new set of stego DCT coefficients are obtained.To covert these modified coefficients to stego image inverse DCT transformation is applied to these processed coefficients, as given in Eq.(7).

    The implementation process of VTVB steganography using IDIBS algorithm is explained in a flowchart diagram,shown in Fig.1.

    The VTVB steganography using IDIBS algorithm,doesn’thide secret data bits in lower frequency components,and hide large data bits in the higher frequency components of DCT.In other words,no hiding is done flat parts of cover image,and high level of hiding in complex part of cover image.The number of bits to be hidden increases as the frequency of component increase.The algorithm generate high quality stego images,and the changes introduce during the process are not attractive for HVS,due to limitation of HVS having less sensitivity for changes in complex parts of image than smooth parts.

    The variation number of substituted bits with increasing sector distance is shown here in Fig.2.In Fig.2,each cell is representing a sector constructed according to the procedure explained in the previous section.The Fig.2,also shows that DCT coefficients are divided in 11 sectors i.e.N=11.It is shown that no data is hidden in the sector near the reference point as indicated by index0,the 2nd near most sectors is for 1 bit substitution i.e.1 bit of secret message is hidden in the DCT coefficient of this sector,similarly 2 bits of secret message are hidden in the 3rd near most sectors DCT coefficients,and so on.In far most sectors DCT coefficients 10 bits of secret message are hidden.Remember that is just one possible arrangement of DCT coefficients in different sectors and allocation of number of bits.Here in this paper,different possible number of sectors are used for experimentation in the coming section.

    4 Hiding capacity

    IDIBS algorithm takes DCT of cover image and divides DCT coefficients in different number of sectors.Then each sectors coefficients are subjected to a specific number of bits substitution.Let′s consider a cover image of sizeR×C.As each of cover image pixel,in spatial domain,is represented by 8 bits,so the total hiding space available in spatial domain,Cavailableis given in Eq.(8).

    The cover image coefficients are divided inNsnumber of sector each of sector sizeSk.Letmknumber of are hidden each coefficients of a sectorkof sizeSk.Then the total number of message bitsBkhidden in that sector is given by Eq.(9).

    So,the total hiding capacityHCis given as the ration of total number of bits hiddenBtotalin the cover media and the total capacity availableCavailable,as given by Eq.(10)and Eq.(11).

    where,

    Ris the number of rows in the cover image

    Cis the number of columns in the cover image

    5 Key size

    As each DCT coefficient have the capability to hide a maximum of 16 bits message in it.So,any number bits from 0 to 16 can be assigned to sector for hiding purpose.So,a total number of possible combinationsKskfor a sectorSkis given by Eq.(12).

    Now,as cover coefficients are classified in a total ofNsnumbers of sectors,so the total key sizeKis given Eq.(13).

    6 Experimental results and analysis

    VTVB steganography technique using IDIBS algorithm is used to hide different number bits in different DCT coefficients,depending on its distance from reference point.The cover image is transformed first to frequency domain using DCT.Then the DCT coefficients are classified in different sectors of equal size.As discuss in previous sections that the size of a sector depends on the number of sectors.Each sector is allocated a number i.e.the number of bits to be substituted.As DCT coefficient in double format have a bits depth of 16.Therefore,the IDIBS algorithm can assign 0 to 16 bits to sector,and can used for data hiding.Here,different number of sectors and number of bits allocation is used for experimentation and the results are generated and demonstrated at appropriate place in the paper.For experimentation image of Leena is used as a cover media,as shown in Fig.3.

    Figure 3:Leena image used as cover image to hide secret information

    Discrete cosine transform is applied to generate an array of DCT coef ficients.IDIBS algorithm classi fies the frequency components of cover image in different of sectors and a fixed number of message bits,but different for each sector,are hidden in each sectors coefficients.The experiments are performed for different number of sectors and the results are generated.The stego images for Sectors 2,3,4 and so on up to 17 are obtained and shown in Fig.4.

    The results obtained,show that VTVB steganography using IDIBS algorithm resulted in signi ficant quality of stego images and no signi ficant distortion has been created by the information hiding process.

    Figure 4:Stego images obtained after hiding secret information in Leena cover image using IDIBS Algorithm.The stego images are obtained using different number of sectors.The srego image generated using,(a)2 number of sectors,(b)3 number of sectors,(c)4 number of sectors,(d)5 number of sectors,(e)6 number of sectors,(f)7 number of sectors,(g)8 number of sectors,(h)9 number of sectors,(i)10 number of sectors,(j)11 number of sectors,(k)12 number of sectors,(l)13 number of sectors,(m)14 number of sectors,(n)15 number of sectors,(o)16 number of sectors,(p)17 number of sectors

    Table 1:MSE,PSNR and Hiding Capacity(HC)of IDIBS algorithm on Leena

    The quality of stego images up to 13 number of sectors is very good and do not attract attention of human and changes are not detectable for human visual systemHV S.While,increase in the number of sectors beyond 13,the distortion gets visually significant.Along with visual quality and the quality of stego images are calculated quantitatively using the measure ofMSEandPSNR.The hiding capacity,MSEandPSNRfor each number of sectors.

    To check and quantitatively analyze the performance of VTVB steganography implemented with IDIBS algorithm,two cover images i.e.Leena and House are used.The experimental results obtained for Leena as cover are Tab.1.While,the results found for House image are mentioned in Tab.2.The results show that hiding capacityHCandMSEincrease with increase in numbers of sectors.While,PSNR,decreases with increase in the number sectors.The experimental results show that VTVB steganography using IDIBS algorithm can efficiently achieve a data hiding capacityHCof 43% with image quality of 37.39dBin term ofPSNR.The hiding capacityHCand quality of stego image i.e.PSNRcan be controlled by changing the two factors i.e.number of sectors,the DCT coefficients are divided in and the number of LSB processed for hiding in each sector.This hiding technique can be,efficiently,used to embed any amount of data from 3% to 43% of cover image size with image quality of 41dBto 37.39dB.

    In addition to high quality of stego images and significant hiding capacity,the presented technique has a large setgo key.The large key size further enhances the security of hidden information.And in case the existence of hidden message is suspected,it is difficult to retrieve secret message exactly without a right stego key i.e.combination of bits hidden in each sector.Therefore,the proposed technique provide twofold security and can be a good choice for information hiding.

    7 Conclusion

    The proposed steganography technique is very secure two hide information.It provides twofold security, one by making the existence of hidden information undetectable and other the large stego key size make it difficult to retrieve the hidden information for an unauthorized person.The proposed technique changes the number of bits used for substitution on the basis of varying distance from the reference point.This is achieved by using IDIBS algorithm that decide the secret information distribution throughout the cover media.It has a high hiding capacity which can be varied by changing the number of sector and the number of bits assigned to a sector.At the same time it results in high visual quality of stego image.Hence, it keeps the existence undetectable to HVS.The technique is capable of hiding 3% to 43% information in cover image, while keeping stego image quality, in term ofPSNR,in affordable range i.e.41 dB to 37 dB.

    欧美国产精品va在线观看不卡| cao死你这个sao货| 免费观看人在逋| 高清视频免费观看一区二区| 国产一卡二卡三卡精品| 久久久亚洲精品成人影院| 亚洲熟女精品中文字幕| 日日夜夜操网爽| 一区二区三区四区激情视频| 中文字幕av电影在线播放| 国产色视频综合| 在线观看国产h片| 极品人妻少妇av视频| 久久久久视频综合| 熟女少妇亚洲综合色aaa.| 亚洲国产精品一区三区| 菩萨蛮人人尽说江南好唐韦庄| 一级毛片 在线播放| 免费女性裸体啪啪无遮挡网站| 男女免费视频国产| 国产女主播在线喷水免费视频网站| 汤姆久久久久久久影院中文字幕| 久久女婷五月综合色啪小说| 亚洲av成人精品一二三区| 黄色怎么调成土黄色| 男人爽女人下面视频在线观看| 啦啦啦中文免费视频观看日本| 国产又色又爽无遮挡免| 在线观看人妻少妇| 亚洲图色成人| 黄色怎么调成土黄色| 午夜免费鲁丝| 99国产精品99久久久久| 精品第一国产精品| 9191精品国产免费久久| 国产av精品麻豆| 久久99一区二区三区| 18在线观看网站| 菩萨蛮人人尽说江南好唐韦庄| 欧美另类一区| 久久综合国产亚洲精品| 99九九在线精品视频| 亚洲国产成人一精品久久久| 亚洲人成77777在线视频| 国产欧美日韩综合在线一区二区| 亚洲欧美一区二区三区久久| 国产精品久久久av美女十八| 男的添女的下面高潮视频| 自拍欧美九色日韩亚洲蝌蚪91| 日韩免费高清中文字幕av| 精品人妻一区二区三区麻豆| 大型av网站在线播放| 成人三级做爰电影| 一边摸一边做爽爽视频免费| 国产又爽黄色视频| 两个人免费观看高清视频| 亚洲,欧美,日韩| www.999成人在线观看| 成在线人永久免费视频| 大型av网站在线播放| 欧美日韩成人在线一区二区| 免费在线观看黄色视频的| 国产日韩一区二区三区精品不卡| 欧美久久黑人一区二区| 婷婷色综合www| 婷婷色综合www| 51午夜福利影视在线观看| 这个男人来自地球电影免费观看| 亚洲第一av免费看| 中文字幕另类日韩欧美亚洲嫩草| 国产色视频综合| 美女扒开内裤让男人捅视频| 精品少妇内射三级| 日韩中文字幕欧美一区二区 | 亚洲中文字幕日韩| 美女中出高潮动态图| 性高湖久久久久久久久免费观看| 男女下面插进去视频免费观看| 亚洲免费av在线视频| 黄色a级毛片大全视频| 一边摸一边做爽爽视频免费| 亚洲成人免费av在线播放| 国产欧美亚洲国产| 久久九九热精品免费| 丰满人妻熟妇乱又伦精品不卡| 又黄又粗又硬又大视频| 一级黄片播放器| 欧美av亚洲av综合av国产av| 久久精品国产亚洲av涩爱| 免费女性裸体啪啪无遮挡网站| 女警被强在线播放| 黄色a级毛片大全视频| 一本综合久久免费| 午夜两性在线视频| 久久亚洲精品不卡| 国产福利在线免费观看视频| 亚洲精品久久久久久婷婷小说| 国产精品 欧美亚洲| 好男人视频免费观看在线| 国产日韩欧美视频二区| 黑人巨大精品欧美一区二区蜜桃| 搡老岳熟女国产| 韩国精品一区二区三区| 国产精品久久久av美女十八| 久久亚洲精品不卡| 欧美人与善性xxx| 大陆偷拍与自拍| 亚洲av日韩在线播放| 欧美亚洲 丝袜 人妻 在线| 久9热在线精品视频| 视频区图区小说| 国产成人欧美在线观看 | 国产精品亚洲av一区麻豆| 亚洲精品国产一区二区精华液| 久久青草综合色| 男男h啪啪无遮挡| 欧美国产精品一级二级三级| 熟女av电影| 国产av一区二区精品久久| 熟女av电影| 国产三级黄色录像| 成年美女黄网站色视频大全免费| 最新的欧美精品一区二区| 极品人妻少妇av视频| 免费av中文字幕在线| 王馨瑶露胸无遮挡在线观看| 亚洲精品第二区| 日韩电影二区| 久久久国产精品麻豆| av网站免费在线观看视频| 精品一区二区三区四区五区乱码 | 精品国产国语对白av| 丰满饥渴人妻一区二区三| 美女午夜性视频免费| 波野结衣二区三区在线| 国产欧美日韩综合在线一区二区| 多毛熟女@视频| 不卡av一区二区三区| 国产主播在线观看一区二区 | 国产爽快片一区二区三区| 国产有黄有色有爽视频| av天堂久久9| 国产成人欧美| 最近中文字幕2019免费版| 又粗又硬又长又爽又黄的视频| av又黄又爽大尺度在线免费看| 亚洲欧美日韩高清在线视频 | 成人影院久久| 建设人人有责人人尽责人人享有的| 亚洲精品美女久久久久99蜜臀 | 免费少妇av软件| 日韩人妻精品一区2区三区| 黄片播放在线免费| 亚洲国产毛片av蜜桃av| 欧美日韩视频精品一区| 中文字幕精品免费在线观看视频| 成人午夜精彩视频在线观看| 国产成人一区二区三区免费视频网站 | 亚洲中文日韩欧美视频| 国产欧美日韩一区二区三 | 国产97色在线日韩免费| 麻豆乱淫一区二区| 亚洲三区欧美一区| 亚洲av电影在线进入| 久久久久久亚洲精品国产蜜桃av| 黄网站色视频无遮挡免费观看| 女人久久www免费人成看片| xxx大片免费视频| 亚洲精品成人av观看孕妇| 国产在线免费精品| 久久久久视频综合| 亚洲国产成人一精品久久久| 久久精品国产亚洲av高清一级| 伦理电影免费视频| 日本91视频免费播放| 又大又爽又粗| 人妻人人澡人人爽人人| www.999成人在线观看| 一级毛片 在线播放| 侵犯人妻中文字幕一二三四区| 国产精品九九99| 久久久久视频综合| 久久久久久久大尺度免费视频| 国产熟女欧美一区二区| 看免费av毛片| 久久精品aⅴ一区二区三区四区| 欧美日韩视频精品一区| 欧美精品亚洲一区二区| 成在线人永久免费视频| 高潮久久久久久久久久久不卡| 精品人妻1区二区| 电影成人av| 丁香六月欧美| 宅男免费午夜| 首页视频小说图片口味搜索 | 菩萨蛮人人尽说江南好唐韦庄| 午夜激情av网站| 国产一区二区激情短视频 | 黄色视频在线播放观看不卡| 女性生殖器流出的白浆| 成人18禁高潮啪啪吃奶动态图| 99久久人妻综合| 久久免费观看电影| 亚洲自偷自拍图片 自拍| 1024香蕉在线观看| 国产一区亚洲一区在线观看| 成人国产一区最新在线观看 | 丝袜在线中文字幕| 亚洲激情五月婷婷啪啪| 99国产精品一区二区三区| 男女床上黄色一级片免费看| 多毛熟女@视频| 欧美+亚洲+日韩+国产| 天天操日日干夜夜撸| 久久 成人 亚洲| 久久精品aⅴ一区二区三区四区| bbb黄色大片| 精品福利观看| 叶爱在线成人免费视频播放| 成人影院久久| 亚洲第一av免费看| 久久精品久久久久久噜噜老黄| 亚洲欧美中文字幕日韩二区| 亚洲九九香蕉| 国产1区2区3区精品| 精品视频人人做人人爽| 成人国产av品久久久| 久久人人爽av亚洲精品天堂| 男女无遮挡免费网站观看| 99香蕉大伊视频| 女性被躁到高潮视频| 九草在线视频观看| 9色porny在线观看| 精品人妻在线不人妻| 18禁黄网站禁片午夜丰满| 久热爱精品视频在线9| 视频区欧美日本亚洲| 国产高清videossex| 女人高潮潮喷娇喘18禁视频| 亚洲一卡2卡3卡4卡5卡精品中文| 一级黄色大片毛片| 国产女主播在线喷水免费视频网站| av国产精品久久久久影院| 欧美黑人精品巨大| 99久久精品国产亚洲精品| 久久久精品区二区三区| 男女边摸边吃奶| 一区二区三区乱码不卡18| 亚洲,欧美,日韩| 久久久国产一区二区| 91字幕亚洲| 久久精品成人免费网站| 下体分泌物呈黄色| 精品免费久久久久久久清纯 | 人体艺术视频欧美日本| av在线播放精品| 赤兔流量卡办理| 亚洲免费av在线视频| 国产一级毛片在线| 大香蕉久久成人网| 国产精品免费视频内射| 久久99一区二区三区| 丝袜美足系列| www.av在线官网国产| 男女边吃奶边做爰视频| 国产又爽黄色视频| av片东京热男人的天堂| 好男人电影高清在线观看| 麻豆av在线久日| 中文字幕精品免费在线观看视频| 欧美日韩综合久久久久久| 久久综合国产亚洲精品| kizo精华| av一本久久久久| av在线老鸭窝| av片东京热男人的天堂| 91字幕亚洲| 永久免费av网站大全| 久久ye,这里只有精品| 亚洲欧美日韩高清在线视频 | 久久人妻熟女aⅴ| 国产深夜福利视频在线观看| 人妻一区二区av| 午夜av观看不卡| 国产成人免费无遮挡视频| 自线自在国产av| 波野结衣二区三区在线| 飞空精品影院首页| 久久久国产精品麻豆| 七月丁香在线播放| 2021少妇久久久久久久久久久| 精品人妻在线不人妻| 国产精品成人在线| 国产成人a∨麻豆精品| 精品亚洲乱码少妇综合久久| 天堂中文最新版在线下载| 成人三级做爰电影| 国产成人欧美| 欧美激情高清一区二区三区| 欧美中文综合在线视频| 亚洲成人免费av在线播放| 国产欧美日韩综合在线一区二区| 午夜视频精品福利| 波多野结衣一区麻豆| 99热全是精品| 18在线观看网站| 曰老女人黄片| 精品福利永久在线观看| 久久久久网色| 国产女主播在线喷水免费视频网站| 欧美日韩国产mv在线观看视频| 欧美日本中文国产一区发布| 亚洲欧美日韩高清在线视频 | 精品亚洲成a人片在线观看| av福利片在线| 国产无遮挡羞羞视频在线观看| 天天躁夜夜躁狠狠久久av| 欧美 亚洲 国产 日韩一| 久久国产精品大桥未久av| 黄色怎么调成土黄色| 欧美老熟妇乱子伦牲交| 国产高清videossex| 精品一品国产午夜福利视频| 国产精品免费大片| 亚洲精品久久成人aⅴ小说| 各种免费的搞黄视频| 亚洲伊人色综图| 国产国语露脸激情在线看| 飞空精品影院首页| 在线观看免费午夜福利视频| 纯流量卡能插随身wifi吗| 亚洲色图 男人天堂 中文字幕| 少妇 在线观看| cao死你这个sao货| 曰老女人黄片| 男女边摸边吃奶| 丝袜脚勾引网站| 最近最新中文字幕大全免费视频 | 人成视频在线观看免费观看| 水蜜桃什么品种好| 日韩av在线免费看完整版不卡| 亚洲国产精品成人久久小说| 国产伦人伦偷精品视频| 欧美精品啪啪一区二区三区 | 国产黄色免费在线视频| 99热全是精品| 中文欧美无线码| 精品少妇一区二区三区视频日本电影| 欧美亚洲 丝袜 人妻 在线| 秋霞在线观看毛片| 成人手机av| 久久人人爽人人片av| 色精品久久人妻99蜜桃| 久久国产精品影院| 最新的欧美精品一区二区| 一级黄片播放器| 久久精品成人免费网站| 国产亚洲一区二区精品| 在线观看免费日韩欧美大片| 亚洲精品在线美女| 欧美日韩一级在线毛片| 男人舔女人的私密视频| 少妇人妻久久综合中文| 丝袜喷水一区| 成人三级做爰电影| av视频免费观看在线观看| 黑人猛操日本美女一级片| 80岁老熟妇乱子伦牲交| 青春草亚洲视频在线观看| a级片在线免费高清观看视频| 国产人伦9x9x在线观看| 欧美人与善性xxx| 人人妻人人添人人爽欧美一区卜| 九草在线视频观看| 91精品伊人久久大香线蕉| 国产亚洲欧美在线一区二区| 久久精品国产综合久久久| 最近中文字幕2019免费版| 欧美乱码精品一区二区三区| 国产免费福利视频在线观看| 精品福利观看| 欧美日韩成人在线一区二区| 欧美亚洲日本最大视频资源| 久久精品久久久久久噜噜老黄| 国产爽快片一区二区三区| 少妇人妻 视频| 日本五十路高清| 性少妇av在线| 一个人免费看片子| 一边亲一边摸免费视频| 欧美变态另类bdsm刘玥| 久久综合国产亚洲精品| 岛国毛片在线播放| 99久久99久久久精品蜜桃| 老司机影院毛片| netflix在线观看网站| 国产熟女欧美一区二区| 国产精品久久久久久精品电影小说| 纵有疾风起免费观看全集完整版| 一级黄片播放器| 大香蕉久久成人网| 天天躁夜夜躁狠狠躁躁| 国产97色在线日韩免费| 天天影视国产精品| 两人在一起打扑克的视频| 丁香六月天网| 又粗又硬又长又爽又黄的视频| 亚洲精品久久成人aⅴ小说| 激情五月婷婷亚洲| 十八禁网站网址无遮挡| 国产免费一区二区三区四区乱码| 亚洲国产精品一区二区三区在线| 九色亚洲精品在线播放| 国产精品成人在线| 欧美+亚洲+日韩+国产| 国产成人免费观看mmmm| 一区福利在线观看| 丰满迷人的少妇在线观看| 精品少妇黑人巨大在线播放| 午夜日韩欧美国产| 满18在线观看网站| 久久人人爽人人片av| 久久九九热精品免费| 午夜视频精品福利| 国产精品亚洲av一区麻豆| 精品一区二区三卡| 中文字幕最新亚洲高清| 国产在线免费精品| 欧美人与性动交α欧美软件| 日韩av在线免费看完整版不卡| 国产亚洲一区二区精品| 午夜老司机福利片| 巨乳人妻的诱惑在线观看| 国产精品 欧美亚洲| 黄片小视频在线播放| 亚洲 欧美一区二区三区| 国产成人精品在线电影| 女性被躁到高潮视频| 久久精品成人免费网站| 国产高清视频在线播放一区 | 99九九在线精品视频| 亚洲欧美一区二区三区黑人| 少妇 在线观看| 国产精品一国产av| 国产日韩欧美亚洲二区| 多毛熟女@视频| 深夜精品福利| 色播在线永久视频| 大型av网站在线播放| 秋霞在线观看毛片| 国产极品粉嫩免费观看在线| tube8黄色片| 免费久久久久久久精品成人欧美视频| 人人妻人人爽人人添夜夜欢视频| 精品卡一卡二卡四卡免费| 免费观看av网站的网址| 欧美成人午夜精品| 少妇人妻 视频| 国产在线观看jvid| 久久精品久久久久久噜噜老黄| 飞空精品影院首页| 成人国语在线视频| 欧美变态另类bdsm刘玥| 亚洲,一卡二卡三卡| 成人亚洲欧美一区二区av| 不卡av一区二区三区| 男人爽女人下面视频在线观看| 日韩大码丰满熟妇| 好男人电影高清在线观看| 狂野欧美激情性xxxx| 国产av一区二区精品久久| 一级毛片女人18水好多 | 欧美精品亚洲一区二区| 婷婷色综合大香蕉| 亚洲欧美色中文字幕在线| 国产片内射在线| 国产一区二区三区综合在线观看| av电影中文网址| 国产精品 国内视频| 亚洲精品在线美女| 七月丁香在线播放| 国产不卡av网站在线观看| 日日摸夜夜添夜夜爱| 免费女性裸体啪啪无遮挡网站| 侵犯人妻中文字幕一二三四区| 99精品久久久久人妻精品| tube8黄色片| 搡老乐熟女国产| 看十八女毛片水多多多| 成年人午夜在线观看视频| 这个男人来自地球电影免费观看| 18禁观看日本| av网站在线播放免费| 亚洲国产精品999| 亚洲中文日韩欧美视频| 老鸭窝网址在线观看| 婷婷成人精品国产| 日韩中文字幕视频在线看片| 亚洲第一青青草原| 午夜91福利影院| 日韩av不卡免费在线播放| 晚上一个人看的免费电影| 成人国产av品久久久| 久久久久久免费高清国产稀缺| 老司机午夜十八禁免费视频| 亚洲精品久久成人aⅴ小说| 久久青草综合色| 性色av乱码一区二区三区2| 亚洲精品第二区| 亚洲欧美成人综合另类久久久| 久久狼人影院| 一区二区三区四区激情视频| 国产免费福利视频在线观看| 999精品在线视频| 国产成人欧美在线观看 | 在线观看免费高清a一片| 纵有疾风起免费观看全集完整版| 飞空精品影院首页| 一级片'在线观看视频| 老汉色av国产亚洲站长工具| av不卡在线播放| 亚洲五月婷婷丁香| 无遮挡黄片免费观看| 制服人妻中文乱码| 丝袜美腿诱惑在线| 国产亚洲av高清不卡| 亚洲伊人久久精品综合| 青春草视频在线免费观看| 看免费av毛片| 大型av网站在线播放| 免费女性裸体啪啪无遮挡网站| 不卡av一区二区三区| 日本av免费视频播放| 无遮挡黄片免费观看| 9色porny在线观看| 男女之事视频高清在线观看 | 美女大奶头黄色视频| 纯流量卡能插随身wifi吗| 一级片'在线观看视频| 亚洲国产日韩一区二区| 美女国产高潮福利片在线看| 99热国产这里只有精品6| 日韩 欧美 亚洲 中文字幕| 看免费av毛片| 精品福利永久在线观看| 成人国产一区最新在线观看 | 日韩熟女老妇一区二区性免费视频| a 毛片基地| 18禁黄网站禁片午夜丰满| 久久精品aⅴ一区二区三区四区| 99国产精品99久久久久| 中国美女看黄片| 十八禁高潮呻吟视频| 中国国产av一级| 精品国产乱码久久久久久男人| 在线观看www视频免费| 各种免费的搞黄视频| www.999成人在线观看| www日本在线高清视频| 免费观看a级毛片全部| 国产又爽黄色视频| 日日摸夜夜添夜夜爱| 久久久亚洲精品成人影院| 亚洲国产精品国产精品| 精品第一国产精品| 国产成人精品久久久久久| 亚洲国产欧美日韩在线播放| 自拍欧美九色日韩亚洲蝌蚪91| 黄色视频不卡| 九色亚洲精品在线播放| 99久久精品国产亚洲精品| 亚洲,欧美精品.| 欧美性长视频在线观看| 免费在线观看黄色视频的| 少妇被粗大的猛进出69影院| 9191精品国产免费久久| 青草久久国产| 免费少妇av软件| 91精品国产国语对白视频| 视频在线观看一区二区三区| 免费黄频网站在线观看国产| 免费在线观看日本一区| 一级片免费观看大全| 亚洲图色成人| 国产精品一区二区免费欧美 | 自拍欧美九色日韩亚洲蝌蚪91| 国产在线免费精品| 侵犯人妻中文字幕一二三四区| 成人国产av品久久久| 国产亚洲av片在线观看秒播厂| 午夜免费鲁丝| 母亲3免费完整高清在线观看| 亚洲 国产 在线| 中国国产av一级| 久久精品国产亚洲av高清一级| 亚洲专区中文字幕在线| 中国国产av一级| 最近最新中文字幕大全免费视频 | 熟女少妇亚洲综合色aaa.| 亚洲av电影在线进入| 另类精品久久| 国产亚洲午夜精品一区二区久久| 黑丝袜美女国产一区| 老汉色∧v一级毛片| 夫妻午夜视频| 你懂的网址亚洲精品在线观看| 久久久久久久大尺度免费视频| 国产片内射在线| 欧美xxⅹ黑人| 91字幕亚洲| 久久久久久久久免费视频了| 交换朋友夫妻互换小说| 久久精品国产a三级三级三级| 人人妻人人添人人爽欧美一区卜| 亚洲国产欧美一区二区综合|