• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Robust Image Watermarking Scheme Using Z-Transform,Discrete Wavelet Transform and Bidiagonal Singular Value Decomposition

    2019-02-22 07:33:02JayashreeandRBhuvaneswaran
    Computers Materials&Continua 2019年1期

    N.JayashreeandR.S.Bhuvaneswaran

    Abstract: Watermarking is a widely used solution to the problems of authentication and copyright protection of digital media especially for images, videos, and audio data. Chaos is one of the emerging techniques adopted in image watermarking schemes due to its intrinsic cryptographic properties. This paper proposes a new chaotic hybrid watermarking method combining Discrete Wavelet Transform (DWT), Z-transform (ZT)and Bidiagonal Singular Value Decomposition (BSVD). The original image is decomposed into 3-level DWT, and then, ZT is applied on the HH3 and HL3 sub-bands.The watermark image is encrypted using Arnold Cat Map. BSVD for the watermark and transformed original image were computed, and the watermark was embedded by modifying singular values of the host image with the singular values of the watermark image. Robustness of the proposed scheme was examined using standard test images and assessed against common signal processing and geometric attacks. Experiments indicated that the proposed method is transparent and highly robust.

    Keywords: Digital watermarking, chaotic mapping, z-transform, arnold cat map, discrete wavelet transform (DWT), bidiagonal singular value decomposition (BSVD).

    1 Introduction

    Increased usage of the internet and the availability of high-speed digital data networks made online transmission and distribution of multimedia contents over the web to grow exponentially. Copyright protection and authentication of these data are of primary concern since it can be duplicated, modified and re-transmitted easily. Digital watermarking is not only a solution to address security concerns of digital media but also facilitates copyright protection and authentication. It is also an important branch of information hiding, as it can be applied to high strength secure communication. A watermark is a sequence, carrying information, embedded into a digital image [Cox,Kilian, Leighton et al. (1997)]. It provides an excellent method for copyright protection of multimedia by embedding copyright information in them.

    Watermarking algorithms can be broadly classified into two categories based on the embedding process; one is spatial domain and second is frequency domain schemes. The spatial domain method directly alters the pixel values of the original image to embed the watermark. Although algorithms in this category are simple to implement, sophisticated operations require more computing resources and time. This drawback makes schemes in this category unsuitable for real-time situations. Transform domain schemes were proposed to overcome the limitations of the spatial domain method. The transform domain schemes, in the process, convert the original data, which is in the spatial domain,into a transform domain and vice versa. These conversions are made by utilizing mathematical transformation such as Discrete Fourier Transform (DFT), Discrete Cosine Transform (DCT), Z-transform (ZT) and Discrete Wavelet Transform (DWT). DWT is most commonly used in frequency domain watermarking due to its excellent spatiotemporal characteristics. Imperceptibility and robustness are two significant characteristics used to evaluate watermarking schemes. In order to improve robustness and imperceptibility, many hybrid watermarking schemes have been proposed combining various mathematical transformation.

    A hybrid watermarking technique developed by Lai et al. [Lai and Tsai (2010)]employing single-level Haar DWT and SVD. In this scheme, the watermark image is divided into two parts and embedded into two different sub-bands to improve robustness and imperceptibility.

    The image watermarking algorithm combining DWT, DCT, and SVD proposed by Fazli et al. [Fazli and Moeini (2016)] seeks to achieve robustness against geometric attacks. In this scheme, the host image is divided into four non-overlapping sub-images and the watermark is embedded in each sub-image independently. The semi-blind image watermarking scheme proposed by Saxena et al. [Saxena, Saxena and Rastogi (2014)],using trigonometric functions is robust against geometric distortions. The scheme is based on DWT, DCT, and SVD.

    Bhatnagar et al. [Bhatnagar and Raman (2009)] introduced a robust semi-blind reference watermarking scheme based on DWT and SVD. In their another scheme [Bhatnagar, Wu and Raman (2012)] combining fractional wavelet packet transform, quadratic residues and SVD, the watermark strength for each embedding location is chosen from two candidate strengths using quadratic residue properties.

    Shi [Shi (2014)] presented a robust scheme using DWT and SVD with circulation. In this scheme, Chebyshev map is used for scrambling the watermark information. In the hybrid image watermarking scheme based on DCT [Sverdlov, Dexter and Eskicioglu (2005)],the coefficients are mapped into four quadrants using the zig-zag sequence and show that watermark embedded in lower frequencies are robust against a set of attacks while watermark embedded in higher frequencies withstand against a different set of attacks.

    Although, SVD is a widely used technique in the design of robust watermarking algorithms, the issue of the false positive problem (FPP) is a severe drawback. [Ling,Phan and Heng (2013); Makbol, Khoo and Rassem (2018); Xing and Tan (2010)]. Many FPP resistant SVD-based schemes have been proposed.

    Ansari et al. [Ansari, Pant and Ahn (2016)] proposed a solution to the FPP in their method by embedding a signature generated using the UV matrices it in the HH sub-band of the host image. This signature is authenticated during the extraction process.

    A block-based DWT-SVD watermarking scheme developed by Makbol et al. [Makbol, Khoo and Rassem (2016)] employed human visual system (HVS) characteristics for block selection and embedded a binary watermark in the U matrix to overcome the false positive problem.

    Z-transform has been widely used for several image processing applications such as authentication, copyright protection and tamper detection [Ho, Zhu and Shen (2004); Ho,Zhu, Shen et al. (2008); Khan, Boda and Bhukya (2012); Mandal (2012); Rabiner,Schafer and Rader (1969); Stillings (1972); Takaya, Shimizu, Kitama et al. (1990); Vich(1987)]. The locations of the zeros of the z-transform are highly sensitive to changes in the pixel value, which is suitable for fragile watermarking. It is also easy to implement and provides better data hiding property. Based on these properties of Z-transform, Ho et al. [Ho, Zhu, Shen et al. (2008)] proposed a fragile watermarking scheme by encoding the zeros of the Z-transform. Ho et al. [Ho, Zhu and Shen (2004)] proposed another scheme for authentication of biomedical images based on zero location watermarking. Z-transform is also used in image steganography for grayscale images [Mandal (2012)]. A Z-transform-DWT based scheme was proposed by Jayashree and Bhuavaneswaran[Jayashree and Bhuvaneswaran (2016)].

    In this paper, a watermarking algorithm using Z-transform, DWT, and BSVD is proposed.Arnold cat map is used to encrypt the watermark image to improve the security of the scheme. The rest of the paper is organized as follows: The Next part of the paper is Section 2 where, the Arnold Cat map, DWT, Z-transform, and BSVD are explained. In Section 3, the proposed algorithm is discussed in detail. Experimental results and performance analysis are presented in Section 4 before concluding the paper in Section 5.

    2 Preliminaries

    2.1 Discrete wavelet transform

    Wavelet is a powerful mathematical tool used in a wide variety of applications like image denoising, data compression, watermarking and fingerprint verification [Sifuzzaman,Islam and Ali (2009)]. It provides a better representation of data by using Multi-Resolution Analysis (MRA). When DWT is applied to an input signal, it is decomposed into four sub-bands namely LL (low frequency), HH (high-frequency), HL (horizontal level frequency) and LH (vertical level frequency) sub-bands. The LL sub-band can be further decomposed into similar four sub-bands. Similarly, the input signal can be decomposed up to n-levels. DWT has both spatial and frequency information simultaneously thus provides the spatiotemporal representation of the data. It is also considered that the DWT represents the characteristics of the human visual system efficiently than other transform methods. The advantages of using wavelet transform include (1) simultaneous localization of data both in time and frequency domain and, (2)finer approximation of the data with few coefficients of the wavelets.

    2.2 Z-transform

    The z-transform plays a pivotal role in processing discrete data [Ho, Zhu, Shen et. al.(2008)]. Z-transform is a suitable and valuable tool for representing, analyzing and designing discrete-time signals and systems [Ho, Zhu, Shen et al. (2008)].

    The z-transform of a discrete time signal x[n] is defined as

    where, z is a complex variable. In the case of a sequence of image pixels, x(n) may be nonzero only in the interval 0≤n≤∞, and the Eq. (3) reduces to one-sided z-transform.

    The inverse Z-transform is used to recover the discrete time sequence, x(n), given its Z-transform. Symbolically, the inverse Z-transform may be defined as

    where X(z) is the Z-transform and Z-1is the function for the inverse Z-transform. An algorithm for numerically calculating the Z-transform of a sequence of N samples is proposed by Rabiner et al. [Rabiner, Schafer and Rader (1969)]. This algorithm is termed as chirp Z-transform (CZT), and it is used to compute the Z-transform effectively at points in z-plane which lie on a spiral or circular contour at any arbitrary point.Application of this algorithm in digital watermarking improves the robustness and imperceptibility of the watermarked image. It is also best suited for many other image processing applications such as filtering, interpolation, and correlation.

    There are many potential applications wherein the CZT algorithm is used like spectral analysis of speech, to the individual periods of voice with great success [Ho, Zhu and Shen (2004)]. The ability to evaluate the Z-transform inside and outside the unit circle and to efficiently analyze high resolution, narrow frequency spectrum bands help watermarking algorithms to improve robustness and imperceptibility of the watermarked image.

    2.3 BSVD

    The decomposition of a matrix into the orthogonal matrix and the diagonal matrix is termed as singular value decomposition. It is given by the formula

    where, S is the singular value matrix, and U and V are orthogonal matrices, generally termed as left and right singular matrices respectively.

    The properties of the singular value decomposition are (1) the singular values of the image matrix remain less altered when it is subjected to various attacks (2) also, the singular values of the image matrix depict intrinsic algebraic characteristics which shows that SVD can be used in image processing methods.

    The spectral decomposition based on SVD can be considered as bidiagonal SVD. The singular values obtained using BSVD are similar to SVD, although the method of calculating BSVD and SVD are different. The BSVD is calculated by bidiagonalizing A,and subsequently taking SVD on the upper bidiagonal values, as shown below:

    where, A is an orthonormal matrix, PAand QAare unitary matrices and B is the upper bidiagonal matrix.

    where, PBand QBare unitary matrices and S is the singular values of the matrix.

    The calculation of SVD, which uses iterative schemes to calculate the singular values,differs from that of BSVD, where it uses finite operations. The performance of BSVD is better than SVD [Deift, Demmel and Tomei (1991)].

    2.4 Arnold cat map

    Arnold Cat Map (ACM), named after Vladimir Arnold, is a chaotic map. Arnold’s cat map is the transformation

    given by the formula

    where x, y∈{0,1,2 …,n-1} and n is the size of the image.

    When the image is encrypted using Arnold cat map, the original image is obtained back,after N number of times, and N is called the period of the function [Chen, Wong, Liao et al.(2013)].

    3 Proposed scheme

    3.1 Watermark embedding

    Let the cover image of size M×N be denoted byIand the grayscale watermark logo image of size M1×N1be represented byW, the steps for embedding the watermark are given below:

    1. The watermark image W, scrambled and encrypted using the Arnold transformation is divided into two parts: W1and W2.

    2. Applyn-level discrete wavelet transform on the cover imageIto obtain the following four sub-bands LLn, LHn, HLn, HHn. Of these, HLnand HHnare considered for embedding the watermark. In the proposed method, the host image is decomposed up to 3 levels, i.e.n=3 levels.

    3. Perform Z-Transformation on the sub-band HL3.

    4. Apply BSVD on the Z-transformed sub-band of the cover image. The watermark is embedded by modifying the singular values of sub-band with the watermark image.The value of scaling factor (alpha) α is chosen in such a way that the robustness and the imperceptibility of the watermarked image are well adjussted. In this experiment,the value of alpha is taken as 0.2.

    5. The inverse Z-transform is performed on the modified frequency sub-bands as follows:

    Repeat Steps 2-5, for the sub-band HH3to embed the other half of the watermark.

    Apply the 3-level inverse DWT using the modified coefficients HL31and HH31, to generate the watermarked image I'.

    3.2 Watermark extraction scheme

    The watermark is extracted using the keys generated during the embedding process. The steps for extracting watermark are given below:

    1. The watermarked image I' is decomposed into sub-bands by applying 3-level DWT

    2. Z-transform is computed for the sub-band HL3;

    3. Apply BSVD on I’1and calculate D1by subtracting the singular values from the keys generated during the embedding process and dividing the values by the scaling factor (alpha) α as follows:

    4. The above steps are repeated for the sub-band HH3to compute W2', which is the second half of the watermark image. The values W1' and W2' are combined, and the watermark image is generated by applying Arnold Transformation.

    where, W is the extracted watermark.

    4 Experimental results and analysis

    Watermarking algorithms are generally evaluated in terms of imperceptibility and robustness. Imperceptibility is the measure of indistinguishable between the original and embedded images. In other words, there should not be any difference to view between the original and watermarked image. Robustness is the measure of a watermark to resist against intentional and random attacks.

    Several experiments using image processing and geometric attacks were carried out to verify the invisibility and the robustness of the proposed watermarking scheme. The tests were conducted using MATLAB software on standard test images of size 512×512,namely Lena, Baboon, Barbara, Boat (Bridge), Peppers, Jetplane, Man (Pirate) and a logo grayscale image of size 64×64 is used as the watermark (shown in Fig. 1).

    The invisibility of the proposed scheme was carried out by considering two parameters as follows:

    4.1 Peak Signal Noise Ratio (PSNR)

    4.2 Structural Similarity Index (SSIM)

    The test images after embedding the watermark logo and the extracted watermark logo from each of the test images are shown in Fig. 5. The efficiency of the proposed method is evaluated by computing PSNR, SSIM, Image Fidelity, Entropy and CC.

    Figure 1: (a-f) original host images; (g-l) original watermark images (m-r) watermarked host images (s-x) extracted watermark images

    Table 1: PSNR Values obtained (without attacks)

    Table 2: Comparison of PSNR values of the proposed scheme with different schemes

    4.3 Robustness to attacks

    The robustness of the proposed scheme was evaluated by applying various image processing attacks which includes common image processing attacks such as Gaussian noise, salt & pepper noise, Average filtering, median filtering, Blurring, Histogram Equalization, Gamma Correction and geometric distortions like scaling and rotation.

    4.3.1 Filtering attacks

    The most common signal processing attack is filtering. The watermark is extracted from the watermarked images after applying average and median filters of sizes: 3×3, 5×5, and 13×13. The results are shown in Fig. 2.

    Figure 2: Average and Median Filtering Attacks with 3×3 and 5×5 filters and the extracted watermarks

    4.3.2 Noising attacks

    Additive and multiplicative noise account for the transformation and the degradation of the images. It also results in degrading the watermark information during the extraction.In this experiment, the watermarked image is subjected to 100% salt and pepper noise and the extracted watermark in Fig. 3 shows the robustness of the proposed algorithm.

    Figure 3: Watermarked images with 100% Additive Salt and Pepper Noise and the extracted watermark

    4.3.3 Geometric attacks

    Geometric transformations or attacks include flipping, rotation, cropping and scaling of images. Cropping of images is the most common geometric attack in real time situations.Cropping is done by removing a part of the image either by hiding or deleting the rows or columns of the image. Much information is lost during this process. In this experiment,the image is cropped to 50% and the watermark is extracted as shown in Fig. 4.

    The flipping of images generally does not result in loss of information. The vertically and horizontally flipped watermarked image and the extracted watermark is shown in Fig. 4.

    Figure 4: Watermarked images subjected to horizontal flip attack and the extracted watermark

    Rotating an image to a certain degree can result in loss of information, making the watermark nondetectable. Fig. 5 shows the watermark extracted, after rotating the watermarked image to 50°.

    Figure 5: Watermarked images rotated to 50° and the extracted watermark

    Scaling an image involves resizing the image to fit into the desired size. The image is enlarged or reduced, resulting in information loss of the embedded watermark. Two different scaling attacks are considered, and in the first case, the image is enlarged to 1024×1024 and it is again resized to its original size 512×512. Secondly, the image is reduced to 128×128 and brought back to 512×512. The attacked image and the extracted watermark images are shown in Fig. 6.

    Figure 6: Watermarked images subjected to scaling and shearing and the extracted watermark

    Shearing is also another form of generalised geometric transformation usually combined with scaling and rotation. The watermarked image subjected to shearing and the extracted watermark image is shown in Fig. 6.

    4.3.4 JPEG compression

    Another common attack or manipulation of images is the JPEG compression of images.The watermarked image is tested using different compression ratios and the watermark shown below is extracted from 80:1 as well as 10:1 compressed watermark image as shown in Fig. 7.

    Figure 7: Watermarked images with JPEG compression 10:1 and 80:1 ratio and the extracted watermark

    4.3.5 Image-processing attacks

    Some of the general image enhancement techniques or attacks include sharpening,histogram equalisation, gamma correction, and motion blur. For sharpening of images attack, the watermark image is sharpened by choosing two scaling factors, 0.2 and 0.9.Histogram equalisation is the intensity-level equalisation of the image, resulting in a higher contrast of the image. It increases or sometimes decreases the image contrast to obtain the histogram of uniform distribution. The results of gamma correction, image sharpening, histogram equalisation, and motion blur are shown in Fig. 8.

    Figure 8: Watermarked images under different image processing attacks and the extracted watermark

    The watermarked images are subjected to various image processing attacks, and the watermark is extracted from the attacked image. The correlation coefficients of the original watermark and the extracted watermark are calculated for each attack to verify the ability of the proposed scheme to withstand intentional and non-intentional attacks. Tab. 2 gives the correlation coefficient of all extracted watermarks after the watermarked images are subjected to various kinds of attacks.

    4.3.5 False positive attacks

    The proposed scheme overcomes the false positive problem by (1) embedding a scrambled watermark (using the Arnold transformation), and (2) the scrambled watermark is divided into two halves and embedded in two different coefficients of the host image. The extracted watermark requires the valid keys and the parameters of the Arnold transformation. From the Fig. 9, it can be seen that the watermark can be extracted with the valid keys and the parameters whereas the watermark cannot be extracted when invalid keys or parameters are provided.

    Figure 9: (a) original image, (b) watermarked image, (c) original watermark (d) extracted watermark using correct keys, (e) extracted watermark using the wrong keys

    Table 3: Correlation coefficients of the original and the extracted watermark

    ?

    Tab. 3 shows reasonably good CC values against all the signal processing attacks and geometric distortions considered for evaluating the robustness of the proposed algorithm.All these experimental results suggest that the proposed method is extremely robust against common signal processing attacks and geometric distortions.

    Comparative study of the correlation coefficient values of the proposed method and the method proposed by Singh et al. [Singh and Singh (2017)] (Tab. 4), Lai et al. [Lai and Tsai (2010)] (Tab. 5), Bhatnagar et al. [Bhatnagar and Raman (2009)] (Tab. 6), and Makbol et al. [Makbol, Khoo and Rassem (2016)] (Tab. 7) are given in Tabs. 4-7. It can be seen that the proposed scheme performs better under various image processing attacks and geometric distortions considered as well as in JPEG compression.

    Table 4: Comparison of the correlation coefficients for Bhatnagar et al. [Bhatnagar and Raman (2009)] and the proposed method

    The correlation coefficient of the extracted watermark is also compared with the method proposed by Lai et al. [Lai and Tsai (2010)], as given in Tab. 4 below:

    Table 5: Comparison of correlation coefficients for Lai et al. [Lai and Tsai (2010)], and the proposed method

    The comparative study of the proposed method with previously reported schemes based on DWT-SVD techniques provided in Tabs. 4-7 shows the proposed scheme combining DWT-ZT-BSVD gives better results.

    The proposed scheme is also compared with the scheme proposed by Mishra et al.[Mishra, Agarwal, Sharma et al. (2014)] which is an optimized image watermarking algorithm using DWT-SVD and Firefly algorithm. In their experiment, the authors used two different scaling factors viz. SSF (Single Scaling Factor) and MSF (Multiple Scaling Factor). The proposed method implements a single scaling factor and hence, compared with the correlation coefficient of SSF proposed by Mishra et al. [Mishra, Agarwal,Sharma et al. (2014)]. The comparative results are given in Tab. 8.

    5 Conclusion

    In this paper, a chaos-based hybrid image watermarking technique has been proposed,based on DWT, Z-transform and BSVD. The scheme combines the benefits of DWT, ZT,BSVD and the chaotic map. Z-transform can efficiently analyze high resolution and narrow frequency spectrum bands, and it has better data hiding properties. The zeros of the Z-transform are very sensitive to minute changes in the pixel values. Hence it is widely employed in fragile watermarking and image authentication applications. The proposed algorithm combines the properties of Z-transform with the widely-adopted DWT to design a robust watermarking scheme. This algorithm concurrently utilizes two sub-bands of the DWT decomposition viz., HL and the HH. The scrambled watermark is divided into two equal blocks, and they are separately embedded into the HL and HH sub-bands, thereby enhancing the robustness. The watermark is embedded in singular values of the bidiagonal SVD, which gives better performance than implementing SVD21.Further, the use of Arnold-Cat map for scrambling of the watermark image before embedding improves the security as the extracted image need to be decrypted correctly to obtain the watermark. Experiments were conducted using standard test images, and the results were analysed for imperceptibility and robustness. The PSNR, CC, Entropy,Image Fidelity and SSIM values of the experiments show that the proposed scheme is more secure and robust.

    亚洲中文av在线| 国产99久久九九免费精品| 桃红色精品国产亚洲av| 色精品久久人妻99蜜桃| 久久精品91无色码中文字幕| 精品免费久久久久久久清纯| 听说在线观看完整版免费高清| 亚洲精品美女久久av网站| 亚洲人成网站在线播放欧美日韩| 亚洲熟女毛片儿| 手机成人av网站| 老司机靠b影院| 亚洲人成网站高清观看| 人人妻人人看人人澡| 天天一区二区日本电影三级| 欧美绝顶高潮抽搐喷水| 欧美一区二区精品小视频在线| 亚洲自拍偷在线| 88av欧美| 亚洲九九香蕉| 狠狠狠狠99中文字幕| 天天添夜夜摸| АⅤ资源中文在线天堂| 一二三四社区在线视频社区8| 一个人免费在线观看的高清视频| 色综合站精品国产| 午夜福利免费观看在线| 一个人观看的视频www高清免费观看 | 此物有八面人人有两片| 18禁观看日本| 精品人妻1区二区| 日韩 欧美 亚洲 中文字幕| 午夜免费观看网址| 国产亚洲欧美在线一区二区| 69av精品久久久久久| 1024视频免费在线观看| 最近在线观看免费完整版| 免费在线观看黄色视频的| 黄色片一级片一级黄色片| 在线观看午夜福利视频| 国模一区二区三区四区视频 | 嫩草影院精品99| 大型av网站在线播放| 日韩高清综合在线| 国产熟女午夜一区二区三区| 亚洲av成人精品一区久久| 麻豆成人av在线观看| 久久亚洲精品不卡| 久久久久国内视频| 怎么达到女性高潮| 12—13女人毛片做爰片一| www.999成人在线观看| 国产精品自产拍在线观看55亚洲| 欧美国产日韩亚洲一区| 午夜福利成人在线免费观看| 观看免费一级毛片| 成人精品一区二区免费| 成人永久免费在线观看视频| 91字幕亚洲| 美女高潮喷水抽搐中文字幕| 露出奶头的视频| 国产精品精品国产色婷婷| 性色av乱码一区二区三区2| 色精品久久人妻99蜜桃| 一进一出抽搐动态| 一卡2卡三卡四卡精品乱码亚洲| 午夜精品一区二区三区免费看| 在线观看舔阴道视频| 日韩精品青青久久久久久| 色综合站精品国产| 精品欧美一区二区三区在线| 无限看片的www在线观看| 女人高潮潮喷娇喘18禁视频| 亚洲欧美一区二区三区黑人| 熟女少妇亚洲综合色aaa.| 激情在线观看视频在线高清| 亚洲国产看品久久| www.www免费av| 国产高清videossex| av福利片在线观看| 国产高清激情床上av| 免费人成视频x8x8入口观看| 国内久久婷婷六月综合欲色啪| 麻豆成人av在线观看| 国产私拍福利视频在线观看| 久久久国产成人免费| 99精品在免费线老司机午夜| av天堂在线播放| 国产精品精品国产色婷婷| 国产亚洲欧美98| 国产成+人综合+亚洲专区| 婷婷精品国产亚洲av在线| 亚洲av电影在线进入| 免费在线观看成人毛片| 欧美不卡视频在线免费观看 | 一级作爱视频免费观看| 天堂av国产一区二区熟女人妻 | 桃红色精品国产亚洲av| 男男h啪啪无遮挡| 国产精品久久久久久亚洲av鲁大| cao死你这个sao货| 亚洲人成网站高清观看| 午夜免费成人在线视频| 91av网站免费观看| 午夜久久久久精精品| 亚洲中文字幕日韩| 视频区欧美日本亚洲| aaaaa片日本免费| 国产伦一二天堂av在线观看| 久久天堂一区二区三区四区| 日本一区二区免费在线视频| 无限看片的www在线观看| 一a级毛片在线观看| 免费搜索国产男女视频| 高潮久久久久久久久久久不卡| 日本免费一区二区三区高清不卡| 精品国产乱码久久久久久男人| 精品欧美一区二区三区在线| 国产99白浆流出| 哪里可以看免费的av片| 狂野欧美激情性xxxx| 曰老女人黄片| 天堂动漫精品| 精品无人区乱码1区二区| 久久精品亚洲精品国产色婷小说| 国产精品香港三级国产av潘金莲| tocl精华| 国产亚洲精品综合一区在线观看 | 90打野战视频偷拍视频| 国产熟女xx| 日韩中文字幕欧美一区二区| 成人国产一区最新在线观看| 丰满的人妻完整版| 亚洲七黄色美女视频| 日韩有码中文字幕| 久久久久精品国产欧美久久久| 超碰成人久久| 此物有八面人人有两片| 中国美女看黄片| 91老司机精品| 99国产极品粉嫩在线观看| 黄色视频,在线免费观看| 欧美成人免费av一区二区三区| 国语自产精品视频在线第100页| 免费电影在线观看免费观看| 久9热在线精品视频| 色综合婷婷激情| 国产成人系列免费观看| 香蕉国产在线看| 国产精品电影一区二区三区| 午夜福利欧美成人| 国产av又大| 亚洲午夜理论影院| www日本黄色视频网| 日韩高清综合在线| 久久久久免费精品人妻一区二区| 久久中文看片网| 99精品久久久久人妻精品| 日韩欧美在线乱码| 国内揄拍国产精品人妻在线| 免费人成视频x8x8入口观看| 一本久久中文字幕| 91字幕亚洲| 精品一区二区三区视频在线观看免费| 亚洲成人中文字幕在线播放| 久久久精品欧美日韩精品| 99在线视频只有这里精品首页| 级片在线观看| 在线a可以看的网站| 99精品欧美一区二区三区四区| 在线观看免费午夜福利视频| 免费无遮挡裸体视频| 免费在线观看完整版高清| 操出白浆在线播放| 又紧又爽又黄一区二区| 叶爱在线成人免费视频播放| 午夜成年电影在线免费观看| 嫩草影视91久久| 18禁美女被吸乳视频| www.熟女人妻精品国产| 亚洲精品在线观看二区| 亚洲国产精品成人综合色| 欧美一级a爱片免费观看看 | 日韩欧美 国产精品| a级毛片a级免费在线| 亚洲avbb在线观看| 欧美又色又爽又黄视频| 嫁个100分男人电影在线观看| 国产激情偷乱视频一区二区| 色综合亚洲欧美另类图片| 日本一区二区免费在线视频| 一边摸一边做爽爽视频免费| 淫秽高清视频在线观看| 丰满人妻熟妇乱又伦精品不卡| 日本免费一区二区三区高清不卡| 国模一区二区三区四区视频 | 国产三级中文精品| 久久久久九九精品影院| 日本熟妇午夜| 99精品欧美一区二区三区四区| 夜夜夜夜夜久久久久| 黄色成人免费大全| 亚洲九九香蕉| 啦啦啦韩国在线观看视频| 日韩成人在线观看一区二区三区| 后天国语完整版免费观看| 亚洲一区二区三区不卡视频| 香蕉av资源在线| 国产麻豆成人av免费视频| 欧美日韩精品网址| 99国产综合亚洲精品| 国产精品永久免费网站| 2021天堂中文幕一二区在线观| 成人午夜高清在线视频| 免费在线观看日本一区| 亚洲激情在线av| 午夜老司机福利片| 成人特级黄色片久久久久久久| 亚洲人成77777在线视频| 国产久久久一区二区三区| 亚洲专区中文字幕在线| 18禁裸乳无遮挡免费网站照片| 韩国av一区二区三区四区| 久久99热这里只有精品18| 18禁黄网站禁片午夜丰满| 色老头精品视频在线观看| 国产午夜精品久久久久久| 精品午夜福利视频在线观看一区| 亚洲精品在线观看二区| 久久九九热精品免费| 欧美乱色亚洲激情| 久久香蕉国产精品| 中文字幕最新亚洲高清| 一级a爱片免费观看的视频| 好男人在线观看高清免费视频| 不卡av一区二区三区| 亚洲18禁久久av| 少妇的丰满在线观看| 老汉色∧v一级毛片| 久久久久久久精品吃奶| 亚洲精品av麻豆狂野| 亚洲片人在线观看| 国产成人aa在线观看| 亚洲专区国产一区二区| av视频在线观看入口| 国产成人av激情在线播放| 成人三级黄色视频| 国内精品久久久久久久电影| 久久婷婷成人综合色麻豆| cao死你这个sao货| 国产免费男女视频| 成在线人永久免费视频| 天堂av国产一区二区熟女人妻 | 首页视频小说图片口味搜索| 日韩精品青青久久久久久| www.www免费av| 免费在线观看视频国产中文字幕亚洲| 亚洲av日韩精品久久久久久密| 正在播放国产对白刺激| 午夜a级毛片| 久久久久性生活片| 老汉色∧v一级毛片| 免费观看人在逋| 日韩大尺度精品在线看网址| 精品国产美女av久久久久小说| 欧美黄色淫秽网站| 婷婷精品国产亚洲av在线| 两性夫妻黄色片| 国产精品亚洲美女久久久| 日韩三级视频一区二区三区| 国产成人啪精品午夜网站| av中文乱码字幕在线| 后天国语完整版免费观看| 欧美日韩精品网址| 久久久久久久精品吃奶| 久久精品国产综合久久久| 亚洲18禁久久av| 日韩欧美在线二视频| 女人高潮潮喷娇喘18禁视频| 成年人黄色毛片网站| 亚洲av中文字字幕乱码综合| 亚洲成人久久性| 日韩精品中文字幕看吧| 97人妻精品一区二区三区麻豆| 哪里可以看免费的av片| av超薄肉色丝袜交足视频| 黄色丝袜av网址大全| 婷婷亚洲欧美| 1024香蕉在线观看| 两性夫妻黄色片| 窝窝影院91人妻| 久久人人精品亚洲av| cao死你这个sao货| 中文在线观看免费www的网站 | 午夜福利在线观看吧| 夜夜躁狠狠躁天天躁| 午夜福利在线在线| 老鸭窝网址在线观看| 99精品在免费线老司机午夜| 搡老岳熟女国产| 香蕉国产在线看| 久久久久久久久中文| 天天躁狠狠躁夜夜躁狠狠躁| 99久久无色码亚洲精品果冻| 黄色丝袜av网址大全| 每晚都被弄得嗷嗷叫到高潮| 久久中文字幕一级| 欧美中文综合在线视频| 欧美日韩黄片免| 视频区欧美日本亚洲| 国产v大片淫在线免费观看| 亚洲专区国产一区二区| 亚洲精品美女久久av网站| 桃色一区二区三区在线观看| www日本在线高清视频| 欧美黄色片欧美黄色片| 无人区码免费观看不卡| 国产免费男女视频| 美女高潮喷水抽搐中文字幕| 桃色一区二区三区在线观看| 亚洲色图av天堂| 日本五十路高清| 亚洲欧美日韩东京热| 搡老岳熟女国产| 我要搜黄色片| 日本三级黄在线观看| 成人av一区二区三区在线看| 最近视频中文字幕2019在线8| 熟女少妇亚洲综合色aaa.| 久久精品91蜜桃| 久久久久久大精品| 人妻久久中文字幕网| 动漫黄色视频在线观看| 欧美性猛交黑人性爽| 欧美极品一区二区三区四区| 国产精品免费视频内射| 欧美激情久久久久久爽电影| 国产精品久久久久久精品电影| 国产欧美日韩一区二区精品| 欧美高清成人免费视频www| 亚洲美女视频黄频| 成人av在线播放网站| 欧美日韩瑟瑟在线播放| 国产欧美日韩精品亚洲av| 日本一区二区免费在线视频| 亚洲第一电影网av| 午夜精品一区二区三区免费看| 午夜福利高清视频| 又大又爽又粗| 日本熟妇午夜| 舔av片在线| 99热这里只有精品一区 | 最新在线观看一区二区三区| 亚洲精品中文字幕在线视频| 国产精品爽爽va在线观看网站| 欧美日韩亚洲国产一区二区在线观看| www.自偷自拍.com| a级毛片在线看网站| 亚洲自偷自拍图片 自拍| 国产av不卡久久| x7x7x7水蜜桃| 岛国在线观看网站| 九色成人免费人妻av| 法律面前人人平等表现在哪些方面| 麻豆成人av在线观看| 宅男免费午夜| 成人国语在线视频| av免费在线观看网站| www.999成人在线观看| 国产亚洲欧美98| 亚洲电影在线观看av| 久久中文字幕一级| 欧美大码av| 久久国产乱子伦精品免费另类| 久久天躁狠狠躁夜夜2o2o| 精品久久久久久久人妻蜜臀av| 美女免费视频网站| 99在线视频只有这里精品首页| 成人高潮视频无遮挡免费网站| 亚洲精品美女久久av网站| 午夜福利成人在线免费观看| 少妇粗大呻吟视频| 亚洲国产精品成人综合色| 黄色毛片三级朝国网站| 国产高清激情床上av| 国内精品久久久久久久电影| 全区人妻精品视频| av视频在线观看入口| 精品高清国产在线一区| 久久精品国产清高在天天线| 97超级碰碰碰精品色视频在线观看| 国产精品影院久久| 久久精品国产99精品国产亚洲性色| 亚洲自拍偷在线| 老司机午夜福利在线观看视频| 18禁黄网站禁片免费观看直播| www国产在线视频色| 五月伊人婷婷丁香| 久久伊人香网站| 久久精品国产亚洲av香蕉五月| 精品久久久久久久久久久久久| 国产91精品成人一区二区三区| 国产高清videossex| 久久婷婷人人爽人人干人人爱| 国内精品久久久久久久电影| www.熟女人妻精品国产| 精品久久蜜臀av无| 三级男女做爰猛烈吃奶摸视频| 免费高清视频大片| 午夜久久久久精精品| 久久精品夜夜夜夜夜久久蜜豆 | www.熟女人妻精品国产| 两个人的视频大全免费| 欧美性猛交╳xxx乱大交人| 天堂影院成人在线观看| 亚洲专区中文字幕在线| 男女视频在线观看网站免费 | 久久精品综合一区二区三区| 伦理电影免费视频| 亚洲美女视频黄频| 精品久久蜜臀av无| 麻豆久久精品国产亚洲av| 国模一区二区三区四区视频 | 男男h啪啪无遮挡| 国产男靠女视频免费网站| 精品一区二区三区四区五区乱码| 国产精品一区二区精品视频观看| 中文字幕熟女人妻在线| 欧美成人免费av一区二区三区| 老司机靠b影院| 老司机在亚洲福利影院| 视频区欧美日本亚洲| 国产aⅴ精品一区二区三区波| 国产高清激情床上av| 99热6这里只有精品| 久久香蕉精品热| 亚洲一码二码三码区别大吗| 久久 成人 亚洲| 亚洲男人天堂网一区| 99热这里只有精品一区 | 日韩欧美在线乱码| 中文字幕人妻丝袜一区二区| 欧美另类亚洲清纯唯美| 午夜免费成人在线视频| 国产亚洲欧美98| 欧美绝顶高潮抽搐喷水| АⅤ资源中文在线天堂| 国产黄色小视频在线观看| 两性夫妻黄色片| 亚洲色图av天堂| 久久久国产成人精品二区| 操出白浆在线播放| 婷婷亚洲欧美| 俄罗斯特黄特色一大片| 精品国产乱子伦一区二区三区| 男女做爰动态图高潮gif福利片| 欧美3d第一页| 日本免费一区二区三区高清不卡| 青草久久国产| 中文亚洲av片在线观看爽| 亚洲黑人精品在线| 国产精品乱码一区二三区的特点| 欧美一区二区国产精品久久精品 | 两性午夜刺激爽爽歪歪视频在线观看 | 亚洲五月天丁香| 亚洲国产精品合色在线| 香蕉丝袜av| 黑人操中国人逼视频| 人妻夜夜爽99麻豆av| 一个人观看的视频www高清免费观看 | 久久久久精品国产欧美久久久| 亚洲精品美女久久久久99蜜臀| 久久久久久久久中文| 岛国在线免费视频观看| 精品国产超薄肉色丝袜足j| 三级毛片av免费| 亚洲欧美日韩无卡精品| 精品久久久久久久久久久久久| 久久精品影院6| 久久久久免费精品人妻一区二区| 精品久久久久久久末码| 日本免费一区二区三区高清不卡| 老司机午夜福利在线观看视频| 他把我摸到了高潮在线观看| 一级毛片精品| 岛国在线免费视频观看| 国产一级毛片七仙女欲春2| 狂野欧美白嫩少妇大欣赏| 成人三级黄色视频| 91大片在线观看| 视频区欧美日本亚洲| 岛国在线观看网站| 一本一本综合久久| 午夜福利18| 成年女人毛片免费观看观看9| 精品久久久久久,| 国产精品美女特级片免费视频播放器 | 天天躁狠狠躁夜夜躁狠狠躁| 亚洲人与动物交配视频| 亚洲成人久久性| 大型av网站在线播放| 老司机在亚洲福利影院| 嫩草影院精品99| 午夜日韩欧美国产| 国产黄a三级三级三级人| 免费在线观看日本一区| 国产91精品成人一区二区三区| 在线播放国产精品三级| 男人舔女人下体高潮全视频| 婷婷丁香在线五月| 18禁黄网站禁片免费观看直播| 少妇的丰满在线观看| 美女免费视频网站| 欧美成人免费av一区二区三区| 搡老岳熟女国产| 亚洲av电影不卡..在线观看| av在线播放免费不卡| 熟女少妇亚洲综合色aaa.| av在线播放免费不卡| 欧美日韩亚洲国产一区二区在线观看| 国产又色又爽无遮挡免费看| 亚洲av电影不卡..在线观看| 久久精品夜夜夜夜夜久久蜜豆 | 成人特级黄色片久久久久久久| 亚洲美女视频黄频| 在线观看午夜福利视频| 国产精品1区2区在线观看.| 极品教师在线免费播放| 亚洲精品av麻豆狂野| 最好的美女福利视频网| 黄色视频,在线免费观看| 特级一级黄色大片| 国产亚洲欧美在线一区二区| 亚洲av成人一区二区三| 日本免费a在线| 变态另类成人亚洲欧美熟女| 十八禁人妻一区二区| 久久精品91蜜桃| 最近在线观看免费完整版| 成人av一区二区三区在线看| 亚洲人成电影免费在线| 国产三级在线视频| 亚洲av电影不卡..在线观看| 香蕉av资源在线| 国产1区2区3区精品| 在线观看美女被高潮喷水网站 | 国产精华一区二区三区| 日韩中文字幕欧美一区二区| 午夜免费激情av| 999久久久精品免费观看国产| 青草久久国产| 在线观看www视频免费| 久久天躁狠狠躁夜夜2o2o| av免费在线观看网站| 一级毛片女人18水好多| 久久久久久大精品| 日本成人三级电影网站| 亚洲人成电影免费在线| 男女做爰动态图高潮gif福利片| 中文字幕高清在线视频| 又大又爽又粗| 日韩精品青青久久久久久| 久久久久久亚洲精品国产蜜桃av| 午夜福利18| 欧美另类亚洲清纯唯美| 久久天堂一区二区三区四区| 国产激情久久老熟女| 少妇被粗大的猛进出69影院| 制服人妻中文乱码| 天堂动漫精品| 一级毛片高清免费大全| 嫩草影院精品99| 亚洲最大成人中文| 欧美成人一区二区免费高清观看 | 精品少妇一区二区三区视频日本电影| 香蕉国产在线看| 欧美又色又爽又黄视频| 亚洲免费av在线视频| 99re在线观看精品视频| 欧美成人免费av一区二区三区| 国产99久久九九免费精品| 变态另类丝袜制服| 天堂av国产一区二区熟女人妻 | 国产精华一区二区三区| 三级国产精品欧美在线观看 | 久久久久国产一级毛片高清牌| 亚洲美女黄片视频| 亚洲男人的天堂狠狠| 美女黄网站色视频| 中文字幕av在线有码专区| 久久香蕉国产精品| 国产伦一二天堂av在线观看| 久久中文字幕人妻熟女| 曰老女人黄片| 丝袜人妻中文字幕| 日本黄大片高清| aaaaa片日本免费| 男女下面进入的视频免费午夜| 久久热在线av| 久久久久久国产a免费观看| 成人永久免费在线观看视频| 亚洲人成网站在线播放欧美日韩| av超薄肉色丝袜交足视频| 中文亚洲av片在线观看爽| 久99久视频精品免费| 久久久久亚洲av毛片大全| 99久久综合精品五月天人人| 一进一出好大好爽视频| 可以在线观看毛片的网站| 香蕉丝袜av| 国产视频一区二区在线看| 女警被强在线播放| 神马国产精品三级电影在线观看 | 熟妇人妻久久中文字幕3abv| 日本a在线网址|