• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Reversible Data Hiding in Encrypted Image Based on Block Classification Permutation

    2019-04-29 03:21:24QunMoHengYaoFangCaoZhengChangandChuanQin
    Computers Materials&Continua 2019年4期

    Qun Mo, Heng Yao, Fang Cao, Zheng Chang and Chuan Qin,

    Abstract: Recently, reversible data hiding in encrypted image (RDHEI) has attracted extensive attention, which can be used in secure cloud computing and privacy protection effectively. In this paper, a novel RDHEI scheme based on block classification and permutation is proposed. Content owner first divides original image into non-overlapping blocks and then set a threshold to classify these blocks into smooth and non-smooth blocks respectively. After block classification, content owner utilizes a specific encryption method, including stream cipher encryption and block permutation to protect image content securely. For the encrypted image, data hider embeds additional secret information in the most significant bits (MSB) of the encrypted pixels in smooth blocks and the final marked image can be obtained. At the receiver side, secret data will be extracted correctly with data-hiding key. When receiver only has encryption key, after stream cipher decryption, block scrambling decryption and MSB error prediction with threshold, decrypted image will be achieved. When data hiding key and encryption key are both obtained, receiver can find the smooth and non-smooth blocks correctly and MSB in smooth blocks will be predicted correctly, hence, receiver can recover marked image losslessly. Experimental results demonstrate that our scheme can achieve better rate-distortion performance than some of state-of-the-art schemes.

    Keywords: Reversible data hiding, image encryption, image recovery.

    1 Introduction

    Digital image security is one of the important research topics in many fields, such as medical, military and some forensic images. In the past few decades, digital image has become a popular way for communication. Many schemes have been proposed for plaintext images. Generative model [Duan, Song, Qin et al. (2018)], optimal iterative BTC [Qin, Ji, Chang et al. (2018)] and image hashing [Qin, Chen, Luo et al. (2018)] are applied for image security. However, in some important areas, such as military and medical fields, we not only need to protect the security of secret information, but also need to recover original image on the receiver side, which is called as reversible data hiding (RDH). Different from robust watermarking, RDH emphasizes the extraction of secret data and high quality of image recovery [Yu, Zhu, Li et al. (2013); Zhou, Sun,Dong et al. (2015)]. A lot of RDH schemes for plaintext images have already been designed, such as difference expansion [Tian (2003); Thodi and Rodriguez (2007)] and histogram shifting [Ni, Shi, Ansari et al. (2006)] schemes. More recently, to improve embedding capacity, some schemes were proposed: prediction-error expansion [Ou, Li,Zhao et al. (2013)], multiple histograms modification [Li, Zhang, Gui et al. (2015)] and histogram shifting mechanism for inpainting-assisted reversible steganographic scheme[Qin, Chang, Huang et al. (2013)] were all applied for plaintext image. In 2014, Qin et al.[Qin, Chang and Chui (2014)] proposed a scheme which realized data hiding and compression at the same time. However, these schemes cannot be applied in encrypted image because the redundancy in original image is rare. To solve this problem, RDH in encrypted image allows the data hider to embed additional data into the encrypted image and realize data hiding and protect the privacy of content owner simultaneously.

    In 2011, reversible data hiding in encrypted image (RDH-EI) was proposed by Zhang[Zhang (2011)], in which the three least significant bits (LSB) were flipped to hide the additional secret data. Later, improved schemes based on this scheme began to emerge.Among them, the error rate of extraction was improved, and some schemes [Hong, Chen and Wu (2012); Liao and Shu (2015)] were proposed, the capacity of embedding was increased, and some schemes proposed to embed additional data in compressed encrypted images and realize lossy compression for selective encrypted image with image inpainting [Qin, Zhou, Cao et al. (2018)].

    Generally speaking, existing schemes are classified into two categories: 1) vacating room after encryption and 2) vacating room before encryption. In 2012 [Zhang (2012)], a separable RDH-EI scheme was proposed, original image was encrypted by bitwise XOR operation by an encryption key, the data-hider compressed the LSB of encrypted image to create spare space to embed additional data. This scheme can achieve data extraction,image decryption with high quality and recovered image. However, when the amount of additional data was larger than 0.04 bit per pixel (bpp), it was difficult to recover original image correctly. In 2013, Ma et al. [Ma, Zhang, Zhao et al. (2013)] proposed a separable scheme with good quality of recovery and embedding rate, however, before the encryption, a pre-processing operation by the sender should be applied, and the scheme was actually a conventional RDH in plaintext image. In 2014, Wu et al. [Wu and Sun(2014)] proposed a RDH-EI scheme based on prediction error, additional data was embedded in the most significant bit (MSB) of encrypted image. The problems of this scheme were: (1) the quality of decrypted image is low, even if the payload was 0.016 bpp, PSNR value was about 35 dB for Lena and 24 dB for Baboon; (2) for the texture image, such as Baboon, the quality of recovered image was very low. Later, Qian et al.[Qian and Zhang (2016); Qian, Zhang and Feng (2016)] used distributed source encoding and progressive recovery to realize reversible data hiding in encrypted images,respectively. In 2018, Qin et al. [Qin, Zhang, Cao et al. (2018)] proposed a novel scheme via block selection to embed secret data in encrypted images.

    In summary, the above schemes cannot guarantee high embedding rate together with a high quality of recovered image. To solve this problem, this work proposes a new scheme based on block classification permutation, in which original image is divided into non-overlapping blocks and all blocks are classified into smooth blocks and non-smooth blocks according to threshold. The classification permutation aims to scramble the pixel positions and make the data-hider classify the smooth and non-smooth blocks easily.Secret data are embedded in the MSB of encrypted pixels in smooth blocks. At the receiver side, if the receiver only has data hiding key, secret information will be extracted correctly. When encryption key is possessed, MSB in all blocks will be predicted with threshold and decrypted image can be achieved. When data hiding key and encryption key are both obtained, receiver can find the smooth and non-smooth blocks correctly and MSB in smooth blocks will be predicted correctly and final recovered image will be obtained. Experimental results demonstrate that the quality of recovered image and embedding rate of our scheme outperform those of the above schemes.

    The rest of the paper is organized as follows. The proposed scheme is described in detail in Section 2. Section 3 provides experimental results and analysis. Finally, the conclusion is drawn and future work is mentioned in the last part.

    2 Proposed scheme

    2.1 Overview

    The schematic diagram of the proposed scheme is shown in Fig. 1. For the content owner,block classification, block permutation and image encryption are conducted on original image; for the data hider, data embedding with MSB substitution is conducted on smooth blocks of encrypted image; for the receiver, secret information, decrypted image and recovered image can be obtained with different keys.

    2.2 Block classification and permutation

    2.2.1 Block classification

    Assume the original imageIwith a size of M×N pixels and each pixelIx,ywith gray value falling into [0, 255] is represented by 8 bits, where both M and N are power of 2, and 1

    where Dzrepresents the difference between pmaxand pminin the z-th block. We set a same threshold DTfor all blocks, if Dz

    2.2.2 Block permutation

    After block classification, for the sake of security, Josephus traversing permutation is applied on image blocks, which contains three parameters, including the number of blocks of original imageIrecorded as n, starting position Js, and the counting period Jc.With these three parameters, imageI' can be obtained with a Josephus block permutation:

    To provide an example, assuming n=9, Jsand Jcare set as 2 and 3, respectively andthe total initial sequence can be represented as:

    whereBirepresents the i-th block of the original imageI(i=0, 1, ..., 8). Apply our parameters to Eq. (2), i.e.,I'=J (9, 2, 3), a scrambled sequence is produced:

    According to the new imageI' after block scrambling, a new mark matrixU' can be obtained, where n=(M/K)×(N/K), Jsand Jcis set by the encrypted key. Fig. 2 shows an example, in which 4×4 blocks are shown, where K=4, DT=10 and J=(16, 2, 3). These 16 blocks are classified into smooth and non-smooth blocks according to DT, after permutation, a new imageI' with block classification and permutation is generated.

    Figure 2: Example of block classification permutation. (a) Initial blocks of original image I, (b) Mark matrix U, (c) Blocks after permutation of image I', (d) Mark matrix U'

    2.3 Image encryption

    2.3.1 Stream cipher encryption

    After block classification and permutation, a new imageI' is generated. In order to make the imageI' indistinguishably, we encrypt it by using an encryption key: ke=(c, x0). The elements of this key are used as parameters of chaotic generator. First, the image owner turns the new imageI' into plain bits by decomposing each pixel into 8 bits as:

    where I'x,yis the pixel of imageI' with coordinate (x, y). By using this chaotic generator, a sequence of pseudo-random bytes sx,y,uis obtained and bitstream of the encrypted image can be calculated through exclusive-or(XOR) operation:

    Accordingly, an encrypted imageEcan be constructed by:

    where Ex,yis the pixel of encrypted image with coordinate (x, y).

    2.3.2 Self-embedding of U'

    In order to extract embedded secret information correctly and recover the original image losslessly, mark matrixU' needs to be embedded in the encrypted image. The p-th element of mark matrixU' is stored in the LSB of encrypted pixel with coordinate (K2, K2)of the p-th block, where 0

    2.4 Data embedding

    After image encryption, with the embedded mark matrixU', the data hider can classify all divided blocks into smooth and non-smooth blocks respectively. For smooth blocks,MSB of each pixel in addition to the first pixel of smooth blocks are substituted by bkwith:

    2.5 Data extraction

    In the data extraction phase, firstly, if the receiver only has data-hiding key, the receiver can classify the marked imageE' into K×K non-overlapping blocks and LSB of each pixel with coordinates (K2, K2) in the current block can be obtained. In other words, the concrete position and number of smooth blocks and non-smooth blocks can be acquired,the number of smooth blocks is recorded as n1and the number of non-smooth blocks is recorded as n2, meanwhile, the MSB of each pixel of smooth blocks are extracted by:

    where 0

    2.6 Image decryption and recovery

    2.6.1 Image decryption

    When the receiver only has the encryption key (stream ciphers key and scrambling encryption key), the receiver can obtain the decrypted imageId, the specific steps are as follows:

    Step 1: The stream cipher key keis used to generate the sequence s(x,y), with M×N pseudo-random bytes. The pixels of the marked encrypted image are browsed in the scan line order and all pixels are decrypted by conducting XOR for the value ex,y,uwith the associated binary sequence sx,y,uin the pseudo-random stream:

    Accordingly, a decrypted imageIdcan be constructed by:

    Note that, secret data is embedded in the MSB of pixels in smooth blocks, and their MSB cannot be decrypted correctly.

    Step 2: In the case where the scramble key is known, blocks before permutation can be achieved. We can get the imageIdbefore block classification permutation in which there are some pixels whose MSB may be error in smooth blocks. To obtain the decrypted image with high quality, the pixel values of smooth blocks are adjusted by estimating its MSB.Step 3: The decrypted image is divided into K×K non-overlapping blocks, for each block,difference between each pixel and the first pixel can be calculated and recorded as. If, i.e., other pixel value is larger than the first pixel value in the current block, whenthe current decrypted pixel value can be calculated by:

    In this way, the decrypted imageIdcan be obtained.

    2.6.2 Image recovery

    If the receiver both has data hiding key and encryption key, the original imageIcan be recovered with high quality. When data hiding key is achieved, smooth and non-smooth blocks can be achieved. For pixels in non-smooth blocks, the pixel values remain unchanged, and for those pixel values in smooth blocks, we calculate difference between each pixel value and the first pixel value and the differences are recorded as. If, i.e., other pixel value is larger than the first pixel in the current block, whenthe current recovered pixel value can be calculated by:

    In this way, the recovered imageIcan be obtained.

    For example, Fig. 3 shows an example, in which the process of MSB prediction and image recovery is shown. Fig. 3(a) shows the image after stream ciphers decryption and block permutation decryption. It contains 64 blocks, each block includes 4×4 pixel values.The smoothness corresponding to each block is shown in Fig. 3(b), in which, 0 represents smooth blocks and 1 represents non-smooth blocks. We mark the non-smooth blocks with gray and use white to mark the smooth blocks. Pixel values in non-smooth blocks are kept unchanged. With Eq. (14) and Eq. (15), the MSB value can be recovered correctly. Five blocks identified in red is used as a concrete example, the pixel values in the five blocks are shown in Fig. 3(c). When threshold DT=15, by calculating the difference, we correct the MSB value of pixel in current smooth block. After correcting all pixel values, we can get the recovered image with high quality.

    Figure 3: (a) Initial blocks after encryption and classification rearrangement, (b) Mark matrix U', (c) Pixels in blocks marked with red, (d) Pixels after MSB prediction

    3 Experimental results and comparisons

    In this section, we present the obtained experimental results, Section 3.1 gives a full example for different test images and shows the obtained results. Then, in Section 3.2 we analysis performance of our proposed scheme from different statistical metrics. Finally,in Section 3.3, we compare embedding rate and recovered image quality of our proposed scheme and other three state-of-the-art schemes.

    3.1 Results of our scheme

    We first applied our scheme on four different test original images of 512×512 pixels,illustrated in Fig. 4. Fig. 5 gives an example of our proposed scheme for Lena sized 512×512. Fig. 5(a) shows encrypted image Lena. Fig. 5(b) is the marked image with secret bits embedded. Fig. 5(c) is the decrypted image and Fig. 5(d) is the recovered image.

    Figure 4: Test image. (a) Lena, (b) Baboon, (c) Peppers, (d)Airplane

    Figure 5: An example of the proposed scheme with K=4 and the threshold DT is 15. (a)The encrypted image after classification and permutation, (b) Marked image with 111489 bits embedded, (c) Decrypted image after MSB prediction with PSNR=31.72 dB, (d) The losslessly recovered image

    3.2 Performance analysis

    We perform an analysis to evaluate performance of our proposed scheme. We use different statistical metrics: horizontal, vertical and diagonal correlation coefficients;Shannon entropy; PSNR between the original image and decrypted and recovered image and embedding rate of secret information.

    (a) Shannon entropy:

    where β denotes the source consisting of h symbols, i.e., β1, β2, …, βh; P(βi) denotes the probability of the symbol βi.

    (b) Horizontal, vertical and diagonal correlation coefficients:

    where ciand diare two data sequence of adjacent pixels including horizontal, vertical and diagonal directions of the plain image and encrypted image, respectively. S is the sequence length.

    (c) Peak-signal-to noise ratio (PSNR):

    whereIdis the decrypted image andIis original image(d) Embedding rate:

    Embedding rate is expressed in bit per pixel, where n1represents the number of smooth blocks and K represents the block size. The embedding amount of mark matrixUand the original LSB values embedded as extra secret information should be considered.

    Shannon’s entropy provides a standard to evaluate randomness of image, which can be calculated with Eq. (16). The entropy should be close to 8 for an ideal random image with 256 grey levels. The information entropies of original image and encrypted image are shown in Tab. 1.

    We can find that the calculated entropies of encrypted images are extremely close to the ideal value 8. Meanwhile, the correlation between two adjacent pixels in encrypted image is also a good standard to evaluate good encryption performance. Correlation coefficients will be calculated with Eq. (17) and the results are shown in Tab. 2, we can find that the correlation coefficients of adjacent pixels of plain image are close to 1, while the correlation coefficients of adjacent pixels of encrypted image are close to 0, which indicates that our proposed scheme have a good encryption performance.

    Table 1: Entropy analysis of our proposed scheme

    Table 2: Correlation analysis of our proposed scheme

    Table 3: PSNR values and embedding rate of decrypted and recovered image Lena

    Table 4: PSNR values and embedding rate of decrypted and recovered image Baboon

    Table 5: PSNR values and embedding rate of decrypted and recovered image Peppers

    In the process of encryption, the original image is divided into K×K blocks. We set a threshold DTto classify smooth and non-smooth blocks. The size of image block and threshold will directly affect the quality of decrypted image. We test PSNR values and embedding rate of the decrypted and recovered image under different K and threshold.The results are shown in Tab. 3, Tab. 4, Tab. 5 and Tab. 6. For decrypted image, when K remains unchanged, the embedding rate becomes larger as the threshold increases, while PSNR value decreases. When threshold value remains unchanged, both embedding rate and PSNR value decrease with the increase of K. For the four test images, complete reversibility can be obtained by our proposed scheme. Therefore, according to different images, setting a reasonable threshold and block size K will achieve a good balance between embedding rate and PSNR values of decrypted image.

    Table 6: PSNR values and embedding rate of decrypted and recovered image Airplane

    3.3 Comparisons with three state-of-the-art schemes

    We conduct some comparisons in terms of embedding rate and PSNR of recovered image between our scheme and three schemes including Zhang’s scheme [Zhang (2011)], Wu et al.’s scheme [Wu and Sun (2014)] and Liao et al.’s scheme [Liao and Shu (2015)]. First of all, Fig. 6 shows comparison results of rate-distortion curves for the relationship between embedding rate and visual quality of recovered image. It can be found that, our scheme can acquire better rate-distortion performance than other three schemes for the four test images sized 512×512, including Lena, Baboon, Peppers and Airplane. For the recovered image, our scheme allows us to have a higher embedding rate and PSNR value than other schemes. Under the same PSNR value, the embedding rate of our scheme is higher than other three schemes.

    Figure 6: Comparisons rate-distortion curves for recovered image among the proposed scheme and other three schemes. (a) Lena. (b) Baboon. (c) Peppers. (d) Airplane

    4 Conclusions

    In this paper, a novel scheme of reversible data hiding in encrypted image based on block classification and permutation is proposed. Before encryption, we set a threshold to classify original image into smooth and non-smooth blocks, respectively. Then all blocks are permuted according to Josephus scrambling and mark matrixUis generated to mark the smooth and non-smooth blocks respectively. In the encryption process, the image is encrypted with the stream cipher. In data embedding process, secret data is embedded in the MSB of each encrypted pixel expect the first pixel in current smooth blocks. At the receiver side, when data-hiding key is possessed, secret data can be extracted correctly.When encryption key is possessed, MSB in all blocks will be predicted with threshold and decrypted image can be achieved. In order to recover the original image reversibly,the receiver should both has data hiding key and encryption key. Compared with three proposed schemes, the rate-distortion performance of our proposed scheme is better. In the future work, the storage space of the mark matrix should be decreased and the quality of decrypted image should be further improved.

    Acknowledgement:This work was supported by the National Natural Science Foundation of China (61672354, 61702332). The authors would like to thank the anonymous reviewers for their valuable suggestions.

    久久精品国产a三级三级三级| 午夜成年电影在线免费观看| 亚洲欧美一区二区三区久久| 男人舔女人的私密视频| 久久天堂一区二区三区四区| 老鸭窝网址在线观看| 国产97色在线日韩免费| 国产1区2区3区精品| 黑人巨大精品欧美一区二区mp4| 亚洲成人免费av在线播放| 岛国毛片在线播放| 亚洲av电影在线进入| 亚洲精品美女久久久久99蜜臀| 国产男女超爽视频在线观看| 午夜亚洲福利在线播放| 18禁裸乳无遮挡免费网站照片 | 淫妇啪啪啪对白视频| 久久午夜综合久久蜜桃| 黄色丝袜av网址大全| 在线播放国产精品三级| 国产成人av激情在线播放| 亚洲在线自拍视频| 免费在线观看日本一区| 日日摸夜夜添夜夜添小说| 一区二区三区国产精品乱码| 好看av亚洲va欧美ⅴa在| 女性被躁到高潮视频| 国产精品久久久久久精品古装| 精品少妇一区二区三区视频日本电影| 亚洲色图 男人天堂 中文字幕| 男女之事视频高清在线观看| 无人区码免费观看不卡| 国产区一区二久久| 正在播放国产对白刺激| 99国产精品99久久久久| 建设人人有责人人尽责人人享有的| 女人高潮潮喷娇喘18禁视频| 成年人免费黄色播放视频| 69av精品久久久久久| 别揉我奶头~嗯~啊~动态视频| 成熟少妇高潮喷水视频| 国产成人欧美在线观看 | 久久久国产欧美日韩av| 深夜精品福利| 性色av乱码一区二区三区2| 欧美日韩视频精品一区| 老司机午夜十八禁免费视频| 中出人妻视频一区二区| 久久青草综合色| 亚洲精品成人av观看孕妇| 丁香欧美五月| 久久久水蜜桃国产精品网| 最近最新免费中文字幕在线| 欧美乱妇无乱码| 别揉我奶头~嗯~啊~动态视频| 99久久国产精品久久久| www.熟女人妻精品国产| 女人爽到高潮嗷嗷叫在线视频| 身体一侧抽搐| 午夜免费成人在线视频| 亚洲av美国av| 亚洲av熟女| 国产精品偷伦视频观看了| 亚洲av欧美aⅴ国产| 成人手机av| 久久久精品国产亚洲av高清涩受| 日韩欧美在线二视频 | 捣出白浆h1v1| 超色免费av| 欧洲精品卡2卡3卡4卡5卡区| 在线十欧美十亚洲十日本专区| 老司机靠b影院| 人妻 亚洲 视频| 欧美日韩乱码在线| 大型av网站在线播放| 制服诱惑二区| 老司机午夜福利在线观看视频| 国产aⅴ精品一区二区三区波| 王馨瑶露胸无遮挡在线观看| 亚洲欧美日韩另类电影网站| 久久久久久免费高清国产稀缺| 精品久久久久久,| 亚洲久久久国产精品| 久久香蕉国产精品| 国产av精品麻豆| 高清毛片免费观看视频网站 | 日韩欧美免费精品| 久久久久久久精品吃奶| 男人操女人黄网站| 欧洲精品卡2卡3卡4卡5卡区| 制服人妻中文乱码| 丁香六月欧美| 欧美不卡视频在线免费观看 | 亚洲av欧美aⅴ国产| 精品国产一区二区久久| 熟女少妇亚洲综合色aaa.| 无人区码免费观看不卡| 一边摸一边抽搐一进一小说 | 在线播放国产精品三级| 精品久久久久久电影网| 成人国语在线视频| 久久久久国产一级毛片高清牌| 亚洲精品国产色婷婷电影| 精品少妇久久久久久888优播| 窝窝影院91人妻| 在线观看免费高清a一片| 精品久久久精品久久久| 在线观看免费高清a一片| 久久 成人 亚洲| 侵犯人妻中文字幕一二三四区| 久久久精品区二区三区| 老汉色∧v一级毛片| 欧美成人午夜精品| 欧美精品亚洲一区二区| 黄色成人免费大全| 成年人午夜在线观看视频| 亚洲少妇的诱惑av| 精品国产美女av久久久久小说| 大型黄色视频在线免费观看| 欧美不卡视频在线免费观看 | 五月开心婷婷网| 亚洲国产精品一区二区三区在线| 精品国产一区二区三区久久久樱花| 在线天堂中文资源库| 国产有黄有色有爽视频| 高清毛片免费观看视频网站 | 女人久久www免费人成看片| 亚洲av日韩精品久久久久久密| 国产91精品成人一区二区三区| 午夜福利欧美成人| 日韩欧美国产一区二区入口| 身体一侧抽搐| 国产在线观看jvid| 狠狠婷婷综合久久久久久88av| 亚洲色图 男人天堂 中文字幕| 午夜老司机福利片| 视频区图区小说| 日本撒尿小便嘘嘘汇集6| 日韩有码中文字幕| 99热国产这里只有精品6| 欧美色视频一区免费| 一边摸一边抽搐一进一小说 | 成人永久免费在线观看视频| 在线观看舔阴道视频| 亚洲情色 制服丝袜| www.熟女人妻精品国产| 777米奇影视久久| 大码成人一级视频| 91大片在线观看| 欧美国产精品一级二级三级| 欧美国产精品一级二级三级| 高清在线国产一区| 亚洲午夜精品一区,二区,三区| 国产一区二区三区视频了| 在线观看一区二区三区激情| 婷婷丁香在线五月| 99国产精品99久久久久| 中文亚洲av片在线观看爽 | 免费观看人在逋| 丝袜美腿诱惑在线| 精品久久久久久久毛片微露脸| 女人久久www免费人成看片| 啦啦啦 在线观看视频| 91精品三级在线观看| 女人久久www免费人成看片| 19禁男女啪啪无遮挡网站| www.999成人在线观看| 99热只有精品国产| 免费在线观看完整版高清| 亚洲成人国产一区在线观看| 宅男免费午夜| 另类亚洲欧美激情| 丁香欧美五月| 国产又色又爽无遮挡免费看| 精品一区二区三卡| 国产一区在线观看成人免费| 一a级毛片在线观看| 亚洲,欧美精品.| 香蕉国产在线看| 国产亚洲欧美98| 欧美日韩福利视频一区二区| 精品福利永久在线观看| 人成视频在线观看免费观看| 久久久久久久久久久久大奶| 亚洲aⅴ乱码一区二区在线播放 | 9热在线视频观看99| 成年人午夜在线观看视频| 老司机在亚洲福利影院| 变态另类成人亚洲欧美熟女 | 在线看a的网站| 男女免费视频国产| av网站免费在线观看视频| 啪啪无遮挡十八禁网站| 亚洲五月天丁香| 亚洲精品自拍成人| 国产黄色免费在线视频| 如日韩欧美国产精品一区二区三区| 久久精品亚洲av国产电影网| 国产欧美日韩一区二区精品| 国产极品粉嫩免费观看在线| 美女 人体艺术 gogo| 国产国语露脸激情在线看| 国产成人av教育| e午夜精品久久久久久久| 中文字幕色久视频| 精品欧美一区二区三区在线| 国产男女内射视频| 日本a在线网址| 国产精品免费大片| 一本大道久久a久久精品| 天天躁夜夜躁狠狠躁躁| 天天躁夜夜躁狠狠躁躁| 国产野战对白在线观看| 欧美在线黄色| 国产欧美日韩一区二区三| 99re6热这里在线精品视频| 亚洲av日韩精品久久久久久密| 国产有黄有色有爽视频| 交换朋友夫妻互换小说| 久久久久国内视频| 免费观看a级毛片全部| 国产亚洲欧美98| 国产97色在线日韩免费| 欧美另类亚洲清纯唯美| 久久国产精品人妻蜜桃| 国产成人免费无遮挡视频| 精品久久久精品久久久| 亚洲一区中文字幕在线| 在线观看免费视频日本深夜| 亚洲精品国产区一区二| 国产深夜福利视频在线观看| 国产精品久久久av美女十八| 精品视频人人做人人爽| 一本一本久久a久久精品综合妖精| 亚洲中文av在线| 亚洲精品中文字幕一二三四区| 免费看十八禁软件| 日韩有码中文字幕| 亚洲精品乱久久久久久| 国产高清videossex| 啦啦啦视频在线资源免费观看| 成人永久免费在线观看视频| 久热爱精品视频在线9| 女人被躁到高潮嗷嗷叫费观| 老熟女久久久| 国产精品香港三级国产av潘金莲| 欧美激情 高清一区二区三区| videosex国产| 亚洲一码二码三码区别大吗| 91国产中文字幕| 亚洲成a人片在线一区二区| 欧美国产精品一级二级三级| av国产精品久久久久影院| 国产在视频线精品| 国产亚洲av高清不卡| 国产欧美日韩一区二区三区在线| 国产成人系列免费观看| 在线免费观看的www视频| 黑丝袜美女国产一区| 1024视频免费在线观看| 欧美日韩一级在线毛片| 欧美一级毛片孕妇| 50天的宝宝边吃奶边哭怎么回事| 日韩免费高清中文字幕av| 一边摸一边做爽爽视频免费| 三上悠亚av全集在线观看| 国产精品久久久av美女十八| 亚洲精品一二三| 亚洲人成77777在线视频| 午夜福利在线观看吧| 免费在线观看黄色视频的| 亚洲精品乱久久久久久| 国产在线精品亚洲第一网站| 91在线观看av| 亚洲熟女毛片儿| 国产亚洲精品第一综合不卡| 亚洲成人国产一区在线观看| 国产一区二区三区在线臀色熟女 | 国产精品av久久久久免费| 免费看十八禁软件| 免费不卡黄色视频| 国产aⅴ精品一区二区三区波| 91九色精品人成在线观看| 麻豆成人av在线观看| 成人国产一区最新在线观看| 国产精品香港三级国产av潘金莲| 国产精品九九99| 电影成人av| 亚洲欧美激情综合另类| 黄色丝袜av网址大全| 黑人操中国人逼视频| 国产视频一区二区在线看| av中文乱码字幕在线| 一本一本久久a久久精品综合妖精| 国产亚洲精品久久久久5区| 亚洲熟女精品中文字幕| 欧美另类亚洲清纯唯美| 色综合婷婷激情| 欧美成人午夜精品| 搡老岳熟女国产| 国产三级黄色录像| 日韩人妻精品一区2区三区| 99热网站在线观看| 精品国产乱子伦一区二区三区| 757午夜福利合集在线观看| 男人舔女人的私密视频| 1024香蕉在线观看| 日本a在线网址| 黄色片一级片一级黄色片| 在线播放国产精品三级| 高清欧美精品videossex| 成人av一区二区三区在线看| 国产蜜桃级精品一区二区三区 | 淫妇啪啪啪对白视频| 曰老女人黄片| av中文乱码字幕在线| 国产欧美日韩精品亚洲av| 一级,二级,三级黄色视频| 久久久国产成人精品二区 | 久久精品熟女亚洲av麻豆精品| 日韩熟女老妇一区二区性免费视频| 嫁个100分男人电影在线观看| 99久久综合精品五月天人人| 色播在线永久视频| 国产精品久久久久久精品古装| 精品人妻在线不人妻| 91av网站免费观看| 人人妻人人澡人人看| 国产在线精品亚洲第一网站| 欧美日韩精品网址| 精品久久久久久,| 久久精品人人爽人人爽视色| 如日韩欧美国产精品一区二区三区| 法律面前人人平等表现在哪些方面| 搡老熟女国产l中国老女人| 飞空精品影院首页| 大香蕉久久网| 两性夫妻黄色片| 在线播放国产精品三级| 女性被躁到高潮视频| 午夜影院日韩av| 午夜福利免费观看在线| 久9热在线精品视频| 久久人妻av系列| 午夜激情av网站| 欧美在线黄色| 日韩欧美免费精品| 国产麻豆69| 国产1区2区3区精品| 国产成人欧美| 中文字幕人妻丝袜一区二区| 又大又爽又粗| www.熟女人妻精品国产| 激情在线观看视频在线高清 | 日本一区二区免费在线视频| 最近最新中文字幕大全电影3 | √禁漫天堂资源中文www| 热99国产精品久久久久久7| 国产野战对白在线观看| 国产一区二区三区在线臀色熟女 | 在线观看免费日韩欧美大片| 欧美国产精品一级二级三级| 亚洲午夜精品一区,二区,三区| 国产成人系列免费观看| 亚洲九九香蕉| 热99re8久久精品国产| 中文字幕av电影在线播放| 12—13女人毛片做爰片一| 99国产精品免费福利视频| 久久精品亚洲av国产电影网| 成人影院久久| 久热爱精品视频在线9| 久久亚洲精品不卡| av网站免费在线观看视频| 熟女少妇亚洲综合色aaa.| 欧美日韩瑟瑟在线播放| 一级a爱片免费观看的视频| 免费女性裸体啪啪无遮挡网站| 国产成人免费观看mmmm| 91在线观看av| 涩涩av久久男人的天堂| 极品教师在线免费播放| aaaaa片日本免费| 天天躁日日躁夜夜躁夜夜| 十八禁高潮呻吟视频| 国产成人精品在线电影| 亚洲人成伊人成综合网2020| 99久久99久久久精品蜜桃| 成人国产一区最新在线观看| videosex国产| 日本撒尿小便嘘嘘汇集6| 久久精品国产综合久久久| 男女午夜视频在线观看| 少妇裸体淫交视频免费看高清 | 在线十欧美十亚洲十日本专区| 丁香欧美五月| 亚洲av熟女| 欧美国产精品一级二级三级| 一级黄色大片毛片| 在线免费观看的www视频| 制服诱惑二区| 啦啦啦视频在线资源免费观看| 91字幕亚洲| 大陆偷拍与自拍| 国产成人免费观看mmmm| av不卡在线播放| 日韩 欧美 亚洲 中文字幕| 夜夜爽天天搞| av天堂久久9| 少妇粗大呻吟视频| 亚洲精品粉嫩美女一区| 黄色片一级片一级黄色片| 久久精品国产综合久久久| 天天躁狠狠躁夜夜躁狠狠躁| cao死你这个sao货| 操美女的视频在线观看| 国产日韩一区二区三区精品不卡| 亚洲精品在线美女| 国产一区二区激情短视频| 精品久久久久久电影网| 一本大道久久a久久精品| 一a级毛片在线观看| 这个男人来自地球电影免费观看| 人人澡人人妻人| 91字幕亚洲| 国产亚洲精品久久久久5区| 久久久国产一区二区| 在线观看免费视频日本深夜| 亚洲熟妇中文字幕五十中出 | 18禁裸乳无遮挡免费网站照片 | 欧美日韩视频精品一区| 中文字幕高清在线视频| 亚洲国产精品sss在线观看 | 亚洲成人免费电影在线观看| 午夜免费观看网址| 99精品久久久久人妻精品| 欧美乱码精品一区二区三区| 精品国产一区二区三区四区第35| 国产精品 国内视频| 两个人看的免费小视频| 亚洲专区中文字幕在线| 中文字幕另类日韩欧美亚洲嫩草| 欧美中文综合在线视频| 久久久久久免费高清国产稀缺| 成人免费观看视频高清| 首页视频小说图片口味搜索| 午夜激情av网站| www.999成人在线观看| 老司机午夜十八禁免费视频| a级毛片黄视频| 亚洲久久久国产精品| 日本vs欧美在线观看视频| 欧美日韩瑟瑟在线播放| av有码第一页| 精品一区二区三区四区五区乱码| 在线十欧美十亚洲十日本专区| 在线永久观看黄色视频| 亚洲人成电影免费在线| 超碰成人久久| 国产精品免费一区二区三区在线 | 国产在线精品亚洲第一网站| av线在线观看网站| 欧美在线一区亚洲| 亚洲欧美日韩高清在线视频| 男女午夜视频在线观看| 国产精品久久视频播放| 丁香六月欧美| 国产精品香港三级国产av潘金莲| 国产色视频综合| 王馨瑶露胸无遮挡在线观看| 久热这里只有精品99| 国产欧美日韩综合在线一区二区| 免费日韩欧美在线观看| 99精品欧美一区二区三区四区| 两人在一起打扑克的视频| 精品少妇一区二区三区视频日本电影| 国产三级黄色录像| 免费久久久久久久精品成人欧美视频| 国产亚洲av高清不卡| 国产精品一区二区在线观看99| 久久久国产一区二区| 黄色 视频免费看| 18禁美女被吸乳视频| 91老司机精品| 国产在线观看jvid| 后天国语完整版免费观看| 两性午夜刺激爽爽歪歪视频在线观看 | 欧美日韩乱码在线| 久久热在线av| 在线视频色国产色| 香蕉国产在线看| 老司机亚洲免费影院| 亚洲精品美女久久av网站| 久久精品国产99精品国产亚洲性色 | 757午夜福利合集在线观看| 一二三四社区在线视频社区8| 大码成人一级视频| 老司机靠b影院| 亚洲黑人精品在线| 亚洲成人手机| 日韩欧美三级三区| 久久精品国产99精品国产亚洲性色 | 欧美精品啪啪一区二区三区| 午夜福利,免费看| 99久久综合精品五月天人人| 飞空精品影院首页| 国产精品久久久久久人妻精品电影| 欧美最黄视频在线播放免费 | 老司机深夜福利视频在线观看| 一二三四社区在线视频社区8| 欧美一级毛片孕妇| 91字幕亚洲| 黄片大片在线免费观看| 亚洲va日本ⅴa欧美va伊人久久| 国产一区二区三区综合在线观看| 老司机福利观看| av线在线观看网站| 国产色视频综合| 下体分泌物呈黄色| 亚洲性夜色夜夜综合| 人人妻人人添人人爽欧美一区卜| 午夜福利欧美成人| 很黄的视频免费| 身体一侧抽搐| 久久天躁狠狠躁夜夜2o2o| 亚洲欧美一区二区三区久久| 亚洲久久久国产精品| 日韩欧美在线二视频 | av福利片在线| 女同久久另类99精品国产91| 免费女性裸体啪啪无遮挡网站| av国产精品久久久久影院| 黄色女人牲交| 大码成人一级视频| 99久久人妻综合| 久9热在线精品视频| 亚洲欧美日韩另类电影网站| 日本a在线网址| 91在线观看av| 19禁男女啪啪无遮挡网站| 欧美精品av麻豆av| 巨乳人妻的诱惑在线观看| 精品一区二区三区四区五区乱码| 国产99白浆流出| 国产黄色免费在线视频| www日本在线高清视频| 黄色视频,在线免费观看| 啦啦啦在线免费观看视频4| a级片在线免费高清观看视频| 婷婷丁香在线五月| videos熟女内射| 热99re8久久精品国产| 999精品在线视频| 亚洲人成电影观看| 97人妻天天添夜夜摸| 亚洲欧美一区二区三区黑人| 在线观看舔阴道视频| 女性生殖器流出的白浆| 高潮久久久久久久久久久不卡| 国产一卡二卡三卡精品| 国产激情久久老熟女| 国产成人系列免费观看| 日本撒尿小便嘘嘘汇集6| 91字幕亚洲| 久久午夜亚洲精品久久| 少妇 在线观看| 亚洲人成77777在线视频| 校园春色视频在线观看| 人人妻,人人澡人人爽秒播| 高清毛片免费观看视频网站 | 国产欧美日韩一区二区精品| 欧美成人午夜精品| 麻豆av在线久日| 精品福利观看| 99国产精品一区二区蜜桃av | 一个人免费在线观看的高清视频| 窝窝影院91人妻| 日本黄色日本黄色录像| 亚洲在线自拍视频| 欧美黄色片欧美黄色片| 成人18禁高潮啪啪吃奶动态图| 国产精品久久久人人做人人爽| 日韩欧美在线二视频 | 久久久久久亚洲精品国产蜜桃av| 亚洲av成人不卡在线观看播放网| 免费在线观看黄色视频的| 悠悠久久av| 欧美人与性动交α欧美精品济南到| 热re99久久精品国产66热6| 超色免费av| 在线观看www视频免费| 嫁个100分男人电影在线观看| 女同久久另类99精品国产91| 丝袜人妻中文字幕| 亚洲精品成人av观看孕妇| 丝袜人妻中文字幕| 一边摸一边做爽爽视频免费| 99riav亚洲国产免费| 午夜两性在线视频| 一区二区三区精品91| 在线观看www视频免费| 欧美乱妇无乱码| 黄色 视频免费看| 久久香蕉激情| 久久久久久人人人人人| 女警被强在线播放| 大型黄色视频在线免费观看| 午夜老司机福利片| av天堂在线播放| 在线av久久热| 国产成人系列免费观看| 精品午夜福利视频在线观看一区| 欧美在线黄色| 夫妻午夜视频| 亚洲成人国产一区在线观看|