• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A GLCM-Feature-Based Approach for Reversible Image Transformation

    2019-04-29 03:21:36XianyiChenHaidongZhongandZhifengBao
    Computers Materials&Continua 2019年4期

    Xianyi Chen , Haidong Zhong and Zhifeng Bao

    Abstract: Recently, a reversible image transformation (RIT) technology that transforms a secret image to a freely-selected target image is proposed. It not only can generate a stego-image that looks similar to the target image, but also can recover the secret image without any loss. It also has been proved to be very useful in image content protection and reversible data hiding in encrypted images. However, the standard deviation (SD) is selected as the only feature during the matching of the secret and target image blocks in RIT methods, the matching result is not so good and needs to be further improved since the distributions of SDs of the two images may be not very similar. Therefore, this paper proposes a Gray level co-occurrence matrix (GLCM) based approach for reversible image transformation, in which, an effective feature extraction algorithm is utilized to increase the accuracy of blocks matching for improving the visual quality of transformed image, while the auxiliary information, which is utilized to record the transformation parameters, is not increased. Thus, the visual quality of the stego-image should be improved. Experimental results also show that the root mean square of stego-image can be reduced by 4.24% compared with the previous method.

    Keywords: Image encryption, feature extraction, reversible image transformation,GLCM.

    1 Introduction

    With the development of cloud service, more and more images are outsourced to cloud for storage or processing. However, some private information may be leaked out, such as design drawings and travel photos, and the eavesdropper is easy to steal these contents.

    There are two common ways to protect information from leakages: encryption [Bhatnagar,Wu and Raman (2013); Shan, Chang, Zhong et al. (2012); Shen, Shen, Chen et al. (2017)]and data hiding [Chen, Chen and Wu (2017); Zhou, Wu, Yang et al. (2017); Chan and Cheng (2004); Wu and Wang (2015)], while the former is easy to cause the eavesdropper’s suspicious because of the messy codes of cipher text with the special form, thus the latter-data hiding attracts more and more researchers recent years, and then many algorithms have been proposed. For example, Chan et al. [Chan and Cheng (2004)]applied an optimal pixel adjustment process to the stego-image obtained by the simple LSB substitution method, and the image quality of the stego-image can be greatly improved with low extra computational complexity. Wu et al. [Wu and Wang (2015)]designed a novel steganography approach using a reversible texture synthesis and weave the texture synthesis process to conceal secret messages. However, although these methods have high concealment, most of them are hardly to achieve a large payload(more than 1 bit per pixel).

    In order to improve hiding capacity, Lee et al. [Lee and Tsai (2014)] proposed a new secure image transmission technique, which transforms automatically a given large-volume secret image into a so-called secret-fragment-visible mosaic image with the same size. It has a great hidden capacity and high concealment. Based on Lee et al.’s method, Hou et al. [Hou, Zhang, and Yu (2016)] designed a reversible image transformation (RIT) method, in which the secret image and target image are divided into N blocks with the same manner firstly, and then the block features of the two group blocks are extracted. Therefore, the selection of the block feature is very important for improving the performance of the image transformation.

    In Lee et al.’s method and Hou et al.’s method, the standard deviation (SD) is selected as the only feature during the block matching and the visual quality of transformed image is not so good. Thus, the accuracy of blocks matching should be increased by choosing more image feature descriptors for improving the visual quality of transformed image,such as the GLCM descriptors [Haralick, Shanmugam and Dinstein (1973); Ulaby,Kouyate, Brisco et al. (1986)].

    In our proposed method, we choose GLCM descriptor as the image block feature because it can concentrate in a small range close to zero and the frequency fast drops with the increasing of the feature value. Moreover, it can enhance the accuracy of block matching and improve the visual quality of transformed image, while the amount of the auxiliary information is unchanged. So, the visual quality of stego-image can be improved. Thus,the main contribution of the proposed method is that we have proved that the existing feature such as GLCM descriptor can improve the visual quality of transformed image and stego-image.

    The rest of this paper is arranged as follows. In section 2, the related work is described. In section 3, the framework of the proposed method is introduced and detailed steps about feature extraction for block matching, reversible shift and rotate transformation and secret image extraction are expressed. Section 4 displays the performance of the proposed method through the experimental results and Section 5 concludes.

    2 Related work

    In order to protect the outsourced image and secret information, many reversible data hiding in encrypted images (RDH-EI) methods have been proposed to encrypt the outsourced image and embed secret information into the encrypted image. The existing RDH-EI methods can be grouped into three categories: vacate room after encryption(VRAE) methods [Zhang (2011); Hong, Chen, and Wu (2012)], reserving room before encryption (RRBE) methods [Ma, Zhang, Zhao et al. (2013); Cao, Du, Wei et al. (2016)]and RIT methods [Zhang, Wang, Hou et al. (2016)].

    Zhang [Zhang (2011)] proposed the framework of “VRAE”, in which, the data hider divides the encrypted image blocks into two sets firstly, then embed secret bits by flipping three LSBs of a set. To decrease the extracted-bits error rate, Hong et al. [Hong, Chen, and Wu (2012)] evaluated the complexity of image block respectively. However, the “VRAE”methods used by the cloud server should be specified together with the receiver.

    Ma et al. [Ma, Zhang, Zhao et al. (2013)] designed the framework of “RRBE”, in which the image owner can reverse the room of LSBs by using an RDH method and encrypt the self-embedded image, then the cloud sever embeds secret data into the reversed LSBs of encrypted image. Cao et al. [Cao, Du, Wei et al. (2016)] compressed pixels in the local patch by sparse representation and achieve a higher reversed room than other previous methods. The complexity of this framework is determined by the sender who should reserve room for RDH by exploiting the redundancy within the image, and thus the RDH method used by the cloud sever should be specified with the sender.

    Therefore, the framework of “VRAE” cannot ensure that the encrypted image after data extraction can decrypt and obtain the original image in the receiver, and the framework of“RRBE” need the sender undertake the algorithm complexity since the original image in the sender should be compressed and reversed room for data hiding. In other words, the RDH method used by cloud sever in the two frameworks is receiver-related or sender-related. However, the cloud sever may be semi honest and should not know the encryption or decryption methods which is concerned with the sender and receiver in the public cloud environment. Therefore, data embedding in the cloud sever should be not have effect on the encryption and decryption method. In other words, the cloud sever can utilize arbitrary classic RDH methods to embed secret information into encrypted image which is similar to other image, and the framework is independence of the receiver-related or sender-related frameworks. How to transform reversibly the original image to the encrypted image which is similar to other image is a more challenging problem, which is called “reversible image transform” (RIT).

    The RIT method was designed for image privacy protection because the secret information is just the image itself. Although the method of Yang et al. [Yang, Ouyang, and Harn(2012)] can be used for “secret sharing” by embedding an image into several other images,the transmission and storage of multiple images cause the practicability to be low.Therefore, it is very challenging and important to hide one image into other one with the same size, which is called “image transformation”. The first image transformation technology is proposed by Lai et al. [Lai, and Tsai (2011)], they chosed a target image similar to the secret image in an image database, and transformed each secret block to generate the final stego-image by the map between secret blocks and target blocks, then embedded the map. Lai et al.’s method is reversible, but the visual quality of stego-image is not good because the auxiliary information is very large, and it needs more time to choose a target image in a database. Lee et al. [Lee and Tsai (2014)] improve Lai et al.’s method by transforming a secret image to a freely-selected target image and reduce the auxiliary information. However, the method only reconstructs a good estimation of secret image because traditional color transformation method is not reversible.

    In order to overcome the shortcomings of Lai et al.’s and Lee et al.’s methods, Hou et al.[Hou, Zhang, and Yu (2016)] presented a novel RIT method, in which, they transform a secret image to a freely-selected target image and obtain a stego-image similar to the target image by designing a reversible shift transformation. Before shifting image blocks,an effective clustering algorithm is used to match secret and target blocks, which not only can improve the visual quality of transformed image, but also can reduce the auxiliary information for recording block indexes. In this method, image block is paired by similar means and standard deviations (SDs) between the original and target images. Let a block B be a set of pixels such that B={p1,p2,…,pn}, and then the mean value and SD can be calculated as follows:

    As shown in Fig. 1, by RIT, the secret image can be transformed to an image similar to the target image. In previous methods, the transformed image is utilized to embed the auxiliary information with reversibility and RDH realizes that the stego-image can be returned into the transformed image completely. In addition, RIT achieves the transformed image that can be restored to the secret image without error, and secret image can not be recovered only by target image.

    Figure 1: Reversible image transformation

    Inspired by the RIT method, Zhang et al. [Zhang, Wang, Hou et al. (2016)] transform the original image into the encrypted image which looks like the target image and propose the RDH-EI framework based on RIT. Since the correlation of transformed image are not destructed, the cloud sever can embed secret bits by a traditional RDH method. The RDH method used by the cloud sever is not affected by the encryption and decryption algorithm, and thus it is irrelevant with neither the sender nor receiver. Therefore, it is a very meaningful work to improve the visual quality of transformed image and stego-image in RIT method which is used to encrypt the original image.

    3 Proposed method

    In this section, the proposed method will be described with three steps: (1) Feature extraction for block matching; (2) Reversible shift and rotate transformation; (3) Secret image extraction. The detail is introduced in Fig. 2.

    To hide the secret image, a data hider firstly calculates each image block feature and utilizes K-means clustering algorithm to divide image blocks into K classes, then moves each secret block to match the corresponding target block. After that, each pixel in secret blocks are added to the quantified difference, which is between the secret and matched target blocks, for having a similar mean with the matched target blocks. Then the overflow/underflow pixels are truncated and each block is rotated to the optimal angle for minimizing the root of mean square error (RMSE) between the rotated and the matched target blocks.

    In RIT method, the auxiliary information contains class index, quantified difference,small overflow/underflow information and rotation angle, which also need to be recorded and embedded into the transformed image by RDH method. On the receiver side, after obtaining the auxiliary information, the receiver can use the auxiliary information to rotate each block to anti-angle, restore overflow/underflow pixels, remove quantified difference and recover positions of each secret image block. Finally, the secret image can be recovered completely.

    Figure 2: System framework of the proposed method

    3.1 Feature extraction

    In Haralick et al.’s method [Haralick, Shanmugam, and Dinstein (1973)], 13 textural features can be derived from the normalized GLCM. These features measure different aspects of the GLCM, but many are correlated. Thus, Ulaby et al. [Ulaby, Kouyate,Brisco et al. (1986)] prove that energy, entropy, contrast and relevance are not correlated,which not only have a high precision of texture complexity, but also can reduce the computational burden.

    To improve the visual quality of transformed image, the proposed method chooses these GLCM descriptors as image blocks features because it can concentrate in a small range close to zero and the frequency fast drops with the increasing of the feature value.

    Suppose the distance of image pixels is d={dx,dy}, the direction is θ={0°,45°,90°,135°}, and thus d belongs to the rectangle region{(0,d),(d,d),(d,0),(-d,d)}, GLCM also can be denoted as g(i,j,d,θ). The main characteristic parameters are described as follow.

    (1) Energy. Energy E1is used to describe the distribution of image blocks uniformity and the coarse grain size of the texture, and E1can be calculated by

    where L is the number of rows or columns of GLCM, (i,j) is pixel coordinate, and d(d>0) is a distance in the corresponding direction.

    (2) Entropy. Entropy H1is utilized to measure the amount of information contained in an image. If the image texture is complex, the entropy value is correspondingly large. H1can be represented by

    (3) Contrast. Contrast C1is used to describe the clarity and texture depth of an image.When an image has a clear and deep texture, the contrast of the image will be correspondingly large, and C1can be calculated by

    (4) Relevance. Relevance R1is an index to measure the degree of similarity in the row(column) of GLCM. The high or low R1is positively related to the local gray correlation of the image. R1can be calculated by

    where μ1and μ2are mean values in the row(column) of GLCM, σ1and σ2are SD values. Note that E1, H1, C1and R1are texture feature parameters in one direction.

    However, the texture feature parameters in four directions are not different. The mean square error (MSE) can be assigned weights of texture feature parameters in four directions, and it can restrain the orientation vector and make the obtained texture features independent of direction. Thus, the complexity of sub block texture can be more accurately calculated. Taking energy feature parameter as an example, the energy values in four directions are E1, E2, E3and E4, then denote

    where MSEiis the mean square error of four directions, w1, w2, w3and w4are the weights of the characteristic parameter assigned to four directions, respectively. And the assigned weights of entropy H, contrast C and relevance R also can be calculated as the formal (7-10). Finally, the complexity of each image block can be represented by

    where f is the complexity of image blocks, φ1, φ2, φ3and φ4are the weight assigned to four main feature parameters, which can be calculated as the formulas (7-9).

    3.2 Block matching

    After replacing the SD with f, a suitable block pairing should be selected. In Lee et al.’s method, the secret and target blocks are sorted in ascending order according to their SDs,respectively, and then each secret tile is paired up with a corresponding target block in turn according to the order. To restore the secret image from the transformed image, the positions of the secret tiles must be recorded and embedded into the transformed image with a reversible method, thus 「NlogN」 bits are needed for recording the block indexes.However, it will decrease the visual quality of stego-image when the number of image blocks is large or block size is small.

    In the proposed method, the blocks with close fs are deemed as one class since most of fs are similar. The secret block should be transformed to the target block in the same class.

    (1) Cluster all fs of secret blocks into K classes by a traditional clustering method such as K-means, and sort the K classes to ensure that the fs in the it? class is smaller than in the jth class when 1<i<j≤K.

    (2) Classify the target blocks by the classes’ volumes of secret image, the scanning order,and each target class has the same volume with the corresponding class of the secret image. Let the αt? secret image class contains nαblocks, where 1 ≤ α ≤ K. The first n1target blocks, with the smallest fs, are divided into the first class, the second n2target blocks, with second-smallest fs, are divided into the second class, and so on, until all of target blocks are divided.

    (3) Distribute a compound index αβto each block, where αβis the βt? block of the αth class and 1 ≤ β ≤ nα. Then the αβt? secret blocks should be replaced to αβt?target blocks, and the transformed image is generated.

    A simple example of block matching is shown in Fig. 3. The secret tiles are divided into three classes here: (1) fs{0,1,2,3} belongs to the class 1, it is labeled as “white”; (2)fs{4,5,6} belongs to the class 2, labeled as “gray”; (3) fs{7,8,9} belongs to class 3,labeled as “black”. The compound index for each block can be defined by scanning fs classes in the raster order. For instance, the second secret block is thefirst one of SD class 1 that is assigned as 11, and the seven block is the second one of SD class 1 that is assigned as 12. After that, the target blocks can be classified according to the class of secret blocks, and the one-to-one map between secret blocks and target blocks will be created. Then the αβt? secret blocks should be transformed to αβt? target blocks and replace them. Finally, the transformed image is generated and the class index A is recorded as auxiliary information for recover the position of secret image blocks.

    Figure 3: An example of block matching

    3.3 Reversible shift and rotate transformation

    After block matching, the transformed image blocks should be shifted and rotated for being similar as the target image. Let the matched block C is a set of pixels C={p1,p2,…,pn} with mean value uC, and the target block B is a set of pixels B={p1′,p2′,… ,pn′} with mean uB, then the matched block C={p1′′,p2′,… ,pn′} can be generated.

    To keep the transformation reversible, the amplitude uB-uCshould be rounded to be an integer.

    To solve the overflow/underflow problem, Δu should be modified as follow. Denote the maximum overflow pixel value as OVmaxfor u≥0 and the minimum underflow value is UNminfor u<0, T is a parameter to control a balance between the number of overflow and underflow and the distance from the mean value of target image. When Δu≥0:

    To reduce the amount of auxiliary information, Δu should be quantized to a little integer.

    where the quantization step λ must be an even parameter and floor(?) is ceiling function. Then Δu′=2|Δu|/λ should be recorded as the final auxiliary information,which is embedded into the transformed image, and λ is a parameter to make a trade-off between the amount of auxiliary information and the distance from the mean value of target image. Thus, the matched block C={p1′′,p2′,… ,pn′} can be shifted as follows.

    Although modifying the amplitude uB-uCto Δu, the overflow/underflow problem may still occur. To deal with the problem, the pixels less than 0 are truncated to be 0, and the pixels more than 255 are truncated to be 255, then a location map LM=(lm1,lm2,…,lmn) can be generated to record the position of overflow/underflow pixels.

    The LM can be compressed well because, it is very small. To further maintain the similarity between the transformed image and target image as much as possible, the shifted block C can be rotated into one of the four angles 0°, 90°, 180°or 270°. The best angle ??{0°,90°,180°,270°} is selected for minimizing the root of mean square error (MSE) between the rotated block and the target block.

    Now, the transformed image is generated, and the auxiliary information containing the class index of secret image, quantified difference Δu′, small overflow/underflow information LM and rotation angle ?, which also can be embedded into transformed image by the arbitrary traditional RDH methods. Before embedding, the auxiliary information should be compressed by the classic method such as Huffman code for reducing the amount and should be encrypted by the traditional way such as AES encryption for security.

    3.4 Secret image extraction

    Image recovery is the opposite process of the image hiding. The transformed image and embedded auxiliary information firstly can be recovered by the RDH method, and the information can be decrypted and decompressed. The transformed image is divided into non-overlapping N blocks, and each block is rotated in the anti-direction of ?.

    After that, by quantified difference Δu′=2|Δu|/λ, if Δu′is an even number, then Δu ≥ 0 and Δu can be restored by Δu= λ ?Δu′/2; if Δu′is an odd number, then Δu < 0 and Δu can be restored by Δu=-λ?Δu′/2. Then each pixels of rotated blocks can remove Δu. Finally, the removed blocks can be re-assigned to the position of matched blocks in secret image by the class index of the secret image, and the secret image can be recovered.

    4 Experimental Results

    4.1 Parameter setting for the proposed method

    In the proposed method, we adopt the Huffman code to reduce the auxiliary information,and use the RDH method in Sachnev et al. [Sachnev, Kim, Nam et al. (2009)] to embed the compressed information. For security reason, the compressed information should be encrypted before embedding, and Fig. 4 is an example that reflects security of the algorithm. Fig. 4(a) is the secret image, Fig. 4(c) is the stego-image, which is similar to the target image Fig. 4(b). If the eavesdropper has a wrong key, the messy image Fig. 4(d)will be achieved. Thus, only the receiver with correct key can restore the secret image.

    Figure 4: An example that reflects security (a) Secret image. (b) Target image. (c)Stego-image. (d) Recovered image (wrong key). (d) Recovered image (correct key)

    The experiments are carried with MATLAB-R2014a. The test machine is Asus PC with 4200 CPU @2.80GHz and 8.00 GB RAM. The test images shown in the experiments are listed, which are in the PNG format adopted by many cameras or computer equipments.In this subsection, four typical combinations of secret and target images in Fig. 5 are applied to discuss how to properly set parameters on the proposed method.

    Figure 5: Four typical combinations of secret and target images

    Table 1: The results for setting parameter λ, K and T

    The secret and target images can be divided into the same number of 4×4 blocks. To match these two blocks, the GCML feature and clustering method is utilized to classify the blocks as K classes. To solve the overflow/underflow problem, T is set as a parameter to control the balance between the number of overflow and underflow and mean’s bias of target image. To reduce the amount of auxiliary information, λ also is set as a parameter to make a trade-off between the amount of auxiliary information and the mean’s bias of target image. The auxiliary information (AI) and the root of mean square error (RMSE) of the transformed image with different parameter λ, K and T for four examples are shown in Tab. 1.

    Fig. 6 can express the average payload and RMSE change with parameter λ, K and T more intuitively. In formula (16), the parameter λ is used to reduce the amount of auxiliary information but it results in the mean’s bias of target image blocks. To choose an appropriate λ, we maintain the parameter K, T such as K=10, T=6 and change the λ. In Fig. 6(a1) and Fig. 6(b1), when λ is larger than 8, the average RMSE of the created transformed image will increase rapidly but the average payload increases slowly.Thus, λ=8 is an appropriate value.

    Figure 6: The average payload and RMSE change with different parameters λ, K and T

    As mentioned in Section 2.1.1, the parameter K is used to classify the images blocks into K classes. To choose an appropriate K, we maintain the parameter λ, T such as λ =8, T=6 and change the value of λ. In Fig. 6(a2) and Fig. 6(b2), when K is larger than 10, the average RMSE of the created transformed image will decrease slowly but the average payload is increased slowly. Thus, K=10 is an appropriate value.

    In formula (14-15), the parameter T is utilized to reduce the amplitude of the mean’s bias. To choose an appropriate T, we maintain the parameter K, λ such as K=10,λ=8 and change the value of T. In Fig. 6(a3) and Fig. 6(b3), when T is larger than 8,the average RMSE of the created transformed image will increase rapidly but the average payload increases slowly. Thus, T=10 is an appropriate value.

    4.2 Comparison with previous methods

    4.2.1 Performance comparison

    To compare the performance, the same compression method by Huffman coding is used to compressed the auxiliary information, and same RDH scheme proposed in Sachnev et al. [Sachnev, Kim, Nam et al. (2009)] are utilized to embed the compressed information into the transformed image for the proposed method and Hou et al.’s method. The root means square error (RMSE) and the auxiliary information (AI) are the main performance indexes to appraise the similarity between transformed and target images. The block size 4 × 4 usually performs best for Hou et al.’s method. Tab. 2 shows the RMSE and AI of the transformed image and stego-image with different block sizes for Example 4. And we can find that the block size 4×4 also performs best for Example 4.

    From Fig. 7 and Tab. 3, we can see that the visual quality of transformed image and stego-image of the proposed method outperformed that generated by Hou et al.’s method.The root of mean square of stego-image can be reduced by 4.24% compared with the previous method and the AI approximately equals to Hou et al.’s method. The reason is that an effective feature extraction algorithm of each block is utilized to increase the accuracy of blocks matching for improving the visual quality of transformed image, and the amount of the auxiliary information for recording transformation parameters is unchanged.

    Table 2: The results with different block sizes.

    Table 3: Performance comparison with Hou et al.’s method

    Figure 7: (a) Secret image. (b) Target image. (c) Transformed image by Hou et al.’s method. (d) Stego-image by Hou et al.’s method. e) Transformed image by the proposed method. (f) Stego-image by the proposed method

    4.2.2 Feature comparison

    In addition to performance comparison, features comparison from reversibility, high capacity, image expansion and strong anti-detection ability are shown in Tab. 4. The proposed method is reversible, but the recovered image is similar to the secret image in Zhou et al.’s method and Lee et al.’s method. Although Wu et al.’s method is reversible,it can not ensure a relatively large payload (more than 1 bit per pixel). But the proposed method can achieve it. Compared with Lai et al.’s method, the stego-image in the proposed method is not expanded and has the same size with secret image. Moreover, the proposed method can resist detection of strong steganalysis because it is hard to recover secret image only by the stego-image which looks like the freely-selected target image.

    Table 4: Features comparison with previous methods

    5 Conclusion

    In this paper, we proposed a GLCM-feature-based approach for reversible image transformation. Effective feature extraction algorithm of each block is utilized to increase the accuracy of block matching for improving the visual quality of transformed image,and the amount of accessorial information for recording transformation parameters is unchanged. Thus, the visual quality of stego-image should be improved, and the root mean square of stego-image can be reduced by 4.24% compared with the previous method. In future work, we may further improve the visual quality of stego-image from two aspects. On the one hand, the amount of accessorial information such as quantified mean difference should be reduced, or a novel RDH method is designed to reduce the loss of transformed image caused by the accessorial information. On the other hand, more block’s feature should be chosen to improve the visual quality of transformed image, and thus improve the visual quality of stego-image.

    Acknowledgement:This work is supported by the National Key R&D Program of China under grant 2018YFB1003205; by the National Natural Science Foundation of China under grant 61502242, U1536206, U1405254, 61772283, 61602253, 61672294; by the Jiangsu Basic Research Programs-Natural Science Foundation under grant numbers BK20150925 and BK20151530; by the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD) fund; by the Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET) fund, China.

    性欧美人与动物交配| 黄色a级毛片大全视频| 亚洲一区二区三区不卡视频| 国语自产精品视频在线第100页| 久久国产乱子伦精品免费另类| 亚洲熟妇熟女久久| 天天添夜夜摸| 在线观看日韩欧美| 丁香六月欧美| 亚洲成人久久性| 99热只有精品国产| 欧美色视频一区免费| 91麻豆av在线| 老熟妇乱子伦视频在线观看| 国产欧美日韩一区二区三| 国产成人精品无人区| 精品无人区乱码1区二区| 欧美最黄视频在线播放免费| 大型黄色视频在线免费观看| 国产欧美日韩精品亚洲av| 又大又爽又粗| 国产成人av激情在线播放| 精品不卡国产一区二区三区| 99热只有精品国产| 久久久国产成人免费| 成人18禁高潮啪啪吃奶动态图| 曰老女人黄片| 国产精品香港三级国产av潘金莲| av视频在线观看入口| bbb黄色大片| 淫妇啪啪啪对白视频| 亚洲欧美激情在线| 一二三四社区在线视频社区8| 嫁个100分男人电影在线观看| 丰满人妻熟妇乱又伦精品不卡| 欧美激情久久久久久爽电影 | 母亲3免费完整高清在线观看| 性欧美人与动物交配| 香蕉久久夜色| av在线播放免费不卡| 久久精品国产亚洲av高清一级| 十分钟在线观看高清视频www| 亚洲国产日韩欧美精品在线观看 | 97碰自拍视频| 国产精品久久久久久精品电影 | 亚洲一码二码三码区别大吗| 美女扒开内裤让男人捅视频| 亚洲欧美日韩另类电影网站| 亚洲第一青青草原| 极品教师在线免费播放| av视频在线观看入口| 嫁个100分男人电影在线观看| 国内精品久久久久久久电影| 午夜免费鲁丝| 在线国产一区二区在线| 搞女人的毛片| 妹子高潮喷水视频| av视频免费观看在线观看| 国产一区二区在线av高清观看| 俄罗斯特黄特色一大片| 大陆偷拍与自拍| 欧美黑人欧美精品刺激| 国产又色又爽无遮挡免费看| 久久中文看片网| 久久久久久久午夜电影| 一个人观看的视频www高清免费观看 | 国产av一区在线观看免费| 又黄又粗又硬又大视频| 婷婷六月久久综合丁香| 一个人观看的视频www高清免费观看 | 亚洲中文字幕日韩| 99在线人妻在线中文字幕| tocl精华| 精品国产国语对白av| 精品人妻1区二区| 大陆偷拍与自拍| 欧美黄色淫秽网站| 一级a爱视频在线免费观看| 少妇被粗大的猛进出69影院| 亚洲人成电影观看| 啦啦啦韩国在线观看视频| 国产高清视频在线播放一区| 久久中文字幕一级| 国产精品 欧美亚洲| 亚洲五月色婷婷综合| 精品乱码久久久久久99久播| 美女 人体艺术 gogo| 午夜日韩欧美国产| 国产又色又爽无遮挡免费看| 一级,二级,三级黄色视频| 级片在线观看| 国产欧美日韩一区二区三区在线| 精品国产乱码久久久久久男人| 国产97色在线日韩免费| 欧美乱码精品一区二区三区| 免费av毛片视频| 中亚洲国语对白在线视频| 国产精品永久免费网站| 精品国产亚洲在线| 久久中文字幕一级| 久久午夜综合久久蜜桃| 日韩欧美国产一区二区入口| 69av精品久久久久久| 精品久久久久久成人av| 成人特级黄色片久久久久久久| 少妇被粗大的猛进出69影院| 国产国语露脸激情在线看| 91在线观看av| 少妇被粗大的猛进出69影院| 国产麻豆成人av免费视频| 国产亚洲精品综合一区在线观看 | 老司机靠b影院| 亚洲精品粉嫩美女一区| 欧美色欧美亚洲另类二区 | 禁无遮挡网站| 国产熟女xx| 久久国产精品男人的天堂亚洲| 久久久久久久久久久久大奶| 丁香六月欧美| 97人妻精品一区二区三区麻豆 | 99精品久久久久人妻精品| 久久精品国产综合久久久| 国产男靠女视频免费网站| 亚洲激情在线av| 99久久精品国产亚洲精品| 国产精品秋霞免费鲁丝片| 欧美国产日韩亚洲一区| 我的亚洲天堂| 91老司机精品| 无限看片的www在线观看| 亚洲国产高清在线一区二区三 | 午夜两性在线视频| 午夜福利欧美成人| 大陆偷拍与自拍| 午夜福利成人在线免费观看| ponron亚洲| 久久中文字幕人妻熟女| 亚洲天堂国产精品一区在线| 人人妻人人澡欧美一区二区 | 亚洲免费av在线视频| 久久精品人人爽人人爽视色| 色播亚洲综合网| www国产在线视频色| av电影中文网址| 亚洲国产毛片av蜜桃av| 极品教师在线免费播放| 国产单亲对白刺激| 91在线观看av| 精品人妻1区二区| 一个人免费在线观看的高清视频| 国产亚洲欧美98| 久久 成人 亚洲| 亚洲伊人色综图| 精品国产乱码久久久久久男人| 国产精品亚洲av一区麻豆| 人人澡人人妻人| 午夜福利高清视频| 19禁男女啪啪无遮挡网站| 制服诱惑二区| 天堂影院成人在线观看| 丝袜美足系列| 女同久久另类99精品国产91| 亚洲欧美日韩无卡精品| 久久久久久久午夜电影| 久久香蕉激情| 9色porny在线观看| 成年版毛片免费区| 久久国产乱子伦精品免费另类| 久久久久久国产a免费观看| 非洲黑人性xxxx精品又粗又长| 中文字幕高清在线视频| 在线观看www视频免费| 欧美日本中文国产一区发布| 桃红色精品国产亚洲av| 国产精品一区二区在线不卡| 在线十欧美十亚洲十日本专区| 美女午夜性视频免费| 中亚洲国语对白在线视频| 免费久久久久久久精品成人欧美视频| 国产精品98久久久久久宅男小说| 国产91精品成人一区二区三区| 99riav亚洲国产免费| 丰满人妻熟妇乱又伦精品不卡| 亚洲五月色婷婷综合| 99热只有精品国产| 后天国语完整版免费观看| 欧美最黄视频在线播放免费| 午夜精品国产一区二区电影| 久久久久久久午夜电影| 欧美成狂野欧美在线观看| 国产成人av激情在线播放| 亚洲成人免费电影在线观看| 他把我摸到了高潮在线观看| 国产成人精品在线电影| 老司机午夜十八禁免费视频| 男男h啪啪无遮挡| 亚洲自拍偷在线| 日韩欧美免费精品| 久久久久久亚洲精品国产蜜桃av| 又黄又爽又免费观看的视频| 欧美黑人精品巨大| 久久亚洲真实| 国产亚洲欧美精品永久| 又黄又爽又免费观看的视频| 国产精品免费一区二区三区在线| 欧美成狂野欧美在线观看| 亚洲精品av麻豆狂野| 999久久久国产精品视频| 久久久久久国产a免费观看| 日本vs欧美在线观看视频| 久久 成人 亚洲| 欧美日韩黄片免| 亚洲精品粉嫩美女一区| 首页视频小说图片口味搜索| 午夜激情av网站| 欧美激情 高清一区二区三区| 欧美人与性动交α欧美精品济南到| 淫妇啪啪啪对白视频| 妹子高潮喷水视频| 99在线人妻在线中文字幕| 亚洲人成电影观看| 色综合欧美亚洲国产小说| 在线观看舔阴道视频| 国产av在哪里看| 大型av网站在线播放| 国内久久婷婷六月综合欲色啪| 国产99白浆流出| 成人免费观看视频高清| 日本vs欧美在线观看视频| 香蕉久久夜色| av欧美777| 母亲3免费完整高清在线观看| aaaaa片日本免费| 韩国av一区二区三区四区| 日韩免费av在线播放| 黑丝袜美女国产一区| 老司机福利观看| 亚洲专区国产一区二区| 在线天堂中文资源库| 久久久精品国产亚洲av高清涩受| 韩国av一区二区三区四区| 亚洲第一av免费看| 亚洲黑人精品在线| 国产精品一区二区在线不卡| 久久久久久人人人人人| 淫秽高清视频在线观看| av片东京热男人的天堂| 无限看片的www在线观看| 无遮挡黄片免费观看| 90打野战视频偷拍视频| 精品欧美一区二区三区在线| 侵犯人妻中文字幕一二三四区| 国产一区二区三区综合在线观看| 午夜精品久久久久久毛片777| 黄色视频不卡| 午夜老司机福利片| 精品高清国产在线一区| www.自偷自拍.com| 免费高清在线观看日韩| 99香蕉大伊视频| 亚洲精品av麻豆狂野| 亚洲精品在线观看二区| 性色av乱码一区二区三区2| 日本在线视频免费播放| 黄片大片在线免费观看| 日本三级黄在线观看| 精品少妇一区二区三区视频日本电影| 亚洲精品久久成人aⅴ小说| 午夜亚洲福利在线播放| 色尼玛亚洲综合影院| 久久婷婷成人综合色麻豆| 国产一区二区激情短视频| 热99re8久久精品国产| 日日夜夜操网爽| 亚洲国产高清在线一区二区三 | 久久久国产成人精品二区| 色老头精品视频在线观看| 日韩欧美一区二区三区在线观看| 男人的好看免费观看在线视频 | 亚洲国产精品久久男人天堂| 色在线成人网| 久久这里只有精品19| 亚洲一区二区三区色噜噜| 中亚洲国语对白在线视频| 一本大道久久a久久精品| 亚洲av成人av| 欧美一级a爱片免费观看看 | avwww免费| 国产97色在线日韩免费| av中文乱码字幕在线| 欧美色视频一区免费| 国产精品1区2区在线观看.| 久久人妻熟女aⅴ| 精品高清国产在线一区| 国产欧美日韩精品亚洲av| 级片在线观看| 国产精品久久久人人做人人爽| 久久草成人影院| 亚洲精品国产区一区二| 国产欧美日韩精品亚洲av| 亚洲一区二区三区色噜噜| 欧美av亚洲av综合av国产av| 日日干狠狠操夜夜爽| www.熟女人妻精品国产| 国产99白浆流出| 久久香蕉国产精品| 国产成人一区二区三区免费视频网站| 看免费av毛片| 18禁观看日本| а√天堂www在线а√下载| 国产人伦9x9x在线观看| 老熟妇仑乱视频hdxx| 中文字幕另类日韩欧美亚洲嫩草| 日本在线视频免费播放| 免费看a级黄色片| 国产国语露脸激情在线看| 黄色 视频免费看| 午夜免费激情av| 成人国产综合亚洲| 亚洲欧美一区二区三区黑人| 不卡av一区二区三区| 免费高清在线观看日韩| 男男h啪啪无遮挡| 啦啦啦 在线观看视频| 人人澡人人妻人| 欧美老熟妇乱子伦牲交| svipshipincom国产片| 一a级毛片在线观看| 中文字幕色久视频| 一级a爱片免费观看的视频| 亚洲欧美激情综合另类| 国产精品影院久久| 国产亚洲欧美98| 人人妻,人人澡人人爽秒播| 操出白浆在线播放| 亚洲av成人不卡在线观看播放网| 国产麻豆69| 老熟妇仑乱视频hdxx| 真人一进一出gif抽搐免费| 国产精品亚洲一级av第二区| 黄片大片在线免费观看| 妹子高潮喷水视频| 国产熟女午夜一区二区三区| 大型黄色视频在线免费观看| 18禁黄网站禁片午夜丰满| 国产精品综合久久久久久久免费 | 丁香六月欧美| 亚洲av日韩精品久久久久久密| 成人欧美大片| 午夜福利免费观看在线| 麻豆一二三区av精品| 国产一区二区激情短视频| 欧美最黄视频在线播放免费| 久久久久久久午夜电影| 久久精品国产综合久久久| 久久久精品欧美日韩精品| 亚洲国产欧美网| 亚洲无线在线观看| 男男h啪啪无遮挡| 久久精品人人爽人人爽视色| 男男h啪啪无遮挡| 亚洲无线在线观看| 国产伦一二天堂av在线观看| 日本a在线网址| 中文字幕精品免费在线观看视频| 高清黄色对白视频在线免费看| 天天一区二区日本电影三级 | 亚洲成人免费电影在线观看| 国产av又大| 麻豆久久精品国产亚洲av| 波多野结衣一区麻豆| 国产视频一区二区在线看| 午夜免费激情av| 激情视频va一区二区三区| 大香蕉久久成人网| 亚洲自偷自拍图片 自拍| 88av欧美| 精品一品国产午夜福利视频| 在线av久久热| 成人18禁在线播放| 亚洲七黄色美女视频| 免费搜索国产男女视频| 老司机午夜福利在线观看视频| 国产激情欧美一区二区| 国产视频一区二区在线看| 欧美在线黄色| 欧美在线一区亚洲| 99久久国产精品久久久| 91九色精品人成在线观看| 国产精品久久久av美女十八| 国产精品综合久久久久久久免费 | 中文亚洲av片在线观看爽| 国产又色又爽无遮挡免费看| 国产视频一区二区在线看| 美女大奶头视频| 高清黄色对白视频在线免费看| 婷婷丁香在线五月| 老司机在亚洲福利影院| 中文字幕人成人乱码亚洲影| 母亲3免费完整高清在线观看| 人妻久久中文字幕网| 黄网站色视频无遮挡免费观看| 亚洲久久久国产精品| 无人区码免费观看不卡| 一边摸一边抽搐一进一出视频| 国产欧美日韩一区二区三| 一本久久中文字幕| 黄色丝袜av网址大全| 久久精品91蜜桃| 19禁男女啪啪无遮挡网站| 日韩有码中文字幕| 国产亚洲精品综合一区在线观看 | 99国产综合亚洲精品| 国产单亲对白刺激| 亚洲最大成人中文| 色综合欧美亚洲国产小说| 99国产精品一区二区三区| 色综合亚洲欧美另类图片| 麻豆国产av国片精品| 国产亚洲精品一区二区www| 亚洲欧美日韩无卡精品| 欧美激情高清一区二区三区| 国产激情久久老熟女| 黄网站色视频无遮挡免费观看| 久久久水蜜桃国产精品网| 久99久视频精品免费| 韩国av一区二区三区四区| 少妇被粗大的猛进出69影院| 大香蕉久久成人网| 国产精品一区二区免费欧美| 一区二区三区高清视频在线| 国产成人精品在线电影| 亚洲第一欧美日韩一区二区三区| 亚洲中文日韩欧美视频| 丁香欧美五月| 桃红色精品国产亚洲av| 夜夜躁狠狠躁天天躁| 欧美+亚洲+日韩+国产| 久久久国产精品麻豆| 中出人妻视频一区二区| 手机成人av网站| 亚洲精品美女久久久久99蜜臀| 99久久国产精品久久久| 国产精品乱码一区二三区的特点 | 性少妇av在线| 久久久久久久久中文| 啦啦啦免费观看视频1| 18禁裸乳无遮挡免费网站照片 | 午夜免费激情av| 黄色毛片三级朝国网站| 亚洲国产精品sss在线观看| 国产欧美日韩一区二区三区在线| 深夜精品福利| 午夜久久久在线观看| 久久人人精品亚洲av| 亚洲色图 男人天堂 中文字幕| 国产精品乱码一区二三区的特点 | 窝窝影院91人妻| 天堂动漫精品| 伦理电影免费视频| 亚洲欧美日韩无卡精品| 热99re8久久精品国产| 亚洲成人免费电影在线观看| 国产伦人伦偷精品视频| 热re99久久国产66热| 人人妻人人爽人人添夜夜欢视频| 色综合欧美亚洲国产小说| 韩国精品一区二区三区| 午夜福利视频1000在线观看 | 亚洲七黄色美女视频| 久久久久久久久中文| 亚洲熟妇中文字幕五十中出| 日韩欧美在线二视频| 美女免费视频网站| 久久这里只有精品19| 色哟哟哟哟哟哟| 18美女黄网站色大片免费观看| 天天一区二区日本电影三级 | 久久久久久久久中文| 欧美激情极品国产一区二区三区| 两个人看的免费小视频| 国产精品久久久久久精品电影 | 国产人伦9x9x在线观看| 国产主播在线观看一区二区| 欧美一级毛片孕妇| 男女午夜视频在线观看| 亚洲一卡2卡3卡4卡5卡精品中文| 亚洲欧美日韩另类电影网站| 男女下面插进去视频免费观看| 欧美日本视频| 久久精品人人爽人人爽视色| 成人欧美大片| 亚洲熟妇熟女久久| 怎么达到女性高潮| 免费在线观看完整版高清| 中文字幕最新亚洲高清| 国产免费av片在线观看野外av| 人妻久久中文字幕网| 女人高潮潮喷娇喘18禁视频| 国产精华一区二区三区| 超碰成人久久| 国产一区二区激情短视频| 久久影院123| 日韩精品免费视频一区二区三区| 精品无人区乱码1区二区| 欧美亚洲日本最大视频资源| 日韩大码丰满熟妇| 变态另类成人亚洲欧美熟女 | 久久久久国产精品人妻aⅴ院| 露出奶头的视频| 脱女人内裤的视频| 国产精品九九99| 精品国内亚洲2022精品成人| 国产欧美日韩精品亚洲av| 看黄色毛片网站| 视频区欧美日本亚洲| 久久久久久久久中文| 黑丝袜美女国产一区| 亚洲av片天天在线观看| 黄色视频,在线免费观看| 国产亚洲精品av在线| 免费高清在线观看日韩| 亚洲自偷自拍图片 自拍| 欧美日韩亚洲综合一区二区三区_| 超碰成人久久| 啪啪无遮挡十八禁网站| 一二三四在线观看免费中文在| 国产成人影院久久av| 精品一区二区三区视频在线观看免费| 亚洲色图 男人天堂 中文字幕| 免费在线观看影片大全网站| 在线观看日韩欧美| 少妇粗大呻吟视频| 国产极品粉嫩免费观看在线| 亚洲 国产 在线| 国产精品秋霞免费鲁丝片| 天天躁夜夜躁狠狠躁躁| 一进一出抽搐动态| 一区二区三区高清视频在线| 成年人黄色毛片网站| 黄色成人免费大全| 视频在线观看一区二区三区| 亚洲色图av天堂| 亚洲七黄色美女视频| 国产午夜精品久久久久久| 久久影院123| 日本精品一区二区三区蜜桃| 亚洲精品国产色婷婷电影| aaaaa片日本免费| 日本免费一区二区三区高清不卡 | 国产精品亚洲一级av第二区| 高清毛片免费观看视频网站| 97人妻天天添夜夜摸| a级毛片在线看网站| 9热在线视频观看99| 日本 欧美在线| 久久国产精品影院| 国产精品久久视频播放| 亚洲五月色婷婷综合| a在线观看视频网站| 精品不卡国产一区二区三区| 母亲3免费完整高清在线观看| 国产乱人伦免费视频| 电影成人av| 麻豆成人av在线观看| 亚洲五月婷婷丁香| 夜夜看夜夜爽夜夜摸| 日韩高清综合在线| 在线观看免费视频日本深夜| 久久精品成人免费网站| 一级a爱视频在线免费观看| 久久久久九九精品影院| 亚洲人成网站在线播放欧美日韩| 麻豆av在线久日| 在线观看免费视频日本深夜| 一区二区三区精品91| 妹子高潮喷水视频| 国产av又大| 日韩欧美国产一区二区入口| 很黄的视频免费| 亚洲自拍偷在线| 亚洲av电影不卡..在线观看| 男人舔女人下体高潮全视频| svipshipincom国产片| 日韩欧美一区二区三区在线观看| 国产aⅴ精品一区二区三区波| 亚洲男人天堂网一区| 高潮久久久久久久久久久不卡| 日韩欧美三级三区| 国产人伦9x9x在线观看| 欧美激情 高清一区二区三区| 黑人欧美特级aaaaaa片| 天堂√8在线中文| 国产99久久九九免费精品| 黑丝袜美女国产一区| 岛国在线观看网站| 久久久久国内视频| 亚洲电影在线观看av| tocl精华| 精品人妻1区二区| 首页视频小说图片口味搜索| 国产男靠女视频免费网站| 国产单亲对白刺激| 色综合亚洲欧美另类图片| 精品一区二区三区av网在线观看| 亚洲精品美女久久av网站| 精品高清国产在线一区| 亚洲九九香蕉| 日韩国内少妇激情av| 日本a在线网址| av免费在线观看网站| 久久九九热精品免费| 成人av一区二区三区在线看| 可以在线观看的亚洲视频| 波多野结衣高清无吗|