• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Robust Zero-Watermarking Based on SIFT-DCT for Medical Images in the Encrypted Domain

    2019-11-07 03:13:00JialingLiuJingbingLiYenweiChenXiangxiZouJierenChengYanlinLiuandUzairAslamBhatti
    Computers Materials&Continua 2019年10期

    Jialing Liu,Jingbing Li,,Yenwei Chen,Xiangxi Zou,Jieren Cheng,Yanlin Liu and Uzair Aslam Bhatti,

    Abstract:Remote medical diagnosis can be realized by using the Internet,but when transmitting medical images of patients through the Internet,personal information of patients may be leaked.Aim at the security of medical information system and the protection of medical images,a novel robust zero-watermarking based on SIFT-DCT(Scale Invariant Feature Transform-Discrete Cosine Transform)for medical images in the encrypted domain is proposed.Firstly,the original medical image is encrypted in transform domain based on Logistic chaotic sequence to enhance the concealment of original medical images.Then,the SIFT-DCT is used to extract the feature sequences of encrypted medical images.Next,zero-watermarking technology is used to ensure that the region of interest of medical images are not changed.Finally,the robust of the algorithm is evaluated by the correlation coefficient between the original watermark and the attacked watermark.A series of attack experiments are carried out on this method,and the results show that the algorithm is not only secure,but also robust to both traditional and geometric attacks,especially in clipping attacks.

    Keywords:Robustness,CT Image,zero-watermarking,SIFT-DCT,encrypted domain.

    1 Introduction

    With the development of science and technology,big data and cloud storage have become a hot topic.Various data processing methods and remote transmission schemes have been proposed.And cloud storage and data processing also have potential advantages in smart healthcare.In case Diagnosis,such as Feature Selection Method Based on Class Discriminative Degree for Intelligent Medical Diagnosis[Fang,Cai,Sun et al.(2018)],a decision support system that can assist Medical staff to diagnose and treat diseases can be established through Feature extraction of Medical images,which can improve efficiency.But it will encounter the information security question in the data transmission.Medical images contain some sensitive information,which may be leaked or tampered with.Digital watermarking technology is a possible information protection system[Guo,Zheng and Huang(2015)],which provides a way to embed unique code in each original image of distributed content.According to the literatures published in recent years,the digital watermarking technology can be grouped into two classes:The watermarking Information is directly embedded into the digital carrier,such as Information hiding in medical images:a robust medical image watermarking system for E-healthcare[Parah,Sheikh,Ahad et al.(2017)].The watermarking is embedded in different areas of the carrier,but the medical image is sensitive,and the selected location is crucial.The other method is blind watermarking[Fazlali,Samavi,Karimi et al.(2017)],which does not need to use the original data and only needs the key to detect.It will not destroy the original medical data and not affect the judgment of doctors.For example,Lang et al.[Lang and Zhang(2014)]have proposed a new blind digital image watermarking algorithm based on fractional Fourier transform(FRFT).In Parah et al.[Parah,Sheikh,Loan et al.(2016)],the authors have proposed a new DCT domain blind watermarking algorithm.These methods associate the watermark with the target image to reduce the damage to the original data.Though the watermark embedding method has been improved,they did not protect the privacy of the original image,which is an important factor for medical images.

    So privacy protection is also a challenge for smart medicine.Large amounts of medical data are exposed online during transmission.Among the many encryption methods,the most interesting aspect of homomorphic encryption scheme is focused on data processing security[Han and Li(2016);Abdallah,Faragallah,Elsayed et al.(2016)].Algebraic relations between plaintext are preserved in the encryption domain,providing an appropriate method for secure signal processing.That is,someone else can work with encrypted data,but the process does not leak any of the original content.At the same time,the user with the key decrypts the processed data,resulting in the original data.This encryption has a huge impact in the cloud age.In addition,feature extraction is also a key link[Lv and Wang(2012);Li,Wang and Liu(2012)].It is mainly divided into global features,such as the classical algorithm Discrete Cosine Transformation(DCT)[Das,Panigrahi,Sharma et al.(2014);Wu,Li,Tu et al.(2018)],and local features,such as Scale Invariant Feature Transform(SIFT)[Priyatham,Nilkanta and Arijit(2014);Han,Zhou,Xu et al.(2017);Zhao,Jiang and Hong(2014);Liu,Li and Liu(2011);Dai and Tian(2014)].The SIFT algorithm can generate a large number of features even with a small amount of data,and has stability to rotation and translation,which is of profound significance to geometric attacks.

    Considering the above mentioned problems,this paper proposes a robust zerowatermarking algorithm based on SIFT-DCT for encrypting medical images in the transform domain.In the transform domain,the original medical image is encrypted with the aid of chaotic mapping.Then feature of the encrypted medical image is extracted with SIFT-DCT.Finally,the correlation coefficients are calculated to evaluate the robustness of the algorithm.This algorithm has the following advantages:(1)It protects the privacy of original medical images through encryption;(2)The zero watermarking technology will not change the original medical images;(3)The feature sequences extracted by this algorithm are more robust to geometrical attacks.

    This paper is organized as follows.The theoretical basis of data processing is introduced in the second part.The block diagram of image encryption is discussed in the third part,and the process of watermark is investigated in the fourth part.The simulation results are carried out and analyzed in the fifth part.The sixth part gives the conclusion of the paper.

    2 Feature extraction and encryption methods

    2.1 Scale invariant feature transform(SIFT)

    SIFT is an algorithm for local feature extraction,and its subtlety lies in the adoption of gaussian difference pyramid(see Fig.1(a)).SIFT realizes feature extraction mainly by three processes:(1)Extract key points,as show in Fig.1(b);(2)Add detailed information(local features)to the key points and get the feature vector(see Fig.1(c)).

    Figure 1:(a)Gaussian pyramid and DOG pyramid;(b)Extract SIFT extreme points;(c)SIFT feature vector generation

    SIFT feature is a local feature of the image.Its advantages are invariant to rotation,scale scaling,brightness changes,as well as a certain degree of stability to view changes,affine transformation and noise.It is suitable for fast and accurate matching in massive feature database.It is also multidimensional,and even a few objects can produce a large number of SIFT feature.The different original medical images have found many key points after SIFT(see Fig.2).After extracting the medical image features by SIFT,the feature matrix is compressed by DCT to extract the feature sequences.the SIFT-DCT is the improvement of feature extraction algorithm in this study.Combining global feature and local feature,a more robust feature sequence is extracted.

    Figure 2:Key points of different original medical images after SIFT(a)Abdominal CT image,(b)Brain CT image,(c)CT image of leg

    2.2 The discrete wavelet transform(DWT)

    DWT is a wavelet transform for which the wavelets are sampled at discrete intervals.DWT provides a simultaneous spatial and frequency domain information of the image.In DWT operation,the analysis filter bank consists of a pair of low and high pass filters corresponding to each decomposition level.The low pass filter extracts the approximate information of the image whereas the high pass filter extracts the details such as edges.The diagram is shown as Fig.3.

    Figure 3:The image in DWT(a)Single Level Decomposition,(b)Two-Level Decomposition,(c)Three Level Decomposition

    2.3 The discrete cosine transform(DCT)

    The DCT is a classical global feature extraction transform.It uses only real numbers and concentrates most of its energy on the low frequencies.It is widely used in the field of image processing.

    The DCT transform formula for N×N images is as follows:

    where f(x,y)is the pixel value,F(u,v)is the 2D-DCT transform coefficients for f(x,y).

    2.4 Logistic mapping

    Logistic mapping is widely used in secure communication.Logistic mapping works in a chaotic state,that is to say,the sequence generated by the initial condition X0 under the action of Logistic mapping is non-periodic and non-convergent.Outside this range,the resulting sequence must converge to a particular value.The mathematical formula is as follows:

    where the range ofxkis 0 to 1,0<μ<=4;besides,when 3.5699456<μ<=4,the logistic map gets a chaotic state and the chaotic sequence can be used as an ideal key sequence.

    3 The encryption of medical image

    Homomorphic encryption is used in medical images to better protect patient privacy and has a profound impact on future development.In this section,we propose a robust zerowatermarking scheme for the image in the encrypted domain.DWT and DCT are combined to encrypt the original image with chaotic mapping in Fig.4.

    Figure 4:Encryption scheme of original medical images

    Here are main steps:

    Step 1.Transform the original image using DWT-DCT.

    Step 2.Generating binary sequences through chaotic mapping.

    Step 3.The chaos sequence and the transformed coefficient matrix are taken as the dot product.

    Step 4.Perform inverse DCT(IDCT)and inverse DWT(IDWT)to obtain encrypted medical images(see Fig.5).

    Figure 5:The medical image in the encrypted domain:(a)The original medical image;(b)The encrypted medical image;(c)The decrypted medical image

    4 Zero watermarking algorithm

    Compared with traditional embedded watermarking methods,the zero-watermarking can better guarantee the original information,which is of great significance in medical image and is beneficial to improve the robustness of algorithm.This section mainly introduces watermarking embedding and extraction.The robustness of the algorithm is evaluated by the correlation coefficient between the original watermark and the attacked watermark.

    4.1 Watermarking embedding

    The watermarking embedding process is shown in Fig.6.Here are main steps:

    Step 1.Transform the encrypted CT image using SIFT-DCT.

    Step 2.Select the transform coefficient(4×8).

    Step 3.Obtain a 32-bit binary feature sequence of the medical image.

    Step 4.The original watermarking is encrypted by generating a chaos sequence.

    Step 5.Generat the key sequence of watermarking extraction through XOR operation.

    Figure 6:The watermarking embedding process

    4.2 Watermarking extraction

    The watermarking extraction process is shown in Fig.7.The specific steps are as follows:

    Step 1.Transform the attacked encrypted CT image using SIFT-DCT.

    Step 2.Using the same method as embedding to obtain the 32-bit binary feature sequence of attacked CT image.

    Step 3.Let the binary feature sequence of attacked medical image XOR the watermarking extraction key sequence.

    Step 4.Inverse the scramble watermarking image.

    Step 5.Calculate the correlation coefficient between the original watermarking and the attacked watermarking.

    Figure 7:The watermarking extraction process

    5 Experiments

    We use the abdominal CT image(see Fig.8(a))as the research object in the experiment.Firstly,the original CT image is encrypted in the transform domain(DWT-DCT),and then the features of the encrypted medical image are extracted based on SIFT-DCT algorithm.The selected watermarking is a 32-bit image,so a 4-by-8 module is selected in the encrypted image to obtain a 32-bit binary feature sequence.The robustness of the proposed algorithm is evaluated by calculating the correlation of feature sequences between the original watermark and the attacked watermark,that is the value of NC.NC value is between 0 and 1,where 1 means no change.At this time,the algorithm is the best robust.In addition,a large number of experimental studies have shown that when the NC value is greater than 0.5,the embedded watermarking can still be extracted,so here we believe that the algorithm is robust when the NC value is greater than 0.5.The Fig.8(b)shows the encrypted medical image under no attacks,and the Fig.8(c)shows the key points of the encrypted medical image after SIFT.At this time,the NC value is 1.0(see Fig.8(d)).

    Figure 8:(a)The original abdominal CT image;(b)The encrypted medical image;(c)Key points of the encrypted medical image after SIIFT;(d)The original Extracted watermarking

    5.1 Conventional attacks

    Conventional attacks on the encrypted CT image are carried out with various strengths,and NC values are calculated to test the robustness of the new algorithm(see Tab.1).It can be found that the value of NC is near 0.6 in Gaussian noise attacks.When JPEG compression attack is 2%,its value of NC can get 0.65.So,the proposed watermarking algorithm is performing satisfactorily.

    Table 1:The PSNR and NC values under Conventional Attacks based on SIFT-DCT

    5.1.1 Gaussian noise

    When the encrypted medical image is under Gaussian noise(15%)attacks,the value of NC is 0.60.The data proved that the algorithm is robust against Gaussian noise attacks.The result is shown in Fig.9.

    Figure 9:Medical image and Extracted watermarking under Gaussian noise attack 15%

    5.1.2 JPEG compression

    When the encrypted medical image is under JPEG compression(10%)attacks,the value of NC is 0.74.The data proved that the algorithm is robust against JPEG compression attacks.The result is shown in Fig.10.

    Figure 10:Medical image and Extracted watermarking under JPEG compression 10%

    5.2 Geometric attacks

    The robustness of geometric attacks is always a problem.A series of geometric attacks are tested through this algorithm,and the results are shown in Tab.2.

    Table 2:The PSNR and NC value under Geometric Attacks based on SIFT-DCT

    5.2.1 Rotation attack.

    When the encrypted medical image is rotated 10°(clockwise),the extracted watermark is shown in Fig.11.In this case,the degree of correlation is 0.60.So,the proposed algorithm has a good robustness against the rotation attacks.

    Figure 11:Medical image and Extracted watermarking under rotation attack 10°

    5.2.2 Scaling attack

    When the encrypted medical image is Scaling(×1.5),the extracted watermark is shown in Fig.12.In this case,the degree of correlation is 0.79.So,the proposed algorithm has a good robustness against the scaling attacks.

    Figure 12:Encrypted Medical image and Extracted watermarking under scaling attack(×1.5)

    5.2.3 Translation attacks

    The encrypted CT image is translated attack.When left translated 4%,the value of NC is 0.81(see Fig.13).When up translated 3%,the value of NC is 0.90(see Fig.14).And the watermarking is close to the original watermarking.This show that the algorithm has a fine robustness against translation attacks.

    Figure 13:Experimental results under Translation left 4% attack

    Figure 14:Experimental results under Translation up 3% attack

    5.2.4 Clipping attacks

    The CT image is clipped about 25% in the x direction.The cropped medical image is given in Fig.15.The degree of correlation is 0.72.When it is clipped about 30% in the y-axis direction,the clipped medical image is shown in Fig.16.The degree of correlation is 0.71.Therefore,the watermarking algorithm has strong robustness against clipping attacks.

    Figure 15:Experimental results under Clipping x-axis 25% attack

    Figure 16:Experimental results under Clipping y-axis 30% attack

    5.3 Comparison with unencrypted Algorithm

    The algorithm is compared with the unencrypted data,and it is shown in Tab.3.The experimental results show that the NC value of ciphertext domain is not significantly different from that of plaintext domain,which indicates that the encryption algorithm has homomorphism.

    Table 3:Comparison with unencrypted Algorithm based on SIFT-DCT

    Scaling ×1.5 0.61 0.79 Translation 4%(left)0.89 0.81 Translation 4%(right)0.88 0.81 Translation 3%(up)0.85 0.90 Cropping 25%(X axis)0.87 0.72 Cropping 30%(Y axis)0.61 0.72

    5.4 Comparison with other encrypted Algorithms.

    The NC value of this algorithm in ciphertext domain is compared with that of the classical feature extraction method,and the data is recorded in Tab.4.

    Table 4:Comparison with other encrypted Algorithms

    Through experiments,it can be found that the feature extraction method based on SIFTDCT is not as effective as the classical DCT in conventional attacks,especially in JPEG compression.Because the key points of SIFT include location,length,direction and so on.When compression or filtering attacks are carried out,the key points extracted by SIFT vary greatly,making the algorithm no longer has good robust.However,in terms of geometric attacks,the features extracted based on SIFT-DCT have better robust,which is significantly improved compared with the other three classical algorithms.In actual transmission,geometric attack is more challenging,so the improvement of robust of this algorithm in geometric attack has great significance.

    6 Conclusion

    In this paper,two different methods are combined to improve the traditional digital watermarking algorithm,which is a robust zero-watermarking algorithm based on SIFTDCT for medical images in the encryption domain.The original image is encrypted to protect the privacy of the original medical image.Then,zero-watermarking technology is adopted.The advantage of this technology is that the original medical image will not be damaged,which will not affect the doctor's judgment on the sensitive areas of tumors and other diseases in medical images.In addition,the algorithm uses SIFT-DCT to extract image features,Combining scale invariance of SIFT and energy concentration of DCT,and the selected features have strong robust in geometric attacks,which also solves one of the difficulties in transmission.Moreover,this algorithm is flexible,which can not only play a prominent role in medical image processing and ensure the security of image transmission,but also be applicable to other image recognition and retrieval.

    Acknowledgement:This work is supported by the Key Reach Project of Hainan Province[ZDYF2018129],the National Natural Science Foundation of China[61762033],and the National Natural Science Foundation of Hainan[2018CXTD333],the Key Innovation and Entrepreneurship Project of Hainan University[Hdcxcyxm201711],and the Higher Education Research Project of Hainan Province(Hnky2019-73)and the Key Research Project of Haikou College of Economics[HJKZ18-01].

    亚洲av成人av| 国产精品影院久久| 国内少妇人妻偷人精品xxx网站 | 99国产精品一区二区三区| 美国免费a级毛片| 国产伦一二天堂av在线观看| 男女午夜视频在线观看| 丰满的人妻完整版| 亚洲黑人精品在线| 国产成人欧美在线观看| 好看av亚洲va欧美ⅴa在| 亚洲成人久久性| 黄片小视频在线播放| 在线永久观看黄色视频| 免费搜索国产男女视频| 色尼玛亚洲综合影院| 两性午夜刺激爽爽歪歪视频在线观看 | 手机成人av网站| 91在线观看av| 91成人精品电影| videosex国产| 国产日本99.免费观看| 可以在线观看毛片的网站| 色综合婷婷激情| 欧美国产精品va在线观看不卡| 婷婷精品国产亚洲av在线| 国产一区二区在线av高清观看| 国内毛片毛片毛片毛片毛片| 成人国语在线视频| 老司机深夜福利视频在线观看| 国产精品久久久久久亚洲av鲁大| 嫩草影院精品99| bbb黄色大片| 免费在线观看日本一区| 亚洲全国av大片| 国产欧美日韩精品亚洲av| 一区二区三区精品91| 成人18禁在线播放| 黄网站色视频无遮挡免费观看| 久久婷婷人人爽人人干人人爱| 欧美zozozo另类| 中出人妻视频一区二区| www日本在线高清视频| 国产野战对白在线观看| 满18在线观看网站| 欧美国产日韩亚洲一区| 亚洲国产高清在线一区二区三 | 在线av久久热| 亚洲国产精品合色在线| 他把我摸到了高潮在线观看| 亚洲精品久久国产高清桃花| 人人澡人人妻人| 一区二区三区激情视频| 国产一区二区在线av高清观看| 亚洲一卡2卡3卡4卡5卡精品中文| 怎么达到女性高潮| 波多野结衣高清无吗| 亚洲中文av在线| 一级作爱视频免费观看| 成人欧美大片| 韩国精品一区二区三区| 欧美日韩乱码在线| 色尼玛亚洲综合影院| av免费在线观看网站| 午夜a级毛片| 欧美在线一区亚洲| 丰满人妻熟妇乱又伦精品不卡| 欧美精品亚洲一区二区| 国产精品久久久久久精品电影 | www.自偷自拍.com| 亚洲九九香蕉| 国产激情久久老熟女| 成人国产综合亚洲| 日韩欧美三级三区| 一进一出抽搐动态| 国产成人精品久久二区二区免费| 婷婷精品国产亚洲av在线| 国产精品精品国产色婷婷| 亚洲欧美激情综合另类| 亚洲av五月六月丁香网| 99热只有精品国产| 中文字幕精品亚洲无线码一区 | 午夜a级毛片| 99久久无色码亚洲精品果冻| 久久热在线av| 男人舔女人的私密视频| 搡老妇女老女人老熟妇| 精品久久久久久久久久久久久 | 亚洲黑人精品在线| 一级毛片女人18水好多| 久久久久久人人人人人| 老汉色av国产亚洲站长工具| 久99久视频精品免费| 中文字幕av电影在线播放| www.自偷自拍.com| 久久久久久久精品吃奶| 欧美+亚洲+日韩+国产| 午夜福利免费观看在线| 两人在一起打扑克的视频| 一本综合久久免费| 久久国产乱子伦精品免费另类| 午夜亚洲福利在线播放| 一本一本综合久久| 国产人伦9x9x在线观看| 国产精品一区二区精品视频观看| 久久久久亚洲av毛片大全| 丝袜美腿诱惑在线| 免费在线观看黄色视频的| 国产1区2区3区精品| 国产99白浆流出| 亚洲精品粉嫩美女一区| 97超级碰碰碰精品色视频在线观看| 国产免费男女视频| 香蕉av资源在线| 给我免费播放毛片高清在线观看| 国产精品一区二区免费欧美| 亚洲午夜精品一区,二区,三区| 亚洲国产精品sss在线观看| 色播亚洲综合网| 久久九九热精品免费| 精品久久久久久成人av| 亚洲精品中文字幕在线视频| 亚洲第一青青草原| 两人在一起打扑克的视频| www日本在线高清视频| 国产免费av片在线观看野外av| 1024视频免费在线观看| 欧美最黄视频在线播放免费| 亚洲电影在线观看av| www日本黄色视频网| 视频在线观看一区二区三区| 日本在线视频免费播放| 国产免费男女视频| 日本精品一区二区三区蜜桃| 国产亚洲av嫩草精品影院| 一级毛片精品| 国产精品亚洲美女久久久| 亚洲全国av大片| 国产伦人伦偷精品视频| 午夜激情福利司机影院| 白带黄色成豆腐渣| 男女下面进入的视频免费午夜 | 激情在线观看视频在线高清| 久热这里只有精品99| 欧美乱妇无乱码| 男男h啪啪无遮挡| 日韩免费av在线播放| 久久人妻福利社区极品人妻图片| 法律面前人人平等表现在哪些方面| 欧美成人午夜精品| 国产免费av片在线观看野外av| 1024手机看黄色片| 白带黄色成豆腐渣| 亚洲av日韩精品久久久久久密| 久久久久国产一级毛片高清牌| 色老头精品视频在线观看| 国产私拍福利视频在线观看| 18禁裸乳无遮挡免费网站照片 | 宅男免费午夜| av片东京热男人的天堂| 黄网站色视频无遮挡免费观看| 女性生殖器流出的白浆| 丰满人妻熟妇乱又伦精品不卡| 少妇粗大呻吟视频| 亚洲成av片中文字幕在线观看| 精品无人区乱码1区二区| 美女国产高潮福利片在线看| 亚洲无线在线观看| 国产aⅴ精品一区二区三区波| 欧美日韩黄片免| 免费高清在线观看日韩| 亚洲国产精品久久男人天堂| 伊人久久大香线蕉亚洲五| 欧美激情高清一区二区三区| 黄色a级毛片大全视频| 久久欧美精品欧美久久欧美| a在线观看视频网站| 亚洲国产欧美网| 99re在线观看精品视频| 99精品久久久久人妻精品| 美国免费a级毛片| 丰满的人妻完整版| 亚洲成国产人片在线观看| 女同久久另类99精品国产91| 中文字幕另类日韩欧美亚洲嫩草| 日韩大尺度精品在线看网址| av欧美777| 一本一本综合久久| 国产精品一区二区精品视频观看| av在线天堂中文字幕| 黄色丝袜av网址大全| 好男人电影高清在线观看| 亚洲国产精品成人综合色| 亚洲天堂国产精品一区在线| www日本黄色视频网| 真人一进一出gif抽搐免费| 亚洲国产日韩欧美精品在线观看 | 精品久久久久久久人妻蜜臀av| 国产一区在线观看成人免费| 久久香蕉激情| 欧美乱色亚洲激情| 亚洲av日韩精品久久久久久密| www.精华液| 91字幕亚洲| 日本 欧美在线| 真人做人爱边吃奶动态| 欧美激情 高清一区二区三区| 夜夜夜夜夜久久久久| 一级黄色大片毛片| 欧美激情高清一区二区三区| 国产1区2区3区精品| 久久亚洲精品不卡| 人人妻人人澡人人看| 99国产精品一区二区三区| 亚洲成av片中文字幕在线观看| 少妇的丰满在线观看| 亚洲精品中文字幕在线视频| 国产精品久久视频播放| 老司机深夜福利视频在线观看| 中文字幕人妻丝袜一区二区| 国产成人啪精品午夜网站| 日韩欧美 国产精品| 色播亚洲综合网| 精品高清国产在线一区| 久久中文看片网| 国产精品亚洲av一区麻豆| 精品国产亚洲在线| 麻豆av在线久日| 亚洲av成人一区二区三| 波多野结衣高清作品| 中出人妻视频一区二区| 久久欧美精品欧美久久欧美| 久久香蕉激情| 亚洲 欧美 日韩 在线 免费| 久久亚洲真实| 国内久久婷婷六月综合欲色啪| 精品福利观看| 亚洲欧美激情综合另类| 操出白浆在线播放| 法律面前人人平等表现在哪些方面| 少妇 在线观看| 嫩草影视91久久| 女性生殖器流出的白浆| 亚洲成a人片在线一区二区| 欧美性长视频在线观看| 久热这里只有精品99| www.www免费av| 一级毛片女人18水好多| 国产精品99久久99久久久不卡| 久久婷婷人人爽人人干人人爱| 亚洲五月婷婷丁香| 高潮久久久久久久久久久不卡| 国产高清视频在线播放一区| 天堂√8在线中文| 国产麻豆成人av免费视频| 亚洲av五月六月丁香网| 日本a在线网址| 亚洲精品av麻豆狂野| 久久亚洲精品不卡| 欧美成人免费av一区二区三区| 国产高清视频在线播放一区| 欧美成狂野欧美在线观看| 亚洲av五月六月丁香网| 最近最新中文字幕大全免费视频| 韩国av一区二区三区四区| 十八禁网站免费在线| 一卡2卡三卡四卡精品乱码亚洲| 男人舔奶头视频| 成人手机av| 色婷婷久久久亚洲欧美| 丝袜美腿诱惑在线| 在线观看舔阴道视频| 深夜精品福利| 一本精品99久久精品77| 一区二区三区激情视频| 日本 欧美在线| 无限看片的www在线观看| 久久香蕉国产精品| 国产在线精品亚洲第一网站| 国产私拍福利视频在线观看| 精品久久久久久成人av| 午夜福利欧美成人| 老司机午夜福利在线观看视频| 久久久久久九九精品二区国产 | 精品熟女少妇八av免费久了| 中文字幕av电影在线播放| 精品电影一区二区在线| 亚洲av成人一区二区三| 午夜视频精品福利| 黄频高清免费视频| www.精华液| 999久久久国产精品视频| 亚洲精品中文字幕一二三四区| 久久久久久久久免费视频了| 伊人久久大香线蕉亚洲五| 久久天躁狠狠躁夜夜2o2o| 亚洲国产欧美网| 色综合亚洲欧美另类图片| 18禁黄网站禁片午夜丰满| 国产精品国产高清国产av| 国产欧美日韩精品亚洲av| 首页视频小说图片口味搜索| 亚洲电影在线观看av| 精品国产乱码久久久久久男人| 精品久久久久久久久久久久久 | 两个人免费观看高清视频| 18美女黄网站色大片免费观看| 亚洲 欧美一区二区三区| 一a级毛片在线观看| 国产麻豆成人av免费视频| 国产精品99久久99久久久不卡| 99精品欧美一区二区三区四区| 99精品久久久久人妻精品| 亚洲熟女毛片儿| 久久亚洲真实| 国产精品1区2区在线观看.| 日本免费a在线| 亚洲午夜理论影院| 黑丝袜美女国产一区| 99精品在免费线老司机午夜| 免费高清视频大片| 我的亚洲天堂| 99在线人妻在线中文字幕| 91大片在线观看| 色综合亚洲欧美另类图片| 校园春色视频在线观看| 国产又色又爽无遮挡免费看| 亚洲男人的天堂狠狠| 97人妻精品一区二区三区麻豆 | 欧美亚洲日本最大视频资源| 两性夫妻黄色片| 一级a爱视频在线免费观看| 狠狠狠狠99中文字幕| 国产亚洲精品av在线| 黄色视频不卡| 中文字幕高清在线视频| 嫩草影院精品99| 久久久久久久久中文| 亚洲中文av在线| 日日夜夜操网爽| 波多野结衣高清作品| 精品久久久久久久久久免费视频| 国产欧美日韩精品亚洲av| 精品久久久久久久久久免费视频| 亚洲熟妇中文字幕五十中出| 高潮久久久久久久久久久不卡| 亚洲av美国av| 免费在线观看日本一区| 琪琪午夜伦伦电影理论片6080| 国产精品电影一区二区三区| 欧美性猛交黑人性爽| 可以在线观看毛片的网站| 久久精品影院6| 淫妇啪啪啪对白视频| 欧美黄色片欧美黄色片| 亚洲人成网站高清观看| 长腿黑丝高跟| 丁香六月欧美| a级毛片a级免费在线| 久久久久久久久中文| 成人亚洲精品一区在线观看| 在线国产一区二区在线| 免费高清在线观看日韩| 熟妇人妻久久中文字幕3abv| 日本a在线网址| 又黄又粗又硬又大视频| av视频在线观看入口| 国产免费男女视频| 色播亚洲综合网| 国产乱人伦免费视频| a级毛片在线看网站| 亚洲精品一卡2卡三卡4卡5卡| 色精品久久人妻99蜜桃| 成人特级黄色片久久久久久久| 午夜福利视频1000在线观看| 不卡一级毛片| 99精品久久久久人妻精品| 国产精品综合久久久久久久免费| 99热6这里只有精品| 成人国产一区最新在线观看| 亚洲免费av在线视频| 最好的美女福利视频网| www国产在线视频色| 午夜影院日韩av| 欧美丝袜亚洲另类 | 观看免费一级毛片| 悠悠久久av| 香蕉久久夜色| 法律面前人人平等表现在哪些方面| 久久精品国产99精品国产亚洲性色| 曰老女人黄片| 听说在线观看完整版免费高清| 人妻丰满熟妇av一区二区三区| 神马国产精品三级电影在线观看 | 制服诱惑二区| 国产精品亚洲一级av第二区| 狠狠狠狠99中文字幕| 中文字幕av电影在线播放| 久久久久久国产a免费观看| 久久伊人香网站| 不卡一级毛片| 国产成人精品久久二区二区91| 亚洲在线自拍视频| 婷婷六月久久综合丁香| 中文字幕精品亚洲无线码一区 | 亚洲成人国产一区在线观看| 久久这里只有精品19| 亚洲熟女毛片儿| 性色av乱码一区二区三区2| 久久青草综合色| 国产精品久久久人人做人人爽| av片东京热男人的天堂| 黄色 视频免费看| 一个人观看的视频www高清免费观看 | 麻豆久久精品国产亚洲av| 亚洲一码二码三码区别大吗| 免费一级毛片在线播放高清视频| 久久天堂一区二区三区四区| 亚洲第一欧美日韩一区二区三区| 亚洲av成人不卡在线观看播放网| 这个男人来自地球电影免费观看| 欧美国产精品va在线观看不卡| 午夜福利免费观看在线| 午夜免费鲁丝| 久热这里只有精品99| 精品久久蜜臀av无| 久久欧美精品欧美久久欧美| 久9热在线精品视频| 又紧又爽又黄一区二区| 欧美日韩瑟瑟在线播放| 久久中文字幕人妻熟女| 亚洲国产日韩欧美精品在线观看 | 久热爱精品视频在线9| 在线观看免费日韩欧美大片| 亚洲 国产 在线| 免费在线观看成人毛片| 97人妻精品一区二区三区麻豆 | 亚洲国产毛片av蜜桃av| 日韩欧美在线二视频| 黄片小视频在线播放| 日日爽夜夜爽网站| 国内毛片毛片毛片毛片毛片| 免费在线观看视频国产中文字幕亚洲| 夜夜爽天天搞| 亚洲va日本ⅴa欧美va伊人久久| 露出奶头的视频| 精品久久久久久久人妻蜜臀av| 99精品欧美一区二区三区四区| 久久伊人香网站| 国产在线观看jvid| 97超级碰碰碰精品色视频在线观看| 国产精品综合久久久久久久免费| 香蕉国产在线看| 亚洲黑人精品在线| 亚洲avbb在线观看| 国产在线观看jvid| 日本撒尿小便嘘嘘汇集6| 身体一侧抽搐| 给我免费播放毛片高清在线观看| 精品不卡国产一区二区三区| 国产精品 国内视频| 免费在线观看视频国产中文字幕亚洲| 中国美女看黄片| 12—13女人毛片做爰片一| 99久久精品国产亚洲精品| 久久国产精品男人的天堂亚洲| 级片在线观看| 国产精品一区二区三区四区久久 | 国产爱豆传媒在线观看 | 啦啦啦 在线观看视频| 精品第一国产精品| 女人高潮潮喷娇喘18禁视频| 欧美在线一区亚洲| 欧美绝顶高潮抽搐喷水| 淫秽高清视频在线观看| 久久 成人 亚洲| 亚洲精品美女久久av网站| 高潮久久久久久久久久久不卡| 亚洲成人国产一区在线观看| 高清在线国产一区| 男女做爰动态图高潮gif福利片| 免费看日本二区| 午夜影院日韩av| 国产日本99.免费观看| 男人舔奶头视频| 99久久国产精品久久久| 国内少妇人妻偷人精品xxx网站 | 一区二区日韩欧美中文字幕| 老司机福利观看| 久久狼人影院| 熟女少妇亚洲综合色aaa.| 国产精品香港三级国产av潘金莲| 精品日产1卡2卡| 91成人精品电影| 首页视频小说图片口味搜索| 国产精品一区二区免费欧美| 亚洲av成人不卡在线观看播放网| 欧美成狂野欧美在线观看| 亚洲中文字幕日韩| 欧美在线一区亚洲| 岛国在线观看网站| 亚洲aⅴ乱码一区二区在线播放 | 国产成人欧美在线观看| 人人妻人人澡欧美一区二区| 国产视频内射| 亚洲成人精品中文字幕电影| 国产单亲对白刺激| 无遮挡黄片免费观看| www国产在线视频色| 18禁黄网站禁片免费观看直播| 精品久久蜜臀av无| 国产又色又爽无遮挡免费看| 亚洲国产中文字幕在线视频| 久热这里只有精品99| 成人18禁在线播放| 天堂动漫精品| 久久国产亚洲av麻豆专区| 女生性感内裤真人,穿戴方法视频| 亚洲在线自拍视频| 免费高清视频大片| 亚洲国产日韩欧美精品在线观看 | 自线自在国产av| 一卡2卡三卡四卡精品乱码亚洲| 亚洲av成人av| 亚洲一区中文字幕在线| 99精品久久久久人妻精品| 日韩 欧美 亚洲 中文字幕| 国产99久久九九免费精品| 日本a在线网址| 老汉色∧v一级毛片| 久久久久国产一级毛片高清牌| 亚洲成av片中文字幕在线观看| 国产伦在线观看视频一区| 久久天躁狠狠躁夜夜2o2o| 嫩草影视91久久| 国产精品永久免费网站| 日韩视频一区二区在线观看| 在线观看免费视频日本深夜| e午夜精品久久久久久久| 亚洲,欧美精品.| 亚洲国产日韩欧美精品在线观看 | 91成人精品电影| 黑人欧美特级aaaaaa片| 国内毛片毛片毛片毛片毛片| 亚洲中文字幕一区二区三区有码在线看 | 美女高潮到喷水免费观看| 欧美不卡视频在线免费观看 | 精品国产国语对白av| 国产成人影院久久av| 精品人妻1区二区| 国产高清videossex| 淫秽高清视频在线观看| 午夜两性在线视频| 免费看日本二区| 国产av不卡久久| 婷婷亚洲欧美| 可以在线观看的亚洲视频| 男女做爰动态图高潮gif福利片| 人人妻人人看人人澡| 免费看十八禁软件| 亚洲自拍偷在线| 亚洲欧美日韩高清在线视频| 亚洲av第一区精品v没综合| 动漫黄色视频在线观看| 成人三级做爰电影| 视频区欧美日本亚洲| 国产精品亚洲一级av第二区| 久久久国产成人精品二区| 国产av不卡久久| 欧美精品亚洲一区二区| 99久久精品国产亚洲精品| 亚洲精品色激情综合| 岛国在线观看网站| 午夜老司机福利片| 亚洲,欧美精品.| 欧美精品啪啪一区二区三区| 别揉我奶头~嗯~啊~动态视频| 婷婷六月久久综合丁香| 国产亚洲精品一区二区www| 好男人在线观看高清免费视频 | 啦啦啦观看免费观看视频高清| 亚洲精品中文字幕一二三四区| 老熟妇仑乱视频hdxx| 国产片内射在线| 黄频高清免费视频| 日本免费一区二区三区高清不卡| 国产精品 欧美亚洲| 国内毛片毛片毛片毛片毛片| 悠悠久久av| 在线播放国产精品三级| 国产亚洲精品久久久久5区| 久久久久久人人人人人| 亚洲欧洲精品一区二区精品久久久| 99国产综合亚洲精品| 免费在线观看影片大全网站| 欧美国产日韩亚洲一区| 制服丝袜大香蕉在线| 国内少妇人妻偷人精品xxx网站 | 国产精品久久电影中文字幕| 听说在线观看完整版免费高清| 老汉色∧v一级毛片| 成人18禁在线播放| 国产亚洲精品久久久久5区| 日韩免费av在线播放| 成人18禁高潮啪啪吃奶动态图| 最近最新中文字幕大全免费视频| 日韩欧美国产一区二区入口| 国产成人av激情在线播放| 免费搜索国产男女视频| 国产野战对白在线观看| 可以在线观看毛片的网站| 久久久久九九精品影院| av在线播放免费不卡| 久久久久免费精品人妻一区二区 | 中文亚洲av片在线观看爽|