• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Robust Zero-Watermarking Based on SIFT-DCT for Medical Images in the Encrypted Domain

    2019-11-07 03:13:00JialingLiuJingbingLiYenweiChenXiangxiZouJierenChengYanlinLiuandUzairAslamBhatti
    Computers Materials&Continua 2019年10期

    Jialing Liu,Jingbing Li,,Yenwei Chen,Xiangxi Zou,Jieren Cheng,Yanlin Liu and Uzair Aslam Bhatti,

    Abstract:Remote medical diagnosis can be realized by using the Internet,but when transmitting medical images of patients through the Internet,personal information of patients may be leaked.Aim at the security of medical information system and the protection of medical images,a novel robust zero-watermarking based on SIFT-DCT(Scale Invariant Feature Transform-Discrete Cosine Transform)for medical images in the encrypted domain is proposed.Firstly,the original medical image is encrypted in transform domain based on Logistic chaotic sequence to enhance the concealment of original medical images.Then,the SIFT-DCT is used to extract the feature sequences of encrypted medical images.Next,zero-watermarking technology is used to ensure that the region of interest of medical images are not changed.Finally,the robust of the algorithm is evaluated by the correlation coefficient between the original watermark and the attacked watermark.A series of attack experiments are carried out on this method,and the results show that the algorithm is not only secure,but also robust to both traditional and geometric attacks,especially in clipping attacks.

    Keywords:Robustness,CT Image,zero-watermarking,SIFT-DCT,encrypted domain.

    1 Introduction

    With the development of science and technology,big data and cloud storage have become a hot topic.Various data processing methods and remote transmission schemes have been proposed.And cloud storage and data processing also have potential advantages in smart healthcare.In case Diagnosis,such as Feature Selection Method Based on Class Discriminative Degree for Intelligent Medical Diagnosis[Fang,Cai,Sun et al.(2018)],a decision support system that can assist Medical staff to diagnose and treat diseases can be established through Feature extraction of Medical images,which can improve efficiency.But it will encounter the information security question in the data transmission.Medical images contain some sensitive information,which may be leaked or tampered with.Digital watermarking technology is a possible information protection system[Guo,Zheng and Huang(2015)],which provides a way to embed unique code in each original image of distributed content.According to the literatures published in recent years,the digital watermarking technology can be grouped into two classes:The watermarking Information is directly embedded into the digital carrier,such as Information hiding in medical images:a robust medical image watermarking system for E-healthcare[Parah,Sheikh,Ahad et al.(2017)].The watermarking is embedded in different areas of the carrier,but the medical image is sensitive,and the selected location is crucial.The other method is blind watermarking[Fazlali,Samavi,Karimi et al.(2017)],which does not need to use the original data and only needs the key to detect.It will not destroy the original medical data and not affect the judgment of doctors.For example,Lang et al.[Lang and Zhang(2014)]have proposed a new blind digital image watermarking algorithm based on fractional Fourier transform(FRFT).In Parah et al.[Parah,Sheikh,Loan et al.(2016)],the authors have proposed a new DCT domain blind watermarking algorithm.These methods associate the watermark with the target image to reduce the damage to the original data.Though the watermark embedding method has been improved,they did not protect the privacy of the original image,which is an important factor for medical images.

    So privacy protection is also a challenge for smart medicine.Large amounts of medical data are exposed online during transmission.Among the many encryption methods,the most interesting aspect of homomorphic encryption scheme is focused on data processing security[Han and Li(2016);Abdallah,Faragallah,Elsayed et al.(2016)].Algebraic relations between plaintext are preserved in the encryption domain,providing an appropriate method for secure signal processing.That is,someone else can work with encrypted data,but the process does not leak any of the original content.At the same time,the user with the key decrypts the processed data,resulting in the original data.This encryption has a huge impact in the cloud age.In addition,feature extraction is also a key link[Lv and Wang(2012);Li,Wang and Liu(2012)].It is mainly divided into global features,such as the classical algorithm Discrete Cosine Transformation(DCT)[Das,Panigrahi,Sharma et al.(2014);Wu,Li,Tu et al.(2018)],and local features,such as Scale Invariant Feature Transform(SIFT)[Priyatham,Nilkanta and Arijit(2014);Han,Zhou,Xu et al.(2017);Zhao,Jiang and Hong(2014);Liu,Li and Liu(2011);Dai and Tian(2014)].The SIFT algorithm can generate a large number of features even with a small amount of data,and has stability to rotation and translation,which is of profound significance to geometric attacks.

    Considering the above mentioned problems,this paper proposes a robust zerowatermarking algorithm based on SIFT-DCT for encrypting medical images in the transform domain.In the transform domain,the original medical image is encrypted with the aid of chaotic mapping.Then feature of the encrypted medical image is extracted with SIFT-DCT.Finally,the correlation coefficients are calculated to evaluate the robustness of the algorithm.This algorithm has the following advantages:(1)It protects the privacy of original medical images through encryption;(2)The zero watermarking technology will not change the original medical images;(3)The feature sequences extracted by this algorithm are more robust to geometrical attacks.

    This paper is organized as follows.The theoretical basis of data processing is introduced in the second part.The block diagram of image encryption is discussed in the third part,and the process of watermark is investigated in the fourth part.The simulation results are carried out and analyzed in the fifth part.The sixth part gives the conclusion of the paper.

    2 Feature extraction and encryption methods

    2.1 Scale invariant feature transform(SIFT)

    SIFT is an algorithm for local feature extraction,and its subtlety lies in the adoption of gaussian difference pyramid(see Fig.1(a)).SIFT realizes feature extraction mainly by three processes:(1)Extract key points,as show in Fig.1(b);(2)Add detailed information(local features)to the key points and get the feature vector(see Fig.1(c)).

    Figure 1:(a)Gaussian pyramid and DOG pyramid;(b)Extract SIFT extreme points;(c)SIFT feature vector generation

    SIFT feature is a local feature of the image.Its advantages are invariant to rotation,scale scaling,brightness changes,as well as a certain degree of stability to view changes,affine transformation and noise.It is suitable for fast and accurate matching in massive feature database.It is also multidimensional,and even a few objects can produce a large number of SIFT feature.The different original medical images have found many key points after SIFT(see Fig.2).After extracting the medical image features by SIFT,the feature matrix is compressed by DCT to extract the feature sequences.the SIFT-DCT is the improvement of feature extraction algorithm in this study.Combining global feature and local feature,a more robust feature sequence is extracted.

    Figure 2:Key points of different original medical images after SIFT(a)Abdominal CT image,(b)Brain CT image,(c)CT image of leg

    2.2 The discrete wavelet transform(DWT)

    DWT is a wavelet transform for which the wavelets are sampled at discrete intervals.DWT provides a simultaneous spatial and frequency domain information of the image.In DWT operation,the analysis filter bank consists of a pair of low and high pass filters corresponding to each decomposition level.The low pass filter extracts the approximate information of the image whereas the high pass filter extracts the details such as edges.The diagram is shown as Fig.3.

    Figure 3:The image in DWT(a)Single Level Decomposition,(b)Two-Level Decomposition,(c)Three Level Decomposition

    2.3 The discrete cosine transform(DCT)

    The DCT is a classical global feature extraction transform.It uses only real numbers and concentrates most of its energy on the low frequencies.It is widely used in the field of image processing.

    The DCT transform formula for N×N images is as follows:

    where f(x,y)is the pixel value,F(u,v)is the 2D-DCT transform coefficients for f(x,y).

    2.4 Logistic mapping

    Logistic mapping is widely used in secure communication.Logistic mapping works in a chaotic state,that is to say,the sequence generated by the initial condition X0 under the action of Logistic mapping is non-periodic and non-convergent.Outside this range,the resulting sequence must converge to a particular value.The mathematical formula is as follows:

    where the range ofxkis 0 to 1,0<μ<=4;besides,when 3.5699456<μ<=4,the logistic map gets a chaotic state and the chaotic sequence can be used as an ideal key sequence.

    3 The encryption of medical image

    Homomorphic encryption is used in medical images to better protect patient privacy and has a profound impact on future development.In this section,we propose a robust zerowatermarking scheme for the image in the encrypted domain.DWT and DCT are combined to encrypt the original image with chaotic mapping in Fig.4.

    Figure 4:Encryption scheme of original medical images

    Here are main steps:

    Step 1.Transform the original image using DWT-DCT.

    Step 2.Generating binary sequences through chaotic mapping.

    Step 3.The chaos sequence and the transformed coefficient matrix are taken as the dot product.

    Step 4.Perform inverse DCT(IDCT)and inverse DWT(IDWT)to obtain encrypted medical images(see Fig.5).

    Figure 5:The medical image in the encrypted domain:(a)The original medical image;(b)The encrypted medical image;(c)The decrypted medical image

    4 Zero watermarking algorithm

    Compared with traditional embedded watermarking methods,the zero-watermarking can better guarantee the original information,which is of great significance in medical image and is beneficial to improve the robustness of algorithm.This section mainly introduces watermarking embedding and extraction.The robustness of the algorithm is evaluated by the correlation coefficient between the original watermark and the attacked watermark.

    4.1 Watermarking embedding

    The watermarking embedding process is shown in Fig.6.Here are main steps:

    Step 1.Transform the encrypted CT image using SIFT-DCT.

    Step 2.Select the transform coefficient(4×8).

    Step 3.Obtain a 32-bit binary feature sequence of the medical image.

    Step 4.The original watermarking is encrypted by generating a chaos sequence.

    Step 5.Generat the key sequence of watermarking extraction through XOR operation.

    Figure 6:The watermarking embedding process

    4.2 Watermarking extraction

    The watermarking extraction process is shown in Fig.7.The specific steps are as follows:

    Step 1.Transform the attacked encrypted CT image using SIFT-DCT.

    Step 2.Using the same method as embedding to obtain the 32-bit binary feature sequence of attacked CT image.

    Step 3.Let the binary feature sequence of attacked medical image XOR the watermarking extraction key sequence.

    Step 4.Inverse the scramble watermarking image.

    Step 5.Calculate the correlation coefficient between the original watermarking and the attacked watermarking.

    Figure 7:The watermarking extraction process

    5 Experiments

    We use the abdominal CT image(see Fig.8(a))as the research object in the experiment.Firstly,the original CT image is encrypted in the transform domain(DWT-DCT),and then the features of the encrypted medical image are extracted based on SIFT-DCT algorithm.The selected watermarking is a 32-bit image,so a 4-by-8 module is selected in the encrypted image to obtain a 32-bit binary feature sequence.The robustness of the proposed algorithm is evaluated by calculating the correlation of feature sequences between the original watermark and the attacked watermark,that is the value of NC.NC value is between 0 and 1,where 1 means no change.At this time,the algorithm is the best robust.In addition,a large number of experimental studies have shown that when the NC value is greater than 0.5,the embedded watermarking can still be extracted,so here we believe that the algorithm is robust when the NC value is greater than 0.5.The Fig.8(b)shows the encrypted medical image under no attacks,and the Fig.8(c)shows the key points of the encrypted medical image after SIFT.At this time,the NC value is 1.0(see Fig.8(d)).

    Figure 8:(a)The original abdominal CT image;(b)The encrypted medical image;(c)Key points of the encrypted medical image after SIIFT;(d)The original Extracted watermarking

    5.1 Conventional attacks

    Conventional attacks on the encrypted CT image are carried out with various strengths,and NC values are calculated to test the robustness of the new algorithm(see Tab.1).It can be found that the value of NC is near 0.6 in Gaussian noise attacks.When JPEG compression attack is 2%,its value of NC can get 0.65.So,the proposed watermarking algorithm is performing satisfactorily.

    Table 1:The PSNR and NC values under Conventional Attacks based on SIFT-DCT

    5.1.1 Gaussian noise

    When the encrypted medical image is under Gaussian noise(15%)attacks,the value of NC is 0.60.The data proved that the algorithm is robust against Gaussian noise attacks.The result is shown in Fig.9.

    Figure 9:Medical image and Extracted watermarking under Gaussian noise attack 15%

    5.1.2 JPEG compression

    When the encrypted medical image is under JPEG compression(10%)attacks,the value of NC is 0.74.The data proved that the algorithm is robust against JPEG compression attacks.The result is shown in Fig.10.

    Figure 10:Medical image and Extracted watermarking under JPEG compression 10%

    5.2 Geometric attacks

    The robustness of geometric attacks is always a problem.A series of geometric attacks are tested through this algorithm,and the results are shown in Tab.2.

    Table 2:The PSNR and NC value under Geometric Attacks based on SIFT-DCT

    5.2.1 Rotation attack.

    When the encrypted medical image is rotated 10°(clockwise),the extracted watermark is shown in Fig.11.In this case,the degree of correlation is 0.60.So,the proposed algorithm has a good robustness against the rotation attacks.

    Figure 11:Medical image and Extracted watermarking under rotation attack 10°

    5.2.2 Scaling attack

    When the encrypted medical image is Scaling(×1.5),the extracted watermark is shown in Fig.12.In this case,the degree of correlation is 0.79.So,the proposed algorithm has a good robustness against the scaling attacks.

    Figure 12:Encrypted Medical image and Extracted watermarking under scaling attack(×1.5)

    5.2.3 Translation attacks

    The encrypted CT image is translated attack.When left translated 4%,the value of NC is 0.81(see Fig.13).When up translated 3%,the value of NC is 0.90(see Fig.14).And the watermarking is close to the original watermarking.This show that the algorithm has a fine robustness against translation attacks.

    Figure 13:Experimental results under Translation left 4% attack

    Figure 14:Experimental results under Translation up 3% attack

    5.2.4 Clipping attacks

    The CT image is clipped about 25% in the x direction.The cropped medical image is given in Fig.15.The degree of correlation is 0.72.When it is clipped about 30% in the y-axis direction,the clipped medical image is shown in Fig.16.The degree of correlation is 0.71.Therefore,the watermarking algorithm has strong robustness against clipping attacks.

    Figure 15:Experimental results under Clipping x-axis 25% attack

    Figure 16:Experimental results under Clipping y-axis 30% attack

    5.3 Comparison with unencrypted Algorithm

    The algorithm is compared with the unencrypted data,and it is shown in Tab.3.The experimental results show that the NC value of ciphertext domain is not significantly different from that of plaintext domain,which indicates that the encryption algorithm has homomorphism.

    Table 3:Comparison with unencrypted Algorithm based on SIFT-DCT

    Scaling ×1.5 0.61 0.79 Translation 4%(left)0.89 0.81 Translation 4%(right)0.88 0.81 Translation 3%(up)0.85 0.90 Cropping 25%(X axis)0.87 0.72 Cropping 30%(Y axis)0.61 0.72

    5.4 Comparison with other encrypted Algorithms.

    The NC value of this algorithm in ciphertext domain is compared with that of the classical feature extraction method,and the data is recorded in Tab.4.

    Table 4:Comparison with other encrypted Algorithms

    Through experiments,it can be found that the feature extraction method based on SIFTDCT is not as effective as the classical DCT in conventional attacks,especially in JPEG compression.Because the key points of SIFT include location,length,direction and so on.When compression or filtering attacks are carried out,the key points extracted by SIFT vary greatly,making the algorithm no longer has good robust.However,in terms of geometric attacks,the features extracted based on SIFT-DCT have better robust,which is significantly improved compared with the other three classical algorithms.In actual transmission,geometric attack is more challenging,so the improvement of robust of this algorithm in geometric attack has great significance.

    6 Conclusion

    In this paper,two different methods are combined to improve the traditional digital watermarking algorithm,which is a robust zero-watermarking algorithm based on SIFTDCT for medical images in the encryption domain.The original image is encrypted to protect the privacy of the original medical image.Then,zero-watermarking technology is adopted.The advantage of this technology is that the original medical image will not be damaged,which will not affect the doctor's judgment on the sensitive areas of tumors and other diseases in medical images.In addition,the algorithm uses SIFT-DCT to extract image features,Combining scale invariance of SIFT and energy concentration of DCT,and the selected features have strong robust in geometric attacks,which also solves one of the difficulties in transmission.Moreover,this algorithm is flexible,which can not only play a prominent role in medical image processing and ensure the security of image transmission,but also be applicable to other image recognition and retrieval.

    Acknowledgement:This work is supported by the Key Reach Project of Hainan Province[ZDYF2018129],the National Natural Science Foundation of China[61762033],and the National Natural Science Foundation of Hainan[2018CXTD333],the Key Innovation and Entrepreneurship Project of Hainan University[Hdcxcyxm201711],and the Higher Education Research Project of Hainan Province(Hnky2019-73)and the Key Research Project of Haikou College of Economics[HJKZ18-01].

    日韩精品免费视频一区二区三区| 法律面前人人平等表现在哪些方面 | 无限看片的www在线观看| 亚洲专区字幕在线| 亚洲专区国产一区二区| 丝袜在线中文字幕| 国产精品久久久久久精品古装| 国产精品一区二区精品视频观看| 日日夜夜操网爽| 久久热在线av| av天堂久久9| 人人澡人人妻人| 多毛熟女@视频| 亚洲精品国产av成人精品| 91字幕亚洲| 91精品三级在线观看| 国产精品自产拍在线观看55亚洲 | 咕卡用的链子| 最黄视频免费看| 18禁黄网站禁片午夜丰满| 成人黄色视频免费在线看| 亚洲精华国产精华精| www.av在线官网国产| 亚洲av日韩精品久久久久久密| 亚洲精品美女久久av网站| 高清视频免费观看一区二区| 亚洲中文av在线| 美女大奶头黄色视频| 亚洲熟女精品中文字幕| 好男人电影高清在线观看| 亚洲精品在线美女| 天天躁夜夜躁狠狠躁躁| 国产亚洲精品第一综合不卡| 超碰成人久久| 欧美精品一区二区免费开放| 亚洲av日韩精品久久久久久密| 亚洲久久久国产精品| 亚洲av电影在线进入| 老汉色av国产亚洲站长工具| 亚洲精品一区蜜桃| www日本在线高清视频| 国产av精品麻豆| 美女高潮喷水抽搐中文字幕| 91精品三级在线观看| 国产一卡二卡三卡精品| 日韩电影二区| 欧美97在线视频| 亚洲精品一二三| 成年人免费黄色播放视频| 国产伦人伦偷精品视频| 丝袜人妻中文字幕| 男人操女人黄网站| 美女主播在线视频| 欧美人与性动交α欧美精品济南到| 成人黄色视频免费在线看| 日韩有码中文字幕| 嫁个100分男人电影在线观看| 亚洲天堂av无毛| 亚洲人成电影免费在线| 亚洲成国产人片在线观看| 久久ye,这里只有精品| 精品国产乱子伦一区二区三区 | 亚洲av成人一区二区三| 久久99一区二区三区| 69精品国产乱码久久久| 久久久国产成人免费| 欧美一级毛片孕妇| 国产99久久九九免费精品| 夜夜骑夜夜射夜夜干| 国产精品1区2区在线观看. | 成在线人永久免费视频| 超色免费av| 男人操女人黄网站| 国产亚洲午夜精品一区二区久久| 亚洲成人手机| 国产视频一区二区在线看| 男人舔女人的私密视频| 久久精品aⅴ一区二区三区四区| 成人亚洲精品一区在线观看| a级毛片在线看网站| 夜夜夜夜夜久久久久| 脱女人内裤的视频| 九色亚洲精品在线播放| 女人高潮潮喷娇喘18禁视频| 一二三四社区在线视频社区8| 美女大奶头黄色视频| 久久这里只有精品19| 欧美少妇被猛烈插入视频| 亚洲av成人一区二区三| 一区二区三区激情视频| 啦啦啦免费观看视频1| 在线天堂中文资源库| 亚洲国产欧美一区二区综合| 极品人妻少妇av视频| 我的亚洲天堂| 手机成人av网站| 在线观看人妻少妇| 国产一区二区三区综合在线观看| 欧美精品一区二区大全| 国产区一区二久久| av国产精品久久久久影院| 亚洲精品一卡2卡三卡4卡5卡 | 男女免费视频国产| 亚洲熟女精品中文字幕| 欧美精品av麻豆av| 中文字幕精品免费在线观看视频| 纯流量卡能插随身wifi吗| 80岁老熟妇乱子伦牲交| 狠狠婷婷综合久久久久久88av| 在线观看免费午夜福利视频| www.熟女人妻精品国产| 欧美乱码精品一区二区三区| 久久久久久免费高清国产稀缺| 美女午夜性视频免费| 日韩熟女老妇一区二区性免费视频| 嫁个100分男人电影在线观看| 91麻豆av在线| 黄色毛片三级朝国网站| 久久久精品区二区三区| 青春草视频在线免费观看| 亚洲av电影在线进入| 免费在线观看黄色视频的| 久久影院123| 免费在线观看视频国产中文字幕亚洲 | 日韩电影二区| 精品久久久久久久毛片微露脸 | 亚洲色图综合在线观看| 又紧又爽又黄一区二区| 国产日韩欧美在线精品| 欧美午夜高清在线| cao死你这个sao货| e午夜精品久久久久久久| 久久国产亚洲av麻豆专区| 超碰97精品在线观看| 激情视频va一区二区三区| 日韩电影二区| 亚洲欧美一区二区三区黑人| 久久精品久久久久久噜噜老黄| 久久久久精品国产欧美久久久 | 精品国产一区二区三区四区第35| 90打野战视频偷拍视频| 国产精品成人在线| 欧美少妇被猛烈插入视频| a级毛片黄视频| 日韩中文字幕欧美一区二区| 午夜福利乱码中文字幕| 国内毛片毛片毛片毛片毛片| 黄色视频,在线免费观看| 亚洲人成电影免费在线| 久久精品久久久久久噜噜老黄| 亚洲精品国产色婷婷电影| 成年人午夜在线观看视频| 国产日韩欧美亚洲二区| 黄色视频不卡| 大香蕉久久成人网| 久久久久久亚洲精品国产蜜桃av| 91精品伊人久久大香线蕉| 国产高清视频在线播放一区 | 亚洲 欧美一区二区三区| 日韩一区二区三区影片| 精品国产一区二区三区四区第35| 国产欧美亚洲国产| 久久精品成人免费网站| av又黄又爽大尺度在线免费看| 精品少妇久久久久久888优播| 亚洲精品第二区| h视频一区二区三区| 久久国产精品大桥未久av| 欧美日韩一级在线毛片| 两个人看的免费小视频| 一边摸一边抽搐一进一出视频| 人人妻,人人澡人人爽秒播| 欧美日本中文国产一区发布| a级毛片在线看网站| 欧美另类亚洲清纯唯美| 不卡av一区二区三区| av在线app专区| 日韩,欧美,国产一区二区三区| 国产黄色免费在线视频| 久久久国产一区二区| 国产精品熟女久久久久浪| 天天影视国产精品| 香蕉丝袜av| 日韩大片免费观看网站| 女人爽到高潮嗷嗷叫在线视频| 18禁观看日本| 国产免费视频播放在线视频| 在线 av 中文字幕| 老熟女久久久| 99精国产麻豆久久婷婷| 国产成人av教育| 日日摸夜夜添夜夜添小说| 美女视频免费永久观看网站| 人人妻人人爽人人添夜夜欢视频| 日韩人妻精品一区2区三区| 精品久久蜜臀av无| 精品国产国语对白av| 久久精品国产a三级三级三级| 国产一区二区三区综合在线观看| 十八禁人妻一区二区| 自拍欧美九色日韩亚洲蝌蚪91| 亚洲va日本ⅴa欧美va伊人久久 | 肉色欧美久久久久久久蜜桃| av片东京热男人的天堂| 久久 成人 亚洲| 午夜视频精品福利| 久久久久精品人妻al黑| 一区在线观看完整版| 国产精品一区二区免费欧美 | a级毛片在线看网站| 国产高清国产精品国产三级| 老熟妇乱子伦视频在线观看 | 老鸭窝网址在线观看| 老司机福利观看| 色婷婷久久久亚洲欧美| 丝袜喷水一区| 免费女性裸体啪啪无遮挡网站| 在线av久久热| 亚洲专区字幕在线| 99国产极品粉嫩在线观看| 美女脱内裤让男人舔精品视频| 日韩一卡2卡3卡4卡2021年| 亚洲中文日韩欧美视频| 日韩制服丝袜自拍偷拍| 精品乱码久久久久久99久播| 亚洲精品自拍成人| av一本久久久久| 欧美日韩av久久| 亚洲第一青青草原| 中文欧美无线码| 免费在线观看日本一区| 国产成人欧美| 日韩,欧美,国产一区二区三区| 久9热在线精品视频| 色视频在线一区二区三区| 老司机靠b影院| 黄色视频不卡| 久久这里只有精品19| 色播在线永久视频| 天天躁夜夜躁狠狠躁躁| 色94色欧美一区二区| e午夜精品久久久久久久| 夜夜骑夜夜射夜夜干| 国产一区有黄有色的免费视频| 最近中文字幕2019免费版| 精品一区二区三区四区五区乱码| 精品高清国产在线一区| 欧美日韩亚洲高清精品| 欧美日本中文国产一区发布| 99久久国产精品久久久| 精品国产国语对白av| 波多野结衣av一区二区av| 永久免费av网站大全| 亚洲精品国产色婷婷电影| 亚洲精品在线美女| 亚洲国产日韩一区二区| 国产成人一区二区三区免费视频网站| 午夜福利视频精品| 老熟女久久久| 国产伦人伦偷精品视频| 国产成人啪精品午夜网站| 久久久久国产精品人妻一区二区| 国产精品国产av在线观看| 在线观看免费日韩欧美大片| 国产成人av激情在线播放| 91字幕亚洲| 日韩欧美免费精品| 首页视频小说图片口味搜索| 欧美激情久久久久久爽电影 | 国产福利在线免费观看视频| 欧美日韩福利视频一区二区| 日日摸夜夜添夜夜添小说| 国产精品影院久久| 性色av乱码一区二区三区2| 亚洲综合色网址| 99热全是精品| 在线天堂中文资源库| 99久久精品国产亚洲精品| 国产精品久久久久成人av| 精品一品国产午夜福利视频| 一级,二级,三级黄色视频| 久久热在线av| 天天躁夜夜躁狠狠躁躁| 亚洲av电影在线进入| 精品欧美一区二区三区在线| 黄色视频在线播放观看不卡| 1024香蕉在线观看| 久久九九热精品免费| 亚洲中文日韩欧美视频| 亚洲成人免费av在线播放| 91av网站免费观看| www.熟女人妻精品国产| 好男人电影高清在线观看| 精品国产一区二区三区久久久樱花| 一本色道久久久久久精品综合| 97人妻天天添夜夜摸| 91精品三级在线观看| 亚洲伊人久久精品综合| 热99国产精品久久久久久7| 欧美午夜高清在线| 在线观看免费午夜福利视频| 在线 av 中文字幕| 亚洲av美国av| 国产成人免费观看mmmm| 美女国产高潮福利片在线看| 国产不卡av网站在线观看| 美女主播在线视频| 中文字幕精品免费在线观看视频| 久热这里只有精品99| 制服诱惑二区| 又黄又粗又硬又大视频| 国产免费av片在线观看野外av| 成年人黄色毛片网站| 精品国产国语对白av| 亚洲精品久久成人aⅴ小说| 如日韩欧美国产精品一区二区三区| 国产免费视频播放在线视频| tube8黄色片| 汤姆久久久久久久影院中文字幕| 精品高清国产在线一区| 国产淫语在线视频| 国产黄频视频在线观看| 真人做人爱边吃奶动态| 啦啦啦免费观看视频1| 成人手机av| 精品久久久精品久久久| 久热这里只有精品99| 久久久国产成人免费| 国产精品久久久久成人av| 宅男免费午夜| 热99re8久久精品国产| 色老头精品视频在线观看| 亚洲精品久久成人aⅴ小说| 欧美日韩福利视频一区二区| 老司机深夜福利视频在线观看 | 久久久久精品国产欧美久久久 | videosex国产| 人妻久久中文字幕网| 天堂俺去俺来也www色官网| 久久女婷五月综合色啪小说| 欧美中文综合在线视频| 国产精品久久久久久精品古装| 美女脱内裤让男人舔精品视频| 国产精品一区二区在线不卡| 黑人巨大精品欧美一区二区蜜桃| 伊人亚洲综合成人网| 一级毛片精品| 国产成人系列免费观看| 久久性视频一级片| 欧美乱码精品一区二区三区| 久久精品熟女亚洲av麻豆精品| 波多野结衣一区麻豆| 女性被躁到高潮视频| 美女高潮到喷水免费观看| 欧美少妇被猛烈插入视频| 99久久人妻综合| 亚洲精品日韩在线中文字幕| 国产成人免费无遮挡视频| av欧美777| 亚洲一卡2卡3卡4卡5卡精品中文| 男人爽女人下面视频在线观看| 99re6热这里在线精品视频| 在线av久久热| 另类精品久久| 男女免费视频国产| 啦啦啦视频在线资源免费观看| 天天影视国产精品| 国产精品成人在线| 国产在视频线精品| 高清视频免费观看一区二区| 人妻久久中文字幕网| 久久久久久久国产电影| 亚洲国产精品一区二区三区在线| 黄色怎么调成土黄色| 久久精品熟女亚洲av麻豆精品| 久久精品久久久久久噜噜老黄| 下体分泌物呈黄色| 日本黄色日本黄色录像| 2018国产大陆天天弄谢| www.自偷自拍.com| 18在线观看网站| 欧美乱码精品一区二区三区| 欧美黄色片欧美黄色片| 最新在线观看一区二区三区| 热re99久久精品国产66热6| 亚洲av日韩在线播放| 少妇猛男粗大的猛烈进出视频| 18禁国产床啪视频网站| 777米奇影视久久| 伊人久久大香线蕉亚洲五| 中亚洲国语对白在线视频| 少妇猛男粗大的猛烈进出视频| 国产一卡二卡三卡精品| 大码成人一级视频| 丝袜在线中文字幕| 伊人亚洲综合成人网| netflix在线观看网站| 国产免费av片在线观看野外av| 国产精品亚洲av一区麻豆| 999久久久精品免费观看国产| 最近中文字幕2019免费版| 欧美大码av| 国产日韩欧美亚洲二区| 国产精品成人在线| a 毛片基地| 国产精品自产拍在线观看55亚洲 | 久久久久久久久久久久大奶| 国产成人免费无遮挡视频| 考比视频在线观看| 国产区一区二久久| 悠悠久久av| 久久久久久久久久久久大奶| 久久国产亚洲av麻豆专区| 亚洲第一青青草原| 亚洲avbb在线观看| 伊人久久大香线蕉亚洲五| 中国美女看黄片| 亚洲自偷自拍图片 自拍| 成人免费观看视频高清| 丰满迷人的少妇在线观看| 日韩 欧美 亚洲 中文字幕| 国产精品二区激情视频| 女人精品久久久久毛片| 女人被躁到高潮嗷嗷叫费观| 男女边摸边吃奶| 亚洲va日本ⅴa欧美va伊人久久 | 可以免费在线观看a视频的电影网站| 韩国精品一区二区三区| 亚洲色图 男人天堂 中文字幕| 亚洲五月色婷婷综合| 亚洲精品中文字幕一二三四区 | 老司机亚洲免费影院| 精品久久久久久久毛片微露脸 | 三上悠亚av全集在线观看| 久久天躁狠狠躁夜夜2o2o| 免费在线观看视频国产中文字幕亚洲 | 亚洲人成电影观看| 老司机深夜福利视频在线观看 | 看免费av毛片| 国产不卡av网站在线观看| 91麻豆av在线| 新久久久久国产一级毛片| 99热国产这里只有精品6| 在线观看www视频免费| 麻豆av在线久日| www日本在线高清视频| 精品久久久久久久毛片微露脸 | 久久人人97超碰香蕉20202| 大香蕉久久成人网| 国产精品一区二区精品视频观看| 成年美女黄网站色视频大全免费| 香蕉国产在线看| 国产精品熟女久久久久浪| 亚洲性夜色夜夜综合| 一区二区三区四区激情视频| 精品乱码久久久久久99久播| 欧美国产精品一级二级三级| 久久狼人影院| 欧美黄色淫秽网站| 女人被躁到高潮嗷嗷叫费观| 两性夫妻黄色片| 热re99久久精品国产66热6| 桃红色精品国产亚洲av| 水蜜桃什么品种好| 日本a在线网址| 亚洲专区字幕在线| 美女脱内裤让男人舔精品视频| 精品高清国产在线一区| 啦啦啦 在线观看视频| 精品国产乱子伦一区二区三区 | 青青草视频在线视频观看| 1024香蕉在线观看| 多毛熟女@视频| 久久精品aⅴ一区二区三区四区| 国产激情久久老熟女| 天天影视国产精品| 777米奇影视久久| 亚洲第一av免费看| 首页视频小说图片口味搜索| 国产野战对白在线观看| 99久久精品国产亚洲精品| 日韩制服丝袜自拍偷拍| 别揉我奶头~嗯~啊~动态视频 | 成人黄色视频免费在线看| 久久久久久免费高清国产稀缺| 国产黄色免费在线视频| 少妇 在线观看| 久久久久国内视频| 欧美成人午夜精品| 最新的欧美精品一区二区| 久久人人爽人人片av| 久久久久久久久久久久大奶| 美女国产高潮福利片在线看| www.av在线官网国产| 脱女人内裤的视频| 久久久久精品人妻al黑| 午夜免费鲁丝| 十八禁网站网址无遮挡| 人人妻人人添人人爽欧美一区卜| 国产精品二区激情视频| 久久青草综合色| 亚洲精品国产精品久久久不卡| 国精品久久久久久国模美| 久久久水蜜桃国产精品网| 亚洲精品av麻豆狂野| 国产精品九九99| 免费在线观看日本一区| 十八禁网站网址无遮挡| 国产成人av激情在线播放| 男女床上黄色一级片免费看| 欧美大码av| 宅男免费午夜| 久久人人爽av亚洲精品天堂| 国产一卡二卡三卡精品| 一级毛片电影观看| 午夜免费观看性视频| 丰满人妻熟妇乱又伦精品不卡| av欧美777| 制服人妻中文乱码| 亚洲国产精品999| 人人妻人人添人人爽欧美一区卜| 啦啦啦 在线观看视频| 国产成人免费无遮挡视频| 久久女婷五月综合色啪小说| 国产免费一区二区三区四区乱码| 99国产综合亚洲精品| 欧美人与性动交α欧美软件| 亚洲一码二码三码区别大吗| 国产精品久久久久久精品电影小说| 一级片免费观看大全| 国产亚洲av高清不卡| 欧美日韩视频精品一区| 女人被躁到高潮嗷嗷叫费观| 操出白浆在线播放| 日本五十路高清| 色婷婷av一区二区三区视频| 精品亚洲成a人片在线观看| 欧美黄色淫秽网站| 天天躁狠狠躁夜夜躁狠狠躁| 狂野欧美激情性xxxx| 精品一区二区三卡| 欧美国产精品一级二级三级| 亚洲第一青青草原| 久久久久久久精品精品| 国产在线视频一区二区| 99国产精品99久久久久| 国产精品自产拍在线观看55亚洲 | 香蕉国产在线看| 久久久久久久国产电影| 日韩一卡2卡3卡4卡2021年| 国产精品久久久av美女十八| 国产激情久久老熟女| 另类亚洲欧美激情| 久久国产精品人妻蜜桃| www.av在线官网国产| netflix在线观看网站| 狠狠婷婷综合久久久久久88av| 一边摸一边抽搐一进一出视频| 午夜福利在线观看吧| 日韩一区二区三区影片| 亚洲熟女精品中文字幕| www.自偷自拍.com| 中文字幕色久视频| avwww免费| 国产一区二区 视频在线| 欧美日本中文国产一区发布| 欧美另类一区| av视频免费观看在线观看| 精品第一国产精品| 国产亚洲欧美在线一区二区| av电影中文网址| 啪啪无遮挡十八禁网站| 午夜两性在线视频| 中文字幕人妻熟女乱码| 久久精品国产a三级三级三级| 亚洲第一欧美日韩一区二区三区 | 三上悠亚av全集在线观看| 菩萨蛮人人尽说江南好唐韦庄| 午夜福利视频在线观看免费| 777米奇影视久久| 美女午夜性视频免费| 久久ye,这里只有精品| 岛国毛片在线播放| 一本久久精品| 啪啪无遮挡十八禁网站| 国产亚洲av高清不卡| 久久香蕉激情| 涩涩av久久男人的天堂| 亚洲avbb在线观看| 久久av网站| 中文字幕av电影在线播放| 久久人妻福利社区极品人妻图片| 一本综合久久免费| 最近最新中文字幕大全免费视频| 美女福利国产在线| 欧美黑人欧美精品刺激| 淫妇啪啪啪对白视频 | 国产精品九九99| 丰满迷人的少妇在线观看| 人妻 亚洲 视频| 国产男人的电影天堂91| 老熟女久久久| 99香蕉大伊视频| 亚洲三区欧美一区| 亚洲一码二码三码区别大吗| 亚洲专区字幕在线| 99国产综合亚洲精品| 欧美精品亚洲一区二区| 亚洲色图 男人天堂 中文字幕| 亚洲全国av大片| 精品欧美一区二区三区在线| 国产伦理片在线播放av一区| 精品卡一卡二卡四卡免费| 国产伦人伦偷精品视频| 亚洲成人免费电影在线观看|