• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Cryptanalysis and Improvement of a Chaotic Map-Control-Based and the Plain Image-Related Cryptosystem

    2019-11-26 07:39:04BinLu1FenlinLiu1XinGe1andZhenyuLi
    Computers Materials&Continua 2019年11期

    Bin Lu1,Fenlin Liu1, Xin Ge1,* and Zhenyu Li

    Abstract:Due to the characteristics of chaotic systems,different cryptosystems based on chaos have been proposed to satisfy the security of multimedia data.A plain image-related chaotic algorithm is proposed by Luo et al.with high speed and efficiency.Security weaknesses of the cryptosystem are studied in this paper.It is found that the important secret key information is leaked because an important parameter can be obtained after an inverse operation in the last step of the cryptosystems without secret key.Meanwhile,the value zero is processed improperly in quantification algorithm.Based on the weaknesses,chosen plaintext attack on the cryptosystem is proposed,by which,an important parameter,equivalent to secret key,can be calculated with a specific chosen plain image.With the obtained parameter,the plain image of any ciphered image,encrypted by the cryptosystem,can be recovered.Then,an improvement is proposed to solve the problems after modifying the quantification algorithm.It is from the experiments that chosen plaintext attack is valid and improved algorithm possesses better performance.

    Keywords:Multimedia cryptosystem,cryptanalysis,chaos,chosen plaintext attack.

    1 Introduction

    With the continuous development of mobile communication technology,social networks are gradually integrating into people’s life,which deeply affects our work habits,daily life and way of thinking.Images and videos,as important multimedia in social networks,involve a large number of important information about individuals and organizations.The protection of multimedia data has become an urgent problem for social network security.There are many ways to protect multimedia data,such as encryption [Fridrich (1998);Ge,Lu,Liu et al.(2016);Luo,Cao,Qiu et al.(2016)],information hiding [Xiong and Shi(2018)] and so on.Encryption as a basic data protection method has attracted more attention.Traditional cryptosystems possess relatively high security,but it is difficult to meet the requirements of massive data encryption in social networks due to their complex operations.The encryption technique based on chaos theory [Matthews (1989);Fridrich(1998)] is regarded to be a new choice considering its good cryptographic properties,such as the extreme sensitivity of the parameters,good pseudo randomness and so on.

    Some cryptosystems based on chaos are proposed in order to improve the security of images [Hua and Zhou (2016);Chen,Mao and Chui (2004);Xiang,Hu and Sun (2015);Chai,Fu,Gan et al.(2019)] and videos [Lin,Yu,Lu et al.(2015)].But some algorithms[Fridrich (1998);Lian (2009);Ye (2010)] are suffered from security problems due to important information leakage such as secret key information leakage,plain image information leakage.For examples,the hyper chaotic mage/video algorithm in [Lian(2009)] is broken due to the re-usage of keystream which equals to the secret key [Ge,Liu,Lu et al.(2011)];Fridrich’s chaotic image encryption [Fridrich (1998)] is broken by using influence network between cipher-pixels and the corresponding plain-pixels [Xie,Li,Yu et al.(2017)];Ye’s algorithm [Ye (2010)] is broken because the secret permutation does not change the values of the permuted elements [Li and Lo (2011)].

    As one of the candidate algorithms,a chaotic map-control-based and the plain imagerelated cryptosystem [Luo,Cao,Qiu et al.(2016)] is proposed by Luo et al.(refers to as Luo algorithm in this paper),which is sensitive to both the secret key and the plain image,with high speed and efficiency.However,a key parameter generated from secret key and plaintext is embedded into the ciphertext,and it can be extracted after an inverse operation,which resulting in important information leaking of the secret key.Meanwhile,it is also a weakness by substituting zero with constant in quantification algorithm.In this paper,chosen plaintext attack on Luo algorithm is proposed with the secret key information leakage and the defect of the quantification algorithm.Then an improvement is proposed to solve the problem by improving the quantification algorithm and embedding the key parameter with secret key.Experiments and analysis show the validity of chosen plaintext attack and the security of improved algorithm.

    The rest of the paper is organized as follows.Luo algorithm is briefly described in Section 2.A chosen plaintext attack is proposed after analyzing on the defect of Luo algorithm in Section 3.An improved algorithm is proposed in Section 4.Experimental results and analyses are reported in Section 5.

    2 Luo algorithm

    Luo algorithm is a single round encryption algorithm,including pixel value diffusion and pixel position scrambling.For an plain imageof sizesecret keyisNbytes,ciphered image ofcan be denoted byThe procedure of Luo algorithm is briefly described below.

    Then generate parameterJby applying quantification algorithm on

    Quantification algorithmQ(M)

    For any matrixM= (mi,j)W×V,the quantification algorithm multiply each element ofMand get a sequence of products noted asMEj,j= 1,2,…,W×V.Judge and ensure each value ofbe smaller than 1014.MEjis replaced by the multiplication of all digits in the decimal representation ofMEjwhenMEj>1014.To avoid the product equals to 0,digit number ‘0’ is replaced byandaccording to the position before multiplication.LetThenD2is calculated by multiplying the elements ofMin reverse order with the above steps.Finally,calculate

    (3)Generate the pixel permutation vectorsand the divisor parameteraccording

    (4)Pixel value diffusion:Divide the (8i+j)thpixel valueofPby 2ki,get the corresponding quotientv8i+jand remainderr8i+j.Pixel valueq8i+jof the image after the pixel value diffusionis calculated by

    (5)Pixel position permutation:PermuteQ= (qi,j)L×Hwith permutation vectorsanddenote the result bywhere

    (6)Embed the parameterIintoD= (di,j)L×H:Ican be denoted byI=0.I1…I8with eight integersI1,…,I8among 0 to 99 becauseIis a 10-15precision decimal.EmbedI1,…,I8intoin fixed positions.

    (7)ReprocessD= (di,j)L×Hby a round of bit-XOR operation and obtain the ciphertextwherei= 1,2,…,H-1,j= 1,2,…,L-1.

    3 Cryptanalysis of Luo algorithm

    In Luo algorithm,pixel value diffusion and pixel position permutation are both based on chaotic sequence.Considering chaotic system,its control parameter is public,initial value is calculated byI,Jwhich are obtained by the quantification algorithm with secret key and plain image.IfI,Jare recovered by attacker,the initial value can be recovered,then the chaotic sequence can be obtained,and plain image can be correctly recovered.Therefore,key parameterI,Jare important for the security of the algorithm.

    3.1 Cryptanalysis on key parameter

    Firstly,analysis on parameterI:According to Steps (6)and (7)of Luo algorithm,Iis publicly embedded into imagedirectly by substituting the corresponding values of fixed pixels,andD= (di,j)L×Hcan be obtained after a round of reverse bit-XOR operation onC= (ci,j)L×H.So the attacker can extractIwithout secret key.

    Secondly,analysis on parameterJ:parameterJandIare both calculated by quantification algorithm.The difference is that the calculation ofJdepends only on the secret key,while that ofIdepends not only on the secret key but also the plain image.IfIhas been obtained by the attacker,part information ofJwould also be leaked.And the leaking information ofJis explored in Proposition 1.

    Proposition 1.ParameterJsatisfiesJ=Iif plain imageP= (pi,j)L×HsatisfiesL=N,pi,j=1for alli=1,2,…,L,j=1,2,…,H,whereNis the number of secret key bytesK=K1K2…KN.

    Proof:According to quantification algorithm in the generation of parameterJ,J= ((E1+E2)mod 1 014)× 1 0-14whereE1=K1?K2?…?KN,E2=KN?KN-1?…?K1,?denotes the multiplication defined in quantification algorithm.

    According to the generation of parameterI,I=Q(A)=((D1+D2)mod1014)× 1 0-14,whereA=(ai,j)L×(H+1)(see Eq.(1)).

    If plain imageP= (pi,j)L×HsatisfiesL=N,pi,j=1for alli=1,2,…,L,j=1,2,…,H,whereNis the number of secret key bytesK=K1K2…KN,then matrixA=(ai,j)L×(H+1)equals to:

    Then

    D1=1?1?…?K1?1?…?K2?…?KN=K1?K2?…?KN

    D2=KN?1?…?KN-1?1?…?K1?…?1=KN?KN-1…?K2?K1

    SoE1=D1andE2=D2,therefore

    J=((E1+E2)mod1014)× 1 0-14=((D1+D2)mod1014)× 1 0-14=I.□

    Note.According to Proposition 1,we can design a chosen plaintext attack,in which the chosen plain image satisfies the conditions of Proposition 1,the parameterJcan be recovered from the ciphertext of the chosen plain image.

    3.2 Chosen plaintext attack

    According to the analysis above,a chosen plaintext attack (CPA)is proposed in this subsection.The goal of the attack is to recover the parameterJinstead of secret key,and then any ciphered image can be correctly recovered with the parameterJ.The details of CPA are shown as follows.

    (1)Recover the key parameterJ

    (1.1)Construct a plain imageQ= (qi,j)N×H,whereNis the bytes number of secret keyK,qi,j=1for alli=1,2,…,L,j=1,2,…,H.InputQ= (qi,j)N×Hinto encryption machine,obtain the ciphered imageCT= (cti,j)N×H.

    (1.2)CalculateCT′= (cti′,j)N×HwithCT= (cti,j)N×Hbyct'i,j+1=cti,j+1⊕ct'i,j,ct'i+1,1=cti+1,1⊕ct'i,1,i= 1,2,…,H-1,j= 1,2,…,L-1.

    (1.3)Extract pixels’ values from fixed position ofand denote them bythen recover the parameterI′=0.a1…a8.So obtainJ=I′=0.a1…a8according to Proposition 1.

    (2)Recover any ciphered image with key parameterJ:

    (2.1)CalculateCW×Vwithbyj= 1,2,…,V-1.

    (2.2)Extract pixels’ values from fixed position ofdenote them byb1,…b8,and constructI=0.b1…b8.

    (2.3)Calculate the initial valueof Tent map withIandJ:

    (2.4)Iterate Tent map with initial valuefor 200 times,obtain the chaotic sequence.

    Note.According to Proposition 1,we know thatJ=I′=0.a1…a8,so initial valuex0obtained by the attack is correct.Therefore any ciphered image can be correctly recovered.

    Although,to resist the CPA above,the cryptology designer could modify the encryption algorithm easily by refusing to encrypt the plain image whose row number equals to the number of secret key bytes.Security problem still exists because the quantification algorithmQ(M)=Q(m1,m2,…,mn)deals with the value '0' improperly.According to the procedure of quantification algorithm,D1=m1?m2?…?mn.Ifmiequals to 0,thenD1=m1?m2?…?mi?mi+1?…?mn=m1?m2?…?0?mi+1?…?mn=c?mi+1?…?mn,wherecis a constant number.So another more complicated chosen plaintext attack algorithm can be designed.

    4 Improvement of Luo algorithm

    From the analyses in Section 3,Luo algorithm mainly has several weaknesses:(1)The parameterIcan be obtained,and leaks part information of secret key.Especially,when plain image satisfies the conditions of Proposition 1,the key parameterJequals toI,which means that the information of secret key is leaked completely.(2)The inverse operation of the last step of Luo algorithm (step (7))can be performed without secret key,so the step has no validity for security.(3)The quantification algorithm of Luo algorithm deals with the value ‘0’ improperly.In order to solve the above problems,an improvement of Luo algorithm is proposed in the section.The improved algorithm is proposed after the modification of quantification algorithm.

    4.1 Improvement of quantification algorithm

    In the improvement of quantification algorithm,irrational numberpjis introduced whenmi=0,in order to overcome the weakness that the quantification algorithm of Luo algorithm deals with the value ‘0’ improperly.

    4.2 Improvement of Luo algorithm

    In the improvement of Luo algorithm,the chaotic system,the control parameter and the secret key are the same as the original Luo algorithm.Letbe the secret key,be the plain image of sizewhere pixelThe improved Luo algorithm is described below:

    (2)Iterate Tent map with initial valuefornbtimes(nbis a large constant integer negotiated by encryption and decryption parties)to avoid the non-randomness,continue to iterate Tent map and obtain a chaotic sequence,whereis the maximum significant number of operations when implementation of encryption algorithm performed under finite precision operations,for examplenv=15.

    (3)Calculate the parameterIandJwith the new quantification algorithm in section 4.1.That isand

    (4)Calculate another initial valuex0of Tent map with Eq.(5).

    Iterate Tent map with initial valuex0fornctimes (ncis a large constant negotiated by encryption and decryption parties),and continue to iterate Tent map and obtain a chaotic sequenceoflength (is the positive integer negotiated in advance,for examplenp=8).

    (6)ConvertP= (pi,j)L×Hinto a one-dimensional vectorP=(p0,p1,…,pL×H-1),and then diffuse the pixel values with Eq.(6),denote the result of diffusion asQ= (q0,q1,…,qL×H-1).

    wherei= 0,1,…,L×H-1,<<is left cyclic shift operation.ConvertQ= (q0,q1,…,qL×H-1)into a two-dimensional matrixQ= (qi,j)L×H.

    (9)CalculateT= (t0,…tL+H-1)with chaotic sequenceproduced in step (1),whereti=~xu+i?256,and the ciphertextC= (ci,j)L×Hcan be obtained by Eq.(7).

    Decryption procedure is the inverse procedure of encryption.

    In the improved algorithm,another chaotic sequence,generated with initial value(is calculated from secret key),is introduced.The first part ofis used to produce the embedding positions of key parameterI,as a result,the positions are determined by secret key,and the attacker cannot getIwithout secret key,which guards against the information leakages of secret key.The second part ofis used to diffuse the pixel values (in Step (9)),thus the attacker can’t reverse Step (9)without secret key,which is useful to resist statistical analysis attacks and differential attacks.In summary,the improved algorithm is more secure than the original Luo algorithm.

    5 Experiments

    In this section,the correctness of chosen plaintext attack on Luo algorithm is tested,and experiments on the improved algorithm is carried out.Experiments are performed with double precision floating point numbers represented by 64 bits specified in IEEE on the PC in the Matlab2013a environment.

    5.1 Experiments on CPA

    According to section 3,CPA is proposed on Luo algorithm.Correctness of the attack is verified by experiments below.

    Luo algorithm is first implemented,where secret keyKeyis 64 bytes generated randomly,control parameter of Tent map is 0.76589,and the embedding positions of parameterIareFig.1(a)of size 512×512is encrypted with Luo algorithm,and the ciphered image is shown in Fig.1(b).

    Figure1:Plain image and its ciphered image

    Figure2:Chosen image and its ciphered image

    CPA on Luo algorithm is then implemented with chosen plain image of 64×64(shown in Fig.2(a)).According to the procedure of CPA,Fig.2(a)is encrypted with Luo algorithm and the ciphered image is shown in Fig.2(b),then key parameterJis obtained 0.025167271329850.With key parameterJ,the plain image of any ciphered image encrypted with Luo algorithm can be correctly recovered.The ciphered image in Fig.1(b)is taken as an example,and the recovered plain image is shown in Fig.3.It is clear that the chosen plaintext attack in Section 3 is correct.

    Figure3:Result of chosen plaintext attack

    5.2 Experiments on improved algorithm

    Experimental results on improvement are carried out in this section.In the experiments,secret keyKeyis 64 bytes generated randomly,control parameter of Tent map is 0.76589.

    The plain and ciphered image is shown in Fig.4(a)and Fig.4(b)respectively.The histogram of plain image is shown in Fig.5(a),and that of ciphered image is shown in Fig.5(b).It is obvious that the histogram of ciphered image has a more uniform distribution.

    Figure4:Plain and ciphered image with improved algorithm

    Figure5:Histogram of plain image and ciphered image with improved algorithm

    (1)Statistical analysis

    Generally,high correlation exists among adjacent pixels for natural images in horizontal,vertical and diagonal directions.Therefore,the correlation between two adjacent pixels should be reduced in the ciphered image to withstand statistical attack.The correlation can be measured by correlation coefficient,which can be calculated by Eq.(8).

    wherexandyare gray-scale values of two adjacent pixels,and,

    It is expected that the correlation coefficient of plain image should be close to 1 while that of the ciphered image should be close to 0.

    In experiments,4096 pairs of two adjacent pixels of image in three directions are randomly selected for the calculation of the correlation coefficients.

    Taking image “Deer” (Fig.4(a))and its ciphered image (Fig.4(b))as an example,the distributions of randomly selected 4096 pairs of two adjacent pixels in three directions are shown in Fig.6 respectively.And then correlation coefficients of plain and ciphered image are calculated.The correlation coefficients of plain image for horizontally,vertically and diagonally adjacent pixels are 0.948904,0.979602 and 0.929812 respectively;and those of ciphered image are -0.003246,-0.034536 and -0.011568 respectively.According to the results,we find that the correlation coefficients between the pixels in three directions after encryption by with the improved algorithm are greatly reduced,and the correlation is destroyed to a great extent.

    Figure6:Correlation distributions of adjacent pixels in plain and ciphered images(2)Key sensitivity test

    For key sensitivity test,we make a tiny change in the secret key,change one bit of the secret key and keep other parameters unchanged,then decrypt the ciphered image with the changed key.The experimental results are shown in Fig.7.Decryption result with the changed key is shown in Fig.7(a)and difference between decryption with the changed and original key is shown in Fig.7(b).The rate of different pixels in the two images is about 93%,which means that nothing can be recovered as long as the attacker has tiny error of secret key.Therefore the improved algorithm is sensitive to the change of secret key.

    Figure7:Key sensitivity test

    6 Conclusions

    In this paper,we study the security weaknesses of Luo algorithm,important information leaking of the secret key is found because a key parameterIcan be extracted after an inverse operation.And it is also a weakness by substituting zero with constant in quantification algorithm.Based on the weaknesses,CPA attack on the cryptosystem is proposed.Meanwhile,to solve the problems,an improvement is proposed after modifying the quantification algorithm.Finally,experiments and analyses show the validity of chosen plaintext attack and the security of improved algorithm.

    Acknowledgement:The work described in this paper was partially supported by the National Natural Science Foundation of China (Grant No.61601517),basic and advanced technology research project of Henan Province,China (Grant No.2014302703).

    国产在线精品亚洲第一网站| 国产视频一区二区在线看| a级一级毛片免费在线观看| 精品人妻熟女av久视频| 午夜福利视频1000在线观看| 亚洲四区av| 简卡轻食公司| 国产黄色视频一区二区在线观看 | 白带黄色成豆腐渣| 国产精品乱码一区二三区的特点| 搡老熟女国产l中国老女人| 人妻制服诱惑在线中文字幕| 人人妻人人澡人人爽人人夜夜 | 国产精品综合久久久久久久免费| 国产一区二区亚洲精品在线观看| 亚洲欧美日韩高清专用| av专区在线播放| 免费观看在线日韩| 久久精品影院6| 给我免费播放毛片高清在线观看| 淫妇啪啪啪对白视频| 欧美不卡视频在线免费观看| 日韩欧美一区二区三区在线观看| 亚洲va在线va天堂va国产| 亚洲不卡免费看| 国内精品一区二区在线观看| 日韩精品有码人妻一区| 欧美成人一区二区免费高清观看| 99热这里只有是精品50| 一进一出抽搐gif免费好疼| 亚州av有码| 俺也久久电影网| 亚洲第一电影网av| 永久网站在线| 久久久精品94久久精品| 桃色一区二区三区在线观看| 久久久久久久久久成人| 日本与韩国留学比较| 午夜影院日韩av| 3wmmmm亚洲av在线观看| 日韩制服骚丝袜av| 国产精品一区二区三区四区久久| 亚洲精品久久国产高清桃花| 人妻久久中文字幕网| 真实男女啪啪啪动态图| 欧美人与善性xxx| av在线观看视频网站免费| 久久久精品94久久精品| 国产精品伦人一区二区| 亚洲经典国产精华液单| 91麻豆精品激情在线观看国产| av卡一久久| 九九爱精品视频在线观看| 91狼人影院| 亚洲中文日韩欧美视频| 日韩成人伦理影院| 欧美高清成人免费视频www| 看片在线看免费视频| 国产成人a区在线观看| 国产色爽女视频免费观看| 成人综合一区亚洲| 赤兔流量卡办理| 亚洲av五月六月丁香网| 一区二区三区高清视频在线| 亚洲成人精品中文字幕电影| 久久久久久久久久黄片| 女生性感内裤真人,穿戴方法视频| 国产精品女同一区二区软件| 欧美性猛交黑人性爽| 热99在线观看视频| 久久中文看片网| 99久久精品热视频| 俄罗斯特黄特色一大片| 亚洲人成网站在线播| 伦理电影大哥的女人| 男人舔奶头视频| 人人妻人人澡欧美一区二区| 国产三级在线视频| 日本色播在线视频| 国产高清激情床上av| 男女做爰动态图高潮gif福利片| 国内揄拍国产精品人妻在线| 婷婷色综合大香蕉| 亚洲av美国av| 我要搜黄色片| 在线免费观看不下载黄p国产| 日本在线视频免费播放| 国产免费一级a男人的天堂| 免费高清视频大片| 在线看三级毛片| 久久九九热精品免费| 精品午夜福利视频在线观看一区| 欧美成人精品欧美一级黄| 久久精品国产清高在天天线| 精品乱码久久久久久99久播| 亚洲性夜色夜夜综合| 欧美色视频一区免费| 国产又黄又爽又无遮挡在线| 两性午夜刺激爽爽歪歪视频在线观看| 99久久无色码亚洲精品果冻| 97热精品久久久久久| 精品免费久久久久久久清纯| а√天堂www在线а√下载| 最后的刺客免费高清国语| 日韩 亚洲 欧美在线| 国产av一区在线观看免费| 亚洲无线观看免费| 身体一侧抽搐| 日本 av在线| 国产精品三级大全| 午夜精品在线福利| 99久国产av精品| 小蜜桃在线观看免费完整版高清| 久久鲁丝午夜福利片| 亚洲人成网站在线播放欧美日韩| 亚洲自拍偷在线| 亚洲自偷自拍三级| 高清毛片免费观看视频网站| 99久国产av精品| 国内精品久久久久精免费| 欧美绝顶高潮抽搐喷水| 精品福利观看| 日本-黄色视频高清免费观看| www日本黄色视频网| 亚洲国产欧洲综合997久久,| 亚洲欧美日韩卡通动漫| 人妻少妇偷人精品九色| 久久草成人影院| 亚洲国产精品久久男人天堂| 亚洲最大成人中文| 两个人的视频大全免费| 少妇被粗大猛烈的视频| or卡值多少钱| 国产人妻一区二区三区在| 国产综合懂色| 国产免费男女视频| 男女啪啪激烈高潮av片| 久久6这里有精品| 久久久a久久爽久久v久久| 日韩欧美 国产精品| 久久久久久大精品| 精品日产1卡2卡| 亚洲经典国产精华液单| 淫秽高清视频在线观看| 尤物成人国产欧美一区二区三区| 亚洲精品在线观看二区| 午夜老司机福利剧场| 欧美最黄视频在线播放免费| 久久人人精品亚洲av| 美女内射精品一级片tv| 亚洲图色成人| 亚洲久久久久久中文字幕| 一级毛片电影观看 | 国产精品一区www在线观看| 中文字幕精品亚洲无线码一区| 一本精品99久久精品77| 日本熟妇午夜| 自拍偷自拍亚洲精品老妇| 淫秽高清视频在线观看| 乱系列少妇在线播放| 欧美人与善性xxx| 免费av毛片视频| 成人性生交大片免费视频hd| av福利片在线观看| 欧美性感艳星| 国产色婷婷99| 2021天堂中文幕一二区在线观| 女人十人毛片免费观看3o分钟| 老师上课跳d突然被开到最大视频| 我的老师免费观看完整版| 国产一区二区三区在线臀色熟女| 午夜福利成人在线免费观看| 91午夜精品亚洲一区二区三区| 国产黄色小视频在线观看| 欧美成人免费av一区二区三区| 欧美绝顶高潮抽搐喷水| 在线天堂最新版资源| 色在线成人网| 国产男人的电影天堂91| 亚洲av熟女| 久久九九热精品免费| 熟女人妻精品中文字幕| 一级av片app| 免费黄网站久久成人精品| 久久久久久久久久成人| 22中文网久久字幕| 久久久久久久久大av| 毛片一级片免费看久久久久| 国产v大片淫在线免费观看| 精品少妇黑人巨大在线播放 | 亚洲国产精品久久男人天堂| 人人妻人人澡欧美一区二区| 性色avwww在线观看| 18+在线观看网站| 男女做爰动态图高潮gif福利片| 国产人妻一区二区三区在| 成人高潮视频无遮挡免费网站| 美女黄网站色视频| 亚洲av不卡在线观看| 国产一级毛片七仙女欲春2| 18禁在线播放成人免费| 日韩大尺度精品在线看网址| 色综合亚洲欧美另类图片| 国产美女午夜福利| 久久精品91蜜桃| 偷拍熟女少妇极品色| 在线播放国产精品三级| 亚洲精品一区av在线观看| 亚洲国产精品成人综合色| 日韩大尺度精品在线看网址| 99热网站在线观看| 国产v大片淫在线免费观看| 精品一区二区三区人妻视频| 少妇猛男粗大的猛烈进出视频 | 大又大粗又爽又黄少妇毛片口| 国产精品乱码一区二三区的特点| 12—13女人毛片做爰片一| 亚洲自偷自拍三级| 久久久色成人| 男女那种视频在线观看| 成年女人看的毛片在线观看| 亚洲精品成人久久久久久| 丰满乱子伦码专区| 插逼视频在线观看| 国产高清激情床上av| 六月丁香七月| 欧美高清性xxxxhd video| 在线国产一区二区在线| 国产爱豆传媒在线观看| 黄片wwwwww| av在线播放精品| 日本黄色片子视频| 免费一级毛片在线播放高清视频| 三级国产精品欧美在线观看| 国产亚洲91精品色在线| 国产欧美日韩一区二区精品| 国产av麻豆久久久久久久| 国产午夜精品久久久久久一区二区三区 | 欧美最新免费一区二区三区| 久久久精品94久久精品| 成人综合一区亚洲| 日日撸夜夜添| 日本三级黄在线观看| av中文乱码字幕在线| 国产精品三级大全| 国产免费一级a男人的天堂| 一区福利在线观看| 亚洲精品国产av成人精品 | 国内少妇人妻偷人精品xxx网站| 国产高清激情床上av| 黄色视频,在线免费观看| 国产麻豆成人av免费视频| 亚洲天堂国产精品一区在线| 一级黄色大片毛片| 久久精品国产亚洲av香蕉五月| 久久久久国内视频| 国产精品乱码一区二三区的特点| a级毛片免费高清观看在线播放| 尤物成人国产欧美一区二区三区| 日韩精品有码人妻一区| 欧美成人精品欧美一级黄| 久久热精品热| 国产亚洲精品久久久com| 亚洲欧美日韩东京热| 有码 亚洲区| 午夜久久久久精精品| 18禁黄网站禁片免费观看直播| 在线免费十八禁| 日本熟妇午夜| 国产伦精品一区二区三区视频9| 久久久精品94久久精品| 久久久久国产精品人妻aⅴ院| 日韩欧美一区二区三区在线观看| 给我免费播放毛片高清在线观看| 国产精品不卡视频一区二区| 久久精品久久久久久噜噜老黄 | 精品一区二区三区av网在线观看| 免费观看在线日韩| 舔av片在线| 亚洲一区高清亚洲精品| 全区人妻精品视频| 狂野欧美激情性xxxx在线观看| 啦啦啦啦在线视频资源| 免费无遮挡裸体视频| 亚洲国产欧洲综合997久久,| 99在线视频只有这里精品首页| 日韩一区二区视频免费看| 成年女人看的毛片在线观看| 国产精品一区二区三区四区久久| 亚洲精品久久国产高清桃花| 免费人成在线观看视频色| 91av网一区二区| 嫩草影院入口| 亚洲精品乱码久久久v下载方式| 亚洲专区国产一区二区| 一区福利在线观看| 亚洲婷婷狠狠爱综合网| 中文字幕久久专区| 亚洲精品亚洲一区二区| 国产亚洲91精品色在线| 最近最新中文字幕大全电影3| 午夜a级毛片| 亚洲一区高清亚洲精品| 亚洲美女黄片视频| 久久精品夜色国产| 22中文网久久字幕| 亚洲成人久久爱视频| 国产一级毛片七仙女欲春2| 欧美xxxx黑人xx丫x性爽| 国产成人freesex在线 | 欧美一级a爱片免费观看看| 久久欧美精品欧美久久欧美| 国产高清有码在线观看视频| 亚洲久久久久久中文字幕| 欧美日韩综合久久久久久| 免费不卡的大黄色大毛片视频在线观看 | 丰满人妻一区二区三区视频av| 日韩高清综合在线| av黄色大香蕉| 婷婷精品国产亚洲av在线| 青春草视频在线免费观看| 搞女人的毛片| 此物有八面人人有两片| 俄罗斯特黄特色一大片| 女的被弄到高潮叫床怎么办| 日本熟妇午夜| 欧美bdsm另类| 简卡轻食公司| 不卡一级毛片| 国产精品嫩草影院av在线观看| 亚洲成人av在线免费| 国产成人a∨麻豆精品| 亚洲国产精品合色在线| 亚洲欧美日韩卡通动漫| 精品福利观看| 成人无遮挡网站| 看十八女毛片水多多多| 久久午夜福利片| 天天一区二区日本电影三级| 69av精品久久久久久| 尾随美女入室| 少妇裸体淫交视频免费看高清| 少妇的逼水好多| 97在线视频观看| 日韩一区二区视频免费看| 哪里可以看免费的av片| 看片在线看免费视频| 色哟哟·www| 啦啦啦观看免费观看视频高清| 国产一区亚洲一区在线观看| 淫妇啪啪啪对白视频| 丰满的人妻完整版| 春色校园在线视频观看| 欧美高清成人免费视频www| 午夜a级毛片| 非洲黑人性xxxx精品又粗又长| 色综合色国产| 国国产精品蜜臀av免费| 亚洲第一电影网av| 日本与韩国留学比较| 久久午夜亚洲精品久久| 精品不卡国产一区二区三区| 俺也久久电影网| 国产69精品久久久久777片| 人妻夜夜爽99麻豆av| 日本欧美国产在线视频| 一区二区三区高清视频在线| 欧美xxxx性猛交bbbb| 亚洲激情五月婷婷啪啪| 精品无人区乱码1区二区| 久久欧美精品欧美久久欧美| 夜夜夜夜夜久久久久| 神马国产精品三级电影在线观看| 国产成人aa在线观看| 久久热精品热| a级毛色黄片| 日本与韩国留学比较| 成人鲁丝片一二三区免费| 欧美日韩在线观看h| 免费看日本二区| 精品久久久久久久久亚洲| 人妻久久中文字幕网| 久久精品久久久久久噜噜老黄 | 97人妻精品一区二区三区麻豆| 禁无遮挡网站| 免费看光身美女| 亚洲熟妇中文字幕五十中出| 欧美成人精品欧美一级黄| 日韩av不卡免费在线播放| 天天躁日日操中文字幕| 国产高清三级在线| 人人妻人人澡欧美一区二区| 精品久久久久久久末码| 一级毛片aaaaaa免费看小| 久久这里只有精品中国| 简卡轻食公司| 亚洲精品一卡2卡三卡4卡5卡| 成人特级av手机在线观看| 一本精品99久久精品77| 国产 一区精品| 国产黄色视频一区二区在线观看 | 亚洲久久久久久中文字幕| 九九久久精品国产亚洲av麻豆| 国产av一区在线观看免费| 我的女老师完整版在线观看| 啦啦啦韩国在线观看视频| 精品久久国产蜜桃| 欧美日本视频| 岛国在线免费视频观看| 国产高清不卡午夜福利| 99在线视频只有这里精品首页| 久久热精品热| 欧美中文日本在线观看视频| 久久精品夜夜夜夜夜久久蜜豆| 高清毛片免费看| 免费电影在线观看免费观看| av专区在线播放| 嫩草影院精品99| 成人永久免费在线观看视频| 欧美zozozo另类| 在线a可以看的网站| 一本久久中文字幕| 中文字幕av成人在线电影| 欧美色欧美亚洲另类二区| 两个人的视频大全免费| 国产精华一区二区三区| 搞女人的毛片| 成年女人永久免费观看视频| 亚洲精品乱码久久久v下载方式| 12—13女人毛片做爰片一| 99久久无色码亚洲精品果冻| 亚洲成av人片在线播放无| 国产一区亚洲一区在线观看| 欧美另类亚洲清纯唯美| 又粗又爽又猛毛片免费看| 18禁裸乳无遮挡免费网站照片| 日韩,欧美,国产一区二区三区 | 在线a可以看的网站| 午夜老司机福利剧场| 网址你懂的国产日韩在线| 一个人免费在线观看电影| 久久久久久久久久成人| 听说在线观看完整版免费高清| 亚洲图色成人| 深夜a级毛片| 午夜精品在线福利| 中文资源天堂在线| 国产高清视频在线观看网站| 女人被狂操c到高潮| 日本黄色视频三级网站网址| 亚洲性夜色夜夜综合| 99热这里只有是精品50| 菩萨蛮人人尽说江南好唐韦庄 | 精品人妻一区二区三区麻豆 | 成人特级av手机在线观看| 久久久久国产网址| 男人的好看免费观看在线视频| 亚洲专区国产一区二区| 亚洲四区av| 永久网站在线| 日本欧美国产在线视频| 日韩 亚洲 欧美在线| 99九九线精品视频在线观看视频| 日日摸夜夜添夜夜添小说| 天堂√8在线中文| 黄色欧美视频在线观看| 99热只有精品国产| 尤物成人国产欧美一区二区三区| 少妇被粗大猛烈的视频| 亚洲一区高清亚洲精品| 成人特级黄色片久久久久久久| 国产成人a∨麻豆精品| 日韩,欧美,国产一区二区三区 | 欧美一级a爱片免费观看看| 亚洲欧美成人综合另类久久久 | 亚洲av第一区精品v没综合| 亚洲成av人片在线播放无| 天堂√8在线中文| 国产精品电影一区二区三区| 色哟哟·www| 人人妻人人看人人澡| 久久久精品94久久精品| 啦啦啦韩国在线观看视频| 99在线人妻在线中文字幕| 青春草视频在线免费观看| 波多野结衣高清作品| 蜜桃久久精品国产亚洲av| 99久久精品热视频| 尤物成人国产欧美一区二区三区| 99久久精品热视频| 日韩欧美精品v在线| 国产精品美女特级片免费视频播放器| 色哟哟哟哟哟哟| 可以在线观看的亚洲视频| 日韩欧美 国产精品| 最近在线观看免费完整版| 国产免费一级a男人的天堂| 春色校园在线视频观看| 免费av不卡在线播放| 一级毛片我不卡| 成年女人看的毛片在线观看| 国产人妻一区二区三区在| 国产女主播在线喷水免费视频网站 | 国产亚洲精品久久久com| 亚洲一区二区三区色噜噜| 麻豆成人午夜福利视频| 久久久久久九九精品二区国产| 秋霞在线观看毛片| 亚洲真实伦在线观看| 国产片特级美女逼逼视频| 午夜福利在线观看免费完整高清在 | 国产亚洲91精品色在线| 精品久久久久久久久久免费视频| 亚洲综合色惰| 亚洲在线自拍视频| 亚洲精品粉嫩美女一区| 国产伦精品一区二区三区四那| 免费不卡的大黄色大毛片视频在线观看 | 国产精品伦人一区二区| 国产精品无大码| 99久国产av精品| 97人妻精品一区二区三区麻豆| 国产视频内射| 国产男靠女视频免费网站| 性欧美人与动物交配| av在线观看视频网站免费| 日本撒尿小便嘘嘘汇集6| 无遮挡黄片免费观看| 国产v大片淫在线免费观看| 午夜福利18| 欧美3d第一页| 国产av在哪里看| 亚洲人与动物交配视频| 在线观看av片永久免费下载| 亚洲欧美中文字幕日韩二区| 99久久久亚洲精品蜜臀av| 国产淫片久久久久久久久| 成人毛片a级毛片在线播放| 18禁在线播放成人免费| 日本熟妇午夜| 一区二区三区四区激情视频 | 黄色日韩在线| 夜夜爽天天搞| 三级男女做爰猛烈吃奶摸视频| 久久6这里有精品| 欧美激情久久久久久爽电影| 卡戴珊不雅视频在线播放| 又黄又爽又免费观看的视频| 欧美激情在线99| 看十八女毛片水多多多| 亚洲精品久久国产高清桃花| 久久精品91蜜桃| 亚洲国产色片| av天堂在线播放| 午夜精品国产一区二区电影 | 国产在线男女| 欧美一区二区国产精品久久精品| 中文字幕av在线有码专区| 少妇裸体淫交视频免费看高清| 日韩,欧美,国产一区二区三区 | 久久久久久九九精品二区国产| 美女 人体艺术 gogo| 国产一区二区三区av在线 | 精品国内亚洲2022精品成人| 久久人人爽人人爽人人片va| 99精品在免费线老司机午夜| 露出奶头的视频| 国产免费男女视频| 夜夜爽天天搞| 你懂的网址亚洲精品在线观看 | 亚洲乱码一区二区免费版| 欧美3d第一页| www.色视频.com| 99久久精品一区二区三区| 久久久精品欧美日韩精品| 搞女人的毛片| 一边摸一边抽搐一进一小说| 国产亚洲精品久久久久久毛片| 成人av在线播放网站| 久久人人精品亚洲av| 久久久久精品国产欧美久久久| 在线免费观看的www视频| 啦啦啦韩国在线观看视频| 九色成人免费人妻av| 国产精品乱码一区二三区的特点| 亚洲高清免费不卡视频| 欧美区成人在线视频| 国产麻豆成人av免费视频| 国产男靠女视频免费网站| 亚洲成a人片在线一区二区| 久久久成人免费电影| 可以在线观看毛片的网站| 国产精品三级大全| 国产亚洲精品av在线| 欧美zozozo另类| 在线观看免费视频日本深夜| 久久九九热精品免费| 国产午夜精品久久久久久一区二区三区 | 久久久国产成人免费| 神马国产精品三级电影在线观看| 欧美高清性xxxxhd video| 五月玫瑰六月丁香| 天堂av国产一区二区熟女人妻| av视频在线观看入口| 亚洲国产高清在线一区二区三| 在现免费观看毛片| 国产精品福利在线免费观看| 内地一区二区视频在线| 亚洲自偷自拍三级| 色5月婷婷丁香| 一区二区三区免费毛片| 免费在线观看影片大全网站| 亚洲av美国av| 欧美色欧美亚洲另类二区| 深夜a级毛片|