• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Novel Robust Watermarking Algorithm for Encrypted Medical Image Based on DTCWT-DCT and Chaotic Map

    2019-11-26 06:47:40JingLiuJingbingLiJierenChengJixinMaNaveedSadiqBaoruHanQiangGengandYangAi
    Computers Materials&Continua 2019年11期

    Jing Liu,Jingbing Li,Jieren ChengJixin Ma,Naveed Sadiq,Baoru Han,Qiang Geng and Yang Ai

    Abstract:In order to solve the problem of patient information security protection in medical images,whilst also taking into consideration the unchangeable particularity of medical images to the lesion area and the need for medical images themselves to be protected,a novel robust watermarking algorithm for encrypted medical images based on dual-tree complex wavelet transform and discrete cosine transform (DTCWT-DCT)and chaotic map is proposed in this paper.First,DTCWT-DCT transformation was performed on medical images,and dot product was per-formed in relation to the transformation matrix and logistic map.Inverse transformation was undertaken to obtain encrypted medical images.Then,in the low-frequency part of the DTCWT-DCT transformation coefficient of the encrypted medical image,a set of 32 bits visual feature vectors that can effectively resist geometric attacks are found to be the feature vector of the encrypted medical image by using perceptual hashing.After that,different logistic initial values and growth parameters were set to encrypt the watermark,and zero-watermark technology was used to embed and extract the encrypted medical images by combining cryptography and third-party concepts.The proposed watermarking algorithm does not change the region of interest of medical images thus it does not affect the judgment of doctors.Additionally,the security of the algorithm is enhanced by using chaotic mapping,which is sensitive to the initial value in order to encrypt the medical image and the watermark.The simulation results show that the pro-posed algorithm has good homomorphism,which can not only protect the original medical image and the watermark information,but can also embed and extract the watermark directly in the encrypted image,eliminating the potential risk of decrypting the embedded watermark and extracting watermark.Compared with the recent related research,the proposed algorithm solves the contradiction between robustness and invisibility of the watermarking algorithm for encrypted medical images,and it has good results against both conventional attacks and geometric attacks.Under geometric attacks in particular,the proposed algorithm performs much better than existing algorithms.

    Keywords:Encrypted medical images,zero-watermarking,DTCWT,perceptual hash,chaotic map.

    1 Introduction

    Nowdays,with the promotion of big data and cloud platforms,the use of modern diagnostic tools such as medical images to diagnose and predict diseases is more and more widely in the medical industry.However,the medical image is a special kind of digital image,which contains personal information like the patient's name,gender,age et al.and the medical information carried by themselves that reflect the patients’ health.When they are transmitted over the internet,there exists a security risk of information leakage [Vengadapurvaja,Nisha,Aarthy et al.(2017);Mothi and Karthikeyan (2019);Qasim,Meziane and Aspin (2018)],especially for some patients with special identities.It is urgent to properly handle this problem as soon as possible in order to ensure the security of information transmission and processing [Elhoseny,Ramirez-Gonzalez,Abu-Elnasr et al.(2018)].

    Digital watermarking technology is an effective technique of multimedia copyright protection and has been widely explored by researchers since its appearance.However,most digital watermarking algorithms remain in the plaintext domain [Fan,Chao and Chieu (2019);Bamal and Kasana (2018);Thanh and Tanaka (2017);Kavitha,Palanisamy and Sureshkumar (2018);Soualmi,Alti and Laouamer (2018);Rai and Singh (2017)].That is to say,the embedding and extraction of the watermark are done in unencrypted carrier images.As a result,on one hand,the embedding of the watermark must be carried out by the owner of the watermark at the same time to ensure data protection [Thanki,Borra,Dwivedi et al.(2017)].And the embedding and extraction of the watermark cannot be handled by a third party,otherwise,the watermark information could be leaked.On the other hand,since the related operation is performed in the plaintext domain,if the plaintext medical image is intercepted during the transmission process,it is easy to expose the information of the carrier image itself.Therefore,the robust digital watermarking technology of the plaintext medical image can only guarantee the security of the watermark information,ignoring the consideration of the carrier medical images.A medical image is a special type of image that contains a large amount of important information of patients.When applying digital watermarking technology in medical images,the safety of the carrier medical image itself should also be seriously considered[Lakshmi,Thenmozhi,Rayappan et al.(2018)].Performing the above operations in the encryption domain is a feasible solution.

    In order to satisfy the requirements of security,integrity and robustness of both watermark and carrier images,the ciphertext domain robust zero-watermark technique can be used.First,encrypt the patient’s plaintext medical image,and invest the obtained encrypted medical image as the carrier image for watermark embedding.After use the privacy information such as the patient’s ID,age,gender et al.as the watermark to encrypt,apply zero-watermark technology to embed into the encrypted medical image.In the process of information transmission,as the watermark and the image itself are ciphertext,on the one hand,the probability of occurrence of the information leakage event can be minimized,on the other hand,the embedding and extraction of the watermark can be handled by a third party.Unlike the digital watermarking scheme in the plaintext domain which embedding and extraction of the watermark needs to be done by the owner of the watermark [Chen,Yin,He et al.(2018)],with the homomorphism of encryption algorithm,watermark and carrier image in ciphertext state can be delivered to a trusted third party [Dai,Wang,Zhou et al.(2016)].The embedding and extraction of the watermark can be realized by utilizing the resource advantages of the third party (such as a powerful cloud server).Compared with the previous plaintext watermarking method,the encryption domain digital watermarking scheme has obvious security advantages.

    To implement digital watermarking in ciphertext domain,the image must be encrypted first.In the aspect of image encryption algorithm,more research results have been obtained.Such as Lavanya et al.[Lavanya and Natarajan (2012)] utilized standard stream cipher for image encryption and selecting non-region of interest tile to embed patient data.Xiong et al.[Xiong,Xu and Shi (2018)] used integer wavelet transform to encrypt image.Liu et al.[Liu,Qu and Xin (2016)] divided the medical image into regions of interest(ROI)and regions of non-interest (RONI).After encrypting the image with the secret key,she connected the least significant bit of the encrypted ROI with Electronic Patient Record (EPR)and embedded the data with the LSB replacement algorithm.Bouslimi et al.[Bouslimi,Bellafqira and Coatrieux (2016)] combined Paillier cryptography with quantitative modulation (QIM),inserted pre-watermark into the image before adding it,and used the modified QIM to encrypt the image.Nematzadeh et al.[Nematzadeh,Enayatifar,Motameni et al.(2018)] proposed a hybrid model of medical image encryption method.It takes the number of secure cryptographic images generated by the coupled mapping lattice as the initial population of the improved genetic algorithm.Laiphrakpam et al.[Laiphrakpam and Khumanthem (2017)] coded pure information as elliptic curvilinear coordinates to eliminate the calculation and improved ElGamal encryption scheme for medical image encryption.Avudaiappan et al.[Avudaiappan,Balasubramanian,Pandiyan et al.(2018)] used double encryption method.First verified puffer fish encryption with signature encryption algorithm,then upgraded the private key and public key by the Opposition based Flower Pollination (OFP).Cao et al.[Cao,Zhou,Chen et al.(2017)] proposed a medical image encryption algorithm with large key space and strong key sensitivity of source image edge mapping.Ismail et al.[Ismail,Said,Radwan et al.(2018)] designed an image encryption algorithm based on pseudo-random sequence generation and realized the safe transmission of medical MRI and X-ray images by using generalized DH mapping.

    However,the image encryption algorithms that can be used for robust digital watermarking at this stage are not very mature [Laiphrakpam and Khumanthem (2017;Ismail,Said,Radwan et al.(2018)].It mainly has the following problems:Firstly,not all image encryption algorithms can guarantee the robustness of digital watermarks in the encrypted domain.For some image encryption algorithms,the watermark can be extracted after being embedded [Liu,Qu and Xin (2016);Xiong,Xu and Shi (2018);Bouslimi,Bellafqira and Coatrieux (2016)].But under the interference of various watermark attacks such as Gaussian noise,JPEG compression,median filtering,rotation,scaling and translation,the watermark quality is poor,and the watermark robustness cannot be guaranteed.Secondly,in the plaintext domain,although many robust digital watermarking algorithms have been proposed,due to the limitations of encryption algorithms,it will be quite a complex task to transplant these robust digital watermarking methods directly into the encrypted domain,especially in medical images with special requirements for images.

    Based on the above reasons,we proposed a robust digital watermarking algorithm for encrypted medical images.It adopts zero-watermark technology,and uses the dual-tree complex wavelet transform and Logistic chaotic map in the encryption domain.A reliable visual vector feature is selected in the encryption domain to embed and extract the encrypted domain watermark.This algorithm enhances the security of the medical image and the watermark.Without any changes to the original image and without decryption,the extraction of the watermark can be completed.With the help of the homomorphic characteristics of the encryption algorithm,the watermark and the carrier image in the encrypted state can be handed in a trusted third party.It not only solves the contradiction between the robustness and the invisibility of common algorithms,but also performs well in resisting conventional attacks and geometric attacks.

    2 The fundamental theory

    2.1 Dual-tree complex wavelet transform (DTCWT)

    2D DWT uses the separation and filtering of image rows and columns,and its twoextraction process brings the defects of translation sensitivity and lack of direction selection,which seriously affects the effect of feature extraction.Therefore,dual-tree complex wavelet transform (DTCWT)is born.Fig.1 and Fig.2 respectively showed the critical sampling of two-dimensional wavelet and the two-dimensional dual-tree complex wavelet and their two-dimensional edge representation.DTCWT adopted the DWT of binary tree structure and used two trees to represent the generated real and imaginary Numbers respectively [Selvakumar,Jerome and Rajamani (2016)].The formula is shown as follows:

    Figure1:Critical sampling of two-dimensional images:(a)DWT,(b)DTCWT

    Figure2:Edge representation of a two-dimensional image:(a)DTCWT,(b)DWT

    When transforming,two trees are carried out side-by-side with fixed sampling interval,as shown in Fig.3.The two-dimensional DTCWT will produce six direction (±15°,±45°,±75°)for high frequency sub images [Zebbiche,Khelifi and Loukhaoukha (2018)].It can effectively overcome the defects of DWT.Combined with other advantages,it has become the preferred transformation for the extraction of medical image features in this paper.

    Figure3:The dual-tree complex wavelet transform

    2.2 Logistic map

    The Logistic map is a typical chaotic model,which uses the following equation for repeated iteration:

    where,xk∈(0,1)represents the system variable,0≤μ≤4is the growth parameter,andk∈(0,1,2,...,n)is the number of iterations [Li,Liu and Liu (2019)].The performance of the system varies with the value ofμ.When 2.8<μ≤4,the obtained graph is shown in Fig.4.Starting fromμ=3,the system has two cycles and four cycles.When 3.569945672<μ≤4,the system enters achaotic state.And the chaotic state of the Logistic map is extremely sensitive to the initial value which can be used as an ideal sequence of the secret key.This chaos is used in the chaotic encryption of the medical images and the watermark,and their initial values are set to 0.135 and 0.2,respectively.

    Figure4:The bifurcation diagram of Logistic map

    2.3 Homomorphic encryption

    Encryption technology plays an important role in the processing of encrypted domain signals.However,not all encryption methods are suitable for signal processing in the encryption domain.Most encryption methods,such as DES and AES,fail to maintain algebraic correspondence between plaintext and ciphertext after encryption.To solve this problem,in 1978,Rivest et al.first proposed the concept of homomorphic encryption[Naqvi,Abbasi,Hussain et al.(2018)].That is,after performing some operation on the ciphertext encrypted by homomorphism and then decrypting it can obtained the same result by directly performing the same operation on the plain text without encryption.In this way,direct manipulation of ciphertext data can be achieved without initial decryptionwhich provides a feasible approach to secure signal processing.Homomorphic encryption is divided into full homomorphic encryption and partial homomorphic encryption.Due to its high computational complexity and time cost,the full homomorphic encryption algorithm is not ideal in practical application.Therefore,this paper uses the Paillier cipher system to design the encryption scheme.Paillier cryptosystem is a public key cryptosystem with homomorphic and probabilistic properties,and its security has been proved.

    3 The proposed algorithm

    We propose a robust zero-watermarking scheme for encrypted medical images,which mainly uses DTCWT-DCT transform and Logistic chaotic mapping as shown in Fig.5.It is divided into the main stages of original medical image encryption,feature extraction and watermark encryption,watermark embedding and extraction.By using the homomorphism of the encryption system,the outputs are watermarked encrypted images after embedding the watermark.

    Figure5:The proposed algorithm scheme

    Due to the watermark image and the original medical image are both encrypted,the embedding and extraction of the watermark can be safely performed by a third-party cloud server.Furthermore,after the users decrypted,the decryption images that meet the application requirements can be obtained.

    3.1 Medical image encryption

    In order to protect the original medical image,we carry out our watermark algorithm in the encryption domain.Fig.6.shows the encryption scheme for original medical images.The describtion is as follows:

    1)Apply two-level DTCWT transform on the original medical images to obtain the six wavelet coefficients high-frequency sub-bands in each layer of the double-tree and two low-frequency coefficients;

    2)Apply DCT transform to each wavelet sub-band coefficient to get the DCT coefficient matrix of the subband coefficientD(i,j);

    3)Obtain the encryption matrixC(i.j)by using Logistic chaotic mapping structure chaotic sequenceX(i.j),via the symbolic functionSgn(x)andreshape(X(i,j));

    4)For binary encryption matrixC(i.j)and dtcwt-dct coefficient matrixD(i.j),use the dot multiplication operation to obtain the encryption coefficient matrixED'(i,j);

    5)IDCT transformation is performed on the encryption coefficient matrixED'(i,j)to obtain the reconstructed encrypted sub-band wavelet coefficient matrixED(i,j);

    Figure6:Encryption of original medical images

    6)IDTCWT transformation is performed on the matrixED(i,j)to obtain the encrypted medical imageE(i,j).

    As shown below,Fig.7 is the original medical image that was randomly selected,while Fig.8 is the corresponding medical image encrypted by DTCWT-DCT.

    Figure7:The original medical images:(a)Brain,(b)Arm,(c)Coronary artery,(d)Foot,(e)Knee,(f)Multi-phase pancreas,(g)Neck,(h)Shoulder,(i)Wrist

    Figure8:The encrypted medical images:(a)Encrypted Brain,(b)Encrypted Arm,(c)

    Encrypted Coronary artery,(d)Encrypted Foot,(e)Encrypted Knee,(f)Encrypted Multiphase pancreas,(g)En-crypted Neck,(h)Encrypted Shoulder,(i)Encrypted Wrist

    3.2 Feature extraction and watermark encryption

    To find a visual feature vector suitable for all encrypted medical images,we randomly selected a normal human brain image of 128 pixels by 128 pixels for encryption,performed DTCWT-DCT transformation on the encrypted image,and carried out various attacks as shown in Tab.1.By observing the low frequency coefficients of the encrypted images after transformation,we found that although the values of the low frequency coefficients of encrypted brain images after DTCWT-DCT transformation varies greatly under various attacks,their symbols remain basically unchanged.In this paper,32 bit low-frequency data is selected for symbol transformation,and all coefficient values greater than zero or equal to zero are replaced by ‘1’,and those less than zero are replaced by ‘0’.For convenience of explanation,the first nine bits of the data are listed in Tab.1.Their units are all 1.0e+04.In this way,we get a sequence of low-frequency coefficient symbols ‘101000000’ of the encrypted brain iamge.And the symbol sequence of all the images being attacked is consistent with the original image which is equal to 1.00.

    Table1:Changes of DTCWT-DCT coefficients under different attacks for the encrypted original image

    Based on the above conclusions,we performed the same experiments on a large number of CT images and MRI images and calculated the normalized correlation coefficient values between them using their respective 32 bits symbol vectors.Tab.2 lists the test results of the encrypted medical images which are shown in Fig.8.It is apparent from the results that the NC values are both less than 0.5 compared with others,and their own NC values are all 1.0.Hence,the low-frequency coefficients of the encrypted medical images transformed by DTCWT-DCT can be used as the effective visual feature vectors.

    Table2:Values of the correlation coefficients between different images (32 bits)

    3.3 Watermark embedding and extraction

    Figure9:Watermark embedding process

    A medical image is a special type of image,which has strict requirements regarding image data integrity.Therefore,we use zero-watermark technology to complete the embedding of the watermark.In the embedding process,the watermark embedding is completed by associating the feature vector of the encrypted image with the watermark sequenceEW(j),which is described as follows:

    1)Extract the feature vectorEVF(j)from the encrypted medical imageE(i,j);

    2)Obtain the encrypted watermark sequenceEW(j)via encrypting the original watermark;

    3)Perform a XOR operation on symbol sequenceEVF(j)and encrypted watermark sequenceEW(j)to obtain a secret keyKey(j),and the embedding of watermark is completed.

    The steps to extract the watermark in ciphertext domain are as follows:

    1)Extract the feature vectorEVF' (j)of the medical image to be testedE'(i,j);

    2)Perform a XOR operation on the feature vectorEVF' (j)and key sequenceKey(j)to obtain the extracted watermarkEW'(j);

    3)The extracted encrypted watermark is decrypted to obtain the restored watermark.

    Figure10:Watermark extraction process

    4 Simulation and analysis

    Based on matlab 2016,all the encrypted medical images in randomly selected in Fig.8 were simulated.The sizes of the selected encrypted medical images are 128 pixels×128 pixels,and the watermark image is 32 pixels×32 pixels which is selected as a meaningful image.Taking the image of Fig.7(a)as an example,the proposed algorithm is used to encrypt the image and the watermark,generating the encrypted image embedded with watermark and their decryption effect images.As is apparent from Fig.11,the encrypted image and the watermark are identical to the original image without being attacked,NC=1.0.After chaotic encryption,the medical image and the watermark can no longer distinguish the initial shape and the content.Different initial values enhance the security of the encryption algorithm.

    Figure11:The medical image and watermark in the encrypted domain:(a)Original medical image (b)Encrypted medical image;(c)Encrypted watermarked medical image;(d)Decrypted watermarked medical image;(e)Original watermark;(f)Chaotic encryption watermark;(g)Extracted watermark;(h)Decrypted watermark

    Then,we attacked all the encrypted medical images in Fig.8 and measured the extracted watermarks with PSNR values and NC values to verify the robustness of the algorithm.The results of their attacks are as follows.Although we have tested all the images,for the sake of illustration,the attacked results are analyzed with Fig.ss 8 (a)as an example.

    4.1 Conventional attacks

    The performance of the tested encrypted medical image under conventional attacks are shown in Tab.3.Observing the data of Tab.3,with Gaussian noise,JPEG compression and median filtering attacks intensity increasing,the PSNR values and the NC values of the watermarked encrypted medical images showed a decreasing trend.Even when the Gaussian noise intensity reached 25%,JPEG compression reached as low as 4%,and the median filtering size reached 11 x 11,in the case of 10 filtering times,although the encrypted medical images have undergone great changes,their average NC value is still as high as 0.85,which demonstrates good robustness.

    Table3:The PSNR and NC values under conventional attacks

    PSNR=11.44 dB NC=0.90 25%4% images/BZ_454_1142_705_1354_918.png images/BZ_454_1546_706_1758_918.png JPEG compression 6%PSNR=23.63 dB images/BZ_454_1142_996_1354_1208.png NC=0.84 images/BZ_454_1546_996_1758_1208.png 15%[33] images/BZ_454_882_1691_909_1744.png PSNR=26.09 dB images/BZ_454_1142_1286_1354_1499.png PSNR=29.78 dB images/BZ_454_1142_1578_1354_1791.png NC=0.90 images/BZ_454_1546_1286_1758_1499.png NC=1.00 images/BZ_454_1546_1578_1758_1791.png Median filter(10 times)[77] images/BZ_454_882_1981_909_2034.png [1111] images/BZ_454_882_2271_909_2324.png PSNR=28.85 dB images/BZ_454_1142_1869_1354_2081.png PSNR=21.99 dB images/BZ_454_1142_2159_1354_2371.png NC=0.94 images/BZ_454_1546_1869_1758_2081.png NC=0.88 images/BZ_454_1546_2159_1758_2372.png PSNR=19.21 dB NC=0.84 images/BZ_454_1142_413_1354_626.png PSNR=9.01 dB images/BZ_454_1546_413_1758_626.png NC=0.86

    4.2 Geometrical attacks

    Tab.4 shows the PSNR and NC values of watermarked encrypted medical images under geometric attacks and their corresponding images.When the watermarked encrypted medical image was translated down by 17%,nearly one-fifth of the image watermark was lost.The watermark can still be accurately extracted,and NC=0.61.When it is attacked counterclockwise,rotated by 20 degrees and cut by 1/3 on the Y-axis,the watermark can still be clearly extracted.In addition,almost 100% of the watermark of encrypted medical images can be extracted,which means almost no loss at all under the scaling attacks.These data results show that the proposed algorithm is robust to geometric attacks,and it has a wide range of variabilities and high NC values.

    Table4:The PSNR and NC values under geometrical attacks

    7° images/BZ_456_1174_346_1386_558.png PSNR =15.37 dB images/BZ_456_1528_372_1740_585.png NC=0.65 Rotation(counterclockwis e)14° images/BZ_456_1174_689_1386_901.png PSNR =13.33 dB images/BZ_456_1528_715_1740_927.png NC=0.61 20°5% images/BZ_456_1174_1031_1386_1244.png PSNR =12.36 dB images/BZ_456_1174_1381_1386_1585.png images/BZ_456_1528_1058_1740_1270.png NC=0.53 images/BZ_456_1526_1376_1742_1589.png /NC=0.90 Cropping(Y direction)24% images/BZ_456_1173_1693_1386_1852.png / images/BZ_456_1528_1666_1740_1879.png NC=0.83 30% images/BZ_456_1174_1988_1386_2137.png / images/BZ_456_1528_1956_1740_2169.png NC=0.67

    To verify the homomorphism of the proposed algorithm,we compared the quality of the image after the attacks and the extracted NC values of both the watermarked unencrypted medical image and the watermarked encrypted image in Tab.5.The experimental data results are basically consistent in the encrypted and unencrypted domains,indicating that the encryption algorithm we use has good homomorphism.

    Table5:The PSNR and NC values in DTCWT-DCT plaintext and encrypted domain

    4.3 Algorithm comparison

    In order to further verify the robustness of the proposed algorithm,especially under geometric attacks,we replaced the encrypted medical image with a ‘Luna’ image to mask the difference between the results of selecting different samples.Then,the proposed algorithm is compared with the existing algorithm [Zear,Singh and Kumar (2018);Thanki,Borra,Dwivedi et al.(2017);Nematzadeh,Enayatifar,Motameni et al.(2018);Laiphrakpam and Khumanthem (2017)].Their comparison results are shown in Tab.6-Tab.7 and Figs.12-18,respectively.Observing this comparative data,we can find that although the proposed algorithm performs slightly inferiorly to the algorithm proposed by Nematzadeh et al.[Nematzadeh,Enayatifar,Motameni et al.(2018)] under the scaling attacks,it is clearly superior to the existing algorithm in both conventional attacks and geometric attacks in general.Besides,the proposed algorithm encrypted the medical image itself,which enhanced the security of the algorithm.

    Figure12:The NC data of different algorithms under Gaussian Noise attacks

    Figure13:The NC data of different under JPEG attacks

    Figure14:The NC data of different algorithms under Median Filter (10 times)attacks

    Figure15:The NC curves of different algorithms under Scaling attacks

    Figure16:The NC curves of different algorithms under Down Translation attacks

    Figure17:The NC curves of different algorithms under Right Translation attacks

    Figure18:The NC curves of different algorithms under Cropping attacks

    Table6:Comparison values of different algorithms under conventional attacks

    Table7:Comparison values of different algorithms under geometrical attacks

    Therefore,the algorithm presented in this paper is outstanding in all kinds of attacks,in particular solving the problem that existing algorithms cannot balance geometric attacks and security robustness.It has strong resistance to geometric attacks and exhibits good robustness.

    5 Conclusions

    This paper proposed a new robust watermarking algorithm for encrypted medical images based on DTCWT-DCT.The security of medical image transmission is enhanced by encrypting the medical image itself and setting different initial values of chaos.It used the low-frequency coefficient of the DTCWT-DCT transform domain of the encrypted medical image as its feature vector,performed logical operations with the chaotic encrypted watermark to generate the secret key to realize the embedding and extraction of the encrypted medical image.Using the homomorphism of the encryption algorithm,the watermark can be extracted easily without the original image or decryption.The simulation results show that the proposed algorithm can solve the contradiction between robustness and invisibility well,and is robust to both conventional attacks and geometric attacks.

    Acknowledgement:This work is supported by the Key Research Project of Hainan Province [ZDYF2018129],the Higher Education Research Project of Hainan Province(Hnky2019-73),the National Natural Science Foundation of China [61762033],the Natural Science Foundation of Hainan [617175],the Special Scientific Research Project of Philosophy and Social Sciences of Chongqing Medical University [201703] and the Key Research Project of Haikou College of Economics [HJKZ18-01].

    最近最新中文字幕大全电影3| 成年女人看的毛片在线观看| 欧美最新免费一区二区三区| 国产免费一级a男人的天堂| 男女下面进入的视频免费午夜| 亚洲国产欧美在线一区| 国产高清视频在线观看网站| 欧美性猛交黑人性爽| 一个人观看的视频www高清免费观看| 丰满少妇做爰视频| 久久久久性生活片| 久久久a久久爽久久v久久| 国产毛片a区久久久久| 亚洲av日韩在线播放| 精品国产三级普通话版| 精品久久久久久久久av| 久久久久久伊人网av| 亚洲av一区综合| 日本av手机在线免费观看| 亚洲最大成人手机在线| 青春草国产在线视频| 久久精品国产99精品国产亚洲性色| 亚洲精品乱码久久久v下载方式| 麻豆一二三区av精品| 人人妻人人澡人人爽人人夜夜 | 日韩av在线大香蕉| 亚洲高清免费不卡视频| 成人无遮挡网站| 亚洲精品国产av成人精品| 国产真实乱freesex| 一级爰片在线观看| 在线观看66精品国产| eeuss影院久久| 天美传媒精品一区二区| 成人二区视频| 色综合色国产| 免费av毛片视频| 69av精品久久久久久| 午夜激情福利司机影院| 国产真实乱freesex| 欧美激情久久久久久爽电影| 老司机影院毛片| 你懂的网址亚洲精品在线观看 | 少妇猛男粗大的猛烈进出视频 | 久久久久精品久久久久真实原创| 美女黄网站色视频| 噜噜噜噜噜久久久久久91| 免费大片18禁| 午夜福利在线观看吧| 国模一区二区三区四区视频| 国产亚洲av嫩草精品影院| 国产黄色视频一区二区在线观看 | 亚洲自拍偷在线| 高清日韩中文字幕在线| 青春草视频在线免费观看| 高清在线视频一区二区三区 | 97超碰精品成人国产| 一二三四中文在线观看免费高清| 18禁在线播放成人免费| 岛国在线免费视频观看| 一区二区三区免费毛片| 国产美女午夜福利| 久久精品国产亚洲av天美| 亚洲在线自拍视频| 国产成人a区在线观看| 亚洲人成网站在线观看播放| 两性午夜刺激爽爽歪歪视频在线观看| 美女脱内裤让男人舔精品视频| 欧美又色又爽又黄视频| 日日干狠狠操夜夜爽| 特大巨黑吊av在线直播| 色综合色国产| 国产精品一及| 国产片特级美女逼逼视频| 黄色欧美视频在线观看| 欧美又色又爽又黄视频| 国产免费视频播放在线视频 | 欧美不卡视频在线免费观看| 久久久久久伊人网av| 禁无遮挡网站| 赤兔流量卡办理| 一区二区三区高清视频在线| 国产精品精品国产色婷婷| 99热这里只有是精品在线观看| 91狼人影院| 亚洲自拍偷在线| 一夜夜www| 国产精品久久久久久久久免| 波野结衣二区三区在线| 久久精品影院6| 国产真实乱freesex| 麻豆一二三区av精品| 午夜福利在线在线| 搡老妇女老女人老熟妇| 天堂影院成人在线观看| 寂寞人妻少妇视频99o| 长腿黑丝高跟| 少妇人妻精品综合一区二区| 少妇熟女aⅴ在线视频| 3wmmmm亚洲av在线观看| 美女cb高潮喷水在线观看| 久久久久久久亚洲中文字幕| 亚洲精品日韩在线中文字幕| 一级毛片久久久久久久久女| 色尼玛亚洲综合影院| 欧美区成人在线视频| 97超视频在线观看视频| 免费黄色在线免费观看| 国产精品一区二区三区四区免费观看| 草草在线视频免费看| 国模一区二区三区四区视频| 日韩视频在线欧美| 天天躁夜夜躁狠狠久久av| 成人特级av手机在线观看| 2021少妇久久久久久久久久久| 美女高潮的动态| 中文字幕av在线有码专区| 亚洲国产精品合色在线| 国产成人免费观看mmmm| 久久久色成人| 搞女人的毛片| 亚洲av免费在线观看| 在线免费十八禁| 波多野结衣巨乳人妻| 91aial.com中文字幕在线观看| 久久久久久大精品| 国产精华一区二区三区| 国产精品国产三级国产专区5o | 亚洲乱码一区二区免费版| 精品久久久久久久久av| 能在线免费看毛片的网站| 国产在视频线在精品| 人人妻人人澡人人爽人人夜夜 | 亚洲国产日韩欧美精品在线观看| 亚洲色图av天堂| 又粗又爽又猛毛片免费看| eeuss影院久久| 国产精品爽爽va在线观看网站| 日韩亚洲欧美综合| 看黄色毛片网站| 深夜a级毛片| 欧美成人a在线观看| 国产一区有黄有色的免费视频 | 久久国产乱子免费精品| 亚洲av免费高清在线观看| 中文字幕av在线有码专区| av免费观看日本| 插阴视频在线观看视频| 日日摸夜夜添夜夜添av毛片| 热99在线观看视频| 99热6这里只有精品| 日本熟妇午夜| 九色成人免费人妻av| 日本黄色片子视频| 欧美日韩一区二区视频在线观看视频在线 | 成人二区视频| 午夜福利网站1000一区二区三区| 一区二区三区四区激情视频| 免费一级毛片在线播放高清视频| 精品一区二区免费观看| 麻豆精品久久久久久蜜桃| 岛国毛片在线播放| 亚洲av男天堂| 亚洲成人久久爱视频| 伊人久久精品亚洲午夜| 国产黄a三级三级三级人| 免费看av在线观看网站| 日本黄大片高清| 久久久久久久午夜电影| av黄色大香蕉| 亚洲欧美日韩无卡精品| 日韩欧美精品免费久久| 伦精品一区二区三区| 亚洲国产精品专区欧美| 一级黄片播放器| 伦理电影大哥的女人| 国产男人的电影天堂91| 国产一级毛片在线| 22中文网久久字幕| 97热精品久久久久久| 成人欧美大片| 精品久久久久久电影网 | av播播在线观看一区| 久久韩国三级中文字幕| 啦啦啦韩国在线观看视频| 免费观看a级毛片全部| 国语对白做爰xxxⅹ性视频网站| 少妇的逼水好多| www日本黄色视频网| 九九热线精品视视频播放| 特大巨黑吊av在线直播| 久久欧美精品欧美久久欧美| 亚洲av免费高清在线观看| 高清视频免费观看一区二区 | 亚洲欧美清纯卡通| 天天一区二区日本电影三级| 爱豆传媒免费全集在线观看| 蜜桃亚洲精品一区二区三区| 麻豆久久精品国产亚洲av| 观看美女的网站| 老师上课跳d突然被开到最大视频| 日韩av在线免费看完整版不卡| 毛片一级片免费看久久久久| 欧美人与善性xxx| 国产精品国产三级国产av玫瑰| 国产精品国产三级国产专区5o | 亚洲欧美一区二区三区国产| 人体艺术视频欧美日本| 一夜夜www| 国产免费又黄又爽又色| 国内揄拍国产精品人妻在线| 日韩一区二区三区影片| 天堂中文最新版在线下载 | 亚洲欧美日韩无卡精品| 亚洲欧美中文字幕日韩二区| 精品不卡国产一区二区三区| 观看美女的网站| 亚洲在线自拍视频| 精品一区二区免费观看| 99久国产av精品| av在线蜜桃| 91在线精品国自产拍蜜月| 国产色婷婷99| 九九久久精品国产亚洲av麻豆| 欧美xxxx性猛交bbbb| 国产高清不卡午夜福利| 欧美zozozo另类| 国产欧美日韩精品一区二区| 丰满人妻一区二区三区视频av| 国产精品一二三区在线看| 国产熟女欧美一区二区| 69av精品久久久久久| 麻豆一二三区av精品| 国产成人91sexporn| 日韩一区二区三区影片| 人妻夜夜爽99麻豆av| 岛国在线免费视频观看| 欧美变态另类bdsm刘玥| 欧美精品国产亚洲| av黄色大香蕉| 亚洲欧美成人综合另类久久久 | 日韩精品有码人妻一区| 欧美3d第一页| 91午夜精品亚洲一区二区三区| 久久人人爽人人爽人人片va| 欧美丝袜亚洲另类| 网址你懂的国产日韩在线| 国内揄拍国产精品人妻在线| 久久人人爽人人片av| 高清午夜精品一区二区三区| 国产精品久久久久久av不卡| 亚洲,欧美,日韩| 亚洲内射少妇av| 色尼玛亚洲综合影院| 村上凉子中文字幕在线| 狂野欧美白嫩少妇大欣赏| 人体艺术视频欧美日本| 亚洲精品影视一区二区三区av| 亚洲成av人片在线播放无| 美女黄网站色视频| 精品久久久久久久久久久久久| 久久99精品国语久久久| 最近的中文字幕免费完整| 九九在线视频观看精品| 99久久无色码亚洲精品果冻| 亚洲在久久综合| 麻豆国产97在线/欧美| 亚洲国产精品久久男人天堂| 国产一区二区三区av在线| 亚洲国产精品成人久久小说| 国产成人精品久久久久久| 亚洲国产精品成人综合色| 午夜免费男女啪啪视频观看| 精品久久久久久久久av| 日韩视频在线欧美| 亚洲自偷自拍三级| 丝袜喷水一区| 亚洲综合色惰| av线在线观看网站| 少妇丰满av| 麻豆精品久久久久久蜜桃| 永久免费av网站大全| 18禁在线无遮挡免费观看视频| 亚洲精华国产精华液的使用体验| 麻豆国产97在线/欧美| 国产综合懂色| 久久久成人免费电影| 成年免费大片在线观看| 日韩精品青青久久久久久| 一本一本综合久久| 国产免费福利视频在线观看| 最近手机中文字幕大全| 国产av码专区亚洲av| av在线播放精品| 亚洲成av人片在线播放无| АⅤ资源中文在线天堂| 亚洲三级黄色毛片| 久久精品影院6| 午夜久久久久精精品| 2022亚洲国产成人精品| 美女内射精品一级片tv| 观看免费一级毛片| 国产极品精品免费视频能看的| 床上黄色一级片| 久久99热6这里只有精品| 日韩国内少妇激情av| 七月丁香在线播放| 久久精品国产亚洲网站| 国产精品1区2区在线观看.| 亚洲av成人av| 一级黄片播放器| 日韩欧美在线乱码| eeuss影院久久| 久久韩国三级中文字幕| 男人狂女人下面高潮的视频| 免费av不卡在线播放| 国产真实伦视频高清在线观看| 少妇裸体淫交视频免费看高清| 美女高潮的动态| 成人高潮视频无遮挡免费网站| 免费看a级黄色片| 日日摸夜夜添夜夜爱| 一级爰片在线观看| 亚洲av中文av极速乱| 91久久精品国产一区二区三区| 免费在线观看成人毛片| 麻豆成人av视频| 丰满人妻一区二区三区视频av| 女人被狂操c到高潮| 精品国产露脸久久av麻豆 | 亚洲av熟女| 成人综合一区亚洲| 中文天堂在线官网| 亚洲成av人片在线播放无| 永久免费av网站大全| av免费在线看不卡| 好男人视频免费观看在线| 可以在线观看毛片的网站| 亚洲精品日韩在线中文字幕| 成人漫画全彩无遮挡| 99久久人妻综合| 亚洲真实伦在线观看| 亚洲欧美一区二区三区国产| 亚洲av中文av极速乱| 最近2019中文字幕mv第一页| 亚洲精品亚洲一区二区| 人妻系列 视频| 久久精品人妻少妇| 在线播放国产精品三级| 亚洲美女视频黄频| 国产乱人偷精品视频| 婷婷六月久久综合丁香| 国产在线一区二区三区精 | 最后的刺客免费高清国语| 网址你懂的国产日韩在线| 亚洲国产精品成人综合色| 国产毛片a区久久久久| 亚洲欧美日韩卡通动漫| 国产精品1区2区在线观看.| 99久久无色码亚洲精品果冻| 最近中文字幕2019免费版| 18禁在线无遮挡免费观看视频| 亚洲av二区三区四区| 亚洲五月天丁香| h日本视频在线播放| 亚洲av熟女| 大香蕉久久网| 亚洲高清免费不卡视频| 你懂的网址亚洲精品在线观看 | 只有这里有精品99| 久热久热在线精品观看| 免费播放大片免费观看视频在线观看 | 欧美人与善性xxx| 青青草视频在线视频观看| 特级一级黄色大片| 色播亚洲综合网| h日本视频在线播放| 美女内射精品一级片tv| 免费观看在线日韩| 99在线视频只有这里精品首页| 午夜福利网站1000一区二区三区| 久久精品夜色国产| 亚洲成人精品中文字幕电影| 亚洲国产成人一精品久久久| 99久久精品热视频| 又黄又爽又刺激的免费视频.| 美女黄网站色视频| 国产精品电影一区二区三区| 狂野欧美激情性xxxx在线观看| 在线播放无遮挡| 久久久精品欧美日韩精品| 日韩成人伦理影院| 欧美zozozo另类| 亚洲成色77777| 99国产精品一区二区蜜桃av| 日韩欧美在线乱码| 美女国产视频在线观看| 大香蕉97超碰在线| 国产亚洲精品av在线| 婷婷六月久久综合丁香| 国产麻豆成人av免费视频| 夫妻性生交免费视频一级片| 亚洲av一区综合| 国产亚洲av片在线观看秒播厂 | 高清视频免费观看一区二区 | 亚洲欧美成人综合另类久久久 | 国内精品美女久久久久久| 天美传媒精品一区二区| 久久久精品大字幕| 日本午夜av视频| 亚洲欧美日韩高清专用| 成年版毛片免费区| 国国产精品蜜臀av免费| 午夜久久久久精精品| 免费不卡的大黄色大毛片视频在线观看 | 国产成人精品一,二区| 国产国拍精品亚洲av在线观看| 欧美潮喷喷水| 一级毛片久久久久久久久女| 岛国毛片在线播放| 色播亚洲综合网| 成年版毛片免费区| 亚洲最大成人手机在线| 亚洲精品日韩在线中文字幕| 又爽又黄无遮挡网站| 久久精品久久久久久噜噜老黄 | 精品久久久久久久久av| 亚洲性久久影院| 观看美女的网站| 色综合色国产| 亚洲四区av| 欧美精品一区二区大全| 能在线免费观看的黄片| 亚洲乱码一区二区免费版| 欧美极品一区二区三区四区| 国产一区二区在线观看日韩| 欧美成人午夜免费资源| 亚洲精品色激情综合| 亚洲丝袜综合中文字幕| 综合色丁香网| 国产精品1区2区在线观看.| 毛片女人毛片| 又粗又爽又猛毛片免费看| 超碰97精品在线观看| 免费播放大片免费观看视频在线观看 | 99久久九九国产精品国产免费| 一边摸一边抽搐一进一小说| 22中文网久久字幕| 久久草成人影院| 国产精品久久久久久精品电影| 国产精品麻豆人妻色哟哟久久 | 热99re8久久精品国产| 亚洲精品久久久久久婷婷小说 | 日日啪夜夜撸| 欧美极品一区二区三区四区| 国产欧美另类精品又又久久亚洲欧美| 久久久欧美国产精品| 久久精品久久精品一区二区三区| 国产精品久久久久久久电影| 热99re8久久精品国产| 免费观看a级毛片全部| 国产在视频线在精品| 日本猛色少妇xxxxx猛交久久| av在线亚洲专区| 色播亚洲综合网| 国产一级毛片七仙女欲春2| 午夜激情福利司机影院| 男人舔女人下体高潮全视频| 高清视频免费观看一区二区 | 国产乱人偷精品视频| 精品不卡国产一区二区三区| 日本免费a在线| 亚洲成av人片在线播放无| 精品久久久久久久久av| videos熟女内射| 搡女人真爽免费视频火全软件| 午夜精品国产一区二区电影 | 国模一区二区三区四区视频| 看免费成人av毛片| 青春草亚洲视频在线观看| 国产精品.久久久| 校园人妻丝袜中文字幕| 插逼视频在线观看| 国产中年淑女户外野战色| 国产 一区精品| 国产在线一区二区三区精 | 非洲黑人性xxxx精品又粗又长| 看黄色毛片网站| 亚洲av福利一区| 日本三级黄在线观看| 九九久久精品国产亚洲av麻豆| 老女人水多毛片| 欧美日韩在线观看h| 精品一区二区三区视频在线| 天堂影院成人在线观看| 国产av一区在线观看免费| 久久婷婷人人爽人人干人人爱| 国产av一区在线观看免费| 亚洲一级一片aⅴ在线观看| 午夜福利成人在线免费观看| 成人国产麻豆网| 老女人水多毛片| 国产伦精品一区二区三区视频9| 精品99又大又爽又粗少妇毛片| 97人妻精品一区二区三区麻豆| 欧美极品一区二区三区四区| 男女下面进入的视频免费午夜| 色尼玛亚洲综合影院| 久久久久久久久大av| 乱码一卡2卡4卡精品| 又粗又硬又长又爽又黄的视频| 乱码一卡2卡4卡精品| 亚洲国产欧美在线一区| 国产午夜精品一二区理论片| 我要搜黄色片| 白带黄色成豆腐渣| 亚洲高清免费不卡视频| 夫妻性生交免费视频一级片| 97热精品久久久久久| 国产精品一区二区在线观看99 | 久久久久久国产a免费观看| 亚洲在线观看片| a级毛片免费高清观看在线播放| 国产高清三级在线| 七月丁香在线播放| 国产又黄又爽又无遮挡在线| 亚洲自偷自拍三级| 少妇的逼水好多| 校园人妻丝袜中文字幕| 国产精品国产高清国产av| 免费看美女性在线毛片视频| 中文资源天堂在线| 狂野欧美激情性xxxx在线观看| 看黄色毛片网站| 噜噜噜噜噜久久久久久91| 中文资源天堂在线| 国产黄色小视频在线观看| 岛国毛片在线播放| 成人无遮挡网站| 美女脱内裤让男人舔精品视频| 午夜福利视频1000在线观看| 国产一级毛片七仙女欲春2| 麻豆成人午夜福利视频| 亚洲精品自拍成人| 国产在视频线在精品| 99九九线精品视频在线观看视频| .国产精品久久| 精品无人区乱码1区二区| 99热网站在线观看| 国产伦在线观看视频一区| 毛片女人毛片| www日本黄色视频网| 欧美潮喷喷水| 亚洲五月天丁香| 日日啪夜夜撸| 又黄又爽又刺激的免费视频.| 观看美女的网站| 国产免费一级a男人的天堂| 久久久久久久国产电影| 欧美性猛交黑人性爽| av福利片在线观看| 国产亚洲一区二区精品| 亚洲国产欧洲综合997久久,| 国产精品一区二区三区四区免费观看| 亚洲人与动物交配视频| 免费av毛片视频| 麻豆成人av视频| 国产老妇伦熟女老妇高清| 在线观看一区二区三区| 久久久欧美国产精品| 久久久久九九精品影院| 哪个播放器可以免费观看大片| 成人一区二区视频在线观看| 91精品伊人久久大香线蕉| 日韩精品青青久久久久久| 国产综合懂色| 免费观看性生交大片5| 欧美精品一区二区大全| 直男gayav资源| 久久综合国产亚洲精品| 两个人的视频大全免费| 99久久人妻综合| 深爱激情五月婷婷| av在线蜜桃| av线在线观看网站| 欧美一区二区亚洲| 寂寞人妻少妇视频99o| 国产精品久久电影中文字幕| 舔av片在线| 国内精品美女久久久久久| 亚洲久久久久久中文字幕| 我要看日韩黄色一级片| 身体一侧抽搐| 欧美高清性xxxxhd video| 欧美性猛交黑人性爽| 久久精品91蜜桃| 麻豆乱淫一区二区| 免费观看a级毛片全部| 国产精品永久免费网站| 国产成人午夜福利电影在线观看| 九九久久精品国产亚洲av麻豆| 欧美成人精品欧美一级黄| 国产午夜精品久久久久久一区二区三区| 久久99热6这里只有精品| 亚洲av中文av极速乱| 51国产日韩欧美| 久久99精品国语久久久| 干丝袜人妻中文字幕| 黄片wwwwww| 国产精品永久免费网站| 亚洲av免费在线观看| av专区在线播放| 国国产精品蜜臀av免费| 中文资源天堂在线| 欧美zozozo另类|