• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Novel Robust Watermarking Algorithm for Encrypted Medical Image Based on DTCWT-DCT and Chaotic Map

    2019-11-26 06:47:40JingLiuJingbingLiJierenChengJixinMaNaveedSadiqBaoruHanQiangGengandYangAi
    Computers Materials&Continua 2019年11期

    Jing Liu,Jingbing Li,Jieren ChengJixin Ma,Naveed Sadiq,Baoru Han,Qiang Geng and Yang Ai

    Abstract:In order to solve the problem of patient information security protection in medical images,whilst also taking into consideration the unchangeable particularity of medical images to the lesion area and the need for medical images themselves to be protected,a novel robust watermarking algorithm for encrypted medical images based on dual-tree complex wavelet transform and discrete cosine transform (DTCWT-DCT)and chaotic map is proposed in this paper.First,DTCWT-DCT transformation was performed on medical images,and dot product was per-formed in relation to the transformation matrix and logistic map.Inverse transformation was undertaken to obtain encrypted medical images.Then,in the low-frequency part of the DTCWT-DCT transformation coefficient of the encrypted medical image,a set of 32 bits visual feature vectors that can effectively resist geometric attacks are found to be the feature vector of the encrypted medical image by using perceptual hashing.After that,different logistic initial values and growth parameters were set to encrypt the watermark,and zero-watermark technology was used to embed and extract the encrypted medical images by combining cryptography and third-party concepts.The proposed watermarking algorithm does not change the region of interest of medical images thus it does not affect the judgment of doctors.Additionally,the security of the algorithm is enhanced by using chaotic mapping,which is sensitive to the initial value in order to encrypt the medical image and the watermark.The simulation results show that the pro-posed algorithm has good homomorphism,which can not only protect the original medical image and the watermark information,but can also embed and extract the watermark directly in the encrypted image,eliminating the potential risk of decrypting the embedded watermark and extracting watermark.Compared with the recent related research,the proposed algorithm solves the contradiction between robustness and invisibility of the watermarking algorithm for encrypted medical images,and it has good results against both conventional attacks and geometric attacks.Under geometric attacks in particular,the proposed algorithm performs much better than existing algorithms.

    Keywords:Encrypted medical images,zero-watermarking,DTCWT,perceptual hash,chaotic map.

    1 Introduction

    Nowdays,with the promotion of big data and cloud platforms,the use of modern diagnostic tools such as medical images to diagnose and predict diseases is more and more widely in the medical industry.However,the medical image is a special kind of digital image,which contains personal information like the patient's name,gender,age et al.and the medical information carried by themselves that reflect the patients’ health.When they are transmitted over the internet,there exists a security risk of information leakage [Vengadapurvaja,Nisha,Aarthy et al.(2017);Mothi and Karthikeyan (2019);Qasim,Meziane and Aspin (2018)],especially for some patients with special identities.It is urgent to properly handle this problem as soon as possible in order to ensure the security of information transmission and processing [Elhoseny,Ramirez-Gonzalez,Abu-Elnasr et al.(2018)].

    Digital watermarking technology is an effective technique of multimedia copyright protection and has been widely explored by researchers since its appearance.However,most digital watermarking algorithms remain in the plaintext domain [Fan,Chao and Chieu (2019);Bamal and Kasana (2018);Thanh and Tanaka (2017);Kavitha,Palanisamy and Sureshkumar (2018);Soualmi,Alti and Laouamer (2018);Rai and Singh (2017)].That is to say,the embedding and extraction of the watermark are done in unencrypted carrier images.As a result,on one hand,the embedding of the watermark must be carried out by the owner of the watermark at the same time to ensure data protection [Thanki,Borra,Dwivedi et al.(2017)].And the embedding and extraction of the watermark cannot be handled by a third party,otherwise,the watermark information could be leaked.On the other hand,since the related operation is performed in the plaintext domain,if the plaintext medical image is intercepted during the transmission process,it is easy to expose the information of the carrier image itself.Therefore,the robust digital watermarking technology of the plaintext medical image can only guarantee the security of the watermark information,ignoring the consideration of the carrier medical images.A medical image is a special type of image that contains a large amount of important information of patients.When applying digital watermarking technology in medical images,the safety of the carrier medical image itself should also be seriously considered[Lakshmi,Thenmozhi,Rayappan et al.(2018)].Performing the above operations in the encryption domain is a feasible solution.

    In order to satisfy the requirements of security,integrity and robustness of both watermark and carrier images,the ciphertext domain robust zero-watermark technique can be used.First,encrypt the patient’s plaintext medical image,and invest the obtained encrypted medical image as the carrier image for watermark embedding.After use the privacy information such as the patient’s ID,age,gender et al.as the watermark to encrypt,apply zero-watermark technology to embed into the encrypted medical image.In the process of information transmission,as the watermark and the image itself are ciphertext,on the one hand,the probability of occurrence of the information leakage event can be minimized,on the other hand,the embedding and extraction of the watermark can be handled by a third party.Unlike the digital watermarking scheme in the plaintext domain which embedding and extraction of the watermark needs to be done by the owner of the watermark [Chen,Yin,He et al.(2018)],with the homomorphism of encryption algorithm,watermark and carrier image in ciphertext state can be delivered to a trusted third party [Dai,Wang,Zhou et al.(2016)].The embedding and extraction of the watermark can be realized by utilizing the resource advantages of the third party (such as a powerful cloud server).Compared with the previous plaintext watermarking method,the encryption domain digital watermarking scheme has obvious security advantages.

    To implement digital watermarking in ciphertext domain,the image must be encrypted first.In the aspect of image encryption algorithm,more research results have been obtained.Such as Lavanya et al.[Lavanya and Natarajan (2012)] utilized standard stream cipher for image encryption and selecting non-region of interest tile to embed patient data.Xiong et al.[Xiong,Xu and Shi (2018)] used integer wavelet transform to encrypt image.Liu et al.[Liu,Qu and Xin (2016)] divided the medical image into regions of interest(ROI)and regions of non-interest (RONI).After encrypting the image with the secret key,she connected the least significant bit of the encrypted ROI with Electronic Patient Record (EPR)and embedded the data with the LSB replacement algorithm.Bouslimi et al.[Bouslimi,Bellafqira and Coatrieux (2016)] combined Paillier cryptography with quantitative modulation (QIM),inserted pre-watermark into the image before adding it,and used the modified QIM to encrypt the image.Nematzadeh et al.[Nematzadeh,Enayatifar,Motameni et al.(2018)] proposed a hybrid model of medical image encryption method.It takes the number of secure cryptographic images generated by the coupled mapping lattice as the initial population of the improved genetic algorithm.Laiphrakpam et al.[Laiphrakpam and Khumanthem (2017)] coded pure information as elliptic curvilinear coordinates to eliminate the calculation and improved ElGamal encryption scheme for medical image encryption.Avudaiappan et al.[Avudaiappan,Balasubramanian,Pandiyan et al.(2018)] used double encryption method.First verified puffer fish encryption with signature encryption algorithm,then upgraded the private key and public key by the Opposition based Flower Pollination (OFP).Cao et al.[Cao,Zhou,Chen et al.(2017)] proposed a medical image encryption algorithm with large key space and strong key sensitivity of source image edge mapping.Ismail et al.[Ismail,Said,Radwan et al.(2018)] designed an image encryption algorithm based on pseudo-random sequence generation and realized the safe transmission of medical MRI and X-ray images by using generalized DH mapping.

    However,the image encryption algorithms that can be used for robust digital watermarking at this stage are not very mature [Laiphrakpam and Khumanthem (2017;Ismail,Said,Radwan et al.(2018)].It mainly has the following problems:Firstly,not all image encryption algorithms can guarantee the robustness of digital watermarks in the encrypted domain.For some image encryption algorithms,the watermark can be extracted after being embedded [Liu,Qu and Xin (2016);Xiong,Xu and Shi (2018);Bouslimi,Bellafqira and Coatrieux (2016)].But under the interference of various watermark attacks such as Gaussian noise,JPEG compression,median filtering,rotation,scaling and translation,the watermark quality is poor,and the watermark robustness cannot be guaranteed.Secondly,in the plaintext domain,although many robust digital watermarking algorithms have been proposed,due to the limitations of encryption algorithms,it will be quite a complex task to transplant these robust digital watermarking methods directly into the encrypted domain,especially in medical images with special requirements for images.

    Based on the above reasons,we proposed a robust digital watermarking algorithm for encrypted medical images.It adopts zero-watermark technology,and uses the dual-tree complex wavelet transform and Logistic chaotic map in the encryption domain.A reliable visual vector feature is selected in the encryption domain to embed and extract the encrypted domain watermark.This algorithm enhances the security of the medical image and the watermark.Without any changes to the original image and without decryption,the extraction of the watermark can be completed.With the help of the homomorphic characteristics of the encryption algorithm,the watermark and the carrier image in the encrypted state can be handed in a trusted third party.It not only solves the contradiction between the robustness and the invisibility of common algorithms,but also performs well in resisting conventional attacks and geometric attacks.

    2 The fundamental theory

    2.1 Dual-tree complex wavelet transform (DTCWT)

    2D DWT uses the separation and filtering of image rows and columns,and its twoextraction process brings the defects of translation sensitivity and lack of direction selection,which seriously affects the effect of feature extraction.Therefore,dual-tree complex wavelet transform (DTCWT)is born.Fig.1 and Fig.2 respectively showed the critical sampling of two-dimensional wavelet and the two-dimensional dual-tree complex wavelet and their two-dimensional edge representation.DTCWT adopted the DWT of binary tree structure and used two trees to represent the generated real and imaginary Numbers respectively [Selvakumar,Jerome and Rajamani (2016)].The formula is shown as follows:

    Figure1:Critical sampling of two-dimensional images:(a)DWT,(b)DTCWT

    Figure2:Edge representation of a two-dimensional image:(a)DTCWT,(b)DWT

    When transforming,two trees are carried out side-by-side with fixed sampling interval,as shown in Fig.3.The two-dimensional DTCWT will produce six direction (±15°,±45°,±75°)for high frequency sub images [Zebbiche,Khelifi and Loukhaoukha (2018)].It can effectively overcome the defects of DWT.Combined with other advantages,it has become the preferred transformation for the extraction of medical image features in this paper.

    Figure3:The dual-tree complex wavelet transform

    2.2 Logistic map

    The Logistic map is a typical chaotic model,which uses the following equation for repeated iteration:

    where,xk∈(0,1)represents the system variable,0≤μ≤4is the growth parameter,andk∈(0,1,2,...,n)is the number of iterations [Li,Liu and Liu (2019)].The performance of the system varies with the value ofμ.When 2.8<μ≤4,the obtained graph is shown in Fig.4.Starting fromμ=3,the system has two cycles and four cycles.When 3.569945672<μ≤4,the system enters achaotic state.And the chaotic state of the Logistic map is extremely sensitive to the initial value which can be used as an ideal sequence of the secret key.This chaos is used in the chaotic encryption of the medical images and the watermark,and their initial values are set to 0.135 and 0.2,respectively.

    Figure4:The bifurcation diagram of Logistic map

    2.3 Homomorphic encryption

    Encryption technology plays an important role in the processing of encrypted domain signals.However,not all encryption methods are suitable for signal processing in the encryption domain.Most encryption methods,such as DES and AES,fail to maintain algebraic correspondence between plaintext and ciphertext after encryption.To solve this problem,in 1978,Rivest et al.first proposed the concept of homomorphic encryption[Naqvi,Abbasi,Hussain et al.(2018)].That is,after performing some operation on the ciphertext encrypted by homomorphism and then decrypting it can obtained the same result by directly performing the same operation on the plain text without encryption.In this way,direct manipulation of ciphertext data can be achieved without initial decryptionwhich provides a feasible approach to secure signal processing.Homomorphic encryption is divided into full homomorphic encryption and partial homomorphic encryption.Due to its high computational complexity and time cost,the full homomorphic encryption algorithm is not ideal in practical application.Therefore,this paper uses the Paillier cipher system to design the encryption scheme.Paillier cryptosystem is a public key cryptosystem with homomorphic and probabilistic properties,and its security has been proved.

    3 The proposed algorithm

    We propose a robust zero-watermarking scheme for encrypted medical images,which mainly uses DTCWT-DCT transform and Logistic chaotic mapping as shown in Fig.5.It is divided into the main stages of original medical image encryption,feature extraction and watermark encryption,watermark embedding and extraction.By using the homomorphism of the encryption system,the outputs are watermarked encrypted images after embedding the watermark.

    Figure5:The proposed algorithm scheme

    Due to the watermark image and the original medical image are both encrypted,the embedding and extraction of the watermark can be safely performed by a third-party cloud server.Furthermore,after the users decrypted,the decryption images that meet the application requirements can be obtained.

    3.1 Medical image encryption

    In order to protect the original medical image,we carry out our watermark algorithm in the encryption domain.Fig.6.shows the encryption scheme for original medical images.The describtion is as follows:

    1)Apply two-level DTCWT transform on the original medical images to obtain the six wavelet coefficients high-frequency sub-bands in each layer of the double-tree and two low-frequency coefficients;

    2)Apply DCT transform to each wavelet sub-band coefficient to get the DCT coefficient matrix of the subband coefficientD(i,j);

    3)Obtain the encryption matrixC(i.j)by using Logistic chaotic mapping structure chaotic sequenceX(i.j),via the symbolic functionSgn(x)andreshape(X(i,j));

    4)For binary encryption matrixC(i.j)and dtcwt-dct coefficient matrixD(i.j),use the dot multiplication operation to obtain the encryption coefficient matrixED'(i,j);

    5)IDCT transformation is performed on the encryption coefficient matrixED'(i,j)to obtain the reconstructed encrypted sub-band wavelet coefficient matrixED(i,j);

    Figure6:Encryption of original medical images

    6)IDTCWT transformation is performed on the matrixED(i,j)to obtain the encrypted medical imageE(i,j).

    As shown below,Fig.7 is the original medical image that was randomly selected,while Fig.8 is the corresponding medical image encrypted by DTCWT-DCT.

    Figure7:The original medical images:(a)Brain,(b)Arm,(c)Coronary artery,(d)Foot,(e)Knee,(f)Multi-phase pancreas,(g)Neck,(h)Shoulder,(i)Wrist

    Figure8:The encrypted medical images:(a)Encrypted Brain,(b)Encrypted Arm,(c)

    Encrypted Coronary artery,(d)Encrypted Foot,(e)Encrypted Knee,(f)Encrypted Multiphase pancreas,(g)En-crypted Neck,(h)Encrypted Shoulder,(i)Encrypted Wrist

    3.2 Feature extraction and watermark encryption

    To find a visual feature vector suitable for all encrypted medical images,we randomly selected a normal human brain image of 128 pixels by 128 pixels for encryption,performed DTCWT-DCT transformation on the encrypted image,and carried out various attacks as shown in Tab.1.By observing the low frequency coefficients of the encrypted images after transformation,we found that although the values of the low frequency coefficients of encrypted brain images after DTCWT-DCT transformation varies greatly under various attacks,their symbols remain basically unchanged.In this paper,32 bit low-frequency data is selected for symbol transformation,and all coefficient values greater than zero or equal to zero are replaced by ‘1’,and those less than zero are replaced by ‘0’.For convenience of explanation,the first nine bits of the data are listed in Tab.1.Their units are all 1.0e+04.In this way,we get a sequence of low-frequency coefficient symbols ‘101000000’ of the encrypted brain iamge.And the symbol sequence of all the images being attacked is consistent with the original image which is equal to 1.00.

    Table1:Changes of DTCWT-DCT coefficients under different attacks for the encrypted original image

    Based on the above conclusions,we performed the same experiments on a large number of CT images and MRI images and calculated the normalized correlation coefficient values between them using their respective 32 bits symbol vectors.Tab.2 lists the test results of the encrypted medical images which are shown in Fig.8.It is apparent from the results that the NC values are both less than 0.5 compared with others,and their own NC values are all 1.0.Hence,the low-frequency coefficients of the encrypted medical images transformed by DTCWT-DCT can be used as the effective visual feature vectors.

    Table2:Values of the correlation coefficients between different images (32 bits)

    3.3 Watermark embedding and extraction

    Figure9:Watermark embedding process

    A medical image is a special type of image,which has strict requirements regarding image data integrity.Therefore,we use zero-watermark technology to complete the embedding of the watermark.In the embedding process,the watermark embedding is completed by associating the feature vector of the encrypted image with the watermark sequenceEW(j),which is described as follows:

    1)Extract the feature vectorEVF(j)from the encrypted medical imageE(i,j);

    2)Obtain the encrypted watermark sequenceEW(j)via encrypting the original watermark;

    3)Perform a XOR operation on symbol sequenceEVF(j)and encrypted watermark sequenceEW(j)to obtain a secret keyKey(j),and the embedding of watermark is completed.

    The steps to extract the watermark in ciphertext domain are as follows:

    1)Extract the feature vectorEVF' (j)of the medical image to be testedE'(i,j);

    2)Perform a XOR operation on the feature vectorEVF' (j)and key sequenceKey(j)to obtain the extracted watermarkEW'(j);

    3)The extracted encrypted watermark is decrypted to obtain the restored watermark.

    Figure10:Watermark extraction process

    4 Simulation and analysis

    Based on matlab 2016,all the encrypted medical images in randomly selected in Fig.8 were simulated.The sizes of the selected encrypted medical images are 128 pixels×128 pixels,and the watermark image is 32 pixels×32 pixels which is selected as a meaningful image.Taking the image of Fig.7(a)as an example,the proposed algorithm is used to encrypt the image and the watermark,generating the encrypted image embedded with watermark and their decryption effect images.As is apparent from Fig.11,the encrypted image and the watermark are identical to the original image without being attacked,NC=1.0.After chaotic encryption,the medical image and the watermark can no longer distinguish the initial shape and the content.Different initial values enhance the security of the encryption algorithm.

    Figure11:The medical image and watermark in the encrypted domain:(a)Original medical image (b)Encrypted medical image;(c)Encrypted watermarked medical image;(d)Decrypted watermarked medical image;(e)Original watermark;(f)Chaotic encryption watermark;(g)Extracted watermark;(h)Decrypted watermark

    Then,we attacked all the encrypted medical images in Fig.8 and measured the extracted watermarks with PSNR values and NC values to verify the robustness of the algorithm.The results of their attacks are as follows.Although we have tested all the images,for the sake of illustration,the attacked results are analyzed with Fig.ss 8 (a)as an example.

    4.1 Conventional attacks

    The performance of the tested encrypted medical image under conventional attacks are shown in Tab.3.Observing the data of Tab.3,with Gaussian noise,JPEG compression and median filtering attacks intensity increasing,the PSNR values and the NC values of the watermarked encrypted medical images showed a decreasing trend.Even when the Gaussian noise intensity reached 25%,JPEG compression reached as low as 4%,and the median filtering size reached 11 x 11,in the case of 10 filtering times,although the encrypted medical images have undergone great changes,their average NC value is still as high as 0.85,which demonstrates good robustness.

    Table3:The PSNR and NC values under conventional attacks

    PSNR=11.44 dB NC=0.90 25%4% images/BZ_454_1142_705_1354_918.png images/BZ_454_1546_706_1758_918.png JPEG compression 6%PSNR=23.63 dB images/BZ_454_1142_996_1354_1208.png NC=0.84 images/BZ_454_1546_996_1758_1208.png 15%[33] images/BZ_454_882_1691_909_1744.png PSNR=26.09 dB images/BZ_454_1142_1286_1354_1499.png PSNR=29.78 dB images/BZ_454_1142_1578_1354_1791.png NC=0.90 images/BZ_454_1546_1286_1758_1499.png NC=1.00 images/BZ_454_1546_1578_1758_1791.png Median filter(10 times)[77] images/BZ_454_882_1981_909_2034.png [1111] images/BZ_454_882_2271_909_2324.png PSNR=28.85 dB images/BZ_454_1142_1869_1354_2081.png PSNR=21.99 dB images/BZ_454_1142_2159_1354_2371.png NC=0.94 images/BZ_454_1546_1869_1758_2081.png NC=0.88 images/BZ_454_1546_2159_1758_2372.png PSNR=19.21 dB NC=0.84 images/BZ_454_1142_413_1354_626.png PSNR=9.01 dB images/BZ_454_1546_413_1758_626.png NC=0.86

    4.2 Geometrical attacks

    Tab.4 shows the PSNR and NC values of watermarked encrypted medical images under geometric attacks and their corresponding images.When the watermarked encrypted medical image was translated down by 17%,nearly one-fifth of the image watermark was lost.The watermark can still be accurately extracted,and NC=0.61.When it is attacked counterclockwise,rotated by 20 degrees and cut by 1/3 on the Y-axis,the watermark can still be clearly extracted.In addition,almost 100% of the watermark of encrypted medical images can be extracted,which means almost no loss at all under the scaling attacks.These data results show that the proposed algorithm is robust to geometric attacks,and it has a wide range of variabilities and high NC values.

    Table4:The PSNR and NC values under geometrical attacks

    7° images/BZ_456_1174_346_1386_558.png PSNR =15.37 dB images/BZ_456_1528_372_1740_585.png NC=0.65 Rotation(counterclockwis e)14° images/BZ_456_1174_689_1386_901.png PSNR =13.33 dB images/BZ_456_1528_715_1740_927.png NC=0.61 20°5% images/BZ_456_1174_1031_1386_1244.png PSNR =12.36 dB images/BZ_456_1174_1381_1386_1585.png images/BZ_456_1528_1058_1740_1270.png NC=0.53 images/BZ_456_1526_1376_1742_1589.png /NC=0.90 Cropping(Y direction)24% images/BZ_456_1173_1693_1386_1852.png / images/BZ_456_1528_1666_1740_1879.png NC=0.83 30% images/BZ_456_1174_1988_1386_2137.png / images/BZ_456_1528_1956_1740_2169.png NC=0.67

    To verify the homomorphism of the proposed algorithm,we compared the quality of the image after the attacks and the extracted NC values of both the watermarked unencrypted medical image and the watermarked encrypted image in Tab.5.The experimental data results are basically consistent in the encrypted and unencrypted domains,indicating that the encryption algorithm we use has good homomorphism.

    Table5:The PSNR and NC values in DTCWT-DCT plaintext and encrypted domain

    4.3 Algorithm comparison

    In order to further verify the robustness of the proposed algorithm,especially under geometric attacks,we replaced the encrypted medical image with a ‘Luna’ image to mask the difference between the results of selecting different samples.Then,the proposed algorithm is compared with the existing algorithm [Zear,Singh and Kumar (2018);Thanki,Borra,Dwivedi et al.(2017);Nematzadeh,Enayatifar,Motameni et al.(2018);Laiphrakpam and Khumanthem (2017)].Their comparison results are shown in Tab.6-Tab.7 and Figs.12-18,respectively.Observing this comparative data,we can find that although the proposed algorithm performs slightly inferiorly to the algorithm proposed by Nematzadeh et al.[Nematzadeh,Enayatifar,Motameni et al.(2018)] under the scaling attacks,it is clearly superior to the existing algorithm in both conventional attacks and geometric attacks in general.Besides,the proposed algorithm encrypted the medical image itself,which enhanced the security of the algorithm.

    Figure12:The NC data of different algorithms under Gaussian Noise attacks

    Figure13:The NC data of different under JPEG attacks

    Figure14:The NC data of different algorithms under Median Filter (10 times)attacks

    Figure15:The NC curves of different algorithms under Scaling attacks

    Figure16:The NC curves of different algorithms under Down Translation attacks

    Figure17:The NC curves of different algorithms under Right Translation attacks

    Figure18:The NC curves of different algorithms under Cropping attacks

    Table6:Comparison values of different algorithms under conventional attacks

    Table7:Comparison values of different algorithms under geometrical attacks

    Therefore,the algorithm presented in this paper is outstanding in all kinds of attacks,in particular solving the problem that existing algorithms cannot balance geometric attacks and security robustness.It has strong resistance to geometric attacks and exhibits good robustness.

    5 Conclusions

    This paper proposed a new robust watermarking algorithm for encrypted medical images based on DTCWT-DCT.The security of medical image transmission is enhanced by encrypting the medical image itself and setting different initial values of chaos.It used the low-frequency coefficient of the DTCWT-DCT transform domain of the encrypted medical image as its feature vector,performed logical operations with the chaotic encrypted watermark to generate the secret key to realize the embedding and extraction of the encrypted medical image.Using the homomorphism of the encryption algorithm,the watermark can be extracted easily without the original image or decryption.The simulation results show that the proposed algorithm can solve the contradiction between robustness and invisibility well,and is robust to both conventional attacks and geometric attacks.

    Acknowledgement:This work is supported by the Key Research Project of Hainan Province [ZDYF2018129],the Higher Education Research Project of Hainan Province(Hnky2019-73),the National Natural Science Foundation of China [61762033],the Natural Science Foundation of Hainan [617175],the Special Scientific Research Project of Philosophy and Social Sciences of Chongqing Medical University [201703] and the Key Research Project of Haikou College of Economics [HJKZ18-01].

    亚洲欧洲精品一区二区精品久久久 | 亚洲av成人精品一二三区| 精品人妻熟女毛片av久久网站| 少妇精品久久久久久久| tube8黄色片| 久久久久久久亚洲中文字幕| 极品少妇高潮喷水抽搐| 国产乱人偷精品视频| 妹子高潮喷水视频| 蜜桃国产av成人99| 久久久久久人妻| 国产亚洲av片在线观看秒播厂| 久久久久久久国产电影| 乱人伦中国视频| 在线观看人妻少妇| 亚洲国产看品久久| 成年动漫av网址| 国产午夜精品一二区理论片| 国产欧美亚洲国产| 国产av码专区亚洲av| 香蕉丝袜av| 伊人亚洲综合成人网| 边亲边吃奶的免费视频| 人成视频在线观看免费观看| 国产精品麻豆人妻色哟哟久久| av不卡在线播放| 亚洲五月色婷婷综合| 国产成人欧美| 乱码一卡2卡4卡精品| 免费人成在线观看视频色| 免费少妇av软件| 国产深夜福利视频在线观看| av黄色大香蕉| 国产免费又黄又爽又色| 国产精品不卡视频一区二区| 十八禁网站网址无遮挡| 免费看光身美女| 亚洲经典国产精华液单| 满18在线观看网站| 在线观看免费日韩欧美大片| 免费播放大片免费观看视频在线观看| 极品人妻少妇av视频| 国产一区亚洲一区在线观看| 高清av免费在线| 91久久精品国产一区二区三区| 视频中文字幕在线观看| 久久97久久精品| 亚洲欧美清纯卡通| 精品久久国产蜜桃| 亚洲国产av影院在线观看| 99热这里只有是精品在线观看| 90打野战视频偷拍视频| 精品国产一区二区三区久久久樱花| 精品人妻偷拍中文字幕| av播播在线观看一区| 欧美日韩精品成人综合77777| 最新中文字幕久久久久| 久久人人爽人人爽人人片va| 国产视频首页在线观看| 少妇猛男粗大的猛烈进出视频| av不卡在线播放| 国产乱来视频区| 精品99又大又爽又粗少妇毛片| 国产xxxxx性猛交| 成人午夜精彩视频在线观看| 欧美+日韩+精品| 五月开心婷婷网| 日本免费在线观看一区| 91午夜精品亚洲一区二区三区| 一区二区三区精品91| 大话2 男鬼变身卡| av网站免费在线观看视频| 全区人妻精品视频| 1024视频免费在线观看| 国产极品粉嫩免费观看在线| 亚洲内射少妇av| 在线观看国产h片| 又黄又粗又硬又大视频| 日韩一区二区三区影片| 丝瓜视频免费看黄片| 国产色婷婷99| 国产成人午夜福利电影在线观看| 亚洲在久久综合| 一级毛片黄色毛片免费观看视频| 日产精品乱码卡一卡2卡三| 最黄视频免费看| 777米奇影视久久| 国产精品三级大全| 啦啦啦视频在线资源免费观看| 9热在线视频观看99| 在线亚洲精品国产二区图片欧美| 亚洲三级黄色毛片| 在线天堂中文资源库| 永久网站在线| 久久久久精品久久久久真实原创| 国产国拍精品亚洲av在线观看| 免费大片18禁| 国产精品久久久久久精品电影小说| 欧美3d第一页| 成人综合一区亚洲| 久久国产精品大桥未久av| 日韩av在线免费看完整版不卡| 97在线人人人人妻| 久久这里有精品视频免费| 人人妻人人爽人人添夜夜欢视频| 天堂中文最新版在线下载| 国产熟女午夜一区二区三区| 国产亚洲欧美精品永久| xxxhd国产人妻xxx| 国产精品久久久久久精品电影小说| 丁香六月天网| 看免费成人av毛片| 日产精品乱码卡一卡2卡三| 精品午夜福利在线看| 亚洲 欧美一区二区三区| 午夜激情av网站| 女人被躁到高潮嗷嗷叫费观| 精品一品国产午夜福利视频| 免费观看av网站的网址| 精品一区二区三区四区五区乱码 | 91午夜精品亚洲一区二区三区| av片东京热男人的天堂| 久久影院123| 欧美 亚洲 国产 日韩一| 18禁动态无遮挡网站| 蜜桃在线观看..| 你懂的网址亚洲精品在线观看| 哪个播放器可以免费观看大片| 男女边吃奶边做爰视频| 丰满少妇做爰视频| 亚洲成人一二三区av| 秋霞伦理黄片| 免费观看在线日韩| 精品国产一区二区久久| 9色porny在线观看| 下体分泌物呈黄色| 乱人伦中国视频| 亚洲久久久国产精品| 亚洲一码二码三码区别大吗| 精品国产乱码久久久久久小说| 国产激情久久老熟女| 亚洲欧美清纯卡通| 中文字幕亚洲精品专区| 欧美激情 高清一区二区三区| 最近最新中文字幕大全免费视频 | 免费不卡的大黄色大毛片视频在线观看| 观看美女的网站| 国产精品久久久久久精品电影小说| av线在线观看网站| 国产成人一区二区在线| 午夜福利网站1000一区二区三区| 亚洲欧洲国产日韩| av天堂久久9| 精品久久久精品久久久| 在线观看www视频免费| 热99久久久久精品小说推荐| 国产熟女欧美一区二区| 制服诱惑二区| 国产欧美另类精品又又久久亚洲欧美| 一二三四中文在线观看免费高清| 久久人人爽人人片av| 久久久久久久亚洲中文字幕| 看十八女毛片水多多多| 国产精品国产三级专区第一集| 亚洲精品乱久久久久久| 黑人猛操日本美女一级片| 亚洲婷婷狠狠爱综合网| 丰满饥渴人妻一区二区三| 午夜免费男女啪啪视频观看| 天天操日日干夜夜撸| 一本—道久久a久久精品蜜桃钙片| 国产免费视频播放在线视频| 国产一级毛片在线| 亚洲欧美成人精品一区二区| 一级毛片黄色毛片免费观看视频| 18禁裸乳无遮挡动漫免费视频| 国产1区2区3区精品| 女的被弄到高潮叫床怎么办| 在线精品无人区一区二区三| 欧美日韩成人在线一区二区| 一级a做视频免费观看| 9热在线视频观看99| 国产又爽黄色视频| 精品人妻在线不人妻| 免费av不卡在线播放| 大香蕉久久成人网| 国产激情久久老熟女| 日本欧美国产在线视频| 极品少妇高潮喷水抽搐| 久久久久久久久久人人人人人人| 久久这里只有精品19| 一二三四中文在线观看免费高清| 黄色 视频免费看| 日本黄色日本黄色录像| 91午夜精品亚洲一区二区三区| 欧美少妇被猛烈插入视频| 在线 av 中文字幕| tube8黄色片| 午夜福利在线观看免费完整高清在| www.色视频.com| 久久午夜福利片| 亚洲美女搞黄在线观看| 五月开心婷婷网| 久久这里只有精品19| 大片免费播放器 马上看| 内地一区二区视频在线| 大陆偷拍与自拍| av福利片在线| 国产综合精华液| 黄色 视频免费看| 在线精品无人区一区二区三| 18在线观看网站| 国产亚洲最大av| 亚洲欧美日韩另类电影网站| 久久毛片免费看一区二区三区| 久久99一区二区三区| 日韩中文字幕视频在线看片| 亚洲欧美清纯卡通| 国产色爽女视频免费观看| 九九在线视频观看精品| 亚洲国产精品专区欧美| 黄色怎么调成土黄色| 亚洲美女搞黄在线观看| 你懂的网址亚洲精品在线观看| 各种免费的搞黄视频| 国产精品久久久久成人av| 亚洲欧美色中文字幕在线| 日本免费在线观看一区| 精品久久蜜臀av无| 在线 av 中文字幕| 国产av一区二区精品久久| 国产精品国产三级专区第一集| 国产综合精华液| 高清毛片免费看| 国产av码专区亚洲av| 爱豆传媒免费全集在线观看| 国产片特级美女逼逼视频| 国产又色又爽无遮挡免| 看非洲黑人一级黄片| 9191精品国产免费久久| av在线app专区| 国产福利在线免费观看视频| 少妇的逼好多水| 水蜜桃什么品种好| 18+在线观看网站| 最近中文字幕2019免费版| 91aial.com中文字幕在线观看| 777米奇影视久久| 一二三四中文在线观看免费高清| 亚洲美女搞黄在线观看| 女性生殖器流出的白浆| 久久久久久伊人网av| 一本大道久久a久久精品| 午夜视频国产福利| 一区二区三区精品91| 免费观看性生交大片5| 自线自在国产av| 一级毛片黄色毛片免费观看视频| 啦啦啦在线观看免费高清www| 国产 精品1| 18禁国产床啪视频网站| av福利片在线| 精品久久久精品久久久| 免费少妇av软件| 一区二区三区精品91| 久久 成人 亚洲| 久久久a久久爽久久v久久| 亚洲激情五月婷婷啪啪| 9色porny在线观看| 内地一区二区视频在线| 肉色欧美久久久久久久蜜桃| 国产激情久久老熟女| 黄网站色视频无遮挡免费观看| 捣出白浆h1v1| 极品人妻少妇av视频| 亚洲精品日本国产第一区| 亚洲人成网站在线观看播放| 精品人妻偷拍中文字幕| 国国产精品蜜臀av免费| 性色av一级| 看十八女毛片水多多多| 黑人高潮一二区| 侵犯人妻中文字幕一二三四区| 捣出白浆h1v1| 搡女人真爽免费视频火全软件| 一级毛片我不卡| 精品一品国产午夜福利视频| 亚洲精品视频女| 日本av手机在线免费观看| 久久精品国产鲁丝片午夜精品| 国产成人精品久久久久久| 欧美另类一区| 国产日韩欧美视频二区| 国产一区二区三区综合在线观看 | 狠狠精品人妻久久久久久综合| 色网站视频免费| 日本猛色少妇xxxxx猛交久久| 亚洲精品中文字幕在线视频| 国产精品一区二区在线观看99| 亚洲精品色激情综合| 久久国内精品自在自线图片| 成年动漫av网址| 婷婷色麻豆天堂久久| 久久韩国三级中文字幕| 亚洲国产毛片av蜜桃av| www.av在线官网国产| 国产免费福利视频在线观看| 97在线人人人人妻| 99久国产av精品国产电影| 免费观看无遮挡的男女| 搡老乐熟女国产| 国产成人免费观看mmmm| 成人手机av| 成人漫画全彩无遮挡| 啦啦啦啦在线视频资源| 大香蕉久久网| 中文字幕人妻熟女乱码| 中文字幕最新亚洲高清| 亚洲成人一二三区av| 国产av精品麻豆| 精品一区在线观看国产| 黄色 视频免费看| 欧美最新免费一区二区三区| 亚洲综合色网址| 天堂俺去俺来也www色官网| 少妇高潮的动态图| 成人国语在线视频| 亚洲人与动物交配视频| 欧美激情国产日韩精品一区| 日本vs欧美在线观看视频| 老司机影院成人| 国产探花极品一区二区| 十分钟在线观看高清视频www| 国产精品一区www在线观看| 日本黄色日本黄色录像| 亚洲av福利一区| 久久久久久人人人人人| 亚洲欧美精品自产自拍| 亚洲精品国产色婷婷电影| 老熟女久久久| 欧美亚洲 丝袜 人妻 在线| 91精品伊人久久大香线蕉| 国产日韩欧美在线精品| 成人手机av| 99九九在线精品视频| av视频免费观看在线观看| 少妇被粗大猛烈的视频| 亚洲欧美清纯卡通| 免费看不卡的av| 国产麻豆69| 国产精品国产三级国产专区5o| 色网站视频免费| 在线观看国产h片| 91成人精品电影| av免费观看日本| 夜夜骑夜夜射夜夜干| 热99久久久久精品小说推荐| 精品国产一区二区久久| 9热在线视频观看99| 久久久久精品人妻al黑| 午夜免费男女啪啪视频观看| 91aial.com中文字幕在线观看| 性色avwww在线观看| kizo精华| 一级毛片 在线播放| 亚洲欧美一区二区三区国产| 久久久久久久久久久免费av| 欧美国产精品一级二级三级| 中文字幕制服av| 男女下面插进去视频免费观看 | 国产又爽黄色视频| 国产黄频视频在线观看| 热re99久久国产66热| 国产淫语在线视频| 只有这里有精品99| 春色校园在线视频观看| 久久这里有精品视频免费| 中文字幕人妻熟女乱码| 曰老女人黄片| 久久久久国产网址| 免费不卡的大黄色大毛片视频在线观看| 少妇熟女欧美另类| 看十八女毛片水多多多| 男女国产视频网站| 久久精品国产鲁丝片午夜精品| 亚洲av国产av综合av卡| 久久精品国产综合久久久 | 成人漫画全彩无遮挡| 日韩视频在线欧美| 久久久久精品久久久久真实原创| a级毛片黄视频| 人人妻人人澡人人爽人人夜夜| 久久影院123| 日韩精品免费视频一区二区三区 | 最近手机中文字幕大全| 十八禁网站网址无遮挡| 久久人人爽人人爽人人片va| 婷婷色av中文字幕| 成人亚洲精品一区在线观看| 在线观看三级黄色| 三上悠亚av全集在线观看| 欧美最新免费一区二区三区| 青春草亚洲视频在线观看| 国产在线一区二区三区精| 超色免费av| 国产片特级美女逼逼视频| 五月开心婷婷网| 欧美少妇被猛烈插入视频| 极品少妇高潮喷水抽搐| 国产 一区精品| 熟女人妻精品中文字幕| 国产免费现黄频在线看| 精品第一国产精品| 国产又爽黄色视频| 久久精品久久久久久噜噜老黄| 日韩 亚洲 欧美在线| 一级毛片黄色毛片免费观看视频| 观看美女的网站| 亚洲丝袜综合中文字幕| 欧美人与性动交α欧美精品济南到 | 卡戴珊不雅视频在线播放| 丝袜喷水一区| 亚洲熟女精品中文字幕| 最近2019中文字幕mv第一页| 亚洲人成77777在线视频| 丰满乱子伦码专区| tube8黄色片| 少妇人妻 视频| 国产精品蜜桃在线观看| 国产精品 国内视频| 美国免费a级毛片| 女人久久www免费人成看片| 国产精品免费大片| 亚洲美女搞黄在线观看| av播播在线观看一区| 狂野欧美激情性bbbbbb| 午夜福利在线观看免费完整高清在| 最近中文字幕高清免费大全6| 国产精品人妻久久久久久| 精品午夜福利在线看| 九九爱精品视频在线观看| 国产精品偷伦视频观看了| 在现免费观看毛片| 成人亚洲精品一区在线观看| 午夜免费鲁丝| 亚洲丝袜综合中文字幕| av又黄又爽大尺度在线免费看| 丝瓜视频免费看黄片| av播播在线观看一区| 国产精品一区www在线观看| 你懂的网址亚洲精品在线观看| 欧美日韩视频高清一区二区三区二| 两个人免费观看高清视频| xxx大片免费视频| 中文字幕制服av| 久久久亚洲精品成人影院| 我要看黄色一级片免费的| 夫妻性生交免费视频一级片| 精品少妇久久久久久888优播| 免费看不卡的av| 亚洲内射少妇av| av在线老鸭窝| 国产成人91sexporn| 国产女主播在线喷水免费视频网站| videosex国产| 国产成人av激情在线播放| 欧美变态另类bdsm刘玥| 一本—道久久a久久精品蜜桃钙片| 97在线人人人人妻| 精品国产乱码久久久久久小说| 丝袜在线中文字幕| 91国产中文字幕| 一二三四在线观看免费中文在 | 一边亲一边摸免费视频| av在线app专区| 最新中文字幕久久久久| 一边摸一边做爽爽视频免费| 寂寞人妻少妇视频99o| 精品久久久精品久久久| 色94色欧美一区二区| 看免费av毛片| 在线精品无人区一区二区三| 黑人欧美特级aaaaaa片| 国产午夜精品一二区理论片| 免费av中文字幕在线| 久热这里只有精品99| 夫妻午夜视频| 在线观看免费视频网站a站| 国产欧美另类精品又又久久亚洲欧美| 午夜福利视频在线观看免费| 成人国产麻豆网| 男人舔女人的私密视频| 中文字幕人妻熟女乱码| 国产精品蜜桃在线观看| 午夜av观看不卡| 韩国高清视频一区二区三区| 免费高清在线观看视频在线观看| 欧美xxxx性猛交bbbb| 久久久久久久久久久久大奶| 老司机亚洲免费影院| 精品熟女少妇av免费看| 日韩免费高清中文字幕av| 大陆偷拍与自拍| 一级毛片我不卡| 夫妻性生交免费视频一级片| 久久韩国三级中文字幕| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 最近最新中文字幕大全免费视频 | 欧美 日韩 精品 国产| 91国产中文字幕| 成人二区视频| 亚洲美女黄色视频免费看| 欧美亚洲日本最大视频资源| 汤姆久久久久久久影院中文字幕| 建设人人有责人人尽责人人享有的| 天天操日日干夜夜撸| 在现免费观看毛片| 边亲边吃奶的免费视频| 国产精品一区www在线观看| 日韩av在线免费看完整版不卡| 欧美精品亚洲一区二区| 纵有疾风起免费观看全集完整版| 国产精品一区www在线观看| 国产精品.久久久| 99久久综合免费| 久久久国产精品麻豆| 欧美日韩国产mv在线观看视频| 在线天堂最新版资源| 久久国内精品自在自线图片| 国产成人精品无人区| av女优亚洲男人天堂| 99精国产麻豆久久婷婷| 人妻人人澡人人爽人人| 欧美日韩综合久久久久久| 美国免费a级毛片| 永久网站在线| av电影中文网址| 欧美xxⅹ黑人| 黄色视频在线播放观看不卡| 22中文网久久字幕| 国产乱来视频区| 免费高清在线观看视频在线观看| 妹子高潮喷水视频| 国产 一区精品| 国产欧美日韩一区二区三区在线| 欧美日韩精品成人综合77777| 婷婷色av中文字幕| 波多野结衣一区麻豆| 侵犯人妻中文字幕一二三四区| av播播在线观看一区| 999精品在线视频| 高清黄色对白视频在线免费看| 久久国产亚洲av麻豆专区| 十八禁网站网址无遮挡| 国产精品久久久久久av不卡| 国产熟女欧美一区二区| www日本在线高清视频| 最近中文字幕2019免费版| 搡老乐熟女国产| 亚洲精华国产精华液的使用体验| 精品久久蜜臀av无| 韩国精品一区二区三区 | 欧美3d第一页| 日韩av在线免费看完整版不卡| 黄网站色视频无遮挡免费观看| 街头女战士在线观看网站| 欧美丝袜亚洲另类| 欧美人与性动交α欧美精品济南到 | 超色免费av| 黄色 视频免费看| 国产 一区精品| 国产日韩欧美视频二区| freevideosex欧美| 亚洲精品成人av观看孕妇| 街头女战士在线观看网站| 国产精品蜜桃在线观看| 久久这里只有精品19| 精品亚洲成国产av| 九色成人免费人妻av| 久久毛片免费看一区二区三区| 久久久精品94久久精品| 精品亚洲成国产av| 爱豆传媒免费全集在线观看| 在线观看免费视频网站a站| 亚洲欧洲日产国产| 久久精品熟女亚洲av麻豆精品| av免费在线看不卡| 天天影视国产精品| 日韩中文字幕视频在线看片| 免费少妇av软件| 日本vs欧美在线观看视频| 亚洲三级黄色毛片| 伦理电影免费视频| 欧美日本中文国产一区发布| 99九九在线精品视频| 中文天堂在线官网| 久久人人爽人人片av| 一区在线观看完整版| 丝瓜视频免费看黄片| 日韩中文字幕视频在线看片| 国产免费又黄又爽又色| 久久ye,这里只有精品| 国产探花极品一区二区| 亚洲精品av麻豆狂野| 大陆偷拍与自拍| 亚洲情色 制服丝袜| 成人亚洲精品一区在线观看| 大香蕉97超碰在线| 蜜臀久久99精品久久宅男| 欧美成人精品欧美一级黄| 色吧在线观看| 久热这里只有精品99| 亚洲 欧美一区二区三区| 色网站视频免费| 亚洲精品日本国产第一区|