• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Secure Image Hiding Scheme Based on Magic Signet

    2020-05-14 01:23:32ChinFengLeeYingXiangWang

    Chin-Feng Lee|Ying-Xiang Wang

    Abstract—Image data hiding technology is secret communications that carry hidden data in such a way that no one except the sender and intended recipients can even realize there is a hidden message.High embedding capacity,good images quality,and security are three important essentials.In this paper,each confidential hexadecimal will be carried by two cover pixels based on a magic matrix generated from a square template to reach the goal of higher embedding capacity while keeping good image visualization.Experimental results reveal that the proposed scheme guarantees higher embedding capacity of 2 bits per pixel and has the peak signal-to-noise ratio(PSNR)of 44.7 dB on average.Moreover,secret keys are used to ensure security consideration.

    1.Introduction

    People have been unable to leave the Internet now.Therefore,how to enhance information security has become an important issue at present.Steganography is an art of secret communication in an appropriate carrier.Image hiding technology is a particular subject of steganography.The secret information is accommodated in an original image(also called a cover image)based on a secure key,becoming a stego-image.Therefore,the image hiding technology can carry out message exchanges.A successful image hiding technique is required to reach the need of security,embedding capacity,and image visual quality.

    Here,we mentioned the irreversible information hiding method.The irreversible advantage lies in the simple method,high possession,and wide applications.In 1989,Turneret al.[1]published the least significant bit(LSB)method.This method hides the confidential information bits one by one into the cover image.If the confidential information is different from the original image pixels,then the confidential information will directly replace the original image to obtain the stego-image.In 2006,Mielikainen[2]proposed an improved LSB matching method,which uses a pair of two pixel values and hides two confidential information bits at a time.Firstly,it determines if LSB of the first pixel value is equal to the hidden confidentiality bit.When the two are different,then it uses a binary function to select the pixel value to be modified.In 2004,Chan and Cheng[3]proposed a data hiding method by simple LSB substitution with an optimal pixel adjustment process(OPAP).This method can use the low additional calculation to enhance image quality.

    In 2006,Zhang and Wang[4]proposed the method based on exploiting modification direction(EMD).The EMD method can hide each 5-ary data in two original pixels,where at most only one pixel increases or decreases the value to achieve high image quality.In 2013,a generalized EMD (GEMD)method was proposed by Kuo and Wang[5],which usesncover-pixels in a group,and is able to embed(n+1)bits of secret data.In 2010,Lee and Chen[6]developed a modulus function to maintain the image quality good and provide the hiding capacity,while reducing the memory requirements.

    In 2003,Wu and Tsai[7]proposed the pixel value different (PVD)method.The PVD method calculates the difference between a pair of consecutive pixels.The difference between the pair of pixels is compared with the predefined interval widths to determine the amount of bits.In 2014,Chen[8]enhanced the improved modulus function for the PVD(IMF-PVD)hiding method.The amount of confidential information to be hidden in this method depends on the complexity of each hidden block.The number of bits hidden in the complex area is more,but the smooth area is less.The human eyes are less sensitive to changes in complex areas than smooth areas.Its purpose is to improve image quality by hiding more data and to protect the hidden information.In 2015,Shen and Huang[9]proposed a method that combines PVD and EMD.This method will first use the Hilbert curve to convert the original image into a one-dimensional pixel stream,and then divide the two consecutive pixels into nonoverlapping hidden blocks.PVD is applied to estimate the cardinality of the number of bits and hides it in pixel pairs.

    Changet al.[10]introduced a data hiding scheme based on the Sudoku solution to hide secret data.Although the Sudoku scheme has less calculation,it owns lower image quality.In 2014,Changet al.[11]proposed a turtleshaped shell scheme with the high image quality of 53.3 dB on average.Both schemes can reach the embedding capacity of 1.5 bits per pixel(bpp).In 2015,Kurupet al.[12]proposed the octagon shape shell.This method has an octagonal shape that contains 16 different numbers.The reference matrix modifies the value of the overlay pixel pair,thereby hiding confidential information.In 2016,Liuet al.[13]increased the embedding capacity by using the location table to develop the turtle shell-based scheme to reach 2 bits per pixel on average.Jinet al.[14]minimized the turtle shell matrix based stego-image distortion using particle swarm optimization.Xieet al.[15]developed an approach based on a two-layer turtle shell matrix to enhance the embedding capacity.

    To enhance the embedding capacity with an indistinguishable form,a square template is generated.This scheme is the extension of the pencil-shaped pattern embedding scheme[16].Our scheme first designs a magic matrix with each dimension of the range from 0 to 255,and then adjusts pixel values according to the position where the data can be located on the magic matrix so that each cover pixel pair can carry a nibble,reaching the high embedding capacity of 2 bpp.

    The rest of this paper is as follows.Section 2 gives a simple literature review.Section 3 describes the proposed scheme in detail.The experimental results and conclusions are discussed in Sections 4 and 5,respectively.

    2.Related Work

    In this section,a hiding scheme based on turtle-shaped shells developed by Changet al.[11]is introduced.Assume that the secret message is expressed in binary.Each time three bits of secret data can be hidden within two pixels.Fig.1(a)shows an example of a magic matrix M based on turtle-shaped shells with a size of 256×256.Two adjacent elements in the same row of matrix M have a difference of 1;two adjacent elements of the same column have alternatively difference of 2 or 3,respectively.LetM(pi,pi+1)andM(qi,qi+1)be the numbers in the magic matrix M where(pi,pi+1)and(qi,qi+1)represent the pairs of cover pixels and stego-pixels before/after the 3-bit secret datasihas been concealed.

    Fig.1.Magic matrix M based on turtle-shaped shells:(a)magic matrix M,(b)M(4,5) is located within a turtleshaped shell,(c)M(4,4)is an edge number,and(d)M(0,1)is not located at any turtle-shaped shell.

    Fig.2.Example of Sudoku:(a)element M(4,3)=7,(b)candidate elements in vertical Sudoku grids,(c)horizontal Sudoku grids,and(d)square Sudoku grids.

    If the numberM(pi,pi+1)falls in one turtle-shaped shell as shown in Fig.1(b),then the secret numbersialso can be found in the same turtle-shaped shell such thatsi=M(qi,qi+1).However,IfM(pi,pi+1)is an edge number,then the numbersican be found in the surrounding three turtle shells as shown in Fig.1(c).The calculation should be performed to find the minimum distance between(pi,pi+1)and(qi,qi+1)under the condition thatsi=M(qi,qi+1).Another special case occurs when the numberM(pi,pi+1)is not located at any turtle-shaped shell;the solution as shown in Fig.1(d)is to find the shortest distance between(pi,pi+1)and(qi,qi+1)so that the numberM(qi,qi+1)equals to the secret datasi.

    The turtle-shaped shell scheme is a great idea and the one that we can have no doubt to dig deep.However,the embedded capacity payload has some limitations.The following discussion is also based on the Sudoku-based hiding method proposed by Changet al.[10].In 1979,Garns invented Sudoku[17].A Sudoku box contains nine 3×3 sub-boxes,and each row and each column of the Sudoku grid contains 0 to 8 different numbers.WhenM(pi,pi+1)=M(4,3),the value in matrix M is 7 as shown in Fig.2(a).Next,we assume that the confidential information is (011 001)2,which can be converted into values of base-9.So(011 001)2=(2 7)9.At this point,we will learn that the values to be searched for in the matrix M are 2 and 7,respectively.Next,we will follow the three known candidate elements,as shown in Figs.2(b)to(d).After three candidate elements are finally obtained,the three candidate elements are compared,and the original pixelM(pi,pi+1)can be modified to the candidate pixelM(qi,qi+1)is found.The candidate element with the shortest-distance is our final decision(stego-pixel pair)to hide the secret data.

    Another topic to be introduced is an octagonal information hiding method proposed by Kurupet al.[12].In this octagon,0 to 15 different numbers are included,4 secret bits are found from the confidential information and correspond to 0 to 15 digits and then hidden.The first step is to generate a 256×256 reference matrix.This matrix has two rules.The difference between adjacent pixels in the same row is set to 1;the difference between two adjacent pixels in the same column is set to 4 or 5,and the reference matrix is connected with multiple octagons.The pixel is modified according to the three rules below.

    Rule 1:ifM(pi,pi+1)is a number that is located in an octagon,thenM(qi,qi+1)is one of the digits in this octagon,as shown in Fig.3(a)).

    Rule 2:IfM(pi,pi+1)is an edge digit involved in at least one octagon,thenM(qi,qi+1)is one of the digits in all octagons which are adjacent,as shown in Fig.3(b)).

    Fig.3.Example of octagon:(a)Rule 1 and(b)Rule 2.

    Rule 3:IfM(pi,pi+1)does not belong to any octagon,thenM(qi,qi+1)is one of all digits in a 4×5 sub-block whereM(qi,qi+1)is located in the central of the sub-block.

    Recently,Leeet al.[16]proposed an embedding scheme based on a pencil-shaped pattern for raising the embedding capacity while keeping good visual quality of the stego-image.Based on this magic matrix,each cover pixel pair can carry 4-bit secret data so the embedding capacity is 2 bit per pixel.Therefore,the embedding capacity when compared with previous schemes is the best.However,the pencil-shaped pattern scheme involves more image distortion up to 5 dB compared with the turtle-shaped shell scheme.Therefore,it inspires to propose a high fidelity steganography technique of two bpp embedding capacity.

    3.Proposed Scheme

    The proposed scheme has three procedures:Matrix construction,message embedding,and data extraction.

    First,create a square template of N1×N2 digits,and adopt the template to build a magic matrix size is 256×256.Before considering how to create the magic matrix based square template,we use Fig.4 to illustrate how an entry in the magic matrix can be specified by a pair of numerical coordinates.Similar to the Cartesian coordinate system,theH×Wmagic matrix M is arranged as shown in Fig.4,the individual element or entry is denoted byM(x,y)whereH=maxxandW=maxy,each element or entry is a number ranging from 0 to (HW?1),and each element can be referenced by a coordinate (x,y).For example,M(x,y)=8,ifx=y=0;M(x,y)=0,ifx=4 andy=7,as shown in Fig.4.

    Fig.4.Entry M(x,y)referenced by a coordinate(x,y)in the magic matrix M.

    3.1.Matrix Construction Procedure

    A two-dimensional magic matrix of sizeH×Wis constructed based on a template of sizeN1×N2.For greyscale images,the valuesH=W=256 andN1=N2=4.In the hexadecimal notational system,four bits(a nibble)are represented by a single digit.The template is square and is shown in Fig.5 (a)which containsN1×N2different digits from 0 to (N1×N2?1).The square template is like a signet which is affixed to the two-dimensional matrix in a non-overlapping manner so that the magic matrix can be created as shown in Fig.5(b).

    3.2.Generated by Secure Key

    A signet can be generated by a secure key SK1,so there are 16!≈2.1×1013different templates.Moreover,another secure key SK2is employed to locate a start position of the signet to be attached.Here use SK1and SK2to increase the security on the transmitted images,so that the security aspects will be determined by the random number.As a result,the numbers in the signet will become unpredictable combinations and a relatively safe method can also be achieved.Here we use a 4×4 magic signet as the discussion for all examples.

    Fig.5.Example of (a) 4×4 magic signet and (b) twodimensional matrix.

    First of all,we will elaborate on the part of SK1.We have to build a 256×256 magic before performing the hiding procedure.So a 4×4 signet needs to be built in advance.The role of SK1is a key to generate the numbers from 0 to 15 in this 4×4 magic signet.There is a considerable combination 16!≈2.1×1013.As a result,SK1makes the signet to have better security.The flow chart below will be used to represent the setup process as shown in Fig.6.

    Fig.6.Generated matrix by secure key SK1.

    After using SK1to generate several possibilities in a 4×4 magic square,the next step is to decide how to stack these 4×4 squares;that is,how to fill these squares among the 256×256 carriers of a twodimensional matrix.As described in this stacking method,SK2is adopted to locate a start position of the 4×4 signet and the signet is stacked from the start position to fill the entire 256×256 matrix.The following flowchart will represent the process as shown in Fig.7.

    Finally,in order to enhance security,the third secure key SK3is responsible for the task of disrupting the pixel value of the original image before the original image is hidden.After the original image is disrupted by SK3,the scrambled image was used as a carrier to carry the data.Compared with the case where a message is directly embedded in the original image,if the message is hidden in a randomly generated image,this will make it even more difficult to find the existence of a confidential message.This time you can call it “hidden image”as shown in Fig.8.

    3.3.Embedding Procedure

    Assume a to-be-hidden messageS={sj|j= 1,2,…,HW/2;0≤sj≤15},where everysjis concealed by a pair of pixels.LetIbe a gray-level image of heightHand widthW,respectively.SoI={pi|i=1,1,2,…,HW;0≤pi≤255}.In order to improve the security of the proposed scheme,the pixels of an original image are shuffled using the third secure key SK3by a secure pseudo-random number generator (PRNG) before the embedding process is preceded.Fig.8 shows the flow chart of the embedding procedure.

    Fig.7.Matrix in the size of 256×256 pixels is covered by secure key SK2.

    Fig.8.Embedding procedure flow chart.

    Afterward,the pixel values are put into pairs so each paircan be treated as a coordinate of the twodimensional magic matrix.LetandM(qi,qi+1)be the numbers in the magic matrix M whereand(qi,qi+1)represent the pairs of pixels before/after a 4-bit secret numbersjhas been concealed.For a given to-beembedded secret digitsj,associated with the pixel pairthe stego-pixel pair(qi,qi+1)can be resolved by finding the shortest distance betweenand(qi,qi+1)under the condition thatM(qi,qi+1)equals to the secret datasj.The proposed scheme takesas the center to find the nearest location whereM(qi,qi+1)=sjwithout caring if the entry with the coordinate(qi,qi+1)is located within the square pattern or not.Therefore,this approach can reduce the fidelity loss,increasing the stego-image quality.

    3.4.Data Extraction Procedure

    The authorized receiver with secure keys can extract the concealed message completely sincesj=M(qi,qi+1),which implies that the entry of each secret digit can be obtained from every coordinate(qi,qi+1)forj=1,2,…,HW/2 andi=1,2,…,HW.

    4.Experimental Results

    Four test images were used,namely (a)Barbara,(b)Boat,(c)Lena,and (d)Peppers.All of them are 512×512 pixels gray-scale images,which are shown in Fig.9.The experiment uses the MATLAB random function generator to generate a sequence of bit streams as the secret data.The peak signal-to-noise ratio(PSNR),defined as

    where MSE is the mean square error between the cover image and stego-image,(1)can be used to evaluate the distortion of the stego-image after the secret data have been embedded.MSE is defended as

    wherepi,jandqi,jrepresent the pixel values of the cover imageIand the stego-image SI,respectively.The embedding capacity (EC)is defined as the maximal number of bits that can be embedded for each pixel(bpp).

    If the PSNR value gets larger,then the quality of the image is closer to its original image.In general,a PSNR value greater than 30 dB indicates the closeness of the stego-image and the cover image.Thus,the quality of the stego-image with the PSNR value greater than 30 dB is taken as perceptually acceptable.

    Fig.9.Ten test images with the size of 512×512 pixels and 256 levels(8 bits)per pixel:(a)Barbara,(b)Boat,(c)Lena,(d)Peppers,(e)Airplane,(f)Couple,(g)Elaine,(h)House,(i)Lake,and(j)Tiffany.

    Table 1 shows the comparison of the proposed scheme with the other three related schemes proposed by Changet al.[10],Changet al.[11],and Leeet al.[16],respectively,in terms of the embedding capacity and image quality.From Table 1,the proposed scheme has 2 bpp of embedded capacity which is the same with the Pencil-shape scheme[16]and higher than those of the schemes proposed by Changet al.[10]and Changet al.[11].

    Experimental results show that the proposed scheme,in comparison with Sudoku and Turtle-shaped schemes,outperforms in terms of embedding capacity and security.However,compared with Sudoku and Turtle-shaped schemes,it outperforms in terms of embedding capacity and security,but needs to pay the cost of image distortion.Compared with the pencilshaped pattern embedding scheme[16],the proposed scheme has an equal amount of embedding capacity,but our scheme improves the image visual quality.The average PSNR values reach 44.12 dB higher than that with 42.87 dB of the pencil-shape scheme.Table 1 shows lower PSNR values compared with those of schemes proposed by Changet al.[10]and Changet al.[11].However,when weighing up the relative advantages of embedding capacity and image quality in PSNR values,we are more concerned about whether our method has a higher payload.High embedding capacity indicates the better ability of information embedding and transmission.That means,under the same level of imperceptivity,that a cover image can carry more secret messages at once,which will earn in the data transfer rate,thus further reducing transmission complexity.

    In Table 2,we use test images such as Lena,Baboon,Peppers,Airplane,and Boat to observe the change of image quality under different payloads in the proposed method.This experimental result shows the payloads at each stage are 1×105bits,2×105bits,3×105bits,4×105bits,and 5×105bits,respectively,and the corresponding image quality by PSNR will change with the payload.For example,when the payload is 1×105bits,PSNR of Lena,Baboon,Peppers,Airplane,and Boat reaches 53.9 dB on average.Next,when the payload is 2×105bits,PSNR reaches 50.9 dB on average.Even if the payload is up to 5×105bits,PSNR still preserves in 46.9 dB on average.PSNR of each image is very close at each stage of payload;thus,our proposed method has good stability.

    Table 1:PSNR and embedding capacity(EC)

    Table 2:Proposed method results of PSNR under various payloads

    5.Conclusions

    We propose a scheme exploiting a square template to conceal confidential information.The scheme has high embedded capacity and provides good image quality.Based on the magic square,each cover pixel pair can carry the secret data of 4 bits.Moreover,the image quality can keep in 44.12 dB on average,which can be applied to some applications that require high embedded capacity and stable image quality.The proposed method can bring more benefits for information exchange.In the future,a good design of the magic matrix should be conducted to enhance the performance in terms of image quality and embedding capacity as well.

    精品国产国语对白av| 大陆偷拍与自拍| 18禁观看日本| 亚洲精品在线美女| 一本大道久久a久久精品| 亚洲精品久久午夜乱码| 男女高潮啪啪啪动态图| 免费av中文字幕在线| 国产视频首页在线观看| 亚洲av.av天堂| 精品国产乱码久久久久久小说| 欧美日韩一级在线毛片| 免费播放大片免费观看视频在线观看| 久久久亚洲精品成人影院| 人成视频在线观看免费观看| 人成视频在线观看免费观看| 亚洲激情五月婷婷啪啪| 欧美亚洲 丝袜 人妻 在线| 国产福利在线免费观看视频| 黑丝袜美女国产一区| 国产成人精品在线电影| 黄色配什么色好看| 国产成人精品福利久久| 黄色配什么色好看| 国产成人精品在线电影| 在线天堂最新版资源| 99国产综合亚洲精品| www.av在线官网国产| 国产成人精品在线电影| 成人免费观看视频高清| 国产成人精品在线电影| 国产精品av久久久久免费| 熟女电影av网| 欧美激情高清一区二区三区 | 欧美亚洲日本最大视频资源| 婷婷成人精品国产| 国产精品久久久久久久久免| 国产亚洲一区二区精品| 国产无遮挡羞羞视频在线观看| 999精品在线视频| 中文字幕制服av| 久久精品久久久久久久性| 精品国产超薄肉色丝袜足j| 999精品在线视频| 午夜精品国产一区二区电影| 黄网站色视频无遮挡免费观看| 亚洲精品中文字幕在线视频| 国产欧美日韩一区二区三区在线| 成年av动漫网址| 亚洲国产毛片av蜜桃av| 日韩电影二区| 亚洲视频免费观看视频| 亚洲国产日韩一区二区| 成人亚洲欧美一区二区av| 亚洲欧美精品自产自拍| 男女下面插进去视频免费观看| 午夜日本视频在线| 91国产中文字幕| 男人操女人黄网站| 一区二区av电影网| 看非洲黑人一级黄片| 日韩制服骚丝袜av| 亚洲av.av天堂| 日韩三级伦理在线观看| 免费av中文字幕在线| 男女国产视频网站| 两个人看的免费小视频| 亚洲精品久久午夜乱码| 大片免费播放器 马上看| 亚洲欧美清纯卡通| 在线 av 中文字幕| 超碰成人久久| 在线免费观看不下载黄p国产| 国产成人欧美| 日本91视频免费播放| 少妇被粗大的猛进出69影院| 免费大片黄手机在线观看| 美女脱内裤让男人舔精品视频| 久久免费观看电影| av片东京热男人的天堂| 亚洲国产av影院在线观看| 日韩中字成人| 日本vs欧美在线观看视频| www.精华液| 亚洲色图综合在线观看| 午夜日韩欧美国产| 777久久人妻少妇嫩草av网站| 一边摸一边做爽爽视频免费| 午夜精品国产一区二区电影| 建设人人有责人人尽责人人享有的| 亚洲一区中文字幕在线| 精品少妇久久久久久888优播| 美女xxoo啪啪120秒动态图| 嫩草影院入口| 女性被躁到高潮视频| 一边摸一边做爽爽视频免费| 国产日韩欧美亚洲二区| 久久久a久久爽久久v久久| 成人午夜精彩视频在线观看| 不卡视频在线观看欧美| 人体艺术视频欧美日本| 美女大奶头黄色视频| 一区在线观看完整版| 女人精品久久久久毛片| 激情五月婷婷亚洲| 亚洲,一卡二卡三卡| 国产精品嫩草影院av在线观看| 国产精品久久久久久精品古装| 免费黄频网站在线观看国产| 男女无遮挡免费网站观看| 成年人免费黄色播放视频| 国产男女超爽视频在线观看| 久久精品国产亚洲av高清一级| 午夜日本视频在线| 亚洲av男天堂| 成人影院久久| 9191精品国产免费久久| 9热在线视频观看99| 国产成人欧美| 国产成人精品一,二区| 91精品三级在线观看| 欧美最新免费一区二区三区| 亚洲一区二区三区欧美精品| 欧美日韩一级在线毛片| 啦啦啦在线观看免费高清www| 久久午夜综合久久蜜桃| 欧美日韩国产mv在线观看视频| 水蜜桃什么品种好| 免费黄网站久久成人精品| 男女无遮挡免费网站观看| 亚洲人成网站在线观看播放| www.av在线官网国产| 久久久亚洲精品成人影院| 最新中文字幕久久久久| 一边亲一边摸免费视频| 国产1区2区3区精品| 少妇 在线观看| 久久久久久久大尺度免费视频| 国产一区有黄有色的免费视频| 尾随美女入室| 免费观看在线日韩| av在线观看视频网站免费| 美女国产视频在线观看| 国产高清国产精品国产三级| 一本久久精品| 18禁动态无遮挡网站| 18+在线观看网站| 国产成人精品久久久久久| 免费播放大片免费观看视频在线观看| 亚洲精品国产色婷婷电影| 国产1区2区3区精品| 一边摸一边做爽爽视频免费| 丝袜喷水一区| 亚洲男人天堂网一区| 大话2 男鬼变身卡| 人人妻人人澡人人看| 多毛熟女@视频| 精品少妇内射三级| 亚洲五月色婷婷综合| 天天躁狠狠躁夜夜躁狠狠躁| 亚洲,欧美,日韩| 精品国产露脸久久av麻豆| 麻豆av在线久日| 五月伊人婷婷丁香| 免费久久久久久久精品成人欧美视频| 久久韩国三级中文字幕| 国产精品国产三级国产专区5o| 国产亚洲精品第一综合不卡| 欧美激情 高清一区二区三区| 免费女性裸体啪啪无遮挡网站| 日本av免费视频播放| www.精华液| 亚洲欧美清纯卡通| 晚上一个人看的免费电影| 久热这里只有精品99| 免费高清在线观看日韩| 久久99精品国语久久久| 国产精品人妻久久久影院| 亚洲精品久久午夜乱码| 亚洲国产精品成人久久小说| 熟妇人妻不卡中文字幕| 熟女av电影| 老鸭窝网址在线观看| 成人国产av品久久久| 久热久热在线精品观看| 国产精品麻豆人妻色哟哟久久| 亚洲精品美女久久久久99蜜臀 | 最近的中文字幕免费完整| 亚洲国产成人一精品久久久| 国产一区有黄有色的免费视频| 久久久欧美国产精品| 日本-黄色视频高清免费观看| 国产精品偷伦视频观看了| 国产一区亚洲一区在线观看| 国产免费视频播放在线视频| 最近的中文字幕免费完整| 丝袜喷水一区| 国产在线免费精品| 永久免费av网站大全| 国产麻豆69| 国产综合精华液| 水蜜桃什么品种好| 久久精品国产亚洲av天美| 热99久久久久精品小说推荐| 欧美日韩综合久久久久久| 欧美日韩视频精品一区| 欧美中文综合在线视频| 国产不卡av网站在线观看| 成人亚洲精品一区在线观看| 国产精品一国产av| av一本久久久久| 人妻少妇偷人精品九色| 亚洲国产毛片av蜜桃av| 欧美最新免费一区二区三区| 国产精品无大码| 男女高潮啪啪啪动态图| 亚洲国产色片| tube8黄色片| 熟女电影av网| 国产国语露脸激情在线看| 激情五月婷婷亚洲| 我要看黄色一级片免费的| 中文字幕制服av| 人妻一区二区av| 亚洲精品日韩在线中文字幕| av片东京热男人的天堂| 嫩草影院入口| 免费看av在线观看网站| 国产成人午夜福利电影在线观看| 久久99一区二区三区| 26uuu在线亚洲综合色| 啦啦啦中文免费视频观看日本| 丰满饥渴人妻一区二区三| 日韩电影二区| 大话2 男鬼变身卡| 中国三级夫妇交换| 久久精品国产综合久久久| 少妇 在线观看| 精品人妻在线不人妻| 国产av码专区亚洲av| 国产精品秋霞免费鲁丝片| 亚洲精品av麻豆狂野| 黄色 视频免费看| 亚洲精品美女久久久久99蜜臀 | av女优亚洲男人天堂| 少妇精品久久久久久久| 色网站视频免费| 日本av免费视频播放| 9色porny在线观看| 人妻系列 视频| 国产又色又爽无遮挡免| 在线看a的网站| av又黄又爽大尺度在线免费看| 精品久久久精品久久久| 伊人久久大香线蕉亚洲五| 国产成人一区二区在线| 在线观看免费日韩欧美大片| 欧美精品av麻豆av| 最近2019中文字幕mv第一页| 美女中出高潮动态图| 美女大奶头黄色视频| 最近最新中文字幕免费大全7| 啦啦啦中文免费视频观看日本| 啦啦啦啦在线视频资源| 欧美老熟妇乱子伦牲交| 亚洲精品自拍成人| 欧美日韩亚洲国产一区二区在线观看 | www日本在线高清视频| 日韩中文字幕欧美一区二区 | 亚洲,一卡二卡三卡| 久久久久久免费高清国产稀缺| 在线精品无人区一区二区三| 国产 一区精品| 久久精品久久精品一区二区三区| 香蕉精品网在线| 亚洲久久久国产精品| 成人手机av| 黑人猛操日本美女一级片| 狂野欧美激情性bbbbbb| 日韩一区二区视频免费看| 欧美精品一区二区大全| 欧美日韩亚洲国产一区二区在线观看 | 亚洲一区二区三区欧美精品| 午夜激情久久久久久久| 老司机影院成人| 欧美在线黄色| 欧美xxⅹ黑人| 男女高潮啪啪啪动态图| 青春草国产在线视频| 不卡视频在线观看欧美| 国产极品粉嫩免费观看在线| 天堂8中文在线网| 三上悠亚av全集在线观看| 亚洲经典国产精华液单| 日本色播在线视频| 丝袜美足系列| 在线观看人妻少妇| 男女免费视频国产| 免费久久久久久久精品成人欧美视频| 不卡av一区二区三区| 在线观看一区二区三区激情| 寂寞人妻少妇视频99o| 搡老乐熟女国产| 韩国精品一区二区三区| 免费观看av网站的网址| 女人精品久久久久毛片| av国产精品久久久久影院| 少妇人妻久久综合中文| 午夜福利一区二区在线看| 激情五月婷婷亚洲| 亚洲欧美精品自产自拍| 9热在线视频观看99| 国产精品亚洲av一区麻豆 | 久久午夜综合久久蜜桃| 国产精品久久久久久精品古装| 国产一区二区三区综合在线观看| 一区二区av电影网| 欧美人与性动交α欧美软件| 日韩欧美一区视频在线观看| 久久久久久久久免费视频了| 美女视频免费永久观看网站| 黄色一级大片看看| 视频区图区小说| 我要看黄色一级片免费的| 亚洲第一av免费看| 男女下面插进去视频免费观看| 亚洲欧洲精品一区二区精品久久久 | 免费高清在线观看视频在线观看| 黄色毛片三级朝国网站| 亚洲少妇的诱惑av| 久久精品亚洲av国产电影网| 亚洲精品av麻豆狂野| 伊人久久国产一区二区| 亚洲一码二码三码区别大吗| 成人漫画全彩无遮挡| 亚洲国产欧美日韩在线播放| 久久精品国产亚洲av涩爱| 久久久久精品久久久久真实原创| 一区二区三区乱码不卡18| 久久婷婷青草| 日本色播在线视频| 午夜91福利影院| 美女中出高潮动态图| 国产精品国产三级专区第一集| 日日摸夜夜添夜夜爱| 国产在线一区二区三区精| 色网站视频免费| 欧美中文综合在线视频| 一区二区三区激情视频| 国产一区二区激情短视频 | 国产一区亚洲一区在线观看| 最近的中文字幕免费完整| 高清视频免费观看一区二区| 精品久久久久久电影网| videossex国产| 成年动漫av网址| 久久精品亚洲av国产电影网| 嫩草影院入口| 亚洲国产看品久久| 91aial.com中文字幕在线观看| 久久韩国三级中文字幕| 在线观看一区二区三区激情| 久久99蜜桃精品久久| 日日爽夜夜爽网站| 丝袜喷水一区| 日产精品乱码卡一卡2卡三| 国产日韩一区二区三区精品不卡| 亚洲图色成人| 亚洲欧美精品自产自拍| 人人澡人人妻人| 在线亚洲精品国产二区图片欧美| 午夜福利乱码中文字幕| 亚洲精品视频女| 午夜久久久在线观看| 免费在线观看视频国产中文字幕亚洲 | 一区二区三区激情视频| 欧美最新免费一区二区三区| 亚洲内射少妇av| 亚洲成人一二三区av| 香蕉丝袜av| 夫妻午夜视频| 中文字幕亚洲精品专区| 国产成人精品久久久久久| 激情五月婷婷亚洲| 久久精品国产a三级三级三级| 久久人妻熟女aⅴ| 综合色丁香网| 高清在线视频一区二区三区| 一级,二级,三级黄色视频| 亚洲精品av麻豆狂野| 免费黄频网站在线观看国产| 一级片免费观看大全| 2018国产大陆天天弄谢| 国产亚洲一区二区精品| 欧美日韩一区二区视频在线观看视频在线| 国产激情久久老熟女| 晚上一个人看的免费电影| 午夜福利在线免费观看网站| 国产亚洲午夜精品一区二区久久| 成人二区视频| 你懂的网址亚洲精品在线观看| 97在线视频观看| 婷婷色av中文字幕| 精品国产露脸久久av麻豆| 两个人看的免费小视频| 自线自在国产av| 欧美日韩一区二区视频在线观看视频在线| 欧美精品av麻豆av| 亚洲图色成人| 精品人妻偷拍中文字幕| 在线观看美女被高潮喷水网站| 亚洲国产精品国产精品| 亚洲精品视频女| 久久韩国三级中文字幕| 热99久久久久精品小说推荐| 日韩中字成人| 五月天丁香电影| 99re6热这里在线精品视频| 在线观看三级黄色| 国产乱来视频区| 欧美xxⅹ黑人| 人人妻人人添人人爽欧美一区卜| 国产免费又黄又爽又色| 欧美人与性动交α欧美精品济南到 | 丰满迷人的少妇在线观看| 亚洲美女搞黄在线观看| 久久免费观看电影| 在线观看免费高清a一片| 精品国产一区二区三区四区第35| 五月伊人婷婷丁香| 成年人午夜在线观看视频| www.av在线官网国产| 国产高清国产精品国产三级| 在线观看一区二区三区激情| 精品人妻偷拍中文字幕| 午夜91福利影院| 成年女人在线观看亚洲视频| 最黄视频免费看| a 毛片基地| 国产一区二区三区综合在线观看| 国产男女内射视频| 久久精品国产a三级三级三级| 精品福利永久在线观看| 久久 成人 亚洲| h视频一区二区三区| 精品一区二区三区四区五区乱码 | av在线老鸭窝| 2022亚洲国产成人精品| 亚洲成人手机| 国产又色又爽无遮挡免| 亚洲成国产人片在线观看| 精品久久久精品久久久| 伦精品一区二区三区| 国产亚洲欧美精品永久| 亚洲美女搞黄在线观看| 视频在线观看一区二区三区| 麻豆乱淫一区二区| 久久精品aⅴ一区二区三区四区 | 亚洲国产日韩一区二区| 欧美黄色片欧美黄色片| 免费久久久久久久精品成人欧美视频| 极品少妇高潮喷水抽搐| 国产熟女午夜一区二区三区| 免费黄色在线免费观看| 国产成人精品久久二区二区91 | 啦啦啦在线观看免费高清www| 韩国精品一区二区三区| 波多野结衣一区麻豆| 一边摸一边做爽爽视频免费| 男女下面插进去视频免费观看| av电影中文网址| 欧美最新免费一区二区三区| 91在线精品国自产拍蜜月| 欧美老熟妇乱子伦牲交| 日本猛色少妇xxxxx猛交久久| 国产亚洲精品第一综合不卡| 最黄视频免费看| 蜜桃国产av成人99| 国产黄色免费在线视频| 婷婷色综合www| 国产在线免费精品| 亚洲欧洲精品一区二区精品久久久 | 日本av免费视频播放| 99热全是精品| 老鸭窝网址在线观看| 老司机影院成人| 丝袜美腿诱惑在线| 亚洲色图综合在线观看| 久久av网站| 久久午夜综合久久蜜桃| 午夜福利乱码中文字幕| xxx大片免费视频| 国产野战对白在线观看| 亚洲国产av新网站| 欧美成人精品欧美一级黄| 大香蕉久久成人网| 国产成人aa在线观看| 国产成人精品久久二区二区91 | 亚洲国产欧美在线一区| 久久精品国产a三级三级三级| 少妇被粗大猛烈的视频| 丝袜在线中文字幕| 欧美精品一区二区免费开放| 青春草国产在线视频| 丝袜美腿诱惑在线| 一级毛片我不卡| 亚洲中文av在线| 一区二区三区四区激情视频| 人人妻人人爽人人添夜夜欢视频| 搡老乐熟女国产| 国产不卡av网站在线观看| 又粗又硬又长又爽又黄的视频| tube8黄色片| 色吧在线观看| 新久久久久国产一级毛片| 亚洲色图 男人天堂 中文字幕| 丰满饥渴人妻一区二区三| 2022亚洲国产成人精品| 97精品久久久久久久久久精品| 日韩人妻精品一区2区三区| 丝袜脚勾引网站| 肉色欧美久久久久久久蜜桃| 大片免费播放器 马上看| 成人免费观看视频高清| 日本爱情动作片www.在线观看| 91精品三级在线观看| 国产一区二区 视频在线| 日韩在线高清观看一区二区三区| 精品一区在线观看国产| 蜜桃在线观看..| 搡老乐熟女国产| 久久av网站| 久久人人爽av亚洲精品天堂| 国产伦理片在线播放av一区| 中国国产av一级| 99re6热这里在线精品视频| 观看美女的网站| 日韩,欧美,国产一区二区三区| xxxhd国产人妻xxx| 国产在线视频一区二区| 黄色怎么调成土黄色| 免费大片黄手机在线观看| 91精品国产国语对白视频| 国产免费现黄频在线看| 久久精品国产综合久久久| 国产有黄有色有爽视频| 国产精品久久久久成人av| 丝袜美腿诱惑在线| 亚洲av免费高清在线观看| 国产成人精品久久二区二区91 | 国产精品 欧美亚洲| av视频免费观看在线观看| 伦理电影免费视频| 国产精品不卡视频一区二区| 黄片播放在线免费| 欧美+日韩+精品| 国精品久久久久久国模美| 色94色欧美一区二区| 国语对白做爰xxxⅹ性视频网站| 精品国产露脸久久av麻豆| av不卡在线播放| 亚洲欧美精品自产自拍| 99久国产av精品国产电影| 成人毛片a级毛片在线播放| 亚洲四区av| 一级片免费观看大全| 麻豆乱淫一区二区| 如日韩欧美国产精品一区二区三区| 成人二区视频| 五月伊人婷婷丁香| 欧美成人午夜免费资源| 国产成人91sexporn| 亚洲欧美色中文字幕在线| 高清av免费在线| 国产精品国产av在线观看| 青青草视频在线视频观看| 久久久久国产网址| 在线观看免费高清a一片| 国产熟女欧美一区二区| 日本欧美国产在线视频| 亚洲av欧美aⅴ国产| 亚洲三区欧美一区| 国产熟女午夜一区二区三区| 三上悠亚av全集在线观看| 波多野结衣一区麻豆| 99久久人妻综合| 大码成人一级视频| 欧美在线黄色| www.熟女人妻精品国产| 深夜精品福利| 毛片一级片免费看久久久久| 熟女电影av网| 老司机影院成人| 汤姆久久久久久久影院中文字幕| 亚洲精品中文字幕在线视频| 欧美精品一区二区免费开放| 久久久久久人人人人人| 少妇人妻久久综合中文| 国产xxxxx性猛交| 高清av免费在线| kizo精华| av在线播放精品| 大陆偷拍与自拍| 婷婷色综合www| 午夜福利网站1000一区二区三区| 欧美成人午夜精品| 久久99蜜桃精品久久| 久热久热在线精品观看| 亚洲伊人久久精品综合| 日韩电影二区| 我的亚洲天堂| 色网站视频免费| 国产精品99久久99久久久不卡 | 免费人妻精品一区二区三区视频| 欧美成人精品欧美一级黄|