• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Encryption and Decryption of Color Images through Random Disruption of Rows and Columns

    2020-09-23 02:39:28ZENGJianhua曾建華ZHANYanlin占炎林YANGJianrong楊建榮
    關(guān)鍵詞:建華

    ZENG Jianhua(曾建華),ZHAN Yanlin(占炎林),YANG Jianrong(楊建榮)

    School of Physics and Electronic Information,Shangrao Normal University,Shangrao 334001,China

    Abstract: In modern society,information is becoming increasingly interconnected through networks,and the rapid development of information technology has caused people to pay more attention to the encryption and the protection of information. Image encryption technology is a key technology for ensuring the security performance of images. We extracted single channel RGB component images from a color image using MATLAB programs,encrypted and decrypted the color images by randomly disrupting rows,columns and regions of the image. Combined with histograms and the visual judgments of encryption images,it is shown that the information of the original image cannot be obtained from the encryption image easily. The results show that the color-image encryptions with the algorithm we used have good effect and fast operation speed. Thus this algorithm has certain practical value.

    Key words: color image; encryption; decryption; single channel RGB component image; disrupting

    Introduction

    With the rapid innovation of science and technology in 21stcentury,such as cloud technology,big data and the internet of things,information security is facing an arduous challenge. Effectively protecting images and texts which are transmitted on the internet has become an issue that cannot be ignored. Image encryption technology is a key technology for ensuring image security performance. Digital image encryption originates from the early classical encryption theory,in which the objective is to transform an image into a chaotic image in the spatial and frequency domains according to specified transformation rules,thereby hiding the true information of the image to protect the original.

    People have a strong interest in optical image encryption technology,and researchers have proposed many encryption methods. In 1995,the method of image encryption,which used double-random phase coding in the 4-f system,was first proposed by Refregier and Javidi[1]; since then,the research group has proposed various improved optical image encryption methods[2-11]. Researchers[12-17]proposed the concept of a virtual optical encryption system and a variety of new and improved optical encryption systems. In 2003,Suzukietal.[18]proposed a scheme for fingerprint authentication that is based on the optical image encryption system. In 2004,Hennelly and Sheridan[19]proposed an encryption scheme that used a random phase and jigsaw manipulation in the Fresnel domain. In 2006,Fredy Barreraetal.[20]proposed a scheme for multiple repeated encryption and decryption operations via the phase shift of a random phase plate. In 2008,Zhu and Zhang[21]proposed a mixed-image-element encryption algorithm based on an elliptic curve cryptosystem. In 2009,Singh and Sinha[22]proposed an optical encryption method based on the gyrator transform,and Alfalou and Mansour[23]developed the multireuse and multi-image encryption using the double-random encryption method. In 2010,Clementeetal.[24]demonstrated a ghost imaging encryption process. In 2012,Wang and Zhao[25]proposed a photoelectric image encryption and decryption technology based on the coherent superposition principle and digital holography. Keshari and Modani[26]proposed an image encryption technique for color images which used the conventional logarithm operator,a chaotic map and the four-weighted fractional Fourier transform. In 2013,Liuetal.[27]proposed an optical encryption technique based on chaos and computational holography. Lietal.[28]proposed an image encryption/decryption algorithm based on a chaotic control parameter and a hyperchaotic system with a composite permutation-diffusion structure. In 2014,based on compression perception and dual-random phase encryption technology,Deepanetal.[29]proposed a scheme for multiple image encryption that used space multiple reuse,and Wangetal.[30]proposed a dual-color image encryption method for realizing the single-channel dual-color image encryption on the basis of the fractional Fourier transform. In 2015,Maluendaetal.[31]proposed an optical image encryption method based on photon counting polarization imaging,and Rawatetal.[32]proposed a multispectral double image encryption scheme based on the compression perception algorithm. In 2016,Wangetal.[33]proposed an asymmetric encryption scheme based on an improved amplitude phase recovery algorithm. In 2017,Xietal.[34]proposed an image encryption method using diffraction imaging technology. In 2018,Chenetal.[35]proposed a compressive sensing and encryption algorithm for image encryption and compression based on a sequence,Liuetal.[36]designed and implemented color image encryption based on qubit rotation about the axis,Zhangetal.[37]actualized multiple image encryption based on double-random phase encoding and compressive sensing by using a measurement array preprocessed with orthogonal-basis matrices,and Annabyetal.[38]accomplished color-image encryption using random transforms,phase retrieval,chaotic maps and diffusion. In 2019,Kumar and Quan[39]used the spiral phase transformation and chaotic pixel technology to encrypt optical color images,Lietal.[40]proposed a color image encryption scheme through combining the DNA sequence operation based on the chaotic system,and Firdousetal.[41]presented an innovative and highly efficient color image encryption technique based on the concept of linear transformation.

    At present,some encryption algorithms are complicated. There are certain requirements for the image format,and the encryption effect of some algorithms for the stripe color image is poor. Therefore,it is necessary to explore encryption and decryption algorithms of the color image which are simple and can be widely used. There are many kinds of algorithms for color image encryption,among which the optical system of multi-channel color image encryption algorithm needs many sets of optical elements,the experiment is difficult,the cost is high,and the practicability is not strong. The operation speed of the random pixel-disrupting algorithm is slow because of the large number of elements in a true color image matrix. In order to explore a better color image encryption algorithm,we extracted a single channel RGB component of a color image using MATLAB programs and realized encryption and decryption of the color image by randomly disrupting rows,columns and regions of the image,and achieved an ideal encryption effect.

    1 Methods

    A color image is a three-dimensional matrix that is formed by the superposition of three two-dimensional matrices. The first layer of the three-dimensional matrix is a red two-dimensional data matrix,the second layer is a green two-dimensional data matrix,and the third layer is a blue two-dimensional data matrix. The data of RGB component colors in the same position are superimposed to form colors and the whole color image can be formed via the superposition of the data in all positions.

    1.1 Encryption of images in cryptography

    Cryptography is a technical science in which compilation and deciphering of passwords are studied. A law of public-secret transformation in cryptography is termed as a password system and the parameters that specify this transformation are termed as keys. The objective of encryption is to ensure that the secrecy of the information is maintained during transmission. Currently,information is transmitted fast and maintaining information security poses a substantial problem. Therefore,it is important to encrypt information. Figure 1 shows a flow diagram of encryption and decryption.

    Fig. 1 Flow diagram of encryption and decryption

    1.2 Encryption via random disruption of rows or columns of each layer

    In our study,we performed image encryption and decryption through five MATLAB programs which were displayed in Appendix. Decryption is the inverse transformation process of encryption,and each program contains both encryption and decryption codes. After the program is run,encryption and decryption results can be obtained at the same time.

    Encryption via disrupting matrix rows or columns involves few steps. It is fast,and can be applied to larger image files. Its main disadvantage is that it cannot encrypt a horizontally or vertically striped image. Taking the random disruption of rows as an example,we introduce encryption and decryption methods. The image is read into a RGB matrix using the imread function,which we assume is anm-row,n-column and three-layer matrixA(:,:,1),A(:,:,2) andA(:,:,3),the matrixFof each layer is

    Each pixel in a digital image is the corresponding element in the matrix. Random vectors can be produced by the randsample function. We can use the randsample function to generate a random sequence of integers:

    {8,5,1,12,6,3,2,… ,m}.

    (2)

    The random sequence of integers corresponds to themth row of the image RGB matrix and returns the vectorr. Via this approach,the rows of the original image matrix can be randomly disrupted. For example,the 8th row of the original image matrix can be changed to the 1st row,and the 5th row of the original image matrix can be changed to the 2nd row. The disturbed matrix is returned to RGBs,and the locations of elements 1 tomin vectorrare obtained using the find function; the locations are returned to the vectorfso that the disturbed image can be restored. The encryption and decryption process via the random disruption of rows is shown in Fig. 2.

    Fig. 2 Flow diagram of encryption and decryption by the random disruption of rows

    According to the image encryption and decryption flow,we applied the MATLAB programs for randomly disrupting rows and columns of RGB component images and realized encryption and decryption of the color image. Because the disruptions are random,a different encrypted image will be obtained each time when the program is executed.

    2 Results and Discussion

    We realized encryption and decryption of color images by randomly disrupting rows and columns in RGB component images.

    2.1 Color image by deleting red,green or blue component

    By running the MATLAB program (1) in Appendix,we studied the change in the color image after one color component was deleted,as shown in Fig. 3. The results demonstrate a color difference between the obtained image and the original image after one color component was deleted. The complementary color of images with deleted components is shown in Figs. 3(b)-(d). However,the morphology and the information in the original image can still be distinguished from those of the images after color component deletion.

    Fig. 3 Images by deleting different color components: (a) original image; (b) image after deletion of red component; (c) image after deletion of green component; (d) image after deletion of blue component

    2.2 Encryption and decryption via random disruption of rows at each layer of a color image

    By running the MATLAB program (2) in Appendix,we extracted single channel RGB component images of the color image and disrupted the rows of the color component images to realize encryption and decryption. In Fig. 4(a),both green and blue components are hidden. The encryption of the image is completed and it is not possible to see the information of the original image. Then,by inverting the encrypted image,decryption can be realized. In Fig. 4(b),both red and blue components are hidden. In Fig. 4(c),both red and green components are hidden. The encrypted images of the three color components exhibit positive characteristics. The rows of three color component images are completely disrupted and synthesized on an image to implement the encryption. Then,the decrypted image can be obtained via inverse transformation. The results are shown in Figs. 4(d) and (h),which demonstrate that this method has satisfied encryption performance and the original colors of three color components are exhibited in the encrypted image. In a word,any information of the original image can not be seen from the image disrupted by this algorithm in Fig. 4,and the encryption effect is very good. The information of the original image can be decrypted successfully through inverse transformation and restoration,as shown in Figs. 4(e) - (h).

    Fig. 4 Encryption and decryption results after randomly disrupting rows in each layer of a color image: (a) encrypted image and (e) decrypted image for encryption of red component image; (b) encrypted image and (f) decrypted image for encryption of green component image; (c) encrypted image and (g) decrypted image for encryption of blue component image; (d) encrypted image and (h) decrypted image for the encryption via simultaneously disrupting rows of red,green and blue components

    2.3 Encryption and decryption via random disruption of columns at each layer of a color image

    By running the MATLAB program (3) in Appendix,after extracting single channel RGB component images of the color image,we also disrupted columns of the color component image to achieve encryption and decryption. In Fig. 5(a),green and blue components are hidden. Then,by inverting the encrypted image,decryption can be realized. In Fig. 5(b),red and blue components are hidden. In Fig. 5(c),red and green components are hidden. The columns of three color component images are completely disrupted and synthesized on an image to implement the encryption. Then,the decrypted image can be obtained via inverse transformation,and the results are shown in Figs. 5(d) and (h),which demonstrate that this method also obtains satisfied encryption performance by disrupting columns of three color component images. It can be seen from Fig. 5 that the encryption image can not show any information of the original image,which shows a good encryption effect. The information of the original image can be decrypted and obtained successfully by inverse transformation.

    Fig. 5 Encryption and decryption results after randomly disrupting columns at each layer of a color image: (a) encrypted image and (e) decrypted image for encryption of red component image; (b) encrypted image and (f) decrypted image for encryption of green component image; (c) encrypted image and (g) decrypted image for encryption of blue component image; (d) encrypted image and (h) decrypted image for encryption via the simultaneous disruption of columns of red,green and blue components

    2.4 Encryption and decryption by randomly and simultaneously disrupting rows and columns at each layer of a color image

    We randomly disrupted rows and columns of color component images by running MATLAB program (4) in Appendix and performed image encryption and decryption. In Fig. 6(a),green and blue components are hidden. Then,by inverting the encrypted image,decryption can be realized. In Fig. 6(b),red and blue components are hidden. In Fig. 6(c),red and green components are hidden. Encryption of images with three color components yields satisfied results. The rows and columns of images with three color components are completely disrupted and synthesized on an image to implement the encryption. Then,the decrypted image can also be obtained via inverse transformation. The results are shown in Figs. 6(d) and (h); the color visual effect of the encrypted image is enhanced in Fig. 6(d). In summary,this method has satisfied encryption performance. The information of the original image can be decrypted and obtained successfully by inverse transformation.

    Fig. 6 Encryption and decryption results after randomly disrupting rows and columns at each layer of a color image: (a) encrypted image and (e) decrypted image for encryption of red component image; (b) encrypted image and (f) decrypted image for encryption of green component image; (c) encrypted image and (g) decrypted image for encryption of blue component image; (d) encrypted image and (h) decrypted image for the encryption that is obtained by simultaneously disrupting rows and columns of red,green,and blue components

    2.5 Encryption and decryption by randomly disrupting different regions of a color image

    A new image will be formed by randomly disrupting regions of the image with three color components. After randomly disrupting regions of the component images by running the MATLAB program (5) in Appendix,the color image becomes ambiguous,as shown in Fig. 7(a). This is because when three color component images are extracted,the corresponding images can be obtained. However,after reassembly,images at the three points of the component images are spliced together and the image will become blurred after the superposition,which has an encryption effect. Decryption can be realized by retrieving the original image,and the information of the original image can be obtained,as shown in Fig. 7(b).

    Fig. 7 Encryption and decryption results after randomly disrupting regions of a color image: (a) encrypted image; (b) and decrypted image

    2.6 Analysis of image encryption effect by histograms

    The histogram of the image reflects the distribution of the image’s gray values,and we captures the histograms of various images by running MATLAB program (6) in Appendix,as shown in Fig. 8. For the red component image,histograms of three encrypted images and itself are identical,as shown in Fig. 8(b). For green and blue component images,the same results are exhibited,as shown in Figs. 8(c) and (d). This is because after disrupting rows and columns of component images randomly,the distribution of the image’s gray values has not changed. On account of weaker equilibrium of the histograms in Figs. 8(b) - (f),it is not enough to resist statistical attack,but these histograms show different distributions of gray values compared with the histogram of the original image in Fig. 8(a). It indicates that it is not easy to get the information of the original image from these encrypted images. In a word,by analyzing histograms and observing encryption images intuitively,it can be determined that the image encryption effect of the algorithm we used is good. In addition,the running speed is also relatively fast.

    Fig. 8 Histograms of color images: (a) original image; (b) red component image and its encryption images; (c) green component image and its encryption image; (d) blue component image and its encryption image; (e) encrypted image after simultaneously disrupting rows and columns of the color image; (f) encrypted image after randomly disrupting regions of the color image (the inset shows the image corresponding to the histogram)

    3 Conclusions

    To protect the security of image information effectively,we explore encryption and decryption of color images by running MATLAB programs. First,we extracted single channel RGB component images of color images. Then,we encrypted and decrypted the color images by randomly or simultaneously disrupting rows or columns of each image,which yielded a satisfied encryption performance. Finally,the images were blurred by randomly disrupting different regions and the encryption was realized. The algorithm has a good encryption effect and practical value,which helps to enrich the methods of image encryption.

    猜你喜歡
    建華
    倒立奇奇
    故事作文·低年級(2018年11期)2018-11-19 17:25:58
    托尼逃跑
    米沙在書里
    可怕的事
    哈比的愿望
    100歲的貝其
    變變變
    阿嗚想做貓
    快樂的秘密
    最近最新免费中文字幕在线| 伦理电影免费视频| 又黄又爽又免费观看的视频| 97人妻精品一区二区三区麻豆 | 国产亚洲精品久久久久5区| 亚洲人成电影免费在线| 窝窝影院91人妻| 美女国产高潮福利片在线看| 精品国产一区二区三区四区第35| 黑丝袜美女国产一区| 欧美成狂野欧美在线观看| 熟女少妇亚洲综合色aaa.| 精品国产国语对白av| 欧美一区二区精品小视频在线| 黄片小视频在线播放| 久久亚洲真实| 黄色丝袜av网址大全| 成人国产综合亚洲| 中文字幕人成人乱码亚洲影| 91av网站免费观看| 亚洲精品国产一区二区精华液| 午夜福利影视在线免费观看| 国产精品久久久av美女十八| 欧美日韩乱码在线| 精品日产1卡2卡| 美国免费a级毛片| 97碰自拍视频| 久久中文字幕一级| 国产麻豆69| 级片在线观看| 日日干狠狠操夜夜爽| 亚洲精品美女久久av网站| 欧美黄色片欧美黄色片| 长腿黑丝高跟| 久久精品人人爽人人爽视色| 久久久水蜜桃国产精品网| 一级a爱片免费观看的视频| 国产91精品成人一区二区三区| 精品国产乱码久久久久久男人| 99精品久久久久人妻精品| 国产区一区二久久| 免费久久久久久久精品成人欧美视频| 99精品在免费线老司机午夜| 国产免费男女视频| 亚洲国产精品合色在线| 精品电影一区二区在线| 午夜福利欧美成人| 19禁男女啪啪无遮挡网站| 俄罗斯特黄特色一大片| 国产成人精品久久二区二区91| 色精品久久人妻99蜜桃| 精品无人区乱码1区二区| 久久久精品国产亚洲av高清涩受| 国产国语露脸激情在线看| 欧美一级毛片孕妇| 亚洲 欧美一区二区三区| 曰老女人黄片| 好男人电影高清在线观看| 日韩欧美一区二区三区在线观看| av有码第一页| 色精品久久人妻99蜜桃| 女人精品久久久久毛片| 欧美久久黑人一区二区| 亚洲va日本ⅴa欧美va伊人久久| 亚洲中文字幕一区二区三区有码在线看 | 亚洲午夜理论影院| 成人特级黄色片久久久久久久| av在线播放免费不卡| 国产黄a三级三级三级人| av视频在线观看入口| 久久人妻福利社区极品人妻图片| 最近最新中文字幕大全免费视频| av网站免费在线观看视频| 1024视频免费在线观看| 欧美人与性动交α欧美精品济南到| 精品无人区乱码1区二区| 天堂影院成人在线观看| 国产亚洲精品综合一区在线观看 | 99精品久久久久人妻精品| 免费久久久久久久精品成人欧美视频| 91精品国产国语对白视频| 免费无遮挡裸体视频| 久久久久久人人人人人| 免费少妇av软件| 久久久久久大精品| 美女 人体艺术 gogo| 中文字幕高清在线视频| 成人三级黄色视频| 亚洲一码二码三码区别大吗| 色综合欧美亚洲国产小说| 日韩精品中文字幕看吧| 国产精品久久久久久精品电影 | 久久影院123| 亚洲电影在线观看av| 99精品欧美一区二区三区四区| 欧美乱妇无乱码| 黄色a级毛片大全视频| 欧美日韩黄片免| 长腿黑丝高跟| 性欧美人与动物交配| 欧美日韩瑟瑟在线播放| 免费在线观看完整版高清| 欧美成狂野欧美在线观看| 国产精品电影一区二区三区| 亚洲精品一区av在线观看| 91av网站免费观看| 高清在线国产一区| 成人国产一区最新在线观看| 19禁男女啪啪无遮挡网站| 给我免费播放毛片高清在线观看| 好男人在线观看高清免费视频 | 欧美乱妇无乱码| 国产成人一区二区三区免费视频网站| 亚洲成a人片在线一区二区| 女人精品久久久久毛片| 午夜久久久在线观看| 精品久久久久久久人妻蜜臀av | 国产免费av片在线观看野外av| 免费少妇av软件| АⅤ资源中文在线天堂| 免费搜索国产男女视频| av片东京热男人的天堂| 国产精品电影一区二区三区| 黑人巨大精品欧美一区二区mp4| 波多野结衣av一区二区av| 91精品三级在线观看| 亚洲国产精品成人综合色| 美女 人体艺术 gogo| 91老司机精品| 不卡av一区二区三区| 亚洲精品中文字幕一二三四区| 免费不卡黄色视频| 侵犯人妻中文字幕一二三四区| 日韩欧美三级三区| 黄色片一级片一级黄色片| 美国免费a级毛片| 亚洲精品久久成人aⅴ小说| 久久久久国内视频| 好看av亚洲va欧美ⅴa在| 啦啦啦免费观看视频1| 亚洲五月天丁香| av天堂久久9| 老司机靠b影院| 91成年电影在线观看| 婷婷丁香在线五月| 999久久久精品免费观看国产| 久久精品影院6| 夜夜夜夜夜久久久久| 国产精品一区二区精品视频观看| 国产一区二区激情短视频| 十分钟在线观看高清视频www| 亚洲国产精品合色在线| 欧美激情极品国产一区二区三区| 日韩欧美在线二视频| 999精品在线视频| 色综合站精品国产| 日韩欧美在线二视频| 欧美亚洲日本最大视频资源| 亚洲七黄色美女视频| 伦理电影免费视频| 日韩成人在线观看一区二区三区| 一本久久中文字幕| 国产伦一二天堂av在线观看| 深夜精品福利| 可以免费在线观看a视频的电影网站| 侵犯人妻中文字幕一二三四区| 在线天堂中文资源库| 欧美中文日本在线观看视频| 亚洲av片天天在线观看| 国产精品综合久久久久久久免费 | 午夜a级毛片| 91成年电影在线观看| 日韩av在线大香蕉| 成人手机av| 无人区码免费观看不卡| 极品人妻少妇av视频| 免费在线观看亚洲国产| 成人18禁在线播放| 成人国产综合亚洲| 国产成人系列免费观看| 叶爱在线成人免费视频播放| 热99re8久久精品国产| 黑人欧美特级aaaaaa片| 一级a爱视频在线免费观看| 国产一区在线观看成人免费| 51午夜福利影视在线观看| 老司机午夜十八禁免费视频| 国产1区2区3区精品| 亚洲一区二区三区色噜噜| 日韩精品免费视频一区二区三区| 免费高清在线观看日韩| 日本一区二区免费在线视频| 免费观看精品视频网站| 欧美成人午夜精品| 一a级毛片在线观看| 久久精品人人爽人人爽视色| 一进一出抽搐动态| 99国产精品99久久久久| 久久久久久人人人人人| 女生性感内裤真人,穿戴方法视频| 后天国语完整版免费观看| 国产精品 欧美亚洲| 亚洲国产精品合色在线| 久久国产精品男人的天堂亚洲| 极品教师在线免费播放| 非洲黑人性xxxx精品又粗又长| 日日摸夜夜添夜夜添小说| 一区二区三区高清视频在线| 美女高潮到喷水免费观看| 久久人妻熟女aⅴ| 日韩欧美国产一区二区入口| 午夜视频精品福利| 99热只有精品国产| 麻豆av在线久日| www.精华液| 91老司机精品| 一边摸一边做爽爽视频免费| 天堂√8在线中文| 国产单亲对白刺激| 国产精品98久久久久久宅男小说| 美女大奶头视频| 亚洲精品美女久久av网站| 国产av又大| 亚洲国产日韩欧美精品在线观看 | 黑人欧美特级aaaaaa片| 久久久久久免费高清国产稀缺| 国产精品免费一区二区三区在线| 日韩欧美免费精品| e午夜精品久久久久久久| 麻豆一二三区av精品| 老汉色∧v一级毛片| 黄色视频,在线免费观看| 成熟少妇高潮喷水视频| 看免费av毛片| 老熟妇仑乱视频hdxx| 久久中文字幕一级| svipshipincom国产片| 亚洲中文字幕一区二区三区有码在线看 | 色老头精品视频在线观看| 人人妻,人人澡人人爽秒播| 琪琪午夜伦伦电影理论片6080| 亚洲成av人片免费观看| 国产精品亚洲美女久久久| 亚洲国产精品999在线| 深夜精品福利| 亚洲av成人av| 免费搜索国产男女视频| 真人一进一出gif抽搐免费| 丝袜人妻中文字幕| 欧美一级毛片孕妇| 久久人妻av系列| 在线观看66精品国产| 美女高潮喷水抽搐中文字幕| 大香蕉久久成人网| 侵犯人妻中文字幕一二三四区| 91麻豆精品激情在线观看国产| 两性夫妻黄色片| 亚洲色图综合在线观看| 97碰自拍视频| av有码第一页| 人妻丰满熟妇av一区二区三区| 日韩精品免费视频一区二区三区| 久久久精品国产亚洲av高清涩受| 免费在线观看影片大全网站| 人成视频在线观看免费观看| 免费在线观看视频国产中文字幕亚洲| 大陆偷拍与自拍| 黑人欧美特级aaaaaa片| 国产欧美日韩一区二区三| 日本撒尿小便嘘嘘汇集6| 一区二区三区激情视频| 亚洲五月天丁香| 成人永久免费在线观看视频| 国产欧美日韩精品亚洲av| 色av中文字幕| 成人特级黄色片久久久久久久| 国产成人系列免费观看| 亚洲最大成人中文| 亚洲少妇的诱惑av| 黑丝袜美女国产一区| 大码成人一级视频| 午夜激情av网站| 欧美黑人欧美精品刺激| 免费在线观看黄色视频的| 亚洲情色 制服丝袜| 欧美日韩黄片免| 久久精品国产清高在天天线| 18禁裸乳无遮挡免费网站照片 | 国产黄a三级三级三级人| 亚洲一卡2卡3卡4卡5卡精品中文| 人妻丰满熟妇av一区二区三区| 日本免费一区二区三区高清不卡 | 看黄色毛片网站| 91成人精品电影| 国产高清有码在线观看视频 | 国产精品香港三级国产av潘金莲| 麻豆av在线久日| 精品国内亚洲2022精品成人| 神马国产精品三级电影在线观看 | 国产精品久久久久久亚洲av鲁大| 制服丝袜大香蕉在线| 国产成人免费无遮挡视频| 88av欧美| 淫妇啪啪啪对白视频| 在线永久观看黄色视频| 国产精品久久电影中文字幕| 日韩精品免费视频一区二区三区| 成人亚洲精品av一区二区| 国产亚洲精品第一综合不卡| 99香蕉大伊视频| 久久香蕉精品热| av视频在线观看入口| 香蕉久久夜色| 久久人妻福利社区极品人妻图片| av电影中文网址| 亚洲中文av在线| 亚洲欧美日韩高清在线视频| 国产蜜桃级精品一区二区三区| 自拍欧美九色日韩亚洲蝌蚪91| 涩涩av久久男人的天堂| 极品人妻少妇av视频| 国产欧美日韩一区二区三区在线| 亚洲人成电影免费在线| 日本免费一区二区三区高清不卡 | 久久欧美精品欧美久久欧美| 69av精品久久久久久| 欧美黑人欧美精品刺激| 久久精品国产亚洲av香蕉五月| 午夜福利免费观看在线| 日韩欧美国产在线观看| 久久精品91蜜桃| av欧美777| 久久久久久久精品吃奶| 日本三级黄在线观看| 亚洲 欧美 日韩 在线 免费| 中文字幕人妻丝袜一区二区| 亚洲人成伊人成综合网2020| 免费无遮挡裸体视频| 黄色视频不卡| 精品欧美一区二区三区在线| 日本黄色视频三级网站网址| 日韩视频一区二区在线观看| 欧美中文综合在线视频| 久久久久久人人人人人| 大型av网站在线播放| 中文字幕久久专区| 99re在线观看精品视频| 青草久久国产| 精品久久久精品久久久| 国产精品久久久久久精品电影 | 制服丝袜大香蕉在线| netflix在线观看网站| 成人亚洲精品一区在线观看| 看黄色毛片网站| 欧美日韩中文字幕国产精品一区二区三区 | 手机成人av网站| 一夜夜www| 香蕉久久夜色| 51午夜福利影视在线观看| 又黄又粗又硬又大视频| 狠狠狠狠99中文字幕| 国产精品亚洲美女久久久| 久久中文字幕人妻熟女| 国产伦一二天堂av在线观看| 亚洲七黄色美女视频| 不卡av一区二区三区| 久久人妻熟女aⅴ| 老司机深夜福利视频在线观看| 欧美日韩乱码在线| 激情在线观看视频在线高清| 久久久久久久久久久久大奶| 亚洲精品一卡2卡三卡4卡5卡| 母亲3免费完整高清在线观看| 精品福利观看| 亚洲五月天丁香| 久久国产精品影院| 久久九九热精品免费| 亚洲欧美激情在线| 国产色视频综合| 亚洲国产高清在线一区二区三 | 桃色一区二区三区在线观看| 亚洲国产精品999在线| 久久草成人影院| 久久国产乱子伦精品免费另类| av片东京热男人的天堂| 国产又爽黄色视频| 美女扒开内裤让男人捅视频| 久久婷婷人人爽人人干人人爱 | 视频区欧美日本亚洲| 免费一级毛片在线播放高清视频 | 欧美不卡视频在线免费观看 | 日本a在线网址| 又黄又粗又硬又大视频| 啪啪无遮挡十八禁网站| 亚洲人成网站在线播放欧美日韩| 真人一进一出gif抽搐免费| 亚洲成人久久性| 国产欧美日韩综合在线一区二区| 黑人巨大精品欧美一区二区蜜桃| 性欧美人与动物交配| 搡老岳熟女国产| 欧美一级毛片孕妇| 少妇被粗大的猛进出69影院| 亚洲av五月六月丁香网| 69av精品久久久久久| 超碰成人久久| 久久精品91无色码中文字幕| 999久久久精品免费观看国产| 给我免费播放毛片高清在线观看| 日本免费一区二区三区高清不卡 | 久热这里只有精品99| 亚洲精品国产色婷婷电影| 91麻豆精品激情在线观看国产| 亚洲情色 制服丝袜| 一二三四社区在线视频社区8| 一级毛片精品| 嫩草影院精品99| 国产亚洲精品一区二区www| 日韩欧美免费精品| 欧美精品亚洲一区二区| 香蕉国产在线看| 悠悠久久av| 国产欧美日韩综合在线一区二区| 色在线成人网| 久久伊人香网站| 亚洲男人天堂网一区| 亚洲欧美日韩高清在线视频| 亚洲av电影在线进入| 美国免费a级毛片| 久久精品国产亚洲av高清一级| 老司机在亚洲福利影院| 久久久久九九精品影院| 亚洲全国av大片| 亚洲欧美激情综合另类| 男人舔女人下体高潮全视频| 日韩欧美国产在线观看| 国产一区二区在线av高清观看| 黑人操中国人逼视频| 免费看美女性在线毛片视频| 国产精品1区2区在线观看.| 日韩大码丰满熟妇| 18禁观看日本| 精品久久蜜臀av无| 午夜免费观看网址| 久久国产亚洲av麻豆专区| 久久人妻福利社区极品人妻图片| 777久久人妻少妇嫩草av网站| 国产亚洲av嫩草精品影院| 欧美黑人欧美精品刺激| 人妻久久中文字幕网| 欧美+亚洲+日韩+国产| 日韩高清综合在线| 少妇熟女aⅴ在线视频| 黄色视频,在线免费观看| 黄色毛片三级朝国网站| 国产精品免费一区二区三区在线| 精品日产1卡2卡| 欧美日本亚洲视频在线播放| bbb黄色大片| 免费在线观看影片大全网站| 午夜免费激情av| 手机成人av网站| 亚洲av第一区精品v没综合| 欧美日本视频| 啦啦啦免费观看视频1| 午夜精品在线福利| 欧美成人午夜精品| 色精品久久人妻99蜜桃| 美女国产高潮福利片在线看| 18禁美女被吸乳视频| 国产熟女xx| av网站免费在线观看视频| 亚洲精品在线美女| e午夜精品久久久久久久| 久久亚洲精品不卡| 国产精品电影一区二区三区| 久久人妻福利社区极品人妻图片| 麻豆成人av在线观看| 好男人在线观看高清免费视频 | 在线免费观看的www视频| 怎么达到女性高潮| 俄罗斯特黄特色一大片| 亚洲五月色婷婷综合| 欧美色视频一区免费| 国产精品久久久久久亚洲av鲁大| 成人三级做爰电影| 长腿黑丝高跟| 亚洲va日本ⅴa欧美va伊人久久| 这个男人来自地球电影免费观看| 老熟妇仑乱视频hdxx| 老司机午夜福利在线观看视频| 少妇被粗大的猛进出69影院| 国产人伦9x9x在线观看| 亚洲av美国av| 久久精品国产综合久久久| a级毛片在线看网站| 丝袜在线中文字幕| 精品午夜福利视频在线观看一区| 日韩欧美一区二区三区在线观看| 真人做人爱边吃奶动态| 大型av网站在线播放| 身体一侧抽搐| 成人国语在线视频| 99热只有精品国产| 久久精品亚洲精品国产色婷小说| 男人的好看免费观看在线视频 | 动漫黄色视频在线观看| 老司机午夜十八禁免费视频| 精品国产美女av久久久久小说| 成人欧美大片| 欧美成人性av电影在线观看| 亚洲一区二区三区色噜噜| 十分钟在线观看高清视频www| 色综合亚洲欧美另类图片| 国产精品电影一区二区三区| 久久久久久久精品吃奶| 欧美一区二区精品小视频在线| 成熟少妇高潮喷水视频| 日韩三级视频一区二区三区| 国产伦一二天堂av在线观看| 日韩av在线大香蕉| 欧美亚洲日本最大视频资源| 精品午夜福利视频在线观看一区| 亚洲精品美女久久av网站| 亚洲最大成人中文| 亚洲一卡2卡3卡4卡5卡精品中文| 国产一区在线观看成人免费| 欧美最黄视频在线播放免费| 高清黄色对白视频在线免费看| 丝袜在线中文字幕| 亚洲欧美激情综合另类| 久久中文看片网| 国产伦一二天堂av在线观看| 欧美成狂野欧美在线观看| 亚洲国产精品999在线| 淫妇啪啪啪对白视频| 黄频高清免费视频| 老司机靠b影院| 国产亚洲欧美精品永久| 亚洲精品美女久久av网站| 久久久久国产精品人妻aⅴ院| 欧美乱妇无乱码| 97人妻精品一区二区三区麻豆 | 咕卡用的链子| 久久性视频一级片| 波多野结衣av一区二区av| 亚洲在线自拍视频| 两个人视频免费观看高清| 国产高清视频在线播放一区| 欧洲精品卡2卡3卡4卡5卡区| 欧美日韩中文字幕国产精品一区二区三区 | 亚洲第一av免费看| 国产精品电影一区二区三区| 久久久久久久久久久久大奶| 久久欧美精品欧美久久欧美| 久久影院123| 久久人妻熟女aⅴ| 免费在线观看影片大全网站| 一卡2卡三卡四卡精品乱码亚洲| 国产亚洲欧美在线一区二区| 亚洲欧美日韩另类电影网站| 性少妇av在线| 99精品欧美一区二区三区四区| 国产精品乱码一区二三区的特点 | 国产xxxxx性猛交| 亚洲精品av麻豆狂野| 亚洲五月天丁香| av中文乱码字幕在线| 久久人人爽av亚洲精品天堂| 国产成人精品久久二区二区91| 男人舔女人的私密视频| 天堂影院成人在线观看| 久久久久久大精品| 两性午夜刺激爽爽歪歪视频在线观看 | 欧美一区二区精品小视频在线| 免费在线观看亚洲国产| 久久狼人影院| 我的亚洲天堂| 精品国产乱码久久久久久男人| 变态另类成人亚洲欧美熟女 | 亚洲熟女毛片儿| 免费人成视频x8x8入口观看| 在线观看舔阴道视频| 大型av网站在线播放| 黄网站色视频无遮挡免费观看| 亚洲人成电影免费在线| 村上凉子中文字幕在线| √禁漫天堂资源中文www| 亚洲欧美日韩无卡精品| 久久这里只有精品19| 久久狼人影院| av天堂久久9| 在线永久观看黄色视频| 欧洲精品卡2卡3卡4卡5卡区| 在线免费观看的www视频| 可以在线观看毛片的网站| 90打野战视频偷拍视频| 日本黄色视频三级网站网址| 嫁个100分男人电影在线观看| 国产亚洲精品久久久久久毛片| 在线观看免费日韩欧美大片| 久久久久久人人人人人| 青草久久国产| 人人妻,人人澡人人爽秒播| 精品午夜福利视频在线观看一区| 91麻豆精品激情在线观看国产| 啦啦啦观看免费观看视频高清 | 丝袜美足系列| 色播亚洲综合网| 亚洲中文字幕一区二区三区有码在线看 | 后天国语完整版免费观看| 久久欧美精品欧美久久欧美| 亚洲天堂国产精品一区在线| 18禁美女被吸乳视频| 欧美+亚洲+日韩+国产|