• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    An image encryption algorithm based on improved baker transformation and chaotic S-box?

    2021-06-26 03:03:34XingYuanWang王興元HuaiHuaiSun孫懷懷andHaoGao高浩
    Chinese Physics B 2021年6期
    關(guān)鍵詞:興元

    Xing-Yuan Wang(王興元), Huai-Huai Sun(孫懷懷), and Hao Gao(高浩)

    School of Information Science and Technology,Dalian Maritime University,Dalian 116026,China

    Keywords: image encryption,improved baker transformation,chaotic S-box,chaotic sequence

    1. Introduction

    With the continuous development of computer network technology,the confidentiality of network information has attracted more and more attention. Because digital images have the advantages of long-term preservation,multiple replication,and easy transmission, they have gradually become the main way for people to obtain information on the network. However, there are also hidden dangers. Mainly because the image involves a lot of information, it is easy to be stolen in the transmission of the network, thereby bringing great trouble to people. Due to the rapid development of the network,it is possible for one to collect the digital image information in the network.[1]Therefore,it is extremely important to transmit digital image information over the network to ensure its security. Nowadays, many image protection schemes have been proposed, such as encryption, watermarking, steganography,and other methods.[2–4]For image encryption,designing a safe and effective encryption algorithm has become an inevitable option. Since the classical encryption algorithm does not take into account the inherent characteristics of large data capacity and high redundancy of images,these algorithms are not suitable for image encryption. Chaos is not only a new form of existence in nonlinear dynamic systems, but also closely related to fractals in nonlinear science. It can be said that chaos is the fractal of time, and fractal is the chaos of space.[5–7]In the chaotic image encryption algorithm used cleverly are the initial conditional sensitivity, pseudo-randomness, ergodicity, and reproducibility of the motion law of the chaotic system. These properties can meet the requirements for the security sensitivity characteristics of encryption algorithms.Based on this, many researchers home and abroad have proposed many efficient and secure chaotic image encryption algorithms. Chaos-based image encryption algorithms have become a research hotspot.

    In general, chaotic-based image encryption algorithms mainly include two steps: scrambling of image pixel positions and diffusion of image pixel values. At present,common image scrambling methods cover scrambling methods based on Arnold transform, magic square transform, and baker transform. The baker transformation method is a transformation technique that stretches and folds continuous planar regions.[8]Applying the traditional baker transformation method to the image scrambling, if the number of transformations is unreasonable,it will get a bad scrambling effect. In addition,when the continuous plane area processed by the conventional baker transformation method is too large, there is a disadvantage that the transformation randomness is poor and the transformation time is long. Therefore, this article proposes an improved method of applying the baker transformation to the image scrambling stage. The encrypted image is divided into 16 small blocks on average, and the image is scrambled by using a conventional baker transform method for each block,and the number of transformations is controlled by the chaotic sequence,so that the scrambling effect is more random. In addition,the S-box is a module that plays a central role in a block cipher system, and mainly plays a role of confusion and proliferation. The security strength of the S-box determines the security of the encryption algorithm. Traditional cryptography uses algebraic methods to construct the S-box. Although a high degree of nonlinearity can be obtained, the differential performance is relatively weak due to the simplistic structure and cannot resist algebraic attacks.[9,10]The application of chaotic systems to the design of nonlinear S-box is more effective. Based on this, this paper cites the chaotic S-box designed in Ref.[11]to process the encryption key of the algorithm. Therefore,the main contribution of this paper lies in proposing a new chaotic image encryption algorithm. In the algorithm,the improved baker transformation and chaotic Sbox are utilized. Experimental results prove that the algorithm proposed in this article is more efficient and safer.

    The rest of this article is organized as follows. In Section 2 presented is the initial preparation,describing the theoretical knowledge and chaotic systems used in the algorithm.In Section 3 given is an algorithm description that describes the encryption process of the algorithm and comes with an encryption flowchart. In Section 4 the results of the simulation experiment are provided. Several digital images are selected and the simulation results are presented. In Section 5 analyzed is the security of the algorithm from various attack methods.In Section 6,some conclusions are drawn from the present study and the direction of future work is also suggested.

    2. Initial preparation work

    2.1. Improved baker transformation

    In fact,the baker transformation can produce stretch-like and folding effects in the state space,just like a baker rubbing a piece of dough.Imagine that adding a blue food colorant to the dough,which is repeatedly stretched and folded by the baker,the blue color is evenly mixed in the dough. The stretching and folding mechanisms cause adjacent points to eventually separate in an exponential manner,creating a sensitive dependence on the initial state. Therefore,the baker transformation has chaotic dynamic characteristics,and thus very much suits an image scrambling method.[12]

    In this paper,a baker discrete transformation method for data dot matrix scrambling of digital images is designed and described as follows:

    where the plain imageAM×Npixel value is represented byp(x,y). An example of a traditional baker transformation is shown in Fig.1.

    Fig.1. Traditional baker transformation process of 6×6 matrix.

    It can be seen that there are certain limitations to applying the traditional baker transformation to the image scrambling.On the one hand, when the number of transformations is too small,the visual scrambling effect is not good. In Ref.[12],it was proved experimentally that the original image is unrecognizable when the number of transformations exceeds 4 times;on the other hand, the continuous plane area of processing is very large,and there will be disadvantages such as long timeconsuming and poor randomness of scrambling. Therefore,in this paper the traditional baker transformation is improved to some extent. On the one hand, the original image is divided into multiple blocks,and each small image is separately transformed into a traditional baker, and finally each small image after being scrambled is spliced into a scrambled image.In addition,the number of times the Baker transforms is controlled by the chaotic sequence, so that the number of times of each small image transformation is different,so the scrambling randomness is better.

    2.2. S-box description

    In general, the S-box is also known as the replacement box. It is a nonlinear transformation tool. There are three main methods of constructing the S-box. They are stochastic construction methods,mathematical construction methods,and a combination of the two methods.[13,14]In actual use, it can be considered that the S-box is a Boolean map, and the S-box of sizeM×Nhas the formFM2→FN2,that is,the data of the number of bitsMare input to the S-box,and the data of theNbits are output. TheM-bit data change nonlinearly and can become seemingly randomN-bit data.[15]

    Table 1. 16×16 matrix representation of S-box.

    In addition,applying the chaotic system to the design and generation process of the S-box will achieve more desirable results. Khanet al.[11]proposed a robust S-box construction technique based on the chaotic Lorenz system.This S-box can effectively eliminate the need of using a separate key in the scrambling diffusion structure, and the generated S-box has an ideal nonlinear performance. Simulation experiment analysis shows that the S-box has a good encryption performance.The chaotic S-box discussed in Ref.[11]is cited in this paper,and its compositions are shown in Table 1.

    2.3. Chaotic system

    The one-dimensional logistic mapping is a typical nonlinear iterative equation. The equation is as follows:

    where the logistic mapping system is in a chaotic state when 3.5699<u ≤4,xkrefers to the iterative state value, defined between consecutive real fields from 0 to 1,andx0is the iteration initial value.For a given initial valuex0,the sequence generated under the action of Eq.(2)is aperiodic,non-convergent and sensitive to initial conditions. Because the logistic mapping is a simple nonlinear one-dimensional discrete iterative mapping, it is easy to implement in hardware. So it has become one of the most widely used chaotic maps in digital chaotic systems.[16–18]

    3. Algorithm description

    The encryption algorithm proposed in this paper has the same encryption steps as most of previous algorithms,that is,image processing, scrambling and diffusion of images. Because the security and effectiveness of the proposed algorithm should be strengthened, different encryption keys are used in different image encryption stages. Aiming at the encryption algorithm proposed in this paper,the specific implementation process is presented as follows.

    3.1. Image processing

    The image encryption algorithm proposed in this paper and most of previous algorithms have the same requirements for image sizes,that is,the original encrypted image is in the form of a square matrix.In other words,for a pair of grayscale digital images of sizeM×N,M=Nis required.IfM/=N,the method of zeroing the original image is taken,so that the number of rows and the number of columns of the original image are equal.

    3.2. Scrambling process

    Step 1 Enter the keysa0andu1, and substitute the two into the formula of the logistic chaotic map. The 1000 iterations eliminate the transient effects. After 16 consecutive iterations, the obtained chaotic sequence is recorded asai(i=1,2,...,16). The substitution of a chaotic sequenceaiof length 16 into Eq. (3) yields a one-dimensional sequencea'i(i=1,2,...,16).

    Step 2 The original imagePis divided into 16 subimages according to the rank and column average. The sub-image obtained after the division is recorded aspi(i=1,2,...,16).The baker transformation is performed separately for each small image, and the number of baker transformations is controlled by the one-dimensional sequencea'i.The 16 small images obtained by the baker transformation are sequentially spliced into a large decrypt image,which is recorded asP1.

    Step 3 Similarly,the keysb0andu2are substituted into the formula of the logistic map. The 1000 iterations eliminate the transient effects. After continuing to implementM×Niterations, the obtained chaotic sequence is recorded asbi(i=1,2,...,M×N). And the substitution ofbiinto Eq. (4)yields

    where sort(·) represents the sorting function. Using the sorting function,the corresponding subscript of each value in the sequenceb'in the sequencebis stored as the sequenceD. A scrambled arrangement in whichDis a sequence of integers from 1 toM×Ncan be obtained. The imageP1,from the first pixel point to establishP1itoPDimapping. The positions are exchanged from the first element to the last element one by one. After that, imageP1is converted into imageP2with a size ofM×N.

    At this point, the scrambling process for the encrypted image is completed.

    3.3. Diffusion process

    Step 1 First,enter the keysx0andu3,and substitute the two keys into the logistic chaotic mapping formula. The 1000 iterations eliminate the transient effects. ThenM×Nconsecutive iterations are implemented. The chaotic sequencexi(i=1,2,...,M×N) is obtained and substituted into the following formula:

    whereW=max(M,N). Thus,a one-dimensional sequencex'iis obtained,and the sequence length isM×N.

    Step 2 Let key0=floor(Pmean)+R,where key0refers to an initial key in the encryption process,Pmeanrepresents an average pixel value of the imageP,andRis a given integer. The initial key key0converted from a decimal number to an 8-bit binary number is still denoted as key0.

    Step 3 Take the 3rd to 6th digits of the 8-bit binary number key0and record it as key01. Convert these 4-bit binary numbers into decimal numbers. Then take the first 2 bits and the last 2 bits of the 8-bit binary number key0and record it as key02. Convert these 4-bit binary numbers into decimal numbers. Enter the chaotic S-box for nonlinear transformation.The specific operation is indicated by the following formula:

    Here, the bin2decc(.) function converts binary numbers into decimal numbers. The key is the value obtained by processing the initial key key0into the chaotic S-box. It is a decimal number.

    Step 4 Use the left shift operator. For the decimal number key,the respective loops are shifted leftward by 2 bits and 5 bits. The specific operation is as shown in the following formula:

    Step 5 Expand the two-dimensional image matrixP2with a size ofM×Ninto a one-dimensional vectorAi(i=1,2,...,M×N). Then use the following formula to operate:

    The obtained one-dimensional vectorA'i(i=1,2,...,M×N)is converted into an imageM×Nand referred to asP3.

    Step 6 Enter the keysy0andu4, and substitute the two keys into the logistic chaotic mapping formula. The 1000 iterations eliminate the transient effects. Implement the selectedM×Niterations again. The chaotic sequenceyi(wherei=1,2,...,M×N) is obtained. The chaotic sequenceyiis substituted into the following formula to obtain the processed one-dimensional sequencey'i:

    Fig.2. Flowchart of encryption process.

    Step 7 Convert a one-dimensional sequencey'iinto a twodimensional arrayBwith a size ofM×N. The adjacent-side XOR operation is performed with the encrypted imageP3obtained from the first step of diffusion. The specific description is as follows:

    whereEirefers to thei-th element of imageP3.

    In summary, the diffusion process for the encrypted imageP2ends. And the diffused image is denoted asC.

    Thus,the cipher imageCis obtained.The encryption flow chart of the algorithm is shown in Fig.2.

    4. Results of simulation experiment

    The simulation experiments in this paper are performed with the software Matlab R2017a. The computer configuration used is a 2.80-GHz CPU,8 GB of memory and Microsoft Windows 10 operating system. In order to verify the effectiveness of the above algorithm,in this paper,Lena,Girl,and House gray digital images with a size of 256×256 are selected as the plain images in the simulation experiment.

    Fig.3. Four image encryption/decryption experiment results: (a)Lena,(b)cipher image,(c)decoding image,(d)Girl,(e)cipher image,(f)decoding image,(g)House,(h)cipher image,(i)decoding image,(j)Lena2,(k)cipher image,(l)decoding image.

    The encryption and decryption results of Lena,Girl,and House grayscale images are shown in Fig.3. In addition, the chaotic image encryption algorithm is also suitable for the encryption of color images. We only need to decompose the color image into three grayscale images,and then use the algorithm to encrypt the three grayscale images, and finally combine them into a color cipher map.Experiments are performed using a Lena color image, and the results are still shown in Fig.3.

    5. Security analysis

    5.1. Exhaustive attack analysis

    5.1.1. Key space analysis

    The key is the core of the entire cryptosystem. Usually,the more the parameters and the larger the key space,the higher the difficulty in deciphering is and the more secure the encryption system. The key space analysis in the algorithm is mainly to prevent possible exhaustive attacks.[19,20]The key of this paper is as follows: the chaotic initial value and control parameters of the logistic chaotic mapping formula in the scrambling and diffusion stage of the plain image; and key0,specifically,a0,b0,x0,y0,u1,u2,u3,u4,and key0. If the computing precision of the computer is 10?14, the key space of the algorithm proposed in this paper is 10126. In Refs.[21,22]proposed was the algorithms with key spaces of 1089and 1098respectively. Therefore, the algorithm proposed in this paper has a larger key space value,and this value meets the security requirements of the key space.

    5.1.2. Key sensitivity analysis

    In order to test the sensitivity of the key, the initial valuesx0andy0of the chaotic system are increased by 10?14respectively,with the other keys unchanged. The image is decrypted using the correct key and a slightly altered key. The experimental object is a Lena grayscale image.Figure 4 shows the test results. Figure 4(a) shows that using the correct key for decryption,the original image can be correctly decrypted.Figure 4(b) shows the use of the keyx0=x0+10?14for decryption. Figure 4(c)shows the use of the keyy0=y0+10?14for decryption. It can be clearly observed that the two images obtained by being decrypted with the wrong key have no information containing the original image at all. Therefore,the algorithm is very sensitive to encryption keys and has high confidentiality.

    Fig.4. Key sensitivity test: (a)decrypt with the correct key,(b)decrypt with wrong key,(c)decrypt with wrong key.

    5.2. Statistical attack analysis

    5.2.1. Histogram analysis

    The histogram statistics of the encryption system is mainly the area that reflects the distribution of image pixel values. After the image is encrypted, the image is not recognized after encryption,and its statistical characteristics will also change accordingly. Generally,the histogram distribution of the plain image is concentrated. After processing by the encryption algorithm, the more uniform the pixel value distribution of the cipher image, the more ideal it is. That is,the more uniform the histogram looks, the better the image is.[23–25]Figure 5 shows the histograms of the plain and cipher images of Lena, Girl, and House, respectively. The experimental results show that the pixel values of the plain image are unevenly distributed,and the pixel values of the cipher image obtained by the algorithm are evenly distributed in the whole pixel space,and the pixel gray value appears in a range of [0, 255]. The probabilities are almost equal, and it can be analyzed that it is difficult for an illegal attacker to use the statistical properties of image pixel values to recover the original image.

    Fig.5. Histogram of plain and cipher images: (a)Lena plain histogram,(b)Lena cipher histogram,(c)Girl plain histogram,(d)Girl cipher histogram,(e)House plain histogram,(f)House cipher histogram.

    5.2.2. Adjacent pixel correlation analysis

    The high correlation of adjacent pixels of an image is an essential feature of digital images. In order to resist the statistical attacks,the correlation of adjacent pixels must be reduced,and the smaller the correlation coefficient,the better the encryption performance is.[26,27]In order to analyze the correlation of adjacent pixels, taking the Girl gray image for example, 104pixel points are randomly selected for correlation analysis. Their correlation coefficients are calculated according to Eqs. (11) and(12).[28]Table 2 shows the correlation coefficients of the three grayscale images in three directions before and after encryption.Figures 6(a), 6(c), and 6(e) show the distribution of adjacent pixel correlations of the plain image of Girl in three directions.Figures 6(b),6(d),and 6(f)show the adjacent pixel correlation distributions of the cipher image of Girl in three directions.

    Table 2. Correlation of adjacent pixels.

    Fig.6. Adjacent pixel correlation between pre-encrypted and encrypted images: (a)horizontal correlation of Girl image,(b)horizontal correlation of cipher,(c)vertical correlation of Girl image,(d)vertical correlation of cipher,(e)diagonal correlation of Girl image,(f)diagonal correlation of cipher.

    Table 3. Comparisons among correlation coefficients of images.

    In addition,in Table 3 the gray-scale image Lena is taken for example,and the experimental results of its adjacent pixel correlation with other algorithms are compared. All experimental results prove that the cipher image correlation is greatly reduced after encryption by the algorithm,which can better resist statistical attacks based on correlation analysis.

    where

    5.2.3. Information entropy

    In this subsection the information entropy analysis in security analysis is conducted. It is a measure of the order of information. The closer to a uniform distribution the probability distribution of image pixel values, the larger the information entropy is and the smaller the information entropy. In particular,When there is a probability that the pixel values are equal, the image information is the largest.[31,32]The image information entropy is given by Eq.(13). In Table 4 listed are the information entropy of the plain and cipher maps of the three grayscale images. The experimental results show that the information entropy of each plain image is significantly different from the theoretical value,and all pixel values of the cipher image appear with almost equal probability. In Table 5 the gray-scale image Lena is taken for example to compare the results of the information entropy experiment with those from other algorithms. This proves that the algorithm proposed in this paper is effective.

    Table 4. Information entropy of plain images and cipher images.

    Table 5. Comparison among results of information entropy.

    5.3. Cropping attack analysis

    Cropping attack is also a common attack method for an attack to image encryption,launched exerted by an illegal attacker.[33]Therefore, in order to test the resistance of the image encryption algorithm to the cropping attack, proposed in this paper, the cipher graph of the experimental object House in four degrees is cut, then the correct encryption key is input to execute the decryption program, and the decrypted image is observed. Figure 7 shows the experimental results. It can be seen that even if the cipher image is cropped by 1/2 degrees, the plain image can still be recognized after being correctly decrypted. Therefore,the chaotic image encryption algorithm proposed in this paper possesses a certain resistance to cropping attacks.

    Fig.7. Recovery after tailoing attacke at different degrees: (a)1/16-degree cropping and decrypting image,(b)1/8-degree cropping and decrypting image,(c)1/4-degree cropping and decrypting image,(d)1/2-degree cropping and decrypting image.

    5.4. Noise attack analysis

    In a real-time transmission channel,there is often noise that affects the plain image. Noise attacks are also a way to verify the robustness of cryptosystems.[34–36]In order to evaluate the ability of the encryption algorithm to resist noise in this paper,different salt and pepper noise are added to the House cipher image,and the correct key is used for decryption. The experimental results are shown in Fig. 8. The experimental results show that the encryption algorithm of this paper has better resistance to noise attacks.

    Fig.8. Cipher image adds different degrees of noise and corresponding decryption maps: (a)cipher and decrypted image with noise intensity of 0.01,(b)cipher and decrypted image with noise intensity of 0.05, (c)cipher and decrypted image with noise intensity of 0.1.

    6. Conclusions

    In this work, a new image encryption algorithm is proposed. It is based on an improved baker transform and chaos S-box. In the image scrambling phase, the plain image is manipulated primarily using an improved baker transform method. On the other hand, in the image diffusion stage, the chaotic S-box is referenced and the initial key is processed.It also performs XOR operations on image, key, and chaotic sequences. The experimental results and security analysis prove that the digital image encryption algorithm proposed in this paper is effective in resisting multiple attacks; in other words, the image encryption algorithm proposed in this paper is highly secure and excellent encrypted randomness. In addition,in the future direction of work,we can not only starting from the existing encryption methods,improve or propose new encryption methods for chaotic image encryption,but also starting from the chaotic system, improve or propose a more efficient chaotic system, which can be applied to the image encryption algorithms.

    猜你喜歡
    興元
    Lossless embedding: A visually meaningful image encryption algorithm based on hyperchaos and compressive sensing
    情系鄉(xiāng)村振興的最美老干部——艾興元
    An image encryption algorithm based on spatiotemporal chaos and middle order traversal of a binary tree
    Synchronously scrambled diffuse image encryption method based on a new cosine chaotic map
    Force-constant-decayed anisotropic network model: An improved method for predicting RNA flexibility
    Molecular dynamics simulations on the wet/dry self-latching and electric fields triggered wet/dry transitions between nanosheets:A non-volatile memory nanostructure
    A secure image protection algorithm by steganography and encryption using the 2D-TSCC*
    Fractal sorting vector-based least significant bit chaotic permutation for image encryption?
    Tip-induced superconductivity commonly existing in the family of transition-metal dipnictides MPn2*
    鳳凰淚
    金沙江文藝(2018年1期)2018-11-14 02:09:33
    亚洲成人久久爱视频| av欧美777| 巨乳人妻的诱惑在线观看| 欧美一区二区精品小视频在线| 亚洲专区国产一区二区| 手机成人av网站| 国产精品亚洲一级av第二区| 怎么达到女性高潮| 成人国产综合亚洲| 国产亚洲av高清不卡| 9191精品国产免费久久| 午夜免费鲁丝| 美国免费a级毛片| 亚洲av成人一区二区三| 又黄又粗又硬又大视频| 又黄又粗又硬又大视频| 757午夜福利合集在线观看| 在线十欧美十亚洲十日本专区| 国产免费男女视频| 亚洲精品国产区一区二| 亚洲精品一卡2卡三卡4卡5卡| 国产aⅴ精品一区二区三区波| x7x7x7水蜜桃| 国产亚洲欧美精品永久| 人人澡人人妻人| 中文字幕久久专区| 一本大道久久a久久精品| 欧美国产精品va在线观看不卡| 最新美女视频免费是黄的| 一级毛片女人18水好多| 亚洲电影在线观看av| 日韩欧美国产一区二区入口| 成人三级黄色视频| 午夜免费成人在线视频| av在线播放免费不卡| 美女高潮喷水抽搐中文字幕| 天天添夜夜摸| 亚洲精品中文字幕一二三四区| 久9热在线精品视频| 日本撒尿小便嘘嘘汇集6| 国内久久婷婷六月综合欲色啪| 中文字幕最新亚洲高清| 欧美久久黑人一区二区| 欧美日本视频| 欧美成人午夜精品| 少妇粗大呻吟视频| 亚洲精品一区av在线观看| 日韩欧美一区视频在线观看| 午夜激情av网站| 国产亚洲欧美精品永久| 啦啦啦韩国在线观看视频| 动漫黄色视频在线观看| 99国产极品粉嫩在线观看| 免费看a级黄色片| 欧美日本亚洲视频在线播放| 国产精品免费一区二区三区在线| 欧美黑人精品巨大| 国产精品一区二区三区四区久久 | 国语自产精品视频在线第100页| 国产麻豆成人av免费视频| 别揉我奶头~嗯~啊~动态视频| 免费看美女性在线毛片视频| 国产主播在线观看一区二区| 波多野结衣av一区二区av| 色播在线永久视频| 色综合欧美亚洲国产小说| 中文字幕人妻熟女乱码| 亚洲一码二码三码区别大吗| 桃红色精品国产亚洲av| 99久久精品国产亚洲精品| 亚洲成人久久爱视频| 亚洲精品国产一区二区精华液| 日韩欧美国产在线观看| 国产伦在线观看视频一区| 亚洲国产高清在线一区二区三 | 国产精品久久久久久亚洲av鲁大| www日本黄色视频网| АⅤ资源中文在线天堂| 亚洲精品中文字幕一二三四区| 99riav亚洲国产免费| 一级片免费观看大全| 俺也久久电影网| 非洲黑人性xxxx精品又粗又长| 欧美一级毛片孕妇| 日韩大尺度精品在线看网址| 国产精品国产高清国产av| 久久久久久人人人人人| ponron亚洲| 天天躁狠狠躁夜夜躁狠狠躁| 国产精品爽爽va在线观看网站 | www国产在线视频色| xxx96com| 国产乱人伦免费视频| 国产高清激情床上av| 天堂√8在线中文| 精品欧美一区二区三区在线| 亚洲成国产人片在线观看| 美女扒开内裤让男人捅视频| 国产99久久九九免费精品| 黄色成人免费大全| 午夜影院日韩av| 深夜精品福利| 美女高潮到喷水免费观看| 久9热在线精品视频| 亚洲男人的天堂狠狠| 真人做人爱边吃奶动态| 精品少妇一区二区三区视频日本电影| 一进一出抽搐gif免费好疼| 午夜福利欧美成人| 90打野战视频偷拍视频| 欧美成人性av电影在线观看| 精品无人区乱码1区二区| 欧美成人免费av一区二区三区| 欧美成人免费av一区二区三区| 国产亚洲欧美精品永久| 国产精品 欧美亚洲| 日本a在线网址| 12—13女人毛片做爰片一| 色在线成人网| 久热爱精品视频在线9| 99热这里只有精品一区 | 久久 成人 亚洲| 脱女人内裤的视频| 99国产精品一区二区三区| 久久国产精品人妻蜜桃| 伦理电影免费视频| 色综合欧美亚洲国产小说| 国产人伦9x9x在线观看| 午夜精品久久久久久毛片777| 极品教师在线免费播放| 中文字幕人成人乱码亚洲影| 国产又爽黄色视频| 亚洲精品一区av在线观看| 欧美一区二区精品小视频在线| 人人妻,人人澡人人爽秒播| 最新美女视频免费是黄的| 精品一区二区三区四区五区乱码| 日本黄色视频三级网站网址| www日本在线高清视频| e午夜精品久久久久久久| 视频在线观看一区二区三区| 国产亚洲欧美在线一区二区| 国产精品精品国产色婷婷| 亚洲成av片中文字幕在线观看| 国产私拍福利视频在线观看| 久久国产乱子伦精品免费另类| 神马国产精品三级电影在线观看 | 免费看十八禁软件| 亚洲国产精品999在线| 18禁黄网站禁片免费观看直播| 最近最新中文字幕大全电影3 | 免费看十八禁软件| 欧美日韩中文字幕国产精品一区二区三区| 亚洲精品一区av在线观看| 国产三级在线视频| 精华霜和精华液先用哪个| 国产一区在线观看成人免费| www.自偷自拍.com| 欧美日韩瑟瑟在线播放| 成人永久免费在线观看视频| 中文资源天堂在线| e午夜精品久久久久久久| av片东京热男人的天堂| 国产一区二区三区在线臀色熟女| 欧美黑人精品巨大| 又紧又爽又黄一区二区| 级片在线观看| 欧美日韩福利视频一区二区| 国内揄拍国产精品人妻在线 | 久久香蕉激情| 亚洲七黄色美女视频| 色播亚洲综合网| 中国美女看黄片| 午夜精品久久久久久毛片777| 搡老妇女老女人老熟妇| 亚洲色图 男人天堂 中文字幕| 国产麻豆成人av免费视频| 级片在线观看| 搞女人的毛片| 亚洲片人在线观看| 久久久水蜜桃国产精品网| 欧美日韩亚洲综合一区二区三区_| 少妇裸体淫交视频免费看高清 | 夜夜夜夜夜久久久久| 日本撒尿小便嘘嘘汇集6| 天堂影院成人在线观看| 国产人伦9x9x在线观看| 丁香六月欧美| 亚洲专区国产一区二区| 亚洲av成人不卡在线观看播放网| 伊人久久大香线蕉亚洲五| 变态另类成人亚洲欧美熟女| 欧美成人午夜精品| 在线国产一区二区在线| 美国免费a级毛片| 麻豆一二三区av精品| 一本大道久久a久久精品| 一本综合久久免费| 制服诱惑二区| 日韩视频一区二区在线观看| 色播亚洲综合网| ponron亚洲| 麻豆一二三区av精品| 精品卡一卡二卡四卡免费| 国内毛片毛片毛片毛片毛片| 精品国产超薄肉色丝袜足j| 91老司机精品| 观看免费一级毛片| 天堂影院成人在线观看| 成人一区二区视频在线观看| 国产亚洲欧美98| 久久性视频一级片| 精品熟女少妇八av免费久了| 国产成人影院久久av| 别揉我奶头~嗯~啊~动态视频| 亚洲一码二码三码区别大吗| 90打野战视频偷拍视频| 宅男免费午夜| 国产不卡一卡二| 国产一卡二卡三卡精品| 搡老岳熟女国产| 亚洲最大成人中文| 成人永久免费在线观看视频| 国产成人av激情在线播放| 久99久视频精品免费| 国产精品亚洲av一区麻豆| www.精华液| 亚洲欧洲精品一区二区精品久久久| 黄片播放在线免费| 高潮久久久久久久久久久不卡| 50天的宝宝边吃奶边哭怎么回事| 成人18禁在线播放| 校园春色视频在线观看| 中文在线观看免费www的网站 | 在线观看免费视频日本深夜| 999久久久国产精品视频| 国产伦在线观看视频一区| 搡老熟女国产l中国老女人| 波多野结衣巨乳人妻| 成人精品一区二区免费| 少妇的丰满在线观看| 日韩大码丰满熟妇| 国产97色在线日韩免费| 少妇的丰满在线观看| 成人国语在线视频| 精品免费久久久久久久清纯| 免费女性裸体啪啪无遮挡网站| 亚洲中文av在线| 在线观看免费日韩欧美大片| 午夜激情福利司机影院| 久久伊人香网站| 免费看日本二区| 午夜激情福利司机影院| 99热这里只有精品一区 | 欧美日韩精品网址| 美女国产高潮福利片在线看| 亚洲一区中文字幕在线| 欧美三级亚洲精品| av免费在线观看网站| 亚洲成人免费电影在线观看| 嫩草影视91久久| 宅男免费午夜| 99在线人妻在线中文字幕| 少妇裸体淫交视频免费看高清 | 波多野结衣高清无吗| 男女午夜视频在线观看| 一进一出抽搐gif免费好疼| 男女做爰动态图高潮gif福利片| 亚洲精品粉嫩美女一区| 1024视频免费在线观看| 久久九九热精品免费| 欧美色欧美亚洲另类二区| 国产激情欧美一区二区| 老司机在亚洲福利影院| 婷婷精品国产亚洲av在线| 亚洲av成人av| 亚洲五月天丁香| 人人妻人人澡人人看| 久久草成人影院| 黄色毛片三级朝国网站| 欧美精品啪啪一区二区三区| 亚洲三区欧美一区| 国产精品免费视频内射| 久热爱精品视频在线9| 黄色毛片三级朝国网站| 久久热在线av| 久久热在线av| 高潮久久久久久久久久久不卡| 99国产精品99久久久久| 欧美性长视频在线观看| 亚洲av成人不卡在线观看播放网| 他把我摸到了高潮在线观看| 免费观看人在逋| 国产亚洲av嫩草精品影院| 久久国产亚洲av麻豆专区| 久久久国产欧美日韩av| 免费女性裸体啪啪无遮挡网站| 亚洲一区高清亚洲精品| 婷婷亚洲欧美| 亚洲精品色激情综合| 久久久久九九精品影院| 夜夜躁狠狠躁天天躁| 国产野战对白在线观看| а√天堂www在线а√下载| 日韩欧美国产在线观看| 每晚都被弄得嗷嗷叫到高潮| cao死你这个sao货| 国产人伦9x9x在线观看| 久久午夜综合久久蜜桃| 成人一区二区视频在线观看| 窝窝影院91人妻| 一本大道久久a久久精品| 黑人欧美特级aaaaaa片| 欧美色欧美亚洲另类二区| 欧美色视频一区免费| 可以在线观看的亚洲视频| 女警被强在线播放| 在线观看免费日韩欧美大片| 视频在线观看一区二区三区| 午夜免费激情av| 男女视频在线观看网站免费 | 精品国产亚洲在线| 久久久久久免费高清国产稀缺| 中文在线观看免费www的网站 | 国产不卡一卡二| www日本黄色视频网| 中文亚洲av片在线观看爽| 日韩中文字幕欧美一区二区| 亚洲人成网站在线播放欧美日韩| 欧美最黄视频在线播放免费| 麻豆一二三区av精品| 看黄色毛片网站| 欧美 亚洲 国产 日韩一| 欧美乱色亚洲激情| 夜夜看夜夜爽夜夜摸| 色在线成人网| 在线观看www视频免费| 白带黄色成豆腐渣| 一边摸一边做爽爽视频免费| 妹子高潮喷水视频| 日韩精品青青久久久久久| 久久99热这里只有精品18| 亚洲熟妇中文字幕五十中出| 色在线成人网| 亚洲国产精品sss在线观看| 精品国产一区二区三区四区第35| 久久亚洲精品不卡| 国产三级黄色录像| 大型av网站在线播放| 男人操女人黄网站| 在线看三级毛片| 中文字幕最新亚洲高清| 久久精品亚洲精品国产色婷小说| 久久 成人 亚洲| 看黄色毛片网站| 成人国产一区最新在线观看| 久久99热这里只有精品18| а√天堂www在线а√下载| 女警被强在线播放| 欧美中文日本在线观看视频| 两个人看的免费小视频| 最新在线观看一区二区三区| xxx96com| 久久 成人 亚洲| 757午夜福利合集在线观看| 白带黄色成豆腐渣| 激情在线观看视频在线高清| 999久久久精品免费观看国产| 每晚都被弄得嗷嗷叫到高潮| 国产野战对白在线观看| 又黄又粗又硬又大视频| 国产久久久一区二区三区| 欧美大码av| 亚洲av中文字字幕乱码综合 | 丝袜美腿诱惑在线| 亚洲无线在线观看| 国产精品一区二区三区四区久久 | 亚洲成人久久爱视频| 国产精品香港三级国产av潘金莲| 国产视频一区二区在线看| 亚洲欧美精品综合一区二区三区| 99精品在免费线老司机午夜| 国产aⅴ精品一区二区三区波| 久久人妻av系列| 午夜久久久久精精品| 国产人伦9x9x在线观看| 免费一级毛片在线播放高清视频| 国产激情久久老熟女| 精品免费久久久久久久清纯| 久久久久九九精品影院| 好男人在线观看高清免费视频 | 亚洲精品粉嫩美女一区| 亚洲精品美女久久av网站| 国产精品av久久久久免费| 在线观看66精品国产| 久久久水蜜桃国产精品网| 淫秽高清视频在线观看| 观看免费一级毛片| 真人做人爱边吃奶动态| 不卡一级毛片| 淫秽高清视频在线观看| 91大片在线观看| 欧美日本亚洲视频在线播放| 国产成人精品无人区| 亚洲,欧美精品.| 18美女黄网站色大片免费观看| 日韩欧美在线二视频| 成年女人毛片免费观看观看9| 国产精品野战在线观看| 久久婷婷成人综合色麻豆| 欧美午夜高清在线| 18禁美女被吸乳视频| 成年免费大片在线观看| 丁香六月欧美| 一区二区三区激情视频| 国产一区在线观看成人免费| 啦啦啦 在线观看视频| 久久九九热精品免费| 欧洲精品卡2卡3卡4卡5卡区| 亚洲国产日韩欧美精品在线观看 | 18禁裸乳无遮挡免费网站照片 | 50天的宝宝边吃奶边哭怎么回事| 国产乱人伦免费视频| 女人高潮潮喷娇喘18禁视频| 长腿黑丝高跟| 在线观看免费日韩欧美大片| 精品久久久久久久久久久久久 | av免费在线观看网站| 美女免费视频网站| 极品教师在线免费播放| 日韩有码中文字幕| 国产成人精品久久二区二区免费| 每晚都被弄得嗷嗷叫到高潮| 国产高清有码在线观看视频 | or卡值多少钱| 很黄的视频免费| 熟妇人妻久久中文字幕3abv| 久久精品aⅴ一区二区三区四区| 1024视频免费在线观看| 日韩欧美国产在线观看| 国产成人欧美| 亚洲精品粉嫩美女一区| 国产成人一区二区三区免费视频网站| 一本精品99久久精品77| 色综合欧美亚洲国产小说| 夜夜看夜夜爽夜夜摸| 19禁男女啪啪无遮挡网站| 精品久久久久久成人av| 国产爱豆传媒在线观看 | 嫩草影视91久久| 99国产精品一区二区蜜桃av| 一级毛片精品| 一a级毛片在线观看| 亚洲人成电影免费在线| 9191精品国产免费久久| 午夜福利18| 国产精品av久久久久免费| 精品午夜福利视频在线观看一区| 色老头精品视频在线观看| 亚洲av成人av| 免费看日本二区| 亚洲精品一卡2卡三卡4卡5卡| 久久天堂一区二区三区四区| x7x7x7水蜜桃| 757午夜福利合集在线观看| 亚洲男人天堂网一区| 一本一本综合久久| 亚洲国产欧美网| avwww免费| 久久这里只有精品19| 一级黄色大片毛片| 久久久精品欧美日韩精品| 在线播放国产精品三级| 国产高清视频在线播放一区| 母亲3免费完整高清在线观看| 国内精品久久久久精免费| 国产成人系列免费观看| 俄罗斯特黄特色一大片| 亚洲成人久久爱视频| 又黄又爽又免费观看的视频| 美女高潮到喷水免费观看| 精品久久蜜臀av无| 一级a爱视频在线免费观看| 久久久水蜜桃国产精品网| 色综合欧美亚洲国产小说| 亚洲国产欧美日韩在线播放| 极品教师在线免费播放| 91老司机精品| 99热只有精品国产| 日本一本二区三区精品| 日韩欧美一区视频在线观看| 成年人黄色毛片网站| 天天一区二区日本电影三级| 一二三四社区在线视频社区8| 亚洲一卡2卡3卡4卡5卡精品中文| 不卡av一区二区三区| 啦啦啦 在线观看视频| 天堂影院成人在线观看| 国产亚洲精品第一综合不卡| 久9热在线精品视频| 成人国产综合亚洲| 视频区欧美日本亚洲| 成人亚洲精品av一区二区| 成人国产一区最新在线观看| 国产精品久久久久久人妻精品电影| 黄片播放在线免费| 成人国产一区最新在线观看| 男女视频在线观看网站免费 | 午夜精品久久久久久毛片777| 欧美绝顶高潮抽搐喷水| 变态另类丝袜制服| 亚洲欧洲精品一区二区精品久久久| 波多野结衣高清无吗| 18禁裸乳无遮挡免费网站照片 | 亚洲五月色婷婷综合| 99国产综合亚洲精品| 观看免费一级毛片| 久久精品夜夜夜夜夜久久蜜豆 | 欧美激情极品国产一区二区三区| 午夜成年电影在线免费观看| 午夜影院日韩av| 久久久精品国产亚洲av高清涩受| 一级黄色大片毛片| 69av精品久久久久久| 中文字幕精品免费在线观看视频| 亚洲久久久国产精品| www.精华液| 成人国产一区最新在线观看| 这个男人来自地球电影免费观看| 91九色精品人成在线观看| 久久中文看片网| 黄片播放在线免费| 久久精品国产清高在天天线| 国内久久婷婷六月综合欲色啪| av欧美777| 国产真实乱freesex| 曰老女人黄片| 亚洲中文av在线| 国产在线精品亚洲第一网站| 国产av一区二区精品久久| 日韩一卡2卡3卡4卡2021年| 一二三四在线观看免费中文在| 亚洲无线在线观看| 中文字幕久久专区| 久久精品国产清高在天天线| 国产久久久一区二区三区| 国产又爽黄色视频| 99久久精品国产亚洲精品| 久久久久久人人人人人| 日韩大码丰满熟妇| 久热爱精品视频在线9| 搡老妇女老女人老熟妇| 国产亚洲精品av在线| 老汉色av国产亚洲站长工具| 特大巨黑吊av在线直播 | 听说在线观看完整版免费高清| 国产人伦9x9x在线观看| 国产真人三级小视频在线观看| 香蕉国产在线看| www日本在线高清视频| 嫩草影视91久久| 亚洲国产高清在线一区二区三 | 丝袜美腿诱惑在线| 久久久久久久久中文| 久久久国产精品麻豆| 人人澡人人妻人| 男人舔女人下体高潮全视频| 国产亚洲欧美98| 国产成人系列免费观看| 久久久久国产一级毛片高清牌| 欧美+亚洲+日韩+国产| x7x7x7水蜜桃| 久久欧美精品欧美久久欧美| 热99re8久久精品国产| 亚洲 国产 在线| 可以在线观看的亚洲视频| 18禁观看日本| 国产亚洲av嫩草精品影院| 日韩中文字幕欧美一区二区| 亚洲精华国产精华精| 亚洲专区国产一区二区| 日本 欧美在线| 亚洲三区欧美一区| 母亲3免费完整高清在线观看| 欧美不卡视频在线免费观看 | 亚洲,欧美精品.| √禁漫天堂资源中文www| 久久国产精品男人的天堂亚洲| 亚洲成a人片在线一区二区| 欧美av亚洲av综合av国产av| 国产单亲对白刺激| 91成人精品电影| xxxwww97欧美| 国产不卡一卡二| 黑人欧美特级aaaaaa片| 亚洲一区二区三区色噜噜| 欧美色视频一区免费| 精品电影一区二区在线| 热99re8久久精品国产| 午夜福利在线在线| 国产97色在线日韩免费| 伊人久久大香线蕉亚洲五| 久久久国产成人免费| 大型黄色视频在线免费观看| 女警被强在线播放| 波多野结衣高清无吗| 97超级碰碰碰精品色视频在线观看| 男人舔奶头视频| 性欧美人与动物交配| 国产又色又爽无遮挡免费看| 午夜久久久在线观看| 久久亚洲精品不卡| 午夜久久久久精精品| www.999成人在线观看| 成人精品一区二区免费|