• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    An image encryption algorithm based on improved baker transformation and chaotic S-box?

    2021-06-26 03:03:34XingYuanWang王興元HuaiHuaiSun孫懷懷andHaoGao高浩
    Chinese Physics B 2021年6期
    關(guān)鍵詞:興元

    Xing-Yuan Wang(王興元), Huai-Huai Sun(孫懷懷), and Hao Gao(高浩)

    School of Information Science and Technology,Dalian Maritime University,Dalian 116026,China

    Keywords: image encryption,improved baker transformation,chaotic S-box,chaotic sequence

    1. Introduction

    With the continuous development of computer network technology,the confidentiality of network information has attracted more and more attention. Because digital images have the advantages of long-term preservation,multiple replication,and easy transmission, they have gradually become the main way for people to obtain information on the network. However, there are also hidden dangers. Mainly because the image involves a lot of information, it is easy to be stolen in the transmission of the network, thereby bringing great trouble to people. Due to the rapid development of the network,it is possible for one to collect the digital image information in the network.[1]Therefore,it is extremely important to transmit digital image information over the network to ensure its security. Nowadays, many image protection schemes have been proposed, such as encryption, watermarking, steganography,and other methods.[2–4]For image encryption,designing a safe and effective encryption algorithm has become an inevitable option. Since the classical encryption algorithm does not take into account the inherent characteristics of large data capacity and high redundancy of images,these algorithms are not suitable for image encryption. Chaos is not only a new form of existence in nonlinear dynamic systems, but also closely related to fractals in nonlinear science. It can be said that chaos is the fractal of time, and fractal is the chaos of space.[5–7]In the chaotic image encryption algorithm used cleverly are the initial conditional sensitivity, pseudo-randomness, ergodicity, and reproducibility of the motion law of the chaotic system. These properties can meet the requirements for the security sensitivity characteristics of encryption algorithms.Based on this, many researchers home and abroad have proposed many efficient and secure chaotic image encryption algorithms. Chaos-based image encryption algorithms have become a research hotspot.

    In general, chaotic-based image encryption algorithms mainly include two steps: scrambling of image pixel positions and diffusion of image pixel values. At present,common image scrambling methods cover scrambling methods based on Arnold transform, magic square transform, and baker transform. The baker transformation method is a transformation technique that stretches and folds continuous planar regions.[8]Applying the traditional baker transformation method to the image scrambling, if the number of transformations is unreasonable,it will get a bad scrambling effect. In addition,when the continuous plane area processed by the conventional baker transformation method is too large, there is a disadvantage that the transformation randomness is poor and the transformation time is long. Therefore, this article proposes an improved method of applying the baker transformation to the image scrambling stage. The encrypted image is divided into 16 small blocks on average, and the image is scrambled by using a conventional baker transform method for each block,and the number of transformations is controlled by the chaotic sequence,so that the scrambling effect is more random. In addition,the S-box is a module that plays a central role in a block cipher system, and mainly plays a role of confusion and proliferation. The security strength of the S-box determines the security of the encryption algorithm. Traditional cryptography uses algebraic methods to construct the S-box. Although a high degree of nonlinearity can be obtained, the differential performance is relatively weak due to the simplistic structure and cannot resist algebraic attacks.[9,10]The application of chaotic systems to the design of nonlinear S-box is more effective. Based on this, this paper cites the chaotic S-box designed in Ref.[11]to process the encryption key of the algorithm. Therefore,the main contribution of this paper lies in proposing a new chaotic image encryption algorithm. In the algorithm,the improved baker transformation and chaotic Sbox are utilized. Experimental results prove that the algorithm proposed in this article is more efficient and safer.

    The rest of this article is organized as follows. In Section 2 presented is the initial preparation,describing the theoretical knowledge and chaotic systems used in the algorithm.In Section 3 given is an algorithm description that describes the encryption process of the algorithm and comes with an encryption flowchart. In Section 4 the results of the simulation experiment are provided. Several digital images are selected and the simulation results are presented. In Section 5 analyzed is the security of the algorithm from various attack methods.In Section 6,some conclusions are drawn from the present study and the direction of future work is also suggested.

    2. Initial preparation work

    2.1. Improved baker transformation

    In fact,the baker transformation can produce stretch-like and folding effects in the state space,just like a baker rubbing a piece of dough.Imagine that adding a blue food colorant to the dough,which is repeatedly stretched and folded by the baker,the blue color is evenly mixed in the dough. The stretching and folding mechanisms cause adjacent points to eventually separate in an exponential manner,creating a sensitive dependence on the initial state. Therefore,the baker transformation has chaotic dynamic characteristics,and thus very much suits an image scrambling method.[12]

    In this paper,a baker discrete transformation method for data dot matrix scrambling of digital images is designed and described as follows:

    where the plain imageAM×Npixel value is represented byp(x,y). An example of a traditional baker transformation is shown in Fig.1.

    Fig.1. Traditional baker transformation process of 6×6 matrix.

    It can be seen that there are certain limitations to applying the traditional baker transformation to the image scrambling.On the one hand, when the number of transformations is too small,the visual scrambling effect is not good. In Ref.[12],it was proved experimentally that the original image is unrecognizable when the number of transformations exceeds 4 times;on the other hand, the continuous plane area of processing is very large,and there will be disadvantages such as long timeconsuming and poor randomness of scrambling. Therefore,in this paper the traditional baker transformation is improved to some extent. On the one hand, the original image is divided into multiple blocks,and each small image is separately transformed into a traditional baker, and finally each small image after being scrambled is spliced into a scrambled image.In addition,the number of times the Baker transforms is controlled by the chaotic sequence, so that the number of times of each small image transformation is different,so the scrambling randomness is better.

    2.2. S-box description

    In general, the S-box is also known as the replacement box. It is a nonlinear transformation tool. There are three main methods of constructing the S-box. They are stochastic construction methods,mathematical construction methods,and a combination of the two methods.[13,14]In actual use, it can be considered that the S-box is a Boolean map, and the S-box of sizeM×Nhas the formFM2→FN2,that is,the data of the number of bitsMare input to the S-box,and the data of theNbits are output. TheM-bit data change nonlinearly and can become seemingly randomN-bit data.[15]

    Table 1. 16×16 matrix representation of S-box.

    In addition,applying the chaotic system to the design and generation process of the S-box will achieve more desirable results. Khanet al.[11]proposed a robust S-box construction technique based on the chaotic Lorenz system.This S-box can effectively eliminate the need of using a separate key in the scrambling diffusion structure, and the generated S-box has an ideal nonlinear performance. Simulation experiment analysis shows that the S-box has a good encryption performance.The chaotic S-box discussed in Ref.[11]is cited in this paper,and its compositions are shown in Table 1.

    2.3. Chaotic system

    The one-dimensional logistic mapping is a typical nonlinear iterative equation. The equation is as follows:

    where the logistic mapping system is in a chaotic state when 3.5699<u ≤4,xkrefers to the iterative state value, defined between consecutive real fields from 0 to 1,andx0is the iteration initial value.For a given initial valuex0,the sequence generated under the action of Eq.(2)is aperiodic,non-convergent and sensitive to initial conditions. Because the logistic mapping is a simple nonlinear one-dimensional discrete iterative mapping, it is easy to implement in hardware. So it has become one of the most widely used chaotic maps in digital chaotic systems.[16–18]

    3. Algorithm description

    The encryption algorithm proposed in this paper has the same encryption steps as most of previous algorithms,that is,image processing, scrambling and diffusion of images. Because the security and effectiveness of the proposed algorithm should be strengthened, different encryption keys are used in different image encryption stages. Aiming at the encryption algorithm proposed in this paper,the specific implementation process is presented as follows.

    3.1. Image processing

    The image encryption algorithm proposed in this paper and most of previous algorithms have the same requirements for image sizes,that is,the original encrypted image is in the form of a square matrix.In other words,for a pair of grayscale digital images of sizeM×N,M=Nis required.IfM/=N,the method of zeroing the original image is taken,so that the number of rows and the number of columns of the original image are equal.

    3.2. Scrambling process

    Step 1 Enter the keysa0andu1, and substitute the two into the formula of the logistic chaotic map. The 1000 iterations eliminate the transient effects. After 16 consecutive iterations, the obtained chaotic sequence is recorded asai(i=1,2,...,16). The substitution of a chaotic sequenceaiof length 16 into Eq. (3) yields a one-dimensional sequencea'i(i=1,2,...,16).

    Step 2 The original imagePis divided into 16 subimages according to the rank and column average. The sub-image obtained after the division is recorded aspi(i=1,2,...,16).The baker transformation is performed separately for each small image, and the number of baker transformations is controlled by the one-dimensional sequencea'i.The 16 small images obtained by the baker transformation are sequentially spliced into a large decrypt image,which is recorded asP1.

    Step 3 Similarly,the keysb0andu2are substituted into the formula of the logistic map. The 1000 iterations eliminate the transient effects. After continuing to implementM×Niterations, the obtained chaotic sequence is recorded asbi(i=1,2,...,M×N). And the substitution ofbiinto Eq. (4)yields

    where sort(·) represents the sorting function. Using the sorting function,the corresponding subscript of each value in the sequenceb'in the sequencebis stored as the sequenceD. A scrambled arrangement in whichDis a sequence of integers from 1 toM×Ncan be obtained. The imageP1,from the first pixel point to establishP1itoPDimapping. The positions are exchanged from the first element to the last element one by one. After that, imageP1is converted into imageP2with a size ofM×N.

    At this point, the scrambling process for the encrypted image is completed.

    3.3. Diffusion process

    Step 1 First,enter the keysx0andu3,and substitute the two keys into the logistic chaotic mapping formula. The 1000 iterations eliminate the transient effects. ThenM×Nconsecutive iterations are implemented. The chaotic sequencexi(i=1,2,...,M×N) is obtained and substituted into the following formula:

    whereW=max(M,N). Thus,a one-dimensional sequencex'iis obtained,and the sequence length isM×N.

    Step 2 Let key0=floor(Pmean)+R,where key0refers to an initial key in the encryption process,Pmeanrepresents an average pixel value of the imageP,andRis a given integer. The initial key key0converted from a decimal number to an 8-bit binary number is still denoted as key0.

    Step 3 Take the 3rd to 6th digits of the 8-bit binary number key0and record it as key01. Convert these 4-bit binary numbers into decimal numbers. Then take the first 2 bits and the last 2 bits of the 8-bit binary number key0and record it as key02. Convert these 4-bit binary numbers into decimal numbers. Enter the chaotic S-box for nonlinear transformation.The specific operation is indicated by the following formula:

    Here, the bin2decc(.) function converts binary numbers into decimal numbers. The key is the value obtained by processing the initial key key0into the chaotic S-box. It is a decimal number.

    Step 4 Use the left shift operator. For the decimal number key,the respective loops are shifted leftward by 2 bits and 5 bits. The specific operation is as shown in the following formula:

    Step 5 Expand the two-dimensional image matrixP2with a size ofM×Ninto a one-dimensional vectorAi(i=1,2,...,M×N). Then use the following formula to operate:

    The obtained one-dimensional vectorA'i(i=1,2,...,M×N)is converted into an imageM×Nand referred to asP3.

    Step 6 Enter the keysy0andu4, and substitute the two keys into the logistic chaotic mapping formula. The 1000 iterations eliminate the transient effects. Implement the selectedM×Niterations again. The chaotic sequenceyi(wherei=1,2,...,M×N) is obtained. The chaotic sequenceyiis substituted into the following formula to obtain the processed one-dimensional sequencey'i:

    Fig.2. Flowchart of encryption process.

    Step 7 Convert a one-dimensional sequencey'iinto a twodimensional arrayBwith a size ofM×N. The adjacent-side XOR operation is performed with the encrypted imageP3obtained from the first step of diffusion. The specific description is as follows:

    whereEirefers to thei-th element of imageP3.

    In summary, the diffusion process for the encrypted imageP2ends. And the diffused image is denoted asC.

    Thus,the cipher imageCis obtained.The encryption flow chart of the algorithm is shown in Fig.2.

    4. Results of simulation experiment

    The simulation experiments in this paper are performed with the software Matlab R2017a. The computer configuration used is a 2.80-GHz CPU,8 GB of memory and Microsoft Windows 10 operating system. In order to verify the effectiveness of the above algorithm,in this paper,Lena,Girl,and House gray digital images with a size of 256×256 are selected as the plain images in the simulation experiment.

    Fig.3. Four image encryption/decryption experiment results: (a)Lena,(b)cipher image,(c)decoding image,(d)Girl,(e)cipher image,(f)decoding image,(g)House,(h)cipher image,(i)decoding image,(j)Lena2,(k)cipher image,(l)decoding image.

    The encryption and decryption results of Lena,Girl,and House grayscale images are shown in Fig.3. In addition, the chaotic image encryption algorithm is also suitable for the encryption of color images. We only need to decompose the color image into three grayscale images,and then use the algorithm to encrypt the three grayscale images, and finally combine them into a color cipher map.Experiments are performed using a Lena color image, and the results are still shown in Fig.3.

    5. Security analysis

    5.1. Exhaustive attack analysis

    5.1.1. Key space analysis

    The key is the core of the entire cryptosystem. Usually,the more the parameters and the larger the key space,the higher the difficulty in deciphering is and the more secure the encryption system. The key space analysis in the algorithm is mainly to prevent possible exhaustive attacks.[19,20]The key of this paper is as follows: the chaotic initial value and control parameters of the logistic chaotic mapping formula in the scrambling and diffusion stage of the plain image; and key0,specifically,a0,b0,x0,y0,u1,u2,u3,u4,and key0. If the computing precision of the computer is 10?14, the key space of the algorithm proposed in this paper is 10126. In Refs.[21,22]proposed was the algorithms with key spaces of 1089and 1098respectively. Therefore, the algorithm proposed in this paper has a larger key space value,and this value meets the security requirements of the key space.

    5.1.2. Key sensitivity analysis

    In order to test the sensitivity of the key, the initial valuesx0andy0of the chaotic system are increased by 10?14respectively,with the other keys unchanged. The image is decrypted using the correct key and a slightly altered key. The experimental object is a Lena grayscale image.Figure 4 shows the test results. Figure 4(a) shows that using the correct key for decryption,the original image can be correctly decrypted.Figure 4(b) shows the use of the keyx0=x0+10?14for decryption. Figure 4(c)shows the use of the keyy0=y0+10?14for decryption. It can be clearly observed that the two images obtained by being decrypted with the wrong key have no information containing the original image at all. Therefore,the algorithm is very sensitive to encryption keys and has high confidentiality.

    Fig.4. Key sensitivity test: (a)decrypt with the correct key,(b)decrypt with wrong key,(c)decrypt with wrong key.

    5.2. Statistical attack analysis

    5.2.1. Histogram analysis

    The histogram statistics of the encryption system is mainly the area that reflects the distribution of image pixel values. After the image is encrypted, the image is not recognized after encryption,and its statistical characteristics will also change accordingly. Generally,the histogram distribution of the plain image is concentrated. After processing by the encryption algorithm, the more uniform the pixel value distribution of the cipher image, the more ideal it is. That is,the more uniform the histogram looks, the better the image is.[23–25]Figure 5 shows the histograms of the plain and cipher images of Lena, Girl, and House, respectively. The experimental results show that the pixel values of the plain image are unevenly distributed,and the pixel values of the cipher image obtained by the algorithm are evenly distributed in the whole pixel space,and the pixel gray value appears in a range of [0, 255]. The probabilities are almost equal, and it can be analyzed that it is difficult for an illegal attacker to use the statistical properties of image pixel values to recover the original image.

    Fig.5. Histogram of plain and cipher images: (a)Lena plain histogram,(b)Lena cipher histogram,(c)Girl plain histogram,(d)Girl cipher histogram,(e)House plain histogram,(f)House cipher histogram.

    5.2.2. Adjacent pixel correlation analysis

    The high correlation of adjacent pixels of an image is an essential feature of digital images. In order to resist the statistical attacks,the correlation of adjacent pixels must be reduced,and the smaller the correlation coefficient,the better the encryption performance is.[26,27]In order to analyze the correlation of adjacent pixels, taking the Girl gray image for example, 104pixel points are randomly selected for correlation analysis. Their correlation coefficients are calculated according to Eqs. (11) and(12).[28]Table 2 shows the correlation coefficients of the three grayscale images in three directions before and after encryption.Figures 6(a), 6(c), and 6(e) show the distribution of adjacent pixel correlations of the plain image of Girl in three directions.Figures 6(b),6(d),and 6(f)show the adjacent pixel correlation distributions of the cipher image of Girl in three directions.

    Table 2. Correlation of adjacent pixels.

    Fig.6. Adjacent pixel correlation between pre-encrypted and encrypted images: (a)horizontal correlation of Girl image,(b)horizontal correlation of cipher,(c)vertical correlation of Girl image,(d)vertical correlation of cipher,(e)diagonal correlation of Girl image,(f)diagonal correlation of cipher.

    Table 3. Comparisons among correlation coefficients of images.

    In addition,in Table 3 the gray-scale image Lena is taken for example,and the experimental results of its adjacent pixel correlation with other algorithms are compared. All experimental results prove that the cipher image correlation is greatly reduced after encryption by the algorithm,which can better resist statistical attacks based on correlation analysis.

    where

    5.2.3. Information entropy

    In this subsection the information entropy analysis in security analysis is conducted. It is a measure of the order of information. The closer to a uniform distribution the probability distribution of image pixel values, the larger the information entropy is and the smaller the information entropy. In particular,When there is a probability that the pixel values are equal, the image information is the largest.[31,32]The image information entropy is given by Eq.(13). In Table 4 listed are the information entropy of the plain and cipher maps of the three grayscale images. The experimental results show that the information entropy of each plain image is significantly different from the theoretical value,and all pixel values of the cipher image appear with almost equal probability. In Table 5 the gray-scale image Lena is taken for example to compare the results of the information entropy experiment with those from other algorithms. This proves that the algorithm proposed in this paper is effective.

    Table 4. Information entropy of plain images and cipher images.

    Table 5. Comparison among results of information entropy.

    5.3. Cropping attack analysis

    Cropping attack is also a common attack method for an attack to image encryption,launched exerted by an illegal attacker.[33]Therefore, in order to test the resistance of the image encryption algorithm to the cropping attack, proposed in this paper, the cipher graph of the experimental object House in four degrees is cut, then the correct encryption key is input to execute the decryption program, and the decrypted image is observed. Figure 7 shows the experimental results. It can be seen that even if the cipher image is cropped by 1/2 degrees, the plain image can still be recognized after being correctly decrypted. Therefore,the chaotic image encryption algorithm proposed in this paper possesses a certain resistance to cropping attacks.

    Fig.7. Recovery after tailoing attacke at different degrees: (a)1/16-degree cropping and decrypting image,(b)1/8-degree cropping and decrypting image,(c)1/4-degree cropping and decrypting image,(d)1/2-degree cropping and decrypting image.

    5.4. Noise attack analysis

    In a real-time transmission channel,there is often noise that affects the plain image. Noise attacks are also a way to verify the robustness of cryptosystems.[34–36]In order to evaluate the ability of the encryption algorithm to resist noise in this paper,different salt and pepper noise are added to the House cipher image,and the correct key is used for decryption. The experimental results are shown in Fig. 8. The experimental results show that the encryption algorithm of this paper has better resistance to noise attacks.

    Fig.8. Cipher image adds different degrees of noise and corresponding decryption maps: (a)cipher and decrypted image with noise intensity of 0.01,(b)cipher and decrypted image with noise intensity of 0.05, (c)cipher and decrypted image with noise intensity of 0.1.

    6. Conclusions

    In this work, a new image encryption algorithm is proposed. It is based on an improved baker transform and chaos S-box. In the image scrambling phase, the plain image is manipulated primarily using an improved baker transform method. On the other hand, in the image diffusion stage, the chaotic S-box is referenced and the initial key is processed.It also performs XOR operations on image, key, and chaotic sequences. The experimental results and security analysis prove that the digital image encryption algorithm proposed in this paper is effective in resisting multiple attacks; in other words, the image encryption algorithm proposed in this paper is highly secure and excellent encrypted randomness. In addition,in the future direction of work,we can not only starting from the existing encryption methods,improve or propose new encryption methods for chaotic image encryption,but also starting from the chaotic system, improve or propose a more efficient chaotic system, which can be applied to the image encryption algorithms.

    猜你喜歡
    興元
    Lossless embedding: A visually meaningful image encryption algorithm based on hyperchaos and compressive sensing
    情系鄉(xiāng)村振興的最美老干部——艾興元
    An image encryption algorithm based on spatiotemporal chaos and middle order traversal of a binary tree
    Synchronously scrambled diffuse image encryption method based on a new cosine chaotic map
    Force-constant-decayed anisotropic network model: An improved method for predicting RNA flexibility
    Molecular dynamics simulations on the wet/dry self-latching and electric fields triggered wet/dry transitions between nanosheets:A non-volatile memory nanostructure
    A secure image protection algorithm by steganography and encryption using the 2D-TSCC*
    Fractal sorting vector-based least significant bit chaotic permutation for image encryption?
    Tip-induced superconductivity commonly existing in the family of transition-metal dipnictides MPn2*
    鳳凰淚
    金沙江文藝(2018年1期)2018-11-14 02:09:33
    男女视频在线观看网站免费| 中文字幕av在线有码专区| www.www免费av| 91在线精品国自产拍蜜月| 国产亚洲精品久久久久久毛片| 成人国产一区最新在线观看| 日本五十路高清| 亚洲精品亚洲一区二区| 精品人妻熟女av久视频| 午夜福利在线观看吧| 欧美zozozo另类| 国产亚洲av嫩草精品影院| 一个人观看的视频www高清免费观看| 色播亚洲综合网| 99在线人妻在线中文字幕| 性色av乱码一区二区三区2| 国产欧美日韩精品亚洲av| 国产免费av片在线观看野外av| 国产精品影院久久| 在线观看av片永久免费下载| 免费一级毛片在线播放高清视频| 日韩亚洲欧美综合| av黄色大香蕉| 亚洲人成电影免费在线| 中出人妻视频一区二区| 精品人妻一区二区三区麻豆 | 性插视频无遮挡在线免费观看| 久久午夜福利片| 成人无遮挡网站| 色播亚洲综合网| 国产精品久久视频播放| 国产欧美日韩一区二区精品| 18禁裸乳无遮挡免费网站照片| 久久久久九九精品影院| 国产美女午夜福利| 热99re8久久精品国产| 在线看三级毛片| 久久伊人香网站| 欧美色视频一区免费| 一级作爱视频免费观看| 一级作爱视频免费观看| 午夜激情福利司机影院| 久久久久性生活片| 日韩欧美国产在线观看| 精品一区二区三区av网在线观看| 免费观看精品视频网站| 亚洲美女搞黄在线观看 | 久久久久久久亚洲中文字幕 | 国产私拍福利视频在线观看| 国产精品一及| 日本免费a在线| 听说在线观看完整版免费高清| 欧美性猛交╳xxx乱大交人| 偷拍熟女少妇极品色| 超碰av人人做人人爽久久| 女人十人毛片免费观看3o分钟| 欧美成人a在线观看| 嫁个100分男人电影在线观看| 最近最新免费中文字幕在线| 波多野结衣高清无吗| 国产欧美日韩精品亚洲av| 真人一进一出gif抽搐免费| 日本一本二区三区精品| 亚洲一区二区三区色噜噜| 亚洲成人中文字幕在线播放| 男女视频在线观看网站免费| 亚洲人成网站在线播| 少妇熟女aⅴ在线视频| 精华霜和精华液先用哪个| 在线观看美女被高潮喷水网站 | 精品一区二区三区视频在线观看免费| 日韩欧美一区二区三区在线观看| 给我免费播放毛片高清在线观看| 成人欧美大片| 村上凉子中文字幕在线| 乱人视频在线观看| 免费看日本二区| 日日摸夜夜添夜夜添av毛片 | 99在线人妻在线中文字幕| 成人av在线播放网站| 99精品在免费线老司机午夜| 午夜福利在线观看免费完整高清在 | 国产精品嫩草影院av在线观看 | 国产亚洲精品av在线| 99国产极品粉嫩在线观看| 俄罗斯特黄特色一大片| 欧美成人免费av一区二区三区| 亚洲欧美日韩东京热| 婷婷色综合大香蕉| 久久久久久久精品吃奶| 又爽又黄a免费视频| 三级男女做爰猛烈吃奶摸视频| 久久这里只有精品中国| 久久久久九九精品影院| 国产av麻豆久久久久久久| 国产乱人视频| av在线天堂中文字幕| 欧美3d第一页| 日本成人三级电影网站| www.999成人在线观看| 久9热在线精品视频| 可以在线观看毛片的网站| 欧美一区二区精品小视频在线| 色哟哟·www| 非洲黑人性xxxx精品又粗又长| 91九色精品人成在线观看| 日韩欧美精品v在线| 精品免费久久久久久久清纯| 乱码一卡2卡4卡精品| 国产精品久久久久久久电影| 久久精品影院6| 狂野欧美白嫩少妇大欣赏| 国产精品人妻久久久久久| 欧美+亚洲+日韩+国产| 俄罗斯特黄特色一大片| 亚洲精品乱码久久久v下载方式| 欧美日韩瑟瑟在线播放| 久久中文看片网| 十八禁人妻一区二区| 国产色爽女视频免费观看| 人妻夜夜爽99麻豆av| 女生性感内裤真人,穿戴方法视频| 国内精品久久久久久久电影| 成年版毛片免费区| 亚洲自偷自拍三级| 少妇人妻精品综合一区二区 | 亚洲av成人av| 精品无人区乱码1区二区| 欧美乱色亚洲激情| 草草在线视频免费看| 99久久无色码亚洲精品果冻| 成人一区二区视频在线观看| 午夜福利在线在线| 99国产精品一区二区蜜桃av| 淫妇啪啪啪对白视频| 麻豆久久精品国产亚洲av| 精品久久国产蜜桃| 亚洲成人久久爱视频| 国产精品不卡视频一区二区 | 国产色爽女视频免费观看| 人妻夜夜爽99麻豆av| 国产精品爽爽va在线观看网站| 又爽又黄无遮挡网站| 一本综合久久免费| 久久精品人妻少妇| 熟女人妻精品中文字幕| 又紧又爽又黄一区二区| 亚洲av成人不卡在线观看播放网| 国产成+人综合+亚洲专区| 亚洲电影在线观看av| 少妇人妻一区二区三区视频| 搡女人真爽免费视频火全软件 | 欧美日韩中文字幕国产精品一区二区三区| 日日干狠狠操夜夜爽| 久久久色成人| 久久国产精品人妻蜜桃| 免费观看的影片在线观看| 免费看日本二区| 成熟少妇高潮喷水视频| 夜夜躁狠狠躁天天躁| 女人被狂操c到高潮| 蜜桃久久精品国产亚洲av| 91九色精品人成在线观看| 日韩欧美 国产精品| 香蕉av资源在线| 制服丝袜大香蕉在线| 变态另类丝袜制服| 国产成人影院久久av| av视频在线观看入口| 首页视频小说图片口味搜索| 老师上课跳d突然被开到最大视频 久久午夜综合久久蜜桃 | 午夜福利欧美成人| 亚洲狠狠婷婷综合久久图片| 一边摸一边抽搐一进一小说| 小蜜桃在线观看免费完整版高清| 欧美不卡视频在线免费观看| 国产高潮美女av| 我的女老师完整版在线观看| av视频在线观看入口| 欧美性猛交╳xxx乱大交人| 精品人妻熟女av久视频| 一区二区三区四区激情视频 | 日韩精品青青久久久久久| 精品一区二区三区人妻视频| eeuss影院久久| 国内揄拍国产精品人妻在线| 精品乱码久久久久久99久播| 淫秽高清视频在线观看| 琪琪午夜伦伦电影理论片6080| 嫩草影院精品99| 99精品久久久久人妻精品| 色av中文字幕| 亚洲成av人片在线播放无| 国产午夜精品论理片| 国产极品精品免费视频能看的| 男女下面进入的视频免费午夜| 午夜精品在线福利| 韩国av一区二区三区四区| 草草在线视频免费看| 精品一区二区三区视频在线| 亚洲av二区三区四区| 哪里可以看免费的av片| 亚洲男人的天堂狠狠| 免费在线观看影片大全网站| 天天躁日日操中文字幕| 国产亚洲精品av在线| 丰满的人妻完整版| 国产亚洲欧美98| 一个人看的www免费观看视频| 亚洲av.av天堂| 亚洲人与动物交配视频| 国产黄片美女视频| 亚洲狠狠婷婷综合久久图片| 午夜精品一区二区三区免费看| 亚洲国产精品999在线| 亚洲成av人片免费观看| 婷婷亚洲欧美| 欧美性感艳星| 日日摸夜夜添夜夜添小说| 男女下面进入的视频免费午夜| 成人av在线播放网站| 日韩精品中文字幕看吧| 国产亚洲欧美在线一区二区| 精品99又大又爽又粗少妇毛片 | 女生性感内裤真人,穿戴方法视频| 亚洲av电影不卡..在线观看| av在线观看视频网站免费| 18禁裸乳无遮挡免费网站照片| 韩国av一区二区三区四区| 久久中文看片网| 首页视频小说图片口味搜索| 中文字幕av成人在线电影| 男女视频在线观看网站免费| 久久久久免费精品人妻一区二区| 国产国拍精品亚洲av在线观看| 老司机福利观看| 国产乱人视频| 亚洲欧美日韩高清专用| 国产白丝娇喘喷水9色精品| 国产一区二区激情短视频| 亚洲国产精品久久男人天堂| 少妇人妻一区二区三区视频| 国产中年淑女户外野战色| 日本成人三级电影网站| a级毛片免费高清观看在线播放| 精品久久久久久成人av| 午夜福利在线在线| 国产淫片久久久久久久久 | 久久久精品欧美日韩精品| www.熟女人妻精品国产| 日韩欧美精品v在线| 国产精品嫩草影院av在线观看 | 精品一区二区三区人妻视频| 午夜老司机福利剧场| 成人永久免费在线观看视频| 长腿黑丝高跟| 久久久久精品国产欧美久久久| 自拍偷自拍亚洲精品老妇| 亚洲五月婷婷丁香| 久久久久久久久久成人| 变态另类丝袜制服| av在线老鸭窝| 久久99热这里只有精品18| 97超级碰碰碰精品色视频在线观看| 欧美三级亚洲精品| 午夜福利在线观看吧| 一本综合久久免费| 90打野战视频偷拍视频| 成人欧美大片| 天堂动漫精品| 精品人妻一区二区三区麻豆 | 好看av亚洲va欧美ⅴa在| 亚洲av美国av| 色尼玛亚洲综合影院| 国产精品久久久久久亚洲av鲁大| 国产人妻一区二区三区在| av福利片在线观看| 我要看日韩黄色一级片| 国产欧美日韩精品一区二区| 亚洲av成人av| 淫妇啪啪啪对白视频| 国产高清激情床上av| 老司机午夜十八禁免费视频| 亚洲成人久久性| 中国美女看黄片| 日本熟妇午夜| 欧美日韩乱码在线| 色5月婷婷丁香| 国产免费av片在线观看野外av| av女优亚洲男人天堂| 老熟妇乱子伦视频在线观看| av视频在线观看入口| 国产亚洲精品综合一区在线观看| 99在线人妻在线中文字幕| 成人亚洲精品av一区二区| 此物有八面人人有两片| 国产欧美日韩一区二区精品| 不卡一级毛片| 日韩高清综合在线| 在线观看66精品国产| а√天堂www在线а√下载| 看黄色毛片网站| 天堂动漫精品| 精品久久久久久久久久久久久| 成人三级黄色视频| 欧美丝袜亚洲另类 | 天堂动漫精品| 国产又黄又爽又无遮挡在线| 一区福利在线观看| 亚洲久久久久久中文字幕| 亚洲自拍偷在线| bbb黄色大片| 身体一侧抽搐| 一本久久中文字幕| 小说图片视频综合网站| 97热精品久久久久久| 国产精品国产高清国产av| 我要搜黄色片| 国产免费男女视频| 欧美一区二区亚洲| 亚洲一区二区三区不卡视频| 最近视频中文字幕2019在线8| 日韩大尺度精品在线看网址| 波多野结衣高清作品| 乱码一卡2卡4卡精品| 热99在线观看视频| 色尼玛亚洲综合影院| 欧美在线黄色| 精品日产1卡2卡| 久久人人精品亚洲av| 午夜激情福利司机影院| 男人舔奶头视频| av女优亚洲男人天堂| 精品一区二区三区视频在线观看免费| 男插女下体视频免费在线播放| 波野结衣二区三区在线| 老鸭窝网址在线观看| 少妇熟女aⅴ在线视频| 免费大片18禁| 免费看光身美女| or卡值多少钱| 在线播放无遮挡| 色综合站精品国产| 欧美高清成人免费视频www| 国产国拍精品亚洲av在线观看| 国产精品一区二区免费欧美| 五月玫瑰六月丁香| 免费在线观看日本一区| АⅤ资源中文在线天堂| 99久久精品一区二区三区| 天堂√8在线中文| 亚洲av成人精品一区久久| 宅男免费午夜| 久久久久久久亚洲中文字幕 | 波多野结衣巨乳人妻| 精品久久久久久久久av| 国产精品野战在线观看| 国产精品爽爽va在线观看网站| 天堂av国产一区二区熟女人妻| 长腿黑丝高跟| 免费观看精品视频网站| 99在线人妻在线中文字幕| 国产色爽女视频免费观看| 我的女老师完整版在线观看| 久久人妻av系列| 99久久精品热视频| 欧美日韩亚洲国产一区二区在线观看| 五月伊人婷婷丁香| 欧美日韩亚洲国产一区二区在线观看| 少妇被粗大猛烈的视频| 99热这里只有精品一区| 久久精品夜夜夜夜夜久久蜜豆| 久久久国产成人精品二区| 亚洲av成人不卡在线观看播放网| aaaaa片日本免费| 好男人电影高清在线观看| 99精品久久久久人妻精品| 成人av一区二区三区在线看| 午夜激情福利司机影院| 波多野结衣高清无吗| 国内精品久久久久久久电影| 久久国产乱子伦精品免费另类| 三级毛片av免费| 国产乱人视频| 两人在一起打扑克的视频| 97碰自拍视频| aaaaa片日本免费| 国产精品久久久久久亚洲av鲁大| 很黄的视频免费| 99国产极品粉嫩在线观看| 国产日本99.免费观看| av中文乱码字幕在线| 国产亚洲欧美98| 少妇人妻一区二区三区视频| 99热这里只有精品一区| 国产91精品成人一区二区三区| 一本精品99久久精品77| 欧美黑人欧美精品刺激| av黄色大香蕉| 久久人人爽人人爽人人片va | 一进一出好大好爽视频| 十八禁国产超污无遮挡网站| 少妇的逼好多水| 国产伦精品一区二区三区四那| 成人特级av手机在线观看| 赤兔流量卡办理| 国产一区二区三区在线臀色熟女| 色5月婷婷丁香| 性色av乱码一区二区三区2| 黄色配什么色好看| 在线观看午夜福利视频| 日本黄大片高清| 国产人妻一区二区三区在| 亚洲精品亚洲一区二区| 国产单亲对白刺激| 亚洲美女视频黄频| 真实男女啪啪啪动态图| 免费高清视频大片| 午夜免费男女啪啪视频观看 | 国产国拍精品亚洲av在线观看| 丁香六月欧美| 国产精品精品国产色婷婷| 欧美绝顶高潮抽搐喷水| 色精品久久人妻99蜜桃| 人妻夜夜爽99麻豆av| 国产精品美女特级片免费视频播放器| 亚洲精品在线观看二区| 中出人妻视频一区二区| 亚洲综合色惰| 怎么达到女性高潮| 亚洲av电影在线进入| 国产熟女xx| 亚洲性夜色夜夜综合| 国产免费男女视频| 色精品久久人妻99蜜桃| av在线蜜桃| 简卡轻食公司| 久久国产乱子伦精品免费另类| 欧美日韩亚洲国产一区二区在线观看| 国产私拍福利视频在线观看| 亚洲第一欧美日韩一区二区三区| 婷婷色综合大香蕉| 国产大屁股一区二区在线视频| 88av欧美| 9191精品国产免费久久| 免费人成视频x8x8入口观看| 亚洲 欧美 日韩 在线 免费| 美女 人体艺术 gogo| 欧美日本亚洲视频在线播放| 国产成人啪精品午夜网站| 丰满人妻一区二区三区视频av| 看免费av毛片| 超碰av人人做人人爽久久| 白带黄色成豆腐渣| 一本久久中文字幕| 成人国产一区最新在线观看| 性欧美人与动物交配| 午夜福利欧美成人| 99热这里只有是精品50| 国产精品爽爽va在线观看网站| 免费看光身美女| 国模一区二区三区四区视频| 国产精品一区二区性色av| 欧美日韩福利视频一区二区| 成人三级黄色视频| 国产aⅴ精品一区二区三区波| 99在线人妻在线中文字幕| 91九色精品人成在线观看| 女人十人毛片免费观看3o分钟| 亚洲色图av天堂| 久久久久九九精品影院| 91字幕亚洲| 女人被狂操c到高潮| 黄色女人牲交| 亚洲欧美日韩高清在线视频| 又黄又爽又刺激的免费视频.| 国产国拍精品亚洲av在线观看| 麻豆一二三区av精品| or卡值多少钱| 亚洲av二区三区四区| 日韩亚洲欧美综合| 国产午夜精品久久久久久一区二区三区 | 熟妇人妻久久中文字幕3abv| 中亚洲国语对白在线视频| 色哟哟哟哟哟哟| 国内精品久久久久久久电影| 草草在线视频免费看| 淫妇啪啪啪对白视频| 最近视频中文字幕2019在线8| 欧美不卡视频在线免费观看| 久9热在线精品视频| 人人妻人人澡欧美一区二区| 欧美成人免费av一区二区三区| 亚洲,欧美精品.| 国产精品人妻久久久久久| 日韩av在线大香蕉| 国产高清视频在线播放一区| 女人被狂操c到高潮| 3wmmmm亚洲av在线观看| 欧美一级a爱片免费观看看| 久久精品综合一区二区三区| 黄色配什么色好看| 午夜福利视频1000在线观看| 神马国产精品三级电影在线观看| 亚洲国产精品久久男人天堂| 成年女人永久免费观看视频| 黄色一级大片看看| 麻豆成人午夜福利视频| 色在线成人网| 99久久成人亚洲精品观看| 香蕉av资源在线| 国产久久久一区二区三区| 亚洲熟妇熟女久久| 757午夜福利合集在线观看| 亚洲成av人片免费观看| 亚洲精品在线观看二区| 99久久成人亚洲精品观看| 色综合站精品国产| 一个人看的www免费观看视频| 别揉我奶头~嗯~啊~动态视频| 一级a爱片免费观看的视频| 国产成人a区在线观看| 欧美性感艳星| 一区二区三区激情视频| 99久久精品国产亚洲精品| 99久久精品热视频| 人人妻人人看人人澡| 欧美成人a在线观看| 久久热精品热| 亚洲美女搞黄在线观看 | 欧美午夜高清在线| 在线国产一区二区在线| 国产精品久久视频播放| 久久久久亚洲av毛片大全| 亚洲不卡免费看| 久久精品综合一区二区三区| 婷婷精品国产亚洲av| 亚洲人成电影免费在线| 日本 av在线| 美女被艹到高潮喷水动态| 国产高清有码在线观看视频| 国内精品美女久久久久久| 首页视频小说图片口味搜索| 国产成年人精品一区二区| 搞女人的毛片| 亚洲最大成人手机在线| 97人妻精品一区二区三区麻豆| 国产大屁股一区二区在线视频| av在线天堂中文字幕| 日本黄色视频三级网站网址| 欧美中文日本在线观看视频| 亚洲av免费在线观看| 内射极品少妇av片p| 日本一二三区视频观看| 日本与韩国留学比较| 国产大屁股一区二区在线视频| 18禁在线播放成人免费| 国产午夜福利久久久久久| 又爽又黄无遮挡网站| www.999成人在线观看| 人妻制服诱惑在线中文字幕| 成人性生交大片免费视频hd| 精品国产三级普通话版| 18+在线观看网站| 最后的刺客免费高清国语| 午夜影院日韩av| 亚洲在线观看片| 女人十人毛片免费观看3o分钟| 国内少妇人妻偷人精品xxx网站| 亚洲国产精品久久男人天堂| 嫩草影院精品99| 亚洲 欧美 日韩 在线 免费| 国产精品久久久久久久久免 | 国产 一区 欧美 日韩| 日本免费a在线| 99久久久亚洲精品蜜臀av| 亚洲欧美精品综合久久99| 精品久久国产蜜桃| av天堂中文字幕网| 日本撒尿小便嘘嘘汇集6| 深夜精品福利| 欧美精品啪啪一区二区三区| 午夜精品久久久久久毛片777| 久久这里只有精品中国| 中文字幕高清在线视频| 18禁裸乳无遮挡免费网站照片| 国产真实伦视频高清在线观看 | 欧美日韩综合久久久久久 | 午夜久久久久精精品| 深爱激情五月婷婷| 亚洲一区二区三区色噜噜| 亚洲人成网站在线播| 丰满乱子伦码专区| 小说图片视频综合网站| 一级av片app| 成年女人永久免费观看视频| 精品不卡国产一区二区三区| 一级av片app| 少妇的逼好多水| 麻豆成人av在线观看| 桃色一区二区三区在线观看| 天堂动漫精品| 老熟妇乱子伦视频在线观看| 一级黄片播放器| 我的女老师完整版在线观看| 麻豆一二三区av精品| 岛国在线免费视频观看| 久久精品91蜜桃| 亚洲av电影不卡..在线观看| 嫩草影院精品99| 麻豆久久精品国产亚洲av| 在线播放国产精品三级| 18禁在线播放成人免费| 国产高清视频在线播放一区| 午夜久久久久精精品|