• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Fractal sorting vector-based least significant bit chaotic permutation for image encryption?

    2021-06-26 03:03:34YongJinXian咸永錦XingYuanWang王興元YingQianZhang張盈謙
    Chinese Physics B 2021年6期
    關(guān)鍵詞:興元

    Yong-Jin Xian(咸永錦) Xing-Yuan Wang(王興元) Ying-Qian Zhang(張盈謙)

    Xiao-Yu Wang(王曉雨)1, and Xiao-Hui Du(杜曉慧)1

    1School of Information Science and Technology,Dalian Maritime University,Dalian 116026,China

    2School of Information Science and Technology,Xiamen University Tan Kah Kee College,Zhangzhou 363105,China

    Keywords: chaotic image encryption, fractal sorting vector, bit-level permutation, FSV-based LSB chaotic

    1. Introduction

    Research on image security has gained widespread publicity in recent years.[1–4]With the development of cryptography as an important image authentication tool,image encryption has attracted a great deal of attention.[5,6]The researchers incorporated the chaos technique into image encryption and provided several useful chaotic image encryption studies.[7–17]

    Image encryption algorithm based on chaos consists of pixel scrambling and pixel diffusion within the context of the cryptanalysis image encryption scheme of Fridrich.[18]In the design of chaotic image encryption algorithms, bit-level permutation simultaneously realized the pixel uncertainty and pixel diffusion,which enhances the security of image encryption algorithm.[19–22]In Ref. [23], the original image was divided into 8 binary images,then the 8 binary images were encrypted respectively, and then synthesized into a gray-scale encrypted image. In Refs.[24,25],a bit-level permutation approach was implemented to color the image encryption. The pixel-based bit exchange could exert a certain encryption effect,but it would do better with bit-level scrambling based on bit planes. In Ref.[26],the bit in the pixel was scrambled into its neighboring pixel,so that the direction of the bit varied between each plane. In Ref.[27],by applying rank and column encryption to each binary bit plane,the image algorithm realized the bit-level permutation. In Ref.[28],the 8 bits of each pixel were split into the four most important bits on the left and the four least significant bits on the right. The LSBs were independently encrypted. In Ref. [29], the right four bits of each pixel were scrambled separately, while the left four bits were encrypted as a whole part. In Ref.[30],the bit positions of the image’s LSB planes were scrambled, and thus leaving the other planes on the left unchanged.

    By analyzing the above-mentioned bit-level permutation methods, they can be divided into two categories: bit permutation on all bit planes and bit permutation on least significant bit planes. The bit permutation on LSB planes does not scramble all bits,while the result is almost the same as that on all planes. The normal LSB-based bit-level image encryption method only performs independent bit scrambling in each bit plane.There is no bit position conversion between bit layers in the process of scrambling. Therefore,there is also more space for progress in the encryption effect obtained by the present chaotic image encryption methods based on bit permutation on LSB planes. To solve these problems,a novel LSB chaotic permutation based on FSV is proposed to exchange all necessary bit positions of the image. The proposed method changes the bit positions of the four different planes of the LSB of the image and reduces the information about the relation among the four LSB planes that contain the main information about the image. The proposed bit-level permutation can not only increase the range of pixel values changed by bit permutation,but also improve the ability to resist cryptanalysis with the application of chaotic systems. It is worth noting that the iteratively generated FSV will enhance the algorithm’s encryption performance to some degree.

    The rest of this article is structured as follows. The basic principles and iterative algorithm of FSV,and chaotic LSB permutation based on FSV,are given in detail in Section 2. In Section 3, the FSV-LSBCP based image encryption and decryption algorithms are presented. In Section 4, the experimental results are discussed. Finally, some conclusions are drawn from the present study in Section 5.

    2. Proposed methods

    Inspired by Refs.[31–37],we introduce a new vector with fractal properties in order and analyze its characteristics in the application of image encryption in this section.

    2.1. Basic concepts of FSV

    Definition 1 A vectorV={v1,v2,...,vn} ∈R1×nis called a sorting vector if the elements in the vector are composed of positive integers 1,2,...,Nand the element values at any two different positions are different. In other words,Vis a sorting vector such that any of the following statements holds true:

    Based on Definition 1, we define a class of vector with properties similar to the fractals as follows.

    Definition 2 Sorting vectorV={v1,v2,...,vn}∈R1×nis called fractal sorting vector(FSV),if there are the following properties:

    1) the distribution of elements in the vector is overall irregular;

    2) the ordering of elements in each sub-vector with the same length is self-similar;

    3) vectorVcan be generated by iteration.

    2.2. Iterative algorithm of FSV

    According to the definitions above, we give a class of fractal sorting vector construction method based on addition and multiplication between vector and number as follows.

    Based on any initial vectorV[1]∈R1×l(V[1]), wherel(V)represents the length of the vectorV,we iterate it according to the following steps to obtain FSVV?.

    Step 1 Calculate the iteration vectorV[2]according to the following iteration rules:

    whereV{i}represents the i-th sub-vector ofV, andV(i) denotes the i-th element ofV.

    Step 2 Repeat the following general term formulas to obtain the higher-order FSV,V[n].

    Step 3 Obtain an FSVV?of any length from the following equation:

    whereV[m]is a generated FSV calculated from steps 1 and 2,andl(V[m])≥l(V?).

    Through the above steps, we can obtain the FSVV?of any length,by combining the actual needs and the appropriate number of iterations. The relationship between FSV and the initial iteration vector can be expressed as a function:

    Based on these steps,we propose the pseudo-code to implement the iterative calculation of FSV as shown in Table 1.

    Table 1. Pseudo-code of algorithm for FSV.

    2.3. FSV based LSB chaotic permutation

    The least significant bit of the image covers most of the information,[28]and the eight binary planes of peppers are shown in Fig. 1. The human eyes can clearly distinguish the information among the first four planes,but nothing from the last four. The information weight of the eight binary planes and their cumulative rates are shown in Table 2. The right four bits cumulatively contain 94.12%of the information. Processing the right four bits can be applied to the image encryption to improve the efficiency of the algorithm while ensuring security.

    Fig.1. Eight binary planes of peppers: (a)8th,(b)7th,(c)6th,(d)5th,(e)4th,(f)3rd,(g)2nd,(h)1st.

    Table 2. Information weights of bit planes.

    Based on FSV and LSB permutation,a novel FSV-based LSB chaotic permutation method is proposed as follows.

    Step 1 Represent each pixel in grayscale image into 8 bits. And use a tensorTSto represent the image represented by the bit.

    Step 2 Denote the 8 layers of the tensor asP8,P7,P6,P5,P4,P3,P2,P1in sequence, whereP8is a binary image composed of the highest bit andP1is a binary image consisting of the lowest bit.

    Step 3 Press the upper left, upper right, lower left, and lower right sub-block positions to composeP8,P7,P6,P5into a binary imagePLSB.

    Step 4 Exchange the position of each bit inPLSBby the permutation vectors of the FSV and the ascending chaotic sequence index,successively.

    Step 5 Split the new permuted binary imageP?LSBobtained in Step 4 intoP?8,P?7,P?6,P?5according to the sub-block positions in Step 3.

    Step 6 RestoreP?8,P?7,P?6,P?5,P4,P3,P2,P1to a new grayscale image.

    With the above six steps,the FSV-based LSB shaotic permutation of the image is realized. For better understanding,the flow chart is shown in Fig.2.

    Fig.2. Process of FSV-based LSB chaotic permutation.

    3. Image encryption algorithm based on FSVLSBCP

    3.1. Two-dimensional chaotic system

    In many chaotic systems,the Henon map has simple operations and can generate two chaotic sequences.And the Henon map is defined as[38]

    wherea=1.4 andb=0.3 make the map reach a chaotic state.The application of the Henon map can make the image encryption method more difficult to predict and efficient to operate.

    3.2. Encryption method

    Image encryption method based on FSV-LSBCP is introduced in detail step by step in this subsection. Due to the flexibility of the proposed FSV construction algorithm, the proposed encryption algorithm,which is suitable to the images of any size and shape,mainly consists of six steps as follows.

    Step 1 Read the plaintext image into the computer and mark it asP.

    Step 2 Obtain an FSV of the appropriate length according to the proposed construction algorithm.

    Step 3 Generate a 128-bit character stringΛby using SHA-512 fromP, and convertΛinto 3 decimalsK=[k1, k2, k3]as follows:

    Step 4 Obtain the appropriate length chaotic sequencesC1andC2by Henon map with the parameters [k'1, k'2, k3],wherek3is the length of the deleted sequence to ensure chaotic state,whilek'1andk'2are the initial parameters of chaotic system. Setting private key[k4, k5],the parameters of the generated chaotic sequence are calculated as follows:

    where mod(,)is the remainder function,and[k4, k5]is the private keystream.

    Step 5 PermutatePintoP'by FSV-LSBCP according to the FSV and the chaotic sequenceC1.

    Step 6 Diffuse re-segmented imageP'withC2by using the method shown below and denote the diffused image asP''=[p''(i)]:

    where⊕denotes XOR operation,andis the round-up function.

    The ciphertext image is obtained by using the above six steps. The key sequence consists of [k1,k2,k3,k4,k5], which are used for both image encryption and decryption. For easy understanding,flow charts and examples of the above basis are shown in Figs.3 and 4,respectively.

    Fig.3. Flow chart of encryption algorithm based on FSV-LSBCP.

    Remark 1 When the parameters of Eq. (6) are determined, different initial values can obtain different pseudorandom sequences after the same iteration. Thek'1andk'2calculated from Eq.(10)are used as the initial values of Eq.(6),that is,x0=k'1andy0=k'2. Then the pseudo-random sequences generated byk'1andk'2can be obtained. The lengths of these two sequences are determined by the size of the image. At the same time, to avoid the unsatisfactory pseudorandomness caused by the system in the front part of the sequence not entering the mixed state, the firstk3elements of each sequence are deleted andk3elements are iterated and converged at the end. The resulting pseudo-random sequences conform to the size of the image and can be well applied to encryption algorithms.

    Remark 2 The hexadecimal sequence obtained by SHA-512,after the calculation of Eqs.(7)–(9)can obtaink1,k2,k3.These three keys are used as the keys generated by the plaintext image, which can make the encryption algorithm have good resistance to brute force attacks. The subjectively set keysk4andk5can effectively improve the ability of the encryption algorithm to resist the selected plaintext attacks. This key design method guarantees the comprehensive security of the algorithm. At the same time, the keys pass through a secure channel to avoid the possibility of the keys being stolen,thereby ensuring the security of ciphertext information in the key management.

    3.3. Decryption algorithm

    Using inverse transformation, the decryption and corresponding experimental test can be completed by using the key sequence provided in the encryption algorithm.

    Step 1 Read the encrypted image into the computer. Call the image matrixPE=[pe(i)].

    Step 2. Obtain an FSV of the appropriate length according to the proposed construction algorithm.

    Step 3. Obtain the chaotic sequencesC1andC2by using the previously described system and processing method with the group key[k1,k2,k3,k4,k5].

    Step 4. Back-diffuse re-segmented matrixPEwithC2through using the method shown below and denote the backdiffused image matrix asP'E=[p'e(i)]:

    Step 5 PermutateP'EintoP''Eby reverse process of FSVLSBCP.

    This concludes the decryption process, which is the reverse of the encryption process. The demonstration is no longer illustrated as space limitations.

    3.4. Encryption and decryption simulation results

    Fig. 4. Image encryption/decryption results, showing (a) image of Fullgold, (b) encrypted Fullgold, (c) decrypted Fullgold, (d) image of Lena, (e)encrypted Lena,(f)decrypted Lena,(g)image of peppers,(h)encrypted peppers,(i)decrypted peppers.

    MATLAB 2017a software is used to conduct the encryption and decryption in this study. The operation system of the computer is a Microsoft Windows 10 system with Intel(R)Core(TM)i5-7500 CPU.The encryption and decryption simulation results of three representative images,each with a size of 512×512, are shown in Fig. 4. The simulation results illustrate the accurate process of encryption and decryption in terms of visual effect.

    3.5. Encryption runtime comparison

    LSB chaotic permutation reduces the operation of bit position transformation. This design can effectively reduce the running time of the proposed encryption algorithm, and its comparisons with the running times of some classic algorithms are shown in Table 3. Through the comparisons, it can be found that the proposed encryption method can effectively improve the efficiency of image encryption.

    Table 3. Comparisons among runtimes.

    4. Security analysis

    Numbers of experimental results and data comparisons are provided in this section to check the supremacy and protection of proposed image encryption and decryption algorithms based on FSV-LSBCP.The images,each with a size of 512×512 used for the experimental test,are shown in Fig.5.

    Fig.5. Images used for experimental test on(a)baboon,(b)Barbara,(c)bridge,(d)couple,(e)crowd,(f)Fullgold,(g)Lena,(h)man,(i)peppers,(j)plane.

    4.1. Key analysis

    According to the conclusion in Ref. [39], the cryptosystem with keyspace larger than 2100is better at resisting bruteforce attacks. Due to the calculation accuracy and the selected space of the initial matrix, the keyspace can be calculated as follows:

    where the selection space ofk1,k2,k4,k5is 1014as the calculation accuracy of the computer is assumed to be 10?14,the selection space ofk3is 103.

    The key sensitivity test can detect the effect of small changes of the correct key on the decryption of ciphertext.Any accurate image cannot be decrypted unless the right keyKr=[k1, k2, k3, k4, k5] is used in the proposed cryptosystem. The error keysK1= [k1+10?14, k2, k3, k4, k5] andK2=[k1, k2+10?14, k3, k4, k5]are used to decrypt the ciphertext,respectively. There is no doubt that the wrong key cannot obtain the correct decrypted image, and even if the two images are subtracted, no relevant information can be obtained.The detailed simulation process of key sensitivity analysis is shown in Fig.6.

    4.2. Statistical analysis

    Kinds of statistical experiments and analysis are enumerated to verify the reliability of the proposed algorithm as follows.

    4.2.1. Histogram analysis

    The ciphertext image histogram is a method used to calculate the ability of an encryption system to object to a statistical analysis attack.This suggests that it is difficult to attack the ciphertext image obtained by the encryption algorithm when the histogram is smooth.As shown in Fig.7,the histograms of the encrypted and decrypted images have obvious characteristics,where the histograms of the original images have various fluctuations but the histograms of these ciphertext images are very stable.

    Fig.6. Key sensitivity test on(a)encrypted peppers with Kr,(b)decrypted peppers with Kr,(c)decrypted peppers with K1,(d)decrypted peppers with K2,(e)absolute value of(c)minus(d),and(f)histogram of panel(e).

    Fig.7. Histograms of(a)Fullgold,(b)Lena,(c)peppers,(d)encrypted Fullgold,(e)encrypted Lena,and(f)encrypted peppers.

    4.2.2. Correlation coefficient

    The correlation coefficient is a description of the correlation between two adjacent pixels. For a flat image,its adjacent pixel relationship is divided into three categories: horizontal,vertical,and diagonal.The correlation coefficients of the three directions of the ciphertext image obtained by a secure image encryption algorithm should be small enough to resist attacks.The correlation coefficients of the flat image are calculated as follows:[40]

    where

    Table 4 shows the comparisons of correlation coefficients between the ciphertext images and the original images. The correlation coefficients of the representative encrypted images are generally very small. The mean values in the horizontal,vertical,and diagonal directions of the correlation coefficients are?0.000271,?0.000358, and 0.000654, respectively. The small standard deviations in the three directions indicate that the proposed method is safe and stable.

    The visual correlation results of the image peppers before encryption and after encryption are shown in Fig.8.The correlations in the three directions of the two original images are all concentrated around the liney=xof the coordinate system,while most of the points are close to the line, which means that the original images are relevant to each other. In contrast to the correlation image of the ciphertext image,each point is evenly distributed in the image range, which reveals that the correlation of the encrypted image is weak.

    Table 4. Correlation coefficients of images before and after being encrypted.

    Fig.8. Adjacent pixel correlation in(a)horizontal direction of peppers,(b)vertical direction of peppers,(c)diagonal direction of peppers,(d)horizontal direction of encrypted peppers,(e)vertical direction of encrypted peppers,and(f)diagonal direction of encrypted peppers.

    4.2.3. Information entropy

    An important parameter that represents the randomness of information is information entropy,which is expressed as[41]

    where descriptions of parameters such ass=[si]2L,p(si),andsiare detailed in Ref.[41].

    Table 5 accurately reflects the change in information entropy of the image before and after encryption, that the information entropy after encryption is closer to the theoretical limit value. The standard deviation is 0.000060, which is small,implying that the proposed algorithm is both safe and stable.

    Table 5. Information entropy of plaintext and ciphertext images.

    4.3. Analysis of resistance to differential attack

    The resistance of encryption algorithms to differential attacks can be tested by the number of pixels changing rate (NPCR) and unified averaged changed intensity (UACI),which are acquired as follows:[17]

    wherec1(i,j)andc2(i,j)are two pixel values of the same position (i,j) in the two different encrypted images;MandNrepresent the image dimensions.

    Table 6 shows the average values of the NPCR and UACI among 100 random pixels at different positions. Selecting the mean value of NPCR and UACI at random positions can avoid the particularity of special positions in the calculation process and the waste of time in obtaining the overall value.The NPCR and UACI values of each image and their average values are close to the theoretical level 99.6094% and 33.4635%, respectively. Although the standard deviation of UACI is slightly larger than that of NPCR, they are not very large. This makes our algorithm stable while being safe, and the proposed method is suitable for various types of images.In general,the proposed method has a high resistance to the differential attack. Therefore,the proposed encryption scheme is verified to resist differential attacks.

    Table 6. NPCR and UACI values of ciphertext images(%).

    4.4. Resistance to cropping attacks and noise attacks

    The cropping attacks and noise attacks are used to disrupt the integrity of the ciphertext image, which will prevent the attacker from obtaining the correct decryption information. In the resisting cropping attacks experiment, the encrypted images at the degrees of 1/16 and 1/4 cropping are decrypted as shown in Fig.9.

    Fig. 9. Decryption results after cropping attacks, showing (a) encrypted peppers with 1/16 degree cropping, (b) decrypted image of panel (a), (c)encrypted peppers with 1/4 degree cropping,and(d)decrypted image of panel(c).

    Fig.10. Decryption results after salt pepper noise attacks,showing(a)decrypted Lena after 1%noise,(b)decrypted Lena after 5%noise,(c)decrypted Lena after 10%noise,and(d)decrypted Lena after 25%noise.

    Table 7. Comparisons of proposed method with other bit-level permutation encryption methods.

    In the experiment on resisting salt and pepper noise attacks,the encrypted images with noise strengths of 0.01,0.05,0.10, and 0.25 are decrypted as shown in Fig. 10. The proposed cryptosystem can effectively resist cropping attacks and noise attacks and can decrypt identifiable plaintext images from ciphertext images that have been damaged to varying degrees.

    4.5. Comparison with other algorithms

    In the previous part, the experimental results of several indicators were introduced,and finally,the average values are used to compare with the experimental indicators, and thus comparing the proposed algorithm with other methods. The comparisons of performance between the proposed encryption scheme and other pixel-level permutation image cryptosystems are list in Table 7.

    The proposed algorithm presents good comprehensive experimental performance,showing that the proposed cryptosystem is both safe and reliable.

    5. Conclusions

    A chaotic image encryption cryptosystem based on FSVLSBCP is proposed for achieving the image with any size in this work. The basic concepts and iterative algorithm of FSV are introduced in detail. The fast iterative FSV can effectively improve the efficiency of encryption algorithms. The bit permutation of LSB can not only ensure the encryption effect but also improve the encryption efficiency. Combined with the dynamic characteristics of FSV, a new FSV-LSBCP is presented. The chaotic image encryption and decryption algorithm based on the FSV-LSBCP is constructed to encrypt and generate ciphertext images with stronger resistance to attacks. Through the comparison of encryption time, statistical analysis, and analysis of resistance to differential attacks, the proposed method proves to have a large enough keyspace,sufficiently sensitive key, and unrivaled resistance to statistical attacks and differential attacks.

    猜你喜歡
    興元
    Lossless embedding: A visually meaningful image encryption algorithm based on hyperchaos and compressive sensing
    情系鄉(xiāng)村振興的最美老干部——艾興元
    An image encryption algorithm based on spatiotemporal chaos and middle order traversal of a binary tree
    Synchronously scrambled diffuse image encryption method based on a new cosine chaotic map
    Force-constant-decayed anisotropic network model: An improved method for predicting RNA flexibility
    Molecular dynamics simulations on the wet/dry self-latching and electric fields triggered wet/dry transitions between nanosheets:A non-volatile memory nanostructure
    A secure image protection algorithm by steganography and encryption using the 2D-TSCC*
    An image encryption algorithm based on improved baker transformation and chaotic S-box?
    Tip-induced superconductivity commonly existing in the family of transition-metal dipnictides MPn2*
    鳳凰淚
    金沙江文藝(2018年1期)2018-11-14 02:09:33
    91精品三级在线观看| 国产精品免费大片| 久久久久久久久久久久大奶| 中文字幕人妻丝袜制服| 久久人妻福利社区极品人妻图片 | 亚洲激情五月婷婷啪啪| 99国产精品一区二区蜜桃av | 这个男人来自地球电影免费观看| 欧美在线一区亚洲| 一区二区三区精品91| 欧美亚洲 丝袜 人妻 在线| 超色免费av| 国产精品免费大片| 少妇 在线观看| 国产免费又黄又爽又色| 黄频高清免费视频| 久久久久视频综合| 老司机深夜福利视频在线观看 | 岛国毛片在线播放| 99热国产这里只有精品6| 久久久久久久久免费视频了| 一级片免费观看大全| 欧美av亚洲av综合av国产av| 国产成人精品在线电影| 免费人妻精品一区二区三区视频| 亚洲精品自拍成人| 永久免费av网站大全| 欧美激情高清一区二区三区| videosex国产| 国产av精品麻豆| 中文字幕人妻丝袜一区二区| 啦啦啦 在线观看视频| 看免费成人av毛片| 亚洲久久久国产精品| av有码第一页| 夫妻性生交免费视频一级片| 日韩人妻精品一区2区三区| 国产精品成人在线| 亚洲色图 男人天堂 中文字幕| 日本av免费视频播放| 黄色片一级片一级黄色片| 性少妇av在线| 色婷婷av一区二区三区视频| 色播在线永久视频| 久久久国产欧美日韩av| 精品国产一区二区三区久久久樱花| 国产极品粉嫩免费观看在线| 欧美日韩国产mv在线观看视频| 少妇粗大呻吟视频| 亚洲人成77777在线视频| 亚洲国产av影院在线观看| 亚洲,一卡二卡三卡| 性色av一级| 一本一本久久a久久精品综合妖精| 日韩大码丰满熟妇| xxxhd国产人妻xxx| 好男人电影高清在线观看| 国产三级黄色录像| 各种免费的搞黄视频| 日韩免费高清中文字幕av| 亚洲av成人不卡在线观看播放网 | 中文欧美无线码| 国产人伦9x9x在线观看| 亚洲精品中文字幕在线视频| 国产欧美亚洲国产| 少妇人妻久久综合中文| 在现免费观看毛片| 国产精品久久久人人做人人爽| 久久精品国产亚洲av高清一级| 亚洲国产欧美在线一区| 久久热在线av| 国产精品一区二区精品视频观看| 精品一品国产午夜福利视频| 亚洲av国产av综合av卡| 黄色怎么调成土黄色| 悠悠久久av| 五月开心婷婷网| 少妇人妻 视频| 精品高清国产在线一区| 黑人巨大精品欧美一区二区蜜桃| 男女午夜视频在线观看| 少妇人妻久久综合中文| 桃花免费在线播放| 亚洲国产中文字幕在线视频| av天堂久久9| 校园人妻丝袜中文字幕| 丁香六月欧美| a级毛片黄视频| 999精品在线视频| 国产日韩欧美在线精品| a级片在线免费高清观看视频| 亚洲成色77777| 国产精品偷伦视频观看了| 久久国产精品人妻蜜桃| 好男人视频免费观看在线| 久久人人97超碰香蕉20202| 视频区欧美日本亚洲| 日韩制服骚丝袜av| 五月天丁香电影| 两个人免费观看高清视频| 纵有疾风起免费观看全集完整版| 中文字幕最新亚洲高清| av线在线观看网站| 亚洲欧美精品自产自拍| 国产成人啪精品午夜网站| 又紧又爽又黄一区二区| 国产欧美亚洲国产| 亚洲综合色网址| 成年人午夜在线观看视频| 亚洲人成网站在线观看播放| 国产熟女午夜一区二区三区| 免费在线观看视频国产中文字幕亚洲 | 亚洲欧洲精品一区二区精品久久久| 精品少妇一区二区三区视频日本电影| 黄片小视频在线播放| 老鸭窝网址在线观看| 一级毛片电影观看| 午夜精品国产一区二区电影| 久久人妻熟女aⅴ| 亚洲欧洲日产国产| 晚上一个人看的免费电影| 久久国产精品大桥未久av| 可以免费在线观看a视频的电影网站| www日本在线高清视频| 一区福利在线观看| 日韩大码丰满熟妇| 精品国产乱码久久久久久小说| 18禁黄网站禁片午夜丰满| 国产高清国产精品国产三级| 后天国语完整版免费观看| 99久久精品国产亚洲精品| 无限看片的www在线观看| 国产精品久久久av美女十八| 永久免费av网站大全| 中文字幕最新亚洲高清| 新久久久久国产一级毛片| 亚洲一码二码三码区别大吗| 午夜免费鲁丝| 女人高潮潮喷娇喘18禁视频| 1024视频免费在线观看| 久久精品国产综合久久久| 精品一区二区三卡| 日本午夜av视频| 亚洲欧美一区二区三区久久| 欧美黑人精品巨大| 在线观看免费午夜福利视频| 一级毛片我不卡| 美女午夜性视频免费| 母亲3免费完整高清在线观看| 精品一区二区三区av网在线观看 | 日日夜夜操网爽| 亚洲伊人色综图| 国产福利在线免费观看视频| 两个人看的免费小视频| 日本91视频免费播放| 天天操日日干夜夜撸| 亚洲av电影在线观看一区二区三区| 飞空精品影院首页| 母亲3免费完整高清在线观看| 午夜免费鲁丝| 一区福利在线观看| 男的添女的下面高潮视频| 色精品久久人妻99蜜桃| 人人妻人人澡人人看| 久久久久久久国产电影| 日韩 亚洲 欧美在线| 一区二区日韩欧美中文字幕| 一区二区三区精品91| 男女高潮啪啪啪动态图| xxxhd国产人妻xxx| 搡老岳熟女国产| 午夜免费男女啪啪视频观看| 亚洲人成电影观看| 丰满迷人的少妇在线观看| 亚洲精品国产av蜜桃| 免费高清在线观看日韩| 69精品国产乱码久久久| 制服人妻中文乱码| 美女国产高潮福利片在线看| 亚洲人成网站在线观看播放| 汤姆久久久久久久影院中文字幕| 欧美日韩视频高清一区二区三区二| 欧美 日韩 精品 国产| 国产精品九九99| 亚洲欧洲国产日韩| 9191精品国产免费久久| 国产又爽黄色视频| 交换朋友夫妻互换小说| 国产一区二区在线观看av| 黄片播放在线免费| 久久精品久久精品一区二区三区| 伊人亚洲综合成人网| 亚洲欧洲日产国产| 91成人精品电影| 亚洲精品久久久久久婷婷小说| 亚洲中文日韩欧美视频| 国产av一区二区精品久久| 如日韩欧美国产精品一区二区三区| 国产成人精品久久二区二区免费| 一本一本久久a久久精品综合妖精| 性少妇av在线| 婷婷成人精品国产| 日本a在线网址| av一本久久久久| 国产老妇伦熟女老妇高清| 中文字幕亚洲精品专区| 五月开心婷婷网| 一本—道久久a久久精品蜜桃钙片| 国产视频一区二区在线看| 99国产精品免费福利视频| 国产成人av教育| 人妻人人澡人人爽人人| 美女主播在线视频| 人人澡人人妻人| 每晚都被弄得嗷嗷叫到高潮| 另类亚洲欧美激情| 90打野战视频偷拍视频| 久久99精品国语久久久| 精品久久蜜臀av无| 无限看片的www在线观看| 乱人伦中国视频| 中文字幕人妻丝袜一区二区| 久久这里只有精品19| 不卡av一区二区三区| 一区二区日韩欧美中文字幕| 两性夫妻黄色片| av国产精品久久久久影院| 少妇 在线观看| 午夜av观看不卡| 欧美国产精品va在线观看不卡| 丝袜在线中文字幕| 日韩,欧美,国产一区二区三区| 后天国语完整版免费观看| 中文字幕av电影在线播放| 少妇 在线观看| 亚洲精品久久成人aⅴ小说| 日本a在线网址| 亚洲一卡2卡3卡4卡5卡精品中文| 亚洲精品乱久久久久久| 精品高清国产在线一区| 亚洲午夜精品一区,二区,三区| 日韩电影二区| 国产福利在线免费观看视频| www.精华液| 黄色 视频免费看| 国产熟女欧美一区二区| 成人国产av品久久久| 狂野欧美激情性bbbbbb| 91字幕亚洲| 18禁国产床啪视频网站| 中文欧美无线码| 久久久久久久精品精品| 日本五十路高清| 日本黄色日本黄色录像| 久久99一区二区三区| xxx大片免费视频| 欧美精品啪啪一区二区三区 | 老司机亚洲免费影院| 日本欧美视频一区| 51午夜福利影视在线观看| 欧美日韩亚洲国产一区二区在线观看 | 国产精品 国内视频| 国产日韩一区二区三区精品不卡| 97人妻天天添夜夜摸| 国产真人三级小视频在线观看| 国产成人精品无人区| 国产精品一区二区免费欧美 | 国产成人精品久久久久久| 啦啦啦视频在线资源免费观看| 欧美97在线视频| 中文字幕人妻熟女乱码| 免费日韩欧美在线观看| 久久久欧美国产精品| 男女之事视频高清在线观看 | 少妇被粗大的猛进出69影院| 亚洲国产精品一区二区三区在线| 亚洲精品国产一区二区精华液| 性色av一级| 天天添夜夜摸| 亚洲国产欧美在线一区| 久久精品久久久久久久性| 亚洲成色77777| av网站在线播放免费| 亚洲熟女毛片儿| 性高湖久久久久久久久免费观看| 国产成人一区二区三区免费视频网站 | √禁漫天堂资源中文www| 一区二区三区乱码不卡18| 少妇被粗大的猛进出69影院| 免费人妻精品一区二区三区视频| 欧美日韩视频高清一区二区三区二| 亚洲图色成人| 国产免费现黄频在线看| 美女扒开内裤让男人捅视频| 亚洲中文字幕日韩| 久久久精品免费免费高清| 亚洲av日韩在线播放| 亚洲av成人精品一二三区| 青青草视频在线视频观看| 激情视频va一区二区三区| 国产欧美日韩精品亚洲av| 亚洲国产av新网站| 美女中出高潮动态图| 欧美日本中文国产一区发布| 亚洲精品乱久久久久久| 天堂俺去俺来也www色官网| 久久精品人人爽人人爽视色| 各种免费的搞黄视频| 男人爽女人下面视频在线观看| 国产日韩欧美在线精品| 最近最新中文字幕大全免费视频 | 欧美成人精品欧美一级黄| 亚洲中文av在线| 久久久久视频综合| 男人爽女人下面视频在线观看| 18禁国产床啪视频网站| 又大又黄又爽视频免费| 久久久久网色| www.999成人在线观看| 亚洲国产av影院在线观看| 国产一区二区在线观看av| 久久久久视频综合| 又黄又粗又硬又大视频| 久久精品aⅴ一区二区三区四区| 久久久亚洲精品成人影院| 黑人欧美特级aaaaaa片| 老汉色∧v一级毛片| 91精品三级在线观看| 国产亚洲午夜精品一区二区久久| 亚洲一卡2卡3卡4卡5卡精品中文| 99re6热这里在线精品视频| 国产熟女欧美一区二区| 大片电影免费在线观看免费| 国产黄色视频一区二区在线观看| 亚洲久久久国产精品| 嫩草影视91久久| 国产在线观看jvid| 男的添女的下面高潮视频| 男女国产视频网站| 妹子高潮喷水视频| 在线精品无人区一区二区三| 成年人黄色毛片网站| 亚洲国产最新在线播放| 久久精品aⅴ一区二区三区四区| 精品国产乱码久久久久久小说| a级毛片黄视频| 老汉色av国产亚洲站长工具| 桃花免费在线播放| 婷婷成人精品国产| 黄频高清免费视频| 国产免费视频播放在线视频| 日本黄色日本黄色录像| 亚洲,一卡二卡三卡| 久久精品国产亚洲av涩爱| 9色porny在线观看| 一本一本久久a久久精品综合妖精| 制服人妻中文乱码| 久久精品国产亚洲av涩爱| 国产成人av激情在线播放| 免费在线观看完整版高清| 久久久久精品国产欧美久久久 | 男人爽女人下面视频在线观看| 午夜免费男女啪啪视频观看| 国产黄频视频在线观看| 黄色视频不卡| 成人黄色视频免费在线看| 日日夜夜操网爽| 丁香六月天网| 纵有疾风起免费观看全集完整版| 91老司机精品| 国产深夜福利视频在线观看| 亚洲av国产av综合av卡| 99九九在线精品视频| 亚洲av美国av| 久久久久视频综合| 国产一级毛片在线| 纵有疾风起免费观看全集完整版| 免费在线观看日本一区| 亚洲少妇的诱惑av| 亚洲五月婷婷丁香| 又黄又粗又硬又大视频| 99国产精品一区二区蜜桃av | 日韩熟女老妇一区二区性免费视频| 女性被躁到高潮视频| 成年人免费黄色播放视频| 最新在线观看一区二区三区 | 欧美黄色片欧美黄色片| 日韩制服骚丝袜av| 亚洲中文字幕日韩| 狠狠婷婷综合久久久久久88av| 高清不卡的av网站| 午夜福利在线免费观看网站| 国语对白做爰xxxⅹ性视频网站| 色网站视频免费| 亚洲国产最新在线播放| 精品免费久久久久久久清纯 | 国产一区二区三区av在线| 麻豆乱淫一区二区| 如日韩欧美国产精品一区二区三区| 老汉色∧v一级毛片| 99精品久久久久人妻精品| 黄色 视频免费看| 18禁黄网站禁片午夜丰满| 久久精品国产a三级三级三级| 两人在一起打扑克的视频| 国产一区有黄有色的免费视频| 色综合欧美亚洲国产小说| 美女午夜性视频免费| 多毛熟女@视频| 亚洲成人国产一区在线观看 | 国产亚洲精品久久久久5区| 五月天丁香电影| 天天躁夜夜躁狠狠久久av| 十八禁人妻一区二区| 婷婷丁香在线五月| 日韩欧美一区视频在线观看| 亚洲国产中文字幕在线视频| 久久av网站| 91老司机精品| 香蕉国产在线看| 免费在线观看完整版高清| bbb黄色大片| 777久久人妻少妇嫩草av网站| 99精国产麻豆久久婷婷| 黄片播放在线免费| 国产淫语在线视频| 精品国产一区二区久久| 亚洲中文字幕日韩| 天天躁夜夜躁狠狠久久av| 亚洲欧美清纯卡通| 国产精品.久久久| 成人18禁高潮啪啪吃奶动态图| 欧美黄色片欧美黄色片| 热re99久久国产66热| 香蕉丝袜av| 亚洲午夜精品一区,二区,三区| 亚洲一区二区三区欧美精品| 少妇粗大呻吟视频| 国产精品人妻久久久影院| 欧美精品高潮呻吟av久久| 夫妻午夜视频| 亚洲精品美女久久av网站| av国产久精品久网站免费入址| 亚洲欧美一区二区三区黑人| 日韩一区二区三区影片| 麻豆国产av国片精品| 老熟女久久久| 免费久久久久久久精品成人欧美视频| 人妻一区二区av| 亚洲 欧美一区二区三区| 99精国产麻豆久久婷婷| 九色亚洲精品在线播放| 99精品久久久久人妻精品| 国产日韩欧美亚洲二区| 免费av中文字幕在线| 亚洲成人国产一区在线观看 | 一级毛片电影观看| 免费少妇av软件| 99热网站在线观看| 午夜精品国产一区二区电影| 欧美成狂野欧美在线观看| 久久国产精品影院| 电影成人av| 可以免费在线观看a视频的电影网站| 久久免费观看电影| 美女福利国产在线| 欧美黑人欧美精品刺激| 美女扒开内裤让男人捅视频| 热re99久久精品国产66热6| 女性被躁到高潮视频| 午夜福利免费观看在线| 丁香六月欧美| 看免费成人av毛片| 黑人猛操日本美女一级片| 国产91精品成人一区二区三区 | 久久国产精品男人的天堂亚洲| 别揉我奶头~嗯~啊~动态视频 | 久久热在线av| 国产爽快片一区二区三区| 电影成人av| 色播在线永久视频| 亚洲视频免费观看视频| 精品久久久久久电影网| 国产精品一二三区在线看| 你懂的网址亚洲精品在线观看| 搡老乐熟女国产| 少妇精品久久久久久久| 91国产中文字幕| 老司机影院成人| 视频区欧美日本亚洲| 国产视频首页在线观看| 亚洲精品一区蜜桃| 国产黄频视频在线观看| 色婷婷久久久亚洲欧美| 成人免费观看视频高清| 国产精品 欧美亚洲| 新久久久久国产一级毛片| 久久九九热精品免费| 美国免费a级毛片| 高清视频免费观看一区二区| 中文字幕色久视频| 欧美成人精品欧美一级黄| 日韩av不卡免费在线播放| 王馨瑶露胸无遮挡在线观看| 国产成人一区二区在线| 91麻豆av在线| 99久久人妻综合| 麻豆av在线久日| 国产高清不卡午夜福利| 久久午夜综合久久蜜桃| 搡老岳熟女国产| 久久久精品国产亚洲av高清涩受| 欧美成人午夜精品| 香蕉丝袜av| 午夜福利视频精品| 人妻 亚洲 视频| e午夜精品久久久久久久| 美女视频免费永久观看网站| 满18在线观看网站| 99久久99久久久精品蜜桃| 久久精品国产亚洲av涩爱| 亚洲国产最新在线播放| 亚洲男人天堂网一区| 国产精品三级大全| 成人国产一区最新在线观看 | 免费日韩欧美在线观看| 老司机影院毛片| 免费一级毛片在线播放高清视频 | 久久女婷五月综合色啪小说| 50天的宝宝边吃奶边哭怎么回事| 80岁老熟妇乱子伦牲交| 久久久久国产一级毛片高清牌| 国产欧美日韩一区二区三区在线| 欧美日韩福利视频一区二区| 丝袜在线中文字幕| 日本wwww免费看| 91成人精品电影| 一本色道久久久久久精品综合| 极品少妇高潮喷水抽搐| 久久久久久亚洲精品国产蜜桃av| 巨乳人妻的诱惑在线观看| 国产精品 欧美亚洲| 人人妻人人爽人人添夜夜欢视频| av国产精品久久久久影院| 成人亚洲欧美一区二区av| 超碰成人久久| 亚洲精品自拍成人| 老汉色∧v一级毛片| 亚洲精品成人av观看孕妇| 乱人伦中国视频| 一本—道久久a久久精品蜜桃钙片| 精品国产一区二区三区四区第35| xxx大片免费视频| 久久毛片免费看一区二区三区| 青青草视频在线视频观看| 看十八女毛片水多多多| 99国产精品一区二区三区| 视频在线观看一区二区三区| 婷婷色av中文字幕| 少妇人妻久久综合中文| 精品一区二区三卡| www.熟女人妻精品国产| 一二三四社区在线视频社区8| 大片免费播放器 马上看| 性色av乱码一区二区三区2| 国产精品一区二区精品视频观看| 欧美日韩成人在线一区二区| 三上悠亚av全集在线观看| 18禁裸乳无遮挡动漫免费视频| 一区二区日韩欧美中文字幕| 高潮久久久久久久久久久不卡| 久久国产精品大桥未久av| a 毛片基地| 免费高清在线观看视频在线观看| 欧美成人精品欧美一级黄| 日韩大片免费观看网站| 午夜免费男女啪啪视频观看| 亚洲,一卡二卡三卡| 免费女性裸体啪啪无遮挡网站| 亚洲精品成人av观看孕妇| 日本一区二区免费在线视频| 天天影视国产精品| 国产精品一区二区在线不卡| 视频区欧美日本亚洲| 成年人午夜在线观看视频| 香蕉国产在线看| 丁香六月天网| 国产精品人妻久久久影院| 蜜桃在线观看..| 黄色毛片三级朝国网站| 黄频高清免费视频| 秋霞在线观看毛片| av福利片在线| 在线观看人妻少妇| 亚洲国产中文字幕在线视频| 午夜福利一区二区在线看| 我的亚洲天堂| 精品免费久久久久久久清纯 | 性高湖久久久久久久久免费观看| 色婷婷久久久亚洲欧美| 成人黄色视频免费在线看| 久久久国产欧美日韩av| 欧美大码av| 亚洲中文av在线| 久久精品亚洲熟妇少妇任你| 欧美日韩视频精品一区| videos熟女内射| 在线观看国产h片| 黄色一级大片看看| 青春草亚洲视频在线观看| 欧美在线黄色| 丰满迷人的少妇在线观看| 五月开心婷婷网| 曰老女人黄片| bbb黄色大片|