• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A secure image protection algorithm by steganography and encryption using the 2D-TSCC*

    2021-11-23 07:25:26QiLi李琦XingyuanWang王興元HeWang王赫XiaolinYe葉曉林ShuangZhou周雙SuoGao高鎖andYunqingShi施云慶
    Chinese Physics B 2021年11期
    關(guān)鍵詞:興元李琦

    Qi Li(李琦) Xingyuan Wang(王興元) He Wang(王赫) Xiaolin Ye(葉曉林)Shuang Zhou(周雙) Suo Gao(高鎖) and Yunqing Shi(施云慶)

    1School of Information Science and Technology,Dalian Maritime University,Dalian 116026,China

    2Guangxi Key Laboratory of Multi-source Information Mining&Security,Guangxi Normal University,Guilin 541004,China

    3Dalian Hongwen Middle School,Dalian 116000,China

    4School of Mathematical Sciences,Chongqing Normal University,Chongqing 401331,China

    5Department of Electrical and Computer Engineering,New Jersey Institute of Technology,Newark NJ 07102,USA

    Keywords: 2D-TSCC,steganography,image encryption,mod diffuse,chaos

    1. Introduction

    Due to the openness and sharing of the network, the protection of information has become particularly important.Currently, in the era of full coverage of 5G networks, images are one of the important information interaction tools,and privacy-protecting images have gradually become popular research content.[1-3]Preventing the leakage of image information has gradually become a hot research topic.[4-7]Many image protection methods have been proposed,[8-11]such as steganography,zero watermark,image encryption,and so on.[12-17]

    Because chaotic systems have the characteristics, such as long-term, sensitive to parameters, sensitive to initial values unpredictable,pseudorandomness,and so on.[18-20]Therefore,the encryption algorithm combined with chaotic systems have received widespread attention.[22,23]Many scholars have proposed encryption algorithms.Ye and Wanget al.,proposed a new Chua’s chaotic system with a higher complexity and the system was simulated by hardware. A nonlinear diffusion encryption algorithm was proposed using the system and Arnold mapping.[24]In order to protect the transmission of medical images, Liu and Kadiret al.used a high-dimensional chaotic system on the Galois field and a new image protection scheme with faster encryption speed was proposed.[25]Hau and Jinetal., proposed a new two-dimensional (2D) chaotic system,which has better dynamic behavior than the past system, and used this system to propose an encryption algorithm with higher encryption efficiency.[26]Parvaz and Zarebnia maked a new system through three common one-dimensional (1D)chaotic systems, and use this system for the protection of binary images and grayscale images.[27]Many algorithms are not resistant to selected plaintext attacks. Zhu and Sun proposed an enhanced algorithm to solve this problem.[28]Ullah and Jamalet al.,used the substitution box and chaotic system in image encryption.[29]Wang and Gao proposed the Boolean network encryption base on chaotic systems,and then used the Boolean network to make the secret key in the chaotic image encryption.[30,31]

    Unlike image encryption, steganography not only hides the content of the message,but also hides the communication process itself. Steganography requires a normal digital carrier as a cover to transmit secret information. Steganography have been proposed by many researchers recently. For example, Baluja hides the color image in the same size image.[32]Xie and Changet al., proposed a data hiding scheme which is reversible with a high embedding ability.[33]Ma and Liet al.,proposed the reversible information hiding based on CDM(Code Division Multiplexing).[34]

    So far, the image protection algorithms proposed are all single, single encryption algorithm, or single steganography algorithm. In this paper, the two protection algorithms are combined,and the comparative experimental results also show that with the addition of the steganography,the ciphertext image obtained is closer to the theoretical value in various test indicators.Even if the attacker intercepts the ciphertext image,only the carrier image carrying the secret information can be obtained through the decryption algorithm. If attackers want to get a secret image, they must crack the steganography algorithm. This is undoubtedly more difficult than cracking a single steganography algorithm or encryption algorithm.

    Many chaotic systems have been proposed.[35-37]The one-dimensional chaotic system is simple in form,the chaotic trajectory of the 1D chaotic system is relatively simple and can be easily destroyed. The destroyed system loses randomness and it is not suitable for image encryption. Chaotic systems with more than two dimensions or spatiotemporal chaotic systems have better chaotic properties, but the efficiency in generating chaotic sequences is low. Therefore,many 2D chaotic systems have been proposed,such as 2D logistic map,[38]2DSLMM,[39]H′enon map,[40]and so on. These systems have some problems, such as the small parameter space in the hyperchaotic state and the uneven distribution of chaotic sequences. This paper proposes a new 2D-TSCC system. The system has a larger parameter space,which allows the system to enter a hyperchaotic state, the chaotic sequence is evenly distributed,and most of the values in the window can be taken.Hence,it is very suitable for image encryption.

    In this paper,a new image protection scheme in combination with 2D-TSCC.This solution includes steganography and encryption. Compared with a single steganography or encryption algorithm, the image protection scheme is more secure,because it is very difficult for an attacker to obtain secret information to crack two encryption methods. In the steganography stage,the sequence generated by the 2D-TSCC is used to determine the position of the secret information embedded in the cover image. The sequence generated by the 2D-TSCC is used in the encryption stage for scrambling and diffusion.

    2. The 2D tan-sin-cos-coupling map

    First, a new chaotic system which is called 2D-TSCC is proposed. Then, the chaotic trajectory, Lyapunov exponents,and NIST test of the system are analyzed. Finally, the 2DTSCC is compared with some other 2D systems.

    2.1. Definition of 2D-TSCC

    Due to the small parameter range of low-dimensional chaotic systems, the chaotic sequence is not uniformly distributed. Therefore,this paper proposes a 2D chaotic system In Eq.(1),x ∈[?1,1]andy ∈[?1,1]. Whenμ ∈[2.051,10],the system is in a hyperchaotic state,at this time the sequence distribution of the system is uniform,and the periodic behavior is difficult to predict. The chaotic sequence under this parameter is selected for steganography and encryption.

    2.2. Chaos trajectory

    The chaotic trajectory represents the path of the sequence output. If the trajectory of a chaotic system fills the entire interval,the output of the chaotic system has a better pseudorandomness.

    The trajectories of the 2D-TSCC system are shown in Fig.1.The parameters areμ=2.05,μ=4,μ=6,andμ=10.

    Fig. 1. Chaos trajectories of the 2D-TSCC, (a) chaos trajectory with μ =2.05, (b) chaos trajectory with μ =4, (c) chaos trajectory with μ =6, (d)chaos trajectory withμ =10.

    The chaos trajectories of the 2D-TSCC system is compared with the chaos trajectories of some classic 2D chaotic systems.

    (i)2D logistic map is proposed by Wuet al.,[24]

    The chaotic trajectory of 2D logistic map(x0=0.5724,y0=0.603, andα=1.18), 2D-SLMM (x0=0.5724,y0=0.603,β=0.9,andε=3),and H′enon map(x0=0.5724,y0=0.603,ξ=1.4,andτ=0.3)are shown in Fig.2.

    Fig.2. Trajectories of three 2D chaotic maps: (a)2D logistic map, (b) 2DSLMM,and(c)H′enon map.

    From Figs.1 and 2,the trajectories of the 2D-TSCC system fills the entire space, while the trajectories of the systems (i), (ii), and (iii) do not fill the entire space. The 2DTSCC system has a wider range of values,which can take all the values in the interval, while the systems (i), (ii), and (iii)can only take part of the values in the interval. Therefore,the value of the 2D-TSCC system is more random,which is more suitable for steganography and image encryption.

    2.3. Lyapunov exponents

    Lyapunov exponent is an important index that characterizes the dynamic behavior of the system.[41-43]The dynamic system with a positive Lyapunov exponent is chaotic.A high-dimensional chaotic system may have multiple positive Lyapunov exponents. When a dynamic system has two or more positive Lyapunov exponents, the system is hyperchaotic. Hyperchaotic systems have better chaotic characteristics and more complex dynamics.It is defined as follows:[24]

    Fig. 3. Lyapunov exponents of 2D-TSCC, (a) Lyapunov exponents withμ ∈[0,10], (b) Lyapunov exponents with μ ∈[1.2,2.8], and (c) Lyapunov exponents withμ ∈[3.4,4.3].

    It can be seen from Fig. 3, whenμ ∈(1.33,1.425) andμ ∈(1.435,1.53), the system is in a chaotic state. Whenμ ∈(1.56,1.59),the system switches between chaos and hyperchaos. Whenμ ∈(2.051,10], the system is in a hyperchaotic state. This paper selects the parameters in a hyperchaotic state, and generates a chaotic sequence for steganography and encryption.

    The Lyapunov exponents of systems(i),(ii)(ε=3),and(iii)(τ=0.3)are shown in Fig.4.

    Fig.4. Lyapunov exponents:(a)Lyapunov exponents of 2D logistic map,(b)Lyapunovs exponents of 2D-SLMM,and(c)Lyapunov exponents of H′enon map.

    Comparing the Lyapunov exponent of systems (i), (ii),and (iii), the 2D-TSCC has a wider range of parameters in a hyperchaotic state, so the 2D-TSCC system is more suitable for steganography and image encryption.

    2.4. NIST test

    In this section,the randomness of the sequence generated by the chaotic system is tested by NIST,and the test results are shown in Table 1.

    Table 1. NIST test of the chaotic sequence.

    The chaotic sequence generated in this paper has passed 15 tests,so it can show that the sequence generated by the 2DTSCC has good randomness.

    3. Steganography and encryption algorithm

    This section proposes a safe method of protecting images,which includes steganography and encryption. First,an image that needs to be protected is steganographically written in a carrier image, then combined with the 2D-TSCC, the carrier image embedded in the secret image is encrypted,and the ciphertext is obtained,thereby playing the role of double protection of the image.

    3.1. Steganography

    Steganography is a way of hiding information. Steganography focuses more on making people unable to perceive the existence of secret image. The plaintext is hidden in the cover image by substitution. Suppose the secret image isHS×Tand the cover image isPM×N. The steganography algorithm is as follows.

    Step 1 Convert the cover image to a binary image, and each pixel value includes 8-bit values. Each bit can form an image,

    In Eq. (8), bg(x,y) represents the extraction of they-th from the binary numberx. Two examples are given as

    Take the Lena as an example. According to the above steps,8 images can be obtained in Fig.5.

    The 1 in the first bit only represents 1 (20), but in the eighth bit, it represents 128 (27). Therefore, use the following formula to describe the amount of information contained in each bit:[44]It can be seen from Table 2 that the 1st bit,the 2nd bit,and the 3rd bit contain the least amount of information, so the secret image is hidden in these three bits of the cover image.

    Table 2. Information of different bits.

    Fig.5. Image at each bit, (a)image of the 1st-bit, (b)image of the 2nd-bit,(c)image of the 3rd-bit,(d)image of the 4th-bit,(e)image of the 5th-bit,(f)image of the 6th-bit,(g)image of the 7th-bit,and(h)image of the 8th-bit.

    Step 2 Convert the secret image to a binary,a key stream is generated by the 2D-TSCC system,and determine the position of the secret image inserted into the cover image according to this key stream. Each pixel value of the cover image can carry one bit of the secret image.The cover image carrying the secret image is obtained.

    According to the rules, the relationship of the secret imageHU×Tthat the cover imagePM×Ncan carry is

    3.2. Steganography and encryption base on chaos

    The secret image isHU×Tand the cover image isPM×N,the carrier image containing the secret information isPH. The algorithm is described as follows.

    Start Input the cover imagePM×Nand the secret imageHU×T.

    Step 1 The secret keyhis generated from the cover image through SHA512,

    Step 6 Convert the secret image to a binary image, the size of the bit stream contained in secret image is 8×U×T.Take the first 8×U×Telements of the cover image and convert them to bits. Then the secret imageHis steganographically written in the cover imagePand the new cover imagePHis obtained as

    Step 10 Find the point with the same number inA3, and recordA4as

    Step 11 Scrambling the cover imagePHaccording toA4,the scrambling method is

    In Eq.(19),CS(a,b)is the displacement function,an example ofCS(a,b):

    For a better understanding, the following shows the scrambling process with an example,as shown in Fig.6.

    Fig.6. An example of scrambling.

    Step 12x0=d3,y0=d4,andμare brought into the 2DTSCC system to get the chaotic sequencesXandY,

    Step 13 Process the scrambling matrixSto get the ciphertextC:

    The reverse operation of this process is

    End Output ciphertextC.

    4. Performance analysis

    Some experimental results of the algorithm are given in this section. Some tests are performed on the experimental results to verify safety,including statistical tests and robustness analysis.

    4.1. Experimental results

    Fig. 7. Experimental results: (a) secret image, (b) cover image, (c) cover image carrying secret image,(d)scrambling of image(c),(e)encrypted image of panel(d), (f) decryption of cover image containing secret image, (g)decrypted cover image,and(h)decrypted secret image.

    4.2. Key space analysis and key sensitivity analysis

    The secret key in this article is generated by SHA512,as shown in Step 2 of Subsection 3.2. Select the first 384 bits of SHA512. The key space size is:

    When the key space is greater than 2100, it is considered that this algorithm can resist brute force attacks. The key space of this article is 2384, so an attacker cannot crack the algorithm by brute force attacks.

    Fig. 8. Key sensitivity analysis: (a) restore through the correct key, (b) restore through the key of b1+10?15,(c)restore through the key of b2+10?15,(d) restore through the key of b3+10?15, (e) restore through the key of b4+10?15,(f)restore through the key of b5+10?15,and(g)restore through the key of b6+10?15.

    Experiments show that the algorithm proposed in this paper is sensitive to the secret key, and the decryption key is unique. The algorithm can only get the plaintext information through the secret key provided by the sender,so the algorithm is safe.

    4.3. Histogram analysis

    The histogram analysis is an indicator to describe the distribution ofpixelvalues,whichisto countthe frequency of the same pixelvalue inthe image.[45]Usually thepixel value distribution of the plaintext is not uniform, but after a secure encryption algorithm, the number of times the same pixel value of the ciphertext appears is almost equal. Uneven histograms can cause information leakage, and attackers can crack the algorithm based on statistical analysis. The secret image Mangray 128×128 is hidden in the cover image Lenagray 512×512,the histogram analysis of Man gray,Lena, Lena-Man, and the ciphertext of Lena-Man are shown in Fig.9.

    Fig.9. Histogram analysis: (a)secret image of Man,(b)histograms of Man,(c)cover image of Lena,(d)histograms of Lena,(e)cover image carrying secret image of Lena-Man,(f)histograms of Lena-Man,(g)ciphertext of Lena-Man,and(h)histograms of ciphertext.

    The distribution of the histogram of the cover image carrying secret image is not uniform,but after the encryption algorithm in this article,the distribution of the histogram of the ciphertext is uniform. A attacker cannot infer the information of the cover image from the ciphertext,so the algorithm has a better ability to resist statistical attacks.

    4.4. Adjacent pixel correlation

    The adjacent pixel correlation is another indicator of resistance statistics. The adjacent pixel correlation analyzes the adjacent pixel correlation(horizontal,vertical,diagonal).Normally, the adjacent pixel correlation of the plaintext is very large. After a secure encryption algorithm,the adjacent pixel correlation of the ciphertext is very small. A attacker cannot infer the distribution of the plaintext through the ciphertext. The calculation formula of adjacent pixel correlation is described as follows:[46]

    where,

    This article analyzes the adjacent pixel correlation (horizontal, vertical, diagonal) of this algorithm from two angles. (I)Test the ciphertext obtained by the encryption algorithm on the carrier image,and test the correlation between adjacent pixels of the ciphertext. (II) After the test carrier image is embedded with the secret information Man,a new carrier cover-Man is obtained, and the new carrier is encrypted , Test the correlation between adjacent pixels of the ciphertext. Figure 10 shows different cover images.Table 3 shows the adjacent pixel correlation.

    It can be seen from Table 3 that the correlation of the cover image is large, but after the encryption algorithm, the correlation of the ciphertext is small. The ciphertext of the cover image containing secret image and the ciphertext of the cover image not containing secret image have little fluctuation in correlation. Therefore, it can be shown that the algorithm has a good ability to resist statistical attacks.

    Table 3. Adjacent pixel correlation.

    Fig.10. Cover images.

    4.5. Information entropy

    Information entropy is an important indicator for detecting the distribution of image pixel values, it is calculated as follows:

    The value of information entropy is closer to 8,indicating that the information contained in the image is confusing, and the attacker cannot find useful information on the image. On the contrary,the value is far away from 8,indicating that the possibility of information leakage is high,and the attacker can find the key information cracking the algorithm.

    The information entropy of the algorithm is analyzed from two perspectives. One is to test the ciphertext information entropy of the cover images in Fig. 10, and the other is to test the ciphertext information entropy of the cover images who is embedded with the secret image of Man.Table 4 shows the information entropy of the two ciphertexts.

    The following conclusions can be drawn from Table 4.The information entropy of the ciphertext obtained by the algorithm is close to 8. When only the encryption algorithm is used, the maximum value of the algorithm is 7.99943, the minimum value is 7.999925,and the average value is 7.99932.When the secret image is embedded in the carrier image to obtain the ciphertext image. The maximum value is 7.99941,the minimum value is 7.99920,and the average value is 7.99932.The ciphertext of the cover image containing secret image and the ciphertext of the cover image not containing secret image have little fluctuation in information entropy. Therefore,it can be explained that the attacker cannot obtain the key information to estimate the distribution of the plaintext pixel value,so the algorithm is security.

    Table 4. Information entropy.

    4.6. Differential attack

    The number of pixels changing rate(NPCR)and unified averaged changed intensity (UACI) are important indicators of the differential attacks. A attacker observes the difference between the two ciphertexts by making a small change to the plaintext. A secure algorithm,even if a small change is made to the plaintext, the ciphertexts are different. The NPCR and UACI are defined as In Eq.(25),D(i,j)=0 ifC1(i,j)=C2(i,j),andD(i,j)=1 ifC1(i,j)?=C2(i,j).

    The NPCR and UACI are analyzed from two perspectives. One is the ciphertext of the cover image and ciphertext of the cover image change one bit, and the other is the ciphertext of the cover image containing the secret image and the ciphertext of the cover image containing the secret image change one bit. Each image randomly selects 50 groups of points for testing,and the average value is shown in Table 5.

    When only the encryption algorithm is used, the maximum values are 99.6368 and 33.5284,the minimum values are 99.5789 and 33.4185,and the average values are 99.6074 and 33.4704.When the secret image is embedded in the carrier image to obtain the ciphertext image. The maximum values are 99.6151 and 33.5561, the minimums value are 99.5853 and 33.3931,and the average values are 99.6024 and 33.4722.

    The experimental data in Table 5 show that the NPCR and UACI are very close to the theoretical values,so it is possible to show that the algorithm proposed in this paper has the ability to resist the differential attack.

    Table 5. NPCR and UACI.

    4.7. Robustness analysis

    In general, information will suffer some interferences during transmissions, such as loss of some information and noise attacks. Even if a secure algorithm is subjected to these attacks, it can still get some information of plaintext through decryption algorithm. In this subsection,we perform different levels of cropping attacks and noise attacks on the ciphertext.Cove image and secret image are obtained through the decryption algorithm which are shown in Figs.11-14.

    Fig. 11. Decryption results after 1/8 cropping attacks: (a) 1/8 block attack,(b)decrypted of cover image,and(c)decrypted of secret image.

    Fig.12. Decryption results after 1/16 cropping attacks:(a)1/16 block attack,(b)decrypted of cover image,and(c)decrypted of Secret image.

    Fig.13. Decryption results after 0.1 salt&Pepper noise: (a)0.1 salt&Pepper noise,(b)decrypted of cover image,and(c)decrypted of secret image.

    Fig. 14. Decryption results after 0.01 salt & Pepper noise: (a) 0.01 salt &Pepper noise, (b)decrypted of cover image, and(c)decrypted of secret image.

    The experimental results show that even if the ciphertext has been attacked,partial information can still be obtained by decryption. Therefore,the algorithm has better robustness.

    4.8. NIST test

    This section uses the NIST test to test the randomness of the ciphertexts,and the test results are shown in the following Table 6.

    Table 6. NIST test of the ciphertexts.

    The test results show that the ciphertext obtained by the algorithm has good randomness.

    4.9. Comparing with other algorithms

    The proposed algorithm is compared with some classic encryption algorithms(Refs.[7,47-50]),including the information entropy,the adjacent pixel correlation,the NPCR,and UACI,the results are shown in Table 7.

    Table 7. Compare with other algorithms.

    5. Conclusion

    A safe image protection scheme is proposed in this paper.The highlight of this paper are as follows:

    (I)This paper proposes a new 2D chaotic system,i.e.,2DTSCC.Compared with other 2D chaotic systems,this system has a larger parameter space and the chaotic trajectory spreads over the entire window, so it is more suitable for image encryption and image steganography.

    (II)Combined with 2D-TSCC,a dual protection scheme for images is proposed. The program includes image steganography and image encryption. The design of this algorithm can ensure the security of the image during transmission.

    (III) Compared with other algorithms, including information entropy,NPCR,UACI,adjacent pixel correlation,and other indicators,this algorithm has better security.

    The proposed algorithm can be applied to the protection of trademarks and some design drawings. In order to prevent these commercially valuable information from being stolen during transmission. In the transmission process, the algorithm proposed in this paper is used for protection to achieve the role of information protection.

    In this paper, the algorithm is a new attempt to combine steganography and encryption. Although the embedding ability of the algorithm is low,the experimental results show that the ciphertext is more secure. In future work, we will design algorithms that combine steganography and encryption with higher embedding capabilities.

    猜你喜歡
    興元李琦
    情系鄉(xiāng)村振興的最美老干部——艾興元
    An image encryption algorithm based on spatiotemporal chaos and middle order traversal of a binary tree
    Synchronously scrambled diffuse image encryption method based on a new cosine chaotic map
    Force-constant-decayed anisotropic network model: An improved method for predicting RNA flexibility
    An active tunable Fano switch in a plasmafilled superlattice array
    An image encryption algorithm based on improved baker transformation and chaotic S-box?
    論非物質(zhì)文化遺產(chǎn)“活化”傳承
    李琦作品
    李琦作品
    劉興元小說(shuō)二題
    韩国av在线不卡| 欧美区成人在线视频| 日韩中字成人| 国产精品爽爽va在线观看网站| 久久久久九九精品影院| 成人亚洲精品av一区二区| 97超碰精品成人国产| 国产午夜福利久久久久久| 日韩制服骚丝袜av| 国产成人a∨麻豆精品| 麻豆av噜噜一区二区三区| 免费人成在线观看视频色| 亚洲人成网站在线播放欧美日韩| avwww免费| 99九九线精品视频在线观看视频| 日本黄色片子视频| 欧美+日韩+精品| 欧美又色又爽又黄视频| 97在线视频观看| 中国美女看黄片| 少妇熟女欧美另类| 国产成人一区二区在线| 午夜福利高清视频| 成人特级av手机在线观看| 午夜老司机福利剧场| 蜜桃久久精品国产亚洲av| 欧美绝顶高潮抽搐喷水| 搡老岳熟女国产| 欧美性感艳星| 色av中文字幕| 国语自产精品视频在线第100页| 国产一区二区三区av在线 | 91久久精品国产一区二区三区| 在现免费观看毛片| 国产色爽女视频免费观看| av福利片在线观看| 一a级毛片在线观看| 最近中文字幕高清免费大全6| 麻豆av噜噜一区二区三区| 欧美高清成人免费视频www| 一进一出抽搐gif免费好疼| 日本精品一区二区三区蜜桃| 亚洲欧美中文字幕日韩二区| 午夜视频国产福利| 人人妻,人人澡人人爽秒播| 精品久久久久久久久av| 99久久精品国产国产毛片| 最近最新中文字幕大全电影3| 三级经典国产精品| 日本精品一区二区三区蜜桃| 午夜爱爱视频在线播放| 淫妇啪啪啪对白视频| 成人特级黄色片久久久久久久| 色吧在线观看| 精品一区二区三区视频在线| 啦啦啦观看免费观看视频高清| 日本-黄色视频高清免费观看| 免费不卡的大黄色大毛片视频在线观看 | 最近的中文字幕免费完整| 成人美女网站在线观看视频| 日本免费一区二区三区高清不卡| a级毛片a级免费在线| 国产成人aa在线观看| 成人美女网站在线观看视频| 久久精品人妻少妇| 天美传媒精品一区二区| 精品99又大又爽又粗少妇毛片| 亚洲国产精品合色在线| 搡老岳熟女国产| 两个人视频免费观看高清| 国产v大片淫在线免费观看| 不卡视频在线观看欧美| 日韩欧美一区二区三区在线观看| 国产亚洲av嫩草精品影院| 亚洲在线观看片| 日本黄大片高清| 国产欧美日韩精品亚洲av| 亚洲国产精品成人久久小说 | 99久久久亚洲精品蜜臀av| 波多野结衣高清作品| 国产欧美日韩一区二区精品| 中文字幕av在线有码专区| 男人舔奶头视频| 噜噜噜噜噜久久久久久91| 麻豆乱淫一区二区| 一个人看视频在线观看www免费| 国产精品无大码| 日本a在线网址| 女的被弄到高潮叫床怎么办| 国产熟女欧美一区二区| 男女边吃奶边做爰视频| 男人狂女人下面高潮的视频| 国产精品1区2区在线观看.| 免费av毛片视频| 性色avwww在线观看| 十八禁国产超污无遮挡网站| 男女啪啪激烈高潮av片| 国产精品爽爽va在线观看网站| 久久99热6这里只有精品| 熟妇人妻久久中文字幕3abv| 免费av毛片视频| 日本一二三区视频观看| 日韩在线高清观看一区二区三区| 久久精品久久久久久噜噜老黄 | 69人妻影院| 国产久久久一区二区三区| 亚洲成人av在线免费| 国产成年人精品一区二区| 老司机影院成人| 一个人免费在线观看电影| 久久久国产成人精品二区| 99久久九九国产精品国产免费| 欧美bdsm另类| 性插视频无遮挡在线免费观看| 在线播放国产精品三级| 日韩一本色道免费dvd| or卡值多少钱| 久久久久久久久久久丰满| 你懂的网址亚洲精品在线观看 | 亚洲精品日韩av片在线观看| 嫩草影院入口| 国产精品野战在线观看| 国产极品精品免费视频能看的| 亚洲美女视频黄频| 一边摸一边抽搐一进一小说| 亚洲av不卡在线观看| 波野结衣二区三区在线| 久久久久久久午夜电影| 成人鲁丝片一二三区免费| 成年版毛片免费区| a级毛片免费高清观看在线播放| 免费看av在线观看网站| 看十八女毛片水多多多| 久久精品综合一区二区三区| 麻豆av噜噜一区二区三区| 国产精品国产高清国产av| 国产成人91sexporn| 99在线视频只有这里精品首页| 赤兔流量卡办理| 国产真实伦视频高清在线观看| 成人午夜高清在线视频| 精品国内亚洲2022精品成人| 欧美bdsm另类| 简卡轻食公司| 黄色配什么色好看| 亚洲熟妇熟女久久| 亚洲美女搞黄在线观看 | aaaaa片日本免费| 大香蕉久久网| 国产黄a三级三级三级人| 在线看三级毛片| 成人高潮视频无遮挡免费网站| 99久久精品热视频| 99热这里只有是精品在线观看| 老熟妇乱子伦视频在线观看| a级毛片免费高清观看在线播放| 免费看日本二区| 日本成人三级电影网站| 嫩草影院精品99| 欧洲精品卡2卡3卡4卡5卡区| 久久精品人妻少妇| 99riav亚洲国产免费| 天堂av国产一区二区熟女人妻| 深夜a级毛片| 性色avwww在线观看| 看片在线看免费视频| 3wmmmm亚洲av在线观看| 久久久国产成人免费| 国产伦在线观看视频一区| 久久99热这里只有精品18| 亚洲国产色片| 黄色日韩在线| 国产精品女同一区二区软件| 久久人妻av系列| 久久欧美精品欧美久久欧美| 春色校园在线视频观看| 欧美激情国产日韩精品一区| 亚洲熟妇中文字幕五十中出| 久久久国产成人精品二区| 国产亚洲精品久久久久久毛片| 欧美性猛交黑人性爽| 国产91av在线免费观看| 久久久午夜欧美精品| 亚洲七黄色美女视频| 亚洲av成人精品一区久久| 国产男靠女视频免费网站| 天天躁日日操中文字幕| 久久久久免费精品人妻一区二区| 国产男人的电影天堂91| 校园春色视频在线观看| 成人毛片a级毛片在线播放| 亚洲七黄色美女视频| 黄色欧美视频在线观看| 久久这里只有精品中国| 免费在线观看成人毛片| 亚洲欧美精品自产自拍| 欧美激情在线99| 国内精品久久久久精免费| 亚洲美女黄片视频| 毛片女人毛片| 亚洲色图av天堂| 男女边吃奶边做爰视频| 国产 一区 欧美 日韩| 最好的美女福利视频网| 欧美色视频一区免费| 亚洲,欧美,日韩| 色吧在线观看| 精品久久久久久成人av| 日本五十路高清| 高清毛片免费观看视频网站| 日韩精品中文字幕看吧| 欧美性感艳星| 一级毛片aaaaaa免费看小| 久久精品国产自在天天线| 久久久国产成人免费| 亚洲国产精品合色在线| 成年女人永久免费观看视频| 国产精品一区二区免费欧美| 男女做爰动态图高潮gif福利片| 51国产日韩欧美| 亚洲专区国产一区二区| 校园人妻丝袜中文字幕| 亚洲av中文字字幕乱码综合| 国产一区亚洲一区在线观看| 国产91av在线免费观看| 日韩欧美精品v在线| 日本欧美国产在线视频| av福利片在线观看| а√天堂www在线а√下载| 99热精品在线国产| 亚洲一级一片aⅴ在线观看| 国产视频内射| 国产高清视频在线播放一区| 天天躁日日操中文字幕| 亚洲最大成人中文| 女生性感内裤真人,穿戴方法视频| 欧洲精品卡2卡3卡4卡5卡区| 少妇人妻一区二区三区视频| aaaaa片日本免费| 欧美三级亚洲精品| 一边摸一边抽搐一进一小说| 婷婷亚洲欧美| 99九九线精品视频在线观看视频| 日日摸夜夜添夜夜添小说| 日本 av在线| 一级黄片播放器| 欧美区成人在线视频| 免费大片18禁| 真人做人爱边吃奶动态| 免费高清视频大片| 欧洲精品卡2卡3卡4卡5卡区| 亚洲精品成人久久久久久| 亚洲成人久久爱视频| 国产高清不卡午夜福利| 亚洲国产精品成人综合色| 国产精品人妻久久久久久| 免费不卡的大黄色大毛片视频在线观看 | 日韩欧美 国产精品| 免费人成视频x8x8入口观看| 不卡视频在线观看欧美| 欧美性感艳星| 18+在线观看网站| 亚洲av.av天堂| 99久国产av精品| 22中文网久久字幕| 亚洲国产色片| 身体一侧抽搐| 99久国产av精品国产电影| 两性午夜刺激爽爽歪歪视频在线观看| 乱人视频在线观看| 国内久久婷婷六月综合欲色啪| 国产视频一区二区在线看| 一夜夜www| 亚洲不卡免费看| 亚洲第一区二区三区不卡| 亚洲国产精品成人综合色| 国产亚洲精品av在线| 久久久久久久久久黄片| 国产aⅴ精品一区二区三区波| 国产真实伦视频高清在线观看| 国产精品一区www在线观看| 欧美日韩综合久久久久久| 校园人妻丝袜中文字幕| 国产精品亚洲美女久久久| 少妇的逼好多水| 国产在视频线在精品| 成人三级黄色视频| 亚洲一区高清亚洲精品| 又粗又爽又猛毛片免费看| 一本久久中文字幕| 国产探花极品一区二区| 99九九线精品视频在线观看视频| 国产亚洲精品综合一区在线观看| 国产一区亚洲一区在线观看| 国产高清三级在线| 99热只有精品国产| 国产大屁股一区二区在线视频| 搡老岳熟女国产| aaaaa片日本免费| 老熟妇仑乱视频hdxx| 男插女下体视频免费在线播放| 欧美不卡视频在线免费观看| 嫩草影院新地址| 国产亚洲精品av在线| 亚洲内射少妇av| 十八禁国产超污无遮挡网站| 国产精品国产三级国产av玫瑰| 亚洲人成网站在线播| 国产一区二区三区av在线 | 中国美白少妇内射xxxbb| 精品久久国产蜜桃| 日日摸夜夜添夜夜添小说| 久久久久久久久久黄片| 国产高清三级在线| 黑人高潮一二区| 午夜久久久久精精品| 男女下面进入的视频免费午夜| 干丝袜人妻中文字幕| 日韩av不卡免费在线播放| 久久国内精品自在自线图片| 国语自产精品视频在线第100页| 嫩草影院新地址| 尾随美女入室| 免费观看人在逋| 97超碰精品成人国产| 精品久久久久久久久av| a级一级毛片免费在线观看| 黑人高潮一二区| 亚洲天堂国产精品一区在线| 香蕉av资源在线| 午夜福利成人在线免费观看| 少妇被粗大猛烈的视频| 99热这里只有精品一区| 亚洲成人中文字幕在线播放| 亚洲一区高清亚洲精品| 美女大奶头视频| 99热全是精品| 最好的美女福利视频网| 成人鲁丝片一二三区免费| av中文乱码字幕在线| 最近的中文字幕免费完整| 国产高潮美女av| 免费观看的影片在线观看| 亚洲人成网站在线播放欧美日韩| 美女cb高潮喷水在线观看| 精品不卡国产一区二区三区| 久久天躁狠狠躁夜夜2o2o| 看十八女毛片水多多多| 欧美成人a在线观看| 老熟妇乱子伦视频在线观看| 18禁在线无遮挡免费观看视频 | 成人av在线播放网站| 我的老师免费观看完整版| 国产亚洲av嫩草精品影院| 在线天堂最新版资源| 日韩高清综合在线| 午夜福利在线观看免费完整高清在 | 男人和女人高潮做爰伦理| 久久精品91蜜桃| 日韩欧美精品免费久久| 在线观看免费视频日本深夜| 国产亚洲精品久久久com| 欧美三级亚洲精品| 亚洲国产精品成人久久小说 | 有码 亚洲区| 欧美最黄视频在线播放免费| 久久久精品94久久精品| 日日摸夜夜添夜夜添av毛片| 欧美日韩乱码在线| 日韩,欧美,国产一区二区三区 | 最近视频中文字幕2019在线8| 国产av麻豆久久久久久久| 床上黄色一级片| 日日摸夜夜添夜夜添小说| 国产一区二区在线av高清观看| 美女被艹到高潮喷水动态| 变态另类丝袜制服| 日韩欧美在线乱码| 在线观看美女被高潮喷水网站| 亚洲国产日韩欧美精品在线观看| 男女之事视频高清在线观看| 国产白丝娇喘喷水9色精品| 国产精品久久久久久av不卡| 国产熟女欧美一区二区| 欧美色视频一区免费| 国产高潮美女av| 熟女人妻精品中文字幕| 蜜臀久久99精品久久宅男| 日韩 亚洲 欧美在线| 亚洲激情五月婷婷啪啪| 国产视频内射| 无遮挡黄片免费观看| 极品教师在线视频| 男女做爰动态图高潮gif福利片| 国内久久婷婷六月综合欲色啪| 亚洲综合色惰| 久久久久久久亚洲中文字幕| 国产国拍精品亚洲av在线观看| 亚洲三级黄色毛片| or卡值多少钱| 人妻制服诱惑在线中文字幕| 欧美成人a在线观看| 女同久久另类99精品国产91| 欧美色视频一区免费| 老熟妇仑乱视频hdxx| 少妇人妻精品综合一区二区 | 国产成人91sexporn| 国产aⅴ精品一区二区三区波| 黑人高潮一二区| 青春草视频在线免费观看| 国产一区二区亚洲精品在线观看| 国产午夜精品论理片| 久久综合国产亚洲精品| 亚洲色图av天堂| 性色avwww在线观看| 亚洲欧美精品自产自拍| 美女 人体艺术 gogo| 婷婷精品国产亚洲av在线| 成人鲁丝片一二三区免费| 日韩中字成人| 蜜桃久久精品国产亚洲av| 国产精品一及| 亚洲欧美日韩高清在线视频| 噜噜噜噜噜久久久久久91| 午夜免费男女啪啪视频观看 | 国产精品99久久久久久久久| 性插视频无遮挡在线免费观看| 国产老妇女一区| 男人和女人高潮做爰伦理| 日本黄大片高清| 亚洲av免费高清在线观看| 色哟哟哟哟哟哟| 51国产日韩欧美| 色在线成人网| 蜜桃亚洲精品一区二区三区| 一进一出好大好爽视频| av专区在线播放| 成人漫画全彩无遮挡| 人妻制服诱惑在线中文字幕| 18禁裸乳无遮挡免费网站照片| 国产精品一区二区性色av| 亚洲欧美中文字幕日韩二区| 亚洲成人精品中文字幕电影| 国产精品永久免费网站| 变态另类丝袜制服| 国产精品99久久久久久久久| 欧美成人一区二区免费高清观看| 99久久久亚洲精品蜜臀av| 日本撒尿小便嘘嘘汇集6| 日韩中字成人| 99热这里只有是精品50| 最近视频中文字幕2019在线8| 久久鲁丝午夜福利片| 国模一区二区三区四区视频| ponron亚洲| 亚洲成a人片在线一区二区| 中文字幕精品亚洲无线码一区| 免费在线观看影片大全网站| 97超级碰碰碰精品色视频在线观看| 亚洲精品日韩av片在线观看| 日韩欧美国产在线观看| 一级毛片电影观看 | 精品日产1卡2卡| 国产成人91sexporn| 国产探花在线观看一区二区| 综合色丁香网| 中文亚洲av片在线观看爽| 可以在线观看的亚洲视频| 亚洲欧美日韩无卡精品| 乱码一卡2卡4卡精品| 国产精品三级大全| 日韩,欧美,国产一区二区三区 | 91久久精品国产一区二区成人| 国产精品久久久久久久电影| 亚洲人与动物交配视频| 精品久久久久久久久亚洲| 99久久成人亚洲精品观看| 九色成人免费人妻av| 特级一级黄色大片| 国产成人影院久久av| 大型黄色视频在线免费观看| 91精品国产九色| 高清日韩中文字幕在线| 人人妻人人看人人澡| 69av精品久久久久久| av.在线天堂| 久久精品夜色国产| 在线观看一区二区三区| 99热精品在线国产| а√天堂www在线а√下载| 高清午夜精品一区二区三区 | 亚洲av中文字字幕乱码综合| 69av精品久久久久久| 亚洲中文字幕一区二区三区有码在线看| 三级毛片av免费| 少妇被粗大猛烈的视频| 亚洲欧美日韩高清在线视频| 观看美女的网站| 高清午夜精品一区二区三区 | 尾随美女入室| 最后的刺客免费高清国语| 欧美+亚洲+日韩+国产| 一卡2卡三卡四卡精品乱码亚洲| 精品午夜福利在线看| 国产成人一区二区在线| 最近手机中文字幕大全| 最好的美女福利视频网| 国产又黄又爽又无遮挡在线| 国产精品精品国产色婷婷| 亚洲专区国产一区二区| 三级毛片av免费| 精品国产三级普通话版| 天堂av国产一区二区熟女人妻| 亚洲欧美日韩卡通动漫| 成人av一区二区三区在线看| 亚洲欧美精品综合久久99| 亚洲18禁久久av| 国产免费男女视频| 久久九九热精品免费| 色在线成人网| 成人美女网站在线观看视频| 天美传媒精品一区二区| 国产成人精品久久久久久| 欧美中文日本在线观看视频| 日韩三级伦理在线观看| 麻豆一二三区av精品| 日韩av在线大香蕉| 精品一区二区三区人妻视频| 美女高潮的动态| 男女做爰动态图高潮gif福利片| 亚洲在线自拍视频| 在线观看美女被高潮喷水网站| 成人特级黄色片久久久久久久| 色视频www国产| 国产精品一及| 成人永久免费在线观看视频| 午夜精品在线福利| 搡老岳熟女国产| 国产探花在线观看一区二区| 欧美在线一区亚洲| 欧美一区二区精品小视频在线| 99热这里只有是精品在线观看| 91麻豆精品激情在线观看国产| 人人妻人人看人人澡| 中国美女看黄片| 日本五十路高清| 久久人妻av系列| 欧美日韩乱码在线| 免费在线观看影片大全网站| 校园春色视频在线观看| 久久久精品94久久精品| 欧美日韩综合久久久久久| 麻豆精品久久久久久蜜桃| 久久中文看片网| 中国美白少妇内射xxxbb| 春色校园在线视频观看| 91av网一区二区| 成人一区二区视频在线观看| 99国产精品一区二区蜜桃av| 久久热精品热| 色尼玛亚洲综合影院| 91久久精品国产一区二区三区| 欧美日韩综合久久久久久| 日本黄色片子视频| 国产亚洲91精品色在线| 看十八女毛片水多多多| 免费在线观看成人毛片| 久久久久久久久久黄片| 少妇熟女aⅴ在线视频| 成人性生交大片免费视频hd| 国内揄拍国产精品人妻在线| 欧美高清成人免费视频www| 亚洲欧美清纯卡通| 成人三级黄色视频| 可以在线观看毛片的网站| 久久韩国三级中文字幕| 日产精品乱码卡一卡2卡三| 又黄又爽又刺激的免费视频.| 一夜夜www| 22中文网久久字幕| 午夜久久久久精精品| 一个人免费在线观看电影| 国产高潮美女av| 久久精品国产鲁丝片午夜精品| 深爱激情五月婷婷| 1000部很黄的大片| 直男gayav资源| 超碰av人人做人人爽久久| 国产高潮美女av| 99久久成人亚洲精品观看| 免费观看人在逋| 欧美一区二区精品小视频在线| 亚洲第一电影网av| 午夜亚洲福利在线播放| 在线观看av片永久免费下载| 一本精品99久久精品77| 精品免费久久久久久久清纯| 久久久久久九九精品二区国产| 久久久久精品国产欧美久久久| 午夜亚洲福利在线播放| 精品人妻偷拍中文字幕| 国产aⅴ精品一区二区三区波| 狠狠狠狠99中文字幕| 亚洲精品日韩在线中文字幕 | 亚洲国产高清在线一区二区三| 精品日产1卡2卡| 舔av片在线| 色哟哟哟哟哟哟| 亚洲国产精品国产精品| 国产黄色小视频在线观看| 一进一出抽搐gif免费好疼| 日韩欧美国产在线观看| 岛国在线免费视频观看| 日日啪夜夜撸| 国产色婷婷99|