• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A secure image protection algorithm by steganography and encryption using the 2D-TSCC*

    2021-11-23 07:25:26QiLi李琦XingyuanWang王興元HeWang王赫XiaolinYe葉曉林ShuangZhou周雙SuoGao高鎖andYunqingShi施云慶
    Chinese Physics B 2021年11期
    關(guān)鍵詞:興元李琦

    Qi Li(李琦) Xingyuan Wang(王興元) He Wang(王赫) Xiaolin Ye(葉曉林)Shuang Zhou(周雙) Suo Gao(高鎖) and Yunqing Shi(施云慶)

    1School of Information Science and Technology,Dalian Maritime University,Dalian 116026,China

    2Guangxi Key Laboratory of Multi-source Information Mining&Security,Guangxi Normal University,Guilin 541004,China

    3Dalian Hongwen Middle School,Dalian 116000,China

    4School of Mathematical Sciences,Chongqing Normal University,Chongqing 401331,China

    5Department of Electrical and Computer Engineering,New Jersey Institute of Technology,Newark NJ 07102,USA

    Keywords: 2D-TSCC,steganography,image encryption,mod diffuse,chaos

    1. Introduction

    Due to the openness and sharing of the network, the protection of information has become particularly important.Currently, in the era of full coverage of 5G networks, images are one of the important information interaction tools,and privacy-protecting images have gradually become popular research content.[1-3]Preventing the leakage of image information has gradually become a hot research topic.[4-7]Many image protection methods have been proposed,[8-11]such as steganography,zero watermark,image encryption,and so on.[12-17]

    Because chaotic systems have the characteristics, such as long-term, sensitive to parameters, sensitive to initial values unpredictable,pseudorandomness,and so on.[18-20]Therefore,the encryption algorithm combined with chaotic systems have received widespread attention.[22,23]Many scholars have proposed encryption algorithms.Ye and Wanget al.,proposed a new Chua’s chaotic system with a higher complexity and the system was simulated by hardware. A nonlinear diffusion encryption algorithm was proposed using the system and Arnold mapping.[24]In order to protect the transmission of medical images, Liu and Kadiret al.used a high-dimensional chaotic system on the Galois field and a new image protection scheme with faster encryption speed was proposed.[25]Hau and Jinetal., proposed a new two-dimensional (2D) chaotic system,which has better dynamic behavior than the past system, and used this system to propose an encryption algorithm with higher encryption efficiency.[26]Parvaz and Zarebnia maked a new system through three common one-dimensional (1D)chaotic systems, and use this system for the protection of binary images and grayscale images.[27]Many algorithms are not resistant to selected plaintext attacks. Zhu and Sun proposed an enhanced algorithm to solve this problem.[28]Ullah and Jamalet al.,used the substitution box and chaotic system in image encryption.[29]Wang and Gao proposed the Boolean network encryption base on chaotic systems,and then used the Boolean network to make the secret key in the chaotic image encryption.[30,31]

    Unlike image encryption, steganography not only hides the content of the message,but also hides the communication process itself. Steganography requires a normal digital carrier as a cover to transmit secret information. Steganography have been proposed by many researchers recently. For example, Baluja hides the color image in the same size image.[32]Xie and Changet al., proposed a data hiding scheme which is reversible with a high embedding ability.[33]Ma and Liet al.,proposed the reversible information hiding based on CDM(Code Division Multiplexing).[34]

    So far, the image protection algorithms proposed are all single, single encryption algorithm, or single steganography algorithm. In this paper, the two protection algorithms are combined,and the comparative experimental results also show that with the addition of the steganography,the ciphertext image obtained is closer to the theoretical value in various test indicators.Even if the attacker intercepts the ciphertext image,only the carrier image carrying the secret information can be obtained through the decryption algorithm. If attackers want to get a secret image, they must crack the steganography algorithm. This is undoubtedly more difficult than cracking a single steganography algorithm or encryption algorithm.

    Many chaotic systems have been proposed.[35-37]The one-dimensional chaotic system is simple in form,the chaotic trajectory of the 1D chaotic system is relatively simple and can be easily destroyed. The destroyed system loses randomness and it is not suitable for image encryption. Chaotic systems with more than two dimensions or spatiotemporal chaotic systems have better chaotic properties, but the efficiency in generating chaotic sequences is low. Therefore,many 2D chaotic systems have been proposed,such as 2D logistic map,[38]2DSLMM,[39]H′enon map,[40]and so on. These systems have some problems, such as the small parameter space in the hyperchaotic state and the uneven distribution of chaotic sequences. This paper proposes a new 2D-TSCC system. The system has a larger parameter space,which allows the system to enter a hyperchaotic state, the chaotic sequence is evenly distributed,and most of the values in the window can be taken.Hence,it is very suitable for image encryption.

    In this paper,a new image protection scheme in combination with 2D-TSCC.This solution includes steganography and encryption. Compared with a single steganography or encryption algorithm, the image protection scheme is more secure,because it is very difficult for an attacker to obtain secret information to crack two encryption methods. In the steganography stage,the sequence generated by the 2D-TSCC is used to determine the position of the secret information embedded in the cover image. The sequence generated by the 2D-TSCC is used in the encryption stage for scrambling and diffusion.

    2. The 2D tan-sin-cos-coupling map

    First, a new chaotic system which is called 2D-TSCC is proposed. Then, the chaotic trajectory, Lyapunov exponents,and NIST test of the system are analyzed. Finally, the 2DTSCC is compared with some other 2D systems.

    2.1. Definition of 2D-TSCC

    Due to the small parameter range of low-dimensional chaotic systems, the chaotic sequence is not uniformly distributed. Therefore,this paper proposes a 2D chaotic system In Eq.(1),x ∈[?1,1]andy ∈[?1,1]. Whenμ ∈[2.051,10],the system is in a hyperchaotic state,at this time the sequence distribution of the system is uniform,and the periodic behavior is difficult to predict. The chaotic sequence under this parameter is selected for steganography and encryption.

    2.2. Chaos trajectory

    The chaotic trajectory represents the path of the sequence output. If the trajectory of a chaotic system fills the entire interval,the output of the chaotic system has a better pseudorandomness.

    The trajectories of the 2D-TSCC system are shown in Fig.1.The parameters areμ=2.05,μ=4,μ=6,andμ=10.

    Fig. 1. Chaos trajectories of the 2D-TSCC, (a) chaos trajectory with μ =2.05, (b) chaos trajectory with μ =4, (c) chaos trajectory with μ =6, (d)chaos trajectory withμ =10.

    The chaos trajectories of the 2D-TSCC system is compared with the chaos trajectories of some classic 2D chaotic systems.

    (i)2D logistic map is proposed by Wuet al.,[24]

    The chaotic trajectory of 2D logistic map(x0=0.5724,y0=0.603, andα=1.18), 2D-SLMM (x0=0.5724,y0=0.603,β=0.9,andε=3),and H′enon map(x0=0.5724,y0=0.603,ξ=1.4,andτ=0.3)are shown in Fig.2.

    Fig.2. Trajectories of three 2D chaotic maps: (a)2D logistic map, (b) 2DSLMM,and(c)H′enon map.

    From Figs.1 and 2,the trajectories of the 2D-TSCC system fills the entire space, while the trajectories of the systems (i), (ii), and (iii) do not fill the entire space. The 2DTSCC system has a wider range of values,which can take all the values in the interval, while the systems (i), (ii), and (iii)can only take part of the values in the interval. Therefore,the value of the 2D-TSCC system is more random,which is more suitable for steganography and image encryption.

    2.3. Lyapunov exponents

    Lyapunov exponent is an important index that characterizes the dynamic behavior of the system.[41-43]The dynamic system with a positive Lyapunov exponent is chaotic.A high-dimensional chaotic system may have multiple positive Lyapunov exponents. When a dynamic system has two or more positive Lyapunov exponents, the system is hyperchaotic. Hyperchaotic systems have better chaotic characteristics and more complex dynamics.It is defined as follows:[24]

    Fig. 3. Lyapunov exponents of 2D-TSCC, (a) Lyapunov exponents withμ ∈[0,10], (b) Lyapunov exponents with μ ∈[1.2,2.8], and (c) Lyapunov exponents withμ ∈[3.4,4.3].

    It can be seen from Fig. 3, whenμ ∈(1.33,1.425) andμ ∈(1.435,1.53), the system is in a chaotic state. Whenμ ∈(1.56,1.59),the system switches between chaos and hyperchaos. Whenμ ∈(2.051,10], the system is in a hyperchaotic state. This paper selects the parameters in a hyperchaotic state, and generates a chaotic sequence for steganography and encryption.

    The Lyapunov exponents of systems(i),(ii)(ε=3),and(iii)(τ=0.3)are shown in Fig.4.

    Fig.4. Lyapunov exponents:(a)Lyapunov exponents of 2D logistic map,(b)Lyapunovs exponents of 2D-SLMM,and(c)Lyapunov exponents of H′enon map.

    Comparing the Lyapunov exponent of systems (i), (ii),and (iii), the 2D-TSCC has a wider range of parameters in a hyperchaotic state, so the 2D-TSCC system is more suitable for steganography and image encryption.

    2.4. NIST test

    In this section,the randomness of the sequence generated by the chaotic system is tested by NIST,and the test results are shown in Table 1.

    Table 1. NIST test of the chaotic sequence.

    The chaotic sequence generated in this paper has passed 15 tests,so it can show that the sequence generated by the 2DTSCC has good randomness.

    3. Steganography and encryption algorithm

    This section proposes a safe method of protecting images,which includes steganography and encryption. First,an image that needs to be protected is steganographically written in a carrier image, then combined with the 2D-TSCC, the carrier image embedded in the secret image is encrypted,and the ciphertext is obtained,thereby playing the role of double protection of the image.

    3.1. Steganography

    Steganography is a way of hiding information. Steganography focuses more on making people unable to perceive the existence of secret image. The plaintext is hidden in the cover image by substitution. Suppose the secret image isHS×Tand the cover image isPM×N. The steganography algorithm is as follows.

    Step 1 Convert the cover image to a binary image, and each pixel value includes 8-bit values. Each bit can form an image,

    In Eq. (8), bg(x,y) represents the extraction of they-th from the binary numberx. Two examples are given as

    Take the Lena as an example. According to the above steps,8 images can be obtained in Fig.5.

    The 1 in the first bit only represents 1 (20), but in the eighth bit, it represents 128 (27). Therefore, use the following formula to describe the amount of information contained in each bit:[44]It can be seen from Table 2 that the 1st bit,the 2nd bit,and the 3rd bit contain the least amount of information, so the secret image is hidden in these three bits of the cover image.

    Table 2. Information of different bits.

    Fig.5. Image at each bit, (a)image of the 1st-bit, (b)image of the 2nd-bit,(c)image of the 3rd-bit,(d)image of the 4th-bit,(e)image of the 5th-bit,(f)image of the 6th-bit,(g)image of the 7th-bit,and(h)image of the 8th-bit.

    Step 2 Convert the secret image to a binary,a key stream is generated by the 2D-TSCC system,and determine the position of the secret image inserted into the cover image according to this key stream. Each pixel value of the cover image can carry one bit of the secret image.The cover image carrying the secret image is obtained.

    According to the rules, the relationship of the secret imageHU×Tthat the cover imagePM×Ncan carry is

    3.2. Steganography and encryption base on chaos

    The secret image isHU×Tand the cover image isPM×N,the carrier image containing the secret information isPH. The algorithm is described as follows.

    Start Input the cover imagePM×Nand the secret imageHU×T.

    Step 1 The secret keyhis generated from the cover image through SHA512,

    Step 6 Convert the secret image to a binary image, the size of the bit stream contained in secret image is 8×U×T.Take the first 8×U×Telements of the cover image and convert them to bits. Then the secret imageHis steganographically written in the cover imagePand the new cover imagePHis obtained as

    Step 10 Find the point with the same number inA3, and recordA4as

    Step 11 Scrambling the cover imagePHaccording toA4,the scrambling method is

    In Eq.(19),CS(a,b)is the displacement function,an example ofCS(a,b):

    For a better understanding, the following shows the scrambling process with an example,as shown in Fig.6.

    Fig.6. An example of scrambling.

    Step 12x0=d3,y0=d4,andμare brought into the 2DTSCC system to get the chaotic sequencesXandY,

    Step 13 Process the scrambling matrixSto get the ciphertextC:

    The reverse operation of this process is

    End Output ciphertextC.

    4. Performance analysis

    Some experimental results of the algorithm are given in this section. Some tests are performed on the experimental results to verify safety,including statistical tests and robustness analysis.

    4.1. Experimental results

    Fig. 7. Experimental results: (a) secret image, (b) cover image, (c) cover image carrying secret image,(d)scrambling of image(c),(e)encrypted image of panel(d), (f) decryption of cover image containing secret image, (g)decrypted cover image,and(h)decrypted secret image.

    4.2. Key space analysis and key sensitivity analysis

    The secret key in this article is generated by SHA512,as shown in Step 2 of Subsection 3.2. Select the first 384 bits of SHA512. The key space size is:

    When the key space is greater than 2100, it is considered that this algorithm can resist brute force attacks. The key space of this article is 2384, so an attacker cannot crack the algorithm by brute force attacks.

    Fig. 8. Key sensitivity analysis: (a) restore through the correct key, (b) restore through the key of b1+10?15,(c)restore through the key of b2+10?15,(d) restore through the key of b3+10?15, (e) restore through the key of b4+10?15,(f)restore through the key of b5+10?15,and(g)restore through the key of b6+10?15.

    Experiments show that the algorithm proposed in this paper is sensitive to the secret key, and the decryption key is unique. The algorithm can only get the plaintext information through the secret key provided by the sender,so the algorithm is safe.

    4.3. Histogram analysis

    The histogram analysis is an indicator to describe the distribution ofpixelvalues,whichisto countthe frequency of the same pixelvalue inthe image.[45]Usually thepixel value distribution of the plaintext is not uniform, but after a secure encryption algorithm, the number of times the same pixel value of the ciphertext appears is almost equal. Uneven histograms can cause information leakage, and attackers can crack the algorithm based on statistical analysis. The secret image Mangray 128×128 is hidden in the cover image Lenagray 512×512,the histogram analysis of Man gray,Lena, Lena-Man, and the ciphertext of Lena-Man are shown in Fig.9.

    Fig.9. Histogram analysis: (a)secret image of Man,(b)histograms of Man,(c)cover image of Lena,(d)histograms of Lena,(e)cover image carrying secret image of Lena-Man,(f)histograms of Lena-Man,(g)ciphertext of Lena-Man,and(h)histograms of ciphertext.

    The distribution of the histogram of the cover image carrying secret image is not uniform,but after the encryption algorithm in this article,the distribution of the histogram of the ciphertext is uniform. A attacker cannot infer the information of the cover image from the ciphertext,so the algorithm has a better ability to resist statistical attacks.

    4.4. Adjacent pixel correlation

    The adjacent pixel correlation is another indicator of resistance statistics. The adjacent pixel correlation analyzes the adjacent pixel correlation(horizontal,vertical,diagonal).Normally, the adjacent pixel correlation of the plaintext is very large. After a secure encryption algorithm,the adjacent pixel correlation of the ciphertext is very small. A attacker cannot infer the distribution of the plaintext through the ciphertext. The calculation formula of adjacent pixel correlation is described as follows:[46]

    where,

    This article analyzes the adjacent pixel correlation (horizontal, vertical, diagonal) of this algorithm from two angles. (I)Test the ciphertext obtained by the encryption algorithm on the carrier image,and test the correlation between adjacent pixels of the ciphertext. (II) After the test carrier image is embedded with the secret information Man,a new carrier cover-Man is obtained, and the new carrier is encrypted , Test the correlation between adjacent pixels of the ciphertext. Figure 10 shows different cover images.Table 3 shows the adjacent pixel correlation.

    It can be seen from Table 3 that the correlation of the cover image is large, but after the encryption algorithm, the correlation of the ciphertext is small. The ciphertext of the cover image containing secret image and the ciphertext of the cover image not containing secret image have little fluctuation in correlation. Therefore, it can be shown that the algorithm has a good ability to resist statistical attacks.

    Table 3. Adjacent pixel correlation.

    Fig.10. Cover images.

    4.5. Information entropy

    Information entropy is an important indicator for detecting the distribution of image pixel values, it is calculated as follows:

    The value of information entropy is closer to 8,indicating that the information contained in the image is confusing, and the attacker cannot find useful information on the image. On the contrary,the value is far away from 8,indicating that the possibility of information leakage is high,and the attacker can find the key information cracking the algorithm.

    The information entropy of the algorithm is analyzed from two perspectives. One is to test the ciphertext information entropy of the cover images in Fig. 10, and the other is to test the ciphertext information entropy of the cover images who is embedded with the secret image of Man.Table 4 shows the information entropy of the two ciphertexts.

    The following conclusions can be drawn from Table 4.The information entropy of the ciphertext obtained by the algorithm is close to 8. When only the encryption algorithm is used, the maximum value of the algorithm is 7.99943, the minimum value is 7.999925,and the average value is 7.99932.When the secret image is embedded in the carrier image to obtain the ciphertext image. The maximum value is 7.99941,the minimum value is 7.99920,and the average value is 7.99932.The ciphertext of the cover image containing secret image and the ciphertext of the cover image not containing secret image have little fluctuation in information entropy. Therefore,it can be explained that the attacker cannot obtain the key information to estimate the distribution of the plaintext pixel value,so the algorithm is security.

    Table 4. Information entropy.

    4.6. Differential attack

    The number of pixels changing rate(NPCR)and unified averaged changed intensity (UACI) are important indicators of the differential attacks. A attacker observes the difference between the two ciphertexts by making a small change to the plaintext. A secure algorithm,even if a small change is made to the plaintext, the ciphertexts are different. The NPCR and UACI are defined as In Eq.(25),D(i,j)=0 ifC1(i,j)=C2(i,j),andD(i,j)=1 ifC1(i,j)?=C2(i,j).

    The NPCR and UACI are analyzed from two perspectives. One is the ciphertext of the cover image and ciphertext of the cover image change one bit, and the other is the ciphertext of the cover image containing the secret image and the ciphertext of the cover image containing the secret image change one bit. Each image randomly selects 50 groups of points for testing,and the average value is shown in Table 5.

    When only the encryption algorithm is used, the maximum values are 99.6368 and 33.5284,the minimum values are 99.5789 and 33.4185,and the average values are 99.6074 and 33.4704.When the secret image is embedded in the carrier image to obtain the ciphertext image. The maximum values are 99.6151 and 33.5561, the minimums value are 99.5853 and 33.3931,and the average values are 99.6024 and 33.4722.

    The experimental data in Table 5 show that the NPCR and UACI are very close to the theoretical values,so it is possible to show that the algorithm proposed in this paper has the ability to resist the differential attack.

    Table 5. NPCR and UACI.

    4.7. Robustness analysis

    In general, information will suffer some interferences during transmissions, such as loss of some information and noise attacks. Even if a secure algorithm is subjected to these attacks, it can still get some information of plaintext through decryption algorithm. In this subsection,we perform different levels of cropping attacks and noise attacks on the ciphertext.Cove image and secret image are obtained through the decryption algorithm which are shown in Figs.11-14.

    Fig. 11. Decryption results after 1/8 cropping attacks: (a) 1/8 block attack,(b)decrypted of cover image,and(c)decrypted of secret image.

    Fig.12. Decryption results after 1/16 cropping attacks:(a)1/16 block attack,(b)decrypted of cover image,and(c)decrypted of Secret image.

    Fig.13. Decryption results after 0.1 salt&Pepper noise: (a)0.1 salt&Pepper noise,(b)decrypted of cover image,and(c)decrypted of secret image.

    Fig. 14. Decryption results after 0.01 salt & Pepper noise: (a) 0.01 salt &Pepper noise, (b)decrypted of cover image, and(c)decrypted of secret image.

    The experimental results show that even if the ciphertext has been attacked,partial information can still be obtained by decryption. Therefore,the algorithm has better robustness.

    4.8. NIST test

    This section uses the NIST test to test the randomness of the ciphertexts,and the test results are shown in the following Table 6.

    Table 6. NIST test of the ciphertexts.

    The test results show that the ciphertext obtained by the algorithm has good randomness.

    4.9. Comparing with other algorithms

    The proposed algorithm is compared with some classic encryption algorithms(Refs.[7,47-50]),including the information entropy,the adjacent pixel correlation,the NPCR,and UACI,the results are shown in Table 7.

    Table 7. Compare with other algorithms.

    5. Conclusion

    A safe image protection scheme is proposed in this paper.The highlight of this paper are as follows:

    (I)This paper proposes a new 2D chaotic system,i.e.,2DTSCC.Compared with other 2D chaotic systems,this system has a larger parameter space and the chaotic trajectory spreads over the entire window, so it is more suitable for image encryption and image steganography.

    (II)Combined with 2D-TSCC,a dual protection scheme for images is proposed. The program includes image steganography and image encryption. The design of this algorithm can ensure the security of the image during transmission.

    (III) Compared with other algorithms, including information entropy,NPCR,UACI,adjacent pixel correlation,and other indicators,this algorithm has better security.

    The proposed algorithm can be applied to the protection of trademarks and some design drawings. In order to prevent these commercially valuable information from being stolen during transmission. In the transmission process, the algorithm proposed in this paper is used for protection to achieve the role of information protection.

    In this paper, the algorithm is a new attempt to combine steganography and encryption. Although the embedding ability of the algorithm is low,the experimental results show that the ciphertext is more secure. In future work, we will design algorithms that combine steganography and encryption with higher embedding capabilities.

    猜你喜歡
    興元李琦
    情系鄉(xiāng)村振興的最美老干部——艾興元
    An image encryption algorithm based on spatiotemporal chaos and middle order traversal of a binary tree
    Synchronously scrambled diffuse image encryption method based on a new cosine chaotic map
    Force-constant-decayed anisotropic network model: An improved method for predicting RNA flexibility
    An active tunable Fano switch in a plasmafilled superlattice array
    An image encryption algorithm based on improved baker transformation and chaotic S-box?
    論非物質(zhì)文化遺產(chǎn)“活化”傳承
    李琦作品
    李琦作品
    劉興元小說(shuō)二題
    18禁在线无遮挡免费观看视频| 最近最新中文字幕大全电影3| 欧美性猛交╳xxx乱大交人| av.在线天堂| 国产亚洲精品av在线| 非洲黑人性xxxx精品又粗又长| 偷拍熟女少妇极品色| av在线观看视频网站免费| 中文字幕av在线有码专区| 人妻久久中文字幕网| 久久精品国产亚洲网站| 亚洲欧美清纯卡通| av视频在线观看入口| 深夜精品福利| 少妇人妻一区二区三区视频| 精品熟女少妇av免费看| 国产免费男女视频| 久久精品久久久久久久性| 校园人妻丝袜中文字幕| 久久人人精品亚洲av| 日本熟妇午夜| 国产91av在线免费观看| 丝袜美腿在线中文| 91av网一区二区| 人妻制服诱惑在线中文字幕| 女人被狂操c到高潮| 一级毛片久久久久久久久女| 日本五十路高清| 久久亚洲国产成人精品v| 久久精品国产亚洲网站| 中国国产av一级| 97超视频在线观看视频| 一进一出抽搐gif免费好疼| 99久久精品一区二区三区| 最近的中文字幕免费完整| 日本av手机在线免费观看| 亚洲成人中文字幕在线播放| 国语自产精品视频在线第100页| 嘟嘟电影网在线观看| 一本久久中文字幕| 亚洲精品粉嫩美女一区| 国产一区二区三区av在线 | 丰满的人妻完整版| 国产高潮美女av| 亚洲欧美日韩东京热| 如何舔出高潮| 国产人妻一区二区三区在| 青春草亚洲视频在线观看| 熟女电影av网| 国产探花在线观看一区二区| 久久国内精品自在自线图片| 国产亚洲91精品色在线| ponron亚洲| 又粗又爽又猛毛片免费看| 真实男女啪啪啪动态图| av卡一久久| 国产亚洲91精品色在线| 色哟哟哟哟哟哟| 老女人水多毛片| 人妻少妇偷人精品九色| 欧美性猛交╳xxx乱大交人| 日本免费a在线| 久久国内精品自在自线图片| 一本久久中文字幕| 男人狂女人下面高潮的视频| 国产91av在线免费观看| 联通29元200g的流量卡| 成人美女网站在线观看视频| 免费av观看视频| 黄色配什么色好看| 小说图片视频综合网站| 欧美丝袜亚洲另类| 欧美性猛交╳xxx乱大交人| 中文字幕熟女人妻在线| 听说在线观看完整版免费高清| 欧美精品国产亚洲| 国产一区二区激情短视频| 中国国产av一级| 在线观看美女被高潮喷水网站| av在线天堂中文字幕| 69人妻影院| 搡老妇女老女人老熟妇| 欧美性猛交╳xxx乱大交人| 国产一区二区三区在线臀色熟女| 国产精品日韩av在线免费观看| 亚洲无线在线观看| 搡老妇女老女人老熟妇| 国产成人影院久久av| 国产一级毛片在线| 成人午夜精彩视频在线观看| 国产亚洲精品久久久久久毛片| 国产亚洲5aaaaa淫片| 美女黄网站色视频| 美女xxoo啪啪120秒动态图| 国产成人影院久久av| 久久精品夜色国产| 最近最新中文字幕大全电影3| 日韩欧美在线乱码| 中文字幕av在线有码专区| 久久精品国产鲁丝片午夜精品| 免费看日本二区| 午夜激情福利司机影院| 给我免费播放毛片高清在线观看| 淫秽高清视频在线观看| 国产高清有码在线观看视频| 欧美成人a在线观看| 简卡轻食公司| 亚洲av电影不卡..在线观看| 一级毛片aaaaaa免费看小| 国产精品不卡视频一区二区| 日日摸夜夜添夜夜添av毛片| 搞女人的毛片| 夜夜看夜夜爽夜夜摸| av在线蜜桃| av在线观看视频网站免费| 26uuu在线亚洲综合色| 91麻豆精品激情在线观看国产| 九九热线精品视视频播放| 国产精品三级大全| 欧美日韩乱码在线| 最新中文字幕久久久久| 免费电影在线观看免费观看| 国产女主播在线喷水免费视频网站 | 最近2019中文字幕mv第一页| 天美传媒精品一区二区| 亚洲七黄色美女视频| 性色avwww在线观看| 男插女下体视频免费在线播放| 久久国内精品自在自线图片| 国内精品宾馆在线| 国产精品美女特级片免费视频播放器| 1024手机看黄色片| 毛片女人毛片| 久99久视频精品免费| 中文字幕精品亚洲无线码一区| 热99re8久久精品国产| 午夜激情福利司机影院| 国产精品一二三区在线看| 国产一级毛片在线| 欧美高清性xxxxhd video| 中文字幕人妻熟人妻熟丝袜美| 99热精品在线国产| av专区在线播放| 赤兔流量卡办理| 波多野结衣巨乳人妻| 亚洲成av人片在线播放无| 成人特级黄色片久久久久久久| 国产一级毛片七仙女欲春2| 人妻制服诱惑在线中文字幕| 婷婷亚洲欧美| 国语自产精品视频在线第100页| 一级黄色大片毛片| 插逼视频在线观看| 边亲边吃奶的免费视频| 国产爱豆传媒在线观看| av天堂在线播放| 91av网一区二区| 日韩制服骚丝袜av| 国产精品国产三级国产av玫瑰| 长腿黑丝高跟| 91久久精品国产一区二区三区| 成人漫画全彩无遮挡| 久久韩国三级中文字幕| 性插视频无遮挡在线免费观看| 一边摸一边抽搐一进一小说| 亚洲欧美中文字幕日韩二区| 国产成人aa在线观看| 国产日本99.免费观看| 久久99热6这里只有精品| 欧美成人精品欧美一级黄| 国产精品久久电影中文字幕| 中文在线观看免费www的网站| 国产av麻豆久久久久久久| 欧美一区二区国产精品久久精品| 一级二级三级毛片免费看| 日韩成人av中文字幕在线观看| 色播亚洲综合网| 插阴视频在线观看视频| 在线免费十八禁| 51国产日韩欧美| 嘟嘟电影网在线观看| 国产乱人偷精品视频| 精品久久久久久久人妻蜜臀av| 国产精品不卡视频一区二区| 少妇高潮的动态图| 成年女人看的毛片在线观看| 精品久久久久久久久亚洲| 高清日韩中文字幕在线| 九九热线精品视视频播放| 亚洲欧美日韩卡通动漫| 午夜免费激情av| 干丝袜人妻中文字幕| 亚洲美女搞黄在线观看| 免费观看精品视频网站| 欧美日韩国产亚洲二区| 亚洲成人av在线免费| 两个人的视频大全免费| 3wmmmm亚洲av在线观看| 久久精品国产清高在天天线| 有码 亚洲区| 天天躁日日操中文字幕| 1024手机看黄色片| 一级av片app| 久久久久久久亚洲中文字幕| 人人妻人人看人人澡| 欧美激情久久久久久爽电影| 91午夜精品亚洲一区二区三区| 国产真实伦视频高清在线观看| 美女国产视频在线观看| 亚洲av成人av| 一级毛片久久久久久久久女| 插阴视频在线观看视频| 国产麻豆成人av免费视频| 女的被弄到高潮叫床怎么办| 日韩大尺度精品在线看网址| 久久亚洲国产成人精品v| 日本成人三级电影网站| 男人舔奶头视频| 国产成年人精品一区二区| 狠狠狠狠99中文字幕| a级毛色黄片| 高清在线视频一区二区三区 | 欧美在线一区亚洲| 男人和女人高潮做爰伦理| 欧美高清性xxxxhd video| 欧美最黄视频在线播放免费| 国产精品一区二区三区四区免费观看| 国产高潮美女av| 亚洲熟妇中文字幕五十中出| 国产一区二区三区在线臀色熟女| 性色avwww在线观看| 久99久视频精品免费| 老女人水多毛片| 国产精品99久久久久久久久| 欧美一区二区精品小视频在线| 色噜噜av男人的天堂激情| av又黄又爽大尺度在线免费看 | 国产女主播在线喷水免费视频网站 | 91久久精品国产一区二区三区| 亚洲精品久久国产高清桃花| 乱系列少妇在线播放| 日本一本二区三区精品| 寂寞人妻少妇视频99o| av又黄又爽大尺度在线免费看 | 菩萨蛮人人尽说江南好唐韦庄 | 99国产极品粉嫩在线观看| 久久精品国产亚洲av香蕉五月| 久久综合国产亚洲精品| 在线免费十八禁| 直男gayav资源| 日本在线视频免费播放| 尾随美女入室| 3wmmmm亚洲av在线观看| 欧美成人a在线观看| 久久久久性生活片| 免费看日本二区| 久久久a久久爽久久v久久| 国产精品不卡视频一区二区| 国产熟女欧美一区二区| 中文精品一卡2卡3卡4更新| 给我免费播放毛片高清在线观看| 一本精品99久久精品77| 熟女电影av网| 久久久久久久久久黄片| 国产真实乱freesex| 啦啦啦观看免费观看视频高清| 一进一出抽搐gif免费好疼| 久久久精品94久久精品| 麻豆乱淫一区二区| 日日摸夜夜添夜夜添av毛片| www.av在线官网国产| 欧美精品一区二区大全| 亚洲内射少妇av| videossex国产| 国产日本99.免费观看| 搞女人的毛片| 国产免费男女视频| 欧美一区二区精品小视频在线| 一区福利在线观看| 国产精品爽爽va在线观看网站| 亚洲成人久久爱视频| 别揉我奶头 嗯啊视频| 白带黄色成豆腐渣| 国产蜜桃级精品一区二区三区| 国产精品久久久久久av不卡| 国产精品蜜桃在线观看 | 99视频精品全部免费 在线| 亚洲国产精品sss在线观看| 青青草视频在线视频观看| 国产日本99.免费观看| 一级毛片aaaaaa免费看小| 亚洲中文字幕一区二区三区有码在线看| 中文欧美无线码| 一级毛片久久久久久久久女| 一本一本综合久久| 亚洲第一电影网av| 人体艺术视频欧美日本| 亚洲国产欧美人成| 日韩亚洲欧美综合| 黄色欧美视频在线观看| 欧美日韩综合久久久久久| 免费av毛片视频| 最后的刺客免费高清国语| 欧美另类亚洲清纯唯美| 久久精品国产亚洲av涩爱 | 国产成人a∨麻豆精品| 别揉我奶头 嗯啊视频| www.av在线官网国产| 99国产极品粉嫩在线观看| 天堂√8在线中文| 亚洲va在线va天堂va国产| 尤物成人国产欧美一区二区三区| 九草在线视频观看| 欧美+亚洲+日韩+国产| 国产男人的电影天堂91| 亚洲高清免费不卡视频| 如何舔出高潮| 婷婷亚洲欧美| 国产av不卡久久| 精品无人区乱码1区二区| 成人永久免费在线观看视频| 久久久久久久久大av| 毛片女人毛片| 欧美激情国产日韩精品一区| 看非洲黑人一级黄片| 日韩高清综合在线| 亚洲在线自拍视频| 亚洲精品自拍成人| а√天堂www在线а√下载| 精品99又大又爽又粗少妇毛片| 人体艺术视频欧美日本| 床上黄色一级片| 一进一出抽搐动态| 国产伦理片在线播放av一区 | 99久久精品热视频| 午夜福利在线观看吧| 国产激情偷乱视频一区二区| 免费观看a级毛片全部| 国产一区二区在线av高清观看| 亚洲婷婷狠狠爱综合网| 桃色一区二区三区在线观看| 精品国内亚洲2022精品成人| 婷婷精品国产亚洲av| АⅤ资源中文在线天堂| 最近的中文字幕免费完整| 看免费成人av毛片| av又黄又爽大尺度在线免费看 | 蜜臀久久99精品久久宅男| 亚洲aⅴ乱码一区二区在线播放| 欧美另类亚洲清纯唯美| 麻豆成人av视频| 亚洲精品成人久久久久久| 一级毛片电影观看 | 日韩欧美三级三区| 精品人妻熟女av久视频| 天天一区二区日本电影三级| avwww免费| 禁无遮挡网站| av黄色大香蕉| 日本黄大片高清| 国产亚洲91精品色在线| 日韩 亚洲 欧美在线| 欧美日韩国产亚洲二区| 久久精品国产自在天天线| 美女cb高潮喷水在线观看| 亚洲三级黄色毛片| 麻豆久久精品国产亚洲av| 国产亚洲91精品色在线| 麻豆乱淫一区二区| 国产亚洲av片在线观看秒播厂 | 男的添女的下面高潮视频| 天堂√8在线中文| 99热这里只有是精品在线观看| 熟妇人妻久久中文字幕3abv| 亚洲欧美日韩无卡精品| 激情 狠狠 欧美| 日韩一区二区三区影片| 国产午夜精品一二区理论片| 天天躁夜夜躁狠狠久久av| 亚洲无线在线观看| 一级av片app| 久久久久国产网址| av免费在线看不卡| 欧美xxxx黑人xx丫x性爽| 一级av片app| 久久鲁丝午夜福利片| 欧美bdsm另类| 性插视频无遮挡在线免费观看| 国产精品永久免费网站| 国产成人精品久久久久久| 亚洲最大成人av| 国产单亲对白刺激| 国产白丝娇喘喷水9色精品| 美女大奶头视频| 天美传媒精品一区二区| 国产v大片淫在线免费观看| 国产探花极品一区二区| www日本黄色视频网| 天天躁日日操中文字幕| 成人美女网站在线观看视频| 嘟嘟电影网在线观看| 久久人妻av系列| 91久久精品电影网| 热99在线观看视频| 能在线免费看毛片的网站| 久久精品久久久久久久性| 久久韩国三级中文字幕| 在线播放无遮挡| 日产精品乱码卡一卡2卡三| 久久久久久久久大av| 国产亚洲av嫩草精品影院| 99热6这里只有精品| 美女cb高潮喷水在线观看| 国产精品久久视频播放| 国产黄色视频一区二区在线观看 | 中文欧美无线码| 亚洲精品日韩av片在线观看| 精品人妻视频免费看| 日韩制服骚丝袜av| 精品久久国产蜜桃| 蜜臀久久99精品久久宅男| 网址你懂的国产日韩在线| www.色视频.com| 色综合站精品国产| 精品免费久久久久久久清纯| 日日干狠狠操夜夜爽| 最近手机中文字幕大全| 亚洲欧美日韩高清专用| 人妻系列 视频| 欧美色欧美亚洲另类二区| 精品久久久久久久久久免费视频| 国产精品电影一区二区三区| 久久热精品热| 国产精品国产三级国产av玫瑰| 嫩草影院新地址| 日韩欧美精品免费久久| 久久久久久久久久久丰满| 亚洲,欧美,日韩| 1000部很黄的大片| 国产女主播在线喷水免费视频网站 | 亚洲乱码一区二区免费版| 久久这里只有精品中国| 免费观看的影片在线观看| 国产又黄又爽又无遮挡在线| 国产大屁股一区二区在线视频| 国产日韩欧美在线精品| 欧美+日韩+精品| 悠悠久久av| 亚洲av免费在线观看| 我要看日韩黄色一级片| 国产淫片久久久久久久久| 久久久久久久久久久丰满| 日韩欧美在线乱码| 亚洲欧美日韩无卡精品| 色哟哟·www| 人妻少妇偷人精品九色| 91精品一卡2卡3卡4卡| 三级国产精品欧美在线观看| 欧美一级a爱片免费观看看| 亚洲av中文av极速乱| 国产午夜精品久久久久久一区二区三区| 亚州av有码| 日韩av在线大香蕉| 欧美另类亚洲清纯唯美| 亚洲电影在线观看av| 久久99热这里只有精品18| 嫩草影院入口| 日本在线视频免费播放| 久久精品国产亚洲av涩爱 | 午夜视频国产福利| 午夜福利在线观看免费完整高清在 | eeuss影院久久| 久久精品国产清高在天天线| 免费人成视频x8x8入口观看| 国产日本99.免费观看| 国产精品人妻久久久久久| 尾随美女入室| 国产成人午夜福利电影在线观看| 又粗又爽又猛毛片免费看| 26uuu在线亚洲综合色| 国产精品久久视频播放| 日韩成人伦理影院| 国产精品福利在线免费观看| 精品免费久久久久久久清纯| av卡一久久| 天堂av国产一区二区熟女人妻| 成人毛片a级毛片在线播放| 18禁在线播放成人免费| 久久精品国产亚洲网站| 在线播放无遮挡| 久久久成人免费电影| 午夜精品在线福利| 免费黄网站久久成人精品| 日本黄色视频三级网站网址| 久久久久久伊人网av| 中国美女看黄片| 日韩欧美在线乱码| 亚洲精品日韩在线中文字幕 | 亚洲欧美日韩高清专用| 丝袜喷水一区| .国产精品久久| 91久久精品国产一区二区三区| 精品免费久久久久久久清纯| 啦啦啦啦在线视频资源| 欧洲精品卡2卡3卡4卡5卡区| 欧美日韩综合久久久久久| 丰满的人妻完整版| 亚洲精品影视一区二区三区av| 中文字幕人妻熟人妻熟丝袜美| 成年版毛片免费区| 2022亚洲国产成人精品| 久久久久久久久大av| 成年免费大片在线观看| 国产探花极品一区二区| 哪个播放器可以免费观看大片| 简卡轻食公司| 不卡视频在线观看欧美| 久久欧美精品欧美久久欧美| 国产一区二区三区在线臀色熟女| 青春草国产在线视频 | 波多野结衣高清无吗| 国产一区二区三区在线臀色熟女| 久久久国产成人精品二区| 夜夜看夜夜爽夜夜摸| 国产成年人精品一区二区| 麻豆国产av国片精品| 伦理电影大哥的女人| 12—13女人毛片做爰片一| 哪里可以看免费的av片| 18禁在线无遮挡免费观看视频| 国产黄色视频一区二区在线观看 | 波多野结衣高清作品| 亚洲aⅴ乱码一区二区在线播放| 国产v大片淫在线免费观看| 身体一侧抽搐| 亚洲最大成人av| 中文字幕精品亚洲无线码一区| 91精品一卡2卡3卡4卡| 亚洲乱码一区二区免费版| 亚洲最大成人av| 成年av动漫网址| 一区二区三区高清视频在线| 成人午夜高清在线视频| 老司机福利观看| 国产成人午夜福利电影在线观看| 日韩欧美三级三区| 国产麻豆成人av免费视频| 大型黄色视频在线免费观看| 国产一区二区在线av高清观看| 日本一二三区视频观看| 熟女电影av网| 中文字幕熟女人妻在线| 国产色婷婷99| 久久99蜜桃精品久久| 最近的中文字幕免费完整| 日本熟妇午夜| 2021天堂中文幕一二区在线观| 岛国在线免费视频观看| 国产av一区在线观看免费| 91午夜精品亚洲一区二区三区| 听说在线观看完整版免费高清| 亚洲精品456在线播放app| 亚洲激情五月婷婷啪啪| 一级毛片久久久久久久久女| 欧美极品一区二区三区四区| 亚洲精品久久久久久婷婷小说 | 日韩高清综合在线| 久久久久国产网址| 一区福利在线观看| 成人二区视频| 久久精品人妻少妇| 熟女人妻精品中文字幕| 啦啦啦韩国在线观看视频| 美女国产视频在线观看| 午夜老司机福利剧场| 亚洲在久久综合| 爱豆传媒免费全集在线观看| 色尼玛亚洲综合影院| 成人毛片60女人毛片免费| 变态另类丝袜制服| 日韩大尺度精品在线看网址| 婷婷色综合大香蕉| 好男人在线观看高清免费视频| 亚洲av二区三区四区| 偷拍熟女少妇极品色| 少妇熟女aⅴ在线视频| 久久精品国产清高在天天线| 中文在线观看免费www的网站| 最好的美女福利视频网| 91久久精品国产一区二区成人| 免费观看精品视频网站| 91aial.com中文字幕在线观看| 精品无人区乱码1区二区| 免费观看在线日韩| 美女cb高潮喷水在线观看| 少妇熟女aⅴ在线视频| 欧美在线一区亚洲| 欧美日韩国产亚洲二区| 丝袜美腿在线中文| 日本一本二区三区精品| 边亲边吃奶的免费视频| 久久99热6这里只有精品| 色哟哟哟哟哟哟| 一进一出抽搐动态| 黄色日韩在线| 国产成人影院久久av| 亚洲中文字幕日韩| 精品人妻视频免费看| 国产成年人精品一区二区| 99热这里只有是精品在线观看| 婷婷亚洲欧美| 在线免费观看的www视频| 国产在线精品亚洲第一网站| 深夜a级毛片| 精品久久久久久成人av|