• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Multi Sensor-Based Implicit User Identification

    2021-12-11 13:29:32MuhammadAhmadRanaAamirRazaManuelMazzaraSalvatoreDistefanoAliKashifBashirAdilKhanMuhammadShahzadSarfrazandMuhammadUmarAftab
    Computers Materials&Continua 2021年8期

    Muhammad Ahmad,Rana Aamir Raza,Manuel Mazzara,Salvatore Distefano,Ali Kashif Bashir,Adil Khan,Muhammad Shahzad Sarfraz and Muhammad Umar Aftab

    1Department of Computer Science,National University of Computer and Emerging Sciences,Chiniot,35400,Pakistan

    2Department of Computer Science,Bahauddin Zakariya University,Multan,66000,Pakistan

    3Institute of Software Development and Engineering,Innopolis University,Innopolis,420500,Russia

    4Dipartimento di Matematica e Informatica—MIFT,University of Messina,Messina,98121,Italy

    5Department of Computing and Mathematics,Manchester Metropolitan University,Manchester,UK

    Abstract:Smartphones have ubiquitously integrated into our home and work environments, however, users normally rely on explicit but inefficient identification processes in a controlled environment.Therefore, when a device is stolen,a thief can have access to the owner’s personal information and services against the stored passwords.As a result of this potential scenario,this work proposes an automatic legitimate user identification system based on gait biometrics extracted from user walking patterns captured by smartphone sensors.A set of preprocessing schemes are applied to calibrate noisy and invalid samples and augment the gait-induced time and frequency domain features,then further optimized using a non-linear unsupervised feature selection method.The selected features create an underlying gait biometric representation able to discriminate among individuals and identify them uniquely.Different classifiers are adopted to achieve accurate legitimate user identification.Extensive experiments on a group of 16 individuals in an indoor environment show the effectiveness of the proposed solution:with 5 to 70 samples per window,KNN and bagging classifiers achieve 87-99%accuracy, 82-98%for ELM,and 81-94% for SVM.The proposed pipeline achieves a 100% true positive and 0%false-negative rate for almost all classifiers.

    Keywords: Sensors; smartphone; legitimate user identification

    1 Introduction

    Smartphone users exponentially increased to 3 billion and are expected to further grow by several hundred million in coming years.Boosted by information and communication technologies,mobile, and personal devices are becoming a more and more powerful and thus trustworthy inseparable companion of our lives.Our cyber alter egos often store sensitive personal information such as photos, videos, bank account, credit, and debit card details, as well as cookies, passwords,and personal data managed by Internet applications.Such information should be kept confidential and not disclosed, preserving the smartphone from unauthorized access [1].Robust and reliable user identification methods can be an effective solution for achieving smartphone security [2].

    Considering that each individual has their walking pattern, a gait (user walking) based identification mechanism has been proposed in [3,4] using built-in sensors such as an accelerometer and linear accelerometer.Gait-based legitimate user identification has more advantages than limits, including but not limited to unobtrusiveness, passive, implicit, concurrent, and continuous observability.However, the main advantage is the cost-effectiveness, exploiting built-in sensors without any additional hardware required for the identification, just walking with the smartphone.Furthermore, gait-based legitimate user identification avoids identification processing and delays during login by continuously operating in the background while the user is walking.It is also hard to violate since an attacker needs to exactly reproduce the smartphone owner’s gait, which depends on their silhouette and activity, captured by several-different sensors.Gait-based legitimate user identification can also be used as one of the security levels in multilevel security systems [5]combining gait patterns with other security info in crime analysis.

    In recent years, several identification approaches have been proposed leveraging smartphone’s sensors such as [6-9].For instance, [10,11] presented a method for continuous user identification implicitly.Explicit identification is performed only when there is important evidence of change in the user activity, which is not a real-life scenario in many cases.A method to directly compute the distance between pattern traces using the dynamic time warping algorithm is presented in [12].Sae et al.[13] presents 22 special touch patterns for user identification, most of which involve all five fingers simultaneously.The work [14] studied the correlation between 22 analytic features from touch traces and classified them using k-nearest neighbors and support vector machines.Moreover, the idea behind the behavior-based model is that the person’s habits are a set of attributes; therefore, each activity (event) correlates with two fundamental attributes:time and space.For instance, the works [15,16], utilizes the user calls, schedules, GNSS, device battery level, user applications, and sensors for identification.The works [17-20] proposed a multi-modelbased continuous user identification.Whereas, the work [21] put forward another unique implicit user identification framework by using recorded phone call history and location for continuous user identification.

    The above-discussed works present several propositions, but to some extent, all these required additional information and source for user identification.Several works have been proposed to overcome these propositions, such as [22] presented a gait-based user identification over biometric unobtrusive pattern.A geometric concept of a convex hull was utilized in 4-layered architecture.One of the major limitations is non-user-friendliness, e.g., only works in specific and controlled environments.The works [18,23-27] utilized portable devices based on gait signals acquired with a 3-dimensional accelerometer, where the accelerometer was put on the user’s belt only at the back.Whereby, [18] proposed a 3-fold method based on data distribution statistics, correlation, and frequency domain features for user identification while the individuals are intentionally asked to walk at different speeds such as slow, normal, and fast.Mantyjarvi’s work is novel but the major drawback is its limitations to not only walked by the same user but with very limited variations.

    Despite the success of the gait-based systems demonstrated by a relevant number of existing solutions, summarized above as well as in Tab.1, there is still room for improving this approach,strongly depending on factors like physical changes i.e., aging, weight loss, or gain, injury, shoes,clothes, carrying objects, orientation, and placement, walking surface, psychological states of an individual, stimulants, etc.All these factors significantly reduce the effectiveness of the gait-based system in real scenarios.

    Table 1:Summary of related work

    Considering the aforementioned scenarios, this work proposes a novel, non-intrusive, and automatic legitimate user identification system exploiting built-in smartphone motion dynamics captured by four different sensors namely, Accelerometer (AC), Linear Accelerometer (LAC),Gyroscope (GY), and Magnetometer (MM) sensors, able to overcome the limitations of existing solutions.To test the system, we first collect raw data from 16 individuals walking with the smartphone freely placed in one of their pants pockets then extracting relevant features from the raw data.To reduce the redundancy among such features a non-linear Extended Sammon Mapping Projection (ESMP) feature selection method is adopted, thus resulting in an underlying representation for the gait characteristics able to uniquely identify individuals.Finally, SVM,KNN, Bagging, and ELM are implemented and compared to show the effectiveness-accuracy of the proposed gait-based legitimate user identification.In a nutshell, the following points are added in this research as compared to the previous works.

    (1) Previous works only considered an activity/sub-activity-based user identification, however,our current research aims to propose a semi-controlled environment system in which we overcome the limitations of users’jeans style (loose or tight) and walking style (we intentionally asked users to walk differently in various times to investigate the ambulatory activity performed by each user).In this regard, our current work aims to investigate several research questions relevant to building a walking-based legitimate user identification system in real-life:

    (a):How to achieve real-time user identification in practice? Since our goal is to develop an algorithm that identifies the user in real-time, thus computation complexity is extremely important.System performance measurements ought to be considered to balance the tradeoff between accuracy and computational cost.(b):Does the data variation affect the performance of the LUI process? (c):Does the ESMP, a non-linear unsupervised feature selection method improve the identification accuracy more than the other existing and well-studied unsupervised feature selection methods such as Principal Component Analysis(PCA)? It is a known fact that the output of the smartphone sensor depends on the position of the smartphone while walking.This could result in a high within-class variance.Therefore, it is desirable to improve both the discriminatory power and achieve dimensionality reduction, by employing an optimum method.The advantages of the feature selection process are to avoid the curse of dimensionality, as well as to reduce the abundant,irrelevant, misleading, and noisy features, but above all, to be able to reduce the system’s running cost of real-time applications.In addition to the above, effective feature selection can increase the accuracy of the resulting model.(d):Does kernel-based Extreme Learning Machine (KELM) an effective classifier for the non-linear signal-based user identification method than the state-of-the-art classification methods such as SVM, KNN, and Bagging?The reason to choose these classifiers, because these have been extensively utilized in the literature and rigorously analyzed for comparative analysis.Moreover, this work aims to show that the proposed pipeline can work well with a diverse set of classifiers.

    (2) In our current work, we have invited 16 users with 4 activities i.e., user walked with the phone freely placed in one of their pants pockets i.e., front left, front right, back left, back right.

    (3) Previous works only considered a limited number of features extracted from two types of sensors, however, this work further involved the gait based features together with frequency and time domain features obtained through four different sensors which provide more confidence towards the ultimate results.

    2 Methodology

    Smartphone sensors generate highly fluctuating time-series signals making legitimate user identification more challenging.Therefore, it is required to transform raw signals into relevant and meaningful features through a complex process including preprocessing, feature extraction,and selection.

    2.1 Hardware and Preprocessing

    Smartphones are equipped with a variety of sensors that are useful for monitoring device movements.Some of them are AC, LAC, GY, and MM in which AC and LAC record the acceleration along three axes (x,y,z) and can measure both the effects of Earth’s gravity on the device and device movement, whereas, GY and MM eradicate the effects of Earth’s gravity.The smartphone (LG Nexus 4 smartphone with Android Wear v4.2 OS in the experiments) runs a custom application gathering data from sensors temporarily stored into a text file in a micro SD card and then transferred to a computer.The sensor sampling frequency is set to 50 Hz and in total, 10 min of raw samples were gathered from each individual without any fixed protocol while carrying a smartphone in one of their pants pockets.It is worth mentioning that different smartphones have different sampling rates, therefore, to control the sensor reading process and for better generalization and validation, the sample rate is set to 50 Hz instead to use the highest sampling rate within different smartphones.For these reasons, we split the raw signals into windows (5 to 105 samples per window, respectively) to control the flow rate hence passing fewer data to the system.The selected sample size provides enough data to be able to extract quality features while ensuring a fast response.Before extracting relevant features, a third ordered moving average filter is applied in the preprocessing stage to reduce the sensor noise.

    2.2 Feature Extraction

    The feature extraction process first analyzes sensor reading by applying time series modeling(i.e., Auto-regressive [49], Moving average [50], and both auto-regressive and moving average models) to understand the behavior of users’physical patterns which reveals unusual observations and data patterns.Partial Auto-Correlation (PAC) and Auto-Correlation (AC) coefficients are used to identify the best model which revealed the pattern of each datum.Later each model is determined individually based on the characteristics of the theoretical PAC and AC.The best fit time-series model is calculated by estimating the parametric values based on the former model.Auto-regressive and moving average parameters are estimated through the box Jenkins model due to its flexibility for the inclusion of both models.The model and parameters need to be verified to ensure that the estimated results are statistically significant.Our experiments revealed that the frequency and time domain features, including the coefficients from the time-series model, provide the best accuracies.Therefore, as listed in Tab.2, gait, frequency, and time-domain features are extracted from raw signals for each sensor individually.In total, 180 features are extracted from each window.

    2.3 Feature Selection

    The sensor’s output mainly depends upon the position of the smartphone, which may result in a high within-class variance.Therefore, it is required to enhance the discriminatory power of features that can achieve by deploying an optimum feature selection method.The feature selection process eliminates the irrelevant, abundant, noisy, and misleading features that reduce the system cost on run-time applications and improve the accuracy of the resulting model.A number of feature selection methods have been used for legitimate user identification.Filtering methods are interdependent to the classifier and depend on discriminating criteria i.e., maximum relevance and minimum redundancy.These methods are scalable, fast, and less computationally complex;however, ignore the interaction with the classifier.Wrapper methods utilize the classifier as a black box to obtain a subset based on their predictive power.The main drawback of the wrapper method is its dependency on the classifier which makes the classifier choice a key component.LDA and KLDA seek a linear combination of features.However, the number of dimensions depends on the number of classes which limits the use of such methods, especially for legitimate user identification.

    Table 2:Extracted features for gait-based legitimate user identification

    To overcome the aforementioned issues, ESMP was first introduced in [28] for smartphonebased physical activity recognition and legitimate user identification.ESMP is a nonlinear metric multi-dimensional scaling method that projects the high dimensional input space into lower dimensions while preserving the structure of inter-point distances.Letdijandd?ijbe the Euclidean distance between two neighboring pointsxiandxjin input and mapped space, respectively.The Sammon stress errorEbetween the input and mapped space can be measured asE=which is further optimized by the gradient descent method asbe thekth coordinate ofxiin mapped space.The gradient descent methods have issues at inflation points in which the second-order derivatives appear to be quite small therefore the trade-off parameterαneeds to be set as a minimum (in our caseα=[0.3-0.4] using grid search).However, there is no guarantee that the given interval is to be optimal for all problems.

    2.4 Classifier

    The selected features are processed through KELM, Bagging, SVM, and KNN.Several statistical measures are performed on the resulting false and true positive rates, ROC, and accuracies for legitimate user identification are calculated for a different number of samples per window.

    2.4.1 Kernel Extreme Learning Machine(KELM)

    ELM has a fast learning speed and better generalization abilities than other neural network frameworks.ELM randomly generates the input weights and bias with the help of a simple activation function.The tune-able activation functions were proposed to overcome the random assignments [51].However, finding suitable combinations for activation functions is still in infancy.The KELM is used when the feature mapping functions of hidden neurons are unknown.However, the kernel parameters need to be tuned very carefully when it comes to real-time applications.Therefore, our current study explores the use of a swarm optimizer to tune the kernel parameters.In this hierarchy, at the first hidden layer, all nonlinear piece-wise continuous functions can be used as hidden neurons as these parameters need not be tuned.Thus,for N samples i.e.,(xi,yi)|xi∈Rnandyi∈Rmwherei=1,2,3,...,Nand the output function can be represented aswhereLis the number of hidden neurons,βi=[β1,β2,β3,...,βL] be the output weights among the output neurons and hidden layer.Finally,hi(x)=[h1(x),h2(x),h3(x),...,hL(x)] be the output vector that maps the input to the feature space.The least-square solution that minimizes the error between training and output weights to boost the generalization capabilities can be represented as

    whereT,H, andCare expected output, hidden layer output, and regularization coefficients respectively.Thus, the training model output is expressed as;

    The output and kernel functionf (x)for unknown hidden mappingh(x)can be written asM=HHTwhereThus, the final representation can be expressed as

    wherebe the kernel function,a,bare the tune-able parameters that play an important role.

    2.4.2 Support Vector Machine(SVM)

    Among the most popular methods for regression and classification problems, SVM is the most common classifier.SVM has been deployed for several real-world applications for instance bioinformatics, biometrics, cheminformatics, and remote sensing [52].The SVM hierarchy works in two phases as the training examples are used to build the model for classification later the trained model is used to classify an unknown example.The tuning parameters of SVM are considered as key to success for any classification problems.These parameters include kernel and penalty parameters [53].The penalty is important to maintain a trade-off between maximizing the decision margin while minimizing the training error [54].Whereas, the kernel parameters are used to map the low dimensional input feature space to a higher dimensional feature space.These two parameters are labeled as a backbone to control the performance of SVM for any classification problem.SVM works while separating several known classes using the concept of hyperplanes and achieved remarkable results in linearly separable data examples [55-60].

    3 Results

    The classifier’s output indicates the ability to predict which user is walking while carrying the smartphone without considering its orientation, age, and gender.The 5-fold cross-validation process is adopted to get meaningful and statistically significant results.The cross-validation process split the dataset into 5 equal subsets in which 4 subsets are selected to train the model and the remaining subset is selected to validate the model.This process is repeated 5-times by picking a new subset (every time) as a validation set and the remaining subsets are used as training data lead to a total of 5 experiments that are weighted for the result.The proposed pipeline has been evaluated against 3 different types of classifiers such as KNN, SVM, and Bagging.The reason to choose these classifiers, because these have been extensively utilized in the literature and rigorously analyzed for comparative analysis.Moreover, this work aims to show that the proposed pipeline can work well with a diverse set of classifiers.For KELM, [1-500] hidden neurons are selected,and SVM is evaluated with the polynomial kernel, similarly, for KNN, k is set to [2-20].For bagging, a tree-based method is used to train the classifier from a range of [1-100] trees.All the parameters are adjusted carefully while setting up the experiments.The reason to provide the range is that because the number of samples in each round (samples per window) changes so the parameters need to be tuned in each round.For the main proposal, KELM classifier training and testing accuracy concerning the number of hidden neurons is presented in Fig.1.For fare experimental evaluation of our proposed pipeline, several benchmark metrics are bring considered such as overall and average accuracies.For experimental validation and statistical analysis, true positive (TP), false positive (FP), true negative (TN), and false-negative (FN) is usually computed from the confusion matrix shown in Figs.2a-2h.

    Moreover, to validate the statistical significance, several statistical measures are considered such as Recall, Precision, and F1-score.Furthermore, this work carried out several statistical tests including but not limited to true positive rate (TPR), true negative rate (TNR), false-positive rate(FPR), and false-negative rate (FNR).Meanwhile, this study also used several other statistical measures to validate the performance of our proposed model as shown in Tabs.3-6.The FPR and TPR show two crucial aspects as TPR and FPR show how usable and secure this would be as a legitimate user identification model.A low TPR shows that several legitimate attempts to identify would fail, thus making this too much of a burden to use, whereas a high FPR means illegitimate users could bypass the security and identification when they were not supposed to.Therefore, the ultimate goal of this work is to attain high TPR and low FNR as much as possible.The average statistical measures are computed as follows, wherembe the number of users.

    Figure 1:ELM:accuracy vs. hidden neurons

    Figure 2:Confusion matrices for KELM, Bagging, KNN, and SVM for two different window sizes(i.e., 5 and 105).(a) 5 Samples per window for KELM (b) 105 Samples per window for KELM(c) 5 Samples per window for Bagging (d) 105 Samples per window for Bagging (e) 5 Samples per window for KNN (f) 105 Samples per window for KN (g) 5 Samples per window for SVM(h) 105 Samples per window for SVM

    where NPV stands for Negative Predictive Values, FDR is False Discovery Rate, and FOR is False Omission Rate.NPV is the score of the negative statistical results based on TN and FN values across the users used in this study.FDR and FOR are usually used in multiple hypothesis testing to make sure the multiple comparisons.FOR can be computed by taking the complement of NPV values or another way around, it can be measured using TN and FN values.FOR is used to measure the rate of false negatives, which are incorrectly rejected whereas, FDR measures the actual positives which were incorrectly identified.

    Table 3:Statistical tests for KELM classifier for all users

    In-terms of machine learning, extensive model performance measurement is required.Moreover, when it comes to the classification, the overall accuracy is shown in Fig.3 and the area under the curve, such as the receiver Operating Characteristics Curve (ROC) is an essential evaluation metric at various threshold settings.ROC is a probability curve that measures the degree of separability among classes.ROC curve is plotted with TPR against the FPR values obtained through the classification method.To validate the statistical significance of the proposed pipeline,the ROC has been drawn for two different sample sizes i.e., 5 and 105 samples per window.

    The results are presented in Fig.3 uphold the effectiveness of the proposed pipeline for real-time applicability with a 99% confidence interval of legitimate user identification by using a pairwise T-test between groups of individuals.Looking at Fig.3, significant statistical results are seen; showing that all the classifiers outperform.Finally, we present the computational cost in terms of the time of enlisted experiments.Fig.4 shows the computational time taken by the feature extraction and feature selection process for average users with a different number of samples per window.

    Table 4:Statistical tests for bagging classifier for all users

    Table 5:Statistical tests for KNN classifier for all users

    Table 6:Statistical tests for SVM classifier for all users

    Figure 3:Cumulative overall accuracy across all the users for all classifiers

    As shown in Fig.5, the processing time is increased gradually at the start and then increased exponentially as the sample size increases.Therefore, to cope with the high computational time may become an important issue for the legitimate user identification system for larger sample sizes.There are many ways to overcome such high computational time, however, this one needs to work on fewer features, i.e., either gait-based features or time and frequency domain feature processed through one of the feature selection methods but this may bring incompetency for statistical significance.

    From experimental results, one can conclude that the ESMP helps to boost legitimate user identification performance.Based on the results listed in Fig.3 and Tabs.3-6, we observe that the ESMP together with almost all classifiers works better and accurately than the several state-of-the-art legitimate user identification methods.The experiments show the process of analyzing the behavior of a different number of samples per window taken by the user for legitimate user identification (i.e., 05:05:105).Fig.2 presents the accuracy of our proposed pipeline for an individual user being identified correctly with the different number of samples per window after the fusion of four different built-in sensors data.From the results, we found that the proposed pipeline produces acceptable results with 30-50 samples per window.Fig.3 enlists the results of overall accuracy across all users with a 99% confidence interval.

    Figure 4:ROC for two different sample sizes, i.e., 5 and 105 samples per window.Here are the values of Auc’s for each classifier:KELM=0.8175 (5 samples) and 0.9853 (105 samples).Bagging=0.8734 (5 samples) and 0.9988 (105 samples).SVM=0.8161 (5 samples) and 0.9408(105 samples).KNN=0.9197 (5 samples) and 0.9993 (105 samples)

    Figure 5:Processing Time with a different number of samples per window selected ([5:5:105]) in each round for Legitimate User Identification.All the experiments are carried out on a notebook using MATLAB (2017a) on Intel Core (TM) i5 CPU 2.40~GHz, with 8 GB RAM

    4 Comparison Against State-of-the-Art Solutions

    Hereby we present and compare some of the critical works from the literature [1,4,28-34,36-38] that can be categorized into two groups such as implicit and multi-modality biometrics.All these methods have some limitations i.e., required some additional information and source or may require user interaction.Therefore, to some extent, all these methods are innovative but require some external legitimate user identification process.The works compared in Tab.7 require user interaction in-terms to perform a predefined activity or user data has been gathered in controlled environments that are not a real representation of frequent user interactions.Therefore,the proposed method could be considered as an exciting alternative for continuous and explicit legitimate user identification or impostor identification in a semi-controlled environment.Hence the proposed method overcomes the limitations of the smartphone in power consumption and user interaction.We have worked on combining different feature extraction and selection techniques and concatenating the selected features to deliver a reliable legitimate user identification model using built-in sensors data in a semi-controlled environment.

    Table 7:Cross subjects performance comparison with state-of-the-art works

    As we earlier discussed, this study focuses on the idea of identifying a smartphone user by applying different walking patterns.Furthermore, it is assumed that the phone is freely placed without any particular orientation inside any of the user’s pants pockets (front left, front right,back left, back right).Thus to answer the questions “Does the ESMP, a non-linear unsupervised feature selection method improve the identification accuracy more than the other existing and wellstudied unsupervised feature selection methods such as Principal Component Analysis (PCA)?”and “Does the data variation affect the performance of the LUI process?” Tab.8 enlists the comparative analysis of these two different feature selection methods with a different number of features and different locations of a smartphone.

    Table 8:Average accuracy, confidence intervals, and time is taken for legitimate user identification for 50 samples per window with different feature selection methods and different number of features for two different sensors data

    5 Conclusion

    Smartphones are becoming increasingly popular that has forced the community to study the security implications of these devices.This work suggested that gait-based legitimate user identification is possible in an uncontrolled environment with some limitations.The proposed pipeline has some attractive features to its applicability such as smaller confidence intervals that imply more reliability in training.Furthermore, holding a permanent structure is a useful feature for hardware constraints such as transforming the trained model into a chip which can further increase device security by not allowing software-based attacks but only hardware manipulations.These hardware operations would require access to the smartphone hence making such attacks subject to the device defense.

    The proposed pipeline achieves a 100% true positive and 0% false-negative rate for almost all classifiers.However, to further validate the claims, it may be useful to check the sensor quality while changing the smartphone as well as with different operating systems.

    The key advantage of our study is that the samples for each user are collected on different days with different jeans, locations, and orientations which significantly helps to understand the characteristic behavior of users which is an essential component for any legitimate user identification system.However, one of the main limitations of gait-based legitimate user identification is that the signals inconsistency e.g., signal reliability, degrades significantly between days due to many factors such as a change in habits, mood, workload, etc.which we will address in our future studies.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    中文字幕久久专区| 五月开心婷婷网| 国产精品久久久久久久电影| 亚洲欧洲国产日韩| 人人妻人人添人人爽欧美一区卜| 在线观看www视频免费| 精品一品国产午夜福利视频| 日韩欧美 国产精品| 国产精品秋霞免费鲁丝片| 综合色丁香网| 亚洲人与动物交配视频| 中文字幕久久专区| 久久免费观看电影| 精品久久久久久久久av| 水蜜桃什么品种好| 亚洲av成人精品一区久久| h日本视频在线播放| 少妇人妻一区二区三区视频| 搡老乐熟女国产| av不卡在线播放| 国产乱人偷精品视频| 看免费成人av毛片| 国产欧美日韩综合在线一区二区 | 久久久久网色| 一个人免费看片子| 国产熟女欧美一区二区| 久久久久视频综合| 日韩亚洲欧美综合| 一级毛片aaaaaa免费看小| 免费观看av网站的网址| 亚洲自偷自拍三级| 久久久久精品性色| 久热这里只有精品99| 亚洲国产精品一区二区三区在线| 大片电影免费在线观看免费| 国产精品一区www在线观看| 一级爰片在线观看| 成人毛片a级毛片在线播放| 97超视频在线观看视频| 曰老女人黄片| 久久久欧美国产精品| 中文字幕人妻丝袜制服| 国产亚洲91精品色在线| 国产精品99久久99久久久不卡 | 亚洲欧美精品自产自拍| 精品久久久久久久久av| 国产视频内射| 日本黄色日本黄色录像| 人人妻人人澡人人看| av在线播放精品| 婷婷色av中文字幕| 精品少妇黑人巨大在线播放| 精品国产乱码久久久久久小说| 久久青草综合色| 国产一级毛片在线| 性高湖久久久久久久久免费观看| 精品久久久久久电影网| 国产精品久久久久成人av| 乱码一卡2卡4卡精品| 国产精品一区二区在线观看99| 26uuu在线亚洲综合色| 国产国拍精品亚洲av在线观看| 久久午夜福利片| 美女视频免费永久观看网站| 久久久国产精品麻豆| 国产伦精品一区二区三区视频9| 免费观看无遮挡的男女| 极品教师在线视频| 色网站视频免费| 一区二区av电影网| 99久久精品国产国产毛片| 观看免费一级毛片| 伊人亚洲综合成人网| 亚洲内射少妇av| 精品人妻熟女av久视频| 亚洲性久久影院| 日本色播在线视频| 99九九在线精品视频 | 亚洲内射少妇av| 熟女人妻精品中文字幕| 亚洲久久久国产精品| 91aial.com中文字幕在线观看| 成人18禁高潮啪啪吃奶动态图 | 老熟女久久久| 亚洲经典国产精华液单| 国产一区亚洲一区在线观看| 亚洲人与动物交配视频| 欧美日本中文国产一区发布| 日本wwww免费看| 王馨瑶露胸无遮挡在线观看| 新久久久久国产一级毛片| 久久久久久久久久人人人人人人| 少妇人妻久久综合中文| 色婷婷久久久亚洲欧美| 欧美老熟妇乱子伦牲交| 国产极品粉嫩免费观看在线 | 在线 av 中文字幕| 日韩精品免费视频一区二区三区 | 国产在线男女| 成人黄色视频免费在线看| 国产黄片视频在线免费观看| 亚洲精品乱码久久久v下载方式| 亚洲经典国产精华液单| 日本猛色少妇xxxxx猛交久久| 欧美日韩av久久| 80岁老熟妇乱子伦牲交| 中文欧美无线码| 日本爱情动作片www.在线观看| 特大巨黑吊av在线直播| 寂寞人妻少妇视频99o| 午夜久久久在线观看| 国产黄色视频一区二区在线观看| 欧美激情国产日韩精品一区| av免费在线看不卡| 日韩亚洲欧美综合| 人人妻人人看人人澡| 一区二区三区精品91| 欧美日韩视频高清一区二区三区二| 美女视频免费永久观看网站| 午夜福利在线观看免费完整高清在| xxx大片免费视频| 夜夜骑夜夜射夜夜干| 国产乱来视频区| 国产在线视频一区二区| 国产精品成人在线| 9色porny在线观看| 高清在线视频一区二区三区| 日韩av不卡免费在线播放| av天堂久久9| 免费看av在线观看网站| 欧美三级亚洲精品| 9色porny在线观看| 亚洲人成网站在线播| 欧美日韩综合久久久久久| 国产欧美另类精品又又久久亚洲欧美| 超碰97精品在线观看| 性高湖久久久久久久久免费观看| 多毛熟女@视频| 人妻系列 视频| 日本黄色日本黄色录像| 中国三级夫妇交换| 国产成人aa在线观看| 欧美激情国产日韩精品一区| 精品午夜福利在线看| 国产美女午夜福利| 国产白丝娇喘喷水9色精品| 97超视频在线观看视频| 国产无遮挡羞羞视频在线观看| 内射极品少妇av片p| 成人国产麻豆网| 夜夜骑夜夜射夜夜干| 国产在线男女| av福利片在线| 夜夜骑夜夜射夜夜干| 欧美变态另类bdsm刘玥| 美女国产视频在线观看| 中文乱码字字幕精品一区二区三区| 赤兔流量卡办理| 国产一区二区三区av在线| 91精品伊人久久大香线蕉| 黄色欧美视频在线观看| 精华霜和精华液先用哪个| 成人无遮挡网站| 亚洲丝袜综合中文字幕| 少妇被粗大猛烈的视频| 在现免费观看毛片| 日日摸夜夜添夜夜添av毛片| 一本色道久久久久久精品综合| 亚洲人与动物交配视频| 大香蕉久久网| 国产精品欧美亚洲77777| 热re99久久精品国产66热6| 五月开心婷婷网| 国产成人精品婷婷| 九九爱精品视频在线观看| 日本黄大片高清| 18禁在线播放成人免费| 又黄又爽又刺激的免费视频.| 精品人妻偷拍中文字幕| 久久99热这里只频精品6学生| 久久久国产欧美日韩av| 日韩中字成人| 乱系列少妇在线播放| 不卡视频在线观看欧美| 各种免费的搞黄视频| 亚洲欧美日韩另类电影网站| 精品熟女少妇av免费看| 9色porny在线观看| 免费人成在线观看视频色| 一区在线观看完整版| 久久国内精品自在自线图片| 亚洲欧美日韩东京热| 爱豆传媒免费全集在线观看| 啦啦啦啦在线视频资源| 亚洲av日韩在线播放| 少妇裸体淫交视频免费看高清| 高清在线视频一区二区三区| 免费高清在线观看视频在线观看| 女性被躁到高潮视频| 午夜福利,免费看| 成人国产av品久久久| 国产精品伦人一区二区| 两个人的视频大全免费| 六月丁香七月| 人妻一区二区av| 日本色播在线视频| 久久久久国产精品人妻一区二区| 大陆偷拍与自拍| 丰满乱子伦码专区| 久久久久久久亚洲中文字幕| 3wmmmm亚洲av在线观看| 久久久久国产精品人妻一区二区| 午夜福利在线观看免费完整高清在| 天堂8中文在线网| 中文字幕制服av| 亚洲国产精品一区二区三区在线| 热re99久久国产66热| 亚洲人成网站在线观看播放| 在线观看三级黄色| 欧美成人午夜免费资源| 久久99精品国语久久久| 中文乱码字字幕精品一区二区三区| 成年人免费黄色播放视频 | 免费黄网站久久成人精品| 国产成人精品无人区| 日韩成人av中文字幕在线观看| 观看免费一级毛片| 一区在线观看完整版| 国产淫片久久久久久久久| 大香蕉久久网| 99九九线精品视频在线观看视频| 亚洲av成人精品一区久久| 精品久久久久久久久亚洲| 老司机影院成人| 十八禁网站网址无遮挡 | 欧美老熟妇乱子伦牲交| 国产精品免费大片| 丁香六月天网| 26uuu在线亚洲综合色| 久久精品夜色国产| 国产成人精品无人区| 91精品国产国语对白视频| 国产欧美日韩精品一区二区| 久久久久视频综合| av线在线观看网站| 成人黄色视频免费在线看| 亚洲国产精品成人久久小说| 免费av不卡在线播放| 丰满迷人的少妇在线观看| 久久久国产欧美日韩av| 亚洲国产av新网站| 美女视频免费永久观看网站| 亚洲真实伦在线观看| 亚洲精品国产av成人精品| 国产成人一区二区在线| 啦啦啦在线观看免费高清www| 欧美 日韩 精品 国产| 午夜福利网站1000一区二区三区| 能在线免费看毛片的网站| 国产毛片在线视频| 男女边吃奶边做爰视频| 国产一区有黄有色的免费视频| 观看av在线不卡| 人妻少妇偷人精品九色| 亚洲欧美一区二区三区黑人 | 精品熟女少妇av免费看| 欧美日韩国产mv在线观看视频| 国产伦理片在线播放av一区| 亚洲精品国产成人久久av| 国产精品麻豆人妻色哟哟久久| 成人黄色视频免费在线看| 国产精品99久久99久久久不卡 | 日日撸夜夜添| av线在线观看网站| 成人黄色视频免费在线看| 最近2019中文字幕mv第一页| 日韩欧美 国产精品| 日韩欧美精品免费久久| 女人久久www免费人成看片| 男女国产视频网站| 午夜免费观看性视频| 亚洲伊人久久精品综合| 黑人巨大精品欧美一区二区蜜桃 | 交换朋友夫妻互换小说| 大片免费播放器 马上看| 欧美人与善性xxx| 多毛熟女@视频| 少妇精品久久久久久久| 九九久久精品国产亚洲av麻豆| a级毛色黄片| 中文天堂在线官网| 国产精品熟女久久久久浪| 人人妻人人澡人人爽人人夜夜| 99九九线精品视频在线观看视频| 精品一品国产午夜福利视频| 一边亲一边摸免费视频| 少妇精品久久久久久久| 亚洲精品乱久久久久久| 国产色爽女视频免费观看| 精品国产乱码久久久久久小说| 国产精品国产三级国产专区5o| 亚洲av日韩在线播放| 一级毛片我不卡| 性高湖久久久久久久久免费观看| 久久 成人 亚洲| 日韩成人伦理影院| 一级二级三级毛片免费看| 青春草视频在线免费观看| 国产伦精品一区二区三区视频9| 亚洲国产欧美日韩在线播放 | 国产爽快片一区二区三区| 这个男人来自地球电影免费观看 | 午夜视频国产福利| 日本猛色少妇xxxxx猛交久久| tube8黄色片| 又大又黄又爽视频免费| 18禁动态无遮挡网站| 国产精品成人在线| 妹子高潮喷水视频| 国产亚洲5aaaaa淫片| 男人爽女人下面视频在线观看| 成人亚洲欧美一区二区av| 欧美日韩视频高清一区二区三区二| 少妇的逼水好多| 精品午夜福利在线看| 乱码一卡2卡4卡精品| 草草在线视频免费看| 男人狂女人下面高潮的视频| 国产熟女午夜一区二区三区 | 91精品一卡2卡3卡4卡| 多毛熟女@视频| 大又大粗又爽又黄少妇毛片口| 久久久久视频综合| 亚洲第一av免费看| 2018国产大陆天天弄谢| 日本欧美视频一区| 日韩av免费高清视频| 亚洲第一av免费看| 少妇的逼好多水| 国产色婷婷99| 国产亚洲91精品色在线| 久久婷婷青草| 精品久久国产蜜桃| 午夜免费观看性视频| 国产亚洲欧美精品永久| 中文字幕久久专区| 多毛熟女@视频| 精品视频人人做人人爽| 97在线视频观看| 大又大粗又爽又黄少妇毛片口| 亚洲自偷自拍三级| 免费人成在线观看视频色| 在线观看三级黄色| 在线观看免费视频网站a站| 国产欧美另类精品又又久久亚洲欧美| 日韩视频在线欧美| 国产精品欧美亚洲77777| 亚洲丝袜综合中文字幕| 亚洲精品国产色婷婷电影| 少妇被粗大的猛进出69影院 | 午夜日本视频在线| 亚洲欧美日韩另类电影网站| 亚洲精品,欧美精品| 国产精品熟女久久久久浪| h视频一区二区三区| 久久精品久久久久久噜噜老黄| 国产免费一区二区三区四区乱码| 内地一区二区视频在线| 你懂的网址亚洲精品在线观看| av一本久久久久| 特大巨黑吊av在线直播| 三级国产精品欧美在线观看| 人人妻人人添人人爽欧美一区卜| 亚洲国产毛片av蜜桃av| 国产精品偷伦视频观看了| 春色校园在线视频观看| 久久亚洲国产成人精品v| av免费在线看不卡| 超碰97精品在线观看| 亚洲国产精品一区二区三区在线| 最近中文字幕高清免费大全6| 大又大粗又爽又黄少妇毛片口| 日韩伦理黄色片| 51国产日韩欧美| 亚洲av二区三区四区| 国产日韩一区二区三区精品不卡 | 观看免费一级毛片| 高清av免费在线| 日韩一区二区视频免费看| 欧美另类一区| 人人妻人人爽人人添夜夜欢视频 | 一级毛片aaaaaa免费看小| 国产精品三级大全| 18+在线观看网站| 美女xxoo啪啪120秒动态图| 中国美白少妇内射xxxbb| 中国国产av一级| 欧美激情国产日韩精品一区| 国产成人a∨麻豆精品| 国产男女超爽视频在线观看| 国产在视频线精品| 亚洲av日韩在线播放| 国产精品一区www在线观看| 91午夜精品亚洲一区二区三区| 国产精品99久久99久久久不卡 | 免费大片18禁| 麻豆成人av视频| 视频中文字幕在线观看| 国产精品一区二区三区四区免费观看| 六月丁香七月| 国产免费福利视频在线观看| 狂野欧美白嫩少妇大欣赏| 国产亚洲5aaaaa淫片| 亚洲成人一二三区av| 欧美日韩精品成人综合77777| 亚洲美女搞黄在线观看| 日韩中文字幕视频在线看片| av专区在线播放| 噜噜噜噜噜久久久久久91| 久久亚洲国产成人精品v| 日本av手机在线免费观看| 国产精品.久久久| 嫩草影院入口| 亚洲电影在线观看av| 在现免费观看毛片| 亚洲精品久久久久久婷婷小说| 妹子高潮喷水视频| 搡女人真爽免费视频火全软件| 精品亚洲乱码少妇综合久久| 欧美精品国产亚洲| 国产午夜精品一二区理论片| 天堂8中文在线网| 女人久久www免费人成看片| 午夜老司机福利剧场| 三级国产精品欧美在线观看| 三级国产精品片| 美女主播在线视频| 在线观看人妻少妇| 九色成人免费人妻av| 亚洲精华国产精华液的使用体验| 日韩成人av中文字幕在线观看| 性高湖久久久久久久久免费观看| 2021少妇久久久久久久久久久| 天天躁夜夜躁狠狠久久av| 国产69精品久久久久777片| 精华霜和精华液先用哪个| 久久久久久久久久久丰满| 国产成人91sexporn| 久久精品国产鲁丝片午夜精品| 大码成人一级视频| 秋霞伦理黄片| 久久人人爽av亚洲精品天堂| 成人免费观看视频高清| 一本一本综合久久| 久久久午夜欧美精品| 国产精品蜜桃在线观看| 色婷婷av一区二区三区视频| 午夜免费观看性视频| 偷拍熟女少妇极品色| 性高湖久久久久久久久免费观看| 男人和女人高潮做爰伦理| 久久热精品热| 女的被弄到高潮叫床怎么办| 国产成人免费观看mmmm| 少妇被粗大的猛进出69影院 | 哪个播放器可以免费观看大片| 久久久久久人妻| av又黄又爽大尺度在线免费看| 另类亚洲欧美激情| 91在线精品国自产拍蜜月| 黑丝袜美女国产一区| 日本欧美国产在线视频| 2022亚洲国产成人精品| 蜜桃久久精品国产亚洲av| av又黄又爽大尺度在线免费看| 欧美高清成人免费视频www| 亚洲欧美日韩卡通动漫| 国产精品久久久久久久电影| 韩国av在线不卡| 最新中文字幕久久久久| 大又大粗又爽又黄少妇毛片口| 18禁在线播放成人免费| 大陆偷拍与自拍| 国产成人aa在线观看| 亚洲精品日韩av片在线观看| av在线app专区| 国国产精品蜜臀av免费| 伊人久久精品亚洲午夜| 午夜福利影视在线免费观看| 汤姆久久久久久久影院中文字幕| 中文字幕免费在线视频6| 精品午夜福利在线看| 中文资源天堂在线| 丰满少妇做爰视频| freevideosex欧美| av线在线观看网站| 久久久精品94久久精品| 国产白丝娇喘喷水9色精品| 国产老妇伦熟女老妇高清| av播播在线观看一区| 日日啪夜夜爽| √禁漫天堂资源中文www| 国产毛片在线视频| 国产在视频线精品| 国产黄频视频在线观看| 九九爱精品视频在线观看| 精品国产一区二区久久| 丝瓜视频免费看黄片| 一区在线观看完整版| 香蕉精品网在线| 亚洲天堂av无毛| 97精品久久久久久久久久精品| 2022亚洲国产成人精品| 少妇人妻精品综合一区二区| 日韩人妻高清精品专区| 国产精品嫩草影院av在线观看| 你懂的网址亚洲精品在线观看| 亚洲va在线va天堂va国产| 免费观看av网站的网址| 欧美 亚洲 国产 日韩一| 全区人妻精品视频| 国内精品宾馆在线| 免费观看在线日韩| 国产精品嫩草影院av在线观看| 高清黄色对白视频在线免费看 | 美女脱内裤让男人舔精品视频| 一本久久精品| 国产有黄有色有爽视频| 亚洲四区av| 两个人的视频大全免费| 国产淫片久久久久久久久| 日韩人妻高清精品专区| 三级国产精品片| 免费观看a级毛片全部| 一级av片app| 91aial.com中文字幕在线观看| 免费黄频网站在线观看国产| 久久久久人妻精品一区果冻| 插逼视频在线观看| 国产乱来视频区| 99久久中文字幕三级久久日本| 熟女av电影| 午夜福利影视在线免费观看| 欧美精品一区二区免费开放| 在线观看一区二区三区激情| 最近中文字幕高清免费大全6| 久久99一区二区三区| 男人狂女人下面高潮的视频| 又粗又硬又长又爽又黄的视频| 99国产精品免费福利视频| 亚洲av免费高清在线观看| 日本色播在线视频| 成年女人在线观看亚洲视频| 亚洲,一卡二卡三卡| 欧美精品人与动牲交sv欧美| 三上悠亚av全集在线观看 | 尾随美女入室| 中文字幕精品免费在线观看视频 | 欧美变态另类bdsm刘玥| videossex国产| 久久99精品国语久久久| videos熟女内射| 天堂8中文在线网| 国产成人精品久久久久久| 91精品国产九色| 日韩av免费高清视频| 日韩熟女老妇一区二区性免费视频| 狂野欧美激情性bbbbbb| 九九久久精品国产亚洲av麻豆| 日韩在线高清观看一区二区三区| 亚洲,一卡二卡三卡| 伊人亚洲综合成人网| 亚洲av在线观看美女高潮| 成人18禁高潮啪啪吃奶动态图 | 国产精品偷伦视频观看了| 欧美精品高潮呻吟av久久| 国产高清有码在线观看视频| 日韩人妻高清精品专区| 精品人妻一区二区三区麻豆| 综合色丁香网| 男的添女的下面高潮视频| 蜜桃久久精品国产亚洲av| 国产高清国产精品国产三级| 欧美三级亚洲精品| 纯流量卡能插随身wifi吗| 精品一区在线观看国产| 最近中文字幕2019免费版| a 毛片基地| 色婷婷av一区二区三区视频| 欧美激情国产日韩精品一区| 下体分泌物呈黄色| 日本vs欧美在线观看视频 | 婷婷色综合www| 美女主播在线视频| 国产精品国产av在线观看| 一本大道久久a久久精品| 欧美日韩视频精品一区| 国产伦精品一区二区三区四那| 日韩欧美精品免费久久| 成人黄色视频免费在线看| 久久久精品免费免费高清| videossex国产| 国产 一区精品| 一级毛片aaaaaa免费看小| 成人无遮挡网站| 亚洲精品日韩av片在线观看| 午夜免费观看性视频| 一本久久精品| 看非洲黑人一级黄片| 蜜桃在线观看..| 中文字幕精品免费在线观看视频 | 国产午夜精品久久久久久一区二区三区| 大又大粗又爽又黄少妇毛片口| 王馨瑶露胸无遮挡在线观看| 少妇人妻一区二区三区视频|