• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Reversible Data Hiding Algorithm Based on Image Camouflage and Bit-Plane Compression

    2021-12-11 13:32:32JianyiLiuRuZhangJingLiLeiGuanChengJieandJiapingGui
    Computers Materials&Continua 2021年8期

    Jianyi Liu,Ru Zhang,*,Jing Li,Lei Guan,Cheng Jie and Jiaping Gui

    1School of Cyberspace Security,Beijing University of Posts and Telecommunications,Beijing,100876,China

    2Network Security Monitoring Center,State Grid Information&Telecommunication Branch,Beijing,100761,China

    3School of Electrical Engineering,Tsinghua University,Beijing,100091,China

    4Data Science and System Security Department,NEC Labs America,Princeton,08540,America

    Abstract: Reversible data hiding in encrypted image (RDHEI) is a widely used technique for privacy protection, which has been developed in many applications that require high confidentiality, authentication and integrity.Proposed RDHEI methods do not allow high embedding rate while ensuring losslessly recover the original image.Moreover, the ciphertext form of encrypted image in RDHEI framework is easy to cause the attention of attackers.This paper proposes a reversible data hiding algorithm based on image camouflage encryption and bit plane compression.A camouflage encryption algorithm is used to transform a secret image into another meaningful target image,which can cover both secret image and encryption behavior based on“plaintext to plaintext”transformation.An edge optimization method based on prediction algorithm is designed to improve the image camouflage encryption quality.The reversible data hiding based bit-plane level compression,which can improve the redundancy of the bit plane by Gray coding, is used to embed watermark in the camouflage image.The experimental results also show the superior performance of the method in terms of embedding capacity and image quality.

    Keywords: Reversible data hiding; image camouflage; bit plane compression;encryption; edge optimization

    1 Introduction

    Reversible data hiding (RDH) plays a significant role in data hiding field, and RDH scheme has demonstrated its strong potential in different applications.In many application scenarios, however, it is desirable to carry out RDH scheme directly on encrypted images.Such an approach is called reversible data hiding in encrypted images (RDHEI).RDHEI can embed secret information into encrypted images, with a reversible manner that the original covers can be losslessly decrypted and recovered after the embedded information are extracted.RDHEI can find many applications,e.g., for military communications, medical systems and cloud storage.

    The RDHEI mainly includes three-party roles:content owner, information hider, and receiver.Some RDHEI schemes are vacating room after encryption (VRAE) schemes, which create redundancy after encryption process.VRAE schemes have the disadvantage that the embedding rate is low and errors may be occurred during image reconstructing phase.On the other hand, there are reserving room before encryption (RRBE) schemes, which reserve redundancy space before encryption.Although RRBE can achieve a high embedding rate, it might be impractical as the content owner needs to do an extra workload to create the space for the information hider.

    For both VRAE and RRBE, the content owner will make encryption process on the secret image and send the encrypted image to the information hider.Although encryption can protect the secret image in a certain extent, but the messy codes of the encrypted image are easy to cause the attention of attackers who may try to dig out information on the content owner.In this paper, we propose a novel RDHEI schemes based on image camouflage and bit-plane compression.A camouflage encryption algorithm is used to transfer the original secret image into another meaningful image.The “plaintext to plaintext” transformation can cover both secret image and encryption behavior.Because the encrypted camouflage image is still a meaningful image that has different semantic content from original secret image, it will avoid the attention of the attacker while protecting the original secret image.Compared to exist image camouflage, an edge optimization method based on prediction algorithm is designed to improve the image encryption quality.The reversible data hiding based bit-plane level compression, which can improve the redundancy of the bit plane by Gray coding, is used to embed watermark in the camouflage image.

    2 Related Works

    The RRBE scheme preserves the embedded space by extracting compressible features in the plaintext domain of the carrier image.It requires the content owner to perform additional operations to obtain the embedded space before encryption without any embedded information.The reserved space is often a relatively concentrated contiguous areas, which may cause copyright protection loopholes.However, due to its real conveniency, high efficiency, and good embedding performance, RRBE is suitable for some applications that have not strict security requirements.

    Mo et al.[1] propose a novel RDHEI scheme based on block classification and permutation,which firstly divides the original image into smooth and non-smooth blocks, uses stream encryption and block permutation to protect image, and then embeds secret information in the most significant bits (MSB) of the encrypted pixels in smooth blocks.Wang et al.[2] propose a specific steganalysis scheme for histogram-shifting based reversible data hiding method, which provides an effective framework associated with ‘flat ground’detection and double check modules to improve detection accuracy.Ma et al.[3] use the existing RDH to embed the Least Significant Bit (LSB)of some pixels of the carrier into the other pixels to create the embedded space.After encryption,the reversible embedding of secret data is replaced by LSB, which can reach the embedding rate of 0.5bpp (bit per pixel).Similarly, Yi et al.[4] propose a binary block embedding algorithm that embeds the binary bits in the lower bit plane into the higher bit plane to reserve the embedding space, which achieves excellent performance under fully reversible conditions.Zhang et al.[5]divide the plaintext image into sample pixels and non-sample pixels, and the corresponding prediction error of sample pixels is obtained by the prediction algorithm.Then, they use the security encryption algorithm and the specific encryption mode to process the non-sample pixels and the prediction error to obtain the ciphertext carrier.Using the histogram shift to preserve the predicted error of the prediction, the reversible effect is considerable, but the embedding rate is not ideal (less than 0.1 bpp).Shiu et al.[6] use the differential expansion algorithm to reserve the embedded space in advance, and then use the Paillier homomorphic encryption algorithm to encrypt.After embedding the selected pixel pairs into the secret information, the secret information and the original carrier can be recovered by the homomorphic characteristics without distortion.Cao et al.[7] propose an encrypted image reversible steganography algorithm based on patch-level sparse coding technology, which uses an over-complete dictionary for sparse representation of image blocks and makes full use of pixel correlation compression to obtain a large embedded space.

    The VRAE scheme is completely carried out on the encrypted domain, so it is not easy to leak plaintext information.It has a higher practical value and attracts more attention.Zhang [8]firstly proposes the idea of combining image encryption and information hiding, and designs the first reversible data hiding algorithm in the ciphertext domain.The algorithm implements the embedding of secret information by flipping the last three LSBs of a specific pixel of the ciphertext carrier.The receiver uses the spatial correlation to extract the secret information and restore the original image, which satisfies certain reversibility.But this method must decrypt firstly and then extract the information.Considering the optimization of block smoothness and the correlation of boundary pixels, Hong et al.[9] propose an improved smooth-evaluation function combined with a side matching scheme to reduce the error rate of information extraction, which offers a better performance of the algorithm to some extent.However, information extraction errors are still inevitable.Flip ratio and wave prediction function are used to optimize the algorithm [10-14], which reduce the error of extracting bits and recovering images.But the effective embedding rate is lower than 0.75bpp, and it is always accompanied by an incomplete reversible state.Liu et al.[15] design an encryption algorithm to maintain the entropy of the carrier.The embedding scheme combined with bit-plane sparse matrix compression achieves complete reversibility and obtains better algorithm performance, but the security of the scheme is poor due to the leakage of carrier statistics.From the perspective of information theory, Karim et al.[16]propose and prove that the entropy of random encrypted signal tends to but does not reach the maximum value.Using GRC entropy encoding for encrypted signals can obtain redundancy for information embedding, but the residual entropy space is too small.The maximum embedding rate is maintained at 0.169 bpb (bit per bit).

    RDH technique based on homomorphic encryption has the advantages of higher embedding rate as well as better visual performance.Wu et al.[17] use the homomorphism of Shamir secret sharing to retain data differences, and implement reversible steganography in the ciphertext domain by DE and HS, achieving high embedding rate and low computational complexity while being completely reversible.Zhang et al.[18] and Xiang et al.[19] successively use homomorphic encryption algorithms LWE and Paillier to preserve data correlation, and further design a special RDH algorithm to improve security and embedding performance.Zhang et al.[20]propose a RDH scheme which combines lossless and reversible methods by combining Paillier,Damg?rd-Jurik, and multi-layer wet paper coding, which can simultaneously perform two types of embedding operations.However, the above algorithms are difficult to avoid the ciphertext expansion problem, which results in storage space expansion and communication bandwidth increase.Li et al.[21] and Xiao et al.[22] combine with DE and the additive homomorphic encryption algorithm proposed by the references [23] to achieve reversible steganography in ciphertext domain.This algorithm does not produce encryption extension, and at the same time, it well conceals the statistical information of the carrier.Huang et al.[24] and Yi et al.[25] propose a ciphertext reversible steganography algorithm framework based on sub-block pixel-level xor encryption and block scrambling, which can be directly combined with the RDH in the plaintext domain to achieve the reversible steganography in the encrypted domain.

    Specifically, Lai et al.[26] propose “secret-fragment-visible” mosaic image, which is created automatically by selecting the target image similar to secret image in a database and replacing the similar blocks between secret blocks and target blocks, achieving an effect of embedding the given image visibly but secretly in the resulting mosaic image.The method is only suitable for a target image similar with the secret image, and the camouflage image quality is not so good.Lee et al.[27] proposed an approximately reversible block conversion method based on sub-block variance to improve the transformation effect.Although Lee et al.’s method can transform a secret image to a freely-selected target image without a database, it cannot losslessly recover the secret image.Subsequently, Zhang et al.[28] improved the block conversion method into a reversible conversion method, and used the quantile of sub-block standard deviation for classification and matching to improve the image quality.Hou et al.[29,30] made continuous improvement based on the results of Zhang et al.’s method, introduced K-means clustering algorithm to improve the similarity of sub-block matching, obtained good encryption effect.This effect of image camouflage is useful for covert communication or secure keeping of secret images and provides a new research idea for RDHEI.Since the image is still plaintext after camouflage encryption, the RDH algorithm of the plaintext domain can be directly applied.

    3 Proposed Reversible Data Hiding Algorithm

    Fig.1 shows the framework of proposed scheme, which can be divided into three phases:(1)carrier encryption phase, (2) information embedding phase, (3) information extraction and secret image recovery phase.

    Figure 1:Scheme framework

    In the carrier encryption phase, the content owner converts the secret image and the target image in terms of sub-blocks to obtain the transformed camouflage encrypted image with an encryption keyKey-1.The target image does not need to compare the similarity with the secret image.The camouflage encrypted image is transmitted to the information hider.

    In the information embedding phase, the camouflage encrypted image is a meaningful image compared to traditional RDHEI methods.Therefore, the information hider can select a classical RDH method according to embedding capacity and image quality.This paper uses a RDH based bit plane compression to embed the secret information withKey-2, which can achieve high utilization ratio of redundant space with low distortion rate.

    In the information extraction and secret image recovery phase, the receiver extracts the secret information and recovers the secret image based on the owned key.

    3.1 Carrier Encryption

    The camouflage encryption mainly performs the conversion of the plaintext image by performing coarse-grained sub-block matching and fine-grained data reversible conversion on the image carrier.The effect of camouflage encryption is mainly determined by the rationality of subblock matching and the accuracy of conversion.At present, the camouflage encryption algorithm based on cluster matching achieves the high success rate of similar sub-block matching under low auxiliary information as much as possible and reduces the distortion by using translation and conversion.However, the algorithm has two problems.One is that it does not consider the edge distortion problem between sub-blocks, which may affect image quality.The other one is that it performs translation and truncation operations on sub-blocks with out-of-bounds pixels,which increases the pixel difference between sub-blocks, and results in image distortion.Moreover,the operations increase the volume of auxiliary information, which must be embedded into the camouflage image.In this paper, a new out-of-bounds pixel processing strategy is designed.This strategy can recover the pixel information only by recording whether the pixel is out of bounds,which optimizes the image edge distortion without adding auxiliary information.Fig.2 shows the framework of the camouflage encryption algorithm proposed in this paper.

    Figure 2:The framework of Camouflage encryption algorithm

    Given the secret imageSand the target imageC, Swill be transformed into an encrypted image which is similar toCas follows:

    (1) Image segmentation.The secret imageSand the target imageCare respectively divided intoNsub-blocks of the sizel×wthat do not overlap.Sub-blocksBi(1 ≤i≤N)andTi(1 ≤i≤N)are obtained, the pixel values of which are represented asB=

    (2) Sub-block classification.Sub-blocksBi(1 ≤i≤N)andTi(1 ≤i≤N)are clustered into K classes according to the standard deviationσof the pixel values as a constraint with the method in [29].

    (3) Sub-block matching.The secret imageSand the target imageCrespectively sort the subblocks of each class in raster order, generate a composite index in the order of classes.The composite index is used as a mapping rule to complete the approximate matching between sub-block pairs.The corresponding sub-block pairs will have a similar standard deviationσ.

    (4) Sub-block conversion.The sub-block of the imageSis subjected to shift conversion, and the shift amount is an integer portion of the difference between the mean of the pixel values of the imageSand theC’ssub-block pairs.

    (5) Cross-border processing.For out-of-bounds pixels, we design a new processing strategy in combination with the modulo operation as shown in Eq.(1):

    wherepiandpafter_irepresent image pixels before and after conversion processing, respectively.Under this strategy, the processed overflow data is close to pixel 255 boundary, and the underflow data is close to pixel 0 boundary.Under the influence of as little fluctuation as possible, the outof-bounds data is controlled within the range of 0-255 pixel, and the auxiliary information is not required to record the sign of the out-of-bounds, only need to mark whether it is out-of-bound in the position map.

    In this paper, we set the corresponding position mapMP, whereMPi=1 indicates that the pixel point is the out-of-bound position, andMPi=0 indicates that the pixel point does not need to be processed.Obviously, the position map is a sparse binary matrix that can be effectively compressed using an entropy encoder to obtainZ_MP.According to the location mapMP, the strategy can be reversible recovery by

    (6) Sub-block rotation.Each sub-block is rotated in four directions of 0°, 90°, 180°and 270°in turn, and the direction with the smallestRMSEbetween the target sub-blocksTis selected to be rotated.The final rotation directionV_direof the sub-blocks is recorded for decryption operation.The rotation of the sub-block does not affect the statistical characteristics of the sub-block including the mean value and the standard deviation but can improve the matching degree of the data in the sub-block.

    (7) Edge optimization.In order to improve the smoothness of the sub-block edge, the prediction algorithm and neighborhood data of edge pixels are used for edge optimization.The following edge pixelp(i,j)is taken as an example, and the mean valuepm(i,j)of the vertical neighborhood data of the edge pixelp(i,j)can be calculated by

    Taking into account the pixel correlation within the sub-block, the prediction valuepp(i,j)ofp(i,j)obtained by the prediction algorithm (such as the MED algorithm) and the corresponding prediction errord(i,j)=p(i,j)?pp(i,j)is further used, and the final replacement valuepr(i,j)is obtained can be calculated by

    From the above, we finally get the encrypted imageSC=E(S)that completely conceals the original plaintext information with the target plaintext information.At the same time, the auxiliary information, including the sub-block shift transformation, the out-of-boundary data-position mapMP, the sub-block rotation direction, etc., are compressed and encrypted by a common encryption algorithms such as AES with an encryption keyKey-1.And then the encrypted auxiliary information will be embedded into the encrypted imageSCby RDH method, which is described in 3.2.

    3.2 Information Embedding

    Since the encrypted imageSCis still a meaningful image, the existing reversible data hiding algorithms are applicable to this step.In general, it is not considered the influence of embedding on the distortion of encrypted image.However, considering thatSCis in pseudo plaintext state,we still need a high embedding rate and low distortion for reversible data hiding algorithm.The modification of the LSB plane has the advantages of simplicity and little effect on the carrier.We introduce a reversible data hiding algorithm based on bit plane compression.Unless otherwise stated, the algorithm uniformly uses the raster scan order to read the matrix information.The specific embedding process is described as follows.

    (1) Bit plane separation.Each plane can be separated and obtained by:

    wherepSCis the pixel value of the encrypted image,kis the corresponding layer number of the bit plane,bSCis the binary corresponding to thek-thlayer of the pixel value.

    In the natural binary code, there are big differences in the codewords of some adjacent data,so the natural binary code can be converted to the Gray code by:

    Among them, the natural binary code is defined asB=(b7,b6,...,b0), the corresponding Gray code is defined asG=(g7,g6,...,g0), and ⊕is defined as XOR operation.

    (2) Sub-block tag and sub-block compression.The matrix is divided into a series of nonoverlapping blocks of sizes1×s2.According to the characteristics of uneven distribution of elements, sub-blocks can be divided into five types, including all-zero sub-blocks, all-one subblocks, sparse sub-blocks with mostly zeros, sparse sub-blocks with mostly ones, and remainder common sub-blocks.The sub-blocks can be classified into types 1 to 5.To distinguish type 5 from other types, the information of type 5 is stored by the binary sequenceMark_type, where the 0 mark type 5, 1 is set to mark other types.The relevant information of the sub-block marks are in Tab.1.e0represents the number of 0 elements in the sub-block, ande1represents the number of 1 elements in the sub-block,e=min{e0,e1}.etis the threshold for the number of sparse elements and will be explained as follows.

    For the sub-blocks whoseMark_typeis marked as 1 in the sequence, we further implement the corresponding compression embedding method for different types of sub-blocks.

    For the sub-blocks of type 1 and type 2, the original information can be completely recovered according to the marked block type information, and no additional auxiliary information is needed, that is, corresponding available embedded spacev1=s1×s2?2.

    Table 1:Block labeling rules

    The sub-blocks of type 3 and type 4 are binary sparse matrices.In order to completely recover the relevant information in the extraction phase.In addition to the block type information,information of the sparse elements also need to be recorded.Since the sub-block values are only 0 and 1, and the sparse element values can be determined from the type information, only the number of sparse elements and the relative positions in the sub-blocks need to be recorded.Set the minimum remaining spacev2min=s1×s2?2?as the type indicator.Wherev2min>0, the type belongs to type 3 or type 4; otherwise, it is classified as type 5.From the above, the corresponding sparse element data threshold can be defined as follows:

    (3) Information embedding.First, each sub-block information is read in the raster scanning order to obtain its embedded spaceviandMiof sizevmiafterMark_typelossless encoding (such as run length encoding);

    Secondly, the type of information tag and the secret information is operated in the first four types of sub-blocks in order, and the sub-blocks are obtained after being encrypted, and the type 5 sub-block is not operated.For the lowest bit plane, if the embedded space satisfiesv1≥L(Lis the length of embedded information, which includes encrypted auxiliary information and secret information), the embedding is completed.Otherwise, the remainingL?v1secret information andM1are transmitted to the adjacent bit plane;

    Finally, if the bit plane embedded space satisfiesvi≥L+vm(i?1), the information embedded is performed according to step two; ifvi

    In this process, the length of embedded informationLiandvm(i?1)of each bit plane and the highest embedded bit planeMiare saved as the embedded keykey_2, andvm0=0; when the secret information cannot be completely hidden by the ordered integer sub-blocks, the remaining space of the last sub-block can be filled with random bit data.

    3.3 Information Extraction and Secret Image Recovery

    When the receiver obtains the encrypted carrierSCem, the information can be extracted without distortion and the carrier can be reversibly restored according to the keykey_1 and key_2.Information extraction and secret image recovery are the inverse process of carrier encryption and information embedding.

    According to the embedded keykey_2, the secret parameters used in the embedding process are obtained, including the embedding informationLiandvm(i?1).of each bit plane and theMiof the highest embedding bit plane.

    (1) Bit plane separation.After Gray coding and separation, each bit plane datagsc(k)corresponding to the encrypted carrier is obtained.According to the obtained hidden parameters, the layer-by-layer extraction is performed from the higher bit plane to the lower bit plane.

    (2) Mark identification.According to theMark_typeobtained byMidecompression, type 5 and other types can be distinguished according to Tab.1.

    (3) Information extraction.For different types of sub-blocks, according to the compression embedding method used, the corresponding data extraction and sub-block recovery methods are as follows:

    (a) For the sub-blocks of type 1 and type 2, except for the first two marked bits, the other bits are encrypted information.Relevant information can be extracted by reading them in order of embedding sequence.And the sub-blocks are restored to all 0 or all 1 according to the sub-block type;

    (b) For the sub-blocks of type 3 and type 4, the number of sparse elements and the encoded position information are obtained according to the agreed embedding position, the rare element positions are obtained by de-encoding the position information, and the encrypted information is obtained by reading the rest of the positions based on the embedding order.The atomic blocks are recovered with the type information;

    (c) The firstLidata extracted in sequence is the embedded encrypted information and the next datavm(i?1)areMi?1data of the adjacent low plane.DataMark_typei?1can be recovered after decompression.The encrypted information can be extracted and stitched layer by layer, and the bit plane can be recovered.

    (4) Bit plane recovery.The bit plane recovered from above is obtained by Gray coding, and the corresponding decoding can be used to recover the original bit plane without loss.Finally,the secret information and the encrypted image are obtained.

    (5) Secret image recovery.According to thekey_1, the auxiliary information is decrypted and decompressed, including sub-block shift transformation, out-of-boundary data location map, sub-blocks rotation direction.The secret image recovery methods are as follows:

    (a) Edge recovery.For the edge modification operation in the encryption step,p(i,j)can be recovered by formula (8) according topr(i,j).

    Among them, because the neighborhood data remains unchanged, the mean valuepm(i,j)and the predicted valuepp(i,j)can be directly calculated without auxiliary information.If the neighborhood data is also replaced by pixels, it can be recovered in the reverse order of replacement.

    (b) Rotation recovery.Based on the related information of sub-block rotation direction obtained from the auxiliary information, each sub-block is rotated in the opposite direction to realize rotation recovery.

    (c) Out-of-bounds data recovery.According to the recovered location mapMP, the original out-of-bounds data position can be identified.With the ciphertext data and location information, and the original cross-border data information can be directly recovered according to formula (2).

    (d) Conversion recovery.The reversible transformation of a sub-block is independent of its class, and the sub-block’s shift transformation in the auxiliary information can be directly used to restore.

    4 Experimental Results and Analysis

    4.1 Carrier Encryption Experiment

    We use the image in Fig.3a is the secret carrier and the image in Fig.3b as the corresponding target carrier.In order to select the appropriate block size, we use the block size as a variable to carry out the experiment.The corresponding experimental results are shown in Figs.3c-3h and Tab.2.From a subjective point of view, when the block size gradually becomes larger, the quality of the camouflage image gradually decreases; from the objective data provided in Tab.2, the block size is negatively correlated with the quality of the camouflaged image and is positively correlated with the number of auxiliary information.Auxiliary information as decryption related information usually can be embedded in camouflage image by reversible steganography algorithm or be stored directly after encryption.In order to balance the quality of the image and the amount of auxiliary information, in the following experiments, we set the block size to 4×4.

    In order to further analyze the influence of the choice of the target object on the encryption algorithm, we take Fig.4a as the secret image and Figs.4b-4f as the target image for experiments.The camouflaged encrypted images obtained by the experiment are shown in Figs.4g-4k, and the corresponding experimental performance data is shown in Tab.3.The experimental results show that the secret image has a good effect on camouflage encryption of most target image,and has good versatility.Since the converted sub-block pair is approximately matched based on the sub-block variance as the feature, the reversible conversion is based on the translation of the target sub-block mean.When the image texture is similar, the encrypted sub-blocks have similar variances and mean values corresponding to the target sub-blocks.So it can achieve higher SSIM and better similarity.However, it also leads to the relatively poor conversion effect when the texture complexity gap between the two images is large, that is, when the variance gap of the matching sub-blocks is large.For example, the SSIM of encryption results with Baboon as the target image is not good.Therefore, although the encryption algorithm used in this paper has good versatility, it can achieve a better camouflage encryption effect when the texture complexity of the secret image and target image is similar.

    Figure 3:(a) Secret image (b) target image (c) Camouflage image with a block size of 2×2 (d)Camouflage image with a block size of 3×3 (e) Camouflage image with a block size of 4×4 (f)Camouflage image with a block size of 5×5 (g) Camouflage image with a block size of 6×6 (h)Camouflage image with a block size of 8×8 mouflage image with a block size

    Table 2:Encryption effects under blocks of different sizes

    Figure 4:Experimental image and encrypted image (a) secret image lena (b) target image airplane(c) target image peppers (d) target image baboon(e) target image boats (f) target image barbara (g)encrypted image airplane (h) encrypted image peppers (i) encrypted image baboon (j) encrypted image boats (k) encrypted image barbara

    It can be seen from Fig.4 that the camouflage encrypted images are similar with the corresponding target images and have high SSIM between them in Tab.3, which means that the original secret image content is totally by the camouflage encrypted image content.Even if the attacker recognizes the camouflage, without the encryption keyKey-1of AES, it is also unable to decrypt the auxiliary information that is necessary for recovering the original secret image.And the attacker cannot get any information of the secret image as shown in Fig.5.

    Table 3:Encryption effect under different target image

    Figure 5:Experimental results of encrypted image (a) secret image lena (b) target image airplane (c) encrypted image airplane (d) decrypted image (with Key-1) (e) decrypted image (with wrong key)

    We compare the encryption algorithm with current similar algorithms [27,29] to further analyze the performance of the encryption algorithm.Since the existing algorithms usually use color images as the encryption object, we use Fig.6a as the secret image and Fig.6b as the target image.We decompose the three channels (R, G, B) of the color image into three gray-scale images for camouflage encryption and then recombine for experiments.Among them, according to the algorithm described in [27], we use the block size 8×8 with the best effect and 4×4 block size for both [29] and this paper.

    The experimental results are shown in Figs.6c-6i and Tab.4.It can be seen from the partial enlarged images in Figs.6f-6i that the scheme used in this paper can significantly reduce the jigsaw effect of the image and reduce the distortion from the edge to the whole image.The data in Tab.4 is also well verified the result, and the additional data of images are also significantly reduced.It can be seen that the encryption effect achieved by the algorithm in this paper is better than the algorithms in [27,29].The edge optimization and out-of-bounds pixel processing strategies used in the encryption algorithm have a good effect on the camouflage encryption effect.However, considering that the encryption algorithm in this paper does not consider the color channel correlation for color images, the encryption effect has a lot of room for improvement.

    Figure 6:(a) Secret image (b) target image (c) Camouflage image generated by algorithm [27] (d)Camouflage image generated by algorithm [29] (e) Camouflage image generated by this paper(f)Part of the target image (g) part of camouflage image generated by algorithm [27] (h) part of camouflage image generated by algorithm [29] (i) part of camouflage image generated by this paper

    Table 4:Encryption effect of camouflage image and target image

    4.2 Data Hiding Experiment

    In the experiment, the compression embedding of data is carried out from the low-bit plane to the high-bit plane to reduce the effect of embedding on the whole image.In order to make full use of the redundant space of camouflage image, we also block the carrier in the data hiding stage according to the size of 4×4.It can be calculated by Eq.(7), andet=3.

    We use Fig.7(a) (the camouflage encrypted image in Fig.3e) as a steganographic carrier,and the 64×64 size Fig.7b as the secret information to carry out information embedding and extraction experiments.The corresponding results are shown in Fig.7.It can be seen from the experimental results that both the encrypted carrier image and the extracted secret information have high quality.The PSNR of the encrypted carrier image is 71.14 dB for the camouflage encrypted image, and the extracted data image is relative to the embedded data image,PSNR=inf.So the steganographic algorithm proposed in this paper can recover embedded information without distortion and is completely reversible.

    In order to better explain the performance of the steganographic algorithm, this section starts from the embedding capacity and imperceptibility of steganography and conducts performance testing and comparative experiments on encrypted carrier images.The experimental carrier is the corresponding image of Fig.4 obtained in the encryption phase.

    Figure 7:(a) Camouflage encrypted image (b) embedded data (c) encrypted carrier (PSNR =71.14 dB) (d) extracted data (PSNR=Inf)

    First, we use the generated camouflage encrypted images in Figs.4g-4k as the carrier object,and separate the bit planes under the Gray coding and the ordinary binary coding used in this paper.Then we perform independent embedding steganography on the low 4-bit planes to quantify the available space of the steganography algorithm under different encodings.The embedding capacity of each layer of the camouflage encrypted image is shown in Tab.5.Obviously, under the same-level bit plane, the available bit plane redundancy space for Gray coding is greatly improved, which is similar to the embedding capacity of the adjacent high-level bit plane under ordinary binary.

    Table 5:Bit plane steganographic capacity under different coding

    In order to better evaluate the performance of the algorithm, we compare the proposed scheme with other similar schemes.Considering the particularity of the algorithm in this paper, we choose the existing classical reversible steganography algorithm [23,24] to apply to the camouflage encrypted images generated in this paper, in order to make a more reasonable comparison of experiments.Tab.6 shows the comparison data between the algorithm and the [23,24].Compared with the algorithm in [23,24], the algorithm proposed in this paper can achieve better image quality and superior performance under the same embedding rate.

    Table 6:Performance comparison between this paper and the reference

    5 Conclusion

    In this paper, a reversible steganography algorithm based on image camouflage encryption and bit plane compression is proposed, and an edge optimization method based on the prediction algorithm is designed.The experimental results show that the method can achieve a good balance between embedding capacity and image quality, effectively improve the encryption quality, and have good performance.

    Funding Statement:This work was supported in part by the National Key R&D Program of China (2019YFB1406504), and the National Natural Science Foundation of China (U1836108,U1936216, 62002197).

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    国产日韩欧美视频二区| av免费在线观看网站| 高清在线国产一区| 精品久久久久久电影网| 韩国精品一区二区三区| 国产精品1区2区在线观看. | 麻豆av在线久日| 久久中文看片网| 少妇粗大呻吟视频| 欧美人与性动交α欧美软件| 黄色怎么调成土黄色| 国产精品亚洲av一区麻豆| 国产精品久久久久久人妻精品电影 | 国产成人欧美在线观看 | 美女高潮喷水抽搐中文字幕| 啦啦啦免费观看视频1| 国产精品影院久久| 飞空精品影院首页| 一级黄色大片毛片| 正在播放国产对白刺激| 婷婷丁香在线五月| 国产成人免费观看mmmm| 视频区图区小说| 老司机影院毛片| 19禁男女啪啪无遮挡网站| av欧美777| 国产一区有黄有色的免费视频| 国产精品国产高清国产av | 久久av网站| 啦啦啦免费观看视频1| 人人妻,人人澡人人爽秒播| 欧美 日韩 精品 国产| 日韩中文字幕欧美一区二区| 水蜜桃什么品种好| 女性被躁到高潮视频| 国产成人啪精品午夜网站| 一本—道久久a久久精品蜜桃钙片| 18禁美女被吸乳视频| 成人免费观看视频高清| 在线观看人妻少妇| 亚洲色图av天堂| 欧美乱码精品一区二区三区| 丝袜美足系列| 国精品久久久久久国模美| 最新美女视频免费是黄的| 法律面前人人平等表现在哪些方面| 国产一区二区 视频在线| 伦理电影免费视频| 亚洲avbb在线观看| 后天国语完整版免费观看| a在线观看视频网站| 久热这里只有精品99| 老熟妇仑乱视频hdxx| 在线观看www视频免费| 国产亚洲一区二区精品| 亚洲欧美日韩另类电影网站| 色视频在线一区二区三区| 国产精品一区二区在线不卡| 男女高潮啪啪啪动态图| 夫妻午夜视频| 首页视频小说图片口味搜索| 操美女的视频在线观看| 视频区图区小说| 狠狠狠狠99中文字幕| 欧美日韩亚洲综合一区二区三区_| 露出奶头的视频| 性高湖久久久久久久久免费观看| 成年人免费黄色播放视频| 亚洲精品美女久久av网站| 亚洲久久久国产精品| 国产精品国产av在线观看| 国产高清激情床上av| 亚洲中文字幕日韩| 麻豆乱淫一区二区| 黑人巨大精品欧美一区二区mp4| 九色亚洲精品在线播放| 久久久久网色| 咕卡用的链子| 女人爽到高潮嗷嗷叫在线视频| netflix在线观看网站| 亚洲av成人一区二区三| 国产av国产精品国产| 黄色怎么调成土黄色| 99国产精品99久久久久| 在线观看免费高清a一片| 精品一区二区三区av网在线观看 | 久9热在线精品视频| 国产精品偷伦视频观看了| 久久人妻福利社区极品人妻图片| 久久中文字幕人妻熟女| 老司机影院毛片| 国产有黄有色有爽视频| 99国产综合亚洲精品| 成人免费观看视频高清| 亚洲性夜色夜夜综合| 国产伦人伦偷精品视频| 日韩欧美免费精品| 性色av乱码一区二区三区2| 久久中文字幕一级| 欧美激情高清一区二区三区| 免费观看人在逋| 国产av精品麻豆| 欧美日韩亚洲综合一区二区三区_| 久久中文字幕一级| 一夜夜www| 亚洲七黄色美女视频| 免费女性裸体啪啪无遮挡网站| 中文字幕另类日韩欧美亚洲嫩草| 91av网站免费观看| 18禁美女被吸乳视频| 久久国产精品大桥未久av| 99国产精品免费福利视频| 国产在线视频一区二区| 99精品欧美一区二区三区四区| 亚洲男人天堂网一区| 精品一区二区三卡| av欧美777| 1024香蕉在线观看| 人妻一区二区av| 精品人妻熟女毛片av久久网站| 久久久久精品人妻al黑| 亚洲精品粉嫩美女一区| 国产免费现黄频在线看| 大陆偷拍与自拍| 俄罗斯特黄特色一大片| 精品国产乱码久久久久久男人| 黄频高清免费视频| 精品免费久久久久久久清纯 | 欧美黑人精品巨大| 欧美黑人精品巨大| 亚洲第一青青草原| 亚洲精品国产精品久久久不卡| 亚洲熟妇熟女久久| 久久久国产精品麻豆| 一个人免费在线观看的高清视频| 免费少妇av软件| 搡老岳熟女国产| 国产主播在线观看一区二区| 王馨瑶露胸无遮挡在线观看| 欧美乱码精品一区二区三区| 免费在线观看视频国产中文字幕亚洲| 我要看黄色一级片免费的| 丰满少妇做爰视频| 成人永久免费在线观看视频 | 国产日韩欧美视频二区| 欧美日韩亚洲高清精品| 男女午夜视频在线观看| 日韩视频在线欧美| 一级片免费观看大全| 国产成人影院久久av| 亚洲色图 男人天堂 中文字幕| 男女之事视频高清在线观看| 亚洲成av片中文字幕在线观看| 搡老岳熟女国产| 国产精品国产av在线观看| 国产在线一区二区三区精| 国产高清视频在线播放一区| xxxhd国产人妻xxx| 亚洲国产欧美网| 午夜福利影视在线免费观看| 成年人午夜在线观看视频| 成人特级黄色片久久久久久久 | 国产1区2区3区精品| 午夜福利视频精品| 国产精品熟女久久久久浪| 丝瓜视频免费看黄片| 一二三四社区在线视频社区8| 麻豆av在线久日| 欧美另类亚洲清纯唯美| 两性午夜刺激爽爽歪歪视频在线观看 | 波多野结衣av一区二区av| av有码第一页| 免费观看a级毛片全部| 国产在线精品亚洲第一网站| 国产精品免费视频内射| 少妇精品久久久久久久| 99国产精品免费福利视频| 在线天堂中文资源库| 成人亚洲精品一区在线观看| 欧美激情高清一区二区三区| 黄色视频,在线免费观看| 免费观看av网站的网址| 精品少妇黑人巨大在线播放| 大香蕉久久网| 肉色欧美久久久久久久蜜桃| 久久久久久久精品吃奶| 日本av免费视频播放| 国产成人免费观看mmmm| 伦理电影免费视频| 日日夜夜操网爽| 一本大道久久a久久精品| 国产精品国产高清国产av | 亚洲欧洲精品一区二区精品久久久| 午夜久久久在线观看| 久久人人爽av亚洲精品天堂| 午夜日韩欧美国产| 美女国产高潮福利片在线看| 动漫黄色视频在线观看| 精品国产超薄肉色丝袜足j| 自线自在国产av| 国产野战对白在线观看| 久久亚洲精品不卡| 人妻一区二区av| 国产精品av久久久久免费| 在线看a的网站| 中文欧美无线码| a级毛片在线看网站| 久久久国产精品麻豆| 欧美精品一区二区大全| 久久精品成人免费网站| 男女下面插进去视频免费观看| 精品免费久久久久久久清纯 | 啦啦啦免费观看视频1| 国产伦人伦偷精品视频| 99riav亚洲国产免费| 日韩一卡2卡3卡4卡2021年| 最新在线观看一区二区三区| 丰满人妻熟妇乱又伦精品不卡| 色视频在线一区二区三区| 一本大道久久a久久精品| 天堂俺去俺来也www色官网| 日韩制服丝袜自拍偷拍| 欧美性长视频在线观看| 午夜两性在线视频| 老熟女久久久| 精品视频人人做人人爽| 欧美日本中文国产一区发布| 国产亚洲精品久久久久5区| 大香蕉久久成人网| 18禁裸乳无遮挡动漫免费视频| 高清在线国产一区| 午夜91福利影院| 亚洲精品成人av观看孕妇| 亚洲国产成人一精品久久久| 日韩精品免费视频一区二区三区| 人人妻人人爽人人添夜夜欢视频| 久久中文字幕一级| 欧美精品一区二区免费开放| 国产97色在线日韩免费| 制服人妻中文乱码| 少妇的丰满在线观看| 国产片内射在线| 午夜日韩欧美国产| 亚洲avbb在线观看| 麻豆成人av在线观看| 999久久久国产精品视频| 搡老岳熟女国产| 国产在线免费精品| 免费观看人在逋| 日韩大码丰满熟妇| 50天的宝宝边吃奶边哭怎么回事| 丰满饥渴人妻一区二区三| 精品亚洲成a人片在线观看| 久久精品国产亚洲av香蕉五月 | 国产aⅴ精品一区二区三区波| 99精品在免费线老司机午夜| 手机成人av网站| 欧美+亚洲+日韩+国产| 另类亚洲欧美激情| 久久中文字幕人妻熟女| 亚洲天堂av无毛| 国产亚洲欧美精品永久| 国产一区二区 视频在线| 国产精品熟女久久久久浪| 天堂8中文在线网| 91九色精品人成在线观看| 成人特级黄色片久久久久久久 | 激情视频va一区二区三区| 欧美av亚洲av综合av国产av| 国产精品久久久人人做人人爽| 亚洲人成77777在线视频| 久久久久久久精品吃奶| 在线观看免费午夜福利视频| 夫妻午夜视频| 高清欧美精品videossex| 欧美人与性动交α欧美软件| 在线亚洲精品国产二区图片欧美| 日韩 欧美 亚洲 中文字幕| 国产精品一区二区在线观看99| 欧美成狂野欧美在线观看| 大片电影免费在线观看免费| 怎么达到女性高潮| 欧美精品亚洲一区二区| 女人高潮潮喷娇喘18禁视频| 一本一本久久a久久精品综合妖精| 亚洲七黄色美女视频| 菩萨蛮人人尽说江南好唐韦庄| 欧美久久黑人一区二区| 色老头精品视频在线观看| 99国产极品粉嫩在线观看| 国产欧美日韩精品亚洲av| 麻豆av在线久日| 婷婷丁香在线五月| 中文字幕高清在线视频| 日本黄色视频三级网站网址 | 亚洲精品一卡2卡三卡4卡5卡| 精品人妻1区二区| 国产精品二区激情视频| 啪啪无遮挡十八禁网站| 99热网站在线观看| 啦啦啦在线免费观看视频4| 精品少妇一区二区三区视频日本电影| 啦啦啦免费观看视频1| 99精国产麻豆久久婷婷| 国产熟女午夜一区二区三区| 午夜成年电影在线免费观看| 不卡av一区二区三区| 三上悠亚av全集在线观看| 1024香蕉在线观看| 日本黄色日本黄色录像| 这个男人来自地球电影免费观看| 一级片'在线观看视频| 热re99久久精品国产66热6| 色94色欧美一区二区| 日本欧美视频一区| 国产av一区二区精品久久| av福利片在线| 在线 av 中文字幕| 精品少妇黑人巨大在线播放| 十分钟在线观看高清视频www| 亚洲五月色婷婷综合| 日韩三级视频一区二区三区| 免费不卡黄色视频| 九色亚洲精品在线播放| 国产在线免费精品| 国产亚洲欧美精品永久| 欧美亚洲日本最大视频资源| 90打野战视频偷拍视频| 人妻久久中文字幕网| 国产成人欧美| 欧美激情高清一区二区三区| 久久午夜综合久久蜜桃| 久久人人97超碰香蕉20202| 日本a在线网址| 色尼玛亚洲综合影院| 午夜视频精品福利| 久久精品国产亚洲av高清一级| 最新美女视频免费是黄的| 精品亚洲乱码少妇综合久久| 午夜福利在线观看吧| 中文字幕av电影在线播放| av在线播放免费不卡| 国产欧美日韩一区二区精品| 日韩免费高清中文字幕av| 他把我摸到了高潮在线观看 | 久久久久网色| 在线天堂中文资源库| 高清av免费在线| 三上悠亚av全集在线观看| 国产精品久久久久久人妻精品电影 | 亚洲国产成人一精品久久久| 久久久久久久精品吃奶| 啦啦啦视频在线资源免费观看| 成年动漫av网址| av福利片在线| 欧美精品亚洲一区二区| 国产欧美日韩精品亚洲av| 欧美一级毛片孕妇| 欧美 日韩 精品 国产| 交换朋友夫妻互换小说| 亚洲精品av麻豆狂野| 国产不卡一卡二| 别揉我奶头~嗯~啊~动态视频| 免费日韩欧美在线观看| 精品少妇黑人巨大在线播放| 老司机福利观看| 国产欧美日韩一区二区三区在线| 狠狠狠狠99中文字幕| 国产精品久久久久久精品古装| 国产91精品成人一区二区三区 | 搡老岳熟女国产| 免费观看a级毛片全部| 老熟妇乱子伦视频在线观看| 久久久水蜜桃国产精品网| 18禁裸乳无遮挡动漫免费视频| 国产无遮挡羞羞视频在线观看| 亚洲精品中文字幕一二三四区 | 精品人妻熟女毛片av久久网站| 欧美一级毛片孕妇| 国产成人系列免费观看| 91av网站免费观看| 精品国内亚洲2022精品成人 | 久久婷婷成人综合色麻豆| 日本a在线网址| 国产成人免费无遮挡视频| 亚洲精品久久成人aⅴ小说| 日本一区二区免费在线视频| 亚洲欧美日韩另类电影网站| 免费观看人在逋| 脱女人内裤的视频| avwww免费| 国产熟女午夜一区二区三区| 午夜激情av网站| 久久中文字幕一级| 国产99久久九九免费精品| 久久久精品免费免费高清| e午夜精品久久久久久久| 丰满饥渴人妻一区二区三| 国产成人精品在线电影| 黑人欧美特级aaaaaa片| 真人做人爱边吃奶动态| 搡老熟女国产l中国老女人| 91精品三级在线观看| 亚洲国产中文字幕在线视频| 黑人巨大精品欧美一区二区蜜桃| 亚洲精品自拍成人| 两性午夜刺激爽爽歪歪视频在线观看 | 色精品久久人妻99蜜桃| 天天躁日日躁夜夜躁夜夜| 国产精品二区激情视频| 亚洲国产中文字幕在线视频| 男女午夜视频在线观看| 别揉我奶头~嗯~啊~动态视频| 欧美国产精品va在线观看不卡| 精品人妻熟女毛片av久久网站| 国精品久久久久久国模美| 亚洲伊人色综图| 国产精品成人在线| 美女国产高潮福利片在线看| 国产av精品麻豆| 中文字幕av电影在线播放| 国产伦理片在线播放av一区| 美女扒开内裤让男人捅视频| 乱人伦中国视频| 亚洲色图 男人天堂 中文字幕| 亚洲欧美精品综合一区二区三区| 国产有黄有色有爽视频| 91精品国产国语对白视频| a级片在线免费高清观看视频| 精品欧美一区二区三区在线| 久久人人97超碰香蕉20202| 香蕉国产在线看| 777久久人妻少妇嫩草av网站| 狠狠婷婷综合久久久久久88av| 精品高清国产在线一区| 久久久久精品人妻al黑| av天堂久久9| 两个人免费观看高清视频| 亚洲天堂av无毛| 成人永久免费在线观看视频 | 黑人欧美特级aaaaaa片| 午夜福利一区二区在线看| 亚洲成国产人片在线观看| 午夜精品国产一区二区电影| 两性夫妻黄色片| 女同久久另类99精品国产91| 国产免费福利视频在线观看| 丰满少妇做爰视频| 久久久国产精品麻豆| 亚洲色图综合在线观看| 美女高潮喷水抽搐中文字幕| 伦理电影免费视频| 国产高清激情床上av| 精品午夜福利视频在线观看一区 | 交换朋友夫妻互换小说| 欧美人与性动交α欧美软件| 亚洲性夜色夜夜综合| 亚洲中文日韩欧美视频| 啦啦啦 在线观看视频| 国产一区二区 视频在线| 日韩欧美一区二区三区在线观看 | 国产成人一区二区三区免费视频网站| 蜜桃国产av成人99| 18在线观看网站| 久久国产精品影院| a级毛片在线看网站| 手机成人av网站| 久久99一区二区三区| 欧美 亚洲 国产 日韩一| 国产一区二区三区在线臀色熟女 | 两性夫妻黄色片| 黄网站色视频无遮挡免费观看| 亚洲一区二区三区欧美精品| 国产精品98久久久久久宅男小说| 香蕉丝袜av| 色播在线永久视频| 欧美成狂野欧美在线观看| 午夜两性在线视频| 嫁个100分男人电影在线观看| 亚洲精品成人av观看孕妇| 交换朋友夫妻互换小说| 久久久久网色| 久久久久久久精品吃奶| 午夜91福利影院| 日韩视频一区二区在线观看| 国产午夜精品久久久久久| 亚洲欧美激情在线| 精品卡一卡二卡四卡免费| 国产精品电影一区二区三区 | 亚洲五月婷婷丁香| 精品一区二区三区av网在线观看 | 少妇精品久久久久久久| cao死你这个sao货| 高清av免费在线| 日韩中文字幕欧美一区二区| 精品人妻熟女毛片av久久网站| 99久久国产精品久久久| 91精品国产国语对白视频| 欧美av亚洲av综合av国产av| 免费女性裸体啪啪无遮挡网站| 一本综合久久免费| 最新的欧美精品一区二区| 每晚都被弄得嗷嗷叫到高潮| 可以免费在线观看a视频的电影网站| 久久久欧美国产精品| 黄色a级毛片大全视频| 午夜福利免费观看在线| 国产老妇伦熟女老妇高清| 久久九九热精品免费| 黑人巨大精品欧美一区二区蜜桃| 免费久久久久久久精品成人欧美视频| 美女高潮喷水抽搐中文字幕| 一区二区三区乱码不卡18| 中亚洲国语对白在线视频| 中文字幕制服av| 欧美黄色淫秽网站| 欧美黑人精品巨大| 免费一级毛片在线播放高清视频 | 麻豆乱淫一区二区| 国产精品秋霞免费鲁丝片| 国产真人三级小视频在线观看| 91大片在线观看| 欧美日韩中文字幕国产精品一区二区三区 | 欧美+亚洲+日韩+国产| 国产亚洲欧美精品永久| 精品人妻熟女毛片av久久网站| 成人永久免费在线观看视频 | 日韩制服丝袜自拍偷拍| www.精华液| 久久久久精品人妻al黑| 老司机亚洲免费影院| 免费人妻精品一区二区三区视频| 丝瓜视频免费看黄片| 午夜成年电影在线免费观看| 国产亚洲欧美在线一区二区| 欧美日韩精品网址| 别揉我奶头~嗯~啊~动态视频| 巨乳人妻的诱惑在线观看| 国产日韩一区二区三区精品不卡| 久久中文字幕人妻熟女| 黄网站色视频无遮挡免费观看| aaaaa片日本免费| 欧美午夜高清在线| 亚洲欧美一区二区三区久久| 十八禁人妻一区二区| 亚洲av成人不卡在线观看播放网| 丰满人妻熟妇乱又伦精品不卡| 女性生殖器流出的白浆| 亚洲精品一卡2卡三卡4卡5卡| 一进一出抽搐动态| 久久精品国产亚洲av香蕉五月 | 激情视频va一区二区三区| 国产97色在线日韩免费| 亚洲av美国av| 国产在视频线精品| 桃红色精品国产亚洲av| 国产精品国产高清国产av | 香蕉国产在线看| 亚洲精品国产色婷婷电影| 新久久久久国产一级毛片| 夜夜爽天天搞| 啦啦啦在线免费观看视频4| 亚洲少妇的诱惑av| 汤姆久久久久久久影院中文字幕| av电影中文网址| 国产三级黄色录像| 国产精品欧美亚洲77777| 极品少妇高潮喷水抽搐| 高清黄色对白视频在线免费看| 国产亚洲欧美精品永久| 国产视频一区二区在线看| 国产91精品成人一区二区三区 | 欧美 亚洲 国产 日韩一| 国产精品免费一区二区三区在线 | 中文字幕制服av| 亚洲国产精品一区二区三区在线| 久久99热这里只频精品6学生| 国产精品影院久久| 丝袜人妻中文字幕| 亚洲专区字幕在线| 99国产精品免费福利视频| 大码成人一级视频| 18禁观看日本| 国产黄频视频在线观看| 久久国产亚洲av麻豆专区| 肉色欧美久久久久久久蜜桃| 999精品在线视频| 自拍欧美九色日韩亚洲蝌蚪91| 老汉色av国产亚洲站长工具| 老司机在亚洲福利影院| 日韩一卡2卡3卡4卡2021年| 久久av网站| 在线 av 中文字幕| 三级毛片av免费| 国产精品免费一区二区三区在线 | 国产精品免费视频内射| 99久久精品国产亚洲精品| 黄片小视频在线播放| 热99国产精品久久久久久7| 在线观看免费午夜福利视频| 国产免费av片在线观看野外av| av电影中文网址| 69精品国产乱码久久久| 国产免费av片在线观看野外av| 亚洲午夜理论影院| 亚洲av国产av综合av卡| 亚洲精品在线观看二区| 精品一区二区三区av网在线观看 | 男男h啪啪无遮挡| 超色免费av| 日韩 欧美 亚洲 中文字幕| 色综合婷婷激情| 欧美亚洲 丝袜 人妻 在线| 国产真人三级小视频在线观看| 日日摸夜夜添夜夜添小说|