• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Hybrid Intelligent Approach for Content Authentication and Tampering Detection of Arabic Text Transmitted via Internet

    2021-12-14 03:48:36FahdAlWesabi
    Computers Materials&Continua 2021年1期

    Fahd N.Al-Wesabi

    1Department of Computer Science,King Khalid University,Muhayel Aseer,Saudi Arabia

    2Faculty of Computer and IT,Sana’a University,Sana’a,Yemen

    Abstract:In this paper,a hybrid intelligent text zero-watermarking approach has been proposed by integrating text zero-watermarking and hidden Markov model as natural language processing techniques for the content authentication and tampering detection of Arabic text contents.The proposed approach known as Second order of Alphanumeric Mechanism of Markov model and Zero-Watermarking Approach(SAMMZWA).Second level order of alphanumeric mechanism based on hidden Markov model is integrated with text zero-watermarking techniques to improve the overall performance and tampering detection accuracy of the proposed approach.The SAMMZWA approach embeds and detects the watermark logically without altering the original text document.The extracted features are used as a watermark information and integrated with digital zero-watermarking techniques.To detect eventual tampering,SAMMZWA has been implemented and validated with attacked Arabic text.Experiments were performed on four datasets of varying lengths under multiple random locations of insertion,reorder and deletion attacks.The experimental results show that our method is more sensitive for all kinds of tampering attacks with high level accuracy of tampering detection than compared methods.

    Keywords:HMM;NLP;text analysis;zero-watermarking;tampering detection

    1 Introduction

    Security issues of digital text in various languages and formats have assumed great importance in communication technologies,especially in terms of content authentication,integrity verification,and copyright protection.Numerous applications,such as e-commerce and e-Banking,impose many challenges during transfer of content via the internet.Most of the digital media transferred over the internet is in text form and is highly sensitive in terms of content,structure,syntax,and semantics.Malicious attackers may temper these digital contents during the transfer process,and thus the modified content can result in incorrect decisions[1].Several solutions of information security have been proposed for many proposes which includes encryption,data hiding,copyright protection,integrity verification and unauthorized access control[2,3].Steganography and digital watermarking(DW)are the most common techniques of information hiding for several proposes such as content authentication and copyright protection whenever,if any altering is made in the watermarked media,the original media still protected and prove its ownership[4].DW uses a specific algorithm to hide information by embedding it in the digital images,audio,video or text[5].Several traditional text watermarking methods and solutions have been proposed and classified in various categories such as structure based,linguistic based,binary image based and format based[6].Most of these solutions require some modifications or transformations on original digital text contents in order to embed the watermark information within text.Zero-watermarking is a modern technique that can be used with smart algorithms without any modification on original digital contents to embed the watermark information[7,8].The most challenges in this area involve developing the appropriate methods to hide information in the sensitive text contents without any modification of it[9].In last decade,the most common digital media transferred among various internet applications is in the form of text.Nevertheless,limited research focused in text solutions because text is natural language dependent and it is difficult to hide security information unlike images which security information can hide in pixels,audio in waves and video in frames[10].Digital Holy Qur’an in Arabic,eChecks,online exams and marking are some examples of such sensitive digital text content.Various features of Arabic alphabets such as diacritics,extended letters,and other Arabic symbols make it easy to change the main meaning of text content by making simple modifications such as changing diacritics arrangements[11–14].Hidden Markov model(HMM)is the most common technique of natural language processing(NLP),which is used for text analysis and extract the text features.

    In this paper,the authors present an intelligent hybrid approach for content authentication and tampering detection of Arabic text,called SAMMZWA.The proposed technique combines Markov Model and zero watermarking.The second order of alphanumeric mechanism of Markov model is used for text analysis in order to extract the interrelationships among contents of the given Arabic text which consequently generates the watermark key.The generated watermark is logically embedded in the original Arabic context without modifications of the original text.After transmission of the text,the embedded watermark is used to detect any tampering with the received Arabic text and ensures the authenticity of the transmitted text.The objective of the SAMMZWA approach is to achieve high accuracy of content authentication and sensitive detection of tampering attack in Arabic text.

    The rest of the paper has five more sections.Section 2 provides a literature review of the related work.Section 3 presents SAMMZWA.Section 4 describes the implementation,simulation,and experimental details.Section 5 describes the comparison and results discussion,and Section 6 offers conclusions.

    2 Literature Review

    In the literature,several research on text watermarking approaches and methods have been proposed for several proposes of information security.In this paper,the authors briefly review the most common classifications of text watermarking methods which are linguistic-based watermarking,structural-based watermarking,and zero-watermarking methods[15].

    2.1 Linguistic-Based Methods

    The linguistic-based text watermarking methods are naturally language-based techniques,which works by making some modifications to the semantics and syntactic nature of plain text in order to embed the watermark key.In the linguistic and semantic-based approaches,information is hidden by making some manipulations on words and utilize them as watermark key using many methods and techniques such as synonym substitution,typos,noun-verbs,and text-meaning representational strings[16].

    One of the syntactic-based method proposed in[17].The proposed method uses open word space to improve the capacity of Arabic text.It works by utilize each word space to hide the binary bit 0 or 1 through which physical modification of the original text is conducted.Other syntactic-based methods presented in[18]for copyright protection by considers the existence of Harakat(diacritics,i.e.,Fat-ha,Kasra,and Damma)in the Arabic language and reverses the Fatha for message hiding.Other English text watermarking method also make use of Unicode characters to hide the watermark information within English scripts.The ASCII code used for embedding is 00,however,and the Unicode used of multilingual for embedding are 01,10,and 11[19].

    2.2 Structural-Based Methods

    The structural-based text watermarking approaches are based on content structure which alters the features or structure of the text to embed the watermark information[20].This also include modifications in general formatting features of the original text to hide watermark key such as locations of letters or words,writing style,repeating some letters or altering the features of the text[21,22].One of the early approaches following the structure-based approach change the locations of words in text[23].Other structural-based approaches proposed in[24,25]for content authentication of Chinese text by merging properties of sentences and calculate its entropy.In these approaches,the contents of Chines text divided into sets of small sentences and obtain semantic code of each word,then calculate its entropy by semantic codes’ frequency,and find the weight of each sentence by utilizing the sentence features such as entropy,length,relevance,and weight function.The extracted features utilized to generate the watermark by using the verbs,and nouns of the high-weight sentences.

    2.3 Zero Watermark-Based Methods

    Zero text watermark-based approaches are based on text features which is achieved by generating the watermark key from the text context.This means several text features should be obtained,extracted and utilized as a watermark information.Several techniques and solutions have been proposed based on text features includes number of words or sentences letters,first letter of each word,and appearance frequency of non-vowel ASCII letters and words[26–34].One of the available text zero-watermarking approaches presented in[26]which hide the watermarking information within the social media and validate it later in terms of accuracy and reliability.Other text zero-watermarking techniques proposed in[27]to validate data integrity of text context over the internet of things.The watermark information is generated as a text features such as text size,data appearance frequency,and time of data capturing.The generated watermark will have to be embedded logically in the original contents before its transmission.Reference[28]shows a text zero-watermarking method has been developed for individual privacy protection based on certain measures such as Hurst exponent and zero crossing of the speech signals.Individual identity has to obtained to embed it as a watermark key.In the case of copyright protection of English text,a text zero-watermark methods have been proposed in[29,30]which uses the appearance frequency of non-vowel ASCII letters and words.

    According to combination solutions with zero-watermarking,such solutions presented in[31,32]which uses natural language processing and zero-watermarking for content authentication.The proposed methods trying to extract some text features to obtain the text probability properties and utilize it as a watermark key.Reference[33]shows a spatial domain technique for copyright protection,data security and content authentication of multimedia images.A robust geometric features-based method has been presented in[34]to improves capacity and watermark robustness.

    3 The Proposed Approach

    This paper proposes a novel reliable approach by integrating NLP and text zero-watermark techniques which there is no need to embed extra information such as watermark key,or even to perform any modifications on the original text.As a result of hybrid solution,very low impact of overall complexity is resulted in terms of time,but in the other hands,there is no possibility for attackers to figure out the mechanism work of algorithm.Second level order of alphanumeric mechanism of Markov model has been used as NLP technique to analyze the contents of Arabic text and extract the interrelationships features of these contents.The main contributions of our approach,SAMMZWA can be summarized as follows:

    ●Unlike the previous work,in which the watermarking is performed by effecting text,content,and size,our approach SAMMZWA embeds the watermarking logically without any effect on the text,content,and size.

    ●In our SAMMZWA approach,watermarking does not need any external information because the watermark key is produced as a result of text analysis and extracting the relationship between the content itself and then making it as a watermark.

    ●Our SAMMZWA approach is highly sensitive to any simple modification on the text and the meaning in the Arabic text,which is known as complex text,including the Arabic symbols which can change the meaning of the Arabic word.The three contributions mentioned above are found somehow only in images but not in text.This is the vital point concerning to the contribution of this paper.

    ●In addition,our SAMMZWA approach can effectively determine the place of tempering occurrence.This feature can be considered an advantage over Hash function method.

    ●SAMMZWA has been implemented,simulated using various several standard datasets,and compared to other baseline approaches under all performance metrics to find which approach gives the best accuracy of tampering detection.Simulation and comparison results prove the accuracy and effectiveness of SAMMZWA approach in terms of tampering detection of unauthorized attacks.Baseline approaches and their execution parameters are presented later in Section 5.1.

    The following subsections explain in detail two main processes that should be performed in SAMMZWA,namely watermark generation and embedding process,and watermark extraction and detection process.

    3.1 Watermark Generation and Embedding Process

    The three main sub-processes included in this process are pre-processing,Arabic text analysis and watermark generation,and watermark embedding as illustrated in Fig.1.

    Figure 1:Text analysis,watermark generation and embedding processes of SAMMZWA

    3.1.1 Pre-Processing Process

    The pre-processing of the original Arabic text is a key step for Arabic text analysis and watermark generation process to remove extra spaces and new lines,and it will be influence directly on the tampering detection accuracy.The original Arabic text(OAT)is required as input for the pre-processing process.

    3.1.2 Text Analysis and Watermark Generation Process

    This process include two sub processes are building Markov matrix,and text analysis and watermark generation processes.

    ●Building a Markov matrixis the starting point of Arabic text analysis and watermark generation process using Markov model.A Markov matrix that represents the possible states and transitions available in a given text is constructed without reputations.In SAMMZWA approach,each unique pair of alphanumeric available in the given Arabic text represents a present state,and each unique alphanumeric represent a transition in Markov matrix.During the building process of the Markov matrix,the proposed algorithm initializes all transition values by zero to use these cells later to keep track of the number of times that the ithunique pair of alphanumeric is followed by the jthsingle alphanumeric in the given Arabic text.

    Pre-processing and building Markov matrix algorithm is executed as presented in Algorithm 1.

    Algorithm 1:Pre-processing and building Markov algorithm of SAMMZWA

    Where,OAT:is an original Arabic text,PAT:is a pre-processed Arabic text,a2_mm:is a states and transitions matrix with zeros values for all cells,ps:refers to present state,ns:refers to next state.

    According to this algorithm,a method is presented to construct a two-dimensional matrix of Markov states and transitions namedwhich represents the backbone of Markov model.

    a2_mm[i][j]length is dynamic in which it is depending on the given text contents and size.The matrix rows refer to the states which is equal to the total number of unique pair of alphanumeric in the given text.However,the matrix columns refer to transitions which is fixed,which is equal to sixty-two possible transitions(twenty-eight alphabets of Arabic letters,space letter,ten integer numbers “0–9,” and twentyfour specific symbols,i.e.,(.'",;:? !/@$ &% *+ -= ><[]).

    ●Text analysis and watermark generation process:after the Markov matrix is constructed,natural language processing and text analysis process should be performed to find the interrelationships between contexts of the given Arabic text and generate watermark patterns.In this sub-process,the appearance number of possible next transitions for each current state of pair of alphanumeric will calculated and constructed as transition probabilities by Eq.(1)below.

    where,

    ●trans:is total of all possible transitions.

    ●n:is total of all possible states.

    ●i:is ithpresent state of pair of alphanumeric.

    ●j:is jthnext transition.

    The following example of an Arabic text sample describes the mechanism of the transition process of present state to other next states.

    When using the second level order of alphanumeric mechanism of HMM,every unique pair of alphanumeric is a present state.Text analysis is processed as the text is read to obtain the interrelationship between present state and the next states as illustrated in Fig.2.

    Figure 2:States representation of Arabic text sample using SAMMZWA

    Text analysis is performed using HMM to extract the features and find the interrelationship between the contents of the given text,we represent 39 unique present states and their 61 possible transitions as illustrated below in Fig.3.

    Figure 3:Sample of an Arabic text states and their transitions using SAMMZWA

    Is it possible to have two or more no-zero value in a row,for instance,it is assumed here thatis a present state of pair alphanumeric,and the available next transitions are.It is observed that ten transitions are available in the given Arabic text sample and “” transitions repeat three times.

    Algorithm of text analysis and watermark generation based on the second-level order of alphanumeric mechanism of Markov model proceeds as illustrated in Fig.4.

    Figure 4:Feature extraction and watermark generation of the given text using SAMMZWA

    Arabic text analysis and watermark generation algorithm is presented formally and executed as illustrated in Algorithm 2.

    Algorithm 2:Watermark generation algorithm of SAMMZWA

    where,ps:refers to the state of unique pair of alphanumeric,ns:represents the next state.

    3.1.3 Watermark Embedding Process

    In the proposed SAMMZWA approach,embedding the watermark have to done logically or digitally into the given text,without physically applying the watermark inside the text and no need to alter the original text.This is achieved by extracting the features of the given text and generating the watermark key by finding all non-zero values in Markov matrix and concatenate them sequentially to generate the original watermark pattern a2_WMPO,as given in Eq.(2)and illustrated in Fig.5.

    Figure 5:Generated watermark a2_WMPO using SAMMZWA

    Watermark embedding process based on second level order of alphanumeric mechanism of Markov model is presented formally and executed as illustrated in Algorithm 3.

    Algorithm 3:Watermark embedding algorithm of SAMMZWA

    3.2 Watermark Extraction and Detection Process

    While the watermarked key is kept secret and ready for detection and verification process,the original watermarked texts are shared to others via Internet.In order to verify the authenticity of the attacked text(AATP),the watermarked text is collected with its watermark key a2_EWMAand compared with the original watermarked text(PAT)with its watermark key a2_WMPO.

    Two sub-processes are involved in this process,which are watermark extraction and watermark detection as illustrated in Fig.6.

    Figure 6:Watermark extraction and detection processes using SAMMZWA

    3.2.1 Watermark Extraction Algorithm

    The pre-processed attacked Arabic text(AATP)is required as input to this sub-process.However,attacked watermark patterns(a2_WMPA)is an output as illustrated in Algorithm 4.

    Algorithm 4:Watermark extraction algorithm of SAMMZWA

    3.2.2 Watermark Detection Algorithm

    This process aims to verify the authenticity of the attacked text(AATP)and notify it is authentic or tampered.This process is achieved by compare a2_WMPAand a2_WMPOin both state and transition level matching as follows:

    ●State level matching:is a default matching,which compare a whole pattern of a2_WMPOand a2_WMPA.The result of this matching is TRUE of FALSE.TRUE notification refer to authenticity of the text without any tampering occurred.Otherwise,FALSE notification refers to tampering detected and then it continues to the transition level matching.

    ●Transition level matching:each transition in a2_WMPAwill be compared with the equivalent transition of a2_WMPOas given by Eqs.(3)and(4).

    where,

    ●a2_PMRT:refers to pattern matching rate value,(0

    where,

    ●a2_PMRS:refers to matching rate in state level,(0

    The weight of each state will be calculated as give in Eq.(5).

    where,

    ●tf:refers to value of transitions frequency.

    ●m:refers to total number of transitions.

    ●a2_PMRS:is the total pattern matching rate of ithstate for each unique pair of alphanumeric.

    ●i:is a number of all available states.

    The final a2_PMR of AETPand OATPare calculated by Eq.(6).

    where,

    ●N:is a total number of non-zeros values in a2_mm[i][j].

    The distortion rate of watermark pattern refers to the detected tampering rate,which is denoted by a2_WDR and calculated by Eq.(7).

    The watermark detection process is executed as illustrated in Algorithm 5.

    Algorithm 5:Watermark detection algorithm of SAMMZWA

    where,

    ●a2_PMR:refers to tampering detection accuracy(0

    ●a2_WDR:refers to distortion rate(0

    The results of watermark extraction and detection process of the given sample of Arabic text using SAMMZWA are illustrated in Fig.7.

    Figure 7:Result of watermark extraction and detection process of the given text using SAMMZWA

    As shown in Fig.7,TP1 represents first transition of non-zero in the given text,TP2 represents second transition,and so on.Some states have only one transition,which is shown in TP1.However,some states have more than transitions,which are represented in TP1,TP2,and so on,such asandstates.

    4 Implementation and Simulation

    To evaluate the tampering detection accuracy of SAMMZWA,several simulation and experiments are performed using self-developed program,various standard dataset,and predefined tampering attacks with various attack volumes as explained in the following sub sections.

    4.1 Implementation Environment and Setup

    A self-developed program has been developed to test and evaluate the performance of SAMMZWA.Implementation environment of SAMMZWA are:CPU:Intel Core i7-4650U/2.3 GHz,RAM:8.0 GB,Windows 10–64 bit,PHP Programming language with VS Code IDE.

    4.2 Simulation and Experimental Parameters

    Tab.1 shows an experimental and simulation parameters and their associated values that used to perform the experiments of the proposed SAMMZWA approach.

    Table 1:Experimental and simulation parameters

    4.3 Performance Metrics

    Tampering detection accuracy refers to the performance of the SAMMZWA approach,which is evaluated using the following metrics:

    ●Tampering detection accuracy(a2_PMR and a2_WDR)under all mentioned attack types and volumes.

    ●Desired tampering detection accuracy values which close to 100%.

    ●Comparison and results evaluation of dataset size effect,attack types effect,and attack volumes effect against tampering detection accuracy using the proposed SAMMZWA approach,HNLPZWA and ZWAFWMMM baseline approaches.

    4.4 Simulation,Experiments and Results Discussion with SAMMZWA

    In this sub section,author evaluates the tampering detection accuracy of SAMMZWA.The letter set cover all Arabic letters,spaces,numbers,and special symbols.Experiments were conducted in different volumes of datasets,various kinds of attacks with their rates as identified above in Tab.1.The simulation and experiments results are shown in tabular form in Tab.2 and graphically illustrated in Fig.8.

    Table 2:Tampering detection accuracy evaluation of SAMMZWA approach

    From Tab.2 above and Fig.8 below,we can see that SAMMZWA shows the best tampering has been detected by reorder attack in cases of both large(50%)and very low(5%)volumes of attack because reorder attack represents both insertion and deletion attacks in the same time.Whereas,in case of mid attack volume,high tampering is detected under deletion attack.This mean that,SAMMZWA gives best detection accuracy and high sensitive to tampering under both deletion and reorder attacks in all scenarios of attack volumes.

    Figure 8:Tampering detection accuracy evaluation of SAMMZWA under all attacks and various volumes

    5 Comparison and Result Discussion

    The tampering detection accuracy results were critically analyzed,effect study and compared between SAMMZWA and baseline approaches ZWAFWMMM and HNLPZWA and shows discussion of their effect under the major factors,i.e.,dataset size,attack types and volumes.

    5.1 Baseline Approaches

    Tampering detection accuracy of SAMMZWA is compared with HNLPZWA(an intelligent hybrid of natural language processing and zero-watermarking approach)and ZWAFWMMM(Zero-Watermarking Approach based on Fourth level order of Arabic Word Mechanism of Markov Model)[35].Comparison is performed under all performance metrics mentioned above in Sub Section 4.3 to find which approach gives the best accuracy of tampering detection.

    5.2 Comparison of SAMMZWA with ZWAFWMMM and HNLPZWA Approaches

    This subsection presents the tampering detection accuracy comparison of SAMMZWA with ZWAFWMMM and HNLPZWA approaches and study their effect under core affected factors are dataset size,attack types and volumes.

    5.2.1 Comparison and Results Study of Dataset Size Effect

    In this subsection,authors present an evaluation of the different dataset size effects on tampering detection accuracy against all attack types under their different volumes.Fig.3 shows a comparison of that effect using SAMMZWA along with ZWAFWMMM and HNLPZWA approaches.

    As shown in the summary of the comparative results of Fig.9 applying the SAMMZWA approach,the highest effects of dataset size that lead to the best tampering detection accuracy are ordered as ASST,AMST,AHMST and ALST,respectively.This means that tampering detection accuracy increased with the decreasing document size and decreased with the increasing document size.On the other hand,the results show that,the SAMMZWA approach outperforms both ZWAFWMMM and HNLPZWA approaches in terms of tampering detection accuracy under all scenarios of dataset sizes.

    5.2.2 Comparison and Results Study of Attack Type Effect

    Fig.10 shows a comparison of the different attack types effect on tampering detection accuracy against all dataset sizes and all scenarios of attacks volumes.A comparison was performed using SAMMZWA with ZWAFWMMM and HNLPZWA approaches.

    Figure 9:A comparison of dataset size effect on tampering detection accuracy using SAMMZWA with ZWAFWMMM and HNLPZWA approaches

    Figure 10:A comparison of attack type effect on tampering detection accuracy using SAMMZWA with ZWAFWMMM and HNLPZWA approaches

    As shown in Fig.10,the SAMMZWA approach outperforms both ZWAFWMMM and HNLPZWA in terms of tampering detection accuracy in all scenarios of deletion and rephrasing attacks.However,ZWAFWMMM and HNLPZWA approaches outperforms SAMMZWA approach in case of insertion attack.This means that SAMMZWA approach is strongly recommended and applicable for content authentication and tampering detection of Arabic text documents transmitted via internet in all cases of deletion and rephrasing attacks.

    5.2.3 Comparison and Results Study of Attack Volume Effect

    Fig.11 shows a comparison of the different attack volume effects on tampering detection accuracy against all dataset sizes and all scenarios of attacks volumes.A comparison was performed using SAMMZWA with ZWAFWMMM and HNLPZWA approaches.

    As shown in Fig.11,the SAMMZWA approach outperforms ZWAFWMMM and HNLPZWA approaches in terms of tampering detection accuracy in all scenarios of low,mid and high volumes of all attacks.This means that SAMMZWA approach is strongly recommended and applicable for content authentication and tampering detection of Arabic text documents under all volumes of all attack types.

    Figure 11:A compression of attack volume effect on tampering detection accuracy using SAMMZWAwith ZWAFWMMM and HNLPZWA approaches

    6 Conclusion

    In this paper,SAMMZWA approach has been proposed by integrating a zero watermarking and natural language processing techniques for content authentication and tampering detection of Arabic text transmitted via the internet.SAMMZWA implemented using PHP self-developed program in VS code IDE as well as simulation and experiments using various standard dataset under different volumes of insertion,deletion,and rephrasing attacks.SAMMZWA approach has been compared with ZWAFWMMM and HNLPZWA approaches.Comparison results show that SAMMZWA outperforms ZWAFWMMM and HNLPZWA in terms tampering detection accuracy under deletion and reorder attacks.Although SAMMZWA approach is an efficient approach,and it is designed only for all scenarios of insertion attack.For the future work,the authors will consider detection accuracy under all scenarios of deletion and rephrasing attacks.Moreover,the authors also intend to evaluate the tampering detection accuracy using high level order of alphanumeric of Markov model.

    Funding Statement:The author extends his appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under grant number(R.G.P.2/55/40/2019),Received by Fahd N.Al-Wesabi.www.kku.edu.sa

    Conflicts of Interest:The author declares that he has no conflicts of interest to report regarding the present study.

    最新在线观看一区二区三区| 亚洲精品粉嫩美女一区| 在线观看免费午夜福利视频| 美女高潮喷水抽搐中文字幕| 国产99白浆流出| 午夜久久久在线观看| 1024视频免费在线观看| 女生性感内裤真人,穿戴方法视频| 欧美av亚洲av综合av国产av| 国产精品久久久久成人av| 欧美一级毛片孕妇| 黄频高清免费视频| 亚洲国产精品sss在线观看 | 免费在线观看视频国产中文字幕亚洲| 中出人妻视频一区二区| 久久99一区二区三区| 日韩 欧美 亚洲 中文字幕| 久热爱精品视频在线9| 国产成人av激情在线播放| 女人精品久久久久毛片| 亚洲欧美一区二区三区黑人| 欧美日本中文国产一区发布| 精品国产一区二区三区四区第35| 久久精品91蜜桃| 热99国产精品久久久久久7| 国产成人啪精品午夜网站| 日韩视频一区二区在线观看| 在线观看一区二区三区激情| 国产亚洲av高清不卡| 欧美最黄视频在线播放免费 | 亚洲在线自拍视频| 亚洲国产中文字幕在线视频| 热99re8久久精品国产| cao死你这个sao货| 99国产精品免费福利视频| 国产av在哪里看| 超碰97精品在线观看| 亚洲国产精品合色在线| 亚洲精品国产一区二区精华液| 中亚洲国语对白在线视频| av有码第一页| 亚洲av成人不卡在线观看播放网| 亚洲av片天天在线观看| 国产97色在线日韩免费| 麻豆国产av国片精品| 日韩视频一区二区在线观看| 午夜福利一区二区在线看| 少妇粗大呻吟视频| 久久久久国产精品人妻aⅴ院| 日韩精品中文字幕看吧| 人妻丰满熟妇av一区二区三区| 老司机福利观看| 国产国语露脸激情在线看| 露出奶头的视频| 久久精品国产亚洲av香蕉五月| 国产精品 欧美亚洲| 亚洲国产精品一区二区三区在线| 男女做爰动态图高潮gif福利片 | 琪琪午夜伦伦电影理论片6080| 欧美激情 高清一区二区三区| 国产一卡二卡三卡精品| 国产一卡二卡三卡精品| 欧美激情极品国产一区二区三区| 国产精品av久久久久免费| 国产亚洲精品久久久久5区| 夜夜爽天天搞| avwww免费| 亚洲国产欧美网| 精品欧美一区二区三区在线| tocl精华| 中文字幕人妻熟女乱码| 欧美黑人欧美精品刺激| 在线观看一区二区三区| 韩国精品一区二区三区| 日日夜夜操网爽| 少妇的丰满在线观看| 国产精品久久视频播放| 久久中文字幕一级| 黄色女人牲交| 操出白浆在线播放| 老鸭窝网址在线观看| 欧美在线一区亚洲| 久久人妻熟女aⅴ| 一个人免费在线观看的高清视频| 99在线人妻在线中文字幕| 精品乱码久久久久久99久播| 国产又色又爽无遮挡免费看| 国产一区在线观看成人免费| 欧美av亚洲av综合av国产av| 久久人人精品亚洲av| 亚洲av成人不卡在线观看播放网| 神马国产精品三级电影在线观看 | 热re99久久精品国产66热6| 国产精品亚洲一级av第二区| 国产精品免费视频内射| 国产视频一区二区在线看| 手机成人av网站| 老熟妇乱子伦视频在线观看| 91九色精品人成在线观看| 一级毛片高清免费大全| 在线观看免费高清a一片| 国产在线精品亚洲第一网站| 国产精品 欧美亚洲| 欧洲精品卡2卡3卡4卡5卡区| 黑人猛操日本美女一级片| 亚洲一区高清亚洲精品| 性欧美人与动物交配| www国产在线视频色| 精品日产1卡2卡| 99久久综合精品五月天人人| 免费久久久久久久精品成人欧美视频| 热99re8久久精品国产| 两人在一起打扑克的视频| 欧美日韩福利视频一区二区| 99在线视频只有这里精品首页| 一区二区三区精品91| 在线观看午夜福利视频| 这个男人来自地球电影免费观看| 超色免费av| 亚洲精华国产精华精| 大型av网站在线播放| 中文字幕人妻丝袜制服| 男女下面插进去视频免费观看| 高清黄色对白视频在线免费看| 久久中文字幕一级| 免费观看人在逋| 交换朋友夫妻互换小说| 在线看a的网站| 日韩av在线大香蕉| 夜夜爽天天搞| 日韩大码丰满熟妇| 如日韩欧美国产精品一区二区三区| 老鸭窝网址在线观看| 一边摸一边抽搐一进一小说| 久9热在线精品视频| 日韩有码中文字幕| 久久香蕉激情| 免费在线观看黄色视频的| 在线观看免费午夜福利视频| 日本一区二区免费在线视频| 日本vs欧美在线观看视频| 99久久精品国产亚洲精品| 中出人妻视频一区二区| 日本三级黄在线观看| 国产精品永久免费网站| 淫妇啪啪啪对白视频| 黑人操中国人逼视频| 757午夜福利合集在线观看| a级毛片黄视频| 黄网站色视频无遮挡免费观看| 国产亚洲精品久久久久久毛片| 欧美日韩黄片免| 亚洲中文字幕日韩| 麻豆成人av在线观看| 亚洲一区二区三区色噜噜 | 国产真人三级小视频在线观看| 久热这里只有精品99| 亚洲精品久久成人aⅴ小说| 88av欧美| 久久中文字幕人妻熟女| a级片在线免费高清观看视频| 久久人人精品亚洲av| 在线视频色国产色| 国产深夜福利视频在线观看| 村上凉子中文字幕在线| av在线播放免费不卡| 美女午夜性视频免费| 亚洲成人国产一区在线观看| 19禁男女啪啪无遮挡网站| 免费搜索国产男女视频| 亚洲国产欧美一区二区综合| 人成视频在线观看免费观看| 69精品国产乱码久久久| 亚洲第一欧美日韩一区二区三区| 久久久久精品国产欧美久久久| 亚洲 欧美一区二区三区| 无限看片的www在线观看| 日本a在线网址| 欧美 亚洲 国产 日韩一| 国产激情欧美一区二区| 久久精品国产综合久久久| 欧美精品亚洲一区二区| 午夜精品国产一区二区电影| 久久精品aⅴ一区二区三区四区| 亚洲精品国产精品久久久不卡| 亚洲黑人精品在线| 久99久视频精品免费| 国产97色在线日韩免费| 亚洲精品国产色婷婷电影| 中文字幕高清在线视频| 一级黄色大片毛片| 国产深夜福利视频在线观看| 99热只有精品国产| 久久中文字幕人妻熟女| 欧美乱妇无乱码| 欧美中文日本在线观看视频| 亚洲情色 制服丝袜| 亚洲专区字幕在线| 欧美亚洲日本最大视频资源| 欧美在线黄色| 色综合站精品国产| 一个人观看的视频www高清免费观看 | 12—13女人毛片做爰片一| 少妇粗大呻吟视频| 男人舔女人下体高潮全视频| 成人免费观看视频高清| 久久亚洲真实| av片东京热男人的天堂| 国产av一区在线观看免费| 91九色精品人成在线观看| 国产99白浆流出| 亚洲成人免费av在线播放| 99精品欧美一区二区三区四区| 黄频高清免费视频| 这个男人来自地球电影免费观看| 亚洲avbb在线观看| 亚洲一区二区三区不卡视频| 日韩中文字幕欧美一区二区| 巨乳人妻的诱惑在线观看| 国产精品九九99| 夜夜爽天天搞| 欧美黄色淫秽网站| 麻豆一二三区av精品| 9热在线视频观看99| 亚洲精品中文字幕在线视频| 在线视频色国产色| 国产三级黄色录像| 夜夜爽天天搞| 国产欧美日韩一区二区精品| 可以免费在线观看a视频的电影网站| 黄色a级毛片大全视频| 国产乱人伦免费视频| 波多野结衣高清无吗| 日韩欧美三级三区| 欧美日韩乱码在线| 在线观看免费午夜福利视频| 欧美另类亚洲清纯唯美| 一级毛片高清免费大全| 精品少妇一区二区三区视频日本电影| 大型黄色视频在线免费观看| 搡老岳熟女国产| 亚洲av日韩精品久久久久久密| 18美女黄网站色大片免费观看| 首页视频小说图片口味搜索| 一级毛片精品| 又紧又爽又黄一区二区| 亚洲欧美日韩无卡精品| 深夜精品福利| 国产精品久久视频播放| 精品久久蜜臀av无| 午夜日韩欧美国产| 一边摸一边抽搐一进一出视频| 亚洲欧美日韩另类电影网站| 动漫黄色视频在线观看| 国产精品影院久久| 亚洲精品美女久久av网站| 久久久久久久精品吃奶| 久久久精品国产亚洲av高清涩受| 国产人伦9x9x在线观看| 757午夜福利合集在线观看| 最好的美女福利视频网| 亚洲精品粉嫩美女一区| 国产色视频综合| 久久久久精品国产欧美久久久| 欧美激情久久久久久爽电影 | 一区二区三区激情视频| 午夜精品国产一区二区电影| 99国产精品免费福利视频| 中文字幕另类日韩欧美亚洲嫩草| 精品国产美女av久久久久小说| 国产伦一二天堂av在线观看| 国产精品亚洲一级av第二区| 天天躁狠狠躁夜夜躁狠狠躁| 亚洲人成77777在线视频| 亚洲五月婷婷丁香| 欧美一级毛片孕妇| 欧美日韩国产mv在线观看视频| 18禁观看日本| 国产精品二区激情视频| 欧美在线一区亚洲| 久久草成人影院| 欧美乱码精品一区二区三区| 精品国产亚洲在线| 日韩精品免费视频一区二区三区| 中文字幕另类日韩欧美亚洲嫩草| 欧美精品一区二区免费开放| 国产精品永久免费网站| 咕卡用的链子| 久久人人97超碰香蕉20202| 国产蜜桃级精品一区二区三区| 黄频高清免费视频| 黄频高清免费视频| 三级毛片av免费| av片东京热男人的天堂| 最近最新中文字幕大全电影3 | 亚洲自拍偷在线| 久久久国产精品麻豆| 69精品国产乱码久久久| 9色porny在线观看| 天堂俺去俺来也www色官网| 两个人免费观看高清视频| 色精品久久人妻99蜜桃| 一级片'在线观看视频| 久久精品亚洲熟妇少妇任你| 无遮挡黄片免费观看| 淫秽高清视频在线观看| 午夜精品久久久久久毛片777| 国内久久婷婷六月综合欲色啪| 亚洲va日本ⅴa欧美va伊人久久| 午夜免费成人在线视频| 久久中文字幕一级| 首页视频小说图片口味搜索| 亚洲精品久久午夜乱码| 777久久人妻少妇嫩草av网站| 国产成人系列免费观看| 男女之事视频高清在线观看| 美女扒开内裤让男人捅视频| 热99国产精品久久久久久7| 嫩草影视91久久| 少妇被粗大的猛进出69影院| 男人舔女人下体高潮全视频| 满18在线观看网站| 婷婷丁香在线五月| 91老司机精品| 久久久久久免费高清国产稀缺| 波多野结衣高清无吗| 国产精品免费一区二区三区在线| 91国产中文字幕| 人人澡人人妻人| 99久久久亚洲精品蜜臀av| 国产欧美日韩一区二区三| 亚洲一区二区三区欧美精品| 欧洲精品卡2卡3卡4卡5卡区| 99久久99久久久精品蜜桃| 老熟妇仑乱视频hdxx| 成年人免费黄色播放视频| 18禁黄网站禁片午夜丰满| 在线观看免费高清a一片| 日韩欧美国产一区二区入口| 亚洲av日韩精品久久久久久密| 免费在线观看黄色视频的| 国产成人免费无遮挡视频| 每晚都被弄得嗷嗷叫到高潮| 免费在线观看完整版高清| 高清毛片免费观看视频网站 | 韩国av一区二区三区四区| 国产深夜福利视频在线观看| 女性生殖器流出的白浆| 波多野结衣一区麻豆| 一级毛片女人18水好多| 大型黄色视频在线免费观看| 国产精品二区激情视频| 青草久久国产| 亚洲情色 制服丝袜| 亚洲一区二区三区色噜噜 | 久久久久久久精品吃奶| 黑人猛操日本美女一级片| 日韩国内少妇激情av| 免费少妇av软件| 日本免费a在线| 亚洲欧美精品综合久久99| 成年版毛片免费区| 999久久久国产精品视频| 午夜福利免费观看在线| a级毛片在线看网站| 色尼玛亚洲综合影院| 国产99白浆流出| 国产精品久久久人人做人人爽| 一级片免费观看大全| 精品久久久久久成人av| 国产亚洲精品久久久久久毛片| 他把我摸到了高潮在线观看| 日韩人妻精品一区2区三区| 大码成人一级视频| 午夜福利影视在线免费观看| 亚洲精品在线观看二区| av在线天堂中文字幕 | 亚洲人成伊人成综合网2020| 久久久久久亚洲精品国产蜜桃av| 久久久久久久久免费视频了| 亚洲五月色婷婷综合| 精品电影一区二区在线| 美女大奶头视频| 久久久水蜜桃国产精品网| 国产亚洲精品久久久久5区| 校园春色视频在线观看| 黄色丝袜av网址大全| 激情在线观看视频在线高清| 欧美黑人精品巨大| 亚洲国产欧美一区二区综合| 两个人看的免费小视频| 纯流量卡能插随身wifi吗| 久久精品人人爽人人爽视色| 一区在线观看完整版| 99国产精品99久久久久| 男人舔女人的私密视频| 国产午夜精品久久久久久| 少妇的丰满在线观看| 9热在线视频观看99| 1024香蕉在线观看| 国产精品美女特级片免费视频播放器 | 搡老乐熟女国产| 国产精品国产高清国产av| a级片在线免费高清观看视频| 18禁裸乳无遮挡免费网站照片 | 亚洲精品在线观看二区| 老鸭窝网址在线观看| 国产精品电影一区二区三区| 精品久久久久久,| a在线观看视频网站| 免费一级毛片在线播放高清视频 | 新久久久久国产一级毛片| 啪啪无遮挡十八禁网站| 日日夜夜操网爽| www.自偷自拍.com| cao死你这个sao货| 日日摸夜夜添夜夜添小说| ponron亚洲| 69av精品久久久久久| 国产高清videossex| 三上悠亚av全集在线观看| 在线看a的网站| 亚洲精品国产色婷婷电影| 嫩草影视91久久| 亚洲国产欧美一区二区综合| 免费在线观看日本一区| 一级a爱片免费观看的视频| 桃红色精品国产亚洲av| 搡老熟女国产l中国老女人| 村上凉子中文字幕在线| 香蕉国产在线看| 99久久99久久久精品蜜桃| av中文乱码字幕在线| 嫁个100分男人电影在线观看| av电影中文网址| 午夜福利,免费看| 国产黄色免费在线视频| 欧美最黄视频在线播放免费 | 欧美日韩精品网址| av免费在线观看网站| 欧美日韩中文字幕国产精品一区二区三区 | 成人av一区二区三区在线看| 日韩av在线大香蕉| 中文字幕av电影在线播放| 亚洲自拍偷在线| 久久性视频一级片| 欧美激情久久久久久爽电影 | 在线天堂中文资源库| 中文字幕色久视频| 国产视频一区二区在线看| 极品教师在线免费播放| 丰满迷人的少妇在线观看| 新久久久久国产一级毛片| 高清毛片免费观看视频网站 | 村上凉子中文字幕在线| 91国产中文字幕| 亚洲精品av麻豆狂野| 亚洲精品一区av在线观看| 亚洲国产毛片av蜜桃av| 亚洲美女黄片视频| 国产视频一区二区在线看| 精品一区二区三区av网在线观看| 一级毛片精品| 涩涩av久久男人的天堂| 极品教师在线免费播放| 淫妇啪啪啪对白视频| 在线观看一区二区三区| 一进一出抽搐动态| 激情视频va一区二区三区| 亚洲国产精品一区二区三区在线| 亚洲情色 制服丝袜| 在线观看一区二区三区| 国产精品秋霞免费鲁丝片| 日韩精品中文字幕看吧| 久久久水蜜桃国产精品网| 天堂影院成人在线观看| 啦啦啦免费观看视频1| 99久久国产精品久久久| 精品一区二区三区视频在线观看免费 | 午夜福利一区二区在线看| 97超级碰碰碰精品色视频在线观看| 亚洲成人久久性| 啪啪无遮挡十八禁网站| 免费一级毛片在线播放高清视频 | 亚洲少妇的诱惑av| 久久性视频一级片| a级毛片黄视频| 精品乱码久久久久久99久播| 久久香蕉激情| 久热爱精品视频在线9| 丝袜美腿诱惑在线| 怎么达到女性高潮| 国产av一区二区精品久久| 首页视频小说图片口味搜索| 日日夜夜操网爽| 一区二区日韩欧美中文字幕| 亚洲avbb在线观看| 欧美在线黄色| 男人操女人黄网站| 欧美人与性动交α欧美软件| 国产精品二区激情视频| av网站在线播放免费| 久久久久久人人人人人| 视频在线观看一区二区三区| 国产精品久久久久成人av| 欧美日本中文国产一区发布| 正在播放国产对白刺激| 无遮挡黄片免费观看| 国产成人av教育| 悠悠久久av| 又大又爽又粗| 日韩精品中文字幕看吧| 亚洲九九香蕉| 中文字幕av电影在线播放| 99精品欧美一区二区三区四区| 高清在线国产一区| 精品一品国产午夜福利视频| 久久久国产成人精品二区 | 国产精品成人在线| 九色亚洲精品在线播放| 少妇裸体淫交视频免费看高清 | 夫妻午夜视频| 搡老岳熟女国产| 亚洲免费av在线视频| 999久久久国产精品视频| 大香蕉久久成人网| 国产精品99久久99久久久不卡| 亚洲av第一区精品v没综合| 中文字幕高清在线视频| 在线天堂中文资源库| 久久影院123| 久热这里只有精品99| www.精华液| 国产又爽黄色视频| 国产精品亚洲av一区麻豆| 国产精品久久久人人做人人爽| 性少妇av在线| 不卡一级毛片| 母亲3免费完整高清在线观看| 老司机亚洲免费影院| 男女之事视频高清在线观看| 国产成+人综合+亚洲专区| 女性生殖器流出的白浆| 日韩大尺度精品在线看网址 | 国产精品99久久99久久久不卡| 天堂中文最新版在线下载| 久久精品亚洲精品国产色婷小说| 天天添夜夜摸| 久久久久久久久中文| 久久精品人人爽人人爽视色| 看片在线看免费视频| 日韩三级视频一区二区三区| 黄色怎么调成土黄色| 十八禁网站免费在线| 伦理电影免费视频| 国产精品国产av在线观看| 日本三级黄在线观看| 亚洲片人在线观看| 国内久久婷婷六月综合欲色啪| 男女做爰动态图高潮gif福利片 | 丝袜美腿诱惑在线| 在线观看舔阴道视频| 成在线人永久免费视频| 91九色精品人成在线观看| 90打野战视频偷拍视频| 美女福利国产在线| 国产一区二区在线av高清观看| 国产精品野战在线观看 | 久久久久久久久免费视频了| 亚洲精品一二三| 免费av中文字幕在线| 婷婷六月久久综合丁香| 夫妻午夜视频| 他把我摸到了高潮在线观看| 日本三级黄在线观看| 欧美黑人精品巨大| 正在播放国产对白刺激| 免费av毛片视频| 国产高清videossex| 亚洲第一青青草原| 精品第一国产精品| 日本黄色日本黄色录像| 国产激情欧美一区二区| 欧美日韩中文字幕国产精品一区二区三区 | 国产不卡一卡二| 大码成人一级视频| 无遮挡黄片免费观看| 性欧美人与动物交配| 亚洲第一av免费看| 色综合欧美亚洲国产小说| 欧美在线黄色| 免费久久久久久久精品成人欧美视频| 在线观看一区二区三区激情| 国产单亲对白刺激| 女人高潮潮喷娇喘18禁视频| 午夜老司机福利片| 午夜免费成人在线视频| 久久久国产成人精品二区 | 日韩一卡2卡3卡4卡2021年| 亚洲自拍偷在线| 久久草成人影院| 99re在线观看精品视频| 夫妻午夜视频| 国产精品免费一区二区三区在线| 黄色怎么调成土黄色| 美女高潮到喷水免费观看| 人妻丰满熟妇av一区二区三区| 亚洲精品粉嫩美女一区| 黑人操中国人逼视频| 国产伦人伦偷精品视频| 亚洲色图av天堂| 久久久久九九精品影院| 老司机靠b影院| 美女 人体艺术 gogo| 最好的美女福利视频网|