• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Tamper Detection and Localization for Quranic Text Watermarking Scheme Based on Hybrid Technique

    2021-12-14 09:56:38AliAlkhafajiNilamNurAmirSjarifShahidanNurulhudaFirdausMohdAzmiHaslinaMdSarkanandSuriayatiChuprat
    Computers Materials&Continua 2021年7期

    Ali A.R.Alkhafaji,Nilam Nur Amir Sjarif,M.A.Shahidan,Nurulhuda Firdaus Mohd Azmi,Haslina Md Sarkan and Suriayati Chuprat

    Razak Faculty of Technology and Informatics,University Teknologi Malaysia,Kuala Lumpur,54000,Malaysia

    Abstract: The text of the Quran is principally dependent on the Arabic language.Therefore, improving the security and reliability of the Quran’s text when it is exchanged via internet networks has become one of the most diffcult challenges that researchers face today.Consequently,the diacritical marks in the Holy Quran which represent Arabic vowelsknown as the kashida(or“extended letters”)must be protected from changes.The cover text of the Quran and its watermarked text are different due to the low values of the Peak Signal to Noise Ratio (PSNR), and Normalized Cross-Correlation (NCC);thus, the location for tamper detection accuracy is low.The gap addressed in this paper to improve the security of Arabic text in the Holy Quran by using vowels with kashida.To enhance the watermarking scheme of the text of the Quran based on hybrid techniques(XOR and queuing techniques)of the purposed scheme.The methodology propose scheme consists of four phases:The frst phase is pre-processing.This is followed by the second phase where an embedding process takes place to hide the data after the vowel letters wherein if the secret bit is “1”, it inserts the kashida but does not insert the kashida if the bit is “0”.The third phase is an extraction process and the last phase is to evaluate the performance of the proposed scheme by using PSNR (for the imperceptibility),and NCC(for the security of the watermarking).Experiments were performed on three datasets of varying lengths under multiple random locations of insertion,reorder and deletion attacks.The experimental results were revealed the improvement of the NCC by 1.76%,PSNR by 9.6%compared to available current schemes.

    Keywords: Text watermarking; tamper detection; authentication; quranic text; exclusive-or operation; queuing technique

    1 Introduction

    Nowadays, the tamper detection of text documents has increased signifcantly for secure data transmission over the internet [1].The importance of effcient and secure multimedia rights regarding digital watermarking techniques has been realized for the privacy preserved information communication [2,3].The watermark scheme is categorized into two primary stages:First is the stage where watermark embedding is carried out in the initial information; second, is the stage for extracting the watermark from watermarked information that has been assaulted.

    Capacity, imperceptibility, robustness and safety are the watermarking criteria.Capacity is the total number of hidden bits while an imperceptibility location is used to measure the difference between the original location and the watermarked location, noting any additions to the original location.Robustness is the capacity to remove or detect a watermark after attacking the watermarked location.Finally, the security requirement is the challenge of removing a watermark without destroying it [4].

    Text watermarking is one of the media’s criteria of digital watermarking and has become crucial due to developments in information concealment.It refers to the process of embedding the watermark inside a text document as a way of protecting in terms of the authentication of the document.The protection of such information is necessary to preserve the watermarked text so that it is the same as the original text without change.In the domain of text watermarking,there are three major issues which must be resolved:imperceptibility, capacity, and security [5].Due to the obvious sensitive nature of the text of the Holy Quran, many methods have been proposed to prevent people from tampering with these invaluable and sacred scripts.The proposed method here is the intended use of a fragile watermark which takes both the wavelet domain and the spatial domain into consideration.Therefore, focused attention is needed to develop some watermarking schemes, especially when it comes to the Arabic language text.

    The Quran was written in Arabic, so in order to conceal information within it, one needs to know the features of the language.Text watermarking has many duties, some of which include the use of the “kashida” letter extension (one of the features of the Arabic language) and the Arabic vowelsandBoth of these tasks are used to embed secret data and determine the order in which the words and conjunctions are placed.Even a hyper mix of two or more features may be used to hide secret data within the Quran’s text.Each of these methods has its advantages and disadvantages; for this reason, a new algorithm must be produced to overcome all of the disadvantages of the existing methods [6,7].

    In this paper, the author presents a scheme for improving the embedding imperceptibility and security through the use of tamper detection and location authentication of a Quranic text watermarking scheme based on vowels with kashida using the exclusive-or (XOR) and queuing techniques.The proposed scheme utilizes the Queuing technique which was chosen in order to check the embed phase for the tamperage of words forms the text of the Quran’s text.As a result,when any of type of attacks such as deletion, insertion, or reordering is detected one can then truly say whether or not the text was, indeed, tampered with, check by extract phase.The main contribution is the development of an improved tamper detection scheme.Thus, this contribution is different from other similar approaches of existing literature due to the addition of the location of authentication in Quranic text watermarking.The proposed scheme was implemented to detect tamperage by a hacker that tried to manipulate the watermarked Quranic text.The use of the hybrid technique refers to using both the XOR and the Queuing techniques which make the proposed scheme more secure in terms of fast and accurate tamper detection.The proposed scheme was able to detect the location of the insertion, deletion and reordering of the tamperage accurately.

    This paper contains fve more sections.Section 2 provides related work.Section 3 presents the proposed methods and evaluation.Section 4 discusses the comparison and results, and fnally,Section 5 offers the researcher’s conclusions.

    2 Related Work

    Obtaining the authentication and credibility of users and information through the internet is vital.However, ensuring the Quran’s text remains authentic is even more vital.The authenticity and originality of verses in digital media can be challenging to preserve especially as it is prerequisite for accomplishing this feat in a quick manner.The proposed method for implementing a Quranic authentication system is based on information retrieval techniques and hashing algorithms.The evaluation of different characteristics may impact the accuracy of the authentication process.Results showed that hashing verifcation is a good candidate for automatic authentication with high confdence.As a result, rather than focusing on encryption, the primary focus is on authenticating information.However, fnding proper Quranic documents online for this research is diffcult; consequently, the relationship between information providers and readers is not typical e-commerce, one-to-one relationship in which typical hash algorithms can be sent to the known receiver.Nevertheless, private keys intended for a receiver will not be applicable in our scenario where the tool is expected to quickly check the Internet for authentic Quranic documents that have not been tampered with [8–10].

    Tamper detection in plain text papers uses a zero-watermarking algorithm.The algorithm produces a watermark dependent on the quality of the text which can later be obtained using the extraction algorithm to defne the tampering position in the document.Watermark matching patterns and watermark distortion rates on several text samples of varying duration are used as measurement parameters.Findings show that this algorithm still detects tamperage even when the amount of it is limited.With the limited volume of attack, the presence of a watermark and the reliability of the details are, therefore, diffcult to determine [11].

    A zero-watermarking method used for authentication utilizes the characteristics of the Arabic characters without changing the fle.The watermark key focuses on the characteristics of the original verses For each verse of the Quran in the initial stage, a key is produced which checks the name and number of the surah along with itsayator verse numbers.The key is then matched with one that is stored at the certifcation authority.The fndings demonstrate the success of this method in detecting random tampering attacks that include 100% detection of any distortions or modifcations rendered to the Quran’s text whether intentionally or unintentionally.Thus, the text should be examined in the event of any discrepancies as shown in Fig.1 [12].

    Some researchers suggest using a tamper locating algorithm for authentication of the content found in .docx documents.The authentication information that is not connected to the text content is stored in the key setting fle called document.xml through the segmentation of the display characters.Identifying the quality of the text content can detect whether or not the embedded watermark is similar to the authentication watermark.Tests show that the algorithm is very sensitive to any change and can very well identify the manipulated places [13].

    Authentication of image content is primarily used to determine the validity of image content and can easily locate the tampered area in order to determine the motive for actions.Therefore, for content-preserving processes such as noise, compression, and replacement methods, the authentication algorithm must be robust and made vulnerable to malicious attacks.Furthermore, semi-fragile digital watermarking techniques can, to some degree, differentiate between content-preserving activities and malicious tampering attacks [14].

    Referring to multiple watermarking systems to secure ownership and tamper detection, this scheme robustly embeds the watermark details used for authenticating copyright by the synonymous replacement process; thus, it uses a double fragile watermark to achieve the detection and position of manipulations.The suggested system has a strong beneft when it comes to its implementation; however, are already some shortcomings such as the watermark’s robustness, the precision of fnding the tamperage when dealing with a more complicated attack, both of which need further developments [15].

    Figure 1:The authentication system of Quran verses [12]

    According to the novel CNN-based security-guaranteed image watermarking generation scenario for smart city applications, the content-based watermark synchronization scheme recognizes watermark embedding positions via stable image feature points in the present anti-geometric attack watermarking algorithm, embeds the watermark in a local neighbourhood feature point,and uses the feature points to locate the watermark.These methods demonstrate increased robustness.The gradient path distribution of the neighbouring pixels of a feature point is used to determine the direction information for each feature point.In practice, in a neighbourhood window based on the feature points, samples are generated, and a histogram is used to measure the gradient directions of the adjacent pixels.Thus, with the main direction of the feature point,the peak of the histogram represents the primary direction of the neighbourhood gradient.The model achieves enhanced robustness with the incorporation of CNN [16].

    The quaternion Fresnel transform (QFST), computer-generated hologram (CGH) and twodimensional Logistic-adjusted-Sine map (2D-LASM) techniques, a novel four-image encryption scheme is proposed.Four images are in the proposed process, Holistically processed in a vector manner by frst using QFST.Then, using virtual RPM, phase-shifting interferometry (PSI) and Burch’s coding process, the encrypted CGH of the input complex amplitude, which is constructed by the components of the QFST-transformed images, is generated [17].

    The RPMs are in order to avoid using the entire RPMs as the decryption keys 2D–LASM produced.LASM’s initial values are used as decryption keys.CGHs have the advantage of digital fabrication, storage and transmission compared to traditional optical holography.Subsequently,the obtained CGH is permitted based on LASM to improve security.Numerical simulations show the feasibility and performance of the proposed system.The encrypted hologram is scrambled based on 2D-LASM to enhance the security of this paper and weaken the correlation.The validity of the proposed technique of image encryption is demonstrated by experiments [17].

    The 2D Fuzzy C-Means (FCM) algorithm has been widely used for segmenting medical images.Throughout the years, various extensions of it were proposed.A modifed version of FCM was therefore proposed for segmenting 3D medical volumes, which has rarely been implemented for 3D medical image segmentation.We present a parallel implementation using the Graphics Processing Unit of the proposed algorithm (GPU).Researchers state that when working with 3D models, reliability is one of the primary problems when using FCM for medical imaging [18].

    A hybrid parallel implementation of FCM is therefore suggested for removing volume objects from medical fles.Using actual medical data and virtual phantom data, the proposed algorithm has been validated.The key factors for the device validation were segmentation accuracy of predefned datasets and actual patient datasets.To demonstrate the effciency of each implementation, the processing times of both the sequential and the parallel implementations are calculated.The results obtained conclude that the parallel implementation is 5x faster than the sequential version of the same operation.Concentrate on automatically segmenting oblique slices from 3D volumetric data.To minimise the processing time here as much as possible, an acceleration mechanism using the GPU will be considered [18].

    Watermarking systems have been implemented before, but authentication and tamper detection are still a major research issue.A double image-based watermarking scheme was introduced using the Local Binary Pattern (LBP) to protect multimedia documents from unauthorized alteration.The suggested approach involves the following procedure:the host image is partitioned into non-overlapping blocks during watermark encoding.This is followed by the generation of the process vector (S) using LBP and secret watermark bits to execute XOR.A two-bit authentication code is created from the (S) vector and embedded in a dual image based on a shared secret key (?).The fndings are compared to state-of-the-art approaches to show the usefulness of our suggested system.It is noted that the proposed scheme is secure and robust against different standard attacks whereas it can detect the integrity of messages inside the watermarked item [19].

    Different scenarios have recently been proposed by the researchers depending on the insertion of variable numbers of kashida per word.Such strategies have produced better results in terms of capacity and security than the previous methods; however, they also reveal a noticeable weakness in the process of retyping [20].These two forms are designed to provide the working memory for the cover sharing.This can be very useful because the secret posts are created without giving any preference to the user.These two suggested patterns for the secret stocks are hidden within the texts using the Arabic script features to conceal the information based on the extension of the kashida.Moreover, two optimization models are suggested that used the kashida to hide the secret stocks in various scenarios.The enhancement is focused on using the bilocation of the kashida possibilities for the embedding of hidden data within the text.The kashida locations of the frst form are considered to lead to the second form, then to the third one, the fourth one and so on as depicted in Fig.2.

    Figure 2:The counting-secret sharing process-based frst approach [20]

    Previous literature shows research has been conducted on text watermarking approaches and methods that were proposed for several purposes of information security.Some research proposes a robust content authentication method for paper text documents, solving the problem of paper document content integrity verifcation, tamper identifcation and tamper position locating.Furthermore, in this method, the watermark information does not depend on the additional carrier,and the text document is embedded with the watermark visible.The watermark is embedded during the process of a printout, which avoids the risk of malicious tampering of the watermark information.As a result, this method is seen to possess high-security performance.The watermarking algorithm is robust against the print-and-scan attack and has a high capacity with low accuracy.In addition, the minimum string edit distance algorithm is used to compare the difference between the authentication watermark signal sequence extracted from the scanned image and the one calculated in real-time, through which it determines whether or not the paper document’s text content has been changed, and if so, it accurately locates the place where it was tampered with [21].

    The Intrusion Detection System (IDS) is an application that detects malicious attacks or data breaches within a network.As a vital network security element, IDS has been frequently used in recent years.This analysis aims to defne the best-ft solution, that would reduce the number of features substantially.Furthermore, with less processing time, the method would lead to high classifcation accuracy.We propose a hybrid feature selection model that combines the strengths of the legacy fltered and wrapper selection mechanism to reach this aim.This proposed amalgam of approaches is supposed to effciently pick the optimal set of intrusion detection features.Using correlation feature selection (CFS) along with three different search techniques known as best-frst,greedy stepwise and genetic algorithm, the suggested hybrid model was carried out [22].

    In order to evaluate each of the features that were frst selected by the philtre process, the wrapper-based subset evaluation uses a random forest (RF) classifer.On both the KDD99 and DARPA 1999 datasets, the reduced feature range was checked in a supervised setting using an RF algorithm with ten-fold cross-validation.The outcome shows that, in terms of detection time, accuracy, and detection rate, choices made by the hybrid feature had better performance improvements.A low false alarm rate was reported, as well [22].

    The suggested zero watermarking utilized the material features of the text to create a watermark instead of embedding the watermark in the text using the structural variable and word length, that is common to all kinds of texts.It consisted of two stages:text embedding and extracting.The watermark was generated with the data holders, and the extraction was done with the certifying authority (CA) [23].The architecture of the proposed tampering detection scheme is shown in Fig.3.

    Figure 3:The overview of HSW technique [21]

    A technique was developed that used a text document as an input for manipulation detection,and the watermark was created based on the HSW (hybrid structural component and word length)approach.A watermark extracted pattern was registered with the (CA) where the attacker could change the document’s contents.During the tampering identifcation, the extraction method was used to retrieve the watermark and the template ftted the recorded (CA) model.A decision on the interference was made that depended on the degree of pattern matching with MD5 compression.The evaluated attacks including the deletion, insertion, and reordering using this method achieved high accuracy than other works and.However, this approach could not update the detailed ownership of the source in the generated watermark information [24].

    The proposed zero-watermarking technique known as watermark arrangement is based on the Markov Model Level 4 Word Mechanism (ZWAFWMMM) and is used for authenticating information and detecting tamperage within the Arabic text.It is an effective model as ZWAFWMMM adopts a hybrid system.Nevertheless, due to the complicated nature and structure of the Arabic language, the basic curriculum uses conventional techniques which lack the capacity to provide effective solutions to the Arabic text.The fndings of the experiment reveal that ZWAFWMMM is more sensitive to all forms of tampering and highly accurate when it comes to the low capacity of tamper detection [25].

    As mentioned before, the Holy Quran is a religious book that plays an extremely vital role in the life of Muslims as the main decisions of Islamic jurisprudence and, indeed, the everyday life of Muslims are based on the instructions written in the verses of the Holy Quran.Ordinary Muslims cannot judge the authentication of the verses of the Holy Quran if the verses have been tampered with.In fact, it requires intense attention, extensive knowledge, and dedicated efforts to be able to tell the difference between true Quranic verses and ones that have been tampered with,especially when one or more words are missing from the recitations.Typically, the authenticity of an online quote attributed to the Quran can be confrmed by making a comparison between the online quotations and the original text of the Quran [26].Furthermore, the Holy Quran is written in Arabic language and with various styles, such as plain text, Uthmanic, Kouf, Kaloon,and other such styles [26].These styles are also used in the Middle East and all Muslim countries.However, Tab.1 mentions the current comparison studies with other baseline approaches.

    Table 1:The summary of comparison with existing work

    3 Proposed Watermarking Method

    The methodology used in this research is divided into four phases:The frst phase is the pre-processing phase which, as its name suggests, is responsible for the preparation of the hosting media such as the Quranic text in this case, and a secret bit (data that was hidden in the text).The second phase includes the embedding of the secret bit within the Quranic text.The third stage involves the extraction of the data including the attack process and the fnal phase is the performance evaluation of the scheme through the use of various measures.The details of each phase are discussed below.

    3.1 Pre-Processing Phase

    In this phase, the watermark is converted from the binary image into the sequence of bits by decoding it with certain conditions (e.g., inserting a kashida in the next letter after the vowel).Next, the binary image is scanned to sequentially fnd the byte.If the byte value is 255, then the secret bit is 0.After fnishing the binary image scan and byte assignment, vector 1 and 0 are produced.During this phase, the original Quranic text is called the cover text.This text consists of various characters that are given a unique ASCII code with a decimal value.This decimal’s value is useful for determining the condition of embedding which is known in advance.Each location is stored in the vector-based condition accordingly and produces the vector for the position as shown in Fig.4.After this process, the pre-processing phase was completed that covered the Quranic text with a secret bit ready for the embedding in the next phase.

    Figure 4:The converting the secret watermark and host text into binary bits

    3.2 Embedding Phase

    The proposed scheme is based on the vowels to be embedded in the Arabic text where the three vowels are used.These letters are selected because they are the most redundant characters in the whole text of the Quran.The embedding process is comprised of the preparation phase for both watermark and covers of the Quranic text.For watermarked text, all the bytes are converted into bits and then stored in the vector.The cover of the Quranic text should scan frst for counting several vowels and check the condition (inserting a kashida in the next letter after the vowel) that is appropriate with the embedding protocol.

    The embedding strategy is accomplished in the following six steps:

    ? Prepare both watermark and cover Quranic text.The preparation step is necessary for any watermarking scheme which is comprised of two elements.

    ? Prepare the watermark for conversion into binary decomposition in the form of 1 and 0 that results in secret input of the system as a serial of bits.

    ? Prepare the Quranic text including manipulating the text as the UTF fle format before embedding to make it compatible with the ASCII code and further control.

    ? Open text fle to check if there are vowel letters and then save them in vector.

    ? Match secret bits with the condition (inserting a kashida in the next letter after the vowel).If matching greater than secret bits then invert the secret bits that are obtained from the watermark (0 →1 & 1 →0).

    ? Apply the embedding process by adding the kashida character when the secret bit is 1 otherwise do not add it.

    ? Embed to satisfy the condition of the frst vowel letter to hold the secret bit (as kashida).

    ? After fnishing the cover text, prepare the watermark text to send the receiver.

    Embedment in the proposed scheme with the condition is necessary to fulfl the agreement between the sender and receiver as shown in Fig.5.

    Figure 5:Embedding process with the condition of the proposed scheme

    There are two cases when inserting the bits from the watermark into cover Quranic text which is 1 and 0 depending on the presence or absence of kashida.These four cases control the most embedding issue as summarized in Tab.2.

    Table 2:Four cases of the embedding process

    Results can be interpreted as 1 if the kashida is present in the watermarked text; otherwise,if it is absent, it is represented as 0.The kashida in the original text (cover text) may or may not appear inside.Each byte in the binary image is represented by bit 1 (white) and 0 (black) and these bits are stored in vector to embed it sequentially into the cover text.After locating the vowel letters and insertion into the cover text, the technique checks the condition of the embedding of the letter in the next vowel letter.

    3.3 Extracting Phase

    Although the extraction process includes many special cases, it is the reverse process of the embedding technique.The enclosed complex data inside the watermarked text needs to be arranged according to the embedding and extracting techniques which may be changed by the external effects.The extracting technique is responsible for the action of all these details.The main contribution of the proposed embedding or concealing technique of the secret bits is the insertion of the kashida at the next letter after a vowel.For extracting the hidden information, one needs to fnd the vowel letter to locate the next letter.To fnd the appropriate kashida position for extracting, the condition for the embedding needs to be checked where the presence or absence of the word’s kashida is represented by the secret bit 1 or 0 as shown in Fig.6.After this phase,a certain letter is converted from the ASCII into the binary bit.These bits are stored in a vector for the next process tamper detection attack as explained below.

    Figure 6:Extraction proposed scheme

    3.3.1 Tamper Detection Attack

    During the transmission, the watermarked Quranic text suffers from many kinds of attacks and tamper detection is one of them.Tamper detection in the proposed scheme aims to fnd any external manipulation that is unauthorized.The recipient does not know whether the watermarked text was tampered with or not.Thus, the proposed scheme detects whether or not the watermarked Quranic text has been tampered with by reading each letter or word throughout the document.Therefore, that which the watermarked text is converted into consists of the decimal value and vector of the decimal value and is examined by taking the highest value found in the text.Next, by examining and analyzing it with the remaining text characters, one of its values is obtained.A fle must be opened to store these values where, afterwards, they are read and combined with different techniques to both stores in a vector and also determine their location as well.

    Furthermore, the detection of a tampered-with watermarked Quranic text usually shows that the text has been manipulated by the intruder in one or all of three ways.First, the intruder adds either a single letter to the word or adds a single word to the statement to confuse the recipient of the watermarked Quranic text.Second, the intruder deletes one letter in the word or one word in the sentence, which affects the meaning of the sentence.However, quite often, it is an unimportant letter in the text that the intruder seeks to modify.Moreover, the deletion or shifting of such a letter does not change the whole meaning of the word or statement.Depending on the nature of the language, it is important to work with some letters that have no meaning or are often aesthetically located within the text.Third, the intruder often manipulates the letters in the word or sentence to trick the receiver and becomes successful due to the similar-looking shape and size of the original text in the watermarked Quran.If detected the fle must be read again,otherwise, the scheme is claimed to be successful.

    In the present study, the proposed scheme fnds there are three types of tampering and resolves the drawback of the existing methods for tamper detection inside the program as mentioned above.Thus, two techniques are included in the proposed scheme for controlling tamper detection.These include the queuing technique with the FIFO process and the XOR operation to check changes in the watermarked Quranic text as discussed below.

    Queuing TechniqueThe main aims of watermarking schemes are to conceal the secret bit in the cover Quranic text.This is frst done on the sender’s end to produce the watermarking of the text.It is then sent through the trusted channels to the receiver for extracting the original secret text.The receiver’s side is responsible for receiving the data and is not aware of the missing part in the received data.For this reason, some missing information may contain a secret bit; therefore, it is important to keep an eye out for any information which might be lost during this time.Sensitive data should be integrated and there is no way to proceed without every bit of information in its wholeness.Thus, the queuing technique is proposed to track each letter and word between the sender and receiver.The main issue here is to detect the presence of any tamperage in the text of the Quran wherein any text represented in the digital world as the ASCII code (hexadecimal)must be converted into a binary representation (a serial of bits).These bits involve the words and statement (whole text).Logically one can depict this compensation as a queue Fig.7.

    Figure 7:Structure of the queue in the proposed scheme

    The queue looks like a 2D array where the rows represent a place of words with each cell consisting of a letter.Every word located in a single row, along with the number of rows in this array, considers the whole text.The last bit in the row specifes the results of the XOR operation,where the last bit in the vector that denotes the XOR of all the bits in the end or rows mentioned before.On the receiver side, the whole text is received as one package and the receiver reads it word for word or even letter for letter.Consequently, the architecture of the text of the Quran looks like queue letter by letter representing the word (raw of the queue) and word by word to represent the statement (verses) or the whole text (column of the queue).The receiver manipulates the text of the Quran as a serial of bits.Therefore, the absence of one letter or word immediately gets discovered due to the change in the sequence of the queue.The receiver side can catch the original text queue by comparing with the key that contains an index for this queue.However, the tampering or changing of the text of the Quran is easy to discover with its secret information.

    The secret key that sends to the receiver should contain the indexing of the queue, wherein the indexing queue consists of the manipulated bits generated from many processes based on the XOR operation.Generally, half of the words (50%) are taken from each row and the XOR with another half of the same word is performed to produce the bits considered as the indexing bits.The same procedure is followed for the rest of the queue and applies to all of the text of the Quran as illustrated in Fig.8.

    In the queue, the bits of the word XOR results in the bit store at the end of the row which is checked later by the receiver.Changing or modifying any letter of the word leads to an error in this bit.The same XOR operation is applied to all these bits for all the text (queue) and the results are stored in the secret key.

    XOR OperationAfter embedding, the watermarked Quranic text is sent to the receiver wherein all the embedded secret information is extracted from the watermarked text that is stored in the watermarked key.The watermarked key can carry very little information in this case, and as such,there must be some technique to retrieve as much information as possible.It is known that a proposed scheme that produces one decimal value can be used by another partner to fnd the real or original fle.This value is considered as the maximum value in the text fle extracted from the vector of the queuing technique.After producing this value, the receiver performs the XOR of all the values in the queue with this number inside the key to fnd the original text.

    3.3.2 Tamper Detection Process

    Figure 8:Process of the queue for the tampering

    The proposed scheme detects the tampering in the watermarked fle by reading each letter or word throughout the document.First, the watermarked text is converted into ASCII and the examined by taking the highest value found in the text.Next, by examining and analyzing it with the remaining text characters one of its values is obtained.A fle must be opened to store these values and then they are read as well as combined with the XOR to store in a vector.In this event if the tampered text is detected then the fle must be read again; otherwise, the scheme is claimed to be successful.Thus, Fig.9 shows the basic architecture of the proposed tamper detection scheme.

    Figure 9:Tamper detection process

    Any text fle consists of a group of letters and even space is considered a letter under a certain value.Thus, each text fle considers a series of letters that can be viewed as a long vector.The letter or character is coded in the computer in a unique ASCII code which is shown as the decimal value.In fact, a text fle is a group of decimal value and each value matches one character in the text fle.Consequently, for decoding the letters within text fle the decimal value fle is created similar to the 2D array or matrix with rows and columns as depicted in Fig.10

    Figure 10:Decoding scheme of the watermarked text

    The conversion of the watermarked Quranic text fle into the corresponding decimal value is necessary.The decimal values are easy to generate using logical operations such as the XOR,OR, AND, and so on.The basic insight can be obtained from the decimal fle which is necessary to secure the process and information itself.If conditions are favourable, the logical process is started.In the proposed scheme, this term refers to the selection of the maximum number or value from the decimal fle.This maximum number that is used for the important logical operation is called the Exclusive OR process (⊕).

    Moreover, it is worth explaining the details of the XOR operation here.This operation is considered to be the logical operation that accepts two arguments including the digital input and produces one argument result.For more than two arguments one must combine many operations.The XOR operation is mainly applied due to its ease of use, understanding, and ability to acquire input as a result in the second iteration.It implies that if the output result is XOR-ed again with one input argument then one can get the second input argument.On other hand, if only one of p or q is T/1, then the result will be T/1.Otherwise when both p ⊕q is (F/0) or (T/1) then the result will be F/0.Thus, considered to symbol F=false, and T=true as shown in Fig.11.

    Figure 11:Features of the XOR operation

    After the embedding phase, the authentication process starts with the decimal fle and the maximum number of some procedure via the XOR operation.Every number in the decimal fle is XOR-ed with the maximum number that is derived from the decimal fle for tracking.Consequently, the Queue vector is designed to store the results (decimal fle ⊕MAX value) using the queuing technique.The frst decimal value obtained from the decimal fle is XOR-ed with the max value and the results stored in the frst position of the queue vector.The same procedure is used for the next second decimal value and its result is store in the second position of the queue vector.The queue vector generation strategy followed the First In First Out (FIFO) or on a frst-come, frst-served basis.On the sender’s side, a vector is produced after embedding which is further used by the receiver to verify the presence or absence of tamperage in the watermarked fle before extracting to.After the embedding process, to keep track of the queue vector the reverse procedure is followed in the sender side as displayed in Fig.12.

    Figure 12:The tamper detection strategy of the proposed scheme

    After the receiver obtains the necessary information from the watermarked key, the XOR operation is performed to logically generate the queue vector and max value number.This operation results in a decimal fle identical to the one derived from the watermarked fle.Thus, the procedure of authentication in the system operates like A⊕B=C at the sender side and B⊕C=A at the receiver side (or vice versa).

    After fnishing the XOR process, the resultant fle is compared with the decimal fle derived from the watermarked text to identify the presence (or absence) of any differences, indicating the presence (absence) of tampering.This method is very secured, less time consuming and makes it more diffcult for the hackers or intruders to guess the secret key.Using this technique, three main threats can effectively be detected such as the insertion of the outlandish character or deletion of one of the specifc existing characters, or the modifcation or reordering of characters in the text fle as explained underneath.

    Fig.13 shows the basic design of the proposed tamper detection scheme that reads the secret key and watermarked fle on the receiver website.Next, the method examines the vector fle from the key in the text.Consequently, it reads both vector and watermarked characters until the entire fle is processed.The examination and analyses for the remaining text characters are obtained until the end of the fle is processed.Then, it reads again to rectify the presence of any issue related to the processing.In addition, it normalizes the length of fles by reading both vector and watermarked characters.When the vector and watermarked characters are combined with the XOR of different values, it implies the successful detection of the tampered text.Thus, the fle must be read again.Finally, the scheme writes the fle with the position of a mark to detect the location.

    In addition, Fig.14 shows the whole identifcation tamper pseudocode scheme used in the proposed technique.

    3.4 Evaluation Phase

    Every watermarking system aims to evaluate the performance of the resultant watermark media on the sender’s side before sending it to the receiver, thereby ensuring the robustness of the proposed scheme against attacks.In this paper, two types of assessment evaluation are used to check the performance of the proposed scheme:First, the Peak Signal-to-Noise Ratio (PSNR) is evaluated to determine the imperceptibility of the watermarked version.The PSNR value refects the similarities between the watermarked Quranic text with the original.If the PSNR is high then it is easy to deceive the intruder or attacker, implying the absence of secret bit involvement in this media.

    The distribution of the secret bit embedded to cover the Quranic text refects the PSNR value,while the PSNR detect the frequency of the bits within the cover Quranic text.When the bits become heterogeneous or more chaotic, then the PSNR will get high value.Thus, for embedding is introduced.The high PSNR value indicates good quality of the Quranic text, thereby all the previous methods tried to enhance the PSNR [26].Subjective methods depend on the human eye and assessment without using any reference evaluation.The PSNR value that is used to measure the quality of the text of the Quran after embedding can be defned as Eqs.(1) and (2):

    With,

    where the variable integer MAX is the maximum number of possible letters value of the input text, then MAX is considered one or 255 bytes which means adding the kashida into embedding process when it contains an unsigned 8-bit integer data type.While MAX considers 0 when it does not have any kashida, m:integer value is the range of the whole text, and n:integer variable considers the number of verses; in the other part of the Eq.(1):character variable refers to the original text and K:character variable is the noisy text (watermarked text).

    Figure 13:Identifcation tamper process

    Since the MSE double variable adversely affects the double variable PSNR, then there will surely be some inevitable harmful effects.The PSNR parameter allows for the normalizing of the equation for all methods and text types.However, measured either as a ratio or as a(log10)base?10 (decibel) or base?2 (doublings orbits), the logarithmic value of the difference lies between the smallest and largest signal values.For example, the decibel (dB) is a unit used to express the ratio as logarithms, mostly for signal power and amplitude [27].

    The second evaluation of the effective performance evaluation of system security for the Quranic text watermarking is the calculation of Normalized Cross-Correlation (NCC) measure.The double variable NCC value refects the ability of the watermark to withstand against any attack that happened to the watermarked text [28].The NCC can calculate the similarity between the original watermarkW(i,j)and the extracted watermarkW′(i,j)when using Eq.(2):

    Figure 14:The whole identifcation tamper pseudocode proposed scheme

    wherenandmare the integer variables represents the range of the text (verses or whole text),i and jare the integer variables refer to the location of the text and letter in such word.

    The range of the NCC value is in between 0 and 1 and the watermark is said to be the best when it is very close to 1, indicating the closeness of the extracted watermark character variable (W′) to the original one (W).The NCC value obtained from the DCT or frequency domain is often lower than the spatial domain because the coeffcients in the frequency domain always affect the extracted watermark (W′), thus making it lesser [29].In image watermarking, the NCC very clear but in the proposed text watermarking scheme a substantial difference from the existing scheme must be achieved.The extracted text of the Quran is frst separated into verses and then the words take characters.By comparing it with the original text of the Quran (W),if the watermarked text shows a slight difference then it is considered as an abutter method than other approaches; else, the embedding process must be repeated.

    However, the material of data used in the Quranic text dataset was acquired from the public domain via the Internet.The Arabic text was obtained from different reported art-of-the-studies for benchmarking.This dataset was selected due to the enclosure of the sensitive data related to Islam.In addition, surahs of different sizes were chosen for the compression of the host text,benchmarking, and evaluation as explained below.

    4 Results and Discussion

    The implementation of the proposed scheme has been achieved via the use of MATLAB software.In order to evaluate the performance of the proposed approach, it has been considered the standard and authentic version of Quran datasets from tanzil.net [30].Likewise, these standards have been used in previous research.This dataset was further verifed by experts.Moreover, the standard Quran datasets which have been utilized in this work are selected based on the payload capacity and watermark (Logo).The performance evaluation of this work is performed through using four different payload capacity (Al-Kursi verse 4 Kelo bytes (Kb), Surah Al-A’raf 32 Kb,Surah Al-A’raf and Al-Anbiy 43 Kb, Surah Al-Baqara 58 Kb).Consequently, Watermarking of the Four logos in the binary images of such as the H, UTM, Nike, andAre chooses randomly dependent on the sizes.Fig.15 shows the system interface of the proposed scheme based on tamper detection with the location:

    Figure 15:The tamper detection with the frst location in the watermarked Quranic text using the proposed technique

    The system is tested by modifying the output fle of the watermarked Quranic text to see if the system can detect this case as illustrated in Fig.16.This includes the modifcation of the Text of the Quranic text without any sense wherein the text can easily be altered by editing it using any software application.

    In Tab.3, we compare the performance of the proposed scheme in terms of PSNR and NCC values with the existing state-of-the-art methods in the literature.The results revealed that the proposed method outperformed the existing ones in terms of quality and robustness.For a fair comparison, the watermark was used for the testing.The PSNR value for watermark host text was 68.20 dB, displaying about 16 dB quality enhancement compared to the highest reported PSNR value (52.05 dB).In addition, the PSNR value for watermark chess host text was 67.43 dB, indicating a quality increase of 14.5 dB compared to the existing reports (62.94 dB).In short,the improvement was acceptable due to the enhancement of the PSNR by 16 dB over other literature reports.

    The NCC value of the proposed method for the watermark host text was 0.9976%, showing the security enhancement of 1.76% compared to the latest related work 0.98%.In (H) host text,the NCC value for the proposed method was higher than the reported fnding which is 0.9976%,for the still (H) host text.Thus, the proposed scheme achieved about 1.76% security and accuracy enhancement for the NCC value compared to that reported in the literature.

    The results of the measurement performance using PSNR and NCC in this study to improve the accuracy and security are shown in Figs.16 and 17.

    Figure 16:Imperceptibility evaluation using

    Fig.16 shows the illustrated results of different payload capacity with a fxed secret watermark of 25 bytes.The difference (83.06 to 86.12) of about 3 dB in the PSNR at the beginning is due to the small text fle size where the reversing mechanism played a remarkable role.However,larger text fle sizes (which made up the rest of the cases) allowed for the use of the random function among the satisfying conditions; thus, the reversing mechanism played an insignifcant role.For large text fles as hosting media, more vowels are available to host a secret bit and thus randomly chosen from these letters.The PSNR value is increased with the increase in the fle size.The observed sudden increase from one limit capacity to another is because of the excess available space for hosting the secret bits, indicating the embedment of many secret bits and thus making the free space untapped.

    Fig.17 shows the varying payload dependent NCC values.Overall, 1344 bytes has the highest NCC value compared to (25,672, and 841) watermarks.This fgure also shows that, although there are three different host text fle sizes (32000, 43000, and 58000 bytes) used to embed the host text fle and test the security of the proposed scheme, 58000 bytes (grey color) has a better result in all host text fle size.

    The results of NCC as shown in Fig.18, posit that the Quranic text processing tools have been distributed over the Internet.Because of this easy and free handling, a sensitive document found on the internet such as the Holy Quran is always under the threat of being tampered withby intruders or malicious users, causing it, thereby, to lose its authenticity and originality.For many applications, the verifcation of the integrity of such data is important.Therefore, many methods have been proposed over the years to verify the authenticity and integrity of the text of the Quran’s content.In this spirit, to keep the text of the Quran far from distortion or tampering a robust watermarking scheme has been proposed to detect all kinds of tampering in advance before proceeding to extract the information.

    Table 3:Comparison of security evaluation using PSNR and NCC

    Figure 17:The values of NCC as a function of the different logos with payloads capacity payload capacity obtained using the proposed scheme

    The benchmark of tamper detection of the proposed scheme compared to other researchers work in the tamper detection attack of the Quranic text-domain is shown in Tab.4.

    Tab.4 shows the benchmark work with existing researchers’ work that mentioned there is tamperage or not.All the host apply by all researchers are from Arabic text.The previse work as shown in Tab.4.Only detect the status of tamper.However, our proposed scheme improved the ability to show the location tampered as shown here in Fig.18:

    Figure 18:System response against the tamper attack detection

    Tamper detection is a different procedure from other evaluation criteria in terms of the measures where detection gives the condition of true or false.In the simulation program, the notifcation is received to ascertain the presence or absence of the tamperage.In addition, can be determined the location of the tamper detection inside the word or statement called tamper identifcation so this process is working when the text has been tampered with.

    Table 4:Compression evaluation of tamper detection attack

    Indeed, the effciency of this scheme that we are focusing on the authentication of the tamper detection and location inside the text watermark than existing works.Therefore, we used 3 datasets to get the best experimental analysis results compared with the benchmark of the currently existing work.

    5 Conclusion

    The purpose of this paper is to enhance the watermarking scheme of the text of the Quran based on a hybrid technique (XOR and queuing techniques).The methodology consisted of four phases:The frst phase was the pre-processing phase followed by the embedding process phase which is performed in order to hide the data after the vowel letters where if the secret bit is“1”, it inserts the kashida but does not insert the kashida if the bit is “0”.The third phase is an extraction process and the last phase is an evaluation of the performance of the proposed scheme by using PSNR for the imperceptibility and NCC for the security of the watermarking.However, in terms of tampering detection, accuracy falls below deletion, insertion, and reordering attacks.The experimental results revealed the improvement of the NCC by 1.76%, PSNR by 9.6% compared to available current schemes.For the future work, researchers should consider the watermarking of the Quranic text when manipulating the text in different formats (.docx, .rtf, and so on) which was out of the scope of this research.Again, some measures that are not mentioned in evaluating the present scheme might also be considered.Many attacks which are not considered in the proposed scheme must be also be looked into.In sum, it is worthwhile to enhance the security and capacity of the scheme for its further betterment.

    Acknowledgement:The authors would like to thank those who contributed to the article and who support them from Universiti Teknologi Malaysia (UTM) for their education.

    Funding Statement:The authors extend their appreciation to the Ministry of Higher Education(MOHE) and Universiti Teknologi Malaysia (UTM) for their educational and fnancial support.This work is conducted at Razak Faculty of Technology and Informatics, under cyber-physical systems research group and funded by MOHE (FRGS:R.K130000.7856.5F026), Received by Nilam Nur Amir Sjarif.

    Conficts of Interest:The authors declare that they have no conficts of interest to report regarding the present study.

    国产黄片美女视频| 亚洲国产欧美人成| av超薄肉色丝袜交足视频| 免费在线观看亚洲国产| 亚洲中文日韩欧美视频| 国产精品免费视频内射| 麻豆国产97在线/欧美 | 亚洲精品av麻豆狂野| 亚洲熟女毛片儿| 国内揄拍国产精品人妻在线| 俄罗斯特黄特色一大片| 久久午夜亚洲精品久久| 欧美日韩一级在线毛片| 久久久精品国产亚洲av高清涩受| 免费一级毛片在线播放高清视频| 99久久久亚洲精品蜜臀av| 成人三级黄色视频| 国产精品日韩av在线免费观看| 日本一二三区视频观看| 国产aⅴ精品一区二区三区波| 亚洲色图av天堂| 亚洲国产精品999在线| 亚洲人成77777在线视频| 午夜精品久久久久久毛片777| 久久国产精品影院| 在线观看美女被高潮喷水网站 | 超碰成人久久| 日本五十路高清| 国产精品免费一区二区三区在线| 丝袜人妻中文字幕| 欧美大码av| 国产精品99久久99久久久不卡| 日韩成人在线观看一区二区三区| 久久中文看片网| 精品久久久久久久毛片微露脸| 中文字幕熟女人妻在线| 亚洲狠狠婷婷综合久久图片| 日日干狠狠操夜夜爽| 久久天躁狠狠躁夜夜2o2o| 亚洲精华国产精华精| 18美女黄网站色大片免费观看| 男女视频在线观看网站免费 | 国产精品98久久久久久宅男小说| 国产精品亚洲一级av第二区| 小说图片视频综合网站| 午夜两性在线视频| 男人舔女人的私密视频| 日本 av在线| 国产一区二区激情短视频| 免费人成视频x8x8入口观看| 亚洲第一电影网av| 黑人巨大精品欧美一区二区mp4| 国产精品av视频在线免费观看| 狠狠狠狠99中文字幕| 少妇的丰满在线观看| 亚洲天堂国产精品一区在线| 一级毛片高清免费大全| 99久久久亚洲精品蜜臀av| 一二三四社区在线视频社区8| 亚洲色图 男人天堂 中文字幕| 日本一本二区三区精品| 久久精品91蜜桃| 岛国视频午夜一区免费看| 男人的好看免费观看在线视频 | 亚洲精品国产精品久久久不卡| 麻豆国产av国片精品| 欧美一级a爱片免费观看看 | 久久久久精品国产欧美久久久| 欧美精品亚洲一区二区| 欧美黄色片欧美黄色片| bbb黄色大片| 丁香六月欧美| 日韩中文字幕欧美一区二区| 此物有八面人人有两片| av有码第一页| 欧美成狂野欧美在线观看| 亚洲精品国产一区二区精华液| 成人国产综合亚洲| 在线免费观看的www视频| 又大又爽又粗| 最新美女视频免费是黄的| 亚洲成人免费电影在线观看| 99精品欧美一区二区三区四区| 在线观看免费日韩欧美大片| 人人妻人人看人人澡| 国产男靠女视频免费网站| 最近视频中文字幕2019在线8| 亚洲人成伊人成综合网2020| 亚洲一区中文字幕在线| 丰满的人妻完整版| 午夜精品久久久久久毛片777| 免费观看精品视频网站| 2021天堂中文幕一二区在线观| 国产黄色小视频在线观看| 久久草成人影院| 757午夜福利合集在线观看| av在线播放免费不卡| 免费人成视频x8x8入口观看| 久久久精品大字幕| 亚洲精品一区av在线观看| 我要搜黄色片| 中文字幕最新亚洲高清| 一区二区三区高清视频在线| 亚洲18禁久久av| 亚洲精品久久国产高清桃花| 男女那种视频在线观看| 日韩精品青青久久久久久| 久久久精品欧美日韩精品| 亚洲成a人片在线一区二区| 熟妇人妻久久中文字幕3abv| 日本 av在线| 高清毛片免费观看视频网站| 午夜精品一区二区三区免费看| 999精品在线视频| 麻豆国产97在线/欧美 | 精品人妻1区二区| 久久人妻福利社区极品人妻图片| 正在播放国产对白刺激| 久久精品91蜜桃| 久久香蕉国产精品| 午夜福利成人在线免费观看| 欧美成人午夜精品| 亚洲无线在线观看| 国产视频内射| 超碰成人久久| 午夜福利18| 狠狠狠狠99中文字幕| 欧美另类亚洲清纯唯美| 黄色 视频免费看| 欧美日韩中文字幕国产精品一区二区三区| 精品午夜福利视频在线观看一区| 久热爱精品视频在线9| 久久精品国产清高在天天线| 亚洲五月天丁香| 男女那种视频在线观看| 亚洲欧美日韩无卡精品| 毛片女人毛片| 91在线观看av| 丰满的人妻完整版| 女警被强在线播放| 亚洲精品一卡2卡三卡4卡5卡| 男女床上黄色一级片免费看| 老司机午夜福利在线观看视频| 欧美日韩精品网址| 99在线人妻在线中文字幕| 精品熟女少妇八av免费久了| 亚洲av五月六月丁香网| 国产一区二区激情短视频| 国内精品久久久久久久电影| 日日夜夜操网爽| 日韩免费av在线播放| 久久中文字幕人妻熟女| 亚洲av成人精品一区久久| 精品电影一区二区在线| 男女视频在线观看网站免费 | 香蕉丝袜av| 国产激情久久老熟女| 成人特级黄色片久久久久久久| 亚洲精品国产精品久久久不卡| 欧美丝袜亚洲另类 | 草草在线视频免费看| 日韩大码丰满熟妇| 亚洲av成人一区二区三| 女同久久另类99精品国产91| 久久国产乱子伦精品免费另类| 亚洲18禁久久av| 51午夜福利影视在线观看| 高清毛片免费观看视频网站| 老司机午夜福利在线观看视频| 最新美女视频免费是黄的| 欧美不卡视频在线免费观看 | 欧美日韩福利视频一区二区| 欧美中文综合在线视频| 香蕉久久夜色| 亚洲成人久久性| 亚洲激情在线av| 中文字幕熟女人妻在线| 欧美色欧美亚洲另类二区| 亚洲欧美日韩高清在线视频| 欧美日本亚洲视频在线播放| 亚洲成av人片免费观看| 精品久久久久久久久久免费视频| 成人特级黄色片久久久久久久| 九九热线精品视视频播放| 校园春色视频在线观看| www.自偷自拍.com| 18禁裸乳无遮挡免费网站照片| 一级毛片精品| 国产私拍福利视频在线观看| x7x7x7水蜜桃| 国产精品99久久99久久久不卡| 国产一区二区在线av高清观看| 可以免费在线观看a视频的电影网站| 在线a可以看的网站| 亚洲av日韩精品久久久久久密| 蜜桃久久精品国产亚洲av| 少妇粗大呻吟视频| 18禁裸乳无遮挡免费网站照片| 中文字幕高清在线视频| 国产精品香港三级国产av潘金莲| 久久这里只有精品19| av福利片在线观看| 黄频高清免费视频| 丰满人妻熟妇乱又伦精品不卡| 黄色成人免费大全| 19禁男女啪啪无遮挡网站| 成熟少妇高潮喷水视频| 欧美又色又爽又黄视频| 午夜福利视频1000在线观看| 久久久久免费精品人妻一区二区| 99久久精品热视频| 在线观看免费日韩欧美大片| 亚洲一区中文字幕在线| 99国产综合亚洲精品| 国产人伦9x9x在线观看| 国产精品久久久av美女十八| 一进一出抽搐动态| 看片在线看免费视频| 亚洲美女黄片视频| 国产精品美女特级片免费视频播放器 | 50天的宝宝边吃奶边哭怎么回事| 男女下面进入的视频免费午夜| 在线观看日韩欧美| 精品不卡国产一区二区三区| 最近最新中文字幕大全免费视频| 看黄色毛片网站| 国产免费av片在线观看野外av| 很黄的视频免费| 变态另类成人亚洲欧美熟女| 欧美日韩亚洲综合一区二区三区_| 亚洲天堂国产精品一区在线| 国产精品香港三级国产av潘金莲| 狂野欧美白嫩少妇大欣赏| 777久久人妻少妇嫩草av网站| 91成年电影在线观看| 日本在线视频免费播放| 欧美av亚洲av综合av国产av| 久久午夜亚洲精品久久| 黑人巨大精品欧美一区二区mp4| 亚洲性夜色夜夜综合| 久久久久久久久免费视频了| 国产精品香港三级国产av潘金莲| 欧美3d第一页| 伊人久久大香线蕉亚洲五| 国模一区二区三区四区视频 | 男女午夜视频在线观看| av福利片在线| 国产精品久久久久久久电影 | 亚洲人成77777在线视频| 久久午夜综合久久蜜桃| av在线播放免费不卡| x7x7x7水蜜桃| 亚洲专区中文字幕在线| 好男人在线观看高清免费视频| 岛国在线观看网站| 国产一区二区三区在线臀色熟女| 成人一区二区视频在线观看| 男女做爰动态图高潮gif福利片| 99久久精品国产亚洲精品| 日韩中文字幕欧美一区二区| 男女之事视频高清在线观看| 人人妻人人看人人澡| 久久久久久久久久黄片| 久久伊人香网站| 午夜免费成人在线视频| 成人av在线播放网站| 婷婷精品国产亚洲av| 国产精品自产拍在线观看55亚洲| 真人做人爱边吃奶动态| 亚洲成人国产一区在线观看| 日本在线视频免费播放| av欧美777| 精品一区二区三区四区五区乱码| 午夜福利高清视频| 99在线视频只有这里精品首页| 亚洲av五月六月丁香网| 最近最新中文字幕大全免费视频| 欧美乱色亚洲激情| 国产精品爽爽va在线观看网站| 久久午夜综合久久蜜桃| 日韩欧美一区二区三区在线观看| 国产亚洲欧美98| 亚洲成人久久性| 在线观看午夜福利视频| 白带黄色成豆腐渣| 久久久久久久精品吃奶| 欧美日韩瑟瑟在线播放| 一个人免费在线观看电影 | 亚洲专区中文字幕在线| 在线观看日韩欧美| 黄色 视频免费看| www.www免费av| 黑人操中国人逼视频| 欧美黑人精品巨大| 精品久久久久久成人av| 欧美在线黄色| 精品午夜福利视频在线观看一区| 少妇人妻一区二区三区视频| 首页视频小说图片口味搜索| 久久人人精品亚洲av| 麻豆成人午夜福利视频| 国产一级毛片七仙女欲春2| 亚洲国产精品成人综合色| 亚洲国产日韩欧美精品在线观看 | 国产欧美日韩一区二区三| 亚洲第一欧美日韩一区二区三区| 欧美av亚洲av综合av国产av| 欧美中文日本在线观看视频| 人人妻人人澡欧美一区二区| 久久久精品国产亚洲av高清涩受| 97碰自拍视频| 精品一区二区三区四区五区乱码| 久久欧美精品欧美久久欧美| 国内精品久久久久久久电影| 精品人妻1区二区| 操出白浆在线播放| 91字幕亚洲| tocl精华| 亚洲精品中文字幕在线视频| 1024手机看黄色片| 色哟哟哟哟哟哟| 免费看十八禁软件| 国产亚洲av高清不卡| 夜夜爽天天搞| 国产精品99久久99久久久不卡| 岛国在线免费视频观看| 国产伦在线观看视频一区| 麻豆国产97在线/欧美 | 岛国视频午夜一区免费看| 国产片内射在线| 一a级毛片在线观看| e午夜精品久久久久久久| 亚洲 国产 在线| 国产欧美日韩一区二区精品| 黄色 视频免费看| 欧美乱妇无乱码| 欧美日韩精品网址| 国产黄a三级三级三级人| 国产精品一区二区免费欧美| 亚洲av成人av| 国产精品久久电影中文字幕| 国产精品香港三级国产av潘金莲| 午夜成年电影在线免费观看| 在线观看一区二区三区| svipshipincom国产片| 啦啦啦免费观看视频1| 免费看日本二区| 无遮挡黄片免费观看| 亚洲欧美激情综合另类| 久久人人精品亚洲av| 国产日本99.免费观看| 日韩欧美国产一区二区入口| 日本撒尿小便嘘嘘汇集6| 天天躁夜夜躁狠狠躁躁| 久久这里只有精品19| 成人国产一区最新在线观看| 中文字幕精品亚洲无线码一区| 国产一级毛片七仙女欲春2| 亚洲五月婷婷丁香| 黄色 视频免费看| 后天国语完整版免费观看| 妹子高潮喷水视频| 好男人在线观看高清免费视频| 999久久久精品免费观看国产| 日本一二三区视频观看| 日本黄色视频三级网站网址| 制服诱惑二区| 亚洲成人久久性| 成人av在线播放网站| 国产精品综合久久久久久久免费| 一进一出抽搐动态| 免费看a级黄色片| 两人在一起打扑克的视频| 最好的美女福利视频网| 亚洲第一欧美日韩一区二区三区| 午夜a级毛片| 亚洲国产精品久久男人天堂| 国产私拍福利视频在线观看| 精品久久久久久久久久久久久| av天堂在线播放| 欧美日韩一级在线毛片| 国产精品久久久久久亚洲av鲁大| 在线看三级毛片| 午夜影院日韩av| 久久精品国产99精品国产亚洲性色| 欧美av亚洲av综合av国产av| 99热这里只有精品一区 | 久久久水蜜桃国产精品网| 国产av麻豆久久久久久久| 九色成人免费人妻av| 国产激情偷乱视频一区二区| 亚洲人成77777在线视频| 韩国av一区二区三区四区| 日韩欧美免费精品| 又黄又爽又免费观看的视频| 久久天躁狠狠躁夜夜2o2o| 国产亚洲av高清不卡| 日本一二三区视频观看| 欧美一区二区精品小视频在线| 日韩有码中文字幕| 久久欧美精品欧美久久欧美| 亚洲第一欧美日韩一区二区三区| 草草在线视频免费看| 中文字幕最新亚洲高清| 哪里可以看免费的av片| 精品高清国产在线一区| 国内毛片毛片毛片毛片毛片| 757午夜福利合集在线观看| 夜夜爽天天搞| 亚洲 欧美 日韩 在线 免费| 亚洲成人久久爱视频| 久久久久亚洲av毛片大全| 欧美色欧美亚洲另类二区| 亚洲自拍偷在线| 久久精品国产99精品国产亚洲性色| 国产男靠女视频免费网站| 久9热在线精品视频| 亚洲 国产 在线| 国产亚洲欧美98| 国产一区在线观看成人免费| 欧美国产日韩亚洲一区| 亚洲av美国av| 人人妻人人看人人澡| 我要搜黄色片| 亚洲欧美精品综合一区二区三区| 十八禁人妻一区二区| 老司机在亚洲福利影院| 两性夫妻黄色片| 悠悠久久av| 99热6这里只有精品| 免费看a级黄色片| 亚洲欧美精品综合久久99| 久久精品国产亚洲av香蕉五月| xxx96com| 亚洲国产欧美人成| 日韩国内少妇激情av| 日本 欧美在线| 国产午夜福利久久久久久| 久久香蕉激情| 久久国产乱子伦精品免费另类| 亚洲avbb在线观看| 国产精品一及| 日日摸夜夜添夜夜添小说| 亚洲性夜色夜夜综合| 又黄又爽又免费观看的视频| 国产精华一区二区三区| 亚洲专区中文字幕在线| 国产熟女午夜一区二区三区| 精品一区二区三区视频在线观看免费| 精品熟女少妇八av免费久了| 精品久久久久久,| 国产激情久久老熟女| 日韩欧美三级三区| 国产亚洲精品综合一区在线观看 | 精品国产超薄肉色丝袜足j| 麻豆成人午夜福利视频| 亚洲乱码一区二区免费版| 欧美成人免费av一区二区三区| 精品国产美女av久久久久小说| 看免费av毛片| 国产精品av久久久久免费| www日本在线高清视频| 人成视频在线观看免费观看| 欧美激情久久久久久爽电影| 亚洲精华国产精华精| 不卡一级毛片| 欧美色欧美亚洲另类二区| 男人舔女人下体高潮全视频| 50天的宝宝边吃奶边哭怎么回事| 久久中文字幕人妻熟女| 一二三四在线观看免费中文在| 亚洲色图 男人天堂 中文字幕| 国产精品影院久久| 精品无人区乱码1区二区| 久久久久亚洲av毛片大全| 免费看日本二区| 久久天堂一区二区三区四区| 免费一级毛片在线播放高清视频| 午夜亚洲福利在线播放| 国产精品久久久久久久电影 | 久久九九热精品免费| 好男人电影高清在线观看| 国产单亲对白刺激| 国产精品免费一区二区三区在线| 亚洲av成人一区二区三| a级毛片在线看网站| 三级国产精品欧美在线观看 | 超碰成人久久| 久久性视频一级片| 亚洲精品在线观看二区| 欧美国产日韩亚洲一区| 亚洲国产欧美人成| 国产精品一区二区三区四区免费观看 | 国产精品久久久人人做人人爽| 免费在线观看日本一区| 我要搜黄色片| 夜夜看夜夜爽夜夜摸| 免费在线观看成人毛片| av欧美777| 免费观看精品视频网站| 日本a在线网址| 精品国产亚洲在线| 国内精品久久久久久久电影| 国产免费av片在线观看野外av| 国产av麻豆久久久久久久| 欧美成人性av电影在线观看| 不卡一级毛片| 亚洲第一欧美日韩一区二区三区| 99精品欧美一区二区三区四区| 好看av亚洲va欧美ⅴa在| 日本 欧美在线| 国产爱豆传媒在线观看 | 久久99热这里只有精品18| 国产高清videossex| 天堂√8在线中文| 欧美绝顶高潮抽搐喷水| 给我免费播放毛片高清在线观看| 亚洲成人精品中文字幕电影| 欧美久久黑人一区二区| 极品教师在线免费播放| 全区人妻精品视频| aaaaa片日本免费| 丰满的人妻完整版| netflix在线观看网站| 欧美黑人巨大hd| 亚洲 国产 在线| 亚洲国产精品久久男人天堂| 色综合站精品国产| 三级男女做爰猛烈吃奶摸视频| 亚洲成人久久爱视频| 久久精品夜夜夜夜夜久久蜜豆 | 麻豆成人午夜福利视频| 久久久久亚洲av毛片大全| 女警被强在线播放| 欧美又色又爽又黄视频| 国产av一区在线观看免费| 国产亚洲欧美在线一区二区| 波多野结衣巨乳人妻| 黄色视频,在线免费观看| 曰老女人黄片| 在线观看日韩欧美| 国产主播在线观看一区二区| 国产成人精品久久二区二区免费| 1024视频免费在线观看| 日本五十路高清| 国产aⅴ精品一区二区三区波| 俄罗斯特黄特色一大片| 国产午夜福利久久久久久| 精品一区二区三区四区五区乱码| 国产欧美日韩一区二区三| 中文资源天堂在线| 18禁裸乳无遮挡免费网站照片| av中文乱码字幕在线| 久久久久精品国产欧美久久久| 舔av片在线| 午夜两性在线视频| 可以免费在线观看a视频的电影网站| 亚洲精品美女久久久久99蜜臀| 成人高潮视频无遮挡免费网站| 制服诱惑二区| avwww免费| 色综合婷婷激情| 一本久久中文字幕| 搡老岳熟女国产| 亚洲精品av麻豆狂野| a级毛片在线看网站| 精品人妻1区二区| 亚洲人成网站高清观看| 日本a在线网址| 日本免费一区二区三区高清不卡| 日韩欧美在线二视频| 亚洲狠狠婷婷综合久久图片| 动漫黄色视频在线观看| 人妻久久中文字幕网| 久久香蕉国产精品| 日本成人三级电影网站| 性欧美人与动物交配| 亚洲国产欧洲综合997久久,| 老熟妇乱子伦视频在线观看| 很黄的视频免费| 亚洲精品色激情综合| 色老头精品视频在线观看| 美女 人体艺术 gogo| 久久天堂一区二区三区四区| 搞女人的毛片| 日韩有码中文字幕| 91麻豆精品激情在线观看国产| 国产伦在线观看视频一区| 国产熟女午夜一区二区三区| 国产高清激情床上av| 亚洲国产欧美网| 欧美乱妇无乱码| 亚洲片人在线观看| 久久久久免费精品人妻一区二区| 真人一进一出gif抽搐免费| 亚洲精品久久成人aⅴ小说| 久久精品国产综合久久久| 精品欧美国产一区二区三| 亚洲美女视频黄频| 亚洲国产日韩欧美精品在线观看 | 午夜福利在线观看吧| 国产野战对白在线观看| 啦啦啦韩国在线观看视频| 欧美成人一区二区免费高清观看 | 亚洲一码二码三码区别大吗| 亚洲av成人不卡在线观看播放网| 中文在线观看免费www的网站 | 一区二区三区激情视频| 午夜福利成人在线免费观看| 国产一区二区三区在线臀色熟女| 亚洲中文字幕一区二区三区有码在线看 | 成人18禁高潮啪啪吃奶动态图| 岛国在线免费视频观看| 99国产极品粉嫩在线观看| 怎么达到女性高潮|