• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Triple-Channel Encrypted Hybrid Fusion Technique to Improve Security of Medical Images

    2021-12-14 09:58:02AhmedSalamaMohamedAmrMokhtarMazharTayelEsraaEldesoukyandAhmedAli
    Computers Materials&Continua 2021年7期

    Ahmed S.Salama,Mohamed Amr Mokhtar,Mazhar B.Tayel,Esraa Eldesouky and Ahmed Ali

    1Future University in Egypt,Cairo,Egypt

    2Cairo Higher Institute for Engineering,Computer Science and Management,Cairo,Egypt

    3Department of Electrical Engineering,Faculty of Engineering,Alexandria University,Alexandria,21544,Egypt

    4Department of Computer Science,Faculty of Computers and Informatics,Suez Canal University,Ismailia City,Egypt

    5Higher Future Institute for Specialized Technological Studies,Cairo,Egypt

    6Department of Computer Science,College of Computer Engineering and Sciences,Prince Sattam Bin Abdulaziz University,Al-Kharj,11942,Saudi Arabia

    Abstract:Assuring medical images protection and robustness is a compulsory necessity nowadays.In this paper, a novel technique is proposed that fuses the wavelet-induced multi-resolution decomposition of the Discrete Wavelet Transform(DWT)with the energy compaction of the Discrete Wavelet Transform (DCT).The multi-level Encryption-based Hybrid Fusion Technique(EbhFT) aims to achieve great advances in terms of imperceptibility and security of medical images.A DWT disintegrated sub-band of a cover image is reformed simultaneously using the DCT transform.Afterwards, a 64-bit hex key is employed to encrypt the host image as well as participate in the second key creation process to encode the watermark.Lastly,a PN-sequence key is formed along with a supplementary key in the third layer of the EbHFT.Thus,the watermarked image is generated by enclosing both keys into DWT and DCT coefficients.The fusions ability of the proposed EbHFT technique makes the best use of the distinct privileges of using both DWT and DCT methods.In order to validate the proposed technique, a standard dataset of medical images is used.Simulation results show higher performance of the visual quality(i.e.,57.65)for the watermarked forms of all types of medical images.In addition,EbHFT robustness outperforms an existing scheme tested for the same dataset in terms of Normalized Correlation(NC).Finally,extra protection for digital images from against illegal replicating and unapproved tampering using the proposed technique.

    Keywords: Medical image processing; digital image watermarking; discrete wavelet transforms; discrete cosine transform; encryption image fusion;hybrid fusion technique

    1 Introduction

    Digital image watermarking is a primary way to discriminate multi-media contents (i.e.,images, video clips, texts, or audio), by concealing critical information [1–3].Frequency-domain watermarking is a type of watermarking techniques in which the transform coefficients rely directly on changing pixel values [4].Thus, inverse transform aims to restore the identity of the encrypted watermark.Popular transforms used in the frequency-domain includes Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT), Fast Fourier Transform (FFT),and Discrete Fourier Transform (DFT) [5–8].The least significant bits (LSB) is a recent technique that adjusts the least significant bits of the image’s pixel [9].The high rendering capability of DWT in spatial localization allows it to be widely employed in image watermarking [5].Besides,the pixel values of the image are changed directly on the watermark prior to embedding in spatial domain techniques.

    The proposed technique points to enhance image robustness as well as imperceptibility against some sort of attacks which are the main advantages of DWT technique.The fusion of DWT and DCT can fulfil extra performance enhancements in image watermarking calculations.The blocking ancient rarity relies on a parallel coalition of cosine and wavelet transforms which results when boundaries between sub-images become visible [5].In the proposed technique, the host image is subdivided into DWT sub-bands simultaneously another transform is taking place using DCT method.Moreover, image protection and robustness are ensured by embedding the secret data in the decomposed region with keys [10].Such taming conceivably replenishes the drawbacks of utilizing each method individually drawing out an effective watermarking technique [11].

    A significant number of studies uses the correlation of PN sequences for blind extraction of the watermark.Similarly, other studies evaluate the robustness tests evaluate capacity to withstand various attacks for existing watermarking techniques.However, the proposed technique aims to design a new powerful watermarking technique that conquers the mentioned problems regarding watermarking.

    The reminder of this paper is organized as follows:next section summarizes the literature work.The preliminaries are presented in Section 3 whereas detailing the procedures required for embedding and extracting watermarks in the EbHFT technique is exhibited in Section 4.Afterwards, experimental results and performance measures are analyzed in Section 5.Finally, the paper is concluded in Section 6.

    2 Literature Review

    Recent pertinent research work is presented along with putting an eye on their shortcomings.RSA-Discrete Wavelet Transform (DWT), DWT-Artificial Neural Network (ANN) and DWTSVD are popular medical images watermarking techniques which were compared in [12].This precious comparison demonstrated that the DWT-SVD technique performed other two techniques.A robust watermarking technique for medical images security is proposed in [13] that huddles wavelet change, neural system and Rivest–Shamir–Adleman (RSA) encryption-based.This technique aims to recoup an outface watermark and progressively secure by hiding it into the host image’s wavelet sub-bands using the neural networks.In [14], a block SVD and wavelet transformbased blind a watermarking scheme is introduced, which also targets the security of medical images.Consequently, a watermarked image as well as Electronic Patient Record (EPR) are jointly inset into the singular values in the host image of its wavelet sub-bands.Although, this scheme verifies robustness against all possible watermarking attacks, it is only applicable for Region of Interest (ROI) of therapeutic images.

    A second combined mechanism that emphasizes sturdy watermarking in medical images is proposed by fusing SVD, DWT and cryptographic methods [15].An encoded watermarking data(i.e., using Reed-Solomon, Bose–Chaudhuri–Hocquenghem and Hamming code) is embedded into the wavelet-coefficients and in the singular value of the targeted medical image.However, the Reed–Solomon-based coding for watermarked data much better than other tested codes.Fuzzy logic and Harris corner detection are also utilized as a hidden watermarking technique for medical images [16].Alternatively, a medical hidden medical information scheme is presented which is based on particle swarm optimization [17].This study is an enhancement for the use of the three PN sequences which depends on watermark bits to improve imperceptibility [18].

    A robust watermark protection scheme that utilizes Fast Discrete Curvelet Transform(FDCuT) is proposed whereas binary watermark data is embedded into low frequency curvelet coefficients [19].Another watermarking method that preserves copyright protection during image hash is figured using curvelet transform [20,21].The presented hash esteems are maintained into different level of curvelet transform for the host image.A blended watermarking technique is proposed which combines blind FDCuT, DCT, and White Gaussian Noise sequences for medical images [22].The mid-band frequency DCT coefficients of a medical image curvelet sub-band is modified according to two WGN sequences whereas watermark blind extraction can be obtained at detector side.

    Discovering the ROI of a host image and changing it to non-overlapping blocks is proposed for achieving carefully watermark medical images [23].A study introduced medical image hybrid protection watermarking schemes, which are based on DWT, SVD and spread spectrum approach [18,24].This research study depicted two techniques using the correlation property of PN sequences to obtain blind extraction.In the first one, the sub-bands of host medical image (i.e., horizontal and vertical) are changed by two PN sequence according to its watermark bits.The other one concern a singular value of wavelet sub-bands of host medical image which is changed by two PN sequences based on the watermark bits.Later, Bose–Chaudhuri–Hocquenghem (BCH) encryption is utilized for security of watermark data.

    A multi-level encryption-based technique (EbDT) is introduced to integrate the waveletinduced multiresolution decomposition power of DWT with the energy compaction capability of DCT.This study strives to enhance both medical image robustness and security [25].The proposed technique is decomposed of three layers in which a DWT decomposed sub-band of an image is adjusted using DCT transform.Afterwards, a 64-bit key is employed to create secure force(SF) key (i.e., K1–K5).The generated keys encrypt the host image and produce a second key for watermark encryption.Finally, a PN-sequence is generated along with an extra key and embedded into the DCT coefficients to deliver the watermarked image.

    The techniques presented in the previous literature are majorly based on DWT, SVD, and DCT in order to improve the imperceptibility of watermarked images.However, in this study, a hybrid DCT-DWT technique is presented to defeat the inadequacies of the mentioned literature mainly in [13,18,19,22,25].Although the two WGN sequence is used in [21], it fails to achieve higher imperceptibility for medical images even for a standard database.As aforementioned,studies proposed in [18,19] used two PN sequences to separate a blind watermark just as correlation.Both methods resulted in poor visual fidelity for the watermarked images.Additionally,in [13] authors succeeded to define predetermined ROI in the host or cattier images.Yet, this study aims to design a novel robust technique that conquers the above-referred problems in watermarking research.

    3 Basic Background

    3.1 DCT and DWT

    The DCT is considered one of the powerful frequency-domain transform technique in watermarking process.It is primarily utilized in signal and video processing as well as it is also great for audio and images where small high-frequency elements can be dismissed.Knowingly, a finite sequence of data points is expressed as a sum of cosine functions balanced at distinct frequencies.Regarding digital images, the DCT is calculated along with the inverse DCT (i.e., IDCT) [26].

    Block-wise and non-block wise partitioning are two common DCT ways, which are employed to images.Keeping-up the image quality can be guaranteed using the mid-band DCT coefficients due to their resilience to watermarking attacks [3,27].In the proposed EbHFT technique, watermark process depends on applying block-wise DCT technique on high, mid, and low frequency sub-bands of the carrier image.

    A complementary technique is the Discrete Wavelet Transform (DWT).In watermarking process, wavelet transforms are mainstream in a large scope of applications since it accomplishes an out-standing multi-resolutions modelling [28–30].The DWT parcels an original image into vertical, horizontal, diagonal and lower resolution image sub-bands (i.e., LH, HL, HH, and LL, respectively).To understand the multiple scale wavelet decomposition, the image partitioning process is iterated [31].Later, digital watermarks are embedded in the sub-bands along with the decomposed levels.This process is controlled by a random key that is inserted and recovered autonomously.

    The intensity of an image energy is located at high band decomposition levels.This is identical to significantly identify low frequency coefficients while aggregating minor energy portion in the low decomposition levels [32].Susceptible information in medical images (i.e., patient ID or doctor’s signature) should be exposed to high robustness.Thus, inserting the watermark in LH and HL sub-bands guarantees robustness.

    At end, DCT and DWT are widespread transforms that mainly constitutes the proposed EbHFT technique.

    3.2 SF Encryption Algorithm

    The architecture of Secure Force (SF) algorithm allows low-complexity encryption, which is applicable in many fields such as wireless sensor networks and information security.It has been developed from the Feistel algorithm and was firstly proposed by Shamir [33,34].The encryption process consists of basic operations (i.e., AND, OR, XOR, XNOR, shifting, and swapping) which lessen a burden on the encoder.Consequently, complex key expansion process only takes place at the decoder side.Only five rounds of encryption keys are required for the encryption process whereas less power consumption is gained.Security issues can be ensured through each operation operating on 4-bit data.

    Furthermore, the expansion process is implemented at the decoder by creating confusion and diffusion of data to withstand against various attacks.Complex mathematical operations are utilized to obtain keys needed for the encryption process.Nevertheless, generated keys must be passed to the encoder through secure channels.

    4 The EbHFT Technique

    The proposed EbHFT technique suggests integrating the privileges of both DCT (i.e., energy compaction capacity) along with DWT (i.e., multi-resolution decomposition capacity).Imperceptibility, security, and robustness of medical images are the primary objectives for enhancement using EbHFT.In addition, secure force (SF) keys are employed to encrypt the host image and create a second key that encodes the watermark.The process of inserting and extracting a digital watermark is presented in this section.Initially, the DWT scheme is applied on Harr filterdecomposed coefficients of the host image.Subsequently, the watermark is embedded into the second-layer sub-band of the host image to improve the robustness of the resulting image (i.e.,sturdy enough against illegal tampering).

    4.1 Watermark Embedding Algorithm

    The three-channels watermark embedding procedure of EbHFT performs DWT on the cover and decomposes the host image into two levels [11].First, LL1, HL1, LH1, and HH1 then smaller sub-bands are decomposed into then LL2 is chosen along with HH1.Afterwards, it selects the LL2 and HH1 sub-bands to apply the DCT on it [32].As discussed in Fig.1, using the 64-bit hex key (i.e., Key 1=‘133457799bbcdff1’) allows the generation of SF keys (K1–K5) which generate the encrypted host image.

    Figure 1:Three-channel watermark embedding flowchart

    On one side, the encrypted image is maintained to retrieve the watermark key (i.e., Key2).A PN-sequence is formed from the ciphered watermark and is distributed, then distributing the PNsequence along with Key 3 on the detailed DWT coefficients.On the other side, performing the Inverse DWT (IDWT) on the transformed image is mandatory to rebuild the watermarked image.This process involves the modified sub-band (i.e., producing the image_DWT) in parallel with spreading the PN-sequence with Key 3 onto the DCT coefficients.After the modification of the mid-band coefficients, IDCT is applied to embed the watermark bits to produce the watermarked image_DCT.Lastly, the resulting watermarked image_DWT and image_DCT are integrated to generate the final watermarked image.

    4.2 Watermark Reconstruction Algorithm

    After applying the embedding algorithm for the digital watermark, the extraction algorithm is explained, which is also a three-layers procedure.In the EbHFT technique, the watermark reconstruction algorithm defuses the watermarked image into two images which are watermarked_DWT and watermarked_DCT.As illustrated in Fig.2, two processes are proceeding in parallel during this stage.

    Figure 2:The flowchart of the proposed reconstruction algorithm

    The watermarked_DWT image is decomposed using DWT scheme into four multi-resolution sub-bands (i.e., LL1, HL1, LH1, and HH1).Thereafter, DWT is re-applied on the HH1 sub-band to re-split it into smaller four sub-bands.At this instance, the LL2 sub-band is selected in order to achieve superior robustness [32].Finally, Key 3 is utilized in the detail coefficients of LL2 sub-band using DWT transform to generate the encrypted watermark_DWT.(Finally, Key 3 is utilized under DWT transform to extract the encrypted watermark_DWT by implanting it in the detail coefficient of LL2 sub-band).In parallel with the first process, the DCT is implemented on the watermarked_DCT as described in [32].Similarly, a certain key (i.e., Key 3) is used in the detail coefficients of DCT scheme to reproduce the encrypted watermark_DCT.

    In the third channel, the 64-bit hex key (i.e., Key1 = ‘133457799bbcdff1’) is employed to produce the SF keys (K1–K5) and consequently generate the watermarked image [10].Later,Key 2 (i.e., watermark key) is taken out from the encrypted watermarked image.Thus, the encrypted watermarks from the DWT and DCT schemes are decrypted using Key 2.The pixelwise is correlated between the recovered watermark from both DWT and DCT.Accordingly, the recovered watermark image is generated.

    5 Results and Analysis

    The proficiency of the proposed EbHFT technique is examined on medical images dataset which involves Magnetic Resonant Imaging (MRI), Computerized Tomography (CT), X-ray, and Ultrasound (US) collected from the MedPixTM Medical Image Database [35].Images included in the experiment are all of resolution 1024×1024 pixels.EbHFT technique is implemented using MATLAB 2016a with a machine of 2.7 GHz i5 CPU with 4 GB-RAM.In Fig.3, sample images are selected from the dataset (i.e., Figs.3a–3d) along with the watermark logo and key which are represented in Figs.3e and 3f, respectively.The used watermark is a simple 20×50 binary image.

    Figure 3:Host medical images:(a) X-ray (b) Ultrasound (US) (c) Magnetic Resonant Imaging(MRI) (d) Computerized Tomography (CT), (e) The ‘Copyright’watermark image and (f) The embedding key

    As mentioned earlier, the watermark is embedded in the detailed DWT wavelet coefficients of the host image using a certain key [11].Thus, a 64-bit key is maintained to generate the SF keys K1–K5 which are mandatory to construct the encrypted host image [10].The watermark key (i.e.,Key 2) is quarried from the encrypted image and used to cipher the watermark.A PN-sequence is prepared from the encrypted watermark and spread together with Key 3 onto the detailed coefficients of both DCT and DWT.This step is essential for enhancing the image robustness against various attacks.

    5.1 Performance Metrics

    The performance of image-hiding techniques is analyzed based on several metrics including imperceptibility, robustness, noise-addition, filtering attacks as well as JPEG Compression.Tab.1 illustrates the effect of the proposed technique on the generated watermarked image samples and their recovered watermark.These medical images are tested with our watermark logo under different gain factorG.

    5.2 Result Analysis

    One of the important metrics to measure is the perceptual quality (i.e., imperceptibility) which is estimated by the peak signal to noise ratio (PSNR) between the original host image and the watermarked image.The PSNR mainly relies on the Mean Square Error (MSE) which is measured in dB value.Thus, the error between the original and processed images are calculated in Eqs.(1)and (2), respectively.

    Table 1:The output of the watermarked medical images and the corresponding recovered watermark for distinct gain factor G.

    Table 1(continued).

    In Tab.2, a quantitative comparison between the watermarked and host images is introduced which points to the direct relation between the gain factor and the extracted watermark images’quality.Compared to the techniques presented in [22,25] and, the PSNR and NC values studied for the proposed EbHFT technique as in Figs.4 and 5.These comparisons are applied using the factor k=2 without the presence of any attacks.

    In Fig.4, the average of PSNR of the watermarked images of the EbHFT technique is around 57.5 dB.This means that this watermarked image is not affected by the embedded bits of the watermark.Accordingly, the proposed technique achieved compromised imperceptibility in comparable with the other techniques in [22,25] .Correspondingly, the NC value of the extracted watermark exhibited in Fig.5 for the proposed technique is 1 compared to 0.97 for the existing techniques which allow the full recovery for the watermark.This watermark image extraction using the EbHFT outperforms the techniques presented in [22,25].

    An essential target is to improve the perceptual quality of the proposed algorithm which indicates higher values of PSNR.The Normalized Cross-Correlation (NCC) is another performance metric measured in Eq.(3) that estimates the distinction between the host and watermarked images.

    Table 2:Evaluating the proposed EbHFT technique for different values of gain factor (k)

    Furthermore, Watermark to Document Ratio (WDR) see Eq.(4) and other metrics are used in our experimental study.The first scales the ratio between the watermarked and host images and the second determines the difference between a certain pixel in the original and watermarked images.Finally, the Normalized Absolute Error (NAE) defines the error predication accuracy of the image as computed in Eq.(5):

    where X(i, j) is the host image and XW(i, j) is the watermarked image.

    Figure 4:Comparison of PSNR (dB) value of proposed technique with existing technique [22,25]without application of watermarking attacks

    Figure 5:Comparison of NC value of proposed technique with existing technique [22,25] without application of watermarking attacks

    In this study, the robustness test is considered an efficient way to assess attacks against the watermarked images such as JPEG compression, filtering, Gaussian low pass filtering.Generally, other attacks can be counted including sharpening, Gaussian noise, speckle noise, and salt-and-pepper noise.As a result, the applied technique is robust if the generated watermark is visually perceptual.Subsequently, NC values are deemed as a primary measurement for the robustness against attacks in the proposed technique.These values are acquired and compared with the existing techniques [22,25] for the same set of medical images.

    The JPEG compression is implemented on the watermarked images along with several quality criteria.At End, the watermark is extracted using the proposed technique.In Tab.3, the results of compression attacks are presented for distinct medical images (i.e., displayed in Figs.3a–3d) involving X-rays, Ultrasound, MRI and CT images.These images are accompanied with a watermark logo (i.e., Fig.3e) and NC to appraise the compression attacks against these images.The conducted results evidence the outperforming of the EbHFT technique.Same selected watermarked images are exposed to diverse sorts of noise attacks such as speckle, salt-and-pepper noise,and Gaussian noise.NC for these attacks and the outcomes are exhibited in Fig.6.Fig.7 shows the results of applying filtering attacks (i.e., such as median mean and Gaussian low pass filtering).

    Table 3:Comparison of EbHFT technique with existing techniques for various features.

    Figure 6:NC value of proposed EbHFT technique and an existing technique [22] under JPEG compression attack

    Figure 7:NC value of proposed technique and an existing technique [25] under noise addition attack

    The performance assessments are concluded in Fig.8 as a general summarization of the proposed EbHFT technique in compared with some other available approaches [13,18,19,22,25].

    Figure 8:Performance comparison of proposed EbHFT technique with existing techniques [13,18,19,22,25] for X-ray medical images under various watermarking attacks

    Owing to rational comparison, the measured performance metrics are employed to the same image dataset.Recalling the above mentioned results, the blind medical image watermarking scheme proposed in [13] utilize a hybrid DWT along with SVD.The proposed EbHFT involves the privileges of both DWT and DCT while techniques presented in [18,25] rely solely on the standard DWT.However, the Fast Discrete Curvelet Transform and Discrete Cosine Transform FDCuTDCT were fused in [21,24].Moving to the embedding and extraction operation, the technique introduced in [18] used three PN Sequence whilst two PN Sequence are utilized in [19].In [22],two WGN sequence are used whereas EbHFT employs three PN sequences.

    In terms of visual quality, maximum PSNR value recorded was 31.17 dB, 39.03 dB, 37.75,52.76, and 60.84 dB for [13,18,19,22,25] respectively.Nevertheless, the proposed EbHFT achieves

    57.65 dB.The maximum NC are reported in Tab.3 for the different existing techniques with values of 0.6676, 0.7409, 0.7544 for [13,18,19].Yet, a maximum NC value of 1 is given from [22,25] which implies full recovery of the watermark.The execution time is 7.88 seconds in the EbDT [25] and 4.96 in the proposed technique.In conclusion, the EbHFT technique succeeds in terms of perceptual quality, robustness and security when tested and compared with the other existing systems.

    6 Conclusions

    The study reported in this work proposed a triple-layer encryption-based strategy for safeguarding the integrity of digital images with a focus on applications in medical imaging and health informatics.Our proposed encryption-based discrete transform (EbHFT) technique fuses of Discrete Wavelet Transform (DWT) with Discrete Cosine Transform (DCT).The mid-band frequency DCT coefficients and the LL2 wavelet sub-band of the medical image are modified using three PN sequences in such a way that blind and secure extraction of watermark bit is accomplished unimpeded at the detector side.The proposed technique is tested for various medical images such as X-ray, US, MRI, and CT and compared with the performance of a similar techniques.

    Furthermore, the results prove that the proposed technique outperformed the existing techniques in terms of imperceptibility, robustness, and security.The average PSNR value is above 57 dB, and the NC value is around 1 for all types of watermarked medical images based on the proposed technique.This technique is suitable for medical image protection in telemedicine applications.Notwithstanding its promising performance, the proposed strategy suffers from the poor recovery of watermark images under certain attacks such as median filter attack.As well,the strategy works only with binary watermark images.These shortenings will be addressed in the ongoing and future work.

    Funding Statement:The authors received no specific funding for this study.

    Conficts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    欧美成狂野欧美在线观看| 十八禁人妻一区二区| av视频免费观看在线观看| 国产亚洲一区二区精品| av电影中文网址| 国产aⅴ精品一区二区三区波| 一夜夜www| 91麻豆精品激情在线观看国产 | 亚洲精品一二三| 在线观看免费视频日本深夜| 亚洲精品久久午夜乱码| 麻豆国产av国片精品| 五月开心婷婷网| 欧美精品高潮呻吟av久久| 欧美日韩精品网址| 黑人猛操日本美女一级片| av超薄肉色丝袜交足视频| 国产精品久久久av美女十八| 老熟妇乱子伦视频在线观看| 亚洲精品国产色婷婷电影| 亚洲天堂av无毛| 性高湖久久久久久久久免费观看| 成人特级黄色片久久久久久久 | 一区二区三区国产精品乱码| av又黄又爽大尺度在线免费看| 一级,二级,三级黄色视频| 深夜精品福利| 亚洲国产毛片av蜜桃av| 老司机深夜福利视频在线观看| 大码成人一级视频| 精品福利永久在线观看| 男女床上黄色一级片免费看| 欧美亚洲日本最大视频资源| 精品久久久精品久久久| 亚洲国产av新网站| 嫁个100分男人电影在线观看| 一二三四社区在线视频社区8| 大型黄色视频在线免费观看| 精品久久久精品久久久| 色尼玛亚洲综合影院| 欧美乱妇无乱码| 亚洲七黄色美女视频| 欧美黑人精品巨大| 蜜桃国产av成人99| 午夜91福利影院| 精品欧美一区二区三区在线| 大香蕉久久成人网| 99在线人妻在线中文字幕 | 亚洲av成人一区二区三| 高清av免费在线| 男人操女人黄网站| 欧美在线一区亚洲| 成年动漫av网址| 亚洲色图av天堂| 成人三级做爰电影| 最近最新免费中文字幕在线| 人人妻人人澡人人爽人人夜夜| 啦啦啦免费观看视频1| 日韩制服丝袜自拍偷拍| 欧美人与性动交α欧美软件| 制服人妻中文乱码| 这个男人来自地球电影免费观看| 99国产精品一区二区蜜桃av | 男女午夜视频在线观看| 成年版毛片免费区| 国产免费视频播放在线视频| 精品少妇久久久久久888优播| 国产国语露脸激情在线看| 满18在线观看网站| 久久av网站| 男女午夜视频在线观看| 久久国产精品影院| 9191精品国产免费久久| 国产人伦9x9x在线观看| 欧美日韩成人在线一区二区| 亚洲中文av在线| 一区福利在线观看| 久久国产精品影院| 亚洲av成人一区二区三| 窝窝影院91人妻| 男女高潮啪啪啪动态图| 精品国产一区二区久久| 69av精品久久久久久 | 久久久国产一区二区| 最黄视频免费看| 色94色欧美一区二区| 成人国产一区最新在线观看| a级毛片黄视频| 夜夜骑夜夜射夜夜干| 国产99久久九九免费精品| 午夜激情久久久久久久| 老司机午夜十八禁免费视频| 欧美日韩亚洲综合一区二区三区_| 十八禁网站免费在线| 人妻一区二区av| 精品视频人人做人人爽| 久久人人97超碰香蕉20202| 久久久久久免费高清国产稀缺| 美女国产高潮福利片在线看| 国产精品电影一区二区三区 | 777米奇影视久久| 一进一出抽搐动态| 亚洲免费av在线视频| 黄色片一级片一级黄色片| 国产极品粉嫩免费观看在线| 18禁裸乳无遮挡动漫免费视频| 日韩人妻精品一区2区三区| 极品教师在线免费播放| 人妻 亚洲 视频| 啦啦啦免费观看视频1| tube8黄色片| 高清视频免费观看一区二区| 叶爱在线成人免费视频播放| av欧美777| 大型黄色视频在线免费观看| 国产精品免费视频内射| 老熟妇乱子伦视频在线观看| 真人做人爱边吃奶动态| 黄色丝袜av网址大全| 久久国产精品人妻蜜桃| 老司机午夜福利在线观看视频 | 极品人妻少妇av视频| 99久久国产精品久久久| 国产一区二区在线观看av| 婷婷丁香在线五月| 最新在线观看一区二区三区| 亚洲伊人久久精品综合| 国产色视频综合| 汤姆久久久久久久影院中文字幕| 性色av乱码一区二区三区2| 99re6热这里在线精品视频| kizo精华| 另类亚洲欧美激情| 亚洲国产看品久久| 亚洲国产看品久久| 考比视频在线观看| 1024香蕉在线观看| 国产在线视频一区二区| 国产成人精品在线电影| 亚洲九九香蕉| 黑丝袜美女国产一区| 人人妻人人澡人人爽人人夜夜| 精品人妻熟女毛片av久久网站| 精品人妻在线不人妻| 欧美午夜高清在线| 国产又色又爽无遮挡免费看| 精品人妻在线不人妻| 亚洲,欧美精品.| 国产伦理片在线播放av一区| 亚洲,欧美精品.| 色94色欧美一区二区| 1024视频免费在线观看| 肉色欧美久久久久久久蜜桃| 久久亚洲真实| 欧美日韩成人在线一区二区| 日韩大码丰满熟妇| 国产成人精品无人区| 天堂中文最新版在线下载| 久久精品国产亚洲av高清一级| 亚洲一码二码三码区别大吗| 亚洲精品中文字幕一二三四区 | 国产片内射在线| 欧美成人免费av一区二区三区 | 高清黄色对白视频在线免费看| 久久亚洲真实| 叶爱在线成人免费视频播放| 欧美激情极品国产一区二区三区| 久久久国产欧美日韩av| 亚洲精品一卡2卡三卡4卡5卡| 成人特级黄色片久久久久久久 | 黑丝袜美女国产一区| 黄色视频,在线免费观看| 日韩欧美免费精品| a级毛片在线看网站| 亚洲精华国产精华精| 亚洲一卡2卡3卡4卡5卡精品中文| 国产熟女午夜一区二区三区| 91国产中文字幕| 成人黄色视频免费在线看| 男女免费视频国产| 免费观看人在逋| 久久精品91无色码中文字幕| 超色免费av| 日本av免费视频播放| 99热国产这里只有精品6| 视频区图区小说| av福利片在线| 精品久久久久久电影网| 大香蕉久久成人网| 日本wwww免费看| 久久这里只有精品19| 国产成人av教育| 免费在线观看黄色视频的| 久9热在线精品视频| 婷婷丁香在线五月| 极品人妻少妇av视频| 日本wwww免费看| 日韩中文字幕视频在线看片| 天堂8中文在线网| 亚洲精品国产色婷婷电影| 真人做人爱边吃奶动态| 欧美人与性动交α欧美软件| 国产av一区二区精品久久| 男女无遮挡免费网站观看| 亚洲成人国产一区在线观看| 美女午夜性视频免费| 国产精品香港三级国产av潘金莲| 亚洲少妇的诱惑av| 男女午夜视频在线观看| 精品一品国产午夜福利视频| 久久精品aⅴ一区二区三区四区| 一区福利在线观看| 国产不卡av网站在线观看| 亚洲视频免费观看视频| 欧美激情 高清一区二区三区| 90打野战视频偷拍视频| 狠狠狠狠99中文字幕| 18在线观看网站| 免费人妻精品一区二区三区视频| 国产国语露脸激情在线看| av片东京热男人的天堂| 性少妇av在线| 亚洲avbb在线观看| 黄色毛片三级朝国网站| 欧美+亚洲+日韩+国产| 国产欧美日韩精品亚洲av| 国产91精品成人一区二区三区 | 久久久国产成人免费| 波多野结衣一区麻豆| 精品久久久久久电影网| 成人国产av品久久久| 免费人妻精品一区二区三区视频| 色婷婷av一区二区三区视频| 免费不卡黄色视频| 首页视频小说图片口味搜索| 国产精品免费大片| 啦啦啦中文免费视频观看日本| 久久影院123| 久久热在线av| 久久影院123| 精品福利观看| 久久精品国产a三级三级三级| 亚洲成av片中文字幕在线观看| 母亲3免费完整高清在线观看| 俄罗斯特黄特色一大片| av网站免费在线观看视频| 麻豆国产av国片精品| 三级毛片av免费| 国产成人av教育| 少妇的丰满在线观看| 国产精品久久电影中文字幕 | 国产一区二区三区在线臀色熟女 | netflix在线观看网站| 一二三四在线观看免费中文在| 妹子高潮喷水视频| 免费黄频网站在线观看国产| 精品人妻熟女毛片av久久网站| 黄频高清免费视频| 视频区图区小说| av又黄又爽大尺度在线免费看| 最近最新中文字幕大全电影3 | 国产又爽黄色视频| www.999成人在线观看| 国产成人精品久久二区二区91| 精品国产乱码久久久久久小说| 91大片在线观看| 亚洲精品在线美女| 19禁男女啪啪无遮挡网站| 日本一区二区免费在线视频| 精品少妇内射三级| 亚洲少妇的诱惑av| 黄色视频,在线免费观看| 欧美日韩福利视频一区二区| 一本色道久久久久久精品综合| 国产成人av激情在线播放| 黄网站色视频无遮挡免费观看| 午夜福利乱码中文字幕| 男女免费视频国产| 黄色片一级片一级黄色片| 黄色毛片三级朝国网站| 亚洲中文字幕日韩| 大型黄色视频在线免费观看| 国产日韩欧美在线精品| 国产一区二区三区综合在线观看| 亚洲精品粉嫩美女一区| 久久久久久久精品吃奶| 性少妇av在线| 国产1区2区3区精品| 欧美精品亚洲一区二区| 91成人精品电影| 亚洲中文av在线| 男人操女人黄网站| 亚洲综合色网址| 国产亚洲精品一区二区www | netflix在线观看网站| 一区二区三区激情视频| 国产高清激情床上av| 五月开心婷婷网| 制服诱惑二区| 午夜激情久久久久久久| 一区二区三区国产精品乱码| 亚洲精品成人av观看孕妇| 亚洲国产毛片av蜜桃av| 国产精品九九99| 中文欧美无线码| 黑人猛操日本美女一级片| 精品第一国产精品| 精品少妇内射三级| 久久久久久人人人人人| 国产精品二区激情视频| 日韩大码丰满熟妇| 亚洲精品国产一区二区精华液| 无限看片的www在线观看| 新久久久久国产一级毛片| 肉色欧美久久久久久久蜜桃| 亚洲精品乱久久久久久| 夜夜骑夜夜射夜夜干| 女人高潮潮喷娇喘18禁视频| 午夜福利免费观看在线| 成年人黄色毛片网站| 国产成人啪精品午夜网站| 热99国产精品久久久久久7| 99国产极品粉嫩在线观看| 日韩欧美免费精品| 亚洲色图 男人天堂 中文字幕| 777米奇影视久久| 一本综合久久免费| 国产在线观看jvid| 高清黄色对白视频在线免费看| 18禁裸乳无遮挡动漫免费视频| 亚洲色图综合在线观看| 老熟妇仑乱视频hdxx| 国产伦理片在线播放av一区| 国产黄色免费在线视频| 久久国产精品人妻蜜桃| 久久久精品区二区三区| 欧美老熟妇乱子伦牲交| 99国产精品一区二区蜜桃av | 人妻 亚洲 视频| 黄色视频,在线免费观看| 久久精品亚洲av国产电影网| 精品欧美一区二区三区在线| 99久久99久久久精品蜜桃| 欧美+亚洲+日韩+国产| 久久av网站| 欧美亚洲 丝袜 人妻 在线| 中文字幕最新亚洲高清| 热re99久久精品国产66热6| 国产又爽黄色视频| 国产一区二区三区在线臀色熟女 | 香蕉国产在线看| 国产激情久久老熟女| 国产成人精品久久二区二区免费| 五月天丁香电影| 国产亚洲精品第一综合不卡| 精品少妇黑人巨大在线播放| 一区在线观看完整版| 黄色丝袜av网址大全| 国产精品熟女久久久久浪| 日韩免费av在线播放| 深夜精品福利| 高清毛片免费观看视频网站 | 国产精品国产av在线观看| 十八禁网站网址无遮挡| 大香蕉久久成人网| 国产片内射在线| 欧美日韩av久久| 久久精品熟女亚洲av麻豆精品| 亚洲精品中文字幕一二三四区 | 在线观看免费视频日本深夜| 天天躁狠狠躁夜夜躁狠狠躁| 国产一区二区三区在线臀色熟女 | 韩国精品一区二区三区| 精品久久久久久久毛片微露脸| 十八禁人妻一区二区| 制服人妻中文乱码| 天堂俺去俺来也www色官网| 亚洲精品一二三| 久久久国产成人免费| 啦啦啦视频在线资源免费观看| 欧美日韩黄片免| avwww免费| 亚洲人成电影观看| 啦啦啦中文免费视频观看日本| 午夜精品国产一区二区电影| 90打野战视频偷拍视频| 日韩一卡2卡3卡4卡2021年| 美女福利国产在线| 99国产极品粉嫩在线观看| 一个人免费在线观看的高清视频| 男女边摸边吃奶| 欧美国产精品一级二级三级| 女人爽到高潮嗷嗷叫在线视频| 日韩视频在线欧美| 纵有疾风起免费观看全集完整版| 一级片'在线观看视频| 亚洲成人手机| 一个人免费看片子| 久久久久久久久久久久大奶| 伦理电影免费视频| 不卡一级毛片| 国产亚洲欧美在线一区二区| 精品国产乱码久久久久久小说| 亚洲午夜理论影院| 欧美精品高潮呻吟av久久| 视频在线观看一区二区三区| 国产成人欧美在线观看 | 国产单亲对白刺激| 欧美激情久久久久久爽电影 | 亚洲伊人色综图| 亚洲性夜色夜夜综合| 日韩中文字幕视频在线看片| 久久久久网色| 国产一卡二卡三卡精品| 日本av免费视频播放| 9191精品国产免费久久| 免费看a级黄色片| 视频区欧美日本亚洲| 亚洲一卡2卡3卡4卡5卡精品中文| 免费一级毛片在线播放高清视频 | 久久天堂一区二区三区四区| 久久99一区二区三区| 亚洲成国产人片在线观看| 亚洲熟女毛片儿| 在线永久观看黄色视频| 最新的欧美精品一区二区| 一级毛片女人18水好多| 中文字幕制服av| 久久中文字幕人妻熟女| 国产亚洲午夜精品一区二区久久| 精品一区二区三区视频在线观看免费 | 婷婷丁香在线五月| 香蕉久久夜色| 人妻 亚洲 视频| 别揉我奶头~嗯~啊~动态视频| 精品久久久精品久久久| 成年动漫av网址| 亚洲色图 男人天堂 中文字幕| 午夜日韩欧美国产| 丁香六月天网| 丝袜美腿诱惑在线| 日本vs欧美在线观看视频| 国产精品98久久久久久宅男小说| 乱人伦中国视频| cao死你这个sao货| 最近最新中文字幕大全电影3 | 1024香蕉在线观看| 一级片免费观看大全| 成人影院久久| 中文字幕制服av| 狠狠狠狠99中文字幕| 操出白浆在线播放| 热re99久久国产66热| avwww免费| 中文字幕人妻熟女乱码| 99国产精品一区二区三区| 99精品欧美一区二区三区四区| 12—13女人毛片做爰片一| 国产精品自产拍在线观看55亚洲 | 90打野战视频偷拍视频| 成人国产av品久久久| 亚洲第一av免费看| 美女高潮到喷水免费观看| 女警被强在线播放| 热99国产精品久久久久久7| 一进一出好大好爽视频| 操出白浆在线播放| 宅男免费午夜| 国产黄色免费在线视频| 亚洲精品av麻豆狂野| 日韩欧美一区二区三区在线观看 | av欧美777| 久久久国产成人免费| 王馨瑶露胸无遮挡在线观看| 国产av一区二区精品久久| bbb黄色大片| 亚洲成人免费电影在线观看| 欧美日韩中文字幕国产精品一区二区三区 | 欧美日韩精品网址| 深夜精品福利| av网站在线播放免费| 在线亚洲精品国产二区图片欧美| 亚洲av电影在线进入| 丰满人妻熟妇乱又伦精品不卡| 亚洲专区中文字幕在线| 免费观看av网站的网址| 一级片'在线观看视频| 中文字幕制服av| 大型av网站在线播放| 日日爽夜夜爽网站| 国产xxxxx性猛交| 精品国产一区二区久久| av免费在线观看网站| 欧美日韩亚洲综合一区二区三区_| 成人国语在线视频| 成年版毛片免费区| 午夜福利,免费看| 大片电影免费在线观看免费| 亚洲国产欧美日韩在线播放| 中文字幕另类日韩欧美亚洲嫩草| 欧美中文综合在线视频| 嫩草影视91久久| 黄片大片在线免费观看| 成年人午夜在线观看视频| 露出奶头的视频| 中文字幕最新亚洲高清| 99re在线观看精品视频| 国产精品偷伦视频观看了| 99九九在线精品视频| 久久久欧美国产精品| 国产精品亚洲av一区麻豆| 手机成人av网站| 国产精品.久久久| 国产精品亚洲av一区麻豆| 精品国产超薄肉色丝袜足j| 国内毛片毛片毛片毛片毛片| 9色porny在线观看| 国产日韩欧美在线精品| 国产av又大| 亚洲午夜精品一区,二区,三区| 成人免费观看视频高清| 精品欧美一区二区三区在线| 又紧又爽又黄一区二区| 中文字幕人妻丝袜制服| 99精品在免费线老司机午夜| 久久精品aⅴ一区二区三区四区| bbb黄色大片| 国产无遮挡羞羞视频在线观看| 老司机影院毛片| 最新美女视频免费是黄的| 少妇精品久久久久久久| av福利片在线| 欧美日韩黄片免| 久久久久久久久久久久大奶| 女人爽到高潮嗷嗷叫在线视频| 99国产精品免费福利视频| 日韩一卡2卡3卡4卡2021年| 亚洲精品中文字幕在线视频| 男女边摸边吃奶| 热99国产精品久久久久久7| 女人久久www免费人成看片| 多毛熟女@视频| 精品亚洲成国产av| 成年人黄色毛片网站| 欧美性长视频在线观看| 国产精品一区二区在线观看99| 国产一区二区 视频在线| 亚洲欧美色中文字幕在线| 别揉我奶头~嗯~啊~动态视频| 亚洲精品一卡2卡三卡4卡5卡| 国产av精品麻豆| 亚洲国产欧美网| 久久久水蜜桃国产精品网| 一本色道久久久久久精品综合| 少妇 在线观看| 国产福利在线免费观看视频| 成人18禁在线播放| 中文字幕制服av| 中文欧美无线码| 亚洲中文字幕日韩| 啪啪无遮挡十八禁网站| 中文字幕精品免费在线观看视频| 久久久水蜜桃国产精品网| 最新美女视频免费是黄的| 一区二区日韩欧美中文字幕| 在线av久久热| 国产在线观看jvid| 老司机福利观看| 免费黄频网站在线观看国产| 18禁黄网站禁片午夜丰满| 蜜桃国产av成人99| 国产精品 国内视频| 国产精品国产高清国产av | 日韩 欧美 亚洲 中文字幕| 777米奇影视久久| 欧美老熟妇乱子伦牲交| 9色porny在线观看| 国产午夜精品久久久久久| 精品卡一卡二卡四卡免费| 免费观看人在逋| 在线观看66精品国产| 这个男人来自地球电影免费观看| 国产亚洲一区二区精品| 又大又爽又粗| 变态另类成人亚洲欧美熟女 | 天堂中文最新版在线下载| 女人爽到高潮嗷嗷叫在线视频| 一个人免费在线观看的高清视频| 色播在线永久视频| 美女高潮到喷水免费观看| 脱女人内裤的视频| 人人妻人人爽人人添夜夜欢视频| 欧美大码av| 国产欧美日韩精品亚洲av| 国产精品一区二区免费欧美| 国产一卡二卡三卡精品| 国产人伦9x9x在线观看| 考比视频在线观看| 国产精品免费大片| 日韩视频在线欧美| 久久久久国产一级毛片高清牌| 丝袜喷水一区| 一本色道久久久久久精品综合| 欧美黑人精品巨大| av一本久久久久| 久久精品aⅴ一区二区三区四区| av一本久久久久| 人妻一区二区av| 精品国内亚洲2022精品成人 | 国产精品影院久久| 十分钟在线观看高清视频www| 国产在线一区二区三区精| 美女主播在线视频| 国产高清视频在线播放一区| 亚洲熟女精品中文字幕|