• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Secure Rotation Invariant LBP Feature Computation in Cloud Environment

    2021-12-14 06:03:46ShiqiWangMingfangJiangJiaohuaQinHengfuYangandZhichenGao
    Computers Materials&Continua 2021年9期

    Shiqi Wang,Mingfang Jiang,Jiaohua Qin,Hengfu Yang and Zhichen Gao

    1College of Computer Science and Information Technology,Central South University of Forestry and Technology,Changsha,410004,China

    2Department of Information Science and Engineering,Hunan First Normal University,Changsha,410205,China

    3Department of Applied Mathematics and Statistics,College of Engineering and Applied Sciences,Stony Brook University,NY,11794,USA

    Abstract:In the era of big data,outsourcing massive data to a remote cloud server is a promising approach.Outsourcing storage and computation services can reduce storage costs and computational burdens.However,public cloud storage brings about new privacy and security concerns since the cloud servers can be shared by multiple users.Privacy-preserving feature extraction techniques are an effective solution to this issue.Because the Rotation Invariant Local Binary Pattern (RILBP) has been widely used in various image processing fields,we propose a new privacy-preserving outsourcing computation of RILBP over encrypted images in this paper(called PPRILBP).To protect image content,original images are encrypted using block scrambling,pixel circular shift,and pixel diffusion when uploaded to the cloud server.It is proved that RILBP features remain unchanged before and after encryption.Moreover,the server can directly extract RILBP features from encrypted images.Analyses and experiments confirm that the proposed scheme is secure and effective,and outperforms previous secure LBP feature computing methods.

    Keywords:Privacy-preserving;rotation invariant local binary pattern;cloud computing;image encryption

    1 Introduction

    With the rapid development of new information techniques such as big data,cloud computing,and the Internet of Things,users and companies are more willing to store their massive multimedia data on remote cloud servers.Cloud storage services have many advantages,including accessibility,convenience,and low storage expenditure,but massive multimedia data in the cloud servers contain some personal sensitive information needing to be protected.With the popularity of data outsourcing services,there is an increasing need for data security [1,2]and privacy protection in cloud computing.Privacy-preserving outsourcing protocol provides an effective way to cope with this problem [3].

    So far,many privacy-preserving data outsourcing schemes have been developed.Previous privacy-preserving outsourcing works mainly focus on text documents.Song et al.[4]proposed practical cryptographic schemes supporting search on encrypted data by employing Boolean operators and phrase searches.Brinkman et al.[5]presented an efficient search method over encrypted data using secure multi-party computation in which XML elements are translated to polynomials.It prevented the server from revealing private content about the data or the query by splitting each polynomial into two parts.Boneh et al.[6]constructed a public key encryption mechanism that enables keyword search over encrypted email.User Alice provided a key to the gateway and tested whether the query word is a keyword in the email without revealing anything information about the email.Swaminathan et al.[7]designed a rank-ordered search framework over encrypted text documents.The scheme can return documents in the order of their relevance to the query term.Elmehdwi et al.proposed a secure k-nearest neighbor (kNN) protocol [8].The secure kNN search scheme supports the kNN query,while the confidentiality of the data,the user’s input query,and data access patterns.Analysis results indicate that the presented retrieval protocol on encrypted data is secure and efficient.However,common cloud servers in practice may be owned by multiple users rather than only one user.In [9],a privacy-preserving ranked multi-keyword search of encrypted data suitable for the multi-owner model was introduced.Recently,the study on privacy-preserving data outsourcing services has been drawn to multimedia data [10-14].The Scale-Invariant Feature Transform (SIFT) is a popular method in the field of image processing.It is widely used in computer vision such as object recognition and tracking,and image matching.Hsu et al.[15]first proposed a privacy-preserving SIFT feature representation and extraction approach using the Paillier cryptosystem.It enables us to perform feature extraction in the encrypted domain.Hu et al.[16]focused on privacy-preserving computation outsourcing protocol for SIFT feature over massive encrypted image data and presented a secure SIFT feature extraction scheme.it achieved efficiency and security requirements simultaneously by preserving its key characteristics and designed two protocols for secure multiplication and comparison by randomly splitting original image data.To achieve good efficiency and security,Jiang et al.[17]proposed an effective privacy-preserving SIFT scheme for encrypted images.It devised leveled homomorphic encryption using a new encoding method,homomorphic comparison,division,and derivative encryption.Wang et al.[18]aimed at Speeded-up Robust Features (SURF) and proposed a privacy-preserving SURF computation scheme.it can preserve the distinctiveness and robustness of SURFs while enabling secure multiplication and comparison by leveraging somewhat homomorphic encryption (SHE) and single-instruction multiple-data (SIMD).Jiang et al.[19]first proposed a secure searchable image encryption algorithm for Block Truncation Coding (BTC)compressed images by encrypting the bit plane and two quantization levels of each subblock using the Henon chaotic map.Features based on BTC can be directly computed from encrypted images.Qin et al.[20]proposed a secure Harris feature extraction method for encrypted image retrieval that uses the improved Harris method,SURF,and the Bag of Words model to form the feature vectors.A privacy-preserving BTC feature extraction (PPBTC) is reported in [21].First,all images are uploaded to the cloud after encryption.The privacy-preserving image encryption process consists of block permutation,pixel diffusion,and a bit-plane random shift.BTC features remain unchanged after encryption and the cloud server can directly extract BTC features from the encrypted images.Some analyses and experimental results demonstrate that the proposed privacy-preserving feature extraction scheme for BTC-compressed images is efficient and secure,and it can be used to secure image computation applications in cloud computing.A local sensitive hash algorithm was employed to produce the searchable index because of the wide application of image hash [22]in image retrieval.The chaotic encryption approach was used to protect the security of images and indexes.Sultana et al.[23]proposed privacy-preserving Local Binary Patterns computation outsourcing scheme that can extract LBP features from encrypted images,in which image encryption was applied only on the MSB (Most Significant Bit) plane of an image.All operations were performed on encrypted images without revealing any information to cloud servers.However,its image scrambling degree is not good.Aiming at secure online data storage services in the Industrial Internet of Things (IIoT),Xia et al.[24]proposed a secure image LBP feature computation scheme.It can directly extract LBP based features from the encrypted images without revealing the private content in the images.

    Rotation invariant LBP (RILBP) is an excellent operator and has been widely applied in texture description.Privacy-preserving RILBP feature computation will gain wide application in secure cloud computing.To achieve direct RILBP-based feature representation and computation in the encrypted domain and preserve the privacy of images stored in remote servers,we proposed a privacy-preserving RILBP (PPRILBP) features computation outsourcing scheme in this paper.

    The main contributions of this paper are as follows.

    (1) This paper proposed a novel secure feature computation algorithm by combining block scrambling,pixel circular shift,and pixel diffusion.Since the feature extraction does not need to decrypt the encrypted data,the new encryption strategy enables direct calculation of RILBP features from encrypted images without revealing private information in images.

    (2) The correctness of RILBP feature extraction in the encrypted domain has been proved.Meanwhile,only one server is needed for direct feature computation from encrypted images.Our PPRILBP scheme can find good applications in privacy-preserving image retrieval in cloud environment.

    (3) Compared with existing secure LBP feature computation schemes,the new PPRILBP scheme has shown better robustness against common signal processing manipulations,including slight geometric attacks.It can achieve better retrieval accuracy.

    The remainder of this paper is organized as follows.In Section 2,a rotation invariant local binary pattern is briefly introduced.Section 3 describes the proposed PPRILBP algorithm in detail.The experiment results and analyses are given in Section 4.Section 5 analyzes the correctness of feature extraction.Finally,the conclusion is made in Section 6.

    2 Rotation Invariant Local Binary Pattern

    The Local Binary Pattern (LBP) technique was first introduced by Ojala et al.[25].As a well-defined texture descriptor,it has been widely used in various image processing fields such as image retrieval,image recognition,and image authentication.The original LBP operator assigns pixel value differences of each pixel with its 3×3 neighboring pixels as a binary number.The neighbor is marked as ‘1’if the corresponding pixel value is greater than the center pixel value and 0 otherwise.

    The circular LBP is an extension of the basic LBP operator.It can deal with the texture description of different sizes.Let the notation(P,R)denote the neighbor set withPsampling points on a circle of radiusR.The pixel values are bilinearly interpolated when the sampling point does not fall at integer coordinates.Given the center pixel(xc,yc)with pixel valueIc,the LBP number for the center pixel is calculated as follows.

    whereIpis the pixel value of the neighbor pixelands(x)is the sign function.

    To remove the effect of rotation,the LBP operator is further extended to the so-called rotation invariant LBP operator,denoted as.whereROR(x,i)performs a right circulari-bit shift on each bit pattern and the function min(z)returns the minimum value of the arrayz.

    For example,the linear permutation 111100002,11100012,and 110000112are different rotation versions of the same local pattern,and they all correspond to the same circular permutation with a minimum value 000011112.LetP=8 andR=1,Fig.1 shows an example of the RILBP operator with a circular neighbor set(8,1)

    Figure 1:The RILBP operator with a circular neighbor set (8,1)

    3 Proposed PPRILBP Scheme

    In this section,the proposed secure outsourcing scheme for RILBP features is described in detail.All images will be encrypted using block scrambling,pixel circular shift,and pixel diffusion before uploaded into the remote server.The cloud server can directly compute the RILBP based features from encrypted images without decrypting them.The block diagram of the proposed method is illustrated in Fig.2.

    Figure 2:The block diagram of the proposed PPRILBP scheme

    3.1 Image Encryption

    In the image encryption phase,the original image is divided into 3 × 3 nonoverlapping blocks.Each subblock will undergo three processes:block scrambling,pixel circular shift,and pixel diffusion.

    The secret keykey1is used to produce pseudo-random permutations from the interval[0,1,...,Nb-1]during block scrambling,whereNbis the number of nonoverlapped blocks.

    Then use secret keykey2to generate a pseudo-random sequencensfor performing pixel shift on the neighbor pixels sequenceN eb.The pixel shift operation does not change the RILBP feature since the minimum of the LBP feature remains unchanged before and after pixel circular shifting.Finally,secret keykey3is used to generate random sequences for performing pixel diffusion onto a circular shifted neighbor sequenceN ecto further remove the correlation of the adjacent pixel.In order not to change the sign of the difference between the center pixel and the neighbor pixels,we adopt the following strategy,

    whereN edis the sequence of diffused neighbor pixels,xcis the center pixel,Inb1 and Inb2are the pseudo-random sequence less thanxcand greater than or equal toxc,respectively.

    The detailed steps for image encryption are described in Algorithm 1.

    Algorithm 1:Image encryption Input:original image F with size m×n,secret key key1,key2 and key3 Output:encrypted image E Initialization:block size Bs=3,P=8 1:Use key1 to generate a pseudo-random permutation Pb within the interval [0,1,...,Nb-1].2:for i=0: Nb-1 3: block′(Pb(i))←block(i)4:Denote neighbor set as N eb

    (Continued)

    5:Denote the center pixel as xc.6:Use key2 to generate a pseudo-random number ns within [0,1,...,Bs×Bs-1].7:Perform the right circular ns-pixel shift on the neighbor sequence N eb and generate N ec.8:Use key3 to generate pseudo-random permutations Inb1 within the interval[0,1,...,xc-1]and Inb2 within interval [xc,xc+1,...,255].9:for k=0:P-1 10:Update the neighbor pixels N ec using Eq.(6) and produce N ed.11:end for 12:end for

    The encrypted imageEis produced when all image blocks are processed.

    Image decryptionis the inverse process of the encryption process.Given the same secret keys and image block size,users can recover the original images from encrypted images.

    3.2 RILBP Feature Extraction From Encrypted Image

    The proposed image encryption does not change the RILBP features of each block.The RILBP features can be directly computed in the encrypted domain without decryption.The main procedures of secure feature extraction are shown in Fig.2,and a more detailed description of the proposed RILBP feature extraction method is illustrated in Algorithm 2.

    Algorithm 2:RILBP feature extraction Input:encrypted image E with size m×n Output:RILBP histogram feature F Initialization:block size Bs=3,P=8 1:Divide the image E into nonoverlapped blocks.2:for i=0:Nb-1 3:Compute RILBP feature F(i) for the ith block using Eq.(4).4:end for 5:Compute the RILBP histogram feature F.

    4 The Correctness of RILBP Histogram Features Extraction

    Definition 1(Identical),two sequences are identical if and only if they contain the same elements in the same order.For example,these two sequences(5,6,23,9,3)and(5,6,23,9,3)should be considered identical.

    Definition 2(Equivalent),two sequences are equivalent if and only if they are different permutations of all elements from the same set,where ordering does not matter.For instance,these two sequences(3,5,6,9,23)and(5,6,23,9,3)should be considered equivalent.

    We consider the original image signal sequenceF.The signal is subdivided into blocks with a size ofBs.LetBibe a subblock of the original image,i.e.,We denote S as the block scrambling transform,

    whereF′is the scrambled image,

    Hence,we have

    Theorem 1.The sequenceFand corresponding scrambled sequenceF′are equivalent,denoted asF~=F′.

    Proof.Since the block scrambling transforms S only changes the position of an image subblock,the two sequencesFandF′contain the same image subblock except that only ordering of the subblock in the sequences is different.Therefore,the two sequencesFandF′are equivalent according to Definition 2.

    For any subblockB′∈F′,the center pixelxcand the neighbor sequenceN ebare got at first.The definition of the circular pixel shift operator C is as follows.

    Definition 3.The circular pixel shift operator C(N eb,x)performs right circularx-pixel shift on the neighbor sequenceN eband produces a new sequenceN ec,

    The sequenceN eband its circular shifted sequenceN ecare rotation invariant,denoted as

    Denote the pixel diffusion strategy as D,according to Eq.(6),we have

    Besides,then the following lemma can be concluded.

    Lemma 1.Pixel diffusion strategy D does not change the sign of the difference between the center pixel and the neighboring pixels,i.e.,sign(N ec-xc)=sign(N ed-xc).

    Proof.

    ?k∈{0,1,...,P-1}

    if N ec(k)-xc≥0

    N ed(k)-xc=Inb2(N ec(k)-xc+1)-xc

    ∵Inb2(N ec(k)-xc+1)≥xc

    ∴N ed(k)-xc≥xc-xc=0

    else

    N ed(k)-xc=Inb1(N ec(k)+1)-xc

    ∵Inb1(N ec(k)+1)<xc

    ∴N ed(k)-xc<xc-xc=0

    Therefore,the sign of the difference between the center pixel and the neighbor pixels remains unchanged before and after pixel diffusion,i.e.,sign(N ec-xc)=sign(N ed-xc).

    LetB′c,B′dbe the circularly shifted subblock and the pixel diffused subblock of any subblockB′,respectively.LetLBP(·),RILBP(·)be the LBP and RILBP operators,respectively.LetEbe the encrypted image signal sequence.Then,we have

    Theorem 2.RILBP=RILBP(E).

    Proof.?B′∈F′,?B′d∈E,

    N eb,N ec,N edare neighbor sequences derived from subblocksB′,B′c,B′d,respectively.

    According to Lemma 1,we havesign(N ec-xc)=sign(N ed-xc).

    Thus,RILBP=RILBP(E)sinceB′,B′dare any subblocks of sequencesF′,E,respectively.

    Finally,the following theorem be proved

    Theorem 3.The histogram of RILBP features computed from the original image and encrypted images are the same,

    Proof.

    We haveF~=F′according to Theorem 1.

    So,RILBP(F)~=RILBP

    Also,becauseRILBP=RILBP(E)according to Theorem 2.

    We haveRILBP(F)~=RILBP(E).

    Since the histogram feature does not consider the ordering of elements,we can conclude that the same RILBP histogram features can be computed from the original image and encrypted image,respectively.

    5 Experimental Results and Analyses

    The section provides some analyses and experiments to validate the security and effectiveness of the proposed PPRILBP outsourcing algorithm.The algorithm is conducted on the USC-SIPI Image Database.Fig.3 shows some test images from the image dataset.In the experiments,we setP=8 andR=1.The generated encrypted images by our PPRILBP algorithm are illustrated in Fig.4.According to Fig.4,one cannot observe useful information from the encrypted image by human eyes.

    Figure 3:Original images (a) Lena (b) peppers (c) Goldhill (d) couple

    Figure 4:Encrypted images (a) Lena (b) peppers (c) Goldhill (d) couple

    5.1 Security Analysis

    In this section,the key space size is first investigated,which is the total number of different keys used in the encryption process.In the proposed PPRILBP algorithm,the secret key consists of three secret keys (key1,key2,andkey3).If each secret key has a precision of 10-15then there will be 15+15+15=45 uncertain digits of the secret key combination.This means that the complete key space for the proposed secure feature extraction reaches up to 1045,i.e.,our PPRILBP algorithm possesses an effective key length of log2≈150 bits.The key space of our algorithm is larger than that of the 128-bit encryption.Therefore,we can say that the proposed PPRILBP algorithm has a large enough key space and can resist all kinds of bruteforce attacks.

    Besides,a good image encryption scheme should be sensitive to the secret keys.In our scheme,the sensitivity tokey1,key2,andkey3is considered as 10-15.To test the key sensitivity,the original image (taking the Lena image as an example) is first encrypted using secret keys(key1=0.74,key2=0.79,key3=0.13),and the resultant encrypted mage is shown in Fig.5a.Fig.5b is the decrypted Lena image using the correct key,and Figs.5c-5e are the decrypted images using the wrong key,respectively.From Fig.5,we can find that even a secret key set with a tiny change (10-15) does not reveal any information on the plain-image.Therefore,the proposed scheme has a high key sensitivity.

    Figure 5:Key sensitivity test.(a) Encrypted image using key (key1=0.74,key2=0.79,key3=0.13).(b) Decrypted image using key (key1=0.74,key2=0.79,key3=0.13).(c) Decrypted image using key (key1=0.74+10-15,key2=0.79,key3=0.13).(d) Decrypted image using key (key1=0.74,key2=0.79+10-15,key3=0.13).(e) Decrypted image using key (key1=0.74,key2=0.79,key3=0.13+10-15)

    5.2 Adjacent Pixels Correlation Analysis

    An efficient image encryption system should generate encrypted images with low correlation in the adjacent pixels.The distribution of the adjacent pixels in the original image and its corresponding encrypted image provide an effective visual measure way of the correlation of adjacent pixels.Fig.6 shows the correlation distribution of two horizontally adjacent pixels of the original image and encrypted image generated by our proposed scheme.The left column and the right column are the correlation distribution of the original image and its corresponding encrypted image,respectively.We can see that the correlation between adjacent pixels in the encrypted image is diffused effectively.The encrypted images produced by our proposed scheme have a weaker correlation than their original images.Thus,the new image encryption algorithm can almost eliminate the correlation of pixels.

    Figure 6:Correlation of two horizontally adjacent pixels.Left column:original images,right column:encrypted images (a) Lena (b) peppers

    5.3 Direct PPRILBP Feature Extraction on Encrypted Data

    We extract the features from original images and encrypted images for evaluating the accessibility of feature computation.The extracted RILBP features are shown in Fig.7.The features from the original image and encrypted image are illustrated in the left column and the right column,respectively.It is not hard to notice that the image encryption scheme extracts the same PPRILBP features from the original image and encrypted images.So,the proposed PPRILBP scheme can achieve a high successful retrieval rate when used to image retrieval in cloud computing.

    Figure 7:RILBP feature extraction before and after image encryption.Left column:features extracted from original images,right column:features extracted from encrypted images.(a) Lena(b) peppers

    Moreover,we further calculate the similarities between different images for homomorphic evaluation.Pearson’s correlation coefficient is employed to evaluate feature similarity,whereE(X)denotes the mathematical expectation.

    The corresponding test results are listed in Tabs.1 and 2,respectively.It can be found that feature similarity remains unchanged before and after encryption by observing Tabs.1 and 2.This indicates that the feature vector extracted by our PPRILBP scheme is homomorphic.

    Table 1:Similarities of different original images in Fig.3

    Table 2:Similarities of different encrypted images in Fig.4

    5.4 Case Study on Privacy-Preserving Image Retrieval

    As an excellent texture descriptor,LBP has been successfully employed for feature extraction in image retrieval due to its high discriminating ability.In experiments.We apply the proposed PPRIBP algorithm and Xia et al.[24]scheme to search images under the USC-SIPI Image Database.General evaluation metrics recall and precision is employed to evaluate image matching.Fig.8 shows the performance of the proposed method and Xia et al.[24]scheme.From Fig.8,we can notice that the performance of the proposed PPRILBP method is better than that by existing work when recall is not more than 0.5.Since that the higher precision with low recall is of more practical significance for image retrieval application,it can be concluded that our PPRILBP outperforms the existing secure LBP feature extraction scheme [24].

    Figure 8:Precision-recall curves of different retrieval methods

    6 Conclusion

    Rotation Invariant Local Binary Pattern is a popular texture descriptor in computer vision applications.We propose a secure outsourcing scheme of RILBP feature computation.The image encryption using block scrambling,pixel circular shift,and pixel diffusion does not change the RILBP feature of each block.So,the same features can be computed from both the original images and encrypted images.Its security and performance are analyzed and evaluated.Experiments and analysis show that our scheme can directly extract features from encrypted data while preserving privacy and has better retrieval performance than the existing privacy-preserving LBP feature extraction method.

    Funding Statement:This work was supported in part by the National Natural Science Foundation of China under Grant No.61872408,the Natural Science Foundation of Hunan Province(2020JJ4238),the Social Science Fund of Hunan Province under Grant No.16YBA102,and the Research Fund of Hunan Provincial Key Laboratory of informationization technology for basic education under Grant No.2015TP1017.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    国产成人freesex在线| 嫩草影院精品99| 天美传媒精品一区二区| 国产中年淑女户外野战色| 乱码一卡2卡4卡精品| 国内精品一区二区在线观看| 国产一区二区三区av在线| 久久精品综合一区二区三区| 老司机影院成人| 久久久久久久久久久丰满| 日韩成人伦理影院| 免费看a级黄色片| 精品午夜福利在线看| 精品久久久久久久末码| 欧美高清性xxxxhd video| 高清视频免费观看一区二区 | 能在线免费观看的黄片| 成年女人在线观看亚洲视频 | 又大又黄又爽视频免费| 少妇猛男粗大的猛烈进出视频 | 欧美人与善性xxx| 天天躁夜夜躁狠狠久久av| 97超视频在线观看视频| 大香蕉97超碰在线| 成人美女网站在线观看视频| 亚洲电影在线观看av| 亚洲国产av新网站| 国产精品日韩av在线免费观看| 久久99热这里只频精品6学生| 午夜福利视频精品| 久久久久性生活片| 大又大粗又爽又黄少妇毛片口| 国产老妇女一区| 亚洲欧洲国产日韩| av卡一久久| 晚上一个人看的免费电影| 在线播放无遮挡| 午夜福利高清视频| 丰满乱子伦码专区| 99热这里只有是精品在线观看| 午夜免费观看性视频| 欧美xxⅹ黑人| 一边亲一边摸免费视频| 狂野欧美白嫩少妇大欣赏| av在线老鸭窝| 我的老师免费观看完整版| 亚洲精品乱久久久久久| 一级毛片我不卡| 日本三级黄在线观看| 成人高潮视频无遮挡免费网站| 国产精品无大码| 一级二级三级毛片免费看| 国产中年淑女户外野战色| 少妇的逼水好多| 91久久精品电影网| 国产亚洲午夜精品一区二区久久 | 青春草视频在线免费观看| 欧美三级亚洲精品| 精品久久久久久久久av| 国产精品国产三级国产专区5o| 波多野结衣巨乳人妻| 日韩av不卡免费在线播放| 国产精品三级大全| 国产亚洲一区二区精品| 十八禁网站网址无遮挡 | 亚洲美女搞黄在线观看| 国产有黄有色有爽视频| 2018国产大陆天天弄谢| 久久人人爽人人片av| 欧美高清成人免费视频www| 男女边摸边吃奶| 久久久精品94久久精品| 午夜激情福利司机影院| 搞女人的毛片| 精品国产三级普通话版| 精品久久久精品久久久| 久久精品熟女亚洲av麻豆精品 | 国模一区二区三区四区视频| 欧美一级a爱片免费观看看| 欧美xxⅹ黑人| 精品久久久久久久久av| 国产黄色视频一区二区在线观看| 特级一级黄色大片| 九九久久精品国产亚洲av麻豆| av卡一久久| 精品久久久久久久久久久久久| 久久久久久久久久人人人人人人| 又粗又硬又长又爽又黄的视频| 在线免费十八禁| 国产淫语在线视频| 精品人妻偷拍中文字幕| 午夜亚洲福利在线播放| 亚洲av在线观看美女高潮| 亚洲成人av在线免费| 久久久久久久久大av| 性色avwww在线观看| 中文在线观看免费www的网站| 精品不卡国产一区二区三区| 黑人高潮一二区| 久久久色成人| 亚洲精品一二三| 免费无遮挡裸体视频| 神马国产精品三级电影在线观看| 视频中文字幕在线观看| 欧美日韩亚洲高清精品| 亚洲成人av在线免费| 日韩三级伦理在线观看| 国产精品国产三级国产专区5o| 亚洲性久久影院| 精华霜和精华液先用哪个| 午夜亚洲福利在线播放| 丝袜喷水一区| 欧美日韩一区二区视频在线观看视频在线 | 97超碰精品成人国产| 国产极品天堂在线| 搡老乐熟女国产| 麻豆av噜噜一区二区三区| 精品少妇黑人巨大在线播放| 色吧在线观看| 最近的中文字幕免费完整| 99久久九九国产精品国产免费| 亚洲国产av新网站| 国产麻豆成人av免费视频| 91精品一卡2卡3卡4卡| 黄片无遮挡物在线观看| 国产亚洲精品久久久com| 一级毛片aaaaaa免费看小| 日产精品乱码卡一卡2卡三| 一个人免费在线观看电影| 18禁动态无遮挡网站| .国产精品久久| 777米奇影视久久| 亚洲国产精品成人久久小说| 午夜视频国产福利| 亚洲欧美日韩无卡精品| 亚洲欧美清纯卡通| 91精品一卡2卡3卡4卡| eeuss影院久久| 大片免费播放器 马上看| 国产色爽女视频免费观看| 午夜福利高清视频| 毛片一级片免费看久久久久| 最近最新中文字幕大全电影3| 国产女主播在线喷水免费视频网站 | 免费黄网站久久成人精品| 在线天堂最新版资源| 亚洲av成人av| 久久草成人影院| 最近中文字幕2019免费版| 一边亲一边摸免费视频| 男人狂女人下面高潮的视频| 欧美日韩综合久久久久久| 亚洲国产欧美在线一区| 18禁动态无遮挡网站| 国产av码专区亚洲av| 久久久国产一区二区| 一级黄片播放器| 久久久久国产网址| 国产av不卡久久| 国产亚洲一区二区精品| 亚洲欧美一区二区三区黑人 | 天天一区二区日本电影三级| 国产亚洲91精品色在线| 欧美极品一区二区三区四区| 国产乱人视频| 亚洲欧美日韩卡通动漫| 80岁老熟妇乱子伦牲交| 日日撸夜夜添| 婷婷色av中文字幕| 人人妻人人澡人人爽人人夜夜 | 色尼玛亚洲综合影院| 日韩欧美 国产精品| 欧美性猛交╳xxx乱大交人| 欧美成人午夜免费资源| 亚洲精品乱码久久久久久按摩| 免费观看性生交大片5| 天堂影院成人在线观看| 亚洲乱码一区二区免费版| 少妇猛男粗大的猛烈进出视频 | 边亲边吃奶的免费视频| 18禁在线播放成人免费| 国产日韩欧美在线精品| 国产黄频视频在线观看| 午夜免费激情av| 日韩欧美一区视频在线观看 | 欧美 日韩 精品 国产| 欧美人与善性xxx| h日本视频在线播放| 久久精品久久精品一区二区三区| 精品久久久精品久久久| 欧美激情在线99| 亚洲美女视频黄频| 欧美精品国产亚洲| 成人午夜高清在线视频| 91精品国产九色| 日日摸夜夜添夜夜添av毛片| 久久久亚洲精品成人影院| 亚洲熟妇中文字幕五十中出| 日韩av在线大香蕉| 麻豆av噜噜一区二区三区| 亚洲,欧美,日韩| 日韩一本色道免费dvd| 婷婷六月久久综合丁香| 丰满乱子伦码专区| 神马国产精品三级电影在线观看| 欧美另类一区| 成人性生交大片免费视频hd| 亚洲久久久久久中文字幕| 国产精品人妻久久久久久| 1000部很黄的大片| 亚州av有码| 美女cb高潮喷水在线观看| 欧美日韩亚洲高清精品| 亚洲最大成人中文| 少妇丰满av| 一个人观看的视频www高清免费观看| 婷婷色av中文字幕| 国产探花极品一区二区| 美女主播在线视频| 国产精品久久久久久av不卡| 蜜桃久久精品国产亚洲av| 看十八女毛片水多多多| 久久99热这里只有精品18| 久久韩国三级中文字幕| 99热这里只有精品一区| 日本熟妇午夜| 一级a做视频免费观看| 狠狠精品人妻久久久久久综合| 国产免费一级a男人的天堂| 日本爱情动作片www.在线观看| 日韩视频在线欧美| www.色视频.com| 久久99热6这里只有精品| 欧美日韩一区二区视频在线观看视频在线 | 国产午夜福利久久久久久| 免费大片18禁| a级一级毛片免费在线观看| 国内揄拍国产精品人妻在线| 日本黄色片子视频| 亚洲精品自拍成人| 春色校园在线视频观看| 成年版毛片免费区| 免费大片18禁| 国产精品人妻久久久久久| 国产 亚洲一区二区三区 | 久久精品夜色国产| 永久网站在线| 一本久久精品| av天堂中文字幕网| 国产免费视频播放在线视频 | 国产av国产精品国产| 国产探花在线观看一区二区| eeuss影院久久| 午夜激情福利司机影院| 国产午夜福利久久久久久| 最近手机中文字幕大全| 国产一区二区三区综合在线观看 | 国产精品福利在线免费观看| 国产精品美女特级片免费视频播放器| 午夜福利在线观看免费完整高清在| 午夜亚洲福利在线播放| 日韩成人伦理影院| 一级毛片电影观看| 亚洲丝袜综合中文字幕| 亚洲av福利一区| 亚洲精品乱码久久久v下载方式| 久久精品人妻少妇| av女优亚洲男人天堂| 国产黄片美女视频| 狂野欧美激情性xxxx在线观看| 午夜久久久久精精品| 国产午夜精品久久久久久一区二区三区| 日韩亚洲欧美综合| 精品国产露脸久久av麻豆 | 人人妻人人看人人澡| 久久久成人免费电影| 久久精品久久久久久久性| 欧美xxⅹ黑人| 日本一二三区视频观看| av天堂中文字幕网| av卡一久久| 熟妇人妻久久中文字幕3abv| 18禁在线播放成人免费| 日韩在线高清观看一区二区三区| 国产亚洲午夜精品一区二区久久 | 成年女人看的毛片在线观看| videossex国产| 内射极品少妇av片p| 色综合站精品国产| 天堂av国产一区二区熟女人妻| 高清日韩中文字幕在线| 高清在线视频一区二区三区| 久久久午夜欧美精品| 深爱激情五月婷婷| 欧美日本视频| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 久久久久精品性色| 国产一级毛片七仙女欲春2| 好男人视频免费观看在线| 欧美激情国产日韩精品一区| 国产精品女同一区二区软件| 国产精品人妻久久久久久| 高清av免费在线| 国产 一区 欧美 日韩| 免费播放大片免费观看视频在线观看| 午夜福利成人在线免费观看| 欧美日韩精品成人综合77777| 午夜激情福利司机影院| 亚洲av中文av极速乱| 国产老妇伦熟女老妇高清| .国产精品久久| 国精品久久久久久国模美| 在线播放无遮挡| 夫妻午夜视频| 成年女人在线观看亚洲视频 | 国产精品熟女久久久久浪| 亚洲成人av在线免费| 欧美激情在线99| 99re6热这里在线精品视频| 丰满乱子伦码专区| 国产又色又爽无遮挡免| 一级毛片电影观看| 午夜免费男女啪啪视频观看| 狂野欧美激情性xxxx在线观看| 亚洲丝袜综合中文字幕| 日韩三级伦理在线观看| 亚洲av成人精品一区久久| 国产精品久久久久久精品电影| 国产v大片淫在线免费观看| 日韩av不卡免费在线播放| 国内精品宾馆在线| 内射极品少妇av片p| 国产精品国产三级国产av玫瑰| av一本久久久久| 亚洲乱码一区二区免费版| 深爱激情五月婷婷| 九九爱精品视频在线观看| .国产精品久久| 丰满乱子伦码专区| 精品99又大又爽又粗少妇毛片| av.在线天堂| 亚洲内射少妇av| 久久精品久久久久久久性| 亚洲av二区三区四区| 久久人人爽人人爽人人片va| 韩国高清视频一区二区三区| 国产成人精品福利久久| 国产成年人精品一区二区| 韩国高清视频一区二区三区| 老司机影院毛片| 色哟哟·www| 中文字幕制服av| 国产老妇女一区| 亚州av有码| 欧美3d第一页| 亚洲欧美精品自产自拍| 日韩成人av中文字幕在线观看| 亚洲天堂国产精品一区在线| 97人妻精品一区二区三区麻豆| 久久精品久久久久久久性| 自拍偷自拍亚洲精品老妇| 非洲黑人性xxxx精品又粗又长| 午夜福利高清视频| 麻豆乱淫一区二区| 亚洲熟女精品中文字幕| 如何舔出高潮| 国产伦精品一区二区三区视频9| 狠狠精品人妻久久久久久综合| 3wmmmm亚洲av在线观看| 干丝袜人妻中文字幕| 日产精品乱码卡一卡2卡三| 少妇熟女欧美另类| 91aial.com中文字幕在线观看| 欧美亚洲日本最大视频资源| 观看av在线不卡| 老汉色∧v一级毛片| 午夜av观看不卡| 精品国产超薄肉色丝袜足j| 超色免费av| 日韩中文字幕欧美一区二区 | 久久亚洲国产成人精品v| 国产亚洲最大av| 国产av一区二区精品久久| 97在线视频观看| 另类亚洲欧美激情| 国产一区二区 视频在线| 深夜精品福利| 久久精品久久精品一区二区三区| 大香蕉久久网| 人妻人人澡人人爽人人| 寂寞人妻少妇视频99o| 久久久久网色| 1024视频免费在线观看| 妹子高潮喷水视频| 欧美日韩精品成人综合77777| 欧美 日韩 精品 国产| 精品国产乱码久久久久久小说| 三上悠亚av全集在线观看| 少妇人妻 视频| 日韩制服丝袜自拍偷拍| 日韩三级伦理在线观看| 国产av一区二区精品久久| 成人影院久久| 国产精品二区激情视频| 日日摸夜夜添夜夜爱| 国产一区二区激情短视频 | 成人毛片a级毛片在线播放| 曰老女人黄片| 一区二区三区精品91| 在线观看www视频免费| 哪个播放器可以免费观看大片| 欧美成人精品欧美一级黄| av福利片在线| 精品亚洲成国产av| 大片电影免费在线观看免费| 免费看不卡的av| 国产日韩一区二区三区精品不卡| 国产成人精品福利久久| 亚洲欧美清纯卡通| 天天躁夜夜躁狠狠久久av| 青春草国产在线视频| 欧美精品一区二区免费开放| 亚洲图色成人| 可以免费在线观看a视频的电影网站 | 国产精品无大码| 亚洲国产欧美日韩在线播放| 亚洲欧美成人综合另类久久久| 涩涩av久久男人的天堂| 亚洲欧洲日产国产| 久久精品国产亚洲av涩爱| 中文字幕av电影在线播放| 色94色欧美一区二区| 夜夜骑夜夜射夜夜干| 欧美精品一区二区大全| 黄网站色视频无遮挡免费观看| 香蕉国产在线看| 18禁观看日本| 一本—道久久a久久精品蜜桃钙片| 青春草视频在线免费观看| 亚洲精品国产色婷婷电影| 中文字幕人妻丝袜一区二区 | 九九爱精品视频在线观看| 日韩大片免费观看网站| 欧美变态另类bdsm刘玥| 久久99热这里只频精品6学生| 亚洲av电影在线进入| 亚洲国产欧美网| 国产精品.久久久| 丰满少妇做爰视频| 久久久久久久久久久久大奶| 欧美亚洲日本最大视频资源| av片东京热男人的天堂| 两个人免费观看高清视频| 黄片播放在线免费| 国产免费现黄频在线看| 成年人午夜在线观看视频| 视频在线观看一区二区三区| 午夜精品国产一区二区电影| 成年女人毛片免费观看观看9 | 国产老妇伦熟女老妇高清| 一级,二级,三级黄色视频| 成人二区视频| 十分钟在线观看高清视频www| h视频一区二区三区| 成人18禁高潮啪啪吃奶动态图| 国产毛片在线视频| www.熟女人妻精品国产| 美女中出高潮动态图| 99久久中文字幕三级久久日本| 国产亚洲精品第一综合不卡| 国产一区二区在线观看av| 亚洲国产精品国产精品| 少妇人妻久久综合中文| 波多野结衣av一区二区av| 亚洲精品乱久久久久久| 美女中出高潮动态图| 欧美另类一区| 欧美黄色片欧美黄色片| 成人18禁高潮啪啪吃奶动态图| 亚洲精华国产精华液的使用体验| 黑人欧美特级aaaaaa片| 深夜精品福利| 国产成人av激情在线播放| 亚洲,欧美,日韩| 天美传媒精品一区二区| 国产精品不卡视频一区二区| 亚洲av电影在线观看一区二区三区| 1024香蕉在线观看| 欧美另类一区| 在线观看一区二区三区激情| 自拍欧美九色日韩亚洲蝌蚪91| 国产av一区二区精品久久| 欧美精品av麻豆av| 亚洲,欧美,日韩| av国产精品久久久久影院| 国产一区二区激情短视频 | 飞空精品影院首页| 国产黄色免费在线视频| 一级黄片播放器| 亚洲av国产av综合av卡| 亚洲欧美中文字幕日韩二区| 久久女婷五月综合色啪小说| 免费观看性生交大片5| 亚洲视频免费观看视频| 大片电影免费在线观看免费| 国产亚洲精品第一综合不卡| 欧美日韩一级在线毛片| 久久久久久免费高清国产稀缺| 亚洲激情五月婷婷啪啪| 老司机亚洲免费影院| 国产av码专区亚洲av| 亚洲成人手机| 在线天堂中文资源库| 9色porny在线观看| 久久久欧美国产精品| 国产精品免费大片| av视频免费观看在线观看| 中国国产av一级| 18禁国产床啪视频网站| 精品一区在线观看国产| 少妇被粗大的猛进出69影院| 777米奇影视久久| 久久国产精品男人的天堂亚洲| 18禁裸乳无遮挡动漫免费视频| 波多野结衣av一区二区av| 亚洲综合色惰| 老女人水多毛片| 美女国产视频在线观看| tube8黄色片| 中文精品一卡2卡3卡4更新| 精品视频人人做人人爽| 欧美国产精品一级二级三级| 免费看不卡的av| 青青草视频在线视频观看| 精品少妇黑人巨大在线播放| 亚洲精品av麻豆狂野| 国产成人精品在线电影| 一级毛片我不卡| 亚洲欧美一区二区三区黑人 | 国产有黄有色有爽视频| 中文字幕精品免费在线观看视频| 中文字幕人妻丝袜制服| 国产老妇伦熟女老妇高清| 亚洲精品自拍成人| 麻豆乱淫一区二区| 日本色播在线视频| 中文字幕制服av| 亚洲伊人久久精品综合| 丝袜喷水一区| 午夜久久久在线观看| 国产伦理片在线播放av一区| 一本大道久久a久久精品| 香蕉国产在线看| 国产xxxxx性猛交| 亚洲 欧美一区二区三区| 国产成人精品久久二区二区91 | 午夜福利视频在线观看免费| 天堂8中文在线网| 制服丝袜香蕉在线| 女的被弄到高潮叫床怎么办| 色哟哟·www| 波野结衣二区三区在线| 水蜜桃什么品种好| 国产黄频视频在线观看| 国产爽快片一区二区三区| 日韩av免费高清视频| 看十八女毛片水多多多| 亚洲一区中文字幕在线| 超色免费av| 三上悠亚av全集在线观看| 日本猛色少妇xxxxx猛交久久| 亚洲经典国产精华液单| 亚洲欧美日韩另类电影网站| 最近最新中文字幕免费大全7| 国产毛片在线视频| 老司机影院成人| 又大又黄又爽视频免费| 1024香蕉在线观看| 亚洲四区av| 精品国产乱码久久久久久小说| 80岁老熟妇乱子伦牲交| 咕卡用的链子| 两性夫妻黄色片| 男女无遮挡免费网站观看| 亚洲成人手机| 两性夫妻黄色片| 国产淫语在线视频| 国产免费一区二区三区四区乱码| 国产黄频视频在线观看| 男人添女人高潮全过程视频| 国产精品久久久久久av不卡| 免费人妻精品一区二区三区视频| 天天躁狠狠躁夜夜躁狠狠躁| 免费观看无遮挡的男女| 最新的欧美精品一区二区| 午夜影院在线不卡| 久久韩国三级中文字幕| 久久99精品国语久久久| 欧美精品高潮呻吟av久久| 啦啦啦视频在线资源免费观看| 这个男人来自地球电影免费观看 | 久久精品国产亚洲av高清一级| 国产爽快片一区二区三区| 青春草亚洲视频在线观看| 最近最新中文字幕大全免费视频 | 免费看av在线观看网站| 亚洲内射少妇av| 波野结衣二区三区在线| 婷婷色av中文字幕| 欧美国产精品一级二级三级| 日本免费在线观看一区| 久久久久久人人人人人| 在线观看国产h片| 国产免费福利视频在线观看| 国产深夜福利视频在线观看|