• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Arabic Feature-Based Text Watermarking Technique for Sensitive Detecting Tampering Attack

    2021-12-14 06:06:14FahdAlWesabiHudaIskandarSalehAlzahraniAbdelzahirAbdelmaboudMohammedAbdulNadhemNemriMohammadMedaniandMohammedAlghamdi
    Computers Materials&Continua 2021年9期

    Fahd N.Al-Wesabi,Huda G.Iskandar,Saleh Alzahrani,Abdelzahir Abdelmaboud,Mohammed Abdul,Nadhem Nemri,Mohammad Medani and Mohammed Y.Alghamdi

    1Department of Computer Science,King Khalid University,Muhayel Aseer,Kingdom of Saudi Arabia

    2Faculty of Computer and IT,Sana’a University,Sana’a,Yemen

    3School of Computing,Faculty of Engineering,Universiti Teknologi Malaysia,Malaysia

    4Department of Information Systems,King Khalid University,Muhayel Aseer,Kingdom of Saudi Arabia

    5Department of Computer Science,Faculty of Science&Arts of Baljurshi,Al-Baha University,KSA

    Abstract:In this article,a high-sensitive approach for detecting tampering attacks on transmitted Arabic-text over the Internet(HFDATAI)is proposed by integrating digital watermarking and hidden Markov model as a strategy for soft computing.The HFDATAI solution technically integrates and senses the watermark without modifying the original text.The alphanumeric mechanism order in the first stage focused on the Markov model key secret is incorporated into an automated,null-watermarking approach to enhance the proposed approach’s efficiency,accuracy,and intensity.The first-level order and alphanumeric Markov model technique have been used as a strategy for soft computing to analyze the text of the Arabic language.In addition,the features of the interrelationship among text contexts and characteristics of watermark information extraction that is used later validated for detecting any tampering of the Arabic-text attacked.The HFDATAI strategy was introduced based on PHP with included IDE of VS code.Experiments of four separate duration datasets in random sites illustrate the fragility,efficacy,and applicability of HFDATAI by using the three common tampering attacks i.e.,insertion,reorder,and deletion.The HFDATAI was found to be effective,applicable,and very sensitive for detecting any possible tampering on Arabic text.

    Keywords:Watermarking;soft computing;text analysis;hidden Markov model;content authentication

    1 Introduction

    For the research community,the reliability and security of exchanged text data through the internet is the most promising and challenging field.In communication technologies,authentication of content and automated text verification of honesty in different Languages and formats are of great significance.Numerous applications for instance;e-Banking and e-commerce render information transfer via the Internet the most difficult.In terms of content,structure,grammar,and semantics,much of the digital media transferred over the internet is in text form and is very susceptible to online transmission.During the transfer process,malicious attackers can temper such digital content [1].

    For information security,many algorithms and techniques are available such as the authentication of content,verification of integrity,detection of tampering,identification of owners,access control,and copyright protection.

    To overcome these issues,steganography and automated methods of watermarking are commonly used.A technique of digital-Watermarking (DWM) can be inserted into digital material through various details such as text,binary pictures,audio,and video [2,3].A fine-grained text watermarking procedure is proposed based on replacing the white spaces and Latin symbols with homoglyph characters [4].

    Several conventional methods and solutions for text watermarking were proposed [5,6]and categorized into different classifications such as linguistic,structure and image-based,and formatbased binary images [7].To insert the watermark information into the document,most of these solutions require certain upgrades or improvements to the original text in digital format material.Zero-watermarking without any alteration to the original digital material to embed the watermark information is a new technique with smart algorithms that can be used.Also,this technique can be used to generate data for a watermark in the contents of a given digital context [1,7-9].

    Restricted research has centered on the appropriate solutions to verify the credibility of critical digital media online [10-12].The verification of digital text and the identification of fraud in research earned great attention.In addition,text watermarking studies have concentrated on copyright protection in the last decade,but less interest and attention has been paid to integrity verification,identification of tampering and authentication of content due to the existence of text content based on the natural language [13].

    Proposing the most appropriate approaches and strategies for dissimilar formats and materials,especially in Arabic and English languages,is the most common challenge in this area [14,15].Therefore,authentication of content,verification of honesty,and detection of tampering of sensitive text is a major issue in different systems that need critical solutions.

    Some instances of such sensitive digital text content are Arabic interactive Holy Qur’an,eChecks,tests,and marks.Different Arabic alphabet characteristics such as diacritics lengthened letters and extra symbols of Arabic make it simple to modify the key meaning of the text material by making basic changes such as modifying diacritic arrangements [16].The most popular soft computation and natural language processing (NLP) technique that supported the analysis of the text is HMM.

    We suggest a highly fragile method for detecting the tampering attacks on Internet-based Arabic text (HFDATAI) by incorporating the Markov model and zero watermarking.Hence,firstorder of an alphanumeric mechanism consisting of a model performing as a soft computing tool and NLP in cooperation between the zero-watermarking technique and the Markov model.In this method,for text analysis,the first order of the alphanumeric mechanism of the Markov model was used to extract the connections between the contents of the Arabic text given and to generate the main watermark.Without alterations or effects on the original text size,the watermark created is logically integrated into the original Arabic history.The embedded watermark would later be used to identify all manipulation on Arabic text obtained after transmission of text through the Internet and whether it is authentic or not.

    The primary objective of the HFDATAI strategy is to meet the high accuracy of content authentication and identification of sensitive tampering attacks of Arabic text which is transmitted through the Internet.

    The remainder of the article is structured as follows:In Section 2,we explain the existing works done so far.In Section 3,we discussed the suggested approach (HFDATAI).The simulation and implementation are provided in Section 4,results discussion is provided in Section 5,and finally,we conclude the article in Section 6.

    2 Related Work

    According to the processing domain of NLP and text watermarking,these existing methods and solutions of text watermarking reviewed in this paper are classified into linguistical,structural and zero-watermark methods [1,7,13].

    Natural language is the foundation of approaches to linguistic text watermarking.The mechanism of those methods embedding the watermark is based on changes applied to the semantic and syntactic essence of plain text [1].

    To enhance the capability and imperceptibility of Arabic text,a method of text watermarking has suggested based on location of the accessible words [17].In this method,any word-space is used to mask the Boolean bit 0 or 1 that physically modifies the original text.

    A text steganography technique was proposed to hide information in the Arabic language [18].The step of this approach considers Harakat’s existence in Arabic diacritics such as Kasra,Fatha,and Damma as well as reverses Fatha to cover the message.

    A Kashida-marks invisible method of watermarking [19],based on the features of frequent recurrence of document security and authentication characters,was proposed.The method is based on a predetermined watermark key with a Kashida placed for a bit 1 and a bit omitted.

    The method of steganography of the text has proposed based on Kashida extensions on the characters ‘moon’and ‘sun’to write digital contents of the Arabic language [20].In addition,the Kashida method characters are seen alongside characters from Arabic to decide which hidden secret bits are kept by specific characters.In this form,four instances are included in the kashida characters:moon characters representing ‘00’;sun characters representing ‘01’;sun characters representing ‘10’;and moon characters representing ‘11’.

    A text steganographic approach [21]based on multilingual Unicode characters has been suggested to cover details in English scripts for the use of the English Unicode alphabet in other languages.Thirteen letters of the English alphabet have been chosen for this approach.It is important to embed dual bits in a timeframe that used ASCII code for embedding 00.However,multilingual ones were used by Unicode to embed between 01,and 10,as well as 11.The algorithm of Text Watermarking is used to secure textual contents from malicious attacks according to Unicode extended characters [22].The algorithm requires three main steps,the development,incorporation,and extraction of watermarks.The addition of watermarks is focused on the development of predefined coding tables,while scrambling strategies are often used in generating and removing the watermarking key is safe.

    The substitution attack method focused on preserving the position of words in the text document has been proposed [23].This method depends on manipulating word transitions in the text document.Authentication of Chinese text documents based on the combination of the properties of sentences and text-based watermarking approaches have been suggested [24,25].The proposed method is presented as follows:a text of the Chinese language is split into a group of sentences,and for each word,the code of a semantic has been obtained.The distribution of semantic codes influences sentence entropy.

    A zero-watermarking method has been proposed to preserve the privacy of a person who relies on the Hurst exponent and the nullity of the frames [26].For watermark embedding,the two steps are determined to evaluate the unvoiced frames.The process of the proposed approach bases on integrating an individual’s identity without notifying any distortion in the signals of medical expression.

    A zero-watermarking method was proposed to resolve the security issues of text-documents of the English language,such as verification of content and copyright protection [27].A zerowatermarking approach has been suggested based on the authentication Markov-model of the content of English text [28,29].In this approach,to extract the safe watermark information,the probability characteristics of the English text are involved and stored to confirm the validity of the attacked text-document.The approach provides security against popular text attacks with a watermark distortion rate if,for all known attacks,it is greater than one.For the defense of English text by copyright,based on the present rate of ASCII non-vowel letters and terms,the conventional watermark approach [30]has been suggested.

    3 The Proposed Approach

    An intelligent approach is suggested in this paper by integrating a soft computing approach with zero-watermark that do not need additional details to be embedded as the key of a watermark and do not need to make any changes to the original text inserted into a watermark.The first level order of the alphanumeric mechanism of the Markov model was to be used as a soft computer approach to evaluate the Arabic text content and to build on the interrelationship characteristics of such text content.

    The main contributions of our approach HFDATAI can be summarized as follows:

    ■Unlike previous work where watermarking is done with language,contents,and scale effecting,the HFDATAI approach logically embeds watermarking with no effect on text,content,or size.

    ■The watermarking mechanism does not require any external knowledge in our HFDATAI approach since this watermark key is generated by text processing and the extraction of a relationship between both the content and a watermark.

    ■The HFDATAI approach is highly vulnerable to any basic alteration to the Arabic text and context defined as complex text,namely Arabic symbols that can modify the meanings of the Arabic word.Somehow,the above three contributions are present only in pictures,though not in the text.That is the key argument on this paper’s contribution.In addition,our approach HFDATAI can effectively determine the place of tempering occurrence.This feature can be considered an advantage over the Hash function method.

    The following sections describe in detail two major processes in HFDATAI.However,the first was the generation and incorporation of watermarks and the second was the detection and extraction process of watermarks.

    3.1 Watermark Generation and Embedding Phase

    Core sub-processes consist of pre-processing,watermark embedding,and watermark generation algorithms as well as text analysis as illustrated in Fig.1.

    Figure 1:HFDATAI zero-watermark processes

    3.1.1 Algorithm of Pre-Processing

    Pre-processing the Arabic-text originality has been one of the main steps in creating and removing extra space and new lines and can have a significant effect on the precision of manipulation and watermark robustness.The original Arabic text (OAT) is necessary for the input process.

    3.1.2 Algorithm of Watermark Generation

    This algorithm involves the construction of the Markov matrix,the generation of watermarks,and the interpretation of text.

    ■Developing Markov matrixis a core step in developing the HFDATAI approach.A Markov chain matrix must be constructed in this process to setup the Markov model environment and represent all available states and transitions.In this approach,each unique single alphanumeric within a provided Arabic-text represents a current state,and each unique single alphanumeric corresponds to a conversion in the matrix of Markov chain.When constructing the Markov chain matrix,zero values will be initialized for all states and transitions positions.Those positions will be uses later holding a record of the number of occurrences that the ith alphanumeric is then backed up through the jth alphanumeric and provided by Arabic-text.

    The Markov matrix algorithm construction is performed as shown in Algorithm 1 below.

    Algorithm 1:Algorithm of building Markov matrix using HFDATAI?

    where OAT:is the original Arabic text,PAT:is the preprocessed Arabic text,a1 mm:represent states and transformations matrix,ps:refers to the current state,ns:refers to the next state.

    Watermark generation-based text analysis process:The proposed algorithm is performed as the second step of this process to perform Arabic text analysis and extract the features of the given text and produce watermark information.In this algorithm,there is a number of appearances of potential conversions for every present state of single alphanumeric will be computed as transition probabilities by Eq.(1).

    where n:is the total number of states.

    This example of the Arabic version demonstrates how this methodology was used to introduce the phase of transformation from the current state to the next state.

    When you use the first stage order of the secret Markov-model alphanumeric approach,each special alphanumeric is a present state.Text processing is done as the text is read and the relationship meaning exchanged between the current and the next countries is calculated.The accessible transitions from the above sample of the Arabic text are shown in Fig.2 below.

    Figure 2:Arabic-text samples representation based HFDATAI

    Fig.3 illustrates the analysis results of the given Arabic sample and represents each state and its transitions based on the first scale order and alphanumeric approach of the Markov model.As shown in Fig.3,we represent 22 unique present states of 78 possible transitions.

    Figure 3:Arabic text sample transitions representation based HFDATAI

    Figure 4:Text analysis and watermark generation of the provided Arabic-text using HFDATAI

    The algorithm of watermark generation and text analysis processes is formally introduced and performed as illustrated in Algorithm 2.

    Algorithm 2:Watermark generation algorithm of HFDATAI

    3.1.3 Algorithm of Watermark Embedding

    Watermark embedding has taken place logically in this method without needing to change the original text.The feature extraction of the given Arabic-text,watermark key is embedded logically by identifying all non-zero values in the Markov chain matrix.All these non-zero values are sequentially concatenated to form the original pattern of watermark key a1_WMPO,as defined in Eq.(2) and Fig.5.

    Figure 5:The generated original pattern of watermark key a1_WMPO using HFDATAI

    The algorithm of the watermark embedding process using the HFDATAI approach is introduced formally and implemented as shown in Algorithm 3.

    Algorithm 3:Algorithm of watermark embedding using HFDATAI

    3.2 Algorithms of Watermark Extracting and Detecting

    This process consists of two key algorithms that are extracting and detecting the watermark.However,a1_EWMAis extracted from the obtained (PAAT) and matched by the detection algorithm with a1 WMPO.PAAT is required as input to run this algorithm.Hence,it is necessary to perform the algorithm of watermark generation for obtaining the pattern of watermark for PAAT as presented in Fig.6.

    Figure 6:Zero-watermark HFDATAI processes of extraction and detection

    3.2.1 Algorithm of Watermark Extraction

    PAT should be provided as input to run this algorithm.Though,a1_WMPA is a core output of this algorithm as presented in Algorithm 4.

    Algorithm 4:Algorithm of watermark extraction based HFDATAI

    where,PAAT:pre-processed Arabic-text attacked,a1_EWMA:attacked pattern of watermark key.

    3.2.2 Algorithm of Watermark Detecting

    a1_EWMAand a1_WMPOshould be provided as the inputs needed for this algorithm to run.However,the status of the given Arabic-text is a core output of this algorithm which can be actual or tampered with.The watermark detection process is performed by two sub-steps which are:

    ■The main matchingfor a1_WMPOand a1_EWMAis achieved.If these two watermark patterns are similar in appearance,then there’ll be a notification,“The Arabic text contents are authentic,and no tampering occurred.” Likewise,the note will be rendered “This Arabic text document is tampered and not authentic,” and then it continues to the next step.

    ■The secondary matchingis performed by matching each state’s transition status in the entire produced pattern of watermarks.This means a1_EWMAof each state is contrasted with an analogous transition of a1_WMPOas given by Eq.(3) and (4) below

    where,

    —a1_PMRT:represents tampering detection accuracy rate value in transition level,(0<a1_PMRT<=1)

    where,

    —a1_PMRS:value of tampering detection accuracy rate in state level,(0<a1_PMRS<=100).

    The weight of every state in the Markov matrix must be determined following the equivalent rate of every state,as seen in Eq.(5).

    where,

    —a1_PMRS:is the total matching value in the ith state level.

    The ultimate a1_PMR of PAAT and PAT are computed by Eq.(6).

    The distortion rate of the Watermark is the sum of manipulative attacks on the contents of the Arabic context that have been defined by a1 WDR and calculated by Eq.(7).

    The algorithm of watermark detection is formally introduced and applied as seen in Algorithm 5.

    Algorithm 5:Algorithm of watermark detection based HFDATAI

    where a1_SW:refers to the weight value for properly matched states.a1_WDR:refers to the importance of the distortion rate of the watermark (0<a1_WDRS<=100).

    The effects of the method of watermark extraction and detection is illustrated in Fig.7.

    Figure 7:Results of extraction of watermarks and detection using HFDATAI

    As shown in Fig.7,TP1 represents 1st transition of non-zero in the given text,TP2 represents 2nd transition,and so on.Some states have only one transition,which is shown in TP1.However,some states have more than one transitions,which are represented in TP1,TP2,...etc.such asandstates.

    4 Implementation and Simulation

    A variety of implementation and simulation are conducted to test the accuracy of HFDATAI output and tampering detection.This section outlines the settings for implementation and experimentation,conditions for experiments,typical dataset experimental scenarios,and a discussion of outcomes.

    4.1 Simulation and Implementation Environment

    The self-developed software was developed to evaluate and assess the efficiency of HFDATAII.The HFDATAI implementing environment is:CPU:Intel Core i7-4650U/2.3 GHz,RAM:8.0 GB,Windows 10-64 bit,PHP VS Code IDE programming language.

    4.2 HFDATAI Simulation and Experiment Findings

    To evaluate the accuracy of tampering detection of HFDATAI,scenarios of many studies are performed as shown in Tab.1,for all forms of attacks and their volumes.

    Table 1:Assessment detection accuracy of HFDATAI under all volumes

    As the results shown in Tab.1 and Fig.8,it seems that the HFDATAI approach gives sensitive results of detection of tampering in all attacks that the structure,semantics,and syntax of the content of Arabic text may have been carried out.As a comparison of tampering based on attack types,the results show that the most sensitive tampering detection in all attack volume scenarios is the insertion attack.

    Figure 8:Detecting effect under all volumes of various attacks

    5 Comparison and Result Discussion

    The accuracy of tampering detection is carefully analysed and compared between HFDATAI and baseline algorithms ZWAFWMM [5]and RACAAT [30].

    5.1 Results of Attack Type Impact

    Tab.2 shows a comparison of the different attack type’s effects on tampering detection accuracy of HFDATAI,ZWAFWMMM,and RACAAT approaches against all dataset scales and all attack volume scenarios.

    Table 2:Detection impact comparison based on attack type

    Tab.2 and Fig.9 demonstrate how RACAAT and ZWAFWMMM tampering detection precision for HFDATAI is determined by the form of attack.In the event of an insertion attack,a low impact between the detection accuracy of the HFDATAI approach and the ZWAFWMMM baseline approaches as well as the RACAAT approach was observed.However,with baseline approaches,the high impact has been observed when attacks are removed and reordered,and findings show that HFDATAI exceeds ZWAFWMMM and HAZWCTW with better detection precision for manipulations.This indicates that the HFDATAI suggested approach to content authentication and manipulation of Arabic text in all forms of attacks in which reorder attacks simultaneously reflect deletion and insertion attacks are highly supported and very sensitive.

    Figure 9:Attack type-based comparison of tampering detection effect

    5.2 Results of Attack Rates Impact

    Tab.3 provides a comparison of the multiple attack volume effects on the performance of tampering detection for both dataset size and volume scenarios.The comparison is performed using HFDATAI with RACAAT and ZWAFWMMM approaches.

    Table 3:Detection accuracy comparison based on attack rates

    Figure 10:Attack rate-based comparison of tampering detection accuracy

    Tab.3 and Fig.10 demonstrate how the precision of deception is affected by low,medium,and high attack amounts.Fig.10 shows in general that as the volume of the attack increases,the accuracy of tampering detection also increases.HFDATAI conducts RACAAT and ZWAFWMM concerning their efficiency and identification precision in low,mid,and high amounts of attacks,always with low,medium and high amounts of attacks.This makes HFDATAI highly recommended for the authentication of content and the exploitation of any transmitted Arabic-text through the Internet.

    5.3 Results of Dataset Impact

    This section tests the various dataset size impact on watermark reliability against all forms of attacks within their multiple volumes.Tab.4 shows a comparison of that effect using HFDATAI with RACAAT and ZWAFWMMM approaches.

    Table 4:Detection accuracy comparison based on the Arabic text size

    The comparative results as shown in Tab.4 and Fig.11 reflect the tampering detection accuracy of the HFDATAI approach suggested.The findings illustrate that in the proposed HFDATAI approach,the highest impact of the dataset scale leads to the best accuracy of tampering detection that is ordered as ASST,AMST,AHMST,and ALST,respectively.This means that the accuracy of tampering detection increases with the decreased Arabic text size and decreases with the increased Arabic text size.On the other hand,results show that the HFDATAI approach outperforms both RACAAT and ZWAFWMMM approaches in terms of tampering detection accuracy for all sizes of the Arabic dataset.

    Figure 11:Arabic text size-based comparison of tampering detection impact

    6 Conclusion

    Cantered on the hidden Markov model mechanism of low-level order and alphanumeric,a high-sensitive approach for detecting the tampering attacks on Arabic text transmitted via the Internet (HFDATAI) has been proposed in this paper by integrating soft computing and digital watermarking techniques.Soft computing and NLP used in HFDATAI to perform a text analysis process to find interrelationships between the content of the Arabic-text provided and the main watermark created.Without modification or impact on the scale of the original text,the created watermark should logically be embedded in the original Arabic background.The embedded watermark can be used later to identify any manipulation that happens on the Arabic text after the text is distributed through the Internet.HFDATAI method in PHP programming language was developed and applied using VS code IDE.Experiments are done on various regular Arabic datasets in different amounts of attacks.The baseline approaches RACAAT and ZWAFWMM were compared to HFDATAI.The findings reveal that CZWNLPA beats RACAAT and ZWAFWMM in terms of identification precision of tampering and fragility of watermarks.Furthermore,the findings illustrate that HFDATAI refers to all Arabic literature,numbers,spaces,and special characters,for future research,the enhancement of identification precision and watermark fragility for all kinds of attacks should be considered.

    Funding Statement:The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number (G.R.P./14/42),Received by Fahd N.Al-Wesabi.www.kku.edu.sa.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    日本熟妇午夜| 免费大片18禁| 亚洲成人久久爱视频| 精品日产1卡2卡| 国产在线男女| 亚洲精品日韩在线中文字幕 | 国产精品久久视频播放| 亚洲精品456在线播放app| 看黄色毛片网站| 亚洲成人av在线免费| 18禁黄网站禁片免费观看直播| 亚洲精品国产成人久久av| 国内精品宾馆在线| 淫妇啪啪啪对白视频| 波野结衣二区三区在线| www日本黄色视频网| 亚洲无线在线观看| 亚洲熟妇熟女久久| 高清毛片免费观看视频网站| 久久人妻av系列| 人人妻人人澡人人爽人人夜夜 | 国产中年淑女户外野战色| 国产色婷婷99| ponron亚洲| 国产一区亚洲一区在线观看| 俺也久久电影网| 国产av一区在线观看免费| 日韩,欧美,国产一区二区三区 | 久久热精品热| 久久久久久大精品| 在线看三级毛片| 国产伦精品一区二区三区四那| 中文亚洲av片在线观看爽| 亚洲性夜色夜夜综合| 97在线视频观看| 丰满人妻一区二区三区视频av| 国产欧美日韩精品一区二区| 日本一本二区三区精品| 午夜日韩欧美国产| 国产精品乱码一区二三区的特点| 亚洲精华国产精华液的使用体验 | 日本免费a在线| 99久久中文字幕三级久久日本| or卡值多少钱| 色综合站精品国产| 久久久久国内视频| 国产91av在线免费观看| 国产久久久一区二区三区| 亚洲欧美精品综合久久99| 美女被艹到高潮喷水动态| 亚洲欧美日韩东京热| 欧美日韩国产亚洲二区| 三级国产精品欧美在线观看| 国产精品福利在线免费观看| 少妇的逼好多水| 色综合站精品国产| 性插视频无遮挡在线免费观看| 久久久久性生活片| 久久99热6这里只有精品| 中文在线观看免费www的网站| 国产亚洲精品综合一区在线观看| 国产白丝娇喘喷水9色精品| 亚洲第一区二区三区不卡| 精品熟女少妇av免费看| 国产三级在线视频| 亚洲自拍偷在线| 美女免费视频网站| 国产av在哪里看| 12—13女人毛片做爰片一| 精品乱码久久久久久99久播| 最近在线观看免费完整版| 午夜精品一区二区三区免费看| 在线天堂最新版资源| 日韩三级伦理在线观看| 国产精品美女特级片免费视频播放器| 成人精品一区二区免费| 日日啪夜夜撸| а√天堂www在线а√下载| 国产精品久久久久久久久免| 国产精品乱码一区二三区的特点| 久久久久久久久大av| 在线观看午夜福利视频| 免费观看精品视频网站| 日韩欧美 国产精品| 国产av不卡久久| 国产亚洲av嫩草精品影院| 亚洲人成网站高清观看| 嫩草影视91久久| 我要看日韩黄色一级片| 一卡2卡三卡四卡精品乱码亚洲| 黄色一级大片看看| 国产一区亚洲一区在线观看| 国产视频内射| 精品福利观看| 亚洲av.av天堂| 在现免费观看毛片| 国产精品电影一区二区三区| 黄片wwwwww| 国产男人的电影天堂91| 夜夜夜夜夜久久久久| 成人永久免费在线观看视频| 日韩制服骚丝袜av| 久久久国产成人免费| 看片在线看免费视频| 又粗又爽又猛毛片免费看| 国产一区二区激情短视频| 三级毛片av免费| 国产亚洲精品av在线| av中文乱码字幕在线| 亚洲av第一区精品v没综合| 九九爱精品视频在线观看| 变态另类成人亚洲欧美熟女| 亚洲18禁久久av| 麻豆成人午夜福利视频| 久久久欧美国产精品| 日产精品乱码卡一卡2卡三| 午夜亚洲福利在线播放| 亚洲不卡免费看| 在线观看免费视频日本深夜| 国产一区二区亚洲精品在线观看| 极品教师在线视频| 亚洲国产高清在线一区二区三| 亚洲精品久久国产高清桃花| 久久精品国产亚洲av天美| 三级男女做爰猛烈吃奶摸视频| 亚洲av.av天堂| 麻豆成人午夜福利视频| 又黄又爽又免费观看的视频| 国产亚洲91精品色在线| 女的被弄到高潮叫床怎么办| 亚洲欧美精品自产自拍| 日韩欧美免费精品| 亚洲久久久久久中文字幕| 亚洲成人av在线免费| 久久精品影院6| 最近的中文字幕免费完整| 中文资源天堂在线| 国产一区二区在线观看日韩| 亚洲av免费高清在线观看| 18+在线观看网站| 日韩欧美精品v在线| 亚洲av熟女| 久久久久精品国产欧美久久久| 人妻夜夜爽99麻豆av| 舔av片在线| 极品教师在线视频| 伦理电影大哥的女人| 网址你懂的国产日韩在线| 国产一区二区亚洲精品在线观看| 国产一区二区在线观看日韩| 一个人免费在线观看电影| 晚上一个人看的免费电影| .国产精品久久| 亚州av有码| 久99久视频精品免费| 日韩成人伦理影院| 亚洲欧美成人综合另类久久久 | 99热网站在线观看| 麻豆av噜噜一区二区三区| 欧美不卡视频在线免费观看| 99热只有精品国产| 国产日本99.免费观看| 国产午夜精品论理片| 一a级毛片在线观看| 久久天躁狠狠躁夜夜2o2o| 大又大粗又爽又黄少妇毛片口| 波多野结衣高清无吗| а√天堂www在线а√下载| 午夜久久久久精精品| 国产高清视频在线播放一区| 日韩成人av中文字幕在线观看 | 亚洲自偷自拍三级| 蜜桃亚洲精品一区二区三区| 国产免费一级a男人的天堂| 黄色视频,在线免费观看| 国产91av在线免费观看| 中文亚洲av片在线观看爽| 九色成人免费人妻av| 乱系列少妇在线播放| 国产亚洲精品av在线| 久久精品国产亚洲av香蕉五月| 午夜爱爱视频在线播放| 天天一区二区日本电影三级| 久久精品影院6| 夜夜夜夜夜久久久久| 人人妻人人澡人人爽人人夜夜 | 国产色爽女视频免费观看| 午夜福利在线在线| 亚洲高清免费不卡视频| 91在线观看av| 国产av不卡久久| 特大巨黑吊av在线直播| 亚洲精品日韩在线中文字幕 | 乱码一卡2卡4卡精品| 亚洲精品在线观看二区| 国模一区二区三区四区视频| 国产伦在线观看视频一区| 久久99热这里只有精品18| 久久国内精品自在自线图片| 久久久久免费精品人妻一区二区| 97超视频在线观看视频| 亚洲人成网站在线播| 国产极品精品免费视频能看的| 色综合站精品国产| 亚洲图色成人| 午夜福利在线在线| 精品一区二区三区视频在线| av天堂中文字幕网| 欧美日韩乱码在线| 久久久久久久久中文| 久久99热这里只有精品18| 日本欧美国产在线视频| 白带黄色成豆腐渣| 欧美性猛交黑人性爽| 精品久久久久久成人av| 日本五十路高清| 最后的刺客免费高清国语| 人人妻人人看人人澡| 精品国产三级普通话版| 三级毛片av免费| 日本成人三级电影网站| 校园人妻丝袜中文字幕| 免费av观看视频| 91麻豆精品激情在线观看国产| aaaaa片日本免费| 欧美区成人在线视频| 一级毛片久久久久久久久女| 99热精品在线国产| 一进一出好大好爽视频| 99久国产av精品| 色哟哟哟哟哟哟| 女人十人毛片免费观看3o分钟| 青春草视频在线免费观看| www日本黄色视频网| 国产真实乱freesex| 精品福利观看| 69人妻影院| 联通29元200g的流量卡| 日韩欧美三级三区| 成熟少妇高潮喷水视频| 亚洲成人久久性| 欧美在线一区亚洲| 国产午夜精品论理片| 日本精品一区二区三区蜜桃| 色av中文字幕| 亚洲精品在线观看二区| 国产成人aa在线观看| 国产精品1区2区在线观看.| 91久久精品国产一区二区三区| av黄色大香蕉| 色在线成人网| 最近的中文字幕免费完整| 国产视频一区二区在线看| 99九九线精品视频在线观看视频| 国产探花在线观看一区二区| 九九久久精品国产亚洲av麻豆| 午夜激情福利司机影院| 国产精品一区二区性色av| 免费搜索国产男女视频| 伊人久久精品亚洲午夜| 国产精品女同一区二区软件| 日韩大尺度精品在线看网址| 国产精品,欧美在线| 麻豆乱淫一区二区| 国产高清视频在线播放一区| 在现免费观看毛片| 亚洲经典国产精华液单| 国产精品精品国产色婷婷| 人妻丰满熟妇av一区二区三区| 最新中文字幕久久久久| 成年女人毛片免费观看观看9| 两个人的视频大全免费| 午夜精品在线福利| 亚洲国产高清在线一区二区三| 国产高清有码在线观看视频| 熟妇人妻久久中文字幕3abv| or卡值多少钱| 久久久久久久久中文| 亚洲自偷自拍三级| 丝袜喷水一区| 色吧在线观看| 国产精品永久免费网站| 少妇丰满av| 在线看三级毛片| 12—13女人毛片做爰片一| 97热精品久久久久久| 免费看光身美女| a级毛片a级免费在线| 丝袜喷水一区| 日韩欧美三级三区| 中文在线观看免费www的网站| eeuss影院久久| 夜夜夜夜夜久久久久| 男女之事视频高清在线观看| 人人妻人人看人人澡| 国产男人的电影天堂91| 欧美一级a爱片免费观看看| 精品一区二区免费观看| 精品日产1卡2卡| 国产男靠女视频免费网站| 国产精品嫩草影院av在线观看| 看十八女毛片水多多多| 岛国在线免费视频观看| av黄色大香蕉| 精品一区二区三区人妻视频| 神马国产精品三级电影在线观看| 欧美性猛交黑人性爽| 麻豆乱淫一区二区| 亚洲国产日韩欧美精品在线观看| 97人妻精品一区二区三区麻豆| 性插视频无遮挡在线免费观看| 中文在线观看免费www的网站| 成人av一区二区三区在线看| 一级毛片久久久久久久久女| 精品久久久久久成人av| 欧美区成人在线视频| 色综合站精品国产| 老司机福利观看| 高清午夜精品一区二区三区 | 少妇裸体淫交视频免费看高清| 国产大屁股一区二区在线视频| 大型黄色视频在线免费观看| av卡一久久| 99热精品在线国产| 免费不卡的大黄色大毛片视频在线观看 | 国产探花极品一区二区| 亚洲性夜色夜夜综合| 麻豆一二三区av精品| 哪里可以看免费的av片| av专区在线播放| 亚洲18禁久久av| av在线老鸭窝| 美女黄网站色视频| 久久久精品大字幕| 少妇的逼好多水| 亚洲在线观看片| 高清日韩中文字幕在线| 国产aⅴ精品一区二区三区波| 最新中文字幕久久久久| 欧美国产日韩亚洲一区| 男人舔女人下体高潮全视频| 精品午夜福利视频在线观看一区| 少妇人妻一区二区三区视频| 日本黄色片子视频| 久久人人精品亚洲av| 久久精品国产亚洲网站| 97碰自拍视频| 最近的中文字幕免费完整| 欧美一区二区精品小视频在线| 麻豆国产av国片精品| 亚洲电影在线观看av| 男人的好看免费观看在线视频| 黄色日韩在线| 插阴视频在线观看视频| 亚洲一区二区三区色噜噜| 国产成人影院久久av| 国产精品1区2区在线观看.| 少妇猛男粗大的猛烈进出视频 | 九九久久精品国产亚洲av麻豆| 精品久久久久久成人av| 色综合亚洲欧美另类图片| 亚洲图色成人| 日韩欧美三级三区| 青春草视频在线免费观看| 天堂√8在线中文| 淫妇啪啪啪对白视频| 国产高清视频在线观看网站| 国产av麻豆久久久久久久| 国产精品三级大全| 亚洲欧美成人精品一区二区| 午夜亚洲福利在线播放| 亚洲av五月六月丁香网| 一级毛片我不卡| 中文亚洲av片在线观看爽| 最近手机中文字幕大全| 国产女主播在线喷水免费视频网站 | 青春草视频在线免费观看| 精品午夜福利在线看| 国产色婷婷99| 精品久久国产蜜桃| 欧美日本视频| av视频在线观看入口| 国产免费男女视频| 一区二区三区四区激情视频 | 成人国产麻豆网| 成熟少妇高潮喷水视频| 国产不卡一卡二| 亚洲不卡免费看| 99久久精品热视频| av在线老鸭窝| 国国产精品蜜臀av免费| 国产伦一二天堂av在线观看| 日韩av在线大香蕉| 三级男女做爰猛烈吃奶摸视频| 一级毛片我不卡| 全区人妻精品视频| 亚洲欧美日韩高清专用| 一进一出抽搐gif免费好疼| 最近2019中文字幕mv第一页| 身体一侧抽搐| 麻豆成人午夜福利视频| 99国产极品粉嫩在线观看| 国产日本99.免费观看| 国产午夜精品久久久久久一区二区三区 | 中国美白少妇内射xxxbb| 俄罗斯特黄特色一大片| 不卡视频在线观看欧美| 欧美xxxx黑人xx丫x性爽| 欧美日韩综合久久久久久| 国产精华一区二区三区| 大型黄色视频在线免费观看| 久久久国产成人精品二区| 成人三级黄色视频| 内地一区二区视频在线| 国产精品人妻久久久影院| 可以在线观看毛片的网站| 久久精品综合一区二区三区| 国产精品亚洲美女久久久| 女人十人毛片免费观看3o分钟| 亚洲av二区三区四区| 最近手机中文字幕大全| 大型黄色视频在线免费观看| 久久久国产成人精品二区| 最新中文字幕久久久久| 国产精品一区二区免费欧美| 有码 亚洲区| 亚洲欧美成人精品一区二区| 亚洲aⅴ乱码一区二区在线播放| 国产黄片美女视频| 毛片女人毛片| 日本免费一区二区三区高清不卡| 亚洲成a人片在线一区二区| 久久国产乱子免费精品| 在线播放国产精品三级| 亚洲熟妇中文字幕五十中出| 国产亚洲精品综合一区在线观看| 女人十人毛片免费观看3o分钟| 日本成人三级电影网站| 午夜爱爱视频在线播放| 少妇人妻一区二区三区视频| av黄色大香蕉| 国产一区二区亚洲精品在线观看| 两性午夜刺激爽爽歪歪视频在线观看| 一边摸一边抽搐一进一小说| 22中文网久久字幕| 蜜桃亚洲精品一区二区三区| 一级毛片aaaaaa免费看小| 国产精品一区二区三区四区久久| 在线播放无遮挡| 校园人妻丝袜中文字幕| 亚洲人成网站在线播放欧美日韩| 亚洲人与动物交配视频| 日韩中字成人| 中文字幕人妻熟人妻熟丝袜美| 精品午夜福利在线看| 18+在线观看网站| 两个人视频免费观看高清| 精品不卡国产一区二区三区| 日韩 亚洲 欧美在线| 精品人妻视频免费看| 亚洲av电影不卡..在线观看| 丰满人妻一区二区三区视频av| 99久久精品一区二区三区| 18禁在线播放成人免费| 精品福利观看| 亚洲欧美中文字幕日韩二区| 亚洲精品日韩av片在线观看| 久久久久精品国产欧美久久久| 亚洲熟妇熟女久久| 精品一区二区三区av网在线观看| 乱人视频在线观看| 亚洲精品一卡2卡三卡4卡5卡| 日韩亚洲欧美综合| 亚洲精品一区av在线观看| 特大巨黑吊av在线直播| 国产一区亚洲一区在线观看| av在线亚洲专区| 亚洲七黄色美女视频| 熟女电影av网| 久久精品国产亚洲网站| 99久久精品热视频| 国产伦精品一区二区三区四那| 校园人妻丝袜中文字幕| 不卡视频在线观看欧美| 18禁在线播放成人免费| 国产在线男女| 五月玫瑰六月丁香| av黄色大香蕉| 搡老岳熟女国产| 国产亚洲欧美98| 国产三级中文精品| 国产精品嫩草影院av在线观看| 中文亚洲av片在线观看爽| av卡一久久| 白带黄色成豆腐渣| 夜夜爽天天搞| 人妻制服诱惑在线中文字幕| 综合色丁香网| 欧美日本视频| 黄色视频,在线免费观看| 亚洲欧美成人精品一区二区| 久久精品综合一区二区三区| 99热这里只有精品一区| 亚洲精品日韩在线中文字幕 | 亚洲av熟女| 日韩国内少妇激情av| 国产精品女同一区二区软件| 国产伦一二天堂av在线观看| 日韩成人av中文字幕在线观看 | 男女之事视频高清在线观看| 久久鲁丝午夜福利片| 午夜免费激情av| 日本五十路高清| 在线播放国产精品三级| 狂野欧美激情性xxxx在线观看| 亚洲av二区三区四区| 国产成人aa在线观看| 午夜a级毛片| 国产欧美日韩精品一区二区| 亚洲国产精品成人综合色| 两个人的视频大全免费| 人妻久久中文字幕网| 久久人人爽人人爽人人片va| 久久鲁丝午夜福利片| 好男人在线观看高清免费视频| 午夜影院日韩av| 丝袜喷水一区| 一个人免费在线观看电影| 欧美三级亚洲精品| 男人狂女人下面高潮的视频| 波多野结衣高清作品| 国产成人freesex在线 | 亚洲成人中文字幕在线播放| 啦啦啦观看免费观看视频高清| 69人妻影院| 我的老师免费观看完整版| 女人被狂操c到高潮| 亚洲精品色激情综合| 欧美绝顶高潮抽搐喷水| 最近在线观看免费完整版| eeuss影院久久| 可以在线观看毛片的网站| 91久久精品国产一区二区成人| 我的老师免费观看完整版| 特大巨黑吊av在线直播| 色哟哟·www| 亚洲av二区三区四区| 国产中年淑女户外野战色| 亚洲综合色惰| 国产伦一二天堂av在线观看| 日本欧美国产在线视频| 看非洲黑人一级黄片| av专区在线播放| av卡一久久| 亚洲精品在线观看二区| 真实男女啪啪啪动态图| 日本a在线网址| 91久久精品电影网| 成人亚洲精品av一区二区| 久久久久久国产a免费观看| 国产精品1区2区在线观看.| 久久精品国产亚洲网站| 免费不卡的大黄色大毛片视频在线观看 | 国产av不卡久久| 伦理电影大哥的女人| 少妇人妻精品综合一区二区 | 国产一区二区三区在线臀色熟女| 国产亚洲精品久久久久久毛片| 女人被狂操c到高潮| 国产av不卡久久| 一个人看的www免费观看视频| 秋霞在线观看毛片| 97超视频在线观看视频| 亚洲国产精品合色在线| 成人av在线播放网站| avwww免费| 亚洲精华国产精华液的使用体验 | 国产色婷婷99| 免费搜索国产男女视频| 蜜臀久久99精品久久宅男| 久久人妻av系列| 国产高清有码在线观看视频| 91午夜精品亚洲一区二区三区| 国产在视频线在精品| 男女之事视频高清在线观看| 国内少妇人妻偷人精品xxx网站| 亚洲第一电影网av| 少妇裸体淫交视频免费看高清| 两个人的视频大全免费| 直男gayav资源| 偷拍熟女少妇极品色| 亚洲成人久久性| 亚洲国产精品国产精品| 欧美日韩乱码在线| 国产爱豆传媒在线观看| 国产乱人偷精品视频| 一个人免费在线观看电影| 22中文网久久字幕| 乱码一卡2卡4卡精品| 日日干狠狠操夜夜爽| 午夜福利高清视频| 久久精品国产鲁丝片午夜精品| 欧美日韩乱码在线| 精品人妻偷拍中文字幕| 国产av一区在线观看免费| 国产黄色小视频在线观看| 一区二区三区高清视频在线| 日本三级黄在线观看| 欧美性猛交╳xxx乱大交人| 国产极品精品免费视频能看的| 国产精品久久电影中文字幕| 深爱激情五月婷婷| 色哟哟哟哟哟哟| 99久久成人亚洲精品观看| 日本a在线网址|