• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Research on Face Anti-Spoofing Algorithm Based on Image Fusion

    2021-12-14 06:06:24PingpingYuJiayuWangNingCaoandHeinerDintera
    Computers Materials&Continua 2021年9期

    Pingping Yu,Jiayu Wang,Ning Cao and Heiner Dintera

    1School of Information Science and Engineering,Hebei University of Science and Technology,Shijiazhuang,050000,China

    2School of Internet of Things and Software Technology,Wuxi Vocational College of Science and Technology,Wuxi,214028,China

    3German-Russian Institute of Advanced Technologies,Karan,420126,Russia

    Abstract:Along with the rapid development of biometric authentication technology,face recognition has been commercially used in many industries in recent years.However,it cannot be ignored that face recognition-based authentication techniques can be easily spoofed using various types of attacks such photographs,videos or forged 3D masks.In order to solve this problem,this work proposed a face anti-fraud algorithm based on the fusion of thermal infrared images and visible light images.The normal temperature distribution of the human face is stable and characteristic,and the important physiological information of the human body can be observed by the infrared thermal images.Therefore,based on the thermal infrared image,the pixel value of the pulse sensitive area of the human face is collected,and the human heart rate signal is detected to distinguish between real faces and spoofing faces.In order to better obtain the texture features of the face,an image fusion algorithmbased on DTCWT and the improved Roberts algorithmis proposed.Firstly,DTCWT is used to decompose the thermal infrared image and visible light image of the face to obtain high-and low-frequency subbands.Then,the method based on region energy and the improved Roberts algorithm are then used to fuse the coefficients of the high-and low-frequency subbands.Finally,the DTCWT inverse transform is used to obtain the fused image containing the facial texture features.Face recognition is carried out on the fused image to realize identity authentication.Experimental results show that this algorithm can effectively resist attacks from photos,videos or masks.Compared with the use of visible light images alone for face recognition,this algorithm has higher recognition accuracy and better robustness.

    Keywords:Anti-spoofing;infrared thermal images;image fusion;heart rate detection

    1 Introduction

    With the development of biometrics,face recognition plays a pivotal role in applications such as identity recognition systems,criminal justice database systems,and public surveillance systems.The subsequent face spoofing attacks have also increased sharply.Attackers often use photos,videos,3D modeling,masks,and other methods to imitate real human faces and obtain system access authorization for illegal intrusion and face recognition.This poses a serious threat to the security of the face recognition system.It is a necessary research topic to accurately judge the authenticity of human faces and identify human facial information to resist these complex and diverse deception attacks [1].

    Face anti-spoofing detection systems are mainly divided into three categories:systems based on specific equipment,systems based on human-computer interaction,and systems based on pure algorithms.

    There are relatively many methods based on human-computer interaction to prevent spoofing attacks.For example,Alsufyani et al.[2]used the random movement of infrared light to track the relative movement trajectory of the human eye.Singh et al.[3]and Pan et al.[4]proposed to detect the user’s blinking and lip movements to resist people face spoofing attack;Tirunagari et al.[5]used dynamic correlation models to preprocess the video to extract texture features.The disadvantage of this type of detection method which seeks user cooperation is that it takes too long to detect the user’s specified action,and it needs the user to request coordinated action.This will affect the user’s experience.

    Relying on pure algorithms for rapid detection and resolution through user videos or images is also a research hotspot.Wen et al.[6]proposed an algorithm combining image deformation analysis features;Pinto et al.[7]proposed a method of visual frequency analysis to detect video Face attacks;M??tt? et al.[8]used LBP features to complete the detection of spoofing attacks;Alhassan et al.[9]combined DMD,LBP,and SVM to perform a liveness test score.Li et al.[10]proposed a face recognition algorithm based on LBP-EHMM;Wild et al.[11]proposed a detection algorithm based on bagging strategy;Pinto et al.[12]proposed a face activity detection method based on visual rhythm analysis.This type of texture feature-based detection method is based on gray-scale image extraction.The extracted features are not comprehensive enough,which affects the final detection result and has limited accuracy.Lee et al.[13]identify real faces from photos by analyzing data.Zhang et al.[14]used an adaptive ellipse fitting method to roughly determine the face area.Then,the study performed AdaBoost-based classification according to face template matching and face skin color distribution statistics,and finally detected facial occlusion.Xia et al.[15]proposed face occlusion detection based on a convolutional neural network.The network model was trained through a large number of occlusion samples.The image to be detected was input to the network,and the result of detecting whether the left and right eyes,nose and mouth were occluded was directly outputted.Kim et al.[16]proposed a face activity detection method for face spoofing attacks on mobile phones.According to the difference in the diffusion speed of reflected light from fake photos and live images,a real-time live detection based on the diffusion speed of reflected light from a single image was proposed.They used the following method:i) introduce the total variation flow to obtain the diffusion speed;ii) use the different diffusion speeds of the reflected light from the active skin and the fake face to distinguish whether there is activity;iii) use the LSP code to extract the speed feature vector on the reflected light diffusion speed distribution map,and iv) use the SVM classifier to determine whether the image comes from a living human face.

    Bao et al.[17]proposed a face anti-spoofing detection algorithm that used fusion color texture features using the difference in color features and detailed texture features between real faces and spoofing attack images.The algorithm mainly used infrared at night and lacked spectrum collection color information.Li et al.[18]proposed a face anti-spoofing method based on P-CNN and ELM to detect 2D spoofing attacks.Combining traditional digital images,Zhang et al.[19]proposed a forensic algorithm for face photos and video spoofing attacks based on the recursive elimination of color texture Markov features and support vector machine features.However,the algorithm could not detect whether the face uses 3D means such as silicone masks.Relying on pure algorithms for anti-spoofing detection of faces,the complexity of the algorithm is relatively high.There are certain restrictions on the detection environment and imaging CMOS cameras,which leads to an increase in the algorithm complexity of the entire face recognition process.

    Seeking user cooperation and relying on pure algorithms are not ideal detection methods.With the popularity of infrared cameras,depth cameras and other equipments and the reduction of costs,anti-spoofing algorithms based on specific equipment have become the mainstream.Sun et al.[20]fused the human eye features of color and infrared to detect whether the driver is tired;Wang et al.[21]proposed a three-dimensional face recognition method with elastic matching of the radial curve of the face,but the user experience was lacking.

    This paper proposes a face anti-fraud algorithm based on the fusion of thermal infrared images and visible light images.By detecting the pulse sensitive area in the infrared thermal image,the grayscale value signal of the image is statistically analyzed,and the heart rate waveform is calculated to distinguish real and fake faces.For faces,we use the method based on dual-tree complex wavelet transform (DTCWT) and improved Roberts operator to fuse the images,and finally identify the identity.The overall flow chart is shown in Fig.1.

    Figure 1:General flow chart of the face anti-spoofing system

    The rest of this article is arranged as follows.The second part introduces real and fake face detection method based on life information analysis.The third part introduces the image fusion based on DTCWT and the improved Roberts algorithm.The fourth part introduces face recognition and gives the results of this method.

    2 Real and Fake Face Detection Method Based on Life Information Analysis

    The difference between a real face and a deceptive face is that a real face has some vital information,such as capillaries and pulse.The surface of the human body can radiate infrared thermal energy,and the energy is mainly concentrated in the infrared band with a wavelength of 9.312~9.464μm [22].The normal temperature distribution of the human face is stable and characteristic,and the important physiological information of the human body can be observed by using the infrared thermal image.Since there are a large number of capillaries in the face,the blood in the blood vessels changes with the beating of the heart.When the heart contracts,the blood increases and the heat radiation energy increases.When the heart relaxes,the blood decreases and the heat radiation energy decreases.Therefore,the pixel value of the infrared thermal image reflected on the infrared thermal imager will fluctuate with the heart’s beating,while the thermal infrared image of the spoofing face does not have this phenomenon.

    2.1 Heart Rate Signal Detection

    Before signal processing,we perform grayscale value processing on the facial thermal image video taken by the infrared thermal imager,and the conversion formula is

    whereGdis the grayscale value after conversion,andR,G andBare the red,green,and blue component values of the pixel before conversion.

    We perform face detection on the input test video and select a region of interest (ROI) to reduce the interference of light changes caused by other factors.Since the forehead part of the gray-scale thermal image of the human face is most sensitive to pulse beats,the forehead part of the grayscale thermal image is selected as ROI for processing in this article.It is mainly divided into two steps:

    1) Set ROI template for grayscale thermal image.

    In the first few frames of the gray-scale image sequence,we select a relatively clear facial image.We set the distance between the center points of the pupils of the two eyes to 4d.A 3d×3d/2 rectangle (r1) in the center of the forehead is selecteddabove the straight line from the pupils,as shown in Fig.2.

    2) After the ROI template is obtained,extract the sensitive areas of each frame of the gray image sequence.

    Due to the large noise interference of individual frames,it is impossible to ensure that ther1region information of each frame image is complete and effective.Therefore,the sensitive area of each frame of the image needs to be selected according to the templater1.In each frame of the gray image sequence,a rectangular blockRnof size 5d×3dcontaining the ROI templater1in the middle is found,as shown in the dotted area in Fig.2.

    Figure 2:ROI template and rectangular area

    The normalized cross-correlation function is used in theRnarea to examine the matching of each 3d×3d/2 candidate blockrnwith the ROI templater1to ensure that each frame image can select the most accurate sensitive area of grayscale value.The normalized cross-correlation function formula is obtained as follows

    Among them,μrefers to the correlation interval on the abscissa axis of the grayscale image,υrefers to the correlation interval on the ordinate axis,f(x,y)represents the candidate blockrn,t(x,y)represents the pixel value of the ROI templater1,andare the mean values of the pixel values of the candidate blockrnand the ROI templater1,respectively.

    The obtained normalized cross-correlation coefficients of each candidate blockrnare selected,and the blockrnwith the largest absolute value and exceeding the specified threshold is used as the sensitive area of the frame.The grayscale value of the sensitive area of each frame of the gray image sequence is averaged to obtaingn.These average values are arranged in chronological order to get the grayscale value waveform,which is the reflection of the heart rate signal.A set of grayscale value waveforms is shown in Fig.3.

    Figure 3:Grayscale value waveform of real faces

    With the acquisition of a set of heart rates,the average value is calculated and stored in the array.Finally,the calculated variance is compared with the threshold to get the result,which is used to judge whether the given test video is a spoofing attack.Then,we enter the face recognition process on the premise that it is a real face.

    2.2 Anti-Spoofing Attack Method

    The experiment uses an infrared thermal imager of model G100EX,the temperature measurement range is-40°C to 1500°C,the temperature resolution is 0.04 at 30°C,the pixel is 320(H)×240 (V),and the response wavelength is 8~14μm.

    In a room with a temperature of 22°C,thermal infrared video collection was performed on the experimenter himself,the paper photos of the experimenter,the electronic video of the experimenter,and the mask-wearing experimenter.Considering that the attacker may simulate the mask to the temperature of the human body to attack,the temperature of the mask is increased to approximately 37 degrees for shooting.The collection methods and the presentation results are shown in Fig.4.

    Figure 4:Collected experimental data.((a) A group of real face images;(b) a group of printed face images;(c) a group of electronic videos;(d) a group of faceswearing masks)

    According to the abovementioned algorithm,the grayscale value waveform acquisition is performed for the three kinds of deception attacks,and the results are shown in Fig.5.

    Figure 5:The grayscale value waveforms of various attacks.(a) Grayscale value waveform of electronic photo attack;(b) grayscale value waveform of electronic video attack;(c) grayscale value waveform of mask attack

    From the waveform of Fig.3,it can be seen that the grayscale value of the real face is between 80 and 120,and the fluctuation range is large.The grayscale value of the photo attack and the video attack is quite different from the grayscale value of the real face.It can be clearly distinguished.The grayscale value obtained after wearing the mask is slightly different from the grayscale value of the real face,which is difficult to distinguish directly,but the waveforms of the three deception attacks are relatively stable compared with the waveforms of the real face.Therefore,we use the standard deviation to further calculate the stability of the waveform to determine whether it is a mask attack.The standard deviation formula is obtained as follows:

    where N is the number of frames of the image,giis the grayscale value of the sensitive area of each frame,andμis the average value of the grayscale value of the sensitive area of the N frames.

    The results are shown in Tab.1.The standard deviation of real faces is generally above 6,and the standard deviation of photos,videos and masked faces is below 4.Therefore,the threshold for distinguishing true and false faces can be set between 4 and Between 6.

    Table 1:The average and standard deviation of grayscale values of real and fake faces

    A face detection database is constructed which contains 30 real faces,30 photo faces,30 electronic video faces and 30 mask faces.The method proposed in this paper is verified by experiments on this database.The results are shown in Tab.2,which shows that the method proposed in this paper can effectively solve the problem of real face detection.

    Table 2:Spoofing attack test results

    3 Image Fusion Based on DTCWT and Improved Roberts Algorithm

    The infrared thermal image contains the temperature information of the human body surface,which can be used to distinguish true and false faces through heart rate detection,but the lack of detailed information such as contour texture makes it impossible to recognize the identity of real faces.Visible light images contain rich detailed information,but they have low anti-interference ability under the influence of light,and important face information is often lost during face recognition.The thermal infrared image is not affected by light,and has good anti-interference ability and camouflage recognition ability.The fusion of the thermal infrared image and the visible light image can not only retain the rich detailed information in the visible light image and the temperature information in the infrared thermal image but also make up for the lack of light interference characteristic information [23].Therefore,this paper uses the dual-tree complex wavelet transform to decompose the visible light image and the infrared thermal image,and obtain the high-frequency and low-frequency subband components of the same size as the source image.The low-frequency subband uses the method based on regional energy to fuse,and the edge enhancement method based on the improved Roberts operator is used for fusion of the highfrequency sub-band.Finally the dual-tree complex wavelet inverse transform is used to obtain the final fused image.The block diagram of the fusion algorithm is shown in the Fig.6.

    Figure 6:Block diagram of the fusion algorithm

    3.1 Improved Roberts Algorithm

    3.1.1 Improved Roberts Operator

    Roberts operator uses the difference between adjacent pixels in the diagonal direction (45°,135°direction) in the 2×2 area to approximate the gradient amplitude for edge detection,and the magnitude of the gradient R(x,y)of a certain pointf (x,y)on the image is defined as follows:

    where we elect the thresholdtand,when R(x,y)>t,the pixel pointf (x,y)is determined to be an edge point.The traditional Roberts operator only calculates the information of 4 pixels in the diagonal direction,ignoring the pixel information in the vertical and horizontal directions.It is easy to cause missing edge pixels,and the threshold needs to be set manually,which has limitations [24].

    Given the shortcomings of the traditional Roberts algorithm,this article considers adding vertical and horizontal direction information on the basis of the traditional Roberts operator (as shown in the Fig.7).Use the template in four directions of 0°,45°,90°,135°in the 3×3 field.The template performs convolution operations on pixels.

    The difference in the four directions is obtained as follows:

    Their corresponding convolution operators are obtained as follows:

    Figure 7:Calculation improvement of the gradient amplitude of Roberts operator

    The improved Roberts operator considers the neighborhood information of pixels in 8 directions,which makes the edge extraction information more complete.

    3.1.2 Median Filter Denoising

    Although the improved Roberts operator can effectively extract the edge information,the noise generated under the interference of the complex environment in the infrared image and the visible light image will affect the gradient amplitude of pixel value,resulting in the extraction of the false edge formed by the noise.Therefore,we need to denoise the image.Median filtering can protect the edges of the signal from being blurred while filtering out noise.The algorithm is relatively simple and efficient.The two-dimensional median filter expression is obtained as follows:

    Among them,f (x,y)is the initial image,g(x,y)is the filtered image,andWis the twodimensional template.A template of 3*3 area is used here.

    3.1.3 Threshold Segmentation Based on Otus

    Based on the image denoising process,the improved Roberts operator is used for edge extraction.It is necessary to set the threshold t,and determine the edge point when the pixel point(x,y)is greater than t.The selection of the t value is particularly important.The efficiency of the threshold setting is low,and the adaptive ability is poor.So this paper adopts the method of maximum between-class variance (Otus) for threshold segmentation.

    Suppose an image with a gray level ofL,the range ofLis(0,1,...,L-1),usenito represent the number of pixels with a gray level ofn,andNto represent the total number of pixels,then,we obtain the following expression:

    Letp(i)be the probability that a pixel with gray leveliappears:

    Set the initial threshold t to divide the image into two parts A and B,where the grayscale range of A is(0,1,...,t),and the grayscale range of B is(t+1,t+2,...,L-1),then the probability of A and B is obtained as follows:

    The gray average value of the two parts A and B is obtained as follows:

    Then,the between-class variance in the two parts A and B is obtained as follows:

    When the between-class varianced(t)is the largest,t is the optimal threshold.

    3.2 Fusion Strategy

    3.2.1 Dual-Tree Complex Wavelet Transform

    The dual-tree complex wavelet transform (DTCWT) is composed of two parallel real wavelet transforms,using different low-pass and high-pass filters,each group of decomposition and reconstruction processes is carried out separately,and there is no interaction between data [25].

    Iff (t)is the image input signal,sr(t)andsl(t)are the wavelet functions of the real and imaginary parts,respectively,andhr(n)andhl(n)are the real scaling function of the part and the imaginary part,then the wavelet coefficientWrj (k)and the scaling coefficientCrj (k)of the real part transformation are obtained as follows:

    J represents the maximum number of decomposition layers.Similarly,the wavelet coefficientWlj (k)and the scale coefficientClj(k)of the imaginary part are obtained as follows:

    The final DTCWT output complete wavelet coefficientWj(k)and scale functionCj(k)are obtained as follows:

    The wavelet coefficients and scale coefficients obtained by the above decomposition obtained as follows:

    whereλiis the scale selection coefficient,the value range is 0 or 1,and the reconstructed signalf*(t)is obtained as follows:

    3.2.2 Low-Frequency Subband Fusion Strategy

    The low-frequency subband part of the image represents the energy distribution of most of the background of the image.In this paper,the weighting method based on regional energy is used to determine the fusion coefficient of the low-frequency subband.The specific fusion steps are obtained as follows.

    Step 1:Calculate the regional energy of the low-frequency subband coefficients after DTCWT decomposition.

    whereEF(x,y)represents the average energy in the imageFlwithin the neighborhood window of(2s+1)×(2s+1)centered on the point(x,y);susually takes 1,2,3;L(x+i,y+j)represents the low-pass subband coefficients after image decomposition.

    Step 2:Calculate the weight.

    Step 3:Calculate the low-frequency subband fusion coefficient:

    3.2.3 High-Frequency Subband Fusion Strategy

    The high-frequency subband of the image reflect most of the details of edges,textures,contours,etc.The traditional fusion rule of taking the absolute value is susceptible to noise and the fusion effect is low.Moreover,due to the light and other factors,a part of the edge information of the visible light image may be lost,resulting in the loss of local information.Therefore,this paper proposes an edge-enhanced fusion rule based on the improved Roberts operator.The specific fusion algorithm steps are as follows.

    Step 1:Perform median filter processing on the high-frequency subband image to remove noise.

    Figure 8:Fused image of real human faces

    Step 2:Perform edge information extraction on the high-frequency subband image after denoising.The edge information is extracted according to the above mentioned improved Roberts algorithm.Perform convolution operations based on templates in the directions of 0°,45°,90°,135°,etc.to obtain the gradient value of each pixel.GetRA(x,y)andRB(x,y).

    Step 3:Use the Otus threshold segmentation method to obtain the best thresholdstAandtB.

    Step 4:Obtain the high-frequency subband fusion coefficientfFH(x,y)as follows:

    The low-frequency subband fusion coefficientfFL(x,y)and the high-frequency subband fusion coefficientfFH(x,y)are inversely transformed by DTCWT to obtain the final fused imageF.

    3.2.4 Image Fusion Experiment

    The real face that has been successfully verified is fused using the above algorithm,and the resulting fused image is shown in Fig.8.Face recognition is carried out on the fused image,and the identity information of the tested person is verified to realize the face anti-spoofing.

    Table 3:Comparison of face recognition results between visible light image and fusion image

    4 Test Results and Analysis

    In order to verify the advantages of fusion images in face recognition,this paper collects human face information from 100 people.The visible image and thermal infrared image of human faces are collected under normal light conditions and large light changing conditions.Fusion images are obtained by using the above method,and the visible light image and the fusion image database of the human face are established.The visible light image and the fusion image under different lighting conditions are respectively applied to different face recognition n algorithms (LBP [26],HOG [26],LBP+HOG [26],MB-LBP [27],LBP+MB-LBP [27]) to obtain the face recognition rate,as shown in Tab.3.From the results,it can be seen that there is not much difference between the recognition rate of visible image and fused image in the same face recognition algorithm under normal illumination;but in the case of large changes in light,the recognition rate of fusion image is significantly higher than that of visible image in the same face recognition algorithm.Therefore,face recognition based on fusion image has strong robustness to illumination changes.

    5 Conclusion

    This paper proposes an algorithm to resist facial spoofing attacks.Using thermal infrared images,the pixel values of real faces and fake faces of legitimate users are collected,and heart rate signals are detected to distinguish true and false faces.An image fusion algorithm based on DTCWT is proposed to decompose the visible light image and thermal infrared image of real human face.The obtained high-frequency sub-band uses the method based on regional energy for coefficient fusion,and the low-frequency subband uses the improved Roberts algorithm for coefficient fusion.Then use the DTCWT inverse transform to obtain a fusion image containing facial texture features.Different face recognition algorithms are used to verify the recognition rate visible light images and fusion images.The results show that the face recognition algorithm based on fusion images has a higher recognition rate.It can be seen that the algorithm proposed in this paper can effectively reduce the impact of illumination changes on face recognition results in practical application scenes.Combined with heart rate signal detection can effectively distinguish the real faces and spoofing attack face,so as to improve the security of face anti-spoofing system.

    Funding Statement:This research was funded by the Hebei Science and Technology Support Program Project (Grant No.19273703D),and the Hebei Higher Education Science and Technology Research Project (Grant No.ZD2020318).

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    国产成年人精品一区二区| 91在线观看av| 精品一区二区三区四区五区乱码| 欧美激情极品国产一区二区三区| 悠悠久久av| 久久国产精品人妻蜜桃| 久9热在线精品视频| 国产精品日韩av在线免费观看| 亚洲成人久久性| 人人妻,人人澡人人爽秒播| 日日摸夜夜添夜夜添小说| 午夜老司机福利片| 丝袜美腿诱惑在线| 久久国产乱子伦精品免费另类| 日韩精品中文字幕看吧| 日韩欧美国产在线观看| a在线观看视频网站| 国产精品久久久人人做人人爽| 熟女电影av网| 亚洲精品av麻豆狂野| 非洲黑人性xxxx精品又粗又长| 国产av不卡久久| 嫩草影视91久久| 女性被躁到高潮视频| 婷婷丁香在线五月| 亚洲国产精品成人综合色| 1024香蕉在线观看| 成人av一区二区三区在线看| 色综合婷婷激情| 亚洲黑人精品在线| 男人舔女人下体高潮全视频| 夜夜看夜夜爽夜夜摸| 成人欧美大片| 午夜精品久久久久久毛片777| 天天添夜夜摸| 国产在线观看jvid| 欧美精品亚洲一区二区| 观看免费一级毛片| 黄色片一级片一级黄色片| 欧美激情高清一区二区三区| 中文字幕人成人乱码亚洲影| 在线观看66精品国产| 中文字幕久久专区| xxxwww97欧美| 亚洲国产精品成人综合色| 精品乱码久久久久久99久播| 久久久久久人人人人人| 欧美日本视频| 午夜久久久在线观看| 俺也久久电影网| 欧美日韩中文字幕国产精品一区二区三区| 男女午夜视频在线观看| 亚洲av五月六月丁香网| 级片在线观看| 最近在线观看免费完整版| or卡值多少钱| 中文字幕人成人乱码亚洲影| 亚洲 欧美 日韩 在线 免费| 久久久久久久久中文| 美女扒开内裤让男人捅视频| 国产精华一区二区三区| 91成年电影在线观看| 中文字幕人成人乱码亚洲影| 妹子高潮喷水视频| 91九色精品人成在线观看| 高清在线国产一区| 久久香蕉激情| 久久中文字幕一级| 国产精品久久久久久精品电影 | 巨乳人妻的诱惑在线观看| 中文亚洲av片在线观看爽| 亚洲中文日韩欧美视频| 欧美另类亚洲清纯唯美| 国产精华一区二区三区| 香蕉丝袜av| 久久天堂一区二区三区四区| 亚洲全国av大片| 日韩精品中文字幕看吧| 国产精品一区二区免费欧美| 在线av久久热| 亚洲一卡2卡3卡4卡5卡精品中文| 丝袜美腿诱惑在线| 国产精品免费一区二区三区在线| 久久欧美精品欧美久久欧美| 侵犯人妻中文字幕一二三四区| 久久国产亚洲av麻豆专区| 午夜成年电影在线免费观看| 精品一区二区三区四区五区乱码| 18美女黄网站色大片免费观看| 亚洲狠狠婷婷综合久久图片| 1024香蕉在线观看| 无遮挡黄片免费观看| 老汉色∧v一级毛片| 757午夜福利合集在线观看| 日日摸夜夜添夜夜添小说| 亚洲第一电影网av| 黄色片一级片一级黄色片| 欧美zozozo另类| 老熟妇乱子伦视频在线观看| 成人欧美大片| 国产精品久久电影中文字幕| 久久性视频一级片| 欧美成人性av电影在线观看| 天天躁夜夜躁狠狠躁躁| 黄色毛片三级朝国网站| 亚洲成av人片免费观看| 亚洲狠狠婷婷综合久久图片| 亚洲久久久国产精品| 一区福利在线观看| 亚洲熟女毛片儿| 国产1区2区3区精品| 欧美大码av| 国产成人欧美在线观看| 亚洲国产欧洲综合997久久, | 欧美成人性av电影在线观看| 啦啦啦 在线观看视频| 午夜免费观看网址| 在线视频色国产色| 12—13女人毛片做爰片一| 在线观看66精品国产| 日本熟妇午夜| 麻豆一二三区av精品| 最新美女视频免费是黄的| 免费看日本二区| 99精品久久久久人妻精品| 国产精品久久视频播放| 欧美激情高清一区二区三区| 美女高潮到喷水免费观看| 午夜福利一区二区在线看| 欧美av亚洲av综合av国产av| 午夜视频精品福利| 黄色成人免费大全| 9191精品国产免费久久| 国产欧美日韩一区二区精品| 一进一出好大好爽视频| 久久人人精品亚洲av| 大香蕉久久成人网| 夜夜夜夜夜久久久久| 国产亚洲av嫩草精品影院| 啪啪无遮挡十八禁网站| 51午夜福利影视在线观看| 亚洲av电影在线进入| 亚洲熟妇熟女久久| 黄片小视频在线播放| 久久婷婷人人爽人人干人人爱| 一级a爱片免费观看的视频| 男女午夜视频在线观看| 久久欧美精品欧美久久欧美| 日本免费一区二区三区高清不卡| 国产一区二区三区视频了| 久久国产精品影院| 成人国产综合亚洲| 欧美精品啪啪一区二区三区| 欧美日本视频| 精品卡一卡二卡四卡免费| 国产1区2区3区精品| 国产激情欧美一区二区| 黄色a级毛片大全视频| 成人18禁高潮啪啪吃奶动态图| 亚洲国产中文字幕在线视频| 99久久综合精品五月天人人| 国产亚洲欧美98| 十分钟在线观看高清视频www| 免费看美女性在线毛片视频| 露出奶头的视频| 国产三级黄色录像| 亚洲熟妇熟女久久| 哪里可以看免费的av片| 国产精品二区激情视频| 亚洲第一青青草原| 欧美黄色片欧美黄色片| 欧美激情 高清一区二区三区| 少妇被粗大的猛进出69影院| 男人舔女人下体高潮全视频| 一a级毛片在线观看| av在线播放免费不卡| 欧美在线黄色| 久久久水蜜桃国产精品网| 叶爱在线成人免费视频播放| 999精品在线视频| 欧美乱色亚洲激情| 色综合欧美亚洲国产小说| 亚洲第一电影网av| 法律面前人人平等表现在哪些方面| 美女扒开内裤让男人捅视频| 色av中文字幕| 午夜福利成人在线免费观看| 成人三级做爰电影| www国产在线视频色| 成人国语在线视频| 欧美中文日本在线观看视频| 两人在一起打扑克的视频| aaaaa片日本免费| 非洲黑人性xxxx精品又粗又长| 国产激情久久老熟女| 亚洲一卡2卡3卡4卡5卡精品中文| 久9热在线精品视频| 一级作爱视频免费观看| 后天国语完整版免费观看| 国产亚洲av嫩草精品影院| 成年人黄色毛片网站| 国产欧美日韩一区二区精品| 好男人在线观看高清免费视频 | 国产精品电影一区二区三区| 亚洲 欧美一区二区三区| 99精品在免费线老司机午夜| 可以在线观看毛片的网站| 99精品在免费线老司机午夜| 看片在线看免费视频| 亚洲午夜理论影院| 国产伦一二天堂av在线观看| 在线国产一区二区在线| 99国产精品一区二区三区| 亚洲va日本ⅴa欧美va伊人久久| 欧美精品啪啪一区二区三区| 老司机在亚洲福利影院| 又紧又爽又黄一区二区| 一区二区三区激情视频| 悠悠久久av| 亚洲精品在线观看二区| 精品久久久久久,| 一a级毛片在线观看| 精品国产美女av久久久久小说| 黄片小视频在线播放| 国产精品一区二区三区四区久久 | 精品久久久久久久末码| 久久久久国内视频| 久9热在线精品视频| 中文字幕精品亚洲无线码一区 | 国产99久久九九免费精品| 中文字幕av电影在线播放| 国产亚洲精品综合一区在线观看 | 一区二区三区国产精品乱码| 亚洲国产日韩欧美精品在线观看 | 在线观看舔阴道视频| 女性被躁到高潮视频| 日本成人三级电影网站| 亚洲精品中文字幕在线视频| 国产爱豆传媒在线观看 | 在线永久观看黄色视频| 免费电影在线观看免费观看| 老汉色av国产亚洲站长工具| 久久中文字幕人妻熟女| 国产成人精品久久二区二区91| 亚洲精华国产精华精| 香蕉国产在线看| x7x7x7水蜜桃| 亚洲精品国产一区二区精华液| 正在播放国产对白刺激| 97碰自拍视频| 99国产极品粉嫩在线观看| 一区二区日韩欧美中文字幕| 国产精品免费一区二区三区在线| 亚洲精品国产精品久久久不卡| 久久中文字幕一级| 两个人视频免费观看高清| 母亲3免费完整高清在线观看| 后天国语完整版免费观看| aaaaa片日本免费| 国产激情久久老熟女| 欧美一级a爱片免费观看看 | 日韩大尺度精品在线看网址| 在线观看舔阴道视频| 国产精品98久久久久久宅男小说| 麻豆久久精品国产亚洲av| 精品人妻1区二区| 久久婷婷人人爽人人干人人爱| 国产av不卡久久| 国产亚洲精品久久久久5区| 久久久久国内视频| 99久久国产精品久久久| 欧美日韩亚洲国产一区二区在线观看| 久久午夜综合久久蜜桃| 亚洲精品av麻豆狂野| www日本在线高清视频| 午夜两性在线视频| 99国产极品粉嫩在线观看| 国产av一区二区精品久久| 国产三级黄色录像| 99国产精品一区二区蜜桃av| 好男人在线观看高清免费视频 | 天天躁夜夜躁狠狠躁躁| 搡老岳熟女国产| 天堂动漫精品| 久久精品国产亚洲av高清一级| 国产亚洲av嫩草精品影院| e午夜精品久久久久久久| √禁漫天堂资源中文www| 日日摸夜夜添夜夜添小说| 757午夜福利合集在线观看| 欧美日韩黄片免| 国产一卡二卡三卡精品| 香蕉国产在线看| 亚洲 欧美一区二区三区| 亚洲中文日韩欧美视频| 精品国产国语对白av| 成人欧美大片| 美国免费a级毛片| 动漫黄色视频在线观看| 最好的美女福利视频网| 国产免费av片在线观看野外av| 成人亚洲精品一区在线观看| 男女视频在线观看网站免费 | 禁无遮挡网站| 首页视频小说图片口味搜索| 黄片播放在线免费| 天天一区二区日本电影三级| 国产一区二区三区视频了| 巨乳人妻的诱惑在线观看| 久久久水蜜桃国产精品网| 免费搜索国产男女视频| 久久久精品国产亚洲av高清涩受| 国产片内射在线| 国产亚洲精品一区二区www| 成人特级黄色片久久久久久久| 亚洲国产精品999在线| 亚洲成av片中文字幕在线观看| 亚洲七黄色美女视频| 操出白浆在线播放| 午夜精品在线福利| 高清毛片免费观看视频网站| 男人的好看免费观看在线视频 | 亚洲精品中文字幕一二三四区| 麻豆国产av国片精品| 午夜成年电影在线免费观看| 91在线观看av| 色哟哟哟哟哟哟| 国产又色又爽无遮挡免费看| 国产一区二区在线av高清观看| 夜夜爽天天搞| 十分钟在线观看高清视频www| 人人澡人人妻人| 欧美精品啪啪一区二区三区| 成人国产一区最新在线观看| 久久精品国产清高在天天线| 精品免费久久久久久久清纯| 18禁黄网站禁片午夜丰满| 色尼玛亚洲综合影院| 国产伦在线观看视频一区| 精品国产超薄肉色丝袜足j| 午夜a级毛片| 久久中文字幕人妻熟女| 别揉我奶头~嗯~啊~动态视频| 久久伊人香网站| 无限看片的www在线观看| 天天躁夜夜躁狠狠躁躁| 亚洲精品色激情综合| 久久亚洲真实| 欧美中文日本在线观看视频| 看片在线看免费视频| 精品一区二区三区视频在线观看免费| 999久久久国产精品视频| av中文乱码字幕在线| 男女做爰动态图高潮gif福利片| 久久精品国产清高在天天线| 国产成人精品无人区| 在线看三级毛片| 免费一级毛片在线播放高清视频| 亚洲五月色婷婷综合| avwww免费| 男女之事视频高清在线观看| 精品无人区乱码1区二区| 免费在线观看日本一区| 精品福利观看| 亚洲国产毛片av蜜桃av| 91成年电影在线观看| 日本熟妇午夜| 亚洲精品一区av在线观看| 视频区欧美日本亚洲| 99精品久久久久人妻精品| xxx96com| 久久香蕉精品热| 在线永久观看黄色视频| 日韩av在线大香蕉| 久久久国产成人精品二区| 亚洲午夜理论影院| 亚洲全国av大片| 19禁男女啪啪无遮挡网站| 制服诱惑二区| 精品一区二区三区av网在线观看| 亚洲人成网站在线播放欧美日韩| 婷婷六月久久综合丁香| 欧美zozozo另类| 国产v大片淫在线免费观看| 欧美乱色亚洲激情| 欧美日本亚洲视频在线播放| 午夜福利免费观看在线| 操出白浆在线播放| 可以在线观看毛片的网站| 亚洲国产欧美日韩在线播放| 天堂动漫精品| tocl精华| 啦啦啦观看免费观看视频高清| 妹子高潮喷水视频| 欧美黑人欧美精品刺激| 在线观看免费日韩欧美大片| 中文在线观看免费www的网站 | 女性被躁到高潮视频| 一级a爱片免费观看的视频| 日本免费a在线| 十分钟在线观看高清视频www| 国产亚洲精品一区二区www| 国产野战对白在线观看| 日韩欧美免费精品| 欧美黄色淫秽网站| 欧美绝顶高潮抽搐喷水| 午夜免费成人在线视频| 国产亚洲欧美在线一区二区| 99精品久久久久人妻精品| 日日摸夜夜添夜夜添小说| 日韩免费av在线播放| 亚洲无线在线观看| 亚洲欧美激情综合另类| 欧美日本视频| 亚洲国产精品sss在线观看| 搡老妇女老女人老熟妇| 人妻久久中文字幕网| 激情在线观看视频在线高清| av在线播放免费不卡| 亚洲五月天丁香| 制服人妻中文乱码| 欧美日韩黄片免| 欧美激情极品国产一区二区三区| 国产精品美女特级片免费视频播放器 | 精品久久蜜臀av无| 日韩精品中文字幕看吧| 婷婷六月久久综合丁香| 高清毛片免费观看视频网站| 黄片播放在线免费| 少妇粗大呻吟视频| 露出奶头的视频| 久久久国产成人精品二区| 色老头精品视频在线观看| 黄色女人牲交| 久久性视频一级片| 成人欧美大片| 国产男靠女视频免费网站| а√天堂www在线а√下载| 亚洲国产中文字幕在线视频| 精品不卡国产一区二区三区| 波多野结衣高清作品| 精品熟女少妇八av免费久了| 看黄色毛片网站| 亚洲国产精品sss在线观看| 精品福利观看| 国产精品久久久av美女十八| 亚洲欧美一区二区三区黑人| 国产伦在线观看视频一区| 99在线人妻在线中文字幕| 午夜成年电影在线免费观看| 成人av一区二区三区在线看| 亚洲狠狠婷婷综合久久图片| 精品第一国产精品| 老司机靠b影院| 国产精品精品国产色婷婷| 欧美成人免费av一区二区三区| 国产精品一区二区精品视频观看| 国产精品免费一区二区三区在线| 国产真实乱freesex| 黑人操中国人逼视频| 村上凉子中文字幕在线| 母亲3免费完整高清在线观看| 两个人看的免费小视频| 好男人电影高清在线观看| 亚洲欧美一区二区三区黑人| 高清在线国产一区| ponron亚洲| 亚洲欧美一区二区三区黑人| 亚洲欧洲精品一区二区精品久久久| 国产成人欧美| 欧美日韩亚洲综合一区二区三区_| 美女扒开内裤让男人捅视频| 亚洲中文字幕一区二区三区有码在线看 | 黄频高清免费视频| 国内久久婷婷六月综合欲色啪| 丝袜在线中文字幕| 少妇裸体淫交视频免费看高清 | av视频在线观看入口| 午夜久久久久精精品| 日本免费一区二区三区高清不卡| 国产亚洲精品久久久久5区| 国产高清videossex| 久久久久久九九精品二区国产 | 级片在线观看| 日韩精品青青久久久久久| 亚洲av熟女| 国产人伦9x9x在线观看| 91字幕亚洲| cao死你这个sao货| 淫妇啪啪啪对白视频| 18禁观看日本| 国产精品自产拍在线观看55亚洲| 国产视频内射| 999久久久精品免费观看国产| 免费看美女性在线毛片视频| 正在播放国产对白刺激| 男人舔女人的私密视频| 大型av网站在线播放| 亚洲在线自拍视频| 在线视频色国产色| 成人手机av| 两性午夜刺激爽爽歪歪视频在线观看 | 黄色毛片三级朝国网站| 一a级毛片在线观看| 99精品久久久久人妻精品| 又黄又爽又免费观看的视频| 老汉色av国产亚洲站长工具| 亚洲欧美精品综合久久99| 亚洲国产欧美日韩在线播放| 男女之事视频高清在线观看| 国产成人av激情在线播放| 精品久久久久久,| tocl精华| 欧美不卡视频在线免费观看 | 亚洲,欧美精品.| 夜夜夜夜夜久久久久| 亚洲国产高清在线一区二区三 | 国产麻豆成人av免费视频| 亚洲av五月六月丁香网| 琪琪午夜伦伦电影理论片6080| 欧洲精品卡2卡3卡4卡5卡区| 999久久久国产精品视频| a级毛片在线看网站| netflix在线观看网站| 精品国产美女av久久久久小说| 日韩一卡2卡3卡4卡2021年| 亚洲国产高清在线一区二区三 | 国产麻豆成人av免费视频| 在线观看66精品国产| 免费看美女性在线毛片视频| 久久久久久久久免费视频了| 丁香欧美五月| 在线观看日韩欧美| 久热爱精品视频在线9| 国产精品av久久久久免费| 夜夜躁狠狠躁天天躁| 97人妻精品一区二区三区麻豆 | 午夜久久久久精精品| av天堂在线播放| 国产色视频综合| 少妇 在线观看| 亚洲av第一区精品v没综合| 国产成人精品久久二区二区免费| 一进一出好大好爽视频| 人妻久久中文字幕网| 91成人精品电影| 午夜激情福利司机影院| 欧美亚洲日本最大视频资源| 一边摸一边抽搐一进一小说| 色婷婷久久久亚洲欧美| 叶爱在线成人免费视频播放| 看片在线看免费视频| 波多野结衣高清作品| 亚洲天堂国产精品一区在线| 久久国产精品男人的天堂亚洲| aaaaa片日本免费| 男人舔女人的私密视频| 国产av又大| 亚洲电影在线观看av| 亚洲五月天丁香| 激情在线观看视频在线高清| 免费看美女性在线毛片视频| 看黄色毛片网站| 国产精品九九99| 脱女人内裤的视频| 国产成年人精品一区二区| 色尼玛亚洲综合影院| 在线观看一区二区三区| 成年女人毛片免费观看观看9| 日本五十路高清| 亚洲人成伊人成综合网2020| 欧美一区二区精品小视频在线| 欧美乱妇无乱码| 亚洲 欧美 日韩 在线 免费| 一边摸一边抽搐一进一小说| 婷婷精品国产亚洲av| 亚洲黑人精品在线| 日韩精品中文字幕看吧| 两个人视频免费观看高清| 99国产精品一区二区三区| 日韩欧美免费精品| 国产成+人综合+亚洲专区| 听说在线观看完整版免费高清| 看黄色毛片网站| 国产亚洲欧美在线一区二区| 免费一级毛片在线播放高清视频| 在线天堂中文资源库| 成人一区二区视频在线观看| 国产av不卡久久| 亚洲 欧美一区二区三区| 亚洲精品美女久久av网站| 亚洲在线自拍视频| 日本精品一区二区三区蜜桃| 欧美久久黑人一区二区| 男女床上黄色一级片免费看| 久久午夜综合久久蜜桃| 欧美激情 高清一区二区三区| 制服人妻中文乱码| 精品乱码久久久久久99久播| 国产人伦9x9x在线观看| 欧美激情 高清一区二区三区| 精品第一国产精品| 亚洲久久久国产精品| 免费观看精品视频网站| 国产黄a三级三级三级人| 亚洲av中文字字幕乱码综合 | 我的亚洲天堂| 99在线人妻在线中文字幕| 日日摸夜夜添夜夜添小说| 久久久久久久午夜电影| 9191精品国产免费久久| 国内毛片毛片毛片毛片毛片| 日韩国内少妇激情av| 搡老妇女老女人老熟妇| 欧美日韩瑟瑟在线播放|