• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Image Authenticity Detection Using DWT and Circular Block-Based LTrP Features

    2021-12-15 08:12:38MarriamNawazZahidMehmoodTahiraNazirMominaMasoodUsmanTariqAsmaaMahdiMunshiAwaisMehmoodandMuhammadRashid
    Computers Materials&Continua 2021年11期

    Marriam Nawaz,Zahid Mehmood,Tahira Nazir,Momina Masood,Usman Tariq,Asmaa Mahdi Munshi,Awais Mehmood and Muhammad Rashid

    1Department of Computer Science,University of Engineering and Technology,Taxila,47050,Pakistan

    2Department of Computer Engineering,University of Engineering and Technology,Taxila,47050,Pakistan

    3College of Computer Engineering and Sciences,Prince Sattam bin Abdulaziz University,Al-Kharj,11942,Saudi Arabia

    4College of Computer Science and Engineering,University of Jeddah,Jeddah,21577,Saudi Arabia

    5Department of Computer Engineering,Umm Al-Qura University,Makkah,21421,Saudi Arabia

    Abstract:Copy-move forgery is the most common type of digital image manipulation,in which the content from the same image is used to forge it.Such manipulations are performed to hide the desired information.Therefore,forgery detection methods are required to identify forged areas.We have introduced a novel method for features computation by employing a circular block-based method through local tetra pattern(LTrP)features to detect the single and multiple copy-move attacks from the images.The proposed method is applied over the circular blocks to efficiently and effectively deal with the post-processing operations.It also uses discrete wavelet transform(DWT)for dimension reduction.The obtained approximate image is distributed into circular blocks on which the LTrP algorithm is employed to calculate the feature vector as the LTrP provides detailed information about the image content by utilizing the direction-based relation of central pixel to its neighborhoods.Finally,Jeffreys and Matusita distance is used for similarity measurement.For the evaluation of the results,three datasets are used,namely MICC-F220,MICC-F2000,and CoMoFoD.Both the qualitative and quantitative analysis shows that the proposed method exhibits state-of-the-art performance under the presence of post-processing operations and can accurately locate single and multiple copy-move forgery attacks on the images.

    Keywords:Copy-move forgery;discrete wavelet transform;LTrP features;image forensic;circular blocks

    1 Introduction

    In this digital era,digital devices’economic prices have enabled people to keep using a variety of smart devices like cell phones,digital cameras,tabs,and laptops,etc.People usually buy these devices to perform their daily tasks.However,these gadgets also allow them to save their memories in digital format such as in the form of images and videos [1].At the same time,it is also very easy for them to acquire apps and tools that can easily alter this digital data and change the information conveyed through them [2,3].Although the availability of such tools and apps can help people to make their data more appealing and delighting.At the same time,it can also make the conveyed information unreliable and untrusted especially,in such scenarios where these images and videos are used in investigating a criminal case or processing legal claims.The method of forging image information is known as digital image forgery.The approaches used to identify the forensic changes made are known as forgery detection (FD) techniques.These approaches have been categorized into two classes namely the active and passive methods [4].Active methods are only workable for those scenarios where the information of the source images like watermarks or digital signatures is available [5,6].Therefore,mostly passive techniques are employed to identify the two types of image manipulations,namely the copy-move forgery (CMF) and the splicing [7].In the case of generating a spliced forged image,the contents of different images are merged [8].While for CMF,the information of the same image is used to manipulate its content.CMF is more challenging as the overall properties of the image are not altered.Fig.1 is representing an example of CMF.

    Figure 1:An example of CMF.(a) Original image,(b) Copy-move attack (dublicated object highlighted)

    The FD methods are categorized into two types namely:i) the block-based FD techniques ii)the keypoints-based FD methods [9].In the block-based FD approaches,the suspected image is divided into overlapping blocks where FD techniques are applied on each block.These approaches usually suffer from high computational costs.In contrast,keypoints-based FD methods work by computing the key features of the whole suspected image.These approaches are computationally robust and exhibit better detection performance for the high textured forged images [10].As generating CMF content does not require special skills,so,in daily life scenarios,it is very easy for a person to manipulate image content.Therefore,the need of the hour is to introduce such techniques that can efficiently detect these forensic changes.Although,until now,several techniques have been introduced in the field of copy-move forgery detection (CMFD),there is no generalized method that can give a promising performance under the presence of various post-processing attacks like scaling,rotation,noise and JPEG compression,etc.

    In the proposed method,we have introduced a novel technique for the CMFD.First,the input image is converted into a grey-scale image,on which the DWT approach is applied for dimension reduction.The obtained approximate image sub-band is then converted into circular blocks.Next,the local tetra pattern (LTrP) algorithm is applied over overlapped circular blocks to calculate each block’s feature vector.Finally,the Jeffreys and Matusita distance is computed to determine the similarity among the data points.We have evaluated the proposed method over the different postprocessing image operations like scaling,rotation,blurring,brightness reduction,and compression.Experimental results indicate that the proposed method exhibits a state-of-the-art performance while compared with its competitor’s methods.

    The following are the main contributions of the proposed method:

    · The light encoded features enable the proposed method to identify copied regions from the input forged image accurately,even under the presence of post-processing attacks like angle and scale,intensity and chrominance variations,etc.

    · The proposed method employs LTrP features over circular blocks to generate the rotationinvariant feature vector,enabling the efficient and effective localization of regular and irregular-shaped manipulated areas and minimizes the false detection rate.

    · The proposed method can locate single and multiple CMF attacks effectively,even from tiny and exceptionally flat areas of an altered sample.

    · The circular blocks,lightweight feature descriptor,and RANSAC enhance the identification performance of the proposed method as well as its identification performance and increase the robustness by faster detection of the optimum key points deduction of false matches over the manipulated content.

    The remaining sections of this article are arranged as follows:related work is discussed in Section 2.Comprehensive details of the proposed method are given in Section 3.The performance evaluation parameters and experimental results are discussed in Section 4,and finally,the conclusion is presented in Section 5.

    2 Literature Review

    Form the last decades,numerous approaches have been introduced to detect the manipulations made within digital images.It is quite a challenging task to identify the CMF because the content from the same image is used to alter its information.So,the major attributes of an image such as the light effects,resolution,and brightness,etc.remain the same.Several methods have been employed by the researchers to deal with the complexities of the CMF.Bilal et al.[11]proposed a technique to detect the forensic charges of digital images.First,the dynamic histogram equalization (DHE) technique was used to adjust the input image’s contrast.Then,the SURF descriptor was employed to calculate the feature vector of the adjusted image.Finally,the mDBSCAN clustering algorithm was used to localize the forged area in a given image.The approach [11]is robust to CMFD.However,this technique is unable to detect the forensic changes made in the flat regions.Roy et al.[12]presented a framework to detect the forgeries of digital images.First,the SURF descriptor was used to identify the features of an input image.Then,the Rotated Local Binary Pattern (RLBP) approach was applied to extract the features from the obtained SURF keypoints.Next,the generalized two Nearest Neighborhood (g2NN) method was used to compute the similarity among the extracted keypoints,and finally,the Hierarchical Clustering [13]scheme was used to cluster the manipulated portion of an input image.This approach is robust to detect the forgeries against the occurrence of rotational changes,blurring,and compression operations applied in the forged images.However,the detection accuracy of [12]is affected over the lowquality input samples.Lin et al.[14]introduced a novel method for CMFD.The hybrid features were estimated from the input image by applying the SIFT and LIOP feature extraction algorithm.The g2NN method was applied to perform the feature matching and then transitive matching was used to improve the matching results.Finally,the RANSAC algorithm was employed to reduce the false matching.The technique [14]has shown better results in CMFD as compared to the latest techniques.However,this work is suffering from a high computational rate.

    Agarwal et al.[15]introduced a deep learning-based technique to identify the forensic changes made within the digital images.First,an input image was segmented into various parts by using the Simple Linear Iterative Clustering (SLIC) technique.A convolutional neural network namely the VGGNet (Visual Geometry Group-net) was applied to the individual segments to extract the key points from the input sample.Finally,the adaptive patch matching (APM) method was applied to measure the pixels resemblance to show the forged content from the input sample.This method is robust to various image transformation attacks such as blurring,rotation,and compression.However,the approach in [15]is computationally expensive.Alkawaz et al.[16]performed CMFD by dividing an input image into overlapping blocks.Then the discrete cosine transform (DCT) was applied to each block to compute the DCT coefficients.In the last step,the euclidian distance was computed to find the correspondence between the DCT coefficients.This framework shows better detection performance.However,the false choice of block size may lead to a reduction in forgery detection accuracy.A hybrid feature extraction-based CMFD methodology was proposed by Bilal et al.[17].Initially,the DWT technique was applied to an input image to obtain the approximate sub-band.Then,SURF and BRISK feature extraction techniques were applied to the obtained sub-band to extract the features.Next,the hamming distance was computed to measure the similarity between the keypoints.Then,the DBSCAN clustering approach was employed to the matched features to localize the altered content.Finally,the RANSAC method was applied to remove the false matches.This approach is robust to image transformation operations.However,the intense image changes in scaling,brightness,and color reduction may degrade the detection performance.Bi et al.[18]presented a framework to detect altered information in digital images.The input image was categorized into non-overlapping blocks.Then,the SIFT descriptor was used to extract the keypoints from each block.To measure the similarity between the extracted features,the adaptive patch matching algorithm was employed.Finally,the identified doubtful patches were combined to show the final results.The technique in [18]shows better performance to CMFD;however,it is computationally complex.A blockbased CMFDapproach was introduced by Chen et al.[19]that worked by dividing an input digital image into non-overlapping patches.The similarity between the blocks was computed by using the block sampled matching with the region growing (BSMRG) algorithm.Finally,the manipulated regions were shown by using a region growing step.The method in [19]is computationally robust,however,it is unable to define the block size automatically.Muzaffer et al.[20]proposed a SIFT descriptor-based approach for CMFD where binarized descriptors were employed to identify the manipulated regions.The technique [20]has reduced the search space.However,the detection accuracy is low as compared to a simple SIFT-based approach.Emam et al.[21]presented a novel method for CMFD that used the SIFT algorithm to extract the key features from the digital images texture area,and the Harris corner operator to measure the keypoints from the flat areas in the image.The keypoints from both descriptors were combined by using the Multi-support Region Order-based Gradient Histogram (MROGH) descriptor.The forged content was computed by measuring the similarity of fused key features.The technique [21]is robust to additive noise attacks,however shows a low recall rate.

    3 Materials and Methods

    This section presents the details of the method proposed for detecting the forensic changes made within digital images.The introduced technique works by applying the DWT approach together with the LTrP feature descriptor on the overlapped circular blocks of the image.The similarity of the content is computed by employing the Jeffreys and Matusita distance method.The complete workflow of the proposed method is presented in Fig.2.The proposed method’s experimental analysis shows that employing the DWT and the LTrP feature descriptor gives promising results for identifying the digital image forgeries due to their high robustness,accurate detection,and low computational cost.

    Figure 2:Workflow diagram of the proposed method

    3.1 Pre-processing

    Initially,the input color image is converted to a grey-scale image by employing the Eq.(1):

    Here imggsrepresents the grey-scale image,while rcom,gcomand bcomshow the red,green,and blue components of the input image.

    3.2 Dimension Reduction Using DWT

    After the pre-processing step,we applied the DWT to the image for dimension reduction [22].In DWT,the input image is shifted to the frequency domain,and its components are modified to acquire a more robust representation of the image.The DWT approach processes the image in a hierarchal manner,giving both the image’s spatial and frequency details [23].It processes the input image in horizontal,vertical,and diagonal directions to compute its four components namely Low_Low (LL),High_Low (HL),Low_High (LH) and High_High (HH).Here,the first letter defines the type of frequency pass either as High or Low,while the second letter determines the type of filter employed on the image column [24].In the proposed method,the DWT converts the image into a sequence of wavelet coefficients related to its spatio-frequency sub-bands.SupposeImgθishows the image sub-band at i intensity level which is 2 in our case as we have applied the DWT approach up to level-2 whileθ∈{LL,LH,HH,HL}.TheLLcomponent is known as the approximate image and has the lowest intensity level.Moreover,theLLsub-band contains more specific regional details of the original image,so,we have used it for further processing in the proposed method.The size of theLLcomponent is only 1/4iof the original sample.While theHH,LH,andHLshow the diagonal,horizontal,and vertical components of the input sample,respectively.

    3.3 Division of the Image into Circular Blocks

    After obtaining an approximate imageImgll2through the DWT,we have divided the image into circular blocks for further processing.The main reason to select the circular blocks over the square blocks is that in the case of the square blocks,the information is diverse particularly at the image’s corners.Therefore,the square blocks make the representation of manipulated blocks different which affects the correct identification of the forged blocks.Hence,employing rotational invariant keypoints set along with the circular blocks result in efficient forgery detection.

    SupposeImgll2is distributed into the square overlapped blocks with the dimensions ofL×L.The elements of circular blocksBjare computed by using the ratio of circular and matrix areas,sayCa,Ma,respectively which are given by Eqs.(2) and (3) with radiusR.

    and

    wherePrcis known as the circle parameter ratio,which is obtained by computing the ratio of circular and matrix areas.In our method,we have obtained the final representation of blocksBjthrough a kernel windowfgiven by Eq.(5) over each blockBj.

    where radiusr=1 and P denotes the number of nearest neighbors for eachBjwith the value of 8 while j={1,2,3,...,n} and 2πp is the angular velocity.In our proposed technique,each circular blockBjhas radiusR=8.So,the approximate imageImgll2of sizex×yis divided into n=(x-2R+1)×(y-2R+1) overlapping circular blocks.

    3.4 Computing LTrP Features Over Circular Blocks

    After the conversion of the approximate imageImgll2into the circular blocksn,the LTrP [25]is applied over them to compute the feature vector.The main reasons for selecting the LTrP over the LBP [26],local ternary pattern (LTP) [27],and the local directional pattern (LDP) [28]are as follows:i) The LBP,LTP,and LDP techniques work by representing an input image with two or three different values.While in comparison,the LTrP is capable of encoding the sample image with four different values.Therefore,the LTrP provides more detailed image information.ii) The LBP and LTP work by employing the simple relation of central pixel’s grey value to its neighbors,whereas the LTrP employs the direction-based relation of central pixel to its neighborhoods,therefore,it assists in computing efficient keypoints that are robust to scaling and rotation variations and help in proficiently locating the CMF.

    We have obtainedBjoverlapped circular blocks.So,for each blockb∈Bj,the LTrP along itsnthorder will calculate the four different values at central pixel saygcomby computing the(n-1)thorder derivatives along 0°and 90°through using the Eq.(6):

    After determining the direction of computed features,thenthorder LTrP of the central pixelgcomalong its 8 neighbors denoted as gpis given by Eq.(7):

    After computing the directions of features,the LTrP further employs three binary patterns.By assuming the directional orientation of the central feature to 1,the LTrP is computed by using Eq.(8):

    And

    After computing the three binary patterns,the fourth pattern known as magnitude pattern (mp) can be calculated by using the values of horizontal and vertical derivatives of eight neighborhood features,given by the Eq.(10):

    where

    These computed four patterns have been utilized to describe the feature vectorvjof each blockBjwhich is sorted lexicographically to ease the process of CMFD as it makes similar features close together.The feature matrixfor the whole image is calculated by combining the vectors from all the blocks and defined in Eq.(12).

    A visual representation of LTrP is given in Fig.3 and more details about the LTrPs feature representation can be found in [25].

    Figure 3:Methodology of computing the LTrP feature descriptors

    3.5 Similarity Measurement

    After performing the feature vector estimation,the next step is to compute the resemblance among them to check the image for CMF.If in the matching process,any similarities are found,then the image is marked as forged.In the proposed method,we have employed the Jeffreys and Matusita distanced[29]to measure the similarity between the detected data points.The main motivation of employing the Jeffreys and Matusita distance over Euclidian and Manhattan distance formulas is that it generalizes well to all sort of pixel distributions and works well for high dimensional feature space as compared to Euclidian and Manhattan distances.

    For two features,sayxiandxjare said to be similar,if the Jeffreys and Matusita distancedijdefined in Eq.(13) is less thanT.Here,Tis the threshold value which is set as 0.5 for the proposed method.

    3.6 Post-Processing

    Finally,in the last step,to improve the effectiveness of the proposed method the RANSAC technique [30]is employed to eliminate the false matches from the computed results.The affine transformation matrix of the matched area is calculated by choosing the random points from it and is defined by the Eq.(14):

    where(a,b)and(x,y)show the corresponding copied and pasted region’s pixels in the image.While t1,t2,t3,t4,tx,and tyare the values of the affine transformation.Finally,a model is computed by employing the least square method,which categorized the matched data points into two sets namely inliers and outlier data points.To show the final results,the outliers are discarded,and inlier data points are utilized.

    4 Results and Discussions

    We have performed different experiments for the performance evaluation of the proposed method against post-processing attacks,i.e.,noise,scaling,rotation,and JPEG compression.We have used MATLAB 2015b software with the Intel core I-7 machine,32 GB RAM,and 250 GB hard drive for experiments.

    4.1 Datasets

    The evaluation experiments are performed by employing three databases namely MICCF220 [31],MICC-F2000 [31],and CoMoFoD [32].A detailed explanation of databases is given in Tab.1.The MICC-F220 database comprises 220 samples,of which 110 samples are real,and the remaining 110 images are forged.The MICC-F2000 dataset contains 2000 images,in which 1300 images are real and 700 are forged images.While the CoMoFoD dataset consists of 260 forged samples.The images are distributed into 5 classes having applied manipulations i.e.,rotation,translation,scaling,distortion,and combination.Fig.4 shows the sample images of all the given datasets.

    In Fig.4,the first row shows images from the CoMoFod dataset while the next row shows images from the MICC-F220 dataset,and the last row shows images from the MICC-F2000 dataset.The first and third columns exhibit the original images,while the second and fourth columns show forged sample images.

    Table 1:A detailed description of employed datasets

    4.2 Evaluation Metrics

    We have used the different metrics i.e.,precision (P),recall (R),andF1scorefor the performance evaluation of the proposed method.These metrics are defined mathematically by Eqs.(15)-(17),respectively:

    Figure 4:Sample of images from all employed datasets

    whereTppresents the forged regions in the image identified as forged,whileFppresents the original area in the image identified as forged,andFnrepresents those cases where the forged areas are identified as the original.

    4.3 Performance Testing

    This section presents the proposed method’s evaluation power under the simple attacks of the CMF strategy.Various tests are performed for the detection of a forged area in the suspected images.In this operation,the selected region is copied and pasted in the same image.The visual results are presented in Fig.5,which shows that the proposed method achieves remarkable results.

    Figure 5:Performance evaluation of the proposed method on different CMF datasets

    In Fig.5,the first column presents the original,fake,and the detected image results from the MICC-F220 dataset.While the second column shows the original,fake,and the detected results of the MICC-F2000 dataset and the last column contains the original,manipulated,and the detected results from the CoMoFoD dataset.

    4.4 Robustness Testing

    After testing the simple CMF strategy,the presented approach is tested against the postprocessing attacks,i.e.,rotation,scaling,additive noise,and JPEG compression.According to the obtained visual results,we can say that our method also performed well under post-processing manipulations.

    4.4.1 Scaling Case

    To analyze the proposed method’s performance against scaling manipulation,where the tempered areas are scaled before pasting using the 10 different parameters of scaling,i.e.,s=91:109 with a step size of 2.Fig.6,shows the proposed method’s visual results against the scaling manipulation,which exhibits the robustness of the proposed methodology.In Fig.6,the first column presents the visual results from MICC-F220,while the second column shows the results of MICC-F2000,and the last column exhibits the visual results of the CoMoFoD dataset.

    Figure 6:Visual results of the proposed method on the scaling CMF attack

    4.4.2 Rotational Case

    The effectiveness of the introduced method is also tested under the condition of rotational manipulation,where the forged portion of the image is rotated to different angles (θ=0:10 with step 2).The visual results are presented in Fig.7,which shows that the presented approach outperforms and effectively detects the forgery under rotation manipulations.In Fig.7,the first,second,and third columns show results of the proposed method on the sample images of MICC-F220,MICC-F2000,and CoMoFoD datasets,respectively.

    4.4.3 JPEG Compression Case

    The proposed method is also evaluated against the JPEG compression attacks with a quality factor of 70 and 80 and achieved good results.The visual results are presented in Fig.8,which shows the proposed method’s capability to identify the forensic changes under JPEG compression attacks.

    Figure 7:Visual results of the proposed method on the rotational CMF attack

    Figure 8:Visual results of the proposed method on the JPEG compression attack

    In Fig.8,the visual results of the proposed method on the samples from the MICCF220,MICC-F2000,and CoMoFoD datasets are shown in the first,second,and third columns,respectively.

    4.4.4 Additive Noise Case

    The robustness of the presented method is tested under additive noise operation as well.The proposed method’s visual results are presented in Fig.9,in which images contain the Gaussian noise with zero mean and varying values of the standard deviation.According to the visual results shown in Fig.9,it can be concluded that the proposed method can effectively detect forgery under the additive noise attack.

    Figure 9:Visual results of the proposed method in the presence of additive noise CMF attack

    In Fig.9,the visual results of the proposed method on the samples from the MICC-F220,MICC-F2000,and CoMoFoD datasets are reported in the first,second,and third columns,respectively.

    4.4.5 Multiple CMF Case

    After the robustness testing,we have analyzed the proposed method’s performance on multiple CMF where when one region is copied and pasted on multiple places of an image.The multiple forged region results are presented in Fig.10,which demonstrates that the proposed method can precisely identify the images of multiple forged areas.

    Figure 10:Visual results of the proposed method in the presence of multiple-CMF attacks

    4.5 Comparisons and Discussions

    The experimental results of the proposed method against various post-processing operations are presented in Sections 4.3 and 4.4 that confirmed the efficacy of the proposed method.In this section,we have evaluated the performance of the presented technique against the state-of-the-art approaches.For the CoMoFod dataset,we have compared the proposed method’s performance with [33-35].Similarly,for the MICC-F2000 dataset,the proposed method’s performance is evaluated with the latest techniques in [36-38],and for the MICC-F220 dataset,we have compared the performance of the proposed method with [39-41].The performance comparison of the proposed method with the state-of-the-art techniques on all the datasets is reported in Tab.2.The reported results show that the proposed method exhibits better detection accuracy than the techniques in [33-41]as the method in [33]works well for rotational variations,however,exhibits lower detection accuracy for other post-processing operations.While the methods in [34,35]are robust to the CMDF under the presence of noise and compression in input samples.However,not perform well for rotational and scale variations in the input image.The frameworks in [36-38]lack the detection performance under resizing,rotation,and illumination changes attacks.Moreover,the methods in [39-41]show less CMFD accuracy under the additive noise,scaling,and light variations post-processing attacks.While the proposed method achieved promising performance under the presence of all post-processing attacks in comparison to the other CMFD methods.The main reason for the robust performance of the presented approach is due to the accurate detection and localization of circular block-based image features computed using the LTrP descriptor.Moreover,the proposed method is more proficient against post-processing operations as compared to comparative approaches,as using LTrP along with circular blocks enables to generate the rotation and scale-invariant feature vector.Additionally,features computed by LTrP exhibits more detailed image information by utilizing the direction-based relation of central pixel to its neighborhoods.Therefore,the proposed method outperforms the rest of the comparative CMFD methods.

    Table 2:Performance comparison of the proposed method with state-of-the-art approaches

    5 Conclusion

    In this article,we have proposed a block-based approach based on the DWT along with the LTrP features to detect the forensic changes from the digital images.First,a low approximation image sub-band is obtained through the DWT from the suspected image,which is further divided into circular blocks.Then,the LTrP descriptor is applied over each circular block to obtain the final feature matrix.After that,the Jeffreys and Matusita distance formula is applied over each block’s computed features to measure the similarity.Finally,RANSAC is used to remove the false matches.The proposed method exhibits promising results as compared to the stateof-the-art forgery detection methods under the occurrence of different post-processing attacks such as rotational changes,scale variations,compression,additive noise,and intensity changes.The experimental results of the proposed method also demonstrate that it performs better than other CMFD methods in terms of precision,recall,and F1-score.As the proposed method can effectively detect the single and multiple copy-move forgeries in the presence of different post-processing attacks on images.It can play a vital role in image forensics-based applications.

    Compliance with Ethical Standards

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    日本与韩国留学比较| 一本综合久久免费| 亚洲成人久久性| 亚洲综合色惰| 免费搜索国产男女视频| 国产日本99.免费观看| 国产精品一区二区免费欧美| 精品国产亚洲在线| 久久中文看片网| 国产伦人伦偷精品视频| 中出人妻视频一区二区| 韩国av一区二区三区四区| 99久久久亚洲精品蜜臀av| 亚洲综合色惰| 免费观看的影片在线观看| 内地一区二区视频在线| 国产午夜精品论理片| 91字幕亚洲| 长腿黑丝高跟| 亚洲成人久久爱视频| 国产在线精品亚洲第一网站| 欧美日韩黄片免| 国产伦精品一区二区三区视频9| 美女xxoo啪啪120秒动态图 | 欧美bdsm另类| 欧美黑人巨大hd| 精品日产1卡2卡| 国产伦在线观看视频一区| 日韩欧美国产一区二区入口| 我要看日韩黄色一级片| 最新在线观看一区二区三区| 18+在线观看网站| 国产爱豆传媒在线观看| 丰满乱子伦码专区| 亚洲成a人片在线一区二区| 国产在线男女| 久久精品人妻少妇| 嫩草影院精品99| 简卡轻食公司| 免费av观看视频| 在线观看av片永久免费下载| a级毛片免费高清观看在线播放| 久99久视频精品免费| 中文字幕久久专区| 大型黄色视频在线免费观看| 极品教师在线免费播放| 久久精品国产99精品国产亚洲性色| 搡老熟女国产l中国老女人| 波多野结衣高清无吗| 国产黄a三级三级三级人| 国产精品嫩草影院av在线观看 | 欧美高清成人免费视频www| 国产爱豆传媒在线观看| 欧美性猛交黑人性爽| 熟女人妻精品中文字幕| 亚洲国产日韩欧美精品在线观看| 日韩精品青青久久久久久| 成年女人永久免费观看视频| 免费在线观看成人毛片| 国产精品99久久久久久久久| 村上凉子中文字幕在线| 丝袜美腿在线中文| 真实男女啪啪啪动态图| 午夜福利在线观看免费完整高清在 | 国产精品,欧美在线| 午夜老司机福利剧场| 国产精品永久免费网站| 永久网站在线| АⅤ资源中文在线天堂| 中文字幕精品亚洲无线码一区| 麻豆一二三区av精品| 国产爱豆传媒在线观看| 丰满乱子伦码专区| 亚洲欧美精品综合久久99| 国产亚洲精品av在线| 人人妻,人人澡人人爽秒播| 亚洲最大成人av| 99热6这里只有精品| 国产极品精品免费视频能看的| 久久这里只有精品中国| 久久性视频一级片| 亚洲av中文字字幕乱码综合| 日韩欧美精品v在线| 深爱激情五月婷婷| 亚洲国产精品久久男人天堂| 午夜福利在线观看免费完整高清在 | 色av中文字幕| 久久香蕉精品热| 亚洲,欧美精品.| 欧美成人一区二区免费高清观看| 一本精品99久久精品77| 欧美+日韩+精品| 波多野结衣高清无吗| 一级毛片久久久久久久久女| 久久伊人香网站| 熟女电影av网| 噜噜噜噜噜久久久久久91| 免费在线观看成人毛片| 国产白丝娇喘喷水9色精品| 精品一区二区免费观看| 久久久色成人| 欧美激情国产日韩精品一区| 国产蜜桃级精品一区二区三区| 欧美成人一区二区免费高清观看| 丁香六月欧美| 97人妻精品一区二区三区麻豆| 最近中文字幕高清免费大全6 | 夜夜躁狠狠躁天天躁| 国产高清视频在线播放一区| 观看美女的网站| 欧美成人免费av一区二区三区| 精品福利观看| 色哟哟·www| 国产成人av教育| 欧美日本视频| 色综合亚洲欧美另类图片| 美女cb高潮喷水在线观看| 啦啦啦韩国在线观看视频| 又粗又爽又猛毛片免费看| 亚洲最大成人av| 中出人妻视频一区二区| 国产一区二区三区视频了| 亚洲精品粉嫩美女一区| 麻豆av噜噜一区二区三区| 亚洲欧美日韩东京热| 久久这里只有精品中国| 一级作爱视频免费观看| 欧美精品啪啪一区二区三区| 欧美黄色片欧美黄色片| 成年免费大片在线观看| 午夜两性在线视频| 美女xxoo啪啪120秒动态图 | 黄色视频,在线免费观看| 国产精品伦人一区二区| 亚洲精品在线美女| 国产精品女同一区二区软件 | 亚洲经典国产精华液单 | 免费av观看视频| av国产免费在线观看| 啪啪无遮挡十八禁网站| 窝窝影院91人妻| av天堂在线播放| 一区二区三区四区激情视频 | 亚洲狠狠婷婷综合久久图片| 国产成人啪精品午夜网站| 国产精品久久久久久久电影| 亚洲内射少妇av| 性插视频无遮挡在线免费观看| 很黄的视频免费| 国产在视频线在精品| 韩国av一区二区三区四区| 欧美三级亚洲精品| 在线免费观看的www视频| 制服丝袜大香蕉在线| 精品欧美国产一区二区三| 特大巨黑吊av在线直播| 99国产精品一区二区三区| 精品一区二区三区人妻视频| 国产私拍福利视频在线观看| 欧美在线一区亚洲| 中文字幕免费在线视频6| 欧美高清成人免费视频www| 国产精品久久久久久久电影| 国产精品一及| 18美女黄网站色大片免费观看| 欧美色欧美亚洲另类二区| www.熟女人妻精品国产| 黄色一级大片看看| 91av网一区二区| 女生性感内裤真人,穿戴方法视频| 91久久精品国产一区二区成人| 亚洲成人久久爱视频| 尤物成人国产欧美一区二区三区| 婷婷精品国产亚洲av| av中文乱码字幕在线| 精品午夜福利在线看| 岛国在线免费视频观看| 老司机福利观看| 日日摸夜夜添夜夜添av毛片 | 久久久久国内视频| 国产亚洲精品av在线| 久久这里只有精品中国| 97超级碰碰碰精品色视频在线观看| 国产精品一区二区三区四区免费观看 | 国产老妇女一区| 亚洲内射少妇av| 一级av片app| 在线观看66精品国产| 免费高清视频大片| 欧洲精品卡2卡3卡4卡5卡区| 久久欧美精品欧美久久欧美| 高清毛片免费观看视频网站| 人妻制服诱惑在线中文字幕| 亚洲av日韩精品久久久久久密| 亚洲人成网站在线播| 国产一区二区三区视频了| 国产精品女同一区二区软件 | 全区人妻精品视频| а√天堂www在线а√下载| 男女那种视频在线观看| 中文字幕人成人乱码亚洲影| 国产精品美女特级片免费视频播放器| 亚洲人成网站在线播放欧美日韩| 淫秽高清视频在线观看| 国产在线精品亚洲第一网站| 在线观看一区二区三区| 日本撒尿小便嘘嘘汇集6| 久9热在线精品视频| 韩国av一区二区三区四区| 欧美午夜高清在线| 婷婷丁香在线五月| 嫩草影视91久久| 色播亚洲综合网| 国产精品野战在线观看| 他把我摸到了高潮在线观看| 午夜激情欧美在线| 又紧又爽又黄一区二区| 男女之事视频高清在线观看| 少妇的逼水好多| 热99在线观看视频| 桃色一区二区三区在线观看| 三级国产精品欧美在线观看| 免费搜索国产男女视频| 成人永久免费在线观看视频| 日本黄色片子视频| 欧美一区二区精品小视频在线| 欧美zozozo另类| 中文字幕久久专区| 国产精品一及| 性欧美人与动物交配| 999久久久精品免费观看国产| 少妇裸体淫交视频免费看高清| 国产综合懂色| 男女下面进入的视频免费午夜| 国产真实乱freesex| 日韩精品中文字幕看吧| 最近视频中文字幕2019在线8| 老女人水多毛片| 无遮挡黄片免费观看| 嫁个100分男人电影在线观看| 中文资源天堂在线| 少妇的逼好多水| 免费黄网站久久成人精品 | 婷婷丁香在线五月| 亚洲真实伦在线观看| 亚洲精品久久国产高清桃花| 国产毛片a区久久久久| 国产成人福利小说| 国产 一区 欧美 日韩| 国产午夜精品久久久久久一区二区三区 | 如何舔出高潮| 亚洲av成人不卡在线观看播放网| 精品欧美国产一区二区三| 国产毛片a区久久久久| 色综合站精品国产| 成人美女网站在线观看视频| 国产精品久久久久久精品电影| 夜夜夜夜夜久久久久| 亚洲电影在线观看av| 一区二区三区四区激情视频 | 岛国在线免费视频观看| 91狼人影院| 国产欧美日韩精品亚洲av| 最新在线观看一区二区三区| 一本综合久久免费| 无遮挡黄片免费观看| 一a级毛片在线观看| 简卡轻食公司| 免费在线观看日本一区| 美女被艹到高潮喷水动态| 亚洲国产欧洲综合997久久,| 亚洲七黄色美女视频| 午夜免费激情av| 久久天躁狠狠躁夜夜2o2o| 午夜激情欧美在线| 国产色婷婷99| 婷婷精品国产亚洲av| 波野结衣二区三区在线| 亚洲电影在线观看av| 欧美bdsm另类| 嫩草影院精品99| 欧美成狂野欧美在线观看| 精品久久久久久久人妻蜜臀av| 亚洲乱码一区二区免费版| 亚洲黑人精品在线| 亚洲天堂国产精品一区在线| 日本黄大片高清| 少妇裸体淫交视频免费看高清| 在线播放国产精品三级| 三级国产精品欧美在线观看| 亚洲乱码一区二区免费版| 欧美成人一区二区免费高清观看| 99精品在免费线老司机午夜| 亚洲一区二区三区色噜噜| 亚洲真实伦在线观看| 超碰av人人做人人爽久久| 国产aⅴ精品一区二区三区波| 午夜影院日韩av| а√天堂www在线а√下载| 老女人水多毛片| 国语自产精品视频在线第100页| eeuss影院久久| 18美女黄网站色大片免费观看| 色综合婷婷激情| 日本 av在线| 国产亚洲av嫩草精品影院| 99久久99久久久精品蜜桃| 男女做爰动态图高潮gif福利片| 亚洲国产色片| 亚洲人成网站在线播| 亚洲 欧美 日韩 在线 免费| 亚洲av日韩精品久久久久久密| 国产美女午夜福利| 国产精品人妻久久久久久| 美女免费视频网站| 午夜精品久久久久久毛片777| 国产成+人综合+亚洲专区| 久久精品国产自在天天线| 久久久久久久精品吃奶| 乱码一卡2卡4卡精品| 亚洲真实伦在线观看| 18禁裸乳无遮挡免费网站照片| 国内精品久久久久精免费| 精品人妻偷拍中文字幕| 欧美性猛交╳xxx乱大交人| 深爱激情五月婷婷| 亚洲av电影不卡..在线观看| 免费在线观看影片大全网站| 制服丝袜大香蕉在线| 国产欧美日韩精品一区二区| 亚洲美女黄片视频| 国产一区二区激情短视频| 免费观看的影片在线观看| 人人妻人人看人人澡| 日韩免费av在线播放| 91久久精品国产一区二区成人| 啦啦啦韩国在线观看视频| 亚洲欧美日韩无卡精品| 亚洲欧美日韩高清专用| 欧美激情久久久久久爽电影| 男人舔女人下体高潮全视频| 成人性生交大片免费视频hd| 国产精品亚洲美女久久久| 久久婷婷人人爽人人干人人爱| 久9热在线精品视频| 国产免费男女视频| 久久久久久久久久黄片| 国产麻豆成人av免费视频| 老熟妇乱子伦视频在线观看| 国内精品久久久久精免费| 久久香蕉精品热| 综合色av麻豆| 国产久久久一区二区三区| 久久久久亚洲av毛片大全| 亚洲欧美日韩卡通动漫| 丁香六月欧美| 久久国产乱子伦精品免费另类| 好男人在线观看高清免费视频| 国产成+人综合+亚洲专区| 国产精品av视频在线免费观看| 好男人在线观看高清免费视频| 久久久久国产精品人妻aⅴ院| 久久精品影院6| 99久国产av精品| 亚洲av成人不卡在线观看播放网| 黄色视频,在线免费观看| av专区在线播放| 精品国产三级普通话版| 欧美色欧美亚洲另类二区| 麻豆成人av在线观看| 中文字幕熟女人妻在线| 亚洲不卡免费看| 日韩免费av在线播放| 欧美黑人巨大hd| 中文字幕高清在线视频| 亚洲片人在线观看| 亚洲成a人片在线一区二区| 日韩欧美 国产精品| 嫩草影院新地址| 国产在线男女| 色吧在线观看| 欧美日韩亚洲国产一区二区在线观看| 精品人妻偷拍中文字幕| 男女视频在线观看网站免费| 亚洲三级黄色毛片| 欧美日韩综合久久久久久 | 精品国产亚洲在线| 久久亚洲真实| 国产精品野战在线观看| 久久婷婷人人爽人人干人人爱| 久99久视频精品免费| 亚洲一区二区三区色噜噜| 少妇裸体淫交视频免费看高清| 老司机午夜福利在线观看视频| 国产一区二区三区视频了| 欧美激情在线99| 国内精品久久久久精免费| 99久久精品热视频| 如何舔出高潮| 久久精品人妻少妇| 国产亚洲av嫩草精品影院| 伊人久久精品亚洲午夜| 亚洲内射少妇av| 直男gayav资源| 2021天堂中文幕一二区在线观| 很黄的视频免费| 精品国产亚洲在线| 搡老妇女老女人老熟妇| 男女那种视频在线观看| 18禁黄网站禁片免费观看直播| 国产视频内射| 国产精品久久久久久久电影| 狠狠狠狠99中文字幕| 在线观看舔阴道视频| 国产精品久久久久久精品电影| 最后的刺客免费高清国语| 在线观看66精品国产| 日本免费a在线| 看免费av毛片| www.色视频.com| 成年女人毛片免费观看观看9| 国产精品久久久久久亚洲av鲁大| 久久久久久久精品吃奶| 欧美日本视频| 亚洲无线在线观看| 亚洲欧美日韩高清在线视频| 国产私拍福利视频在线观看| 亚洲不卡免费看| 搡老岳熟女国产| 国产美女午夜福利| 一级黄色大片毛片| 99国产精品一区二区蜜桃av| av专区在线播放| 一进一出好大好爽视频| 中文字幕精品亚洲无线码一区| 亚洲精品在线美女| 两个人视频免费观看高清| 中文字幕av在线有码专区| 久久中文看片网| 性欧美人与动物交配| 久久热精品热| 男插女下体视频免费在线播放| 国产精品99久久久久久久久| 欧美性猛交黑人性爽| 看免费av毛片| www.色视频.com| 色av中文字幕| 亚洲美女黄片视频| 99热6这里只有精品| 成人av一区二区三区在线看| 性色avwww在线观看| 两性午夜刺激爽爽歪歪视频在线观看| 欧美性猛交╳xxx乱大交人| 在线国产一区二区在线| 亚洲欧美日韩卡通动漫| 在线播放无遮挡| 欧美黄色片欧美黄色片| 国产精品人妻久久久久久| 一夜夜www| 又紧又爽又黄一区二区| 可以在线观看的亚洲视频| 色在线成人网| 又爽又黄a免费视频| 99在线人妻在线中文字幕| 亚洲无线观看免费| 亚洲五月天丁香| 不卡一级毛片| 国产视频内射| 久久精品久久久久久噜噜老黄 | av福利片在线观看| 99精品久久久久人妻精品| 午夜影院日韩av| 日本在线视频免费播放| 亚洲精品粉嫩美女一区| 天天一区二区日本电影三级| 日韩高清综合在线| 嫩草影视91久久| 婷婷丁香在线五月| 国产高清视频在线观看网站| 在线播放无遮挡| 啪啪无遮挡十八禁网站| 日韩欧美 国产精品| 又爽又黄无遮挡网站| 一进一出好大好爽视频| 中文字幕av在线有码专区| 亚洲av熟女| 亚洲第一区二区三区不卡| 免费在线观看亚洲国产| 男女下面进入的视频免费午夜| 亚洲在线自拍视频| 日韩欧美免费精品| 久久香蕉精品热| 非洲黑人性xxxx精品又粗又长| 久久精品久久久久久噜噜老黄 | 国产高清视频在线播放一区| 蜜桃亚洲精品一区二区三区| 久久中文看片网| 色综合婷婷激情| 亚洲黑人精品在线| 12—13女人毛片做爰片一| 国产69精品久久久久777片| 丰满的人妻完整版| 精品久久久久久久人妻蜜臀av| 女人十人毛片免费观看3o分钟| 不卡一级毛片| 久久草成人影院| 久久中文看片网| 在线播放无遮挡| 欧美潮喷喷水| 日本免费a在线| 成人特级黄色片久久久久久久| 老司机午夜十八禁免费视频| 国产精品av视频在线免费观看| 免费人成在线观看视频色| 精品免费久久久久久久清纯| 国产一区二区三区视频了| 成人鲁丝片一二三区免费| 国产91精品成人一区二区三区| 少妇的逼水好多| 91在线精品国自产拍蜜月| 国产精品亚洲一级av第二区| 午夜激情福利司机影院| 精品一区二区免费观看| 99久久99久久久精品蜜桃| 一区二区三区免费毛片| 人人妻,人人澡人人爽秒播| 久久伊人香网站| 成人特级av手机在线观看| 国产精品国产高清国产av| 久久久色成人| 五月伊人婷婷丁香| 亚洲久久久久久中文字幕| 精品久久国产蜜桃| 一个人看的www免费观看视频| 精品熟女少妇八av免费久了| 午夜福利欧美成人| 窝窝影院91人妻| 一区二区三区四区激情视频 | 国产v大片淫在线免费观看| 亚洲av美国av| 久久精品国产亚洲av涩爱 | 亚洲自拍偷在线| 一本精品99久久精品77| 免费看美女性在线毛片视频| 亚洲 欧美 日韩 在线 免费| 欧美丝袜亚洲另类 | 日本 欧美在线| 嫩草影视91久久| 99久久成人亚洲精品观看| or卡值多少钱| 欧美区成人在线视频| 亚洲成a人片在线一区二区| 黄片小视频在线播放| 亚洲国产日韩欧美精品在线观看| 男人的好看免费观看在线视频| 村上凉子中文字幕在线| 天堂网av新在线| 亚洲av熟女| 中文字幕av成人在线电影| 丰满人妻熟妇乱又伦精品不卡| 亚洲最大成人av| 日本成人三级电影网站| 亚洲一区高清亚洲精品| 亚洲av成人av| 伦理电影大哥的女人| 无人区码免费观看不卡| 国产免费av片在线观看野外av| 国产亚洲精品av在线| 国产亚洲av嫩草精品影院| 18禁黄网站禁片免费观看直播| 欧美潮喷喷水| 国产精品久久视频播放| 自拍偷自拍亚洲精品老妇| 精品久久久久久久久久免费视频| av视频在线观看入口| 91午夜精品亚洲一区二区三区 | 成年女人看的毛片在线观看| 亚洲精品456在线播放app | 国产成人av教育| 国产私拍福利视频在线观看| 一个人看视频在线观看www免费| 国产真实乱freesex| 九九久久精品国产亚洲av麻豆| 91九色精品人成在线观看| 精品欧美国产一区二区三| 国产一区二区在线观看日韩| 国产在线男女| 日本一二三区视频观看| eeuss影院久久| 色综合婷婷激情| 给我免费播放毛片高清在线观看| 五月伊人婷婷丁香| 中文字幕高清在线视频| 午夜福利视频1000在线观看| 91av网一区二区| 成人精品一区二区免费| www.www免费av| 久久国产乱子免费精品| 国产激情偷乱视频一区二区| 性色avwww在线观看| 18禁黄网站禁片免费观看直播| 99久久精品一区二区三区| 午夜福利在线观看吧| 亚洲乱码一区二区免费版| 免费人成在线观看视频色| 欧美成人一区二区免费高清观看| 日韩成人在线观看一区二区三区| 看免费av毛片| 日韩欧美精品免费久久 | 久久人妻av系列| 亚洲七黄色美女视频| 波多野结衣高清无吗| 久久久精品大字幕| 中亚洲国语对白在线视频| 久久国产乱子伦精品免费另类|