• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Neutrosophic Rule-Based Identity Verification System Based on Handwritten Dynamic Signature Analysis

    2021-12-15 08:13:44AmrHefnyAboulEllaHassanienandSamehBasha
    Computers Materials&Continua 2021年11期

    Amr Hefny,Aboul Ella Hassanien and Sameh H.Basha,*

    1Department of Mathematics,Faculty of Science,Cairo University,Giza,12613,Egypt

    2Faculty of Computers and Information,Cairo University,Giza,12613,Egypt

    Abstract:Identity verification using authenticity evaluation of handwritten signatures is an important issue.There have been several approaches for the verification of signatures using dynamics of the signing process.Most of these approaches extract only global characteristics.With the aim of capturing both dynamic global and local features,this paper introduces a novel model for verifying handwritten dynamic signatures using neutrosophic rule-based verification system(NRVS)and Genetic NRVS(GNRVS)models.The neutrosophic Logic is structured to reflect multiple types of knowledge and relations among all features using three values:truth,indeterminacy,and falsity.These three values are determined by neutrosophic membership functions.The proposed model also is able to deal with all features without the need to select from them.In the GNRVS model,the neutrosophic rules are automatically chosen by Genetic Algorithms.The performance of the proposed system is tested on the MCYT-Signature-100 dataset.In terms of the accuracy,average error rate,false acceptance rate,and false rejection rate,the experimental results indicate that the proposed model has a significant advantage compared to different well-known models.

    Keywords:Biometrics;online signature verification;neutrosophic rule-based verification system

    1 Introduction

    Biometrics is a wide research field that addresses distinguishing people according to recognizing some measurable anatomical or behavioral characteristics.Biometrics have been gradually replacing traditional methods that recognize people according to what they own,such as cards or keys,or what they know,such as passwords [1].Iris,face,odor,fingerprint,ear structure,and hand geometry are examples of anatomical characteristics,while voice,walking manner,or signature are behavioral characteristics [2,3].These biometric modalities should be worldwide,unchangeable,exclusive,and attainable.However,each biometric modality does not need to meet these criteria.Each modality has its pros and cons,so what makes a biometric suitable or not is the application,the biometric itself and its collected-in circumstances.Signature biometric is also not ideal for all cases,but it is very specific for state,civil and commercial transactions.

    Signature verification is the process where the biometric algorithm aims to validate a person’s stated identity by matching the signature sample submitted to one or more reference signatures previously entered [4].Predominantly,due to the time and effort needed to verify the manual signature,there is no verification where a signature is needed.Automating the process of signature verification focuses on improving the existing situation and avoiding forgery [5].Automatic signature verification has two main research areas;online and offline signature verification;based on how signatures are collected.In verifying offline signature,the signature is scanned to depict the digital image.In contrast,the online signature verification uses a digitizing tablet to capture pen motions when signing [6].Even though online signatures are still far from normal,the dynamics of writing that are not available in the 2-D representation of the signature are captured in addition to the form of the signature.Therefore,the online signature is hard to hack;more attention is given to online signature over the corresponding offline.Many methods have been employed for verification techniques such as probabilistic classifiers,dynamic time warping,deep neural networks [7],hidden Markov models,and nearest neighbor classifiers [5,8,9].

    In signature verification,rule-based verification/classification approaches are widely used.Any classification system that uses the IF-THEN rules for verification/classification purposes can be referred to as a rule-based verification/classification system.Typically,any IF-THEN rule is a term on the left-hand side (LHS) and right-hand side (RHS) where LHS is a series of satisfying conditions to derive RHS-represented conclusion.For rule-based verification/classification,the LHS of the rule predominantly consists of a conjunction of attribute checks,while its RHS is a class label(Genuine or forgery).Fuzzy sets and fuzzy logic are used in the Fuzzy Rule-based Classification system (FRBCs) to represent and model various types of information about the problem at hand,which is online signature verification in our case.FRBCs have received significant attention among biometric researchers due to the good behavior in the real-time datasets and have been applied effectively to a wide variety of problems in multiple domains [10,11].The nonlinearity of fuzzy rule-based classifiers helps reduce possible verification errors.Compared with other classifiers,like neural network and support vector machine,FRBCs have the more significant benefit of offering consistency and avoiding learning time.Consequently,FRBCs have been applied in online signature verification and achieved promising results [11].

    This paper presents Neutrosophic rule-based verification/classification system (NRVS) to verify online-signature.

    NRVS extends the fuzzy rule-based verification/classification by defining each logical variable using its degrees of truth,indeterminacy,and falsity.Instead of fuzzy Logic,the antecedents and descendants of the rules are composed of neutrosophical logic arguments.To the best of our knowledge,Neutrosophic logic was never used in the identity verification of online signatures.Further,for improving our NRVS model’s verification performance,the genetic algorithm is employed for refining and optimizing the neutrosophic “IF-THEN” rules.Further,the proposed model is capable to treat global and regional features as well as vague features that cannot be categorized as global or regional features.The strength in the NRVS is due to usage of the indeterminacy term introduced by the neutrosophic logic.

    The rest of the paper is structured as follows:A summary of the previous work is introduced in Section 2.In Section 3,theoretical background about Neutrosophic Logic and Neutrosophic Set is introduced.Further,the proposed NRVS model and its hybridization with Genetic Algorithms,GNRVS are introduced in Section 4.In Section 5,the experimental results and discussions are introduced.Finally,some concluding remarks and future directions are given in Section 6.

    2 Previous Work

    In studying online signature,one has to address the following concepts:registration and acquisition of data,preprocessing,feature selection and extraction,classification,and verification [12].There are two perspectives in the registration and data collection phases,reference-based and model-based.Depending on the signature structures stored in the database,a set of models is generated for each signer or statistical model,respectively.Most perspectives do some preprocessing in the preprocessing phase before extracting signature features such as stroke concatenation,resampling,smoothing,and normalization [4].

    There are three strategies in the extraction of features:extraction based on features that rely on global features as in [13-15],function-based extraction which relies on local features as in [16],and regional approach extraction as in [11].Several methods proposed mixture of all perspectives.Online signature is a dynamic multi-dimensional signal which synthesis all approaches and has attained good results.Some approaches pay more attention to one element such as signal,while other methods focus on another issue such as time [17].

    In classification and verification phase,researchers proposed strategies that calculate a signature similarity score.They match the score with a global or user-dependent tolerance to achieve the verification outcome.There exist three matching perspectives here:global [13],local [6,16,18]and a combination of local and global [14,15,18],based on the features used in the preceding phase.Dynamic Time Warping (DTW) [19-21]was the most popular and effective local form used during the verification process where the signatures are expressed by each signatory as a series of copies and was the champion of the first verification contest [22].The authors in [19]replaced the Euclidean distance with the Mahalanobis distance to boost DTW-based verification efficiency.Like the Euclidean distance,the Mahalanobis distance measures can take the differences between different characteristics into account and place weights on various characteristics.Moreover,the Hidden Markov Model (HMM) [23,24]is a very popular and effective local method used in this phase for each signer to derive a statistical model.

    In the literature,several strategies were proposed to choose the best features combination to mitigate the error in verification [6,25].

    Experimentally,in [25],the authors have shown that the speed and the curvature change are the most valuable features,and the pressure does not significantly improve accuracy.On the other hand,in [6]the local features are combined with the pen pressure feature.

    Many approaches have been suggested in the literature for approximating the time functions accompanying the signing procedure.The Fourier Transform was applied in [17],whereas the Wavelet Transform was introduced in [26,27].In [6,12]Legendre Orthogonal Polynomials were used.In [17],a fixed-length approximation of the signatures is presented using the Fast Fourier Transform.Yanikoglu et al.used the Fourier domain in their ability to model a compact online signature using a certain number of signature coefficients to generate fast matching algorithms regardless of the size of the signature.Nevertheless,they revealed that much of the signature’s timing information is eliminated by sampling,which is usually used to normalize the signature size and that information loss decreases verification efficiency.Because of this regional featurebased viewpoint (Fourier descriptors),the same datasets’error rates are more significant than function-based perspectives.The results experimentally demonstrated that combining this insight with the DTW method decreases the error rate.

    Fuzzy logic approaches are used in online signature verification.For example,in [15],researchers selected a single feature set per signer.They determined weights of importance for features chosen in evolution.However,their approach did not take the number of users in the dataset into consideration,and they only used the values of global features.In [28],the metaheuristic gravitational search algorithm was employed for the discovery and tuning of fuzzy rule parameters for the appropriate features.In [11],researchers used signature partitioning that is formed by a combination of vertical and horizontal sections of the signature.They used the one-class neuro-fuzzy classifier,whose structure is decided for each user individually without using forgeries.

    Neutrosophy has emerged strongly in the scientific world in the last few years.In [29],authors introduce Neutrosophic Rule-based Classification (NRBCS),which extends the fuzzy rulebased classification (FRBCS).Their model obtained results better than the Fuzzy Rule-Based Classification system.Moreover,in terms of computational time,NRBCS is faster than FRBCS because NRBCS does not require much preprocessing as FRBCS.

    3 Neutrosophic Logic and Neutrosophic Set:Theoretical Background

    The fuzzy set (FS) theory was developed by Zadeh in mid-1960s,to manage fuzzy,and vague data.It is defined byμA(x) ∈[0,1],a membership degree,for every elementxinA[30,31].FS theory received some extensions such as intuitionistic FS [32],interval-valued FS [33],and interval-valued intuitionistic FS.Every theory of them treats only one side of inexactness.

    For example,the FS theory mismanages incompleteness and contradiction in the information.Therefore,the neutrosophic set theory was designed to manage incomplete and also incompatible data.Besides,the neutrosophic set theory is a massive framework that aims to generalize all sets’principles,it is a generalization of the classic set theory,FS theory,FS with interval values,intuitionist FS,and intuitionist FS with interval values [34].

    Smarandache introduced neutrosophy in 1995,which deals with the origin,scope,and nature of neutralities,as well as their experiences with specific mental visions [35].The theory takes into account three concepts:

    (a)<A>,the idea.

    (b)<Anti-A>,its negation.

    (c)<Neut-A>,a wide range of “neutralities”,to support all ideas between the idea and its negation excluding these extremes.

    Both<Neut-A>and<Anti-A>are shortened to<Non-A>,where each of<Anti-A>and<Non-A>is used in balancing<A>[35].

    3.1 Neutrosophic Set

    Smarandache proposed basic principles for the neutrosophic system in [36]and Salama et al.[37].They have put a logical foundation as well as mathematically analyzed the neutrosophic phenomena to construct new branches of mathematics based on neutrosophic logic.

    Mathematically,let thex(T,F,I) variable be an element in the set as follows:tis true in the set,fis false,andiis indeterminate in the set,wheret,f,andiare real numbers elements inT,F,andIsets,respectively,with no limit toT,F,I,or their totaln=t+f+i[36].

    For a space of objects,X,letx∈Xbe a generic component.A neutrosophic subsetAofXis distinguished by three membership functions:truth (TA),a falsityFA(x),and an indeterminacy(IA).TA(x),FA(x),andIA(x) are real intervals standard of non-standards over ]-0,1+[ (i.e.,TA,IA,FA(x):X→]-0,1+[).There is no limitation on the sum ofTA(x),FA(x),andIA(x),so,-0≤supTA(x)+supFA(x)+supIA(x)≤3+.

    Neutrosophic set operators can be created by more than one way [36]:

    · Complement:The complementof a neutrosophic setA,is defined by [34-36]:

    · Union:The unionC=A∪Bof two neutrosophic setsAandBis defined as follows [34-36]:

    TC(x)=TA(x)⊕TB(x)?TA(x)⊙TB(x),

    FC(x)=FA(x)⊕FB(x)?FA(x)⊙FB(x),

    IC(x)=IA(x)⊕IB(x)?IA(x)⊙IB(x).

    forx∈X.· Intersection:The intersectionC=A∩Bof two neutrosophic sets is defined by [34-36]:

    TC(x)=TA(x)⊙TB(x),

    FC(x)=FA(x)⊙FB(x),

    IC(x)=IA(x)⊙IB(x).

    forx∈X.

    · Containment:C=A?B,a neutrosophic setAis subset of another neutrosophic setBif and only if [35,36]:

    infTA(x)=infTB(x);supTA(x)=supTB(x),

    infFA(x)=infFB(x);supFA(x)=supFB(x).

    infIA(x)=infIB(x);supIA(x)=supIB(x)

    forx∈X.· Difference:The difference of two neutrosophic setsC=ABis defined by [35,36]:

    TC(x)=TA(x)?TA(x)⊙TB(x),

    FC(x)=FA(x)?FA(x)⊙FB(x),

    IC(x)=IA(x)?IA(x)⊙IB(x).

    forx∈X.

    3.2 Neutrosophic Logic

    Neutrosophic logic has been constructed to serve mathematically building models containing uncertainty of many different types ambiguity or vagueness,inconsistency or contradiction,redundancy or incompleteness,and incompleteness [36,38].Neutrosophica logic is constructed such that each hypothesis is assumed to have a proportion of the truth in theTsubset,a proportion of the falsification in theFsubset,and a proportion of the indeterminacy in theIsubset,whereT,F,Iare real subsets of ]-0,1+[,wheresupT=t_sup,infT=t_inf,supF=f_sup,infF=f_inf,supI=i_sup,infI=i_inf,n_sup=t_sup+f_sup+i_sup,andn_inf=t_inf+f_inf+i_inf[39-41].

    T,F,andIare called theneutrosophic elements,and these elements refer to the values of the truth,falsehood,and indeterminacy respectively [42].Standard real interval [0,1]forT,I,andFis easy to use in practical applications than the nonstandard unit interval ]-0,1+[ [39,43].T,I,andFsets are not required to be intervals but can be either discrete or continuous subsets,whether finite or infinite,countable or uncountable,scalar or not,an intersection or union of various subsets [36,44].In a static manner,the componentsT,FandIare subsets,but dynamically,these are set-valued vector functions/operators dependent on space,time,and other many parameters [36].

    4 The Proposed Neutrosophic Rule-Based Verification System

    Fig.1 shows the architecture of the proposed model for verifying signatures,and it consists of four phases:feature extraction,Neutrosophic,creating rules,and verification phases.These phases and their characteristics along with the architecture of the proposed model are described in more details in the following sections.

    4.1 Extracting Information Phase

    Valuable information is collected,during this phase,in order to implement NRVS through input data and to extract the following information:

    · Number of attributes used.

    · The maximum and minimum value of each attribute.

    · The number and names of classes.

    4.2 Neutrosophication Phase

    Our proposed Neutrosophic Rule-based Verification System (NRVS) utilizes the Neutrosophic Logic to generalize the Fuzzy Rule-based Verification scheme.In NRVS,the origins and consequences of the “IF-THEN”principles are all neutrosophic logic statements.There are three phases on the NRVS:

    (a) Neutrosophication:Implementation of the knowledge base (KB) in neutrosophic logic by translating raw data using the three neutrosophic features:truthmembering,falsitymembering,and indeterminacy membering.

    (b) Inference Engine:To achieve a neutrosophic output,KB and the neutrosophic “IF-THEN”implication rules are implemented,and

    (c) Deneutrosophication:Use three functions similar to those used by neutrosophisation,transforms the neutrosophic output of the second phase to a crisp value.

    The KB used above contains the available neutrosophic “IF-THEN” rules mode.After that,the knowledge base uses neutrosophic sets to collect the neutrosophic rule semantics.

    Figure 1:The architecture of the proposed neutrosophic rule-based verification system

    The following membership functions are specified:

    (a) Truth membership function.

    (b) Falsity membership function.

    (c) Indeterminacy membership function.

    Such membership functions will be drawn using the function of the Fuzzy Trapezoidal membership.In the neutrosophic type,three neutrosophic components are required to reflect each value for each feature.We applied three membership functions to each value in each attribute of the dataset in order to get those three components.

    4.3 Creation of Rules Phase

    The aim,here,is to develop rules to be used predominantly during the verification phase.Suppose that the data is in the formX={x1,x2,...,xn},sincexiis theith instance andnis the overall count of instances.Every instance has just one class label denotingci∈{1,2,...,C},sinceCrefers to the overall count of classes.The first step is to divide the dataset into training data(Xtraining) which has labelled instances and testing data (Xtesting) that have unlabelled instances.During this phase,the training and testing data produce exact neutrosophic rules.In NRVS,in each neutrosophic rule,each attribute has three components that define the three degrees of truth,indeterminacy,and falsehood.

    4.4 Verification Phase

    The matrix of testing is built in this phase without class labelling.For each testing rule (xt∈Xtesting),the percentage of intersections between the test rule and other training rules should be determined (Xtraining) (see Fig.1),and these percentages are denoted byP={p1,p2,...,pq},whereqis the number of rules in the training set andpiis the matching percentage betweenxtand the training rulexi.The testing rule is assigned the training rule-class label,which has a maximum intersected percentage.When there is no overlap of at least 50% between the training rules and the existing testing rules (pi<0.5,?i=1,...,q),the class label is determined from the exact rules set (i.e.,annotated).Afterward,this testing rule is added to the training rules instead of testing rules.

    (Xtraining=Xtraining∪xt).Finally,the test matrix that projected class labels is contrasted with the same matrix that currently carries class labels.To evaluate our model,the confusion matrix is computed.Different terms,such as True Positive (TP),True Negative (TN),False Positive (FP),and False Negative (FN),can be computed from the confusion matrix.

    An example of comparison with neutrosophic and fuzzy classifiers is given by Fig.2.As shown,with two classes,the classes may be linearly and separable;this is clear in Fig.2b,in which the fuzzy classifier output is 65 (i) in the range (0 anda) 100% is Class I,and (ii) in the range (bandc) 100% is Class II.Practically,there is an overlapping zone between classes,as illustrated in Fig.2a (the zone with the gray color).In this region,where an indeterminacy degree is found,there are three potential outcomes:(i) Class I has a high membership value in(aand (a+b)/2) range,(ii) Class II has a high membership value in ((a+b)/2 andb) range,and (iii) Both Class I and Class II have the same membership value as (a+b)/2.Additionally,as shown in the overlapping area between the two classes,the membership function falls until it arrives at (a+b)/2 point where the membership function value is the same for the two classes.The membership function falls until it arrives at (a+b)/2 point where the membership function value is the same for the two classes.Fig.2c depicts the neutrosophic class truth component,and the output is 100% belongingness to class I in (0 anda) range,and 100% belongingness to class II in (bandc) range,which is similar to the output of the fuzzy classifier.Further,in Fig.2c,there is no overlapping belongs to the component of truth membership while the indeterminacy and falsity components exclusively cover the overlapping area of the neutrosophic classifier as shown in Figs.2d and 2e,respectively.As a result,the fuzzy classifier is not concerned with the indeterminacy of the data.Conversely,two additional components of the neutrosophic classifier manage the overlap area between the two classes.

    4.5 Illustrative Example

    In this example,the steps of the NRVS model will be illustrated.Assume we have two classes (C1and C2),each one has five instances,and each instance is represented by only two features f1and f2(see Tab.1).As seen,for the first two attributes,the minimum is 10.0 and 4.0,respectively,and for the first two attributes,the maximum is 26.0 and 16.0,respectively.In Tab.1,the testing data is written in red color,while the training part is in black.

    All values in the dataset are converted into a neutrosophical space in the neutrosophication phase.Therefore,each value is expressed by three values (t,i,f) using theT,I,andFneutrosophcal membership functions.After converting it to neutrosophical space,as shown in Tab.2 each crisp value is converted to neutrosophic as follows:<tlow,tMedium,tHigh>,<iLow,iMedium>,<fLow,fMedium,fHigh>.As an example the crisp value 16.0 is converted to<0.0,0.5,0.0>,<0.5,0.0>,<0.25,0.75,1.0>.

    Figure 2:A comparison between NRVS and fuzzy verification.(a) The triangular fuzzy membership function of classes I,II;(b) A fuzzy verification;(c),(d),and (e) Represent the neutrosophical truth,falsity,and indeterminacy parts,respectively

    Table 1:The data for our illustrative example

    Table 2:Samples of the data of our example after converting it into the neutrosophic space

    The rules of training and test data are obtained in the neutrosophic space in the 3rd phase(i.e.,rules generation phase) (see Tab.2).The training rules are employed for verifying/classifying testing data.

    Samples of the training rules are as follows:

    where the rule [3,5,8][3,5,8]→classC2means:iff1is [High,0,0]andf2is [Low,0,0]then the class label isC2.The testing rules are as follows:

    Lastly,in the verification/classification phase of the NRVS model,all training rules will be applied to match each rule in the test data.(see Fig.1).To do this matching,we used the Euclidean distance.The testing rule is allocated to the class which has the smallest distance from the testing rule by the training rule.Hence the class label of the first and second testing rules areC1,and as shown,four instances are correctly classified,and only the first testing instance is misclassified.

    4.6 GNRVS:Hybrid Verification System Depending on Genetic Algorithm and Neutrosophic Logic

    The proposed GNRVS combines the Genetic Algorithm (GA) and NRVS model.The GA is used in the NRVS model to refine the neutrosophic “IF-THEN” rules [45].Then a new phase is introduced in this model,and it is called the Michigan-based Genetic-based Machine Learning Phase.The rules are automatically generated in this phase,and those rules may have redundant rules.Consequently,GA is used to search the space for rules and determine the most appropriate rules and delete obsolete rules.

    The proposed GNRVS model has the same steps as the NRVS model,but a new phase is called the Genetic-based machine learning phase.In this phase,GA is used for refining linguistic rules in the KB.Algorithm 1 summarizes the steps of the GNRVS model.

    Algorithm 1:Steps of the proposed GNRVS for generating a set of rules Input:Initialize N linguistic rules and Rreplace replaced rules Output:A set of selected rules 1) Generate a set of initial population 2) Assign values to Pc and Pm 3) Evaluate the fitness value for all solutions 4) repeat 5) Using crossover and mutation for generating new population 6) Evaluate the fitness value for each new solution 7) Select the rules/solutions that obtain the best fitness values 8) until end condition

    5 Experimental Results and Discussions

    Three experiments have been carried out in this paper.In the first (in Section 5.1),the proposed NRVS model is compared with conventional classifiers [46].This section has two aims.The first aim is to verify the handwritten dynamic signature,without partitioning,by the proposed NRVS.The second aim is to test the capability of the proposed system to work with uncertain data with neither feature selection nor pre-processing tools.The second experiment (in Section 5.2)aims to evaluate the NRVS model by comparing its results with another rule-based classification system such as the Fuzzy Rule-based Verification System (FRVS) which is one of the most wellknown rule-based verification/classification systems.The goal of the third experiment (Section 5.3),with the use of the hybrid verification method (GNRVS),is to enhance the results obtained from the first two experiments for the verification of handwritten signatures using dynamic features.

    Experiments are carried out usingIntel(R)_Core(TM)i7-4790_CPU@3.6GHzFrequency,32.0 GB ram,2 TB Hard Disk Drive,and 64-bit Windows 10,and algorithms are self-coded and written in Python and Java programming languages.

    In our experiments,we used the MCYT-Signature-100 dataset.This dataset includes ten-print fingerprint and online signature modes for each person registered in the dataset (330 persons).It contains many samples of each modality under various control levels to deal with the inevitable variability of each function during the registration process,as outlined below.The signatures were acquired using Device:WACOM Intuos (Inking pen)x,y,pressure,pen azimuth,and pen altitude signals at 100 samples per sec.This dataset has 16500 signatures:8250 genuine signatures (each person has 25 signatures) and 8250 forgeries (each person has 25 signatures).Figs.3a and 4a show an example from MCYT-Signature-100 dataset of a genuine signature and its corresponding forgery one,respectively.While Figs.3b and 4b show some extracted attributes from the signatures in Figs.3a and 4a,respectively.

    Figure 3:An example of signature shape and the extracted features of a genuine signature from MCYT.(a) A sample of a genuine signature shape (b) X,Y trajectories,pressure,azimuth and elevation attributes

    Figure 4:An example of signature shape and the extracted features of a forgery signature from MCYT.(a) A sample of a forgery signature shape (b) X,Y trajectories,pressure,azimuth and elevation attributes

    The results of a 10×10-fold cross-validation were obtained in all experiments.The dataset samples were divided,in a random manner,intoksubsets (k=10) of the same lengths,and the experiment was performed ten times.One sub-set was used for each run for model evaluation and the other subsets were used for model training.This process has been replicated five times over.The average of these 10×10 experimental tests would yield the final results.

    5.1 NRVS vs.Conventional Classifiers

    In this experiment,the proposed NRVS model is evaluated by comparing the results of it with(i) six well-known learning algorithms,namely,Multilayer Perceptron (MLP) [47],Support Vector Machines (SVM) [48],Linear Discriminant Analysis (LDA) [49],Decision Tree (DT) [50],Naive Bayes (NB) [51],and Random Forest (RF) [51]classifiers,and (ii) one of the most related methods such as the proposed one in [46].The method in [46]was based on getting the most insightful features.They used features such as extracting intersection points with adjacent intersection pixels centered in the central pixel.They used the classification of the signer independent form on the k-nearest neighbor (K-NN) classifier.This comparison aims to test the NRVS system by the imprecision,incomplete,inconsistency,and vagueness data without using any features selection techniques.The verification results of this experiment,according to many evaluation metrics,are summarized in Tab.3.From Tab.3,we can conclude that:

    · In terms of the accuracy,all models obtained high accuracy,and the proposed NRVS obtained the second-best accuracy,while SVM and NB achieved the worst accuracies.

    · In terms of specificity,the NRVS,k-NN,and SVM obtained the best specificity.Moreover,NRVS obtained competitive sensitivity results compared to the other models.

    · The NRVS,k-NN,and SVM models outperform the other models in terms of the precision results.

    · In terms of F1-Score,NRVS obtained competitive results compared to the other models.

    To conclude,the proposed NRVS model achieved promising results compared to the mentioned conventional classifiers.

    Table 3:Verification results of the proposed NRVS model vs.SVM,NB,RF,DT,MLP,LDA and K-NN according to many evaluation metrics

    5.2 NRVS vs.FRVS

    This experiment aims to compare the proposed NRVS model with one of the rulebased systems,such as the Fuzzy Rule-based Verification System (FRVS),which is one of the most wellknown rule-based systems.This comparison aims to show that NRVS generalizes and outperforms the FRVS model.Many research proposed methods based on a fuzzy rule-based verification system such as [11,15].In [11],they used a fuzzy system to measure the similarity of signatures divided into weighted partitions.However,in [15],they used a genetic-fuzzy hybrid approach based on global features only.Mamdani in Mamdani (1974) proposed the first type of fuzzy rule-based system by applying the fuzzy system to a control problem Cordón (2002).

    The general structure of the fuzzy rule-based system [52,53]contains four components:

    · Knowledge Base:this contains two parts:database and rule base.The dataBase part contains the dataset and the fuzzy membership functions used in the rulesbased system and will be used in the inference engine.The rule base part contains fuzzy rules in the form of“IF-THEN” rules.

    · Fuzzifier:this component converts the crisp input to fuzzy input which input to the inference engine.

    · Inference Engine:this component produces the results as the fuzzy output by using the fuzzy input and knowledge base.

    · Defuzzifier:this converts the fuzzy output into the crisp output.

    In this sub-experiment,we use the membership function proposed in Mahmood et al.(2013).The results of this experiment,according to different evaluation metrics are summarized in Tab.4.Moreover,Tab.5 summarizes the results in terms of False Acceptance Rate (FAR) and False Rejection Rate (FRR),where (i) the FAR is the ratio of the approved number of imposters to the total number of submitted forgeries (i.e.,what percentage of times the system accepts for an invalid person),and (ii) The FRR is the ratio of the number of genuine test signatures rejected by the system to the total number of genuine test signatures submitted (i.e.,the percentage of times a valid user is rejected by the system).These two metrics (i.e.,FAR and FRR) are used for evaluating many handwritten signature recognition systems [54].

    Table 4:Verification results of the proposed NRVS model vs.FRVS and a famous fuzzy approach according to different evaluation metrics

    Table 5:Verification results of the proposed NRVS model vs.a famous fuzzy approach according to the following assessments:FAR and FRR

    From Tabs.4 and 5,it is clear that the proposed NRVS model significantly outperforms the other two fuzzy-based models.Using all assessment methods,the NRVS achieved the best results,and the FRVS obtained the worst results.In terms of FAR and FRR,as illustrated in Tab.5,NRVS yielded zero FAR,while the Fuzzy approach obtained 3.29 FAR.Additionally,in terms of FRR,NRVS achieved FRR lower than the Fuzzy approach.These results proved that our NRVS model is significantly better than some state-of-the-art Fuzzy-based approaches.

    5.3 NRVS vs.GNRVS

    This experiment is conducted to compare the proposed GNRVS verification system with the NRVS.In this experiment,as in the previous two experiments,we used all attributes,i.e.,without a feature selection process.Besides,the results of this experiment are compared with the results of the Fuzzy-Genetic approach that was proposed in [15].The results of this experiment are summarized in Tab.6,which shows the results in terms of different evaluation metrics.Tab.7 summarizes the results of this experiment in terms of FAR and FRR.

    Table 6:Verification results of the proposed GNRVS and NRVS models vs.fuzzy-genetic approach according to different evaluation metrics

    Table 7:Verification results of the proposed GNRVS and NRVS models vs.fuzzy-genetic approach according to the following assessments:(False Acceptance Rate (FAR),and False Rejection Rate (FRR))

    From the results in Tab.6,we could conclude that:

    · GNRVS improves NRVS in terms of all measures.

    · GNRVS achieves better accuracy as RF,DT,and MLP.

    · GNRVS as NRVS is better than the RF,DT,and MLP classifiers in terms of precision and Specificity measures.

    · GNRVS improves the proposed NRVS model in terms of F1-Score to achieve the secondbest results.

    Additionally,from Tab.7,we can conclude that GNRVS as NRVS can determine with complete accuracy the forgeries signatures (FAR=0).Moreover,GNRVS determines genuine signatures more accurately than NRVS.

    6 Conclusions and Future Work

    This paper proposes a novel model to verify online-signatures based on their dynamic characteristics using neutrosophic rule-based verification system (NRVS) that generalizes the fuzzy rule-based verification system.The proposed system has three primary stages:Firstly,stable features are derived from online signature data in the feature extraction process.Secondly,the proposed NRVS is used to classify signatures into authentic signatures and forgeries by generating neutrosophic “IF-THEN” rules.Thirdly,a hybridization of NRVS and Genertic Algorithms(GNRVS) is used to refine the neutrosophic “IF-THEN” rules generated in the previous stage.The MCYT-Signature-100 dataset,which has 8250 genuine signatures and 8250 forgery signatures,is used to test the proposed system.To evaluate the proposed model,various experiments were carried out and we obtained promising results.Overall,the observations of the proposed model show that it could be applied for handwritten signature verification.We plan to develop a hybrid framework between a neutrosophic,a rule-based system,and deep learning in future work.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    免费久久久久久久精品成人欧美视频| 级片在线观看| 日韩欧美免费精品| 午夜免费激情av| 久久久久九九精品影院| 亚洲色图 男人天堂 中文字幕| 18禁裸乳无遮挡免费网站照片 | 黄色女人牲交| 两个人视频免费观看高清| 久久久精品国产亚洲av高清涩受| 日日爽夜夜爽网站| 91字幕亚洲| 99精品欧美一区二区三区四区| 亚洲精华国产精华精| 少妇的丰满在线观看| netflix在线观看网站| 不卡一级毛片| 长腿黑丝高跟| 日本一区二区免费在线视频| 亚洲色图综合在线观看| 91字幕亚洲| 日韩三级视频一区二区三区| 99在线视频只有这里精品首页| 国产精品 欧美亚洲| 国产成+人综合+亚洲专区| 嫩草影视91久久| 长腿黑丝高跟| 精品国产一区二区久久| 精品久久久久久久人妻蜜臀av | 中亚洲国语对白在线视频| 亚洲第一欧美日韩一区二区三区| 搞女人的毛片| 成人三级黄色视频| 亚洲一码二码三码区别大吗| 婷婷丁香在线五月| 亚洲av五月六月丁香网| 一a级毛片在线观看| 久久精品国产亚洲av高清一级| 操美女的视频在线观看| 免费观看精品视频网站| 999久久久国产精品视频| 亚洲熟妇中文字幕五十中出| 制服诱惑二区| 脱女人内裤的视频| 男人舔女人的私密视频| 嫩草影院精品99| 国产麻豆成人av免费视频| 精品国内亚洲2022精品成人| 亚洲精品在线观看二区| 欧美日韩乱码在线| 国产激情久久老熟女| 久久久久国产精品人妻aⅴ院| 日本五十路高清| 成在线人永久免费视频| www国产在线视频色| 久久精品亚洲精品国产色婷小说| 欧美黑人精品巨大| 高清毛片免费观看视频网站| 国产成人免费无遮挡视频| 国产成人欧美| 99在线人妻在线中文字幕| tocl精华| 啦啦啦观看免费观看视频高清 | 女人被狂操c到高潮| 咕卡用的链子| 国产又色又爽无遮挡免费看| 丝袜人妻中文字幕| 啦啦啦观看免费观看视频高清 | 亚洲欧美精品综合久久99| 中文字幕精品免费在线观看视频| 在线观看一区二区三区| 母亲3免费完整高清在线观看| 亚洲avbb在线观看| 亚洲熟女毛片儿| 欧美黑人精品巨大| 如日韩欧美国产精品一区二区三区| 黑人欧美特级aaaaaa片| 午夜福利高清视频| av在线天堂中文字幕| e午夜精品久久久久久久| 亚洲一区二区三区不卡视频| 国产精品久久久av美女十八| 久久天躁狠狠躁夜夜2o2o| 伦理电影免费视频| 丝袜在线中文字幕| 香蕉丝袜av| 亚洲一区高清亚洲精品| 老司机在亚洲福利影院| 深夜精品福利| 亚洲欧美激情综合另类| 9热在线视频观看99| 精品人妻在线不人妻| 丝袜人妻中文字幕| 人妻丰满熟妇av一区二区三区| 亚洲一区二区三区色噜噜| 欧美日本中文国产一区发布| e午夜精品久久久久久久| 老司机深夜福利视频在线观看| 精品国产一区二区三区四区第35| 桃红色精品国产亚洲av| 色播在线永久视频| 国产主播在线观看一区二区| 久久九九热精品免费| 日韩大尺度精品在线看网址 | 校园春色视频在线观看| 动漫黄色视频在线观看| 一个人免费在线观看的高清视频| 美女扒开内裤让男人捅视频| 亚洲中文字幕一区二区三区有码在线看 | 99国产综合亚洲精品| 欧美丝袜亚洲另类 | 亚洲七黄色美女视频| 国产精品久久电影中文字幕| 中文字幕高清在线视频| 亚洲精品国产一区二区精华液| 久久中文看片网| 国产又色又爽无遮挡免费看| 国产一区二区在线av高清观看| 久久久久久久精品吃奶| 88av欧美| 无遮挡黄片免费观看| 在线观看一区二区三区| a级毛片a级免费在线| 亚洲va在线va天堂va国产| 亚洲一区高清亚洲精品| 窝窝影院91人妻| 国产高清不卡午夜福利| 村上凉子中文字幕在线| 波多野结衣高清作品| 久久天躁狠狠躁夜夜2o2o| 美女高潮的动态| 天堂网av新在线| 波野结衣二区三区在线| 无遮挡黄片免费观看| АⅤ资源中文在线天堂| 夜夜夜夜夜久久久久| 黄色一级大片看看| 国产av不卡久久| xxxwww97欧美| 国产高清不卡午夜福利| 琪琪午夜伦伦电影理论片6080| 干丝袜人妻中文字幕| 国语自产精品视频在线第100页| 亚洲一级一片aⅴ在线观看| 在线免费十八禁| 日韩在线高清观看一区二区三区 | 观看美女的网站| 日本三级黄在线观看| 日韩中文字幕欧美一区二区| 精品久久久久久久久av| 国产精品久久电影中文字幕| 麻豆久久精品国产亚洲av| 久久人人爽人人爽人人片va| 成人亚洲精品av一区二区| 黄色日韩在线| 亚洲狠狠婷婷综合久久图片| 校园春色视频在线观看| 亚洲精品亚洲一区二区| 99国产精品一区二区蜜桃av| 日韩一区二区视频免费看| 亚洲欧美日韩无卡精品| 嫁个100分男人电影在线观看| 美女被艹到高潮喷水动态| 欧美日本亚洲视频在线播放| 午夜福利视频1000在线观看| 国产精品99久久久久久久久| 日本精品一区二区三区蜜桃| 国产v大片淫在线免费观看| 在线a可以看的网站| 波多野结衣高清作品| 成年免费大片在线观看| 九九在线视频观看精品| 国产黄色小视频在线观看| 久久久久久久久久久丰满 | 夜夜爽天天搞| 18+在线观看网站| 3wmmmm亚洲av在线观看| 国产人妻一区二区三区在| 欧美人与善性xxx| 日本 av在线| 久久午夜亚洲精品久久| 国产精品国产高清国产av| 深夜精品福利| 免费黄网站久久成人精品| 12—13女人毛片做爰片一| 舔av片在线| 亚洲不卡免费看| av在线蜜桃| 日韩欧美免费精品| 大又大粗又爽又黄少妇毛片口| 国产三级在线视频| 精品久久久久久久末码| 少妇的逼水好多| 热99在线观看视频| 国产69精品久久久久777片| 在线观看66精品国产| 国产精品三级大全| 日韩欧美国产在线观看| 少妇人妻一区二区三区视频| 国产人妻一区二区三区在| 黄色配什么色好看| 精品久久久久久久久av| 一本精品99久久精品77| 国产一区二区在线观看日韩| 国产日本99.免费观看| 亚洲专区国产一区二区| 一级毛片久久久久久久久女| 天堂av国产一区二区熟女人妻| 日韩中字成人| 韩国av在线不卡| 国产视频一区二区在线看| 久久久精品欧美日韩精品| 精品人妻一区二区三区麻豆 | 久久精品夜夜夜夜夜久久蜜豆| 在线免费十八禁| 黄色一级大片看看| a级毛片a级免费在线| 国产av一区在线观看免费| 久久久久久九九精品二区国产| 91久久精品国产一区二区成人| 免费在线观看日本一区| 精品一区二区免费观看| 女的被弄到高潮叫床怎么办 | 成年女人毛片免费观看观看9| 国产一级毛片七仙女欲春2| 我要搜黄色片| 国产色婷婷99| 日韩欧美一区二区三区在线观看| 91麻豆av在线| 婷婷精品国产亚洲av在线| 欧美xxxx黑人xx丫x性爽| 国产在线男女| 亚洲精品色激情综合| 男人狂女人下面高潮的视频| 神马国产精品三级电影在线观看| 99在线视频只有这里精品首页| 日韩精品中文字幕看吧| 免费观看人在逋| 成人综合一区亚洲| 亚洲av.av天堂| 又爽又黄无遮挡网站| 两个人的视频大全免费| 午夜老司机福利剧场| 久久久久免费精品人妻一区二区| 国产成人福利小说| 精品一区二区三区av网在线观看| 日韩欧美一区二区三区在线观看| 欧美日韩亚洲国产一区二区在线观看| 欧美又色又爽又黄视频| 麻豆成人午夜福利视频| 亚洲av二区三区四区| 久久久精品欧美日韩精品| 国产精品一区二区免费欧美| 婷婷六月久久综合丁香| 成人亚洲精品av一区二区| 日韩精品青青久久久久久| 久久久久国内视频| 国语自产精品视频在线第100页| 乱人视频在线观看| 亚洲中文日韩欧美视频| 国产国拍精品亚洲av在线观看| 国产精品久久电影中文字幕| www日本黄色视频网| 无人区码免费观看不卡| 色哟哟哟哟哟哟| 少妇猛男粗大的猛烈进出视频 | 大又大粗又爽又黄少妇毛片口| 国产高清激情床上av| 国产成人影院久久av| 搡老熟女国产l中国老女人| 欧美黑人欧美精品刺激| 老女人水多毛片| 亚洲精品日韩av片在线观看| 最新在线观看一区二区三区| 成人国产一区最新在线观看| 亚洲最大成人手机在线| 婷婷亚洲欧美| 女人十人毛片免费观看3o分钟| 91在线观看av| 麻豆国产97在线/欧美| 一本精品99久久精品77| www.色视频.com| 女人被狂操c到高潮| 亚洲专区中文字幕在线| 麻豆国产av国片精品| 99视频精品全部免费 在线| 欧美成人性av电影在线观看| 国产亚洲精品av在线| 天堂动漫精品| 久久国产精品人妻蜜桃| 久久久久久伊人网av| 女的被弄到高潮叫床怎么办 | 久久久久久久久久久丰满 | 美女 人体艺术 gogo| 全区人妻精品视频| 亚洲精华国产精华精| 少妇熟女aⅴ在线视频| 亚洲无线在线观看| 看片在线看免费视频| 色吧在线观看| 尤物成人国产欧美一区二区三区| 国产精品av视频在线免费观看| 亚洲精品456在线播放app | 欧洲精品卡2卡3卡4卡5卡区| 男人舔女人下体高潮全视频| 精品午夜福利视频在线观看一区| www日本黄色视频网| 夜夜夜夜夜久久久久| 日韩人妻高清精品专区| 在线免费十八禁| 久久精品91蜜桃| 久久亚洲真实| 亚洲色图av天堂| 嫩草影院新地址| 人人妻人人看人人澡| 十八禁网站免费在线| 99久久成人亚洲精品观看| 午夜福利欧美成人| 99热这里只有精品一区| 国产高清激情床上av| 亚洲欧美精品综合久久99| 日本与韩国留学比较| 亚洲成人久久爱视频| 日本黄大片高清| 一本久久中文字幕| 日韩中文字幕欧美一区二区| 国内精品宾馆在线| 午夜福利在线观看免费完整高清在 | 五月伊人婷婷丁香| 91精品国产九色| 国产精品无大码| 久久久久性生活片| 久久久午夜欧美精品| 18禁黄网站禁片午夜丰满| 国产一级毛片七仙女欲春2| 俺也久久电影网| 小说图片视频综合网站| 在线观看午夜福利视频| 亚洲成人免费电影在线观看| 亚洲欧美清纯卡通| 不卡一级毛片| 99精品久久久久人妻精品| 成年女人看的毛片在线观看| 精品欧美国产一区二区三| 亚洲精华国产精华液的使用体验 | 国产一区二区三区视频了| 亚洲性夜色夜夜综合| 国产伦精品一区二区三区四那| 亚洲18禁久久av| 国产高清三级在线| 免费高清视频大片| 日日摸夜夜添夜夜添小说| 少妇的逼好多水| 免费在线观看日本一区| 国产精品日韩av在线免费观看| 欧美最黄视频在线播放免费| 少妇的逼好多水| 精品国内亚洲2022精品成人| 久久久久久久午夜电影| 日韩欧美在线乱码| 亚洲av一区综合| 日日摸夜夜添夜夜添av毛片 | 一个人看的www免费观看视频| 91久久精品国产一区二区成人| 色综合色国产| 欧美成人a在线观看| 色综合色国产| 午夜老司机福利剧场| 在线观看免费视频日本深夜| 日本欧美国产在线视频| 悠悠久久av| 国产人妻一区二区三区在| 国产精品综合久久久久久久免费| 狂野欧美白嫩少妇大欣赏| 久久久久久九九精品二区国产| 人妻少妇偷人精品九色| 精品人妻1区二区| 99热这里只有是精品在线观看| 免费观看在线日韩| 欧美日韩乱码在线| 成人美女网站在线观看视频| eeuss影院久久| 成年人黄色毛片网站| 一个人看视频在线观看www免费| 亚洲熟妇中文字幕五十中出| 亚洲男人的天堂狠狠| 男人舔奶头视频| 97热精品久久久久久| 亚洲无线观看免费| 亚洲av美国av| 人妻久久中文字幕网| 成人国产一区最新在线观看| www.www免费av| 伦精品一区二区三区| 久久人人爽人人爽人人片va| 蜜桃久久精品国产亚洲av| av中文乱码字幕在线| 午夜精品在线福利| 成人国产综合亚洲| av在线天堂中文字幕| 日日夜夜操网爽| 一进一出好大好爽视频| 国产精品久久久久久久久免| 在线观看av片永久免费下载| 亚洲成a人片在线一区二区| 日韩欧美精品v在线| 女的被弄到高潮叫床怎么办 | 人妻丰满熟妇av一区二区三区| 国产成人福利小说| 亚洲无线观看免费| 欧美在线一区亚洲| 又紧又爽又黄一区二区| 亚洲最大成人手机在线| 国产三级中文精品| 又爽又黄无遮挡网站| 色噜噜av男人的天堂激情| 免费黄网站久久成人精品| 久久久久久久久大av| 国产成人a区在线观看| 长腿黑丝高跟| 在线观看舔阴道视频| 亚洲av第一区精品v没综合| 亚洲av五月六月丁香网| 给我免费播放毛片高清在线观看| 国产高清视频在线播放一区| 日本黄色片子视频| 在线观看一区二区三区| 久久久久久久亚洲中文字幕| 久久久久久国产a免费观看| 91在线观看av| 欧美在线一区亚洲| 精品一区二区三区视频在线观看免费| 18禁黄网站禁片午夜丰满| 日本与韩国留学比较| 色av中文字幕| 美女高潮喷水抽搐中文字幕| 午夜免费男女啪啪视频观看 | 成人二区视频| 国产精品久久久久久精品电影| 精品一区二区三区av网在线观看| 亚洲最大成人av| 特级一级黄色大片| 亚洲五月天丁香| 不卡一级毛片| 国产亚洲欧美98| 美女大奶头视频| 内地一区二区视频在线| 欧美精品国产亚洲| 色5月婷婷丁香| 99久久无色码亚洲精品果冻| 不卡一级毛片| 成年免费大片在线观看| 久久久成人免费电影| 黄色欧美视频在线观看| 国产精品,欧美在线| 国产综合懂色| 亚洲av成人av| 亚洲国产日韩欧美精品在线观看| 91久久精品国产一区二区成人| 夜夜看夜夜爽夜夜摸| 一进一出抽搐动态| www日本黄色视频网| 亚洲天堂国产精品一区在线| 色综合站精品国产| 久久久久国产精品人妻aⅴ院| 99riav亚洲国产免费| 国内少妇人妻偷人精品xxx网站| 美女高潮的动态| 国产精品av视频在线免费观看| 淫妇啪啪啪对白视频| 亚洲狠狠婷婷综合久久图片| 一个人看的www免费观看视频| 亚洲av免费高清在线观看| 97碰自拍视频| 欧美高清性xxxxhd video| 亚洲自偷自拍三级| 91狼人影院| 嫩草影院入口| 日韩人妻高清精品专区| 成人亚洲精品av一区二区| 日韩欧美三级三区| 欧美日本视频| videossex国产| 日本免费一区二区三区高清不卡| 国产精品伦人一区二区| 美女黄网站色视频| 欧美日本视频| 亚洲精品久久国产高清桃花| 久久精品人妻少妇| 内地一区二区视频在线| 亚洲精品粉嫩美女一区| 久久久久国产精品人妻aⅴ院| 久久国内精品自在自线图片| 午夜影院日韩av| 亚洲精品乱码久久久v下载方式| 久久人人爽人人爽人人片va| 日韩国内少妇激情av| 高清毛片免费观看视频网站| 99国产极品粉嫩在线观看| 欧洲精品卡2卡3卡4卡5卡区| 亚洲国产欧美人成| 白带黄色成豆腐渣| 久99久视频精品免费| 国产 一区精品| 中文在线观看免费www的网站| 丰满乱子伦码专区| 少妇高潮的动态图| 人妻少妇偷人精品九色| 男女下面进入的视频免费午夜| 国产色婷婷99| 69人妻影院| 欧美三级亚洲精品| 又爽又黄无遮挡网站| 精品乱码久久久久久99久播| 国产成人一区二区在线| 美女cb高潮喷水在线观看| 国产三级在线视频| 观看免费一级毛片| av在线天堂中文字幕| 久久香蕉精品热| 日本撒尿小便嘘嘘汇集6| 搡女人真爽免费视频火全软件 | 国产免费男女视频| 男插女下体视频免费在线播放| 亚洲精品一区av在线观看| 精品人妻一区二区三区麻豆 | 嫩草影院入口| 日韩精品青青久久久久久| 久久精品国产亚洲av天美| 欧美一区二区国产精品久久精品| 精品福利观看| 美女 人体艺术 gogo| 国产免费av片在线观看野外av| 赤兔流量卡办理| 最近最新免费中文字幕在线| 久久欧美精品欧美久久欧美| 天堂影院成人在线观看| 久久久精品欧美日韩精品| 国产老妇女一区| 在线看三级毛片| 一a级毛片在线观看| 窝窝影院91人妻| 丝袜美腿在线中文| 日韩一本色道免费dvd| 别揉我奶头 嗯啊视频| a级毛片a级免费在线| 日本成人三级电影网站| 国内精品久久久久久久电影| 99热网站在线观看| 亚洲性久久影院| 亚洲av免费高清在线观看| 亚洲成人中文字幕在线播放| 欧美潮喷喷水| 久久天躁狠狠躁夜夜2o2o| 亚洲精品在线观看二区| 九色国产91popny在线| 国产伦人伦偷精品视频| 国内精品美女久久久久久| 色av中文字幕| 国产一区二区激情短视频| 亚洲av五月六月丁香网| 国产中年淑女户外野战色| 精品一区二区免费观看| 久久久久免费精品人妻一区二区| 久久九九热精品免费| 欧美日韩精品成人综合77777| 免费观看精品视频网站| 男女视频在线观看网站免费| 午夜福利在线在线| 日本一本二区三区精品| av视频在线观看入口| 日韩一本色道免费dvd| 天堂影院成人在线观看| 日本免费a在线| 国产高清视频在线播放一区| 别揉我奶头 嗯啊视频| 极品教师在线免费播放| 亚洲中文字幕一区二区三区有码在线看| 亚洲欧美精品综合久久99| 亚洲国产欧美人成| 国产精品亚洲一级av第二区| 久久草成人影院| 成年女人永久免费观看视频| 九九在线视频观看精品| 中出人妻视频一区二区| 欧美一区二区国产精品久久精品| 国产视频一区二区在线看| 老司机午夜福利在线观看视频| 有码 亚洲区| 女同久久另类99精品国产91| 啦啦啦啦在线视频资源| 九色成人免费人妻av| 又紧又爽又黄一区二区| 男人狂女人下面高潮的视频| 国产一区二区在线av高清观看| 小说图片视频综合网站| 国产单亲对白刺激| 国产一区二区亚洲精品在线观看| 久久香蕉精品热| 老司机福利观看| 国产一区二区三区在线臀色熟女| 国产极品精品免费视频能看的| 精品日产1卡2卡| 成年女人永久免费观看视频| 久久香蕉精品热| 老司机福利观看| 我要看日韩黄色一级片| 我的老师免费观看完整版| 色尼玛亚洲综合影院| 午夜亚洲福利在线播放| 大型黄色视频在线免费观看| 国产高清三级在线| 免费搜索国产男女视频| 村上凉子中文字幕在线| 天堂av国产一区二区熟女人妻|