• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Local Features-Based Watermarking for Image Security in Social Media

    2021-12-15 07:10:08ShadyElmashadAmaniYassenAbdulwahabAlsammakandBasemElhalawany
    Computers Materials&Continua 2021年12期

    Shady Y.El-mashad,Amani M.Yassen,Abdulwahab K.Alsammak and Basem M.Elhalawany

    1Department of Computer Systems Engineering,Faculty of Engineering at Shoubra,Benha University,Egypt

    2Department of Communications and Electronics Engineering,Faculty of Engineering at Shoubra,Benha University,Egypt

    Abstract: The last decade shows an explosion of using social media, which raises several challenges related to the security of personal files including images.These challenges include modifying, illegal copying, identity fraud,copyright protection and ownership of images.Traditional digital watermarking techniques embed digital information inside another digital information without affecting the visual quality for security purposes.In this paper, we propose a hybrid digital watermarking and image processing approach to improve the image security level.Specifically, variants of the widely used Least-Significant Bit(LSB) watermarking technique are merged with a blob detection algorithm to embed information into the boundary pixels of the largest blob of a digital image.The proposed algorithms are tested using several experiments and techniques,which are followed by uploading the watermarked images into a social media site to evaluate the probability of extracting the embedding watermarks.The results show that the proposed approaches outperform the traditional LSB algorithm in terms of time,evaluation criteria and the percentage of pixels that have changed.

    Keywords: Digital watermarking; LSB; social media; blob detection; image security

    1 Introduction

    Social media has become essential for human interaction all over the globe, where the users create, exchange, and share information on the internet using electronic devices such as computers,wearable devices, and smartphones [1].Every day the number of social media users are dramatically increase according to the latest statistics [2].Due to this increase, many digital images have been uploaded into social media.Therefore, a various types of image security issues appeared,which includes modification, illegal copying, identity fraud, copyright protection and ownership of images [3].

    Hence, there is a strong need to protect the uploaded images from these security issues.Several techniques based on the digital watermarking have being used and developed to achieve this goal.The digital watermarking is the process of hiding or embedding the digital information inside another digital information without affecting the visual quality of any of them such as:text,image, video, audio and metadata as well that can be extracted [4].In contrast to encryption, the watermarking allows the user to view, access and get the original digital information [4].

    The watermarking algorithm is usually used to achieve the authenticity and integrity by performing two steps, namely the embedding and the extraction.In image watermarking, the original image is known as the cover image or the carrier, while after applying the watermarking process the output image is known as the watermarked image [5].Fig.1 shows the block diagram of image watermarking, where the embedding process is done by applying a watermark to the original image using a secret key.On the other hand, the extraction process exploits the same secret key to extract the watermark and retrieve the original image.

    Figure 1:Digital image watermarking

    Conventionally, image watermarking techniques work in two domains, namely the spectral domain and the spatial domain.In spectral domain watermarking, the original image is transformed into a group of frequency coefficients [5].This type is very robust; however, it usually exhibits high complexity.The operations applied to the lower frequencies instead of higher frequencies to avoid the problem of losing frequencies in case of compression or scaling [4].The most commonly used algorithms in spectral domain are:Discrete Wavelet Transform (DWT),Discrete Cosine Transform (DCT), and Discrete Fourier Transform (DFT).

    On the other hand, spatial domain watermarking operations are simple and directly applied to the pixels without transformation as in the former type.The most commonly used algorithm in spatial domain is the Least Significant Bit (LSB).LSB is a simple and fast watermarking approach, which converts the image regardless of its type into gray scale image.Each pixel is represented by 1 byte, where the last bit, i.e., the right most bit, contains the least significant information as shown in Fig.2.

    Figure 2:Least significant bit

    The LSB watermarking algorithm replaces this bit with one bit of the secret data, which will be hidden inside the image.Since the replaced bit is the least significant one, there will be no obvious visual change in the image [6].Fig.3 shows the block diagram of LSB embedding process, where one-pixel value is presented, at which the last bit (i.e., LSB) has a value 1.This value has been replaced with the first bit in the secret message which is 0.Therefore, the new value of the last LSB has become 0 instead of 1.

    Figure 3:Lsb embedding process

    ? We proposed a local feature-based watermarking technique, which is used in tandem with variants of the traditional LSB algorithm to increase the security level.

    ? To improve the robustness of the proposed technique, we have implemented a two-bits based LSB algorithm instead of the conventional one-bit based algorithm.

    ? We investigate the performance of the proposed algorithm in terms of time, evaluation criteria and the percentage of pixels that have changed.

    The rest of the paper is organized as follows.In Section 2, we present a literature review on the state-of-the-art watermarking techniques.Then, we introduced the proposed method and experiments design in Sections 3 and 4, respectively.Finally, the paper is concluded in Section 5.

    2 Related Works

    The digital watermarking provides a protection of digital contents such as:images, videos and music from any illegal use.In the last years, digital watermarking has been combined with different algorithms to increase its security and robustness [7].Media watermarking has become an active research area.The authors in [8] used LSB algorithm to embed the watermark into the digital image.The third and the fourth LSB are used for hiding the data.Their experimental results show a better quality of the watermarked image.In [9], the authors presented a combination of LSB algorithm and edge detection technique for image stenography.The edge pixels of the image have been used to hide the secret data, which leads to a higher security level.

    Also, [3] presented a new watermarking scheme to embed the selected metadata into the digital image.The implementation is done on both visible and invisible watermarking.Within this experiment, the images have been uploaded into four different social media sites.It shows that the compression method of social media sites can change the pixel values of the image.Besides that, [10] proposed a new image stenography method based on extracting the three rightmost LSBs of the image pixels.Then, performing the X-OR operation between the first bit, the third bit and also between the second bit, the third bit.Based on the results of these operations, a +1 or -1 modification applied to the pixel value of the stego image.The proposed method was better when compared to LSB algorithm according to [10].

    In addition, [11] presented a new scheme of transform domain JPEG image stenography.The secret data is compressed twice.First, compressed by removing the weak words from the data and then by using the Huffman lossless compression technique.The compressed data is embedded into the original image based on the modulus three of the difference between DCT coefficients of the image.This scheme is proven by [11] to significantly reduce the number of changes in the cover image.

    Also, [12] presented a new stenography technique inside RGB color space.First, the cover image was flipped to embed secret message into it.Then, it was divided into the red, green and blue channel.The blue channel was used for embedding secret message which were divided into four sub images and shuffled by using a magic matrix.Before embedding, the secret message was subtracted from the corresponding pixel values of the red channel.Then, the authors in [12]selected 8 bits of secret message to be embedded into the four sub images.This technique achieves enhanced security according to [12].

    Eventually, [13] proposed a hybrid combination of watermarking techniques.A local feature based watermarking scheme with a traditional transform domain-based watermarking.Watermarks are embedded twice.First, the KAZE features regions have been selected and watermarks are embedded into significant-bit-planes of these regions by modifying their histogram.Then, the Integer wavelet transform-Singular value decomposition (IWT-SVD) domain has been used to embed watermarks again by modifying the entries of the left singular vector metrics.This method was sufficient 100 robust according to [13].

    3 Proposed Method

    The main concept in this work is to exploit the advantage of different image processing techniques to embed the secret data in the original image.A new image watermarking technique is introduced based on the LSB algorithm.The proposed technique uses a combination of the LSB algorithm and image processing techniques.This combination enhances the performance of the traditional LSB algorithm.Additionally, it increases the level of image security through online social media sites without affecting the visual quality of the image [4].

    Specifically, the secret data will be hidden into a variable selected area or pixels not in the whole image, which increases the robustness of the system.In this technique, the secret data is embedded into the largest blob of the original image.Therefore, a blob detection technique is used to extract the existing blobs in the original image including the largest one.One main objective of this work is to improve the robustness of the proposed algorithm.To cope with this objective,we implemented a modified two-bits based LSB algorithm, at which the last two bits are used for hiding the secret data instead of the last bit only.In the following subsections, we explain the details of the blob detection, embedding algorithm, and the extraction algorithm, respectively.

    3.1 Blob Detection

    Generally, a blob stands for binary large object, which is composed of a set of connected pixels or points [14].These pixels are considered to be similar to each other in a binary image.To extract a blob, the connectivity of neighbor pixels is tested to detect similarity [15].There are many different types of connectivity such as the 4-connectivity and 8-connectivity patterns,which are shown in Fig.4.In this work, we adopted the 8-connectivity to achieve more accurate results since the 8-connectivity is more precise, however, it imposes higher computations than the 4-connectivity [14].In image processing, blob detection methods are aimed to disclose regions or points in a digital image that differ in properties compared to the surrounding regions [16–18].These properties included color or brightness.Fig.5 shows blob detection examples.

    Figure 4:The types of connectivity (a) A 4-connectivity pixel (b) An 8-connectivity pixel

    Figure 5:Blob detection examples

    In the proposed approach, the secret data is embedded into the boundary pixels of a specific blob only for example the largest blob.This will increase the level of security and robustness.In addition, one than a blob can be chosen for the embedding process.In this technique, the secret watermark is provided into the original image without any visual changing in it.

    3.2 Embedding Algorithm

    The embedding algorithm has three inputs:a cover image, a secret data and a secret key.It is done as follows:

    (1) Convert the secret data into its binary representation.

    (2) Convert the cover image into a binary image.

    (3) Extract the largest blob of the binary image.

    (4) Detect the boundary pixels of the largest blob.

    (5) Embed the data bit stream into the LSB of each boundary pixel.

    (6) Complete the embedding until the secret data bit stream is finished.The embedding algorithm can be done on more than one bit.

    Fig.6 shows the flowchart of the proposed watermarking framework.

    Figure 6:The framework of the proposed method

    3.3 Extraction Algorithm

    The extraction algorithm has two inputs:a watermarked image and a secret key.It is done as follows:

    (1) Convert the watermarked image into a binary image.

    (2) Extract the largest blob of the binary image.

    (3) Detect the boundary pixels of the largest blob.

    (4) Extract each LSB of the boundary pixels.

    (5) Concatenate all extracted bits to get a stream of bits.

    (6) Convert the extracted bits into its equivalent characters.

    4 Experimental Results

    In the following sub-sections, we describe the dataset of the secret watermarks and the test images used in our experiments.Additionally, we explain the evaluation criteria used for evaluating the proposed algorithm and the experiment design.Finally, we elaborate in explaining the deployment of the watermarked images on a popular social media site for testing the performance of the proposed algorithms.

    4.1 Data Set

    The data set used in the experiments consists of two parts.The first part contains four secret watermarks with different lengths, from 46 to 221 characters, as shown in Tab.1.In this paper,the watermarks are added as data related to social media.The first watermark embeds name, age and gender of the owner of the image.In the second watermark, id, location, and date are added next to the first watermark.The third watermark describes the image.Finally, a caption has been added as a fourth watermark.The second part contains three images including “Tiffany”with size 512 × 512, “Cablecar”with size 512 × 480 and “Barbra”with size 512 × 512 as shown in Fig.7.

    Table 1:Dataset of secret watermarks

    Figure 7:Data set of cover images (a) Tiffany.jpg (b) Cablecar.bmp (c) Brabra.png

    Several parameters can be adopted to measure the quality of a watermarked image such as the Peak Signal to Noise Ratio (PSNR), the Mean Square Error (MSE), and the structural similarity index (SSIM).Those parameters can be defined as follows:

    4.1.1 PSNR

    It used to evaluate the similarity between the original image and the watermarked image.Additionally, it measures the quality of the watermarked images, where the PSNR should be high for a reliable technique.The values of PSNR ranges between [0, +∞] [13].The general PSNR Eq.(1) is defined as follows:

    where MAX is the maximum value that a pixel can have (i.e., 255 for a grayscale image).

    4.1.2 MSE

    It shows the difference between the original image and the watermarked image.However, there is no exact value for MSE.A lower MSE indicates that the watermarked image is more similar to the original image and 0 means the method is perfect [19].Hence, The MSE should be low for a reliable technique.The MSE is defined in Eq.(2) as:

    where m and n are the number of rows and columns in the original image.I is the original image and K is the watermarked image.

    4.1.3 SSIM

    It measures the perceptual difference between the original image and the watermarked image.The values of SSIM ranges between +1 to -1 [12], 1 means that there is a perfect match the watermarked image with the original one.However, values 0.99, 0.98 and 0.97 means a good technique.The SSIM is expressed mathematically as follows in Eq.(3):

    where I is the original image and Iw is the watermarked image.μIandμware the mean luminance values of I and Iw, respectively.δIandδware their standard deviations.δIwis the covariance between I and Iw.C1andC2are positive constants.

    4.2 Experimental Design

    Based on the evaluation criteria, the experiments have been conducted using MATLAB 9.6.0 on a core i7 CPU up to 4.5 GHZ, with 16 GB memory.Each experiment will embed one of the secret watermarks into the boundary pixels of the largest blob for each cover image.In this paper,many different methods for embedding secret watermark are introduced.In the first experiment,the 1st LSB has been used only for the embedding process, while in the second experiment the 2nd LSB has been used only for the embedding process.In the third experiments, the 1st and 2nd LSBs are used for the embedding process, where half of the watermark has been embedded in the 1st LSB and the other half has been embedded in the 2nd LSB.Finally, the last experiment is based on selecting either of the 1st LSB or the 2nd LSB for the embedding process.If the position of the watermark bit is even, the watermark bit will be embedded in the 1st LSB, and if the position of the watermark bit is odd, then the watermark bit will be embedded in the 2nd LSB.Using these different embedding methods will lead to more reliability.Tab.2, describes the different methods of embedding.

    Table 2:Methods of embedding process

    The experiments have been applied to different types of images to ensure the correctness of the proposed method with all types of images.Tab.3 shows the results for these experiments into“Tiffany.jpg”, where the boundary pixels of the largest blob are 2044 pixels.The percentage of boundary pixels being used for these experiments are 0.00779, which is a little higher compared to 0.00674 of the conventional LSB.The slight increase is due to the presence of unused pixels in the largest blob depending on the length of the embedded data.As shown in Tab.3, we compare the MSEs, PSNRs, SSIMs, Insertion time and Retrieval time in tiffany image by using the four embedding methods.The results show that the PSNR values are high for the four embedding methods, the MSE values are low and the SSIM values are significant:0.9999.Fig.8, shows the watermarked image and the original image of Tiffany.

    Table 3:Experimental results of tiffany.jpg

    In addition, Tab.4 gives the results of these experiments into “cablecar.bmp” image, where the boundary pixels of the largest blob are 3076 pixels.The percentage of boundary pixels being used for these experiments are 0.011734.Based on the results shown, the PSNR values are also high, the MSE values still low and the SSIM values are significant using the different embedding methods.Fig.9, shows the watermarked and the original image of “cablecar.bmp”.

    Finally, as shown in Tab.5, it shows the results of these experiments into Barbra.png.Where the boundary pixels of the largest blob are 6517 pixels and the percentage of boundary pixels being used for these experiments are 0.02486.Unlike the previous two images, the Barbra image had achieved perfect results.The SSIM values indicate a perfect match between the original image and the watermarked image, it was 1 in every experiment.PSNR values in W1-E1 & W2-E2 still high.Also, MSE values still low.Fig.10 shows the watermarked image and the original image of Barbra.

    Figure 8:The original image and watermarked image of Tiffany

    Table 4:Experimental results of cablecar.bmp

    4.3 Security Measurement

    The security of the watermarked images is tested by applying cropping attacks.Cropping attacks are usually harmful; therefore, it is used to test the robustness of the watermarking algorithms.Tab.6 shows the results of these experiments.

    Figure 9:The original image and watermarked image of cablecar

    Table 5:Experimental results of barbra.png

    “Tiffany” image failed to evade this attack; the boundary pixels of the largest blob covered the border pixels of the image.Therefore, cropping any part of the image would lead to lack the embedded watermarks.In addition, “cablecar” and “barbra” images succeeded in preserving the embedded watermarks into the original images.

    Figure 10:The original image and watermarked image of barbra

    Table 6:Summary of attacks against watermarked images

    On the other hand, we have tested the robustness of the algorithm against traditional LSB extraction algorithm to make sure if it will discover the watermark in the boundary pixels or not.It is implemented with the four different embedding methods, where the embedded data does not appear.

    4.4 Upload&Download Process into Social Media

    The last part of experiments is done as follows:The watermarked images are uploaded into a two social media sites.The first website called “Tumblr”, which is a popular site interested about images.In addition, it allows the users to share their images with the others.Therefore, it is a suitable environment for the experiments.Then, these images are downloaded back to test the presence of embedded watermarks or not.These results show that the embedded watermarks are retrieved successfully after the images are downloaded back from the site.

    Based on the results, all watermarked images with different embedding methods passed the experiments, which will preserve the ownership of these images.

    In addition, the second website used is twitter, which is one of the most popular social media platforms that allows users to broadcast images and short posts called tweets.The results shows that the watermarked images cannot pass the experiments of twitter website.The reason for that is the compression function used by twitter site.This compression can modify the pixels values of the image.A study to handle the compressed images should be done as a future work.Tab.7 summarizes the results of these experiments.

    Table 7:Summary of the presence of the watermarks

    5 Conclusions

    This paper proposed a technique to increase the security level of the uploaded images in the social media platforms while preserving the visual appearance of the images.The introduced method depends on extracting the largest blob of a digital image, then using the boundary pixels of this blob for hiding the watermarks.However, more than a blob can be used for the embedding process.The embedding process has been done by using four different methods.In addition,different experiments are carried out to evaluate the performance of the proposed method.For real test, the watermarked images are uploaded into a social media platform and downloaded back.The results show that the hidden watermarks cannot be extracted.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    欧美日韩综合久久久久久| 不卡视频在线观看欧美| 在线观看一区二区三区激情| 最近的中文字幕免费完整| 菩萨蛮人人尽说江南好唐韦庄| 久久久久久人人人人人| 亚洲一区二区三区欧美精品| 免费看不卡的av| 国产精品国产三级国产专区5o| 国产精品 欧美亚洲| 国产黄频视频在线观看| 国产老妇伦熟女老妇高清| 夫妻午夜视频| 亚洲伊人久久精品综合| 十八禁高潮呻吟视频| 大片免费播放器 马上看| 男女边吃奶边做爰视频| 天美传媒精品一区二区| 国产成人精品一,二区| 一区二区三区四区激情视频| 超色免费av| 国产日韩欧美视频二区| 久久 成人 亚洲| 性少妇av在线| 色94色欧美一区二区| 男人添女人高潮全过程视频| 亚洲色图综合在线观看| 综合色丁香网| 五月伊人婷婷丁香| 午夜福利网站1000一区二区三区| 性色av一级| 久久久精品94久久精品| 日韩av不卡免费在线播放| 亚洲第一av免费看| 黄色 视频免费看| 国产精品国产三级专区第一集| av网站免费在线观看视频| 久久久久久免费高清国产稀缺| 国产综合精华液| 只有这里有精品99| 日韩一区二区三区影片| 9热在线视频观看99| 极品人妻少妇av视频| 亚洲av中文av极速乱| 色视频在线一区二区三区| 亚洲欧美成人精品一区二区| 伊人久久大香线蕉亚洲五| 久久热在线av| 久久久久国产一级毛片高清牌| 成人毛片60女人毛片免费| 天天躁夜夜躁狠狠久久av| 日韩,欧美,国产一区二区三区| 久久久a久久爽久久v久久| 久久久久久久亚洲中文字幕| 大片免费播放器 马上看| 人人澡人人妻人| 亚洲国产av影院在线观看| 老鸭窝网址在线观看| 一级片免费观看大全| av在线app专区| 涩涩av久久男人的天堂| 亚洲伊人色综图| 久久久久精品性色| 黄色毛片三级朝国网站| 亚洲欧美一区二区三区久久| 少妇猛男粗大的猛烈进出视频| 久久久久人妻精品一区果冻| 少妇人妻 视频| 国产黄频视频在线观看| 极品人妻少妇av视频| 久久免费观看电影| 街头女战士在线观看网站| 超色免费av| 亚洲成国产人片在线观看| 伊人亚洲综合成人网| 91国产中文字幕| 91精品三级在线观看| 黄片小视频在线播放| 狠狠精品人妻久久久久久综合| 欧美精品高潮呻吟av久久| 狠狠精品人妻久久久久久综合| 久久久久网色| 在线亚洲精品国产二区图片欧美| 97在线人人人人妻| 欧美日韩亚洲高清精品| 国产精品嫩草影院av在线观看| 久久久精品区二区三区| 天美传媒精品一区二区| 桃花免费在线播放| 国产av一区二区精品久久| 人妻一区二区av| 国产 一区精品| 天天躁日日躁夜夜躁夜夜| 国产高清不卡午夜福利| 建设人人有责人人尽责人人享有的| 久久久久久久久久久免费av| 久久久a久久爽久久v久久| 国精品久久久久久国模美| 国产精品国产av在线观看| 国产成人精品一,二区| 精品酒店卫生间| 成人亚洲精品一区在线观看| 久久人人97超碰香蕉20202| 日韩精品免费视频一区二区三区| 久久久久精品人妻al黑| 中文字幕人妻丝袜制服| 边亲边吃奶的免费视频| 久久精品亚洲av国产电影网| 精品国产一区二区久久| 大片电影免费在线观看免费| 一区二区三区四区激情视频| 老司机亚洲免费影院| 精品国产超薄肉色丝袜足j| 国产亚洲精品第一综合不卡| 国产精品二区激情视频| 边亲边吃奶的免费视频| 五月伊人婷婷丁香| 色哟哟·www| 精品少妇内射三级| a 毛片基地| 国产一级毛片在线| 午夜影院在线不卡| 秋霞在线观看毛片| 国产乱来视频区| 激情视频va一区二区三区| av在线app专区| 深夜精品福利| 精品一品国产午夜福利视频| 人妻一区二区av| 蜜桃国产av成人99| 丝袜在线中文字幕| 欧美在线黄色| 十八禁网站网址无遮挡| 国产白丝娇喘喷水9色精品| 亚洲一码二码三码区别大吗| 日韩人妻精品一区2区三区| 国产欧美日韩综合在线一区二区| 丰满乱子伦码专区| 一本久久精品| 国产 精品1| 女人高潮潮喷娇喘18禁视频| a级片在线免费高清观看视频| 久久国产精品大桥未久av| 街头女战士在线观看网站| 亚洲内射少妇av| 91精品伊人久久大香线蕉| 成年人午夜在线观看视频| 亚洲精品国产av蜜桃| 午夜免费男女啪啪视频观看| 亚洲成色77777| 久久精品亚洲av国产电影网| 精品午夜福利在线看| 亚洲精品久久午夜乱码| 97人妻天天添夜夜摸| 国产在线一区二区三区精| 黄片小视频在线播放| 纵有疾风起免费观看全集完整版| 视频区图区小说| 色哟哟·www| 午夜老司机福利剧场| 欧美亚洲日本最大视频资源| 国产精品麻豆人妻色哟哟久久| 中文字幕人妻丝袜一区二区 | 久久久久久久亚洲中文字幕| 国产探花极品一区二区| 欧美精品一区二区大全| 亚洲天堂av无毛| 可以免费在线观看a视频的电影网站 | 国产日韩欧美在线精品| 人妻一区二区av| 一级片免费观看大全| 一区二区av电影网| 中国国产av一级| 99九九在线精品视频| 久久久久久免费高清国产稀缺| 国产成人精品一,二区| 成人免费观看视频高清| 青草久久国产| 欧美中文综合在线视频| 五月天丁香电影| 久久久精品区二区三区| 午夜免费观看性视频| 精品国产一区二区三区久久久樱花| 大香蕉久久成人网| 亚洲国产欧美在线一区| 99九九在线精品视频| 亚洲成人一二三区av| 国产淫语在线视频| 波野结衣二区三区在线| 如日韩欧美国产精品一区二区三区| 熟女少妇亚洲综合色aaa.| 亚洲综合精品二区| 999久久久国产精品视频| 国产毛片在线视频| 日韩av不卡免费在线播放| 国产精品人妻久久久影院| 精品少妇内射三级| 黄网站色视频无遮挡免费观看| 一区二区日韩欧美中文字幕| 老汉色av国产亚洲站长工具| 亚洲精品自拍成人| 国产一区亚洲一区在线观看| 男男h啪啪无遮挡| 亚洲三区欧美一区| 午夜免费观看性视频| 男女免费视频国产| 99热国产这里只有精品6| 亚洲情色 制服丝袜| 欧美亚洲日本最大视频资源| 欧美黄色片欧美黄色片| 欧美日韩一区二区视频在线观看视频在线| 成人手机av| 久久久久视频综合| 久久青草综合色| 97人妻天天添夜夜摸| 日日啪夜夜爽| 不卡视频在线观看欧美| 久久99蜜桃精品久久| 国产精品欧美亚洲77777| 高清不卡的av网站| 亚洲精品成人av观看孕妇| 日韩电影二区| 国产av精品麻豆| 久久99蜜桃精品久久| 亚洲av电影在线观看一区二区三区| 日韩 亚洲 欧美在线| 欧美97在线视频| 欧美激情高清一区二区三区 | 亚洲情色 制服丝袜| 欧美成人午夜精品| 亚洲国产精品999| 人妻一区二区av| 久久久久久久久久久免费av| 人体艺术视频欧美日本| 国产男人的电影天堂91| 亚洲精品日本国产第一区| 女的被弄到高潮叫床怎么办| 亚洲,欧美,日韩| 国产福利在线免费观看视频| 菩萨蛮人人尽说江南好唐韦庄| 中文精品一卡2卡3卡4更新| 欧美日韩视频高清一区二区三区二| 中文乱码字字幕精品一区二区三区| 18禁动态无遮挡网站| 国产淫语在线视频| 成人亚洲精品一区在线观看| 亚洲av日韩在线播放| 亚洲精品久久久久久婷婷小说| 在线观看三级黄色| 91精品伊人久久大香线蕉| 国产无遮挡羞羞视频在线观看| 午夜免费观看性视频| 精品人妻熟女毛片av久久网站| 亚洲精品,欧美精品| 国产亚洲午夜精品一区二区久久| 国语对白做爰xxxⅹ性视频网站| 精品99又大又爽又粗少妇毛片| 国产欧美亚洲国产| 菩萨蛮人人尽说江南好唐韦庄| 日日摸夜夜添夜夜爱| 欧美日韩亚洲高清精品| 老汉色av国产亚洲站长工具| 亚洲人成电影观看| 97在线视频观看| 久久国内精品自在自线图片| 极品少妇高潮喷水抽搐| 亚洲国产日韩一区二区| 香蕉国产在线看| 久久影院123| 在线免费观看不下载黄p国产| 国产成人精品一,二区| 国产精品av久久久久免费| 日本午夜av视频| 成人18禁高潮啪啪吃奶动态图| 国产亚洲一区二区精品| 深夜精品福利| 人人妻人人澡人人看| 男男h啪啪无遮挡| 超碰97精品在线观看| 日韩一区二区视频免费看| 午夜福利网站1000一区二区三区| 日韩中文字幕视频在线看片| 亚洲综合精品二区| 日韩制服丝袜自拍偷拍| 捣出白浆h1v1| 午夜av观看不卡| 啦啦啦视频在线资源免费观看| 水蜜桃什么品种好| 久久这里有精品视频免费| 日本免费在线观看一区| 中文字幕色久视频| 热99国产精品久久久久久7| 国产亚洲av片在线观看秒播厂| 国产熟女欧美一区二区| 99久久中文字幕三级久久日本| 毛片一级片免费看久久久久| 美女视频免费永久观看网站| 捣出白浆h1v1| 国产欧美日韩综合在线一区二区| 国产免费视频播放在线视频| 久热久热在线精品观看| 久久鲁丝午夜福利片| 一区在线观看完整版| 日本av手机在线免费观看| 性色av一级| 尾随美女入室| 国产精品偷伦视频观看了| www.熟女人妻精品国产| 欧美日韩av久久| 赤兔流量卡办理| 中文欧美无线码| 国产av国产精品国产| 免费黄网站久久成人精品| 午夜福利在线免费观看网站| 免费不卡的大黄色大毛片视频在线观看| 女性被躁到高潮视频| 午夜福利乱码中文字幕| 免费高清在线观看视频在线观看| 亚洲情色 制服丝袜| 亚洲精品一二三| 伊人亚洲综合成人网| 男女高潮啪啪啪动态图| 亚洲欧美精品综合一区二区三区 | 午夜福利在线观看免费完整高清在| 男女高潮啪啪啪动态图| 黄网站色视频无遮挡免费观看| 久久久久精品人妻al黑| 色婷婷av一区二区三区视频| 成年人午夜在线观看视频| 日韩,欧美,国产一区二区三区| 午夜免费男女啪啪视频观看| 黄片无遮挡物在线观看| 日日爽夜夜爽网站| 日韩电影二区| 两性夫妻黄色片| 天天躁日日躁夜夜躁夜夜| 亚洲国产毛片av蜜桃av| 久久99精品国语久久久| 黄色毛片三级朝国网站| 十八禁高潮呻吟视频| 男女免费视频国产| 一级毛片电影观看| 亚洲美女搞黄在线观看| 国产成人精品久久久久久| 综合色丁香网| 国产日韩欧美在线精品| 日本av免费视频播放| 中文字幕精品免费在线观看视频| 成人午夜精彩视频在线观看| 欧美日韩精品成人综合77777| 日本欧美国产在线视频| 欧美变态另类bdsm刘玥| 老熟女久久久| 亚洲欧美精品自产自拍| 2018国产大陆天天弄谢| 婷婷色av中文字幕| 国产精品av久久久久免费| 国产亚洲午夜精品一区二区久久| 久久久久久人人人人人| 亚洲国产精品一区二区三区在线| 国产高清国产精品国产三级| 亚洲美女搞黄在线观看| 电影成人av| 日日爽夜夜爽网站| 国产淫语在线视频| 欧美bdsm另类| 亚洲精品日本国产第一区| 老汉色av国产亚洲站长工具| 久久精品国产自在天天线| 免费av中文字幕在线| 精品99又大又爽又粗少妇毛片| 亚洲精品aⅴ在线观看| 久久影院123| 国产亚洲一区二区精品| 色94色欧美一区二区| 日韩视频在线欧美| 视频在线观看一区二区三区| 色播在线永久视频| 免费看av在线观看网站| 狠狠婷婷综合久久久久久88av| 亚洲激情五月婷婷啪啪| 高清不卡的av网站| 亚洲国产最新在线播放| 亚洲男人天堂网一区| 美女中出高潮动态图| 熟妇人妻不卡中文字幕| 欧美日韩综合久久久久久| 在线观看国产h片| 99久久人妻综合| 美女大奶头黄色视频| 菩萨蛮人人尽说江南好唐韦庄| 最近2019中文字幕mv第一页| 午夜免费男女啪啪视频观看| 中文字幕人妻丝袜制服| 亚洲国产精品一区三区| 久久久久久久亚洲中文字幕| 91精品三级在线观看| 欧美日韩精品成人综合77777| 欧美日韩精品网址| 黄色配什么色好看| 伦理电影大哥的女人| www.熟女人妻精品国产| 亚洲欧美中文字幕日韩二区| 亚洲国产毛片av蜜桃av| 男女边摸边吃奶| 男男h啪啪无遮挡| 亚洲欧美精品综合一区二区三区 | 久久免费观看电影| 免费观看性生交大片5| 国产亚洲av片在线观看秒播厂| 欧美精品人与动牲交sv欧美| 久久久久视频综合| 蜜桃国产av成人99| 好男人视频免费观看在线| 亚洲欧美日韩另类电影网站| 亚洲人成77777在线视频| 欧美另类一区| 99久久精品国产国产毛片| 亚洲国产毛片av蜜桃av| 亚洲人成77777在线视频| 亚洲欧洲精品一区二区精品久久久 | 黄色 视频免费看| 久久毛片免费看一区二区三区| 亚洲国产日韩一区二区| 人人妻人人澡人人看| av福利片在线| 欧美 亚洲 国产 日韩一| 欧美+日韩+精品| 久久精品人人爽人人爽视色| 99热网站在线观看| 久久人人爽av亚洲精品天堂| 人妻系列 视频| 国产精品欧美亚洲77777| 如日韩欧美国产精品一区二区三区| 欧美中文综合在线视频| 最近最新中文字幕免费大全7| 老汉色av国产亚洲站长工具| 久久精品熟女亚洲av麻豆精品| 亚洲欧美一区二区三区国产| 久久久久久久久久人人人人人人| 亚洲国产精品一区三区| 亚洲国产毛片av蜜桃av| 日韩不卡一区二区三区视频在线| 国产精品国产三级国产专区5o| 国产熟女欧美一区二区| av在线播放精品| 亚洲视频免费观看视频| 精品午夜福利在线看| 欧美成人午夜免费资源| 久久99蜜桃精品久久| 国产精品久久久久久精品电影小说| 成人亚洲欧美一区二区av| 亚洲精品中文字幕在线视频| 少妇人妻精品综合一区二区| 熟女电影av网| 日本vs欧美在线观看视频| 国产无遮挡羞羞视频在线观看| 精品国产一区二区三区久久久樱花| 在线观看国产h片| 熟妇人妻不卡中文字幕| 91aial.com中文字幕在线观看| 大片免费播放器 马上看| 一个人免费看片子| 中文字幕人妻熟女乱码| 97人妻天天添夜夜摸| 香蕉丝袜av| 国产精品 国内视频| 日日爽夜夜爽网站| 黑人巨大精品欧美一区二区蜜桃| 亚洲一区二区三区欧美精品| 啦啦啦中文免费视频观看日本| 亚洲精品一二三| 日韩电影二区| 国产一区亚洲一区在线观看| 性色av一级| 久久久亚洲精品成人影院| 免费大片黄手机在线观看| 成人漫画全彩无遮挡| 午夜福利影视在线免费观看| 在线观看人妻少妇| 精品一区二区免费观看| 伦理电影免费视频| 久久久a久久爽久久v久久| 如日韩欧美国产精品一区二区三区| 亚洲精品成人av观看孕妇| 高清视频免费观看一区二区| 欧美激情高清一区二区三区 | 菩萨蛮人人尽说江南好唐韦庄| 丝袜在线中文字幕| 中文欧美无线码| 桃花免费在线播放| 欧美日韩亚洲高清精品| 天堂中文最新版在线下载| 日韩欧美精品免费久久| 亚洲国产色片| 肉色欧美久久久久久久蜜桃| 卡戴珊不雅视频在线播放| 国产深夜福利视频在线观看| 国产极品粉嫩免费观看在线| 最近手机中文字幕大全| 精品第一国产精品| 成人午夜精彩视频在线观看| 观看av在线不卡| 五月天丁香电影| 久久毛片免费看一区二区三区| 有码 亚洲区| 免费黄频网站在线观看国产| 午夜福利在线免费观看网站| 欧美国产精品一级二级三级| 免费少妇av软件| 免费在线观看完整版高清| 久久ye,这里只有精品| 亚洲国产成人一精品久久久| av在线观看视频网站免费| 国产精品 欧美亚洲| 久久精品国产鲁丝片午夜精品| 国产精品国产三级专区第一集| 啦啦啦中文免费视频观看日本| 久久精品国产a三级三级三级| 成人黄色视频免费在线看| 可以免费在线观看a视频的电影网站 | 亚洲欧美精品自产自拍| 欧美日韩国产mv在线观看视频| 亚洲成色77777| 9色porny在线观看| 亚洲在久久综合| 国产精品三级大全| 亚洲视频免费观看视频| 国产又色又爽无遮挡免| 国产片内射在线| 国产在线一区二区三区精| 国产白丝娇喘喷水9色精品| 中文字幕av电影在线播放| 日本黄色日本黄色录像| 日韩一本色道免费dvd| 国产精品国产三级国产专区5o| 亚洲一区二区三区欧美精品| 国产亚洲一区二区精品| 99精国产麻豆久久婷婷| 亚洲国产欧美网| 另类亚洲欧美激情| 亚洲av.av天堂| 国产精品熟女久久久久浪| 日韩视频在线欧美| 免费不卡的大黄色大毛片视频在线观看| 国产男女内射视频| 麻豆乱淫一区二区| 大香蕉久久成人网| 精品少妇久久久久久888优播| 久久亚洲国产成人精品v| 十八禁高潮呻吟视频| 色吧在线观看| 亚洲综合色网址| 日韩一区二区视频免费看| 男女免费视频国产| 亚洲欧美一区二区三区国产| 久久久亚洲精品成人影院| 一级黄片播放器| 看免费成人av毛片| 一二三四中文在线观看免费高清| 午夜福利一区二区在线看| 2018国产大陆天天弄谢| 午夜激情av网站| 这个男人来自地球电影免费观看 | 性色avwww在线观看| 国产精品.久久久| 午夜91福利影院| 在线亚洲精品国产二区图片欧美| 91aial.com中文字幕在线观看| 香蕉精品网在线| 99热国产这里只有精品6| 国产亚洲欧美精品永久| 亚洲国产看品久久| 国产片内射在线| 亚洲人成网站在线观看播放| 国产精品一区二区在线不卡| 尾随美女入室| 在线观看三级黄色| 免费在线观看视频国产中文字幕亚洲 | 一边摸一边做爽爽视频免费| 黄频高清免费视频| 天堂8中文在线网| 亚洲精品日本国产第一区| 国产成人一区二区在线| 在线观看三级黄色| 亚洲精品在线美女| 精品国产超薄肉色丝袜足j| 最近最新中文字幕大全免费视频 | 99国产综合亚洲精品| 亚洲av福利一区| 在线观看免费视频网站a站| 国产精品av久久久久免费| 99九九在线精品视频| tube8黄色片| 色哟哟·www| 男人舔女人的私密视频| 看十八女毛片水多多多| 色婷婷av一区二区三区视频| 欧美 日韩 精品 国产| av福利片在线| 国产精品免费视频内射| 熟女电影av网| 下体分泌物呈黄色| 亚洲国产毛片av蜜桃av| 日韩大片免费观看网站| 侵犯人妻中文字幕一二三四区| 美女脱内裤让男人舔精品视频| 国产一区二区 视频在线| 欧美日韩亚洲高清精品| 免费观看a级毛片全部| 春色校园在线视频观看| 成人毛片a级毛片在线播放| 精品少妇一区二区三区视频日本电影 | 精品一品国产午夜福利视频| 亚洲av福利一区|