• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Ghost imaging-based optical cryptosystem for multiple images using integral property of the Fourier transform?

    2021-12-22 06:48:52YiKang康祎LeihongZhang張雷洪HualongYe葉華龍DaweiZhang張大偉andSonglinZhuang莊松林
    Chinese Physics B 2021年12期
    關(guān)鍵詞:華龍松林大偉

    Yi Kang(康祎), Leihong Zhang(張雷洪), Hualong Ye(葉華龍),Dawei Zhang(張大偉), and Songlin Zhuang(莊松林)

    University of Shanghai for Science and Technology,Shanghai 200093,China

    Keywords: ghost imaging,image encryption,Fourier transform

    1. Introduction

    With the development of science and technology, information exchange becomes more and more frequent, but with the emergence of“PRISM”,people pay more and more attention to the security of information. Optical information security technology has been the focus of attention and studied because of its high speed, parallelism, multi-dimensionality,and other characteristics.[1,2]As an information carrier,image has the advantages of a large amount of information,specific,vivid images,etc.,so image encryption is an important part of optical information security technology.[3,4]

    In 1995, Refregier and Javidi realized optical image encryption by using double random phase encoding(DRPE).[5]DRPE is easy to operate and can be combined with other technologies, which promotes the rapid development of optical image encryption technology. With the progress and development of technology,multiple-image encryption has been deeply studied to meet the growing needs of people.[6–9]However,the existing optical image encryption technology requires high precision of the optical instrument, and the ciphertext is expressed by complex amplitude, which is not conducive to transmission and storage. Therefore,a simple and fast optical encryption method is urgently needed, while ghost imaging technology provides a new way to solve this problem.

    Different from traditional imaging techniques, ghost imaging mainly uses the higher-order correlation of the light field to obtain the spatial and phase distribution information of the object, and can realize single-pixel imaging.[10,11]Ghost imaging has received widespread attention since it was proposed. The research on ghost imaging is also gradually deepened from the aspects of reconstruction algorithm, experimental device, and modulation pattern.[12–15]In 2010,Pere Clemente took the lead in combining optical encryption and ghost imaging, opening the door for the application of ghost imaging in information security.[16]Tanha used the ghost imaging technique to encrypt the discrete cosine transform coefficients of the image.[17]Konget al.realized optical image encryption by controlling the initial coordinates of the light source.[18]Chenet al.proposed an information authentication method based on ghost imaging.[19]Zhaoet al.encrypted information by changing the order of modulation patterns of ghost imaging.[20]To further improve the encryption efficiency of ghost imaging, Wuet al. took the lead in using position multiplexing to realize multiple-image encryption of ghost imaging.[21]Menget al. applied row scanning,logistic map, lifting wavelet transform, and other schemes to ghost imaging encryption scheme to realize multiple-image encryption.[22–24]Shiet al. used encoded multiplexing patterns to illuminate multiple objects to achieve the purpose of multiple-image encryption.[25]

    However, for multiple-image encryption, the problem of image aliasing is inevitable, which affects the quality of decryption. To solve this problem,we propose a novel multipleimage encryption scheme based on ghost imaging. In this scheme, firstly, an image is encrypted by the ghost imaging encryption scheme and the generated bucket detector values as ciphertext. Then modulation patterns of other images are constructed by using the integral property of the Fourier transform and used as the key of the corresponding image. Finally, the ciphertext and keys are transmitted to the receiver to complete the encryption process. The receiver uses different keys to decrypt the ciphertext, different plaintext images can be obtained. This scheme differs from other schemes in that it is mainly the ciphertext determines the key,not the key determines the ciphertext. Ciphertext generation only requires one encryption. This scheme can improve the encryption efficiency and solve the problem of image crosstalk. Experiments and simulations verify the effectiveness, safety, and robustness of this scheme. This scheme also can be adopted for oneencryption and multi-decryption scenario,such as multi-level information authentication system or one-to-many encryption transmission.

    2. Image encryption scheme based on computational ghost imaging

    The traditional ghost imaging encryption scheme is shown in Fig. 1. Alice wants to encrypt the plaintext informationT(x,y)and transmit it to Bob. She uses the computational ghost imaging experiment device shown in Fig.1(b). A spatially coherent monochromatic laser beam passes through a spatial light modulator(SLM),which introduces an arbitrary phase-only mask, with phase values uniformly distributed in the range[0?2π]. The modified beamIi(x,y)illuminates the object,and the transmitted light is collected by a bucket detector,a bucket detector valueDiis generated,as shown below:

    This operation is repeatedNtimes forNdifferent phase profiles?i(x,y). Next, a series of bucket detector values are shared with Bob using a public channel. AndNdifferent phase profiles are transmitted to Bob through a secure channel. Bob calculates the corresponding optical field intensity distribution of each phase profile according to Fresnel diffraction,as shown below:

    whereEin(x,y)is the complex field of the coherent light beam,hz(x,y) is the Fresnel propagation kernel at distancezand?denotes the two-dimensional(2D)convolution operation. According to the bucket detector valuesDand intensity distributionIi(x,y), the object information can be recovered through the following liner operation, where〈·〉denotes the average calculation:

    Fig.1. Scheme of the encryption method based on computational ghost imaging: (a)block diagram showing encryption/decryption procedure;(b)experiment setup of computational ghost imaging.

    3. Multiple-image encryption scheme based on computational ghost imaging

    3.1. Key generation

    In previous studies, for ghost imaging encryption schemes, the modulation patterns were always constructed firstly, and then the plaintext information was encrypted. Especially for multiple-image encryption, multiple modulation patterns need to be constructed. This means that the ciphertext is always determined by the key, so, can the key be designed depends on the ciphertext?

    Assuming that the target imageT(x,y) is illuminated by its modulation patternIi(x,y), the ciphertextDican be obtained. Can the modulation patternHi(x,y) be designed for the target imageM(x,y) so that its ciphertext is alsoDi? As shown in Eq.(4).

    According to the integral property of the Fourier transform[26]

    According to the above equation,this issue could be converted to an equivalent problem, that is, given target imageM(x,y) as the constraint in the signal domain, how does one design theHi(x,y) to satisfy the constraint in the Fourier domain as Eq. (6)? It can be shown in Fig. 2. IFT is inverse Fourier transform.

    Fig.2. Block diagram of the constraint in the signal and Fourier domain.

    So, this problem can be understood as the problem of recovering phase information by using intensity information,that is a phase retrieval problem. Therefore, when image informationM(x,y)and ciphertextDiare given,the modulation pattern can be generated in the following ways:

    Step 1 Generating a modulation patternHi?1(x,y) for initialization;

    Step 2Performing the Fourier transform forHi?1(x,y)M(x,y) and getmhi?1(ε,η). With ciphertextDias constraint,equation(6)is applied to the spectrum to generate a new Fourier spectrummhi(ε,η).

    Step 3 Inverse Fourier transform the modified Fourier spectrummhi(ε,η)back to the signal domain and generate a modulation patternHi(x,y)according to

    According to the number of ciphertexts, the modulation pattern can be generated according to the cycle shown in Fig.3.This assumes that the number of ciphertexts isK.

    To this point,we can find that for a given image,we can construct special modulation patterns to meet the requirements of ciphertext. That is,we can design keys according to the ciphertext.

    Fig.3. Flow chart of modulation patterns generation.

    3.2. Encryption process

    According to the principle of modulation patterns generation, we propose a novel multiple-image encryption scheme based on ghost imaging, as shown in Fig. 4. In this scheme,different keys are designed to decrypt the same ciphertext and different images can be obtained.

    Step 1 A series of random patternsK1are used to encrypt a single plaintext imageT,and a series of bucket detector valuesDare obtained as ciphertext.

    Step 2 The ciphertext as the constraint is used to generate modulation patterns of different images according to the way shown in Fig.3.And these modulation patterns are used as the keys of corresponding images.

    Step 3 The ciphertextDand the generated keyring{K1,K2,...,Ki}are transmitted to the receiver to complete the encryption process.

    3.3. Decryption process

    After receiving the ciphertext and the keyring, the receiver can extract different keys from the keyring to decrypt the ciphertext and obtain different plaintext images from it.The decryption method can be seen in Eq.(3).

    But the correlation algorithm requires a large amount of ciphertext information, which means multiple sampling is needed. This also leads to substantially reduced decryption efficiency. To solve this problem,the compressive sensing algorithm is used for decryption.[27]If we spread a modulation pattern in a row as a row vectorIr,then a series of modulation patterns can be considered a measurement matrix in compressive sensing. So, the decryption process can be obtained by solving a convex optimization program that is expressed as

    where‖·‖is the l1-norm. The application of the compressive sensing algorithm improves the reconstruction quality of plaintext image and can reconstruct plaintext image under the condition of less ciphertext.

    The MGI mainly realizes the secure transmission of multiple-image by constructing the modulation patterns of different images. In encryption process,it only needs to encrypt an image instead of all images. Ciphertext data is small and easy to be transmitted. In decryption process, different images can be decrypted only with corresponding modulation patterns,and the decryption algorithm is simple.

    Fig.4. Encryption and decryption process of MGI.

    4. Simulation

    Firstly, the proposed scheme is analyzed by simulation.The simulation is carried out under a 64-bit Windows 10 system, and the platform is MATLAB 2019b. The size of the plaintext image is 64×64 pixels. The sampling ratio is 100%,the sampling ratio is defined as the ratio of sampling number and plaintext image pixels (i.e., the sampling numbers are 4096, which also means that the modulation patterns are 4096). The decryption algorithm is the orthogonal matching pursuit algorithm in the compressive sensing algorithm. To evaluate the decryption quality objectively,the correlation coefficient (CC) is used as the objective evaluation standard to evaluate the similarity between the original image and the decrypted image.[28]The closer to 1 the value of the CC is, the better the reconstruction effect is. Wherexandyrepresent the original plaintext image and the decrypted image respectively.

    4.1. Feasibility analysis

    Four different images are used as plaintext information, including binary images and grayscale images. We use Hadamard patterns as the key to encrypt the first plaintext image and get the ciphertext. Ciphertext is a series of meaningless intensity sequences,as shown in Fig.5(i). Then,the keys of the other three images are generated by using the method of this paper and the obtained ciphertext. Finally, the ciphertext and keys are transmitted to the receiver to complete the image encryption.

    The receiver uses different keys to decrypt the same ciphertext to obtain different reconstructed plaintext images.Figure 5 shows that CC between the four decrypted images and the original plaintext images are 0.9875, 09975, 0.9462,and 0.9204,respectively. Obviously,the plaintext information can be reconstructed well. The first image uses the Hadamard pattern as the key,so it has a better reconstruction effect(The Hadamard patterns are a deterministic orthogonal set,in principle, the image can be reconstructed without noticeable difference from the target image, when is fully sampled). The second image as a binary image has a higher sparsity,it can be reconstructed better under the same sampling ratio. The third and fourth image are not special in terms of key and sparsity,so the reconstruction effect is worse than the first two,but the contrasts and details can still show the plaintext information very well. The results show that when only a single ciphertext is transmitted,different plaintext information can be decrypted with different keys,and all images have a good reconstruction effect.

    Fig.5. Panels(a)–(d)are the original plaintext images;panels(e)–(h)are the decrypted images;panel(i)is the ciphertext.

    4.2. Security analysis

    For an encryption system,ensuring the security of information is the prerequisite of system effectiveness. For an attacker, if the statistics law of information in ciphertext is the same as the plaintext,the attacker can break out the encrypted information through the ciphertext-only attack. As shown in Table 1,for different plaintext information,these corresponding ciphertext displays a similar tendency. Obviously, it is difficult for an attacker to analyze valid information from the ciphertext, ensuring the security of the plaintext. MGI fully realizes the diffusion and confusion of plaintext information.

    In cryptography, according to the relationship between plaintext and ciphertext, the attacker can obtain the keys through the iterative algorithm, and then break out the encryption system. We use the known-plaintext attack (KPA)of paper[29]to further analyze the security of MGI. The idea of the attack scenario is that for a sample,a fixed modulation pattern illuminates multiple images in sequence and obtains the corresponding bucket detector values, which can also be understood as multiple images illuminate a fixed modulation pattern. If information of multiple images is known,the modulation pattern can be obtained by solving linear equations.After many cycles,keys can be obtained.

    Table 1. Histogram of plaintext and ciphertext.

    Fig.6. KPA results. Panel(a)is the cracked information of the first image under KPA when the modulation patterns are fixed;Panels(b)–(d)are the cracked information of other images under KPA.

    As shown in Fig. 6, for the fixed modulation patterns,KPA can be obtained keys of the first image and the first image can be decrypted. However,the information of the other three images cannot be obtained. Because the first image uses fixed patterns (i.e., keys are fixed), which can be cracked, but the keys of other images are related to the image itself and cannot be cracked, effectively guaranteeing the validity of most information. For chosen-ciphertext attack and known-plaintext attack,only the key of the first image can be cracked,but the keys of other images cannot be cracked. It is worth stating that we are simply assuming that the key to the first image is fixed,and that if it is random,the security of the first image is guaranteed.

    Based on the above analysis, it is obvious that MGI can effectively resist various attack modes.

    4.3. Robustness analysis

    During the encryption and transmission of information,the effect of noise and the loss of information are inevitable.Therefore,a qualified encryption system needs strong robustness.

    In practical applications,the thermal noise caused by optical devices and interference caused by the non-ideal channel will affect the information. Therefore, we introduce different types of noise to verify the anti-noise ability of MGI.For thermal noise caused by optical devices, we introduce Gaussian noise with different signal-to-noise ratios(SNR)in each sampling process. The higher the signal-to-noise ratio,the weaker the noise. For the interference caused by the non-ideal channel,we add multiplicative noise to the transmitted ciphertext.We suppose the noise is added to the ciphertext in the following form:

    whereiis represented as a random noise with mean 0 and different variances,andDis ciphertext information.

    Fig. 7. CC between the plaintext and reconstruction information under different types of noise.

    Figure 7 shows that for Gaussian noise,with the increase of SNR,the reconstruction quality is gradually improved. The reconstruction result is good when the SNR is 20. For multiplicative noise, with the increase of noise intensity, the reconstruction effect shows a downward trend. When the noise is sufficiently large,the CC between the decrypted image and the original image is still above 0.8. The results show that the thermal noise generated by the optical devices in the system has some influence on the decryption,the impact of interference caused by the non-ideal channel on the decryption is relatively small. The interruption of the channel or the interference of the attacker may cause the loss of ciphertext, and thus affect the decryption effect. In the following, different numbers of ciphertext are cropped to verify capacity of MGI to resist to the ciphertext loss. Take a binary image as an example, as shown in Fig.8, as the loss of ciphertext gradually increases, the difference between the decrypted information and the original information becomes larger. However, when the loss ratio of the ciphertext is 50%, the valid information can still be decrypted. The results show that MGI can resist the loss of ciphertext effectively.

    Fig. 8. CC between the plaintext and reconstruction information under different cropping ratios.

    The results of noise attack and cropping attack show that MGI can resist noise interference and ciphertext loss effectively. MGI has strong robustness.

    4.4. Information capacity analysis

    As a multiple-image encryption scheme, whether the increase of data quantity will cause image aliasing is a problem to be considered. We verify this problem by increasing the number of images and compare the reconstruction results of MGI with multiple-image encryption scheme based on ghost imaging and position multiplexing (PM-MGI) and multipleimage encryption scheme based on lifting wavelet transform and ghost imaging (LWT-MGI) in paper.[21,22]Multiple images adopted are binary images.

    Figure 9 shows that with the increase in the number of encrypted images, CC of LWT-MGI and PM-MGI shows a downward trend. Especially for PM-MGI,the decrypted quality drops seriously when the number of images to be encrypted increases.For MGI,the increase in the number of images does not affect the decrypted effect,which ensures the accuracy of the decrypted information while improving the number of encrypted images. Because for MGI,the realization of multipleimage encryption and decryption is based on the generation of keys, and there is no information overlap in encryption process. For PM-MGI,position multiplexing leads to ciphertext aliasing. Therefore,the increase in the number of images will affect the decryption effect. For LWT-MGI, this method mainly uses image sparsity to achieve multiple-image encryption,but with the increase of the number of images,less detail is retained after each image sparse, which affects the quality of the reconstruction image.

    Fig. 9. CC between the plaintext and reconstruction information under different numbers of images.

    Schematically, our scheme is entirely different from the traditional multiple-image encryption schemes. In existing multiple-image encryption schemes, the ciphertext is mostly determined by the key(That is to use the given key to encrypt the plaintext and get the ciphertext). However, the ciphertext determines the key in our scheme (The keys are calculated from the given ciphertext according to the images). Most of the images in our scheme don’t need to be encrypted(Except the first image),and only to participate in the generation of the keys. Therefore, there is no need to mix or overlap multiple images in encryption process, and the reconstructed images don’t have image aliasing problem.

    5. Experiment

    The experiment scheme proposed in this paper is shown in Fig. 10, which is specifically divided into three steps: encryption,key generation,and decryption. For encryption process,the laser irradiates the object through the beam expander,and the reflected light is focused on the digital micromirror device (DMD, V-7001) display screen through the lens.DMD introduces Hadamard patterns to simulate the pseudothermal light source. The object focused on the DMD display screen is modulated by the pseudo-thermal light source,and the reflected light is received by the photomultiplier tube(PMT, H10721-01)) and transmitted to the acquisition card(M2i.2030-exp). A series of intensity sequences are generated and as ciphertext to complete the encryption process. The key generation mainly uses ciphertext as a constraint to generate corresponding modulation patterns of multiple images. The specific operation process is implemented on the computer.For decryption process,different images can be decrypted using different modulation patterns.

    Fig.10. Experimental flow and device diagram.

    The above experimental flow is used to encrypt three images to verify the effectiveness of MGI in practical application. Figure 11 shows that the CC between the reconstruction image and the original image are 0.8965,0.9436,and 0.9081,respectively. The reconstruction results are good and there is no image aliasing problem. For the first image, because of lens focus and operation error,there are problems of edge blur and position shift, compared with other images, CC is lower.The latter two images are mainly decrypted by keys without repeated optical encryption. Experimental results show that MGI is effective in practical application,and there is no aliasing between images.

    Fig.11. Experiment results.

    6. Discussion

    A key advantage of our design over previous work is that can effectively avoid the problem of information aliasing caused by the increase of plaintext information and not lose plaintext information details. The reconstruction quality of the plaintext doesn’t decrease with the increase of information. For different plaintext information,the keys are also different. This can achieve high security just like the“one-timepad” scheme. It can effectively resist various attack modes(e.g.known/chosen-plaintext attack), and the amount of ciphertext data is small, so this scheme can be well adapted to the ghost imaging broadcasting system for public detection.Besides, because different plaintext information corresponds to different keys,the scheme is suitable for one-encryption and multi-decryption scenario,such as multi-level information authentication system or one-to-many encryption transmission.Ghost imaging can achieve indirect-line-of-sight imaging and weak-light imaging, and it demonstrates advantages in some invisible wavebands. These characteristics also provide the possibility for our scheme to encrypt information in special scenarios.

    The main limitation of our system is the amount of data.With the increase of the image number, the size of keys is increased rapidly. In the existing multi-image encryption schemes,researchers mostly construct special modulation patterns to decrypt multiple images with few keys. But this kind of scheme will often cause image aliasing. The details of plaintext will be lost in the process of transformation and selection (e.g.discrete cosine transformation). Besides, from a security perspective,if the keys are stolen,all information will be threatened.[23,30]Although the amount of data transmitted in our system will increase with the amount of plaintext image,it also reduces the risk of all information being stolen to some extent. The development of machine learning also makes it possible to reduce the amount of transmitted data and speed up information reconstruction.[31,32]

    7. Conclusion

    In this paper, we proposed a novel ghost imaging-based optical cryptosystem for multiple images using the integral property of the Fourier transform. Compared with other multiple-image optical encryption schemes, we mainly construct different keys to achieve the encrypted transmission of multiple images. In encryption process, firstly, we use the ghost imaging encryption scheme to encrypt the first image.Then,the generated ciphertext is used as a constraint to realize the generation of keys of other images according to the integral property of the Fourier transform. Finally, the generated key and ciphertext are transmitted to the receiver to complete the encryption process. In decryption process, the receiver uses different keys to decrypt the same ciphertext and different images can be obtained. In this scheme, the key of each image is related to the image itself, so it can effectively resist various attack modes. And this scheme also solves the problem of aliasing of decrypted information. Simulations and experiments show the effectiveness, security, and robustness of this scheme. This scheme provides a new idea for optical image encryption and information authentication,among others.

    猜你喜歡
    華龍松林大偉
    Implementation and application of PyNE sub-voxel R2S for shutdown dose rate analysis
    好好去愛
    心聲歌刊(2022年2期)2022-06-06 05:14:32
    我國第二臺(tái)“華龍一號(hào)”核電機(jī)組并網(wǎng)發(fā)電
    張大偉作品
    華龍引領(lǐng) 國之重器
    中國核電(2021年3期)2021-08-13 08:56:04
    華龍一號(hào)海外首堆成功并網(wǎng)發(fā)電
    Enhanced microwave absorption performance of MOF-derived hollow Zn-Co/C anchored on reduced graphene oxide?
    神奇的邊界線:一不留神就出國
    智慧少年(2017年8期)2018-01-10 21:39:12
    第三十一個(gè)蛋
    我的爺爺和長征
    特大巨黑吊av在线直播| 男人狂女人下面高潮的视频| 亚洲精品一二三| 国产男人的电影天堂91| 欧美老熟妇乱子伦牲交| 国产欧美日韩一区二区三区在线 | 日韩av不卡免费在线播放| 国内揄拍国产精品人妻在线| 欧美一级a爱片免费观看看| 我要看黄色一级片免费的| 国产成人91sexporn| 天天操日日干夜夜撸| 大又大粗又爽又黄少妇毛片口| 大片免费播放器 马上看| 在线观看三级黄色| 伊人亚洲综合成人网| 国产一区二区三区综合在线观看 | 成人亚洲欧美一区二区av| 免费人成在线观看视频色| 日韩一区二区三区影片| 国产精品久久久久久av不卡| 男女边吃奶边做爰视频| 自拍偷自拍亚洲精品老妇| 欧美日韩一区二区视频在线观看视频在线| 国产免费又黄又爽又色| 妹子高潮喷水视频| 黄色毛片三级朝国网站 | 在线免费观看不下载黄p国产| 多毛熟女@视频| 最新中文字幕久久久久| av在线观看视频网站免费| 大陆偷拍与自拍| 一级爰片在线观看| 超碰97精品在线观看| 久久 成人 亚洲| 国产成人精品婷婷| 深夜a级毛片| 国产成人freesex在线| 又爽又黄a免费视频| 狂野欧美激情性bbbbbb| 免费大片18禁| 色吧在线观看| 色网站视频免费| 国产日韩欧美在线精品| 少妇熟女欧美另类| 亚洲高清免费不卡视频| 亚洲av福利一区| 国产一区二区在线观看日韩| 久久久亚洲精品成人影院| 久久久精品免费免费高清| 国产精品一区www在线观看| 久久 成人 亚洲| 国产精品一区二区在线不卡| 最近最新中文字幕免费大全7| 亚洲精品视频女| 国产熟女欧美一区二区| 国产在线视频一区二区| 精品亚洲成a人片在线观看| 亚洲av综合色区一区| 老司机影院成人| 亚洲婷婷狠狠爱综合网| 欧美少妇被猛烈插入视频| www.色视频.com| 亚洲精品乱码久久久久久按摩| 黄色日韩在线| 欧美老熟妇乱子伦牲交| 国产色爽女视频免费观看| 人妻系列 视频| 啦啦啦视频在线资源免费观看| xxx大片免费视频| 欧美日韩在线观看h| 亚洲欧美精品自产自拍| h日本视频在线播放| 久久亚洲国产成人精品v| 丁香六月天网| 18禁动态无遮挡网站| 曰老女人黄片| 大香蕉97超碰在线| 国产高清有码在线观看视频| 大片电影免费在线观看免费| 最黄视频免费看| a级毛片在线看网站| 国产精品.久久久| 日韩一区二区视频免费看| 亚洲av在线观看美女高潮| 欧美丝袜亚洲另类| 免费在线观看成人毛片| 欧美 亚洲 国产 日韩一| 久久热精品热| 少妇精品久久久久久久| 亚洲av综合色区一区| 国产中年淑女户外野战色| 精品一区二区三区视频在线| 欧美日韩国产mv在线观看视频| 亚洲欧美日韩卡通动漫| 色视频在线一区二区三区| 五月玫瑰六月丁香| 欧美精品国产亚洲| 亚洲精品乱久久久久久| 国产成人免费观看mmmm| 亚洲天堂av无毛| 精品人妻偷拍中文字幕| 久久人妻熟女aⅴ| 夜夜看夜夜爽夜夜摸| 国产在线免费精品| 免费看光身美女| 国产一区有黄有色的免费视频| 久久精品国产亚洲av天美| 91精品国产九色| 黄色视频在线播放观看不卡| 色婷婷久久久亚洲欧美| 高清欧美精品videossex| 少妇猛男粗大的猛烈进出视频| av天堂久久9| 激情五月婷婷亚洲| 噜噜噜噜噜久久久久久91| 欧美精品国产亚洲| 欧美精品国产亚洲| 国产精品人妻久久久影院| 十分钟在线观看高清视频www | av一本久久久久| 国产成人精品婷婷| 久久人人爽人人爽人人片va| 亚洲精品乱久久久久久| 亚洲自偷自拍三级| 啦啦啦在线观看免费高清www| 亚州av有码| 免费久久久久久久精品成人欧美视频 | 亚洲成人一二三区av| 亚洲国产精品一区三区| 亚洲av国产av综合av卡| 在线天堂最新版资源| 中文字幕人妻丝袜制服| 国产男女超爽视频在线观看| 91精品一卡2卡3卡4卡| 亚洲,欧美,日韩| 色网站视频免费| 国产永久视频网站| 一级,二级,三级黄色视频| 日韩人妻高清精品专区| 国产一区二区三区av在线| 99热国产这里只有精品6| 亚洲伊人久久精品综合| 成人特级av手机在线观看| 人人妻人人添人人爽欧美一区卜| 国产高清有码在线观看视频| videossex国产| 夜夜骑夜夜射夜夜干| 亚洲欧美中文字幕日韩二区| 97精品久久久久久久久久精品| 人妻系列 视频| 男人狂女人下面高潮的视频| 免费黄网站久久成人精品| 国产一级毛片在线| 国产精品一区www在线观看| 成年人午夜在线观看视频| 亚洲欧美中文字幕日韩二区| 男人爽女人下面视频在线观看| 国产中年淑女户外野战色| 内地一区二区视频在线| 国产淫语在线视频| 亚洲在久久综合| 日本免费在线观看一区| 久久久午夜欧美精品| 国产 一区精品| 国内揄拍国产精品人妻在线| 国产精品国产三级国产av玫瑰| 国产综合精华液| 91精品国产国语对白视频| 国产精品久久久久久精品电影小说| 韩国av在线不卡| 乱码一卡2卡4卡精品| 自线自在国产av| 2018国产大陆天天弄谢| 久久精品夜色国产| 99热这里只有是精品50| 三级经典国产精品| 欧美精品高潮呻吟av久久| 欧美一级a爱片免费观看看| 丝袜喷水一区| 人妻一区二区av| 日韩欧美 国产精品| 99久久精品热视频| 国产高清国产精品国产三级| 2021少妇久久久久久久久久久| 乱系列少妇在线播放| 免费看日本二区| 亚洲av在线观看美女高潮| 男女无遮挡免费网站观看| 亚洲国产精品999| 插逼视频在线观看| 一级毛片黄色毛片免费观看视频| 蜜臀久久99精品久久宅男| 九九久久精品国产亚洲av麻豆| 高清av免费在线| 久久韩国三级中文字幕| 日韩 亚洲 欧美在线| 免费看av在线观看网站| 少妇被粗大的猛进出69影院 | 黄片无遮挡物在线观看| 久久久久久伊人网av| 亚洲国产精品一区三区| 日日摸夜夜添夜夜爱| 曰老女人黄片| 亚洲美女搞黄在线观看| 亚洲,欧美精品.| 免费女性裸体啪啪无遮挡网站| 操出白浆在线播放| 法律面前人人平等表现在哪些方面 | 免费日韩欧美在线观看| 黄色 视频免费看| 久热这里只有精品99| 欧美日韩亚洲综合一区二区三区_| 免费观看a级毛片全部| 久久午夜综合久久蜜桃| a 毛片基地| 男女午夜视频在线观看| 人妻一区二区av| 国产黄色免费在线视频| 欧美一级毛片孕妇| 搡老熟女国产l中国老女人| 亚洲国产成人一精品久久久| 在线观看一区二区三区激情| 十八禁网站网址无遮挡| 久久免费观看电影| 成人三级做爰电影| 美国免费a级毛片| 秋霞在线观看毛片| 亚洲av成人不卡在线观看播放网 | 婷婷丁香在线五月| 制服人妻中文乱码| 在线十欧美十亚洲十日本专区| 悠悠久久av| 国产91精品成人一区二区三区 | 两个人免费观看高清视频| 中文字幕人妻丝袜一区二区| 成在线人永久免费视频| 亚洲色图 男人天堂 中文字幕| 国产精品亚洲av一区麻豆| 亚洲综合色网址| 91大片在线观看| 超碰成人久久| 亚洲精品国产av蜜桃| 欧美黑人精品巨大| 捣出白浆h1v1| 亚洲黑人精品在线| 国产精品亚洲av一区麻豆| 免费在线观看日本一区| 夜夜骑夜夜射夜夜干| 欧美日韩亚洲高清精品| 欧美老熟妇乱子伦牲交| 性色av乱码一区二区三区2| 精品久久久久久电影网| 久久热在线av| 亚洲精品一卡2卡三卡4卡5卡 | 亚洲精品一二三| 天堂中文最新版在线下载| 日韩制服骚丝袜av| 高潮久久久久久久久久久不卡| 久久久久网色| 欧美+亚洲+日韩+国产| 亚洲视频免费观看视频| 免费女性裸体啪啪无遮挡网站| 十分钟在线观看高清视频www| 亚洲色图综合在线观看| 国产成人精品久久二区二区免费| 欧美 日韩 精品 国产| 深夜精品福利| 最新的欧美精品一区二区| 国产成人啪精品午夜网站| 王馨瑶露胸无遮挡在线观看| 999久久久精品免费观看国产| 国产欧美日韩一区二区三 | 免费不卡黄色视频| 久久99热这里只频精品6学生| 一级黄色大片毛片| h视频一区二区三区| 久久久国产精品麻豆| 国产不卡av网站在线观看| 久久免费观看电影| 夫妻午夜视频| 老司机亚洲免费影院| 丁香六月天网| 国产三级黄色录像| 亚洲熟女精品中文字幕| 欧美大码av| 日韩中文字幕欧美一区二区| 人妻一区二区av| 两性夫妻黄色片| 久久国产亚洲av麻豆专区| 男女午夜视频在线观看| 亚洲精品美女久久久久99蜜臀| 国产精品成人在线| 久久久久视频综合| 在线观看免费高清a一片| 国产高清视频在线播放一区 | 精品一区二区三区av网在线观看 | 欧美少妇被猛烈插入视频| 亚洲自偷自拍图片 自拍| 亚洲精品一区蜜桃| 成人亚洲精品一区在线观看| 亚洲国产av影院在线观看| 一区二区三区乱码不卡18| 午夜福利视频在线观看免费| 久久国产精品大桥未久av| 视频区图区小说| 午夜福利视频精品| 男人舔女人的私密视频| 99国产综合亚洲精品| 在线av久久热| 99国产精品一区二区三区| tube8黄色片| 国产精品av久久久久免费| 在线av久久热| 免费日韩欧美在线观看| 久久国产精品男人的天堂亚洲| av网站免费在线观看视频| 欧美少妇被猛烈插入视频| 激情视频va一区二区三区| 精品少妇黑人巨大在线播放| 香蕉国产在线看| 国产免费视频播放在线视频| 97在线人人人人妻| 91成年电影在线观看| 在线av久久热| 欧美精品啪啪一区二区三区 | 免费观看av网站的网址| 婷婷丁香在线五月| 欧美精品亚洲一区二区| 久久久欧美国产精品| 日本av免费视频播放| 亚洲 欧美一区二区三区| 亚洲专区中文字幕在线| 最近中文字幕2019免费版| 久久久国产一区二区| 一区二区三区激情视频| 美女高潮到喷水免费观看| 一本—道久久a久久精品蜜桃钙片| 欧美日韩精品网址| 黄片小视频在线播放| 久久香蕉激情| 美女福利国产在线| 国产日韩欧美亚洲二区| 男女下面插进去视频免费观看| 久久午夜综合久久蜜桃| 欧美日韩亚洲高清精品| 免费高清在线观看日韩| 精品久久蜜臀av无| 亚洲欧美精品综合一区二区三区| 亚洲男人天堂网一区| 国产成人一区二区三区免费视频网站| 亚洲欧美日韩高清在线视频 | 色播在线永久视频| 一级黄色大片毛片| 亚洲精品国产精品久久久不卡| 一本色道久久久久久精品综合| 侵犯人妻中文字幕一二三四区| 亚洲精品粉嫩美女一区| 十分钟在线观看高清视频www| 9热在线视频观看99| 亚洲第一青青草原| 亚洲av男天堂| 免费在线观看视频国产中文字幕亚洲 | 青春草视频在线免费观看| 18在线观看网站| 大片免费播放器 马上看| 美女中出高潮动态图| 青草久久国产| 亚洲av成人一区二区三| 在线观看免费视频网站a站| tocl精华| 亚洲精品国产av成人精品| 另类亚洲欧美激情| 日本一区二区免费在线视频| 手机成人av网站| 十八禁网站免费在线| 少妇的丰满在线观看| 一区二区三区激情视频| 国产一区二区三区在线臀色熟女 | 天堂8中文在线网| 999精品在线视频| 欧美xxⅹ黑人| 两个人看的免费小视频| 97在线人人人人妻| 亚洲激情五月婷婷啪啪| 精品一区二区三区av网在线观看 | 欧美国产精品va在线观看不卡| 两个人免费观看高清视频| 美女主播在线视频| 欧美 亚洲 国产 日韩一| 91精品三级在线观看| 99久久精品国产亚洲精品| 亚洲精品第二区| videosex国产| 久久久精品94久久精品| 每晚都被弄得嗷嗷叫到高潮| 久久人妻熟女aⅴ| 中文字幕最新亚洲高清| 99久久人妻综合| 久久天躁狠狠躁夜夜2o2o| 美女福利国产在线| av视频免费观看在线观看| bbb黄色大片| 男人爽女人下面视频在线观看| 捣出白浆h1v1| 亚洲国产欧美在线一区| 激情视频va一区二区三区| 成在线人永久免费视频| 男女国产视频网站| 欧美 日韩 精品 国产| 永久免费av网站大全| 免费在线观看日本一区| 美女午夜性视频免费| 免费观看a级毛片全部| 不卡av一区二区三区| 亚洲久久久国产精品| 免费不卡黄色视频| av免费在线观看网站| 久久久国产精品麻豆| 高清在线国产一区| av天堂在线播放| 久久性视频一级片| 老司机深夜福利视频在线观看 | 久久影院123| 亚洲人成电影免费在线| 中文字幕高清在线视频| avwww免费| 最黄视频免费看| 亚洲五月色婷婷综合| 少妇裸体淫交视频免费看高清 | 国产真人三级小视频在线观看| 国产色视频综合| 亚洲精品国产av成人精品| 久久中文看片网| 亚洲第一欧美日韩一区二区三区 | 黄色毛片三级朝国网站| 男女无遮挡免费网站观看| 亚洲国产av新网站| 少妇 在线观看| 黄频高清免费视频| 免费一级毛片在线播放高清视频 | 中文字幕av电影在线播放| 午夜福利乱码中文字幕| 操美女的视频在线观看| 老汉色∧v一级毛片| 国产有黄有色有爽视频| 亚洲色图综合在线观看| 80岁老熟妇乱子伦牲交| 一本—道久久a久久精品蜜桃钙片| 午夜精品国产一区二区电影| 亚洲精品中文字幕一二三四区 | 国产免费视频播放在线视频| 少妇被粗大的猛进出69影院| av片东京热男人的天堂| 精品国产超薄肉色丝袜足j| 亚洲av日韩在线播放| 50天的宝宝边吃奶边哭怎么回事| 丝袜喷水一区| 免费在线观看黄色视频的| 久久久久国产精品人妻一区二区| 午夜福利在线免费观看网站| 精品国产一区二区三区四区第35| 国产伦人伦偷精品视频| 国产人伦9x9x在线观看| 国产亚洲精品第一综合不卡| 午夜精品久久久久久毛片777| 女性被躁到高潮视频| 黄色视频不卡| 两个人看的免费小视频| 久久精品熟女亚洲av麻豆精品| 亚洲一卡2卡3卡4卡5卡精品中文| 少妇 在线观看| 在线看a的网站| av电影中文网址| 久久久水蜜桃国产精品网| 亚洲成国产人片在线观看| 日韩制服丝袜自拍偷拍| 制服诱惑二区| 日韩一区二区三区影片| 永久免费av网站大全| 精品久久久精品久久久| 国产三级黄色录像| 黑人欧美特级aaaaaa片| 久久久精品免费免费高清| 色综合欧美亚洲国产小说| av在线app专区| 在线观看免费午夜福利视频| 下体分泌物呈黄色| 99国产综合亚洲精品| 免费在线观看日本一区| 亚洲男人天堂网一区| 十八禁人妻一区二区| 不卡av一区二区三区| 精品久久久久久久毛片微露脸 | 国产日韩欧美视频二区| 老鸭窝网址在线观看| 老司机亚洲免费影院| 国产免费福利视频在线观看| netflix在线观看网站| 女性生殖器流出的白浆| 50天的宝宝边吃奶边哭怎么回事| 久久久欧美国产精品| 亚洲国产中文字幕在线视频| 在线观看人妻少妇| 国产一区二区在线观看av| 天天躁夜夜躁狠狠躁躁| 亚洲一卡2卡3卡4卡5卡精品中文| 一区二区三区激情视频| 中国美女看黄片| 9热在线视频观看99| 亚洲中文av在线| 啦啦啦在线免费观看视频4| 亚洲av美国av| 国产男人的电影天堂91| 午夜影院在线不卡| 成人国产av品久久久| 五月天丁香电影| 日本a在线网址| 大片免费播放器 马上看| 亚洲精品粉嫩美女一区| 精品国产乱子伦一区二区三区 | 国产亚洲午夜精品一区二区久久| 亚洲精品中文字幕在线视频| 桃红色精品国产亚洲av| 亚洲熟女毛片儿| 黄片大片在线免费观看| 午夜两性在线视频| 又大又爽又粗| 侵犯人妻中文字幕一二三四区| av网站免费在线观看视频| 在线 av 中文字幕| 国产成人精品无人区| 日韩免费高清中文字幕av| 香蕉丝袜av| 亚洲专区字幕在线| 俄罗斯特黄特色一大片| 美国免费a级毛片| 少妇裸体淫交视频免费看高清 | 国产亚洲精品第一综合不卡| 菩萨蛮人人尽说江南好唐韦庄| 婷婷色av中文字幕| 视频在线观看一区二区三区| 欧美日韩精品网址| 久久天躁狠狠躁夜夜2o2o| 亚洲欧美精品综合一区二区三区| 亚洲国产欧美一区二区综合| 欧美日韩av久久| av网站免费在线观看视频| 亚洲国产精品成人久久小说| 国产成人精品无人区| 色老头精品视频在线观看| 欧美精品一区二区大全| 下体分泌物呈黄色| a级毛片在线看网站| av免费在线观看网站| 丝袜人妻中文字幕| 黄网站色视频无遮挡免费观看| 亚洲一区二区三区欧美精品| 在线 av 中文字幕| 人成视频在线观看免费观看| 午夜激情av网站| 亚洲精品日韩在线中文字幕| 秋霞在线观看毛片| 久久久久国内视频| 蜜桃在线观看..| 免费不卡黄色视频| 亚洲少妇的诱惑av| 可以免费在线观看a视频的电影网站| 亚洲国产毛片av蜜桃av| 欧美另类亚洲清纯唯美| 日韩欧美一区视频在线观看| 男女高潮啪啪啪动态图| 国产91精品成人一区二区三区 | 久久ye,这里只有精品| 欧美激情 高清一区二区三区| 国产一区二区 视频在线| 18禁国产床啪视频网站| 正在播放国产对白刺激| 欧美黄色片欧美黄色片| 国产av国产精品国产| 亚洲国产日韩一区二区| 精品高清国产在线一区| 成人亚洲精品一区在线观看| 国产成+人综合+亚洲专区| 大型av网站在线播放| 水蜜桃什么品种好| 亚洲一区二区三区欧美精品| 亚洲熟女毛片儿| 午夜精品久久久久久毛片777| 自线自在国产av| 久久久久久亚洲精品国产蜜桃av| 久久精品国产a三级三级三级| 国产一区二区在线观看av| 在线观看人妻少妇| 91麻豆av在线| 国产av一区二区精品久久| 9色porny在线观看| 国产在线免费精品| 在线观看舔阴道视频| 日韩欧美免费精品| 色婷婷久久久亚洲欧美| 亚洲黑人精品在线| 亚洲精品成人av观看孕妇| 十八禁人妻一区二区| 国产成人欧美| 国产麻豆69| 精品亚洲乱码少妇综合久久| 爱豆传媒免费全集在线观看| avwww免费| 久久久精品94久久精品| 亚洲男人天堂网一区| 一级毛片精品| 欧美日韩亚洲综合一区二区三区_| 老司机深夜福利视频在线观看 | 不卡av一区二区三区|