• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Ghost imaging-based optical cryptosystem for multiple images using integral property of the Fourier transform?

    2021-12-22 06:48:52YiKang康祎LeihongZhang張雷洪HualongYe葉華龍DaweiZhang張大偉andSonglinZhuang莊松林
    Chinese Physics B 2021年12期
    關(guān)鍵詞:華龍松林大偉

    Yi Kang(康祎), Leihong Zhang(張雷洪), Hualong Ye(葉華龍),Dawei Zhang(張大偉), and Songlin Zhuang(莊松林)

    University of Shanghai for Science and Technology,Shanghai 200093,China

    Keywords: ghost imaging,image encryption,Fourier transform

    1. Introduction

    With the development of science and technology, information exchange becomes more and more frequent, but with the emergence of“PRISM”,people pay more and more attention to the security of information. Optical information security technology has been the focus of attention and studied because of its high speed, parallelism, multi-dimensionality,and other characteristics.[1,2]As an information carrier,image has the advantages of a large amount of information,specific,vivid images,etc.,so image encryption is an important part of optical information security technology.[3,4]

    In 1995, Refregier and Javidi realized optical image encryption by using double random phase encoding(DRPE).[5]DRPE is easy to operate and can be combined with other technologies, which promotes the rapid development of optical image encryption technology. With the progress and development of technology,multiple-image encryption has been deeply studied to meet the growing needs of people.[6–9]However,the existing optical image encryption technology requires high precision of the optical instrument, and the ciphertext is expressed by complex amplitude, which is not conducive to transmission and storage. Therefore,a simple and fast optical encryption method is urgently needed, while ghost imaging technology provides a new way to solve this problem.

    Different from traditional imaging techniques, ghost imaging mainly uses the higher-order correlation of the light field to obtain the spatial and phase distribution information of the object, and can realize single-pixel imaging.[10,11]Ghost imaging has received widespread attention since it was proposed. The research on ghost imaging is also gradually deepened from the aspects of reconstruction algorithm, experimental device, and modulation pattern.[12–15]In 2010,Pere Clemente took the lead in combining optical encryption and ghost imaging, opening the door for the application of ghost imaging in information security.[16]Tanha used the ghost imaging technique to encrypt the discrete cosine transform coefficients of the image.[17]Konget al.realized optical image encryption by controlling the initial coordinates of the light source.[18]Chenet al.proposed an information authentication method based on ghost imaging.[19]Zhaoet al.encrypted information by changing the order of modulation patterns of ghost imaging.[20]To further improve the encryption efficiency of ghost imaging, Wuet al. took the lead in using position multiplexing to realize multiple-image encryption of ghost imaging.[21]Menget al. applied row scanning,logistic map, lifting wavelet transform, and other schemes to ghost imaging encryption scheme to realize multiple-image encryption.[22–24]Shiet al. used encoded multiplexing patterns to illuminate multiple objects to achieve the purpose of multiple-image encryption.[25]

    However, for multiple-image encryption, the problem of image aliasing is inevitable, which affects the quality of decryption. To solve this problem,we propose a novel multipleimage encryption scheme based on ghost imaging. In this scheme, firstly, an image is encrypted by the ghost imaging encryption scheme and the generated bucket detector values as ciphertext. Then modulation patterns of other images are constructed by using the integral property of the Fourier transform and used as the key of the corresponding image. Finally, the ciphertext and keys are transmitted to the receiver to complete the encryption process. The receiver uses different keys to decrypt the ciphertext, different plaintext images can be obtained. This scheme differs from other schemes in that it is mainly the ciphertext determines the key,not the key determines the ciphertext. Ciphertext generation only requires one encryption. This scheme can improve the encryption efficiency and solve the problem of image crosstalk. Experiments and simulations verify the effectiveness, safety, and robustness of this scheme. This scheme also can be adopted for oneencryption and multi-decryption scenario,such as multi-level information authentication system or one-to-many encryption transmission.

    2. Image encryption scheme based on computational ghost imaging

    The traditional ghost imaging encryption scheme is shown in Fig. 1. Alice wants to encrypt the plaintext informationT(x,y)and transmit it to Bob. She uses the computational ghost imaging experiment device shown in Fig.1(b). A spatially coherent monochromatic laser beam passes through a spatial light modulator(SLM),which introduces an arbitrary phase-only mask, with phase values uniformly distributed in the range[0?2π]. The modified beamIi(x,y)illuminates the object,and the transmitted light is collected by a bucket detector,a bucket detector valueDiis generated,as shown below:

    This operation is repeatedNtimes forNdifferent phase profiles?i(x,y). Next, a series of bucket detector values are shared with Bob using a public channel. AndNdifferent phase profiles are transmitted to Bob through a secure channel. Bob calculates the corresponding optical field intensity distribution of each phase profile according to Fresnel diffraction,as shown below:

    whereEin(x,y)is the complex field of the coherent light beam,hz(x,y) is the Fresnel propagation kernel at distancezand?denotes the two-dimensional(2D)convolution operation. According to the bucket detector valuesDand intensity distributionIi(x,y), the object information can be recovered through the following liner operation, where〈·〉denotes the average calculation:

    Fig.1. Scheme of the encryption method based on computational ghost imaging: (a)block diagram showing encryption/decryption procedure;(b)experiment setup of computational ghost imaging.

    3. Multiple-image encryption scheme based on computational ghost imaging

    3.1. Key generation

    In previous studies, for ghost imaging encryption schemes, the modulation patterns were always constructed firstly, and then the plaintext information was encrypted. Especially for multiple-image encryption, multiple modulation patterns need to be constructed. This means that the ciphertext is always determined by the key, so, can the key be designed depends on the ciphertext?

    Assuming that the target imageT(x,y) is illuminated by its modulation patternIi(x,y), the ciphertextDican be obtained. Can the modulation patternHi(x,y) be designed for the target imageM(x,y) so that its ciphertext is alsoDi? As shown in Eq.(4).

    According to the integral property of the Fourier transform[26]

    According to the above equation,this issue could be converted to an equivalent problem, that is, given target imageM(x,y) as the constraint in the signal domain, how does one design theHi(x,y) to satisfy the constraint in the Fourier domain as Eq. (6)? It can be shown in Fig. 2. IFT is inverse Fourier transform.

    Fig.2. Block diagram of the constraint in the signal and Fourier domain.

    So, this problem can be understood as the problem of recovering phase information by using intensity information,that is a phase retrieval problem. Therefore, when image informationM(x,y)and ciphertextDiare given,the modulation pattern can be generated in the following ways:

    Step 1 Generating a modulation patternHi?1(x,y) for initialization;

    Step 2Performing the Fourier transform forHi?1(x,y)M(x,y) and getmhi?1(ε,η). With ciphertextDias constraint,equation(6)is applied to the spectrum to generate a new Fourier spectrummhi(ε,η).

    Step 3 Inverse Fourier transform the modified Fourier spectrummhi(ε,η)back to the signal domain and generate a modulation patternHi(x,y)according to

    According to the number of ciphertexts, the modulation pattern can be generated according to the cycle shown in Fig.3.This assumes that the number of ciphertexts isK.

    To this point,we can find that for a given image,we can construct special modulation patterns to meet the requirements of ciphertext. That is,we can design keys according to the ciphertext.

    Fig.3. Flow chart of modulation patterns generation.

    3.2. Encryption process

    According to the principle of modulation patterns generation, we propose a novel multiple-image encryption scheme based on ghost imaging, as shown in Fig. 4. In this scheme,different keys are designed to decrypt the same ciphertext and different images can be obtained.

    Step 1 A series of random patternsK1are used to encrypt a single plaintext imageT,and a series of bucket detector valuesDare obtained as ciphertext.

    Step 2 The ciphertext as the constraint is used to generate modulation patterns of different images according to the way shown in Fig.3.And these modulation patterns are used as the keys of corresponding images.

    Step 3 The ciphertextDand the generated keyring{K1,K2,...,Ki}are transmitted to the receiver to complete the encryption process.

    3.3. Decryption process

    After receiving the ciphertext and the keyring, the receiver can extract different keys from the keyring to decrypt the ciphertext and obtain different plaintext images from it.The decryption method can be seen in Eq.(3).

    But the correlation algorithm requires a large amount of ciphertext information, which means multiple sampling is needed. This also leads to substantially reduced decryption efficiency. To solve this problem,the compressive sensing algorithm is used for decryption.[27]If we spread a modulation pattern in a row as a row vectorIr,then a series of modulation patterns can be considered a measurement matrix in compressive sensing. So, the decryption process can be obtained by solving a convex optimization program that is expressed as

    where‖·‖is the l1-norm. The application of the compressive sensing algorithm improves the reconstruction quality of plaintext image and can reconstruct plaintext image under the condition of less ciphertext.

    The MGI mainly realizes the secure transmission of multiple-image by constructing the modulation patterns of different images. In encryption process,it only needs to encrypt an image instead of all images. Ciphertext data is small and easy to be transmitted. In decryption process, different images can be decrypted only with corresponding modulation patterns,and the decryption algorithm is simple.

    Fig.4. Encryption and decryption process of MGI.

    4. Simulation

    Firstly, the proposed scheme is analyzed by simulation.The simulation is carried out under a 64-bit Windows 10 system, and the platform is MATLAB 2019b. The size of the plaintext image is 64×64 pixels. The sampling ratio is 100%,the sampling ratio is defined as the ratio of sampling number and plaintext image pixels (i.e., the sampling numbers are 4096, which also means that the modulation patterns are 4096). The decryption algorithm is the orthogonal matching pursuit algorithm in the compressive sensing algorithm. To evaluate the decryption quality objectively,the correlation coefficient (CC) is used as the objective evaluation standard to evaluate the similarity between the original image and the decrypted image.[28]The closer to 1 the value of the CC is, the better the reconstruction effect is. Wherexandyrepresent the original plaintext image and the decrypted image respectively.

    4.1. Feasibility analysis

    Four different images are used as plaintext information, including binary images and grayscale images. We use Hadamard patterns as the key to encrypt the first plaintext image and get the ciphertext. Ciphertext is a series of meaningless intensity sequences,as shown in Fig.5(i). Then,the keys of the other three images are generated by using the method of this paper and the obtained ciphertext. Finally, the ciphertext and keys are transmitted to the receiver to complete the image encryption.

    The receiver uses different keys to decrypt the same ciphertext to obtain different reconstructed plaintext images.Figure 5 shows that CC between the four decrypted images and the original plaintext images are 0.9875, 09975, 0.9462,and 0.9204,respectively. Obviously,the plaintext information can be reconstructed well. The first image uses the Hadamard pattern as the key,so it has a better reconstruction effect(The Hadamard patterns are a deterministic orthogonal set,in principle, the image can be reconstructed without noticeable difference from the target image, when is fully sampled). The second image as a binary image has a higher sparsity,it can be reconstructed better under the same sampling ratio. The third and fourth image are not special in terms of key and sparsity,so the reconstruction effect is worse than the first two,but the contrasts and details can still show the plaintext information very well. The results show that when only a single ciphertext is transmitted,different plaintext information can be decrypted with different keys,and all images have a good reconstruction effect.

    Fig.5. Panels(a)–(d)are the original plaintext images;panels(e)–(h)are the decrypted images;panel(i)is the ciphertext.

    4.2. Security analysis

    For an encryption system,ensuring the security of information is the prerequisite of system effectiveness. For an attacker, if the statistics law of information in ciphertext is the same as the plaintext,the attacker can break out the encrypted information through the ciphertext-only attack. As shown in Table 1,for different plaintext information,these corresponding ciphertext displays a similar tendency. Obviously, it is difficult for an attacker to analyze valid information from the ciphertext, ensuring the security of the plaintext. MGI fully realizes the diffusion and confusion of plaintext information.

    In cryptography, according to the relationship between plaintext and ciphertext, the attacker can obtain the keys through the iterative algorithm, and then break out the encryption system. We use the known-plaintext attack (KPA)of paper[29]to further analyze the security of MGI. The idea of the attack scenario is that for a sample,a fixed modulation pattern illuminates multiple images in sequence and obtains the corresponding bucket detector values, which can also be understood as multiple images illuminate a fixed modulation pattern. If information of multiple images is known,the modulation pattern can be obtained by solving linear equations.After many cycles,keys can be obtained.

    Table 1. Histogram of plaintext and ciphertext.

    Fig.6. KPA results. Panel(a)is the cracked information of the first image under KPA when the modulation patterns are fixed;Panels(b)–(d)are the cracked information of other images under KPA.

    As shown in Fig. 6, for the fixed modulation patterns,KPA can be obtained keys of the first image and the first image can be decrypted. However,the information of the other three images cannot be obtained. Because the first image uses fixed patterns (i.e., keys are fixed), which can be cracked, but the keys of other images are related to the image itself and cannot be cracked, effectively guaranteeing the validity of most information. For chosen-ciphertext attack and known-plaintext attack,only the key of the first image can be cracked,but the keys of other images cannot be cracked. It is worth stating that we are simply assuming that the key to the first image is fixed,and that if it is random,the security of the first image is guaranteed.

    Based on the above analysis, it is obvious that MGI can effectively resist various attack modes.

    4.3. Robustness analysis

    During the encryption and transmission of information,the effect of noise and the loss of information are inevitable.Therefore,a qualified encryption system needs strong robustness.

    In practical applications,the thermal noise caused by optical devices and interference caused by the non-ideal channel will affect the information. Therefore, we introduce different types of noise to verify the anti-noise ability of MGI.For thermal noise caused by optical devices, we introduce Gaussian noise with different signal-to-noise ratios(SNR)in each sampling process. The higher the signal-to-noise ratio,the weaker the noise. For the interference caused by the non-ideal channel,we add multiplicative noise to the transmitted ciphertext.We suppose the noise is added to the ciphertext in the following form:

    whereiis represented as a random noise with mean 0 and different variances,andDis ciphertext information.

    Fig. 7. CC between the plaintext and reconstruction information under different types of noise.

    Figure 7 shows that for Gaussian noise,with the increase of SNR,the reconstruction quality is gradually improved. The reconstruction result is good when the SNR is 20. For multiplicative noise, with the increase of noise intensity, the reconstruction effect shows a downward trend. When the noise is sufficiently large,the CC between the decrypted image and the original image is still above 0.8. The results show that the thermal noise generated by the optical devices in the system has some influence on the decryption,the impact of interference caused by the non-ideal channel on the decryption is relatively small. The interruption of the channel or the interference of the attacker may cause the loss of ciphertext, and thus affect the decryption effect. In the following, different numbers of ciphertext are cropped to verify capacity of MGI to resist to the ciphertext loss. Take a binary image as an example, as shown in Fig.8, as the loss of ciphertext gradually increases, the difference between the decrypted information and the original information becomes larger. However, when the loss ratio of the ciphertext is 50%, the valid information can still be decrypted. The results show that MGI can resist the loss of ciphertext effectively.

    Fig. 8. CC between the plaintext and reconstruction information under different cropping ratios.

    The results of noise attack and cropping attack show that MGI can resist noise interference and ciphertext loss effectively. MGI has strong robustness.

    4.4. Information capacity analysis

    As a multiple-image encryption scheme, whether the increase of data quantity will cause image aliasing is a problem to be considered. We verify this problem by increasing the number of images and compare the reconstruction results of MGI with multiple-image encryption scheme based on ghost imaging and position multiplexing (PM-MGI) and multipleimage encryption scheme based on lifting wavelet transform and ghost imaging (LWT-MGI) in paper.[21,22]Multiple images adopted are binary images.

    Figure 9 shows that with the increase in the number of encrypted images, CC of LWT-MGI and PM-MGI shows a downward trend. Especially for PM-MGI,the decrypted quality drops seriously when the number of images to be encrypted increases.For MGI,the increase in the number of images does not affect the decrypted effect,which ensures the accuracy of the decrypted information while improving the number of encrypted images. Because for MGI,the realization of multipleimage encryption and decryption is based on the generation of keys, and there is no information overlap in encryption process. For PM-MGI,position multiplexing leads to ciphertext aliasing. Therefore,the increase in the number of images will affect the decryption effect. For LWT-MGI, this method mainly uses image sparsity to achieve multiple-image encryption,but with the increase of the number of images,less detail is retained after each image sparse, which affects the quality of the reconstruction image.

    Fig. 9. CC between the plaintext and reconstruction information under different numbers of images.

    Schematically, our scheme is entirely different from the traditional multiple-image encryption schemes. In existing multiple-image encryption schemes, the ciphertext is mostly determined by the key(That is to use the given key to encrypt the plaintext and get the ciphertext). However, the ciphertext determines the key in our scheme (The keys are calculated from the given ciphertext according to the images). Most of the images in our scheme don’t need to be encrypted(Except the first image),and only to participate in the generation of the keys. Therefore, there is no need to mix or overlap multiple images in encryption process, and the reconstructed images don’t have image aliasing problem.

    5. Experiment

    The experiment scheme proposed in this paper is shown in Fig. 10, which is specifically divided into three steps: encryption,key generation,and decryption. For encryption process,the laser irradiates the object through the beam expander,and the reflected light is focused on the digital micromirror device (DMD, V-7001) display screen through the lens.DMD introduces Hadamard patterns to simulate the pseudothermal light source. The object focused on the DMD display screen is modulated by the pseudo-thermal light source,and the reflected light is received by the photomultiplier tube(PMT, H10721-01)) and transmitted to the acquisition card(M2i.2030-exp). A series of intensity sequences are generated and as ciphertext to complete the encryption process. The key generation mainly uses ciphertext as a constraint to generate corresponding modulation patterns of multiple images. The specific operation process is implemented on the computer.For decryption process,different images can be decrypted using different modulation patterns.

    Fig.10. Experimental flow and device diagram.

    The above experimental flow is used to encrypt three images to verify the effectiveness of MGI in practical application. Figure 11 shows that the CC between the reconstruction image and the original image are 0.8965,0.9436,and 0.9081,respectively. The reconstruction results are good and there is no image aliasing problem. For the first image, because of lens focus and operation error,there are problems of edge blur and position shift, compared with other images, CC is lower.The latter two images are mainly decrypted by keys without repeated optical encryption. Experimental results show that MGI is effective in practical application,and there is no aliasing between images.

    Fig.11. Experiment results.

    6. Discussion

    A key advantage of our design over previous work is that can effectively avoid the problem of information aliasing caused by the increase of plaintext information and not lose plaintext information details. The reconstruction quality of the plaintext doesn’t decrease with the increase of information. For different plaintext information,the keys are also different. This can achieve high security just like the“one-timepad” scheme. It can effectively resist various attack modes(e.g.known/chosen-plaintext attack), and the amount of ciphertext data is small, so this scheme can be well adapted to the ghost imaging broadcasting system for public detection.Besides, because different plaintext information corresponds to different keys,the scheme is suitable for one-encryption and multi-decryption scenario,such as multi-level information authentication system or one-to-many encryption transmission.Ghost imaging can achieve indirect-line-of-sight imaging and weak-light imaging, and it demonstrates advantages in some invisible wavebands. These characteristics also provide the possibility for our scheme to encrypt information in special scenarios.

    The main limitation of our system is the amount of data.With the increase of the image number, the size of keys is increased rapidly. In the existing multi-image encryption schemes,researchers mostly construct special modulation patterns to decrypt multiple images with few keys. But this kind of scheme will often cause image aliasing. The details of plaintext will be lost in the process of transformation and selection (e.g.discrete cosine transformation). Besides, from a security perspective,if the keys are stolen,all information will be threatened.[23,30]Although the amount of data transmitted in our system will increase with the amount of plaintext image,it also reduces the risk of all information being stolen to some extent. The development of machine learning also makes it possible to reduce the amount of transmitted data and speed up information reconstruction.[31,32]

    7. Conclusion

    In this paper, we proposed a novel ghost imaging-based optical cryptosystem for multiple images using the integral property of the Fourier transform. Compared with other multiple-image optical encryption schemes, we mainly construct different keys to achieve the encrypted transmission of multiple images. In encryption process, firstly, we use the ghost imaging encryption scheme to encrypt the first image.Then,the generated ciphertext is used as a constraint to realize the generation of keys of other images according to the integral property of the Fourier transform. Finally, the generated key and ciphertext are transmitted to the receiver to complete the encryption process. In decryption process, the receiver uses different keys to decrypt the same ciphertext and different images can be obtained. In this scheme, the key of each image is related to the image itself, so it can effectively resist various attack modes. And this scheme also solves the problem of aliasing of decrypted information. Simulations and experiments show the effectiveness, security, and robustness of this scheme. This scheme provides a new idea for optical image encryption and information authentication,among others.

    猜你喜歡
    華龍松林大偉
    Implementation and application of PyNE sub-voxel R2S for shutdown dose rate analysis
    好好去愛
    心聲歌刊(2022年2期)2022-06-06 05:14:32
    我國第二臺(tái)“華龍一號(hào)”核電機(jī)組并網(wǎng)發(fā)電
    張大偉作品
    華龍引領(lǐng) 國之重器
    中國核電(2021年3期)2021-08-13 08:56:04
    華龍一號(hào)海外首堆成功并網(wǎng)發(fā)電
    Enhanced microwave absorption performance of MOF-derived hollow Zn-Co/C anchored on reduced graphene oxide?
    神奇的邊界線:一不留神就出國
    智慧少年(2017年8期)2018-01-10 21:39:12
    第三十一個(gè)蛋
    我的爺爺和長征
    欧美zozozo另类| 欧美老熟妇乱子伦牲交| 日韩欧美精品免费久久| 久久久久精品久久久久真实原创| 欧美日韩综合久久久久久| 免费黄频网站在线观看国产| 我要看黄色一级片免费的| 亚洲国产欧美在线一区| 日韩一本色道免费dvd| 欧美老熟妇乱子伦牲交| 久久精品国产a三级三级三级| 在线 av 中文字幕| 亚洲精品久久午夜乱码| 18禁裸乳无遮挡动漫免费视频| 22中文网久久字幕| 国产探花极品一区二区| 高清av免费在线| 成年美女黄网站色视频大全免费 | 黄色一级大片看看| 精品人妻一区二区三区麻豆| 啦啦啦中文免费视频观看日本| 菩萨蛮人人尽说江南好唐韦庄| 日韩人妻高清精品专区| 伦理电影大哥的女人| 欧美一级a爱片免费观看看| 国产黄色视频一区二区在线观看| 一区二区三区四区激情视频| 日韩三级伦理在线观看| 黄片无遮挡物在线观看| 人人妻人人澡人人爽人人夜夜| 亚洲丝袜综合中文字幕| 国产亚洲一区二区精品| 国产在视频线精品| 色哟哟·www| 久久久久精品久久久久真实原创| 国产精品一区二区性色av| 观看免费一级毛片| 日韩 亚洲 欧美在线| 六月丁香七月| 久久影院123| 我的女老师完整版在线观看| 国产午夜精品久久久久久一区二区三区| 精品熟女少妇av免费看| 九九在线视频观看精品| 99热这里只有是精品50| 少妇 在线观看| av一本久久久久| 亚洲成人av在线免费| 免费黄网站久久成人精品| 丰满少妇做爰视频| 777米奇影视久久| 国产乱人视频| 欧美激情极品国产一区二区三区 | 久久久精品94久久精品| 日韩一本色道免费dvd| 国产成人精品一,二区| 一本一本综合久久| 国产精品一及| 精品一区二区免费观看| 国产极品天堂在线| 大陆偷拍与自拍| 国产av精品麻豆| 亚洲无线观看免费| 男人狂女人下面高潮的视频| 一级黄片播放器| 午夜福利影视在线免费观看| 成人无遮挡网站| 丰满少妇做爰视频| 精品久久久精品久久久| 一区二区三区乱码不卡18| 久久久久久久精品精品| 青春草亚洲视频在线观看| 七月丁香在线播放| 中文字幕av成人在线电影| 一个人看的www免费观看视频| 80岁老熟妇乱子伦牲交| av专区在线播放| 乱码一卡2卡4卡精品| 天堂俺去俺来也www色官网| 99久国产av精品国产电影| 欧美成人a在线观看| 少妇裸体淫交视频免费看高清| 激情五月婷婷亚洲| 国产精品三级大全| 18禁裸乳无遮挡动漫免费视频| 亚洲av男天堂| 26uuu在线亚洲综合色| 国产精品一区二区三区四区免费观看| 97在线人人人人妻| 在现免费观看毛片| 人妻少妇偷人精品九色| 在线免费十八禁| 在线观看国产h片| 日本猛色少妇xxxxx猛交久久| 最黄视频免费看| 国产 一区精品| 国产黄频视频在线观看| 亚洲精品久久久久久婷婷小说| 黄色日韩在线| 国产精品99久久久久久久久| 久久久精品免费免费高清| 久久久久久久久久久丰满| 美女视频免费永久观看网站| 少妇 在线观看| 成年人午夜在线观看视频| videossex国产| 校园人妻丝袜中文字幕| 少妇裸体淫交视频免费看高清| 一级二级三级毛片免费看| 亚洲精品国产成人久久av| xxx大片免费视频| 色婷婷av一区二区三区视频| 亚洲欧洲国产日韩| 日韩伦理黄色片| av国产免费在线观看| 国产精品无大码| 亚洲欧美精品专区久久| 午夜福利在线在线| 国内少妇人妻偷人精品xxx网站| 日本黄大片高清| 人人妻人人爽人人添夜夜欢视频 | 日日撸夜夜添| 亚洲美女视频黄频| 精品国产乱码久久久久久小说| 中文欧美无线码| 日产精品乱码卡一卡2卡三| 成人毛片a级毛片在线播放| 制服丝袜香蕉在线| 高清黄色对白视频在线免费看 | 黄色一级大片看看| 五月开心婷婷网| 久久久久国产网址| 欧美激情极品国产一区二区三区 | 亚洲av男天堂| 视频区图区小说| 在线观看一区二区三区| 日本色播在线视频| av国产免费在线观看| av国产免费在线观看| 26uuu在线亚洲综合色| 亚洲美女视频黄频| 久久99热这里只有精品18| 免费播放大片免费观看视频在线观看| 成人国产麻豆网| 亚洲av男天堂| 只有这里有精品99| 国产永久视频网站| 欧美三级亚洲精品| 在线精品无人区一区二区三 | 街头女战士在线观看网站| 欧美精品一区二区大全| 99精国产麻豆久久婷婷| 99精国产麻豆久久婷婷| 国产 一区精品| 欧美日韩在线观看h| 交换朋友夫妻互换小说| av福利片在线观看| 不卡视频在线观看欧美| 尾随美女入室| 国产午夜精品一二区理论片| 精品久久久噜噜| 涩涩av久久男人的天堂| 久久久久久人妻| 日日摸夜夜添夜夜添av毛片| 网址你懂的国产日韩在线| 国产爱豆传媒在线观看| 成人黄色视频免费在线看| 亚州av有码| 激情 狠狠 欧美| 国语对白做爰xxxⅹ性视频网站| 热99国产精品久久久久久7| 国产视频内射| 纯流量卡能插随身wifi吗| 成年女人在线观看亚洲视频| 大香蕉久久网| 国产高潮美女av| 精品国产乱码久久久久久小说| 自拍欧美九色日韩亚洲蝌蚪91 | 亚洲国产欧美在线一区| 少妇裸体淫交视频免费看高清| 亚洲综合精品二区| 欧美xxxx性猛交bbbb| 久久久久久久大尺度免费视频| 亚洲国产毛片av蜜桃av| 人妻一区二区av| 成年美女黄网站色视频大全免费 | 91精品伊人久久大香线蕉| 亚洲国产色片| 久久99热6这里只有精品| 尤物成人国产欧美一区二区三区| 国产av一区二区精品久久 | 黄片无遮挡物在线观看| 日韩制服骚丝袜av| 精品一区在线观看国产| 午夜福利影视在线免费观看| 干丝袜人妻中文字幕| 乱码一卡2卡4卡精品| 小蜜桃在线观看免费完整版高清| 成人亚洲精品一区在线观看 | 菩萨蛮人人尽说江南好唐韦庄| av一本久久久久| 一级毛片我不卡| 欧美丝袜亚洲另类| 妹子高潮喷水视频| 精品亚洲成国产av| 国产精品蜜桃在线观看| 成人二区视频| 观看免费一级毛片| 免费看不卡的av| 性高湖久久久久久久久免费观看| 亚洲国产高清在线一区二区三| 中文字幕av成人在线电影| 欧美日韩精品成人综合77777| 久久国产乱子免费精品| 99久久中文字幕三级久久日本| 欧美另类一区| 啦啦啦视频在线资源免费观看| 春色校园在线视频观看| 丝袜脚勾引网站| 亚洲精品中文字幕在线视频 | 嫩草影院新地址| 国产亚洲精品久久久com| 建设人人有责人人尽责人人享有的 | 国产精品三级大全| 亚洲欧美日韩卡通动漫| 五月天丁香电影| 久久久久性生活片| 国产在线一区二区三区精| 大又大粗又爽又黄少妇毛片口| 人妻一区二区av| 99精国产麻豆久久婷婷| 天天躁夜夜躁狠狠久久av| 搡女人真爽免费视频火全软件| 肉色欧美久久久久久久蜜桃| 免费观看在线日韩| 亚洲精品乱码久久久久久按摩| 搡女人真爽免费视频火全软件| 丰满乱子伦码专区| 美女内射精品一级片tv| 少妇人妻精品综合一区二区| 特大巨黑吊av在线直播| 成人一区二区视频在线观看| 欧美激情国产日韩精品一区| 一级毛片黄色毛片免费观看视频| 欧美亚洲 丝袜 人妻 在线| 十分钟在线观看高清视频www | 午夜福利高清视频| 在线观看一区二区三区| 九色成人免费人妻av| 日本av手机在线免费观看| 好男人视频免费观看在线| 热re99久久精品国产66热6| 精品一区二区三卡| 在线精品无人区一区二区三 | 中国三级夫妇交换| 色哟哟·www| 啦啦啦中文免费视频观看日本| 一本久久精品| 国产人妻一区二区三区在| 秋霞在线观看毛片| 中文字幕免费在线视频6| 国产高清三级在线| 国产免费又黄又爽又色| 国产伦理片在线播放av一区| 免费大片黄手机在线观看| 国产av精品麻豆| 中文天堂在线官网| 日本av免费视频播放| 成人国产麻豆网| 欧美精品国产亚洲| 成人漫画全彩无遮挡| av国产精品久久久久影院| 在线免费观看不下载黄p国产| 久久精品国产鲁丝片午夜精品| h日本视频在线播放| 亚洲欧美成人综合另类久久久| 日本爱情动作片www.在线观看| 国产精品国产三级国产专区5o| 亚洲人成网站在线观看播放| 人妻夜夜爽99麻豆av| 99久久中文字幕三级久久日本| 久久午夜福利片| 亚洲图色成人| 久久久久久久久久人人人人人人| 国产一区二区在线观看日韩| 久久 成人 亚洲| 亚洲精品国产av蜜桃| 久久久久国产网址| av国产免费在线观看| 天美传媒精品一区二区| 嘟嘟电影网在线观看| 在线精品无人区一区二区三 | 五月天丁香电影| 精品久久久噜噜| 午夜福利在线观看免费完整高清在| 国产精品av视频在线免费观看| 国精品久久久久久国模美| 蜜桃亚洲精品一区二区三区| 国产成人一区二区在线| 日日啪夜夜撸| 亚洲精品国产色婷婷电影| 五月天丁香电影| 乱码一卡2卡4卡精品| 三级经典国产精品| 国产一区二区三区av在线| 18禁在线播放成人免费| 久久精品国产亚洲网站| 少妇的逼水好多| 国内少妇人妻偷人精品xxx网站| 亚洲av福利一区| 六月丁香七月| 直男gayav资源| 看免费成人av毛片| av在线观看视频网站免费| 777米奇影视久久| 亚洲四区av| 国产av一区二区精品久久 | 伦理电影免费视频| 国产精品蜜桃在线观看| 欧美区成人在线视频| 国产精品三级大全| 97精品久久久久久久久久精品| 特大巨黑吊av在线直播| 欧美人与善性xxx| 久久99精品国语久久久| 精品一区在线观看国产| 精品人妻熟女av久视频| 欧美97在线视频| 欧美xxⅹ黑人| 爱豆传媒免费全集在线观看| av卡一久久| 91精品国产九色| 亚洲性久久影院| 街头女战士在线观看网站| 国产视频首页在线观看| 精品一区二区三区视频在线| 国产免费又黄又爽又色| 永久网站在线| 自拍欧美九色日韩亚洲蝌蚪91 | 国产av国产精品国产| 国产无遮挡羞羞视频在线观看| 尾随美女入室| 国产精品福利在线免费观看| 18禁在线播放成人免费| 日本黄色片子视频| 欧美老熟妇乱子伦牲交| 国产亚洲5aaaaa淫片| 18禁在线播放成人免费| 国产欧美另类精品又又久久亚洲欧美| 亚洲高清免费不卡视频| 熟妇人妻不卡中文字幕| 国产白丝娇喘喷水9色精品| 亚洲欧洲国产日韩| 天天躁日日操中文字幕| 国产在线一区二区三区精| 久久国产精品大桥未久av | 女人久久www免费人成看片| 少妇被粗大猛烈的视频| av国产精品久久久久影院| 美女视频免费永久观看网站| 国产探花极品一区二区| 日本av免费视频播放| 丰满迷人的少妇在线观看| 韩国高清视频一区二区三区| 欧美+日韩+精品| 黄片wwwwww| 日本一二三区视频观看| 久久久久久人妻| 国产欧美亚洲国产| 黄片无遮挡物在线观看| 久久ye,这里只有精品| 国产片特级美女逼逼视频| 又黄又爽又刺激的免费视频.| 成人免费观看视频高清| 爱豆传媒免费全集在线观看| 熟女人妻精品中文字幕| 老女人水多毛片| 看十八女毛片水多多多| 美女主播在线视频| 黄色怎么调成土黄色| 午夜激情福利司机影院| a级一级毛片免费在线观看| 永久免费av网站大全| 亚洲av福利一区| 狂野欧美激情性bbbbbb| 免费大片黄手机在线观看| 日本vs欧美在线观看视频 | 久久ye,这里只有精品| 久久精品久久久久久久性| 九草在线视频观看| 色婷婷av一区二区三区视频| 亚洲av免费高清在线观看| 在线观看免费视频网站a站| 国产极品天堂在线| 亚洲色图综合在线观看| 新久久久久国产一级毛片| 成人毛片60女人毛片免费| 中国国产av一级| 狠狠精品人妻久久久久久综合| 亚洲国产高清在线一区二区三| 免费久久久久久久精品成人欧美视频 | 欧美+日韩+精品| 久久99蜜桃精品久久| 久久97久久精品| 久久久久久人妻| 日本免费在线观看一区| 亚洲av福利一区| 亚洲精品成人av观看孕妇| 国产精品99久久久久久久久| 国内揄拍国产精品人妻在线| videossex国产| 国产免费又黄又爽又色| 日韩av在线免费看完整版不卡| 一级二级三级毛片免费看| 亚洲av不卡在线观看| .国产精品久久| 啦啦啦在线观看免费高清www| 水蜜桃什么品种好| 久久久久久久久久成人| 成人国产麻豆网| 一本一本综合久久| 联通29元200g的流量卡| 一区二区三区精品91| 18禁在线播放成人免费| 免费看av在线观看网站| 亚洲欧美一区二区三区黑人 | 久久精品久久久久久久性| 成人高潮视频无遮挡免费网站| 看非洲黑人一级黄片| 午夜福利影视在线免费观看| 国产色婷婷99| 蜜臀久久99精品久久宅男| 国产高清有码在线观看视频| 久久精品国产a三级三级三级| 久久人妻熟女aⅴ| 欧美少妇被猛烈插入视频| 麻豆乱淫一区二区| 日韩,欧美,国产一区二区三区| 久久久久久久久大av| 在线 av 中文字幕| 人妻一区二区av| 亚洲国产av新网站| 亚洲aⅴ乱码一区二区在线播放| 精品人妻一区二区三区麻豆| 交换朋友夫妻互换小说| 青春草亚洲视频在线观看| 亚洲国产成人一精品久久久| 最近中文字幕2019免费版| 亚洲国产欧美人成| 亚洲精品中文字幕在线视频 | av不卡在线播放| 另类亚洲欧美激情| 在线观看一区二区三区| 久久国内精品自在自线图片| 小蜜桃在线观看免费完整版高清| av免费观看日本| 国内精品宾馆在线| 中文资源天堂在线| 菩萨蛮人人尽说江南好唐韦庄| 成年人午夜在线观看视频| 亚洲,欧美,日韩| 日本vs欧美在线观看视频 | 午夜免费鲁丝| 免费在线观看成人毛片| 日韩在线高清观看一区二区三区| 内射极品少妇av片p| 2018国产大陆天天弄谢| 免费看av在线观看网站| 交换朋友夫妻互换小说| 午夜福利视频精品| 午夜免费男女啪啪视频观看| 视频区图区小说| 51国产日韩欧美| 欧美日韩综合久久久久久| 亚洲国产精品一区三区| 国产一区有黄有色的免费视频| 久久国产乱子免费精品| 在线免费十八禁| 亚洲经典国产精华液单| 18禁在线播放成人免费| 欧美变态另类bdsm刘玥| 爱豆传媒免费全集在线观看| 亚洲不卡免费看| 最新中文字幕久久久久| 美女视频免费永久观看网站| 自拍偷自拍亚洲精品老妇| 99久国产av精品国产电影| 一个人看视频在线观看www免费| 777米奇影视久久| 欧美极品一区二区三区四区| 两个人的视频大全免费| 午夜福利视频精品| 尾随美女入室| 国产男人的电影天堂91| 国产91av在线免费观看| 午夜福利在线在线| 欧美精品一区二区大全| 观看美女的网站| 免费人成在线观看视频色| 亚洲怡红院男人天堂| 欧美丝袜亚洲另类| 大话2 男鬼变身卡| 啦啦啦视频在线资源免费观看| 午夜视频国产福利| 久久久久视频综合| 如何舔出高潮| 亚洲精品乱码久久久久久按摩| 性色avwww在线观看| 一个人看视频在线观看www免费| 一级a做视频免费观看| 中文在线观看免费www的网站| 国产 一区精品| 少妇 在线观看| 日本黄大片高清| 王馨瑶露胸无遮挡在线观看| 国产毛片在线视频| 亚洲欧洲日产国产| 免费黄频网站在线观看国产| 九九久久精品国产亚洲av麻豆| 麻豆精品久久久久久蜜桃| 两个人的视频大全免费| 成人无遮挡网站| av天堂中文字幕网| 亚洲欧美日韩卡通动漫| 十八禁网站网址无遮挡 | 欧美另类一区| 一级毛片aaaaaa免费看小| 国产一区亚洲一区在线观看| 最近最新中文字幕大全电影3| 亚洲伊人久久精品综合| 成年免费大片在线观看| 永久免费av网站大全| 亚洲精品国产av成人精品| 网址你懂的国产日韩在线| 人人妻人人添人人爽欧美一区卜 | av在线蜜桃| 亚洲精品国产av成人精品| 精品酒店卫生间| 久久99热这里只频精品6学生| 蜜桃在线观看..| 国产精品三级大全| 精品久久久噜噜| av免费在线看不卡| 国产久久久一区二区三区| 成人黄色视频免费在线看| 麻豆精品久久久久久蜜桃| 久久久亚洲精品成人影院| 亚洲四区av| 欧美日韩一区二区视频在线观看视频在线| 卡戴珊不雅视频在线播放| 伊人久久精品亚洲午夜| 国产精品女同一区二区软件| 亚洲人成网站在线观看播放| 少妇的逼好多水| 久久国产精品男人的天堂亚洲 | 18禁裸乳无遮挡动漫免费视频| 亚洲精品乱码久久久v下载方式| 免费观看a级毛片全部| 亚洲av综合色区一区| 日本与韩国留学比较| 久久人人爽人人片av| 日韩av不卡免费在线播放| 久久久久精品性色| 永久免费av网站大全| 99久国产av精品国产电影| 国产精品久久久久久久电影| 日韩欧美精品免费久久| 久久久久久久久久人人人人人人| 美女福利国产在线 | 街头女战士在线观看网站| 久久久久性生活片| 国产精品国产三级专区第一集| 少妇 在线观看| 亚洲av中文av极速乱| 国产中年淑女户外野战色| 午夜日本视频在线| av女优亚洲男人天堂| 免费观看在线日韩| 亚洲欧美清纯卡通| 久久人妻熟女aⅴ| 国内精品宾馆在线| 大话2 男鬼变身卡| 女性被躁到高潮视频| 中文天堂在线官网| 水蜜桃什么品种好| 日韩av在线免费看完整版不卡| 狂野欧美激情性bbbbbb| 亚洲精品亚洲一区二区| 麻豆乱淫一区二区| 国产精品偷伦视频观看了| 99热这里只有是精品在线观看| 自拍偷自拍亚洲精品老妇| 久久精品久久久久久久性| 自拍偷自拍亚洲精品老妇| 婷婷色av中文字幕| 日韩中字成人| 老熟女久久久| 一本—道久久a久久精品蜜桃钙片| 亚洲国产毛片av蜜桃av| 国产亚洲91精品色在线| 日韩一区二区视频免费看| 欧美少妇被猛烈插入视频| 欧美日本视频| 偷拍熟女少妇极品色| 亚洲国产日韩一区二区| 91精品伊人久久大香线蕉| 国产av精品麻豆| 一本一本综合久久| 国产永久视频网站| 国产乱来视频区| av免费观看日本| 国产久久久一区二区三区| 高清日韩中文字幕在线| 国产免费又黄又爽又色| 免费av中文字幕在线|