• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Color-image encryption scheme based on channel fusion and spherical diffraction

    2022-03-12 07:44:22JunWang王君YuanXiZhang張沅熙FanWang王凡RenJieNi倪仁杰andYuHengHu胡玉衡
    Chinese Physics B 2022年3期
    關鍵詞:王君

    Jun Wang(王君) Yuan-Xi Zhang(張沅熙) Fan Wang(王凡) Ren-Jie Ni(倪仁杰) and Yu-Heng Hu(胡玉衡)

    1Sichuan University,School of Electronics and Information Engineering,Chengdu 610065,China

    2Department of Electrical and Computer Engineering,University of Wisconsin-Madison,Madison,WI 53706,USA

    Keywords: channel fusion,hyper-chaotic system,asymmetric encryption,spherical diffraction

    1. Introduction

    In the past few decades, information security has been widely discussed in the military field and civilian field. As one of the most common information carriers, encryption research on the image has always been a concern of scientific researchers. Unlike traditional digital encryption, optical encryption has attracted more and more attention due to its high-speed transmission,parallel processing,and large capacity. The earliest optical encryption system can be traced back to the double random phase encryption scheme proposed by Refregier and Javadi in 1995,[1]which can encrypt the image into stationary white noise in the 4f optical system. However, this symmetry system was later proved to be vulnerable to known-plaintext[2]and chosen-plaintext attacks.[3]To overcome the shortcoming,the fractional Fourier transform,[4,5]fractional Mellin transform,[6,7]phase-shifting interferometry,[8,9]Fresnel transform,[10]ghost image,[11]and cylindrical diffraction[12,13]have been proposed. Moreover,as an important branch of image encryption,a lot of colorful image encryption schemes[14-20]have been proposed based on previous researches.

    Nevertheless, most of color image optical encryption schemes at present which convert color plaintext into color ciphertext suffer the problem of information leakage.[21-23]The red-green-blue (RGB) channels of the color image are encrypted independently first in these encryption schemes.Then,encrypted channels are fused into a color image again. In this case, the attacker only needs to know part of the ciphertext and private key to obtain most of the partial information of the plaintext image. There are two feasible schemes to solve this problem. One is to reduce the strong correlation between separate RGB channels and the color image,[24-26]such as changing the pixel values or position of one channel through another channel.[24]However, like the parallel processing scheme, this scheme usually requires optical modulations more than once to obtain the ciphertext. Moreover,since the existing hardware usually discretizes the image,this scheme will lead to more errors in optical encryption and reduce the quality of the decrypted image. Therefore, researchers proposed another scheme[27-29]whose idea is similar to multi-image encryption.[30]Dissimilarly, the second scheme tries to transform a color image into a grayscale image. A common method to transform a color image into a single channel image is to perform the convolution operation on all three channels together.[28,29]Compared with the first scheme, the second scheme is more suitable for optical encryption. However, the second scheme usually requires more private keys to separate the merged images during decryption.And the second scheme does not solve the problem of information leakage well since the attackers can still obtain the complete information about a particular channel if they know the full ciphertext and part of the private keys. Therefore, considering the problems of existing schemes, it is necessary to develop a more secure and efficient color image encryption scheme. The proposed encryption scheme should integrate the advantages of first and second schemes and avoid their disadvantages.

    In this paper, a color-image encryption scheme based on channel fusion and spherical diffraction is proposed. In this scheme, a color image is first transformed into a grayscale image by channel fusion technology based on a hyperchaotic system and discrete wavelet transform (DWT). Here, the hyperchaotic system is to reduce the correlation between the RGB channels and colorful original image, and the DWT is to transform the color image into a grayscale image. Then,the grayscale image is modulated by a mask generated by the hyperchaotic system. The modulation result is input into an asymmetric spherical diffraction system which is more secure than the symmetric system. Finally, the improved equal module decomposition (IEMD) is used to hide the complexvalued result of diffraction into two real-values masks which are more valuable for the actual data transmission. The proposed scheme can solve the problem of information leakage well in optical encryption. The simulation results and safety analysis prove the effectiveness of our scheme.

    2. Principle of encryption and decryption

    Here in this section, some basic principles related to our proposed scheme are introduced.

    2.1. Encryption in spherical diffraction domain

    Owing to the asymmetric property of spherical diffraction, the shortcomings of symmetry of the plane diffraction encryption schemes can be overcome. Therefore,it can resist ciphertext attack, plaintext attack, and phase-retrieval attack.Meanwhile, the diffraction parameter can also be used as a private key to improve the security of the encryption scheme.

    According to spherical holographic theory,[31-35]the object surface and observation surface of spherical diffraction are the surfaces of concentric spheres with radii ofrandR.Hence,there are two propagation models which are inside-tooutside propagation(IOP)model and outside-to-inside propagation(OIP)model as shown in Figs.1(a)and 1(b).

    Fig.1. Spherical diffraction of(a)inside-to-outside propagation model and(b)outside-to-inside propagation model.

    For the IOP model,Qr(θr,φr)andPR(θR,φR)represent the object point and observation point in the spherical coordinate,respectively. For the OIP model,QR(θR,φR)andPr(θr,φr)denote the object point and observation point in the spherical coordinate,respectively. TheθrandθRare in a range from-πtoπ,andφRandφrare in a range from-π/2 toπ/2. If we denote the diffraction distributions on inner surfaces and outer surfaces asur(θr,φr)anduR(θR,φR),the diffraction integral equations based on the Rayleigh-Sommerfeld integral equation of the two models can be written as

    whereCis a constant andkdenotes the wavenumber of the incident light,drepresents the distance between the observation pointPand the object pointQ, andsrefers to the object surface.

    2.2. Improved equal module decomposition

    In conventional equal module decomposition(EMD),[36]a complex amplitudeUcan be represented by two equal module masksP1andP2. The new distribution of complex amplitude can be rewritten as

    whereAis the amplitude ofU, andβis the phase ofU. If a random phase mask (RPM) (in the following text, RPM is denoted byR)distributed uniformly in the interval[0,2π],R2is expressed as

    where rand(M×N)means a random number matrix ofMrows andNcolumns,and the value range of element is[0,1]. Here,P1will be gained byA,andP2byβandR2.

    However,P1andP2are expressed as two complex-valued masks and they are not convenient to transmit. Therefore,an IEMD scheme is used[37]to solve the problem. Here in the IEMD the output ofP1andP2are replaced byCandPKwhich are both real valued. Under the IEMD,the decomposition equation of complex amplitudeUis as follows:

    U=C·[exp(iR2)+exp(iPK)],

    C=0.5A·[cos(β-R2)]-1, PK=2β-R2=arg(P2),(6)

    whereCis ciphertext, andPKis the private key. In our scheme,R2is generated from the hyperchaotic system controlled by private key. Therefore, it is not necessary to transmitR2. Hence,Uis hidden into two real-valued masks [C,PK]successfully.

    3. Proposed scheme

    3.1. Encryption process

    Step 1 First, we need to generate several sequences or masks. In this step, Chenet al.’s four-dimensional (4D) hyperchaotic system[38]is used to generate the sequences and masks for subsequent encryption. The hyperchaotic system is as follows:

    Here, the parameters of the system are set to bea=80,b=45,c=22,d=5,e=21,f=8,andr=78,and they are broadcasted as public keys.

    The initial conditions used as private keys are determined by different plaintexts. The initial value ofx,y,z, andware determined by variance and mean of the color plaintext, respectively. The generated four sequences are used as key1,key2,R1,andR2for subsequent encryption. The key1 and key2 are used in the channel fusion process.R1is a random phase mask which forms a complex amplitude with the fused image in spherical diffraction.R2is the random mask in IEMD.

    In the actual transmission,the only private keys we need to transmit are the initial values of the hyperchaotic system.

    Step 2 In this step, the color plaintext is processed by channel fusion based on DWT and the keys generated by the hyperchaotic system. The channel fusion will change the distribution and values of the plaintext pixels through key1 and key2 and finally resulting in a grayscale image.

    Firstly,the RGB channels of colorful image are separated,and they are processed by as follows:

    whereIR,IG, andIBrepresent the corresponding RGB channels of the original image,FL[·]denotes the progress of transforming a two-dimensional (2D) image matrix into a onedimensional(1D)pixel sequence,°refers to the matrix splicing operation,andSis the spliced sequence.

    Secondly, the sequenceSis diffused and permuted by key1 and key2 which are obtained in step 1, and expressed as

    where Per(a,b) denotes usingbto permutea, and⊕is the operation of XOR.

    After that,S1is reshaped from a sequence to three matrices. Each of the three matrices contains part of the information about the three RGB channels, which means that the strong correlation between the RGB channels is weakened. In this way, the corresponding color plaintext cannot be recovered well while missing any matrix.After reshaping the fusion sequence back to three gray-scale images, they will perform inverse DWT[39]together with the interfering image to finally get a grayscale image

    where IDWT[·]is the inverse discrete wavelet transform,Re(·)is the operator of reshaping.Itis the interfering image, andf(x,y) is the grayscale image after fusion. The process of channel fusion is shown in Fig.2,and the intermediate and the final results of channel fusion are shown in Fig.3. The size of final fused image is four times that of the original image.

    Fig.2. Channel fusion process.

    Fig.3. Channel fusion results,showing(a)original image,(b)interfering image,IDWT without(c)and with(d)permutation and diffusion,and(e)fusion image.

    Step 3 After the channels are fused, the phase mask RPM(x,y)=exp(jR1) generated by the hyperchaotic system andf(x,y) together form the complex amplitude distribution to be diffracted.

    According to the theory of Eq.(1),the result of diffraction in IOP mode is expressed as a complex distribution

    Step 4 Owing to the fact that the result of spherical diffraction is a complex distribution, it is necessary to make it more convenient to the actual data transmission. Compared with the traditional EMD, the IEMD can hide complex amplitude into two real-value masks while improving security.According to Eq.(6),the result of spherical diffraction can be rewritten as

    The whole encryption progress is shown in Fig.4.

    Fig.4. Encryption process.

    3.2. Decryption progress

    Step 1 Firstly,according to Eq.(12),we can obtain the complex amplitudeU. TheUis modulated by RPM*after spherical diffraction. The fused imagef(x,y)can be obtained from

    where LH corresponds to the red channel, HL denotes the green channel,and HH refers to the blue channel. The correspondence between subbands and channels will be determined by the encryption process.

    Step 3 Then,S2is inversely permuted and inversely diffused to restoreS. According to Eqs. (8) and (15), the onedimensional sequenceSwith complete RGB three-channel information is then reshaped into three two-dimensional matrices corresponding to RGB. Finally, the RGB channels are merged and the colorful plaintext is restored as shown below:

    where Per(a,b)-1is the inverse process of Per(a,b), and merge{·}means RGB channels’mergence.

    4. Simulation results

    4.1. Encryption and decryption result

    The simulation is performed with Python 3.8.2 to analyze the performance of the proposed scheme on a 64-bit computer. In the simulation, the radius of the outer sphereR, the radius of the inner spherer, and the wavelengthλare set to be 500 mm,50 mm,and 0.25 mm. According to the spherical holographic sampling theory,[34,35]the above parameters require that the number of sampling points in the horizontal and vertical directions of the image should be at least 2513 pixels and 1257 pixels. However, if we select only 1/5 of the sphere surface, the minimum number of sampling points required will be 503 pixels and 252 pixels in the corresponding direction. To achieve this goal, the size of the original image is select as 256×256×3, and the corresponding size of the ciphertext is 512×512. Figure 5 shows the result of encryption and decryption with plaintext ‘baboon’. The parameters related to spherical diffraction and the hyperchaotic system are listed in Table 1.

    Fig.5. Encryption and decryption results,showing(a)original image,(b)cipher-text,(c)private key PK,(d)decryption result with correct PK,and(e)decryption result with the wrong PK.

    Table 1. Parameters of spherical diffraction and Chen’s 4D hyperchaotic system.

    To better evaluate the quality of encryption and decryption,we introduce PSNR and SSIM as reference indexes. The corresponding equation is as follows:

    whereμIoandμIdrepresent the mean values of the original image and the decryption result image respectively;σIo,σId,σIoIdrepresent the variance of the original image and the decrypted image and the co-variance between them,respectively;c1andc2are constants to avoid division by 0;Ldenotes the dynamic range of pixel values. Usually,k1=0.01 andk2=0.03.

    4.2. Histogram

    The histogram shows the effectiveness and security of the encryption scheme.The histograms of ciphertext and plaintext should be completely different in the ideal encryption scheme.Figure 6 shows the histograms corresponding to RGB channels of color images‘a(chǎn)irplane’and‘baboon’,and their respective ciphertext histograms,which shows that the histogram of the ciphertext is different from that of any channel.

    Fig. 6. (a)-(c) RGB channels’ histograms of ‘a(chǎn)irplane’, (d) ciphertext histogram of ‘a(chǎn)irplane’, (e)-(g) RGB channels’ histograms of ‘baboon’, and (h)ciphertext histogram of‘baboon’.

    4.3. Key sensitivity and key space analysis

    Key sensitivity is usually used to test the reliability of an encryption scheme. Figures 7(a)and 7(b)show the sensitivity sensitivities of spherical diffraction parameters and initial values of hyperchaotic systems, respectively. Here, ‘baboon’ is selected as the plaintext.

    The dependence of SSIM on the change ofr,R,λare shown in Fig. 7(a). Whenr,R, andλchange 1% , 1%, 3%,the SSIM value would change dramatically.

    The initial condition of the chaotic sequence is also used as a private key. Figure 7(b) shows the decryption effects of changes in initial conditions, indicating that the initial condition changing by 0.25% will have a significant influence on the decryption result when the initial condition is 4 decimal places. With the increase of the decimal places of the initial condition,the spatial sensitivity of the initial condition becomes stronger.

    Fig.7. (a)Key sensitivity of spherical diffraction,and(b)key sensitivity of initial conditions of 4D hyperchaotic system.

    4.4. Noise and occlusion attacks

    Usually, the ciphertext may be polluted during transmission. Therefore,it is very important to ensure that the encryption scheme is robust to noise attack. In this part, multiplicative Gaussian noise is used to test the anti-noise performance of the image.The additive Gaussian noise model is as follows:

    wherePandP′represent ciphertext and ciphertext with noise,respectively,Gdenotes the Gaussian noise with a mean value of 0 and a standard deviation of 0.01,andkrefers to the signalto-noise ratio.Figures 8(a)-8(d)show the decryption results of the plaintext‘baboon’under different strengths of multiplicative Gaussian noise attack. The strengths of the four images arek=0.01,0.05,0.1,and 0.5,and the corresponding PSNR values are 28.16 dB, 21.58 dB, 18.51 dB, and 11.45 dB, respectively.

    In the process of transmission, the occlusion of ciphertext is also one of the possible pollutions. Figure 9 shows the decryption effects under different occlusion ratios: 50×50 pixels (1%), 100×100 pixels (4%), 150×150 pixels (8%),and 200×200 pixels(15%),respectively. The corresponding PSNR values are 17.79 dB,14.68 dB,12.81 dB,and 11.61 dB,respectively. Table 2 shows the decryption quality of the proposed scheme and Ref.[36]under the same clipping ratio. It shows that the proposed scheme is more resistant to ciphertext occlusion than the counterpart in Ref.[36].

    Fig.8. Decryption results of encryption image with noise strengths: k=0.01(a),0.05(b),0.1(c),and 0.5(d).

    Fig.9. Decryption results of encryption image with occlusion of(a)50×50 pixels(1%),(b)100×100 pixels(4%),(c)150×150 pixels(8%),and(d)200×200 pixels(15%).

    Table 2. Comparison of t ability to resistocclusion between Ref.[36]and proposed scheme,with‘baboon’chosen as plaintext.

    4.5. Error analysis of spatial light modulator

    Since spatial light modulator carries out the numerical quantization of the image on the target plane,quantization errors are regarded as a main error in optical encryption.To simulate an actual optical decryption,we will test this error to approach to the simulation results of real optical experiments.[40]

    Figures 10(a)-10(d) show the decryption effects of the images at different quantization levels: 22levels, 24levels,28levels, 216levels, and the corresponding PSNR values are 10.25 dB,15.28 dB,26.34 dB,and 29.02 dB,respectively.Under the introduction of this error,the proposed scheme is better than Ref.[21].Figure 11 shows the difference between the two schemes. The corresponding PSNR values are 11.54 dB and 27.63 dB,and SSIM values are 0.69 and 0.79,respectively.

    Fig.10. Decryption results at(a)22,(b)24,(c)28,and(d)216 quantization levels.

    Fig.11. Decryption results with quantization level 28,showing(a)original image,(b)decryption result of Ref.[21],and(c)decryption result of the proposed scheme.

    4.6. Resisting information leakage

    The current partial color image encryption adopts three channels parallel processing method,[21-23]which has the risk of information leakage in the process of transmission. Unlike these schemes,the single-channel grayscale ciphertext and the low correlation among the three channels in our scheme can significantly reduce the possibility of information leakage during transmission. To test the ability to resist information leakage, we assume that the information leakage has occurred.That is, the attacker has obtained the information about one of the three RGB channels,which means that for our scheme,the attacker has obtained a subband completely. Meanwhile,we assume that the attacker knows all the private keys and the encryption scheme.

    Figure 12 shows the comparison of the decryption effect between the two schemes under the condition of only knowing channel B information,taking the result in Ref.[23]as the comparison. The corresponding SSIM values of Figs. 10(c),10(g),10(d),and 10(h)are 0.99,0.99,0.09,and 0.09,respectively, showing that the ciphertext security of our scheme is much higher than the parallel processing scheme.

    Fig.12.Comparison of anti-information leakage ability between the literature and the proposed scheme,with channel B taken for example,displaying((a),(e))plaintext,((b),(f))B channel of plaintext,((c),(g))decryption result of Ref.[23],((d),(h))decryption of the proposed scheme.

    4.7. Potential attack analysis

    Phase iterative attack is a common way to attack optical encryption.[41]Here,we compare the resistance to phase iterative attack between Ref. [23] and our scheme. To compare the result better, the black edge is padded around the image.Figure 13 shows the phase recovery of the image after 500 iterations,and figure 14 shows the relation between the number of iterations and the SSIM of the recovered image.

    Fig.13. Result of phase iterative attack: (a)plaintext,(b)result of Ref.[23],(c)result of the proposed scheme.

    Fig.14. Comparison of phase attack results between Ref.[23]and the proposed scheme.

    Compared with linear optical system, nonlinear optical system has better resistance to phase attack. And since spherical diffraction is just one kind of nonlinear optical system,our scheme has a better performance against phase attack.

    An encryption system with high security should be able to resist differential attacks. In general, the number of pixel change rate (NPCR) and unified average changing intensity(UACI)are used to evaluate the ability to resist differential attacks,and defined as

    whereEandE′represent the ciphertext and the ciphertext with only one pixel changed,respectively.

    The corresponding NPCR and UACI values under different plaintexts are shown in Table 3 as compared with those in Refs. [24,42-44]. The result from the characteristics of chaotic systems shows that the difference in result caused by small changes in initial values is widely divergent. And since the initial value is determined by the colorful plaintext,a small change in the plaintext will make the key completely different.Therefore it has a strong ability to resist differential attacks.

    Table 3. Values of NPCR and UACI of different schemes.

    5. Conclusions

    In this paper,an efficient and secure color image encryption scheme based on channel fusion and spherical diffraction is proposed. Especially,channel fusion technology can effectively solve the problem of information leakage in color image encryption and reduce the loss of encryption. Compared with the symmetric system, the asymmetric spherical diffraction system used in this paper can significantly improve the antiattack ability and security of the scheme. Besides,the IEMD also solves the problem that the diffraction result is complexvalued. The simulation results and the comparison show the high security and robustness of the proposed scheme. Therefore,the proposed scheme may be used as a reference to resisting the risk of information leakage in color image encryption.

    Acknowledgements

    Project supported by the National Natural Science Foundation of China (Grant No. U1933132) and the Chengdu Science and Technology Program, Sichuan Province, China(Grant No.2019-GH02-00070-HZ).

    猜你喜歡
    王君
    王君作品
    雨花(2023年11期)2023-11-18 13:02:58
    弟弟
    參花(下)(2021年8期)2021-08-25 18:37:55
    捏活人
    讓句式多樣化的四種方法
    海洋火鍋
    視野(2016年22期)2016-11-11 04:47:28
    蘆芽又短
    視野(2016年14期)2016-09-28 10:48:32
    漂流記
    從公務員到修車工
    瞄準目標放低身段 公務員變身修車店老板
    捏活人
    故事會(2013年9期)2013-05-14 15:24:07
    丰满迷人的少妇在线观看| 狂野欧美激情性bbbbbb| 亚洲av在线观看美女高潮| 国产精品国产av在线观看| 人人澡人人妻人| 精品卡一卡二卡四卡免费| 亚洲成人免费电影在线观看 | 国产精品一区二区免费欧美 | 午夜福利一区二区在线看| 免费观看av网站的网址| 精品国产乱码久久久久久小说| 丰满迷人的少妇在线观看| 777久久人妻少妇嫩草av网站| 一个人免费看片子| 欧美xxⅹ黑人| 日本vs欧美在线观看视频| av国产精品久久久久影院| 水蜜桃什么品种好| 人妻 亚洲 视频| 国产免费现黄频在线看| 菩萨蛮人人尽说江南好唐韦庄| 国产成人免费无遮挡视频| 在线观看www视频免费| 人妻 亚洲 视频| 天天操日日干夜夜撸| 亚洲成国产人片在线观看| 99久久99久久久精品蜜桃| 中文字幕制服av| www.999成人在线观看| 亚洲精品日韩在线中文字幕| www.熟女人妻精品国产| 欧美成人午夜精品| 99国产精品免费福利视频| 国产精品久久久久久人妻精品电影 | a级毛片黄视频| 国产一区有黄有色的免费视频| 国产亚洲欧美在线一区二区| 亚洲av成人精品一二三区| 精品少妇久久久久久888优播| 国产亚洲av高清不卡| 欧美变态另类bdsm刘玥| 久久性视频一级片| 脱女人内裤的视频| 亚洲av成人不卡在线观看播放网 | 亚洲天堂av无毛| 精品一区二区三区av网在线观看 | 黑人欧美特级aaaaaa片| 黄色 视频免费看| 中文字幕人妻丝袜一区二区| 99热国产这里只有精品6| 久久99热这里只频精品6学生| 妹子高潮喷水视频| 精品人妻熟女毛片av久久网站| 亚洲熟女精品中文字幕| 日日夜夜操网爽| 黄色 视频免费看| 亚洲,欧美,日韩| 在线观看免费日韩欧美大片| 久久ye,这里只有精品| 亚洲专区国产一区二区| 精品人妻熟女毛片av久久网站| 欧美日韩视频精品一区| 男男h啪啪无遮挡| 在线亚洲精品国产二区图片欧美| 90打野战视频偷拍视频| e午夜精品久久久久久久| 一级毛片我不卡| 国产日韩欧美亚洲二区| 大话2 男鬼变身卡| 成人影院久久| 在线亚洲精品国产二区图片欧美| 中文字幕另类日韩欧美亚洲嫩草| 亚洲国产中文字幕在线视频| 韩国高清视频一区二区三区| 亚洲av日韩精品久久久久久密 | 亚洲中文字幕日韩| 亚洲,欧美精品.| 只有这里有精品99| 免费一级毛片在线播放高清视频 | 又紧又爽又黄一区二区| 深夜精品福利| av福利片在线| 中文字幕av电影在线播放| 成年av动漫网址| 久久女婷五月综合色啪小说| 可以免费在线观看a视频的电影网站| 91九色精品人成在线观看| 精品亚洲成a人片在线观看| 成在线人永久免费视频| 一本—道久久a久久精品蜜桃钙片| 夜夜骑夜夜射夜夜干| 亚洲欧美色中文字幕在线| 国产福利在线免费观看视频| 精品一区在线观看国产| 飞空精品影院首页| 日韩熟女老妇一区二区性免费视频| 老司机午夜十八禁免费视频| 国产精品久久久久久精品电影小说| 一区福利在线观看| 日本色播在线视频| 真人做人爱边吃奶动态| 国产一区有黄有色的免费视频| 欧美在线一区亚洲| 精品一区在线观看国产| 午夜精品国产一区二区电影| 免费女性裸体啪啪无遮挡网站| xxx大片免费视频| 女性被躁到高潮视频| 天天躁狠狠躁夜夜躁狠狠躁| 99精国产麻豆久久婷婷| 各种免费的搞黄视频| 不卡av一区二区三区| 美女午夜性视频免费| 伊人亚洲综合成人网| 青春草亚洲视频在线观看| 超碰97精品在线观看| 19禁男女啪啪无遮挡网站| 久久久精品国产亚洲av高清涩受| 美女国产高潮福利片在线看| 男女床上黄色一级片免费看| 一本—道久久a久久精品蜜桃钙片| 曰老女人黄片| 一本一本久久a久久精品综合妖精| 男人操女人黄网站| 中文字幕精品免费在线观看视频| 蜜桃在线观看..| 日本色播在线视频| 国产精品熟女久久久久浪| 精品一品国产午夜福利视频| 国产1区2区3区精品| 亚洲精品国产av蜜桃| 美女高潮到喷水免费观看| 免费在线观看黄色视频的| 91九色精品人成在线观看| 搡老岳熟女国产| 亚洲精品自拍成人| 脱女人内裤的视频| 91成人精品电影| 母亲3免费完整高清在线观看| 国产高清videossex| 国产无遮挡羞羞视频在线观看| 国产一区二区激情短视频 | 又黄又粗又硬又大视频| 免费看不卡的av| 日本色播在线视频| 亚洲国产精品成人久久小说| 一本一本久久a久久精品综合妖精| 国产成人av教育| 女性被躁到高潮视频| 亚洲成人国产一区在线观看 | 欧美av亚洲av综合av国产av| 欧美成狂野欧美在线观看| 99久久99久久久精品蜜桃| 美女中出高潮动态图| 91国产中文字幕| 91精品国产国语对白视频| 天天躁夜夜躁狠狠躁躁| 国产成人精品久久久久久| 青春草亚洲视频在线观看| 91字幕亚洲| 久久精品国产亚洲av高清一级| 精品一区在线观看国产| 自线自在国产av| 亚洲国产精品一区二区三区在线| 国产一区二区 视频在线| 免费在线观看影片大全网站 | 免费在线观看日本一区| 免费黄频网站在线观看国产| 免费观看a级毛片全部| 欧美日韩国产mv在线观看视频| 精品国产一区二区三区四区第35| 美女主播在线视频| 久热爱精品视频在线9| 国产一区二区激情短视频 | 丝袜脚勾引网站| 欧美激情 高清一区二区三区| 日韩伦理黄色片| 亚洲自偷自拍图片 自拍| 欧美黑人精品巨大| 久久这里只有精品19| 女性被躁到高潮视频| 欧美人与善性xxx| 精品久久久久久电影网| 一区二区三区激情视频| 亚洲av日韩在线播放| 国产成人av激情在线播放| 精品人妻1区二区| 欧美精品一区二区大全| 中文字幕高清在线视频| 国产不卡av网站在线观看| 国产国语露脸激情在线看| 老司机亚洲免费影院| 亚洲国产精品999| 亚洲伊人久久精品综合| 国产亚洲一区二区精品| 久久精品国产亚洲av高清一级| 人人妻人人添人人爽欧美一区卜| 美女中出高潮动态图| 波多野结衣一区麻豆| 中文字幕精品免费在线观看视频| 宅男免费午夜| 亚洲av男天堂| 悠悠久久av| 亚洲一码二码三码区别大吗| 99九九在线精品视频| 亚洲人成网站在线观看播放| 精品久久蜜臀av无| 99久久人妻综合| 一级片免费观看大全| 亚洲色图综合在线观看| 成人午夜精彩视频在线观看| 一级毛片 在线播放| 国产日韩欧美视频二区| 男女下面插进去视频免费观看| 久久精品久久精品一区二区三区| 亚洲欧美色中文字幕在线| 欧美日韩视频精品一区| 色婷婷久久久亚洲欧美| 19禁男女啪啪无遮挡网站| 欧美日韩亚洲国产一区二区在线观看 | 午夜免费男女啪啪视频观看| 日本wwww免费看| 777久久人妻少妇嫩草av网站| 国产精品.久久久| 大码成人一级视频| 男人舔女人的私密视频| 91国产中文字幕| 不卡av一区二区三区| 国产在线一区二区三区精| 免费看不卡的av| 韩国高清视频一区二区三区| 免费少妇av软件| 黄色视频不卡| 国产欧美日韩精品亚洲av| 免费高清在线观看视频在线观看| 成年女人毛片免费观看观看9 | 亚洲精品国产色婷婷电影| 亚洲五月色婷婷综合| 免费在线观看完整版高清| 成人黄色视频免费在线看| 丁香六月欧美| 老熟女久久久| 99精国产麻豆久久婷婷| 最新的欧美精品一区二区| 国产日韩一区二区三区精品不卡| 妹子高潮喷水视频| 岛国毛片在线播放| 精品一区二区三区四区五区乱码 | 少妇粗大呻吟视频| 亚洲男人天堂网一区| 精品国产乱码久久久久久小说| 人妻人人澡人人爽人人| 日韩电影二区| 国产精品国产三级专区第一集| 青春草亚洲视频在线观看| 人人妻,人人澡人人爽秒播 | 下体分泌物呈黄色| 男女之事视频高清在线观看 | 国产一卡二卡三卡精品| 欧美日韩亚洲国产一区二区在线观看 | 精品少妇黑人巨大在线播放| www.熟女人妻精品国产| 国产在线观看jvid| 欧美黄色淫秽网站| 午夜视频精品福利| 国产日韩欧美亚洲二区| 只有这里有精品99| 99热全是精品| 亚洲一区二区三区欧美精品| 精品福利观看| 亚洲国产精品一区二区三区在线| 亚洲欧美一区二区三区久久| 捣出白浆h1v1| 久久久久久久精品精品| 久久久精品免费免费高清| 一本色道久久久久久精品综合| 18禁观看日本| 成年人黄色毛片网站| 日韩免费高清中文字幕av| 黄色视频不卡| 脱女人内裤的视频| 18禁国产床啪视频网站| 国产男人的电影天堂91| 国产又爽黄色视频| 精品欧美一区二区三区在线| 国产在线观看jvid| 狂野欧美激情性xxxx| 狠狠精品人妻久久久久久综合| 一级,二级,三级黄色视频| 亚洲自偷自拍图片 自拍| 性高湖久久久久久久久免费观看| 日日夜夜操网爽| 亚洲成人国产一区在线观看 | 十八禁网站网址无遮挡| 久久热在线av| 成年动漫av网址| e午夜精品久久久久久久| 亚洲精品国产av蜜桃| 亚洲国产精品一区二区三区在线| 91老司机精品| 欧美老熟妇乱子伦牲交| 狂野欧美激情性xxxx| 国产精品一区二区精品视频观看| 免费女性裸体啪啪无遮挡网站| 色播在线永久视频| 夫妻性生交免费视频一级片| 精品国产国语对白av| 国产欧美日韩精品亚洲av| 久久影院123| 男女无遮挡免费网站观看| 国产精品亚洲av一区麻豆| 亚洲专区中文字幕在线| 欧美日韩一级在线毛片| 国产成人欧美| 国产精品成人在线| 欧美日韩黄片免| 亚洲人成电影观看| 狂野欧美激情性bbbbbb| 久久精品成人免费网站| 国产精品国产三级国产专区5o| 性高湖久久久久久久久免费观看| 亚洲精品国产一区二区精华液| 久久久精品区二区三区| 首页视频小说图片口味搜索 | 国产真人三级小视频在线观看| 国产男女超爽视频在线观看| 精品熟女少妇八av免费久了| 嫁个100分男人电影在线观看 | 亚洲图色成人| cao死你这个sao货| 又粗又硬又长又爽又黄的视频| 水蜜桃什么品种好| 久久国产精品男人的天堂亚洲| 久久免费观看电影| 久久 成人 亚洲| tube8黄色片| 国产女主播在线喷水免费视频网站| svipshipincom国产片| 亚洲国产成人一精品久久久| 亚洲欧美精品自产自拍| 亚洲情色 制服丝袜| 久久人人97超碰香蕉20202| 欧美在线一区亚洲| 看免费av毛片| 日韩电影二区| 亚洲人成电影免费在线| 亚洲午夜精品一区,二区,三区| 国产在线视频一区二区| 自拍欧美九色日韩亚洲蝌蚪91| 亚洲精品中文字幕在线视频| 国产熟女欧美一区二区| 成人影院久久| 国产亚洲精品第一综合不卡| 亚洲一码二码三码区别大吗| 中文乱码字字幕精品一区二区三区| 少妇裸体淫交视频免费看高清 | 亚洲熟女毛片儿| 色精品久久人妻99蜜桃| 精品少妇一区二区三区视频日本电影| 国产黄频视频在线观看| 激情视频va一区二区三区| 欧美日韩成人在线一区二区| 亚洲精品国产区一区二| 欧美人与性动交α欧美精品济南到| 一级a爱视频在线免费观看| 性高湖久久久久久久久免费观看| 日本91视频免费播放| 国产一区二区三区综合在线观看| 国产精品偷伦视频观看了| 一本久久精品| 女人久久www免费人成看片| 免费久久久久久久精品成人欧美视频| 国产成人欧美| 大型av网站在线播放| 高潮久久久久久久久久久不卡| 精品国产超薄肉色丝袜足j| 啦啦啦 在线观看视频| 操美女的视频在线观看| 手机成人av网站| 91精品三级在线观看| 桃花免费在线播放| 国产精品一区二区精品视频观看| 男女床上黄色一级片免费看| 免费不卡黄色视频| 欧美日韩精品网址| 欧美日本中文国产一区发布| 十分钟在线观看高清视频www| 下体分泌物呈黄色| 日本黄色日本黄色录像| 一区二区av电影网| 久久精品亚洲熟妇少妇任你| 亚洲精品美女久久久久99蜜臀 | 真人做人爱边吃奶动态| 国产一区有黄有色的免费视频| 天天躁夜夜躁狠狠久久av| 亚洲欧美日韩高清在线视频 | 最新在线观看一区二区三区 | 黄色视频不卡| 欧美精品av麻豆av| 丝袜喷水一区| 99香蕉大伊视频| 亚洲成人免费电影在线观看 | 在现免费观看毛片| 亚洲成色77777| 可以免费在线观看a视频的电影网站| 久久久久久人人人人人| 婷婷色麻豆天堂久久| 中文乱码字字幕精品一区二区三区| 国产男女超爽视频在线观看| 青春草亚洲视频在线观看| 18禁国产床啪视频网站| 欧美中文综合在线视频| 天天影视国产精品| 自拍欧美九色日韩亚洲蝌蚪91| 手机成人av网站| 中文字幕人妻丝袜制服| 一区二区三区精品91| 亚洲av日韩精品久久久久久密 | 国产极品粉嫩免费观看在线| 中文字幕av电影在线播放| 国产成人av激情在线播放| 国产深夜福利视频在线观看| 免费观看人在逋| 亚洲,一卡二卡三卡| 亚洲国产精品国产精品| 亚洲精品美女久久av网站| 一级毛片电影观看| 国产免费又黄又爽又色| 别揉我奶头~嗯~啊~动态视频 | 2018国产大陆天天弄谢| 热re99久久国产66热| 国产欧美日韩一区二区三 | 亚洲精品久久久久久婷婷小说| 欧美久久黑人一区二区| svipshipincom国产片| 永久免费av网站大全| 真人做人爱边吃奶动态| 亚洲,欧美,日韩| 大码成人一级视频| 波多野结衣av一区二区av| 国产一区二区在线观看av| 一区二区三区乱码不卡18| 亚洲av日韩精品久久久久久密 | 9191精品国产免费久久| www.999成人在线观看| 青青草视频在线视频观看| 人妻一区二区av| 午夜久久久在线观看| 国产av一区二区精品久久| 亚洲精品国产一区二区精华液| 日本91视频免费播放| bbb黄色大片| 欧美+亚洲+日韩+国产| 女警被强在线播放| 少妇粗大呻吟视频| 成人手机av| 亚洲精品在线美女| 日本色播在线视频| 热re99久久精品国产66热6| 十八禁人妻一区二区| 热99国产精品久久久久久7| 99精国产麻豆久久婷婷| 国产成人a∨麻豆精品| 宅男免费午夜| 日本vs欧美在线观看视频| 精品亚洲成a人片在线观看| 操美女的视频在线观看| 天天躁夜夜躁狠狠躁躁| 两性夫妻黄色片| 久久国产精品影院| 日韩av在线免费看完整版不卡| 亚洲欧美中文字幕日韩二区| 黄频高清免费视频| 99九九在线精品视频| 国产成人精品在线电影| 久久精品久久精品一区二区三区| 大香蕉久久网| 啦啦啦视频在线资源免费观看| 国产欧美日韩精品亚洲av| 国产男人的电影天堂91| 女人被躁到高潮嗷嗷叫费观| 国产精品久久久久久人妻精品电影 | 性色av一级| 啦啦啦 在线观看视频| 啦啦啦中文免费视频观看日本| 男女床上黄色一级片免费看| 亚洲情色 制服丝袜| 国产成人一区二区在线| 在线观看国产h片| kizo精华| 久久午夜综合久久蜜桃| 久久久欧美国产精品| 男女国产视频网站| 久久精品熟女亚洲av麻豆精品| 日韩中文字幕视频在线看片| 新久久久久国产一级毛片| 操美女的视频在线观看| 午夜免费成人在线视频| 久久这里只有精品19| 99久久人妻综合| 日韩一卡2卡3卡4卡2021年| 亚洲av在线观看美女高潮| 国产麻豆69| 手机成人av网站| 国产成人精品无人区| 一区二区三区乱码不卡18| 19禁男女啪啪无遮挡网站| 一区二区三区四区激情视频| 精品人妻熟女毛片av久久网站| 午夜免费鲁丝| 黄色视频不卡| 亚洲中文日韩欧美视频| 黑丝袜美女国产一区| 2021少妇久久久久久久久久久| 男女之事视频高清在线观看 | 精品一区二区三卡| 亚洲av成人精品一二三区| 亚洲国产精品一区三区| 亚洲男人天堂网一区| www.精华液| 国产又色又爽无遮挡免| 国产成人欧美在线观看 | 赤兔流量卡办理| 欧美另类一区| 国产伦理片在线播放av一区| 精品第一国产精品| 五月开心婷婷网| 精品少妇内射三级| 国产精品国产av在线观看| 国产成人av激情在线播放| videosex国产| 一本大道久久a久久精品| 午夜福利在线免费观看网站| 日本欧美国产在线视频| 亚洲av国产av综合av卡| 在线观看www视频免费| 人人妻人人澡人人看| 亚洲欧美色中文字幕在线| 少妇的丰满在线观看| 免费在线观看视频国产中文字幕亚洲 | 伊人久久大香线蕉亚洲五| 一本—道久久a久久精品蜜桃钙片| 久久精品aⅴ一区二区三区四区| 美女扒开内裤让男人捅视频| 国产午夜精品一二区理论片| 亚洲欧美日韩高清在线视频 | 三上悠亚av全集在线观看| 99精品久久久久人妻精品| 国产成人影院久久av| 亚洲国产精品成人久久小说| 最近最新中文字幕大全免费视频 | 超色免费av| 久久久久久久国产电影| 老司机午夜十八禁免费视频| 天天影视国产精品| svipshipincom国产片| 18禁国产床啪视频网站| 亚洲精品久久午夜乱码| 国产亚洲欧美在线一区二区| 亚洲欧美一区二区三区久久| 亚洲九九香蕉| 亚洲一区中文字幕在线| 欧美精品一区二区大全| 日韩中文字幕欧美一区二区 | 超碰97精品在线观看| 视频区图区小说| 一个人免费看片子| 亚洲欧洲日产国产| 久久av网站| 啦啦啦在线免费观看视频4| 黑丝袜美女国产一区| 国产老妇伦熟女老妇高清| 麻豆av在线久日| 国产一级毛片在线| 菩萨蛮人人尽说江南好唐韦庄| 亚洲欧美色中文字幕在线| 国产片内射在线| 日韩,欧美,国产一区二区三区| 精品国产国语对白av| 亚洲国产精品一区二区三区在线| 亚洲精品第二区| 亚洲美女黄色视频免费看| 国产爽快片一区二区三区| 99久久精品国产亚洲精品| 精品视频人人做人人爽| 看免费av毛片| 国产男女超爽视频在线观看| a 毛片基地| 欧美日韩视频精品一区| 亚洲成人免费av在线播放| 中文精品一卡2卡3卡4更新| 午夜免费男女啪啪视频观看| 免费一级毛片在线播放高清视频 | 成人18禁高潮啪啪吃奶动态图| 亚洲三区欧美一区| 亚洲人成电影观看| 2021少妇久久久久久久久久久| 尾随美女入室| 亚洲av片天天在线观看| 交换朋友夫妻互换小说| 国产亚洲一区二区精品| 老司机午夜十八禁免费视频| 久久亚洲精品不卡| 一级毛片女人18水好多 | 国产精品一区二区在线不卡| 九草在线视频观看| 五月天丁香电影| 国产精品一国产av| 免费黄频网站在线观看国产| 制服人妻中文乱码| 夫妻性生交免费视频一级片| 亚洲欧美一区二区三区国产| 国产色视频综合| 极品少妇高潮喷水抽搐| 777米奇影视久久|