• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Analytic Beta-Wavelet Transform-Based Digital Image Watermarking for Secure Transmission

    2022-03-14 09:23:12HeshamAlhumyaniIbrahimAlrubeSameerAlsharifAshrafAfifiChokriBenAmarHalaElSayedandOsamaFaragallah
    Computers Materials&Continua 2022年3期

    Hesham Alhumyani,Ibrahim Alrube,Sameer Alsharif,Ashraf Afifi,Chokri Ben Amar,Hala S.El-Sayed and Osama S.Faragallah

    1Department of Computer Engineering,College of Computers and Information Technology,Taif University,P.O.11099,Taif,21944,Saudi Arabia

    2Department of Electrical Engineering,Faculty of Engineering,Menoufia University,Shebin El-Kom,32511,Egypt

    3Department of Information Technology,College of Computers and Information Technology,Taif University,P.O.11099,Taif,21944,Saudi Arabia

    Abstract:The rapid development in the informationtechnology field has introduced digital watermark technologies as a solution to prevent unauthorized copying and redistribution of data.This article introduces a self-embedded image verification and integrity scheme.The images are firstly split into dedicated segments of the same block sizes.Then,different Analytic Beta-Wavelet(ABW)orthogonal filters are utilized for embedding a self-segment watermark for image segment using a predefined method.ABW orthogonal filter coefficients are estimated to improve image reconstruction under different block sizes.We conduct a comparative study comparing the watermarked images using three kinds of ABW filters for block sizes 64×64,128×128,and 256× 256.We embed the watermark using the ABW-based image watermarking method in the 2-level middle frequency sub-bands of the ABW digital image coefficients.The imperceptibility and robustness of the ABW-based image watermarking method image is evaluated based on the Peak Signal to Noise Ratio(PSNR)and Correlation coefficient values.From the implementation results, we came to know that this ABW-based image watermarking method can withstand many image manipulations compared to other existing methods.

    Keywords: Watermarking; ABW; median filtering; JPEG compression;PSNR

    1 Introduction

    Data security becomes an essential issue in the digital world with the rapid growth of digital images and Internet technology accompanied by many security threats on the Internet.For this purpose, many image encryption technologies have emerged and proposed.The existing image encryption technologies use a simple structure and a small key space to reduce the time cost and complexity of algorithms and meet the requirements image information security [1].Image encryption requires high fidelity of the original image due to its sensitivity to the image information [2].Otherwise, people can easily modify the image content because of the fast advancement in image processing techniques.Therefore, we should focus on the capability of the proposed schemes to be more sensitive to detect any modifications [3].Most existing approaches are based on scrambling or on information theory in the spatial domain [4].The limit of this domain resides in the vulnerability to statistical attack [5].A second family technique uses the chaotic systems where the pixel location is changed by using a 2D chaotic map [6].These techniques suffer significantly from the sensitivity to the initial and external parameters [7].The frequencydomain encryption algorithms use some common transforms like discrete cosine transform (DCT),discrete Fourier transform (DFT), and discrete wavelet transform (DWT) to transform the images from spatial to frequency domain first and then get the frequency coefficients and change their positions through those specific rules [8].The frequency-based approach has strong initial value sensitivity and robust against external attacks [9].In contrast, the wavelet transform has a low computational complexity that can effectively save the computational cost and reduce the loss of image information in the decryption operation.Nowadays, simplifying the access to digital content has facilitated hacking of image, audio, and video, which can be tampered with and copied.The owner of digital products is threatened severely by the tampered copyright.Therefore, digital watermarking technology is suggested as an effective method to protect copyright authentication and product tracking [10,11].The protections of different digital contents often require different watermarking algorithms [12].

    To enhance the adaptive ability of image watermarking, we proposed the utilization of a new wavelet family named Beta Wavelet family for proposing an efficient image watermarking scheme.The main contribution of the proposed algorithm is as follows: It uses Beta wavelet family to tune many parameters related to the Beta function [13] like order and support parameters and the classical parameters of wavelets like dilation and translation to improve coefficients approximation that achieves the specific goals of detection and verification.This work exploits the ABW advantages to design a robust watermarking approach for protection and verification processes.

    The rest of the paper is organized as follows: Section 2 presents the mathematical background of the parametric Beta Wavelets proposed in the schemas of protection and verification of the encrypted images.Section 3 exhibits the proposed schemes in both protection and verification steps.The results analysis is presented in Section 4.Section 5 concludes the paper with future trends.

    2 Related Work

    Image protection and verification have been investigated in the literature.Some of cryptosystems and digital watermarking approaches are proposed to help pushing efforts accordingly.The researchers [14] proposed a content-based image verification cryptosystem for insecure communication channels.First, they transferred the original image into frequency domain using DCT,and they used the mid frequency sub-band for watermarking.Second, the marked image is then encrypted using the chaotic baker map for additional security.

    The authors in [15] utilized the dual DCT and chaotic baker mapping to obtain an efficient image cryptosystem.First, they applied the DCT transformed on the red, green, and blue planes of the input image, where each plane was handled independently.Second, they shuffled the DCT coefficients of each plane using chaotic bake mapping.Finally, they applied the inverse DCT and merged the three planes to obtain the encrypted image.

    Another paper [16] utilized Fractional Fourier Transform (FrFT) and chaotic logistic mapping to produce secure optical encryption scheme.First, it shuffled and modulated each color channel of the original image using 2D logistic map and random mask, respectively.Second, it transformed the resulted shuffled image of the red, blue, green channels using optical-based FrFT.Again, it shuffled and modulated the transformed images using 2D logistic map and another random mask.Finally, it applied the inverse FrFT and obtained the cipher image.

    Authors in [17] presented a multilayer protection scheme for medical images.They watermarked the Electronic Patient Record (EPR) in the original image containing essential health information.They compressed and encrypted the EPR using Huffman algorithm and Quantum logistic map, respectively.Then, they obtained hash value using SHA-256 and embedded it into the image for authentication purposes.After that, they applied the Lifting Wavelet Transform (LWT)on the resulting image’s planes.The modified EPR and hash value were to be stored into the different LWT frequency bands, resulting in Watermarked Medical Image (WMMI).Each color layer of the WMMI image permuted using Arnold transformation and then compressed using a lossless Huffman scheme.Finally, they utilized the LWT (HH and LH) frequency bands to embed the resulted WMMI.

    Another paper [18] proposed a double fragile watermark system based on diffusion watermark and authentication watermark to protect image integrity.Diffusion watermarking is composed of a cover image and two random sequences.Furthermore, the authors used the diffusion operations,3D Arnold transformation, and DNA coding to confront chosen cover-image attacks.They utilized the resulted watermark image using DNA encoding to obtain the authentication watermark and cover images.For more security, the authors considered the Latin square permutation and double-layered embedding to perform scrambling to the authentication watermark.

    The authors in [19] proposed an image verification scheme by exploiting double-random phase encoding (DRPE) incorporating chaotic mapping.Its proposed generated mask is produced using an image-based chaotic Lorenz system instead of a conventional random-based mask.For verification and authentication, after encrypting the original image using the new proposed DRPE, it is compared with the encrypted reference image in a database by calculating the peak-to-correlation energy.

    Technical literature [20] presented a new transmission and integrity verification framework.This framework is robust and reliable for verifying the integrity of HEVC frames transmitted through insecure communication channels.Firstly, the transmitted HEVC frames are divided into a number of blocks with specific block size.The article used a discrete transform for watermarks self-embedding among blocks depending on a predefined mechanism.The suggested schema demonstrates the suitability of the proposed transmission framework for different multimedia cybersecurity applications.

    In [21], the authors proposed a crypto-based algorithm that provides confidentially, authenticity, and integrity for the pixel data and the header data of DICOM files to secure medical image exchanges over public networks.They applied strong cryptographic primitives utilizing internally generated security data, such as encryption keys, hashing codes, and digital signatures.They used strong cryptographic primitives, utilizing internally generated encryption keys, such as encryption keys, hashing codes, and digital signatures to provide the required security services.

    The authors of [22] proposed a new joint watermarking/encryption algorithm to verify the reliability of medical images in encrypted and spatial domains.Their algorithm combines a substitutive watermarking algorithm, the quantization index modulation (QIM) with a block cipher algorithm, and an Advanced Encryption Standard (AES).The proposed solution gives access to the image integrity outcomes and their origins, although they are stored encrypted.

    3 Analytical Beta Wavelets

    Beta Wavelet (BW) is a family of wavelets derived from beta function under certain conditions.Unlike other wavelet forms, BW can be generated based on a proper selection of beta function parameters.The beta distribution is given as follows [13]:

    Indeed, the beta function holds some properties as follows:

    1.Beta distribution at the boundary of interval [x0,x1] equals zero, that isβ(x0)=β(x1)=0.

    2.Beta distribution at the centroid,xc, equals 1, that isβ(xc)=1.

    3.Evaluation of the derivative of the beta function with respect to x atx0,x1orxcequals zero.That is, knowing that:

    5.The second derivative of the beta function is given as follows:

    where

    Generally, the nth derivative of the beta function is given as the following:

    The last property is crucial because the beta function’s derivative is the essence of beta wavelets.Based on Eq.(5), when (n = 0) the result is identical to that one in Eq.(1), which represents beta distribution.However, when (n >0), the beta function takes different wavelet shapes based on derivative order.For instance, Fig.1 shows the form of beta function in the first raw, the second raw represents the first derivative of such function, and the third raw depicts the second derivative.Beta function and its generated wavelets achieve three characteristics,localization, oscillation, and admissibility.The proof of these properties is left for the reader in [5].

    Figure 1: Beta function and its derivatives

    Orthogonal multiresolution analysis is a powerful tool to create the basis of orthogonality.Multiresolution can be generated from interpolating scaling functions such as beta wavelet to ease the estimation of wavelet filter coefficients.To illustrate that, assume compact support wavelet in the interval [-N/2, N/2], and it is given as:

    Let the interpolation scaling function is defined as follows:

    Hence, Eq.(6) becomes

    From Eq.(8), filter coefficientsgN, can be calculated as the following:

    Generally, the other coefficients that construct filter g can be computed with the same procedure for each sample as follows:

    Eventually, the wavelets are orthogonal, and the filter is a quadrature mirror filter if any sample of g creates an orthogonal base onL2∈R, that isgn=(-1)n h1-n.

    4 The Proposed Image Watermarking Method

    In this section, we study the suggested ABW-based image watermarking method in detail.The proposed method is with the potential of image integrity, verification, and tamper detection.It has two modules, watermark embedding module, and verification module.The two modules are explored and explained in detail.The Proposed ABW-based image watermarking method might be considered a fragile self-embedding watermarking process.It depends on segment-based selfwatermarking instead of employing external watermarks.

    4.1 Protection Module of the Suggested ABW-Based Image Watermarking Method

    The protection module of the suggested method is explored stepwise as follows, considering three different Analytic Beta-Wavelet (ABW) orthogonal filters.

    (a) Split the input image, f, into two equal sub-images, f1 and f2.Again, split the resulting parts into different non-overlapping segments.In our work, we try the block size of 64× 64, 128 × 128, and 256 × 256.For example, given the original image of size (256 ×256), when splitting into two equal sub-images (f1, f2), their size will be (128 × 256) each.Each sub-image is then divided into 8 × 8 non-overlapped blocks.Therefore, the number of blocks per sub-image is (128 × 256)/(8 × 8) = 512.

    (b) Apply ABW transform to each block in the sub-image f1 starting from the upper-left corner block.

    (c) Embed the row and column of each block in sub-image f1 into the row and column of the corresponding transformed block in sub-image f2.

    (d) Apply inverse ABW transform to each block in sub-image f1 starting from the upper-left corner block.

    (e) Apply ABW transform to each block in sub-image f2, and repeat steps 3 and 4 for such an image.

    (f) Recompose the resulted two sub-images to obtain the block-based watermarked image.

    4.2 The Verification Module of the Proposed Method

    The process of verification module can be digested in the following steps:

    (a) Receive the watermarked image.

    (b) Split the watermarked image, z, into two equal sub-images, z1 and z2.Again, split the resulting parts into different non-overlapping segments.In our work, we try the block size of 64 × 64, 128 × 128, and 256 × 256.

    (c) Apply ABW transform to each block in the sub-image z1 starting from the upper-left corner block.

    (d) Embed the row and column of each block in the transformed sub-image z1 into the row and column of the corresponding block in sub-image z2.

    (e) Apply inverse ABW transform to each block in sub-image z1 starting from the upper-left corner block.

    (f) Apply ABW transform to each block in sub-image z2, and repeat steps 4 and 5 for such an image.

    (g) Recompose the resulted two sub-images to obtain the extracted image.

    5 Simulation Results

    5.1 Experiments Setup and Dataset

    We used four standard and widely used images to assess the performance and robustness of the beta wavelets in watermarking and forgery detection.These images are Barbara, Male,Cameraman, and Baboon, as shown in Fig.2.The four images used in the experiments have different histograms, evident from Fig.2, which depict the variation of the results on these images.

    Figure 2: The standard images used in experiments with their histograms

    5.2 Watermarking Using Beta Wavelets

    The watermark is embedded into images by applying the safeguard method to the beta wavelets approximation coefficients at level 2.The non-sampled wavelet decomposition scheme is used in the experiments to preserve the quality of both the watermarked and the retrieved images.

    The authors in [13] generated different bi-orthogonal beta wavelet filters and compared them to traditional wavelet families, such as Daubechies and Morlet wavelets.They tested such beta wavelets in an image compression application.Bi-orthogonal wavelets are less phase distortion,and they support symmetrical and exact reconstruction than orthogonal wavelet filters.Biorthogonal wavelets have two sets of scaling filters, and hence wavelet filters.No prior experiment with beta wavelets for image watermark has been carried out in the literature.The performance of those filters with different Filter orders in the image’s watermark is checked and compared with two wavelets in this article: Daubechies (db2) and discrete Meyer wavelets.

    Consequently, along with the Daubechies (db2) and discrete Meyer (dmey) wavelets, 17 biorthogonal beta wavelet filters with different filter orders are generated and applied to the Barbara image with block sizes of 64 × 64, 128 × 128, and 256 × 256.The results of this study are provided in Tab.1.The performance of the BWT is assessed using visual inspection under two evaluation metrics: PSNR, and Correlation coefficient.Given two images I1and I2, the equations of these measures are:

    whereμ1andμ2are the mean of I1and I2, respectively.

    Table 1: PSNR and Correlation coefficient values of watermarked images with various Beta wavelet filters for the Barbara image with block sizes 64 × 64, 128 × 128, and 256 × 256

    The findings in Tab.1 show that the beta wavelet filter’s behavior differs depending on the PSNR and Cr values for the same image across the three block sizes.As shown in Tab.1, the best performance of each filter out of the three block sizes is highlighted with a bolded font.The bior1.3 filter, for example, has better PSNR with 256 × 256 blocks than other block sizes,while its Cr coefficient has the best value with 128 × 128 blocks.For both PSNR and Cr, the bior2.3 filter shows the best results with the same block size.The PSNR and Cr coefficients for the bior4.2 filter, on the other hand, indicate that the block size 256 × 256 produces the best results as compared to other block sizes.This filter, bior4.2, also has the best values of all the beta and common wavelet families tested in this study.Comparing the biorthogonal beta filters in this paper with the wavelets Haar, db2, and dmey allows us to use them in watermarking simulation experiments, as shown in the following section.Due to the difficulty of testing all filters systematically in the following experiments, only three beta filters, bior1.3, bior2.3, and bior4.2,are chosen to represent the remaining beta filters, each of which has two possible performance measure variants.

    5.3 Evaluation of Watermark Embedding

    As mentioned in the previous section, the performance of the three selected beta wavelet filters bior1.2, bior2.3, and bior4.2 is investigated further as the experiments progress.The quality measures of the four images when inserting the watermark using the safeguard procedure with beta wavelets under block size of 256 × 256 is shown in Fig.3.

    Figure 3: Protection process visual results of the original and watermarked images with Beta Wavelet for the four tested images of block size 256 × 256

    The plots in Fig.4A show that when changing the block size, the performance of all filters varies.Bior4.2 has the best performance with the 64 × 64 block size, while the other two filters have relatively close MSE measurements.Increasing the block size to 128 × 128 dramatically improves the results of the first two filters, while slightly enhancing the error measure for the bior4.2, except for the Baboon image.The error in the Baboon image increases with 128 × 128 block size compared to the 64 × 64 block size for the bior4.2 filter.Applying the beta wavelet filters to images with different characteristics and different histograms may affect their output; the Baboon image is an example.All filters have far better outcomes with the 256 × 256 block size than other block sizes.

    Tab.1 and Fig.4A clearly show that the performance measurements of the 256 × 256 block sizes outperform those of the 64 × 64 and 128 × 128 block sizes.Although the bior4.2 beta wavelet with block size 256 × 256 produces the best results, the bior1.3 and bior2.3 filters have comparable results, with the bior1.3 filter slightly outperforming the latter.The same behavior is repeated for the PSNR measure for the three beta wavelet filters as shown in Fig.4B.The plots in Fig.5C indicate that the Cr for the Baboon image has less performance compared to the other images used in the experiment for all filters.Although there are a lot of details in the Baboon image, most of these details are sporadic.Therefore, much of the energy for this image is based on the approximation coefficients that are subjected to the watermark at level 2 in this paper.The Baboon image displays less immunity to distortion when we attempt to extract it from the watermarked image.The visual quality of the watermarking process of the three biorthogonal filters and their effect on the tested images are shown in Fig.3.The associated block-correlation provides the quality change assessment for each block on the images.

    In this experiment, the images are extracted using the verification process with the Beta wavelet for block sizes 256 × 256, 128 × 128, and 64 × 64 without any attack.This method aims to ensure that the images are obtained from its watermarked version with minimal degradation.Again, the quality of the extracted images is measured by three metrics: PSNR, and Cr.Also,the extracted images are shown in each of the following Figs.5-7, next to the original copy to visually assess the effect of the watermarking and extraction processes.

    Tab.2 indicates the performance of the three previously selected beta wavelet filters for all images based on the three different block sizes 64 × 64, 128 × 128, and 256 × 256.Similar to the outcome of the previous experiments, almost in all cases, performance indicators show that the 256 × 256 block size outperformed the block sizes 64 × 64 and 128 × 128.Also, the bior4.2 filter has the best results on 256 × 256 block size against all other filters with various block sizes when applied to the four tested images.

    The block correlation plots shown in the Figs.5-7 next to the extracted images indicate good results for 256 × 256 and 128 × 128 block sizes for all filters performed well as expected.However,block correlation measure is dropped in Cameraman image when dividing the image into a small number of blocks.For the 64 × 64 block size, all correlation coefficients (Cr) have a fluctuating behavior.Cameraman results show the worst case where the Cr alternate between zero to higher values closer to one.This behavior is due to the large dark areas found in the image and the nonuniform intensity distribution, evident from its histogram, which affects the image extraction.On the contrary, the Baboon image has the best stable readings due to its lack of these large dark areas.The same happens for the Barbara and Male images with most blocks that do not have large dark spots.

    Figure 4: (A) MSE of watermarked images using the safeguard procedure with beta wavelet filters for block sizes 64 × 64, 128 × 128, and 256 × 256 applied to all images.(B) PSNR of watermarked images using the safeguard procedure with beta wavelet filters for block sizes 64 ×64, 128 × 128, and 256 × 256 applied to all images.(C) Cr of watermarked images using the safeguard procedure with beta wavelet filters for block sizes 64 × 64, 128 × 128, and 256 × 256 applied to all images

    Figure 5: Verification process visual results of the original and extracted images with Beta wavelet for the four tested images of block size of 256 × 256

    Figure 6: Verification process visual results of the original and extracted images with Beta wavelet for the four tested images of block size of 128 × 128

    Figure 7: Verification process visual results of the original and extracted images with Beta wavelet for the four tested images of block size of 64 × 64

    Table 2: PSNR and Correlation coefficient values of extracted images using the verification process with Beta wavelet for the four tested images of various block sizes of 256 × 256, 128 × 128,and 64 × 64

    6 Conclusions

    The paper presented an efficient ABW-based image watermarking protection and verification framework.The proposed ABW-based image integrity verification framework applied a certain ABW orthogonal filter for embedding internal segment-based watermarks into other segments of the transmitted image.Three different ABW orthogonal filters are examined in the proposed ABW-based image integrity verification framework.Simulation tests demonstrated that the possibility of watermark protection and verification using the suggested ABW-based image watermarking framework.Additionally, the proposed method provided a high robustness against multimedia attacks.Also, tampering and forgery detection simulations indicate superior results.The test results also indicated the high sensitivity of the suggested ABW-based image watermarking framework to detect different types of image tampering, although the received tampered image appeared to be visually not manipulated.Finally, we showed that the proposed method can be applied to provide a confidential image communication and detect any forensic operations.

    Acknowledgement:The authors would like to thank the Deanship of Scientific research, Taif University Researches Supporting Project number (TURSP-2020/216), Taif University, Taif, Saudi Arabia for supporting this scientific research work.

    Funding Statement:This research was funded by Deanship of Scientific Research, Taif University Researches Supporting Project number (TURSP-2020/216), Taif University, Taif, Saudi Arabia.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    国产有黄有色有爽视频| 午夜免费成人在线视频| 久久久国产一区二区| 日本vs欧美在线观看视频| 母亲3免费完整高清在线观看| 午夜影院在线不卡| 老司机影院成人| 少妇猛男粗大的猛烈进出视频| 亚洲av国产av综合av卡| a级毛片黄视频| 久久精品成人免费网站| 男人舔女人的私密视频| 制服人妻中文乱码| 久久性视频一级片| 欧美激情高清一区二区三区| 亚洲中文av在线| 日韩精品免费视频一区二区三区| 国产免费av片在线观看野外av| 91成人精品电影| av线在线观看网站| 精品人妻1区二区| 不卡av一区二区三区| 亚洲精品国产色婷婷电影| 国产91精品成人一区二区三区 | 日韩中文字幕视频在线看片| 亚洲九九香蕉| 19禁男女啪啪无遮挡网站| 免费在线观看完整版高清| 成年动漫av网址| 少妇精品久久久久久久| 午夜免费成人在线视频| 纯流量卡能插随身wifi吗| 国产深夜福利视频在线观看| 新久久久久国产一级毛片| 亚洲专区中文字幕在线| 少妇粗大呻吟视频| 色老头精品视频在线观看| 我的亚洲天堂| 欧美另类一区| 国产精品 欧美亚洲| 一级毛片电影观看| www.精华液| 久久久久久久久免费视频了| 一级片'在线观看视频| 国产区一区二久久| av福利片在线| 久久九九热精品免费| 性色av乱码一区二区三区2| 国产精品九九99| 亚洲男人天堂网一区| 考比视频在线观看| 亚洲精品国产av蜜桃| 亚洲国产欧美网| 日韩大片免费观看网站| 一级,二级,三级黄色视频| 亚洲精品国产精品久久久不卡| 亚洲精品国产av蜜桃| 国产成+人综合+亚洲专区| 美女扒开内裤让男人捅视频| 久久久国产成人免费| 男女无遮挡免费网站观看| 国产1区2区3区精品| 狂野欧美激情性xxxx| 亚洲五月婷婷丁香| 日本黄色日本黄色录像| 亚洲精品一区蜜桃| 亚洲精品一卡2卡三卡4卡5卡 | 淫妇啪啪啪对白视频 | 18禁黄网站禁片午夜丰满| 精品免费久久久久久久清纯 | 欧美97在线视频| 妹子高潮喷水视频| 大片免费播放器 马上看| 一本—道久久a久久精品蜜桃钙片| 亚洲欧美精品自产自拍| 一本一本久久a久久精品综合妖精| 午夜免费成人在线视频| 黄色视频在线播放观看不卡| 久久人人爽av亚洲精品天堂| 99香蕉大伊视频| 亚洲七黄色美女视频| 日本精品一区二区三区蜜桃| 精品人妻1区二区| 色老头精品视频在线观看| 亚洲精品久久午夜乱码| 欧美成狂野欧美在线观看| 精品少妇黑人巨大在线播放| 欧美日韩黄片免| 欧美人与性动交α欧美软件| 少妇猛男粗大的猛烈进出视频| netflix在线观看网站| 黑人操中国人逼视频| 国产高清videossex| 日韩大片免费观看网站| 中国美女看黄片| 亚洲国产精品一区二区三区在线| 国产亚洲欧美在线一区二区| 国产精品香港三级国产av潘金莲| 中文字幕制服av| 国产亚洲一区二区精品| 日韩中文字幕欧美一区二区| 天天躁日日躁夜夜躁夜夜| 欧美精品av麻豆av| 成人国产av品久久久| 日韩人妻精品一区2区三区| 久久精品国产亚洲av香蕉五月 | 桃花免费在线播放| 免费看十八禁软件| 国产成人精品无人区| 国产一区二区激情短视频 | 亚洲精品日韩在线中文字幕| 国产一区二区三区在线臀色熟女 | 国产精品久久久av美女十八| 91字幕亚洲| 成年av动漫网址| 日韩中文字幕欧美一区二区| 中文字幕高清在线视频| 亚洲av电影在线观看一区二区三区| 国产精品1区2区在线观看. | 超碰成人久久| 看免费av毛片| av天堂久久9| 人妻久久中文字幕网| 色婷婷av一区二区三区视频| 亚洲熟女精品中文字幕| 在线看a的网站| 日韩欧美一区二区三区在线观看 | 精品国产一区二区三区四区第35| 蜜桃国产av成人99| 亚洲三区欧美一区| 国产精品免费视频内射| 乱人伦中国视频| a级片在线免费高清观看视频| 纵有疾风起免费观看全集完整版| 欧美亚洲 丝袜 人妻 在线| 在线观看免费午夜福利视频| 精品久久久久久电影网| 丰满人妻熟妇乱又伦精品不卡| 大片免费播放器 马上看| 欧美人与性动交α欧美软件| 久热爱精品视频在线9| 国产成人欧美| 丁香六月天网| 国产精品久久久人人做人人爽| 深夜精品福利| 国产福利在线免费观看视频| 久久香蕉激情| 狂野欧美激情性xxxx| 搡老乐熟女国产| 99国产精品99久久久久| 免费日韩欧美在线观看| 亚洲熟女毛片儿| 精品亚洲乱码少妇综合久久| 久热这里只有精品99| 大香蕉久久网| 国产成人精品无人区| 午夜精品久久久久久毛片777| 国产成人欧美在线观看 | 精品少妇黑人巨大在线播放| 成在线人永久免费视频| 啪啪无遮挡十八禁网站| 日韩有码中文字幕| 午夜久久久在线观看| 国精品久久久久久国模美| 亚洲午夜精品一区,二区,三区| 亚洲国产欧美日韩在线播放| 国产精品久久久av美女十八| 亚洲久久久国产精品| 性色av乱码一区二区三区2| 国产精品成人在线| 狂野欧美激情性xxxx| 91老司机精品| 777久久人妻少妇嫩草av网站| 日本91视频免费播放| 中文字幕另类日韩欧美亚洲嫩草| 日本av免费视频播放| av又黄又爽大尺度在线免费看| 91麻豆av在线| 熟女少妇亚洲综合色aaa.| 丰满迷人的少妇在线观看| 亚洲精品国产av成人精品| 国产99久久九九免费精品| 搡老熟女国产l中国老女人| 久久人人爽av亚洲精品天堂| 午夜日韩欧美国产| 亚洲精品第二区| 国产精品影院久久| a级片在线免费高清观看视频| 99国产综合亚洲精品| 两性夫妻黄色片| 一本—道久久a久久精品蜜桃钙片| 久久久久久久久免费视频了| 超碰成人久久| 成人av一区二区三区在线看 | 老司机福利观看| 高清av免费在线| 色播在线永久视频| 亚洲欧美激情在线| 午夜福利视频在线观看免费| 人人妻人人爽人人添夜夜欢视频| 51午夜福利影视在线观看| 男人操女人黄网站| 成人三级做爰电影| 免费一级毛片在线播放高清视频 | 爱豆传媒免费全集在线观看| 啦啦啦中文免费视频观看日本| 老司机在亚洲福利影院| 精品人妻1区二区| 午夜福利,免费看| 国产伦人伦偷精品视频| 精品国产乱码久久久久久小说| 伦理电影免费视频| 老司机深夜福利视频在线观看 | 桃红色精品国产亚洲av| 国产男人的电影天堂91| 久久 成人 亚洲| 亚洲成人免费电影在线观看| 国产在线观看jvid| 日韩三级视频一区二区三区| 午夜福利在线观看吧| 18禁裸乳无遮挡动漫免费视频| 啦啦啦中文免费视频观看日本| 国产精品1区2区在线观看. | 亚洲av国产av综合av卡| 亚洲精品乱久久久久久| 午夜福利视频精品| 国产视频一区二区在线看| 一个人免费看片子| videosex国产| 欧美精品一区二区免费开放| 国产亚洲午夜精品一区二区久久| 丰满少妇做爰视频| 女人被躁到高潮嗷嗷叫费观| 午夜免费观看性视频| 国产精品自产拍在线观看55亚洲 | 精品亚洲乱码少妇综合久久| 国产一区二区三区在线臀色熟女 | 日本撒尿小便嘘嘘汇集6| 免费一级毛片在线播放高清视频 | 日韩三级视频一区二区三区| 欧美日韩亚洲综合一区二区三区_| 性少妇av在线| 在线观看免费高清a一片| 久久久久久久国产电影| videosex国产| 欧美另类亚洲清纯唯美| 一级黄色大片毛片| 国产一卡二卡三卡精品| 一级片免费观看大全| 亚洲欧洲日产国产| 国产视频一区二区在线看| 国产欧美日韩精品亚洲av| 99香蕉大伊视频| 男男h啪啪无遮挡| 又黄又粗又硬又大视频| 悠悠久久av| 人人妻人人爽人人添夜夜欢视频| av福利片在线| 岛国在线观看网站| 久久天堂一区二区三区四区| 免费人妻精品一区二区三区视频| 欧美中文综合在线视频| 欧美日韩av久久| 国产不卡av网站在线观看| 亚洲五月婷婷丁香| 啦啦啦中文免费视频观看日本| 久久久精品区二区三区| 久久久水蜜桃国产精品网| 久久久精品国产亚洲av高清涩受| 中文字幕av电影在线播放| 精品国产超薄肉色丝袜足j| 国产在线免费精品| 老司机午夜十八禁免费视频| 国产精品熟女久久久久浪| 另类亚洲欧美激情| 国产黄色免费在线视频| 亚洲国产欧美在线一区| 亚洲av片天天在线观看| 悠悠久久av| 在线永久观看黄色视频| 国产免费福利视频在线观看| 日韩制服骚丝袜av| 国精品久久久久久国模美| 久久久精品区二区三区| 国产主播在线观看一区二区| 性色av乱码一区二区三区2| 熟女少妇亚洲综合色aaa.| 亚洲欧美激情在线| 18禁国产床啪视频网站| 久久精品成人免费网站| 久久青草综合色| 人人妻,人人澡人人爽秒播| 成在线人永久免费视频| 日韩视频在线欧美| 亚洲av欧美aⅴ国产| 亚洲国产av新网站| 精品国产国语对白av| 丝瓜视频免费看黄片| www.999成人在线观看| 免费观看a级毛片全部| 久久久久久久久免费视频了| 久久久久久免费高清国产稀缺| 久久精品人人爽人人爽视色| 桃花免费在线播放| a级毛片黄视频| 欧美午夜高清在线| 青草久久国产| 啦啦啦中文免费视频观看日本| 亚洲全国av大片| 久久 成人 亚洲| 欧美 日韩 精品 国产| 人人妻人人澡人人爽人人夜夜| 最新在线观看一区二区三区| 不卡av一区二区三区| 久久久精品免费免费高清| 这个男人来自地球电影免费观看| 久久影院123| 午夜视频精品福利| 久久久国产精品麻豆| 大片电影免费在线观看免费| 99热全是精品| 日本黄色日本黄色录像| 国产欧美日韩综合在线一区二区| 91九色精品人成在线观看| 欧美97在线视频| 在线观看免费日韩欧美大片| 啦啦啦在线免费观看视频4| 国产在线一区二区三区精| 欧美精品人与动牲交sv欧美| 国产精品久久久久成人av| 人人妻人人澡人人爽人人夜夜| 久久久久久久精品精品| 美女高潮喷水抽搐中文字幕| 国产一区二区 视频在线| 久久精品aⅴ一区二区三区四区| e午夜精品久久久久久久| 999久久久国产精品视频| 亚洲美女黄色视频免费看| 久久久久国产精品人妻一区二区| 久久天躁狠狠躁夜夜2o2o| 久久久久网色| 欧美精品一区二区大全| 老司机影院成人| 中文字幕另类日韩欧美亚洲嫩草| 国产成+人综合+亚洲专区| 女人久久www免费人成看片| 久久热在线av| 亚洲av美国av| 91大片在线观看| 午夜福利乱码中文字幕| 国产精品免费大片| 久久狼人影院| 午夜久久久在线观看| 免费少妇av软件| 国产精品亚洲av一区麻豆| 精品亚洲乱码少妇综合久久| 操出白浆在线播放| 国产精品1区2区在线观看. | 桃红色精品国产亚洲av| netflix在线观看网站| videos熟女内射| 天天操日日干夜夜撸| 成人影院久久| 波多野结衣av一区二区av| 日韩大码丰满熟妇| 亚洲专区字幕在线| 久久久久精品人妻al黑| 午夜成年电影在线免费观看| 99国产极品粉嫩在线观看| 男女边摸边吃奶| 丁香六月欧美| 国产精品国产av在线观看| 99热国产这里只有精品6| 欧美激情久久久久久爽电影 | 亚洲专区中文字幕在线| 国产精品秋霞免费鲁丝片| 91字幕亚洲| 黄色片一级片一级黄色片| 亚洲精品国产av蜜桃| av福利片在线| 丝瓜视频免费看黄片| 日本wwww免费看| 午夜精品国产一区二区电影| 亚洲国产av新网站| 午夜福利视频在线观看免费| 一本—道久久a久久精品蜜桃钙片| 国产亚洲精品第一综合不卡| 亚洲国产欧美在线一区| 一区二区日韩欧美中文字幕| 搡老乐熟女国产| 久久亚洲国产成人精品v| 一级毛片电影观看| 久久亚洲国产成人精品v| 亚洲avbb在线观看| 两个人免费观看高清视频| 可以免费在线观看a视频的电影网站| 少妇精品久久久久久久| 熟女少妇亚洲综合色aaa.| 精品一品国产午夜福利视频| 久久久精品94久久精品| 午夜福利视频在线观看免费| 2018国产大陆天天弄谢| 国产av一区二区精品久久| 男女高潮啪啪啪动态图| 欧美黑人欧美精品刺激| 中文字幕av电影在线播放| 日韩熟女老妇一区二区性免费视频| 啦啦啦在线免费观看视频4| 美女高潮到喷水免费观看| 国产成人免费无遮挡视频| 色94色欧美一区二区| netflix在线观看网站| 亚洲九九香蕉| 国产精品久久久久久精品电影小说| 欧美精品人与动牲交sv欧美| 亚洲成人免费电影在线观看| 最黄视频免费看| 黑人巨大精品欧美一区二区蜜桃| 女人精品久久久久毛片| 国产精品香港三级国产av潘金莲| 中文字幕最新亚洲高清| 国产欧美日韩精品亚洲av| 日日摸夜夜添夜夜添小说| videosex国产| 99国产精品一区二区三区| 人成视频在线观看免费观看| 国产精品国产三级国产专区5o| 成人手机av| 亚洲精品中文字幕在线视频| 国产精品秋霞免费鲁丝片| 91成人精品电影| 一本—道久久a久久精品蜜桃钙片| 国产又爽黄色视频| 高清av免费在线| 他把我摸到了高潮在线观看 | 不卡一级毛片| 国产精品秋霞免费鲁丝片| 国产野战对白在线观看| 日韩中文字幕视频在线看片| 久久毛片免费看一区二区三区| 黑人欧美特级aaaaaa片| 国产在线免费精品| 又黄又粗又硬又大视频| 国产精品 国内视频| 亚洲精品成人av观看孕妇| 国产色视频综合| 建设人人有责人人尽责人人享有的| 亚洲熟女精品中文字幕| 97在线人人人人妻| 亚洲国产中文字幕在线视频| 国产伦理片在线播放av一区| 婷婷丁香在线五月| 丁香六月天网| 久久久精品国产亚洲av高清涩受| 每晚都被弄得嗷嗷叫到高潮| 一区二区三区精品91| 成年人午夜在线观看视频| 日韩视频一区二区在线观看| 丁香六月欧美| 国产一区二区三区综合在线观看| 亚洲国产精品一区三区| 久久精品国产亚洲av香蕉五月 | 欧美老熟妇乱子伦牲交| 国产精品 欧美亚洲| av在线老鸭窝| 两人在一起打扑克的视频| 12—13女人毛片做爰片一| 欧美亚洲 丝袜 人妻 在线| 极品少妇高潮喷水抽搐| 在线观看免费午夜福利视频| 国产一级毛片在线| 欧美成狂野欧美在线观看| 又紧又爽又黄一区二区| 母亲3免费完整高清在线观看| 无限看片的www在线观看| 午夜福利免费观看在线| 中文字幕精品免费在线观看视频| 亚洲激情五月婷婷啪啪| 亚洲国产欧美日韩在线播放| 国产区一区二久久| 另类亚洲欧美激情| 日日摸夜夜添夜夜添小说| 日韩欧美免费精品| 一级a爱视频在线免费观看| 久久九九热精品免费| 丝瓜视频免费看黄片| 777米奇影视久久| 91麻豆精品激情在线观看国产 | 午夜福利在线免费观看网站| 女性被躁到高潮视频| 18在线观看网站| 在线亚洲精品国产二区图片欧美| 狂野欧美激情性xxxx| 国产精品久久久人人做人人爽| 日本av手机在线免费观看| 午夜福利免费观看在线| 丝袜脚勾引网站| 国产av又大| 丁香六月天网| 国产高清国产精品国产三级| 国产免费现黄频在线看| 男人爽女人下面视频在线观看| 国产黄频视频在线观看| 97在线人人人人妻| 欧美少妇被猛烈插入视频| 久久久水蜜桃国产精品网| 国产成+人综合+亚洲专区| 视频在线观看一区二区三区| 亚洲精品国产av蜜桃| 久久久久国产一级毛片高清牌| 久久天堂一区二区三区四区| 亚洲中文日韩欧美视频| 母亲3免费完整高清在线观看| 国产成人欧美| 大码成人一级视频| 99国产精品免费福利视频| 咕卡用的链子| 亚洲精品日韩在线中文字幕| 18禁观看日本| 美女扒开内裤让男人捅视频| 在线天堂中文资源库| 99国产精品一区二区三区| 大香蕉久久成人网| 亚洲少妇的诱惑av| 久久ye,这里只有精品| 色94色欧美一区二区| 下体分泌物呈黄色| 免费观看a级毛片全部| 欧美精品高潮呻吟av久久| 国产一区二区 视频在线| 大陆偷拍与自拍| 黄色视频在线播放观看不卡| 操出白浆在线播放| av欧美777| 国精品久久久久久国模美| 在线看a的网站| 国产成人欧美| 色综合欧美亚洲国产小说| 免费在线观看完整版高清| 久久精品国产综合久久久| 一级,二级,三级黄色视频| 成年av动漫网址| 午夜成年电影在线免费观看| 欧美日韩中文字幕国产精品一区二区三区 | 这个男人来自地球电影免费观看| 成人国产一区最新在线观看| 午夜久久久在线观看| 国产三级黄色录像| 欧美精品亚洲一区二区| 国产成人一区二区三区免费视频网站| 精品人妻在线不人妻| 中文字幕高清在线视频| 中国美女看黄片| 亚洲精品一区蜜桃| av天堂久久9| 亚洲九九香蕉| 久久久精品区二区三区| 少妇的丰满在线观看| 高清视频免费观看一区二区| av不卡在线播放| 国产精品成人在线| 搡老岳熟女国产| 天堂8中文在线网| 免费观看av网站的网址| 老汉色∧v一级毛片| 色综合欧美亚洲国产小说| 黄色视频不卡| 老司机在亚洲福利影院| 久久久精品国产亚洲av高清涩受| 国产精品国产av在线观看| 欧美日韩国产mv在线观看视频| 高清黄色对白视频在线免费看| 午夜视频精品福利| 国产亚洲午夜精品一区二区久久| 中文字幕色久视频| 97人妻天天添夜夜摸| 国产极品粉嫩免费观看在线| 久久精品国产亚洲av香蕉五月 | 成人国产av品久久久| 亚洲人成77777在线视频| 久久国产精品影院| av片东京热男人的天堂| 久久av网站| 热99国产精品久久久久久7| 欧美人与性动交α欧美精品济南到| 国产真人三级小视频在线观看| 免费在线观看日本一区| 国产精品久久久久久人妻精品电影 | 亚洲全国av大片| 高清在线国产一区| 欧美日韩亚洲综合一区二区三区_| 在线观看www视频免费| 欧美黄色淫秽网站| 一区福利在线观看| 我的亚洲天堂| 免费观看人在逋| 久久久久久久大尺度免费视频| 欧美日韩亚洲国产一区二区在线观看 | 午夜福利视频精品| 这个男人来自地球电影免费观看| 无遮挡黄片免费观看| 日日夜夜操网爽| 视频在线观看一区二区三区| tube8黄色片| 高潮久久久久久久久久久不卡| 69av精品久久久久久 | 国产男女超爽视频在线观看| 激情视频va一区二区三区| 亚洲国产欧美在线一区| 国产欧美亚洲国产| 久久久久国产精品人妻一区二区| 欧美黄色淫秽网站| 欧美激情极品国产一区二区三区| 亚洲五月色婷婷综合| 日韩中文字幕视频在线看片|