• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    An Optimal Text Watermarking Method for Sensitive Detecting of Illegal Tampering Attacks

    2022-03-14 09:25:50AnwerMustafaHilalFahdAlWesabiMohammedAlamgeerManarAhmedHamzaMohammadMahzariandMuradAlmekhlafi
    Computers Materials&Continua 2022年3期

    Anwer Mustafa Hilal,Fahd N.Al-Wesabi,Mohammed Alamgeer,Manar Ahmed Hamza,Mohammad Mahzari and Murad A.Almekhlafi

    1Department of Computer and Self Development,Preparatory Year Deanship,Prince Sattam Bin Abdulaziz University,AlKharj,Saudi Arabia

    2Department of Computer Science,King Khalid University,Muhayel Aseer,Kingdom of Saudi Arabia

    3Faculty of Computer and IT,Sana’a University,Sana’a,Yemen

    4Department of Information Systems,King Khalid University,Muhayel Aseer,Kingdom of Saudi Arabia

    5Department of English,College of Science&Humanities,Prince Sattam Bin Abdulaziz University,AlKharj,Saudi Arabia

    6Faculty of Engineering,Department of Electrical Engineering,Communication Engineering,Sana’a University,Yemen

    Abstract: Due to the rapid increase in the exchange of text information via internet networks,the security and authenticity of digital content have become a major research issue.The main challenges faced by researchers are how to hide the information within the text to use it later for authentication and attacks tampering detection without effects on the meaning and size of the given digital text.In this paper,an efficient text-based watermarking method has been proposed for detecting the illegaltampering attacks on the Arabic text transmitted onlinevia an Internet network.Towards this purpose,the accuracy of tampering detection and watermark robustness has been improved of the proposed method as compared with the existing approaches.In the proposed method,both embedding and extracting of the watermark are logically implemented,which causes no change in the digitaltext.This is achieved by using the third level and alphanumeric strategy of the Markov model as a text analysis technique for analyzing the Arabic contents to obtain its features which are considered as the digital watermark.This digital watermark will be used later to detecting any tampering of illegal attack on the received Arabic text.An extensive set of experiments using four data sets of varying lengths proves the effectiveness of our approach in terms of detection accuracy, robustness,and effectiveness under multiple random locations of the common tampering attacks.

    Keywords: Text analysis; text-watermarking; tampering detection; text authentication

    1 Introduction

    Text authentication and tampering detection of the digital text in various languages and applications have gained great importance because the transfer of digital contents via the internet through various applications such as eCommerce, eBanking, eLearning and other internet applications, and communication technologies are growing rapidly.Most of these digital texts are very sensitive to changes in terms of contents, structure, syntax, and semantic.Malicious attackers may temper these digital contents during the transfer process, which will result to wrong decisions [1].Extensive research work to develop algorithms and techniques for accomplishing information security such as content authentication, integrity verification, tampering detection,owner identification, access control, and copyright protection are in progress.Steganography and digital watermarking are the main techniques used to solve these problems in information security.In digital watermarking, information such as text, binary image, video, and audio is embedded as a watermark key in those digital contents [2].

    For information security, many algorithms and techniques are available such as the authentication of content, verification of integrity, detection of tampering, identification of owners,access control, and copyright protection.To overcome these issues, steganography and automated methods of watermarking are commonly used [3].A technique of digital watermarking (DWM)can be inserted into digital material through various details such as text, binary pictures, audio,and video.A fine-grained text watermarking procedure is proposed based on replacing the white spaces and Latin symbols with homoglyph characters [4].

    Several conventional methods and solutions for text watermarking were proposed [5,6] and categorized into different classifications such as linguistic, structure and image-based, and formatbased binary images [7].To insert the watermark information into the document, most of these solutions require certain upgrades or improvements to the original text in digital format material.Zero-watermarking without any alteration to the original digital material to embed the watermark information is a new technique with smart algorithms that can be used.Also, this technique can be used to generate data for a watermark in the contents of a given digital context [1,7-9].

    Restricted research has centered on the appropriate solutions to verify the credibility of critical digital media online [10-12].The verification of digital text and the identification of fraud in research earned great attention.In addition, text watermarking studies have concentrated on copyright protection in the last decade, but less interest and attention has been paid to integrity verification, identification of tampering and authentication of content due to the existence of text content based on the natural language [13].

    Proposing the most appropriate approaches and strategies for dissimilar formats and materials,especially in Arabic and English languages, is the most common challenge in this area [14,15].Therefore, authentication of content, verification of honesty, and detection of tampering of the sensitive text constitute a big problem in various applications and require necessary solutions.

    Some instances of such sensitive digital text content are Arabic interactive Holy Qur’an,eChecks, tests, and marks.Different Arabic alphabet characteristics such as diacritics lengthened letters and extra symbols of Arabic make it simple to modify the key meaning of the text material by making basic changes such as modifying diacritic arrangements [16].The most popular soft computation and natural language processing (NLP) technique that supported the analysis of the text is HMM.

    We suggest an intelligent hybrid approach named “an efficient text-watermarking method based on the third level and alphanumeric strategy of Markov model (ETWMM)” for Arabic text authentication and tampering detection.Towards this purpose, text-watermarking and Markov model techniques have been integrated.In this method, the third level of the alphanumeric strategy of the Markov model was used for text analysis and extract the features of the given Arabic text to use it as a watermark key.Without any alterations or effects on the original text size, the watermark created is logically integrated into the original Arabic history.The embedded watermark would later be used to identify all manipulation on Arabic text obtained after transmission of text through the Internet and whether it is authentic or not.

    The primary objective of the ETWMM method is to provide the high accuracy of tampering detection of illegal attack on Arabic text which is transmitted via the Internet network.

    The remainder of the article is structured as follows: In Section 2, we explain the existing works done so far.In Section 3, we discussed the suggested method (ETWMM).The simulation and implementation are provided in Section 4, results discussion is provided in Section 5, and finally, we conclude the article in Section 6.

    2 Related Work

    According to the processing domain of NLP and text watermarking, these existing methods and solutions of text watermarking reviewed in this paper are classified into linguistical, structural,and zero-watermark methods [1,7,13].

    Natural language is the foundation of approaches to linguistic text watermarking.The mechanism of those methods embedding the watermark is based on changes applied to the semantic and syntactic essence of plain text [1].

    To enhance the capability and imperceptibility of Arabic text, a method of text watermarking has been suggested based on the location of the accessible words [17].In this method, any wordspace is used to mask the Boolean bit 0 or 1 that physically modifies the original text.

    A text steganography technique was proposed to hide information in the Arabic language [18].The step of this approach considers Harakat’s existence in Arabic diacritics such as Kasra, Fatha,and Damma as well as reverses Fatha to cover the message.

    A Kashida-marks invisible method of watermarking [19], based on the features of frequent recurrence of document security and authentication characters, was proposed.The method is based on a predetermined watermark key with a Kashida placed for a bit 1 and a bit omitted.

    The method of steganography of the text has been proposed based on Kashida extensions on the characters ‘moon’and ‘sun’to write digital contents of the Arabic language [20].In addition,the Kashida method characters are seen alongside characters from Arabic to decide which hidden secret bits are kept by specific characters.In this form, four instances are included in the kashida characters: moon characters representing ‘00’; sun characters representing ‘01’; sun characters representing ‘10’; and moon characters representing ‘11’.

    A text steganographic approach [21] based on multilingual Unicode characters has been suggested to cover details in English scripts for the use of the English Unicode alphabet in other languages.Thirteen letters of the English alphabet have been chosen for this approach.It is important to embed dual bits in a timeframe that used ASCII code for embedding 00.However, multilingual ones were used by Unicode to embed between 01, and 10, as well as 11.The algorithm of text watermarking is used to secure textual contents from malicious attacks according to Unicode extended characters [22].The algorithm requires three main steps, the development, incorporation, and extraction of watermarks.The addition of watermarks is focused on the development of predefined coding tables while scrambling strategies are often used in generating and removing the watermarking key is safe.

    The substitution attack method focused on preserving the position of words in the text document has been proposed [23].This method depends on manipulating word transitions in the text document.Authentication of Chinese text documents based on the combination of the properties of sentences and text-based watermarking approaches have been suggested [24,25].The proposed method is presented as follows: a text of the Chinese language is split into a group of sentences, and for each word, the code of a semantic has been obtained.The distribution of semantic codes influences sentence entropy.

    A zero-watermarking method has been proposed to preserve the privacy of a person who relies on the Hurst exponent and the nullity of the frames [26].For watermark embedding, the two steps are determined to evaluate the unvoiced frames.The process of the proposed approach bases on integrating an individual’s identity without notifying any distortion in the signals of medical expression.

    A zero-watermarking method was proposed to resolve the security issues of text documents of the English language, such as verification of content and copyright protection [27].A zerowatermarking approach has been suggested based on the authentication Markov model of the content of English text [28,29].In this approach, to extract the safe watermark information, the probability characteristics of the English text are involved and stored to confirm the validity of the attacked text document.The approach provides security against popular text attacks with a watermark distortion rate if, for all known attacks, it is greater than one.For the defense of English text by copyright, based on the present rate of ASCII non-vowel letters and terms, the conventional watermark approach [30] has been suggested.

    According to the suggested methods, content authentication and tampering detection of digital English contents that have been ignored by researchers in the literature for many reasons.English text is natural language-dependent.On the other hand, hiding the watermark information is complicated since there is no location to hide it within the text as pixels in the case of an image, waves in audio, and frames in a video.

    3 The Proposed Approach

    In this paper, the authors propose an efficient method called ETWMM.Hence, the third level of alphanumeric strategy consisting of a model performing as a soft computing tool and NLP in cooperation between the zero-watermarking technique and the Markov model.The third level of alphanumeric strategy has been selected in our proposed ETWMM method to improve the accuracy of random detection of tampering attacks and reduced the gap of interrelationships between the given numbers, special symbols and Arabic alphabets as compared with other levels.Markov model is used in our proposed ETWMM method for text analysis to extract the features of the given Arabic text with getting rid of external watermark information and without any modifications of the original text to embed the watermark key.Unlike the previous work, the proposed approach ETWMM can effectively detect any tampering whenever tampering volume was very low or very high.In addition, ETWMM can be improved to determine the place of tempering occurrence.This feature can be considered an advantage over Hash function method.

    The following subsections explain in detail two main processes that should be performed in ETWMM.Which are watermark generation and embedding process, and watermark extraction and detection process.

    3.1 Watermark Generation and Embedding Process

    The three sub-algorithms included in this process are pre-processing algorithm, text feature extraction and watermark generation algorithm, and watermark embedding algorithm as illustrated in Fig.1.

    Figure 1: Text-watermark generation and embedding processes of ETWMM

    3.1.1 Pre-Processing Algorithm

    Preprocessing of the original Arabic text is one of the key steps in both the watermark generation and extraction processes to remove extra spaces and new-lines, and it will directly influence the tampering detection accuracy and watermark robustness.The original Arabic text(OATD) is required as input for Pre-processing process.

    3.1.2 Text Feature Extraction and Watermark Generation Algorithm

    This algorithm includes two sub-processes are building the Markov matrix, and text features extraction and watermark generation processes.

    — Building the Markov matrix is the starting point of Arabic text analysis and watermark generation process using the Markov model.A Markov matrix that represents the possible states and transitions available in the given text is constructed without reputations.In this approach, each triple alphanumeric within a given Arabic text represents a present state,and each unique alphanumeric a transition in the Markov matrix.During the building process of the Markov matrix, the proposed algorithm initializes all transition values by zero to use these cells later to keep track of the number of times that the ithtriple alphanumeric is followed by the jthalphanumeric within the given Arabic text document.

    Pre-processing and building Markov matrix algorithm executes as presented below in Algorithm 1.

    ?

    where OATD is an original Arabic text, OATDPis a pre-processed Arabic text, L3_mm refers to states and transitions matrix with zeros values for all cells, ps: refers to the current state, ns: refers to next state.

    According to the above, a method is presented to construct a two-dimensional matrix of Markov states and transitions named L3_mm[i][j], which represents the core part of the Markov model for Arabic text analysis.The length of L3_mm[i][j] a1_mm[i][j] matrix of ETWMM is fixed in which the number of states and transitions equal to the total of alphabetic Arabic characters,numbers from 0 to 9, and special symbols and Harakat (Fatha, Kasra, Dommah,...etc).

    — Text features extraction and watermark generation process: after the Markov matrix was constructed, the Arabic text analysis process should be performed to extract features of the given Arabic text and generate watermark patterns.In this algorithm, the number of appearances of possible next states transitions for each current state of a single alphanumeric will be calculated and constructed as transition probabilities by Eq.(1) below.

    where n is number of states, i: is ithcurrent state of a single alphanumeric, j: is jthnext state transition.

    The following example of the Arabic text sample describes the mechanism of the transition process of the present state to other next states.

    When using the third level order of alphanumeric mechanism of Hidden Markov model, every unique triple of Arabic alphanumeric is a present state.Text analysis is processed as the text is read to obtain the interrelationship between the present state and the next states.Fig.2.below illustrates the available transitions and analysis results of the above sample of Arabic text.

    As a result of analysing the given Arabic sentence based on third level order and alphanumeric mechanism of the Markov model, we represent 47 unique present states and their 61 possible transitions as illustrated in Fig.3.

    As illustrated in Fig.3 above, we assumeis a present state of three continuous alphanumerics, and the available next transition isWe observe that one transition only available in the given Arabic text sample.

    Text analysis and watermark generation algorithm are presented formally and executed as illustrated in Algorithm 2.

    ?

    where pa: previous triple of alphanumeric, ca: current triple of alphanumeric.

    The algorithm of text feature extraction and watermark generation based on the third level order of the alphanumeric mechanism of the Markov model proceeds as illustrated in Fig.4.

    Figure 4: Text feature extraction and watermark generation of the given Arabic text using ETWMM

    3.1.3 Watermark Embedding Algorithm

    In our proposed ETWMM method, the watermark key will be generated as a result of text analysis and text feature extraction process by finding all non-zero values in the Markov matrix.All of these non-zero values will be concatenated sequentially to generate the original watermark pattern L3_WMO, as given in Eq.(2) and illustrated in Fig.5.

    Figure 5: Sample of the generated watermark patterns L3_WMO in a decimal form using ETWMM

    The algorithm of watermark embedding based on the third level of alphanumeric strategy of the Markov model is presented formally and executed as illustrated below in Algorithm 3.

    ?

    where L3_WMOis the original watermark pattern.

    3.2 Watermark Extraction and Detection Process

    Before the detection of pre-proceed attacked Arabic text (AATDP), attacked watermark patterns (L3_EWMA) should be generated, and matching rate of patterns and watermark distortion should be calculated by ETWMM for detecting any tampering with the authentication of the given Arabic text.

    Two core algorithms are involved in this process, which are watermark extraction and watermark detection.However, L3_EWMAwill be extracted from the received (AATDP) and matched with L3_WMOby detection algorithm.

    AATDPshould be provided as the input for the proposed watermark extraction algorithm.The same process of watermark generation algorithm should have been performed to obtain the watermark pattern for (AATDP) as illustrated in Fig.6.

    3.2.1 Watermark Extraction Algorithm

    AATDPis the main input required to run this algorithm.However, the output of this algorithm is L3_EWMA.The watermark extraction algorithm is presented formally as illustrated in Algorithm 4.

    Algorithm 4: Watermark extraction algorithm of ETWMMimages/BZ_1362_266_2222_1016_2731.png

    where L3_EWMAis the attacked watermark.

    Figure 6: Text-watermark detection process of ETWMM

    3.2.2 Watermark Detection Algorithm

    L3_EWMAand L3_WMOare the main inputs required to run this algorithm, while the output of this algorithm is the notification Arabic text document, which can be authentic or tampered.The detection process of the extracted watermark is achieved in two main steps:

    ? Primary matching is achieved for L3_WMOand L3_EWMA.If these two patterns appear identical, then an alert will appear as “Arabic text is an authentic and no tampering occurred.” Otherwise, the notification will be “Arabic text is tampered,” and then it continues to the next step.

    ? Secondary matching is achieved by matching the transition of each state in a generated pattern.This means that L3_EWMAof each state is compared with the equivalent transition of L3_WMOas given by Eqs.(3) and (4) below

    where L3_PMRTrepresents tampering detection accuracy rate value in transition level.

    where L3_PMRSis value of tampering detection accuracy rate in state level.

    After the pattern matching rate of every state has been produced, we have to find the weight of every state stored in the Markov matrix as presented in Eq.(5) below.

    where L3_sw refers to total tampering detection accuracy and watermark robustness.

    The final L3_PMR of AATDPand OATDPare calculated by Eq.(6).

    The rate of watermark distortion represents the rate of tampering attacks occurring on the contents of the attacked Arabic context, which is denoted by L3_WDR and calculated by Eq.(7).

    The steps involved in the watermark detection algorithm are illustrated in algorithm Algorithm 5.

    ?

    where L3_SW refers to the weight value of states correctly matched, L3_WDR: refers to the value of watermark distortion rate (0<L3_WDRS<= 100).

    Figure 7: Sample of watermark extraction and detection process using ETWMM

    The results of the watermark extraction and detection process are illustrated in Fig.7.

    4 Implementation and Simulation

    To evaluate the tampering detection accuracy and robustness of our ETWMM method,several scenarios of simulation and experiments are performed.This section depicts an implementation, simulation, and experimental environment, experiment parameters, experimental scenarios of standard Arabic datasets, and results discussion.

    4.1 Simulation and Implementation Environment

    The self-developed program has been developed to test and evaluate the tampering detection accuracy and robustness of ETWMM.The implementation environment of ETWMM is: CPU:Intel Core i7-4650U/2.3 GHz, RAM: 8.0 GB, Windows 10-64 bit, PHP programming language with VS Code IDE.

    4.2 ETWMM Simulation and Experiment

    This subsection presents the tampering detection accuracy and robustness evaluation of ETWMM.Many simulations and experiment scenarios are performed as shown in Tab.1, for all forms of attacks and their volumes.

    Table 1: Detection accuracy and robustness evaluation of ETWMM under all attacks with various volumes

    Figure 8: Detection accuracy and robustness evaluation under all attacks with various volumes

    In case of attack volume effects against all dataset sizes, results shown in Tab.1 above and Fig.8 below, high effect detected under reorder and deletion attacks in case of small, mid, and high attack volumes.Results shows also reorder attacks more sensitive than deletion attacks in case of medium attack volumes, however, deletion attacks more sensitive than reorder attack in cases of low and high attack volumes.This mean ETWMM gives the best detection accuracy at all under insertion attack in all scenarios of attack volumes.

    5 Comparison and Result Discussion

    The detection accuracy and robustness results were critically analyzed.This subsection displays an effect study and a comparison between ETWMM and baseline approaches named Hybrid of Natural Language Processing and Zero-Watermarking Approach (HNLPZWA) [5] and Zero-Watermarking Approach based on Fourth level order of Arabic Word Mechanism of Markov Model (ZWAFWMMM) [6].It also contains a discussion of their effect under the major factors,namely dataset size, attack types and volumes.

    5.1 Attacks Type-Based Comparison

    Tab.2 shows a comparison of the different attack’s type of effect on detection accuracy and robustness of ETWMM, ZWAFWMMM, and HNLPZWA approaches against all dataset sizes and all scenarios of attack volumes.

    Table 2: Comparison based on attacks type effect

    Tab.2 and Fig.9 show how the detection accuracy and robustness of ETWMM, HNLPZWA,and ZWAFWMMM approaches is influenced by analyzing the attack types.In all cases of deletion and reorder attack, ETWMM approach outperforms FAWMW and HNLPZWA in terms of general detection accuracy and robustness in all scenarios of all attacks.HNLPZWA and ZWAFWMMM give the best detection accuracy and robustness rate in case of insertion attack.This means that ETWMM approach is strongly recommended and applicable for content authentication and tampering detection of Arabic text transmitted via the internet especially under deletion and reorder attacks.

    Figure 9: A compression based on attacks type effect of our ETWMM method and baseline approaches

    5.2 Attacks Volume-Based Comparison

    Tab.3 provides a comparison of the different attack volumes’effect on detection accuracy and robustness against all dataset sizes and all scenarios of attack volumes.The comparison is performed using ETWMM, ZWAFWMMM, and HNLPZWA approaches.

    Table 3: Comparison based on attacks volume effect

    Tab.3 and Fig.10 show how the detection accuracy and robustness of ETWMM,HNLPZWA, and ZWAFWMMM approaches is influenced by analyzing the attack volumes.In Fig.10, it can be seen that if the attack volume increases, the detection accuracy and robustness decrease.It is seen also, ETWMM approach outperforms both HNLPZWA and ZWAFWMMM approaches in terms of general detection accuracy and robustness in all scenarios of low, mid,and high volumes of all attacks.This means that ETWMM approach is strongly recommended and applicable for tampering detection of Arabic text under all volumes of all attacks.

    Figure 10: A compression based on attacks volume effect of our ETWMM method and baseline approaches

    5.3 Dataset Size-Based Comparison

    This section presents a comparison of the various dataset size effect on detection accuracy and robustness against all forms of attacks within their multiple volumes as shown in Tab.4.

    Fig.11 shows how the detection accuracy and robustness of ETWMM, HNLPZWA, and ZWAFWMMM approaches is influenced by analyzing the dataset size.In Fig.11, it can be seen that in all cases of baseline HNLPZWA and ZWAFWMMM approaches, the detection accuracy and robustness increased with decreasing dataset size and decreased with increasing dataset size.However, in the proposed approach, we can say the detection accuracy and robustness are increased with increasing document size.On the other hand, results show that ETWMM approach outperforms both HNLPZWA and ZWAFWMMM approaches in terms of general detection accuracy and robustness under all scenarios of dataset sizes.This means that the proposed ETWMM approach is strongly recommended for tampering detection with low, mid,and large document size.

    Table 4: Comparison based on dataset size effect

    Figure 11: A compression based on dataset effect of our ETWMM method and baseline approaches

    6 Conclusion

    In this paper, ETWMM method has been proposed for detecting illegal tampering attacks on the Arabic text by combining text-watermarking and natural language processing techniques.A text analysis process should be performed to extract the features of the given Arabic text and generate a watermark key.The generated watermark will be embedded logically in the original Arabic context without modifications and effect on the size of the original text.The embedded watermark will be used later after transmission of text via the Internet to detect any tampering that occurred on received Arabic text and it is authentic or not.ETWMM approach has implemented using PHP zero program developed in VS code IDE and experiments using various standard datasets under different volumes of insertion, deletion, and reorder attacks.We have compared ETWMM with HNLPZWA and ZWAFWMMM.Comparison results show that ETWMM outperforms HNLPZWA and ZWAFWMMM in terms of robustness and accuracy of tampering detection because using the third-level order and alphanumeric mechanism of HMM leads to better robustness and accuracy of tampering detection in which the third level of interrelationships between alphanumeric is stronger than other levels of alphanumeric or words mechanisms of HMM.Also, results show that ETWMM is applicable to all Arabic alphabetic letters, special characters, numbers, and spaces.Although ETWMM is an efficient approach, and it is designed only for all scenarios of deletion and reorder attacks.For future work, we will consider detection accuracy under all scenarios of insertion attacks.Moreover, we also intend to evaluate the performance using other information security and artificial intelligence techniques.

    Funding Statement:The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number (RGP.1/53/42), Received by Mohammed Alamgeer.www.kku.edu.sa

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    亚洲国产欧美一区二区综合| 亚洲一码二码三码区别大吗| 后天国语完整版免费观看| 成人手机av| 日本vs欧美在线观看视频| 国产精品一区二区在线不卡| 免费在线观看视频国产中文字幕亚洲| 亚洲中文字幕日韩| 国产真人三级小视频在线观看| 亚洲精品美女久久久久99蜜臀| 最近最新中文字幕大全免费视频| av有码第一页| 99在线视频只有这里精品首页| 中文字幕色久视频| 久久精品国产综合久久久| 亚洲国产高清在线一区二区三 | 少妇的丰满在线观看| 精品一区二区三区四区五区乱码| 国产精品一区二区在线不卡| 亚洲最大成人中文| 国产99白浆流出| 亚洲精品一区av在线观看| 日韩欧美三级三区| 色播亚洲综合网| 很黄的视频免费| 久久午夜综合久久蜜桃| 国产精品1区2区在线观看.| 国产视频一区二区在线看| 国产野战对白在线观看| 黄片小视频在线播放| 精品免费久久久久久久清纯| 操美女的视频在线观看| 中文字幕av电影在线播放| 亚洲欧美日韩另类电影网站| 日韩精品免费视频一区二区三区| 狠狠狠狠99中文字幕| 午夜精品久久久久久毛片777| 国产激情久久老熟女| netflix在线观看网站| 亚洲中文字幕一区二区三区有码在线看 | 99久久99久久久精品蜜桃| 亚洲中文字幕日韩| 亚洲自拍偷在线| 国产精品九九99| 久久中文字幕人妻熟女| 一级作爱视频免费观看| 电影成人av| 日本撒尿小便嘘嘘汇集6| 亚洲在线自拍视频| 国产成人精品久久二区二区免费| 男人舔女人的私密视频| 亚洲精品粉嫩美女一区| 中文字幕人妻熟女乱码| 看免费av毛片| 9热在线视频观看99| 国产av在哪里看| 国产亚洲欧美在线一区二区| 精品熟女少妇八av免费久了| 国产精品电影一区二区三区| 日韩中文字幕欧美一区二区| 精品乱码久久久久久99久播| 91av网站免费观看| 老司机午夜福利在线观看视频| 一级毛片高清免费大全| 久久婷婷成人综合色麻豆| 黄色女人牲交| 天堂√8在线中文| 美女国产高潮福利片在线看| 神马国产精品三级电影在线观看 | 免费看a级黄色片| 午夜福利免费观看在线| 成年女人毛片免费观看观看9| 欧美乱色亚洲激情| 国产成人系列免费观看| 狠狠狠狠99中文字幕| 校园春色视频在线观看| 欧美成人午夜精品| 啦啦啦 在线观看视频| 精品熟女少妇八av免费久了| 中文字幕精品免费在线观看视频| 日本 av在线| 亚洲五月天丁香| 国内久久婷婷六月综合欲色啪| av免费在线观看网站| av视频免费观看在线观看| 午夜福利在线观看吧| 国产人伦9x9x在线观看| 18禁观看日本| 国产亚洲精品久久久久5区| 好男人在线观看高清免费视频 | 亚洲午夜理论影院| 精品不卡国产一区二区三区| 亚洲av成人av| 日本撒尿小便嘘嘘汇集6| 亚洲专区字幕在线| 美女大奶头视频| 日日干狠狠操夜夜爽| 国产亚洲欧美精品永久| 日韩中文字幕欧美一区二区| 精品久久久久久久毛片微露脸| 97超级碰碰碰精品色视频在线观看| 一本综合久久免费| 欧美午夜高清在线| 女警被强在线播放| 午夜日韩欧美国产| 亚洲欧美日韩无卡精品| 久久天躁狠狠躁夜夜2o2o| 亚洲精品国产色婷婷电影| 夜夜看夜夜爽夜夜摸| 天堂动漫精品| 18禁黄网站禁片午夜丰满| 亚洲国产日韩欧美精品在线观看 | 香蕉丝袜av| 91麻豆av在线| 一级黄色大片毛片| 国产精品九九99| 97超级碰碰碰精品色视频在线观看| 两性午夜刺激爽爽歪歪视频在线观看 | 看黄色毛片网站| 成人免费观看视频高清| 午夜福利成人在线免费观看| 国产成人欧美| 欧美日韩乱码在线| 两个人看的免费小视频| 国产精品影院久久| 日本 欧美在线| 9色porny在线观看| 此物有八面人人有两片| 母亲3免费完整高清在线观看| 亚洲第一电影网av| 999久久久国产精品视频| 久久中文字幕人妻熟女| 最新美女视频免费是黄的| 亚洲精品中文字幕在线视频| 黄频高清免费视频| svipshipincom国产片| 亚洲熟女毛片儿| 久久久水蜜桃国产精品网| 无人区码免费观看不卡| 一二三四在线观看免费中文在| 午夜福利,免费看| 精品熟女少妇八av免费久了| 国产成+人综合+亚洲专区| av在线播放免费不卡| 日韩高清综合在线| 在线观看舔阴道视频| 丁香欧美五月| 桃红色精品国产亚洲av| 搞女人的毛片| 十八禁网站免费在线| 热99re8久久精品国产| 亚洲自偷自拍图片 自拍| 亚洲片人在线观看| 国产成人av教育| 一本大道久久a久久精品| 国产主播在线观看一区二区| 国产精品秋霞免费鲁丝片| 亚洲一区二区三区不卡视频| 国产私拍福利视频在线观看| 亚洲免费av在线视频| 欧美日韩精品网址| videosex国产| 正在播放国产对白刺激| 91字幕亚洲| 亚洲av第一区精品v没综合| 高清在线国产一区| 精品人妻1区二区| 色播亚洲综合网| 中文字幕久久专区| 中文字幕人成人乱码亚洲影| 久久香蕉激情| 欧美精品啪啪一区二区三区| 人人妻人人爽人人添夜夜欢视频| 亚洲第一欧美日韩一区二区三区| 久久香蕉精品热| 国产三级黄色录像| 国内久久婷婷六月综合欲色啪| 一区二区三区高清视频在线| 在线观看免费午夜福利视频| 国产精品免费视频内射| 久久久国产精品麻豆| 精品午夜福利视频在线观看一区| 12—13女人毛片做爰片一| 18禁美女被吸乳视频| 两个人看的免费小视频| 亚洲国产看品久久| 国产成人一区二区三区免费视频网站| 精品不卡国产一区二区三区| 搡老妇女老女人老熟妇| 黄色a级毛片大全视频| 女人高潮潮喷娇喘18禁视频| 成人手机av| 国产伦一二天堂av在线观看| 国产一区二区三区综合在线观看| 老司机午夜十八禁免费视频| 亚洲中文字幕日韩| 成在线人永久免费视频| www.精华液| 国产欧美日韩一区二区三区在线| 色精品久久人妻99蜜桃| 国产伦一二天堂av在线观看| 国产午夜精品久久久久久| 在线av久久热| 一区二区三区激情视频| 高清黄色对白视频在线免费看| 人人澡人人妻人| 涩涩av久久男人的天堂| 国产欧美日韩一区二区精品| 欧美绝顶高潮抽搐喷水| 久久久水蜜桃国产精品网| 婷婷丁香在线五月| 免费在线观看影片大全网站| 亚洲五月天丁香| 丝袜美足系列| 国产精品二区激情视频| 色av中文字幕| 婷婷精品国产亚洲av在线| 满18在线观看网站| 国产亚洲精品综合一区在线观看 | 手机成人av网站| 国产黄a三级三级三级人| 老司机福利观看| 午夜视频精品福利| 久久精品成人免费网站| 99国产精品一区二区三区| 日本精品一区二区三区蜜桃| √禁漫天堂资源中文www| www.自偷自拍.com| 国产色视频综合| av电影中文网址| 欧美黄色片欧美黄色片| 欧美中文综合在线视频| 精品久久久久久,| 成年人黄色毛片网站| 国产免费男女视频| 国产精品一区二区三区四区久久 | 少妇的丰满在线观看| 国产视频一区二区在线看| 欧美激情高清一区二区三区| 真人做人爱边吃奶动态| 岛国视频午夜一区免费看| 亚洲第一欧美日韩一区二区三区| 自线自在国产av| 亚洲精品久久国产高清桃花| 美国免费a级毛片| 欧美黑人欧美精品刺激| 伦理电影免费视频| 无遮挡黄片免费观看| 制服诱惑二区| 侵犯人妻中文字幕一二三四区| 免费高清在线观看日韩| 国产精品电影一区二区三区| 深夜精品福利| 丰满人妻熟妇乱又伦精品不卡| 婷婷精品国产亚洲av在线| 久久性视频一级片| 久久久久国产精品人妻aⅴ院| 欧美激情极品国产一区二区三区| 黑人欧美特级aaaaaa片| 婷婷六月久久综合丁香| 亚洲第一欧美日韩一区二区三区| av中文乱码字幕在线| tocl精华| 国产精品亚洲一级av第二区| 亚洲黑人精品在线| 亚洲午夜理论影院| 久久久久久久午夜电影| 级片在线观看| 国产主播在线观看一区二区| 成熟少妇高潮喷水视频| 99国产极品粉嫩在线观看| 91国产中文字幕| 激情在线观看视频在线高清| 叶爱在线成人免费视频播放| 在线国产一区二区在线| 日本黄色视频三级网站网址| 丝袜在线中文字幕| 亚洲精品粉嫩美女一区| 欧美日韩福利视频一区二区| 亚洲av片天天在线观看| 国产又爽黄色视频| 如日韩欧美国产精品一区二区三区| 亚洲av成人一区二区三| 久热这里只有精品99| 真人一进一出gif抽搐免费| 黄片播放在线免费| 最好的美女福利视频网| 亚洲五月天丁香| 脱女人内裤的视频| 欧美av亚洲av综合av国产av| 51午夜福利影视在线观看| 天堂影院成人在线观看| 一级黄色大片毛片| 久久久久久国产a免费观看| 一边摸一边抽搐一进一小说| 50天的宝宝边吃奶边哭怎么回事| 亚洲av五月六月丁香网| 国产av一区二区精品久久| 久久中文字幕一级| 国产麻豆69| 热re99久久国产66热| 妹子高潮喷水视频| 黄色视频不卡| 欧美人与性动交α欧美精品济南到| 精品国内亚洲2022精品成人| 999久久久精品免费观看国产| 国产精品久久久人人做人人爽| 亚洲国产精品成人综合色| 亚洲成国产人片在线观看| 日韩精品中文字幕看吧| 久久精品国产亚洲av香蕉五月| 这个男人来自地球电影免费观看| 最近最新中文字幕大全电影3 | 午夜a级毛片| 久久久久久亚洲精品国产蜜桃av| 亚洲精品在线观看二区| 国产国语露脸激情在线看| 国产午夜福利久久久久久| av网站免费在线观看视频| 欧美 亚洲 国产 日韩一| 久久久精品欧美日韩精品| 国产精品电影一区二区三区| 国产精品九九99| 夜夜躁狠狠躁天天躁| 他把我摸到了高潮在线观看| 级片在线观看| 欧美激情 高清一区二区三区| 国产精品永久免费网站| 他把我摸到了高潮在线观看| av天堂久久9| 久久亚洲精品不卡| 久久欧美精品欧美久久欧美| 免费人成视频x8x8入口观看| 岛国在线观看网站| 黄频高清免费视频| 国产亚洲精品综合一区在线观看 | 黄片小视频在线播放| 日本在线视频免费播放| 久久天堂一区二区三区四区| 91大片在线观看| 国产主播在线观看一区二区| 日韩欧美在线二视频| 男人舔女人下体高潮全视频| 国产激情久久老熟女| 中文字幕人成人乱码亚洲影| 国产成人啪精品午夜网站| 国产又爽黄色视频| 亚洲男人的天堂狠狠| 日韩 欧美 亚洲 中文字幕| 久久久久久亚洲精品国产蜜桃av| 国产精品久久久av美女十八| 午夜福利成人在线免费观看| 亚洲国产精品sss在线观看| 亚洲人成伊人成综合网2020| 久久婷婷成人综合色麻豆| 香蕉国产在线看| 亚洲成人免费电影在线观看| 国产色视频综合| 亚洲电影在线观看av| 又大又爽又粗| 夜夜看夜夜爽夜夜摸| 午夜免费激情av| 黑人巨大精品欧美一区二区mp4| 中亚洲国语对白在线视频| 手机成人av网站| 国产成人精品无人区| 美国免费a级毛片| 国内毛片毛片毛片毛片毛片| 搞女人的毛片| cao死你这个sao货| 国产精品1区2区在线观看.| a级毛片在线看网站| 成年版毛片免费区| 又大又爽又粗| 亚洲一区二区三区色噜噜| 精品欧美国产一区二区三| 亚洲国产高清在线一区二区三 | 精品无人区乱码1区二区| 韩国精品一区二区三区| 十分钟在线观看高清视频www| 国产男靠女视频免费网站| 老司机午夜十八禁免费视频| 亚洲国产精品sss在线观看| 久久久久国产一级毛片高清牌| 国产又爽黄色视频| 久久伊人香网站| 欧美黑人精品巨大| 亚洲精品国产色婷婷电影| 1024香蕉在线观看| 看免费av毛片| 亚洲人成77777在线视频| 亚洲av片天天在线观看| 性色av乱码一区二区三区2| 欧美绝顶高潮抽搐喷水| 久久久久久久久久久久大奶| 麻豆成人av在线观看| 国产成人影院久久av| 亚洲成人免费电影在线观看| 久久香蕉激情| 日本五十路高清| 操美女的视频在线观看| 日韩 欧美 亚洲 中文字幕| 欧美中文综合在线视频| 黄片小视频在线播放| 精品一区二区三区av网在线观看| www.999成人在线观看| 窝窝影院91人妻| 午夜福利免费观看在线| 亚洲自偷自拍图片 自拍| 亚洲av熟女| 亚洲精品一卡2卡三卡4卡5卡| 色精品久久人妻99蜜桃| 欧美日韩黄片免| 国产熟女午夜一区二区三区| 亚洲伊人色综图| 性欧美人与动物交配| 精品国产一区二区三区四区第35| 国产精品永久免费网站| 亚洲精品美女久久久久99蜜臀| 中文字幕av电影在线播放| 国产精品爽爽va在线观看网站 | 亚洲欧美精品综合一区二区三区| 给我免费播放毛片高清在线观看| 一区二区三区高清视频在线| 操美女的视频在线观看| 男女下面进入的视频免费午夜 | 91精品国产国语对白视频| 久久久国产精品麻豆| 美国免费a级毛片| av视频在线观看入口| 国产精品免费视频内射| 波多野结衣一区麻豆| 欧美+亚洲+日韩+国产| 国产97色在线日韩免费| 久热这里只有精品99| 久久热在线av| 久久久久久国产a免费观看| 女人爽到高潮嗷嗷叫在线视频| 亚洲av第一区精品v没综合| av免费在线观看网站| www.精华液| 日韩欧美一区二区三区在线观看| 久久人人爽av亚洲精品天堂| 欧美日韩中文字幕国产精品一区二区三区 | 亚洲一区中文字幕在线| 久久久久久久久久久久大奶| 身体一侧抽搐| 操美女的视频在线观看| 久久精品aⅴ一区二区三区四区| 亚洲欧洲精品一区二区精品久久久| 亚洲久久久国产精品| 看黄色毛片网站| 一夜夜www| 变态另类成人亚洲欧美熟女 | 亚洲欧美日韩无卡精品| svipshipincom国产片| 男女床上黄色一级片免费看| 9191精品国产免费久久| 亚洲aⅴ乱码一区二区在线播放 | 757午夜福利合集在线观看| 一边摸一边抽搐一进一小说| 日本免费一区二区三区高清不卡 | 国产av一区二区精品久久| 人人澡人人妻人| 国产精品爽爽va在线观看网站 | 999久久久精品免费观看国产| 国产麻豆成人av免费视频| 亚洲自拍偷在线| 欧美国产日韩亚洲一区| 长腿黑丝高跟| 国产成+人综合+亚洲专区| av超薄肉色丝袜交足视频| 身体一侧抽搐| 首页视频小说图片口味搜索| 午夜免费观看网址| 精品高清国产在线一区| 欧美在线一区亚洲| 不卡一级毛片| 国产区一区二久久| 久久天堂一区二区三区四区| 精品高清国产在线一区| 免费搜索国产男女视频| 999精品在线视频| aaaaa片日本免费| 国产一区在线观看成人免费| 自拍欧美九色日韩亚洲蝌蚪91| 少妇被粗大的猛进出69影院| 欧美最黄视频在线播放免费| 91av网站免费观看| 国产精品98久久久久久宅男小说| 欧美日韩一级在线毛片| 欧美在线黄色| 淫妇啪啪啪对白视频| 精品久久久久久久毛片微露脸| 曰老女人黄片| 国产亚洲av嫩草精品影院| 波多野结衣高清无吗| 亚洲男人的天堂狠狠| 亚洲精品美女久久久久99蜜臀| 美国免费a级毛片| 中国美女看黄片| 男人舔女人的私密视频| 亚洲国产中文字幕在线视频| 亚洲熟妇熟女久久| 又黄又粗又硬又大视频| 一级,二级,三级黄色视频| 999精品在线视频| 国产成人欧美在线观看| 88av欧美| 国产免费男女视频| 欧美成狂野欧美在线观看| 亚洲少妇的诱惑av| 国产片内射在线| 亚洲无线在线观看| 亚洲欧美精品综合一区二区三区| 国产熟女xx| 日本 欧美在线| 亚洲全国av大片| 午夜福利成人在线免费观看| 亚洲精品美女久久av网站| 99国产精品一区二区三区| 一级,二级,三级黄色视频| 亚洲专区中文字幕在线| √禁漫天堂资源中文www| 欧美激情极品国产一区二区三区| 欧美不卡视频在线免费观看 | 国产成人精品无人区| 丝袜在线中文字幕| 精品日产1卡2卡| АⅤ资源中文在线天堂| 亚洲最大成人中文| 亚洲一卡2卡3卡4卡5卡精品中文| 亚洲第一av免费看| 欧美最黄视频在线播放免费| cao死你这个sao货| 精品电影一区二区在线| 国产精品 欧美亚洲| 19禁男女啪啪无遮挡网站| 欧美精品啪啪一区二区三区| 久久香蕉激情| 亚洲精品久久成人aⅴ小说| 亚洲色图综合在线观看| 亚洲aⅴ乱码一区二区在线播放 | 又黄又爽又免费观看的视频| 中文字幕人妻熟女乱码| 国产主播在线观看一区二区| 久久久久久久久中文| 电影成人av| 亚洲av成人不卡在线观看播放网| 伦理电影免费视频| 亚洲性夜色夜夜综合| 亚洲熟女毛片儿| 国产亚洲欧美98| 国产蜜桃级精品一区二区三区| 中文字幕高清在线视频| 一级,二级,三级黄色视频| 999久久久国产精品视频| 日本三级黄在线观看| 欧美日韩中文字幕国产精品一区二区三区 | 亚洲国产看品久久| 黄色毛片三级朝国网站| 中国美女看黄片| 最好的美女福利视频网| 精品一区二区三区av网在线观看| 最近最新中文字幕大全免费视频| 欧美一区二区精品小视频在线| 亚洲男人的天堂狠狠| 久久久国产精品麻豆| 黑人巨大精品欧美一区二区mp4| 桃色一区二区三区在线观看| 午夜免费观看网址| 中文字幕精品免费在线观看视频| 99在线视频只有这里精品首页| 午夜a级毛片| 午夜日韩欧美国产| 亚洲五月婷婷丁香| 巨乳人妻的诱惑在线观看| 中文字幕av电影在线播放| 国产精品 国内视频| 亚洲少妇的诱惑av| 我的亚洲天堂| 久久久久久久精品吃奶| 久久欧美精品欧美久久欧美| 两个人看的免费小视频| а√天堂www在线а√下载| 精品电影一区二区在线| 日韩欧美国产在线观看| 男女之事视频高清在线观看| 纯流量卡能插随身wifi吗| 亚洲国产中文字幕在线视频| 久久久精品欧美日韩精品| 在线观看www视频免费| 成熟少妇高潮喷水视频| 国产成人精品在线电影| 久久久久久免费高清国产稀缺| 午夜福利成人在线免费观看| 国产精品爽爽va在线观看网站 | 亚洲精品在线观看二区| 国产在线精品亚洲第一网站| cao死你这个sao货| 亚洲伊人色综图| 精品久久久久久久久久免费视频| 满18在线观看网站| 日韩欧美国产一区二区入口| 黑人欧美特级aaaaaa片| 日韩av在线大香蕉| 日韩精品青青久久久久久| 久久人妻av系列| 最近最新中文字幕大全免费视频| 日韩精品青青久久久久久| 人人澡人人妻人| 一级片免费观看大全| 亚洲自拍偷在线| 麻豆一二三区av精品| 高清毛片免费观看视频网站|