• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Improving data hiding within colour images using hue component of HSV colour space

    2022-04-06 07:34:40FatumaSaeidHassanAdnanGutub

    Fatuma Saeid Hassan|Adnan Gutub

    Computer Engineering Department,Umm Al-Qura University,Makkah, Saudi Arabia

    Abstract Data hiding technologies aim to hide the existence of secret information within digital covers such as images by causing unnoticeable degradation to their quality.Reducing the image distortion and increasing the embedding capacity are the main points that the data hiding techniques revolved around.This article proposes two high payload embedding methods with high stego image quality using the Hue-Saturation-Value (HSV) colour model.The first method is hue-based embedding (HBE) that employs the H plane for hiding one or two bits in non-grey pixels.The second method uses the three HSV components, so it is called three-planes embedding (TPE).In TPE, one bit is hidden in the least significant bit (LSB) of V of the grey pixels, one or two bits in H of the pixels having low saturation or low brightness and one bit in the LSB of S otherwise.The experiments were conducted on 25 images and the results show that HBE hides more data on average than TPE with its quality reaching 60 dB.TPE achieves quality up to 61 dB and capacity reaches 364 Kb.TPE scores the highest capacity among six state-ofthe-art techniques in Red-Green-Blue,HSV,Hue-Saturation-Intensity and YCbCr spaces with the highest average peak signal to noise ratio midst five of them.By embedding 60,90, and 120 Kb, this TPE attains the best average quality amid all the methods.

    1|INTRODUCTION

    With the widespread use of the Internet, sensitive contents have become more exposed to penetration by intruders.Therefore, the data hiding technique, or as it is known as steganography[1],involves covert communication between the authorised parties who transmit the secret information.This process needs an embedding algorithm and a host object, like image [2], video [3] or text [4, 5], as its basic components to conceal the secret.Data hiding methods can be reversible or irreversible.Reversibility indicates the possibility of reshaping the exact carrier object once the message is retrieved, while irreversibility does not guarantee so [6].In either of the two types, the human visual system must be taken into consideration in order to not attract the attackers attention to the presence of secret data within the host media.This is because the better the imperceptibility property of the steganography method, the better its security.Additionally, the more amount of payload that the method can hide, the higher its capacity.Research studies that address the embedding within images use either the grayscale[7-9]or colour images.A hiding technique using grey images could be applied for colour images [10] but by repeating it in the three planes of the images independently[11],which means increasing the time-complexity.A better way for embedding into colour images is by using the techniques that are dedicated to this type of images.Colour-image steganography methods in the literature use different colour spaces such as Red-Green-Blue(RGB)[11-14],Hue-Saturation-Value(HSV) [15, 16], Hue-Saturation-Lightness (HSL) [17], Hue-Saturation-Intensity (HSI) [18, 19] and YCbCr [20, 21] that stands for luminance,chroma Blue difference and chroma Red difference.

    RGB is the basic model in most display devices [22] in which the colour is represented as a combination of three primary colours:Red,Green and Blue.Mixing two full primary colours produces a secondary colour, so Red-Green is Yellow,Green-Blue is Cyan and Blue-Red is Magenta.Additionally,mixing one full primary colour with one secondary colour yields a tertiary colour, so there are six colours of this type.RGB is a correlated model because a small modification in one of its components influences the images quality [15]; so it is not the most suitable model for data hiding.Therefore,there is a need for studying the hiding using the other colour spaces,which are uncorrelated colour spaces, for the sake of improving the performance.Conversion between the RGB and the three hue-based colour models was given in [23].Also,converting RGB to YCbCr and vice versa was given in [20].

    In each of the HSV,HSL and HSI colour spaces,hue is the colour's name, saturation is the colour's purity and the third component(value,lightness or intensity)is the colour's brightness.TheHplane has values between 0°and 360°where 0°is the same as 360°.TheSandIplanes are percentage values from 0%to 100%.WhenSis 0%,the grayscale values appear by varying the values of theVplane from 0%(Black)to 100%(White).In this case,the hue is undefined.Additionally,if the colour is Black then bothHandSare undefined.Only in the HSL model,HandSare also undefined if the colour is White.A close look at the hue plane shows that the primary,secondary and tertiary colours of the RGB model are separated by 30°in theHplane.Thus,they produce 12 basichues that are Red(at 0°or 360°),Red-Yellow(at 30°), Yellow (at 60°), Yellow-Green (at 90°), Green (at 120°),Green-Cyan(at 150°),Cyan(at 180°),Cyan-Blue(at 210°),Blue(at 240°), Blue-Magenta (at 270°), Magenta (at 300°) and Magenta-Red(at 330°).Therefore,an alteration in the value ofHmay change the perceived colour significantly[24],which makes the hue plane the least suitable plane for data embedding[17].On the other hand, a careful division of the hue values into clusters for data hiding decreases the chance of detecting the change by human eyes,as we propose in this article.

    In the current work, we propose dual irreversible data hiding methods that utilise the hue plane of the HSV colour space for carrying data.The reason for choosing the HSV model among the HSL and HSI models is its efficiency [16]and its suitability for our data embedding methods, as proven by our experiments.We divide theHplane into groups depending on the 12 basic hues in order to maintain the quality of the images while increasing the hiding capacity.The first method uses only the hue component while the second one employs all the three planes of the HSV colour space for information concealing.

    The rest of the article is organised as follows: The following section discusses a literature review of the existing irreversible data hiding techniques.A detailed description of the two proposed methods is given in Section 3.Section 4 analyses the experimental results of the methods.Finally, the conclusion of the article is given in Section 5.

    2|LITERATURE REVIEW

    In this section, we provide a brief discussion on some of the state-of-the-art techniques in the field of data hiding within colour images.The most common method is the least significant bit (LSB) substitution in which the LSB of the binary representation of each pixel in the image is replaced by a secret bit [14].The method can be stretched to increase the embedding capability by replacing more LSBs of the pixels,but this leads to more distortion in the image[14,25].Karim et al.[12]used the simple LSB substitution method to embed data in either the Green or Blue components of the pixels.In their method,the result of the XOR operation between one bit of a secret key and the LSB of the Red component determined the embedding plane in the pixel.This dependency on the secret key and the change in the embedding position improved the security of the simple LSB technique.The concept of Karim et al.'s method[12]was adopted in[14]but with adding several security barriers that involved permuting the image pixels,encrypting the secret key and encrypting the secret data.This method was not only highly secure but also computationally inexpensive.Muhammad et al.[18] investigated the utilisation of the LSB method for hiding data in the intensity channel of the HSI colour space.The reported results of their method showed more improvement in the image quality than Karim et al.[12].Another work that utilised theIplane and improved the imperceptibility of Karim et al.'s method was nominated by the authors in [19].Their work encoded the secret message using a three-level encryption algorithm.Then the image was scanned in a Morton manner to embed the cipher text by LSB substitution.To use the LSB method in the HSV colour space,the proposed technique in [15] divided the value plane into equal-sized blocks to embed the encrypted secret data into the positions specified by the magic matrix.We refer to this technique in this article as the HSV-MLSB.This technique achieved higher average visual quality than [18] when hiding the same amount of data in multiple cover images.The visual imperceptibility of the technique was better than the method in[25], which used the specificIchannel of the HSI model, that is,to hide the secret content with the help of the magic matrix,a proposed multi-level encryption algorithm and the LSB method were used.More image quality enhancement of the two methods in [18, 25] was achieved by the proposed technique in[16]that encrypted the sensitive data using an iterative magic matrix encryption algorithm.Then, the data was embedded in a scrambled version of theVplane of the HSV space using an adaptive LSB method.Three different keys were used in the method that made it very secure but increased the key exchange overhead.Kumar et al.[26]presented a selective embedding technique in the RGB images in which two conditions must be satisfied to utilise a pixel for embedding: the three components of the pixel have different values and the least component is less than the others by two values at minimum.The least component of each pixel that fulfilled the criteria was employed for concealing one secret bit using the LSB method.This technique produced very little distortion in the images.However, it could embed only a small size of payload due to the strict embedding criteria.Alwan et al.[20]proposed an LSB-based technique that used the YCbCr colour model in a way that improved the security of the basic LSB method.Their idea was to apply the XOR operation between one secret bit and the achromatic component of the pixel.Then,the result was again XORed with theCbcomponent to yield the bit that was to be finally embedded into the LSB of theCrchannel.The reported peak signal to noise ratio(PSNR)values of the method were more than 54 dB for all the images,which indicates the high quality of the images.

    Gutub [13] presented a simple, secure and high-capacity data hiding method in which one of the RGB channels of a pixel was used to indicate the capability of the other two channels,which were called data holders, to embed two secret bits using LSB substitution.The first indicator channel was selected depending on the size of the secret message and the subsequent indicator channels were selected sequentially.Swain and Lenka [27] used a fixed indicator channel which was the maximum value summed for all the pixels.Their method encrypted the secret bits to add a second security layer to the pixel indicator technique in [13].Then, it hid four bits at maximum in one of the two data channels depending on predefined conditions.The authors reported a high PSNR value of 42.75 dB as the minimum visual quality of their high payload method.In Das and Kars method [28], the indicator channel was also used as a data holder and its information was embedded along with the encrypted secret data to be used in the extraction phase.Their method embedded two bits in the indicator channel and three bits in each of the other two channels, which increased the hiding capacity of [13].In Pandey et al.'s method [29], the indicator channel might also have been used for hiding data so that the embedding rate could reach 6 bits per pixel.Their method improved the embedding rate of Gutubs method[13], with high visual quality ranging from 48 to 71 dB when hiding 512 bytes of data.

    Ioannidou et al.[30] took advantage of the idea that embedding in the edge pixels is more efficient than in the nonedge pixels in terms of the payload capacity and the visual quality.In comparison, the improvement in [31] proposed multibit assignment steganography for palette images,in which each gregarious colour that possesses close neighbouring colours in the palette is exploited to represent several secret bits,that is, replacing the original colour with a selected neighbouring colour in a smart way.Although the work was complex and challenging, it showed impressive payload-distortion performance.In comparison, Grover and Mohapatra [32] proposed an edge-based technique of high imperceptibility to be used for colour-image authentication.Starting from the centre pixel in the B channel,the method embedded two secret bits in the smooth pixels and three bits in the sharp pixels using the LSB method.Rashid and Majeed [33] proposed a technique that applied edge detection on the Blue component and used the edge positions as indicators of the existence of data in the Green component.This method used only the edge positions that satisfied a threshold value,which increased the security of the method.

    Some of the modern steganographic methods defined a distortion function to minimise the embedding detected alteration [10, 11, 34, 35].For example, Yaofei Wang and his team in [10] discussed image steganography utilising the differences between the colour channels.Interestingly, they observed the G channel which had specifically stronger correlation than others, that is, its resistance to detection was better.Furthermore, the work in [10] innovated non-additive costs for colour image steganography, distributing the embedding capacity between the three channels in a smart way so as to not violate the Complexity Prior rule.Similarly, the payload partition image steganography in [11] relied on amplifying channel modification probabilities to assign embedding capacity to RGB channels.Their clustered strategy made the embedding changes concentrated in textured regions,achieving better resistance to many steganalysis.Some distortion functions were additive in which the costs were summed over to form the function (clarified in [11]) and some were non-additive as in [10] as well as in [34, 35].

    The techniques mentioned so far worked in the spatial domain in which the image pixels were manipulated directly to embed the secret content.The techniques that were designated to work in the frequency domain transformed the pixels into the frequency distribution.Then the produced coefficients were utilised for embedding.In the end, the altered coefficients were inversely transformed to form the stego image.Some examples of the transforms used for data hiding are the discrete Fourier transform [21], discrete cosine transform [36] and the discrete wavelet transform[37].These types of techniques are computationally complex and can carry fewer data [16] compared with the spatialdomain techniques.

    In this article, we propose two methods that work in the spatial domain and their embedding performance is the best among six LSB-based techniques, with a high visual quality of the produced stego images.The novel contributions of this article are briefed below:

    ●Splitting the 360 hue values of the HSV colour model into 24 groups of equal size and assigning a specific hue name for each group.The names are derived from the 12 basic hues.Each group is further divided into clusters of two or three members.We make the embedding in the hue plane of a pixel to be by changing the hue value to another value but within the same cluster and group.In this way, we improve the image quality of the embedding in the hue plane.

    ●Improving the embedding capacity of six existing 1LSBbased methods by proposing two data hiding techniques.

    ●Improving the average visual quality of three existing methods by proposing the hue-based embedding (HBE)data hiding technique.It uses the hue of only the saturated pixels to embed one or two secret bits.

    ●Improving the average visual quality of five existing methods and the proposed HBE method by proposing the three-planes embedding (TPE) data hiding technique.It uses one of the three HSV planes for embedding in each pixel.The embedding plane in a pixel is specified depending on the value of theSandVplanes.When the embedding plane isH, two bits at maximum are embedded using the HBE method.Otherwise, one bit is embedded using the simple LSB substitution method.

    3|PROPOSED METHODS

    This work presents two improvements.The general processes that are involved in the embedding and extraction phases are illustrated in Figure 1.At first, the cover image is converted from the RGB to the HSV model to produce the HSV image.Then,one of the two proposed embedding methods is applied to hide the secret message within the resultant image.The output of this process is the image in the HSV space that encloses the sensitive data.This image is then converted back to the RGB model in order to form the final stego image.For data extraction,the stego image is converted to HSV and then the corresponding extraction technique is applied to the image.

    In Section 3.1, we discuss the first proposed embedding method followed by discussing the corresponding extraction method in Section 3.2.The second proposed embedding technique is explained in Section 3.3 and the recovery process is described in Section 3.4.

    3.1|Data embedding using HBE met hod

    In this section, we discuss the embedding phase of our first proposed technique, that is, the HBE method.It uses theHplane of the HSV colour space as the main component for hiding.The first step of this method is the conversion of the image from the RGB model to the HSV model by normalising theR,GandBcomponents to be in the range[0,1]instead of[0, 255].The next step is the calculation of theH,SandVcomponents with the help of the equations provided in [38].Then, the value ofHis transformed from the range [0, 1] to the range [0,360]by multiplying it by 360 and rounded to the nearest integer value.In this method,we hide one or two secret bits in the hue of the pixels that have saturation value not equal to 0%.On the other hand,there is no embedding in the other pixels whenSequals to 0%.

    This technique depends on categorising the hues of the HSV colour space based on the 12 basic hues.For simplicity,we give names for the tertiary hues as followed:Red-Yellow is Orange, Yellow-Green is Chartreuse green, Green-Cyan is Spring green, Cyan-Blue is Azure,Blue-Magenta is Violet and Magenta-Red is Rose.We further divide the hues into 24 groups and each group has a range of 15°.The names of the groups are taken from the basic 12 hues and the hues between each of them.These groups are represented as pies of hues in Figure 2.The green degrees marked in the figure represent the exact positions of the 12 basic hues.The following are a detailed view of the ranges and names used for the groups:

    We further divide each group into clusters that have three members as follows:(h1,h2,h3),(h4,h5,h6),(h7,h8,h9),(h10,h11,h12)and(h13,h14,h15).The Red group is a special case because it is not a continuous group as it is separated at 0°(360°).Therefore, its clusters may have three or two members as follows:(353°,354°,355°),(356°,357°),(358°,359°),(0°,1°,2°),(3°,4°,5°),(6°,7°).

    After obtaining the HSV image, the embedding process starts by scanning the image from left to right and top to bottom to embed the bits sequentially.For each pixel,we check if the value ofSis greater than zero.If so,we embed data in the roundedHof this pixel.The embedding is done by first determining the group and the exact cluster within the group that this hue belongs to.Depending on the number of members in the cluster and the value of one secret bit,the number of bitsnthat can be embedded in the pixel and the new hues valueHstegare determined.

    If the cluster has only two members,we embed one bit,son=1.In this case,theHstegwill be the first hue in the cluster if the bit is 0 while theHstegwill be the second hue in the cluster if the bit is 1.If the cluster is of three, we check the value of one secret bit;if it is 0,n=1 and theHstegwill be the first hue in the cluster.If it is 1,n= 2 and theHstegis determined as follows:if the next secret bit is 0,Hstegwill be the second hue in the cluster;if the next bit is 1,theHstegwill be the third hue in the cluster.

    It is worth to mention that the 360° belongs to the Red cluster (358°, 359°), but the cluster is still treated as a twomember cluster because 360° is the same as 0°.If we treat the cluster as a three-member cluster, there will be incorrect recovery of the secret bits in the data extraction phase.The main goals of the clusters used are to increase the embedding space while keeping the embedding value within the group and to reduce the difference between the old and the new values of the pixels hue to two at maximum.

    The final steps in the embedding phase are the normalisation of theHto be back in the range [0, 1], by dividing it by 360, and then the conversion of the image from HSV to RGB with the help of the equations provided in [38], to be sent to the receiver.Note that the RGB image is in the range[0, 1].

    A practical example of the embedding in the proposed HBE technique is represented in Figure 3.Using a cover image of size 2 × 2, the process is started by converting the cover image to the HSV colour space and then scanning the pixels inthe following sequence: A, B, C and D.Assuming that the secret bit stream is (011,010), the embedding procedure is as follows:

    F I G U R E 1 The general framework of the proposed scheme.HSV, Hue-Saturation-Value; RGB, Red-Green-Blue

    F I G U R E 2 Geometric representation of the hue groups used in our hue-based embedding method

    For each pixel,we check its suitability for HBE data hiding by ensuring that its saturation value is not 0.Starting from pixel A,its hue is normalised to be in the range[0,360]and rounded to an integer.Then, we define its group asRed-Orangebecause theHfalls in the range (8°-22°).The exact cluster that it belongs to is (14°, 15°, 16°), which has three members;so we will check the value of one secret bit if it is 0 or 1.Because the bit is 0,we will embed one bit in the pixel,n=1,and there is no need to check the next secret bit.Additionally,the stego value ofHwill be the first hue in the cluster,Hsteg= 14.For pixel B, itsHbelongs to the groupRoseand cluster(323°,324°,325°).It is a three-member cluster,and so one secret bit is checked and its value is 1.Thus, another bit will be checked, which means thatn= 2.The next bit is 1;therefore, theHstegwill be the third hue in the cluster, 325.Pixel C has a rounded hue of 360 and so it follows theRedgroup and the two-member cluster(358°,359°).In this type of cluster, we check only one secret bit and here it is 0; so theHstegis the first hue in the cluster.Following the same procedure,the hue of pixelDbelongs to theRose-Redgroup and the three-member cluster(347°,348°,349°).One bit from the secret is 1,and so we will take another bit which is 0.Thus,the new hue value is the second hue in the cluster,Hsteg= 348.

    Next, all the hues are normalised back to the [0, 1] range and combined with the originalSandVplanes to reshape the HSV image that contains the hidden data.Finally, the reconversion from HSV to RGB is applied to produce the stego image, which is in the range [0, 1].

    3.2|Data extraction using the HBE method

    On the receiver side,the secret message can be extracted from the stego image by applying the extraction procedure of the proposed HBE technique.The process is started by converting the image from the RGB space to the HSV space.Then,theHplane is normalised to be in the range[0,360]and rounded to an integer.The image is scanned sequentially to extract the bits from the pixels that have saturation value greater than zero.The following is the details of the extraction process:

    For each pixel,we determine the group and the cluster that its hue belongs to.If the cluster is of two members, there is only one hidden bit in the pixel and it is determined by the value of theHstegas follows:If theHstegis the first hue in the cluster, the bit is 0; otherwise, the bit is 1.If the cluster contains three members, three cases are considered as follows: if theHstegis the first hue in the cluster, there is only one bit hidden and it is 0; otherwise, there are two hidden bits in the pixel.These two bits are (10) if theHstegis the second hue in the cluster and (11) if theHstegis the third hue in the cluster.Finally,all the secret bits are concatenated together to form the entire secret stream.

    F I G U R E 3 Example of embedding data into a 2×2 image using the HBE method.(a)Cover image in[0,255]and[0,1]ranges;(b)Hue-Saturation-Value(HSV) image; (c) Embedding procedure; (d) HSV image with embedded data; (e) Red-Green-Blue (RGB) stego image

    Using the embedding example in Figure 3, we can extract the secret data by applying the above procedure.At first, the stego image is transformed to the HSV colour model and the output is the HSV image that contains the secret bits.

    The normalisedHvalues of all the four pixels are checked for data extraction because all of them are saturated.The cluster of pixel A is(14°,15°,16°)and theHstegis the first hue in the cluster; so the secret bit is 0.Pixel B belongs to the (323°, 324°, 325°) cluster and itsHstegis the third pixel in the cluster,so two secret bits are extracted which are(11).The third pixel follows the(358°,359°)cluster and the stego hue is the first hue in the cluster; thus the secret bit is 0.The cluster of pixel D is (347°, 348°, 349°) and theHstegis equal to the second hue in the cluster; so the two secret bits are (10).Finally, all the bits are concatenated as (011, 010) which is the full secret message.

    3.3|Data embedding using the TPE method

    This section explains the hiding process of our second proposed technique that is called the three-plane embedding method.TPE uses the three planes of the HSV colour model for embedding.First,the cover image is converted to the HSV space using the method in [38].Then, theHplane is normalised to the range[0,360]and theSandVcomponents are normalised to the range [0, 255].In TPE, all of the pixels are involved in the hiding process as follows:

    For each pixel, we check whether it is unsaturated, that is,S= 0 or not.If so, one bit is embedded in theVplane using the simple LSB substitution method.If not, we check the values of theSandVplanes.If the embedding condition([S≤51]or[V≤51])is satisfied,the hiding takes place in theHplane using the HBE method;otherwise,theSplane is used for hiding one secret bit using the LSB method.

    In other words,theVcomponent is utilised for embedding in the grey pixels and theHcomponent is utilised in the pixels that are either maximum 20% saturated or maximum 20%illuminated;otherwise theScomponent is utilised in the pixels that have both saturation and value above 20%.Note that 20%is equal to 51 in the range [0, 255].

    Finally, the three planes are normalised back to the range[0, 1] and the image is retransformed to the RGB space using the conversion method in [38].A numerical example of the TPE embedding process is given in Figure 4 and it is explained as follows:

    Using a 2 × 2 cover image, it is converted to the HSV space and then the pixels are scanned from A to D to embed the bit stream (10,010).Starting from pixel A, theSplane is equal to zero which means it is an unsaturated pixel.So, the embedding will take place in theVplane on replacing the LSB of the normalisedVby one secret bit.The other three pixels are saturated pixels; so the embedding condition is checked to decide whether the embedding plane isHorS.Pixel B does not satisfy the condition because itsSandVare both above 20%;so theSplane will be the place for embedding one secret bit by the LSB substitution.Pixel C has a saturation of less than 20%and pixel D has a value of less than 20%;so both of themfulfil the condition and the embedding will be in theHplane.For pixel C, it belongs to the (236°, 237°, 238°) cluster of theBluegroup and its one secret bit is 0; so theHstegis the first hue in the cluster.Pixel D belongs to the (254°, 255°, 256°)cluster of theBlue-Violetgroup and its one secret bit is 1; so another bit will be taken, which is 0.Thus, theHstegis the second hue in the cluster.

    F I G U R E 4 Example of embedding data into a 2 × 2 image using the three-planes embedding method.(a) Cover image in [0, 255] and [0, 1] ranges;(b) Hue-Saturation-Value (HSV) image; (c) Embedding procedure; (d) HSV image with embedded data; (e) Red-Green-Blue (RGB) stego image.LSB, least significant bit

    Next,all the planes are normalised back to the range[0,1]and the combination of them forms the HSV image that holds the secret.Lastly,the image is converted back to the RGB model in the range[0,1]and this stego image is sent to the receiver.

    3.4|Data extraction using the TPE method

    For extracting the secret data from the stego image, the data extraction process of the proposed TPE method is performed as explained in this section.First, the image is transformed to the HSV colour model.Then, the hue plane is normalised to the range[0,360]and both the saturation and the value planes are normalised to the range[0,255].The subsequent steps are described as follows:

    For each pixel, we firstly check its saturation value.If itsSis zero,we extract one secret bit from the LSB of theVplane.If not,we check whether itsSandVare both above 20%or 51 in the range[0,255].If so,one secret bit is extracted from the LSB of theSplane; otherwise, one or two secret bits are extracted from theHplane using the extraction procedure of the HBE method,see Section 3.2.After scanning all the pixels in the image,the secret message is the concatenation of all the extracted bits.

    We give a practical example of the TPE data extraction process by extracting the secret bits from the stego image in Figure 4.The image is first converted to the HSV space,followed by normalising the three planes to the abovementioned ranges.From pixel A to D, we notice that only the first pixel is unsaturated; so we extract the LSB of theVplane of pixel A as a secret bit.Pixel B is saturated and illuminated at values above 20%; so the LSB of theSplane is a secret bit.Pixel C is saturated at a value of less than 20%and the last pixel is illuminated at a value of less than 20%;therefore we extract secret bits from their hue planes.Since the cluster that the pixel C belongs to is(236°,237°,238°)and theHstegis the first hue in the cluster, one secret bit is 0.Pixel D belongs to the (254°, 255°, 256°) cluster that has three members and theHstegis the second hue in the cluster;so we extract two secret bits which are (10).Finally, all the bits are grouped to form the secret data.

    4|COMPARISONS AND ANALYSIS

    In this section, we analyse the performance of the two proposed data hiding methods with respect to some of the existing state-of-the-art techniques that are different from reversible data hiding based on image interpolation [7].The description of the platform and assessment metrics used is given in Section 4.1, followed by a discussion of the experimental results of the two techniques in Section 4.2.

    4.1|Experimental study

    We used the MATLAB R2018a software running on 2.9 GHz Intel Core i7 CPU and 8 GB RAM as the platform for performing the experiments.We implemented the two proposed techniques as well as the following six existing methods:Karim et al.[12],simple LSB substitution in theSplane of the HSV model (LSB[S]) and simple LSB substitution in theVplane (LSB[V]), Muhammad et al.[18], HSV-MLSB [15] and Alwan et al.[20].For the HSV-MLSB method [15], we chose the block size to be 2 × 2 as it provided the maximum embedding capacity for the method.The techniques were applied on 25 colour images of size 512 × 512, which were downloaded from the CVG-UGR image database [39] as shown in Figure 5.Additionally, the secret stream used was pseudo-random bits.

    For evaluating the visual quality of a colour stego imageSwith respect to the corresponding original cover imageC, we used the PSNR,in dB,as a metric.It requires the value of the mean square error (MSE) to be calculated independently for the three channels of the RGB model.The equations of the PSNR and the MSE are given in Equations (1) and (2),respectively,where the two images are of sizeM×Nand theC(i,j)andS(i,j)are the values of the pixels at rowiand columnjin the two images.A high PSNR value of a stego image indicates that it is of high security quality.

    F I G U R E 5 The 25 test images

    The second performance metric used in the experiments is the embedding capacity in bits.It measures the maximum amount of the secret payload that the image can carry by means of a hiding technique.As it increased,the number of the embeddable bits increased.

    T A B L E 1 Performance evaluation of the proposed HBE and TPE methods in three colour spaces over 25 test images.The highest value for each metric is shown in boldface

    T A B L E 2 Comparison of PSNR values and embedding capacity values of the eight methods.The highest value for each metric for each image is shown in boldface

    TA B L E 2 (Continued)

    4.2|Analysing the data hiding results

    In this section,we examine the outcomes of the two proposed techniques and the six methods, which were involved in the experiments, in terms of the visual quality and the embedding capacity.

    First, we embedded the secret message into all the test images using our proposed HBE and TPE methods in three hue-based colour spaces: HSV, HSI and HSL.Using the TPE method, theVplane in HSV was considered as theIandLplanes in the other two spaces.According to Table 1,the HSV model achieved the highest average capacity in the HBE method, while it scored the highest average PSNR in the TPE method.On the contrary, the HSI model reached the utmost quality in HBE,while it attained the maximum capacity in TPE.HSL was approximately in the middle in all cases.

    F I G U R E 6 Comparison of embedding capacity values of the eight methods.HBE, hue-based embedding; HSV, Hue-Saturation-Value; LSB,least significant bit; TPE, three-planes embedding

    The reason the HSI model provided the highest PSNR in the HBE method is that it obtained the lowest payload in the method and there is usually an inverse relationship between the amount of the payload and the visual quality.Likewise,the HSV model provided the highest PSNR in the TPE method because it attained the lowest embedding capacity in the method.

    On comparing the two methods in all the spaces,the HSV model achieved the best average capacity and PSNR.This is one of the reasons that we chose it as the colour model of our proposed methods.

    The second experiment was the implementation of all the eight competed techniques.The performance results are given in Table 2.From the table, it can be observed that our HBE could embed at least 265,723 bits and maximum 393,064 bits,while TPE could hide at least 271,769 bits reaching at most 364,249.It is obvious that both of our methods achieved the best embedding capacity among all the other methods in all the images.The reason is that all the other techniques are 1LSBbased; so they embed maximum one bit into a pixel, whereas our methods might embed one or two bits into a pixel.In most of the images, our HBE method was better than our TPE method in terms of the embedding capacity.But the latter was better than the former in terms of the visual quality of the images.Figure 6 illustrates the embedding capacity values of all of the eight techniques.

    By looking at our HBE method,it can been observed that it attained PSNR values ranging from 46.50 to 60.60 dB,which are considered high values of the image quality.Compared with the existing methods,the average security quality of HBE is better than LSB(V) and the methods proposed by Muhammad et al.[18]and Alwan et al.[20].In Figure 7,we provide a diagrammatic representation of the visual quality of the eight methods.

    F I G U R E 7 Comparison of peak signal to noise ratio values of the eight methods.HSV, Hue-Saturation-Value; LSB, least significant bit

    F I G U R E 8 Comparison of peak signal to noise ratio (PSNR) values of the eight methods for varying embedding size in test images (a) Airplane,(b) Baboon, (c) House, (d) Average of 25 images.HSV, Hue-Saturation-Value; LSB, least significant bit; TPE, three-planes embedding

    Our TPE method achieved PSNR values of minimum 55.09 dB and maximum 61.76 dB; so the visual quality ofthe images is very high.Additionally, the average quality of the method was the best among the five existing techniques by Karim et al.[12], LSB(V), Muhammad et al.[18],HSV-MLSB [15] (with block size = 2 × 2) and Alwan et al.[20].

    On the other hand, the average PSNR of the LSB(S)method was higher than our TPE method but by less than 1 dB, and ours was better than the former in nine images including four standard images: airplane, baboon, house and sailboat.The average PSNR of the LSB(S)method was higher than the two approaches proposed for most of the images because it embedded less payload and the maximum difference between the value of a pixel before and after the embedding was 1, while in our methods the difference could reach 2,which might reduce the quality.

    The high visual quality of the LSB(S)method and the high payload of our HBE method made us compromise both in our TPE method by using a percentage of 20%to be the threshold of embedding in either theHorSplanes.Increasing this threshold will increase the embedding capacity but reduce the visual quality and vice versa.

    The PSNR results of the techniques used by varying the size of the embedded bits are shown in Figure 8.The payload sizes tested were chosen by taking into consideration that the HSV-MLSB [15] method in our experiments had a maximum capacity of 131,072 bits.Therefore, the selected sizes did not exceed this capacity.As we can see in the figure,our proposed TPE method scored the highest average PSNR among all the methods in embedding 60, 90 and 120 kilo bits of data.The proposed TPE method provided a smaller average PSNR than the LSB(S) approach when the embedding size was 30 Kb because an outlier PSNR value of 89.16 dB appeared when embedding this payload in the ‘Blue-eye’ image using the LSB(S)method.This outlier led to increasing the methods average quality more than ours.

    5|CONCLUSION

    In this article, we have proposed two enhanced data hiding techniques that use the HSV colour model to improve the embedding and security performance.We used the HSV space because it is more suitable for our methods than the HSI and HSL models, as verified in the experiments.Both of the techniques proposed outperformed the embedding capability of the methods in [12, 15, 18, 20] as well as the LSB(S) and LSB(V) methods with high image quality.These existing competing methods are either in RGB, HSI, HSV or YCbCr colour spaces.In our HBE method, we utilised the hue plane for embedding one or two bits in all the saturated pixels; so the hiding capacity of the method could reach 393 Kb and the security quality could reach 60 dB.Our TPE method was a combination of the HBE, LSB(S) and LSB(V)techniques in which we applied LSB(V) on the unsaturated pixels, LSB(S) on the pixels that are of both high saturation and high brightness and HBE on the rest of the pixels.This combination made the TPE method have a visual quality of at least 55 dB in all the test images with a payload of at least 271 Kb.The experiments have proven that on average, our HBE method could embed more bits than our TPE method and its average PSNR is higher than LSB(V) and the methods in [18, 20].Additionally, our TPE technique achieved the best average visual quality compared with HBE, LSB(V) and the methods in [12, 15, 18, 20].

    In the future,we plan to further increase the visual quality of the TPE technique by replacing the simple LSB substitution method in the saturation and value planes with more improved methods.

    ACKNOWLEDGMENTS

    Thanks to Umm Al-Qura University (UQU) for supporting this work.There is no funding source.

    CONFLICT OF INTEREST

    The authors declare that they have no conflict of interest.

    ORCID

    Adnan Gutubhttps://orcid.org/0000-0003-0923-202X

    欧美zozozo另类| 人妻制服诱惑在线中文字幕| 国产日韩欧美在线精品| 国产爽快片一区二区三区| 嘟嘟电影网在线观看| 51国产日韩欧美| 在线 av 中文字幕| 最后的刺客免费高清国语| 亚洲av一区综合| 久久综合国产亚洲精品| 久久久精品94久久精品| 日本猛色少妇xxxxx猛交久久| 国产男人的电影天堂91| 亚洲国产精品专区欧美| 精品久久久久久电影网| 婷婷色综合大香蕉| av在线观看视频网站免费| 国产黄色免费在线视频| 我的老师免费观看完整版| 免费观看在线日韩| 九九在线视频观看精品| 色网站视频免费| 成人亚洲精品一区在线观看 | 最近的中文字幕免费完整| 五月天丁香电影| 国产精品熟女久久久久浪| 一级毛片我不卡| 国产在视频线精品| 亚洲国产最新在线播放| 91久久精品国产一区二区成人| 国产高清国产精品国产三级 | 午夜精品国产一区二区电影 | 在线免费十八禁| 国产亚洲av嫩草精品影院| 综合色av麻豆| 最近最新中文字幕免费大全7| 草草在线视频免费看| 神马国产精品三级电影在线观看| 建设人人有责人人尽责人人享有的 | 午夜福利视频1000在线观看| 久久久国产一区二区| 七月丁香在线播放| 国产永久视频网站| 黄色配什么色好看| 国产成人a区在线观看| 黄色视频在线播放观看不卡| 国产精品久久久久久av不卡| 久久久国产一区二区| 少妇被粗大猛烈的视频| 精品熟女少妇av免费看| 日韩在线高清观看一区二区三区| 国产乱人偷精品视频| 国产亚洲一区二区精品| 午夜激情福利司机影院| 男男h啪啪无遮挡| 欧美另类一区| 国产精品秋霞免费鲁丝片| 国产精品一区二区在线观看99| 国产欧美日韩精品一区二区| 精品一区二区三卡| 亚洲国产成人一精品久久久| 亚洲国产精品成人久久小说| 日日摸夜夜添夜夜爱| 亚州av有码| 在线观看av片永久免费下载| 我的老师免费观看完整版| 欧美激情国产日韩精品一区| 观看免费一级毛片| 在线免费观看不下载黄p国产| 久久久久久久精品精品| 五月伊人婷婷丁香| 中文字幕亚洲精品专区| 丰满乱子伦码专区| 麻豆乱淫一区二区| 最近中文字幕高清免费大全6| 日韩大片免费观看网站| 国产伦精品一区二区三区视频9| 日韩人妻高清精品专区| 91精品一卡2卡3卡4卡| 男人狂女人下面高潮的视频| 亚洲国产色片| 亚洲色图综合在线观看| 亚洲av免费在线观看| 爱豆传媒免费全集在线观看| 亚洲欧美日韩无卡精品| 色网站视频免费| 小蜜桃在线观看免费完整版高清| 国产亚洲av片在线观看秒播厂| 韩国高清视频一区二区三区| 中文字幕制服av| 色婷婷久久久亚洲欧美| 欧美zozozo另类| 国产av不卡久久| 亚洲成人中文字幕在线播放| 午夜福利网站1000一区二区三区| 国产欧美亚洲国产| 中文资源天堂在线| 联通29元200g的流量卡| 精品人妻一区二区三区麻豆| 久久久久久国产a免费观看| av国产免费在线观看| 国产成人精品久久久久久| 亚洲国产精品999| 丝袜喷水一区| 欧美潮喷喷水| 中文字幕制服av| a级毛色黄片| 午夜爱爱视频在线播放| 国产免费视频播放在线视频| 欧美少妇被猛烈插入视频| 国产成人精品久久久久久| 亚洲精华国产精华液的使用体验| 亚洲精华国产精华液的使用体验| av专区在线播放| 免费黄网站久久成人精品| 在线免费十八禁| 国产综合精华液| 久久久精品94久久精品| 欧美性感艳星| 亚洲精品国产av成人精品| 69av精品久久久久久| 777米奇影视久久| 国国产精品蜜臀av免费| 国产一区亚洲一区在线观看| 自拍偷自拍亚洲精品老妇| 三级国产精品欧美在线观看| av福利片在线观看| 不卡视频在线观看欧美| 午夜视频国产福利| 男人添女人高潮全过程视频| 亚洲欧美一区二区三区国产| 国产69精品久久久久777片| 亚洲国产色片| 美女cb高潮喷水在线观看| 国产免费视频播放在线视频| 日韩欧美精品免费久久| 一个人观看的视频www高清免费观看| 中国国产av一级| 综合色av麻豆| 亚洲自偷自拍三级| 国产一区二区在线观看日韩| 亚洲精品,欧美精品| 欧美区成人在线视频| 身体一侧抽搐| 免费观看在线日韩| 九九在线视频观看精品| 欧美激情国产日韩精品一区| 可以在线观看毛片的网站| 老女人水多毛片| 欧美变态另类bdsm刘玥| 亚洲三级黄色毛片| 国产爽快片一区二区三区| 丝袜脚勾引网站| 亚洲欧美一区二区三区国产| 国产精品嫩草影院av在线观看| 一本久久精品| av在线播放精品| 久久综合国产亚洲精品| 亚洲精品国产成人久久av| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 国产男女超爽视频在线观看| 少妇的逼水好多| 欧美性感艳星| 久久韩国三级中文字幕| 男人爽女人下面视频在线观看| 国产精品久久久久久av不卡| 一区二区三区免费毛片| 欧美xxxx黑人xx丫x性爽| 久久精品久久精品一区二区三区| 亚洲精品影视一区二区三区av| 一级二级三级毛片免费看| 男女边吃奶边做爰视频| 精品久久国产蜜桃| 亚洲最大成人av| 久久久精品94久久精品| 国产av不卡久久| 自拍欧美九色日韩亚洲蝌蚪91 | 免费观看无遮挡的男女| 亚洲精品国产色婷婷电影| 国产亚洲91精品色在线| 免费不卡的大黄色大毛片视频在线观看| 国产精品av视频在线免费观看| 在线观看一区二区三区| 蜜臀久久99精品久久宅男| 久久久久久久久大av| 各种免费的搞黄视频| 国产欧美另类精品又又久久亚洲欧美| av免费观看日本| 国产女主播在线喷水免费视频网站| 夜夜看夜夜爽夜夜摸| 免费观看av网站的网址| av播播在线观看一区| 国产精品国产三级专区第一集| 国产成年人精品一区二区| 亚洲欧洲日产国产| 爱豆传媒免费全集在线观看| 国产国拍精品亚洲av在线观看| 九九久久精品国产亚洲av麻豆| 国产男女内射视频| 国产一区二区亚洲精品在线观看| 一级片'在线观看视频| 欧美精品国产亚洲| 一二三四中文在线观看免费高清| 大片电影免费在线观看免费| 自拍欧美九色日韩亚洲蝌蚪91 | 亚洲欧美精品自产自拍| 欧美97在线视频| 中文字幕久久专区| 80岁老熟妇乱子伦牲交| 中文字幕久久专区| 国产色婷婷99| 国产成人精品一,二区| 大香蕉久久网| 国产精品久久久久久久电影| 国产免费一级a男人的天堂| 永久免费av网站大全| 2022亚洲国产成人精品| 自拍欧美九色日韩亚洲蝌蚪91 | 精品少妇久久久久久888优播| 午夜免费鲁丝| 99久国产av精品国产电影| 久久人人爽人人片av| 国产精品蜜桃在线观看| 欧美成人精品欧美一级黄| 久久久久久久亚洲中文字幕| 欧美一级a爱片免费观看看| 久久久欧美国产精品| 中文字幕免费在线视频6| 热re99久久精品国产66热6| 中文字幕免费在线视频6| 亚洲性久久影院| 欧美日韩综合久久久久久| 天堂中文最新版在线下载 | 最近中文字幕2019免费版| 人人妻人人澡人人爽人人夜夜| 老司机影院毛片| 人妻制服诱惑在线中文字幕| 欧美激情国产日韩精品一区| 国产探花极品一区二区| 中文天堂在线官网| 国产乱人视频| 国产亚洲5aaaaa淫片| 国产精品av视频在线免费观看| 国产男人的电影天堂91| 国产综合精华液| 校园人妻丝袜中文字幕| 成人无遮挡网站| 欧美日韩亚洲高清精品| 99热这里只有精品一区| 成年av动漫网址| 涩涩av久久男人的天堂| 精品酒店卫生间| 欧美日韩一区二区视频在线观看视频在线 | 亚洲精品乱码久久久久久按摩| 少妇人妻一区二区三区视频| 日韩中字成人| 精品国产乱码久久久久久小说| 国产精品女同一区二区软件| 91在线精品国自产拍蜜月| 97热精品久久久久久| 能在线免费看毛片的网站| 免费在线观看成人毛片| 精品亚洲乱码少妇综合久久| 国产日韩欧美在线精品| 高清视频免费观看一区二区| 麻豆成人av视频| 深夜a级毛片| 久久99热这里只有精品18| 男女国产视频网站| 色播亚洲综合网| 色婷婷久久久亚洲欧美| 国产精品伦人一区二区| 欧美极品一区二区三区四区| 久久久精品免费免费高清| 亚洲,欧美,日韩| 三级国产精品欧美在线观看| 国产欧美另类精品又又久久亚洲欧美| 亚洲av电影在线观看一区二区三区 | 亚洲av男天堂| 久久精品综合一区二区三区| 91精品伊人久久大香线蕉| 亚洲aⅴ乱码一区二区在线播放| 狂野欧美激情性bbbbbb| 人妻 亚洲 视频| av天堂中文字幕网| 久久99精品国语久久久| 精品少妇久久久久久888优播| 99久国产av精品国产电影| 如何舔出高潮| 中文字幕久久专区| 久久久久久久久久久免费av| 波野结衣二区三区在线| 日韩人妻高清精品专区| 国产成人91sexporn| 亚洲av电影在线观看一区二区三区 | 亚洲成人av在线免费| 免费看a级黄色片| 嫩草影院精品99| 一个人观看的视频www高清免费观看| 午夜福利视频1000在线观看| 欧美丝袜亚洲另类| 欧美高清性xxxxhd video| 大又大粗又爽又黄少妇毛片口| 特级一级黄色大片| 欧美bdsm另类| 亚洲精品国产色婷婷电影| 毛片一级片免费看久久久久| 欧美3d第一页| 精品少妇黑人巨大在线播放| 交换朋友夫妻互换小说| 亚洲熟女精品中文字幕| 精品久久国产蜜桃| 国产精品一区www在线观看| 亚洲久久久久久中文字幕| 国产欧美日韩精品一区二区| 成人亚洲精品一区在线观看 | 女人十人毛片免费观看3o分钟| 高清日韩中文字幕在线| h日本视频在线播放| 国产免费又黄又爽又色| 下体分泌物呈黄色| 麻豆久久精品国产亚洲av| 交换朋友夫妻互换小说| av网站免费在线观看视频| 色吧在线观看| 欧美性猛交╳xxx乱大交人| 女的被弄到高潮叫床怎么办| 看黄色毛片网站| 亚洲精品aⅴ在线观看| 久久精品综合一区二区三区| 日韩欧美精品免费久久| 在线亚洲精品国产二区图片欧美 | 水蜜桃什么品种好| 欧美日韩亚洲高清精品| 日韩欧美一区视频在线观看 | 日本黄大片高清| 亚洲成人精品中文字幕电影| 国产精品人妻久久久影院| 舔av片在线| 毛片女人毛片| 亚洲久久久久久中文字幕| 亚洲电影在线观看av| 成人国产麻豆网| 久久ye,这里只有精品| 国产精品一二三区在线看| 国产日韩欧美在线精品| 岛国毛片在线播放| 国产精品偷伦视频观看了| av一本久久久久| 一级av片app| 国产精品国产av在线观看| 在线天堂最新版资源| 国产亚洲5aaaaa淫片| 丝袜美腿在线中文| 少妇人妻精品综合一区二区| 联通29元200g的流量卡| 色综合色国产| 99久久精品热视频| 成人漫画全彩无遮挡| 国产成人aa在线观看| 亚洲av成人精品一区久久| 中文字幕av成人在线电影| 亚洲av成人精品一二三区| 久久人人爽人人爽人人片va| 欧美激情在线99| 干丝袜人妻中文字幕| 日韩欧美一区视频在线观看 | 亚洲欧洲日产国产| 国产精品久久久久久av不卡| 如何舔出高潮| kizo精华| 亚洲精品乱码久久久久久按摩| 欧美性猛交╳xxx乱大交人| 下体分泌物呈黄色| 中文字幕人妻熟人妻熟丝袜美| 久久鲁丝午夜福利片| 久久精品人妻少妇| 中国三级夫妇交换| 在线观看免费高清a一片| 国产69精品久久久久777片| 欧美变态另类bdsm刘玥| 午夜福利在线观看免费完整高清在| 97在线视频观看| 国产人妻一区二区三区在| 国产成人精品一,二区| 亚洲经典国产精华液单| 亚洲av国产av综合av卡| 少妇的逼好多水| 久久精品久久精品一区二区三区| 最后的刺客免费高清国语| 看黄色毛片网站| 午夜福利在线观看免费完整高清在| 久久久久久久久大av| 国产av国产精品国产| 老师上课跳d突然被开到最大视频| 久久久久久久久久久免费av| 哪个播放器可以免费观看大片| 一级a做视频免费观看| 成人无遮挡网站| 午夜精品国产一区二区电影 | 国产淫语在线视频| 美女主播在线视频| 免费大片18禁| 最近的中文字幕免费完整| 熟妇人妻不卡中文字幕| 免费人成在线观看视频色| 欧美日韩视频精品一区| 黄色怎么调成土黄色| 久久人人爽人人片av| 午夜免费观看性视频| 麻豆久久精品国产亚洲av| 国产精品秋霞免费鲁丝片| 久久精品综合一区二区三区| 又爽又黄无遮挡网站| 中国美白少妇内射xxxbb| 国产精品国产三级专区第一集| 国产成人免费无遮挡视频| 免费看日本二区| 尾随美女入室| 亚洲精品自拍成人| 日日撸夜夜添| 一二三四中文在线观看免费高清| 国产成人精品一,二区| 最近中文字幕2019免费版| 日韩精品有码人妻一区| 欧美日韩视频高清一区二区三区二| 高清在线视频一区二区三区| 在线a可以看的网站| 七月丁香在线播放| 国产综合精华液| 女的被弄到高潮叫床怎么办| 伦精品一区二区三区| 亚洲自拍偷在线| 一级毛片久久久久久久久女| 啦啦啦啦在线视频资源| 国产成人一区二区在线| 亚洲最大成人中文| 日韩av不卡免费在线播放| 欧美少妇被猛烈插入视频| 亚洲国产精品国产精品| av福利片在线观看| 精品国产三级普通话版| 亚洲aⅴ乱码一区二区在线播放| 黄色欧美视频在线观看| 日韩成人伦理影院| 亚洲精品视频女| a级毛片免费高清观看在线播放| 美女视频免费永久观看网站| 黄色一级大片看看| 国内揄拍国产精品人妻在线| 高清日韩中文字幕在线| 午夜视频国产福利| 国产伦理片在线播放av一区| 美女国产视频在线观看| 91精品伊人久久大香线蕉| 18禁动态无遮挡网站| 国产又色又爽无遮挡免| 九九在线视频观看精品| 国内精品美女久久久久久| 久久99热这里只频精品6学生| 美女视频免费永久观看网站| 看黄色毛片网站| 各种免费的搞黄视频| 好男人在线观看高清免费视频| 国产免费又黄又爽又色| 日韩欧美 国产精品| 一级a做视频免费观看| 极品少妇高潮喷水抽搐| 免费观看av网站的网址| 国产一区亚洲一区在线观看| 丝袜脚勾引网站| 精品视频人人做人人爽| 国产永久视频网站| 18禁在线无遮挡免费观看视频| 精品亚洲乱码少妇综合久久| 波野结衣二区三区在线| 各种免费的搞黄视频| 精品人妻熟女av久视频| 久久久久久久亚洲中文字幕| 日韩欧美 国产精品| 亚洲av一区综合| 欧美潮喷喷水| 国产精品福利在线免费观看| 青青草视频在线视频观看| 亚洲精品国产av蜜桃| 亚洲色图av天堂| 舔av片在线| 亚洲精品中文字幕在线视频 | a级毛色黄片| 亚洲精品aⅴ在线观看| 男女国产视频网站| 啦啦啦啦在线视频资源| 亚洲av二区三区四区| 天美传媒精品一区二区| 亚洲国产精品国产精品| 午夜福利网站1000一区二区三区| 精品一区在线观看国产| 国内精品宾馆在线| 日韩电影二区| 一本色道久久久久久精品综合| 黄色视频在线播放观看不卡| 国产精品国产av在线观看| 国产精品福利在线免费观看| 最近中文字幕高清免费大全6| 精品99又大又爽又粗少妇毛片| 高清视频免费观看一区二区| 亚洲真实伦在线观看| 亚洲欧美日韩卡通动漫| a级毛色黄片| 天天一区二区日本电影三级| 国产成人免费观看mmmm| 性色avwww在线观看| 欧美97在线视频| 国产成人91sexporn| 在现免费观看毛片| 色5月婷婷丁香| 亚洲精品日韩av片在线观看| 精品少妇久久久久久888优播| 国产精品不卡视频一区二区| 深夜a级毛片| 亚洲欧美日韩卡通动漫| 免费人成在线观看视频色| 亚洲国产欧美在线一区| 新久久久久国产一级毛片| 成人国产麻豆网| 九九爱精品视频在线观看| 少妇丰满av| 亚洲久久久久久中文字幕| 国产一区二区在线观看日韩| 又爽又黄无遮挡网站| 亚洲精品自拍成人| 欧美xxxx性猛交bbbb| 男女边摸边吃奶| 人妻系列 视频| 亚洲成人精品中文字幕电影| 久久99热6这里只有精品| 国产黄色免费在线视频| 在线免费观看不下载黄p国产| 边亲边吃奶的免费视频| 久久精品夜色国产| 日韩av在线免费看完整版不卡| 免费黄色在线免费观看| 国产黄色免费在线视频| 国产视频内射| 免费看a级黄色片| 久久99热6这里只有精品| 久久99精品国语久久久| 性色av一级| 亚洲熟女精品中文字幕| 女人被狂操c到高潮| 久久99精品国语久久久| 建设人人有责人人尽责人人享有的 | 美女视频免费永久观看网站| 18禁动态无遮挡网站| 亚洲在线观看片| av国产免费在线观看| 禁无遮挡网站| 色5月婷婷丁香| 少妇丰满av| 国产欧美日韩一区二区三区在线 | 在线观看一区二区三区激情| 成年女人看的毛片在线观看| 国产综合精华液| 高清毛片免费看| 91午夜精品亚洲一区二区三区| 观看美女的网站| 国产在线一区二区三区精| 国产精品av视频在线免费观看| 简卡轻食公司| 99精国产麻豆久久婷婷| 久久精品国产鲁丝片午夜精品| 中文字幕av成人在线电影| 亚洲精品成人av观看孕妇| 2022亚洲国产成人精品| 欧美3d第一页| 午夜福利高清视频| 人妻系列 视频| 亚洲欧美精品自产自拍| 久久久久久国产a免费观看| 亚洲三级黄色毛片| 精品人妻偷拍中文字幕| 欧美成人a在线观看| kizo精华| 少妇的逼好多水| 看黄色毛片网站| 国产精品秋霞免费鲁丝片| 狂野欧美激情性bbbbbb| 亚洲无线观看免费| 亚洲精品久久午夜乱码| 午夜免费观看性视频| eeuss影院久久| 日韩欧美精品免费久久| 亚洲欧美一区二区三区黑人 | 国内少妇人妻偷人精品xxx网站| 久久99热这里只频精品6学生| 国产成人精品一,二区| 久久人人爽人人爽人人片va| 欧美高清性xxxxhd video| 日日啪夜夜撸| 性色av一级| 国产老妇女一区| 亚洲内射少妇av| 中文字幕人妻熟人妻熟丝袜美| 国产亚洲5aaaaa淫片| 超碰97精品在线观看| 成人毛片60女人毛片免费| 亚洲欧美日韩卡通动漫| 欧美97在线视频| 欧美少妇被猛烈插入视频| videos熟女内射| 97人妻精品一区二区三区麻豆| 热99国产精品久久久久久7| 男女啪啪激烈高潮av片| 国内精品宾馆在线| 免费大片黄手机在线观看|