• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Neural-mechanism-driven image block encryption algorithm incorporating a hyperchaotic system and cloud model

    2022-04-12 03:44:00PengFeiFang方鵬飛HanLiu劉涵ChengMaoWu吳成茂andMinLiu劉旻
    Chinese Physics B 2022年4期
    關(guān)鍵詞:鵬飛

    Peng-Fei Fang(方鵬飛) Han Liu(劉涵) Cheng-Mao Wu(吳成茂) and Min Liu(劉旻)

    1School of Automation and Information Engineering,Xi’an University of Technology,Xi’an 710048,China

    2School of Electronic Engineering,Xi’an University of Posts&Telecommunications,Xi’an 710061,China

    3School of Engineering and Computer Science,Australian National University,Canberra 0200,Australia

    Keywords: image encryption,neural mechanism,hyperchaotic system

    1. Introduction

    Data encryption is an effective method for protecting data.Due to the high correlation between data capacity and the pixels in image information,traditional encryption technology is not suitable for image information. Therefore, protecting image information has become a challenge.[1]

    One of the important issues of information security is cryptography,but with the improvement of information security technology,a variety of attack methods have emerged. A traditional cryptography algorithm treats an input plaintext image as a binary stream and does not specifically encrypt the image in a special plaintext form.[2]Plaintext widely exists in people’s daily lives, and images have many unique properties, such as two-dimensional data, uneven energy distribution and a large amount of data. Therefore, in the encryption process, we should fully consider the following characteristics: Firstly,the amount of data in an image is generally large;hence, designing a special algorithm for image security protection to meet the encryption speed requirements of real-time image transmission is very relevant. Secondly,the correlation between adjacent pixels in an image is strong; thus, the correlation should be fully considered in the image encryption process. Thirdly, there are many different types of images;thus,the format of image data cannot be destroyed to prevent abnormal functioning of the image receiver in decoding.

    Many people believe that traditional cryptographic algorithms can be cracked; thus, the demand for more advanced security technology is increasing. Therefore, continuing indepth theoretical research and designing more efficient and reliable mathematical models and cryptographic algorithms, in particular, introducing new theoretical methods into the field of information security, are feasible solutions. Now, in addition to algebraic theory, people are trying to introduce the theory and technology of physics, nonlinear science, biology and other disciplines into the field of cryptographic algorithm design. Against this background, chaotic pseudo-random sequence generation algorithms and image encryption technology have been proposed,becoming a popular research topic in the study of encryption technology.

    A chaotic system is produced in a deterministic system and exhibits randomness or unpredictability; this is also an essential attribute of nonlinear dynamic systems.[3]Chaotic systems are characterized by their sensitivity to their initial conditions, that is, subtle differences in the initial conditions produce large differences in the results, which further reveal the complexity and uncertainty existing universally in nature and human society. The randomness, immeasurability and sensitivity of a chaotic system to the initial values are naturally related to cryptography. The certainty of a chaotic system ensures consistency in encryption and decryption in the process of secure communication.As long as the property of a chaotic system is applied correctly,a secure encryption system with a high key space can be obtained. The orbital properties of chaotic encryption correspond to the diffusion properties of traditional encryption systems, while the pseudo-random properties and sensitivity of chaotic encryption correspond to the chaotic properties of traditional encryption systems. Since 1997,many new encryption algorithms based on chaotic systems have been proposed,resulting in a new round of research.

    An image encryption algorithm based on a chaotic system has strong encryption characteristics because of its large key space, sensitivity and ergodicity to the initial value and control parameters. At present, chaotic image encryption algorithms can be divided into three categories: (1) encryption algorithms based on low-dimensional chaotic systems;(2)encryption algorithms based on high-dimensional chaotic systems;and(3)encryption algorithms based on chaotic systems combined with other methods.

    Low-dimensional chaotic systems were the first chaotic systems used in digital image encryption and have simple structures, easy-to-implement hardware and software, and a fast iteration speed. In 1998, Fridrich was the first scholar to use a two-dimensional chaotic system in the process of digital image diffusion and scrambling, which was based on Shannon’s concepts of confusion and diffusion. Since then, many of the scientific research achievements related to image encryption have been realized by using this scrambling diffusion principle. The authors of Ref. [4] proposed an algorithm for rotated medical images that combines a logistic chaotic and tent chaotic system and a DNA coding operation to carry out diffusion operations on scrambled images to obtain ciphertext images, resulting in a good encryption effect. The authors of Ref. [5] proposed an algorithm for scrambling image blocks that involves using zigzag,rotation and random arrangements after the image is divided into blocks and then using logistic chaos to diffuse the scrambled image blocks to obtain ciphertext images. This algorithm is superior to the existing encryption algorithms in medical image encryption. The authors of Ref.[6]proposed a diffusion-scrambling-diffusion structure to encrypt images. Firstly,the image is divided into blocks,and the image blocks are encrypted by using the traditional diffusion method and inverse hybrid cellular automata. Then,two-dimensional logistic chaos is used to encrypt the image blocks. Each image block is diffused and encrypted again,and the final ciphertext image is obtained. This algorithm can resist selective plaintext attacks and offers high security.However,low-dimensional chaotic systems have weaknesses,such as few control parameters,a small key space,short periodicity and limited calculation accuracy, which lead to the existence of certain periodicity in chaotic pseudo-random sequences and affect the solutions of image encryption.

    High-dimensional chaotic systems and hyperchaotic systems have been widely used in digital image encryption and have more complex chaotic dynamic characteristics than lowdimensional chaotic systems. They also have more system parameters and a larger key parameter space and can produce better chaotic sequences. The authors of Ref.[7]constructed the S-box of the Galois field and combined Lorenz chaos and the S-box. They used the algorithm to encrypt images and analyzed the security performance. The algorithm has a simple structure and can resist common attacks. The authors of Ref. [8] used a Lorenz chaotic sequence to scramble images and then used a quantum operation to perform diffusion operations on the scrambled image. This algorithm offers strong security and has a good encryption effect on color images.The authors of Ref. [9] combined Lorenz chaos with a Julia set to scramble and encrypt images. This algorithm has a novel and simple encryption structure and offers high robustness and security. The authors of Ref. [10] scrambled images with a two-dimensional hyperchaotic system sequence and then performed a logical XOR operation to obtain the final ciphertext image. The generated chaotic sequence has good randomness,and the encryption algorithm offers high security. It can be seen from the above that the current image encryption algorithms based on high-dimensional chaotic systems and hyperchaotic systems are still designed based on the principles of scrambling and diffusion. However, due to the advantages of high-dimensional chaotic systems, such as more control parameters,a large key space,and better pseudo-randomness,an increasing number of studies still focus on digital image processing and the encryption of high-dimensional chaotic systems and hyperchaotic systems. However, these two types of chaotic systems have some shortcomings and need to be studied further in terms of sequence quantization,randomness and encryption efficiency.

    Hybrid digital image encryption algorithms combining chaotic systems with other methods have also been widely studied by scholars,and extensive results have been achieved by incorporating not only the complex chaotic dynamic characteristics of chaotic systems, more system parameters, a larger key parameter space and better pseudo-random sequences,but also various complementary advantages of other methods. The idea of hybrid digital image encryption that combines a chaotic system with other methods is to combine a chaotic system with DNA coding or the wavelet transform to achieve better security performance. The authors of Ref.[11]proposed the use of the discrete wavelet inverse transform combined with two-dimensional sine chaos to fuse and encrypt color images.This algorithm has good feasibility and security.The authors of Ref. [12] compressed images, combined the Kronecker product (KP) with a chaotic system to construct a measurement matrix,and encoded DNA to encrypt the images,which resulted in good robustness and security. The authors of Ref. [13] proposed a three-dimensional memristor circuit system with good nonlinear dynamic performance and used its key stream to encrypt the image, combined with dynamic DNA coding and dynamic diffusion. The algorithm has high encryption efficiency, sensitivity and security and can resist plaintext attacks. The authors of Ref.[14]proposed combining a 2D robust chaotic system with the wavelet transform, a circular index table and partition diffusion to scramble and diffuse an image to obtain the final ciphertext image. This algorithm has high encryption efficiency and security. The authors of Ref.[15]proposed using two-dimensional logistic map and sine map(2D-LSCM),which combines a binary tree and flip to scramble and encrypt image pixels,and then carry out multiplication diffusion operation encryption in the Galois field to obtain the final ciphertext image. This algorithm improves the correlation and security between a key and plaintext. The authors of Ref. [16] proposed scrambling and encrypting an image by using the discrete wavelet transform and Arnold’s cat map and then dividing the scrambled image into blocks before diffusing and encrypting them again. This algorithm has good security. The authors of Ref. [17] proposed a new two-dimensional chaotic system. The chaotic key generated by this system is combined with pixel bit-level scrambling diffusion to encrypt the color image. The algorithm has a large key space and good antiattack ability. The authors of Ref.[18]proposed encrypting an image by combining a fractal sorting vector with a least significant bit(LSB)chaotic system,which offers high security. The authors of Ref.[19]proposed a new image encryption algorithm by combining a logistic chaotic system with transformation and a chaotic substitution box,which is easy to implement and offers high security. The authors of Ref. [20] proposed a four-dimensional hyperchaotic system based on a flux controlled memristor model,which can generate complex chaotic attractors and be applied to an image encryption algorithm with a large key space.

    The authors of Ref. [21] proposed a two-dimensional multi-parameter fractional discrete Fourier transform and combined it with the three-dimensional Arnold transform to encrypt color images from the row and column directions. Experiments showed that the algorithm has good resistance to attacks. However, in the process of hybrid digital image encryption, which combines a chaotic system with other methods,there are some shortcomings. For example,in the process of combining these methods,the encryption speed is undoubtedly reduced due to the higher number of steps. Therefore,more in-depth research on this aspect is needed.

    Low-dimensional chaotic systems, high-dimensional chaotic systems and hyperchaotic systems all have some disadvantages, such as few control parameters, small key spaces, short periods and limited calculation accuracy,which lead to chaotic pseudo-random sequences with certain periodicity.[22-25]Therefore, to solve these problems, a new four-dimensional hyperchaotic system with a larger key space and better chaotic dynamics performance is proposed in this paper. This system is combined with a cloud model to generate a new sequence,to solve the periodicity problem of chaotic sequences and to be used as a key stream for image encryption.

    With the development of artificial intelligence technology, machine learning and deep learning methods have become increasingly and widely used in the field of computer vision. Tasks such as image processing, image recognition,and target detection are also important branches of information science, and there is an inherent close connection between neural networks and cryptography. As highly nonlinear systems, neural networks possess complex phenomena such as chaotic phenomena.[26]A cross-study between neural networks and cryptography should be feasible but must be mutual. Some scholars have focused on how to use cryptography to better protect the security of neural networks, such as the privacy of training data, and many are concerned about how to use neural networks to better achieve cryptographic goals, such as algorithm design, key management, and cryptanalysis. Representative work includes the following: The authors of Ref. [27] designed a new one-way hash function based on a two-layer chaotic neural network. It has outstanding performance in terms of statistics, key sensitivity, and resistance to attacks. Therefore, in related research, this function is widely discussed. The authors of Ref. [28] were the first to use the synchronized nature of neural mutual learning for key agreement and provided important theoretical support and a practical foundation for subsequent research. The authors of Ref. [29] used neural networks for side-channel energy analysis, which can not only identify the mask value but also efficiently recover key information, thereby achieving effective attacks on advanced encryption standard (AES)cryptographic hardware. The authors of Ref.[30]proposed an image encryption algorithm based on the Lorenz chaotic system and perceptron model that shows good key sensitivity and has high robustness to existing attack methods such as unification, cropping, and noise. The authors of Ref. [31] proposed a parallel diffusion encryption algorithm for images that uses chaotic sequences, where the parallel diffusion improves the efficiency and security of the encryption algorithm. The authors of Ref. [32] used a Lorenz chaotic system to generate a chaotic sequence and then generate two fixed semi-tensor scrambling matrices by using the chaotic sequence. Chaotic positioning and sorting are used to scramble, diffuse and encrypt planar images. This system has a novel structure,introduces complex mathematical models into cryptography, and has high security and usability. The authors of Ref.[33]proposed a chaotic image encryption algorithm based on a matrix semi-tensor product (STP) and a composite key. An image is divided into four sub-blocks, which are then scrambled by the Arnold transform. A ciphertext image is obtained by the diffusion operation of the semi-tensor matrix and the mixed linear-nonlinear coupled map lattice(MLNCML)system,and the algorithm is relatively secure. The operation process of a neural network is essentially a nonlinear operation based on neurons,which is used to better utilize the nonlinear characteristics of a neural network,to enhance the scrambling diffusion effect of the encryption algorithm and to improve the security of the algorithm, with the key stream being combined with a neural mechanism. The essence of the neural mechanism is the use of matrix multiplication to calculate the input value and neuron,but the inverse of this kind of operation has difficulty in obtaining the prepared input value. Therefore, the nonlinear characteristics of a neural network are used in this paper,and the use of image pixels as the input value of the neural network and the key stream as the weight value of the neural network is proposed. The logical XOR operation is used to perform diffusion encryption on the image pixels,and this can not only improve the security of the encryption algorithm but also result in an accurately decrypted image.

    The block cipher is an important component of cryptography that plays an important role in data security. The development of the block cipher algorithm in 1977 ushered in a new era of block cipher analysis. There are many factors affecting the security of block cipher schemes,such as the block length and key length. Most block ciphers use a Feistel structure,with the advantage being that the encryption and decryption processes are very similar or even identical in some cases,and the code size or circuit implementation of this kind of password is almost halved. The Feistel structure is an iterative cipher,and its internal structure is simple. The value range of elements in the Galois field and its algebraic operation rules give it a certain development space in the field of image encryption. The authors of Ref. [34] used a linear fractional transform function to generate strong S-boxes in the Galois field. The authors of Ref.[35]proposed using the Galois field to encrypt digital images. The authors of Ref. [36] proposed replacing the image block, which, combined with the Galois field, enables the ciphertext image to be obtained. Classical block cipher algorithms are based on modern cryptosystems.However,they can limit the consumption of resources and use a single key stream and round function, resulting in poor diffusion and security. To solve these problems, an improved Feistel structure is proposed in this paper, which divides an image into left and right sub-blocks, uses four key streams,constructs two complex wheel functions,maps them to the Galois field as a whole,and obtains a polynomial randomly in the Galois field. After the iterative scrambling diffusion encryption of image pixels, the final ciphertext image is mapped to the real number field. The encryption structure exhibits high diffusion and is simple. The primitive polynomial is randomly selected in the Galois field. In essence, it is unpredictable,and the corresponding decryption function is also one-time,and thus,one-time encryption communication is realized. The cooperative encryption of multiple key streams solves the security problem after the single key stream is cracked,and the round function is reversible to ensure the correct decryption to improve the overall security and anti-attack of the encryption algorithm.

    In summary, most image encryption algorithms based on chaotic systems suffer from the periodicity of chaotic sequences caused by limited accuracy, a highly complex algorithm structure and low security. However, chaotic systems are characterized by good pseudo-random characteristics,unpredictable orbits,and sensitivity to the initial state and control parameters. These characteristics are consistent with many requirements of cryptography. To solve these problems,a new four-dimensional hyperchaotic system with better dynamic performance is proposed in this paper. Combined with the cloud model,a sequence with higher complexity and randomness is generated as the key stream. At the same time,the image is encrypted by combining the neural mechanism,Galois field with improved Feistel structure. Therefore, the security and anti-attack ability of the encryption algorithm are better. Particularly, the new random sequence generated by combining the chaotic system and cloud model is used as the key stream and applied to the subsequent encryption steps,which not only improves the security of the encryption system but also solves the periodicity problem of the chaotic sequence. The nonlinear operation mechanism of neural networks is introduced into the image encryption algorithm,and the diffusion operation is carried out from the row and column directions of the image,which improves the dependence of the key stream and encryption process on the plaintext.Hence,the overall algorithm can effectively resist the chosen-plaintext attack. The essence of combining the improved Feistel encryption structure with the Galois field and randomly selecting the primitive polynomial is that it is unpredictable. The image pixels are scrambled and diffused in the Galois field, which results in one encryption at a time and further improves the overall security of the algorithm. The contributions of this paper are as follows:

    1) A new four-dimensional hyperchaotic system is proposed.

    2) The new four-dimensional hyperchaotic system and cloud model generate more complex random sequences as the key stream and address the periodicity issues of chaotic systems.

    3) A key stream is combined with a neural mechanism,the Galois field and the improved Feistel network to encrypt images in this paper.

    4) The experimental simulation results show that the proposed encryption algorithm can reduce the computational complexity, ensure the security of encrypted images in transmission,and thwart attacks during image transmission.

    The structure of this paper is as follows. In Section 2, a new hyperchaotic system with a new key stream sequence generator, a neural mechanism and an improved Feistel structure is proposed.In Section 3,a new image encryption algorithm is proposed, and in Section 4, simulation results are given. The security performance analysis of the encryption algorithm is presented in Section 5. Finally,the conclusion of this paper is presented in Section 6.

    2. Related work

    In this paper, a new four-dimensional hyperchaotic system with a larger key space and chaotic dynamics, a cloud model, a neural mechanism, a Galois field and an improved Feistel network are combined to scramble and spread the image encryption to obtain a better image encryption algorithm with security and anti-attack properties. The related principles and innovations are introduced in the following.

    2.1. New four-dimensional hyperchaotic system

    Due to the excellent properties of high-dimensional chaotic systems, the following new four-dimensional hyperchaotic system is proposed:

    wherea=25,b=0.1,c=40,d=3,e=0.1,andk=8,and the hyperchaotic system(1)is in a chaotic state. When the initial value of system(1)is set to(1,1,1,1),the phase diagram of the system is as depicted in Fig.1.

    Fig. 1. System (1) phase diagram. (a) x-y-z phase, (b) x-y phase, (c)y-w phase,and(d)y-z phase.

    Figure 1 shows that in the range of the phase space, the orbits of the system repel each other,separate,shrink and fold,and fold back and forth countless times, meaning that system(1)is in a hyperchaotic state.

    2.2. Analysis of the basic chaotic dynamic behavior

    2.2.1. Dissipation

    According to dissipative theory, the ΔVvalue of system(1) is less than 0. Thus, system (1) is dissipative and has a chaotic attractor

    Letλbe the eigenvalue andIbe the fourth-order identity matrix. By solving the determinant|λI-J|=0,we obtain four eigenvalues,λ1=-65.3360,λ2= 39.2584,λ3=-0.0244 andλ4=-3.According to the judgement condition of Routh-Hurwitz, (0, 0, 0, 0) is an unstable saddle point. Thus, system(1)has chaotic attractors.

    2.2.3. Lyapunov exponent

    The Lyapunov exponent is an important index for measuring the chaotic state of nonlinear dynamic systems.[37-41]When there is only one positive value in the Lyapunov exponent, a chaotic state is indicated. When there are two or more positive values in the Lyapunov exponents, a hyperchaotic state is indicated. The chaotic control parameters of system (1) area=25,b=0.1,c=40,d=3,e=0.1 andk=8,the number of iterations is 200,and the four Lyapunov exponents of system (1) areLE1=2.3863,LE2=-0.0039,LE3=0.0219 andLE4=-31.5042,which have two positive Lyapunov exponents, showing that system (1) is in a hyperchaotic state. The dimensionDL=3+∑3i=1Li/|L4|=3.0783,and the dimension of the Lyapunov exponent is of fractional order, which indicates that system (1) is in a hyperchaotic state. The Lyapunov exponent spectrum is shown in Fig.2.

    Fig.2. The Lyapunov exponents of system(1).

    Figure 2 shows that system(1)has two positive Lyapunov exponents,indicating a hyperchaotic state.

    2.2.4. Poincare section

    The distribution of points on a Poincare section can be used to verify the chaotic state of a nonlinear dynamic system.If there are a large number of points on the Poincare section,which are flaky and have a fractal structure, the system is in a chaotic state.[42-46]Figure 3 shows the Poincare sections in thex-y,z-w,y-wandy-zplanes.

    Fig.3. Poincare sections: (a)x-y plane; (b)z-w plane; (c)y-w plane;(c)y-z plane.

    Figure 3 shows that a large number of points are in a bifurcated state;hence,system(1)is in a chaotic state.

    2.2.5. Bifurcation diagram

    The projection of the system on any coordinate axis forms a bifurcation diagram as the parameters change. If there is one point or several points on the bifurcation diagram,the system is in a periodic stable state,and if there are irregular points on the bifurcation diagram, the system is in a chaotic state.[47]The bifurcation diagram of system (1) whenb ∈[0,0.2] is shown in Fig. 4. The two-dimensional Lyapunov exponent spectrum of the four-dimensional hyperchaotic system (1)witha=25,c=40,d=3,e=0.1,b ∈[-0.1,0.3],k ∈[2,8]and the Lyapunov exponent spectrum withb ∈[-0.1,0.3]andk ∈[2,8]are shown in Fig.5.

    Fig.4. Bifurcation diagram relative to the parameter b.

    Figures 4 and 5 show that whena=25,c=40,d=3,e=0.1,b ∈[-0.1,0.3], andk ∈[2,8], the two-dimensional Lyapunov exponent spectrum of system(1)hasLE1=2.2053,LE2=0.0067,LE3=-0.0254 andLE4=-31.3865, which have two positive Lyapunov exponents and the sum of the Lyapunov exponents is-29.1999<0, and shows that system (1) has chaotic characteristics. Whena= 25,c= 40,d=3,e=0.1,k=8 andb ∈[-0.1,0.3],the Lyapunov exponent spectrum of system(1)hasLE1=1.6772,LE2=0.0063,LE3=-0.1525 andLE4=-30.8309, which have two positive Lyapunov exponents, and the sum of the Lyapunov exponents is-29.2999<0. The bifurcation diagram presents a dense distribution state,which indicates that system(1)has chaotic characteristics. Whena=25,b=0.2,c=40,d=3,e=0.1,andk ∈[2,8],the Lyapunov exponent spectrum of system(1)hasLE1=2.2053,LE2=0.0067,LE3=-0.0236 andLE4=-31.3845, which have two positive Lyapunov exponents,and the sum of the Lyapunov exponents is-29.1960<0, and shows that system (1) has chaotic characteristics. The bifurcation diagram presents a dense distribution state,which indicates that system(1)has chaotic characteristics.

    2.2.6. NIST test

    The test package provided by the National Institute of Standards and Technology(NIST),i.e.,the NIST random test,includes 15 test items that can be used to test the randomness of binary sequences of arbitrary length generated by hardware and software used as secret random or pseudo-random number generators. These testing items are mainly used to determine a variety of types of non-randomness that may exist in a sequence.[49,50]The results of the NIST randomness test are expressed as aP-value. Leta ∈[0.001,0.01] be the significance level interval. WhenP-value>a, the results pass the randomness test;otherwise,they do not pass,which indicates that the chaotic sequence is not random. The four channel chaotic sequences of system (1) are tested by the NIST random test,the results of which are shown in Table 1.

    Fig.5. Lyapunov exponent spectrum relative to the parameters b, k. (a)-(d) The two-dimensional Lyapunov exponent spectrum of the fourdimensional hyperchaotic system(1)relative to the parameters b,k. (e)Lyapunov exponent spectrum relative to the parameter b. (f)Lyapunov exponent spectrum relative to the parameter k.

    Table 1. NIST test.

    Table 1 shows thatP-value>0.001 in all 15 tests, and thus, the chaotic sequence passes the NIST randomness test.Hence, the chaotic sequence of system (1) proposed in this paper can meet the randomness requirements.

    2.3. New key stream sequence generator

    The cloud model is an uncertain transformation model between a certain qualitative concept and its quantitative expression expressed by a linguistic value[51,52]and has three numerical characteristics, the expected valueEx, entropyEnand superentropyHe.Exis the position of the cloud center of gravity in the cloud droplet group,which is defined as follows:wherexiis the cloud droplet sequence andRNis a normal random number.

    Although the data generated by the cloud model do not have a uniform distribution, the combination of the cloud model and chaotic system can be used to solve the periodic problem of chaotic sequences. Thus, it would have a good encryption effect in encryption applications. Therefore, the cloud model and chaotic sequence are combined to construct a new key stream sequence generator for encryption applications. The structure of the new encryption key stream sequence generator is as follows:

    A flow chart of the new key stream sequence generator is shown in Fig.6.

    Fig.6. Structure diagram of the new key stream sequence generator.

    With the combination of the chaotic sequences of four phases of the hyperchaotic system (1) with the cloud model,the generated new random sequence is analyzed,with the randomness and complexity tested by the approximate entropy,spectral entropy and 0-1 test,as shown in Table 2.

    Table 2. The randomness and complexity of random sequences.

    Table 2 shows that the new key stream sequence has good randomness and complexity; thus,it is suitable for image encryption.

    2.4. Neural mechanism

    Artificial neural networks are based on the function of biological neural networks and use mathematical methods to build networks to achieve artificial perception. A neural network structure is considered when building an artificial neural network. At present, approximately 40 kinds of neural network models have been developed.[53,54]According to the structure of the artificial neural network, it can be classified as either a feedforward neural network or a feedback neural network. A feedforward neural network is simple and easy to operate,and a feedforward network with no feedback nodes generally receives a signal from the upper level and propagates it to the next level,as shown in Fig.7.

    Fig.7. Feedforward network structure diagram.

    In Fig.7,weight is the connection between neurons andfis the transfer function of the network and the calculation node of the output-layer neurons. Neural networks are an important branch of information science,and there is a close relationship between neural networks and cryptography. The characteristics of neural networks, such as adaptability, high fault tolerance and associative memory,also meet the requirements of cryptography for key management and attack resistance.However,neural networks are not suitable for image encryption because they use matrix multiplication. The transfer function of a network does not accurately restore the data information in the output to the input.Thus,it cannot be used in an image decryption algorithm.In a neural network,the weight is obtained by training the network, and the operation mechanism of the neural network is essentially based on the principle of the neuron working mechanismy=f(wx+b), wherexis the input data,yis the output data,wis the weight,bis the bias, andf(·)is the activation function,which is introduced into image encryption in this paper. The sequence key stream of arbitrary random length generated by the combined chaotic system and cloud model is used as the weight according to the image size to be encrypted. The weight matrix of corresponding size is then generated. Combined with the working principle of neurons,the image pixels are diffused and encrypted from the row and column directions of the image by matrix multiplication to obtain the ciphertext image.

    Assuming that the plaintext image isPand the size isM×N,the plaintext image is used as the input of the feedforward neural network,and the key stream is used as the weight value to diffuse the plaintext image to obtain the ciphertext image. We use the working mechanism of the neural network,and then the plaintext image pixels as the input of the neural network. The key stream is divided into blocks as neurons,and the traditional matrix multiplication is replaced by a logical XOR operator. The calculation process is as follows:

    whereC(i,j)is a ciphertext image,keyrow(i,j)is the row key stream,and keycolumn(i,j)is the column key stream.

    Through this operation,the security of image encryption is improved, and a new idea is provided for the connection between neural mechanisms and cryptography.

    2.5. Improved Feistel structure

    Based on the principles of security and the block cipher design, the design of a block cipher structure involves finding an algorithm that can easily and quickly encrypt and diffuse the current input plaintext from a sufficiently good permutation set under the control of a key. The Feistel structure in block cryptography is based on the modern cipher system,which groups the plaintext and then scrambles and diffuses the plaintext information with the round function replacement method combined with the key.The encryption and decryption process appears in pairs. Although it can reduce resource consumption,it adopts a single key stream and round function,resulting in poor diffusion and security.To solve these problems,an improved Feistel structure is proposed. The improved Feistel structure combines the advantages of the original Feistel structure and divides the image into left and right sub-blocks.Primitive polynomials are randomly constructed in the Galois field, and image sub-blocks, the key stream and the wheel function are mapped to the Galois field for scrambling diffusion encryption. After iterative scrambling diffusion encryption of the image pixels,the final image is mapped to the real number field to obtain the final ciphertext image. The encryption structure has high diffusion and a simple structure. The primitive polynomial is randomly selected in the Galois field.In essence,it is unpredictable,and the corresponding decryption function is one-time; thus, one-time encryption communication is realized. The cooperative encryption of multiple key streams solves the security problem after the single key stream is cracked, and the round function is reversible to ensure the correct decryption to improve the overall security and anti-attack ability of the encryption algorithm.

    Assuming that the plaintext image isPand the size isM×N, the image is divided into left sub-blockLand right sub-blockR. The key stream sequences are key1, key2, key3 and key4. The single-round encryption process is as follows:

    whereLiandRiis the sub-block before encryption,Li+1andRi+1is the sub-block after encryption,||is the connection symbol,andCis the ciphertext image.

    The encryption structure is shown in Fig.8.

    Fig.8. Encryption flow chart of the improved Feistel structure.

    Decryption is the reverse process of encryption. Assuming that the ciphertext image isCand the size isM×N, the ciphertext image is divided into left sub-blockLand right subblockR. The key stream sequences are key1,key2, key3 and key4. The single-round decryption process is as follows:

    whereLi+1andRi+1is the sub-block before decryption,LiandRiis the sub-block after decryption,||is the connection symbol,andPis the decryption image.

    The decryption process is shown in Fig.9.

    Fig.9. Decryption flow chart of the improved Feistel structure.

    2.6. Galois field operation

    The order of the Galois field(finite field)GF(Pn)must be a prime powerPn,wherenis a positive integer. For example,GF(28)is a finite field composed of 28elements,and all elements are integers from 0 to 28-1. All elements inGF(28)can be uniquely represented by an 8-bit sequence. Any polynomialf(x)onGF(28)is

    whereai ∈{0,1},i=0,1,2,...,7. Therefore, the elements onGF(28)and the polynomials onGF(28)have a one-to-one correspondence. According to the given primitive polynomials onGF(28),by using mathematical operations such as addition, subtraction, multiplication and division in the Galois field,the element value range of the new matrix obtained after the mathematical operations ofGF(28)is still[0,28-1]. The multiplication operation onGF(28)breaks through the limitation of the numerical operation in previous digital image encryption algorithms. This breakthrough not only accords with the value characteristics of the grey value of grey image pixels but also enriches the diffusion operation of the encryption algorithm. Therefore,the encryption and decryption process of the improved Feistel network is moved to the Galois field in this paper. The overall security of the encryption algorithm is thus improved.

    3. Encryption and decryption algorithm

    The encryption algorithm proposed in this paper includes three main stages. Firstly, through the new four-dimensional supermodel, the chaotic system is combined with the cloud model,and the generated sequence is used as the key stream.The sequence not only has good randomness and complexity but also solves the periodicity problem of the chaos.Secondly,using a neural mechanism,the plaintext image pixels are used as the input data of the neural network, and the key stream sequence is divided into blocks as the weight. Then,the neural network logic XOR diffusion operation is carried out to obtain the middle ciphertext image. Finally,to improve the security of the algorithm,the improved Feistel structure is used to scramble the middle ciphertext image in the Galois field and to obtain the final ciphertext image. The encryption and decryption process is shown in Fig.10.

    Fig.10. Encryption and decryption flow chart.

    3.1. Image encryption algorithm

    Assuming that the plaintext image isPand the size isM×N,the specific encryption steps are as follows.

    3.1.1. Key stream generation

    Step 1 Calculate the initial values init1, init2, init3and init4of the hyperchaotic system(1).The process is as follows:

    where sum(·)is the sum operation and mod(·)is the modular operation.

    Step 2 The initial values init1, init2, init3and init4are brought into system (1) and combined with the cloud

    wherek=1,2,...,256,i=1,2,...,256,bitxor(·)is the XOR operation,and mod(·)is the modular operation.

    3.1.3. Generation of the final ciphertext image

    The Feistel packet structure is simple and offers high encryption efficiency. Additionally,the Galois field can map image pixels according to different primitive polynomials,which

    whereGF(·) is the multiplication in the Galois field,F1andF2are round functions andi=1,2,...,M×(N/2).

    3.2. Image decryption algorithm

    The image encryption algorithm designed in this paper uses a symmetric encryption structure. Therefore, the corresponding decryption algorithm is the reverse process of the encryption algorithm.The detailed decryption steps are as follows.

    Step 1 The received key is taken as the initial value of the hyperchaotic system(1),and the key stream in the decryption process is generated iteratively with the cloud model.

    Step 2 The ciphertext image is decrypted by using the key stream combined with the improved Feistel decryption structure and Galois field,and image matrixP1is obtained.

    Step 3 Image matrixP1is used as the input of the neural network,the key stream is output,and the XOR operation is still applied. The function is activated to take the modulus operation to obtain image matrixP2.

    Step 4 Image matrixP2is combined with the key stream for the scrambling inverse operation, and the final decrypted image matrixP3is obtained.

    4. Experimental results

    We select a size of 256×256 for the plaintext image experiment, and the initial value is generated by a plaintext image calculation. The plaintext images, encryption and decryption results obtained on a Windows 7 platform with 4 GB of memory and a MATLAB 2018b simulation are shown in Fig.11.

    Fig.11. Encryption and decryption results. (a1)is the Lena plaintext image,(a2)is the Lena ciphertext image,(a3)is the Lena decrypt image,(b1) is the cameraman plaintext image histogram, (b2) is the cameraman ciphertext image, (b3) is the cameraman decrypt image, (c1) is the remote-sensing plaintext image,(c2)is the remote-sensing ciphertext image,(c3)is the remote-sensing decrypt image,(d1)is the CT plaintext image,(d2)is the CT ciphertext image,and(d3)is the CT decrypt image.

    5. Safety analysis

    5.1. Histogram analysis

    A histogram reflects the distribution of image pixel values. If the histogram distribution is not uniform, attackers can obtain information from it. Thus, the plaintext image histogram should be evenly distributed to resist statistical attacks.[55-57]Figure 12 shows the histograms of Lena plaintext images and ciphertext images.

    Figure 12 shows that the histogram distribution of the ciphertext image is uniform, completely different from that of the plaintext image. In addition, the histogram variance can be used to measure the uniformity of a histogram.[58,59]The definition is as follows:

    whereX={x0,x1,...,x255}is the value vector of the histogram,xiandxjare the number of grey values ofiandj,respectively, andnis the grey level. The variance results of the ciphertext images are listed in Table 3.

    Table 3 shows that the histogram variance of the proposed method is large and that all algorithms meet the requirement of a standard value greater than 293.2478.

    Fig. 12. Histograms of a plaintext image and a ciphertext image. (a)is the Lena plaintext image histogram, and (b) is the Lena ciphertext image histogram.

    Table 3. Histogram variance.

    5.2. Information entropy analysis

    Information entropy measures the randomness of information.[63,64]The information entropyH(m)of message sourcemis defined as

    wherep(mi)is the probability ofmiandNis the digit capacity ofmi. The closer the ciphertext entropy of the grey image is to 8, the more chaotic the image is. Table 4 lists the information entropy of the test image and ciphertext image and the results of a comparison with other schemes. The information entropy of the ciphertext image obtained by the proposed encryption algorithm is consistent with those in Refs.[60-62]and slightly higher than those of the other two encryption algorithms; thus, the ciphertext image encrypted by the proposed encryption algorithm has good randomness.

    Table 4 shows that the information entropy of the ciphertext image in this paper is higher than that of the related literature;thus,the ciphertext encrypted by the proposed algorithm has good randomness.

    Table 4. Information entropy.

    5.3. Key space analysis

    When the key space of an encryption system is larger and the key is more complex,the ability of the system to resist exhaustive attacks will be stronger. The encryption space is analyzed from the perspective of cryptography. If the key space of the algorithm is greater than 2100≈1030,it can be said that the minimum security requirements have been met.[63-68]In the encryption process proposed in this paper,the parametersa,b,c,d,e,kand initial valuesx,y,z,wof the new fourdimensional hyperchaotic system can be used as keys for encryption. Generally, on a 64-bit computer operating system,the precision of the floating-point number is approximately 10-15. Therefore, the key space in this chapter is approximately (1015)10=10150, which shows that the key space is larger than the security level; thus,it can resist exhaustive attacks.

    5.4. Key sensitivity analysis

    The ideal cryptosystem should be highly sensitive to the key,and any slight change to the key will lead to an incorrect decryption image.[69,70]Figure 13(a) is the Lena image after decryption with the correct key,and Figs.13(b)-13(d)are the decrypted images after adding 10-14to the keysa,bandc,respectively.

    Fig.13.Key sensitivity analysis:(a)decrypted image of the correct key;(b)decrypted image of a+10-14;(c)decrypted image of b+10-14;and(d)decrypted image of c+10-14.

    Figure 13 shows that any slight change to the key leads to an incorrect decryption image; hence,the algorithm is highly sensitive to the key.

    5.5. Correlation analysis

    The strong correlation between adjacent pixels in plaintext images is an inherent attribute of images.[71]To test the correlation of the ciphertext image generated by the proposed encryption algorithm,we randomly select 5000 pairs of adjacent pixels from multiple ciphertext images and calculate the correlation coefficient between the adjacent pixels through the following equation:

    where

    x,yindicate the location of the adjacent pixel, andNis the total number of pixels. Figure 14 shows the correlation distribution of the Lena plaintext image and the corresponding ciphertext image in the horizontal,vertical and diagonal directions. There is a strong correlation between adjacent pixels in the Lena plaintext image,and the correlation between adjacent pixels of the ciphertext image is very low. Table 5 shows a comparison of the results of the correlation coefficients with those of other encryption algorithms.

    Fig. 14. Correlations between adjacent pixels. (a) Horizontal correlations for the Lena plain image. (b) Vertical correlations for the Lena ciphertext image. (c) Diagonal correlation for the Lena plain image. (d) Horizontal correlation for the Lena ciphertext image. (e) Vertical correlation for the Lena plain image. (f)Diagonal correlation for the Lena ciphertext image.

    Table 5 shows a comparison with the ciphertext images produced in Refs. [60-62]. Clearly, the correlation between adjacent pixels in the ciphertext images produced by the proposed encryption algorithm is very low.

    Table 5. The resulting correlation coefficients.

    5.6. Differential attack analysis

    The key sensitivity reflects the key sensitivity of the decryption algorithm. In this section, the change rate of the number of pixels (NPCR) and the unified average changing intensity(UACI)are used to quantitatively analyze the differences between plaintext images and decrypted images.[72]The NPCR and UACI can be expressed by

    Ideally, the expected NPCR and UACI values would be 99.6094% and 33.4635%. We randomly select 1000 pixels at different positions and change the lowest position of each pixel. Then, we compare the new ciphertext image with the original ciphertext image and calculate the average values of the NPCR and UACI.The test results and results of a comparison with other methods are shown in Tables 6 and 7.

    Table 6. NPCR(100%).

    Table 7. UACI(100%).

    Tables 6 and 7 show that the NPCR and UACI of the ciphertext image of the proposed algorithm are very close to the theoretical values of 99.6094% and 33.4635%, respectively,meaning that the proposed algorithm can effectively resist differential attacks.

    5.7. Time-complexity analysis

    In practical applications, in addition to the evaluation of the security of the encryption algorithm, the performance of the encryption algorithm is evaluated; for this purpose, the time complexity is used. The time complexity of the proposed encryption algorithm includes the following three main stages:the key generation stage,the key stream generation stage and the encryption stage. Generally,the complexity of image preprocessing is negligible. The total time complexity of the proposed encryption algorithm isO(2MN). In addition, a highdimensional chaotic system has a complex structure,requires a large number of computations and has a high physical cost.Therefore, when encrypting large-scale plaintext images, the first step is to generate the key stream and then to encrypt each image block in parallel to improve the efficiency of the algorithm.

    6. Conclusions

    A new image encryption method is proposed in this paper that offers high security and is based on a new fourdimensional hyperchaotic system, a cloud model, a neural mechanism, an improved Feistel network and a Galois field.The encryption algorithm includes three main stages. Firstly,a new four-dimensional hyperchaotic system is constructed and combined with a cloud model to generate a sequence as a key stream. The sequence has a large key space and solves the problem of chaotic system periodicity. Secondly, the key stream is combined with a neural mechanism, an improved Feistel network and a Galois field to encrypt the image by pixel scrambling and diffusion. Finally, the security of the ciphertext image is analysed to prove the security of the proposed image encryption algorithm.The algorithm has a simple structure and high security and can meet the needs of practical encryption applications.

    Acknowledgements

    We thank all the teachers in the research group. Project supported by the National Natural Science Foundation of China (Grant No. 61973248) and the Key Project of the Shaanxi Key Research and Development Program, China(Grant No.2018ZDXM-GY-089).

    猜你喜歡
    鵬飛
    樊應(yīng)舉
    書香兩岸(2020年3期)2020-06-29 12:33:45
    漫畫
    Quality Control for Traditional Medicines - Chinese Crude Drugs
    為了避嫌
    雜文月刊(2019年18期)2019-12-04 08:30:40
    懲“前”毖“后”
    21世紀(jì)(2019年10期)2019-11-02 03:17:02
    執(zhí)“迷”不悟
    21世紀(jì)(2019年10期)2019-11-02 03:17:02
    舉賢
    21世紀(jì)(2019年9期)2019-10-12 06:33:44
    漫畫
    粗看“段”,細(xì)看“端”
    漫畫
    露出奶头的视频| 成人美女网站在线观看视频| 国产 一区 欧美 日韩| 精品午夜福利视频在线观看一区| 亚洲欧美精品综合久久99| 国产大屁股一区二区在线视频| 亚洲三级黄色毛片| av专区在线播放| 搞女人的毛片| 亚洲电影在线观看av| 91久久精品电影网| 国产三级在线视频| 久久久久久久久大av| 国产不卡一卡二| 搡老岳熟女国产| 日韩中字成人| 婷婷色综合大香蕉| 成人三级黄色视频| 深夜a级毛片| 搡老岳熟女国产| 久久精品国产清高在天天线| 免费高清视频大片| 哪里可以看免费的av片| 天堂√8在线中文| 日本精品一区二区三区蜜桃| 最近视频中文字幕2019在线8| 亚洲国产精品成人综合色| 亚洲欧美日韩高清专用| 在线看三级毛片| 午夜久久久久精精品| 免费av观看视频| 成人永久免费在线观看视频| 久久亚洲精品不卡| 噜噜噜噜噜久久久久久91| 久久午夜福利片| 亚洲欧美清纯卡通| 91久久精品国产一区二区成人| АⅤ资源中文在线天堂| 搡女人真爽免费视频火全软件 | 能在线免费观看的黄片| 乱系列少妇在线播放| 免费看av在线观看网站| 内地一区二区视频在线| 中文字幕人妻熟人妻熟丝袜美| 天堂av国产一区二区熟女人妻| 搡老熟女国产l中国老女人| 你懂的网址亚洲精品在线观看 | 女的被弄到高潮叫床怎么办| 午夜久久久久精精品| a级一级毛片免费在线观看| 日韩,欧美,国产一区二区三区 | 中文字幕av在线有码专区| 99久久精品一区二区三区| 亚洲经典国产精华液单| 不卡视频在线观看欧美| 亚洲欧美日韩无卡精品| av卡一久久| 成年av动漫网址| 国产精品国产高清国产av| 欧美日韩精品成人综合77777| 午夜亚洲福利在线播放| 九九爱精品视频在线观看| 色综合色国产| 久久婷婷人人爽人人干人人爱| av卡一久久| 别揉我奶头 嗯啊视频| 白带黄色成豆腐渣| 少妇被粗大猛烈的视频| 国产精华一区二区三区| 天堂av国产一区二区熟女人妻| 22中文网久久字幕| 女生性感内裤真人,穿戴方法视频| 国产淫片久久久久久久久| 啦啦啦韩国在线观看视频| 12—13女人毛片做爰片一| 亚洲内射少妇av| 国产真实乱freesex| 免费人成在线观看视频色| 国产免费一级a男人的天堂| 波多野结衣高清作品| 久久久国产成人免费| 美女被艹到高潮喷水动态| 久久久久久九九精品二区国产| 亚洲无线在线观看| a级毛色黄片| 亚洲性久久影院| 精品人妻视频免费看| 天美传媒精品一区二区| 别揉我奶头 嗯啊视频| 插逼视频在线观看| 精品久久国产蜜桃| 一级av片app| 国产精品国产高清国产av| 草草在线视频免费看| 一级毛片我不卡| 在线播放国产精品三级| 国产高清视频在线播放一区| 综合色丁香网| 中文字幕免费在线视频6| 变态另类成人亚洲欧美熟女| 亚洲18禁久久av| 国产成人影院久久av| 国产成人a区在线观看| 国产成人精品久久久久久| 国产精品一区二区三区四区久久| 韩国av在线不卡| 国产精品不卡视频一区二区| 国产男靠女视频免费网站| 欧美日韩乱码在线| 精品人妻一区二区三区麻豆 | 夜夜爽天天搞| 欧美最黄视频在线播放免费| 少妇人妻一区二区三区视频| 毛片女人毛片| av在线亚洲专区| 日韩中字成人| 国产成人影院久久av| 啦啦啦韩国在线观看视频| 亚洲精品在线观看二区| 亚洲七黄色美女视频| 日本在线视频免费播放| 一进一出抽搐gif免费好疼| 丰满乱子伦码专区| 一级av片app| 亚洲精品一卡2卡三卡4卡5卡| 日韩欧美一区二区三区在线观看| 综合色丁香网| 色吧在线观看| 成人特级av手机在线观看| av女优亚洲男人天堂| 精品久久久久久久久久免费视频| 特级一级黄色大片| 精品人妻偷拍中文字幕| 91久久精品国产一区二区三区| 非洲黑人性xxxx精品又粗又长| 亚洲在线观看片| 老熟妇乱子伦视频在线观看| 亚洲精品亚洲一区二区| 亚洲乱码一区二区免费版| 看黄色毛片网站| 国产成人一区二区在线| 欧美日韩综合久久久久久| 精品一区二区三区视频在线观看免费| 亚洲国产精品sss在线观看| 日韩制服骚丝袜av| 在线观看美女被高潮喷水网站| 成人性生交大片免费视频hd| 国产又黄又爽又无遮挡在线| 欧美日韩一区二区视频在线观看视频在线 | 波多野结衣巨乳人妻| 精品一区二区三区视频在线观看免费| 看非洲黑人一级黄片| 乱人视频在线观看| 好男人在线观看高清免费视频| 内地一区二区视频在线| 搞女人的毛片| 2021天堂中文幕一二区在线观| 成人特级av手机在线观看| 简卡轻食公司| 免费观看精品视频网站| 久久精品91蜜桃| 99久久精品热视频| 久久6这里有精品| 成人亚洲精品av一区二区| 亚洲人成网站在线观看播放| 天堂av国产一区二区熟女人妻| av女优亚洲男人天堂| 国产亚洲欧美98| 99热精品在线国产| 午夜福利在线观看免费完整高清在 | 精品久久久久久久人妻蜜臀av| 欧美成人免费av一区二区三区| 欧美日本视频| 你懂的网址亚洲精品在线观看 | 国产精品美女特级片免费视频播放器| 亚洲国产精品国产精品| 免费av不卡在线播放| 男女下面进入的视频免费午夜| 日日干狠狠操夜夜爽| 精品日产1卡2卡| 亚洲中文日韩欧美视频| 夜夜看夜夜爽夜夜摸| 久久久成人免费电影| 精品一区二区三区视频在线| 亚洲av五月六月丁香网| 久久久久久大精品| 久久人妻av系列| av天堂在线播放| 18禁在线无遮挡免费观看视频 | 两个人视频免费观看高清| 又黄又爽又刺激的免费视频.| av在线观看视频网站免费| 性插视频无遮挡在线免费观看| 亚洲欧美日韩高清在线视频| 久久久久精品国产欧美久久久| 天堂影院成人在线观看| 1000部很黄的大片| 干丝袜人妻中文字幕| av国产免费在线观看| av天堂中文字幕网| 两性午夜刺激爽爽歪歪视频在线观看| 免费人成在线观看视频色| 国内久久婷婷六月综合欲色啪| 亚洲第一电影网av| 观看免费一级毛片| 国产乱人偷精品视频| 亚洲国产精品国产精品| 淫妇啪啪啪对白视频| 99热精品在线国产| 在线播放无遮挡| 亚洲性久久影院| 色5月婷婷丁香| 人妻制服诱惑在线中文字幕| 青春草视频在线免费观看| 午夜免费男女啪啪视频观看 | 搡女人真爽免费视频火全软件 | 亚洲av第一区精品v没综合| 99久久中文字幕三级久久日本| 3wmmmm亚洲av在线观看| 18禁黄网站禁片免费观看直播| 成人三级黄色视频| avwww免费| 久久这里只有精品中国| 国产成人91sexporn| 男女边吃奶边做爰视频| 中文字幕熟女人妻在线| 中文字幕熟女人妻在线| 亚洲欧美日韩卡通动漫| 免费观看的影片在线观看| 国产美女午夜福利| 欧美3d第一页| 九九爱精品视频在线观看| 精品久久久久久久久久久久久| 国产高清三级在线| 99久久精品一区二区三区| 国产精品乱码一区二三区的特点| 亚洲一区二区三区色噜噜| 欧美最新免费一区二区三区| 欧美日韩综合久久久久久| 在线观看免费视频日本深夜| 熟女电影av网| 国产精品一区二区性色av| 男人舔奶头视频| 美女免费视频网站| 香蕉av资源在线| 国产精品女同一区二区软件| 91在线精品国自产拍蜜月| videossex国产| 最近在线观看免费完整版| 91精品国产九色| 淫妇啪啪啪对白视频| 国产午夜精品论理片| 国产视频一区二区在线看| 亚洲精品日韩在线中文字幕 | 97碰自拍视频| 午夜a级毛片| 国产精品人妻久久久影院| 亚洲内射少妇av| 听说在线观看完整版免费高清| 一夜夜www| 日韩欧美精品免费久久| 精品人妻熟女av久视频| 成年av动漫网址| 小蜜桃在线观看免费完整版高清| 黄色配什么色好看| 午夜福利在线观看免费完整高清在 | 日韩欧美免费精品| 一级毛片我不卡| 国产亚洲欧美98| 青春草视频在线免费观看| 两性午夜刺激爽爽歪歪视频在线观看| 插逼视频在线观看| 亚洲自拍偷在线| 久久久久久国产a免费观看| 亚洲婷婷狠狠爱综合网| 国产精品嫩草影院av在线观看| 国产精品久久久久久久久免| 国产91av在线免费观看| 啦啦啦韩国在线观看视频| 天天一区二区日本电影三级| av.在线天堂| 久久欧美精品欧美久久欧美| 国产真实伦视频高清在线观看| 看非洲黑人一级黄片| 99热网站在线观看| 国产成年人精品一区二区| 少妇的逼好多水| 91在线精品国自产拍蜜月| 一本一本综合久久| 午夜激情福利司机影院| 如何舔出高潮| 99久久精品一区二区三区| 波野结衣二区三区在线| 亚洲中文字幕一区二区三区有码在线看| 久久人人精品亚洲av| 一进一出好大好爽视频| 国产亚洲91精品色在线| 三级国产精品欧美在线观看| 美女免费视频网站| 亚洲精品色激情综合| 国产精品国产三级国产av玫瑰| 99热只有精品国产| 国产成人91sexporn| 九九久久精品国产亚洲av麻豆| 亚洲精品国产成人久久av| 男女视频在线观看网站免费| 国产精品美女特级片免费视频播放器| 天堂网av新在线| 此物有八面人人有两片| 18禁在线播放成人免费| 成人亚洲精品av一区二区| 99视频精品全部免费 在线| 波多野结衣高清作品| 国产黄色视频一区二区在线观看 | 一个人观看的视频www高清免费观看| 午夜久久久久精精品| 亚洲第一区二区三区不卡| 有码 亚洲区| 男人狂女人下面高潮的视频| .国产精品久久| 黑人高潮一二区| 韩国av在线不卡| 精品福利观看| 亚洲av美国av| 女人被狂操c到高潮| 欧美最新免费一区二区三区| 色哟哟·www| 女的被弄到高潮叫床怎么办| 99视频精品全部免费 在线| 国国产精品蜜臀av免费| 麻豆乱淫一区二区| 伊人久久精品亚洲午夜| 99久久中文字幕三级久久日本| 51国产日韩欧美| 不卡视频在线观看欧美| 亚洲一级一片aⅴ在线观看| 乱系列少妇在线播放| 伦精品一区二区三区| 亚洲av.av天堂| 在线看三级毛片| 日本成人三级电影网站| 长腿黑丝高跟| 韩国av在线不卡| av福利片在线观看| 九色成人免费人妻av| 中出人妻视频一区二区| 婷婷亚洲欧美| 九色成人免费人妻av| 极品教师在线视频| 亚洲成人av在线免费| 久久久久久国产a免费观看| 国产91av在线免费观看| 男人舔奶头视频| 99riav亚洲国产免费| 国产av一区在线观看免费| 日本-黄色视频高清免费观看| 国产欧美日韩精品亚洲av| 国产单亲对白刺激| 欧美三级亚洲精品| 少妇猛男粗大的猛烈进出视频 | 国产精品国产三级国产av玫瑰| 精品无人区乱码1区二区| 欧美日韩综合久久久久久| 久久精品综合一区二区三区| 如何舔出高潮| av.在线天堂| 免费看美女性在线毛片视频| 亚洲第一电影网av| 久久精品人妻少妇| 久久韩国三级中文字幕| 亚洲在线观看片| 国产精品无大码| 日本欧美国产在线视频| 日韩国内少妇激情av| 91麻豆精品激情在线观看国产| 久久久久性生活片| 国产熟女欧美一区二区| 欧美性感艳星| 最近最新中文字幕大全电影3| av在线观看视频网站免费| 18禁在线无遮挡免费观看视频 | 色综合站精品国产| 国产久久久一区二区三区| 在线观看av片永久免费下载| 亚洲精品影视一区二区三区av| a级一级毛片免费在线观看| 高清日韩中文字幕在线| 国产精品久久久久久久久免| 免费在线观看影片大全网站| 两个人视频免费观看高清| 赤兔流量卡办理| www.色视频.com| 99热这里只有是精品在线观看| 亚洲电影在线观看av| 久久6这里有精品| 99精品在免费线老司机午夜| www日本黄色视频网| 国产淫片久久久久久久久| 一个人看的www免费观看视频| 舔av片在线| 精品国内亚洲2022精品成人| 久久这里只有精品中国| 可以在线观看的亚洲视频| 九九在线视频观看精品| 美女xxoo啪啪120秒动态图| 成人综合一区亚洲| 男女下面进入的视频免费午夜| 简卡轻食公司| 人人妻人人澡人人爽人人夜夜 | 国国产精品蜜臀av免费| 免费黄网站久久成人精品| 日本五十路高清| 久久九九热精品免费| 亚洲,欧美,日韩| 亚洲内射少妇av| 99久久成人亚洲精品观看| 日本与韩国留学比较| 国产精品嫩草影院av在线观看| 亚洲av五月六月丁香网| 国产一区二区在线av高清观看| 亚洲精品乱码久久久v下载方式| 大型黄色视频在线免费观看| 欧美成人a在线观看| 国产免费男女视频| 天堂√8在线中文| 欧美成人免费av一区二区三区| 波多野结衣高清无吗| 亚洲精品国产av成人精品 | 我要搜黄色片| 人妻丰满熟妇av一区二区三区| 少妇丰满av| 熟女人妻精品中文字幕| 国产精品一区二区三区四区久久| 久久精品夜色国产| 欧美日韩一区二区视频在线观看视频在线 | 午夜激情福利司机影院| 国产亚洲精品久久久久久毛片| 欧美性感艳星| 国产精品电影一区二区三区| 免费av毛片视频| 国产精品一二三区在线看| 亚洲成人久久性| 欧美xxxx黑人xx丫x性爽| 国产精品人妻久久久久久| 国产精品人妻久久久影院| 人妻久久中文字幕网| 神马国产精品三级电影在线观看| 一本一本综合久久| 一个人看的www免费观看视频| 亚洲av一区综合| 精品一区二区三区av网在线观看| 国产高清激情床上av| 国产精品伦人一区二区| 日韩欧美 国产精品| 色播亚洲综合网| 亚洲国产日韩欧美精品在线观看| 有码 亚洲区| 亚洲人成网站高清观看| 真实男女啪啪啪动态图| 婷婷亚洲欧美| 精品免费久久久久久久清纯| 久久久久久久久中文| 99在线人妻在线中文字幕| 国产aⅴ精品一区二区三区波| 婷婷色综合大香蕉| 亚洲五月天丁香| 国产成人一区二区在线| 露出奶头的视频| 成人欧美大片| 精品乱码久久久久久99久播| 蜜桃久久精品国产亚洲av| 久久人人精品亚洲av| a级毛色黄片| 嫩草影视91久久| 久99久视频精品免费| 成人特级黄色片久久久久久久| 六月丁香七月| 尾随美女入室| 97在线视频观看| 人妻丰满熟妇av一区二区三区| 亚州av有码| 男女那种视频在线观看| 我的女老师完整版在线观看| 桃色一区二区三区在线观看| 国产乱人视频| 丝袜美腿在线中文| 看免费成人av毛片| 一级毛片久久久久久久久女| 欧美最黄视频在线播放免费| 日本精品一区二区三区蜜桃| 在线播放国产精品三级| 日本 av在线| 啦啦啦啦在线视频资源| 2021天堂中文幕一二区在线观| 热99re8久久精品国产| 国内少妇人妻偷人精品xxx网站| 99riav亚洲国产免费| 国产老妇女一区| 俺也久久电影网| 国产精品亚洲一级av第二区| 亚洲五月天丁香| 国产精品1区2区在线观看.| av卡一久久| 久久亚洲国产成人精品v| 中文字幕熟女人妻在线| 欧美日本视频| 亚洲av免费在线观看| 人妻丰满熟妇av一区二区三区| 长腿黑丝高跟| 精品国内亚洲2022精品成人| 国产精品三级大全| 日韩一区二区视频免费看| 国国产精品蜜臀av免费| 国产在线男女| 亚洲国产欧美人成| 精品久久久久久久人妻蜜臀av| 久久久久久国产a免费观看| 日日摸夜夜添夜夜添小说| 久久人人爽人人爽人人片va| 国内精品久久久久精免费| 国产私拍福利视频在线观看| 国内久久婷婷六月综合欲色啪| 久久亚洲精品不卡| 久久草成人影院| 亚洲自拍偷在线| 老司机福利观看| 一a级毛片在线观看| 国产精品永久免费网站| 久久精品国产亚洲av香蕉五月| 国产乱人偷精品视频| 免费电影在线观看免费观看| 又爽又黄a免费视频| 精品乱码久久久久久99久播| 久久久久久久亚洲中文字幕| 可以在线观看毛片的网站| 亚州av有码| 免费人成在线观看视频色| 欧美精品国产亚洲| 一级毛片aaaaaa免费看小| 有码 亚洲区| 亚洲精华国产精华液的使用体验 | 欧美性感艳星| 国产免费男女视频| 欧美激情在线99| 网址你懂的国产日韩在线| 午夜老司机福利剧场| 欧美日韩综合久久久久久| 久久九九热精品免费| 一区二区三区高清视频在线| 成人性生交大片免费视频hd| 国产毛片a区久久久久| 色播亚洲综合网| 99视频精品全部免费 在线| 日韩欧美精品免费久久| 国产午夜福利久久久久久| 亚洲国产精品成人久久小说 | av国产免费在线观看| 99久国产av精品| 一级a爱片免费观看的视频| 中出人妻视频一区二区| 午夜a级毛片| 久久精品国产亚洲av天美| 亚洲自拍偷在线| 精品99又大又爽又粗少妇毛片| 婷婷六月久久综合丁香| 国产大屁股一区二区在线视频| 99久久中文字幕三级久久日本| 国产色爽女视频免费观看| 亚洲av成人av| 国产精品人妻久久久久久| 免费大片18禁| 欧美+日韩+精品| 99久久无色码亚洲精品果冻| 女同久久另类99精品国产91| 男人和女人高潮做爰伦理| 国产高潮美女av| 久久99热6这里只有精品| 美女免费视频网站| av黄色大香蕉| 亚洲自偷自拍三级| 可以在线观看毛片的网站| 1000部很黄的大片| 乱系列少妇在线播放| 精品熟女少妇av免费看| 久久天躁狠狠躁夜夜2o2o| 老熟妇乱子伦视频在线观看| 床上黄色一级片| 亚洲av成人精品一区久久| 国产私拍福利视频在线观看| 国产又黄又爽又无遮挡在线| 午夜福利在线在线| 我要看日韩黄色一级片| 国产精品不卡视频一区二区| 最新中文字幕久久久久| 中文字幕免费在线视频6| 久久久久久九九精品二区国产| 午夜精品在线福利| 日韩国内少妇激情av| 天美传媒精品一区二区| 亚洲中文日韩欧美视频| 九色成人免费人妻av| 日韩一区二区视频免费看| 九色成人免费人妻av| 日韩欧美在线乱码| 97超视频在线观看视频| 尤物成人国产欧美一区二区三区| 久久久久久久久大av| 亚洲美女搞黄在线观看 | 午夜激情福利司机影院| 国产男靠女视频免费网站| 欧美色欧美亚洲另类二区| 亚洲成人精品中文字幕电影| 校园春色视频在线观看| 99久久精品热视频| 91精品国产九色|