• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Bionic covert anti-reverberation active sonar detection method based on imitating whale whistles

    2022-05-05 07:29:38JIANGJiajiaMIAOYuLIYaoSUNZhongboLIChunyueWANGXianquanFUXiaoDUANFajie

    JIANG Jiajia, MIAO Yu, LI Yao, SUN Zhongbo, LI Chunyue,WANG Xianquan, FU Xiao, DUAN Fajie

    (1. State Key Lab of Precision Measuring Technology and Instruments, Tianjin University, Tianjin 300072, China;2. System Engineering Research Institute, China State Shipbuilding Corporation, Beijing 100036, China)

    Abstract: The disguised covert detection method that imitates whale calls has received great attention in recent years because it can solve the traditional problem of the trade-off between long-range detection and covert detection. However, under strong reverberation conditions, traditional echo signal processing methods based on matched filtering will be greatly disturbed. Based on this, a disguised sonar signal waveform design is proposed based on imitating whale calls and computationally efficient anti-reverberation echo signal processing method. Firstly, this article proposed a disguised sonar signal waveform design method based on imitating whale calls. This method uses linear frequency modulation (LFM) signals to replace LFM-like segments in real whale calls, and extracts the envelope of the real whale call’s LFM-like segment to modify the LFM signal. Secondly, this article proposed an echo signal processing method of fractional Fourier transform (FrFT) based on target echo locating of synchronization signals. This method uses the synchronization signal to locate the target echo, and determines the step-size interval of the FrFT based on the information carried by the synchronization signal. Compared with the traditional FrFT, this method effectively reduces the amount of calculation and also improves the anti-reverberation ability. Finally, the excellent performance of the proposed method is verified by simulation results.

    Key words: active sonar system; anti-reverberation; disguised sonar waveform design; echo signal processing

    0 Introduction

    The active sonar system will be inevitably detected and recognized by the enemy detector[1-2]in the process of sending out signals to detect the target. In order to improve the stealth capability of active sonar systems, many methods based on waveform design have been proposed in recent decades[3-5].

    Different from traditional methods of low probability of detection (LPD)[6]and low probability of interception (LPI)[7], a bio-inspired covert method has received great attention in recent years[8-11]because it can solve the traditional problem of the trade-off between long-distance detection and covert detection. Because the original marine mammal call pulses have different characteristics from conventional signals in terms of waveform, frequency distribution and time-frequency distribution, the enemy almost always classifies biological signals as ocean noise and filters them out[12-14]. Therefore, imitating biological signals can effectively prevent the enemy from detecting the presence of such detection signals.

    At present, there are two main methods for bio-inspired covert method. One is using artificial signals (e.g. continuous wave, LFM) to splice and simulate whale calls. For example, Liu et al.[10]used a large number of LFM signals with different chirp rates to simulate the dolphin whistle. Capus et al.[8]used two LFM signals to simulate the click of a bottlenose dolphin. The advantage of this method is that it can retain the superior performance of the artificial signal, but some characteristics of the constructed signal are different from the real whale sound, leading to unsatisfactory covertness. The other is directly to use real whale sounds or adjust only a little of whale sounds. For example, Jiang et al.[11]adopted two real sperm whale call pulses to form an active sonar signal with good range resolution and Doppler tolerance. The advantage of this method has good covertness, but the detection performance is limited by the characteristics of the whale sound signal.

    So far, the bio-inspired covert method usually uses matched filtering as the echo signal processing method. Matched filtering is a common method to analyse and process the detection signal echo, and it is the best receiver under the background of white noise. But the background noise of target echo is not pure Gaussian white noise when the sonar system is located in the strong reverberation environments such as the shallow sea, port, etc. Because of the high cross-correlation between reverberation and target echo, the matched filter output will contain many indistinguishable target echo correlation peaks and reverberation signal correlation peaks, which limits the performance of the matched filter. Therefore, in order to take into account both covert detection and effective detection under strong reverberation conditions, this article focuses on the whale calls imitating disguised sonar signal waveform design method which is suitable for strong reverberation conditions, and anti-reverberation echo signal processing methods.

    In order to meet the needs of engineering applications, researchers have proposed a variety of signal detection methods in the reverberant environment[15-17]. Deng et al.[17]used FrFT to identify target echoes in a reverberant environment. This method takes advantage of the good focus of the LFM signal in the fractional Fourier domain by using FrFT to distinguish reverberation signal and target echo. Moreover, since FrFT processes the signal based on the time-frequency plane rotation, it is more sensitive to the Doppler motion of the target and has a higher speed estimation accuracy[18].

    Due to the good performance of FrFT under reverberant conditions, this article combines it with the bio-inspired covert detection technology, and proposes a covert detection method suitable for strong reverberant conditions. Because FrFT is mainly applicable to the processing of LFM signals, this article uses LFM signals to replace LFM-like segments in real whale calls, and extracts the envelope of the real whale call’s LFM-like segment to modify the LFM signal. The replacement of the LFM signal is completed without affecting the covertness of the detection signal.

    At present, FrFT is widely used in the processing of LFM signals. The main problem of FrFT is that it has a large amount of calculation. First,because of the irreconcilable contradiction exists between the search accuracy and the calculation amount[19-20]. In order to ensure the detection accuracy, only a small step-size can be used to search the step-size interval, which will greatly increase the calculation amount. Second, because of the influence of the strong reverberant environment, the arrival time of the target echo is difficult to be determined by the matched filter. The commonly used method is to perform overlapped windows on the received signal and compare the results of FrFT calculations in each window[21]. Therefore, it is difficult for FrFT to meet the requirements of active sonar systems for real-time signal analysis, so it is generally still at the stage of theoretical research and has not been applied to active sonar systems. In summary, the following work has been done in this paper.

    1) A construction method of disguised sonar signal suitable for strong reverberant environment is proposed. LFM signals is used to replace LFM-like segments in real whale calls, and the envelope of the real whale call’s LFM-like segment is extracted to modify the LFM signal. The replacement of the LFM signal is completed without affecting the covertness of the detection signal.

    2) Different from the traditional FrFT method of using overlapped windows to locate the target echo, a method of using the synchronization signal to locate the target echo is proposed.The amount of calculation is reduced. And because of the improvement of the positioning accuracy of the target echo, the anti-reverberation performance is also increased.

    3) Different from the traditional FrFT method of setting the search step-size and step-size interval, a method of using the synchronization signal to carry the chirp rate information of the LFM signal and setting the search step-size and step-size interval based on the chirp rate information and the target speed estimation interval is proposed. On the basis of reducing the amount of calculation, the detection accuracy of FrFT is improved.

    4) A disguised detection method under strong reverberant conditions is proposed, which can guarantee the covertness of the detection process while outputting the sonar signal with high signal-to-noise ratio (SNR), and solve the traditional problem of the trade-off between long-distance detection and covert detection. Simulation verifies that efficient performance of estimating target speed and distance under long-distance and strong reverberant conditions can be achieved by this method.

    1 Disguised signal construction

    Generally speaking, whale calls can be divided into clicks, whistles and pulse calls[22-24]. Clicks have a short time width, ranging from tens of microseconds to a few milliseconds. And it has a wide frequency band, causing serious attenuation in ocean channels and resulting in a very short operating range, so it is not suitable for the signal construction method in this article. However, whistles and pulse calls have a long duration, ranging from tens of milliseconds to a few seconds. Their operating range is much longer than that of clicks, and the time-frequency contour is changeable, which meets the requirements of the proposed waveform construction method. The difference between whistle and pulse calls is that pulse calls contain multiple harmonic components. For the subsequent echo signal processing stage, the chirp rate of the harmonic components of the LFM segment is different from the fundamental chirp rate, which will interfere with the result of FrFT. Therefore, this article uses whistles to construct the disguised sonar signal.

    By studying various classification methods for tonal sounds, it is found that the classification method proposed by Bazúa-Durán and Au[25]has strong versatility, and can be applied to most tonal sounds. By using this classification method as a reference, most tonal sounds can be ascribed to one of the six categories according to their contours, including constant frequency, upsweep, downsweep, concave, convex and sine[26]. In addition to the constant frequency, the others all have LFM-like segments, which can be used to construct the detection signals described in this article.

    The waveform design method proposed in this article needs to replace the LFM-like segment in the real whale sound signal with the LFM signal. In order to ensure the covertness and detection performance of the constructed signal, the LFM-like segment of the whale sound signal used for the construction needs to have the following characteristics: (1) The time-frequency contour of the LFM-like segment has a small curvature, which is similar to a LFM signal, ensuring that the time-frequency contour after the replacement is similar to the real whale sound’s time-frequency contour. (2) The time width of the LFM-like segment is relatively large. From the ambiguity function, it can be seen that the speed resolution of the detection signal depends on the time width of the signal. A detection signal with a large time width is conducive to obtaining more accurate speed estimation results. (3) The bandwidth of the LFM-like segment is relatively large. It can also be seen from the ambiguity function that the accuracy of the target distance estimation depends on the signal bandwidth. However, the accuracy of the target distance estimation depends on the estimation accuracy of the target speed in addition to the signal bandwidth. Therefore, when a large time width and bandwidth cannot be achieved at the same time, a large time width should be selected first.

    Taking the construction of the downsweep tonal sound of long-finned pilot whale as an example, the specific construction method is shown in Fig.1.

    Fig.1 Schematic diagram of construction process

    Step 1: Replacing the LFM-like segment with the LFM signal. However, because the rectangular envelope characteristic of LFM signal is quite different from the real whale call, the constructed signal does not have covertness.

    Step 2: The whale call envelope of the LFM-like segment in the real whale call is extracted, and the LFM signal is modified by the whale call envelope[27].

    Firstly, the STFT with aN-point Hamming window of the whale callx(t) is calculated. And the resultX(τ,ω) is expressed as

    (1)

    whereω(N) is theN-point Hamming window;t1andt2are the starting time and ending time of the whale callx(t). For thekth STFT blockXk(τk,ωk), its starting time and frequency areτkandωk, respectively.

    Secondly, setting a frequency threshold ΔB, and finding the maximum valuePkbetween the frequency [ω-ΔB,ω+ΔB] within the time range of thekth STFT block. The envelope of momentτkis

    (2)

    Finally, the real whale call envelopeAr(τk) is obtained by using the piecewise cubic Hermit interpolation ofAb(τk). Using the envelopeAr(τk) to multiply the LFM signal, and the LFM signal whose envelope is consistent with the real whale call is obtained.

    Step 3: To avoid the abrupt phase change between real whale segment and LFM segment, the phase compensation component Δφ1is added to the LFM segment. The Δφ1is equals to the phase difference between the real whale segment and LFM segment at the connection point, which is calculated by Hilbert Transform.

    This method can adopt different types of tonal sound of different kind whales to construct sonar signals. In addition to the downsweep tonal sound of long-finned pilot whale shown in Fig.1, there are also convex tonal sound of short-finned pilot whale is shown in Fig.2(a)-(d),and sine tonal sound of bottle dolphin is shown in Fig.3(a)-(d).

    Because of the simplicity of the sonar signal construction method, the sonar signal database can be easily constructed. In practical application, the appropriate sonar signal can be selected in the database according to the actual situation. For example, referring to the real whale calls sequence and using the same type of sonar signals in turn to simulate the real whale calls[27], the sonar signal of local whales was selected in different sea areas, and the sonar signal of current whales was selected in different seasons, so as to achieve better covertness.

    Fig.2 Convex tonal sound of short-finned pilot whale

    Fig.3 Sine tonal sound of bottle dolphin

    Since the contours of tonal sounds have obvious frequency modulation characteristics[28], and present acoustic classifiers usually classify a tonal sound based on its contour, it can be assumed that the covert ability of the artificial detection signal depends on the similarity of contour between the sound and the real whale calls. To assess the covert ability of artificial detection signals, the Pearson correlation coefficient (PCC)[29]is used, which is widely used in the measurement of the similarity between two data sets.

    The discrete disguised sonar signal’s time-frequency contour is denoted byfB[n]={fB,1,fB,2,…,fB,n}, and the discrete real whale call’s time-frequency contour is denoted byfR[n]={fR,1,fR,2,…,fR,n}, so the correlation coefficientrbetween them could be calculated by

    (3)

    From the Eq.(3), it can be found that the closerris to 1, the more similar the time-frequency contour of the disguised sonar signal and the real whale call are, the better the covert ability will be. The correlation coefficients between the disguised sonar signals mentioned above and the real whale calls are shown in Table 1.

    Table 1 Correlation coefficients

    In order to quickly and accurately locate the LFM segment in the disguised sonar signal at the subsequent echo signal processing, the real whale sound segmentwas intercepted before LFM as the synchronization signal, and the synchronization signal matched filter was used to locate the LFM segment. Compared with directly using the LFM signal matching filter location, the advantage of this method is that the characteristics of the real whale sound segment are diverse, the cross-correlation between different synchronization signals is low, and it is not easy to cause interference among different detection signals. The interception of synchronization signal is shown in Fig.4.

    Fig.4 Schematic diagram of synchronization signal and LFM segment

    The synchronization signal carries three pieces of information in total. (1) The location information of LFM. It can be directly windowed for FrFT based on the location information. (2) The chirp rate information of LFM. The initial step-size and step-size interval of FrFT can be determined based on the chirp rate information.(3) LFM time length information. The window’s width of FrFT can be determined based on the time length information. The specific method of using the synchronization signal will be described in detail in Section 2.

    2 Echo signal processing

    Because of the complex formation principle of the reverberation, the reverberation of the LFM signal generally no longer has obvious chirp characteristics. The energy of the reverberation signal is relatively dispersed in the fractional Fourier domain, showing weak focus. However, the echo signal can maintain its chirp characteristics, and the energy is more concentrated in the fractional Fourier domain. In this paper, FrFT is used to separate the reverberation signal and the echo signal in the fractional Fourier transform domain, so as to realize the anti-reverberation detection.

    2.1 Fractional Fourier transform

    FrFT was introduced initially by Namias[30]in 1980, and since then was being used in various fields. It is a signal processing tool based on the rotation of the time-frequency plane. FrFT is a generalization of the classical Fourier transform and a representation of signals using an orthonormal basis formed by chirps. The transformation kernelK?(t,u) is defined as

    (4)

    (5)

    For any LFM signal, the relationship between its chirp ratekand FrFT is

    (6)

    wheresis the sampling rate;Nis the total number of time samples, andρ0is the optimal transform order.

    2.2 FrFT of target echo

    In the detection method described in this article, the estimation of target speed and distance is based on the LFM segment in the disguised sonar signal, and the equation is

    f(t)=Acos(2πf0t+πkt2),

    (7)

    whereAis the whale envelope amplitude parameter used to modify signals;kis the chirp rate;f0is the initial frequency of LFM segment. Considering the Doppler shift of moving target and time delay. The received signal can be expressed as

    f(ξt-τ)=ψAcos(2πf0(ξt-τ)+πk(ξt-τ)2),

    (8)

    whereξis the compression/stretching parameter due to moving target;τis the time delay, andψis the amplitude parameter which is related to target distance and underwater channel influence.

    From the Eqs.(7) and (8), the ratio between the chirp rate of the echo signalk′ and the emission signalkis

    (9)

    It is well known that the relationship between the doppler factorξand the relative radial speed of the target and sonarvis

    (10)

    wherecis the sound speed in the sea. It can be obtained from the Eqs.(9) and (10) that

    (11)

    2.3 Echo signal processing method

    The specific process of the proposed echo signal processing method is shown in Fig.5.

    Firstly, the synchronization signals corresponding to the sonar signals are used as copies for matched filtering. Finding the synchronization signal with the highest correlation peak, its corresponding chirp rate is read aski, and the FrFT order corresponding to this chirp rate is

    (12)

    wheresis the sampling rate;Nis the total number of time samples.

    Fig.5 Schematic diagram of echo signal processing

    The submarine’s speed on combat patrols generally does not exceed the so called “maximum low noise” speed which amounts to nearly 8 knots (4 m/s). Often, submarines have to carry out long distance voyages to complete their assigned missions. In order to increase their operational efficiency, submarines in transit move at a maximum speed which guarantees the submarine covertness. Generally this speed does not exceed 15 knots (7.5 m/s)[31]. Therefore, the section of FRFT transform order is

    (13)

    whereρmis the variation interval of FRFT order caused by the estimated Doppler effect;vm=7.5 m/s is the maximum estimated speed of the target.

    Secondly, setting the correlation peak threshold and finding the peak pointtmiof each correlation peak, the point (tmi+Ns) is taken as the starting point of the FrFT transform window, and the point (tmi+Ns+NLFM) is taken as the ending point of the FrFT transform window.NsandNLFMare the number of points of the synchronization signal and the LFM segment, respectively. It depends on their length and the sample rate of the signal. The maximum peak value of the FrFT result of each window is found, and the target speed is calculated according to Eq.(11).

    Finally, the LFM segment in the detection signal is used as a copy to perform matched filtering to calculate the distance of the target. According to the target speed, the signal is resampled to compensate for the signal change caused by the Doppler effect. The sampling rates′ used for resampling is

    (14)

    whereveis the estimated value of the target speed, andsis the sampling rate of the signal. Resampling will compensate for the Doppler effect of the echo signal, so that the cross-correlation between the echo signal and the detection signal will be improved, and resampling will cause the cross-correlation between the reverberation signal and the detection signal to decrease. The result of target echo signal matched filtering before and after compensation is shown in Fig.6.

    Fig.6 Schematic diagram of doppler compensation

    For the compensated signal, the LFM segment is used in the detection signal as a copy to perform matched filtering. The peak point of the matched filtering is the estimated value of the echo signal’s delayτe, and the distance to the targetris calculated by

    (15)

    3 Simulation

    In the simulation, underwater acoustic channel is generated by Bellhop developed by Mike Porter. The parameters of the generated channel are shown in Table 2, and the sound speed profile and channel impulse response are shown in Fig.7.

    Table 2 Parameters of underwater acoustic channel

    A strong reverberant environment is simulated by using the element-scattering model[32], and Gaussian white noise is superimposed to simulate random noise in the ocean. The received signalx(t) is

    x(t)=s(t)*γ(t)+r(t)+n(t),

    (16)

    where * is convolution;s(t)is the target echo;γ(t)is the channel impulse response output by Bellhop, which is used to simulate the influence of the underwater acoustic channel on the signal;r(t) is the reverberation, andn(t) is the Gaussian white noise.

    Fig.7 (a) Communication simulation system; (b) Sound speed profile

    The downsweep, convex and sine detection signal shown in Figs.1-3 are taken as examples. The parameters of whale calls are shown in Table 3, and the parameters of LFM segments are shown in Table 4. SNR=20 dB, SRR=0 dB, the echo signal is simulated as described above, and the time-frequency diagram of the received signal is shown in Fig.8.

    Table 3 Parameters of whale calls

    Table 4 Parameters of LFM signals

    Fig.8 Received signal’s time-frequency image

    4 Results and discussion

    This article takes the downsweep, convex and sine detection signals as an example for simulation. The target’s speed is 5 m/s and the target’s distance is 10 km. RMSE of speed errors is obtained as shown in Fig.9, and RMSE of distance errors is gotten as shown in Fig.10 by simulating under different SNR and SRR conditions.

    Fig.9 RMSE of speed errors of a single target over different SNR and SRR

    It can be seen from Fig.9 and Fig.10(a)-(c) that when the SRR is not less than 0 dB, the method can maintain good detection performance, and when the SRR is less than 0 dB, though the reverberation signal has weaker chirp characteristics than the echo signal, its strong energy will affect the estimation of the optimal transformation angle of FrFT, leading to estimation errors of speed and distance.

    Fig.10 RMSE of distance errors of a single target over different SNR and SRR

    And it can be seen from Fig.9 and Fig.10(d) that the speed estimation accuracy of the downsweep disguised sonar signal with larger time width is higher, and the distance estimation accuracy of convex and sine disguised sonar signals with larger bandwidth is higher. The simulation results are consistent with the previous analysis.

    Different from the traditional anti-reverberation FrFT echo signal processing method, the echo signal processing method proposed in this article has the advantages of smaller calculation amount, higher calculation accuracy and stronger anti-reverberation ability. The traditional FrFT method uses overlapped windows to located echo signals. The longer overlapped parts there are, the higher the accuracy of the calculation result will be, but the amount of calculation will also increase. That is to say, the FrFT withNLFMpoints timesnis

    (17)

    What’s more, it can be seen from Eq.(4) that the principle of FrFT’s focusing effect on the LFM signal is to obtain the decomposition basis of different chirp rate by rotating the transform angleα. If the windowing position is not accurate, the energy of the LFM signal in the FrFT window may be lesser than reverberation. The energy of another rotation angleα1corresponding to the dispersed reverberation signal is higher than the energy of rotation angleα0corresponding to the LFM signal. FrFT will get wrong results, resulting in a decrease in the anti-reverberation performance of this method.

    Taking the downsweep, convex and sine detection signal as an example, the proposed method and the traditional FrFT calculation method are used to process the echo signal. The sampling rate is 44.1 kHz, the target distance is 10 km, the target speed is 5 m/s, and SNR=20 dB. The required times of FrFT with the same points using the proposed method and the traditional method is shown in Table 5.

    Table 5 Number of calculations by different methods

    In addition to the reduction of calculation, to compare the anti-reverberation performance of the proposed method and the traditional FrFT, simulations were performed under different SRR conditions. The RMSE of speed errors are shown in Fig.11 and the RMSE of distance errors are shown in Fig.12. In traditional FrFT simulation, the window overlap width isNoverlap=0.8NLFMandNoverlap=0.2NLFM.

    Fig.11 RMSE of speed errors of a single target over different method and SRR

    Fig.12 RMSE of distance errors of a single target over different method and SRR

    It can be seen from Table 5 that the calculation amount of the proposed method is significantly reduced compared with the traditional FrFT, and it can be seen from Figs.11 and 12 that under reverberation conditions, especially when the SRR is greater than or equal to 0 dB, the proposed method has higher accuracy for target speed and distance estimation.

    5 Conclusions

    A disguised sonar signal waveform design method is proposed based on imitating whale calls and a computationally efficient anti-reverberation echo signal processing method for strong reverberation environment. LFM segments is used to replace the LFM-like segments in the real whale call, so that the time-frequency contour of the disguised sonar signal is consistent with the real whale call, achieving the covertness detection. Different from the traditional FrFT method, a method by using the synchronization signal to locate the target echo is proposed. Compared with the traditional FrFT signal processing method, the calculation amount of this method is effectively reduced. Moreover, by comparing the RMSE of speed and distance errors, it is proved that this method has better target speed and distance estimation accuracy under reverberation conditions, especially under reverberation conditions greater than or equal to 0 dB. However, under extremely low SRR conditions, the reliability of the synchronization signal matched filter will be interfered by strong reverberation. The threshold of matched filtering needs to be artificially lowered, but this will also increase the amount of calculation. Our future work will be concentrated on more reliable target echo positioning methods under extremely low SRR conditions.

    黄色片一级片一级黄色片| 亚洲欧美一区二区三区黑人| 久9热在线精品视频| 老司机福利观看| 夜夜躁狠狠躁天天躁| 亚洲va日本ⅴa欧美va伊人久久| 亚洲精品在线美女| 丰满的人妻完整版| 黄频高清免费视频| www国产在线视频色| 九色国产91popny在线| 免费在线观看视频国产中文字幕亚洲| 女人高潮潮喷娇喘18禁视频| 精品久久久久久久毛片微露脸| 午夜福利视频1000在线观看| 国产高清videossex| 日韩国内少妇激情av| 午夜福利高清视频| 亚洲精品粉嫩美女一区| 最近最新免费中文字幕在线| 亚洲成国产人片在线观看| 亚洲av中文字字幕乱码综合 | 在线天堂中文资源库| 亚洲精华国产精华精| 国产区一区二久久| 国产成+人综合+亚洲专区| 一区二区三区高清视频在线| 长腿黑丝高跟| 久久香蕉激情| 久久热在线av| 动漫黄色视频在线观看| 亚洲精品美女久久久久99蜜臀| 免费搜索国产男女视频| 法律面前人人平等表现在哪些方面| 中文资源天堂在线| 午夜福利18| av有码第一页| 精品一区二区三区四区五区乱码| 99久久99久久久精品蜜桃| 每晚都被弄得嗷嗷叫到高潮| 一二三四社区在线视频社区8| 午夜福利在线观看吧| 91麻豆av在线| 好看av亚洲va欧美ⅴa在| 天天躁夜夜躁狠狠躁躁| 女性生殖器流出的白浆| 欧美人与性动交α欧美精品济南到| 亚洲欧洲精品一区二区精品久久久| 欧美国产精品va在线观看不卡| 波多野结衣高清无吗| 波多野结衣高清作品| 免费看十八禁软件| 黄片播放在线免费| 丝袜在线中文字幕| 女性生殖器流出的白浆| 免费在线观看黄色视频的| 黄色a级毛片大全视频| 在线观看免费视频日本深夜| 久久99热这里只有精品18| 69av精品久久久久久| 首页视频小说图片口味搜索| 又黄又爽又免费观看的视频| 久久精品国产亚洲av香蕉五月| 亚洲七黄色美女视频| 欧美丝袜亚洲另类 | 在线av久久热| 欧美日本视频| 国产三级在线视频| 欧美zozozo另类| 狂野欧美激情性xxxx| 中文资源天堂在线| 男人舔女人下体高潮全视频| 最近最新免费中文字幕在线| 级片在线观看| 黑人巨大精品欧美一区二区mp4| 婷婷六月久久综合丁香| 在线观看午夜福利视频| 欧美最黄视频在线播放免费| 精品人妻1区二区| 成人免费观看视频高清| 两人在一起打扑克的视频| 亚洲国产欧美网| 欧美+亚洲+日韩+国产| 女性生殖器流出的白浆| 国产单亲对白刺激| 变态另类成人亚洲欧美熟女| 宅男免费午夜| 欧美色视频一区免费| 黑人欧美特级aaaaaa片| 久久久久久九九精品二区国产 | 久久午夜亚洲精品久久| 高潮久久久久久久久久久不卡| 在线观看www视频免费| 精品乱码久久久久久99久播| 久久精品91无色码中文字幕| 中文在线观看免费www的网站 | 国产精品久久久人人做人人爽| 亚洲国产欧美一区二区综合| 淫妇啪啪啪对白视频| 国产99白浆流出| 亚洲精品美女久久久久99蜜臀| 男人操女人黄网站| 国产激情偷乱视频一区二区| 免费看a级黄色片| 黑丝袜美女国产一区| 久久这里只有精品19| 一区二区三区国产精品乱码| 搡老岳熟女国产| 国产高清有码在线观看视频 | 午夜成年电影在线免费观看| 国产一级毛片七仙女欲春2 | 免费无遮挡裸体视频| 亚洲片人在线观看| 免费搜索国产男女视频| 高潮久久久久久久久久久不卡| 老司机靠b影院| 亚洲精品美女久久av网站| 国产激情偷乱视频一区二区| 国产三级在线视频| 精品久久久久久久末码| 国产99久久九九免费精品| 少妇粗大呻吟视频| 国产黄色小视频在线观看| 国产v大片淫在线免费观看| 岛国在线观看网站| 久久中文看片网| 嫁个100分男人电影在线观看| aaaaa片日本免费| 国产精品一区二区免费欧美| 波多野结衣高清无吗| 久久人妻福利社区极品人妻图片| 久久伊人香网站| 久久国产精品影院| 美女高潮到喷水免费观看| 亚洲人成伊人成综合网2020| 国产精品一区二区精品视频观看| 免费高清视频大片| 99在线视频只有这里精品首页| 丁香六月欧美| 日韩成人在线观看一区二区三区| 亚洲五月婷婷丁香| 9191精品国产免费久久| 久久精品国产亚洲av香蕉五月| 午夜免费激情av| 50天的宝宝边吃奶边哭怎么回事| 午夜福利在线在线| 日本 欧美在线| 黑人欧美特级aaaaaa片| 久久人人精品亚洲av| 51午夜福利影视在线观看| www.精华液| 一边摸一边做爽爽视频免费| 91成年电影在线观看| 国产视频内射| 欧美成人午夜精品| 精品久久久久久久毛片微露脸| www国产在线视频色| 欧美精品亚洲一区二区| 亚洲av美国av| 在线观看免费日韩欧美大片| 国产区一区二久久| 日本一本二区三区精品| 久久久久免费精品人妻一区二区 | 日本 av在线| 美女高潮到喷水免费观看| 在线十欧美十亚洲十日本专区| 亚洲欧洲精品一区二区精品久久久| 亚洲中文日韩欧美视频| 一二三四在线观看免费中文在| 神马国产精品三级电影在线观看 | 婷婷亚洲欧美| 亚洲成人久久性| 亚洲片人在线观看| 99国产综合亚洲精品| 亚洲色图 男人天堂 中文字幕| 色av中文字幕| 好看av亚洲va欧美ⅴa在| 国产精品综合久久久久久久免费| 免费av毛片视频| 亚洲av熟女| 夜夜夜夜夜久久久久| 国产99久久九九免费精品| 国产亚洲精品久久久久久毛片| 巨乳人妻的诱惑在线观看| 欧美成人一区二区免费高清观看 | 国产精品久久电影中文字幕| 国内少妇人妻偷人精品xxx网站 | 亚洲性夜色夜夜综合| 精品久久久久久成人av| 大型黄色视频在线免费观看| 麻豆av在线久日| 日日摸夜夜添夜夜添小说| 久久久国产欧美日韩av| 久久中文字幕一级| 婷婷丁香在线五月| 成人av一区二区三区在线看| 成人午夜高清在线视频 | 亚洲国产看品久久| 久久天躁狠狠躁夜夜2o2o| www.熟女人妻精品国产| 亚洲欧美精品综合一区二区三区| 黄色视频不卡| 国产久久久一区二区三区| 亚洲一区二区三区色噜噜| 叶爱在线成人免费视频播放| 91老司机精品| 男女午夜视频在线观看| 久久九九热精品免费| 色播在线永久视频| 在线免费观看的www视频| 午夜激情福利司机影院| 国产亚洲精品久久久久久毛片| 欧美日韩中文字幕国产精品一区二区三区| 亚洲第一电影网av| 午夜福利18| 一本久久中文字幕| 亚洲国产欧美网| 男女做爰动态图高潮gif福利片| tocl精华| 白带黄色成豆腐渣| 丝袜美腿诱惑在线| 日本一本二区三区精品| 一a级毛片在线观看| 亚洲色图 男人天堂 中文字幕| 亚洲专区字幕在线| 国产亚洲欧美在线一区二区| 午夜久久久久精精品| 自线自在国产av| 日韩av在线大香蕉| 搡老熟女国产l中国老女人| 他把我摸到了高潮在线观看| 成人国语在线视频| 黄网站色视频无遮挡免费观看| 黄色视频,在线免费观看| 欧洲精品卡2卡3卡4卡5卡区| 自线自在国产av| 精品久久久久久久末码| 国产免费男女视频| 亚洲精品粉嫩美女一区| 国产又黄又爽又无遮挡在线| 国产又爽黄色视频| 欧美色欧美亚洲另类二区| 国产亚洲精品久久久久久毛片| 欧美性猛交╳xxx乱大交人| 国产又黄又爽又无遮挡在线| 久久狼人影院| 桃色一区二区三区在线观看| 国产一级毛片七仙女欲春2 | 国产精品综合久久久久久久免费| 十八禁人妻一区二区| 欧美日本视频| 久久香蕉国产精品| 久久热在线av| 久久99热这里只有精品18| 国内精品久久久久久久电影| 老司机靠b影院| 久久这里只有精品19| 日本成人三级电影网站| 成人午夜高清在线视频 | а√天堂www在线а√下载| 夜夜躁狠狠躁天天躁| 国产一区在线观看成人免费| 在线观看免费午夜福利视频| 黄网站色视频无遮挡免费观看| 国产亚洲精品久久久久5区| 欧美一级a爱片免费观看看 | 一边摸一边抽搐一进一小说| 欧美性长视频在线观看| 久久香蕉国产精品| 欧美一级a爱片免费观看看 | 一级片免费观看大全| 午夜日韩欧美国产| 亚洲精品美女久久av网站| 日韩欧美在线二视频| 国产精品影院久久| 国产真实乱freesex| 欧美不卡视频在线免费观看 | 无人区码免费观看不卡| 欧美日韩黄片免| 日韩欧美免费精品| 亚洲av片天天在线观看| 国产av不卡久久| 国产精品 欧美亚洲| 免费看a级黄色片| 后天国语完整版免费观看| 欧美 亚洲 国产 日韩一| 一二三四社区在线视频社区8| 亚洲男人的天堂狠狠| av中文乱码字幕在线| tocl精华| 国产午夜福利久久久久久| 亚洲黑人精品在线| 欧美精品啪啪一区二区三区| 欧美日韩乱码在线| 久久久久免费精品人妻一区二区 | 国产精品 欧美亚洲| 午夜福利18| 久99久视频精品免费| 女同久久另类99精品国产91| 亚洲aⅴ乱码一区二区在线播放 | 波多野结衣av一区二区av| 99精品久久久久人妻精品| 国产亚洲av高清不卡| 亚洲一码二码三码区别大吗| 不卡av一区二区三区| 欧美性猛交黑人性爽| 日本一本二区三区精品| 国产精品,欧美在线| 成人亚洲精品av一区二区| 国产av在哪里看| 午夜精品在线福利| 婷婷精品国产亚洲av| 搡老妇女老女人老熟妇| 国产熟女xx| 亚洲精品粉嫩美女一区| 国产99久久九九免费精品| 久久天堂一区二区三区四区| www.熟女人妻精品国产| 两个人免费观看高清视频| 老司机午夜福利在线观看视频| 此物有八面人人有两片| 1024手机看黄色片| 动漫黄色视频在线观看| 91国产中文字幕| 亚洲色图av天堂| 国内毛片毛片毛片毛片毛片| 色播在线永久视频| 淫秽高清视频在线观看| 国产1区2区3区精品| 国产精品,欧美在线| 国产成人啪精品午夜网站| 国产精品久久久av美女十八| 可以免费在线观看a视频的电影网站| 久久久久久九九精品二区国产 | 黄片播放在线免费| 88av欧美| 丰满人妻熟妇乱又伦精品不卡| 国产又爽黄色视频| 特大巨黑吊av在线直播 | www.熟女人妻精品国产| 日韩欧美一区二区三区在线观看| 国产成人啪精品午夜网站| 18禁黄网站禁片免费观看直播| 99久久精品国产亚洲精品| 国产高清视频在线播放一区| 欧美成狂野欧美在线观看| 国产亚洲av高清不卡| 亚洲国产欧美一区二区综合| 黄色成人免费大全| 国产精品 国内视频| 99国产精品一区二区三区| 极品教师在线免费播放| 国产精品亚洲美女久久久| 露出奶头的视频| 成人一区二区视频在线观看| 女生性感内裤真人,穿戴方法视频| 精品一区二区三区av网在线观看| 99精品欧美一区二区三区四区| 国产精品永久免费网站| 亚洲激情在线av| 日本三级黄在线观看| 日韩精品免费视频一区二区三区| 欧美中文综合在线视频| 婷婷六月久久综合丁香| 级片在线观看| 岛国视频午夜一区免费看| 国产av一区在线观看免费| 国产主播在线观看一区二区| 亚洲精品国产一区二区精华液| 美女午夜性视频免费| 99久久精品国产亚洲精品| 神马国产精品三级电影在线观看 | 国产激情偷乱视频一区二区| 成人亚洲精品一区在线观看| 国产亚洲精品综合一区在线观看 | 非洲黑人性xxxx精品又粗又长| 欧美一区二区精品小视频在线| 国产熟女午夜一区二区三区| 老熟妇仑乱视频hdxx| 久9热在线精品视频| 亚洲精品中文字幕在线视频| 欧美色视频一区免费| 不卡一级毛片| 操出白浆在线播放| 人人妻,人人澡人人爽秒播| 久久久精品国产亚洲av高清涩受| 久久欧美精品欧美久久欧美| 亚洲欧美激情综合另类| 日韩成人在线观看一区二区三区| 精品午夜福利视频在线观看一区| 国内揄拍国产精品人妻在线 | 久久欧美精品欧美久久欧美| 久久久久久亚洲精品国产蜜桃av| 在线视频色国产色| 亚洲欧美精品综合久久99| 国产亚洲精品第一综合不卡| 欧美一级毛片孕妇| 两个人免费观看高清视频| svipshipincom国产片| 国产蜜桃级精品一区二区三区| 日本三级黄在线观看| 国产免费av片在线观看野外av| svipshipincom国产片| 国产免费av片在线观看野外av| 国产片内射在线| 少妇被粗大的猛进出69影院| 一本精品99久久精品77| 国产成年人精品一区二区| 日本一本二区三区精品| 19禁男女啪啪无遮挡网站| 看片在线看免费视频| 久久久久久大精品| 一区二区三区国产精品乱码| 精品国产乱码久久久久久男人| 老司机深夜福利视频在线观看| 51午夜福利影视在线观看| 日韩精品中文字幕看吧| 亚洲精品久久国产高清桃花| 身体一侧抽搐| 午夜老司机福利片| 亚洲精品在线观看二区| 精品欧美一区二区三区在线| 日本 av在线| 久久久久精品国产欧美久久久| 波多野结衣av一区二区av| 婷婷丁香在线五月| 午夜福利欧美成人| x7x7x7水蜜桃| 12—13女人毛片做爰片一| 日本 欧美在线| av电影中文网址| 黄色视频不卡| 50天的宝宝边吃奶边哭怎么回事| 国产免费av片在线观看野外av| 国产亚洲欧美98| 亚洲一区二区三区色噜噜| 色播亚洲综合网| 香蕉久久夜色| 在线免费观看的www视频| 欧美成人免费av一区二区三区| 中文在线观看免费www的网站 | 亚洲欧美日韩无卡精品| bbb黄色大片| 999久久久国产精品视频| 亚洲成a人片在线一区二区| 成人三级黄色视频| 欧美另类亚洲清纯唯美| 久久久久久久久久黄片| 人人妻人人看人人澡| 制服丝袜大香蕉在线| 手机成人av网站| 男人的好看免费观看在线视频 | 日韩三级视频一区二区三区| 精品国产国语对白av| 亚洲精品中文字幕一二三四区| 亚洲欧美精品综合一区二区三区| 亚洲色图 男人天堂 中文字幕| 成人国产一区最新在线观看| 99久久综合精品五月天人人| 他把我摸到了高潮在线观看| 啦啦啦观看免费观看视频高清| 亚洲中文av在线| av电影中文网址| 久久亚洲真实| 国产成人欧美| 国产精品亚洲av一区麻豆| 久久精品夜夜夜夜夜久久蜜豆 | 一区二区三区国产精品乱码| 久久精品国产亚洲av高清一级| 日本成人三级电影网站| 日本一区二区免费在线视频| 波多野结衣av一区二区av| 日本三级黄在线观看| 中文字幕人妻丝袜一区二区| 久久久久久久久中文| 中文字幕另类日韩欧美亚洲嫩草| 久热爱精品视频在线9| 1024手机看黄色片| 久久国产乱子伦精品免费另类| 国产久久久一区二区三区| 亚洲成av片中文字幕在线观看| 色综合婷婷激情| 大型av网站在线播放| 久久精品91蜜桃| 精品一区二区三区四区五区乱码| av欧美777| 欧美久久黑人一区二区| 午夜福利免费观看在线| 久久久久国产精品人妻aⅴ院| 99riav亚洲国产免费| 91字幕亚洲| 成人三级做爰电影| 在线免费观看的www视频| 人人妻人人看人人澡| 69av精品久久久久久| 精品一区二区三区视频在线观看免费| 欧美色欧美亚洲另类二区| 久久亚洲精品不卡| 久久青草综合色| 丝袜美腿诱惑在线| 欧美成人午夜精品| 免费在线观看成人毛片| 久久婷婷人人爽人人干人人爱| 日韩大尺度精品在线看网址| 制服丝袜大香蕉在线| 女同久久另类99精品国产91| 非洲黑人性xxxx精品又粗又长| 男女下面进入的视频免费午夜 | 少妇被粗大的猛进出69影院| 久久国产亚洲av麻豆专区| 两个人视频免费观看高清| 妹子高潮喷水视频| 桃色一区二区三区在线观看| 91麻豆精品激情在线观看国产| 精品久久久久久久人妻蜜臀av| 欧美成人性av电影在线观看| 亚洲成人免费电影在线观看| 亚洲成a人片在线一区二区| 少妇被粗大的猛进出69影院| 精品久久久久久久人妻蜜臀av| 亚洲aⅴ乱码一区二区在线播放 | 亚洲中文av在线| 亚洲一区中文字幕在线| 99精品久久久久人妻精品| 啦啦啦免费观看视频1| 黄片播放在线免费| 国产伦人伦偷精品视频| 精品国产超薄肉色丝袜足j| 99久久精品国产亚洲精品| 一进一出好大好爽视频| 男男h啪啪无遮挡| 欧美黑人巨大hd| 天天躁夜夜躁狠狠躁躁| 午夜久久久在线观看| 亚洲精品粉嫩美女一区| 老熟妇乱子伦视频在线观看| 亚洲一卡2卡3卡4卡5卡精品中文| 美女午夜性视频免费| 免费在线观看日本一区| 国产成人精品无人区| 亚洲一区二区三区色噜噜| www国产在线视频色| 亚洲成av片中文字幕在线观看| 搞女人的毛片| 好男人在线观看高清免费视频 | 最新美女视频免费是黄的| 欧美性猛交╳xxx乱大交人| 久久香蕉精品热| 亚洲免费av在线视频| 亚洲激情在线av| 91九色精品人成在线观看| 高清毛片免费观看视频网站| 国产av在哪里看| 最新美女视频免费是黄的| 久久中文字幕一级| 999久久久精品免费观看国产| 欧美中文日本在线观看视频| 天堂动漫精品| 成人国产综合亚洲| 欧美乱妇无乱码| 天天躁夜夜躁狠狠躁躁| 成年免费大片在线观看| 在线免费观看的www视频| 熟妇人妻久久中文字幕3abv| 午夜福利在线观看吧| av天堂在线播放| 最近最新中文字幕大全电影3 | 欧美色欧美亚洲另类二区| 男人舔女人下体高潮全视频| 真人做人爱边吃奶动态| 69av精品久久久久久| 在线观看免费视频日本深夜| 国产欧美日韩一区二区精品| 一级a爱片免费观看的视频| 亚洲 欧美一区二区三区| 国产精品久久久久久人妻精品电影| 午夜福利高清视频| 国产av一区在线观看免费| 久久中文字幕人妻熟女| 亚洲中文字幕一区二区三区有码在线看 | 国产男靠女视频免费网站| 久久热在线av| av视频在线观看入口| 大型黄色视频在线免费观看| 级片在线观看| 男女之事视频高清在线观看| 欧美亚洲日本最大视频资源| 精品午夜福利视频在线观看一区| 美女高潮到喷水免费观看| 又紧又爽又黄一区二区| 女人被狂操c到高潮| 变态另类丝袜制服| 亚洲色图av天堂| 国产日本99.免费观看| 亚洲第一青青草原| 日本熟妇午夜| 国产极品粉嫩免费观看在线| 国产欧美日韩一区二区三| 国产亚洲精品一区二区www| 成人手机av| 美女免费视频网站| 黄色毛片三级朝国网站| 日韩高清综合在线| 搡老岳熟女国产| 一区二区三区国产精品乱码| 一本久久中文字幕| 国产一区在线观看成人免费| 久久久久久久久中文| 给我免费播放毛片高清在线观看| 日韩 欧美 亚洲 中文字幕| 色综合婷婷激情| 午夜精品在线福利| 日韩欧美一区视频在线观看| 亚洲av成人一区二区三| 一本久久中文字幕|