• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Atmospheric Convection Model Based Digital Confidentiality Scheme

    2022-08-23 02:16:14NoorMunirMajidKhanMohammadMazyadHazzaziAmerAljaediSajjadShaukatJamalandIqtadarHussain
    Computers Materials&Continua 2022年6期

    Noor Munir,Majid Khan,,Mohammad Mazyad Hazzazi,Amer Aljaedi,Sajjad Shaukat Jamal and Iqtadar Hussain

    1Department of Applied Mathematics and Statistics,Institute of Space Technology,Islamabad,Pakistan

    2Department of Mathematics,College of Science,King Khalid University,Abha,61413,Saudi Arabia

    3College of Computing and Information Technology,University of Tabuk,Tabuk,71491,Saudi Arabia

    4Department of Mathematics,Statistics and Physics,Qatar University,Doha,2713,Qatar

    Abstract: Nonlinear dynamics is a fascinating area that is intensely affecting a wide range of different disciplines of science and technology globally.The combination of different innovative topics of information security and high-speed computing has added new visions into the behavior of complex nonlinear dynamical systems which uncovered amazing results even in the least difficult nonlinear models.The generation of complex actions from a very simple dynamical method has a strong relation with information security.The protection of digital content is one of the inescapable concerns of the digitally advanced world.Today,information plays an important role in everyday life and affects the surroundings rapidly.These digital contents consist of text,images,audio,and videos,respectively.Due to the vast usage of digital images in the number of social and web applications,its security is one of the biggest issues.In this work,we have offered an innovative image encryption technique based on present criteria of confusion and diffusion.The designed scheme comprises two major nonlinear dynamical systems.We have employed discrete fractional chaotic iterative maps to add confusion capability in our suggested algorithm and continuous chaotic Lorenz system.We have verified our offered scheme by using statistical analysis.The investigations under the statistical tests suggested that our proposed technique is quite reasonable for the security of digital data.

    Keywords: Lorenz atmospheric convection model; fractional logistic map;image encryption;S-box

    1 Introduction

    Nowadays,society is full of the sphere of information in a different form of the digital medium.The advancement in different private and public sectors demands new and innovative results towards handling big data with low-cost technologies.Digital information that travels through an insecure line of communication plays an important role because of emerging technology usage at a high scale on social media and web applications etc.This insecurity while utilizing these applications on small and large computational machines lost the confidence of the net user.The issue of information security not just stops here it extended towards the regime of corporate organizations which includes business,banking sectors, and commercial firms.The information breaches are now increasing widely due to the vast number of facilities available online for instance transactions and online banking.The online services increased by a daily boom of commercial organizations due to competition among different officialdoms in an advanced era.Different companies created their research and development teams that mainly deal with cybersecurity.The security of information and online data streams gradually increase to fifth-generation technologies and the same happened in the area of information security where one cannot remain away from cybersecurity attacks.There have been several mechanisms used for the security of information which includes cryptography,watermarking,and steganography.The privacy of the given information can be assured by using cryptography.The watermarking and information hiding techniques are utilized for both information integrity and authentication.The most fruitful area of information preserving, and confidentiality is chaotic cryptography.With the advancement in the area of nonlinear dynamics,several discrete and continuous chaotic systems were developed and tested against different chaotic tests.The relations between chaos and cryptography have been a mode of discussion for two decades[1].Similarities among different concepts of chaos and cryptography make it a reasonable candidate for the encryption of digital data.The notion of diffusion and confusion in 1949 proposed by Claude Shannon added new directions in information security.Then different new block ciphers were designed which used confusion and diffusion.The addition of diffusion and confusion in a block cipher added a robust security layer against different cryptographic attacks.In modern cryptosystems,the notion of Claude Shannon is term as substitution-permutation network(SP-network)[2].The idea of confusion is to make the relations between encrypted data and secret key as difficult as possible which can be achieved through substitution, whereas diffusion is used to scatter the statistical construction of original information over the greater part of encrypted information [3].The diffusion is achieved through permutation which simply means to reorder certain bits.By utilizing SP-network collectively, it is quite hard to detect any non-uniform change in cipher-text.The same idea of SP-network is now followed by different chaos-based encryption algorithms[4–11].

    Several image encryption schemes utilized chaotic dynamical systems for the confidentiality of digital contents [12–16].Chaotic schemes were also helpful for the formulation of nonlinear components of block cipher known as Substitution boxes (S-boxes) [17–21].The principal idea of constructing nonlinear components through chaotic dynamical systems is to add strong confusion capability which is surely one of the vital components in modern block ciphers.There exist many encryption structures in literature with weak security and vulnerability in implementation design due to skipping the notion of confusion and diffusion [22–25].A small change in chaotic parameters produces a dynamically different trajectory similarly small variations in chaotic parameters produce a completely new substitution box.The main contribution of this work is as follows:

    1.The idea of this research is to produce a nonlinear component by using a fractional chaotic logistic map.

    2.Implementation of constructed S-box in the suggested chaos-based image encryption method.

    3.The scheme also entails a continuous chaotic Lorenz system for diffusion that ultimately produces permutation[6].

    4.Some security assessments are performed to examine the efficiency and robustness of offered system along with some statistical analysis.

    This manuscript consists of seven sections.The basic concepts are reviewed in Section 2.The mathematical model of the Lorenz chaotic system is offered in Section 3.The offered substitution box and image encryption technique are presented in segments 4 and 5 correspondingly.The statistical analyses are presented in Section 6.As a final point,the conclusion is shown in the last section.

    2 Backgrounds

    In this section, we have presented some basic keys, which are essential for the interpretation of innovative image encryption techniques though suggested S-box based on discrete fractional chaotic iterative maps.

    2.1 Logistic Map

    The logistic map is one of the prominent and extensively utilized one dimensional(1-D)discrete logistic chaotic map proposed by R.M May, whose state evolves corresponding to the following mathematical equation[4]:

    where 0 ≤μ≤4 represent the control parameter and logistic map with state variableynwhose behaviors depend on the initial conditiony0.The chaotic outputsynof the map defined in Eq.(1)are bounded within the interval[0, 1]for alln≥0.

    2.2 Riemann-Liouville Fractional Derivative

    Iff(y)∈C([a,b])anda <x <bthen[5]:

    whereαranges from-∞to ∞and known as the Riemann-Liouville fractional integral having orderα.In the same way forα∈]0,∞[we let

    is known as Riemann-Liouville fractional derivative with orderα[6].

    2.3 Fractional Logistic Equation

    For ally≥0,λ >0 andα∈]-∞,∞[:

    which is called fractional logistic equation(FLE)of orderα.

    3 Mathematical Formulation of Atmospheric Convection Model

    In 1963,Edward Lorenz proposed a simple mathematical model for atmospheric convection.The mathematical derivation of Lorenz equations is given in [6,7].There are three different models of chaotic Lorenz systems which are given as follows:

    Viscosity+diffusion:

    Buoyancy+diffusion:

    Viscosity+buoyancy

    4 Proposed S-Box Using Fractional Chaotic Map

    The one-dimensional logistic map which was designed in 1967 by May [4] is one of the modest discrete nonlinear chaotic schemes which shows chaotic performance; its mathematical equation is described by the following iterative formula.

    By using the concept of the fractional logistic map,takingα= 0 and considering the fractional powers we purpose a chaotic fractional equation as

    wherexis variable of the map andx0decide the initial state,λis a system parameter,gandhare positive fractional powers andnrepresents the number of iterations desired to be applied.The initial valueλandx0acts as a private key when utilized in the encryption structure.To effectively decrypt the data, accurate values of bothλandx0are required at the receiver’s end.Therefore, the system turns out to be completely key-dependent which creates the retravel of secret data from the encrypted information complicated for the assailant.By using this fractional logistic map and the assumptionsg=1.5,h=1.5 andλ=3.5 we purposed 16×16 S-box overGF(28)(see Tab.1).

    Table 1: Proposed S-box by using chaotic fractional equation

    Table 1:Continued

    5 Suggested Image Encryption Algorithm

    In this segment, a fractional chaotic S-box-based image encryption technique is suggested.The intended scheme offers less computational time and cost of image encryption parallel to other methods which are available in the literature.The working steps of offered encryption scheme are as follows:

    Step 1:Choose a standard color image as input having sizen×m.

    Step 2:Divide the digital color image into three channels that are Red,Green,and Blue.

    Step 3:Utilize different proposed substitution boxes on each image layer individually.

    Step 4:Run Lorenz fractional chaotic equations and store all the generated output in one matrix.

    Step 5:Arrange matrix in ascending order by using the command of the sort in MATLAB and store the sorting position of each element in one matrix.

    Step 6:Now shuffle the pixels of each image layer corresponding to the sorting position matrix obtained in step 5.

    Step 7:Apply bitwise XOR with random array generated from Lorenz chaotic equation on each layer of the image obtained in step 6.

    Step 8:Concatenate all the layers produced from step 7 in one image.

    Step 9:The image attained from step 8 is the required encrypted image.

    The structure diagram of the offered image encryption algorithm is depicted in Fig.1.

    Figure 1:Design of proposed encryption scheme

    Decryption of Image

    The procedure of decryption is the same as the encryption procedure in reverse order.The original image can be retrieved easily by utilizing the decryption procedure.Figs.2 and 3 show some standard layer-wise encrypted images through the proposed scheme.

    Figure 2:(i–iv)Original layers of peppers image(v–viii)Encrypted layers of Peppers image

    Figure 3:(i–iv)Original layers of airplane image(v–viii)Encrypted layers of Airplane image

    6 Security Assessment of Suggested Technique

    This part of the manuscript describes various safety constraints to explain the robustness of the suggested technique.Some statistical analyses are accumulated by utilizing plain and their respective cipher images.These statistical analyses comprise correlation,entropy,uniformity,similarity measures,pixel modification,and sensitivity of plaintext.Each of the analyses is examined in an aspect to validate the efficiency of the encryption technique[15,16].

    6.1 NIST Analysis

    The randomness of a cipher can also be determined by NIST-800-22 test suite offered by the National Institute of Standard and Technology in 2001.NIST suite comprises several tests to analyze the arbitrariness in output data with probability values (pvalues).Thep-values of each assessment must be greater than 0.001 for a robust encryption scheme.The results of NIST for Peppers encrypted image of size 256×256 are depicted in Tab.2.The obtained results reflect that the encrypted image layers are highly randomized therefore,the offered encryption scheme is robust against all statistical attacks.

    Table 2: NIST test results for Peppers cipher image

    6.2 Histogram Analysis

    The histogram is the plot of the number of pixels for each tonal value.The histogram of original images contains sharp peaks in its distribution.An ideal encryption scheme yields a cipher image with uniform histogram distribution.3D histograms of the plain and enciphered Peppers image of size 256×256 image layers are displayed in Fig.4.From experiments, we can analyze that the scattering of pixels of the encrypted images is uniform, which can extensively decrease the values of correlation among the pixels.Consequently, histogram analysis indicates that our encryption algorithm is protected besides attacks.

    Figure 4: Continued

    Figure 4:(i–iv)Histograms of peppers image of size 256×256 original layers(v–viii)Histograms of peppers image encrypted layers

    6.3 Correlation Analysis

    The neighboring pixels of an image are highly correlated in horizontal, diagonal, and vertical directions.The original image exhibits the high correlation value, and alternatively, for an ideal encryption scheme, the correlation value must be less and approximately near to 0.A smaller value of the correlation of encrypted images leads to a secure encryption algorithm which reduces the possibility of attacks.The correlation coefficient of image pixels can be calculated by:

    where

    whereMandNare the estimations between two nearby pixels at grayscale in the digital image.The correlation coefficients for the plain and enciphered image along horizontal, vertical, and diagonal axes are presented in Tab.3.

    Table 3: Color components wise correlation coefficient of plain and enciphered images

    Table 3:Continued

    where H,V,and D shows the horizontal,vertical,and diagonal direction of the image,respectively.To quantify the correlation coefficient, we randomly choose 2500 sets of two adjoining pixels in three ways (horizontal, diagonal, and vertical) from encrypted and original image data.Tab.3 presents the corresponding experimental results.From Tab.3 we can examine that the values of correlation of original images are near to one, whereas the values of correlation of the enciphered images are near to 0.From the depicted results we can see that the suggested encryption technique reduces the correlation among image pixels accurately.Fig.5,presents the adjacent pixel distributions in the horizontal,diagonal,and vertical axes for Peppers images.Figs.5i–5iv presents the correlation of plain images,although Figs.5v–5viii represents the correlation of encrypted images.As from these Fig.5,we can see that the plain images exhibit high values of correlation,on the other hand,the enciphered images have a random distribution of correlation.The test results indicate that our encryption scheme has a very good influence on decreasing correlation.Therefore, the offered encryption algorithm is robust against all the attacks related to the correlation of pixels.

    Figure 5:(i–iv)Correlation coefficient among pixel pairs for plain peppers image;(v–viii)Correlation coefficient among pixel pairs for enciphered peppers image

    6.4 Information Entropy

    The distribution of gray values of the image is evaluated as the information entropy.Entropy increases with an increase in the uniformity of distribution of gray values.The encryption scheme is said to be highly secure if less information is leaked from the gray distribution value of images.Information entropy can be measured by the mathematical equation:

    wherepishows the gray value probability.The perfect value of encrypted image entropy is 8.The entropy of the enciphered image for the standard Lena image produced by the suggested scheme is 7.9991.The entropy of the enciphered image for Peppers image enumerated by the suggested scheme is 7.9990 and for Airplane image information entropy is 7.9991.These values are very near to the absolute value of entropy.Entropies of numerous original and enciphered images are analyzed which are listed in Tab.4.These values of entropy regard that they are very near to the perfect value 8.This shows that the encryption technique is safe against all feasible assaults.

    Table 4: Plain and encrypted images information entropies

    6.5 Distance Based Measurements

    The image quality assessment based on pixel modification measures are done by calculating maximum difference (MD), mean square error (MSE), the average difference (AD), peak signal to noise ratio(PSNR),normalized correlation(NCC),normalized absolute error(NAE)and structure content value(SC).These are the error metrics that are utilized to compare different images.

    Maximum Difference is also known as MD shows the maximum difference among the plain and enciphered images.The maximum difference can be represented in the mathematical form as follows:

    Our analyzed results are presented in Tab.5 which reflects that with the boost in the value of MD,the robustness of the encryption structure is increased.

    The normalized absolute error also named NAE is represented in mathematical form as follows:

    NAE defines the proportion of how far the enciphered digital data is from the plain image with the estimation of zero being impeccable similar images.From Tab.5, we can see that the increase in the approximation of normalized absolute error demonstrates a good description of scrambled images with encryption procedure.

    The average difference can be mathematically defined as:

    Table 5: Correlation-based and pixel difference-based measures of suggested encryption technique

    The value of the average difference is preferably zero for two similar digital images.The calculated results of the average difference are presented in Tab.5,which indicates that the suggested technique is robust against all possible differential assaults.

    6.6 Mean Squared Error and Peak Signal to Noise Ratio Analysis

    The encryption technique utilized to the original data adds noise to the actual digital contents therefore an encrypted digital image is not equivalent to the plain digital image.We process the MSE among the plain and encrypted images to evaluate the level of encryption.MSE can be formulated in mathematical form as:

    whereOxyandExyallude to pixels situated atxthrow andythcolumn of the plain and encrypted image individually.Higher the MSE value, increase the robustness of encryption.The enciphered image quality is evaluated using peak signal to noise ratio(PSNR),which is represented by the mathematical formula:

    whereIMAXis the highest pixel approximation of the image.The PSNR ought to be minimal value when equates to the enormous difference among original and encrypted images.Results in Tab.5 clearly show that the suggested technique is very near to the ideal values of MSE and PSNR,therefore the scheme is secure against security threats.

    6.7 Similarities Measures

    Normalized cross-correlation,structure content,and structure similarity are utilized to estimate the resemblances between two signals.These are some standard analyses for measuring that original and encrypted images are analogous or different.

    Normalized cross-correlation also known as NCC has been generally utilized as a metric.To check the level of difference (or resemblance) between two images.The NCC ranges from –1 and 1.Mathematically,the normalized correlation of the image is computed by the given formula[16–21]:

    whereX×Ydenotes the size of plain imageOand cipher imageEboth.Our analyzed results presented in Tab.5 reveals that the calculation of NCC for encryption is near to unity which distinctly means that the suggested technique contains strong divergences among the pixels of original and enciphered images.

    Structural content is also known as SC, measures the collective weight of a plain image to the respective encrypted image.It is,hence,a global metric.If the value of SC exhibits as one,at that point the encrypted image represents the better quality,and an increase in the assessment of SC denotes that the image is very low in quality.The mathematical form of structural content is as:

    From Tab.5 we can observe that our encryption technique gives the evaluation of SC which is not very near to unity due to the diffusion and confusion like noise disorder in the plain image.

    6.8 Plaintext Sensitivity Analysis

    To check the randomness of the encryption technique,diffusion is an important constraint that must be assessed.Two basic methods are implemented recognized as the number of changing pixel rate (NPCR), and the unified averaged changed intensity (UACI) to examine the impact of one-bit alteration in the plain content and the enciphered content.NPCR focuses on the number of pixels that change the assessment in differential assaults although the UACI concentrates on the AD(averaged difference)among two paired enciphered images.Assume encrypted image previously and afterward,one-pixel change in original content image isC1andC2correspondingly.The value of pixels at grid(x,y)inE1andE2are symbolized asE1(x,y)andE2(x,y),Da bipolar array is described by Eq.(20).Formerly the MAE,UACI,and NPCR can be formulated by the subsequent representations:

    where

    Tab.6 presents the values of, UACI (≈33%) and NPCR (>99%) for every layer of image for nine different standard images.Investigational consequences demonstrate the estimated variance of UACI and NPCR are actual near to the theoretical measures,which explain the validity of theoretical standards.Hence our proposed encryption method is resilient against differential attacks.

    Table 6: The results of sensitivity analysis of suggested encryption technique

    6.9 Z1 Test for Randomness(0–1 Test)

    In this section, we have applied the 0–1 test for the chaos which checks the randomness of enciphered images.When the value of the Z1 test is near to one it means that the proposed scheme defines good randomness which shows that it is secure against differential attacks.On the other side,if the value of this test is near zero,this means the test is failed and there is no chaos in the encrypted image.Here we have presented analyzed results in Tab.7 which defines the Z1 test value for the layerwise encrypted image.

    6.10 Comparative Analysis with Standard Results

    In this section, we compare the suggested encryption method with numerous states of the arts,which have high security.The comparison contains the following aspects: information entropy,correlation among different pixels of encrypted images, robustness to plaintext sensitivity analysis.Furthermore,from our experimental results,we can see that correlation values are high between three R,G,and B layers for plain color digital images,which makes data revelation conceivable.Moreover,we have presented a contrast of correlation coefficient of Pepper 256×256 image enciphered with our suggested technique and some encryption method already described in the literature(see Tab.8).

    Here we have offered a contrast of values of entropy of Pepper 256 × 256 image encrypted with our proposed scheme and some encryption method already described in the literature (seeTab.9).Subsequently, the suggested image encryption technique is robust adjacent to the entropy attack.Moreover,the entropy assessments of the suggested method are better as contrasted to other encryption schemes.The entropy of the recommended technique for encrypted Pepper image is improved than current methods by inspecting Tab.9.

    Table 7: Z1-Test for of enciphered image

    Table 8:Contrast of the correlation of suggested technique with current procedures using Pepper image

    Table 9: Comparative analysis for the entropy of Pepper image of size 256×256

    Thus, we have presented a UACI and NPCR of Pepper 256 × 256 image enciphered with our suggested technique with some other encryption methods to show the better performance of the suggested scheme in Tab.10.From depicted results,we can see that our offered scheme is more resilient as compared to other techniques.

    Table 10: Contrast of differential attacks analysis

    6.11 Time Complexity Analysis

    The total time in seconds carried by the suggested technique to be run depending on the input length is described as time complexity.The algorithm was executed on a personal computer with an Intel(R) for the simulations.Core (TM) i7-7500U 2.90 GHz CPU and 8 GB memory capacity.MATLAB R2019b was utilized for the simulations.The execution time(in seconds)of different sizes of Peppers image is depicted in Tab.11.

    Table 11: Time complexity analysis of the offered scheme

    7 Conclusion and Future Recommendations

    In this work, we have designed an innovative image encryption technique by employing a discrete one-dimensional logistic map and a continuous convective atmospheric model(Lorenz chaotic system).The first phase of offered image encryption scheme involves the construction of a nonlinear confusion component of the block cipher.This S-box is fundamentally accountable for the confusion in the anticipated encryption mechanism.In the second phase, we have employed a Lorenz chaotic system as a diffusion agent in the offered technique.The obtained outcomes are then contrasted with previously existing benchmarks in image encryption methods.Our anticipated image encryption scheme has quite satisfactory statistical results.

    The suggested encryption structure can also be turned into a lightweight mechanism by offering small 4×4 S-boxes with fractional chaotic logistic maps.The offered structure can be extended in audio and video encryption.

    Data Availability Statement:The data utilized in this manuscript are available in the open SIPI Image Database at http://sipi.usc.edu/database/.

    Funding Statement:The author Mohammad Mazyad Hazzazi extend his appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through research groups program under Grant no.R.G.P.2/150/42.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    av在线观看视频网站免费| 制服人妻中文乱码| 亚洲av日韩在线播放| 一区二区日韩欧美中文字幕| 久久人人97超碰香蕉20202| 97人妻天天添夜夜摸| 久久精品久久精品一区二区三区| 久久久久久久久免费视频了| 成人国产av品久久久| 久久午夜综合久久蜜桃| 考比视频在线观看| 看免费av毛片| 一边亲一边摸免费视频| 欧美人与性动交α欧美精品济南到| 国产成人精品久久久久久| 美女高潮到喷水免费观看| 巨乳人妻的诱惑在线观看| 亚洲国产欧美日韩在线播放| a级毛片黄视频| 亚洲国产精品成人久久小说| 精品国产国语对白av| 熟女少妇亚洲综合色aaa.| 免费观看a级毛片全部| 男女下面插进去视频免费观看| 精品国产乱码久久久久久男人| 人妻一区二区av| 新久久久久国产一级毛片| 麻豆精品久久久久久蜜桃| 亚洲一区中文字幕在线| 又黄又粗又硬又大视频| 一区二区三区乱码不卡18| 黄色怎么调成土黄色| 国产精品 欧美亚洲| 一边亲一边摸免费视频| 久久久久国产一级毛片高清牌| 亚洲国产av新网站| 哪个播放器可以免费观看大片| 亚洲精品自拍成人| 成人免费观看视频高清| 午夜免费男女啪啪视频观看| 亚洲av成人不卡在线观看播放网 | 深夜精品福利| 另类亚洲欧美激情| 国产野战对白在线观看| 悠悠久久av| 亚洲精品第二区| av不卡在线播放| 久久韩国三级中文字幕| 国产日韩一区二区三区精品不卡| 777米奇影视久久| 中文字幕人妻熟女乱码| 亚洲激情五月婷婷啪啪| 久久亚洲国产成人精品v| 咕卡用的链子| 久久久精品94久久精品| 精品一区二区免费观看| 中文字幕人妻熟女乱码| 两性夫妻黄色片| 电影成人av| 天天添夜夜摸| 啦啦啦 在线观看视频| 国产av一区二区精品久久| 国产深夜福利视频在线观看| 中文字幕亚洲精品专区| 欧美日韩精品网址| www日本在线高清视频| 久久 成人 亚洲| 精品一区二区三区av网在线观看 | 亚洲,欧美精品.| 国产深夜福利视频在线观看| 天堂俺去俺来也www色官网| 在现免费观看毛片| 欧美乱码精品一区二区三区| 久久综合国产亚洲精品| 国产激情久久老熟女| 狂野欧美激情性xxxx| 成人手机av| 国产精品成人在线| 这个男人来自地球电影免费观看 | av天堂久久9| 国产精品欧美亚洲77777| 国产亚洲最大av| 国产精品三级大全| av网站在线播放免费| 欧美人与性动交α欧美精品济南到| 国产成人精品无人区| 免费女性裸体啪啪无遮挡网站| 岛国毛片在线播放| 亚洲精品一二三| 国产又爽黄色视频| av线在线观看网站| 老司机靠b影院| 国产精品久久久久久精品古装| 一级黄片播放器| 青春草国产在线视频| 曰老女人黄片| 国产老妇伦熟女老妇高清| 亚洲国产中文字幕在线视频| 街头女战士在线观看网站| 国产午夜精品一二区理论片| 自线自在国产av| 妹子高潮喷水视频| 激情视频va一区二区三区| 亚洲精品国产区一区二| 亚洲欧美精品综合一区二区三区| 一本大道久久a久久精品| 美国免费a级毛片| 亚洲欧美一区二区三区久久| 亚洲精品久久午夜乱码| 国产视频首页在线观看| 国产亚洲最大av| 成人影院久久| 丰满乱子伦码专区| 激情五月婷婷亚洲| 欧美精品av麻豆av| 午夜久久久在线观看| 成人国语在线视频| 少妇人妻 视频| 看非洲黑人一级黄片| 亚洲美女黄色视频免费看| 久久精品亚洲av国产电影网| 国产黄频视频在线观看| 男人操女人黄网站| 国产欧美日韩综合在线一区二区| 日本色播在线视频| 91aial.com中文字幕在线观看| 欧美日韩视频精品一区| av福利片在线| 日韩精品有码人妻一区| 欧美日韩福利视频一区二区| e午夜精品久久久久久久| 亚洲欧美成人综合另类久久久| 少妇人妻久久综合中文| 久久这里只有精品19| 亚洲美女黄色视频免费看| 色精品久久人妻99蜜桃| 国产成人精品无人区| 国产成人精品久久久久久| 中文字幕人妻丝袜制服| 午夜福利网站1000一区二区三区| 母亲3免费完整高清在线观看| 亚洲欧美精品自产自拍| 亚洲第一区二区三区不卡| 天天操日日干夜夜撸| 纵有疾风起免费观看全集完整版| 国产男女超爽视频在线观看| 在线观看一区二区三区激情| 无遮挡黄片免费观看| 青春草视频在线免费观看| 色94色欧美一区二区| 99国产综合亚洲精品| 纵有疾风起免费观看全集完整版| 国产精品人妻久久久影院| 99久久综合免费| 妹子高潮喷水视频| 免费看不卡的av| 午夜福利在线免费观看网站| 精品国产乱码久久久久久小说| 又大又黄又爽视频免费| 中文字幕最新亚洲高清| 欧美久久黑人一区二区| www.精华液| 午夜日韩欧美国产| 午夜日韩欧美国产| 婷婷成人精品国产| 精品人妻一区二区三区麻豆| 久久久国产欧美日韩av| 亚洲,欧美,日韩| 黄色一级大片看看| 日韩,欧美,国产一区二区三区| 成年人免费黄色播放视频| 亚洲国产日韩一区二区| 看免费成人av毛片| 五月开心婷婷网| 国产av码专区亚洲av| 伊人亚洲综合成人网| 超色免费av| 亚洲天堂av无毛| 精品国产一区二区久久| e午夜精品久久久久久久| 久久久国产一区二区| 搡老乐熟女国产| av在线播放精品| 亚洲综合精品二区| 97人妻天天添夜夜摸| 热re99久久精品国产66热6| 久久久久久人妻| 国产一区有黄有色的免费视频| 久久久精品免费免费高清| 亚洲第一青青草原| 久久精品人人爽人人爽视色| 在线天堂最新版资源| 老鸭窝网址在线观看| 汤姆久久久久久久影院中文字幕| 99精品久久久久人妻精品| bbb黄色大片| 国产精品人妻久久久影院| 精品一区在线观看国产| 日日爽夜夜爽网站| 日韩成人av中文字幕在线观看| 国产成人a∨麻豆精品| 亚洲自偷自拍图片 自拍| 最近2019中文字幕mv第一页| 另类精品久久| 九九爱精品视频在线观看| 一级爰片在线观看| kizo精华| 国产在线视频一区二区| 亚洲成色77777| 国产伦人伦偷精品视频| 伊人亚洲综合成人网| 日本色播在线视频| 十分钟在线观看高清视频www| 欧美国产精品一级二级三级| 国产高清国产精品国产三级| 亚洲情色 制服丝袜| 亚洲,一卡二卡三卡| 黄色毛片三级朝国网站| 不卡av一区二区三区| 在线免费观看不下载黄p国产| 国产精品久久久久久久久免| 国产日韩欧美亚洲二区| 男人添女人高潮全过程视频| 一区福利在线观看| 成年人免费黄色播放视频| 一级毛片黄色毛片免费观看视频| 久久免费观看电影| 香蕉国产在线看| 操美女的视频在线观看| 欧美国产精品一级二级三级| 久久99热这里只频精品6学生| av电影中文网址| 99热全是精品| 精品亚洲乱码少妇综合久久| 日韩一区二区视频免费看| 国产欧美亚洲国产| 国产av码专区亚洲av| 国产黄色免费在线视频| 亚洲美女视频黄频| √禁漫天堂资源中文www| 国产99久久九九免费精品| 高清欧美精品videossex| 亚洲精品成人av观看孕妇| 久久久久久人妻| 交换朋友夫妻互换小说| 国产精品无大码| 少妇的丰满在线观看| 亚洲av电影在线观看一区二区三区| 国产免费视频播放在线视频| av女优亚洲男人天堂| 悠悠久久av| 国产淫语在线视频| 久久鲁丝午夜福利片| 天堂中文最新版在线下载| 在线观看免费日韩欧美大片| 桃花免费在线播放| 成人18禁高潮啪啪吃奶动态图| av不卡在线播放| 精品一区二区三卡| 日韩av不卡免费在线播放| 国产一区二区 视频在线| 婷婷色av中文字幕| 久久精品熟女亚洲av麻豆精品| 久久天堂一区二区三区四区| 亚洲av电影在线进入| 午夜日本视频在线| 日韩制服骚丝袜av| 久久久久精品国产欧美久久久 | 超碰成人久久| 建设人人有责人人尽责人人享有的| 国产精品麻豆人妻色哟哟久久| 国产伦理片在线播放av一区| 免费观看人在逋| 成人黄色视频免费在线看| 国产男人的电影天堂91| 一二三四中文在线观看免费高清| 亚洲欧美一区二区三区国产| 日日啪夜夜爽| 男女床上黄色一级片免费看| 亚洲av日韩在线播放| 少妇被粗大猛烈的视频| √禁漫天堂资源中文www| 9191精品国产免费久久| 亚洲欧美激情在线| 男女午夜视频在线观看| 亚洲成av片中文字幕在线观看| 满18在线观看网站| 国产欧美日韩综合在线一区二区| svipshipincom国产片| netflix在线观看网站| 韩国高清视频一区二区三区| 亚洲欧美色中文字幕在线| 日本黄色日本黄色录像| 母亲3免费完整高清在线观看| 亚洲国产av影院在线观看| 丰满迷人的少妇在线观看| 老司机深夜福利视频在线观看 | 国产黄色免费在线视频| 成人国语在线视频| 啦啦啦视频在线资源免费观看| 精品少妇一区二区三区视频日本电影 | 我的亚洲天堂| 日本欧美国产在线视频| 飞空精品影院首页| 日韩欧美一区视频在线观看| 免费观看人在逋| 少妇人妻 视频| 国产成人av激情在线播放| 丝袜脚勾引网站| 无遮挡黄片免费观看| 欧美最新免费一区二区三区| 香蕉国产在线看| 精品一区在线观看国产| 老司机亚洲免费影院| 亚洲av在线观看美女高潮| 久久精品国产亚洲av涩爱| 久久免费观看电影| av又黄又爽大尺度在线免费看| av卡一久久| 国产一级毛片在线| 亚洲欧美成人精品一区二区| 精品福利永久在线观看| 亚洲成国产人片在线观看| 丝袜美足系列| 天天躁夜夜躁狠狠躁躁| 国产成人一区二区在线| 日韩av在线免费看完整版不卡| 国产男人的电影天堂91| 婷婷色综合www| 伊人久久国产一区二区| 成人免费观看视频高清| 制服诱惑二区| 国产人伦9x9x在线观看| 欧美精品亚洲一区二区| 日韩 欧美 亚洲 中文字幕| 亚洲国产精品一区二区三区在线| 99热网站在线观看| 精品少妇内射三级| 晚上一个人看的免费电影| 男女床上黄色一级片免费看| 大香蕉久久成人网| 久久热在线av| 韩国av在线不卡| 久久久精品免费免费高清| 亚洲一码二码三码区别大吗| 一本色道久久久久久精品综合| 美国免费a级毛片| 日日啪夜夜爽| 夫妻性生交免费视频一级片| 一区二区av电影网| 丁香六月欧美| 18禁动态无遮挡网站| 国产探花极品一区二区| 街头女战士在线观看网站| 中文字幕最新亚洲高清| 亚洲精品成人av观看孕妇| 久热这里只有精品99| 麻豆av在线久日| 精品一区在线观看国产| 最近2019中文字幕mv第一页| 午夜福利一区二区在线看| 久久久国产一区二区| 咕卡用的链子| 91成人精品电影| 成年美女黄网站色视频大全免费| 亚洲一级一片aⅴ在线观看| av不卡在线播放| 日韩电影二区| 久久久久久久久久久久大奶| 日本猛色少妇xxxxx猛交久久| 久久久久精品性色| 两个人免费观看高清视频| 婷婷色麻豆天堂久久| 久久午夜综合久久蜜桃| 国产乱来视频区| 国产不卡av网站在线观看| 午夜日本视频在线| 国产视频首页在线观看| 麻豆乱淫一区二区| 国产av码专区亚洲av| 色综合欧美亚洲国产小说| netflix在线观看网站| 伊人久久国产一区二区| 精品国产乱码久久久久久男人| 最新在线观看一区二区三区 | 在线观看免费日韩欧美大片| 黄片播放在线免费| 欧美成人精品欧美一级黄| 在线天堂中文资源库| 日韩精品有码人妻一区| 一本久久精品| 赤兔流量卡办理| 精品国产乱码久久久久久小说| 欧美乱码精品一区二区三区| 午夜福利视频在线观看免费| 久久久久久久久久久久大奶| 国产人伦9x9x在线观看| 婷婷成人精品国产| 人人妻人人澡人人爽人人夜夜| 操美女的视频在线观看| 欧美国产精品va在线观看不卡| h视频一区二区三区| 超色免费av| 啦啦啦中文免费视频观看日本| 亚洲图色成人| 香蕉丝袜av| 免费久久久久久久精品成人欧美视频| 侵犯人妻中文字幕一二三四区| 午夜福利,免费看| 少妇被粗大猛烈的视频| 咕卡用的链子| avwww免费| 黄片无遮挡物在线观看| 国产99久久九九免费精品| 高清在线视频一区二区三区| 制服丝袜香蕉在线| 伦理电影免费视频| 如何舔出高潮| 国产av精品麻豆| 亚洲欧洲日产国产| 亚洲精品国产区一区二| 国产高清不卡午夜福利| 国产男女内射视频| 免费看av在线观看网站| 国产成人精品在线电影| 777米奇影视久久| 在线免费观看不下载黄p国产| 捣出白浆h1v1| 一本—道久久a久久精品蜜桃钙片| 水蜜桃什么品种好| 99re6热这里在线精品视频| 久久这里只有精品19| av女优亚洲男人天堂| 亚洲国产精品999| 国产精品秋霞免费鲁丝片| 2021少妇久久久久久久久久久| 在线观看免费视频网站a站| 中文欧美无线码| 精品国产国语对白av| 在线观看免费视频网站a站| 大香蕉久久成人网| 在线观看免费午夜福利视频| 国产片特级美女逼逼视频| 黄片小视频在线播放| 国产麻豆69| 亚洲欧美一区二区三区国产| 成年人免费黄色播放视频| 十分钟在线观看高清视频www| 国产精品一区二区精品视频观看| 精品人妻熟女毛片av久久网站| 桃花免费在线播放| 亚洲精品成人av观看孕妇| 久久女婷五月综合色啪小说| 亚洲国产中文字幕在线视频| 亚洲精品国产av蜜桃| 麻豆av在线久日| 国产成人a∨麻豆精品| 久久精品熟女亚洲av麻豆精品| 日本av免费视频播放| 亚洲精品国产av成人精品| 国产一卡二卡三卡精品 | 国产精品av久久久久免费| 日韩精品有码人妻一区| 久久久久网色| 日韩,欧美,国产一区二区三区| 成年女人毛片免费观看观看9 | 在线精品无人区一区二区三| 自拍欧美九色日韩亚洲蝌蚪91| 狠狠精品人妻久久久久久综合| 国产精品 国内视频| 欧美日韩国产mv在线观看视频| 欧美激情 高清一区二区三区| 少妇的丰满在线观看| 亚洲视频免费观看视频| 夫妻午夜视频| 精品一区二区三卡| 国产成人免费观看mmmm| 免费黄网站久久成人精品| 美女主播在线视频| 亚洲精品在线美女| 亚洲av中文av极速乱| 9热在线视频观看99| 亚洲精品aⅴ在线观看| 亚洲欧美清纯卡通| 精品国产露脸久久av麻豆| 9191精品国产免费久久| 成人免费观看视频高清| 高清不卡的av网站| 国产欧美亚洲国产| 久久精品久久精品一区二区三区| 99re6热这里在线精品视频| 亚洲av电影在线观看一区二区三区| 欧美变态另类bdsm刘玥| 男女边吃奶边做爰视频| 80岁老熟妇乱子伦牲交| 男女高潮啪啪啪动态图| 赤兔流量卡办理| 久久午夜综合久久蜜桃| 熟女av电影| 制服人妻中文乱码| 亚洲精品美女久久久久99蜜臀 | 亚洲国产精品国产精品| 男女高潮啪啪啪动态图| 久久精品人人爽人人爽视色| a 毛片基地| 99精品久久久久人妻精品| 搡老岳熟女国产| 天堂8中文在线网| 国产高清不卡午夜福利| 少妇人妻精品综合一区二区| 久久这里只有精品19| 一区二区日韩欧美中文字幕| 91精品国产国语对白视频| 国产女主播在线喷水免费视频网站| 亚洲成人一二三区av| 成人国语在线视频| 亚洲男人天堂网一区| 一本久久精品| 国产黄频视频在线观看| 亚洲少妇的诱惑av| 国产精品一区二区在线不卡| 最近中文字幕2019免费版| 国产亚洲av高清不卡| 亚洲美女视频黄频| 国产精品国产av在线观看| 嫩草影院入口| 婷婷色麻豆天堂久久| 人人妻,人人澡人人爽秒播 | 91精品伊人久久大香线蕉| 欧美精品人与动牲交sv欧美| 熟妇人妻不卡中文字幕| 久久久精品94久久精品| 亚洲人成77777在线视频| 97精品久久久久久久久久精品| 亚洲av成人精品一二三区| 精品人妻在线不人妻| 美女福利国产在线| 午夜日本视频在线| 精品人妻一区二区三区麻豆| 两个人看的免费小视频| 香蕉丝袜av| 妹子高潮喷水视频| 亚洲国产欧美在线一区| 19禁男女啪啪无遮挡网站| 久久久久精品性色| 午夜老司机福利片| 久久天堂一区二区三区四区| 好男人视频免费观看在线| 婷婷色麻豆天堂久久| 男女午夜视频在线观看| 天堂8中文在线网| 国产免费福利视频在线观看| 国产精品蜜桃在线观看| 国产精品三级大全| 夫妻性生交免费视频一级片| 日韩中文字幕欧美一区二区 | 国产精品久久久久成人av| 午夜av观看不卡| 久久狼人影院| 嫩草影院入口| 亚洲精品,欧美精品| 国产精品久久久av美女十八| 久久97久久精品| 久久久亚洲精品成人影院| 国产乱人偷精品视频| 两个人看的免费小视频| 大话2 男鬼变身卡| 国产爽快片一区二区三区| 国产片内射在线| 国产有黄有色有爽视频| 国产精品久久久久久久久免| 男女边吃奶边做爰视频| 国产av精品麻豆| 婷婷色av中文字幕| 国产精品免费大片| 亚洲成人av在线免费| 一区二区三区激情视频| 色综合欧美亚洲国产小说| 日韩熟女老妇一区二区性免费视频| 亚洲欧美日韩另类电影网站| 亚洲成国产人片在线观看| 欧美日本中文国产一区发布| 狂野欧美激情性bbbbbb| 色吧在线观看| 久久鲁丝午夜福利片| 国产精品免费视频内射| 最新在线观看一区二区三区 | 51午夜福利影视在线观看| 亚洲国产成人一精品久久久| 久久久久精品国产欧美久久久 | 久久狼人影院| 精品卡一卡二卡四卡免费| 中文欧美无线码| 一区福利在线观看| 一级毛片我不卡| 69精品国产乱码久久久| 国产精品国产av在线观看| 欧美人与性动交α欧美软件| 久久久久精品久久久久真实原创| 亚洲成人国产一区在线观看 | 欧美黑人精品巨大| 美国免费a级毛片| av福利片在线| 欧美老熟妇乱子伦牲交| 亚洲精品日本国产第一区| 国产一区二区在线观看av| 在线精品无人区一区二区三| 国产精品99久久99久久久不卡 | 亚洲第一青青草原| a级毛片黄视频| 国产成人免费观看mmmm| 19禁男女啪啪无遮挡网站| 日韩一区二区三区影片| 久久久国产一区二区| 大陆偷拍与自拍|