• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Robust Watermarking of Screen-Photography Based on JND

    2022-08-23 02:17:22SiyuGuJinHanXingmingSunandYiCao
    Computers Materials&Continua 2022年6期

    Siyu Gu,Jin Han,,Xingming Sun,2 and Yi Cao,3

    1Nanjing University of Information Science&Technology,Nanjing,210044,China

    2Engineering Research Center of Digital Forensics,Ministry of Education,Nanjing,201144,China

    3Department of Electrical and Computer Engineering,University of Windsor,401 Sunset Avenue,Windsor,ON,N9B 3P4,Canada

    Abstract: With the popularity of smartphones,it is often easy to maliciously leak important information by taking pictures of the phone.Robust watermarking that can resist screen photography can achieve the protection of information.Since the screen photo process can cause some irreversible distortion, the currently available screen photo watermarks do not consider the image content well and the visual quality is not very high.Therefore,this paper proposes a new screen-photography robust watermark.In terms of embedding region selection, the intensity-based Scale-invariant feature transform(SIFT)algorithm used for the construction of feature regions based on the density of feature points,which can make it more focused on the key content of the image; in terms of embedding strength, the Just noticeable difference (JND) model is applied to limit the intensity of the watermark embedding according to the luminance and texture of the picture to balance robustness and invisibility;after embedding watermark,the coefficients in the neighborhood are again adjusted with optimal constraints to improve the accuracy of watermark extraction.After experiments, it is shown that the method we proposed can improve the correct rate of watermark extraction,the quality of the visual aspect of the watermarked picture is also improved.

    Keywords:Screen photography;robust watermarking;SIFT;JND

    1 Introduction

    Currently,as smartphones become more popular and widely used,people can easily record some important information they need by taking photos with their phones.However,the images stored by taking photos can also be easily copied,transmitted and restored,which will lead to leakage,malicious theft and illegal distribution of some important information,causing a series of security problems.As digital watermarking technology has been widely used in our work and life,and it enables copyright protection and leakage tracking.Therefore, in order to protect the image information in the screen from malicious leakage and to be able to track the source of leakage in time after the leakage,we can add a watermark to the picture.Once the picture is leaked, a watermark can be extracted from the picture and we can locate the source of the leak based on the watermark information to narrow down the scope of the investigation and thus protect important information.

    The technology of digital watermarking is divided into two domains,namely spatial domain and transform domain.Embedding is done in the spatial domain by modifying pixel values and commonly used spatial domain techniques are Least Significant Bit(LSB)[1],additive based techniques etc.And in the transform domain, where pixel values are transformed into frequency coefficients and then is used to embed, commonly used techniques are Discrete Cosine Transform(DCT) [2,3], Discrete Wavelet Transform(DWT)[4],Discrete Fourier Transform(DFT)[5],there are some improvements on these basic techniques such as Redundant Discrete Wavelet Transformation(RDWT)[6],Quaternion Discrete Fourier transform(QDFT) [7], etc.Sometimes multiple frequency techniques are used in combination such as DCT-DWT [8,9], Dual Tree Complex Wavelet Transform- Discrete Cosine Transform(DTCWT-DCT)[10]etc.

    The screen photography process,which is the process of capturing a screen with a mobile phone and generating an image, undergoes analog-to-digital and digital-to-analog conversion attacks [11]and also causes many distortions.In past years, many researchers have worked on print-scanning resilient watermarking schemes [12,13] as well as print-camera resilient watermarking schemes[14–16],but due to the special nature of screen photography,experiments have shown that the majority of watermarking schemes do not work for screen photography processes,so some new watermarking schemes are needed.

    Screen-photography watermarking algorithms have been investigated by several researchers in recent years.Fang et al.[17] presented a screen-photography watermarking scheme that uses an intensity-based SIFT algorithm to determine embedding region, uses the small size of the template to embed the watermark over and over into different areas, and extracts watermarks using crossvalidation.This method has high robustness to watermarks obtained from screen photography, but requires manually finding the four vertices of the image for correction; the scheme does not apply to images with simple textures due to the limitations of the SIFT algorithm; and the scheme causes large visual distortion for binary images.Chen et al.[18]proposed screenshot robust watermarking for satellite images,proposing to use DFT to embed to deal with the quality decline due to screenshots,and using the synchronous response index for estimating the appropriate scale level as well as the location of the synchronous watermark during extraction; the scheme is robust to common attacks and screenshot attacks.Chen et al.[19] presented a feature synchronization based watermarking scheme for screenshots,using Gaussian functions,improved Harris-Laplace detectors and accelerated robust feature orientation descriptors to construct embedding regions for watermark synchronization,and also using non-rotational embedding methods and preprocessing methods to modulate the DFT coefficients, which is robust to screenshot attacks and also to attacks with additional common desynchronization attacks on screenshots is effective.Chen et al.[20] proposed a new scheme combining encryption and screen protection.The scheme first embeds the watermark in the DFT domain and then generates the second watermark based on two-dimensional coding and inverse DFT.A segmentation encryption algorithm based on chaotic mapping is proposed to enhance the robustness of the encrypted watermark,and the watermark synchronization algorithm based on frame position is used in the watermark extraction process.The scheme is safe and reliable,and has high robustness.

    Several of the above methods embed watermarks by performing modifications in the frequency domain,such as the DCT and DFT domains.In recent years,deep learning methods have also been shown to be able to undertake watermark embedding and extraction.Fujihashi et al.[21]proposed to embed watermarks into images using a deep Convolutional Neural Networks encoder and decoder for watermarking, which has higher throughput than DCT based neural network watermarking.Zhong et al.[22]proposed a watermarking system based on Deep Neural Networks(DNN)using an unsupervised structure and a new loss calculation method,which is capable of extracting watermarks in camera captured images as well, with good practicality and robustness.Jia et al.[23] proposed a new method for embedding hyperlinks into ordinary images that can detect watermarks by cameraequipped mobile devices.Incorporation of a distortion network which employs distinguishable 3D rendering operations among encoder and decoder can emulate distortion caused by the introduction of camera imaging and is somewhat robust to camera photography.Fang et al.[24]suggested a depthtemplate-based algorithm for watermarking, which designs a message embedding template and a localization template on the embedding side and uses a two-level DNN on the extraction side to achieve higher robustness against camera photography.

    To increase the robustness of screen-photography watermarking and to strike a balance between robustness and invisibility.Therefore,we propose a screen-photography watermarking technique.Our contributions are the following:

    (1) In regard to embedding area selection, the intensity-based SIFT algorithm used for the construction of feature regions according to the density of feature points,so that the feature region pays more attention to the key content of the image, and this method can accurately locate the embedded region during extraction;

    (2) In terms of watermark embedding strength, the JND model is proposed to set the intensity of the watermark embedding,and the watermark embedding strength changes adaptively with image luminance and texture,to achieve the balance of robustness and invisibility;

    (3) An optimization scheme of neighborhood coefficient size constraint is proposed to apply the same size constraint to other coefficient pairs in the neighborhood of modified DCT coefficients, so that the watermark information can still be extracted accurately when the feature points are shifted.Results of the experiment showed that after the above three methods can improve the correct rate of watermark extraction,and the quality of the visual aspect of the watermarked picture is also improved.

    The organization of this paper is as follows.Section 2 is a related presentation that describes screen photography distortion, the SIFT algorithm, and the JND model.Section 3 describes the proposed method in this paper.The experimental results and comparative analysis are given in Section 4.Finally,Section 5 concludes the work of this paper.

    2 Related Work

    2.1 Screen Photography Distortion

    Fang et al.[17] and Chen et al.[19] studied and summarized distortions that resulted from the screen capture process.The process of screen camera is classified into three sub-processes,which are screen display,shooting and camera imaging process.And a series of distortions are caused in these three sub-processes,Fang et al.divided the distortion in the screen capture process into four categories,which are display distortion, lens distortion,sensor distortion and processing distortion,and Chen et al.divided the distortion in the screen capture process into five categories,which are linear distortion,gamma adjustment,geometric distortion,noise attack and low-pass filter attack[25].We believe that three of these distortions,lens distortion,light source distortion and Moiré streak distortion should be of concern.

    2.2 SIFT Algorithm

    The SIFT algorithm or scale invariant feature transformation is an algorithm in image processing,which is used to detect key points in the image and provide feature descriptors for the direction of key points[26].The algorithm can adapt to changes in luminance with good stability and invariance.Schaber et al.[27]demonstrated that SIFT keypoints are screenshot invariant,but traditional SIFT algorithms do not allow blind extraction and have long localization times[28,29],so we also use the same intensity-based SIFT algorithm as Fang et al.for finding regions with embedded watermarks.The equation is defined as Eq.(1).

    where p denotes a key point in the Difference of Gaussians(DoG)domain,andp=(x,y,σ),the DoG image is described as Eq.(2).

    where(x,y)is a pixel location of the image andσis the scale space factor.L(x,y,σ)is defined as the original imageI(x,y)with a variable scale 2-dimensional GaussianG(x,y,σ)convolution operation.The equation is as follows:

    where*denotes the convolution operation,(x,y)represents a pixel position of the image,andσis the scale space factor.

    2.3 JND Model

    JND is the minimum perceptible difference,and in image processing,JND can be used to measure the sensitivity of the human eye to distortion in different regions of an image [30].The JND model mainly considers the properties of luminance masking as well as texture masking of Human Visual System(HVS), and uses a nonlinear relationship to superimpose the effects of both.Qin et al.[31]suggested using the spatial JND model to determine the strength of the watermark embedding to obtain good visual performance.This paper uses JND to adjust the size of watermark embedding intensity, which can achieve an adaptive change of embedding intensity with image luminance and texture.The basic formula of JND is as follows.

    Of these,theTl(x,y)and,y)are the visibility threshold of the luminance masking factor and the texture masking factor.is the superposition constant, which reflects the degree of overlap of the two masks.

    3 Proposed Method

    3.1 Watermark Embedding Process

    The watermark embedding method proposed is described below.First select the host image for embedding, if a color image is an input, convert the input to YCbCr color space, and then select the image of Y channel, otherwise, it will be directly used as the host image.Then select the feature region for embedding the watermark,find the feature points using intensity-based SIFT algorithm and construct the feature region according to the density of the feature points.The watermark sequence is encoded using Bose–Chaudhuri–Hocquenghem(BCH)codes and the encoded watermark sequence is used to embed.The watermark embedding is performed in the DCT domain.Finally,the coefficients in the neighboring domain are adjusted again with optimization constraints.The specific watermark embedding process is shown in Fig.1.

    Figure 1:Watermark embedding process

    Convert the watermark sequence into a binary sequence and encode it using BCH codes.The obtained binary watermark sequence is put into a matrix W of size a * b by column and W is the smallest square matrix possible.If the length of the binary watermark sequence is less than a*b,then the other remaining positions in W are subjected to a complementary 0 operation to finally obtain the watermark matrix.Each bit of information is embedded in a block of size 8×8 pixels.With the candidate feature points as the center,the feature region is obtained based on the watermark matrix,and the size of the feature region is a*b*8*8.

    The feature points are detected in the image using the intensity-based SIFT algorithm and sorted in descending order of feature point intensity, and the top n feature points with the largest feature points intensity are selected as candidate feature points.The feature region is filtered for the first time depending on the area that cannot exceed the borders of the image.Then the feature region with at least k candidate feature points is selected for the second time based on the density of feature points.Finally,the feature region is filtered based on the fact that each feature region cannot overlap with each other,and if there is an overlapping region,the one with low feature point intensity is removed.After finding all the feature points that satisfy the conditions,the top m feature points and the corresponding feature regions are the final choices in order of the intensity of the feature points.If the number of feature points is less than m,the embedding is done according to the actual feature points and feature regions.However, after extensive experiments, it is found that texture-rich images have at least five such regions.We found that the feature regions determined based on the feature point density can be more concentrated in key locations of the image, and such locations tend not to be cropped out.Taking the crown plot as an example.Fig.2a shows the feature regions found by Fang et al.’s method,and Fig.2b shows the feature regions found by the proposed method,from which we can see that the feature regions found by our method surround the key regions of the image.

    Figure 2:Selection results of feature regions

    The embedding of the watermark is performed in the DCT domain.Fang et al.found that the relative magnitude of a pair of DCT coefficients at mid-frequency didn’t change after the screenphotography process,so embedding of the watermark,as well as blind extraction,can be achieved by comparing the magnitude of this pair of coefficients.The image is first transformed to DCT domain,and then embed watermark by comparing the coefficient values of two positions,the two coefficients are C1 and C2.If the information to be embedded is 0,C1 ≥C2 is guaranteed;If the information to be embedded is 1,C1<C2 is guaranteed.The watermark strength in this paper is determined by the JND model to achieve the adaptive change of embedding strength with image luminance and texture,and the specific equation of watermark embedding is shown in Eq.(5).

    where(x,y)is a pixel position of the image,theTl(x,y)and(Tt(x,y)are visibility threshold for the luminance masking factor and texture masking factor,theJND(x,y)is JND value of a pixel location,C1 and C2 are the discrete cosine transform coefficient values of the two locations, and w is the watermark value.

    Since the shooting process may lead to an offset of some feature points during extraction,Fang et al.use a neighborhood traversal method to compensate for the offset.However, when the offset occurs,the comparison may be performed with more than just the two coefficient values C1 and C2,and we take the coefficients at positions(4,5)and(5,4)as an example below.Fig.3 plots the results of eight possible offsets,one coefficient pair in each ellipse,and ultimately it may be possible to determine whether the embedded information is 0 or 1 by comparing the magnitudes of the two coefficient values in these pairs.When the magnitude relationship between the values of the other coefficient pairs is exactly opposite to that of (4, 5) and (5, 4), and the number of opposite coefficient pairs is greater than the number of identical coefficient pairs,it is possible that the extracted information is the exact opposite of the embedded information,and thus the information cannot be extracted correctly.

    Figure 3:Possible offset results of feature points

    Therefore, after embedding the watermark, we propose to apply size constraints to the discrete cosine transform coefficients in the 3*3 neighborhood of(4,5)and(5,4)positions to make sure that watermark information is still extractable when feature points are offset.The formula we wish to end up with for the size relationship is shown in Eqs.(6)and(7).

    When the above formula is not satisfied, we need to modify the adjustment for the coefficient values that do not satisfy the condition.For C(3, 4),C(4, 3) and C(5, 6),C(6, 5) the two pairs of coefficients are directly exchanged if the condition is not satisfied;for C(3,5),C(4,4),C(5,3)and C(4,6),C(5,5),C(6,4)the four pairs of coefficients,if they do not satisfy the condition,are sorted according to the size relationship and assigned to each coefficient in turn;for C(3,6),C(4,5),C(5,4),C(6,3)the three pairs of coefficients,if the condition is not satisfied,are modified according to Eq.(8).

    After modifying the coefficient value, perform the inverse DCT transformation to the spatial domain.Repeat the above operations sequentially until all feature regions are embedded in the watermark.Finally,add the previous Cr and Cb channels or directly get the image.

    3.2 Watermark Extraction Process

    The following describes the watermark extraction process,a detailed process can be seen in Fig.4.Since mobile phone shooting will cause some image distortion,the photo taken by the mobile phone should be perspective corrected first, and the cropping and scaling operation should be performed to get the extracted image as large as the raw image.But here four vertices of the image need to be known.The SIFT algorithm based on intensity is used to select the feature points, select the first n feature points with the greatest intensity,and select the feature region as the embedding method.The feature regions are divided into a * b blocks, a DCT transform is executed on each block, and the embedding information is determined as 0 or 1 by comparing the magnitude of the DCT coefficient values.

    Figure 4:Watermark extraction process

    Since the intensity of the feature points may change and their positions may be shifted after taking a picture,we perform offset compensation.With the feature point as the center,9 neighboring feature points in their surrounding 3*3 neighborhood are selected to form an extracted point group for offset compensation.The 9 watermarks extracted from this extracted point group are used as a watermark group.Watermarks in different watermark groups are compared, and if the difference between two watermarks is less than the thresholdth, the two watermarks are recorded as a watermark pairwf.Watermarks in the same group will not be compared.The formula for calculating the difference between two watermarks are shown in Eq.(9),and the formula for watermark pairwfof the formula is shown in Eq.(10).

    wherewiαis theαth watermark in theith watermark group,wjβis theβth watermark in thejth watermark group,(x,y)are the coordinates of the watermark matrix,and ⊕is the XOR operation.

    Finally,a watermark pair wfwith a length of 2 l is obtained.Add all watermarks in wfin sequence according to the coordinates.If the value at a certain position is greater than or equal to l, that is,half of the number of watermarks in wf,it is considered that the watermark value at that position is 1,otherwise,it is 0.See Eq.(11)for details.

    Of these,,y)is the value of the ith watermark inwfat position(x,y)and 2lis the number of watermarks inwf.

    By adjusting the embedding region,the adaptive variation of embedding intensity and constraining the magnitude relationship of the coefficient in the neighborhood of the modified coefficient,we find that the probability of successful watermark extraction from the captured images increased and the quality of the watermarked images visually improved.

    4 Experimental Results

    Next, we will show and discuss the results of the comparison experiments with Fang et al.We carried out experiments under the MATLAB platform.The image database we used is the USC-SIPI image database[32].Again,we choose a=8,b=8,and the error correction code chosen is BCH(64,39),which corrects 4-bit errors.The n in the experiment is set to 50 and k is set to 3.The monitor we use is‘LEN T27q-20’and the phone used is‘Huawei p40 pro’.The following experiments compare the results in terms of PSNR values and different shooting processes including shooting distance,shooting angle,and handhold shooting,respectively.

    Tab.1 shows the comparison between Fang’s method and the proposed method in PSNR value.From the table,it can be seen that most of the plots have some improvement in PSNR values,but there are also a small number of plots with slightly lower PSNR values.

    Table 1: Images embedded by different methods and corresponding PSNR values

    (1) Effect of distance on robustness:Our shooting distance is 45–105 cm.Tab.2 shows examples of the images obtained by shooting at different shooting distances and the images obtained after perspective correction.Tab.3 lists the average watermark error bits extracted by Fang’s and our method at different shooting distances.As can be seen from the table, the error bits of ours are lower than the method of Fang et al.at most distances,but they are also slightly higher or equal at some distances.

    Table 2: Examples of screen shot images at different shooting distances

    Table 3: Average error bits of watermark extracted under different shooting distances

    (2) Effect of horizontal viewing angle on robustness: in doing experiments on the effect of horizontal viewing angle on robustness,we controlled the shooting distance to be 55 cm and the horizontal viewing angle was varied from 65?left to 65?right.Tab.4 shows examples of the images obtained by shooting at different horizontal viewing angles and the images obtained after perspective correction.Tab.5 shows the average extracted watermark error bits for the method of Fang et al.and the proposed method at different horizontal viewing angles.It can be seen from the table that the error bits of ours are lower than the method of Fang et al.

    Table 4: Examples of screenshot images taken at different horizontal viewing angles

    Table 5: Average error bits of watermark extracted under different horizontal viewing angle

    (3) Effect of vertical viewing angle on robustness: in doing experiments on the effect of vertical viewing angle on robustness,we controlled the shooting distance to be 55 cm and the vertical viewing angle changed from 65?up to 65?down.Tab.6 shows examples of the images obtained by shooting at different vertical viewing angles and the images obtained after perspective correction.Tab.7 shows the average extracted watermark error bits for the method of Fang et al.and the proposed method at different vertical viewing angles.As can be seen from the table,the error bits of ours are less than or equal to the method of Fang et al.

    Table 6: Examples of screenshot images taken at different vertical viewing angles

    Table 7: Average error bits of watermark extracted under different vertical viewing angle

    (4) Effect of handhold shooting on robustness:Examples of images obtained by shooting under handhold conditions are shown in Tab.8,images obtained after perspective correction and the average error bits of the recovered images for watermark extraction.From the table,as we can see,the watermark information is correctly extracted even under handhold shooting conditions and the method is robust to handhold shooting.

    Table 8: Examples of handhold shooting

    The experimental comparison shows that our proposed method has some improvement in robustness and vision over the method of Fang et al.However,the scheme has some limitations like the method of Fang et al.Due to the limitations of the SIFT algorithm,if the texture of the image is too simple,the position of the selected feature points will change significantly,and thus the information cannot be extracted correctly.During extraction,it is still necessary to manually locate the four vertices of the image to be able to recover the extracted image.For some text images,the proposed embedding method leads to a very obvious visual distortion that can affect the normal reading of people.

    5 Conclusion

    For the purpose of protecting the image displayed on the screen,a robust watermarking solution based on image content for screen photography is proposed.In terms of embedded area selection,the intensity-based SIFT algorithm is used to construct feature regions based on the density of feature points, which can make the feature regions more focused on the key content of the image, more accurate in extraction and resistant to certain cropping attacks; the JND model is used to realize the adaptive change of embedding strength with image luminance and texture to achieve a balance between robustness and invisibility; after embedding, the coefficients in the domain are optimized again.In this way, when using statistical features to extract watermark, it can improve the number of correct coefficient size relationships, reduce the opposite situation of extraction results, and have higher accuracy.The results of the experiments indicate that the solution offers some improvements in terms of robustness and vision.

    Funding Statement:This work is supported by the National Key R&D Program of China under grant 2018YFB1003205; by the National Natural Science Foundation of China under grant U1836208,U1836110;by the Priority Academic Program Development of Jiangsu Higher Education Institutions(PAPD)fund;by the Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET)fund,China.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    老司机午夜福利在线观看视频| 午夜精品久久久久久毛片777| cao死你这个sao货| 夜夜爽天天搞| 久久久久国内视频| 久9热在线精品视频| 伊人久久大香线蕉亚洲五| 午夜视频精品福利| 纯流量卡能插随身wifi吗| 国产亚洲精品第一综合不卡| 美女午夜性视频免费| 国产欧美日韩一区二区三| 亚洲视频免费观看视频| 99国产精品免费福利视频| 日韩熟女老妇一区二区性免费视频| 国产av精品麻豆| 满18在线观看网站| cao死你这个sao货| 国产色视频综合| 女警被强在线播放| 老司机午夜福利在线观看视频| www.熟女人妻精品国产| 免费av中文字幕在线| 黄色a级毛片大全视频| 一区二区三区国产精品乱码| 免费日韩欧美在线观看| 两性午夜刺激爽爽歪歪视频在线观看 | 国产精品综合久久久久久久免费 | 如日韩欧美国产精品一区二区三区| 嫁个100分男人电影在线观看| 亚洲一卡2卡3卡4卡5卡精品中文| 日韩一卡2卡3卡4卡2021年| 亚洲综合色网址| 正在播放国产对白刺激| 99精品在免费线老司机午夜| 天天躁日日躁夜夜躁夜夜| 老司机在亚洲福利影院| 老汉色∧v一级毛片| 精品亚洲成a人片在线观看| 精品视频人人做人人爽| 天堂动漫精品| 国产av精品麻豆| 久久天躁狠狠躁夜夜2o2o| 欧美色视频一区免费| 操美女的视频在线观看| 亚洲avbb在线观看| 91老司机精品| 在线观看舔阴道视频| 国产精品1区2区在线观看. | 国内毛片毛片毛片毛片毛片| 69av精品久久久久久| 大香蕉久久成人网| 亚洲人成伊人成综合网2020| √禁漫天堂资源中文www| 午夜免费鲁丝| 无限看片的www在线观看| 黄色成人免费大全| 自线自在国产av| 99re在线观看精品视频| 国产精品二区激情视频| 叶爱在线成人免费视频播放| 麻豆av在线久日| 女警被强在线播放| 法律面前人人平等表现在哪些方面| 黄色a级毛片大全视频| 国产成+人综合+亚洲专区| 日韩中文字幕欧美一区二区| 老熟妇仑乱视频hdxx| 91成人精品电影| 久久精品熟女亚洲av麻豆精品| 高清视频免费观看一区二区| 色94色欧美一区二区| 亚洲国产欧美一区二区综合| 欧美色视频一区免费| 亚洲第一欧美日韩一区二区三区| 国产日韩一区二区三区精品不卡| 亚洲国产欧美网| 侵犯人妻中文字幕一二三四区| 成人国产一区最新在线观看| 精品一区二区三卡| 女性生殖器流出的白浆| 1024视频免费在线观看| 国产极品粉嫩免费观看在线| 在线国产一区二区在线| 国产成人系列免费观看| 亚洲精华国产精华精| 成人国语在线视频| 午夜免费鲁丝| 久久久精品区二区三区| 久久香蕉国产精品| 中文字幕色久视频| 在线观看66精品国产| av视频免费观看在线观看| 久久天躁狠狠躁夜夜2o2o| 在线播放国产精品三级| 国产亚洲一区二区精品| 日韩三级视频一区二区三区| 国产亚洲欧美98| 精品久久久精品久久久| 久久精品国产亚洲av香蕉五月 | 黄色 视频免费看| 99国产精品免费福利视频| 男人操女人黄网站| 99久久99久久久精品蜜桃| 日韩欧美国产一区二区入口| 久久99一区二区三区| 亚洲国产中文字幕在线视频| 一区二区三区激情视频| 欧美日韩中文字幕国产精品一区二区三区 | 曰老女人黄片| 欧美激情 高清一区二区三区| 青草久久国产| 亚洲av成人一区二区三| 天天躁狠狠躁夜夜躁狠狠躁| 国产精品久久视频播放| 国产精品国产高清国产av | 成人影院久久| 国产精品综合久久久久久久免费 | 午夜日韩欧美国产| 精品视频人人做人人爽| 一级作爱视频免费观看| 757午夜福利合集在线观看| 精品人妻在线不人妻| 又大又爽又粗| 啦啦啦在线免费观看视频4| 大型黄色视频在线免费观看| 亚洲黑人精品在线| 亚洲精品av麻豆狂野| 亚洲av成人不卡在线观看播放网| 亚洲一码二码三码区别大吗| 亚洲在线自拍视频| 亚洲成人免费av在线播放| 久久精品人人爽人人爽视色| 成人国语在线视频| 久久久精品区二区三区| 香蕉丝袜av| 最新在线观看一区二区三区| 麻豆成人av在线观看| 欧美黄色片欧美黄色片| 18禁黄网站禁片午夜丰满| 日韩免费高清中文字幕av| 国产在线观看jvid| 成人手机av| 精品国内亚洲2022精品成人 | 欧美乱妇无乱码| 丁香六月欧美| 久久狼人影院| 成人手机av| 精品高清国产在线一区| 国产又色又爽无遮挡免费看| 69精品国产乱码久久久| 欧美国产精品va在线观看不卡| 欧美黑人精品巨大| 欧美日韩福利视频一区二区| 老熟妇乱子伦视频在线观看| 美女高潮到喷水免费观看| 久久久久久亚洲精品国产蜜桃av| 麻豆乱淫一区二区| 露出奶头的视频| 自拍欧美九色日韩亚洲蝌蚪91| 九色亚洲精品在线播放| 色94色欧美一区二区| 精品欧美一区二区三区在线| 一二三四在线观看免费中文在| 人人妻人人爽人人添夜夜欢视频| 18禁裸乳无遮挡动漫免费视频| 777久久人妻少妇嫩草av网站| 在线免费观看的www视频| 亚洲人成电影免费在线| 黄色成人免费大全| 一个人免费在线观看的高清视频| 高清在线国产一区| 精品亚洲成国产av| 丝袜人妻中文字幕| 免费在线观看视频国产中文字幕亚洲| 丰满的人妻完整版| 欧美日韩一级在线毛片| 九色亚洲精品在线播放| 五月开心婷婷网| 国产成人欧美在线观看 | 一进一出抽搐动态| 一二三四在线观看免费中文在| 黄色视频不卡| 高清在线国产一区| 无遮挡黄片免费观看| 亚洲五月天丁香| 免费在线观看日本一区| 久久亚洲精品不卡| 国产成人免费观看mmmm| 丝袜在线中文字幕| 久久天躁狠狠躁夜夜2o2o| 啦啦啦在线免费观看视频4| 亚洲国产毛片av蜜桃av| 国产av又大| 搡老熟女国产l中国老女人| 久久久精品免费免费高清| 后天国语完整版免费观看| 久久精品国产综合久久久| 日韩精品免费视频一区二区三区| 久久这里只有精品19| 色老头精品视频在线观看| 亚洲成av片中文字幕在线观看| av片东京热男人的天堂| 国产成人欧美| 啪啪无遮挡十八禁网站| 久久精品国产综合久久久| 午夜福利一区二区在线看| 久久香蕉激情| 亚洲欧美精品综合一区二区三区| 99精品欧美一区二区三区四区| 两性夫妻黄色片| 精品第一国产精品| 国产成人欧美| 天天操日日干夜夜撸| 精品一区二区三区av网在线观看| 久久国产精品男人的天堂亚洲| 午夜精品在线福利| 欧美精品亚洲一区二区| 中文字幕另类日韩欧美亚洲嫩草| 免费在线观看日本一区| 热99久久久久精品小说推荐| 女人被狂操c到高潮| 国产亚洲精品久久久久久毛片 | 亚洲国产精品合色在线| 精品人妻熟女毛片av久久网站| 十分钟在线观看高清视频www| 一级黄色大片毛片| 国产男女超爽视频在线观看| 久久久久久久久免费视频了| 久热这里只有精品99| 三级毛片av免费| 国产精品免费视频内射| 香蕉丝袜av| 精品一区二区三区av网在线观看| 一区二区日韩欧美中文字幕| 亚洲成a人片在线一区二区| 亚洲成人免费电影在线观看| 免费人成视频x8x8入口观看| 搡老熟女国产l中国老女人| 欧美激情 高清一区二区三区| 亚洲免费av在线视频| 国产亚洲精品久久久久久毛片 | 热re99久久国产66热| 亚洲 国产 在线| 国产一区二区三区在线臀色熟女 | 美女国产高潮福利片在线看| 精品人妻熟女毛片av久久网站| 久久久国产一区二区| 三上悠亚av全集在线观看| 老鸭窝网址在线观看| 看片在线看免费视频| 久久精品国产亚洲av香蕉五月 | 午夜福利一区二区在线看| 极品人妻少妇av视频| 中文亚洲av片在线观看爽 | 国产精品免费视频内射| 亚洲欧美一区二区三区黑人| 在线观看舔阴道视频| 欧美黑人欧美精品刺激| 丰满人妻熟妇乱又伦精品不卡| 婷婷精品国产亚洲av在线 | 黄网站色视频无遮挡免费观看| 天天添夜夜摸| 国产成人免费无遮挡视频| 日韩欧美一区二区三区在线观看 | 婷婷成人精品国产| 亚洲一区二区三区欧美精品| 欧美性长视频在线观看| 黄色视频,在线免费观看| 国产日韩一区二区三区精品不卡| 黄色女人牲交| 国产男女内射视频| 在线视频色国产色| 精品一区二区三区四区五区乱码| 久久久久久人人人人人| 久久精品亚洲av国产电影网| 亚洲欧美日韩另类电影网站| 久久99一区二区三区| 亚洲成人手机| 在线天堂中文资源库| 欧洲精品卡2卡3卡4卡5卡区| 亚洲欧美色中文字幕在线| 一级作爱视频免费观看| 久久香蕉精品热| 最近最新中文字幕大全免费视频| 一本综合久久免费| 国产男女超爽视频在线观看| 男男h啪啪无遮挡| 国产主播在线观看一区二区| 一级片'在线观看视频| 日韩制服丝袜自拍偷拍| 亚洲五月婷婷丁香| 国产亚洲精品久久久久久毛片 | 超碰97精品在线观看| 老鸭窝网址在线观看| 日韩免费高清中文字幕av| 亚洲精品国产精品久久久不卡| 制服人妻中文乱码| 国产精品国产av在线观看| 成人国语在线视频| 免费看a级黄色片| 国产欧美日韩一区二区精品| 欧美日韩黄片免| 亚洲精华国产精华精| 久久精品亚洲熟妇少妇任你| 亚洲av电影在线进入| 精品少妇久久久久久888优播| 国产蜜桃级精品一区二区三区 | 亚洲第一青青草原| 国产高清videossex| 天天影视国产精品| 成人国语在线视频| 国产男靠女视频免费网站| 在线观看日韩欧美| 欧美 日韩 精品 国产| 欧美日韩成人在线一区二区| 麻豆乱淫一区二区| 超色免费av| 老熟妇乱子伦视频在线观看| 欧美在线一区亚洲| 国产精品乱码一区二三区的特点 | 中文字幕人妻丝袜一区二区| 夫妻午夜视频| 一区福利在线观看| 亚洲国产中文字幕在线视频| avwww免费| 女人被狂操c到高潮| 国产精品影院久久| 日本vs欧美在线观看视频| 午夜视频精品福利| 国产极品粉嫩免费观看在线| 91字幕亚洲| 久久香蕉激情| 纯流量卡能插随身wifi吗| 午夜精品在线福利| 久久婷婷成人综合色麻豆| 嫁个100分男人电影在线观看| 国产精品98久久久久久宅男小说| 一级,二级,三级黄色视频| 两性午夜刺激爽爽歪歪视频在线观看 | 老汉色av国产亚洲站长工具| 国产精品一区二区在线不卡| 午夜免费观看网址| 丰满迷人的少妇在线观看| 精品人妻在线不人妻| 老司机福利观看| 新久久久久国产一级毛片| 国产欧美日韩综合在线一区二区| 伊人久久大香线蕉亚洲五| 免费观看a级毛片全部| 激情视频va一区二区三区| 丝袜人妻中文字幕| 国产亚洲av高清不卡| 麻豆av在线久日| 777久久人妻少妇嫩草av网站| 满18在线观看网站| 一边摸一边抽搐一进一出视频| 国内毛片毛片毛片毛片毛片| 99国产精品一区二区三区| 精品国产乱码久久久久久男人| 亚洲午夜理论影院| 免费高清在线观看日韩| 一区二区三区国产精品乱码| 亚洲av电影在线进入| 一区二区三区国产精品乱码| 免费高清在线观看日韩| 成人永久免费在线观看视频| а√天堂www在线а√下载 | 国产熟女午夜一区二区三区| 久久久久久久国产电影| bbb黄色大片| 亚洲全国av大片| 欧美人与性动交α欧美精品济南到| 国产亚洲一区二区精品| 在线观看免费日韩欧美大片| 999久久久精品免费观看国产| 青草久久国产| ponron亚洲| 日本一区二区免费在线视频| 午夜免费成人在线视频| 夜夜夜夜夜久久久久| 男女午夜视频在线观看| 亚洲成国产人片在线观看| 久久国产乱子伦精品免费另类| 精品无人区乱码1区二区| 伊人久久大香线蕉亚洲五| 人人妻人人澡人人看| 成人国产一区最新在线观看| e午夜精品久久久久久久| 精品亚洲成国产av| 一级片'在线观看视频| 亚洲国产看品久久| 国产精品永久免费网站| 人妻一区二区av| 精品第一国产精品| 黄色视频不卡| 午夜91福利影院| 老司机影院毛片| 色播在线永久视频| 免费女性裸体啪啪无遮挡网站| 欧美 亚洲 国产 日韩一| 免费女性裸体啪啪无遮挡网站| 99国产精品一区二区三区| 最近最新中文字幕大全免费视频| 亚洲专区国产一区二区| 欧美乱妇无乱码| 悠悠久久av| 精品熟女少妇八av免费久了| 亚洲伊人色综图| 亚洲一区高清亚洲精品| 精品国产一区二区三区四区第35| 欧美国产精品一级二级三级| 深夜精品福利| 亚洲精品av麻豆狂野| 欧美日韩中文字幕国产精品一区二区三区 | 国产精品二区激情视频| 国产成人免费无遮挡视频| 久久久国产精品麻豆| 欧美日韩国产mv在线观看视频| 叶爱在线成人免费视频播放| 国产精品国产高清国产av | 午夜精品国产一区二区电影| 精品无人区乱码1区二区| 国产野战对白在线观看| 欧美成人免费av一区二区三区 | 国产亚洲欧美98| 在线观看一区二区三区激情| 亚洲国产中文字幕在线视频| 1024香蕉在线观看| 啦啦啦在线免费观看视频4| 人人妻人人澡人人爽人人夜夜| 亚洲欧美一区二区三区久久| 亚洲精品中文字幕一二三四区| 成年版毛片免费区| 久久九九热精品免费| 亚洲五月色婷婷综合| 精品免费久久久久久久清纯 | 久9热在线精品视频| 好男人电影高清在线观看| 国产成人免费观看mmmm| 在线观看免费视频网站a站| 久久ye,这里只有精品| 亚洲男人天堂网一区| av国产精品久久久久影院| 一个人免费在线观看的高清视频| 色婷婷久久久亚洲欧美| 欧美精品人与动牲交sv欧美| 国产无遮挡羞羞视频在线观看| 99精品久久久久人妻精品| 99国产极品粉嫩在线观看| 可以免费在线观看a视频的电影网站| 精品一品国产午夜福利视频| 精品久久久久久久久久免费视频 | 亚洲av日韩在线播放| 在线十欧美十亚洲十日本专区| 亚洲黑人精品在线| 国产一区二区三区视频了| 99久久国产精品久久久| tube8黄色片| 免费av中文字幕在线| 人妻一区二区av| 成人精品一区二区免费| 男女免费视频国产| 久久香蕉精品热| 亚洲人成电影免费在线| 欧美精品高潮呻吟av久久| 国产男女内射视频| 亚洲精品美女久久久久99蜜臀| 在线观看免费高清a一片| 中文字幕人妻丝袜制服| 亚洲欧美日韩另类电影网站| 在线观看免费午夜福利视频| 欧美精品高潮呻吟av久久| 在线播放国产精品三级| 黄色视频不卡| av不卡在线播放| 国产黄色免费在线视频| 999久久久国产精品视频| 久久精品国产99精品国产亚洲性色 | 国产亚洲欧美精品永久| 99热只有精品国产| 亚洲欧美一区二区三区久久| a级毛片在线看网站| 亚洲国产欧美日韩在线播放| 国产精品亚洲av一区麻豆| 久久精品aⅴ一区二区三区四区| 成人18禁高潮啪啪吃奶动态图| 在线天堂中文资源库| 欧美乱色亚洲激情| 久久精品成人免费网站| 伊人久久大香线蕉亚洲五| 婷婷丁香在线五月| 亚洲,欧美精品.| 在线国产一区二区在线| 电影成人av| 午夜视频精品福利| 色综合欧美亚洲国产小说| 99热只有精品国产| 国产亚洲精品一区二区www | 久久久久久久国产电影| 老司机福利观看| 人人妻人人爽人人添夜夜欢视频| 欧美乱码精品一区二区三区| 视频在线观看一区二区三区| 日韩免费av在线播放| 欧美一级毛片孕妇| 日韩欧美三级三区| 欧美乱码精品一区二区三区| 久久精品成人免费网站| 亚洲av成人不卡在线观看播放网| 午夜成年电影在线免费观看| 国产三级黄色录像| 亚洲午夜精品一区,二区,三区| 后天国语完整版免费观看| 亚洲成人免费av在线播放| 成人影院久久| 久久国产精品大桥未久av| 国产精品99久久99久久久不卡| 成人黄色视频免费在线看| 天天躁狠狠躁夜夜躁狠狠躁| 两个人看的免费小视频| 国内毛片毛片毛片毛片毛片| 黄网站色视频无遮挡免费观看| 日韩一卡2卡3卡4卡2021年| 91成人精品电影| 亚洲一区高清亚洲精品| 欧美在线黄色| 国产精品免费大片| 国产一区二区激情短视频| 亚洲一区中文字幕在线| 99香蕉大伊视频| 国产成人系列免费观看| 淫妇啪啪啪对白视频| 中文字幕人妻丝袜制服| 亚洲一区中文字幕在线| 1024视频免费在线观看| 亚洲五月色婷婷综合| 欧美日韩视频精品一区| 久久人人97超碰香蕉20202| 亚洲欧美激情综合另类| 日韩成人在线观看一区二区三区| 91麻豆av在线| 精品人妻在线不人妻| 高清av免费在线| 宅男免费午夜| 精品国内亚洲2022精品成人 | 少妇的丰满在线观看| 啦啦啦免费观看视频1| www.精华液| 美女高潮喷水抽搐中文字幕| 啦啦啦视频在线资源免费观看| 午夜福利在线免费观看网站| 咕卡用的链子| 狠狠狠狠99中文字幕| 精品福利观看| 国产色视频综合| 日韩免费av在线播放| 99久久精品国产亚洲精品| 好男人电影高清在线观看| 成人国语在线视频| 亚洲精品久久成人aⅴ小说| 国产精品 欧美亚洲| 欧美黑人精品巨大| 精品第一国产精品| 国产伦人伦偷精品视频| 亚洲精品在线美女| 大码成人一级视频| 19禁男女啪啪无遮挡网站| 水蜜桃什么品种好| 老司机午夜十八禁免费视频| 亚洲第一青青草原| 热99国产精品久久久久久7| 亚洲一卡2卡3卡4卡5卡精品中文| 精品视频人人做人人爽| 国产成人精品久久二区二区免费| 亚洲五月天丁香| av天堂在线播放| 丰满迷人的少妇在线观看| 天堂中文最新版在线下载| 老汉色∧v一级毛片| 亚洲精品国产一区二区精华液| 成人免费观看视频高清| 久久国产精品影院| 99热网站在线观看| 99国产精品免费福利视频| a级毛片黄视频| 日本wwww免费看| 精品乱码久久久久久99久播| 欧美性长视频在线观看| 国产精品美女特级片免费视频播放器 | 18禁黄网站禁片午夜丰满| 极品少妇高潮喷水抽搐| 国产成人欧美在线观看 | 老司机午夜福利在线观看视频| 国产高清激情床上av| 亚洲在线自拍视频| 老司机影院毛片| 91在线观看av| 18禁美女被吸乳视频| 一级a爱视频在线免费观看| 欧美日韩成人在线一区二区| 一进一出抽搐gif免费好疼 | 91麻豆av在线| 国产91精品成人一区二区三区| 日日摸夜夜添夜夜添小说| 精品国产一区二区三区久久久樱花| www日本在线高清视频| 亚洲人成电影观看| 久久久久久久国产电影| 国产单亲对白刺激| 国产欧美日韩一区二区三| 啦啦啦视频在线资源免费观看| 少妇裸体淫交视频免费看高清 | 欧美人与性动交α欧美精品济南到| 女人高潮潮喷娇喘18禁视频|