• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Robust Watermarking of Screen-Photography Based on JND

    2022-08-23 02:17:22SiyuGuJinHanXingmingSunandYiCao
    Computers Materials&Continua 2022年6期

    Siyu Gu,Jin Han,,Xingming Sun,2 and Yi Cao,3

    1Nanjing University of Information Science&Technology,Nanjing,210044,China

    2Engineering Research Center of Digital Forensics,Ministry of Education,Nanjing,201144,China

    3Department of Electrical and Computer Engineering,University of Windsor,401 Sunset Avenue,Windsor,ON,N9B 3P4,Canada

    Abstract: With the popularity of smartphones,it is often easy to maliciously leak important information by taking pictures of the phone.Robust watermarking that can resist screen photography can achieve the protection of information.Since the screen photo process can cause some irreversible distortion, the currently available screen photo watermarks do not consider the image content well and the visual quality is not very high.Therefore,this paper proposes a new screen-photography robust watermark.In terms of embedding region selection, the intensity-based Scale-invariant feature transform(SIFT)algorithm used for the construction of feature regions based on the density of feature points,which can make it more focused on the key content of the image; in terms of embedding strength, the Just noticeable difference (JND) model is applied to limit the intensity of the watermark embedding according to the luminance and texture of the picture to balance robustness and invisibility;after embedding watermark,the coefficients in the neighborhood are again adjusted with optimal constraints to improve the accuracy of watermark extraction.After experiments, it is shown that the method we proposed can improve the correct rate of watermark extraction,the quality of the visual aspect of the watermarked picture is also improved.

    Keywords:Screen photography;robust watermarking;SIFT;JND

    1 Introduction

    Currently,as smartphones become more popular and widely used,people can easily record some important information they need by taking photos with their phones.However,the images stored by taking photos can also be easily copied,transmitted and restored,which will lead to leakage,malicious theft and illegal distribution of some important information,causing a series of security problems.As digital watermarking technology has been widely used in our work and life,and it enables copyright protection and leakage tracking.Therefore, in order to protect the image information in the screen from malicious leakage and to be able to track the source of leakage in time after the leakage,we can add a watermark to the picture.Once the picture is leaked, a watermark can be extracted from the picture and we can locate the source of the leak based on the watermark information to narrow down the scope of the investigation and thus protect important information.

    The technology of digital watermarking is divided into two domains,namely spatial domain and transform domain.Embedding is done in the spatial domain by modifying pixel values and commonly used spatial domain techniques are Least Significant Bit(LSB)[1],additive based techniques etc.And in the transform domain, where pixel values are transformed into frequency coefficients and then is used to embed, commonly used techniques are Discrete Cosine Transform(DCT) [2,3], Discrete Wavelet Transform(DWT)[4],Discrete Fourier Transform(DFT)[5],there are some improvements on these basic techniques such as Redundant Discrete Wavelet Transformation(RDWT)[6],Quaternion Discrete Fourier transform(QDFT) [7], etc.Sometimes multiple frequency techniques are used in combination such as DCT-DWT [8,9], Dual Tree Complex Wavelet Transform- Discrete Cosine Transform(DTCWT-DCT)[10]etc.

    The screen photography process,which is the process of capturing a screen with a mobile phone and generating an image, undergoes analog-to-digital and digital-to-analog conversion attacks [11]and also causes many distortions.In past years, many researchers have worked on print-scanning resilient watermarking schemes [12,13] as well as print-camera resilient watermarking schemes[14–16],but due to the special nature of screen photography,experiments have shown that the majority of watermarking schemes do not work for screen photography processes,so some new watermarking schemes are needed.

    Screen-photography watermarking algorithms have been investigated by several researchers in recent years.Fang et al.[17] presented a screen-photography watermarking scheme that uses an intensity-based SIFT algorithm to determine embedding region, uses the small size of the template to embed the watermark over and over into different areas, and extracts watermarks using crossvalidation.This method has high robustness to watermarks obtained from screen photography, but requires manually finding the four vertices of the image for correction; the scheme does not apply to images with simple textures due to the limitations of the SIFT algorithm; and the scheme causes large visual distortion for binary images.Chen et al.[18]proposed screenshot robust watermarking for satellite images,proposing to use DFT to embed to deal with the quality decline due to screenshots,and using the synchronous response index for estimating the appropriate scale level as well as the location of the synchronous watermark during extraction; the scheme is robust to common attacks and screenshot attacks.Chen et al.[19] presented a feature synchronization based watermarking scheme for screenshots,using Gaussian functions,improved Harris-Laplace detectors and accelerated robust feature orientation descriptors to construct embedding regions for watermark synchronization,and also using non-rotational embedding methods and preprocessing methods to modulate the DFT coefficients, which is robust to screenshot attacks and also to attacks with additional common desynchronization attacks on screenshots is effective.Chen et al.[20] proposed a new scheme combining encryption and screen protection.The scheme first embeds the watermark in the DFT domain and then generates the second watermark based on two-dimensional coding and inverse DFT.A segmentation encryption algorithm based on chaotic mapping is proposed to enhance the robustness of the encrypted watermark,and the watermark synchronization algorithm based on frame position is used in the watermark extraction process.The scheme is safe and reliable,and has high robustness.

    Several of the above methods embed watermarks by performing modifications in the frequency domain,such as the DCT and DFT domains.In recent years,deep learning methods have also been shown to be able to undertake watermark embedding and extraction.Fujihashi et al.[21]proposed to embed watermarks into images using a deep Convolutional Neural Networks encoder and decoder for watermarking, which has higher throughput than DCT based neural network watermarking.Zhong et al.[22]proposed a watermarking system based on Deep Neural Networks(DNN)using an unsupervised structure and a new loss calculation method,which is capable of extracting watermarks in camera captured images as well, with good practicality and robustness.Jia et al.[23] proposed a new method for embedding hyperlinks into ordinary images that can detect watermarks by cameraequipped mobile devices.Incorporation of a distortion network which employs distinguishable 3D rendering operations among encoder and decoder can emulate distortion caused by the introduction of camera imaging and is somewhat robust to camera photography.Fang et al.[24]suggested a depthtemplate-based algorithm for watermarking, which designs a message embedding template and a localization template on the embedding side and uses a two-level DNN on the extraction side to achieve higher robustness against camera photography.

    To increase the robustness of screen-photography watermarking and to strike a balance between robustness and invisibility.Therefore,we propose a screen-photography watermarking technique.Our contributions are the following:

    (1) In regard to embedding area selection, the intensity-based SIFT algorithm used for the construction of feature regions according to the density of feature points,so that the feature region pays more attention to the key content of the image, and this method can accurately locate the embedded region during extraction;

    (2) In terms of watermark embedding strength, the JND model is proposed to set the intensity of the watermark embedding,and the watermark embedding strength changes adaptively with image luminance and texture,to achieve the balance of robustness and invisibility;

    (3) An optimization scheme of neighborhood coefficient size constraint is proposed to apply the same size constraint to other coefficient pairs in the neighborhood of modified DCT coefficients, so that the watermark information can still be extracted accurately when the feature points are shifted.Results of the experiment showed that after the above three methods can improve the correct rate of watermark extraction,and the quality of the visual aspect of the watermarked picture is also improved.

    The organization of this paper is as follows.Section 2 is a related presentation that describes screen photography distortion, the SIFT algorithm, and the JND model.Section 3 describes the proposed method in this paper.The experimental results and comparative analysis are given in Section 4.Finally,Section 5 concludes the work of this paper.

    2 Related Work

    2.1 Screen Photography Distortion

    Fang et al.[17] and Chen et al.[19] studied and summarized distortions that resulted from the screen capture process.The process of screen camera is classified into three sub-processes,which are screen display,shooting and camera imaging process.And a series of distortions are caused in these three sub-processes,Fang et al.divided the distortion in the screen capture process into four categories,which are display distortion, lens distortion,sensor distortion and processing distortion,and Chen et al.divided the distortion in the screen capture process into five categories,which are linear distortion,gamma adjustment,geometric distortion,noise attack and low-pass filter attack[25].We believe that three of these distortions,lens distortion,light source distortion and Moiré streak distortion should be of concern.

    2.2 SIFT Algorithm

    The SIFT algorithm or scale invariant feature transformation is an algorithm in image processing,which is used to detect key points in the image and provide feature descriptors for the direction of key points[26].The algorithm can adapt to changes in luminance with good stability and invariance.Schaber et al.[27]demonstrated that SIFT keypoints are screenshot invariant,but traditional SIFT algorithms do not allow blind extraction and have long localization times[28,29],so we also use the same intensity-based SIFT algorithm as Fang et al.for finding regions with embedded watermarks.The equation is defined as Eq.(1).

    where p denotes a key point in the Difference of Gaussians(DoG)domain,andp=(x,y,σ),the DoG image is described as Eq.(2).

    where(x,y)is a pixel location of the image andσis the scale space factor.L(x,y,σ)is defined as the original imageI(x,y)with a variable scale 2-dimensional GaussianG(x,y,σ)convolution operation.The equation is as follows:

    where*denotes the convolution operation,(x,y)represents a pixel position of the image,andσis the scale space factor.

    2.3 JND Model

    JND is the minimum perceptible difference,and in image processing,JND can be used to measure the sensitivity of the human eye to distortion in different regions of an image [30].The JND model mainly considers the properties of luminance masking as well as texture masking of Human Visual System(HVS), and uses a nonlinear relationship to superimpose the effects of both.Qin et al.[31]suggested using the spatial JND model to determine the strength of the watermark embedding to obtain good visual performance.This paper uses JND to adjust the size of watermark embedding intensity, which can achieve an adaptive change of embedding intensity with image luminance and texture.The basic formula of JND is as follows.

    Of these,theTl(x,y)and,y)are the visibility threshold of the luminance masking factor and the texture masking factor.is the superposition constant, which reflects the degree of overlap of the two masks.

    3 Proposed Method

    3.1 Watermark Embedding Process

    The watermark embedding method proposed is described below.First select the host image for embedding, if a color image is an input, convert the input to YCbCr color space, and then select the image of Y channel, otherwise, it will be directly used as the host image.Then select the feature region for embedding the watermark,find the feature points using intensity-based SIFT algorithm and construct the feature region according to the density of the feature points.The watermark sequence is encoded using Bose–Chaudhuri–Hocquenghem(BCH)codes and the encoded watermark sequence is used to embed.The watermark embedding is performed in the DCT domain.Finally,the coefficients in the neighboring domain are adjusted again with optimization constraints.The specific watermark embedding process is shown in Fig.1.

    Figure 1:Watermark embedding process

    Convert the watermark sequence into a binary sequence and encode it using BCH codes.The obtained binary watermark sequence is put into a matrix W of size a * b by column and W is the smallest square matrix possible.If the length of the binary watermark sequence is less than a*b,then the other remaining positions in W are subjected to a complementary 0 operation to finally obtain the watermark matrix.Each bit of information is embedded in a block of size 8×8 pixels.With the candidate feature points as the center,the feature region is obtained based on the watermark matrix,and the size of the feature region is a*b*8*8.

    The feature points are detected in the image using the intensity-based SIFT algorithm and sorted in descending order of feature point intensity, and the top n feature points with the largest feature points intensity are selected as candidate feature points.The feature region is filtered for the first time depending on the area that cannot exceed the borders of the image.Then the feature region with at least k candidate feature points is selected for the second time based on the density of feature points.Finally,the feature region is filtered based on the fact that each feature region cannot overlap with each other,and if there is an overlapping region,the one with low feature point intensity is removed.After finding all the feature points that satisfy the conditions,the top m feature points and the corresponding feature regions are the final choices in order of the intensity of the feature points.If the number of feature points is less than m,the embedding is done according to the actual feature points and feature regions.However, after extensive experiments, it is found that texture-rich images have at least five such regions.We found that the feature regions determined based on the feature point density can be more concentrated in key locations of the image, and such locations tend not to be cropped out.Taking the crown plot as an example.Fig.2a shows the feature regions found by Fang et al.’s method,and Fig.2b shows the feature regions found by the proposed method,from which we can see that the feature regions found by our method surround the key regions of the image.

    Figure 2:Selection results of feature regions

    The embedding of the watermark is performed in the DCT domain.Fang et al.found that the relative magnitude of a pair of DCT coefficients at mid-frequency didn’t change after the screenphotography process,so embedding of the watermark,as well as blind extraction,can be achieved by comparing the magnitude of this pair of coefficients.The image is first transformed to DCT domain,and then embed watermark by comparing the coefficient values of two positions,the two coefficients are C1 and C2.If the information to be embedded is 0,C1 ≥C2 is guaranteed;If the information to be embedded is 1,C1<C2 is guaranteed.The watermark strength in this paper is determined by the JND model to achieve the adaptive change of embedding strength with image luminance and texture,and the specific equation of watermark embedding is shown in Eq.(5).

    where(x,y)is a pixel position of the image,theTl(x,y)and(Tt(x,y)are visibility threshold for the luminance masking factor and texture masking factor,theJND(x,y)is JND value of a pixel location,C1 and C2 are the discrete cosine transform coefficient values of the two locations, and w is the watermark value.

    Since the shooting process may lead to an offset of some feature points during extraction,Fang et al.use a neighborhood traversal method to compensate for the offset.However, when the offset occurs,the comparison may be performed with more than just the two coefficient values C1 and C2,and we take the coefficients at positions(4,5)and(5,4)as an example below.Fig.3 plots the results of eight possible offsets,one coefficient pair in each ellipse,and ultimately it may be possible to determine whether the embedded information is 0 or 1 by comparing the magnitudes of the two coefficient values in these pairs.When the magnitude relationship between the values of the other coefficient pairs is exactly opposite to that of (4, 5) and (5, 4), and the number of opposite coefficient pairs is greater than the number of identical coefficient pairs,it is possible that the extracted information is the exact opposite of the embedded information,and thus the information cannot be extracted correctly.

    Figure 3:Possible offset results of feature points

    Therefore, after embedding the watermark, we propose to apply size constraints to the discrete cosine transform coefficients in the 3*3 neighborhood of(4,5)and(5,4)positions to make sure that watermark information is still extractable when feature points are offset.The formula we wish to end up with for the size relationship is shown in Eqs.(6)and(7).

    When the above formula is not satisfied, we need to modify the adjustment for the coefficient values that do not satisfy the condition.For C(3, 4),C(4, 3) and C(5, 6),C(6, 5) the two pairs of coefficients are directly exchanged if the condition is not satisfied;for C(3,5),C(4,4),C(5,3)and C(4,6),C(5,5),C(6,4)the four pairs of coefficients,if they do not satisfy the condition,are sorted according to the size relationship and assigned to each coefficient in turn;for C(3,6),C(4,5),C(5,4),C(6,3)the three pairs of coefficients,if the condition is not satisfied,are modified according to Eq.(8).

    After modifying the coefficient value, perform the inverse DCT transformation to the spatial domain.Repeat the above operations sequentially until all feature regions are embedded in the watermark.Finally,add the previous Cr and Cb channels or directly get the image.

    3.2 Watermark Extraction Process

    The following describes the watermark extraction process,a detailed process can be seen in Fig.4.Since mobile phone shooting will cause some image distortion,the photo taken by the mobile phone should be perspective corrected first, and the cropping and scaling operation should be performed to get the extracted image as large as the raw image.But here four vertices of the image need to be known.The SIFT algorithm based on intensity is used to select the feature points, select the first n feature points with the greatest intensity,and select the feature region as the embedding method.The feature regions are divided into a * b blocks, a DCT transform is executed on each block, and the embedding information is determined as 0 or 1 by comparing the magnitude of the DCT coefficient values.

    Figure 4:Watermark extraction process

    Since the intensity of the feature points may change and their positions may be shifted after taking a picture,we perform offset compensation.With the feature point as the center,9 neighboring feature points in their surrounding 3*3 neighborhood are selected to form an extracted point group for offset compensation.The 9 watermarks extracted from this extracted point group are used as a watermark group.Watermarks in different watermark groups are compared, and if the difference between two watermarks is less than the thresholdth, the two watermarks are recorded as a watermark pairwf.Watermarks in the same group will not be compared.The formula for calculating the difference between two watermarks are shown in Eq.(9),and the formula for watermark pairwfof the formula is shown in Eq.(10).

    wherewiαis theαth watermark in theith watermark group,wjβis theβth watermark in thejth watermark group,(x,y)are the coordinates of the watermark matrix,and ⊕is the XOR operation.

    Finally,a watermark pair wfwith a length of 2 l is obtained.Add all watermarks in wfin sequence according to the coordinates.If the value at a certain position is greater than or equal to l, that is,half of the number of watermarks in wf,it is considered that the watermark value at that position is 1,otherwise,it is 0.See Eq.(11)for details.

    Of these,,y)is the value of the ith watermark inwfat position(x,y)and 2lis the number of watermarks inwf.

    By adjusting the embedding region,the adaptive variation of embedding intensity and constraining the magnitude relationship of the coefficient in the neighborhood of the modified coefficient,we find that the probability of successful watermark extraction from the captured images increased and the quality of the watermarked images visually improved.

    4 Experimental Results

    Next, we will show and discuss the results of the comparison experiments with Fang et al.We carried out experiments under the MATLAB platform.The image database we used is the USC-SIPI image database[32].Again,we choose a=8,b=8,and the error correction code chosen is BCH(64,39),which corrects 4-bit errors.The n in the experiment is set to 50 and k is set to 3.The monitor we use is‘LEN T27q-20’and the phone used is‘Huawei p40 pro’.The following experiments compare the results in terms of PSNR values and different shooting processes including shooting distance,shooting angle,and handhold shooting,respectively.

    Tab.1 shows the comparison between Fang’s method and the proposed method in PSNR value.From the table,it can be seen that most of the plots have some improvement in PSNR values,but there are also a small number of plots with slightly lower PSNR values.

    Table 1: Images embedded by different methods and corresponding PSNR values

    (1) Effect of distance on robustness:Our shooting distance is 45–105 cm.Tab.2 shows examples of the images obtained by shooting at different shooting distances and the images obtained after perspective correction.Tab.3 lists the average watermark error bits extracted by Fang’s and our method at different shooting distances.As can be seen from the table, the error bits of ours are lower than the method of Fang et al.at most distances,but they are also slightly higher or equal at some distances.

    Table 2: Examples of screen shot images at different shooting distances

    Table 3: Average error bits of watermark extracted under different shooting distances

    (2) Effect of horizontal viewing angle on robustness: in doing experiments on the effect of horizontal viewing angle on robustness,we controlled the shooting distance to be 55 cm and the horizontal viewing angle was varied from 65?left to 65?right.Tab.4 shows examples of the images obtained by shooting at different horizontal viewing angles and the images obtained after perspective correction.Tab.5 shows the average extracted watermark error bits for the method of Fang et al.and the proposed method at different horizontal viewing angles.It can be seen from the table that the error bits of ours are lower than the method of Fang et al.

    Table 4: Examples of screenshot images taken at different horizontal viewing angles

    Table 5: Average error bits of watermark extracted under different horizontal viewing angle

    (3) Effect of vertical viewing angle on robustness: in doing experiments on the effect of vertical viewing angle on robustness,we controlled the shooting distance to be 55 cm and the vertical viewing angle changed from 65?up to 65?down.Tab.6 shows examples of the images obtained by shooting at different vertical viewing angles and the images obtained after perspective correction.Tab.7 shows the average extracted watermark error bits for the method of Fang et al.and the proposed method at different vertical viewing angles.As can be seen from the table,the error bits of ours are less than or equal to the method of Fang et al.

    Table 6: Examples of screenshot images taken at different vertical viewing angles

    Table 7: Average error bits of watermark extracted under different vertical viewing angle

    (4) Effect of handhold shooting on robustness:Examples of images obtained by shooting under handhold conditions are shown in Tab.8,images obtained after perspective correction and the average error bits of the recovered images for watermark extraction.From the table,as we can see,the watermark information is correctly extracted even under handhold shooting conditions and the method is robust to handhold shooting.

    Table 8: Examples of handhold shooting

    The experimental comparison shows that our proposed method has some improvement in robustness and vision over the method of Fang et al.However,the scheme has some limitations like the method of Fang et al.Due to the limitations of the SIFT algorithm,if the texture of the image is too simple,the position of the selected feature points will change significantly,and thus the information cannot be extracted correctly.During extraction,it is still necessary to manually locate the four vertices of the image to be able to recover the extracted image.For some text images,the proposed embedding method leads to a very obvious visual distortion that can affect the normal reading of people.

    5 Conclusion

    For the purpose of protecting the image displayed on the screen,a robust watermarking solution based on image content for screen photography is proposed.In terms of embedded area selection,the intensity-based SIFT algorithm is used to construct feature regions based on the density of feature points, which can make the feature regions more focused on the key content of the image, more accurate in extraction and resistant to certain cropping attacks; the JND model is used to realize the adaptive change of embedding strength with image luminance and texture to achieve a balance between robustness and invisibility; after embedding, the coefficients in the domain are optimized again.In this way, when using statistical features to extract watermark, it can improve the number of correct coefficient size relationships, reduce the opposite situation of extraction results, and have higher accuracy.The results of the experiments indicate that the solution offers some improvements in terms of robustness and vision.

    Funding Statement:This work is supported by the National Key R&D Program of China under grant 2018YFB1003205; by the National Natural Science Foundation of China under grant U1836208,U1836110;by the Priority Academic Program Development of Jiangsu Higher Education Institutions(PAPD)fund;by the Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET)fund,China.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    久久亚洲精品不卡| 国产熟女欧美一区二区| 91狼人影院| 成人美女网站在线观看视频| 别揉我奶头 嗯啊视频| 青春草国产在线视频 | 女人被狂操c到高潮| 欧美3d第一页| 中文字幕av在线有码专区| 国产午夜福利久久久久久| 精品国产三级普通话版| 日本爱情动作片www.在线观看| 在线免费观看不下载黄p国产| 亚洲天堂国产精品一区在线| 精品不卡国产一区二区三区| 国产精品无大码| 国产精品爽爽va在线观看网站| 一本久久精品| 午夜精品国产一区二区电影 | 美女xxoo啪啪120秒动态图| 国产精品一区二区三区四区久久| 日韩欧美精品v在线| 婷婷精品国产亚洲av| 人人妻人人澡人人爽人人夜夜 | 久久久久久大精品| 欧美日韩乱码在线| 亚洲七黄色美女视频| 丝袜美腿在线中文| 中国美女看黄片| 夜夜爽天天搞| 午夜老司机福利剧场| 日本欧美国产在线视频| 在线免费观看不下载黄p国产| 成人亚洲精品av一区二区| 菩萨蛮人人尽说江南好唐韦庄 | 麻豆精品久久久久久蜜桃| 可以在线观看的亚洲视频| 久久精品夜色国产| 亚洲欧美中文字幕日韩二区| 1024手机看黄色片| 美女 人体艺术 gogo| 美女高潮的动态| 韩国av在线不卡| 干丝袜人妻中文字幕| 99热这里只有精品一区| 亚洲国产精品久久男人天堂| 精品久久久噜噜| 变态另类成人亚洲欧美熟女| 九九久久精品国产亚洲av麻豆| 午夜老司机福利剧场| 成年免费大片在线观看| 国产伦理片在线播放av一区 | 春色校园在线视频观看| 国产成人a区在线观看| 变态另类成人亚洲欧美熟女| 精品一区二区免费观看| 禁无遮挡网站| 亚洲在线观看片| 亚洲中文字幕日韩| 国产一区二区亚洲精品在线观看| 国产美女午夜福利| 欧美日韩国产亚洲二区| 亚洲成人中文字幕在线播放| 岛国在线免费视频观看| 高清毛片免费看| 老熟妇乱子伦视频在线观看| 97超视频在线观看视频| 好男人在线观看高清免费视频| 午夜精品一区二区三区免费看| 欧美日韩一区二区视频在线观看视频在线 | 哪个播放器可以免费观看大片| 99九九线精品视频在线观看视频| 国产视频内射| 欧美日韩国产亚洲二区| 国产高清激情床上av| 免费搜索国产男女视频| 久久久a久久爽久久v久久| 不卡视频在线观看欧美| 1000部很黄的大片| 亚洲自偷自拍三级| 夜夜爽天天搞| 非洲黑人性xxxx精品又粗又长| 99久国产av精品国产电影| 禁无遮挡网站| 久久九九热精品免费| 久久精品久久久久久噜噜老黄 | 网址你懂的国产日韩在线| 欧美+日韩+精品| 亚洲欧美日韩高清在线视频| 午夜福利成人在线免费观看| 简卡轻食公司| 欧美xxxx黑人xx丫x性爽| 三级经典国产精品| 亚洲成人久久爱视频| 免费观看人在逋| 色综合亚洲欧美另类图片| 久久99精品国语久久久| 欧美区成人在线视频| 色5月婷婷丁香| 国产色婷婷99| 搞女人的毛片| 亚洲国产高清在线一区二区三| 久久99精品国语久久久| 免费av毛片视频| 校园人妻丝袜中文字幕| av在线老鸭窝| 日日啪夜夜撸| 毛片一级片免费看久久久久| 美女被艹到高潮喷水动态| 日韩av不卡免费在线播放| 听说在线观看完整版免费高清| 色视频www国产| 伊人久久精品亚洲午夜| 在线免费观看的www视频| 麻豆国产av国片精品| 午夜免费男女啪啪视频观看| 久久精品国产自在天天线| 欧美xxxx黑人xx丫x性爽| 亚洲av成人精品一区久久| 欧美一区二区精品小视频在线| 日韩强制内射视频| 国产精品蜜桃在线观看 | 精品国产三级普通话版| 成人av在线播放网站| 国产成人午夜福利电影在线观看| 搡女人真爽免费视频火全软件| 一边摸一边抽搐一进一小说| 亚洲欧美日韩高清在线视频| 自拍偷自拍亚洲精品老妇| 国国产精品蜜臀av免费| 插阴视频在线观看视频| 啦啦啦啦在线视频资源| 九九爱精品视频在线观看| 日韩一区二区视频免费看| 伦精品一区二区三区| 日本-黄色视频高清免费观看| 亚洲欧美日韩无卡精品| 亚洲18禁久久av| 舔av片在线| 日韩高清综合在线| 91精品国产九色| 成人欧美大片| 在线观看66精品国产| 国产极品天堂在线| 国产高清视频在线观看网站| 成人午夜高清在线视频| 久久久久性生活片| 亚洲在久久综合| 亚洲自拍偷在线| АⅤ资源中文在线天堂| 亚洲av免费高清在线观看| 女的被弄到高潮叫床怎么办| 成人午夜精彩视频在线观看| 我的老师免费观看完整版| 久久亚洲精品不卡| 少妇猛男粗大的猛烈进出视频 | 亚洲三级黄色毛片| 午夜福利在线观看免费完整高清在 | a级毛片免费高清观看在线播放| 不卡视频在线观看欧美| 国产一区二区三区av在线 | 日韩视频在线欧美| 久久精品91蜜桃| 亚洲成人中文字幕在线播放| 日本爱情动作片www.在线观看| 成人性生交大片免费视频hd| 精品久久久噜噜| 国产黄片美女视频| 亚洲成人精品中文字幕电影| 99九九线精品视频在线观看视频| 久久精品国产亚洲网站| 少妇的逼水好多| 成人特级黄色片久久久久久久| 22中文网久久字幕| 国内精品久久久久精免费| 久久亚洲国产成人精品v| 成人特级黄色片久久久久久久| 村上凉子中文字幕在线| 国产一区二区亚洲精品在线观看| 成人无遮挡网站| 中文字幕精品亚洲无线码一区| 中文在线观看免费www的网站| 国产精品一区二区三区四区免费观看| 只有这里有精品99| 麻豆国产97在线/欧美| 国产精品久久久久久av不卡| 精品无人区乱码1区二区| 欧美一级a爱片免费观看看| 在线观看免费视频日本深夜| 村上凉子中文字幕在线| 最近视频中文字幕2019在线8| 日本欧美国产在线视频| 国产在视频线在精品| 亚洲第一区二区三区不卡| or卡值多少钱| 久久精品国产鲁丝片午夜精品| 精品熟女少妇av免费看| 亚洲av.av天堂| 日韩av不卡免费在线播放| 成人午夜精彩视频在线观看| 免费看光身美女| 国产av在哪里看| 国产探花在线观看一区二区| 精品少妇黑人巨大在线播放 | 91久久精品国产一区二区三区| 国产一区二区亚洲精品在线观看| 一夜夜www| 欧美3d第一页| 91精品一卡2卡3卡4卡| 成人毛片60女人毛片免费| 深夜精品福利| 夜夜爽天天搞| 成人亚洲精品av一区二区| 特级一级黄色大片| 成人三级黄色视频| 欧美一区二区亚洲| 非洲黑人性xxxx精品又粗又长| 精品国内亚洲2022精品成人| 日本成人三级电影网站| 男人舔女人下体高潮全视频| 校园人妻丝袜中文字幕| 性欧美人与动物交配| 一个人看视频在线观看www免费| av国产免费在线观看| 午夜精品在线福利| 国产成人freesex在线| 波多野结衣高清作品| 国产精品久久久久久久久免| 久久久午夜欧美精品| 97热精品久久久久久| 看黄色毛片网站| 国产伦精品一区二区三区视频9| 熟女人妻精品中文字幕| 成人特级黄色片久久久久久久| 免费看美女性在线毛片视频| 99久久精品一区二区三区| 色噜噜av男人的天堂激情| av女优亚洲男人天堂| 欧美不卡视频在线免费观看| 听说在线观看完整版免费高清| 国产亚洲av片在线观看秒播厂 | 真实男女啪啪啪动态图| 久久精品久久久久久噜噜老黄 | 亚洲av中文字字幕乱码综合| 99热只有精品国产| 亚洲av电影不卡..在线观看| av天堂在线播放| 一个人免费在线观看电影| 青春草国产在线视频 | 97人妻精品一区二区三区麻豆| 最近视频中文字幕2019在线8| 中文字幕精品亚洲无线码一区| 国产成人午夜福利电影在线观看| 国产三级在线视频| 久久韩国三级中文字幕| 99热这里只有是精品50| 亚洲精品自拍成人| 嫩草影院新地址| 欧美成人精品欧美一级黄| 天天一区二区日本电影三级| 高清日韩中文字幕在线| 国产淫片久久久久久久久| 国产精品伦人一区二区| 51国产日韩欧美| 久久久精品欧美日韩精品| 在线免费观看不下载黄p国产| 精品少妇黑人巨大在线播放 | 看十八女毛片水多多多| 日韩av不卡免费在线播放| 狂野欧美激情性xxxx在线观看| 午夜激情欧美在线| 亚洲精华国产精华液的使用体验 | 国产精品久久久久久精品电影小说 | АⅤ资源中文在线天堂| 能在线免费观看的黄片| 亚洲图色成人| 国产成人freesex在线| 色综合亚洲欧美另类图片| 插阴视频在线观看视频| 亚洲人成网站高清观看| 两个人的视频大全免费| 亚洲va在线va天堂va国产| 日韩,欧美,国产一区二区三区 | 最近的中文字幕免费完整| 一级黄色大片毛片| 亚洲七黄色美女视频| 免费av观看视频| 久久人人爽人人爽人人片va| 国产日韩欧美在线精品| 日日撸夜夜添| 高清在线视频一区二区三区 | 在线观看av片永久免费下载| 丰满的人妻完整版| 男人舔奶头视频| 国产成人福利小说| 热99re8久久精品国产| 亚洲精华国产精华液的使用体验 | 亚洲aⅴ乱码一区二区在线播放| 国产久久久一区二区三区| 亚洲中文字幕日韩| 九九热线精品视视频播放| 男人狂女人下面高潮的视频| 国产精品一区二区三区四区免费观看| 国产私拍福利视频在线观看| 简卡轻食公司| 日韩国内少妇激情av| 日韩中字成人| 春色校园在线视频观看| 久久久久免费精品人妻一区二区| 婷婷六月久久综合丁香| 久久久色成人| 91狼人影院| 亚洲综合色惰| 欧美xxxx性猛交bbbb| 岛国毛片在线播放| 日韩欧美精品v在线| 日日干狠狠操夜夜爽| 久久久a久久爽久久v久久| 久久99蜜桃精品久久| 亚洲va在线va天堂va国产| 18+在线观看网站| 色吧在线观看| 亚洲一区高清亚洲精品| 国产午夜福利久久久久久| 69人妻影院| 成人午夜精彩视频在线观看| 国产一区二区在线观看日韩| 亚洲欧美日韩高清专用| 成人高潮视频无遮挡免费网站| 亚洲国产欧洲综合997久久,| 色视频www国产| 在线a可以看的网站| 99在线人妻在线中文字幕| 桃色一区二区三区在线观看| 亚洲一区高清亚洲精品| 午夜久久久久精精品| 寂寞人妻少妇视频99o| 九九热线精品视视频播放| 成人亚洲精品av一区二区| 色哟哟哟哟哟哟| 天美传媒精品一区二区| 老师上课跳d突然被开到最大视频| 波多野结衣高清无吗| 毛片一级片免费看久久久久| 久久这里有精品视频免费| 少妇人妻一区二区三区视频| 成人无遮挡网站| 成人欧美大片| 免费观看a级毛片全部| 毛片女人毛片| 国产精品99久久久久久久久| 日日撸夜夜添| 秋霞在线观看毛片| 免费无遮挡裸体视频| 国产亚洲91精品色在线| 国产一级毛片在线| 久久久午夜欧美精品| 国产精品美女特级片免费视频播放器| 天天躁夜夜躁狠狠久久av| 成人性生交大片免费视频hd| 国产三级中文精品| 人妻系列 视频| 欧美+亚洲+日韩+国产| 狂野欧美白嫩少妇大欣赏| 大型黄色视频在线免费观看| 国产日本99.免费观看| 亚洲精品亚洲一区二区| 日本黄色片子视频| 成人三级黄色视频| 国产91av在线免费观看| 久久久久久久久大av| 国产综合懂色| АⅤ资源中文在线天堂| 亚洲人成网站在线观看播放| 青青草视频在线视频观看| av在线亚洲专区| 综合色丁香网| 国产白丝娇喘喷水9色精品| 久久韩国三级中文字幕| 国产熟女欧美一区二区| 午夜精品在线福利| 天天躁夜夜躁狠狠久久av| 最近的中文字幕免费完整| 亚洲精品日韩在线中文字幕 | 日本免费一区二区三区高清不卡| 三级毛片av免费| 又粗又爽又猛毛片免费看| av女优亚洲男人天堂| 国产黄片美女视频| 国产精品免费一区二区三区在线| www日本黄色视频网| 亚州av有码| 给我免费播放毛片高清在线观看| kizo精华| 久久久成人免费电影| 久99久视频精品免费| 尾随美女入室| 国产成人精品久久久久久| 日本爱情动作片www.在线观看| 亚洲丝袜综合中文字幕| 男女做爰动态图高潮gif福利片| 午夜激情欧美在线| 中文亚洲av片在线观看爽| 色综合亚洲欧美另类图片| 男人和女人高潮做爰伦理| 午夜免费男女啪啪视频观看| 国产不卡一卡二| 毛片女人毛片| 亚洲无线观看免费| 免费不卡的大黄色大毛片视频在线观看 | 女人十人毛片免费观看3o分钟| 特大巨黑吊av在线直播| 精品熟女少妇av免费看| 嫩草影院精品99| 内地一区二区视频在线| 国产精品综合久久久久久久免费| 欧美在线一区亚洲| 99久久精品一区二区三区| 久久精品国产自在天天线| 国内精品宾馆在线| 少妇熟女aⅴ在线视频| 黑人高潮一二区| 女人被狂操c到高潮| 国产精品一区二区三区四区免费观看| 欧美精品国产亚洲| 欧美丝袜亚洲另类| 免费观看在线日韩| 韩国av在线不卡| 两个人的视频大全免费| 69av精品久久久久久| 欧美变态另类bdsm刘玥| 国产精品人妻久久久影院| 国产久久久一区二区三区| 深夜a级毛片| 51国产日韩欧美| 亚洲欧美精品自产自拍| 欧美激情在线99| 国产亚洲精品av在线| 亚洲精品粉嫩美女一区| 国产在视频线在精品| 欧美bdsm另类| 观看免费一级毛片| 成人特级av手机在线观看| 国产伦一二天堂av在线观看| 卡戴珊不雅视频在线播放| 高清午夜精品一区二区三区 | 国产成人一区二区在线| 99在线人妻在线中文字幕| 国产69精品久久久久777片| 在线天堂最新版资源| 午夜亚洲福利在线播放| 亚洲美女搞黄在线观看| 内射极品少妇av片p| 国产男人的电影天堂91| 免费黄网站久久成人精品| 2021天堂中文幕一二区在线观| 亚洲国产色片| 我的老师免费观看完整版| 能在线免费看毛片的网站| 国产精品久久久久久久电影| 1024手机看黄色片| 亚洲乱码一区二区免费版| 蜜桃久久精品国产亚洲av| 99热只有精品国产| 18+在线观看网站| 狠狠狠狠99中文字幕| .国产精品久久| 好男人在线观看高清免费视频| 午夜福利在线在线| 中文字幕免费在线视频6| 国产精品一及| 午夜视频国产福利| 女人十人毛片免费观看3o分钟| 熟女电影av网| 一级黄片播放器| eeuss影院久久| 国产色爽女视频免费观看| 丰满乱子伦码专区| 白带黄色成豆腐渣| 在现免费观看毛片| 国产精品无大码| 99久久成人亚洲精品观看| 国产av不卡久久| 欧美+日韩+精品| 97热精品久久久久久| 欧美一区二区精品小视频在线| 久久精品久久久久久久性| 久久精品国产亚洲av香蕉五月| 联通29元200g的流量卡| 日本免费a在线| 日本成人三级电影网站| 三级毛片av免费| 少妇被粗大猛烈的视频| 国产色爽女视频免费观看| 国产精品爽爽va在线观看网站| 国产毛片a区久久久久| 亚洲欧美清纯卡通| 亚洲av中文av极速乱| 成年av动漫网址| АⅤ资源中文在线天堂| 免费看光身美女| 午夜福利视频1000在线观看| 久久热精品热| 国产精品久久电影中文字幕| 亚洲精品粉嫩美女一区| 十八禁国产超污无遮挡网站| 一区二区三区高清视频在线| 久久精品国产99精品国产亚洲性色| 丰满的人妻完整版| 久久久欧美国产精品| 夜夜爽天天搞| 在线观看av片永久免费下载| 成年av动漫网址| 少妇的逼好多水| 亚洲最大成人中文| 国内精品宾馆在线| 国产 一区精品| 国产又黄又爽又无遮挡在线| 青春草亚洲视频在线观看| 国产白丝娇喘喷水9色精品| 欧美xxxx黑人xx丫x性爽| 女同久久另类99精品国产91| 菩萨蛮人人尽说江南好唐韦庄 | 可以在线观看毛片的网站| 亚洲欧美日韩无卡精品| 欧美极品一区二区三区四区| 搡女人真爽免费视频火全软件| 尤物成人国产欧美一区二区三区| 热99在线观看视频| 日韩欧美国产在线观看| 黑人高潮一二区| 精品久久久久久久久久免费视频| 欧美精品国产亚洲| 免费一级毛片在线播放高清视频| a级毛片免费高清观看在线播放| 欧美变态另类bdsm刘玥| 美女xxoo啪啪120秒动态图| 伦精品一区二区三区| 亚洲av熟女| 99视频精品全部免费 在线| 久久午夜亚洲精品久久| 国产精品一区二区性色av| 美女 人体艺术 gogo| 亚洲自拍偷在线| 高清毛片免费看| 国产高清激情床上av| 久久人妻av系列| 国产成人精品婷婷| 99久久精品一区二区三区| 狂野欧美激情性xxxx在线观看| 欧美日韩国产亚洲二区| 亚洲av熟女| 小说图片视频综合网站| 亚洲四区av| 亚洲精品日韩在线中文字幕 | 成人毛片a级毛片在线播放| 狂野欧美白嫩少妇大欣赏| 久久99蜜桃精品久久| 国产精品久久久久久久久免| 日韩制服骚丝袜av| 欧美一级a爱片免费观看看| 亚洲最大成人av| 黄色配什么色好看| 嫩草影院入口| 亚洲国产高清在线一区二区三| 插阴视频在线观看视频| 精品一区二区三区人妻视频| 久99久视频精品免费| 欧美又色又爽又黄视频| 亚洲一区高清亚洲精品| 色噜噜av男人的天堂激情| 尤物成人国产欧美一区二区三区| 美女黄网站色视频| 久久久久久久亚洲中文字幕| 亚洲一级一片aⅴ在线观看| 亚洲在线观看片| 国产精品女同一区二区软件| 免费无遮挡裸体视频| 久久久久久伊人网av| 国产激情偷乱视频一区二区| 搡老妇女老女人老熟妇| 全区人妻精品视频| 人妻少妇偷人精品九色| 亚洲激情五月婷婷啪啪| 少妇熟女欧美另类| 日产精品乱码卡一卡2卡三| 亚洲国产精品久久男人天堂| 亚洲精品色激情综合| kizo精华| 日日摸夜夜添夜夜爱| 国内精品美女久久久久久| 麻豆乱淫一区二区| 91av网一区二区| 国产乱人偷精品视频| 精品久久国产蜜桃| 久久久久国产网址| 亚洲精品国产av成人精品| 久久久午夜欧美精品| 国内久久婷婷六月综合欲色啪| 久久精品影院6| 亚洲人成网站在线观看播放| 国产一区二区亚洲精品在线观看| 欧美+日韩+精品| 日韩av在线大香蕉| 国产精品一区二区性色av| 国产视频内射| 此物有八面人人有两片| 国产老妇伦熟女老妇高清| 久久久午夜欧美精品| 免费黄网站久久成人精品| 又粗又硬又长又爽又黄的视频 | 日本与韩国留学比较| 久99久视频精品免费| 国产午夜精品久久久久久一区二区三区| 亚洲av不卡在线观看|