• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Hyperchaos and MD5 Based Efficient Color Image Cipher

    2022-08-24 12:56:52MuhammadSamiullahWaqarAslamSaimaSadiqArifMehmoodandGyuSangChoi
    Computers Materials&Continua 2022年7期

    Muhammad Samiullah, Waqar Aslam, Saima Sadiq, Arif Mehmoodand Gyu Sang Choi

    1Department of Computer Science & IT, The Islamia University of Bahawalpur, Bahawalpur, 63100, Pakistan

    2Department of Computer Science, Khwaja Fareed University of Engineering and Information Technology, Rahim Yar Khan, 64200, Pakistan

    3Department of Information and Communication Engineering, Yeungnam University, Gyeongsan, 38541, Korea

    Abstract: While designing and developing encryption algorithms for text and images, the main focus has remained on security.This has led to insufficient attention on the improvement of encryption efficiency, enhancement of hyperchaotic sequence randomness, and dynamic DNA-based S-box.In this regard, a new symmetric block cipher scheme has been proposed.It uses dynamic DNA-based S-box connected with MD5 and a hyperchaotic system to produce confusion and diffusion for encrypting color images.Our proposed scheme supports various size color images.It generates three DNA based Sboxes for substitution namely DNA_1_s-box, DNA_2_s-box and DNA_3_sbox, each of size 16×16.Next, the 4D hyperchaotic system followed by MD5 is employed in a novel way to enhance security.The three DNAbased S-boxes are generated from real DNA sequences taken from National Center for Biotechnology Information (NCBI) databases and are dependent on the mean intensity value of an input image, thus effectively introducing content-based confusion.Finally, Conservative Site-Specific Recombination(CSSR) is applied on the output DNA received from DNA based S-boxes.The experimental results indicate that the proposed encryption scheme is more secure, robust, and computationally efficient than some of the recently published similar works.Being computational efficient, our proposed scheme is feasible on many emergent resource-constrained platforms.

    Keywords: Block cipher; substitution; permutation; diffusion; confusion

    1 Introduction

    The official communication based on images in the form of electronic patient records (EPRs),notifications, office orders and scanned documents may suffer from loss and theft if transmitted over an insecure channel.By using existing standard symmetric ciphers such as Data Encryption Standard (DES), 3-DES, Advanced Encryption Standard (AES) for encrypting the digital images,we neglect digital image’s intrinsic properties such as pixel correlations, data redundancies, etc.,therefore the existing ciphers suffer from low encryption efficiency [1,2].Thus, the above-mentioned intrinsic properties of an image must be considered while improving or devising the image ciphers.Communication using digital images represents 70 percent of the data transmitted on the internet[3].To address this issue, the images must be encrypted efficiently with secure key management prior to transmission or storage.Although, some ciphers based on chaotic systems are susceptible to some classical attacks [4], combining the higher dimensional hyperchaotic system or multiple chaotic systems with Deoxyribo Nucleic Acid (DNA) operations in designing the ciphers are proved to be very secure [5-10].Likewise, a cipher based on chaotic cryptography, DNA cryptography, or a combination of both must contain the confusion and diffusion architecture with any number of rounds.The confusion is normally achieved through S-box (a non-linear function) in which the pixel values are replaced with new values.While in diffusion, the pixel positions are randomly exchanged without changing the actual pixel values.No doubt, S-box obfuscates the relationship between key and encrypted image but is seldom adopted in image ciphers [11].A good S-box should meet the ideal values of avalanche criterion and completeness.Similarly, the weak randomness produced by chaotic maps can be improved by efficient architectures, jointing it with hyperchaotic systems, DNA operations, and S-boxes to make it eligible for Pseudo-Random Number Generators (PRNGs).In this respect, a sequence produced by the 4D hyperchaotic system is improved in [12].Likewise, a highly secure and confidential algorithm is proposed that connects the Memetic algorithm with a PRNG to encrypt the sensitive information prior to embedding it into a patient’s medical image [13].

    Based on the above discussions, a cipher based on MD5, SHA-256, 4D hyperchaotic system jointed with DNA-based S-box is presented.The main contributions of this research work are: (a)Implementation of DNA-based S-box [14] to encrypt RGB images, (b) CSSR is applied after the substitution, (c) initial conditions for the 4D hyperchaotic system are generated from the hash of the plain image and biological DNA which in turn gives encryption key, (d) diffusion using the 4D hyperchaotic system is achieved in an intertwined pattern.

    The remaining of this paper is organized as follows: Section 2 deals with background studies.Section 3 describes the related work.The proposed scheme is written in Section 4.Security analysis and performance analysis are carried out in Section 5.Conclusions and future directions are given in Section 6.

    2 Background Studies

    2.1 Hyperchaos and Lyapunov Exponents

    The usual way to identify the hyperchaotic behavior of a non-linear system is to compute Lyapunov Exponents (LEs).The idea behind LEs is as follows: (a) Sensitive dependence on initial conditions is characterized by binary distinctions i.e., either the system has sensitive dependence on initial conditions or it doesn’t, (b) how much the particular dynamical system has the sensitivity to changes in initial conditions.The answer is LE, which is a way of quantifying the sensitivity to initial conditions.LE defined in Eq.(1), is the average logarithmic rate of separation or convergence between the two points on the orbits at time seriest[15].In short, LE is the exponential separation rate for two nearby trajectories of a dynamical system.

    where ΔD°is the initial difference between the two initial conditionsX°andY°.If the non-linear system has two or more Positive Lyapunov Exponents (PLEs), it is named hyperchaos and they show much-complicated behavior as compared to chaotic systems.On the other side, chaotic systems have one PLE.Maximum PLEs indicate more chaos and vice versa.And the negative LEs represent no sensitive dependence on initial conditions or no chaos.The first hyperchaotic system with four dimensions was reported in 1979 by Rossler [16].Hyperchaotic systems have been used practically in encryption,decryptionof gray-level and color images and shownexcellent results [6].But thetrade-offamong the performance and cryptanalysis metrics has always been a challenging subject.For example,a 4D hyperchaotic system Eq.(2) introduced by [17] has four system parametersa,b,c,dandeWhena= 0.98,b= 9,c= 50,d= 0.06 ande= 0.9 with initial conditionsx= 11.28,y=11.21,z= -9,w= 20.49 then the system shows hyperchaotic behavior and has 2 PLEs out of 4 LEs(0.00732, 0.004414, - 0.020359, - 0.898567).The initial conditions can be generated from the hash of the input image or DNA.The hyperchaotic behaviors of the system are shown in Fig.1

    Figure 1: Phase portraits of the dynamic system [17].(a) Projection onto the x-y plane (b) Projection onto the x-z plane (c) Projection onto the x-w plane (d) Projection onto the y-w plane

    This proposed scheme can be considered as an eligible candidate for practical applications as it outperforms some existing cryptosystems concerning encryption efficiency and resistance to statistical and differential attacks.

    2.2 DNA Digitization

    We all are made up of cells.Each cell contains a nucleus and the nucleus has a molecule (called DNA) containing the recipe of an organism’s life.Deoxyribo Nucleic Acid (DNA) is composed of two polynucleotide chains coiling around each other.Each polynucleotide is composed of many nucleotides and each nucleotide is composed of pyrimidines (Adenine (A), Guanine (G)), purines (Cytosine (C),Thymine (T)), sugar and phosphate group.Nucleotides on the same strand are interlinked through covalent bonds.And the nucleotides on the opposite strands are interlinked through hydrogen bonds according to base-pairing rules such thatAwith T andGwithC[18].DNAprovides a range of features and new directions for data confidentiality.The research on 7 point Hamiltonian path problem using DNA molecules in test tubes set a new direction towards DNA computing [19].DNA computing is a premature field but expectations are high due to its efficient molecular structure, massive parallelism,and huge storage capacity.DNA computing can be done in two ways: (a) by using biological DNA molecules in the laboratory, (b) by using digital DNA molecules available on genetic databases.The digital DNA may be divided into real and fake.The real digital DNA represents the real genomes of some organisms.And fake digital DNA is the supposed DNA sequence or it can be derived from some data (text or image) by using the DNA coding rules.The one advantage of digital DNA is that new genes can be designed by using software without chemical processes and accessing the specific physical DNA samples.The use of the current generation of computers by the researchers to analyze, interpret, and store digitized genetic information provided a new direction for computer science researchers towards cryptography.Consequently, many researchers proposed image ciphers based on DNA encoding, decoding, DNA operations,DNA based S-box,and DNA based secret keys.Similarly, jointingDNA operations with hyperchaotic systems improved the security and performance of ciphers [20,21].The DNA encoding and decoding rules and DNA operations [22,23] are shown in Tabs.1 and 2 respectively.

    Table 1: Eight kinds of DNA mapping rules

    2.3 CSSR

    Conservative Site-Specific Recombination (CSSR) is a mechanism of site-specific recombination,in which serine or tyrosine recombinase enzymes break theDNAat a specific site called recombination recognition site, and then the process of recombination is started at this site.CSSR is easier than homologous recombination.It is useful in gene conversions and transpositions.CSSR has three forms namely insertion, deletion, and inversion as shown in Fig.2.

    Table 2: DNA operations

    Figure 2: Mechanism of CSSR insertion, deletion, and inversion [24,25]

    The above mentioned CSSR mechanism can be applied in cryptography with little modifications while encrypting the images.The image pixels of interest are used as Recombination Recognition Sites/Sequence (RRS) for recombination purposes.The level of confusion can be enhanced by making it a part of encryption algorithms.For example, a plain image can be converted into DNA sequence by using DNA encoding rules, then apply DNA operations, apply the CSSR mechanism,generate hyperchaotic sequence (secret key), permute the resultant DNA sequence according to the hyperchaotic sequence, etc.

    2.4 S-Box Module

    S-box is a non-linear lookup table and is an essential module in the symmetric block ciphers such as Advanced Encryption Standard (AES), Triple-Data Encryption Standard (3DES), etc.Confusion through substitution in the symmetric ciphers is achieved through S-box.A good S-box abstruses the relationship between secret key and ciphertext and doesn’t give the statistical inferences to the cryptanalysts.Moreover, lower delay, higher efficiency, uniqueness of the values, and no correlation between the values in the S-box are also the indicators of a good S-box.S-box must pass the criteria of Bit Independence (BI), Differential Approximation Probability (DAP), Strict Avalanche Criterion(SAC), bijective, nonlinearity, and Linear Approximation Probability (LAP) [26].A trade-off remains among the S_box criteria metrics and we have to compromise some criteria.For example, maximal non-linearity clashes with balancedness, etc.

    S-boxes construction techniques based on Galois Fields (GFs), Galois Rings (GRs), left most semi-groups, linear functional transformation, symmetric groups, coset diagram, the action of the modular group, action of projective general and special linear group are some examples of algebraic structures utilization [27,28].A large number of S-box construction methods based on chaos and DNA have been proposed by various cryptography researchers in recent years.Chaotic S-boxes based on Fractional Rossler system, time-delay chaotic system, fractional-order chaotic Chen system, and Hénon map are proposed in [29-32].Hyperchaotic based S-boxes that satisfy the SAC, BI, DAP, and non-linearity are proposed in [33-35].Similarly, to the best of our literature review, DNA dependent S-boxes have also been proposed but rarely used in symmetric block ciphers.DNA-based S-box is generated in [36], in which the author used DNA operations (addition, subtraction, XOR) and search procedure to remove repeating values.S-box can be generated fromdifferent sources as shown in Fig.3.Some S-box design criteria are discussed as follows:

    Figure 3: Different sources S-box design

    2.4.1 Strict Avalanche Criterion

    Avalanche criterion (AC) or propagation criteria is a ratio of the number of flipped bits in the output to the total number of output bits.AC introduced by [37], is a worthwhile property of ciphers and S-boxes, in which a small change in input (a single bit change) creates a significant change in the output bits (e.g., half of the output bits get change).SAC must satisfy the completeness and avalanche criterion.S-box completeness means, each output bit depends on each input bit i.e., a single bit change will create a significant changein the outputbits.Higher-order SACs include morethan a1-bit change in the input.S-boxes must satisfy SAC without disturbing the non-linearity.A cipher or S-box that doesn’t fulfill the SAC has poor randomization and increases the probability for the cryptanalysts to make predictions about the input.Boolean functions that satisfy the high-order SACs are called bent functions or maximally non-linear functions i.e., they are hard to approximate.But one problem with the bent functions is that they are unbalanced.

    2.4.2 Non Linearity Test

    The S-boxes’non-linearity feature controls the vulnerability in cryptography, i.e., it resists linear attacks.The non-linearity of boolean function (as s-box is a boolean function that doesmappings from{0,1}m→{0,1}n) is also characterized by the least hamming distance between the boolean function’s output and set of all affine functions.The non-linearity of a boolean function Eq.(3), is computed as [38]:

    where ? belongs to the set of all affine functions andminDis the minimum hamming distance betweenfand ?.Walsh spectrum is normally used to quantify this test.

    2.4.3 Bijectiveness

    Bijective function has the property of both injective and surjective functions, i.e., there is a one to one correspondence and no member in the domain or co-domain is left out.It indicates the uniqueness of values in the S-box.There is no need of Bijectiveness in fiestel ciphers [39].

    2.4.4 Balancedness

    Balancedness means the balanced distribution of 0s and 1s, i.e., equal number of 0s and 1s distributed randomly.S-boxes with maximal non-linearity level are called vectorial bent functions but unluckily they lose the property of balancedness to great extent.To this end, [39] designed a better balanced S-box having maximal non-linearity that can resist linear and differential attacks to a large extent.

    3 Related Work

    For the design of encryption architecture and secret key generation mechanism in block ciphers,encryption efficiency with a reasonable security level has been the major concern of cryptosystem designers.In this regard, cryptographic researchers have proposed various color image encryption schemes.The researchers used chaotic systems, hyperchaotic systems, DNA operations, a variety of S-boxes (chaotic, hyperchaotic, algebraic structures, DNA, etc.) to accomplish the task of confusion and diffusion.In this respect, an encryption algorithm has been presented by [3] that is based on chaos and modified Advanced Encryption Standard (AES).The pros of this approach include the reduced time complexity, efficient row shifting and linear transformation mechanism, larger key space to resist brute force attacks, ideal entropy values, resistance against statistical attacks and shows a significant change in the ciphertext when a small change is made in the input values.The cons include the decrease in encryption efficiency when applied to color images.Digital image encryption that includes, Hill diffusion, modular chaotic maps followed by rows-column diffusion is presented in [40].The pros of this approach include the need for only two rounds of confusion and diffusion to attain the optimum security analysis parameter values with better encryption efficiency and resistance to statistical and differential attacks.Although, the proposed scheme encrypts only gray-level images but can be expanded to encrypt, decrypt the color images of larger sizes.The selection of prime number modulus is the main constraint of this approach.A real-time digital color image encryption scheme makes use of 3D Orthogonal Latin Squares (OLSs) for performing 3D permutation [41].The pros of this scheme that make it eligible for real-time use cases include fast encryption time, reasonable security, and resistance to common attacks.Although, certain privacy safeguarding policies exist at the organizational level, still defensible protection of a user’s data at various levels, i.e., data gathering, data accessing, reusing and data disclosure etc., have not been implemented to its spirit [42].The protection image data at these levels can be protected by the efficient cryptographic algorithms.

    In contrast, double encryption approach based on trigonometric chaotic map and XOR gives better results regarding security and speed.The security of this approach is achieved by means of circular shifts of rows and columns and connecting the XOR operation with modulo function [43].A novel color image cipher is proposed that exploits 3 S-boxes (each of size 8×8) and 3D-Arnold chaotic map for implementing confusion and diffusion respectively [44].The pros of this approach include the reduced time complexity, efficient substitutions followed by chaos based diffusion, larger key space to resist all types of known brute force attacks, entropy values closer to 8, uniformity in the histograms of encrypted images, resistance against statistical attacks and an average avalanche effect of 50%.The cons include the decrease in encryption efficiency when applied to color images of larger dimensions.A scheme proposed by [45], makes use of Logistic-Sine System (LSS) in creating an S-box and takes two rounds of substitution and one round of permutation.The LSS has a wider chaotic range and better chaotic properties.The cryptosystem has better potential in real-time gray-level image encryption scenarios and can resist the Chosen Plaintext Attack (CPA).Recently, a new gray image encryption scheme is proposed, which is based on Discrete Cosine Transform (DCT), 1D chaotic map for pixel scrambling, and compressive sensing technique based on 3D Lorenz map [46].It can resist brute force attacks and has the fastest encryption time for gray-level images as it reduces the plain image size and then encrypts the reduced image.A novel encryption scheme based on SHA-512, Elliptic Curve Cryptography (ECC), and the 4D hyperchaotic system is proposed in [47].In this scheme, multiple images of the same size are converted into the 3D cube, then a hash is generated from the 3D cube,ECC based on the hash is employed to generate a secret key then a 4D hyperchaotic system is applied for scrambling the 3D image to get an encrypted version.This proposed scheme can be considered as an eligible candidate for practical applications as it outperforms with some existing cryptosystems with respect to encryption time and resistance to statistical and differential attacks.Combining high dimensional hyperchaotic system with DNA operations can give strength to the cryptosystems.In this connection, a safe and reliable cryptosystem based on 6D hyperchaotic system coupled with DNA coding and DNA operations (addition, subtraction, XOR and same or) is proposed in [48].A novel approach consisting of permutation-substitution, complement and multiple DNA Fusion Operations(DFOs) is proposed in [49].This approach uses three chaotic systems (Lorenz, Henon, Logistic) for performing permutation-substitution.The DFO in this approach refers to the fusion of the DNA image layers with a random DNA sequence to form a third DNA sequence.Some DFOs are listed in Tab.3.

    Table 3: Different kinds of DNA fusion operations [49]

    S-box is an essential component in the cryptosystems such as Advanced Encryption Standard(AES), Triple-Data Encryption Standard (3DES), etc.It is a non-linear lookup table and is a source of creating confusion through substitutions.S-boxes by using algebraic structures, chaos and DNA have designed by various researchers.In this respect, a DNA based S-box is designed in [14], in which two DNA segments (downloaded from gen-bank) are used to construct S-box.This S-box passed the S-box criteria effectively.Another secure S-box based on DNA codons, mathematical operations and XOR operations is designed in [36].

    4 Proposed Approach

    The method for encrypting image data has five phases (see the general model framework in Fig.4):

    1.Loading and splitting image data.

    2.Quadruple DNA mapping.

    3.DNA based S-box generation, substitution, and apply Conservative Site Specific Recombination (CSSR).

    4.Computing the secret key using 4D-hyperchaos.

    5.Scrambling.

    Figure 4: Flowchart of the encryption process

    The details of these phases are given in Sections 4.1 to 4.5 and the algorithm steps are given in Algorithms 1-4 respectively.

    Algorithm-1: DSHC-Encryption Input: A plain color image (m×n), DNA sequence, initial conditions for hyper chaotic system.Output: An encrypted image (m×n).Step 1: Load and split color image into RGB components.(Continued)

    Algorithm-1: Continued Step 2: Each pixel value of input image (RGB components) is mapped to quadruple DNA sequence.(Section 4.1)Step 3: Generate three S-boxes containing quadruple DNA sequences and perform substitution.Step 3.1: Perform substitution.(Section 4.2)Step 3.2: Apply CSSR to the output of step 3.1.(Section 4.3)Step 4: Compute initial conditions by the secret key sK.The sK is derived from external key eK and hash.(Section 4.4).Step 4.1: Create the secret key from 4D hyperchaotic system by using initial conditions.(Section 4.4).Step 5: Encrypt the output of step 3.2 with the secret key to produce the encrypted image.(Section 4.5)

    Algorithm-2: DSHC-Decryption Input: An encrypted image (m×n).Output: A decrypted image (m×n).Steps: Inverse steps of the DSHC-Encryption are carried out in the reverse order.

    4.1 DNA Encoding

    The input image is decomposed into three components called red, green and blue components.The size of each component ism×n.The pixel value of each component is converted into 8-bit binary equivalent.The 8-bit binary equivalent of each pixel value is mapped to quadruple DNA sequence according to the rules shown in Tab.4, that meet the Watson-Crick complement rule.The process is repeated for all the pixels of all the components and DNA image DNA_I is obtained.

    Table 4: DNA mapping rules

    4.2 Generation of DNA Based S-box

    DNA sequence taken from NCBI dataset is large enough to generate three S-boxes each of size 16×16.The mean intensity value of an input image is used for the generation of three DNA based S-boxes.For example, a DNA sequence called‘sequence_HIV-1 isolate 196JL2007P2B5 from USA defective genome’ having length of 183015 is used for the generation of three S-boxes calledDNA_1_sbox,DNA_2_s-box andDNA_3_s-box to substitute the pixel values of red, green and blue component of DNA image DNA_I.An example of DNA_1_s-box is shown in Fig.5.The algorithm steps to generate DNA based S-box are as follows:

    Algorithm-3: DNA S-box generation Input: Color image and binary file containing DNA sequences of any organism.Output: Three DNA S-boxes.Step 1.Decompose color image into red, green and blue components.Step 2.Calculate mean intensity values of red, green and blue components (mr,mg,mb).Step 3.Start the search from location mr in the downloaded genome (binary file containing DNA sequences)tofindthe256quadruple DNAsequenceswithdistinctdecimalvalues.Applytheprocedure of [14] to produce DNA_1_s-box.Step 4.Input the values of mg and mb calculated in step 3 and repeat step 4 to produce DNA_2_s-box and DNA_3_s-box.Forexample,tosubstitutetheredcomponentof DNA_I,eachpixel(quadruple DNAsequence)issplit intotwoparts.Thefirstpartindicatesrowandsecondpartindicatescolumn.Forexample,if DNA_I(I,j)=GCCT, whose binary equivalent is 01101011, the first four bits indicate row number and second fourbitsindicatecolumnnumberi.e.,0110=6and1011=11.Therefore,quadruple DNAsequencein DNA_1_s-box at location (6, 11) =TAAG is picked and substituted.Therefore, DNA_I(I, j)=GCCT is substituted with TAAG.Similarly, the green and blue components of DNA_I get substituted with DNA_2_s-box and DNA_3_s-box respectively.The output of the DNA based S-box is substituted DNA (Sub_DNA_I).

    Figure 5: DNA based S-box (DNA_1_s-box) generated from DNA sequence taken from GenBank database

    4.3 CSSR Proposal

    Conservative Site Specific Recombination (CSSR) is also applied on the substituted DNA(Sub_DNA_I)receivedfrom DNAbased S-boxes.DNA(Sub_DNA_I) received fromDNAbased S-boxes.is ready for site specific recombination and mutation.The Site Specific Recombination also called Conservative Site Specific Recombination (CSSR) is different from the homologous recombination process.In CSSR the enzyme such as serine recombinase is used to cleave the specific site.The CSSR has of three types called insertion, deletion and inversion.Here we have used the inversion CSSR to be applied on the specific sites of output DNA to produce stage 1 encrypted image in the form of DNA (S1_DNA_eI).In inversion CSSR the specific site of DNA strand can get be cleaved by DNA key enzyme and inverted to 1800as shown in Fig.6.

    Figure 6: CSSR inversion mechanism

    4.4 Computing the Secret Key and Initial Conditions

    External keyeKof 256 bit is extracted from DNA sequence taken from NCBI dataset.For example, we downloaded a DNA sequence called‘sequence_HIV-1 isolate 196JL2007P2B5 from USA defective genome’(DS1) having length of 183015.The mean intensity value of input image is used as a starting index to cut the DNA sequence from this location having length of 128 as shown in Fig.7.For example, in the Fig.7, the mean intensity value of an input image is 3 which is used as a starting index in the DS1 vector.DNA sequence from this location having length of 128 is copied and mapped into binary stream equivalent to 256 bit called aseK.The mapping is done by choosing any one of the rule given in the Tab.4.MD5 ofeKand plain image is calculated and is given to SHA-256 thus giving 256-bit hash valuehv.TheeKis combined withhvusing XOR operation thus producing secret keysK=eK⊕hv.In order to create the initial conditionsx(0),y(0),z(0),u(0) for the 4D hyperchaotic system,wedividesKinto32subgroups where each subgroupsg,is comprised of 8 bits and is expressed as follows:

    Figure 7: Computing the mean intensity value and DNA sequence length extraction

    sK= {sg1,sg2,...,sg32}Now the initial conditions usingsKare computed as follows:

    4.5 Final Encryption

    Now, initial conditions generated in Section 4.4 and the control parameters are input to the 4D hyperchaotic system to generate another key called DNA based keyDNA-K.Encryption steps based onDNA-Kto encrypt the S1_DNA_eI are as follows:

    Algorithm-4: Final Encryption Input: Initial conditions, control parameters.Output: Encrypted Image.Step 1.Solve 4D Hyperchaotic System by using initial conditions and control parameters to produce DNA - K.Step 2. Key(i)= mod(Co+ DNA - K(i),256)Step 3. CI(i)= XOR(S1_DNA_el(i),Key(i))Step 4. Key(i)= mod(mCIi+ DNA - K(i),256)Step 5. CI(i)= XOR(CI(i),Key(i))

    5 Results and Analysis

    The experiments to test the security, robustness and efficiency of proposed algorithm are reported in this section.All the experiments are conducted in Matlab R2015a installed on windows 7 operating system, 4 GB RAM, Intel (R) Core (TM) i3-4010 CPU @1.70 GHz.The plain color images lena(512×512),baboon(512×512),peppers(512×512)andcovid-19-pneumonia(841×789)takenfrom CVG-UGR and radiopaedia.org, are used as test images.The file size of the images lena, baboon,peppers and covid-19-pneumonia are 768 KB, 768 KB, 284 KB, and 200 KB respectively.

    5.1 Visual Analysis

    Visual analysis of the proposed algorithm is shown in Fig.8, while the PSNR values are given in Tab.5.The PSNR value of∞between plain and decrypted image indicates that the decrypted image is identical copy of plain image while the lower PSNR values between plain and encrypted image indicates that the difference between the plain and encrypted image is much greater and are not identical and difficult to identify.

    5.2 Security Analysis

    Security analysis such as key sensitivity, key space, statistical analysis, differential attack analysis,entropy analysis and robustness analysis are reported in this section.

    Figure 8: (Continued)

    Figure 8: Visual results of proposed scheme.(a) Plain lena, (b) Encrypted lena, (c) Decrypted lena, (d)Pain peppers, (e) Encrypted peppers, (f) Decrypted peppers, (g) Plain baboon, (h) Encrypted baboon,(i) Decrypted baboon

    Table 5: PSNR comparison between Plain and Encrypted (P-E), and Plain and Decrypted (P-D).(All images are (512×512))

    5.2.1 Key Space Analysis

    The hyperchaotic system in this scheme uses four state variables as the original symmetric key which is represented by double precision real number upto 15 decimal places.We have also created an external key of 256 bit derived from DNA sequence.Hence, the key space comes out as((1015)4= 1060~= 2200)×2256= 2456which is strong enough to resist all kinds of brute force attacks[51,7].

    5.2.2 Key Sensitivity Analysis

    We tested the sensitivity of secret key of proposed scheme by encrypting the image (Covid-19-pneumonia) with the secret key and decrypting it with slight modifications in the secret key.The visual results shown in Fig.9 clearly indicate absence of a relation between the plain color image and the decrypted image.We denote the plaintext byP, the key by,and cipher image by...,...,Key sensitivity (kS), computed using the hamming distance [6] is given in Eq.(4):

    whereC1andC2are given by

    Figure 9: Key sensitivity test for the image (Covid-19-pneumonia): (a) The plain image, (b) The encrypted image, (c) The decrypted image with different initial conditions, (d) The decrypted image with same initial conditions

    kS= 0.5 indicates a good cipher [6].K1andK2havenbit difference.Figs.9 and 10 show the key sensitivity results for DSHC-v1.0.Under this test, different images (Lena, Baboon, Peppers, Panda)are encrypted by alteringnbits in the secret key.The plain image Fig.9a is encrypted by using the secret key to produce an encrypted image i.e., Fig.9b.A slight modification (1 or 2-bit change) is done in the secret key.Then Fig.9b is tried to decrypt with the slightly modified key that results in Fig.9c which is completely unrecognizable by the Human Visual System.The Fig.9d is the decrypted image which is decrypted by the unmodified (original secret key) which is the replica of Fig.9a and is completely recognizable.In the Fig.10, we can observe thatkSapproaches to 0.497 when the number of altered is below 3 and it approaches to 0.5 when the number of altered bits becomes greater than 3.AskS= 0.5 indicates a good cipher [6], thus DSHC-encryption comes in the umbrella of a good ciphers and is highly sensitive to minor changes in the key.

    Figure 10: Key sensitivity for the image (Covid-19-pneumonia)

    5.2.3 Histogram Analysis

    It is a statistical analysis.Histogram variance and histogram have inverse relationship i.e., smaller histogram variance gives high uniformity in the histograms and vice versa and more uniformity in the histograms indicates the more robustness against statistical attacks [52].Encrypted image’s histogram shows uniform distribution as compared to the plain image’s histogram.Histograms of the plain color images and encrypted color images Lena and Covid-19-pneumonia are shown in Fig.11.The Figs.11a and 11b 3rdrow clearly shows the uniform distribution of an encrypted image.Though not enough,but still it provides resistance against statistical attacks based on histogram.Additionally, the Pearson’s chi-squared statistic can be computed to identify the histogram’s uniformity of an encrypted image.Ouraverageχ2statistic(258.0026))derived from hundred encrypted images’ histograms is less than the criticalvalue((255) = 293.2478.Therefore,the nullhypothesisHoi.e., (histogram of the encrypted image bears uniform distribution) is accepted.

    5.2.4 Correlation Coefficient

    The correlation of digital image whether plain or encrypted, is measured between the pixels in vertical, horizontal and diagonal directions.A high correlation exists among the pixels of plain color images while highly secured ciphers have zero or little correlation among the adjacent pixels [53].In order to compute the correlation, 10,000 random pairs of adjacent pixels are selected in the horizontal,vertical and diagonal directions.Tab.6, lists the reduced correlation results of encrypted images (Lena,Panda, Baboon and Peppers) along with three directions, i.e., vertical, horizontal and diagonal while correlations plots for the plain and the encrypted image of Lena are shown in Fig.12.The Figs.12a,12c, 12e represent the positive correlation plots of plain image along vertical, horizontal and diagonal direction whereas Figs.(b, d, f) clearly indicate no correlation among adjacent pixels along vertical,horizontal and diagonal directions.

    Figure 11: (Continued)

    Figure 11: (a) Histograms of Plain-peppers image and Cipher-peppers image (b) Histograms of Plaincovid-19-pneumonia-paediatric image and Cipher-covid-19-pneumonia-paediatric image

    Table 6: The correlation coefficients comparison of DSHC-v1.0with the existing results.All the images are (512×512)

    5.2.5 Information Entropy

    Entropy is a thermodynamics quantity that measures the degree of disorder or randomness within the system.The degree of randomness can be computed within the encrypted image.In an 8-bit image,a value closer to 8 indicates the ideal score of an encrypted image.Entropy can be computed by Eq.(5)[55]:

    whereintensity(CIi) is theithintensity value of an encrypted image.p(·) is the probability function andk= 8 for the gray level image.Tab.7, shows the entropy results closer to 8, hence the encrypted image has maximal randomness thus leading to insignificant information leakage.

    Figure 12: Correlation plots color image Lena.(a) Horizontal direction plain image, (b) Horizontal direction encrypted image, (c) Vertical direction plain image, (d) Vertical direction encrypted image,(e) Diagonal direction plain image, (f) Diagonal direction

    Table 7: The Information entropy comparison of DSHC-v1.0 with the existing works, whenever data is available

    Table 7: Continued

    5.2.6 Differential Attack Analysis

    If a 1-bit or 2-bit change in the plain image can lead to a significant change in the encrypted image,then the proposed scheme is considered resistant to differential attacks.In this regard, the Number of Pixel Changing Rate (NPCR) and Unified Average Changing Intensity (UACI) quantitative tests are used to evaluate the differential attack [50-59].For an image (M×N), NPCR and UACI [60] are calculated as:

    whereCI1(i,j),CI2(i,j) are the encrypted versions of plain image before and after n bit change in the plain image at location (i,j) andM×Nis the height and width of plain image.The average values of NPCR and UACI (multiple runs) listed in Tab.8 are comparable to existing results and the improved results are illustrated with bold.Therefore, the proposed scheme shows the resistance against the differential attacks.

    Table 8: The NPCR and UACI comparison of DSHC-v1.0.All images are (512×512)

    5.2.7 Robustness Analysis

    Occlusion and salt & pepper noise are used to test the robustness of DSHC-v1.0.The PSNR between plain and decrypted images is used to quantify the quality of the decrypted images after applying attacks.The PSNR can be defined by [62]:

    whereMSE(PI,DI*) =andPI,DI*,MAXare the plain image, decrypted image after the attack, maximum pixel intensity in the plain image respectively andM×Nis the dimension of plain image.Quantitative analysis in terms of PSNR and visual analysis are given in Tab.9 and Fig.13 respectively.Whereas, the occlusion attacks on encrypted images and their recovery are shown in Fig.14.The occluded part is not recovered while the freed part is recovered without adding noise.

    Table 9: Noise tests under different parameters.All images are of lena (512×512)

    Figure 13: Salt & pepper noise analysis.(a)-(c) Lena encrypted attacked with 0.005, 0.05 and 0.1 noise,(d)-(e) Corresponding decrypted of (a)-(c)

    5.3 Performance Analysis

    With the improvement of trend setting innovations in information security, designing the secure ciphers along with the consideration of encryption time, decryption time, and encryption efficiency remains one of the key problems.Therefore, along with security considerations, encryption and decryption time of an image cipher for a real life application must be considered.In this respect, the empirical and theoretical are the 2 ways for assessing the time complexity of a cipher.In empirical evaluation, algorithm is run on some platform and execution time is observed or measured through stopwatch or any other tool.Whereas, in theoretical assessment, asymptotic notation is commonly used to assess the computational complexity.In this research work, we are employing empirical assessments.

    The RGB image of Lena and peppers with different dimensions (128×128, 256×256, 512×512)are taken as input.The average time (10 times execution of an algorithm) for encryption and decryption is computed.Based on the average encryption time of images, the encryption efficiency [63] in terms of encryption throughput (ENC-T) and a number of cycles per byte (NCB) is calculated by:

    wherePIsize,ET,CPUspeedare the plain image size in bytes, encryption time in seconds, and processor speed in hertz respectively whileNSis the number of cycles per byte.

    Encryption and decryption time with encryption efficiency is listed in Tab.10.It can be observed that the encryption time (ET) and decryption time (DT) increases with the increase of RGB image sizes and encryption efficiency is also better for large size images.

    Table 10: Encryption time, decryption time and encryption efficiency

    6 Conclusions and Future Directions

    In this research study, we proposed a genuine cipher for the encryption of color images of different dimensions and sizes by using the SHA-256, MD5, and hyperchaotic system jointed with DNA operations and DNA-based S-box.This scheme takes hardly less than a second for the encryption of color image up to the dimensions of 256×256.The proposed scheme’s larger keyspace can resist brute force attacks.The scheme showed better security analysis results such as entropy, NPCR, UACI,correlation coefficients, PSNR, histogram, and key sensitivity.Thus the proposed scheme is more effective in terms of security and efficiency for encrypting color images.The proposed solution doesn’t work for binary,DICOMand gray scale images.In addition, our proposed cipher outperforms existing ciphers in terms of gray-level co-occurrence matrix evaluations and key sensitivity.The performance of proposed cipher is consistent while changing color image sizes.

    The future work includes its improvement in terms of encryption efficiency for encrypting/decrypting medical as well as larger color images.Escalation towards the encryption of selected faces from the images is also included in future work.

    Funding Statement:This work was supported in part by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education under Grant NRF-2019R1A2C1006159 and Grant NRF-2021R1A6A1A03039493.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    精品人妻视频免费看| 亚洲人成网站在线播| 日本免费a在线| 久久久成人免费电影| 久久99精品国语久久久| 大陆偷拍与自拍| 亚洲经典国产精华液单| a级一级毛片免费在线观看| 亚洲av在线观看美女高潮| 免费观看性生交大片5| 国产成人免费观看mmmm| 国产精品一区二区性色av| 久久久久久久久中文| 欧美丝袜亚洲另类| av免费在线看不卡| 成人毛片60女人毛片免费| 欧美激情久久久久久爽电影| 精品久久久久久久久久久久久| 亚洲精品乱码久久久v下载方式| 丝袜美腿在线中文| 亚洲国产精品专区欧美| 久久久久久久久久人人人人人人| 国产伦理片在线播放av一区| 亚洲成人久久爱视频| 69人妻影院| 国产av不卡久久| 亚洲欧美成人综合另类久久久| 久久久午夜欧美精品| 1000部很黄的大片| 高清午夜精品一区二区三区| 色5月婷婷丁香| 在线免费观看不下载黄p国产| 91久久精品国产一区二区三区| www.色视频.com| 午夜福利在线观看免费完整高清在| 亚洲图色成人| 亚洲人与动物交配视频| 免费观看无遮挡的男女| 国产黄a三级三级三级人| 亚洲熟女精品中文字幕| 夫妻性生交免费视频一级片| 久久这里有精品视频免费| 在线观看人妻少妇| 久久久久久久国产电影| 老司机影院成人| 91精品伊人久久大香线蕉| 乱人视频在线观看| 免费电影在线观看免费观看| 亚洲欧美精品专区久久| 三级男女做爰猛烈吃奶摸视频| 国产午夜精品论理片| 成人毛片60女人毛片免费| 亚洲精品日本国产第一区| 免费观看性生交大片5| 国产国拍精品亚洲av在线观看| 99热网站在线观看| 精品久久久久久电影网| 九九久久精品国产亚洲av麻豆| 久久国产乱子免费精品| 97人妻精品一区二区三区麻豆| 国产熟女欧美一区二区| 国产 一区 欧美 日韩| a级毛色黄片| 99久久精品国产国产毛片| 偷拍熟女少妇极品色| 色吧在线观看| 欧美最新免费一区二区三区| 国产在线男女| 熟妇人妻不卡中文字幕| 少妇猛男粗大的猛烈进出视频 | 亚洲人与动物交配视频| 在线免费十八禁| 男插女下体视频免费在线播放| 91久久精品国产一区二区三区| 久久精品久久久久久噜噜老黄| 内射极品少妇av片p| 赤兔流量卡办理| 精品亚洲乱码少妇综合久久| 精品久久久久久久久久久久久| 欧美极品一区二区三区四区| 国产视频内射| 日韩一区二区三区影片| 嘟嘟电影网在线观看| 乱系列少妇在线播放| 禁无遮挡网站| 国产精品国产三级国产专区5o| 中文字幕亚洲精品专区| 97精品久久久久久久久久精品| 亚洲av电影在线观看一区二区三区 | 观看美女的网站| 亚洲av福利一区| 久久久成人免费电影| 国产亚洲5aaaaa淫片| 高清午夜精品一区二区三区| 免费看光身美女| 久久久久性生活片| 精华霜和精华液先用哪个| av在线蜜桃| 人人妻人人澡人人爽人人夜夜 | 夜夜看夜夜爽夜夜摸| 不卡视频在线观看欧美| 国产淫语在线视频| 观看免费一级毛片| 免费黄网站久久成人精品| 亚洲欧美一区二区三区国产| 毛片一级片免费看久久久久| 色哟哟·www| 亚洲精品色激情综合| 26uuu在线亚洲综合色| 2022亚洲国产成人精品| 亚洲激情五月婷婷啪啪| 国产有黄有色有爽视频| 大香蕉久久网| 80岁老熟妇乱子伦牲交| 中文字幕久久专区| 久久久久久久国产电影| 国产高清三级在线| 久久精品熟女亚洲av麻豆精品 | 免费看不卡的av| 国产在视频线在精品| 欧美 日韩 精品 国产| 51国产日韩欧美| 一区二区三区免费毛片| 欧美一区二区亚洲| 淫秽高清视频在线观看| 久久综合国产亚洲精品| 91久久精品国产一区二区三区| 激情 狠狠 欧美| 男女国产视频网站| 久久久久久国产a免费观看| 亚洲av免费在线观看| 一级毛片 在线播放| 精品国产三级普通话版| av国产免费在线观看| 欧美极品一区二区三区四区| 国产精品久久久久久av不卡| 一夜夜www| 国产精品爽爽va在线观看网站| 亚洲内射少妇av| 亚洲av福利一区| 国产欧美另类精品又又久久亚洲欧美| 亚洲av电影在线观看一区二区三区 | 成人欧美大片| 久久这里有精品视频免费| 黄色欧美视频在线观看| 国产大屁股一区二区在线视频| 亚洲图色成人| 涩涩av久久男人的天堂| 丝瓜视频免费看黄片| 国产精品蜜桃在线观看| 中文字幕制服av| 啦啦啦啦在线视频资源| 免费黄色在线免费观看| 九色亚洲精品在线播放| 97精品久久久久久久久久精品| 亚洲国产精品成人久久小说| 免费日韩欧美在线观看| 五月天丁香电影| 国产片特级美女逼逼视频| 2021少妇久久久久久久久久久| 亚洲国产欧美网| 9191精品国产免费久久| 精品少妇内射三级| 丝袜美足系列| 亚洲国产欧美网| 一级毛片我不卡| 高清欧美精品videossex| 夜夜骑夜夜射夜夜干| 狂野欧美激情性bbbbbb| 国产精品久久久久久精品古装| 一级a爱视频在线免费观看| 成年人午夜在线观看视频| 欧美日韩精品网址| 99久国产av精品国产电影| 高清欧美精品videossex| 国语对白做爰xxxⅹ性视频网站| 国产免费一区二区三区四区乱码| 国产精品久久久久久av不卡| 校园人妻丝袜中文字幕| av卡一久久| 热re99久久国产66热| 亚洲欧美一区二区三区久久| 9191精品国产免费久久| 不卡av一区二区三区| 2021少妇久久久久久久久久久| 热99国产精品久久久久久7| 亚洲国产精品成人久久小说| 91成人精品电影| 在线观看人妻少妇| 精品一区二区三卡| 亚洲国产看品久久| 午夜福利,免费看| 国产伦理片在线播放av一区| 亚洲第一青青草原| 91精品三级在线观看| 成人免费观看视频高清| 欧美最新免费一区二区三区| 丝袜美腿诱惑在线| 高清黄色对白视频在线免费看| 男女下面插进去视频免费观看| 久久久亚洲精品成人影院| 欧美日韩成人在线一区二区| 搡女人真爽免费视频火全软件| 欧美bdsm另类| 亚洲国产av新网站| av免费在线看不卡| 久久ye,这里只有精品| 人人澡人人妻人| 久久韩国三级中文字幕| 精品久久久精品久久久| 国产片特级美女逼逼视频| 侵犯人妻中文字幕一二三四区| 久久久精品区二区三区| 久久狼人影院| 久久久久国产网址| 亚洲欧美成人精品一区二区| 一个人免费看片子| 亚洲第一av免费看| 男女无遮挡免费网站观看| 18+在线观看网站| 国产探花极品一区二区| 久久久久久久久久人人人人人人| 久久久亚洲精品成人影院| 2022亚洲国产成人精品| 婷婷色综合大香蕉| 一级毛片 在线播放| 免费久久久久久久精品成人欧美视频| 在线观看国产h片| 久久韩国三级中文字幕| 婷婷色综合www| 一级a爱视频在线免费观看| 蜜桃国产av成人99| videos熟女内射| 久久精品久久久久久噜噜老黄| 免费观看a级毛片全部| 国产成人91sexporn| 欧美精品国产亚洲| 热re99久久国产66热| www日本在线高清视频| 久久久久国产精品人妻一区二区| 亚洲国产欧美日韩在线播放| 国产免费又黄又爽又色| 少妇的逼水好多| 欧美日本中文国产一区发布| 久久国产精品大桥未久av| av免费观看日本| 亚洲成国产人片在线观看| 中文字幕最新亚洲高清| 欧美日韩国产mv在线观看视频| 久久久久精品性色| 最近的中文字幕免费完整| 亚洲精品中文字幕在线视频| 亚洲伊人色综图| 国产精品国产av在线观看| 在线天堂中文资源库| 亚洲欧美精品自产自拍| 青草久久国产| 精品久久蜜臀av无| 美女xxoo啪啪120秒动态图| 久久午夜福利片| 国产成人aa在线观看| 国产无遮挡羞羞视频在线观看| 女人被躁到高潮嗷嗷叫费观| 久久久a久久爽久久v久久| 亚洲人成网站在线观看播放| 久久久国产精品麻豆| 天天躁夜夜躁狠狠久久av| 99热国产这里只有精品6| 亚洲情色 制服丝袜| 亚洲精品中文字幕在线视频| 亚洲,欧美精品.| 最近中文字幕2019免费版| 91国产中文字幕| 久久久久视频综合| 日韩成人av中文字幕在线观看| 日本欧美国产在线视频| 欧美亚洲日本最大视频资源| 在线观看一区二区三区激情| 91精品三级在线观看| 寂寞人妻少妇视频99o| 最新中文字幕久久久久| 国产男女内射视频| 美女福利国产在线| 国产精品99久久99久久久不卡 | 欧美 亚洲 国产 日韩一| 一区二区三区激情视频| 尾随美女入室| 久久99蜜桃精品久久| av网站在线播放免费| 我要看黄色一级片免费的| 啦啦啦啦在线视频资源| av在线老鸭窝| 欧美+日韩+精品| 五月开心婷婷网| 日产精品乱码卡一卡2卡三| 18禁裸乳无遮挡动漫免费视频| 春色校园在线视频观看| 中文字幕亚洲精品专区| 人妻一区二区av| 男女边摸边吃奶| 久久久久国产一级毛片高清牌| 久久亚洲国产成人精品v| 中文字幕另类日韩欧美亚洲嫩草| 青春草亚洲视频在线观看| 亚洲综合色惰| 日韩成人av中文字幕在线观看| 亚洲国产色片| tube8黄色片| 国产一区二区激情短视频 | 国产免费福利视频在线观看| 观看av在线不卡| 成人18禁高潮啪啪吃奶动态图| 在现免费观看毛片| 国产乱人偷精品视频| 国产成人精品在线电影| 亚洲av欧美aⅴ国产| 日日撸夜夜添| 99久国产av精品国产电影| 久久精品国产亚洲av天美| 亚洲精华国产精华液的使用体验| 日韩熟女老妇一区二区性免费视频| 国产极品天堂在线| 国产亚洲欧美精品永久| 99久久综合免费| 久久久久国产精品人妻一区二区| 欧美在线黄色| 欧美日韩综合久久久久久| 日本vs欧美在线观看视频| 免费观看性生交大片5| 久久人人爽人人片av| 精品国产一区二区三区四区第35| 欧美日韩综合久久久久久| 高清av免费在线| 麻豆精品久久久久久蜜桃| 亚洲成av片中文字幕在线观看 | 久久久久精品久久久久真实原创| 国产男女内射视频| 2021少妇久久久久久久久久久| 成年av动漫网址| 成人亚洲精品一区在线观看| 91aial.com中文字幕在线观看| 水蜜桃什么品种好| 精品亚洲成国产av| 香蕉丝袜av| 桃花免费在线播放| 91精品国产国语对白视频| 精品99又大又爽又粗少妇毛片| 欧美黄色片欧美黄色片| 91午夜精品亚洲一区二区三区| 亚洲精品乱久久久久久| 夜夜骑夜夜射夜夜干| 精品亚洲成国产av| 午夜福利在线免费观看网站| 日本wwww免费看| 美女福利国产在线| 亚洲精品国产av蜜桃| 久久久久精品人妻al黑| 哪个播放器可以免费观看大片| 中文字幕最新亚洲高清| 一级黄片播放器| 国产午夜精品一二区理论片| 一级,二级,三级黄色视频| 2018国产大陆天天弄谢| av不卡在线播放| 久久久久久人人人人人| 亚洲视频免费观看视频| 母亲3免费完整高清在线观看 | 9色porny在线观看| 在线免费观看不下载黄p国产| 日韩一区二区视频免费看| 亚洲精品aⅴ在线观看| 有码 亚洲区| 国产精品免费视频内射| 亚洲精品久久成人aⅴ小说| 2022亚洲国产成人精品| 大片电影免费在线观看免费| 亚洲四区av| 天天影视国产精品| 亚洲欧美一区二区三区黑人 | 久热久热在线精品观看| 欧美日本中文国产一区发布| 日韩中字成人| 国产1区2区3区精品| 亚洲伊人色综图| 国产在线免费精品| 久久这里只有精品19| 精品少妇内射三级| 国产精品久久久久久久久免| 美女高潮到喷水免费观看| 日韩一卡2卡3卡4卡2021年| 国产精品久久久久久av不卡| 十八禁高潮呻吟视频| 一级毛片黄色毛片免费观看视频| 18禁裸乳无遮挡动漫免费视频| 美女国产高潮福利片在线看| 在线观看免费视频网站a站| 亚洲欧美精品自产自拍| 国产精品人妻久久久影院| 丰满少妇做爰视频| 国产色婷婷99| 亚洲一码二码三码区别大吗| 欧美少妇被猛烈插入视频| 三级国产精品片| av有码第一页| 日本vs欧美在线观看视频| 热99国产精品久久久久久7| 久久精品熟女亚洲av麻豆精品| 一级,二级,三级黄色视频| 国产精品女同一区二区软件| 妹子高潮喷水视频| 国产在线视频一区二区| 成人国产麻豆网| 我要看黄色一级片免费的| 久久精品aⅴ一区二区三区四区 | 又大又黄又爽视频免费| 一本大道久久a久久精品| 巨乳人妻的诱惑在线观看| 亚洲欧美精品自产自拍| 欧美另类一区| 久久久久久免费高清国产稀缺| 黄色一级大片看看| av片东京热男人的天堂| 免费日韩欧美在线观看| av在线老鸭窝| 午夜福利网站1000一区二区三区| 色哟哟·www| 一级黄片播放器| 欧美+日韩+精品| 免费在线观看黄色视频的| 美国免费a级毛片| 国产淫语在线视频| 亚洲人成电影观看| 日本爱情动作片www.在线观看| 午夜精品国产一区二区电影| 精品国产乱码久久久久久男人| 国产激情久久老熟女| 婷婷色av中文字幕| 国产男女超爽视频在线观看| 中文精品一卡2卡3卡4更新| 亚洲一区中文字幕在线| av视频免费观看在线观看| 国产精品国产三级专区第一集| 亚洲精品久久午夜乱码| 韩国精品一区二区三区| 99精国产麻豆久久婷婷| av网站在线播放免费| 少妇 在线观看| 黄色一级大片看看| 色哟哟·www| 国产深夜福利视频在线观看| 中文天堂在线官网| 午夜日韩欧美国产| 国产日韩欧美亚洲二区| 麻豆av在线久日| 深夜精品福利| 美女大奶头黄色视频| 卡戴珊不雅视频在线播放| 18禁国产床啪视频网站| 成年女人毛片免费观看观看9 | 精品久久久久久电影网| 午夜福利影视在线免费观看| 国产一区二区三区综合在线观看| 国产激情久久老熟女| 亚洲av在线观看美女高潮| 国产女主播在线喷水免费视频网站| 色视频在线一区二区三区| 亚洲国产毛片av蜜桃av| 日本午夜av视频| 99久久精品国产国产毛片| 伦理电影大哥的女人| 国产精品三级大全| 女的被弄到高潮叫床怎么办| 男女下面插进去视频免费观看| xxxhd国产人妻xxx| 欧美av亚洲av综合av国产av | 寂寞人妻少妇视频99o| 我的亚洲天堂| 精品亚洲乱码少妇综合久久| 如日韩欧美国产精品一区二区三区| 久久精品夜色国产| 亚洲欧美精品自产自拍| 中文字幕av电影在线播放| 欧美黄色片欧美黄色片| 高清av免费在线| 国产亚洲精品第一综合不卡| 日本av免费视频播放| 一本大道久久a久久精品| 欧美激情 高清一区二区三区| 国产一区二区在线观看av| 97人妻天天添夜夜摸| 国产精品.久久久| 高清av免费在线| 中文字幕亚洲精品专区| av网站免费在线观看视频| 黄色怎么调成土黄色| 免费少妇av软件| 中文欧美无线码| 女性被躁到高潮视频| 欧美日本中文国产一区发布| 精品午夜福利在线看| 97在线人人人人妻| 日本午夜av视频| 男人爽女人下面视频在线观看| 女人久久www免费人成看片| 有码 亚洲区| 亚洲伊人色综图| 汤姆久久久久久久影院中文字幕| 咕卡用的链子| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 国产精品亚洲av一区麻豆 | 美女视频免费永久观看网站| 欧美激情高清一区二区三区 | 桃花免费在线播放| 少妇 在线观看| 欧美日韩综合久久久久久| 国产精品一区二区在线不卡| 亚洲国产精品国产精品| 亚洲av国产av综合av卡| 黄色毛片三级朝国网站| 在线观看一区二区三区激情| 两性夫妻黄色片| 免费在线观看视频国产中文字幕亚洲 | 精品午夜福利在线看| 一边摸一边做爽爽视频免费| 叶爱在线成人免费视频播放| 久久久精品94久久精品| 亚洲精品一区蜜桃| 波多野结衣一区麻豆| 久久人人爽人人片av| 国产极品天堂在线| 精品少妇一区二区三区视频日本电影 | 黄片播放在线免费| 人妻 亚洲 视频| 欧美国产精品一级二级三级| 久久毛片免费看一区二区三区| 爱豆传媒免费全集在线观看| 十八禁高潮呻吟视频| 亚洲av.av天堂| 亚洲成人一二三区av| 亚洲av日韩在线播放| 热99国产精品久久久久久7| 亚洲精华国产精华液的使用体验| 成年女人毛片免费观看观看9 | 在线 av 中文字幕| 国产精品.久久久| 黄色怎么调成土黄色| 国产又色又爽无遮挡免| 大片电影免费在线观看免费| 极品少妇高潮喷水抽搐| 搡女人真爽免费视频火全软件| 一级黄片播放器| 久久免费观看电影| 精品久久久精品久久久| 久久久久精品人妻al黑| 欧美少妇被猛烈插入视频| 午夜影院在线不卡| 久久这里只有精品19| 成人二区视频| 日韩一本色道免费dvd| 国产精品久久久久成人av| 黄色一级大片看看| 在线观看国产h片| 美女午夜性视频免费| 菩萨蛮人人尽说江南好唐韦庄| 啦啦啦啦在线视频资源| 电影成人av| 免费日韩欧美在线观看| 人人妻人人澡人人爽人人夜夜| 黄片播放在线免费| 两个人免费观看高清视频| 国产精品亚洲av一区麻豆 | 777久久人妻少妇嫩草av网站| 99国产综合亚洲精品| 久久韩国三级中文字幕| 久久女婷五月综合色啪小说| 王馨瑶露胸无遮挡在线观看| 岛国毛片在线播放| 欧美日韩国产mv在线观看视频| 18禁国产床啪视频网站| 一级片'在线观看视频| 亚洲少妇的诱惑av| 一区二区av电影网| 国产成人欧美| 国产精品国产三级专区第一集| 久久精品夜色国产| 午夜福利网站1000一区二区三区| 咕卡用的链子| 国产成人精品福利久久| 人人澡人人妻人| 另类亚洲欧美激情| 亚洲内射少妇av| 欧美精品高潮呻吟av久久| 亚洲av.av天堂| 亚洲图色成人| 又大又黄又爽视频免费| 国产精品蜜桃在线观看| 制服诱惑二区| 妹子高潮喷水视频| 超色免费av| 久久人人爽人人片av| 日韩一本色道免费dvd| a 毛片基地| 边亲边吃奶的免费视频| 超碰成人久久| 黄频高清免费视频| 一区二区三区乱码不卡18| 人人妻人人澡人人爽人人夜夜| 久久 成人 亚洲| 国产在线免费精品| 亚洲精品av麻豆狂野| 在线天堂中文资源库| 丝袜脚勾引网站| 亚洲国产精品一区二区三区在线| 又黄又粗又硬又大视频| 香蕉丝袜av|