• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Efficient Deep Learning Modalities for Object Detection from Infrared Images

    2022-08-24 06:58:58NaglaaSolimanAlabdulkreemAbeerAlgarniGhadaElBanbyFathiAbdElSamieandAhmedSedik
    Computers Materials&Continua 2022年8期

    Naglaa F.Soliman,E.A.Alabdulkreem,Abeer D.Algarni,Ghada M.El Banby,Fathi E.Abd El-Samie and Ahmed Sedik

    1Department of Information Technology,College of Computer and Information Sciences,Princess Nourah Bint Abdulrahman University,Riyadh,84428,Saudi Arabia

    2Department of Electronics and Communications,Faculty of Engineering,Zagazig University,Zagazig,44519,Egypt

    3Department of Computer Sciences,College of Computer and Information Sciences,Princess Nourah Bint Abdulrahman University,Riyadh,84428,Saudi Arabia

    4Department of Industrial Electronics and Control Engineering,Faculty of Electronic Engineering,Menoufia University,Menouf,32952,Egypt

    5Department of Electronics and Electrical Communications,Faculty of Electronic Engineering,Menoufia University,Menouf,32952,Egypt

    6Department of the Robotics and Intelligent Machines,Faculty of Artificial Intelligence,KafrelSheikh University,Kafr el-sheikh,Egypt

    Abstract: For military warfare purposes,it is necessary to identify the type of a certain weapon through video stream tracking based on infrared (IR)video frames.Computer vision is a visual search trend that is used to identify objects in images or video frames.For military applications,drones take a main role in surveillance tasks,but they cannot be confident for longtime missions.So,there is a need for such a system,which provides a continuous surveillance task to support the drone mission.Such a system can be called a Hybrid Surveillance System (HSS).This system is based on a distributed network of wireless sensors for continuous surveillance.In addition,it includes one or more drones to make short-time missions,if the sensors detect a suspicious event.This paper presents a digital solution to identify certain types of concealed weapons in surveillance applications based on Convolutional Neural Networks(CNNs)and Convolutional Long Short-Term Memory(ConvLSTM).Based on initial results,the importance of video frame enhancement is obvious to improve the visibility of objects in video streams.The accuracy of the proposed methods reach 99%,which reflects the effectiveness of the presented solution.In addition,the experimental results prove that the proposed methods provide superior performance compared to traditional ones.

    Keywords: Deep learning;object detection;military applications;OFDM;SPIHT;IoT

    1 Introduction

    Identifying objects is the most critical issue in different applications such as military,medical,and industrial applications.Generally,surveillance systems depend on the idea of using certain types of cameras to get video streams in order to track,detect and identify objects,easily.For military applications,it is necessary to determine the threats represented in weapons or guns in order to take the necessary precautions in emergency situations.Therefore,there is a bad need to design automatic recognition systems that are able to detect weapons,easily.Multi-spectral imaging techniques are widely used in surveillance systems.These systems include microwave imaging systems as well as visual light imaging systems.In addition,thermal IR cameras are good candidates for surveillance applications.

    There are several different techniques to perform scene imaging as IR imaging,microwave imaging and visual imaging.Visible light cameras exploit the reflected light from objects to form the desired image.Thermal images acquired with IR cameras depend on temperature variations emitted from the body followed by a focusing process by the camera optics on the IR detector.Complex algorithms are used to translate the data that comes from the IR detector into an image[1].Microwave imaging systems can be used for detecting the concealed objects,but this technique has a limited use as the microwave frequencies reveal all body details in contradiction with privacy concerns[2].All imaging systems should perform several internal processing in order to get the clear crisp image.Basically,the beams from the light source strike the imaging sensor,and then the produced electrical charge will be converted into a digital signal representing the intensity of the incident light on the imaging sensor.Quantization and filtering are applied as digital pre-processing steps to generate the required digital image.The most widely-used imaging system for night vision is the thermal imaging system.This mechanism depends on thermal energy emission from the objects due to the temperature variations.With this type of imaging,concealed weapons will appear darker with low intensity due to the variations of temperature between the person’s body and the weapon object.Imaging based on thermal IR radiation is called thermography,in which the electronic capturing device detects the thermal energy patterns due to variations of temperature of objects.Feature extraction is the most powerful tool to classify and identify unknown concealed objects.In the proposed approach,the concept of deep neural network is used to generate distinctive feature maps that can be used to determine the type of the concealed weapon.

    Recently,wireless communication has been widespread in several applications such as 5G networks,Wireless Sensor Networks (WSNs),Internet of Things (IoT),and health monitoring.The Orthogonal Frequency-Division Multiplexing(OFDM)has been considered one of the state-of-theart solutions that are able to fulfill the requirements of the next generation communication systems,such as the increased capacity of users and the mitigation of multipath fading.The OFDM is employed in the physical layer of broadband wireless networks to allow high data rate communication for both civilian and military applications.It is used as a technology to allow superior spectral efficiency,low cost and resistance to Inter-Symbol Interference (ISI) effects [3-5].In addition,compression algorithms are badly needed in IoT applications in order to reduce the size of the multimedia content.Furthermore,in the Internet environment,to allow interactive viewing more efficiently,compression schemes are required.Compression should be inherently scalable and it should support a high degree of random accessibility.Set Partitioned in Heretical Tree(SPHIT)is a lossless and reversible compression technique that can be used to allow complete recovery of the original image.It is scalable in nature,with low complexity,and a proficient encoding process.The SPIHT was firstly introduced by Said et al.[6]based on the wavelet transform.It has a better objective performance and less block artifacts compared with other compression techniques that are based on the DCT such as the JPEG[7,8].The encoding is performed by quantizing and coding of the wavelet coefficients to select the significant coefficients to be used as the roots.The decomposition structure is assumed to be the octave-band structure,and then the sub-bands at different levels are used with some sort of alignment.

    Different studies have utilized the SPIHT algorithm for image transmission over wireless systems[9,10],because it has a good rate-distortion performance for still images with comparatively low complexity,and it is scalable or completely embeddable.The success of this algorithm in compression of images with high efficiency and simplicity makes it well known as a benchmark for embedded wavelet image coding[11,12].In this framework,SPHIT is employed as a source coder tool for robust wireless video stream transmission,as it is a progressive coding algorithm.It is flexible in achieving the required code rate and also simple to design.The compression of images and videos for drone applications is important due to the high temporal and spatial correlation between pixels leading to redundancies.Firstly,the image stream captured by drones is different from that transmitted over other networks due to the enormous data size,and power required for each node in processing and transmission.Then,compressed images are transmitted over the OFDM wireless channel to reduce the communication burden.At the receiver side,a deep learning model can be used for object detection as in the detection of concealed weapons.

    Raturi et al.[13]studied the urgent need to develop automated monitoring systems.Their proposed security surveillance system has the ability to detect any type of concealed objects such as firearms or even any type of weapon including knife,and scissors,which may cause security problems.They introduced a framework to detect and classify the concealed weapons by analyzing the Closed-Circuit Television CCTV stream data.Their classification framework depends on deep-learning-based object detection and classification techniques.To detect the concealed weapons,a multi-sensor stream data capturing framework is used,and the concept of sensor fusion is adopted to generate integrated images.These integrated images are further processed for segmentation to localize objects of interest.The authors utilized an R-CNN (Region-based Convolutional Neural Network) model to classify weapons from the collected dataset.They achieved a 93.6% efficiency in the detection of concealed weapons.Kaur et al.[14]proposed a method to extract features from input images to detect and classify different shapes of guns based on Scale Invariant Feature Transform (SIFT) and Speeded-Up Robust Features (SURF) techniques.They achieved a 90% efficiency using both methods with faster processing for the SURF algorithm.Mahajan et al.[15]introduced a survey of the different methods used for the detection of concealed objects to improve the accuracy and effectiveness of the security system.They reviewed the presented systems that can be used for the recognition of different objects based on extracted features.In addition,they introduced motion analysis to detect concealed weapons from video frames.

    Chadha[16]studied the subject of Concealed Weapon Detection(CWD),because it was of major interest in the United States.In this work,acoustic signals have been used to detect a concealed weapons.Acoustic signals have been selected for this task,as they are characterized by minimum health risks and maximum cost effectiveness.The reflected acoustic signals are used as signatures that depend on the object composition and shape.Acoustic signatures are compiled to identify the concealed weapons.Fast Fourier Transform (FFT) is used to extract features from each acoustic signature.A mathematical model is created through machine learning to detect concealed weapons.An accuracy of 88% was achieved based on Random Forest (RF) classifier algorithm.Hussin et al.[17]succeeded to detect the desired object based on Circular Hough Transform (CHT).Color preprocessing,filtering,smoothing and shape detection are the steps to be applied to detect and allocate the desired objects.

    Deep learning has been extensively involved in several applications,such as medical[18],security[19]and biometric recognition [20].Hence,this paper is concerned with deploying Deep Learning Models (DLMs) on both IR sequences and drone surveillance images in military applications.This paper presents an efficient model for weapon detection.The target of deploying deep learning is to recognize the type of the weapons carried by persons or soldiers.The images can be collected by distributed sensor networks and/or surveillance drones.The contributions of the proposed work can be illustrated as follows:

    1-Proposal of a hybrid surveillance framework based on both wireless sensor networks and drones.

    2-Compression of the obtained images using SPIHT encoder and then transmission of the compressed images via OFDM channel.

    3-Building a CNN model which provides an optimal performance for weapon detection.

    4-Building a hybrid model based on CNN and ConvLSTM models for weapon detection.

    5-Providing a comparative study between the two proposed models from the accuracy of detection perspective.

    This paper is structured into five sections.Section two represents the proposed framework.The simulation results are discussed in section three.Moreover,brief result discussion and comparison are represented in section four.Finally,section five shows the conclusions of this paper.

    2 Proposed Framework

    This paper presents a hybrid surveillance framework based on wireless sensor networks and drones for military applications.A hybrid surveillance strategy is introduced through the received images acquired using OFDM modulation.The motivation for this strategy is the lake of long-time missions for drones.The drone devices are supplied with batteries or solar cells,which cannot be sustainable for long-time surveillance missions.Hence,there is a need to investigate a hybrid system that includes a sensor network with low power consumption to serve the sustainable surveillance mission.The wireless sensor networks are launched to detect weapons in the surrounding sites.Then,if a weapon is detected,drones can be used to make short-time missions.Such missions could be either surveillance or defense missions.Fig.1 shows the proposed framework,while Fig.2 shows the block diagram of the proposed scheme for weapon detection.

    The proposed scheme consists of multiple transmitters which are used within distributed wireless sensor networks.The sensors transmit images through wireless channels that are assumed to be OFDM channels.Finally,the detected images are received by a central receiver.This receiver is arranged to classify the detected weapons using deep learning.In the next section,the proposed DLMs are discussed in detail.

    2.1 SPIHT-OFDM Model

    The block diagram of SPIHT followed by OFDM modulator (SPHIT-OFDM) transmitter is shown in Fig.3.Firstly,the input video stream is split into frames,and each frame is processed,separately.The coefficients of each frame are categorized into different layers based on the significance of the input stream.Afterwards,the modified stream of each frame is adapted to binary format that is appropriate to be processed by the OFDM modulator.

    Figure 1:The proposed SDN military surveillance framework

    Figure 2:The proposed WDDL scheme

    Figure 3:Block diagram of the SPIHT-OFDM transmitter and receiver.(a)SPIHT-OFDM transmitter,(b)SPIHT-OFDM receiver

    In the OFDM modulator,the input bit stream is divided into several overlapped sub-channels,namelyNsub-channels using the serial-to-parallel (S/P) converter.The duration of the new data symbol is smaller than that of the original one in order to mitigate the multi-path delay spread and provide enhancement of the spectral efficiency.In addition,the multi-path propagation problem is solved by converting the wideband frequency selective channels intoNoverlapped frequency selective channels.Hence,the bit streams on each sub-carrier are mapped into the data symbols(constellation points) by Quadrature-Phase Shift Keying (QPSK).Then,the bit stream is modulated by a set of orthogonal sub-carriers {fk,k=0,1,...,N-1} using IFFT to construct the OFDM signalXk,z={Xk,k=0,1,...,N-1}.Each data symbol is assigned to a different sub-carrier[21-23].

    The complex envelope of the transmitted OFDM signal is represented by the following equation[22]:

    whereXkrepresents the constellation points to be transmitted at the carrier frequencyfk,Tsis the data symbol period,andfkis the center frequency of thekthsub-carrier.

    To avoid the problems of Inter-Symbol Interference(ISI)and Inter-Carrier Interference(ICI),a Cyclic Prefix (CP) is pre-appended to each data block of every sub-carrier.This introduces a cyclic redundancy of lengthNgsamples.The insertion the CP during the guard interval converts the linear convolution to a circular convolution.Finally,the signal samplesx(n)are embedded into the Digitalto-Analogue converter (D/A) and amplified using the High Power Amplifier (HPA).The OFDM signalx(t)is transmitted over an Additive White Gaussian Noise(AWGN)channel.

    At the receiver side,the received signal is given by:

    wherer(t) is the received signal,h(t) is the channel impulse response andno(t) is a complex AWGN with single-sided power spectral densityNo.

    At the receiver side,the received signal is converted to digital format using an (A/D) converter.Then,all processes are reversed.

    2.2 Proposed WDDL System

    In this paper,a Weapon Detection Deep Learning (WDDL) system is proposed.It consists of three phases.The first phase is the pre-processing phase.The second one is the forward propagation phase.Finally,the third one is the back-propagation phase.Fig.4 shows the block diagram of the proposed deep learning model for the classification task.

    Figure 4:Block diagram of the classification stage of the proposed WDDL system

    2.2.1 Video Stream Pre-Processing

    In this section,the methodology to perform digital pre-processing for each frame of the video stream is explained.Frame pre-processing allows improvement of its quality prior to any detection task.Such improvement is accomplished by eliminating unwanted distortions and enhancing the important features,so that the CNN model can perform its classification task,efficiently.Adaptive Weiner filter is one of the most common techniques used to improve the visibility of digital images by suppressing noise and preserving edges.The operation of the adaptive Weiner filter depends on estimating the local mean and variance around each pixel to minimize the Mean Squared Error(MSE)as follows[24]:

    wherex(i,j)is the required noise-free image,(i,j)is the estimated Weiner filtered image,andKis the total number of image pixels.

    The Weiner filter update equation is given by:

    wherey(i,j)is the noisy image,σ2x(i,j)is the noisy image local variance,μx(i,j)is the noisy image local mean,andσn2(i,j)is the noise local variance.

    For the local mean and local variance estimation,we get:

    Moreover,histogram equalization is applied on the output image after Weiner filtering in order to enhance the image contrast,so that the features are extracted with the CNN.ForLdifferent gray levels,each levelioccursnitimes out of a total ofnoccurences.The Transform Function(T.F)based on histogram equalization to obtain an image with better contrast can be estimated with the following relation[25]:

    2.2.2 Feature Extraction by CNN

    In this subsection,the two proposed WDDL models based on CNN and ConvLSTM are introduced.These models are designed to extract the image features,efficiently.Hence,the effective design is obtained by setting hyper-parameters including number of layers,number of filters,filter size in each layer,number of epochs and batch size to certain values to enhance the efficiency of classification.

    The CNN is considered an efficient feature extraction methodology.The main idea of the CNN is to perform the 2D digital filtering on the input images to extract the feature maps that contain distinctive features from the images[26-28].These filters have two main control parameters:filter size and stride.The filter size represents the dimensions of the applied filters and the stride represents the position of the filter initial sliding point.Moreover,if the filters have a size ofM×M,the stride size would be (M-1)/2.The pooling layer is mainly used for feature reduction,where the feature map is segmented into pixel windows,and each window is reduced into one pixel.The pooling process is controlled by two parameters.The first one is the type of pooling,which is performed on the feature map,while the second is the window size.There are two types of pooling processes:max-pooling and average pooling.The max-pooling process elects the maximum value from each window,while the average pooling reduces the window pixels into their mean value.

    To produce a distinctive feature map,the input image is inserted into the feature extraction network which consists of sequential pairs of convolutional and pooling layers.These features are involved in the classification process with a neural network to produce the output of the deep neural network.Through the training stage,the weights of all layers are regulated using the back-propagation algorithm.

    The first proposed approach comprises three convolutional(CNV)layers,each trailed by a maximum pooling layer.A Global Average Pooling(GAP)layer is finally inserted.A final classification layer with two classes(weapon or no weapon)is utilized.The CNV layers work as feature extractors,where each CNV layer gives its corresponding feature map.Max-pooling after each CNV layer allows a resizing process of the feature map in order to keep only the most representative features.The output of the last pooling layer is fed into the GAP layer.Tab.1 shows a summary of the first proposed approach based on a CNN.

    Table 1:Summary of the proposed DLM based on CNV layers

    In the second proposed approach for object detection from IR image sequences,a ConvLSTM layer and three CNV layers followed by max-pooling layers are used.The ConvLSTM layer has an advantage of remembering the previous state of extracted features and constructing a series of feature states in some sense of state prediction based on the state history.Unfortunately,this characteristic may be undesired.Assuming that a certain state in the series is dropped,all next states would be affected and dropped,also.Hence,the design of such a model should be performed carefully to be reliable and sustainable in the testing phase.Tab.2 presents the hyper-prameters of the second proposed hybrid model based on a ConvLSTM layer and CNV layers.

    Table 2:Summery of the second proposed DLM based on a hybrid structure of a ConvLSTM layer and CNV layers

    Table 2:Continued

    3 Simulation Results

    3.1 Data Description

    In this paper,the proposed DLMs are tested on the Terravic Weapon IR dataset[29].This dataset is suitable for weapon detection and weapon discharge detection with thermal imagery.It has been collected using a special thermal sensor (Raytheon L-3 Thermal-Eye 2000AS).Terravic Weapon IR dataset consists of five thermal sequences.Each sequence includes IR frames for a certain weapon as shown in Tab.3.The included frames are formatted into 8-bit gray-scale JPEG images.The size of each frame is 320×240 pixels.Samples of the dataset are presented in Fig.5.

    Table 3:Description of weapon IR dataset

    Figure 5:Samples of the dataset

    3.2 Evaluation Metrics

    In this proposed approach,accuracy is used to estimate the strength of the CNN model and give indication if there is a misleading result.Accuracy is calculated as follows:

    3.3 Results

    The simulation tests are performed on the dataset using Python 3.5,TensorFlow and Keras.The proposed models have been assessed,in the training stage,based onk-overlay cross validation.This strategy continues by arbitrarily fragmenting the dataset intokfolds of roughly equivalent size.Out of these folds,(k-1)folds are used for training and the rest one is used for testing.In our simulation experiments,90%of the data is used for training and the other 10%are used for testing.This process is repeated on the data through a folding process several times,and the results are averaged.Fig.6 illustrates the data fragmentation process.

    Figure 6:Fragmentation of the dataset

    In the first simulation experiment,the proposed DLM is carried out on the IR images of soldiers.In the experiments,the number of epochs and batch size are set to 10 for each.The accuracy of the two proposed models is illustrated in Figs.7 and 8.In addition,the loss of the two proposed models is illustrated Figs.9 and 10.It can be observed that the accuracy in Figs.7 and 8 is increased gradually till it gets to 100%at epoch No.9.Although the IR images have low resolution,the proposed approach achieves an accuracy of 100%in robust conditions.Tab.4 shows the value of accuracy and loss at each epoch for the first and the second proposed approaches.

    In the second simulation experiment,the performance of the two proposed DLMs is investigated on the compressed images transmitted over OFDM channel.The proposed models are also carried out on the compressed video frames.The compression is performed due to the large amount of data between the distributed sensors and the central receiver.The compressed video stream is broadcasted over an OFDM channel.This experiment is carried out to assess the performance of the proposed DLMs in the wireless communication scenario.The accuracy of the two proposed models is illustrated in Figs.11 and 12.In addition,the loss results are illustrated in Figs.13 and 14.A comparison of the loss and accuracy between the proposed models on the compressed received images is introduced in Tab.5.The simulation results reveal that the proposed DLMs achieved accuracies of 99.2%,99.5%for CNN and ConvLSTM models,respectively,as shown in Tab.5.

    Figure 7:Accuracy of the 1st model

    Figure 8:Accuracy of the 2nd model

    Figure 9:Loss of the 1st model

    Figure 10:Loss of the 2nd model

    Figure 11:Accuracy of the 1st model

    Figure 12:Accuracy of the 2nd model

    Figure 13:Loss of the 1st model

    Figure 14:Loss of the 2nd model

    Table 5:Accuracy and loss at each epoch in the second experiment

    Figure 15:Accuracy of the 1st model

    Finally,the performance of the proposed DLMs is evaluated on noisy image.In this case,the transmitted signal after OFDM is affected by the existence of AWGN.The AWGN is induced,because the distance between the distributed sensors and central receiver is assumed to be within the range of 1 km.The target is to detect any suspicious motion from such an intruder(soldier)and detect the type of the gun with him.So,the proposed DLMs are carried out on noisy images in order to perform this task.The accuracy and the loss results are introduced in Figs.15-18 and Tab.6.The simulation results ensure that the proposed DLMs achieve accuracies of 96.5%,and 99% for CNN and ConvLSTM,respectively.

    Figure 16:Accuracy of the 2nd model

    Figure 17:Loss of the 1st model

    Figure 18:Loss of the 2nd model

    Table 6:Accuracy and loss at each epoch in the third experiment

    4 Result Discussion

    In this paper,a study of weapon detection has been presented.Two different DLMs have been proposed.The first model is based on CNN and the second one is based on a combination of CNN and ConvLSTM.This study is focused on the effect of deploying DLMs on distributed wireless sensor networks for military applications.Hence,the proposed models have been evaluated on the dataset in presence of AWGN and with image compression as the wireless channel affects the images or frames.The proposed scenario is based on image transmission over OFDM as a common modulation technique in wireless communication.Fig.19 shows a comparison of accuracy between the two proposed models.It can be observed that the proposed hybrid model has a superior performance for weapon detection from images transmitted over a wireless communication channel in the presence of AWGN.

    Figure 19:A comparison of accuracy between the two proposed CNN and hybrid CNN and ConvLSTM models

    The proposed trend is novel in this field.The contribution of this paper is in the field of detecting carried weapons with soldiers.Furthermore,the proposed DLMs are deployed on the transmitted images from a dynamic environment,which is frequently encountered in military applications.The main trend of research works in the literature is to detect weapons in a static environment.Therefore,we can consider the proposed models as efficient solutions for military,surveillance and data analysis applications.

    5 Conclusions

    A significant issue involving weapon detection from IR images has been discussed in this work.The objective is to detect the weapon type from the collected images from drones.Different DLMs have been deployed to achieve this objective.The video stream is compressed using SPHIT encoder,and finally it is broadcasted over OFDM channel to reach the receiver side,where DLMs are applied for object detection.This work has presented a CNN model,and a hybrid model that contains CNV and ConvLSTM layers.The proposed models have been carried out on original,compressed and compressed with AWGN images.The proposed models reveal a superior performance for weapon detection in the presence of robust conditions as they achieved an accuracy of 99%.Furthermore,this work can be improved in the future by adding another stage to segment the objects of interest in the images.

    Acknowledgement:The authors would like to thank the support of the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University.

    Funding Statement:This research was funded by the Deanship of Scientific Research at Princess Nourah Bint Abdulrahman University through the Research Funding Program (Grant No# FRP-1440-23).

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    天堂俺去俺来也www色官网| 最近最新免费中文字幕在线| 国产熟女午夜一区二区三区| 免费在线观看日本一区| 变态另类成人亚洲欧美熟女 | 亚洲欧美色中文字幕在线| 美女视频免费永久观看网站| 一级黄色大片毛片| 真人做人爱边吃奶动态| 久久99热这里只频精品6学生| 老司机亚洲免费影院| 亚洲精品成人av观看孕妇| 国产精品久久久久久精品古装| 超碰97精品在线观看| 丰满饥渴人妻一区二区三| 在线观看www视频免费| www日本在线高清视频| 久久久久久久国产电影| h视频一区二区三区| 国产淫语在线视频| 午夜福利一区二区在线看| videosex国产| 18禁美女被吸乳视频| 最新的欧美精品一区二区| 日本av免费视频播放| 99热国产这里只有精品6| av天堂久久9| 午夜日韩欧美国产| 亚洲三区欧美一区| 久久国产精品男人的天堂亚洲| 国产欧美日韩一区二区三区在线| 亚洲成人免费电影在线观看| 久久国产精品影院| 麻豆乱淫一区二区| 成人特级黄色片久久久久久久 | 国产精品熟女久久久久浪| 国产成人一区二区三区免费视频网站| 亚洲人成电影免费在线| 日本撒尿小便嘘嘘汇集6| 婷婷丁香在线五月| 国产精品久久电影中文字幕 | 国产一区二区在线观看av| 桃花免费在线播放| 午夜激情久久久久久久| 黄色丝袜av网址大全| 91大片在线观看| 黄色毛片三级朝国网站| 岛国在线观看网站| 亚洲成人免费电影在线观看| 亚洲精品在线美女| 悠悠久久av| 日韩成人在线观看一区二区三区| 国产欧美日韩一区二区三| 精品人妻熟女毛片av久久网站| 亚洲精品美女久久久久99蜜臀| 国产精品国产av在线观看| 欧美老熟妇乱子伦牲交| 日韩 欧美 亚洲 中文字幕| 欧美午夜高清在线| 一夜夜www| 99riav亚洲国产免费| 99精品久久久久人妻精品| 国产片内射在线| 一本综合久久免费| 在线亚洲精品国产二区图片欧美| 日本欧美视频一区| 美女高潮到喷水免费观看| 精品免费久久久久久久清纯 | 大香蕉久久成人网| 操出白浆在线播放| 国产男女内射视频| 黄色丝袜av网址大全| 久久久久精品国产欧美久久久| 国产aⅴ精品一区二区三区波| 国产高清videossex| 久久影院123| 9色porny在线观看| 国产成+人综合+亚洲专区| 丁香六月欧美| av不卡在线播放| 国产成+人综合+亚洲专区| 亚洲欧美精品综合一区二区三区| 精品久久久精品久久久| 人妻一区二区av| 三上悠亚av全集在线观看| 涩涩av久久男人的天堂| 黄色 视频免费看| 亚洲精品在线美女| 亚洲三区欧美一区| 国产野战对白在线观看| 久久国产精品男人的天堂亚洲| 一二三四社区在线视频社区8| 91av网站免费观看| 久久久国产成人免费| 国产免费福利视频在线观看| 国产又爽黄色视频| 少妇精品久久久久久久| 巨乳人妻的诱惑在线观看| 人妻 亚洲 视频| 一本一本久久a久久精品综合妖精| 国产亚洲欧美在线一区二区| 国产成人精品久久二区二区91| 制服诱惑二区| 久久久久国产一级毛片高清牌| 久久午夜综合久久蜜桃| 欧美激情久久久久久爽电影 | 久久久久久免费高清国产稀缺| 精品视频人人做人人爽| 黑丝袜美女国产一区| 国产成人欧美在线观看 | 精品人妻1区二区| 国产伦人伦偷精品视频| 法律面前人人平等表现在哪些方面| 亚洲自偷自拍图片 自拍| 久久国产精品影院| 亚洲天堂av无毛| 午夜福利在线观看吧| bbb黄色大片| 国产97色在线日韩免费| 三级毛片av免费| 18禁黄网站禁片午夜丰满| 免费在线观看黄色视频的| 99热国产这里只有精品6| 黑人猛操日本美女一级片| 免费在线观看视频国产中文字幕亚洲| 蜜桃在线观看..| 成人黄色视频免费在线看| 国产免费视频播放在线视频| 丁香欧美五月| 黄片大片在线免费观看| 欧美乱码精品一区二区三区| 一进一出好大好爽视频| 亚洲国产av新网站| 国产老妇伦熟女老妇高清| 热99久久久久精品小说推荐| bbb黄色大片| 欧美 亚洲 国产 日韩一| 日韩精品免费视频一区二区三区| 国产av精品麻豆| 久久久久久久久久久久大奶| 日本黄色视频三级网站网址 | 91老司机精品| 成人永久免费在线观看视频 | 香蕉国产在线看| 夫妻午夜视频| 在线亚洲精品国产二区图片欧美| 亚洲av欧美aⅴ国产| 最近最新中文字幕大全电影3 | 国产又色又爽无遮挡免费看| 欧美精品一区二区免费开放| 亚洲专区字幕在线| 精品亚洲成a人片在线观看| 国产精品九九99| 日本vs欧美在线观看视频| 在线 av 中文字幕| 日本精品一区二区三区蜜桃| 亚洲五月婷婷丁香| 男男h啪啪无遮挡| 悠悠久久av| 亚洲精品一二三| bbb黄色大片| 老司机亚洲免费影院| 91麻豆精品激情在线观看国产 | 国产精品偷伦视频观看了| 啦啦啦中文免费视频观看日本| videos熟女内射| 久久久久久久精品吃奶| 在线观看免费高清a一片| 少妇精品久久久久久久| 欧美人与性动交α欧美精品济南到| 9191精品国产免费久久| 欧美老熟妇乱子伦牲交| av又黄又爽大尺度在线免费看| 黑人巨大精品欧美一区二区mp4| 99在线人妻在线中文字幕 | 亚洲va日本ⅴa欧美va伊人久久| 国产免费av片在线观看野外av| 香蕉国产在线看| 女人爽到高潮嗷嗷叫在线视频| 少妇被粗大的猛进出69影院| 99热网站在线观看| 亚洲熟女毛片儿| videosex国产| 丰满迷人的少妇在线观看| 成人国产一区最新在线观看| 欧美亚洲 丝袜 人妻 在线| 免费一级毛片在线播放高清视频 | 精品第一国产精品| 精品人妻1区二区| 亚洲一区二区三区欧美精品| 男男h啪啪无遮挡| 在线观看免费视频网站a站| 亚洲一卡2卡3卡4卡5卡精品中文| 国产精品98久久久久久宅男小说| 亚洲av日韩精品久久久久久密| av网站在线播放免费| 精品国产超薄肉色丝袜足j| 天天添夜夜摸| 黄片播放在线免费| h视频一区二区三区| 亚洲人成电影免费在线| 日韩一区二区三区影片| 亚洲欧美一区二区三区黑人| 在线观看免费高清a一片| 国产高清激情床上av| 别揉我奶头~嗯~啊~动态视频| 青青草视频在线视频观看| 麻豆乱淫一区二区| 国产精品久久久久久精品古装| 欧美精品av麻豆av| 午夜福利视频精品| 视频在线观看一区二区三区| 最近最新免费中文字幕在线| 美女午夜性视频免费| 久久人妻福利社区极品人妻图片| 成人手机av| 最近最新中文字幕大全电影3 | 男女免费视频国产| 亚洲国产av影院在线观看| 99国产精品99久久久久| 老熟女久久久| 亚洲人成77777在线视频| 精品国产一区二区久久| 真人做人爱边吃奶动态| 美女视频免费永久观看网站| 欧美黑人精品巨大| 国产男女超爽视频在线观看| 肉色欧美久久久久久久蜜桃| 日本av免费视频播放| svipshipincom国产片| 丰满少妇做爰视频| 亚洲专区中文字幕在线| 美女高潮喷水抽搐中文字幕| 国产黄色免费在线视频| 国产精品久久电影中文字幕 | 国产片内射在线| 9热在线视频观看99| 国产日韩欧美亚洲二区| 99国产综合亚洲精品| 国产欧美日韩综合在线一区二区| 精品卡一卡二卡四卡免费| 久久精品国产a三级三级三级| 男女边摸边吃奶| 精品卡一卡二卡四卡免费| 亚洲成人国产一区在线观看| 午夜久久久在线观看| 乱人伦中国视频| 99riav亚洲国产免费| 又黄又粗又硬又大视频| 欧美激情极品国产一区二区三区| 久久人人爽av亚洲精品天堂| 80岁老熟妇乱子伦牲交| 人妻久久中文字幕网| 纯流量卡能插随身wifi吗| 亚洲黑人精品在线| 亚洲va日本ⅴa欧美va伊人久久| 国产欧美亚洲国产| 中文字幕最新亚洲高清| 午夜福利乱码中文字幕| 亚洲国产欧美在线一区| 精品亚洲成a人片在线观看| 成人黄色视频免费在线看| 精品福利观看| 肉色欧美久久久久久久蜜桃| 亚洲精品国产一区二区精华液| 色播在线永久视频| 亚洲国产av新网站| 一级毛片精品| 又紧又爽又黄一区二区| 国产不卡一卡二| 精品国产一区二区三区久久久樱花| 国产欧美日韩一区二区精品| 真人做人爱边吃奶动态| 国产野战对白在线观看| 51午夜福利影视在线观看| 一级片'在线观看视频| 黄色视频在线播放观看不卡| 精品人妻在线不人妻| tocl精华| 精品高清国产在线一区| 女人高潮潮喷娇喘18禁视频| 亚洲av日韩在线播放| 国产精品欧美亚洲77777| 成人av一区二区三区在线看| 欧美乱妇无乱码| 色老头精品视频在线观看| 精品乱码久久久久久99久播| 99国产精品一区二区蜜桃av | 丰满人妻熟妇乱又伦精品不卡| 久久精品亚洲精品国产色婷小说| 丰满饥渴人妻一区二区三| 少妇被粗大的猛进出69影院| 亚洲av欧美aⅴ国产| 中文字幕色久视频| 久久精品亚洲熟妇少妇任你| 久久久精品免费免费高清| 黄片大片在线免费观看| 人人妻人人添人人爽欧美一区卜| 亚洲全国av大片| 中文字幕另类日韩欧美亚洲嫩草| 国产亚洲午夜精品一区二区久久| 另类精品久久| 亚洲人成77777在线视频| 国产激情久久老熟女| 蜜桃国产av成人99| 久久中文字幕人妻熟女| 夫妻午夜视频| 久久久久久人人人人人| 国产亚洲精品久久久久5区| 一级毛片电影观看| 国产真人三级小视频在线观看| 国产一区二区在线观看av| 每晚都被弄得嗷嗷叫到高潮| 别揉我奶头~嗯~啊~动态视频| 一区二区三区激情视频| 欧美亚洲 丝袜 人妻 在线| 欧美精品亚洲一区二区| 亚洲精华国产精华精| 国产精品熟女久久久久浪| 精品国产一区二区三区久久久樱花| 一级毛片精品| 日韩熟女老妇一区二区性免费视频| 怎么达到女性高潮| 日韩欧美三级三区| 淫妇啪啪啪对白视频| 少妇被粗大的猛进出69影院| 亚洲精品国产色婷婷电影| 久久狼人影院| 欧美中文综合在线视频| 考比视频在线观看| 中文字幕最新亚洲高清| 欧美黄色片欧美黄色片| 久久国产精品人妻蜜桃| 日本精品一区二区三区蜜桃| 免费在线观看日本一区| 天堂动漫精品| 啦啦啦在线免费观看视频4| 亚洲久久久国产精品| 中文字幕最新亚洲高清| 午夜福利,免费看| 最近最新中文字幕大全电影3 | 亚洲精品粉嫩美女一区| 免费久久久久久久精品成人欧美视频| 久久婷婷成人综合色麻豆| 50天的宝宝边吃奶边哭怎么回事| 999久久久精品免费观看国产| 欧美日韩中文字幕国产精品一区二区三区 | 久久久精品区二区三区| 国产精品二区激情视频| 久久精品国产99精品国产亚洲性色 | 国产在线精品亚洲第一网站| 亚洲美女黄片视频| 欧美成狂野欧美在线观看| 高清欧美精品videossex| a级片在线免费高清观看视频| 日本撒尿小便嘘嘘汇集6| 欧美成人午夜精品| 叶爱在线成人免费视频播放| 国产成人av激情在线播放| 亚洲国产毛片av蜜桃av| 如日韩欧美国产精品一区二区三区| 少妇猛男粗大的猛烈进出视频| 天天躁夜夜躁狠狠躁躁| videos熟女内射| 久久久久久久久久久久大奶| 老司机亚洲免费影院| 久久久水蜜桃国产精品网| 大片电影免费在线观看免费| 极品少妇高潮喷水抽搐| 在线天堂中文资源库| 高清av免费在线| 纯流量卡能插随身wifi吗| 天天操日日干夜夜撸| 亚洲色图综合在线观看| 久久国产精品男人的天堂亚洲| 一区二区av电影网| 亚洲欧美激情在线| 欧美精品人与动牲交sv欧美| 亚洲中文日韩欧美视频| 黑人巨大精品欧美一区二区蜜桃| 亚洲七黄色美女视频| 日韩免费高清中文字幕av| 国产一区二区三区在线臀色熟女 | 免费黄频网站在线观看国产| 视频区图区小说| 国产高清视频在线播放一区| 日本av免费视频播放| 亚洲欧美日韩另类电影网站| 国产精品av久久久久免费| 久久99热这里只频精品6学生| 日韩欧美一区二区三区在线观看 | 老司机午夜十八禁免费视频| 91字幕亚洲| 99精品久久久久人妻精品| 黄网站色视频无遮挡免费观看| 国产成人精品无人区| 在线观看舔阴道视频| 亚洲av日韩精品久久久久久密| 中文字幕最新亚洲高清| 久热这里只有精品99| 婷婷丁香在线五月| 国产深夜福利视频在线观看| 女警被强在线播放| 国产精品久久久久久精品古装| 老鸭窝网址在线观看| 国产精品国产高清国产av | 麻豆av在线久日| av不卡在线播放| 国产有黄有色有爽视频| 中文字幕av电影在线播放| 精品乱码久久久久久99久播| 黑人猛操日本美女一级片| 国产又爽黄色视频| 操出白浆在线播放| 久久久久久人人人人人| 欧美日韩视频精品一区| 一区二区三区激情视频| 天天操日日干夜夜撸| 99精品在免费线老司机午夜| kizo精华| 亚洲国产中文字幕在线视频| 99re在线观看精品视频| 成人国语在线视频| 好男人电影高清在线观看| 两性夫妻黄色片| 国产日韩欧美视频二区| 欧美精品人与动牲交sv欧美| av电影中文网址| 日韩欧美一区二区三区在线观看 | 操出白浆在线播放| 午夜免费鲁丝| 人妻 亚洲 视频| 一本—道久久a久久精品蜜桃钙片| 999久久久国产精品视频| 国产色视频综合| 日韩一区二区三区影片| 久久久久久久精品吃奶| 午夜福利影视在线免费观看| av有码第一页| 黄片播放在线免费| 91麻豆精品激情在线观看国产 | 成人免费观看视频高清| 啦啦啦中文免费视频观看日本| 一二三四社区在线视频社区8| 久久人妻av系列| 人妻 亚洲 视频| av网站在线播放免费| 天天躁狠狠躁夜夜躁狠狠躁| 成人国语在线视频| videos熟女内射| 在线av久久热| 老熟女久久久| 国产欧美日韩一区二区精品| 午夜激情av网站| 欧美激情高清一区二区三区| 窝窝影院91人妻| 欧美老熟妇乱子伦牲交| av网站在线播放免费| 91成人精品电影| 三级毛片av免费| 下体分泌物呈黄色| 成人免费观看视频高清| 色视频在线一区二区三区| 亚洲精品一二三| 国产aⅴ精品一区二区三区波| 国产成人系列免费观看| 国产成人欧美在线观看 | 在线观看人妻少妇| 99热网站在线观看| 好男人电影高清在线观看| 欧美成狂野欧美在线观看| av免费在线观看网站| 啪啪无遮挡十八禁网站| 在线观看舔阴道视频| 亚洲av电影在线进入| 精品国内亚洲2022精品成人 | 欧美日韩av久久| 久久99一区二区三区| 欧美精品啪啪一区二区三区| 欧美激情高清一区二区三区| 国产亚洲精品一区二区www | 久久免费观看电影| 国产精品98久久久久久宅男小说| 母亲3免费完整高清在线观看| 下体分泌物呈黄色| 在线观看人妻少妇| 亚洲色图 男人天堂 中文字幕| 精品少妇一区二区三区视频日本电影| 母亲3免费完整高清在线观看| 色老头精品视频在线观看| 69av精品久久久久久 | 成人免费观看视频高清| 午夜免费鲁丝| 亚洲精品美女久久久久99蜜臀| 久久99热这里只频精品6学生| 久久久精品免费免费高清| 国产精品成人在线| 在线观看免费视频日本深夜| 一级片免费观看大全| www日本在线高清视频| 久久中文字幕人妻熟女| 中文字幕精品免费在线观看视频| 丝袜美腿诱惑在线| 欧美人与性动交α欧美软件| 午夜福利在线免费观看网站| 午夜福利视频精品| 久久久国产精品麻豆| 咕卡用的链子| 精品国产乱码久久久久久男人| 我要看黄色一级片免费的| 亚洲人成77777在线视频| 色综合婷婷激情| 视频区欧美日本亚洲| 午夜91福利影院| 免费观看av网站的网址| 女性被躁到高潮视频| 国产精品av久久久久免费| 精品国内亚洲2022精品成人 | 欧美日韩亚洲高清精品| 国产成人影院久久av| 欧美日韩黄片免| 波多野结衣一区麻豆| 精品国产亚洲在线| tocl精华| 黄色 视频免费看| 亚洲人成电影免费在线| 丝瓜视频免费看黄片| 成年人黄色毛片网站| 欧美日韩黄片免| 午夜精品久久久久久毛片777| 午夜视频精品福利| 日韩有码中文字幕| 欧美+亚洲+日韩+国产| 国产成人一区二区三区免费视频网站| 精品人妻1区二区| 久久久久久亚洲精品国产蜜桃av| 亚洲欧美色中文字幕在线| 欧美中文综合在线视频| 久久亚洲精品不卡| 久久人妻av系列| 国产亚洲欧美在线一区二区| 国产av一区二区精品久久| 熟女少妇亚洲综合色aaa.| 日韩视频在线欧美| 少妇的丰满在线观看| 欧美精品高潮呻吟av久久| 日韩中文字幕视频在线看片| 男女午夜视频在线观看| 国产国语露脸激情在线看| 91字幕亚洲| 国产成人av教育| 99国产极品粉嫩在线观看| 日本撒尿小便嘘嘘汇集6| 女人被躁到高潮嗷嗷叫费观| tocl精华| www.自偷自拍.com| 十分钟在线观看高清视频www| 啦啦啦免费观看视频1| 亚洲精品国产一区二区精华液| 欧美变态另类bdsm刘玥| 国产片内射在线| 欧美日本中文国产一区发布| 精品高清国产在线一区| 99精国产麻豆久久婷婷| av不卡在线播放| 丝袜人妻中文字幕| 久久婷婷成人综合色麻豆| 欧美乱妇无乱码| 午夜精品国产一区二区电影| 国产欧美日韩综合在线一区二区| 亚洲av成人不卡在线观看播放网| 日韩大片免费观看网站| 涩涩av久久男人的天堂| 久久久久国产一级毛片高清牌| 一区二区日韩欧美中文字幕| 最近最新中文字幕大全电影3 | 国产单亲对白刺激| 999久久久国产精品视频| 女人精品久久久久毛片| 国产主播在线观看一区二区| 黄色a级毛片大全视频| 国产一区二区激情短视频| 欧美人与性动交α欧美软件| 午夜福利在线观看吧| 亚洲色图av天堂| 免费观看av网站的网址| 又黄又粗又硬又大视频| 国产精品久久久久久人妻精品电影 | 99国产精品99久久久久| 久久中文字幕一级| 色婷婷久久久亚洲欧美| 99riav亚洲国产免费| 久久久久久人人人人人| 99久久精品国产亚洲精品| 国产又爽黄色视频| 亚洲精品国产色婷婷电影| 99在线人妻在线中文字幕 | 下体分泌物呈黄色| 大香蕉久久成人网| 男女午夜视频在线观看| 国产精品 欧美亚洲| 十八禁网站免费在线| 高清欧美精品videossex| 欧美日韩福利视频一区二区| 国产不卡av网站在线观看| 国产精品熟女久久久久浪| 99久久国产精品久久久| 亚洲av美国av| 黄色视频在线播放观看不卡| 最新在线观看一区二区三区| 国产一区二区三区综合在线观看| 777久久人妻少妇嫩草av网站| 操美女的视频在线观看| 99在线人妻在线中文字幕 | 欧美黄色片欧美黄色片|