• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Secret Key Optimization for Secure Speech Communications

    2022-08-24 07:00:22OsamaFaragallahMahmoudFaroukandHalaElSayed
    Computers Materials&Continua 2022年8期

    Osama S.Faragallah,Mahmoud Farouk and Hala S.El-Sayed

    1Department of Information Technology,College of Computers and Information Technology,Taif University,P.O.Box 11099,Taif 21944,Saudi Arabia

    2Department of Computer Science and Engineering,Faculty of Electronic Engineering,Menoufia University,Menouf 32952,Egypt

    3Department of Electrical Engineering,Faculty of Engineering,Menoufia University,Shebin El-Kom 32511,Egypt

    Abstract: This paper answers three essential questions for audio speech cryptosystems in time and discrete transform domains.The first question is,what are the best values of sub-keys that must be used to get the best quality and security for the audio cryptosystem in time and discrete transform domains.The second question is the relation between the number of sub-keys,the number of secret keys used,and the audio speech signal block’s size.Finally,how many possible secret keys can be used to get the best quality and security results for the audio speech cryptosystem in time and discrete transform domains.An audio cryptosystem discussed before in recent research is applied to answer the three previous inquiries.Accurate simulation results and analysis answer all three questions;first,there is no specific,well-defined format or rule for sub-key values that must be used to get a better cryptosystem.For the second question,yes,there is a direct relationship between the number of applicable keys,number of available sub-keys,and block size of speech audio signal and formulated into a first-order equation.For the third question,each discrete transform domain has a specific acceptable range of sub-keys that imply a particular number of keys that can be used to get a better cryptosystem.

    Keywords: Audio cryptosystem;chaotic baker map;secret key size

    1 Introduction

    Speech communications play essential roles in our daily life,and they cover several domains like military services,E-learning,banking services,social networks,phone conversations,and news broadcasting.As speech information passes through unsecured communication channels,there is a need to maintain this audio information secure before transmitting it via an insecure channel.Therefore,the employed cryptographic techniques must have the ability to transform the speech from intelligible format to unintelligible format.Also,it must have to ability to decipher it to a reasonable at the side of the receiver.There exist two speech encryption approaches;analogue and digital speech cryptosystems [1-6].Nowadays,analogue audio encryption methods are more popular because it has characteristics of fewer bandwidth requirements.On the other hand,digital speech encryption methods require more bandwidth and complex implementation,but they provide more security.

    This paper is trying to provide answers about three essential questions in the world of speech cryptosystem based on a comprehensive study which is an investigation and analysis using some advanced code and with statistics functions and analysis,then applying all together on a recently proposed cryptosystem discussed before in current research and proved its high degree of security[7].

    The main contribution points of this article can be listed as follows:

    1.A better quality and efficient audio secure cryptosystem is obtained when changing the used sub-keys.However,there is no well-defined rule for how to choose values of sub-keys.

    2.There is a direct relationship between the applicable number of sub-keys,audio speech block size,and functional secret keys.

    3.Each transform domain has a specific range of sub-keys that must be used to get the best quality and security results,and not all transform domains have the same range of the number of sub-keys.

    The remnant sections of this research are arranged as the following.Section 2 discusses the baker map.Section 3 discusses and presents the recent audio cryptosystem in [7].Section 4 discusses the simulation results.Finally,Section 5 delivers the concluding remarks.

    2 Baker Map

    It is a 2D chaotic map used to provide some security and hiding original speech information in the permutation of speech information.It accomplishes this by rearranging pixels in the array matrix into new locations[8-14].Moreover,it keeps all the superior features of chaotic systems,like non-predictability,randomness and small correlation [15-18].There exist two kinds of baker map,generalized and discretized maps[19-21].This paper focuses on discretized baker map.Some recent cryptosystems are using it.Fig.1 illustrates the discretized baker map.

    Figure 1:Discretized baker map

    The pseudo-code for baker map can be presented as:

    3 Audio Cryptosystem

    The audio cryptosystem used in recent research[7]can be represented as shown in Fig.2,and it discussed the results based on time-domain(TD),discrete cosine transform(DCT)[22-25]and discrete sine transform(DST).

    Figure 2:Recent audio speech cryptosystem[7]

    As depicted in Fig.2,the encryption algorithm has the following steps:

    a) Employ reformatting for the input audio signal via framing and reshaping from 1D to 2D segments.

    b) Employ mask generation using the secret key and the baker map.

    c) Employ the shuffling utilizing the baker map.First,audio samples are permuted,followed by substitution,to alter the audio sample amplitudes by summing their values to the mask’s value.

    d) Employ TD or transform domain like DCT or DST,followed by permutation using the baker map,then substitution by mask adding and finally employing the inverse transform(IDCT or IDST).

    e) Employ permutation using the baker map.

    f) Employ reshaping into a 1D format,a suitable format to store the audio information.

    The decryption algorithm consists of the following steps:

    a) First,employ mask generation using the secret key and the baker map.

    b) Reformat the input audio signal via framing and reshaping from 1D to 2D segments.

    c) Employ the inverse shuffling utilizing the baker map,in which audio information samples are rearranged to their original locations.

    d) Employ TD or transform domain like DCT or DST,followed by inverse substitution.The inverse permutation using baker map,and finally employ the inverse transform (IDCT or IDST).

    e) Employ the substitution (subtract mask) followed by the inverse permutation utilizing the baker map.

    f) Employ reformatting for the audio signal via framing and reshaping from 2D to 1D segments,

    g) Reshape into a 1D format,a suitable format to store the audio information.

    In this paper,advanced code is added to the system to analyze,extend the study,and apply statistics functions to help in analysis for optimization’s study.

    4 Simulation Results

    The hardware specification used in this simulation is an HP Pavilion g-series laptop with an intel?Core?i3 CPU M370 2.40 GHz processor and 12 GB RAM.The simulation is done using Matlab(R 2017a).The used speech sample is the artificial speech that consists of four parts,as shown in Fig.3 and Tab.1.

    Figure 3:Illustration of the original speech signal,its spectrogram and histogram

    Table 1:Specifications of audio speech sample

    The first and last parts are of the length of 2.5 s represent a female says the sentence“we were away years ago”.A male says the same sentence in the fourth part.The third part consists of ideal silence without the noise of 1.5 s length and followed by part three of length 1.5 s of non-perfect silence with noise.

    In the recent research introduced by Mosa et al.[7],a secret key used,let call it Key 1 with 13 sub-keys used,and the sum of sub-keys equals 64,which represents the audio speech block size used,with another two secret keys generated for testing by altering the positions of two sub-keys in the key,let call these two keys are Key 2 and Key3.In this research,a secret key with different sub-keys values will be used,termed as Key_1,with the same number of sub-keys of the same sum of sub-keys which is 64,another two keys Key_2 and Key_3,are generated by altering the positions of two sub-keys in the sub-key(key_1),for the testing purposes in this paper.The same code used by recent research[7]will be used and applied on the same sample speech signal and within the same testing environment.

    4.1 TD Analysis

    4.1.1 Values of Sub-keys

    As shown from Tab.2,Key 1,Key 2 and Key 3 represent keys used with recent research[7],while Key_1,Key_2 and Key_3 define keys used in this research.It is apparent from Tab.2 that the keys used in this research exhibit best values for correlation coefficient(CC)’s values represented in Key_2 same as the value for key1 in recent research[7],For the values of spectral distortion(SD),it is evident that value for Key_3 represents the best value compared with values defined in recent research[7].This means that better quality can be achieved for the audio cryptosystem by only changing the values of sub-keys.

    The testing environment in terms of hardware,software,operating System specifications and Matlab for recent research[7]was not mentioned.Still,we will compare its results with its well-known testing environment as described.

    Even when comparing values presented in recent research[7]with values presented in this paper,both results are obtained in a different testing environment.For example,it is apparent from Tab.3 that key3 used in recent research [7]exhibits the best value for correlation coefficient (CC) among values represented in this paper.Also,the value of spectral distortion (SD) for Key_3 has the best value compared with values defined in recent research [7].This is evidence that better quality can be achieved for the audio cryptosystem by changing the sub-keys values even in a different testing environment.In summary,with TD,there is no specified or well-defined rule for choosing values of sub-keys to get the best quality and security for the audio cryptosystem.

    Table 2:TD analysis of values of sub-keys with the same testing environment

    Table 3:TD analysis of values of sub-keys with different testing environment

    4.1.2 Number of Sub-keys-Secret Key Size&Audio Speech Block Size

    In the search for the best number of sub-keys that give the best quality for audio speech cryptosystem,the secret key must adhere to the following rules:

    ? The sum of sub-keys values in the secret key must equal to block size of the audio speech signal.

    ? Any sub-keys value must be divisible by the audio speech block’s size.

    ? The maximum number of available secret keys=(audio speech block’s size-4),because the following conditions will make the secret key easy to be broken so that it will be ignored:

    ? The number of sub-keys<>block size/2,so will ignore the secret key that consists of sub-keys with same equal values,in case of block size equals 64,will forget the secret key with 32 sub-keys,each sub-key value is 2.

    ? Values of all sub-keys must not be the same,so will ignore the secret key with sub-key values of the same values;in the case of block size equals 64,will ignore the secret key with 64 sub-keys because all sub-key values will be of a value 1.

    ? Also,if the secret key with only one sub-key of a value equals block size in case of block size equals 64,we will ignore the secret key with one sub-key because the secret key will be only one sub-key,and its value is 64.

    ? Finally,we will ignore the secret key with only two sub-keys;each value equals block size/2 if block size equals 64.Likewise,we will ignore the secret key consisting of only two sub-keys sub-key with a value of 32.

    From these conditions,the number of applicable secret keys is formulated in the following equation:

    where,Block size>4

    Tab.4 represents the relation between audio speech signal block size in byte and the number of available secret keys used with this audio speech signal;this equation can be applied on all block sizes starting from 4 and multiples of 64 bytes.For block size equals or less than 4 bytes,the number of secret keys will be zero,so it will not be considered and not be applicable in this research.For example,tests executed in this paper use an audio speech block size of 64 bytes,so there is up to 60 secret keys,for keys with the number of sub-keys equals 1,2,32 or 64 are not applicable according to Eq.(1)and will not be used in simulation tests.

    Table 4:Relation between block size of the speech signal and number of sub-keys

    For the encryption algorithm,the experimental results demonstrate that the best value for correlation coefficient (CC) is for a key with the number of sub-keys equals to five and worst for the key consisting of 53 sub-keys.For spectral distortion(SD),the best value for a key consists of 34 sub-keys and the worst value for a key consists of 63 sub-keys.For the Log-Likelihood Ratio(LLR),the best value for a key consists of 20 sub-keys and the worst value for a key consists of 60 sub-keys.In conclusion,the best values are obtained using a key with a number of sub-keys not greater than 34 sub-keys.The correlation coefficient(CC)has the same value for all possible keys for the decryption algorithm.The SD has the best value for a key with 63 sub-keys and the worst value for a key with 23 sub-keys,and LLR has the best value with a key of 63 sub-keys and the worst value with 48 sub-keys.

    In conclusion,decryption with TD gives the best values when the number of sub-keys equals 63.So,in summary,to get the best quality for encryption with TD,use the number of sub-keys not greater than 34 sub-keys and the best quality for decryption when the number of sub-keys is 63.Also,the keys with the number of sub-keys 5,6 and 7 sub-keys give the best quality for the audio cryptosystem.

    For optimization and analysis,detailed statistics functions are applied.The secret keys that consist of sub-keys not greater than 34 sub-keys,or keys with the number of sub-keys equal 5,6 and 7,give the best results for better security and quality for audio cryptosystem in TD.

    4.1.3 Number of Applicable Secret Keys

    In the search for the possible applicable number of keys that can be used in TD that give best results for audio cryptosystem,will apply permutation and probability law [26],and Eq.(1),and all its governing presented conditions on the number of sub-keys that give best quality and security results driven from the previous sub-section which are 5,6 and 7 sub-keys.From Tab.5,there are approximately 5880 possible applicable keys from the region of the best keys that offer the best quality for audio speech cryptosystem with the TD.There are 120,720 and 5040 secret keys generated from sub-keys sizes 5,6 and 7,respectively,considering that some secret keys are repeated.

    Table 5:TD analysis of values of the available number of secret keys that give best quality results

    4.2 DCT Analysis

    4.2.1 Values of Sub-key

    It is apparent from Tab.6 that the keys used in recent research[7]exhibit the best values for both correlation coefficient(CC)and spectral distortion(SD)represented by Key 3 even when comparing values presented in recent research[7]with values presented in this paper in which both results obtained in a different testing environment.

    It is apparent from Tab.7 that key_1 and key_2 used in this research exhibit the best value for correlation coefficient(CC)and spectral distortion(SD),among other values in Tab.7.This is evidence that better quality can be achieved for the audio cryptosystem by changing the sub-keys values.In summary,with the DCT,there is no specified or well-defined rule for choosing values of sub-keys to get the best quality and security for the audio cryptosystem.

    Table 6:DCT analysis of values of sub-keys with the same testing environment

    Table 7:DCT analysis of values of sub-keys with different testing environment

    4.2.2 Number of Sub-keys-Secret Key Size&Audio Speech Block Size

    For the encryption algorithm’s analysis,the best value for correlation coefficient(CC)is for a key with the number of sub-keys equals 21 and the worst for a key consists of 52 sub-keys.For spectral distortion(SD),the best value for a key consists of 3 sub-keys,and the worst value for a key consists of 34 sub-keys.For the Log-Likelihood Ratio(LLR),the best value for a key consists of 3 sub-keys and the worst value for a key consists of 51 sub-keys.In conclusion,the best values for encryption with the DCT are using a key with the number of sub-keys not greater than 21 sub-keys.Also,it is better to consider a key with three sub-keys as the best choice for the best quality for encryption.

    For decryption analysis,the correlation coefficient best value(CC)is for a key with a number of sub-keys equals eight and the worst for a key consists of 63 sub-keys.The SD has the best value for a key with three sub-keys and the worst value for 63 sub-keys.The LLR has the best value with a key of 7 sub-keys and the worst value with 61 sub-keys.In conclusion,the decryption with DCT gives the best values when the number of sub-keys is with a lower number of sub-keys in the range of {3-8}sub-keys,while it gives the worst results with the number of sub-keys equals 63 sub-key.

    Also,it is seen that a key with sub-keys=3,4,6 and 7 sub-keys give the best results,but will consider only sub-keys=6 and 7,as 3 and 4 sub-keys represents weak keys easily to be broken or known.Several sub-keys not higher than 15 will give the best results for both encryption and decryption with cryptosystem in DCT,and in specific,with the number of sub-keys equal 6 and 7 sub-keys.

    4.2.3 Number of Applicable Secret Keys

    In the search for a possible applicable number of keys used in DCT,we will apply permutation and probability law[26]and Eq.(1)on the number of sub-keys that give the best quality and security results from the previous sub-section,which are 6 and 7 sub-keys.

    From Tab.8,there are a total approximate number of 5760 possible applicable keys from the region of the best keys that offer the best quality for audio speech cryptosystem with DCT,and there are 720 and 5040 secret keys that can be generated from sub-keys sizes 6 and 7 respectively,considering that some secret keys are repeated.

    Table 8:DCT analysis of values of the available number of secret keys that give best quality results

    4.3 DST Analysis

    4.3.1 Values of Sub-key

    It is apparent from Tab.9 that the Key_3 exhibits the best values for both correlation coefficients(CC)and spectral distortion(SD)even when comparing values presented in recent research[7]with values presented in this paper in which both results obtained in a different testing environment.

    It is apparent from Tab.10 that Key_3 and Key1 exhibit the best value for correlation coefficient(CC) and spectral distortion (SD),respectively,among other values presented in Tab.10.This is evidence that better quality can be achieved for audio cryptosystem by merely changing sub-keys values even in a different testing environment.In summary,with DST,there is no specified or well-defined rule for choosing values of sub-keys to get the best quality and security for the audio cryptosystem.

    Table 9:DST analysis of values of sub-keys with the same testing environment

    Table 10:DST analysis of values of sub-keys with different testing environment

    4.3.2 Number of Sub-keys-Secret Key Size&Audio Speech Block Size

    For the encryption algorithm’s analysis with DST,the best value for correlation coefficient(CC)is for a key with a number of sub-keys equals six and the worst for a key consists of 60 sub-keys.Likewise,for spectral distortion (SD),the best value for a key consists of 3 sub-keys and the worst value for a key consists of 33 sub-keys.Finally,for the Log-Likelihood Ratio (LLR),the best value for a key consists of 6 sub-keys and the worst value for a key consists of 24 sub-keys.Therefore,it is concluded that the best values for encryption with DST when using a key with the number of sub-keys is in the range{3-6}sub-keys.Also,we can consider a key with six sub-keys as the best choice for the best quality of encryption.

    For the decryption analysis,the correlation coefficient(CC)best value is for a key with a number of sub-keys equals four and the worst for a key consists of 63 sub-keys.SD has the best value for a key with four sub-keys and the worst value for 63 sub-keys.The LLR has the best value with a key of 8 sub-keys and the worst value with 28 sub-keys.It is concluded that decryption with DST gives the best values when the sub-keys are in the range{4-8}sub-keys.In summary,a key with four sub-keys is the best choice for the best quality for decryption.

    Also,the key with sub-keys in the range{3-12}sub-keys gives the best combined results.Sub-keys of 5 and 6 provide the best results.

    4.3.3 Number of Applicable Secret Keys

    In the search for a possible applicable number of keys that can be used in DST,will apply permutation and combination law [26]and represented in Eq.(1) on the number of sub-keys that give best quality and security results driven from the previous sub-section,which are 5 and 6 sub-keys.

    From Tab.11,there are approximately840 possible applicable keys from the region of the best keys that offer the best quality for audio speech cryptosystem with DST.Also,120 and 720 secret keys can be generated from sub-keys sizes 5 and 6,considering that some secret keys are repeated.

    Table 11:DCT analysis of values of the available number of secret keys that give best quality results

    5 Conclusions

    Values of sub-keys and the number of sub-keys used in any audio speech cryptosystem play an essential role in how much the audio system is secure and qualified.It is concluded from tests and simulation results that better quality and more audio secure cryptosystem is obtained when changing the used sub-keys.However,there is no well-defined rule for how to choose values of sub-keys.Also,there is a direct relationship between the applicable number of sub-keys,audio speech block size,and functional secret keys.Finally,each transform domain has a specific range of sub-keys that must be used to get the best quality and security results,and not all transform domains have the same range of the number of sub-keys.This conclusion will help in future research,especially which may be for comparison issues and optimizations.

    Acknowledgement:The authors would like to thank the Deanship of Scientific Research,Taif University Researchers Supporting Project number (TURSP-2020/08),Taif University,Taif,Saudi Arabia for supporting this research work.

    Funding Statement:This study was funded by the Deanship of Scientific Research,Taif University Researchers Supporting Project Number(TURSP-2020/08),Taif University,Taif,Saudi Arabia.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    一级a爱片免费观看的视频| 国产99久久九九免费精品| 国产成人精品无人区| 波多野结衣高清无吗| 又黄又粗又硬又大视频| 在线av久久热| 一夜夜www| 一a级毛片在线观看| ponron亚洲| 人人澡人人妻人| 99riav亚洲国产免费| 亚洲男人天堂网一区| 身体一侧抽搐| 窝窝影院91人妻| 国产国语露脸激情在线看| 亚洲性夜色夜夜综合| 乱人伦中国视频| 色综合婷婷激情| 欧美中文日本在线观看视频| 99国产精品一区二区蜜桃av| 国产高清激情床上av| 亚洲人成网站在线播放欧美日韩| 少妇的丰满在线观看| 中文欧美无线码| 亚洲精品美女久久久久99蜜臀| 亚洲精品中文字幕在线视频| 久久久久久久久中文| 久久精品国产亚洲av高清一级| 亚洲少妇的诱惑av| 美女国产高潮福利片在线看| 正在播放国产对白刺激| 青草久久国产| 亚洲av成人av| 大型黄色视频在线免费观看| 9热在线视频观看99| 亚洲欧洲精品一区二区精品久久久| tocl精华| 国产成人影院久久av| 嫁个100分男人电影在线观看| 日韩欧美一区二区三区在线观看| 97碰自拍视频| 国产精品久久久久成人av| 午夜成年电影在线免费观看| 欧美乱妇无乱码| 国产有黄有色有爽视频| 久久亚洲精品不卡| 久久久久久人人人人人| 欧美日韩国产mv在线观看视频| 91麻豆av在线| 超色免费av| 久久久久久大精品| avwww免费| 精品一区二区三区视频在线观看免费 | 国产精品亚洲av一区麻豆| 国产av又大| 久久久久久大精品| av在线播放免费不卡| 超碰97精品在线观看| 亚洲专区国产一区二区| 一级毛片女人18水好多| 成年女人毛片免费观看观看9| 久久久久久久精品吃奶| 90打野战视频偷拍视频| 99re在线观看精品视频| 亚洲伊人色综图| 亚洲av五月六月丁香网| av国产精品久久久久影院| 大码成人一级视频| 久久精品亚洲av国产电影网| 亚洲av电影在线进入| 日韩欧美一区视频在线观看| 亚洲精品国产区一区二| 又黄又粗又硬又大视频| 欧美久久黑人一区二区| 欧美黄色淫秽网站| 丝袜人妻中文字幕| 日韩视频一区二区在线观看| 99re在线观看精品视频| 国产99白浆流出| 757午夜福利合集在线观看| 91老司机精品| aaaaa片日本免费| 亚洲五月天丁香| 天天添夜夜摸| 亚洲激情在线av| 嫩草影视91久久| 欧美不卡视频在线免费观看 | 亚洲免费av在线视频| 18美女黄网站色大片免费观看| 中文字幕人妻丝袜制服| 两个人免费观看高清视频| 成人av一区二区三区在线看| 国产精品乱码一区二三区的特点 | 中文字幕av电影在线播放| 在线观看免费高清a一片| 一级a爱视频在线免费观看| 精品一区二区三区视频在线观看免费 | 女人精品久久久久毛片| 18禁裸乳无遮挡免费网站照片 | 国产精品 国内视频| 五月开心婷婷网| 亚洲国产精品999在线| 成人特级黄色片久久久久久久| 在线观看舔阴道视频| 最新美女视频免费是黄的| 桃色一区二区三区在线观看| 色精品久久人妻99蜜桃| 悠悠久久av| 怎么达到女性高潮| 亚洲人成电影观看| 国产精品日韩av在线免费观看 | 午夜91福利影院| 亚洲黑人精品在线| 久久久久久久午夜电影 | 99香蕉大伊视频| 99香蕉大伊视频| 一区在线观看完整版| 五月开心婷婷网| 久久精品国产亚洲av香蕉五月| 欧美亚洲日本最大视频资源| 欧美性长视频在线观看| 一本综合久久免费| 黄片播放在线免费| 成熟少妇高潮喷水视频| 黄色片一级片一级黄色片| 亚洲五月婷婷丁香| 亚洲国产精品一区二区三区在线| 国产成人精品在线电影| 十八禁网站免费在线| avwww免费| 丰满的人妻完整版| 新久久久久国产一级毛片| 欧美日韩黄片免| 老熟妇乱子伦视频在线观看| 国产成+人综合+亚洲专区| 国产99久久九九免费精品| 欧美中文综合在线视频| 在线观看免费午夜福利视频| 18禁裸乳无遮挡免费网站照片 | 欧美日韩福利视频一区二区| 国产精品久久视频播放| 成在线人永久免费视频| 中文字幕人妻丝袜制服| 国产一区二区在线av高清观看| 99热只有精品国产| 日韩欧美一区视频在线观看| 99久久人妻综合| 老汉色∧v一级毛片| 亚洲精品国产区一区二| 国产精品1区2区在线观看.| 亚洲欧美一区二区三区久久| 在线观看免费高清a一片| 国产在线精品亚洲第一网站| 国产av一区在线观看免费| 校园春色视频在线观看| 欧美黄色淫秽网站| 黄色片一级片一级黄色片| 在线观看日韩欧美| 精品一区二区三区四区五区乱码| 后天国语完整版免费观看| 十八禁人妻一区二区| 国产黄色免费在线视频| 91av网站免费观看| 日韩视频一区二区在线观看| 国产免费现黄频在线看| 国产一区二区激情短视频| 日本精品一区二区三区蜜桃| 日韩精品免费视频一区二区三区| 久久人人精品亚洲av| 日韩欧美国产一区二区入口| 99久久久亚洲精品蜜臀av| 久久精品91蜜桃| 在线观看免费视频日本深夜| 亚洲精品在线美女| 麻豆成人av在线观看| 亚洲av五月六月丁香网| www日本在线高清视频| 成人永久免费在线观看视频| 一本大道久久a久久精品| 黑人操中国人逼视频| 国产成人免费无遮挡视频| 人人澡人人妻人| 黄色a级毛片大全视频| 亚洲情色 制服丝袜| 天堂影院成人在线观看| 国内久久婷婷六月综合欲色啪| 大码成人一级视频| 伦理电影免费视频| svipshipincom国产片| 久久伊人香网站| 国内久久婷婷六月综合欲色啪| 亚洲国产中文字幕在线视频| 久久热在线av| 国产aⅴ精品一区二区三区波| av网站在线播放免费| 熟女少妇亚洲综合色aaa.| 国产97色在线日韩免费| av天堂久久9| 夜夜躁狠狠躁天天躁| 欧洲精品卡2卡3卡4卡5卡区| 欧美中文综合在线视频| 国产精品一区二区在线不卡| 亚洲情色 制服丝袜| av天堂久久9| 国产在线精品亚洲第一网站| 亚洲在线自拍视频| 国产精品电影一区二区三区| netflix在线观看网站| 99久久99久久久精品蜜桃| 亚洲在线自拍视频| 免费观看精品视频网站| 一级a爱视频在线免费观看| 日韩欧美国产一区二区入口| 天天躁夜夜躁狠狠躁躁| 日韩 欧美 亚洲 中文字幕| avwww免费| 国产主播在线观看一区二区| 国产蜜桃级精品一区二区三区| 亚洲激情在线av| 大陆偷拍与自拍| 黑丝袜美女国产一区| 国内毛片毛片毛片毛片毛片| 日日干狠狠操夜夜爽| 亚洲国产欧美一区二区综合| 两性夫妻黄色片| 别揉我奶头~嗯~啊~动态视频| 午夜老司机福利片| 桃色一区二区三区在线观看| 久久草成人影院| 成熟少妇高潮喷水视频| 天堂影院成人在线观看| 午夜免费鲁丝| 真人做人爱边吃奶动态| 久久精品亚洲精品国产色婷小说| 国产精品乱码一区二三区的特点 | 窝窝影院91人妻| 欧美乱码精品一区二区三区| 色综合婷婷激情| 久久精品亚洲精品国产色婷小说| 一区二区三区激情视频| 欧美日韩亚洲高清精品| 波多野结衣高清无吗| 亚洲第一av免费看| 久久精品国产清高在天天线| 午夜福利在线免费观看网站| 午夜亚洲福利在线播放| 久久天躁狠狠躁夜夜2o2o| a在线观看视频网站| av福利片在线| 少妇的丰满在线观看| 多毛熟女@视频| 亚洲精品久久午夜乱码| 91在线观看av| 手机成人av网站| 久久精品91蜜桃| 日韩成人在线观看一区二区三区| 精品一品国产午夜福利视频| 亚洲av美国av| 免费高清在线观看日韩| 亚洲av熟女| 夜夜夜夜夜久久久久| 婷婷丁香在线五月| 久久人妻av系列| 国产成人精品久久二区二区免费| 国产伦一二天堂av在线观看| 一级黄色大片毛片| 日韩精品青青久久久久久| 国产在线观看jvid| 丰满的人妻完整版| 美女高潮到喷水免费观看| 免费观看人在逋| 欧美精品一区二区免费开放| 99精品久久久久人妻精品| 国产精品亚洲av一区麻豆| www.精华液| 欧美最黄视频在线播放免费 | 国产欧美日韩一区二区三区在线| 日韩欧美国产一区二区入口| 男女下面进入的视频免费午夜 | 国产精品久久视频播放| 精品熟女少妇八av免费久了| 欧美成人免费av一区二区三区| 天堂影院成人在线观看| 久久久久久久久中文| 国产精品一区二区精品视频观看| 久久久久久人人人人人| 巨乳人妻的诱惑在线观看| 国产精品一区二区三区四区久久 | 亚洲人成电影免费在线| 亚洲成国产人片在线观看| 最新美女视频免费是黄的| 9191精品国产免费久久| av免费在线观看网站| 亚洲专区中文字幕在线| 少妇被粗大的猛进出69影院| 美女高潮喷水抽搐中文字幕| 视频在线观看一区二区三区| 夜夜躁狠狠躁天天躁| 精品福利观看| 巨乳人妻的诱惑在线观看| 19禁男女啪啪无遮挡网站| 久久热在线av| 不卡av一区二区三区| 好男人电影高清在线观看| 精品人妻在线不人妻| 欧美日本中文国产一区发布| 日本免费a在线| 女警被强在线播放| 正在播放国产对白刺激| 欧美日韩国产mv在线观看视频| 变态另类成人亚洲欧美熟女 | 亚洲欧美激情在线| 日韩精品青青久久久久久| 国产午夜精品久久久久久| 视频区图区小说| 亚洲男人的天堂狠狠| 又黄又粗又硬又大视频| 国产无遮挡羞羞视频在线观看| 国产真人三级小视频在线观看| 久久中文字幕人妻熟女| 日本一区二区免费在线视频| 国内久久婷婷六月综合欲色啪| 韩国av一区二区三区四区| 神马国产精品三级电影在线观看 | 日韩精品青青久久久久久| 久久天堂一区二区三区四区| 午夜福利免费观看在线| 亚洲人成电影观看| 欧美一级毛片孕妇| 在线观看舔阴道视频| 自线自在国产av| 久久精品国产清高在天天线| 国产精品 国内视频| 成人三级做爰电影| 91九色精品人成在线观看| 欧美亚洲日本最大视频资源| 宅男免费午夜| 最近最新中文字幕大全免费视频| 老司机午夜十八禁免费视频| 久久久久久久久中文| 久久人人97超碰香蕉20202| av有码第一页| 日韩人妻精品一区2区三区| 欧美黄色淫秽网站| 男男h啪啪无遮挡| 99久久久亚洲精品蜜臀av| 男人舔女人下体高潮全视频| 欧美日韩乱码在线| 女警被强在线播放| 国产精品 欧美亚洲| 国产伦一二天堂av在线观看| 少妇粗大呻吟视频| 亚洲激情在线av| 老鸭窝网址在线观看| 欧美成人免费av一区二区三区| 久久精品国产综合久久久| 韩国精品一区二区三区| 俄罗斯特黄特色一大片| 首页视频小说图片口味搜索| av电影中文网址| 国产成人系列免费观看| 天堂动漫精品| 亚洲五月天丁香| 久久久久国产一级毛片高清牌| 成人精品一区二区免费| 亚洲一区二区三区色噜噜 | 亚洲片人在线观看| 久久中文字幕一级| 久99久视频精品免费| 国产在线精品亚洲第一网站| 国产男靠女视频免费网站| 99精品欧美一区二区三区四区| 国产精品久久视频播放| 亚洲欧洲精品一区二区精品久久久| 亚洲专区国产一区二区| 99re在线观看精品视频| 成人黄色视频免费在线看| 国产伦一二天堂av在线观看| 精品国产一区二区三区四区第35| 久久性视频一级片| 一本综合久久免费| 1024香蕉在线观看| 成年女人毛片免费观看观看9| 一区二区三区激情视频| 日韩欧美免费精品| 看免费av毛片| 国产精品香港三级国产av潘金莲| 别揉我奶头~嗯~啊~动态视频| 亚洲午夜精品一区,二区,三区| 国产精品日韩av在线免费观看 | 国产精品久久电影中文字幕| 欧美一区二区精品小视频在线| 欧美激情高清一区二区三区| 丰满人妻熟妇乱又伦精品不卡| 在线观看www视频免费| 91成年电影在线观看| www国产在线视频色| 黄色成人免费大全| 91精品三级在线观看| 亚洲成a人片在线一区二区| 国产精品免费视频内射| 国产精品日韩av在线免费观看 | 久9热在线精品视频| 我的亚洲天堂| 热re99久久精品国产66热6| www.999成人在线观看| 国产欧美日韩一区二区精品| 伦理电影免费视频| 久久精品亚洲熟妇少妇任你| 亚洲欧美日韩无卡精品| 成人免费观看视频高清| 国产极品粉嫩免费观看在线| 久久 成人 亚洲| 老司机在亚洲福利影院| 久久精品国产亚洲av香蕉五月| cao死你这个sao货| 自拍欧美九色日韩亚洲蝌蚪91| 日日摸夜夜添夜夜添小说| 国产成人欧美| 日本免费a在线| 91大片在线观看| 成人三级黄色视频| 久久九九热精品免费| 色婷婷久久久亚洲欧美| 久久亚洲精品不卡| 最近最新中文字幕大全免费视频| 精品国产乱子伦一区二区三区| 国产亚洲精品第一综合不卡| 久久天躁狠狠躁夜夜2o2o| 麻豆一二三区av精品| 国产亚洲精品第一综合不卡| 夜夜爽天天搞| 窝窝影院91人妻| 巨乳人妻的诱惑在线观看| 大香蕉久久成人网| 看黄色毛片网站| 亚洲精品久久成人aⅴ小说| 国产欧美日韩一区二区精品| www日本在线高清视频| 亚洲av日韩精品久久久久久密| 搡老乐熟女国产| 搡老岳熟女国产| 久9热在线精品视频| 又黄又粗又硬又大视频| 男人舔女人下体高潮全视频| 中文欧美无线码| 免费在线观看视频国产中文字幕亚洲| 国产精品久久久人人做人人爽| 国产色视频综合| 人人妻,人人澡人人爽秒播| 老鸭窝网址在线观看| 看免费av毛片| 欧美黑人精品巨大| 无人区码免费观看不卡| 一二三四在线观看免费中文在| av有码第一页| www.精华液| 欧美日韩亚洲高清精品| 一个人观看的视频www高清免费观看 | 亚洲 国产 在线| 90打野战视频偷拍视频| av片东京热男人的天堂| 女人爽到高潮嗷嗷叫在线视频| 99国产精品免费福利视频| 久久午夜亚洲精品久久| 免费观看精品视频网站| 波多野结衣av一区二区av| 一区在线观看完整版| 亚洲一区中文字幕在线| 一二三四社区在线视频社区8| 老司机午夜福利在线观看视频| 麻豆久久精品国产亚洲av | 国产成人精品久久二区二区免费| 婷婷六月久久综合丁香| 97超级碰碰碰精品色视频在线观看| 国产精品亚洲一级av第二区| 精品久久久久久久毛片微露脸| 搡老乐熟女国产| 无遮挡黄片免费观看| 久久久国产成人免费| 精品少妇一区二区三区视频日本电影| 淫秽高清视频在线观看| 欧美久久黑人一区二区| 久久国产精品男人的天堂亚洲| 亚洲一卡2卡3卡4卡5卡精品中文| 亚洲av五月六月丁香网| 亚洲av电影在线进入| 国产成人av激情在线播放| 亚洲精品久久成人aⅴ小说| 欧美成人免费av一区二区三区| 欧美+亚洲+日韩+国产| 国产熟女午夜一区二区三区| 精品少妇一区二区三区视频日本电影| 最近最新中文字幕大全免费视频| 看黄色毛片网站| 欧美黄色片欧美黄色片| av天堂久久9| 在线观看一区二区三区| www国产在线视频色| 亚洲成人免费av在线播放| 97超级碰碰碰精品色视频在线观看| 大型黄色视频在线免费观看| 麻豆国产av国片精品| 激情视频va一区二区三区| 免费搜索国产男女视频| 窝窝影院91人妻| 亚洲精品粉嫩美女一区| 一级毛片精品| 美女高潮喷水抽搐中文字幕| 中文字幕最新亚洲高清| 午夜a级毛片| 久久久久久亚洲精品国产蜜桃av| 国产深夜福利视频在线观看| 欧美人与性动交α欧美精品济南到| 水蜜桃什么品种好| 人成视频在线观看免费观看| 咕卡用的链子| 国产成年人精品一区二区 | 国产精品亚洲一级av第二区| 午夜亚洲福利在线播放| 怎么达到女性高潮| 男女做爰动态图高潮gif福利片 | 国产精品一区二区三区四区久久 | 久久精品亚洲精品国产色婷小说| 国产精品一区二区三区四区久久 | 成人永久免费在线观看视频| 丰满的人妻完整版| 色综合欧美亚洲国产小说| 亚洲三区欧美一区| 18美女黄网站色大片免费观看| 中文字幕精品免费在线观看视频| 国产精品九九99| 久久久久精品国产欧美久久久| 一级a爱片免费观看的视频| 性少妇av在线| 伊人久久大香线蕉亚洲五| 一级片免费观看大全| 亚洲国产欧美网| 十八禁网站免费在线| 欧美中文综合在线视频| 亚洲精品一区av在线观看| 欧美乱妇无乱码| 免费日韩欧美在线观看| 嫩草影院精品99| 丁香六月欧美| 99国产精品免费福利视频| 正在播放国产对白刺激| 欧美午夜高清在线| 97超级碰碰碰精品色视频在线观看| 精品一区二区三区视频在线观看免费 | 欧美黑人精品巨大| 亚洲成a人片在线一区二区| 精品电影一区二区在线| 男人的好看免费观看在线视频 | 丰满人妻熟妇乱又伦精品不卡| 黄色 视频免费看| а√天堂www在线а√下载| 亚洲av成人一区二区三| 亚洲精品粉嫩美女一区| 最新美女视频免费是黄的| 婷婷六月久久综合丁香| 夫妻午夜视频| 91麻豆精品激情在线观看国产 | 男女午夜视频在线观看| 99在线视频只有这里精品首页| 国产亚洲精品久久久久久毛片| 亚洲欧美一区二区三区黑人| 色综合婷婷激情| 国产黄a三级三级三级人| 久久影院123| 一进一出好大好爽视频| 国产精品永久免费网站| 丰满的人妻完整版| 亚洲精品久久午夜乱码| 久久久久久大精品| 男男h啪啪无遮挡| 亚洲av电影在线进入| av电影中文网址| 国产精品自产拍在线观看55亚洲| av国产精品久久久久影院| 岛国视频午夜一区免费看| 高清在线国产一区| 久久精品aⅴ一区二区三区四区| 中文字幕色久视频| 最好的美女福利视频网| 国产97色在线日韩免费| av中文乱码字幕在线| 日本wwww免费看| 嫩草影视91久久| 久99久视频精品免费| 丝袜在线中文字幕| 欧美精品一区二区免费开放| 亚洲欧美激情在线| 免费看十八禁软件| 国产精品1区2区在线观看.| 久久久久久久精品吃奶| 欧美精品啪啪一区二区三区| 欧美激情高清一区二区三区| 韩国av一区二区三区四区| 嫩草影院精品99| 精品国产国语对白av| 亚洲狠狠婷婷综合久久图片| 男男h啪啪无遮挡| 国产一区二区在线av高清观看| av国产精品久久久久影院| 一二三四社区在线视频社区8| 最近最新中文字幕大全电影3 | 露出奶头的视频| 看黄色毛片网站| 亚洲av熟女| 热re99久久精品国产66热6| 国产国语露脸激情在线看| 黑人巨大精品欧美一区二区蜜桃| 成年人黄色毛片网站| 亚洲国产欧美日韩在线播放|