• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Artificial Intelligence Techniques Based Learner Authentication in Cybersecurity Higher Education Institutions

    2022-08-24 07:00:42AbdullahSaadALMalaiseALGhamdiandMahmoudRagab
    Computers Materials&Continua 2022年8期

    Abdullah Saad AL-Malaise AL-Ghamdi and Mahmoud Ragab

    1Information Systems Department,Faculty of Computing and Information Technology King Abdulaziz University,Jeddah,21589,Saudi Arabia

    2Information Technology Department,Faculty of Computing and Information Technology,King Abdulaziz University,Jeddah,21589,Saudi Arabia

    3Centre of Artificial Intelligence for Precision Medicines,King Abdulaziz University,Jeddah,21589,Saudi Arabia

    4Mathematics Department,Faculty of Science,Al-Azhar University,Naser City,11884,Cairo,Egypt

    Abstract: Education 4.0 is being authorized more and more by the design of artificial intelligence(AI)techniques.Higher education institutions(HEI)have started to utilize Internet technologies to improve the quality of the service and boost knowledge.Due to the unavailability of information technology (IT) infrastructures,HEI is vulnerable to cyberattacks.Biometric authentication can be used to authenticate a person based on biological features such as face,fingerprint,iris,and so on.This study designs a novel search and rescue optimization with deep learning based learning authentication technique for cybersecurity in higher education institutions,named SRODLLAC technique.The proposed SRODL-LAC technique aims to authenticate the learner/student in HEI using fingerprint biometrics.Besides,the SRODLLAC technique designs a median filtering(MF)based preprocessing approach to improving the quality of the image.In addition,the Densely Connected Networks (DenseNet-77) model is applied for the extraction of features.Moreover,search and rescue optimization(SRO)algorithm with deep neural network (DNN) model is utilized for the classification process.Lastly,template matching process is done for fingerprint identification.A wide range of simulation analyses is carried out and the results are inspected under several aspects.The experimental results reported the effective performance of the SRODL-LAC technique over the other methodologies.

    Keywords: Cybersecurity;authentication;biometrics;security;higher education institution;deep learning

    1 Introduction

    The use of digital learning environment (DLE) is increasing in the area of higher education institutions (HEI).Digitalization is the key solution to present problems:it enhances flexibility to higher educational study [1]and makes them available for every student,notwithstanding their personal life situations,disabilities,geo-graphical location,or exceptional global or local circumstance(for example COVID19).Also,increases the opportunity for different student populations in line with European higher education policy.This policy indicates a stronger commitment to enhancing the opportunity of different learners.Moreover,legislation associated with online education and services has been proposed [2].Also,In the EU,legislation for accessibility,security,and data transmission has become effective that has been increasing the awareness of these problems amongst end users.Meanwhile,the digitalization processes bring greater opportunities and also present various problems to HEI.Because of the possibility of impersonation,several online programs or online universities still provide the final examination in person and on campus as the only legitimate choice [3].Thus,enhancing learner authentication,emerging online educations,and mode of e-assessment is very important.

    An effective and reliable authentication scheme is the only assurance for the students’authorship and identity of the exams,assignments,or other online activities[4].When HEI provides usable and secure system for e-authentication,they are capable of producing more reliable environments for every student,including distant learners,adult and SEND students.The pandemic highlights the requirement for strong authentication in HEI[5].In addition,with the lack of IT infrastructure and teams,education institutions must have system in place for preventing identification and cybersecurity problems.Conventionally,biometric authentication has been modernized into on-boarding process and offers touchless solutions.But education can be a use case for biometric techniques as its aim is to resolve digital verification and identification[6].

    Biometric technologies work as a password but provide the user with improved peace of mind and security.The technique employs human features like voice or speaker recognition,facial recognition,or fingerprint recognition,to find the user.Biometrics is utilized for replacing passwords as well as streamlining into present multi-factor authentication system[7].Biometric multi-factor authentication is a powerful authentication system.With an appropriate biometric authentication in place,academic administrator no longer needs to worry about cybersecurity and identification problems.Streamlined biometric authentication into present security platform comes with more advantages [8].With biometrics,education institution uses distinct biometric models to remotely verify the identity and guarantee security of teachers and students.Decreasing the digital risk included in online education could lead to better outcomes and adaption resistance while using online education platforms.

    This study designs a novel search and rescue optimization with deep learning based learning authentication technique for cybersecurity in higher education institutions,named SRODL-LAC technique.The proposed SRODL-LAC technique designs a median filtering(MF)based preprocessing technology for optimizing the quality of the image.In addition,the Densely Connected Networks(DenseNet-77)model is applied for the extraction of features.Moreover,search and rescue optimization(SRO)algorithm with deep neural network(DNN)model is utilized for the classification process.Lastly,template matching process is done for fingerprint identification.For ensuring the enhanced performance of the SRODL-LAC technique,a comprehensive simulation analysis is carried out and the results are inspected under several aspects.

    The rest of the paper is organized as follows.Section 2 offers the related works,Section 3 discusses the proposed model,Section 4 validates the results,and Section 5 concludes the work.

    2 Literature Review

    Monaco et al.[9]respond to the institution’s needs of higher learning undertakes great access control effort,by adapting identification technology as they become accessible,to guarantee that student of records is accessing the system and taking the exam online course.Statistics Performance on stylometry,keystroke,and integration of both methods were attained on information from thirty students taking examinations in university courses.Laamanen et al.[10]examine SEND student view regarding the usage of e-authentication system,including perceived advantages and disadvantages of new technique-enhanced assessment.

    Guillén-Gámez et al.[11]focus on examining the perception of a group of students on the effect on the teaching-learning method of biometric authentication system named Smowl.To satisfy these objectives,researchers developed quasi-experiment research with 2 groups of fifty students,one utilizing Smowl technique and the other not.The result shows a comparison of the perception of these two groups,and find out that student who has utilized this method is highly favourable towards these tools.

    Goyal et al.[12]introduced an approach based on incorporation of signature of a person,face recognition,and voice authentication technique to identify in e-learning scheme.The aforementioned methods are extensively utilized for authenticating identity of the individual.The major concerns are to demotivate unknown users from taking the examinations on behalf of the learners.To prevent the fraudulent management of e-learning systems,the verification-based voice recognition method has been deliberated as an effective method in the study.

    Kamaraj et al.[13]verify the identity of learners by extracting the prosodic feature of the speech signals.TIMIT Acoustic-Phonetic Continuous Speech Corpus is utilized for the authentication of learners via articulation and prosodic characteristics namely formants,energy,and pitch.The articulation features include formants (F1-F7),and prosodic features include pitch (F0).From this dataset,during the testing process,160 learners have been utilized and in the training process,two hundred learners have been utilized.The formants and pitch have been extracted by linear prediction analysis.The first 7 formants have been utilized for authentication purposes.The feature set comprises 8 features and that are fed to the Guassian mixture method.In the Gaussian mixture method,parameter is evaluated from the testing and training data through the iterative expectationmaximization.Log probability scores are calculated by this parameter,later this score is normalized to make decision.

    AV et al.[14]presented the use of Keystroke dynamics-based authentication(KDA)as a solution to the verification of users in online examination and present a comprehensive study on the process of KDA,the factor that affects the efficiency of KDA,the application in distinct fields,as well as some keystroke dynamics-based data sets for authenticating the user at the time of online examination.

    3 The Proposed Model

    In this study,an effective SRODL-LAC technique has been developed for biometric authentication in HEIs.The proposed SRODL-LAC technique incorporates several stages of operations such as MF based preprocessing,DenseNet-77 based feature extraction,DNN based classification,SRO based hyperparameter tuning.The design of SRO algorithm aids in appropriately choosing the hyperparameter values of the DenseNet-77 module.Fig.1 illustrates the overall procedure of SRODLLAC technique.

    Figure 1:Overall process of SRODL-LAC technique

    3.1 Pre-processing

    MF because of its specificity has the maximum application in healthcare image noise removal[15].The key concept behindhand median filtering is to provide anm×nneighborhood for assembling each neighborhood in the ascending order,choose the median values of the ordered number,and replace the central pixel.It can be formulated by Eq.(1):

    In whichCdenotes the centered neighborhood around position(m,n)of the image.

    3.2 DenseNet Based Feature Extraction

    In this method,we employed DenseNet-77 at the feature extraction of the CBIR technique.Using DenseNet-77 for feature calculation exhibit improvements in computational complexity and segmentation accuracy.The initial layer computes lower-level key points from the image,viz.,corner,and edge data,and the deep layer calculates higher-level key points,viz.,chrominance,and structure data.The extracted feature maps are improved by the FPN that calculate the key point using enhanced object representations at different scales for the RPN model.DenseNet[16]method is an improved or advanced version of Resnet,in which the present layer belongs to each layer.DenseNet comprises the set of dense blocks that are successively connected to one another through the additional pooling and convolutional layers amongst successive dense blocks.DenseNet presents the complex transformation that leads to enhancing the problem of the absence of the target position data for the top-level key point to certain extent.DenseNet decreases the overall parameters that make it cost-effective.Moreover,it assists in calculating the key point and encourages them to recycle which makes them applicable for regional classification in retinal images.Therefore,we used the DenseNet-77 as a feature extractor for Mask-RCNN.Also,it indicates the query sampled size must be accommodated beforehand calculating key points from the paid layer[17].The DenseNet-77 has two possible differences from conventional DenseNet:(i)it has a small amount of parameters when compared to the actual method and(ii)the layer inside each dense block is altered for overcoming the computation difficulty.

    3.3 Optimal DNN Based Authentication

    The feature vectors derived from the DenseNet model are passed into the DNN model for the authentication process.DNN is an extended version of Multilayer Perceptron (MLP),which comes under the kind of Feed Forward Neural Networks (FFNN) with many layers comprising of input,output,and hidden layers.Every individual layer includes some neurons and is linked to the neurons in the forward course.It can be represented as follows:asO:Rm×Rn.The input vectorx=x1,x2,x3,...,xmwith the size of is,‘m’and the output vector isO(x)with the size of ‘n’.The processing ability of every individual hidden layerhjcan be represented by

    The neurons in the low end are linked to the neuronj.In Eqs.(8)and(9),x(il)indicates a neuroniactivation function at layerlandZijindicates the involvement of neuroniat layerlto the activation of neuronjat layerl+1.The functionf,represent the weight anddenotes bias of neuronj.It makes use of softmax function to classify the data.The multiple stacking of hidden layer MLP is known as DNN[18].Fig.2 showcases the infrastructure of DNN technique.

    Figure 2:Structure of DNN model

    The DNN model with several hidden layers can be defined using Eq.(4):

    The DNN model involves a set of two hidden layers.It receives the input asx=x1,x2,x3,...,xmand output will beo=o1,o2,...,oc-1,oc.The DNN with every individual hidden layer holds ReLU,a nonlinear activation function.It assists in reducing the condition of gradient vanishing problems.The ReLU is quicker and simpler for training the models with several hidden states.The loss function can be represented as an optimum variable and it is needed to accomplish improved outcomes.The targeted and predicted value variances can be determined via the loss function,as given below.

    In which,tandpdenote target and predicted values correspondingly.The loss function assists in identifying the forecasted values that vary from the targeted values.The target fed into the algorithm along with the features for calculating the loss function and classifying the attacks.The negative log likelihood withtand likelihood distributionp(pd)is employed for predicted and target classes correspondingly in multiclass classification.It can be expressed in the following equation as below:

    For adjusting the hyperparameter values of the DenseNet model,the SRO algorithm is utilized.The SAR technique was presented by Shabani et al.[19]dependent upon process of detecting the lost people or people from distress.The SAR function consists of 2 phases that are social and individual stages.During the social stage,the search is dependent upon clues initiated by set,and the quality of present clues from defining novel regions in which optimum clue is initiated.During the individual stage,exploring was complete by individual members of set irrespective of the place of clues establish from others.This technique begins with arbitrary initialized of populationsNof dimensionalD,whereas optimumN/2 place vector is chosen to human place matrixUbut rest procedure a memory matrix H.The clue matrix CL was generated by appendUandHmatrices as demonstrated in(7).TheH,and CL matrices were upgraded to combined as social as well as individual stages.The effort of humans from social stage was explained in Eq.(8),wherek≠iand(j=1,...,D)

    whereandUi,jrepresents the novel place and existing location tojthdimensional ofithhuman correspondingly.CLk,jrefers the place tojthdimensional ofkthestablish clue.f(U)andf(CL)are FF values toUiandCLkcorrespondingly.r1 and r2 imply the uniform distribution number from the interval of[-1,1]and[0,1]correspondingly,in whichr1 refers the similar to every dimensional and r2 signifies the varying to all dimensions.jranddefines the arbitrary number difference amongst 1 andDthat creates minimum one dimensional ofvarying inUi,j.The algorithmic parameters SE is named as social effect distinct in zero and one.It controls the effects of set members on each one from social stage[20].During the individual stage,search was complete around its existing place by humans.The formula to effort of humans from the individual stage is written as:

    wherekandmstand for the arbitrary numbers distinct amongst [1,N].r3 denotes the uniformly distributed number from range of zero and one.In SAR technique,the boundary controls of novel places of individuals are completed by the subsequent formula.

    whereandare the minimal and maximal bounds tojthdimensional correspondingly.The memory matrix (H) and human place matrix (U) were obtaining upgrades then all phases from all iterations.Once the fitness value of novel placef(Ui′)is superior to preceding onef(Ui),next the preceding placeUiis obtain saved from any arbitrary place ofHbased on Eq.(12),but a novel placeis saved fromUutilizing in Eq.(13).Else,this novel place is rejected and memory upgrade is not occurring.

    In(12),Hnimplies the place ofnthsaved clues from the memory matrix andnrefer the arbitrary integer from the range of(1,N/2).This memory upgrade procedure improves the ability of technique to define global optimal.Time factor is paramount significance from SAR functions,as delay from finding lost people it could be injured is outcome from its deaths.So,SAR function is complete in this manner which the huge feasible region is explored from shortest feasible time.Therefore,afterward,a particular amount of searches,when a human is not defined optimum clue around his/her existing place,afterward he/she leaves which place and is move to entirely novel place.This performance is modeled by written as represented in Eqs.(14)and(15).The algorithmic parameterμis fixed as 70×D.

    where r4 implies the uniformly distributed arbitrary number lying from the rangezeroto one.

    3.4 Template Matching Process

    Template matching can be performed by utilizing the DNN system [21].The DNN utilizes Euclidean distance that is estimated as follows:

    The DNN method allocates a class label to all the minutiae.Next,the k closest member is found by calculating the Euclidean distance among the minutiae.In this study,the value allocated for k is 2.Therefore,the process finds two nearest minutiae for all the minutia.Later,during matching,a local matching can be done to find out that minutiae in the query fingerprint match with the minutiae in the fingerprint template in the database.Next,a global matching can be performed for finding minutiae of the query fingerprint matches with the minutiae of the template fingerprints.According to that,a matching score is created that provides an indication of either the fingerprints match with any of the fingerprints in the database.

    4 Performance Validation

    The performance validation of the SRODL-LAC technique takes place using different biometric fingerprint images.The results are inspected under five distinct runs of execution.

    Fig.3 illustrates the confusion matrices presented by the SRODL-LAC methodology on the biometric authentication process under five runs.The results indicated that the SRODL-LAC technique has accomplished effective authentication outcomes under every run.For instance,with run-1,the SRODL-LAC technique has categorized 105 instances into accept class and 11128 instances into reject class.Besides,with run-2,the SRODL-LAC approach has classified 106 instances into accepting class and 11126 instances into reject class.Moreover,with run-3,the SRODL-LAC method has categorized 104 instances into accept class and 11125 instances into reject class.Furthermore,with run-4,the SRODL-LAC algorithm has classified 104 instances into accepting class and 11128 instances into reject class.Eventually,with run-5,the SRODL-LAC system has considered 104 instances into accepting class and 11125 instances into reject class.

    Tab.1 and Fig.4 illustrate the result analysis of the SRODL-LAC technique on the applied test runs.The results show that the SRODL-LAC technique has resulted in increased values of accuracy.At the same time,the SRODL-LAC technique has demonstrated reduced values of FAR,FRR,EER<,and CT.For instance,with run-1,the SRODL-LAC technique has provided FAR,FRR,accuracy,EER,and CT of 0.0002,0.0094,0.9997,0.0003,and 59 s respectively.Along with that,with run-2,the SRODL-LAC system has offered FAR,FRR,accuracy,EER,and CT of 0.0004,0.0000,0.9996,0.0004,and 61 s correspondingly.Likewise,with run-3,the SRODL-LAC approach has provided FAR,FRR,accuracy,EER,and CT of 0.0004,0.0189,0.9994,0.0006,and 58 s respectively.Similarly,with run-4,the SRODL-LAC methodology has provided FAR,FRR,accuracy,EER,and CT of 0.0002,0.0189,0.9996,0.0004,and 60 s correspondingly.At last,with run-5,the SRODL-LAC algorithm has offered FAR,FRR,accuracy,EER,and CT of 0.0004,0.0189,0.9994,0.0006,and 59 s correspondingly.

    Table 1:Result analysis of proposed srodl-lac technique on different runs

    Figure 4:Result analysis of SRODL-LAC technique with distinct runs.(a) FAR,(b) Accuracy,(c)FRR,and(d)EER

    Comparative result analysis of the SRODL-LAC approach with current DL models takes place in Tab.2 and Fig.5.The results show that the VGG-16 and CNN methodologies have obtained ineffective performance over the other methods.At the same time,the FCN-CRF technique has attained slightly increased performance.In line with,the LSTM and ResNet-152 models have resulted in moderately improved outcomes over the other methods except DenseNet-161 model.Though the DenseNet-161 model has showcased reasonable performance with the accuracy,EER,and CT of 98.83%,1.17%,and 131 s,the presented SRODL-LAC technique has accomplished superior results with the accuracy,EER and CT of 99.95%,0.05%,and 59 s respectively.

    Table 2:Result analysis of proposed SRODL-LAC technique with existing methods

    Tab.3 illustrates the comparative analysis of SRODL-LAC methodology with ML approaches interms of various measures [22].Fig.6 showcases the sensitivity and specificity analysis of the proposed SRODL-LAC approach with ML models.From the figure,it can be clear that the DT method has accomplished minimum outcome with the sensitivity and specificity of 92.83% and 88.24%.Also,the SVM system has gained somewhat higher outcomes with the sensitivity and specificity of 93.90% and 98.89%.Besides,the RF technique has resulted in moderately increased performance with the sensitivity and specificity of 94.54% and 92.67%.But,the KNN system has reached reasonable outcomes with the sensitivity and specificity of 95.65%and 94.54%,the projected SRODL-LAC technique has depicted the other methods with the maximal sensitivity and specificity of 98.68%and 99.97%.

    Fig.7 illustrates the accuracy analysis of the proposed SRODL-LAC technique with ML models.From the figure,it is apparent that the DT process has accomplished least outcome with an accuracy of 89.65%.At the same time,the KNN model has gained somewhat improved results with an accuracy of 92.37%.Along with that,the RF model has resulted in moderately increased performance with an accuracy of 95.47%.Though the SVM model has reached effective outcomes with an accuracy of 97.86%,the presented SRODL-LAC technique has outperformed the other techniques with the maximum accuracy of 99.95%.

    Fig.8 exhibits the F-score and precision analysis of the presented SRODL-LAC system with ML techniques.From the figure,it is obvious that the DT approach has accomplished least outcome with the precision and F-score of 84% and 90.47%.Simultaneously,the RF model has gained somewhat increased outcomes with the precision and F-score of 92.95% and 87.95%.Likewise,the SVM methodology has resulted in moderately superior performance with the precision and F-score of 94.71%and 97.76%.Followed by,the KNN method has reached reasonable outcome with the precision and F-score of 96.90%and 95.09%,the presented SRODL-LAC methodology has demonstrated the other techniques with the higher F-score and precision of97.67%and 96.68%.

    Figure 5:Comparative analysis of SRODL-LAC technique

    Table 3:Comparative analysis of SRODL-LAC technique with existing methods

    Figure 6:Sensitivity and specificity analysis of SRODL-LAC technique

    Figure 7:Accuracy analysis of SRODL-LAC technique

    Figure 8:Precision and F-score analysis of SRODL-LAC technique

    5 Conclusion

    In this study,an SRODL-LAC technique has been developed for biometric authentication in HEIs.The proposed SRODL-LAC technique incorporates several stages of operations such as MF based preprocessing,DenseNet-77 based feature extraction,DNN based classification,SRO based hyperparameter tuning.The design of SRO methodology aids in appropriately choosing the hyperparameter values of the DenseNet-77 model.For ensuring the enhanced performance of the SRODL-LAC technique,a comprehensive simulation analysis is carried out and the results are inspected under several aspects.The experimental results reported the outstanding performance of the SRODL-LAC technique over the other techniques.Therefore,the SRODL-LAC technique can be applied as an effective approach for biometric authentication in HEIs.In future,the authentication performance can be improved by using fusion based DL models.

    Acknowledgement:The authors extend their appreciation to the Deputyship for Research&Innovation,Ministry of Education in Saudi Arabia for funding this research work through the project number(IFPRC-154-611-2020)and King Abdulaziz University,DSR,Jeddah,Saudi Arabia.

    Funding Statement:This project was supported financially by Institution Fund projects under grant no.(IFPRC-154-611-2020).

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    国产免费视频播放在线视频| 天天躁日日躁夜夜躁夜夜| 国产精品99久久99久久久不卡| 18禁观看日本| 美女高潮喷水抽搐中文字幕| 又大又爽又粗| 亚洲欧洲日产国产| av免费在线观看网站| 在线观看一区二区三区激情| 天天添夜夜摸| 国产成人一区二区三区免费视频网站| 黄片播放在线免费| 婷婷成人精品国产| 国产一区二区三区综合在线观看| 欧美日韩成人在线一区二区| 久久久国产一区二区| 搡老熟女国产l中国老女人| 国产高清视频在线播放一区 | 人人妻人人澡人人看| 亚洲国产精品一区三区| 超碰97精品在线观看| 久久久精品免费免费高清| 大型av网站在线播放| 国产区一区二久久| 免费一级毛片在线播放高清视频 | 亚洲第一青青草原| 日韩大码丰满熟妇| 亚洲国产精品一区三区| 另类精品久久| 91精品三级在线观看| 久久精品亚洲av国产电影网| 亚洲国产精品一区三区| 国产一级毛片在线| 亚洲成av片中文字幕在线观看| 一级,二级,三级黄色视频| 亚洲第一欧美日韩一区二区三区 | 午夜激情av网站| 国产成人系列免费观看| 国产免费福利视频在线观看| 婷婷丁香在线五月| 日韩 亚洲 欧美在线| 美女午夜性视频免费| 免费观看人在逋| 99久久精品国产亚洲精品| 国产成人a∨麻豆精品| 纯流量卡能插随身wifi吗| www.999成人在线观看| a在线观看视频网站| av一本久久久久| a 毛片基地| 美女午夜性视频免费| 满18在线观看网站| 欧美另类一区| 亚洲三区欧美一区| 精品人妻熟女毛片av久久网站| 日韩大码丰满熟妇| 欧美久久黑人一区二区| 国产亚洲一区二区精品| 欧美黑人欧美精品刺激| 免费观看a级毛片全部| 免费在线观看日本一区| 好男人电影高清在线观看| 啦啦啦 在线观看视频| 亚洲天堂av无毛| 一级毛片女人18水好多| 丝瓜视频免费看黄片| 久久久国产精品麻豆| 日本wwww免费看| 国产免费视频播放在线视频| 国产在线一区二区三区精| 日韩视频一区二区在线观看| 精品国产一区二区久久| 91九色精品人成在线观看| 十八禁高潮呻吟视频| 丝袜美腿诱惑在线| 大码成人一级视频| 欧美激情久久久久久爽电影 | 啪啪无遮挡十八禁网站| 欧美精品av麻豆av| 秋霞在线观看毛片| 亚洲精品美女久久久久99蜜臀| 久9热在线精品视频| 脱女人内裤的视频| 亚洲成人免费av在线播放| 黄色视频,在线免费观看| 老司机午夜十八禁免费视频| 欧美国产精品va在线观看不卡| 另类精品久久| 精品视频人人做人人爽| 亚洲中文字幕日韩| a 毛片基地| 精品亚洲乱码少妇综合久久| 女人久久www免费人成看片| 1024视频免费在线观看| 国产精品国产av在线观看| 国产又色又爽无遮挡免| 一个人免费在线观看的高清视频 | 性少妇av在线| 91老司机精品| 岛国在线观看网站| 男女无遮挡免费网站观看| av有码第一页| 亚洲人成电影免费在线| 一级毛片女人18水好多| 蜜桃国产av成人99| 91麻豆精品激情在线观看国产 | 亚洲精品国产一区二区精华液| 99久久99久久久精品蜜桃| 好男人电影高清在线观看| 老汉色av国产亚洲站长工具| 一区二区三区精品91| 亚洲欧洲精品一区二区精品久久久| 欧美 亚洲 国产 日韩一| 日韩制服丝袜自拍偷拍| 亚洲精品国产精品久久久不卡| 久久女婷五月综合色啪小说| 电影成人av| 精品一区二区三区四区五区乱码| 久久影院123| 9热在线视频观看99| 亚洲成人免费av在线播放| 99国产综合亚洲精品| 十八禁人妻一区二区| svipshipincom国产片| 超碰成人久久| 12—13女人毛片做爰片一| 久久毛片免费看一区二区三区| 日韩三级视频一区二区三区| 男女边摸边吃奶| av福利片在线| 夫妻午夜视频| 国产亚洲精品一区二区www | 老鸭窝网址在线观看| 久久免费观看电影| 国产精品秋霞免费鲁丝片| 国产精品免费大片| 色视频在线一区二区三区| 两性午夜刺激爽爽歪歪视频在线观看 | 性色av乱码一区二区三区2| 国产熟女午夜一区二区三区| 各种免费的搞黄视频| 高潮久久久久久久久久久不卡| 国产精品久久久久久精品电影小说| 91成人精品电影| 亚洲黑人精品在线| av国产精品久久久久影院| av在线app专区| 伊人亚洲综合成人网| 亚洲情色 制服丝袜| 女人被躁到高潮嗷嗷叫费观| 欧美xxⅹ黑人| 黄色a级毛片大全视频| 日韩制服丝袜自拍偷拍| 一级,二级,三级黄色视频| 日本av手机在线免费观看| 日韩欧美国产一区二区入口| 最近最新中文字幕大全免费视频| 国精品久久久久久国模美| 午夜免费成人在线视频| 亚洲激情五月婷婷啪啪| 色播在线永久视频| 亚洲国产看品久久| 亚洲欧美成人综合另类久久久| 日韩免费高清中文字幕av| 两个人免费观看高清视频| 国产一区二区三区av在线| 色播在线永久视频| 精品一品国产午夜福利视频| 久久精品久久久久久噜噜老黄| 一本大道久久a久久精品| 国产欧美日韩一区二区三 | 麻豆乱淫一区二区| 叶爱在线成人免费视频播放| 高清在线国产一区| 精品人妻1区二区| av网站免费在线观看视频| 亚洲国产精品一区三区| 日韩制服丝袜自拍偷拍| 久久人妻熟女aⅴ| av福利片在线| 丰满少妇做爰视频| 无遮挡黄片免费观看| 午夜福利在线免费观看网站| 一级毛片电影观看| 999精品在线视频| 国产精品av久久久久免费| 亚洲avbb在线观看| 人人妻,人人澡人人爽秒播| 69av精品久久久久久 | 国产高清视频在线播放一区 | 欧美成人午夜精品| 欧美xxⅹ黑人| 天堂8中文在线网| av在线app专区| 久久精品成人免费网站| 精品少妇内射三级| 欧美变态另类bdsm刘玥| 女警被强在线播放| 亚洲中文字幕日韩| 大型av网站在线播放| 欧美久久黑人一区二区| 国产一区有黄有色的免费视频| 日韩大码丰满熟妇| 一区二区三区乱码不卡18| 国产不卡av网站在线观看| 亚洲欧美成人综合另类久久久| a 毛片基地| 国产精品二区激情视频| av网站在线播放免费| 成人av一区二区三区在线看 | 一区二区三区激情视频| 免费高清在线观看日韩| 黑人欧美特级aaaaaa片| 久久精品国产a三级三级三级| 精品福利永久在线观看| 人妻人人澡人人爽人人| 80岁老熟妇乱子伦牲交| 免费不卡黄色视频| 成年人午夜在线观看视频| 国产免费av片在线观看野外av| 美女主播在线视频| 美女国产高潮福利片在线看| 99国产精品免费福利视频| 最新在线观看一区二区三区| 国产精品免费视频内射| 国产三级黄色录像| 久久影院123| 国产亚洲av片在线观看秒播厂| 欧美亚洲 丝袜 人妻 在线| 午夜91福利影院| 蜜桃在线观看..| 亚洲伊人久久精品综合| 国产亚洲一区二区精品| 啪啪无遮挡十八禁网站| 女人爽到高潮嗷嗷叫在线视频| 国产91精品成人一区二区三区 | 精品卡一卡二卡四卡免费| 在线永久观看黄色视频| 中文字幕色久视频| 精品国产超薄肉色丝袜足j| 91av网站免费观看| 50天的宝宝边吃奶边哭怎么回事| 欧美在线黄色| 国产黄频视频在线观看| 老熟妇乱子伦视频在线观看 | 两个人看的免费小视频| 亚洲成人免费av在线播放| 制服诱惑二区| 色婷婷久久久亚洲欧美| 国产欧美日韩一区二区三 | 性色av一级| 性色av乱码一区二区三区2| xxxhd国产人妻xxx| 亚洲伊人色综图| 国产精品自产拍在线观看55亚洲 | 狠狠婷婷综合久久久久久88av| 久久综合国产亚洲精品| h视频一区二区三区| 久久精品久久久久久噜噜老黄| 亚洲专区国产一区二区| 免费高清在线观看日韩| 丁香六月欧美| 精品乱码久久久久久99久播| 黑人猛操日本美女一级片| 黑人巨大精品欧美一区二区蜜桃| tocl精华| 亚洲精品第二区| 狠狠婷婷综合久久久久久88av| 精品少妇久久久久久888优播| 美女午夜性视频免费| 日本一区二区免费在线视频| 999精品在线视频| 美女大奶头黄色视频| 久久精品国产综合久久久| 美女高潮喷水抽搐中文字幕| 欧美另类一区| 日本91视频免费播放| 麻豆国产av国片精品| 下体分泌物呈黄色| 欧美激情极品国产一区二区三区| 国产人伦9x9x在线观看| 欧美黑人精品巨大| 国产精品亚洲av一区麻豆| 超碰97精品在线观看| av网站免费在线观看视频| 亚洲欧美一区二区三区久久| 十八禁网站免费在线| 夫妻午夜视频| 久久精品熟女亚洲av麻豆精品| 国产成人av教育| 国产视频一区二区在线看| 精品免费久久久久久久清纯 | av天堂久久9| 无遮挡黄片免费观看| 日韩有码中文字幕| 999久久久精品免费观看国产| 国产精品久久久久久人妻精品电影 | 亚洲国产欧美网| 99精品欧美一区二区三区四区| 国产男人的电影天堂91| 搡老岳熟女国产| 国产麻豆69| 国产成人欧美| 欧美亚洲 丝袜 人妻 在线| a级毛片黄视频| 国内毛片毛片毛片毛片毛片| 欧美乱码精品一区二区三区| 午夜福利在线免费观看网站| 精品高清国产在线一区| 亚洲av日韩精品久久久久久密| 淫妇啪啪啪对白视频 | 爱豆传媒免费全集在线观看| 精品人妻一区二区三区麻豆| 性少妇av在线| 韩国精品一区二区三区| 99精品久久久久人妻精品| 国产亚洲av高清不卡| 亚洲欧美一区二区三区黑人| 一本综合久久免费| 亚洲性夜色夜夜综合| 天堂8中文在线网| 久热这里只有精品99| 操美女的视频在线观看| 自线自在国产av| 亚洲美女黄色视频免费看| 日韩 亚洲 欧美在线| 成年美女黄网站色视频大全免费| 亚洲av成人一区二区三| 视频区欧美日本亚洲| 黑人欧美特级aaaaaa片| 18禁国产床啪视频网站| 成人影院久久| 久久久欧美国产精品| 欧美一级毛片孕妇| 91成人精品电影| 日本一区二区免费在线视频| 久久久久久人人人人人| 久久久国产成人免费| 侵犯人妻中文字幕一二三四区| 欧美激情高清一区二区三区| 亚洲成人手机| 午夜福利免费观看在线| xxxhd国产人妻xxx| 99re6热这里在线精品视频| 精品一区在线观看国产| av欧美777| 各种免费的搞黄视频| 99久久人妻综合| 中文字幕人妻熟女乱码| 老熟妇仑乱视频hdxx| 两性夫妻黄色片| 亚洲精品成人av观看孕妇| 亚洲国产精品一区二区三区在线| av不卡在线播放| 99国产综合亚洲精品| 亚洲av片天天在线观看| 欧美日韩中文字幕国产精品一区二区三区 | 99久久国产精品久久久| 亚洲精品国产av蜜桃| 国产av又大| 建设人人有责人人尽责人人享有的| 亚洲黑人精品在线| 97人妻天天添夜夜摸| 中文字幕另类日韩欧美亚洲嫩草| 精品国产国语对白av| 亚洲av日韩精品久久久久久密| 国产99久久九九免费精品| 国产免费av片在线观看野外av| av网站在线播放免费| 亚洲欧美色中文字幕在线| 国产成人免费观看mmmm| 国产精品影院久久| 日本撒尿小便嘘嘘汇集6| 午夜精品国产一区二区电影| bbb黄色大片| 欧美亚洲日本最大视频资源| 午夜精品久久久久久毛片777| 激情视频va一区二区三区| 麻豆av在线久日| 日韩 亚洲 欧美在线| 国产精品久久久久久人妻精品电影 | 欧美激情久久久久久爽电影 | 大码成人一级视频| 亚洲国产看品久久| 一级片'在线观看视频| 国产成人系列免费观看| 成人三级做爰电影| 精品一品国产午夜福利视频| 搡老乐熟女国产| 亚洲第一青青草原| 看免费av毛片| 亚洲av日韩精品久久久久久密| 91精品伊人久久大香线蕉| 色94色欧美一区二区| 亚洲国产欧美网| 黑丝袜美女国产一区| 人妻人人澡人人爽人人| 高清黄色对白视频在线免费看| 国产精品久久久久成人av| 国产免费福利视频在线观看| 欧美精品亚洲一区二区| 亚洲人成电影观看| 婷婷成人精品国产| 久久久精品国产亚洲av高清涩受| av天堂在线播放| 夜夜夜夜夜久久久久| 午夜福利视频在线观看免费| 人妻久久中文字幕网| 国产精品久久久av美女十八| 高清av免费在线| 日韩欧美一区视频在线观看| 日韩人妻精品一区2区三区| 精品久久久精品久久久| 在线观看一区二区三区激情| 另类亚洲欧美激情| 最近最新免费中文字幕在线| 一本久久精品| 视频区欧美日本亚洲| 国产一区二区 视频在线| 日韩中文字幕欧美一区二区| 久久人妻熟女aⅴ| 国产成人a∨麻豆精品| 亚洲精品美女久久av网站| 国产精品一区二区免费欧美 | 免费女性裸体啪啪无遮挡网站| av国产精品久久久久影院| 1024香蕉在线观看| 人妻久久中文字幕网| 妹子高潮喷水视频| 一级,二级,三级黄色视频| 人人妻人人添人人爽欧美一区卜| 亚洲国产看品久久| 少妇人妻久久综合中文| 超碰97精品在线观看| 交换朋友夫妻互换小说| 国产1区2区3区精品| 热99久久久久精品小说推荐| 黄色a级毛片大全视频| 国产三级黄色录像| 欧美人与性动交α欧美软件| a级毛片在线看网站| 亚洲中文字幕日韩| 在线观看免费日韩欧美大片| 国产精品久久久久久精品电影小说| 成年人免费黄色播放视频| 国产精品一区二区在线观看99| 色视频在线一区二区三区| 一区二区日韩欧美中文字幕| 人妻久久中文字幕网| 久久国产精品男人的天堂亚洲| 免费在线观看黄色视频的| 亚洲专区国产一区二区| 久久99一区二区三区| 亚洲成人手机| 日本黄色日本黄色录像| 亚洲 欧美一区二区三区| 久久久水蜜桃国产精品网| 国产人伦9x9x在线观看| 欧美亚洲日本最大视频资源| 国产精品 国内视频| 动漫黄色视频在线观看| 日本wwww免费看| 精品亚洲成国产av| 国产精品免费大片| 亚洲精品美女久久久久99蜜臀| 99久久综合免费| 男女免费视频国产| 韩国高清视频一区二区三区| 国产成人av教育| 午夜影院在线不卡| 久久国产精品人妻蜜桃| 午夜福利在线免费观看网站| a级毛片黄视频| 久久精品亚洲av国产电影网| 国产在线一区二区三区精| 国产男人的电影天堂91| 美女高潮喷水抽搐中文字幕| 黑人操中国人逼视频| 永久免费av网站大全| 国产精品一二三区在线看| 国产国语露脸激情在线看| 国产精品久久久av美女十八| 亚洲av电影在线观看一区二区三区| www.av在线官网国产| 一本综合久久免费| 最新的欧美精品一区二区| 亚洲精品国产av蜜桃| 狂野欧美激情性xxxx| kizo精华| 亚洲成人手机| 电影成人av| 悠悠久久av| 操美女的视频在线观看| 欧美变态另类bdsm刘玥| 91精品国产国语对白视频| 亚洲欧美一区二区三区黑人| 性色av一级| 亚洲伊人久久精品综合| 久久久精品免费免费高清| 久久青草综合色| 少妇裸体淫交视频免费看高清 | 国产91精品成人一区二区三区 | 好男人电影高清在线观看| 成人国产av品久久久| 日韩三级视频一区二区三区| 精品国内亚洲2022精品成人 | 黄网站色视频无遮挡免费观看| 国产精品秋霞免费鲁丝片| 久久精品熟女亚洲av麻豆精品| 我的亚洲天堂| 男女之事视频高清在线观看| 另类精品久久| 久久久久视频综合| 日本精品一区二区三区蜜桃| 在线观看舔阴道视频| 伊人亚洲综合成人网| 中文字幕制服av| 老司机福利观看| 亚洲精品美女久久久久99蜜臀| 亚洲专区字幕在线| 成人手机av| 午夜福利视频在线观看免费| 9色porny在线观看| 亚洲性夜色夜夜综合| 亚洲欧美日韩另类电影网站| 亚洲伊人久久精品综合| 蜜桃在线观看..| 黑人操中国人逼视频| 免费看十八禁软件| 亚洲少妇的诱惑av| 制服人妻中文乱码| 香蕉丝袜av| 精品国产超薄肉色丝袜足j| 十分钟在线观看高清视频www| kizo精华| 美国免费a级毛片| 国产成人影院久久av| 亚洲少妇的诱惑av| 青春草亚洲视频在线观看| 美女脱内裤让男人舔精品视频| 国产视频一区二区在线看| 免费不卡黄色视频| 亚洲国产精品999| 大片免费播放器 马上看| 中国美女看黄片| av天堂在线播放| 91大片在线观看| 久久人妻福利社区极品人妻图片| 动漫黄色视频在线观看| 首页视频小说图片口味搜索| 日本欧美视频一区| 美女扒开内裤让男人捅视频| 男人爽女人下面视频在线观看| 1024香蕉在线观看| xxxhd国产人妻xxx| 岛国毛片在线播放| 99久久综合免费| 狂野欧美激情性xxxx| 少妇精品久久久久久久| 狂野欧美激情性xxxx| 久久精品国产亚洲av香蕉五月 | 亚洲精品国产精品久久久不卡| 亚洲成人手机| 免费观看av网站的网址| 欧美日韩av久久| 亚洲一区二区三区欧美精品| 热re99久久精品国产66热6| 一区在线观看完整版| videos熟女内射| 午夜成年电影在线免费观看| av线在线观看网站| 亚洲国产av影院在线观看| 久久狼人影院| 搡老乐熟女国产| 黄色视频不卡| 搡老熟女国产l中国老女人| 欧美在线一区亚洲| 亚洲三区欧美一区| 一区二区av电影网| 丁香六月天网| 亚洲精品乱久久久久久| 美女中出高潮动态图| 91大片在线观看| 国产欧美日韩精品亚洲av| 日日爽夜夜爽网站| 女人久久www免费人成看片| 欧美乱码精品一区二区三区| 伊人亚洲综合成人网| 黄网站色视频无遮挡免费观看| 精品熟女少妇八av免费久了| 新久久久久国产一级毛片| 国产97色在线日韩免费| 欧美在线黄色| 青春草亚洲视频在线观看| 欧美日本中文国产一区发布| 精品卡一卡二卡四卡免费| 老鸭窝网址在线观看| 亚洲精品在线美女| 18禁黄网站禁片午夜丰满| 亚洲欧美色中文字幕在线| 多毛熟女@视频| 91精品三级在线观看| 国产成人精品久久二区二区免费| 91av网站免费观看| av免费在线观看网站| 久久久国产成人免费| 考比视频在线观看| 国产成+人综合+亚洲专区| 国产欧美日韩一区二区精品| 日本欧美视频一区| 国产成人精品久久二区二区免费| 国产色视频综合| 一区福利在线观看| 色视频在线一区二区三区| 国产有黄有色有爽视频|