• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    DWT-SVD Based Image Steganography Using Threshold Value Encryption Method

    2022-08-24 07:01:10JyotiKhandelwalVijayKumarSharmaDilbagSinghandAtefZaguia
    Computers Materials&Continua 2022年8期

    Jyoti Khandelwal,Vijay Kumar Sharma,Dilbag Singhand Atef Zaguia

    1School of Computing and Information Technology(SCIT),Manipal University Jaipur,Jaipur,302004,India

    2School of Electrical Engineering and Computer Science,Gwangju Institute of Science and Technology,Gwangju,61005,Korea

    3Department of Computer Science,College of Computers and Information Technology Taif University,11099,Saudi Arabia

    Abstract: Digital image steganography technique based on hiding the secret data behind of cover image in such a way that it is not detected by the human visual system.This paper presents an image scrambling method that is very useful for grayscale secret images.In this method,the secret image decomposes in three parts based on the pixel’s threshold value.The division of the color image into three parts is very easy based on the color channel but in the grayscale image,it is difficult to implement.The proposed image scrambling method is implemented in image steganography using discrete wavelet transform(DWT),singular value decomposition(SVD),and sorting function.There is no visual difference between the stego image and the cover image.The extracted secret image is also similar to the original secret image.The proposed algorithm outcome is compared with the existed image steganography techniques.The comparative results show the strength of the proposed technique.

    Keywords: Image steganography;threshold value;sorting;discrete wave transformation;singular value decomposition;color band division;permutation

    1 Introduction

    Nowadays,the internet’s coverage area encompasses the entire globe;the internet allows us to connect people from all over the world.The internet is used not only on Earth,but also in space,where it is mandatory.In this technical and digital environment,the security of information is a highresponsibility job.Information system security is the broad area that introduces the advantages and disadvantages of data digitalization.The challenges of information system security can be concluded in three terms:Confidentiality,Integrity,and Availability,some of which are called CIA [1,2].The meaning of data confidentiality means not disclosed to unauthorized individuals,integrity means maintaining accuracy and completeness of the data and availability means information must be available when needed.The digital information transmission technique must be an efficient worker for the information system security channels.

    Steganography,watermarking,and cryptography are well-known methods for secure information transmission.The roles of these methods are different according to the point of view of utilization[3].The steganography method uses the technique of hiding information.Watermarking uses two different approaches;one is visible watermarking,and the other is invisible watermarking.Cryptography believes in the direct change in secret data.We are only considering steganography here.Steganography is the art of hiding digital data behind other digital data.The perfect steganography method passes all the channels of steganalysis.The steganalysis process tries to identify the secret information which is hidden behind the front surface.The steganography process is completed by the different types of cover objects like text,audio,images,and videos[4].By using a different type of cover object,the secret information is transferred from one place to another.

    Image steganography is the well-known steganography process.It uses an image to create a cover image behind which the secret data is hidden and securely transmitted over the internet or other transmission medium.The digital image is a collection of pixels.The pixel value is crucial in the filled with image steganography [5].Image steganography is accomplished by two broad image steganography techniques,known as spatial domain and transform domain.The traditional image steganography method is a spatial domain technique.In the spatial domain,to hide the secret data in the cover image,the pixel value modification directly takes place.The well-known spatial domain image steganography technique is the least significant bit (LSB).The direct operation on the pixel value makes this method not reliable.The transform domain image steganography method works on the amplitude,phase,and frequency of the signal.The transform domain image steganography method is divided into two broad categories:discrete cosines transform(DCT)and discrete wavelets transform (DWT).The transform domain image steganography method was inspired by the fast fourier transformation(FFT).Image steganography based on the wavelet is more secure and robust as compared to the other techniques[6,7].

    The fourier transform provides the frequency spectrum of the real signal,but all the frequency channels are not covered by the fourier transform.Due to this,the original time resolution of the real signal is missed.The wavelet comes as a solution for fourier transform drawbacks.The wavelet has a family of mother wavelets,but the fourier transform has only one kind of transformation[8].The main categories of mother wavelets are continuous wavelet transform(CWT)and discrete wavelet transform(DWT).The CWT sets the scaling and translation as arbitrary,but DWT restricts them.

    The information system security strengthens the image steganography technique so that secret images can be hidden behind the cover image properly [9].The image steganography process starts with the selection of the correct steganography technique,but direct embedding of data is the old method.According to the new approach,the secret image is first scrambled by a different scrambling method then embedded into the cover image.The scrambling method changes the position [10]of the secret image pixels,and makes it invisible to the human visual system.This information system security concept provides the security against attackers available on the network.

    2 The Steganography Method

    In the proposed image steganography method,the cover image is a 256 × 256 Lena grayscale image.The secret information is a Pepper grayscale image of size 256 × 256.To transfer the secret image invisible to the human visual system,the secret image is embedded into the cover image using the concepts of DWT,scrambling the colour channel based on a threshold value,and singular value decomposition(SVD)methods.These method combinations provide improved security,and the extracted secret image quality is not too much affected.

    2.1 Discrete Wavelet Transformation

    The wavelet fluctuation breaks down the difference of a period series and,subsequently,gives an examination of change.A wavelet transformation can be either continuous or discrete.The DWT is more widely used.The dwt2 order plays out a solitary two-dimensional wavelet disintegration concerning either a specific wavelet or specific wavelet deterioration channels you indicate[11].

    Fig.1 shows the part that plays out an online DWT on the information signal.The approximation output and multidimensional output belong to the low and high-frequency components of the signal,respectively.Before applying DWT to the signal,the signal is sampled by the sampling parameter which is defined by the user.Additionally,the anti-aliasing function and type of wavelet from the DWT family are also selected by the user.The simulation time depends upon the sampling frequency,wavelet type,and the number of levels required[12,13].

    Figure 1:Discrete wavelet transforms input and output parameters

    As shown in Fig.2,the DWT image decomposition method divided the two-dimensional plain image into four equal parts.Each part contains the information about the original image according to the filter applied.By using their filter characteristics,the LL,LH,HL,and HH represent the different varieties of filtering.By using their filter characteristics,the plain two-dimension image breaks into multiple parts[14].The decomposed part is used to hide the secret data according to the user,requiring the selection of a filter area.

    Figure 2:Discrete wavelet transform two-level decomposition

    2.2 Scrambling

    Detailed information scrambling improves the confidence of data transmission.The pixel changes place according to the applied method.The scrambling method is different from the cryptography method.In the cryptography method,the original value is replaced by the new value,which may exist or not exist in the present data.The scrambling method assures the sender that the hidden data can only be extracted by the authorized receiver[15,16].The image is a 2-Dimensional data set that contains the pixel value by using the different scrambling methods.The image is created in the form of an unreadable data set by the attacker present in the transmission channel.The images are of two types:one is grayscale and the other is a colour image.In the colour image,three colour channels are available,which are known as red,green,and blue,but in the grayscale image,only one-color channel is available.In a Gray Scale image,the colour channel is divided based on the threshold value.The division of a grayscale image is broadly classified into three parts:Dark Pixels,Middle Pixels,and Bright Pixels.

    The division of grayscale images according to the threshold value of pixels is shown in Fig.3.According to the intensity of the pixels available in the image,the grayscale image was divided into three parts.These three-part pixel values are used to create the scrambled secret image.

    Figure 3:Division of grayscale image in three different parts using the threshold value

    The scrambling process flow is represented in Fig.4.First,the input secret image is converted into a one-dimensional array.The converted one-dimensional array is sorted by the sort function of MATLAB,a sort function used to arrange data in ascending and descending order[17].The sorting function used in the proposed scrambling algorithm is:

    Figure 4:Scrambling process to make secret image scrambled before inbuilt into the cover image

    The sorting function is also able to return the array indices.If the array A is an M x N matrix,then each column of ix is a permutation vector of the corresponding column of A.The returned indices preserve the original ordering,which is used as a key at the time of secret image extraction.

    Proposed Scrambling Algorithm:

    1.Convert the image 2 D array in 1 D array using two coefficient v and ix they are storing the value and index location respectively.

    2.Sort step 1 generated 1 D image array.

    3.Select initial Minimum,Maximum,and Threshold value,typically the mean 8-bit value of the original image

    4.Divide the original image into three portions;

    a) Dark Pixels=(Minimum Value of Image Array+Maximum Value of Image Array)/2<Threshold Value.

    b) Middle Pixels=(Value>=(Minimum Value of Image Array+Maximum Value of Image Array)/2)&(Value<=Threshold Value));

    c) Bright Pixels=Value>Threshold Value);

    5.Combine the scrambled channel data and create a scrambled secret image.

    The peppers’secret image pixel maximum intensity value is 233,the minimum value is 1,and the mean value is 120.93,calculated by the max,min,and mean functions.Let’s put the value and understand the algorithm properly:

    1.On the basis of secret image here the mean value is 120.93 take it as 121 Threshold value.

    2.Divide the original image into three portions;(Here grayImage variable contain the secret image)

    a) DarkPixels=grayImage(grayImage<117);

    b) MiddlePixels=grayImage((grayImage>=117)&(grayImage<=121));

    c) BrightPixels=grayImage(grayImage>233);

    3.Combine DarkPixels,MiddlePixels &BrightPixels Scrambled channel and create scrambled secret image.

    The outcome of the scrambling process is shown in Fig.5.For the embedding process now,this scrambled secret image is used.

    Figure 5:Original and scrambled secret pepper image

    2.3 Singular Value Decomposition

    To acquire understanding of the singular value decomposition (SVD),treat the columns of an n×d grid as n focuses in d-dimensional space and think about the issue of tracking down the best k-dimensional subspace for the arrangement of focuses [18].In terms of direct polynomial math,the SVD is a factorization of a genuine and complex matrix.We can consider what we did in that deterioration as separating the first changes into three changes.Assuming we increase the furthest right network by any vector,and duplicate the center lattice by that item,and afterward increase the furthest left grid on the right-hand side by that item,we would see that beginning vector be changed multiple times.That interaction would be comparable to increasing the beginning vector by the first lattice[19,20].

    We can likewise say that,in that unique change framework,which we’ll call A,we planned a bunch of symmetrical vectors,or vectors at right points to one another(1,0),and(0,1)onto a bunch of nonsymmetrical vectors(0,-2),and(1,-3)as shown in Fig.6.We don’t need to duplicate every vector by the change lattice each in turn.We can duplicate the arrangement of vectors,as a lattice,by changing the grid,as so.

    Figure 6:Original matrix subdivision using the concept of SVD

    Similarly,the calculation of SVD of matrix A factorized the two-dimensional matrix into three matrices,A=UDVT,where columns U and V are orthonormal and matrix D is diagonal with the positive real entries [11].A matrix contains orthonormal columns,which means each orthonormal column represents an UTU=I.

    2.4 Secret Image Embedding Algorithm

    The following steps explain the embedding process:

    1.Apply DWT on the Cover image(C).

    2.Apply SVD on the Cover image LL filter Decomposition part.

    3.Cover the Secret image(S)two-dimensional array into a one-dimensional array.

    4.Apply Sort Function on the one-dimensional converted array,sort function store value,and location of the pixel.

    5.Calculate the Max,Min,and Threshold value and apply the channel division according to the range defined in the proposed scrambling algorithm:

    a) Dark Pixels=(Minimum Value of Image Array+Maximum Value of Image Array)/2<Threshold Value.

    b) Middle Pixels=(Value>=(Minimum Value of Image Array+Maximum Value of Image Array)/2)&(Value<=Threshold Value));

    c) Bright Pixels=Value>Threshold Value);

    6.Combine the color channel and covert one-dimensional secret image array into a twodimensional scrambled image(SS).

    7.Apply the SVD on the Scrambled secret image(SS)and insert the secret image(SSS)into the cover image using alpha blending.

    8.Take the inverse of the embedded image(AG)and generate the stego image(I).

    Fig.7,represents the entire flow of the algorithm used for embedding secret image inside the cover image,and the result comes out in the form of a stego image.

    Figure 7:Secret image embedding flowchart

    2.5 Secret Image Extraction Algorithm

    The extraction algorithm consists of eight steps as follows:

    1.Apply DWT and SVD on the Stego image(I).

    2.Covert the extracted image(ID)two-dimensional array into a one-dimensional array.

    3.Apply the sorting function which contains the extracted secret image pixel value and location.

    4.Rearrange the one-dimensional sorted array according to the location key array generated at the time of secret image embedding process.

    5.Convert the one-dimensional array into an extracted two-dimensional secret image.

    6.Rotate the extracted secret image 270-degree angle.

    7.Apply Flip Function on output image come from step 6.

    8.Show the extracted secret image(S).

    Fig.8,represents the entire flow of the algorithm used for extracting secret images from the stego image,and the result comes out in the form of a secret image which is most similar to the original secret image.

    Figure 8:Secret image extraction flowchart

    3 Experimental Results

    This section includes the outcome of the proposed algorithm.The image steganography outcome comes from the combination of the wavelet transform in the form of the discrete wavelet transform,linear matrix division in the form of singular value decomposition,and the scrambling method.The motive for using this technique is to provide secret image security between transmission channels[21].Secret image security depends upon secret data invisibility in the transmission channel.The secret image embedding process is complete by using DWT,SVD,scrambling,sorting,array dimension conversation,and inverse DWT of the image.

    The secret image is extracted at the end by an authorized user by using DWT,SVD,rotation,location key,and flipping processes.The programming implementation also shows the peak signal to noise ratio(PSNR)and mean square error(MSE)comparative results in terms of the original cover image and stego cover image.

    The image steganography quality depends upon the quality of the stego image.According to the previous research done on the grayscale image,the PSNR value of the stego image must be greater than 37 dB.If the value of PSNR is greater than 37 dB,then the approximation of successful transmission of secret data can be considered[22].

    As we show in Figs.9a-9d,the standard well-tested Lena grayscale image was taken for the cover image and the Pepper grayscale image was taken as a secret image.The PSNR and MSE of the stego image are 37.72 dB,and 11.00 respectively,for alpha value 0.05.After that,the results of PSNR were less than 37 dB.The programming result is acceptable to the human visual system.

    Figure 9:The secret image embedding and extracting outcome

    Tab.1 presents the results of PSNR and MSE values for different alpha values,and we can see that for different alpha they all are reasonable output in visual quality.

    Table 1:Comparison of PSNR of Lena image for different values of alpha

    Fig.10 shows the impact of alpha value on the PSNR and MSE values.Here the term alpha shows the transparency of colour when the secret image is embedded into the cover image.In most of the graphics,the alpha values lie between 0% to 100%.A value of 0% denotes full transparency.It means the secret image is fully visible,but if the value is equal to 100%,it means that the colour channels are completely opaque.So according to the requirement,an intermediate value is selected to blend the secret image with the cover image pixels.The value of alpha is decided based on the stego image PSNR value.The value of stego image PSNR must not be less than 37 dB according to the human visual system analysis.In the proposed work,the alpha value of 0.01 to 0.05 is provided as the accepted outcome.

    Figure 10:Performance visualization of proposed image steganography method in terms of PSNR and MSE for the different alpha value

    The Structural Similarity Index Measure(SSIM)method is used for predicting image quality.The quality measurement by SSIM is done by finding the similarity between two images.The PSNR and MSE methods were used to find the absolute errors,but the SSIM is a prediction-based model which considers image degradation as a perceived change in structural information.

    The first,comparative study of the proposed work check is based on the SSIM value generated by the previous work [23].The test images shown in Figs.11a-11d,used in the previous work are Cameraman,House,and Boats as a cover image and Peppers image as a secret image,the proposed work tested for given tested images.The result is generated for the comparative structural difference between the stego image and the original cover image.Every cover value is tested for different alpha values and results are recorded in Tab.2.

    Figure 11:Test images:(a)Cameraman(b)House(c)Boats(d)Pepper10

    Table 2:SSIM based performance comparison with different values of scaling factor

    According to Tab.2 and Figs.12a-12c,the proposed work stego image generated of boats,cameraman and house forα=0.01,0.05 and 0.1;there is no structural difference between stego image and original cover image.Also,forα=0.2 and 0.3 the structural difference is much less and better than previous image steganography technique.

    Figure 12:Comparative SSIM visualization of proposed work and[23]for the different cover image and alpha value

    The second,comparative study of the proposed work checked for PSNR value generated by the previous work [24].The tested images shown in Figs.13a and 13b,used in the previous work,were the City as a cover image,and the Baboon Image as a secret image.The proposed work is tested for given test images.The previous work employs the transform domain family’s traditional discrete cosine transform(DCT).The elliptic curve cryptography(ECC)is used for scrambling and the SegNet deep neural network is used to improve the steganography capacity.The result is generated for the PSNR difference between the stego image and the original cover image.The results generated from the proposed work are included in Tab.3 and calculated for different alpha values.

    Figure 13:Test images:(a)City(b)Baboon

    Table 3:PSNR based performance comparison with different values of scaling factor

    According to the result discussion part of previous work[24],the higher PSNR value for the tested stego image is 42.00 dB.In the proposed work,the stego image difference from the original cover image is calculated for various alpha values.The average value of PSNR on different alpha values shows a better result as compared to the previous work[24].

    4 Conclusions

    In this study,the image steganography algorithm for hiding the secret image behind the grayscale cover image based on DWT,SVD,and division of grayscale image based on the threshold value is suggested.The threshold value-based image division gives the secret image scrambled view.The scrambled secret image provides the robustness necessary for the entire image steganography method[25].The imperceptibility level of the stego image is analyzed based on PSNR,MSE,and SSIM values [26].The comparative studies also show the successful completion of the proposed work.According to the result,there is no structural loss in the image quality of the stego image.

    Acknowledgement:This work was supported by Taif university Researchers Supporting Project Number(TURSP-2020/114),Taif University,Taif,Saudi Arabia.

    Funding Statement:This work was supported by Taif university Researchers Supporting Project Number(TURSP-2020/114),Taif University,Taif,Saudi Arabia.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    www.精华液| 亚洲精品av麻豆狂野| 脱女人内裤的视频| 久久久精品区二区三区| 欧美老熟妇乱子伦牲交| 免费高清在线观看视频在线观看| 男女边吃奶边做爰视频| 国产精品一区二区精品视频观看| 考比视频在线观看| 电影成人av| 爱豆传媒免费全集在线观看| 国产在视频线精品| 在线观看一区二区三区激情| 国产高清不卡午夜福利| 亚洲一卡2卡3卡4卡5卡精品中文| 亚洲色图综合在线观看| 亚洲精品国产区一区二| 一二三四社区在线视频社区8| 亚洲av欧美aⅴ国产| 一本色道久久久久久精品综合| 一区二区三区四区激情视频| 久久久久久久国产电影| 午夜福利在线免费观看网站| 亚洲免费av在线视频| 久久 成人 亚洲| 国产精品久久久久久精品古装| 国产欧美日韩一区二区三 | 男女免费视频国产| 免费观看人在逋| 天天躁日日躁夜夜躁夜夜| 精品高清国产在线一区| 中文字幕高清在线视频| 999精品在线视频| 日韩电影二区| 国产福利在线免费观看视频| 欧美日韩亚洲国产一区二区在线观看 | 黄片播放在线免费| 丝袜在线中文字幕| 成人免费观看视频高清| 日本一区二区免费在线视频| 久久精品久久精品一区二区三区| 伊人久久大香线蕉亚洲五| 黄色视频不卡| 欧美日韩一级在线毛片| 菩萨蛮人人尽说江南好唐韦庄| 国产高清国产精品国产三级| 精品少妇一区二区三区视频日本电影| 一本一本久久a久久精品综合妖精| 久久精品成人免费网站| 9色porny在线观看| 啦啦啦啦在线视频资源| 人妻一区二区av| 1024视频免费在线观看| 久久人人爽av亚洲精品天堂| 亚洲国产成人一精品久久久| 黄色视频不卡| 久久这里只有精品19| 丝袜美足系列| 亚洲伊人色综图| 视频区欧美日本亚洲| 欧美日韩一级在线毛片| 一本久久精品| 国产精品麻豆人妻色哟哟久久| 国产免费现黄频在线看| 满18在线观看网站| 在线观看人妻少妇| 777米奇影视久久| 午夜老司机福利片| 好男人视频免费观看在线| 自线自在国产av| 国产三级黄色录像| e午夜精品久久久久久久| 99久久综合免费| 亚洲av成人不卡在线观看播放网 | 交换朋友夫妻互换小说| 欧美精品av麻豆av| 老司机靠b影院| 亚洲成av片中文字幕在线观看| 国产一区二区三区av在线| 人人澡人人妻人| 性色av一级| 人人妻人人爽人人添夜夜欢视频| 久9热在线精品视频| 久久99热这里只频精品6学生| 亚洲精品中文字幕在线视频| 夫妻性生交免费视频一级片| 亚洲综合色网址| 丝袜脚勾引网站| 午夜免费观看性视频| 一级,二级,三级黄色视频| 激情五月婷婷亚洲| 亚洲国产欧美日韩在线播放| av有码第一页| 99久久精品国产亚洲精品| 91精品伊人久久大香线蕉| 黑人巨大精品欧美一区二区蜜桃| 精品免费久久久久久久清纯 | 久久天堂一区二区三区四区| 观看av在线不卡| 免费一级毛片在线播放高清视频 | 婷婷成人精品国产| 老司机影院毛片| 一本—道久久a久久精品蜜桃钙片| 超碰成人久久| 国产不卡av网站在线观看| 一区二区三区精品91| 欧美日韩视频高清一区二区三区二| 999精品在线视频| videosex国产| 亚洲成国产人片在线观看| 欧美性长视频在线观看| 18禁国产床啪视频网站| 视频区图区小说| netflix在线观看网站| 精品亚洲成国产av| 最近最新中文字幕大全免费视频 | 国产免费现黄频在线看| 夫妻午夜视频| 性色av一级| 女性生殖器流出的白浆| 熟女少妇亚洲综合色aaa.| 侵犯人妻中文字幕一二三四区| 亚洲精品一二三| 日本av免费视频播放| 性少妇av在线| 男女免费视频国产| 赤兔流量卡办理| 精品免费久久久久久久清纯 | 日本wwww免费看| 国产免费视频播放在线视频| 成人国产一区最新在线观看 | 丁香六月欧美| 天天躁夜夜躁狠狠躁躁| 亚洲成色77777| 亚洲欧洲国产日韩| 男女边吃奶边做爰视频| 在线观看国产h片| 丝袜美足系列| 美女午夜性视频免费| 久久免费观看电影| 亚洲色图综合在线观看| 国产真人三级小视频在线观看| 久久久亚洲精品成人影院| 国产一区二区 视频在线| 黄色 视频免费看| 国产精品一区二区在线观看99| 可以免费在线观看a视频的电影网站| 日韩 亚洲 欧美在线| 欧美黄色片欧美黄色片| 少妇的丰满在线观看| 777久久人妻少妇嫩草av网站| 欧美黄色片欧美黄色片| 婷婷丁香在线五月| 一级a爱视频在线免费观看| 91精品三级在线观看| av片东京热男人的天堂| 99热全是精品| 捣出白浆h1v1| 伊人亚洲综合成人网| 亚洲五月婷婷丁香| 一个人免费看片子| www.999成人在线观看| 永久免费av网站大全| 欧美黄色淫秽网站| 色播在线永久视频| 国产精品国产三级国产专区5o| 香蕉国产在线看| 别揉我奶头~嗯~啊~动态视频 | 日韩一本色道免费dvd| 国产男人的电影天堂91| av电影中文网址| 乱人伦中国视频| 精品一区二区三卡| 精品视频人人做人人爽| 新久久久久国产一级毛片| 国产一区有黄有色的免费视频| 亚洲av美国av| 一级,二级,三级黄色视频| 久久午夜综合久久蜜桃| 日韩一区二区三区影片| 国产在线观看jvid| 国产精品av久久久久免费| 久久99精品国语久久久| 菩萨蛮人人尽说江南好唐韦庄| 日本vs欧美在线观看视频| 久久久国产欧美日韩av| 一区福利在线观看| 性高湖久久久久久久久免费观看| 性色av乱码一区二区三区2| videos熟女内射| 国产免费又黄又爽又色| 日本黄色日本黄色录像| 欧美在线一区亚洲| 两人在一起打扑克的视频| 国产成人精品久久二区二区免费| 欧美成人精品欧美一级黄| 欧美精品高潮呻吟av久久| 色94色欧美一区二区| 天天操日日干夜夜撸| 国产男人的电影天堂91| 亚洲 国产 在线| 永久免费av网站大全| av在线播放精品| 国产成人系列免费观看| 在线观看免费午夜福利视频| 亚洲成人免费电影在线观看 | 亚洲精品av麻豆狂野| 日韩视频在线欧美| bbb黄色大片| 水蜜桃什么品种好| 岛国毛片在线播放| 中文字幕最新亚洲高清| 日本欧美视频一区| 少妇人妻 视频| 一二三四在线观看免费中文在| 日韩熟女老妇一区二区性免费视频| 中文精品一卡2卡3卡4更新| 激情视频va一区二区三区| 精品国产一区二区三区久久久樱花| 欧美少妇被猛烈插入视频| 乱人伦中国视频| 丝袜人妻中文字幕| 欧美国产精品va在线观看不卡| 99re6热这里在线精品视频| 可以免费在线观看a视频的电影网站| 免费看av在线观看网站| 香蕉丝袜av| 50天的宝宝边吃奶边哭怎么回事| h视频一区二区三区| 女警被强在线播放| 亚洲精品中文字幕在线视频| 亚洲精品日韩在线中文字幕| 丝袜美足系列| 中文字幕人妻丝袜一区二区| 男女边吃奶边做爰视频| 国产免费又黄又爽又色| 欧美日韩一级在线毛片| 热re99久久精品国产66热6| 国产熟女欧美一区二区| 亚洲成人手机| 99国产精品免费福利视频| 国产男人的电影天堂91| 亚洲图色成人| 成人手机av| 国产片特级美女逼逼视频| videosex国产| 人人妻人人添人人爽欧美一区卜| 成人午夜精彩视频在线观看| 爱豆传媒免费全集在线观看| 嫩草影视91久久| 亚洲精品日韩在线中文字幕| a 毛片基地| 99精国产麻豆久久婷婷| 日日爽夜夜爽网站| 亚洲久久久国产精品| 国产激情久久老熟女| 亚洲精品一区蜜桃| 后天国语完整版免费观看| 亚洲国产精品成人久久小说| 51午夜福利影视在线观看| 啦啦啦中文免费视频观看日本| 成年动漫av网址| 成人国产av品久久久| av在线播放精品| 久久精品aⅴ一区二区三区四区| 国产成人91sexporn| 日韩中文字幕欧美一区二区 | 丰满饥渴人妻一区二区三| 欧美激情高清一区二区三区| 免费在线观看日本一区| 欧美老熟妇乱子伦牲交| 一级毛片电影观看| 午夜福利乱码中文字幕| 欧美日韩亚洲国产一区二区在线观看 | 少妇被粗大的猛进出69影院| 桃花免费在线播放| 妹子高潮喷水视频| 丝袜人妻中文字幕| 中文乱码字字幕精品一区二区三区| 午夜福利在线免费观看网站| 少妇猛男粗大的猛烈进出视频| 考比视频在线观看| 国产精品三级大全| 99热全是精品| 天天躁狠狠躁夜夜躁狠狠躁| 美女福利国产在线| 久久人人爽人人片av| 欧美黄色片欧美黄色片| 久久精品久久久久久噜噜老黄| 9191精品国产免费久久| 丝瓜视频免费看黄片| 精品国产乱码久久久久久男人| 美女扒开内裤让男人捅视频| 久久久久久免费高清国产稀缺| 国产成人精品在线电影| 最新在线观看一区二区三区 | 在线亚洲精品国产二区图片欧美| 国产精品av久久久久免费| 国产成人啪精品午夜网站| 久久久久久免费高清国产稀缺| 午夜福利在线免费观看网站| 婷婷丁香在线五月| 热re99久久精品国产66热6| 女人久久www免费人成看片| 18禁黄网站禁片午夜丰满| 国产日韩欧美视频二区| a级毛片在线看网站| 欧美国产精品va在线观看不卡| 精品久久久久久久毛片微露脸 | 免费观看av网站的网址| 无遮挡黄片免费观看| av在线老鸭窝| 国产又色又爽无遮挡免| 老鸭窝网址在线观看| 成人影院久久| 天天躁日日躁夜夜躁夜夜| 精品人妻在线不人妻| 国产不卡av网站在线观看| 老鸭窝网址在线观看| 久久久久久久精品精品| 天天躁夜夜躁狠狠躁躁| 国产精品麻豆人妻色哟哟久久| 中文字幕亚洲精品专区| 国产一区有黄有色的免费视频| 成人手机av| 两个人看的免费小视频| 99热国产这里只有精品6| 亚洲欧美一区二区三区黑人| 青春草亚洲视频在线观看| 热99国产精品久久久久久7| 日本五十路高清| 极品少妇高潮喷水抽搐| 在线观看免费高清a一片| 老司机影院成人| 国产精品久久久久久精品古装| videos熟女内射| 亚洲,欧美,日韩| 久久国产精品大桥未久av| 国产亚洲欧美精品永久| 亚洲欧美中文字幕日韩二区| 无遮挡黄片免费观看| 黄色一级大片看看| 欧美亚洲 丝袜 人妻 在线| 制服人妻中文乱码| 精品人妻一区二区三区麻豆| 亚洲伊人久久精品综合| av在线app专区| 免费在线观看黄色视频的| 女人被躁到高潮嗷嗷叫费观| 视频区图区小说| 午夜精品国产一区二区电影| 精品国产一区二区久久| 乱人伦中国视频| 国产精品秋霞免费鲁丝片| 纯流量卡能插随身wifi吗| 69精品国产乱码久久久| 欧美日韩亚洲高清精品| 在线观看免费午夜福利视频| av线在线观看网站| av片东京热男人的天堂| 天天影视国产精品| av网站在线播放免费| 欧美精品高潮呻吟av久久| 一本色道久久久久久精品综合| av天堂在线播放| 色婷婷av一区二区三区视频| 十八禁高潮呻吟视频| 老司机午夜十八禁免费视频| 丝袜喷水一区| av网站在线播放免费| 青春草视频在线免费观看| 亚洲精品国产一区二区精华液| 亚洲第一av免费看| 日韩av免费高清视频| 一区福利在线观看| 中国国产av一级| 人妻一区二区av| 人人妻人人添人人爽欧美一区卜| 岛国毛片在线播放| 国产成人精品久久二区二区免费| 国产精品av久久久久免费| 国产在视频线精品| 欧美在线一区亚洲| 99热全是精品| 久9热在线精品视频| 纯流量卡能插随身wifi吗| 久久精品久久久久久噜噜老黄| 好男人电影高清在线观看| 黄色片一级片一级黄色片| 99久久人妻综合| 精品久久久久久电影网| 国产一区有黄有色的免费视频| 国产男人的电影天堂91| 国产又色又爽无遮挡免| 亚洲精品久久午夜乱码| 亚洲av电影在线进入| 欧美日韩国产mv在线观看视频| 久久人妻福利社区极品人妻图片 | 性高湖久久久久久久久免费观看| 99久久99久久久精品蜜桃| 最近中文字幕2019免费版| 高清欧美精品videossex| 亚洲七黄色美女视频| 国产精品久久久久久精品电影小说| 国产精品 国内视频| 久久人人爽人人片av| 两性夫妻黄色片| 女人被躁到高潮嗷嗷叫费观| 两人在一起打扑克的视频| 欧美av亚洲av综合av国产av| 一边亲一边摸免费视频| 国产一卡二卡三卡精品| 日日爽夜夜爽网站| 久久中文字幕一级| 午夜激情av网站| 色精品久久人妻99蜜桃| 天堂俺去俺来也www色官网| 香蕉国产在线看| 亚洲成人免费电影在线观看 | 激情五月婷婷亚洲| 一本久久精品| 成年人午夜在线观看视频| 亚洲专区国产一区二区| 精品少妇黑人巨大在线播放| 超色免费av| 国产成人啪精品午夜网站| 久久国产亚洲av麻豆专区| netflix在线观看网站| 国产亚洲av高清不卡| 老熟女久久久| 大陆偷拍与自拍| 婷婷丁香在线五月| 午夜两性在线视频| 久久毛片免费看一区二区三区| 欧美亚洲 丝袜 人妻 在线| 丁香六月欧美| 欧美变态另类bdsm刘玥| 色婷婷av一区二区三区视频| 丝袜在线中文字幕| 亚洲精品日韩在线中文字幕| 老司机亚洲免费影院| 国产精品九九99| 欧美大码av| 国产淫语在线视频| 免费高清在线观看日韩| 亚洲欧洲国产日韩| 一级黄片播放器| 国产熟女午夜一区二区三区| 国产在线一区二区三区精| 十分钟在线观看高清视频www| 日韩视频在线欧美| 搡老乐熟女国产| 国产在线视频一区二区| 午夜福利影视在线免费观看| 日韩av在线免费看完整版不卡| 黄网站色视频无遮挡免费观看| 成人黄色视频免费在线看| 久久人人97超碰香蕉20202| 一本—道久久a久久精品蜜桃钙片| 一区福利在线观看| 校园人妻丝袜中文字幕| 国产有黄有色有爽视频| 又紧又爽又黄一区二区| 视频区图区小说| 天天躁狠狠躁夜夜躁狠狠躁| 中文字幕最新亚洲高清| 久久久国产精品麻豆| 高清欧美精品videossex| 日韩一本色道免费dvd| 国产一级毛片在线| 国产精品亚洲av一区麻豆| 欧美av亚洲av综合av国产av| 成人国产av品久久久| 国产成人影院久久av| 美国免费a级毛片| 美女高潮到喷水免费观看| 一区二区三区四区激情视频| 亚洲国产精品999| 亚洲第一青青草原| 亚洲色图 男人天堂 中文字幕| 手机成人av网站| 免费少妇av软件| 后天国语完整版免费观看| 国产免费一区二区三区四区乱码| 另类亚洲欧美激情| 欧美日韩成人在线一区二区| 91精品伊人久久大香线蕉| 久久久精品免费免费高清| 亚洲免费av在线视频| 天堂俺去俺来也www色官网| 国产av精品麻豆| 青春草亚洲视频在线观看| 亚洲av综合色区一区| 成人免费观看视频高清| 国产成人啪精品午夜网站| 国产精品久久久久久精品古装| 精品一品国产午夜福利视频| 在线看a的网站| 日韩免费高清中文字幕av| 亚洲人成网站在线观看播放| xxx大片免费视频| 一二三四在线观看免费中文在| 欧美激情高清一区二区三区| 超碰成人久久| 在线看a的网站| 欧美国产精品va在线观看不卡| 51午夜福利影视在线观看| 不卡av一区二区三区| 久久精品国产亚洲av高清一级| 国产精品熟女久久久久浪| 中文字幕人妻丝袜制服| 国产精品久久久久成人av| 国产男女超爽视频在线观看| 精品卡一卡二卡四卡免费| 国产精品av久久久久免费| 我要看黄色一级片免费的| 成年美女黄网站色视频大全免费| av电影中文网址| 黄频高清免费视频| 欧美 亚洲 国产 日韩一| 99精国产麻豆久久婷婷| 高清欧美精品videossex| 大话2 男鬼变身卡| 国产精品99久久99久久久不卡| av网站免费在线观看视频| a级毛片黄视频| 老鸭窝网址在线观看| 亚洲专区国产一区二区| 国产精品偷伦视频观看了| 每晚都被弄得嗷嗷叫到高潮| 国产麻豆69| 国产欧美日韩一区二区三 | 青青草视频在线视频观看| 免费观看av网站的网址| 婷婷成人精品国产| 大片电影免费在线观看免费| 国产三级黄色录像| 亚洲欧美精品综合一区二区三区| 精品一区二区三区四区五区乱码 | 91麻豆av在线| 亚洲精品美女久久av网站| 亚洲一区中文字幕在线| 久久精品久久久久久噜噜老黄| h视频一区二区三区| 美女福利国产在线| 中国美女看黄片| 亚洲少妇的诱惑av| 久久国产精品人妻蜜桃| 久久人妻熟女aⅴ| 美女视频免费永久观看网站| 久久这里只有精品19| 久久天堂一区二区三区四区| 午夜福利影视在线免费观看| 如日韩欧美国产精品一区二区三区| 在线观看一区二区三区激情| 人人澡人人妻人| 国产精品九九99| 一区二区三区乱码不卡18| 你懂的网址亚洲精品在线观看| 少妇猛男粗大的猛烈进出视频| av有码第一页| 国产人伦9x9x在线观看| 久久精品aⅴ一区二区三区四区| 777米奇影视久久| 欧美黑人精品巨大| 青青草视频在线视频观看| 国产伦理片在线播放av一区| 男女高潮啪啪啪动态图| 久久久精品免费免费高清| √禁漫天堂资源中文www| 亚洲成人免费av在线播放| 操美女的视频在线观看| www.自偷自拍.com| 久久99一区二区三区| 老司机影院成人| 最近最新中文字幕大全免费视频 | 天天添夜夜摸| 亚洲中文日韩欧美视频| 高清视频免费观看一区二区| 男女边吃奶边做爰视频| 精品一品国产午夜福利视频| 夫妻午夜视频| av视频免费观看在线观看| 91老司机精品| www.av在线官网国产| 亚洲色图综合在线观看| 色网站视频免费| 在线 av 中文字幕| 亚洲精品日韩在线中文字幕| 欧美 日韩 精品 国产| 操美女的视频在线观看| 精品国产一区二区三区四区第35| 亚洲欧洲精品一区二区精品久久久| 国产91精品成人一区二区三区 | 久久天躁狠狠躁夜夜2o2o | 在线观看免费午夜福利视频| 免费黄频网站在线观看国产| 激情五月婷婷亚洲| 亚洲精品美女久久av网站| 欧美乱码精品一区二区三区| 99国产精品一区二区蜜桃av | 黄片小视频在线播放| 午夜福利视频精品| 高清黄色对白视频在线免费看| 亚洲成人免费电影在线观看 | 精品亚洲成国产av| 色综合欧美亚洲国产小说| 国产欧美日韩一区二区三 | 婷婷成人精品国产| 国产亚洲午夜精品一区二区久久| 叶爱在线成人免费视频播放| 亚洲国产成人一精品久久久| 国产精品一区二区在线不卡| 国产成人精品无人区| 日本五十路高清|