• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Finger Vein Authentication Based on Wavelet Scattering Networks

    2022-08-24 07:01:22AmjadRehmanMajidHarouniMaedehOmidiraveshSulimanMohamedFatiandSaeedAliBahaj
    Computers Materials&Continua 2022年8期

    Amjad Rehman,Majid Harouni,Maedeh Omidiravesh,Suliman Mohamed Fati and Saeed Ali Bahaj

    1Artificial Intelligence&Data Analytics Lab,CCIS Prince Sultan University,Riyadh,11586,Saudi Arabia

    2Department of Computer Engineering,Dolatabad Branch,Islamic Azad University,Isfahan,Iran

    3Faculty of Computer Engineering,Najafabad Branch,Islamic Azad University,Isfahan,Iran

    4MIS Department College of Business Administration,Prince Sattam bin Abdulaziz University,Alkharj,11942,Saudi Arabia

    Abstract: Biometric-based authentication systems have attracted more attention than traditional authentication techniques such as passwords in the last two decades.Multiple biometrics such as fingerprint,palm,iris,palm vein and finger vein and other biometrics have been introduced.One of the challenges in biometrics is physical injury.Biometric of finger vein is of the biometrics least exposed to physical damage.Numerous methods have been proposed for authentication with the help of this biometric that suffer from weaknesses such as high computational complexity and low identification rate.This paper presents a novel method of scattering wavelet-based identity identification.Scattering wavelet extracts image features from Gabor wavelet filters in a structure similar to convolutional neural networks.What distinguishes this algorithm from other popular feature extraction methods such as deep learning methods,filter-based methods,statistical methods,etc.,is that this algorithm has very high skill and accuracy in differentiating similar images but belongs to different classes,even when the image is subject to serious damage such as noise,angle changes or pixel location,this descriptor still generates feature vectors in a way that minimizes classifier error.This improves classification and authentication.The proposed method has been evaluated using two databases Finger Vein USM (FV-USM) and Homologous Multimodal biometrics Traits(SDUMLA-HMT).In addition to having reasonable computational complexity,it has recorded excellent identification rates in noise,rotation,and transmission challenges.At best,it has a 98.2%identification rate for the SDUMLA-HMT database and a 96.1%identification rate for the FV-USM database.

    Keywords: Biometrics;finger veins;wavelet scattering;vein authentication;disaster risk reduction

    1 Introduction

    For more than two decades,biometric-based authentication systems have replaced traditional authentication systems such as ID cards,passwords,etc.During this time,many unique features of the human body have been identified,and much research has been carried out to improve the methods of identification using these features.The most famous of these features are fingerprint,face and iris[1-5].Each of these features had its difficulties and challenges.Fingerprints and palm lines were constantly exposed to physical damage,leading to changes in these lines’patterns and increased system error rates.Face-based systems were considered one of the most challenging authentication systems because factors such as ageing,facial hair growth,wearing glasses,etc.,significantly reduced these systems’error rate [6-8].Iris-based systems were considered to be susceptible systems with meager error rates.However,these systems still had a major challenge due to the iris images’complex texture.

    Furthermore,implementing iris-based systems was very costly and had high computational complexity[9,10].According to all the aspects discussed,the researcher decided to introduce techniques that were not firstly subject to destruction and had the least changes.Second,the imaging type and its computation have the least computational and implementation complexity.Therefore,the patterns of finger and palm veins were of interest to researchers.Third,researchers less favored the use of finger vein patterns because of their complexity in imaging and implementation.Since this feature was first recognized in 2003 as biometrics,extensive research has been launched to identify and respond to biometrics’challenges[11,12].These challenges were categorized into finger vein recognition problems,identity identification rate,and temporal complexity.This section will investigate the challenges and part of this research.

    Based on analysis of literature reviewed,it is found that this field of research has not yet reached to its maturity level and emerging research focus on deep learning applications[13-15].But these methods have been accompanied by two problems of computational complexity and low identification rates.Therefore,the need for an authorization system that,in addition to low error,has a high identification rate and low computational complexity is increasingly felt.The use of finger-vein based systems is associated with a major challenge called pixel misalignment.This challenge occurs when the test image is not similar to the image recorded in the database [16,17].The important point is that this challenge was inevitable.The user may place the finger at an incorrect angle or location when placing the finger on the scanner for identification and the test image may not be the same as the training image.It is also possible to apply noise to the scanner,reducing the identification rate like the challenges mentioned above [18-20].This paper attempts to introduce a method based on the response to the challenge.Scattering wavelets is one way of extracting a feature from images considered deep learning but did not have neural networks’time and computational complexity.Scattering wavelet extracts image features from Gabor wavelet filters in a structure similar to convolutional neural networks.What distinguishes this algorithm from other feature extraction methods is its very high skill and accuracy in differentiating similarities.Different classes of images,even when the image is subject to severe damage such as noise,angle changes or pixel location,this descriptor still generates feature vectors in a way that minimizes the classifier error.This paper aims to evaluate the proposed method’s performance compared to some other machine learning methods under two finger vein databases.

    2 Research Background

    This section investigates the conducted research in two types of machine learning-based research and neural network-based research.Machine learning-based research consists of three principal tasks:preprocessing,feature selection and classification[21].However,deep neural networks receive images directly and perform self-identification at the output [22].For example,a machine learning-based approach for authentication for finger vein images is presented in [23].In the preprocessing step,after extraction of the wristband,the size images are also fitted.Then,with the PCA and the linear discriminant analysis(LDA),the appropriate features have been extracted and finally classified with SVM.For example,in[24],authors used machine learning to identify finger vein-based identity.After the preprocessing process,only PCA has been used to extract the features.

    Two post-propagation neural networks and adaptive network-based fuzzy inference system(ANFIS)based fuzzy classifier methods have been used in the pattern classification stage.The fuzzy classifier is less sensitive to noise and conforms to the nature of biometric data.But the results of both methods were satisfactory.First,similar to previous research,this research indicates that PCAgenerated data have a very high degree of differentiation.Second,deep learning has an excellent result in the authentication.The following year,the researchers used a Gaussian adaptive filter to improve image quality in the preprocessing stage.Feature extraction was performed using the variance of practical binary patterns.The proposed classification is based on global adaptation and SVM,demonstrating the importance of the support vector machine in pattern recognition research[21].

    Moreover,in[24],the implemented approach employed a complex preprocessing process,including histogram equation,contrast enhancement,intermediate filtering,and Gabor filtering.Finally,the extracted features include global thresholds and Gabor filters,in which the classifier used is also SVM.The proposed method is very complex and the results are desirable.The study in [25]used a hard-adaptive algorithm for classification.Still,only the Region of Interest(ROI)was extracted in the preprocessing phase.The feature extractor used only the HCGR (Histogram of Competitive Gabor Responses),a new method.This research shows that Gabor based approaches can be very effective in the feature extraction.The research in[26]applied the rigid and complex pattern matching algorithm to classify the proposed method.The proposed method is also complicated in the preprocessing and feature extraction stages.After extraction of ROI and normalization of light and illumination of infrared images near Mumford shah have been used for minimization in the preprocessing phase.Interestingly,in the extraction stage of the local entropy threshold,characteristic of morphological refusal and morphological filtering have been suggested,despite all the complexities,their accuracy was low.Vlachos et al.[26]proposed a multidimensional biometric system using palm and finger vein patterns.Input images are preprocessed first and using a modified two-dimensional Gabor filter,gradient-based approaches are employed to extract features.These features are matched using Euclidean distance metrics and are merged using fuzzy logic techniques using the scoring level.Similarly,Liu et al.[27]used a distance calculation-based method for authentication.In the preprocessing stage after extraction of the finger normalization,a Sobel edge filter is used to improve finger vein detection.A 2-D Rotated Wavelet Filters(RWF)have been used in the zoning step.Finally,the feature vectors’distance has been calculated with a distance calculation mechanism and authentication has been done.In this way,the effect of Gabor-based features on the extraction of distinct features is well evident.Also,Shrikhande et al.[28]proposed a Sobel-based approach to finger-vein-based authentication.In this research,after the finger region’s normalization,a histogram parameters alignment stage has been used for preprocessing.At the feature extraction stage,Sobel operators have been used to extract the features and finally,a matching mechanism has been used for finger vein authentication.

    Various preprocessing processes have been employed to improve the quality of IR infrared images.These include ROI extraction,then median filtering,and histogram equation.Morphological operators and maximum curve points are used as extracted features for the multilayer perceptron neural network[29,30].The proposed method is implemented and the results are significant,indicating that the combination methods of deep learning and machine learning effectively identify finger vein.Convolutional neural networks are modeled to classify finger vein images[31].Convolutional neural networks are one of the deep learning methods that have recently attracted many researchers’attention.These methods do not require feature extraction anymore,and convolutional neural network performs the classification image by creating a data pool.The results show that the convolutional neural network-based methods can significantly improve the identification rate with finger vein images.In the following,Fang et al.[32],a technique has again used the convolutional neural network to identify finger vein-based authentication.In this study,unlike many highly complex analyses,images are convoluted and prolonged immediately after entering the neural network,and ultimately authentication is done.In this study,we used the rectified linear unit(ReLU)cost function,which is one of the fundamental functions for the convolutional neural network and more optimized cost functions have been introduced in previous years;however,the identification rate obtained is acceptable,and this again emphasizes the efficiency of the convolutional neural network in identifying finger vein patterns.Radzi et al.[33]also used a deep learning convolutional neural network for finger-vein-based authentication.The proposed neural network capabilities have been evaluated through four databases.This study’s main purpose is that the proposed deep learning method can deliver consistent and highly accurate results in the face of different quality finger images.The extensive set of experiments shows that the proposed method’s accuracy can be ideal.A series of these papers suggests that methods based on support vector machines,Gabor filters,and convolutional neural networks can significantly impact finger vein identification techniques.While a combination of the methods mentioned has been used in this study.Fig.1 illustrates the evolutionary process of this research in the last decade.

    This paper has been organized and implemented as follows.Section 3 explains the scattering wavelet,Section 4 describes the proposed method for this paper,and Section 5 discusses this study’s results.The final section concludes research.

    3 Scattering Wavelet

    The Fourier transform and coefficients of the subset family of this transform are somewhat stable to the transition.However,this transform is highly unstable against deformation,especially at high signals,and any signal deformation at large signals causes major changes[34].For this reason,wavelets were used more extensively to resist deformation.Wavelet has a local waveform,unlike the Fourier Sine waveform,that causes its stability against the changes[35].

    On the other hand,the wavelet transform calculates the convolutions with the wavelet filters,so the covariance transform is unstable against the changes.For this purpose,as described in [36],a set of wavelet filters is required to produce descriptors with a set of stable features resistant to deformation,transition,scale,direction and dilation.The two-dimensional directional wavelets are obtained by scaling and rotating a single bandpass filterψ.Suppose thatGis a group of finite and discrete rotational angles as a member of R2.Therefore,the set of multi-scale filters for each scale ofj∈Zand rotationr∈Gare obtained according to Eq.(1):

    If the Fourier transformψ(ω)is the frequency center ofη,then Eq.(2)has support in the center 2jrηwith bandwidth proportional to 2j:

    Figure 1:The evolutionary process of related research

    A wavelet transforms filters the signalxusing a family of wavelets {x*ψλ(u)}λ.This filter calculates a filter bank consisting of rotated and dilated wavelets with no unusual features.The filter bank’s use will continue to resist changes such as rotation and dilation,provided that the wavelet scale filters cover the entire frequency plan rotation.This research uses the filter of Morlet wavelet banks and Eq.(3)has been used to obtain these filters.

    Finally,it should be noted that these filter banks make them more resistant to rotation and dilation.But the important point is that a wavelet transform is obtained with the translation,so it is not stable against the translation.Therefore,to produce a stable feature vector against change,it must be produced in a nonlinear (subjected to an operator) structure.For example,suppo se R is a linear or nonlinear operator calculated by the translationR(Lcx)=LcRx.So,the integralis stable against the translation.Still,if this operator is obtained by convolution,the wavelet filter with the signalxs obtained must be somewhat resistant to translation because∫ψλ(u)du=0 of these results∫x*ψλ(u)du=0.

    Now,if we considerRx=M(x*ψλ)andMis a linear operator,the integral can be a small value.But if theMoperator is a nonlinear pointwise operator.Thus,the integral obtainedRxbecomes zero andRxbecomes stable against the translation.The modulus operator is one of the most applicable nonlinear operators suitable for this problem.Therefore,in conclusion,it should be said that the most stable coefficients against translation are calculated by repeating modulus operators and wavelet transform.SupposeU[λ]x=|x*ψλ|each sequencep=(λ1,λ2,...,λm)produces a path that makes a nonlinear product such as Eq.(4):

    A scattering transform in the pathphas been defined as an integral normalized by the Dirac response.Each scattering factorSx(p)is stable against x signal translation.But what is clear is the similarity of this transform to the Fourier transform modulus.This conversion is also against stable translation.However,the scattering is a continuous Lipschitz and is highly resistant to deformation,but this is not the Furrier conversion.Therefore,it is often better than the descriptors do the computations locally for classification.This is stable to transitions smaller than a predefined 2jscale while maintaining spatial variability on a larger 2jscale.This is achieved by scattering integral localization by scaling the spatial window Eq.(5).

    Eq.(6)defines a scattering transform in the neighborhood ofu:

    This ultimately results in Eq.(7):

    If a set has the length of M,itSJ[p]x(u)is called the scattering coefficients in-depth m and scale 2J.These coefficients are calculated in the layermof a specified convoluted network.For large scale coefficients of multiple layers of the convoluted network,the least information mustn’t be lost.Fig.2 shows an example of a scattering wavelet.

    4 Proposed Method

    The proposed authentication system has been implemented based on the scattering wavelet descriptor and the K Nearest Neighbors (KNN) classifier.Like many authentication methods,this consists of four main parts:preprocessing,feature extraction,dimension reduction and authentication.The finger region is first separated in the raw image in preprocessing section.The image is then sharpened using a Butterworth filter and the image contrast is improved at the end.In the feature extraction part of the research,the wavelet scattering algorithm is used and the basic component analysis has been used in the dimension reduction part.Finally,the identification section also uses the KNN classifier[21].Fig.3 shows the block diagram of the proposed method.

    Figure 2:An example of a scattering wavelet step on an image

    4.1 Pre-Processing

    In the preprocessing phase,three operations of normalization,filtering and contrast enhancement are performed.The raw image’s finger region is first identified using an active contour algorithm in image normalisation.This algorithm has been widely used in finger vein related research [36].Then,using the edge detection algorithm,the normal finger area from the raw image,as shown in Fig.4.Following the preprocessing,the normalized image has been sharpened using the Butterworth filter to enhance the clarity of the image veins and,this improves the differentiation of image feature vectors.Finally,the image’s contrast is improved to provide the image for feature extraction.During the contrast enhancement stage,the clarity of the vein segments is distinguished from the whole image.

    4.2 Features Extraction

    The discriminative features extraction and selection are challenging tasks in the authentication process.In this research,required wavelet cascade is generated using the Gabor wavelet filters and proportional to the image size.In the second step,the iris image’s scattering transform is calculated using the generated wavelet cascade.This transform calculates the features of each depth of image separately and in the final step,by combining the vectors of each depth,the feature vector is developed for each image.These feature vectors have the differentiation feature to fall into the right classes according to most classifiers’distance criterion.But one of the major problems in deep learning research is the production of feature vectors of immense dimensions,which is not an exception.For example,the feature vectors extracted from finger vein images have over 30000 features.The critical point is that classifying these dimensions of feature vectors for each classification is complicated and time-consuming.Secondly,feature vectors with large dimensions will have a correlation feature.

    For this reason,PCA has been used to quantitatively and qualitatively improve the properties of feature vectors.The generated feature vector contains new values that are quantitatively much smaller than the original feature vector.In terms of the vector quality,it is more distinct than the feature vector extracted by the descriptor.

    Figure 4:The results of an image normalization phase:(a):raw image,(b):normalized image,(c):normal finger area

    4.3 Classification

    After the preparation of the feature vectors,the authentication procedure is performed using the classifier.At this stage,the test data is classified with the feature vectors collected in the feature database,and the identity recognition procedure is performed.In this paper,the K Nearest Neighbors classifier has been used for classification.In addition to its high accuracy,this classifier has very low computational complexity in recognizing,which reduces the chronology.

    5 Results and Discussion

    In this section,the proposed method’s efficiency is evaluated using SDUMLA-HMT [37]and FV-USM [38]database images.Unfortunately,the finger veins in the FV-USM database had less clarity than the SDUMLA-HMT database,which will cause a challenge to the proposed method.The parameters of the proposed method are presented in Tab.1

    5.1 Databases

    To evaluate the proposed method,palm-line images of two databases SDUMLA-HMT[37]and FV-USM [38]have been used.For experiments,databases are distributed into three segments.The first segment contains images by which the best parameters in the proposed method’s descriptor and classifier are identified.The second segment,contains training images that comprise 40%of the database images and third segment of the proposed method’s images.Tab.2 shows the specifications of the two databases.

    5.2 Experimental Results

    Several important points should be noted in describing the implementation of the proposed method.Sampling the training and test images were randomly sampled in all experiments and 4 of 6 images were selected for training and two images were randomly selected to apply the rotation,translation and noise effects on the image as illustrated in Fig.5.The dataset used in these tests for both databases was 600 images from 100 individuals (4 images per person for training and 2 images for testing).Then the method was introduced.The comparison method is repeated 10 times with random sampling for test and training set and calculated and recorded for each run of the identification accuracy[39].The identification accuracy recorded in the results table is the average of 10 times tests’implementation.The confidence interval range has also been calculated by considering the identification accuracy obtained from 10 repetitions of each trial and the confidence level of 95%.Tabs.3 to 5 show the results of this study.The first challenge described in this section is the challenge of noise in the image.Noise challenge is one of the most common challenges from the users and the devices.It is expected that the proposed methods in this field will be resilient to this important challenge.Tab.3 exhibits the results of recommended noise challenge method.

    Table 2:Description of the databases

    Figure 5:Different image challenges:(a):raw image,(b):translation,(c):rotation,(d):noise

    Table 3:Results of the proposed noise challenge method

    Table 4:Results of the proposed method with the rotation challenge

    Table 5:Results of the proposed method with the translation challenge

    According to Tab.3,the proposed method has high stability against noise due to Gabor wavelet filters,which are high-pass filters and eliminate a wide range of noises.Therefore,the proposed method based on scattering wavelets against noise will be stable.Fig.6 shows the results of Tab.3 on the graph.

    Figure 6:The results of the proposed method with noise challenge

    Fig.6 shows that the KNN classifier has evaluated both databases and results relative to the SVM.It can also be seen that the identification rate did not decrease significantly as the noise density increased.However,the proposed method’s failure point against noise is somehow the density of 0.08 because,after this density,the proposed method’s identification rate is 90%.The proposed method’s rotation challenge will be discussed in the following section and its results shown in Tab.4.

    The results shown in Tab.4 illustrate well the impact of wavelet cascade performance on the rotation challenge.Several filters with different angles and orientations are applied to the image.As a result,it usually understands minor rotations due to user error in placing the hand on the scanner and reducing the system error rate.However,this error is inevitable,and the proposed systems must have the required predictions to respond to this challenge.Fig.7 shows a comparison of the rotation results in Tab.4.

    Figure 7:Results of the proposed method with the rotation challenge

    Fig.7 also shows superiority of the K Nearest Neighbors classifier to the SVM.However,what is visible is the stability of the proposed method in partial rotations,which is especially important in business authentication systems.At the end of this article,the impact of the proposed challenge with the translation challenge will be examined,as shown in Tab.5.

    In all types of biometrics,especially biometrics that contain microscopic images,the dimensions of the images and the imaging area are extremely important.By losing part of the image by moving the finger along the x-axis or the y-axis,a portion of the area considered for imaging disappears and reduces the identification rate.Because this error occurs from the user,this error is inevitable and the proposed algorithm must be responsive to this challenge and have the necessary stability to meet this challenge.The proposed scattering wavelet-based method has been stable against this challenge by producing very accurate feature vectors for each class of images.Fig.8 shows a diagram of the proposed method with this challenge.

    Fig.8 shows the stability of the proposed method in the translation challenge.Thus,the KNN classifier’s use in this system greatly maintains the identification rate stable against translation.

    Figure 8:Results of the proposed translation challenge method

    6 Conclusion

    Biometric finger veins are a unique biometric in humans for authentication.This biometrics has changed in various conditions,such as changes in veins’clarity,angles,scales,veins orientation,etc.These changes make the structure of the images unstable and therefore challenging for authentication algorithms.This paper has presented an improved scattering wavelet-based authentication approach with fundamental component analysis.For authentication purpose,proposed method has several stages including preprocessing,normalization,feature extraction using wavelet scattering,dimension reduction using PCA,classification with SVM and KNN.The proposed method has shown a tangible superiority over the compared methods with a very favorable identification rate in noise,translation,rotation,and scaling.Appropriate preprocessors and stable descriptors against changes have caused the authentication results to have significant superiority in different challenges.Finally,98.2%authentication rate for the SDUMLA-HMT database and a 96.1%authentication rate for the FV-USM database attained.

    Acknowledgement:This research is supported by Artificial Intelligence &Data Analytics Lab(AIDA) CCIS Prince Sultan University,Riyadh 11586 Saudi Arabia.The authors also would like to acknowledge the support of Prince Sultan University for paying the Article Processing Charges(APC)of this publication.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no interest in reporting regarding the present study.

    欧美中文综合在线视频| 三上悠亚av全集在线观看| 国产不卡一卡二| 国产成人精品在线电影| 国产国语露脸激情在线看| 美女扒开内裤让男人捅视频| 中文字幕最新亚洲高清| 日日夜夜操网爽| 九色亚洲精品在线播放| 乱人伦中国视频| 老熟女久久久| 欧美av亚洲av综合av国产av| av有码第一页| 女警被强在线播放| 色播在线永久视频| 国产深夜福利视频在线观看| 国产精品一区二区在线观看99| 成年人黄色毛片网站| 国内久久婷婷六月综合欲色啪| 黄色毛片三级朝国网站| 亚洲欧美一区二区三区久久| 精品国产一区二区久久| 欧美日韩av久久| 亚洲av成人一区二区三| 国产1区2区3区精品| 午夜日韩欧美国产| 国产野战对白在线观看| 满18在线观看网站| 国产高清videossex| 777久久人妻少妇嫩草av网站| 免费少妇av软件| 国产有黄有色有爽视频| 欧美成人免费av一区二区三区 | 中文亚洲av片在线观看爽 | 免费在线观看日本一区| 91字幕亚洲| 国产精品.久久久| 69精品国产乱码久久久| 色播在线永久视频| 日本欧美视频一区| 久久精品91无色码中文字幕| 国产精品一区二区免费欧美| 男人舔女人的私密视频| 精品国产乱码久久久久久男人| 很黄的视频免费| 亚洲精品av麻豆狂野| 不卡一级毛片| 人人妻人人澡人人爽人人夜夜| 99久久国产精品久久久| 丝袜美足系列| 老熟女久久久| 国产成人精品久久二区二区91| 欧美成人免费av一区二区三区 | 久久国产精品大桥未久av| 很黄的视频免费| 精品国产国语对白av| 国产精品影院久久| 91av网站免费观看| 午夜久久久在线观看| 免费日韩欧美在线观看| 日韩精品免费视频一区二区三区| 欧美亚洲 丝袜 人妻 在线| 中文字幕最新亚洲高清| 纯流量卡能插随身wifi吗| 日韩三级视频一区二区三区| 操美女的视频在线观看| a级毛片黄视频| 国产不卡一卡二| 天天操日日干夜夜撸| 欧美中文综合在线视频| 不卡一级毛片| 国内毛片毛片毛片毛片毛片| 午夜成年电影在线免费观看| 精品国产超薄肉色丝袜足j| 欧美老熟妇乱子伦牲交| 男人操女人黄网站| 在线国产一区二区在线| 日韩免费av在线播放| 亚洲中文av在线| 久久婷婷成人综合色麻豆| 亚洲片人在线观看| 电影成人av| 国产激情久久老熟女| 色老头精品视频在线观看| 国产精品香港三级国产av潘金莲| 国产精华一区二区三区| 一级毛片女人18水好多| 涩涩av久久男人的天堂| 亚洲五月天丁香| 国产aⅴ精品一区二区三区波| 一级黄色大片毛片| 成人免费观看视频高清| 中文字幕色久视频| 国产精品一区二区精品视频观看| 91精品三级在线观看| 亚洲一卡2卡3卡4卡5卡精品中文| 欧美日韩国产mv在线观看视频| 久久久国产欧美日韩av| 色精品久久人妻99蜜桃| 国产片内射在线| 黄网站色视频无遮挡免费观看| 亚洲成av片中文字幕在线观看| 91国产中文字幕| 一级毛片女人18水好多| 亚洲全国av大片| 国产午夜精品久久久久久| 国产麻豆69| 精品少妇久久久久久888优播| 天天躁日日躁夜夜躁夜夜| 在线观看午夜福利视频| 国产成人影院久久av| 91麻豆av在线| 午夜福利影视在线免费观看| 丝瓜视频免费看黄片| 国产精品久久久av美女十八| 叶爱在线成人免费视频播放| a级毛片在线看网站| tocl精华| 亚洲第一欧美日韩一区二区三区| 两个人看的免费小视频| 成年人午夜在线观看视频| 欧美+亚洲+日韩+国产| 一进一出好大好爽视频| 黄频高清免费视频| 国产欧美日韩综合在线一区二区| 黄色丝袜av网址大全| 欧美乱色亚洲激情| 18禁观看日本| 欧美激情 高清一区二区三区| 亚洲国产精品一区二区三区在线| 后天国语完整版免费观看| 人人妻人人添人人爽欧美一区卜| 亚洲国产毛片av蜜桃av| 午夜福利在线观看吧| 国产在线精品亚洲第一网站| 天天躁狠狠躁夜夜躁狠狠躁| 久久性视频一级片| 亚洲专区字幕在线| 天堂动漫精品| 久久草成人影院| 亚洲专区国产一区二区| 91成年电影在线观看| 欧美一级毛片孕妇| 12—13女人毛片做爰片一| 叶爱在线成人免费视频播放| 狂野欧美激情性xxxx| 久久 成人 亚洲| 亚洲少妇的诱惑av| 亚洲久久久国产精品| 成人黄色视频免费在线看| 亚洲成人手机| 久久精品国产清高在天天线| 日本vs欧美在线观看视频| 下体分泌物呈黄色| 人人妻人人澡人人爽人人夜夜| 777米奇影视久久| 一边摸一边做爽爽视频免费| 俄罗斯特黄特色一大片| 久久人妻av系列| 亚洲专区中文字幕在线| 国产精品 国内视频| 久久青草综合色| 精品亚洲成国产av| a级毛片在线看网站| 99精品在免费线老司机午夜| 亚洲片人在线观看| 久9热在线精品视频| 无限看片的www在线观看| 国产精品久久久人人做人人爽| 后天国语完整版免费观看| 一本综合久久免费| www.999成人在线观看| 国产97色在线日韩免费| 在线观看www视频免费| 人人妻人人澡人人爽人人夜夜| 国产亚洲欧美精品永久| 男人舔女人的私密视频| a在线观看视频网站| 男男h啪啪无遮挡| 午夜福利欧美成人| 热99re8久久精品国产| 美女国产高潮福利片在线看| 色94色欧美一区二区| 校园春色视频在线观看| 黑人巨大精品欧美一区二区蜜桃| 亚洲aⅴ乱码一区二区在线播放 | 麻豆乱淫一区二区| 黄频高清免费视频| 精品一区二区三区av网在线观看| 国产又爽黄色视频| 国产精品秋霞免费鲁丝片| 久久久久国产精品人妻aⅴ院 | 亚洲一区二区三区不卡视频| 亚洲熟妇中文字幕五十中出 | 中文字幕精品免费在线观看视频| 在线天堂中文资源库| 婷婷丁香在线五月| 黑人巨大精品欧美一区二区蜜桃| 久久性视频一级片| 水蜜桃什么品种好| 亚洲九九香蕉| 日日爽夜夜爽网站| 一区福利在线观看| 亚洲免费av在线视频| 黑人巨大精品欧美一区二区mp4| 久久香蕉国产精品| 国产精品一区二区在线不卡| 亚洲国产毛片av蜜桃av| 精品国产一区二区久久| 999久久久精品免费观看国产| 香蕉丝袜av| 精品第一国产精品| 一a级毛片在线观看| 中文字幕人妻熟女乱码| 国产精品1区2区在线观看. | 亚洲中文日韩欧美视频| 18禁国产床啪视频网站| 亚洲avbb在线观看| 村上凉子中文字幕在线| 99精品久久久久人妻精品| 亚洲午夜精品一区,二区,三区| 久久国产精品大桥未久av| 亚洲精品国产一区二区精华液| 亚洲全国av大片| 国产精品久久视频播放| 高清欧美精品videossex| 男女床上黄色一级片免费看| 色尼玛亚洲综合影院| 天天躁夜夜躁狠狠躁躁| 一级片免费观看大全| 一级毛片高清免费大全| 亚洲av美国av| 777米奇影视久久| 中文字幕制服av| 亚洲av欧美aⅴ国产| 少妇猛男粗大的猛烈进出视频| 午夜福利乱码中文字幕| 女人被狂操c到高潮| 亚洲精品中文字幕在线视频| 高清黄色对白视频在线免费看| 窝窝影院91人妻| 国产av一区二区精品久久| 日本wwww免费看| 黑人巨大精品欧美一区二区mp4| 精品国产一区二区三区久久久樱花| 最新美女视频免费是黄的| 99国产极品粉嫩在线观看| 中国美女看黄片| 搡老熟女国产l中国老女人| 人妻一区二区av| 亚洲综合色网址| 亚洲专区中文字幕在线| 两性夫妻黄色片| 下体分泌物呈黄色| 在线看a的网站| 丁香六月欧美| 99国产精品免费福利视频| 国产男女内射视频| 啦啦啦免费观看视频1| 国产精品美女特级片免费视频播放器 | 国产欧美日韩精品亚洲av| bbb黄色大片| 色综合欧美亚洲国产小说| 亚洲av日韩精品久久久久久密| 成人三级做爰电影| 亚洲中文字幕日韩| 国产精品av久久久久免费| 在线播放国产精品三级| 亚洲少妇的诱惑av| 欧美亚洲 丝袜 人妻 在线| 欧美日韩国产mv在线观看视频| 日韩精品免费视频一区二区三区| 午夜精品在线福利| 色综合婷婷激情| 国产淫语在线视频| 操出白浆在线播放| 亚洲国产精品合色在线| 国产精品二区激情视频| 99久久综合精品五月天人人| 免费在线观看影片大全网站| 国产伦人伦偷精品视频| 91老司机精品| 午夜免费成人在线视频| av超薄肉色丝袜交足视频| 在线观看免费高清a一片| 一级a爱片免费观看的视频| 51午夜福利影视在线观看| 日本撒尿小便嘘嘘汇集6| 久热爱精品视频在线9| 国产伦人伦偷精品视频| 亚洲专区字幕在线| 久久人妻福利社区极品人妻图片| 丁香六月欧美| 国产欧美亚洲国产| 免费观看精品视频网站| 亚洲精品美女久久久久99蜜臀| 亚洲国产中文字幕在线视频| av在线播放免费不卡| 夜夜夜夜夜久久久久| 飞空精品影院首页| 亚洲一卡2卡3卡4卡5卡精品中文| 亚洲三区欧美一区| 最新的欧美精品一区二区| 亚洲va日本ⅴa欧美va伊人久久| 国产精品.久久久| 亚洲精品久久午夜乱码| 天堂动漫精品| 人妻丰满熟妇av一区二区三区 | 黑丝袜美女国产一区| 精品一区二区三区av网在线观看| 亚洲男人天堂网一区| 国产精品 欧美亚洲| 精品亚洲成a人片在线观看| 操出白浆在线播放| 亚洲专区中文字幕在线| 国产国语露脸激情在线看| 亚洲精品中文字幕在线视频| 一区在线观看完整版| 丰满饥渴人妻一区二区三| 久久久久久久久久久久大奶| 国产精品99久久99久久久不卡| 久久精品国产亚洲av高清一级| 亚洲欧美一区二区三区久久| 俄罗斯特黄特色一大片| 国产成+人综合+亚洲专区| 久久精品人人爽人人爽视色| 热re99久久国产66热| 国产午夜精品久久久久久| 我的亚洲天堂| 一二三四社区在线视频社区8| 亚洲精品国产色婷婷电影| 国产xxxxx性猛交| 国产欧美日韩一区二区精品| 日韩免费高清中文字幕av| 黄色毛片三级朝国网站| 成人特级黄色片久久久久久久| 欧美在线黄色| 99riav亚洲国产免费| 亚洲av片天天在线观看| 精品国产一区二区三区四区第35| 欧美成狂野欧美在线观看| 国产成人免费无遮挡视频| 国产高清激情床上av| 午夜精品久久久久久毛片777| 欧美激情久久久久久爽电影 | 大码成人一级视频| 色婷婷久久久亚洲欧美| 欧美激情 高清一区二区三区| 久久这里只有精品19| 亚洲一区中文字幕在线| 在线天堂中文资源库| 黑人猛操日本美女一级片| 悠悠久久av| 90打野战视频偷拍视频| 18禁裸乳无遮挡动漫免费视频| 一级a爱视频在线免费观看| 捣出白浆h1v1| 热99re8久久精品国产| 日韩免费高清中文字幕av| 国产精品国产av在线观看| 欧美人与性动交α欧美精品济南到| 好看av亚洲va欧美ⅴa在| 热99久久久久精品小说推荐| 精品无人区乱码1区二区| 一级a爱视频在线免费观看| 久久人妻福利社区极品人妻图片| 50天的宝宝边吃奶边哭怎么回事| 午夜影院日韩av| 如日韩欧美国产精品一区二区三区| av电影中文网址| www.999成人在线观看| 欧美成人免费av一区二区三区 | 日本黄色日本黄色录像| 中文字幕色久视频| 老司机靠b影院| 麻豆av在线久日| av电影中文网址| 精品国产一区二区三区久久久樱花| 欧美日韩国产mv在线观看视频| 日韩熟女老妇一区二区性免费视频| 丁香六月欧美| 精品国产一区二区三区久久久樱花| 天天躁日日躁夜夜躁夜夜| 亚洲九九香蕉| 又黄又爽又免费观看的视频| 中国美女看黄片| 中文亚洲av片在线观看爽 | 国产欧美日韩一区二区三区在线| 一进一出抽搐动态| 久久久国产欧美日韩av| 国产男女内射视频| 久久中文看片网| 黄片播放在线免费| 国产精品.久久久| 精品卡一卡二卡四卡免费| 亚洲av电影在线进入| 欧美日韩国产mv在线观看视频| 欧美日韩亚洲综合一区二区三区_| 又黄又粗又硬又大视频| 老鸭窝网址在线观看| 麻豆成人av在线观看| 嫁个100分男人电影在线观看| 一区二区三区激情视频| 69精品国产乱码久久久| 午夜视频精品福利| 国产成人一区二区三区免费视频网站| 免费黄频网站在线观看国产| 国产激情久久老熟女| 少妇被粗大的猛进出69影院| 9色porny在线观看| 亚洲av日韩精品久久久久久密| 9191精品国产免费久久| 18禁美女被吸乳视频| 下体分泌物呈黄色| 中文欧美无线码| 黄色 视频免费看| 黄色片一级片一级黄色片| 国产男靠女视频免费网站| 久久精品国产99精品国产亚洲性色 | av网站在线播放免费| avwww免费| 中文字幕最新亚洲高清| 日韩三级视频一区二区三区| 搡老熟女国产l中国老女人| 亚洲欧美一区二区三区黑人| 精品少妇一区二区三区视频日本电影| 国产欧美日韩一区二区精品| 女人高潮潮喷娇喘18禁视频| 成人三级做爰电影| 黄片小视频在线播放| xxxhd国产人妻xxx| 精品国产一区二区三区久久久樱花| 两性午夜刺激爽爽歪歪视频在线观看 | 国产成人影院久久av| 欧美亚洲日本最大视频资源| 日本撒尿小便嘘嘘汇集6| 免费少妇av软件| 男女高潮啪啪啪动态图| 久久久久精品人妻al黑| 成人免费观看视频高清| 日韩熟女老妇一区二区性免费视频| 国产精品免费大片| 精品亚洲成a人片在线观看| 国产麻豆69| 亚洲精品在线观看二区| 美女 人体艺术 gogo| 老熟妇仑乱视频hdxx| 久久精品成人免费网站| 午夜两性在线视频| 国产黄色免费在线视频| 欧美日韩av久久| 久久久久久久久久久久大奶| a级毛片黄视频| 男女下面插进去视频免费观看| 欧美日韩瑟瑟在线播放| 久久人妻熟女aⅴ| 国产免费男女视频| 一夜夜www| 老司机亚洲免费影院| 精品福利永久在线观看| 欧美性长视频在线观看| 欧美激情高清一区二区三区| 一本综合久久免费| 狠狠婷婷综合久久久久久88av| 久久影院123| 人妻 亚洲 视频| 亚洲avbb在线观看| 国产真人三级小视频在线观看| 少妇的丰满在线观看| 亚洲成人免费av在线播放| 首页视频小说图片口味搜索| 亚洲美女黄片视频| 精品久久久久久电影网| 国产无遮挡羞羞视频在线观看| 久久99一区二区三区| netflix在线观看网站| 久久久水蜜桃国产精品网| 国产精品永久免费网站| 久久国产精品男人的天堂亚洲| 亚洲欧美激情综合另类| 精品电影一区二区在线| 亚洲av第一区精品v没综合| 国产精品 国内视频| 美女福利国产在线| 捣出白浆h1v1| av天堂久久9| 亚洲视频免费观看视频| 亚洲avbb在线观看| 国产精品香港三级国产av潘金莲| 自拍欧美九色日韩亚洲蝌蚪91| 国产男靠女视频免费网站| 精品久久久久久电影网| 老熟女久久久| 老司机午夜十八禁免费视频| 日韩欧美国产一区二区入口| 一进一出抽搐动态| 欧美+亚洲+日韩+国产| 热99re8久久精品国产| 欧美+亚洲+日韩+国产| 国产麻豆69| 日本五十路高清| 国产97色在线日韩免费| 久久久国产欧美日韩av| 欧美黄色淫秽网站| 91成人精品电影| 国产97色在线日韩免费| 涩涩av久久男人的天堂| av网站在线播放免费| 亚洲熟妇中文字幕五十中出 | 精品国产亚洲在线| 成人国语在线视频| 99热只有精品国产| 国产亚洲精品一区二区www | 亚洲少妇的诱惑av| 欧美大码av| 大陆偷拍与自拍| 国产亚洲av高清不卡| x7x7x7水蜜桃| 80岁老熟妇乱子伦牲交| 丝袜美足系列| av超薄肉色丝袜交足视频| 纯流量卡能插随身wifi吗| 国产亚洲欧美精品永久| 大香蕉久久网| 下体分泌物呈黄色| 无人区码免费观看不卡| 少妇被粗大的猛进出69影院| 9191精品国产免费久久| 高清毛片免费观看视频网站 | 国产91精品成人一区二区三区| 亚洲国产欧美网| 一边摸一边抽搐一进一小说 | 黑人猛操日本美女一级片| 久久久国产精品麻豆| 欧美日韩av久久| 日本一区二区免费在线视频| 黄色女人牲交| 91在线观看av| 男人的好看免费观看在线视频 | 亚洲av欧美aⅴ国产| ponron亚洲| 日韩欧美在线二视频 | 亚洲午夜精品一区,二区,三区| 一级作爱视频免费观看| 久久亚洲精品不卡| 亚洲av片天天在线观看| 最新的欧美精品一区二区| videos熟女内射| 黄片播放在线免费| 在线看a的网站| 中文字幕制服av| 国产精品 欧美亚洲| 免费高清在线观看日韩| 日本黄色视频三级网站网址 | 午夜福利在线免费观看网站| 国产精品亚洲一级av第二区| 国产精品亚洲av一区麻豆| 深夜精品福利| 久久久久国产精品人妻aⅴ院 | av在线播放免费不卡| 少妇猛男粗大的猛烈进出视频| 亚洲五月天丁香| 免费看a级黄色片| 91老司机精品| 亚洲aⅴ乱码一区二区在线播放 | 午夜亚洲福利在线播放| 老司机靠b影院| 国产激情久久老熟女| 露出奶头的视频| 日韩中文字幕欧美一区二区| 大码成人一级视频| 女人久久www免费人成看片| 九色亚洲精品在线播放| 夜夜夜夜夜久久久久| 91精品三级在线观看| 手机成人av网站| 极品人妻少妇av视频| 人妻一区二区av| 欧美激情久久久久久爽电影 | 午夜精品久久久久久毛片777| 午夜福利乱码中文字幕| 91在线观看av| 欧美日韩视频精品一区| 日韩欧美一区视频在线观看| 人妻丰满熟妇av一区二区三区 | 一本大道久久a久久精品| 最新的欧美精品一区二区| 久久久国产欧美日韩av| 国精品久久久久久国模美| 亚洲五月天丁香| 久久久国产欧美日韩av| 啦啦啦在线免费观看视频4| 亚洲一区二区三区欧美精品| 欧美av亚洲av综合av国产av| 日日摸夜夜添夜夜添小说| 免费看十八禁软件| 丁香欧美五月| 丝袜美足系列| 欧美乱妇无乱码| 国产淫语在线视频| 亚洲欧美一区二区三区久久| 成人黄色视频免费在线看| 国产av一区二区精品久久| 又黄又粗又硬又大视频| 国产欧美日韩综合在线一区二区| 国产91精品成人一区二区三区| 免费日韩欧美在线观看| 久久久精品国产亚洲av高清涩受| 亚洲精品一二三| 又黄又爽又免费观看的视频| 日韩一卡2卡3卡4卡2021年| 天堂动漫精品| 在线观看66精品国产| 中出人妻视频一区二区| 露出奶头的视频|