• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Cancellable Multi-Biometric Template Generation Based on Arnold Cat Map and Aliasing

    2022-08-24 07:02:22AhmedAyoupAshrafKhalafWalidElShafaiFathiAbdElSamieFahadAlraddadyandSalwaSeragEldin
    Computers Materials&Continua 2022年8期

    Ahmed M.Ayoup,Ashraf A.M.Khalaf,Walid El-Shafai,Fathi E.Abd El-Samie,Fahad Alraddady and Salwa M.Serag Eldin,5

    1Electrical Communications Engineering Department,Faculty of Engineering,Minia University,Minia,61111,Egypt

    2Electronics and Electrical Communications Engineering Department,Faculty of Electronic Engineering,Menoufia University,32952,Menouf,Egypt

    3Security Engineering Lab,Computer Science Department,Prince Sultan University,Riyadh,11586,Saudi Arabia

    4Department of Computer Engineering,College of Computers and Information Technology,Taif University,P.O.Box 11099,Taif,21944,Saudi Arabia

    5Department of Electronics and Electrical Communications Engineering,Faculty of Engineering,Tanta University,Tanta,Egypt

    Abstract: The cancellable biometric transformations are designed to be computationally difficult to obtain the original biometric data.This paper presents a cancellable multi-biometric identification scheme that includes four stages:biometric data collection and processing,Arnold’s Cat Map encryption,decimation process to reduce the size,and final merging of the four biometrics in a single generated template.First,a 2D matrix of size 128×128 is created based on Arnold’s Cat Map(ACM).The purpose of this rearrangement is to break the correlation between pixels to hide the biometric patterns and merge these patterns together for more security.The decimation is performed to keep the dimensions of the overall cancellable template similar to those of a single template to avoid data redundancy.Moreover,some sort of aliasing occurs due to decimation,contributing to the intended distortion of biometric templates.The hybrid structure that comprises encryption,decimation,and merging generates encrypted and distorted cancellable templates.The simulation results obtained for performance evaluation show that the system is safe,reliable,and feasible as it achieves high security in the presence of noise.

    Keywords: Aliasing technique;selective encryption;ACM;decimation process

    1 Introduction

    Compared with traditional authentication systems,biometric authentication systems have certain advantages over systems that adopt passwords and Personal Identification Number (PIN) codes.In biometric systems,authorized users only should have the ability to access personal information.Hence,information security needs to be guaranteed.These systems require authenticated persons to provide their unique personal data during the authentication period[1].Therefore,a biometric authentication system is a reliable and safe choice.Biometric identification is a method of identifying people based on their certain personal characteristics[2].Physiological biometric technology uses a person’s unique physical characteristics,such as fingerprints,faces,palm prints,iris,or Deoxyribonucleic Acid(DNA)sequences,to identify users,and it has proven to be a powerful tool in identity verification systems.The main advantage of biometrics is that they are not vulnerable to theft and loss.They are independent of users’memory.Moreover,they do not change significantly over time,and it is difficult for a person to change his own physiological biometrics or imitate someone else measurements.Among the various biometrics in security applications with the scope of the digital collection,palm prints have recently received more attention among researchers[3].

    The popularity of biometrics is driven by two factors:technological progress and safety requirements.For a long time,the need to use special sensors to collect biometric data has been considered a disadvantage,especially when viewing multiple biometric data.There should be an ability to collect data using modern sensors.For example,smartphones contain several potential biosensors,some of which are designed to be used,such as fingerprint scanners,while others can capture biometric data as auxiliary tools,such as digital cameras.High-resolution images are used for face recognition,iris recognition,and retina scanning.Microphones are used for recording.In addition,walking needs an inertial sensor.Of course,the same computer can be used to collect personal data,which requires further research on the security of the system[3].

    The biometric devices may be defective,and errors may occur.There are two types of error measurement metrics in biometric systems:False Rejection Rate (FRR) and False Acceptance Rate(FAR).If the device rejects an authorized person,this counts into the FRR,and if the device accepts an unauthorized person,this counts into the FAR.By combining two or more physical characteristics to determine the FAR and the FRR,a multi-biometric system has been built with other levels of precautions[4].

    Biometric systems are usually prone to problems such as sensor data corruption,missing characters,under-representation,overshoot,and incompleteness.The multi-modal biometric identification system can reduce the Failure-To-Capture(FTC)and Failure-To-Enroll(FTE)values and provide the highest level of anti-counter-feting protection,because it is difficult to develop multiple biometric sources at the same time.In the feature extraction process,fingerprint and iris feature extraction can be implemented with multi-modal biometric systems.We improve the realization of multi-modal biometric characteristics.

    This article is divided into five parts.The first part introduces the cancellable biometric concepts,biometric security and privacy issues,and the main contributions of the proposed cancellable biometric algorithm.The second part introduces the related work of various researchers in this field.In the third part,we introduce the proposed algorithm and the authentication strategy.In the fourth part,we introduce the simulation results.Finally,we give the conclusion and future work.

    1.1 Cancellable Biometric Concepts

    The cancellable biometric transformation is designed to be computationally difficult to obtain the original biometric data.As shown in Fig.1,the original image is not used,but an irreversible image transformation is used,alternatively.In case the cancellable template is stolen,it can be overwritten through another transformation.This can protect user privacy,because it is computationally difficult to restore the original patterns from the transformed templates.In addition,the templates can be changed easily in hacking scenarios.This methodology prevents database overlap,because each application has a different conversion (See Fig.2).In addition,this methodology does not affect the accuracy of the matching process,because the statistical properties of the attributes are roughly preserved after conversion[5-7].

    Figure 1:Layout of a cancellable biometric authentication system[5-7]

    1.2 Security and Privacy Aspects of Biometric Systems

    Biometric systems are considered as secure tools of identity verification,but fraudsters have also developed new methods to bypass the security of biometric systems.The problem with biometric authentication systems is that the biometric data is not confidential.There are eight possible attacks on biometric systems[8].Fig.2 shows various attacks at different points in the biometric verification system.

    Figure 2:Various attacks at different points of the biometric system[9]

    Attackers can display fake biometric data in front of the sensor [9].For example,a person can create a fake finger with a fake fingerprint at the sensor.We can bypass the facial recognition system and take a photo of a legitimate user in front of the camera.In addition,we can use some lenses to avoid scanning of the iris [8].Fig.1 shows the possible attacks and possible solutions for biometric systems.

    1.3 Contributions and Novelty

    The main contributions of this paper are summarized as follows:

    1) Proposal of a cancellable multi-biometric encryption technique that achieves a decrease in the over-execution enrollment process compared with the cancellable biometric technique in[10].This proposal has a total runtime of 19.8 s,which makes it more suitable for real-time and Internet-of-things(IoT)applications.

    2) Introducing a new cancellable biometric recognition technique using a combination of decimation and aliasing with the help of chaotic Arnold’s Cat Map(ACM).

    3) Performance evaluation of the proposed cancellable biometric system with metrics including entropy,correlation,etc.The proposed system is more favorable compared to traditional ones.

    4) The proposed cancellable biometric system reveals high immunity to noise effect.

    2 Related Work

    Several attempts have been presented in this field by several researchers for cancellable biometrics[11].Ross et al.[12]provided an overview of optical image coding.The numerical simulation of this method for cancellable biometrics shows its robustness and the high sensitivity to the correct switching offset.The presented results quantify the robustness of this method based on Mean Square Error(MSE)values with the same number of key changes.We can say that for the same key value,a higher MSE can indicate a higher resistance to noise and attacks.

    Ross et al.[13]presented a cancellable multi-modal biometric system.The widespread use of Double Random Phase Encoding (DRPE) allows to create a fragile multi-biometric identification system.The purpose of the system is to provide storage space for the biometric database,and improve security.Kamaldeep et al.[14]proposed a reversible multi-index iris recognition method based on several important parameters in a mixed mode.The feature vectors generated by the left and right iris of the same subject are merged into the safety symbol.The DRPE method is used in the Fractional Fourier Transform(FrFT)domain to generate irreversibly encrypted codes.The cancellable biometric system avoids sending the keys and improves the confidentiality of authentication,because each user has a unique key to receive the encrypted iris code.Experimental results show that the use of this iris recognition method improves privacy,while maintaining authentication performance,achieving a 0.63%energy efficiency and a 99%accuracy.It was concluded that the DRPE is a valid candidate to obtain revocable biometric templates.

    Jain et al.[15]proposed an effective method for identifying revocable fingerprints based on the identification process used to verify fingerprints without restoring the original fingerprints.This helps to protect fingerprints from attacks,because the authors used an irreversible transformation.Liu et al.[16]presented a multimedia biometric system based on a combination of fingerprints and faces.The Gabor transform is applied on the image in the mixed pixel layer.This scheme is very effective for small sample scenarios.Zakaria et al.[17]presented a new strategy using the nested sequence array method.The Discrete Cosine Transform(DCT)is used to extract facial features and hand-prints,but serialized into a nested array.The parameters of the feature sequence and its statistical distribution can be estimated.The main advantage of this method is that it supports large databases compared to classic methods.The authors compared their method with other methods,and showed that the detection accuracy of their proposed method is 99.7%,which is higher than those of other methods.

    Soliman et al.[18]have worked on four different categories:left and right palms,crossed left palms,left palms with fingerprint samples,and right palms with fingerprints.Left and right fingerprints of the same subject can be used to create matching scores to improve the matching accuracy.Both left and right palm print scores can be compared for better recognition.Ahmad et al.[19]proposed a multi-model system of the left thumb and left ear.The main feature of this system is to improve the stage of thumb imaging before feature extraction.The authors applied Gaussian smoothing of the thumb image.To optimize the performance,Zhang Suen(ZS)dilution algorithm turned out to be a good algorithm.Hearing aids use 5 of 9 functions.The system can operate at a reliability level/range of 80%.It can be increased to100%by adding 4 additional ear functions.Taher and Mosseb et al.[20]proposed a cancellable iris recognition scheme based on the combination of encoding and irreversible transformations to conceal the characteristics of the iris.Its recognition rate reaches 99.9%.

    3 Proposed Cancellable Biometric Recognition Framework

    The proposed approach begins with four biometric acquisition.After that,Arnold’s Cat Map(ACM) encryption is applied on all biometrics.Decimation by 2 is adopted on encrypted templates to generate four decimated and encrypted versions of all biometrics.These four versions are merged together to a single 3D matrix.Some sorts of decimation in rows and decimation in columns are applied to get two templates that have both encryption and aliasing effects.Finally,a sophisticated merging operation is implemented on these two versions to get a final 256×256 cancellable biometric template that can be used for biometric verification(See Fig.3).

    Step 1:Acquisition of Biometric Images

    Input biometric data is collected by various sensors.For example,human face images are taken by cameras and video cameras;fingerprints and hand geometry are recorded by sensors;iris and retina are scanned by infrared cameras.In this article,all face biometric data of individuals used in the proposed cancellable biometric system are extracted from the faces database[21].

    Step 2:Arnold’s Cat Map

    Arnold’s Cat Map (ACM) is a confusion map named after Vladimir Arnold.ACM [22-24]can be used to encode images to increase security.The image(not necessarily a cat)is treated by random changes in the original pixel arrangement.However,the map has a constant period.ACM has two main disadvantages.It is sometimes possible to restore the original image.In addition,the histogram of the encoded image is the same as that of the original image,because the values of the pixels are not changed[24].

    Step 3:Decimation Process

    In the decimation or down-sampling process,the image dimensions are reduced to one-half or onethird of the original ones.The decimation process eliminates redundant pixels that are not necessary for the generation of cancellable templates(See Fig.4).

    Figure 3:(Continued)

    Figure 3:The layout of the proposed cancellable template generation

    Figure 4:Down-Sampling process from the N×N image to an(N/2)×(N/2)image[25-28]

    The decimation model can be represented as follows[25-28]:

    where f,g are lexicographicly ordered versions of the original encrypted image and the decimated version,respectively.D is the decimation operator given as follows:

    where ?is the Kronecker product,D1represents a filtering operation.

    Step 4:Merging Process

    The four obtained biometric templates ACM encryption,and decimation processes are merged together,as illustrated in Fig.3.The four biometrics are arranged in a single 2D matrix through the selection of certain rows and discarding others.A row is taken,and three other rows are discarded.This process is also repeated for columns.Hence,the final obtained matrix has dimensions of 256×256.The discarding strategy does not affect the cancellable biometric template generation as few pixels can represent each template differently if derived based on the original biometric template[29-32].

    4 Authentication Strategy

    The authentication strategy of the proposed system is shown in Fig.5.A correlation-based strategy necessitates the generation of cancellable templates in the testing process in the same manner used for training.Correlation is estimated,and the decision is made based on a threshold value for verification.

    Figure 5:Block diagram of the proposed system revealing the authentication strategy

    5 Simulation Experiments and Results

    The proposed system is applicable to biometric images of different sizes.Performance assessment is implemented based on Equal Error Rate(EER)and Receiver Operating Characteristic(ROC)curve in addition to some cryptographic test criteria.Simulation experiments shown in Tabs.1 to 7 have been carried out on MATLAB 2014a,Core(TM)i74600U,CPU 2.10 GHz,8GB Windows 7 on an Intel(R)laptop.The girl image is used to allow the imposter test.

    Table 1:Output of different stages of the proposed cancellable biometric recognition system in Fig.7a

    5.1 Quality Assessment

    There are several metrics that are widely used to evaluate the image quality,such as MSE,entropy,Peak Signal-to-Noise Ratio (PSNR),correlation,differential maximum deviation,and Feature Similarity Index Method(FSIM).Statistical tests are applied to evaluate the performance of the encryption process.Tab.3 shows the measurement of the Proposed cancellable biometric technique for an unauthorized face.

    Tabs.4-7 shows the measurement of the proposed cancellable biometric technique for an authorized face.

    Table 2:Output of different stages of the proposed cancellable biometric recognition system in Fig.6

    Table 3:Metrics for the proposed cancellable biometric recognition technique for 256×256 girl.jpg unauthorized data IN Fig.6

    Table 3:Continued

    Table 4:Measured metrics for the proposed cancellable biometric recognition system for 128×128 authorized data in Fig.7a

    Table 5:Measured metrics for the proposed cancellable biometric recognition system for 128×128 authorized data in Fig.7c

    Table 6:Measured metrics for the proposed cancellable biometric recognition system for 128×128 authorized data in Fig.7b

    Table 7:Measured metrics for the proposed cancellable biometric recognition system for 128×128 authorized data in Fig.7d

    5.2 Performance in the Presence of Noise

    In the presence of different levels of noise and different degrees of correlation between pixels,the authorized user correlation distribution,the unauthorized user correlation distribution,and the ROC curve are analyzed.Fig.8 shows the samples of face templates created according to the proposed system.Fig.9 shows a better degree of uniformity in histograms after encryption,which ensures more security of the cancellable templates.The correlation distributions for both genuine and imposter tests are illustrated in Fig.10.In addition,the ROC curve is illustrated in Fig.11.Tab.8 illustrates the evaluation metric values of the proposed system in the presence of different levels of noise.It is clear from this table that the performance of the system deteriorates with the increment of the noise level,but the system still works,and it is still able to discriminatebetween users.

    Figure 6:The 256×256 girl image

    Figure 7:The 128×128 original imposter and genuine templates[21]

    Figure 8:Samples of face templates created according to the proposed system.(a) Original face,(b)Encrypted face template output

    Figure 9:(a) Original faces and (b) Histograms of the cancellable face templates created with the proposed system

    Figure 10:Genuine and impostor distributions

    Figure 11:ROC curve

    Table 8:Performance metrics of the proposed cancellable biometric recognition system in the presence of noise

    6 Conclusions and Future Work

    This paper examined the benefits and challenges of using biometrics as a means of identity verification and presented a multi-biometric encryption scheme as a solution to the different security and privacy issues faced by users of biometric authentication systems.The proposed scheme combines a variety of biometrics with the help of Arnold’s Cat Map (ACM),a decimation process to induce aliasing,and a merging process to create cancellable templates.The obtained templates ensure randomness due to the utilization of the ACM fusion and aliasing strategies.The proposed system aims to reduce the time of the registration process and increase the reliability of the template change process.By calculating the EER and the AROC,the superiority of the proposed system is demonstrated.A comparative study of the proposed system with other ones has been presented.The simulation results obtained for performance evaluation show that the system is safe,reliable,and feasible as it achieves high AROC values in the presence of noise.Future work may include the development of new algorithms for security in healthcare applications.We will also take into consideration the investigation of the effect of complex channel degradations on the proposed system.

    Acknowledgement:The authors thank the researchers of Taif University for their support.They support project number(TURSP-2020/214),Taif University,Taif,Saudi Arabia.

    Funding Statement:This research was supported by Taif University Researchers Supporting Project Number(TURSP-2020/214),Taif University,Taif,Saudi Arabia(www.tu.edu.sa).

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    性色av乱码一区二区三区2| 国产熟女xx| 国产精品av视频在线免费观看| av片东京热男人的天堂| 黄色女人牲交| 熟妇人妻久久中文字幕3abv| 免费观看的影片在线观看| 国产91精品成人一区二区三区| 亚洲专区国产一区二区| 美女被艹到高潮喷水动态| 91在线精品国自产拍蜜月 | 国产亚洲精品一区二区www| 精品欧美国产一区二区三| 五月玫瑰六月丁香| 熟妇人妻久久中文字幕3abv| 成人无遮挡网站| 久久欧美精品欧美久久欧美| 亚洲av电影不卡..在线观看| 日韩欧美三级三区| 天天一区二区日本电影三级| 叶爱在线成人免费视频播放| 少妇熟女aⅴ在线视频| 桃红色精品国产亚洲av| 国产精品久久久久久久电影 | 亚洲欧美精品综合久久99| 九九热线精品视视频播放| 亚洲 国产 在线| av国产免费在线观看| 真实男女啪啪啪动态图| 久久久色成人| 国产黄a三级三级三级人| 91字幕亚洲| 久久香蕉精品热| 国产伦精品一区二区三区四那| 少妇的丰满在线观看| 日韩av在线大香蕉| 国产不卡一卡二| 757午夜福利合集在线观看| 两个人看的免费小视频| 久9热在线精品视频| 国产精品免费一区二区三区在线| 亚洲最大成人手机在线| 中文字幕熟女人妻在线| 18禁国产床啪视频网站| 日本与韩国留学比较| 欧美日韩国产亚洲二区| 夜夜夜夜夜久久久久| 欧美成人性av电影在线观看| 欧美黑人欧美精品刺激| 午夜免费成人在线视频| 久久香蕉精品热| 麻豆一二三区av精品| 99久久精品国产亚洲精品| 中亚洲国语对白在线视频| or卡值多少钱| 国产高清有码在线观看视频| 久久亚洲真实| 日本精品一区二区三区蜜桃| 国产av一区在线观看免费| 国产亚洲精品久久久久久毛片| 桃色一区二区三区在线观看| 日日干狠狠操夜夜爽| 欧美av亚洲av综合av国产av| 欧美国产日韩亚洲一区| 最新中文字幕久久久久| 欧美大码av| 90打野战视频偷拍视频| 激情在线观看视频在线高清| 成人无遮挡网站| 国产高潮美女av| 老司机午夜福利在线观看视频| 国产91精品成人一区二区三区| 丁香六月欧美| 丰满乱子伦码专区| 亚洲国产精品合色在线| 国产美女午夜福利| 久久精品国产自在天天线| 一级毛片女人18水好多| a级毛片a级免费在线| 欧美三级亚洲精品| 无限看片的www在线观看| 91在线观看av| 国产精品一区二区免费欧美| 国产精品久久久久久久久免 | 特大巨黑吊av在线直播| 亚洲aⅴ乱码一区二区在线播放| АⅤ资源中文在线天堂| 精华霜和精华液先用哪个| 日韩欧美国产一区二区入口| 欧美成人性av电影在线观看| 亚洲成人中文字幕在线播放| 三级男女做爰猛烈吃奶摸视频| av专区在线播放| 亚洲人成网站高清观看| 久久精品亚洲精品国产色婷小说| 亚洲无线观看免费| 最近最新免费中文字幕在线| 午夜老司机福利剧场| 一进一出抽搐动态| 国产久久久一区二区三区| 18禁在线播放成人免费| 国产毛片a区久久久久| 国产激情偷乱视频一区二区| 99久久成人亚洲精品观看| 欧美3d第一页| 中文字幕精品亚洲无线码一区| 国产亚洲av嫩草精品影院| 日本免费a在线| 国产高清视频在线观看网站| 九九久久精品国产亚洲av麻豆| 午夜福利在线在线| 97超视频在线观看视频| 国产欧美日韩一区二区三| 色综合婷婷激情| 高潮久久久久久久久久久不卡| 99国产综合亚洲精品| 国产免费男女视频| 久久久久久久午夜电影| 免费av不卡在线播放| 精品久久久久久久久久免费视频| 欧美乱妇无乱码| 免费搜索国产男女视频| 深夜精品福利| 97碰自拍视频| 波多野结衣巨乳人妻| 老师上课跳d突然被开到最大视频 久久午夜综合久久蜜桃 | 丁香六月欧美| www国产在线视频色| 精品熟女少妇八av免费久了| 最后的刺客免费高清国语| 伊人久久大香线蕉亚洲五| 欧洲精品卡2卡3卡4卡5卡区| 亚洲成av人片免费观看| 午夜福利免费观看在线| 亚洲激情在线av| 日韩成人在线观看一区二区三区| 国产极品精品免费视频能看的| 哪里可以看免费的av片| 午夜福利在线在线| 999久久久精品免费观看国产| 成年版毛片免费区| 国产伦精品一区二区三区四那| 中文字幕人妻熟人妻熟丝袜美 | 最近最新中文字幕大全电影3| xxxwww97欧美| 黄色片一级片一级黄色片| 精品欧美国产一区二区三| 亚洲av免费高清在线观看| 美女cb高潮喷水在线观看| 禁无遮挡网站| 亚洲人成电影免费在线| 一本一本综合久久| 日本一二三区视频观看| 夜夜爽天天搞| 久久亚洲真实| 丰满乱子伦码专区| 成年女人永久免费观看视频| 亚洲精品粉嫩美女一区| 亚洲av免费在线观看| 国产成人福利小说| 久久这里只有精品中国| 午夜福利在线在线| 日本免费一区二区三区高清不卡| 国产精品国产高清国产av| 免费人成在线观看视频色| 欧美黄色淫秽网站| 一级作爱视频免费观看| tocl精华| 性色avwww在线观看| 国产精品久久视频播放| av视频在线观看入口| 欧美成人性av电影在线观看| 亚洲熟妇熟女久久| 亚洲激情在线av| 国产高清激情床上av| 男女下面进入的视频免费午夜| 亚洲av成人不卡在线观看播放网| 神马国产精品三级电影在线观看| 亚洲成人免费电影在线观看| 亚洲av五月六月丁香网| 香蕉久久夜色| 真实男女啪啪啪动态图| 国产精品一区二区免费欧美| 日本三级黄在线观看| 99久国产av精品| 欧美中文综合在线视频| 精品久久久久久久久久免费视频| 在线国产一区二区在线| 欧美日韩国产亚洲二区| 波多野结衣巨乳人妻| 午夜免费男女啪啪视频观看 | 欧美成人一区二区免费高清观看| 亚洲av一区综合| 日日干狠狠操夜夜爽| 香蕉丝袜av| 听说在线观看完整版免费高清| 国产精品一区二区三区四区久久| 丰满人妻一区二区三区视频av | 波多野结衣高清无吗| 色哟哟哟哟哟哟| 人妻夜夜爽99麻豆av| 免费在线观看影片大全网站| 三级国产精品欧美在线观看| 日韩免费av在线播放| 国产乱人视频| 男女午夜视频在线观看| 午夜福利18| 欧美又色又爽又黄视频| 人妻夜夜爽99麻豆av| 免费在线观看影片大全网站| 国产爱豆传媒在线观看| 精品人妻1区二区| 久久精品综合一区二区三区| 最新中文字幕久久久久| 午夜a级毛片| 久久精品国产清高在天天线| 丰满人妻一区二区三区视频av | 19禁男女啪啪无遮挡网站| 成年女人永久免费观看视频| 丰满乱子伦码专区| 亚洲欧美一区二区三区黑人| 中文字幕人妻丝袜一区二区| 亚洲av熟女| 婷婷六月久久综合丁香| 在线观看一区二区三区| 精品国产美女av久久久久小说| 亚洲激情在线av| АⅤ资源中文在线天堂| 一个人免费在线观看的高清视频| 观看美女的网站| 在线观看午夜福利视频| 久99久视频精品免费| 麻豆成人午夜福利视频| 老司机福利观看| 亚洲人成网站高清观看| 亚洲成av人片在线播放无| 在线十欧美十亚洲十日本专区| 日本成人三级电影网站| 中文字幕av成人在线电影| 嫩草影视91久久| 日韩成人在线观看一区二区三区| 久久久成人免费电影| 国产av不卡久久| 18禁在线播放成人免费| 精品久久久久久久末码| 18禁裸乳无遮挡免费网站照片| 国产亚洲av嫩草精品影院| 国产成人av教育| 亚洲av不卡在线观看| 亚洲天堂国产精品一区在线| 精品国内亚洲2022精品成人| 免费看光身美女| 熟女电影av网| 我的老师免费观看完整版| 欧美日本亚洲视频在线播放| 成人三级黄色视频| 国产私拍福利视频在线观看| 中文字幕熟女人妻在线| 欧美xxxx黑人xx丫x性爽| 亚洲欧美激情综合另类| www.熟女人妻精品国产| 99热精品在线国产| 欧美绝顶高潮抽搐喷水| 欧美日韩乱码在线| 国产精华一区二区三区| 老司机午夜十八禁免费视频| 日本撒尿小便嘘嘘汇集6| 尤物成人国产欧美一区二区三区| 一级毛片高清免费大全| 亚洲色图av天堂| 每晚都被弄得嗷嗷叫到高潮| 一二三四社区在线视频社区8| 欧美一区二区亚洲| 国产亚洲欧美98| 亚洲天堂国产精品一区在线| 午夜日韩欧美国产| 黄色成人免费大全| 12—13女人毛片做爰片一| 少妇丰满av| 90打野战视频偷拍视频| 欧美zozozo另类| 国产精品美女特级片免费视频播放器| 欧美中文综合在线视频| 国产激情偷乱视频一区二区| 天天一区二区日本电影三级| 亚洲一区二区三区色噜噜| 人人妻人人澡欧美一区二区| 免费av毛片视频| 亚洲狠狠婷婷综合久久图片| 日韩欧美精品免费久久 | 五月玫瑰六月丁香| 搡老妇女老女人老熟妇| 午夜老司机福利剧场| 国产成人欧美在线观看| 窝窝影院91人妻| 国产黄片美女视频| 此物有八面人人有两片| 99久久精品热视频| 叶爱在线成人免费视频播放| 狠狠狠狠99中文字幕| 国产欧美日韩一区二区精品| 亚洲久久久久久中文字幕| 在线国产一区二区在线| 成年女人永久免费观看视频| 国产精品 国内视频| 国产在线精品亚洲第一网站| 好男人电影高清在线观看| 国产精品自产拍在线观看55亚洲| 午夜老司机福利剧场| www.熟女人妻精品国产| 天堂av国产一区二区熟女人妻| 欧美乱色亚洲激情| 欧美日韩黄片免| 少妇人妻一区二区三区视频| 国产av不卡久久| 欧美成人一区二区免费高清观看| 日韩亚洲欧美综合| 蜜桃久久精品国产亚洲av| 午夜视频国产福利| 亚洲人成网站在线播放欧美日韩| 91字幕亚洲| 欧美黑人欧美精品刺激| 中文字幕av在线有码专区| 观看美女的网站| 午夜免费观看网址| 久久久国产精品麻豆| 桃红色精品国产亚洲av| 日本撒尿小便嘘嘘汇集6| 久久国产精品人妻蜜桃| 亚洲欧美日韩东京热| 国产99白浆流出| 久久亚洲精品不卡| 日本免费a在线| tocl精华| e午夜精品久久久久久久| 天堂影院成人在线观看| 成人国产综合亚洲| 午夜福利18| 国产黄a三级三级三级人| 久久久久九九精品影院| 精品日产1卡2卡| 国产激情偷乱视频一区二区| 在线观看66精品国产| 久久精品国产自在天天线| 天天添夜夜摸| 性色av乱码一区二区三区2| 午夜激情福利司机影院| 中文字幕人妻熟人妻熟丝袜美 | 我的老师免费观看完整版| 他把我摸到了高潮在线观看| 国产乱人伦免费视频| av在线蜜桃| 女生性感内裤真人,穿戴方法视频| 欧美中文日本在线观看视频| 99久久精品一区二区三区| 在线观看免费视频日本深夜| 国产不卡一卡二| 女人十人毛片免费观看3o分钟| 亚洲国产色片| 一本精品99久久精品77| 婷婷精品国产亚洲av| 午夜福利欧美成人| 久久久久九九精品影院| 午夜久久久久精精品| 国产精品国产高清国产av| 99国产极品粉嫩在线观看| 国产精品日韩av在线免费观看| 两个人视频免费观看高清| 两人在一起打扑克的视频| 国产欧美日韩精品一区二区| 999久久久精品免费观看国产| 亚洲精品色激情综合| 一个人观看的视频www高清免费观看| 中文字幕精品亚洲无线码一区| 亚洲欧美日韩卡通动漫| 亚洲国产精品成人综合色| 精品无人区乱码1区二区| 亚洲国产欧美网| 中文字幕av成人在线电影| avwww免费| 日日干狠狠操夜夜爽| 狂野欧美白嫩少妇大欣赏| 国产久久久一区二区三区| 国产精品一区二区免费欧美| 亚洲专区国产一区二区| 在线视频色国产色| 深爱激情五月婷婷| 亚洲av第一区精品v没综合| 国内精品久久久久久久电影| 欧美色欧美亚洲另类二区| 怎么达到女性高潮| 国内精品美女久久久久久| 男女床上黄色一级片免费看| 午夜福利在线观看吧| 亚洲不卡免费看| 岛国在线观看网站| 国产真人三级小视频在线观看| 岛国在线免费视频观看| 国产97色在线日韩免费| av专区在线播放| 日本免费一区二区三区高清不卡| 国产91精品成人一区二区三区| 午夜福利在线观看吧| 精品久久久久久久久久久久久| 一级黄色大片毛片| 黄色女人牲交| 俺也久久电影网| 黑人欧美特级aaaaaa片| 精品国产超薄肉色丝袜足j| 国产精品一及| 午夜精品在线福利| 91九色精品人成在线观看| 亚洲成人精品中文字幕电影| 黄色视频,在线免费观看| 女人被狂操c到高潮| 内射极品少妇av片p| 免费看a级黄色片| 久久久精品欧美日韩精品| 99热6这里只有精品| 国产午夜精品论理片| 欧美在线黄色| 免费人成视频x8x8入口观看| 亚洲男人的天堂狠狠| 欧美绝顶高潮抽搐喷水| 国产男靠女视频免费网站| 免费看美女性在线毛片视频| 国产亚洲欧美98| 久久久久国产精品人妻aⅴ院| eeuss影院久久| 一区二区三区免费毛片| 国产 一区 欧美 日韩| 日本黄大片高清| 久久精品综合一区二区三区| 欧美丝袜亚洲另类 | 久久久久精品国产欧美久久久| 欧美日韩黄片免| 国产精品爽爽va在线观看网站| 婷婷丁香在线五月| 国产亚洲精品久久久久久毛片| 69人妻影院| 18+在线观看网站| 亚洲,欧美精品.| 性欧美人与动物交配| 欧美一区二区精品小视频在线| 亚洲精品久久国产高清桃花| 又黄又粗又硬又大视频| av黄色大香蕉| 90打野战视频偷拍视频| 国产97色在线日韩免费| 亚洲色图av天堂| 免费电影在线观看免费观看| 久久久色成人| 国内精品久久久久精免费| 午夜免费成人在线视频| 一夜夜www| 久久人妻av系列| 国产精品久久久久久亚洲av鲁大| 免费看美女性在线毛片视频| 精品久久久久久成人av| 亚洲中文字幕日韩| 少妇的逼好多水| 亚洲一区高清亚洲精品| 亚洲精品一卡2卡三卡4卡5卡| 国产av不卡久久| 老司机午夜福利在线观看视频| 欧美日韩精品网址| 少妇的逼好多水| 美女高潮的动态| 精品不卡国产一区二区三区| 国产欧美日韩精品亚洲av| 中文字幕精品亚洲无线码一区| 国产毛片a区久久久久| 在线免费观看的www视频| 国产视频内射| av天堂中文字幕网| 色综合站精品国产| 亚洲av不卡在线观看| 免费在线观看影片大全网站| 噜噜噜噜噜久久久久久91| 亚洲精品乱码久久久v下载方式 | 成人鲁丝片一二三区免费| 欧美乱色亚洲激情| 男人舔女人下体高潮全视频| 禁无遮挡网站| 香蕉久久夜色| 香蕉av资源在线| 两人在一起打扑克的视频| 国产黄片美女视频| 久久久久久久午夜电影| 精品日产1卡2卡| 亚洲一区二区三区色噜噜| 欧美性猛交╳xxx乱大交人| 丰满人妻熟妇乱又伦精品不卡| 一进一出抽搐gif免费好疼| 少妇裸体淫交视频免费看高清| 亚洲男人的天堂狠狠| 精华霜和精华液先用哪个| 乱人视频在线观看| 婷婷丁香在线五月| 欧美日韩综合久久久久久 | 国产精品精品国产色婷婷| 亚洲人成网站在线播| 悠悠久久av| 国内毛片毛片毛片毛片毛片| 最新美女视频免费是黄的| 神马国产精品三级电影在线观看| 啪啪无遮挡十八禁网站| 一区二区三区国产精品乱码| av女优亚洲男人天堂| 91麻豆av在线| 日韩免费av在线播放| 岛国在线免费视频观看| 高潮久久久久久久久久久不卡| 国产高清视频在线播放一区| 69av精品久久久久久| 免费在线观看日本一区| 一级a爱片免费观看的视频| 青草久久国产| 欧美乱色亚洲激情| 国产高清视频在线观看网站| 成人亚洲精品av一区二区| 欧美一区二区精品小视频在线| 久久久久国内视频| 搡老熟女国产l中国老女人| www.999成人在线观看| 国产精品久久电影中文字幕| 国产乱人视频| www.www免费av| 亚洲va日本ⅴa欧美va伊人久久| 久久久久久国产a免费观看| 国产 一区 欧美 日韩| 国产真人三级小视频在线观看| 无人区码免费观看不卡| 亚洲精品在线美女| 亚洲av第一区精品v没综合| 小蜜桃在线观看免费完整版高清| 高清日韩中文字幕在线| 老司机午夜福利在线观看视频| 亚洲专区中文字幕在线| 国产成人影院久久av| 国产精品亚洲美女久久久| 19禁男女啪啪无遮挡网站| 天堂影院成人在线观看| 少妇丰满av| www.www免费av| 国模一区二区三区四区视频| 一区二区三区国产精品乱码| 久久久成人免费电影| 蜜桃亚洲精品一区二区三区| 成人国产一区最新在线观看| 美女cb高潮喷水在线观看| 老司机在亚洲福利影院| 久久久国产精品麻豆| 亚洲欧美日韩高清在线视频| 草草在线视频免费看| 桃色一区二区三区在线观看| 悠悠久久av| 男插女下体视频免费在线播放| 欧美不卡视频在线免费观看| 午夜亚洲福利在线播放| a级一级毛片免费在线观看| 宅男免费午夜| 一卡2卡三卡四卡精品乱码亚洲| 午夜免费成人在线视频| 国产成人av教育| 亚洲专区中文字幕在线| 久9热在线精品视频| 国产老妇女一区| 免费看十八禁软件| 欧美日韩精品网址| 性色av乱码一区二区三区2| 岛国在线观看网站| 欧美成人a在线观看| 内射极品少妇av片p| 听说在线观看完整版免费高清| 99热精品在线国产| 天堂动漫精品| 国产成人a区在线观看| 黄片小视频在线播放| 日本在线视频免费播放| 国产真人三级小视频在线观看| 狂野欧美激情性xxxx| 村上凉子中文字幕在线| 国产成人aa在线观看| 我的老师免费观看完整版| 男女之事视频高清在线观看| 中文资源天堂在线| 精品久久久久久久毛片微露脸| 99热精品在线国产| 国产成人福利小说| 高潮久久久久久久久久久不卡| 久久久久久久久久黄片| 最新在线观看一区二区三区| 2021天堂中文幕一二区在线观| 国产视频内射| 欧美日本亚洲视频在线播放| av片东京热男人的天堂| 午夜福利在线在线| aaaaa片日本免费| 亚洲精品在线观看二区| 99热6这里只有精品| 久久久久亚洲av毛片大全| 久久久久性生活片| av中文乱码字幕在线| 最新在线观看一区二区三区| 人人妻人人澡欧美一区二区| 日本黄色片子视频| 97人妻精品一区二区三区麻豆| 欧美黄色淫秽网站| 午夜影院日韩av| 国产v大片淫在线免费观看| 美女免费视频网站| 色av中文字幕| 国产伦精品一区二区三区视频9 | bbb黄色大片|