• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Smart-Fragile Authentication Scheme for Robust Detecting of Tampering Attacks on English Text

    2022-08-24 03:27:00MohammadAlamgeerFahdAlWesabiHudaIskandarImranKhanNadhemNemriMohammadMedaniMohammedAbdullahAlHageryandAliMohammedAlSharafi
    Computers Materials&Continua 2022年5期

    Mohammad Alamgeer,F(xiàn)ahd N.Al-Wesabi,Huda G.Iskandar,Imran Khan,Nadhem Nemri,Mohammad Medani,Mohammed Abdullah Al-Hagery and Ali Mohammed Al-Sharafi

    1Department of Information Systems,King Khalid University,Muhayel Aseer,Kingdom of Saudi Arabia

    2Department of Computer Science,King Khalid University,Muhayel Aseer,Kingdom of Saudi Arabia

    3Faculty of Computer and IT,Sana’a University,Sana’a,Yemen

    4School of Computing,F(xiàn)aculty of Engineering,Universiti Teknologi Malaysia,Malaysia

    5Department of Electrical Engineering,University of Engineering and Technology Peshawar,Pakistan

    6Department of Information Systems,King Khalid University,Muhayel Aseer,Kingdom of Saudi Arabia

    7Department of Computer Science,College of Computer,Qassim University,Saudi Arabia

    8Department of Computer Science,College of Computers and Information Technology,University of Bisha,KSA

    Abstract:Content authentication,integrity verification,and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication technology.In this paper,a text zero-watermarking approach known as Smart-Fragile Approach based on Soft Computing and Digital Watermarking(SFASCDW)is proposed for content authentication and tampering detection of English text.A first-level order of alphanumeric mechanism, based on hidden Markov model, is integrated with digital zero-watermarking techniques to improve the watermark robustness of the proposed approach.The researcher uses the first-level order and alphanumeric mechanism of Markov model as a soft computing technique to analyze English text.Moreover,he extracts the features of the interrelationship among the contexts of the text, utilizes the extracted features as watermark information,and validates it later with the studied English text to detect any tampering.SFASCDW has been implemented using PHP with VS code IDE.The robustness,effectiveness,and applicability of SFASCDW are proved with experiments involving four datasets of various lengths in random locations using the three common attacks,namely insertion,reorder,and deletion.The SFASCDW was found to be effective and could be applicable in detecting any possible tampering.

    Keywords: Watermarking; soft computing; text analysis; hidden Markov model; content authentication

    1 Introduction

    For the research community, the reliability and security of exchanged text data through the internet is the most promising and challenging field.In communication technologies, authentication of content and automated text verification of honesty in different Languages and formats are of great significance.Numerous applications for instance; e-Banking and e-commerce render information transfer via the Internet the most difficult.In terms of content, structure, grammar,and semantics, much of the digital media transferred over the internet is in text form and is very susceptible to online transmission.During the transfer process, malicious attackers can temper such digital content [1].

    For information security, many algorithms and techniques are available such as the authentication of content, verification of integrity, detection of tampering, identification of owners, access control, and copyright protection.

    To overcome these issues, steganography and automated methods of watermarking are commonly used.A technique of digital-Watermarking (DWM) can be inserted into digital material through various details such as text, binary pictures, audio, and video [2,3].A fine-grained text watermarking procedure is proposed based on replacing the white spaces and Latin symbols with homoglyph characters [4].

    Several conventional methods and solutions for text watermarking were proposed [5,6] and categorized into different classifications such as linguistic, structure and image-based, and formatbased binary images [7].To insert the watermark information into the document, most of these solutions require certain upgrades or improvements to the original text in digital format material.Zero-watermarking without any alteration to the original digital material to embed the watermark information is a new technique with smart algorithms that can be used.Also, this technique can be used to generate data for a watermark in the contents of a given digital context [1,7–9].

    Restricted research has centered on the appropriate solutions to verify the credibility of critical digital media online [10–12].The verification of digital text and the identification of fraud in research earned great attention.In addition, text watermarking studies have concentrated on copyright protection in the last decade, but less interest and attention has been paid to integrity verification, identification of tampering and authentication of content due to the existence of text content based on the natural language [13].

    Proposing the most appropriate approaches and strategies for dissimilar formats and materials,especially in Arabic and English languages, is the most common challenge in this area [14,15].Therefore, authentication of content, verification of honesty, and detection of tampering of sensitive text constitute a big problem in various applications and require necessary solutions.

    Some instances of such sensitive digital text content are Arabic interactive Holy Qur’an,eChecks, tests, and marks.Different Arabic alphabet characteristics such as diacritics lengthened letters and extra symbols of Arabic make it simple to modify the key meaning of the text material by making basic changes such as modifying diacritic arrangements [16].The most popular soft computation and natural language processing (NLP) technique that supported the analysis of the text is HMM.

    We suggest a highly fragile method for detecting the tampering attacks on Internet-based Arabic text (HFDATAI) by incorporating the Markov model and zero watermarking.Hence, firstorder of an alphanumeric mechanism consisting of a model performing as a soft computing tool and NLP in cooperation between the zero-watermarking technique and the Markov model.In this method, for text analysis, the first order of the alphanumeric mechanism of the Markov model was used to extract the connections between the contents of the Arabic text given and to generate the main watermark.Without alterations or effects on the original text size, the watermark created is logically integrated into the original Arabic history.The embedded watermark would later be used to identify all manipulation on Arabic text obtained after transmission of text through the Internet and whether it is authentic or not.

    The primary objective of the HFDATAI strategy is to meet the high accuracy of content authentication and identification of sensitive tampering attacks of Arabic text which is transmitted through the Internet.

    The remainder of the article is structured as follows:In Section 2, we explain the existing works done so far.In Section 3, we discussed the suggested approach (HFDATAI).The simulation and implementation are provided in Section 4, results discussion is provided in Section 5, and finally, we conclude the article in Section 6.

    2 Related Work

    According to the processing domain of NLP and text watermarking, these existing methods and solutions of text watermarking reviewed in this paper are classified into linguistical, structural and zero-watermark methods [1,7,13].

    Natural language is the foundation of approaches to linguistic text watermarking.The mechanism of those methods embedding the watermark is based on changes applied to the semantic and syntactic essence of plain text [1].

    To enhance the capability and imperceptibility of Arabic text, a method of text watermarking has suggested based on location of the accessible words [17].In this method, any word-space is used to mask the Boolean bit 0 or 1 that physically modifies the original text.

    A text steganography technique was proposed to hide information in the Arabic language [18].The step of this approach considers Harakat’s existence in Arabic diacritics such as Kasra, Fatha,and Damma as well as reverses Fatha to cover the message.

    A Kashida-marks invisible method of watermarking [19], based on the features of frequent recurrence of document security and authentication characters, was proposed.The method is based on a predetermined watermark key with a Kashida placed for a bit 1 and a bit omitted.

    The method of steganography of the text has proposed based on Kashida extensions on the characters ‘moon’and ‘sun’to write digital contents of the Arabic language [20].In addition,the Kashida method characters are seen alongside characters from Arabic to decide which hidden secret bits are kept by specific characters.In this form, four instances are included in the kashida characters:moon characters representing ‘00’; sun characters representing ‘01’; sun characters representing ‘10’; and moon characters representing ‘11’.

    A text steganographic approach [21] based on multilingual Unicode characters has been suggested to cover details in English scripts for the use of the English Unicode alphabet in other languages.Thirteen letters of the English alphabet have been chosen for this approach.It is important to embed dual bits in a timeframe that used ASCII code for embedding 00.However, multilingual ones were used by Unicode to embed between 01, and 10, as well as 11.The algorithm of Text Watermarking is used to secure textual contents from malicious attacks according to Unicode extended characters [22].The algorithm requires three main steps, the development, incorporation, and extraction of watermarks.The addition of watermarks is focused on the development of predefined coding tables, while scrambling strategies are often used in generating and removing the watermarking key is safe.

    The substitution attack method focused on preserving the position of words in the text document has been proposed [23].This method depends on manipulating word transitions in the text document.Authentication of Chinese text documents based on the combination of the properties of sentences and text-based watermarking approaches have been suggested [24,25].The proposed method is presented as follows:a text of the Chinese language is split into a group of sentences, and for each word, the code of a semantic has been obtained.The distribution of semantic codes influences sentence entropy.

    A zero-watermarking method has been proposed to preserve the privacy of a person who relies on the Hurst exponent and the nullity of the frames [26].For watermark embedding, the two steps are determined to evaluate the unvoiced frames.The process of the proposed approach bases on integrating an individual’s identity without notifying any distortion in the signals of medical expression.

    A zero-watermarking method was proposed to resolve the security issues of text-documents of the English language, such as verification of content and copyright protection [27].A zerowatermarking approach has been suggested based on the authentication Markov-model of the content of English text [28,29].In this approach, to extract the safe watermark information, the probability characteristics of the English text are involved and stored to confirm the validity of the attacked text-document.The approach provides security against popular text attacks with a watermark distortion rate if, for all known attacks, it is greater than one.For the defense of English text by copyright, based on the present rate of ASCII non-vowel letters and terms, the conventional watermark approach [30] has been suggested.

    According to the suggested methods, content authentication and tampering detection of digital English contents that have been ignored by researchers in the literature for many reasons.English text is a natural language dependent.On the other hand, hiding the watermark information is complicated since there is no location to hide it within text as pixels in the case of image,waves in audio and frames in video.

    3 The Proposed Approach

    In this paper, the authors propose a smart scheme called SFASCDW by integrating zerowatermark and soft computing techniques with get rid of external watermark information and without modifications of the original text to embed the watermark key.The first-level of alphanumeric mechanism of the Markov model is used as a soft computing technique to analyze the contents of the given English text and extract the interrelationship features of these text contents.

    The main contributions of our scheme SFASCDW can be summarized as follows:

    ·Unlike previous work where watermarking is done with language, contents, and scale effecting, the SFASCDW scheme logically embeds watermarking with no effect on text, content,or size.

    ·The watermarking mechanism does not require any external knowledge in our SFASCDW approach since this watermark key is generated by text processing and the extraction of a relationship between both the content and a watermark.

    ·The SFASCDW scheme is highly vulnerable to any basic alteration to the English text and context defined as complex text.Somehow, the above three contributions are present only in pictures, though not in the text.That is the key argument on this paper’s contribution.

    Four main processes should be performed in SFASCDW, namely text analysis, watermark generation, extraction, and detection processes, as illustrated in Fig.1.

    3.1 Text Analysis and Watermark Generation Process

    The three main sub-algorithms included in this process are preprocessing and building the Markov matrix algorithm, text analysis algorithm, and watermark generation algorithm.

    3.1.1 Pre-Processing and Building the Markov Matrix Algorithm

    The preprocessing of the original English text is one of the key steps in both the watermark generation and extraction processes of SFASCDW to convert letter cases and remove extra spaces and new lines, and it will directly influence the tampering detection accuracy.The original English text (OET) is required as input for the preprocessing process.The output of this algorithm is preprocessed English text (OETP).That said, building a Markov matrix is the starting point of English text analysis and watermark generation process using the Markov model.The Markov matrix that represents the possible states and transitions available in the given text is constructed without reputations.In this approach, each unique alphanumeric within a given English text represents a present state, and each unique alphanumeric a transition in the Markov matrix.During the building process of the Markov matrix, the proposed algorithm initializes all transition values by zero to use these cells later for keeping track of the number of times that the ithunique alphanumeric is followed by the jthalphanumeric within the given English text.

    Preprocessing and building the Markov matrix algorithm is executed as presented below in Algorithm 1.

    Algorithm 1:Preprocessing and building Markov algorithm of SFASCDWimages/BZ_407_205_894_1201_1717.png

    where OET:is an original English text, OETP:is a preprocessed English text, ea1mm[ps][ns]:is a states and transitions matrix with zero values for all cells, ps:refers to present state, ns:refers to next state.

    According to this algorithm, a method is presented to construct a two-dimensional matrix of Markov states and transitions named ea1mm[ps][ns], which represents the backbone of Markov model for English text analysis.The length of ea1mm[ps][ns] matrix of SFASCDW is fixed with sixty-one rows (states) and sixty-one columns (transitions).This fixed size represent twenty-eight alphabets of English letters “a–z,” ten integer numbers “0–9,” and twenty-three space and special symbols “@, $, (, /, .etc.”

    3.1.2 Text Analysis Algorithm

    After the Markov matrix is constructed, the text analysis process should be performed to find interrelationships between contexts of the given English text and generate watermark patterns.In this algorithm, the number of appearances of possible next-state transitions for each current state of a single alphanumeric will be calculated and constructed as transition probabilities by Eq.(1).

    where ea1mm[ps][ns] represents the Markov matrix of SFASCDW.

    The following example of an English text sample describes the mechanism of the transition process of present state to other next states.

    “The quick brown fox jumps over the brown fox who is slow jumps over the brown fox who is dead.”

    When using the first-level order of alphanumeric mechanism of HMM, every unique alphanumeric is a present state.Text analysis is performed as the text is read to obtain the interrelationship between present state and the next states.Fig.2 illustrates the available transitions of the above sample of English text.

    Figure 2:States representation of english text sample using SFASCDW

    As a result of analyzing the given English sentence based on first-level order and alphanumeric mechanism of Markov model, the SFASCDW produced forty-nine unique present states and their sixty-one possible transitions as illustrated in Fig.3.

    Figure 3:Sample of english text states and their transitions using SFASCDW

    It is assumed here that ‘w’is a present state of unique alphanumeric, and the available next transitions in the given English text sample are ‘h’, ‘h’, ‘n’, ‘n’, ‘n’, and ‘.’It is observed that ‘h’transitions occurred twice, ‘n’transitions occurred three times, and ‘’transitions occurred only one time.

    The building of the Markov matrix and text analysis processes of the given English text sample are illustrated in Fig.4.

    3.1.3 Watermark Generation Algorithm

    After performing analysis of the English text and extracting probability features, the watermark key is generated by finding all nonzero values in Markov matrix.The values in Markov matrix are concatenated sequentially to generate the original watermark pattern ea1WMPo, as given in Eq.(2) and illustrated in Fig.5.

    Figure 4:Text analysis processes of the given english text sample using SFASCDW

    Figure 5:The generated original watermark patterns ea1WMPo

    The generated ea1WMPo is stored in the watermark database beside the basic information of the given English text.The overall working of text analysis and watermark generation algorithm is illustrated below in Algorithm 2.

    Algorithm 2:Text analysis and watermark generation algorithm of SFASCDWimages/BZ_409_205_1711_1201_2565.png

    where ea1WMPOis the original watermark.

    3.2 Watermark Extraction and Detection Process

    The attacked watermark patterns (ea1EWMA) are generated for the attacked English text document (AETP), and the matching rate of patterns and watermark distortion are calculated by SFASCDW in order to detect any tampering, which ensures the authenticity of given contents.

    Two core algorithms involved in this process are watermark extraction and watermark detection algorithm.However, ea1EWMAis extracted from the received AETPand matched with ea1WMPo by the detection algorithm.

    AETPis an input for the proposed watermark extraction algorithm.The same process is performed for the watermark generation algorithm to obtain the watermark pattern for AETP.

    3.2.1 Watermark Extraction Algorithm

    AETPis the main input required to run this algorithm.However, the output of this algorithm is ea1EWMA.The watermark extraction algorithm is illustrated below in Algorithm 3.

    Algorithm 3:Watermark extraction algorithm of SFASCDWimages/BZ_410_209_1237_957_1766.png

    where ea1EWMAis the attacked watermark.

    3.2.2 Watermark Detection Algorithm

    ea1EWMAand ea1WMPo are the main inputs required to run the watermark detection algorithm.However, the output of this algorithm is to determine whether the English text document is authentic or tampered.The detection process of the extracted watermark is achieved in two main phases:

    ·Primary matching is achieved for ea1WMPOand ea1EWMA.If ea1EWMAand ea1WMPOpatterns appear identical, then an alert will appear as follows:“English text document is authentic and no tampering occurred.”O(jiān)therwise, the notification will be “This English text document is tampered,” before continuing to the next phase.

    ·Secondary matching is achieved by matching the transition of each state in a generated pattern.This means that ea1EWMAof each state is compared with the equivalent transition of ea1WMPOas given by Eqs.(3) and (4) below

    where,ea1_PMRT:represents tampering detection accuracy rate value in transition level, (0<ea1_PMRT <= 1)

    where ea1_PMRS:value of tampering detection accuracy rate in state level, (0<ea1_PMRS<= 100).

    After the pattern-matching rate of every state that is produced, the proposed SFASCDW scheme finds the weight (watermark robustness) of every state from all the states in the Markov matrix by using Eq.(5) below.

    where ea1PMR refers to total watermark robustness.

    The final ea1PMR of OETPand AETPare calculated by Eq.(6).

    The Watermark distortion rate represents the amount of tampering attacks occurring on contents of attacked English context, which is denoted by ea1WDR and calculated by Eq.(7).

    The steps involved in the watermark detection algorithm are illustrated in algorithm Algorithm 4.

    Algorithm 4:Watermark detection algorithm of SFASCDWimages/BZ_412_209_380_1455_1751.png

    where ea1_SW:refers to the watermark robustness rate.ea1PMR:refers to weight value of states correctly matched.ea1WDR:refers to value of watermark distortion rate (0<ea1WDR<= 100).

    Figure 6:Sample of watermark extraction and detection process using SFASCDW

    The results of the watermark extraction and detection process with watermark robustness rate of the sample of the given English text after multiple random attacks performed are illustrated in Fig.6.

    4 Implementation and Simulation

    To evaluate the robustness of SFASCDW, several scenarios of simulation and experiments are performed.This section depicts an implementation, simulation, and experimental environment, experiment parameters, experimental scenarios of standard English datasets, and results discussion.

    4.1 Simulation and Implementation Environment

    The self-developed program has been developed to test and evaluate the watermark robustness of SFASCDW.The implementation environment of SFASCDW is:CPU:Intel Core i7-4650U/2.3 GHz, RAM:8.0 GB, Windows 10–64 bit, PHP programming language with VS Code IDE.

    4.2 SFASCDW Simulation and Experiment

    This subsection presents the robustness evaluation of SFASCDW.Many simulation and experiments scenarios are performed as shown in Tab.1, for all forms of attacks and their volumes.

    Table 1:Robustness evaluation of SFASCDW under all attacks with various volumes

    Figure 7:Robustness effect under all attacks with various volumes

    From Tab.1 above and Fig.7 below, it appears that the SFASCDW approach gives sensitive results of robustness under all attacks in which the structure, syntax, and semantics of English text contents may be affected.As a comparison of robustness based on attack types, results show that the best robustness rate was detected in descending order by deletion, reorder, and reorder attack sequentially in all scenarios of attack volumes.

    5 Comparison and Result Discussion

    The robustness results were critically analyzed.This subsection displays an effect study and a comparison between SFASCDW and baseline approaches Hybrid of Natural Language Processing and Zero-Watermarking Approach (HNLPZWA) [5] and Zero-Watermarking Approach based on Fourth level order of Arabic Word Mechanism of Markov Model (ZWAFWMMM) [6].It also contains a discussion of their effect under the major factors, namely dataset size, attack types,and volumes.

    5.1 Robustness Comparison Under Attack Type Effect

    Tab.2 shows a comparison of the different attack types’effect on robustness of SFASCDW,ZWAFWMMM, and HNLPZWA approaches against all dataset sizes and all scenarios of attack volumes.

    Table 2:Attack types effect on robustness of SFASCDW, ZWAFWMMM, and HNLPZWA approaches

    Figure 8:A compression of attack type effect on robustness of SFASCDW, ZWAFWMMM, and HNLPZWA approaches

    Tab.2 and Fig.8 show how the robustness of SFASCDW, ZWAFWMMM, and HNLPZWA approaches is influenced by the type of tampering attack.In all cases of insertion, deletion, and reorder attacks, low effect has been detected between robustness of SFASCDW approach and baseline approaches ZWAFWMMM as well as HNLPZWA in terms of watermark robustness,which shows that the proposed SFASCDW approach is the best choice as seen as the case study on effect of attack type.This means that the proposed SFASCDW approach is strongly recommended and applicable for content authentication and tampering detection of English text documents for all types of attack.

    5.2 Robustness Comparison Under Attack Volume Effect

    Tab.3 provides a comparison of the different attack volumes’effect on robustness against all dataset sizes and all scenarios of attack volumes.The comparison is performed using SFASCDW,ZWAFWMMM, and HNLPZWA approaches.

    Table 3:Attack volume effect on robustness of SFASCDW, ZWAFWMMM, and HNLPZWA approaches

    Tab.3 and Fig.9 show how the robustness is influenced by low, mid, and high attack volumes.Fig.9 demonstrates that if the attack volume increases, the robustness also increases.In all cases of low, mid, and high attack volumes, SFASCDW outperforms both ZWAFWMMM and HNLPZWA approaches in terms of robustness in low, mid, and high volumes of attacks.This means that SFASCDW approach is strongly recommended for content authentication and tampering detection of all types of English text.

    Figure 9:A compression of attack volume effect on robustness of SFASCDW, ZWAFWMMM,and HNLPZWA approaches

    5.3 Robustness Comparison Under Dataset Size Effect

    This section tests the various dataset size effect on robustness against all forms of attacks within their multiple volumes.Tab.4 shows a comparison of that effect using SFASCDW,ZWAFWMMM, and HNLPZWA approaches.

    Table 4:Dataset size effect on robustness of SFASCDW, ZWAFWMMM, and HNLPZWA approaches

    The comparative results as shown in Tab.4 and Fig.10 reflect the robustness of the proposed SFASCDW approach.The results show that in the SFASCDW approach, the highest effects of dataset size that lead to the best robustness are ordered as ESST, EMST, EHMST, and ELST.This means that the robustness increases with the decreased document size and decreases with the increased document size.That said, the results show that SFASCDW approach outperforms both ZWAFWMMM and HNLPZWA approaches in term of robustness for all sizes of dataset.

    Figure 10:A compression of dataset size effect on robustness of SFASCDW, ZWAFWMMM, and HNLPZWA approaches

    6 Conclusion

    Based on the first-level order and alphanumeric mechanism of HMM, a smart fragile approach has been developed that is abbreviated as SFASCDW for content authentication and tampering detection of English text transmitted via the internet.SFASCDW uses a combination of the zero watermarking technique and soft computing techniques for text analysis to find interrelationships between the contents of the given English text and the generated watermark key.The generated watermark is embedded logically in the original English context without modifications of and effect on the size of the original text.The embedded watermark is used later after the transmission of text via the internet to detect any tampering occurring on the received English text and verifies whether it is authentic or not.SFASCDW approach is implemented in PHP using VS code IDE.The simulation and experiments are performed on various standard datasets under different volumes of insertion, deletion, and reorder attacks.SFASCDW approach has been compared with ZWAFWMMM and HNLPZWA approaches.Comparison results show that SFASCDW outperforms ZWAFWMMM and HNLPZWA in terms of general robustness because using the first-level order and alphanumeric mechanism of HMM leads to better performance and robustness in which the first order of interrelationships between alphanumeric is stronger than other levels order level of alphanumeric or words mechanisms of HMM.For future work, the authors intend to improve the robustness using other techniques and mechanisms.

    Funding Statement:The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number (RGP.1/147/42), Received by Fahd N.Al-Wesabi.www.kku.edu.sa.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    freevideosex欧美| 日本色播在线视频| 色婷婷久久久亚洲欧美| 国产乱来视频区| 亚洲三级黄色毛片| 国产精品不卡视频一区二区| 亚洲一级一片aⅴ在线观看| 日本午夜av视频| 免费观看a级毛片全部| 草草在线视频免费看| 成年美女黄网站色视频大全免费| av在线app专区| 日韩在线高清观看一区二区三区| 国产精品一区二区在线观看99| 亚洲av欧美aⅴ国产| 91aial.com中文字幕在线观看| 国产精品一国产av| 欧美bdsm另类| 日韩制服骚丝袜av| 日韩三级伦理在线观看| 激情五月婷婷亚洲| 丝袜美足系列| 午夜老司机福利剧场| 免费观看av网站的网址| 青春草视频在线免费观看| 乱码一卡2卡4卡精品| 国产亚洲一区二区精品| 最近的中文字幕免费完整| 下体分泌物呈黄色| 亚洲人与动物交配视频| 欧美成人午夜精品| 超碰97精品在线观看| 久久精品国产鲁丝片午夜精品| 又黄又爽又刺激的免费视频.| 成年动漫av网址| 熟女av电影| 午夜福利,免费看| 亚洲人成77777在线视频| 久久免费观看电影| 亚洲熟女精品中文字幕| 日日撸夜夜添| 国产日韩一区二区三区精品不卡| 亚洲精品日本国产第一区| 日本91视频免费播放| 99视频精品全部免费 在线| 亚洲国产av影院在线观看| 在线观看免费高清a一片| 在线亚洲精品国产二区图片欧美| 精品国产一区二区三区久久久樱花| 免费观看a级毛片全部| 免费大片18禁| 激情视频va一区二区三区| 97超碰精品成人国产| 1024视频免费在线观看| 在线观看美女被高潮喷水网站| 啦啦啦啦在线视频资源| 国产精品.久久久| 日本午夜av视频| av在线播放精品| 久久久久久久大尺度免费视频| 看免费成人av毛片| 最近最新中文字幕免费大全7| 日韩免费高清中文字幕av| 日本91视频免费播放| 免费女性裸体啪啪无遮挡网站| 亚洲国产av影院在线观看| 中文字幕最新亚洲高清| 青青草视频在线视频观看| 亚洲成国产人片在线观看| 国产成人av激情在线播放| 国产成人aa在线观看| 国产亚洲精品第一综合不卡 | 久久99精品国语久久久| 日韩中字成人| 欧美日韩精品成人综合77777| 日本vs欧美在线观看视频| 国产精品三级大全| 久久韩国三级中文字幕| 51国产日韩欧美| 老熟女久久久| 日韩欧美一区视频在线观看| kizo精华| 国产精品久久久久久久电影| 亚洲精品久久久久久婷婷小说| 桃花免费在线播放| 伦理电影免费视频| 男人爽女人下面视频在线观看| 人妻 亚洲 视频| 日产精品乱码卡一卡2卡三| av又黄又爽大尺度在线免费看| 欧美3d第一页| 亚洲av综合色区一区| 日本vs欧美在线观看视频| 国产国拍精品亚洲av在线观看| 七月丁香在线播放| 天堂8中文在线网| 在现免费观看毛片| 亚洲欧美色中文字幕在线| 亚洲av电影在线进入| 91国产中文字幕| 国产国拍精品亚洲av在线观看| 丰满少妇做爰视频| 新久久久久国产一级毛片| 日韩熟女老妇一区二区性免费视频| av播播在线观看一区| 国产精品欧美亚洲77777| 好男人视频免费观看在线| 黄色 视频免费看| 久久久久久久久久成人| 中文字幕人妻熟女乱码| 大片免费播放器 马上看| 精品99又大又爽又粗少妇毛片| 不卡视频在线观看欧美| 99热国产这里只有精品6| 两个人看的免费小视频| 日韩一区二区三区影片| 欧美老熟妇乱子伦牲交| 亚洲精品,欧美精品| 制服人妻中文乱码| 如何舔出高潮| 久久久久久久久久久免费av| 桃花免费在线播放| 欧美日韩av久久| 久久精品熟女亚洲av麻豆精品| 亚洲国产精品一区二区三区在线| 在线观看三级黄色| 99热6这里只有精品| 免费人成在线观看视频色| 欧美xxⅹ黑人| 男女高潮啪啪啪动态图| 国产成人欧美| 国产成人精品福利久久| 中国三级夫妇交换| 免费黄色在线免费观看| 欧美激情国产日韩精品一区| 欧美bdsm另类| 一本大道久久a久久精品| 国产色爽女视频免费观看| 免费观看av网站的网址| 免费av中文字幕在线| 最近的中文字幕免费完整| 久久久精品免费免费高清| 亚洲欧美精品自产自拍| 久久午夜综合久久蜜桃| 欧美亚洲日本最大视频资源| 国产成人精品在线电影| 国产国拍精品亚洲av在线观看| 熟女人妻精品中文字幕| 国产探花极品一区二区| 亚洲综合色惰| 国产成人aa在线观看| 国产不卡av网站在线观看| 大香蕉久久成人网| 嫩草影院入口| 亚洲精品久久成人aⅴ小说| 伊人亚洲综合成人网| www.熟女人妻精品国产 | 久久精品久久精品一区二区三区| 高清欧美精品videossex| 国产免费现黄频在线看| 久久久久国产精品人妻一区二区| 国产成人免费观看mmmm| 亚洲成人av在线免费| 伊人久久国产一区二区| 亚洲欧美中文字幕日韩二区| 一级毛片电影观看| 黄片无遮挡物在线观看| 制服诱惑二区| 国精品久久久久久国模美| 内地一区二区视频在线| 人成视频在线观看免费观看| 青青草视频在线视频观看| 国产精品蜜桃在线观看| 日本-黄色视频高清免费观看| 一级片'在线观看视频| 51国产日韩欧美| 中国美白少妇内射xxxbb| 日本av免费视频播放| 中文精品一卡2卡3卡4更新| 国产成人免费无遮挡视频| 波野结衣二区三区在线| av福利片在线| 国产精品熟女久久久久浪| 亚洲精品久久成人aⅴ小说| 欧美亚洲 丝袜 人妻 在线| 最近中文字幕高清免费大全6| 伊人久久国产一区二区| 视频在线观看一区二区三区| 看免费av毛片| 国产乱人偷精品视频| 高清黄色对白视频在线免费看| 日韩av免费高清视频| 日韩一区二区三区影片| 欧美日韩综合久久久久久| 777米奇影视久久| 侵犯人妻中文字幕一二三四区| 久久久久久久久久成人| 欧美精品国产亚洲| 丝袜在线中文字幕| 亚洲精华国产精华液的使用体验| 亚洲国产精品专区欧美| 一边摸一边做爽爽视频免费| 99精国产麻豆久久婷婷| 亚洲av电影在线观看一区二区三区| 如何舔出高潮| 精品人妻偷拍中文字幕| 国产精品久久久久久av不卡| 日韩欧美一区视频在线观看| 人人妻人人澡人人看| av不卡在线播放| 国产成人午夜福利电影在线观看| 少妇人妻久久综合中文| 免费看av在线观看网站| 成人毛片60女人毛片免费| 成人18禁高潮啪啪吃奶动态图| 欧美 日韩 精品 国产| 精品熟女少妇av免费看| 视频中文字幕在线观看| 青春草视频在线免费观看| 如日韩欧美国产精品一区二区三区| 卡戴珊不雅视频在线播放| 欧美精品高潮呻吟av久久| 婷婷色麻豆天堂久久| 国产1区2区3区精品| 天天影视国产精品| 国产极品粉嫩免费观看在线| 人妻系列 视频| 国产一区二区激情短视频 | 欧美精品av麻豆av| videos熟女内射| 亚洲精品自拍成人| 性色avwww在线观看| 热99久久久久精品小说推荐| 中国三级夫妇交换| 国产精品蜜桃在线观看| 丝袜人妻中文字幕| 日本欧美国产在线视频| 国产在线视频一区二区| 亚洲欧洲日产国产| 丁香六月天网| 美女主播在线视频| 国内精品宾馆在线| 岛国毛片在线播放| 精品一区在线观看国产| 久久久a久久爽久久v久久| 蜜臀久久99精品久久宅男| 国产免费一区二区三区四区乱码| 人人妻人人爽人人添夜夜欢视频| 久久人人爽人人爽人人片va| av线在线观看网站| 亚洲色图 男人天堂 中文字幕 | 精品人妻熟女毛片av久久网站| 亚洲国产av新网站| 亚洲人与动物交配视频| 中文字幕另类日韩欧美亚洲嫩草| 国精品久久久久久国模美| 日韩精品免费视频一区二区三区 | 最近2019中文字幕mv第一页| 人体艺术视频欧美日本| 亚洲色图综合在线观看| 熟女av电影| 女人精品久久久久毛片| 妹子高潮喷水视频| 欧美精品人与动牲交sv欧美| 国语对白做爰xxxⅹ性视频网站| 亚洲精品一二三| 国产成人91sexporn| 国产精品一二三区在线看| 精品国产露脸久久av麻豆| 国产日韩一区二区三区精品不卡| 亚洲国产看品久久| 菩萨蛮人人尽说江南好唐韦庄| 99热6这里只有精品| 一级毛片黄色毛片免费观看视频| 久久国产亚洲av麻豆专区| 在线观看免费视频网站a站| 久久久久精品久久久久真实原创| 天堂俺去俺来也www色官网| 一级毛片黄色毛片免费观看视频| 中文字幕av电影在线播放| 日韩一区二区视频免费看| 国产极品粉嫩免费观看在线| 超碰97精品在线观看| 高清黄色对白视频在线免费看| 啦啦啦中文免费视频观看日本| 国产成人精品一,二区| 看非洲黑人一级黄片| 9热在线视频观看99| 黄色一级大片看看| 在线观看美女被高潮喷水网站| 免费黄网站久久成人精品| 欧美日韩亚洲高清精品| 亚洲精品第二区| 美国免费a级毛片| 欧美性感艳星| 午夜免费鲁丝| av国产久精品久网站免费入址| 欧美 亚洲 国产 日韩一| 国产黄色视频一区二区在线观看| 韩国高清视频一区二区三区| 国产黄色视频一区二区在线观看| 三上悠亚av全集在线观看| 新久久久久国产一级毛片| 热99久久久久精品小说推荐| 五月开心婷婷网| 人成视频在线观看免费观看| 日产精品乱码卡一卡2卡三| videossex国产| 精品少妇黑人巨大在线播放| 亚洲欧洲精品一区二区精品久久久 | 久久久国产精品麻豆| 制服人妻中文乱码| 赤兔流量卡办理| 久久99蜜桃精品久久| 少妇猛男粗大的猛烈进出视频| 18禁国产床啪视频网站| 91久久精品国产一区二区三区| 久久久a久久爽久久v久久| 欧美bdsm另类| 中文字幕制服av| 日产精品乱码卡一卡2卡三| 水蜜桃什么品种好| 男女啪啪激烈高潮av片| 深夜精品福利| 精品一区在线观看国产| 80岁老熟妇乱子伦牲交| 国产视频首页在线观看| a级片在线免费高清观看视频| 九色成人免费人妻av| 少妇精品久久久久久久| 成人国语在线视频| 国产一区有黄有色的免费视频| 日本wwww免费看| 久热久热在线精品观看| 欧美精品一区二区免费开放| 性色av一级| 亚洲精品自拍成人| 日韩一区二区三区影片| 街头女战士在线观看网站| 久久精品夜色国产| 亚洲一区二区三区欧美精品| 欧美xxxx性猛交bbbb| 满18在线观看网站| av女优亚洲男人天堂| 精品熟女少妇av免费看| 久久久久网色| 欧美精品人与动牲交sv欧美| 狂野欧美激情性bbbbbb| 天天躁夜夜躁狠狠久久av| 亚洲欧美中文字幕日韩二区| 亚洲av欧美aⅴ国产| 在现免费观看毛片| 美女大奶头黄色视频| 色婷婷久久久亚洲欧美| 成人毛片60女人毛片免费| 老司机影院成人| 日本-黄色视频高清免费观看| 欧美日韩国产mv在线观看视频| 日韩在线高清观看一区二区三区| 两个人看的免费小视频| 不卡视频在线观看欧美| 91精品国产国语对白视频| 免费看光身美女| 校园人妻丝袜中文字幕| 深夜精品福利| 亚洲精品av麻豆狂野| 国产一区二区三区综合在线观看 | 久久久久久久久久人人人人人人| 精品国产国语对白av| 国产白丝娇喘喷水9色精品| 中文字幕av电影在线播放| 精品酒店卫生间| 一二三四中文在线观看免费高清| 亚洲人成77777在线视频| 卡戴珊不雅视频在线播放| 久久久国产精品麻豆| 毛片一级片免费看久久久久| 国产高清不卡午夜福利| 欧美 亚洲 国产 日韩一| 永久网站在线| 欧美国产精品va在线观看不卡| 日本黄大片高清| 国产老妇伦熟女老妇高清| 高清黄色对白视频在线免费看| 女性被躁到高潮视频| 国产福利在线免费观看视频| 欧美xxxx性猛交bbbb| 2022亚洲国产成人精品| 国产精品久久久久久精品古装| 亚洲色图 男人天堂 中文字幕 | 最新的欧美精品一区二区| 一级黄片播放器| 国产极品天堂在线| 成人二区视频| 草草在线视频免费看| 韩国精品一区二区三区 | 午夜免费男女啪啪视频观看| 在线观看美女被高潮喷水网站| 精品少妇黑人巨大在线播放| 国产精品久久久久久av不卡| 肉色欧美久久久久久久蜜桃| a 毛片基地| 天天躁夜夜躁狠狠久久av| 亚洲欧美日韩另类电影网站| av播播在线观看一区| 国产成人欧美| 少妇人妻久久综合中文| 精品一区二区三卡| 国产精品一区二区在线不卡| 久久久久久久久久成人| 热re99久久国产66热| 熟女电影av网| 曰老女人黄片| 亚洲精品久久久久久婷婷小说| 久久久精品区二区三区| 少妇人妻 视频| 亚洲av在线观看美女高潮| 成人国产av品久久久| 人妻少妇偷人精品九色| 在线观看免费日韩欧美大片| 国产精品蜜桃在线观看| 七月丁香在线播放| 午夜福利乱码中文字幕| 国产综合精华液| 九草在线视频观看| 午夜老司机福利剧场| 狠狠婷婷综合久久久久久88av| 又黄又粗又硬又大视频| 日韩av在线免费看完整版不卡| 99热这里只有是精品在线观看| 国产精品一国产av| 高清在线视频一区二区三区| 亚洲内射少妇av| 久久久欧美国产精品| 黄片播放在线免费| 亚洲av电影在线进入| 日韩免费高清中文字幕av| 纵有疾风起免费观看全集完整版| 久久人人爽人人片av| 国产一区二区三区av在线| 亚洲美女搞黄在线观看| 大码成人一级视频| 国产精品国产av在线观看| 久久综合国产亚洲精品| 久久国产精品大桥未久av| 春色校园在线视频观看| 亚洲av中文av极速乱| 亚洲精品第二区| 免费观看a级毛片全部| 黑人巨大精品欧美一区二区蜜桃 | 国产成人一区二区在线| 热re99久久国产66热| 国产69精品久久久久777片| 欧美日韩综合久久久久久| 国产成人a∨麻豆精品| 精品少妇黑人巨大在线播放| 少妇的丰满在线观看| 妹子高潮喷水视频| 国产精品 国内视频| 久久精品国产综合久久久 | 91在线精品国自产拍蜜月| 国产不卡av网站在线观看| 中文精品一卡2卡3卡4更新| 国产在线一区二区三区精| 日韩中字成人| 亚洲精品成人av观看孕妇| 中文天堂在线官网| 日韩欧美精品免费久久| 国产成人精品福利久久| 久久午夜综合久久蜜桃| 日韩电影二区| 亚洲av福利一区| 国产亚洲av片在线观看秒播厂| 亚洲欧洲国产日韩| 欧美日韩亚洲高清精品| 亚洲精品,欧美精品| 国产精品久久久久久精品电影小说| 插逼视频在线观看| 美女福利国产在线| 国产一区二区三区综合在线观看 | 国产福利在线免费观看视频| 丰满饥渴人妻一区二区三| 亚洲欧洲国产日韩| 精品一品国产午夜福利视频| 国产成人av激情在线播放| 99精国产麻豆久久婷婷| 免费黄色在线免费观看| 成人国产麻豆网| 亚洲三级黄色毛片| xxxhd国产人妻xxx| 一级毛片黄色毛片免费观看视频| 99热全是精品| 精品一区二区免费观看| 午夜免费观看性视频| 亚洲欧洲精品一区二区精品久久久 | 午夜老司机福利剧场| 亚洲国产精品一区二区三区在线| 欧美3d第一页| 18禁裸乳无遮挡动漫免费视频| 蜜桃在线观看..| 久久韩国三级中文字幕| 精品福利永久在线观看| 亚洲国产成人一精品久久久| 中文字幕精品免费在线观看视频 | 国产欧美日韩一区二区三区在线| 久久久久视频综合| 一区二区日韩欧美中文字幕 | 国产一区有黄有色的免费视频| 成人影院久久| 成人亚洲欧美一区二区av| 久久精品夜色国产| 久久这里只有精品19| 男人添女人高潮全过程视频| av国产精品久久久久影院| 亚洲第一区二区三区不卡| 激情视频va一区二区三区| 桃花免费在线播放| 亚洲国产精品999| 欧美日韩国产mv在线观看视频| 中文天堂在线官网| 成年av动漫网址| 一级片'在线观看视频| 亚洲精品美女久久久久99蜜臀 | 制服诱惑二区| 天天影视国产精品| 啦啦啦中文免费视频观看日本| 国产免费福利视频在线观看| 黄色 视频免费看| xxx大片免费视频| 人妻一区二区av| 春色校园在线视频观看| 亚洲美女黄色视频免费看| 在线观看人妻少妇| 欧美日韩视频高清一区二区三区二| 九九在线视频观看精品| 少妇熟女欧美另类| 久久久久久伊人网av| 欧美老熟妇乱子伦牲交| 又黄又粗又硬又大视频| 中文欧美无线码| 精品亚洲成国产av| 91久久精品国产一区二区三区| 久久女婷五月综合色啪小说| 亚洲精品成人av观看孕妇| 美女国产视频在线观看| 18禁国产床啪视频网站| 亚洲精品国产av成人精品| 蜜臀久久99精品久久宅男| 国产亚洲精品第一综合不卡 | 国产精品.久久久| 丰满少妇做爰视频| 91国产中文字幕| 国产成人精品一,二区| 久久精品久久精品一区二区三区| 人成视频在线观看免费观看| 久久久久久人妻| 男女国产视频网站| 九九在线视频观看精品| 国产无遮挡羞羞视频在线观看| 亚洲精品色激情综合| 精品少妇黑人巨大在线播放| 亚洲国产色片| 99热国产这里只有精品6| 80岁老熟妇乱子伦牲交| 咕卡用的链子| 午夜av观看不卡| 免费少妇av软件| 免费观看无遮挡的男女| 亚洲一区二区三区欧美精品| 涩涩av久久男人的天堂| 黄色怎么调成土黄色| 天天操日日干夜夜撸| 丝瓜视频免费看黄片| 国产精品欧美亚洲77777| 黑丝袜美女国产一区| 欧美丝袜亚洲另类| 777米奇影视久久| 亚洲中文av在线| 久久人人爽人人片av| 黑人高潮一二区| 成年人免费黄色播放视频| 国产黄色视频一区二区在线观看| 亚洲av男天堂| 精品少妇黑人巨大在线播放| 国产精品一区www在线观看| 精品一区二区免费观看| 亚洲久久久国产精品| 丝袜脚勾引网站| 精品一区二区免费观看| 欧美人与善性xxx| 9热在线视频观看99| 日本vs欧美在线观看视频| 欧美人与善性xxx| 欧美日韩av久久| 日日撸夜夜添| 日本黄色日本黄色录像| 国产精品99久久99久久久不卡 | 日韩伦理黄色片| 国产成人午夜福利电影在线观看| 我要看黄色一级片免费的| av免费观看日本| 另类亚洲欧美激情| av不卡在线播放| 少妇人妻 视频| 人人妻人人爽人人添夜夜欢视频| 亚洲国产色片| 一级毛片 在线播放| 黄色配什么色好看| 一级黄片播放器| 中文精品一卡2卡3卡4更新| 波野结衣二区三区在线| 亚洲精品中文字幕在线视频| 大片电影免费在线观看免费| 90打野战视频偷拍视频| 国产精品久久久久久精品古装|