• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Smart-Fragile Authentication Scheme for Robust Detecting of Tampering Attacks on English Text

    2022-08-24 03:27:00MohammadAlamgeerFahdAlWesabiHudaIskandarImranKhanNadhemNemriMohammadMedaniMohammedAbdullahAlHageryandAliMohammedAlSharafi
    Computers Materials&Continua 2022年5期

    Mohammad Alamgeer,F(xiàn)ahd N.Al-Wesabi,Huda G.Iskandar,Imran Khan,Nadhem Nemri,Mohammad Medani,Mohammed Abdullah Al-Hagery and Ali Mohammed Al-Sharafi

    1Department of Information Systems,King Khalid University,Muhayel Aseer,Kingdom of Saudi Arabia

    2Department of Computer Science,King Khalid University,Muhayel Aseer,Kingdom of Saudi Arabia

    3Faculty of Computer and IT,Sana’a University,Sana’a,Yemen

    4School of Computing,F(xiàn)aculty of Engineering,Universiti Teknologi Malaysia,Malaysia

    5Department of Electrical Engineering,University of Engineering and Technology Peshawar,Pakistan

    6Department of Information Systems,King Khalid University,Muhayel Aseer,Kingdom of Saudi Arabia

    7Department of Computer Science,College of Computer,Qassim University,Saudi Arabia

    8Department of Computer Science,College of Computers and Information Technology,University of Bisha,KSA

    Abstract:Content authentication,integrity verification,and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication technology.In this paper,a text zero-watermarking approach known as Smart-Fragile Approach based on Soft Computing and Digital Watermarking(SFASCDW)is proposed for content authentication and tampering detection of English text.A first-level order of alphanumeric mechanism, based on hidden Markov model, is integrated with digital zero-watermarking techniques to improve the watermark robustness of the proposed approach.The researcher uses the first-level order and alphanumeric mechanism of Markov model as a soft computing technique to analyze English text.Moreover,he extracts the features of the interrelationship among the contexts of the text, utilizes the extracted features as watermark information,and validates it later with the studied English text to detect any tampering.SFASCDW has been implemented using PHP with VS code IDE.The robustness,effectiveness,and applicability of SFASCDW are proved with experiments involving four datasets of various lengths in random locations using the three common attacks,namely insertion,reorder,and deletion.The SFASCDW was found to be effective and could be applicable in detecting any possible tampering.

    Keywords: Watermarking; soft computing; text analysis; hidden Markov model; content authentication

    1 Introduction

    For the research community, the reliability and security of exchanged text data through the internet is the most promising and challenging field.In communication technologies, authentication of content and automated text verification of honesty in different Languages and formats are of great significance.Numerous applications for instance; e-Banking and e-commerce render information transfer via the Internet the most difficult.In terms of content, structure, grammar,and semantics, much of the digital media transferred over the internet is in text form and is very susceptible to online transmission.During the transfer process, malicious attackers can temper such digital content [1].

    For information security, many algorithms and techniques are available such as the authentication of content, verification of integrity, detection of tampering, identification of owners, access control, and copyright protection.

    To overcome these issues, steganography and automated methods of watermarking are commonly used.A technique of digital-Watermarking (DWM) can be inserted into digital material through various details such as text, binary pictures, audio, and video [2,3].A fine-grained text watermarking procedure is proposed based on replacing the white spaces and Latin symbols with homoglyph characters [4].

    Several conventional methods and solutions for text watermarking were proposed [5,6] and categorized into different classifications such as linguistic, structure and image-based, and formatbased binary images [7].To insert the watermark information into the document, most of these solutions require certain upgrades or improvements to the original text in digital format material.Zero-watermarking without any alteration to the original digital material to embed the watermark information is a new technique with smart algorithms that can be used.Also, this technique can be used to generate data for a watermark in the contents of a given digital context [1,7–9].

    Restricted research has centered on the appropriate solutions to verify the credibility of critical digital media online [10–12].The verification of digital text and the identification of fraud in research earned great attention.In addition, text watermarking studies have concentrated on copyright protection in the last decade, but less interest and attention has been paid to integrity verification, identification of tampering and authentication of content due to the existence of text content based on the natural language [13].

    Proposing the most appropriate approaches and strategies for dissimilar formats and materials,especially in Arabic and English languages, is the most common challenge in this area [14,15].Therefore, authentication of content, verification of honesty, and detection of tampering of sensitive text constitute a big problem in various applications and require necessary solutions.

    Some instances of such sensitive digital text content are Arabic interactive Holy Qur’an,eChecks, tests, and marks.Different Arabic alphabet characteristics such as diacritics lengthened letters and extra symbols of Arabic make it simple to modify the key meaning of the text material by making basic changes such as modifying diacritic arrangements [16].The most popular soft computation and natural language processing (NLP) technique that supported the analysis of the text is HMM.

    We suggest a highly fragile method for detecting the tampering attacks on Internet-based Arabic text (HFDATAI) by incorporating the Markov model and zero watermarking.Hence, firstorder of an alphanumeric mechanism consisting of a model performing as a soft computing tool and NLP in cooperation between the zero-watermarking technique and the Markov model.In this method, for text analysis, the first order of the alphanumeric mechanism of the Markov model was used to extract the connections between the contents of the Arabic text given and to generate the main watermark.Without alterations or effects on the original text size, the watermark created is logically integrated into the original Arabic history.The embedded watermark would later be used to identify all manipulation on Arabic text obtained after transmission of text through the Internet and whether it is authentic or not.

    The primary objective of the HFDATAI strategy is to meet the high accuracy of content authentication and identification of sensitive tampering attacks of Arabic text which is transmitted through the Internet.

    The remainder of the article is structured as follows:In Section 2, we explain the existing works done so far.In Section 3, we discussed the suggested approach (HFDATAI).The simulation and implementation are provided in Section 4, results discussion is provided in Section 5, and finally, we conclude the article in Section 6.

    2 Related Work

    According to the processing domain of NLP and text watermarking, these existing methods and solutions of text watermarking reviewed in this paper are classified into linguistical, structural and zero-watermark methods [1,7,13].

    Natural language is the foundation of approaches to linguistic text watermarking.The mechanism of those methods embedding the watermark is based on changes applied to the semantic and syntactic essence of plain text [1].

    To enhance the capability and imperceptibility of Arabic text, a method of text watermarking has suggested based on location of the accessible words [17].In this method, any word-space is used to mask the Boolean bit 0 or 1 that physically modifies the original text.

    A text steganography technique was proposed to hide information in the Arabic language [18].The step of this approach considers Harakat’s existence in Arabic diacritics such as Kasra, Fatha,and Damma as well as reverses Fatha to cover the message.

    A Kashida-marks invisible method of watermarking [19], based on the features of frequent recurrence of document security and authentication characters, was proposed.The method is based on a predetermined watermark key with a Kashida placed for a bit 1 and a bit omitted.

    The method of steganography of the text has proposed based on Kashida extensions on the characters ‘moon’and ‘sun’to write digital contents of the Arabic language [20].In addition,the Kashida method characters are seen alongside characters from Arabic to decide which hidden secret bits are kept by specific characters.In this form, four instances are included in the kashida characters:moon characters representing ‘00’; sun characters representing ‘01’; sun characters representing ‘10’; and moon characters representing ‘11’.

    A text steganographic approach [21] based on multilingual Unicode characters has been suggested to cover details in English scripts for the use of the English Unicode alphabet in other languages.Thirteen letters of the English alphabet have been chosen for this approach.It is important to embed dual bits in a timeframe that used ASCII code for embedding 00.However, multilingual ones were used by Unicode to embed between 01, and 10, as well as 11.The algorithm of Text Watermarking is used to secure textual contents from malicious attacks according to Unicode extended characters [22].The algorithm requires three main steps, the development, incorporation, and extraction of watermarks.The addition of watermarks is focused on the development of predefined coding tables, while scrambling strategies are often used in generating and removing the watermarking key is safe.

    The substitution attack method focused on preserving the position of words in the text document has been proposed [23].This method depends on manipulating word transitions in the text document.Authentication of Chinese text documents based on the combination of the properties of sentences and text-based watermarking approaches have been suggested [24,25].The proposed method is presented as follows:a text of the Chinese language is split into a group of sentences, and for each word, the code of a semantic has been obtained.The distribution of semantic codes influences sentence entropy.

    A zero-watermarking method has been proposed to preserve the privacy of a person who relies on the Hurst exponent and the nullity of the frames [26].For watermark embedding, the two steps are determined to evaluate the unvoiced frames.The process of the proposed approach bases on integrating an individual’s identity without notifying any distortion in the signals of medical expression.

    A zero-watermarking method was proposed to resolve the security issues of text-documents of the English language, such as verification of content and copyright protection [27].A zerowatermarking approach has been suggested based on the authentication Markov-model of the content of English text [28,29].In this approach, to extract the safe watermark information, the probability characteristics of the English text are involved and stored to confirm the validity of the attacked text-document.The approach provides security against popular text attacks with a watermark distortion rate if, for all known attacks, it is greater than one.For the defense of English text by copyright, based on the present rate of ASCII non-vowel letters and terms, the conventional watermark approach [30] has been suggested.

    According to the suggested methods, content authentication and tampering detection of digital English contents that have been ignored by researchers in the literature for many reasons.English text is a natural language dependent.On the other hand, hiding the watermark information is complicated since there is no location to hide it within text as pixels in the case of image,waves in audio and frames in video.

    3 The Proposed Approach

    In this paper, the authors propose a smart scheme called SFASCDW by integrating zerowatermark and soft computing techniques with get rid of external watermark information and without modifications of the original text to embed the watermark key.The first-level of alphanumeric mechanism of the Markov model is used as a soft computing technique to analyze the contents of the given English text and extract the interrelationship features of these text contents.

    The main contributions of our scheme SFASCDW can be summarized as follows:

    ·Unlike previous work where watermarking is done with language, contents, and scale effecting, the SFASCDW scheme logically embeds watermarking with no effect on text, content,or size.

    ·The watermarking mechanism does not require any external knowledge in our SFASCDW approach since this watermark key is generated by text processing and the extraction of a relationship between both the content and a watermark.

    ·The SFASCDW scheme is highly vulnerable to any basic alteration to the English text and context defined as complex text.Somehow, the above three contributions are present only in pictures, though not in the text.That is the key argument on this paper’s contribution.

    Four main processes should be performed in SFASCDW, namely text analysis, watermark generation, extraction, and detection processes, as illustrated in Fig.1.

    3.1 Text Analysis and Watermark Generation Process

    The three main sub-algorithms included in this process are preprocessing and building the Markov matrix algorithm, text analysis algorithm, and watermark generation algorithm.

    3.1.1 Pre-Processing and Building the Markov Matrix Algorithm

    The preprocessing of the original English text is one of the key steps in both the watermark generation and extraction processes of SFASCDW to convert letter cases and remove extra spaces and new lines, and it will directly influence the tampering detection accuracy.The original English text (OET) is required as input for the preprocessing process.The output of this algorithm is preprocessed English text (OETP).That said, building a Markov matrix is the starting point of English text analysis and watermark generation process using the Markov model.The Markov matrix that represents the possible states and transitions available in the given text is constructed without reputations.In this approach, each unique alphanumeric within a given English text represents a present state, and each unique alphanumeric a transition in the Markov matrix.During the building process of the Markov matrix, the proposed algorithm initializes all transition values by zero to use these cells later for keeping track of the number of times that the ithunique alphanumeric is followed by the jthalphanumeric within the given English text.

    Preprocessing and building the Markov matrix algorithm is executed as presented below in Algorithm 1.

    Algorithm 1:Preprocessing and building Markov algorithm of SFASCDWimages/BZ_407_205_894_1201_1717.png

    where OET:is an original English text, OETP:is a preprocessed English text, ea1mm[ps][ns]:is a states and transitions matrix with zero values for all cells, ps:refers to present state, ns:refers to next state.

    According to this algorithm, a method is presented to construct a two-dimensional matrix of Markov states and transitions named ea1mm[ps][ns], which represents the backbone of Markov model for English text analysis.The length of ea1mm[ps][ns] matrix of SFASCDW is fixed with sixty-one rows (states) and sixty-one columns (transitions).This fixed size represent twenty-eight alphabets of English letters “a–z,” ten integer numbers “0–9,” and twenty-three space and special symbols “@, $, (, /, .etc.”

    3.1.2 Text Analysis Algorithm

    After the Markov matrix is constructed, the text analysis process should be performed to find interrelationships between contexts of the given English text and generate watermark patterns.In this algorithm, the number of appearances of possible next-state transitions for each current state of a single alphanumeric will be calculated and constructed as transition probabilities by Eq.(1).

    where ea1mm[ps][ns] represents the Markov matrix of SFASCDW.

    The following example of an English text sample describes the mechanism of the transition process of present state to other next states.

    “The quick brown fox jumps over the brown fox who is slow jumps over the brown fox who is dead.”

    When using the first-level order of alphanumeric mechanism of HMM, every unique alphanumeric is a present state.Text analysis is performed as the text is read to obtain the interrelationship between present state and the next states.Fig.2 illustrates the available transitions of the above sample of English text.

    Figure 2:States representation of english text sample using SFASCDW

    As a result of analyzing the given English sentence based on first-level order and alphanumeric mechanism of Markov model, the SFASCDW produced forty-nine unique present states and their sixty-one possible transitions as illustrated in Fig.3.

    Figure 3:Sample of english text states and their transitions using SFASCDW

    It is assumed here that ‘w’is a present state of unique alphanumeric, and the available next transitions in the given English text sample are ‘h’, ‘h’, ‘n’, ‘n’, ‘n’, and ‘.’It is observed that ‘h’transitions occurred twice, ‘n’transitions occurred three times, and ‘’transitions occurred only one time.

    The building of the Markov matrix and text analysis processes of the given English text sample are illustrated in Fig.4.

    3.1.3 Watermark Generation Algorithm

    After performing analysis of the English text and extracting probability features, the watermark key is generated by finding all nonzero values in Markov matrix.The values in Markov matrix are concatenated sequentially to generate the original watermark pattern ea1WMPo, as given in Eq.(2) and illustrated in Fig.5.

    Figure 4:Text analysis processes of the given english text sample using SFASCDW

    Figure 5:The generated original watermark patterns ea1WMPo

    The generated ea1WMPo is stored in the watermark database beside the basic information of the given English text.The overall working of text analysis and watermark generation algorithm is illustrated below in Algorithm 2.

    Algorithm 2:Text analysis and watermark generation algorithm of SFASCDWimages/BZ_409_205_1711_1201_2565.png

    where ea1WMPOis the original watermark.

    3.2 Watermark Extraction and Detection Process

    The attacked watermark patterns (ea1EWMA) are generated for the attacked English text document (AETP), and the matching rate of patterns and watermark distortion are calculated by SFASCDW in order to detect any tampering, which ensures the authenticity of given contents.

    Two core algorithms involved in this process are watermark extraction and watermark detection algorithm.However, ea1EWMAis extracted from the received AETPand matched with ea1WMPo by the detection algorithm.

    AETPis an input for the proposed watermark extraction algorithm.The same process is performed for the watermark generation algorithm to obtain the watermark pattern for AETP.

    3.2.1 Watermark Extraction Algorithm

    AETPis the main input required to run this algorithm.However, the output of this algorithm is ea1EWMA.The watermark extraction algorithm is illustrated below in Algorithm 3.

    Algorithm 3:Watermark extraction algorithm of SFASCDWimages/BZ_410_209_1237_957_1766.png

    where ea1EWMAis the attacked watermark.

    3.2.2 Watermark Detection Algorithm

    ea1EWMAand ea1WMPo are the main inputs required to run the watermark detection algorithm.However, the output of this algorithm is to determine whether the English text document is authentic or tampered.The detection process of the extracted watermark is achieved in two main phases:

    ·Primary matching is achieved for ea1WMPOand ea1EWMA.If ea1EWMAand ea1WMPOpatterns appear identical, then an alert will appear as follows:“English text document is authentic and no tampering occurred.”O(jiān)therwise, the notification will be “This English text document is tampered,” before continuing to the next phase.

    ·Secondary matching is achieved by matching the transition of each state in a generated pattern.This means that ea1EWMAof each state is compared with the equivalent transition of ea1WMPOas given by Eqs.(3) and (4) below

    where,ea1_PMRT:represents tampering detection accuracy rate value in transition level, (0<ea1_PMRT <= 1)

    where ea1_PMRS:value of tampering detection accuracy rate in state level, (0<ea1_PMRS<= 100).

    After the pattern-matching rate of every state that is produced, the proposed SFASCDW scheme finds the weight (watermark robustness) of every state from all the states in the Markov matrix by using Eq.(5) below.

    where ea1PMR refers to total watermark robustness.

    The final ea1PMR of OETPand AETPare calculated by Eq.(6).

    The Watermark distortion rate represents the amount of tampering attacks occurring on contents of attacked English context, which is denoted by ea1WDR and calculated by Eq.(7).

    The steps involved in the watermark detection algorithm are illustrated in algorithm Algorithm 4.

    Algorithm 4:Watermark detection algorithm of SFASCDWimages/BZ_412_209_380_1455_1751.png

    where ea1_SW:refers to the watermark robustness rate.ea1PMR:refers to weight value of states correctly matched.ea1WDR:refers to value of watermark distortion rate (0<ea1WDR<= 100).

    Figure 6:Sample of watermark extraction and detection process using SFASCDW

    The results of the watermark extraction and detection process with watermark robustness rate of the sample of the given English text after multiple random attacks performed are illustrated in Fig.6.

    4 Implementation and Simulation

    To evaluate the robustness of SFASCDW, several scenarios of simulation and experiments are performed.This section depicts an implementation, simulation, and experimental environment, experiment parameters, experimental scenarios of standard English datasets, and results discussion.

    4.1 Simulation and Implementation Environment

    The self-developed program has been developed to test and evaluate the watermark robustness of SFASCDW.The implementation environment of SFASCDW is:CPU:Intel Core i7-4650U/2.3 GHz, RAM:8.0 GB, Windows 10–64 bit, PHP programming language with VS Code IDE.

    4.2 SFASCDW Simulation and Experiment

    This subsection presents the robustness evaluation of SFASCDW.Many simulation and experiments scenarios are performed as shown in Tab.1, for all forms of attacks and their volumes.

    Table 1:Robustness evaluation of SFASCDW under all attacks with various volumes

    Figure 7:Robustness effect under all attacks with various volumes

    From Tab.1 above and Fig.7 below, it appears that the SFASCDW approach gives sensitive results of robustness under all attacks in which the structure, syntax, and semantics of English text contents may be affected.As a comparison of robustness based on attack types, results show that the best robustness rate was detected in descending order by deletion, reorder, and reorder attack sequentially in all scenarios of attack volumes.

    5 Comparison and Result Discussion

    The robustness results were critically analyzed.This subsection displays an effect study and a comparison between SFASCDW and baseline approaches Hybrid of Natural Language Processing and Zero-Watermarking Approach (HNLPZWA) [5] and Zero-Watermarking Approach based on Fourth level order of Arabic Word Mechanism of Markov Model (ZWAFWMMM) [6].It also contains a discussion of their effect under the major factors, namely dataset size, attack types,and volumes.

    5.1 Robustness Comparison Under Attack Type Effect

    Tab.2 shows a comparison of the different attack types’effect on robustness of SFASCDW,ZWAFWMMM, and HNLPZWA approaches against all dataset sizes and all scenarios of attack volumes.

    Table 2:Attack types effect on robustness of SFASCDW, ZWAFWMMM, and HNLPZWA approaches

    Figure 8:A compression of attack type effect on robustness of SFASCDW, ZWAFWMMM, and HNLPZWA approaches

    Tab.2 and Fig.8 show how the robustness of SFASCDW, ZWAFWMMM, and HNLPZWA approaches is influenced by the type of tampering attack.In all cases of insertion, deletion, and reorder attacks, low effect has been detected between robustness of SFASCDW approach and baseline approaches ZWAFWMMM as well as HNLPZWA in terms of watermark robustness,which shows that the proposed SFASCDW approach is the best choice as seen as the case study on effect of attack type.This means that the proposed SFASCDW approach is strongly recommended and applicable for content authentication and tampering detection of English text documents for all types of attack.

    5.2 Robustness Comparison Under Attack Volume Effect

    Tab.3 provides a comparison of the different attack volumes’effect on robustness against all dataset sizes and all scenarios of attack volumes.The comparison is performed using SFASCDW,ZWAFWMMM, and HNLPZWA approaches.

    Table 3:Attack volume effect on robustness of SFASCDW, ZWAFWMMM, and HNLPZWA approaches

    Tab.3 and Fig.9 show how the robustness is influenced by low, mid, and high attack volumes.Fig.9 demonstrates that if the attack volume increases, the robustness also increases.In all cases of low, mid, and high attack volumes, SFASCDW outperforms both ZWAFWMMM and HNLPZWA approaches in terms of robustness in low, mid, and high volumes of attacks.This means that SFASCDW approach is strongly recommended for content authentication and tampering detection of all types of English text.

    Figure 9:A compression of attack volume effect on robustness of SFASCDW, ZWAFWMMM,and HNLPZWA approaches

    5.3 Robustness Comparison Under Dataset Size Effect

    This section tests the various dataset size effect on robustness against all forms of attacks within their multiple volumes.Tab.4 shows a comparison of that effect using SFASCDW,ZWAFWMMM, and HNLPZWA approaches.

    Table 4:Dataset size effect on robustness of SFASCDW, ZWAFWMMM, and HNLPZWA approaches

    The comparative results as shown in Tab.4 and Fig.10 reflect the robustness of the proposed SFASCDW approach.The results show that in the SFASCDW approach, the highest effects of dataset size that lead to the best robustness are ordered as ESST, EMST, EHMST, and ELST.This means that the robustness increases with the decreased document size and decreases with the increased document size.That said, the results show that SFASCDW approach outperforms both ZWAFWMMM and HNLPZWA approaches in term of robustness for all sizes of dataset.

    Figure 10:A compression of dataset size effect on robustness of SFASCDW, ZWAFWMMM, and HNLPZWA approaches

    6 Conclusion

    Based on the first-level order and alphanumeric mechanism of HMM, a smart fragile approach has been developed that is abbreviated as SFASCDW for content authentication and tampering detection of English text transmitted via the internet.SFASCDW uses a combination of the zero watermarking technique and soft computing techniques for text analysis to find interrelationships between the contents of the given English text and the generated watermark key.The generated watermark is embedded logically in the original English context without modifications of and effect on the size of the original text.The embedded watermark is used later after the transmission of text via the internet to detect any tampering occurring on the received English text and verifies whether it is authentic or not.SFASCDW approach is implemented in PHP using VS code IDE.The simulation and experiments are performed on various standard datasets under different volumes of insertion, deletion, and reorder attacks.SFASCDW approach has been compared with ZWAFWMMM and HNLPZWA approaches.Comparison results show that SFASCDW outperforms ZWAFWMMM and HNLPZWA in terms of general robustness because using the first-level order and alphanumeric mechanism of HMM leads to better performance and robustness in which the first order of interrelationships between alphanumeric is stronger than other levels order level of alphanumeric or words mechanisms of HMM.For future work, the authors intend to improve the robustness using other techniques and mechanisms.

    Funding Statement:The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number (RGP.1/147/42), Received by Fahd N.Al-Wesabi.www.kku.edu.sa.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    男人舔女人下体高潮全视频| 国产成年人精品一区二区| 成人国产麻豆网| 免费看美女性在线毛片视频| a级毛色黄片| 免费人成在线观看视频色| 三级男女做爰猛烈吃奶摸视频| 国产精品福利在线免费观看| 久久综合国产亚洲精品| 亚洲成人久久爱视频| 国产日韩欧美在线精品| 一级黄色大片毛片| eeuss影院久久| 久久精品综合一区二区三区| 免费在线观看成人毛片| 色5月婷婷丁香| 永久网站在线| 一边亲一边摸免费视频| 国产美女午夜福利| 免费一级毛片在线播放高清视频| 国产精品一区二区性色av| 免费播放大片免费观看视频在线观看 | 天天躁夜夜躁狠狠久久av| 国产午夜福利久久久久久| 亚洲激情五月婷婷啪啪| 你懂的网址亚洲精品在线观看 | 男女边吃奶边做爰视频| 日日撸夜夜添| 日日撸夜夜添| 97在线视频观看| 国产黄a三级三级三级人| 欧美一区二区国产精品久久精品| 国内少妇人妻偷人精品xxx网站| 日日啪夜夜撸| 免费看美女性在线毛片视频| 亚洲av不卡在线观看| 日韩欧美在线乱码| 亚洲乱码一区二区免费版| 国产亚洲最大av| 国产精品一区www在线观看| 日韩视频在线欧美| 国产三级中文精品| 中国国产av一级| 亚洲人与动物交配视频| 91精品一卡2卡3卡4卡| 日韩av在线免费看完整版不卡| 亚洲熟妇中文字幕五十中出| 日本欧美国产在线视频| 男女那种视频在线观看| 我的老师免费观看完整版| 久久久久久久久久黄片| 国产人妻一区二区三区在| 一级毛片aaaaaa免费看小| 国产高潮美女av| 欧美精品国产亚洲| 久久精品夜色国产| 搞女人的毛片| 亚洲av成人精品一二三区| av在线播放精品| 久热久热在线精品观看| 国产黄片美女视频| 五月玫瑰六月丁香| 欧美xxxx性猛交bbbb| 亚洲伊人久久精品综合 | a级一级毛片免费在线观看| 全区人妻精品视频| 最近中文字幕2019免费版| h日本视频在线播放| 嘟嘟电影网在线观看| 女的被弄到高潮叫床怎么办| 久久久a久久爽久久v久久| 人体艺术视频欧美日本| 亚洲18禁久久av| 国产精品熟女久久久久浪| 国产一区有黄有色的免费视频 | h日本视频在线播放| 亚洲综合色惰| 成人av在线播放网站| 欧美变态另类bdsm刘玥| 男的添女的下面高潮视频| 日本免费一区二区三区高清不卡| 国产久久久一区二区三区| 亚洲人成网站在线播| 十八禁国产超污无遮挡网站| 亚洲激情五月婷婷啪啪| 欧美激情在线99| 成年av动漫网址| 人人妻人人澡人人爽人人夜夜 | 久久精品夜色国产| 亚洲欧美成人精品一区二区| 欧美日韩精品成人综合77777| 亚洲aⅴ乱码一区二区在线播放| 精品99又大又爽又粗少妇毛片| 国产精品一区二区三区四区免费观看| 伦理电影大哥的女人| 亚洲欧美中文字幕日韩二区| 非洲黑人性xxxx精品又粗又长| 乱系列少妇在线播放| 一卡2卡三卡四卡精品乱码亚洲| 中文在线观看免费www的网站| 亚洲经典国产精华液单| 波多野结衣高清无吗| 亚州av有码| 综合色丁香网| 麻豆成人午夜福利视频| 精品国内亚洲2022精品成人| 日本免费在线观看一区| 国产极品精品免费视频能看的| 一区二区三区高清视频在线| av又黄又爽大尺度在线免费看 | 国产成人精品婷婷| 婷婷色综合大香蕉| 91久久精品电影网| 亚洲国产精品sss在线观看| 久久婷婷人人爽人人干人人爱| 一边亲一边摸免费视频| 欧美zozozo另类| 99久久精品国产国产毛片| 亚洲一区高清亚洲精品| 亚洲久久久久久中文字幕| 成人一区二区视频在线观看| 中文资源天堂在线| 边亲边吃奶的免费视频| 久久婷婷人人爽人人干人人爱| 女人十人毛片免费观看3o分钟| 麻豆av噜噜一区二区三区| 美女被艹到高潮喷水动态| 亚洲精品乱码久久久久久按摩| 国产亚洲最大av| 91精品国产九色| 亚洲经典国产精华液单| 国产亚洲午夜精品一区二区久久 | 好男人在线观看高清免费视频| 精品久久久久久久人妻蜜臀av| av在线观看视频网站免费| 校园人妻丝袜中文字幕| 久久精品国产亚洲av天美| 欧美日韩一区二区视频在线观看视频在线 | 亚洲丝袜综合中文字幕| 男女下面进入的视频免费午夜| 国模一区二区三区四区视频| 日韩欧美在线乱码| 我的女老师完整版在线观看| 国产亚洲一区二区精品| 欧美区成人在线视频| 亚洲熟妇中文字幕五十中出| 中文字幕亚洲精品专区| 国产精品综合久久久久久久免费| 国产精品精品国产色婷婷| 亚洲欧美精品综合久久99| 欧美最新免费一区二区三区| 国产精品人妻久久久影院| 热99re8久久精品国产| 日韩,欧美,国产一区二区三区 | 赤兔流量卡办理| 中文欧美无线码| 91精品伊人久久大香线蕉| 男女那种视频在线观看| 婷婷色综合大香蕉| 国产黄色视频一区二区在线观看 | 亚洲va在线va天堂va国产| 啦啦啦观看免费观看视频高清| 蜜臀久久99精品久久宅男| 狠狠狠狠99中文字幕| 国产在线一区二区三区精 | 午夜老司机福利剧场| 亚洲丝袜综合中文字幕| 菩萨蛮人人尽说江南好唐韦庄 | 国产老妇女一区| 亚洲熟妇中文字幕五十中出| 免费黄网站久久成人精品| 精品熟女少妇av免费看| 最近中文字幕高清免费大全6| 午夜久久久久精精品| 国产高潮美女av| 日本爱情动作片www.在线观看| 观看免费一级毛片| 日本免费一区二区三区高清不卡| 国产亚洲午夜精品一区二区久久 | 大话2 男鬼变身卡| 国产午夜精品久久久久久一区二区三区| 国产精品一区二区三区四区久久| 午夜福利在线观看吧| 久久草成人影院| 久久鲁丝午夜福利片| 五月伊人婷婷丁香| 久久精品久久精品一区二区三区| 亚洲人与动物交配视频| 国产色婷婷99| 三级国产精品欧美在线观看| 亚洲综合色惰| 亚洲欧美日韩高清专用| 国产免费又黄又爽又色| 熟女电影av网| 村上凉子中文字幕在线| 亚洲婷婷狠狠爱综合网| 尾随美女入室| 又粗又硬又长又爽又黄的视频| 久久99热6这里只有精品| 最近中文字幕2019免费版| 91久久精品国产一区二区三区| 特大巨黑吊av在线直播| 1000部很黄的大片| 丰满少妇做爰视频| 国产精品乱码一区二三区的特点| 男女边吃奶边做爰视频| 真实男女啪啪啪动态图| av福利片在线观看| 精品少妇黑人巨大在线播放 | 日本免费在线观看一区| 亚洲欧美日韩无卡精品| 色哟哟·www| 晚上一个人看的免费电影| av在线蜜桃| 一个人免费在线观看电影| 国产 一区 欧美 日韩| 亚洲精品久久久久久婷婷小说 | 不卡视频在线观看欧美| 日韩强制内射视频| 一级爰片在线观看| 国产精品av视频在线免费观看| 国产精品久久久久久精品电影小说 | 我的老师免费观看完整版| 精品国产三级普通话版| a级毛片免费高清观看在线播放| 国产片特级美女逼逼视频| 久久精品国产亚洲av天美| 午夜福利高清视频| 久久久久九九精品影院| 欧美激情久久久久久爽电影| 国产视频首页在线观看| 欧美一级a爱片免费观看看| 看非洲黑人一级黄片| 国产精品美女特级片免费视频播放器| 插逼视频在线观看| 亚洲av熟女| 国产在线男女| av免费在线看不卡| 亚洲国产精品久久男人天堂| 日韩av在线免费看完整版不卡| 能在线免费看毛片的网站| 国产伦在线观看视频一区| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 亚洲丝袜综合中文字幕| 啦啦啦啦在线视频资源| 波多野结衣巨乳人妻| 欧美一区二区精品小视频在线| 亚洲av成人av| 一本一本综合久久| 大又大粗又爽又黄少妇毛片口| 永久免费av网站大全| 亚洲自偷自拍三级| 欧美色视频一区免费| 国产精品电影一区二区三区| 天天躁夜夜躁狠狠久久av| 18禁在线播放成人免费| 内地一区二区视频在线| 欧美日韩综合久久久久久| 久久综合国产亚洲精品| 亚洲精华国产精华液的使用体验| 久久人人爽人人爽人人片va| 亚洲国产精品国产精品| 少妇丰满av| 国产乱来视频区| 日本-黄色视频高清免费观看| av视频在线观看入口| 国产午夜精品一二区理论片| АⅤ资源中文在线天堂| 成年av动漫网址| 只有这里有精品99| 秋霞在线观看毛片| 日韩av在线免费看完整版不卡| 插阴视频在线观看视频| 亚洲av二区三区四区| 免费观看人在逋| 国产精品野战在线观看| 少妇的逼好多水| 亚洲天堂国产精品一区在线| 精品久久久久久电影网 | av在线观看视频网站免费| 好男人在线观看高清免费视频| 国产精品1区2区在线观看.| 一级毛片久久久久久久久女| 18+在线观看网站| 亚洲av成人av| 精品久久久噜噜| 久久99热这里只有精品18| 麻豆av噜噜一区二区三区| 国产爱豆传媒在线观看| 日本欧美国产在线视频| 永久网站在线| 日本欧美国产在线视频| 国产午夜福利久久久久久| 亚洲婷婷狠狠爱综合网| 人人妻人人澡人人爽人人夜夜 | 男插女下体视频免费在线播放| 亚洲最大成人中文| 观看美女的网站| 可以在线观看毛片的网站| 免费电影在线观看免费观看| 乱码一卡2卡4卡精品| 在线观看一区二区三区| 极品教师在线视频| www日本黄色视频网| a级毛色黄片| 在线观看av片永久免费下载| av女优亚洲男人天堂| 亚洲中文字幕日韩| 天天躁日日操中文字幕| 色综合色国产| 一二三四中文在线观看免费高清| 欧美不卡视频在线免费观看| 国产免费视频播放在线视频 | 啦啦啦啦在线视频资源| 亚洲欧美精品专区久久| 三级国产精品片| 男女啪啪激烈高潮av片| 熟女人妻精品中文字幕| 男女啪啪激烈高潮av片| 最近的中文字幕免费完整| 国产极品精品免费视频能看的| 欧美xxxx黑人xx丫x性爽| 欧美不卡视频在线免费观看| 一个人观看的视频www高清免费观看| 久久精品国产亚洲av涩爱| 国产精品精品国产色婷婷| 欧美97在线视频| 五月伊人婷婷丁香| 男人的好看免费观看在线视频| 亚洲丝袜综合中文字幕| 亚洲av福利一区| 日本一本二区三区精品| 久久久久久久久久黄片| 国产免费又黄又爽又色| 一边亲一边摸免费视频| 国产激情偷乱视频一区二区| 九九热线精品视视频播放| 黄色欧美视频在线观看| 有码 亚洲区| 中文字幕久久专区| 国产一区二区在线av高清观看| 国产日韩欧美在线精品| 高清av免费在线| 天堂网av新在线| 国产精品,欧美在线| 亚洲欧美精品综合久久99| 亚洲国产精品sss在线观看| 韩国高清视频一区二区三区| 日本与韩国留学比较| 三级毛片av免费| 欧美精品一区二区大全| 午夜激情欧美在线| 只有这里有精品99| 亚洲精品456在线播放app| 亚洲成人精品中文字幕电影| 婷婷色av中文字幕| 男人舔女人下体高潮全视频| 亚洲精品一区蜜桃| 免费电影在线观看免费观看| 国产免费又黄又爽又色| 久久久久久国产a免费观看| 国产伦精品一区二区三区四那| 亚洲熟妇中文字幕五十中出| 99久久精品一区二区三区| 国产成人精品婷婷| 国产在线男女| 国产精品女同一区二区软件| 看免费成人av毛片| 亚洲婷婷狠狠爱综合网| 国产精品久久久久久久电影| 亚洲四区av| 亚洲av日韩在线播放| 99在线视频只有这里精品首页| 国产免费一级a男人的天堂| 国产亚洲精品久久久com| 永久网站在线| 水蜜桃什么品种好| 免费看a级黄色片| 国产69精品久久久久777片| 亚洲自拍偷在线| 国产精品伦人一区二区| 看非洲黑人一级黄片| 国产精品久久电影中文字幕| www.色视频.com| 国产在线一区二区三区精 | 美女高潮的动态| 国产精品福利在线免费观看| 女的被弄到高潮叫床怎么办| 久久婷婷人人爽人人干人人爱| 在线播放国产精品三级| 亚洲精品色激情综合| 日韩视频在线欧美| 亚洲精品国产成人久久av| 中文资源天堂在线| 亚洲欧美日韩卡通动漫| 国产老妇女一区| 99久久精品国产国产毛片| 亚洲av日韩在线播放| 能在线免费观看的黄片| 免费看a级黄色片| 亚洲精品456在线播放app| 婷婷色综合大香蕉| av黄色大香蕉| 少妇的逼好多水| 国产午夜精品一二区理论片| 午夜亚洲福利在线播放| 人人妻人人澡人人爽人人夜夜 | 秋霞在线观看毛片| av免费观看日本| 99久久九九国产精品国产免费| 国产高清有码在线观看视频| 久久久久久久久久久免费av| 男人的好看免费观看在线视频| 日本黄大片高清| 国产精品美女特级片免费视频播放器| 国产精品福利在线免费观看| 亚洲久久久久久中文字幕| 亚洲综合色惰| 国产淫语在线视频| 18禁在线播放成人免费| 白带黄色成豆腐渣| 毛片女人毛片| 神马国产精品三级电影在线观看| 国产亚洲一区二区精品| 男女下面进入的视频免费午夜| 国产av一区在线观看免费| 亚州av有码| 国产欧美日韩精品一区二区| 偷拍熟女少妇极品色| 看免费成人av毛片| 午夜免费激情av| 身体一侧抽搐| 建设人人有责人人尽责人人享有的 | 亚洲精品国产成人久久av| 麻豆成人av视频| 亚洲aⅴ乱码一区二区在线播放| 成人亚洲欧美一区二区av| 亚洲av免费高清在线观看| 一区二区三区高清视频在线| 欧美丝袜亚洲另类| 在线观看一区二区三区| 99热这里只有是精品50| 色综合站精品国产| 日韩国内少妇激情av| 18禁在线无遮挡免费观看视频| 亚洲真实伦在线观看| 啦啦啦啦在线视频资源| 菩萨蛮人人尽说江南好唐韦庄 | 婷婷六月久久综合丁香| 亚洲av成人精品一区久久| 最近最新中文字幕免费大全7| 精品久久久久久成人av| kizo精华| 一区二区三区高清视频在线| 亚洲综合精品二区| 看免费成人av毛片| 久久久久久国产a免费观看| av黄色大香蕉| 中文欧美无线码| 男人和女人高潮做爰伦理| 国产精品一区二区三区四区免费观看| 丝袜美腿在线中文| 亚洲中文字幕日韩| 一级黄片播放器| 国产 一区精品| 国产久久久一区二区三区| 26uuu在线亚洲综合色| 久久草成人影院| 亚洲成人精品中文字幕电影| 亚洲欧美精品综合久久99| av免费在线看不卡| 国产成人午夜福利电影在线观看| 一区二区三区四区激情视频| 国产一级毛片七仙女欲春2| 在线免费观看不下载黄p国产| 97人妻精品一区二区三区麻豆| 国产久久久一区二区三区| 久久人人爽人人爽人人片va| 国产免费男女视频| 免费观看的影片在线观看| 男人舔奶头视频| 国产91av在线免费观看| АⅤ资源中文在线天堂| 两性午夜刺激爽爽歪歪视频在线观看| 丰满少妇做爰视频| 国产三级中文精品| 国产久久久一区二区三区| 九色成人免费人妻av| 欧美日韩国产亚洲二区| 亚洲va在线va天堂va国产| 男女啪啪激烈高潮av片| 精品久久久久久成人av| 长腿黑丝高跟| 日韩,欧美,国产一区二区三区 | 夫妻性生交免费视频一级片| 国产黄色视频一区二区在线观看 | 久久久精品大字幕| 青春草亚洲视频在线观看| 精品酒店卫生间| 好男人在线观看高清免费视频| 久久精品91蜜桃| 中文字幕久久专区| 高清日韩中文字幕在线| 国产精品永久免费网站| av免费观看日本| 亚洲一区高清亚洲精品| 日韩一本色道免费dvd| 日本一二三区视频观看| 免费观看在线日韩| 桃色一区二区三区在线观看| 亚洲av男天堂| 亚洲国产日韩欧美精品在线观看| 国产精品久久视频播放| 神马国产精品三级电影在线观看| 国产在线一区二区三区精 | 成年av动漫网址| 亚洲内射少妇av| 人妻制服诱惑在线中文字幕| 久久久国产成人免费| 欧美日韩在线观看h| 丝袜喷水一区| 免费观看人在逋| av.在线天堂| 欧美丝袜亚洲另类| 99久久中文字幕三级久久日本| 国产精品人妻久久久久久| 国产精品久久视频播放| 神马国产精品三级电影在线观看| 99久久成人亚洲精品观看| 国产亚洲最大av| 国产精品1区2区在线观看.| 51国产日韩欧美| 日产精品乱码卡一卡2卡三| 美女高潮的动态| 村上凉子中文字幕在线| 人妻系列 视频| 久久精品人妻少妇| 非洲黑人性xxxx精品又粗又长| 22中文网久久字幕| 麻豆成人午夜福利视频| 成人毛片a级毛片在线播放| 一级av片app| 免费不卡的大黄色大毛片视频在线观看 | 麻豆成人av视频| 毛片女人毛片| 日本午夜av视频| 联通29元200g的流量卡| 亚洲av一区综合| 永久网站在线| 成人鲁丝片一二三区免费| 男人舔女人下体高潮全视频| 在线播放国产精品三级| 亚洲精品乱久久久久久| 国产免费男女视频| 亚洲国产色片| 热99在线观看视频| 小蜜桃在线观看免费完整版高清| 亚洲五月天丁香| 国产三级中文精品| 日韩欧美国产在线观看| 青春草亚洲视频在线观看| 欧美日韩一区二区视频在线观看视频在线 | 男女下面进入的视频免费午夜| 免费一级毛片在线播放高清视频| 好男人视频免费观看在线| 亚洲精品亚洲一区二区| 中文在线观看免费www的网站| 超碰av人人做人人爽久久| 大话2 男鬼变身卡| 国产91av在线免费观看| 噜噜噜噜噜久久久久久91| 最近中文字幕2019免费版| 干丝袜人妻中文字幕| 国产一区亚洲一区在线观看| 黄色一级大片看看| 亚洲成人久久爱视频| 亚洲综合色惰| 亚洲在久久综合| 1024手机看黄色片| 在线观看一区二区三区| 免费av观看视频| 一本久久精品| 日韩中字成人| 人人妻人人看人人澡| 美女cb高潮喷水在线观看| 亚洲欧美日韩无卡精品| av专区在线播放| 亚洲国产最新在线播放| 少妇人妻一区二区三区视频| 啦啦啦观看免费观看视频高清| 毛片一级片免费看久久久久| 汤姆久久久久久久影院中文字幕 | 欧美日韩国产亚洲二区| 久久久国产成人免费| 久久99热这里只有精品18| 欧美日韩国产亚洲二区| av女优亚洲男人天堂| 色综合亚洲欧美另类图片| 亚洲无线观看免费| 1024手机看黄色片| 日韩制服骚丝袜av| 国产免费男女视频| 国产黄色视频一区二区在线观看 | 久久亚洲国产成人精品v| 久久久色成人| 日本wwww免费看| 搞女人的毛片| 最近的中文字幕免费完整| 日韩大片免费观看网站 | 成人漫画全彩无遮挡| 永久免费av网站大全| 国产乱人偷精品视频| 超碰av人人做人人爽久久| 国内少妇人妻偷人精品xxx网站| 国产大屁股一区二区在线视频|