• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Robust Video Watermarking Scheme with Squirrel Search Algorithm

    2022-08-24 03:28:48AmanBhaskarChiragSharmaKhalidMohiuddinAmanSinghOsmanNasrandMamdoohAlwetaishi
    Computers Materials&Continua 2022年5期

    Aman Bhaskar,Chirag Sharma,Khalid Mohiuddin,Aman Singh,*,Osman A.Nasr and Mamdooh Alwetaishi

    1Computer Science and Engineering,Lovely Professional University,Punjab,144411,India

    2Department of Management Information Systems,King Khalid University,Guraiger,Abha,62529,Saudi Arabia

    3Department of Civil Engineering,College of Engineering,Taif University,Taif,21944,Saudi Arabia

    Abstract: Advancement in multimedia technology has resulted in protection against distortion, modification, and piracy.For implementing such protection,we have an existing technique called watermarking but obtaining desired distortion level with sufficient robustness is a challenging task for watermarking in multimedia applications.In the paper,we proposed a smart technique for video watermarking associating meta-heuristic algorithms along with an embedding method to gain an optimized efficiency.The main aim of the optimization algorithm is to obtain solutions with maximum robustness,and which should not exceed the set threshold of quality.To represent the accuracy of the proposed scheme,we employ a popular video watermarking technique(DCT domain)having frame selection and embedding method for watermarking.A squirrel search algorithm is chosen as a meta-heuristic algorithm that utilizes the stated fitness function.The results indicate that quality constraint is fulfilled, and the proposed technique gives improved robustness against different attacks with several quality thresholds.The proposed technique could be practically implemented in several multimedia applications such as the films industry,medical imagery,OOT platforms,etc.

    Keywords: Meta-heuristic algorithm;constrain optimization problem;fitness fiction;frame selection;squirrel search algorithm

    1 Introduction

    As the growth of internet prevailing multimedia usage is easy to be shared and accessed,editing tools and software are so readily available that their utilization is inevitable up to such an extent that no professional knowledge is required to manipulate digital multimedia.To protect the digital data in a shared medium from illegal manipulation,there is a need for a unique and popular technique known as digital watermarking.Digital watermarking is a process to embed an imperceptible watermark into a host/cover digital content in such a way that the spread of watermark bits is scattered in the host evenly.Also, it must be infeasible to alter the watermark bits and could be extracted through some computation.The main applications of digital watermarking are copyright protection, ownership identification[1].Some of the other applications include broadcast monitoring,modification detection, authentication, and source tracking, etc reflected in Fig.1a.This paper discusses video watermarking, which proposes authentication to the video by embedding watermark data into the cover video.There are many challenges in video watermarking.One of the major challenges is a design scheme that provides robustness to the watermarking and loss of quality is a challenge that is reflected in Fig.1b.Whereas robustness is the tendency of the watermark to not getting destroyed during an attack makes it fault-tolerant.The significance of one is often highlighted over the other,as per the need for required quality in the application[2].There is a tradeoff between imperceptibility(quality) and robustness (fault-tolerance) i.e., if one is required the second must be compromised.Imperceptibility significantly affects the visual quality of the video.

    Figure 1:(a)Watermarking techniques(b)Relationship among watermark capacity,imperceptibility,and robustness

    Meanwhile, the minimal modification would result in reduced robustness of the algorithm [3].To have the balance between the three concepts,we employ a meta-heuristic optimization algorithm(SSA(Squirrel Search Algorithm)).These computed objective functions are then utilized to rank the solutions and find the optimal results.This will generate robust watermarking schemes with distortions below the sensitivity threshold[4].

    Knowledge embedding in multimedia data is a field that has lately gotten a lot of attention [5].The Major contribution of the paper is integrated into the following points.

    (a) We have proposed the frame selection technique to chose optimal frames.

    (b) We have proposed a novel technique for embedding a watermark that is based on DCT domain block-based conversion along with an optimization algorithm.

    (c) We have proposed the calculation of efficiency and performance of the presented scheme against several image processing attacks.

    Kavitha Soppari et al.have done more research studies in implementing robust watermarking through clustering techniques as most of the transform-domain watermarking approaches were build on Discrete Cosine Transform (DCT).This is because it is robust to JPEG lossy compression.Therefore,the author proposes an efficient digital watermarking mechanism based on an optimized clustering method.Mohammad Moosazadeh et al.proposed an embedding method that depends upon the relationships in between DCT coefficients.The watermarking parameters are optimally selected using a rarely used optimization algorithm of watermark embedding known as Teaching-learning-Based Optimization (TLBO).Vipul and Roohie stated the considerable time complexity of metaheuristic search algorithms is not applicable for time-sensitive applications.For this, they utilize the DCT domain for embedding watermark followed by nature-based optimization algorithm ant colony optimization to search optimal parameters.Assem Mahmoud Abdelhakim et al.provided a smart scheme for watermarking by incorporating a meta-heuristic search technique known as Artificial Bee Colony along with an embedding function to achieve an optimized functionality.The quality of watermarking is insured by constraint optimization.

    Squirrel Search Algorithm

    There is no single nature-based optimization strategy that can solve all optimization problems in the best possible way.This means that an optimization algorithm is good at solving a certain set of problems but not so well at solving others.As a result,a new unconstrained numerical optimization algorithm called Squirrel Search is proposed.The foraging of flying squirrels can be divided into two scenarios[6].

    (i)Assumptions in SSA

    In a deciduous forest,there are n flying squirrels,and each squirrel is thought to be on one tree.Each flying squirrel uses a complex foraging behavior to hunt for food and make the best use of the available resources.There are only three types of trees in the forest:I Regular tree(ii)Oaktree(acorns)(abundant food source)hickory tree(iii)(alternate food source).

    (ii)Implementation of SSA

    The game begins with a random location of a flying squirrel(FS).In a d-dimensional search space,the location of FS is represented by a vector.The random initialization of‘n’number of FS in the forest and each vector specifies the direction of the ith FS.A matrix FS can be used to represent the location of all FS and shown by below equation

    The jthdimension of ithsquirrel is defined by FSi,jequation

    This provides a uniform allocation for allocating the initial position of each FS in the Forest.

    FSL:Lower Bound of FSi

    FSU:Upper Bound of FSi

    U(0,1):random no.between[0,1]

    (iii)Fitness Evaluation

    In the user’s fitness function, the value of the decision variable (solution vector) and its related value is stored in‘f’.Some of the constants considered are dg:random gliding distance,R1:random no.[0,1], t:current iteration tree Gc:Constant to achieve balance b/w exploration and exploitation,dg:(hg/tan(Q)) hg:loss in height after gliding, Q:arctan(D/L), D:drag force produced, L:Sum of lift at equilibrium, L=1/(2TCL V2S), T:1.204 kgm3(air density), CL = Lift Coefficient in the range of [0.675, 1.5], V=5.25 m/sec (speed of flying squirrel (avg)), S=154 cm2(Surface area),D=1/(2TCDV2S),CD:Drag Coefficient(0.60)[6]as mentioned in Eq.(3).

    Case 1:FS on Acorn tree(FSat)moving towards hickory tree(FSht).Location is updated as given in the following given Eq.(4).

    where R1 is a random number between[0,1]

    Case 2:FS on a normal tree(FSnt)moving towards acorn tree(FSat)location is updated as given in following given Eq.(5).

    where R2 is a random number between[0,1]

    Case 3:FS on a normal tree(FSnt)and already passed acorn tree and now moving towards hickory tree(FSht),Location is updated asgiven in following given Eq.(6).

    where R3 is a random number between[0,1]

    (iv)Seasonal Monitoring Condition

    Since foraging in the winter was more expensive and dangerous,F(xiàn)S became less successful than in the autumn.Incorporating such behavior results in a more practical strategy that avoids being stuck in a locally optimal solution.Per iteration,calculate the seasonal constant(Sc)Eq.(7)[6].

    where t=1,2,3 iterations

    Check Sct<Smin where Smin is the minimum value of Seasonal Constant Computed as Eq.(8)[6].

    t<current iteration tm<max iteration

    If the condition is true, then randomly reallocating FS did not explore the forest by following Eq.(9)[6].

    where Levy is random walk-through Levy distribution.

    The discrete cosine transform is then applied to the blocks of a grayscale image used as the carrier image,and the DCT coefficients are quantized using the quantization table represented in the JPEG norms,which is used where an image requires a very high compression rate[7].

    2 Proposed Fitness Function

    Optimization problem to search for the optimum embedding strength parameter (k and p) for embedding watermark problem formulated in Eq.(10).

    It assigns a score to each solution based on how effective it is at solving the problem.Sorting,declaring,and selecting at random:The following three minimum sorted fitness values are known to have (normal food source), and they are progressing towards (optimal food source).The rest of the tree is regular.The rest FS fitness value is used to make a random pick,which means aiming towards the best food source.The proposed fitness function Algorithm 1 in pseudo-code is followed by a flow diagram given in Fig.2.

    Algorithm 1:Pseudocode for proposed fitness function Input:Embedding-parameters(α,β),Attacks:Gaussian Noise,Sharpening,Median filtering attack,Rotation attack Output:Ranked Solution Population(NS)Step 1Initialize Qth:=avg(PSNR)and Rt:=avg(INC);Step 2For all solutions in NS do:if β <Qth then Add solution to the quality group(Q)else Add solution to the robustness group(R)Step 3end for(Continued)

    Step 4Sort Q group and R group in descending order based on min value of(Qth-PSNR)and(Rt-INC)respectively.Step 5Merge Q group to R group and call resulted population as recombined population(RP).Step 6Initialize Rank list with length of RP-current index(i)of solution in RP.Step 7For all solution s in RP do:if s_ith ∈R and s_jth ∈Q then Rank(s_ith)>Rank(s_jth)end if else if s_ith ∈R and s_jth ∈R then if s_ith(INC)>s_jth(INC)then Rank(s_ith)>Rank(s_jth)else Rank(s_jth)>Rank(s_ith)end if end else else if s_ith(PSNR)>s_jth(PSNR)then Rank(s_ith)>Rank(s_jth)else Rank(s_jth)>Rank(s_ith)end if Step 8end else Step 9end for Step 10Return RP

    The robustness of the proposed method against various kinds of attacks such as median filtering,Gaussian noise [8], Sharpening, Rotation attack.According to the watermark experiment findings,the suggested scheme performs satisfactorily in terms of image distortion and embedded watermark retrieval, even after the original image has been damaged by several assaults [9].This approach can effectively avoid rotating attacks,and only half of the points need to be scanned[10].Spatial scanning,duplication,cropping,scaling,translation,compression,and rotating are examples of attacks that may be carried out deliberately or accidentally [11].We checked the watermarking algorithm’s resiliency against a series of four different attacks for various videos and enhanced the decoding BER(bit error rate)[12].When constructing an appropriate architecture,we have a list of typical attacks or threats to remember.PSNR(peak signal-to-noise ratio),MSE(mean squared error),and NCC(normalized cross-correlation)are a few of the output metrics described briefly[13].

    3 Watermark Embedding

    Divide the host image I, of the size P × Q, into 8 × 8 blocks.Transform each image block I p,q and its adjacent block I p+1,q into DCT coefficients as given in Eq.(11),and also we have given Algorithm 2 to represent in the form of pseudo-code.

    Figure 2:Fitness function algorithm flow diagram[14]

    Adjust the value of two coefficients according to the watermark bit Wp,q,which is the bit location at the pthrow&qthcolumn of the watermark image.As shown in Eq.(12)below.

    This scaling parameter is calculated by associating the imperceptibility quality of each watermark with the imperceptibility quality of the host image to mitigate the tradeoff between robustness and imperceptibility[15].α←Ensure absolute difference between modified coefficients large enough to provide the required robustness.β←Ensures how much proportion of the valueαcan be used in a coefficient adjustment.As shown in Eq.(13)below.

    Algorithm 2:Pseudocode of Embedding Watermark Input:Host video frame(I)and watermark image(I_w).Output:Embedded watermark frame, PSNR, and INC values on different Robustness and quality parameters.Input:Host video frame(I)and watermark image(I_w).Output:Embedded watermark frame, PSNR, and INC values on different Robustness and quality parameters.Step 1Divide host watermark image I of size P×Q,into 8×8 blocks.Step 2Transform each image block I_p,q,and its adjacent block I_p+1,q into DCT coefficients,where p,q are rows and columns indices of a frame-block.Step 3Initialize α:=127 to 255,β:=0.9 to 0.1 and MSE,INC embedding-parameters equal to zero.Also iterations counters p,q,a,b equal to 1.New frame I_e equals to zero matrix.Step 4while p <P and q <Q(till the end of frame)if I_w(p,q):=1 then if I(p,q)–I(p+1,q)greater than α then I_e(p,q):=I(p,q)+(α×β)I_e(p+1,q):=I(p+1,q)–(α×(1-β))MSE:=MSE+CALL mean_square_error(I(p,q),I_e(p,q))INC:=INC+CALL normalized_correlation(I(p,q),I_e(p,q))End if Else I_e(p,q):=I(p,q)-(α×β)I_e(p+1,q):=I(p+1,q)+(α×(1-β))MSE:=MSE+CALL mean_square_error(I(p,q),I_e(p,q))INC:=INC+CALL normalized_correlation(I(p,q),I_e(p,q))End else End Else I_e(p,q):=I(p,q)I_e(p+1,q):=I(p+1,q)End else End if Step 5End while Step 6Apply inverse DCT to obtain the watermarked image block on I_e Step 7CALL peak_signal_to_noise_ratio(MSE)to calculate PSNR value.(Continued)

    Step 8Store α,β with respected PSNR and INC value to form a population.Step 9End

    4 Intelligence Evolutionary Algorithm

    With the rapid development of modern technology, the complex evolutionary problems are too difficult to be answered by conventional optimization algorithms.This challenge can be dealt with by incorporating an evolutionary intelligence algorithm.The implementation is done by embedding a watermark in the DCT domain,accompanied by a nature-based optimization watermark[16].This is due to the resistance to lossy JPEG compression[17].Attacks like frame lowering,averaging,cropping,and median filtering,as well as unintended attacks like noise and compression,can breach copyright information in a video[18].The evolutionary intelligence algorithms can be divided into 3 categories as given below.

    4.1 Evolutionary Heuristic Algorithms

    The Evolutionary heuristic algorithms are inspired by biological evolution like reproduction,mutation,recombination,and selection.It plays a vital role in estimating accurate solutions or optimal solutions from a population of solutions.Moreover, it solves difficult problems by using a fitness function which is using the evolutionary algorithm as a tool for problem-solving also known as Evolutionary Computation(EC).Genetic Programming(GP):It is an extension of GA used for testing and selecting the best choices among the set of results[19].And by integrating the MPEG specifications with the classic block-adaptive-video watermarking systems,can get better results[20].

    4.2 Physics Heuristic Algorithms

    These are originated by physical phenomena, which are then conceptually applied to obtain optimal solutions.After melting the energy is exceedingly high and the temperature slowly drops to a stable solid-state having minimum energy(optimal solution).Similarly,Gravitational,The magnetic optimization.

    4.3 Nature Heuristic Algorithms

    These are inspired by biological practices and phenomena in nature.There are several algorithms in this class such as Ant Colony Optimization that are based on naturally excrete pheromones in their path which act as an indicator better path.Another such algorithm is the particle swarm optimization algorithm,which is based on bird’s practices in seeking food.Similarly,Artificial Bee Colony is based on the adaptation of the foraging practices of the honeybee.The bee’s population is formed through 3 types of bees based on their work.Mainly Employee bee,onlooker bee and scout bee.

    5 Frame Selection

    We looked at a variety of image matching methods before settling on the histogram process.Histogram-based methods are ideal for determining the total changes in an image.An image’s color histogram can be calculated by dividing a color space, such as RGB.The distinction between two pictures dependent on color histograms H1 and H2 can be calculated as in Eq.(14).Fig.3 depicts the frame selection flow diagram to more clearly explain the algorithm.Algorithm 3 is also stated for the reader’s reference.

    Algorithm 3:Pseudo code for Frame Selection Algorithm Input:Avideo having N number of frames.Initial value of integrator i and j equal to zero and v_diff vector equal to zero.Output:Select frame(s) concerning a threshold, calculated through Scene Change detection using histogram.Step 1 Start Step 2 Initialize variable Curframe_i:=First Frame(Video)and Curframe_j:=Second Frame(Video).Step 3 While Curframe_i not equal to the last frame do:Calculate P:=Histogram(gray_(Curframe_i))-Histogram(gray_(Curframe_j))Calculate Q:=Maximum(Histogram(gray_(Curframe_i)),Histogram(gray_(Curframe_j)))Calculate Vector S(i):=Avg(Sum(P/Q))Step 4 End While Step 5 For i:=1 to(N-1)do:Calculate vector diff_v(i):=Abs(S(i+1)–S(i))Step 6 End for Step 7 Initialize SC:=0(Gives No.of Scene Change),K:=1 And vector SCV:=0(Scene Change frame Value)Step 8 For I:=1 to(N-1)do:Vth:=K*(sum(diff_v)/(N-1)+((max(diff_v)+min(diff_v))/2)If diff_v(i)>Vth:Increment SC:=SC+1 Set Value K:=SC SCV(SC):=i End if Step 9 End for Step 10 Return SC and SCV.Step 11 End.

    6 Quality Measures

    It significantly affects the visual quality of the video.So, to ensure the quality of the video watermarking, we need to calculate a measure that can indicate the level of imperceptibility.It is calculated through a mathematical ratio known as Peak Signal to Noise ratio (PSNR) as per Eqs.(15)–(16).The term robustness refers to the embedded watermark’s ability to withstand image manipulation and geometric attacks.

    fk→original video frame fkw→Watermarked video frame

    Figure 3:Frame selection algorithm flow

    7 Robustness Measures

    Robustness is vital for granting capability to withstand different image processing and geometric attacks and the quality of digital content must not be degraded.Related attacks include smoothing,sharpening, compression, de-noising, filtering, scaling, cropping, and rotation.The robustness of watermarking algorithms is usually measured using normalized correlation (NC) and bit error rate(BER).NC is used to calculate the degree of resemblance between the derived and initial watermarks.It can be calculated through a mathematical measure known as Normalize Correlation that ranges between 0 to 1[21].A higher value of NC stronger the anti-attack ability,as given in Eq.(17).

    8 Experimental Results

    The results were evaluated in MATLAB 2014a using an i5 processor.The frame selection time and embedding time is dependent on the processing power of the processor and the size of the RAM.The observed results are based on the watermark embedding time,frame selection time,and optimization algorithm time.For testing the algorithm,a total of 5 CIF(Common Interchange Format)videos are utilized, and the frame selection technique used is based on scene change in the video.Fig.4 shows the test videos list with the chosen frames from each video.The higher value the PSNR value indicates the proposed technique will have a minimum loss in quality of output.Similarly,for greater the value of NC, more resistance against attacks.The testing is started with converting videos in mp4 format followed by frame extraction.The frames extracted are in the PNG format to withstand quality loss.The selected frames are then embedded through embedding algorithms with hyperparameters values obtained through optimization algorithm.Finally, we bring the efficiency of the proposed work by applying several image processing attacks and then calculating NC values [22].Tabs.1–3 represents number of frames selected,quality metrics values and a comparison analysis of existing frame selection techniques.

    Figure 4:Selected frames from videos:(a)Akiyo#251(252),(b)Bus#126(127),(c)Football#74(218),(d)News#77(252),(e)Container#251(252),(f)Watermark

    Table 1:Comparison of videos in terms of frame selection

    Table 2:Results after embedding of watermark 1 on selected frames

    Table 3:Comparative analysis of the robustness of our scheme with other algorithms

    Experimental Tests for Time Complexity:Tab.4 describes the processing time (in seconds)associated with the frame selection and embedding algorithm applied to the test videos.The duration is entirely based on hardware processing power.Also,it depends upon the number of selected frames and the total number of frames in the video.For football and news number of frames selected is 2 out of 218 and 252 frames respectively.The average frame selection time is nearly the same.Moreover,the total number of frames in the video also lead to an increase in the execution time due to which we can see the football video having 2 frames out of 252 frames have slightly higher embedding time(3.1747) to the Akiyo video having 252 frames and 1 frame selected (3.164).Figs.5,6 signify plots drawn against quality metrics and frame selection time,embedding time Figs.7–10 signify plots drawn against gaussian noise,sharpening attack,rotation,median filtering attacks.

    Table 4:Results of execution time using watermark

    Figure 5:Plot of PSNR, NC, K, BER w.r.t the videos taken in the proposed work for watermark against no attack.(a)Average PSNR,(b)Average NC,(c)Average BER

    Figure 6:Plot of total frame selection time and total embedding time (in seconds) for 5 videos.(a)Total frame selection time(in seconds).(b)Total embedding time(in seconds)

    Figure 7:Plot of PSNR,NC,P,BER w.r.t the videos taken in the proposed work for watermark against Gaussian attack.(a)Average PSNR,(b)Average NC,(c)Average BER

    The fault tolerance of the proposed technique is tested against several attack scenarios like Gaussian Noise in Tab.5,Sharpening in Tab.6,Median filtering attack in Tab.7,and Rotation attack in Tab.8.To account for the lost number of attacks on every watermarked frame to measure the quality of the proposed technique[22].The second attack on the selected frames will stretch the pixel distribution in the image and highlights the fine image details[22].

    Figure 8:Plot of PSNR, NC, K, BER w.r.t the videos taken in the proposed work for watermark against Sharpening attacked.(a)Average PSNR,(b)Average NC,(c)Average BER

    Figure 9:Plot of PSNR,NC,BER w.r.t the videos taken in the proposed work for watermark against Rotation attack.(a)Average PSNR,(b)Average NC,(c)Average BER

    Figure 10:Plot of PSNR,NC,BER w.r.t the videos taken in the proposed work for watermark against median filter attacked.(a)Average PSNR,(b)Average NC,(c)Average BER

    Table 5:Results after embedding of watermark on Gaussian attacked selected frames

    Table 6:Results after embedding of watermark on Sharpening attacked selected frames

    Table 7:Results after embedding of watermark on Rotation attacked on selected frames

    Table 8:Results after embedding of watermark on Median filter attacked on selected frames

    9 Conclusion and Future Work

    We proposed a unique block-based embedding technique to entertain quality loss in watermarking process.For efficient time and space complexity, we utilize frame selection for the application of watermark embedding, which will be a time-consuming and space-expensive method.This frame selection is based on the number of scenes that change in a particular test video.This is followed by block-based application of DCT2 and searching for optimal parameters for embedding based on black and white watermark bits.The approach is tested against several image processing attacks such as Gaussian Noise,Image Sharpening,Rotation attack,Median filter attack,etc.The results indicate good levels of robustness against many attacks.Further security can be added in future work such as watermark encryption and more suitable frame selection for videos having no detectable scene change.

    Acknowledgement:The authors would like to express their gratitude to King Khalid University,Saudi Arabia for providing administrative and technical support.This work was supported by the Deanship of Scientific Research,King Khalid University,under Grant GRP/358/42 and would also like to thank Taif University Researchers Support Project Number(TURSP-2020/196)Taif University,Taif,Saudi Arabia.

    Funding Statement:The authors would like to express their gratitude to King Khalid University,Saudi Arabia for providing administrative and technical support.This work was supported by the Deanship of Scientific Research, King Khalid University, under Grant GRP/358/42 and the study was also funded by Taif University Researchers Support Project Number(TURSP-2020/196)Taif University,Taif,Saudi Arabia.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    久久精品亚洲熟妇少妇任你| 免费在线观看视频国产中文字幕亚洲| 老熟妇仑乱视频hdxx| 变态另类丝袜制服| 午夜亚洲福利在线播放| 18禁裸乳无遮挡免费网站照片 | 免费看十八禁软件| 亚洲精品美女久久av网站| 丁香欧美五月| 亚洲熟女毛片儿| 久久精品亚洲精品国产色婷小说| 精品午夜福利视频在线观看一区| 亚洲精品国产精品久久久不卡| 亚洲欧美激情在线| 多毛熟女@视频| videosex国产| 午夜影院日韩av| 美国免费a级毛片| 国内精品久久久久久久电影| 日日干狠狠操夜夜爽| 久久精品国产清高在天天线| 每晚都被弄得嗷嗷叫到高潮| 搞女人的毛片| 日日夜夜操网爽| 97超级碰碰碰精品色视频在线观看| 可以在线观看的亚洲视频| 嫁个100分男人电影在线观看| 18禁美女被吸乳视频| 欧美黑人精品巨大| 国产成人系列免费观看| 亚洲中文字幕日韩| 欧美日本视频| 亚洲国产精品久久男人天堂| 女人精品久久久久毛片| 后天国语完整版免费观看| 久久久久久久精品吃奶| 国产成人精品无人区| 丰满的人妻完整版| 精品电影一区二区在线| 女人爽到高潮嗷嗷叫在线视频| 黄色丝袜av网址大全| 欧美色欧美亚洲另类二区 | 国产区一区二久久| 欧美色视频一区免费| av超薄肉色丝袜交足视频| 成人亚洲精品一区在线观看| 深夜精品福利| 午夜福利欧美成人| 午夜影院日韩av| 国产av在哪里看| 成人18禁在线播放| 51午夜福利影视在线观看| 日韩免费av在线播放| 国产1区2区3区精品| 在线观看免费日韩欧美大片| 精品国产一区二区三区四区第35| 男男h啪啪无遮挡| 国产av一区在线观看免费| 精品无人区乱码1区二区| 日韩高清综合在线| 免费人成视频x8x8入口观看| 一个人免费在线观看的高清视频| 人人妻人人爽人人添夜夜欢视频| 午夜福利欧美成人| 国产亚洲精品第一综合不卡| 99久久99久久久精品蜜桃| 国产亚洲欧美98| 亚洲国产精品成人综合色| 国产免费av片在线观看野外av| 男人舔女人的私密视频| 午夜两性在线视频| 美国免费a级毛片| 国产aⅴ精品一区二区三区波| 操出白浆在线播放| 视频在线观看一区二区三区| 丝袜美腿诱惑在线| 变态另类丝袜制服| 色综合亚洲欧美另类图片| 国产野战对白在线观看| 免费在线观看影片大全网站| av电影中文网址| 欧美最黄视频在线播放免费| 午夜免费鲁丝| 亚洲天堂国产精品一区在线| 狂野欧美激情性xxxx| 99在线视频只有这里精品首页| 啪啪无遮挡十八禁网站| 精品国产美女av久久久久小说| 天天躁狠狠躁夜夜躁狠狠躁| 亚洲精品中文字幕一二三四区| 日韩 欧美 亚洲 中文字幕| 少妇粗大呻吟视频| 免费在线观看影片大全网站| 亚洲欧美激情在线| 亚洲人成网站在线播放欧美日韩| 国产熟女xx| 精品高清国产在线一区| 啦啦啦观看免费观看视频高清 | 亚洲成人久久性| 亚洲电影在线观看av| 精品不卡国产一区二区三区| 变态另类成人亚洲欧美熟女 | 亚洲九九香蕉| 天天躁狠狠躁夜夜躁狠狠躁| 久久久久国产精品人妻aⅴ院| 两个人看的免费小视频| 午夜精品久久久久久毛片777| 天堂√8在线中文| 波多野结衣高清无吗| 久久香蕉精品热| 欧美 亚洲 国产 日韩一| 亚洲专区字幕在线| netflix在线观看网站| 变态另类成人亚洲欧美熟女 | 宅男免费午夜| 亚洲视频免费观看视频| 他把我摸到了高潮在线观看| 国产91精品成人一区二区三区| 亚洲成人国产一区在线观看| 亚洲成av片中文字幕在线观看| 两个人免费观看高清视频| 午夜影院日韩av| 亚洲精品国产区一区二| 午夜激情av网站| 午夜福利影视在线免费观看| 高潮久久久久久久久久久不卡| 欧美大码av| 国产激情久久老熟女| 国产区一区二久久| 精品无人区乱码1区二区| 国产国语露脸激情在线看| 99在线视频只有这里精品首页| tocl精华| 好男人在线观看高清免费视频 | 久久久国产精品麻豆| 色综合站精品国产| 国产私拍福利视频在线观看| 欧美黑人精品巨大| 亚洲激情在线av| 久热这里只有精品99| 色在线成人网| 欧美在线黄色| 亚洲激情在线av| 变态另类丝袜制服| 极品教师在线免费播放| 天天添夜夜摸| 国产一区二区三区综合在线观看| 亚洲第一青青草原| 男人舔女人下体高潮全视频| 国产免费av片在线观看野外av| 国产蜜桃级精品一区二区三区| 亚洲国产看品久久| 色综合亚洲欧美另类图片| 亚洲第一青青草原| 变态另类丝袜制服| АⅤ资源中文在线天堂| 久久久久久久午夜电影| 免费看美女性在线毛片视频| 亚洲av熟女| 中国美女看黄片| 深夜精品福利| 91麻豆精品激情在线观看国产| 麻豆久久精品国产亚洲av| 热re99久久国产66热| 欧美中文综合在线视频| 亚洲欧美激情综合另类| 国产精品久久视频播放| 90打野战视频偷拍视频| 免费女性裸体啪啪无遮挡网站| 亚洲av第一区精品v没综合| av超薄肉色丝袜交足视频| 亚洲成av人片免费观看| 一进一出抽搐动态| 亚洲成国产人片在线观看| 日韩欧美在线二视频| 黄色a级毛片大全视频| 国产成人免费无遮挡视频| 国产精品野战在线观看| 高潮久久久久久久久久久不卡| 法律面前人人平等表现在哪些方面| 桃色一区二区三区在线观看| 在线av久久热| 国产精品亚洲av一区麻豆| 久久久精品国产亚洲av高清涩受| av超薄肉色丝袜交足视频| 男人的好看免费观看在线视频 | 精品国产国语对白av| 天天一区二区日本电影三级 | 日韩视频一区二区在线观看| 日本 av在线| 欧美黑人精品巨大| 黄色视频不卡| 国产精品爽爽va在线观看网站 | 国产精品1区2区在线观看.| 国产一级毛片七仙女欲春2 | ponron亚洲| 巨乳人妻的诱惑在线观看| 日本 av在线| 丰满的人妻完整版| 男女床上黄色一级片免费看| 亚洲av成人av| 亚洲中文av在线| 亚洲aⅴ乱码一区二区在线播放 | 亚洲av成人一区二区三| 欧美 亚洲 国产 日韩一| 999精品在线视频| 国产在线观看jvid| 国产主播在线观看一区二区| 久久久久久国产a免费观看| 一夜夜www| 国产熟女午夜一区二区三区| 老司机午夜十八禁免费视频| 午夜久久久在线观看| 日日爽夜夜爽网站| 亚洲情色 制服丝袜| 最近最新中文字幕大全电影3 | 一区福利在线观看| 精品一品国产午夜福利视频| 国产三级在线视频| 日本免费一区二区三区高清不卡 | 俄罗斯特黄特色一大片| 高清毛片免费观看视频网站| 女警被强在线播放| 亚洲免费av在线视频| 国产人伦9x9x在线观看| 国产99久久九九免费精品| 不卡av一区二区三区| 精品国产亚洲在线| 国产野战对白在线观看| 国产精品,欧美在线| 露出奶头的视频| 99国产精品一区二区蜜桃av| 丝袜人妻中文字幕| 如日韩欧美国产精品一区二区三区| 精品无人区乱码1区二区| 成人亚洲精品av一区二区| 国产av一区在线观看免费| 国产精品野战在线观看| 欧美 亚洲 国产 日韩一| 亚洲成人免费电影在线观看| 亚洲伊人色综图| 国产高清激情床上av| 久久香蕉国产精品| 人成视频在线观看免费观看| 亚洲一卡2卡3卡4卡5卡精品中文| 亚洲成a人片在线一区二区| 欧美日韩亚洲国产一区二区在线观看| 99精品在免费线老司机午夜| 搡老熟女国产l中国老女人| 久久香蕉精品热| 在线视频色国产色| 男女床上黄色一级片免费看| 久久精品国产亚洲av高清一级| 亚洲人成电影观看| 桃色一区二区三区在线观看| 久久青草综合色| 午夜激情av网站| 欧美日本亚洲视频在线播放| 久久精品影院6| 亚洲av美国av| or卡值多少钱| 这个男人来自地球电影免费观看| 免费在线观看黄色视频的| 精品午夜福利视频在线观看一区| 91老司机精品| 国产伦一二天堂av在线观看| 一进一出抽搐gif免费好疼| 久久狼人影院| 亚洲性夜色夜夜综合| 好男人在线观看高清免费视频 | 国产欧美日韩一区二区精品| 午夜成年电影在线免费观看| 成人永久免费在线观看视频| 一区二区三区高清视频在线| 国产精品香港三级国产av潘金莲| 97人妻精品一区二区三区麻豆 | 香蕉久久夜色| 免费在线观看视频国产中文字幕亚洲| 咕卡用的链子| 亚洲天堂国产精品一区在线| 18禁美女被吸乳视频| 亚洲国产精品成人综合色| 亚洲黑人精品在线| 国产精品亚洲av一区麻豆| 黄色a级毛片大全视频| 一级a爱视频在线免费观看| 久久人人精品亚洲av| 长腿黑丝高跟| 视频在线观看一区二区三区| 可以免费在线观看a视频的电影网站| 日日爽夜夜爽网站| 中文亚洲av片在线观看爽| 国产一区在线观看成人免费| 亚洲精品美女久久久久99蜜臀| 一个人观看的视频www高清免费观看 | 啪啪无遮挡十八禁网站| 99在线视频只有这里精品首页| 国内精品久久久久久久电影| 九色国产91popny在线| 亚洲专区字幕在线| 国产欧美日韩一区二区三区在线| 黄色女人牲交| 久久人妻福利社区极品人妻图片| 如日韩欧美国产精品一区二区三区| 成人三级做爰电影| 9191精品国产免费久久| 亚洲三区欧美一区| 午夜a级毛片| 一边摸一边抽搐一进一小说| 亚洲国产精品久久男人天堂| 老司机在亚洲福利影院| 欧美av亚洲av综合av国产av| 国产一区二区激情短视频| 亚洲精华国产精华精| 国产97色在线日韩免费| 国产1区2区3区精品| 一区二区三区激情视频| 国产蜜桃级精品一区二区三区| 男女之事视频高清在线观看| 最新在线观看一区二区三区| 久久国产亚洲av麻豆专区| 亚洲精品国产区一区二| 免费av毛片视频| 这个男人来自地球电影免费观看| 亚洲欧美精品综合久久99| 国产激情欧美一区二区| 亚洲精品一卡2卡三卡4卡5卡| 午夜影院日韩av| 欧美日本中文国产一区发布| 又大又爽又粗| 久久伊人香网站| 少妇熟女aⅴ在线视频| 黑人巨大精品欧美一区二区蜜桃| АⅤ资源中文在线天堂| tocl精华| 国内精品久久久久精免费| 精品国产亚洲在线| 国产91精品成人一区二区三区| 亚洲五月天丁香| www.精华液| 国产乱人伦免费视频| 一区福利在线观看| 51午夜福利影视在线观看| 少妇的丰满在线观看| 最新美女视频免费是黄的| 亚洲午夜精品一区,二区,三区| 999久久久精品免费观看国产| 一区福利在线观看| 日韩三级视频一区二区三区| 欧美色视频一区免费| 日本撒尿小便嘘嘘汇集6| 可以在线观看毛片的网站| 欧美日韩瑟瑟在线播放| 色在线成人网| 99热只有精品国产| 高清毛片免费观看视频网站| 亚洲精品国产一区二区精华液| 国产精品亚洲美女久久久| 日韩成人在线观看一区二区三区| 欧美日韩乱码在线| 精品久久蜜臀av无| 亚洲一区中文字幕在线| 国产又色又爽无遮挡免费看| 高清黄色对白视频在线免费看| 婷婷丁香在线五月| 岛国在线观看网站| 亚洲成人精品中文字幕电影| 久久久国产精品麻豆| 久久香蕉激情| 色av中文字幕| 亚洲国产日韩欧美精品在线观看 | 精品国产美女av久久久久小说| 亚洲一码二码三码区别大吗| 成年女人毛片免费观看观看9| 一本综合久久免费| 天天躁狠狠躁夜夜躁狠狠躁| 少妇裸体淫交视频免费看高清 | 久久国产亚洲av麻豆专区| 嫩草影视91久久| 国产亚洲欧美在线一区二区| 亚洲人成电影免费在线| 精品久久久久久久人妻蜜臀av | 两个人免费观看高清视频| 最近最新免费中文字幕在线| 最新在线观看一区二区三区| 精品久久久久久久人妻蜜臀av | 日韩精品免费视频一区二区三区| 日本a在线网址| 精品久久久久久成人av| 亚洲专区国产一区二区| 宅男免费午夜| 亚洲一卡2卡3卡4卡5卡精品中文| 久久精品亚洲精品国产色婷小说| 亚洲国产精品久久男人天堂| 中文字幕精品免费在线观看视频| 最好的美女福利视频网| 制服丝袜大香蕉在线| www国产在线视频色| 天天一区二区日本电影三级 | 欧美色视频一区免费| 国产99久久九九免费精品| 自线自在国产av| 国产亚洲精品久久久久5区| 国产亚洲欧美精品永久| 精品少妇一区二区三区视频日本电影| 在线免费观看的www视频| 欧美色视频一区免费| 午夜日韩欧美国产| 97人妻精品一区二区三区麻豆 | 人人妻人人澡欧美一区二区 | 搞女人的毛片| 日韩欧美国产一区二区入口| 亚洲精品国产精品久久久不卡| 午夜福利在线观看吧| 成人三级做爰电影| 亚洲va日本ⅴa欧美va伊人久久| 乱人伦中国视频| 琪琪午夜伦伦电影理论片6080| 十八禁人妻一区二区| 制服人妻中文乱码| 黄色成人免费大全| 久久久久久大精品| 日韩有码中文字幕| 欧美精品啪啪一区二区三区| 啦啦啦免费观看视频1| 亚洲黑人精品在线| 久久久久久久久免费视频了| 国产亚洲精品第一综合不卡| 这个男人来自地球电影免费观看| 脱女人内裤的视频| 亚洲国产精品999在线| 一级片免费观看大全| 中文字幕久久专区| 国产野战对白在线观看| 免费人成视频x8x8入口观看| 黄片播放在线免费| 精品人妻1区二区| 午夜福利在线观看吧| 国产精品一区二区免费欧美| 国产精品久久久久久亚洲av鲁大| 亚洲一码二码三码区别大吗| 亚洲欧美日韩高清在线视频| 女同久久另类99精品国产91| 久久国产精品男人的天堂亚洲| 日本免费a在线| 国产精品 欧美亚洲| 亚洲精品中文字幕在线视频| 琪琪午夜伦伦电影理论片6080| 欧美人与性动交α欧美精品济南到| 国产99久久九九免费精品| 此物有八面人人有两片| 色播亚洲综合网| 怎么达到女性高潮| 日韩 欧美 亚洲 中文字幕| 国产熟女午夜一区二区三区| 欧美乱色亚洲激情| 欧美黄色片欧美黄色片| 极品人妻少妇av视频| 一级a爱视频在线免费观看| 久久香蕉国产精品| 色av中文字幕| 纯流量卡能插随身wifi吗| a级毛片在线看网站| 波多野结衣巨乳人妻| 一区福利在线观看| 在线观看日韩欧美| 亚洲自偷自拍图片 自拍| 天堂动漫精品| 亚洲欧美精品综合久久99| 国产一级毛片七仙女欲春2 | 国产三级在线视频| 在线观看午夜福利视频| 精品卡一卡二卡四卡免费| 国产精品久久久人人做人人爽| 黄色片一级片一级黄色片| 九色亚洲精品在线播放| 欧美日韩中文字幕国产精品一区二区三区 | av网站免费在线观看视频| 怎么达到女性高潮| 国产真人三级小视频在线观看| 如日韩欧美国产精品一区二区三区| 亚洲专区字幕在线| 19禁男女啪啪无遮挡网站| 色综合欧美亚洲国产小说| 亚洲专区国产一区二区| 露出奶头的视频| 成年女人毛片免费观看观看9| 9热在线视频观看99| 久久久国产精品麻豆| 亚洲成国产人片在线观看| 一二三四在线观看免费中文在| 亚洲av成人av| 亚洲人成伊人成综合网2020| 精品国产亚洲在线| 久久久久久久午夜电影| 女人被狂操c到高潮| 亚洲三区欧美一区| 亚洲中文av在线| 午夜久久久久精精品| 男女午夜视频在线观看| 99riav亚洲国产免费| 欧美乱码精品一区二区三区| 亚洲男人天堂网一区| 人妻久久中文字幕网| 成人av一区二区三区在线看| 久久久久久久久久久久大奶| 国产亚洲精品综合一区在线观看 | 少妇的丰满在线观看| 国产高清视频在线播放一区| 母亲3免费完整高清在线观看| 在线观看舔阴道视频| 亚洲精品美女久久久久99蜜臀| 成熟少妇高潮喷水视频| 日本免费一区二区三区高清不卡 | 国产成人精品久久二区二区免费| 午夜福利一区二区在线看| 99久久精品国产亚洲精品| 日本黄色视频三级网站网址| 成人18禁在线播放| 女人被躁到高潮嗷嗷叫费观| 久久精品91无色码中文字幕| 国产熟女xx| 长腿黑丝高跟| 亚洲精品国产一区二区精华液| 99国产极品粉嫩在线观看| 久9热在线精品视频| 变态另类成人亚洲欧美熟女 | 高潮久久久久久久久久久不卡| 欧美黑人精品巨大| 欧美丝袜亚洲另类 | 两个人视频免费观看高清| 国产激情欧美一区二区| 久久天堂一区二区三区四区| 色综合欧美亚洲国产小说| 日本五十路高清| 好男人在线观看高清免费视频 | 咕卡用的链子| 亚洲av成人av| 欧美大码av| 在线观看一区二区三区| 欧美中文日本在线观看视频| 日韩免费av在线播放| 青草久久国产| 少妇 在线观看| 最近最新免费中文字幕在线| 久久精品亚洲熟妇少妇任你| 久久精品人人爽人人爽视色| 91老司机精品| 久久婷婷人人爽人人干人人爱 | 精品一区二区三区视频在线观看免费| 久久精品国产亚洲av高清一级| 99久久99久久久精品蜜桃| 国产黄a三级三级三级人| 九色国产91popny在线| 亚洲精品久久成人aⅴ小说| 精品午夜福利视频在线观看一区| 亚洲第一av免费看| 亚洲一区高清亚洲精品| 欧美日本亚洲视频在线播放| 人人妻人人澡人人看| 悠悠久久av| 久久九九热精品免费| 国产视频一区二区在线看| 免费人成视频x8x8入口观看| 日韩国内少妇激情av| 亚洲九九香蕉| 亚洲av片天天在线观看| 久久久水蜜桃国产精品网| 黄色a级毛片大全视频| 久久天堂一区二区三区四区| √禁漫天堂资源中文www| 搡老岳熟女国产| 女人被狂操c到高潮| 午夜免费成人在线视频| 国产欧美日韩综合在线一区二区| 12—13女人毛片做爰片一| 精品熟女少妇八av免费久了| 亚洲欧美日韩另类电影网站| 日本免费a在线| 不卡av一区二区三区| 精品久久久久久久毛片微露脸| 黄色a级毛片大全视频| 亚洲第一青青草原| 丰满人妻熟妇乱又伦精品不卡| 天天躁狠狠躁夜夜躁狠狠躁| 女警被强在线播放| 一进一出抽搐gif免费好疼| 十八禁人妻一区二区| 亚洲av五月六月丁香网| 最近最新中文字幕大全免费视频| 国产成人精品久久二区二区免费| 亚洲成av片中文字幕在线观看| 久久人妻av系列| 午夜福利一区二区在线看| 亚洲国产精品久久男人天堂| 一区福利在线观看| 国产精品久久电影中文字幕| 欧美黑人精品巨大| 欧美中文综合在线视频| 婷婷六月久久综合丁香| 国产成人啪精品午夜网站| 日韩欧美一区视频在线观看| 法律面前人人平等表现在哪些方面| 一区福利在线观看| 日韩欧美在线二视频| 精品人妻在线不人妻| 国产精品永久免费网站| 色综合亚洲欧美另类图片| 亚洲精品国产色婷婷电影| 1024香蕉在线观看| 欧美大码av| 免费高清视频大片| 黄色毛片三级朝国网站| 叶爱在线成人免费视频播放| 色老头精品视频在线观看|