• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Webpage Matching Based on Visual Similarity

    2022-08-24 03:29:48MengmengGeXiangzhanYuLinYeandJiantaoShi
    Computers Materials&Continua 2022年5期

    Mengmeng Ge,Xiangzhan Yu,*,Lin Ye,2 and Jiantao Shi

    1School of Cyberspace Science,Harbin Institute of Technology,Harbin,150001,China

    2Department of Computer and Information Science,Temple University,Philadelphia,42101,USA

    Abstract:With the rapid development of the Internet,the types of webpages are more abundant than in previous decades.However,it becomes severe that people are facing more and more significant network security risks and enormous losses caused by phishing webpages,which imitate the interface of real webpages and deceive the victims.To better identify and distinguish phishing webpages,a visual feature extraction method and a visual similarity algorithm are proposed.First,the visual feature extraction method improves the Visionbased Page Segmentation (VIPS) algorithm to extract the visual block and calculate its signature by perceptual hash technology.Second,the visual similarity algorithm presents a one-to-one correspondence based on the visual blocks’coordinates and thresholds.Then the weights are assigned according to the tree structure,and the similarity of the visual blocks is calculated on the basis of the measurement of the visual features’Hamming distance.Further,the visual similarity of webpages is generated by integrating the similarity and weight of different visual blocks.Finally,multiple pairs of phishing webpages and legitimatewebpages are evaluated to verify the feasibilityof the algorithm.The experimental results achieve excellent performance and demonstrate that our method can achieve 94%accuracy.

    Keywords: Web security; visual feature; perceptual hash; visual similarity

    1 Introduction

    More people surf online due to the development of Internet technology which creates an increasingly insecure environment at the same time.According to the 44thStatistical Report on Internet Development in China [1], 44.4% of netizens have been threatened by network security,where phishing webpages [2] account for the most substantial proportion.The emergence of phishing webpages is to acquire user information by imitating the interface, so as to conduct illegal activities, such as fraud.Existing webpage recognition methods can identify simple phishing webpages.In practice, however, they may fail owing to the well-concealed phishing webpages that are difficult to recognize; for example, traditional Deep Packet Inspection (DPI) [3] has difficulty detecting encrypted phishing webpages.The most effective way to identify phishing webpages is to calculate their similarity [4], which can be measured from their features.

    Besides, webpage feature extraction methods [5,6] can be mainly divided into three parts:webpage source-based extraction [7], DOM structure-based extraction [8], and visual feature-based extraction [9].Webpage source extraction method is highly efficient but does not make full use of all related information.Meanwhile, DOM structure extraction technology fakes the phishing webpage as the real one for the sake of deceiving users by considering text density and the webpage’s DOM tree structure.However, neither of the above two methods involves webpages’visual features.

    Humans can quickly identify whether the webpages’contents are similar by observing the corresponding titles, the navigation bars, and the advertising frames through their visual features.Therefore, the visual features of webpages can be used to measure the similarity of webpages to identify phishing webpages.In addition, this method can be extended to malware detection in network traffic [10,11] and encrypted traffic [12], such as the analysis of traffic in 5G networks [13].

    In this paper, the improved VIPS algorithm [14] is applied to extract webpages’visual block features [15], including pictures, font size, background color, and location information.Each visual block corresponds to a sub-picture on the webpage; thus, the visual blocks can measure the similarity of webpages.Suppose there is a webpage that has been changed slightly by an attacker,with little effect on the visual feature of the webpage.A perceptual hash [16,17] algorithm can be used to extract each visual block’s visual features to find small changes from the picture and generate a new signature.Then, the signature can be compared to that of another webpage to distinguish the differences.

    To integrate the visual features of visual blocks, a tree structure is employed, where each tree node corresponds to a visual block.Subsequently, the weight of the visual block is related to its position in the tree the higher the position, the greater the weight.Hence, the visual similarity can be calculated according to the position information of the visual blocks, the picture signatures,and visual features.

    The contribution of this paper are:

    (1) We propose a webpage matching technology based on webpage blocks visual features.

    (2) We propose a tree structure to organize different webpages visual blocks, and use Hamming distance to measure the similarity of the trees of different webpages visual blocks features.

    (3) We evaluated the similarity of different webpages and proved its effectiveness in classifying webpages.

    The remainder of this paper is organized as follows.Section 2 presents the related work.Section 3 proposes the similarity matching algorithm, and Section 4 introduces the evaluation results.Finally, Section 5 concludes our work.

    2 Related Work

    Phishing detection methods consist of two main categories:URLs detection [18] and content identification [19].The former distinguishes the phishing webpage by its URL through mathematical modeling, which is more suitable and works better based on large quantities of webpages.The latter is webpage similarity identification based on the webpage’s content.Webpage similarity can be divided into the following categories:studies on traditional text, structural, and visual similarity.

    Research on similarity detection aims at solving problems in large file systems and has been expanded to search engine systems and digital library projects.Heintze [20] proposed the KOALA algorithm to identify the target document by matching the fingerprint set of each document.Hivakumar et al.[21] determined target documents by comparing signatures of segmented text.Other representative algorithms, including the YAP3 algorithm [22], only use the string comparison method without taking into account the webpage text content or the overall structure of ordinary documents.Shivakumar et al.[23] presented the SCAM methods that utilize word frequency statistics to check documents.Si et al.[24] described the Check method in 1997 and introduced the structural information of the document; that is, the document was organized into a document tree by the structure of chapters, sections, and paragraphs, and then a depth-first comparison of the document tree was provided to calculate the similarity.

    Document Object Model (DOM) was used to express the internal structure of HTML files;thus, it contributes significantly to HTML parsing.Wagner et al.[25] proposed the similarity of strings based on the edit distance, which considers three ways to edit a string:converting a character into another character, deleting a character in a string, and inserting a character into a string.Meanwhile, the minimum edit number is a standard to measure the similarity between two strings—a small edit distance implies great similarity.Hence, Tai [26] presented an edit distancebased tree similarity measuring method to turn a tree into another tree by applying the three aforementioned editing ways—replacing a node in the tree with another node, inserting a node into the tree, and deleting a node in the tree.Therefore, it is possible to calculate the similarity of a webpage by determining the edit distance of the DOM tree.

    Besides, Liu et al.[27] introduced a webpage visual similarity calculation method based on the DOM tree, which is divided into visual blocks, and then further compared the similarity between blocks, webpage’s layout similarity, and the webpage’s overall style similarity.The three similarities were finally weighted and combined as the final webpage similarity.Additionally, Fu et al.[28]described an approach for phishing webpage detection by calculating webpage similarity based on Empirical Mode Decomposition (EMD), where they converted the webpage to a compressed image, generated a signature according to the image, and calculated the distance between the webpage image signatures.

    3 Methods

    This section introduces the webpage’s similarity calculation method based on visual features,consisting of three steps:visual block extraction, visual feature extraction and visual similarity calculation.Firstly, an improved VIPS algorithm is used to extract visual blocks.Secondly, a modified perceptual hash algorithm is employed to extract visual features of webpages.Thirdly,the reconstructed visual tree based on the visual block is checked to meet the visual similarity comparison needs.Finally, the coordinates, length, width, visual features, and weights of visual blocks are employed to calculate webpage similarity.When the visual similarity of two webpages is greater than a certain threshold, the two webpages are considered similar.

    3.1 Visual Block Extraction

    Each webpage structure can be represented by a tripleΩ= (Σ,Ψ,δ), where Σ is a finite set of blocks with no overlap and Σ=(Ω1,Ω2,...,Ωn) whereΩiis the sub-block ofΩ.Each block can be recursively regarded as a sub-block associated with a sub-structure generated from the entire webpage’s structure.Ψ= (ψ1,ψ2,...,ψn) is a finite set of dividers, including two horizontal and vertical dividers with two weights that represent their visibilities respectively.It should be noted that all the dividers in the same Ψ share the same weight.Meanwhile,δ(Ωi,Ωj)=ψk, where Δ represents the separator between different blocks andδ(Ωi,Ωj)≠? indicates that the two blocks are next to each other.

    Before running the algorithm, a Permitted Degree of Coherence (PDoC) value is calculated to define the roughness of the segmented visual block.The smaller the PDoC, the rougher the segmented visual block.On the contrary, the greater the PDoC, the smoother the segmented visual block.Furthermore, each node in the DOM tree represents a visual block normally; however,some special nodes, such as<Table>and<P>tags, are only constructed to organize text and not suitable for use as a single visual block.Under this situation, these nodes should be divided and replaced by the child nodes considering as visual blocks instead.It should be mentioned that those nodes do not be extract because they are too large in the DOM tree.

    Table 1:The different webpages sample information and numbers

    Table 2:The S value of different webapges and the classificaiton performances

    At the end of this step, each visual block’s DOC value is set according to its visual difference.This process repeats until all reasonable visual blocks of the entire webpage are extracted.After that, visual blocks are fed into the pool for separator detection, where the separator is a horizontal or vertical line on the webpage and does not cross any block in the collection.From the visual point of view, the separator is an essential indicator for distinguishing different visual content on the webpage.A visual separator can be represented by a two-tuple (Ps,Pe), where the former denotes the start pixel, and the latter defines the end pixel.Also, the width of the separator can be calculated by these two values.Thus, the separator detection algorithm can be described as follows:

    (1) Initialize the separator list with only one separator, whose initial and end pixels represent all blocks’boundaries in the pool.

    (2) For each block in the pool, its relationship with each separator follows:

    (a) if the separator contains a block, then separate the separator;

    (b) if the block covers the separator, then delete the separator;

    (c) if the block and the separator cross (i.e., contains each other), then update the separator parameter.

    (3) Delete the boundary separator in the pool.

    Subsequently, the weight of the separator is set by the information difference in the surrounding blocks because the separator is used to distinguish different visual blocks on the webpage.Next, the reconstruction of the visual block starts with the separator with the smallest weight,and the visual blocks on both sides of these separators will form a new visual block.This process repeats until the separator with the highest weight is encountered.Then, the DOC value of the new visual block is reset by the separator detection algorithm.After this, each visual block is checked whether it satisfies DOC >= PDoC.For those unsatisfied ones, the visual block extraction step is performed; otherwise, the process terminates.

    Through this process, a bridge between the DOM tree and the visual structure of the webpage is established.Simply put, the webpage is separated by visual separators and reconstructed into a hierarchical structure with content-related parts grouping together even if they exist in different DOM tree nodes.

    3.2 Visual Feature Extraction

    For a given webpage, the visual blocks’position and content may have subtle changes.A typical example of this is the news webpages, within which the length, quantity, area, and position of the visual block are often different.Thanks to human vision, we can recognize similar webpages on different dates by some iconic features, such as trademarks, branding, and fixed signs, and we can also tolerate some subtle changes like changed length in visual blocks.Thus, we need to find a way to imitate our human perception of webpages, and the perceptual hash plays a vital role because it can generate visual block’s signature and the degree of similarity by ignoring the details.Pictures with high similarity have similar signatures generated by perceptual hashing.

    In this section, the image perception hash function is applied to calculate the visual block signature based on discrete cosine transform feature points.Thus, the visual feature extraction of the visual block is realized, and the quick comparison of visual blocks is facilitated later on.The perceptual hash algorithm used in this section depends on the DCT transformation.After performing DCT transformation on the visual block, it is clear after the picture is compressed into a JPEG, and the relationship between DCT coefficients at the same position in different blocks does not change.

    The DCT transformation converts a picture from the color domain to the frequency domain and brings two advantages.First, the signal concentrates most of its energy in a small range in the frequency domain.Second, the frequency domain decomposition matches the processing of the human visual system and allows the subsequent quantization to meet sensitivity requirements.Besides, DCT has a corresponding inverse transformation process, which means that the data before and after the DCT transformation are equivalent.Also, most of the energy is accumulated in the upper-left corner of the matrix after the change.Thus, the upper-left corner of the matrix after the DCT transformation can be on behalf of the entire picture, as well as the DCT transform can describe image features.

    For two webpages, the problem of how to find their corresponding visual block sets needs to be solved.Comparing the visual block sets one by one can calculate the similarity between them.Then, the edit distance calculation between trees is utilized to observe the relationship between the visual blocks of the two webpages.The reconstruction of the visual tree is based on the parentchild relationship.When extracting the visual block, an XML file describing the visual block is generated.

    Algorithm 1:Visual block reconstruction INPUT:visual blocks set S OUTPUT:visual tree T 1. S.sortedByOrder()2.root = Node(“”)3.father = root 4.for node in S do 5.if node.isSonOf(father) then 6.father.addkid(node)7.father = node 8.else:9.while findNodeFather(node,father) then 10.father = node.get_parent(father)11.father.addkid(node)(Continued)

    12.father = node 13.images/BZ_1276_282_376_406_441.pngnd 14.end 15.return root

    According to the reconstruction algorithm, a webpage can be transformed into a visual tree,where each node represents a visual block’s visual feature.The similarity comparison of trees involves two aspects:connecting the child nodes of the two trees, i.e., mapping, and comparing the similarity of the two visual blocks.The problem of mapping the visual block relationship can be transformed into the tree edit distance problem, that is, the cost of converting tree A into tree B by adding a node, deleting a node, and changing a node.The lower the cost, the greater the similarity.

    3.3 Visual Similarity Calculation

    Assuming that a webpage is subjected to visual block extraction, visual feature extraction,visual tree reconstruction, and other operations, then the generated visual tree is defined asT.|T|denotes the node number of the tree,tirepresents theithnode in the subsequent traversal of the tree, andTpandTqare two different visual trees.Then, the minimum edit distance between visual trees is defined as the minimum conversion cost fromTptoTq.In this paper, transforming a tree consists of three operations:inserting, deleting, and updating a tree node.We assume that the cost of each operation is 1.Hence, the edit distance of trees is the total cost of transformations.

    When convertingTptoTq, iftqiinTphas no correspondingtpiinTq, then the corresponding operation is deleting; iftqiinTphas a correspondingtpiinTq, but their labels are different, then the corresponding operation is updating; iftqiinTpdoes not correspond totpiinTq, then the corresponding operation is inserting.Thus, this mapping relationship can be expressed asm(tpi,tqi).Note that this relationship is not arbitrary, and it should follow the rules of the subordinates.Mapping the pairandfollows the rules below.

    (1) One-to-one rule:i1=i2??j1=j2, and the first tree node should correspond to the second tree node;

    (2) Horizontal relationship maintenance rule:beforebefore;

    (3) Vertical relationship maintenance rule:is the ancestor ofis the ancestor of.

    Subsequently, the Hamming distance is used to measure the similarity between tree nodes since they are all perceptually hash coded.In two signatures, the Hamming distance represents the number of bits whose positions are the same but with different values.If this number is less than the thresholdD, the signatures are similar; otherwise, they are dissimilar.

    Here,xandyare the signatures,xiis the bit value at the positioniof signaturex, andyiis the bit value at the positioniof signaturey.The similarity of the visual tree is calculated based on the edit distance:

    whereted(A,B) represents the tree edit distance between treesAandB, and thus means the minimum operation number to transform treeAinto treeB.max(childrenA,childrenB) denotes the larger value of the child nodesAandB, and thus represents the maximum operation number of transforming treeAinto treeB.Finally, the similarity of the two visual trees can be obtained from Eqs.(1) and (2).

    In summary, the structural similarity is calculated between webpages by adding and deleting the nodes of the trees, and then the visual similarity is compared between webpages by updating the tree nodes.Finally, the two kind similarities, i.e., structural similarity and visual similarity, are obtained.

    4 Experimental Evaluation

    4.1 Similarity Evaluation

    Phishing webpages have relatively high similarities with real target webpages.Therefore, in this section, the experiment evaluates the effectiveness of the proposed similarity detection method and discusses the webpages’similarities.

    In the experiment, nine legitimate webpages and 12 phishing webpages were selected, where the phishing webpages are the latest phishing webpages obtained from the PhishTank website.Then, these sites were used to verify whether the similarity measurement method was related to language or region.

    (1) Data preprocessing

    A webpage’s HTML source code always contains a large quantity of data irrelevant to this task, such as comments left by developers.Besides, many HTML webpages are incomplete, where some elements are missing, such as</div>and</p>.The browser can accept such errors.However, these errors may influence our work, and thus we need to eliminate them.

    (2) Visual tree generation

    After data preprocessing, the DOM tree of a webpage was obtained.Firstly, to generate the visual tree, visual blocks from the DOM tree were extracted by removing some invisible content in the webpage and performing a preliminary analysis of the DOM tree nodes.Next, the visual block was reconstructed based on the weight information of the separator.Further, we extracted the features of the visual blocks, generated the image representations of each visual block according to their coordinate data, and then extracted the visual features by perceptual hash according to these image representations.Finally, the visual tree was constructed based on visual blocks’hierarchical information.

    (3) Similarity calculation

    After obtaining the webpage’s visual tree representation, the visual similarity was calculated between the webpages based on the tree’s edit distance and tree nodes’ Hamming distance.Therefore, the similarity score for each webpage was generated, and a similarity matrix was also constructed.

    As shown in Fig.1, the similarity between different webpages is calculated.Green balls indicate matching webpages, while red balls mean unmatched webpages.We found that a) the average similarity value 0.89 between matched webpages is higher than the average similarity value 0.31 between unmatched webpages; and b) the threshold for judging whether webpages are similar does not exist.For example, for Google webpage, when the threshold is greater than 0.6, a similar webpage can be found; but for Whatsapp webpage, the threshold may be 0.9 or higher.Therefore,this threshold may be found on a single webpage, but it does not exist in a general sense.

    Figure 1:Similarity of different webpages.Reb colors represent the similarity of real webpages and not pishing webpages, and green colors represent the similarity of real webpages and pishing webpages

    4.2 Webpage Classification Evaluation

    Webpage clusters have a high visual similarity degree.The experiments were conducted to evaluate whether this method can classify different webpage clusters and the webpage classification performance.In our evaluation, a total of 1,200 pages were yielded as experimental data from the top 100 webpages on Alexa China, where their homepage from 2017 to 2019 and the corresponding source codes from March, June, September, and December of each year were collected.Meanwhile, visual block extraction and visual feature extraction were performed, and a visual feature tree was obtained subsequently.Then, the similarity between each webpage was calculated,and a symmetric similarity matrix is generated.

    The webpage features were represented by trees rather than vectors, and nodes were related by similarity values instead of distance metrics.These characteristics determined that traditional clustering methods based on vector space representation could not be used, such as K-means clustering.On the contrary, spectral clustering can take full advantage of the similarity matrix because its main idea is to treat all data as points in space and connects them by edges.The farther the two points, the lower the edge weight value; the closer the two points, the higher the edge weight value.

    In this experiment, the nodes in the spectral clustering space corresponded to the visual feature tree, and the weights of the nodes represented the similarity between the trees.The purity [29] index of the clustering results and the Calinski–Harabasz [30] indicator were utilized for analysis.The definition of purity is:

    Here,Kis the number of clusters, andmis the number of members involved in the entire cluster division.Besides,and, wheremiis the number of all members in clusteri, andmijis the number of members belonging to both clusteriand clusterj.

    Meanwhile, the Calinski–Harabasz indicatorS(k) evaluated the quality of clustering results.The higher the score, the better the clustering performance.

    wheremis the number of samples, andkis the number of categories.Besides,Bkis the covariance matrix between categories,Wkis the covariance matrix of data within categories, andtris the matrix’s trace.

    As shown in Tab.1, we have selected 12 different typical web pages from the top 100 groups of web pages of different period.These webpages are marked from 1 to 71.They include search engines, social media, news portals, technology websites, etc.We first extract the visual block features of webpages, and measure the similarity of these 71 webpages by calculating the Hamming distance of different webpage visual feature trees.

    Take “right.com.cn” in the year of 2019 as an example, as shown in Fig.2, the webpages 51 to 61 webpages were randomly collected from 2017 to 2019.It can be seen that their similarities are extremely high due to the same kind of webpage.We can see that the similarity of webpage 61 to the sample is 1.0 because webpage 61 and the sample webpage is the same one.The similarity to the webpage 51 and 52 is not high, reaching only about 0.7.This is because these two webpages represent different webpage versions with some visual changes in their appearances.However,the visual similarity value in the same class is still greater than the similarity with other class webpages.

    Figure 2:The similarity of “right.com.cn” with other webpages

    Figure 3:(a) The similarity evaluation between multiple webpages, reb colors represent the similarity of different classes webpage and green colors represent the similarity of the same class webpages; (b) The purity and Calinski–Harabasz indicator effect of the k clusters

    In Fig.3a, the red balls represent the similarity between classes, and the green balls represent the similarity within the class.In general, it is clear that the green balls are above the red balls, i.e.,the intra-class similarity is generally greater than the inter-class similarity.In the meanwhile, if we look carefully, there are individual green balls below the red balls, The reason for this observation is that our graph displays an overall similarity.For example, the similarity value of webpage 1 and all webpages is incredibly low (the maximum value is 0.3), but that of webpage 2 and all webpages is very high (the minimum value is 0.8).Interestingly, their intra-class similarity is greater than the inter-class similarity.

    To observe the influence in the purity value and Calinski–Harabasz indicator, the number of clusterskchanged from 7 to 20.Fig.3b shows that when the cluster number is less than 12, both the purity value and Calinski–Harabasz indicator increase with the growth of the category number,indicating that the clustering results are positively associated with the number of clusters.When the number of clusters reaches 12, the purity value and Calinski–Harabasz indicator achieve their maximum values.When the cluster number is higher than 12, as the number of categories rises,both the purity value and the Calinski–Harabasz indicator decrease.This declares that the number of clusters gradually becomes inaccurate for the performance.Thus, this experiment demonstrates that the best number of clusters is 12, so that our true number of categories is exactly 12.This is in line with our expectations and indicates that our similarity calculation method is very effective.

    We selected eight types of test webpages (as shown in Tab.2), total of 51 webpage samples.We also collected 1101 other webpage samples.For test webpage, the training set contains similar webpages to the test webpage and irrelevant webpages.Similarity threshold value S (as shown in the Tab.2), for the webpage to be classified, if the similarity with test webpage is higher than value S, it is classified as a similar webpage.If the similarity is lower than value S, it is regarded as an irrelevant webpage.The test results are shown in Tab.2.

    From Tab.2, we can see that for each test webpage, the values S is different.At the same time, the average accuracy is up to 94%, and the average recall rate is up to 90%.It proves the effectiveness of webpage classification based on visual features.

    5 Conclusion

    With the rapid development of Internet technology, the task of webpage recognition has become more and more important.A method was proposed to imitate the way humans understand webpages and identify phishing webpages.The perceptual hashing technology was applied to the extraction of visual block features in webpages, which is extremely robust and conforms to human cognition because the perceptual hashing can tolerate a certain degree of detail changes in pictures.Then, a method for calculating visual similarity was presented as both robust and highly accurate.The minimum edit distance of the tree was utilized to find the best mapping relationship between two visual block sets, and the similarity between visual blocks through the Hamming distance was also calculated.Furthermore, the calculation granularity according to the Hamming distance threshold was controlled.Finally, the experiment results demonstrated that webpage classification based on visual features has excellent performance, with an accuracy rate of 94%.

    Acknowledgement:This work is supported by the National Key R&D Program of China(2016QY05X1000) and the National Natural Science Foundation of China (201561402137).

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    日本免费一区二区三区高清不卡 | 91在线观看av| 亚洲va日本ⅴa欧美va伊人久久| 免费日韩欧美在线观看| ponron亚洲| 国产野战对白在线观看| 免费少妇av软件| 一本大道久久a久久精品| 国产激情欧美一区二区| av国产精品久久久久影院| 午夜日韩欧美国产| 欧美国产精品va在线观看不卡| 又黄又爽又免费观看的视频| 波多野结衣一区麻豆| 天堂俺去俺来也www色官网| 久久 成人 亚洲| 中文字幕av电影在线播放| 脱女人内裤的视频| 操美女的视频在线观看| 电影成人av| 一个人免费在线观看的高清视频| 精品一品国产午夜福利视频| 欧美+亚洲+日韩+国产| 欧美精品啪啪一区二区三区| 啦啦啦在线免费观看视频4| 国产亚洲欧美精品永久| 久久久精品国产亚洲av高清涩受| 99国产精品一区二区蜜桃av| 天堂√8在线中文| 搡老岳熟女国产| 97碰自拍视频| 国产无遮挡羞羞视频在线观看| 变态另类成人亚洲欧美熟女 | 国产伦人伦偷精品视频| 男人的好看免费观看在线视频 | 亚洲欧美精品综合一区二区三区| 久久久国产欧美日韩av| 黄色女人牲交| 韩国精品一区二区三区| av有码第一页| 国产成人一区二区三区免费视频网站| 亚洲中文日韩欧美视频| 亚洲 国产 在线| 1024香蕉在线观看| 久久精品91无色码中文字幕| 女人精品久久久久毛片| 亚洲自偷自拍图片 自拍| 男人舔女人的私密视频| 欧美日韩中文字幕国产精品一区二区三区 | 九色亚洲精品在线播放| 亚洲第一av免费看| 亚洲七黄色美女视频| 国产精品秋霞免费鲁丝片| 人妻丰满熟妇av一区二区三区| 欧美日韩瑟瑟在线播放| 一区福利在线观看| 久久天躁狠狠躁夜夜2o2o| e午夜精品久久久久久久| 麻豆一二三区av精品| 国产无遮挡羞羞视频在线观看| 宅男免费午夜| 欧美日韩视频精品一区| 日日摸夜夜添夜夜添小说| 欧美日韩黄片免| 88av欧美| av福利片在线| 精品国产国语对白av| 久久人人97超碰香蕉20202| 老汉色av国产亚洲站长工具| 国产欧美日韩综合在线一区二区| 91在线观看av| 午夜福利欧美成人| 99riav亚洲国产免费| 国产av一区在线观看免费| a级毛片黄视频| 天天影视国产精品| 亚洲精华国产精华精| 91麻豆av在线| 又紧又爽又黄一区二区| 亚洲熟妇中文字幕五十中出 | 国产av在哪里看| videosex国产| 性欧美人与动物交配| 女人爽到高潮嗷嗷叫在线视频| 婷婷精品国产亚洲av在线| 90打野战视频偷拍视频| 亚洲免费av在线视频| 亚洲av片天天在线观看| 搡老岳熟女国产| 亚洲欧美一区二区三区黑人| 国产片内射在线| 变态另类成人亚洲欧美熟女 | 中国美女看黄片| 亚洲精品国产色婷婷电影| 九色亚洲精品在线播放| 老汉色av国产亚洲站长工具| 女人精品久久久久毛片| 国产精品1区2区在线观看.| avwww免费| 交换朋友夫妻互换小说| 久久国产精品人妻蜜桃| 欧美一区二区精品小视频在线| 国产一区二区三区综合在线观看| 亚洲人成伊人成综合网2020| 757午夜福利合集在线观看| 久久狼人影院| 两性夫妻黄色片| 亚洲 欧美一区二区三区| 12—13女人毛片做爰片一| 日本黄色日本黄色录像| 色婷婷av一区二区三区视频| a级毛片黄视频| 久久狼人影院| 欧美色视频一区免费| 精品国内亚洲2022精品成人| 最好的美女福利视频网| 亚洲精华国产精华精| 国产aⅴ精品一区二区三区波| 午夜两性在线视频| 在线免费观看的www视频| 欧美成人性av电影在线观看| 久久午夜综合久久蜜桃| 嫩草影视91久久| 亚洲性夜色夜夜综合| 国产单亲对白刺激| 国产亚洲av高清不卡| 巨乳人妻的诱惑在线观看| 满18在线观看网站| 夫妻午夜视频| 18禁观看日本| 亚洲av熟女| 国产av一区在线观看免费| 久久精品91蜜桃| 一二三四社区在线视频社区8| 欧美日韩福利视频一区二区| 亚洲va日本ⅴa欧美va伊人久久| 99re在线观看精品视频| 国产色视频综合| 日日夜夜操网爽| 黑人巨大精品欧美一区二区蜜桃| cao死你这个sao货| 国产99久久九九免费精品| 99久久人妻综合| 久久人妻福利社区极品人妻图片| 丰满人妻熟妇乱又伦精品不卡| 国产亚洲av高清不卡| 黄色视频不卡| 亚洲国产中文字幕在线视频| 亚洲成人久久性| 日韩视频一区二区在线观看| 久久久久精品国产欧美久久久| 夜夜看夜夜爽夜夜摸 | 制服人妻中文乱码| 黑人巨大精品欧美一区二区蜜桃| 久久精品91无色码中文字幕| 亚洲av成人一区二区三| 久久天堂一区二区三区四区| av片东京热男人的天堂| 在线观看免费视频日本深夜| 午夜福利在线免费观看网站| 高清在线国产一区| 成人国产一区最新在线观看| 一级,二级,三级黄色视频| 9色porny在线观看| 亚洲自拍偷在线| av网站免费在线观看视频| 黄片播放在线免费| 亚洲欧美日韩无卡精品| 中文欧美无线码| 日日摸夜夜添夜夜添小说| 村上凉子中文字幕在线| 嫁个100分男人电影在线观看| 啦啦啦在线免费观看视频4| 最好的美女福利视频网| 成年人黄色毛片网站| 91精品国产国语对白视频| 波多野结衣av一区二区av| 90打野战视频偷拍视频| 69av精品久久久久久| 最近最新中文字幕大全免费视频| 日韩欧美免费精品| 亚洲av电影在线进入| 国产一区二区激情短视频| 国产免费现黄频在线看| 欧美黑人精品巨大| 亚洲精品中文字幕一二三四区| 欧美一级毛片孕妇| 看片在线看免费视频| 国产乱人伦免费视频| 黄色 视频免费看| 午夜福利欧美成人| 19禁男女啪啪无遮挡网站| 亚洲av日韩精品久久久久久密| 亚洲七黄色美女视频| 99热国产这里只有精品6| 99国产精品一区二区三区| 两个人免费观看高清视频| 午夜精品在线福利| 欧美日韩精品网址| 叶爱在线成人免费视频播放| 黄片播放在线免费| 亚洲片人在线观看| 很黄的视频免费| 九色亚洲精品在线播放| 黄色视频,在线免费观看| √禁漫天堂资源中文www| 国产成人欧美| 国产精品 国内视频| 日日摸夜夜添夜夜添小说| 美女午夜性视频免费| 青草久久国产| 久久久久国产精品人妻aⅴ院| 久久中文看片网| 久久这里只有精品19| av免费在线观看网站| 免费高清视频大片| 国产成人啪精品午夜网站| 精品电影一区二区在线| 免费看十八禁软件| 搡老熟女国产l中国老女人| 精品人妻在线不人妻| 国产欧美日韩综合在线一区二区| 变态另类成人亚洲欧美熟女 | 在线观看免费午夜福利视频| 成年版毛片免费区| 欧美激情极品国产一区二区三区| 欧洲精品卡2卡3卡4卡5卡区| 免费在线观看影片大全网站| 亚洲av熟女| 国产99久久九九免费精品| 啦啦啦免费观看视频1| 国产色视频综合| 两性午夜刺激爽爽歪歪视频在线观看 | 极品人妻少妇av视频| 国产精品98久久久久久宅男小说| 精品久久久久久久毛片微露脸| 黑人猛操日本美女一级片| 成人国产一区最新在线观看| 久久久久九九精品影院| 777久久人妻少妇嫩草av网站| 国产免费现黄频在线看| 搡老乐熟女国产| 新久久久久国产一级毛片| a在线观看视频网站| 久久精品亚洲精品国产色婷小说| 久久久国产精品麻豆| 国产人伦9x9x在线观看| 亚洲国产精品999在线| 久久午夜亚洲精品久久| 一级a爱视频在线免费观看| 午夜福利免费观看在线| 日韩大尺度精品在线看网址 | 国产黄色免费在线视频| a级毛片黄视频| 国产一区二区三区在线臀色熟女 | 黑丝袜美女国产一区| 久久久久久久久免费视频了| 亚洲视频免费观看视频| 夫妻午夜视频| avwww免费| 很黄的视频免费| 国产亚洲精品久久久久久毛片| 日韩欧美免费精品| 在线观看舔阴道视频| 在线免费观看的www视频| 精品日产1卡2卡| 日韩欧美国产一区二区入口| 99在线视频只有这里精品首页| 激情在线观看视频在线高清| а√天堂www在线а√下载| 黄色毛片三级朝国网站| 88av欧美| 久久国产精品人妻蜜桃| 久久精品国产清高在天天线| 自拍欧美九色日韩亚洲蝌蚪91| 国产欧美日韩一区二区三区在线| 青草久久国产| 夜夜看夜夜爽夜夜摸 | 国产亚洲精品一区二区www| 日本精品一区二区三区蜜桃| 久久久久精品国产欧美久久久| 国产精品久久久av美女十八| 亚洲成a人片在线一区二区| 免费在线观看影片大全网站| 制服诱惑二区| 日韩中文字幕欧美一区二区| 久久精品91无色码中文字幕| 欧美精品亚洲一区二区| 亚洲欧美一区二区三区黑人| 超碰成人久久| 免费女性裸体啪啪无遮挡网站| 亚洲 欧美一区二区三区| 国产91精品成人一区二区三区| 成人三级做爰电影| 免费少妇av软件| 午夜老司机福利片| 一进一出抽搐gif免费好疼 | 91成人精品电影| 99香蕉大伊视频| 在线观看免费视频日本深夜| 视频在线观看一区二区三区| 老熟妇乱子伦视频在线观看| 狠狠狠狠99中文字幕| 丝袜美足系列| 国产精品日韩av在线免费观看 | 热re99久久精品国产66热6| 男女下面插进去视频免费观看| 91在线观看av| 极品教师在线免费播放| 咕卡用的链子| 亚洲人成77777在线视频| 免费观看精品视频网站| 国产精品二区激情视频| 亚洲欧美日韩高清在线视频| 亚洲精品美女久久久久99蜜臀| 多毛熟女@视频| 欧美在线黄色| 久久久国产成人精品二区 | √禁漫天堂资源中文www| 国产在线观看jvid| 色综合欧美亚洲国产小说| 国产男靠女视频免费网站| 久久香蕉激情| 999久久久国产精品视频| 桃红色精品国产亚洲av| 精品国产超薄肉色丝袜足j| 亚洲精华国产精华精| 亚洲一区中文字幕在线| 国产精品久久久久久人妻精品电影| 宅男免费午夜| 多毛熟女@视频| 亚洲国产看品久久| 成人亚洲精品av一区二区 | 亚洲欧洲精品一区二区精品久久久| 国产在线观看jvid| 一级片'在线观看视频| 免费看a级黄色片| 国产精品秋霞免费鲁丝片| 久久青草综合色| av视频免费观看在线观看| 婷婷丁香在线五月| 久久国产精品男人的天堂亚洲| 免费在线观看亚洲国产| 午夜免费成人在线视频| 亚洲欧美激情综合另类| av天堂在线播放| 久久久精品国产亚洲av高清涩受| 婷婷精品国产亚洲av在线| 热99re8久久精品国产| 一进一出抽搐gif免费好疼 | av欧美777| 精品欧美一区二区三区在线| 国产一区在线观看成人免费| 精品久久久久久成人av| 久久亚洲精品不卡| 国产片内射在线| 国产精品久久久人人做人人爽| 校园春色视频在线观看| 亚洲片人在线观看| 天堂影院成人在线观看| 99精品欧美一区二区三区四区| 最近最新中文字幕大全电影3 | 热re99久久精品国产66热6| 桃红色精品国产亚洲av| 色哟哟哟哟哟哟| 欧美精品一区二区免费开放| 女人被躁到高潮嗷嗷叫费观| 美女 人体艺术 gogo| 亚洲专区中文字幕在线| 热99re8久久精品国产| 伊人久久大香线蕉亚洲五| 国产极品粉嫩免费观看在线| 亚洲 国产 在线| 日本wwww免费看| 国产精品影院久久| av片东京热男人的天堂| 亚洲第一av免费看| 日本三级黄在线观看| 国产xxxxx性猛交| 老司机福利观看| avwww免费| svipshipincom国产片| 两个人免费观看高清视频| 男女高潮啪啪啪动态图| a级片在线免费高清观看视频| 国产人伦9x9x在线观看| 亚洲精品美女久久久久99蜜臀| 黄色怎么调成土黄色| 成年人免费黄色播放视频| 日韩大尺度精品在线看网址 | 99久久国产精品久久久| 亚洲成人免费av在线播放| 国产成人欧美在线观看| 精品国产一区二区三区四区第35| 免费久久久久久久精品成人欧美视频| 久久精品国产清高在天天线| 久久青草综合色| 五月开心婷婷网| 真人做人爱边吃奶动态| 亚洲狠狠婷婷综合久久图片| 亚洲专区字幕在线| 高清黄色对白视频在线免费看| 欧美不卡视频在线免费观看 | www.自偷自拍.com| 国产单亲对白刺激| 两个人免费观看高清视频| 国产高清国产精品国产三级| 国产欧美日韩精品亚洲av| 日韩大尺度精品在线看网址 | 午夜老司机福利片| 成人三级黄色视频| 国产成人啪精品午夜网站| 精品国产美女av久久久久小说| 91大片在线观看| 亚洲av成人av| 欧美日韩国产mv在线观看视频| 99国产综合亚洲精品| 一本大道久久a久久精品| 欧美成人性av电影在线观看| 黑人巨大精品欧美一区二区mp4| 99riav亚洲国产免费| 不卡一级毛片| 人人妻人人澡人人看| 国产精品影院久久| 一级片'在线观看视频| 国产免费av片在线观看野外av| 久久热在线av| 成人亚洲精品一区在线观看| 亚洲va日本ⅴa欧美va伊人久久| 啪啪无遮挡十八禁网站| 亚洲成人免费电影在线观看| 在线观看免费午夜福利视频| 亚洲欧美日韩无卡精品| 在线播放国产精品三级| 久久精品影院6| 在线国产一区二区在线| а√天堂www在线а√下载| 国产精品1区2区在线观看.| 国产精华一区二区三区| 一进一出抽搐gif免费好疼 | 黄片小视频在线播放| 夜夜躁狠狠躁天天躁| 国产一区二区在线av高清观看| 一区二区三区国产精品乱码| 欧美成人性av电影在线观看| 日韩中文字幕欧美一区二区| 国产成人av教育| 日韩成人在线观看一区二区三区| 国产成人啪精品午夜网站| 宅男免费午夜| 色综合婷婷激情| 91av网站免费观看| 亚洲欧美日韩另类电影网站| 一区在线观看完整版| 久久人人97超碰香蕉20202| 久久久国产成人精品二区 | 91精品国产国语对白视频| 成人黄色视频免费在线看| 久久精品91蜜桃| 三级毛片av免费| 天天影视国产精品| 两个人看的免费小视频| 国产成人精品在线电影| 亚洲午夜精品一区,二区,三区| 视频在线观看一区二区三区| 欧美一区二区精品小视频在线| 亚洲免费av在线视频| 一区二区日韩欧美中文字幕| 99精品在免费线老司机午夜| 男女之事视频高清在线观看| 一区二区三区激情视频| 热99re8久久精品国产| 国产真人三级小视频在线观看| av天堂久久9| 亚洲中文av在线| 亚洲va日本ⅴa欧美va伊人久久| 在线观看午夜福利视频| 97碰自拍视频| av网站在线播放免费| 黄片小视频在线播放| 精品高清国产在线一区| 夜夜爽天天搞| 亚洲成人久久性| 国产精品亚洲av一区麻豆| 黄色女人牲交| 中文字幕高清在线视频| 国产成人精品无人区| 中文亚洲av片在线观看爽| 在线观看免费午夜福利视频| 99re在线观看精品视频| xxxhd国产人妻xxx| 18禁美女被吸乳视频| 国产亚洲精品久久久久久毛片| 人人妻人人澡人人看| 美女午夜性视频免费| 91老司机精品| 久久中文字幕人妻熟女| 少妇 在线观看| 精品熟女少妇八av免费久了| 成人三级黄色视频| 精品一区二区三区av网在线观看| 久久久国产精品麻豆| 手机成人av网站| 如日韩欧美国产精品一区二区三区| 婷婷精品国产亚洲av在线| 久久伊人香网站| 久久精品影院6| 99国产精品一区二区三区| 国产精品成人在线| 亚洲自拍偷在线| 搡老乐熟女国产| 亚洲人成77777在线视频| 欧美精品亚洲一区二区| 视频区图区小说| 一区福利在线观看| 久久 成人 亚洲| 国产精品久久久久久人妻精品电影| 老司机靠b影院| 精品欧美一区二区三区在线| 亚洲熟妇中文字幕五十中出 | 91国产中文字幕| 99国产极品粉嫩在线观看| 丰满人妻熟妇乱又伦精品不卡| 国产亚洲欧美在线一区二区| 国产精品国产高清国产av| 久久九九热精品免费| 91成人精品电影| 久久影院123| 露出奶头的视频| 亚洲精品一卡2卡三卡4卡5卡| 亚洲一卡2卡3卡4卡5卡精品中文| 午夜福利欧美成人| 欧美不卡视频在线免费观看 | 巨乳人妻的诱惑在线观看| 我的亚洲天堂| 国产伦人伦偷精品视频| 久久婷婷成人综合色麻豆| 亚洲成a人片在线一区二区| 久久天堂一区二区三区四区| 黑人操中国人逼视频| 交换朋友夫妻互换小说| 好男人电影高清在线观看| 免费av中文字幕在线| 国产亚洲欧美在线一区二区| 国产精品免费视频内射| 日本撒尿小便嘘嘘汇集6| 国产免费av片在线观看野外av| 色综合婷婷激情| 丝袜人妻中文字幕| 午夜免费成人在线视频| 久久人妻av系列| 国产精品av久久久久免费| 一区二区三区激情视频| 亚洲第一欧美日韩一区二区三区| 亚洲熟妇熟女久久| 国产精品久久久久成人av| 嫁个100分男人电影在线观看| 村上凉子中文字幕在线| 黄色怎么调成土黄色| 亚洲av熟女| 天天躁夜夜躁狠狠躁躁| 午夜成年电影在线免费观看| 色综合站精品国产| 黄色成人免费大全| 夜夜夜夜夜久久久久| 亚洲,欧美精品.| 一本大道久久a久久精品| 波多野结衣一区麻豆| 日韩精品免费视频一区二区三区| 国产1区2区3区精品| 久久精品成人免费网站| av天堂在线播放| 久久人人爽av亚洲精品天堂| 狠狠狠狠99中文字幕| 999久久久国产精品视频| www.熟女人妻精品国产| 精品国产乱码久久久久久男人| 精品国产超薄肉色丝袜足j| 婷婷丁香在线五月| 亚洲av日韩精品久久久久久密| 黑人巨大精品欧美一区二区mp4| 成人国语在线视频| 国产精品一区二区三区四区久久 | 男女高潮啪啪啪动态图| 丝袜美腿诱惑在线| 妹子高潮喷水视频| 午夜久久久在线观看| 成在线人永久免费视频| 不卡一级毛片| 日韩欧美在线二视频| 99精国产麻豆久久婷婷| 国产成人欧美| 国产精品永久免费网站| 少妇裸体淫交视频免费看高清 | 香蕉国产在线看| 啦啦啦免费观看视频1| 成人精品一区二区免费| 男人的好看免费观看在线视频 | 99精品在免费线老司机午夜| 亚洲精华国产精华精| 亚洲美女黄片视频| 国产精品电影一区二区三区| 视频在线观看一区二区三区| 国产精品久久久av美女十八| 真人做人爱边吃奶动态| 在线观看免费日韩欧美大片| 国产真人三级小视频在线观看| 亚洲中文日韩欧美视频| 青草久久国产| 一区二区日韩欧美中文字幕| 亚洲一区二区三区不卡视频| 男人操女人黄网站| 久久精品国产亚洲av香蕉五月| 成人精品一区二区免费| 两性夫妻黄色片|