• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Competitive Swarm Optimization with Encryption Based Steganography for Digital Image Security

    2022-08-24 07:03:40AlaEshmawiSulimanAlsuhibanySayedAbdelKhalekandRomanyMansour
    Computers Materials&Continua 2022年8期

    Ala’A.Eshmawi,Suliman A.Alsuhibany,Sayed Abdel-Khalek and Romany F.Mansour

    1Department of Cybersecurity,College of Computer Science and Engineering,University of Jeddah,Jeddah,Saudi Arabia

    2Department of Computer Science,College of Computer,Qassim University,Buraydah,51452,Saudi Arabia

    3Department of Mathematics,College of Science,Taif University,Taif,21944,Saudi Arabia

    4Department of Mathematics,Faculty of Science,New Valley University,El-Kharga,72511,Egypt

    Abstract: Digital image security is a fundamental and tedious process on shared communication channels.Several methods have been employed for accomplishing security on digital image transmission,such as encryption,steganography,and watermarking.Image stenography and encryption are commonly used models to achieve improved security.Besides,optimal pixel selection process (OPSP) acts as a vital role in the encryption process.With this motivation,this study designs a new competitive swarm optimization with encryption based stenographic technique for digital image security,named CSOES-DIS technique.The proposed CSOES-DIS model aims to encrypt the secret image prior to the embedding process.In addition,the CSOES-DIS model applies a double chaotic digital image encryption(DCDIE)technique to encrypt the secret image,and then embedding method was implemented.Also,the OPSP can be carried out by the design of CSO algorithm and thereby increases the secrecy level.In order to portray the enhanced outcomes of the CSOES-DIS model,a comparative examination with recent methods is performed and the results reported the betterment of the CSOES-DIS model based on different measures.

    Keywords: Image security;optimal pixel selection;encryption;metaheuristics;image steganography

    1 Introduction

    A Cryptography system is applied to encrypt the private information prior to embed inside the cover files.Image Steganography is exploited to hide information in an image [1].Next,image selected for this act is called a cover-image,and image accomplished afterward steganography is denoted as stego-image.In Cryptography,2 stages are comprised as Encryption and Decryption[2].At first,encryption is determined as a procedure utilized for transforming the secret messages into an opaque format called cipher-text.Steganography is the task of hiding private messages by hiding their existence.In case of digital steganography,secured messages are covered with audio,image,video,etc.In general,image is employed for cover media since the individual transmit digital images via internet communication and email schemes[3].The authors didn’t focus more on the problems such as when cover image dimension is unsuitable for creating image block to embed for performing information hiding and either this technique is prone to different kinds of stego attack [4].Therefore,further methods needed to be applied namely modification to least amount of pixels or convert coefficient,usage of encrypted form of private message to be implanted [5].Though,several works are needed for choosing appropriate trade-offs among the efficiency metrics like payload capacity,security,and imperceptibility.Now,secure information is transferred through text messages,images,videos,and audio files[6-8].To forward this message in a hidden means,there is necessity for steganography.In the method,the embedded messages in the file are transported to the user at another end,whereby the message is unconcealed[9].Though there are several software accessible online for data security,there is another software that can be used by hackers to decipher the secreted information[10].Fig.1 illustrates the process in image steganography.

    Figure 1:Process in image steganography

    Parvees et al.[11]proposed an effective hybridization of fruit fly optimization(FFO)algorithm and Cat Swarm optimization algorithm(CSO)using ECC for image security,called CSO-FFO-ECC method.The presented approach implements the encryption and decryption method through ECC approach.Also,to minimize the computational time required for the arbitrary choice of the private and public keys,the suggested method employs a hybridization of CSO and FFO algorithm for optimum key choice.Hassaballah et al.[12]designed an approach named Harris hawks optimizationinteger wavelet transform (HHO-IWT) for converting transmission and secured information from the IIoT environments related to digital image steganography.The approach embedded confidential information from the cover image with a metaheuristic optimization approach named HHO for effectively selecting image pixel that is utilized for hiding bits of secreted information with integer wavelet transform.The HHO-based pixel selection process utilizes a main functional assessment based on the subsequent two stages:exploration and exploitation phases.

    Manjunath et al.[13]developed the audio steganography method for secured audio communication based on the metaheuristic model.In the embedding stage,the enhanced immediate selection is performed to embed the confidential message as to input audio.Moreover,the secreted messages that embedding was encoded by the enhanced 2D-Logistic Chaotic Map.The researchers in [14]presented an image Steganography with Secreted Share cryptography(SSC)was taken into account for upgrading the security level,now healthcare image is taken into account for stego image formation method.During the wake of inserting of secreted information with cover image Optimal Discrete Wavelet Transform (DWT) utilized for converting the region,now Daubechies (db2) coefficient is employed,additionally,upgrade the PSNR Continual Harmony Search(CHS)applied for enhancing this coefficient.Finally,SS is performed for low band stego images with higher security procedures.Pandey [15]developed a bit mask oriented genetic approach (BMOGA) related secured medicinal data communication approach.The presented approach is employed for minimizing the replication of medicinal test data that is transported over organization.Healthcare information is taken into account as highly sensitive,thus secured medicinal data communication is essential.BOMGA exploits Boolean related mask-fill operator and performs reproduction operation in two distinct stages which assist in avoiding premature convergences.

    This study designs a new competitive swarm optimization with encryption based stenographic technique for digital image security,named CSOES-DIS technique.The proposed CSOES-DIS model aims to encrypt the secret image prior to the embedding process.In addition,the CSOES-DIS model applies a double chaotic digital image encryption (DCDIE) technique to encrypt the secret image,and then embedded procedure was executed.Also,the OPSP can be carried out by the design of CSO algorithm and thereby increases the secrecy level.In order to portray the enhanced outcomes of the CSOES-DIS model,a comparative examination with recent methods is performed and results are investigated under several measures.

    2 The Proposed Model

    This study designs a new competitive swarm optimization with encryption based stenographic technique for digital image security,named CSOES-DIS technique.The proposed CSOES-DIS model aims to encrypt the secret image prior to the embedding process.In addition,the CSOES-DIS model applies a double chaotic digital image encryption (DCDIE) technique to encrypt the secret image,and then embedded method was executed.Also,the OPSP can be carried out by the design of CSO algorithm and thereby increases the secrecy level.

    2.1 Encryption Using DCDIE Technique

    At the initial stage,the secret image is encrypted by the use of DCDIE technique.To cryptographic structure of digital images,the plaintext space P is equivalent to group of pixels of a novel digital image which requires that encryption,and ciphertext spaces C equivalent to group of image pixels afterward the encrypted.The ciphertext spaces C obtianed with plaintext space P afterward encrypted is transferred from insecure channels.The keyKis important to apply encrypt and decrypt transformed operations[16].A similar key can be utilized to distinct encryption as well as decryption keys based on the selectively encrypted technique,or distinct keys are utilized.During the key space {K},the control execution of encryption technique was recognized that is a space collected of fundamental data grasped by combined of plaintext as well as ciphertext spaces.These 2 chaotic series generators contained from the encrypted and decrypted procedures are the key elements of encrypted method.It can be responsible to realized of image encryption technique of the method.It can be executed by 2 chaotic maps,thus it is named as double chaotic digital image encrypt method,and other elements mostly contain the encryption as well as decryption element and broadcast component.

    Encryption and decryption modules

    An image encryption procedure of double chaotic digital image encrypts technique comprises of 2 procedures of confusion as well as scrambling procedure [16].The confusion method is for XOR the pixel matrix of images with amount of pseudo-random order X and the scrambling approach is also handled by pseudo-random order information attained by logistic chaotic map.The confusion technique is as follows:

    ? Submitting the primary valuesaandbfor pseudorandom sequence number(PSN)computation method,and fixed the computation parameterμ1=3 of L1 for calculating the PSNX.

    ? Compute each element of PSN from(xi×256)mod256,afterward converts the computed outcome as binary,so achieving a binaryM×Nlong series number.

    ? Develop the pixel gray/color modules order of digital images that encryption and obtain the gray/color elements order vector G of digital images.

    ? In order to the primary elementgifromG,XOR was executed based onX′⊕gi.To succeeding element fromG,it can be computed based on the subsequent equation:

    wherekimplies thekpixel from the image.

    ? Reversed the pixel sequence gained from the 4th step,change the novelM×Nelement to primary place,and alter the novelM×(N-1)element to secondary place.Next,based on Eq.(1),the secondary obfuscation procedure was implemented.

    An image scrambling technique is as follows:

    ? Utilizing the PSNXof confusion approach as last setXof PSN.

    ? Utilizing the vectorYattained from preceding stage and the encrypting imageI′afterward the confusion procedure,the pixel was scrambling toI′.Specifically,the gray value ofithpixel as well as gray values ofyith pixel fromI′is replaced.

    ? TheIwas homogenization and empty vectorsYofM×Nsize is fixed,and X equivalent component is extended for integers domain space of(0,M×N)based on homogenized ofXcomponent,and the outcome was expressed to vectorY.

    ? The outcome of scrambling was over exposed for round of positive as well as revering sequences confusions based on the 4th and 5th steps from the confusion approach,so attaining the last encrypt imageI′′.

    As per scrambling and confusion procedure,the double chaotic digital image encrypts method adapts the technique of primary confusing and afterward scrambled for encrypting images.The procedure of images decrypted was carried out by primary scrambling afterward confusion,and the function was inverse function of the above procedure.During the case of confusion inverse procedure,the succeeding techniques were utilized.

    2.2 CSO Based Pixel Selection Approach

    In order to embed the secret image into the cover image,the optimal pixels are chosen by the design of CSO algorithm.CSO is the latest SI based technique,fundamentally simulated in PSO approach,but the model is extremely complex in typical PSO.During the CSO neither individual optimum nor global optimum are involved from the place upgrade process of particles.Assume thatnamount of particles,S(t)refers to that primary swarm.All the particles refer the potential solution.In order to all particles dimensionalDis similar.The swarmS(t)hasnparticles,from all iterationsn/2 pairs are arbitrarily assigned,and then competition was developed amongst 2 from all the pairs of particles[17].Thus the outcome of competition,the particle containing optimum fitness value,henceforth named as ‘winner’,is distributed directly to next iteration of swarms,S(t+1),but the particle which loses the competition named as‘loser’,is upgrading their velocity and position by learning in the winner.During all iterations,a particle contains after that competition.Specifically,to a swarm size ofn,n/2 competition takes place and both namely velocity as well as position,ofn/2 particles are only be upgraded.Assume that represent the velocity as well as position of winner and loser frommthround of competitions from the iterationtwithVw,m(t),Vl,m(t),andXw,m(t),Xl,m(t)correspondingly,wherem=1,2,3,...,n/2.Fig.2 demonstrates the search process of CSO technique.

    Figure 2:Search process of CSO algorithm

    Based on the fundamental model of CSO,afterwardmthround of competitions the velocity as well as position of losers are upgraded utilizing subsequent learning methods:

    where,r1(m,t),r2(m,t)andr3(m,t)∈[0,1]and(t)implies the mean position is determined from 2 approaches are global and local means represented as(t)-andXg l (t).Xgm(t)implies the global mean place of every particle,but(t)-signifies the local mean of existing neighborhood of particlesk.φexist the parameter that controls the effect of(t).

    In order to optimum knowledge of CSO,it can project any connected comparative with PSO as follows[17]:

    ? A primary partr1(m,t)×Vl,m(t)is same as inertia term from typical PSO that balances the movement of swarms,the only variance is inertia weightwwhich is exchanged by an arbitrary vectorr1(m,t)from CSO technique.

    ? The secondary partr2(m,t)×is same as the cognitive element from typical PSO technique,but,it can be conceptually extremely complex in typical PSO technique,the particle loses their competition learned in winner,before their individual optimum initiate to this point.This technique was further possible but inspiring performance of swarm,as it can be hard for remembering their individual optimum experience to this point.

    ? The tertiary partr3(m,t)×is identical to the social element from typical PSO,but,particle lose competition learned in the mean position insteadgbestfrom typical PSO,no memory has needed that is further possible biologically.

    The FF was utilized to validate the quality of particles.The purpose of CSO is for finding the particle position which outcome optimum estimation of provided FF.All the particles are allocated with an arbitrary position as well as velocity from the initialized procedure of CSO technique.In CSO technique is most recent swarm optimized techniques dependent upon PSO.The CSO algorithm has derived a fitness function involving the maximization of PSNR.It can be represented as follows.

    2.3 Embedding and Extraction Process

    For a provided covered image C,the encoding confidential communication ES was hidden as to cover image as follows.Primary,an IWT procedure was employed for transforming C in their spatial domain as to the frequency domains.The outcome of alteration was subdivision of images as to 4 subblocks(subbands)determined as high low(HL),high high(HH),low low(LL),and low high(LH),whereas ES is only embedding from the LH,HL,and HH subblocks askbits from the k-LSBs of all pixels.Afterward hiding every confidential information from the particular subbands,the subband was fed as to OPAP for minimizing the variance amongst the altered coefficients and novel ones.

    Afterward,the inverse transformation procedure of IWT was shown for combining the subbands composed again and creating the stegoimage.For removing the confidential communication,the stegoimage was transformed to frequency domain utilizing IWT.Afterward,thekleast significant bits are removed in all pixels of LH,HL,and HH subbands.The removed bits are encoder procedure ES.It can be decoder removal bits with encoder vector Ev for obtaining novel bits.Eventually,the bits are transformed for obtaining the confidential image S.

    3 Experimental Validation

    The experimental result analysis of the CSOES-DIS model is performed using benchmark images.The results are investigated interms of distinct measures.Some sample images are shown in Fig.3.

    Figure 3:(Continued)

    Figure 3:Sample test images

    Tab.1 and Fig.4 report the overall outcomes offered by the CSOES-DIS model for distinct cover and secret images.The experimental outcomes indicated that the CSOES-DIS model has accomplished effectual outcomes under all images.For instance,with cover image as ‘Lena’and secret image as‘Lena’,the CSOES-DIS model has attained MSE of 0.1400,RMSE of 0.3742,PSNR of 56.6695 dB,SSIM of 0.9984,and QI of 1.0000.Next,with cover image as‘Jet’and secret image as‘Jet’,the CSOESDIS model has attained MSE of 0.1800,RMSE of 0.4243,PSNR of 55.5781 dB,SSIM of 0.9983,and QI of 1.0000.In line with,with cover image as ‘Boat’and secret image as ‘Boat’,the CSOES-DIS model has attained MSE of 0.2000,RMSE of 0.4472,PSNR of 55.1205 dB,SSIM of 0.9980,and QI of 1.0000.

    Table 1:Overall steganography result analysis of CSOES-DIS model

    Figure 4:Steganography and encryption results of CSOES-DIS model

    A brief computation time(CT)examination of the CSOES-DIS model is inspected under distinct cover images interms of embedding time(EBT),extraction time(EXT),and total time(TT)in Tab.2 and Fig.5.The results indicated that the CSOES-DIS model has gained minimal CT under all cover images.For instance,with cover image as‘Lena’,the CSOES-DIS model has provided EBT,EXT,and TT of 0.4562,0.3883,and 0.8445 min respectively.Moreover,with cover image as‘Jet’,the CSOES-DIS model has achieved EBT,EXT,and TT of 0.4930,0.3483,and 0.8413 min respectively.Furthermore,with cover image as‘Boat’,the CSOES-DIS model has obtained EBT,EXT,and TT of 0.3998,0.4437,and 0.8435 min respectively.

    Table 2:CT analysis of CSOES-DIS model under various cover images

    Figure 5:Comparative CT analysis of CSOES-DIS model under various cover images

    A comparative PSNR study of the CSOES-DIS model is carried out with existing techniques under several cover images in Tab.3 and Fig.6.The results indicated that the CSOES-DIS model has resulted in higher PSNR values under all cover images.For instance,under‘Lena’image,the CSOESDIS model has offered increased PSNR of 56.67 dB whereas the HPSM-WPT,AIS-HOG,IWT-PSO,and NIS-IITS models have obtained decreased PSNR values of 32.27,36.32,35.68,and 37.26 dB respectively.Meanwhile,under‘Boat’image,the CSOES-DIS model has accomplished higher PSNR of 55.12 dB whereas the HPSM-WPT,AIS-HOG,IWT-PSO,and NIS-IITS models have depicted lower PSNR values of 32.47,35.95,36.27,and 37.35 dB respectively.

    Table 3:PSNR analysis of CSOES-DIS model under various cover images

    Figure 6:Comparative PSNR Analysis of CSOES-DIS model under various cover images

    Finally,a comprehensive result analysis of the CSOES-DIS model under distinct kinds of attacks is provided in Tab.4.

    Table 4:Overall results of CSOES-DIS model under different kinds of attacks

    Fig.7 offers a detailed SC examination of the CSOES-DIS model under various types of attacks.The figure portrayed that the CSOES-DIS model has attained increased values of SC under every attack.For instance,the CSOES-DIS model has achieved enhanced SC of 0.9956 under the existence of erosion attacks.Likewise,the CSOES-DIS model has attained improved SC of 0.9975 under the existence of Gaussian attack.Moreover,the CSOES-DIS model has obtained increased SC of 0.9962 under the existence of dilation attack.Furthermore,the CSOES-DIS model has demonstrated better SC of 0.9952 under the existence of motion blur attack.

    Figure 7:NC analysis of CSOES-DIS model under different kinds of attacks

    Fig.8 provides a brief NAE investigation of the CSOES-DIS model under numerous kinds of attacks.The figure depicted that the CSOES-DIS model has achieved increased values of NAE under every attack.For instance,the CSOES-DIS model has attained reduced NAE of 0.5060 under the existence of erosion attacks.Likewise,the CSOES-DIS model has accomplished effective NAE of 0.5270 under the existence of Gaussian attack.Besides,the CSOES-DIS model has gained NAE of 0.5360 under the existence of dilation attack.Also,the CSOES-DIS model has demonstrated NAE of 0.5080 under the existence of motion blur attack.

    Figure 8:NC analysis of CSOES-DIS model under different kinds of attacks

    Fig.9 illustrates a comprehensive RMSE inspection of the CSOES-DIS model under various types of attacks.The figure portrayed that the CSOES-DIS model has reached increased values of RMSE under every attack.For instance,the CSOES-DIS model has achieved RMSE of 9.8180 under the existence of erosion attacks.Also,the CSOES-DIS model has attained RMSE of 8.9320 under the existence of Gaussian attack.Additionally,the CSOES-DIS model has obtained RMSE of 8.5020 under the existence of dilation attack.Also,the CSOES-DIS model has demonstrated better RMSE of 9.8700 under the existence of motion blur attack.After observing the detailed result analysis,it can be ensured that the CSOES-DIS model has accomplished better outcomes than the other methods.

    Figure 9:RMSE analysis of CSOES-DIS model under different kinds of attacks

    4 Conclusion

    In this study,a new CSOES-DIS technique has been developed for accomplishing maximum image security.It mainly intends to encrypt the secret image prior to the embedding process.Moreover,the DCDIE technique is applied for the encryption of secret images and then embedded into the cover image by the use of CSO based OPSP process.The OPSP can be carried out by the design of CSO algorithm and thereby increases the secrecy level.In order to portray the enhanced outcomes of the CSOES-DIS model,a comparative examination with recent methods is performed and results are investigated under several measures.The experimental results reported the betterment of the CSOESDIS model based on different measures.In future,the CSOES-DIS technique can be placed in the real time healthcare environment for secured medical image transmission.

    Funding Statement:Taif University Researchers Supporting Project Number(TURSP-2020/154),Taif University,Taif,Saudi Arabia.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    午夜免费观看性视频| 中文字幕制服av| 日韩大片免费观看网站| 成年女人在线观看亚洲视频 | 亚洲综合精品二区| 久久久久久久久久人人人人人人| 97热精品久久久久久| 亚洲欧美一区二区三区黑人 | 国产伦精品一区二区三区视频9| 又黄又爽又刺激的免费视频.| 精品久久国产蜜桃| 久久久久久久亚洲中文字幕| eeuss影院久久| a级一级毛片免费在线观看| 亚洲精品影视一区二区三区av| 成人黄色视频免费在线看| 久久久精品免费免费高清| 一级a做视频免费观看| 黄色欧美视频在线观看| 在线观看国产h片| 日韩强制内射视频| 亚洲精品一二三| 国产 精品1| 爱豆传媒免费全集在线观看| 99re6热这里在线精品视频| 国产精品熟女久久久久浪| 中文字幕av成人在线电影| 中文字幕亚洲精品专区| av一本久久久久| 国产黄片美女视频| 国产v大片淫在线免费观看| 国产高清国产精品国产三级 | 国产精品麻豆人妻色哟哟久久| 欧美日韩视频高清一区二区三区二| 国产成人精品久久久久久| 亚洲丝袜综合中文字幕| 一个人观看的视频www高清免费观看| 国产精品无大码| 黄色配什么色好看| 欧美丝袜亚洲另类| 久久久久久国产a免费观看| 亚洲av日韩在线播放| 亚洲人成网站在线播| 最近2019中文字幕mv第一页| 亚洲国产av新网站| 国产精品不卡视频一区二区| 国内精品宾馆在线| a级毛片免费高清观看在线播放| 久久久久久九九精品二区国产| 日本一本二区三区精品| 黄色视频在线播放观看不卡| 久久精品综合一区二区三区| 男女啪啪激烈高潮av片| 亚洲国产日韩一区二区| 女的被弄到高潮叫床怎么办| 亚洲,一卡二卡三卡| 在线观看一区二区三区| 最近中文字幕2019免费版| 久久久久久久久久久丰满| 天天躁日日操中文字幕| 日日撸夜夜添| 我的老师免费观看完整版| 国产一级毛片在线| 黄片wwwwww| 国产大屁股一区二区在线视频| 亚洲国产精品专区欧美| av线在线观看网站| 精品久久久久久久久av| 日韩欧美一区视频在线观看 | 精品国产三级普通话版| 久久久久久久国产电影| 九九久久精品国产亚洲av麻豆| 日韩视频在线欧美| 国产一区亚洲一区在线观看| 日韩欧美一区视频在线观看 | 国产片特级美女逼逼视频| 国产伦在线观看视频一区| 岛国毛片在线播放| 97超碰精品成人国产| 黄色欧美视频在线观看| 九色成人免费人妻av| av.在线天堂| 高清在线视频一区二区三区| 在线免费十八禁| 精品一区在线观看国产| 在线观看av片永久免费下载| 人妻一区二区av| 国产精品一二三区在线看| 毛片一级片免费看久久久久| 免费播放大片免费观看视频在线观看| 乱码一卡2卡4卡精品| 久久久久久伊人网av| 亚洲第一区二区三区不卡| 欧美变态另类bdsm刘玥| 建设人人有责人人尽责人人享有的 | 国产成人精品婷婷| 久久久亚洲精品成人影院| 97超碰精品成人国产| 国产精品国产三级国产专区5o| 91久久精品国产一区二区三区| 边亲边吃奶的免费视频| 真实男女啪啪啪动态图| 日韩亚洲欧美综合| 又粗又硬又长又爽又黄的视频| 亚洲av日韩在线播放| 国产午夜精品一二区理论片| 亚洲国产最新在线播放| 日韩不卡一区二区三区视频在线| 91精品一卡2卡3卡4卡| 久久99热6这里只有精品| 一级毛片电影观看| 久久99精品国语久久久| 欧美+日韩+精品| 天堂俺去俺来也www色官网| 婷婷色综合www| 国产精品久久久久久av不卡| 亚洲一级一片aⅴ在线观看| 白带黄色成豆腐渣| 熟妇人妻不卡中文字幕| 一区二区三区四区激情视频| 中文天堂在线官网| 人人妻人人看人人澡| 三级国产精品片| 激情 狠狠 欧美| 亚洲欧美成人综合另类久久久| 成人亚洲精品一区在线观看 | 久久午夜福利片| 免费av毛片视频| 91午夜精品亚洲一区二区三区| 最近中文字幕2019免费版| 91精品一卡2卡3卡4卡| 晚上一个人看的免费电影| 亚洲va在线va天堂va国产| 深爱激情五月婷婷| av又黄又爽大尺度在线免费看| 精品人妻视频免费看| 日本黄大片高清| 三级经典国产精品| 中文字幕亚洲精品专区| 成年人午夜在线观看视频| 一二三四中文在线观看免费高清| 亚洲精品色激情综合| 91aial.com中文字幕在线观看| 在线天堂最新版资源| 内射极品少妇av片p| 亚洲在线观看片| 一级av片app| 人妻少妇偷人精品九色| 一个人观看的视频www高清免费观看| 男女国产视频网站| 精品人妻视频免费看| 免费观看av网站的网址| 人人妻人人爽人人添夜夜欢视频 | 直男gayav资源| 18禁在线无遮挡免费观看视频| 高清av免费在线| 亚洲欧美精品专区久久| 日本黄大片高清| 三级经典国产精品| 欧美一级a爱片免费观看看| 中文字幕免费在线视频6| 国产精品一区www在线观看| 一区二区三区四区激情视频| 国产亚洲91精品色在线| 亚洲天堂av无毛| 国产精品国产三级专区第一集| 免费观看在线日韩| 免费看光身美女| 国产色爽女视频免费观看| 欧美成人精品欧美一级黄| 亚洲欧美日韩卡通动漫| 色网站视频免费| 蜜桃久久精品国产亚洲av| 日韩av免费高清视频| 欧美激情久久久久久爽电影| 亚洲国产色片| 日日啪夜夜撸| 99热这里只有精品一区| 日韩强制内射视频| 美女脱内裤让男人舔精品视频| 国产片特级美女逼逼视频| 婷婷色麻豆天堂久久| 又爽又黄无遮挡网站| 国产成年人精品一区二区| 肉色欧美久久久久久久蜜桃 | 97人妻精品一区二区三区麻豆| 91久久精品电影网| 永久网站在线| 成年版毛片免费区| 看黄色毛片网站| videos熟女内射| 成年av动漫网址| 蜜桃亚洲精品一区二区三区| 99热6这里只有精品| 亚洲高清免费不卡视频| 国产成人a∨麻豆精品| 美女cb高潮喷水在线观看| 欧美一区二区亚洲| 亚洲av福利一区| 国内揄拍国产精品人妻在线| 国产精品福利在线免费观看| 中文天堂在线官网| 看十八女毛片水多多多| 欧美老熟妇乱子伦牲交| 美女被艹到高潮喷水动态| 一级av片app| 99热全是精品| 简卡轻食公司| 亚洲最大成人手机在线| 一区二区三区乱码不卡18| 啦啦啦中文免费视频观看日本| 国产一区亚洲一区在线观看| 久久久久精品久久久久真实原创| 中文欧美无线码| 午夜福利在线在线| 男女啪啪激烈高潮av片| 国内少妇人妻偷人精品xxx网站| 久久久久国产网址| 尾随美女入室| 老师上课跳d突然被开到最大视频| 一个人观看的视频www高清免费观看| 国产精品av视频在线免费观看| 麻豆成人av视频| 午夜激情福利司机影院| 亚洲最大成人av| 久久久久久九九精品二区国产| 男人添女人高潮全过程视频| 91精品伊人久久大香线蕉| 亚洲成人中文字幕在线播放| 亚洲最大成人中文| 亚洲不卡免费看| 亚洲aⅴ乱码一区二区在线播放| 国产精品成人在线| 久久精品国产亚洲av涩爱| 韩国高清视频一区二区三区| 少妇的逼好多水| 91午夜精品亚洲一区二区三区| 熟女av电影| 国产精品一二三区在线看| 欧美日韩视频高清一区二区三区二| 亚洲av电影在线观看一区二区三区 | 一级a做视频免费观看| 久久久国产一区二区| 亚洲内射少妇av| 少妇人妻久久综合中文| 欧美bdsm另类| 七月丁香在线播放| 免费av毛片视频| 又粗又硬又长又爽又黄的视频| 黑人高潮一二区| 日韩三级伦理在线观看| 国产黄a三级三级三级人| 久久久精品欧美日韩精品| av国产精品久久久久影院| 免费观看无遮挡的男女| 国产成人a∨麻豆精品| 一个人观看的视频www高清免费观看| 国产亚洲午夜精品一区二区久久 | 干丝袜人妻中文字幕| 新久久久久国产一级毛片| 国产大屁股一区二区在线视频| 国产淫语在线视频| av专区在线播放| 人人妻人人看人人澡| 尾随美女入室| 欧美日韩综合久久久久久| 亚洲精品亚洲一区二区| 2022亚洲国产成人精品| 神马国产精品三级电影在线观看| av国产免费在线观看| 亚洲欧洲国产日韩| 国产伦精品一区二区三区视频9| 最近最新中文字幕免费大全7| 大码成人一级视频| 偷拍熟女少妇极品色| 久久午夜福利片| 免费观看无遮挡的男女| 日韩制服骚丝袜av| 网址你懂的国产日韩在线| 99久久精品国产国产毛片| 色网站视频免费| 国产男女超爽视频在线观看| 男女下面进入的视频免费午夜| 男女边摸边吃奶| videos熟女内射| 国产亚洲一区二区精品| videossex国产| 中文字幕亚洲精品专区| 99久久人妻综合| 男人添女人高潮全过程视频| 午夜精品一区二区三区免费看| 亚洲天堂国产精品一区在线| 亚洲丝袜综合中文字幕| a级一级毛片免费在线观看| 亚洲欧美成人精品一区二区| 亚洲成色77777| 久久女婷五月综合色啪小说 | 精品熟女少妇av免费看| 日韩一本色道免费dvd| 精华霜和精华液先用哪个| 亚洲美女视频黄频| 最近最新中文字幕免费大全7| 国产精品三级大全| 欧美性猛交╳xxx乱大交人| 欧美成人a在线观看| 精品一区二区三区视频在线| av女优亚洲男人天堂| 久久久久国产精品人妻一区二区| 亚洲精品成人av观看孕妇| 成人亚洲精品av一区二区| 国产久久久一区二区三区| 国产精品麻豆人妻色哟哟久久| 成年版毛片免费区| 日韩不卡一区二区三区视频在线| 亚洲精品影视一区二区三区av| 三级国产精品片| 免费看日本二区| 国产久久久一区二区三区| 99久久人妻综合| 午夜精品一区二区三区免费看| 尤物成人国产欧美一区二区三区| av在线app专区| 免费av观看视频| 国产高清不卡午夜福利| 日本与韩国留学比较| 爱豆传媒免费全集在线观看| 欧美精品国产亚洲| 国产精品三级大全| 王馨瑶露胸无遮挡在线观看| 国产美女午夜福利| 国产久久久一区二区三区| 成人美女网站在线观看视频| 伊人久久精品亚洲午夜| 肉色欧美久久久久久久蜜桃 | 午夜老司机福利剧场| 国产老妇伦熟女老妇高清| 在线亚洲精品国产二区图片欧美 | 国产在线一区二区三区精| 波多野结衣巨乳人妻| 久久女婷五月综合色啪小说 | 最近最新中文字幕免费大全7| 国产精品精品国产色婷婷| 久久久色成人| 香蕉精品网在线| 大又大粗又爽又黄少妇毛片口| 波野结衣二区三区在线| 亚洲精品日韩av片在线观看| 国产黄a三级三级三级人| 女人十人毛片免费观看3o分钟| 久久精品夜色国产| 日本三级黄在线观看| 国产成人一区二区在线| 一级毛片黄色毛片免费观看视频| 街头女战士在线观看网站| 在线观看三级黄色| 国产成人a∨麻豆精品| 久久久久性生活片| 免费黄频网站在线观看国产| 午夜精品国产一区二区电影 | 久久ye,这里只有精品| 色吧在线观看| 只有这里有精品99| 国产精品一区二区性色av| 黄色配什么色好看| 九草在线视频观看| 久久鲁丝午夜福利片| 一个人看视频在线观看www免费| 尾随美女入室| 欧美激情国产日韩精品一区| 日韩,欧美,国产一区二区三区| 熟女av电影| 欧美人与善性xxx| 中国美白少妇内射xxxbb| av在线亚洲专区| 十八禁网站网址无遮挡 | 欧美日韩视频高清一区二区三区二| 亚洲人与动物交配视频| 大又大粗又爽又黄少妇毛片口| 欧美最新免费一区二区三区| 久久久久精品久久久久真实原创| 日日摸夜夜添夜夜爱| 久热久热在线精品观看| 99久久九九国产精品国产免费| 成人国产麻豆网| 一区二区三区免费毛片| 国产乱人偷精品视频| 夜夜看夜夜爽夜夜摸| 黑人高潮一二区| 国产美女午夜福利| 女人久久www免费人成看片| 国产精品久久久久久精品电影| 大片免费播放器 马上看| 新久久久久国产一级毛片| 全区人妻精品视频| 国产精品国产三级国产av玫瑰| 国产亚洲精品久久久com| 真实男女啪啪啪动态图| 国产精品久久久久久久电影| 国产精品国产三级国产av玫瑰| 一本一本综合久久| 成人欧美大片| 自拍偷自拍亚洲精品老妇| 色视频在线一区二区三区| 国产一级毛片在线| 免费大片黄手机在线观看| 丰满人妻一区二区三区视频av| 美女内射精品一级片tv| av在线app专区| av网站免费在线观看视频| av在线天堂中文字幕| 国产69精品久久久久777片| 久久精品国产亚洲av涩爱| 日韩精品有码人妻一区| 亚洲婷婷狠狠爱综合网| 天堂网av新在线| 亚洲精品亚洲一区二区| 欧美日韩视频高清一区二区三区二| 成人亚洲精品av一区二区| 亚洲欧美一区二区三区黑人 | 国产 一区精品| 69人妻影院| 日本三级黄在线观看| 你懂的网址亚洲精品在线观看| 亚洲av免费在线观看| 麻豆成人午夜福利视频| kizo精华| 视频区图区小说| 老司机影院成人| 久久久欧美国产精品| 亚洲熟女精品中文字幕| 七月丁香在线播放| 亚洲国产最新在线播放| 国产一区有黄有色的免费视频| 欧美精品一区二区大全| 97超视频在线观看视频| 免费观看性生交大片5| 91精品国产九色| 成人美女网站在线观看视频| 国产精品一区二区性色av| 舔av片在线| 亚洲人成网站在线播| 永久网站在线| 国产精品三级大全| 国产一级毛片在线| .国产精品久久| 一级片'在线观看视频| 青春草国产在线视频| 少妇高潮的动态图| av又黄又爽大尺度在线免费看| 成年人午夜在线观看视频| 秋霞伦理黄片| 国产 一区精品| 插阴视频在线观看视频| 亚洲av中文字字幕乱码综合| 精品午夜福利在线看| 又爽又黄无遮挡网站| av卡一久久| 一级av片app| 国产老妇女一区| 亚洲精品国产成人久久av| 亚洲国产成人一精品久久久| 高清午夜精品一区二区三区| 搡老乐熟女国产| av在线app专区| 中文字幕av成人在线电影| 免费观看性生交大片5| 真实男女啪啪啪动态图| 亚洲av中文av极速乱| 嫩草影院入口| 国产视频内射| 少妇高潮的动态图| 日韩制服骚丝袜av| 亚洲欧美一区二区三区国产| 亚洲无线观看免费| 免费av毛片视频| 国产中年淑女户外野战色| 大香蕉久久网| 男女边吃奶边做爰视频| 亚洲国产成人一精品久久久| 亚洲欧美一区二区三区黑人 | 狂野欧美激情性xxxx在线观看| 国产在线一区二区三区精| 亚洲精品久久久久久婷婷小说| 能在线免费看毛片的网站| 亚洲精华国产精华液的使用体验| 国产成人免费观看mmmm| 日韩一区二区三区影片| 99视频精品全部免费 在线| 亚洲av电影在线观看一区二区三区 | 国产免费又黄又爽又色| 2022亚洲国产成人精品| 日韩免费高清中文字幕av| 亚洲精华国产精华液的使用体验| 一级毛片 在线播放| 国产精品国产三级国产专区5o| 国产av码专区亚洲av| 午夜免费鲁丝| 欧美潮喷喷水| 亚洲av男天堂| 欧美3d第一页| 亚洲精品自拍成人| 婷婷色综合www| 欧美激情久久久久久爽电影| 久久久久久国产a免费观看| av黄色大香蕉| av国产免费在线观看| 欧美xxxx性猛交bbbb| 九九在线视频观看精品| 国产高清有码在线观看视频| 赤兔流量卡办理| av又黄又爽大尺度在线免费看| 狠狠精品人妻久久久久久综合| 亚洲精品自拍成人| 亚洲最大成人手机在线| 色网站视频免费| 18禁裸乳无遮挡免费网站照片| 伦精品一区二区三区| 国产男人的电影天堂91| 日本三级黄在线观看| 亚洲熟女精品中文字幕| 下体分泌物呈黄色| 国产av码专区亚洲av| 久久久久久久精品精品| 久久精品熟女亚洲av麻豆精品| 黄片无遮挡物在线观看| 久久99热这里只频精品6学生| 欧美日韩亚洲高清精品| 国产欧美亚洲国产| 日本wwww免费看| 高清欧美精品videossex| 亚洲三级黄色毛片| 日韩欧美 国产精品| 91久久精品国产一区二区三区| 麻豆精品久久久久久蜜桃| 国产伦理片在线播放av一区| 街头女战士在线观看网站| 亚洲色图综合在线观看| 久久精品国产亚洲av天美| 大陆偷拍与自拍| 自拍欧美九色日韩亚洲蝌蚪91 | 青春草国产在线视频| 岛国毛片在线播放| 各种免费的搞黄视频| 韩国av在线不卡| 亚洲国产日韩一区二区| 亚洲av.av天堂| 97精品久久久久久久久久精品| 尾随美女入室| 26uuu在线亚洲综合色| 亚洲欧美中文字幕日韩二区| 欧美日韩一区二区视频在线观看视频在线 | av又黄又爽大尺度在线免费看| 精品99又大又爽又粗少妇毛片| 国产精品福利在线免费观看| 久久精品夜色国产| 亚洲av日韩在线播放| 最后的刺客免费高清国语| 三级经典国产精品| av在线播放精品| 亚洲在久久综合| 超碰av人人做人人爽久久| 中国美白少妇内射xxxbb| 国产精品爽爽va在线观看网站| 美女被艹到高潮喷水动态| 色吧在线观看| 亚洲图色成人| 26uuu在线亚洲综合色| 国产精品久久久久久久久免| 亚洲激情五月婷婷啪啪| 久久久久网色| 午夜福利在线观看免费完整高清在| 丝袜美腿在线中文| 国产伦精品一区二区三区四那| eeuss影院久久| 国产精品一区www在线观看| 成人高潮视频无遮挡免费网站| 国产成人91sexporn| 狂野欧美激情性bbbbbb| 欧美老熟妇乱子伦牲交| 久久久久久久久大av| 亚洲精品第二区| 国内少妇人妻偷人精品xxx网站| 亚洲国产色片| av网站免费在线观看视频| 人妻少妇偷人精品九色| 国产爱豆传媒在线观看| 51国产日韩欧美| 欧美精品人与动牲交sv欧美| 人妻少妇偷人精品九色| 亚洲精品亚洲一区二区| 麻豆乱淫一区二区| 黄片无遮挡物在线观看| 亚洲精品中文字幕在线视频 | 青春草亚洲视频在线观看| 亚洲性久久影院| 91在线精品国自产拍蜜月| 看免费成人av毛片| 在线观看免费高清a一片| 在线a可以看的网站| 最近手机中文字幕大全| 日本黄大片高清| 国产人妻一区二区三区在| 日韩av在线免费看完整版不卡| 麻豆精品久久久久久蜜桃| 国产精品成人在线| 欧美 日韩 精品 国产| 久久精品国产自在天天线| 直男gayav资源| 各种免费的搞黄视频| 男人添女人高潮全过程视频| 有码 亚洲区| 亚洲精华国产精华液的使用体验| 欧美一区二区亚洲| 九草在线视频观看| 欧美xxxx黑人xx丫x性爽|