• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Exponential sine chaotification model for enhancing chaos and its hardware implementation

    2022-08-31 09:56:28RuiWang王蕊MengYangLi李孟洋andHaiJunLuo羅海軍
    Chinese Physics B 2022年8期
    關(guān)鍵詞:海軍

    Rui Wang(王蕊) Meng-Yang Li(李孟洋) and Hai-Jun Luo(羅海軍)

    1College of Physics and Electronic Engineering,Chongqing Normal University,Chongqing 401331,China

    2National Center for Applied Mathematics in Chongqing,Chongqing 401331,China

    3The University of Chicago,Chicago 60637,United States of America

    Keywords: chaotic system,nonlinear system,image encryption,hardware implementation

    1. Introduction

    In 1963, Lorenz introduced the deterministic aperiodic flow model and the butterfly effect.[1]From then on, people have come to be aware of the field of chaos. Chaos theory,subsequently developed as a subfield of nonlinear science,[2]studies the behaviors of dynamical systems that have definite but unpredictable motions. The behavior of chaotic systems is determined by their initial states,yet it is impossible to predict long-term actions as they are sensitive to the slightest change in the initial states.[3]Those characteristics,such as initial state sensitivity,unpredictability,fractal dimension,and ergodicity,push chaotic systems to be widely studied and applied in many scenarios,such as personal information security,[4]communication systems,[5]and power systems.[6]

    Presently, many chaotic systems have been developed for various applications, such as chaotic synchronization,[7,8]chaotic secure communication,[9]chaotic cryptography,[10,11]and chaotic neural networks.[12,13]Among them, chaotic secure communication and chaotic encryption[14,15]are among the hottest topics in the research of international electronic communications. For example,chaotic encryption utilizes the sequence generated by a chaotic system as keys for the encryption algorithm to run on. As chaotic systems are almost impossible to be predicted unless the exact system with the initial states is known, such an encryption method is very secure. However,existing chaotic systems are far from perfect.Firstly, with the help of computer technology, identifying the chaos becomes easier. Therefore,the current chaotic systems with their low complexity are easy to be cracked by discerning their initial states[16]or estimating their chaotic orbits.[17]Secondly, chaos degradation may occur when chaotic behaviors are simulated in finite precision. Some extremely approached states may overlap and appear to be precision truncated,[18]which causes the chaotic behaviors that originally had infinite states to degrade to inevitable periodic behaviors. Thirdly,existing chaotic maps show chaotic behaviors only in limited regions. Some perturbation on the input could lead to an unexpected chaotic result being replaced by a regular output. This perturbation could destroy the chaos and mean it is unable to play the role of encryption. These potential hazards harm the application of chaos,especially in the encryption area. Therefore, acquiring robust chaos with better chaotic performance can facilitate deeper research in the field of chaos and speed up the practical application of chaos.[19]

    Much effort has been made to resolve the above problems and increase the complexity of existing chaotic systems.[20–25]For example, in Ref. [20], Liuet al.proposed a new coupled electro-optic chaotic system to conceal the time delay and enhance the complexity of chaos. They mixed the electrical signals by using nonlinear coupling functions. Luoet al.[21]introduced a novel image encryption algorithm based on double chaotic systems, which solved the limitation and vulnerability of a single chaotic map. In Ref. [22], Huanget al.took advantage of electrical mutual injection to improve the complexity and the security of chaotic communication systems. They used nonlinear transmission functions to conceal the time delay effect. Huaet al.in Ref. [23] proposed a chaotic model to enhance chaos and obtained robust results.They found a new model, a sine chaotification model, which can enhance the complexity of the current chaotic maps. They also used two maps to reach the required complexity for encryption safety.[24]In Ref.[25],Liu and Zhang improved plain text-related image encryption by constructing a special image,which can resist the existing chosen plaintext attack.

    This paper introduces an exponential sine chaotificaton model(ESCM)to boost the complexity of the existing chaotic systems. Applying double nonlinear transformations to existing chaotic systems not only enhances their complexity but also achieves a larger chaotic range than before. The main achievements and novelties of this paper are as follows:(1)We introduced ESCM as a universal framework to enhance the chaos complexity. (2)The complexity of the ESCM was theoretically analyzed using the Lyapunov exponent(LE).(3)To exhibit the usability of ESCM, we applied ESCM to multidimensional (MD) chaotic maps, including the 1D logistic map, 2D H′enon map, and 3D Lorenz map. (4) We tested the chaos performance of the enhanced chaotic maps using theLEand the bifurcation diagram. We also compared the enhanced chaos performance with their seed maps. (5) To demonstrate the practicability and simplicity of ESCM in a hardware environment, we constructed and tested the circuits of the enhanced chaotic maps in a digital signal processor(DSP).(7)We applied ESCM to image encryption and investigated its effectiveness.

    The remainder of this paper is organized as follows. Section 2 presents the proposed ESCM and analyzes its chaos complexity theoretically. Section 3 applies ESCM to a logistic map,H′enon map,and Lorenz map. We also discussed the chaotic dynamics of these chaotic maps. Section 4 validates its hardware availability using the DSP. In Section 5, we applied the enhanced Lorenz chaotic map to implement image encryption and analyzed the encryption effect. Finally, Section 6 concludes this paper.

    2. Exp-sine chaotification model

    This section proposes ESCM and analyses its chaos complexity.

    2.1. Concept of ESCM

    The proposed ESCM is designed to enhance the complexity of existing chaos. Using double nonlinear transformations and applying them to the chaotic maps, ESCM can significantly enhance the chaos complexity. The structure’s plot is shown in Fig.1.

    Fig.1. Structure of the ESCM.

    HereF(a,xi) is an existing chaotic map called a seed map, whereais a control parameter, andxiis the input. The output esin(πF(a,xi))is used as the input for the next iteration.

    We can use a mathematical equation to describe ESCM as

    whereais a control parameter.

    The exponent function,as well as the sine function,have complex nonlinear properties. Double nonlinear transformations enhance the complexity of existing chaos. The effect of ESCM in improving chaotic performance can be theoretically validated by using theLEas a standard. In this paper, we used ESCM as a chaotification model to improve the performance of chaos. The properties of ESCM are as follows. (1)It is an effective model that can enhance chaotic performance.(2) Compared with the seed map, the enhanced map owns chaotic behaviors in quite a large parameter range. (3)The enhanced map overcomes the drawbacks of seed maps entering periodic motion occasionally. (4)This model is applicable to both discrete and continuous chaotic systems. (5)Users have freewill to choose any dimension map to work as the seed map.

    These properties will be verified in the following parts.

    2.2. Chaos complexity analysis

    Due to the singularity and complexity of the chaos system, there is no unified definition of chaos. To quantitatively characterize the sensitivity of the chaotic system to the initial value, theLEcan work as a standard. TheLEis one of the most widely used criteria accepted by researchers. TheLE[26]refers to the average rate of exponential separation or convergence of two trajectories close to each other in phase space over time. IfLE>0, we can consider that it enters chaos states.

    To calculate theLEof ESCM,we supposex0is the initial value of the chaotic systemF(a,xi) in Eq. (1), and we havey0=x0+εwhich differs withx0by an infinitesimal positiveε.After one iteration by Eq.(1),the difference betweenx1andy1can be calculated as

    From the above,the existing chaotic map through ESCM could have largerLEthan before,which means they have better chaotic performance in more extensive parameter ranges.Even with seed maps that do not have chaotic behaviors, the enhanced map may also show chaotic traits through the transformation of the ESCM.This proves that the proposed ESCM can enhance the chaos performance in a more extensive range.

    3. Typical examples of an enhanced chaotic map

    To verify the performance of ESCM,we shall apply it to three example maps with different dimensions. They are a 1D logistic map,a 2D H′enon map,and 3D Lorenz map. We will also analyze the chaotic dynamics of the enhanced map.

    The logistic map[27]is derived from a demographic dynamics system designed to stimulate people’s growth, and it is one of the most widely used nonlinear dynamical discrete chaotic mapping systems. It seems too simple and deterministic but has complicated dynamical behaviors.Its mathematical mapping equation can be defined as

    3.1. Enhanced logistic map

    Definition When applying ESCM to a logistic map, it means theF(a,xi) in Eq. (1) is replaced by a logistic map in Eq. (10). Its new mathematical mapping equation can be defined as

    Bifurcation diagram The bifurcation phenomenon is a significant characteristic of nonlinear systems. Bifurcation refers to the phenomenon that a slight change in the vicinity of a parameter causes a sudden change in the phase space orbital topological structure. A bifurcation diagram is a direct description of the chaotic state of the system.[29]

    Figure 2 describes the bifurcation diagram of previous maps and their enhanced maps. Figure 2(a) plots the bifurcation diagram of the logistic map when its control parameterμ ∈[0,4]. Here, 410 iterations were performed. In order to make the iteration sufficient,the initial 400 times were discarded. As shown in Fig. 2(a), it is apparent that the logistic map is in the period-doubling bifurcation state whenμ ∈[0,3.6]and enters chaotic states whenμ ∈[3.6,4]. Even within the range of[3.6,4],there are still some periodic areas.With a slight disturbance, it will enter the periodic motions.Its outputs are limited in[0,1],while figure 2(d)represents the bifurcation diagram of the logistic map through ESCM when its control parameter ?μ ∈[0,1000]. It is clear that the logistic map through ESCM has outputs within the range[0.4,2.8],and these outputs distribute in the whole data range. In other words, the enhanced logistic map obtains superior complex dynamic behavior in a much larger range compared to its seed map,which has weak chaos in small parameter ranges.

    Lyapunov exponentLErefers to the average exponential separation or convergence of two orbitals close to each other in phase space over time.[26]It can represent the initial sensitivity when the dynamic system evolves. For nonlinear systems,if theLEis negative,the dynamical system is stable and shrinks in phase space, while positiveLErepresents the phase volume of the system that expands and folds continuously in one direction,in other words,the system is chaotic.

    Figure 3 depicts theLEof improved chaos and their seed maps. For comparison convenience, we have normalized the process. As shown in Fig.3(a),the enhanced logistic map enters a chaos state earlier than before. The previous map enters chaos when its control parameter is over 3.6,yet the enhanced chaos enters chaos from the start. TheLEof the enhanced logistic map increases as the control parameter increases. That also means the complexity of the enhanced seed map also increases. As depicted in Fig.3(a),although the control parameter is over 3.6, itsLEof the logistic map may also be less than 0 occasionally. In contrast,theLEof the enhanced logistic map is always positive,which indicates that it has complex dynamical behavior.It is clear that through ESCM,the logistic map obtains dynamic behavior in wider ranges.

    Fig.2. The first row depicts the bifurcation diagrams for the(a)logistic,(b)H′enon and(c)Lorenz maps,and the second row plots the bifurcation diagrams for their enhanced maps.

    Fig.3. The LEs of the(a)logistic and enhanced logistic map,(b)H′enon and enhanced H′enon map,and(c)Lorenz map and improved Lorenz map.

    3.2. Enhanced H′enon map

    Definition When applying ESCM to the H′enon map, it means theF(a,xi) in Eq. (1) is replaced by the H′enon map in Eq. (11). Its new mathematical mapping equation can be defined as

    Bifurcation diagram Figure 2(b)shows the bifurcation diagrams of the H′enon map. Since the 2D H′enon map has two control parameters, to obtain a straightforward comparison effect,we only plot the bifurcation diagrams of the H′enon chaotic maps when the control parameterβis fixed at 0.4 and selectαas the main control parameter within[0,1.25]. Here,200 iterations were performed. To make the iteration sufficient,the initial 50 times were discarded. Whenα ∈[1,1.25],the dynamical systems show complicated behavior. The outputs of the H′enon map are confined in the range of[0,2]. Figure 2(e)shows its enhanced bifurcation diagrams. Their initial state values are all set as(0,0). Also,200 iterations were performed, and the initial 190 times were discarded at the same time to ensure the result was satisfying. One can see that the trajectory of the enhanced H′enon map is distributed in all data ranges. At the same time, its outputs occasionally spread all over in the range of[0.4,2.7].

    Lyapunov exponent For the sake of presentation, here we set the control parameterβ=0.3. As shown in Fig.3(b),the H′enon map enters chaos whenα>1.07. It is clear that the H′enon chaotic maps enter the chaotic state only in a small range,which could impair the effect of encryption. Therefore,the original seed map is not robust. Through ESCM,it enters chaos from the start and has more significant complexity than its seed map. Along with the increase of the control parameter,theLEof the enhanced H′enon map becomes larger. That means the complexity of the enhanced H′enon map becomes larger as the control parameter increases.

    3.3. Enhanced Lorenz map

    Definition When applying ESCM to the Lorenz map,theF(a,xi)in Eq.(1)is replaced by the Lorenz map in Eq.(12).

    Bifurcation diagram The Lorenz map is a 3D chaotic map with three control parameters. Both initial values are set as(1,1,1). Figure 2(c)shows the bifurcation diagrams of the Lorenz map. We fixed two control parameters,ωandψ, to directly compare and observe their motion trials. As depicted in Fig. 2(c), it is obvious that the chaotic performance of the Lorenz map is frail with the control parameterσincreasing.It only presents complex dynamic behaviours in small parameter ranges. The outputs of the Lorenz map are restricted at[0,20]. Figure 2(f)shows the enhanced Lorenz map’s bifurcation diagrams.Exhibited in the image,it is almost all in chaos.When the parameter is within [0,1000], its outputs spread in[3,63]irregularly. Thus,the proposed ESCM can significantly enhance the chaos of the Lorenz map. The enhanced Lorenz map shows robust and complex dynamical behavior.

    Lyapunov exponent As depicted in Fig.3(c),only small parts of this system are in chaos. When the control parameter is within[5,18],theLEof the Lorenz map is positive,and the system is in chaos. In other regions, theLEjumps and changes randomly, which harms the practical application of chaos. When we compared the enhanced Lorenz map with its seed map,it is obvious that the performance improved significantly, and at the same time, it is all in chaos states. From Fig. 3(c), no matter how the control parameters change, theLEof the enhanced Lorenz map is always positive and obtains high values. That means ESCM improves the complexity of the seed map efficiently.

    4. Hardware implementation

    4.1. Hardware structure setting

    We selected the enhanced logistic, H′enon, and Lorenz maps to verify hardware operability.

    Design of DSP In some particular application scenarios,the chaotic system must be implemented in digital platforms.The DSP is a new hardware environment to simulate a chaotic system. For example, figure 4 plots the structure diagram of the hardware implementation of the improved H′enon map.There are three main components: the chaotic function generator,the counter,and feedback. The chaotic equation through the ESCM would receive the control signals and initial current valuex0,y0. Iterations are calculated by the counter and are implemented with feedback. Here,the function is the original chaotic equation through ESCM.Then,we put the result to the PWM output port of the DSP and then change the duty cycle of the PWM. Through the filter, which works as a digital-toanalog converter, we can get an analog output and input the value to the display device.

    Fig. 4. Structure diagram of a hardware implementation of the improved H′enon map.

    Implementation results Here, we present the implemented results of the enhanced logistic, H′enon, and Lorenz map. Figure 5 shows the DSP implementation environment. Figure 6 depicts the DSP implementation result shown in the oscilloscope. The logistic map initial state was set as (x0,?μ) = (0.1,10). The initial state of the H′enon map was set in (x0,y0,?α,?β) = (0.5,0.5,1.07,0.3). Here we set the initial state of the Lorenz map at (x0,y0,z0,?σ,?ω,?ψ) =(0.5,0.5,0.5,10,28,8/3). With observation by the oscilloscope,the three enhanced chaotic maps can generate complex random sequences. So, we can conclude that this enhanced model is suitable for practical application.

    Fig.5. Hardware prototype developed in DSP implementation.

    Fig.6. DSP simulation results for the three enhanced chaotic maps in the oscilloscope. (a)The enhanced logistic,(b)the enhanced H′enon,(c)the enhanced Lorenz maps.

    5. Application of ESCM in image encryption

    Currently, chaotic sequence encryption has been listed as an important research frontier of modern cryptography.Chaotic encryption is also referred to as digital sequence encryption. The chaos system can provide randomness, correlation, and a complex pseudorandom sequence. The signal is produced through a chaos map, and thus is nearly impossible for hackers to decode without knowing the initial key value.To satisfy the need for privacy protection, the chaotic image encryption technique has been studied intensively.[30,31]Since chaotic systems have been demonstrated to have a profound impact on encryption technology,we applied ESCM to image encryption.To highlight the effect of ESCM,we compared the effect of the enhanced map with its seed map.

    5.1. Proposed image encryption

    Here, we applied ESCM to the Lorenz map. We made use of the sequence generated by an enhanced chaotic system to implement image encryption.Unlike traditional encryption,chaotic encryption is dynamic encryption, and it has properties such as concealment, unpredictability, and resistance to exhaustion.

    5.2. Encryption process

    This paper uses the enhanced Lorenz system,permutation-based on Arnold transformation, and twice finite field diffusion to realize the image encryption scheme.The encryption process is described as follows.

    Step 2: Encryption of the graph

    With the generated permutation sequenceAandB, we will now swap the pixels in the graph according to the position given byAandB. We exchange the pixel’s position (1,i)of the original picture to its new position(p,q)by performing Arnold transformation. When consideringqmerely, the exchange between pixel points (1,i) and (1,q) can be constructed. At the same time,ABis regarded as a new random number and is still marked asA, thenqbecomesq=B+Ai.The performance of the permutation is simulated as in Fig.7.

    Next,usingS1 andS2,we can forward diffuse and reverse diffuse every pixel using the XOR operation. Notice that for a colour graph,every channel(RGB)needs to go through encryption. The process of diffusion is shown in Fig.8.

    The original graph is now safe as encrypted into a “random”graph.

    Step 3: Decrypt the graph

    To decipher the encrypted graph,we need to run the steps backward i.e.,re-run the XOR operation usingS2 andS1,and then swap the pixels usingBandA.Thus,we achieve the plain text graph as desired.

    Fig.7. The first step in encryption–confusion. (a)The raw information of plain images. (b)The information through the confusion process.

    Fig. 8. The diffusion process. (a) The information through the confusing process. (b)The information diffused through random sequence S1. It is a forward diffusion. (c) The information diffused through random sequence S2. It is a counter diffusion.

    5.3. Simulation results

    Fig. 9. Panel (a) presents color diagrams, gray diagrams, and binary diagrams. Panel (b) depicts the histogram of the original images. Panel (c)depicts the encrypted pictures through the enhanced map. Panel (d) describes the histogram of the encrypted images. Panel (e) describes the decrypted images.

    The image histogram reflects the statistical characteristics of image pixel distribution. We used drawing software to display the picture’s histogram. A practical and convenient image encryption algorithm should be capable of encrypting different types of pictures in order to fit different security requirements. As shown in Fig.9,three different types of images are encrypted. Figure 9(a) represents two color images, two grayscale images, and two binary images.Figure 9(b) simulates their corresponding image histograms.By observing their histograms,an important amount of information can be deduced about the pictures. Through ESCM,the original images in Fig.9(a)become the encrypted images in Fig. 9(c). We found that images through chaotic encryption have a higher complexity. Figure 9(d) describes the histograms of the encrypted images. This encryption hides the original image’s statistical properties splendidly and can defend a statistical attack based on image pixel values. The obvious statistical features of the original image have been hidden,replaced by the average distribution of the encrypted histogram. It is hard to find any regularity from this histogram.Through the correct key, it is easy to retrieve the information just as in Fig. 9(e). To compare the effect of encryption after the ESCM,here we encrypted the gray images through the Lorenz map as shown in Fig. 10. It is obvious that the encryption could not hide the statistical features of the original images perfectly. From Fig.10(c),it is not hard to vaguely see the general shape of the original picture. At the same time,the histograms of the encrypted images are not flat compared with Fig. 9(d), which means this encryption effect is worse than before. Figure 11 presents 3D visualization of the plain and cipher image. The first row depicts all pixels in the red,green,and blue color planes in the plain image. Each different color component has its distribution regularities. By contrast, the encrypted images hide the distribution rule of the pixels,so all pixels in the red, green, and blue color planes are distributed uniformly in the encrypted images. In other words,the ESCM can encrypt original images as cipher images with high performance. Compared to traditional encryption, chaotic encryption has higher complexity and hides the features of the original image perfectly. This encryption scheme contributes to chaotic secure communication and chaotic encryption, which is currently being widely researched.

    Fig. 10. Panel (a) presents the gray diagrams. Panel (b) depicts the histogram of the original images. Panel (c) depicts the encrypted pictures through the Lorenz map. Panel(d)describes the histogram of the encrypted images. Panel(e)describes the decrypted images.

    Fig. 11. Panel (a) presents original and encrypted images. Panel (b) depicts the red color plane of the images. Panel (c) depicts the green color plane of the images. Panel(d)depicts the blue color plane of the images.

    6. Conclusion

    This paper proposed an ESCM to enhance the complexity of existing chaotic maps. The ESCM uses a double nonlinear chaotic transform, including an exponential and a sine function,to enhance chaos complexity. The dynamical behavior of ESCM is verified using the principle of theLE.The resulting enhanced map of the ESCM has better chaos complexity and a much larger chaotic range than an original chaotic map. We applied it to three different dimensional chaotic maps,namely the logistic map,H′enon map,and Lorenz map,and discussed their dynamic behavior. The results confirmed that the enhanced chaos has better performance than their seed map. We used DSP to implement chaos circuits,demonstrating the simplicity of the ESCM in hardware devices. Lastly, to exhibit the practical application of an enhanced chaos map, we applied it to image encryption. The results show that chaotic image encryption hides the information of the original image effectively.

    Acknowledgments

    Project supported by the National Natural Science Foundation of China (Grant No. 51507023), Chongqing Municipal Natural Science Foundation (Grant No. cstc2020jcyjmsxmX0726),and the Science and Technology Research Program of Chongqing Municipal Education Commission(Grant No.KJZD-K202100506).

    猜你喜歡
    海軍
    曉褐蜻
    綠色天府(2022年6期)2022-07-14 11:59:42
    Time evolution law of a two-mode squeezed light field passing through twin diffusion channels
    我的海軍之夢(mèng)
    軍事文摘(2020年22期)2021-01-04 02:17:24
    相信愛
    海軍行動(dòng)
    封面人物·楊海軍
    新聞愛好者(2016年3期)2016-12-01 06:04:24
    海軍協(xié)議1
    New Approach to Calculate the Unavailability of Identical Spares in Cold Spare Configuration
    近代中國(guó)海軍的早期教育
    軍事歷史(1993年3期)1993-08-21 06:16:06
    清末海軍一次引人注目的軍艦出訪
    軍事歷史(1992年6期)1992-08-15 06:25:16
    亚洲天堂av无毛| 一本一本综合久久| 哪个播放器可以免费观看大片| 亚洲丝袜综合中文字幕| 精品久久久噜噜| 高清在线视频一区二区三区| 一级黄片播放器| a 毛片基地| 99热全是精品| videos熟女内射| 亚洲国产精品国产精品| 在线观看www视频免费| 国产亚洲一区二区精品| 妹子高潮喷水视频| 国产精品蜜桃在线观看| 男人狂女人下面高潮的视频| 欧美人与善性xxx| 亚洲av中文av极速乱| 又粗又硬又长又爽又黄的视频| 亚洲欧美清纯卡通| 一个人免费看片子| 永久免费av网站大全| 免费不卡的大黄色大毛片视频在线观看| 啦啦啦视频在线资源免费观看| 成人二区视频| 成人免费观看视频高清| 观看av在线不卡| 9色porny在线观看| 人妻系列 视频| 日韩欧美一区视频在线观看 | 一边亲一边摸免费视频| 大香蕉97超碰在线| 美女中出高潮动态图| 中文字幕人妻丝袜制服| 国内揄拍国产精品人妻在线| 日韩av免费高清视频| 91久久精品国产一区二区三区| 国产男女内射视频| 欧美人与善性xxx| 人体艺术视频欧美日本| 国内少妇人妻偷人精品xxx网站| 三级国产精品欧美在线观看| 亚洲精品亚洲一区二区| 国产真实伦视频高清在线观看| 日韩精品有码人妻一区| 中国三级夫妇交换| 青春草亚洲视频在线观看| 能在线免费看毛片的网站| 欧美精品亚洲一区二区| 国产69精品久久久久777片| 欧美丝袜亚洲另类| 亚洲欧美一区二区三区国产| 亚洲欧美日韩另类电影网站| 国产69精品久久久久777片| 涩涩av久久男人的天堂| 午夜影院在线不卡| 不卡视频在线观看欧美| 不卡视频在线观看欧美| 成人亚洲精品一区在线观看| 中文字幕人妻丝袜制服| 国产精品国产三级专区第一集| 一区二区三区精品91| 免费不卡的大黄色大毛片视频在线观看| 夫妻午夜视频| 欧美丝袜亚洲另类| 人人妻人人澡人人爽人人夜夜| 久久久久精品久久久久真实原创| 亚洲综合精品二区| videos熟女内射| 国产精品久久久久久久电影| 亚洲av男天堂| 午夜福利视频精品| 99九九在线精品视频 | 日韩三级伦理在线观看| 色哟哟·www| 亚洲高清免费不卡视频| 国产精品久久久久成人av| 亚洲精品成人av观看孕妇| 久久精品夜色国产| 久久这里有精品视频免费| 久久av网站| 寂寞人妻少妇视频99o| 亚洲精品亚洲一区二区| 最近最新中文字幕免费大全7| 99久久中文字幕三级久久日本| 欧美国产精品一级二级三级 | 精品人妻熟女毛片av久久网站| 日本免费在线观看一区| 少妇人妻一区二区三区视频| 日产精品乱码卡一卡2卡三| 亚洲天堂av无毛| 久久人人爽人人爽人人片va| 美女福利国产在线| 建设人人有责人人尽责人人享有的| 最近的中文字幕免费完整| 欧美日韩亚洲高清精品| 18+在线观看网站| 99精国产麻豆久久婷婷| 国产精品一区二区性色av| 亚洲国产欧美在线一区| 九九久久精品国产亚洲av麻豆| 久久午夜综合久久蜜桃| av在线播放精品| 亚洲精品第二区| 亚洲精品国产av蜜桃| 赤兔流量卡办理| 亚洲电影在线观看av| av播播在线观看一区| 国产精品人妻久久久影院| 精品国产国语对白av| 亚洲精品中文字幕在线视频 | 两个人免费观看高清视频 | 国产亚洲午夜精品一区二区久久| 青春草亚洲视频在线观看| 亚洲综合精品二区| 国产精品伦人一区二区| 久久这里有精品视频免费| 亚洲成人av在线免费| 久久免费观看电影| 亚洲av男天堂| 国产黄片视频在线免费观看| 欧美人与善性xxx| 亚洲性久久影院| 最近中文字幕2019免费版| 久久国产乱子免费精品| 多毛熟女@视频| 午夜福利视频精品| 麻豆乱淫一区二区| 中文字幕免费在线视频6| 国产淫语在线视频| 日韩熟女老妇一区二区性免费视频| 日本av免费视频播放| 国产极品粉嫩免费观看在线 | 欧美精品亚洲一区二区| 精品人妻熟女av久视频| 国产精品女同一区二区软件| 成年女人在线观看亚洲视频| 一级毛片aaaaaa免费看小| 特大巨黑吊av在线直播| 国产成人精品一,二区| 蜜桃在线观看..| 大又大粗又爽又黄少妇毛片口| 国产午夜精品一二区理论片| 久久鲁丝午夜福利片| 人妻夜夜爽99麻豆av| 大陆偷拍与自拍| 亚洲不卡免费看| 极品少妇高潮喷水抽搐| 国产高清三级在线| 成年女人在线观看亚洲视频| 国产精品不卡视频一区二区| 自线自在国产av| av女优亚洲男人天堂| 最近的中文字幕免费完整| 在线观看www视频免费| 极品少妇高潮喷水抽搐| 亚洲无线观看免费| 亚洲欧美一区二区三区黑人 | 亚洲国产欧美日韩在线播放 | 中文字幕人妻丝袜制服| 黄色一级大片看看| 国产中年淑女户外野战色| 欧美精品亚洲一区二区| 国产一级毛片在线| 新久久久久国产一级毛片| 午夜福利,免费看| a级毛片在线看网站| 久久综合国产亚洲精品| 特大巨黑吊av在线直播| 在线精品无人区一区二区三| 中国三级夫妇交换| 99热全是精品| 黄色配什么色好看| 纵有疾风起免费观看全集完整版| 国产真实伦视频高清在线观看| 美女国产视频在线观看| 久久久久人妻精品一区果冻| 亚洲成人手机| 一级av片app| 两个人免费观看高清视频 | 久久午夜福利片| 中文在线观看免费www的网站| 夜夜看夜夜爽夜夜摸| 国产一区亚洲一区在线观看| 超碰97精品在线观看| av有码第一页| 亚洲精品国产成人久久av| 99热全是精品| 久久久国产精品麻豆| 午夜激情久久久久久久| 欧美丝袜亚洲另类| 男的添女的下面高潮视频| 亚洲精品国产成人久久av| 国产精品一二三区在线看| 色94色欧美一区二区| 国产精品国产三级国产av玫瑰| 亚洲va在线va天堂va国产| 亚洲欧美成人精品一区二区| 少妇人妻久久综合中文| 国产一级毛片在线| 寂寞人妻少妇视频99o| 一边亲一边摸免费视频| 久久人人爽人人片av| 一个人免费看片子| 99re6热这里在线精品视频| 午夜福利在线观看免费完整高清在| 亚洲欧美成人综合另类久久久| 91久久精品国产一区二区三区| 亚洲va在线va天堂va国产| 国产欧美日韩一区二区三区在线 | a级毛片在线看网站| 在线观看免费高清a一片| 午夜影院在线不卡| 少妇人妻 视频| 亚洲四区av| 欧美高清成人免费视频www| 亚洲欧美成人综合另类久久久| 夜夜骑夜夜射夜夜干| 国产伦精品一区二区三区四那| 久久国产乱子免费精品| 日韩亚洲欧美综合| 欧美+日韩+精品| 精品一区二区免费观看| 久久精品夜色国产| 天堂中文最新版在线下载| 多毛熟女@视频| 国产乱人偷精品视频| 亚洲国产精品一区二区三区在线| 视频中文字幕在线观看| 久久精品熟女亚洲av麻豆精品| 国产精品成人在线| 人妻少妇偷人精品九色| 看十八女毛片水多多多| 极品人妻少妇av视频| 一级黄片播放器| 免费大片黄手机在线观看| 九九久久精品国产亚洲av麻豆| 久久久久网色| 五月开心婷婷网| 免费av中文字幕在线| 嘟嘟电影网在线观看| 国产精品一区二区在线观看99| 亚洲精品国产色婷婷电影| 欧美日韩亚洲高清精品| 亚洲激情五月婷婷啪啪| 一本久久精品| 内射极品少妇av片p| 国产男女内射视频| 九九爱精品视频在线观看| 日日啪夜夜撸| videossex国产| 久久久久久久国产电影| 国产精品一区二区三区四区免费观看| 亚洲av国产av综合av卡| 精品国产露脸久久av麻豆| 观看av在线不卡| 久久久久久久精品精品| 日韩 亚洲 欧美在线| 亚洲国产毛片av蜜桃av| 一级毛片黄色毛片免费观看视频| 男女啪啪激烈高潮av片| 极品人妻少妇av视频| 久久99热这里只频精品6学生| 色视频www国产| 国产成人精品一,二区| 人体艺术视频欧美日本| 精品久久久久久电影网| 久久国产亚洲av麻豆专区| 婷婷色av中文字幕| 久久久久久久久久久免费av| 免费高清在线观看视频在线观看| 成人国产麻豆网| 国产成人午夜福利电影在线观看| 人妻制服诱惑在线中文字幕| 欧美亚洲 丝袜 人妻 在线| 日韩av免费高清视频| 男人爽女人下面视频在线观看| 成年女人在线观看亚洲视频| 美女国产视频在线观看| 美女视频免费永久观看网站| 午夜福利网站1000一区二区三区| 一区二区三区乱码不卡18| 国产av一区二区精品久久| 欧美日韩在线观看h| 最近手机中文字幕大全| 亚洲国产日韩一区二区| 搡老乐熟女国产| 精品亚洲乱码少妇综合久久| 亚洲精品亚洲一区二区| 热99国产精品久久久久久7| 亚洲无线观看免费| 精品久久久久久久久av| 纯流量卡能插随身wifi吗| 午夜福利在线观看免费完整高清在| 91精品伊人久久大香线蕉| 在线观看免费视频网站a站| 最近最新中文字幕免费大全7| 另类精品久久| 亚洲精品aⅴ在线观看| 最后的刺客免费高清国语| 另类亚洲欧美激情| 亚洲精品色激情综合| 亚洲精品乱码久久久v下载方式| 成人毛片a级毛片在线播放| 丰满少妇做爰视频| 久久久久国产网址| 成人特级av手机在线观看| 黑人巨大精品欧美一区二区蜜桃 | 国产欧美日韩精品一区二区| 汤姆久久久久久久影院中文字幕| 王馨瑶露胸无遮挡在线观看| 日本黄色日本黄色录像| 伦理电影免费视频| 成人午夜精彩视频在线观看| 精品一区二区免费观看| 精品99又大又爽又粗少妇毛片| 边亲边吃奶的免费视频| 国产亚洲精品久久久com| 免费看光身美女| 国产成人91sexporn| 亚洲国产欧美日韩在线播放 | 99热这里只有是精品在线观看| 国产男女超爽视频在线观看| 啦啦啦视频在线资源免费观看| 日韩一区二区视频免费看| 搡女人真爽免费视频火全软件| 男人狂女人下面高潮的视频| 边亲边吃奶的免费视频| 一本一本综合久久| 免费av不卡在线播放| 国产亚洲午夜精品一区二区久久| 99热这里只有是精品50| 国产一区二区三区av在线| 国产老妇伦熟女老妇高清| 黑丝袜美女国产一区| 亚洲情色 制服丝袜| 国产高清三级在线| 777米奇影视久久| 亚洲精品国产av蜜桃| 免费观看a级毛片全部| 国产精品99久久99久久久不卡 | 99视频精品全部免费 在线| 十分钟在线观看高清视频www | 亚洲欧美日韩另类电影网站| 日韩,欧美,国产一区二区三区| 久久人妻熟女aⅴ| 黑丝袜美女国产一区| 日本vs欧美在线观看视频 | 国产深夜福利视频在线观看| 99re6热这里在线精品视频| 一本—道久久a久久精品蜜桃钙片| 日本欧美国产在线视频| 国产淫语在线视频| 国产精品成人在线| 久久久久网色| 精品熟女少妇av免费看| 女性被躁到高潮视频| 国产精品一区二区在线观看99| 国产高清国产精品国产三级| 99热这里只有精品一区| 2022亚洲国产成人精品| 2021少妇久久久久久久久久久| 欧美激情国产日韩精品一区| 一区在线观看完整版| 欧美日韩国产mv在线观看视频| 亚洲第一av免费看| av.在线天堂| 精品久久久久久久久av| 在线观看www视频免费| 熟女电影av网| 国产精品欧美亚洲77777| 啦啦啦啦在线视频资源| 一个人看视频在线观看www免费| 深夜a级毛片| 精品国产国语对白av| 中文字幕久久专区| 午夜日本视频在线| 美女xxoo啪啪120秒动态图| 亚洲国产毛片av蜜桃av| 22中文网久久字幕| 国产精品一区二区在线不卡| 热re99久久精品国产66热6| 国产黄色免费在线视频| 熟女人妻精品中文字幕| 午夜日本视频在线| 欧美xxxx性猛交bbbb| 精品国产露脸久久av麻豆| 日日爽夜夜爽网站| 亚洲精品一二三| 国产精品女同一区二区软件| 91精品一卡2卡3卡4卡| 美女xxoo啪啪120秒动态图| 成人午夜精彩视频在线观看| 国产精品一区二区在线不卡| 欧美变态另类bdsm刘玥| 青青草视频在线视频观看| 80岁老熟妇乱子伦牲交| 一级二级三级毛片免费看| 在线精品无人区一区二区三| 青青草视频在线视频观看| 国产成人freesex在线| 亚洲综合色惰| av在线播放精品| 日韩电影二区| 国内揄拍国产精品人妻在线| 少妇熟女欧美另类| 如日韩欧美国产精品一区二区三区 | 天天操日日干夜夜撸| 午夜老司机福利剧场| 久久女婷五月综合色啪小说| 少妇猛男粗大的猛烈进出视频| 青春草视频在线免费观看| 精品久久久久久久久亚洲| 免费看日本二区| 国产伦在线观看视频一区| 亚洲精品一二三| 成人亚洲精品一区在线观看| 国产精品人妻久久久影院| 国产欧美日韩一区二区三区在线 | 久久国产精品男人的天堂亚洲 | 97精品久久久久久久久久精品| 夜夜看夜夜爽夜夜摸| av国产久精品久网站免费入址| www.av在线官网国产| 久久午夜福利片| 国产黄片美女视频| 亚洲va在线va天堂va国产| 黑丝袜美女国产一区| 日日爽夜夜爽网站| 五月开心婷婷网| 人人妻人人添人人爽欧美一区卜| 国产精品一区二区在线观看99| 久久6这里有精品| 免费av不卡在线播放| 嫩草影院入口| 久久人妻熟女aⅴ| 我要看黄色一级片免费的| 亚洲成色77777| 嫩草影院入口| 亚洲久久久国产精品| 91久久精品国产一区二区成人| 十八禁网站网址无遮挡 | 国产白丝娇喘喷水9色精品| 精品久久久精品久久久| 国产男女超爽视频在线观看| 亚洲av免费高清在线观看| 天堂中文最新版在线下载| 精品久久久精品久久久| 精品熟女少妇av免费看| 美女cb高潮喷水在线观看| av在线观看视频网站免费| 国产精品成人在线| 在现免费观看毛片| 久久久久国产网址| 日韩av免费高清视频| 国产成人精品一,二区| 日韩不卡一区二区三区视频在线| 国产视频内射| freevideosex欧美| 中文乱码字字幕精品一区二区三区| 秋霞伦理黄片| 97超视频在线观看视频| 三上悠亚av全集在线观看 | 日韩av在线免费看完整版不卡| 校园人妻丝袜中文字幕| 亚洲三级黄色毛片| 亚洲av成人精品一二三区| 2021少妇久久久久久久久久久| 亚洲,欧美,日韩| 777米奇影视久久| 免费看日本二区| 久久免费观看电影| 大片免费播放器 马上看| 亚洲国产日韩一区二区| 91精品伊人久久大香线蕉| 欧美xxⅹ黑人| 水蜜桃什么品种好| 少妇被粗大猛烈的视频| 伊人久久国产一区二区| 免费av中文字幕在线| 欧美老熟妇乱子伦牲交| 美女内射精品一级片tv| 插逼视频在线观看| 最近手机中文字幕大全| 国产精品一区二区性色av| 热99国产精品久久久久久7| 国产免费一级a男人的天堂| 日韩一区二区三区影片| 欧美日韩精品成人综合77777| av在线app专区| 亚洲自偷自拍三级| 尾随美女入室| 国产免费视频播放在线视频| 制服丝袜香蕉在线| 久久久久国产精品人妻一区二区| 99热国产这里只有精品6| 伊人久久国产一区二区| 一级毛片电影观看| 国产精品99久久久久久久久| 日韩欧美精品免费久久| 成人毛片60女人毛片免费| 久久精品久久久久久久性| 国产熟女午夜一区二区三区 | a级一级毛片免费在线观看| av天堂久久9| 国产精品一区二区在线观看99| 日韩免费高清中文字幕av| 2022亚洲国产成人精品| 欧美日韩亚洲高清精品| 久久久国产一区二区| 久久久欧美国产精品| 毛片一级片免费看久久久久| 免费观看在线日韩| 99热这里只有是精品在线观看| 哪个播放器可以免费观看大片| 国产精品麻豆人妻色哟哟久久| 国产男女内射视频| 女人久久www免费人成看片| 好男人视频免费观看在线| 亚洲激情五月婷婷啪啪| 免费看日本二区| 国产精品人妻久久久影院| 另类亚洲欧美激情| 成人无遮挡网站| 天堂中文最新版在线下载| 啦啦啦啦在线视频资源| 日本wwww免费看| h视频一区二区三区| 久久久久人妻精品一区果冻| 少妇高潮的动态图| 中文字幕精品免费在线观看视频 | 久久久a久久爽久久v久久| 中文精品一卡2卡3卡4更新| 国产av一区二区精品久久| 亚洲欧洲精品一区二区精品久久久 | 中文精品一卡2卡3卡4更新| 99国产精品免费福利视频| 大片免费播放器 马上看| 亚洲精品视频女| 男人狂女人下面高潮的视频| 五月玫瑰六月丁香| 午夜免费男女啪啪视频观看| 丰满少妇做爰视频| 国产永久视频网站| 国产在线一区二区三区精| 亚洲一级一片aⅴ在线观看| 人人妻人人爽人人添夜夜欢视频 | 免费看不卡的av| 最近中文字幕高清免费大全6| 成人毛片60女人毛片免费| 国产日韩欧美视频二区| 亚洲一级一片aⅴ在线观看| 久热这里只有精品99| 大片免费播放器 马上看| 免费观看在线日韩| 丝袜在线中文字幕| 欧美日韩在线观看h| 国产色婷婷99| 3wmmmm亚洲av在线观看| 观看免费一级毛片| 校园人妻丝袜中文字幕| 黑丝袜美女国产一区| 国产亚洲一区二区精品| 菩萨蛮人人尽说江南好唐韦庄| kizo精华| 亚洲成人手机| 国产精品偷伦视频观看了| 中文字幕亚洲精品专区| 久久久精品94久久精品| 日本黄色日本黄色录像| a 毛片基地| 久热久热在线精品观看| 极品人妻少妇av视频| 日韩视频在线欧美| 欧美精品国产亚洲| 伦精品一区二区三区| 亚洲婷婷狠狠爱综合网| 久久热精品热| 亚洲欧美一区二区三区国产| 亚洲天堂av无毛| 国产乱人偷精品视频| 偷拍熟女少妇极品色| 欧美区成人在线视频| 亚洲精品456在线播放app| xxx大片免费视频| 人妻一区二区av| 老司机影院成人| 在线观看免费日韩欧美大片 | 精品久久久噜噜| 免费不卡的大黄色大毛片视频在线观看| 精品亚洲乱码少妇综合久久| 高清av免费在线| 国产免费又黄又爽又色| 美女主播在线视频| 一级av片app| 久久热精品热| 国产精品久久久久久精品古装| 免费高清在线观看视频在线观看| 麻豆精品久久久久久蜜桃| 国产一区二区三区av在线| 极品教师在线视频| 日韩人妻高清精品专区| 日韩一区二区三区影片| 亚洲精品视频女| 最近2019中文字幕mv第一页| 中文欧美无线码| 亚洲av综合色区一区| 久久精品国产自在天天线| 黑人巨大精品欧美一区二区蜜桃 | 国产老妇伦熟女老妇高清| 这个男人来自地球电影免费观看 | 中国国产av一级| 你懂的网址亚洲精品在线观看| 韩国av在线不卡| 国产男人的电影天堂91|