• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Exponential sine chaotification model for enhancing chaos and its hardware implementation

    2022-08-31 09:56:28RuiWang王蕊MengYangLi李孟洋andHaiJunLuo羅海軍
    Chinese Physics B 2022年8期
    關(guān)鍵詞:海軍

    Rui Wang(王蕊) Meng-Yang Li(李孟洋) and Hai-Jun Luo(羅海軍)

    1College of Physics and Electronic Engineering,Chongqing Normal University,Chongqing 401331,China

    2National Center for Applied Mathematics in Chongqing,Chongqing 401331,China

    3The University of Chicago,Chicago 60637,United States of America

    Keywords: chaotic system,nonlinear system,image encryption,hardware implementation

    1. Introduction

    In 1963, Lorenz introduced the deterministic aperiodic flow model and the butterfly effect.[1]From then on, people have come to be aware of the field of chaos. Chaos theory,subsequently developed as a subfield of nonlinear science,[2]studies the behaviors of dynamical systems that have definite but unpredictable motions. The behavior of chaotic systems is determined by their initial states,yet it is impossible to predict long-term actions as they are sensitive to the slightest change in the initial states.[3]Those characteristics,such as initial state sensitivity,unpredictability,fractal dimension,and ergodicity,push chaotic systems to be widely studied and applied in many scenarios,such as personal information security,[4]communication systems,[5]and power systems.[6]

    Presently, many chaotic systems have been developed for various applications, such as chaotic synchronization,[7,8]chaotic secure communication,[9]chaotic cryptography,[10,11]and chaotic neural networks.[12,13]Among them, chaotic secure communication and chaotic encryption[14,15]are among the hottest topics in the research of international electronic communications. For example,chaotic encryption utilizes the sequence generated by a chaotic system as keys for the encryption algorithm to run on. As chaotic systems are almost impossible to be predicted unless the exact system with the initial states is known, such an encryption method is very secure. However,existing chaotic systems are far from perfect.Firstly, with the help of computer technology, identifying the chaos becomes easier. Therefore,the current chaotic systems with their low complexity are easy to be cracked by discerning their initial states[16]or estimating their chaotic orbits.[17]Secondly, chaos degradation may occur when chaotic behaviors are simulated in finite precision. Some extremely approached states may overlap and appear to be precision truncated,[18]which causes the chaotic behaviors that originally had infinite states to degrade to inevitable periodic behaviors. Thirdly,existing chaotic maps show chaotic behaviors only in limited regions. Some perturbation on the input could lead to an unexpected chaotic result being replaced by a regular output. This perturbation could destroy the chaos and mean it is unable to play the role of encryption. These potential hazards harm the application of chaos,especially in the encryption area. Therefore, acquiring robust chaos with better chaotic performance can facilitate deeper research in the field of chaos and speed up the practical application of chaos.[19]

    Much effort has been made to resolve the above problems and increase the complexity of existing chaotic systems.[20–25]For example, in Ref. [20], Liuet al.proposed a new coupled electro-optic chaotic system to conceal the time delay and enhance the complexity of chaos. They mixed the electrical signals by using nonlinear coupling functions. Luoet al.[21]introduced a novel image encryption algorithm based on double chaotic systems, which solved the limitation and vulnerability of a single chaotic map. In Ref. [22], Huanget al.took advantage of electrical mutual injection to improve the complexity and the security of chaotic communication systems. They used nonlinear transmission functions to conceal the time delay effect. Huaet al.in Ref. [23] proposed a chaotic model to enhance chaos and obtained robust results.They found a new model, a sine chaotification model, which can enhance the complexity of the current chaotic maps. They also used two maps to reach the required complexity for encryption safety.[24]In Ref.[25],Liu and Zhang improved plain text-related image encryption by constructing a special image,which can resist the existing chosen plaintext attack.

    This paper introduces an exponential sine chaotificaton model(ESCM)to boost the complexity of the existing chaotic systems. Applying double nonlinear transformations to existing chaotic systems not only enhances their complexity but also achieves a larger chaotic range than before. The main achievements and novelties of this paper are as follows:(1)We introduced ESCM as a universal framework to enhance the chaos complexity. (2)The complexity of the ESCM was theoretically analyzed using the Lyapunov exponent(LE).(3)To exhibit the usability of ESCM, we applied ESCM to multidimensional (MD) chaotic maps, including the 1D logistic map, 2D H′enon map, and 3D Lorenz map. (4) We tested the chaos performance of the enhanced chaotic maps using theLEand the bifurcation diagram. We also compared the enhanced chaos performance with their seed maps. (5) To demonstrate the practicability and simplicity of ESCM in a hardware environment, we constructed and tested the circuits of the enhanced chaotic maps in a digital signal processor(DSP).(7)We applied ESCM to image encryption and investigated its effectiveness.

    The remainder of this paper is organized as follows. Section 2 presents the proposed ESCM and analyzes its chaos complexity theoretically. Section 3 applies ESCM to a logistic map,H′enon map,and Lorenz map. We also discussed the chaotic dynamics of these chaotic maps. Section 4 validates its hardware availability using the DSP. In Section 5, we applied the enhanced Lorenz chaotic map to implement image encryption and analyzed the encryption effect. Finally, Section 6 concludes this paper.

    2. Exp-sine chaotification model

    This section proposes ESCM and analyses its chaos complexity.

    2.1. Concept of ESCM

    The proposed ESCM is designed to enhance the complexity of existing chaos. Using double nonlinear transformations and applying them to the chaotic maps, ESCM can significantly enhance the chaos complexity. The structure’s plot is shown in Fig.1.

    Fig.1. Structure of the ESCM.

    HereF(a,xi) is an existing chaotic map called a seed map, whereais a control parameter, andxiis the input. The output esin(πF(a,xi))is used as the input for the next iteration.

    We can use a mathematical equation to describe ESCM as

    whereais a control parameter.

    The exponent function,as well as the sine function,have complex nonlinear properties. Double nonlinear transformations enhance the complexity of existing chaos. The effect of ESCM in improving chaotic performance can be theoretically validated by using theLEas a standard. In this paper, we used ESCM as a chaotification model to improve the performance of chaos. The properties of ESCM are as follows. (1)It is an effective model that can enhance chaotic performance.(2) Compared with the seed map, the enhanced map owns chaotic behaviors in quite a large parameter range. (3)The enhanced map overcomes the drawbacks of seed maps entering periodic motion occasionally. (4)This model is applicable to both discrete and continuous chaotic systems. (5)Users have freewill to choose any dimension map to work as the seed map.

    These properties will be verified in the following parts.

    2.2. Chaos complexity analysis

    Due to the singularity and complexity of the chaos system, there is no unified definition of chaos. To quantitatively characterize the sensitivity of the chaotic system to the initial value, theLEcan work as a standard. TheLEis one of the most widely used criteria accepted by researchers. TheLE[26]refers to the average rate of exponential separation or convergence of two trajectories close to each other in phase space over time. IfLE>0, we can consider that it enters chaos states.

    To calculate theLEof ESCM,we supposex0is the initial value of the chaotic systemF(a,xi) in Eq. (1), and we havey0=x0+εwhich differs withx0by an infinitesimal positiveε.After one iteration by Eq.(1),the difference betweenx1andy1can be calculated as

    From the above,the existing chaotic map through ESCM could have largerLEthan before,which means they have better chaotic performance in more extensive parameter ranges.Even with seed maps that do not have chaotic behaviors, the enhanced map may also show chaotic traits through the transformation of the ESCM.This proves that the proposed ESCM can enhance the chaos performance in a more extensive range.

    3. Typical examples of an enhanced chaotic map

    To verify the performance of ESCM,we shall apply it to three example maps with different dimensions. They are a 1D logistic map,a 2D H′enon map,and 3D Lorenz map. We will also analyze the chaotic dynamics of the enhanced map.

    The logistic map[27]is derived from a demographic dynamics system designed to stimulate people’s growth, and it is one of the most widely used nonlinear dynamical discrete chaotic mapping systems. It seems too simple and deterministic but has complicated dynamical behaviors.Its mathematical mapping equation can be defined as

    3.1. Enhanced logistic map

    Definition When applying ESCM to a logistic map, it means theF(a,xi) in Eq. (1) is replaced by a logistic map in Eq. (10). Its new mathematical mapping equation can be defined as

    Bifurcation diagram The bifurcation phenomenon is a significant characteristic of nonlinear systems. Bifurcation refers to the phenomenon that a slight change in the vicinity of a parameter causes a sudden change in the phase space orbital topological structure. A bifurcation diagram is a direct description of the chaotic state of the system.[29]

    Figure 2 describes the bifurcation diagram of previous maps and their enhanced maps. Figure 2(a) plots the bifurcation diagram of the logistic map when its control parameterμ ∈[0,4]. Here, 410 iterations were performed. In order to make the iteration sufficient,the initial 400 times were discarded. As shown in Fig. 2(a), it is apparent that the logistic map is in the period-doubling bifurcation state whenμ ∈[0,3.6]and enters chaotic states whenμ ∈[3.6,4]. Even within the range of[3.6,4],there are still some periodic areas.With a slight disturbance, it will enter the periodic motions.Its outputs are limited in[0,1],while figure 2(d)represents the bifurcation diagram of the logistic map through ESCM when its control parameter ?μ ∈[0,1000]. It is clear that the logistic map through ESCM has outputs within the range[0.4,2.8],and these outputs distribute in the whole data range. In other words, the enhanced logistic map obtains superior complex dynamic behavior in a much larger range compared to its seed map,which has weak chaos in small parameter ranges.

    Lyapunov exponentLErefers to the average exponential separation or convergence of two orbitals close to each other in phase space over time.[26]It can represent the initial sensitivity when the dynamic system evolves. For nonlinear systems,if theLEis negative,the dynamical system is stable and shrinks in phase space, while positiveLErepresents the phase volume of the system that expands and folds continuously in one direction,in other words,the system is chaotic.

    Figure 3 depicts theLEof improved chaos and their seed maps. For comparison convenience, we have normalized the process. As shown in Fig.3(a),the enhanced logistic map enters a chaos state earlier than before. The previous map enters chaos when its control parameter is over 3.6,yet the enhanced chaos enters chaos from the start. TheLEof the enhanced logistic map increases as the control parameter increases. That also means the complexity of the enhanced seed map also increases. As depicted in Fig.3(a),although the control parameter is over 3.6, itsLEof the logistic map may also be less than 0 occasionally. In contrast,theLEof the enhanced logistic map is always positive,which indicates that it has complex dynamical behavior.It is clear that through ESCM,the logistic map obtains dynamic behavior in wider ranges.

    Fig.2. The first row depicts the bifurcation diagrams for the(a)logistic,(b)H′enon and(c)Lorenz maps,and the second row plots the bifurcation diagrams for their enhanced maps.

    Fig.3. The LEs of the(a)logistic and enhanced logistic map,(b)H′enon and enhanced H′enon map,and(c)Lorenz map and improved Lorenz map.

    3.2. Enhanced H′enon map

    Definition When applying ESCM to the H′enon map, it means theF(a,xi) in Eq. (1) is replaced by the H′enon map in Eq. (11). Its new mathematical mapping equation can be defined as

    Bifurcation diagram Figure 2(b)shows the bifurcation diagrams of the H′enon map. Since the 2D H′enon map has two control parameters, to obtain a straightforward comparison effect,we only plot the bifurcation diagrams of the H′enon chaotic maps when the control parameterβis fixed at 0.4 and selectαas the main control parameter within[0,1.25]. Here,200 iterations were performed. To make the iteration sufficient,the initial 50 times were discarded. Whenα ∈[1,1.25],the dynamical systems show complicated behavior. The outputs of the H′enon map are confined in the range of[0,2]. Figure 2(e)shows its enhanced bifurcation diagrams. Their initial state values are all set as(0,0). Also,200 iterations were performed, and the initial 190 times were discarded at the same time to ensure the result was satisfying. One can see that the trajectory of the enhanced H′enon map is distributed in all data ranges. At the same time, its outputs occasionally spread all over in the range of[0.4,2.7].

    Lyapunov exponent For the sake of presentation, here we set the control parameterβ=0.3. As shown in Fig.3(b),the H′enon map enters chaos whenα>1.07. It is clear that the H′enon chaotic maps enter the chaotic state only in a small range,which could impair the effect of encryption. Therefore,the original seed map is not robust. Through ESCM,it enters chaos from the start and has more significant complexity than its seed map. Along with the increase of the control parameter,theLEof the enhanced H′enon map becomes larger. That means the complexity of the enhanced H′enon map becomes larger as the control parameter increases.

    3.3. Enhanced Lorenz map

    Definition When applying ESCM to the Lorenz map,theF(a,xi)in Eq.(1)is replaced by the Lorenz map in Eq.(12).

    Bifurcation diagram The Lorenz map is a 3D chaotic map with three control parameters. Both initial values are set as(1,1,1). Figure 2(c)shows the bifurcation diagrams of the Lorenz map. We fixed two control parameters,ωandψ, to directly compare and observe their motion trials. As depicted in Fig. 2(c), it is obvious that the chaotic performance of the Lorenz map is frail with the control parameterσincreasing.It only presents complex dynamic behaviours in small parameter ranges. The outputs of the Lorenz map are restricted at[0,20]. Figure 2(f)shows the enhanced Lorenz map’s bifurcation diagrams.Exhibited in the image,it is almost all in chaos.When the parameter is within [0,1000], its outputs spread in[3,63]irregularly. Thus,the proposed ESCM can significantly enhance the chaos of the Lorenz map. The enhanced Lorenz map shows robust and complex dynamical behavior.

    Lyapunov exponent As depicted in Fig.3(c),only small parts of this system are in chaos. When the control parameter is within[5,18],theLEof the Lorenz map is positive,and the system is in chaos. In other regions, theLEjumps and changes randomly, which harms the practical application of chaos. When we compared the enhanced Lorenz map with its seed map,it is obvious that the performance improved significantly, and at the same time, it is all in chaos states. From Fig. 3(c), no matter how the control parameters change, theLEof the enhanced Lorenz map is always positive and obtains high values. That means ESCM improves the complexity of the seed map efficiently.

    4. Hardware implementation

    4.1. Hardware structure setting

    We selected the enhanced logistic, H′enon, and Lorenz maps to verify hardware operability.

    Design of DSP In some particular application scenarios,the chaotic system must be implemented in digital platforms.The DSP is a new hardware environment to simulate a chaotic system. For example, figure 4 plots the structure diagram of the hardware implementation of the improved H′enon map.There are three main components: the chaotic function generator,the counter,and feedback. The chaotic equation through the ESCM would receive the control signals and initial current valuex0,y0. Iterations are calculated by the counter and are implemented with feedback. Here,the function is the original chaotic equation through ESCM.Then,we put the result to the PWM output port of the DSP and then change the duty cycle of the PWM. Through the filter, which works as a digital-toanalog converter, we can get an analog output and input the value to the display device.

    Fig. 4. Structure diagram of a hardware implementation of the improved H′enon map.

    Implementation results Here, we present the implemented results of the enhanced logistic, H′enon, and Lorenz map. Figure 5 shows the DSP implementation environment. Figure 6 depicts the DSP implementation result shown in the oscilloscope. The logistic map initial state was set as (x0,?μ) = (0.1,10). The initial state of the H′enon map was set in (x0,y0,?α,?β) = (0.5,0.5,1.07,0.3). Here we set the initial state of the Lorenz map at (x0,y0,z0,?σ,?ω,?ψ) =(0.5,0.5,0.5,10,28,8/3). With observation by the oscilloscope,the three enhanced chaotic maps can generate complex random sequences. So, we can conclude that this enhanced model is suitable for practical application.

    Fig.5. Hardware prototype developed in DSP implementation.

    Fig.6. DSP simulation results for the three enhanced chaotic maps in the oscilloscope. (a)The enhanced logistic,(b)the enhanced H′enon,(c)the enhanced Lorenz maps.

    5. Application of ESCM in image encryption

    Currently, chaotic sequence encryption has been listed as an important research frontier of modern cryptography.Chaotic encryption is also referred to as digital sequence encryption. The chaos system can provide randomness, correlation, and a complex pseudorandom sequence. The signal is produced through a chaos map, and thus is nearly impossible for hackers to decode without knowing the initial key value.To satisfy the need for privacy protection, the chaotic image encryption technique has been studied intensively.[30,31]Since chaotic systems have been demonstrated to have a profound impact on encryption technology,we applied ESCM to image encryption.To highlight the effect of ESCM,we compared the effect of the enhanced map with its seed map.

    5.1. Proposed image encryption

    Here, we applied ESCM to the Lorenz map. We made use of the sequence generated by an enhanced chaotic system to implement image encryption.Unlike traditional encryption,chaotic encryption is dynamic encryption, and it has properties such as concealment, unpredictability, and resistance to exhaustion.

    5.2. Encryption process

    This paper uses the enhanced Lorenz system,permutation-based on Arnold transformation, and twice finite field diffusion to realize the image encryption scheme.The encryption process is described as follows.

    Step 2: Encryption of the graph

    With the generated permutation sequenceAandB, we will now swap the pixels in the graph according to the position given byAandB. We exchange the pixel’s position (1,i)of the original picture to its new position(p,q)by performing Arnold transformation. When consideringqmerely, the exchange between pixel points (1,i) and (1,q) can be constructed. At the same time,ABis regarded as a new random number and is still marked asA, thenqbecomesq=B+Ai.The performance of the permutation is simulated as in Fig.7.

    Next,usingS1 andS2,we can forward diffuse and reverse diffuse every pixel using the XOR operation. Notice that for a colour graph,every channel(RGB)needs to go through encryption. The process of diffusion is shown in Fig.8.

    The original graph is now safe as encrypted into a “random”graph.

    Step 3: Decrypt the graph

    To decipher the encrypted graph,we need to run the steps backward i.e.,re-run the XOR operation usingS2 andS1,and then swap the pixels usingBandA.Thus,we achieve the plain text graph as desired.

    Fig.7. The first step in encryption–confusion. (a)The raw information of plain images. (b)The information through the confusion process.

    Fig. 8. The diffusion process. (a) The information through the confusing process. (b)The information diffused through random sequence S1. It is a forward diffusion. (c) The information diffused through random sequence S2. It is a counter diffusion.

    5.3. Simulation results

    Fig. 9. Panel (a) presents color diagrams, gray diagrams, and binary diagrams. Panel (b) depicts the histogram of the original images. Panel (c)depicts the encrypted pictures through the enhanced map. Panel (d) describes the histogram of the encrypted images. Panel (e) describes the decrypted images.

    The image histogram reflects the statistical characteristics of image pixel distribution. We used drawing software to display the picture’s histogram. A practical and convenient image encryption algorithm should be capable of encrypting different types of pictures in order to fit different security requirements. As shown in Fig.9,three different types of images are encrypted. Figure 9(a) represents two color images, two grayscale images, and two binary images.Figure 9(b) simulates their corresponding image histograms.By observing their histograms,an important amount of information can be deduced about the pictures. Through ESCM,the original images in Fig.9(a)become the encrypted images in Fig. 9(c). We found that images through chaotic encryption have a higher complexity. Figure 9(d) describes the histograms of the encrypted images. This encryption hides the original image’s statistical properties splendidly and can defend a statistical attack based on image pixel values. The obvious statistical features of the original image have been hidden,replaced by the average distribution of the encrypted histogram. It is hard to find any regularity from this histogram.Through the correct key, it is easy to retrieve the information just as in Fig. 9(e). To compare the effect of encryption after the ESCM,here we encrypted the gray images through the Lorenz map as shown in Fig. 10. It is obvious that the encryption could not hide the statistical features of the original images perfectly. From Fig.10(c),it is not hard to vaguely see the general shape of the original picture. At the same time,the histograms of the encrypted images are not flat compared with Fig. 9(d), which means this encryption effect is worse than before. Figure 11 presents 3D visualization of the plain and cipher image. The first row depicts all pixels in the red,green,and blue color planes in the plain image. Each different color component has its distribution regularities. By contrast, the encrypted images hide the distribution rule of the pixels,so all pixels in the red, green, and blue color planes are distributed uniformly in the encrypted images. In other words,the ESCM can encrypt original images as cipher images with high performance. Compared to traditional encryption, chaotic encryption has higher complexity and hides the features of the original image perfectly. This encryption scheme contributes to chaotic secure communication and chaotic encryption, which is currently being widely researched.

    Fig. 10. Panel (a) presents the gray diagrams. Panel (b) depicts the histogram of the original images. Panel (c) depicts the encrypted pictures through the Lorenz map. Panel(d)describes the histogram of the encrypted images. Panel(e)describes the decrypted images.

    Fig. 11. Panel (a) presents original and encrypted images. Panel (b) depicts the red color plane of the images. Panel (c) depicts the green color plane of the images. Panel(d)depicts the blue color plane of the images.

    6. Conclusion

    This paper proposed an ESCM to enhance the complexity of existing chaotic maps. The ESCM uses a double nonlinear chaotic transform, including an exponential and a sine function,to enhance chaos complexity. The dynamical behavior of ESCM is verified using the principle of theLE.The resulting enhanced map of the ESCM has better chaos complexity and a much larger chaotic range than an original chaotic map. We applied it to three different dimensional chaotic maps,namely the logistic map,H′enon map,and Lorenz map,and discussed their dynamic behavior. The results confirmed that the enhanced chaos has better performance than their seed map. We used DSP to implement chaos circuits,demonstrating the simplicity of the ESCM in hardware devices. Lastly, to exhibit the practical application of an enhanced chaos map, we applied it to image encryption. The results show that chaotic image encryption hides the information of the original image effectively.

    Acknowledgments

    Project supported by the National Natural Science Foundation of China (Grant No. 51507023), Chongqing Municipal Natural Science Foundation (Grant No. cstc2020jcyjmsxmX0726),and the Science and Technology Research Program of Chongqing Municipal Education Commission(Grant No.KJZD-K202100506).

    猜你喜歡
    海軍
    曉褐蜻
    綠色天府(2022年6期)2022-07-14 11:59:42
    Time evolution law of a two-mode squeezed light field passing through twin diffusion channels
    我的海軍之夢(mèng)
    軍事文摘(2020年22期)2021-01-04 02:17:24
    相信愛
    海軍行動(dòng)
    封面人物·楊海軍
    新聞愛好者(2016年3期)2016-12-01 06:04:24
    海軍協(xié)議1
    New Approach to Calculate the Unavailability of Identical Spares in Cold Spare Configuration
    近代中國(guó)海軍的早期教育
    軍事歷史(1993年3期)1993-08-21 06:16:06
    清末海軍一次引人注目的軍艦出訪
    軍事歷史(1992年6期)1992-08-15 06:25:16
    久久韩国三级中文字幕| 成年女人毛片免费观看观看9 | 国产日韩欧美亚洲二区| videosex国产| 免费在线观看黄色视频的| 黑人欧美特级aaaaaa片| 亚洲欧美日韩另类电影网站| 少妇被粗大的猛进出69影院| 亚洲精品日韩在线中文字幕| 国产精品免费大片| 国产精品嫩草影院av在线观看| 亚洲精品一区蜜桃| 人体艺术视频欧美日本| 一本色道久久久久久精品综合| 毛片一级片免费看久久久久| 高清在线视频一区二区三区| 亚洲人成77777在线视频| 两性夫妻黄色片| 国产视频首页在线观看| 久久人人爽人人片av| 日韩电影二区| 免费观看在线日韩| 久久久久视频综合| 在现免费观看毛片| 精品一品国产午夜福利视频| 天天躁夜夜躁狠狠久久av| 久久久久国产一级毛片高清牌| 亚洲 欧美一区二区三区| 日韩中文字幕欧美一区二区 | 免费黄频网站在线观看国产| 成年美女黄网站色视频大全免费| 成人国语在线视频| 老司机亚洲免费影院| 波多野结衣av一区二区av| 免费高清在线观看日韩| 国产97色在线日韩免费| 亚洲av免费高清在线观看| 国产亚洲精品第一综合不卡| 免费观看在线日韩| 久久久国产一区二区| 一本大道久久a久久精品| 亚洲国产精品国产精品| 国产熟女欧美一区二区| 欧美日韩亚洲国产一区二区在线观看 | 一本大道久久a久久精品| 中文字幕亚洲精品专区| 99国产精品免费福利视频| 超色免费av| 国产亚洲最大av| 亚洲欧美一区二区三区国产| 中文字幕人妻丝袜一区二区 | 国产精品女同一区二区软件| 久久久久久人人人人人| 午夜福利在线免费观看网站| 一本—道久久a久久精品蜜桃钙片| 午夜91福利影院| 韩国精品一区二区三区| 你懂的网址亚洲精品在线观看| 十分钟在线观看高清视频www| 王馨瑶露胸无遮挡在线观看| 三上悠亚av全集在线观看| 欧美日本中文国产一区发布| 亚洲国产av影院在线观看| 午夜福利视频精品| 免费黄频网站在线观看国产| 国产精品 国内视频| 国产精品三级大全| 韩国高清视频一区二区三区| 黄色配什么色好看| 色婷婷av一区二区三区视频| 中文乱码字字幕精品一区二区三区| 国产精品麻豆人妻色哟哟久久| av.在线天堂| 精品久久久久久电影网| 不卡av一区二区三区| 亚洲欧美精品综合一区二区三区 | 日韩一本色道免费dvd| 成人手机av| 久久久久久久久免费视频了| 伊人久久大香线蕉亚洲五| 看十八女毛片水多多多| 中文字幕色久视频| 久久久久国产精品人妻一区二区| 91精品三级在线观看| 18在线观看网站| 久久久久视频综合| 国产成人精品婷婷| 成年av动漫网址| 一区福利在线观看| 人人妻人人澡人人爽人人夜夜| 青草久久国产| 亚洲综合色网址| 丝袜美足系列| 最近2019中文字幕mv第一页| 国产精品无大码| 看非洲黑人一级黄片| 国产精品 国内视频| 国产熟女欧美一区二区| 大香蕉久久网| 成人午夜精彩视频在线观看| 午夜福利视频在线观看免费| 香蕉精品网在线| 狂野欧美激情性bbbbbb| 精品少妇内射三级| 欧美日韩视频高清一区二区三区二| 又粗又硬又长又爽又黄的视频| 看非洲黑人一级黄片| 街头女战士在线观看网站| 寂寞人妻少妇视频99o| 夫妻性生交免费视频一级片| 亚洲在久久综合| 欧美变态另类bdsm刘玥| 青春草视频在线免费观看| 亚洲精品一区蜜桃| 婷婷成人精品国产| 免费黄色在线免费观看| 国产片特级美女逼逼视频| 午夜91福利影院| 男男h啪啪无遮挡| 日日摸夜夜添夜夜爱| 久久综合国产亚洲精品| 激情五月婷婷亚洲| 一边亲一边摸免费视频| 女人精品久久久久毛片| 69精品国产乱码久久久| 汤姆久久久久久久影院中文字幕| 交换朋友夫妻互换小说| 亚洲欧美精品自产自拍| 国产熟女欧美一区二区| 亚洲人成77777在线视频| 久久久久国产网址| 高清视频免费观看一区二区| 亚洲人成网站在线观看播放| 男人添女人高潮全过程视频| 久久久a久久爽久久v久久| 久久人人97超碰香蕉20202| 欧美 日韩 精品 国产| 激情视频va一区二区三区| a 毛片基地| 欧美 亚洲 国产 日韩一| 超碰成人久久| 免费在线观看视频国产中文字幕亚洲 | 国产一区二区三区综合在线观看| 男女无遮挡免费网站观看| 欧美在线黄色| 黑丝袜美女国产一区| 午夜福利在线免费观看网站| 看十八女毛片水多多多| 免费大片黄手机在线观看| 最近最新中文字幕大全免费视频 | 人体艺术视频欧美日本| 成人国产麻豆网| av网站在线播放免费| 卡戴珊不雅视频在线播放| 18禁观看日本| 亚洲精品一二三| 久久免费观看电影| 有码 亚洲区| 久久午夜福利片| 伊人久久大香线蕉亚洲五| 亚洲在久久综合| 一区二区三区精品91| 一级毛片电影观看| 水蜜桃什么品种好| 91成人精品电影| 欧美日韩一区二区视频在线观看视频在线| 国产国语露脸激情在线看| 综合色丁香网| 三级国产精品片| 国产毛片在线视频| 青草久久国产| 中国国产av一级| 久久人人爽人人片av| 亚洲,欧美精品.| 丝袜人妻中文字幕| 777米奇影视久久| 亚洲一区中文字幕在线| 在线观看一区二区三区激情| 美女脱内裤让男人舔精品视频| 色婷婷av一区二区三区视频| 精品久久久精品久久久| 亚洲少妇的诱惑av| 黑丝袜美女国产一区| 亚洲av.av天堂| 午夜91福利影院| 国产亚洲av片在线观看秒播厂| 永久网站在线| 亚洲综合色惰| 欧美 亚洲 国产 日韩一| 久久婷婷青草| 久久99蜜桃精品久久| 青春草亚洲视频在线观看| 亚洲欧美中文字幕日韩二区| 男女午夜视频在线观看| 欧美日韩综合久久久久久| 日韩制服骚丝袜av| 99久国产av精品国产电影| 久久精品熟女亚洲av麻豆精品| av.在线天堂| 久久99一区二区三区| 亚洲国产精品一区二区三区在线| 美女主播在线视频| av一本久久久久| 国产 精品1| 精品一区二区三卡| 欧美日韩一区二区视频在线观看视频在线| 亚洲欧美成人综合另类久久久| 久久97久久精品| 999久久久国产精品视频| 国产一区二区三区综合在线观看| 哪个播放器可以免费观看大片| 伦理电影免费视频| 美女国产高潮福利片在线看| 在线观看一区二区三区激情| 久久精品国产亚洲av高清一级| 一本—道久久a久久精品蜜桃钙片| 一级毛片我不卡| av在线老鸭窝| 精品国产乱码久久久久久男人| 亚洲精品国产色婷婷电影| 精品亚洲乱码少妇综合久久| 哪个播放器可以免费观看大片| 五月天丁香电影| 看免费成人av毛片| 亚洲av福利一区| 丝袜在线中文字幕| 1024视频免费在线观看| 丝袜美足系列| 久久久久国产网址| 黑人欧美特级aaaaaa片| 久久精品aⅴ一区二区三区四区 | 秋霞在线观看毛片| 午夜福利在线观看免费完整高清在| 日韩成人av中文字幕在线观看| 日韩视频在线欧美| 国产成人91sexporn| 亚洲欧美日韩另类电影网站| 男女下面插进去视频免费观看| 免费观看性生交大片5| 亚洲国产看品久久| av免费在线看不卡| 日韩制服丝袜自拍偷拍| 午夜av观看不卡| 国产精品久久久久久精品电影小说| videosex国产| 亚洲 欧美一区二区三区| 日韩一区二区视频免费看| 亚洲国产av影院在线观看| 丰满饥渴人妻一区二区三| 亚洲国产精品一区二区三区在线| 天天躁日日躁夜夜躁夜夜| 欧美+日韩+精品| 欧美精品国产亚洲| av在线老鸭窝| 国产国语露脸激情在线看| 久久人人爽人人片av| 你懂的网址亚洲精品在线观看| 日韩成人av中文字幕在线观看| 午夜福利乱码中文字幕| 又粗又硬又长又爽又黄的视频| 亚洲美女搞黄在线观看| 午夜日本视频在线| 美女福利国产在线| 久久久久久人妻| 国产亚洲最大av| 高清欧美精品videossex| 成年女人在线观看亚洲视频| 国产精品偷伦视频观看了| 日韩成人av中文字幕在线观看| 久久久久久久亚洲中文字幕| 国产成人精品福利久久| 欧美日韩亚洲国产一区二区在线观看 | 久久97久久精品| 国产日韩欧美亚洲二区| 少妇 在线观看| 人人妻人人爽人人添夜夜欢视频| 久久精品久久久久久噜噜老黄| 性色avwww在线观看| 男女无遮挡免费网站观看| 欧美日韩成人在线一区二区| 啦啦啦在线免费观看视频4| 国产乱人偷精品视频| 国产成人精品久久久久久| 激情五月婷婷亚洲| 欧美 日韩 精品 国产| 在线天堂最新版资源| 欧美少妇被猛烈插入视频| 国产精品国产三级国产专区5o| 精品少妇黑人巨大在线播放| 国产麻豆69| a 毛片基地| 日本黄色日本黄色录像| 少妇人妻久久综合中文| 国产 精品1| 不卡视频在线观看欧美| 国产麻豆69| 亚洲欧美中文字幕日韩二区| 伦精品一区二区三区| 亚洲美女视频黄频| 免费日韩欧美在线观看| 亚洲欧美成人精品一区二区| 欧美日韩精品成人综合77777| 人妻人人澡人人爽人人| 少妇被粗大的猛进出69影院| av免费观看日本| 欧美人与性动交α欧美软件| 考比视频在线观看| 免费在线观看黄色视频的| 国产精品熟女久久久久浪| 欧美黄色片欧美黄色片| 亚洲伊人久久精品综合| av女优亚洲男人天堂| 国产毛片在线视频| 久久久久久伊人网av| 免费日韩欧美在线观看| 欧美+日韩+精品| 色吧在线观看| 亚洲欧美精品综合一区二区三区 | 久久免费观看电影| 国产精品三级大全| 九九爱精品视频在线观看| 国产成人精品久久久久久| 久久人人爽av亚洲精品天堂| 日韩制服丝袜自拍偷拍| 最近最新中文字幕大全免费视频 | 男的添女的下面高潮视频| 午夜免费鲁丝| 极品少妇高潮喷水抽搐| a级毛片在线看网站| av国产精品久久久久影院| av在线老鸭窝| 欧美日韩成人在线一区二区| 少妇猛男粗大的猛烈进出视频| 欧美在线黄色| 日本午夜av视频| 看免费av毛片| 精品一品国产午夜福利视频| 欧美日韩成人在线一区二区| 麻豆乱淫一区二区| 色94色欧美一区二区| 一级片'在线观看视频| 亚洲精品中文字幕在线视频| 精品国产露脸久久av麻豆| av一本久久久久| 精品人妻一区二区三区麻豆| 电影成人av| 中文字幕av电影在线播放| 欧美精品高潮呻吟av久久| 大香蕉久久成人网| 好男人视频免费观看在线| 久久这里有精品视频免费| 精品国产乱码久久久久久小说| a级毛片黄视频| 黄色一级大片看看| 啦啦啦视频在线资源免费观看| 欧美+日韩+精品| 欧美日韩视频高清一区二区三区二| 欧美黄色片欧美黄色片| 日本爱情动作片www.在线观看| 伦精品一区二区三区| 9色porny在线观看| 老汉色av国产亚洲站长工具| 91精品国产国语对白视频| 黄色配什么色好看| 精品卡一卡二卡四卡免费| 亚洲经典国产精华液单| 亚洲综合精品二区| 国产福利在线免费观看视频| 丝袜脚勾引网站| 国产福利在线免费观看视频| 最近2019中文字幕mv第一页| 久久99精品国语久久久| 妹子高潮喷水视频| 亚洲天堂av无毛| 国产精品久久久久久精品古装| 欧美日韩视频精品一区| 中文字幕亚洲精品专区| 少妇人妻久久综合中文| 国产成人精品一,二区| 国产男人的电影天堂91| 成人午夜精彩视频在线观看| 两个人看的免费小视频| 老汉色av国产亚洲站长工具| 久久97久久精品| 精品酒店卫生间| 男男h啪啪无遮挡| 亚洲成色77777| 欧美日韩国产mv在线观看视频| 亚洲av电影在线进入| 大片免费播放器 马上看| 国产男女超爽视频在线观看| 最近手机中文字幕大全| 边亲边吃奶的免费视频| 久久久久国产精品人妻一区二区| 黄片无遮挡物在线观看| 亚洲精品国产av蜜桃| 久久这里只有精品19| 乱人伦中国视频| 亚洲国产av新网站| 一个人免费看片子| 2018国产大陆天天弄谢| 久久久欧美国产精品| 成人影院久久| 99国产精品免费福利视频| av国产精品久久久久影院| 女人久久www免费人成看片| 少妇猛男粗大的猛烈进出视频| 亚洲成色77777| 一级毛片我不卡| 欧美xxⅹ黑人| 亚洲精品第二区| 国产黄频视频在线观看| 晚上一个人看的免费电影| 亚洲欧美成人综合另类久久久| 伊人久久国产一区二区| 又粗又硬又长又爽又黄的视频| 午夜福利乱码中文字幕| 人人澡人人妻人| 欧美激情极品国产一区二区三区| 好男人视频免费观看在线| 中文字幕另类日韩欧美亚洲嫩草| 黄色视频在线播放观看不卡| 青草久久国产| 久久精品国产亚洲av天美| 精品久久久久久电影网| 日韩视频在线欧美| 亚洲国产精品一区三区| 性高湖久久久久久久久免费观看| 国语对白做爰xxxⅹ性视频网站| 中文字幕另类日韩欧美亚洲嫩草| 水蜜桃什么品种好| 日本av免费视频播放| 久久久久久人妻| 十分钟在线观看高清视频www| 国产色婷婷99| 成人影院久久| 精品酒店卫生间| 性色avwww在线观看| 国产成人精品久久二区二区91 | 女人被躁到高潮嗷嗷叫费观| 桃花免费在线播放| 久久婷婷青草| 黄色怎么调成土黄色| 国产成人精品在线电影| 成年人午夜在线观看视频| 丝袜人妻中文字幕| 男人舔女人的私密视频| 各种免费的搞黄视频| 一区二区日韩欧美中文字幕| 天美传媒精品一区二区| 叶爱在线成人免费视频播放| 国产精品免费视频内射| 久久久久久久久久久久大奶| 国产精品一国产av| 边亲边吃奶的免费视频| 一区二区三区激情视频| 国产欧美日韩综合在线一区二区| 丁香六月天网| 国产视频首页在线观看| 精品酒店卫生间| 亚洲欧美清纯卡通| 日韩av不卡免费在线播放| 久久久精品区二区三区| 国产成人91sexporn| 青春草视频在线免费观看| 亚洲av电影在线观看一区二区三区| 亚洲国产日韩一区二区| 99久久精品国产国产毛片| 亚洲一区二区三区欧美精品| 建设人人有责人人尽责人人享有的| 91午夜精品亚洲一区二区三区| 一边亲一边摸免费视频| 欧美人与性动交α欧美软件| av有码第一页| 欧美日韩亚洲国产一区二区在线观看 | 在线观看美女被高潮喷水网站| 1024香蕉在线观看| 欧美bdsm另类| 伦理电影免费视频| 国产精品久久久av美女十八| 免费不卡的大黄色大毛片视频在线观看| 涩涩av久久男人的天堂| 久久这里只有精品19| 97在线人人人人妻| 一本—道久久a久久精品蜜桃钙片| 午夜影院在线不卡| 777米奇影视久久| 国产成人精品一,二区| 99久久中文字幕三级久久日本| 国产乱来视频区| 伊人亚洲综合成人网| 亚洲四区av| 久久女婷五月综合色啪小说| 在线观看国产h片| 一区二区日韩欧美中文字幕| 国产亚洲欧美精品永久| 国产日韩欧美在线精品| 自拍欧美九色日韩亚洲蝌蚪91| 巨乳人妻的诱惑在线观看| 777米奇影视久久| 精品视频人人做人人爽| 国产精品免费大片| 日韩一区二区视频免费看| 一级毛片电影观看| 18+在线观看网站| 欧美精品av麻豆av| 免费在线观看完整版高清| 国产综合精华液| 久久精品国产亚洲av涩爱| 亚洲 欧美一区二区三区| 丝瓜视频免费看黄片| 18在线观看网站| 另类精品久久| 日本色播在线视频| 亚洲国产欧美日韩在线播放| 日本午夜av视频| 久久久久久久国产电影| 精品一区二区免费观看| av在线app专区| 亚洲一级一片aⅴ在线观看| 天天影视国产精品| 日韩大片免费观看网站| 免费黄频网站在线观看国产| 国产一区二区在线观看av| 在线观看www视频免费| 欧美亚洲 丝袜 人妻 在线| 亚洲欧美中文字幕日韩二区| 最新的欧美精品一区二区| 啦啦啦啦在线视频资源| 成人黄色视频免费在线看| 久久久久久久国产电影| 精品国产一区二区久久| 欧美日韩亚洲高清精品| 大陆偷拍与自拍| 超碰成人久久| 免费观看av网站的网址| videossex国产| 久久久国产精品麻豆| 午夜福利视频精品| 久久精品国产亚洲av高清一级| 99热全是精品| 国产在线视频一区二区| 国产一区二区 视频在线| 久久久久国产网址| 男男h啪啪无遮挡| 在线天堂最新版资源| 久久久久网色| 亚洲av中文av极速乱| 国产亚洲一区二区精品| 中文字幕人妻熟女乱码| 如何舔出高潮| 国产欧美日韩综合在线一区二区| 久久精品国产鲁丝片午夜精品| 中文字幕色久视频| 亚洲视频免费观看视频| 国产免费视频播放在线视频| 夫妻性生交免费视频一级片| 99久国产av精品国产电影| 欧美日韩一区二区视频在线观看视频在线| 婷婷色综合www| 日本免费在线观看一区| 久久久久国产精品人妻一区二区| 最黄视频免费看| 亚洲图色成人| 菩萨蛮人人尽说江南好唐韦庄| 国产深夜福利视频在线观看| 各种免费的搞黄视频| 1024香蕉在线观看| 国产成人a∨麻豆精品| 亚洲第一区二区三区不卡| 成年人午夜在线观看视频| 亚洲精品视频女| 丝袜在线中文字幕| 哪个播放器可以免费观看大片| 久久精品国产亚洲av天美| 国产一区二区在线观看av| 美女午夜性视频免费| 中国国产av一级| 大陆偷拍与自拍| 少妇熟女欧美另类| 亚洲欧洲国产日韩| 九九爱精品视频在线观看| 亚洲综合色网址| 久久av网站| 一级毛片我不卡| 久久精品国产亚洲av高清一级| 在现免费观看毛片| 国产黄色免费在线视频| 久久久久久久国产电影| 午夜激情久久久久久久| h视频一区二区三区| 一边亲一边摸免费视频| 亚洲,欧美,日韩| 国产免费一区二区三区四区乱码| 永久网站在线| 不卡av一区二区三区| 亚洲精品自拍成人| 成年av动漫网址| 日韩av免费高清视频| 一区二区日韩欧美中文字幕| 搡老乐熟女国产| 久久久久精品人妻al黑| 2021少妇久久久久久久久久久| 精品人妻偷拍中文字幕| 国产精品久久久久久精品古装| 中文字幕人妻熟女乱码| 久久久国产欧美日韩av| 国产精品三级大全| 国产伦理片在线播放av一区| 精品少妇内射三级| 国产女主播在线喷水免费视频网站| 韩国高清视频一区二区三区| 国产极品粉嫩免费观看在线| 97在线人人人人妻| 欧美少妇被猛烈插入视频|