• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Secure and Robust Optical Multi-Stage Medical Image Cryptosystem

    2022-11-09 08:15:06WalidElShafaiMoustafaAlyAbeerAlgarniFathiAbdElSamieandNaglaaSoliman
    Computers Materials&Continua 2022年1期

    Walid El-Shafai,Moustafa H.Aly,Abeer D.Algarni,Fathi E.Abd El-Samie,3 and Naglaa F.Soliman

    1Department Electronics and Electrical Communications,Faculty of Electronic Engineering,Menoufia University,Menouf,32952,Egypt

    2Department of Electronics and Communications Engineering,College of Engineering and Technology,Arab Academy for Science,Technology and Maritime Transport,Alexandria,1029,Egypt

    3Department of Information Technology,College of Computer and Information Sciences,Princess Nourah Bint Abdulrahman University,Riyadh,84428,Saudi Arabia

    4Department of Electronics and Communications,Faculty of Engineering,Zagazig University,Zagazig,44519,Egypt

    Abstract: Due to the rapid growth of telemedicine and healthcare services,color medical image security applications have been expanded precipitously.In this paper,an asymmetric PTFrFT (Phase Truncated Fractional Fourier Transform)-based color medical image cryptosystem is suggested.Two different phases in the fractional Fourier and output planes are provided as deciphering keys.Accordingly,the ciphering keys will not be employed for the deciphering procedure.Thus,the introduced PTFrFT algorithm comprises asymmetric ciphering and deciphering processes in contrast to the traditional optical symmetric OSH (Optical Scanning Holography) and DRPE(Double Random Phase Encoding)algorithms.One of the principal impacts of the introduced asymmetric cryptosystem is that it eliminates the onedimensionality aspects of the related symmetric cryptosystems due to its remarkable feature of phase nonlinear truncation components.More comparisons on various color medical images are examined and analyzed to substantiate the cryptosystem efficacy.The achieved experimental outcomes ensure that the introduced cryptosystem is robust and secure.It has terrific cryptography performance compared to conventional cryptography algorithms,even in the presence of noise and severe channel attacks.

    Keywords: Optical encryption;medical image security;symmetric and asymmetric encryption;OSH;DRPE;PTFrFT

    1 Introduction

    Digitalization is a huge part of our life today,with broad applications in health,science,engineering,media,communication,etc.A large amount of digital multimedia data is often transmitted via open networks with the widespread use of the Internet.Therefore,the security and integrity of this large amount of data are of great concern [1,2].A type of the precious data is represented with digital images used in various beneficial applications such as military,biometric authentication,online shopping,online banking,healthcare systems,telemedicine,medical science,etc.[3-5].

    The lack of powerful security and protection tools could cause various threats and attacks,leading to serious disasters for people and networks.In medical image communication through the Internet,intruders can simply retrieve the images because of the shortage in security levels.Therefore,the protection of the transmitted image information becomes a serious problem.Several papers described different multimedia encryption techniques like those found in [1-21].There are several chaotic maps in the state-of-the-art works,such as Arnold map,Logistic map,and Cat map [12-21].Various image security and image cryptography techniques based on chaos systems have been presented in [22-27].The main disadvantage of the traditional chaotic-mapbased cryptography procedures is that they depend on lower-order chaos functions.Therefore,it is essential to develop robust cryptography algorithms to avoid this disadvantage.

    The conventional cryptography techniques [28-34] have nevertheless been found not appropriate for efficient image communication due to their underlying characteristics like large number of iterations,high pixel redundancy,strong correlation,and large computational cost.So,they minimize the inclusive security performance.Thus,it is urgent to preclude medical images from the risks of attacks and threats through employing effective cryptography techniques.Consequently,due to the importance of medical data security,this paper presents a robust way of managing and securing color medical image communication for achieving reliable security in telemedicine applications.

    This motivated us,in this paper,to implement an effective and asymmetric optical color medical image cryptosystem,where two random phases are exploited as ciphering keys that are distinct from the deciphering keys.The introduced cryptosystem has an attractive advantage of nonlinear truncation of phase components for the communication of color medical images through insecure channels.Hence,it is suitable for cloud-based telemedicine and healthcare applications.Simulation results of the proposed cryptosystem on different color medical images prove better security performance with lower computational cost in the presence of different types of noise and multimedia attacks.

    The paper is planned as follows.Section 2 presents some work related to medical image security.Section 3 introduces the inclusive clarification of the suggested asymmetric cryptosystem for secure color medical image communication.Simulation outcomes and comparisons are provided in Section 5.The main concluding remarks are offered in Section 6.

    2 Related Work

    There is a critical need for telemedicine healthcare opportunities and facilities that can be delivered through software tools.This will create a healthcare delivery system with more timeliness and efficiency.Security plays a crucial role in the transmission of medical data via the Internet.Recently,it has become a challenge to secure medical images in healthcare and telemedicine applications [35-38].Gupta et al.[39] introduced a high-security medical image cryptosystem that depends on logstic map.In [40],the authors introduced a comparison between chaos theory and elliptic curve cryptography as tools for image security.Abdel-Nabi et al.[41] proposed an algorithm that merges reversible data steganography and ciphering approaches to achieve the required protection of stored and transmitted medical data and images.

    In [42],a hybrid approach was proposed for partial encryption.It guarantees optimal and robust storage and communication of medical information.This approach has low processing time for the ciphering-deciphering processes.Bharghavi et al.[43] presented an efficient security system based on chaotic logistic map for reliable medical image transmission.In [44],a robust and fast medical image ciphering approach was suggested for real-time medical communication services.In [45],the authors presented a powerful and efficient medical image ciphering approach.Two chaotic sequences are utilized in this approach for key generation.Then,a diffusion process with two rounds is adopted to create the encrypted medical images.Dai et al.[46] explained a new technique for medical image security based on a hybrid structure of Chebyshev maps and logistic maps to enhance the ciphering performance.In [47],the authors presented a partial encryption framework based on a chaotic map and DNA encoding for securing medical images.

    Puech et al.[48] investigated different ciphering techniques for medical image communication.The advantage of these techniques is that they can be employed for images,videos,and 3D objects.In [49],corresponding to cellular automata chaotic features,the authors proposed an efficient medical image ciphering algorithm.The simulation findings showed that this algorithm offers more security and speed.Saraswathi et al.[50] introduced an efficient medical image crptosystem based on an asymmetric stream cipher security technique.It has been concluded that this cryptosystem is robust against various types of cyberattacks.Suganya et al.[51] proposed a hybrid cryptosystem that depends on stream-based and block-based ciphering algorithms.This cryptosystem highly provides integrity control and encryption of medical images.Zhou et al.[52]suggested a security technique that is capable of full protection of chosen regions/objects in medical images.

    Moreover,several image security systems [53-58] can be exploited in medical imaging services.In [53],the authors introduced an optical image security algorithm using fringe projection profilometry and Fourier fringe analysis.Das et al.[54] developed an image security system in which the input image is ciphered based on a user-defined key.Jain et al.[55] proposed a partial-randomphase-encoding-based color image ciphering and deciphering framework.Li et al.[56] suggested an effective hybrid image ciphering/compression framework.Ramaraju et al.[57] proposed a leastsignificant-bit-based image hiding technique.It hides four images inside a single image to generate a stego-image that is then ciphered with a secret key.Wen et al.[58] proposed a robust optical salient region ciphering method,in which the salient regions are pre-ciphered by employing a chaotic optical ciphering technique.

    Although the statistical security analysis of the previous related works [1-58] showed numerous differences,most of the presented methods have significant challenges with ciphering and deciphering processes.The traditional encryption methods do not achieve the required quality level in the presence of multimedia assaults.Consequently,the presented state-of-the-art methods have low performance levels in the presence of multimedia attacks and channel noise.Additionally,the state-of-the-art methods have not been assessessed with enough evaluation metrics and in-detail statistical security analysis.In addition,they necessitate additional calculations in the ciphering and deciphering procedures,and hence,they have large computational cost.Therefore,considering the shortcomings of the previous encryption methods in the literature,an efficient optical color medical image cryptosystem based on the asymmetric PTFrFT encryption algorithm is suggested in this paper for telemedicine and healthcare security applications.The security examination of the presented algorithm is investigated through visual results,differential analysis,histograms,encryption quality analysis,information entropy,communication noise analysis,and security analysis.Therefore,several statistical tests on different samples of color medical images are performed.

    3 Proposed Optical PTFrFT-Based Color Medical Image Cryptosystem

    The proposed optical cryptosystem consists of two stages of encryption and decryption as illustrated in Figs.1a and 1b.The encryption keys of the medical images comprise the generated optical keys of arbitrary phase masks (PMs) of the employed asymmetric PTFrFT algorithm.

    Figure 1:Suggested multi-stage PTFrFT-based color medical image cryptosystem (a) Encryption stage (b) Decryption stage

    The precious aspect of the employed asymmetric PTFrFT cryptosystem is that there are two distinct ciphering/deciphering secret keys.This tremendous trait has encouraged us to utilize it for building a secure and robust color medical image cryptosystem.The PTFrFT is estimated with the FrFT of the plain color medical image with the truncation operation of phase components,where the amplitude modular part of the FrFT spectrum is merely exploited,and the phase part of the FrFT spectrum is separated.The ciphering methodology of the introduced cryptosystem is executed with the steps demonstrated in Fig.1a.

    1) Separate the input color medical image into the R,G,and B color componentsIR(m,n),IG(m,n),andIB(m,n)as offered in Eq.(1).

    2) Multiply the separated color components by the first phase masksPMR1,PMG1,andPMB1,and then apply the first FrFT operation with the first fractional ordersOR1,OG1,andOB1to produce the primary encrypted image components.Each of these components can be decomposed into two parts: phase retaining part as in Eqs.(2)-(4) and phase truncated part as in Eqs.(5)-(7).

    wherePR{.} andPT{.} are the phase reservation and truncation operators,respectively.ThePMR1(m,n),PMG1(m,n),andPMB1(m,n)are the primary encryption phase masks that are randomly generated by the 2D Arnold map [3].

    3) Similarly,repeat Step (2) through multiplying by the second phase masksPMR2,PMG2,andPMB2,and performing the second FrFT operation with the second fractional ordersOR2,OG2,andOB2to produce the final encrypted image components.Each of these components has two parts: phase retaining part as in Eqs.(8)-(10) and the phase truncated part as in Eqs.(11)-(13).

    where the obtainedPR2,PG2,andPB2are then utilized as the decrypted keys.ThePMR2(m,n),PMG2(m,n),andPMB2(m,n)are the final encryption phase masks that are given by Eqs.(14)-(16) comprising the phase functionexp[j ψ (m,n)].

    whereψ(m,n)∈[0,2π].

    The benefit from using two FrFT stages is significantly improving the robustness and security of the introduced medical image cryptosystem based on the fractional orders and scaling factors of the FrFT.Due to these advantages,it is highly recommended in the proposed cryptosystem.More detailed discussions about the FrFT are found [4,5].The deciphering steps are the inverse of the above-mentioned ciphering steps,as demonstrated in Fig.1b.Consequently,the deciphering procedure can be implemented by exploiting the private deciphering secret keysP2(m,n)andP1(m,n),where the PTFrFT is an asymmetric transform.

    4 Results and Discussions

    Different color medical images that have different features are chosen and examined to substantiate the profits of the suggested optical color medical image cryptosystem.The utilized color medical images are primarily decomposed into their R,G,and B components to be used as the cryptosystem input.The simulation experiments are performed using a laptop with 8 GB RAM,and i7-5200 Intel CPU.The utilized software in the simulation tests is the MATLAB R2020b.

    4.1 Visual Results

    The visual analysis is the most important assessment tool utilized to appraise the security strength and efficiency of the suggested cryptosystem.The examined color medical images and their encrypted versions with the suggested optical asymmetric cryptosystem and the conventional optical symmetric DRPE and OSH cryptosystems [7,9,10,22] are displayed in Fig.2.It is obvious that the suggested cryptosystem is more beneficial compared to other cryptosystems in concealing and diminishing the significant objects contained within the studied color medical images.

    Figure 2:Original color medical images and their encrypted versions with the PTFrFT,OSH,and DRPE cryptosystems

    4.2 Histogram Results

    The pixel distributions of the original and ciphered images can be demonstrated through histogram analysis [16].Both histograms of the original and ciphered images must be different to illustrate good encryption.Fig.3 indicates the histogram security analysis of the examined original and ciphered images with the suggested and conventional cryptosystems.It is obvious that the original image histograms are entirely different from the ciphered image histograms.This proves the reliability of the suggested cryptosystem and the conventional ones.

    Figure 3:Histogram outcomes for the PTFrFT,OSH,and DRPE cryptosystems

    4.3 Entropy Results

    The entropy metric is exploited to describe the unpredictability degree of the ciphered color medical image.The proposed cryptosystem is close to achieving an ideal entropy value of 8 [23].Tab.1 offers the entropy outcomes of the analyzed original,encrypted,and decrypted color medical images for the suggested optical PTFrFT cryptosystem and the conventional optical cryptosystems.The obtained superior entropy values for the suggested cryptosystem prove its robustness and reliability compared to other cryptosystems through achieving better values close to the desired optimal value.

    Table 1:Entropy outcomes for the PTFrFT,OSH,and DRPE cryptosystems

    4.4 Correlation Results

    Remarkable cryptosystems are supposed to eliminate any relationship among color medical image pixels to protect the color medical image content from statistical channel attacks [20].Tabs.2-4 demonstrate the diagonal (D),horizontal (H),and vertical (V) correlation outcomes for the studied original,enciphered,and deciphered color medical images with the proposed cryptosystem compared to DRPE and OSH cryptosystems.The obtained D,H,and V correlation values are enormously low for the ciphered images obtained by the proposed cryptosystem compared to the traditional cryptosystems.This proves its superior security performance.

    Table 2:Correlation outcomes of the DRPE cryptosystem [9,22]

    Table 3:Correlation outcomes of the OSH cryptosystem [7,10]

    Table 4:Correlation outcomes of the proposed PTFrFT cryptosystem

    4.5 Encryption Quality Security Analysis

    The deviation irregularity (ID) and the histogram deviation (HD) metrics [53] can be used to assess the quality performance and ciphering efficacy of the proposed optical cryptosystem.They are utilized to determine the deviation percentage of the irregularity and histogram difference between the original and ciphered medical images.Tab.5 demonstrates the estimatedIDandHDoutcomes,where lower values are obtained for both,which is recommended for achieving superior ciphering efficacy.Consequently,the larger the decorrelation between the original and ciphered images is,the improved the operation of the suggested cryptosystem compared to the conventional DRPE and OSH cryptosystems.

    Table 5:Histogram and irregular deviation results of the encrypted color medical images

    4.6 Differential Security Analysis

    The differential security cryptanalysis in terms of the NPCR (Number of Changing Pixel Rate) and UACI (Unified Averaged Changed Intensity) [44] is employed to verify the robustness of the proposed cryptosystem in the presence of slight modifications of the encrypted images.For good security and robustness,it is required to achieve NPCR and UACI values of 0.996 and 0.33,respectively [9].It is observed that the obtained UACI and NPCR values in Tab.6 for the proposed cryptosystem are astonishingly close to the desired values in contrast to the conventional cryptosystems.

    Table 6:NPCR and UACI outcomes of the tested color medical images

    4.7 SSIM,FSIM and PSNR Analysis

    The SSIM (Structural Similarity),PSNR (Peak Signal-to-Noise Ratio),and FSIM (Feature Similarity) metrics [12,17] are exploited to assess the cryptosystem performance.In our security analysis,these metrics are calculated between the enciphered and plain medical images.They need to have small values for a proper enciphering process.Tab.7 demonstrates the obtained results of the proposed and the conventional DRPE and OSH cryptosystems,where superior values are delivered by the proposed cryptosystem in contrast to the traditional cryptosystems.

    Table 7:SSIM,FSIM and PSNR outcomes between the plain and encrypted medical images for the PTFrFT,OSH,and DRPE cryptosystems

    4.8 Edge Security Analysis

    The metric of EDR (Edge Differential Ratio) is employed to evaluate the misrepresentations in the boundaries and borders that result from the encryption process in the color medical images [24].Tab.8 reveals that the EDR outcomes of the examined color medical images are close to 1 for the proposed PTFrFT cryptosystem.Thus,this guarantees that the encrypted and plain images are totally different.Fig.4 shows the Laplacian edge Gaussian results of the original and enciphered images with the proposed cryptosystem compared to those of the conventional algorithms.These visual outcomes confirm the amazing benefit of the proposed cryptosystem in concealing the most important aspects and features within the transmitted medical images.

    Table 8:EDR values of the encrypted images for the DRPE,OSH,and PTFrFT cryptosystems

    4.9 Key Sensitivity Security Analysis

    It is required for a cryptosystem to be susceptible to the control and initial values [17].This can be validated by investigating the key security analysis.The suggested cryptosystem provides different outcomes,when the control parameters are changed.Fig.5 offers the key sensitivity outcomes in the form of decrypted images and their histograms using incorrect key values.It is observed that the suggested cryptosystem and the tested DRPE and OSH cryptosystems have high sensitivity to slight changes in control parameters.

    Figure 4:Laplacian edge Gaussian results for the plain and enciphered medical images with the DRPE,OSH,and PTFrFT cryptosystems

    Figure 5:Results of key sensitivity analysis for the DRPE,OSH,and PTFrFT cryptosystems

    4.10 Effect of Channel Noise

    The transmission network commonly encompasses different types of noise.The proposed decryption process should survive the impact of noise.The effects of Salt and Pepper,Gaussian,and Speckle noise [14,22,47] are investigated in the simulation experiments.Figs.6-8 display the outcomes of deciphered medical images for the encrypted images presented in Fig.2 in the presence of noise with different amounts with the proposed PTFrFT and the conventional DRPE and OSH cryptosystems.It is observed that the deciphered color medical images are measurable and discernable if the transmission noise affects the enciphered color medical images.Hence,the proposed cryptosystem has a noticable advantage of resisting the effect of transmission noise compared to the conventional DRPE and OSH cryptosystems.

    Figure 6:Decrypted images in the presence of Gaussian noise with the DRPE,OSH,and PTFrFT cryptosystems

    4.11 Computational Processing Analysis

    It is recommended for any cryptosystem to have less computations in addition to high security and efficacy.Tab.9 presents the estimated values of the encryption/decryption times for the DRPE,OSH,and PTFrFT cryptosystems.The estimated encryption/decryption computation times provide evidence that the suggested cryptosystem is highly appropriate for real-time telemedicine services compared to other conventional cryptosystems.

    Figure 7:Decrypted images in the presence of Speckle noise with the DRPE,OSH,and PTFrFT cryptosystems

    4.12 Comparative Study

    In this section,we introduce a comprehensive comparative study for evaluating the performance of the proposed cryptosystem for confident color medical image transmission compared to the recent studies [3-6,8,11-21,29,30,32,34] using the color Lena image.The outcomes of the average UACI,correlation,entropy,PSNR,and NPCR values for the enciphered color image are demonstrated in Tab.10.It is noticed that all security evaluation metrics of the proposed cryptosystem are close or superior to those of the previous studies.Thus,the proposed optical cryptosystem can survive various types of multimedia attacks due to its robustness and reliability compared to related cryptosystems.It also achieves a higher level of confusion efficacy.The obtained outcomes reveal that the proposed optical cryptosystem has minimal complications and good resistance to various types of attacks compared to the conventional cryptosystems.In summary,the proposed cryptosystem provides more robustness and security and higher speed.

    Figure 8:Decrypted images in the presence of Salt and Pepper noise with the DRPE,OSH,and PTFrFT cryptosystems

    Table 9:Encryption/decryption times for the DRPE,OSH,and PTFrFT cryptosystems

    Table 10:Comparative study of the proposed cryptosystem and recent related cryptosystems

    5 Conclusion and Suggestions for Future Work

    A secure optical cryptosystem was suggested for efficient color medical image communication.It is based on the utilization of the optical asymmetric PTFrFT algorithm.In the proposed cryptosystem,a multi-stage FrFT with different fractional orders is exploited for allowing a secure and robust color medical image transmission for telemedicine applications.The suggested asymmetric cryptosystem depends on two-phase distributions in the fractional Fourier and output planes as decryption keys.Comparison and simulation experiments have been carried out to compare the proposed optical cryptosystem with other optical and digital cryptosystems.The obtained results confirmed the exciting success of the proposed optical cryptosystem in meritoriously ciphering the transmitted color medical images.Subsequently,it is highly appreciated for safeguarding medical image telemedicine services rather than the conventional optical and digital cryptosystems.In the future work,we plan to test the proposed cryptosystem on 3D medical images with different modalities.A hybrid cryptosystem of digital and optical encryption algorithms could be introduced to merge their main advantages for achieving high robustness and security of medical image communication.

    Acknowledgement: The authors would like to thank the support of the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University.

    Funding statement:This research was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University through the Fast-track Research Funding Program to support publication in the top journal (Grant no.42-FTTJ-12).

    Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.

    亚洲av免费高清在线观看| 老司机影院毛片| av卡一久久| 国产亚洲最大av| 亚洲国产欧美在线一区| 777米奇影视久久| av又黄又爽大尺度在线免费看| 菩萨蛮人人尽说江南好唐韦庄| 一本—道久久a久久精品蜜桃钙片| 日本与韩国留学比较| 久久99蜜桃精品久久| 亚洲美女黄色视频免费看| 久久久久久久久久久久大奶| 亚洲激情五月婷婷啪啪| 在线观看av片永久免费下载| 成人亚洲欧美一区二区av| 亚洲久久久国产精品| 成年人免费黄色播放视频 | 亚洲欧美成人精品一区二区| 人人妻人人看人人澡| 少妇的逼水好多| 中文资源天堂在线| 男女无遮挡免费网站观看| 97超碰精品成人国产| 99国产精品免费福利视频| 精品国产一区二区三区久久久樱花| 久久热精品热| 日韩制服骚丝袜av| 多毛熟女@视频| 一区二区三区四区激情视频| 日本色播在线视频| 国产乱来视频区| 欧美3d第一页| 黄色视频在线播放观看不卡| 国产乱来视频区| 自线自在国产av| 亚洲国产毛片av蜜桃av| 自线自在国产av| 亚洲精品国产色婷婷电影| 久久综合国产亚洲精品| 91久久精品国产一区二区成人| 午夜福利影视在线免费观看| 少妇人妻精品综合一区二区| 纯流量卡能插随身wifi吗| 十八禁高潮呻吟视频 | 免费观看在线日韩| 男的添女的下面高潮视频| 国产熟女欧美一区二区| 天天躁夜夜躁狠狠久久av| 国产精品国产三级专区第一集| 亚洲欧美成人综合另类久久久| 各种免费的搞黄视频| 亚洲天堂av无毛| 观看av在线不卡| 亚洲av男天堂| 丰满人妻一区二区三区视频av| √禁漫天堂资源中文www| 视频中文字幕在线观看| av国产久精品久网站免费入址| 春色校园在线视频观看| 亚洲欧美中文字幕日韩二区| 久久久久国产精品人妻一区二区| 在线免费观看不下载黄p国产| 欧美日韩亚洲高清精品| 乱码一卡2卡4卡精品| 少妇的逼水好多| 日韩,欧美,国产一区二区三区| 国产精品.久久久| 一级毛片黄色毛片免费观看视频| 久久热精品热| 亚洲成人av在线免费| 免费观看av网站的网址| 国产有黄有色有爽视频| 99国产精品免费福利视频| kizo精华| 国产91av在线免费观看| 青春草国产在线视频| 成人二区视频| 精品亚洲乱码少妇综合久久| 一级毛片aaaaaa免费看小| 亚洲无线观看免费| 日韩熟女老妇一区二区性免费视频| 精品国产露脸久久av麻豆| 91久久精品电影网| 日本与韩国留学比较| 精品一区二区免费观看| 又粗又硬又长又爽又黄的视频| 成人漫画全彩无遮挡| 国模一区二区三区四区视频| 日韩欧美精品免费久久| 国语对白做爰xxxⅹ性视频网站| 国产精品久久久久成人av| 18禁在线无遮挡免费观看视频| 老女人水多毛片| 丝袜喷水一区| 在线播放无遮挡| av天堂中文字幕网| 亚洲精品视频女| 极品人妻少妇av视频| 少妇的逼好多水| 日本av手机在线免费观看| 一本久久精品| 老司机亚洲免费影院| 韩国av在线不卡| av视频免费观看在线观看| 日韩av不卡免费在线播放| 亚洲欧洲日产国产| 久久精品久久久久久久性| 久久久久久久久久成人| 人人妻人人澡人人看| 热re99久久国产66热| 十八禁高潮呻吟视频 | 色视频在线一区二区三区| 免费看日本二区| 看免费成人av毛片| 国产精品秋霞免费鲁丝片| 男男h啪啪无遮挡| 黑人巨大精品欧美一区二区蜜桃 | 亚洲,一卡二卡三卡| 久久免费观看电影| av播播在线观看一区| 国产真实伦视频高清在线观看| 久久精品国产自在天天线| 又粗又硬又长又爽又黄的视频| 亚洲成人手机| 51国产日韩欧美| 极品少妇高潮喷水抽搐| 亚洲性久久影院| 亚洲av欧美aⅴ国产| 精品国产一区二区久久| 狂野欧美激情性xxxx在线观看| 亚洲精品国产av成人精品| 亚洲国产成人一精品久久久| 日韩欧美一区视频在线观看 | 亚洲自偷自拍三级| 国产av国产精品国产| a级毛色黄片| 久久久久久久久久成人| 色吧在线观看| 三级国产精品片| 欧美+日韩+精品| 美女主播在线视频| 一本一本综合久久| 人人妻人人爽人人添夜夜欢视频 | 人妻少妇偷人精品九色| 十八禁网站网址无遮挡 | 老司机影院成人| 国产伦精品一区二区三区视频9| 蜜臀久久99精品久久宅男| 色吧在线观看| 国产高清有码在线观看视频| 热99国产精品久久久久久7| 午夜激情福利司机影院| 97精品久久久久久久久久精品| 免费黄网站久久成人精品| 熟女av电影| 欧美xxⅹ黑人| 国内揄拍国产精品人妻在线| 亚洲精品国产色婷婷电影| 大香蕉97超碰在线| 欧美 日韩 精品 国产| av视频免费观看在线观看| 欧美xxⅹ黑人| 日韩制服骚丝袜av| 午夜免费鲁丝| 麻豆精品久久久久久蜜桃| 美女中出高潮动态图| 国产av精品麻豆| 欧美bdsm另类| av不卡在线播放| 午夜免费观看性视频| 只有这里有精品99| 最后的刺客免费高清国语| 大又大粗又爽又黄少妇毛片口| 国产极品天堂在线| 久久韩国三级中文字幕| 亚洲第一av免费看| 美女主播在线视频| 简卡轻食公司| 女性生殖器流出的白浆| 男女国产视频网站| 精品亚洲成a人片在线观看| 亚洲精品aⅴ在线观看| 成人漫画全彩无遮挡| 久久久久久人妻| 天堂中文最新版在线下载| a级毛片免费高清观看在线播放| 亚洲精品456在线播放app| 久久国产精品大桥未久av | 十八禁高潮呻吟视频 | 妹子高潮喷水视频| 人妻夜夜爽99麻豆av| 久久综合国产亚洲精品| 亚洲av成人精品一区久久| 亚洲av国产av综合av卡| 亚洲,一卡二卡三卡| 午夜影院在线不卡| 日韩伦理黄色片| 高清欧美精品videossex| 人妻 亚洲 视频| 国产黄色免费在线视频| 亚洲一级一片aⅴ在线观看| 久久97久久精品| 麻豆乱淫一区二区| 九九爱精品视频在线观看| 18+在线观看网站| 亚洲欧美一区二区三区黑人 | 日本av手机在线免费观看| 亚洲欧美一区二区三区国产| 黄色欧美视频在线观看| 亚洲电影在线观看av| 日本vs欧美在线观看视频 | 成人18禁高潮啪啪吃奶动态图 | 精品久久久久久久久亚洲| 中文欧美无线码| 久久久a久久爽久久v久久| 伦精品一区二区三区| 国产av精品麻豆| 欧美精品一区二区免费开放| 亚洲精品国产色婷婷电影| 少妇熟女欧美另类| 中文在线观看免费www的网站| 日韩熟女老妇一区二区性免费视频| 日日啪夜夜撸| 菩萨蛮人人尽说江南好唐韦庄| 日日摸夜夜添夜夜爱| 99久国产av精品国产电影| 久久精品夜色国产| 久久久久久久大尺度免费视频| av专区在线播放| 肉色欧美久久久久久久蜜桃| 亚洲欧洲国产日韩| 嫩草影院新地址| 一级黄片播放器| 美女中出高潮动态图| 久久久久久久久久人人人人人人| 亚洲av不卡在线观看| 国产精品一区二区在线不卡| a级毛片在线看网站| 日本vs欧美在线观看视频 | 欧美成人精品欧美一级黄| 老女人水多毛片| 精品熟女少妇av免费看| 一级毛片 在线播放| 我要看黄色一级片免费的| 超碰97精品在线观看| 亚洲精品一二三| 免费人妻精品一区二区三区视频| 国产精品欧美亚洲77777| 老司机亚洲免费影院| 久久99热6这里只有精品| 久久精品国产鲁丝片午夜精品| 国产精品.久久久| 亚洲天堂av无毛| 视频中文字幕在线观看| 性色av一级| 午夜福利,免费看| 日产精品乱码卡一卡2卡三| 搡老乐熟女国产| 亚洲欧美一区二区三区黑人 | 欧美精品人与动牲交sv欧美| 亚洲无线观看免费| 国产精品久久久久久久电影| 日韩不卡一区二区三区视频在线| 精品少妇久久久久久888优播| 亚洲精品成人av观看孕妇| 十八禁网站网址无遮挡 | 韩国高清视频一区二区三区| 不卡视频在线观看欧美| 亚洲av男天堂| 国产精品99久久99久久久不卡 | 在线观看免费视频网站a站| 久久久国产精品麻豆| 18禁裸乳无遮挡动漫免费视频| 欧美日韩av久久| 赤兔流量卡办理| 最新的欧美精品一区二区| 国产精品福利在线免费观看| 黄片无遮挡物在线观看| 亚洲精品国产av成人精品| 国产精品久久久久久久久免| 国产高清不卡午夜福利| 精品午夜福利在线看| 国产成人aa在线观看| 午夜视频国产福利| 少妇人妻一区二区三区视频| 国产成人免费无遮挡视频| av国产久精品久网站免费入址| 狂野欧美白嫩少妇大欣赏| 亚洲欧美中文字幕日韩二区| 亚洲综合精品二区| 狂野欧美白嫩少妇大欣赏| 熟女人妻精品中文字幕| 中文字幕精品免费在线观看视频 | 中文字幕久久专区| 亚洲丝袜综合中文字幕| 国产白丝娇喘喷水9色精品| 少妇的逼水好多| 在线精品无人区一区二区三| 精品国产一区二区三区久久久樱花| 欧美丝袜亚洲另类| 十八禁高潮呻吟视频 | 少妇被粗大猛烈的视频| 亚洲国产欧美在线一区| 久久久国产一区二区| 下体分泌物呈黄色| 亚洲无线观看免费| 亚洲美女视频黄频| 麻豆成人午夜福利视频| a级一级毛片免费在线观看| 人妻夜夜爽99麻豆av| 一二三四中文在线观看免费高清| freevideosex欧美| a 毛片基地| 国产熟女欧美一区二区| 精品国产国语对白av| 观看免费一级毛片| 亚洲av.av天堂| 欧美 日韩 精品 国产| 亚洲精品日韩在线中文字幕| 最近2019中文字幕mv第一页| 日韩欧美 国产精品| 久久青草综合色| 国产精品国产av在线观看| 亚州av有码| 男人添女人高潮全过程视频| 在现免费观看毛片| 国产一区有黄有色的免费视频| 在线观看免费视频网站a站| 国产精品不卡视频一区二区| 日韩三级伦理在线观看| 乱码一卡2卡4卡精品| 精品久久久久久久久亚洲| 国产日韩欧美视频二区| 日韩av不卡免费在线播放| 美女cb高潮喷水在线观看| 日韩熟女老妇一区二区性免费视频| 久久人人爽av亚洲精品天堂| 欧美老熟妇乱子伦牲交| 久久ye,这里只有精品| 精品一区二区三卡| 一级片'在线观看视频| 十八禁高潮呻吟视频 | 熟女人妻精品中文字幕| 亚洲av欧美aⅴ国产| 亚洲欧美清纯卡通| 色网站视频免费| av在线播放精品| 尾随美女入室| 美女xxoo啪啪120秒动态图| 久久精品熟女亚洲av麻豆精品| 亚洲av男天堂| videos熟女内射| av免费观看日本| 亚洲人与动物交配视频| 亚洲av欧美aⅴ国产| 亚洲精品国产av成人精品| 亚洲欧美成人精品一区二区| 免费不卡的大黄色大毛片视频在线观看| 欧美精品亚洲一区二区| 亚洲经典国产精华液单| 亚洲精品国产成人久久av| 国产精品蜜桃在线观看| 亚洲av日韩在线播放| 国产精品女同一区二区软件| av线在线观看网站| 一级,二级,三级黄色视频| 国产黄片视频在线免费观看| 欧美97在线视频| 自拍偷自拍亚洲精品老妇| 热re99久久国产66热| 亚洲三级黄色毛片| 国产一区二区在线观看日韩| 国产美女午夜福利| 夫妻性生交免费视频一级片| 我要看日韩黄色一级片| 精品亚洲乱码少妇综合久久| 一区二区三区精品91| 亚洲婷婷狠狠爱综合网| 久久av网站| 最近最新中文字幕免费大全7| 免费黄色在线免费观看| 国产高清不卡午夜福利| 综合色丁香网| 精品一品国产午夜福利视频| 少妇人妻 视频| 狂野欧美白嫩少妇大欣赏| 久久久国产精品麻豆| √禁漫天堂资源中文www| 99久久精品一区二区三区| 国产精品免费大片| av视频免费观看在线观看| 丰满乱子伦码专区| 欧美老熟妇乱子伦牲交| 天美传媒精品一区二区| 亚洲中文av在线| 一二三四中文在线观看免费高清| av福利片在线观看| 婷婷色综合www| 欧美xxⅹ黑人| 国产黄色视频一区二区在线观看| 日韩av在线免费看完整版不卡| 熟女人妻精品中文字幕| 国产白丝娇喘喷水9色精品| 色视频在线一区二区三区| 欧美人与善性xxx| 人人澡人人妻人| 欧美人与善性xxx| 最近中文字幕高清免费大全6| 国产一区二区三区综合在线观看 | 精品午夜福利在线看| 中文字幕久久专区| 亚洲精品国产色婷婷电影| videos熟女内射| 婷婷色综合大香蕉| 熟女人妻精品中文字幕| 全区人妻精品视频| 久久韩国三级中文字幕| 看免费成人av毛片| 亚洲情色 制服丝袜| 99久久精品一区二区三区| 国产男人的电影天堂91| 亚洲精品一区蜜桃| 蜜臀久久99精品久久宅男| 亚洲精品日本国产第一区| 免费看光身美女| 有码 亚洲区| 久久精品国产鲁丝片午夜精品| 这个男人来自地球电影免费观看 | 国产伦在线观看视频一区| 中文精品一卡2卡3卡4更新| 国产精品蜜桃在线观看| 男人狂女人下面高潮的视频| 国产女主播在线喷水免费视频网站| 国产成人免费无遮挡视频| 中国美白少妇内射xxxbb| 国产一区亚洲一区在线观看| 亚洲精品国产av蜜桃| 91午夜精品亚洲一区二区三区| 亚洲国产精品一区二区三区在线| av女优亚洲男人天堂| 亚洲精品自拍成人| 久热久热在线精品观看| 九九久久精品国产亚洲av麻豆| 十八禁高潮呻吟视频 | a级一级毛片免费在线观看| av天堂久久9| 不卡视频在线观看欧美| 好男人视频免费观看在线| 肉色欧美久久久久久久蜜桃| 亚洲人与动物交配视频| 日本色播在线视频| 97在线人人人人妻| 一边亲一边摸免费视频| 人妻一区二区av| 黄色毛片三级朝国网站 | 国产美女午夜福利| 欧美日韩在线观看h| 狠狠精品人妻久久久久久综合| 日本vs欧美在线观看视频 | 人人澡人人妻人| 少妇高潮的动态图| 曰老女人黄片| 国产免费一级a男人的天堂| 日韩亚洲欧美综合| 亚洲精品日韩在线中文字幕| 如何舔出高潮| 日韩大片免费观看网站| 欧美变态另类bdsm刘玥| 日本av手机在线免费观看| 女性生殖器流出的白浆| 老司机亚洲免费影院| 国内少妇人妻偷人精品xxx网站| 久久久久精品性色| 亚洲真实伦在线观看| 欧美日韩亚洲高清精品| 亚洲美女视频黄频| 久久国产精品男人的天堂亚洲 | 中国三级夫妇交换| 国产伦精品一区二区三区四那| 综合色丁香网| 99视频精品全部免费 在线| 五月天丁香电影| 国产黄色免费在线视频| 成年av动漫网址| 国产欧美另类精品又又久久亚洲欧美| 久久毛片免费看一区二区三区| 国产日韩一区二区三区精品不卡 | 夜夜看夜夜爽夜夜摸| 黄色视频在线播放观看不卡| 中文欧美无线码| 久久精品国产鲁丝片午夜精品| 大片电影免费在线观看免费| 亚洲久久久国产精品| av卡一久久| 亚洲欧美精品自产自拍| 三级国产精品片| 又大又黄又爽视频免费| 男女无遮挡免费网站观看| 成人漫画全彩无遮挡| 亚洲经典国产精华液单| 国产精品久久久久久精品电影小说| 免费人妻精品一区二区三区视频| 亚洲不卡免费看| 2018国产大陆天天弄谢| 尾随美女入室| 最后的刺客免费高清国语| 久久免费观看电影| 特大巨黑吊av在线直播| 成人国产av品久久久| 国产欧美日韩精品一区二区| 天美传媒精品一区二区| 亚洲电影在线观看av| 秋霞在线观看毛片| 草草在线视频免费看| 精品视频人人做人人爽| 我要看日韩黄色一级片| 女人久久www免费人成看片| 日韩亚洲欧美综合| 亚洲熟女精品中文字幕| 一个人免费看片子| 精品午夜福利在线看| 欧美97在线视频| 国产视频首页在线观看| 亚洲成色77777| 国产成人aa在线观看| 26uuu在线亚洲综合色| 日本欧美视频一区| 少妇裸体淫交视频免费看高清| 国产av精品麻豆| 99热6这里只有精品| 少妇人妻一区二区三区视频| 久久久a久久爽久久v久久| 丰满迷人的少妇在线观看| 黄色日韩在线| 久久久久国产精品人妻一区二区| 亚洲国产av新网站| 亚洲人成网站在线观看播放| 美女福利国产在线| 男女啪啪激烈高潮av片| 亚洲不卡免费看| 国产男女内射视频| 岛国毛片在线播放| 麻豆成人午夜福利视频| 91午夜精品亚洲一区二区三区| 亚洲欧美日韩另类电影网站| 国产一区二区三区av在线| 丝袜喷水一区| 夫妻午夜视频| 人妻制服诱惑在线中文字幕| 成年人午夜在线观看视频| 街头女战士在线观看网站| 精品人妻一区二区三区麻豆| 丰满迷人的少妇在线观看| 一级毛片黄色毛片免费观看视频| 韩国高清视频一区二区三区| 一级毛片 在线播放| 亚洲欧美成人精品一区二区| av国产久精品久网站免费入址| 汤姆久久久久久久影院中文字幕| 又爽又黄a免费视频| 国产视频首页在线观看| 插逼视频在线观看| 韩国av在线不卡| 美女国产视频在线观看| 欧美老熟妇乱子伦牲交| 高清欧美精品videossex| 深夜a级毛片| 国产亚洲最大av| 国产av精品麻豆| 国产69精品久久久久777片| 黑人高潮一二区| 国产成人freesex在线| 国产淫片久久久久久久久| 少妇丰满av| av视频免费观看在线观看| 国模一区二区三区四区视频| 亚洲精品,欧美精品| 久久久久久久亚洲中文字幕| 日本爱情动作片www.在线观看| 亚洲精品aⅴ在线观看| 在线亚洲精品国产二区图片欧美 | 久久久久精品性色| 国产极品粉嫩免费观看在线 | videos熟女内射| 国产精品免费大片| 黄色一级大片看看| 最近的中文字幕免费完整| 女人精品久久久久毛片| 欧美+日韩+精品| 麻豆成人午夜福利视频| 日本wwww免费看| 亚洲丝袜综合中文字幕| av国产精品久久久久影院| 男女啪啪激烈高潮av片| 精品亚洲成国产av| 欧美日韩视频高清一区二区三区二| 人妻夜夜爽99麻豆av| 高清毛片免费看| 日韩强制内射视频| 99精国产麻豆久久婷婷| 一级av片app| 午夜久久久在线观看| av天堂中文字幕网| 性色av一级| 一级片'在线观看视频| .国产精品久久| 色视频www国产| 免费久久久久久久精品成人欧美视频 | 国产精品无大码| 国产淫语在线视频| 国产免费一区二区三区四区乱码| 黄片无遮挡物在线观看| 精品一区二区三卡| av国产久精品久网站免费入址|