• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Novel Ransomware Hiding Model Using HEVC Steganography Approach

    2022-11-09 08:15:44ImanAlmomaniAalaAlKhayerandWalidElShafai
    Computers Materials&Continua 2022年1期

    Iman Almomani,Aala AlKhayer and Walid El-Shafai,3

    1Security Engineering Lab,Computer Science Department,Prince Sultan University,Riyadh,11586,Saudi Arabia

    2Computer Science Department,King Abdullah II School for Information Technology,The University of Jordan,11942,Jordan

    3Department of Electronics and Electrical Communications Engineering,Faculty of Electronic Engineering,Menoufia University,Menouf,32952,Egypt

    Abstract: Ransomware is considered one of the most threatening cyberattacks.Existing solutions have focused mainly on discriminating ransomware by analyzing the apps themselves,but they have overlooked possible ways of hiding ransomware apps and making them difficult to be detected and then analyzed.Therefore,this paper proposes a novel ransomware hiding model by utilizing a block-based High-Efficiency Video Coding(HEVC)steganography approach.The main idea of the proposed steganography approach is the division of the secret ransomware data and cover HEVC frames into different blocks.After that,the Least Significant Bit(LSB)based Hamming Distance(HD) calculation is performed amongst the secret data’s divided blocks and cover frames.Finally,the secret data bits are hidden into the marked bits of the cover HEVC frame-blocks based on the calculated HD value.The main advantage of the suggested steganography approach is the minor impact on the cover HEVC frames after embedding the ransomware while preserving the histogram attributes of the cover video frame with a high imperceptibility.This is due to the utilization of an adaptive steganography cost function during the embedding process.The proposed ransomware hiding approach was heavily examined using subjective and objective tests and applying different HEVC streams with diverse resolutions and different secret ransomware apps of various sizes.The obtained results prove the efficiency of the proposed steganography approach by achieving high capacity and successful embedding process while ensuring the hidden ransomware’s undetectability within the video frames.For example,in terms of embedding quality,the proposed model achieved a high peak signal-to-noise ratio that reached 59.3 dB and a low mean-square-error of 0.07 for the examined HEVC streams.Also,out of 65 antivirus engines,no engine could detect the existence of the embedded ransomware app.

    Keywords: Ransomware embedding;steganography;HEVC;LSB;hamming distance;applications;apk;stego;security;confidentiality

    1 Introduction

    One of the main challenges facing the digital transformation of almost all our life aspects is cybersecurity attacks.Such attacks are launched in many different ways.A common source of attacks is malicious software (malware) that harms the users’devices and data.The cyberthreats of malware are characterized into several types such as Trojan,Spyware,and Adware [1].Among the most threatening cyberattacks is Ransomware which is a form of malware that blocks access to the victim’s device or data until a ransom is paid,consequently gaining an astonishing growth in causing monetary loss against individuals,businesses,and governments [2].Generally,ransomware is categorized into two main types crypto-ransomware and locker-ransomware.The crypto-ransomware encrypts the user’s sensitive information and requests payment to retrieve the decrypted data.On the other hand,the locker-ransomware blocks the interaction with the victim’s device by displaying a lock screen window.Subsequently,the lock window is only removed after a ransom is paid [3].However,the recent success in Ransomware results in the appearance of new families [4].

    Many research solutions have been proposed to detect ransomware attacks [5-7].These solutions have either utilized permissions [5] or API package calls [7] or both [8] to apply static or dynamic analysis for applications,whether benign or ransomware.Additionally,they have applied machine learning algorithms to build effective ransomware detection systems [6,9].However,the current ransomware detection solutions have assumed that the application is visible to be analysed.They did not investigate the possibility of hiding this ransomware and making it difficult to apply static or dynamic analysis.

    In the context of malware in general,there are some attempts by the developers to create well-established techniques to bypass the detection systems.One of the utilized techniques was malicious components or activity hiding using steganography,which concealed the presence and communication between the active malware application and the attacker [10].The existing steganography techniques can be categorized according to how the hidden communication is implemented into three main groups [11]: (a) techniques that hide malware by mimicking benign software,(b) techniques that inject one or more component into the network traffic,and (c) techniques that hide the malware or part of its components in a digital media file.However,driven by the vigorous expansion of multimedia,video steganography is gaining momentum gradually.Furthermore,research interest increases in utilizing video streaming due to its low-quality loss and high embedding capacity.Specifically,the high-efficiency video coding (HEVC) standard [12,13]which provides a high bit-rate reduction.

    The significant spread of ransomware and the possible advances of its anti-detection techniques creates an urgent need for further investigation in this field.Furthermore,applying steganography algorithms to embed ransomware applications increases ransomware risk with respect to individuals and businesses where anti-viruses software might fail in detecting the hidden ransomware.Accordingly,the major contributions of this paper can be summarized as follow:

    · Deep investigation in the literature to check if there are any attempts to hide ransomware applications.

    · Conduct a comparative analysis among existing techniques utilizing steganography in hiding malicious data.

    · Propose an efficient,novel approach to hide complete ransomware using block-based HEVC steganography.

    · Apply comprehensive subjective and objective tests to evaluate the proposed approach.

    · Obtain high similarity between the original video and the corresponding video after embedding the ransomware;as part of the subjective tests’results.

    · Achieve high performance in terms of 16 metrics used to assess the quality of the video after embedding the ransomware;as part of the objective tests’results.

    · Bypass 65 well-known Antivirus engines by the embedded ransomware video;as part of the security tests.

    The rest of the paper is organized as follows.Section 2 provides a comparison among previous suggested works on steganography.Section 3 presents the proposed HEVC steganography-based ransomware hiding approach.Section 4 presents the approach evaluation and results’discussions.Finally,Section 5 concludes the paper and suggests possible future work.

    2 Literature Review

    This section highlights different steganography techniques presented in the literature [14-28].Tab.1 presents a comparison among several proposed steganography schemes in terms of the proposed solution’s main goal,the implemented steganography technique,the type of both cover media object and the secret message,and the used evaluation metrics.

    Table 1:A comparison among several proposed steganography schemes

    Table 1 (continued).

    Sahu et al.[15] proposed a dual-layer steganography system by applying a reversible information hiding (RIH) technique utilizing the least significant bit (LSB) in the hiding process.In the first layer,each pixel of the secret image is hidden within two bits of the cover data by implementing the LSB matching algorithm resulting in a pair of intermediate pixels.

    Subsequently,during the second layer of embedding,this pair was used to hide four bits of the secret information.According to the conducted evaluation experiments,applying reversible information hiding in dual-layer resulted in high efficiency in information hiding.Hindi et al.[16]also,used an image to hide a secret message.However,in their proposed work,they have utilized two keys of eight decimal digits in implementing the hiding/extraction process aiming to enhance the level of security.

    Moreover,in [17],a three components (Red,Green,Blue) RGB channel-based secret data partition was proposed to adaptively allocate the capacity of the hidden message between the RGB channels to hide an image inside an image without affecting the performance of the hiding process.Besides using a single image as a cover object,Liao et al.[18] developed a multiple images steganographic system in which it utilizes the features of the image texture.To distribute the secret data in multiple images,they have implemented an adaptive payload distribution technique.Furthermore,two payload division methods were proposed;distortion distribution (ES-DD) and image texture complexity (ES-ITC).However,experiment results showed that the proposed scheme provides an enhanced security performance.

    The advances in video coding applications have raised the interest in video steganography [19-23].In [19],the authors concealed a video in another video by employing the inter-frame references of the cover video.While creating the steganographic video,a novel technique for modeling the temporal residual was implemented to fully benefit from the sparse characteristic of the differences between the inter frames.The authors in [20] implemented video steganography by utilizing the intra-prediction mode (IPM) feature of HEVC for cover selection.The stego video stream combined the prediction unit of HEVC and the coding unit to implement the cover selection process.Another application of HEVC steganography was proposed by [21] in which three intra-frame prediction modes were combined to enhance the visual quality of the carrier video.Zhang et al.[22] also used prediction units (PU) of HEVC in implementing video steganography.However,to overcome the capacity limitation of the PU,they have modified the exploiting modification direction;consequently,two prediction units were combined,thereby enlarging the PU capacity.An additional suggested solution that focuses on obtaining a highresolution HEVC stego video streaming was proposed by [23].In order to conceal information without affecting the video quality,they modified the bits of the luminance intra-blocks.

    Steganography can be further used as a technique that hides malicious software to increase its undetectability level.Network steganography plays a significant role in malware information hiding in which one or more components of the malicious software are embedded in the network traffic [24].In [25],a hidden communication system was implemented utilizing the StegBlocks technique to perform text communication between the attacker and the active malicious software.However,the attacker output text file is restricted to 23 kB.Another network steganography application was proposed by [26],which implemented a masking technique to conceal the malware application identity.In the proposed scheme,the tunnel generates fake traffic that simulates normal network traffic encapsulating the actual malicious traffic.In addition to network steganography,the digital media steganography technique was used to embed the malware software by altering the carrier media file structure.In [27],they developed a Malware utilizing Metasploit operating system,then they embedded the malware in an image.Subsequently,they performed detection analysis using Open Source Intelligence Tools (OSIT) such as VirusTotal.However,even though the result showed an enhancement in hiding the malware,yet,some virus scanners software detected the malware.Stergiopoulos et al.[28] used a different digital media carrier to embed malware.They injected malware apps via audio frequencies.However,the proposed system needs to meet certain conditions such as high speaker volume and low noise environment in order to extract the injected malware.

    In the light of the above discussion,few works have been focused on utilizing and investigating steganography techniques to hide malware software.Furthermore,no research was found that has discussed the ability to embed ransomware software applications in digital media files.In this work,a novel system is proposed to utilize HEVC videos as a cover media to conceal the ransomware software applications with high efficiency.

    3 Proposed HEVC Steganography-Based Ransomware Hiding Model

    This section introduces and discusses the proposed block-based HEVC steganography approach for hiding ransomware applications.This ransomware hiding approach is built based on the image steganography algorithm presented in [29].The proposed steganography-based hiding approach consists of two main processes;ransomware embedding process (REP) and ransomware extraction process (RExP) as shown in Fig.1.

    Figure 1:The proposed HEVC steganography-based ransomware hiding model (a) Ransomware Embedding Process (REP),(b) Ransomware Extraxting Process (RExP)

    The REP starts by selecting the proper media cover (HECV video) and randomly extracting one of the video frames.The selection of cover video frames depends on the size of the ransomware sample and the capacity of the cover video.Therefore,prior to the embedding process,the proper video frame is selected based on its resolution in order to hide the ransomware sample without affecting the main features and quality of the cover frame.After that,the chosen frame is forwarded as an input to the embedding phase,as detailed in Algorithm (1).

    Algorithm(1): Steps of the embedding phase input: Plain HEVC frame.-Divide both secret ransomware data and input cover HEVC frame into different blocks.· Divide K-pixels cover video frame into different blocks of Qj (j=1,2,...,[K/(k+1)]),where k+1 is the length of each block,Qj1,Qj2,...,Q(j k+1) refers to the pixel value within each block,LSBj1,LSBj2,...,LSBjk,LSB(j k+1) refers to the LSB of each pixel value within each block,and LSB(j k+1) which is the marked bit of each block Qj.· Divide the secret ransomware data into blocks of Sj (j=1,2,...,k),where Sj1,Sj2,...,Sjk refers to the binary bits of each block within the secret data.for all divided blocks,do-Initialize the LSB-based steganography cost function.-Calculate the hamming distance (HD) using Eqs.(1) and (2) between the LSBj1,LSBj2,...,LSBjk,LSB(j k+1) of Qj,and their corresponding Sj1,Sj2,...,Sjk bits of Sj.So,HDj represents the number of total differences between the LSBs of Qj and the related bits of Sj.HDj=kkimages/BZ_1190_484_1615_549_1661.pngΨ(LSBji,Sji) (1)Ψimages/BZ_1190_308_1774_326_1820.pngLSBji,Sji)=i-1images/BZ_1190_576_1747_604_1792.png0 if LSBji/=Sji 1 if LSBji=Sji (2)if HDj ≤k/2,then-Set the marked bit LSB(j k+1) to 0.-Determine the LSB-based steganography cost function using Eq.(3) to hide (Sj1,Sj2,...,Sjk) into (Qj1,Qj2,...,Qjk).Therefore,the LSBs of Qj will be (Sj1,Sj2,...,Sjk,0).Δimages/BZ_1190_308_2144_327_2189.pngLSBji,Sji)=images/BZ_1190_576_2116_605_2162.png0 if LSBji/=Sji±1 if LSBji=Sji (3)-Calculate the value of the stego pixel P (Qji,Sji) using Eq.(4).Pimages/BZ_1190_306_2324_325_2369.pngQji,Sji)=Qji+Δimages/BZ_1190_667_2324_686_2369.pngLSBji,Sji) (4)-Gather the stego blocks Q′j that have pixels values included the secret ransomware data.else if HDj≥k/2,then-Set the marked bit LSB(j k+1) to 1.-Determine the LSB-based steganography cost function using Eq.(3) to hide (Sj1,Sj2,...,Sjk) into (Qj1,Qj2,...,Qjk),where Sj1 is the inverse of Sj1.Therefore,the LSBs of Qj will be (Sj1,Sj2,...,Sjk,1).-Calculate the value of the stego pixel P(Qji,Sji) using Eq.(5).(Continued)

    Pimages/BZ_1191_302_445_321_491.pngQji,Sji)=Qji+Δimages/BZ_1191_663_445_682_491.pngLSBji,Sji) (5)-Gather the stego blocks Q′j that have pixels values included the secret ransomware data.end if end for output: Stego HEVC frame.

    The output of this algorithm is the stego frame,which is the frame that is injected with the ransomware application (apk).The stego frame’s quality will be deeply assessed by examining 16 different metrics.If the stego frame passes the quality check,it will be combined with the rest of the frames to restore the complete video.But,this video is now infected with ransomware.

    In contrast,the RExP starts by taking the stego HEVC video as an input to extract the stego frame and forward it to the ransomware extraction phase,as detailed in Algorithm (2).This algorithm’s outputs are the ransomware application itself and the original frame.The original frame is then combined with the rest of the frames to restore the original clean HEVC video.

    Algorithm(2): Steps of the extraction phase input: Stego HEVC frame.-Divide each input K-pixels stego HEVC frame into different blocks of Q′j(j=1,2,...,[K/(k+1)]),where k+1 is the length of each block,Q′j1,Q′j2,...,Q′(j k+1) refers to the pixel value within each block.-Get the binary bits of the LSBj1,LSBj2,...,LSBjk,LSB(j k+1) of each pixel value within each block Q′j.-Check the value of LSB(j k+1) which is the marked bit of each block Q′j.for all collected marked bits,do if LSB(j k+1)=0,then-Gather the obtained bits of all LSBj to get the secret ransomware data.else if LSB(j k+1)/=0,then-Put the inverse value of the whole obtained bits of all LSBji to be LSBji=LSBji,where i=1,2,...,k.-Gather the resulted bits of all LSBj to get the secret ransomware data.end if end for output: Secret ransomware data.

    The main idea of the utilized steganography approach was dividing the secret ransomware and the cover HEVC frame into different blocks.The cover HEVC frame used to embed the secret ransomware data is selected randomly.After that,the LSB-based hamming distance calculation is performed amongst the divided blocks of the secret data (ransomware) and the cover frames.Finally,the secret data bits are hidden into the marked bits of the cover HEVC frame-blocks based on the estimated hamming distance value.The major improvement of the introduced HEVC steganography approach was utilizing an adaptive steganography cost function that reduced the embedding influence of ransomware hiding within the stego HEVC frames by conserving the histogram features of the cover frames while introducing a desirable imperceptibility.

    Furthermore,this approach accomplishes high capacity and superior hiding efficacy by ensuring the undetectability of the hidden ransomware data within the video frames.More quality evaluation metrics are examined to assess the performance of the REP and RExP processes.In case the assessment metrics of the stego frame did not achieve the desired and expected values,the REP process is repeated.This is to select a more suitable resolution of the cover video frame concerning the size of secret ransomware data to achieve higher perception quality and adequate capacity performance.

    4 Model Evaluation and Result Discussions

    This section presents the features of the ransomware samples and the standard cover HEVC streams used in this research experiments.Also,it lists the subjective and objective evaluation metrics that were applied to examine the performance of the proposed hiding approach,as shown in Fig.2.The objective-based evaluation included 16 metrics to assess the quality of the resulted stego frame.Moreover,65 Antivirus engines were used to scan the stego frame and the stego video to check if these engines can detect the ransomwares’existence.The subjective-based tests were also considered in this study by comparing (a) the original frame and the stego frame and(b) the original video and the stego video.Finally,the results of all metrics will be presented and analysed.

    Figure 2:The applied evaluation metrics

    4.1 Ransomware Samples and Standard HEVC Streams

    To prove the efficiency of the proposed ransomware hiding approach,many experiments were conducted.In these experiments,we utilized different ransomware samples as secret messages and different HEVC streams1http://trace.eas.asu.edu/yuv/.with various resolutions as cover media.The purpose was to check the capability of the proposed approach in hiding different ransomware sizes within different resolutions of cover video frames without affecting the main features and quality of the cover frames.Additionally,the proposed approach aims to achieve high secrecy of the ransomware by making it undetectable even by specialized antivirus engines.Tab.2 presents the sizes of the tested ransomware samples,while Tab.3 introduces the resolutions of the tested HEVC streams.

    4.2 Quality Assessment

    As part of the objective-based evaluation,16 metrics are mathematically presented in this section.Throughout the following equations,x(m,n)signifies the original cover video frame,x′(m,n)represents the resulted stego video frame,andMandNare the numbers of the pixels in rows and columns,respectively.

    Table 2:Size of the tested ransomware samples

    Table 3:Resolution of the tested video streams

    · Mean Square Error(MSE)

    MSE [30] is one of the quality assessment metrics that are used in image and video quality evaluation applications.It is used to estimate the error between the cover and stego video frames.A lower value of the MSE metric means that the video frame has a good quality,and there is a higher similarity between the cover and stego video frames.This metric is mathematically represented in Eq.(6):

    · Peak Signal to Noise Ratio(PSNR)

    The PSNR metric [30] is a function of the MSE metric.So,it is preferable to get a large PSNR value to obtain a good quality for the resulted stego video frame.The PSNR is measured in decibels and it is represented in Eq.(7):

    · Signal-to-Noise Ratio(SNR)

    SNR [31] is described as the ratio between the two average powers of signal and noise.It is measured in decibels and it is presented in Eq.(8):

    It is superior to achieve a large SNR value to obtain a good quality for the resulted stego video frame.

    · Weighted Signal-to-Noise Ratio(WSNR)

    The WSNR metric is a weighted form of the SNR metric which is developed by Varkur and Mitsa [32] utilizing the sensitivity contrast function.It is the ratio between the average weighted powers of the signal and noise,respectively.It is measured in decibels and it is better to obtain a large WSNR value to attain a good quality for the resulted stego video frame.

    · Noise Quality Measure(NQM)

    NQM [33] is used to determine the distortion caused to a video frame due to both frequency shift and noise effect.Also,the NQM metric can be employed to estimate the effects of local luminance,contrast perception,texture masking,and contrast masking.Thus,it can be considered a weighted version of the SNR metric between the cover and stego video frames.Consequently,it is desirable to get a large value of NQM to obtain a good quality for the resulted stego video frame.The NQM is measured in decibels and it is represented in Eq.(9):

    · Structural Content(SC)

    The SC metric [34] is the ratio of the power of the original signal (cover video frame) to the power of the processed signal (stego video frame).So,it is preferable to obtain a small SC value to get good quality for the resulted stego video frame.It can be defined as in Eq.(10):

    · Maximum Difference(MD)

    The MD metric [35] determines the maximum amount of error in the processed signal compared to the original signal.It estimates the difference between the reference cover video frame and the processed stego video frame.Thus,it is preferable to obtain a small MD value to get a good quality of the resulted stego video frame.It is defined in Eq.(11):

    · Normalized Absolute Error(NAE)

    The NAE metric [30] is the ratio between the MD metric and the absolute value of the reference cover video frame.For achieving a good quality of the stego video frame,it is recommended to get a low value of the NAE metric.It is represented in Eq.(12):

    · Laplacian Mean Square Error(LMSE)

    LMSE evaluation metric [36] is based on estimating the measurement of video frame edges.It is better to achieve a small LMSE value to obtain a good quality for the resulted stego video frame.The LMSE metric is mathematically represented in Eq.(13):

    where the Laplacian operator is symbolized byL(x(m,n)) for the signalx(m,n),and it is given as:

    · Structural Similarity Index(SSIM)

    The SSIM metric [37] is utilized to estimate the visual effect of the luminance shift,contrast changes,and structural alterations of a video frame.So,it is used to extract the structural information of the objects inside the input video frame.Thus,a degree of estimated structural similarity is a clear indication of the recognized video quality.The SSIM metric between the cover and stego frames ofxandx′signals is described in Eq.(15):

    wherec1,c2,andc3are positive small constants,μxandμx′ signify the means of the cover and stego video frames,respectively.σxandσx′ signify the standard deviations of the cover and stego video frames,respectively.σxx′ is the covariance between the cover and stego video frames.For an 8-bit grayscale video frame combined ofL=28gray-levels,c1=(k1L)2,c2=(k2L)2,andc2=c3=2,wherek2=0.03 andk1=0.01.It is noticed that in the case ofc1=c2=0,the SSIM metric is reduced to the Universal Quality Index (UQI) metric.The range of the SSIM metric is-1 to 1.Therefore,obtaining a high value of SSIM indicates high similarity between the cover and stego video frames.

    · Multi-Scale SSIM Index(MS-SSIM)

    The MS-SSIM metric is considered as an improved version of the SSIM metric.It is devised to determine the visual quality of a video frame based on multiple scales [38].So,it has different forms of scales.The lowest scale is utilized to measure the luminance component,whilst the structural and contrast components are determined based on thejscale,and it has also the highest scale represented asM.The range of the MS-SSIM metric is-1 to 1.Therefore,obtaining a high value of MS-SSIM indicates high similarity between the cover and stego video frames.

    · Feature Similarity Index(FSIM)

    The FSIM metric [39] is utilized to extract the low-level features within a video frame such as gradient magnitude and phase congruency.The gradient magnitude composes the contrast information,while the phase concurrency contains great information of the primary features.The range of the FSIM metric is-1 to 1.So,achieving a high value of FSIM means a high similarity between the cover and stego video frames.The FSIM metric is described in Eq.(19):

    where the gradient magnitude information can be estimated using the Sobel operatorSL(x),the spatial domain of video frames is provided byΩ,and the projected phase congruency information can be determined byPCm(x).

    · Universal Quality Index(UQI)

    UQI [40] is global instead of being local or specifically intended for the video frames being examined or on the particular observers.Therefore,in quality assessment evaluation for image and video applications,the UQI is recommended to be utilized for quality assessment where it composes the correlation,luminance,and contrast components as it is determined as in Eq.(20):

    So,the UQI metric is defined in Eq.(21):

    The range of the UQI metric is-1 to 1,so,there is a higher similarity between the cover and stego video frames in the case of obtaining a higher UQI value.

    · Normalized Cross Correlation(NK)

    The NK metric [41] is used to compare the processed stego video frame and the reference cover video frame.It is expressed in Eq.(22):

    For the success of the steganography process,it is preferable to get the highest value of 1 between the cover and stego frames to achieve higher performance efficiency.

    · Average Difference(AD)

    The AD metric [42] determines the average variation between the reference cover video frame and the processed stego video frame.So,it is desirable to get a smaller value of AD to obtain a good quality for the resulted stego video frame.It is calculated in Eq.(23):

    · Pixel-Based Visual Information Fidelity(VIFP)

    The VIFP metric is an improved version of the Visual Information Fidelity (VIF) metric with a low computational cost.It is used to extract and compare the pixel-level information within the cover and stego video frames [43].It is preferable to get the highest value of 1 between the cover and stego frames to accomplish the high performance of the employed steganography process.

    · Entropy(E)

    The entropy metric is utilized to estimate the amount of information in the cover and stego frames.It is preferable to get identical entropy values for the stego and cover frames.It is calculated in Eq.(24):

    where thejthgrey frame value is denoted bymjand the probability ofmjin a video frame is given byP(mj).

    4.3 Results Discussion

    This section presents and discusses the results of all examined evaluation metrics considered in this study.

    4.3.1 Video Quality Assessment

    To evaluate the employed HEVC steganography approach,we performed various experiments using the different HEVC streams and ransomware samples that were presented in Section 4.1.

    Tab.4 presents the subjective findings of the tested HEVC frames with distinct resolutions in case of hiding five ransomware samples with different sizes,while Tab.5 introduces the histogram findings.

    Table 4:Subjective outcomes of the tested HEVC frames in case of using different ransomware samples

    It is observed from the introduced results in Tab.4 that the suggested steganography approach achieves high imperceptibility results,where the stego frames are visually similar to the cover frames with a minor difference in their entropy values.This can also be observed by the obtained difference frames between the cover and stego frames,where their entropies (the amount of information) have very low values near to zero.This is clearly shown by the completely black pixels in the resulted difference frames.

    Furthermore,the acquired histogram results in Tab.5 further prove the imperceptibility efficacy amongst cover and stego frames by achieving approximately the same pixel intensity distributions with similar histograms.Moreover,it is also demonstrated that there is no pixel distribution of the obtained histograms of the difference frames except a low distribution around the zero-pixel value.

    Table 5:Histogram outcomes of the tested HEVC frames in case of using different ransomware samples

    Tab.6 provides the objective quality assessment results of the tested video streams after embedding the ransomware samples.The table shows the results of the 16 different evaluation metrics that assess the quality of the stego frames.The targeted optimal values to be achieved by each of these metrics are also listed in Tab.6.Therefore,the obtained results greatly declare that the employed steganography approach achieves significant performance.This is revealed by attaining low values of MSE,SC,MD,LMSE,NAE,and AD metrics and accomplishing high values of PSNR,SSIM,UQI,FSIM,NQM,NK,SNR,VIFP,WSNR,and MS-SSIM in all tested video streams.

    Table 6:Objective quality assessment results of tested video streams

    4.3.2 Antivirus Scan

    The antivirus scanning was performed using the VirusTotal2https://www.virustotal.com/.platform as part of the security test.VirusTotal conducts malware detection scanning utilizing over 65 antivirus scanning vendors such as Kaspersky,McAfee,Avast,Symantec,and many others.

    In this experiment,the scanning has been implemented in three different stages.Initially,the original ransomware was scanned before hiding it inside the cover video frame.Following that,both the video frame with the embedded ransomware file (stego frame) and the combined video(stego video) were scanned to investigate the effectiveness of the applied steganography algorithm.

    The results of VirusTotal scanning are demonstrated in Fig.3.As it can be seen,a total of 35 out of 65 engines detected the ransomware file before applying the steganography algorithm(Fig.3a).However,the ransomware was not detected by any engine after embedding it within the video frame (Fig.3b).Furthermore,the antivirus scan of the combined HEVC stream,where the ransomware is concealed inside the video frame,shows that none of the VirusTotal engines was able to detect it (Fig.3c).

    Figure 3:The results of virustotal scanning before and after embedding the ransomware APK file(a) The scanning results of the original ransomware APK file (b) The scanning results of the video frame (png) after embedding the ransomware file (c) The scanning results of the whole video (avi) after embedding the ransomware file

    In addition to the antivirus scan,we managed to upload and stream the stego videos through the research lab YouTube channel3https://sel.psu.edu.sa/.,which is another proof of bypassing the existing security checks.This stresses the high efficiency of the proposed hiding approach.

    5 Conclusion and Future Works

    This paper has proposed an efficient,novel ransomware hiding approach using HEVC steganography.This work highlighted the shortcomings of the existing ransomware detection systems as they did not investigate the possibility of hiding the ransomware itself and finding ways to detect it,extract it,and then analyze it.Therefore,this work has utilized steganography and,in specific video steganography to hide ransomware with high efficiency in terms of (a) preserving the quality of the video and its characteristics after embedding the ransomware (b) protecting the privacy of the ransomware itself by making it difficult to be detected even by well-known antivirus engines.The proposed hiding approach was heavily examined using different subjective and objective metrics and embedding different ransomware samples into video covers with various resolutions.The results revealed that the proposed approach succeeded in hiding ransomware and bypassing all quality and security tests.As future work,different steganography approaches can be experienced to hide new ransomware families or different malware apps in general.Also,an encryption stage can be added to encrypt the ransomware samples before embedding them within the cover video frames.Furthermore,different formats of multimedia files (e.g.,image and audio)may be utilized as cover media.Moreover,advanced artificial intelligence tools and well-trained deep learning models can be utilized for testing the possibility of detecting the hidden ransomware apps within video frames.

    Acknowledgement: The authors would like to acknowledge the support of Prince Sultan University for paying the Article Processing Charges (APC) of this publication.

    Funding Statement: The authors received no specific funding for this study.

    Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.

    欧美+亚洲+日韩+国产| 窝窝影院91人妻| 狂野欧美激情性xxxx| 禁无遮挡网站| 叶爱在线成人免费视频播放| 亚洲成人久久性| 日本黄大片高清| 亚洲人成网站高清观看| 91麻豆av在线| 亚洲人成伊人成综合网2020| 99久久无色码亚洲精品果冻| 搡老岳熟女国产| h日本视频在线播放| 国产精品一区二区精品视频观看| 成人永久免费在线观看视频| 亚洲国产中文字幕在线视频| 欧美黄色淫秽网站| 午夜激情福利司机影院| 精品久久久久久久末码| 性色avwww在线观看| 精品乱码久久久久久99久播| 久久久国产欧美日韩av| 久久精品91蜜桃| av福利片在线观看| 国产亚洲欧美98| 18禁黄网站禁片午夜丰满| 制服丝袜大香蕉在线| 午夜福利高清视频| 国产免费男女视频| 国产成人啪精品午夜网站| 亚洲欧美精品综合一区二区三区| 日韩精品中文字幕看吧| 黑人欧美特级aaaaaa片| 成人鲁丝片一二三区免费| 国产精品久久视频播放| 久久亚洲真实| 国产伦人伦偷精品视频| 狠狠狠狠99中文字幕| 叶爱在线成人免费视频播放| 亚洲av成人av| 国产亚洲欧美在线一区二区| 亚洲av日韩精品久久久久久密| 成年女人永久免费观看视频| 国产91精品成人一区二区三区| 丰满人妻一区二区三区视频av | 日本黄色片子视频| e午夜精品久久久久久久| 国内精品久久久久久久电影| av片东京热男人的天堂| 桃色一区二区三区在线观看| 国产成人啪精品午夜网站| 真人做人爱边吃奶动态| 欧美绝顶高潮抽搐喷水| 亚洲专区字幕在线| 激情在线观看视频在线高清| 岛国在线观看网站| 免费无遮挡裸体视频| 九色国产91popny在线| 啦啦啦韩国在线观看视频| 国产亚洲精品av在线| 天天一区二区日本电影三级| 国产熟女xx| 一个人看视频在线观看www免费 | 中文资源天堂在线| 一本综合久久免费| h日本视频在线播放| 国内精品美女久久久久久| 国产极品精品免费视频能看的| 999精品在线视频| 国产精品久久久久久亚洲av鲁大| 亚洲一区二区三区色噜噜| 国产精品1区2区在线观看.| 国产精品久久久久久久电影 | 国产黄片美女视频| 老熟妇乱子伦视频在线观看| 在线观看免费视频日本深夜| 麻豆成人av在线观看| 两个人的视频大全免费| 婷婷精品国产亚洲av在线| 美女大奶头视频| 欧美性猛交╳xxx乱大交人| 午夜福利18| 国产真人三级小视频在线观看| 国产精品香港三级国产av潘金莲| 国产蜜桃级精品一区二区三区| 精华霜和精华液先用哪个| 国产精品影院久久| 久久久国产欧美日韩av| 搡老岳熟女国产| 最新中文字幕久久久久 | 色老头精品视频在线观看| 久久久久免费精品人妻一区二区| 国产精品电影一区二区三区| 亚洲在线自拍视频| 国产精品 欧美亚洲| 男女那种视频在线观看| 国产 一区 欧美 日韩| 亚洲国产日韩欧美精品在线观看 | 99久久国产精品久久久| 一夜夜www| 久久久久久久久久黄片| 国产私拍福利视频在线观看| 国产精品久久久人人做人人爽| 欧美激情久久久久久爽电影| 国产人伦9x9x在线观看| 亚洲欧美激情综合另类| 九色国产91popny在线| www日本在线高清视频| 国产午夜福利久久久久久| 国产三级中文精品| 国产主播在线观看一区二区| 国产av不卡久久| 国产一区二区在线av高清观看| 免费大片18禁| 亚洲国产欧美一区二区综合| 国产精品久久视频播放| 日本一二三区视频观看| 中文字幕精品亚洲无线码一区| 国内精品久久久久久久电影| 夜夜夜夜夜久久久久| 成人亚洲精品av一区二区| 久久伊人香网站| 国产在线精品亚洲第一网站| 夜夜躁狠狠躁天天躁| 国产探花在线观看一区二区| 欧美最黄视频在线播放免费| 熟妇人妻久久中文字幕3abv| 女同久久另类99精品国产91| 此物有八面人人有两片| 天天躁狠狠躁夜夜躁狠狠躁| 在线观看一区二区三区| 99久久精品热视频| 黄色女人牲交| 日韩 欧美 亚洲 中文字幕| 精品国产美女av久久久久小说| 国产私拍福利视频在线观看| 90打野战视频偷拍视频| 一个人免费在线观看电影 | 亚洲 欧美一区二区三区| 美女被艹到高潮喷水动态| 人人妻人人看人人澡| 日韩国内少妇激情av| 又黄又爽又免费观看的视频| 婷婷精品国产亚洲av| 亚洲人成网站在线播放欧美日韩| 午夜福利在线观看免费完整高清在 | 欧美日韩中文字幕国产精品一区二区三区| 男人舔女人下体高潮全视频| 18禁国产床啪视频网站| 国产私拍福利视频在线观看| av欧美777| 宅男免费午夜| 久久中文看片网| 麻豆国产97在线/欧美| 久久久久久久午夜电影| 国产精品av久久久久免费| 极品教师在线免费播放| 欧美成人性av电影在线观看| 色播亚洲综合网| 欧美xxxx黑人xx丫x性爽| xxxwww97欧美| 久久精品国产99精品国产亚洲性色| 国产69精品久久久久777片 | 又粗又爽又猛毛片免费看| 国产乱人视频| 男人舔女人的私密视频| 国产精品影院久久| 久久久久亚洲av毛片大全| 欧美+亚洲+日韩+国产| 亚洲真实伦在线观看| 亚洲自拍偷在线| 久久精品国产亚洲av香蕉五月| 国产精品免费一区二区三区在线| 久久精品影院6| 19禁男女啪啪无遮挡网站| 亚洲国产欧美人成| 精品国产乱码久久久久久男人| 亚洲av第一区精品v没综合| 国产成人影院久久av| 最近在线观看免费完整版| 美女 人体艺术 gogo| 精品午夜福利视频在线观看一区| 法律面前人人平等表现在哪些方面| 天堂网av新在线| 99久久99久久久精品蜜桃| 午夜精品一区二区三区免费看| 窝窝影院91人妻| av天堂中文字幕网| 国产男靠女视频免费网站| 国产成年人精品一区二区| 欧美zozozo另类| 亚洲男人的天堂狠狠| 在线观看舔阴道视频| 色哟哟哟哟哟哟| 免费av毛片视频| 亚洲精品粉嫩美女一区| 欧美成狂野欧美在线观看| 国产高清三级在线| 亚洲人成网站在线播放欧美日韩| 午夜成年电影在线免费观看| 亚洲av五月六月丁香网| 欧美日韩精品网址| 国产av在哪里看| 亚洲av成人av| 国产精品 国内视频| 国产精品美女特级片免费视频播放器 | 精品午夜福利视频在线观看一区| netflix在线观看网站| av在线蜜桃| 中文字幕人妻丝袜一区二区| 18美女黄网站色大片免费观看| 欧美一级毛片孕妇| 少妇的逼水好多| 每晚都被弄得嗷嗷叫到高潮| 国产精品久久久人人做人人爽| 嫩草影院精品99| 亚洲人成电影免费在线| 久久国产精品人妻蜜桃| 在线国产一区二区在线| 亚洲中文字幕一区二区三区有码在线看 | 香蕉av资源在线| 国产精品av久久久久免费| 午夜激情福利司机影院| 午夜久久久久精精品| 国产黄片美女视频| 最新中文字幕久久久久 | 母亲3免费完整高清在线观看| 成人性生交大片免费视频hd| aaaaa片日本免费| 色尼玛亚洲综合影院| 波多野结衣巨乳人妻| 白带黄色成豆腐渣| 日本与韩国留学比较| 欧美激情久久久久久爽电影| 成人国产综合亚洲| 三级国产精品欧美在线观看 | 女警被强在线播放| 国产久久久一区二区三区| 国产成人精品久久二区二区免费| 老熟妇乱子伦视频在线观看| 日本免费一区二区三区高清不卡| 少妇丰满av| 久久久国产精品麻豆| 色精品久久人妻99蜜桃| 校园春色视频在线观看| 久久精品亚洲精品国产色婷小说| 两个人的视频大全免费| 日韩欧美一区二区三区在线观看| 制服丝袜大香蕉在线| 午夜精品在线福利| 在线播放国产精品三级| 9191精品国产免费久久| 亚洲专区国产一区二区| 美女大奶头视频| 狠狠狠狠99中文字幕| 久久草成人影院| 国产亚洲精品一区二区www| 亚洲专区中文字幕在线| 色吧在线观看| 亚洲aⅴ乱码一区二区在线播放| 无人区码免费观看不卡| 色综合欧美亚洲国产小说| 久久国产精品人妻蜜桃| 99国产精品99久久久久| 亚洲精品在线美女| 国产又色又爽无遮挡免费看| 九九热线精品视视频播放| 午夜免费激情av| 看免费av毛片| 一区二区三区高清视频在线| 国产精品,欧美在线| 成在线人永久免费视频| 成年人黄色毛片网站| 精品日产1卡2卡| 韩国av一区二区三区四区| 亚洲熟女毛片儿| 国内揄拍国产精品人妻在线| 成人特级av手机在线观看| 国产美女午夜福利| 成人精品一区二区免费| 男人舔奶头视频| av视频在线观看入口| 午夜成年电影在线免费观看| 国产精品一区二区精品视频观看| 在线免费观看的www视频| 国产欧美日韩一区二区精品| 一级毛片精品| 婷婷精品国产亚洲av在线| 99国产精品一区二区蜜桃av| 欧美大码av| 国内精品美女久久久久久| 亚洲性夜色夜夜综合| www国产在线视频色| 亚洲av五月六月丁香网| 国产精品一及| 99在线视频只有这里精品首页| 看片在线看免费视频| 村上凉子中文字幕在线| 成人无遮挡网站| 久久人妻av系列| 身体一侧抽搐| 哪里可以看免费的av片| 黄色片一级片一级黄色片| 国产亚洲精品综合一区在线观看| 日韩 欧美 亚洲 中文字幕| 成人无遮挡网站| 91老司机精品| 97碰自拍视频| 久久久久久久精品吃奶| 制服人妻中文乱码| 国产精品亚洲一级av第二区| 亚洲精品美女久久久久99蜜臀| x7x7x7水蜜桃| 成人高潮视频无遮挡免费网站| 久久精品国产亚洲av香蕉五月| 亚洲色图 男人天堂 中文字幕| 真人做人爱边吃奶动态| 亚洲真实伦在线观看| 在线视频色国产色| 19禁男女啪啪无遮挡网站| 久久亚洲真实| 蜜桃久久精品国产亚洲av| 女同久久另类99精品国产91| 九九久久精品国产亚洲av麻豆 | 成人三级做爰电影| 亚洲人成网站在线播放欧美日韩| 麻豆国产97在线/欧美| 久久久国产成人精品二区| 成人国产综合亚洲| 国产精品,欧美在线| 国产真实乱freesex| 欧美乱码精品一区二区三区| 丁香欧美五月| 欧美zozozo另类| 免费看日本二区| 欧美激情久久久久久爽电影| av国产免费在线观看| 精品免费久久久久久久清纯| 亚洲第一电影网av| 国产精品综合久久久久久久免费| 久久中文字幕一级| 欧美一级毛片孕妇| 国产乱人伦免费视频| 久久天堂一区二区三区四区| 欧美xxxx黑人xx丫x性爽| 久久国产精品人妻蜜桃| 日本黄大片高清| 免费看美女性在线毛片视频| 欧美国产日韩亚洲一区| 每晚都被弄得嗷嗷叫到高潮| 免费人成视频x8x8入口观看| 99热精品在线国产| 日本 av在线| 男插女下体视频免费在线播放| 成人精品一区二区免费| 久久精品aⅴ一区二区三区四区| 精品欧美国产一区二区三| 欧美日韩国产亚洲二区| 国产蜜桃级精品一区二区三区| 国产真实乱freesex| 亚洲欧美日韩东京热| 亚洲av美国av| 99在线视频只有这里精品首页| 国产伦在线观看视频一区| 精华霜和精华液先用哪个| 免费人成视频x8x8入口观看| 中文在线观看免费www的网站| 全区人妻精品视频| 国产欧美日韩一区二区三| 18禁裸乳无遮挡免费网站照片| 成人18禁在线播放| 少妇熟女aⅴ在线视频| 免费电影在线观看免费观看| 国产成人av教育| 搞女人的毛片| 国产真人三级小视频在线观看| 亚洲性夜色夜夜综合| 亚洲人成伊人成综合网2020| 色老头精品视频在线观看| 亚洲精品色激情综合| 亚洲欧美激情综合另类| 好看av亚洲va欧美ⅴa在| 97人妻精品一区二区三区麻豆| www.www免费av| 国产1区2区3区精品| 一区二区三区高清视频在线| 变态另类丝袜制服| 国内精品久久久久久久电影| 99国产精品一区二区三区| 搡老岳熟女国产| 午夜福利在线观看吧| 九色国产91popny在线| 国产三级中文精品| 国产成人精品久久二区二区91| 国产av一区在线观看免费| 欧美三级亚洲精品| 在线免费观看的www视频| 狂野欧美白嫩少妇大欣赏| 在线a可以看的网站| 十八禁网站免费在线| 国产美女午夜福利| 国内精品一区二区在线观看| 黄片小视频在线播放| 亚洲成人久久爱视频| 成人高潮视频无遮挡免费网站| 久久久久久久午夜电影| 成人18禁在线播放| av中文乱码字幕在线| 真人一进一出gif抽搐免费| 手机成人av网站| 噜噜噜噜噜久久久久久91| 99久久综合精品五月天人人| 麻豆成人av在线观看| 亚洲精品粉嫩美女一区| 婷婷丁香在线五月| 网址你懂的国产日韩在线| 亚洲av免费在线观看| x7x7x7水蜜桃| www日本在线高清视频| 丰满的人妻完整版| 久久久国产成人免费| 熟妇人妻久久中文字幕3abv| 男人舔女人下体高潮全视频| 亚洲色图 男人天堂 中文字幕| 国产亚洲精品av在线| 香蕉av资源在线| 一级作爱视频免费观看| 久久久久久久久中文| 婷婷六月久久综合丁香| 久99久视频精品免费| 欧美日韩瑟瑟在线播放| 琪琪午夜伦伦电影理论片6080| 日本一本二区三区精品| 在线观看一区二区三区| 精品熟女少妇八av免费久了| 亚洲电影在线观看av| 日韩av在线大香蕉| 麻豆一二三区av精品| 国产精品免费一区二区三区在线| 91麻豆av在线| 久久久久亚洲av毛片大全| 真人一进一出gif抽搐免费| netflix在线观看网站| 亚洲美女视频黄频| 可以在线观看的亚洲视频| 亚洲无线观看免费| 国产真人三级小视频在线观看| 久久精品影院6| xxxwww97欧美| netflix在线观看网站| 亚洲国产看品久久| 国产麻豆成人av免费视频| 日本黄色视频三级网站网址| 久久久久久人人人人人| 天天躁日日操中文字幕| 亚洲中文日韩欧美视频| 亚洲精品一区av在线观看| 最近最新免费中文字幕在线| 一级毛片高清免费大全| 亚洲精品一区av在线观看| 99riav亚洲国产免费| 国产精品99久久久久久久久| 国产av不卡久久| 国产成人欧美在线观看| 成人特级黄色片久久久久久久| 国内毛片毛片毛片毛片毛片| 国产激情偷乱视频一区二区| 黄色女人牲交| 精品无人区乱码1区二区| 国产精品亚洲一级av第二区| 综合色av麻豆| 精品久久久久久久久久免费视频| 欧美日本亚洲视频在线播放| 午夜激情欧美在线| 757午夜福利合集在线观看| 亚洲九九香蕉| 欧美一级a爱片免费观看看| 国产精品香港三级国产av潘金莲| www国产在线视频色| 一级a爱片免费观看的视频| 91麻豆av在线| 97人妻精品一区二区三区麻豆| 久久精品国产99精品国产亚洲性色| 日本与韩国留学比较| 欧美黄色淫秽网站| 女人高潮潮喷娇喘18禁视频| bbb黄色大片| 大型黄色视频在线免费观看| tocl精华| 手机成人av网站| 国产黄色小视频在线观看| 麻豆一二三区av精品| 亚洲av日韩精品久久久久久密| 男女那种视频在线观看| 国产精品,欧美在线| 色尼玛亚洲综合影院| 国内精品一区二区在线观看| 国产精品女同一区二区软件 | 国产不卡一卡二| 亚洲精品456在线播放app | 精品国产超薄肉色丝袜足j| a级毛片在线看网站| 白带黄色成豆腐渣| cao死你这个sao货| 欧美绝顶高潮抽搐喷水| 男女之事视频高清在线观看| 欧美乱色亚洲激情| 在线观看美女被高潮喷水网站 | 日韩精品青青久久久久久| 欧美色视频一区免费| 老汉色∧v一级毛片| 成人av在线播放网站| 老汉色∧v一级毛片| 男人和女人高潮做爰伦理| 日本黄色视频三级网站网址| 亚洲精品久久国产高清桃花| 一级黄色大片毛片| 免费人成视频x8x8入口观看| 成人国产综合亚洲| 51午夜福利影视在线观看| 国产精品亚洲美女久久久| 91av网站免费观看| 99国产精品一区二区三区| 我要搜黄色片| 天天一区二区日本电影三级| 亚洲精品中文字幕一二三四区| 久久精品国产综合久久久| 露出奶头的视频| netflix在线观看网站| 91av网站免费观看| 亚洲最大成人中文| 日韩av在线大香蕉| 婷婷精品国产亚洲av| 国产成人影院久久av| 三级国产精品欧美在线观看 | 岛国在线观看网站| 国产高清有码在线观看视频| 老司机在亚洲福利影院| 久久精品91无色码中文字幕| 久久香蕉精品热| tocl精华| 欧美一区二区精品小视频在线| 三级毛片av免费| 亚洲美女黄片视频| 色av中文字幕| 99久久精品热视频| 日本一本二区三区精品| 老汉色av国产亚洲站长工具| 一级毛片高清免费大全| av在线天堂中文字幕| 757午夜福利合集在线观看| 色精品久久人妻99蜜桃| 国产亚洲av高清不卡| 99riav亚洲国产免费| 亚洲熟女毛片儿| 99在线视频只有这里精品首页| 大型黄色视频在线免费观看| 99久久国产精品久久久| 99国产极品粉嫩在线观看| 国产69精品久久久久777片 | 1024手机看黄色片| 日本免费一区二区三区高清不卡| av片东京热男人的天堂| 免费看a级黄色片| 人妻久久中文字幕网| 欧美午夜高清在线| 午夜精品一区二区三区免费看| 一二三四社区在线视频社区8| 精品国产乱子伦一区二区三区| 欧美性猛交黑人性爽| 亚洲专区字幕在线| 久久亚洲真实| 欧美日韩黄片免| 国产精品美女特级片免费视频播放器 | 国产91精品成人一区二区三区| xxx96com| 免费高清视频大片| 9191精品国产免费久久| 国产黄色小视频在线观看| 老熟妇乱子伦视频在线观看| 日韩高清综合在线| 欧美日韩黄片免| 久久这里只有精品19| 国产av在哪里看| 老司机福利观看| 久久中文看片网| 天堂av国产一区二区熟女人妻| 叶爱在线成人免费视频播放| 欧美日韩瑟瑟在线播放| 国模一区二区三区四区视频 | 色精品久久人妻99蜜桃| 国产亚洲av高清不卡| 久久午夜亚洲精品久久| 久久久久久九九精品二区国产| 国内精品久久久久久久电影| 精品人妻1区二区| 狂野欧美激情性xxxx| 国产精品av视频在线免费观看| 国产又黄又爽又无遮挡在线| 九色成人免费人妻av| 日韩大尺度精品在线看网址| 国产伦精品一区二区三区视频9 | 巨乳人妻的诱惑在线观看| 婷婷丁香在线五月| 美女高潮喷水抽搐中文字幕| 国产欧美日韩精品一区二区| 最近视频中文字幕2019在线8| 欧美不卡视频在线免费观看| 香蕉国产在线看| 亚洲真实伦在线观看| 99久久精品国产亚洲精品| www日本黄色视频网| www.熟女人妻精品国产| 美女高潮喷水抽搐中文字幕| 日本黄色片子视频|