• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Secure Audio Transmission Over Wireless Uncorrelated Rayleigh Fading Channel

    2022-11-09 08:16:36OsamaFaragallahFaroukHalaElsayedandMohsenElbendary
    Computers Materials&Continua 2022年1期

    Osama S.Faragallah,M.Farouk,Hala S.El-sayed and Mohsen A.M.El-bendary

    1Department of Information Technology,College of Computers and Information Technology,Taif University,P.O.Box 11099,Taif,21944,Saudi Arabia

    2Department of Computer Science and Engineering,Faculty of Electronic Engineering,Menoufia University,Menouf,32952,Egypt

    3Department of Electrical Engineering,Faculty of Engineering,Menoufia University,Shebin El-Kom,32511,Egypt

    4Department of Electronics Technology,Faculty of Technology and Education,Helwan University,Cairo,Egypt

    Abstract: Audio communications and computer networking play essential roles in our daily lives,including many domains with different scopes.Developments in these technologies are quick.In consequence,there is a dire need to secure these technologies up to date.This paper presents an efficient model for secure audio signal transmission over the wireless noisy uncorrelated Rayleigh fading channel.Also,the performance of the utilized multiple secret keys-based audio cryptosystem is analyzed in different transformation domains.The discrete cosine transform (DCT),the discrete sine transform(DST),and the discrete wavelet transform (DWT) are investigated in the utilized multiple secret key-based audio cryptosystem.Simulationresults show consistent results with the wireless noisy channel.The performance of the proposed multiple secret keys-based audio cryptosystem can be ranked concerning the employed domain as DWT,DCT,and DST transform techniques.The simulation experiments proved that the presented multiple secret keysbased audio cryptosystem for audio signals transmitted over the wireless noisy uncorrelated Rayleigh fading channel achieves reliable and secure wireless link utilizing combined multi security layers.

    Keywords: Audio communications;encryption;uncorrelated Rayleigh fading channel

    1 Introduction

    Audio communications have a pivotal role in our daily life,covering many domains like cell phone,military applications,electronic learning,online banking,social networks,landline phone conversation,and chatting conversation programs.Therefore,audio calls are widely utilized in our daily life,especially with audio cryptosystem calls.Essentially,any audio cryptosystem requires audio data to be transmitted in a non-clear form or encrypted form using a robust encryption algorithm.Otherwise,the audio cryptosystem cannot guarantee enough security against eavesdropping during the communication process.Moreover,it is mandatory to cancel and eliminate any residual intelligibility in the ciphered audio data to ensure sufficient protection against eavesdropping during audio communications [1-4].

    As the cryptanalysis tools and activities have increased,it is crucial to encrypt audio files during the communication process through all known communication channels like the public telephone network,wireless network,radio communications and Internet calls.Any successful audio cryptosystem should own a strong encryption algorithm against attacks and eavesdroppers.Therefore,scientific research must focus on security enhancements for audio cryptosystems.They should quickly enhance the security of audio cryptosystems because of two reasons.First,there is rapid development in cryptanalysis and eavesdroppers’techniques.Second,there is a rapid increase in audio communication usage in a wide variety of daily lives [5-8].

    Due to the wide-spreading of different wireless networks,security issues became vital to combat the various attacks.Several audio signals are susceptible,and they must be protected and secured from any attacks.Also,a communication system cannot give the required security level against hackers during communications,especially if the audio data over wireless channels is clear or not encrypted [7].It is usually receivable for any unauthorized eavesdropper.For ensuring a high-security degree,efficient audio encryption/decryption techniques are required [8].

    The secured wireless transmission model for sensitive audio signals is presented in this paper.Furthermore,the performance of the enhanced multiple secret keys-based audio cryptosystem is analyzed using different metrics over the wireless uncorrelated fading channel to prove its applicability with varying kinds of noises.

    The paper rest has been organized as follows: the overview of the related work is presented in section 2.In section 3,the enhanced multiple secret keys-based audio cryptosystem description based on enhanced multiple key is presented.The computer simulation experiments for the enhanced multiple secret keys-based audio cryptosystem are explored in section 4.Finally,the conclusion is given in section 5.

    2 Related Works

    The recent presented audio security techniques have been discussed in this section.The audio security techniques include encryption tools,secret key based methods and data hiding based security techniques.The audio cryptosystems can be categorized into analog cryptosystems and digital cryptosystems.The analog methods of audio encryption can be categorized into timedomain (TD) methods and frequency domain methods like DCT,DST,and DWT [9-19].The second type of audio cryptosystem is the digital cryptosystems.There are two examples of digital audio cryptosystems: the traditional Advanced Encryption Standard (AES) and the chaotic encryption using baker map-based techniques [20-23].

    The chaotic baker map is used in 2019 as an efficient data randomizing tool for enhancing the error performance of low complex convolutional codes [24].The chaotic baker map is employed in this presented research to improve the multiple secret keys audio cryptosystem.Although the problems of audio signals protection over the commercial channel have been discussed in [25],this research work proposed an efficient method for encrypting the speech using the variable-length encoding and the collatz conjecture.This speech encryption approach has a larger keyspace and significantly higher key sensitivity.Several metrics are considered for studying the performance of this proposed audio security technique,such as the computational cost,key sensitivity and security keyspace size [25].

    The data hiding concept is presented as a tool for protecting the audio signal in [26].The authors in this research work proposed the watermarking technique to secure the audio signals.The DWT and singular value decomposition (SVD) techniques have been utilized in the proposed watermarking scheme;this proposed decentralized watermarking works based on distributing the audio signal watermark into the corners of the host signals for enhancing the robustness of this decentralized watermarking technique [26].Furthermore,based on the LSB algorithm in [27],the steganography technique is proposed for image embedding into audio files.This approach contains two processes,the compression and encryption process of the image by the GMPR technique.Examples of data hiding techniques utilized as a tool for image and audio security have been presented in several research papers [26-28].

    3 Enhanced Multiple Secret Keys-Based Audio Cryptosystem

    The enhanced multiple secret keys-based audio cryptosystemis a combined encryption algorithm utilizing the baker map within the frequency domains.The permutation process increases the confusion of the presented multiple secret keys-based audio cryptosystem.Therefore,this research paper has utilized different transform techniques to test their performance within the presented multiple secret keys-based audio cryptosystem over the wireless uncorrelated Rayleigh fading channel.The enhanced multiple secret keys-based audio cryptosystem employs different transform domains like DCT,DST,and DWT.

    3.1 Encryption Algorithm

    In the following,the steps of the encryption algorithm of the enhanced multiple secret keysbased audio cryptosystem are presented.

    Round 1: Framing and reshaping the audio signal from a 1D block into 2D blocks.

    Round 2: Mask generation using the secret key;this is an essential step to modify the remaining non-permutated parts of the audio signal and enhance the security of the enhanced multiple secret keys-based audio cryptosystem.The mask is generated as follows:

    The square matrix of size equal to the secret key size is filled with zero values.The first number of rows is equivalent to the number of sub-keys in the private key,filled with a value of 1.Zeros and ones masks are formed using the chaotic baker map permutations.This mask is combined with every audio block signal after reformatting to fill the silent periods of the audio signal and offer immunity against known-plaintext attacks.

    Round 3: Permutation and substitution;the permutation utilizes the chaotic baker map to rearrange audio sample data in the audio matrix.

    For each separate test,repeat permutation a number of rounds equals 3,5 and 7.Then,permutation is followed by substitution to alter the remaining non-shuffled portions of the audio signal and increase the cryptosystem’s security.Finally,the mask is added to the original audio signal in the encryption algorithm and subtracted in the decryption algorithm.

    Round 4: Apply discrete transforms followed by permutation and then substitution;finally,apply the inverse of discrete transforms.

    The main idea of employing the DCT,DST and DWT [29-31] is to increase diffusion and change the values of 1 introduced by masking in silent periods (all-zero blocks).Another shuffling operation is employed in the DCT,DST or DWT for the audio samples to improve the confusion and enhance the security before employing the inverse of the employed transform.This is followed by a substitution step,which changes the audio samples by combining their values to the mask’s value.Finally,this step is followed by applying the inverse of transform domain IDCT,IDST or IDWT.

    Round 5: Permutation using baker map is repeated a number of rounds equals 3,5 and 7.

    Round 6: Reshaping into a 1D format save audio data into a file.The output is the encrypted audio version.

    3.2 Decryption Algorithm

    In the following,the steps of the decryption algorithm of the enhanced multiple secret keysbased audio cryptosystem are presented.

    Round 1: Mask generation using the secret key and baker map.

    Round 2: Framing and reshaping into 2D blocks to form a readable format.

    Round 3: Employ the inverse of permutation using the inverse of baker map.For each separate experiment,repeat this round a number of rounds equals 3,5 and 7.

    Round 4: Apply discrete transforms followed by the inverse of substitution and then the inverse of substitution;finally,apply the inverse of discrete transforms.

    Round 5: Employ the inverse of substitution and the inverse of permutation.The inverse of substitution utilizes a subtract mask.The inverse of permutation employs the inverse of baker map with repeating the inverse permutation a number of rounds equals 3,5 and 7.

    Round 6: Reshaping into a 1D format save audio data into a file.The output is the decrypted audio version.

    The encryption and decryption algorithms steps have been described in the above sections of the enhanced multiple secret keys-based audio cryptosystem.This enhanced multiple secret keys-based audio cryptosystem works using substitution and permutation of audio blocks using multiple secret keys in frequency domains.In addition,the enhanced multiple secret keys-based audio cryptosystem is based on utilizing the fifth private key created from the enhanced audio cryptosystem’s original secret key.This adds another security layer for the enhanced multiple secret keys-based audio cryptosystem and enlarges the keyspace.Simulation experiments demonstrated that these modifications enhance the security of the audio transmission over the wireless uncorrelated fading channel.Therefore,the enhanced multiple secret keys-based audio cryptosystem is suitable for sensitive and classified phone calls.However,these enhancements are at the cost of increasing the time taken to execute the enhanced multiple secret keys-based audio cryptosystem.

    The presented audio cryptosystem adds another security layer by enlarging the secret keyspace.This is done by increasing the number of private keys used to five keys instead of only four keys by generating the fifth key (key 5).The size of key 5 equals one half the size of key 2.Also,mask four is developed to be handled with operations of key 4.

    3.3 The Evaluating Model of the Enhanced Multiple Secret Keys-Based Audio Cryptosystem

    In this section,the evaluating model of the presented enhanced multiple secret keys-based audio cryptosystem have been introduced.This model processes the audio files for performing the encryption process at the transmitter side as shown in Fig.1.Also,it shows the operation of the encrypted audio file and the decryption process,as shown in Fig.1 for decrypting the encrypted audio signal.The Rayleigh fading channel is utilized to test the performance of the presented audio cryptosystem and evaluate the quality of the received decrypted audio file.The encrypted audio signal is prepared to send over the wireless uncorrelated Rayleigh fading channel through the following three steps: a-transmission process,b-segmentation to packets,and c-modulation.In Fig.1,the proposed secured audio communication model is designed for testing the multiple secret keys-based audio cryptosystem over the wireless uncorrelated Rayleigh fading channel.This model has been designed for evaluating the performance of the enhanced multiple secret keys-based audio cryptosystem for securing the audio signals transmission in a free and open environment.This environment is represented in this proposed model of secure audio transmission by the wireless uncorrelated Rayleigh fading channel.In the simulation section,the presented guaranteed audio wireless transmission parameters are presented.These parameters are the length of the small packets,“transmitted packet length”,the channel conditions simulation“SNR Values”,the modulation and the utilized wireless communication channel.

    4 The Computer Simulation Experiments

    Several experiments are devoted to test and evaluate the effect of noise using uncorrelated fading channel on the received decrypted audio signal after passing through a wireless medium,with different SNR noise levels and at the same time re-run tests with the error-free channel.For evaluating the algorithms’performance,many metrics utilized,such as the spectral distortion(SD),Log-Likelihood Ratio (LLR),and the correlation coefficient (CC).There are two groups of experiments;the first experiment group tests the enhanced multiple secret keys-based audio cryptosystem concerning the different transform domains.The second experiment group tests evaluate the presented multiple secret keys-based audio cryptosystem as a security tool for securing the transmitted speech or audio signals over the wireless uncorrelated Rayleigh fading channel communication.The simulation setting parameters of the secured transmission model of the audio signals are presented in Tab.1.

    4.1 Uncorrelated Rayleigh Fading Channel Experiments Group

    In this group of experiments,the enhanced multiple secret keys-based audio cryptosystem is tested over wireless uncorrelated Rayleigh fading channel with error-free and various SNR values using the different transform domains.

    4.1.1 DCT Analysis

    For decryption and according to the employed security metrics shown in Tab.2 for CC,SD and LLR,the best performance of the enhanced multiple secret keys-based audio cryptosystemis achieved with SNR equals 35 dB,while the worst performance of the enhanced multiple secret keys-based audio cryptosystem is obtained with SNR equals 0 dB.This is generally expected as the noise level becomes lowest with the value of 35 dB and,as a result,better quality for the decrypted audio signal.Furthermore,it is shown from Tab.2 that the enhanced multiple secret keys-based audio cryptosystem shows improved values of CC,SD and LLR with increasing the SNR of the uncorrelated Rayleigh fading channel.

    4.1.2 DST Analysis

    For decryption,according to employed security metrics shown in Tab.3 for CC,SD and LLR,the best performance of the enhanced multiple secret keys-based audio cryptosystem is achieved with SNR equals 35,while the worst performance of the enhanced multiple secret keys-based audio cryptosystem is obtained with SNR equals 0 dB.This is usually expected as the noise level becomes lowest with a value of 35 dB and,as a result,better quality for the decrypted audio signal.This is generally expected as the noise level becomes lowest with a value of 35 dB and,as a result,better quality for the decrypted audio signal.It is shown from Tab.3 that the performance of the enhanced multiple secret keys-based audio cryptosystem shows improved values of CC,SD and LLR with increasing the SNR of the uncorrelated Rayleigh fading channel.On the other hand,it is delivered from Tab.3 that the DST-based enhanced multiple secret keys-based audio cryptosystem performs worse than the DCT-based enhanced multiple secret keys-based audio cryptosystem.Also,the received decrypted audio signal quality is lower than the DCT domain.Hence,these tabulated results demonstrate that the DCT transform achieves better performance over the uncorrelated Rayleigh fading channel than the DST transform.

    Figure 1:The encryption and decryption steps of the enhanced multiple secret keys-based audio cryptosystem model for performance evaluating over wireless uncorrelated Rayleigh fading channel

    Table 1:Uncorrelated Rayleigh fading channel setting parameters

    Table 2:DCT results with error-free channel and various uncorrelated Rayleigh fading SNR values

    Table 3:DST with error-free channel and various uncorrelated Rayleigh fading SNR values

    4.1.3 DWT Analysis

    The performance evaluation of the enhanced multiple secret keys-based audio cryptosystem utilizing the DWT transform has been presented.The CC,SD and LLR metrics are employed for measuring the quality of encryption and decryption processes of the enhanced multiple secret keys-based audio cryptosystem.In addition,the various uncorrelated Rayleigh fading channel conditions are used through various SNR values.The results tabulated in Tab.4.

    Table 4:DWT with error-free channel and various uncorrelated Rayleigh fading SNR values

    As shown in Tab.4,the DWT-based enhanced multiple secret keys-based audio cryptosystem performs better than the DCT and DST-based system.Moreover,the decrypted audio signal quality is improved with the DWT.These two previous computer simulation experiments prove the applicability of the enhanced multiple secret keys-based audio cryptosystem for securing the sensitive speech calls or audio files transmission over the wireless uncorrelated Rayleigh fading channel.

    4.2 Results Analysis and Comparison

    This section presents a comparison and analysis for security and quality metrics in decryption with different SNR values.Tab.5 shows a comparison between the correlation coefficient (CC)values of different transform techniques.Fig.2 shows the values of the CC between the original and received decrypted audio with different transform techniques and various SNR of the uncorrelated Rayleigh fading channel.For CC values,it is shown that the best values exist with the DWT for all SNR values.However,the worst values indicated with the DST for values of SNR equal 0 dB,5 dB,10 dB,15 dB,20 dB,and 25 dB.The worst value indicated with the DCT for SNR equals 25 dB.

    Fig.3 shows the values of the SD metric values of the enhanced multiple secret keysbased audio cryptosystem with the different transform techniques and various SNR values of the uncorrelated Rayleigh fading channels.In Fig.3,the SD metrics values are drawn for the previous experiments for encrypted audio using the enhanced multiple secret keys-based audio cryptosystems.As shown from Fig.3,with increasing the SNR values of the wireless uncorrelated Rayleigh fading channel,the quality of the received decrypted audio signal is improved.On the other hand,the DWT transform achieves better metrics values.For SD values,it is shown from Fig.3 that the best values exist with the DWT for all SNR values.However,the worst values are indicated with the DCT and DST for different SNR values.Fig.4 shows the LLR metric values of the enhanced multiple secret keys-based audio cryptosystem with different transform techniques and various SNR values of the uncorrelated Rayleigh fading channel.For LLR values shown in Fig.4,the best values exist with the DWT for SNR values equal 10 dB and 15 dB.The best values exist with the DST for SNR values equal 0 dB and 5 dB.However,the worst values are shown with the DWT for values of SNR equal 0 dB and 5 dB.The worst values exist with the DCT for SNR values equal 10 dB and 15 dB.The different metrics values are collected in Tab.5.This table tabulates the values of the experiments using different transform techniques.

    Table 5:Metrics values of different techniques over the wireless noisy uncorrelated Rayleigh fading channel with SNR variations for original and decrypted version

    Figure 2:CC vs. SNR for the enhanced multiple secret keys-based audio cryptosystem over the wireless noisy uncorrelated Rayleigh fading channel

    Figure 3:SD vs. SNR for the enhanced multiple secret keys-based audio cryptosystem over the wireless noisy uncorrelated Rayleigh fading channel

    In Tab.5,the metrics of the received decrypted audio signal quality are tabulated.These metrics demonstrate the suitability of this enhanced multiple secret keys-based audio cryptosystem for securing the audio signals transmission over the wireless uncorrelated Rayleigh fading channel.Hence,this high-level audio security tool can achieve reliable wireless links to transmit highsensitive audio signals.The DWT transform technique achieves good decrypted audio quality compared to the other utilized methods.The presented secured model for sensitive speech calls or audio signals transmitted over the wireless uncorrelated Rayleigh fading channel is applicable and can provide combined layers of security due to the secret key enlarging and security-enhancing utilizing the chaotic baker map.

    Figure 4:LLR vs. SNR for the enhanced multiple secret keys-based audio cryptosystem over the wireless noisy uncorrelated Rayleigh fading channel

    5 Conclusions

    This paper presents an efficient model for guaranteed audio signal transmission over the wireless noisy uncorrelated Rayleigh fading channel.Also,the performance of the utilized enhanced multiple secret keys-based audio cryptosystem is analyzed with different transform domains like DCT,DST and DWT using chaotic baker map and multiple secret keys.Simulation results show consistent results with the wireless uncorrelated Rayleigh fading channel.The DWT-based enhanced multiple secret keys-based audio cryptosystem outperforms better than the DCT and DST-based systems.Also,the decrypted audio signal quality is improved with the DWT.The achieved results proved the applicability of the enhanced multiple secret keys-based audio cryptosystem for transmitting sensitive speech calls or audio signals over the wireless uncorrelated Rayleigh fading channel.

    Acknowledgement: This study was funded by the Deanship of Scientific Research,Taif University Researchers Supporting Project number (TURSP-2020/08),Taif University,Taif,Saudi Arabia.

    Funding Statement: This study was funded by the Deanship of Scientific Research,Taif University Researchers Supporting Project number (TURSP-2020/08),Taif University,Taif,Saudi Arabia.

    Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.

    亚洲av日韩精品久久久久久密| 精品亚洲成a人片在线观看| 黄色片一级片一级黄色片| 一级,二级,三级黄色视频| 亚洲视频免费观看视频| 欧美日本中文国产一区发布| 国产免费现黄频在线看| 99精国产麻豆久久婷婷| а√天堂www在线а√下载 | 99久久综合精品五月天人人| 久久久久精品国产欧美久久久| 黄片播放在线免费| 亚洲在线自拍视频| 久久青草综合色| 久久精品国产综合久久久| 91大片在线观看| 国内久久婷婷六月综合欲色啪| 精品午夜福利视频在线观看一区| 亚洲五月天丁香| 9热在线视频观看99| 欧美乱码精品一区二区三区| 人人妻人人澡人人爽人人夜夜| 18禁国产床啪视频网站| 99在线人妻在线中文字幕 | 中文字幕人妻熟女乱码| 黄色片一级片一级黄色片| 99久久综合精品五月天人人| 欧美另类亚洲清纯唯美| 国产人伦9x9x在线观看| 丁香六月欧美| 精品一区二区三区视频在线观看免费 | 18禁黄网站禁片午夜丰满| 91老司机精品| 精品国产超薄肉色丝袜足j| 国产蜜桃级精品一区二区三区 | 精品国产亚洲在线| 91麻豆精品激情在线观看国产 | 99久久综合精品五月天人人| 久久热在线av| 国产精品国产av在线观看| 少妇 在线观看| 丰满饥渴人妻一区二区三| 中文字幕制服av| 色在线成人网| 一a级毛片在线观看| 欧美黄色片欧美黄色片| 美女高潮到喷水免费观看| 午夜福利在线观看吧| 免费看十八禁软件| 80岁老熟妇乱子伦牲交| 老汉色av国产亚洲站长工具| 日韩熟女老妇一区二区性免费视频| 国产色视频综合| 成人国语在线视频| 50天的宝宝边吃奶边哭怎么回事| 99国产精品一区二区三区| 精品电影一区二区在线| a级片在线免费高清观看视频| 一个人免费在线观看的高清视频| 日韩大码丰满熟妇| 午夜老司机福利片| 高清在线国产一区| av电影中文网址| 999精品在线视频| 欧美在线黄色| 日韩三级视频一区二区三区| 亚洲一码二码三码区别大吗| 欧美成狂野欧美在线观看| 成年人黄色毛片网站| 国产色视频综合| 午夜老司机福利片| av天堂久久9| 中文字幕高清在线视频| 王馨瑶露胸无遮挡在线观看| 在线十欧美十亚洲十日本专区| 777久久人妻少妇嫩草av网站| 欧美 日韩 精品 国产| av中文乱码字幕在线| 少妇被粗大的猛进出69影院| 国产男女超爽视频在线观看| 欧美黄色淫秽网站| 精品福利观看| 久久精品国产亚洲av香蕉五月 | 高清欧美精品videossex| 亚洲成人免费av在线播放| 亚洲人成77777在线视频| x7x7x7水蜜桃| 两性午夜刺激爽爽歪歪视频在线观看 | 男女午夜视频在线观看| 亚洲欧美一区二区三区黑人| 日韩欧美在线二视频 | 欧美日韩一级在线毛片| 久久精品国产综合久久久| 色在线成人网| 亚洲精华国产精华精| av一本久久久久| 亚洲欧美日韩另类电影网站| 99国产精品免费福利视频| 国产熟女午夜一区二区三区| 丝袜美足系列| 在线观看一区二区三区激情| 亚洲五月天丁香| 最新美女视频免费是黄的| 亚洲精品中文字幕在线视频| 国产精品.久久久| 在线观看免费午夜福利视频| 国产精品 欧美亚洲| 在线观看午夜福利视频| 国产亚洲精品第一综合不卡| 精品一区二区三卡| 成在线人永久免费视频| 免费人成视频x8x8入口观看| 国产欧美日韩一区二区精品| svipshipincom国产片| 老司机在亚洲福利影院| 91字幕亚洲| 亚洲av电影在线进入| 99热网站在线观看| 曰老女人黄片| 99热只有精品国产| 久9热在线精品视频| 少妇猛男粗大的猛烈进出视频| 老熟女久久久| 久久久久久久久久久久大奶| 欧美精品av麻豆av| 国产精品综合久久久久久久免费 | 国产精品一区二区精品视频观看| 男女床上黄色一级片免费看| 精品久久久久久电影网| 美女国产高潮福利片在线看| 久久ye,这里只有精品| 麻豆乱淫一区二区| 久久久久久久午夜电影 | 午夜福利影视在线免费观看| 国产主播在线观看一区二区| av福利片在线| 欧美乱色亚洲激情| 在线永久观看黄色视频| 黄色片一级片一级黄色片| 无限看片的www在线观看| 国产xxxxx性猛交| 人成视频在线观看免费观看| 国产精品一区二区在线不卡| 99久久人妻综合| 一夜夜www| 亚洲欧洲精品一区二区精品久久久| 精品一区二区三区视频在线观看免费 | 久久狼人影院| 久久午夜亚洲精品久久| 女人爽到高潮嗷嗷叫在线视频| 精品视频人人做人人爽| 中文欧美无线码| 免费一级毛片在线播放高清视频 | 热99国产精品久久久久久7| 午夜日韩欧美国产| 中国美女看黄片| 日韩有码中文字幕| 国产aⅴ精品一区二区三区波| 高清欧美精品videossex| 老熟妇仑乱视频hdxx| 在线永久观看黄色视频| 在线看a的网站| 亚洲成a人片在线一区二区| 欧美乱色亚洲激情| 99热只有精品国产| 久久久国产成人精品二区 | 欧美+亚洲+日韩+国产| 日本a在线网址| 国产人伦9x9x在线观看| 女人高潮潮喷娇喘18禁视频| 久久精品国产亚洲av高清一级| 久久久久精品国产欧美久久久| 悠悠久久av| 99国产综合亚洲精品| 欧美中文综合在线视频| 纯流量卡能插随身wifi吗| 91av网站免费观看| 成人18禁高潮啪啪吃奶动态图| 午夜精品国产一区二区电影| 69av精品久久久久久| 黄色怎么调成土黄色| 国产亚洲精品第一综合不卡| 久久九九热精品免费| 91九色精品人成在线观看| 久久精品aⅴ一区二区三区四区| 欧美人与性动交α欧美精品济南到| 精品久久久精品久久久| 男女床上黄色一级片免费看| 欧美黄色淫秽网站| 美女视频免费永久观看网站| а√天堂www在线а√下载 | 亚洲国产精品一区二区三区在线| 高潮久久久久久久久久久不卡| 亚洲少妇的诱惑av| 嫁个100分男人电影在线观看| 成人精品一区二区免费| 国产不卡av网站在线观看| 女警被强在线播放| 国产乱人伦免费视频| 精品乱码久久久久久99久播| 精品一区二区三区四区五区乱码| 9热在线视频观看99| 国产午夜精品久久久久久| 精品久久蜜臀av无| 一进一出抽搐gif免费好疼 | 男女高潮啪啪啪动态图| av天堂在线播放| 亚洲七黄色美女视频| 久久久久久久久免费视频了| 巨乳人妻的诱惑在线观看| 国产精品成人在线| 91在线观看av| 99精品欧美一区二区三区四区| 夜夜夜夜夜久久久久| 午夜两性在线视频| 男女免费视频国产| 看片在线看免费视频| 午夜福利欧美成人| 一级作爱视频免费观看| 侵犯人妻中文字幕一二三四区| 五月开心婷婷网| 熟女少妇亚洲综合色aaa.| 悠悠久久av| 亚洲黑人精品在线| 男男h啪啪无遮挡| 日韩欧美一区二区三区在线观看 | 身体一侧抽搐| 免费人成视频x8x8入口观看| 一区二区三区国产精品乱码| 两个人免费观看高清视频| 中文字幕人妻熟女乱码| 亚洲欧美精品综合一区二区三区| 成人亚洲精品一区在线观看| 精品一区二区三区av网在线观看| 久久狼人影院| 美女 人体艺术 gogo| 欧美日韩精品网址| 90打野战视频偷拍视频| 亚洲精品久久午夜乱码| 午夜免费观看网址| 精品午夜福利视频在线观看一区| 国产精品免费视频内射| 欧美在线黄色| 韩国av一区二区三区四区| 999精品在线视频| 国产精品二区激情视频| 中亚洲国语对白在线视频| 色尼玛亚洲综合影院| 国产精品亚洲一级av第二区| 亚洲男人天堂网一区| 大香蕉久久成人网| 高清在线国产一区| 亚洲欧美激情在线| 欧美激情 高清一区二区三区| 制服诱惑二区| 人人妻人人添人人爽欧美一区卜| 老汉色∧v一级毛片| 老汉色av国产亚洲站长工具| 免费在线观看黄色视频的| 女人爽到高潮嗷嗷叫在线视频| 国产在线观看jvid| 欧美精品人与动牲交sv欧美| 亚洲中文日韩欧美视频| 美女高潮喷水抽搐中文字幕| 多毛熟女@视频| 国产野战对白在线观看| 国产欧美日韩综合在线一区二区| 少妇 在线观看| 男女之事视频高清在线观看| 国产成人免费无遮挡视频| 欧美 日韩 精品 国产| 一级片免费观看大全| 女人爽到高潮嗷嗷叫在线视频| 91精品三级在线观看| 亚洲avbb在线观看| 巨乳人妻的诱惑在线观看| 精品国产一区二区久久| ponron亚洲| 一边摸一边抽搐一进一小说 | 女性生殖器流出的白浆| 国产99久久九九免费精品| 久热这里只有精品99| 国产精品亚洲av一区麻豆| 美女视频免费永久观看网站| 国产色视频综合| 午夜激情av网站| 大陆偷拍与自拍| 国产精品电影一区二区三区 | 91精品国产国语对白视频| 精品国产一区二区三区四区第35| 首页视频小说图片口味搜索| av中文乱码字幕在线| 久久香蕉激情| 黄色 视频免费看| 日韩人妻精品一区2区三区| 好看av亚洲va欧美ⅴa在| 国产一区二区三区综合在线观看| 两个人看的免费小视频| 在线观看免费视频网站a站| 色婷婷av一区二区三区视频| 手机成人av网站| 99在线人妻在线中文字幕 | 亚洲欧美一区二区三区黑人| 日韩欧美在线二视频 | 一级作爱视频免费观看| 久久精品亚洲精品国产色婷小说| 国产xxxxx性猛交| 视频在线观看一区二区三区| xxxhd国产人妻xxx| 波多野结衣av一区二区av| 亚洲欧美一区二区三区黑人| 黄色丝袜av网址大全| 999久久久精品免费观看国产| 亚洲性夜色夜夜综合| 国产成人啪精品午夜网站| 在线观看www视频免费| 99精国产麻豆久久婷婷| 午夜久久久在线观看| 丝袜在线中文字幕| 国产亚洲精品久久久久5区| 国产高清videossex| 大型黄色视频在线免费观看| av网站免费在线观看视频| 黄色a级毛片大全视频| 午夜免费成人在线视频| 国产精品 国内视频| 真人做人爱边吃奶动态| 精品国产一区二区三区四区第35| 又大又爽又粗| 一级毛片高清免费大全| 搡老岳熟女国产| 1024视频免费在线观看| 色婷婷久久久亚洲欧美| 99国产精品一区二区蜜桃av | 一区二区三区精品91| 一二三四在线观看免费中文在| 51午夜福利影视在线观看| 亚洲欧美一区二区三区久久| 久久精品人人爽人人爽视色| 男男h啪啪无遮挡| 美女高潮到喷水免费观看| 看免费av毛片| 五月开心婷婷网| 国产99久久九九免费精品| 亚洲久久久国产精品| 成人影院久久| a级片在线免费高清观看视频| 男女高潮啪啪啪动态图| 宅男免费午夜| 我的亚洲天堂| 欧美激情极品国产一区二区三区| 成人精品一区二区免费| 成在线人永久免费视频| 欧美人与性动交α欧美软件| 亚洲av日韩在线播放| 午夜福利影视在线免费观看| 亚洲欧美一区二区三区黑人| 手机成人av网站| 天天操日日干夜夜撸| 欧美乱色亚洲激情| 亚洲一码二码三码区别大吗| 国产精品99久久99久久久不卡| 亚洲精品中文字幕一二三四区| 老司机深夜福利视频在线观看| 老司机影院毛片| 一区二区三区国产精品乱码| 国产欧美日韩精品亚洲av| xxx96com| 亚洲久久久国产精品| 50天的宝宝边吃奶边哭怎么回事| 黄色视频不卡| netflix在线观看网站| 视频区欧美日本亚洲| 窝窝影院91人妻| 国产一区二区三区综合在线观看| 少妇猛男粗大的猛烈进出视频| 国产亚洲欧美在线一区二区| 91在线观看av| 狠狠狠狠99中文字幕| 又黄又粗又硬又大视频| 狠狠狠狠99中文字幕| 一边摸一边抽搐一进一出视频| 亚洲七黄色美女视频| 岛国在线观看网站| 母亲3免费完整高清在线观看| av免费在线观看网站| 1024视频免费在线观看| 热re99久久精品国产66热6| 久久午夜亚洲精品久久| 天天躁夜夜躁狠狠躁躁| 亚洲免费av在线视频| av中文乱码字幕在线| 亚洲一区高清亚洲精品| 一区福利在线观看| 黄色丝袜av网址大全| 亚洲成人国产一区在线观看| 国产成人av激情在线播放| 日本精品一区二区三区蜜桃| 亚洲色图综合在线观看| 90打野战视频偷拍视频| 免费在线观看视频国产中文字幕亚洲| 久久99一区二区三区| 亚洲一区中文字幕在线| 国产成人影院久久av| 成年版毛片免费区| 久久精品亚洲av国产电影网| 999久久久国产精品视频| 精品无人区乱码1区二区| 飞空精品影院首页| 亚洲五月天丁香| 我的亚洲天堂| 国产成人欧美在线观看 | 亚洲精品一二三| 久久这里只有精品19| 老司机在亚洲福利影院| 露出奶头的视频| 国产精品免费大片| 亚洲少妇的诱惑av| 天天操日日干夜夜撸| а√天堂www在线а√下载 | av线在线观看网站| 在线看a的网站| 成人精品一区二区免费| 国产精品久久久人人做人人爽| 夜夜夜夜夜久久久久| 动漫黄色视频在线观看| 亚洲av熟女| 色播在线永久视频| 国产91精品成人一区二区三区| 成熟少妇高潮喷水视频| 国产男靠女视频免费网站| 一边摸一边抽搐一进一小说 | 精品熟女少妇八av免费久了| 999久久久精品免费观看国产| 亚洲九九香蕉| 夜夜躁狠狠躁天天躁| 亚洲精品乱久久久久久| 国产一区二区三区综合在线观看| 大型黄色视频在线免费观看| 久久ye,这里只有精品| 黄网站色视频无遮挡免费观看| 满18在线观看网站| 99国产精品99久久久久| 亚洲成av片中文字幕在线观看| 亚洲成国产人片在线观看| 黑人巨大精品欧美一区二区蜜桃| 久久久久久久精品吃奶| 两性午夜刺激爽爽歪歪视频在线观看 | 久久影院123| 宅男免费午夜| 国产成人免费观看mmmm| 精品国产亚洲在线| 男人的好看免费观看在线视频 | 国内毛片毛片毛片毛片毛片| 亚洲一卡2卡3卡4卡5卡精品中文| 精品福利观看| 在线天堂中文资源库| 黄色片一级片一级黄色片| av网站在线播放免费| 一边摸一边抽搐一进一出视频| 久久人妻熟女aⅴ| 91九色精品人成在线观看| 大陆偷拍与自拍| 亚洲一区二区三区不卡视频| 亚洲性夜色夜夜综合| 精品国产国语对白av| 成人亚洲精品一区在线观看| 亚洲精品av麻豆狂野| 捣出白浆h1v1| 亚洲情色 制服丝袜| 他把我摸到了高潮在线观看| www.精华液| 国产不卡一卡二| 精品久久蜜臀av无| 色在线成人网| 国产成人免费观看mmmm| 久久精品国产a三级三级三级| 久久精品亚洲av国产电影网| 一二三四在线观看免费中文在| 母亲3免费完整高清在线观看| 亚洲一区中文字幕在线| 交换朋友夫妻互换小说| 两性午夜刺激爽爽歪歪视频在线观看 | 免费高清在线观看日韩| 国产日韩一区二区三区精品不卡| 丰满的人妻完整版| 老司机午夜福利在线观看视频| av线在线观看网站| 波多野结衣一区麻豆| 麻豆成人av在线观看| 久久人妻熟女aⅴ| 欧美日韩av久久| 亚洲第一青青草原| 国产精品永久免费网站| 国产成人系列免费观看| 在线观看日韩欧美| 飞空精品影院首页| 国产色视频综合| 丰满饥渴人妻一区二区三| 国产精品偷伦视频观看了| 国产亚洲精品久久久久久毛片 | 国产乱人伦免费视频| 亚洲精品自拍成人| 欧美性长视频在线观看| 电影成人av| 久久国产精品影院| 亚洲一码二码三码区别大吗| 美国免费a级毛片| 免费高清在线观看日韩| 韩国av一区二区三区四区| 亚洲中文av在线| 老司机福利观看| 乱人伦中国视频| 精品久久蜜臀av无| 国产又爽黄色视频| 欧美成人免费av一区二区三区 | 久久久久久久久久久久大奶| 成年版毛片免费区| 免费人成视频x8x8入口观看| 757午夜福利合集在线观看| 亚洲av日韩在线播放| 变态另类成人亚洲欧美熟女 | 激情视频va一区二区三区| 99riav亚洲国产免费| 国产精品1区2区在线观看. | 91大片在线观看| 久久精品国产清高在天天线| 国产精品永久免费网站| 黄片小视频在线播放| 三级毛片av免费| 精品久久久久久久久久免费视频 | 亚洲欧美日韩另类电影网站| 在线观看免费日韩欧美大片| 女人被躁到高潮嗷嗷叫费观| 女警被强在线播放| 在线视频色国产色| 国产精品免费大片| 国产成人欧美在线观看 | 久久人妻福利社区极品人妻图片| 国产1区2区3区精品| 天堂动漫精品| 怎么达到女性高潮| 热99久久久久精品小说推荐| 多毛熟女@视频| 国产蜜桃级精品一区二区三区 | 悠悠久久av| 一区在线观看完整版| 纯流量卡能插随身wifi吗| 99精品久久久久人妻精品| 美女视频免费永久观看网站| 青草久久国产| 老汉色∧v一级毛片| 国产麻豆69| 国产亚洲精品第一综合不卡| 精品久久蜜臀av无| 欧美乱码精品一区二区三区| 久久久国产精品麻豆| 欧美人与性动交α欧美软件| 一夜夜www| 一边摸一边抽搐一进一出视频| 中文字幕人妻丝袜制服| 国产精品久久久久成人av| 午夜福利,免费看| 最新美女视频免费是黄的| 精品乱码久久久久久99久播| √禁漫天堂资源中文www| 宅男免费午夜| 久久人人爽av亚洲精品天堂| 一二三四社区在线视频社区8| 人妻丰满熟妇av一区二区三区 | 国产精品美女特级片免费视频播放器 | 亚洲少妇的诱惑av| 操美女的视频在线观看| 久久精品熟女亚洲av麻豆精品| 成人18禁在线播放| 欧美日本中文国产一区发布| netflix在线观看网站| 国产成人精品无人区| 国产高清国产精品国产三级| 自线自在国产av| 国产精品二区激情视频| xxx96com| 黑丝袜美女国产一区| 亚洲欧美精品综合一区二区三区| 欧美乱妇无乱码| 中文字幕制服av| 操美女的视频在线观看| 身体一侧抽搐| 久久中文看片网| 人人妻人人添人人爽欧美一区卜| 精品人妻熟女毛片av久久网站| www.精华液| 女人爽到高潮嗷嗷叫在线视频| 狠狠婷婷综合久久久久久88av| 侵犯人妻中文字幕一二三四区| 久久香蕉激情| 欧美精品高潮呻吟av久久| 高清在线国产一区| 19禁男女啪啪无遮挡网站| 国产免费男女视频| 欧美在线一区亚洲| 黑人巨大精品欧美一区二区mp4| 欧美精品一区二区免费开放| 欧美+亚洲+日韩+国产| 成熟少妇高潮喷水视频| 亚洲第一青青草原| 王馨瑶露胸无遮挡在线观看| cao死你这个sao货| 亚洲精品国产区一区二| 夜夜夜夜夜久久久久| 午夜福利一区二区在线看| 亚洲欧美日韩高清在线视频| 五月开心婷婷网| 亚洲国产精品合色在线| 如日韩欧美国产精品一区二区三区|