• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Secure and Lightweight Chaos Based Image Encryption Scheme

    2022-11-10 02:28:36FadiaAliKhanJameelAhmedFehaidAlqahtaniSulimanAlsuhibanyFawadAhmedandJawadAhmad
    Computers Materials&Continua 2022年10期

    Fadia Ali Khan,Jameel Ahmed,Fehaid Alqahtani,Suliman A.Alsuhibany,Fawad Ahmed and Jawad Ahmad

    1Department of Electrical Engineering,Riphah International University,Islamabad,44000,Pakistan

    2Department of Computer Science,King Fahad Naval Academy,Al Jubail,35512,Saudi Arabia

    3Department of Computer Science,College of Computer,Qassim University,Buraydah,51452,Saudi Arabia

    4Department of Cyber Security,Pakistan Navy Engineering College,NUST,Karachi 75350,Pakistan

    5School of Computing,Edinburgh Napier University,Edinburgh,EH10 5DT,United Kingdom

    Abstract:In this paper,we present an image encryption scheme based on the multi-stage chaos-based image encryption algorithm.The method works on the principle of confusion and diffusion.The proposed scheme containing both confusion and diffusion modules are highly secure and effective as compared to the existing schemes.Initially,an image (red,green,and blue components)is partitioned into blocks with an equal number of pixels.Each block is then processed with Tinkerbell Chaotic Map(TBCM)to get shuffled pixels and shuffled blocks.Composite Fractal Function (CFF) change the value of pixels of each color component(layer)to obtain a random sequence.Through the obtained random sequence,three layers of plain image are encrypted.Finally,with each encrypted layer,Brownian Particles (BP) are XORed that added an extra layer of security.The experimental tests including a number of statistical tests validated the security of the presented scheme.The results reported in the paper show that the proposed scheme has higher security and is lightweight as compared to state-of-the-art methods proposed in the literature.

    Keywords:Chaos;fractals;fibonacci;tinkerbell chaotic map;confusion;diffusion;brownian motion

    1 Introduction

    With the advancement in technology,a large number of digital images are transmitted through the Internet.Generally speaking,digital images are not transmitted or stored in encrypted form[1].Confidentiality of digital images are important in a number of applications that demands restricted access to image data through secure communication.In symmetric cryptography algorithms,the utilized key during the encryption and decryption processes is always same across both the transmitting and receiving ends[2].As a result,both endpoints need to examine the key exchange protocol for data transmission before initiating the communication.Encrypted keys play a vital role,and the key length determines the strength of any cryptographic scheme[3-5].The Data Encryption Standard (DES),Advanced Encryption Standard (AES),and Blowfish encryption technique are currently available in symmetric schemes.Chaos based cryptography is one of the emerging areas that researchers and cryptographers are using for image encryption purpose.The intention of utilizing chaos-based cryptography facilitates security to sensitive data because of its high sensitivity towards initial conditions,ergodic performance,and unpredictability[6,7].

    Chaos theory has been extensively used in the image encryption method due to its non-periodic nature,susceptibility to initial values,and uncertainty[8,9].Many schemes are designed by a combination of dynamical phenomena of chaos theory and fractals complex patterns.These(fractal patterns)are never ending complicated shapes that appear to be conscience at various scales.These shapes can be generated using the simple mechanism consistently and systematically[10].Fractals are depictions of chaotic environments that resembling with the images of chaos and are controlled by iteration.Nature is comprised of fractal geometry,and different patterns are quite ubiquitous.For example,trees,rivers,beaches,mountains,clouds,seashells,and hurricanes are natural occurrences.A function based on fractals possesses dynamic behavior and thus is highly sensitive to its original state,making it a better choice for constructing a robust cryptographic algorithm[11-14].A fractal image does have a lot of detailed variability at different dimensions with several choices of the key space.Mandelbrot set is a well-known fractal designed by Benoit Mandelbrot in 1979,a remarkably sophisticated and perturbed architecture[11-14].A computer may generate abstraction fractals,such as the Mandelbrot Set,by constantly computing a mathematical equation[14,15].The research contribution of the proposed work are as follow:

    ? This research proposes an encryption algorithm that utilizes multi-stages symmetric encryption algorithm to generate maximum random sequencing.

    ? Multi-stage random sequencing will apply to multimedia data such as images to obtain substitution and permutation-based cryptosystem.

    ? Initial step is based on the diffusion process where pixels are permuted using Tinkerbell chaotic map (TBCM).The latter part is based on the bitwise XOR process utilizing Mandelbrot set of fractals (MSF) and Brownian particles (BPM) to get higher entropy value and maximum randomness.

    ? Several existing schemes are investigated,and results are added next to the proposed scheme using various statistical standard tests.

    2 Research Background

    This section discusses chaos-based multi-stage cryptosystem using Fibonacci series-based permutation process,fractals key generation,and Brownian particles.

    Chaos-based multi-stage cryptosystems can be iterated rapidly because of their ease in functionalities[16].As a result,multi-stage techniques are fast in practical uses,especially for image encryption techniques.Chaotic maps are extremely sensitive to initial conditions with deterministic behavior of pseudo-randomness[17].Confusion and diffusion phenomena are two significant components that are to be considered when designing block cipher.Both contribute to the concealment of plain image structure and a reduction in the statistical dependency of pixels during the image encryption process[18,19].The enhancement of security is added by integrating it with the sequence generated by the Fibonacci series.Moreover,this sequence is XORed with the extracted real values of the Mandelbrot set of fractals and Brownian particles;thus chaos-based multi-stage encryption scheme is achieved.

    2.1 Tinkerbell Chaotic Map(TBCM)

    2.2 Mandelbrot Set of Fractals(MSF)

    Fractals are a combination of numeric sequences encompassing many terms in a complex space.These are image-based reiterative and repetitious geometry patterns.They also have the same degrees of variance in all proportions and act identically when iterated.Benoit Mandelbrot (1924-2010)investigated the complicated pattern of recurring shapes in each other,which later he termed it as Mandelbrot set of fractals.A new composite fractal function (CFF) was proposed by the author in,which combines two separate Mandelbrot set (MS) functions with a single control parameter to produce an interesting feature.The results of the CFF simulation show that the proposed map in has a high initial value sensitivity,a complex structure,a larger chaotic region,and a more complex dynamical behaviour than the standard map.CFF is written as:

    wherez0=q,where points q in the complex plane for which the orbit ofzndoes not tend to infinity are in the set and 0<L<1.

    2.3 Brownian Particles Movement(BPM)

    The most employed stochastic or random process is Brownian particles motion.It is the representation of the movement of a particle or a point in three-dimensional space.Mathematically the movement of particles in three axis is defined as:

    whereasa=wi×2×π,b=xi×π,0 ≤r≤+∞,0 ≤b≤2π,and 0 ≤a≤π

    WhereAandBdenote the horizontal and vertical direction distances,respectively;rdenotes the movement step length;aandbdenote the particle’s movement direction;andwi,xidenote the chaotic sequences produced by chaotic systems.

    2.4 Substitution Box

    An S-Box (Substitution-Box) is a component of symmetric key algorithms that is responsible for substitution operations in cryptography.Shannon’s property of confusion is commonly utilised in block cyphers to disguise the relationship between the key and the message being encrypted.In many circumstances,the S-Boxes are carefully selected in order to provide resistance to cryptanalysis.In work,we have proposed a novel S-Box which is also known as Fadia’s S-Box.In this paper,we are using Fadia’s S-Box to get a highly secured image in the diffusion stage.

    3 The Proposed Image Encryption Scheme

    Flowchart of the proposed encryption scheme is shown in Fig.1 One can see that the proposed scheme has both confusion and diffusion processes using TBCM,CFF and BMP,respectively.

    Figure 1:The proposed encryption flowchart

    Detailed encryption steps are explained as below:

    Designing steps for Multistage Cryptographic Algorithm

    Algorithm:Multistage chaos-based cryptographic algorithm Input:Key Output:Pseudorandom numbers generator(PRNG’s)Goal:Multimedia security(e.g.,images)1.Colored image I having size(512×512×3)pixels is tested for the proposed cryptographic system.2.An image I is divided into three grey layers image e.g.,grey image red(GIR),grey image green(GIG),and grey image blue(GIB).3.Each channel GIR,GIG,and GIBis converted into blocks B1,B2,...BN.The size of each block (B)=16 × 16 cells,whereas each block contains 32 × 32 pixels.4.The process of permutation is applied at confusion stage to get G-PIR, G-PIG and G-PIB where blocks are permuted using the random sequence generated via TBCM.5.Random matrices A and B are obtained via iterating Eq.(6).6.Permute columns and rows of G-PIR, G-PIR and G-PIR using the random values A and B obtained in step 5 to get G-PCIR, G-PCIG,and G-PCIB.

    Algorithm:Continued 6.Generate 1000 × 1000 fractal matrix using CFF and apply zig-zag scan method to obtain random matrix R∧of a size 256 × 256.Apply below operation on the obtained random image:R=Mod (abs(R∧) × 10∧8 Mod (256))7.The permuted image obtained in step 6 is Xored with R to get G-KIR, G-KIG and G-KIB.8.In order to get a higher random ciphertext Fadia’s S-Box is applied on each channel G-KIR, G-KIG and G-KIB.9.To get the final color ciphertext,combine red,green and blue channels to get the final ciphetext C.

    4 Performance Analyses

    The performance analyses of our proposed encryption scheme are discussed in this section.The plaintext and encrypted images are shown in Figs.2 and 3,respectively.It is clear from Fig.3 that the encrypted images conceal original information.Further detailed analyses are based on NIST randomness suite histogram analyses entropy,Adjacent pixels’correlation,pixel difference analyses and sensitivity analyses etc.

    Figure 2:Plaintext images

    Figure 3:Encrypted images

    4.1 NIST Randomness Test

    Through NIST(National Institute of Standards and Technology)tests,one can find the unpredictability and randomness.We analyzed chaos based random sequences using multi-stage cryptographic algorithm using TBCM,CFF and BPM.The sequence of random numbers is produced by transforming the decimal system to binary.The NIST test divides the data into ten categories,each comprising 1,000,000-bit sequences.The randomness of sequence’s using chaos dynamical system and other sequences is validated,and the encryption’s privacy is guaranteed as highlighted in Tab.1.Tab.1 shows that for all tests,the status is a success and it is clear that none of the tests has a failure status.

    Table 1:NIST measures for different standard color images

    4.2 Histogram Analyses(HA)

    Histogram of an image shows the number of occurrence of pixels.In image encryption,the histograms before and after encryption can be seen significantly different and the encrypted histogram should be flat.From the Figs.4,and 5,one can see that the histogram is completely different and the ciphertext histogram is almost flat that is near to ideal values.

    Figure 4:Plaintext car image having three grey channels(size=512×512 dimension)with histogram plots

    4.3 Information Entropy Analyses

    Through the entropy test,one can determine the unpredictability and randomness of an encryption scheme.Entropy is measured by evaluating encrypted images to understand the strength of the proposed system.It is defined as:

    In the above Eq.(9)pxjdepicts an event-based Probability Masses Function (PMF) whereasxjis the input event of the PMF.‘X’shows random number having different outcomes that is referred as n-outcomes.The value obtained should be nearly equal to 8 if all the pixels/numbers have equal probability;therefore,the an ideal scheme should have entropy value 8.Tabs.2 and 3 shows the findings of the presented scheme.The results demonstrate that the proposed system’s aggregate encrypted image results are closer to 8 and is higher than the schemes that are already available as shown in Tab.4,intimating that the scheme effectively combats this assault.

    Figure 5:Encypted images and it’s histogram plots

    Table 2:Entropy of each encrypted grey channel

    Table 3:Entropy of color images

    Table 4:Comparison of entropy values

    4.4 Adjacent Pixels Correlation(APC)

    In terms of a linear relation,correlation measures the similarity or closeness among two or more variables[17].Mathematically APC is illustrated as:

    In the above Eq.(10)sxyshows covariance and standard deviations based on random variablesxandyand is denoted bysx,andsy.The valid range for APC is 0 to 1.In the given range‘0’shows pixels having no similarity while‘1’show full/higher similarity among adjacent pixels.In case of images,neighboring pixels in a plain image are often relatively identical and have a high correlation level.However,in a cipher-text,it’s often desirable to always have a weak relationship among neighboring pixels,which indicates that the adjacent pixels are unique.It is because if there is any resemblance among pixels in an encrypted image,an attacker or cryptologist can readily exploit it by using the neighboring pixel to determine the content of another pixel.Compared to previous results,the suggested method can break the relationship among neighborhood pixels and has least correlation coefficient values.Tab.5 depicts calculated correlation values for five images in various directions such as Horizontal Direction(HD),Vertical Direction(VD),and Diagonal Direction(DD).In Tab.6,the calculated value for the presented scheme is compared to traditional art of schemes.One can confirm from Tabs.5 and 6 that the proposed scheme has low correlation in all directions.Moreover,Fig.6 shows original and ciphertext correlation plot.From Fig.6,it is evident that plaintext image has correlation while encrypted images has no correlation and pixels are dispersed.

    Table 5:Adjacent pixel correlation analysis test for different test images

    Table 6:The comparing of adjacent pixels with existing cryptosystems

    4.5 Pixels Difference Analyses

    Pixel difference analysis compares plain image content and scrambled image data.The difference between pixels in a plain and encrypted image is assessed utilizing two parameters:(i)Mean Square Error(MSE)and the peak to signal to noise ratio is another(PSNR).

    The MSE between the cipher-text image and the plaintext image is measured to assess the proposed algorithm’s efficiency.It shows the average squared disparity among cipher-text image and plaintext image pixels.The below equation can mathematically be expressed as MSE[17]:

    Figure 6:Correlation of pixels for three different direction

    In the Eq.(11),M×Nis the total number of pixels.P(i,j)andC(i,j)is the plain image and cipher image pixels,row is denoted withiand column is denoted withj.For a secure system MSE should be greater.The calculated value for the presented scheme is shown in Tabs.7 and 8.Moreover,calculated value is compared to several existing schemes as shown in Tab.9.

    Table 7:Different layers’MSE and PSNR values

    Table 8:MSE and PSNR values

    PSNR is a metric of the logarithmic (base 10) proportion between value calculated from peak signal and mean square error in image encryption assessment.Mathematically PSNR expresses as:

    In the above Eq.(12) ‘Imax’shows calculated maximum value of the pixel.The calculated value for PSNR should be low for a good encryption scheme.The calculated value for the presented scheme is shown in Tabs.7 and 8.Moreover,calculated value is compared to several existing schemes as shown in Tab.9.

    Table 9:Comparison of MSE values with other schemes

    4.6 Sensitivity Analyses

    Confidentiality of an image can be compromised if the plaintext and the encrypted images are identified.Differential attack has become very popular method for detecting this sort of relationship.The small variances in the plaintext message and corresponding scrambled images are discovered through statistical attacks.If a pattern emerges from these findings,the attacker can understand the relation between the encrypted message and the plain text and easily decrypt the message.As a result,employing an encryption scheme that ensures a radical shift in the cipher-text whenever the plain image is modified that would be beneficial from an encryption perspective.Three components are done to gauge and assess the effectiveness of an encryption scheme in this aspect.These are the unified average changing intensity(UACI)and the number of Changing Pixel Rates(NPCR).For our algorithm,these parameters were examined,and their corresponding values were compared.These fall into the category of strong encryption.Attackers seek to establish a bridge between the plain image and the encrypted image by analyzing how changes in an input affect the consequent variation at the outputs to infer the key.The encrypted image transforms when an attacker attempts to adjust the plaintext message,including altering even one pixel.

    NPCR is a metric that assesses the number of unique pixels in plain and encrypted images in terms of percentage.Higher NPCR results reflect a significant variation between the plain and encrypted images.One can measure the NPCR values for various four encrypted images with a binary number adjustment and matched it to previously published standards.The NPCR comparison table affirmed our proposed technique for mitigating against differential assaults.The two cipher images areC1(i,j)andC2(i,j)are two ciphertext images which are differ by only pixel.Mathematically NPCR is defined as[17]:

    whereD(i,j)is calculated as:

    NPCR should be higher for secure systems.The ideal value is 100%.For the presented scheme calculated values are ≥99.60 which shows better security.

    UACI is metric used to find the intensity level of plain and encrypted image.It is defined as:

    In the above Eq.(15),W×Hshows total dimension of an image.C1(i,j)andC2(i,j)are the two encrypted image which is different by only pixel difference.The calculated results for UACI are shown in Tab.10 for various test images.If the values of NPCR ≥100 and UACI ≥33,it means that the scheme is highly secure.

    Table 10:Grey layer wise NPCR and UACI values of certain standard images

    5 Conclusion

    In this article,we applied the principle of confusion and diffusion for the development of multistage image encryption scheme.Initially,an image(red,green,and blue layers)is converted into blocks with an equal number of pixels where each block is shuffled via TBCM and BPM to get shuffled blocks and shuffled pixels,respectively.In the proposed scheme,CFF to get highly random sequence and used in XOR operation.Using the obtained random sequencing,three layers of permuted images are XORed with random values obtained from MSF.Finally,the final ciphetext is obtained using Fadia’s substitution box.A number of experiments are used to assess the robustness of the proposed scheme and to authenticate the randomness of the newly proposed scheme.These tests include NIST-800-22 and other statistical tests that validated the strength of multi-stage scheme.In future,the aim is to extend this research for audio and video content encryption.Other multimedia data,such as audio and video,will be investigated and analysed using the suggested encryption technique.

    Acknowledgement:The researchers would like to thank the Deanship of Scientific Research,Qassim University for funding the publication of this project.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    两性午夜刺激爽爽歪歪视频在线观看 | 久久久精品免费免费高清| 精品国产超薄肉色丝袜足j| 国产在线精品亚洲第一网站| 搡老乐熟女国产| 久久久久久久久免费视频了| 十八禁高潮呻吟视频| 99精品在免费线老司机午夜| 国产人伦9x9x在线观看| 新久久久久国产一级毛片| 久久婷婷成人综合色麻豆| 激情在线观看视频在线高清 | 精品免费久久久久久久清纯 | 国产91精品成人一区二区三区 | 成年人黄色毛片网站| 男女高潮啪啪啪动态图| 亚洲七黄色美女视频| 性色av乱码一区二区三区2| 正在播放国产对白刺激| 亚洲精品自拍成人| 一级,二级,三级黄色视频| 久久精品国产a三级三级三级| 国产精品 欧美亚洲| 成人国产av品久久久| 国产一区二区在线观看av| 亚洲黑人精品在线| 90打野战视频偷拍视频| 视频区欧美日本亚洲| 国产在线视频一区二区| av不卡在线播放| 免费av中文字幕在线| 亚洲人成电影免费在线| 在线天堂中文资源库| 精品少妇黑人巨大在线播放| av线在线观看网站| 国产视频一区二区在线看| 国产精品1区2区在线观看. | 性高湖久久久久久久久免费观看| 捣出白浆h1v1| 无限看片的www在线观看| 人妻久久中文字幕网| 久久久国产欧美日韩av| 久久亚洲精品不卡| 中文亚洲av片在线观看爽 | 久久人妻av系列| 亚洲成a人片在线一区二区| 18在线观看网站| 大陆偷拍与自拍| 免费高清在线观看日韩| 黄色视频不卡| www.999成人在线观看| 精品一区二区三区视频在线观看免费 | 91麻豆av在线| 十八禁人妻一区二区| 国产免费福利视频在线观看| 多毛熟女@视频| 亚洲人成77777在线视频| 国产在线免费精品| 亚洲精品粉嫩美女一区| 国产精品九九99| 国产精品九九99| 嫩草影视91久久| 最近最新中文字幕大全电影3 | 大片电影免费在线观看免费| 黄色片一级片一级黄色片| 久久久久精品人妻al黑| 成年动漫av网址| 午夜福利欧美成人| 国产主播在线观看一区二区| 一个人免费看片子| 老汉色∧v一级毛片| 亚洲熟女毛片儿| 激情视频va一区二区三区| 精品少妇一区二区三区视频日本电影| 日本av免费视频播放| 51午夜福利影视在线观看| 国产亚洲精品第一综合不卡| 国产av国产精品国产| 欧美日韩福利视频一区二区| 性色av乱码一区二区三区2| 国产成人系列免费观看| 国产精品影院久久| 老熟妇乱子伦视频在线观看| 在线观看舔阴道视频| 国产老妇伦熟女老妇高清| av电影中文网址| 午夜福利影视在线免费观看| 欧美人与性动交α欧美软件| 国产亚洲精品一区二区www | 50天的宝宝边吃奶边哭怎么回事| 多毛熟女@视频| 国产成人影院久久av| 亚洲av电影在线进入| 国产日韩欧美亚洲二区| 精品第一国产精品| 久久亚洲真实| 久久精品人人爽人人爽视色| 两个人免费观看高清视频| 自线自在国产av| 另类精品久久| 女同久久另类99精品国产91| 在线 av 中文字幕| 国产成+人综合+亚洲专区| 久久人妻av系列| 在线播放国产精品三级| 无人区码免费观看不卡 | netflix在线观看网站| 亚洲少妇的诱惑av| 日韩一卡2卡3卡4卡2021年| 亚洲一码二码三码区别大吗| 亚洲av欧美aⅴ国产| 桃红色精品国产亚洲av| 亚洲九九香蕉| 国产有黄有色有爽视频| 91麻豆精品激情在线观看国产 | 亚洲国产精品一区二区三区在线| 久久精品aⅴ一区二区三区四区| 国产成人系列免费观看| 欧美黑人精品巨大| 国产日韩欧美在线精品| 午夜福利一区二区在线看| 亚洲,欧美精品.| 亚洲熟妇熟女久久| 男女之事视频高清在线观看| 国产精品偷伦视频观看了| 操出白浆在线播放| 欧美一级毛片孕妇| 国产精品免费大片| 老司机福利观看| 黄片播放在线免费| 久久99热这里只频精品6学生| 亚洲av成人一区二区三| 在线 av 中文字幕| 亚洲精品在线美女| 国产高清国产精品国产三级| 老司机福利观看| 99热国产这里只有精品6| 天天添夜夜摸| 一二三四社区在线视频社区8| av视频免费观看在线观看| 久久婷婷成人综合色麻豆| 老熟妇乱子伦视频在线观看| av电影中文网址| 一本久久精品| 精品久久久精品久久久| 久久久久网色| 亚洲色图av天堂| 伊人久久大香线蕉亚洲五| 在线观看一区二区三区激情| 欧美黑人精品巨大| 人人妻人人爽人人添夜夜欢视频| 啦啦啦 在线观看视频| 免费在线观看完整版高清| av视频免费观看在线观看| 美女午夜性视频免费| 十八禁高潮呻吟视频| 丝袜在线中文字幕| 丰满饥渴人妻一区二区三| 九色亚洲精品在线播放| 黄色成人免费大全| 亚洲成人免费电影在线观看| 精品国产超薄肉色丝袜足j| 欧美亚洲日本最大视频资源| 国产精品久久久久久精品古装| 日韩中文字幕欧美一区二区| 麻豆成人av在线观看| 天堂俺去俺来也www色官网| 99国产精品99久久久久| 久久ye,这里只有精品| 国产精品免费大片| 一级毛片电影观看| 午夜日韩欧美国产| 亚洲专区国产一区二区| 欧美+亚洲+日韩+国产| 午夜福利一区二区在线看| 国产一区二区三区在线臀色熟女 | 成人手机av| 日韩人妻精品一区2区三区| 成人手机av| 精品一区二区三区四区五区乱码| 夜夜夜夜夜久久久久| 正在播放国产对白刺激| 99精品在免费线老司机午夜| 欧美成人午夜精品| 精品亚洲成a人片在线观看| 另类亚洲欧美激情| 国产一区二区激情短视频| 纵有疾风起免费观看全集完整版| 超色免费av| 久久久久国产一级毛片高清牌| 久久99热这里只频精品6学生| 亚洲自偷自拍图片 自拍| 国产日韩欧美视频二区| tube8黄色片| 久久久水蜜桃国产精品网| 精品一区二区三卡| 国产xxxxx性猛交| 丝瓜视频免费看黄片| 国产亚洲av高清不卡| 国产精品99久久99久久久不卡| 成人精品一区二区免费| 久久久国产一区二区| 亚洲成人免费电影在线观看| 精品第一国产精品| a在线观看视频网站| 国产免费福利视频在线观看| 国产精品一区二区在线观看99| av视频免费观看在线观看| 一个人免费看片子| 老熟女久久久| 老司机靠b影院| 精品少妇一区二区三区视频日本电影| 亚洲三区欧美一区| 女性被躁到高潮视频| 亚洲va日本ⅴa欧美va伊人久久| 王馨瑶露胸无遮挡在线观看| 亚洲情色 制服丝袜| 大片免费播放器 马上看| 色老头精品视频在线观看| 亚洲三区欧美一区| 婷婷成人精品国产| 久久久久久人人人人人| 人人妻人人澡人人看| 欧美日韩亚洲国产一区二区在线观看 | 国产成人免费无遮挡视频| 久久影院123| 国产av国产精品国产| 欧美性长视频在线观看| 一二三四在线观看免费中文在| 12—13女人毛片做爰片一| 国产日韩欧美亚洲二区| 在线永久观看黄色视频| 国产精品二区激情视频| 国产一区二区三区在线臀色熟女 | 国产精品欧美亚洲77777| 色老头精品视频在线观看| 99香蕉大伊视频| 黄色丝袜av网址大全| 久久精品亚洲熟妇少妇任你| 午夜两性在线视频| 精品人妻在线不人妻| 精品免费久久久久久久清纯 | 久久天堂一区二区三区四区| 精品一区二区三卡| 欧美激情极品国产一区二区三区| 国产精品一区二区在线观看99| 亚洲五月婷婷丁香| 最近最新中文字幕大全电影3 | 久久人人97超碰香蕉20202| 国产av一区二区精品久久| 国产有黄有色有爽视频| 国产精品美女特级片免费视频播放器 | 成人av一区二区三区在线看| 国产精品久久久人人做人人爽| 欧美精品人与动牲交sv欧美| 欧美黄色淫秽网站| 成人精品一区二区免费| 亚洲精品中文字幕在线视频| h视频一区二区三区| 国产黄色免费在线视频| 老司机午夜福利在线观看视频 | 国产99久久九九免费精品| a级毛片黄视频| 五月天丁香电影| 麻豆成人av在线观看| 久热爱精品视频在线9| 日韩一区二区三区影片| 在线亚洲精品国产二区图片欧美| 日韩 欧美 亚洲 中文字幕| 国产在线视频一区二区| 国产精品久久久人人做人人爽| 日韩欧美一区二区三区在线观看 | 国产成人精品久久二区二区91| 下体分泌物呈黄色| 一级毛片女人18水好多| 精品国产国语对白av| 精品久久久精品久久久| 国产亚洲精品一区二区www | 久久中文字幕人妻熟女| 后天国语完整版免费观看| 精品乱码久久久久久99久播| 久久人妻熟女aⅴ| 99热国产这里只有精品6| 久久午夜综合久久蜜桃| 欧美性长视频在线观看| 一个人免费看片子| 久久国产精品人妻蜜桃| 精品第一国产精品| 黄色片一级片一级黄色片| 国产精品秋霞免费鲁丝片| 正在播放国产对白刺激| 侵犯人妻中文字幕一二三四区| 免费黄频网站在线观看国产| 国产亚洲精品久久久久5区| 777米奇影视久久| 两性午夜刺激爽爽歪歪视频在线观看 | 在线观看免费高清a一片| 国产精品亚洲一级av第二区| 欧美在线黄色| 人人妻人人澡人人爽人人夜夜| netflix在线观看网站| 桃花免费在线播放| 大片电影免费在线观看免费| 水蜜桃什么品种好| 欧美变态另类bdsm刘玥| 国产黄频视频在线观看| 久久国产精品人妻蜜桃| 亚洲国产成人一精品久久久| 亚洲第一青青草原| 国产黄色免费在线视频| 日日夜夜操网爽| videos熟女内射| 99国产精品一区二区蜜桃av | 别揉我奶头~嗯~啊~动态视频| 精品国产乱子伦一区二区三区| 悠悠久久av| 老司机影院毛片| 亚洲avbb在线观看| 国产精品99久久99久久久不卡| 欧美激情 高清一区二区三区| 亚洲男人天堂网一区| 久久天躁狠狠躁夜夜2o2o| 成年人免费黄色播放视频| 亚洲av日韩精品久久久久久密| 丝袜美腿诱惑在线| 国产熟女午夜一区二区三区| 夫妻午夜视频| 在线 av 中文字幕| 欧美av亚洲av综合av国产av| 俄罗斯特黄特色一大片| 无人区码免费观看不卡 | 99re6热这里在线精品视频| 欧美人与性动交α欧美精品济南到| 精品国内亚洲2022精品成人 | 又黄又粗又硬又大视频| 国产在线观看jvid| 国产av精品麻豆| 人妻久久中文字幕网| 丰满饥渴人妻一区二区三| 五月开心婷婷网| 久久久久视频综合| 国产精品一区二区精品视频观看| 国产伦理片在线播放av一区| 久久亚洲真实| 精品欧美一区二区三区在线| 丰满饥渴人妻一区二区三| 视频区欧美日本亚洲| 麻豆国产av国片精品| 亚洲精品久久午夜乱码| 在线观看www视频免费| 天天影视国产精品| 色94色欧美一区二区| 免费在线观看黄色视频的| 精品少妇久久久久久888优播| 另类精品久久| 久久av网站| 久久精品亚洲av国产电影网| 久久ye,这里只有精品| 精品少妇一区二区三区视频日本电影| 国产精品久久久人人做人人爽| 午夜福利在线观看吧| 国产人伦9x9x在线观看| 丝袜在线中文字幕| 国产高清激情床上av| 男女边摸边吃奶| 两个人看的免费小视频| 建设人人有责人人尽责人人享有的| 日韩 欧美 亚洲 中文字幕| 肉色欧美久久久久久久蜜桃| 久久亚洲真实| 欧美久久黑人一区二区| 悠悠久久av| 日韩欧美免费精品| 两性午夜刺激爽爽歪歪视频在线观看 | www.999成人在线观看| tocl精华| 香蕉久久夜色| 国产精品香港三级国产av潘金莲| 国产成人影院久久av| 精品少妇内射三级| 国产精品香港三级国产av潘金莲| 久久精品成人免费网站| 在线播放国产精品三级| 三上悠亚av全集在线观看| 久热这里只有精品99| 欧美激情 高清一区二区三区| 国产精品美女特级片免费视频播放器 | av视频免费观看在线观看| 国产精品一区二区在线不卡| 99国产精品99久久久久| 老司机深夜福利视频在线观看| 老司机在亚洲福利影院| 亚洲午夜精品一区,二区,三区| 丁香六月天网| 少妇被粗大的猛进出69影院| 国产有黄有色有爽视频| 一本色道久久久久久精品综合| 国产亚洲精品一区二区www | 精品一区二区三区视频在线观看免费 | 在线观看免费视频日本深夜| 欧美精品高潮呻吟av久久| 天堂中文最新版在线下载| 久久久精品国产亚洲av高清涩受| 国产成人精品久久二区二区免费| 搡老岳熟女国产| 国产精品一区二区在线观看99| 午夜老司机福利片| 欧美日韩国产mv在线观看视频| 亚洲 国产 在线| 精品国产一区二区三区久久久樱花| 日韩大片免费观看网站| 色婷婷久久久亚洲欧美| 国产淫语在线视频| 视频在线观看一区二区三区| 正在播放国产对白刺激| 在线观看免费视频日本深夜| 精品少妇黑人巨大在线播放| 99精品久久久久人妻精品| 丰满迷人的少妇在线观看| 91字幕亚洲| 少妇裸体淫交视频免费看高清 | 久久人人97超碰香蕉20202| 国产在线免费精品| av福利片在线| 91九色精品人成在线观看| 日本欧美视频一区| 久久久久久久久久久久大奶| 久久影院123| 91字幕亚洲| 天堂中文最新版在线下载| 欧美国产精品一级二级三级| 亚洲成人免费电影在线观看| 国产午夜精品久久久久久| 最新在线观看一区二区三区| 国产精品久久久久久精品电影小说| 国产精品免费一区二区三区在线 | 一级毛片精品| 国产日韩欧美亚洲二区| 国产福利在线免费观看视频| 一级毛片电影观看| 999久久久精品免费观看国产| 成人免费观看视频高清| 亚洲第一欧美日韩一区二区三区 | 亚洲av日韩在线播放| 国产亚洲欧美精品永久| 亚洲五月色婷婷综合| 十八禁网站免费在线| 99久久国产精品久久久| 在线十欧美十亚洲十日本专区| 亚洲视频免费观看视频| 国产麻豆69| 久久精品亚洲熟妇少妇任你| 亚洲成人国产一区在线观看| 欧美人与性动交α欧美精品济南到| 欧美日韩av久久| 国产男女超爽视频在线观看| 自拍欧美九色日韩亚洲蝌蚪91| 精品福利观看| 老汉色av国产亚洲站长工具| 久久久久久亚洲精品国产蜜桃av| 一级a爱视频在线免费观看| 1024香蕉在线观看| 99久久精品国产亚洲精品| 激情在线观看视频在线高清 | 亚洲成人国产一区在线观看| 亚洲免费av在线视频| 在线观看免费视频日本深夜| 亚洲中文av在线| 欧美另类亚洲清纯唯美| 丝袜在线中文字幕| 久久人妻熟女aⅴ| 淫妇啪啪啪对白视频| 国产成人系列免费观看| 久久九九热精品免费| 国产在视频线精品| 一进一出好大好爽视频| aaaaa片日本免费| 又紧又爽又黄一区二区| 女性生殖器流出的白浆| 国产精品欧美亚洲77777| 伊人久久大香线蕉亚洲五| 国产精品久久久久久人妻精品电影 | 午夜福利视频精品| 啦啦啦免费观看视频1| 91国产中文字幕| 高清欧美精品videossex| h视频一区二区三区| 三级毛片av免费| 国产亚洲av高清不卡| 久久中文字幕一级| 久久热在线av| 久久久国产欧美日韩av| 一区在线观看完整版| 757午夜福利合集在线观看| 99re6热这里在线精品视频| 最新在线观看一区二区三区| 国产精品1区2区在线观看. | 国产一区二区三区视频了| 最近最新免费中文字幕在线| 我要看黄色一级片免费的| 午夜福利在线免费观看网站| 91老司机精品| 午夜福利一区二区在线看| 成年女人毛片免费观看观看9 | 一级毛片精品| 人人妻人人爽人人添夜夜欢视频| 国产精品 欧美亚洲| 亚洲第一av免费看| 日本撒尿小便嘘嘘汇集6| 妹子高潮喷水视频| 视频在线观看一区二区三区| 下体分泌物呈黄色| 性色av乱码一区二区三区2| 啦啦啦视频在线资源免费观看| 另类亚洲欧美激情| 亚洲精品国产一区二区精华液| 免费少妇av软件| e午夜精品久久久久久久| 黄色 视频免费看| 中文欧美无线码| 一区二区三区激情视频| 欧美精品人与动牲交sv欧美| 99国产精品一区二区三区| 90打野战视频偷拍视频| 50天的宝宝边吃奶边哭怎么回事| 久久精品aⅴ一区二区三区四区| 99热网站在线观看| 热re99久久精品国产66热6| 久久久久久久久久久久大奶| 欧美激情久久久久久爽电影 | 久久精品成人免费网站| 成年版毛片免费区| 黄频高清免费视频| 丰满少妇做爰视频| 午夜福利免费观看在线| 久久99热这里只频精品6学生| 久久精品国产亚洲av香蕉五月 | 亚洲成国产人片在线观看| 久久久久久久国产电影| 黄片大片在线免费观看| 一级a爱视频在线免费观看| 高清黄色对白视频在线免费看| 老司机深夜福利视频在线观看| 久久国产精品大桥未久av| 99国产精品99久久久久| 国产欧美日韩精品亚洲av| 在线播放国产精品三级| 亚洲美女黄片视频| 丝袜人妻中文字幕| 亚洲av成人一区二区三| 国产欧美日韩精品亚洲av| 在线av久久热| 国产一区二区三区视频了| 久久精品亚洲av国产电影网| 激情视频va一区二区三区| 免费看十八禁软件| a级毛片黄视频| 人成视频在线观看免费观看| 亚洲专区字幕在线| 亚洲九九香蕉| 一本综合久久免费| 亚洲性夜色夜夜综合| 真人做人爱边吃奶动态| 久久久国产精品麻豆| 美女福利国产在线| 欧美日韩中文字幕国产精品一区二区三区 | 男女床上黄色一级片免费看| av天堂久久9| 亚洲第一青青草原| 色视频在线一区二区三区| 亚洲午夜精品一区,二区,三区| 国产精品一区二区在线观看99| 在线观看免费高清a一片| 国产在线免费精品| 精品少妇内射三级| 女人久久www免费人成看片| 亚洲精品av麻豆狂野| 色94色欧美一区二区| 窝窝影院91人妻| 成人亚洲精品一区在线观看| 精品国内亚洲2022精品成人 | 看免费av毛片| 亚洲久久久国产精品| 久久热在线av| 亚洲成av片中文字幕在线观看| 我的亚洲天堂| 中文字幕人妻丝袜一区二区| 亚洲欧美日韩高清在线视频 | 91麻豆av在线| 国产一区有黄有色的免费视频| 桃花免费在线播放| 精品国产一区二区三区四区第35| 欧美一级毛片孕妇| 少妇精品久久久久久久| 人妻久久中文字幕网| av欧美777| 多毛熟女@视频| 亚洲精品一二三| 黑人欧美特级aaaaaa片| 亚洲精品美女久久久久99蜜臀| 久久人人爽av亚洲精品天堂| www.999成人在线观看| 久久青草综合色| 亚洲精品国产精品久久久不卡| 色播在线永久视频| 国产av精品麻豆| 夜夜骑夜夜射夜夜干| 亚洲av第一区精品v没综合| av免费在线观看网站| 一边摸一边抽搐一进一小说 | 亚洲精品在线美女| 久久九九热精品免费| 日韩欧美国产一区二区入口| 五月开心婷婷网| 色综合婷婷激情|