• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Highly Secured Image Encryption Scheme using Quantum Walk and Chaos

    2022-11-10 02:29:36MuhammadIslamKamranMuazzamKhanSulimanAlsuhibanyYazeedYasinGhadiArshadJameelArifandJawadAhmad
    Computers Materials&Continua 2022年10期

    Muhammad Islam Kamran,Muazzam A.Khan,Suliman A.Alsuhibany,Yazeed Yasin Ghadi,Arshad,Jameel Arif and Jawad Ahmad

    1Department of Computer Science,Quaid-i-Azam University,Islamabad,45320,Pakistan

    2Department of Computer Science,College of Computer,Qassim University,Buraydah,51452,Saudi Arabia

    3Department of Computer Science and Software Engineering,Al Ain University,Abu Dhabi,15551,UAE

    4Institute for Energy and Environment,University of Strathclyde,Glasgow,G1 1XQ,UK

    5School of Computing,Edinburgh Napier University,Edinburgh,EH10 5DT,UK

    Abstract:The use of multimedia data sharing has drastically increased in the past few decades due to the revolutionary improvements in communication technologies such as the 4th generation (4G) and 5th generation (5G) etc.Researchers have proposed many image encryption algorithms based on the classical random walk and chaos theory for sharing an image in a secure way.Instead of the classical random walk,this paper proposes the quantum walk to achieve high image security.Classical random walk exhibits randomness due to the stochastic transitions between states,on the other hand,the quantum walk is more random and achieve randomness due to the superposition,and the interference of the wave functions.The proposed image encryption scheme is evaluated using extensive security metrics such as correlation coefficient,entropy,histogram,time complexity,number of pixels change rate and unified average intensity etc.All experimental results validate the proposed scheme,and it is concluded that the proposed scheme is highly secured,lightweight and computationally efficient.In the proposed scheme,the values of the correlation coefficient,entropy,mean square error (MSE),number of pixels change rate (NPCR),unified average change intensity (UACI) and contrast are 0.0069,7.9970,40.39,99.60%,33.47 and 10.4542 respectively.

    Keywords:Cryptography;chaotic maps;logistic map;quantum walk;security

    1 Introduction

    User privacy has emerged as one of the most serious security problems in recent years,especially when it comes to sharing information via the internet and other publicly available communication channels[1].This is especially true for images,which are now widely used as a source of information,such as medical reports,blueprints,and other sensitive images[2].Cryptography is used to ensure the protection and security of data.The art of dealing with information in such a way that it is not revealed to an unauthorized person is known as cryptography[3].Many techniques have been proposed by researchers to secure such sensitive information in the literature,such as advanced encryption standard(AES) and data encryption standard DES[4].These encryption algorithms are suitable for textual data,but because digital images are known to have a high correlation between consecutive pixels,a small change in one pixel may not harm the overall image.Similarly encrypting an image with a textual encryption algorithm will not completely hide the information need to be secured[5].Therefore,encrypting images and multimedia data with a conventional encryption technique is not appropriate.Multimedia data is significantly greater in size than text data and requires more computational power and time.Traditional techniques have slow encryption and decryption speed resulting in delay in realtime applications like video conferencing and using a text technique to encrypt them will yield a poor result[6].Researchers implemented numerous chaos-based encryption algorithms that proved to be effective considering the challenges with multimedia encryption.

    Chaotic maps are being utilized for image encryption to improve encryption quality by leveraging the chaotic maps’erratic behavior[7,8].Normally,chaotic maps are employed to generate the pseudorandom sequences needed to encrypt images.The logistic map is one of the simplest chaotic maps and is largely used for image encryption because of its faster encryption,low complexity,and higher security,as well as low computation overheads[9].

    The relationship between the plain text image and the cipher image is referred to as diffusion,an encryption algorithm is considered more secure if a small change in the pixels of the original image results in a drastic change in the encrypted image.Confusion,on the other hand,is the relationship between the key and the encrypted image,which means a small change in the key results in a completely different encrypted image[9].Image encryption relies heavily on diffusion and confusion[10].

    S-Boxes (substitution boxes) are vector Boolean functions that are used as a fundamental component of cryptography.The S-Box function used in cryptography is of the form S:FG(B)n →G(B)m where B = {0,1}and when B = {0,1}then GF(2)is the Galois Field(GF)of two elements.The basic idea behind this function is to take m-bits input and convert it to n-bits output.Traditional cryptography includes algorithms like DES and AES,in which the S-Box is the only nonlinear component[11].The strength of an S-Box against attacks is determined by the non-linearity of the S-Box.It is constructed in such a way that it meets Shannon’s confusion property.In the literature,various S-Boxes are utilized to create confusion.

    Image encryption technique based on a two-dimensional chaotic map was proposed by Zhang Han et al.[12].to solve the self-similarity problem.Guan et al.[13]developed a chaos-based picture encryption technique in which Arnold cat map was used to mix pixels and grayscale values were also modified after pixel shuffling to make it resistant to assault.Anwar et al.[14]suggested an image encryption technique based on a chaotic pixel permutation form of Arnold’s cat map.Anees et al.[15]introduced a new chaotic image encryption technique based on the dynamic allocation of multiple S-Boxes,utilizing three S-Boxes for pixel substitution.Sam et al.[16]suggested an image encryption technique based on the logistic map XOR operation with row and column permutation.

    Pisarchik et al.[17]proposed a technique of chaotically coupled maps for image encryption.This algorithm achieved a higher level of security,due to its good diffusion and confusion properties achieved through chaotic mixing.The technique of efficient permutation and bidirectional diffusion through a chaotic system was proposed by Zhang et al.[18].Liu et al.[19]proposed a technique for encrypting color images that used piecewise linear chaotic map (PWLCM) as a key generator;this algorithm has higher UACI and the NPCR values.Liu et al.[20]used Chen’s chaotic map and PWLCM for substitution and permutation of color images.

    Shyamala et al.[21]suggested a novel technique based on a chaotic map to change plain text image statistical features to entirely random distribution.Zeng et al.[22]combined cellular automata and particle swarm optimization to construct hyper-chaotic image encryption technique;the application of cellular automata was for the diffusion of every pixel value.Most substitutionbased image encryption techniques performed well,although they frequently suffer from a high degree of correlation coefficient between the encrypted image pixels.Shafique et al.[23]introduced the dynamic S-Box allocation through the chaotic map technique to address this issue,which reduced correlation between encrypted picture pixels.Alvarez et al.[24]suggested a technique for examining the performance of cryptosystems based on chaotic dynamical systems and demonstrated its superiority over the encryption methods Ahmad et al.[25]proposed a new image encryption technique based on chaos-based diffusion and replacement to reduce autocorrelation in digital data with lower gray values.The substituted image is broken down into blocks of sizeZ×Zpixels,the logistic map generates random values,and those values are put in aZ×Zblock to achieve diffusion.The replaced image is further XOR-ed with the random values supplied by the logistic map to minimize co-relation in the final cipher image.This technique had a smaller impact on encrypted photos when a plain image with a little modified pixel value is used,the correlation coefficient is large.

    Although numerous image encryption techniques have been presented in previous studies,many of them have been proven to be insecure[26-28]due to a variety of drawbacks such as computational cost,limited key space,and reduced resilience to distinct differential attacks.This study attempts to fill in the gap by providing a new chaotic Quantum-substitution encryption scheme for images based on a Logistic Map,Quantum Walks,and AES S-Box.

    In comparison to existing cryptosystems,the proposed scheme results in a highly-secured encrypted image with highly scrambled pixels.In comparison,the proposed scheme has a high level of attack resistance and efficiency.The proposed scheme is sensitive to small changes in the plain image pixel element values,resulting in great resistance to differential attacks.A number of evaluation parameters such as correlation coefficient,entropy,histogram,NPCR,UACI,contrast,are used to evaluate the proposed scheme.

    Based on the existing literature,the authors believe the following to be the novel contributions of this work.

    1.The proposed quantum image encryption scheme is more secure and lightweight.

    2.In the proposed scheme,a slight change in the pixels of plaintext image will result in a completely different cipher image.

    3.The proposed scheme enhances image security and provides high resistance against attacks with less computational power.

    The rest of the paper is organized as follows.The background of the Quantum walk is presented in Section 2.In Section 3,the proposed scheme is elaborated and discussed.Section 4 evaluates the proposed encryption scheme against attacks with the conclusion presented in Section 5.

    2 Quantum Walk

    2.1 Quantum Walk Overview

    Quantum information theory is of high interest for the past few years.The laws of quantum are employed in different aspects[29].The most common aspects are computation and cryptography using quantum[30,31].Quantum computation had tremendous achievements in the last decade.In this paper,the potential applications of a commonly used quantum computation model;the quantum walk is investigated for image encryption.Quantum walk has inbuilt nonlinear chaotic dynamic behavior which helps in generating pseudo-random numbers.There are several chaotic systems available,but due to the periodic nature of their maps,they are unstable,and encryption based on these maps are prone to attacks[32,33].Quantum computation is a fast-emerging field that had several achievements in the past decades.Quantum walk is a universal model of quantum computation developed as a useful tool for solving several problems,like data clustering[34],element distinctness[35],triangle finding[36],and so on.In this paper,the latent application of quantum walk is investigated in image encryption.Again,thanks to the inherent chaotic nonlinear dynamic nature of the quantum walk.A new scheme is constructed for image encryption using quantum walk along with a logistic chaotic map.The quantum walks-based scheme has merits like;unpredictability,pseudo-randomness,sensitivity to initial values,and parameters of the system.At the same time,it also possesses non-periodicity and stability[37].

    2.2 Quantum Walks Chaotic Behavior

    Quantum walks have two main types,discrete and continuous[38],several studies show how the properties of quantum walks differentiate from classical counterparts[39-41].

    The basic discrete quantum walk includes two sub-quantum systems i.e.,coin and walker.A vector in Hilbert space Htis used to denote the state of the walker-coin.Mathematical representation of Htis given in Eq.(1)

    whereHtrepresents the walker,Hc represents the coin.For a line of grid-length one the space Htis spanned by the base states i.e.,{|x〉:x ∈Z}The walker Hp is operated by a coin and in turn the coin is operated in two base states{|↑〉,|↓〉},which take a spin space of half in the previous section.The motion of the walker that is operated with a coin,is through a conditional shift operator.Mathematical representation of the shift operator S is given in Eq.(2)

    The S in above equation transforms the base states such that(| ↓〉?|i〉)to(| ↓〉?|i+1〉)and(| ↑〉 ?|i〉)to(| ↑〉 ?| ↑+i〉).Summation represents the sum of all the possible position.The quantum walk computation system operates such that a coin is flipped,and it is followed by a shift operator.We want to have an unbiased walk i.e.,shifting(|-1〉)with probability(-1/2)and(|1〉)with probability(1/2).For this we use a balanced unitary coin i.e.,Hadamard coin H where the mathematical representation of H is given bellow in Eq.(3).

    To see Hadamard coin is balanced it is quite easy as shown in Eqs.(4)and(5)respectively:

    In classical random walks,the coin state measurement in standard basis gives probability of 1/2 for both|↓〉?|1〉and|↓〉?|-1〉,no correlation left between the positions after this measurement.If we continue quantum walk with such rules and measurements after every iteration,we obtain classical random walk on the line.Fig.1 show this distribution with Galton’s board of this measurement of classical random walk[39].Galton’s board is a device with array of pins at equal distance,allow bead to drop with equal probability of falling left or right.After passing the beads are collected at the bottom.

    Figure 1:Galton board for classical random walk

    In quantum random walks,the intermediate iterations are not measure,but rather the co-relations between different positions are kept letting them interfere with subsequent steps.This interference will result in completely different behavior of quantum walk.

    The total quantum systems can be evaluated by a repetitive sequence of coin flips and the shift operator as S in discrete time(step by step),which is mathematically expressed by Eq.(6):

    The C represents a coin flip and I represent the walker’s identity operator.The final state|ψ〉rafter several(r)steps is mathematically expressed by Eq.(7):

    The probability of locating the position of walker(x)after several(r)steps is expressed by Eq.(8):

    where |ψinitial〉 represents quantum system initial state.To illustrate how quantum random walk departure away from its classical random walk the following example is presented.The walk is evolved without measuring intermediate step,let the initial step be Eq.(9)and the consecutive steps are solved in Eqs.(10)-(12)respectively:

    Tabs.1 and 2 show the classical random walk and quantum random walk respectively,see how atT=3 the values of quantum walks differ from the classical walks.

    Table 1:Classical random walk for T=4

    Table 2:Quantum random walk for T=4

    Fig.2 show probability distribution of quantum walk afterT= 200 steps that is starting with initial step of|↓〉?|0〉.The pattern of quantum random walk is much more complicated as compared to Gaussian distribution in classical random walk

    Figure 2:Quantum random walk,probability distribution for T=200 with initial state|↓〉?|0〉

    3 Proposed Method

    3.1 Proposed Scheme Overview

    The proposed image encryption scheme is filling the gaps of the previously designed encryption algorithms.Quantum walk is used along with a chaotic map to achieve an optimal level of efficiency and security.Quantum walk,chaotic map,substitution,and XOR are the basis of this scheme.The proposed algorithm provides efficient security against different attacks with less consumption of resources.

    3.2 Proposed Scheme

    The flowchart of the proposed encryption scheme is presented in Fig.3.

    3.3 Proposed Scheme Design and Implementation

    For reduction of co-relation in the image and improving overall result,the proposed scheme produced a new encryption algorithm using Quantum walks along with a chaotic map.The image used for the proposed scheme is Lena.jpg with size 256×256.

    The following steps explain the implementation of the proposed encryption scheme:

    1.Take plain-text image RGB.

    2.Convert it into greyscale.

    3.Separate the most significant bits(MSB)and least significant bits(LSB)of each pixel that are just converted into 8-bits greyscale.

    4.Convert the MSB and LSB into their respective decimal values.

    5.Now the MSB decimal value will correspond towards thei-throw position of the S-Box and the LSB decimal value will correspond towards thej-thcolumn position.

    6.The point where thei-thandj-thwill intersect with each other,that value of the S-Box will be replaced with the pixel value of the greyscale image.

    7.There are 3 S-Boxes and one of them will be selected randomly for each pixel value,for selection of the s-box,a chaotic map is used.

    Figure 3:Proposed algorithm flow diagram

    8.For chaotic map,the value ofrshould be between 3.56 to 4 andx0should be between 0 to 1 for random chaotic output.

    9.Now to convert the output produced in step 8 to a finite precision value,multiply the value with 1014.

    10.There are 3 S-Boxes and the number produced by the finite precision is too high,takeMOD3 of the number to make the value between 0-2.Every time it will produce a number randomly between 0,1,2,and we will choose that respective S-Box for the replacement of the pixel value.

    11.An initial level cipher image is produced.

    12.Now convert the initial cipher image inZ×Zblocks,in this case we converted it into 16×16 pixels blocks.

    13.Repeat step 8 and 9

    14.This time convert the big value inMOD256 so that we get values between 0-255 which is greyscale pixels values limit.

    15.Arrange the 256 numbers inZ×Zblock,in the proposed scheme case,16×16 block.

    16.XOR the block produced in step 16 with the first block of cipher image produced in step 12.

    17.XOR the next block with the current block.i.e.,XORK-thblock with(K-th)-1 block,of the image produced in step 16.

    18.This produces a secondary-level cipher image.

    19.Now generate random noise using Quantum walk and produce a noise of 65336(256×256)numbers.i.e.,the total noise number generated must be equal to the number of pixels in a grayscale image.

    20.Convert to the data into the range of grayscale image i.e.,256×256 takeMOD256 so that we get values between 0-255.

    21.Reshape the produced values in toZ×Zblock in the proposed scheme case 256×256.

    22.XOR the values produced in step 22 with the secondary cipher image produced in step 19.

    23.Final level Cipher image is produced,using the Quantum Random Walk computation model.

    Fig.4 show the original image used for encryption.The results of the proposed and state-of-the-art schemes are given below such that:Figs.5a and 5b show Anees et al.[15]result of the encrypted image and histogram,Figs.6a and 6b show Ahmad et al.[6]result of the encrypted image and histogram and finally Figs.7a and 7b shows the proposed scheme results of the encrypted image and histogram.

    Figure 4:Grey scale Lena image(256×256)

    Figure 5:Anees et al.[15]image and histogram

    Figure 6:Ahmad et al.[6]image encryption scheme and histogram results

    4 Evaluation

    An encryption algorithm can be evaluated through statistical security parameters that are presented in various papers[5,42,43].Statistical security evaluation of Ahmad et al.[6],Anees et al.[15],and the proposed scheme are carried out by various parameters such as co-relation,MSE,entropy,contrast analysis,NPCR,and UACI.

    Figure 7:Proposed image encryption scheme and histogram results

    4.1 Correlation Coefficient

    Correlation coefficient is used to find the degree of similarity between two variables.It is widely used in the field of cryptography.It is used to find out how much two variables depend upon each other.To know if the variables are correlated,we check its value.If the value is close to zero it means the variables are highly uncorrelated,on increasing the value,it increases the dependence on each other.In encryption if the value is closer to zero it means the two variables are independent of each other and the encryption scheme is good.Correlation coefficient can be mathematically presented by Eq.(13):

    where Cov is covariance at pixel positionxandy,σxandσyare the values of standard deviation at positionxandy,the mathematical presentation of covariance and standard deviation are given in Eqs.(14)and(15)respectively.

    Correlation coefficient is calculated for the images encrypted by Anees et al.[15],Ahmad et al.[6]and compared to the proposed encryption scheme.The results are shown in the Tab.3.The table shows result for Lena image 256×256.The proposed algorithm shows better result for the correlation coefficient.

    Table 3:Results of correlation coefficient for Lena image

    4.2 Entropy

    Entropy is the rate of uncertainty in a communication system.Elwood Shannon presented this concept which is known by Shannon entropy.Entropy is defined as the measurement of expected values of information in a message.Entropy can be calculated mathematically by Eq.(16)

    where N is the representation of total gray levels andp(mi)is the probability of occurrence of the misymbol.A source will generate 28symbols that contains miwith equal probability,if it is truly random,wherem={m1...m82},i.e.,the entropy values will be equal to 8.

    The result of the simulation is shown in Tab.4.The resulted value by the proposed method shows better results than Ahmad et al[6]and Anees et al.[15].According to the obtained entropy results,the leakage of information in the proposed scheme is negligible and can resist attacks better than Anees et al[15]and Ahmad et al.[6]

    Table 4:Entropy analysis

    4.3 Diffusion Characteristics of Encryption Algorithms

    An algorithm must have the diffusion property to protect multimedia contents from different attacks.Changing a single bit in the key must change the entire cipher text in an unpredictable way.Diffusion is one of the desiring properties of encryption algorithm.

    4.3.1 Avalanche Effect

    Avalanche effect can be measured using mean square error(MSE).This metric is used for checking the diffusion characteristic.MSE can be calculated mathematically by Eq.(17):

    The C1and C2represent two cipher images whose corresponding keys are different by one bit only,M×N represent the cipher text image size,whereas C1(i,j)and C2(i,j)are the pixel values of the images on the indexi,j.higher the value of MSE the better the quality of encryption is,also it means there is sufficient difference between the images.The result of the proposed solution is shown in Tab.5.The proposed algorithm shows better result than Anees et al.[15]and same result as Ahmad et al.[6]The higher values here show higher diffusion property.

    Table 5:Mean square error analysis

    4.3.2 NPCR and UACI

    Checking the variance rate of pixels in encrypted image that is caused by single bit change in the original image,NPCR and UACI are used.The detail mathematical details can be found in[46,47].

    Tabs.6 and 7 show NPCR and UACI values of the algorithm respectively.In both tables the proposed algorithm shows better results than Anees et al.[15]and Ahmad et al.[6]

    Table 6:NPCR analysis

    Table 7:UACI analysis

    4.4 Contrast Analysis

    The difference in intensities of pixels in their neighborhood can be computed by Contrast Analysis.The Goal is that the texture should not be homogeneous.The higher the value of contrast mean the more it is non-homogeneous.Image encryption requires high contrast value.

    Mathematically contrast is computed by Eq.(18):

    p(i,j)represents the number of gray-level co-occurrence matrix(GLCM);a method that is used to calculate the spatial relationship of an image pixel[48].N represent the number of Rows and Columns.Tab.8 show the values of contrast for the proposed scheme and the other techniques the results show that the proposed algorithm contrast values is much greater than Ahmad et al.[6]it also shows that Anees et al.[15]algorithm will still give homogeneous result after encryption.

    Table 8:Contrast analysis

    4.5 Time Analysis

    The considered proposed algorithm has been tested through MATLAB 2018a on a system with 2.0 GHZ CPU,12 GB memory and the size of image is 256×256.Tab.9 show the time required for the Anees et al.[15]and Ahmad et al.[6]it also shows a good value of time by the proposed algorithm.

    Table 9:Time analysis

    5 Conclusion

    In this paper,an efficient encryption scheme is proposed which works on highly auto correlated data for the security enhancement of digital images.Some interesting properties of Quantum Walk,Sboxes and chaotic map are the basis of this proposed scheme.The Values obtained from Quantum walk enhance security of the encryption scheme by adding randomness to it.By using diffusion analysis and statistical analysis,the proposed scheme is compared with other traditional techniques.The Results shows that the use of chaotic map and quantum walk in proposed scheme has advantage over the traditional encryption techniques.Time analysis shows that the proposed scheme is quite faster as compared to traditional techniques.The proposed method will be evaluated against other attacks such as plaintext attacks and ciphertext attacks in future.

    Acknowledgement:The researchers would like to thank the Deanship of Scientific Research,Qassim University for funding the publication of this project.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    三级毛片av免费| 十八禁国产超污无遮挡网站| 国产精品人妻久久久久久| 白带黄色成豆腐渣| 少妇人妻一区二区三区视频| 久久久精品欧美日韩精品| 中文乱码字字幕精品一区二区三区 | 久久久久久久午夜电影| 人妻少妇偷人精品九色| 亚洲欧美一区二区三区国产| 综合色丁香网| 亚洲精品日韩av片在线观看| 国产精品麻豆人妻色哟哟久久 | 天堂√8在线中文| 成年女人看的毛片在线观看| 亚洲成色77777| 蜜臀久久99精品久久宅男| 国产国拍精品亚洲av在线观看| 能在线免费看毛片的网站| 极品教师在线视频| 黄色一级大片看看| 亚洲av成人精品一二三区| 天美传媒精品一区二区| 极品教师在线视频| 三级经典国产精品| 精品国产三级普通话版| 成人午夜高清在线视频| 精品久久久久久成人av| 少妇高潮的动态图| 99久久精品热视频| 亚洲综合精品二区| 午夜精品一区二区三区免费看| 全区人妻精品视频| 亚洲国产精品专区欧美| 男插女下体视频免费在线播放| 亚洲久久久久久中文字幕| 少妇熟女aⅴ在线视频| 日本与韩国留学比较| a级毛片免费高清观看在线播放| 亚洲欧美日韩高清专用| 一级毛片aaaaaa免费看小| 国产极品精品免费视频能看的| 美女国产视频在线观看| 禁无遮挡网站| 免费人成在线观看视频色| 亚洲国产高清在线一区二区三| av免费在线看不卡| 亚洲国产色片| 国产淫语在线视频| 男人舔奶头视频| 男女边吃奶边做爰视频| 少妇熟女欧美另类| 久久久久久久久中文| 国内少妇人妻偷人精品xxx网站| 欧美精品国产亚洲| 久久久国产成人免费| 一级爰片在线观看| 午夜福利高清视频| 我要看日韩黄色一级片| 蜜桃亚洲精品一区二区三区| 成人高潮视频无遮挡免费网站| 亚洲欧美日韩无卡精品| 一区二区三区四区激情视频| 久久精品国产亚洲av天美| 少妇高潮的动态图| 日韩三级伦理在线观看| 日韩亚洲欧美综合| 国产欧美日韩精品一区二区| 蜜臀久久99精品久久宅男| 国产精品精品国产色婷婷| 99热6这里只有精品| 日韩欧美国产在线观看| 99久久精品一区二区三区| 少妇熟女aⅴ在线视频| 国产女主播在线喷水免费视频网站 | 国产私拍福利视频在线观看| 熟女人妻精品中文字幕| 91狼人影院| 国产三级在线视频| 我要搜黄色片| 欧美3d第一页| 大香蕉久久网| 日日撸夜夜添| 人妻少妇偷人精品九色| 国产免费男女视频| 亚洲av男天堂| 国产精品嫩草影院av在线观看| 久久久精品大字幕| 亚洲精品乱码久久久久久按摩| 色综合站精品国产| 亚洲一区高清亚洲精品| 欧美激情国产日韩精品一区| 久久婷婷人人爽人人干人人爱| 亚洲婷婷狠狠爱综合网| 国产免费又黄又爽又色| 久久久午夜欧美精品| 狂野欧美激情性xxxx在线观看| 免费搜索国产男女视频| 久久99热这里只频精品6学生 | 国产精品国产三级国产专区5o | 精品一区二区免费观看| 国产亚洲午夜精品一区二区久久 | 夫妻性生交免费视频一级片| 久久精品国产亚洲av涩爱| 99久久九九国产精品国产免费| 伦精品一区二区三区| 一个人看视频在线观看www免费| 三级男女做爰猛烈吃奶摸视频| 尾随美女入室| 高清视频免费观看一区二区 | 直男gayav资源| 国产精品久久久久久av不卡| 日本三级黄在线观看| 中文字幕免费在线视频6| 高清毛片免费看| 欧美+日韩+精品| 两个人的视频大全免费| 日韩精品有码人妻一区| a级毛片免费高清观看在线播放| 日韩亚洲欧美综合| 级片在线观看| 男人舔奶头视频| 国产精品日韩av在线免费观看| 非洲黑人性xxxx精品又粗又长| 亚洲性久久影院| 精华霜和精华液先用哪个| 国产免费视频播放在线视频 | 国产午夜精品一二区理论片| 3wmmmm亚洲av在线观看| 欧美成人a在线观看| 国产精品麻豆人妻色哟哟久久 | 淫秽高清视频在线观看| 亚洲人成网站在线播| 欧美+日韩+精品| 中文天堂在线官网| 又粗又爽又猛毛片免费看| 美女大奶头视频| 日本午夜av视频| 久久久精品94久久精品| 亚洲欧美清纯卡通| 精品99又大又爽又粗少妇毛片| 亚洲av中文字字幕乱码综合| 亚洲成人av在线免费| 久久国产乱子免费精品| 综合色av麻豆| 亚洲欧美日韩高清专用| 乱码一卡2卡4卡精品| 久久久久国产网址| 日本与韩国留学比较| 成人特级av手机在线观看| 老司机影院成人| 精品人妻一区二区三区麻豆| 99久久人妻综合| 久久久久久久国产电影| 18+在线观看网站| 精品一区二区三区人妻视频| 国产伦精品一区二区三区视频9| 综合色丁香网| 午夜激情福利司机影院| 又黄又爽又刺激的免费视频.| 国产黄片美女视频| 欧美日本亚洲视频在线播放| 国产国拍精品亚洲av在线观看| 一本久久精品| 别揉我奶头 嗯啊视频| 欧美激情国产日韩精品一区| 国产真实伦视频高清在线观看| 亚洲av福利一区| 毛片一级片免费看久久久久| 国产v大片淫在线免费观看| 久久亚洲国产成人精品v| 国产高潮美女av| 99久久精品热视频| 免费搜索国产男女视频| 女的被弄到高潮叫床怎么办| 久久久久久久久久成人| 91久久精品电影网| 美女黄网站色视频| 一边摸一边抽搐一进一小说| 晚上一个人看的免费电影| 日韩成人伦理影院| 国产精品国产三级专区第一集| 长腿黑丝高跟| 一本久久精品| 国产91av在线免费观看| 日韩国内少妇激情av| 2022亚洲国产成人精品| 国产黄a三级三级三级人| 午夜老司机福利剧场| 成人二区视频| 国产一区有黄有色的免费视频 | av黄色大香蕉| 白带黄色成豆腐渣| eeuss影院久久| 亚洲av电影在线观看一区二区三区 | 特级一级黄色大片| 国产午夜精品久久久久久一区二区三区| 国产日韩欧美在线精品| 色综合色国产| 久久精品国产自在天天线| 深爱激情五月婷婷| a级毛色黄片| 欧美日韩国产亚洲二区| 亚洲真实伦在线观看| 国产精品日韩av在线免费观看| 能在线免费观看的黄片| 亚洲在线观看片| 亚洲国产高清在线一区二区三| 美女国产视频在线观看| 一区二区三区乱码不卡18| 国产91av在线免费观看| 亚洲成av人片在线播放无| 成人毛片a级毛片在线播放| 精品午夜福利在线看| 久久国内精品自在自线图片| 国产色爽女视频免费观看| 九九在线视频观看精品| 美女国产视频在线观看| 长腿黑丝高跟| 久久精品熟女亚洲av麻豆精品 | 插阴视频在线观看视频| 欧美成人午夜免费资源| 亚洲成色77777| 国产成人91sexporn| 日韩欧美精品免费久久| 99久久成人亚洲精品观看| 99久久九九国产精品国产免费| 久热久热在线精品观看| 精品久久久久久久久久久久久| 国产伦理片在线播放av一区| 亚洲精品久久久久久婷婷小说 | 国产精品伦人一区二区| 免费看光身美女| 日本午夜av视频| 91精品伊人久久大香线蕉| 精品久久久久久成人av| 看十八女毛片水多多多| 搡女人真爽免费视频火全软件| 国模一区二区三区四区视频| videos熟女内射| 一区二区三区高清视频在线| 国产视频首页在线观看| 性色avwww在线观看| 久久精品国产鲁丝片午夜精品| 国产白丝娇喘喷水9色精品| 男人舔女人下体高潮全视频| 一个人观看的视频www高清免费观看| 午夜福利成人在线免费观看| 网址你懂的国产日韩在线| 我的女老师完整版在线观看| 少妇熟女欧美另类| 国产精品久久久久久久久免| 日韩精品青青久久久久久| videossex国产| 麻豆成人av视频| 国产成年人精品一区二区| 成人二区视频| 2021天堂中文幕一二区在线观| 春色校园在线视频观看| 三级男女做爰猛烈吃奶摸视频| 18禁在线播放成人免费| 久久久久久久久中文| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 有码 亚洲区| 欧美成人午夜免费资源| 亚洲欧美精品专区久久| 成人av在线播放网站| 看免费成人av毛片| 成人国产麻豆网| 免费观看的影片在线观看| 亚洲国产精品久久男人天堂| 小说图片视频综合网站| 日韩欧美三级三区| 日本欧美国产在线视频| 国产精品野战在线观看| 国产精品综合久久久久久久免费| 久久久久久大精品| 欧美3d第一页| 国产免费男女视频| 热99在线观看视频| 亚洲综合精品二区| av专区在线播放| 午夜福利在线在线| 日韩成人av中文字幕在线观看| 午夜精品国产一区二区电影 | 乱人视频在线观看| 91精品国产九色| 波野结衣二区三区在线| 精品一区二区免费观看| 国产精品嫩草影院av在线观看| 亚洲人成网站在线观看播放| 国产av在哪里看| 69人妻影院| 99久久成人亚洲精品观看| 三级国产精品欧美在线观看| 久久久久久久午夜电影| 亚洲精品456在线播放app| 免费av不卡在线播放| 国产高清视频在线观看网站| 少妇熟女欧美另类| 国产精品一区二区三区四区免费观看| 搡女人真爽免费视频火全软件| 大香蕉97超碰在线| 国产伦精品一区二区三区四那| 国产av在哪里看| 91精品伊人久久大香线蕉| 一级爰片在线观看| 欧美又色又爽又黄视频| 久久6这里有精品| 又黄又爽又刺激的免费视频.| 中文字幕av成人在线电影| 超碰av人人做人人爽久久| 内地一区二区视频在线| 日本免费在线观看一区| 国产一区二区在线av高清观看| 免费在线观看成人毛片| 色综合色国产| 亚洲av成人av| 特大巨黑吊av在线直播| 国产毛片a区久久久久| 草草在线视频免费看| 亚洲五月天丁香| 国产日韩欧美在线精品| 永久免费av网站大全| 亚洲国产欧美在线一区| 国产精品美女特级片免费视频播放器| 国产又色又爽无遮挡免| 国内揄拍国产精品人妻在线| 国产片特级美女逼逼视频| 国产免费男女视频| 97超视频在线观看视频| 国产精品久久久久久精品电影小说 | 国产日韩欧美在线精品| 日本-黄色视频高清免费观看| 一级毛片电影观看 | 一个人看视频在线观看www免费| 亚洲欧美日韩无卡精品| 观看美女的网站| 亚洲久久久久久中文字幕| 欧美三级亚洲精品| 18禁在线播放成人免费| 国产久久久一区二区三区| 国产精品久久久久久久电影| 成人特级av手机在线观看| 99久国产av精品| 免费观看在线日韩| 欧美一区二区亚洲| 国产又黄又爽又无遮挡在线| 2022亚洲国产成人精品| 国产精品久久视频播放| 欧美变态另类bdsm刘玥| www日本黄色视频网| 国产老妇伦熟女老妇高清| 亚洲性久久影院| 日韩欧美三级三区| 女人被狂操c到高潮| 亚洲第一区二区三区不卡| 青春草亚洲视频在线观看| 高清毛片免费看| 国产三级中文精品| 精品久久久久久久久av| 一本一本综合久久| 特级一级黄色大片| 亚洲av免费在线观看| 午夜激情欧美在线| av福利片在线观看| 国产精品日韩av在线免费观看| 成年av动漫网址| 寂寞人妻少妇视频99o| 嫩草影院精品99| 又爽又黄a免费视频| 亚洲精品自拍成人| av视频在线观看入口| 直男gayav资源| 男女啪啪激烈高潮av片| 99国产精品一区二区蜜桃av| 青春草视频在线免费观看| 国产 一区精品| 国产老妇伦熟女老妇高清| 成人高潮视频无遮挡免费网站| 天堂√8在线中文| 亚洲人成网站在线播| 又粗又爽又猛毛片免费看| videossex国产| 国产伦一二天堂av在线观看| 亚洲自偷自拍三级| 99久国产av精品| 成年女人看的毛片在线观看| 久久综合国产亚洲精品| 一级爰片在线观看| 亚洲激情五月婷婷啪啪| 精品久久久久久久末码| 亚洲三级黄色毛片| 精品人妻视频免费看| 大香蕉97超碰在线| 精品酒店卫生间| 日韩强制内射视频| 亚洲人成网站高清观看| eeuss影院久久| 99热6这里只有精品| 免费无遮挡裸体视频| av在线播放精品| 九草在线视频观看| 性色avwww在线观看| 亚洲第一区二区三区不卡| 国产亚洲av嫩草精品影院| 天堂中文最新版在线下载 | 婷婷六月久久综合丁香| 国产精品麻豆人妻色哟哟久久 | 国产精品一区www在线观看| 又粗又爽又猛毛片免费看| 日韩一区二区三区影片| 美女大奶头视频| 亚洲人成网站在线播| 美女国产视频在线观看| 精品国内亚洲2022精品成人| 嫩草影院精品99| 一个人看视频在线观看www免费| 欧美zozozo另类| 波野结衣二区三区在线| 亚洲av免费高清在线观看| 国产精品综合久久久久久久免费| 国产视频内射| eeuss影院久久| 亚洲精品一区蜜桃| 高清av免费在线| 国产激情偷乱视频一区二区| 少妇裸体淫交视频免费看高清| 国产精品国产高清国产av| av国产久精品久网站免费入址| 精品熟女少妇av免费看| 午夜激情欧美在线| 五月伊人婷婷丁香| 国产亚洲av片在线观看秒播厂 | 欧美性感艳星| 国产毛片a区久久久久| 日韩欧美精品免费久久| 国产爱豆传媒在线观看| 桃色一区二区三区在线观看| 久久精品夜夜夜夜夜久久蜜豆| 狂野欧美白嫩少妇大欣赏| 国产高清不卡午夜福利| 91久久精品国产一区二区成人| 秋霞伦理黄片| 亚洲伊人久久精品综合 | 麻豆一二三区av精品| 国产成人免费观看mmmm| 亚洲天堂国产精品一区在线| 国产一区二区亚洲精品在线观看| 欧美人与善性xxx| 国产精品久久久久久av不卡| 国内精品美女久久久久久| 午夜激情福利司机影院| 色噜噜av男人的天堂激情| 国产又黄又爽又无遮挡在线| 亚洲国产欧美人成| 国产成人freesex在线| 久久午夜福利片| 精品熟女少妇av免费看| 久久精品国产亚洲网站| 成人国产麻豆网| 亚洲av成人精品一区久久| 男女国产视频网站| 日韩,欧美,国产一区二区三区 | 成人毛片60女人毛片免费| 人妻系列 视频| www日本黄色视频网| 中文在线观看免费www的网站| 国产成人福利小说| 国产精品乱码一区二三区的特点| 午夜老司机福利剧场| 男的添女的下面高潮视频| 久久久久性生活片| 久久久久精品久久久久真实原创| 久久人妻av系列| 国产精品三级大全| 两性午夜刺激爽爽歪歪视频在线观看| 一本久久精品| 国产极品天堂在线| 中文字幕制服av| 久久久久精品久久久久真实原创| 日韩视频在线欧美| 18禁在线播放成人免费| 欧美日韩综合久久久久久| 国产人妻一区二区三区在| 2021天堂中文幕一二区在线观| 久热久热在线精品观看| 在线免费观看的www视频| a级一级毛片免费在线观看| 校园人妻丝袜中文字幕| av.在线天堂| 午夜爱爱视频在线播放| 国产精品综合久久久久久久免费| 麻豆成人午夜福利视频| 国产成人精品久久久久久| 大香蕉97超碰在线| 在线天堂最新版资源| 欧美xxxx黑人xx丫x性爽| 国产黄片美女视频| 天美传媒精品一区二区| 91精品一卡2卡3卡4卡| 淫秽高清视频在线观看| 小蜜桃在线观看免费完整版高清| 亚洲av免费在线观看| 又黄又爽又刺激的免费视频.| 亚洲一级一片aⅴ在线观看| 日韩欧美国产在线观看| 亚洲精品日韩av片在线观看| 国产精品国产三级国产专区5o | 国产成人aa在线观看| 国产爱豆传媒在线观看| 欧美色视频一区免费| 小说图片视频综合网站| 一级毛片我不卡| 色网站视频免费| 国语对白做爰xxxⅹ性视频网站| 精品国产一区二区三区久久久樱花 | 国产亚洲91精品色在线| 天堂网av新在线| 国产成人精品婷婷| 国产淫语在线视频| 亚洲国产欧美人成| 国产成人精品一,二区| 99热网站在线观看| 老女人水多毛片| 97超视频在线观看视频| 真实男女啪啪啪动态图| 国产欧美另类精品又又久久亚洲欧美| 国产成人精品一,二区| 国产精品一区二区三区四区久久| 久久久久久久亚洲中文字幕| 五月玫瑰六月丁香| 免费人成在线观看视频色| 两个人视频免费观看高清| 尾随美女入室| 日本av手机在线免费观看| 久久久久国产网址| 99久久无色码亚洲精品果冻| 一个人看的www免费观看视频| 成人无遮挡网站| 三级男女做爰猛烈吃奶摸视频| 午夜老司机福利剧场| av.在线天堂| 久久久国产成人免费| 久久久亚洲精品成人影院| 在线免费观看不下载黄p国产| 天天躁夜夜躁狠狠久久av| 一本一本综合久久| 欧美精品一区二区大全| 久久精品夜色国产| 婷婷色麻豆天堂久久 | 只有这里有精品99| 蜜桃亚洲精品一区二区三区| 免费播放大片免费观看视频在线观看 | 亚洲精品一区蜜桃| 美女黄网站色视频| 99热精品在线国产| 欧美一区二区国产精品久久精品| 国产成人午夜福利电影在线观看| 免费看美女性在线毛片视频| 亚洲国产精品合色在线| 午夜福利在线观看吧| 在线a可以看的网站| 大香蕉97超碰在线| 久久热精品热| 国产精品国产三级国产专区5o | 免费看av在线观看网站| 国产不卡一卡二| 中文字幕人妻熟人妻熟丝袜美| 免费不卡的大黄色大毛片视频在线观看 | 免费在线观看成人毛片| 深夜a级毛片| 国产91av在线免费观看| 久久久久久伊人网av| 一级爰片在线观看| 国产精品日韩av在线免费观看| 久久亚洲国产成人精品v| 亚洲av熟女| 成人亚洲欧美一区二区av| 亚洲欧美日韩高清专用| 亚洲精品自拍成人| 久久草成人影院| 亚洲怡红院男人天堂| 天堂网av新在线| 狂野欧美激情性xxxx在线观看| 欧美日韩国产亚洲二区| 国产免费视频播放在线视频 | 婷婷色麻豆天堂久久 | 国产伦精品一区二区三区视频9| av在线老鸭窝| 亚洲欧洲日产国产| 欧美激情国产日韩精品一区| 精品久久久久久久末码| 成人毛片60女人毛片免费| a级毛色黄片| 久久精品夜夜夜夜夜久久蜜豆| 男女那种视频在线观看| 亚洲精品国产成人久久av| 亚洲欧美日韩东京热| 亚洲va在线va天堂va国产| 成人毛片a级毛片在线播放| 欧美丝袜亚洲另类| 免费观看a级毛片全部| 99久久成人亚洲精品观看| 天堂√8在线中文| 伦精品一区二区三区| 欧美xxxx黑人xx丫x性爽| 91久久精品电影网| 久久精品国产99精品国产亚洲性色| 亚洲美女视频黄频| 啦啦啦观看免费观看视频高清| 综合色av麻豆| 免费无遮挡裸体视频| 日韩亚洲欧美综合| 中文欧美无线码|