• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Privacy Preserving Image Encryption with Deep Learning Based IoT Healthcare Applications

    2022-11-10 02:30:42MohammadAlamgeerSaudAlotaibiShahaAlOtaibiNazikAlturkiAnwerMustafaHilalAbdelwahedMotwakelIshfaqYaseenandMohamedEldesouki
    Computers Materials&Continua 2022年10期

    Mohammad Alamgeer,Saud S.Alotaibi,Shaha Al-Otaibi,Nazik Alturki,Anwer Mustafa Hilal,Abdelwahed Motwakel,Ishfaq Yaseen and Mohamed I.Eldesouki

    1Department of Information Systems,College of Science&Art at Mahayil,King Khalid University,Muhayel Aseer,62529,Saudi Arabia

    2Department of Information Systems,College of Computing and Information System,Umm Al-Qura University,Saudi Arabia

    3Department of Information Systems,College of Computer and Information Sciences,Princess Nourah Bint Abdulrahman University,Riyadh,11671,Saudi Arabia

    4Department of Computer and Self Development,Preparatory Year Deanship,Prince Sattam bin Abdulaziz University,Al-Kharj,16278,Saudi Arabia

    5Department of Information System,College of Computer Engineering and Sciences,Prince Sattam bin Abdulaziz University,Al-Kharj,16278,Saudi Arabia

    Abstract:Latest developments in computing and communication technologies are enabled the design of connected healthcare system which are mainly based on IoT and Edge technologies.Blockchain,data encryption,and deep learning(DL)models can be utilized to design efficient security solutions for IoT healthcare applications.In this aspect,this article introduces a Blockchain with privacy preserving image encryption and optimal deep learning(BPPIEODL)technique for IoT healthcare applications.The proposed BPPIE-ODL technique intends to securely transmit the encrypted medical images captured by IoT devices and performs classification process at the cloud server.The proposed BPPIE-ODL technique encompasses the design of dragonfly algorithm(DFA) with signcryption technique to encrypt the medical images captured by the IoT devices.Besides,blockchain(BC)can be utilized as a distributed data saving approach for generating a ledger,which permits access to the users and prevents third party’s access to encrypted data.In addition,the classification process includes SqueezeNet based feature extraction,softmax classifier(SMC),and Nadam based hyperparameter optimizer.The usage of Nadam model helps to optimally regulate the hyperparameters of the SqueezeNet architecture.For examining the enhanced encryption as well as classification performance of the BPPIE-ODL technique,a comprehensive experimental analysis is carried out.The simulation outcomes demonstrate the significant performance of the BPPIE-ODL technique on the other techniques with increased precision and accuracy of 0.9551 and 0.9813 respectively.

    Keywords:Internet of things;healthcare;decision making;privacy preserving;blockchain;deep learning

    1 Introduction

    Latest advances in communication and computing techniques are allowed the development of connected health care systems that depends mainly on Edge and IoT techniques[1].The medical field is globally emerging as advanced digital solution is being executed for accommodating the rise in health care cost when preserving care quality and sending access to each potential health care service.This field is under great pressure to offer high-quality services to patients and regulate expenses[2].Extensive information is presented in the health care sector in the form of therapeutic research,medical analysis,clinical preliminaries,complex billing,patient medical records,and so on.This information is a useful resource for wide-ranging medical analysis,research,and patients nowadays are concerned with health care data privacy and confidentiality.In addition,unauthorized access to health care information results in privacy and security problems.Further,continued progress has been made in IoT,resultant in an urgent need to analyse current IoT capabilities and requirements.EHealth is a stimulating IoT application[3].For handling information with other organizations,this architecture demands secured data transmission.Healthcare information is extremely private and data transmission might increase the exposure possibility.Additionally,the present scheme of data transmission employs a centralized framework that needs centralized trust[4,5].

    Encryption of sensitive data is the essential and primary approach in cryptography regarding patients’historical information.Considering the digital health care scheme as the environment for receiving and transferring patients’medical data[6].The transmission of medical information to authorized users is a crucial requirement of effective health care.But the current system lacks security techniques since majority of these cases lack appropriate access control and encryption method.Most significantly,blockchain(BC)offers a decentralized network and peer-to-peer systems.A global forecasting estimate that the open direction is available to utilize BC technique for managing IoT device in healthcare system[7].BC-assisted IoT devices could assist patient privacy and recover ownership of healthcare data by leveraging its property including decentralization,persistence,anonymity,and auditability[8].BC technique in the medical sector is in its earlier developmental stage,and for its effective operation,there are multiple challenges ahead.BC technique offers strength against data exposure and failure.The BC is a communal data structure accountable to store each transaction detail[9,10].

    This article introduces a Blockchain with privacy preserving image encryption and optimal deep learning (BPPIE-ODL) technique for IoT healthcare applications.The proposed BPPIE-ODL technique encompasses the design of dragonfly algorithm (DFA) with signcryption technique to encrypt the medical images captured by the IoT devices.Moreover,BC can be utilized as a distributed data saving approach for generating a ledger,which permits access to the users and prevents third party’s access to encrypted data.Furthermore,the classification process includes SqueezeNet based feature extraction,softmax classifier(SMC),and Nadam based hyperparameter optimizer.In order to investigate the improved encryption as well as classification performance of the BPPIE-ODL technique,a comprehensive experimental analysis is carried out.

    2 Literature Review

    Dwivedi et al.[11]presented architecture of adapted BC model applicable for IoT devices that relies on distributed nature and security and privacy properties of the system.This further security and privacy property in this method depend on innovative cryptographic primitive.In[12],BC as a distributed database was presented with a homomorphic encryption approach for ensuring a secured search and keywords-based access to database.In addition,the presented method offers a secured key revocation method and update different policy consequently.Consequently,a secured patient medical data access system is developed,that incorporates trust chain and BC to satisfy the security and efficiency problems in the existing systems.Hamza et al.[1]presented a privacy preserving chaos-based encryption cryptosystem for protecting patient privacy.The presented cryptosystem could defend patient image in compromised broker.Particularly,it can be proposed a fast probabilistic cryptosystem for securing healthcare key frame which are extracting in wireless capsule endoscopy process with a prioritization technique.

    Alassaf and Gutub[13]proposed a comparative study of efficiency metrics of three trusted candidate encryption methods such as SIMON,AES,and SPECK,that is compared and simulated in detail for distinguishing has the optimal performance that designated for a healthcare application.This encryption algorithm is evaluated and implemented regarding the power consumption,execution time,speed,and memory occupation.In[14],a privacy-preserving DSSE system for IIoTH has been introduced.An initial DSSE system developed to personal health record(PHR)dataset with forwarding security.Once the user implements searching operation,he/she gets corresponding attribute values rather than the entire files.

    Denis and Madhubala[15]present a hybridization of data encryption method for sheltering the diagnoses information in healthcare image.The projected method was designed by integrating 2DDWT-2 L or 2D-DWT-1 L steganography using the presented hybrid encryption system.The hybrid encryption system was constructed by employing Rivest-Shamir-Adleman (RSA) and Advanced Encryption Standard (AES) approaches for securing diagnoses information that embed with RGB channel of healthcare cover images.In[16],Evolutionary Algorithms,such as the Memetic Algorithm are utilized to encrypt the text message.Then,the encoded data is injected into the healthcare image with DWT 1 level and 2 levels.The reverse approach of the Memetic Algorithm was executed once removing hidden messages in the encrypted letter.

    3 The Proposed Method

    In this study,a new BPPIE-ODL technique has been developed to accomplish security and classification on IoT healthcare applications.The major goal of the BPPIE-ODL technique is to securely transmit the encrypted medical images captured by IoT devices and performs classification process at the cloud server.The proposed BPPIE-ODL technique follows several subprocesses namely IoT based data acquisition,signcryption,DFA based optimal key generation,SqueezeNet feature extractor,Nadam hyperparameter optimizer,and SMC.Fig.1 illustrates the overall process of BPPIEODL technique.

    3.1 Image Encryption:Signcryption with Optimal Key Generation Process

    Initially,the IoT devices can be utilized for capturing the medical images which are then encrypted by the use of signcryption approach before transmitting to the cloud server.An important function of this work is for developing mutually authenticated data broadcast protocols which offer secret,integrity,and authenticity of information[17].Primarily,the typical data is assumed for security procedure which is encrypted and decrypt technique,at this point DFA based signcryption approach was presented.The drive of optimally key selective from security method was selecting optimum private as well as public keys from both senders as well as receiver sides.Afterward,the data is encrypted,it’s saved from the cloud or relevant region,then optimally private key was employed to data decryption technique,at this point the optimally key was achieved dependent upon the main function as maximal PSNR value and this presented technique was executed from MATLAB platform.

    Figure 1:Overall process of BPPIE-ODL technique

    A novel approach to public key cryptography was Signcryption that concurrently fulfills both the element of digital signatures and open key encryption with minimum cost.The property contained from signcryption is Non-repudiation,Secret,Integrity,and Unforgeability.Any signcryption has more elements namely Public verifiability and forwarding confidentiality of secret communication[17].The communication forwarded of past encoding data was extremely secured by presented DFA signcryption with optimum key selective.

    3.1.1 Key Generation

    The signcryption signifies the public-key primitive that constitute 2 essential cryptographic gadget that is able of making sure the non-repudiation,privacy,and honesty.This initialized method initializes the prime number,hash function (HF) with key.It can develop the private as well as public keys to both the sender and receiver.For increasing the data security,the projected approach employs the ideal private key by optimized approach.

    Initialization:-LPrefers the large prime numbers,Lfsignifies the large prime factors,Idenotes the integer with orderLfmoduloLP,certain arbitrarily in[1,...LP-1],Hash One way HF,whose outcome is a minimum128 bit,LPKeyed one way HFDValue,elected arbitrarily.

    Sender Key pair((Mk1,Nk1))

    Receiver key pairs(Mk2,Nk2)

    3.1.2 Optimal Key Generation Process

    For effectively choosing the optimal keys involved at the sender and receiver sides,the DFA can be utilized.DFA is stimulating the swarming behavior of dragonflies[18].The purpose for swarming is hunting or migration(static swarm or dynamic swarm,correspondingly).During static swarm,smaller group of dragonflies moves over a smaller region for hunting other insects.This type of swarming Behavior includes abrupt changes and local movements.During dynamic swarming,a large number of dragonflies create an individual group and move in one direction for a long distance[19].The abovementioned behaviors are considered the primary motivation of DFA.For directing artificial dragonfly to different paths,five weights have been applied,that is alignment weight(a),separation weight(s),enemy factor(e),cohesion weight(c),the inertia weight(w)and food factor(f).To exploit the searching space,lower-cohesion weights and higher alignment can be utilized,but to explore the searching space higher-cohesion weights and lower alignment are utilized.Tuning the swarming weights(s,a,c,f,e,and w)adoptively in the optimization method is alternative method for balancing exploitation and exploration.

    Here,Xshows the location for the existing individual,Xjindicates the location for thejthneighboring dragonfly,Nrepresent the amount of individual neighbours of the dragonfly swarm,andSshows the separation movement forithindividual:

    whereasVdenotes the velocity ofjthneighboring dragonfly andAirepresent the alignment movement forithindividual.Cohesion can be formulated by:

    In whichNindicates the neighbourhood size,Cirepresent the cohesion forithindividual,Xindicates the present dragonfly individual,andXjrepresents the location of thejthneighboring dragonfly.The attractive movement towards food can be calculated by:

    NowX+denotes the location of the source of food,Fisignifies the attraction of food forithdragonfly andXrepresent the location of the existing dragonfly individual.Distraction outward predator can be evaluated by:

    whereXrepresent the location of existing dragonfly individual,Eimeans the enemy distraction movement forithindividual,andX-shows the enemy location.For location update in the searching space,artificial dragonfly uses position vectorXand step vectorΔX.The step vector is correspondence to the velocity vector in PSO approach.Also,the location update is mainly depending on the PSO approach:

    In whichwrepresent the inertia weight;Cishows the cohesion forithdragonfly;Aiindicates the alignment forithdragonfly;Eiimplies the place of enemy forithdragonfly;Ficharacterizes the food source forithindividual;Sishows the separation forithdragonfly;andtdenotes the amount of iterations.

    Once the step vector estimation is completed,the estimation for the location vector starts by:

    In whichtdesignates the existing iteration.The DFA derives a fitness function for optimal key generation process,as given below.

    The objective of the DFA is to select the optimal keys for the signcryption process in such a way that the PSNR can be maximized.

    3.2 Blockchain Technology

    In this work,BC can be utilized as a distributed data saving approach for generating a ledger,which permits access to the users and prevents third party’s access to encrypted data.The BC is an immutable distributed data base for that novel time-stamped transaction was append and group as to hash-chain of blocks[19].The fundamental BC protocols determine that several copies of such blocks are created and maintained in a distributed fashion.An important aspect of this protocol was decided that network of participants,recognized that miners,is found consensus on existing state of BC.It can be various kinds of BC structures(that is,permission-less,permissioned,public,and private).There are 2 main approaches to the similar such as Proof of Work(PoW)and Proof of Stake(PoS).When these tasks are done,a novel transaction is together with the BC.All blocks have of unique code named as hash that also comprises the hash of preceding block from the chains,and is utilized for connecting the block composed from a particular order.Some miner has to execute a group of calculations for establishing their credibility as a leader.This computation resolves a puzzle for mapping arbitrarily size data to set size.

    Generally,a leader is selected from one of these 2 approaches.In PoW,several miners try for solving the puzzles,and the one that finishes primary transmits to the group proof that the work was complete.Another miner then validates that the work completed is correct.If all confirm this,it can be choose that specific miner as leader.An initial drive of block is for maintaining a list of verified transactions utilizing a cryptographic hash function.The hash function was effectual due to the subsequent properties:

    ? It creates a resultant of set length irrespective of length of the input.

    ? It can be deterministic that represents that it makes a similar result to a provided input.

    ? It can be irreversible signifies that obtaining a similar input in the outcome is not feasible.

    ? Some slight perturbation to the original input creates novel output.

    ? The hash computation is quick with lesser overhead.

    The block from the BC was connected to first of all genesis blocks and is verified by hashes.Fig.2 illustrates the structure of BC.Every block was related to the connections of every hash that implies all the blocks comprise the preceding hash,and these obtain more hashed from the next blocks.Some modify to hash because the chain that broken as the novel hash was until attach by next block from the chain.Recalculate the novel hash for restoring the chain needs several counts of computing powers.Besides,nonce was more than the miner is role with data for producing a hash that outputs 3 leading zeroes.If the miners establish a nonce which outcomes from its block’s hash being under the complexity threshold,the block was lastly assumed that valid,and it could be transmitted to network with miner taking a reward to its efforts.

    Figure 2:Framework of blockchain

    3.3 Image Classification

    Once the encrypted images are available at the cloud server,the decryption process is carried out followed by classification process,which involves Faster SqueezeNet feature extractor,Nadam hyperparameter optimizer,and SMC.The working of each module is elaborated in the succeeding sections.

    3.3.1 Faster SqueezeNet

    During feature extraction process,the Faster SqueezeNet model can be applied to derive a useful collection of feature vectors.To enhance the real-time performance and accuracy of image classification,Fast SqueezeNet has been introduced[20].To avoid overfitting,we add residual and BatchNorm models.Simultaneously,as DenseNet,we utilized concat for connecting distinct layers to improve the expressiveness of the initial layer in the network.Fast SqueezeNet contains threeblock layers,four convolutional layers,a global average pooling layer and1 BatchNorm layer.Fast SqueezeNet is largely enhanced in a subsequent manner.Further,to enhance the data flow among layers,it can be imitated the DenseNet architecture and presented a distinct connection mode.This comprises a fire module and pooling layer,and lastly,the two concat layers are interconnected with the following convolutional layer.The existing layer receives each feature map of the previous layer,and utilizex0,...,xl-1as input;

    whereas[x0,x1,...,xl-1]represent the connection of feature graph created in layer 0,1,...,l-1 andHlconcatenate many inputs.Now,x0signifies the max pooling layer,x1signifies the Fire layer,andxlshows the concat layer.Without extremely improving the amount of network variables,the efficiency of the system can be improved in the earlier phases,and simultaneously,two-layer networks could communicate directly data.

    To guarantee good network convergence,it is learn in the ResNet architecture and present distinct components that comprise a fire module and a pooling layer.At last,afterward,the two layers are summed,it is interconnected to the following convolution layers.

    3.3.2 Nadam Optimizer

    To optimally adjust the hyperparameter values of the SqueezeNet model,the Nadam optimizer can be utilized.The Nadam optimizer combines Nesterov-accelerated adaptive moment estimation into the Adam[21].The great advantage of this combined technique is that employed adaptive moment estimating helps in carry out high precision step in the gradient direction through update of model parameters with momentum step beforehand the computation of gradient.The upgrading rule of Nadam can be described by the following:

    whereas

    3.3.3 Softmax Classifier

    4 Result and Discussion

    The experimental result analysis of the BPPIE-ODL model is validated utilizing the ISIC dataset[23].The dataset includes dermoscopic images under distinct classes like Angioma,Nevus,Lentigo NOS,Solar Lentigo,Melanoma,Seborrheic Keratosis,and Basal Cell Carcinoma.A few sample images are illustrated in Fig.3.

    Figure 3:Sample images

    Fig.4 visualizes the result analysis of the BPPIE-ODL model.The first column indicates the input medical images and the respective encrypted versions are offered in second column.Finally,the histogram of these images is provided in the third column.

    An extensive MSE analysis of the BPPIE-ODL approach with compared algorithms is provided in Fig.5.The outcomes specified that the BPPIE-ODL method has depicted effectual outcomes with minimal values of MSE.For instance,with test image 1,the BPPIE-ODL model has reached decreased MSE value of 0.081 whereas the BEEPO,hybrid-CE,PSOECC,and CO-ECC techniques have achieved higher MSE values of 0.088,0.127,1.147,and 1.281 respectively.Additionally,with test image 5,the BPPIE-ODL model has accomplished least MSE value of 0.066 whereas the BEEPO,hybrid-CE,PSOECC,and CO-ECC techniques have accomplished increased MSE values of 0.075,0.140,1.249,and 2.784 respectively.

    Fig.6 depicts the comparative PSNR examination of the BPPIE-ODL approach with recent models.The results have shown the supremacy of the BPPIE-ODL model with maximum PSNR values under every test image.For instance,with test image 1,the BPPIE-ODL model has attained maximum PSNR value of 59.046 dB whereas the BEEPO,hybrid-CE,PSOECC,and CO-ECC techniques have obtained lower PSNR values of 58.686 dB,57.093 dB,47.535 dB,and 47.055 dB respectively.

    Figure 4:Sample results:first column original images second column encrypted image third colum histogram of encrypted image

    Figure 5:MSE analysis of BPPIE-ODL technique with different images

    Figure 6:PSNR analysis of BPPIE-ODL technique with different images

    Furthermore,with test image 5,the BPPIE-ODL model has resulted in increased PSNR value of 59.935 dB whereas the BEEPO,hybrid-CE,PSOECC,and CO-ECC techniques have reached decreased PSNR values of 59.380 dB,56.670 dB,47.1635 dB,and 43.684 dB respectively.

    Tab.1 and Fig.7 depict the comparative CC examination of the BPPIE-ODL approach with existing models.The results outperformed the supremacy of the BPPIE-ODL technique with maximal CC values under every test image.For instance,with test image 1,the BPPIE-ODL technique has reached increased CC value of 99.82% whereas the BEEPO,hybrid-CE,PSOECC,and COECC methodologies have obtained decreased CC values of 99.74%,99.54%,99.21%,and 99.10%respectively.In addition,with test image 5,the BPPIE-ODL technique has resulted in maximum CC value of 99.95% whereas the BEEPO,hybrid-CE,PSOECC,and CO-ECC techniques have gained lower CC values of 99.91%,99.81%,99.41%,and 99.34%correspondingly.

    Table 1:CC analysis of BPPIE-ODL technique with recent approaches

    Figure 7:CC analysis of BPPIE-ODL technique with different images

    A detailed CT analysis of the BPPIE-ODL model with compared approaches is provided in Tab.2 and Fig.8.The outcomes specified that the BPPIE-ODL technique has depicted effectual outcomes with lower values of CT.For instance,with test image 1,the BPPIE-ODL model has gained minimal CT value of 42.84 s whereas the BEEPO,hybrid-CE,PSOECC,and CO-ECC techniques have achieved superior CT values of 54.60 s,65.40 s,101.40 s,and 111.00 s correspondingly.Moreover,with test image 5,the BPPIE-ODL model has accomplished least CT value of 41.35 s whereas the BEEPO,hybrid-CE,PSOECC,and CO-ECC techniques have accomplished higher CT values of 48 s,58.80 s,129.60 s,and 154.80 s correspondingly.

    Table 2:Computation time(sec)analysis of BPPIE-ODL technique with recent approaches

    Figure 8:CT analysis of BPPIE-ODL technique with different images

    Tab.3 reports the comparative classification result analysis of the BPPIE-ODL approach with existing algorithms[24-26].Fig.9 showcases comparison study of the BPPIE-ODL model interms of precision and accuracy.The results referred that the EBT model has resulted to lower performance with the precision and accuracy of 0.9092 and 0.8946 respectively.Next,the F-KNN,DT,and MCSVM models have obtained slightly improved values of precision and accuracy.At the same time,the ELM model has shown competitive outcomes with the precision and accuracy of 0.9551 and 0.9813 correspondingly.However,the projected BPPIE-ODL approach has accomplished increased precision and accuracy of 0.9551 and 0.9813 respectively.

    Table 3:Comparative analysis of BPPIE-ODL technique with existing approaches

    Figure 9:Comparative analysis of BPPIE-ODL technique with recent approaches

    A brief computation time (CT) analysis of the BPPIE-ODL with recent models interms of CT as depicted in Fig.10.The experimental results indicated that the MC-SVM and NB models have obtained higher CTs of 3.5426 min and 3.4085 min.In line with,the F-KNN,DT,EBT,and ELM techniques have obtained slightly reduced CT of 2.8382 min,2.7264 min,2.6672 min,and 2.2033 min respectively.However,the BPPIE-ODL methodology has outperformed the other techniques with the minimal CT of 1.8713 min.From these result analyses,it can be concluded that the BPPIE-ODL model has been found to be effective for security and classification in the IoT environment.

    The accuracy outcome analysis of the BPPIE-ODL technique on the test data is illustrated in Fig.11.The outcomes exhibited that the BPPIE-ODL system has accomplished improved validation accuracy compared to training accuracy.It is also observable that the accuracy values get saturated with the epoch count of epochs.The loss outcome analysis of the BPPIE-ODL system on the test data is demonstrated in Fig.11.The figure exposed that the BPPIE-ODL approach has denoted the reduced validation loss over the training loss.It is additionally noticed that the loss values get saturated with the count of epochs.

    Figure 10:CT analysis of BPPIE-ODL technique with recent approaches

    Figure 11:Loss graph analysis of BPPIE-ODL technique

    5 Conclusion

    In this study,a new BPPIE-ODL approach was developed to accomplish security and classification on IoT healthcare applications.The major goal of the BPPIE-ODL technique is to securely transmit the encrypted medical images captured by IoT devices and performs classification process at the cloud server.The proposed BPPIE-ODL technique follows several subprocesses namely signcryption,DFA based optimal key generation,Faster SqueezeNet feature extractor,Nadam hyperparameter optimizer,and SMC.The design of DFA assists in effectively determining the keys for encryption and decryption processes.In order to investigate the improved encryption as well as classification performance of the BPPIE-ODL technique,a comprehensive experimental analysis is implemented.The simulation outcomes demonstrate the significant performance of the BPPIE-ODL technique over the other methods with increased precision and accuracy of 0.9551 and 0.9813 respectively.In future,the performance of the BPPIE-ODL technique can be improvised by hybrid metaheuristic algorithms.

    Acknowledgement:The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code:(22UQU4210118DSR03).

    Funding Statement:The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number(RGP.1/283/43).Princess Nourah bint Abdulrahman University Researchers Supporting Project number(PNURSP2022R136),Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    av女优亚洲男人天堂| 午夜免费男女啪啪视频观看 | 一a级毛片在线观看| 色哟哟·www| www.www免费av| 校园春色视频在线观看| 亚洲午夜理论影院| 老熟妇仑乱视频hdxx| 国产私拍福利视频在线观看| 成人无遮挡网站| 欧美极品一区二区三区四区| 又黄又爽又免费观看的视频| 日韩中字成人| 亚洲欧美日韩卡通动漫| 嫁个100分男人电影在线观看| 久99久视频精品免费| 九九爱精品视频在线观看| 成人一区二区视频在线观看| 亚洲一区高清亚洲精品| 亚洲第一电影网av| av在线老鸭窝| 黄色日韩在线| 国产蜜桃级精品一区二区三区| 两人在一起打扑克的视频| 国产成人a区在线观看| av天堂中文字幕网| 亚洲精品成人久久久久久| 欧美性猛交╳xxx乱大交人| 久99久视频精品免费| 午夜精品一区二区三区免费看| 在线观看免费视频日本深夜| 丰满人妻一区二区三区视频av| 亚洲精品影视一区二区三区av| 极品教师在线视频| 国产精品99久久久久久久久| 一级a爱片免费观看的视频| 亚洲狠狠婷婷综合久久图片| 美女高潮的动态| 亚洲午夜理论影院| 久久欧美精品欧美久久欧美| 超碰av人人做人人爽久久| 亚洲人成伊人成综合网2020| 伦精品一区二区三区| 神马国产精品三级电影在线观看| 色综合站精品国产| 欧美xxxx性猛交bbbb| 成人一区二区视频在线观看| 人人妻,人人澡人人爽秒播| 国产一区二区激情短视频| 1024手机看黄色片| 亚洲欧美日韩高清在线视频| 12—13女人毛片做爰片一| 亚洲av美国av| 熟女人妻精品中文字幕| 国产激情偷乱视频一区二区| 日韩人妻高清精品专区| 国产一区二区亚洲精品在线观看| 麻豆精品久久久久久蜜桃| 少妇的逼水好多| 国产爱豆传媒在线观看| 哪里可以看免费的av片| 1024手机看黄色片| av专区在线播放| 国产女主播在线喷水免费视频网站 | 99久国产av精品| 亚洲va日本ⅴa欧美va伊人久久| 久久人人精品亚洲av| 舔av片在线| 亚洲欧美激情综合另类| 国产亚洲精品综合一区在线观看| 少妇人妻一区二区三区视频| 夜夜爽天天搞| 老女人水多毛片| 九九在线视频观看精品| 久久精品国产亚洲av香蕉五月| 日韩av在线大香蕉| 国内久久婷婷六月综合欲色啪| 国产黄片美女视频| 久久久成人免费电影| 性插视频无遮挡在线免费观看| 老司机福利观看| 国内精品一区二区在线观看| 久久精品国产清高在天天线| av女优亚洲男人天堂| 可以在线观看毛片的网站| 成人毛片a级毛片在线播放| 99在线人妻在线中文字幕| 国产精品一区www在线观看 | 一区二区三区免费毛片| 直男gayav资源| 国语自产精品视频在线第100页| 草草在线视频免费看| 亚洲精品影视一区二区三区av| 久久久久久久久久久丰满 | 日本a在线网址| 成人亚洲精品av一区二区| h日本视频在线播放| 免费av毛片视频| 高清毛片免费观看视频网站| 成人美女网站在线观看视频| 波多野结衣高清无吗| a级毛片a级免费在线| 99热这里只有是精品在线观看| 国产午夜精品论理片| 少妇人妻一区二区三区视频| 久久久久九九精品影院| 国产色婷婷99| 村上凉子中文字幕在线| 日日干狠狠操夜夜爽| 99热这里只有精品一区| 国产精品亚洲一级av第二区| 国产一区二区激情短视频| 亚洲人成伊人成综合网2020| 国产精品98久久久久久宅男小说| 亚洲国产欧洲综合997久久,| 99热这里只有是精品在线观看| 天天一区二区日本电影三级| 一进一出好大好爽视频| 日本欧美国产在线视频| 99久久精品一区二区三区| 午夜福利在线在线| 亚洲七黄色美女视频| 九九爱精品视频在线观看| 中文亚洲av片在线观看爽| 精品午夜福利在线看| 乱系列少妇在线播放| 亚洲成av人片在线播放无| 亚洲真实伦在线观看| 校园人妻丝袜中文字幕| av女优亚洲男人天堂| 国产综合懂色| 亚洲精品在线观看二区| 我要搜黄色片| 精品一区二区三区av网在线观看| 老熟妇仑乱视频hdxx| 俄罗斯特黄特色一大片| 欧美另类亚洲清纯唯美| 日韩中文字幕欧美一区二区| 黄色视频,在线免费观看| 亚洲精品456在线播放app | 国产精品一区www在线观看 | 真人一进一出gif抽搐免费| 国产在线男女| 一区福利在线观看| 国产欧美日韩一区二区精品| 日韩,欧美,国产一区二区三区 | 可以在线观看毛片的网站| 人人妻人人澡欧美一区二区| 久久久久久久精品吃奶| 99热这里只有是精品50| 亚洲精品亚洲一区二区| 亚洲av熟女| 观看免费一级毛片| 精品福利观看| 欧美日韩中文字幕国产精品一区二区三区| 一卡2卡三卡四卡精品乱码亚洲| 欧美区成人在线视频| АⅤ资源中文在线天堂| 午夜免费激情av| 蜜桃久久精品国产亚洲av| 国产精品久久电影中文字幕| 俺也久久电影网| 国产久久久一区二区三区| 国产精品乱码一区二三区的特点| 国产av在哪里看| 综合色av麻豆| 97超级碰碰碰精品色视频在线观看| 啦啦啦观看免费观看视频高清| 老司机深夜福利视频在线观看| 12—13女人毛片做爰片一| 深夜精品福利| 欧美成人一区二区免费高清观看| 国产视频内射| av专区在线播放| 亚洲成人免费电影在线观看| 日韩欧美一区二区三区在线观看| 日日干狠狠操夜夜爽| 亚洲一区高清亚洲精品| 日日摸夜夜添夜夜添av毛片 | 日韩欧美在线二视频| 黄色欧美视频在线观看| 欧美高清成人免费视频www| 久99久视频精品免费| 欧美另类亚洲清纯唯美| 国产激情偷乱视频一区二区| 99视频精品全部免费 在线| 美女大奶头视频| 18禁在线播放成人免费| 精品无人区乱码1区二区| 欧美一级a爱片免费观看看| 日韩国内少妇激情av| 91久久精品电影网| 日韩欧美三级三区| 最近最新免费中文字幕在线| 欧美中文日本在线观看视频| 午夜免费男女啪啪视频观看 | 亚洲最大成人中文| 亚洲乱码一区二区免费版| 亚洲精品影视一区二区三区av| 成人一区二区视频在线观看| 日韩精品有码人妻一区| bbb黄色大片| 色综合色国产| 丰满乱子伦码专区| 级片在线观看| www日本黄色视频网| 国产欧美日韩一区二区精品| av天堂中文字幕网| 国产精品精品国产色婷婷| 亚洲国产精品久久男人天堂| 22中文网久久字幕| 一个人观看的视频www高清免费观看| 天堂影院成人在线观看| 日韩欧美国产一区二区入口| 欧美在线一区亚洲| 精品久久久久久久人妻蜜臀av| 在线观看一区二区三区| 18禁黄网站禁片午夜丰满| 婷婷亚洲欧美| 极品教师在线免费播放| 在线播放国产精品三级| 国产男靠女视频免费网站| 桃红色精品国产亚洲av| 日韩国内少妇激情av| 国产亚洲91精品色在线| 色av中文字幕| av在线观看视频网站免费| 男人的好看免费观看在线视频| 日日摸夜夜添夜夜添av毛片 | 国产精品人妻久久久久久| 搡女人真爽免费视频火全软件 | 亚洲人成网站在线播| 成人毛片a级毛片在线播放| 免费搜索国产男女视频| 看黄色毛片网站| 精品一区二区免费观看| 女人被狂操c到高潮| 精品一区二区三区人妻视频| 18禁裸乳无遮挡免费网站照片| 国产亚洲精品av在线| 国产精品,欧美在线| 成人鲁丝片一二三区免费| 亚洲一区二区三区色噜噜| 日日干狠狠操夜夜爽| 国产av麻豆久久久久久久| 国产主播在线观看一区二区| 成人二区视频| 久久久午夜欧美精品| 18禁裸乳无遮挡免费网站照片| 特级一级黄色大片| 变态另类丝袜制服| 高清在线国产一区| 18禁黄网站禁片免费观看直播| 国产淫片久久久久久久久| 黄色一级大片看看| 国产精品爽爽va在线观看网站| 国产aⅴ精品一区二区三区波| 国产三级在线视频| 国产真实乱freesex| 成年版毛片免费区| 日韩强制内射视频| 啦啦啦观看免费观看视频高清| 久久亚洲精品不卡| 欧美3d第一页| 国产男靠女视频免费网站| 男人和女人高潮做爰伦理| 欧美激情久久久久久爽电影| 观看美女的网站| 国产 一区 欧美 日韩| 成人三级黄色视频| 午夜精品在线福利| 看片在线看免费视频| 国产不卡一卡二| 精品一区二区三区视频在线| 亚洲成人免费电影在线观看| 亚洲精品影视一区二区三区av| av黄色大香蕉| 嫩草影视91久久| 中亚洲国语对白在线视频| 精品人妻一区二区三区麻豆 | 波多野结衣高清无吗| 免费观看的影片在线观看| 又黄又爽又免费观看的视频| 国产黄色小视频在线观看| 国产精品野战在线观看| 免费电影在线观看免费观看| 国内久久婷婷六月综合欲色啪| 无遮挡黄片免费观看| 久久久国产成人免费| 网址你懂的国产日韩在线| 亚洲av一区综合| 亚洲欧美日韩高清在线视频| 我的女老师完整版在线观看| 在线播放国产精品三级| 少妇丰满av| 国产视频内射| 亚洲真实伦在线观看| 午夜爱爱视频在线播放| 国产精品一区二区三区四区久久| 色尼玛亚洲综合影院| 午夜福利在线在线| 99精品久久久久人妻精品| 欧美区成人在线视频| 欧美激情在线99| 尾随美女入室| 欧美一区二区亚洲| 小蜜桃在线观看免费完整版高清| 成年女人永久免费观看视频| 亚洲在线观看片| 九九久久精品国产亚洲av麻豆| 女人被狂操c到高潮| 欧美+亚洲+日韩+国产| 给我免费播放毛片高清在线观看| .国产精品久久| 午夜亚洲福利在线播放| av在线亚洲专区| 亚洲精品粉嫩美女一区| 亚洲人成网站高清观看| 久久中文看片网| 色av中文字幕| 日韩中字成人| 成年女人毛片免费观看观看9| 成人国产一区最新在线观看| 午夜福利视频1000在线观看| 免费观看在线日韩| 春色校园在线视频观看| 欧美日韩综合久久久久久 | 成人精品一区二区免费| 女生性感内裤真人,穿戴方法视频| 乱码一卡2卡4卡精品| 一a级毛片在线观看| 又爽又黄无遮挡网站| 午夜福利在线在线| 狂野欧美白嫩少妇大欣赏| 亚洲中文字幕日韩| 欧美xxxx黑人xx丫x性爽| 人妻制服诱惑在线中文字幕| 天美传媒精品一区二区| 国产午夜精品论理片| 亚洲精品国产成人久久av| 99热精品在线国产| 亚洲熟妇中文字幕五十中出| 大又大粗又爽又黄少妇毛片口| 丰满的人妻完整版| 亚洲美女搞黄在线观看 | 免费看美女性在线毛片视频| 久久久久久久久久成人| 亚洲av一区综合| 久久久久免费精品人妻一区二区| 超碰av人人做人人爽久久| 欧美日本视频| 免费大片18禁| 国产精品亚洲美女久久久| 国产精品自产拍在线观看55亚洲| 91在线观看av| 18禁在线播放成人免费| 欧美人与善性xxx| 俄罗斯特黄特色一大片| 欧美+日韩+精品| 99九九线精品视频在线观看视频| 搡老熟女国产l中国老女人| 亚洲狠狠婷婷综合久久图片| 伦精品一区二区三区| 免费看美女性在线毛片视频| 不卡视频在线观看欧美| 亚洲av第一区精品v没综合| 91狼人影院| 欧美性猛交╳xxx乱大交人| 在线播放无遮挡| 乱人视频在线观看| 搡老熟女国产l中国老女人| 欧美性猛交╳xxx乱大交人| 国产亚洲精品av在线| 亚洲狠狠婷婷综合久久图片| 欧美+日韩+精品| 欧美日韩乱码在线| 欧美激情国产日韩精品一区| 免费看美女性在线毛片视频| 国内精品一区二区在线观看| 亚洲精华国产精华精| 婷婷精品国产亚洲av| 色精品久久人妻99蜜桃| 全区人妻精品视频| 欧美色视频一区免费| 国产精品一区二区性色av| 国产欧美日韩一区二区精品| 成人国产一区最新在线观看| 欧美丝袜亚洲另类 | 亚洲不卡免费看| 精品国产三级普通话版| 亚洲天堂国产精品一区在线| 亚洲国产欧洲综合997久久,| 午夜视频国产福利| 久久久久久大精品| 色5月婷婷丁香| 国产伦人伦偷精品视频| 99久久九九国产精品国产免费| 一个人观看的视频www高清免费观看| 国产黄片美女视频| 桃红色精品国产亚洲av| 亚洲成人久久性| 亚洲成人久久爱视频| 97碰自拍视频| 成年女人毛片免费观看观看9| 日韩中字成人| 日韩欧美国产在线观看| 精品午夜福利在线看| 啦啦啦韩国在线观看视频| 亚洲国产欧美人成| 国产午夜精品论理片| 亚洲av第一区精品v没综合| 欧美激情久久久久久爽电影| 日韩高清综合在线| 两个人的视频大全免费| 国产中年淑女户外野战色| 亚洲精品在线观看二区| 如何舔出高潮| 久久久久久久久大av| 十八禁国产超污无遮挡网站| 天堂√8在线中文| 少妇的逼水好多| 偷拍熟女少妇极品色| 特级一级黄色大片| 最近最新免费中文字幕在线| 国产一级毛片七仙女欲春2| 国产淫片久久久久久久久| 亚洲 国产 在线| 麻豆精品久久久久久蜜桃| 久久国产乱子免费精品| 日本三级黄在线观看| 色吧在线观看| av专区在线播放| 乱人视频在线观看| 99久久九九国产精品国产免费| 欧美成人一区二区免费高清观看| 我的老师免费观看完整版| 18禁黄网站禁片午夜丰满| 国产精品福利在线免费观看| 亚洲不卡免费看| 精品乱码久久久久久99久播| 99久久精品一区二区三区| 99九九线精品视频在线观看视频| 成人高潮视频无遮挡免费网站| 91久久精品国产一区二区成人| 欧美最新免费一区二区三区| 99在线视频只有这里精品首页| 在线观看av片永久免费下载| 久久草成人影院| 男女做爰动态图高潮gif福利片| 天堂影院成人在线观看| 女生性感内裤真人,穿戴方法视频| 在线观看舔阴道视频| а√天堂www在线а√下载| 啦啦啦啦在线视频资源| 精品久久久久久久久亚洲 | 丰满乱子伦码专区| 天天一区二区日本电影三级| 俺也久久电影网| 国产爱豆传媒在线观看| 91精品国产九色| 国产蜜桃级精品一区二区三区| 午夜精品一区二区三区免费看| 国产精品爽爽va在线观看网站| 亚洲最大成人中文| 亚洲va在线va天堂va国产| 一区二区三区高清视频在线| 国产亚洲欧美98| 在线观看一区二区三区| 亚洲欧美日韩高清在线视频| 国内毛片毛片毛片毛片毛片| 国产精品1区2区在线观看.| 一本一本综合久久| 久久久午夜欧美精品| 欧美另类亚洲清纯唯美| 十八禁网站免费在线| 在线国产一区二区在线| 免费搜索国产男女视频| 成人av一区二区三区在线看| 又爽又黄无遮挡网站| 99热网站在线观看| 真人做人爱边吃奶动态| а√天堂www在线а√下载| 国产视频一区二区在线看| 精品人妻熟女av久视频| 日韩中字成人| 九九久久精品国产亚洲av麻豆| 国产色婷婷99| 天美传媒精品一区二区| 久久精品91蜜桃| 亚洲欧美激情综合另类| 久久久成人免费电影| 成人综合一区亚洲| 最近视频中文字幕2019在线8| 又黄又爽又免费观看的视频| 日韩亚洲欧美综合| 深夜a级毛片| 久久久久精品国产欧美久久久| 九色成人免费人妻av| 内射极品少妇av片p| 久久久久国内视频| 男人舔奶头视频| 国产精品久久电影中文字幕| 少妇的逼好多水| 伦精品一区二区三区| 99riav亚洲国产免费| 亚洲av中文av极速乱 | 免费高清视频大片| 老司机深夜福利视频在线观看| 一本久久中文字幕| 国产av在哪里看| 国产av一区在线观看免费| 欧美一区二区国产精品久久精品| 成年版毛片免费区| 熟女人妻精品中文字幕| 男女下面进入的视频免费午夜| 天堂网av新在线| 观看美女的网站| 亚洲中文字幕日韩| 欧美丝袜亚洲另类 | 在线国产一区二区在线| 亚洲精品影视一区二区三区av| 久久久久久九九精品二区国产| 老司机福利观看| 亚洲av成人av| 久久精品国产亚洲av涩爱 | 最近最新免费中文字幕在线| 中文字幕av成人在线电影| 一卡2卡三卡四卡精品乱码亚洲| 长腿黑丝高跟| 老司机深夜福利视频在线观看| 久久国内精品自在自线图片| 自拍偷自拍亚洲精品老妇| 精品久久久久久久久久久久久| 色综合站精品国产| 国产精品98久久久久久宅男小说| 热99re8久久精品国产| 久久亚洲精品不卡| 久久久久久久久中文| 久久午夜福利片| 亚洲 国产 在线| 直男gayav资源| 亚洲最大成人av| 国产老妇女一区| 亚洲成a人片在线一区二区| 九九久久精品国产亚洲av麻豆| 成人精品一区二区免费| 午夜福利在线观看吧| 神马国产精品三级电影在线观看| av黄色大香蕉| 国内毛片毛片毛片毛片毛片| 午夜福利在线观看免费完整高清在 | 国产高清视频在线观看网站| 天天一区二区日本电影三级| av女优亚洲男人天堂| 在线观看一区二区三区| 国产在线男女| 日韩高清综合在线| 亚洲成人精品中文字幕电影| 国产精品一区二区免费欧美| 免费观看人在逋| 欧美三级亚洲精品| 成人二区视频| 少妇的逼好多水| h日本视频在线播放| 非洲黑人性xxxx精品又粗又长| 久久久久久伊人网av| 亚洲性久久影院| 国内精品宾馆在线| 欧美bdsm另类| 波多野结衣巨乳人妻| 97热精品久久久久久| 国产精品福利在线免费观看| 精品久久久噜噜| av视频在线观看入口| 在线观看av片永久免费下载| av黄色大香蕉| 午夜亚洲福利在线播放| 91久久精品电影网| 高清在线国产一区| 欧美一区二区亚洲| 1000部很黄的大片| 日韩欧美在线二视频| 久久久精品欧美日韩精品| 亚洲中文字幕日韩| 女的被弄到高潮叫床怎么办 | 婷婷亚洲欧美| 99热6这里只有精品| 97超视频在线观看视频| 人妻制服诱惑在线中文字幕| 欧美xxxx性猛交bbbb| 国产精品一及| 内射极品少妇av片p| 简卡轻食公司| 色综合亚洲欧美另类图片| 欧美+日韩+精品| 人妻少妇偷人精品九色| 国产蜜桃级精品一区二区三区| 色5月婷婷丁香| 精品一区二区三区视频在线| 久久99热这里只有精品18| 伦精品一区二区三区| 99精品久久久久人妻精品| 国产精品久久久久久精品电影| 久久久久免费精品人妻一区二区| 最近在线观看免费完整版| 国产不卡一卡二| 国产亚洲精品av在线| 欧美色视频一区免费| 久久久成人免费电影| 一个人看视频在线观看www免费| av女优亚洲男人天堂| 亚洲综合色惰| 看免费成人av毛片| 中文字幕精品亚洲无线码一区| 久久精品国产清高在天天线|