• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Privacy Preserving Image Encryption with Deep Learning Based IoT Healthcare Applications

    2022-11-10 02:30:42MohammadAlamgeerSaudAlotaibiShahaAlOtaibiNazikAlturkiAnwerMustafaHilalAbdelwahedMotwakelIshfaqYaseenandMohamedEldesouki
    Computers Materials&Continua 2022年10期

    Mohammad Alamgeer,Saud S.Alotaibi,Shaha Al-Otaibi,Nazik Alturki,Anwer Mustafa Hilal,Abdelwahed Motwakel,Ishfaq Yaseen and Mohamed I.Eldesouki

    1Department of Information Systems,College of Science&Art at Mahayil,King Khalid University,Muhayel Aseer,62529,Saudi Arabia

    2Department of Information Systems,College of Computing and Information System,Umm Al-Qura University,Saudi Arabia

    3Department of Information Systems,College of Computer and Information Sciences,Princess Nourah Bint Abdulrahman University,Riyadh,11671,Saudi Arabia

    4Department of Computer and Self Development,Preparatory Year Deanship,Prince Sattam bin Abdulaziz University,Al-Kharj,16278,Saudi Arabia

    5Department of Information System,College of Computer Engineering and Sciences,Prince Sattam bin Abdulaziz University,Al-Kharj,16278,Saudi Arabia

    Abstract:Latest developments in computing and communication technologies are enabled the design of connected healthcare system which are mainly based on IoT and Edge technologies.Blockchain,data encryption,and deep learning(DL)models can be utilized to design efficient security solutions for IoT healthcare applications.In this aspect,this article introduces a Blockchain with privacy preserving image encryption and optimal deep learning(BPPIEODL)technique for IoT healthcare applications.The proposed BPPIE-ODL technique intends to securely transmit the encrypted medical images captured by IoT devices and performs classification process at the cloud server.The proposed BPPIE-ODL technique encompasses the design of dragonfly algorithm(DFA) with signcryption technique to encrypt the medical images captured by the IoT devices.Besides,blockchain(BC)can be utilized as a distributed data saving approach for generating a ledger,which permits access to the users and prevents third party’s access to encrypted data.In addition,the classification process includes SqueezeNet based feature extraction,softmax classifier(SMC),and Nadam based hyperparameter optimizer.The usage of Nadam model helps to optimally regulate the hyperparameters of the SqueezeNet architecture.For examining the enhanced encryption as well as classification performance of the BPPIE-ODL technique,a comprehensive experimental analysis is carried out.The simulation outcomes demonstrate the significant performance of the BPPIE-ODL technique on the other techniques with increased precision and accuracy of 0.9551 and 0.9813 respectively.

    Keywords:Internet of things;healthcare;decision making;privacy preserving;blockchain;deep learning

    1 Introduction

    Latest advances in communication and computing techniques are allowed the development of connected health care systems that depends mainly on Edge and IoT techniques[1].The medical field is globally emerging as advanced digital solution is being executed for accommodating the rise in health care cost when preserving care quality and sending access to each potential health care service.This field is under great pressure to offer high-quality services to patients and regulate expenses[2].Extensive information is presented in the health care sector in the form of therapeutic research,medical analysis,clinical preliminaries,complex billing,patient medical records,and so on.This information is a useful resource for wide-ranging medical analysis,research,and patients nowadays are concerned with health care data privacy and confidentiality.In addition,unauthorized access to health care information results in privacy and security problems.Further,continued progress has been made in IoT,resultant in an urgent need to analyse current IoT capabilities and requirements.EHealth is a stimulating IoT application[3].For handling information with other organizations,this architecture demands secured data transmission.Healthcare information is extremely private and data transmission might increase the exposure possibility.Additionally,the present scheme of data transmission employs a centralized framework that needs centralized trust[4,5].

    Encryption of sensitive data is the essential and primary approach in cryptography regarding patients’historical information.Considering the digital health care scheme as the environment for receiving and transferring patients’medical data[6].The transmission of medical information to authorized users is a crucial requirement of effective health care.But the current system lacks security techniques since majority of these cases lack appropriate access control and encryption method.Most significantly,blockchain(BC)offers a decentralized network and peer-to-peer systems.A global forecasting estimate that the open direction is available to utilize BC technique for managing IoT device in healthcare system[7].BC-assisted IoT devices could assist patient privacy and recover ownership of healthcare data by leveraging its property including decentralization,persistence,anonymity,and auditability[8].BC technique in the medical sector is in its earlier developmental stage,and for its effective operation,there are multiple challenges ahead.BC technique offers strength against data exposure and failure.The BC is a communal data structure accountable to store each transaction detail[9,10].

    This article introduces a Blockchain with privacy preserving image encryption and optimal deep learning (BPPIE-ODL) technique for IoT healthcare applications.The proposed BPPIE-ODL technique encompasses the design of dragonfly algorithm (DFA) with signcryption technique to encrypt the medical images captured by the IoT devices.Moreover,BC can be utilized as a distributed data saving approach for generating a ledger,which permits access to the users and prevents third party’s access to encrypted data.Furthermore,the classification process includes SqueezeNet based feature extraction,softmax classifier(SMC),and Nadam based hyperparameter optimizer.In order to investigate the improved encryption as well as classification performance of the BPPIE-ODL technique,a comprehensive experimental analysis is carried out.

    2 Literature Review

    Dwivedi et al.[11]presented architecture of adapted BC model applicable for IoT devices that relies on distributed nature and security and privacy properties of the system.This further security and privacy property in this method depend on innovative cryptographic primitive.In[12],BC as a distributed database was presented with a homomorphic encryption approach for ensuring a secured search and keywords-based access to database.In addition,the presented method offers a secured key revocation method and update different policy consequently.Consequently,a secured patient medical data access system is developed,that incorporates trust chain and BC to satisfy the security and efficiency problems in the existing systems.Hamza et al.[1]presented a privacy preserving chaos-based encryption cryptosystem for protecting patient privacy.The presented cryptosystem could defend patient image in compromised broker.Particularly,it can be proposed a fast probabilistic cryptosystem for securing healthcare key frame which are extracting in wireless capsule endoscopy process with a prioritization technique.

    Alassaf and Gutub[13]proposed a comparative study of efficiency metrics of three trusted candidate encryption methods such as SIMON,AES,and SPECK,that is compared and simulated in detail for distinguishing has the optimal performance that designated for a healthcare application.This encryption algorithm is evaluated and implemented regarding the power consumption,execution time,speed,and memory occupation.In[14],a privacy-preserving DSSE system for IIoTH has been introduced.An initial DSSE system developed to personal health record(PHR)dataset with forwarding security.Once the user implements searching operation,he/she gets corresponding attribute values rather than the entire files.

    Denis and Madhubala[15]present a hybridization of data encryption method for sheltering the diagnoses information in healthcare image.The projected method was designed by integrating 2DDWT-2 L or 2D-DWT-1 L steganography using the presented hybrid encryption system.The hybrid encryption system was constructed by employing Rivest-Shamir-Adleman (RSA) and Advanced Encryption Standard (AES) approaches for securing diagnoses information that embed with RGB channel of healthcare cover images.In[16],Evolutionary Algorithms,such as the Memetic Algorithm are utilized to encrypt the text message.Then,the encoded data is injected into the healthcare image with DWT 1 level and 2 levels.The reverse approach of the Memetic Algorithm was executed once removing hidden messages in the encrypted letter.

    3 The Proposed Method

    In this study,a new BPPIE-ODL technique has been developed to accomplish security and classification on IoT healthcare applications.The major goal of the BPPIE-ODL technique is to securely transmit the encrypted medical images captured by IoT devices and performs classification process at the cloud server.The proposed BPPIE-ODL technique follows several subprocesses namely IoT based data acquisition,signcryption,DFA based optimal key generation,SqueezeNet feature extractor,Nadam hyperparameter optimizer,and SMC.Fig.1 illustrates the overall process of BPPIEODL technique.

    3.1 Image Encryption:Signcryption with Optimal Key Generation Process

    Initially,the IoT devices can be utilized for capturing the medical images which are then encrypted by the use of signcryption approach before transmitting to the cloud server.An important function of this work is for developing mutually authenticated data broadcast protocols which offer secret,integrity,and authenticity of information[17].Primarily,the typical data is assumed for security procedure which is encrypted and decrypt technique,at this point DFA based signcryption approach was presented.The drive of optimally key selective from security method was selecting optimum private as well as public keys from both senders as well as receiver sides.Afterward,the data is encrypted,it’s saved from the cloud or relevant region,then optimally private key was employed to data decryption technique,at this point the optimally key was achieved dependent upon the main function as maximal PSNR value and this presented technique was executed from MATLAB platform.

    Figure 1:Overall process of BPPIE-ODL technique

    A novel approach to public key cryptography was Signcryption that concurrently fulfills both the element of digital signatures and open key encryption with minimum cost.The property contained from signcryption is Non-repudiation,Secret,Integrity,and Unforgeability.Any signcryption has more elements namely Public verifiability and forwarding confidentiality of secret communication[17].The communication forwarded of past encoding data was extremely secured by presented DFA signcryption with optimum key selective.

    3.1.1 Key Generation

    The signcryption signifies the public-key primitive that constitute 2 essential cryptographic gadget that is able of making sure the non-repudiation,privacy,and honesty.This initialized method initializes the prime number,hash function (HF) with key.It can develop the private as well as public keys to both the sender and receiver.For increasing the data security,the projected approach employs the ideal private key by optimized approach.

    Initialization:-LPrefers the large prime numbers,Lfsignifies the large prime factors,Idenotes the integer with orderLfmoduloLP,certain arbitrarily in[1,...LP-1],Hash One way HF,whose outcome is a minimum128 bit,LPKeyed one way HFDValue,elected arbitrarily.

    Sender Key pair((Mk1,Nk1))

    Receiver key pairs(Mk2,Nk2)

    3.1.2 Optimal Key Generation Process

    For effectively choosing the optimal keys involved at the sender and receiver sides,the DFA can be utilized.DFA is stimulating the swarming behavior of dragonflies[18].The purpose for swarming is hunting or migration(static swarm or dynamic swarm,correspondingly).During static swarm,smaller group of dragonflies moves over a smaller region for hunting other insects.This type of swarming Behavior includes abrupt changes and local movements.During dynamic swarming,a large number of dragonflies create an individual group and move in one direction for a long distance[19].The abovementioned behaviors are considered the primary motivation of DFA.For directing artificial dragonfly to different paths,five weights have been applied,that is alignment weight(a),separation weight(s),enemy factor(e),cohesion weight(c),the inertia weight(w)and food factor(f).To exploit the searching space,lower-cohesion weights and higher alignment can be utilized,but to explore the searching space higher-cohesion weights and lower alignment are utilized.Tuning the swarming weights(s,a,c,f,e,and w)adoptively in the optimization method is alternative method for balancing exploitation and exploration.

    Here,Xshows the location for the existing individual,Xjindicates the location for thejthneighboring dragonfly,Nrepresent the amount of individual neighbours of the dragonfly swarm,andSshows the separation movement forithindividual:

    whereasVdenotes the velocity ofjthneighboring dragonfly andAirepresent the alignment movement forithindividual.Cohesion can be formulated by:

    In whichNindicates the neighbourhood size,Cirepresent the cohesion forithindividual,Xindicates the present dragonfly individual,andXjrepresents the location of thejthneighboring dragonfly.The attractive movement towards food can be calculated by:

    NowX+denotes the location of the source of food,Fisignifies the attraction of food forithdragonfly andXrepresent the location of the existing dragonfly individual.Distraction outward predator can be evaluated by:

    whereXrepresent the location of existing dragonfly individual,Eimeans the enemy distraction movement forithindividual,andX-shows the enemy location.For location update in the searching space,artificial dragonfly uses position vectorXand step vectorΔX.The step vector is correspondence to the velocity vector in PSO approach.Also,the location update is mainly depending on the PSO approach:

    In whichwrepresent the inertia weight;Cishows the cohesion forithdragonfly;Aiindicates the alignment forithdragonfly;Eiimplies the place of enemy forithdragonfly;Ficharacterizes the food source forithindividual;Sishows the separation forithdragonfly;andtdenotes the amount of iterations.

    Once the step vector estimation is completed,the estimation for the location vector starts by:

    In whichtdesignates the existing iteration.The DFA derives a fitness function for optimal key generation process,as given below.

    The objective of the DFA is to select the optimal keys for the signcryption process in such a way that the PSNR can be maximized.

    3.2 Blockchain Technology

    In this work,BC can be utilized as a distributed data saving approach for generating a ledger,which permits access to the users and prevents third party’s access to encrypted data.The BC is an immutable distributed data base for that novel time-stamped transaction was append and group as to hash-chain of blocks[19].The fundamental BC protocols determine that several copies of such blocks are created and maintained in a distributed fashion.An important aspect of this protocol was decided that network of participants,recognized that miners,is found consensus on existing state of BC.It can be various kinds of BC structures(that is,permission-less,permissioned,public,and private).There are 2 main approaches to the similar such as Proof of Work(PoW)and Proof of Stake(PoS).When these tasks are done,a novel transaction is together with the BC.All blocks have of unique code named as hash that also comprises the hash of preceding block from the chains,and is utilized for connecting the block composed from a particular order.Some miner has to execute a group of calculations for establishing their credibility as a leader.This computation resolves a puzzle for mapping arbitrarily size data to set size.

    Generally,a leader is selected from one of these 2 approaches.In PoW,several miners try for solving the puzzles,and the one that finishes primary transmits to the group proof that the work was complete.Another miner then validates that the work completed is correct.If all confirm this,it can be choose that specific miner as leader.An initial drive of block is for maintaining a list of verified transactions utilizing a cryptographic hash function.The hash function was effectual due to the subsequent properties:

    ? It creates a resultant of set length irrespective of length of the input.

    ? It can be deterministic that represents that it makes a similar result to a provided input.

    ? It can be irreversible signifies that obtaining a similar input in the outcome is not feasible.

    ? Some slight perturbation to the original input creates novel output.

    ? The hash computation is quick with lesser overhead.

    The block from the BC was connected to first of all genesis blocks and is verified by hashes.Fig.2 illustrates the structure of BC.Every block was related to the connections of every hash that implies all the blocks comprise the preceding hash,and these obtain more hashed from the next blocks.Some modify to hash because the chain that broken as the novel hash was until attach by next block from the chain.Recalculate the novel hash for restoring the chain needs several counts of computing powers.Besides,nonce was more than the miner is role with data for producing a hash that outputs 3 leading zeroes.If the miners establish a nonce which outcomes from its block’s hash being under the complexity threshold,the block was lastly assumed that valid,and it could be transmitted to network with miner taking a reward to its efforts.

    Figure 2:Framework of blockchain

    3.3 Image Classification

    Once the encrypted images are available at the cloud server,the decryption process is carried out followed by classification process,which involves Faster SqueezeNet feature extractor,Nadam hyperparameter optimizer,and SMC.The working of each module is elaborated in the succeeding sections.

    3.3.1 Faster SqueezeNet

    During feature extraction process,the Faster SqueezeNet model can be applied to derive a useful collection of feature vectors.To enhance the real-time performance and accuracy of image classification,Fast SqueezeNet has been introduced[20].To avoid overfitting,we add residual and BatchNorm models.Simultaneously,as DenseNet,we utilized concat for connecting distinct layers to improve the expressiveness of the initial layer in the network.Fast SqueezeNet contains threeblock layers,four convolutional layers,a global average pooling layer and1 BatchNorm layer.Fast SqueezeNet is largely enhanced in a subsequent manner.Further,to enhance the data flow among layers,it can be imitated the DenseNet architecture and presented a distinct connection mode.This comprises a fire module and pooling layer,and lastly,the two concat layers are interconnected with the following convolutional layer.The existing layer receives each feature map of the previous layer,and utilizex0,...,xl-1as input;

    whereas[x0,x1,...,xl-1]represent the connection of feature graph created in layer 0,1,...,l-1 andHlconcatenate many inputs.Now,x0signifies the max pooling layer,x1signifies the Fire layer,andxlshows the concat layer.Without extremely improving the amount of network variables,the efficiency of the system can be improved in the earlier phases,and simultaneously,two-layer networks could communicate directly data.

    To guarantee good network convergence,it is learn in the ResNet architecture and present distinct components that comprise a fire module and a pooling layer.At last,afterward,the two layers are summed,it is interconnected to the following convolution layers.

    3.3.2 Nadam Optimizer

    To optimally adjust the hyperparameter values of the SqueezeNet model,the Nadam optimizer can be utilized.The Nadam optimizer combines Nesterov-accelerated adaptive moment estimation into the Adam[21].The great advantage of this combined technique is that employed adaptive moment estimating helps in carry out high precision step in the gradient direction through update of model parameters with momentum step beforehand the computation of gradient.The upgrading rule of Nadam can be described by the following:

    whereas

    3.3.3 Softmax Classifier

    4 Result and Discussion

    The experimental result analysis of the BPPIE-ODL model is validated utilizing the ISIC dataset[23].The dataset includes dermoscopic images under distinct classes like Angioma,Nevus,Lentigo NOS,Solar Lentigo,Melanoma,Seborrheic Keratosis,and Basal Cell Carcinoma.A few sample images are illustrated in Fig.3.

    Figure 3:Sample images

    Fig.4 visualizes the result analysis of the BPPIE-ODL model.The first column indicates the input medical images and the respective encrypted versions are offered in second column.Finally,the histogram of these images is provided in the third column.

    An extensive MSE analysis of the BPPIE-ODL approach with compared algorithms is provided in Fig.5.The outcomes specified that the BPPIE-ODL method has depicted effectual outcomes with minimal values of MSE.For instance,with test image 1,the BPPIE-ODL model has reached decreased MSE value of 0.081 whereas the BEEPO,hybrid-CE,PSOECC,and CO-ECC techniques have achieved higher MSE values of 0.088,0.127,1.147,and 1.281 respectively.Additionally,with test image 5,the BPPIE-ODL model has accomplished least MSE value of 0.066 whereas the BEEPO,hybrid-CE,PSOECC,and CO-ECC techniques have accomplished increased MSE values of 0.075,0.140,1.249,and 2.784 respectively.

    Fig.6 depicts the comparative PSNR examination of the BPPIE-ODL approach with recent models.The results have shown the supremacy of the BPPIE-ODL model with maximum PSNR values under every test image.For instance,with test image 1,the BPPIE-ODL model has attained maximum PSNR value of 59.046 dB whereas the BEEPO,hybrid-CE,PSOECC,and CO-ECC techniques have obtained lower PSNR values of 58.686 dB,57.093 dB,47.535 dB,and 47.055 dB respectively.

    Figure 4:Sample results:first column original images second column encrypted image third colum histogram of encrypted image

    Figure 5:MSE analysis of BPPIE-ODL technique with different images

    Figure 6:PSNR analysis of BPPIE-ODL technique with different images

    Furthermore,with test image 5,the BPPIE-ODL model has resulted in increased PSNR value of 59.935 dB whereas the BEEPO,hybrid-CE,PSOECC,and CO-ECC techniques have reached decreased PSNR values of 59.380 dB,56.670 dB,47.1635 dB,and 43.684 dB respectively.

    Tab.1 and Fig.7 depict the comparative CC examination of the BPPIE-ODL approach with existing models.The results outperformed the supremacy of the BPPIE-ODL technique with maximal CC values under every test image.For instance,with test image 1,the BPPIE-ODL technique has reached increased CC value of 99.82% whereas the BEEPO,hybrid-CE,PSOECC,and COECC methodologies have obtained decreased CC values of 99.74%,99.54%,99.21%,and 99.10%respectively.In addition,with test image 5,the BPPIE-ODL technique has resulted in maximum CC value of 99.95% whereas the BEEPO,hybrid-CE,PSOECC,and CO-ECC techniques have gained lower CC values of 99.91%,99.81%,99.41%,and 99.34%correspondingly.

    Table 1:CC analysis of BPPIE-ODL technique with recent approaches

    Figure 7:CC analysis of BPPIE-ODL technique with different images

    A detailed CT analysis of the BPPIE-ODL model with compared approaches is provided in Tab.2 and Fig.8.The outcomes specified that the BPPIE-ODL technique has depicted effectual outcomes with lower values of CT.For instance,with test image 1,the BPPIE-ODL model has gained minimal CT value of 42.84 s whereas the BEEPO,hybrid-CE,PSOECC,and CO-ECC techniques have achieved superior CT values of 54.60 s,65.40 s,101.40 s,and 111.00 s correspondingly.Moreover,with test image 5,the BPPIE-ODL model has accomplished least CT value of 41.35 s whereas the BEEPO,hybrid-CE,PSOECC,and CO-ECC techniques have accomplished higher CT values of 48 s,58.80 s,129.60 s,and 154.80 s correspondingly.

    Table 2:Computation time(sec)analysis of BPPIE-ODL technique with recent approaches

    Figure 8:CT analysis of BPPIE-ODL technique with different images

    Tab.3 reports the comparative classification result analysis of the BPPIE-ODL approach with existing algorithms[24-26].Fig.9 showcases comparison study of the BPPIE-ODL model interms of precision and accuracy.The results referred that the EBT model has resulted to lower performance with the precision and accuracy of 0.9092 and 0.8946 respectively.Next,the F-KNN,DT,and MCSVM models have obtained slightly improved values of precision and accuracy.At the same time,the ELM model has shown competitive outcomes with the precision and accuracy of 0.9551 and 0.9813 correspondingly.However,the projected BPPIE-ODL approach has accomplished increased precision and accuracy of 0.9551 and 0.9813 respectively.

    Table 3:Comparative analysis of BPPIE-ODL technique with existing approaches

    Figure 9:Comparative analysis of BPPIE-ODL technique with recent approaches

    A brief computation time (CT) analysis of the BPPIE-ODL with recent models interms of CT as depicted in Fig.10.The experimental results indicated that the MC-SVM and NB models have obtained higher CTs of 3.5426 min and 3.4085 min.In line with,the F-KNN,DT,EBT,and ELM techniques have obtained slightly reduced CT of 2.8382 min,2.7264 min,2.6672 min,and 2.2033 min respectively.However,the BPPIE-ODL methodology has outperformed the other techniques with the minimal CT of 1.8713 min.From these result analyses,it can be concluded that the BPPIE-ODL model has been found to be effective for security and classification in the IoT environment.

    The accuracy outcome analysis of the BPPIE-ODL technique on the test data is illustrated in Fig.11.The outcomes exhibited that the BPPIE-ODL system has accomplished improved validation accuracy compared to training accuracy.It is also observable that the accuracy values get saturated with the epoch count of epochs.The loss outcome analysis of the BPPIE-ODL system on the test data is demonstrated in Fig.11.The figure exposed that the BPPIE-ODL approach has denoted the reduced validation loss over the training loss.It is additionally noticed that the loss values get saturated with the count of epochs.

    Figure 10:CT analysis of BPPIE-ODL technique with recent approaches

    Figure 11:Loss graph analysis of BPPIE-ODL technique

    5 Conclusion

    In this study,a new BPPIE-ODL approach was developed to accomplish security and classification on IoT healthcare applications.The major goal of the BPPIE-ODL technique is to securely transmit the encrypted medical images captured by IoT devices and performs classification process at the cloud server.The proposed BPPIE-ODL technique follows several subprocesses namely signcryption,DFA based optimal key generation,Faster SqueezeNet feature extractor,Nadam hyperparameter optimizer,and SMC.The design of DFA assists in effectively determining the keys for encryption and decryption processes.In order to investigate the improved encryption as well as classification performance of the BPPIE-ODL technique,a comprehensive experimental analysis is implemented.The simulation outcomes demonstrate the significant performance of the BPPIE-ODL technique over the other methods with increased precision and accuracy of 0.9551 and 0.9813 respectively.In future,the performance of the BPPIE-ODL technique can be improvised by hybrid metaheuristic algorithms.

    Acknowledgement:The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code:(22UQU4210118DSR03).

    Funding Statement:The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number(RGP.1/283/43).Princess Nourah bint Abdulrahman University Researchers Supporting Project number(PNURSP2022R136),Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    亚洲精品,欧美精品| 一级毛片黄色毛片免费观看视频| 日韩中字成人| 久久久国产一区二区| 少妇猛男粗大的猛烈进出视频 | 欧美激情国产日韩精品一区| 亚洲精品视频女| 我的女老师完整版在线观看| 春色校园在线视频观看| 亚洲在线观看片| 国产欧美亚洲国产| 日韩不卡一区二区三区视频在线| 国产成人a∨麻豆精品| 成人二区视频| 内射极品少妇av片p| 亚洲精品乱码久久久久久按摩| 亚洲精品色激情综合| 91久久精品国产一区二区成人| 国产成人aa在线观看| 中文字幕久久专区| 日韩人妻高清精品专区| 嫩草影院精品99| 熟女人妻精品中文字幕| 国产成人午夜福利电影在线观看| 国产精品偷伦视频观看了| 丰满乱子伦码专区| 三级国产精品片| 亚洲人成网站在线观看播放| 亚洲av欧美aⅴ国产| 亚洲自偷自拍三级| 好男人在线观看高清免费视频| 国产一区有黄有色的免费视频| av福利片在线观看| 日本wwww免费看| 日日摸夜夜添夜夜爱| 嘟嘟电影网在线观看| 久久久久久久久久成人| 在线观看一区二区三区| 欧美成人a在线观看| 欧美日韩亚洲高清精品| 成人亚洲精品一区在线观看 | 一本色道久久久久久精品综合| videossex国产| 丝瓜视频免费看黄片| 精品酒店卫生间| 日韩中字成人| 一级毛片我不卡| 精品人妻一区二区三区麻豆| 九九在线视频观看精品| 亚洲av福利一区| 国内精品宾馆在线| 久热这里只有精品99| 成人毛片60女人毛片免费| 777米奇影视久久| 亚洲av免费高清在线观看| 国产一区有黄有色的免费视频| 国产熟女欧美一区二区| 大片电影免费在线观看免费| 热99国产精品久久久久久7| 日日啪夜夜爽| 男女下面插进去视频免费观看| 亚洲综合色网址| 超碰成人久久| 午夜影院在线不卡| 欧美黄色片欧美黄色片| 免费人妻精品一区二区三区视频| 欧美日韩视频高清一区二区三区二| 青春草国产在线视频| 亚洲男人天堂网一区| 十八禁人妻一区二区| 久久午夜综合久久蜜桃| 在线亚洲精品国产二区图片欧美| 亚洲人成77777在线视频| 菩萨蛮人人尽说江南好唐韦庄| 丝袜美足系列| 男人添女人高潮全过程视频| av在线观看视频网站免费| 国产一区二区 视频在线| 国产精品一二三区在线看| 亚洲成av片中文字幕在线观看| 中文欧美无线码| 久久久久久久久免费视频了| 亚洲av成人不卡在线观看播放网 | 亚洲成av片中文字幕在线观看| 日本色播在线视频| 一区二区三区乱码不卡18| 免费黄频网站在线观看国产| 伊人亚洲综合成人网| 国产精品 欧美亚洲| 精品少妇一区二区三区视频日本电影 | 欧美97在线视频| 欧美在线一区亚洲| 久久影院123| 啦啦啦啦在线视频资源| 欧美最新免费一区二区三区| 亚洲精品国产一区二区精华液| 女性被躁到高潮视频| 精品人妻在线不人妻| 亚洲一区二区三区欧美精品| 久久久久久久精品精品| 亚洲成人免费av在线播放| 天堂中文最新版在线下载| 欧美日韩亚洲国产一区二区在线观看 | 日日摸夜夜添夜夜爱| 嫩草影视91久久| 香蕉丝袜av| 在线观看三级黄色| 一边摸一边做爽爽视频免费| 国产精品二区激情视频| 色吧在线观看| a级毛片黄视频| 久久天堂一区二区三区四区| 香蕉国产在线看| 男女国产视频网站| 五月天丁香电影| 亚洲国产毛片av蜜桃av| 国产一区二区激情短视频 | 精品人妻在线不人妻| 国产有黄有色有爽视频| 七月丁香在线播放| 亚洲精品av麻豆狂野| 99热全是精品| 欧美黑人精品巨大| 久久女婷五月综合色啪小说| 在线观看免费日韩欧美大片| 中文精品一卡2卡3卡4更新| 精品少妇内射三级| 亚洲国产欧美日韩在线播放| 亚洲第一青青草原| 亚洲精品aⅴ在线观看| 日韩不卡一区二区三区视频在线| 亚洲情色 制服丝袜| 亚洲国产精品成人久久小说| 一个人免费看片子| 国产av码专区亚洲av| 欧美人与性动交α欧美精品济南到| 国产亚洲午夜精品一区二区久久| 免费日韩欧美在线观看| 亚洲第一青青草原| 日本wwww免费看| www日本在线高清视频| 精品人妻在线不人妻| 制服诱惑二区| 老司机影院成人| 熟女av电影| 日韩不卡一区二区三区视频在线| 最近的中文字幕免费完整| 精品人妻熟女毛片av久久网站| 又大又黄又爽视频免费| 免费日韩欧美在线观看| 欧美激情极品国产一区二区三区| 亚洲一级一片aⅴ在线观看| 欧美日韩av久久| 高清视频免费观看一区二区| 亚洲av成人精品一二三区| av不卡在线播放| 国产精品久久久人人做人人爽| 久久性视频一级片| 2021少妇久久久久久久久久久| 人妻 亚洲 视频| 91aial.com中文字幕在线观看| 久久韩国三级中文字幕| 国产av一区二区精品久久| 91国产中文字幕| 好男人视频免费观看在线| 久久国产精品男人的天堂亚洲| 亚洲av国产av综合av卡| 久久精品国产综合久久久| 日韩电影二区| 少妇被粗大猛烈的视频| 一二三四在线观看免费中文在| 看免费成人av毛片| 男女国产视频网站| 无遮挡黄片免费观看| 日韩人妻精品一区2区三区| 免费观看性生交大片5| 久久精品国产a三级三级三级| 午夜福利网站1000一区二区三区| 黄色怎么调成土黄色| 国产野战对白在线观看| 国产精品偷伦视频观看了| 亚洲欧美一区二区三区久久| 欧美黄色片欧美黄色片| 久久久国产一区二区| 亚洲精品在线美女| 中文天堂在线官网| 在线观看免费高清a一片| 男女无遮挡免费网站观看| 日本av免费视频播放| 午夜福利影视在线免费观看| 深夜精品福利| 国产男女内射视频| www.自偷自拍.com| 大香蕉久久成人网| 亚洲综合精品二区| 99国产精品免费福利视频| 18禁裸乳无遮挡动漫免费视频| 久久人人爽人人片av| 五月开心婷婷网| 欧美日韩亚洲国产一区二区在线观看 | 欧美在线黄色| 街头女战士在线观看网站| 亚洲欧美一区二区三区久久| 热99久久久久精品小说推荐| 精品午夜福利在线看| 超碰97精品在线观看| 你懂的网址亚洲精品在线观看| 久久影院123| 亚洲成人免费av在线播放| 一区二区三区精品91| 精品久久久精品久久久| 亚洲国产日韩一区二区| 丰满乱子伦码专区| 国产xxxxx性猛交| 亚洲天堂av无毛| www日本在线高清视频| 亚洲精品美女久久久久99蜜臀 | 久久精品久久精品一区二区三区| 久久精品久久久久久久性| 宅男免费午夜| 欧美日韩亚洲综合一区二区三区_| 街头女战士在线观看网站| 国产日韩一区二区三区精品不卡| 亚洲国产精品成人久久小说| 精品国产一区二区三区四区第35| 亚洲欧美一区二区三区黑人| 大码成人一级视频| 亚洲欧美中文字幕日韩二区| av视频免费观看在线观看| 日韩人妻精品一区2区三区| 一级毛片电影观看| 麻豆乱淫一区二区| 国产不卡av网站在线观看| av在线观看视频网站免费| 综合色丁香网| 天天躁夜夜躁狠狠躁躁| 免费高清在线观看日韩| 成人国产av品久久久| 婷婷成人精品国产| 大香蕉久久网| 国产成人免费观看mmmm| 久久久久网色| 亚洲,欧美,日韩| 色婷婷av一区二区三区视频| 国产 精品1| 免费在线观看完整版高清| 街头女战士在线观看网站| 91老司机精品| 亚洲精品国产av蜜桃| 女性生殖器流出的白浆| 女人精品久久久久毛片| 亚洲自偷自拍图片 自拍| 欧美黑人精品巨大| 在线观看免费日韩欧美大片| 免费观看性生交大片5| 亚洲av成人不卡在线观看播放网 | 蜜桃国产av成人99| 国产成人精品福利久久| 午夜老司机福利片| 亚洲自偷自拍图片 自拍| 成年动漫av网址| 免费高清在线观看视频在线观看| 久久97久久精品| 少妇精品久久久久久久| 午夜福利网站1000一区二区三区| 亚洲成人手机| 亚洲中文av在线| 中文字幕最新亚洲高清| 久久久精品免费免费高清| 一本—道久久a久久精品蜜桃钙片| 国产成人欧美| 91aial.com中文字幕在线观看| 老司机在亚洲福利影院| 男女免费视频国产| 国产免费一区二区三区四区乱码| 久久鲁丝午夜福利片| 亚洲欧洲日产国产| 精品视频人人做人人爽| 啦啦啦在线观看免费高清www| 久久久久久久国产电影| 午夜av观看不卡| 午夜激情av网站| 国产精品av久久久久免费| 观看美女的网站| 亚洲精品久久成人aⅴ小说| 国产成人免费观看mmmm| 精品亚洲乱码少妇综合久久| 日本wwww免费看| 国产一级毛片在线| 黄片无遮挡物在线观看| 亚洲欧美激情在线| 1024视频免费在线观看| 国产精品免费视频内射| 中文天堂在线官网| 成年人午夜在线观看视频| 90打野战视频偷拍视频| 久久韩国三级中文字幕| 看免费成人av毛片| 国产av国产精品国产| 熟女av电影| 日本猛色少妇xxxxx猛交久久| 国产日韩欧美亚洲二区| 日日撸夜夜添| 91成人精品电影| 看非洲黑人一级黄片| 亚洲精品在线美女| 国产一区二区三区av在线| 九色亚洲精品在线播放| 老鸭窝网址在线观看| 日本欧美国产在线视频| av.在线天堂| 亚洲婷婷狠狠爱综合网| 久久国产精品大桥未久av| 高清不卡的av网站| 欧美激情极品国产一区二区三区| 丁香六月欧美| 日韩熟女老妇一区二区性免费视频| 久久久久久久久免费视频了| 国产精品二区激情视频| 天美传媒精品一区二区| 日韩,欧美,国产一区二区三区| 亚洲国产精品一区三区| 久久av网站| 激情五月婷婷亚洲| av视频免费观看在线观看| 大片电影免费在线观看免费| 在线观看免费视频网站a站| 狂野欧美激情性xxxx| 伊人久久国产一区二区| 免费不卡黄色视频| 91成人精品电影| 99久久精品国产亚洲精品| 亚洲熟女毛片儿| 黑丝袜美女国产一区| 国产激情久久老熟女| 蜜桃国产av成人99| 中文字幕人妻丝袜制服| 男女高潮啪啪啪动态图| 亚洲精品在线美女| 精品国产乱码久久久久久男人| 男女边吃奶边做爰视频| 超碰97精品在线观看| 欧美日韩一区二区视频在线观看视频在线| 国产激情久久老熟女| 久久久久久久大尺度免费视频| 久久精品国产亚洲av高清一级| 9色porny在线观看| 在线观看一区二区三区激情| 一区二区三区精品91| 丰满少妇做爰视频| 尾随美女入室| 国产男人的电影天堂91| 欧美成人精品欧美一级黄| 在线天堂最新版资源| 天美传媒精品一区二区| 只有这里有精品99| 亚洲五月色婷婷综合| 美女大奶头黄色视频| 9热在线视频观看99| av网站免费在线观看视频| 女性被躁到高潮视频| 满18在线观看网站| 97人妻天天添夜夜摸| 男的添女的下面高潮视频| 丝袜美足系列| 香蕉丝袜av| 老司机深夜福利视频在线观看 | 亚洲欧美精品综合一区二区三区| 亚洲精品一二三| 日本vs欧美在线观看视频| 在线免费观看不下载黄p国产| 免费高清在线观看日韩| 丰满迷人的少妇在线观看| 无遮挡黄片免费观看| 日韩不卡一区二区三区视频在线| 欧美日韩精品网址| 高清黄色对白视频在线免费看| 国产免费视频播放在线视频| 日韩一区二区视频免费看| 日本一区二区免费在线视频| 99久国产av精品国产电影| 亚洲久久久国产精品| 中文字幕色久视频| 亚洲国产欧美日韩在线播放| 成人毛片60女人毛片免费| 久久国产亚洲av麻豆专区| 赤兔流量卡办理| 一本—道久久a久久精品蜜桃钙片| www.自偷自拍.com| 国产 一区精品| 最近2019中文字幕mv第一页| 国产熟女欧美一区二区| 日本av手机在线免费观看| 日韩精品免费视频一区二区三区| 亚洲欧洲国产日韩| 激情视频va一区二区三区| 制服丝袜香蕉在线| 大片免费播放器 马上看| 亚洲国产精品999| 2018国产大陆天天弄谢| 高清在线视频一区二区三区| 亚洲天堂av无毛| 最近2019中文字幕mv第一页| 狠狠婷婷综合久久久久久88av| 久久精品久久精品一区二区三区| 国产av一区二区精品久久| 一级毛片 在线播放| 欧美成人精品欧美一级黄| 午夜日本视频在线| 最近的中文字幕免费完整| 免费人妻精品一区二区三区视频| 久久久久久久大尺度免费视频| 久久久精品国产亚洲av高清涩受| 国产日韩欧美在线精品| 亚洲精品国产色婷婷电影| 欧美黑人欧美精品刺激| 91精品伊人久久大香线蕉| 叶爱在线成人免费视频播放| 丝袜脚勾引网站| 亚洲av国产av综合av卡| 国产精品蜜桃在线观看| 桃花免费在线播放| 亚洲精品久久成人aⅴ小说| 久久久久人妻精品一区果冻| 欧美激情极品国产一区二区三区| 女人爽到高潮嗷嗷叫在线视频| 男女之事视频高清在线观看 | 黄色 视频免费看| 国产精品秋霞免费鲁丝片| 少妇精品久久久久久久| 伦理电影免费视频| 在线天堂中文资源库| 好男人视频免费观看在线| 久久人妻熟女aⅴ| 午夜激情av网站| 久久性视频一级片| 久久精品国产a三级三级三级| 狂野欧美激情性xxxx| 日韩欧美一区视频在线观看| 青青草视频在线视频观看| 99re6热这里在线精品视频| 国产成人a∨麻豆精品| 肉色欧美久久久久久久蜜桃| 亚洲精品第二区| 国产熟女午夜一区二区三区| 亚洲少妇的诱惑av| 大片电影免费在线观看免费| 亚洲国产精品999| 国产1区2区3区精品| 你懂的网址亚洲精品在线观看| 丝袜脚勾引网站| 欧美中文综合在线视频| 日韩不卡一区二区三区视频在线| 亚洲欧美激情在线| 色精品久久人妻99蜜桃| 日本欧美国产在线视频| 色网站视频免费| 国产成人免费无遮挡视频| 亚洲久久久国产精品| 久久久久人妻精品一区果冻| 日韩欧美一区视频在线观看| 自拍欧美九色日韩亚洲蝌蚪91| 国产野战对白在线观看| 亚洲伊人久久精品综合| 18禁观看日本| 亚洲一卡2卡3卡4卡5卡精品中文| 国产精品一二三区在线看| 亚洲精品自拍成人| 国产精品99久久99久久久不卡 | 亚洲国产精品一区三区| 午夜福利一区二区在线看| 国产成人啪精品午夜网站| 免费少妇av软件| 一本色道久久久久久精品综合| 国产成人系列免费观看| 精品第一国产精品| 成人亚洲精品一区在线观看| 国产 精品1| 国产熟女午夜一区二区三区| 一级爰片在线观看| 黄片播放在线免费| 香蕉丝袜av| 秋霞在线观看毛片| 精品一区二区免费观看| 亚洲人成网站在线观看播放| 午夜福利视频精品| 母亲3免费完整高清在线观看| 麻豆乱淫一区二区| 性少妇av在线| 国产成人午夜福利电影在线观看| 亚洲成人手机| 久久天躁狠狠躁夜夜2o2o | 九草在线视频观看| 免费日韩欧美在线观看| 亚洲色图 男人天堂 中文字幕| 涩涩av久久男人的天堂| 久久午夜综合久久蜜桃| 最近中文字幕2019免费版| 一级a爱视频在线免费观看| 哪个播放器可以免费观看大片| 一个人免费看片子| 人人澡人人妻人| 精品国产露脸久久av麻豆| 免费黄色在线免费观看| 视频区图区小说| 一区福利在线观看| 国产1区2区3区精品| 永久免费av网站大全| 悠悠久久av| xxx大片免费视频| 中文字幕人妻丝袜一区二区 | 超色免费av| 乱人伦中国视频| 国产精品欧美亚洲77777| 黄色一级大片看看| 国产 精品1| 国产极品粉嫩免费观看在线| 午夜福利乱码中文字幕| 国产1区2区3区精品| 国产精品久久久久久人妻精品电影 | 51午夜福利影视在线观看| 日韩中文字幕欧美一区二区 | 久久精品亚洲熟妇少妇任你| 欧美日韩视频精品一区| 巨乳人妻的诱惑在线观看| 天美传媒精品一区二区| 国产av码专区亚洲av| 少妇 在线观看| 久久这里只有精品19| 赤兔流量卡办理| 色播在线永久视频| 国产极品天堂在线| 国产日韩欧美亚洲二区| 9色porny在线观看| 天堂中文最新版在线下载| 欧美亚洲日本最大视频资源| 啦啦啦在线观看免费高清www| 亚洲精品美女久久av网站| 国产老妇伦熟女老妇高清| 看非洲黑人一级黄片| 亚洲精品久久成人aⅴ小说| 美女福利国产在线| 丝袜人妻中文字幕| 在线观看人妻少妇| 精品少妇久久久久久888优播| 大话2 男鬼变身卡| 欧美日韩亚洲高清精品| 亚洲欧洲日产国产| 免费高清在线观看日韩| 日韩中文字幕欧美一区二区 | 色婷婷久久久亚洲欧美| 欧美日韩福利视频一区二区| 人妻 亚洲 视频| 9191精品国产免费久久| 国产精品偷伦视频观看了| 欧美精品高潮呻吟av久久| xxxhd国产人妻xxx| 伊人亚洲综合成人网| 熟妇人妻不卡中文字幕| av天堂久久9| 中文字幕另类日韩欧美亚洲嫩草| 丰满饥渴人妻一区二区三| 国产一区亚洲一区在线观看| www.av在线官网国产| 狂野欧美激情性bbbbbb| 女人精品久久久久毛片| 十八禁网站网址无遮挡| 欧美精品亚洲一区二区| 亚洲一卡2卡3卡4卡5卡精品中文| 久久精品aⅴ一区二区三区四区| 亚洲婷婷狠狠爱综合网| 91国产中文字幕| 美女午夜性视频免费| 久久国产亚洲av麻豆专区| 亚洲av中文av极速乱| 免费黄频网站在线观看国产| 最近中文字幕高清免费大全6| 伊人亚洲综合成人网| 亚洲伊人色综图| 亚洲国产精品一区三区| 最近最新中文字幕大全免费视频 | 大陆偷拍与自拍| 免费看av在线观看网站| 又粗又硬又长又爽又黄的视频| 久久久久久久久久久免费av| 亚洲三区欧美一区| 成人三级做爰电影| 夫妻性生交免费视频一级片| 久久久久久免费高清国产稀缺| 自拍欧美九色日韩亚洲蝌蚪91| 看十八女毛片水多多多| 韩国高清视频一区二区三区| 国产亚洲欧美精品永久| 看十八女毛片水多多多| 丰满饥渴人妻一区二区三| 高清av免费在线| 老司机影院毛片| 蜜桃国产av成人99| 欧美国产精品一级二级三级| 一级毛片黄色毛片免费观看视频| 国产精品蜜桃在线观看| 亚洲欧洲精品一区二区精品久久久 | 亚洲一级一片aⅴ在线观看| 在线天堂中文资源库| 秋霞在线观看毛片| 亚洲国产欧美在线一区| 国产欧美亚洲国产| 日韩一区二区三区影片| 一级片'在线观看视频| 午夜福利免费观看在线| 免费看av在线观看网站| 国产精品 欧美亚洲| 黄频高清免费视频| 韩国精品一区二区三区| 久久人人爽av亚洲精品天堂|