• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Multiple Forgery Detection in Video Using Convolution Neural Network

    2022-11-10 02:31:12VinayKumarVineetKansalandManishGaur
    Computers Materials&Continua 2022年10期

    Vinay Kumar,Vineet Kansal and Manish Gaur

    1Centre for Advanced Studies,Dr.A P J Abdul Kalam Technical University,Lucknow,India

    2Institute of Engineering and Technology,Dr.A P J Abdul Kalam Technical University,Lucknow,India

    Abstract:With the growth of digital media data manipulation in today’s era due to the availability of readily handy tampering software,the authenticity of records is at high risk,especially in video.There is a dire need to detect such problem and do the necessary actions.In this work,we propose an approach to detect the interframe video forgery utilizing the deep features obtained from the parallel deep neural network model and thorough analytical computations.The proposed approach only uses the deep features extracted from the CNN model and then applies the conventional mathematical approach to these features to find the forgery in the video.This work calculates the correlation coefficient from the deep features of the adjacent frames rather than calculating directly from the frames.We divide the procedure of forgery detection into two phases-video forgery detection and video forgery classification.In video forgery detection,this approach detect input video is original or tampered.If the video is not original,then the video is checked in the next phase,which is video forgery classification.In the video forgery classification,method review the forged video for insertion forgery,deletion forgery,and also again check for originality.The proposed work is generalized and it is tested on two different datasets.The experimental results of our proposed model show that our approach can detect the forgery with the accuracy of 91%on VIFFD dataset,90%in TDTV dataset and classify the type of forgery-insertion and deletion with the accuracy of 82%on VIFFD dataset,86%on TDTV dataset.This work can helps in the analysis of original and tempered video in various domain.

    Keywords:Digital forensic;forgery detection;video authentication;video interframe forgery;video processing;deep learning

    1 Introduction

    Nowadays,the use of the Internet has become the main component of everyone’s life as digital technology is evolving very rapidly every day.As the growth in digital technology[1],the demand for multimedia supported devices like webcam,desktops,laptops,smartphones,etc.are raised.In the current time,the primary means for communication is multimedia devices through digital images and videos with the help of social media platforms.With the awareness in people about Internet and multimedia devices in various court cases,these digital images and videos play a vital role as a piece of chief evidence for a crime or incidents.In the court,now video captured with the help of CCTV camera can be used as a shred of evidence.But the challenge is to validate the integrity of the evidence otherwise manipulated image or video can be used as a piece of false evidence and cause a severe legal problem[2].The easy availability of manipulating tools and software for digital photos and videos at a meagre cost increases the risk of false evidence in the current days.

    Due to the above problem in the field of multimedia like images and videos,researchers are carrying forward the research to investigate the integrity and reliability of multimedia data effectively.And the research approaches in the multimedia integrity checking[3]and authentication is mainly focused on digital forensics that deals with the digital evidence investigation and recovery that helps to review cyber-crimes.

    There usually are a few techniques that help in predicting the originality or authenticity of video content,which denominated as video forgery detection techniques[4].These video forgery detection techniques come under one of the two fundamental types of forensic approach-active and passive[5].In the active forensic approach,specific equipment and embedded software is the essential requirement,and using this approach quality of the video is also demoted.Active forensics applies where digital watermarks or digital signatures present in the video,so any forgery in such video detects with the help of previous information about the source.Also,active forensic has some limitation as it is not applicable when forgery happens ere digital watermarking,and digital signatures are embedded in the video.As an active forensic approach has a limited scope and to overcome the problems present in an active forensic approach,the other passive forensic method is considered.The passive forensic approach helps in the investigation of video for its authenticity using the special temporal or/and spatial aspects present in it.The passive forensic approach can discover any tempering conducted at inter-frame or intra-frame level.

    Video forgery detection methods[6,7]are applied in the two major areas that are inter-frame video forgery detection[8]and intra-frame video forgery detection.These video forgery areas are distributed based on the tempering performed in the video illegitimately.In intra-frame video forgery techniques like copy-move,re-sampling and slicing are present to temper the original video data,and it also involves forgery at object-level.Part of intra-frame video forgery is when original content of different frames are changed like few region or regions are pasted from the same frame to other location of the same frame or from one frame to another frame.For dealing with this type of forgery,pixel noise features may be considered.On the other hand,inter-frame video forgery involves alteration of the original video within the distribution of the frame.An example of inter-frame video forgery is where frames/frame is inserted from another source to the original video or deleted from the original video or sequence of frame modified in an illicit way to change the flow of events present initially.

    Currently,in forensic investigations,video footage legislates one of the significant evidence.There are three categories of tampering has been found with these pieces of evidence by adding,removing or reproducing/duplicating specific frames within the video footage illegitimately.With the outcome of these forgery video footage/evidence semantically distinct from the genuine video footage and afterwards the forged video footage can be presented as actual evidence to trick the legal investigation.These generated tempered videos can be spread through the online seer to proclaim the fraudulent news.Due to the above-addressed problem in the forensic examination of video evidence,there is a need to detect the inter-frame forgery in videos with high accuracy and effectiveness.

    In today’s era,deep learning[9]is a widely adopted technique to be applied with high accuracy and can deal with the larger dataset.In the area of deep learning,a CNN(convolution neural network)[10]is a part of deep neural network and used to classify the visual representation like images based on the prominent features present in them.In this work,we also use deep learning to find the essential deep features for further examination.This work focuses on the detection of inter-frame video forgery.But this work carries forward the research to detect the forgery in the video for frame insertion and frame deletion.This work uses two models.The first model is a binary detection model that detects only for the authenticity of the video that implies the video is temped or not.And the second model identifies the type of forgery present in the video that suggests whether any frame is inserted or deleted.And the contribution of this work is as follows:

    ? The proposed work is fast in the sense that with the help of parallel processing,this work reduces the processing time for the frame as it uses two parallel CNN to process the frames and find the noticeable features.

    ? The proposed work uses two different models to detect the forgery present in the video and classify the type of forgery in the video,respectively.

    ? The proposed work does not have any relation with the conditions such as the number of frames altered and the recording device used to record the video.

    ? Unlike the other works,this work does not classify or detect the forgery in the video with the help of deep learning output directly.The proposed approach only uses the deep features extracted from the CNN model then apply the conventional mathematical approach on these features to find the forgery in the video.

    ? The proposed method is robust and generalized as it is not restricted to a single dataset and gives comparable results for the various dataset as we tested on two datasets.

    The rest of the paper is as follows:A few literature reviews in the area of video forgery detection is described in Section 2.Section 3 explains the parallel CNN used in this work to process the frames concurrently.The proposed framework for inter-frame video forgery detection is explained in Section 4.Section 5 exhibits the experimental outcomes.And finally,this work concludes in Section 6 with a few future work directions.

    2 Related Work

    This section discusses a few approaches associated with video forgery detection domain.This section also reviews a summary of the present time scenario in the research field of video forgery detection.

    The authors in[11]present an approach in which they excrete the trivial interference between the frames such as vibration in focus,a swift change in lighting etc.and also they detect the frame deletion point(FDP)in the video.They also consider videos with the variable motion.The authors use frame motion features and term as fluctuation features to find the frame deletion point.They use an intra-prediction exclusion method that further enhances the fluctuation feature for the appropriation of different video motions.Then the authors obtain the position of the FDP with the help of these improved features.The authors conducted the experiments for multiple motions of videos and various interfering frames present in the videos.They registered the results with true positive rate and false alarm rate to 90%and 0.3%respectively.

    In the other work,the authors[12]present four approaches for copy-paste video forgery detection.They give the first approach to detect the copy-paste forgery that entails insertion and deletion of frames in or from a video using a sensor pattern noise.The authors use a correlation of sensor pattern noise to detect the forgery in the video.Their approach can detect tempering in the video,which is captured from static or motion camera.They also state that their approach is more robust and enhanced than the already present noise-residue forensic method[13],which is the second approach they tested.The third approach authors described is the revised version of the image forensic approach[14]and termed as CFA-V,where CFA stands for Color Filter Array The artefacts from the color filter array are used to detect the forged frames of a video.And the last approach the authors proposed a mere pixel clustering method based on Hausdorff distance and named as H-DC.They use the video dataset of various encoding types such as MPEG-4,MJPEG,H.264/AVC,and MPEG-2 to perform their experiment and prove their approach.The authors perform their experiments in such an environment that mimic a scenario for forgery in real-world after diversifying variable parameter.The authors register the average accuracy in range 64.5%-82%for noise-residue method,the average accuracy in range 89.9%-98.7% for sensor pattern noise correlation and the average accuracy for CFA-V and H-DC is in the range of 83.2%-93.3%and 79.1%-90.1%,individually.

    In[15]authors introduce a two-step approach to detect forgery in the video.They identify outlier using the distribution of inter-frame Haralick correlation in the first phase.In the second phase,they localize the forgery with the help of block-level examination of frames.The authors use three different datasets for their experiment.The first dataset contains 17 videos with twenty-nine frame rate collected from the SULFA(Surrey University Library for Forensic Analysis)library of video[16].The second dataset includes 13 videos with thirty frame rate collected from the TRACE video library[17].The last video dataset for testing they collect from the Youtube[18]with high resolutions.They demonstrate false positives are reduced and outperformed the accuracy as compared to the existing approaches using an adequate level of detection using their approach.They also state that their approach works effectively for both static and dynamic video data.They registered 97%F1 score,98%precision,and 97%Recall when comparing their results with state-of-the-art methods.In the future work directions,they will work on the enhancement of their approach and focus on various form of video forgery.

    Deep learning approaches are now widely adopted technique in various fields for the classification of multiple tasks based on several purposes.Nowadays,video forensics is also one of the areas which choose deep neural network as an attractive technique to classify the irregular alterations in the videos utilizing the vital features.The authors in[19]also use deep learning approach to detect an interframe forgery in the videos.They use a twelve layer configuration deep convolutional neural network(DCNN)as a deep learning method and calculate the correlation between the frames to classify the forgery in the video data.They use a video frame of 114 width and 114 height with three color RGB channels.They use two dataset Reverse Engineering of Audio-Visual Content Data(REWIND)[20]and Image Processing Research Group(GRIP)[21]to train their DCNN model.The authors registered their experimental results 98%in terms of average accuracy.They also test their approach to check the effectiveness with the compressed Youtube videos dataset,which is the part of GRIP dataset.

    The authors in[22]describe a method to detect a forgery in the digital video data taken from the surveillance and mobile cameras.Their plan is applicable for inter-frame video forgery that is frame insertion,deletion and duplication.They detect the irregularity of frames in the H.264 and MPEG-2 encoded videos with the help of gradient calculation of prediction residual and optical flow.They also claim that their approach detects and localizes the tempering in the video sequences and does not depend on the numbers of frames tempered.The authors’inspections show that their approach does not perform well for videos with high brightness.The results obtained by the authors are 83% and 80%average accuracy for detecting and localizing the forgery,respectively.

    There are a few approaches which detect duplication forgeries in frames and region,in[23],the author’s also present two algorithms to detect frame and region duplication forgery respectively.In the first algorithm,the authors identify the frame forgery in the video for three modes by utilizing the correlation between the frame sequences in the video and obtain the mean of each video.The three modes in the first algorithm to detect frame duplication are the distribution of continuous video frames duplication at large continue position,the distribution of video frames duplication having a various length at various locations,and last,frames from different videos duplication holding similar and diverse dimensions.In the second algorithm,the authors distinguish the region duplication in videos using the relationships between the regions of two/affected frames within the likewise frame at various locations and from another frame to various sequential frame of the same video at a similar place.The authors register the average accuracy of 99.5%for the first algorithm(frame duplication forgery detection)with the dataset SULFA[16]and the average accuracy of 96.6%for the second algorithm(region duplication forgery detection)with the same dataset.The limitation of their first algorithm to detect forged frames in a video is that the authors cannot identify the smaller number of duplicated frames that estimated for the video.And the limitation for the second algorithm to determine the forged region is that their approach cannot identify the most modest part for the duplication of region forgery in the video.

    3 A Sketch of Proposed CNN for Deep Feature Extraction

    In this section,we explain the architecture of CNN proposed for the extraction of deep features from the frames in the video.We use VGG16[24]as a baseline model for feature extraction.But we have modified the existing model of VGG16 for feature extractions because we are computing crosscorrelation features to measure the similarity between two frames.Therefore we have used stride as 2 in convolution layers.By using stride in the VGG16 model layer output size will minimize therefore we have used only 4 convolution layers to uphold the feature output of the model.After applying the discussed changes in the VGG16 model our modified proposed CNN architecture process the frames faster as it contains a lesser number of layers to follow.The proposed parallel CNN takes every two consecutive frames as an input to extract the deep features of each frame.These deep features in the next phase are used to detect the inter-frame video forgery.The complete configuration of the proposed CNN is displayed in Tab.1.This work extracts 8192 in depth features for each frame as an output.There are four convolutional layers,a flatten layer,and the fully connected layer present in the CNN configuration.Fig.1 shows the graphical representation of the proposed CNN architecture.

    Table 1:The configuration of CNN for deep feature extraction in video forgery

    Table 1:Continued

    Figure 1:CNN architecture diagram

    This work uses these deep features from the nearby frames to find the correlation coefficient.If the time interim of the adjacent frames is small,then the correlation is high,else vice-versa.

    4 Proposed Methodology

    The complete working architecture of the proposed work is displayed in Fig.2.This section discusses the proposed methodology of the work into phases which consist of four basic working blocks which are as follows:

    1) Inter frame relation block

    2) Parallel deep neural network block

    3) Adaptive thresholds block

    4) Forgery detection block

    4.1 Inter Frame Relation Block

    The proposed model uses preprocessing technique where we perform the frame extraction operation.Which uses the OpenCV library[25]to extract the frames from the input video as OpenCV supports maximum video format.Hence approach is generic for as many video formats and compression techniques as OpenCV support.In the initial phase,this work takes a video as an input,and supplies into the inter frame relation block.In this block,input video is preprocessed to extract the RGB frames from the video and converted into the grayscale representation.To reduce the storage space necessities approx three order RGB to grayscale conversion[26]is performed.Finally,in this block,each frame is transformed into an adjacent matrix of order m×n(250×250)as an output and input for the next block that is parallel deep neural network block.

    Figure 2:Proposed framework architecture

    4.2 Inter Frame Relation Block

    In this block,CNN model is used parallel to process the two consecutive frames and produce an output as deep features.The configuration of the CNN model to extract the deep features is explained in Section 3.These deep features from the two continuous frames help to find the correlation coefficients between them.After calculating correlation coefficients,this work computes the difference of the adjacent correlation coefficient(Δrs)of frames as the inter-frame correlation distance matrix.The output of this block is passed to the forgery detection block to calculate the elimination function F(Δrs)and to find the second-order derivative which helps to obtain the upper bound and lower bound threshold in the adaptive thresholds blocks.There are two primary procedures performed in this block which are defined as follows:

    ? First,determine the correlation coefficient using the deep features extracted within two neighbouring frames coming from the parallel CNN models.When comparing with the Pearson’s correlation coefficient[27]formula for the frames,this work uses the single dimension as a deep feature list rather than two dimensions(row and column)in the frames.

    ? Second,after finding the correlation coefficient within the two deep feature list for the adjacent frames,this work computes the inter-frame correlation distance (Δrs).Eq.(1) defines the formula to calculate theΔrsfrom the correlation coefficients calculated in the previous step.The Eq.(1)helps to get the content variability in the video sequence.Whenever any tampering is done in the video sequences,the variability affected and does not remain constant,on the other side in the original video where no tampering is performed;it remains stable.

    After calculating the correlation coefficient difference(Δrs)this work calculate the second order derivative of theΔrssequences obtained from the input video.The second order derivative helps to highlight the portions of rapid changes in the video sequences.Let the sequence ofΔrsis obtained from the input video isΔr1,Δr2,...,Δrn.Now this work get the series for second order derivative(ΔRs)from the sequence ofΔrs.The formula for calculatingΔRsis present in the Eq.(2).

    where 2 ≥x≤(n-1),n is the total points in theΔrs.Δrxis the current point where processing is being done,andΔrx+1,Δrx-1are the neighboring points.

    4.3 Adaptive Thresholds Block

    In the adaptive thresholds block the calculated pieces of information like mean,standard deviation,and sigma coefficient (δ) are used to find the supporting values (upper bound and lower bound thresholds) to detect the inter frame forgery.We calculate the mean,standard deviation and use the least distance score to eliminate the original and common consecutive frames.And we also calculate distance and second-order derivative so that every feature represents up to 5 consecutive frames to reduce the effect frame duration.At the same time,we do not use a fixed window size,which can be generic for frame duration effects in the video.Thus,if forgery present at some location in high frame rate videos and the window size is small,with this respect,the forgery will not be detected as the standard deviation of that window size considered all forged frames into original frames.In high frame rate videos,consecutive frames have common features.Suppose there is any insertion forgery in the video.In that case,the mean of the second-order derivative of the correlation coefficient difference will lead to near zero.Still,values near insertion frames if far from zero,which can be detected using standard deviation byγ1&γ2.If we use fixed window size,then mean can be calculated for insertion frames;therefore,mean and insertion frames values are close to each other.All the values lie between y1.Therefore,it makes it harder to find the insertion type forgery in the video having a fixed small window size.The output of the adaptive thresholds block is supplied to the forgery detection block to check the condition of two threshold functions T1(ΔRs)&T2(ΔRs).

    The major objective of this block is to find the upper and lower bound threshold values.These value with few intrinsic value are checked to detect the forgery in the video.There are few steps to calculate the upper bound threshold (ub) and the lower bound threshold (lb) and the steps are as states:

    ? First,we calculate the mean value[28]of the second order derivativeΔRs,which is obtained from the correlation coefficient difference in the previous block.Mean helps to find the behavior of a few abnormally large or abnormally low values.The Eq.(3) shows the formula for calculating the mean.

    where n is the number of values present in theΔRslist.

    ? Second,we find the standard deviation(σs)for the second order derivative of the correlation coefficient distance.It helps to show data deviation from the mean value.The Eq.(4)shows the formula for calculating theσs.where n is the number of values present in theΔRslist.

    ? In the next step,we calculate the sigma coefficient(δ)value for theΔRsseries with the help of the meanand standard deviationσsby using the traditional method used by the community.

    ? At last to find the upper bound threshold ub and lower bound threshold lb we need to find the specific value of the sigma coefficientδas shown in the Eq.(5)to calculate the value of ub and lb.So we have tested for the various value of sigma coefficient and plot the graph to see the optimal value that can be used to find the ub and lb.The value is taken forδis 2.6 as we can see in Fig.3,it gives the highest result in the value used.

    Figure 3:Sigma coefficient vs.accuracy graph plot

    4.4 Forgery Detection Block

    After finding all the values from the previous blocks,forgery detection block looks for elimination function F(Δrs)and two threshold functions T1(Δrs)&T2(Δrs)to find the category of the forgery such as frame insertion and frame deletion based on the conditions.Forgery detection block is the main block where we detect the tampering in the input video.First,we detect whether the input video is forged/tampered or the original video,so we call this phase as video forgery detection phase.In the second phase,we identify the type of forgery like frames inserted or deleted in or from the original video.We name this second phase to video forgery classification.

    ? Video forgery detection phase:In this phase,we define an elimination function F(Δrs) which takes input as correlation coefficient distanceΔrsusing the least distance score which eliminate the most original frame from the input video.Hence distance should be negligible or near to zero value because zero distance represent that both are the same frame.Therefore the value ofλis taken near to zero that is 0.1.Finally,if the correlation coefficient distance is less than or equal to the value ofλthen the frame is original else forgery is detected in the frame and start the process for the classification in the next phase.The formula to calculate the elimination function is shown in Eq.(6).

    where O(s) indicates the original frame if the correlation coefficient distance is less than the taken value ofλ.

    ? Video forgery classification phase:In this phase,we set the two threshold functionsT1(ΔRs)andT2(ΔRs)based on the relation and condition of second order derivative of correlation coefficient distance with the upper and lower bound threshold and threshold control parameters (γ1&γ2).Eqs.(7)and(8)explain the threshold functions with their conditions to classify the forgery whether frame is inserted or deleted in or from the original video.

    Hereγ1andγ2are the threshold control parameter which is used as 1.4,1 respectively to distinguish the frames into the inserted frame I(s),deleted frame D(s),and original frame O(s).

    Eq.(7)explain if the value of second order derivative computed from the correlation coefficient distanceΔRsis lying between the upper bound and lower bound threshold with threshold control parameter productγ1,then the second threshold function is checked given in the Eq.(8).Else insertion forgery is present in the input video.The Eq.(8) depicts that if the value ofΔRslies between the product ofγ2with the upper and lower threshold,then the frames are original no forgery is present else deletion of frame forgery is detected.The value forγ2is selected as 1.On the other hand boundaries of threshold parameterγ1discriminate the forgery type such as deletion and insertion.So the value ofγ1is computed empirically as shown in the Fig.4,and 1.4 value is selected forγ1as we find the best results for this value in both dataset.Accuracy achieved on multiple forgery is 82%on VIFFD dataset and 86%on TDTV dataset.

    Figure 4:Accuracy on multiple forgery vs.threshold control parameter graph

    4.5 Dataset

    This work selects the VIFFD dataset[29,30]and TDTV dataset[31]for the evaluation of the performance and validation of the proposed work.This work test videos of different frame rate for both the dataset.This work considers that there is a high chance of no significant change in consecutive frames while having a higher frame rate.Therefore,we define an elimination function F(Δrs),which takes input as correlation coefficient distance andΔrs,eliminating the most original frame (the common consecutive frames) from the input video using the least distance score.Tab.2 shows the details about the dataset used in this work.4.5.1 VIFFD Dataset

    Table 2:Dataset used for experiment

    There are in total 90 videos are present in the dataset for the validation purpose.The ratio of the dataset is 1:2 that consists of 30 original and 60 forged video.Also,further classification of the forged video is in the proportion of 1:1 having 30 videos in each category deleted and inserted forgery.

    4.5.2 TDTV Dataset

    There are in total 156 videos are present in the dataset for the validation purpose.dataset is labelled into original and forged video,where 16 videos are original and 140 videos are forged.Also,further classification of the forged video is in the proportion of 1:1 having 70 videos in each category deleted and inserted forgery.

    5 Experimental Results and Analysis of Proposed Method

    In this section,experiments are performed into two phases,as explained in subsection 4-D.This work test the proposed approach for the original and forged videos.All the experiments are performed with NVIDIA DGX-2 server,2 petaFLOPS performance,2x Intel Xenon Platinum CPUs,16 NVIDIA Tesla V100 32GB HBM2,1.5 TB DDR4 RAM,30TB SSDs,8 x 100 Gb/sec network speed.To validate the proposed methods,we use various metrics such as accuracy,precision,Recall,and F1-Score.For the evaluation of the experiments,the confusion matrix is presented in both the phases.In the video forgery detection phase original video is labelled as a negative class and forged video as the positive class.In the video forgery classification phase,where forgery is divided into two categories like insertion or deletion forgery multi-class classification is done.Formulas for the different metrics[32]are presented in the like precision,recall,f1score,accuracy.

    Where TP stands for true positive means,forged video is predicted as forged video.FP attains for false-positive,which refers to the original video is classified as forged video.FN stands for falsenegative that is a forged video is detected as the original video.And the TN stands for true negative means the original video is predicted as the original video.

    ? Video forgery detection from the forged and original video:The first experiment is performed by taking a random sample video from the original video dataset.Fig.5 shows the frames extracted from the original video.One can observe in Fig.5 the movement of the person is from right to left.Fig.6 shows the graph plot of relatively constant correlation coefficients of original frames from the left and in the center second order derivative of correlation coefficient distance which is near to zero value from the first frame to 10 frames.There is a deviation in the last frames means forgery possibility is present.In the rightmost part,where threshold parameters with an upper and lower bound threshold are compared then all the values lie within the boundaries.So this work concludes that the video is original.The same operation is performed on the forged videos when the video is predicted as the tampered video,then it goes to the next phase to detect the type of forgeries such as insertion and deletion forgery.Authors have considered only frame insertion and deletion type of editing/forgery in this experiment.The experimental results for the video forgery detection phase are presented in Tabs.3 and 4.This work achieves the accuracy of 91%in VIFFD dataset and 90%in TDTV dataset for the detection of video forgery.

    ? Video forgery classification into insertion or deletion of frames for the input video:For the next experiment,we choose a forged video from the dataset where insertion frame forgery is present.Fig.7 shows the frames extracted from the sample forged video.We can observe from Fig.7 that a player wearing a red t-shirt is playing basketball in the sample video.But in the left side frame,another player wearing the black t-shirt can be seen that frame is the inserted frame in the video.Fig.8 shows the graph plot of correlation coefficients of forged frames from the left and in the center second order derivative of correlation coefficient distance which is near to zero value from the first frame to near 24th frame.There is a large deviation from the 24 to 40 frame number that signifies that forgery possibility is present.In the rightmost part,where threshold parameters with an upper and lower bound threshold are compared then all the values lie within the boundaries except the frames 24 to 40.In the range of 24 to 40 frames highly deviation is found and exceeded from theγ1 threshold control parameter and lower bound and satisfy the Eq.(7)this concludes the insertion forgery present in the input video.Fig.9 shows a few frames of the sample video.We can observe from Fig.9 that the momentum of the person who is riding on cycle is tiny in the first 0.4 s but in the right the last frame of 0.8 s it is a huge difference.So the possibility is that the frames are deleted from the sample video.Fig.10 shows the graph of the correlation coefficients from the forged frames in the left.In the middle the second order derivative of correlation coefficient distance which has zero value from the first frame till to 12 frame number that means frames are highly coupled no chance of forgery in this range.But there is a large deviation from the 12th to 16th frames that implies that forgery opportunity is present.In the rightmost part,where threshold parameters with an upper and lower bound threshold are matched then all the values lie within the boundaries except the frames 12 to 16.In this range frames are highly deviated and exceeded from theγ2 threshold control parameter and lower bound and satisfy the Eq.(8)this concludes the deletion forgery present in the input video.After doing all the experiments for original,insertion,and deletion forgery and validating proposed methodology the video forgery classification phase achieves the accuracy of 82%in VIFFD dataset and 86%in TDTV dataset.The confusion matrix and experimental results for this phase are presented in Tabs.5 and 6 respectively.

    Figure 5:The sample frames of the original video

    Figure 6:Representation of correlation coefficients,second order derivative of correlation coefficients distance,and with dual threshold of original video from left to right

    VIFFD Dataset TDTV Dataset Original 27 3 Original 12 4 Forged 4 56 Forged 11 129 Original Forged Original Forged

    VIFFD Dataset TDTV Dataset Precision(%)Recall(%)F1score(%)Support Precision(%)Recall(%)F1score(%)Support Original 87 90 88 30 Original 52 75 61 16 Forged 95 93 94 60 Forged 97 92 94 140 Accuracy 91 Accuracy 90

    Figure 7:The sample frames of the insertion forgery video

    Figure 8:Representation of correlation coefficients,second order derivative of correlation coefficients distance,and with dual threshold of insertion forged video from left to right

    Figure 9:The sample frames of the deletion forgery video in VIFFD dataset

    Figure 10:Representation of correlation coefficients,second order derivative of correlation coefficients distance,and with dual threshold of deleted forged video from left to right

    Table 5:Confusion matrix of multiple forgery detection

    VIFFD Dataset TDTV Dataset Precision(%)Recall(%)F1score(%)Support Precision(%)Recall(%)F1score(%)Support Original 87 90 88 30 Original 52 75 61 16 Deletion 78 70 74 30 Deletion 86 84 85 70 Insertion 81 87 84 30 Insertion 100 91 95 70 Accuracy 82 Accuracy 86

    Tab.7 represents the results for original,forged,frame deletion,and frame insertion forgery detection on the VIFFD video dataset with the various metrics.The total accuracy of 90%is achieved for the original video,maximum accuracy of 93%is obtained for the forged video type.The accuracy of 70%and 87%is achieved for the frame deletion and frame insertion forgery for the VIFFD dataset using the proposed methods.All the result are compared with TDTV dataset.The total accuracy of 75% is achieved for the original video,this is because there are very few samples available of that video type which may result in an unbalanced dataset.If the dataset is balanced then the proposed model can achieve higher accuracy,maximum accuracy of 92%is obtained for the forged video type.The accuracy of 84%and 91%is achieved for the frame deletion and frame insertion forgery for the TDTV dataset using the proposed methods.

    VIFFD Dataset V ideo type Precision(%) Recall(%) F1score(%) Support Accuracy(%)Original 87 90 88 30 90 Forged 95 93 94 60 93 Frame deletion 78 70 74 30 70 Frame insertion 81 87 84 30 87 TDTV Dataset Video type Precision(%) Recall(%) F1score(%) Support Accuracy(%)Original 52 75 61 16 75 Forged 97 92 94 140 92 Frame deletion 86 84 85 70 84 Frame insertion 100 91 95 70 91

    Table 8:Comparison with state-of-art

    In this Tab.8 we have compare the proposed method with the recent state-of-art in various terms for insertion and deletion type forgery detection.The Fadl et al.[34]proposed the universal image quality index based video authentication.The Bakas et al.[36]proposed prediction footprint variations pattern technique.The work is compared with TDTV dataset as its combines many dataset which is very similar to Bakas dataset.This work is based on single-shot videos.Therefore,any transition from one shot to another shot is considered as insertion as per the proposed algorithm.As transitions can be another type of forgery and there are various types of transitions,authors have not considered the effect of transition in the video.However,abrupt transitions should be detected as insertion forgery by our proposed method as through our test results.At the same time,the gradual transition is not considered inside this algorithm.Therefore,it might be detected as insertion or original with the proposed method.

    6 Conclusion

    In this work,we introduce an approach to detect and classify the inter-frame video forgery such as frame insertion and deletion.The proposed work comprises of four working blocks.The first block has the basic functionality of converting an input video to frames and matrix form for each frame.The second block operations include deep feature extraction using two parallel CNN models and calculation of correlation between the deep features and correlation difference to find the relation between the frames.Threshold parameters,upper and lower bound threshold values are obtained in the third block.These threshold values help to find the forgery in the video.The last block checks the elimination and threshold functions using threshold values obtained from the previous blocks to detect the forgery and originality for the video.The experimental analysis of forged video and original video with the proposed method shows that our approach performs well for the detection and classification of the video forgery.Our method is generic enough because our model is capable of detecting and classifying forgery for multiple dataset.In future work,we enhance the performance of our proposed work for video classification and time-based analysis would be done.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    亚洲中文av在线| cao死你这个sao货| 久久亚洲真实| 精品欧美一区二区三区在线| 午夜91福利影院| 国产精品久久久久久精品古装| 亚洲国产看品久久| 中文字幕人妻丝袜制服| 三级毛片av免费| 一级毛片女人18水好多| 成人特级黄色片久久久久久久| 亚洲国产毛片av蜜桃av| 不卡一级毛片| 日韩制服丝袜自拍偷拍| 少妇被粗大的猛进出69影院| 热99久久久久精品小说推荐| 久久中文看片网| 露出奶头的视频| 午夜福利免费观看在线| 久久精品国产清高在天天线| 欧美激情极品国产一区二区三区| 男人的好看免费观看在线视频 | 熟女少妇亚洲综合色aaa.| av电影中文网址| 丰满饥渴人妻一区二区三| 精品亚洲成a人片在线观看| 国产精品九九99| 欧美成狂野欧美在线观看| 免费久久久久久久精品成人欧美视频| 亚洲自偷自拍图片 自拍| 女人高潮潮喷娇喘18禁视频| 90打野战视频偷拍视频| 别揉我奶头~嗯~啊~动态视频| 欧美大码av| 一二三四在线观看免费中文在| 国产xxxxx性猛交| 91av网站免费观看| 狂野欧美激情性xxxx| 高潮久久久久久久久久久不卡| 中文亚洲av片在线观看爽 | 久久午夜综合久久蜜桃| 麻豆乱淫一区二区| 久久亚洲精品不卡| 欧美精品人与动牲交sv欧美| 中文字幕最新亚洲高清| 久久婷婷成人综合色麻豆| 亚洲第一青青草原| 免费观看a级毛片全部| 国产日韩一区二区三区精品不卡| 亚洲色图av天堂| 欧美精品高潮呻吟av久久| 黑丝袜美女国产一区| 在线观看免费午夜福利视频| 在线观看免费高清a一片| 国产高清视频在线播放一区| 国产免费现黄频在线看| 亚洲人成伊人成综合网2020| 丝袜美足系列| 国产成人系列免费观看| 欧美日本中文国产一区发布| 亚洲av成人不卡在线观看播放网| 国产在视频线精品| 在线观看免费视频日本深夜| 国产欧美日韩一区二区三区在线| 搡老岳熟女国产| 国产精品久久久人人做人人爽| 美女高潮到喷水免费观看| 亚洲av熟女| 欧美日韩一级在线毛片| 夫妻午夜视频| 亚洲av片天天在线观看| 国产亚洲一区二区精品| 搡老岳熟女国产| 国产精品一区二区在线观看99| 亚洲熟女精品中文字幕| 国产精品永久免费网站| 精品久久久精品久久久| 美女国产高潮福利片在线看| 欧美日韩亚洲高清精品| 每晚都被弄得嗷嗷叫到高潮| 国产精品免费一区二区三区在线 | 久久久水蜜桃国产精品网| av有码第一页| 久久亚洲真实| 久久久国产成人免费| 欧洲精品卡2卡3卡4卡5卡区| 亚洲 欧美一区二区三区| 不卡av一区二区三区| 亚洲专区中文字幕在线| 成年动漫av网址| 久久久久久免费高清国产稀缺| 欧美成人免费av一区二区三区 | 国产在视频线精品| 国产免费男女视频| 一边摸一边做爽爽视频免费| 巨乳人妻的诱惑在线观看| 深夜精品福利| 免费女性裸体啪啪无遮挡网站| 亚洲av熟女| 三级毛片av免费| 久久影院123| 99国产精品一区二区三区| 老熟女久久久| 人人妻人人爽人人添夜夜欢视频| 亚洲精品中文字幕一二三四区| av超薄肉色丝袜交足视频| 老司机午夜十八禁免费视频| 国内久久婷婷六月综合欲色啪| 色综合婷婷激情| 欧美成人午夜精品| 国产亚洲精品第一综合不卡| 亚洲精品美女久久av网站| 午夜精品在线福利| 一本大道久久a久久精品| 国产真人三级小视频在线观看| 亚洲av欧美aⅴ国产| 黑人猛操日本美女一级片| 黄网站色视频无遮挡免费观看| 在线观看一区二区三区激情| 午夜福利在线免费观看网站| 色综合欧美亚洲国产小说| 啦啦啦在线免费观看视频4| 久久久久久人人人人人| 天堂中文最新版在线下载| 大码成人一级视频| 999久久久精品免费观看国产| 久久久水蜜桃国产精品网| 老司机靠b影院| 老汉色av国产亚洲站长工具| 最近最新中文字幕大全免费视频| tocl精华| 久久久国产成人精品二区 | 国产熟女午夜一区二区三区| 很黄的视频免费| 国产高清videossex| 丝袜美足系列| 亚洲精品国产区一区二| 久久精品熟女亚洲av麻豆精品| videosex国产| 一区二区三区精品91| 久久这里只有精品19| 亚洲国产中文字幕在线视频| 韩国av一区二区三区四区| 国产精品综合久久久久久久免费 | 色老头精品视频在线观看| 国产精品久久久人人做人人爽| 两性夫妻黄色片| 人妻丰满熟妇av一区二区三区 | 麻豆国产av国片精品| 精品卡一卡二卡四卡免费| 一级a爱片免费观看的视频| 色精品久久人妻99蜜桃| 一区二区三区国产精品乱码| 黄色女人牲交| e午夜精品久久久久久久| 亚洲一区中文字幕在线| 亚洲av成人av| 99久久综合精品五月天人人| 999久久久精品免费观看国产| 十八禁网站免费在线| 精品国产一区二区久久| 亚洲色图av天堂| 日本黄色日本黄色录像| 国产亚洲欧美精品永久| ponron亚洲| 亚洲九九香蕉| 中文字幕最新亚洲高清| 亚洲国产精品sss在线观看 | 女人精品久久久久毛片| 一边摸一边做爽爽视频免费| 国产伦人伦偷精品视频| 亚洲精品久久午夜乱码| 国产又爽黄色视频| 亚洲熟女精品中文字幕| 亚洲一区中文字幕在线| 国产精品.久久久| 中出人妻视频一区二区| 午夜精品国产一区二区电影| 中文字幕人妻丝袜一区二区| 亚洲国产精品合色在线| 国产精品99久久99久久久不卡| 老熟女久久久| 女人久久www免费人成看片| 欧美日韩视频精品一区| 亚洲欧洲精品一区二区精品久久久| 久久久久国产精品人妻aⅴ院 | 国产精华一区二区三区| 高清在线国产一区| 下体分泌物呈黄色| 亚洲国产看品久久| 久久久久久久精品吃奶| 精品久久蜜臀av无| 不卡av一区二区三区| 亚洲第一av免费看| bbb黄色大片| 水蜜桃什么品种好| 丝袜美腿诱惑在线| 免费观看精品视频网站| 日韩欧美一区视频在线观看| 日本wwww免费看| 午夜激情av网站| 日本黄色日本黄色录像| 伦理电影免费视频| 亚洲第一av免费看| 日本vs欧美在线观看视频| 九色亚洲精品在线播放| 国内毛片毛片毛片毛片毛片| 久久青草综合色| 女警被强在线播放| av电影中文网址| 人妻一区二区av| 久久草成人影院| 欧美亚洲日本最大视频资源| 天天操日日干夜夜撸| 精品少妇久久久久久888优播| 精品亚洲成a人片在线观看| 黄片大片在线免费观看| 亚洲色图av天堂| 另类亚洲欧美激情| 久久中文字幕人妻熟女| 久久精品国产a三级三级三级| 精品亚洲成国产av| av视频免费观看在线观看| 久久精品国产亚洲av高清一级| 99久久综合精品五月天人人| 9191精品国产免费久久| 日韩制服丝袜自拍偷拍| 俄罗斯特黄特色一大片| 亚洲精品乱久久久久久| 老司机深夜福利视频在线观看| 免费黄频网站在线观看国产| av超薄肉色丝袜交足视频| 亚洲精品国产色婷婷电影| 国产精品亚洲一级av第二区| 免费在线观看完整版高清| 亚洲五月婷婷丁香| 夜夜躁狠狠躁天天躁| 妹子高潮喷水视频| 久久久久精品人妻al黑| 久久久精品国产亚洲av高清涩受| 91精品国产国语对白视频| 乱人伦中国视频| 91av网站免费观看| 精品午夜福利视频在线观看一区| 超碰97精品在线观看| 男女之事视频高清在线观看| 人妻丰满熟妇av一区二区三区 | 两个人免费观看高清视频| 最新的欧美精品一区二区| 精品第一国产精品| av欧美777| 老司机午夜十八禁免费视频| 亚洲国产欧美日韩在线播放| 国产精品偷伦视频观看了| 亚洲va日本ⅴa欧美va伊人久久| 精品乱码久久久久久99久播| 18禁裸乳无遮挡动漫免费视频| 女人被躁到高潮嗷嗷叫费观| 嫁个100分男人电影在线观看| 女性被躁到高潮视频| 高清视频免费观看一区二区| 久久午夜综合久久蜜桃| 黄色女人牲交| 欧美中文综合在线视频| 一级a爱片免费观看的视频| 视频区图区小说| 国产精品亚洲一级av第二区| 亚洲av日韩在线播放| 亚洲 欧美一区二区三区| 在线观看免费视频网站a站| aaaaa片日本免费| 精品一区二区三区视频在线观看免费 | 久热爱精品视频在线9| 丝袜美腿诱惑在线| 黑人操中国人逼视频| 高清视频免费观看一区二区| 久久国产精品人妻蜜桃| 91麻豆精品激情在线观看国产 | 欧美日韩瑟瑟在线播放| 人人妻人人澡人人爽人人夜夜| 91老司机精品| 黄片小视频在线播放| 欧美成人免费av一区二区三区 | 久9热在线精品视频| 国产精品99久久99久久久不卡| 91av网站免费观看| 久久精品亚洲精品国产色婷小说| 99国产综合亚洲精品| 国精品久久久久久国模美| 亚洲精品一二三| 777米奇影视久久| 乱人伦中国视频| 国产熟女午夜一区二区三区| 久久婷婷成人综合色麻豆| 麻豆av在线久日| 757午夜福利合集在线观看| 日韩视频一区二区在线观看| 精品国产乱子伦一区二区三区| 精品人妻在线不人妻| 中出人妻视频一区二区| 搡老岳熟女国产| 免费不卡黄色视频| 日本五十路高清| 99香蕉大伊视频| 中文亚洲av片在线观看爽 | 欧美 日韩 精品 国产| 这个男人来自地球电影免费观看| 色综合婷婷激情| 久久精品国产亚洲av香蕉五月 | 91精品国产国语对白视频| 男人舔女人的私密视频| 久久人妻熟女aⅴ| 国产亚洲欧美98| 男男h啪啪无遮挡| 黑人巨大精品欧美一区二区蜜桃| 国产男女超爽视频在线观看| 国产亚洲欧美精品永久| 黑人巨大精品欧美一区二区mp4| 一二三四社区在线视频社区8| 美女 人体艺术 gogo| 国产在视频线精品| 热99久久久久精品小说推荐| 亚洲人成电影免费在线| 欧美乱码精品一区二区三区| 一区福利在线观看| 在线观看午夜福利视频| 美女福利国产在线| 精品一品国产午夜福利视频| 在线观看免费午夜福利视频| 久久久久国产精品人妻aⅴ院 | 精品国产乱子伦一区二区三区| 国产又色又爽无遮挡免费看| 亚洲精品国产一区二区精华液| 亚洲国产精品sss在线观看 | 日韩欧美在线二视频 | 国产人伦9x9x在线观看| 国产91精品成人一区二区三区| 免费久久久久久久精品成人欧美视频| 久久精品aⅴ一区二区三区四区| 99久久综合精品五月天人人| 亚洲欧美色中文字幕在线| 日本撒尿小便嘘嘘汇集6| 自线自在国产av| 69精品国产乱码久久久| 999久久久国产精品视频| 99精品久久久久人妻精品| 动漫黄色视频在线观看| 一区在线观看完整版| 精品国产亚洲在线| 免费观看a级毛片全部| 999精品在线视频| 久久午夜亚洲精品久久| 午夜视频精品福利| 日韩有码中文字幕| 成人国产一区最新在线观看| 国产精品美女特级片免费视频播放器 | 怎么达到女性高潮| 国产三级黄色录像| 看黄色毛片网站| 国产精品九九99| 黄色毛片三级朝国网站| 亚洲av电影在线进入| 99久久99久久久精品蜜桃| 午夜福利在线免费观看网站| 久久精品亚洲精品国产色婷小说| 亚洲av日韩在线播放| 欧美激情久久久久久爽电影 | 大陆偷拍与自拍| 久久精品国产综合久久久| 天天添夜夜摸| 国产成+人综合+亚洲专区| 91av网站免费观看| 美女国产高潮福利片在线看| 免费看十八禁软件| 国产无遮挡羞羞视频在线观看| 桃红色精品国产亚洲av| 悠悠久久av| 亚洲一卡2卡3卡4卡5卡精品中文| 精品电影一区二区在线| x7x7x7水蜜桃| 搡老岳熟女国产| 老司机福利观看| 在线视频色国产色| 亚洲人成电影免费在线| 欧美精品啪啪一区二区三区| 亚洲成人国产一区在线观看| 免费观看a级毛片全部| 成人精品一区二区免费| 国产一区在线观看成人免费| 波多野结衣一区麻豆| 国产精品一区二区精品视频观看| 人人妻人人澡人人爽人人夜夜| 制服人妻中文乱码| 久久久久久免费高清国产稀缺| 男女下面插进去视频免费观看| 国产成人免费无遮挡视频| 久久久精品免费免费高清| aaaaa片日本免费| 妹子高潮喷水视频| 交换朋友夫妻互换小说| 91精品国产国语对白视频| 亚洲成人国产一区在线观看| 老司机午夜福利在线观看视频| 国产高清视频在线播放一区| 母亲3免费完整高清在线观看| 色播在线永久视频| 一本一本久久a久久精品综合妖精| 国产亚洲欧美精品永久| 新久久久久国产一级毛片| 亚洲人成电影免费在线| 亚洲中文字幕日韩| 国产精品久久久久久人妻精品电影| 亚洲午夜精品一区,二区,三区| 色精品久久人妻99蜜桃| 动漫黄色视频在线观看| 国产国语露脸激情在线看| 自线自在国产av| 两人在一起打扑克的视频| 免费黄频网站在线观看国产| 国产精品欧美亚洲77777| 另类亚洲欧美激情| 国产99久久九九免费精品| 美女高潮到喷水免费观看| 亚洲欧美一区二区三区久久| 女人精品久久久久毛片| avwww免费| av一本久久久久| 18禁国产床啪视频网站| 久久 成人 亚洲| 老司机影院毛片| 中文字幕精品免费在线观看视频| 天天操日日干夜夜撸| 一二三四在线观看免费中文在| 色精品久久人妻99蜜桃| www日本在线高清视频| av有码第一页| 黄色a级毛片大全视频| 亚洲国产看品久久| av福利片在线| av电影中文网址| 免费久久久久久久精品成人欧美视频| 中文字幕精品免费在线观看视频| 国产精品.久久久| 天天躁日日躁夜夜躁夜夜| 久久99一区二区三区| 黄色成人免费大全| 久久香蕉激情| 老熟女久久久| 视频区图区小说| 18禁观看日本| 69av精品久久久久久| 免费观看a级毛片全部| 18禁黄网站禁片午夜丰满| 亚洲精品一卡2卡三卡4卡5卡| 国产精品 国内视频| 精品少妇一区二区三区视频日本电影| 51午夜福利影视在线观看| 国产亚洲精品一区二区www | xxx96com| 国产欧美日韩一区二区三| 国产精品欧美亚洲77777| 啦啦啦免费观看视频1| 老司机午夜福利在线观看视频| 999久久久国产精品视频| 后天国语完整版免费观看| 激情视频va一区二区三区| 免费人成视频x8x8入口观看| av免费在线观看网站| 大型av网站在线播放| 免费日韩欧美在线观看| 免费高清在线观看日韩| 色播在线永久视频| 亚洲黑人精品在线| 亚洲国产欧美日韩在线播放| 国产成人欧美在线观看 | 少妇猛男粗大的猛烈进出视频| 精品国产乱码久久久久久男人| 国产精品1区2区在线观看. | 亚洲三区欧美一区| 极品人妻少妇av视频| 在线观看免费视频网站a站| 50天的宝宝边吃奶边哭怎么回事| 俄罗斯特黄特色一大片| 国产亚洲av高清不卡| 18禁黄网站禁片午夜丰满| 久久国产精品男人的天堂亚洲| 久久国产精品人妻蜜桃| 极品教师在线免费播放| 亚洲欧美日韩另类电影网站| 热99re8久久精品国产| 亚洲国产看品久久| 脱女人内裤的视频| 亚洲七黄色美女视频| 久久国产精品影院| 人人妻人人澡人人看| 亚洲国产看品久久| 欧美最黄视频在线播放免费 | 免费看十八禁软件| 日韩欧美国产一区二区入口| 国产精品久久电影中文字幕 | bbb黄色大片| 国产深夜福利视频在线观看| 日本一区二区免费在线视频| 99久久人妻综合| 欧美日韩福利视频一区二区| 欧美成人午夜精品| 一区二区三区精品91| 一区二区三区激情视频| 最近最新免费中文字幕在线| 成年版毛片免费区| 国产av精品麻豆| 搡老熟女国产l中国老女人| 国产成人精品在线电影| 热re99久久国产66热| 国产免费现黄频在线看| 亚洲色图综合在线观看| 久久中文看片网| 欧美国产精品一级二级三级| av欧美777| svipshipincom国产片| avwww免费| 成人18禁在线播放| 国产91精品成人一区二区三区| 久久人妻av系列| 国产精品免费一区二区三区在线 | 亚洲成人免费电影在线观看| 日韩大码丰满熟妇| 亚洲专区国产一区二区| 在线观看午夜福利视频| 中文亚洲av片在线观看爽 | 不卡av一区二区三区| 国产成人精品无人区| 97人妻天天添夜夜摸| 在线观看免费日韩欧美大片| 一二三四在线观看免费中文在| 在线观看免费日韩欧美大片| 纯流量卡能插随身wifi吗| 99国产综合亚洲精品| av网站在线播放免费| av欧美777| 久久人妻av系列| 黄片小视频在线播放| 99国产精品99久久久久| 国产精品.久久久| 中文字幕精品免费在线观看视频| 一级,二级,三级黄色视频| 色老头精品视频在线观看| 国产成人影院久久av| 999久久久精品免费观看国产| 国产成人av教育| 亚洲美女黄片视频| 午夜久久久在线观看| 1024香蕉在线观看| 免费一级毛片在线播放高清视频 | 午夜视频精品福利| 最新在线观看一区二区三区| 久热这里只有精品99| 精品国产乱子伦一区二区三区| 99精国产麻豆久久婷婷| 亚洲一区中文字幕在线| 老司机影院毛片| 在线观看舔阴道视频| 最近最新中文字幕大全免费视频| 国产视频一区二区在线看| 两性夫妻黄色片| 亚洲专区中文字幕在线| 成年女人毛片免费观看观看9 | 欧美日韩成人在线一区二区| 精品国产超薄肉色丝袜足j| 波多野结衣一区麻豆| 自线自在国产av| 最新在线观看一区二区三区| 亚洲av成人不卡在线观看播放网| 夜夜夜夜夜久久久久| 搡老岳熟女国产| 黄色丝袜av网址大全| 亚洲av成人av| 亚洲国产欧美网| 免费女性裸体啪啪无遮挡网站| 美女国产高潮福利片在线看| 男人的好看免费观看在线视频 | 一级毛片高清免费大全| 免费女性裸体啪啪无遮挡网站| 97人妻天天添夜夜摸| 欧美日韩成人在线一区二区| 精品一区二区三区四区五区乱码| 无遮挡黄片免费观看| 极品人妻少妇av视频| 激情在线观看视频在线高清 | 久久国产精品男人的天堂亚洲| 啦啦啦视频在线资源免费观看| а√天堂www在线а√下载 | 国产麻豆69| av在线播放免费不卡| 高潮久久久久久久久久久不卡| 日韩视频一区二区在线观看| 亚洲精品中文字幕在线视频| 国产精品免费大片| 视频区欧美日本亚洲| 一二三四在线观看免费中文在| 女人被狂操c到高潮| 亚洲精品粉嫩美女一区| 国产视频一区二区在线看| 777米奇影视久久| 五月开心婷婷网| 一区二区三区激情视频| 美女扒开内裤让男人捅视频| 午夜福利在线免费观看网站| 亚洲精品中文字幕在线视频| svipshipincom国产片| 国产av精品麻豆| 女人被躁到高潮嗷嗷叫费观| 成人影院久久| 亚洲av熟女| 国产男靠女视频免费网站|