• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Text-Independent Algorithm for Source Printer Identification Based on Ensemble Learning

    2022-11-10 02:31:20NaglaaElAbadyMohamedTahaandHalaZayed
    Computers Materials&Continua 2022年10期

    Naglaa F.El Abady,Mohamed Taha and Hala H.Zayed,2

    1Department of Computer Science,Faculty of Computers and Artificial Intelligence,Benha University,13518,Egypt

    2School of Information Technology and Computer Science(ITCS),Nile University,12677,Egypt

    Abstract:Because of the widespread availability of low-cost printers and scanners,document forgery has become extremely popular.Watermarks or signatures are used to protect important papers such as certificates,passports,and identification cards.Identifying the origins of printed documents is helpful for criminal investigations and also for authenticating digital versions of a document in today’s world.Source printer identification (SPI) has become increasingly popular for identifying frauds in printed documents.This paper provides a proposed algorithm for identifying the source printer and categorizing the questioned document into one of the printer classes.A dataset of 1200 papers from 20 distinct (13) laser and (7) inkjet printers achieved significant identification results.A proposed algorithm based on global features such as the Histogram of Oriented Gradient(HOG)and local features such as Local Binary Pattern (LBP) descriptors has been proposed for printer identification.For classification,Decision Trees (DT),k-Nearest Neighbors (k-NN),Random Forests,Aggregate bootstrapping (bagging),Adaptive-boosting(boosting),Support Vector Machine(SVM),and mixtures of these classifiers have been employed.The proposed algorithm can accurately classify the questioned documents into their appropriate printer classes.The adaptive boosting classifier attained a 96% accuracy.The proposed algorithm is compared to four recently published algorithms that used the same dataset and gives better classification accuracy.

    Keywords:Document forensics;source printer identification (SPI);HOG;LBP;principal component analysis(PCA);bagging;AdaBoost

    1 Introduction

    In the early modern era,documents in digital format and their use became more common due to the fast development of advanced and sophisticated technologies.Nowadays,avoiding utilizing them is almost Impossible.Official contract images,invoices,contracts,bills,checks,and scientific literature are digital documents.These documents are unsecure because they lack the necessary security measures.Manipulation of documents has become more accessible as a result of this limitation.These operations are simple to carry out with the help of efficient technologies such as printers and scanners.After scanning the original document,the scanned image has readily been tampered with.As a result,before relying on a document,it is necessary to verify its authenticity.In most cases,active approaches are used to authenticate documents.These approaches are extensively used to protect digital documents[1,2],such as a watermark or signature.These strategies add different extrinsic fingerprints to the document,which can be easily traced if disturbed.However,because such technology is costly and time-consuming,it is impossible to utilize it for all publications.Another strategy is passive,which is based on the intrinsic properties of document images.The fingerprints of hardware and could be used as intrinsic features to prove the authenticity of the document.knowing the source printer might be incredibly beneficial when looking for modifications in printed documents.Each printer has a distinct printing style.This component can be used to inspect the printed document and trace it back to the printer that was used.

    When a printed document is scanned,it becomes a traditional pattern recognition problem with feature extraction and classification[3].Chemical or microscopic techniques are used in traditional approaches,which are time-consuming and can harm or even destroy the investigated documents.As a result,all what is required for digital approaches is a scanner and a computer.Several methodologies[4-7],including as examination and machine learning-based approaches,have been developed in the relevant literature.Text-dependent and text-independent approaches are the two primary categories of techniques proposed in the literature.The majority of text-dependent approaches depend on character or word-level imperfections introduced by printers.Despite their effectiveness,such procedures necessarily involve the comparison of semantically similar units(characters or words).Either pre-divided characters(or words)or the integration of an Optical Character Recognition(OCR)system that allows for the comparison of identical characters words is required.Text-independent approaches are more relevant to real-world applications,although they need a huge amount of training data to simulate printer discrimination.Text-independent approaches,on the other hand,are not content-specific and often recommend the use of statistical features acquired from a large number of observations(paragraphs or images).

    This paper proposes a feature-based classification of source printers based on scanned images of printed papers.The following are the main contributions:

    ? Detect forged documents with high accuracy using source printer identification.

    ? Identifying the source printer and categorizing the questioned document into one of the printer classes.

    ? Investigate the global and local characteristics of the entire printed documents without using pre-divided characters(or words)or the usage of an OCR system.

    ? Propose and construct an efficient document classifier capable of identifying a foreign document from a set of questioned documents printed on a separate printer.

    The following is how the rest of the paper is structured:Section 2 highlights related work,while Section 3 discusses the details of the suggested method.Section 4 describes the results of the conducted experiments along with an elaborate discussion of these results and a comparison with related work reported in literature.Section 5 concludes the paper.

    2 Related Works

    Detecting document tampering can be done in a variety of ways.The majority of these approaches detect the source of the variations to determine the likelihood of alteration.Other approaches search for the source printer of document images to authenticate the documents.This section will go over the most common methods for authenticating a document and confirming that it was printed by a legal printer.These methods are classified into two types:text-dependent (Local features are examined)and text-independent (global features are examined).Tab.1 depicts a summary of (Source Printer Identification)SPI techniques based on printed documents.

    Table 1:Summary of SPI Techniques based on printed documents

    2.1 Text-Dependent Approaches

    Text-dependent approaches typically depend on character or word-level constraints imposed by printers.Such approaches require the comparison of semantically related components (characters or words).Generally,it needs the use of either pre-divided words (or characters) or incorporating an OCR system that permits the comparison of identical words or characters.Mikkilineni et al.suggested a texture feature-based descriptor-based method for detecting the source of a document in[3].It examines the document’s connected components(CCs)or characters,as well as the statistics of some specific,frequently occurring characters,such as“e”or“a”for indications of alteration.Text documents scanned at a resolution of 2400 dpi were taken into consideration.For this experiment,all “e”letters were used.The Gray-Level Co-occurrence Matrix (GLCM) was applied to extract 22 statistical features per character to create a feature vector.‘Each feature vector is classified individually using a 5-Nearest-Neighbor (5NN) classifier.Different texture feature extraction methods,such as Discrete Wavelet Transform (DWT) and GLCM,are used in[8]to examine the Chinese printed source and determine the impact of different output devices.When 12 printers were examined,they achieved an identification accuracy rate of 98.4%.Kong[9],proposed the first attempt to differentiate documents produced by an inkjet printer,copier,and laser printer based on attributes obtained from unique characters in the documents.The document’s signatures from the standard device(s)that were used to make the document are evaluated.The experimental results showed that the accuracy reached 90%for all the inkjet printers and most laser printers and copiers.Ferreira et al.[10],proposed three solutions for identifying laser printers.In these solutions,low-resolution scanned documents were employed.The first technique applied two descriptors based on multi-directional and multi-scale textural features of micro-patterns.Letters or areas of interest were used to create these descriptions.As a second descriptor,the Convolution Texture Gradient Filter(CTGF)was proposed.The third method had the advantage of identifying a document’s printing source even if portions of it were unavailable.For frames,characters,and documents,the accuracy of the first method was 98.38%,97.60%,and 88.58%,respectively.The accuracy rates for frames and papers were 94.19%and 88.45%,respectively.

    In a system proposed in[11],all of the printed letters were used at the same time to identify the source printer from scanned images of printed documents.A single classifier is used to classify all printed letters,as well as local texture patterns-based features.From scanned images,letters are extracted.Each character is separated into a flat and an edge region,and local binary patterns for these two regions are calculated individually.The method was tested on a public dataset of 10 printers as well as a new dataset of 18 printers scanned at 600 and 300 dpi resolution and printed in four different fonts.The system can simultaneously deal with all the printed letters and use a single classifier outperforming existing hand-crafted feature-based methods.In[12],The authors proposed a solution for the printer attribution problem that can learn discriminative features directly from available training data.The back-propagation process and convolutional neural networks are used in the solution.The method is based on artifacts extracted from various letters of texts in various languages.The authors were able to achieve a 98%accuracy by employing various representations of raw data as input to a Convolutional Neural Network(CNN).Tsai et al.proposed a four-layered CNN architecture for SPI from documents in[13]and compared the results to hand-crafted features.In[14],proposed a deep learning approach to address the difficult image classification problem.Textual documents are classified with an accuracy of 98.4 percent,while natural image-based scanned documents are classified with an accuracy of 99.96 percent,using a 7-layered CNN.Authors reported textual and image-based document accuracy of 97.37 percent and 97.7 percent,respectively,after raising the layers to 13.

    2.2 Text Independent Approaches

    Text independent strategies look at the entire document at the same time.The algorithms in this category examine statistical properties such as noise across the document to detect modifications.The number of studies in this category is relatively small.Automatically source printers are identified using common-resolution scans(400 dpi)[15].The proposed system is based on the printer’s unique noise.The overall categorization accuracy was 76.75%.A text-independent method for an adequate description of source printers using deep visual Features has been implemented by[16].Using transfer learning on a pre-trained CNN,the system detected 1200 documents from 20 different(13)laser and(7)inkjet printers.In[17],the authors presented a document source printer with a passive technique.Some of the feature extraction techniques that have been used include Key Printer Noise Features(KPNF),Speeded Up Robust Features (SURF),and orientated FAST rotated and BRIEF (ORB).For the classification job,three classification strategies are considered:k-NN,random forest,DT,and the majority vote of these three classification techniques.The system achieved the best accuracy of 95.1%by combining KPNF,ORB,and SURF with a random forest classifier and adaptive boosting technique.For printer attribution,a novel technique based on (SURF),Oriented Fast Rotated,and BRIEF feature descriptors is proposed in[18].Random Forest,Naive Bayes,k-NN,and other combinations of these classifiers were employed for classification.The proposed model is capable of accurately classifying the questioned documents into the appropriate printer.The accuracy was 86.5%using a combination of Naive Bayes,k-NN,and random forest classifiers,as well as a simple majority voting system and adaptive boosting algorithms.In[19],the authors proposed a system for distinguishing inkjet-printed pages from laser-printed pages based on differences in edge roughness.The whole process used,appropriate intrinsic features from the document image are extracted in the first step.The extracted features are compared in the second step to identify documents that did not use the similar printing technique as most of the documents.The key advantage of this technique is that it does not require any prior experience with genuine documents.

    3 The Proposed Algorithm

    On every printed page,there are some fingerprints left by the printer.Every printer has its own set of fingerprints.These fingerprints are a printer’s distinguishing feature.This research provides an algorithm for identifying the source printer and categorizing the questioned document into one of the printer types.The proposed algorithm is depicted in Fig.1 in two steps.The training phase includes preprocessing,feature extraction,and classification.The testing phase is similar to the training phase after adding the prediction.

    The printed document image is cropped from the beginning of the image to three equal images(top,middle,and bottom).Then each image in every collection is cropped to 1024X 1024 pixels.For each image in the collection,global feature descriptor vectors are extracted using HOG features.Using LBP features,local feature descriptor vectors are extracted for each image.For training purposes,both HOG and LBP feature vectors are concatenated.To create the trained models,the proposed algorithm is trained using DT,k-NN,SVM,a combination of them,Bagging,Boosting,and random forest classifiers.For testing purposes,HOG and LBP feature vectors are also concatenated.By inputting the HOG and LBP features of the questioned documents,we can use the trained models to predict the class of the documents.

    Figure 1:The proposed algorithm diagram

    3.1 Preprocessing

    Because the size of the input image is too large,applying the proposed algorithm takes a long time.As a result,resizing the input document image will decrease feature extraction time.To avoid this issue,each document image is cropped from the beginning of the image to three equal images(top,middle,and bottom).Then each image in every collection is cropped to 1024X 1024 pixels,as shown in Fig.2.These cropped photos are then used to extract features.An extra benefit of cropping an image is the generation of the part containing fingerprints left by the printer.

    Figure 2:Samples of document images used in the proposed algorithm.(a)at the top(b)at the middle(c)at the bottom

    3.2 Feature Extraction

    Two feature extraction strategies are utilized in the proposed algorithm.The HOG is used first.The HOG is a robust feature descriptor that uses an intensive feature extraction technique.It retrieves features from all an image’s location areas of interest.HOG extracts the object structures from the gradient information in a picture[16].The feature extraction steps using HOG consist of preprocessing,calculating the gradient directions,and Gradient Magnitude from Eqs.(1)and(2).A HOG features vector is generated by combining the gradient calculations of each pixel,as shown in Fig.3.Generating a histogram for each block by using gradients value.Calculating the normalization[20]of the histograms.

    whereGxandGyare Gradient magnitude in x and y direction.

    Figure 3:Gradient Directions(left),Gradient Magnitude(right)

    In the proposed system,the default ExtractHOGFeatures of MATLAB is used with cell size 128*128.Fig.4 shows the input image and visual HOG feature Extraction.

    Figure 4:Input image and visual HOG feature extraction

    Finally,one of the operators used to extract texture characteristics is Local Binary Pattern(LBP)used in[21-23].It calculates the image’s local contrast.The LBP is first specified in an eight-pixel radius around the grey value center pixel.The LBP is easy to use and has a low processing complexity,as indicated in Eq.(3).

    wheregp,gc(P=0,1,...,P-1)are intensity values of central pixel and neighboring pixels.P.denotes the number of pixels in the neighboring pixels.The Calculation process of the original LBP is shown in Fig.5

    The default of LBP is used in the proposed algorithm,with an average number of neighbors of 8,a radius of 1,and a cell size 256*256.

    3.3 Classification

    A model-training algorithm that uses a feature set as input is called a classifier.A classifier creates a model when the training dataset has successfully trained it.The test data is then classified using this model.Depending on the problem,multi-class or binary classifiers may be used.There are two types of classifiers,single and ensemble[24].Single classifiers such as decision tree (DT)[25,26],K-Nearest Neighbors (K-NN)[27],and Support Vector Machine (SVM)[28].Ensemble classifiers such as Random Forests(RF)[29],Adaptive-Boosting(Boosting)[30],and Aggregate Bootstrapping(Bagging)[31,32].In this paper,the two types are used and generate trained models,which are stored to be used later in the prediction process in the testing phase.

    3.4 Trained Models and Prediction

    Following the classification technique outlined in the previous section,a group of trained models,including the DT model,KNN model,SVM model,DT-KNN model,DT-SVM model,KNN-SVM model,RF model,boosting model,and Bagging model,are generated.Use the obtained trained models provided after applying various classifiers to predict the type of printer during the testing phase.Choose a model with a high level of accuracy

    3.5 Principal Component Analysis(PCA)

    PCA is one of the greatest widely used approaches for reducing data dimensionality.PCA can reduce the dimensions of multi-variables while still maintaining the relationship of data as much as possible.PCA is an unsupervised learning method that employs input data regardless of the target output.To reduce the dimension of a feature vector,PCA uses four steps[33]:normalize the image,calculate the covariance matrix,compute eigenvectors and related eigenvalues,and transform the original data into the new reduced feature vector.

    The experimental results based on the classifiers stated above and their combinations are discussed in the next section.

    4 Experimental Results and Discussion

    The proposed algorithm is implemented using MATLAB R2019b and was run and verified with a DELL PC machine with the following configuration:Intel (R) Core (TM) i5-2430 M CPU @2.40 GHz,and 12.00 GB of RAM,64-bit Windows 10.Several experiments were carried out to evaluate the proposed algorithm’s performance.Section 4.1 describes the datasets utilized to train and test the proposed algorithm.The setup of the experiment is provided in Section 4.2.Evaluation measures are offered in Section 4.3.The fourth subsection,introduces a discussion of results.Finally,a comparison with other techniques is discussed.

    4.1 Datasets Description

    The experimental findings for the proposed algorithm were obtained using Khanna et al.’s public’s dataset[34].The documents in this collection were printed on 13 laser printers and 7 inkjet printers.Each printer is given a total of 50 documents to consider.A printer’s documents are all one-of-a-kind.The dataset contains documents from three categories:contracts,invoices,and scientific papers.The contract only contains text but in different font types and sizes.A contract will never contain pictures,lines and diagrams.The invoices feature different font sizes,logos,composed of a small picture and colored text.The contracts and invoices documents were created artificially.The Scientific Literature consists of real-world examples.All documents of the scientific literature type originally have been released under a license that allows reusing them.The printer model’s datasets used in this paper are listed in Tab.2.

    Table 2:Printer models in the dataset

    (Continued)

    Table 2:Continued

    4.2 The Experiment’s Setup

    The entire dataset is divided into two parts:80%of the data is used as a training dataset,while the rest 20%is used as a testing dataset.The suggested system’s effectiveness is also evaluated using the 10-fold cross-validation technique.To classify the data,this work considers six classifiers:DT,SVM,KNN,their combinations,random forest,bagging,and boosting.

    4.3 Evaluation Metrics

    The performance of the proposed algorithm is assessed using a variety of evaluation metrics,including accuracy,recall,precision,and F-measure metrics[15,35,36].

    The accuracy is calculated using the formula shown in Eq.(4)and is defined as the percent ratio of successfully identified documents.

    where TP stands for the number of correctly classified samples,FP for the number of wrongly classified samples,TN for the number of correctly rejected samples,and FN for the number of wrongly rejected samples.The recall is the percentage of real positive instances compared to all positive cases that are correctly classified.It’s also called the true positive rate(TPR),and it’s calculated with the following Eq.(5):

    Precision is also known as a positive predictive value,and it can be calculated using the formula:

    The F-measure is calculated as follows[37]:

    Tab.3 depicts the proposed algorithm’s recall,precision,and F-score.

    Table 3:Recall,precision,and f-score of the proposed algorithm

    4.4 Discussion

    In this algorithm,the image is partitioned into three parts:top,middle,and bottom.The algorithm was trained and tested for all three parts.However,the top part yielded the best results because it contains most of the printer’s fingerprints see the result in Tabs.4-6.For partitioning technique and bagging and boosting classifiers,recognition rates of 94.5%and 96%were attained,respectively.Figs.6,7 and Tab.4 illustrate that a 90.5% and 92.5% recognition rate was attained using a 10-fold cross-validation technique and bagging and boosting classifiers,respectively.The confusion matrix of employing AdaBoost methodology for HOG+LBP with partition technique is shown in Tab.7.When PCA is applied for dimension reduction,feature vectors decrease from 2708 to 1000.Using PCA,a 90%and 90%recognition rate was attained for the partitioning technique with bagging and boosting classifiers.With a 10-fold cross-validation technique with bagging and boosting classifiers,a recognition rate of 90.5%and 92.5%was attained,as depicted in Tab.8,Figs.8 and 9.The confusion matrix using AdaBoost methodology for HOG + LBP + PCA with partition technique is shown in Tab.9.Several experiments revealed that our system could achieve an accuracy rate of 96% by combining HOG and LBP with a boosting classifier.

    Table 4:Accuracy achieved using dividing technique and using a 10-fold cross-validation technique(Top part)

    Classifier Dividing technique 10-fold cross-validation HOG(%) LBP(%) HOG+LBP(%)HOG(%) LBP(%) HOG+LBP(%)Bagging 91.5 89 94.5 89 84.3 90.5 Boosting 94 90.5 96 90.5 89.1 92.5 Random forest 90 86.5 90.5 86.3 84.7 87.9

    Classifier Dividing technique 10-fold cross-validation HOG(%) LBP(%) HOG+LBP(%)HOG(%) LBP(%) HOG+LBP(%)Decision Tree(DT)51.7 57.1 56.3 47.9 51.8 56.3 SVM 66.7 22.9 66.7 64.1 20.3 66.7 KNN1 45 43.3 46.7 45.7 41.6 46.7 KNN3 40.2 40.8 42.1 41.7 39.3 42.1 KNN5 41.7 37.1 42.9 42.5 36 42.9 DT+SVM 55 44.2 47.9 76.3 74.1 80.4 DT+KNN 45.8 45.4 47.9 79.3 75.4 86.7 SVM+KNN 45.8 41.7 50 72.3 68.5 77.9 DT+SVM+KNN 48.3 47.1 53.3 50.8 43.4 53.3 Bagging 81.3 75.4 80.4 53.5 39.5 50 Boosting 83.3 79.17 86.7 45.1 42.6 47.9 Random forest 75.8 75 77.9 47 40.2 47.9

    Table 6:Accuracy achieved using dividing technique and using a 10-fold cross-validation technique(Bottom part)

    Figure 6:The accuracy achieved using the dividing technique(Top part)

    Figure 7:Accuracy was achieved using a 10-fold cross-validation technique(Top part)

    Table 7:Confusion matrix of using AdaBoost methodology for HOG+LBP with dividing technique

    Table 8:Accuracy achieved using dividing technique and using 10-fold cross-validation technique and PCA(Top part)

    Figure 8:Accuracy achieved using dividing technique and PCA(Top part)

    Figure 9:Accuracy achieved using a 10-fold cross-validation technique(Top part)

    Table 9:Confusion matrix of using AdaBoost methodology for HOG+ LBP + PCA with dividing technique(Top part)

    4.5 Comparison with Other Techniques

    Despite the fact that much research on SPI has been proposed,it has all been analyzed using different datasets and experimental setups.As previously mentioned,many studies employ individual characters in a text-dependent framework for experimental purposes.Elkasrawi et al.[15],CNN[16],KPNF+SURF+ORB[17],and SURF and ORB with AdaBoost[18]are some current algorithms that the proposed technique is compared to.Comparison with related work on the dataset of 20 printers is highlighted in Tab.10.On both textural and deep learned features,our proposed algorithm employing HOG and LBP with Adaboost outperforms[15-17]and[18],as shown in Fig.10.It is obvious that the proposed algorithm using both HOG and LBP and testing the whole document outperforms the other four algorithms previously reported in literature.

    Figure 10:Comparison with related work on the dataset of 20 printers

    Table 10:Comparison with related work on the dataset of 20 printers

    5 Conclusion

    This paper proposes a text-independent algorithm for detecting document forgeries based on source printer identification SPI.The classifier’s goal is to determine the type of printer that produced the printed documents.The document classifier can classify an odd document out of several tested documents.In this research,the image is partitioned into three parts:top,middle,and bottom.HOG and LBP are used as feature extraction methodologies.For printer identification,classification methodologies such as decision tree,k-NN,SVM,random forest,bagging,and boosting are considered.A public dataset of printed documents from various printers is used to validate the results.Several experiments with multiple classifiers were performed,and the most efficient classifier was chosen.The algorithm was trained and tested for all three parts.However,the Top part yielded the best results because it contains most of the printer’s fingerprints.The AdaBoost classifier achieves the highest classification accuracy (96%) on our proposed algorithm.The proposed algorithm is compared to four recently published algorithms that used the same dataset and gives better classification accuracy.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to be reported regarding the present study.

    老熟妇仑乱视频hdxx| 国产在线观看jvid| 亚洲色图综合在线观看| 熟女少妇亚洲综合色aaa.| 久久久精品国产亚洲av高清涩受| 99精品欧美一区二区三区四区| 在线观看免费视频网站a站| 国产精品免费视频内射| 日日爽夜夜爽网站| 久久 成人 亚洲| 欧美精品啪啪一区二区三区 | 久久久国产一区二区| 亚洲国产欧美在线一区| 18禁裸乳无遮挡动漫免费视频| 麻豆国产av国片精品| 久久久精品免费免费高清| 国产高清videossex| 777米奇影视久久| 亚洲免费av在线视频| 午夜成年电影在线免费观看| 91麻豆av在线| 国产精品免费大片| 法律面前人人平等表现在哪些方面 | 亚洲国产日韩一区二区| 亚洲精品久久成人aⅴ小说| 国产高清视频在线播放一区 | 在线观看免费日韩欧美大片| 涩涩av久久男人的天堂| 如日韩欧美国产精品一区二区三区| 欧美激情高清一区二区三区| 久久人妻福利社区极品人妻图片| 天堂中文最新版在线下载| 亚洲国产精品一区二区三区在线| 国产精品香港三级国产av潘金莲| 18禁国产床啪视频网站| 人人妻人人澡人人爽人人夜夜| 人人妻人人澡人人爽人人夜夜| cao死你这个sao货| 99精品久久久久人妻精品| 操美女的视频在线观看| 一区在线观看完整版| 国产成人影院久久av| 大型av网站在线播放| 热99久久久久精品小说推荐| 又紧又爽又黄一区二区| 亚洲熟女毛片儿| 精品国产国语对白av| 欧美另类一区| 人人妻人人澡人人看| 国产成人精品无人区| 十八禁网站网址无遮挡| 97在线人人人人妻| 国产精品99久久99久久久不卡| av国产精品久久久久影院| 十分钟在线观看高清视频www| 国产黄色免费在线视频| 午夜福利在线免费观看网站| 在线观看免费视频网站a站| 少妇粗大呻吟视频| av不卡在线播放| 国产一区二区 视频在线| 99热网站在线观看| 亚洲激情五月婷婷啪啪| 日韩熟女老妇一区二区性免费视频| 精品视频人人做人人爽| 三上悠亚av全集在线观看| 亚洲一区中文字幕在线| 国精品久久久久久国模美| 美女扒开内裤让男人捅视频| 国产精品秋霞免费鲁丝片| 久久ye,这里只有精品| 水蜜桃什么品种好| 青春草视频在线免费观看| 51午夜福利影视在线观看| 久久久久精品人妻al黑| 男人添女人高潮全过程视频| 成人av一区二区三区在线看 | 精品国产一区二区三区四区第35| 午夜视频精品福利| 欧美日韩国产mv在线观看视频| 国产精品一区二区在线不卡| 99久久精品国产亚洲精品| 最近最新免费中文字幕在线| 午夜福利免费观看在线| 他把我摸到了高潮在线观看 | 飞空精品影院首页| 欧美激情久久久久久爽电影 | 黄色 视频免费看| 中文精品一卡2卡3卡4更新| av网站免费在线观看视频| 久久狼人影院| 91字幕亚洲| 亚洲专区国产一区二区| 美女福利国产在线| 国产高清videossex| 首页视频小说图片口味搜索| 欧美日韩视频精品一区| 亚洲一码二码三码区别大吗| 性高湖久久久久久久久免费观看| 考比视频在线观看| 亚洲少妇的诱惑av| 不卡一级毛片| 手机成人av网站| 亚洲av成人一区二区三| 久久国产精品人妻蜜桃| 91麻豆av在线| 精品国产一区二区久久| av超薄肉色丝袜交足视频| 99精国产麻豆久久婷婷| 男女床上黄色一级片免费看| 青春草视频在线免费观看| 久久人人97超碰香蕉20202| 欧美日韩精品网址| 久久精品国产综合久久久| 亚洲国产精品一区三区| 亚洲成国产人片在线观看| 国产av又大| 久久精品国产亚洲av高清一级| 日本黄色日本黄色录像| 国产精品香港三级国产av潘金莲| 伊人久久大香线蕉亚洲五| 丰满饥渴人妻一区二区三| 欧美国产精品va在线观看不卡| 亚洲精品av麻豆狂野| 国产人伦9x9x在线观看| 在线av久久热| 欧美人与性动交α欧美精品济南到| 日韩欧美免费精品| 日韩三级视频一区二区三区| 乱人伦中国视频| 蜜桃国产av成人99| 国产精品1区2区在线观看. | 人人妻,人人澡人人爽秒播| 动漫黄色视频在线观看| 女性被躁到高潮视频| 丝袜美足系列| 啦啦啦中文免费视频观看日本| 正在播放国产对白刺激| 大片电影免费在线观看免费| 亚洲国产av影院在线观看| av福利片在线| 麻豆国产av国片精品| 桃红色精品国产亚洲av| 美女大奶头黄色视频| 少妇裸体淫交视频免费看高清 | 成年人黄色毛片网站| 亚洲精品自拍成人| 肉色欧美久久久久久久蜜桃| videosex国产| 亚洲国产日韩一区二区| 国产av一区二区精品久久| 美女中出高潮动态图| 天天躁狠狠躁夜夜躁狠狠躁| av线在线观看网站| 欧美 日韩 精品 国产| 一级黄色大片毛片| 国产精品99久久99久久久不卡| 老司机亚洲免费影院| 我要看黄色一级片免费的| 亚洲欧美一区二区三区久久| 在线观看免费高清a一片| 日日夜夜操网爽| av国产精品久久久久影院| 精品国产乱子伦一区二区三区 | 日韩 欧美 亚洲 中文字幕| av在线老鸭窝| 十八禁高潮呻吟视频| 欧美+亚洲+日韩+国产| 成人av一区二区三区在线看 | 亚洲国产欧美一区二区综合| cao死你这个sao货| 交换朋友夫妻互换小说| 亚洲av欧美aⅴ国产| 伊人亚洲综合成人网| 永久免费av网站大全| 狠狠狠狠99中文字幕| 久久99一区二区三区| 满18在线观看网站| 人成视频在线观看免费观看| 交换朋友夫妻互换小说| 老鸭窝网址在线观看| 美女大奶头黄色视频| 最近最新免费中文字幕在线| 色精品久久人妻99蜜桃| 一级片免费观看大全| 久久天躁狠狠躁夜夜2o2o| 亚洲精品日韩在线中文字幕| 最新的欧美精品一区二区| 日韩大码丰满熟妇| 汤姆久久久久久久影院中文字幕| 汤姆久久久久久久影院中文字幕| 桃红色精品国产亚洲av| 香蕉国产在线看| 亚洲一卡2卡3卡4卡5卡精品中文| 男人操女人黄网站| 一进一出抽搐动态| 性少妇av在线| 少妇的丰满在线观看| 国产男女内射视频| 高清av免费在线| svipshipincom国产片| 精品一区在线观看国产| 久久热在线av| 精品少妇久久久久久888优播| 一区二区三区四区激情视频| 国产99久久九九免费精品| 久久国产亚洲av麻豆专区| 咕卡用的链子| 波多野结衣av一区二区av| 黄色视频,在线免费观看| 欧美亚洲 丝袜 人妻 在线| 精品熟女少妇八av免费久了| 亚洲精品国产一区二区精华液| 国产成人啪精品午夜网站| 美女扒开内裤让男人捅视频| 久久综合国产亚洲精品| 免费一级毛片在线播放高清视频 | svipshipincom国产片| 免费在线观看视频国产中文字幕亚洲 | 91成人精品电影| 天堂中文最新版在线下载| svipshipincom国产片| 性色av一级| av天堂在线播放| 亚洲成人免费av在线播放| 亚洲第一av免费看| 国产精品国产av在线观看| 欧美黑人欧美精品刺激| 国产免费现黄频在线看| 免费观看av网站的网址| 最近最新免费中文字幕在线| 如日韩欧美国产精品一区二区三区| 日韩有码中文字幕| 丰满迷人的少妇在线观看| 丁香六月欧美| 我要看黄色一级片免费的| 一二三四在线观看免费中文在| 建设人人有责人人尽责人人享有的| 欧美亚洲日本最大视频资源| 人人妻,人人澡人人爽秒播| 久久狼人影院| 国产精品二区激情视频| 国产成人精品在线电影| 男女下面插进去视频免费观看| 日韩大码丰满熟妇| bbb黄色大片| 欧美另类亚洲清纯唯美| 人人澡人人妻人| 亚洲国产欧美网| 97人妻天天添夜夜摸| 少妇粗大呻吟视频| 国产精品久久久av美女十八| 国产不卡av网站在线观看| 国产在线免费精品| 久久香蕉激情| 亚洲成国产人片在线观看| 男女高潮啪啪啪动态图| 中文字幕色久视频| 成人国产av品久久久| 人成视频在线观看免费观看| 亚洲色图 男人天堂 中文字幕| 日本vs欧美在线观看视频| 亚洲国产中文字幕在线视频| 亚洲色图综合在线观看| 免费日韩欧美在线观看| 999久久久精品免费观看国产| 男女午夜视频在线观看| 久久精品aⅴ一区二区三区四区| 国产欧美日韩精品亚洲av| 国内毛片毛片毛片毛片毛片| 日韩大码丰满熟妇| 少妇人妻久久综合中文| 久久久久精品国产欧美久久久 | 欧美精品av麻豆av| 一区二区三区四区激情视频| 两性午夜刺激爽爽歪歪视频在线观看 | 精品欧美一区二区三区在线| 成人18禁高潮啪啪吃奶动态图| 中文字幕av电影在线播放| 欧美精品啪啪一区二区三区 | 午夜福利一区二区在线看| 女人久久www免费人成看片| 啪啪无遮挡十八禁网站| 操出白浆在线播放| svipshipincom国产片| 真人做人爱边吃奶动态| 九色亚洲精品在线播放| av线在线观看网站| kizo精华| 免费观看人在逋| 日本av免费视频播放| 91麻豆av在线| 中文字幕av电影在线播放| 9热在线视频观看99| 亚洲 国产 在线| 欧美黑人精品巨大| 欧美激情极品国产一区二区三区| 欧美在线一区亚洲| 三级毛片av免费| 中文字幕最新亚洲高清| 一本久久精品| 热re99久久精品国产66热6| 欧美av亚洲av综合av国产av| 十八禁网站免费在线| 69av精品久久久久久 | 欧美精品一区二区免费开放| 可以免费在线观看a视频的电影网站| 高潮久久久久久久久久久不卡| 老司机亚洲免费影院| 亚洲精品国产av蜜桃| 少妇被粗大的猛进出69影院| 国产精品自产拍在线观看55亚洲 | 日韩 亚洲 欧美在线| 日韩欧美国产一区二区入口| 欧美老熟妇乱子伦牲交| 精品免费久久久久久久清纯 | 亚洲国产欧美日韩在线播放| 亚洲中文日韩欧美视频| 国产免费av片在线观看野外av| 精品熟女少妇八av免费久了| 欧美日韩av久久| 国产三级黄色录像| 国产精品欧美亚洲77777| 欧美+亚洲+日韩+国产| 色精品久久人妻99蜜桃| 精品高清国产在线一区| h视频一区二区三区| 免费在线观看黄色视频的| 午夜激情av网站| 90打野战视频偷拍视频| www.熟女人妻精品国产| 乱人伦中国视频| 久久天躁狠狠躁夜夜2o2o| 婷婷丁香在线五月| 9191精品国产免费久久| 欧美亚洲日本最大视频资源| 午夜福利一区二区在线看| 免费观看av网站的网址| 黄色片一级片一级黄色片| 人人澡人人妻人| 侵犯人妻中文字幕一二三四区| 天天影视国产精品| 久久女婷五月综合色啪小说| 后天国语完整版免费观看| www.熟女人妻精品国产| 成年人午夜在线观看视频| videos熟女内射| 亚洲精品美女久久av网站| 免费高清在线观看视频在线观看| 2018国产大陆天天弄谢| 亚洲专区字幕在线| 乱人伦中国视频| 国产三级黄色录像| 如日韩欧美国产精品一区二区三区| svipshipincom国产片| 久久精品亚洲熟妇少妇任你| 精品人妻一区二区三区麻豆| 啦啦啦 在线观看视频| 久久九九热精品免费| 伦理电影免费视频| 777久久人妻少妇嫩草av网站| 亚洲欧美色中文字幕在线| 19禁男女啪啪无遮挡网站| 桃红色精品国产亚洲av| 男女高潮啪啪啪动态图| 亚洲一区中文字幕在线| 在线观看一区二区三区激情| 99国产综合亚洲精品| 极品人妻少妇av视频| 91精品伊人久久大香线蕉| 女人被躁到高潮嗷嗷叫费观| 99精品欧美一区二区三区四区| 18在线观看网站| www.熟女人妻精品国产| 黄色视频在线播放观看不卡| 美女午夜性视频免费| 久久人妻熟女aⅴ| 在线av久久热| 一本久久精品| 国产亚洲av片在线观看秒播厂| 亚洲性夜色夜夜综合| 国产黄频视频在线观看| 制服人妻中文乱码| 亚洲熟女毛片儿| 人妻一区二区av| 汤姆久久久久久久影院中文字幕| 正在播放国产对白刺激| 免费在线观看视频国产中文字幕亚洲 | 精品国产超薄肉色丝袜足j| 纯流量卡能插随身wifi吗| www.999成人在线观看| 后天国语完整版免费观看| 日本av手机在线免费观看| 蜜桃国产av成人99| 国产欧美亚洲国产| 人人妻人人澡人人看| 大片免费播放器 马上看| 99国产极品粉嫩在线观看| 大陆偷拍与自拍| 十分钟在线观看高清视频www| 国产在视频线精品| 国产精品久久久av美女十八| 最近最新中文字幕大全免费视频| 国产亚洲欧美精品永久| 9热在线视频观看99| 少妇被粗大的猛进出69影院| 丝袜人妻中文字幕| 丰满迷人的少妇在线观看| 不卡一级毛片| av有码第一页| 国产麻豆69| 日韩免费高清中文字幕av| 国产一区有黄有色的免费视频| 国产福利在线免费观看视频| 国产亚洲午夜精品一区二区久久| 亚洲精品第二区| 男女床上黄色一级片免费看| 欧美人与性动交α欧美精品济南到| 黄色毛片三级朝国网站| 99国产极品粉嫩在线观看| 免费女性裸体啪啪无遮挡网站| 国产亚洲欧美精品永久| 一二三四在线观看免费中文在| 久久亚洲国产成人精品v| 国产欧美日韩一区二区精品| 日日爽夜夜爽网站| 亚洲少妇的诱惑av| 满18在线观看网站| 亚洲欧洲精品一区二区精品久久久| 激情视频va一区二区三区| 欧美激情极品国产一区二区三区| 亚洲国产av影院在线观看| 欧美人与性动交α欧美软件| 国产精品香港三级国产av潘金莲| 久久免费观看电影| 女人精品久久久久毛片| 国产成+人综合+亚洲专区| 久久精品熟女亚洲av麻豆精品| 亚洲精华国产精华精| 国产黄频视频在线观看| 国产成人av激情在线播放| 纯流量卡能插随身wifi吗| 俄罗斯特黄特色一大片| av网站在线播放免费| 精品少妇一区二区三区视频日本电影| 欧美黑人欧美精品刺激| 99久久国产精品久久久| av不卡在线播放| 亚洲视频免费观看视频| 亚洲一卡2卡3卡4卡5卡精品中文| 亚洲欧美一区二区三区久久| 日韩电影二区| 香蕉国产在线看| 咕卡用的链子| 一区二区日韩欧美中文字幕| tocl精华| 亚洲精品国产av成人精品| 日韩欧美一区视频在线观看| 日本av免费视频播放| 两性午夜刺激爽爽歪歪视频在线观看 | 黑人操中国人逼视频| 久久久久精品人妻al黑| 成人18禁高潮啪啪吃奶动态图| 欧美黑人精品巨大| 99久久国产精品久久久| 国产成人av激情在线播放| 一个人免费看片子| 欧美成狂野欧美在线观看| 亚洲专区字幕在线| 亚洲男人天堂网一区| 国产97色在线日韩免费| 一区二区三区激情视频| 亚洲性夜色夜夜综合| 真人做人爱边吃奶动态| 成年人免费黄色播放视频| 人人妻人人添人人爽欧美一区卜| 精品少妇黑人巨大在线播放| 亚洲国产精品一区三区| 久久毛片免费看一区二区三区| 午夜成年电影在线免费观看| 韩国精品一区二区三区| 最黄视频免费看| 999精品在线视频| 又大又爽又粗| www日本在线高清视频| 成年美女黄网站色视频大全免费| 夜夜骑夜夜射夜夜干| 久久99一区二区三区| 国产精品1区2区在线观看. | 午夜福利视频精品| 啦啦啦 在线观看视频| 久久影院123| 欧美在线黄色| 777米奇影视久久| tube8黄色片| 精品一区二区三区四区五区乱码| 国产亚洲一区二区精品| 日韩欧美免费精品| 一区二区三区四区激情视频| 国产不卡av网站在线观看| 少妇的丰满在线观看| 人人妻,人人澡人人爽秒播| 国产一区二区三区av在线| 超碰成人久久| 一个人免费在线观看的高清视频 | 啦啦啦中文免费视频观看日本| 国产亚洲精品第一综合不卡| 精品国产乱码久久久久久小说| 美女国产高潮福利片在线看| 精品久久久久久久毛片微露脸 | 亚洲精品av麻豆狂野| 天天影视国产精品| a在线观看视频网站| a级毛片黄视频| 精品少妇黑人巨大在线播放| 久久久精品94久久精品| 性色av一级| 成人免费观看视频高清| 久久这里只有精品19| 午夜两性在线视频| 大陆偷拍与自拍| av在线播放精品| 亚洲精品中文字幕在线视频| 一个人免费在线观看的高清视频 | 精品久久蜜臀av无| 久久久精品区二区三区| 日韩欧美免费精品| 啦啦啦视频在线资源免费观看| 久久国产精品男人的天堂亚洲| 老司机午夜十八禁免费视频| 欧美日韩av久久| 亚洲欧美一区二区三区黑人| 亚洲av电影在线观看一区二区三区| 亚洲国产看品久久| av福利片在线| 丰满饥渴人妻一区二区三| 国内毛片毛片毛片毛片毛片| 脱女人内裤的视频| 欧美黑人精品巨大| 久久香蕉激情| 日韩中文字幕欧美一区二区| 国产精品av久久久久免费| 91精品国产国语对白视频| 精品一品国产午夜福利视频| 亚洲国产欧美在线一区| 成人av一区二区三区在线看 | 久久精品国产综合久久久| 国产三级黄色录像| √禁漫天堂资源中文www| 国产又爽黄色视频| 最黄视频免费看| 另类精品久久| 大型av网站在线播放| 亚洲av片天天在线观看| 老汉色av国产亚洲站长工具| 欧美中文综合在线视频| 久久国产精品男人的天堂亚洲| 国产国语露脸激情在线看| 另类精品久久| 一级片免费观看大全| 热99国产精品久久久久久7| 日韩,欧美,国产一区二区三区| 两个人看的免费小视频| 日韩 欧美 亚洲 中文字幕| 爱豆传媒免费全集在线观看| 久久久久久人人人人人| 两性夫妻黄色片| 9热在线视频观看99| 99国产精品一区二区蜜桃av | 亚洲第一青青草原| 老司机午夜福利在线观看视频 | 久久ye,这里只有精品| 国产淫语在线视频| 在线av久久热| 精品人妻1区二区| 国产熟女午夜一区二区三区| 动漫黄色视频在线观看| 啪啪无遮挡十八禁网站| 亚洲午夜精品一区,二区,三区| 成在线人永久免费视频| 99久久99久久久精品蜜桃| 91精品三级在线观看| 色视频在线一区二区三区| 国产av一区二区精品久久| 亚洲欧洲日产国产| 国产一区有黄有色的免费视频| 18禁裸乳无遮挡动漫免费视频| 久久久久久久国产电影| 操出白浆在线播放| 久久久精品区二区三区| 日韩欧美国产一区二区入口| 嫁个100分男人电影在线观看| 热re99久久精品国产66热6| 最近最新免费中文字幕在线| 久热爱精品视频在线9| 叶爱在线成人免费视频播放| 一区二区三区乱码不卡18| 亚洲精品国产精品久久久不卡| 免费一级毛片在线播放高清视频 | 欧美一级毛片孕妇| 国产精品麻豆人妻色哟哟久久| 久久久久久亚洲精品国产蜜桃av| 午夜福利视频在线观看免费| 黄色片一级片一级黄色片| 国产精品影院久久| 日韩有码中文字幕| 极品少妇高潮喷水抽搐| 18禁黄网站禁片午夜丰满| 99国产极品粉嫩在线观看| 99热国产这里只有精品6| 亚洲全国av大片| 成人黄色视频免费在线看| 在线亚洲精品国产二区图片欧美| 男人操女人黄网站| 国产欧美日韩一区二区三区在线|