• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Steganography Model Data Protection Method Based on Scrambling Encryption

    2022-11-11 10:47:36XintaoDuanZhiqiangShaoWenxinWangEnZhangDongliYueChuanQinandHaewoonNam
    Computers Materials&Continua 2022年9期

    Xintao Duan,Zhiqiang Shao,Wenxin Wang,En Zhang,Dongli Yue,Chuan Qin and Haewoon Nam

    1Henan Normal University,Xinxiang,453007,China

    2University of Shanghai for Science and Technology,Shanghai,200093,China

    3Hanyang University,Ansan,15588,Korea

    Abstract: At present, the image steganography method based on CNN has achieved good results.The trained model and its parameters are of great value.Once leaked, the secret image will be exposed.To protect the security of steganographic network model parameters in the transmission process,an idea based on network model parameter scrambling is proposed in this paper.Firstly, the sender trains the steganography network and extraction network,encrypts the extraction network parameters with the key shared by the sender and the receiver,then sends the extraction network and parameters to the receiver through the public channel, and the receiver recovers them with the key after receiving, to achieve more secure secret communication.In this way, even if the network parameters are intercepted by a third party in the transmission process, the interceptor cannot extract the real secret information.In this paper, the classical Joseph algorithm is used as the scrambling algorithm to scramble the extracted network model parameters of the StegoPNet steganography network.The experimental results show that when the scrambled parameters are used for secret image extraction, a meaningless image independent of the secret image is extracted,it shows that this method can well protect the security of steganography network model.At the same time,this method also has good scalability,and can use a variety of different scrambling algorithms to scramble the parameters.

    Keywords:Information hiding;steganography;DCNN;joseph scrambling

    1 Introduction

    Information hiding is mainly divided into steganography for covert communication and digital watermarking for copyright protection.There are relatively new researches on digital watermarking[1,2].At present, the information hiding based on carrier modification is the most studied.Because digital image is easy to obtain and modify, and there are a lot of redundant data, digital image is one of the most used cover files in steganography algorithm.The image information hiding in the following refers to the information hiding in steganography.Image information hiding is a communication method that uses images as a carrier to transmit secret information.It requires the carrier image to maintain good visual quality even after the secret information is embedded.According to different implementation methods, image information hiding can be roughly divided into two categories according to different technologies [3], one is called traditional steganography,which mainly designs a specific cost function to minimize the difference between the cover image and the stego image,so as to embed secret information and ensure the visual quality of the cover image.Traditional steganography have many classical algorithms,such as the least significant bit matching(LSBM)[4], close to the optimal coded trellis code STC(syndrome trellis codes)[5], and HUGO(highly undetectable stego)[6],WOW(wavelet obtained weigh)[7]that use the image’s own content for adaptive steganography this kind of method usually has high security.Reversible information hiding is a new research hotspot in the traditional information hiding field in recent years.For example,Qin et al.proposed an adaptive reversible data hiding scheme for encrypted images[8].The other is called deep steganography,which mainly uses deep learning technology based on deep convolutional neural network(DCNN)[9],through designing different network structures and loss functions,using sample data for training to automatically obtain stego images.In 2017, Baluja [10] proposed a CNN based steganography model to hide color image in color image for the first time.In [11] Zhang and Dong proposed a new GAN(generative adversarial networks)structure ISGAN(invisible steganography via GAN), which hides the secret gray-scale image in the color cover image at the sending end, and accurately extracts the secret image at the receiving end.The StegNet proposed by Wu and Yang et al.[12]successfully hides the color secret image into the same-frame cover image.In[13],Yu is based on the structure of CycleGAN and introduces class activation mapping(CAM)[14], and inconsistency loss, to realize effective image information hiding and extraction.The deep convolutional network proposed by Baluja in[15]realizes the hiding of multiple color secret images in one cover image.Recent studies have shown that coverless image steganography can effectively resist the existing steganalysis tools.Therefore,many coverless deep steganography have emerged,such as[16-19].

    At present, DCNN-based methods realize information hiding and extraction through synchronous training of the hiding network and extraction network.This means that if the receiver wants to extract secret information in stego image,it must rely on a relatively complete extraction network.Almost all of these methods are based on the premise that the model and parameters will not be leaked in the process of channel transmission.Although only the extracted network structure is leaked,the content of the secret image will not be leaked,but if the model parameters are leaked at the same time,it will inevitably lead to an increase in the risk of leaking secret information, thereby endangering communication security and copyright protection.Therefore, it is necessary to protect the model parameters of the extracted network to prevent the leakage of secret images.Based on the existing image information hiding network model, this article proposes a scrambling encryption method for extracting network parameters.After the sender completes the synchronization training,it scrambles and encrypts the extracted network parameters and sends it through the public channel.After receiving it,the receiver uses the key to restore the parameters of the extraction network,and finally completes the extraction of the secret image.The advantage of this method is that even if the parameter values of the scrambled and encrypted network model are leaked during transmission, the third party still cannot use the intercepted parameter values and the network model to normally extract the secret image,and even cannot know the high frequency of the secret image,such as the approximate outline of the image content.

    2 Method

    We believe that although the existing DCNN based image information hiding methods have made great progress in capacity, the security of their transmission cannot be guaranteed.Therefore, we propose a scrambling encryption method for extracting the parameter values of the network model to improve the security.

    2.1 Joseph Scrambling Encryption Algorithm

    Joseph ring is a classic mathematical application problem, which is widely used in scrambling encryption [20].In recent years, with the development of computers, figures have gradually become an important digital medium,so there have been many Joseph scrambling encryption for images[21].It is known that there arenpeople(numbers 1, 2, ···,nrespectively)sitting around a round table.Start counting from the person numberk,and the person who counts tomwill be killed;then his next person starts counting from 1,and the person who counts to m will be killed again,and so on until the round table only one person is sitting around and the remainingn-1 people will all be killed.Joseph scrambling encryption borrowed from this idea,placing the first person killed in the first position of the new arrayn′,and put the second person killed in the second position of the new arrayn′and so on,and then put the last remaining unkilled people in the last position of the new arrayn′,so that we scramble an ordered arrayninto a new one arrayn′.We call the numberkthe starting position,the intervalmis the Joseph distance,andkandmare the keys of the algorithm.

    The confusion degree is an objective index used to evaluate the clutter degree of scrambling targets.Li[22]proposed a definition of the confusion degree for the two-dimensional image.He measures the confusion degree of each pixel by calculating the distance of the position change of each pixel before and after scrambling,and obtains the scrambling degree of the image by adding and normalizing the scrambling degree of all points.It is assumed that the gray value ofpixel(i,j)in image A is transformed intopixiv(trow(i,j),tcol(i,j))in image B by scrambling transformationT.Define the confusion degree of image A by this transformationTas:

    wherenandmrespectively represent the length and width of the image.The value range ofsTis[0,1].The larger the value,the higher the confusion degree after scrambling.

    We modify it to get the definition of the confusion degree of the one-dimensional sequence.Assuming that the value of theelement(i)in sequence A is changed toelement(t(i)) in sequence B by scrambling transformationT,the confusion degree of sequence A by transformationTis defined as:

    wherenrepresents the length of the one-dimensional sequence.The value range ofsTis [0,1].The larger the value,the higher the confusion degree after scrambling.However,due to the limitations of the scrambling algorithm,the maximum value of the Joseph scrambling algorithm is 0.5.Fig.1 shows an example of Joseph scrambling.

    2.2 The Extraction Network Structure of StegoPNet

    In this paper, the extraction network of StegoPNet [23] is selected as the object model for parameter scrambling.Because the extraction network has enough convolutional layers to facilitate our scrambling,and it also has relatively few parameters and FLOPs, can improve the transmission efficiency and save the computing resources of the receiver.The overall framework of the extraction network is shown in Fig.2,and the detailed architecture information of extraction network is shown in Fig.3 and Tab.1.The structure of the extraction network is divided into three modules: downsampling,pyramid pooling,and up-sampling.Under normal circumstances,the sender uses the hidden network to obtain the stego image and transmits it to the receiver through the public channel.The receiver uses the extraction network to extract the secret image, and the semantics of the extracted secret image is consistent with the original secret image.Our work mainly scrambles encrypts the convolutional layer parameter in the down-sampling and up-sampling modules.This is because these two modules have 4 and 5 convolutional layers,and each layer contains 32 to 256 groups of varying numbers of convolution kernels that have enough parameters.The pyramid pooling module is mainly composed of a pooling layer and a single convolutional layer, with relatively few parameter values,which is not conducive to the operation of scrambling encryption.

    Figure 1:Joseph scrambling when k=6 and m=5,and the confusion degree is 0.3194 at this time

    Figure 2:The extraction network framework

    Figure 3:The detailed architecture of extraction network,c,h,w in[c,h,w]represent channel,high,and weight of future map respectively

    Table 1:The details of convolution in extraction network,c,n,c′ in(c, n×n, c′)represent channel before convolution,convolution kernel size,and channel after convolution respectively

    2.3 Scrambling of Extraction Network Model Parameters

    This section will introduce the proposed parameter scrambling method in detail.We mainly scramble the parameters of the convolutional layer, and treat the convolution kernels in the same convolutional layer as independent individuals and scramble them.In the scrambling process, only the position of the convolution kernel changes, and the interior of the convolution kernel remains unchanged.What needs to be clear is that for convolution kernel scrambling, since the number of convolution kernel channelscbetween different convolution layers is different, we cannot perform cross-layer scrambling on it,that is,the convolution kernel located in the layer A scrambling to layer B.The scrambling steps are as follows:

    1)Read the parameters of each convolutional layerL={Li}(i=1, 2, ···,n)from the parameter file of the trained extraction network model;

    2)For the convolutional layerLi,we perform Joseph scrambling encryption on the keyKshared by the sender and receiver to obtain the encrypted convolutional layerL′i;

    3)Write the scrambled convolutional layerLiinto the location corresponding to the model parameter file of the extracted network,and send it to the receiver along with the model;

    4)After receiving the extracted network, the receiver only needs to inverse scramble the model parameters according to the keyKto obtain the correct network model parameters,to correctly extract the secret image.

    Since in this process, we only scrambled the position of the parameter without changing the original value of the parameter, the receiver can restore the parameter losslessly without affecting the accuracy of the extraction network.

    3 Experiment

    The network is trained for 150 iterations.GPU-NVIDIA GeForce 1080,the PyTorch version we use is 1.2.0, and the version of python is 3.6.5.From the test images of the network, we randomly selected a part as the data set of the experiment,and selected a pair of images(one is the cover image and the other is the secret image)as an example image,as shown in Fig.4.At the same time,we selected 7 different confusion degrees(0.20,0.25,0.30,0.35,0.40,0.45,and 0.50)for comparative experiments to analyze and study the effect of parameter scrambling under different confusion degrees.For the 9th layer of convolution,that is,the last layer of convolution of the extraction network,because the number of convolution kernels is too small(only 3),the confusion degree has only 3 values,which are 0,0.2222,0.4444,therefore,this experiment uses uniform randomness parameter is 0.4444 when scrambling as the ninth layer the convolution kernel.We will prove in the last subsection of the experiment that the 9th layer of convolution mainly acts on the color generation of the image,and has little effect on the generation of image semantic information.

    Figure 4:(a)Is a cover image,and(b)is a secret image

    In this section, we refer to the image extracted by the extraction network without parameter scrambling ass′, and the image extracted by the extraction network after parameter scrambling ass′′.In this experiment,two indexes are used to evaluate the quality of generated images,namely peak signal-to-noise ratio (PSNR)[24] and structural similarity (SSIM)[25].PSNR is an index used to evaluate the ratio between the maximum signal and background noise.The larger its value,the smaller the distortion of the image.SSIM is an index to measure the similarity of two images.The value range of SSIM is between 0 and 1.The larger the value,the smaller the difference between the two images.When SSIM is equal to 1,it means that the two images are the same.

    3.1 Single Convolutional Layer Scrambling

    First of all,we only scramble a certain layer of convolution kernel separately.When the confusion degree is 0.35, the experimental results are shown in Fig.5.And Fig.6 shows the images extracted by the extraction network when only the first layer is scrambled under different confusion degrees.It can be seen that although only scrambling the single-layer parameters has an effect.But the effect is not obvious, and the outline of the secret image can still be seen, and even (f)and (g)of Fig.5 are not much different from the original image intuitively.Then we further performed a single-layer scrambling experiment on all seven confusion degrees,and calculated the PSNR and SSIM betweens′ands′′, as shown in Tab.2.From Tab.2, we can see that for the fifth-layer convolution kernel of the extraction network,that is,the first-layer convolution kernel of the up-sampling part,regardless of the confusion degree,the SSIMs ofs′ands′′are close to 1(actually they are all more than 99.3%).This means that extracting the fifth layer of the network has little effect on the generation of image semantics.Therefore,we believe that the first layer of the up-sampling part of the convolutional layer,its role may only be to enlarge the feature to facilitate subsequent calculations, instead of directly calculating the feature map.

    Figure 5:(a)Is the image extracted by the network when the parameters are not scrambled.(b)-(j)are the images extracted by the network when only the first to ninth layers are scrambled

    In addition, from Tab.2 we can also see that the closer the convolution layers at both ends are scrambling,the lower the values of PSNR and SSIM betweens′ands′′,and the closer the convolution layer in the middle re scrambling, the higher the values of PSNR and SSIM betweens′ands′′.This means that when the computing power resources are limited,and we can only scramble the single-layer convolution kernel,we can choose to scramble the first layer or the penultimate layer of the extraction network.The SSIM and PSNR value betweens′ands′′are the smallest,that is,the scrambling effect at this time is the best.

    Although we can achieve our goal by scrambling the convolution layer of the first layer and the penultimate layer,the third party cannot extract the secret image normally,but the effect is not very ideal at this time,we can still see the secret image’s outline froms′′.

    Figure 6:(a)shows the image extracted by the network parameters are not scrambled(b)-(h)are the images extracted from the network after only scrambling the first layer when the confusion degrees is 0.20 to 0.50

    Table 2: The PSNR and SSIM between s′and s′′

    3.2 Multi-Layer Convolution Layer Scrambling

    Since the effect of scrambling only on a single layer is not ideal,in this part of the experiment,we decided to perform multi-layer scrambling according to the network module of the extracted network.That is,only the down-sampling module is scrambled,only the up-sampling module is scrambled,and the entire extraction network is scrambled.Fig.7 shows the image extracted by the extraction network when the confusion degree is 0.35,only scrambling down-sampling,only scrambling up-sampling,and all scrambling.It can be seen that when only the down-sampling module is scrambled,the obtaineds′′can see the outline of cover images,when only the up-sampling module is scrambled,the obtaineds′′can not only see the outlines of some secret images but also the outlines of some cover images,when the entire extraction network is scrambled, the obtaineds′′can also see the outline of cover images,this means that there is no need to waste additional computing resources to scramble the convolution layer of the whole extraction network.But in the above three cases, their visual effect is worse than that when only single convolutional layer is scrambled,this shows that we can scramble the multi-layer convolution kernel to achieve better target effect when the computational resources allow.Similarly,we compared the PSNR and SSIM betweens′ands′′obtained by the three scrambling methods under different confusion degree.The specific data is shown in Fig.8.

    Figure 7: (a)Is the figure extracted by the network parameters are not scrambled, (b)is the figure extracted by the network when only scrambled down-sampling, (c)is the figure extracted by the network when only scrambled up-sampling, (d)is the figure extracted when the network is all scrambled

    As can be seen from Fig.8, for these three cases, the maximum PSNR does not exceed 9, and the maximum SSIM does not exceed 0.16.This shows that for scrambling only down-sampling and scrambling only up-sampling, although it can see some contour information, it still achieves our expected goal.For all scrambling,it does not significantly improve the scrambling effect.

    3.3 Convolutional Layer and Convolution Kernel Channel Scrambling

    In the first two experiments, we have always regarded the convolution kernel as a whole, and scrambled the whole convolution kernel.But in fact, the convolution kernel is composed ofConedimensional filters with the size ofH×W, whereCis the number of channels of the convolution kernel, andHandWare the length and width of the convolution kernel respectively.We can treat allNconvolution kernels in a convolutional layer asN×C,one-dimensional filters for scrambling,which greatly increases the complexity of our scrambling,and can achieve better results,whereNis the number of convolution kernels in each convolution layer.Because of the extraction network used in this experiment, the size of the convolution kernel of each layer is not the same, so we still only scramble the same layer in this part.For some CNNs where the size of each layer of the convolution kernel is the same, you can put the convolution kernels of all layers together for scrambling, but it should be noted that this will greatly increase the time complexity.We directly scramble it in multiple layers,that is,scramble it according to the lower sampling module,the upper sampling module,and the whole extraction network.The results are shown in Fig.9.

    Figure 8:PSNR and SSIM when scrambling different module

    Figure 9: (a)Is the image extracted by the network parameters are not scrambled, (b)is the image extracted by the network when only scrambled down-sampling, (c)is the image extracted by the network when only scrambled up-sampling, (d)is the figure extracted when the network is all scrambled

    We can see that due to the increased complexity of the scrambling, thes′effect obtained after the scrambling is better than the effect obtained in the first two parts.No matter which module is scrambled,the result is an image completely unrelated to the secret image.

    3.4 Role of the Ninth Layer of Convolution

    Because the 9th layer of convolution has only 3 convolution kernels,we experimented with all 5(According to the combination arrangement, there are a total ofA33= 6 cases, one of which is not scrambled)scrambling cases.Fig.10 shows the images extracted by the extraction network when only the 9th layer is scrambled under different scrambling situations.From a visual point of view,s′ands′′have almost no difference in semantic information except for color.We converts′ands′′under different scrambling conditions into grayscale images through the rgb2gray function that comes with Matlab.The transformation formula is shown in Eq.(3):

    whereR,GandBrepresent the red channel,green channel,and blue channel respectively in the original color image,GRAYrepresents the grayscale image obtained after the original color image is converted.

    Figure 10: (a)Is the image extracted by the network parameters are not scrambled, (b)-(f)are the images extracted by the network after the ninth layer is scrambled under different confusion degrees

    Then calculate the SSIM between the converted gray-scale images,and the experimental results are shown in Fig.11.It can be seen that the SSIM is above 0.8 in each case of scrambling,indicating that the semantic information of the image obtained before and after the 9th layer parameter scrambling is not much different.Therefore,we believe that the 9th convolutional layer of the extraction network,that is,the last convolutional layer of the extraction network,is mainly responsible for the generation of image colors,and has little to do with the generation of image semantic information.

    Figure 11:from left to right shows the SSIM between s′and s′′corresponding to 10 test images in the case of scrambling corresponding to Figs.10b-10f

    4 Conclusion

    In the past, the security of the DCNN information hiding method is to consider the encrypted image itself.This paper proposes an extraction network of steganography model data protection method based on scrambling encryption, avoid the leakage of secret information caused by the exposure of the extracted network in the public channel.We choose Joseph scrambling algorithm to scramble the extraction network of StegoPNet.Considering the different computing resources of the receiver,we divided the experiment into three parts according to the increasing demand for computing resources.The first is to scramble the single-layer convolution layer.The experimental results show that a good result can be obtained by scrambling the first and penultimate layers of the extraction network under the condition of limited computing resources.Then,the multi-layer convolution layer is scrambled.Although this method can achieve better results,it can still see the contour information from the image extracted from the scrambled extraction network.Finally,we scramble the convolution layer and the number of channels.This method can achieve the best effect.The extracted image is almost a pure color image.In future work,we will focus on the universality of the algorithm,that is,whether it can achieve good results in other extraction networks.At the same time,we will also look for some better scrambling algorithms to make the algorithm achieve better results.

    Funding Statement:This work was supported in part by the National Natural Science Foundation of China under Grant 62172280,U1904123 and U20B2051,the Key Laboratory of Artificial Intelligence and Personalized Learning in Education of Henan Province,Henan,China.

    Conflicts of Interest:We declare that we have no conflicts of interest to report regarding the present study.

    毛片一级片免费看久久久久| 九九在线视频观看精品| 国产 一区精品| 国国产精品蜜臀av免费| 亚洲最大成人手机在线| 国产 一区 欧美 日韩| 国内精品一区二区在线观看| 91久久精品电影网| 亚州av有码| 99国产精品一区二区蜜桃av| 性欧美人与动物交配| 国产色婷婷99| 免费在线观看影片大全网站| 99久久中文字幕三级久久日本| 精品免费久久久久久久清纯| 99热这里只有是精品在线观看| 亚洲aⅴ乱码一区二区在线播放| 国产麻豆成人av免费视频| 十八禁国产超污无遮挡网站| 一个人看的www免费观看视频| 人人妻人人澡欧美一区二区| 国产精品精品国产色婷婷| 国模一区二区三区四区视频| 成人亚洲精品av一区二区| 小蜜桃在线观看免费完整版高清| 99久久久亚洲精品蜜臀av| 久久久久久伊人网av| 天美传媒精品一区二区| 国产视频内射| 搞女人的毛片| 91午夜精品亚洲一区二区三区| 久久这里只有精品中国| 亚洲aⅴ乱码一区二区在线播放| 国产69精品久久久久777片| 日日摸夜夜添夜夜添小说| 欧美日韩一区二区视频在线观看视频在线 | av视频在线观看入口| 韩国av在线不卡| 99热精品在线国产| 身体一侧抽搐| 久久精品国产清高在天天线| 一边摸一边抽搐一进一小说| 丝袜喷水一区| 国产成人精品久久久久久| 国产伦精品一区二区三区视频9| 精品免费久久久久久久清纯| 免费看av在线观看网站| 亚洲欧美日韩东京热| 村上凉子中文字幕在线| 深爱激情五月婷婷| 久久99热6这里只有精品| 看黄色毛片网站| 悠悠久久av| 五月玫瑰六月丁香| 久99久视频精品免费| 淫妇啪啪啪对白视频| 亚洲人成网站在线播放欧美日韩| 黑人高潮一二区| 国模一区二区三区四区视频| 亚洲av成人精品一区久久| 国产白丝娇喘喷水9色精品| 亚洲人成网站在线播放欧美日韩| 婷婷六月久久综合丁香| 最近手机中文字幕大全| 精品国内亚洲2022精品成人| 久久精品人妻少妇| 淫秽高清视频在线观看| 亚洲一区高清亚洲精品| 久久久久免费精品人妻一区二区| 亚洲自拍偷在线| 免费大片18禁| 中文字幕免费在线视频6| 国产精品亚洲美女久久久| 亚洲真实伦在线观看| 露出奶头的视频| 三级毛片av免费| 看片在线看免费视频| 久久热精品热| 成人特级av手机在线观看| 好男人在线观看高清免费视频| 欧美一级a爱片免费观看看| av.在线天堂| 亚州av有码| 一本一本综合久久| 在线国产一区二区在线| 亚洲自拍偷在线| 午夜亚洲福利在线播放| 91精品国产九色| 国产伦在线观看视频一区| 成人特级黄色片久久久久久久| 国产极品精品免费视频能看的| 国产老妇女一区| 国产成人精品久久久久久| 欧美+亚洲+日韩+国产| 菩萨蛮人人尽说江南好唐韦庄 | 免费电影在线观看免费观看| 全区人妻精品视频| 亚洲无线观看免费| 啦啦啦观看免费观看视频高清| 欧美丝袜亚洲另类| 天美传媒精品一区二区| 99久久中文字幕三级久久日本| 国产精品福利在线免费观看| 亚洲电影在线观看av| 欧美一区二区精品小视频在线| 日韩欧美三级三区| 在线免费观看不下载黄p国产| 国产亚洲精品综合一区在线观看| 精品久久久久久久久亚洲| 精品免费久久久久久久清纯| av黄色大香蕉| 一进一出抽搐gif免费好疼| 少妇的逼好多水| 国产麻豆成人av免费视频| 麻豆一二三区av精品| 又粗又爽又猛毛片免费看| 国产精品爽爽va在线观看网站| 国产中年淑女户外野战色| 中国美白少妇内射xxxbb| 亚洲自拍偷在线| 久久6这里有精品| 欧洲精品卡2卡3卡4卡5卡区| 亚洲欧美精品自产自拍| 久久精品综合一区二区三区| 91精品国产九色| 精品福利观看| 日日撸夜夜添| 非洲黑人性xxxx精品又粗又长| 亚洲国产日韩欧美精品在线观看| 男人舔女人下体高潮全视频| 久久九九热精品免费| 国产探花在线观看一区二区| 亚洲欧美日韩无卡精品| 嫩草影院入口| 久久久a久久爽久久v久久| 国产极品精品免费视频能看的| 亚洲熟妇熟女久久| 国内精品一区二区在线观看| 成人三级黄色视频| 亚洲精品国产av成人精品 | 97在线视频观看| 国产日本99.免费观看| 国产免费男女视频| 国产私拍福利视频在线观看| 少妇熟女欧美另类| h日本视频在线播放| 香蕉av资源在线| 精品欧美国产一区二区三| 国产伦精品一区二区三区四那| 久久欧美精品欧美久久欧美| 国产精品久久久久久av不卡| 亚洲丝袜综合中文字幕| 色噜噜av男人的天堂激情| 亚洲五月天丁香| 亚洲在线自拍视频| 亚洲美女黄片视频| 亚洲va在线va天堂va国产| 国内精品久久久久精免费| 91午夜精品亚洲一区二区三区| 久久久久久大精品| 蜜桃久久精品国产亚洲av| 夜夜看夜夜爽夜夜摸| 精品久久国产蜜桃| 亚洲一区高清亚洲精品| 在线观看免费视频日本深夜| 中国国产av一级| 精品午夜福利视频在线观看一区| 精品一区二区三区人妻视频| 午夜亚洲福利在线播放| 精品人妻一区二区三区麻豆 | 99riav亚洲国产免费| 午夜精品一区二区三区免费看| 亚洲激情五月婷婷啪啪| 女人十人毛片免费观看3o分钟| 真实男女啪啪啪动态图| 少妇人妻一区二区三区视频| 久久午夜福利片| 亚洲在线自拍视频| 日韩中字成人| 国产精品一区www在线观看| 欧美+日韩+精品| 日韩欧美一区二区三区在线观看| 国产精品嫩草影院av在线观看| 日日摸夜夜添夜夜添av毛片| 美女黄网站色视频| 免费看日本二区| 欧美区成人在线视频| 亚洲国产欧美人成| 国产精品永久免费网站| 成人av一区二区三区在线看| 国产国拍精品亚洲av在线观看| 午夜福利视频1000在线观看| 日韩欧美在线乱码| 国产精品久久久久久亚洲av鲁大| 深爱激情五月婷婷| 黄色欧美视频在线观看| 日本与韩国留学比较| 嫩草影院入口| 午夜视频国产福利| 日韩欧美一区二区三区在线观看| 色视频www国产| 一级黄色大片毛片| 美女xxoo啪啪120秒动态图| 亚洲精品乱码久久久v下载方式| 三级经典国产精品| 搡老岳熟女国产| 午夜福利视频1000在线观看| 99riav亚洲国产免费| 成人二区视频| 日韩在线高清观看一区二区三区| 97碰自拍视频| 一进一出好大好爽视频| 国产一区亚洲一区在线观看| 香蕉av资源在线| 久久6这里有精品| 亚洲图色成人| 国产成人freesex在线 | 亚洲av中文av极速乱| 国产欧美日韩精品一区二区| 人妻久久中文字幕网| 国产视频内射| 日韩亚洲欧美综合| 非洲黑人性xxxx精品又粗又长| 午夜福利视频1000在线观看| 嫩草影院入口| 少妇裸体淫交视频免费看高清| 日韩欧美精品免费久久| 精品欧美国产一区二区三| 中文字幕免费在线视频6| 伦理电影大哥的女人| 日本 av在线| 国产乱人视频| 五月伊人婷婷丁香| 亚洲人与动物交配视频| 国产极品精品免费视频能看的| 亚洲七黄色美女视频| 中文字幕久久专区| 国产精品,欧美在线| 干丝袜人妻中文字幕| 永久网站在线| 日韩高清综合在线| 婷婷亚洲欧美| 欧美日韩乱码在线| 午夜免费男女啪啪视频观看 | 一级毛片aaaaaa免费看小| 国产真实伦视频高清在线观看| 亚洲最大成人手机在线| 在线观看免费视频日本深夜| 卡戴珊不雅视频在线播放| 赤兔流量卡办理| 99久久中文字幕三级久久日本| 99热这里只有是精品在线观看| 亚洲中文字幕一区二区三区有码在线看| 69人妻影院| 日日摸夜夜添夜夜添小说| 日韩制服骚丝袜av| 亚洲人成网站在线播| 久久欧美精品欧美久久欧美| 国产人妻一区二区三区在| 波野结衣二区三区在线| av视频在线观看入口| 久久久欧美国产精品| 在线免费观看的www视频| 又爽又黄无遮挡网站| 身体一侧抽搐| 久久国内精品自在自线图片| 精品不卡国产一区二区三区| 欧美zozozo另类| 精品久久久久久久人妻蜜臀av| 搡女人真爽免费视频火全软件 | 麻豆久久精品国产亚洲av| 日本精品一区二区三区蜜桃| 亚洲av电影不卡..在线观看| 婷婷精品国产亚洲av| 成年女人毛片免费观看观看9| 国产精品国产高清国产av| 老熟妇乱子伦视频在线观看| 国国产精品蜜臀av免费| 极品教师在线视频| 亚洲国产高清在线一区二区三| 日本爱情动作片www.在线观看 | 日韩强制内射视频| 欧美丝袜亚洲另类| 插逼视频在线观看| 免费搜索国产男女视频| 国产色婷婷99| 十八禁网站免费在线| 蜜桃久久精品国产亚洲av| 插逼视频在线观看| 日韩高清综合在线| 久久精品夜色国产| 成人永久免费在线观看视频| 久久久久久大精品| 免费看av在线观看网站| 村上凉子中文字幕在线| 成年免费大片在线观看| 亚洲成人av在线免费| 国产高清有码在线观看视频| 欧美人与善性xxx| avwww免费| 日本黄色片子视频| 亚洲精品一区av在线观看| 日韩成人av中文字幕在线观看 | 校园人妻丝袜中文字幕| 国产精品永久免费网站| 久久精品国产亚洲av香蕉五月| 国产亚洲欧美98| 国产在线男女| 丰满乱子伦码专区| 日韩一区二区视频免费看| 国产av在哪里看| 熟女人妻精品中文字幕| 全区人妻精品视频| 亚洲av一区综合| 18+在线观看网站| 国产国拍精品亚洲av在线观看| 日本黄色片子视频| 亚洲自拍偷在线| 99热全是精品| 国产老妇女一区| 丝袜美腿在线中文| 少妇高潮的动态图| 淫秽高清视频在线观看| 亚洲av中文字字幕乱码综合| 成人特级av手机在线观看| 老司机福利观看| 亚洲欧美日韩无卡精品| 免费看日本二区| 久久精品91蜜桃| 日韩高清综合在线| 亚洲电影在线观看av| 我要看日韩黄色一级片| 亚洲无线观看免费| 日本免费a在线| 九九爱精品视频在线观看| www日本黄色视频网| 欧美色欧美亚洲另类二区| 亚洲av五月六月丁香网| 六月丁香七月| 色综合色国产| 久久久久久国产a免费观看| 亚洲人成网站高清观看| 亚洲一级一片aⅴ在线观看| 麻豆乱淫一区二区| 亚洲美女黄片视频| 亚洲精华国产精华液的使用体验 | 久久久久久久午夜电影| 免费黄网站久久成人精品| 大型黄色视频在线免费观看| 最近的中文字幕免费完整| 日韩成人伦理影院| 欧美性感艳星| 国产伦在线观看视频一区| 国产三级在线视频| 亚洲最大成人手机在线| 免费av观看视频| 白带黄色成豆腐渣| 男女下面进入的视频免费午夜| 国产精品日韩av在线免费观看| 成年免费大片在线观看| 99久久精品一区二区三区| 亚洲成人中文字幕在线播放| 久久6这里有精品| 97超碰精品成人国产| 少妇人妻一区二区三区视频| 床上黄色一级片| 在线观看美女被高潮喷水网站| 超碰av人人做人人爽久久| 日韩av在线大香蕉| 免费无遮挡裸体视频| 黄色日韩在线| 国产女主播在线喷水免费视频网站 | 在线观看美女被高潮喷水网站| 免费观看的影片在线观看| 中出人妻视频一区二区| 亚洲一区二区三区色噜噜| 少妇裸体淫交视频免费看高清| 亚洲久久久久久中文字幕| 日日啪夜夜撸| 日韩亚洲欧美综合| 在线观看66精品国产| 免费高清视频大片| 国产欧美日韩精品一区二区| 中国国产av一级| 亚洲欧美成人精品一区二区| 国产精品一区二区三区四区久久| 免费一级毛片在线播放高清视频| 亚洲国产欧美人成| 午夜精品一区二区三区免费看| 长腿黑丝高跟| 欧美高清成人免费视频www| www.色视频.com| 久久久久久久久久久丰满| 香蕉av资源在线| 男人狂女人下面高潮的视频| 热99在线观看视频| 中文字幕人妻熟人妻熟丝袜美| 日本免费一区二区三区高清不卡| 午夜激情欧美在线| 国产 一区精品| 中出人妻视频一区二区| 亚洲真实伦在线观看| 免费看av在线观看网站| 精品国产三级普通话版| 国产麻豆成人av免费视频| 男女啪啪激烈高潮av片| 久久人人爽人人片av| 精品一区二区三区人妻视频| 久久精品夜色国产| 国内精品美女久久久久久| 好男人在线观看高清免费视频| 免费无遮挡裸体视频| 一边摸一边抽搐一进一小说| 搞女人的毛片| 国产成人a∨麻豆精品| 亚洲无线观看免费| 欧美在线一区亚洲| 搞女人的毛片| 欧美成人一区二区免费高清观看| 欧美人与善性xxx| 亚洲aⅴ乱码一区二区在线播放| 国产av麻豆久久久久久久| 亚洲最大成人av| 午夜激情欧美在线| 搡老岳熟女国产| 在线免费十八禁| 久久精品人妻少妇| 性色avwww在线观看| 身体一侧抽搐| 尾随美女入室| 欧美日韩乱码在线| 白带黄色成豆腐渣| 国内精品宾馆在线| 大型黄色视频在线免费观看| 一级av片app| 欧美bdsm另类| 国产在线精品亚洲第一网站| 国产成人福利小说| 亚洲,欧美,日韩| 最近中文字幕高清免费大全6| 日韩国内少妇激情av| 亚洲国产精品成人综合色| 欧美最新免费一区二区三区| 国产欧美日韩一区二区精品| av在线亚洲专区| 亚洲精品国产成人久久av| 久久久久免费精品人妻一区二区| 最好的美女福利视频网| 午夜精品国产一区二区电影 | 成年免费大片在线观看| 男人舔女人下体高潮全视频| 国产69精品久久久久777片| 国内揄拍国产精品人妻在线| 欧美3d第一页| 一进一出好大好爽视频| 蜜桃久久精品国产亚洲av| 99久久精品热视频| 亚洲人成网站高清观看| av免费在线看不卡| 午夜日韩欧美国产| 乱人视频在线观看| 日韩成人伦理影院| 久久天躁狠狠躁夜夜2o2o| 国产色爽女视频免费观看| 国产免费一级a男人的天堂| 亚洲成人久久爱视频| 寂寞人妻少妇视频99o| 性色avwww在线观看| 国产伦在线观看视频一区| 欧美潮喷喷水| 99热这里只有是精品50| 国产黄片美女视频| 久久久成人免费电影| 午夜免费激情av| 免费av不卡在线播放| 少妇的逼好多水| 如何舔出高潮| 亚洲自拍偷在线| 久久久久九九精品影院| 成年版毛片免费区| 国产黄a三级三级三级人| 日本一二三区视频观看| 久久久久免费精品人妻一区二区| 久久久久久久久大av| 国产精品久久久久久久久免| 国产熟女欧美一区二区| 女生性感内裤真人,穿戴方法视频| 精品日产1卡2卡| 黄色配什么色好看| 亚洲av.av天堂| 久99久视频精品免费| 成人永久免费在线观看视频| 菩萨蛮人人尽说江南好唐韦庄 | 国产91av在线免费观看| 欧美人与善性xxx| 97超视频在线观看视频| 国产又黄又爽又无遮挡在线| 自拍偷自拍亚洲精品老妇| 免费人成视频x8x8入口观看| 看黄色毛片网站| av在线播放精品| 亚洲国产日韩欧美精品在线观看| 色综合站精品国产| 久久久久久久久久成人| 18禁在线播放成人免费| 精品不卡国产一区二区三区| 狠狠狠狠99中文字幕| 国产精品一区二区免费欧美| 成人特级av手机在线观看| 国产激情偷乱视频一区二区| 亚洲七黄色美女视频| 直男gayav资源| 亚洲av成人精品一区久久| 国产aⅴ精品一区二区三区波| 亚洲一区二区三区色噜噜| 狂野欧美激情性xxxx在线观看| 桃色一区二区三区在线观看| 婷婷精品国产亚洲av在线| 高清毛片免费观看视频网站| 亚洲第一电影网av| 国产成人精品久久久久久| 淫秽高清视频在线观看| 天堂av国产一区二区熟女人妻| eeuss影院久久| 亚洲va在线va天堂va国产| 91在线观看av| 午夜福利18| 色视频www国产| 国产一级毛片七仙女欲春2| a级毛片a级免费在线| 97超级碰碰碰精品色视频在线观看| 日韩一本色道免费dvd| 亚洲av一区综合| 国产综合懂色| 人人妻人人澡欧美一区二区| 亚洲七黄色美女视频| 国产 一区 欧美 日韩| 国产视频一区二区在线看| 国国产精品蜜臀av免费| 美女内射精品一级片tv| 伊人久久精品亚洲午夜| 99久久精品热视频| 久久精品夜色国产| 免费观看在线日韩| 深夜精品福利| 国产精品美女特级片免费视频播放器| 天堂影院成人在线观看| 国产高清视频在线播放一区| 亚洲va在线va天堂va国产| 久久久久久久亚洲中文字幕| 在线观看免费视频日本深夜| 亚洲av一区综合| 成人欧美大片| 在线观看免费视频日本深夜| 99久久久亚洲精品蜜臀av| 免费看a级黄色片| 亚洲成人久久性| 日韩欧美精品免费久久| 又黄又爽又刺激的免费视频.| 久久鲁丝午夜福利片| 日日啪夜夜撸| 69人妻影院| 少妇的逼水好多| 18禁黄网站禁片免费观看直播| 男插女下体视频免费在线播放| 精品熟女少妇av免费看| 亚洲国产精品成人综合色| 淫妇啪啪啪对白视频| 99热精品在线国产| 菩萨蛮人人尽说江南好唐韦庄 | 老熟妇乱子伦视频在线观看| 精品人妻偷拍中文字幕| 国产淫片久久久久久久久| 老师上课跳d突然被开到最大视频| 亚洲第一区二区三区不卡| 亚洲av美国av| 国产日本99.免费观看| 欧美激情国产日韩精品一区| 免费电影在线观看免费观看| 99在线视频只有这里精品首页| 免费人成在线观看视频色| av在线观看视频网站免费| 国产黄色视频一区二区在线观看 | 最近视频中文字幕2019在线8| 看黄色毛片网站| 亚洲精品成人久久久久久| 91久久精品国产一区二区三区| 晚上一个人看的免费电影| 三级经典国产精品| 久久精品综合一区二区三区| 露出奶头的视频| 国产v大片淫在线免费观看| 日本黄色视频三级网站网址| 国产精品精品国产色婷婷| 淫妇啪啪啪对白视频| 免费不卡的大黄色大毛片视频在线观看 | 99久久精品一区二区三区| 日韩三级伦理在线观看| 又黄又爽又刺激的免费视频.| 国产精品无大码| 在现免费观看毛片| 日日摸夜夜添夜夜添av毛片| 午夜影院日韩av| a级毛片免费高清观看在线播放| 国产成人aa在线观看| 久久久久国产精品人妻aⅴ院| 精品久久久久久久久亚洲| 老司机午夜福利在线观看视频| 国内精品美女久久久久久| 免费高清视频大片| 久久精品夜色国产| 三级男女做爰猛烈吃奶摸视频| 日日撸夜夜添| 国产精品一区www在线观看| 亚洲在线自拍视频|