• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Lossless embedding: A visually meaningful image encryption algorithm based on hyperchaos and compressive sensing

    2023-03-13 09:17:48XingYuanWang王興元XiaoLiWang王嘵麗LinTeng滕琳DongHuaJiang蔣東華andYongjinXian咸永錦
    Chinese Physics B 2023年2期
    關(guān)鍵詞:興元東華

    Xing-Yuan Wang(王興元) Xiao-Li Wang(王嘵麗) Lin Teng(滕琳)Dong-Hua Jiang(蔣東華) and Yongjin Xian(咸永錦)

    1School of Information Science and Technology,Dalian Maritime University,Dalian 116026,China

    2Guangxi Key Laboratory of Multi-source Information Mining&Security,Guangxi Normal University,Guilin 541004,China

    3School of Computer Science and Engineering,Sun Yat-sen University,Guangzhou 511400,China

    4School of Cyber Security,Qilu University of Technology(Shandong Academy of Sciences),Jinan 250353,China

    Keywords: chaotic image encryption,compressive sensing,meaningful cipher image,portable network graphics,image encryption algorithm

    1.Introduction

    With the rapid development of big data technology, the amount of data transmitted in the network is also increasing rapidly.As the mainstream form of multimedia information transmission, digital image is widely used in industry, military, medical, and other fields.At the same time, with the increasing security requirements of modern applications, the security of digital image has also attracted people’s great attention.As an effective means to protect digital image information, a large number of image encryption algorithms have been proposed.[1-3]

    At present, image encryption technology is mainly divided into two categories.The first category is the traditional image encryption algorithm.That is, the plain image is processed and converted into a noise-like cipher image.Many scholars propose different image encryption schemes based on quantum computation,[4,5]chaos theory,[6-8]fractal sorting matrix,[9-11]DNA coding,[12,13]fractal control theory,[14-16]and other technologies.[17-19]Specifically, this type of image encryption algorithms is mainly composed of scrambling and diffusion, which encrypt the image by changing pixel position and pixel value, respectively.However, the noise-like cipher image generated by such algorithms are easy to attract the attention of hackers and thus suffer from various malicious attacks.The other is the visual image encryption algorithm,[20-24]which first converts the plain image into a noise-like image,and then embeds it into the carrier image to generate a visually meaningful steganographic image.Compared with traditional image encryption schemes,the steganographic images are not easy to attract hackers’ attention during transmission,thereby reducing the possibility of being attacked.Therefore,the research on the visual image encryption algorithm is of great significance.

    Baoet al.[25]first proposed a visual image encryption algorithm composed of pre-encryption and embedding process,which can not only protect the security of the content carried by digital image, but also reduce the possibility of being attacked.Unfortunately, the volume of steganographic image generated by this scheme is four times that of the plain image,which leads to the extra transmission bandwidth and storage space.However,improved schemes have been proposed.Chaiet al.[26]used compressive sensing to encrypt and compress the plain image,and then embedded the cipher image into the carrier image to generate steganographic image with the same size.Then, Wanget al.[27]proposed an embedding scheme based on least significant bit(LSB)and integer wavelet transform.The embedding and corresponding extracting process in this scheme are completely reversible.Subsequently, in order to improve the robustness of the encryption algorithm,Zhuet al.[28]proposed a visually meaningful image encryption algorithm based on singular value decomposition embedding.The cipher image was embedded into the diagonal matrix obtained by preforming singular value decomposition on carrier image.In addition,some embedding methods based on pixel value differencing,[29]histogram shifting,[30]reversible color transform,[31]Schur decomposition,[32]most significant bit[33]and others[34-36]were also proposed.Although the existing visually meaningful image encryption algorithms have greatly improved the visual security,there are also some problems: Embedding the cipher image into the carrier image will destroy the pixel structure of the carrier image,and affect the imperceptibility of the steganographic image.There is truncation error in the encryption process, which will decrease the quality of the decrypted image.The extracting process requires the carrier image, which requires additional storage space and transmission cost.

    In order to solve these problems,this paper proposes a visual image encryption algorithm combining hyperchaotic system, compressive sensing and PNG-based embedding.The proposed algorithm consists of two main stages.In the first stage, DWT is applied to plain image.Meanwhile, the hash value of plain image is used to control the hyperchaotic system to generate scrambling and measurement matrix.Then the sparse matrix after threshold processing is encrypted and measured by dynamic spiral block scrambling and compressive sensing to obtain the cipher image.In the second stage, the cipher image is embedded into the alpha channel of the PNG carrier image to obtain a visually meaningful steganographic image.Moreover,the embedding position of cipher image elements is controlled by chaotic sequences.The prominent contributions of this paper are as follows:

    (i) A lossless embedding method and dynamic spiral block scrambling are designed for visual image encryption.

    (ii) The proposed visually meaningful image encryption algorithm has very high visual security.Additionally,the quality of decrypted image is independent of the carrier image.Therefore,the carrier image can be selected flexibly.

    (iii) Our encryption algorithm can effectively resist the chosen-plaintext attacks by associating with the hash value of the plain image.

    (iv)The proposed decryption algorithm can extract the cipher image blindly,which effectively reduces the transmission cost and storage space.

    The rest of this article is organized as follows.In Section 2 we introduce the relevant knowledge.In Section 3 wedescribes in detail the image encryption and the corresponding decryption algorithm.The simulation experiments and performance analyses are given in Sections 4 and 5.In Section 6,we compare the proposed algorithm with other existing visual image encryption algorithms.Lastly,we present a concise conclusion in Section 7.

    2.Relevant knowledge

    2.1.Hyperchaotic Lorenz system

    In this paper, the hyperchaotic Lorenz system is used to generate the pseudo-random sequences, and its dynamic equation[37]is expressed as follows:

    wherea,b,c, andrare the control parameters of the system.Whena=10,b=8/3,c=28, andr=-1, the system is in the hyper-chaotic state,and the corresponding Lyapunov exponents areλ1=0.3381,λ2=0.1586,λ3=0,λ4=-15.1725.In our scheme, four chaotic sequences are generated for encryption and embedding.

    2.2.Compressive sensing

    Compressive sensing(CS)is used to simultaneously sample and compress signals.According to the theory,if the signal is sparse,it can be reconstructed with less sampling data.[38]

    Suppose that a one-dimensional signalx ∈Rncan be represented by a set of linear combinations of sparse basisΨT={ψ1,ψ2,...,ψN}.This process is denoted by

    wheresi={s1,s2,...,sN}is the coefficient vector of signalx.When the signalxhas onlyK(K ?N) nonzero coefficients on a certain basisΨ,Ψis called the sparse basis of the signalx,andsis the sparse coefficient.

    The signalxis projected onto a set of measurement matricesΦto obtain the measurement valuey.That is,anM×N(M&lt;N) measurement matrixΦ, which is not related to the sparse basis matrix, is used to linearly project the signalxto obtain the linear measurement valuey.This process is expressed by

    Since the signalxcan be sparsely represented:x=Ψs, the above formula can be rewritten as

    whereΘis called the sensing matrix.When the matrixΘsatisfies the RIP criterion,[39]the reconstruction process of the signalxcan be transformed into an optimization problem under the minimum norm ofl1,

    At present, the commonly used effective reconstruction algorithms include matching pursuit(MP),orthogonal matching pursuit(OMP),gradient projection(GP),smoothl0norm(SL),and so on.Because the smoothl0norm has the characteristics of low calculation amount,high estimation accuracy,and strong robustness.It is selected as the reconstruction algorithm in this paper.

    2.3.Generating measurement matrix

    When the signal is sparse in the transform domain, the original signal can be compressed by the measurement matrixΦ.The hyperchaotic Lorenz system is used to generate measurement matrix in this paper.The specific generation steps are as follows:

    Step 1 The initial valuesx,y,zandware used to iterate the hyperchaotic Lorenz system for 1000+mNdtimes,and the first 1000 values are discarded to obtain a chaotic sequenceX,

    where parameterdis the sampling interval.

    Step 2 The chaotic sequenceXis sampled equidistantly to obtainX',This process is denoted in Eq.(7).

    Step 3 To map the range of sequence values to(-1, 1),the sequenceX'is processed by using the following equation to obtain a new sequenceX'':

    Step 4 The obtained sequenceX''is reordered in a column-wise manner,and then the measurement matrixΦm×Nis constructed as

    2.4.Dynamic spiral block scrambling

    Spiral scanning can be used to scramble the plain image, which can interfere with the high correlation between image pixels to increase the security level of the encryption algorithm.However, the traditional spiral scrambling has its limitation.After scrambling,the value of the special position in the matrix remains unchanged, such as the position of the number 9 in Fig.1.In addition,some classical scrambling algorithms, such as Arnold transform, have periodicity, which means that the image will return to the original image after a certain number of transformations.In order to solve these problems and to achieve better scrambling effect, a new dynamic spiral block scrambling algorithm is proposed in this paper.This method not only ensures the security of the algorithm, but also changes the positions of all pixels in only one round of encryption.The specific steps are as follows:

    Step 1 Select the appropriate lengthN0to divide the image with size ofM×NintoNSsub-blocks with size ofN0×N0,the number of sub-blocks is expressed by

    Fig.1.4×4 matrix transferred spiral scrambling process.

    Fig.2.A 4×4 matrix transferred by dynamic spiral block scrambling via a 2×2 sub-block.

    Here,represents the smallest integer value not less thanx.IfN0cannot divide the length and width of the image, the image is filled in the shortest sequence, which is randomly composed of integers between 0 and 255, and the number of sub-blocks is determined.

    Step 2The chaotic sequenceYwith length ofNSis used to scramble the pixels in the sub-block.IfYiis odd, a clockwise spiral scrambling is performed on thei-th sub-block matrix.On the contrary,a counterclockwise spiral scrambling is performed.

    where ceil (x) represents the smallest integer value not less thanx.

    Step 3Sort the chaotic sequenceYwith length ofNSin ascending order to obtain the scrambling sequenceS1,and useS1to exchange the positions of the sub-blocks,

    Due to the different pseudo-random sequences generated,the scrambled matrix is also different.The algorithm can change the position of all pixels with only one scrambling.For example,a 4×4 matrix is divided into four 2×2 sub-blocks,and then the process of dynamic spiral block scrambling is shown in Fig.3.

    2.5.Portable network graphics

    Portable network graphics (PNG) is a bitmap graphics format that can represent images lossless.It consists of an 8-byte PNG file signature field and more than 3 subsequent data blocks(IHDR,IDAT,IEND).PNG is designed to replace the two file formats GIF and TIFF.At the same time,it also adds some features that the GIF file format does not have, such as supporting for transparency.PNG can define 256 transparency levels for the image, allowing the edge of the color image to blend smoothly with any background,and because of this,the jagged edges of the image are completely eliminated.Because of the characteristics of small size, lossless compression and better network transmission display, PNG is widely used as information transmission media in the network.

    3.Algorithm description

    3.1.The encryption process

    The flow chart of the encryption scheme proposed in this paper is shown in Fig.3.The algorithm mainly includes two stages.In the first stage,the plain image is encrypted and compressed by dynamic spiral block scrambling and compressive sensing to obtain the cipher image.Then,in the second stage,the cipher image is embedded into the alpha channel of the PNG carrier image to generate the steganographic image.

    Fig.3.The flow chart of the proposed encryption algorithm.

    In the encryption process,the hash value of plain image is used to generate the initial values of the hyperchaotic Lorenz system, and then the hyperchaotic system is utilized to construct measurement matrix, scrambling sequence and embedding sequence.Assume that the size of the plain imagePand the carrier imageCare bothM×N.

    3.1.1.Generating the cipher image based on dynamic spiral block scrambling and CS

    Step 1Perform the hash algorithm on the pixel values of the plain imagePto generate 256-bit hash value and represent it as hexadecimal numberH.Each 16-bit hash value inHis processed according to Eq.(13)to generatek1,k2,k3andk4,

    Step 2Calculate the average value of all pixels of the plain imagePand normalize to getr.The formula is given in the following.Thenk1,k2,k3,k4, andrare used to calculate the initial valuesx,y,z,wof the hyperchaotic system.This process is also given in the following:

    Step 3Use the initial valuesx0,y0,z0,andw0to iterate the hyperchaotic Lorenz system 1000 times and discard these values (to avoid transient effects).Continue to iterate to get the chaotic sequencesX,Y,Z,andW.We have

    Step 4Use the discrete wavelet transform to sparse the plain imagePto obtain the sparse coefficient matrixP1with the same size.This process is expressed as

    whereΨis the orthogonal wavelet matrix,andΨ'is its transposed matrix.

    Step 5If the absolute values of the coefficient matrixP1are less than or equal to the setting threshold,these values are forced to be set to 0 to obtain the matrixP2.The chaotic sequenceYand the scrambling sequenceS1are used to perform the dynamic spiral block scrambling on the matrixP2,and the scrambling coefficient matrixP3is obtained.

    Step 6The chaotic sequence generated by the hyperchaotic Lorenz system is used to generate the measurement matrixΦwith size ofm×N,wherem=×M」,andCRis the compression rate set by the user.The specific construction process is described in Subsection 2.3.

    Step 7Use measurement matrixΦto measure matrixP3,the compressed matrixP4with size ofm×Nis obtained.The measurement formula is

    Step 8Quantize the measurement value matrixP4to the range of 0-255 according to the following equation,the cipher imageP5is obtained.

    where max and min represent the maximum and minimum of matrixP4,respectively,and floor(x)represents the largest integer not greater thanx.

    3.1.2.Embedding the cipher image into the carrier image

    Step 1Convert the cipher imageP5into a binary onedimensional array with size ofm×N, denote asE.Take the adjacent two bits of each element inEas a group,store them successively in the low two bits of four binary arrays with size ofm×N,namelyE1,E2,E3,andE4,and set the value of the remaining bits as 0.

    Step 2Construct a matrixFwhose size ofM×Nand all the values are 255,and divide it into four one-dimensional arraysF1,F2,F3,F4with size ofm×Naccording to

    Step 3Convert the elements in the one-dimensional arrayF1,F2,F3,F4into binary,and set the value of the lower 2 bits of each element to 0 to getF'1,F'2,F'3,F'4.

    Step 4Sort the chaotic sequenceWwith length ofm×Nto get the random replacement sequenceS3.The formula is given as follows:

    Step 5Replace the lower 2 bits ofF'1(S3(i)),F'2(S3(i7)),F'3(S3(i7)),F'4(S3(i)) with the lower 2 bits ofE1(i),E2(i),E3(i),E4(i).The process can be expressed by

    Step 6Convert the elements inF1,F2,F3,F4to decimal,then compose them into a one-dimensional arrayF'with size ofM×N, and finally reshape the one-dimensional arrayF'into anM×NmatrixF''.The formulas for this step are described as follows:

    Step 7 WriteF''into the alpha channel of the PNG format carrier image,and finally get the PNG format steganographic imageSwith the same size.

    3.2.The decryption process

    The decryption process is the reverse process of the encryption process,mainly including extraction and reconstruction.It is worth mentioning that the embedding process and the corresponding extraction process are completely reversible.During decryption, key parameters, such as 256-bit hash value,r,andN,must be sent to the receiver.Figure 4 is the decryption flow chart,the decryption steps are given in the following.

    Step 1 Extract the cipher information from the alpha channel of the PNG steganographic imageS, and the matrixF''is obtained.

    Step 2 The matrixF''is sequentially divided into four one-dimensional binary arraysF'1,F'2,F'3,F'4with size ofm×N.The sequenceS3is used to perform the inverse random replacement operation to obtainE1,E2,E3,E4,the formula is given as follows:

    Step 3 The lower 2 bits of each element inE1,E2,E3,E4are sequentially integrated into the one-dimensional binary arrayEwith size ofm×N.Convert the elements inEto decimal,and reshapeEinto anm×NmatrixP5according to the following equation.P5is the cipher image

    Step 4 The inverse quantization process of matrixP5is performed according to the following equation to obtain the measurement value matrixRP4:

    Step 5 Generate the measurement matrixΦaccording to the method in Subsection 2.3,and then use the smoothl0norm reconstruction algorithm to obtainRP3fromRP4.This process can be expressed by

    Step 6 Use the sequenceYandS1to perform inverse dynamic spiral block scrambling on matrixRP3to generate the matrixRP1.Then inverse wavelet discrete transform(IDWT)is applied toRP1to obtain the final decrypted imageRP.

    Fig.4.The flow chart of the proposed decryption algorithm.

    4.Simulation results

    To verify validity of the proposed algorithm,we carry out experiments on a desktop computer(2.9 GHz i5-9400F CPU,8G RAM), and simulation platform is Matlab R2020a.The parameters during the encryption process are set as follows:d=25,TS=25,CR=0.25,andN=2.

    4.1.Encryption and decryption results

    Eight gray images with the size of 512×512 are selected as test images in experiment,the results of encryption and decryption are given in Fig.5.Each group of simulation experiments is represented by a column in the graph.The third row is the noise-like secret image obtained by dynamic spiral block scrambling and compressive sensing technology.After embedding the carrier image,the generated steganographic image is visually basically consistent with the carrier image,and has very high imperceptibility.To make the experimental results more convincing, the peak signal-to-noise ratio (PSNR)[40]and the mean structural similarity (MSSIM)[41]are used to quantitatively analyze the imperceptibility of steganographic image and the quality of decrypted image.The experimental data obtained is shown in Table 1,where PSNRdecrepresents the PSNR between the plain image and the decrypted image,and PSNRsteand MSSIMsterepresent the PSNR and MSSIM between the carrier image and the steganographic image.As shown in the table,the PSNRstedata are all greater than 48 dB,and the MSSIMstedata are approximately equal to one.It further verifies that the steganographic image obtained by this algorithm has very high visual security.In addition,the value of PSNRdecis also greater than 35 dB.Because the embedding and extracting process is completely reversible, high-quality decrypted images can be obtained.In a word,the experimental results show that the proposed algorithm generates steganographic image with high imperceptibility, and the decrypted image quality is also very satisfactory.

    Fig.5.Simulation results:(a)-(d)are the four plain images Lena,Peppers,Girl and Zelda;(e)-(h)are the four carrier images Barbara,Baboon,Bridge and Goldhill; (i)-(l) are the corresponding secret images, respectively; (m)-(p) are the corresponding steganographic images; (q)-(t)are the respective decrypted images.

    Table 1.PSNR and MSSIM values of simulation results.

    4.2.Influence of different carrier images on simulation results

    In some visual image encryption algorithm based on compressive sensing, the choice of carrier image has a great influence on the quality of decrypted image.In other words,if the carrier image is selected improperly, the quality of the decrypted image will be poor.In addition, different carrier images have a great influence on the imperceptibility of steganographic images.Therefore, the carrier image cannot be selected flexibly.By contrast, the PNG-based embedding method proposed in this paper is to embed the cipher image into the alpha channel of the PNG carrier image, which does not destroy the pixel structure of the carrier image.In order to measure the impact of different carrier images on the quality of the decrypted images in this algorithm, we encrypt the Zelda image with size of 512×512 and then embed it into five different carrier images respectively.The experimental results are shown in Fig.6 and Table 2.It can be seen from the experimental data that different carrier images have no effect on the quality of the decrypted images.The PSNRdecdata are above 37 dB,which indicates that the quality of the decrypted images are very good.In addition, the PSNRstedata are all greater than 48 dB,and the MSSIMstedata are approximately equal to one.It shows that the imperceptibility of steganographic images is very high, and the effect of embedding the same cipher information into different carrier images on the imperceptibility of steganographic images is very small.

    Fig.6.Simulation results for plain image Zelda with different carrier images:(a)-(e)are five carrier images Baboon,Goldhill,Couple,Barbara and Bridge;(f)-(j)are the respective steganographic images;(k)-(o)are the corresponding decrypted images.

    Table 2.PSNR and MSSIM values for different carrier images.

    4.3.Influence of important parameters on encryption and decryption performance

    In the algorithm proposed in this paper, different parameters may have different effects on encryption and decryption,such as the threshold TS.Next, we analyze the impact of the threshold TS on the quality of the decrypted image.We encrypt the plain images Girl and Woman which sizes are both 512×512,and then embed them into the carrier images Goldhill and Barbara through PNG-based embedding method.At the same time,SL0and OMP reconstruction methods are used to analyze the impact of threshold TS on the experimental effect,and the results are shown in Fig.7.It can be seen from the figure that no matter which reconstruction method is adopted,the PSNR shows a trend of first increasing and then decreasing.Therefore, in order to achieve better decryption quality,the threshold TS should be set at about 20.After the threshold exceeds 20,the quality of the decrypted image will gradually decline.The threshold value has a great influence on improving the reconstruction performance of the image.In addition,it can also be seen from the figure that the SL0reconstruction method is generally better than OMP.

    Fig.7.PSNR vs.TS with different reconstruction methods.

    Table 3.Encryption time and PSNR for different sizes of sub-blocks.

    In addition,the number of sub-blocks in the dynamic spiral block scrambling algorithm will also affect the encryption and decryption effects.Taking the plain image Lena with the size of 512×512 as an example, the PSNR is used to quantitatively analyze the quality of the decrypted image.The influence of sub-blocks size on the quality of the decrypted image and encryption time is shown in Table 3.Experimental results show that the smaller the sub-block size is,the longer encryption time the algorithm needs.If the sub-block size is 2×2,the encryption time of the algorithm will be relatively long.When the sub-block size is 8×8,the decrypted image quality decreases slightly in comparison.

    5.Performance analyses

    In this section,we mainly analyze the performance of the proposed algorithm, including key space, plaintext sensitivity, robustness analysis and running efficiency analysis.The parameters used in the experiments are the same as those described in Subsection 4.1.

    5.1.Key security analysis

    The key space is an important indicator to measure whether an encryption algorithm can resist brute force attacks.Generally speaking,the key space of an encryption algorithm needs to reach 2100.[42]This paper performs hash algorithm on the pixel values of plain imagePto generate a 256-bit hash value,which is used to generate the initial valuesx,y,z,wof the hyperchaotic system.Assume that the computing accuracy of the computer is 10-14.Then the total key space is greater than (1014)4×2256?2100.In addition, there are other keys in the encryption process, such as the sub-block sizeN0and the threshold TS.Therefore,the total key space is much larger than 2100,which is enough to resist various brute force attacks.

    5.2.Plaintext sensitivity analysis

    A good encryption algorithm should have high plaintext sensitivity,which can be used to measure whether the encryption algorithm can resist the chosen-plaintext attacks.The encryption scheme proposed in this paper uses the hash value of the plain image to generate the initial values of the hyperchaotic system, so the encryption scheme can well resist the chosen-plaintext attacks.The mean structural similarity and the number of pixel change rate (mathematical expression is shown in Eq.(29)) are introduced to quantitatively evaluate the plaintext sensitivity of the algorithm proposed in this paper.

    In Eq.(30),C1 andC2 are two images with size ofh×w.

    Table 4.Simulation results of the plaintext sensitivity with carrier image Goldhill.

    The experimental results are shown in Table 4.Four plain images with size of 512×512 and the corresponding modified plain images are encrypted, and then embed them into the steganographic image Goldhill.In the first row of Table 4,(125,333)+represents that the pixel values of the pixel point(125,333)in the image Lena are added by one.As can be seen from the experimental data,when the pixel values of the original plain image are slightly modified,the NPCRs between the two generated steganographic images are approximately equal to one, and the MSSIMs are close to zero.This shows that the algorithm proposed in this paper has very high plaintext sensitivity.

    5.3.Robustness analysis

    5.3.1.Noise attack

    Considering that steganographic image will be affected by various noises during transmission,such as salt and pepper noise(SPN),Gaussian noise(GN)and speckle noise(SN),the quality of decrypted image will be reduced.In order to better test the ability to resist noise attacks of the proposed scheme,the plain image Girl with size of 512×512 is compressed and encrypted, and then embed it into the carrier image Bridge.SPN,GN and SN of different intensities are artificially added to the alpha channel of the PNG steganographic image.The experimental results are shown in Fig.8.From the quality of the decrypted image,GN has the greatest effect on the encryption scheme,but the figure contour information in the decrypted image can still be recognized.Numerically,when the noise intensity is 0.00001%, 0.00003%, and 0.00005%, the PSNR values are 37.0430 dB, 35.0528 dB, and 29.3540 dB,respectively.In contrast, SPN and SN have little effects on the encryption algorithm.Under the same noise intensity,the PSNR values remain at 37.0430 dB, which further indicates that the proposed scheme can well resist SPN and SN.Conclusively,the proposed encryption scheme has a strong capability to resist SPN and SN,also it can resist GN to some extent.

    Fig.8.Robustness test results against noise attack for Girl.

    5.3.2.Cropping attack

    Steganographic images may encounter malicious cropping attacks by hackers during transmission.Therefore, the proposed encryption algorithm also needs to be robust enough.In this section, we test the ability of the proposed encryption scheme to resist cropping attacks.In the test, the steganographic images with 32×32, 64×64, 100×100 and 120×120 data losses are illustrated in Figs.9(a)-9(d), and the corresponding decrypted images are shown in Figs.9(e)-9(h), the PSNR values are 32.5064 dB, 31.6406 dB, 29.7184 dB, and 29.0634 dB,respectively.It can be seen that when the steganographic image has 120×120 data loss,the peak signal-to-noise ratio between the decrypted image and plain image can still reach 29 dB, and the contour information of the figure in the decrypted image can still be clearly identified.The experimental results show that the proposed image encryption has a strong ability to resist cropping attacks.

    Fig.9.Robustness test results against cropping attack for Girl: (a)-(d)steganographic images with cropped 32×32,64×64,100×100,and 120×120,respectively;(e)-(h)decrypted images of(a)-(d)

    5.4.Running efficiency analysis

    The running efficiency of the algorithm is also one of the indicators to measure the performance of the encryption scheme.In order to realize the real-time image processing,it is necessary to improve the efficiency of the algorithm as much as possible.In this subsection,we analyze the encryption time of the proposed algorithm, and select the plain image Lena with the size of 512×512 and 256×256 for experiment.When the sub-block sizes of dynamic spiral block scrambling are 2×2 and 4×4, the experimental results are shown in Table 5 and Table 6, respectively.Here “encryption” represents the encryption and compression process,and“embedding”represents embedding the cipher image into the carrier image.It can be concluded from the experimental data that,firstly,the embedding process takes up most of the time of the whole encryption process.However,for Lena with size of 512×512,PNGbased embedding process only takes 0.070259 s,and most of the time is spent on LSB replacement.Secondly,the sub-block size of the dynamic spiral block scrambling has a great impact on the Encryption process time.It can be seen from the comparison that if we want to improve the encryption efficiency of the algorithm,the larger sub-blocks should be selected.

    Table 5.Encryption time for different images via a 2×2 sub-block(unit: s).

    Table 6.Encryption time for different images via a 4×4 sub-block(unit: s).

    5.5.Chosen-plaintext attack analysis

    UP to now, many encryption algorithms have been attacked by chosen-plaintext attacks.The main reason is that different plain images correspond to the same key stream in encryption.However,in this paper,first the average value and hash value of plain image are calculated and used to generate the initial values of the chaotic system.Then, chaotic sequences generated by hyperchaotic Lorenz system are used for dynamic spiral block scrambling,measurement matrix generation and PNG-based embedding.In this way,different encryption keys are generated for different images, thus improving the ability to resist plaintext attack.

    To better prove the proposed algorithm so that it can resist the chosen-plaintext attack,we also carry out experimental verification.This attack can be portrayed as[23]

    whereO1andO2are plain images,C1andC2are their corresponding cipher images.If this equation is applied to anyiandj,it means that the test method can resist the chosen-plaintext attack.

    To intuitively observe more test results, the plaintext attack of three pairs of gray image pairs is tested.In Fig.10,the first and second columns are plain images, the fourth and fifth columns are their corresponding secret images, and the third and sixth columns represent the XOR of two plain images and the XOR of two secret images, respectively.It is evident that the equation is satisfied, so the algorithm has strong resistance towards the chosen plaintext analysis.In addition,we first perform the XOR operation on two plain images,and then perform the XOR operation on their cipher images.We compare the two images obtained after XOR,calculate the number of different pixels between them, and the proportion of these different pixels in the total pixel number of the cipher image.The statistical results are shown in Table 7.From the above discussion,it is clear that the hacker cannot obtain the key by applying a chosen plaintext attack.

    Fig.10.Image-by-pixel XOR operation of two images: (a)plain image Peppers,(b)plain image Zelda,(c)(a)⊕(b),(d)secret image Peppers,(e) secret image Zelda, (f) (d)⊕(e); (g) plain image Lena, (h) plain image Girl, (i) (g)⊕(h), (j) secret image Lena, (k) secret image Girl, (l)(j)⊕(k);(m)plain image Bridge,(n)plain image Goldhill,(o)(m)⊕(n),(p)secret image Bridge,(q)secret image Goldhill,(r)(p)⊕(q).

    Table 7.Statistical analysis of chosen-plaintext attack.

    6.Comparison with related schemes

    In this section, we compare the image encryption algorithm proposed in this paper with existing related algorithms,mainly from the four aspects of visual security,decrypted image quality,robustness,and encryption efficiency.The experimental data are given in the following.In order to make a fair comparison, the experimental data to be compared is directly quoted from the source paper or obtained through simulation experiments.

    6.1.Visual security

    For visual image encryption algorithms, the imperceptibility of steganographic images is an important indicator to measure its security.The higher the imperceptibility of the steganographic image is,the greater the similarity between the steganographic image and the carrier image is,then the higher the visual security of the encryption algorithm is.In order to quantitatively measure the imperceptibility of steganographic images, we compare the PSNRsteand MSSIMstewith the experimental results of Refs.[26,27].The results are shown in Table 8.

    It can be seen from the comparison data that the average PSNRstevalue proposed in this paper is as high as 48.6207 dB, while the average PSNRstevalue of Ref.[26] is only 23.8436 dB.The proposed encryption scheme can also improve the average PSNRstevalue of Ref.[27] by 37.80%.At the same time, the average MSSIMstevalue of the algorithm proposed in this paper has also reached 0.9999, which is much larger than the MSSIMstevalue of Refs.[26,27].In conclusion,the comparison results fully confirm that the algorithm proposed in this paper improves the imperceptibility of steganographic images and has a high degree of visual security.

    Table 8.Comparison of PSNR and MSSIM values of steganographic images.

    6.2.Decrypted image quality

    The embedding process and the corresponding extraction process of the encryption algorithm proposed in this paper are completely reversible.PSNRdecis used to quantitatively compare the quality of the decrypted images,and the experimental data obtained are shown in Table 9.It can be seen from the comparison results that the decrypted image quality of the proposed encryption scheme is much higher than the other,which further confirms that the decrypted image quality of the proposed encryption scheme is very high.three encryption algorithms can resist SN attack to a certain extent.However, when the intensity increases, the algorithm proposed in this paper has better decryption quality.In addition, as can be seen from Table 11, the data loss increases from 16×16 to 80×80,and the quality of the decrypted image generated by our scheme drops by about 5.3 dB, which is less than those in Refs.[27,43].When the cropping mask becomes larger,the encryption algorithm proposed in this paper provides performance gain about 11 dB.To sum up, the proposed image encryption algorithm based on the PNG embedding method can effectively improve the robustness against noise attack and cropping attack.

    Table 9.PSNR values for comparison of different decrypted images.

    Table 10.Comparison of resistance capability of noise attack.

    6.3.Robustness comparison

    In this subsection, we compare the robustness of the proposed algorithm with the algorithm based on IWT+LSB embedding[27]and Dynamic LSB embedding.[43]The experimental data comes from Ref.[28].The plain image Girl is encrypted and embedded into the carrier image Goldhill by different encryption schemes.Then add SPN,GN,SN attack and cropping attack of different intensities to the steganographic image.The experimental data obtained are listed in Tables 10 and 11,where I-LSB and D-LSB separately are obtained using the IWT+LSB and dynamic LSB embedding methods.

    From Table 10, we can see that no matter which encryption algorithm is used, GN has the greatest impact on the cryptosystem.However,compared with the algorithms of Refs.[27,43],the encryption algorithm proposed in this paper can better resist GN attack.The PSNR values are enhanced approximately 13-17 dB at the same intensity.All the encryption algorithms have strong ability to resist SPN attack.All

    Table 11.Comparison of resistance capability of cropping attack.

    6.4.Encryption efficiency

    To encrypt the plain image in real time, the encryption time should be as short as possible,the encryption time should be as short as possible.Comparing the encryption efficiency of the algorithm proposed in this paper with Refs.[27,43],the results are given in Table 12.

    Table 12.The encryption efficiency comparison with other algorithms(unit: s).

    The sub-block size of scrambling algorithm is 2×2.As can be seen from the table,when the size of the plain image is 256×256, the encryption time of all algorithms is very short.However, when the size of the plain image is 512×512, the encryption time of Ref.[43] increases dramatically.To sum up,the encryption efficiency of the proposed algorithm is second only to Ref.[27], while the encryption efficiency of the algorithm proposed in Ref.[43]is the lowest.

    7.Conclusions

    This paper proposes a novel visually meaningful image encryption algorithm combining hyperchaotic system, compressive sensing and PNG-based embedding.In our encryption scheme, dynamic spiral block scrambling and compressive sensing are used to encrypt and compress the plain image.Then the cipher image is embedded into the alpha channel of the PNG carrier image.Different from the existing visual image encryption algorithms,the PNG-based embedding method does not embed cipher image into the pixel,so it does not destroy the pixel structure of the carrier image.The embedding process and the corresponding extraction process are completely reversible, which can avoid truncation errors during embedding and improve the quality of decrypted image.In addition,the proposed decryption algorithm realizes blind extraction,which effectively reduces transmission cost and storage space.Meanwhile, the hash value of the plain image is used to generate the keys, which is beneficial to improve the ability of the proposed algorithm to resist chosen-plaintext attacks.Finally,the experimental results show that the proposed image encryption algorithm has very good visual security,decryption quality and robustness.

    It is worth noting that,although existing visual image encryption schemes have good security performance, their embedding positions are usually fixed or controlled by keys.If the embedding position is not appropriate, the imperceptibility of steganographic image may be affected.Therefore, in the future work,we will devote ourselves to studying an adaptive embedding scheme to further improve the security of the algorithm.

    Acknowledgements

    Project supported by the National Natural Science Foundation of China (Grant No.61672124), the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund (Grant No.MMJJ20170203), Liaoning Province Science and Technology Innovation Leading Talents Program Project (Grant No.XLYC1802013), Key R&D Projects of Liaoning Province(Grant No.2019020105-JH2/103),Jinan City‘20 Universities’Funding Projects Introducing Innovation Team Program(Grant No.2019GXRC031),and Research Fund of Guangxi Key Lab of Multi-source Information Mining&Security(Grant No.MIMS20-M-02).

    猜你喜歡
    興元東華
    “氵”與“冫”的區(qū)別
    認(rèn)識(shí)成語(yǔ)
    情系鄉(xiāng)村振興的最美老干部——艾興元
    An image encryption algorithm based on spatiotemporal chaos and middle order traversal of a binary tree
    Synchronously scrambled diffuse image encryption method based on a new cosine chaotic map
    Force-constant-decayed anisotropic network model: An improved method for predicting RNA flexibility
    相同的“手” 不同的義
    An image encryption algorithm based on improved baker transformation and chaotic S-box?
    立體幾何中這樣運(yùn)用設(shè)而不求
    劉興元小說(shuō)二題
    久久 成人 亚洲| 18禁国产床啪视频网站| 美女大奶头黄色视频| 99热网站在线观看| 精品国产乱子伦一区二区三区 | 国产av一区二区精品久久| 黄片小视频在线播放| 99精品欧美一区二区三区四区| 国产一区二区三区综合在线观看| 国产欧美日韩一区二区精品| 久久99热这里只频精品6学生| 9热在线视频观看99| 久久久国产欧美日韩av| 视频区欧美日本亚洲| 中文欧美无线码| 午夜成年电影在线免费观看| 久热爱精品视频在线9| 欧美精品高潮呻吟av久久| 女性生殖器流出的白浆| 国产国语露脸激情在线看| 久久综合国产亚洲精品| 亚洲欧美激情在线| 欧美黄色片欧美黄色片| 成年人黄色毛片网站| 久久ye,这里只有精品| 一边摸一边抽搐一进一出视频| 国产亚洲精品第一综合不卡| 欧美日韩中文字幕国产精品一区二区三区 | 欧美日韩中文字幕国产精品一区二区三区 | 大型av网站在线播放| 两人在一起打扑克的视频| 一区二区三区四区激情视频| 悠悠久久av| 亚洲第一青青草原| 国产av又大| 搡老乐熟女国产| 777久久人妻少妇嫩草av网站| 久久久国产欧美日韩av| 永久免费av网站大全| 国产成人欧美在线观看 | 久久久久久久久免费视频了| 天堂俺去俺来也www色官网| 日韩欧美一区二区三区在线观看 | 美女午夜性视频免费| 久久中文字幕一级| 欧美一级毛片孕妇| 一本大道久久a久久精品| 亚洲精品一区蜜桃| 日韩视频一区二区在线观看| 99精品久久久久人妻精品| 黑人欧美特级aaaaaa片| 亚洲国产欧美日韩在线播放| 99精品欧美一区二区三区四区| 嫁个100分男人电影在线观看| 多毛熟女@视频| 丝袜脚勾引网站| 精品一区二区三卡| 又大又爽又粗| 人人澡人人妻人| 日韩中文字幕欧美一区二区| 高清视频免费观看一区二区| 麻豆国产av国片精品| 国产成人av激情在线播放| 激情视频va一区二区三区| a级片在线免费高清观看视频| 这个男人来自地球电影免费观看| 天堂8中文在线网| 建设人人有责人人尽责人人享有的| 久久久欧美国产精品| 人成视频在线观看免费观看| 成人影院久久| 国产精品国产三级国产专区5o| 欧美变态另类bdsm刘玥| 这个男人来自地球电影免费观看| 精品国内亚洲2022精品成人 | 少妇猛男粗大的猛烈进出视频| 久久久久久人人人人人| 日韩视频一区二区在线观看| 亚洲avbb在线观看| 国产又爽黄色视频| 国产有黄有色有爽视频| 日本猛色少妇xxxxx猛交久久| 亚洲一区中文字幕在线| 久久亚洲国产成人精品v| 超色免费av| 亚洲国产精品一区三区| 999久久久国产精品视频| 岛国毛片在线播放| 一本色道久久久久久精品综合| 人妻人人澡人人爽人人| 精品人妻在线不人妻| 老鸭窝网址在线观看| √禁漫天堂资源中文www| 午夜激情av网站| 久久久精品免费免费高清| av超薄肉色丝袜交足视频| svipshipincom国产片| 国产精品一区二区精品视频观看| 18禁国产床啪视频网站| tocl精华| 亚洲欧美一区二区三区久久| 人妻 亚洲 视频| 色精品久久人妻99蜜桃| 日日夜夜操网爽| 午夜精品国产一区二区电影| 狠狠婷婷综合久久久久久88av| 亚洲国产欧美在线一区| 777久久人妻少妇嫩草av网站| 他把我摸到了高潮在线观看 | 日本av手机在线免费观看| 老司机靠b影院| 亚洲精品国产精品久久久不卡| bbb黄色大片| 国产成人精品久久二区二区免费| 精品一品国产午夜福利视频| 如日韩欧美国产精品一区二区三区| 亚洲情色 制服丝袜| 超碰97精品在线观看| 十八禁网站免费在线| av福利片在线| 色老头精品视频在线观看| 国产又色又爽无遮挡免| 亚洲人成电影免费在线| 热99国产精品久久久久久7| 精品视频人人做人人爽| 十八禁人妻一区二区| 精品一区二区三区av网在线观看 | 国产xxxxx性猛交| 伊人亚洲综合成人网| 高清在线国产一区| 亚洲全国av大片| 99精国产麻豆久久婷婷| 国产男人的电影天堂91| 在线十欧美十亚洲十日本专区| 精品一品国产午夜福利视频| a在线观看视频网站| 黄色怎么调成土黄色| 亚洲 国产 在线| 成在线人永久免费视频| 久久久精品94久久精品| 亚洲精品久久久久久婷婷小说| 国产片内射在线| 啦啦啦啦在线视频资源| 欧美日韩亚洲综合一区二区三区_| 中文字幕色久视频| 丰满饥渴人妻一区二区三| 19禁男女啪啪无遮挡网站| 久久这里只有精品19| 夜夜骑夜夜射夜夜干| 青春草视频在线免费观看| 亚洲精品日韩在线中文字幕| 亚洲精品av麻豆狂野| 精品人妻1区二区| 69av精品久久久久久 | 亚洲欧美精品综合一区二区三区| 捣出白浆h1v1| av网站在线播放免费| 国产视频一区二区在线看| 在线天堂中文资源库| av片东京热男人的天堂| 久久久精品区二区三区| 免费观看av网站的网址| 亚洲国产中文字幕在线视频| 久久精品亚洲熟妇少妇任你| 下体分泌物呈黄色| av天堂在线播放| 精品福利永久在线观看| 人人妻人人添人人爽欧美一区卜| 国产成人系列免费观看| 亚洲色图 男人天堂 中文字幕| 精品少妇内射三级| 国产精品久久久人人做人人爽| 国产色视频综合| 人人妻人人添人人爽欧美一区卜| 日韩 欧美 亚洲 中文字幕| 18在线观看网站| av国产精品久久久久影院| 国产野战对白在线观看| 成人手机av| 真人做人爱边吃奶动态| 巨乳人妻的诱惑在线观看| 欧美日韩成人在线一区二区| 无限看片的www在线观看| 日韩欧美一区视频在线观看| 亚洲欧美成人综合另类久久久| 五月天丁香电影| 美女高潮喷水抽搐中文字幕| 精品久久蜜臀av无| 飞空精品影院首页| 一级片免费观看大全| 亚洲欧美日韩高清在线视频 | 国产精品av久久久久免费| 国产精品 欧美亚洲| 黄色 视频免费看| 久久人妻熟女aⅴ| www.熟女人妻精品国产| 九色亚洲精品在线播放| 亚洲精品国产区一区二| 亚洲国产精品一区三区| 99久久综合免费| 国产亚洲av高清不卡| 在线观看www视频免费| 日韩欧美一区视频在线观看| 国产亚洲欧美在线一区二区| 满18在线观看网站| 亚洲人成电影免费在线| 婷婷丁香在线五月| 黄片播放在线免费| 国产精品久久久久成人av| 激情视频va一区二区三区| 91字幕亚洲| 国产一区二区三区综合在线观看| 国产激情久久老熟女| 女人被躁到高潮嗷嗷叫费观| 一级,二级,三级黄色视频| 交换朋友夫妻互换小说| 久久久国产一区二区| 黄网站色视频无遮挡免费观看| 老司机影院毛片| 多毛熟女@视频| 久久久久久久大尺度免费视频| 免费观看av网站的网址| 91精品国产国语对白视频| 亚洲国产毛片av蜜桃av| 91国产中文字幕| 一本综合久久免费| 五月开心婷婷网| 亚洲avbb在线观看| 精品人妻一区二区三区麻豆| 两性夫妻黄色片| 欧美性长视频在线观看| 亚洲av日韩精品久久久久久密| 2018国产大陆天天弄谢| 亚洲伊人色综图| 男女边摸边吃奶| 色播在线永久视频| 黄片小视频在线播放| 首页视频小说图片口味搜索| av线在线观看网站| 久久九九热精品免费| av电影中文网址| 国产欧美日韩精品亚洲av| 成人国产av品久久久| 黑人巨大精品欧美一区二区mp4| 一个人免费在线观看的高清视频 | 国产真人三级小视频在线观看| 亚洲人成电影免费在线| 欧美日韩黄片免| 国产福利在线免费观看视频| 午夜福利影视在线免费观看| 一个人免费在线观看的高清视频 | 精品一品国产午夜福利视频| 少妇的丰满在线观看| 婷婷色av中文字幕| 中国美女看黄片| 日韩免费高清中文字幕av| 日本精品一区二区三区蜜桃| 国产高清国产精品国产三级| 美女午夜性视频免费| 黄色片一级片一级黄色片| 久久久久国产精品人妻一区二区| 亚洲欧美一区二区三区黑人| 午夜91福利影院| 国产精品二区激情视频| 久久ye,这里只有精品| 欧美精品高潮呻吟av久久| 国产欧美日韩综合在线一区二区| 亚洲成人免费电影在线观看| 视频在线观看一区二区三区| 水蜜桃什么品种好| 欧美激情高清一区二区三区| 热re99久久国产66热| 午夜福利,免费看| 中文精品一卡2卡3卡4更新| 18禁观看日本| 久9热在线精品视频| 亚洲专区国产一区二区| cao死你这个sao货| 精品卡一卡二卡四卡免费| 精品视频人人做人人爽| 黄频高清免费视频| 国产一区有黄有色的免费视频| 免费黄频网站在线观看国产| 99精国产麻豆久久婷婷| 夜夜夜夜夜久久久久| 夜夜骑夜夜射夜夜干| 欧美在线黄色| 免费人妻精品一区二区三区视频| svipshipincom国产片| 国产亚洲一区二区精品| 欧美黄色片欧美黄色片| 91国产中文字幕| 夫妻午夜视频| 久久精品亚洲熟妇少妇任你| avwww免费| 久久天躁狠狠躁夜夜2o2o| 伦理电影免费视频| 久久精品亚洲熟妇少妇任你| 午夜福利一区二区在线看| 伊人亚洲综合成人网| 国产成人av教育| 一区二区三区四区激情视频| 久久久久久久大尺度免费视频| 日韩视频在线欧美| 亚洲精品美女久久久久99蜜臀| 伊人亚洲综合成人网| 久久精品国产亚洲av香蕉五月 | 久久九九热精品免费| 精品欧美一区二区三区在线| 欧美日韩国产mv在线观看视频| 国产精品99久久99久久久不卡| 18禁观看日本| 国产黄色免费在线视频| 丰满人妻熟妇乱又伦精品不卡| 国产一级毛片在线| 制服人妻中文乱码| 丰满少妇做爰视频| 老司机靠b影院| 亚洲av美国av| 电影成人av| 欧美一级毛片孕妇| 国产av国产精品国产| 丰满少妇做爰视频| 国产精品久久久av美女十八| a级片在线免费高清观看视频| av网站免费在线观看视频| 桃花免费在线播放| 麻豆国产av国片精品| 精品国产乱子伦一区二区三区 | 午夜福利一区二区在线看| 伊人亚洲综合成人网| 精品亚洲成a人片在线观看| 午夜免费成人在线视频| 老汉色av国产亚洲站长工具| cao死你这个sao货| 久久香蕉激情| 中文字幕av电影在线播放| 97人妻天天添夜夜摸| 天堂俺去俺来也www色官网| 国产淫语在线视频| 精品国产乱码久久久久久男人| 国产成人免费观看mmmm| 啦啦啦在线免费观看视频4| 午夜精品国产一区二区电影| 亚洲,欧美精品.| 嫁个100分男人电影在线观看| 丰满少妇做爰视频| 精品人妻熟女毛片av久久网站| 亚洲av电影在线观看一区二区三区| 久久狼人影院| 午夜福利视频精品| av视频免费观看在线观看| 免费久久久久久久精品成人欧美视频| 男人舔女人的私密视频| 91av网站免费观看| 老司机亚洲免费影院| 国产在线免费精品| 亚洲免费av在线视频| 国产欧美日韩一区二区三区在线| 汤姆久久久久久久影院中文字幕| 久久久久久免费高清国产稀缺| 成人手机av| 女性被躁到高潮视频| 国产伦人伦偷精品视频| 中文字幕高清在线视频| 美女脱内裤让男人舔精品视频| 少妇的丰满在线观看| 午夜影院在线不卡| 欧美日韩视频精品一区| 精品福利观看| 亚洲精品自拍成人| 在线十欧美十亚洲十日本专区| 亚洲欧美精品自产自拍| 亚洲国产欧美网| 国产男女超爽视频在线观看| 色播在线永久视频| 日韩,欧美,国产一区二区三区| 久久青草综合色| 美女中出高潮动态图| 中文精品一卡2卡3卡4更新| 午夜两性在线视频| 欧美成狂野欧美在线观看| 国产亚洲精品一区二区www | 黑人操中国人逼视频| 99久久人妻综合| 超色免费av| 91大片在线观看| 999久久久精品免费观看国产| 久久国产亚洲av麻豆专区| 18禁观看日本| a级毛片在线看网站| 亚洲国产中文字幕在线视频| 下体分泌物呈黄色| 国产欧美亚洲国产| 精品一区二区三区四区五区乱码| 热99国产精品久久久久久7| 久久国产精品男人的天堂亚洲| 国产精品一区二区在线观看99| 别揉我奶头~嗯~啊~动态视频 | 亚洲伊人色综图| 中国美女看黄片| 正在播放国产对白刺激| 99久久人妻综合| 免费高清在线观看日韩| 亚洲九九香蕉| 久久人人爽av亚洲精品天堂| 亚洲精品中文字幕在线视频| 亚洲九九香蕉| 成人三级做爰电影| 97精品久久久久久久久久精品| 亚洲人成电影观看| 纯流量卡能插随身wifi吗| 18在线观看网站| 超碰97精品在线观看| 亚洲人成电影免费在线| 午夜视频精品福利| e午夜精品久久久久久久| 久久久久久人人人人人| 成人国产av品久久久| 久久精品国产综合久久久| 亚洲精品美女久久av网站| 精品高清国产在线一区| 国产欧美亚洲国产| 日韩免费高清中文字幕av| 亚洲一码二码三码区别大吗| 中文字幕精品免费在线观看视频| 满18在线观看网站| 啦啦啦中文免费视频观看日本| 亚洲av日韩精品久久久久久密| av电影中文网址| 亚洲精品美女久久av网站| 色播在线永久视频| 永久免费av网站大全| 男男h啪啪无遮挡| 国产一区二区三区在线臀色熟女 | 欧美人与性动交α欧美精品济南到| 亚洲五月色婷婷综合| 亚洲av美国av| 性少妇av在线| 国产主播在线观看一区二区| 1024香蕉在线观看| 欧美一级毛片孕妇| 亚洲成人免费av在线播放| 精品欧美一区二区三区在线| 久久天堂一区二区三区四区| 亚洲美女黄色视频免费看| 中文字幕av电影在线播放| 亚洲av男天堂| 亚洲情色 制服丝袜| 久久久久久久国产电影| 亚洲激情五月婷婷啪啪| 亚洲精品第二区| 欧美人与性动交α欧美精品济南到| 韩国高清视频一区二区三区| 亚洲国产av新网站| 免费少妇av软件| e午夜精品久久久久久久| av欧美777| 国产精品亚洲av一区麻豆| 人妻 亚洲 视频| 精品少妇久久久久久888优播| 他把我摸到了高潮在线观看 | 日日夜夜操网爽| 俄罗斯特黄特色一大片| 欧美日韩国产mv在线观看视频| 91av网站免费观看| 亚洲精品第二区| 欧美黑人精品巨大| 精品熟女少妇八av免费久了| 啦啦啦啦在线视频资源| 国产精品九九99| 亚洲欧洲精品一区二区精品久久久| 一级毛片女人18水好多| 久久久欧美国产精品| 欧美中文综合在线视频| 久久狼人影院| 久久久久视频综合| 国产野战对白在线观看| 欧美日韩视频精品一区| 国产日韩欧美视频二区| 天天操日日干夜夜撸| 夜夜骑夜夜射夜夜干| 国产男女超爽视频在线观看| 久久 成人 亚洲| 国产欧美亚洲国产| 人人妻人人添人人爽欧美一区卜| 亚洲精品一二三| 亚洲精品国产色婷婷电影| 久久亚洲精品不卡| 亚洲avbb在线观看| 青春草视频在线免费观看| 一本—道久久a久久精品蜜桃钙片| 人人妻,人人澡人人爽秒播| 亚洲欧美成人综合另类久久久| 中文字幕制服av| 69精品国产乱码久久久| 999久久久精品免费观看国产| 91国产中文字幕| 午夜两性在线视频| 亚洲精品自拍成人| 欧美成人午夜精品| 纵有疾风起免费观看全集完整版| 亚洲色图综合在线观看| 国产av一区二区精品久久| 欧美国产精品一级二级三级| 欧美+亚洲+日韩+国产| 99热国产这里只有精品6| 无遮挡黄片免费观看| av一本久久久久| 国产精品.久久久| 欧美激情久久久久久爽电影 | 99热国产这里只有精品6| 搡老岳熟女国产| 人人澡人人妻人| 久久人妻福利社区极品人妻图片| 亚洲专区国产一区二区| 三级毛片av免费| 久久精品aⅴ一区二区三区四区| 亚洲 欧美一区二区三区| 国产免费福利视频在线观看| 国产一级毛片在线| 婷婷丁香在线五月| 日韩,欧美,国产一区二区三区| 欧美 亚洲 国产 日韩一| 中文欧美无线码| 免费黄频网站在线观看国产| 亚洲情色 制服丝袜| 叶爱在线成人免费视频播放| 亚洲中文字幕日韩| 精品一区二区三区四区五区乱码| 国产精品久久久人人做人人爽| 久久国产亚洲av麻豆专区| 男女下面插进去视频免费观看| 黄色 视频免费看| 久久久久国产一级毛片高清牌| 日本精品一区二区三区蜜桃| 老司机深夜福利视频在线观看 | 国产精品1区2区在线观看. | av线在线观看网站| 最黄视频免费看| 国产精品久久久久久精品电影小说| 在线看a的网站| 久久精品亚洲熟妇少妇任你| 久久久水蜜桃国产精品网| 黄片播放在线免费| 久久久国产欧美日韩av| 国产免费现黄频在线看| 亚洲精品国产一区二区精华液| 国产亚洲av高清不卡| 性色av乱码一区二区三区2| 人人妻人人添人人爽欧美一区卜| 久久国产精品男人的天堂亚洲| 高清av免费在线| 国产在线观看jvid| 色婷婷av一区二区三区视频| 国产亚洲精品第一综合不卡| 一区在线观看完整版| 亚洲欧美激情在线| 国产精品自产拍在线观看55亚洲 | 热re99久久精品国产66热6| 人人妻人人爽人人添夜夜欢视频| 国产一区二区 视频在线| 免费少妇av软件| 国产精品九九99| 国产精品一区二区在线不卡| 欧美激情 高清一区二区三区| 少妇的丰满在线观看| 美女中出高潮动态图| 爱豆传媒免费全集在线观看| 国产淫语在线视频| 精品久久久久久电影网| 日本欧美视频一区| 午夜久久久在线观看| 少妇精品久久久久久久| 国产成人啪精品午夜网站| 国产91精品成人一区二区三区 | 制服诱惑二区| 国产欧美日韩一区二区三区在线| 老鸭窝网址在线观看| 亚洲熟女毛片儿| 狠狠婷婷综合久久久久久88av| av免费在线观看网站| 麻豆av在线久日| 99国产精品一区二区三区| 伊人亚洲综合成人网| 亚洲欧美一区二区三区久久| 国产亚洲精品久久久久5区| 国产人伦9x9x在线观看| 美女午夜性视频免费| 久久久久精品国产欧美久久久 | 男人爽女人下面视频在线观看| 51午夜福利影视在线观看| 亚洲国产欧美在线一区| 亚洲精品久久成人aⅴ小说| 亚洲欧洲日产国产| 国产精品久久久av美女十八| 欧美另类亚洲清纯唯美| 一个人免费看片子| 黄色片一级片一级黄色片| 每晚都被弄得嗷嗷叫到高潮| 国产精品 国内视频| netflix在线观看网站| 欧美在线一区亚洲| 999精品在线视频| 男女边摸边吃奶| 欧美性长视频在线观看| 亚洲av日韩精品久久久久久密| 人人妻人人添人人爽欧美一区卜| av在线app专区| 日本猛色少妇xxxxx猛交久久| 国产日韩欧美亚洲二区| 在线观看免费午夜福利视频| av在线app专区| 亚洲国产av影院在线观看| 日本欧美视频一区|