• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    New Fragile Watermarking Technique to Identify Inserted Video Objects Using H.264 and Color Features

    2023-10-26 13:13:54RaheemOglaEmanShakarMahmoodRashaAhmedandAbdulMonemRahma
    Computers Materials&Continua 2023年9期

    Raheem Ogla ,Eman Shakar Mahmood ,Rasha I.Ahmed and Abdul Monem S.Rahma

    1Computer Science Department,University of Technology,Baghdad,11030,Iraq

    2Computer Science Department,Al_Maarif University College,Anbar,31001,Iraq

    ABSTRACT The transmission of video content over a network raises various issues relating to copyright authenticity,ethics,legality,and privacy.The protection of copyrighted video content is a significant issue in the video industry,and it is essential to find effective solutions to prevent tampering and modification of digital video content during its transmission through digital media.However,there are still many unresolved challenges.This paper aims to address those challenges by proposing a new technique for detecting moving objects in digital videos,which can help prove the credibility of video content by detecting any fake objects inserted by hackers.The proposed technique involves using two methods,the H.264 and the extraction color features methods,to embed and extract watermarks in video frames.The study tested the performance of the system against various attacks and found it to be robust.The evaluation was done using different metrics such as Peak-Signal-to-Noise Ratio(PSNR),Mean Squared Error(MSE),Structural Similarity Index Measure (SSIM),Bit Correction Ratio (BCR),and Normalized Correlation.The accuracy of identifying moving objects was high,ranging from 96.3% to 98.7%.The system was also able to embed a fragile watermark with a success rate of over 93.65% and had an average capacity of hiding of 78.67.The reconstructed video frames had high quality with a PSNR of at least 65.45 dB and SSIM of over 0.97,making them imperceptible to the human eye.The system also had an acceptable average time difference(T=1.227/s)compared with other state-of-the-art methods.

    KEYWORDS Video watermarking;fragile digital watermark;copyright protection;moving objects;color image features;H.264

    1 Introduction

    With the rapid advancement of modern technology,the interest in copyright security and the verification of computerized media content (music,images,and video) are becoming increasingly important [1,2].Information transmitted over interconnected networks,especially sensitive video content on the internet,is subjected to various malicious attacks.These attacks cast many doubts about the security,authenticity,and integrity of the video content on the receiving end [3].Watermarking technology has become popular for ensuring the authenticity of digital video content[4].One of the main challenges of image processing is the processing of digital video,which is key for the identification of interesting objects within images[5,6].Digital watermarking is a technique that embeds hidden keys known as watermarks into video data;these hidden keys serve many purposes [7–9].For example,watermark files are added to images,audio,and videos for authentication [9].There are two types of watermarks:blind and non-blind[10].Non-blind watermarks require a dataset for retrieval,while blind watermarks do not require the original video contents to be retrieved [11].In cases where the authenticity of a video’s contents is in question,a secure validation framework can be used to show that no tampering has occurred and to detect and identify tiny changes in watermarked interactive media information.To achieve this,sophisticated watermarks are designed [12].The main goal of developing a watermark framework is to ensure the integrity of live video by detecting and verifying that no modifications have been made [13–15].However,traditional watermarking techniques are susceptible to tamper attacks and require careful solutions to address challenges such as the ability to detect changes without the original video and sensory transparency [16,17].Many watermarking algorithms have been proposed to protect copyright and certify standards[17],including recent ones that focus on the H.264/AVC(Advanced Video Coding)standard encoding[18,19].However,it is not possible to directly apply many of the previously proposed video watermarking algorithms;therefore,it is necessary to develop new algorithms to meet these standards.

    This paper proposes a hybrid watermarking technique that is both imperceptible and robust.Two hybrid methods,H.264 and color feature extraction,are used to embed digital watermarks into videos.This technique ensures that contents or moving objects are not inserted into the original video contents,thus providing proof of ownership and addressing unresolved challenges by bridging the digital gap to authenticate video content against hackers.The H.264/AVC video authentication method focuses on the compressed domain,and the embedding process takes place within the compressed bit stream provided by H.264/AVC[20].

    2 Related Work

    The system introduced in this paper includes watermarks that are embedded into the spatial domain.In this section,in this paper,many review research conducted on the proposed methodology.

    The authors of[21]presented a new approach for fragile watermarking that has a high capacity for retrieval.Their method involved embedding authentication bits in the adaptive Least Significant Bit(LSB)layers of each block’s central pixel,based on the block’s complexity for the mean value of bits.The researchers used three methods to retrieve adjacent blocks,and despite a large tampered area,they claimed that their proposal achieved high quality compared to other methods.

    The authors of[22]introduced the independent embedding domain(ED)by adopting two RRW(robust reversible watermarking) stages.They recommended transforming the cover image into two independent EDs and embedding robust and reversible watermarks into each domain separately.The authors confirmed that the embedding performance of the original RRW was greatly improved through their proposed method.

    The authors of[23]studied a set of features using Log-Polar,discrete wavelet transform(DWT),and singular value decomposition(SVD)techniques to embed and retrieve watermarks for the purpose of safeguarding copyright and creating a robust and undetectable watermark system.They employed the strategy of discarding frames and achieving specific features to enhance their method.The researchers also used scramble and deep learning-based approaches to create a secret sharing image of the watermark,which improved comparison speed compared to the traditional table-based approaches of Log-Polar,DWT,and SVD.

    The authors of[24]proposed a technique for authenticating surveillance videos using semi-fragile watermarking in the frequency domain.The process involved generating a binary watermark and identifying regions of interest to use as holders for the watermark during the embedding process.These regions were decomposed into different frequency sub-bands using SVD and DWT.Then,the watermark was embedded in the selected bands in an additive manner.Blind detection was used to retrieve the hidden signature from the watermarked video.

    The authors of [25] proposed a low-cost algorithm for detecting video tampering by using the correlation coefficients between video frames and merging them as encoded data in the first frame of the video stream.To embed the encoded data,the correlation values were calculated and encrypted using the Advanced Encryption Standard(AES)algorithm.Finally,the encryption result was hidden using bit-substitution technology,which randomly selects the two least significant bits from the first frame.

    The authors of[26]proposed a modern watermarking technique that involved embedding multiple messages and a photograph into a single image for protection,as well as repeating N-frames in the film.They used multiple video sequences and evaluated their approach using three types of content:MP4,AVI,and MPEG.They also proposed a method for combining two watermarks in a specific video format.

    The authors of [27] introduced a video watermarking technique that utilized a moving object detection algorithm to embed a bit stream watermark.The goal of the watermark was to increase the moving object’s robustness by identifying large blocks that belonged to it in each frame of type P.An animated object detection algorithm was used to embed the watermark in the blocks to ensure the continuity of the bit stream.

    The method proposed in this paper offers a precise authentication technique that maintains the original bitrate and sensory quality while offering high fragility and accuracy.The method can detect tampered frames in cases of color manipulation and spatiotemporal tampering.

    The proposed method creatively connects the content of video sequences,and it is designed to be sensitive to malicious attacks by hackers.The method is robust and has low computational complexity,and can be applied to different video formats.Additionally,it is sensitive to detecting and verifying that no modifications occur in live video by using a fragile watermark embedded in video content to achieve video copyright protection.The distinctive features and novelty of the proposed method can be summarized as follows:

    1.The accuracy of determining the location of the movement of the objects in the video frame,and considering it a fragile region to insert the watermark.

    2.Investing in the real-time movement of the moving object in the video frames to insert the largest capacity of the watermark to secure the copyright of the video.

    3.The method has less computational complexity.Despite,there being many measures and criteria used to verify.

    4.The method is powerful in protecting online video regardless of video resolution or format.

    But,when various practical experiments for various video films were conducted,proposed method faced some limitations and challenges.It was found that low-resolution video films have a very small amount of watermark insertion compared to high-resolution video films.In addition to,the cartoon videos prepared for children,the movement of objects in them is far apart(the moving objects)in the spatial space,which leads to difficulty in identifying the fragile area used to insert the watermark.This leads to poor security of this type of video,which leads to the ease of identifying the watermark by hackers.

    In recent years,data transmission via multimedia has become an important issue that cannot be abandoned.At the same time,deliberate attacks to sabotage and falsify this data have escalated,so ensuring the credibility and integrity of digital media is a major issue that requires the development of basic mechanisms and solutions.The issue of multimedia security is a fundamental issue,as videos,audio,images,and text files lose their credibility,as tamperers use multiple tools to distort or manipulate their contents by deleting or entering unwanted information,so all kinds of information and data are transmitted over the network with many problems related such as illegal distribution,copying,manipulation,and forgery.Therefore,the motive behind this paper came to contribute to solving the above-mentioned issues related to securing data transmitted via multimedia in the proposed way.

    The remainder of the paper is structured as follows,Section 3 introduces the proposed work,Section 4 details the advanced features of video encoding,Section 5 describes the technique for a fragile watermark and its structure,as well as embedded and extracted color features,Section 6 presents the experimental results and corresponding discussion,finally,Section 7 concludes the paper and suggests areas for future work.

    3 Methodology

    This section describes the methodology used in this research.To watermark video content,two hybrid methods are used:H.264 and color feature extraction.The aim is to identify the most vulnerable regions caused by the rapid movement of objects in video frames,by determining the background of moving objects in digital video.This enables the insertion of watermarks in fragile areas to secure real live videos and protect their copyright.The video watermark scheme is designed to detect various attacks by hackers that tamper with moving objects and their backgrounds in the video,such as inserting unwanted information or video piracy.

    3.1 H.264 Method

    The proposed method for video watermarking is based on the H.264 standard developed by the Joint Video Team(JVT).This method uses novel coding approaches to improve the Rate–distortion(RD)performance compared to the previous H.263 standard.A fragile video watermarking technique is introduced where the watermark data is contained in a movement-mapped,extremely fragile matrix.The H.264/AVC video watermarking approach that is used during encoding embeds the watermark in the motion object matrix,taking advantage of its fragility based on statistical analysis to determine the best RD cost using the H.264/AVC RD.This approach also detects the location of moving objects in a video sequence by analyzing the movement vectors using the H.264/AVC RD.

    3.2 Color Feature Extraction Method

    The second method that is used to protect the ownership of video copyrights involves the extraction of the color features from the key frames of the video.This involves comparing frames with lower level features such as color and structure to extract an accurate key frame that covers the entire video sequence using a two-stage method.First,an alternate sequence is created by identifying color feature differences between adjacent frames in the original sequence.Then,by analyzing the structural feature differences between adjacent frames in the alternate sequence,the final key frame sequence is obtained.An optimization step is included to ensure efficient key frame extraction based on the desired number of final key frames.

    The measure of structural similarity is determined by calculating the covariance.This involves measuring the similarity of the blocks within a frame at different points,denoted as P(xi,yi).The covariance ofxandy,which is used to determine the correlation coefficient,is then calculated using Eq.(1).

    whereμiindicates the value of an average andNis the number of blocks within the frame.

    The structure similarity component between two frame blocks is calculated as(x,y),based on the two blocks of the corresponding frame at the same positionx(in the original image)andy(in the test image)as shown in Eq.(2).

    whereI=((M×N)2/2),M∈[0,255],N?1,and the variance ofxandyareσxandσy,respectively.

    4 Proposed Method

    The proposed method aims to detect different types of attacks done by hackers who tamper with moving objects and their backgrounds in videos by inserting unwanted information or engaging in video piracy.The detection of such tampering is achieved by embedding fragile watermarks in video content for copyright verification.Two techniques,H.264/AVE and color feature extraction,are used to authenticate and verify the watermark.The suggested method involves two stages,embedding and extracting watermarks.A general block diagram of the proposed digital video watermark for protecting transmitted video content is shown in Fig.1.

    Figure 1:General block diagram of the proposed digital video watermark for protecting transmitted video contents

    The proposed embedding phase has been described in Algorithm 1,involves multiple steps.

    The suggested approach verifies if the video content has been tampered with or not.This method takes into account certain environmental parameters,such as accurate background frames,quality,and ability to handle changes in illumination.Additionally,techniques for updating the background are needed to detect moving objects.The proposed extraction phase has been described in Algorithm 2,involves several steps.Those steps including designing a process for decomposing digital videos,identifying the positions where fragile watermarks should be inserted,and creating a matrix consisting of 0 s and 1 s that maps out where the watermarks should be embedded as secret keys.To prevent sudden background movements caused by external factors like water ripples,cloud movements,leaf movements,snow,and rain,a technique for extracting color features is used.These processes are illustrated in Fig.2.

    4.1 Watermark-Based Color Feature Extraction Method

    The proposed method is based on the idea that in live videos,the background color of objects usually differs from the color of the foreground.Thus,in addition to intensity and color information,there are other factors that help differentiate the background and foreground of objects in frames.Each pixel P(Xc,Yc)in a frame consists of three color components(R,G,and B).However,adding color information can increase the length of the binary bits,leading to an increase in pattern dimensions and a reduction in algorithm efficiency.To overcome this,the Color of Spatial of Binary Patterns local binary patterns(CS_LBP)technique can be used to reduce patterns by utilizing central symmetry[11],choosing a small number K,and dropping one of the three color bits,which does not impact the intensity of the brightness since the three bits are highly chromatic.

    The CS_LBP utilized in this work is defined in Eq.(3),and the video features are described in Algorithm 3.

    where SCBP is a method that uses the average color of pixels in a region to represent its feature,CS_LBP is Color of Spatial of Binary Patterns local binary patterns,and (Xc,Yc) is the center of the pixel block.The total number of SC_LBP patterns is 64 if the K value is set to 4 The histogram of SC_BP is computed based on the radius of the circular region surrounding a pixel and is used to represent the pixel’s feature vector.A background model is created using these feature vectors.

    4.2 Background Design

    To hide the secret watermark key in the frame background,the method computes the average movement rating of objects in the frames.This is done by using Eq.(4)to model the background.

    whereBt-1(x,y)is the background of the previous frame,Ii(x,y)is the upcoming video frame,andtis the number of frames in the video sequence.

    4.3 Background Subtraction

    The detection model’s output,as shown in Fig.3,is a binary image that displays the background pixels’values.The threshold parameterTp(x,y)is defined as the value of primitiveTp.Whenever the process of updating the background model and updating the threshold of the background is carried out,it is updated as shown in Eq.(5)

    wheref (x,y)represents the similarity between the background histogram and the feature vector,Tpis a threshold and the learning rateαis close to 1.

    Figure 3:Background subtraction process

    4.4 Digital Video Verification Process Design

    This step of the proposed system involves checking the received video for tampering.The received video is loaded into the graphical user interface to undergo two types of operations:feature extraction and message extraction.Feature extraction is used to obtain unique features of the received video,while message extraction is used to obtain the user’s secret key embedded in the video frames.Using the secret key,the original video features can be accessed.The extracted features from the received video are then compared with the original features to detect any tampering that may have occurred.The integrity of the submitted video is demonstrated in Fig.4.

    Figure 4:Proposed method to ensure the integrity of the submitted

    4.5 Validation Process

    The proposed algorithm for video validation involves comparing the pixel values of original blocks with the decoding blocks of successive frames.To add a watermark to a video frame,it is first divided into blocks,and the watermark is added to each sub-block.During watermark retrieval,each subblock is validated,and if any sub-block does not contain the correct watermark,the entire block is considered tampered with.This ensures that the entire video is secure and that any tampering can be detected.

    5 Watermark Based H.264 Method

    The proposed method utilizes the block size motion compensation feature of H.264/AVC codec,which allows for an accurate representation of motion in a macro block and also provides opportunities for watermark embedding.In traditional video codecs,motion compensation is done using a fixed block size,while H.264/AVC uses variable block sizes.The codec compresses temporal redundancy between frames by estimating motion vectors and using them in inter-frame coding.The watermark is embedded by adding it to the original motion vectors,computing the new prediction error,and encoding the new motion vectors along with updated prediction errors into compressed bit streams.This allows for watermark embedding without the need to decompress the video.The proposed method is based on this H.264/AVC technique and will be implemented in the following sections.

    5.1 Feature Extraction Based on H.264

    The precise identification of the location of a fragile watermark can be used to indicate where tampering has occurred.In order to achieve effective and efficient tampering detection,it is important to have a well-designed localization feature,as shown in Fig.5.In Fig.5a,the video frame is divided into multiple rectangular groups,with 9 groups per frame in Quarter Common Intermediate Format(QCIF) format (176×144 pixels).These groups are further divided into three subgroups,each containing different macro-blocks.Since the dividing process of frames into blocks is interested in video frames that are typically located in the central area of the frame,where each three macroblocks are grouped together to form one subgroup when searching in the central area,and 4 macroblocks together when searching in the left or right subgroup.Additionally,each H.264 macroblock contains 16 pieces,as specified in the Discrete Cosine Transform(DCT)used in the H.264/AVC standard,as shown in Fig.5b.Using a private key,can able to select a coefficient at random from each DCT piece,resulting in 16 coefficient values for each macroblock.These 16 coefficients are then subjected to an Exclusive-Or(XOR)operation,producing a single coefficient value.The watermark for each subgroup coefficient is generated by performing XOR on the previously XORed coefficients of the macroblocks within the subgroup.The system then searches for object movement and detects fragile regions based on the number of pixels of blocks in consecutive frames.The resulting values are aggregated into a feature matrix and the key is then extracted from the fragile background of the moving object.

    Figure 5:(a)Block division and(b)generation of authentication watermark

    5.2 Watermark Embedding Based on H.264

    Watermark embedding has been suggested that the watermark is carried using motion vectors.Previous approaches to watermark embedding using motion vectors have relied on intuition rather than statistical analysis to select embedding locations.In contrast,our proposed method utilizes statistics,such as the Bjontegaard Delta PSNR (BD-PSNR) used by the JVT group to evaluate the PSNR differences between the RD curves of two calculations’bit rates.In H.264,the encoder conveys not only the motion vector but also the contrast value of the vector(Delta MV)between the motion vector (MV) and its expected value based on surrounding blocks.Where the MVs are categorizing into seven classes based on its length and perform watermarking embedding independently on each class to assess PSNR degradation and bit rate increase.The resulting BD-PSNR values are computed and plotted in Fig.6,showing that certain MV classes,such as|MV|between 2 and 22,are better for embedding due to less BD-PSNR degradation.Therefore,the final embedding location are selected from MVs in the 1 to 10 length range using a secret key and frame numbers.

    Figure 6:Selecting embedding position by using BD-Rate and BD-PSNR

    Watermarking often involves modifying and adjusting the value of theMVor motion differential vector during the embedding process.To achieve this,to determining the typical motion vector offset a criterion must be established.This is accomplished by minimizing the cost function of the Lagrangian RD and H.264/AVC,and the resulting value can be computed using Eq.(6).

    whereDandRrepresent distortion and rate,respectively,and are used to calculate the corresponding Lagrange multiplier.The value ofJ=1is used by H.264 to select the optimum mode and MV for that mode.To embed the watermark,the value of MV must obtain firstly,and then calculate its length.Then,Eq.(7)is used to insert and embed the watermark into the MV.

    whereMVxandMVyrepresent the watermarkedMVxandMVy,respectively,andWMrepresents the two-bit watermark to be embedded.If the condition is satisfied,then the MV remains unchanged after embedding the watermark.Otherwise,it is need to modify the MV in an RD sense by adjusting either the horizontal componentMVxor the vertical componentMVy.In Fig.7 the optimal quarterpixel MV is computed in area 7 using(1).However,it is need to capture the half-pixel motion vector during the motion search(in area B).If(2)is true,then can embed the watermark in area 7 without modifying the MV.Otherwise,it is need to need to modify the MV by replacing it with MV’,which is determined by finding the point with the lowest value of(1)among B,1,3,6,or 8.

    Figure 7:Fractional modification position

    5.3 Watermark Detection Based on H.264 Method

    To detect the watermark using the suggested fragile method,a specific video is needed for extracting the watermark,which can also result in difficult detection.The watermark detection process involves several steps:

    ? Identify watermarking areas that utilize the same calculation as the embedding preparation.

    ? Determine the watermark information using Eq.(8).

    5.4 Watermark Verification

    The previous frame can be verified by comparing the watermarks that have been detected in the current frame with the extracted features,as illustrated in Fig.8.

    Figure 8:Watermark verification

    6 Experimental Results and Analysis

    To evaluate the proposed watermarking approach,where the H.264/AVC JM9.2 computer program[9]and other assistance programs as references,it is need to tested the approach on several video sequences,including Foreman(QCIF),News(QCIF),Silent(QCIF),Container(QCIF),and Mobile(CIF),among others.To comply with the H.264 baseline profile,it is need to use the IPP H.264 Encoder to encode the video frames with QP values of 24,28,32,36,and 40.And the results,shown in Table 1 and Fig.9,demonstrate the proposed method outperforms three other motion-based watermarking strategies proposed by Hammami [24] in terms of RD performance metrics such as Bitrate/Kbps,PSNR/dB,and RD.

    Table 1:PSNR and bit rate twisting

    Fig.9 also illustrates the proposed watermarking approach achieves the highest quality of RD compared to other methods.This is because the proposed method has been carefully designed to embed the watermark in a specific and optimal location,based on statistical analysis.Additionally,the proposed method is more effective since all potential directional offsets of the motion vector for watermark insertion has been used.

    Figure 9:Rate distortion curves

    6.1 Execution Time Estimation

    The implemented process of inserting and extracting the watermark using programs written in the C#programming language.The operations were carried out on a computer with Windows 10(64 bits)and an Intel(R)Core i5-4200 m CPU@2.50 Ghz 2.49 processor.The execution times for different video sizes are presented in Table 2.

    Table 2:Embedding time and extraction processes for watermark

    In terms of testing and evaluating the elapsed time,the experimental tests were carried out using two binary messages that were inserted as watermarks during the embedding and extraction process,and the results were calculated by applying the watermark to the selected frames of the video.In order to examine the effect of time,experimental time complexity was carried out.It is taken that the embedded time value is the same for both the first watermark and the second watermark.and show that the embedded time value is proportional directly to selected frame numbers.A total of 6 frames were specified from pure storage video;Thus,the total embed time is the highest for the same video.Tables 3 and 4 collect the processing time(in seconds)required to perform frame selection,embedding,and watermark extraction for a given set of video frames.The results proved that the time depends entirely on processor specifications and the selection of frames from the video.Figs.10 and 11 present the estimation time for embedding and Extracting of deferent videos when two watermarks are inserted.

    Table 3:Elapsed time(in second)of 6 videos based watermark message one

    Figure 10:Estimation time for embedding and extracting of deferent videos:Watermark 1

    Figure 11:Estimation time for embedding and extracting of deferent videos:Watermark 2

    6.2 Performance Metrics

    To assess the effectiveness of the proposed method,several standard performance metrics,including PSNR,SSIM,and bit correction ratio (BCR) are used.These metrics were used to evaluate the imperceptibility,robustness,and quality of watermarked video frames.These metrics are commonly used in watermarking and are defined by Eqs.(9)–(13).Specifically,the PSNR metric used to measure the quality of the original video frame and the frame on which the watermark was inserted,as described in Eq.(9).

    whereMaxis the maximum pixel value of the original sequence frames in the original video,andMSE(Mean Square Error)is the error between twoh×wframes(that is,the original frames and the watermark)as specified in Eq.(10).

    To extract the watermark from a watermarked video frame,the value of PSNR determined by≥65 dB indicates good quality frame reconstruction,as described in Eq.(9).Additionally,the metric SSIM metric has been used,as defined in Eq.(11),to assess the perceptual quality degradation produced by watermark insertion.SSIM quantifies the perceived difference between two similar frames and generates a quality reference by comparing the original and modified frames.

    whereK1andK2are constants used to assure stability when the denominator equals 0,μ1,andμ2represent mean values,andσis the values of variance framesF1andF2.

    To evaluate the accuracy of the extracted watermark bits,the BCR (Benefit Cost Ratio) metric are used,the metric compares the two sequences of digital binary frames: the inserted data and the extracted watermarks(B,B’,respectively).BCR is defined as the number of bits that were correctly extracted as a percentage of the total number of bits that were embedded in the host frame,as described in Eq.(12).

    wherenis the bit’s sequence length and ⊕represents the XOR operator.The BCR value is 100%.According to Eq.(12),if the extracted watermark contains no errors,the BCR accuracy value will be 100%.

    6.3 Effective Gain Index

    When performing image watermarking,there is a trade-off between embedding and robustness.To strike a balance between these qualities,an appropriate gain index factor(BCR)value should be chosen for embedding the watermark.In experimented results three different gain factor values has been tested(λ=0.1,0.2,and 0.3)to measure the invisibility and robustness of the video frame watermarking,as shown in Table 5.The table displays the different gain factor values used and their impact on the watermark’s visibility and robustness.

    Table 5:Fidelity-based criteria for PSNR(dB),SSIM,and BCR(%)

    6.4 Robustness and Attack Analysis

    To compare the extracted watermarks with the original frames,the normalized correlation(NC)metric is used,which produces values between 0.0 and 1.0.Eq.(13) describes the calculation of this metric.

    When the NC value approaches 1.0,it means that the extracted watermark is very similar to the original one.Table 6 compares the PSNR and NC values of the proposed watermark extraction technique with other conventional algorithms.It is clear that the proposed technique outperforms the conventional algorithms in terms of watermark quality.To test the robustness of the proposed technique,various attacks were applied to the watermarked frames,including gamma correction,contrast adjustment,Gaussian noise,rotation,cropping,MPEG4 compression,resizing,JPEG compression,noise addition,filtering,frame averaging,histogram equalization,and frame dropping.Table 6 shows the results of most of these attacks.

    Table 6:Comparison of the proposed technique with other algorithms(Attacks)

    6.5 Security Analysis

    In order to analyse the security of the watermarked video it is must be subjected to different video processing such as Gaussian,Poisson,and Speckle noise,and Salt&Pepper,Its effect is similar to what hackers do to remove the watermark embedded in video content.Therefore,the proposed watermarked method has been evaluated and tested with various attacks having numerous parameters until the quality of the watermarked videos is acceptable according to the known quality metrics.(explained in Section 4.5).Those attacks have been implemented by inserting specific noise ratios on watermarked video frames,the selected attacks are Gaussian,Poisson,Salt &Pepper,and Speckle noise.Where Gaussian noise and Speckle noise attacks have been implemented with variances(0.001 to 0.002 and 0.001 to 0.003),respectively,the watermarked video frames were subject to a Poisson noise attack to evaluate them,and then the original video is effectively extracted by the proposed watermarking method,Salt and pepper noise attack implemented with noise density 0.001 and 0.002 on the watermarked video frames.The outcomes reflect that the efficiency,performance,and strength of the proposed method for video frames are promising,where original video frames are effectively extracted by the proposed watermarking method.The effectiveness of attacks is shown in Tables 7–10,respectively.

    Table 7:Extracting watermarks using Gaussian noise attack with variance values(0.001 and 0.002)

    6.6 Discussion

    To validate the effectiveness of the proposed approach,the Bit Error Rate (BER) was used as another performance metric in addition to the BCR measure discussed in Eq.(12)and Table 4.Table 5 presents the BER values obtained by the Mostafa,Wand,Nisreen methods [29],and the proposed method.The results demonstrate that the proposed method outperforms the other methods,as shown in Table 11.

    6.7 Comparing Suggested Method to Other Methods

    A comparison was performed between the suggested work’s results employing fragile watermarks to identify tampered with and those of previously used approaches.the major two measurements(PSNR and MSE)have been tested and it becomes clear the work resulted has been given better quality and a higher PSNR value than previous methods.Table 12 and Fig.12 show the result comparisons.

    Table 12:Comparing proposed method with other methods

    Figure 12:PSNR and MSE contrasting the proposed method with other methods

    7 Conclusion

    A new technique was developed to create a watermarking scheme that is both robust and imperceptible.This technique uses a fragile watermark to conceal the embedded message by leveraging the instantaneous movement of objects between consecutive video frames.The purpose of this approach is to prevent any attempts to tamper with or modify digital video content while also ensuring its authenticity.The movement of objects is tracked using two algorithms,H.264 and color feature extraction.The results of the experiments indicate that the proposed system is highly accurate and effective in identifying various moving objects in video frames.The accuracy of object identification ranged between 96.3% and 98.7% even when subjected to different attacks.The rate of hiding the fragile watermark to insert the secret key was more than 93.65%,particularly in backgrounds with a fixed color level such as water or sky.The average capacity of hiding was 40.67%,the average quality of retrieved videos was high (PSNR=65.45),and the average time difference was very acceptable(T=0.1670/s).

    8 Contribution and Future Work

    The proposed scheme can be applied to help combat piracy by identifying malicious users that illegally distribute videos,even when they attempt to lower the video quality significantly.The research can provide a means for investigating and verifying copyright integrity and security of various digital materials,including digital content,music,photos,and videos,for various institutions.

    The experiments were only conducted and verified on a small number of video types and limited video formats,and whether the proposed method is suitable for a limited number of videos,so,it is still up for debate.There are many untested watermarking methods and each method has its scope of application.Whether there is a better-watermarked approach to copyright protection for the contents of videos transmitted via media is worth exploring.There are many trends that can be continued to study in the future.

    Acknowledgement:The authors would like to acknowledge the Department of Computer Science,University of Technology,Baghdad,Iraq,for providing moral support for this work.The publishing fees have been paid by the authors.

    Funding Statement:The authors did not receive any specific funding for this study.The study was funded from the authors’own funds.

    Author Contributions:Conceptualization and design:Raheem Ogla,Abdul Monem S.Rahma,Eman Shakar Mahmood;software:Raheem Ogla,Rasha I.Ahmed;validation:Rasha I.Ahmed,Raheem Ogla;formal analysis:Raheem Ogla,Eman Shakar Mahmood;data curation:Rasha I.Ahmed,Abdul Monem S.Rahma;writing–original draft preparation:Raheem Ogla,Eman Shakar Mahmood,Rasha I.Ahmed;writing–review and editing:Raheem Ogla,Rasha I.Ahmed;visualization:Raheem Ogla,Abdul Monem S.Rahma;analysis and interpretation of results:Raheem Ogla,Eman Shakar Mahmood,Rasha I.Ahmed;supervision:Raheem Ogla,Abdul Monem S.Rahma;project administration:Raheem Ogla,Eman Shakar Mahmood,Rasha I.Ahmed;funding acquisition: All authors;draft manuscript preparation:Abdul Monem S.Rahma;All authors have reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:Not applicable.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    免费av观看视频| 欧美日韩国产mv在线观看视频 | 久久久欧美国产精品| 中文字幕人妻熟人妻熟丝袜美| 成年av动漫网址| 精品久久久精品久久久| 日韩一本色道免费dvd| 中文在线观看免费www的网站| 国产成人精品婷婷| 人妻制服诱惑在线中文字幕| 超碰97精品在线观看| 国内精品宾馆在线| eeuss影院久久| 成人欧美大片| 一级av片app| 久久97久久精品| 九九久久精品国产亚洲av麻豆| av福利片在线观看| 麻豆久久精品国产亚洲av| 大陆偷拍与自拍| 国产熟女欧美一区二区| 欧美变态另类bdsm刘玥| 成人一区二区视频在线观看| 成年女人在线观看亚洲视频 | 久久久精品免费免费高清| 天堂av国产一区二区熟女人妻| av在线亚洲专区| av福利片在线观看| 性色avwww在线观看| 久久精品国产鲁丝片午夜精品| 免费无遮挡裸体视频| 少妇被粗大猛烈的视频| 成人无遮挡网站| 精品久久久久久成人av| 亚洲av中文字字幕乱码综合| 日韩精品青青久久久久久| 亚洲国产欧美人成| 麻豆乱淫一区二区| 日韩国内少妇激情av| 国产精品无大码| 国产精品女同一区二区软件| 狂野欧美白嫩少妇大欣赏| 蜜桃久久精品国产亚洲av| 乱系列少妇在线播放| 国产 亚洲一区二区三区 | 少妇的逼水好多| 麻豆成人午夜福利视频| 国产 亚洲一区二区三区 | 欧美不卡视频在线免费观看| 精品久久久久久久人妻蜜臀av| 免费看av在线观看网站| 亚洲国产色片| 日韩三级伦理在线观看| 看免费成人av毛片| 久久精品国产亚洲网站| 亚洲成人中文字幕在线播放| 麻豆久久精品国产亚洲av| 久久久午夜欧美精品| 爱豆传媒免费全集在线观看| 嫩草影院新地址| 欧美xxxx性猛交bbbb| 高清在线视频一区二区三区| 熟妇人妻久久中文字幕3abv| 国产爱豆传媒在线观看| 免费电影在线观看免费观看| 免费观看无遮挡的男女| 久久午夜福利片| 狂野欧美白嫩少妇大欣赏| 国产综合懂色| 99久久精品一区二区三区| 国产欧美日韩精品一区二区| 国产一区二区三区综合在线观看 | 午夜精品一区二区三区免费看| 免费大片18禁| 亚洲国产精品sss在线观看| 白带黄色成豆腐渣| 欧美变态另类bdsm刘玥| 天堂av国产一区二区熟女人妻| 久久人人爽人人片av| 久久精品国产鲁丝片午夜精品| 日韩成人伦理影院| 天堂中文最新版在线下载 | 亚洲精品aⅴ在线观看| 国产av在哪里看| 亚洲无线观看免费| 色网站视频免费| 黄色日韩在线| 久久久久国产网址| 一区二区三区高清视频在线| 亚洲自拍偷在线| av免费观看日本| 国产一区二区亚洲精品在线观看| 女人十人毛片免费观看3o分钟| 欧美日韩亚洲高清精品| 全区人妻精品视频| 狂野欧美激情性xxxx在线观看| 99热6这里只有精品| 国产午夜精品论理片| 日本午夜av视频| 亚洲国产精品成人综合色| 亚洲图色成人| 身体一侧抽搐| 99九九线精品视频在线观看视频| 熟妇人妻不卡中文字幕| 三级国产精品欧美在线观看| 久久久精品欧美日韩精品| 成人二区视频| 波野结衣二区三区在线| 2018国产大陆天天弄谢| 欧美3d第一页| 最近中文字幕2019免费版| 亚州av有码| 国产人妻一区二区三区在| 国产精品人妻久久久久久| 亚洲国产精品sss在线观看| 亚洲aⅴ乱码一区二区在线播放| 精品亚洲乱码少妇综合久久| 午夜福利高清视频| 美女xxoo啪啪120秒动态图| 国产精品蜜桃在线观看| 肉色欧美久久久久久久蜜桃 | 国产人妻一区二区三区在| 欧美高清成人免费视频www| 亚洲欧美日韩无卡精品| 性色avwww在线观看| 夜夜爽夜夜爽视频| 亚洲精品久久久久久婷婷小说| 视频中文字幕在线观看| 老师上课跳d突然被开到最大视频| 精品一区二区三区人妻视频| 一级二级三级毛片免费看| 中文字幕制服av| 在线天堂最新版资源| 有码 亚洲区| 日本黄色片子视频| 一个人看的www免费观看视频| 97超视频在线观看视频| 三级国产精品片| 精品酒店卫生间| 免费不卡的大黄色大毛片视频在线观看 | 日本猛色少妇xxxxx猛交久久| 亚洲精品第二区| 成人高潮视频无遮挡免费网站| 亚洲伊人久久精品综合| 午夜激情欧美在线| 国产精品1区2区在线观看.| 777米奇影视久久| 99热全是精品| 精品国产一区二区三区久久久樱花 | 久久久精品免费免费高清| 婷婷色麻豆天堂久久| av在线播放精品| 最近最新中文字幕大全电影3| 国内少妇人妻偷人精品xxx网站| 国产综合精华液| 99久久人妻综合| 午夜福利网站1000一区二区三区| 最近视频中文字幕2019在线8| 熟女人妻精品中文字幕| 欧美成人精品欧美一级黄| 国产久久久一区二区三区| 在现免费观看毛片| 一二三四中文在线观看免费高清| 亚洲内射少妇av| 97人妻精品一区二区三区麻豆| 少妇高潮的动态图| 亚洲精品中文字幕在线视频 | av在线播放精品| 亚洲一区高清亚洲精品| 中文资源天堂在线| 汤姆久久久久久久影院中文字幕 | 免费黄色在线免费观看| 欧美成人午夜免费资源| 免费看不卡的av| 国产爱豆传媒在线观看| 国产成年人精品一区二区| 久久6这里有精品| 2021少妇久久久久久久久久久| 91在线精品国自产拍蜜月| 免费在线观看成人毛片| 亚洲不卡免费看| 97超碰精品成人国产| 女人久久www免费人成看片| 精品熟女少妇av免费看| 黄色配什么色好看| 波多野结衣巨乳人妻| 精品一区二区三卡| 又黄又爽又刺激的免费视频.| 搞女人的毛片| 大话2 男鬼变身卡| 欧美日韩综合久久久久久| www.色视频.com| 欧美日韩国产mv在线观看视频 | 日韩av免费高清视频| 亚洲欧洲国产日韩| 少妇的逼好多水| 97热精品久久久久久| 久久99热6这里只有精品| 真实男女啪啪啪动态图| 国产真实伦视频高清在线观看| 久久久久九九精品影院| 日本熟妇午夜| 黑人高潮一二区| 免费看av在线观看网站| 男的添女的下面高潮视频| 成人午夜高清在线视频| 中文字幕av在线有码专区| 搡女人真爽免费视频火全软件| 国产精品美女特级片免费视频播放器| 久久久久久久久久久免费av| 国产亚洲最大av| 亚洲久久久久久中文字幕| 久久久久久九九精品二区国产| 丝袜美腿在线中文| 中文资源天堂在线| 一级a做视频免费观看| 中文字幕制服av| 欧美精品一区二区大全| 午夜老司机福利剧场| 免费看不卡的av| 色综合亚洲欧美另类图片| 麻豆乱淫一区二区| 亚洲精品aⅴ在线观看| 国精品久久久久久国模美| 成人综合一区亚洲| 精品久久久久久电影网| 国产v大片淫在线免费观看| 我的老师免费观看完整版| 免费观看无遮挡的男女| 国产伦理片在线播放av一区| 99热网站在线观看| 欧美日韩亚洲高清精品| 日韩精品青青久久久久久| 午夜老司机福利剧场| 亚洲欧美成人精品一区二区| 亚洲自拍偷在线| 欧美精品国产亚洲| 亚洲欧美清纯卡通| 高清欧美精品videossex| 春色校园在线视频观看| 日本一二三区视频观看| 国产亚洲av嫩草精品影院| 99久久精品国产国产毛片| 国精品久久久久久国模美| 国产综合精华液| 18禁在线播放成人免费| 国产片特级美女逼逼视频| 亚洲av不卡在线观看| 国产白丝娇喘喷水9色精品| 免费不卡的大黄色大毛片视频在线观看 | 精品99又大又爽又粗少妇毛片| 国内精品一区二区在线观看| 亚洲乱码一区二区免费版| 欧美性感艳星| 国产精品伦人一区二区| 天堂av国产一区二区熟女人妻| 1000部很黄的大片| 日日撸夜夜添| 国产综合精华液| 亚洲国产最新在线播放| av.在线天堂| 人妻夜夜爽99麻豆av| 久久99蜜桃精品久久| 亚洲国产精品成人综合色| 国产色爽女视频免费观看| 22中文网久久字幕| 一夜夜www| 亚洲天堂国产精品一区在线| 欧美精品一区二区大全| 久久综合国产亚洲精品| 一区二区三区免费毛片| 久久久久精品性色| 尤物成人国产欧美一区二区三区| 久久久久免费精品人妻一区二区| 夫妻性生交免费视频一级片| 2022亚洲国产成人精品| 少妇被粗大猛烈的视频| 亚州av有码| 国产精品美女特级片免费视频播放器| 十八禁国产超污无遮挡网站| 两个人的视频大全免费| 中国国产av一级| 精品人妻一区二区三区麻豆| 又大又黄又爽视频免费| 成人亚洲精品av一区二区| 日韩精品青青久久久久久| 日本欧美国产在线视频| 三级男女做爰猛烈吃奶摸视频| 日本av手机在线免费观看| 赤兔流量卡办理| 国产精品一区二区三区四区久久| 亚洲人成网站高清观看| 日本wwww免费看| 国产精品久久久久久久久免| 91av网一区二区| 韩国av在线不卡| 边亲边吃奶的免费视频| 好男人在线观看高清免费视频| av福利片在线观看| 国产高清有码在线观看视频| 天天一区二区日本电影三级| 久久精品久久精品一区二区三区| 97超碰精品成人国产| 一边亲一边摸免费视频| 免费人成在线观看视频色| 免费电影在线观看免费观看| 老师上课跳d突然被开到最大视频| 日韩伦理黄色片| 亚洲成人一二三区av| 亚洲av中文av极速乱| 国产老妇伦熟女老妇高清| 熟女电影av网| 美女cb高潮喷水在线观看| 波野结衣二区三区在线| 午夜福利在线观看吧| 岛国毛片在线播放| 日日干狠狠操夜夜爽| 91狼人影院| 日韩大片免费观看网站| 亚洲成人久久爱视频| 国产成人a区在线观看| 国产亚洲精品av在线| 亚洲电影在线观看av| 自拍偷自拍亚洲精品老妇| 色吧在线观看| 99九九线精品视频在线观看视频| 听说在线观看完整版免费高清| 卡戴珊不雅视频在线播放| 国语对白做爰xxxⅹ性视频网站| 老司机影院成人| 亚洲精品国产av蜜桃| www.av在线官网国产| 麻豆国产97在线/欧美| 99久久人妻综合| 蜜臀久久99精品久久宅男| 午夜福利在线观看吧| 亚洲国产日韩欧美精品在线观看| 亚洲成人中文字幕在线播放| 色播亚洲综合网| 99热这里只有是精品50| 2022亚洲国产成人精品| 国精品久久久久久国模美| 国产乱人偷精品视频| 永久网站在线| 我的女老师完整版在线观看| 校园人妻丝袜中文字幕| 建设人人有责人人尽责人人享有的 | 少妇人妻精品综合一区二区| 成年av动漫网址| 国产精品久久久久久久电影| 国产国拍精品亚洲av在线观看| 一区二区三区乱码不卡18| av在线亚洲专区| 国产一区亚洲一区在线观看| 欧美 日韩 精品 国产| 国产精品综合久久久久久久免费| 久久6这里有精品| 国产高清三级在线| 国产成人精品福利久久| 亚洲精品日韩在线中文字幕| 一区二区三区乱码不卡18| 成年女人在线观看亚洲视频 | 久久久久精品久久久久真实原创| 欧美成人午夜免费资源| 美女国产视频在线观看| 99热这里只有是精品50| 日本猛色少妇xxxxx猛交久久| 成年女人在线观看亚洲视频 | 在线免费十八禁| 午夜福利网站1000一区二区三区| 国产成人aa在线观看| 日韩一本色道免费dvd| 国产麻豆成人av免费视频| 日韩一本色道免费dvd| 最近2019中文字幕mv第一页| 亚洲精品视频女| 亚洲精品成人av观看孕妇| 汤姆久久久久久久影院中文字幕 | 两个人的视频大全免费| 亚洲国产色片| 亚洲av国产av综合av卡| 干丝袜人妻中文字幕| 美女大奶头视频| 特大巨黑吊av在线直播| 精品久久久久久电影网| 99热这里只有是精品50| 色哟哟·www| 波多野结衣巨乳人妻| 亚洲最大成人av| 日韩电影二区| 搡女人真爽免费视频火全软件| 日本一二三区视频观看| 欧美潮喷喷水| 亚洲熟女精品中文字幕| 69人妻影院| 亚洲av在线观看美女高潮| 国产精品1区2区在线观看.| 亚洲国产精品专区欧美| 97热精品久久久久久| 黄色欧美视频在线观看| 国产精品一区二区性色av| 午夜激情久久久久久久| 欧美xxxx黑人xx丫x性爽| 亚洲一区高清亚洲精品| 波多野结衣巨乳人妻| 国产精品一区二区性色av| 精品午夜福利在线看| 亚洲国产日韩欧美精品在线观看| 久久人人爽人人爽人人片va| 国产综合懂色| 日本午夜av视频| 久久久久性生活片| av网站免费在线观看视频 | 别揉我奶头 嗯啊视频| 精品人妻偷拍中文字幕| 18禁在线无遮挡免费观看视频| 日韩一区二区视频免费看| 中文天堂在线官网| 亚洲aⅴ乱码一区二区在线播放| 亚洲国产成人一精品久久久| 日韩国内少妇激情av| 美女国产视频在线观看| 一本一本综合久久| 久久精品熟女亚洲av麻豆精品 | 黑人高潮一二区| av线在线观看网站| 哪个播放器可以免费观看大片| 亚洲精品成人av观看孕妇| 免费观看在线日韩| 国产av国产精品国产| 精品人妻一区二区三区麻豆| av.在线天堂| 少妇的逼好多水| 国产美女午夜福利| 亚洲欧美成人精品一区二区| 最近最新中文字幕免费大全7| 毛片女人毛片| 一级爰片在线观看| 午夜福利高清视频| 听说在线观看完整版免费高清| 蜜桃亚洲精品一区二区三区| 99久久九九国产精品国产免费| 日韩av免费高清视频| 色视频www国产| 日产精品乱码卡一卡2卡三| 国产中年淑女户外野战色| 天天躁夜夜躁狠狠久久av| 久久久色成人| 精品国产露脸久久av麻豆 | 亚洲av成人精品一区久久| 搞女人的毛片| 一区二区三区高清视频在线| 免费观看的影片在线观看| 国产高清不卡午夜福利| 91精品伊人久久大香线蕉| 人妻制服诱惑在线中文字幕| 午夜亚洲福利在线播放| videos熟女内射| 日韩av在线免费看完整版不卡| 日韩成人av中文字幕在线观看| 国产久久久一区二区三区| 国产午夜福利久久久久久| a级毛片免费高清观看在线播放| 国产精品久久久久久久久免| 国产精品一区二区在线观看99 | 亚洲国产精品成人综合色| 天堂影院成人在线观看| 亚洲精品久久久久久婷婷小说| 一区二区三区四区激情视频| 中文字幕人妻熟人妻熟丝袜美| 日本黄大片高清| 高清欧美精品videossex| 亚洲电影在线观看av| 男插女下体视频免费在线播放| 99视频精品全部免费 在线| 午夜老司机福利剧场| 在线a可以看的网站| 一区二区三区免费毛片| 黄色日韩在线| 午夜福利在线观看吧| 天天一区二区日本电影三级| or卡值多少钱| 成人一区二区视频在线观看| 国产欧美另类精品又又久久亚洲欧美| 女的被弄到高潮叫床怎么办| 久久久亚洲精品成人影院| 亚洲综合精品二区| 波多野结衣巨乳人妻| 久久99热这里只有精品18| 久久精品夜色国产| 国产男女超爽视频在线观看| av一本久久久久| 亚洲人成网站在线播| 1000部很黄的大片| 69av精品久久久久久| 天天一区二区日本电影三级| 69人妻影院| 欧美激情久久久久久爽电影| 91久久精品国产一区二区成人| 国产精品.久久久| 国产亚洲最大av| 在线观看人妻少妇| 久久国产乱子免费精品| 少妇熟女欧美另类| 高清午夜精品一区二区三区| 在线观看美女被高潮喷水网站| 又黄又爽又刺激的免费视频.| 亚洲欧美成人综合另类久久久| 三级毛片av免费| 插逼视频在线观看| 国产综合精华液| 成人综合一区亚洲| 国产不卡一卡二| 51国产日韩欧美| 国产有黄有色有爽视频| 亚洲精品久久午夜乱码| av在线老鸭窝| 精品午夜福利在线看| a级一级毛片免费在线观看| 舔av片在线| 国产精品不卡视频一区二区| 一夜夜www| 久久鲁丝午夜福利片| 免费观看无遮挡的男女| 老司机影院毛片| 国产精品熟女久久久久浪| 午夜福利在线观看免费完整高清在| 亚洲婷婷狠狠爱综合网| 国产男女超爽视频在线观看| 91久久精品国产一区二区成人| 久久精品国产亚洲av涩爱| 色综合站精品国产| 午夜视频国产福利| av免费在线看不卡| 18禁动态无遮挡网站| 神马国产精品三级电影在线观看| 99久久精品国产国产毛片| 亚洲色图av天堂| 国产综合精华液| 久久久欧美国产精品| 一级片'在线观看视频| 乱码一卡2卡4卡精品| 国产成人精品婷婷| 欧美变态另类bdsm刘玥| 久久综合国产亚洲精品| 黄色一级大片看看| 18禁裸乳无遮挡免费网站照片| 三级国产精品欧美在线观看| 亚洲欧美一区二区三区国产| 2021天堂中文幕一二区在线观| 亚洲国产成人一精品久久久| 免费av毛片视频| 国产探花在线观看一区二区| 日韩强制内射视频| 免费看光身美女| 青青草视频在线视频观看| 亚洲性久久影院| 最近视频中文字幕2019在线8| a级一级毛片免费在线观看| 777米奇影视久久| 国产高清三级在线| 免费电影在线观看免费观看| 久久精品国产鲁丝片午夜精品| 亚洲伊人久久精品综合| 日韩成人伦理影院| 精品久久国产蜜桃| 久久这里有精品视频免费| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 亚洲综合色惰| 极品教师在线视频| 国产成人91sexporn| 亚洲精品一区蜜桃| 在线免费观看的www视频| 黄色欧美视频在线观看| 听说在线观看完整版免费高清| 黄色一级大片看看| 国内精品宾馆在线| 只有这里有精品99| 亚洲av不卡在线观看| 在线免费观看的www视频| 赤兔流量卡办理| 国精品久久久久久国模美| 亚洲成色77777| 最近手机中文字幕大全| 亚洲欧美精品自产自拍| 亚洲精品成人av观看孕妇| 中文欧美无线码| 国产精品蜜桃在线观看| 3wmmmm亚洲av在线观看| 亚洲精品国产av蜜桃| 精品一区二区免费观看| 午夜福利成人在线免费观看| 久久精品久久久久久噜噜老黄| 亚洲久久久久久中文字幕| 草草在线视频免费看| 高清在线视频一区二区三区| 最近最新中文字幕免费大全7| 一级爰片在线观看| 男女边吃奶边做爰视频| 国产亚洲精品av在线| 天美传媒精品一区二区| 国产有黄有色有爽视频| 99热6这里只有精品| 亚洲欧洲国产日韩| 联通29元200g的流量卡| 少妇裸体淫交视频免费看高清| 精品不卡国产一区二区三区| 日韩 亚洲 欧美在线| 26uuu在线亚洲综合色| 成人综合一区亚洲| 日本免费a在线| 夜夜看夜夜爽夜夜摸| 国产成人aa在线观看| av免费观看日本| 中文字幕人妻熟人妻熟丝袜美|