• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Novel Approach for Image Encryption with Chaos-RNA

    2023-12-12 15:49:28YanHongShihuiFangJingmingSuWanqiuXuYuhaoWeiJuanWuandZhenYang
    Computers Materials&Continua 2023年10期

    Yan Hong,Shihui Fang,Jingming Su,Wanqiu Xu,Yuhao Wei,Juan Wu and Zhen Yang

    1State Key Laboratory of Mining Response and Disaster Prevention and Control in Deep Coal Mine,Anhui University of Science and Technology,Huainan,232001,China

    2School of Electrical and Information Engineering,Anhui University of Science and Technology,Huainan,232001,China

    3School of Information Science and Engineering,Henan University of Technology,Zhengzhou,450001,China

    ABSTRACT In today’s information society,image encryption technology is crucial to protecting Internet security.However,traditional image encryption algorithms have problems such as insufficient chaotic characteristics,insufficient randomness of keys,and insecure Ribonucleic Acid (RNA) encoding.To address these issues,a chaos-RNA encryption scheme that combines chaotic maps and RNA encoding was proposed in this research.The initial values and parameters of the chaotic system are first generated using the Secure Hash Algorithm 384(SHA-384)function and the plaintext image.Next,the Lü hyperchaotic system sequence was introduced to change the image’s pixel values to realize block scrambling,and further disturbance is achieved through spiral index sequence to enhance encryption effectiveness.Subsequently,to obtain the final encrypted image,the diffusion is accomplished through different RNA encoding rules and operation rules corresponding to the chaotic sequence generated by an improved one-dimensional chaotic map (1DCM).Here innovatively propose four new RNA operation rules,increasing the difficulty of decryption.Simulation results demonstrate that the normalized pixel change rate (NPCR) and the unified average changed intensity (UACI) values of the tested encrypted images were 99.61% and 33.46%,respectively.The average ciphertext entropy value in the Red Green Blue(RGB)channels were 7.9986,7.991,and 7.991.Furthermore,this algorithm exhibits a low correlation coefficient and enhanced robustness.This encryption method effectively improves the security and reliability of image encryption compared to other similar techniques.

    KEYWORDS Chaos-RNA;SHA-384;Lü hyperchaotic system;block scrambling;RNA diffusion

    1 Introduction

    With the continuous popularization of big data and artificial intelligence technology,the importance of image transmission and encryption technology is becoming increasingly prominent.Image encryption finds diverse applications across various domains,encompassing scientific research,finance,healthcare,military safeguarding of confidential information,and scenarios like network communication and video surveillance.In the context of image transmission,ensuring the protection of the information contained within is paramount to prevent unauthorized access.But traditional encryption algorithms like Data Encryption Standard(DES),Rivest Cipher 4(RC4),Blowfish,and Advanced Encryption Standard (AES) [1–4] have proven ineffective in encrypting large amounts of data,often with images that exhibit strong correlation and redundancy,rendering them unsuitable for image encryption purposes.The image encryption method through chaotic systems has emerged as a viable solution to address these challenges.

    Chaotic systems are dynamic systems whose behavior is characterized by unpredictability and disorder.These systems exhibit desirable properties such as pseudo-aperiodicity,initial conditions sensitivity,ergodicity,and randomness,which make them well-suited for high-strength encryption protection [5].Matthews introduced a typical logistic map in 1989,which is based on the Logistic map,as a means of generating chaotic sequence lists for text encryption[6].However,it was not until 1998 that Fridrich first introduced real image encryption using a chaotic map by scrambling images directly with sequence values [7].Subsequently,a plethora of algorithms has emerged that combine image encryption with chaotic systems [8–13].Liu et al.[8] proposed a 4-dimensional conservative chaotic system,which has been comprehensively analyzed to exhibit stronger ergodicity and more robust pseudo-random sequences compared to dissipative chaotic systems,thus providing resistance against reconstruction attacks.In general,effective image encryption entails dividing the process into distinct stages of scrambling and diffusion.

    Scrambling is a conventional encryption technique that has been used in early image encryption methods.The technique involves rearranging the position of pixels in plaintext images to achieve encryption.Examples of scrambling methods include Zigzag,Arnold,and spiral transformations,among others[14–18].These methods rearrange the pixel positions in different ways,thereby making it difficult for unauthorized parties to access the original image data.Although these methods are useful,they are not without limitations.For instance,Zigzag transformation is an encryption method based on position replacement,which can be easily cracked by analysis of data distribution rules.Additionally,since the Zigzag transformation rearranges the original data,the amount of encrypted data increases,increasing the cost of storage and transmission.In summary,any encryption algorithm has certain limitations and defects,and it is essential to choose an appropriate encryption method based on specific application scenarios and requirements.

    Diffusion is commonly employed to modify the values of regular image pixels,enhancing the encryption process.Several techniques have been utilized for diffusions,such as block diffusion,Boolean network,and fractal sorting matrix [19–21].These methods transform the pixel values in a manner that guarantees the security of the encrypted image data and makes it challenging to access without the appropriate decryption keys.Recently,researchers have proposed a diffusion algorithm that utilizes Deoxyribonucleic Acid(DNA)sequence encoding and decoding.This approach involves converting binary values into DNA bases and modifying image pixels using DNA sequence binary operations.By adopting this method,encryption strength can be significantly enhanced,leading to improved security.Consequently,when selecting an encryption algorithm,it is crucial to consider specific application scenarios and requirements.Appropriate encryption methods should be chosen to enhance security.

    DNA possesses excellent characteristics,such as a large storage capacity,fast calculation speed,and low energy consumption.Consequently,several methods utilizing DNA base sequences have been proposed for image encryption [22–25].For example,Mohammed et al.[22] proposed a novel encryption algorithm by combining DNA and Salsa20.However,this method is susceptible to bruteforce attacks despite having a lower correlation coefficient than other approaches.Literature [23]employed a comprehensive set of techniques,including quantum chaos,DNA sequences,the hash algorithm,matrix permutation,bitwise Exclusive OR(XOR),discrete wavelet transform,and image block permutation,to encrypt and protect multimedia content.However,the article lacks sufficient experimental data to demonstrate the effectiveness and superiority of the proposed encryption algorithm,especially regarding encryption speed testing and resistance against cropping attacks.

    In recent years,there are relatively few studies on RNA encryption algorithms,and most of the literature[26–29]utilized the codon algorithm for encryption.Additionally,some studies employ RNA operations to encrypt each pixel in the image,where the RNA sequence is obtained by encoding the pixel value.Mahmud et al.[26]supposed a method converts images into binary sequences and codon arrays using a customized codon truth table.Subsequently,the codon array is updated by employing the key and the RNA table to establish the initial population for the genetic algorithm.Eventually,the genetic algorithm is applied to optimize the population.Despite demonstrating good information entropy,this scheme is unsuitable for encrypting color images and lacks robustness against cropping and noise attacks.Literature’s [29] operation involves base pair-based encryption operations,which can enhance encryption security.However,it results in low encryption efficiency and is unsuitable for encrypting a large number of images.

    Based on the above discussion,the importance of image encryption is self-evident.Chaotic systems have shown promise in providing robust encryption foundations due to their unpredictable nature.However,existing algorithms face challenges such as inadequate chaotic characteristics,insufficient key randomness,and vulnerabilities in RNA coding.To address these issues,this study presents a novel chaos-RNA encryption scheme.The article presents the following contributions:

    (1) An improved 1DCM system with better randomness and chaotic characteristics is obtained by improving the one-dimensional chaotic system.

    (2)Four new RNA operation rules are proposed,improving the complexity and security of RNA encryption.

    (3)A method for image-filling pixel blocks of images is proposed.The pixel filling is performed first,then the plaintext image is split into multiple block matrices.

    (4) A new RNA diffusion method is proposed,using 1DCM to generate chaotic sequences as the basis for randomly selecting encoding rules,decoding rules,and participating in RNA encoding operations.

    The rest of the paper is structured as follows: Section 2 provides the theoretical background,Section 3 introduces the encryption scheme,Section 4 presents the simulation results,Section 5 conducts the performance analysis,and finally,the paper concludes in Section 6.

    2 Theoretical Background

    2.1 An Improve One-Dimensional Chaotic Map

    According to the description in literature[30],optimizing trigonometric functions and correlation coefficients can enhance the performance of the reference chaotic map by constructing an improved one-dimensional chaotic map(1DCM).

    In the 1DCM,this research uses the following iterative formula:

    Hereris a parameter,andr∈[0,10],xis the variable,x∈[-5,5].

    The histogram of sequence statistics in literature [30],as shown in Fig.1a,indicates that the distribution of the chaotic sequence of a one-dimensional chaos map is not uniform enough,and some data is concentrated on the left side.However,for a chaotic system to be effective,its chaotic sequence should have a uniform numerical distribution.Optimization measures can be taken to address this issue and improve the chaotic performance.For instance,the histogram of the improved 1DCM proposed in this paper is presented in Fig.1b.The improved function mapping has a broader range and higher randomness,enabling it to enter the chaotic state more quickly and effectively.Fig.1c displays the bifurcation diagram of the one-dimensional chaotic map when the parameterris in the range of[0,10]and the iteration range of the state variablexis within[-5,5].Fig.1d displays the Lyapunov exponent (LE) diagram of the system,which demonstrates the excellent chaotic performance of the system.The behavior of the 1DCM system varies at different values of the parameterr,as follows:

    r=0:the system converges to a fixed point wherexstabilizes around 4.93.

    0

    r≈0.313: the system reaches its first bifurcation point,leading to a transition from periodic behavior to chaotic behavior.

    0.313

    Table 1:NIST test of 1DCM

    Figure 1:(Continued)

    Figure 1:1DCM performance:(a)Histogram of literature[29]chaotic sequence.(b)Histogram of the 1DCM sequence.(c)Bifurcation diagram.(d)Lyapunov exponent diagram

    2.2 Lü Hyperchaotic System

    The Lü chaotic system is a three-dimensional(3D)chaotic map proposed by Lü et al.in 2001[31]that represents the transition process between the Lorenz and Chen systems.The system has a wide range of initial values,and its formula is given by:

    whena=36 andb=3,different chaotic states can be prevented by changing the value ofc,as follows:

    12.7

    17.0

    23.0

    In this study,the parametersaandbare given inputs,and the values ofcare varied to observe the different chaotic states.Whenc=15,c=20,c=28,andc=28.8,the ordinary differential Equations 45 (ode45) equations were used to solve the problem,and the multi-scroll attractor was drawn.Figs.2a–2d depict the three-dimensional attractor diagrams of the Lü chaos system for different values ofc.This study selects the chaotic state of the Lü system at 23.0

    Figure 2:3D chaotic attractor diagram of Lü chaotic map when a=36,b=3.(a)c=15.(b)c=20.(c)c=28.(d)c=28.8

    The Lü chaos system has three Lyapunov exponents.As illustrated in Fig.3a.When three initial values of the Lü chaotic system are 0.2,the resulting LE are LE1=1.26881,LE2=0.00783,and LE3=-20.14903.The chaotic system is characterized by two positive Lyapunov exponents,which are classified as a hyperchaotic system.At the same time,it can observe its randomness from the iterative trajectories of the attractor Fig.3b.Hence,the Lü chaotic system is a relatively complex,disordered,parameter-sensitive,and controllable system that exhibits chaotic and hyperchaotic behavior,depending on the choice of parameter values.

    Figure 3:Lü chaotic system:(a)Lyapunov exponent diagram.(b)Attractor iterative trajectory diagram

    2.3 RNA Encoding and Operations

    RNA consists of four bases:adenine(A),cytosine(C),guanine(G),and uracil(U).Unlike DNA,RNA uses uracil instead of thymine.RNA bases pair with each other through hydrogen bonds,with A-U and G-C pairings being the most stable.By using the properties of RNA coding,it is possible to convert numbers or characters into RNA sequences,allowing for encryption.According to Table 2,the binary form of the number 27 can be RNA-coded using rule 2 to obtain the RNA sequence ACGU.Decoding using rule 6 would then yield the binary number 1011 0001,which is equivalent to 177 in decimal.The complementary relationship between A and U and C and G can be utilized in designing encoding rules.There are eight possible coding rules,allowing for more complex encryption operations to be performed.

    Table 2:RNA encoding rulers

    Based on the RNA complementary pairing rules,and operation rules,eight RNA operators have been designed: addition (+),subtraction (-),XOR(⊕),XNOR(),addition and inversion (+~),subtraction and inversion(-~),reverse addition(~+)and reverse subtraction(~-).By incorporating four additional operation rules into the traditional set,the strength of RNA operation encryption has been enhanced.Table 3 presents the newly introduced four RNA operation rules.In computing,the proposed eight RNA coding rules and eight RNA binary operations can generate 64 different encryption schemes for the operation between two bases,greatly enhancing the complexity and safeguarding of RNA encryption.

    Table 3:New four RNA operations

    It is important to note that four of these operators are user-defined: addition and inversion operation (bitwise inversion operation after addition),subtraction and inversion (bitwise inversion operation after subtraction),reverse addition(addition after bitwise inversion operation)and reverse subtraction(bitwise inversion operation followed by subtraction).

    3 Encryption Algorithms

    This section presents a novel image encryption method for RNA coding,utilizing a chaotic system consisting of four key components.Firstly,the SHA-384 hash function produces the initial value,parameter,and block size.Secondly,the original image is divided into blocks based on the block size determined by the Lü chaotic map and the hash value and then subjected to Fisher-Yates permutation and sort permutation.Thirdly,introduces an improved 1DCM,which generates a chaotic sequence for encoding,decoding,and operation rules in the RNA diffusion process.Finally,the RNA encoding,decoding,and computing operations are executed.This encryption technique is designed for plaintext image encryption withMrows andNcolumns.

    3.1 Key and Initial Value Generation

    To prevent potential compromise of the encryption algorithm through pixel manipulation,the SHA-384 hash function is employed to generate 384-bit hash values.Subsequently,each 32-bit binary number is partitioned into twelve groups,ordered from the front to the back.This expression can be formulated as:K=K1,K2,...,K12.Ki={ki,0,ki,1,...,ki,31},andiis 1...12.

    The initial valuesI1(x1,x2,x3) of the 1DCM chaotic system and the system parameterrare calculated by Eqs.(6)and(7):

    wherebi2de(a)converts binary numberato decimal,a⊕bperforms XOR operation onaandb,andmod(a,b)takes the result modulo(a,b).

    The calculation of initial valueI2(x4,x5,x6)and system parametercof Lü super system is through Eqs.(8)and(9):

    The sub-block size of the image to be split is determined by calculating rows’number (m) and columns(n)using Eqs.(10)and(11):

    3.2 Scrambling and Diffusion Scheme

    To increase the security of the encryption algorithm,the study explores a novel diffusion and permutation model.Fig.4 depicts a comprehensive flowchart of this encryption algorithm.

    Figure 4:Flowchart of encryption algorithm

    The encryption scheme involves the following specific steps:

    Step 1:The sub-block size of the image after block partitioning needs to be calculated from the above equation and results in anm×nsize for each sub-block.However,pixel padding is required since an image can not be divided into complete sub-blocks.The padding is applied by addingmbrows andnbcolumns to the original image.Additionally,these pixels are assigned a value of 260 using Eq.(12).Theimgmeans the padded image.Theones(m,n)operation creates a matrix of sizemrows andncolumns filled with ones.

    Step 2:Initialize the Lü hyperchaotic system with the initial valuesx4,x5,x6,and the value of the parameter c,and iterate it for 1024+(M+mb)×(N+nb)times.To eliminate the transient effects,remove the first 1024 iterations and obtain three chaotic sequences,T1,T2,andT3,for scrambling operations.

    Step 3:T1,T2,andT3 are further transformed by using Eqs.(13) and (14) to obtain two additional permutation sequences,Z1 and Z2,which greatly enhance the randomness of the original sequences.

    Step 4: To perform an effective intra-block and inter-block scrambling,rearrange eachm×nsized sub-block ofimgaccording to the sort index of the permutation sequenceZ1.Then,apply the Fisher-Yates permutation method to each block pixel using the permutation sequenceZ2 to combine intra-block and inter-block scrambling operations.The resulting matrixSrepresents the scrambled image.

    In this case,the 3 × 3 sub-block is taken as an example,Fig.5 depicts the specific schematic diagrams illustrating the process of scrambling the pixels in ascending order.Fig.6 illustrates the sequential operation within the block,following the steps of the Fisher-Yates algorithm.In each step,the value at the current position is exchanged with the value at a randomly chosen position,with the constraint that it cannot be exchanged with itself.

    Figure 5:Inter-block scrambling

    Step 5:Perform a scrambling operation onimgaccording to the obtained block scrambling matrixS.The filled pixel values are removed to finally obtain the scrambled imageS1.

    Step 6:For the 1DCM chaotic system,r is used as a parameter,and the system initial valuesx1,x2,andx3are respectively substituted into the 1DCM system for 3MNiterative operations to get three chaotic sequencesX1,X2,andX3.

    Figure 6:Intra-block scrambling

    Step 7:To diffuse the pixel value ofS1,two addition modulo operations are performed,resulting in the diffused pseudo-random imageS2through Eq.(15).

    Step 8:The RNA codec rulesR1 andR2,decoding ruleR3,chaotic sequencesH,F,and diffusion operation ruleDare generated based on Eqs.(16)and(17).

    Step 9:Applying the RNA encoding process to diffuse imagesS2and chaotic sequencesH,based on the RNA coding rulesR1 andR2.The image is dynamically encoded pixel by pixel using the corresponding coding rules,resulting in an RNA matrix,RNA sequenceSd.Furthermore,the chaotic sequencesHandFare encoded using theR2 codec rule,producing the sequencesH1andF1.

    Step 10:The ciphertext matrixCis calculated by applying spiral diffusion operation to theM×Npixels based on the random values in the diffusion sequenceSdand further scrambling the image.The specific ciphertext matrix is generated using Eqs.(18) to (20).These operations greatly increase the complexity and security of encryption.

    Here,cmdis a custom formula.s=spiral(i),definesas the position ofiwithin the spiral matrix.i={2,3,...,MN}.Operator:⊕,,+,-,+~,-~,~+,and ~-represent the XOR operation,Exclusive NOR(XNOR)operation,addition,subtraction,addition with negation,subtraction with negation,addition after negation,and subtraction after negation,respectively of RNA.

    Step 11:After the operations above,the encrypted imageCPis obtained by decoding the ciphertext imageCand converting it into anM×N-sized image,according to the RNA decoding ruleR3.

    The decryption process,which is the reverse of the previously described process,is not described here.

    4 Simulation Results

    The experimental simulations were performed using MATLAB R2022A on a laptop equipped with an Intel i5-12500H processor,16 GB of memory,and running the Windows 11 system.

    Fig.7 displays the scrambled and encrypted decrypted images of four plaintext images of different sizes and colors.The figures indicate that the scrambled and encrypted images both contain noise.However,the encrypted images that underwent diffusion appear to have undergone more sophisticated encryption than the scrambled images.The proposed encryption algorithm effectively conceals valuable information,as extracting any information from scrambled and encrypted images is impossible.What’s more,the football image was successfully encrypted using the algorithm,proving its adaptability to non-square images of different sizes and colors.Overall,the results indicate the validity of the encryption algorithm and its adaptability to diverse image sizes and colors.

    Figure 7:Shows the simulation results for different images:(a)Plane(512×512).(b)Couple(256×256).(c)Football(320×256).(d)Airport(1024×1024)grayscale image

    5 Performance Analysis

    5.1 Differential Attack

    A secure encryption algorithm should produce a significant difference between the plaintext image and ciphertext images when a pixel value in a normal image is changed [32].To test the impact of a single-pixel change on the entire image encrypted by the proposed algorithm,two commonly used metrics were employed:Normalized Pixel Change Rate(NPCR)and Unified Average Changing Intensity(UACI)[33].NPCR and UACI can be calculated for RGB images using Eqs.(21)to(23).

    C1andC2represent the encrypted images before and after a pixel value in the plaintext image is modified.The parametersWandHrefer to the width and height of the images.

    Table 4 shows that the NPCR values were close to the ideal value,with a deviation of less than 0.02%,and the average NPCR values were all greater than 99.6094%.The expected value of UACI for two random images is approximately 33.4635%,and all UACI values in Table 4 were close to this value.These results demonstrate the high sensitivity of the proposed encryption algorithm to changes in normal images and its ability to withstand various attacks.Furthermore,compared with other algorithms in the literature [34–37],Table 5 shows that this method better closer to the theoretical values.Specifically,the proposed encryption algorithm outperforms other algorithms in NPCR and UACI,which indicates that the modified pixel values significantly affect the statistical characteristics of the encrypted image,thereby enhancing the algorithm’s security.

    Table 4:The NPCR and UACI values

    Table 5:Comparison with NPCR and UACI of other algorithms

    5.2 Histogram Analysis

    An image’s pixel value distribution is often represented through histograms,a statistical feature.The consistency of the pixel values can be assessed by graphing the frequency of pixels for each color intensity level.Figs.8a–8c display the histograms of color plaintext images“Lena”,“Lake”,and“Plane”and Figs.8f–8h display the histograms of their ciphertext images.Figs.8d and 8i,respectively,show the histograms of the grayscale image “Airport”and its ciphertext images,while Figs.8e and 8j show the histograms of pure“Black-white”plaintext and cipher images for comparison.It is clear from Fig.8 that the histogram of the encryption image is relatively informal,and no hidden plaintext information can be discerned.

    Figure 8:(Continued)

    Figure 8:Histogram of the original image and encryption image

    5.3 Key Analysis

    An effective image encryption algorithm requires a sufficiently large key space to withstand brute force attacks.The key consists of 384 binary arrays generated via the SHA-384 algorithm.Therefore,the size of the encryption algorithm proposed in this paper is 2384.Clearly,the proposed encryption algorithm has a key space much larger than the encryption requirement of 2100.This is far beyond the processing capability of current computing technology,indicating that the key space is difficult to crack with traditional methods.

    A high-quality encryption algorithm should be highly sensitive to changes in the keys,where a small alteration can result in a significant change in the output.In this paper,the algorithm’s sensitivity to modifying one bit of the hash value of the key’s SHA-384 is analyzed.The specific changes are as follows:

    K=52ee65115c89ec88990d3cec71aad8bfc39e17ebd4156f0a5be002dc5fd797a59c52a0cc9332d465f92 c108a73f5be84;

    K1=42ee65115c89ec88990d3cec71aad8bfc39e17ebd4156f0a5be002dc5fd797a59c52a0cc9332d465f9 2c108a73f5be84.

    Decrypting the ciphertext image encrypted withKusingK1does not yield the correct plaintext image(as Fig.9c).Furthermore,the decrypted image usingK1demonstrates average values of NPCR(99.60%)and UACI(32.23%)that closely resemble the ideal values of the ciphertext.This observation highlights the high sensitivity of the encryption key.

    5.4 Correlation Analysis of Adjacent Pixels

    In addition to histogram analysis,pixel correlation analysis is also significant.Four thousand adjacent pixels were chosen from the plaintext and encrypted images in different directions.The results of correlations in different directions on the R channel,G channel,and B channel are presented in Fig.10,which showcases the Lena test image.The figure clearly demonstrates that the RGB channels of plaintext images exhibit strong correlations in all three directions.In contrast,the corresponding cryptographic images have low correlations and a uniform distribution of adjacent pixels.The image correlation results are presented in Table 6.The algorithm successfully eliminates image correlation and effectively withstands statistical attacks.

    Table 6:The correlation coefficient

    Figure 10:Correlation analysis of different channel of Lena:(a)RGB channel of Lena image.(b)RGB channel of encrypted Lena image

    5.5 Entropy Analysis

    The randomness of a system and the uncertainty of image information are assessed using information entropy.A higher entropy value usually indicates more uncertainty and less visual information.The entropy formula is Eq.(24):

    whereLrefers to the gray level of the pixel,andp(mi)denotes the possibility of pixelmi.

    Table 7 presents the computed entropy values of multiple plaintext and ciphertext images using the proposed algorithm,including the average entropy.From these data,it can be seen that entropy values for all encrypted images are nearly 8,indicating that the encrypted photos produced by the algorithm have a more uniform random distribution.In addition,the average entropy value of the encrypted images is 7.9991,which is bigger than the average value of the plaintext images.This indicates that the encrypted images using the encryption algorithm have an excellent random distribution function.The results demonstrate that the algorithm has better entropy characteristics than existing methods.

    Table 7:Information entropies for dissimilar images

    5.6 MLC Comparison

    Majority logic criteria(MLC)is a metric used to assess the properties of Boolean functions and is a commonly employed texture feature in fingerprint image processing.In addition to correlation coefficients and information entropy,which have been previously analyzed,it also includes contrast,energy,and homogeneity.As shown in Table 8,different tests (contrast,homogeneity,correlation,energy,and entropy)are applied for comparison with other encryption algorithms to verify encryption quality.From Table 8,it can be observed that there is a significant change in the texture of the cipher image compared to the original Lena image when comparing MLC parameters before and after encryption.Additionally,the MLC parameters of the cipher image outperform the reference algorithm in terms of entropy,homogeneity,contrast,and energy,indicating a strong encryption effect of this algorithm.

    5.7 Robustness Analysis

    The transmission of images may result in data loss or information changes.Therefore,a robust encryption algorithm should be capable of recovering most of the valuable information even in these situations.This section tests the algorithms against clipping and noise attacks.A clipping attack refers to setting some pixel values of the ciphertext image to black,simulating an image being cropped.Fig.11 shows the decrypted images of encrypted images (such as Fig.7c) with different size blocks removed,respectively.It is evident from Fig.11 that even when 56.25% (384 × 384 block) of data information is lost,the decrypted picture still contains a substantial amount of information and can recognize the general knowledge of the plaintext picture.This demonstrates that the algorithm is resistant to clipping.

    Figure 11:Clipping attacks analysis.(a)64×64 block removal.(b)128×128 block removal.(c)256×256 block removal.(d)384×384 block removal.(e–h)Represent the decrypted images of(a–d)

    Noise attack refers to the interference of ciphertext images with different degrees and types of noise.A reliable encryption system must have some degree of resistance to noise during transmission.In the following experiment,this study added dual noise to the encrypted image shown in Fig.7c.The cipher images were corrupted with both salt&pepper noise and Gaussian noise,with the degree ranging from 0.00001 to 0.01.As the variance increases,the decrypted images in Fig.12 show the decrypted image corrupted by varying degrees of salt&pepper and Gaussian noise.When the variance is 0.01,the plaintext image can still be seen clearly,indicating that the encryption algorithm can resist noise attacks well and is robust against them.

    Figure 12:Decrypted images with different degrees of noise.(a)0.00001.(b)0.0001.(c)0.001.(d)0.01

    5.8 Complexity and Speed Analysis

    “Complexity and Speed Analysis” is regarded as one of the crucial criteria for assessing the efficiency of an algorithm.This analysis entails the evaluation of the algorithm’s time complexity and execution speed.The proposed image encryption algorithm consists of three methods: block scrambling,RNA dynamic encoding and decoding,and RNA diffusion.The block scrambling method has a time complexity of O(mb×nb×M×N),while RNA dynamic encoding and decoding have a time complexity of O(M×N).The RNA diffusion method has a time complexity of O(8 ×M×N).Overall,the time complexity of this encryption algorithm is O(8 ×M×N).The speed test of encryption can be used to evaluate the efficiency of encryption algorithms because a faster encryption speed usually means higher security for image transmission.Table 9 shows the encryption time of 512×512×3 Lena color images.It can be seen from the table that the encryption algorithm we proposed has higher efficiency,which means that the algorithm can encrypt and decrypt images faster,thereby improving the security of image transmission.

    Table 9:Encryption time and speed test of different algorithms

    6 Conclusion

    This paper presents a novel image encryption scheme that combines chaos and RNA techniques.This paper introduces a novel 1DCM,which demonstrates excellent diffusion characteristics assessed through bifurcation analysis,LE,NIST test,and chaos sequence analysis.The 1DCM algorithm is utilized to modify the pixel values of images,and it establishes RNA encoding,decoding,and operation rules.Additionally,3D Lü chaos serves as a pseudo-random matrix,generating inter-block sorting scrambling and intra-block Fisher-Yates scrambling,thus enhancing the encryption intensity.Moreover,this study proposes four new RNA operation rules to enhance the security of the ciphertext.

    The experimental results on grayscale and color images illustrate that the encryption scheme offers several advantages,including a significant key space,heightened sensitivity,high entropy,and adaptability for various image applications.Furthermore,it exhibits high resistance to noise,cropping,and known plaintext attacks.Therefore,the proposed encryption scheme is secure and reliable for image encryption and can be applied to secure communication.In future research,we aim to extend this method to multi-image encryption while enhancing the key space.

    Acknowledgement:We would like to take this opportunity to express our heartfelt gratitude to all those who made a contribution to the completion of this article.

    Funding Statement:This work was supported in part by the National Natural Science Foundation of China (NSFC) under Grant 62105004,and in part by the Open Fund of the State Key Laboratory of Mining Response and Disaster Prevention and Control in Deep Coal Mine under the Grant(SKLMRDPC19KF10).

    Author Contributions:The authors confirm their contributions to the paper as follows:study conception and design:Y.Hong,J.Su;data collection:W.Xu,Y.Wei,J.Wu;draft manuscript preparation:S.Fang,Z.Yang.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:The data and materials used to support the findings of this study are available from the corresponding author upon request.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    午夜激情久久久久久久| av电影中文网址| 国产精品一区二区精品视频观看| 啦啦啦免费观看视频1| 99国产精品免费福利视频| av有码第一页| 高清视频免费观看一区二区| 夜夜夜夜夜久久久久| 成人手机av| 精品久久久久久久毛片微露脸 | 久久狼人影院| 丝瓜视频免费看黄片| 国产深夜福利视频在线观看| videosex国产| 操美女的视频在线观看| 少妇猛男粗大的猛烈进出视频| 动漫黄色视频在线观看| 国产精品二区激情视频| 十八禁人妻一区二区| svipshipincom国产片| 亚洲国产欧美网| 亚洲国产成人一精品久久久| 蜜桃在线观看..| 中文字幕人妻丝袜一区二区| 十八禁人妻一区二区| 亚洲色图 男人天堂 中文字幕| 91麻豆av在线| 高清欧美精品videossex| 日韩欧美国产一区二区入口| 免费高清在线观看日韩| 十分钟在线观看高清视频www| 亚洲中文日韩欧美视频| 精品亚洲乱码少妇综合久久| 免费女性裸体啪啪无遮挡网站| 极品人妻少妇av视频| 日日夜夜操网爽| 另类精品久久| 国产三级黄色录像| 亚洲国产av新网站| 午夜福利影视在线免费观看| 欧美在线黄色| 最近最新中文字幕大全免费视频| 美女扒开内裤让男人捅视频| 少妇 在线观看| 在线观看免费视频网站a站| 欧美xxⅹ黑人| 国产亚洲午夜精品一区二区久久| 国产精品欧美亚洲77777| 最新在线观看一区二区三区| 久久久久视频综合| 久久久国产一区二区| 国产片内射在线| 50天的宝宝边吃奶边哭怎么回事| 99国产精品99久久久久| av电影中文网址| 热99国产精品久久久久久7| 欧美精品亚洲一区二区| 超碰97精品在线观看| 乱人伦中国视频| 久久狼人影院| 欧美日本中文国产一区发布| 欧美日韩中文字幕国产精品一区二区三区 | 大型av网站在线播放| 久久国产精品大桥未久av| 日韩视频一区二区在线观看| 国产有黄有色有爽视频| 亚洲九九香蕉| 五月开心婷婷网| 亚洲av日韩精品久久久久久密| 国产精品一区二区在线观看99| 亚洲精品中文字幕一二三四区 | 又大又爽又粗| 亚洲精品美女久久久久99蜜臀| 视频区欧美日本亚洲| 国产成人精品久久二区二区91| 国产成人影院久久av| 亚洲欧美成人综合另类久久久| 久久久久视频综合| 久久人人爽av亚洲精品天堂| 亚洲国产精品成人久久小说| 少妇精品久久久久久久| 人人妻人人爽人人添夜夜欢视频| 少妇裸体淫交视频免费看高清 | 亚洲国产欧美在线一区| 日韩有码中文字幕| 亚洲精品久久久久久婷婷小说| 亚洲熟女精品中文字幕| 亚洲国产av新网站| 国产男女内射视频| 久久久精品94久久精品| 国产免费视频播放在线视频| 午夜91福利影院| 亚洲精品成人av观看孕妇| 久久久久久久大尺度免费视频| 日韩制服丝袜自拍偷拍| 亚洲精品久久成人aⅴ小说| 精品人妻熟女毛片av久久网站| 国产男女超爽视频在线观看| 伊人亚洲综合成人网| 国产欧美日韩综合在线一区二区| 一级毛片电影观看| 久久精品国产综合久久久| 亚洲熟女毛片儿| 99国产精品免费福利视频| 操出白浆在线播放| 女性被躁到高潮视频| av欧美777| 久久免费观看电影| 国产av国产精品国产| 久久久久久久大尺度免费视频| 午夜福利在线免费观看网站| 午夜激情久久久久久久| 国产成人欧美| 国内毛片毛片毛片毛片毛片| svipshipincom国产片| 亚洲熟女毛片儿| 久久久水蜜桃国产精品网| 69精品国产乱码久久久| 我要看黄色一级片免费的| 啦啦啦免费观看视频1| 亚洲av国产av综合av卡| 精品少妇内射三级| 一区福利在线观看| 操出白浆在线播放| 丝袜脚勾引网站| 宅男免费午夜| 亚洲欧美成人综合另类久久久| 我要看黄色一级片免费的| 午夜免费观看性视频| 亚洲人成电影观看| 国精品久久久久久国模美| 欧美+亚洲+日韩+国产| 亚洲九九香蕉| svipshipincom国产片| 国产精品久久久久久精品古装| 大香蕉久久网| 熟女少妇亚洲综合色aaa.| 97精品久久久久久久久久精品| 一二三四社区在线视频社区8| 18禁黄网站禁片午夜丰满| 天天躁日日躁夜夜躁夜夜| 久久精品国产a三级三级三级| 久久毛片免费看一区二区三区| 大陆偷拍与自拍| 久久久久久久久久久久大奶| 日韩制服骚丝袜av| 多毛熟女@视频| 国产99久久九九免费精品| 老司机亚洲免费影院| 蜜桃国产av成人99| 欧美在线黄色| 19禁男女啪啪无遮挡网站| 少妇裸体淫交视频免费看高清 | av网站在线播放免费| 丰满少妇做爰视频| 91麻豆精品激情在线观看国产 | 久久国产精品男人的天堂亚洲| 最近最新免费中文字幕在线| 亚洲av成人一区二区三| 蜜桃在线观看..| 女警被强在线播放| 成年人午夜在线观看视频| 1024香蕉在线观看| 成人国语在线视频| 亚洲精品成人av观看孕妇| 国产精品.久久久| 老司机午夜福利在线观看视频 | 自线自在国产av| 久久人妻熟女aⅴ| 中国国产av一级| 亚洲av成人不卡在线观看播放网 | 国产无遮挡羞羞视频在线观看| 一个人免费在线观看的高清视频 | 十八禁高潮呻吟视频| 满18在线观看网站| 午夜免费鲁丝| 久热这里只有精品99| 亚洲色图 男人天堂 中文字幕| 女人爽到高潮嗷嗷叫在线视频| 亚洲精品久久成人aⅴ小说| 久9热在线精品视频| 老司机深夜福利视频在线观看 | 大片免费播放器 马上看| 男女无遮挡免费网站观看| 亚洲熟女精品中文字幕| 国产精品一区二区精品视频观看| 俄罗斯特黄特色一大片| 亚洲精品国产色婷婷电影| 在线亚洲精品国产二区图片欧美| 亚洲av欧美aⅴ国产| 国产av国产精品国产| 国产真人三级小视频在线观看| 最新的欧美精品一区二区| 中文字幕高清在线视频| a级片在线免费高清观看视频| 人人妻人人澡人人看| a 毛片基地| 欧美日本中文国产一区发布| www.熟女人妻精品国产| 午夜福利视频在线观看免费| 欧美日韩视频精品一区| 老司机深夜福利视频在线观看 | 咕卡用的链子| 老汉色av国产亚洲站长工具| 法律面前人人平等表现在哪些方面 | 欧美激情高清一区二区三区| 欧美日韩亚洲国产一区二区在线观看 | 欧美日韩一级在线毛片| 亚洲国产精品成人久久小说| 亚洲九九香蕉| 国产1区2区3区精品| h视频一区二区三区| 美女主播在线视频| 精品少妇一区二区三区视频日本电影| 午夜福利免费观看在线| 久久热在线av| 久久久精品免费免费高清| 一进一出抽搐动态| a 毛片基地| 91成年电影在线观看| 夫妻午夜视频| 巨乳人妻的诱惑在线观看| 成年人黄色毛片网站| 高清欧美精品videossex| 中文字幕人妻丝袜一区二区| 男女高潮啪啪啪动态图| 日本欧美视频一区| 亚洲国产av新网站| 成人av一区二区三区在线看 | 久久久久久免费高清国产稀缺| 久久人妻福利社区极品人妻图片| 在线观看免费高清a一片| av欧美777| 久久久精品国产亚洲av高清涩受| 美女视频免费永久观看网站| 这个男人来自地球电影免费观看| 欧美激情久久久久久爽电影 | 国产麻豆69| 97精品久久久久久久久久精品| 成在线人永久免费视频| 啦啦啦视频在线资源免费观看| 午夜福利一区二区在线看| bbb黄色大片| 秋霞在线观看毛片| 最近最新中文字幕大全免费视频| 人妻人人澡人人爽人人| 视频区欧美日本亚洲| 成人影院久久| 日韩电影二区| 精品久久蜜臀av无| 国产精品影院久久| 国产欧美日韩综合在线一区二区| 亚洲精品中文字幕在线视频| 亚洲激情五月婷婷啪啪| 超碰成人久久| 丝袜美腿诱惑在线| 啦啦啦视频在线资源免费观看| 他把我摸到了高潮在线观看 | 超碰成人久久| 美女脱内裤让男人舔精品视频| 欧美久久黑人一区二区| 国产在线观看jvid| 少妇人妻久久综合中文| 欧美日韩黄片免| 国产精品久久久久久人妻精品电影 | 一本综合久久免费| 十八禁网站网址无遮挡| 久久久久久久久免费视频了| 国产91精品成人一区二区三区 | 岛国在线观看网站| 精品国产一区二区三区久久久樱花| 亚洲国产精品一区三区| 日韩欧美一区视频在线观看| 久久久久国产一级毛片高清牌| 男人舔女人的私密视频| 国产av又大| 精品福利观看| 交换朋友夫妻互换小说| 在线 av 中文字幕| 国内毛片毛片毛片毛片毛片| 黑人操中国人逼视频| 亚洲男人天堂网一区| 国产激情久久老熟女| 亚洲成人免费av在线播放| 如日韩欧美国产精品一区二区三区| 岛国在线观看网站| 亚洲国产精品一区二区三区在线| 91大片在线观看| 在线亚洲精品国产二区图片欧美| 人人妻人人爽人人添夜夜欢视频| 久久99一区二区三区| av国产精品久久久久影院| 天天影视国产精品| 国产精品偷伦视频观看了| 国产成人av激情在线播放| av在线老鸭窝| 97在线人人人人妻| av有码第一页| 久久热在线av| 久久天堂一区二区三区四区| 亚洲第一欧美日韩一区二区三区 | 亚洲国产毛片av蜜桃av| 成人国语在线视频| 免费黄频网站在线观看国产| 成人国语在线视频| tube8黄色片| 亚洲国产av影院在线观看| 12—13女人毛片做爰片一| 麻豆av在线久日| 久久精品亚洲熟妇少妇任你| 亚洲九九香蕉| 亚洲av片天天在线观看| 国产男女超爽视频在线观看| 在线观看舔阴道视频| 黄色视频不卡| 成人影院久久| 亚洲,欧美精品.| 黑人猛操日本美女一级片| 久久狼人影院| 午夜久久久在线观看| 少妇精品久久久久久久| 中文字幕色久视频| 一个人免费看片子| 可以免费在线观看a视频的电影网站| 99久久人妻综合| 日本一区二区免费在线视频| 女人被躁到高潮嗷嗷叫费观| 精品国产乱码久久久久久小说| 另类精品久久| 免费观看a级毛片全部| 久久久精品区二区三区| 一区二区三区精品91| 少妇 在线观看| 伊人亚洲综合成人网| 欧美激情久久久久久爽电影 | 多毛熟女@视频| 久久狼人影院| 欧美日韩亚洲国产一区二区在线观看 | 久久久精品94久久精品| 国产精品国产av在线观看| 大片电影免费在线观看免费| 久久亚洲精品不卡| 欧美中文综合在线视频| 久久毛片免费看一区二区三区| 午夜久久久在线观看| 久久精品熟女亚洲av麻豆精品| 成人国产av品久久久| 宅男免费午夜| 人人澡人人妻人| 在线永久观看黄色视频| 伦理电影免费视频| 人妻一区二区av| 中文字幕最新亚洲高清| 欧美老熟妇乱子伦牲交| 色视频在线一区二区三区| 国产91精品成人一区二区三区 | 在线观看www视频免费| 国产成人影院久久av| 久久人人爽人人片av| 视频在线观看一区二区三区| 丰满饥渴人妻一区二区三| 又大又爽又粗| 国产无遮挡羞羞视频在线观看| 中文欧美无线码| 啦啦啦啦在线视频资源| 美女主播在线视频| 国产深夜福利视频在线观看| 在线av久久热| 精品一区二区三卡| 欧美少妇被猛烈插入视频| 国产av一区二区精品久久| 免费av中文字幕在线| 久久精品aⅴ一区二区三区四区| 法律面前人人平等表现在哪些方面 | 极品人妻少妇av视频| 精品亚洲乱码少妇综合久久| 国产成人欧美在线观看 | 99久久人妻综合| 菩萨蛮人人尽说江南好唐韦庄| 精品亚洲乱码少妇综合久久| 可以免费在线观看a视频的电影网站| 国产成人系列免费观看| 午夜成年电影在线免费观看| 亚洲第一青青草原| 亚洲 欧美一区二区三区| 日本黄色日本黄色录像| 午夜日韩欧美国产| 亚洲九九香蕉| 亚洲午夜精品一区,二区,三区| 欧美xxⅹ黑人| 国产精品1区2区在线观看. | 男女床上黄色一级片免费看| 丁香六月欧美| 欧美日韩亚洲综合一区二区三区_| 在线观看舔阴道视频| 国产有黄有色有爽视频| 老熟妇乱子伦视频在线观看 | 欧美 亚洲 国产 日韩一| 在线看a的网站| 女性被躁到高潮视频| 久久久久久久久久久久大奶| 丰满饥渴人妻一区二区三| 日本av免费视频播放| 久久久久久人人人人人| e午夜精品久久久久久久| 国产精品麻豆人妻色哟哟久久| 自拍欧美九色日韩亚洲蝌蚪91| 美女午夜性视频免费| www.精华液| 1024香蕉在线观看| av在线播放精品| 国产精品一区二区在线观看99| 一本综合久久免费| 母亲3免费完整高清在线观看| 日韩 亚洲 欧美在线| 欧美亚洲 丝袜 人妻 在线| 婷婷色av中文字幕| 国产一区二区在线观看av| 精品人妻1区二区| 日韩中文字幕视频在线看片| 另类亚洲欧美激情| 国产一区二区 视频在线| 国产av一区二区精品久久| 国产黄频视频在线观看| 亚洲av国产av综合av卡| 亚洲av片天天在线观看| 一二三四社区在线视频社区8| 男女国产视频网站| 美女午夜性视频免费| 99精品久久久久人妻精品| 久久久久国产精品人妻一区二区| 黄色视频,在线免费观看| 亚洲 欧美一区二区三区| 国产一卡二卡三卡精品| 亚洲av男天堂| 免费黄频网站在线观看国产| 国产男女内射视频| 中文字幕人妻丝袜一区二区| netflix在线观看网站| 男女之事视频高清在线观看| 丝袜脚勾引网站| 嫁个100分男人电影在线观看| 12—13女人毛片做爰片一| 极品人妻少妇av视频| 搡老岳熟女国产| 男女高潮啪啪啪动态图| 啦啦啦 在线观看视频| 天天躁日日躁夜夜躁夜夜| 69av精品久久久久久 | 亚洲成人免费av在线播放| 亚洲精品一卡2卡三卡4卡5卡 | 欧美日韩成人在线一区二区| 另类精品久久| 国产成人免费观看mmmm| 成年动漫av网址| 久久综合国产亚洲精品| 精品人妻熟女毛片av久久网站| 9191精品国产免费久久| 老鸭窝网址在线观看| 亚洲精品国产区一区二| 最新在线观看一区二区三区| 在线观看人妻少妇| 91老司机精品| 久久久久久久大尺度免费视频| 国产欧美日韩一区二区三区在线| 国产成人影院久久av| 国产精品久久久久久精品电影小说| 亚洲性夜色夜夜综合| 国产成人a∨麻豆精品| 日韩,欧美,国产一区二区三区| 国产精品 欧美亚洲| 久久精品国产a三级三级三级| 免费高清在线观看视频在线观看| 老司机影院成人| 国产三级黄色录像| 中文字幕最新亚洲高清| 亚洲精品久久成人aⅴ小说| 日韩大片免费观看网站| 午夜免费观看性视频| 一级毛片女人18水好多| 狠狠婷婷综合久久久久久88av| 又紧又爽又黄一区二区| 国产成人av教育| 国产日韩欧美在线精品| 淫妇啪啪啪对白视频 | 色综合欧美亚洲国产小说| 亚洲成人国产一区在线观看| 亚洲国产欧美网| 人成视频在线观看免费观看| 亚洲国产欧美日韩在线播放| 十分钟在线观看高清视频www| 国产精品久久久人人做人人爽| 精品一区在线观看国产| 极品少妇高潮喷水抽搐| 波多野结衣av一区二区av| 18禁黄网站禁片午夜丰满| 老熟妇仑乱视频hdxx| 一级,二级,三级黄色视频| 国产在视频线精品| 欧美激情极品国产一区二区三区| 国产人伦9x9x在线观看| 精品人妻一区二区三区麻豆| 99香蕉大伊视频| 老熟妇仑乱视频hdxx| 婷婷丁香在线五月| 老汉色av国产亚洲站长工具| 人人澡人人妻人| 国产精品香港三级国产av潘金莲| 久热这里只有精品99| 美女扒开内裤让男人捅视频| 蜜桃在线观看..| 各种免费的搞黄视频| 丝袜喷水一区| 久久这里只有精品19| 嫩草影视91久久| 一本色道久久久久久精品综合| 国产日韩欧美亚洲二区| 爱豆传媒免费全集在线观看| 亚洲国产成人一精品久久久| 欧美精品一区二区免费开放| 欧美国产精品va在线观看不卡| 叶爱在线成人免费视频播放| 搡老熟女国产l中国老女人| 精品乱码久久久久久99久播| 久久午夜综合久久蜜桃| av视频免费观看在线观看| 国产精品一区二区免费欧美 | 亚洲欧美成人综合另类久久久| 亚洲精品一区蜜桃| 两人在一起打扑克的视频| 日本五十路高清| 亚洲综合色网址| 涩涩av久久男人的天堂| 性少妇av在线| 国产精品久久久av美女十八| e午夜精品久久久久久久| www.自偷自拍.com| 亚洲五月婷婷丁香| 妹子高潮喷水视频| 国产成人av教育| 日本91视频免费播放| 中文字幕色久视频| av在线app专区| 十分钟在线观看高清视频www| 久久精品国产a三级三级三级| 亚洲第一欧美日韩一区二区三区 | 亚洲国产成人一精品久久久| 99久久国产精品久久久| 女人高潮潮喷娇喘18禁视频| 两人在一起打扑克的视频| 十八禁高潮呻吟视频| 一本—道久久a久久精品蜜桃钙片| 丝袜喷水一区| www.精华液| 成人亚洲精品一区在线观看| 国产精品1区2区在线观看. | 少妇裸体淫交视频免费看高清 | 91字幕亚洲| 丝袜人妻中文字幕| 一级黄色大片毛片| 麻豆av在线久日| 动漫黄色视频在线观看| 国产熟女午夜一区二区三区| 中文字幕制服av| 99热网站在线观看| 国产日韩欧美在线精品| 亚洲欧洲日产国产| 亚洲av美国av| 免费一级毛片在线播放高清视频 | 成年动漫av网址| av天堂久久9| 国产欧美亚洲国产| 在线观看舔阴道视频| 亚洲国产精品一区二区三区在线| 97人妻天天添夜夜摸| 久久精品亚洲av国产电影网| 久久久久久久国产电影| 日韩一卡2卡3卡4卡2021年| 日本欧美视频一区| 国产片内射在线| 老汉色av国产亚洲站长工具| 老司机亚洲免费影院| bbb黄色大片| a级片在线免费高清观看视频| 两性午夜刺激爽爽歪歪视频在线观看 | 在线十欧美十亚洲十日本专区| av福利片在线| 亚洲视频免费观看视频| 亚洲va日本ⅴa欧美va伊人久久 | 老司机影院成人| 十八禁人妻一区二区| 真人做人爱边吃奶动态| av在线老鸭窝| 欧美另类一区| 在线精品无人区一区二区三| 亚洲成人手机| 男女免费视频国产| 丝袜脚勾引网站| 久久国产精品大桥未久av| 午夜日韩欧美国产| 国产福利在线免费观看视频| av免费在线观看网站| av网站免费在线观看视频| 老司机在亚洲福利影院| 国产欧美日韩一区二区精品| 12—13女人毛片做爰片一| 日本vs欧美在线观看视频| 精品一区二区三卡| 国产高清国产精品国产三级| 日韩三级视频一区二区三区| 人妻人人澡人人爽人人| 久久久久久久久久久久大奶| 欧美亚洲日本最大视频资源| 久久香蕉激情| 午夜免费成人在线视频|