• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A New S-Box Design System for Data Encryption Using Artificial Bee Colony Algorithm

    2023-12-12 15:50:36YazeedYasinGhadiMohammedAlshehriSultanAlmakdiOumaimaSaidaniNazikAlturkiFawadMasoodandMuhammadShahbazKhan
    Computers Materials&Continua 2023年10期

    Yazeed Yasin Ghadi,Mohammed S.Alshehri,Sultan Almakdi,Oumaima Saidani,Nazik Alturki,Fawad Masood and Muhammad Shahbaz Khan

    1Department of Computer Science,Al Ain University,Abu Dhabi,112612,United Arab Emirates

    2Department of Computer Science,College of Computer Science and Information Systems,Najran University,Najran,61441,Saudi Arabia

    3Department of Information Systems,College of Computer and Information Sciences,Princess Nourah bint Abdulrahman University,P.O.Box 84428,Riyadh,11671,Saudi Arabia

    4Department of Electrical Engineering,Institute of Space Technology,Islamabad,4400,Pakistan

    5School of Computing,Engineering and the Built Environment,Edinburgh Napier University,Edinburgh,EH10 5DT,UK

    ABSTRACT Securing digital image data is a key concern in today’s information-driven society.Effective encryption techniques are required to protect sensitive image data,with the Substitution-box(S-box)often playing a pivotal role in many symmetric encryption systems.This study introduces an innovative approach to creating S-boxes for encryption algorithms.The proposed S-boxes are tested for validity and non-linearity by incorporating them into an image encryption scheme.The nonlinearity measure of the proposed S-boxes is 112.These qualities significantly enhance its resistance to common cryptographic attacks,ensuring high image data security.Furthermore,to assess the robustness of the S-boxes,an encryption system has also been proposed and the proposed S-boxes have been integrated into the designed encryption system.To validate the effectiveness of the proposed encryption system,a comprehensive security analysis including brute force attack and histogram analysis has been performed.In addition,to determine the level of security during the transmission and storage of digital content,the encryption system’s Number of Pixel Change Rate(NPCR),and Unified Averaged Changed Intensity(UACI)are calculated.The results indicate a 99.71%NPCR and 33.51%UACI.These results demonstrate that the proposed S-boxes offer a significant level of security for digital content throughout its transmission and storage.

    KEYWORDS S-box;chaos;artificial bee colony;image encryption

    1 Introduction

    The rise of multimedia technology and information sharing via insecure channels necessitates robust security for sensitive data,including images of finances,personal information,and medical records [1].As color images increasingly serve as digital communication mediums,securing them against unauthorized access is vital.Image encryption is key to maintaining the confidentiality and integrity of such data.While traditional text encryption may not suffice for images,a blend of security techniques can protect information at different network communication layers.Physical layer protection may involve modulation systems and spread spectrum techniques,while cryptographic methods,including encryption,decryption,and digital signatures,safeguard the application layer[1,2].Techniques like watermarking,steganography,and fingerprinting embed information within other data for proof of ownership or authenticity and content usage tracking[3].Encryption systems typically fall into two categories:symmetric and asymmetric.Symmetric encryption uses one key for encryption and decryption,while asymmetric uses a public encryption key and a private decryption key.Enhancing encryption involves employing substitution boxes (S-boxes) that use mathematical functions to substitute one-bit sequences.This increases the complexity of the key-cipher text relationship,which determines the encryption strength,with the nonlinearity of S-boxes significantly intensifying this complexity.

    This research focuses on creating highly nonlinear S-boxes [4,5] that are suitable for chaotic encryption systems.Chaotic maps have proven to be effective in encryption algorithms,for instance,a novel image encryption algorithm leveraging new fractional beta chaotic maps is proposed in [6].The presented approach employs chaotic maps to generate pseudo-random sequences that reshuffle image pixels.The proposed scheme,characterized by a large key space and high key sensitivity,resulted in impressive entropy and low correlation coefficients,enhancing overall image encryption security.Similarly,in[7],the authors introduced a novel S-box generator using a deterministic algorithm over elliptic curves,resulting in dynamic,key-sensitive,and secure S-boxes.It was successfully applied in an image encryption scheme,demonstrating resistance against several types of cryptographic attacks.Besides,the authors[8]presented the use of chaotic systems for big data encryption,particularly image encryption,proposing a one-dimensional piece-wise quadratic polynomial chaotic map(PWQPCM).Coupled with a robust S-box construction method and a secure image encryption algorithm,the proposed model shows advantages in data loss resistance,time efficiency,and adjustable security strength.Moreover,the authors in [9] presented a new two-dimensional discrete hyperchaotic map,which possesses wider continuous chaotic intervals and larger Lyapunov exponents.This map is employed to generate S-boxes and pair them,resulting in a sophisticated encryption algorithm.Additionally,a two-dimensional chaotic map-based encryption method for images was discussed by Amina et al.[10],utilizing confusion and diffusion at the bit level.The analysis of this method demonstrates satisfactory and efficient encryption performance.Additionally,a four-dimensional chaotic system-based algorithm for color image encryption is presented by Li et al.[11]which exhibits good security,robustness,and efficiency through simulations and analysis.However,it is found that some existing encryption methods may lack sufficient security.Encryption involves two phases of confusion and diffusion.Confusion makes the relationship between plaintext and ciphertext complex through operations like substitution and permutation.Diffusion scatters the impact of each plaintext symbol across multiple ciphertext symbols,achieved through block ciphers and transformations.Substitution boxes contribute to confusion while scrambling algorithms aid diffusion [12].Previous work in the field of application layer security has already been done by Kaur et al.[13],and chaos has been widely used in cryptography due to its sensitivity to initial conditions.One of the most critical characteristics of an efficient encryption system is its sensitivity to the key,the keyspace analysis,and the time analysis[14].In the case of images,the correlation between neighboring pixels is high,making it challenging to provide security to them using traditional systems.Deoxyribonucleic Acid(DNA)and hyperchaos-based encryption discussed by Liu et al.[15] were proposed and the system works very well for the security of images.Hyperchaos-based encryption schemes are a type of cryptographic algorithm that utilizes numerous chaotic systems with different initial conditions to achieve high encryption performance.These schemes offer several advantages,including strong security,efficient processing,and resistance to various attacks.Moreover,it employs multiple chaotic systems with distinct initial conditions which makes it challenging for attackers to reconstruct the encryption key.However,parallel processing techniques enable efficient handling of large amounts of data in realtime which is far better than Hyperchaos-based encryption schemes as it lacks flexibility due to their dependability on specific chaotic systems and initial conditions.It also limits their adaptability to different encryption scenarios.Basic requirements for efficient encryption systems are also discussed in related work[16].Several similar works can be found in literature,such as the authors in[17]proposed a novel image encryption algorithm utilizing a two-dimensional spatiotemporal chaotic system that combines linear neighborhood coupling and nonlinear chaotic map coupling of lattices,offering enhanced cryptographic features compared to the traditional coupled map lattices system.Bit-level permutation further strengthens the cryptosystem security,with simulations illustrating a large key space,high key sensitivity,and resistance to attacks.Similarly,in[18]the authors introduced a unique image encryption scheme,exploiting DNA-based sequencing and chaotic sequencing.The image transforms DNA encoding,shuffling for diffusion,substitution for confusion,and repeated DNA fusion operations to disrupt pixel correlations.The ciphered image meets all standard benchmarks,proving the effectiveness of this innovative approach.Besides,the authors in[19]presented a hybrid image encryption method combining a logistic sine system,two-dimensional cellular automata,and Finite State Machines (FSM)-based DNA rule generator.Each of the three stages of encryption employs unique rules,delivering robust defense against various cryptographic attacks.The proposed method proves to be effective for secure encryption of classified grayscale images.

    Encryption systems rely on key sensitivity,keyspace analysis,and time analysis.In images,pixel correlation can affect image quality;high correlation may lead to blurriness,while low correlation may result in noise.Effective encryption algorithms reduce this correlation,making histograms uniformly distributed,achieved by scrambling—shuffling pixel groups to diminish neighboring block correlation.This contributes to diffusion,vital for images with high neighborhood correlation.The S-box’s properties,including non-linearity and the avalanche effect,determine encryption strength.A secure S-box exhibits significant output changes with input modifications and satisfies the strict avalanche criterion.The S-box’s strength influences the confidentiality and integrity of encrypted data,with robust S-boxes enhancing security against unauthorized access.Therefore,this paper focuses on generating S-boxes exhibiting non-linearity,resilience,and compatibility with existing encryption algorithms.This work aims to develop highly nonlinear S-boxes for encryption,enhancing digital content security during transmission and storage.The focus is on incorporating these S-boxes in the encryption system’s confusion phase and using various scrambling algorithms in the diffusion phase.The proposed system’s effectiveness will be evaluated based on key sensitivity,keyspace analysis,time analysis,and the uniform distribution of encrypted image histograms.

    The key contributions of this paper are:

    1.Generation of highly nonlinear substitution boxes(S-boxes)using Artificial Bee Colony(ABC)algorithm that adheres to the key statistical security parameters such as Strict Avalanche Criteria(SAC),bijectivity,and Bit Independent Criteria(BIC).These highly nonlinear S-boxes enhance the security of digital content during transmission and storage.

    2.Development of a novel encryption system for colored images,which innovatively incorporates the generated S-boxes into the confusion phase and employs different scrambling algorithms in the diffusion phase making it suitable for color image encryption.

    3.A comprehensive and diverse security analysis has been presented for the proposed encryption system.This analysis includes brute force attack resistance,National Institute of Standards and Technology(NIST)statistical test,histogram analysis,differential analysis,time analysis,and key sensitivity analysis.

    The rest of the paper is organized as follows:Section 2 introduces essential concepts used in S-box generation,outlines the process of generating and analyzing the S-boxes,and presents the proposed encryption system.Section 3 presents the extensive security analysis of the proposed encryption system followed by a concise and clear conclusion in Section 4.

    2 Basic Theory and the Proposed S-Boxes-Based Encryption System

    In this section of the paper,the basics of the algorithm used in the proposed encryption system are discussed.

    2.1 Artificial Bee Colony Algorithm(ABC)

    The ABC algorithm,introduced by Karaboga in 2005,mimics the foraging behavior of honey bee colonies to solve optimization problems[20].It involves finding a vector that minimizes an objective function.The algorithm starts with a random population of solution vectors and iteratively searches for the best solution.In this study,the random search behavior of bee colonies is utilized to create S-boxes.The ABC algorithm is composed of four distinct phases,explained in detail in the following section.

    2.1.1 Initialization Phase

    All the possible vectors of the populations are initialized by the scout bee and the control parameters are set.The initialization is performed according to Eq.(1)[20].

    Here is the population vector which holds(a=1,2,3,...,n),this needs to be optimized to get a minimized objective function.viandjiare the higher and lesser bounds of theyna.

    2.1.2 Employee Bee Phase

    The task of the employee is to search for a new food source and determine its richness.Mathematically richness can be quantified through a fitness function.For finding the nearest food source the relation in Eq.(2)[20]can be used.

    Hereynais a randomly selected food source and is a randomly chosen number from(-a,a).The fitness function for the solution might be figured using the relation as in Eq.(3)[20].

    2.1.3 Onlooker Bee Phase

    Apart from the employed bees there exist two other groups named onlooker bees and scout bees.Employer bees share the food source evidence with onlooker bees.The onlooker bees compute the fitness value of the food source and based on this evidence the food source is selected or rejected.If rejected,the same process goes iteratively.The probability with which a food source is chosen is given by Eq.(4)[20].

    2.1.4 Scout Bees

    Scouts are a group of bees who chooses their food sources randomly.After some predefined number of trials,employed bees whose solution is not improved become scouts.Scouts start the search process by choosing from a random location.

    2.2 Logistic Chaotic Map

    Owing to sensitivity to preliminary conditions,chaos has been commonly used in cryptography.The logistic chaotic map is given by Eq.(5)[21].

    Hereynis the initial condition of the chaotic map,and its value is between zero and one.r ∈(0,4).The map reveals chaotic behavior for 3.56

    2.3 Generation of Exclusive OR(XOR)Map

    To decrease the association amongst the neighboring pixels first,we have to generate a chaos-based map of the same dimension of the image.The process of generating an XOR map is given below:

    Step 1:The initial conditions for the logistic map are obtained using the technique discussed in the above section.

    Step 2:The logistic chaotic map is iterated 10,000 times.The value for each iteration lies between 0 and 1.This value is multiplied by 1000000 and then the mode 256 operations are performed.

    Step 3:The final values for each iteration are in the range 0 to 255.

    Step 4:From these values,an N×N logistic map is calculated,which will be utilized in the proposed encryption system for the process of diffusion.

    2.4 Shuffling Algorithm

    The algorithm used for shuffling involves moving rows in a specific manner.In each channel,the first row remains unchanged,while the second row is shifted left circularly by one.The third row is shifted circularly to the right by two,and the nthrow is shifted circularly to the right by N-1.During decryption,the opposite of this process takes place,with circular left shifting being performed instead of circular right shifting.This shuffling technique generates diffusion in the cryptosystem,making it difficult to establish a relationship between the plaintext and ciphertext.

    2.5 Proposed S-Box Generation

    Three S-boxes have been proposed in this paper and are displayed in Tables 1–3,respectively.The proposed S-boxes are generated from the position vectors of the bees of the ABC algorithm.The Sboxes are designed and calculated as depicted in Fig.1.The procedure is described as:

    Step 1:The number of bees in the ABC along with their starting positions is initiated.

    Step 2:The fitness function is calculated and based on the fitness function outcome the position is updated or terminated.

    Step 3:All the position vectors of the bees are calculated and stored.In a vector,in each iteration,this process is carried out.

    Step 4:Saved position vectors are loaded and multiplied by a large number and then mode 256 is performed.

    Step 5:The outcome from step 4 is stored in a 1×256 vector.This vector contains unique values as no values should not be repeated.

    Step 6:The proposed S-box is checked for non-linearity.If the nonlinearity is less than 110.The S-box is discarded otherwise it is saved.

    Table 1:Proposed S-box 1

    Table 2:Proposed S-box 2

    Table 3:Proposed S-box 3

    Figure 1:The proposed system for the generation of highly non-linear S-boxes

    2.6 Non-Linearity

    The nonlinearity of S-boxes is essential for ensuring the security of encryption systems.Randomness and unpredictability makes it challenging for intruders to decipher encrypted data.Linear Sboxes,on the other hand,are more vulnerable to intruding.Therefore,incorporating nonlinearity adds complexity and strengthens the security of the encryption system.It is crucial to assess and maintain sufficient degrees of nonlinearity in the S-boxes to ensure a high level of security.The nonlinearity of the S-boxes can be calculated using the relation in Eq.(12).

    Here x is the total of input bits,in our casex=8.Wmax(fb)is the Walsh-Hadamard transform of(f),and can be calculated in the relation in Eq.(13).

    The nonlinearity of the S-boxes is calculated and tabularized in Table 4.The comparison of the proposed S-box with the newly proposed S-boxes nonlinearity is given in Table 5.From the nonlinearity analysis,it is clear that the encryption system utilizing these S-boxes will possess a high degree of immunity to linear cryptographic attacks.

    Table 4:Non-linearity outcomes of the proposed S-boxes

    Table 5:Comparison of the proposed S-boxes and the newly proposed S-boxes

    2.7 Strict Avalanche Criteria(SAC)

    SAC is the 50%modification in output when the input is altered by only one bit.In our case,the SAC of the proposed S-boxes is calculated and tabulated in Table 5.The calculated values of SAC come out to be approximately 0.5 which is near to the theoretical value.The SAC of the proposed S-boxes is compared with the recently proposed S-boxes in Table 5.The comparison reveals that the proposed S-boxes will provide a high degree of immunity to differential cryptanalysis.

    2.8 Bijectivity

    The bijectivity of S-boxes is crucial for the security of cryptographic systems,ensuring the confidentiality and integrity of information.Bijectivity means that each input has a unique output and vice versa,preventing duplication or repetition.Non-bijective S-boxes pose risks,as different inputs could yield the same output,potentially leading to information loss and security breaches.Designers employ techniques like using known bijective functions or nonlinear functions with proven bijectivity,such as the Advanced Encryption System (AES) S-box.Our S-boxes fulfill the criteria of bijectivity within the range of[0,255],making them unique and secure.

    2.9 Bit Independent Criteria(BIC)

    In BIC we are checking the correlation of the two resultant vectors that are created by altering one bit in the input.Let vector A is obtained by altering bit 0 of the input vector and vector B be obtained by altering bit 2 of the input vector.The BIC can be calculated using the relation in Eq.(14).

    The outcome of BIC lies in the[0,1]range.The ideal value of BIC is 0.5.We have calculated the values of BIC and tabulated them in Table 5.The comparison reveals that the proposed S-boxes will provide a high degree of immunity to differential cryptanalysis.

    2.10 Encryption Using the Proposed S-Boxes

    To check the power of the Proposed S-boxes,here we present an encryption system.This encryption system utilizes the proposed S-boxes.The implemented encryption system,which is depicted in Fig.2 comprises the following steps.

    Step 1:Considerations for the logistic chaotic map are initiated from the encryption key as discussed in Section 2.2 of the article.

    Step 2:The XOR map is generated as discussed in Section 2.2 and in parallel,the original image is split into R,G,and B channels,respectively.

    Step 3:The three maps are XORed with the R,G,and B channels,respectively,by doing so the high correlation is smashed amongst the pixels.

    Step 4:The process of shuffling as discussed in Section 2.4 is performed.Here the process of diffusion is completed.

    Step 5:The S-box is generated from the ABC algorithm as discussed in Section 3.Here in this step utilizing these S-boxes,the process of substitution is performed.

    Step 6:All three channels are joined to obtain the final encrypted Red-Green-Blue(RGB)Image.

    Figure 2:Encryption using the proposed S-boxes

    3 Security Analysis

    Conducting a thorough security analysis is essential for robust encryption systems.It identifies vulnerabilities,strengthens security,and safeguards sensitive data.Our research includes comprehensive security analyses to assess the resilience of our proposed encryption system,incorporating S-boxes,against diverse cryptographic attacks.

    3.1 Brute Force Attack

    The brute force attack is a technique used by hackers to discover passwords or encryption keys by systematically trying all possible combinations.Skilled attackers find this attack valuable because it does not rely on prior knowledge of the target password or key.Longer and more complex passwords or keys are harder to crack using brute force attacks due to the increasing number of combinations.Our research focuses on generating initial conditions that offer high resistance to brute force attacks in encryption systems,as explained in Section 2.2 of the paper.

    3.2 Histogram Analysis

    The histogram is a representation of the number of pixels in an image.For high-contrast images,the histogram is non-uniform and spread out over the x-axis.This can give intruders information about the image’s contrast and brightness,which they can use to break the encryption.To prevent this,the encrypted image’s histogram must be uniform.In Fig.3,the histogram of the plain image is shown,and it can be seen that they are non-uniform.However,in Fig.3,the histogram of the encrypted R,G,and B channels is shown to be uniform and devoid of any useful information for intruders.Our S-boxesbased system is thus claimed to be secure against histogram-based attacks based on this histogram analysis.

    3.3 Differential Analysis

    In differential analysis,the intruder takes an image,encrypts it,and then changes one pixel in the plain image and again encrypts that image and they try to find the function of the encryption system from these pairs of plain images and encrypted images to resist differential analysis.Any encryption system must have a 99%score for Number of Pixel Change Rate(NPCR)and a 33%score for Unified Averaged Changed Intensity(UACI).The NPCR and UACI are calculated and discussed in the following section.The NPCR of an image having dimension X×Y×3 is calculated using the relation in Eq.(15).

    where I1 is the result of encryption of the unchanged image and I2 is the result of encryption of one pixel changed image.The NPCR of the two images is calculated and tabulated in Table 6.The UACI of an image having dimension X×Y×3 is calculated using the relation in Eq.(17).

    Table 6:NPCR and UACI values

    where I1 is the result of encryption of the unchanged image and I2 is the result of encryption of one pixel changed image.The UACI of the two images is calculated and tabulated in Table 7.

    Figure 3:Histogram analysis;(a)plaintext image,(b)histogram of plaintext image,(c)encrypted image,and(d)histogram of encrypted image

    Table 7:Comparison of NPCR and UACI values

    3.4 Computational Complexity Analysis

    The subjectivity of time analysis relies on the platform used for the encryption system.In the case of Field Programmable Gate arrays,a complex system can be encrypted in mere seconds.Our team implemented the encryption system in MATLAB,which was installed on a computer containing an Intel(R) Core(TM) i7-7700 processor @ 3.60 GHz processor and 8 GB of Random Access Memory(RAM).We compared the time analysis of our system with the AES by encrypting the same images using both systems and then we presented the results in Table 8.

    Table 8:Computational complexity comparison of the proposed system with AES

    3.5 National Institute of Standards and Technology(NIST)Statistical Test

    To keep encrypted images safe from intruders,the randomness of the encryption key is of utmost importance.To test the efficacy of the proposed encryption system,tests based on NIST SP 800-22 criteria have also been conducted.

    Each test produced a real number between 0 and 1,which was then compared with a preestablished significance degreeα.If the value of p was greater thanα,then it meant that the encryption system had passed the test successfully.In the proposed system,the value ofαwas set to 0.01.The results of the test were tabulated in Table 9,and it can be inferred that the proposed encryption system has excellent statistical properties and is a superior choice for image encryption.

    Table 9:Results of NIST SP 800-22

    3.6 Key Sensitivity Analysis

    The employed technique demonstrates remarkable sensitivity to even a slight modification in the encryption key.The starting condition for the erratic and unpredictable logistic map is equivalent to the key for the encryption method.Upon encrypting an image,the same initial conditions are utilized at the decryption end for the formation of the S-box.After creating the S-box,inverse S-boxes are generated for decryption.By varying the key,i.e.,initial conditions of the chaotic map,the produced S-box is entirely distinct,and the decrypted image does not reveal any essential information.Fig.4 exhibits the decrypted image using the original key and the decrypted image with a marginally altered key.The chaotic map,which has been XORed in step 2,is responsible for this key sensitivity.

    Figure 4:Key sensitivity analysis:(a)plain image;(b)encrypted image,(c)correctly decrypted image,(d)decrypted image through slightly changing the key

    4 Conclusion

    In conclusion,this research has proposed a unique and innovative method for generating substitution boxes(S-boxes)for encryption systems in the context of multimedia technology.As the strength of the entire encryption system depends on the cryptographic strength of the S-box,it is essential to ensure its reliability and robustness.By integrating the Proposed S-boxes into the encryption system’s design and analyzing their nonlinearity,as well as other security parameters such as NPCR and UACI,we have demonstrated that the Proposed S-boxes provide a high degree of security to digital content during transmission and storage.This research provides valuable insights into enhancing the security of information sharing through insecure communication channels.Future studies could consider integrating multiple chaotic maps to enhance the robustness of the encryption scheme,optimizing the algorithm for better performance with large-scale real-world applications,and developing a dynamic key generation mechanism to increase security.

    Acknowledgement:Princess Nourah bint Abdulrahman University Researchers Supporting Project Number (PNURSP2023R333),Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.

    Funding Statement:This work was funded by Deanship of Scientific Research at Najran University under the Research Groups Funding Program Grant Code (NU/RG/SERC/12/3) and also by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2023R333),Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.

    Author Contributions:The authors confirm their contribution to the paper as follows:study conception and design:Y.Y.Ghadi,M.S.Alshehri,S.Almakdi,O.Saidani,N.Alturki,F.Masood,M.S.Khan;data collection:Y.Y.Ghadi,M.S.Alshehri,S.Almakdi;analysis and interpretation of results:M.S.Alshehri,S.Almakdi,O.Saidani,N.Alturki,F.Masood;draft manuscript preparation:O.Saidani,N.Alturki,M.S.Khan.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:Data is available with the corresponding author upon appropriate request.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    国产一区在线观看成人免费| 国产精品乱码一区二三区的特点 | 久久精品亚洲av国产电影网| 在线av久久热| 丁香六月欧美| 少妇粗大呻吟视频| 国产免费av片在线观看野外av| 精品免费久久久久久久清纯 | 国产又色又爽无遮挡免费看| 久久人妻熟女aⅴ| 免费观看a级毛片全部| 午夜成年电影在线免费观看| 一级a爱视频在线免费观看| 亚洲精品在线观看二区| 国产精品自产拍在线观看55亚洲 | 久久国产乱子伦精品免费另类| 视频区欧美日本亚洲| 男人操女人黄网站| 成人影院久久| 精品国产超薄肉色丝袜足j| 久久精品aⅴ一区二区三区四区| 午夜亚洲福利在线播放| 日本vs欧美在线观看视频| 精品一区二区三区av网在线观看| 身体一侧抽搐| 美女高潮喷水抽搐中文字幕| 免费观看a级毛片全部| 最新美女视频免费是黄的| 成年版毛片免费区| 美女午夜性视频免费| 精品国产乱码久久久久久男人| 美女 人体艺术 gogo| 一级毛片精品| 中文字幕制服av| 人妻一区二区av| 久久精品成人免费网站| 黑人欧美特级aaaaaa片| 欧美成人午夜精品| 精品人妻熟女毛片av久久网站| 超色免费av| 丰满人妻熟妇乱又伦精品不卡| 欧美精品亚洲一区二区| 他把我摸到了高潮在线观看| 男人的好看免费观看在线视频 | 国产亚洲av高清不卡| 一区二区日韩欧美中文字幕| 最新的欧美精品一区二区| 免费av中文字幕在线| 色婷婷久久久亚洲欧美| 午夜福利乱码中文字幕| 色精品久久人妻99蜜桃| 欧美久久黑人一区二区| 午夜视频精品福利| 大香蕉久久网| 亚洲人成电影免费在线| 亚洲色图综合在线观看| www.自偷自拍.com| 大陆偷拍与自拍| 日韩一卡2卡3卡4卡2021年| 一区二区三区国产精品乱码| 人人妻,人人澡人人爽秒播| 国产精品.久久久| 在线观看免费午夜福利视频| 看黄色毛片网站| 自线自在国产av| 久久香蕉国产精品| x7x7x7水蜜桃| 免费日韩欧美在线观看| 他把我摸到了高潮在线观看| av福利片在线| 国产精品久久久久成人av| 午夜影院日韩av| 国产有黄有色有爽视频| 精品午夜福利视频在线观看一区| 女同久久另类99精品国产91| 欧美黑人欧美精品刺激| 三级毛片av免费| 中文字幕av电影在线播放| 亚洲专区中文字幕在线| 亚洲九九香蕉| 成熟少妇高潮喷水视频| 久久久久久免费高清国产稀缺| 深夜精品福利| 国产精品秋霞免费鲁丝片| 亚洲中文日韩欧美视频| av在线播放免费不卡| 99国产精品一区二区蜜桃av | 99在线人妻在线中文字幕 | 美女午夜性视频免费| 天天操日日干夜夜撸| 大码成人一级视频| 中文亚洲av片在线观看爽 | 亚洲一区二区三区不卡视频| avwww免费| 母亲3免费完整高清在线观看| 国产片内射在线| 成人特级黄色片久久久久久久| 亚洲第一青青草原| 欧美色视频一区免费| 久久 成人 亚洲| 嫩草影视91久久| 亚洲性夜色夜夜综合| 老司机午夜福利在线观看视频| 曰老女人黄片| 亚洲精品美女久久久久99蜜臀| 一区在线观看完整版| 日日爽夜夜爽网站| 一级a爱片免费观看的视频| 交换朋友夫妻互换小说| 日韩有码中文字幕| 国产aⅴ精品一区二区三区波| 狠狠婷婷综合久久久久久88av| 国产av又大| 三级毛片av免费| 女人精品久久久久毛片| 淫妇啪啪啪对白视频| 两性午夜刺激爽爽歪歪视频在线观看 | 国产成人欧美在线观看 | 欧美精品高潮呻吟av久久| 黄片小视频在线播放| 国产伦人伦偷精品视频| 国产熟女午夜一区二区三区| 免费av中文字幕在线| netflix在线观看网站| 久久香蕉精品热| 久久国产精品男人的天堂亚洲| 一二三四社区在线视频社区8| 亚洲精华国产精华精| 18禁黄网站禁片午夜丰满| 国产精品免费大片| 日韩免费高清中文字幕av| 老汉色∧v一级毛片| 日韩欧美一区二区三区在线观看 | 国产精品一区二区在线不卡| 亚洲精品在线观看二区| 69av精品久久久久久| 欧美精品av麻豆av| 老熟女久久久| 国产精品久久视频播放| 免费一级毛片在线播放高清视频 | 一进一出抽搐gif免费好疼 | 亚洲综合色网址| 国产亚洲精品久久久久久毛片 | 不卡av一区二区三区| 在线永久观看黄色视频| 黄色片一级片一级黄色片| 美国免费a级毛片| 亚洲片人在线观看| 欧美精品一区二区免费开放| 高清欧美精品videossex| 黄色女人牲交| e午夜精品久久久久久久| 老司机亚洲免费影院| 他把我摸到了高潮在线观看| 两人在一起打扑克的视频| 成年人午夜在线观看视频| 国产欧美日韩一区二区三| 国产欧美日韩一区二区精品| 色婷婷久久久亚洲欧美| 久久香蕉国产精品| 国产高清videossex| 黄色 视频免费看| 国产一区二区三区在线臀色熟女 | 激情在线观看视频在线高清 | netflix在线观看网站| 精品视频人人做人人爽| 日本wwww免费看| 成年版毛片免费区| 国产精品二区激情视频| 精品午夜福利视频在线观看一区| 中文字幕制服av| 亚洲精品中文字幕一二三四区| 国产精品永久免费网站| 一进一出抽搐gif免费好疼 | 成人18禁高潮啪啪吃奶动态图| 91字幕亚洲| а√天堂www在线а√下载 | 丝袜美腿诱惑在线| 精品国内亚洲2022精品成人 | 在线观看免费午夜福利视频| 欧美日韩瑟瑟在线播放| 五月开心婷婷网| 精品久久蜜臀av无| 老熟妇仑乱视频hdxx| 满18在线观看网站| 99久久99久久久精品蜜桃| 精品视频人人做人人爽| 99香蕉大伊视频| 国产精品久久久久成人av| 亚洲精品一二三| 国产成人一区二区三区免费视频网站| 一区二区三区激情视频| 亚洲av日韩在线播放| 欧美久久黑人一区二区| 在线观看免费视频网站a站| 欧美乱妇无乱码| 中文字幕精品免费在线观看视频| 亚洲成人国产一区在线观看| 狂野欧美激情性xxxx| 天堂俺去俺来也www色官网| 91成年电影在线观看| 免费久久久久久久精品成人欧美视频| 亚洲伊人色综图| 中国美女看黄片| 看片在线看免费视频| 久久亚洲精品不卡| 国产欧美日韩综合在线一区二区| 亚洲欧美激情在线| 男女免费视频国产| 精品高清国产在线一区| 中文字幕人妻丝袜一区二区| 国产精品久久电影中文字幕 | 在线观看免费日韩欧美大片| 久久久久国产精品人妻aⅴ院 | 好看av亚洲va欧美ⅴa在| 18禁国产床啪视频网站| 亚洲第一欧美日韩一区二区三区| 99久久99久久久精品蜜桃| 亚洲中文日韩欧美视频| 国产97色在线日韩免费| 一区二区三区国产精品乱码| 男女午夜视频在线观看| 丝袜美腿诱惑在线| 国产精品美女特级片免费视频播放器 | 黄片大片在线免费观看| 亚洲欧洲精品一区二区精品久久久| 丁香六月欧美| 国产深夜福利视频在线观看| 亚洲精品国产精品久久久不卡| 欧美日韩一级在线毛片| 最新美女视频免费是黄的| 亚洲欧美精品综合一区二区三区| 久久中文字幕一级| 精品高清国产在线一区| 在线免费观看的www视频| e午夜精品久久久久久久| 国产精品久久久久成人av| 亚洲av成人av| 中文字幕最新亚洲高清| 亚洲片人在线观看| 老司机午夜福利在线观看视频| 精品一区二区三区视频在线观看免费 | 亚洲第一青青草原| 欧洲精品卡2卡3卡4卡5卡区| 亚洲伊人色综图| 国产精品成人在线| 国产精品免费视频内射| 亚洲av熟女| 国产激情欧美一区二区| 亚洲成人国产一区在线观看| svipshipincom国产片| 男女午夜视频在线观看| 热99re8久久精品国产| 一二三四在线观看免费中文在| 视频区欧美日本亚洲| 成人18禁高潮啪啪吃奶动态图| 亚洲欧美色中文字幕在线| tocl精华| 欧美成人午夜精品| 久久人妻熟女aⅴ| aaaaa片日本免费| 91九色精品人成在线观看| 午夜免费成人在线视频| 日韩熟女老妇一区二区性免费视频| 欧美人与性动交α欧美精品济南到| 国产精品 欧美亚洲| 欧美性长视频在线观看| 99国产极品粉嫩在线观看| 少妇裸体淫交视频免费看高清 | 国产欧美亚洲国产| 亚洲人成伊人成综合网2020| 日韩免费高清中文字幕av| 日韩精品免费视频一区二区三区| 亚洲精品自拍成人| 国产成人av激情在线播放| 日韩欧美国产一区二区入口| а√天堂www在线а√下载 | 在线免费观看的www视频| 国产精华一区二区三区| 激情在线观看视频在线高清 | 一级黄色大片毛片| 母亲3免费完整高清在线观看| 欧美乱码精品一区二区三区| 女性生殖器流出的白浆| 啦啦啦视频在线资源免费观看| 亚洲成人国产一区在线观看| 欧美国产精品一级二级三级| 久久亚洲精品不卡| 亚洲avbb在线观看| 国产xxxxx性猛交| 日本wwww免费看| 身体一侧抽搐| 欧美日韩视频精品一区| 久久久精品区二区三区| 在线观看免费日韩欧美大片| 亚洲中文字幕日韩| 视频在线观看一区二区三区| 亚洲色图av天堂| 丝袜美腿诱惑在线| 精品高清国产在线一区| 久久久国产精品麻豆| 9色porny在线观看| 99热只有精品国产| 国产精品一区二区免费欧美| 99热只有精品国产| 中文字幕最新亚洲高清| 国产一卡二卡三卡精品| www.熟女人妻精品国产| 他把我摸到了高潮在线观看| 伦理电影免费视频| 久久久精品免费免费高清| 老司机午夜福利在线观看视频| 国产在线一区二区三区精| 99精品久久久久人妻精品| 精品国产超薄肉色丝袜足j| 久久天躁狠狠躁夜夜2o2o| 又黄又爽又免费观看的视频| 亚洲aⅴ乱码一区二区在线播放 | 久久狼人影院| 精品欧美一区二区三区在线| 国产又爽黄色视频| 久久精品国产99精品国产亚洲性色 | 成熟少妇高潮喷水视频| 午夜福利欧美成人| 欧美成人免费av一区二区三区 | 无人区码免费观看不卡| 男人舔女人的私密视频| 人人妻人人澡人人看| 黄色 视频免费看| 大香蕉久久成人网| 国产精品久久久久久精品古装| 国产黄色免费在线视频| 黄网站色视频无遮挡免费观看| 1024视频免费在线观看| 午夜两性在线视频| 欧美精品一区二区免费开放| 国产成人欧美| 免费在线观看黄色视频的| 超碰97精品在线观看| 国产黄色免费在线视频| 成人特级黄色片久久久久久久| 亚洲精品自拍成人| 国产精品亚洲一级av第二区| 18在线观看网站| 变态另类成人亚洲欧美熟女 | 中文字幕人妻丝袜制服| 久久精品亚洲精品国产色婷小说| 俄罗斯特黄特色一大片| 老司机深夜福利视频在线观看| 国产一区二区三区在线臀色熟女 | 国产男靠女视频免费网站| 日本wwww免费看| 黑人巨大精品欧美一区二区蜜桃| 99久久精品国产亚洲精品| 久久精品国产a三级三级三级| 99久久国产精品久久久| 极品少妇高潮喷水抽搐| 成年女人毛片免费观看观看9 | 久久久精品国产亚洲av高清涩受| 女人高潮潮喷娇喘18禁视频| 99热网站在线观看| 国产在线观看jvid| 国产男女内射视频| 精品国产美女av久久久久小说| 色尼玛亚洲综合影院| 黄色女人牲交| 亚洲情色 制服丝袜| 91麻豆精品激情在线观看国产 | 建设人人有责人人尽责人人享有的| 亚洲精华国产精华精| 亚洲专区国产一区二区| 黄片大片在线免费观看| 飞空精品影院首页| 黄色片一级片一级黄色片| 伊人久久大香线蕉亚洲五| 热99re8久久精品国产| 亚洲av成人不卡在线观看播放网| 国产区一区二久久| 国产一区在线观看成人免费| 国产精品久久电影中文字幕 | 成年女人毛片免费观看观看9 | 亚洲人成伊人成综合网2020| 午夜福利视频在线观看免费| 高清av免费在线| 一区二区日韩欧美中文字幕| 久久影院123| 18禁国产床啪视频网站| 精品国内亚洲2022精品成人 | 欧美久久黑人一区二区| 黄色视频不卡| 91九色精品人成在线观看| 91av网站免费观看| 欧美不卡视频在线免费观看 | 国内久久婷婷六月综合欲色啪| 人成视频在线观看免费观看| 电影成人av| 狠狠狠狠99中文字幕| 大片电影免费在线观看免费| 久久人人97超碰香蕉20202| 这个男人来自地球电影免费观看| 亚洲va日本ⅴa欧美va伊人久久| 捣出白浆h1v1| 99热国产这里只有精品6| 成人永久免费在线观看视频| 他把我摸到了高潮在线观看| 免费不卡黄色视频| 老司机在亚洲福利影院| 老汉色av国产亚洲站长工具| 国产精品久久电影中文字幕 | 国产高清激情床上av| 最新在线观看一区二区三区| 12—13女人毛片做爰片一| 中国美女看黄片| 欧美乱码精品一区二区三区| 国产午夜精品久久久久久| 黄色丝袜av网址大全| 国产精品香港三级国产av潘金莲| 国产极品粉嫩免费观看在线| av免费在线观看网站| 男女之事视频高清在线观看| 国产aⅴ精品一区二区三区波| 亚洲片人在线观看| 精品久久蜜臀av无| 黄网站色视频无遮挡免费观看| 手机成人av网站| 日韩中文字幕欧美一区二区| 精品乱码久久久久久99久播| 性少妇av在线| 亚洲国产欧美日韩在线播放| 久久久久国内视频| 久久久久国产精品人妻aⅴ院 | 久久这里只有精品19| 国产精品国产高清国产av | 黑人操中国人逼视频| 在线天堂中文资源库| 久久精品国产99精品国产亚洲性色 | 欧美日韩亚洲高清精品| 在线十欧美十亚洲十日本专区| 婷婷成人精品国产| 日韩欧美免费精品| 在线观看免费高清a一片| 老司机深夜福利视频在线观看| 精品人妻1区二区| 国产单亲对白刺激| 国产不卡av网站在线观看| 怎么达到女性高潮| 国内毛片毛片毛片毛片毛片| 亚洲欧美精品综合一区二区三区| 麻豆国产av国片精品| 乱人伦中国视频| 婷婷丁香在线五月| 亚洲成人国产一区在线观看| 精品高清国产在线一区| 高清黄色对白视频在线免费看| 国产精品99久久99久久久不卡| 久久精品亚洲av国产电影网| 99国产极品粉嫩在线观看| 婷婷丁香在线五月| 欧美黑人欧美精品刺激| 在线观看舔阴道视频| 狠狠狠狠99中文字幕| 久久香蕉精品热| 免费在线观看黄色视频的| 亚洲成人免费av在线播放| √禁漫天堂资源中文www| 日韩欧美三级三区| 久久 成人 亚洲| 午夜亚洲福利在线播放| 国产亚洲精品久久久久久毛片 | 国产99白浆流出| 日本一区二区免费在线视频| 韩国精品一区二区三区| 在线观看免费午夜福利视频| 女人爽到高潮嗷嗷叫在线视频| 欧美精品亚洲一区二区| 日韩视频一区二区在线观看| 丁香六月欧美| 日韩三级视频一区二区三区| 淫妇啪啪啪对白视频| 91精品三级在线观看| 亚洲精品久久午夜乱码| 国产精品二区激情视频| 伦理电影免费视频| 亚洲成人国产一区在线观看| xxx96com| 天堂√8在线中文| 99精品在免费线老司机午夜| 国产三级黄色录像| 少妇猛男粗大的猛烈进出视频| 亚洲成av片中文字幕在线观看| 成人影院久久| 黄片小视频在线播放| 丰满迷人的少妇在线观看| 午夜福利,免费看| 两个人看的免费小视频| 在线观看免费视频网站a站| 最新在线观看一区二区三区| 亚洲成人免费av在线播放| 亚洲一区高清亚洲精品| 国产免费av片在线观看野外av| 啦啦啦视频在线资源免费观看| а√天堂www在线а√下载 | 99国产精品一区二区蜜桃av | 成人国语在线视频| 在线永久观看黄色视频| 一级毛片高清免费大全| 国产精品 国内视频| 老司机靠b影院| 国产区一区二久久| 亚洲第一青青草原| 好看av亚洲va欧美ⅴa在| 一边摸一边抽搐一进一小说 | 国产精品欧美亚洲77777| 欧美激情极品国产一区二区三区| 亚洲一区中文字幕在线| 在线观看日韩欧美| 日韩精品免费视频一区二区三区| 国精品久久久久久国模美| 满18在线观看网站| 国产高清视频在线播放一区| 亚洲精品国产一区二区精华液| 99在线人妻在线中文字幕 | 午夜精品在线福利| 亚洲美女黄片视频| 久久久久久久久免费视频了| 久久中文字幕一级| 亚洲精品在线美女| 精品久久蜜臀av无| 欧美日本中文国产一区发布| 岛国在线观看网站| 99香蕉大伊视频| 国产精品香港三级国产av潘金莲| 日日摸夜夜添夜夜添小说| 最近最新中文字幕大全免费视频| 丝袜在线中文字幕| 亚洲精品国产一区二区精华液| 在线天堂中文资源库| 色老头精品视频在线观看| 午夜精品久久久久久毛片777| 丁香欧美五月| 亚洲色图综合在线观看| 亚洲av欧美aⅴ国产| 亚洲 国产 在线| 国产激情久久老熟女| 五月开心婷婷网| 九色亚洲精品在线播放| 老司机午夜十八禁免费视频| 宅男免费午夜| 美国免费a级毛片| 中文欧美无线码| 天天影视国产精品| 国精品久久久久久国模美| av网站免费在线观看视频| 韩国精品一区二区三区| 制服人妻中文乱码| 久久人妻熟女aⅴ| 飞空精品影院首页| 欧美中文综合在线视频| 一个人免费在线观看的高清视频| 一边摸一边做爽爽视频免费| 久久久国产成人精品二区 | 免费观看a级毛片全部| av在线播放免费不卡| 一级毛片高清免费大全| 丝袜人妻中文字幕| 国产男靠女视频免费网站| 9色porny在线观看| 满18在线观看网站| 又黄又爽又免费观看的视频| 久久久国产成人免费| 午夜福利乱码中文字幕| 午夜日韩欧美国产| 亚洲五月婷婷丁香| 精品人妻1区二区| 国产精品一区二区免费欧美| 高清黄色对白视频在线免费看| 天天躁夜夜躁狠狠躁躁| 国产精品一区二区在线不卡| 天堂中文最新版在线下载| 老熟妇仑乱视频hdxx| 黄色丝袜av网址大全| 日韩欧美免费精品| 午夜视频精品福利| 伦理电影免费视频| 性色av乱码一区二区三区2| 纯流量卡能插随身wifi吗| 欧美国产精品一级二级三级| 99国产综合亚洲精品| 亚洲精品在线美女| 国产精品免费大片| 天天添夜夜摸| 丝袜在线中文字幕| www.熟女人妻精品国产| 午夜亚洲福利在线播放| 久久久久久久国产电影| 国产aⅴ精品一区二区三区波| 亚洲七黄色美女视频| 黑人巨大精品欧美一区二区蜜桃| 9色porny在线观看| 亚洲黑人精品在线| 国产精品影院久久| 高潮久久久久久久久久久不卡| 国产成人精品久久二区二区91| 999久久久精品免费观看国产| 777米奇影视久久| 亚洲精品美女久久久久99蜜臀| 九色亚洲精品在线播放| 国产精品亚洲av一区麻豆| 日本黄色日本黄色录像| 午夜激情av网站| 国产精品亚洲av一区麻豆| 亚洲中文av在线| 在线观看www视频免费| 欧洲精品卡2卡3卡4卡5卡区| 91av网站免费观看|