• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Text Image Watermarking Algorithm Based on Image Enhancement

    2023-12-12 15:51:24BaoweiWangLuyaoShenJunhaoZhangZenghuiXuandNengWang
    Computers Materials&Continua 2023年10期

    Baowei Wang,Luyao Shen,Junhao Zhang,Zenghui Xu and Neng Wang

    1School of Computer,Nanjing University of Information Science and Technology,Collaborative Innovation Center of Jiangsu Atmospheric Environment and Equipment Technology,Digital Forensics Engineering Research Center of Digital Forensics Ministry of Education,Nanjing,210044,China

    2School of Software,Nanjing University of Information Science and Technology,Nanjing,210044,China

    ABSTRACT Digital watermarking technology is adequate for copyright protection and content authentication.There needs to be more research on the watermarking algorithm after printing and scanning.Aiming at the problem that existing anti-print scanning text image watermarking algorithms cannot take into account the invisibility and robustness of the watermark,an anti-print scanning watermarking algorithm suitable for text images is proposed.This algorithm first performs a series of image enhancement preprocessing operations on the printed scanned image to eliminate the interference of incorrect bit information on watermark embedding and then uses a combination of Discrete Wavelet Transform (DWT)-Singular Value Decomposition (SVD) to embed the watermark.Experiments show that the average Normalized Correlation(NC)of the watermark extracted by this algorithm against attacks such as Joint Photographic Experts Group(JPEG)compression,JPEG2000 compression,and print scanning is above 0.93.Especially,the average NC of the watermark extracted after print scanning attacks is greater than 0.964,and the average Bit Error Ratio(BER)is 5.15%.This indicates that this algorithm has strong resistance to various attacks and print scanning attacks and can better take into account the invisibility of the watermark.

    KEYWORDS Print-resistant scanning;image enhancement;DWT;SVD;embedding intensity

    1 Introduction

    Digital watermarking technology directly embeds copyright information into the data,achieving the invisibility and security of the data,thus completing the goal of protecting copyright.Digital watermarking technology can be divided into two categories:spatial domain and frequency domain.Spatial domain watermarking is a modification based on pixel position.Watermarking technology based on frequency domain embeds watermark information into corresponding the frequency coefficients through frequency domain transformation [1].This technology has better concealment and robustness.With the development of e-commerce,the dissemination and development of text images are becoming faster and faster.

    Printing and scanning are important ways to disseminate text images[2]and are common ways to leak and misappropriate text image information.Text image watermarking technology hides copyright information in text images.It provides an effective solution for text image copyright authentication[3] by extracting the watermark to verify the copyright when there is a copyright conflict.Digital watermarking text images resistant to printing and scanning [4] effectively solves text information security.The watermarking system should meet the requirements of both invisibility and robustness.Still,these two are contradictory and required to withstand printing and scanning operations [5],significantly challenging text image watermarking algorithms [6].Images will encounter various attacks during the printing and scanning,and the pixel information of images will be lost to different degrees.The general digital watermarking algorithm is difficult to resist the print-scan attack well.It cannot guarantee that the watermark can be extracted successfully after the print scan.Therefore,designing a text image watermarking algorithm that can better resist print scanning attacks is necessary to achieve secure and reliable copyright protection for text images.

    Researchers have proposed various text image watermarking methods.However,the robustness of the watermark against print scanning attacks still needs to be improved,which hinders the application of text image watermarking against print scanning attacks in practical scenarios.Text images have a single pixel value and few redundant data,making embedding watermarks in text images more difficult than in other carriers.The complexity of the print scanning process,which includes multiple attacks,poses a significant challenge to watermarking research against print scanning attacks.By studying existing text image watermarking techniques that resist print scanning attacks and aiming at the problems existing in existing processes,this paper proposes a new text image watermarking algorithm that improves the robustness of the watermark against print scanning attacks while ensuring that the watermark is visually invisible,enhancing the practical value of the technology.

    In recent years,deep learning has developed very rapidly.Some researchers use the powerful feature processing and inductive bias capabilities of deep understanding to perform classification tasks[7,8].Subsequently,deep learning was incorporated into watermarks,using neural networks instead of manual methods to embed secret information [9,10].Keskinarkaus et al.[11] introduced a noise layer to achieve robustness in watermark images and used attack simulation for adversarial training,achieving good robustness and imperceptibility.Jia et al.[10]proposed a method of mixing simulated JPEG and real JPEG into the noise layer to attack JPEG noise so that the encoded image can achieve high robustness to JPEG compression.The current deep learning-based methods are adaptable and can train different specific codecs based on input noise.However,the learning-based watermarking method is not highly targeted and cannot provide high-precision feedback on certain types of noise.Therefore,manual algorithm design is more advantageous for anti-print scanning noise.

    In this paper,we propose an image enhancement and DWT-SVD-based anti-print-scan watermarking algorithm,which has good anti-print-scan properties,invisibility,and robustness.The algorithm in this paper mainly solves the problem that existing algorithms cannot guarantee the invisibility of watermarks based on anti-print-scan.The innovative work in this paper is as follows.

    1.For text images,firstly,pre-processing operations are performed for image segmentation,binarization,removal of some independent noise generated during printing and scanning,etc.The threshold segmentation operation and binarization operation reduce the computation of the subsequent pre-processing process,the removal of independent noise and interference line operation reduce the interference to the experiment by eliminating some invalid bit information,and enhance the visual effect of the watermark embedding to find The watermark embedding procedure minimizes the interference of the investigation by removing some weak bits of information.

    2.The singular values of the watermark image and the original image are algebraically and arithmetically for the watermark embedding part.The embedding is performed with different embedding strengths for additional text images to have better embedding effects.

    This article is divided into five sections in total,and the summary content of each section is as follows:

    Section 1: This section discusses the background and significance of anti-print scanning text image watermarking research,summarizes the current research status and problems of text image watermarking technology,and proposes targeted solutions to these problems.

    Section 2: Introduce the development status of transform domain text image watermarking algorithms at home and abroad.

    Section 3: Introduce the specific steps of image enhancement processing and the watermark embedding and extraction scheme.

    Section 4:Introduce evaluation indicators and conduct some common attack tests.

    Section 5:Summary and Outlook.Summarize the full text of the work,pointing out the highlights and shortcomings of the research work and subsequent improvement plans.

    2 Related Works

    This paper is about the transform domain anti-print-scan watermarking algorithm.The development status of the anti-print-scan watermarking algorithm is as follows.

    Keskinarkaus et al.[11]proposed a blind method to embed multibit watermarks in images,robust to various geometry attacks and print-scan processes.A message sequence was mapped to a directional angle of a periodic pattern,which was then embedded into image blocks.But the watermark capacity was low,and the embedding strength needed to be continuously adjusted.Huang et al.[12]proposed a high-capacity text image watermarking technique against printing and scanning processes.Firstly,this method was based on the print-scan invariant.The Fourier descriptor flipped the trivial pixel points with high-frequency information on the character boundary.Next,a quadratic quantization function was proposed to embed watermark information of multiple bits for a single character.Finally,the Quick Response (QR) code,which had a significant information capacity,robust error correction ability,and high decoding reliability,was researched.By using the QR code as the watermark information,we can reduce the impact of the bit error rate during watermark extraction,and the robustness of the watermark information can be improved.But the Peak Signal to Noise Ratio(PSNR)was at most 30.Han et al.[13] proposed a digital watermarking algorithm that combines discrete wavelet transform and singular value decomposition.First,the low-frequency subgraphs of DWT were decomposed into SVDs,and then the watermark sequence was embedded into distinct values.Experiments showed that the algorithm was robust to printing scanning,could determine whether there was a second copy,and could meet the requirements of printing anti-counterfeiting.However,the watermark embedding strength of this method was meagre,which was 0.1 and 0.2.Tan et al.[6]proposed a new text image watermarking scheme based on contour features for printing and scanning processes.It adopted a mathematical multiplication transformation model to approximate geometric invariant features that could withstand various attacks during the printing scanning process,thus serving as reference points for watermark embedding and extraction.The experimental results showed that this method is more comprehensive than specific languages and had better robustness,watermark transparency,and hiding ability than existing methods.But the computational workload was large,and there was a significant computational cost.Wang et al.[14]proposed an algorithm based on the principle of colour space transformation.Firstly,the Neugebauer model separated the spot colour channels from the original image.Then the Integer Wavelet Transform (IWT) algorithm was used to transform the spot colour channels of the picture.The watermark was embedded in the singular values of the first level IWT decomposition subband.Using the Arnold algorithm and encryption technology to enhance the algorithm’s security,a series of experiments showed that the algorithm could effectively resist spot colour distortion attacks during the printing and scanning process and had good imperceptibility.However,the robustness of the algorithm needed to be improved,and it cannot balance imperceptibility and robustness well.Cu et al.[15]proposed a watermarking algorithm based on fully convolutional networks for handwritten documents.This algorithm first preprocessed handwritten documents by replacing the average value of document content with a high-intensity grayscale value.Then,the document was converted into a standard form to minimize geometric distortion.Next,the complete convolutional network (FCN) was used to detect the document watermark used to hide secret information.The FCN method used for document layout segmentation was adjusted to solve the problem of watermark area detection.Finally,the data-hiding process was performed by dividing the grey value of each connected object within the watermark area into two groups,To carry a watermark bit.This algorithm had been tested on various handwritten documents.It achieved high performance in imperceptibility and robustness to distortion caused by JPEG compression,geometric transformations,and printing and scanning processes.But this algorithm required many datasets to train the model and cannot resist complex attacks.Zhao et al.[16]proposed an elastic watermarking algorithm that combined stable local feature regions and DWT-SVD.The algorithm was mainly divided into two parts.The first part was constructing local feature regions,and the second was embedding watermark information repeatedly.The experimental results showed that the algorithm had achieved good results in resisting conventional attacks,printing,and scanning.Still,the watermark extracted by the algorithm had poor imperceptibility,and there was much noise and distortion.Ahmad et al.[17] proposed an algorithm for printed images based on perceptual image hashing,Wave Atomic Transform (WAT),and watermarking technology.The authenticity and copyright of printed images should be verified through image hashing and digital watermarking techniques,which were resilient to distortion during the printing and scanning process.This algorithm cannot balance robustness and differentiation strength well,and it was computationally cumbersome and had a significant time cost.

    Wang et al.[18]proposed a fusion font-based anti-printing and scanning watermarking algorithm,mainly using a Generative Adversarial Network(GAN)to fuse multiple fonts to encode and replace the original fonts in the file to achieve the embedding of watermark information.In addition to resisting printing and scanning attacks,the watermark had a good capacity but could not balance robustness with invisibility of the watermark.Mu et al.[19] proposed an algorithm to determine the digital watermark embedding environment,using Discrete Cosine Transform (DCT) and SVD algorithms to embed the extracted image several times in different settings to determine the best embedding environment.The test results have a peak signal-to-noise ratio greater than 30 and a normalization factor greater than 0.8.Chen et al.[20] proposed an algorithm to embed a blind watermark into a print image that can be detected by a neural network,to achieve an anti-counterfeit watermark.Compared with other common watermarking,the algorithm had a good watermark display effect compared with other standard watermarking methods,but the algorithm’s robustness needed to be improved.

    As can be seen from the above literature,the existing anti-print scanning watermarking algorithms can resist specific print scanning attacks.Still,they cannot consider the invisibility and anti-attack capabilities of the watermark.Moreover,some algorithms,such as the zero-watermark algorithm and the algorithm based on print scanning invariant,have a large amount of computation,high computational cost,a long training time of the algorithm model based on neural networks,poor timeliness,etc.So how to enhance the invisibility of watermarks while resisting print scanning attacks,further enhance watermark capacity,reduce computational costs,and improve timeliness has become an urgent problem to be solved.

    3 Proposed Methods

    The spatial domain watermarking algorithm modifies the image’s pixel value while embedding the watermark,quickly leading to image distortion and low robustness.Text images subjected to various attacks cause pixel values to change while the watermark changes.Therefore,this paper adopts a transform domain watermarking algorithm.The LL component after DWT transformation has good robustness,and the SVD algorithm[21]has structural stability and rotational invariance,making the algorithm better resistant to print scanning attacks while improving the invisibility of the watermark.

    An image is a matrix(colour images are multiple matrices),with the number of rows and columns of the matrix representing the image size and the matrix elements representing the image pixel values.The image is transformed through DWT to obtain approximate and detailed matters of the original information.The image is decomposed into four parts: high-frequency subband HH1,intermediate subband LH1,intermediate subband HL1,and low-frequency subband LL1.The decomposed high frequency subbands represent the image’s details,edges,and texture features,and the human eye is not sensitive to this part.Embedding watermarks in this part can achieve sound-hiding effects,but highfrequency components are challenging to resist noise and image processing pollution and need to be more robust.Therefore,most of the feature information contained in the image is concentrated in the low frequency subband.Embedding a watermark in this section can resist the most common image noise interference and has good robustness.The DWT transformation diagram is shown in Fig.1.

    Figure 1:The DWT transformation diagram

    Image quality in the printing and scanning process affects more factors,not only involves the printer scanner machine performance and parameters.At the same time,some human operations will also have a more significant impact on image quality.The printing and scanning process,including the image from continuous tone to halftone conversion process,also includes a series of non-digital transformation processes.The printing and scanning may lead to severe image distortion,and the watermark information can also cause damage.Although the image scanned by printing is visually similar to the original,its internal image quality and pixel values are severely damaged.The anti-printscan digital watermark must further improve the robustness and stability of the print-scan process.By analyzing the transformation of the image before and after it is subjected to print scanning,the most suitable location for embedding the watermark is found to prevent severe damage to the watermark information[22].

    Singular Value Decomposition (SVD) [21],a tool of linear algebra,is used to decompose orthogonal matrices.Assuming the matrixAis am×nreal number matrix,the formula for singular value decomposition of matrix A is shown by Eqs.(1)and(2).

    whereUism×morthogonal matrix,VTisn×northogonal matrix,T represents matrix transposition,D=diag(σ1,σ2,...,σn)is a diagonal matrix of a non negative real number,satisfiesσ1≥σ2≥...≥σn,and the value at the position of diagonal D is the singular value of matrixA.

    SVD has been widely used in signal processing.From the perspective of image processing,on the one hand,the singular value matrix of the image has good stability.When little interference is applied to the image,the unique values generally do not change significantly;On the other hand,the singular value matrix represents the image’s intrinsic characteristics.The image’s visual effect does not change significantly when the distinct value changes.Therefore,embedding watermark information in the singular values of images can achieve strong robustness and solve the problem of wavelet transform being difficult to resist geometric attacks.Combining the two can meet the requirements of invisibility and improve the watermark’s robustness.

    The image will be converted from a digital signal to an analogue signal in printing.In the conversion process,the loss of vision is inevitable;on the other hand,because the image is printed on paper,and the paper is through the ink dot to present the image information,the size of the ink dot can be used to replace the image of the hierarchy.Halftone images can cause drastic changes in the local details of the image,which is mainly reflected in the high-frequency information,and the change in the thickness of the ink dots will blur the performance of the complex areas of the texture,thus affecting the image’s visual quality and pixel values.Therefore,this article utilizes a series of image enhancement processing to eliminate the impact of print scanning on copyright verification of text images as much as possible.The specific implementation scheme is as follows.

    3.1 Image Enhancement Processing

    This paper carries out a series of preprocessing operations on the image,such as threshold segmentation,binary processing,removing independent noise points,and removing edge interference lines.The specific process is as follows:

    (1) Threshold segmentation: find an appropriate grey level by calculating variance to divide the image’s foreground and background image.Because variance is a measure of the uniformity of grey distribution,the more significant the between-class variance between the background and foreground,the more influential the difference between the two parts of the image.In the images used in the experiment,the text and background occupy different grey levels,and a small number of images are disturbed by external light.Then we use variance calculation to obtain a dynamic threshold for segmentation.However,threshold segmentation can compress a large amount of data and put it first in the preprocessing process.After threshold segmentation,the amount of calculation can be reduced for the subsequent preprocessing process.

    (2)Binarization can convert grey ideas into binary images.Set the grey pixel level more significant than a particular critical grey value as the maximum grey level and set the grey pixel level less than this value as the minimum grey level to realize binarization.Binarization converts the grey image into a binary image,simplifies the image data,reduces the amount of data,and further reduces the computational complexity of the picture.

    (3)Remove independent noise:Removing some independent noise generated during printing and scanning determines whether more than 2 pixels are white at a pixel’s top,bottom,left and right positions.If so,set its pixel value to 0.

    (4) Remove edge interference lines: Some interference lines will be removed after printing and scanning the text image’s edge.The images used were analyzed before the experiment.Most examples show that there are still many invalid pixel points in the space of the image in general.Therefore,we add the noise reduction operation in the preprocessing process,judge whether the centre pixel point is an invalid pixel point through the edge pixel,and then eliminate the invalid bit information in the image to reduce the interference to the experiment.At the same time,it improves the visual effect after watermark embedding.

    The whole flow chart of pretreatment is shown in Fig.2.

    The enhanced text image after text image preprocessing is shown in Figs.3 to 6.

    Figure 3:Print scanned announcements

    Figure 4:Preprocessed announcement

    Figure 5:Print scanned electronic invoice

    Figure 6:Preprocessed electronic invoice

    3.2 Watermark Embedding Process

    The watermark embedding process is shown in Fig.7,and the specific description is as follows:

    Step 1: Grayscale the text image,or select one of the R,G,and B channels as the original text image S.

    Step 2: Grayscale the watermark image W,and the watermark image is resized to obtain a preprocessed watermark image W1.After reshaping,the watermark image W1 is 1/16 of the size of the original text image S(equal to the size of the LL subband after two DWT transformations).

    Step 3:Perform the first-order DWT transformation on the original text image to obtain the LL1 component,and then perform the second-order DWT transformation on the LL1 element to get the LL2 detail.

    Step 4:The singular value Sw of the watermark image is obtained by SVD transformation of the LL2 component of the original text image[23].The transformed U and V matrices are saved to restore the extracted watermark’s image.

    Step 5:Set the embedding strength to A.The singular value Sy obtained from the singular value decomposition of the reconstructed watermark image W1 is saved for verification during extraction.The algebraic sum operation is performed with the particular value Sw of the watermark image,according to the mean by Eq.(3).

    Step 6:Get changedLL2′.Two inverse DWT transformations obtain the text image containing the watermark.

    Figure 7:Watermark embedding flow chart

    3.3 Watermark Extraction

    The watermark extraction process is shown in Fig.8,and the specific description is as follows:

    Step 1:DWT transform the text image containing watermark twice[24]to obtain the componentLL2′.

    Step 2:SVD transformation ofLL2′component to obtain singular value Sy_wmv,combined with the Sy obtained during the embedding process,the extraction process of the component S is shown by Eq.(4).

    Step 3:After obtaining the S component of the watermark,combine the U and V components of the watermark image saved during the embedding process to multiply the singular matrix byU·S·V.The watermark image w is obtained.

    Figure 8:Watermark extraction flow chart

    4 Experimental Analyses

    Watermarking algorithms are usually measured in terms of invisibility and robustness,which are mutually constrained.A good watermarking algorithm should balance robustness and invisibility and improve watermark robustness while ensuring watermark invisibility.

    4.1 Introduction to Experimental Environment

    With multimedia development,documents that use electronic forms as information carriers have become mainstream,such as invoice vouchers,important announcements from government agencies,and papers with personal copyright.Most of them are printed,published,or disseminated in electronic form.However,existing technologies are prone to copying and forging such important image files through scanning,and if the tampered information is spread,it will cause incalculable losses.Therefore,embedding watermarks in these essential files can effectively protect the copyright of the files and prevent them from being maliciously modified by attackers.When electronic files containing watermarks are printed,even if scanned and altered by an attacker,the watermark information can be fully extracted during verification,protecting copyright content such as invoices,announcements,and papers.

    In this paper,simulation experiments are done on the Matlab platform.The original images used in this experiment are not only standard grayscale images and colour images but also some screenshots of electronic invoices and screenshots of the thesis.The watermarked images are 64×64 and 128×128,256×256 grayscale images,and the original images and watermarked images used in this experiment are shown in Figs.9 and 10.

    Figure 9:Original images used in the experiment((a)Lena;(b)Paper screenshot;(c)Announcement with handwritten signature;(d) Screenshot of electronic invoice;(e) Screenshot of announcement;(f)Lake)

    Figure 10:Watermark image used in the experiment((a)cman;(b)fingerprint;(c)loco)

    Figs.9a,9e are color images,9b,9c,9e,9f are grayscale images,9c has handwritten content,and 9d is an electronic invoice with a seal.

    Figs.10a–10c are the cman diagrams,fingerprint diagram and loco diagram in the standard grayscale image.

    4.2 Algorithm Performance Test

    The performance test mainly includes the watermark extraction effect test for printing and scanning.This paper adopts the Peak Signal-to-Noise Ratio (PSNR) [25],Structural Similarity(SSIM),and Normalized Correlation coefficient(NC)[25]as the experimental result metric criteria.The invisibility of the watermark is proportional to the quality of the image,and the higher the quality of the image,the stronger the invisibility of the watermark.The quality of the recovered image determines the recovery quality of the fragile watermarking scheme with recovery capability.If the recovered image quality is good,the recovery capability of the delicate watermarking scheme is good.Image quality metrics are generally measured by the peak signal-to-noise ratio(PSNR),normalized correlation coefficient(NC)[26],and structural similarity(SSIM).The three metrics peak signal-tonoise ratio、structural similarity and NC are described below.

    Assume the original image size is M×N.Then PSNR can be defined as Eq.(5).

    where,MIis the maximum pixel value of the image,which is generally 255,andI1andI2are the two images to be compared.

    SSIM is a measure of the similarity between two images.SSIM can be defined by Eq.(6).

    Among them,μ1andμ2are the average ofI1andI2,andare the variances ofI1andI2,σ12are the covariance ofI1andI2,andC1andC2are the variables of stable division with weak denominator.The value range of SSIM is-1~1,and 1 is the best.

    NC is a measure of the similarity between two signals.NC can be defined by Eq.(7).

    where,IijandI′ijare the values of the position(ij)of the image.M and N are the dimensions of the image.

    Robustness refers to the ability to extract relatively complete watermark information from an embedded image after various attacks.

    Generally,Bit Error Ratio (BER) [27] is used to evaluate the robustness of the watermark.The ability of the watermark algorithm to resist various attacks is judged by calculating the proportion of error bits in the extracted watermark.BER is inversely proportional to the robustness of the watermark,and its calculation formula is shown in Eq.(8).

    4.2.1 Watermark Embedding and Extraction Effect Test Without Attack

    The algorithm experiment without any attack and processing is carried out in this paper to verify the visual invisibility of the algorithm.The original image is shown in Fig.11.The experiment results in the watermark image and the extracted watermark image,as shown in Figs.12 and 13.

    Figure 11:Original images

    Figure 12:Watermaked image

    Figure 13:Extracted image

    The embedding strength A of the watermark in the experiment is 0.75,and the level of embedding strength will affect human eye vision and the calculation of image feature values[28].From the effect of the image with the watermark in Fig.12.

    As shown in Table 1,the average PSNR of the embedded watermarked image is 47.9285 dB,and the lowest PSNR is 47.2572 dB with high image invisibility.The average NC of the extracted watermark is 0.9815,and the lowest NC is 0.9716 with high accuracy.

    Table 1:Test result of different images embedded watermark

    4.2.2 Watermark Embedding Effect Test under Different Embedding Intensities

    The watermark embedding strength selected in this experiment is 0.1,0.5 and 0.75,respectively,and the embedding effect is shown in Fig.14.

    The image quality under different embedding intensities in Fig.13 is reflected by the PSNR,as shown in Table 2.

    Table 2:PSNR of image under different embedding intensity

    Generally speaking,if the PSNR of the watermarked image is greater than 36 dB,the visual system of human eyes cannot distinguish the traces of the watermark.As shown in Table 2,the PSNR of the watermarked image is greater than 36 dB for all embedding intensities in the table,indicating that the watermark’s invisibility is better.It can be seen from Table 2 that for the handwritten signature,the image quality is highest when the embedding intensity is 0.5,and for other experimental images,the quality is highest when the embedding intensity is 0.1.The algorithm can flexibly adjust the embedding intensity for different images to achieve the best embedding effect.

    Figure 14:((a)–(c)Announcement screenshot;(d)–(f)Paper screenshot;(g)–(i)Lake;(j)–(l)Handwritten signature)

    4.2.3 Anti-Print Scanning Test

    For the embedded image,the watermark quality extracted after printing and scanning is reflected by the NC.The watermark is extracted from the embedded image in Fig.14,and its NC is calculated as shown in Table 3.

    As shown in Table 3,the average NC of the watermark extracted after the printing and scanning attack is 0.9669,and the watermark algorithm has high invisibility.The minimum NC is 0.9495,and the size of the NC is proportional to the embedding strength.The NC change diagram of watermark extraction after printing and scanning is shown in Fig.15.

    Figure 15:NC change diagram for watermark extraction after printing and scanning

    4.2.4 Anti-Attack Test

    Digital information will be subject to various attacks during transmission,and the embedded watermark information will be damaged to a certain extent after being attacked [29].The following attack experiments are conducted on the image with a watermark.The attack types include speckle noise,Joint Photographic Experts Group JPEG compression,sharpening attack,salt and pepper noise,and JPEG2000 compression.The embedded strength in the test is 0.75.

    Speckle Noise

    Speckle noise is a significant feature of the Synthetic Aperture Radar(SAR)imaging system.It originates from the random scattering in the basic resolution unit.It is shown as small spots related to the image’s signal,which reduces the image quality and seriously affects image segmentation,classification,and target detection information extraction.As shown in Fig.16,the watermark image and watermark extraction result are after the speckle noise attack.

    The watermarked image after being attacked by speckle noise is shown in Fig.16a,with PSNR of 35.4092 and SSIM of 0.87631;The NC of the watermark extracted after the speckle noise attack is 0.99371.

    JPEG Compression

    JPEG is lossy compression,this process for images containing watermarks will lose a lot of important information,and there will be some impact on the extraction of watermarks.Still,this lost part is part of human vision is not easily perceived[30,31].It takes full advantage of the human eye not being sensitive to the high-frequency information part of the computer colour to save significantly the data that needs processing[32–35].Fig.17 shows the JPEG compression attack after containing the watermarked image and the watermark extraction results.

    The watermarked image after the JPEG compression attack is shown in Fig.17a,with PSNR of 35.5959 and SSIM of 0.91854;The watermark NC extracted after the JPEG compression attack is 0.99437.

    Salt and Pepper Noise

    Pepper noise,also known as impulse noise,is a type of noise often seen in images.It is a random appearance of white or black dots,either as black pixels in bright areas or white pixels in dark places(or both).Pepper noise can be caused by sudden and intense interference with the image signal,analogous digital converters,or bit transfer errors.As shown in Fig.18,the watermark-containing image and watermark extraction results after the pretzel noise attack are shown.

    The watermarked image after being attacked by salt and pepper noise is shown in Fig.18a,with PSNR of 35.0048 and SSIM of 0.97112;The NC of the watermark extracted after salt and pepper noise attack is 0.99539.

    Figure 17:Watermarked image and watermark extraction result after JPEG compression attack

    Figure 18: Watermarked image and watermark extraction results after salt and pepper noise attack((a) Watermarked image after salt and pepper noise attack; (b) Watermarks extracted after salt and pepper noise attack)

    JPEG2000 Compression

    JPEG2000 is an image compression standard based on wavelet transform.It is often considered the next-generation image compression standard to replace JPEG(based on discrete cosine transform)in the future.JPEG2000 has a higher compression ratio and does not produce the blocky blurring imperfections created by the original JPEG standard based on discrete cosine transform.JPEG2000 supports both lossy and lossless compression.Fig.19 shows the result of the JPEG compression attack with watermarked images and watermark extraction.

    Figure 19:Watermarked image and watermark extraction results after JPEG2000 compression attack((a)Watermarked image after JPEG2000 attack;(b)Watermarks extracted after JPEG2000 attacks)

    The watermarked image after being attacked by JPEG2000 noise is shown in Fig.19a,with a PSNR of 37.9741 and SSIM of 0.93591;The NC of the watermark extracted after the JPEG2000 noise attack is 0.99598.

    From the above four attack tests,it can be seen that the average PSNR of the watermark image after the attack is 35.996,and the average SSIM is 0.92547;The average NC of the extracted watermark image is 0.9948.The experimental results show that the algorithm has good robustness under different attacks and has the most vital ability to resist JPEG2000 compression attacks.

    NC of Image Embedded with Different Size Watermarks under Various Attacks

    In this experiment,the screenshot of the paper is selected as the original image,and the embedding strength is 0.75.The watermark images of different sizes are embedded,and the dimensions are respectively 64×64,128×128 and 256×256.And we perform various attack tests on the original image containing the watermark image,such as JPEG compression,JPEG2000 compression,Gaussian lowpass filtering,and median filtering attacks.Calculate the NC of the watermark extracted after the attack,as shown in Fig.20.

    Figure 20:Extract the NC result of the watermark image after being attacked((a)JPEG compression attack;(b)JPEG2000 compression;(c)Gaussian low-pass filtering attack;(d)Median filter attack)

    Generally speaking,if the PSNR of the watermarked image is greater than 36 dB,the visual system of human eyes cannot distinguish the traces of the watermark.As shown in Table 2,the PSNR of the watermarked image is greater than 36 dB for all embedding intensities in the table,indicating that the watermark’s invisibility is better.It can be seen from Table 2 that for the handwritten signature,the image quality is highest when the embedding intensity is 0.5,and for other experimental images,the quality is highest when the embedding intensity is 0.1.The algorithm can flexibly adjust the embedding intensity for different images to achieve the best embedding effect.

    Comparative Analysis

    The article [20] is to find a way to embed a blind watermark into images for printing which is against print-and-scan but can be detected by the neural network to realize a kind of anti-counterfeit watermark.During the screening,two different types of dithering were used to fuse each pixel of the binary watermark with the host images into halftone ones.Based on the set of sample pairs of the printed-and-scanned image with the watermark and the watermark data,a back propagation (BP)neural network was trained to embed watermark information.Our proposed method showed the best watermark display effect compared to standard watermarking techniques,such as pixel embedding and local gird-adding.It offers a print-and-scan (PS) resilient watermarking scheme based on the mean of DCT coefficients (MDC) for a fixed AC frequency of image in the article [31] and a zerowatermarking algorithm based on visual cryptography and matrix norm in the paper [32].Conduct Gaussian noise attack,salt,pepper noise attack,JPEG attack,and print scan attack on these four algorithms,respectively.The original image is 512×512 Lena images,and the watermark images in articles [20,31,35] are 32×32 sizes.The watermark image in this paper is 128×128.The embedded intensity of 256 images is 0.75.The comparative data of these algorithms are shown in Table 4.

    Table 4:Data comparison between this algorithm and other algorithms

    In Table 4,the anti-Gaussian noise is represented by the PSNR of the image before and after the attack,and the anti-salt and pepper noise,anti-JPEG attack,and anti-print scanning attack are described by the NC of the extracted watermark.It can be seen from Table 4 that the algorithm in this paper has good resistance to Gaussian noise,salt and pepper noise,JPEG attack,and print scan attack,and the watermark image size of [11,31] algorithm was 32×32,the watermark image size of this algorithm was 128×128,which improved the embedding capacity of the watermark while ensuring the strong robustness and anti-attack ability of the algorithm,and solved the problem that the existing anti-print scanning watermarking algorithm cannot take into account the robustness and high watermark embedding capacity.For the algorithm [20],the watermark image size was 64×64,the algorithm used a neural network and deep learning tools to improve the detection ability of the watermark,but the embedded watermark was 64×64.This algorithm can better balance the contradiction between robustness and watermark embedding capacity.The more significant the amount of embedded information,the more traceable information can be embedded.At the same time,improving watermark capacity also improved the algorithm’s robustness.In reference[35],it used a QR code to hide critical information into a credential,then embed it into the credential photo and combined the wavelet transform and matrix norm to extract the image characteristics and configure invariance of the print-scanning.Next,it combined visual cryptography and digital watermark.And it used one share of the visual cryptography to be saved as a zero-watermark.This algorithm strongly resisted print scanning attacks,but this generated zero watermarks to protect copyright,increasing the cost of preserving watermarked images.

    In literature [18],the algorithm proposed by Wang et al.takes an average of 14 s to embed watermark information,while the algorithm only toke less than 1 s to embed the watermark.The watermark embedding and extraction efficiency were high,and the time cost was saved.Moreover,preparing the watermarking algorithm based on deep learning was relatively complex and timeconsuming.For example,in literature [18],a certain number of new fonts need to be generated and deleted,and font classifiers need to be trained.Moreover,the accuracy of the classifier cannot reach 100%,and the watermark information will fail to be embedded.

    The BER of the watermark extracted after various attacks are calculated to verify the algorithm’s robustness.Robustness verification attacks can be divided into other common attacks and print scanning attacks.The BER experimental values of watermark images extracted under six different attacks by the algorithm in this chapter are shown in Table 5.The robustness comparison of the six attacks is shown in Fig.20.

    As can be seen from Table 5,the mean BER of the algorithm in this chapter is 5.15%,while the mean BER of the literature [11,20,31] are 11.72%,7.32%,and 6.82%,respectively.The BER mean value of the algorithm in this chapter has decreased by 56.1%,29.6%,and 24.5%,respectively,based on the literature[11,20,31],indicating that the algorithm in this chapter has better resistance to the six attacks as a whole,and its robustness has been dramatically improved.

    Performance Comparison

    From Table 6,it can be seen that the performance of this article is similar to that of reference 38 when subjected to median filtering noise.However,the performance of other attacks,such as Gaussian noise attacks,JPEG attacks,and print scan attacks,is significantly higher than that of the algorithm in reference 38 in extracting watermarks.It can be seen that the performance of deep learning methods is far inferior to our method after targeted training,and the training time of deep learning methods is longer and the computational cost is higher.The watermark capacity of deep learning methods is mostly 64×1.The capacity of our method is much greater than that of deep learning methods.Even in unfair comparisons,our method is superior.

    Table 6:Comparison of extraction accuracy with reference[37]

    5 Conclusion and Future Work

    This paper combines image enhancement to embed a watermark in the transform domain and combines the DWT algorithm with the SVD algorithm to propose a digital watermarking algorithm suitable for text images to resist print scanning.This algorithm embeds a watermark by combining DWT-SVD so that the image with the watermark can still be extracted completely after printing and scanning and has good watermark capacity.The algorithm in this paper embeds watermarks of different sizes.The results show that the algorithm has good imperceptibility while embedding watermark information with a large capacity.For attacks such as JPEG compression,JPEG2000 compression,Gaussian low-pass filtering,median filtering,and print scanning,the average NC of the watermark extracted by the algorithm in this paper is above 0.93,which shows that the algorithm has high robustness and anti-attack ability and improves the capacity of watermark embedding under the premise of ensuring robustness and invisibility.The next step is to further improve the NC of the watermark image and make the algorithm effectively process all kinds of data except the image.

    Acknowledgement:The author of this article is very grateful for the help of the following experts and people: Weishen Wang for his supplementary comments on the paper,and Guoqing Xu for his valuable comments on the structure and logic of the paper.

    Funding Statement:This work was sponsored by the National Natural Science Foundation of China under Grants 61972207,U1836208,U1836110,61672290,and the Project was through the Priority Academic Program Development(PAPD)of Jiangsu Higher Education Institution.

    Author Contributions:The authors confirm contribution to the paper as follows: study conception and design: Baowei Wang,Luyao Shen;data collection: Luyao Shen,Junhao Zhang;analysis and interpretation of results:Luyao Shen,Zenghui Xu;draft manuscript preparation:Luyao Shen,Neng Wang.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:If readers need data,they can contact my email:1139901607@qq.com.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    久久久久视频综合| 亚洲精品成人av观看孕妇| 国产一区二区三区在线臀色熟女 | a级毛片在线看网站| 亚洲av成人一区二区三| 宅男免费午夜| 亚洲综合色网址| av中文乱码字幕在线| 久99久视频精品免费| 国产精品久久久久久精品古装| av超薄肉色丝袜交足视频| 欧美精品啪啪一区二区三区| 露出奶头的视频| 精品久久久久久久久久免费视频 | 成人18禁高潮啪啪吃奶动态图| 一a级毛片在线观看| 精品午夜福利视频在线观看一区| 亚洲美女黄片视频| 99久久精品国产亚洲精品| 欧美成狂野欧美在线观看| 一夜夜www| 国产精品香港三级国产av潘金莲| 久久精品亚洲精品国产色婷小说| 高清av免费在线| 免费人成视频x8x8入口观看| 97人妻天天添夜夜摸| 一级,二级,三级黄色视频| 侵犯人妻中文字幕一二三四区| 色精品久久人妻99蜜桃| 又紧又爽又黄一区二区| 亚洲精品自拍成人| 欧美成人午夜精品| 国产精品国产高清国产av | 久久精品国产综合久久久| 成人国语在线视频| 亚洲一码二码三码区别大吗| 正在播放国产对白刺激| 自线自在国产av| 国产97色在线日韩免费| 欧美精品高潮呻吟av久久| 中文字幕人妻熟女乱码| 亚洲精品在线观看二区| 精品久久蜜臀av无| av欧美777| 久久ye,这里只有精品| 在线免费观看的www视频| 最新美女视频免费是黄的| 天堂√8在线中文| 免费一级毛片在线播放高清视频 | 精品一区二区三区四区五区乱码| 亚洲av成人不卡在线观看播放网| 美女 人体艺术 gogo| 亚洲少妇的诱惑av| 中文字幕色久视频| 久久精品熟女亚洲av麻豆精品| svipshipincom国产片| 亚洲久久久国产精品| 真人做人爱边吃奶动态| 丝袜美腿诱惑在线| 欧美激情久久久久久爽电影 | 正在播放国产对白刺激| 欧美日本中文国产一区发布| 亚洲中文日韩欧美视频| 国产亚洲精品久久久久5区| 曰老女人黄片| 欧美日韩成人在线一区二区| 男人舔女人的私密视频| 狂野欧美激情性xxxx| 国产主播在线观看一区二区| 久久久久久久久免费视频了| 大香蕉久久网| 午夜福利影视在线免费观看| 99国产精品一区二区蜜桃av | 亚洲av日韩精品久久久久久密| 无限看片的www在线观看| 交换朋友夫妻互换小说| 精品少妇一区二区三区视频日本电影| 91国产中文字幕| 韩国精品一区二区三区| 老司机午夜福利在线观看视频| 精品久久蜜臀av无| 国产在线一区二区三区精| 一级片'在线观看视频| 1024香蕉在线观看| 亚洲午夜理论影院| 1024视频免费在线观看| 少妇粗大呻吟视频| 777米奇影视久久| 亚洲男人天堂网一区| 91在线观看av| 最新的欧美精品一区二区| 久久久久久免费高清国产稀缺| 两人在一起打扑克的视频| 久久精品国产亚洲av香蕉五月 | 久久国产乱子伦精品免费另类| 成人影院久久| 国产男女超爽视频在线观看| 午夜激情av网站| 一级作爱视频免费观看| 精品视频人人做人人爽| 中文字幕av电影在线播放| а√天堂www在线а√下载 | 午夜福利免费观看在线| 一二三四在线观看免费中文在| 亚洲人成电影免费在线| 亚洲熟妇中文字幕五十中出 | 精品久久蜜臀av无| 18禁裸乳无遮挡免费网站照片 | 日韩中文字幕欧美一区二区| 香蕉久久夜色| 9色porny在线观看| 国产成人精品无人区| av天堂在线播放| 国产精品一区二区免费欧美| 亚洲精品中文字幕一二三四区| 纯流量卡能插随身wifi吗| svipshipincom国产片| 91av网站免费观看| 精品电影一区二区在线| 国产高清videossex| 天天操日日干夜夜撸| 18禁裸乳无遮挡免费网站照片 | 国产亚洲一区二区精品| 欧美不卡视频在线免费观看 | 午夜免费成人在线视频| 国产精品一区二区在线不卡| 中文字幕人妻丝袜制服| 飞空精品影院首页| 亚洲欧洲精品一区二区精品久久久| 99国产综合亚洲精品| 免费在线观看影片大全网站| 日韩欧美在线二视频 | 国产精品 欧美亚洲| 少妇裸体淫交视频免费看高清 | 狠狠狠狠99中文字幕| 亚洲精品成人av观看孕妇| 国产精华一区二区三区| 国产又色又爽无遮挡免费看| 亚洲午夜理论影院| 欧美人与性动交α欧美精品济南到| 精品国产一区二区三区四区第35| 真人做人爱边吃奶动态| 大香蕉久久成人网| 日韩精品免费视频一区二区三区| 91九色精品人成在线观看| 国产av又大| 久久精品国产清高在天天线| 在线十欧美十亚洲十日本专区| 久9热在线精品视频| 在线永久观看黄色视频| 国产免费男女视频| 一区在线观看完整版| 国产不卡av网站在线观看| 久久久久国产精品人妻aⅴ院 | 欧美日韩av久久| 少妇的丰满在线观看| 精品人妻熟女毛片av久久网站| 欧美精品亚洲一区二区| 首页视频小说图片口味搜索| 美女高潮到喷水免费观看| 精品国产超薄肉色丝袜足j| 在线播放国产精品三级| 大型av网站在线播放| 国产亚洲精品第一综合不卡| 热re99久久国产66热| 欧美色视频一区免费| 欧美老熟妇乱子伦牲交| 欧美精品亚洲一区二区| 高清av免费在线| 大型av网站在线播放| 国产一区有黄有色的免费视频| 日韩有码中文字幕| 亚洲国产毛片av蜜桃av| 一区二区三区国产精品乱码| 丝袜人妻中文字幕| 一区二区日韩欧美中文字幕| 又黄又粗又硬又大视频| 亚洲欧美激情综合另类| 国产精品一区二区在线观看99| 亚洲国产欧美日韩在线播放| 精品国产乱子伦一区二区三区| 成年人黄色毛片网站| 日韩欧美三级三区| 在线观看www视频免费| 国产aⅴ精品一区二区三区波| a级毛片在线看网站| 国产精品久久久人人做人人爽| 757午夜福利合集在线观看| 精品久久蜜臀av无| 亚洲av第一区精品v没综合| 亚洲欧美色中文字幕在线| 国产在视频线精品| 亚洲免费av在线视频| 成人亚洲精品一区在线观看| 久久精品国产a三级三级三级| 精品卡一卡二卡四卡免费| 日本撒尿小便嘘嘘汇集6| 精品国产一区二区三区久久久樱花| 涩涩av久久男人的天堂| 黑人操中国人逼视频| 夜夜夜夜夜久久久久| 黄色视频,在线免费观看| 91成人精品电影| 欧美激情久久久久久爽电影 | 亚洲av美国av| av网站免费在线观看视频| 男女免费视频国产| 午夜亚洲福利在线播放| 老司机影院毛片| 亚洲性夜色夜夜综合| 亚洲片人在线观看| 婷婷成人精品国产| 9191精品国产免费久久| 成年女人毛片免费观看观看9 | 亚洲色图 男人天堂 中文字幕| 国产亚洲欧美在线一区二区| av中文乱码字幕在线| 国产精品乱码一区二三区的特点 | 免费一级毛片在线播放高清视频 | 一边摸一边抽搐一进一小说 | av视频免费观看在线观看| 人人妻人人爽人人添夜夜欢视频| 日韩人妻精品一区2区三区| 99热国产这里只有精品6| 精品高清国产在线一区| 九色亚洲精品在线播放| 亚洲成人免费电影在线观看| 精品一区二区三卡| 叶爱在线成人免费视频播放| 中文欧美无线码| 伦理电影免费视频| 水蜜桃什么品种好| 国产淫语在线视频| 久久人妻福利社区极品人妻图片| 国产精品久久久久久人妻精品电影| 久久久国产成人免费| 丰满迷人的少妇在线观看| 欧美日韩av久久| videos熟女内射| videosex国产| 波多野结衣一区麻豆| 国产高清国产精品国产三级| 天天躁日日躁夜夜躁夜夜| 麻豆乱淫一区二区| 欧美黑人精品巨大| 亚洲av欧美aⅴ国产| 大码成人一级视频| 亚洲精品久久午夜乱码| 欧美日韩精品网址| 日韩欧美一区视频在线观看| 欧美激情高清一区二区三区| 制服诱惑二区| 黄色怎么调成土黄色| 中文亚洲av片在线观看爽 | 亚洲久久久国产精品| 国产精品久久久久久人妻精品电影| 午夜精品在线福利| 久久人妻av系列| 欧美精品啪啪一区二区三区| 欧美日韩亚洲高清精品| 人妻一区二区av| 露出奶头的视频| 国产黄色免费在线视频| 久久久国产一区二区| av欧美777| 亚洲精品国产精品久久久不卡| 最近最新免费中文字幕在线| 亚洲精品乱久久久久久| 美女福利国产在线| 欧美乱码精品一区二区三区| 手机成人av网站| 黄色 视频免费看| 波多野结衣av一区二区av| 久久久久精品人妻al黑| 一个人免费在线观看的高清视频| 国产伦人伦偷精品视频| 波多野结衣一区麻豆| 搡老乐熟女国产| 午夜免费成人在线视频| 欧美乱妇无乱码| 国产成+人综合+亚洲专区| 久久中文看片网| 国产97色在线日韩免费| 亚洲专区中文字幕在线| 嫁个100分男人电影在线观看| 欧美乱码精品一区二区三区| 亚洲成av片中文字幕在线观看| 99久久综合精品五月天人人| 久久婷婷成人综合色麻豆| 高清黄色对白视频在线免费看| 真人做人爱边吃奶动态| 中文字幕人妻丝袜一区二区| √禁漫天堂资源中文www| 亚洲 国产 在线| av网站免费在线观看视频| 色播在线永久视频| 啦啦啦 在线观看视频| 美女扒开内裤让男人捅视频| 新久久久久国产一级毛片| 欧美精品一区二区免费开放| 女性被躁到高潮视频| 成人免费观看视频高清| 精品国产乱子伦一区二区三区| 久久精品熟女亚洲av麻豆精品| 无人区码免费观看不卡| 国产一区二区三区视频了| 欧美日韩乱码在线| 男男h啪啪无遮挡| 黄色女人牲交| 在线av久久热| 欧美+亚洲+日韩+国产| 十八禁人妻一区二区| 9191精品国产免费久久| 国产一区二区三区综合在线观看| 丰满迷人的少妇在线观看| 国产一区在线观看成人免费| 99精品久久久久人妻精品| 757午夜福利合集在线观看| 五月开心婷婷网| 91大片在线观看| 国产精品影院久久| 日本一区二区免费在线视频| 激情视频va一区二区三区| 一夜夜www| 中文字幕高清在线视频| 精品人妻熟女毛片av久久网站| √禁漫天堂资源中文www| 新久久久久国产一级毛片| 欧美乱妇无乱码| 国产精品1区2区在线观看. | 久久影院123| 国产男靠女视频免费网站| 免费观看a级毛片全部| 9热在线视频观看99| 极品教师在线免费播放| 我的亚洲天堂| 国产一区二区三区综合在线观看| 日日夜夜操网爽| 亚洲精品美女久久久久99蜜臀| 多毛熟女@视频| 天天影视国产精品| 校园春色视频在线观看| 国产精品香港三级国产av潘金莲| 国产成人啪精品午夜网站| 日韩成人在线观看一区二区三区| 夜夜夜夜夜久久久久| 午夜免费成人在线视频| 欧美黄色淫秽网站| 天天躁狠狠躁夜夜躁狠狠躁| 自拍欧美九色日韩亚洲蝌蚪91| 国产男靠女视频免费网站| 性少妇av在线| 欧美av亚洲av综合av国产av| av网站在线播放免费| 丝瓜视频免费看黄片| 午夜精品在线福利| 欧美日韩亚洲高清精品| 美女 人体艺术 gogo| 久久人人97超碰香蕉20202| 精品熟女少妇八av免费久了| 午夜精品国产一区二区电影| 日本wwww免费看| 亚洲精品在线观看二区| 国产精品亚洲av一区麻豆| 村上凉子中文字幕在线| 自拍欧美九色日韩亚洲蝌蚪91| 一级a爱片免费观看的视频| 免费在线观看亚洲国产| 婷婷精品国产亚洲av在线 | 午夜福利一区二区在线看| 成人三级做爰电影| 国产蜜桃级精品一区二区三区 | 啦啦啦 在线观看视频| 国产精品电影一区二区三区 | www日本在线高清视频| 日韩欧美免费精品| 色老头精品视频在线观看| 人成视频在线观看免费观看| 下体分泌物呈黄色| 高清毛片免费观看视频网站 | 欧美日韩亚洲高清精品| 亚洲精华国产精华精| 国产精品电影一区二区三区 | 欧美老熟妇乱子伦牲交| 免费在线观看黄色视频的| 麻豆乱淫一区二区| av网站免费在线观看视频| 日韩免费高清中文字幕av| 欧美日本中文国产一区发布| 精品第一国产精品| 久久亚洲精品不卡| 女人被狂操c到高潮| 亚洲精品在线美女| 18禁美女被吸乳视频| 人人妻人人添人人爽欧美一区卜| av中文乱码字幕在线| 涩涩av久久男人的天堂| 亚洲国产欧美一区二区综合| 亚洲精品国产一区二区精华液| 美女视频免费永久观看网站| 天天操日日干夜夜撸| 久久久久精品国产欧美久久久| av网站在线播放免费| 国产乱人伦免费视频| 老司机影院毛片| svipshipincom国产片| 亚洲伊人色综图| 天堂中文最新版在线下载| x7x7x7水蜜桃| 欧美乱色亚洲激情| 精品人妻熟女毛片av久久网站| 制服诱惑二区| 亚洲av片天天在线观看| 天堂俺去俺来也www色官网| 精品一区二区三卡| 十八禁网站免费在线| 久久久久视频综合| 欧美乱码精品一区二区三区| 久久久久久人人人人人| 国产亚洲精品第一综合不卡| 18禁观看日本| 国产精品久久久人人做人人爽| 免费人成视频x8x8入口观看| 成人18禁高潮啪啪吃奶动态图| 99国产精品一区二区三区| 婷婷精品国产亚洲av在线 | 国产一区二区激情短视频| 成人手机av| 超碰成人久久| 国产一区二区激情短视频| 一级毛片女人18水好多| 亚洲片人在线观看| 久久人人爽av亚洲精品天堂| 国产av一区二区精品久久| 国产高清国产精品国产三级| av在线播放免费不卡| 操出白浆在线播放| 国产亚洲精品第一综合不卡| 国产国语露脸激情在线看| videos熟女内射| 69精品国产乱码久久久| 国产精品久久久久久人妻精品电影| 99国产精品99久久久久| 日韩欧美三级三区| 欧美国产精品一级二级三级| 亚洲成av片中文字幕在线观看| 国内久久婷婷六月综合欲色啪| 美女高潮喷水抽搐中文字幕| 色尼玛亚洲综合影院| 丁香欧美五月| 成熟少妇高潮喷水视频| 999久久久国产精品视频| 99久久国产精品久久久| 亚洲第一av免费看| 国产区一区二久久| 欧美黑人精品巨大| 亚洲精品乱久久久久久| 国产亚洲一区二区精品| 国产av又大| 在线观看66精品国产| 欧美色视频一区免费| 亚洲中文字幕日韩| 亚洲一卡2卡3卡4卡5卡精品中文| 日本黄色视频三级网站网址 | 少妇猛男粗大的猛烈进出视频| 欧美午夜高清在线| xxxhd国产人妻xxx| 欧美黄色片欧美黄色片| 窝窝影院91人妻| 国产一卡二卡三卡精品| 亚洲第一欧美日韩一区二区三区| 国产91精品成人一区二区三区| 欧美另类亚洲清纯唯美| 国产欧美日韩精品亚洲av| 国产精品永久免费网站| 国产一区有黄有色的免费视频| 成人18禁在线播放| 国产精品香港三级国产av潘金莲| 人人妻人人添人人爽欧美一区卜| a级片在线免费高清观看视频| av国产精品久久久久影院| 亚洲,欧美精品.| 黑人猛操日本美女一级片| 亚洲精品美女久久av网站| 多毛熟女@视频| 日本黄色日本黄色录像| 久久人妻av系列| 露出奶头的视频| 男男h啪啪无遮挡| 国产精品免费一区二区三区在线 | 好看av亚洲va欧美ⅴa在| 免费人成视频x8x8入口观看| 一本大道久久a久久精品| a级片在线免费高清观看视频| 一区二区三区国产精品乱码| 国产免费现黄频在线看| 欧美日韩精品网址| 亚洲五月天丁香| 悠悠久久av| 中文欧美无线码| 男女午夜视频在线观看| 色婷婷av一区二区三区视频| 日韩精品免费视频一区二区三区| 成熟少妇高潮喷水视频| av线在线观看网站| 熟女少妇亚洲综合色aaa.| av中文乱码字幕在线| 国内久久婷婷六月综合欲色啪| 久久精品熟女亚洲av麻豆精品| 亚洲精品久久午夜乱码| 精品人妻熟女毛片av久久网站| 久久精品亚洲精品国产色婷小说| 欧美日韩亚洲综合一区二区三区_| 国产精品国产高清国产av | 国产精品电影一区二区三区 | av一本久久久久| 国产午夜精品久久久久久| 亚洲欧美日韩高清在线视频| 大陆偷拍与自拍| 王馨瑶露胸无遮挡在线观看| 国产精品一区二区在线观看99| 欧美精品亚洲一区二区| 电影成人av| 亚洲 国产 在线| 国产极品粉嫩免费观看在线| 精品国产一区二区三区四区第35| 国产男女内射视频| 欧美日本中文国产一区发布| 一级毛片女人18水好多| 久久精品国产亚洲av高清一级| 国产精品久久久久成人av| 91av网站免费观看| 国产无遮挡羞羞视频在线观看| 久久精品91无色码中文字幕| 18禁观看日本| 国产成人av教育| 国产av一区二区精品久久| 午夜成年电影在线免费观看| 亚洲精品国产精品久久久不卡| 真人做人爱边吃奶动态| 久久天躁狠狠躁夜夜2o2o| av免费在线观看网站| 国产精品秋霞免费鲁丝片| 伊人久久大香线蕉亚洲五| 国产精品 欧美亚洲| 亚洲精品久久成人aⅴ小说| 真人做人爱边吃奶动态| 91成年电影在线观看| 精品少妇一区二区三区视频日本电影| 一区二区三区精品91| 精品久久久久久,| 婷婷丁香在线五月| 亚洲熟妇熟女久久| 免费观看精品视频网站| 人成视频在线观看免费观看| 变态另类成人亚洲欧美熟女 | 天天影视国产精品| 国产精品偷伦视频观看了| 欧美av亚洲av综合av国产av| 操美女的视频在线观看| 一本一本久久a久久精品综合妖精| 最新美女视频免费是黄的| 免费观看人在逋| 香蕉久久夜色| 男人操女人黄网站| 精品亚洲成a人片在线观看| 精品久久蜜臀av无| 亚洲男人天堂网一区| 99精品在免费线老司机午夜| 一级片免费观看大全| 亚洲欧美日韩另类电影网站| 在线av久久热| 欧美在线黄色| 精品高清国产在线一区| 91av网站免费观看| 亚洲色图av天堂| 国产男女超爽视频在线观看| 女人精品久久久久毛片| 女人被狂操c到高潮| 亚洲五月色婷婷综合| 啪啪无遮挡十八禁网站| 久久久久久久久免费视频了| 久久国产精品男人的天堂亚洲| 亚洲精华国产精华精| 久热爱精品视频在线9| 欧美日韩亚洲综合一区二区三区_| 久久久久久久久免费视频了| 国产成人系列免费观看| 99香蕉大伊视频| 一二三四在线观看免费中文在| 日韩人妻精品一区2区三区| av电影中文网址| 久久国产精品大桥未久av| 看片在线看免费视频| 亚洲国产精品sss在线观看 | 少妇粗大呻吟视频| 91国产中文字幕| 天天躁夜夜躁狠狠躁躁| 久久久久精品国产欧美久久久| 亚洲精品美女久久久久99蜜臀| 手机成人av网站| 久久性视频一级片| 亚洲国产精品sss在线观看 | 中文字幕色久视频| 在线视频色国产色| 窝窝影院91人妻| 老司机影院毛片| 久久久久久免费高清国产稀缺| 久久九九热精品免费| 天天影视国产精品| 夫妻午夜视频| 国产男女超爽视频在线观看| 久久久久国产精品人妻aⅴ院 | 天堂俺去俺来也www色官网| 精品欧美一区二区三区在线|