• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Digital Image Encryption Algorithm Based on Double Chaotic Map and LSTM

    2023-12-15 03:57:26LuoyinFengJizeDuandChongFu
    Computers Materials&Continua 2023年11期

    Luoyin Feng,Jize Du and Chong Fu

    1School of Computer Science and Engineering,Northeastern University,Shenyang,110819,China

    2School of Electrical Engineering and Computer Science,University of Missouri,Missouri,65201,USA

    ABSTRACT In the era of network communication,digital image encryption(DIE)technology is critical to ensure the security of image data.However,there has been limited research on combining deep learning neural networks with chaotic mapping for the encryption of digital images.So,this paper addresses this gap by studying the generation of pseudo-random sequences(PRS)chaotic signals using dual logistic chaotic maps.These signals are then predicted using long and short-term memory (LSTM) networks,resulting in the reconstruction of a new chaotic signal.During the research process,it was discovered that there are numerous training parameters associated with the LSTM network,which can hinder training efficiency.To overcome this challenge and improve training efficiency,the paper proposes an improved particle swarm optimization(IPSO)algorithm to optimize the LSTM network.Subsequently,the obtained chaotic signal from the optimized model training is further scrambled,obfuscated,and diffused to achieve the final encrypted image.This research presents a digital image encryption(DIE)algorithm based on a double chaotic map(DCM)and LSTM.The algorithm demonstrates a high average NPCR(Number of Pixel Change Rate) of 99.56% and a UACI (Unified Average Changing Intensity) value of 33.46%,indicating a strong ability to resist differential attacks.Overall,the proposed algorithm realizes secure and sensitive digital image encryption,ensuring the protection of personal information in the Internet environment.

    KEYWORDS Digital image encryption;LSTM;particle swarm optimization algorithm;DCM

    1 Introduction

    While the arrival of the information age brings convenience to people,it also brings about the problem of information security.How to protect personal information security in a wide range of information exchanges has become the focus of research in digital society [1].Because of their intuitiveness and convenience,digital images and video became the main element of data transmission in the network.The information of digital images is figurative and vivid and becomes an important means for people to describe information.Security protection is of representative significance.It contains many data,and their correlation is very high[2].In most image encryption(IM)research,the ciphertext is used at the transmission end and the receiver end,and then decrypted by the secret key.The encryption system directly uses text encryption technology which results in poor encryption and decryption(ED)quality[3].With the constant exploration of chaos theory,IM schemes based on chaos are gradually applied.Nonlinear dynamic learning pass is the essence of chaos which has the pseudorandom characteristics of motion trajectory.Chaotic encryption technology has the advantages of high encryption efficiency and strong security[4].The kernel of chaotic IM is a chaotic signal,which is mainly generated by two chaotic systems.The first is a low-dimensional chaotic system.The system is clear in structure,fast in operation and easy to implement by hardware.But the system is easy to degenerate and the secret key space is small.The second is the high-dimensional chaotic system,which has more complex comfort and more parameters[5].The authors introduce a new image encryption algorithm that utilizes n-dimensional conservative chaos and is based on the generalized Hamiltonian system.This algorithm demonstrates excellent chaotic characteristics,including wide ergodicity,no attractors,and resistance to reconstruction attacks.It incorporates dynamic scrambling and diffusion techniques,which are controlled by external and internal key streams,ensuring a strong relationship between the ciphertext and the plaintext.Experimental simulations and performance analysis confirm the algorithm’s improved security and suitability for real-time communication [6].For this reason,the chaotic signal of PRS is obtained by using DCM.The LSTM network is optimized by the IPSO algorithm.Then the chaotic signal is reconstructed.Finally,the chaotic signal is encrypted.A DIE algorithm based on dual chaotic mapping and LSTM is constructed.

    The main contribution of the paper is discussed as follows:

    This paper proposes a digital image encryption (DIE) algorithm that uses deep learning neural networks and chaotic mapping to encrypt image data securely.The algorithm generates chaotic signals using dual logistic maps and predicts them using long and short-term memory networks.An improved particle swarm optimization (IPSO) algorithm is introduced to optimize the LSTM network.The chaotic signals are then used to get highly secure encrypted images.The combination of deep learning,chaotic mapping,and IPSO delivers a robust solution for image encryption,enhancing security and privacy.

    The remainder of the paper is structured as follows: the related work of the proposed model is discussed in Section 2;then Section 3 discusses the design of the DIE algorithm based on DCM and LSTM,and the performance analysis of the DIE algorithm based on DCM and LSTM is represented in Section 4;finally,an overall summary of the proposed model is discussed in Section 5.

    2 Related Works

    Complex dynamic behaviour and initial value sensitivity of chaotic systems emerge with the development of chaos theory.It has important applications in encryption technology.Three components of the colour image are scrambled using the Arnold algorithm and determine the number of iterations.Then a double chaotic system was proposed to generate chaotic sequences[7].Finally,the component image and chaotic sequence were converted into a Deoxyribonucleic Acid(DNA)sequence to realize IM.A double-parameter fractal sort vector (DPFSV) was used to control the iterative node relationship in the spatiotemporal chaotic system,and a new one was constructed to realize the permutation diffusion synchronization encryption [8].Five control parameters are introduced into the function to solve the problem that a one-dimensional chaotic function would be damaged due to the collapse of orbit to a specific period in cryptography [9].The function as a counting generator generated a new IM algorithm.A fractional hyperchaos system is used to promote the efficiency and security of the image compression encryption algorithm.Then DNA coding was used to encrypt the generated image[10-14].In the generation of secure keys for IM,chaotic maps had the problem of over-tuning.To solve this problem,an IM technology based on a non-dominated sorting genetic algorithm and local chaotic search was proposed to adjust the super parameters of a chaotic map[15].A pseudo-random and complex characteristics joint encryption technology is proposed based on hyperchaos behaviour and DNA coding.To use nonlinear analysis tools to better select keys,the global dynamics of the financial hyperchaos system were studied[16].To protect multiple digital images in the network and maintain users’personal privacy information,chaos theory and elliptic curve ElGamal cryptosystem is used to generate cryptographic images and shared keys and encrypt relevant information.An innovative encryption scheme specifically designed for encrypting multiple images.The scheme is based on a 3D cube structure and employs a hyper-chaotic system for efficient scrambling and sequence generation.The algorithm generates a hash value and key point and utilizes the robust ElGamal encryption technique.Through comprehensive analyses and tests,the algorithm demonstrates superior security and efficiency compared to existing systems for the secure transmission of multiple images[17].

    LSTM artificial neural network is a time-recursive neural network that can capture long-term dependencies between sequences.LSTM models have advantages in digital image encryption analysis,such as the ability to capture sequential relationships and contextual understanding,handle variable-length inputs,retain important information,train on large datasets,and potentially aid in decryption.However,the effectiveness of these models is dependent on the encryption scheme and dataset implemented.A hybrid feature selection technique consisting of the Pearson correlation coefficient and random forest model.The data memory training was based on deep learning,multilayer perceptron and LSTM [18].Transformer’s pre-training language model to generate context embedding of text sequences to detect and eliminate hate speech in online social media.The model was compared with a one-dimensional convolutional neural network (1D-CNN) and LSTM model[19].To estimate the battery using life (BUL) even in the case of capacity regeneration,A BUL prediction technology is proposed based on LSTM considering multiple measurable data of the battery management system[20].A data-driven prediction model is proposed for weather prediction based on LSTM by using local information transduction in time series prediction [21].Bi-LSTM is combined with data sequencing to predict the diameter of the jet grouting column in soft soil in real-time [22].To achieve accurate short-term solar irradiance prediction,a convolution neural network (CNN) is applied to extract spatial features.Then,LSTM was applied to extract spatial features,combined spatiotemporal correlation,and proposed a new prediction model[23].To predict the power generation of photovoltaic power plants,put forward two hybrid models,CNN-LSTM and ConvLSTM.This realized the prediction of power generation,provided accurate information for the staff,and facilitated the decision-making of the next work content of the power plant [24].The Prophet model is used to predict the original load data using linear and nonlinear data,resulting in partial nonlinear residual data.LSTM was used to train it,and then it needs to further improve the prediction accuracy through Back-propagation (BP) neural network training [25].A new image encryption algorithm is proposed that utilizes the Once Forward Long Short-Term Memory Structure(OF-LSTMS) and the Two-Dimensional Coupled Map Lattice (2DCML) fractional-order chaotic system.The algorithm divides the original image into blocks and employs input and output gates for initialization.It incorporates permutation and diffusion operations to ensure synchronization.By leveraging the 2DCML chaotic system’s enhanced chaotic ergodicity and larger sequence values,the algorithm proves effective for image encryption.Simulation results demonstrate superior security and efficiency compared to existing encryption approaches [26].A novel approach for encrypting colour images is introduced by leveraging deep learning techniques.The proposed method utilizes a Long Short-Term Memory (LSTM) network to train and predict four-dimensional hyper-chaotic Lorenz signals.The resulting signals are employed to construct a chaotic colour image cryptosystem framework.The intricate nature of this method poses challenges for potential attackers,and extensive simulations demonstrate its superior security compared to conventional image encryption algorithms[27].An image encryption algorithm that combines an improved Arnold transform with a chaotic pulse-coupled neural network.It introduces an oscillatory reset voltage to generate a chaotic sequence,which is used to pre-encrypt the image using the Exclusively-OR (XOR) operation.The algorithm then applies an enhanced Arnold transform to further scramble the encrypted image [28].The algorithm demonstrates superior encryption effectiveness compared to partial encryption methods,shows high sensitivity to both keys and plaintexts,offers a large key space,and effectively defends against differential attacks and noise attacks.A new image encryption technique that combines the beta chaotic map,nonsubsampled contourlet transform,and genetic algorithm is proposed in[29].It involves decomposing images into subbands,generating a pseudo-random key,and optimizing the genetic algorithm using a multiobjective fitness function.Experimental results demonstrate faster computation and stronger encryption,confirming the effectiveness of the proposed technique.A new colour image encryption algorithm that utilizes a 3D chaotic Hopfield neural network and random row-column permutation.The algorithm generates diffusion and permutation keys,rearranges the image,divides it into subgraphs,and encrypts each part using diffusion keys [30].Simulations and security analysis show that the encryption scheme performs well and provides robust security.A novel image encryption algorithm that utilizes the Once Forward Long Short-Term Memory Structure(OFLSTMS)and the Two-Dimensional Coupled Map Lattice(2DCML)fractional-order chaotic system.The algorithm divides the original image into blocks,applies input and output gates,and synchronizes permutation and diffusion operations.The 2DCML chaotic system is chosen for its superior chaotic properties and larger sequence values,making it well-suited for image encryption.Simulation results demonstrate that the proposed algorithm outperforms previous schemes in terms of both security and efficiency[31].

    3 Design of DIE Algorithm Based on DCM and LSTM

    3.1 Random Sequence Generation Based on DCM

    Chaotic systems are highly sensitive to initial values because of their definition and characteristics.The encryption system based on that is constructed under its characteristics.According to the modern cryptosystem,the ED is achieved through the transformation operation of the key.For encryption systems,the security and reliability are mainly determined by the quality of key generation.If the PRS obtained from the key generation stream has very good randomness,the overall security of the system will be higher.The long-term behaviour of the chaotic system is completely random and has inherent randomness.Common one-dimensional chaotic systems include Logistic maps and Chebyshev maps.Logic mapping is defined as follows formula(1):

    In formula(1),when the parameterμmeets the condition 3<μ≤4,a chaotic sequence will be obtained.This paper studies the ED of digital images using the chaotic system,which makes the encryption process and image compression process independent of each other.The overall functional diagram of the dual chaotic IM system is shown in Fig.1.

    Figure 1:Overall functional structure of dual-chaos DIE system

    For encryption systems,the quality of key generation determines the security and reliability.To improve that of the system,IM based on the PRS number obtained from the Logistic chaotic map is studied.The probability distribution function of the PRS generated by the Logistic map is shown in formula(2).

    According to the probability distribution function obtained from formula(2),the mean value of chaotic PRS is obtained as shown in formula(3).

    After obtaining the mean value of the PRS,the correlation degree needs to be calculated,and the correlation function is shown in formula(4).

    The joint probability distribution function is shown in formula(5).

    From the above formulas,the PRS and white noise produced by the chaotic system have relatively similar statistical characteristics.The settlement result of the sequence mean value and correlation function is 0,with high randomness.Two Logistic maps (L1andL2) are set in the specific random sequence generation module to create PRS.Its function is shown in Fig.2.

    Figure 2:Diagram of random sequence generation module

    First,a random sequenceX1is calculated byL1.Then the elements in the sequence are calculated asL2parameters.A floating-point number in the interval (0,1) is randomly selected as the initial value of theL2calculation.A random sequenceX2is obtained again.The random sequence obtained through integration is shown in formula(6).

    In formula(6),MandNare the pixel width and pixel height of the digital image,respectively.xM×Nis one of the elements in sequenceX1.In the calculation process,the parameterμ1value ofL1is set to 3.99 to ensure that it completely enters the chaotic state.The parameters of deep learning are sensitive.As the key of the encryption algorithm,it can increase the difficulty of exhaustive attacks.Through the above operations,four random sequences are generated based on the dual logistic chaotic map.

    3.2 LSTM New Chaotic Signal Generation and DIE and Decryption

    To improve security,a new chaotic signal is generated based on the random sequence of the chaotic system using the LSTM artificial neural network.LSTM is an event-recursive neural network(RNN).However,in practical applications,RNN is easily affected by gradient disappearance or gradient explosion.It is difficult to capture the long-term dependence between sequences,making training more difficult.LSTM can solve this problem well.The LSTM training model is shown in Fig.3.

    Figure 3:Schematic diagram of LSTM training model

    The key generated by the chaotic system is shown in formula(7).

    In formula(7),{x0,y0,z0,w0} is the initial state value.r1andr2are integer random values with a value range of [0,255].Taking the value inKas the initial value of the chaotic system,four pseudorandom sequences are obtained.The PRS is intercepted from a part of the sequence with a fixed length,and the LSTM network is used for deep learning to obtain the predicted new sequence.It judges whether the obtained sequence is chaotic,and if so,continues to the next step.The sequence is generated into a matrix with formula(8).

    In formula(8),the range ofkvalue isk=1,2,...,M.The range ofthe lvalue isl=1,2,...,N.Floor(t) returns the largest integer less than or equal tot.mod1 is used to take the fractional part of the sequence.A new random signal based on LSTM is obtained.The IM of the dualchaos DIE system studied contains three stages:scrambling,diffusion and confusion.The principle of LCM is shown in Fig.4.

    Figure 4:Schematic diagram of LCM principle

    After the pseudo-random matrix is obtained,the diffusion method is used to change the plaintext image into matrixA.The conversion function is shown in formula(9).

    In formula(9),P(i,j)is the clear text image.A(i,j)is the transformed chaotic matrix.j=j+1 convertsP(i,j)toA(i,j),as shown in formula(10).

    Ifj <N,continue to use formula(9) for conversion.If it is greater than or equal toN,setj=1,i=i+1.After meeting the above requirements,ifi≤M,formula(11) is used to obtain a new matrix.

    Wheni,jreaches the maximum value,the diffusion ends.After diffusion,a scrambling algorithm is used to scramble imageAinto imageB.For a pixel coordinate given in imageA,the new coordinate value is obtained according to formula(12).

    In formula(12),ifm=iorZ(i,j),orn=jorW(i,j),A(i,j) andA(m,n) positions are interchanged.When the coordinates traverse the pixels used in the image in the scanning order from left to right and from top to bottom,repeat the operation of(12)to convert imageAinto imageA′.After obtaining the new image,it uses formula(13)for processing.

    In formula(13),reshap()converts the image into anMN-dimensional row vector.Similarly,the pseudo-random matrixXis converted into anMN-dimensional row vector.After conversion,only one duplicate element in theXis retained.The elements in the set that do not appear inXare arranged behind the matrix in order from small to large.Then imageA′is scrambled,as shown in formula(14).

    It converts imageA′to imageB,as shown in formula(15).

    Then the last pixel of the image is spread forward,and imageBis changed into matrixCunder the aid of pseudo-random matrixY.The matrixCis the obtained ciphertext image.First,the ciphertext imageC,4 pseudorandom matrices and 2 pseudorandom numbers are input,and then the diffusion algorithm,scrambling algorithm and obfuscation algorithm is inversely operated to obtain the plaintext imageP.Through the above operations,the sequence is input into LSTM for deep learning,and the predicted new sequence and the sequence generation matrix are obtained.Then it is to encrypt and decrypt the digital image.

    3.3 Optimization Strategy of DIE Algorithm

    Scrambling the pixel image is realized by adjusting the memory position of pixel points after sorting the scrambling random sequences.Sorting is required during scrambling.The main reason is that the probability density function(PDF)of the LCM is not uniform,and the sequence number cannot be mapped to the interval with equal probability.To improve the efficiency of the dual-chaos DIE scheme in image pixel scrambling,the number of scrambling sequences obtained by LCM is studied to be homogenized.The PDF corresponding to the random variable satisfies formula(16).

    In formula(16),f(x) andg(y) are PDFs corresponding to two random variables,which are integrable on the interval (i,j) and (k,l),respectively.According to the basic meaning of PDF,any random variable in the interval can be obtained.There is only one element in(k,l),which makes the probability of two random variables equal.To obtain a monotonic function with a value range of(c,d)and a defined range of(i,j),as shown in formula(17).

    If the random variableysatisfies the condition of the uniform distribution on the interval(0,1),formula(18)is obtained.

    After formula(18)is obtained,its corresponding random variable distribution is mapped,so that the random variable is converted into a uniformly distributed random variable in the(0,1)interval.According to the probability distribution function of the PRS generated by Logistic,formula(19)is obtained.

    Because random variables satisfy the condition of uniform distribution in the interval,the pseudorandom sequence number is converted into a sequence number vector with uniform distribution in the interval through monotone function calculation.Then,in the subsequent scrambling,the original scrambling pseudorandom number sequence is homogenized according to formula(19)to obtain the random sequence number.Then perform amplification processing is shown in formula(20).

    Then a vector is got,in which the elements satisfy the relevant conditions.It can be directly used for digital image pixel scrambling.In this way,it is no longer necessary to sort the original PRS,thus improving the efficiency of the encryption.When LSTM is used to process the PRS obtained from the chaotic system,a series of super parameters such as learning rate and batch size in the model need to be set first.However,it is impossible to explore the optimal parameter collocation of the model only through manual debugging.For this reason,the IPSO algorithm is selected to optimize it.Particle Swarm Optimization(PSO)is often preferred over Genetic Algorithm(GA)for digital image encryption algorithms due to its faster convergence,simpler structure,and suitability for continuous search spaces.To avoid local optima,techniques such as increasing the population size,random initialization,reducing inertia weight,modifying neighbourhood topology,and employing hybrid approaches can be employed.These techniques help enhance exploration and prevent PSOs from getting stuck in suboptimal solutions.Overall,PSO offers advantages for digital image encryption algorithms and can be optimized to avoid local optima.It also has several advantages in image encryption such as enabling key generation,designing optimal S-Boxes,aiding in cryptanalysis,optimizing encryption parameters,and improving efficiency and speed.However,thorough evaluation and analysis are necessary to ensure the effectiveness and robustness of using PSO in encryption algorithms.The principle of the traditional PSO algorithm is shown in Fig.5.

    Figure 5:PSO algorithm principle

    The IPSO algorithm improves the inertia weight of the PSO algorithm.The parameter that controls the influence of the previous speed on the current speed is inertia weight.Its size indicates that it inherits the speed of its parent particle.The improvement is shown in formula(21).

    In formula(21),wmeans the inertia weight parameter.trepresents the number of iterations.The inertia coefficient determines the search step size,and can flexibly adjust search capabilities.The particles jump out of the previous search to ensure the PSO algorithm expands and reduces the population search in iterative,and then a broader search is conducted.This can keep the diverse population.The particle speed update method is shown in formula(22).

    In formula(22),Xis a particle;pgis the global best position;Vis the velocity of particles;c1andc2are acceleration constants with positive values;arandis a random number between 0 and 1.The particle update is as shown in formula(23).

    Based on the above operations,the scrambling algorithm of the random sequence is improved and the parameters of the LSTM training process are optimized.Thus,the design of the DIE algorithm based on DCM and LSTM is completed.The whole structure of the algorithm is expressed in Fig.6.

    Figure 6:Overall framework of digital encryption algorithm

    4 Performance Analysis of the DIE Algorithm Based on DCM and LSTM

    In this research,the main objective is to reconstruct a chaotic signal using the obtained PRS(Preserved Residual Signal).To achieve this,an LSTM (Long Short-Term Memory) deep learning network is selected for the signal reconstruction.The IPSO(Improved Particle Swarm Optimization)algorithm is utilized to improve and optimize the LSTM model.The LSTM and the improved IPSOLSTM models are trained in the same environment to test the effectiveness of the optimization.By integrating IPSO into the LSTM training process,the goal is to enhance the LSTM network’s performance in reconstructing the chaotic signal.The comparative analysis between the LSTM and IPSO-LSTM models helps evaluate the impact of incorporating the IPSO algorithm.The specific training situation is shown in Fig.7.

    Figure 7:Comparison of iterations before and after LSTM improvement

    In Fig.7,with the increase of the iterations,the RMSE and Loss values of the two models showed a downward trend.The improved IPSO-LSTM reached the target RMSE value after 69 iterations.LSTM had iterated 136 times,67 times more than IPSO-LSTM.IPSO-LSTM reached the target value of Loss when it iterated 81 times.LSTM needed 202 iterations,121 more than IPSO-LSTM.According to the analysis in Fig.7,the improved IPSO-LSTM model has better convergence and can achieve training objectives with fewer iterations.

    To improve DIE’s security,a new chaotic signal was built with LSTM imitating chaotic characteristics.The significance of improving the security of the Digital Identity Ecosystem(DIE)using Differential Chaos Modulation(DCM)and Long Short-Term Memory(LSTM)lies in multiple factors.Firstly,it protects against evolving cyber threats,ensuring the integrity of the ecosystem.Secondly,it safeguards individuals’privacy by implementing robust security measures.Thirdly,it effectively combats identity fraud and unauthorized access attempts within the DIE.Additionally,enhancing security fosters trust among users and facilitates wider adoption of the system.Lastly,compliance with regulations is ensured,providing legal protection and demonstrating a commitment to privacy and security.Overall,integrating DCM and LSTM into DIE’s security framework strengthens its reliability and establishes a secure digital environment.To test the rationality of the chaotic signal constructed by the improved LSTM,the chaotic mapping of four images was studied,and the two types of chaotic signals were compared and analyzed,as shown in Fig.8.

    Figure 8:Comparison of chaotic signals of four images before and after using LSTM

    In Fig.8,the new chaotic signal obtained by deep learning did not coincide with the curve obtained by double mapping chaos,and the difference was large.The chaotic signals generated by the two were different,and the new signal curve obtained by improved LSTM prediction was more complex.According to the contents of Fig.8,the improved LSTM can improve the security of DIE.

    To test the encryption ability of the DIE designed by the research institute,the histogram method was used to measure and analyze it.The histogram method is important for testing the encryption ability of a DIE designed by a research institute.It allows for statistical analysis and detection of patterns in the encrypted data,helping to evaluate encryption strength and test robustness against different attacks.Additionally,the histogram method enables comparison and benchmarking of different encryption algorithms.However,it should be used in conjunction with other evaluation techniques for a comprehensive assessment of the encryption algorithm’s security and effectiveness.The histogram of digital image was used to describe the distribution of image colours,and could directly reflect the overall proportion of different colors in the image.Histogram can reflect the difference in colour space between two images.A plaintext image is encrypted by this algorithm.The histogram before and after encryption is shown in Fig.9.

    Figure 9:Distribution of image color histogram before and after encryption

    In Fig.9,the histogram of the image before encryption on the R,G and B components of the(Red Blur Green) RGB colour was also completely different from the histogram of the encrypted image.After encryption,the colour distribution in the image became chaotic,and the colour distribution of the original image could not be observed.Comprehensive analysis showed that the algorithm could significantly change the colour space in confusion processing,and effectively promote encryption security.

    To deeply test the encryption effect,pixel correlation was introduced as an important factor to measure whether the encryption algorithm was good or not.By calculating the relationship between the R,G,and B colour components of each adjacent pixel of the digital image before and after encryption,the correlation between each pixel was obtained.The correlation distribution of colour components before and after encryption is shown in Fig.10.

    In Fig.10,there was a relatively concentrated colour distribution between the adjacent pixels of the clear text image,with an obvious correlation.However,in a ciphertext image,all pixels were evenly distributed and had no centralized correlation characteristics.Its pixel correlation was eliminated after encryption,ensuring that there was no connection between the original and the encrypted image,and the security was high.Eliminating pixel correlation after encryption is important to enhance the security and confidentiality of the encrypted data.It prevents information leakage,protects against cryptanalysis,increases randomness,and improves resistance to image processing operations.By removing pixel correlation,the encrypted data becomes more secure,making it difficult for attackers to extract information or exploit patterns.Overall,eliminating pixel correlation strengthens the encryption scheme and ensures the privacy of the encrypted data.

    Figure 10:Comparison of image correlation before and after encryption

    The key sensitivity is the security analysis when the wrong key is used in the ED.To test the sensitivity to ciphertext and plaintext,it was studied to record the pixel change rate of the decryption and encryption results by changing the different number of pixel’s colour values,as shown in Table 1.

    Table 1: Sensitivity comparison of two algorithms with pixel color change

    In Table 1 and Fig.11,there was no relationship between the number of pixel changes and the pixel change rate.The pixel change rate of ED results of the research and design algorithm was about 50%.The avalanche effect would occur after changing the pixel colour values in ciphertext and plaintext.The change rate of the encryption algorithm based on traditional Lostic mapping was about 35%,15%lower than the research algorithm.From the comprehensive table,the research and design algorithm had high sensitivity.

    Figure 11:Sensitivity comparison of two algorithms with pixel color change

    The differential attack is a kind of selective plaintext attack.After changing a pixel value and encrypting the image,it is to observe the distinction between the two encrypted ciphertext images and find the cracking algorithm.NPCR and UACI are two important indicators of differential attack.The research used algorithms to encrypt different images.To further verify the anti-attack ability of the algorithm,the experiment introduced the research algorithm (Proposed algorithm) into several encryption algorithms,including one based on a chaotic system and dynamic DNA coding(Chaotic system and dynamic DNA coding algorithm),one based on Latin square (Latin square algorithm),and one based on LCM(LCM algorithm)for comparison.The corresponding evaluation index values are shown in Table 2 and Fig.12.

    Table 2: Comparative analysis of anti-attack indicators of encryption algorithms

    From Table 2 that Proposed algorithm was more resistant to differential attack than the other three algorithms.It can realize DIE with high security and sensitivity,and ensure the security of personal information on the Internet.The NPCR(Normalized Pixel Change Rate)and UACI(Unified Average Changed Intensity)values are metrics used to assess the effectiveness of algorithms in image encryption.In this scenario,a higher NPCR value and a lower UACI value indicate better anti-attack performance.Results analysis of the performance of four different algorithms are discussed as follows:

    Proposed algorithm demonstrates strong anti-attack performance with an average NPCR value of 99.56%and a UACI value of 33.46%.These values are very close to the theoretical ideals of 99.604%and 33.4635%,respectively.The algorithm achieves a high level of consistency in pixel changes and effectively disperses the modified intensities,making it difficult for attackers to detect and reverseengineer the encryption.

    Figure 12:Comparative analysis of anti-attack indicators of encryption algorithms

    Chaotic system and dynamic DNA coding algorithm shows slightly lower performance,with an average NPCR value of 92.50%and a UACI value of 31.385%.Although the NPCR value is lower than in Proposed algorithm,it still suggests a reasonable level of consistency.The UACI value indicates that the algorithm disperses changes,but not as effectively as Proposed algorithm.

    In Latin square algorithm,the average NPCR value further decreases to 90.36%,indicating reduced consistency in pixel changes.The UACI value is slightly lower at 30.51%,suggesting a slight improvement in dispersing changes compared to Chaotic system and dynamic DNA coding algorithm,but still falling short of the performance achieved by Proposed algorithm.

    LCM algorithm has a similar performance to Latin square algorithm,with an average NPCR value of 90.60%and a UACI value of 30.29%.The NPCR value remains consistent with Latin square algorithm,while the UACI value shows a slightly better dispersion of changes.

    5 Conclusion

    Digital images contain a lot of data,and the correlation between the data is very high.Therefore,to achieve image information security,DIE is a useful way.The chaotic signal of PRS was got by using DCM.Then the chaotic signal was reconstructed by IPSO-LSTM.Finally,the chaotic signal was encrypted.A DIE algorithm based on dual chaotic mapping and LSTM was constructed.Through experiments,the improved IPSO-LSTM achieved the target RMSE value in 69 iterations,while LSTM iterated 136 times;IPSO-LSTM reached the target value of Loss when it iterated 81 times,and LSTM needed to iterate 202 times.IPSO-LSTM algorithm had excellent convergence.After changing the pixel colour values in ciphertext and plaintext,the pixel change rate of the ED results of the algorithm was about 50%.The algorithm could significantly change the colour space in confusion processing,and encryption security was effectively promoted.The average NPCR value of Proposed algorithm was 99.56%,and the UACI value was 33.46%.Proposed algorithm was more resistant to differential attack than the other three algorithms.The algorithm produced a highly secure and reliable encryption scheme.

    Limitations and Future Work:

    Due to the inherent limitations of computer accuracy and technology,data obtained may contain information noise points.However,future research can focus on developing noise reduction techniques to address this issue.Additionally,incorporating digital image compression algorithms and imagehiding technology into the encryption algorithm can further enhance both the practicality and security of encrypted images.

    Acknowledgement:The authors would like to express their heartfelt gratitude to the techniques that have made valuable contributions to this research.

    Funding Statement:No funds or grants were received by any of the authors.

    Author Contributions:Luoyin Feng contributed to the design and methodology of this study;Jize Du and Chong Fu contributed for the assessment of the outcomes and the writing of the manuscript.

    Availability of Data and Materials:None to declare.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    国产成人aa在线观看| 中亚洲国语对白在线视频| 久久婷婷人人爽人人干人人爱| 久久热精品热| 悠悠久久av| 伦理电影大哥的女人| 人人妻人人看人人澡| 窝窝影院91人妻| 日韩欧美在线二视频| 精品久久久久久成人av| 色av中文字幕| 性欧美人与动物交配| 99久国产av精品| 我要搜黄色片| 美女高潮喷水抽搐中文字幕| 国产私拍福利视频在线观看| 精品午夜福利在线看| 丰满的人妻完整版| 久久精品国产亚洲av香蕉五月| 亚洲国产精品999在线| 久久热精品热| 久久久久久久久久成人| 真实男女啪啪啪动态图| 美女 人体艺术 gogo| x7x7x7水蜜桃| 99热这里只有是精品在线观看 | 天堂网av新在线| 蜜桃亚洲精品一区二区三区| x7x7x7水蜜桃| 亚洲avbb在线观看| 九色国产91popny在线| 精品久久久久久久久久久久久| 一级av片app| 欧美黄色淫秽网站| 国产69精品久久久久777片| 日韩有码中文字幕| 亚洲人成电影免费在线| 性插视频无遮挡在线免费观看| 69人妻影院| 免费大片18禁| 搡老妇女老女人老熟妇| 亚洲狠狠婷婷综合久久图片| 极品教师在线免费播放| 国产精品爽爽va在线观看网站| 中文字幕熟女人妻在线| 国产一区二区在线av高清观看| 日本精品一区二区三区蜜桃| 亚洲,欧美精品.| 免费电影在线观看免费观看| 亚洲一区二区三区色噜噜| 国产极品精品免费视频能看的| 亚洲专区中文字幕在线| av中文乱码字幕在线| 国产极品精品免费视频能看的| 日韩精品青青久久久久久| 免费av不卡在线播放| 日本黄大片高清| 国产精品久久久久久亚洲av鲁大| 欧美在线黄色| 欧美午夜高清在线| 美女xxoo啪啪120秒动态图 | 精品人妻一区二区三区麻豆 | 色哟哟哟哟哟哟| 波多野结衣高清无吗| 亚洲国产精品999在线| 欧美bdsm另类| 婷婷色综合大香蕉| 欧美黄色片欧美黄色片| 国产一区二区亚洲精品在线观看| 一个人免费在线观看的高清视频| 亚洲av一区综合| 国模一区二区三区四区视频| 午夜激情福利司机影院| 国产成人啪精品午夜网站| 天堂av国产一区二区熟女人妻| 人妻制服诱惑在线中文字幕| 网址你懂的国产日韩在线| 国产精品综合久久久久久久免费| 搡老岳熟女国产| 精品午夜福利在线看| 成年女人永久免费观看视频| 俄罗斯特黄特色一大片| 亚洲欧美日韩卡通动漫| 国产真实乱freesex| 国产精品亚洲av一区麻豆| 国产色爽女视频免费观看| 少妇的逼水好多| 熟妇人妻久久中文字幕3abv| 麻豆成人av在线观看| 午夜福利在线在线| 国产精品影院久久| 国产三级中文精品| 婷婷精品国产亚洲av在线| 国产男靠女视频免费网站| 国内揄拍国产精品人妻在线| 男女做爰动态图高潮gif福利片| 九九久久精品国产亚洲av麻豆| 国产伦人伦偷精品视频| 国产成人aa在线观看| 国产成人啪精品午夜网站| 色5月婷婷丁香| 男人舔奶头视频| 久久久成人免费电影| 国产精品自产拍在线观看55亚洲| 久久久国产成人免费| 内地一区二区视频在线| 成人欧美大片| 日本熟妇午夜| 亚洲色图av天堂| 激情在线观看视频在线高清| 动漫黄色视频在线观看| 中文字幕av成人在线电影| 嫩草影视91久久| 18禁黄网站禁片免费观看直播| 最新中文字幕久久久久| 久久精品久久久久久噜噜老黄 | 成年免费大片在线观看| 亚洲人成伊人成综合网2020| 欧美3d第一页| 国产成人a区在线观看| 成人永久免费在线观看视频| 国产白丝娇喘喷水9色精品| 网址你懂的国产日韩在线| 动漫黄色视频在线观看| 99国产极品粉嫩在线观看| 精品午夜福利在线看| 一个人观看的视频www高清免费观看| 日本一二三区视频观看| 欧美xxxx性猛交bbbb| 亚洲美女搞黄在线观看 | 噜噜噜噜噜久久久久久91| 精品免费久久久久久久清纯| 亚洲精品久久国产高清桃花| 一卡2卡三卡四卡精品乱码亚洲| 真实男女啪啪啪动态图| 真人做人爱边吃奶动态| 成人av一区二区三区在线看| 一进一出好大好爽视频| 国产一区二区三区在线臀色熟女| 禁无遮挡网站| 色尼玛亚洲综合影院| 又黄又爽又免费观看的视频| 欧美又色又爽又黄视频| 天堂√8在线中文| 久久久久国内视频| 内地一区二区视频在线| 成人精品一区二区免费| 黄色一级大片看看| 精品一区二区三区视频在线观看免费| 婷婷色综合大香蕉| 波多野结衣高清作品| 色精品久久人妻99蜜桃| 99热6这里只有精品| 老女人水多毛片| 欧美激情国产日韩精品一区| 日本黄大片高清| 深夜a级毛片| 88av欧美| 午夜亚洲福利在线播放| 亚洲最大成人手机在线| 亚洲人成网站在线播| 韩国av一区二区三区四区| 全区人妻精品视频| av福利片在线观看| 99久久精品一区二区三区| 成人av一区二区三区在线看| 欧美午夜高清在线| 亚洲自偷自拍三级| 欧美一区二区精品小视频在线| 日本五十路高清| 欧美黑人欧美精品刺激| 嫁个100分男人电影在线观看| 久久久久精品国产欧美久久久| 欧美成人免费av一区二区三区| 日日干狠狠操夜夜爽| a级毛片a级免费在线| 亚洲欧美清纯卡通| 国内精品久久久久精免费| 亚洲成人久久性| 国产高清视频在线观看网站| 性欧美人与动物交配| 婷婷亚洲欧美| 亚洲精品粉嫩美女一区| 久久精品国产99精品国产亚洲性色| 天天一区二区日本电影三级| 精品乱码久久久久久99久播| 国产亚洲欧美98| 欧美日韩瑟瑟在线播放| 国产黄a三级三级三级人| 精品无人区乱码1区二区| 免费看光身美女| 久久婷婷人人爽人人干人人爱| 午夜精品在线福利| 久久久久免费精品人妻一区二区| 精品一区二区免费观看| 亚洲人成电影免费在线| 亚洲色图av天堂| 五月玫瑰六月丁香| 免费看日本二区| 搞女人的毛片| 午夜福利在线观看免费完整高清在 | 国产成人影院久久av| 99在线视频只有这里精品首页| 一边摸一边抽搐一进一小说| 观看美女的网站| 91在线精品国自产拍蜜月| 国产成人影院久久av| 成人av在线播放网站| 亚洲人成伊人成综合网2020| 高清在线国产一区| 9191精品国产免费久久| 国产亚洲精品久久久久久毛片| 午夜免费成人在线视频| 宅男免费午夜| 国产精品精品国产色婷婷| 丝袜美腿在线中文| 久久人妻av系列| 成人国产一区最新在线观看| 欧美成人一区二区免费高清观看| 国产熟女xx| 日韩欧美一区二区三区在线观看| 欧美黄色淫秽网站| 91久久精品电影网| 18美女黄网站色大片免费观看| 看片在线看免费视频| 午夜福利欧美成人| 国产视频内射| 人妻夜夜爽99麻豆av| 日本免费a在线| 午夜久久久久精精品| 亚洲av成人不卡在线观看播放网| 青草久久国产| 精品福利观看| 18禁在线播放成人免费| 免费人成在线观看视频色| 国产真实伦视频高清在线观看 | 高清在线国产一区| 一级a爱片免费观看的视频| 久久性视频一级片| 精品福利观看| 国产黄色小视频在线观看| 亚洲av成人精品一区久久| 精品久久久久久,| 午夜福利视频1000在线观看| 国产精品国产高清国产av| 天堂√8在线中文| 国产v大片淫在线免费观看| av在线蜜桃| 久久久久久久午夜电影| 夜夜爽天天搞| 日韩有码中文字幕| 性欧美人与动物交配| 夜夜夜夜夜久久久久| 乱码一卡2卡4卡精品| 中文在线观看免费www的网站| 赤兔流量卡办理| 亚洲国产高清在线一区二区三| 国产午夜精品久久久久久一区二区三区 | 久久久成人免费电影| 一夜夜www| aaaaa片日本免费| 国产激情偷乱视频一区二区| 身体一侧抽搐| 免费电影在线观看免费观看| 亚洲七黄色美女视频| 别揉我奶头 嗯啊视频| 久久欧美精品欧美久久欧美| av女优亚洲男人天堂| 老熟妇乱子伦视频在线观看| 少妇裸体淫交视频免费看高清| 国产高清三级在线| 亚洲综合色惰| 亚洲男人的天堂狠狠| 男人舔奶头视频| 高清毛片免费观看视频网站| 婷婷亚洲欧美| 性色av乱码一区二区三区2| 免费观看精品视频网站| 在线免费观看的www视频| 蜜桃亚洲精品一区二区三区| 精品人妻1区二区| 俺也久久电影网| 老司机午夜福利在线观看视频| 成人精品一区二区免费| 国产一级毛片七仙女欲春2| 草草在线视频免费看| 一夜夜www| 91麻豆av在线| 国产精品乱码一区二三区的特点| 2021天堂中文幕一二区在线观| 国产国拍精品亚洲av在线观看| 毛片女人毛片| 欧美国产日韩亚洲一区| 亚洲第一电影网av| 国产成+人综合+亚洲专区| 久久久久国产精品人妻aⅴ院| 人人妻人人澡欧美一区二区| 国产精品女同一区二区软件 | 精品久久久久久成人av| 国产毛片a区久久久久| 在线观看一区二区三区| 久久久久久久精品吃奶| 国产久久久一区二区三区| 亚洲精品一卡2卡三卡4卡5卡| 美女高潮喷水抽搐中文字幕| 色综合欧美亚洲国产小说| 人人妻,人人澡人人爽秒播| 国产精品嫩草影院av在线观看 | 中文字幕av成人在线电影| 俺也久久电影网| h日本视频在线播放| 制服丝袜大香蕉在线| 18+在线观看网站| АⅤ资源中文在线天堂| 日韩欧美国产在线观看| 国产欧美日韩一区二区三| 成熟少妇高潮喷水视频| 无遮挡黄片免费观看| bbb黄色大片| 国产一级毛片七仙女欲春2| 久久久久国内视频| 精品不卡国产一区二区三区| 性色avwww在线观看| 国产毛片a区久久久久| 观看美女的网站| 中文资源天堂在线| 俄罗斯特黄特色一大片| 国产色婷婷99| 久久国产乱子伦精品免费另类| 69人妻影院| 亚洲在线观看片| 一级a爱片免费观看的视频| 午夜福利视频1000在线观看| 国产午夜精品论理片| 国产精品一区二区性色av| 综合色av麻豆| 国产69精品久久久久777片| 99久久九九国产精品国产免费| 日韩欧美三级三区| 亚洲五月天丁香| 观看免费一级毛片| 全区人妻精品视频| 亚洲av.av天堂| 中国美女看黄片| 国产激情偷乱视频一区二区| 91av网一区二区| 国产亚洲精品久久久com| 亚洲成av人片在线播放无| 婷婷六月久久综合丁香| 成年人黄色毛片网站| 亚洲一区二区三区不卡视频| 久久婷婷人人爽人人干人人爱| 能在线免费观看的黄片| 欧美激情久久久久久爽电影| 99在线人妻在线中文字幕| 蜜桃亚洲精品一区二区三区| 免费在线观看影片大全网站| 欧美zozozo另类| 一个人看视频在线观看www免费| 免费大片18禁| 久久精品国产亚洲av涩爱 | 欧美不卡视频在线免费观看| 一区二区三区免费毛片| 日本黄色视频三级网站网址| 久久久久国内视频| 国产午夜福利久久久久久| 给我免费播放毛片高清在线观看| 精品一区二区三区人妻视频| 免费观看的影片在线观看| 国产精品亚洲一级av第二区| 十八禁人妻一区二区| 在线a可以看的网站| 久久天躁狠狠躁夜夜2o2o| av福利片在线观看| 嫁个100分男人电影在线观看| 在线观看免费视频日本深夜| 欧美xxxx黑人xx丫x性爽| 免费av不卡在线播放| 亚洲精华国产精华精| 国产精品1区2区在线观看.| 亚洲五月天丁香| 一级黄色大片毛片| 日本一二三区视频观看| 亚洲成人久久性| 亚洲人成电影免费在线| 精品人妻1区二区| 桃色一区二区三区在线观看| 婷婷色综合大香蕉| 久久伊人香网站| 久久99热这里只有精品18| 亚洲国产精品久久男人天堂| 免费电影在线观看免费观看| 啦啦啦韩国在线观看视频| 久久久久久国产a免费观看| 小蜜桃在线观看免费完整版高清| 一级毛片久久久久久久久女| 伦理电影大哥的女人| 毛片一级片免费看久久久久 | 在线观看av片永久免费下载| 日本撒尿小便嘘嘘汇集6| 国产三级在线视频| 欧美成人免费av一区二区三区| 男女下面进入的视频免费午夜| 欧美另类亚洲清纯唯美| 国产精品免费一区二区三区在线| 午夜精品一区二区三区免费看| АⅤ资源中文在线天堂| netflix在线观看网站| 国产精品女同一区二区软件 | 久久精品久久久久久噜噜老黄 | 永久网站在线| 国产成人aa在线观看| 91午夜精品亚洲一区二区三区 | 欧美乱色亚洲激情| 色播亚洲综合网| av天堂中文字幕网| 在现免费观看毛片| 男人舔奶头视频| 欧美3d第一页| 九九久久精品国产亚洲av麻豆| 直男gayav资源| 久久中文看片网| 亚洲三级黄色毛片| 嫩草影院精品99| 天天一区二区日本电影三级| 97热精品久久久久久| 成年女人看的毛片在线观看| 18禁黄网站禁片午夜丰满| 人人妻人人澡欧美一区二区| 亚洲人成网站在线播| 一进一出好大好爽视频| 窝窝影院91人妻| 国产精品自产拍在线观看55亚洲| 少妇熟女aⅴ在线视频| 最近最新免费中文字幕在线| 欧美日韩黄片免| 简卡轻食公司| 亚洲欧美日韩无卡精品| 久久伊人香网站| 亚洲av美国av| netflix在线观看网站| 狠狠狠狠99中文字幕| 精品福利观看| 欧美色视频一区免费| 91午夜精品亚洲一区二区三区 | 亚洲国产精品合色在线| 性色avwww在线观看| 国产黄色小视频在线观看| 免费观看精品视频网站| 亚洲av.av天堂| 欧美另类亚洲清纯唯美| 久久人人精品亚洲av| 好男人在线观看高清免费视频| 国产老妇女一区| 国产高清有码在线观看视频| 韩国av一区二区三区四区| 亚洲国产欧美人成| 精品一区二区三区av网在线观看| 深夜a级毛片| 国产精品伦人一区二区| 香蕉av资源在线| 国产欧美日韩精品一区二区| 少妇裸体淫交视频免费看高清| h日本视频在线播放| 一本一本综合久久| 最好的美女福利视频网| 日本三级黄在线观看| 亚洲熟妇中文字幕五十中出| 韩国av一区二区三区四区| 亚洲黑人精品在线| 国内精品美女久久久久久| aaaaa片日本免费| 午夜a级毛片| 国产色爽女视频免费观看| 欧美性猛交黑人性爽| 国产免费男女视频| 男插女下体视频免费在线播放| 国产乱人视频| 亚洲av不卡在线观看| 91麻豆精品激情在线观看国产| 可以在线观看毛片的网站| 国产精品女同一区二区软件 | 国产91精品成人一区二区三区| 国产欧美日韩精品一区二区| 国产高清有码在线观看视频| 欧美日韩黄片免| 国产亚洲欧美98| 日韩欧美一区二区三区在线观看| 亚洲av中文字字幕乱码综合| 欧美在线一区亚洲| 麻豆久久精品国产亚洲av| 97超级碰碰碰精品色视频在线观看| av欧美777| 日韩大尺度精品在线看网址| 一夜夜www| 日本黄色视频三级网站网址| 桃色一区二区三区在线观看| 亚洲av.av天堂| 午夜免费男女啪啪视频观看 | 在线观看美女被高潮喷水网站 | 91久久精品国产一区二区成人| 欧美三级亚洲精品| 亚洲一区高清亚洲精品| 亚洲,欧美精品.| 人人妻人人看人人澡| 亚洲欧美日韩卡通动漫| 身体一侧抽搐| 极品教师在线视频| 天堂√8在线中文| 99国产精品一区二区三区| www.www免费av| 日韩人妻高清精品专区| 内地一区二区视频在线| 国产一区二区亚洲精品在线观看| 午夜视频国产福利| 舔av片在线| a级一级毛片免费在线观看| 久久久久久大精品| 欧美绝顶高潮抽搐喷水| 日韩av在线大香蕉| 在线观看免费视频日本深夜| 亚洲最大成人手机在线| 在线天堂最新版资源| 色精品久久人妻99蜜桃| 变态另类成人亚洲欧美熟女| 亚洲七黄色美女视频| 色5月婷婷丁香| 久久久久久大精品| 看片在线看免费视频| 琪琪午夜伦伦电影理论片6080| 中文字幕高清在线视频| 久久久久久久精品吃奶| 日韩免费av在线播放| 一卡2卡三卡四卡精品乱码亚洲| www.999成人在线观看| 免费看光身美女| 最近在线观看免费完整版| 日韩欧美精品v在线| 国产成人a区在线观看| 我要搜黄色片| 三级国产精品欧美在线观看| 老司机午夜福利在线观看视频| 日本精品一区二区三区蜜桃| 99国产精品一区二区三区| 日韩亚洲欧美综合| 3wmmmm亚洲av在线观看| 窝窝影院91人妻| 99久久无色码亚洲精品果冻| ponron亚洲| 国产久久久一区二区三区| 90打野战视频偷拍视频| 亚洲专区国产一区二区| 在线看三级毛片| 在线免费观看的www视频| 欧美激情国产日韩精品一区| 午夜精品在线福利| 男人舔女人下体高潮全视频| 窝窝影院91人妻| 嫩草影院入口| 久久久久亚洲av毛片大全| 日本在线视频免费播放| 俄罗斯特黄特色一大片| 欧美日韩黄片免| 亚洲av电影不卡..在线观看| 欧美一区二区国产精品久久精品| av福利片在线观看| 欧美丝袜亚洲另类 | 国产精品久久久久久人妻精品电影| 一进一出抽搐gif免费好疼| 一卡2卡三卡四卡精品乱码亚洲| 琪琪午夜伦伦电影理论片6080| 变态另类成人亚洲欧美熟女| 最新在线观看一区二区三区| 亚洲18禁久久av| 久久久久国产精品人妻aⅴ院| 日韩 亚洲 欧美在线| 国产伦精品一区二区三区视频9| 日韩欧美在线乱码| 国产亚洲精品久久久com| 中文字幕人成人乱码亚洲影| 亚洲中文日韩欧美视频| 高清毛片免费观看视频网站| 美女免费视频网站| 日日夜夜操网爽| 久久亚洲真实| 免费看a级黄色片| 成人美女网站在线观看视频| 啪啪无遮挡十八禁网站| 国产av在哪里看| 日本一本二区三区精品| 岛国在线免费视频观看| 男人舔奶头视频| 又黄又爽又刺激的免费视频.| 51午夜福利影视在线观看| 亚洲专区中文字幕在线| 国产 一区 欧美 日韩| 搡老妇女老女人老熟妇| 国内少妇人妻偷人精品xxx网站| 级片在线观看| 男女之事视频高清在线观看| 国产精品综合久久久久久久免费| 国产久久久一区二区三区| 免费大片18禁| 午夜福利高清视频| 老师上课跳d突然被开到最大视频 久久午夜综合久久蜜桃 | 天堂网av新在线| 老鸭窝网址在线观看| 久久人人精品亚洲av| 国产欧美日韩精品一区二区| 俺也久久电影网| 欧美bdsm另类| 在线观看舔阴道视频| 别揉我奶头~嗯~啊~动态视频| 香蕉av资源在线| 亚洲国产精品合色在线|