• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Robust Facial Biometric Authentication System Using Pupillary Light Reflex for Liveness Detection of Facial Images

    2024-01-20 13:02:04PujaPrasadAdepuSreeLakshmiSandeepKautishSimarPreetSinghRajeshKumarShrivastavaAbdulazizAlmazyadHossamZawbaaandAliWagdyMohamed

    Puja S.Prasad ,Adepu Sree Lakshmi ,Sandeep Kautish ,Simar Preet Singh ,Rajesh Kumar Shrivastava ,Abdulaziz S.Almazyad ,Hossam M.Zawbaa and Ali Wagdy Mohamed

    1CSE Department,Geethanjali College of Engineering,Hyderabad,Telangana,501301,India

    2Department of Computer Science,LBEF Campus,Kathmandu,44600,Nepal

    3School of Computer Science Engineering and Technology(SCSET),Bennett University,Greater Noida,201310,India

    4Department of Computer Engineering,College of Computer and Information Sciences,King Saud University,P.O.Box 51178,Riyadh,11543,Saudi Arabia

    5CeADAR Ireland’s Centre for AI,Technological University Dublin,Dublin,D07 EWV4,Ireland

    6Operations Research Department,Faculty of Graduate Studies for Statistical Research,Cairo University,Giza,12613,Egypt

    7Applied Science Research Center,Applied Science Private University,Amman,11937,Jordan

    ABSTRACT Pupil dynamics are the important characteristics of face spoofing detection.The face recognition system is one of the most used biometrics for authenticating individual identity.The main threats to the facial recognition system are different types of presentation attacks like print attacks,3D mask attacks,replay attacks,etc.The proposed model uses pupil characteristics for liveness detection during the authentication process.The pupillary light reflex is an involuntary reaction controlling the pupil’s diameter at different light intensities.The proposed framework consists of two-phase methodologies.In the first phase,the pupil’s diameter is calculated by applying stimulus(light)in one eye of the subject and calculating the constriction of the pupil size on both eyes in different video frames.The above measurement is converted into feature space using Kohn and Clynes model-defined parameters.The Support Vector Machine is used to classify legitimate subjects when the diameter change is normal(or when the eye is alive)or illegitimate subjects when there is no change or abnormal oscillations of pupil behavior due to the presence of printed photograph,video,or 3D mask of the subject in front of the camera.In the second phase,we perform the facial recognition process.Scale-invariant feature transform(SIFT)is used to find the features from the facial images,with each feature having a size of a 128-dimensional vector.These features are scale,rotation,and orientation invariant and are used for recognizing facial images.The brute force matching algorithm is used for matching features of two different images.The threshold value we considered is 0.08 for good matches.To analyze the performance of the framework,we tested our model in two Face antispoofing datasets named Replay attack datasets and CASIA-SURF datasets,which were used because they contain the videos of the subjects in each sample having three modalities(RGB,IR,Depth).The CASIA-SURF datasets showed an 89.9%Equal Error Rate,while the Replay Attack datasets showed a 92.1%Equal Error Rate.

    KEYWORDS SIFT;pupil;CASIA-SURF;pupillary light reflex;replay attack dataset;brute force

    1 Introduction

    Biometric measures are used to secure the digital world.None of the two people has the same biometric print.The Biometric is a combination of two words,bio and metric.It deals with the physiological and behavioral characteristics of a person.Digitization needs a robust,authentic system due to more use of digital devices as it makes the data readily available to any corner of the world.

    Due to increasing cybersecurity risks,decreasing hardware cost,and voluminous data,many organizations prefer to use biometric authentication systems due to their advantages over the traditional way of authentication like signature or password.The goal of such a system is to ensure that the available applications are accessed or used only by a genuine user and not by others.Such services include computer systems,secure access to buildings,cell phones,smartphones,laptops and ATMs.In the lack of a robust individual recognition system,these things remain susceptible to the tricks of an impostor.This is the reason why biometrics has been adopted in many applications.The physiological and behavioral characteristics used for biometric recognition include fingerprint,hand geometry,iris,retina,Face,palmprint,ear,DNA,voice,gait,signature,keystroke dynamics,etc.Because biometrics involve pattern recognition,the organ that gives patterns is mostly used for biometrics.However,the main issues are involved in designing and commissioning a practical biometric system.Table 1 lists the most commonly used biometrics.These identifiers are also called mature biometrics.Table 1 gives some important biometrics that are commonly used.

    Table 1: Commonly used biometrics

    1.1 Face Biometrics

    The face is considered one of the most popular biometric models for authentication purposes.The emergence of many face recognition conferences like Audio and Video-Based Authentication international conference,Automatic Face and Gesture Recognition Conference,and systematic empirical Face Evaluations Techniques (FRT),including those reported by Grother et al.2019 [1],Phillips et al.2003[2,3],etc.,make it more popular.

    Facial Recognition Technology(FRT)is designed to authenticate a person by using facial images without any physical contact.There are two major steps for designing FRT.In the first stage,the enrollment of the subject takes place by extracting features of the facial image using feature extraction or some image processing algorithm and creating a template.In the second stage.When the subject comes for authentication,the facial feature is extracted,and using some pattern-matching algorithm.It is matched with the template.While taking or stealing someone’s biometric traits is difficult,it is still possible for fraud to circumvent a biometric system using spoofed or artificial traits.A large number of studies have shown that it is quite possible to construct gluey fingers using lifted fingerprint impressions and utilize them to attack the biometric system.Behavioral biometrics like voice and signatures are more susceptible to such attacks than physiological traits.The facial recognition system is vulnerable to several presentation attacks (direct attacks or spoof attacks).A presentation attack uses Fake faces or facial artifacts for unauthorized access using a facial recognition authentication system.A presentation attack may be dynamic or static in nature.It is applied in two-dimensional as well as three-dimensional images.

    In two-dimensional static presentation attacks,an attacker may use a photograph or a flat paper plastic mask as an artifact.On the other side,in a two-dimensional dynamic attack,the fraud perpetrator uses a screen video display or several photographs shown one by one.The threedimensional presentation attack is also static or dynamic in nature.Static attacks occur using sculpture or 3D print,whereas attacks using robots or well-prepared makeup come under dynamic attack.

    1.2 About Pupillary Light Reflex of Pupil

    Fig.1 shows the anatomy of the human eye.Human eyes consist of many parts that can be used in biometrics,such as the iris,pupil,retina,eye movement,etc.The cornea is the front,white,domeshaped part that is responsible for focusing light when it falls on the eyes.The anterior chamber is present behind the cornea and is filled with a fluid called the aqueous humous.The iris is the colored part of the eyes that is present behind the anterior chamber,having a dark hole at its center called the pupil.When light falls on the eye,the iris muscle constricts and dilates the pupil to control the amount of light entering the eye.The pupillary light reflex is the involuntary reflex that controls the diameter of the pupil.The pupil is one of the most important parts of our vision system.The size of the pupil dilates or gets bigger when the light intensity is dim and it constricts or gets smaller when the intensity of light is brighter.

    Figure 1:Different parts of the eye

    By calculating the diameter of the pupil in different video frames of the subject and comparing the diameter.If we find the difference in diameter in two or more frames,then liveness will be verified as pupillary light reflex changes the diameter of the pupil,and this is not possible with the artifacts as shown in Fig.2.As the Pupillary light reflex causes the change in the diameter of the pupil,it is now one of the hot research areas in detecting the liveness of the face as well as iris biometric models.

    Figure 2:Response of the pupil to light

    2 Literature Review

    The initial work for facial recognition was found in the 1954’s by Bruner and Tagiuri in the handbook of psychology about the perception of people [4].Some of the earliest works include Darwin’s works on the functionality of emotions in the year 1972.According to Darwin,facial expression evolved as the result of certain kinds of emotions and had an important communicative function[5].Galton works on facial profile-based biometrics in the year 1988.

    As the facial recognition system is one of the most popular biometrics among all different biometrics,it is more vulnerable to direct attacks and indirect attacks because of progressive technology.Table 2 depicts the important contribution of the same.A number of researches were going on over the last four decades in order to strengthen the biometric authentication system.Different biometric traits have their own pros and cons.In order to make biometric authentication systems more robust nowadays,two or more biometric traits have been used.Using more than one biometric is called multimodal biometric.Combining iris pattern and pupil is also used for authenticating purposes.

    Table 2: Related work

    The pupil diameter changes with the intensity of light.This pupillary light reflex is used as one trait for authenticating people’s identity[19,20].Biometric authentication techniques are also used for identifying animals like sheep using retinas[21].The initial work for facial recognition was found in the 1954’s by Bruner and Tagiuri in the handbook of psychology about the perception of people[22].Some of the earliest works include Darwin’s works on the functionality of emotions in the year 1972.According to Darwin,facial expression evolved as the result of certain kinds of emotions and had an important communicative function[21].Galton works on facial profile-based biometrics in the year 1988.Actual work on automatic facial recognition using machines started in the year 1970s by Kelly,in which complex processing tasks were performed on a picture taken from television for the first time[23].The shallow Method of Face detection and recognition does not use a deep learning method;instead,extracting the feature from an image using handcrafted image descriptors like SIFT,MOPS,GLOH,and LBP[23-27]and combining these local descriptors using pooling mechanism to generate overall face descriptors like Fisher Vectors [28,29].Face recognition and detection have been done by using different approaches like locality preserving projections LPP[30],and modular PCA[31]in which the face image is divided into sub-images and the PCA method is applied to each sub-image.The improved recognition rate is found under different lighting directions,illumination expressions,and poses trained in different data sets[32,33].Some facial recognition techniques use HOG feature extraction and fast PCA enhancing accuracy rate and Support Vector Machine used for recognizing faces[34].The unified LDA/PCA algorithm combines LDA and PCA and reduces the drawbacks of LDA in facial recognition systems.Learning Based Descriptor[35]reduces the number of issues that occur during the matching and representation of facial images and is highly discriminative,compact,and easy to extract[36].Content-based facial recognition technique is also gaining popularity[37,38].Table 3 represents some important method used by early researchers.

    Table 3: FRT existing technology

    3 Proposed Methodology

    Our proposed algorithm consists of two main steps.In the first steps,we will find the pupil diameter for verifying the liveness of a subject.After verifying the subject is live,the facial recognition algorithm runs to authenticate the person’s identity.

    Measuring minute fluctuations in pupil diameter change in response to a stimulus is called Pupillometry.The measurement of diameter can be done using digital image processing.

    1.Capture facial images under different illumination conditions.

    2.Extract the iris portion in order to calculate the diameter of the pupil using Matlab image processing.

    3.Find the diameter of the pupil in five different frames under different illumination conditions.

    4.Compare the diameter of the pupil in different frames.

    5.Extract the facial feature vector using SIFT and MOPS.

    6.Train the model to find the embedding function of images.

    7.Train the proposed system to obtain the classifier model using SIFT feature vectors.

    8.Test the classifier by giving query image feature vector.

    9.Calculate the similarity index of the query image and the images of data sets using the classifier.

    3.1 Recognition of Pupillary Light Reflex

    In this step,we detect the pupil inside the captured image,and the size is calculated using the segmentation process.

    3.1.1DetectionandLocalization

    Detection and Localization are the two important steps,in which detection confirms the presence og the pupil inside the frame and detection gives its position.The Hough transform is used to find the boundary between the iris and the pupil.Pupil diameter has been calculated using MATLAB Image Processing toolbox that provides several algorithm environment tools for processing images,analyzing images,visualization,as well as developing algorithms.

    The different Image Processing steps involved are for finding the pupil dynamics are:

    · Preprocessing

    · Segmentation

    · Data Processing.

    · Feature extraction

    The transform technique is modified to be sensitive towards a dark circular shape instead of any other light irregular shape.Using gradient and sensitivity,this proposed algorithm becomes robust as it detects the pupil even after the eyelashes half cover it.

    3.1.2ArtifactsRemoval

    Two types of noises are detected in the raw linear pupil radii signal.The first one is Noise generated at the time of pupil detection because of the blinks called pupil detection error,and the second one is Pupil segmentation error that arises due to eye motion,Non-circular pupil,Partially covered pupil,and off-axis gaze.Segmentation error is very difficult to identify,and it is only observed when a sudden change in radii is marked compared to the previous neighboring frame,whereas detection error we can rectify during the modeling of pupil dynamics.For building the classification model,we use the support vector machine as it is considered one of the best classifiers that perform very well in low-dimensional feature vectors.

    3.2 Proposed Facial Recognition Technology

    The captured image contains different types of noises.The specular noises produced over the eye’s surface due to infrared illumination have been removed using the different noise removal functions of the image processing tools of Matlab.The RGB images are converted into binary images and the circular region is calculated for the iris and the pupil.The Hough transform is used for extracting the features as it finds the instances of objects within a certain class of shapes.

    All facial images have certain content that describes the images and differentiates them from other facial images,and this is called Image features.Edges,corner or interest points,BLOB,and ridges provide rich information about image content.Image features are used as input for the facial recognition process following major steps:

    · Detection of face using a camera either solo or from a crowd.

    · Analyzing the geometry of the face using a certain algorithm.Geometry includes the depth of eyes,the distance between eyes and eyebrows,the distance between chin and forehead,the contour of nose,lips,ears,etc.

    · After analyzing the face,the mathematical form called face print is generated that contains the digital information of the facial features.

    · Finally,finding the match of the given person.Matching Image is an important task for a facial recognition system.

    After getting the feature descriptor,the main task is to use the key points of the feature descriptor for matching purposes.The main goal of matching is that it would be able to perfectly match the same images if they are taken from different angles,different viewpoints,different scales,and different camera parameters.Panorama stitching of two different images of the same scene or object and finding key points for matching purposes is the main task of the matching algorithm.

    3.2.1SIFTAlgorithm

    Scale Invariant Feature Transform is a feature extractor algorithm that is invariant to scaling and rotation.SIFT is invariant to rotation,viewpoint,and illumination and gives good results.Continuous improvement is going on SIFT to enhance the performance as well as accuracy.The number of variants introduced with making certain changes in the steps or pipeline of the SIFT algorithm.MOPS,also called Multi-Scale Oriented Patches Descriptor is one of the variants of the SIFT feature descriptor in which patches around the key points is rotated according to the dominant gradient orientation,and after that,the histogram and descriptor are computed.Multi-Scale Oriented Patches consist of normalized patches oriented via blurred local gradient and the features are positioned at Harris Corner.This is useful because by rotating the patch to its dominant gradient orientations all key points have canonical orientation same[20].The SIFT algorithm mainly have following four steps:

    I) Constructing scale space extrema

    II) Localizing key point

    III) Estimating orientation

    IV) Keypoint descriptor.

    3.2.2ScaleSpaceExtremaConstruction

    Using the Difference of Gaussian(DOG),the scale space extrema step locates an intriguing point(invariant to scale and orientation).DOG findings that approximate the Laplacian of the Gaussian.Discovering the value of the pixel that is the maximum or minimum value in the surrounding scale images and around its spatial region is referred to as discovering the extrema in scale space.Extrema Construction first creates a scale space for an image for scale space.Scale-space is created by taking an image and convolving it with the Gaussian.Using the k-time Gaussian operator,convolve a second image of the same scale.

    All these groups of images form an octave.An octave consists of the number of images depending on the value of k.Again,subsample the image and repeat the same process.The scale space group of blurred images of different scales.Blurring is referred to as a technique in which the convolution of the Gaussian operator with every pixel of the image takes place to output blurred images[46].

    To find the extrema,the Laplacian idea is used to find a Gaussian difference by taking the difference between successive Gaussian images and constructing this set for every octave.

    3.2.3KeypointLocalizattion

    This step is for finding the exact location of minima and maxima ie whether it is present either between the two coordinates or between the two scales.

    3.2.4DeterminationofExactLocationandScale

    Taylor Series Expansion is used to find the exact location.To determine the location of the extrema,the derivatives compute the first derivative and second derivative simply by finite differences to find where the actual extrema exists.The low contrast point,as well as the edge point,need to be removed.

    3.2.5EdgeElimination

    Very similar to Harris Corner,Lowe [47] proposed using Hessian of D finding curvature or sharp changes in different direction.Hats Eigen value of Hessian also give good estimate for corner estimation.

    TheTr(H)2/Det(H) is minimum when r=1,when r=1 thenαandβare close to each other or equally high that is useful for finding corner point.SIFT proposes that reject a keypoint ifTr(H)2/Det(H)>a threshold value.

    At the last of this step exact location and scale at every extrema point as well as also selected some stable keypoint by rejecting edges and low contrast point[47].

    3.3 Orientation Estimation

    For rotation invariance orientation estimation is required.This step is used to find the orientation of extrema.For this use scale of point to choose appropriate image:

    After that using finite differences compute gradient magnitude and orientation:

    where gradient magnitude ism(x,y) at every point andθ(x,y) is orientation gradient.The result of this step is magnitude and orientation for every point in a image.

    3.4 Histogram Creation

    To create a histogram,select the area surrounding the key point and consider ?athe orientation and magnitude of all the other key topics.Histogram input is weighted using gradient magnitude and the Gaussian function to increase performance.The histogram will be less dense if certain spots are farther away.Instead of a single point,local factors determine the ?apeak.

    If another peak is within 80 percent of max peak then this also as keypoint with different direction[48].

    3.5 Key-Point Descriptor

    Descriptor gradient information is utilized to locate critical points.Take the 16*16 window size with the nearby key point found for this.This 16 * 16 window should be divided into four 4 * 4 quadrants.Create a histogram of the position of the points inside these quadrants and align it with eight bins.Compared to the closer point,the further point makes up less of the histogram.Create a gradient orientation histogram using 8 histogram bins for each 4 by 4 quadrant.The raw version key point Descriptor is formed at the end of this 128 non-negative vector.16 histograms with 8 values each produced 128 non-negative vectors.The 128-dimensional feature vector is created simply by gradientorienting the area surrounding the key point.In order to decrease the effects of contrast,normalization to unit length is done for 128-d vector.The values are clipped to 0.2 and the resulting vector is once again normalized to unit length to make the descriptor robust to different photometric variations.

    3.6 Results and Discussion

    In this proposed system,two popular antispoofing image and video data sets Casia-surf,Replay attack dataset are used to perform test on our proposed algorithm.

    There are four decisions every biometric system gives.(1)Authorized a legitimate person called True Positive.(2) Authorized an illegitimate person called False Positive.(3) Deny an illegitimate person called True Negative.(4)Deny a legitimate person called False Negative.Our proposed method is evaluated in terms of performance using two different classifiers:decision trees and random forests.Table 4 analysis reveals that decision tree classifiers are more accurate than random forest classifiers in the M2VTS,ORL,and Face 94 databases,respectively,while table analysis also reveals that the accuracy of random forest classifiers is higher in the Yale 2B,FERET,and Face 94 databases.Results for M2VTS,ORL,and FERET are encouraging.

    Table 4: Datasets details used in the proposed work for facial recognition purpose

    Small data sets were the primary cause of Face 94’s performance decline.When it comes to true positive rates,the random forest classifier performs better with Yale2B data sets and the decision tree performs better with M2VTS data sets.The performance is shown in Table 5 as an equal error rate.The classifier’s false positive rate across all datasets is displayed in Tables 6 and 7.The high AUC in Table 8 indicates that the suggested feature set is effective for the facial recognition system.The performance evaluation in terms of execution time is shown in Table 9.The proposed algorithm is compared with different existing algorithms and significant improvements are found for M2VTS,YALE 2B,and Face 94 data sets,and performance diminishes in the case of FERET and ORL.

    Table 5: Performance evaluation(equal error rate)

    Table 6: Performance table true positive rate for random forest classifier

    Table 7: Performance table false positive rate for random forest classifier

    Table 8: Area under curve

    Table 9: Evaluation time in seconds(decision tree)

    4 Conclusion

    A strong facial authentication method is suggested in this study.Two-way authentication is suggested in this architecture.By measuring the change in pupil diameter under various lighting conditions during the image-capturing process,the liveliness of the facial images is first validated.Following the confirmation of liveness,the facial recognition system integrates SIFT and MOPs,two distinct feature descriptors,into a deep neural network architecture for recognition and detection.The accuracy,area under the curve,false positive rate,and true positive rate of two distinct classifier decision trees and random forests are measured.The Yale2B,M2VTS,FERET,ORL,and FACE 94 datasets are used for the training,which has been demonstrated to be computationally effective.By analyzing the results,it is found that the proposed algorithm is an efficient and acceptable method for facial recognition.To sum up,this technique appears to be a strong contender for liveness detection,and it has a lot of potential for real-world application.

    5 Future Scope

    Our proposed algorithm has three limitations and opens the path for future work in this area.First,this algorithm does not include the measurement of elderly people as more elusive changes in their pupil size.Second,the dynamics feature measurement takes time,and the devices designed to capture iris images do not allow additional time during capturing.The third one is drug or alcohol ingestion,which also alters pupil dynamics.

    Acknowledgement:The authors present their appreciation to King Saud University for funding the publication of this research through Researchers Supporting Program(RSPD2023R809),King Saud University,Riyadh,Saudi Arabia.

    Funding Statement:The research is funded by Researchers Supporting Program at King Saud University(RSPD2023R809).

    Author Contributions:The authors confirm contribution to the paper as follows: study conception and design: Puja S.Prasad,Ali Wagdy Mohamed;data collection: Adepu Sree Lakshmi,Hossam M.Zawbaa;analysis and interpretation of results: Sandeep Kautish,Abdulaziz S.Almazyad;draft manuscript preparation: Simar Preet Singh,Rajesh Kumar Shrivastava.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:In this paper,we used open access data,which is available in open repositories for researchers.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    小蜜桃在线观看免费完整版高清| 欧美3d第一页| 色综合亚洲欧美另类图片| 婷婷色综合大香蕉| 五月伊人婷婷丁香| 亚洲综合色惰| 亚洲精品乱久久久久久| 最近手机中文字幕大全| av黄色大香蕉| 大香蕉久久网| 五月伊人婷婷丁香| 一区二区三区四区激情视频| 国产精品国产三级国产专区5o | 免费看a级黄色片| 亚洲av成人av| 禁无遮挡网站| 午夜精品一区二区三区免费看| av福利片在线观看| 日韩大片免费观看网站 | av在线亚洲专区| 波多野结衣高清无吗| 国产黄a三级三级三级人| 日本一二三区视频观看| 青春草视频在线免费观看| 全区人妻精品视频| 日韩制服骚丝袜av| 亚洲欧美日韩卡通动漫| 极品教师在线视频| 人人妻人人澡人人爽人人夜夜 | 亚洲18禁久久av| videossex国产| 亚洲久久久久久中文字幕| 日韩欧美在线乱码| 亚洲自拍偷在线| 乱人视频在线观看| 久久久成人免费电影| 国产精品精品国产色婷婷| 三级毛片av免费| 亚洲丝袜综合中文字幕| 日韩av不卡免费在线播放| 国产伦精品一区二区三区视频9| 狠狠狠狠99中文字幕| 成人鲁丝片一二三区免费| 九九爱精品视频在线观看| 国产探花极品一区二区| 搡女人真爽免费视频火全软件| av视频在线观看入口| 桃色一区二区三区在线观看| 九草在线视频观看| 纵有疾风起免费观看全集完整版 | 日韩国内少妇激情av| 国产在视频线在精品| or卡值多少钱| 国产精品爽爽va在线观看网站| 国产私拍福利视频在线观看| 国产高清视频在线观看网站| 嫩草影院新地址| 久久久久网色| 麻豆精品久久久久久蜜桃| 国产精品美女特级片免费视频播放器| 中文资源天堂在线| 国产不卡一卡二| 两个人视频免费观看高清| 特大巨黑吊av在线直播| 亚洲成人av在线免费| 少妇人妻一区二区三区视频| 亚洲18禁久久av| 国产成人精品婷婷| 亚洲国产精品专区欧美| 亚洲中文字幕日韩| 看免费成人av毛片| 精品一区二区三区人妻视频| 91aial.com中文字幕在线观看| 亚洲av男天堂| 久久久精品欧美日韩精品| 国产美女午夜福利| 色5月婷婷丁香| 麻豆久久精品国产亚洲av| www日本黄色视频网| 久久久久久久午夜电影| 国产黄片视频在线免费观看| 2021少妇久久久久久久久久久| 国产精品美女特级片免费视频播放器| 建设人人有责人人尽责人人享有的 | 国产精品电影一区二区三区| 免费一级毛片在线播放高清视频| 亚洲国产精品合色在线| 人人妻人人澡人人爽人人夜夜 | 久久久久久久国产电影| 亚洲av成人精品一区久久| 日本熟妇午夜| 国产爱豆传媒在线观看| 日本wwww免费看| 菩萨蛮人人尽说江南好唐韦庄 | 1024手机看黄色片| 亚洲精品乱码久久久v下载方式| 看十八女毛片水多多多| 国产成年人精品一区二区| 久久国内精品自在自线图片| 国产成人午夜福利电影在线观看| av免费观看日本| 少妇猛男粗大的猛烈进出视频 | 欧美成人精品欧美一级黄| 大香蕉久久网| 一边亲一边摸免费视频| 国产精品久久久久久精品电影小说 | 3wmmmm亚洲av在线观看| 2021少妇久久久久久久久久久| 国产精品电影一区二区三区| 一区二区三区高清视频在线| 国产亚洲午夜精品一区二区久久 | 天天躁日日操中文字幕| 老师上课跳d突然被开到最大视频| 三级男女做爰猛烈吃奶摸视频| 免费电影在线观看免费观看| 一本久久精品| 亚洲三级黄色毛片| 中文天堂在线官网| 亚洲国产欧美人成| 麻豆精品久久久久久蜜桃| 久久精品国产亚洲av涩爱| 亚洲成人中文字幕在线播放| 亚洲国产精品成人综合色| 精品人妻一区二区三区麻豆| 寂寞人妻少妇视频99o| 国产黄a三级三级三级人| 国产乱来视频区| 亚洲欧美日韩东京热| 亚洲av成人精品一二三区| 最后的刺客免费高清国语| 亚洲av成人精品一区久久| 日韩av在线免费看完整版不卡| 深爱激情五月婷婷| 国产单亲对白刺激| 国产精品一区二区三区四区免费观看| 久久久成人免费电影| 亚洲欧美日韩高清专用| 在线播放无遮挡| 成人三级黄色视频| 色播亚洲综合网| av在线老鸭窝| av.在线天堂| 成年女人永久免费观看视频| a级毛色黄片| 三级经典国产精品| 能在线免费看毛片的网站| 日韩强制内射视频| 国模一区二区三区四区视频| 国产精品熟女久久久久浪| 精品久久久久久成人av| 少妇的逼水好多| 亚洲精品aⅴ在线观看| 成年女人永久免费观看视频| 久久精品夜色国产| 最近最新中文字幕大全电影3| 夜夜看夜夜爽夜夜摸| 精品午夜福利在线看| 国产片特级美女逼逼视频| 久久久精品大字幕| 国产精品不卡视频一区二区| 国语自产精品视频在线第100页| 日韩人妻高清精品专区| 免费av毛片视频| 日日摸夜夜添夜夜爱| 国产单亲对白刺激| 亚洲无线观看免费| 日日啪夜夜撸| 精品久久国产蜜桃| 婷婷色av中文字幕| 小说图片视频综合网站| 国产精品三级大全| 婷婷色av中文字幕| 高清午夜精品一区二区三区| 久久久久久国产a免费观看| 国产69精品久久久久777片| 少妇高潮的动态图| 亚洲自偷自拍三级| 久久人人爽人人片av| 不卡视频在线观看欧美| av免费在线看不卡| 乱系列少妇在线播放| 欧美+日韩+精品| 久久99热这里只有精品18| 在线免费十八禁| 国产精品99久久久久久久久| 国产精品,欧美在线| 热99re8久久精品国产| 国产毛片a区久久久久| 亚洲国产欧美在线一区| 麻豆av噜噜一区二区三区| 精品人妻偷拍中文字幕| 国产精品精品国产色婷婷| 亚洲国产精品国产精品| 久久精品人妻少妇| 亚洲国产精品成人综合色| 啦啦啦韩国在线观看视频| 亚洲国产精品sss在线观看| 午夜免费激情av| 国产在线男女| 26uuu在线亚洲综合色| 国产精品熟女久久久久浪| 国产免费男女视频| 国产精品人妻久久久影院| 青春草国产在线视频| 亚洲av二区三区四区| 久久久久久久午夜电影| 亚洲精品乱码久久久v下载方式| 国产精品综合久久久久久久免费| 一夜夜www| 99热这里只有是精品50| 欧美日本亚洲视频在线播放| 成人无遮挡网站| 成人午夜精彩视频在线观看| 在线观看一区二区三区| 国产真实乱freesex| 国产精品国产高清国产av| 九色成人免费人妻av| 中文字幕免费在线视频6| 边亲边吃奶的免费视频| 欧美zozozo另类| 亚洲av成人精品一区久久| 深夜a级毛片| 亚洲四区av| 少妇熟女aⅴ在线视频| 国产高清视频在线观看网站| 欧美成人免费av一区二区三区| 纵有疾风起免费观看全集完整版 | 床上黄色一级片| 内地一区二区视频在线| 永久网站在线| 免费观看性生交大片5| 十八禁国产超污无遮挡网站| 国产亚洲5aaaaa淫片| 最近中文字幕高清免费大全6| 中文字幕久久专区| www日本黄色视频网| 乱系列少妇在线播放| 波野结衣二区三区在线| 久久久久久国产a免费观看| 国产精品蜜桃在线观看| 免费无遮挡裸体视频| 熟女电影av网| 国产av一区在线观看免费| 免费人成在线观看视频色| 国产白丝娇喘喷水9色精品| 在线观看一区二区三区| 视频中文字幕在线观看| 少妇人妻精品综合一区二区| 国产又黄又爽又无遮挡在线| 国语自产精品视频在线第100页| 3wmmmm亚洲av在线观看| 在线观看美女被高潮喷水网站| 成人二区视频| 国产探花极品一区二区| 精品国产三级普通话版| 日韩亚洲欧美综合| 内射极品少妇av片p| 久久久久久久久久黄片| 一卡2卡三卡四卡精品乱码亚洲| 日本免费一区二区三区高清不卡| 美女内射精品一级片tv| 欧美日本视频| 亚洲av成人av| 国产精品永久免费网站| 日产精品乱码卡一卡2卡三| 毛片女人毛片| 国产毛片a区久久久久| 狂野欧美激情性xxxx在线观看| 内地一区二区视频在线| 亚洲乱码一区二区免费版| 亚洲欧美日韩高清专用| .国产精品久久| 天美传媒精品一区二区| 国产伦精品一区二区三区四那| 久久久成人免费电影| 久久精品国产99精品国产亚洲性色| 1000部很黄的大片| 女人十人毛片免费观看3o分钟| 久久精品熟女亚洲av麻豆精品 | 精品久久久久久久久亚洲| 少妇人妻精品综合一区二区| 亚洲第一区二区三区不卡| 丝袜美腿在线中文| 91狼人影院| 有码 亚洲区| 国产又黄又爽又无遮挡在线| 色噜噜av男人的天堂激情| 建设人人有责人人尽责人人享有的 | 又爽又黄无遮挡网站| 国产一级毛片七仙女欲春2| 国产精品久久久久久av不卡| 91狼人影院| 久久久久久国产a免费观看| 国产高清三级在线| 精品国产三级普通话版| 国产单亲对白刺激| 午夜日本视频在线| 久久久国产成人免费| 国产老妇女一区| 亚洲欧美日韩卡通动漫| 国产又色又爽无遮挡免| 国产一区亚洲一区在线观看| 欧美成人午夜免费资源| 深夜a级毛片| 精品无人区乱码1区二区| 身体一侧抽搐| 亚洲欧美清纯卡通| 国产精品.久久久| 日本免费a在线| 午夜视频国产福利| 国产成人精品婷婷| 久久久a久久爽久久v久久| 国产精品av视频在线免费观看| 又爽又黄无遮挡网站| 欧美又色又爽又黄视频| 久久久国产成人免费| av.在线天堂| 成人无遮挡网站| 成年版毛片免费区| 狠狠狠狠99中文字幕| 欧美日韩国产亚洲二区| 淫秽高清视频在线观看| 美女被艹到高潮喷水动态| 亚洲怡红院男人天堂| 亚洲av电影不卡..在线观看| 久久国产乱子免费精品| 亚洲一区高清亚洲精品| 波多野结衣高清无吗| 国产精品一区www在线观看| 大话2 男鬼变身卡| 男人的好看免费观看在线视频| av福利片在线观看| 91精品伊人久久大香线蕉| 一个人看视频在线观看www免费| 嫩草影院精品99| 亚洲在线自拍视频| 精品国产三级普通话版| 中文字幕制服av| av免费观看日本| 又爽又黄无遮挡网站| 欧美日本亚洲视频在线播放| 日韩一区二区三区影片| 亚洲精品日韩在线中文字幕| 久久久色成人| 国产一级毛片七仙女欲春2| 国产在视频线精品| 国产高清不卡午夜福利| 亚洲婷婷狠狠爱综合网| 网址你懂的国产日韩在线| 国产黄片视频在线免费观看| 日韩一区二区视频免费看| 欧美bdsm另类| 1000部很黄的大片| 国产三级中文精品| 久久久久久国产a免费观看| 老司机影院成人| 一级毛片aaaaaa免费看小| 国产乱人视频| 亚洲欧美日韩卡通动漫| 可以在线观看毛片的网站| 欧美日韩精品成人综合77777| 久久国内精品自在自线图片| 色5月婷婷丁香| 国产高清视频在线观看网站| 蜜桃亚洲精品一区二区三区| 两个人的视频大全免费| 日日干狠狠操夜夜爽| 一级毛片aaaaaa免费看小| 亚洲欧美成人综合另类久久久 | 色综合色国产| 日韩强制内射视频| 国产综合懂色| 深夜a级毛片| 成人性生交大片免费视频hd| 精品少妇黑人巨大在线播放 | 国产精品麻豆人妻色哟哟久久 | 国产成人免费观看mmmm| 91精品国产九色| 91午夜精品亚洲一区二区三区| 亚洲欧美日韩高清专用| 午夜福利网站1000一区二区三区| 国产片特级美女逼逼视频| 中文天堂在线官网| 国产黄色视频一区二区在线观看 | 女的被弄到高潮叫床怎么办| 91av网一区二区| 桃色一区二区三区在线观看| 91aial.com中文字幕在线观看| 一级av片app| av在线观看视频网站免费| 国产69精品久久久久777片| 日韩欧美精品v在线| 三级国产精品片| 黄片无遮挡物在线观看| 成人鲁丝片一二三区免费| 精华霜和精华液先用哪个| 国产91av在线免费观看| 久久99热这里只有精品18| av黄色大香蕉| 99久久中文字幕三级久久日本| videos熟女内射| 国产精品国产三级国产av玫瑰| 国产又黄又爽又无遮挡在线| 亚洲一级一片aⅴ在线观看| 久久久久久久亚洲中文字幕| 高清av免费在线| 麻豆一二三区av精品| 国产亚洲最大av| 97超碰精品成人国产| 欧美一区二区亚洲| 九草在线视频观看| 亚洲婷婷狠狠爱综合网| 亚洲国产高清在线一区二区三| 国产精品嫩草影院av在线观看| 一区二区三区高清视频在线| 午夜激情欧美在线| 国产午夜精品久久久久久一区二区三区| 女人被狂操c到高潮| 成人三级黄色视频| 精品无人区乱码1区二区| 永久免费av网站大全| 久久99热这里只频精品6学生 | 成年版毛片免费区| 日本色播在线视频| 热99在线观看视频| 亚洲av一区综合| 久久久欧美国产精品| 草草在线视频免费看| 免费黄色在线免费观看| 免费观看在线日韩| 美女xxoo啪啪120秒动态图| 韩国av在线不卡| 久久久亚洲精品成人影院| 久久久国产成人免费| 18+在线观看网站| 亚洲av.av天堂| 久久久国产成人精品二区| 国产熟女欧美一区二区| 狂野欧美激情性xxxx在线观看| kizo精华| 97在线视频观看| 久久久a久久爽久久v久久| av国产免费在线观看| 亚洲欧美日韩卡通动漫| 久久久久久久久久成人| 我要看日韩黄色一级片| 成人一区二区视频在线观看| 草草在线视频免费看| 欧美丝袜亚洲另类| 黄色一级大片看看| 噜噜噜噜噜久久久久久91| 国产探花在线观看一区二区| 亚洲精品色激情综合| 日韩欧美国产在线观看| 国产成人免费观看mmmm| a级毛色黄片| 久久久久性生活片| 欧美激情国产日韩精品一区| 天堂√8在线中文| 久久精品国产亚洲av天美| 成人国产麻豆网| 精品久久久久久成人av| 国产精品av视频在线免费观看| 亚洲国产精品久久男人天堂| 亚洲国产精品sss在线观看| 男插女下体视频免费在线播放| 精品国产露脸久久av麻豆 | 亚洲乱码一区二区免费版| 在线播放国产精品三级| 免费观看精品视频网站| 亚洲美女视频黄频| 午夜福利成人在线免费观看| 日韩欧美精品v在线| 久久精品国产亚洲av天美| 国产高清视频在线观看网站| 久久久久免费精品人妻一区二区| 美女内射精品一级片tv| 午夜福利在线观看免费完整高清在| 精品人妻熟女av久视频| 欧美日韩精品成人综合77777| 亚洲天堂国产精品一区在线| 久久久久久大精品| 精品酒店卫生间| 亚洲精品国产av成人精品| 边亲边吃奶的免费视频| 嘟嘟电影网在线观看| www日本黄色视频网| 老司机福利观看| 哪个播放器可以免费观看大片| 国产美女午夜福利| 亚洲电影在线观看av| 男插女下体视频免费在线播放| 亚洲av日韩在线播放| 亚洲人与动物交配视频| 亚洲国产高清在线一区二区三| 性色avwww在线观看| 看黄色毛片网站| 亚洲av福利一区| av线在线观看网站| 看非洲黑人一级黄片| 国产单亲对白刺激| 国产精品无大码| 色视频www国产| 欧美又色又爽又黄视频| 秋霞在线观看毛片| 免费看a级黄色片| 欧美成人免费av一区二区三区| 97超视频在线观看视频| 国产伦在线观看视频一区| 一区二区三区免费毛片| 久久欧美精品欧美久久欧美| 99久久人妻综合| 久久精品综合一区二区三区| 网址你懂的国产日韩在线| 简卡轻食公司| 久久精品夜夜夜夜夜久久蜜豆| 国产淫语在线视频| 两个人视频免费观看高清| 亚洲av日韩在线播放| 国产精品伦人一区二区| 亚洲av福利一区| 伊人久久精品亚洲午夜| 国产精品熟女久久久久浪| 日韩欧美精品v在线| 男女那种视频在线观看| 免费大片18禁| 亚洲中文字幕一区二区三区有码在线看| 99热全是精品| www.色视频.com| 小蜜桃在线观看免费完整版高清| 美女内射精品一级片tv| 久久久午夜欧美精品| 午夜精品国产一区二区电影 | 国产成人精品久久久久久| 久久精品国产99精品国产亚洲性色| 亚州av有码| 特级一级黄色大片| 好男人在线观看高清免费视频| 村上凉子中文字幕在线| 国产成人精品一,二区| 校园人妻丝袜中文字幕| 两个人的视频大全免费| 亚洲人成网站在线播| 久久久久久国产a免费观看| 三级经典国产精品| 99热6这里只有精品| 精品久久久久久电影网 | 欧美成人a在线观看| 亚洲精品乱码久久久久久按摩| 久久精品国产亚洲av天美| 国产精品爽爽va在线观看网站| 亚洲精华国产精华液的使用体验| 嫩草影院精品99| 一级av片app| 免费一级毛片在线播放高清视频| 最新中文字幕久久久久| 特大巨黑吊av在线直播| 久久精品夜夜夜夜夜久久蜜豆| 国产乱人偷精品视频| 变态另类丝袜制服| 免费一级毛片在线播放高清视频| 少妇裸体淫交视频免费看高清| av天堂中文字幕网| 毛片一级片免费看久久久久| 精品一区二区三区人妻视频| 99热6这里只有精品| www日本黄色视频网| 真实男女啪啪啪动态图| a级毛片免费高清观看在线播放| 成人高潮视频无遮挡免费网站| 一级毛片我不卡| 国产高潮美女av| 免费看av在线观看网站| 久久久久久久久大av| 欧美变态另类bdsm刘玥| 成人午夜高清在线视频| 亚洲中文字幕日韩| 狂野欧美白嫩少妇大欣赏| 欧美日韩精品成人综合77777| 观看免费一级毛片| or卡值多少钱| av福利片在线观看| 亚洲成人久久爱视频| 少妇人妻一区二区三区视频| 亚洲国产精品国产精品| 国产黄a三级三级三级人| 亚洲在久久综合| 毛片一级片免费看久久久久| 天堂中文最新版在线下载 | 亚洲在久久综合| 日日摸夜夜添夜夜爱| 最近中文字幕2019免费版| 男女视频在线观看网站免费| 亚洲中文字幕日韩| 久99久视频精品免费| 欧美日本亚洲视频在线播放| 九九爱精品视频在线观看| 日韩欧美三级三区| 国产精品电影一区二区三区| 免费观看人在逋| 少妇高潮的动态图| 男人和女人高潮做爰伦理| 亚洲精品日韩在线中文字幕| 中文字幕制服av| 国产精品人妻久久久影院| 国产伦一二天堂av在线观看| 成人av在线播放网站| 七月丁香在线播放| 黄色配什么色好看| 最近的中文字幕免费完整| 日韩大片免费观看网站 | 99九九线精品视频在线观看视频| 国产精品一区二区性色av| 建设人人有责人人尽责人人享有的 | 少妇人妻精品综合一区二区|