• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A New Double Layer Multi-Secret Sharing Scheme

    2024-02-29 10:35:14ElavarasiGunasekaranVanithaMuthuraman
    China Communications 2024年1期

    Elavarasi Gunasekaran,Vanitha Muthuraman

    Department of Computer Applications,Alagappa University,Karaikudi,India

    Abstract: Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing (VSS) is an encryption method in which the secret message is split into at least two trivial images called‘shares’to cover it.However,such message are always targeted by hackers or dishonest members who attempt to decrypt the message.This can be avoided by not uncovering the secret message without the universal share when it is presented and is typically taken care of,by the trusted party.Hence,in this paper,an optimal and secure double-layered secret image sharing scheme is proposed.The proposed share creation process contains two layers such as threshold-based secret sharing in the first layer and universal share based secret sharing in the second layer.In first layer,Genetic Algorithm(GA)is applied to find the optimal threshold value based on the randomness of the created shares.Then,in the second layer,a novel design of universal share-based secret share creation method is proposed.Finally,Opposition Whale Optimization Algorithm(OWOA)-based optimal key was generated for rectange block cipher to secure each share.This helped in producing high quality reconstruction images.The researcher achieved average experimental outcomes in terms of PSNR and MSE values equal to 55.154225 and 0.79365625 respectively.The average PSNRwas less(49.134475)and average MSE was high(1)in case of existing methods.

    Keywords: genetic algorithm;oppositional whale optimization algorithm;rectangle block cipher;secret sharing scheme;shares;universal share

    I.INTRODUCTION

    Rapid development of internet technology eased a lot of works for clients,yet it opened a Pandora’s Box in terms of uncovering individual’s confidentiality information.The exposure of individual’s information causes much inconvenience to the clients due to which there is a number of individuals started looking for securing their private information to overcome the security issues [1].Cryptography and secret sharing are the most well-known methodologies to safeguard the privacy of private information.Cryptography is a method in which the information is changed from a clear state to evident nonsense so that the authenticated units that have permission to encryption key can decrypt the cycle and gain access to the information in its original readable form[2].The main benefits of such encryption components are as follows:(1)Clients have the complete access control for the information shared rather than the service provider and(2)the security properties strongly rely upon cryptography methods,instead of conventional access control[3].Secret sharing is a process in which the shares are only partitioned so that even if a share gets exposed,it has no value or benefit.The superimposition of shares brings back the original secret image[4].

    Secret sharing system was presented by Shamir and Blakley to autonomously secure a secret among a collection of members.Naor and Shamir conceived the concept of secret sharing to shield a binary secret image.In their study,Visual Cryptography(VC)concept was proposed [5,6].In Shamir’s polynomial-based SIS,for (k,n) threshold,the secret image is partitioned into stable coefficient for an arbitrary(k ?1)-degree polynomial to acquire n shadows.These shadows are then additionally shared among n members[7,8].

    These techniques accompany some issues that needs to be resolved.The created shadows in the above plans are irrelevant (containing noise) and straightforwardly excites the hackers when communicated in public channel.Thus it enables a security danger consequently.There is no assurance in VCS that every member is straightforward and untruthful members falsify shadows to spoof.When these two issues occur,there occurs an issue in the rebuilding of secret image[9].For certain applications,the secret image should be restored with high quality image.For instance,consider a war map (i.e.,military image) which should be shared among different solders to accomplish joint tasks[10].

    Keeping in mind the above issues,following is the list of contributions made in the study which developed a robust and secured double layered secret image sharing scheme with block ciphers.The main contributions of the article are as follows.

    ? Security of the proposed secret sharing method is enhanced through dual layer secret sharing followed by the encryption of shares

    ? The first layer of share creation is simply made through threshold-based method.Here,the threshold is intelligently selected(based on maximum entropy)so that it not only depicts the secret data but also not destroy the quality of image during retrieval

    ? Universal share-based VSS is employed in this study to secure from dishonest participants and provide easier management of shares

    ? Finally,the shares are encrypted using block ciphers,where the key is selected in an optimal manner so that the secret data possess better quality after decryption.In this way,confidential data can be preserved securely with better quality.

    The paper is organized as given herewith.Section I provides a detailed introduction about secret sharing and cryptography to maintain data confidentiality.Section II contains a wide range of literature works.In Section III,a brief representation of the proposed approach is given.Also,the experimental result and analysis are discussed in Section IV.Finally,conclusion is given in Section V.

    II.RELATED WORKS

    Saeideh Kabirirad and Ziba Eslami[11]demonstrated that a few methods do not meet the security requirements i.e.,with information on(n ?1)or less shares,the significant data about the secret image can be retrieved only after restoration the calculations.The researchers further proposed an improvement which effectively improved the reported security faults.The authors demonstrated that the improved plan produced pseudorandom shares and outperformed the existing secure Boolean-based plans in computational expense.

    Xiaotian Wu et al.[12] accepted secret sharing as an optimum method in reversible information hiding using the encoded images.The authors presented an essential model in which secret sharing was utilized for reversible information hiding in encoded images.At that point,the study proposed an image encryption algorithm in which Shamir’s secret sharing methodology was utilized.

    Li et al.[13],proposed an encryption method using another additive homomorphism dependent on Elliptic Curve ElGamal (EC-ElGamal) to share the secret images over unstable channel.The method empowered short keys and preferable efficiency in the plans that are dependent on RSA or ElGamal.It had a low calculation overhead in image decoding in contrast to the techniques that utilize other additive homomorphic properties in EC-ElGamal.Elliptic curve boundaries were chosen to oppose the Pohlig–Hellman,Pollard’srho,and Isomorphism attacks.

    Yogesh K.Meghrajani et al.[14]introduced a computationally proficient arithmetic multi-secret image sharing plan in which all the universal shares were utilized.Binary arithmetic plan used individual value choosing function at the time of encoding and decoding the secret images.The individual value choosing function upgrades the arbitrariness of shares and satisfies the threshold feature.Hence,the strategy achieved computational proficiency while fulfilling the threshold security models.

    Xuehu Yan et al.[15]proposed a SIS plot for(k,n)threshold with different shadow validation capacities based on SIS itself,instead of data hiding.This was accomplished by applying Visual Secret Sharing(VSS) to polynomial-based SIS in which a screening activity was utilized.The plan had low generation and reconstruction complexity and no pixel extension with different shadow validation capacities.Also,it attained lossless restoration without secondary encryption.

    Xiangru Liu et al.[16] proposed an optical multilevel authentication technique based on Singular Value Decomposition Ghost Imaging (SVDGI) method and(t,n) threshold secret sharing plan.SVDGI is a productive restoration technique in Ghost Imaging (GI)that changes the measurement matrix with the assistance of singular value decomposition.This action empowers the restoration of N-pixel image using a significantly lesser value than N measurement with less time and high quality.

    Yanxiao Liu et al.[17] considered a cheating dilemma in bivariate polynomial-based secret sharing plan and suggested two cheating recognition algorithms.The first algorithm could distinguish the cheaters using m users who participate in the restoration of secret;the subsequent algorithms could accomplish high capacity cheater recognition with a coordinated effort from the rest of n ?m users who are not associated in secret restoration.

    Marek R.Ogiela and Urszula Ogiela [18] examined new opportunities to make threshold methods for secret sharing based on the utilization of numerical linguistic formalisms.Such strategies depend on well-known data parting threshold schemes that are stretched out by including an additional stage,during when the bit blocks of shared data are coded with the help of appropriately characterized context-free grammar.

    Xuehu Yan et al.[19] considered Partial Secret Im-age Sharing (PSIS) issue and suggested PSIS design for (k,n) threshold based on image in painting and Linear Congruence (LC)-based SIS.The full secret image and the secret target part with its different parts would get restored by gathering any k or more shadow images.These could be additionally rebuilt without any loss by including all the implanted meaningful shadow images.

    Elavarasi et al.[20] proposed a new real time biometric model based on Deep Learning (DL) architecture called Hierarchical Convolutional Neural Network (HCNN).At the beginning,the boundaries are attained from the given image for providing ROI to a subsequent level.Next,the resultant image comprises of upper region as well as lower eyelids along with skin,eyelashes,and sclera.At the next level,inside the ROI,H-CNN is employed to provide the real iris boundary with the help of learned features.

    Xiaopeng Deng et al.[21] proposed a threshold multi-secret sharing system based on phase-shifting interferometry.K secret images that are to be shared,were initially encoded by Fourier transformation.Then,the encoded images were shared into many shadow images depending on the recording guideline of phase-shifting interferometry.

    III.THE PROPOSED OPTIMAL DOUBLE LAYER SECRET SHARING SCHEME

    The most ideal approach to ensure the secrecy of the data is to encode it with the help of cryptographic strategy,ahead of time i.e.,before sharing.Visual Secret Sharing (VSS) is an encryption method which is used to encrypt a message into at least two trivial images,called ‘shares’.Shares are stacked together to decode the secret message with the help of human visual framework.Prevention of cheating and security are modern characteristics of VSS methods.It also functions for certain members(frauds)to introduce false shares to restore the fake secret images in order to deceive the remaining members(victims).Further,any unknown person may reconstruct the fake secret images by delivering false share to deceive the actual members.VSS method is deemed to be a highly protective method in which the possibility of hacking is very less.Additionally,share management turns out to be a step-by-step and troublesome process with expanding number of secret images.Thus,in order to tackle the share management issues and to prevent the hackers from decrypting the message,the idea of universal sharing is presented.Under such conditions,the secret must not be uncovered without the universal share.This is probably achieved by the trusted party (coordinator).Hence,in this research work,an optimal and secure doublelayered secret image sharing scheme is proposed using universal share and rectangle block cipher.Here,the secret image is securely shared in two layers.The first layer involves threshold-based sharing whereas a unique threshold value is picked optimally for every distinct secret image.In the next layer,universal share-based secret sharing is performed after dividing the first layer shared images into quadrants.Prior to transmission,the created shares are once again encrypted with rectangle block cipher so as to enhance the security.Again,the encryption step is optimized with an optimal key selection strategy using Opposition Whale Optimization Algorithm(OWOA).This algorithm helps in the selection of key since the PSNR of decrypt share is almost similar.At the receiver end,the decrypt key is verified to decrypt the encrypted shares.This is followed by the reconstruction of shares with universal share for recovery at first layer.Then,in second layer recovery,simple XOR operation is performed to recover the original secret image.The schematic diagram of the proposed double layer secret image sharing scheme is given in Figure 1.

    Figure 1. The proposed double layer secret image sharing scheme.

    3.1 Layer 1: Genetic Algorithm Based Threshold Creation

    The proposed double layered secret image sharing scheme is composed of the execution of two different secret sharing schemes in two layers.The first layer is processed with adaptive threshold-based secret sharing scheme.In this layer,the threshold value is selected adaptively based on the randomness of image shares to be produced after the first layer.Here,Genetic Algorithm(GA)[22]plays a vital role in generating the optimal threshold value.

    3.1.1 Threshold Selection by Genetic Algorithm

    Genetic Algorithm(GAs)is a heuristic search and optimization algorithm which is stimulated by natural evolution process [23].This has been effectively applied in a wide range of real-world issues of huge complications.The proposed threshold-based share creation method applies GA to adaptively generate the optimal threshold value.At this time,a set of thresholds is randomly generated among which the optimal one is selected and stored during every iteration.All random threshold values are applied whereas the entropy value is calculated between the shared and secret images.The optimal threshold value is decided based on the maximum entropy value found from the shared images.Once the threshold value Th is found,share creation is executed for each pixel location (p,q) as given herewith.

    where,X1(p,q) and X2(p,q) are the locations of the pixel shares and V represents the current pixel value of secret image.Likewise,the two images X1and X2are produced by performing the above thresholding procedure for all the pixel values.The obtained shares,from the first layer share creation method,are again shared with universal share-based share creation method.

    3.2 Layer 2: Universal Share Creation Procedure

    Universal share based VSS method is usually carried out to escape from dishonest participants and to ease the share management process that occurs in case when more secret images are to be shared.The proposed universal share-based share creation method is executed at the second layer of secret sharing,since it is applied to the image shares obtained from previous layer.At this stage,the image shares are further divided into four quadrants(X1→q1,q2,q3,q4& X2→q5,q6,q7,q8) and distinct shares (S1,S2,S3,S4,S5,S6,S7,S8) are created for every quadrant.

    3.2.1 Steps in Universal Share Based Share Creation Approach

    Let the input images(i.e.quadrants of shared images obtained from first layer)be,Q={q1,q2,...,q8}and the corresponding outputs denote the shared images.S={S1,S2,...,S8} denotes the steps involved in universal share-based share creation method which is detailed herewith.

    Step 1: Generate Universal Share

    Universal share U is generated by the encrypted combination of quadrants of two images X1and X2by XOR operation.Here,the encrypted combination is given below.

    where,C denotes the block cipher and symbol ⊕represents the XOR operation.

    Step 2: Share Construction

    Using the universal share,the shares S={S1,S2,...,S8}are created using the formulas given below.

    Therefore,the general formula for share creation with universal share is represented herewith.

    The size of universal share and every created share remains in the form of one fourth of the original image.Therefore,the shares are organized(as shown in Figure 2)with universal share in such a unique manner so that the size of the shared images are similar to the size of original image.

    Figure 2. Organization of the quadrant share.

    As a result,four shares are obtained.The obtained secret shares are further encrypted using optimal key rectangle block cipher.

    3.3 Optimal Key Generation for Rectangle Block Cipher

    RECTANGLE is an iterated block cipher with a key length of 80 or 128 bits for a 64-bits plain text or a block [24].RECTANGLE uses SP(SubstitutionPermutation)-network whereas the substitution layer includes 16 quantities of 4×4 substitution boxes (SBoxes) in parallel.Permutation layer contains 16-bit revolutions to provide better diffusion.Additionally,the RECTANGLE goes through a round change during when the SP-network cipher performs 25-rounds.During every round,out of the 25 rounds,there occurs three phases such as(i)Round key addition,(ii)Sub-Column S-box and(iii)Row shifting.In round key addition,the bitwise XOR of the round sub key with intermediate state is performed.Next,the parallel utilization of S-boxes to each column is done at sub-column S-box stage.At last,the row shifting is finished by left rotation to each row over different offsets.Here,the rotation offsets might be 0,1,12 and 3 for row 0 to row 3.

    In a RECTANGLE block cipher,the keys are planned as either 80 or 128 pieces.On the off chance,when the seed key is 80-bit it is put away in an 80-bit key register first and then organized as a 5x16 array of bits.Likewise,for 128-bit seed key,it is arranged in a key register according to the size and then sorted out as a 4×32 array of bits.

    However,the proposed optimal key RECTANGLE block cipher method selects the key optimally (especially in 80 bits or 128 bits)based on the decrypted image quality with the help of Oppositional Whale Optimization algorithm(OWOA).The proposed optimal key rectangle block cipher method helps the entire secret sharing scheme,since the optimal key is selected based on maximum PSNR value and does not visually modifies the secret image.

    3.3.1 Key Optimization by Oppositional Whale Optimization Algorithm

    WOA is a bio-motivated meta-heuristic optimization algorithm that mimics the food search characteristics of humpback whales [25].Humpback whales follow a bubble-netting system and communicate with other whales by producing sounds as soon as it finds a prey.After the prey is captured,it is attacked following swim-up mechanism.The humpback whale behavior can be numerically represented through multiple stages,for instance search for prey,bubble-net development,enclosing the prey and swim-up system to attack the fish.Here,the oppositional WOA is applied in producing the ideal keys for rectangle block cipher based encryption strategy.In oppositional WOA,contrary solutions are produced that may get the opportunity of drawing the solution nearby the ideal than the random initial solutions.It could be executed to upgrade the efficiency of customary optimization techniques.

    Listing 1: Oppositional Whale Optimization Algorithm for Key Optimization

    3.4 Secret Image Reconstruction

    Secret image reconstruction method is not only just the reverse of the proposed secret sharing scheme but it is also an easier process than the latter.The received shares are in encrypted form and are decrypted by the application of appropriate key values.Once the shares are decrypted,the original secret image can be retrieved from the proposed secret image recovery method.As mentioned in the proposed double-layered secret sharing,the first layer secret reconstruction is initiated by offering a universal share.Then,a few strategies similar to the proposed sharing method is followed to recover the secret image quadrants(at first layer).Here,the image quadrants are found from the first layer and are merged.Then,a simple XOR operation is carried out to obtain the original secret image.The detailed structure of the proposed secret image retrieval scheme is shown in Figure 3.

    Figure 3. The proposed secret image retrieval scheme.

    3.5 Steps in Secret Image Reconstruction Approach

    Let the input be shared images S={S1,S2,...,S8}and the corresponding outputs are the secret image.The steps involved in secret image reconstruction method are as follows.

    Step 1: Provide Universal Share

    Initially,the universal share U is provided.

    Step 2: Secret Image (Quadrant) Reconstruction:First Layer

    Now,the secret images of the first layer(i.e.quadrants) are found with the details of universal share.Then the quadrants Q={q1,q2,...,q8} are derived as follows.

    Step 3: Merge the Quadrants

    In this step,the quadrants are merged together.The first four quadrants are merged together to form the first secret image whereas the remaining quadrants are merged to form the second secret image.

    Step 4: Secret Image Reconstruction: Second Layer

    This is the final step in which the merged images from Step 3 undergo XOR operation followed by the recovery of secret image.

    IV.RESULT AND DISCUSSION

    4.1 Experimental Setup

    The researcher conducted the experiments and the results were obtained for the proposed double layered secret sharing approach.These experiments were conducted in a PC loaded with following configurations;MicrosoftWindows 10,64-bit operating system,Math Works MATLAB R2014b stage and 4 GB of RAM and CPU IntelPentium 1.9 GHz.

    The experiments were conducted upon a database comprising 200 test images.However,only a few sample images such as ‘BoatsColor.bmp’,‘Zelda-Color.bmp’,‘barbara.bmp’,‘cablecar.bmp’,‘goldhill.bmp’,‘fingerprint 1.bmp’,‘fingerprint 2.bmp’,‘Iris 1.bmp’,‘Iris 2.bmp’ and ‘fingerprint 3.bmp’ is shown in Figure 4.Moreover,all the experiments were conducted for the given set of test images whereas the results for‘BoatsColor.bmp’,‘ZeldaColor.bmp’,‘barbara.bmp’ and ‘cablecar.bmp’ are detailed in the upcoming sections.

    Figure 4. Biometric images.

    Figure 5. PSNR results of the proposed scheme.

    Figure 6. PSNR comparison between the proposed and the existing schemes.

    Figure 7. MSE comparison between the proposed and the existing schemes.

    Figure 8. PSNR comparison between the proposed and existing schemes with and without optimization.

    Figure 9. MSE comparison among the proposed and existing scheme with and without optimization.

    4.2 Experimental Results

    The proposed scheme secures the secret images using double-layered secret sharing method.Here,the secret color images are shared as two layers.The first layer is threshold-based and the other layer is universal sharebased.The intermediate results of the proposed secret image sharing method for‘Barbara’image is given in Table 1.

    Table 1. Secret image sharing results for‘Barbara’image.

    In Table 1,the columns 2 and 3 represent the shares created in subsequent layers.Finally,the shared images were combined with the help of universal share and are shown in the last column.After combining the shares,four shares of similar size were obtained as a secret image.The final shares were then encrypted using OWOA-based optimal key Rectangle Block Cipher.Then,the encrypted images alone were transferred to ensure the security.The encrypted shares were retrieved through decryption with appropriate keys.The results for encryption and decryption processes of the secret shares are given in Table 2.

    Table 2. Secret shares encryption results for‘Barbara’image.

    At last,the decrypted and combined image shares were separated to produce the layer 2 shares.Based on layer 2 shares,share reconstruction process was executed to get the layer 1 shares.Then,the layer 1 shares were concatenated to produce the reconstructed secret image.Table 3 shows the step-by-step reconstruction process of the secret image.

    Table 3. Reconstruction result for Barbara image.

    4.3 Performance Analysis

    In this stage,the performance of the proposed doublelayered secret sharing method was analyzed by computing the PSNR and MSE measures between the original and reconstructed images.The PSNR and MSE values attained from the proposed double-layered se-cret sharing model are shown in Table 4.

    Table 4. PSNR and MSE values between original and the reconstructed images.

    Between the PSNR and MSE values,shown in Table 4,PSNR value is better and higher than55.Also,the MSE value being 1 is very less for all the images.This shows the best capacity of the proposed technique during reconstruction.

    4.4 Comparison

    In this section,the results attained earlier from the proposed scheme and existing scheme (our previous work)were compared.This comparison is also inclusive of the proposed scheme applied with SIMON ciphers.Table 5 shows the results achieved from both PSNR and MSE metrics.The obtained values illustrate that the PSNR and MSE values got heavily increased in the proposed strategy in comparison with existing techniques.Furthermore,the PSNR values of ‘BoatsColor.bmp’,‘ZeldaColor.bmp’,‘barbara.bmp’and‘cablecar.bmp’were 55.2146,55.1745,55.0533,and 55.1745 respectively.The existing schemes achieved only the following PSNR values such as 49.1344,49.1347,49.1341,and 49.1347 respectively.However,the proposed method when applied with SIMON ciphers,the researchers achieved the PSNR values such as 50.3455,52.8943,51.7893 and 51.87934 respectively.Those values attained by the existing methods were lesser than the proposed outcomes.This indicates that the quality of reconstructed image obtained through the proposed scheme is better in comparison with existing schemes.Similarly,the MSE values were also less for the proposed method comparing to existing methods.

    Table 5. Comparison between the proposed and the existing schemes.

    From the above results,it is clear that the reconstructed image quality of the proposed technique is proficient than the existing strategies.

    At last,the proposed approach was analyzed with and without other optimization methods.Both PSNR and MSE values were compared for the proposed method with and without other optimization methods and the results are shown in Table 6.

    Table 6. Comparison of PSNR and MSE values for the proposed method without and with other optimization methods.

    Table 6 shows the resultant of PSNR and MSE values attained for the proposed double-layered secret sharing scheme with OWOA-based Rectangle Block cipher,with WOA,OALO optimization method and without any optimization methods.Out of the obtained PSNR values,the PSNR ofthe proposed scheme with OWOA was outstanding than other schemes.Also,the PSNR values of’BoatsColor.bmp’,’ZeldaColor.bmp’,’barbara.bmp’ and ’cablecar.bmp’were 55.2146,55.1745,55.0533,and 55.1745 respec-tively for the proposed method with OWOA.Further,the PSNR values were 53.0176,53.4761,54.0071,53.8147 for WOA;and 49.1344,49.1347,49.1341,49.1347 for OALO and 46.8642,46.7947,46.7047,46.7147 for without optimization.From the above values,it can be inferred that the PSNR values were high for the proposed method and the maximum PSNR was 55.2146.These values were also attained for’BoatsColor.bmp’,when processed through the proposed scheme.Compared to all above optimization methods,the approach with no optimization methods produced the least PSNR value.To conclude,it is clearly proven that the PSNR value for the proposed scheme is high.This indicates the achievement of a better quality image during secret image reconstruction.The proposed scheme outperformed all other methods in terms of performance.

    V.CONCLUSION

    In this research work,a robust and secure doublelayered secret image sharing scheme with universal share and rectangle block cipher was proposed.Here,the secret sharing is done at two layers and both the layers use a novel share creation method.To be specific,the first layer(threshold-based)uses Genetic Algorithm method for threshold selection whereas the second layer(universal share-based)uses specific calculations.At last,the shares are encrypted through Opposition Whale Optimization algorithm (OWOA)based optimal key rectangle block cipher while the key is selected optimally using OWOA.The performance of the proposed scheme was analyzed against existing approaches with and without optimization methods.The researcher conducted the experimentation and maximum PSNR value i.e.,55.2146 was achieved from the proposed scheme.This value was far better than the existing methods.The result established the efficiency of the proposed scheme in producing high quality secret reconstruction image.In future,the proposed secret sharing scheme should be enhanced in order to avoid the usage of additional encryption methods.

    ACKNOWLEDGEMENT

    This research work has been supported by RUSA PHASE 2.0,Alagappa University,Karaikudi,India.

    CONFLICT OF INTEREST

    The authors express that they have no conflict of interest.

    国产日韩一区二区三区精品不卡| 久久热在线av| 青青草视频在线视频观看| 午夜免费鲁丝| 嫩草影院入口| 久久久久网色| 日韩 亚洲 欧美在线| 一级黄片播放器| 999精品在线视频| 97在线人人人人妻| 国产xxxxx性猛交| 亚洲视频免费观看视频| www.av在线官网国产| 欧美激情高清一区二区三区 | 欧美日韩av久久| av网站在线播放免费| 一本—道久久a久久精品蜜桃钙片| 纵有疾风起免费观看全集完整版| 男女边摸边吃奶| 国产 一区精品| 在线观看免费午夜福利视频| 午夜老司机福利片| 在线观看三级黄色| 黄片播放在线免费| 久久综合国产亚洲精品| 男女国产视频网站| 亚洲精品av麻豆狂野| 两性夫妻黄色片| 欧美日韩福利视频一区二区| 性少妇av在线| 日本猛色少妇xxxxx猛交久久| 综合色丁香网| 精品一区二区三卡| 9热在线视频观看99| 亚洲图色成人| 人人澡人人妻人| 久久久精品国产亚洲av高清涩受| 永久免费av网站大全| 精品少妇黑人巨大在线播放| 国产色婷婷99| 精品国产超薄肉色丝袜足j| 在线免费观看不下载黄p国产| 黄色视频在线播放观看不卡| 亚洲 欧美一区二区三区| 亚洲成国产人片在线观看| 日本wwww免费看| 人人妻人人澡人人看| 美女主播在线视频| 成人手机av| 日韩熟女老妇一区二区性免费视频| 三上悠亚av全集在线观看| 卡戴珊不雅视频在线播放| 老司机靠b影院| 五月天丁香电影| 精品卡一卡二卡四卡免费| 中国国产av一级| 国产男女内射视频| 日韩中文字幕视频在线看片| 在线观看三级黄色| 十分钟在线观看高清视频www| 1024视频免费在线观看| 亚洲第一青青草原| 中文字幕制服av| 免费黄色在线免费观看| 水蜜桃什么品种好| 涩涩av久久男人的天堂| 国产精品99久久99久久久不卡 | 久久免费观看电影| 久久久久久久久久久久大奶| 日韩伦理黄色片| 国产精品 国内视频| 欧美人与性动交α欧美精品济南到| 亚洲一卡2卡3卡4卡5卡精品中文| 欧美激情极品国产一区二区三区| 亚洲专区中文字幕在线 | 人成视频在线观看免费观看| 亚洲精品aⅴ在线观看| 久久99一区二区三区| 亚洲欧美一区二区三区黑人| 国产有黄有色有爽视频| 亚洲成色77777| www.av在线官网国产| 国产成人精品福利久久| 亚洲人成77777在线视频| 久久精品人人爽人人爽视色| 天天添夜夜摸| 你懂的网址亚洲精品在线观看| 女人久久www免费人成看片| 一本一本久久a久久精品综合妖精| 亚洲,欧美精品.| 国产又爽黄色视频| av在线老鸭窝| 亚洲伊人色综图| 极品少妇高潮喷水抽搐| 99久久人妻综合| 女人高潮潮喷娇喘18禁视频| 久久精品国产a三级三级三级| 久久人人97超碰香蕉20202| 免费黄网站久久成人精品| 久久久久久久国产电影| 欧美精品高潮呻吟av久久| 欧美日韩亚洲综合一区二区三区_| 99热网站在线观看| 日韩免费高清中文字幕av| av在线app专区| 色网站视频免费| 桃花免费在线播放| 丝袜脚勾引网站| 在线观看免费视频网站a站| 男女下面插进去视频免费观看| 一级片'在线观看视频| 男人爽女人下面视频在线观看| 国产淫语在线视频| 街头女战士在线观看网站| 我的亚洲天堂| 亚洲国产精品国产精品| 男女下面插进去视频免费观看| √禁漫天堂资源中文www| 一级a爱视频在线免费观看| 考比视频在线观看| 哪个播放器可以免费观看大片| 久久青草综合色| 亚洲美女搞黄在线观看| 最近最新中文字幕大全免费视频 | 2021少妇久久久久久久久久久| 国产日韩欧美在线精品| 性高湖久久久久久久久免费观看| 成年美女黄网站色视频大全免费| 视频在线观看一区二区三区| 最新的欧美精品一区二区| 国产av码专区亚洲av| 90打野战视频偷拍视频| 成人亚洲精品一区在线观看| 国产女主播在线喷水免费视频网站| 男人操女人黄网站| 美女主播在线视频| 18禁裸乳无遮挡动漫免费视频| 久久久国产一区二区| 伦理电影免费视频| 中文字幕精品免费在线观看视频| 久热爱精品视频在线9| 精品亚洲乱码少妇综合久久| 欧美黑人精品巨大| 亚洲国产日韩一区二区| 亚洲欧美精品自产自拍| 最新的欧美精品一区二区| 99热网站在线观看| 一级片'在线观看视频| av国产精品久久久久影院| 国产在视频线精品| 国产 精品1| 国产欧美日韩一区二区三区在线| 日韩精品免费视频一区二区三区| 涩涩av久久男人的天堂| 国产伦理片在线播放av一区| 午夜免费观看性视频| 亚洲男人天堂网一区| 日韩 欧美 亚洲 中文字幕| 欧美 日韩 精品 国产| 亚洲一区中文字幕在线| 国产乱来视频区| 亚洲三区欧美一区| 超碰成人久久| 老司机靠b影院| 国产精品久久久人人做人人爽| 欧美激情 高清一区二区三区| 久久精品人人爽人人爽视色| 另类亚洲欧美激情| 日本黄色日本黄色录像| 国产精品av久久久久免费| 男女下面插进去视频免费观看| 免费高清在线观看视频在线观看| 国产一区二区在线观看av| 亚洲国产欧美在线一区| www.熟女人妻精品国产| 久久青草综合色| 天天躁日日躁夜夜躁夜夜| 久久精品久久久久久久性| 深夜精品福利| 国产男人的电影天堂91| 亚洲国产欧美日韩在线播放| 午夜福利网站1000一区二区三区| 嫩草影院入口| 欧美老熟妇乱子伦牲交| 操美女的视频在线观看| 在线观看www视频免费| 亚洲人成77777在线视频| 国产精品欧美亚洲77777| 老司机靠b影院| 黄频高清免费视频| 日日摸夜夜添夜夜爱| 国产xxxxx性猛交| 街头女战士在线观看网站| 女人爽到高潮嗷嗷叫在线视频| 热99久久久久精品小说推荐| 最新在线观看一区二区三区 | 久久人人爽人人片av| 国产成人精品福利久久| 制服人妻中文乱码| 亚洲av在线观看美女高潮| 欧美精品一区二区大全| 99久久99久久久精品蜜桃| 在线观看免费视频网站a站| 操出白浆在线播放| 亚洲五月色婷婷综合| 亚洲av日韩精品久久久久久密 | 成人18禁高潮啪啪吃奶动态图| 人人妻,人人澡人人爽秒播 | av片东京热男人的天堂| 少妇人妻精品综合一区二区| 免费观看av网站的网址| 国产av国产精品国产| 天天影视国产精品| 69精品国产乱码久久久| 狂野欧美激情性bbbbbb| 中文字幕另类日韩欧美亚洲嫩草| 高清不卡的av网站| 国产毛片在线视频| www.精华液| 久久久久久久国产电影| 青草久久国产| 欧美精品亚洲一区二区| 欧美激情高清一区二区三区 | 久久久国产精品麻豆| 男女高潮啪啪啪动态图| 日本91视频免费播放| 欧美精品一区二区免费开放| 丝袜脚勾引网站| videosex国产| 日本爱情动作片www.在线观看| 国产精品久久久av美女十八| 国产极品粉嫩免费观看在线| 国产亚洲一区二区精品| 男的添女的下面高潮视频| 亚洲精品av麻豆狂野| 久久精品熟女亚洲av麻豆精品| 少妇被粗大猛烈的视频| 麻豆乱淫一区二区| 男女下面插进去视频免费观看| 国产1区2区3区精品| 国产又色又爽无遮挡免| 一边亲一边摸免费视频| 精品亚洲成a人片在线观看| 黄片无遮挡物在线观看| 亚洲精品日本国产第一区| 看免费成人av毛片| 青春草亚洲视频在线观看| 久久久国产欧美日韩av| 亚洲av成人精品一二三区| 久久久久国产精品人妻一区二区| 久久精品国产亚洲av高清一级| 亚洲精品久久午夜乱码| avwww免费| 国产精品秋霞免费鲁丝片| 久久人人爽人人片av| av.在线天堂| 亚洲,一卡二卡三卡| 日韩一区二区视频免费看| 日韩一卡2卡3卡4卡2021年| 日韩中文字幕欧美一区二区 | 2018国产大陆天天弄谢| 久久久国产欧美日韩av| 操出白浆在线播放| 欧美成人午夜精品| 午夜福利网站1000一区二区三区| 亚洲自偷自拍图片 自拍| 国产一区二区三区综合在线观看| www.精华液| 极品少妇高潮喷水抽搐| 日本wwww免费看| 热re99久久精品国产66热6| 久久精品国产亚洲av高清一级| 卡戴珊不雅视频在线播放| 久久亚洲国产成人精品v| 一本色道久久久久久精品综合| 纯流量卡能插随身wifi吗| 麻豆av在线久日| 婷婷色综合www| 国产在线视频一区二区| 精品第一国产精品| av视频免费观看在线观看| 亚洲精品乱久久久久久| videos熟女内射| 婷婷色综合大香蕉| 亚洲av综合色区一区| 欧美精品一区二区大全| 亚洲一区中文字幕在线| 满18在线观看网站| 超碰成人久久| 免费女性裸体啪啪无遮挡网站| 日日摸夜夜添夜夜爱| 亚洲,欧美精品.| 日韩av免费高清视频| 亚洲国产精品国产精品| 国产精品秋霞免费鲁丝片| 国产成人欧美| 国产精品偷伦视频观看了| 国产 精品1| 亚洲第一区二区三区不卡| 午夜日韩欧美国产| 欧美最新免费一区二区三区| 久久 成人 亚洲| 高清视频免费观看一区二区| 中文字幕最新亚洲高清| 热99久久久久精品小说推荐| 国产片内射在线| 国产又爽黄色视频| 亚洲av福利一区| 伊人久久国产一区二区| 操出白浆在线播放| 天天躁夜夜躁狠狠躁躁| 别揉我奶头~嗯~啊~动态视频 | 免费日韩欧美在线观看| av.在线天堂| 9191精品国产免费久久| 波野结衣二区三区在线| 精品国产国语对白av| 久久鲁丝午夜福利片| 国产精品一区二区在线不卡| 另类亚洲欧美激情| 国产人伦9x9x在线观看| 宅男免费午夜| 久久人人爽av亚洲精品天堂| 亚洲久久久国产精品| 国产精品免费大片| 国产一级毛片在线| www.av在线官网国产| 各种免费的搞黄视频| 中文字幕精品免费在线观看视频| 欧美日本中文国产一区发布| 欧美国产精品一级二级三级| 欧美av亚洲av综合av国产av | 九九爱精品视频在线观看| 黄频高清免费视频| 精品第一国产精品| 国产亚洲精品第一综合不卡| 亚洲精品,欧美精品| 国产成人a∨麻豆精品| 欧美日韩亚洲高清精品| 欧美xxⅹ黑人| 久久久久国产一级毛片高清牌| 国产精品99久久99久久久不卡 | 丁香六月欧美| 亚洲中文av在线| 天美传媒精品一区二区| 黄色视频不卡| 高清不卡的av网站| 午夜福利免费观看在线| 午夜91福利影院| 夫妻性生交免费视频一级片| 欧美日韩国产mv在线观看视频| 黄色一级大片看看| 在线观看免费高清a一片| 91精品三级在线观看| 人人澡人人妻人| 久久av网站| 国产日韩一区二区三区精品不卡| 免费看不卡的av| 亚洲欧洲日产国产| 国产午夜精品一二区理论片| 在线观看国产h片| 国产精品国产av在线观看| 国产亚洲午夜精品一区二区久久| 成人午夜精彩视频在线观看| av一本久久久久| 国产精品久久久人人做人人爽| 免费av中文字幕在线| av视频免费观看在线观看| 久久久精品94久久精品| 免费看不卡的av| 国产精品一区二区在线不卡| 99国产精品免费福利视频| 色视频在线一区二区三区| 欧美人与善性xxx| 丰满迷人的少妇在线观看| 美女中出高潮动态图| 熟女少妇亚洲综合色aaa.| 精品人妻一区二区三区麻豆| 这个男人来自地球电影免费观看 | 久久久久人妻精品一区果冻| 女人被躁到高潮嗷嗷叫费观| 亚洲一码二码三码区别大吗| 中国国产av一级| 午夜影院在线不卡| 国产国语露脸激情在线看| 国产精品一二三区在线看| 色精品久久人妻99蜜桃| netflix在线观看网站| 1024香蕉在线观看| 中文字幕色久视频| 人人妻,人人澡人人爽秒播 | 午夜福利网站1000一区二区三区| 日韩免费高清中文字幕av| 90打野战视频偷拍视频| 黑人猛操日本美女一级片| 国产精品麻豆人妻色哟哟久久| 99香蕉大伊视频| 精品少妇一区二区三区视频日本电影 | 晚上一个人看的免费电影| 中文天堂在线官网| 亚洲精品国产av成人精品| 人人妻人人澡人人爽人人夜夜| 亚洲国产精品一区三区| 国产日韩欧美亚洲二区| 中文欧美无线码| 欧美日韩国产mv在线观看视频| 亚洲精华国产精华液的使用体验| 欧美日韩一级在线毛片| 最近2019中文字幕mv第一页| 午夜福利免费观看在线| 久久人人爽av亚洲精品天堂| 久久狼人影院| 国产精品秋霞免费鲁丝片| 妹子高潮喷水视频| 成人毛片60女人毛片免费| 99久久99久久久精品蜜桃| 国产一区二区三区综合在线观看| 一级毛片电影观看| 国产成人系列免费观看| 免费观看a级毛片全部| 最近的中文字幕免费完整| 亚洲欧美一区二区三区黑人| 嫩草影院入口| 91精品三级在线观看| 国产精品一区二区在线不卡| 看免费成人av毛片| 国语对白做爰xxxⅹ性视频网站| 免费女性裸体啪啪无遮挡网站| 美女国产高潮福利片在线看| 只有这里有精品99| 男人舔女人的私密视频| 各种免费的搞黄视频| 久久婷婷青草| 欧美日韩视频高清一区二区三区二| 日韩,欧美,国产一区二区三区| 丝袜美足系列| 51午夜福利影视在线观看| 777久久人妻少妇嫩草av网站| 亚洲精品视频女| 精品国产超薄肉色丝袜足j| 操出白浆在线播放| 亚洲欧美色中文字幕在线| 欧美日韩亚洲国产一区二区在线观看 | 欧美 日韩 精品 国产| 日本wwww免费看| 亚洲欧美色中文字幕在线| 女人精品久久久久毛片| 久久久久久人妻| 亚洲中文av在线| 亚洲欧美精品自产自拍| 国产日韩一区二区三区精品不卡| 无遮挡黄片免费观看| 亚洲人成电影观看| 新久久久久国产一级毛片| 国产精品久久久久久人妻精品电影 | 免费观看a级毛片全部| 国产 精品1| 成人亚洲欧美一区二区av| svipshipincom国产片| 日韩一区二区三区影片| 91国产中文字幕| 成年人午夜在线观看视频| 久久久久久久久久久免费av| 久久影院123| 日日啪夜夜爽| 免费高清在线观看视频在线观看| 人妻人人澡人人爽人人| 人妻一区二区av| 一边亲一边摸免费视频| 国产一区有黄有色的免费视频| 色婷婷av一区二区三区视频| 国产一级毛片在线| 两性夫妻黄色片| 妹子高潮喷水视频| 日日撸夜夜添| 日韩欧美一区视频在线观看| 最近中文字幕高清免费大全6| 夫妻性生交免费视频一级片| 水蜜桃什么品种好| 男人操女人黄网站| 久久久国产欧美日韩av| 久久午夜综合久久蜜桃| 看免费成人av毛片| www日本在线高清视频| 免费人妻精品一区二区三区视频| 亚洲国产欧美日韩在线播放| 波多野结衣一区麻豆| 亚洲精品中文字幕在线视频| 一本色道久久久久久精品综合| 日韩电影二区| av网站在线播放免费| 国产xxxxx性猛交| 国产日韩一区二区三区精品不卡| 国产高清不卡午夜福利| 亚洲精品第二区| 又大又黄又爽视频免费| 精品一区二区三卡| xxxhd国产人妻xxx| 大香蕉久久网| 91精品伊人久久大香线蕉| 国产男女内射视频| 欧美亚洲日本最大视频资源| 街头女战士在线观看网站| 建设人人有责人人尽责人人享有的| 日韩大码丰满熟妇| 妹子高潮喷水视频| 久久精品久久久久久噜噜老黄| 丝瓜视频免费看黄片| 免费不卡黄色视频| 国产一级毛片在线| 黄频高清免费视频| 亚洲国产精品一区三区| 少妇被粗大的猛进出69影院| 国产一区亚洲一区在线观看| 高清在线视频一区二区三区| 亚洲欧洲国产日韩| 精品亚洲乱码少妇综合久久| 日日撸夜夜添| 免费黄频网站在线观看国产| 爱豆传媒免费全集在线观看| 亚洲国产毛片av蜜桃av| 少妇的丰满在线观看| 一个人免费看片子| av天堂久久9| 黑丝袜美女国产一区| 亚洲精品第二区| 极品人妻少妇av视频| 一区福利在线观看| 午夜福利视频精品| 亚洲av欧美aⅴ国产| 老司机靠b影院| 中文精品一卡2卡3卡4更新| 高清视频免费观看一区二区| 欧美 亚洲 国产 日韩一| 大香蕉久久成人网| 亚洲成人免费av在线播放| 成人18禁高潮啪啪吃奶动态图| 色网站视频免费| 国产日韩欧美视频二区| 亚洲av男天堂| 亚洲,欧美精品.| 亚洲精品国产av成人精品| 久久精品亚洲av国产电影网| 午夜福利视频在线观看免费| 欧美日韩视频高清一区二区三区二| 免费女性裸体啪啪无遮挡网站| 亚洲精品在线美女| 亚洲精品乱久久久久久| 久久久久精品人妻al黑| 热99国产精品久久久久久7| 日本色播在线视频| 搡老岳熟女国产| 国产99久久九九免费精品| 成人毛片60女人毛片免费| 亚洲精品国产av蜜桃| 欧美中文综合在线视频| 国产成人精品在线电影| 一级黄片播放器| 极品人妻少妇av视频| 宅男免费午夜| 2021少妇久久久久久久久久久| 久久精品亚洲av国产电影网| 亚洲第一av免费看| 黄色毛片三级朝国网站| 久久久亚洲精品成人影院| 伊人久久国产一区二区| 黑人欧美特级aaaaaa片| 精品免费久久久久久久清纯 | 丝袜喷水一区| 91老司机精品| 国产成人精品无人区| 女的被弄到高潮叫床怎么办| 午夜久久久在线观看| 亚洲av电影在线进入| 日韩一区二区三区影片| 成年女人毛片免费观看观看9 | 免费观看av网站的网址| 国产精品蜜桃在线观看| www.精华液| 大陆偷拍与自拍| 亚洲av综合色区一区| 国产男女内射视频| 黑丝袜美女国产一区| 国产无遮挡羞羞视频在线观看| 日韩中文字幕视频在线看片| 美女高潮到喷水免费观看| 精品少妇一区二区三区视频日本电影 | 美女福利国产在线| 欧美亚洲 丝袜 人妻 在线| 在线观看一区二区三区激情| 一二三四中文在线观看免费高清| 亚洲av国产av综合av卡| 国产一区有黄有色的免费视频| 亚洲,一卡二卡三卡| 亚洲av国产av综合av卡| 午夜影院在线不卡| 男男h啪啪无遮挡| 只有这里有精品99| 久久狼人影院| av国产久精品久网站免费入址| 久久精品亚洲av国产电影网| 精品视频人人做人人爽| 亚洲欧美一区二区三区久久| 中文欧美无线码| avwww免费| 一级毛片我不卡| 亚洲一卡2卡3卡4卡5卡精品中文| 考比视频在线观看| 我要看黄色一级片免费的| 最黄视频免费看| 宅男免费午夜| 国产片特级美女逼逼视频| 少妇人妻久久综合中文| 日本黄色日本黄色录像| 久久人人爽人人片av|