• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Generation of orbital angular momentum hologram using a modified U-net

    2024-03-25 09:30:22ZhiGangZheng鄭志剛FeiFeiHan韓菲菲LeWang王樂andShengMeiZhao趙生妹
    Chinese Physics B 2024年3期

    Zhi-Gang Zheng(鄭志剛), Fei-Fei Han(韓菲菲), Le Wang(王樂), and Sheng-Mei Zhao(趙生妹),2,3,?

    1Institute of Signal Processing and Transmission,Nanjing University of Posts and Telecommunications,Nanjing 210003,China

    2Key Laboratory of Broadband Wireless Communication and Sensor Network Technology(Ministry of Education),

    Nanjing University of Posts and Telecommunications,Nanjing 210003,China

    3National Laboratory of Solid State Microstructures,Nanjing University,Nanjing 210093,China

    Keywords: orbital angular momentum(OAM),holography,OAM holography,deep learning

    1.Introduction

    Orbital angular momentum(OAM)is demonstrated by a helical wavefront beam with exp(ilφ),[1]wherelis a topological charge andφis an azimuthal angle and has been applied as an information carrier in optical communication,[2-6]quantum information,[7-9]etc.Recently,holography based on OAM has received growing interest for its large capacity in information encryption,data storage and opto-electronic computing.[10-12]

    For holography,the generation of its computer-generated hologram (CGH) is an important part, and many methods have been proposed and demonstrated.[13-16]For example,the Gerchberg-Saxton (GS) algorithm, an iterative phase retrieval algorithm widely employed in beam shaping and optical information processing, was employed for calculating the hologram,[13,14]and the OAM hologram.[10-12]However, the random initial phase at the beginning of the algorithm leads to the speckle noise in the reconstructed image.Thereafter,a double-constraint GS method was proposed in which the required phase information and amplitude information were limited in the image plane in each iteration,as opposed to utilizing random phase.[15]Consequently, this method suppressed the speckle noise brought by the random phase.Then, a method called random phase-free CGH was proposed to enhance image quality and reduce the speckle noise by multiplying the object light with the virtual convergence light.[16]A random repeated and displaced phase was proposed by using a structured random phase.The full image was reconstructed with reduced speckle noise from a partially illuminated Fresnel hologram.[17]However, these methods require either parameter adjustments for different input images or intricate computations.

    To reduce the speckle noise of the holographic reconstructed images, deep learning (DL),[18,19]the artificial intelligence technique, has been recently adopted in hologram generation.For instance,in order to reduce the speckle noise for coherent imaging without clean data, Yinet al.proposed a hologram generation method to combine the traditional GS technique with the convolutional neural network (CNN).[20]Based on the combination of the U-net and a diffraction propagation model, Sunet al.presented a phase hologram generation method based on CNN to suppress the speckle noise of the reconstructed image.[21]By combining the random phasefree method with the scaled diffraction computation, Ishiiet al.proposed a DL-based CGH optimization method for holographic projection and demonstrated that the reconstruction result outperformed those with GS algorithm.[22]However,these studies either optimize a single image, that is, the network cannot predict images that have not been trained before,or require extensive time to prepare the training data.Importantly,OAM holography has some characteristics,such as using point images to preserve the OAM property,and the work to generate an OAM hologram directly by using a deep neural network has not been discussed yet.

    In this paper, we propose an OAM hologram generation method based on a densely connected U-net(DCU)with a new training strategy,where DCU is a modified U-net discussed in detail in Refs.[23-25]and U-net is a well-established encode and decode network architecture,which has been widely used for regression tasks.In DCU,the densely connected convolution blocks(DCB)are specially designed to replace the convolution blocks in the traditional U-net.The reconstruction process of the OAM hologram is integrated into the output layer of DCU,so there is no requirement to prepare the training data for the OAM hologram by using the other method,say,the GS algorithm.A special loss function is designed to optimize the background part and the signal part of input images, respectively.The numerical simulation and the experiment are performed to demonstrate the feasibility of the proposed method and the performance of the reconstructed image.In addition,the application of the generated OAM multiplexing hologram in optical encryption is discussed.

    The organization of the paper is the following.The theory is introduced in Section 2.In Section 3, the performance of the proposed method is verified,and the conclusion is summarized in Section 4.

    2.Theory

    OAM is applied as a novel information carrier for holography due to its good properties, such as the infinite values of its topological charge, and the orthogonality between different OAM modes.To preserve the characteristics of OAM in holography, the target image should be multiplied with a two-dimensional(2D)sampling array in the image plane,say,the point image,whose sampling interval is dependent on the spatial frequency of the used OAM mode.[10]

    As the input images for the proposed method are point images, it is essential to acquire high signal-to-noise (SNR)information at the sampling points as well as low SNR information in the background part by the network.Hence, the structure of the DL for the OAM hologram generation method should be designed.Figure 1 shows the schematic diagram of the proposed method to generate the OAM hologram, where the target image is first multiplied by a sampling array, then the point image is used as the“input image”of DCU,and the output of the network is the predicted OAM-preserved hologram, named “output hologram”.To avoid the preparation of the training data for hologram as conventional DL-based hologram generation methods by the iterative algorithm, the reconstruction process of the OAM hologram is included as the output layer of the overall network which reduces the difficulty of obtaining training data.The predicted OAM hologram is calculated as the“reconstruction”,and the“reconstruction”,which together with the “input image” serve as the training data for the proposed network.Especially, a loss function is designed for the proposed network to obtain a high-quality reconstruction from the OAM hologram.

    Fig.1.The schematic diagram of the proposed method.The white arrow represents the data transmission,the black arrow represents the data fed back into the neural network, and the green arrow represents the reconstruction process of the OAM hologram.

    Then, the densely connected U-net and the loss function are described in detail as follows.

    2.1.Densely connected U-net

    The structure of the DCU is shown in Fig.2, where the convolution blocks in U-net are replaced by the DCBs[26]to overcome the vanishing gradient problem during the training process of DCU.The structure of DCU consists of a shrinking path on the left,a spreading path on the right,and a bottleneck layer in the middle.The numbers on the left side of the DCBs are the dimensions of the feature map.The white arrow in the bottleneck layer represents data transmission,while the red arrow in the shrinking path represents down-sampling, and the blue arrow in the spreading path represents transposed convolution.The purpose of the shrinking path is to encode the feature information of the input space into a higher-dimensional feature space.The structure of the spreading path is identical to that of the shrinking path, and its purpose is to extend and decode the extracted feature map to the output space using the multi-layer transposed convolution layer.The bottleneck layer is used to transmit the recorded information from the DCBs in the shrinking path to its matched decoder DCBs in the spreading path.Therefore, the extracted feature information is considerably enhanced by the bottleneck layer.A DCB is further illustrated by the blue box in Fig.2.There are 3 layers inside,one after the other are in a feed-forward fashion.The feature maps of all proceeding layers are used as inputs,and their own feature maps are used as inputs into all subsequent layers.Here, each layer consists of the convolution layer, batch normalization(BN),and activation function.

    Fig.2.The schematic diagram of the densely connected U-net.The white arrow represents data transmission, while the red arrow represents downsampling and the blue arrow represents transposed convolution.The details of one DCB are shown in the blue box.

    The operation from the (l-1)-th layer to thel-th layer can be expressed as

    whereHlis a nonlinear transformation function related with the operations in Eq.(1) andy0,y1,...,yl-1mean the output of all the layers before thel-th layer.The densely connected mechanism not only plays a central role in strengthening feature information reuse but also performs an excellent job of integrating the high SNR information and low SNR information of input images during the network training.Therefore,it can obtain accurate information on input images.

    In this paper, each convolution layer uses a kernel size of 3×3, a step size of 2, and a padding of 0.The output image size of the down-sampling layer is exactly half of the input size.In order to introduce nonlinearity, rectified linear unit (ReLU) which is an activation function commonly used in neural networks is employed,while BN is adopted to speed up and stabilize the network’s training.

    2.2.Loss function

    To obtain a better convergence effect of the network,the target image is divided into two parts, the signal part and the background part by applying a binary mask.The binary mask is defined as

    whereA(x,y) represents the amplitude intensity value of the target image at the position (x,y).Here, the criterion for the threshold is that the signal part is located in the middle of the target image,and its size is slightly larger than that of the signal part.

    The squared L2 norm is served as the loss function to calculate the loss of the signal part and background part, and the whole loss function includes the two parts’loss functions,which is expressed as

    where‖·‖22is the squared L2 norm,φtbandφtdenote grayscale values of the background part and the signal part of the input image, respectively;φrbandφrdenote grayscale values of the background part and the signal part of the reconstructed image from the output OAM hologram, respectively.The parameterβ(0-1) is applied to adjust the optimization ratio of the signal part and the background part.For a smaller valueβ,it is indicated that the training process prefers to optimize the signal part, while for a larger value, it is indicated that the training process seeks to optimize the background part.The difference between the reconstructed images from the predicted OAM hologram and the ground truth can be reduced with the use of the back-propagation of the loss function.Then,ADAM optimizer which is a method for stochastic optimization is applied as the updating rule to minimize the total loss function Losssum.The weight and bias of the network can be automatically updated in each epoch.Based on this updating rule, the optimization process can reach the global minimum when the total loss function is converged, and the well-trained network can predict the optimal OAM hologram for an input image.

    3.Results and discussion

    In this paper, to statistically analyze the result, the structural similarity index metric (SSIM), the peak signal-tonoise ratio (PSNR)[27]and the cosine similarity (CS)[28]are adopted.SSIM is an index to measure the similarity of two images,its mathematical expression is

    whereμXandμYrepresent the average value of the input image and the reconstructed image respectively,σXandσYare the variances,andσXYare the covariance between the two images.c1=(α×N)2andc2=(β×N)2denote the regularization parameter, whereα=0.01,β=0.03, andN=255(the range of pixel values).

    The PSNR is also a metric to qualify an image and its mathematical expression is

    where MAXvaldenotes the maximum gray value in the image and MSE is the mean square error between input image and reconstructed image,which is defined as

    whereφX(x,y)andφY(x,y)are the grayscale values of the input image and the reconstructed image at the position (x,y),respectively.MandNdenote the number of pixels in the horizontal and vertical directions of the input image,respectively.

    Cosine similarity(CS)is a measure of similarity between two vectors of an inner product space that measures the cosine of the angle between them and its expression is

    wheremand?denote two distinct vectors andnis the length of the vector.Considering the pixel information in the reconstructed image may be shifted in the positions,we employ visual geometry group (VGG) to extract the image features at first,then we compute the CS values on the image feature vectors.

    3.1.Numerical simulation

    In this section,we first verify the performance of the proposed method through numerical simulations.The images input to the designed network for training and testing are from the modified handwritten digital database of the Modified National Institute of Standards and Technology (MNIST), including the handwritten digits[29]and the Fashion-MNIST.[30]The training dataset and testing dataset consist of 6×104and 1×104greyscale images, respectively.The images are with a resolution of 256×256 pixels, and the size of each pixel is 12.5 μm×12.5 μm considering the optical experimental setup.The shrinking path and the spreading path both consist of five DCBs and each block contains 3 layers.

    The threshold of the mask is set to 0.5, and the value ofβis 0.1.The ADAM optimizer’s learning rate is set to 0.001.Considering the limitations of time cost and training memory,each batch includes 32 input images.The neural network is implemented based on Python 3.10.0,and PyTorch is employed to build the network structure on NVIDIA TITAN RTX GPU with CUDA version 11.4.It takes approximately 10 h to complete 50 epochs of training.

    First, we demonstrate the feasibility of the proposed method.In previous works, U-net is already applied to generate holograms.[21]In order to analyze different OAM hologram generation methods, we compare the qualities of the reconstructed OAM holographic images by the proposed method, the GS[13]method, the weighted Gerchberg-Saxton(WGS)[31]method, the adaptive weighted Gerchberg-Saxton(AWGS)[32]method, and the U-net method in Table 1.The neural network in the U-net method is roughly equivalent to those applied in the proposed method in terms of the number of network layers.The number of iterations for the GS method and its improved versions are the same.The results show that the values of SSIM and PSNR of the reconstructed holographic images by the proposed method are up to 0.9945 and 47.7971 for the MNIST dataset,while they are 0.9923 and 44.4406 for the Fashion-MNIST dataset,which are higher than those with the GS based methods and the U-net method.It is indicated that the proposed method can obtain a higher-quality OAM hologram in comparison with the GS method,GS based method and U-net method.Additionally, for the Fashion-MNIST,it only takes 53.2 milliseconds to generate a 256×256 pixels OAM hologram by utilizing the proposed method,while it takes 4.96 seconds for the commonly used WGS method,it indicates that the proposed method can quickly generate an OAM hologram.

    Table 1.SSIM and PSNR values of the proposed method,GS method,WGS method,AWGS method and U-net method.

    Figure 3 further shows the training loss versus the epochs for the proposed method and the U-net method.It is shown that for the proposed method, the training and validation loss are both fall down quickly in the first five epochs, and then they gradually converge to lower loss values after 30 epochs,say 0.01.It hint that the proposed method has a good training effect with the designed network architectures.For the U-net method,the validation loss has a fluctuation,and the initial and final training loss values are bigger than those by the proposed method, which also means that the network in the proposed method has a better fitting performance and faster convergence.

    Fig.3.Training and validation loss curves of the proposed method and the U-net method.

    Fig.4.The experimental setup of the proposed method.ATT: attenuator;HWP: half-wave plate; SLM: spatial light modulator; L1: lens (the focal length 150 mm); L2: lens(the focal length 50 mm); CCD:charge coupled device.

    3.2.Optical experiment

    To further evaluate the performance of the proposed method,we discuss the experimental results of the OAM hologram.Figure 4 shows the experimental schematic diagram of the proposed method.In the experiment, the He-Ne laser(Thorlabs, HRS015) emits a linear fundamental mode Gaussian beam with a wavelength of 633 nm.The Gaussian beam passes through an attenuator (ATT) to adjust the power of the beam.An half-wave plate (HWP) is then employed to adjust the Gaussian beam to an appropriate polarization to match the spatial lighter modulator(SLM1,PLUTO-VIS-006-A,pixel pitch: 8μm,pixel number: 1920×1080).The filter is employed to ensure that there is only the first-order of the vortex beam is retained.Lens L1(the focal length 150 mm)is employed to focus the vortex beam on SLM2(HED6010-NIR-011-C,pixel pitch: 8μm,pixel number: 1920×1080),which carries predicted OAM holograms obtained by the proposed method.Lens L2(the focal length 50 mm)is a Fourier lens to focus the distribution of beam intensity on a CCD(Thorlabs,BC106N-VIS/M), which records the intensity distribution of the reconstructed OAM hologram.Firstly, we load a helical phase structure on SLM1, and none on SLM2 to get different OAM incident beams.At this time,the image recorded in the CCD is a doughnut structure.Then,we load the predicted OAM holograms,including the OAM-selective hologram and the OAM-multiplexing hologram on SLM2.At this time,the image recorded in the CCD is the holographic reconstructed image.

    Figure 5 shows the reconstructed holographic images with the proposed method,the GS method,the WGS method,the AWGS method, and the U-net method, respectively.The ground truth images are from MNIST dataset, including“1”, “7”, and “8” three handwritten digits images, and from Fashion-MNIST dataset, including “overcoat” and “trouser”images.Here,the OAM-selective holograms are produced by superimposing a helical phase plate ofl=-1 on the OAMpreserved hologram, and the reconstructed image emerges only whenl=1 OAM incident beam is employed.From the results,one can see that the OAM holographic reconstruction results by the proposed method match well with the ground truth.From the red boxes in Fig.5, it is evident that the image information is reconstructed completely by the proposed method,in comparison with those results obtained by the GS method,the GS based methods and the U-net method.

    Fig.5.The experimental results of OAM-multiplexing holographic reconstructed images.

    To quantitatively compare the five methods’results in the experiment, the CS values are adopted for the consideration of the pixel information shifting in the reconstructed images.Table 2 shows the comparison of CS values of the proposed method, GS method, the GS based methods and the U-net method, respectively, from the experimental results.The results show that the proposed method has highest CS values for three handwritten digits images from MNIST dataset and“trouser”images from Fashion-MNIST dataset except for the“overcoat” images, it indicates that the proposed method is able to accomplish high quality reconstruction.

    Table 2.The comparison of CS values of the proposed method, GS method,WGS method,AWGS method and U-net method from the experimental results.

    Fig.6.The experimental results of OAM-selective holographic reconstructed images.

    Additionally,we demonstrate the experimental results of the OAM-multiplexing hologram generated by the proposed method in Fig.6.Three independent OAM channels are prepared for the three handwritten digits “0”, “1”, and “2”, respectively.The OAM-multiplexing hologram is generated by the superposition of multiple OAM-selective holograms withl=-1,1,2.The handwritten digits“0”,“1”,and“2”are reconstructed by applying the OAM beams withl=1,-1,-2 to illuminate the OAM-multiplexing hologram,respectively.The CS values for the reconstructed images are calculated.The experimental results demonstrate that the proposed method can effectively generate an OAM-multiplexing hologram,and the reconstructed results of the OAM-multiplexing hologram are consistent with the ground truth.The CS values are 0.91,0.90,and 0.84 for digits“0”,“1”,and“2”respectively.

    3.3.Application in encryption

    In this subsection, we discuss the application of the OAM-multiplexing hologram generated by the proposed method.Here, we present a 10-bit encryption scheme based on the proposed OAM-multiplexing hologram by numerical simulation.As shown in Fig.7(a), OAM topological charge values from-25 to 25 are employed to encode 10 digital characters(0-9)with a capacity of 10 bit.This enables the implementation of an OAM encryption scheme.Digits “0”, “1”,“2”,..., “9” are first sampled with an OAM-dependent sampling array in the image plane so that the corresponding OAMpreserved hologram for ten digits can be obtained.Then the helical phase plates with the designed topological charge values, such as?=-25,?=-20,...,?=25, are sequentially added to each OAM-preserved hologram to achieve the OAMselective hologram.The OAM-multiplexing hologram is obtained by superposing all the OAM-selective holograms.The 10-bit OAM-multiplexing hologram is used as the ciphertext of this scheme and different digital images are reconstructed when different incident OAM beam is illuminated.

    Fig.7.The schematic diagram of a 10-bit OAM holography encryption scheme.

    For the English letters “NUPT”, the message to be encrypted in Fig.7(b), each letter of the “NUPT” is first converted to its corresponding ASCII as “78, 85, 80, 84”, so that the corresponding OAM topological charge values arel=(15 20,20 5,20-25,20-5)serving as the key to the encryption scheme,as shown in Fig.7(c).In the decryption,the corresponding incident OAM beam with inverse topological charge value is first generated according to the key and then sequentially illuminating the OAM-multiplexing hologram.Finally,each of the four digital combinations is obtained through the reconstructed images,and the English letters“NUPT”are recovered by the ASCII,as shown in Fig.7(d).When the key is lost, the encrypted information cannot be recovered.The results demonstrate that the multiplexing of OAM-selective holograms with a helical mode index from-25 to 25 has led to 10-bit OAM-encoded holograms for high-security encryption which demonstrates a high-capacity holographic encryption system.

    4.Conclusion

    In this paper, we have proposed a modified U-net-based OAM hologram generation method, where the densely connected U-net has been trained to learn the correspondence between the input images and their OAM holograms.The reconstruction process of the OAM hologram is integrated into DCU architecture as its output layer so as to eliminate the need to prepare training data, reducing the difficulty of acquiring training data as in conventional neural networks.The numerical simulation and experimental results have shown that the qualities of the generated OAM holograms and their reconstructed images have been improved by the proposed method,and the time required to generate an OAM hologram is greatly reduced with the well-trained densely connected U-net.In addition,a 10-bit OAM holography encryption scheme has been implemented by employing the proposed OAM hologram generation method, and the results have shown that the designed OAM holographic encryption scheme is available and secure.Our method provides a novel way for designing OAM holograms and may be used in holographic encryption and data storage.

    Acknowledgements

    This work was supported by the National Natural Science Foundation of China (Grant Nos.62375140 and 61871234)and the Open Research Fund of National Laboratory of Solid State Microstructures(Grant No.M36055).

    高清在线国产一区| 黑人猛操日本美女一级片| 人妻久久中文字幕网| 久久女婷五月综合色啪小说| 国产深夜福利视频在线观看| 高潮久久久久久久久久久不卡| 丝袜喷水一区| 亚洲三区欧美一区| 啦啦啦视频在线资源免费观看| 亚洲欧美成人综合另类久久久| a级毛片在线看网站| 亚洲精品久久成人aⅴ小说| 丝袜在线中文字幕| 亚洲午夜精品一区,二区,三区| 久久综合国产亚洲精品| 色婷婷av一区二区三区视频| 成人亚洲精品一区在线观看| 人妻 亚洲 视频| 国产在线一区二区三区精| 精品国产超薄肉色丝袜足j| 免费在线观看视频国产中文字幕亚洲 | 女人久久www免费人成看片| 99国产极品粉嫩在线观看| 搡老熟女国产l中国老女人| 欧美日韩亚洲国产一区二区在线观看 | 日本黄色日本黄色录像| 中文字幕制服av| 国产亚洲精品一区二区www | 汤姆久久久久久久影院中文字幕| 国产欧美亚洲国产| 精品人妻1区二区| 天堂俺去俺来也www色官网| 久久综合国产亚洲精品| www.熟女人妻精品国产| 99热网站在线观看| 成人黄色视频免费在线看| 久久人妻福利社区极品人妻图片| 久久天堂一区二区三区四区| 国产亚洲av片在线观看秒播厂| 日韩免费高清中文字幕av| 脱女人内裤的视频| 欧美日韩亚洲国产一区二区在线观看 | 久热这里只有精品99| 国产成人免费无遮挡视频| 亚洲精品国产一区二区精华液| 最新的欧美精品一区二区| 日韩欧美免费精品| 亚洲久久久国产精品| h视频一区二区三区| 三上悠亚av全集在线观看| 亚洲欧美激情在线| 我要看黄色一级片免费的| 亚洲成人手机| 久久影院123| 丰满人妻熟妇乱又伦精品不卡| 亚洲成国产人片在线观看| 免费观看a级毛片全部| 欧美日韩成人在线一区二区| 亚洲七黄色美女视频| 肉色欧美久久久久久久蜜桃| 19禁男女啪啪无遮挡网站| 一本一本久久a久久精品综合妖精| 他把我摸到了高潮在线观看 | 在线亚洲精品国产二区图片欧美| 黑人巨大精品欧美一区二区mp4| 两性午夜刺激爽爽歪歪视频在线观看 | 午夜激情av网站| 国产免费一区二区三区四区乱码| www.熟女人妻精品国产| 中文字幕最新亚洲高清| 午夜成年电影在线免费观看| 少妇人妻久久综合中文| 亚洲精品久久久久久婷婷小说| 欧美精品一区二区大全| 俄罗斯特黄特色一大片| 欧美日韩中文字幕国产精品一区二区三区 | 日本91视频免费播放| 亚洲专区中文字幕在线| 欧美 日韩 精品 国产| 国产亚洲av高清不卡| 一二三四在线观看免费中文在| 精品国产乱子伦一区二区三区 | 日本91视频免费播放| videos熟女内射| av线在线观看网站| 9热在线视频观看99| 老司机在亚洲福利影院| 亚洲国产欧美网| 黄片播放在线免费| 午夜成年电影在线免费观看| 午夜成年电影在线免费观看| 婷婷丁香在线五月| 欧美一级毛片孕妇| 国产亚洲欧美精品永久| 老司机福利观看| 国产精品亚洲av一区麻豆| 十分钟在线观看高清视频www| 久久久久视频综合| 欧美日韩福利视频一区二区| 美女主播在线视频| 久久香蕉激情| tocl精华| 国产欧美日韩综合在线一区二区| 汤姆久久久久久久影院中文字幕| 欧美精品人与动牲交sv欧美| 99国产精品一区二区蜜桃av | 青青草视频在线视频观看| 欧美国产精品一级二级三级| 多毛熟女@视频| 午夜福利免费观看在线| 国产主播在线观看一区二区| 欧美97在线视频| 人妻 亚洲 视频| kizo精华| 深夜精品福利| 啦啦啦 在线观看视频| 十八禁网站免费在线| 亚洲精品国产精品久久久不卡| 久久久久精品人妻al黑| 中文字幕人妻丝袜一区二区| 中文字幕人妻丝袜一区二区| 日韩,欧美,国产一区二区三区| 啦啦啦 在线观看视频| 中文字幕人妻丝袜一区二区| 人人妻人人爽人人添夜夜欢视频| 欧美老熟妇乱子伦牲交| kizo精华| 大香蕉久久网| 在线精品无人区一区二区三| 免费在线观看完整版高清| 日韩,欧美,国产一区二区三区| 成人免费观看视频高清| 欧美激情高清一区二区三区| 51午夜福利影视在线观看| 亚洲av国产av综合av卡| 国产极品粉嫩免费观看在线| 日韩制服骚丝袜av| 中文精品一卡2卡3卡4更新| 欧美另类一区| 日日摸夜夜添夜夜添小说| 亚洲va日本ⅴa欧美va伊人久久 | 日本欧美视频一区| 成年动漫av网址| 久久亚洲国产成人精品v| 国产精品.久久久| 国产免费福利视频在线观看| 亚洲av欧美aⅴ国产| 一区在线观看完整版| e午夜精品久久久久久久| 亚洲国产精品一区三区| 一本久久精品| 国产视频一区二区在线看| 亚洲伊人色综图| 宅男免费午夜| 亚洲精品国产精品久久久不卡| 男女下面插进去视频免费观看| 亚洲美女黄色视频免费看| 久久这里只有精品19| 国产男人的电影天堂91| 精品一区二区三区av网在线观看 | 亚洲伊人久久精品综合| 搡老乐熟女国产| 无限看片的www在线观看| 一级a爱视频在线免费观看| 国产高清视频在线播放一区 | 99热网站在线观看| 欧美久久黑人一区二区| 超碰成人久久| 亚洲精品国产av蜜桃| 一区二区日韩欧美中文字幕| 成年人免费黄色播放视频| 亚洲黑人精品在线| 女警被强在线播放| 91大片在线观看| 国产1区2区3区精品| 下体分泌物呈黄色| 久久精品国产a三级三级三级| 国产又色又爽无遮挡免| 欧美激情高清一区二区三区| 久9热在线精品视频| 大片电影免费在线观看免费| 午夜免费鲁丝| 国产成+人综合+亚洲专区| 飞空精品影院首页| 精品一区二区三卡| 十八禁网站网址无遮挡| 欧美xxⅹ黑人| 精品熟女少妇八av免费久了| 久久久久视频综合| 日日夜夜操网爽| 丝袜脚勾引网站| 涩涩av久久男人的天堂| 午夜福利,免费看| 交换朋友夫妻互换小说| 欧美日韩福利视频一区二区| 黑人猛操日本美女一级片| 超碰成人久久| 亚洲av成人不卡在线观看播放网 | 精品国产乱码久久久久久小说| 欧美中文综合在线视频| 一本综合久久免费| 黑人巨大精品欧美一区二区mp4| 亚洲少妇的诱惑av| 1024香蕉在线观看| 天堂中文最新版在线下载| 亚洲精品日韩在线中文字幕| 亚洲第一欧美日韩一区二区三区 | 久9热在线精品视频| 多毛熟女@视频| 亚洲va日本ⅴa欧美va伊人久久 | 日韩欧美一区二区三区在线观看 | 日韩大码丰满熟妇| 免费看十八禁软件| 精品久久蜜臀av无| 看免费av毛片| 一级黄色大片毛片| 国产真人三级小视频在线观看| 大香蕉久久网| bbb黄色大片| 国产97色在线日韩免费| 丰满迷人的少妇在线观看| 超碰成人久久| 欧美日韩亚洲高清精品| 精品一品国产午夜福利视频| 十八禁网站免费在线| 亚洲激情五月婷婷啪啪| 成人国产av品久久久| 亚洲精华国产精华精| 亚洲黑人精品在线| 成人手机av| 国产97色在线日韩免费| 一级毛片女人18水好多| 丰满饥渴人妻一区二区三| 青春草视频在线免费观看| 视频区欧美日本亚洲| 国产欧美日韩一区二区精品| 夫妻午夜视频| 欧美人与性动交α欧美软件| 亚洲精品一区蜜桃| 成年人免费黄色播放视频| 母亲3免费完整高清在线观看| 国产成人一区二区三区免费视频网站| 日本av手机在线免费观看| 亚洲国产精品成人久久小说| 妹子高潮喷水视频| 热re99久久精品国产66热6| 黑人欧美特级aaaaaa片| 日韩视频一区二区在线观看| 另类精品久久| 午夜精品久久久久久毛片777| 热99久久久久精品小说推荐| 99国产精品免费福利视频| 欧美亚洲 丝袜 人妻 在线| 美女扒开内裤让男人捅视频| 欧美性长视频在线观看| 日本五十路高清| 亚洲中文av在线| 亚洲熟女精品中文字幕| 天堂8中文在线网| 一二三四在线观看免费中文在| 国产精品香港三级国产av潘金莲| 免费女性裸体啪啪无遮挡网站| 一本色道久久久久久精品综合| 国产99久久九九免费精品| 国产精品久久久久久精品古装| av视频免费观看在线观看| 伊人亚洲综合成人网| 日韩大片免费观看网站| 亚洲av成人一区二区三| 久久久久久久国产电影| 日本黄色日本黄色录像| 成年人黄色毛片网站| 91大片在线观看| 亚洲专区国产一区二区| 国产xxxxx性猛交| 永久免费av网站大全| 亚洲成国产人片在线观看| 国产在视频线精品| 天天躁狠狠躁夜夜躁狠狠躁| 大陆偷拍与自拍| 少妇人妻久久综合中文| 国产成人精品久久二区二区免费| 久久久久久久大尺度免费视频| 日韩,欧美,国产一区二区三区| 麻豆国产av国片精品| 精品国产乱子伦一区二区三区 | 最近最新免费中文字幕在线| 人妻久久中文字幕网| 又紧又爽又黄一区二区| 国产91精品成人一区二区三区 | 亚洲av国产av综合av卡| 欧美国产精品一级二级三级| av免费在线观看网站| 80岁老熟妇乱子伦牲交| 亚洲精品日韩在线中文字幕| 日韩中文字幕视频在线看片| netflix在线观看网站| 男人舔女人的私密视频| 欧美激情极品国产一区二区三区| 美女主播在线视频| 国产av国产精品国产| 妹子高潮喷水视频| 久久久久精品人妻al黑| 久久香蕉激情| 国产99久久九九免费精品| 国产高清视频在线播放一区 | 高清在线国产一区| 亚洲一区中文字幕在线| 免费少妇av软件| 亚洲国产精品一区二区三区在线| 一本色道久久久久久精品综合| av电影中文网址| 国产野战对白在线观看| 中文字幕人妻丝袜制服| 性少妇av在线| 老司机深夜福利视频在线观看 | 首页视频小说图片口味搜索| 欧美国产精品va在线观看不卡| 国产精品香港三级国产av潘金莲| 欧美精品人与动牲交sv欧美| √禁漫天堂资源中文www| 曰老女人黄片| 日韩电影二区| 一级,二级,三级黄色视频| 亚洲国产中文字幕在线视频| 手机成人av网站| 精品国内亚洲2022精品成人 | 久久亚洲精品不卡| 少妇裸体淫交视频免费看高清 | 国产高清视频在线播放一区 | av国产精品久久久久影院| 久久久久久人人人人人| 天天添夜夜摸| 最新在线观看一区二区三区| 国产精品久久久久成人av| 国产精品香港三级国产av潘金莲| 国产福利在线免费观看视频| 国产亚洲午夜精品一区二区久久| a 毛片基地| 国产欧美日韩一区二区三 | 91麻豆av在线| 亚洲国产精品成人久久小说| 日韩欧美一区二区三区在线观看 | 亚洲国产欧美网| 精品人妻一区二区三区麻豆| 丝袜美腿诱惑在线| 大码成人一级视频| www日本在线高清视频| 巨乳人妻的诱惑在线观看| 精品福利永久在线观看| 久久久精品94久久精品| 性色av一级| 久久国产精品大桥未久av| 在线av久久热| 一本综合久久免费| 亚洲 国产 在线| 美女脱内裤让男人舔精品视频| 爱豆传媒免费全集在线观看| 老司机亚洲免费影院| 午夜免费观看性视频| 超色免费av| 国产成人精品久久二区二区免费| 精品人妻一区二区三区麻豆| 亚洲av日韩在线播放| 夫妻午夜视频| 在线观看www视频免费| 亚洲国产日韩一区二区| 在线观看免费午夜福利视频| 丝袜美足系列| 乱人伦中国视频| 国产av精品麻豆| 精品欧美一区二区三区在线| 亚洲精品一卡2卡三卡4卡5卡 | 亚洲欧美一区二区三区黑人| 精品一区在线观看国产| 黄网站色视频无遮挡免费观看| 啦啦啦 在线观看视频| 久久香蕉激情| 王馨瑶露胸无遮挡在线观看| 啦啦啦免费观看视频1| 亚洲精品日韩在线中文字幕| 黑人欧美特级aaaaaa片| 国产精品久久久久久精品古装| 亚洲av电影在线进入| 一本色道久久久久久精品综合| 在线十欧美十亚洲十日本专区| 青春草视频在线免费观看| 超色免费av| 国产99久久九九免费精品| 侵犯人妻中文字幕一二三四区| 一本一本久久a久久精品综合妖精| bbb黄色大片| 国产精品久久久久久精品电影小说| h视频一区二区三区| 免费观看a级毛片全部| 精品久久久精品久久久| 国产精品久久久人人做人人爽| 免费看十八禁软件| 亚洲中文日韩欧美视频| 欧美在线黄色| 桃红色精品国产亚洲av| 丝袜美足系列| 精品一区二区三卡| 免费高清在线观看视频在线观看| 少妇猛男粗大的猛烈进出视频| 国产成人系列免费观看| 亚洲国产欧美一区二区综合| 50天的宝宝边吃奶边哭怎么回事| 久久精品国产a三级三级三级| 欧美在线一区亚洲| 色视频在线一区二区三区| 97在线人人人人妻| a级毛片在线看网站| 午夜日韩欧美国产| 亚洲国产看品久久| 免费看十八禁软件| 中文字幕高清在线视频| 国产又爽黄色视频| a在线观看视频网站| 窝窝影院91人妻| 亚洲国产毛片av蜜桃av| 亚洲精华国产精华精| 久久 成人 亚洲| 天天影视国产精品| 国产色视频综合| 亚洲自偷自拍图片 自拍| 午夜福利,免费看| 精品久久久久久电影网| 午夜激情av网站| 国产精品.久久久| 国产男女内射视频| 少妇粗大呻吟视频| 欧美xxⅹ黑人| 淫妇啪啪啪对白视频 | 他把我摸到了高潮在线观看 | 久久久国产成人免费| 我要看黄色一级片免费的| 国产欧美日韩一区二区三 | 国产精品一区二区免费欧美 | 午夜精品久久久久久毛片777| 国产亚洲精品一区二区www | 91老司机精品| 国产在线观看jvid| 亚洲一卡2卡3卡4卡5卡精品中文| 正在播放国产对白刺激| 免费在线观看日本一区| 极品少妇高潮喷水抽搐| 亚洲欧美精品自产自拍| 一级毛片女人18水好多| 少妇被粗大的猛进出69影院| 99热网站在线观看| 97精品久久久久久久久久精品| 黄色视频不卡| √禁漫天堂资源中文www| 999久久久精品免费观看国产| 午夜福利在线免费观看网站| 国产精品欧美亚洲77777| av天堂在线播放| 香蕉国产在线看| 黑人操中国人逼视频| 精品人妻在线不人妻| 日韩一卡2卡3卡4卡2021年| 亚洲专区国产一区二区| 国产三级黄色录像| 亚洲avbb在线观看| 男女午夜视频在线观看| 欧美精品一区二区免费开放| 两性午夜刺激爽爽歪歪视频在线观看 | av网站免费在线观看视频| 中文字幕最新亚洲高清| 国产野战对白在线观看| 一区在线观看完整版| 亚洲欧美精品综合一区二区三区| 国产欧美亚洲国产| 国产精品免费大片| 成年av动漫网址| 免费人妻精品一区二区三区视频| 一区二区三区乱码不卡18| 在线天堂中文资源库| www.精华液| 久久久国产欧美日韩av| 久久香蕉激情| 国产日韩欧美视频二区| 欧美xxⅹ黑人| 王馨瑶露胸无遮挡在线观看| 亚洲精品一二三| 各种免费的搞黄视频| 亚洲av成人不卡在线观看播放网 | 丝袜脚勾引网站| 叶爱在线成人免费视频播放| 国产av国产精品国产| kizo精华| 美女扒开内裤让男人捅视频| av天堂在线播放| 汤姆久久久久久久影院中文字幕| 精品久久久精品久久久| 精品乱码久久久久久99久播| 欧美日韩亚洲国产一区二区在线观看 | 日韩中文字幕欧美一区二区| 少妇裸体淫交视频免费看高清 | 久久久水蜜桃国产精品网| 一本色道久久久久久精品综合| 妹子高潮喷水视频| 中国美女看黄片| 在线 av 中文字幕| 黄色视频,在线免费观看| 精品国内亚洲2022精品成人 | 亚洲一码二码三码区别大吗| 黑人操中国人逼视频| 蜜桃在线观看..| 老司机福利观看| 精品亚洲成a人片在线观看| av福利片在线| 在线观看www视频免费| 亚洲激情五月婷婷啪啪| 色播在线永久视频| 黄色视频不卡| 脱女人内裤的视频| 国产一卡二卡三卡精品| 老司机福利观看| 国产野战对白在线观看| 亚洲伊人久久精品综合| 三上悠亚av全集在线观看| 欧美日韩成人在线一区二区| 欧美 亚洲 国产 日韩一| 国产精品二区激情视频| 欧美中文综合在线视频| 男人添女人高潮全过程视频| 夜夜夜夜夜久久久久| 国产精品影院久久| 一区二区av电影网| 老汉色∧v一级毛片| 在线观看免费日韩欧美大片| 又紧又爽又黄一区二区| 久久免费观看电影| 欧美性长视频在线观看| 叶爱在线成人免费视频播放| 99久久综合免费| 成人亚洲精品一区在线观看| 日本av手机在线免费观看| 一区二区日韩欧美中文字幕| 成人三级做爰电影| 国产成人系列免费观看| 国产成人免费观看mmmm| 国产深夜福利视频在线观看| bbb黄色大片| 男人舔女人的私密视频| 日韩有码中文字幕| 欧美日韩黄片免| 香蕉国产在线看| 麻豆乱淫一区二区| a级毛片在线看网站| 欧美精品啪啪一区二区三区 | 操美女的视频在线观看| 嫩草影视91久久| 99香蕉大伊视频| 午夜精品国产一区二区电影| 欧美日韩一级在线毛片| 国产亚洲一区二区精品| 日韩大码丰满熟妇| 性色av一级| 香蕉国产在线看| 美女视频免费永久观看网站| 香蕉国产在线看| 12—13女人毛片做爰片一| 中文欧美无线码| 亚洲中文字幕日韩| 成年人黄色毛片网站| 日韩中文字幕欧美一区二区| 久久精品亚洲av国产电影网| 久久久久久免费高清国产稀缺| 中文欧美无线码| 成人av一区二区三区在线看 | 精品福利观看| 一级,二级,三级黄色视频| 97精品久久久久久久久久精品| 十八禁人妻一区二区| 激情视频va一区二区三区| 国产成人影院久久av| 麻豆乱淫一区二区| 大香蕉久久成人网| 亚洲精品国产区一区二| 美女主播在线视频| 午夜精品国产一区二区电影| 99热国产这里只有精品6| 天天躁夜夜躁狠狠躁躁| 色婷婷av一区二区三区视频| videos熟女内射| 一本—道久久a久久精品蜜桃钙片| 一本久久精品| 国产有黄有色有爽视频| 午夜福利影视在线免费观看| 丝袜美腿诱惑在线| 美国免费a级毛片| 免费女性裸体啪啪无遮挡网站| 亚洲va日本ⅴa欧美va伊人久久 | 制服诱惑二区| 久久久久久久国产电影| 视频区图区小说| 精品人妻1区二区| e午夜精品久久久久久久| 搡老岳熟女国产| √禁漫天堂资源中文www| 欧美午夜高清在线| 人人澡人人妻人| 欧美日韩中文字幕国产精品一区二区三区 | 国产av国产精品国产| 91成年电影在线观看| 亚洲专区字幕在线| 精品福利永久在线观看| 侵犯人妻中文字幕一二三四区| 成年人黄色毛片网站| 日韩制服丝袜自拍偷拍| 首页视频小说图片口味搜索| 一区福利在线观看|