• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Coexistence behavior of asymmetric attractors in hyperbolic-type memristive Hopfield neural network and its application in image encryption

    2024-03-25 09:30:10XiaoxiaLi李曉霞QianqianHe何倩倩TianyiYu余天意ZhuangCai才壯andGuizhiXu徐桂芝
    Chinese Physics B 2024年3期
    關(guān)鍵詞:李曉霞天意

    Xiaoxia Li(李曉霞), Qianqian He(何倩倩), Tianyi Yu(余天意),Zhuang Cai(才壯), and Guizhi Xu(徐桂芝)

    1Key Laboratory of Electromagnetic Field and Electrical Apparatus Reliability of Hebei Province,Hebei University of Technology,Tianjin 300130,China

    2State Key Laboratory of Reliability and Intelligence of Electrical Equipment,Hebei University of Technology,Tianjin 300130,China

    3School of Life Science&Health Engineering,Hebei University of Technology,Tianjin 300130,China

    Keywords: hyperbolic-type memristor,Hopfield neural network(HNN),asymmetric attractors,image encryption

    1.Introduction

    The nervous system, comprising a vast network of interconnected neurons,[1,2]is one of the most complex systems in the human body.Neurons communicate and transmit electrochemical signals to accomplish various physiological functions,including perception,cognition,and motor control.Numerous physical and biological experiments have demonstrated a wide range of dynamic phenomena associated with neural activity within the nervous system.[3,4]For instance,several neurological disorders,such as epilepsy,[5]psychiatric diseases,[6]and Alzheimer’s disease,[7]have been found to correlate with the dynamics of the nervous system.[8,9]Hence,it is crucial to study chaotic dynamics in neural networks to better understand and address neurological diseases.Various neural network models[10-14]have been developed to explore and replicate the dynamic activities of biological neural systems.The Hopfield neural network(HNN)[15]is a widely employed computational model of the neural system.It not only captures the intricate connectivity patterns of the brain’s neural network but also possesses the ability to reproduce complex electrical discharge behaviors observed in the brain.In recent years, several improved HNN models have been proposed,such as the synaptic-coupled HNN,[16]fractional-order HNN,[17]hidden chaotic HNN,[18]and multi-winding memristor HNN.[19,20]

    The memristor[21]is an electronic device capable of emulating the synaptic plasticity observed in biological synapses,making it suitable for constructing various types of neural network models.Memristor-based neural network models can be classified into two categories: electromagnetic radiation neural network models[22,23]and memristive synaptic neural network models.[24,25]Among them, the electromagnetic radiation neural network model is a particular type of model that utilizes flux-controlled memristors to establish the correlation between magnetic field strength and membrane voltage in neural networks.The dynamic behaviors of neurons or neural networks are investigated in this model,focusing on the impact of external stimuli, including electromagnetic radiation and electric field stimulation.The former influences the electrical activity of neurons[26,27]while the latter can induce mode transitions in isolated neuron electrical activity.[28]In their ground-breaking work,Liet al.[29]were the pioneers in uncovering that electromagnetic radiation has the capability to suppress the electrical activity of neurons and regulate the collective dynamics of neural networks by employing the Hodgkin-Huxley neuron model.Wanet al.[30]utilized hyperbolic-type and quadratic nonlinear memristors to simulate the effects of electromagnetic perturbations and radiation on a hypernetwork neural network.Their research uncovered intricate dynamic behaviors displayed by the HNN across different coupling strengths,confirming the presence of bistable patterns.The memristive synaptic neural network model establishes connections between neurons and facilitates information transmission by leveraging the synaptic properties of memristors.Linet al.[31]demonstrated complex behaviors of spatial multistructures and spatial initial offset in a memristive Hopfield neural network (mHNN) with three memristor coupling weights.Maet al.[32]developed a multi-stable HNN incorporating two generalized memristor synapses.Indeed,the findings of their study provided evidence that the modified mHNN with dual memristor synapses displays chaotic behavior and coexists with asymmetric attractors.These two models have higher dynamism and complexity than the original neural network model and can produce various phenomena such as attractors, periodicity, chaos, chimera states,[33]and offset enhancement.[34]Currently,research on memristor synapse neural network models is still in the early stages and requires further theoretical studies and experimental validation to uncover their mechanisms and advantages.

    Chaotic signals, characterized by internal randomness and deterministic properties, can be utilized for generating pseudo-random numbers[35,36]and are of great importance in the fields of image watermarking[40]and image encryption.[39,41]In the field of artificial intelligence, including machine learning, image encryption, and information security, researchers have shown a growing interest in the application of HNNs.Particularly,the generated chaotic signals from HNNs have garnered significant attention among professional researchers in the realm of image encryption.Numerous studies have indicated that image encryption techniques utilizing HNNs characterized by intricate chaotic dynamics showcase exceptional performance in terms of encryption.By employing HNNs with chaotic dynamics to generate scattering matrices, several encryption algorithms for color images have been suggested.[40-42]Yuet al.[43]presented a novel image encryption algorithm that utilizes a multiscroll mHNN for achieving secure encipherment.Currently,researchers are actively involved in the advancement of contemporary encryption techniques for sensitive data,including applications such as encrypting medical images[44]and ensuring privacy protection for medical data.[45]Because of their intricate dynamic characteristics, these encryption techniques demonstrate enhanced security efficacy in contrast to earlier schemes.Hence,the development of chaotic systems utilizing mHNNs has emerged as a prominent research area, gaining substantial attention in scientific and technological domains.

    Based on the preceding discourse, this study explored the tumultuous dynamics of non-symmetrical hyperbolic-type memristors and their utilization in image encryption.This study presents the following key innovations and advancements:

    (1)A new and simple hyperbolic-type three-dimensional mHNN model is proposed to explain its chaotic mechanism.

    (2) Nonlinear analysis tools are used to show that compared with previous models, the introduced hyperbolic-type mHNN exhibits a coexisting bistability of chaotic attractors and periodic attractors, which is verified through Multisim simulation.

    (3) Based on the hyperbolic-type mHNN, an image encryption scheme is introduced by examining the color channels (red, green, and blue) of the image.The proposed encryption scheme exhibits reduced correlation,increased information entropy,and good resistance to differential attacks and resistance robustness.

    The subsequent sections of this paper are organized as follows.Section 2 provides an introduction to a hyperbolic-type mHNN model,emphasizing its bounded behavior and analyzing the stability of equilibrium points.In Section 3,traditional analysis tools are employed to investigate the coexistence and bistability phenomenon of asymmetric attractors.Section 4 presents an image encryption scheme built upon the mHNN.Section 5 outlines the design of a simulation electronic circuit to validate the system’s feasibility.Lastly,Section 6 provides a summary of the paper.

    2.Hyperbolic-type memristor emulator

    2.1.Math model

    A memristor is a type of nonlinear resistor with memory,nanoscale structure, low power consumption, and adjustable resistance.Therefore, memristors have wide applications in simulating neurons and synapses.Two categories of memristors exist: charge-controlled and magnetic-controlled.In neural networks,the activation function for neurons often employs the hyperbolic tangent function, which is a differentiable and monotonically bounded function within the range of-1 to 1.This paper uses a hyperbolic tangent-type memristor to simulate neuron synapses,and its model is given by

    The input voltage and current of the memristor emulator are represented byvandi,respectively.The internal state variable is denoted asv0.The memductance of the magnetic-controlled memristor is given byW(v0)=a-btanh(v0),whereaandbare positive real coefficients.To facilitate calculations,ais set to 1,andbis a tunable parameter,which represents the memristor’s conductance in the magnetic-controlled memristor.

    A system of circuit state equations is used to describe the HNN, which corresponds tonneurons.[46]The circuit state equation for thei-th neuron incorporates the use of a tangenttype memristor to simulate neuron synapses.The model for this equation is provided as follows:

    The neuron cell membrane is characterized by its capacitance(Ci)and resistance(Ri).The voltage state variable across capacitorCiis denoted asxi, while the hyperbolic tangent activation function(tanh(xi))captures the neuron’s behavior.The synaptic weight matrix(W=(wi j)),with dimensions ofn×n,represents the connection strength between neuroniand neuronj.The input bias current is denoted asIi.It is important to note that the dynamic behavior of the mHNN is highly influenced by its synaptic weight values, and investigating the dynamics of a neural network with varying synaptic weights is both valuable and significant.

    Fig.1.Topology of hyperbolic mHNN connections.

    In this study,we examine a neural network with three neurons as illustrated in Fig.1.The connection matrix associated with this specific connectivity structure is given by

    LettingCi=1,Ri=1,n=3, andIi=0, we can obtain the dimensionless equation that characterizes the behavior of the memristive network as follows:

    whereW=a-btanh(x4) represents the nonlinear synaptic weight of the model.The constantkdenotes a positive value that characterizes the strength of coupling attributed to memristors with hyperbolic characteristics.Additionally,W32is an adjustable weight parameter.From this nonlinear relationship, it can be observed that the synaptic weight associated with the second neuron is influenced by the intrinsic value of the three neurons.This configuration can make the dynamics of the brain more complex.Equation (4) models the hyperbolic mHNN as a three-dimensional autonomous nonlinear dynamical system,capturing the nonlinear synaptic weight of the model.

    2.2.Bounded proof

    The parametersaandbin Eq.(4)are positive real numbers that relate to the hyperbolic-type memristorW32,and both of them are positive real numbers.It can be proven that the period and chaotic trajectories obtained from Eq.(4)are both constrained within a bounded region.

    Based on the method described in Ref.[47],a Lyapunov function is presented as

    For all (x1,x2,x3,x4) in a sufficiently large regionD0>0,whereV(x1,x2,x3,x4)=DandD >D0,the following inequality holds:

    is a bounded region encompassing all solutions of Eq.(4),i.e.,the proposed mHNN.

    2.3.Equilibrium points and stabilities

    The memristive model, Eq.(4), exhibits symmetry with respect to the parameterb,as indicated by the transformation of(x1,x2,x3,x4,b)to(-x1,-x2,-x3,-x4,-b).

    To determine the equilibrium points of the mHNN system with hyperbolic memory resistance,one can solve Eq.(4)numerically while satisfying the condition that the left-hand side is zero andW32is fixed at 3.8.The equilibrium points of the system include one point at the origin,P0=(0,0,0,0),as well as two non-zero points,P1=(η1,η2,η3,η4)andP2=(μ1,μ2,μ3,μ4).These non-zero equilibrium points can be obtained by solving the following system of equations:

    Analyzing the graphical intersection of the two function curves allows us to derive the values ofy1,z1,y2, andz2.For instance, considering the valuesk=0.3,a=1, andb=0.1,we can plot the two function curves described in Eq.(18) in Fig.2,facilitating the identification of their intersection points.By examining the graph, we obtain the solutions as follows:y1=0.0064,z1=1.8445,y2=-0.0199, andz2=-1.9390.From Eq.(18), we can easily solve for two non-zero equilibrium points,denoted asP1andP2.

    Fig.2.The two function curves intersect at certain points when a=1,b=0.1,and k=0.3.

    Equation (4) is used to derive the Jacobian matrix at the equilibrium pointP=(x1,x2,x3,x4)The eigenvalues ofP0are solely determined by the memristor’s internal parameteraand not influenced by the internal parameterb.According to the stability criterion established by Routh-Hurwitz,for a cubic polynomial in the form ofλ3+a1λ2+a2λ+a3=0, the parameters of the equation should satisfy the conditionsa1>0,a3>0,anda1a2>a3in order for the solution to be stable.It can be seen that parameteracannot satisfy the conditiona1>0 for Eq.(19),hence,the equilibrium point’s trajectory always exhibits instability.Hence, under this condition, system (4) cannot produce hidden attractors according to its definition.

    The eigenvalues for the non-zero equilibrium pointsP1=(η1,η2,η3,η4) andP2= (μ1,μ2,μ3,μ4) can be determined through numerical simulations using MATLAB.Under the conditions ofa=1 andb=0.1,based on Table 1,variations in the internal memristor parameterklead to changes in the zero equilibrium pointP0,as well as the equilibrium pointsP1andP2.Furthermore,the alterations in the internal memristor parameterkalso have an impact on the corresponding eigenvalues and the type of chaotic attractors generated.This indicates that there exist multiple unstable equilibrium points in system (4) under different conditions of the internal memory resistance parameterk, suggesting that the system is capable of generating chaotic attractors and prone to exhibiting multistable phenomena related to the initial state.

    Table 1.Equilibria points,eigenvalues,and types of equilibria.

    3.Complex behaviors of the hyperbolic-type mHNN

    The objective of this section is to investigate the diverse dynamics observed in the hyperbolic mHNN through the utilization of various analytical tools such as bifurcation plots,two-parameter maximal Lyapunov exponent graphs, phase plane orbits, Lyapunov exponents, and attraction basins.The dynamic behaviors of the 3D mHNN model, as described by Eq.(4), were numerically simulated using the fourth-order Runge-Kutta method.The Wolf method was employed to compute the Lyapunov exponent and evaluate the system’s sensitivity to its initial state.The simulations used a time step of 1×10-3to ensure accurate representation of the dynamics.

    3.1.Parameter-dependent dynamic distribution

    Witha= 1 and the initial condition set to (0.1, 0, 0,0), the comprehensive dynamics of the coupling parameters were explored through the utilization of two-parameter maximum Lyapunov exponent maps.Figure 3 displays these maps for the (k,W32) and (k,b) parameter combinations, providing an insight into the global behavior.When the memristive coupling parameterkand the synaptic weightW32change simultaneously, the color-coded map of the maximum Lyapunov exponent at each iteration is obtained and shown in Fig.3(a).The dynamics of the system, such as periodic attractors,quasi-periodic,and chaotic behavior,are recorded in these two-parameter Lyapunov exponent maps.The numerical value of the maximum Lyapunov exponent is indicated by different colors in the color bar, where periodic behavior with regular attractors is characterized by one color, quasiperiodic behavior is supported by another color, and chaotic behavior with bounded random patterns is supported by yet another color.Figure 3(b)shows the two-parameter maximum Lyapunov exponent map on thek-bplane.The complex dynamics are shown to evolve on thek-W32andk-bplanes in Fig.3,capturing the transition from the region of periodic behavior to that of chaotic behavior.

    Fig.3.Two-parameters maximal Lyapunov exponent graphs.

    3.2.Dynamics with coexisting bifurcation modes

    When the model is initialized with the initial conditions of(0.1,0,0,0)and(-0.1,0,0,0),the bifurcation parameters chosen include the memristive coupling strengthk, synaptic weightW32,and initial statex3(0).

    From the dynamic map of the parameter space in Fig.3,it can be seen that when the synaptic weightW32=3.8, the model(4) is in a chaotic state.Figure 4 displays the bifurcation diagram and Lyapunov exponent plot of the state variablex2.The plots were generated using the Runge-Kutta algorithm and Wolf algorithm,with fixed memristor internal coupling parametersa=1 andb=0.1.Figure 4(a)illustrates the bifurcation diagram and Lyapunov exponent spectrum of the model under two different initial conditions.The blue spectral line corresponds to the initial condition (0.1, 0, 0, 0), while the red spectral line represents the bifurcation diagram behavior under the initial condition (-0.1, 0, 0, 0).Similarly,in Fig.5(a), the teal spectral line corresponds to the bifurcation diagram and Lyapunov exponent spectrum under the initial condition (0.1, 0, 0, 0), while the green spectral line represents the bifurcation diagram behavior under the initial condition (-0.1, 0, 0, 0).Figure 4 shows that a coexisting asymmetric bistable mode is globally present in model (4).Figure 4 reveals various complex dynamic effects associated with the memristive coupling strength in model (4), such as the presence of coexisting periodic attractors,coexisting spiral chaotic attractors, forward period doubling bifurcations, and chaotic crises.By examining the bifurcation diagram, it becomes evident that the blue and red trajectories coincide within the ranges ofk=[0,0.08] and [0.1, 0.32], suggesting the absence of coexisting phenomena.Askprogressively increases within the range ofk=[-0.1,0.6], the dynamic behavior of model(4)undergoes a transition from a periodic limit cycle to a chaotic state,facilitated by a chaotic crisis.Whenk=0.09,the system transitions from the chaotic state to an unstable coexisting periodic attractor, which then enters a chaotic state.Coexisting bifurcations appear whenk=0.32, manifested as a single vortex chaotic attractor pattern.Whenktakes on values of 0.33 and 0.4155, the red and blue trajectories sequentially converge to a period-1 limit cycle through forward period doubling bifurcations from the chaotic state.The dynamics reflected by the finite-time Lyapunov exponent spectrum in Fig.4(b)align with those exhibited in the bifurcation diagram depicted in Fig.4(a).

    Fig.5.With increase in memristor coupling strength W32,different initial conditions exhibit various bifurcation behaviors: (a)bifurcation diagrams of the state variable x2;(b)Lyapunov exponents.

    Fig.6.The coexisting bifurcation behavior varies depending on the initial conditions of x3(0):(a)bifurcation diagrams of the state variable x2;(b)Lyapunov exponents.

    Whenk= 0.2 and the internal coupling parameters of the two memristors are held constant ata=1 andb=0.1,Figs.5(a) and 5(b) illustrate the bifurcation diagram and the first three Lyapunov exponent spectra of the model under two sets of initial conditions,while the synaptic weightW32ranges from 2 to 12.The numerical results show that asW32varies in the range of[2,12],the mHNN model undergoes complex dynamic evolution.With increasing synaptic weightW32, the trajectory initiates from a period-1 limit cycle to an unstable chaotic state atW32=2.581,during which there is no coexisting phenomenon in the mHNN model.WhenW32=5.667,a coexisting chaotic state appears,and then the green trajectory undergoes reverse period doubling bifurcation atW32=6.646,degenerating into a period-4 limit cycle before entering a period-2 limit cycle.The teal and blue trajectories experience reverse period doubling bifurcations atW32=8.563, transitioning from a period-1 limit cycle to a period-3 limit cycle before ultimately reaching a period-2 limit cycle.

    Withkfixed at 0.35 andW32at 3.8,the coexisting bifurcation behaviors of model(4)are examined based on initial conditions.The initial values of the two memristorsx2=x4=0 remain unchanged, whilex1is set to±0.1, andx3(0) serves as the bifurcation parameter.This is exemplified in Fig.6(a),where the black and purple trajectories correspond to initial conditions (0.1, 0,x3(0), 0) and (-0.1, 0,x3(0), 0) respectively.As the initial value of memristorx3(0) increases from-20 to 20, model (4) shows coexisting dynamic behavior of chaotic states and period-3 attractors alternatingly appearing.The results presented in Fig.6 indicate that model(4)exhibits a bistable mode induced by initial conditions.

    3.3.Coexistence of attractors and bistability

    Referring to the bifurcation diagram in Fig.4, multiple coexisting windows with different attractors can be identified.Taking the memristive synaptic weightk=0.32 as an example, a pair of coexisting chaotic attractors are displayed in Fig.7(a),and the corresponding basin of attraction.Atk=0.4,Fig.7(b)demonstrates the simultaneous presence of a period-2 attractor and a chaotic attractor.Atk=0.5,Fig.7(c)exhibits the coexistence of two distinct asymmetric attractors and a periodic attractor.Therefore,the phase portraits are different under different memristive coupling strengths,and the numerical results indicate that the memristive coupling strength can induce complex dynamical effects in the mHNN model.

    Fig.7.Phase portraits of chaotic attractors in x1-x3 and corresponding basins of attraction at different k values: (a)k=0.32;(b)k=0.4;(c)k=0.5.

    Fig.8.Basins of attraction on two different initial value planes: (a) basins of attraction on the initial value plane of x1(0)-x3(0); (b) phase portraits on the x1(0)-x3(0)plane.

    In order to gain a deeper understanding of the model’s behavior and the impact of initial conditions, the attractor domains are characterized in various dynamical states using basins of attraction on the initial value plane.Figure 8(a)illustrates the basins of attraction on thex1(0)-x3(0) initial value plane,taking the Fig.6 bifurcation diagram as an example.In this case, withx2(0)=x4(0)fixed at 0, the green and yellow regions indicate the presence of periodic and chaotic attractors,respectively.Notably,the distribution of regions for each color is independent.Therefore, the phase portraits for two typical initial conditions, (3, 0, 3, 0) and (-3, 0, 3, 0), are shown in Fig.8(b),where a coexistence of chaotic and period-2 attractors is displayed,indicating that the model(4)exhibits bistable modes.

    4.Image encryption

    In order to investigate the application of mHNN,a novel color image encryption scheme was developed by leveraging the chaotic attractors generated by the mHNN.The encryption method employed in this scheme was thoroughly analyzed,and the resulting test results were carefully examined to assess its performance and effectiveness.The encryption process,as illustrated in Fig.9,follows the following steps.

    Fig.9.Image encryption process.

    Step 1 The settings area=1,b=0.1,k=0.35 and initial conditions are(0.1,0,0,0),with a time step 0.0005 and a discard number ofN=1000.The newly proposed mHNN neural network system was continuously iterated to generate chaotic sequences(x1(i),x2(i),x3(i),x4(i),r1,r2),where(x1(i),x2(i),x3(i),x4(i))are the initial conditions for this model,andr1,r2are two random 8-bit numbers.

    Step 2 The original color picturePis divided into three parts:Pr,Pg,andPb.Chaos matricesS1,S2,S3,andS4are generated with a matrix size ofm×n.Scrambling and diffusion operations are then performed onS1,S2,S3, andS4.In this paper,two different formulas for diffusion and scrambling are used in image encryption.

    The scrambling operation is a commonly used encryption method,which obfuscates the spatial structure of the image by changing the position,order,or exchange pixels of the pixels,making the encrypted image difficult to be decrypted.TakingS1as an example,with its messing method is as follows:

    where the floor(x) function rounds the elements ofxto the nearest integer less than or equal tox.In this context,mandnrepresent the number of rows and columns in matrixP,while rows and cols correspond to the dimensions of matrixS1.The notationS1(i,j)refers to the element located at the intersection of rowiand columnjin matrixS1.Through the scrambling operation,each elementP(i,j)in the matrixPcan be mapped to a new position(u1,v1),globally scrambledPr,Pg,andPbto the following three sequences:

    The diffusion operation aims to propagate the alteration of pixel values throughout the entire image, ensuring that each pixel is influenced by neighboring pixels.This process enhances the encryption strength, making it challenging to decrypt the encrypted image.We use the input matrixPand the chaotic sequenceSto calculate the output matrixC, and calculate the matrixTiof each row.The specific operation mode is as follows:

    Fig.10.The image encryption results are presented as follows: (a1)-(a4)original images;(b1)-(b4)histograms of the original images;(c1)-(c4)encrypted images;(d1)-(d4)histograms of the encrypted images.

    Step 3 Image decryption is the reverse process of encryption.

    To showcase the effectiveness of the devised image encryption scheme, four representative images were chosen.These images include the Lena color image and three other color images (4.2.03, 4.2.07, and 2.1.05) sourced from the USC-SIPI data set.The selected images respectively represent human figures,animals,food,and remote sensing scenes,as illustrated in Figs.10(a1)-10(a4).These images possess varied content and share a common resolution of 512×512 pixels.Following encryption, the information becomes entirely concealed,rendering it visually impossible to discern the original image details.

    4.1.Histograms

    Histogram analysis is employed to assess the effectiveness of image encryption algorithms,illustrating the distribution of various pixel intensity values within the image.This necessitates achieving an even distribution of pixels with distinct intensities in the histogram,thereby bolstering resilience against statistical attacks.The assessment of the encryption system’s resistance to statistical attacks can be made by comparing the histograms of the original and encrypted images.Figure 10 presents the original color image and its corresponding encrypted image after being converted into three RGB channels.Additionally, the histograms of both images are displayed for comparison and analysis.Histogram analysis demonstrated a substantial enhancement in the uniformity of the encrypted image’s histogram in comparison to the original image.This observation suggests that the encryption system exhibits robustness against statistical attacks.

    4.2.Correlation coefficient and entropy analysis

    Analysis of the correlation between adjacent pixels evaluates the level of correlation between neighboring pixel values within an image.Typically,the original image exhibits a high correlation coefficient, approaching 1.To augment the confidentiality of the encryption algorithm in encrypted images, it is preferable for the correlation coefficient between adjacent pixels to approach zero in all three directions.This signifies the absence of significant correlation and strengthens the level of confidentiality.

    Correlation analysis serves as a technique for assessing the confidentiality performance of encryption algorithms.A correlation coefficient approaching zero between adjacent pixels in the encrypted image signifies the encryption algorithm’s effective disruption of pixel correlation.Consequently,this enhances the confidentiality performance of the encryption system.The correlation between pixel pairs can be calculated using the formula provided below:

    Fig.11.The correlation between the red(R)component of the plain Lena image and its corresponding cipher was analyzed in the horizontal,vertical,and diagonal directions.

    Table 2.Correlation coefficients and information entropy values of the original and encrypted images in three RGB channels.

    Here,nxandmxrepresent neighboring pixels,Ndenotes the total number of pixels, and ˉmand ˉncorrespond to the average values of pixelnxandmx.Figure 11 displays a random selection of 10000 adjacent pixel pairs taken from the three channels of both the original and encrypted images.The correlation coefficients between the RGB channels of the original and encrypted images are presented in Table 2 for comparative analysis.According to the analysis, the correlation coefficients of the original image are close to 1,while the encrypted image exhibits correlation coefficients approaching zero in all directions.This indicates that the proposed encryption system possesses a robust level of security.

    Information entropy serves as a critical metric for assessing the randomness of encrypted image pixels.A high information entropy in encrypted images indicates excellent randomness properties within the encryption system.When computing information entropy for a color image,the image is decomposed into its three RGB channels.Each channel can be treated as an 8-bit gray-scale image,with an ideal information entropy value of 8 after encryption.Thus,a higher information entropy value indicates a more random pixel distribution and better encryption performance.Table 2 presents the measured information entropy of both the original and encrypted images in this experiment.The research findings indicate that encrypting the image significantly enhances its information entropy,approaching the theoretical maximum value of 8.These results provide strong evidence for the effectiveness of the encryption method employed,as well as the heightened level of randomness achieved within the encrypted image.

    4.3.NPCR and UACI

    The examination of subtle variations in the original image and their impact on the encrypted image enables the exploration of potential vulnerabilities that can be exploited to crack the encryption.To evaluate the robustness of encryption algorithms against differential attacks,metrics such as the number of pixel change rate (NPCR) and unified average change intensity (UACI) can be utilized.These metrics are valuable for assessing the effectiveness of encryption algorithms in resisting differential attacks.For two original images that have slight differences, the NPCR and UACI of the corresponding encrypted imagesPandFcan be defined as follows:

    whereP(i,j)andF(i,j)represent the encrypted data obtained from different pixels in the encrypted image.The variablesmandndenote the total number of pixels in the image.In the case of 8-bit images,the threshold for NPCR and UACI is defined as follows:

    Table 3 presents the NPCR and UACI results for four test images.The results indicate that the designed encryption scheme exhibits certain advantages in terms of resisting differential attacks.

    Table 3.UACI and NPCR values of test images.

    4.4.Robustness to noise and data loss

    During the transmission or storage of images, they are vulnerable to noise or data attacks that can result in the distortion of image information.This requires encryption algorithms to be robust and resist such noise attacks and data tampering during information transmission.To conduct the counter-evidence experiment,we chose Lena as the test image and introduced various types of noise and data loss to evaluate the resilience of the image encryption algorithm.Figure 12 shows the test results of resistance to noise attacks and data loss.The encrypted image was subjected to various densities of Gaussian, salt-and-pepper, and multiplicative noise.After decryption, the encrypted image with missing data in certain regions was successfully restored to its original form.From Fig.12, we demonstrate that although certain pixel values in the decrypted image have altered,the encryption scheme successfully retains the approximate information of the original image.This indicates that the proposed encryption scheme exhibits resilience against noise attacks and data loss,thereby ensuring enhanced security.

    Fig.12.Robustness analysis: (a1) encrypted image with 0.05% Gaussian noise added; (b1) encrypted image with 1%salt-and-pepper noise added;(c1)encrypted image with 1%multiplicative noise added;(d1)encrypted image with one-sixteenth data loss;(a2),(b2),(c2),and(d2)are the decrypted images corresponding to(a1),(b1),(c1),and(d1),respectively.

    5.Analog circuit design

    In this section, we utilized simulated operational amplifiers, analog multipliers, resistors, capacitors, and diodes to design and implement the mHNN.Our initial step involved designing a circuit module(Fig.13(a))to approximate the hyperbolic tangent function.[48]The circuit module for approximating the hyperbolic tangent function(Fig.13(a))comprises two operational amplifiers(U1,U2),two diodes(D1,D2),and four resistors(RA,RB,RC,RD).This circuit topology is simpler compared to the hyperbolic tangent function circuit modules designed in previous literature.[49]The practicality of implementing the hyperbolic tangent function is demonstrated by the input-output relationship of the approximate circuit module,which can be represented asv=tanh(vi).This is achieved by utilizing two 1N4007 diodes and setting the four resistors to specific values:RA=0.9 kΩ,RB=0.5 kΩ,RC=0.5 kΩ,andRD=0.5 kΩ.In accordance with scientific and technical writing conventions, a circuit module for the hyperbolic-type memristor was designed as described in Ref.[50],as depicted in Fig.13(b).The memristor emulator module demonstrates a defined input-output relationship,which can be expressed as

    whereRk=R/k(kΩ),Ra=gR/b(kΩ),Rb=R(Ra+R)/(aRa-R)(kΩ),and the gain of the multiplierM,denoted byg,is set to 1.

    Figure 13(c) illustrates the circuit diagram of the hyperbolic-type mHNN, which consists of three capacitors and one hyperbolic-type memristorW.This configuration incorporates four dynamic components associated with the state variablesx1,x2,x3, andx4, as described by the mathematical model in Eq.(4).The circuit equations are derived from the circuit schematic depicted in Fig.13:

    Given fixed values ofR(10 kΩ)andC(100μF),the remaining resistor values can be computed using the element values from the synaptic weight matrix,Eq.(3),in the following manner:

    Figure 14 depicts the phase trajectory obtained from the Multisim system simulation circuit, confirming the existence of coexisting bistable modes in the hyperbolic-type mHNN model.This validation is based on specific parameter values:k=0.35,a=1,b=0.1,Rk=R/k=10/0.35=28.5714 kΩ,Ra=gR/b=10/0.1=100 kΩ,andRb=R(Ra+R)/aRaR=10(100+10)/100-10=1 kΩ.

    Fig.13.The circuit implementation schematic of the hyperbolic-type memristor HNN: (a) tanh(·) circuit module; (b) memristor emulator module;(c)main circuit module.

    Fig.14.The experimental results illustrate phase plane plots showing the coexistence of chaotic and periodic attractors.

    6.Conclusions

    This paper introduces a novel circuit simulation of a three-neuron Hopfield model using hyperbolic memristors and demonstrates its effectiveness in image encryption.Nonlinear analysis techniques, including two-parameter maximum Lyapunov exponent plots, bifurcation diagrams, attractor basins,and phase trajectory diagrams, reveal the presence of asymmetric attractors and bistability in the system model.The designed color image encryption algorithm outperforms existing methods in correlation,information entropy,resistance to differential attacks, noise robustness, and data loss prevention.To support the validity of the results, an improved modular circuit design method is employed to create the analog equivalent circuit of the proposed model, which is rigorously validated using the Multisim environment.This validation process provides strong evidence for the accuracy and reliability of our numerical findings.

    Therefore, future research can further explore the application of memristive neural networks in areas such as data security, communication systems, and pattern recognition.It is necessary to conduct in-depth investigations into circuit hardware implementations based on memristors,such as dedicated memristor chips or integrated circuits,to fully harness the potential of memristive neural networks in various practical applications.In conclusion, this study not only demonstrates the effectiveness of the proposed circuit simulation method in image encryption but also establishes a foundation for further exploration of memristive neural networks in various applications.By expanding the scope of applications and addressing security issues, the prospects for chaotic system applications will be further enhanced.

    Acknowledgements

    Project supported by the National Nature Science Foundation of China (Grant Nos.51737003 and 51977060) and the Natural Science Foundation of Hebei Province (Grant No.E2011202051).

    猜你喜歡
    李曉霞天意
    史籍中的糟粕——天意
    樂于助人的朵朵豬
    快樂語文(2021年30期)2021-12-21 10:18:48
    不畏失敗
    快樂語文(2021年15期)2021-06-15 10:19:40
    眼 睛
    快樂語文(2021年9期)2021-05-06 02:19:42
    生 日
    快樂語文(2019年33期)2019-03-14 07:38:44
    一個美好的愿望
    快樂語文(2017年27期)2017-11-15 03:46:21
    這故事的扉頁,原來是你
    哲思2.0(2017年2期)2017-09-03 08:25:18
    第一場雪
    快樂語文(2017年36期)2017-02-05 01:57:30
    如果愛有天意
    雪花(2015年6期)2015-12-10 23:55:46
    天意
    小說月刊(2015年2期)2015-04-23 08:49:51
    免费看日本二区| 久久精品国产亚洲av涩爱 | 国产91精品成人一区二区三区| www.999成人在线观看| 欧美成人a在线观看| 少妇人妻精品综合一区二区 | 午夜福利欧美成人| 男女之事视频高清在线观看| 三级毛片av免费| 亚洲三级黄色毛片| 亚洲国产高清在线一区二区三| 成人三级黄色视频| 久久久久久大精品| 成人性生交大片免费视频hd| 欧美潮喷喷水| 欧美日韩黄片免| 色综合亚洲欧美另类图片| 在线观看美女被高潮喷水网站 | 成人国产综合亚洲| 两性午夜刺激爽爽歪歪视频在线观看| 成人午夜高清在线视频| 国产精品爽爽va在线观看网站| 亚洲精品色激情综合| 国产精品免费一区二区三区在线| 一a级毛片在线观看| 美女免费视频网站| 91午夜精品亚洲一区二区三区 | 国产老妇女一区| 久久久久久久久久成人| 欧美+日韩+精品| 亚洲欧美日韩东京热| 亚洲av五月六月丁香网| 激情在线观看视频在线高清| 少妇高潮的动态图| 网址你懂的国产日韩在线| 国产精品98久久久久久宅男小说| 亚洲一区二区三区色噜噜| 最新中文字幕久久久久| 毛片一级片免费看久久久久 | 国产aⅴ精品一区二区三区波| 亚洲av五月六月丁香网| 在线观看一区二区三区| 在线观看美女被高潮喷水网站 | 日本免费一区二区三区高清不卡| 欧美一区二区国产精品久久精品| 99热这里只有是精品在线观看 | 亚洲黑人精品在线| 丰满人妻熟妇乱又伦精品不卡| 人妻制服诱惑在线中文字幕| 国产精品久久久久久精品电影| 99久久无色码亚洲精品果冻| 亚洲第一电影网av| 麻豆久久精品国产亚洲av| 深夜精品福利| 可以在线观看的亚洲视频| 中文字幕久久专区| 国内少妇人妻偷人精品xxx网站| www.999成人在线观看| 国产精品嫩草影院av在线观看 | 国产亚洲精品综合一区在线观看| 国产三级在线视频| 免费大片18禁| 亚洲av电影不卡..在线观看| 日本成人三级电影网站| 波多野结衣高清作品| 久久九九热精品免费| 亚洲欧美日韩高清在线视频| 久久久久久九九精品二区国产| 变态另类丝袜制服| 直男gayav资源| 国产伦在线观看视频一区| 日本免费一区二区三区高清不卡| 欧美性猛交╳xxx乱大交人| 在线看三级毛片| 色综合婷婷激情| 99国产极品粉嫩在线观看| 美女高潮喷水抽搐中文字幕| 美女cb高潮喷水在线观看| 亚洲人成网站高清观看| 中文字幕av成人在线电影| 亚洲国产欧美人成| 亚洲av不卡在线观看| 欧美精品啪啪一区二区三区| 99热只有精品国产| 18禁黄网站禁片午夜丰满| 18+在线观看网站| 最好的美女福利视频网| 一级毛片久久久久久久久女| 久久伊人香网站| 三级男女做爰猛烈吃奶摸视频| 美女大奶头视频| 琪琪午夜伦伦电影理论片6080| 免费大片18禁| 国产一区二区亚洲精品在线观看| 欧美黑人巨大hd| 亚洲五月婷婷丁香| 成年免费大片在线观看| 亚洲久久久久久中文字幕| 亚洲av不卡在线观看| 免费黄网站久久成人精品 | 我要看日韩黄色一级片| 亚洲欧美日韩高清专用| x7x7x7水蜜桃| 老司机午夜福利在线观看视频| 精品日产1卡2卡| 国产在线精品亚洲第一网站| 9191精品国产免费久久| 日韩中文字幕欧美一区二区| 小说图片视频综合网站| 欧美三级亚洲精品| 国产一级毛片七仙女欲春2| 亚洲av二区三区四区| 小说图片视频综合网站| 国产精品影院久久| 国产午夜精品久久久久久一区二区三区 | 久久精品久久久久久噜噜老黄 | 1000部很黄的大片| 村上凉子中文字幕在线| 99热只有精品国产| 欧美性猛交╳xxx乱大交人| 欧美丝袜亚洲另类 | 欧美日本亚洲视频在线播放| 18美女黄网站色大片免费观看| 男女那种视频在线观看| av中文乱码字幕在线| 男女之事视频高清在线观看| 国产aⅴ精品一区二区三区波| 国产高潮美女av| 色哟哟·www| 中文字幕精品亚洲无线码一区| 欧美激情国产日韩精品一区| 色噜噜av男人的天堂激情| 亚洲熟妇熟女久久| 舔av片在线| 俄罗斯特黄特色一大片| 精品免费久久久久久久清纯| 俺也久久电影网| 亚洲五月婷婷丁香| 首页视频小说图片口味搜索| 色av中文字幕| av专区在线播放| 国产免费男女视频| 成人国产综合亚洲| 国产一级毛片七仙女欲春2| 成人三级黄色视频| 床上黄色一级片| 69人妻影院| 青草久久国产| 在线看三级毛片| 成人一区二区视频在线观看| 亚洲电影在线观看av| 精品久久国产蜜桃| 免费在线观看成人毛片| 成人高潮视频无遮挡免费网站| 久久99热这里只有精品18| 国产亚洲av嫩草精品影院| 国产大屁股一区二区在线视频| 黄色一级大片看看| 国产精品久久久久久久电影| 亚洲av成人不卡在线观看播放网| 国产一区二区在线观看日韩| 亚洲美女黄片视频| 变态另类丝袜制服| 性插视频无遮挡在线免费观看| 久9热在线精品视频| 午夜福利成人在线免费观看| 精品久久久久久久久久免费视频| 日韩精品中文字幕看吧| 免费在线观看影片大全网站| 欧美bdsm另类| 欧美日韩中文字幕国产精品一区二区三区| 亚洲国产精品成人综合色| 国产亚洲欧美98| 9191精品国产免费久久| 每晚都被弄得嗷嗷叫到高潮| 88av欧美| 噜噜噜噜噜久久久久久91| 亚洲欧美激情综合另类| а√天堂www在线а√下载| 国产美女午夜福利| 国产色婷婷99| 亚洲电影在线观看av| 婷婷六月久久综合丁香| 一个人观看的视频www高清免费观看| 欧美中文日本在线观看视频| 亚洲精品乱码久久久v下载方式| 亚洲黑人精品在线| 精品一区二区三区视频在线| 欧美国产日韩亚洲一区| 中文资源天堂在线| 在线十欧美十亚洲十日本专区| 婷婷色综合大香蕉| 男女床上黄色一级片免费看| 一区二区三区高清视频在线| 色吧在线观看| 精品一区二区三区视频在线| 日日摸夜夜添夜夜添av毛片 | 日本五十路高清| 欧美成人性av电影在线观看| 久久久久性生活片| 免费在线观看日本一区| 国产高潮美女av| 俄罗斯特黄特色一大片| 日韩欧美在线二视频| 国产精品一区二区三区四区免费观看 | 一个人免费在线观看电影| 精品熟女少妇八av免费久了| 成熟少妇高潮喷水视频| 日韩欧美免费精品| av视频在线观看入口| 非洲黑人性xxxx精品又粗又长| 级片在线观看| 欧美绝顶高潮抽搐喷水| 亚洲国产精品久久男人天堂| 亚洲最大成人中文| 色噜噜av男人的天堂激情| 十八禁人妻一区二区| 午夜久久久久精精品| 精品不卡国产一区二区三区| 91午夜精品亚洲一区二区三区 | 国产乱人伦免费视频| 97碰自拍视频| 国产精品一区二区三区四区久久| 欧美黑人巨大hd| 国产亚洲精品久久久com| 尤物成人国产欧美一区二区三区| 国产亚洲精品综合一区在线观看| ponron亚洲| 草草在线视频免费看| 毛片一级片免费看久久久久 | 毛片一级片免费看久久久久 | 十八禁人妻一区二区| 九色国产91popny在线| 动漫黄色视频在线观看| 日韩欧美免费精品| 国产精品人妻久久久久久| 精品一区二区免费观看| 亚洲人与动物交配视频| 国产一级毛片七仙女欲春2| 国产伦人伦偷精品视频| 国产av麻豆久久久久久久| 久久精品国产自在天天线| 久久久国产成人免费| 国产探花极品一区二区| 久久久久久国产a免费观看| 国产精品久久久久久久久免 | 国产伦人伦偷精品视频| 国产精品久久久久久久久免 | 精品久久久久久久末码| 18+在线观看网站| 草草在线视频免费看| 日韩高清综合在线| 老司机福利观看| 淫秽高清视频在线观看| 啪啪无遮挡十八禁网站| 夜夜夜夜夜久久久久| 赤兔流量卡办理| 黄色一级大片看看| 色在线成人网| 99国产精品一区二区蜜桃av| 成熟少妇高潮喷水视频| 亚洲,欧美,日韩| av在线观看视频网站免费| 国产成人福利小说| 亚洲成av人片免费观看| 亚洲美女搞黄在线观看 | 99久久精品热视频| av视频在线观看入口| 三级毛片av免费| 国产av一区在线观看免费| 欧美绝顶高潮抽搐喷水| 日韩欧美国产一区二区入口| 琪琪午夜伦伦电影理论片6080| 很黄的视频免费| 欧美+日韩+精品| 色综合亚洲欧美另类图片| 很黄的视频免费| 一级黄色大片毛片| 欧美性猛交╳xxx乱大交人| 精品日产1卡2卡| 亚洲电影在线观看av| 天美传媒精品一区二区| 在线播放无遮挡| 亚洲自偷自拍三级| 欧美另类亚洲清纯唯美| 神马国产精品三级电影在线观看| 日日干狠狠操夜夜爽| 亚洲天堂国产精品一区在线| 婷婷色综合大香蕉| 成人鲁丝片一二三区免费| 久久精品91蜜桃| 听说在线观看完整版免费高清| 中文字幕人妻熟人妻熟丝袜美| 俺也久久电影网| 丁香六月欧美| 欧美黑人欧美精品刺激| 亚洲第一电影网av| 村上凉子中文字幕在线| 欧美xxxx性猛交bbbb| 又紧又爽又黄一区二区| 69av精品久久久久久| netflix在线观看网站| www.999成人在线观看| 日本在线视频免费播放| 欧美日本亚洲视频在线播放| 熟女人妻精品中文字幕| 亚洲 欧美 日韩 在线 免费| 亚洲五月天丁香| 91九色精品人成在线观看| 精品午夜福利在线看| 色综合欧美亚洲国产小说| 在线观看av片永久免费下载| 真人一进一出gif抽搐免费| 网址你懂的国产日韩在线| 国产黄色小视频在线观看| 亚洲欧美日韩高清在线视频| 97超视频在线观看视频| 又爽又黄a免费视频| 午夜a级毛片| 亚洲成a人片在线一区二区| 在线观看av片永久免费下载| 简卡轻食公司| 国内精品美女久久久久久| 十八禁人妻一区二区| 少妇高潮的动态图| 久久6这里有精品| 国产亚洲精品av在线| 国产国拍精品亚洲av在线观看| 午夜久久久久精精品| 男女下面进入的视频免费午夜| 麻豆av噜噜一区二区三区| 日韩人妻高清精品专区| 亚洲人与动物交配视频| 日韩人妻高清精品专区| 国产精品美女特级片免费视频播放器| 人妻夜夜爽99麻豆av| 十八禁人妻一区二区| 亚洲经典国产精华液单 | 婷婷亚洲欧美| 欧美成人a在线观看| 亚洲最大成人中文| 成人午夜高清在线视频| 日韩精品中文字幕看吧| 亚洲aⅴ乱码一区二区在线播放| 欧美日韩国产亚洲二区| 亚洲无线在线观看| 中文字幕高清在线视频| 色综合站精品国产| 在线国产一区二区在线| 欧美性猛交╳xxx乱大交人| 午夜日韩欧美国产| 亚洲av日韩精品久久久久久密| 夜夜躁狠狠躁天天躁| 美女高潮喷水抽搐中文字幕| 国产成人a区在线观看| 国产欧美日韩一区二区三| 午夜激情福利司机影院| 网址你懂的国产日韩在线| 久久中文看片网| 又爽又黄无遮挡网站| 99国产精品一区二区三区| 欧美在线黄色| 在现免费观看毛片| 日本熟妇午夜| 欧美黄色片欧美黄色片| 欧美日韩福利视频一区二区| 国产精品野战在线观看| 亚洲成人精品中文字幕电影| 免费观看人在逋| 亚洲久久久久久中文字幕| 一区二区三区高清视频在线| 亚洲av日韩精品久久久久久密| 成年免费大片在线观看| 国内精品一区二区在线观看| 热99在线观看视频| 精品免费久久久久久久清纯| www.熟女人妻精品国产| 亚洲成人久久性| 综合色av麻豆| 高清在线国产一区| 国产精品久久久久久亚洲av鲁大| 久久久久久久精品吃奶| 在线十欧美十亚洲十日本专区| 午夜亚洲福利在线播放| 亚洲av五月六月丁香网| 色精品久久人妻99蜜桃| 久久香蕉精品热| 在线观看午夜福利视频| 国语自产精品视频在线第100页| 日韩av在线大香蕉| h日本视频在线播放| 色播亚洲综合网| 激情在线观看视频在线高清| 国产精品久久视频播放| 成人特级黄色片久久久久久久| 久久久久国内视频| 熟女电影av网| 国产亚洲av嫩草精品影院| 亚洲 欧美 日韩 在线 免费| 最近在线观看免费完整版| 成人特级黄色片久久久久久久| 欧美成人一区二区免费高清观看| 国语自产精品视频在线第100页| 亚洲欧美日韩卡通动漫| 激情在线观看视频在线高清| 欧美黑人巨大hd| 亚洲av五月六月丁香网| www.www免费av| 在线观看66精品国产| 最近最新免费中文字幕在线| av天堂中文字幕网| 一本久久中文字幕| 国产一级毛片七仙女欲春2| 好男人在线观看高清免费视频| 免费在线观看影片大全网站| 午夜激情欧美在线| 亚洲成人精品中文字幕电影| 亚洲第一欧美日韩一区二区三区| 精品久久久久久久久亚洲 | 日日摸夜夜添夜夜添av毛片 | 99精品久久久久人妻精品| 精品一区二区三区视频在线观看免费| 在现免费观看毛片| 成人毛片a级毛片在线播放| 麻豆成人午夜福利视频| 中文字幕av成人在线电影| bbb黄色大片| 亚洲 国产 在线| 国产成人aa在线观看| 大型黄色视频在线免费观看| 夜夜夜夜夜久久久久| 91av网一区二区| 亚洲男人的天堂狠狠| 久久精品国产自在天天线| 一卡2卡三卡四卡精品乱码亚洲| 色在线成人网| 色av中文字幕| 日韩欧美一区二区三区在线观看| 欧美绝顶高潮抽搐喷水| 国产伦人伦偷精品视频| 亚洲精品一卡2卡三卡4卡5卡| 99riav亚洲国产免费| 欧美日韩黄片免| 亚洲国产色片| 亚洲av成人不卡在线观看播放网| 欧美黄色淫秽网站| 少妇被粗大猛烈的视频| 国产综合懂色| 女生性感内裤真人,穿戴方法视频| 真人做人爱边吃奶动态| 黄色视频,在线免费观看| 国产伦在线观看视频一区| 色哟哟·www| 亚洲国产日韩欧美精品在线观看| 制服丝袜大香蕉在线| 熟妇人妻久久中文字幕3abv| 久久6这里有精品| h日本视频在线播放| 18美女黄网站色大片免费观看| 亚洲人成网站在线播放欧美日韩| 99精品久久久久人妻精品| 神马国产精品三级电影在线观看| 亚洲一区高清亚洲精品| av国产免费在线观看| 亚洲最大成人手机在线| 亚洲精品一区av在线观看| 91麻豆av在线| 他把我摸到了高潮在线观看| 十八禁国产超污无遮挡网站| 精品午夜福利在线看| 夜夜躁狠狠躁天天躁| 亚洲内射少妇av| 日日摸夜夜添夜夜添小说| 亚洲最大成人av| 欧美乱色亚洲激情| 国产精品久久久久久人妻精品电影| 激情在线观看视频在线高清| 午夜免费激情av| 久久热精品热| 亚洲欧美激情综合另类| 91av网一区二区| 国产av一区在线观看免费| 亚洲av成人av| 国产成+人综合+亚洲专区| 午夜福利在线观看吧| 人妻夜夜爽99麻豆av| 亚洲一区高清亚洲精品| 高清日韩中文字幕在线| 国产精品人妻久久久久久| 国产精品久久久久久人妻精品电影| 国产午夜福利久久久久久| 国产视频内射| 日本五十路高清| 亚洲精品乱码久久久v下载方式| 久久精品影院6| 搞女人的毛片| 亚洲成av人片免费观看| 亚洲成人精品中文字幕电影| 观看免费一级毛片| 18禁在线播放成人免费| av天堂中文字幕网| 非洲黑人性xxxx精品又粗又长| 久久精品国产自在天天线| 夜夜躁狠狠躁天天躁| 日韩欧美免费精品| 亚洲 欧美 日韩 在线 免费| 国产69精品久久久久777片| 草草在线视频免费看| 国产伦精品一区二区三区四那| 日日干狠狠操夜夜爽| 日本黄大片高清| 最新在线观看一区二区三区| 国产精品免费一区二区三区在线| 亚洲三级黄色毛片| 亚洲av熟女| 日本黄大片高清| 国产精品伦人一区二区| 亚洲国产欧洲综合997久久,| 久久精品国产亚洲av涩爱 | 人人妻人人澡欧美一区二区| 直男gayav资源| 天堂√8在线中文| 国产熟女xx| 老鸭窝网址在线观看| 国产午夜福利久久久久久| 非洲黑人性xxxx精品又粗又长| 在线观看一区二区三区| 99热精品在线国产| 嫩草影院新地址| 久久香蕉精品热| 亚洲成a人片在线一区二区| 欧美午夜高清在线| 日日摸夜夜添夜夜添av毛片 | 久久精品国产亚洲av天美| 波多野结衣高清作品| 在线播放无遮挡| 亚洲黑人精品在线| av在线蜜桃| 老司机午夜福利在线观看视频| 99热只有精品国产| 91狼人影院| 老鸭窝网址在线观看| 两个人的视频大全免费| 欧美黄色淫秽网站| 国产精品一及| 91狼人影院| 久久久久九九精品影院| 国产精品久久久久久亚洲av鲁大| 蜜桃久久精品国产亚洲av| 十八禁网站免费在线| 国产伦在线观看视频一区| 一边摸一边抽搐一进一小说| 欧美+亚洲+日韩+国产| 欧美日韩亚洲国产一区二区在线观看| 国产高清视频在线观看网站| 国产精品亚洲美女久久久| 国产精华一区二区三区| 亚洲欧美日韩无卡精品| 精品一区二区三区av网在线观看| 欧美性感艳星| 国产亚洲精品av在线| 午夜亚洲福利在线播放| 中文资源天堂在线| 我要看日韩黄色一级片| 欧美一级a爱片免费观看看| 亚洲熟妇熟女久久| 国产精品野战在线观看| 天堂动漫精品| 夜夜躁狠狠躁天天躁| 国产一区二区亚洲精品在线观看| 色综合婷婷激情| 两个人视频免费观看高清| 成年版毛片免费区| 18美女黄网站色大片免费观看| 精品一区二区三区视频在线观看免费| 精品欧美国产一区二区三| 波多野结衣高清无吗| 欧美丝袜亚洲另类 | 国产不卡一卡二| 国产aⅴ精品一区二区三区波| 亚洲自偷自拍三级| 国产精品电影一区二区三区| 综合色av麻豆| 激情在线观看视频在线高清| 禁无遮挡网站| 日本免费一区二区三区高清不卡| 色视频www国产| 婷婷六月久久综合丁香| 国内精品久久久久精免费| 亚洲狠狠婷婷综合久久图片| 成人国产综合亚洲| 久久性视频一级片| 久久精品人妻少妇| 久久草成人影院| 亚洲激情在线av| 国产精品电影一区二区三区| 欧美一区二区亚洲| 欧美不卡视频在线免费观看| 亚洲成av人片免费观看| 亚洲av成人不卡在线观看播放网| 中文字幕人妻熟人妻熟丝袜美| 国产黄色小视频在线观看| 久久热精品热| 国产色爽女视频免费观看| 丝袜美腿在线中文| 国产男靠女视频免费网站| 亚洲三级黄色毛片| 欧美成人一区二区免费高清观看| 亚洲国产精品sss在线观看| 99久久精品一区二区三区| 性色avwww在线观看| 中文字幕人成人乱码亚洲影| 欧美一级a爱片免费观看看| 亚洲五月天丁香| 成人三级黄色视频|