• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Reversible Data Hiding for Medical Images in Cloud Computing Environments Based on Chaotic Hénon Map

    2013-06-09 15:46:04LiChinHuangMinShiangHwangandLinYuTseng

    Li-Chin Huang, Min-Shiang Hwang, and Lin-Yu Tseng

    Reversible Data Hiding for Medical Images in Cloud Computing Environments Based on Chaotic Hénon Map

    Li-Chin Huang, Min-Shiang Hwang, and Lin-Yu Tseng

    —Reversible data hiding techniques are capable of reconstructing the original cover image from stego-images. Recently, many researchers have focused on reversible data hiding to protect intellectual property rights. In this paper, we combine reversible data hiding with the chaotic Hénon map as an encryption technique to achieve an acceptable level of confidentiality in cloud computing environments. And, Haar digital wavelet transformation (HDWT) is also applied to convert an image from a spatial domain into a frequency domain. And then the decimal of coefficients and integer of high frequency band are modified for hiding secret bits. Finally, the modified coefficients are inversely transformed to stego-images.

    Index Terms—Cloud computing environments, encryption, Haar digital wavelet transformation, Hénon map, reversible data embedding.

    1. Introduction

    With the development of Internet, cloud computing is going to be applied in large data centers. Considering security issues, it is important to manage the data and services in cloud computing environments safely. Techniques of reversible data hiding[1]–[3]are more efficient and cheaper than intrusion detection system (IDS)[4]solutions in image security. To improve security in clinical information such as medical history, radiology images, and personal states, many reversible schemes are getting more and more important via Internet and cloud computing environments. After the process of embedding secrets, data hiding schemes[5]?[7]which can restore the original image and extract secrets from stego-images without distortion are known as reversible schemes[8],[9]. The applications of reversible techniques have already been adopted by variety of high precision systems such as the health care system, artwork, and science.

    In the transform domain schemes[1],[10], the cover image will be transformed to a set of coefficients modified for embedding secrets and then the modified coefficients perform the inverse transformation to construct stego-images. An integer discrete cosine transform reversible data hiding scheme was presented by Yanget al.[11]. Based on the compressed domain[12], reversible data hiding schemes have already developed by joint photographic experts group (JPEG)[13], vector quantization[14], and block truncation coding[15]. In spatial domains, there are three schemes: difference expansion (DE), histogram shifting, and cryptography base schemes[16]. DE techniques[17]are based on checking the redundancy between the two neighboring pixels to obtain a high capacity and low distortion data hiding. In 2009, Louet al.[18]developed a reduction DE method to adjust the expansion difference and embed data into multiple layers in medical images to increase capacity. The histogram shifting techniques[19]are adopted to search the peak and zero points in the cover image histogram. Then, the bins between the peak and zero points will be shifted with one level to empty the peak point for hiding secrets. Cryptography-based reversible data hiding techniques[20]consider steganography as a cryptography. Therefore, a variety of secret communications messages can be embedded in stegoimages.

    Reversible data hiding techniques play a critical role in medical images. To provide some preliminary diagnosis for health care[21],[22]without the restoration of the original medical images, some data hiding schemes[19]embedded secrets into the region of non-interest (RONI) and less secret bits are embedded into the region of interest (ROI). In mobile healthcare applications, Rochanet al.[23]adopted an arithmetic coding and cryptography to embed data in medical images.

    Haar digital wavelet transformation (HDWT) is an important technique to transform an image from a spatial domain to a frequency domain composed of different frequency bands. Since human eyes are less sensitive to change the image of the high-frequency coefficients, Changet al.[1]adopted this property to conceal secret data.

    With the advent of cloud computing environments, confidentiality of data becomes more and more important. In 2011, Abbasyet al.[24]presented a data hiding based on deoxyribonucleic acid (DNA) sequences to encrypt in cloud computing environments. Conventional cryptography utilizes a long bit strings encryption key. However, it is hard to be applied in high resolution images and huge amount of data. Patidaret al.[25]adopted an efficient substitution-diffusion image cipher using chaotic standard and logistic maps. In this paper, we apply the Hénon map[26]and chaotic-based cryptosystems to data hiding.

    This paper is organized as follows. Section 2 demonstrates our method. Section 3 presents the experimental results. And conclusions are drawn in Section 4.

    2. Proposed Method

    HDWT-based reversible image hiding is applied to embednbits secret messages for each block in this paper. In the application of compression and data hiding, two-dimensional discrete wavelet transform (DWT) is often adopted to transform the spatial domain to the frequency domain. We apply also HDWT to transform an image in the frequency domain for data hiding described as follows.

    2.1 Embedding Secret Phase

    Let a one-level HDWT decomposition transform a spatial domain cover image into a frequency domain cover image. Further, each coefficient of the image is divided two parts: integer and decimal. In Fig. 1 and Fig. 2, there are 4 types of decimal fractions: 0, 0.25, 0.5, and 0.75. In this paper, we adopt decimal 0 and 0.5 to embed secret.

    At preliminary process, we select four decimal fractions (D1,D2,D3,D4) whereD1,D2,D3,D4∈{0, 0.5}. And four decimal fractions satisfy the relationRdescribed as follow.

    Let (D1,D2,D3,D4) be a set of candidate decimal fractions. Candidate decimal fractions will be generated as {(0, 0, 0, 0), (0, 0, 0.5, 0.5), (0, 0.5, 0, 0.5), (0, 0.5, 0.5, 0)}. Thus, decimal secret code provides 2 bits embedding shown in Table 1.

    Step 1: Image partition with non-overlapping image blocks.

    AssumeHbe a 16-bit depth gray scale medical HD WT images with sizem×nwheremis the image width andnis the image height. We partition imageHinto a set of 4×4 blocks. Thus, many blocks will be generated in imageH.

    Step 2: Embed secret bits to the decimal part.

    1) Apply one-level HDWT operation.

    We apply one-level HDWT to the original image demonstrated in Fig. 3. The cover imageHis transformed to values with decimal shown in Fig. 1 (c).

    Fig. 1. Results of two dimensional image transform, (a) original image (b) values of the ROI in the medical image, and (c) coefficients of the ROI after one-level HDWT operation.

    Fig. 2. Division of HDWT images into three matrices:HI,HS, andHD.

    Fig. 3. Flowcharts of the data embedding.

    2) Retrieve decimal codes according to secret bits.

    For each secret bits, we retrieve decimal codes (D1,D2,D3,D4) from decimal codes table shown in Table 1. For instance, we will get the decimal codes (0, 0, 0.5, 0.5) if the embed bit is 01.

    3) Alter decimal value in the HDWT images to embed data.

    In our method, we partition the HDWT coefficients into three parts: integer, sign, and decimal. Then, integer matrixHI, sign matrixHS, and decimal matrixHDwill be generated, as shown in Fig. 4. We merge decimal codes with integer matrixHIand sign matrixSIdescribed as follows.

    ? Select four sets of integers from integer matrixHIby

    wheni=1 andj=2, the sets of integers areHI(1, 2),HI(1, 4),HI(3, 2), andHI(3, 4). According to (2), four sets of integer (582, 0, 1, 0), (585, 0, 0, 0), (582, 0, 1, 1) and (585, 0, 0, 1) will be produced from integer matrixHIfor embedding shown in Fig. 4.

    ? Modify decimal values in HDWT images.

    When we embed 2 secret digits 10, the set of the decimal codes (0, 0.5, 0, 0.5) will be retrieved from the decimal code table shown in Table 1. The values of unsigned HDWT images are a set of integers and decimal codes. Then, new HDWT images are unsigned HDWT images withHSmatrix shown in (3).

    wherei,j∈{1, 2}. Therefore, each pixel of new HDWT images combines decimal codes of secret bits andHI. Suppose the casei=1,j=2 will retrieveHI=(585, 0, 0, 0), we combineHIand the set of the decimal codes (0, 0.5, 0, 0.5) shown in Fig. 4 and Table 1. New HDWT images are obtained as follows.

    Suppose the case (i,j)={(1, 1), (1, 2), (2,1), (2, 2)} in (3) embed secret bits ‘01’→{(0, 0, 0.5, 0.5)}, ‘11’→{(0, 0.5, 0.5, 0)} , ‘01’→{(0, 0, 0.5, 0.5)} and ‘00’→{(0, 0, 0, 0)} from Table 1, respectively. The new HDWT images will be obtained as demonstrated in Table 2.

    ? RecordHDmatrix.

    TheHDmatrix will be recorded in order to restore original image at the extraction stage shown in Fig. 4. We also utilize the arithmetic coding method[1]to compress theHDmatrix and embed them to cover images.

    Step 3: Embed secret bits to integer part of high-frequency band.

    The coefficients of high-frequency band which are presented in Fig. 4 (c), HH area, will influence the subtle texture after applying one-level HDWT decomposition. Further, most coefficients are utilized in the data compression method. In our scheme, the secret bits are embedded to the integer part.

    Table 1: Decimal codes with 2 bits coding

    Fig. 4. Two dimensional HDWT: (a) original image, (b) horizontal operation of (a) in 4×4 block image, (c) vertical operation of (b), and (d) invert two dimensional HDWT.

    Table 2: New HDWT images combines decimal codes andHIwithHS

    Table 3: Invert transform of new HDWT images

    Step 4: Invert one-level HDWT.

    Two dimensional Haar discrete wavelet invert high-frequency band will be chosen to 0[1]. Transformation is applied to HDWT images after the embedding process in decimal and high-frequency band described in Step 2, Step 3, Fig. 4 (d), and Table 3.

    Step 5: Construct invert one-level HDWT images blocks.

    In order to get the stego-images, the invert one-level HDWT images blocks are constructed.

    Step 6: Process the underflow/overflow problem.

    In this scheme, there are two kinds of medical image formats: signed bit and unsigned bit. We adjust image histograms to prevent overflow/underflow problems. At first, we compute intensity rate by the range of intensity and bit-depth of image. The range of intensity is the difference of maximum and minimum intensity in the whole image. Bit-depth is the number of bits utilized to indicate the gray of a single pixel. In the next step, the underflow rate (or overflow rate) is calculated by the value of underflow (or overflow) and bit-depth. The value of underflow (or overflow) is the minimum (or maximum) value in the whole image. Finally, the utilization rate is the sum of the absolute values of intensity rate and underflow (or overflow) rate. The formulas are demonstrated as follows.

    The utilization rate = |intensity rate| +|underflow/overflow rate|.

    On low underflow/overflow rates of high bit-depth medical images, unsinged bit images will produce underflow problems. And it is hard to find the underflow/overflow problem in the signed bit images.

    Step 7: Generate chaotic image.

    This step is to disarrange the stego-images for cloud computing environments. We adopt chaotic Hénon map to construct a cryptographic application scheme. At first, pseudo-random sequence is generated by Hénon map[26], as shown in Fig. 5.

    2.2 Data Extraction Phase

    Fig. 5. Produce chaotic image byrotate and Hash by Hénon map: (a) partition stego-images, (b) rotate each blocks with Hénon map sequence, (c) disarrange each blocks by SHA-512, and (d) disarrange each block by Hénon map sequence.

    In order to extract secret bits, many parameters from embedding phase are needed such as decimal codes table, block size, and shift distance for underflow/overflow. The data extraction is able to extract secrets correctly and obtain the original image without any distortions. The details are described below. At the first step, chaotic images are downloaded from cloud computing environments and perform the invert chaotic Hénon map procedure to obtain stego-images. Then, the invert underflow/overflow process is performed by shifting back histogram. The whole image is partitioned into 4×4 non-overlaying block size like the data embedding process. The next step is one-level Haar discrete wavelet transformation for each block as shown in Fig. 4. Then, the digit of integer part in high-frequency band (HH) is extracted as secret bits. As the similar way in data embedding, secrets are extracted from the decimal and restore the decimal by the original decimal. At the final step, the block image performs the invert transform of the one-level HDWT to obtain the original image.

    3. Experimental Results

    Our scheme is performed at two kinds of high quality computer tomography (CT) and magnetic resonance imaging (MRI) medical images with digital imaging and communications in medicine (DICOM) from the National Cancer Imaging Archive[15]. This method is implemented by MATLAB and experimented on Notebook with 2.67 GHz processor and 4.0 GB RAM. In general, the quality of stego-images is measured by peak signal to noise ratio (PSNR) and mean square error (MSE). The definition of MSE is described as follows.

    where an image bit depth may be set to 16 (or 12). The parameters ofmandnare the width and height of the image. Bothare intensities of the pixels located in cover and stego-images, respectively. We experiment onCT and MRI medical images with 16-bit depth. The capacity and bpp (bit per pixel) will depend on PSNR. In Table 4 and Table 5, the embedded bits in integer and decimal part are 7 and 2, respectively. Because theHDmatrix and decimal code tale are stored in the embedding phase, the overload of capacity will reduce capacity as shown in Table 4, Table 5, and Step 2. For example, slice 1.3.6.1.4.1.9328.50.14.1141.dcm can embed 294725 bits to cover image with overload of capacity 169703. In Table 5, there are underflow problems with distance_O about intensity value 126 to 128. In order to process underflow/overflow problems, the histogram shifts to rightward with distance_O.

    4. Conclusions

    In this paper, we present a reversible image data hiding method by modifying the decimal and integer of coefficients of HDWT, and a Hénon map is adopted to transform stego-images into chaotic image to achieve an acceptable level of confidentiality in cloud computing environments.

    Table 4: Rsults for sign 16-bit grayscale medical image with secret decimal 4-bit

    Table 5: Results for sign 16-bit grayscale medicalimage

    Generally, HDWT is a popular method to convert an image from spatial domain to frequency domain which is composed of different frequency bands as LL, LH, HL, and HH. The HH bands will be embedded with secret bits.

    Changet al.[1]adopted HH bands to embed secret bits in zeros of Integer part. In our scheme, we embed secret bits to both decimal part and integer part in HH bands. The result of capacity and the quality of image are demonstrated on Table 4 and Table 5. Although the overhead of the recordingHDmatrix will reduce capacity, the best capacity is still reach 0.96 bpp (bit per pixel) as shown in Table 4. In cloud computing environments, the most of important problem is data confidentiality. The Hénon map is a simple and efficiency method to disarrange stago-images.

    Acknowledgment

    We would like to thank National Cancer Institute for providing the CT image data used in this study.

    [1] C.-C. Chang, P.-Y. Pai, C.-M. Yeh, and Y.-K. Chan, “A high payload frequency-based reversible image hiding method,”Information Sciences, vol. 180, pp. 2286–2298, Jun. 2010.

    [2] L.-C. Huang, L.-Y. Tseng, and M.-S. Hwang, “The study of data hiding in medical image,”Int. Journal of Network Security, vol. 14, no. 5, pp. 243–251, 2012.

    [3] S. S. Sujatha and M. M. Sathik, “A novel DWT based blind watermarking for image authentication,”Int. Journal of Network Security, vol. 14, no. 4, pp. 223–228, 2012.

    [4] L.-C. Huang and M.-S. Hwang, “The study of intrusion detection system,”Journal of Electronic Science and Technology, vol. 10, no. 3, pp. 269–275, 2012.

    [5] C.-M. Wang, N.-I. Wu, C.-S. Tsai, and M.-S. Hwang, “A high quality steganographic method with pixel-value differencing and modulus function,”The Journal of Systems and Software, vol. 81, no. 1, pp. 150–158, 2008.

    [6] C.-C. Wu, S.-J. Kao, and M.-S. Hwang, “A high quality image sharing with steganography and adaptive authentication scheme,”The Journal of Systems and Software, vol. 84, pp. 2196–2207, Dec. 2011.

    [7] C.-C. Wu, M.-S. Hwang, and S.-J. Kao, “A new approach to the secret image sharing with steganography and authentication,”The Imaging Science Journal, vol. 57, no. 3, pp. 140–151, 2009.

    [8] L.-C. Huang, L.-Y. Tseng, and M.-S. Hwang, “A reversible data hiding method by histogram shifting in high quality medical images,”The Journal of Systems and Software, vol. 86, pp. 716–727, Mar. 2013.

    [9] L.-C. Huang, M.-S. Hwang, and L.-Y. Tseng, “Reversible and high-capacity data hiding in high quality medical images,”KSII Trans. on Internet and Information Systems, vol. 7, no. 1, pp. 132–148, 2013.

    [10] G.-R. Xuan, Y.-Q. Shi, Q.-M. Yao, Z.-C. Ni, C.-Y. Yang, J.-J. Gao, and P.-Q. Chai, “Lossless data hiding using histogram shifting method based on integer wavelets,”Lecture Notes in Computer Science, vol. 4283, pp. 323–332, Aug. 2006.

    [11] B. Yang, M. Schmucker, X. Niu, C. Busch, and S. Sun,“Integer-DCT-based reversible image watermarking by adaptive coefficient modification,”Proc. of the SPIE, vol. 5681, pp. 218–229, Jan. 2005.

    [12] C.-C. Chang, C.-Y. Lin, and Y.-P. Hsieh, “Data hiding for vector quantization images using mixed-based notation and dissimilar patterns without loss of fidelity,”Information Sciences, vol. 201, pp. 70–79, Oct. 2012.

    [13] C.-C. Chang, C.-C. Lin, C.-S. Tseng, and W.-L. Tai,“Reversible hiding in DCT-based compressed images,”Information Sciences, vol. 177, no. 13, pp. 2768–2786, 2007.

    [14] Z.-M. Lu, J.-X. Wang, B.-B. Liu, “An improved lossless data hiding scheme based on image VQ-index residual value coding,”The Journal of Systems and Software, vol. 82, no. 6, pp. 1016–1024, 2009.

    [15] C.-C. Chang, C.-C. Lin, and Y.-H. Fan, “Lossless data hiding for color images based on block truncation coding,”Pattern Recognition, vol. 41, pp. 2347–2357, Jul. 2008.

    [16] L.-C. Huang and M.-S. Hwang, “Two-party authenticated multiple-key agreement based on elliptic curve discrete logarithm problem,”Int. Journal of Smart Home, vol. 7, no. 1, pp. 9–18, 2013.

    [17] J. Tian, “Reversible data embedding using a difference expansion,”IEEE Trans. on Circuits System Video Technology, vol. 13, no. 8, pp. 890–896, 2003.

    [18] D.-C. Lou, M.-C. Hu, and J.-L. Liu, “Multiple layer data hiding scheme for medical images,”Computer Standards and Interfaces, vol. 31, pp. 329–335, Feb. 2009.

    [19] M. Fallahpour, D. Megias, and M. Ghanbari, “Reversible and high-capacity data hiding in medical images,”IET Image Processing, vol. 5, no. 2, pp. 190–197, 2011.

    [20] S. M. C. Vigila and K. Muneeswaran, “Nonce based elliptic curve cryptosystem for text and image applications,”Int. Journal of Network Security, vol. 14, no. 4, pp. 236–242, 2012.

    [21] L.-Y. Tseng and L.-C. Huang, “An adaptive thresholding method for automatic lung segmentation in CT images,” inProc. of IEEE AFRICON 2009, Nairobi, 2009, pp. 1–5.

    [22] L.-Y. Tseng and L.-C. Huang, “Automatic fissure detection in CT images based on the genetic algorithm,” inProc. of the 2010 Int. Conf. on Machine Learning and Cybernetics, Taipei, 2010, pp. 2583–2588.

    [23] M. Rochan, S. Hariharan, and K. Rajamani, “Data hiding scheme for medical images using lossless code for mobile HIMS,” inProc. of the 3rd Int. Conf. on Communication Systems and Networks, Bangalore, 2011, pp. 1–4.

    [24] M. Reza Abbasy and B. Shanmugam, “Enabling data hiding for resource sharing in cloud computing environments based on DNA sequences,” inProc. of 2011 IEEE World Congress on Services, Washington, DC, 2011, pp. 385–390.

    [25] V. Patidar, N. K. Pareek, G. Purohit, and K. K. Sud,“Modified substitution-diffusion image cipher using chaotic standard and logistic maps,”Communications in Nonlinear Science and Numerical Simulation, vol. 15, no. 10, pp.2755–2765, 2010.

    [26] M. Suneel, “Cryptographic pseudo-random sequences form the chaotic Hénon map,”Indian Academy of Sciences, vol. 34, pp. 689–701, Oct. 2009.

    Min-Shiang Hwangreceived the B.S. degree in electronic engineering from National Taipei Institute of Technology, Taipei in 1980, the M.S. degree in industrial engineering from National Tsing Hua University in 1988, and the Ph.D. degree in computer and information science from National Chiao Tung University in 1995. He also studied applied mathematics with National Cheng Kung University from 1984 to 1986. He was the Chairman with the Department of Information Management, CYUT during 1999 to 2002. He is currently a professor with the Department of Management Information System, NCTU. He is a member of IEEE, ACM, and Chinese Information Security Association. Dr. Hwang had published more than 170 articles on the above research fields in international journals. His current research interests include electronic commerce, database and data security, cryptography, image compression, and mobile computing.

    Lin-Yu Tsengreceived the B.S. degree in mathematics from the National Taiwan University in 1975, the M.S. degree in computer science from the National Chiao Tung University in 1978, and the Ph.D. degree in computer science from National TsingHua University in 1988. He is presently a professor with the Department of Computer Science and Communication Engineering, Providence University. His research interests include evolutionary computation, neural network, multimedia systems, image processing, pattern recognition, and bioinformatics.

    uang

    the B.S. and M.S. degrees in information management both from Chaoyang University of Technology (CYUT), Taichung in 2001 and 2003, respectively. She is currently working towards the Ph.D. degree with the Department of Computer Science and Engineering, the National Chung Hsing University (NCTU). Her current research interests include information security, cryptography, medical image, and mobile communications.

    Manuscript received October 20, 2012; revised March 13, 2013.

    L.-C. Huang is with National Land Surveying and Mapping Center, Taichung (e-mail: lsb55239@gmail.com).

    M.-S. Hwang is with the Department of Computer Science & Information Engineering, Asia University, Taichung (Corresponding author e-mail: mshwang@asia.edu.tw).

    L.-Y. Tseng is with Department of Computer Science and Communication Engineering, Providence University, Taichung (e-mail: lytseng@pu.edu.tw).

    Digital Object Identifier: 10.3969/j.issn.1674-862X.2013.02.019

    午夜激情福利司机影院| 国产一区二区在线观看日韩 | 国内精品一区二区在线观看| 99久久综合精品五月天人人| 国产精品爽爽va在线观看网站| 中文字幕人成人乱码亚洲影| 亚洲片人在线观看| 女人高潮潮喷娇喘18禁视频| 午夜免费成人在线视频| 麻豆久久精品国产亚洲av| 国产一区二区三区视频了| 国产乱人伦免费视频| 在线a可以看的网站| 一区二区三区激情视频| 网址你懂的国产日韩在线| 精品不卡国产一区二区三区| 三级国产精品欧美在线观看 | 俺也久久电影网| 亚洲五月婷婷丁香| 高清毛片免费观看视频网站| 丝袜人妻中文字幕| 亚洲无线在线观看| 欧美极品一区二区三区四区| 麻豆国产av国片精品| 国产成年人精品一区二区| 成在线人永久免费视频| 欧美成狂野欧美在线观看| 成人三级做爰电影| 精品国内亚洲2022精品成人| 无限看片的www在线观看| 国产免费男女视频| 精品久久久久久久人妻蜜臀av| 观看免费一级毛片| 波多野结衣巨乳人妻| 激情在线观看视频在线高清| 亚洲中文字幕日韩| 久久久久久九九精品二区国产| 18禁黄网站禁片免费观看直播| 精品人妻1区二区| 波多野结衣巨乳人妻| 欧美丝袜亚洲另类 | 欧美大码av| 丁香六月欧美| 成人国产综合亚洲| 精品电影一区二区在线| 1024香蕉在线观看| 俄罗斯特黄特色一大片| 欧美日韩乱码在线| 亚洲人与动物交配视频| 亚洲国产中文字幕在线视频| 午夜日韩欧美国产| 一进一出抽搐gif免费好疼| 丰满的人妻完整版| 制服丝袜大香蕉在线| 亚洲国产色片| 又大又爽又粗| 在线观看日韩欧美| 男插女下体视频免费在线播放| 一进一出好大好爽视频| 国产aⅴ精品一区二区三区波| 国产v大片淫在线免费观看| 色尼玛亚洲综合影院| 中文资源天堂在线| 曰老女人黄片| 久久国产精品影院| 日本黄大片高清| 午夜a级毛片| 欧美性猛交黑人性爽| 国产精品女同一区二区软件 | 成人特级av手机在线观看| 国产不卡一卡二| 美女免费视频网站| 嫩草影视91久久| ponron亚洲| 亚洲乱码一区二区免费版| 一级a爱片免费观看的视频| 欧美黄色片欧美黄色片| 国产精品女同一区二区软件 | 国产成人欧美在线观看| 久久精品影院6| 97碰自拍视频| 黄色女人牲交| 美女高潮喷水抽搐中文字幕| 99久久精品热视频| 午夜亚洲福利在线播放| 俺也久久电影网| 最新美女视频免费是黄的| www日本在线高清视频| 日韩精品青青久久久久久| www.999成人在线观看| 欧美zozozo另类| 国产成人欧美在线观看| 99久久99久久久精品蜜桃| 12—13女人毛片做爰片一| 免费看a级黄色片| 最新在线观看一区二区三区| 三级毛片av免费| 国产69精品久久久久777片 | 亚洲av成人精品一区久久| 国产aⅴ精品一区二区三区波| 人妻丰满熟妇av一区二区三区| 9191精品国产免费久久| 亚洲中文字幕日韩| 欧美在线黄色| 久久性视频一级片| 日韩欧美在线乱码| 男女下面进入的视频免费午夜| cao死你这个sao货| 少妇的丰满在线观看| 精品久久蜜臀av无| 欧美另类亚洲清纯唯美| 国产淫片久久久久久久久 | 国产私拍福利视频在线观看| 久久精品国产清高在天天线| 国产黄色小视频在线观看| 99riav亚洲国产免费| 女警被强在线播放| 狂野欧美白嫩少妇大欣赏| 香蕉国产在线看| 欧美日韩福利视频一区二区| 桃色一区二区三区在线观看| 亚洲国产中文字幕在线视频| 中文字幕av在线有码专区| 成年版毛片免费区| 日本五十路高清| 亚洲中文av在线| 成人鲁丝片一二三区免费| 又黄又粗又硬又大视频| 午夜两性在线视频| 午夜影院日韩av| 久久婷婷人人爽人人干人人爱| 日本一本二区三区精品| 最近最新免费中文字幕在线| 精品欧美国产一区二区三| 在线免费观看不下载黄p国产 | x7x7x7水蜜桃| 性欧美人与动物交配| 亚洲天堂国产精品一区在线| 亚洲av中文字字幕乱码综合| 国产伦一二天堂av在线观看| 免费在线观看视频国产中文字幕亚洲| 国产亚洲精品一区二区www| 国产亚洲精品久久久久久毛片| 亚洲乱码一区二区免费版| 亚洲激情在线av| 国产精品自产拍在线观看55亚洲| 国产久久久一区二区三区| 国内精品美女久久久久久| 成人特级av手机在线观看| 黄色片一级片一级黄色片| 午夜久久久久精精品| 麻豆国产97在线/欧美| 免费大片18禁| 亚洲人与动物交配视频| 校园春色视频在线观看| 亚洲av中文字字幕乱码综合| 又黄又粗又硬又大视频| 一级黄色大片毛片| 97碰自拍视频| 成年女人永久免费观看视频| 久久伊人香网站| 国产一区二区三区视频了| 噜噜噜噜噜久久久久久91| 成人三级做爰电影| 三级国产精品欧美在线观看 | 怎么达到女性高潮| 搡老岳熟女国产| 高清毛片免费观看视频网站| 熟妇人妻久久中文字幕3abv| 国产蜜桃级精品一区二区三区| 毛片女人毛片| 又黄又粗又硬又大视频| 亚洲熟妇熟女久久| svipshipincom国产片| 12—13女人毛片做爰片一| 免费观看人在逋| 天堂影院成人在线观看| 国产野战对白在线观看| 午夜精品在线福利| 不卡av一区二区三区| 岛国视频午夜一区免费看| 97超级碰碰碰精品色视频在线观看| 国语自产精品视频在线第100页| 国产成年人精品一区二区| 成年免费大片在线观看| 亚洲电影在线观看av| 黄色视频,在线免费观看| 99热这里只有精品一区 | 亚洲国产精品成人综合色| 国产高清三级在线| 中文字幕人成人乱码亚洲影| 精品一区二区三区四区五区乱码| 激情在线观看视频在线高清| 国产一区二区三区在线臀色熟女| 亚洲人成网站高清观看| 欧美在线黄色| 亚洲成人久久爱视频| 成人国产综合亚洲| 亚洲性夜色夜夜综合| www.熟女人妻精品国产| 亚洲国产精品999在线| 午夜免费激情av| 亚洲av成人一区二区三| 亚洲精品美女久久久久99蜜臀| 国产视频内射| 全区人妻精品视频| 精品免费久久久久久久清纯| 亚洲av中文字字幕乱码综合| 99热只有精品国产| 婷婷丁香在线五月| 日韩精品青青久久久久久| 久久天躁狠狠躁夜夜2o2o| 亚洲天堂国产精品一区在线| 色哟哟哟哟哟哟| 国内毛片毛片毛片毛片毛片| 很黄的视频免费| 中文资源天堂在线| 国产精品,欧美在线| 桃色一区二区三区在线观看| 成人av一区二区三区在线看| 一边摸一边抽搐一进一小说| 黑人操中国人逼视频| 色吧在线观看| 法律面前人人平等表现在哪些方面| 999久久久国产精品视频| 男女视频在线观看网站免费| 国产伦一二天堂av在线观看| 色综合站精品国产| 亚洲在线自拍视频| 国产成人系列免费观看| 国产成人aa在线观看| 亚洲色图av天堂| 亚洲av日韩精品久久久久久密| 国产久久久一区二区三区| 国产精品影院久久| 美女cb高潮喷水在线观看 | 日韩高清综合在线| 国产伦一二天堂av在线观看| 90打野战视频偷拍视频| 啦啦啦韩国在线观看视频| 中文字幕人成人乱码亚洲影| 最新在线观看一区二区三区| 此物有八面人人有两片| 18禁裸乳无遮挡免费网站照片| 黑人操中国人逼视频| 久久久久久久久久黄片| 欧美中文综合在线视频| 亚洲国产精品999在线| 国产真实乱freesex| 国产乱人伦免费视频| 成在线人永久免费视频| 精品久久久久久久人妻蜜臀av| 精品国产美女av久久久久小说| 国产日本99.免费观看| 夜夜看夜夜爽夜夜摸| 18禁美女被吸乳视频| 国产精品电影一区二区三区| 在线永久观看黄色视频| 欧美另类亚洲清纯唯美| 搡老岳熟女国产| 狂野欧美白嫩少妇大欣赏| 又紧又爽又黄一区二区| 国产精品 国内视频| 中文字幕高清在线视频| 欧美黑人欧美精品刺激| 国产av一区在线观看免费| 亚洲精品一区av在线观看| 久久九九热精品免费| 成人高潮视频无遮挡免费网站| 国产三级黄色录像| 精品99又大又爽又粗少妇毛片 | 一个人免费在线观看的高清视频| 少妇裸体淫交视频免费看高清| 女警被强在线播放| 亚洲av片天天在线观看| 亚洲成人久久性| 色吧在线观看| 麻豆成人午夜福利视频| 国产激情偷乱视频一区二区| 亚洲成人久久性| 天堂动漫精品| 一个人观看的视频www高清免费观看 | 又粗又爽又猛毛片免费看| 99在线人妻在线中文字幕| 禁无遮挡网站| 国产精品永久免费网站| 变态另类成人亚洲欧美熟女| 国产精品久久久久久精品电影| 男人的好看免费观看在线视频| 国产aⅴ精品一区二区三区波| 99re在线观看精品视频| 中出人妻视频一区二区| 亚洲乱码一区二区免费版| 操出白浆在线播放| 国产亚洲精品一区二区www| 少妇丰满av| 色播亚洲综合网| 成人三级做爰电影| 国产久久久一区二区三区| 丁香六月欧美| 国产精品,欧美在线| 亚洲国产中文字幕在线视频| 美女免费视频网站| 97超级碰碰碰精品色视频在线观看| 国产毛片a区久久久久| 亚洲九九香蕉| 国产熟女xx| 国产蜜桃级精品一区二区三区| 国产视频内射| 2021天堂中文幕一二区在线观| 操出白浆在线播放| 男人舔女人的私密视频| 99久久国产精品久久久| 国产午夜福利久久久久久| 色播亚洲综合网| 欧美绝顶高潮抽搐喷水| 一夜夜www| 亚洲国产日韩欧美精品在线观看 | 亚洲av成人av| 高潮久久久久久久久久久不卡| 99久久精品热视频| 国产av一区在线观看免费| 色在线成人网| 狂野欧美激情性xxxx| 欧美又色又爽又黄视频| 老司机午夜十八禁免费视频| 99国产极品粉嫩在线观看| 在线观看免费午夜福利视频| 好男人电影高清在线观看| 久久久国产成人免费| 欧美三级亚洲精品| 国产亚洲精品久久久com| 女同久久另类99精品国产91| 久久久久国内视频| 国产亚洲av高清不卡| a级毛片在线看网站| 亚洲最大成人中文| 亚洲欧美日韩卡通动漫| 757午夜福利合集在线观看| 国产精品精品国产色婷婷| 国产成人精品久久二区二区免费| 视频区欧美日本亚洲| 99久久精品一区二区三区| 国产高清视频在线观看网站| 99热精品在线国产| 琪琪午夜伦伦电影理论片6080| 啦啦啦韩国在线观看视频| 亚洲熟妇中文字幕五十中出| 成人欧美大片| 国产三级黄色录像| 亚洲午夜理论影院| 叶爱在线成人免费视频播放| 两性午夜刺激爽爽歪歪视频在线观看| 最近最新中文字幕大全免费视频| 精品福利观看| www.www免费av| 三级男女做爰猛烈吃奶摸视频| 制服丝袜大香蕉在线| 伦理电影免费视频| 91麻豆精品激情在线观看国产| 在线播放国产精品三级| 国产私拍福利视频在线观看| 天堂网av新在线| www.999成人在线观看| 一本精品99久久精品77| 久久天堂一区二区三区四区| 亚洲在线自拍视频| 亚洲精品国产精品久久久不卡| 免费在线观看日本一区| 麻豆国产97在线/欧美| 一级毛片精品| 久久久国产精品麻豆| 色综合婷婷激情| 亚洲国产欧美人成| 99久久99久久久精品蜜桃| 久久久精品欧美日韩精品| 成人精品一区二区免费| 极品教师在线免费播放| 欧美精品啪啪一区二区三区| 亚洲国产欧美一区二区综合| 一区二区三区激情视频| av女优亚洲男人天堂 | 99久久精品国产亚洲精品| 神马国产精品三级电影在线观看| 国产视频内射| 午夜福利欧美成人| 午夜成年电影在线免费观看| 亚洲,欧美精品.| 黑人欧美特级aaaaaa片| 国产黄a三级三级三级人| 国产1区2区3区精品| 九九热线精品视视频播放| 99久久99久久久精品蜜桃| 听说在线观看完整版免费高清| 亚洲午夜理论影院| 亚洲精品中文字幕一二三四区| www日本在线高清视频| 91久久精品国产一区二区成人 | 日韩欧美 国产精品| 亚洲成人久久爱视频| 亚洲av成人不卡在线观看播放网| 国产精品亚洲av一区麻豆| www日本黄色视频网| 欧美中文综合在线视频| 日韩欧美三级三区| 一级毛片精品| 国内毛片毛片毛片毛片毛片| 白带黄色成豆腐渣| 黄片大片在线免费观看| 亚洲成人久久性| 热99re8久久精品国产| 神马国产精品三级电影在线观看| 亚洲第一欧美日韩一区二区三区| 久久亚洲精品不卡| 最新美女视频免费是黄的| 十八禁网站免费在线| 国产成人av激情在线播放| 久久久水蜜桃国产精品网| 色综合婷婷激情| 精品国产乱码久久久久久男人| www日本在线高清视频| 亚洲五月天丁香| 精品不卡国产一区二区三区| 国产淫片久久久久久久久 | 亚洲午夜理论影院| 欧美成人性av电影在线观看| 亚洲欧美精品综合一区二区三区| 精品欧美国产一区二区三| 亚洲 国产 在线| 99久久精品国产亚洲精品| 美女免费视频网站| 亚洲天堂国产精品一区在线| 国产精品九九99| 久久精品国产综合久久久| 亚洲七黄色美女视频| 婷婷精品国产亚洲av| 久久久久九九精品影院| 久久久久久人人人人人| 又爽又黄无遮挡网站| 男女下面进入的视频免费午夜| 午夜久久久久精精品| АⅤ资源中文在线天堂| netflix在线观看网站| 观看美女的网站| 国语自产精品视频在线第100页| 嫁个100分男人电影在线观看| 亚洲一区二区三区色噜噜| 在线观看免费午夜福利视频| 亚洲国产精品999在线| 99久久精品一区二区三区| 高清在线国产一区| 亚洲精品在线观看二区| 一本一本综合久久| 亚洲在线自拍视频| 丰满的人妻完整版| 久久午夜综合久久蜜桃| 麻豆国产97在线/欧美| 国产亚洲精品一区二区www| 日韩av在线大香蕉| 身体一侧抽搐| 在线看三级毛片| 午夜福利欧美成人| 亚洲在线观看片| 90打野战视频偷拍视频| 欧美不卡视频在线免费观看| 欧美成狂野欧美在线观看| 国产精品影院久久| 法律面前人人平等表现在哪些方面| 美女高潮喷水抽搐中文字幕| 91在线观看av| 国产精品 国内视频| 老汉色∧v一级毛片| 久久这里只有精品19| av国产免费在线观看| 国产又黄又爽又无遮挡在线| 露出奶头的视频| 亚洲va日本ⅴa欧美va伊人久久| 这个男人来自地球电影免费观看| 18禁观看日本| 熟女少妇亚洲综合色aaa.| 欧美黑人欧美精品刺激| 久久精品国产综合久久久| 99久久无色码亚洲精品果冻| 亚洲一区二区三区色噜噜| 久久久久性生活片| 男女做爰动态图高潮gif福利片| 天堂网av新在线| 国产精品av久久久久免费| 国产乱人伦免费视频| 久9热在线精品视频| 久久国产乱子伦精品免费另类| 精品久久久久久久久久久久久| 天堂√8在线中文| 中文资源天堂在线| 中国美女看黄片| 男人舔女人的私密视频| 国产激情久久老熟女| 亚洲18禁久久av| 亚洲午夜理论影院| 午夜福利在线观看吧| 日韩人妻高清精品专区| 人妻久久中文字幕网| 国产精品久久久久久精品电影| 亚洲av中文字字幕乱码综合| 一个人观看的视频www高清免费观看 | 两个人的视频大全免费| 亚洲第一欧美日韩一区二区三区| 欧美黑人欧美精品刺激| 亚洲自偷自拍图片 自拍| 国模一区二区三区四区视频 | 99热这里只有精品一区 | 日韩欧美国产在线观看| 亚洲无线在线观看| 国产乱人伦免费视频| 精品熟女少妇八av免费久了| 五月伊人婷婷丁香| 人妻丰满熟妇av一区二区三区| 我要搜黄色片| 中文亚洲av片在线观看爽| 热99re8久久精品国产| 热99在线观看视频| 窝窝影院91人妻| 亚洲精品中文字幕一二三四区| 欧美日韩黄片免| 首页视频小说图片口味搜索| 草草在线视频免费看| 九色国产91popny在线| 中文字幕人妻丝袜一区二区| 中文字幕久久专区| 国产视频一区二区在线看| 午夜福利欧美成人| 国产麻豆成人av免费视频| 一区二区三区高清视频在线| e午夜精品久久久久久久| 久久精品夜夜夜夜夜久久蜜豆| 日本三级黄在线观看| av中文乱码字幕在线| 国产单亲对白刺激| 黄色女人牲交| 久久久久久久久免费视频了| 国产亚洲欧美在线一区二区| 看黄色毛片网站| 老汉色av国产亚洲站长工具| 亚洲第一电影网av| 精品国产美女av久久久久小说| 黑人欧美特级aaaaaa片| 麻豆国产97在线/欧美| 欧美一级毛片孕妇| 香蕉av资源在线| 国产精品野战在线观看| 91av网站免费观看| 中文字幕高清在线视频| 香蕉丝袜av| 757午夜福利合集在线观看| 国产成人影院久久av| 99视频精品全部免费 在线 | 在线观看舔阴道视频| 母亲3免费完整高清在线观看| 国产乱人伦免费视频| 国模一区二区三区四区视频 | 久久久国产成人免费| 久久精品人妻少妇| 99久久国产精品久久久| www日本黄色视频网| 国产高清三级在线| 19禁男女啪啪无遮挡网站| 欧美高清成人免费视频www| 欧美成人性av电影在线观看| h日本视频在线播放| 男插女下体视频免费在线播放| 在线观看免费视频日本深夜| 欧美成狂野欧美在线观看| 国内少妇人妻偷人精品xxx网站 | 波多野结衣高清无吗| av视频在线观看入口| 日韩中文字幕欧美一区二区| 成年人黄色毛片网站| 老熟妇仑乱视频hdxx| aaaaa片日本免费| 一级a爱片免费观看的视频| 亚洲精品乱码久久久v下载方式 | 99在线人妻在线中文字幕| 精品久久久久久久人妻蜜臀av| 亚洲精品粉嫩美女一区| 亚洲成av人片在线播放无| 色播亚洲综合网| 亚洲一区二区三区色噜噜| 精品无人区乱码1区二区| 国产不卡一卡二| 亚洲欧洲精品一区二区精品久久久| 国产精品一区二区三区四区久久| 国产欧美日韩精品一区二区| av在线天堂中文字幕| 亚洲av五月六月丁香网| 精品久久久久久久末码| 国产一区二区三区视频了| 在线免费观看不下载黄p国产 | 亚洲狠狠婷婷综合久久图片| 又黄又爽又免费观看的视频| 俺也久久电影网| 国产精品综合久久久久久久免费| 亚洲一区高清亚洲精品| 国产精品av视频在线免费观看| 最新美女视频免费是黄的| 成人特级av手机在线观看| 757午夜福利合集在线观看| 亚洲五月婷婷丁香| 亚洲国产精品999在线| 99国产精品99久久久久| 久久性视频一级片| 午夜a级毛片| 9191精品国产免费久久| 1024手机看黄色片| 久久亚洲精品不卡| 无限看片的www在线观看|