• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Fractal sorting vector-based least significant bit chaotic permutation for image encryption?

    2021-06-26 03:03:34YongJinXian咸永錦XingYuanWang王興元YingQianZhang張盈謙
    Chinese Physics B 2021年6期
    關(guān)鍵詞:興元

    Yong-Jin Xian(咸永錦) Xing-Yuan Wang(王興元) Ying-Qian Zhang(張盈謙)

    Xiao-Yu Wang(王曉雨)1, and Xiao-Hui Du(杜曉慧)1

    1School of Information Science and Technology,Dalian Maritime University,Dalian 116026,China

    2School of Information Science and Technology,Xiamen University Tan Kah Kee College,Zhangzhou 363105,China

    Keywords: chaotic image encryption, fractal sorting vector, bit-level permutation, FSV-based LSB chaotic

    1. Introduction

    Research on image security has gained widespread publicity in recent years.[1–4]With the development of cryptography as an important image authentication tool,image encryption has attracted a great deal of attention.[5,6]The researchers incorporated the chaos technique into image encryption and provided several useful chaotic image encryption studies.[7–17]

    Image encryption algorithm based on chaos consists of pixel scrambling and pixel diffusion within the context of the cryptanalysis image encryption scheme of Fridrich.[18]In the design of chaotic image encryption algorithms, bit-level permutation simultaneously realized the pixel uncertainty and pixel diffusion,which enhances the security of image encryption algorithm.[19–22]In Ref. [23], the original image was divided into 8 binary images,then the 8 binary images were encrypted respectively, and then synthesized into a gray-scale encrypted image. In Refs.[24,25],a bit-level permutation approach was implemented to color the image encryption. The pixel-based bit exchange could exert a certain encryption effect,but it would do better with bit-level scrambling based on bit planes. In Ref.[26],the bit in the pixel was scrambled into its neighboring pixel,so that the direction of the bit varied between each plane. In Ref.[27],by applying rank and column encryption to each binary bit plane,the image algorithm realized the bit-level permutation. In Ref.[28],the 8 bits of each pixel were split into the four most important bits on the left and the four least significant bits on the right. The LSBs were independently encrypted. In Ref. [29], the right four bits of each pixel were scrambled separately, while the left four bits were encrypted as a whole part. In Ref.[30],the bit positions of the image’s LSB planes were scrambled, and thus leaving the other planes on the left unchanged.

    By analyzing the above-mentioned bit-level permutation methods, they can be divided into two categories: bit permutation on all bit planes and bit permutation on least significant bit planes. The bit permutation on LSB planes does not scramble all bits,while the result is almost the same as that on all planes. The normal LSB-based bit-level image encryption method only performs independent bit scrambling in each bit plane.There is no bit position conversion between bit layers in the process of scrambling. Therefore,there is also more space for progress in the encryption effect obtained by the present chaotic image encryption methods based on bit permutation on LSB planes. To solve these problems,a novel LSB chaotic permutation based on FSV is proposed to exchange all necessary bit positions of the image. The proposed method changes the bit positions of the four different planes of the LSB of the image and reduces the information about the relation among the four LSB planes that contain the main information about the image. The proposed bit-level permutation can not only increase the range of pixel values changed by bit permutation,but also improve the ability to resist cryptanalysis with the application of chaotic systems. It is worth noting that the iteratively generated FSV will enhance the algorithm’s encryption performance to some degree.

    The rest of this article is structured as follows. The basic principles and iterative algorithm of FSV,and chaotic LSB permutation based on FSV,are given in detail in Section 2. In Section 3, the FSV-LSBCP based image encryption and decryption algorithms are presented. In Section 4, the experimental results are discussed. Finally, some conclusions are drawn from the present study in Section 5.

    2. Proposed methods

    Inspired by Refs.[31–37],we introduce a new vector with fractal properties in order and analyze its characteristics in the application of image encryption in this section.

    2.1. Basic concepts of FSV

    Definition 1 A vectorV={v1,v2,...,vn} ∈R1×nis called a sorting vector if the elements in the vector are composed of positive integers 1,2,...,Nand the element values at any two different positions are different. In other words,Vis a sorting vector such that any of the following statements holds true:

    Based on Definition 1, we define a class of vector with properties similar to the fractals as follows.

    Definition 2 Sorting vectorV={v1,v2,...,vn}∈R1×nis called fractal sorting vector(FSV),if there are the following properties:

    1) the distribution of elements in the vector is overall irregular;

    2) the ordering of elements in each sub-vector with the same length is self-similar;

    3) vectorVcan be generated by iteration.

    2.2. Iterative algorithm of FSV

    According to the definitions above, we give a class of fractal sorting vector construction method based on addition and multiplication between vector and number as follows.

    Based on any initial vectorV[1]∈R1×l(V[1]), wherel(V)represents the length of the vectorV,we iterate it according to the following steps to obtain FSVV?.

    Step 1 Calculate the iteration vectorV[2]according to the following iteration rules:

    whereV{i}represents the i-th sub-vector ofV, andV(i) denotes the i-th element ofV.

    Step 2 Repeat the following general term formulas to obtain the higher-order FSV,V[n].

    Step 3 Obtain an FSVV?of any length from the following equation:

    whereV[m]is a generated FSV calculated from steps 1 and 2,andl(V[m])≥l(V?).

    Through the above steps, we can obtain the FSVV?of any length,by combining the actual needs and the appropriate number of iterations. The relationship between FSV and the initial iteration vector can be expressed as a function:

    Based on these steps,we propose the pseudo-code to implement the iterative calculation of FSV as shown in Table 1.

    Table 1. Pseudo-code of algorithm for FSV.

    2.3. FSV based LSB chaotic permutation

    The least significant bit of the image covers most of the information,[28]and the eight binary planes of peppers are shown in Fig. 1. The human eyes can clearly distinguish the information among the first four planes,but nothing from the last four. The information weight of the eight binary planes and their cumulative rates are shown in Table 2. The right four bits cumulatively contain 94.12%of the information. Processing the right four bits can be applied to the image encryption to improve the efficiency of the algorithm while ensuring security.

    Fig.1. Eight binary planes of peppers: (a)8th,(b)7th,(c)6th,(d)5th,(e)4th,(f)3rd,(g)2nd,(h)1st.

    Table 2. Information weights of bit planes.

    Based on FSV and LSB permutation,a novel FSV-based LSB chaotic permutation method is proposed as follows.

    Step 1 Represent each pixel in grayscale image into 8 bits. And use a tensorTSto represent the image represented by the bit.

    Step 2 Denote the 8 layers of the tensor asP8,P7,P6,P5,P4,P3,P2,P1in sequence, whereP8is a binary image composed of the highest bit andP1is a binary image consisting of the lowest bit.

    Step 3 Press the upper left, upper right, lower left, and lower right sub-block positions to composeP8,P7,P6,P5into a binary imagePLSB.

    Step 4 Exchange the position of each bit inPLSBby the permutation vectors of the FSV and the ascending chaotic sequence index,successively.

    Step 5 Split the new permuted binary imageP?LSBobtained in Step 4 intoP?8,P?7,P?6,P?5according to the sub-block positions in Step 3.

    Step 6 RestoreP?8,P?7,P?6,P?5,P4,P3,P2,P1to a new grayscale image.

    With the above six steps,the FSV-based LSB shaotic permutation of the image is realized. For better understanding,the flow chart is shown in Fig.2.

    Fig.2. Process of FSV-based LSB chaotic permutation.

    3. Image encryption algorithm based on FSVLSBCP

    3.1. Two-dimensional chaotic system

    In many chaotic systems,the Henon map has simple operations and can generate two chaotic sequences.And the Henon map is defined as[38]

    wherea=1.4 andb=0.3 make the map reach a chaotic state.The application of the Henon map can make the image encryption method more difficult to predict and efficient to operate.

    3.2. Encryption method

    Image encryption method based on FSV-LSBCP is introduced in detail step by step in this subsection. Due to the flexibility of the proposed FSV construction algorithm, the proposed encryption algorithm,which is suitable to the images of any size and shape,mainly consists of six steps as follows.

    Step 1 Read the plaintext image into the computer and mark it asP.

    Step 2 Obtain an FSV of the appropriate length according to the proposed construction algorithm.

    Step 3 Generate a 128-bit character stringΛby using SHA-512 fromP, and convertΛinto 3 decimalsK=[k1, k2, k3]as follows:

    Step 4 Obtain the appropriate length chaotic sequencesC1andC2by Henon map with the parameters [k'1, k'2, k3],wherek3is the length of the deleted sequence to ensure chaotic state,whilek'1andk'2are the initial parameters of chaotic system. Setting private key[k4, k5],the parameters of the generated chaotic sequence are calculated as follows:

    where mod(,)is the remainder function,and[k4, k5]is the private keystream.

    Step 5 PermutatePintoP'by FSV-LSBCP according to the FSV and the chaotic sequenceC1.

    Step 6 Diffuse re-segmented imageP'withC2by using the method shown below and denote the diffused image asP''=[p''(i)]:

    where⊕denotes XOR operation,andis the round-up function.

    The ciphertext image is obtained by using the above six steps. The key sequence consists of [k1,k2,k3,k4,k5], which are used for both image encryption and decryption. For easy understanding,flow charts and examples of the above basis are shown in Figs.3 and 4,respectively.

    Fig.3. Flow chart of encryption algorithm based on FSV-LSBCP.

    Remark 1 When the parameters of Eq. (6) are determined, different initial values can obtain different pseudorandom sequences after the same iteration. Thek'1andk'2calculated from Eq.(10)are used as the initial values of Eq.(6),that is,x0=k'1andy0=k'2. Then the pseudo-random sequences generated byk'1andk'2can be obtained. The lengths of these two sequences are determined by the size of the image. At the same time, to avoid the unsatisfactory pseudorandomness caused by the system in the front part of the sequence not entering the mixed state, the firstk3elements of each sequence are deleted andk3elements are iterated and converged at the end. The resulting pseudo-random sequences conform to the size of the image and can be well applied to encryption algorithms.

    Remark 2 The hexadecimal sequence obtained by SHA-512,after the calculation of Eqs.(7)–(9)can obtaink1,k2,k3.These three keys are used as the keys generated by the plaintext image, which can make the encryption algorithm have good resistance to brute force attacks. The subjectively set keysk4andk5can effectively improve the ability of the encryption algorithm to resist the selected plaintext attacks. This key design method guarantees the comprehensive security of the algorithm. At the same time, the keys pass through a secure channel to avoid the possibility of the keys being stolen,thereby ensuring the security of ciphertext information in the key management.

    3.3. Decryption algorithm

    Using inverse transformation, the decryption and corresponding experimental test can be completed by using the key sequence provided in the encryption algorithm.

    Step 1 Read the encrypted image into the computer. Call the image matrixPE=[pe(i)].

    Step 2. Obtain an FSV of the appropriate length according to the proposed construction algorithm.

    Step 3. Obtain the chaotic sequencesC1andC2by using the previously described system and processing method with the group key[k1,k2,k3,k4,k5].

    Step 4. Back-diffuse re-segmented matrixPEwithC2through using the method shown below and denote the backdiffused image matrix asP'E=[p'e(i)]:

    Step 5 PermutateP'EintoP''Eby reverse process of FSVLSBCP.

    This concludes the decryption process, which is the reverse of the encryption process. The demonstration is no longer illustrated as space limitations.

    3.4. Encryption and decryption simulation results

    Fig. 4. Image encryption/decryption results, showing (a) image of Fullgold, (b) encrypted Fullgold, (c) decrypted Fullgold, (d) image of Lena, (e)encrypted Lena,(f)decrypted Lena,(g)image of peppers,(h)encrypted peppers,(i)decrypted peppers.

    MATLAB 2017a software is used to conduct the encryption and decryption in this study. The operation system of the computer is a Microsoft Windows 10 system with Intel(R)Core(TM)i5-7500 CPU.The encryption and decryption simulation results of three representative images,each with a size of 512×512, are shown in Fig. 4. The simulation results illustrate the accurate process of encryption and decryption in terms of visual effect.

    3.5. Encryption runtime comparison

    LSB chaotic permutation reduces the operation of bit position transformation. This design can effectively reduce the running time of the proposed encryption algorithm, and its comparisons with the running times of some classic algorithms are shown in Table 3. Through the comparisons, it can be found that the proposed encryption method can effectively improve the efficiency of image encryption.

    Table 3. Comparisons among runtimes.

    4. Security analysis

    Numbers of experimental results and data comparisons are provided in this section to check the supremacy and protection of proposed image encryption and decryption algorithms based on FSV-LSBCP.The images,each with a size of 512×512 used for the experimental test,are shown in Fig.5.

    Fig.5. Images used for experimental test on(a)baboon,(b)Barbara,(c)bridge,(d)couple,(e)crowd,(f)Fullgold,(g)Lena,(h)man,(i)peppers,(j)plane.

    4.1. Key analysis

    According to the conclusion in Ref. [39], the cryptosystem with keyspace larger than 2100is better at resisting bruteforce attacks. Due to the calculation accuracy and the selected space of the initial matrix, the keyspace can be calculated as follows:

    where the selection space ofk1,k2,k4,k5is 1014as the calculation accuracy of the computer is assumed to be 10?14,the selection space ofk3is 103.

    The key sensitivity test can detect the effect of small changes of the correct key on the decryption of ciphertext.Any accurate image cannot be decrypted unless the right keyKr=[k1, k2, k3, k4, k5] is used in the proposed cryptosystem. The error keysK1= [k1+10?14, k2, k3, k4, k5] andK2=[k1, k2+10?14, k3, k4, k5]are used to decrypt the ciphertext,respectively. There is no doubt that the wrong key cannot obtain the correct decrypted image, and even if the two images are subtracted, no relevant information can be obtained.The detailed simulation process of key sensitivity analysis is shown in Fig.6.

    4.2. Statistical analysis

    Kinds of statistical experiments and analysis are enumerated to verify the reliability of the proposed algorithm as follows.

    4.2.1. Histogram analysis

    The ciphertext image histogram is a method used to calculate the ability of an encryption system to object to a statistical analysis attack.This suggests that it is difficult to attack the ciphertext image obtained by the encryption algorithm when the histogram is smooth.As shown in Fig.7,the histograms of the encrypted and decrypted images have obvious characteristics,where the histograms of the original images have various fluctuations but the histograms of these ciphertext images are very stable.

    Fig.6. Key sensitivity test on(a)encrypted peppers with Kr,(b)decrypted peppers with Kr,(c)decrypted peppers with K1,(d)decrypted peppers with K2,(e)absolute value of(c)minus(d),and(f)histogram of panel(e).

    Fig.7. Histograms of(a)Fullgold,(b)Lena,(c)peppers,(d)encrypted Fullgold,(e)encrypted Lena,and(f)encrypted peppers.

    4.2.2. Correlation coefficient

    The correlation coefficient is a description of the correlation between two adjacent pixels. For a flat image,its adjacent pixel relationship is divided into three categories: horizontal,vertical,and diagonal.The correlation coefficients of the three directions of the ciphertext image obtained by a secure image encryption algorithm should be small enough to resist attacks.The correlation coefficients of the flat image are calculated as follows:[40]

    where

    Table 4 shows the comparisons of correlation coefficients between the ciphertext images and the original images. The correlation coefficients of the representative encrypted images are generally very small. The mean values in the horizontal,vertical,and diagonal directions of the correlation coefficients are?0.000271,?0.000358, and 0.000654, respectively. The small standard deviations in the three directions indicate that the proposed method is safe and stable.

    The visual correlation results of the image peppers before encryption and after encryption are shown in Fig.8.The correlations in the three directions of the two original images are all concentrated around the liney=xof the coordinate system,while most of the points are close to the line, which means that the original images are relevant to each other. In contrast to the correlation image of the ciphertext image,each point is evenly distributed in the image range, which reveals that the correlation of the encrypted image is weak.

    Table 4. Correlation coefficients of images before and after being encrypted.

    Fig.8. Adjacent pixel correlation in(a)horizontal direction of peppers,(b)vertical direction of peppers,(c)diagonal direction of peppers,(d)horizontal direction of encrypted peppers,(e)vertical direction of encrypted peppers,and(f)diagonal direction of encrypted peppers.

    4.2.3. Information entropy

    An important parameter that represents the randomness of information is information entropy,which is expressed as[41]

    where descriptions of parameters such ass=[si]2L,p(si),andsiare detailed in Ref.[41].

    Table 5 accurately reflects the change in information entropy of the image before and after encryption, that the information entropy after encryption is closer to the theoretical limit value. The standard deviation is 0.000060, which is small,implying that the proposed algorithm is both safe and stable.

    Table 5. Information entropy of plaintext and ciphertext images.

    4.3. Analysis of resistance to differential attack

    The resistance of encryption algorithms to differential attacks can be tested by the number of pixels changing rate (NPCR) and unified averaged changed intensity (UACI),which are acquired as follows:[17]

    wherec1(i,j)andc2(i,j)are two pixel values of the same position (i,j) in the two different encrypted images;MandNrepresent the image dimensions.

    Table 6 shows the average values of the NPCR and UACI among 100 random pixels at different positions. Selecting the mean value of NPCR and UACI at random positions can avoid the particularity of special positions in the calculation process and the waste of time in obtaining the overall value.The NPCR and UACI values of each image and their average values are close to the theoretical level 99.6094% and 33.4635%, respectively. Although the standard deviation of UACI is slightly larger than that of NPCR, they are not very large. This makes our algorithm stable while being safe, and the proposed method is suitable for various types of images.In general,the proposed method has a high resistance to the differential attack. Therefore,the proposed encryption scheme is verified to resist differential attacks.

    Table 6. NPCR and UACI values of ciphertext images(%).

    4.4. Resistance to cropping attacks and noise attacks

    The cropping attacks and noise attacks are used to disrupt the integrity of the ciphertext image, which will prevent the attacker from obtaining the correct decryption information. In the resisting cropping attacks experiment, the encrypted images at the degrees of 1/16 and 1/4 cropping are decrypted as shown in Fig.9.

    Fig. 9. Decryption results after cropping attacks, showing (a) encrypted peppers with 1/16 degree cropping, (b) decrypted image of panel (a), (c)encrypted peppers with 1/4 degree cropping,and(d)decrypted image of panel(c).

    Fig.10. Decryption results after salt pepper noise attacks,showing(a)decrypted Lena after 1%noise,(b)decrypted Lena after 5%noise,(c)decrypted Lena after 10%noise,and(d)decrypted Lena after 25%noise.

    Table 7. Comparisons of proposed method with other bit-level permutation encryption methods.

    In the experiment on resisting salt and pepper noise attacks,the encrypted images with noise strengths of 0.01,0.05,0.10, and 0.25 are decrypted as shown in Fig. 10. The proposed cryptosystem can effectively resist cropping attacks and noise attacks and can decrypt identifiable plaintext images from ciphertext images that have been damaged to varying degrees.

    4.5. Comparison with other algorithms

    In the previous part, the experimental results of several indicators were introduced,and finally,the average values are used to compare with the experimental indicators, and thus comparing the proposed algorithm with other methods. The comparisons of performance between the proposed encryption scheme and other pixel-level permutation image cryptosystems are list in Table 7.

    The proposed algorithm presents good comprehensive experimental performance,showing that the proposed cryptosystem is both safe and reliable.

    5. Conclusions

    A chaotic image encryption cryptosystem based on FSVLSBCP is proposed for achieving the image with any size in this work. The basic concepts and iterative algorithm of FSV are introduced in detail. The fast iterative FSV can effectively improve the efficiency of encryption algorithms. The bit permutation of LSB can not only ensure the encryption effect but also improve the encryption efficiency. Combined with the dynamic characteristics of FSV, a new FSV-LSBCP is presented. The chaotic image encryption and decryption algorithm based on the FSV-LSBCP is constructed to encrypt and generate ciphertext images with stronger resistance to attacks. Through the comparison of encryption time, statistical analysis, and analysis of resistance to differential attacks, the proposed method proves to have a large enough keyspace,sufficiently sensitive key, and unrivaled resistance to statistical attacks and differential attacks.

    猜你喜歡
    興元
    Lossless embedding: A visually meaningful image encryption algorithm based on hyperchaos and compressive sensing
    情系鄉(xiāng)村振興的最美老干部——艾興元
    An image encryption algorithm based on spatiotemporal chaos and middle order traversal of a binary tree
    Synchronously scrambled diffuse image encryption method based on a new cosine chaotic map
    Force-constant-decayed anisotropic network model: An improved method for predicting RNA flexibility
    Molecular dynamics simulations on the wet/dry self-latching and electric fields triggered wet/dry transitions between nanosheets:A non-volatile memory nanostructure
    A secure image protection algorithm by steganography and encryption using the 2D-TSCC*
    An image encryption algorithm based on improved baker transformation and chaotic S-box?
    Tip-induced superconductivity commonly existing in the family of transition-metal dipnictides MPn2*
    鳳凰淚
    金沙江文藝(2018年1期)2018-11-14 02:09:33
    男女视频在线观看网站免费| 久久6这里有精品| 亚洲人成网站在线播| 亚洲电影在线观看av| 丝瓜视频免费看黄片| 国产精品一区二区在线不卡| 亚洲欧美精品自产自拍| 内地一区二区视频在线| 亚洲精品久久午夜乱码| 久久99一区二区三区| 在线观看人妻少妇| 极品人妻少妇av视频| 精品国产一区二区三区久久久樱花| 99久久人妻综合| 国产精品久久久久久av不卡| 日韩不卡一区二区三区视频在线| 久久鲁丝午夜福利片| 亚洲国产欧美日韩在线播放| 久久精品久久精品一区二区三区| 波多野结衣一区麻豆| 亚洲成av片中文字幕在线观看 | 亚洲综合色惰| 女性生殖器流出的白浆| 亚洲国产成人一精品久久久| 啦啦啦视频在线资源免费观看| av福利片在线| 90打野战视频偷拍视频| 中文字幕制服av| 国产成人免费无遮挡视频| 亚洲av国产av综合av卡| 色网站视频免费| 国产色婷婷99| 2021少妇久久久久久久久久久| 久久久久精品久久久久真实原创| 国产福利在线免费观看视频| 国产探花极品一区二区| 精品亚洲成国产av| 韩国av在线不卡| 久久人人爽人人片av| 王馨瑶露胸无遮挡在线观看| 伦理电影免费视频| 亚洲伊人久久精品综合| 免费高清在线观看视频在线观看| 美女脱内裤让男人舔精品视频| 国产探花极品一区二区| 亚洲国产精品999| 在线观看人妻少妇| 国产精品久久久久久精品古装| 亚洲四区av| 成人18禁高潮啪啪吃奶动态图| 亚洲一级一片aⅴ在线观看| 中文欧美无线码| 日韩精品免费视频一区二区三区 | 自线自在国产av| 曰老女人黄片| 在线观看免费高清a一片| www.熟女人妻精品国产 | 国产69精品久久久久777片| 国产成人a∨麻豆精品| 一级a做视频免费观看| 69精品国产乱码久久久| 天天操日日干夜夜撸| 免费高清在线观看日韩| 熟女av电影| 欧美精品高潮呻吟av久久| 亚洲国产成人一精品久久久| 亚洲五月色婷婷综合| 久久国内精品自在自线图片| 最近中文字幕高清免费大全6| 一级毛片电影观看| 菩萨蛮人人尽说江南好唐韦庄| 如日韩欧美国产精品一区二区三区| 寂寞人妻少妇视频99o| 成人免费观看视频高清| 成人综合一区亚洲| 成人二区视频| 免费黄色在线免费观看| 搡老乐熟女国产| 中国三级夫妇交换| 街头女战士在线观看网站| 岛国毛片在线播放| 宅男免费午夜| 男女无遮挡免费网站观看| 午夜精品国产一区二区电影| 韩国av在线不卡| 欧美日韩av久久| 精品久久久精品久久久| 免费观看性生交大片5| 狂野欧美激情性xxxx在线观看| 五月玫瑰六月丁香| 大香蕉久久成人网| 亚洲精品乱码久久久久久按摩| 全区人妻精品视频| 亚洲久久久国产精品| 久久久精品免费免费高清| 欧美3d第一页| 国产精品熟女久久久久浪| 国产免费一区二区三区四区乱码| 色视频在线一区二区三区| 精品一区在线观看国产| 亚洲国产欧美在线一区| 精品一区二区免费观看| 哪个播放器可以免费观看大片| 亚洲精品自拍成人| 寂寞人妻少妇视频99o| 中文字幕人妻丝袜制服| 免费看光身美女| 国产成人一区二区在线| 少妇被粗大的猛进出69影院 | 午夜福利网站1000一区二区三区| videosex国产| 看免费成人av毛片| 久久久久久久久久成人| 久久av网站| 91精品三级在线观看| 亚洲,欧美,日韩| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 夜夜骑夜夜射夜夜干| 国语对白做爰xxxⅹ性视频网站| 18禁在线无遮挡免费观看视频| 日日摸夜夜添夜夜爱| 久久97久久精品| 校园人妻丝袜中文字幕| 国精品久久久久久国模美| 欧美日韩视频高清一区二区三区二| 狂野欧美激情性xxxx在线观看| 丰满乱子伦码专区| 少妇猛男粗大的猛烈进出视频| 中文字幕最新亚洲高清| 国产片内射在线| √禁漫天堂资源中文www| 久久久国产一区二区| 精品午夜福利在线看| 爱豆传媒免费全集在线观看| 国产麻豆69| 18在线观看网站| 亚洲精品视频女| 男女边摸边吃奶| 天天躁夜夜躁狠狠久久av| 成人毛片a级毛片在线播放| 精品国产露脸久久av麻豆| 亚洲成人av在线免费| 全区人妻精品视频| 美女脱内裤让男人舔精品视频| 精品国产一区二区三区久久久樱花| 九九在线视频观看精品| 中文字幕人妻丝袜制服| 男女免费视频国产| 天天操日日干夜夜撸| 男女啪啪激烈高潮av片| 午夜日本视频在线| 亚洲av中文av极速乱| 天天操日日干夜夜撸| 亚洲精品aⅴ在线观看| 国产免费一级a男人的天堂| 永久免费av网站大全| 国产永久视频网站| freevideosex欧美| 亚洲精品久久久久久婷婷小说| 黄片无遮挡物在线观看| 99香蕉大伊视频| 亚洲欧美成人综合另类久久久| 亚洲欧美成人综合另类久久久| 桃花免费在线播放| 一级片'在线观看视频| 色哟哟·www| 精品第一国产精品| 久久99热这里只频精品6学生| 久久97久久精品| 美女内射精品一级片tv| 精品卡一卡二卡四卡免费| 日韩免费高清中文字幕av| 热99国产精品久久久久久7| 国产片特级美女逼逼视频| 国产精品久久久久成人av| www.熟女人妻精品国产 | 9热在线视频观看99| 午夜激情av网站| 国产亚洲av片在线观看秒播厂| 在线观看免费视频网站a站| 亚洲国产看品久久| 在线天堂中文资源库| 色网站视频免费| 99香蕉大伊视频| 欧美少妇被猛烈插入视频| 国语对白做爰xxxⅹ性视频网站| 国产一区有黄有色的免费视频| 成人毛片a级毛片在线播放| 欧美少妇被猛烈插入视频| 国产精品国产三级国产专区5o| 精品人妻在线不人妻| 精品人妻一区二区三区麻豆| 少妇的逼水好多| 深夜精品福利| 大香蕉久久网| 亚洲成色77777| 纵有疾风起免费观看全集完整版| 国产精品国产三级专区第一集| 欧美精品一区二区免费开放| 国产一区二区在线观看日韩| 久久久久久伊人网av| 午夜激情久久久久久久| av一本久久久久| 观看美女的网站| 卡戴珊不雅视频在线播放| 久久影院123| 久久热在线av| 亚洲婷婷狠狠爱综合网| 三级国产精品片| tube8黄色片| 日韩制服丝袜自拍偷拍| 国产日韩欧美亚洲二区| 日韩制服丝袜自拍偷拍| 国产 精品1| 国产精品久久久久久av不卡| 日韩成人av中文字幕在线观看| 成人18禁高潮啪啪吃奶动态图| av天堂久久9| 制服人妻中文乱码| 亚洲精品色激情综合| 免费不卡的大黄色大毛片视频在线观看| 久久精品国产自在天天线| av福利片在线| 婷婷色综合大香蕉| 中文欧美无线码| freevideosex欧美| 日日撸夜夜添| av电影中文网址| 另类精品久久| 亚洲在久久综合| 99re6热这里在线精品视频| 人妻一区二区av| 18+在线观看网站| 国产在线视频一区二区| 全区人妻精品视频| 亚洲精品久久久久久婷婷小说| 国产极品粉嫩免费观看在线| 久久人人爽人人爽人人片va| 国产日韩一区二区三区精品不卡| 亚洲成人手机| 一级黄片播放器| 亚洲av在线观看美女高潮| 80岁老熟妇乱子伦牲交| 国产成人精品在线电影| 国产精品国产三级专区第一集| 一本—道久久a久久精品蜜桃钙片| 久久热在线av| 国内精品宾馆在线| 麻豆乱淫一区二区| 国产一区有黄有色的免费视频| 99国产精品免费福利视频| 寂寞人妻少妇视频99o| 少妇被粗大猛烈的视频| 午夜久久久在线观看| 欧美日韩视频高清一区二区三区二| 一本久久精品| 丰满饥渴人妻一区二区三| 亚洲精品国产av蜜桃| 免费黄网站久久成人精品| 在线观看免费视频网站a站| 久久久久国产网址| 欧美日韩一区二区视频在线观看视频在线| 国产黄色免费在线视频| 国产成人91sexporn| 97在线视频观看| 精品少妇内射三级| a 毛片基地| 国产深夜福利视频在线观看| 国产成人午夜福利电影在线观看| 国产精品一区二区在线观看99| 一级,二级,三级黄色视频| 亚洲综合色惰| 黑人欧美特级aaaaaa片| 午夜老司机福利剧场| a级毛色黄片| 久久国产精品男人的天堂亚洲 | 日日撸夜夜添| 9色porny在线观看| av卡一久久| 人妻系列 视频| 久久久精品区二区三区| 国产成人欧美| 丁香六月天网| 欧美+日韩+精品| 亚洲成人av在线免费| 欧美人与性动交α欧美精品济南到 | 日本wwww免费看| 九色成人免费人妻av| 久久国产亚洲av麻豆专区| 国语对白做爰xxxⅹ性视频网站| 国产在视频线精品| 亚洲成人一二三区av| 亚洲三级黄色毛片| 欧美激情国产日韩精品一区| 色网站视频免费| 亚洲美女黄色视频免费看| 美女主播在线视频| www.熟女人妻精品国产 | 久久久精品免费免费高清| 最近中文字幕2019免费版| 国产成人免费观看mmmm| 久久久久人妻精品一区果冻| 国内精品宾馆在线| 亚洲国产精品999| 九九在线视频观看精品| 久久久久精品久久久久真实原创| 国产综合精华液| 2021少妇久久久久久久久久久| 秋霞在线观看毛片| 亚洲美女搞黄在线观看| 男女无遮挡免费网站观看| 亚洲欧美成人精品一区二区| 国产亚洲av片在线观看秒播厂| 国产亚洲av片在线观看秒播厂| 99re6热这里在线精品视频| www.av在线官网国产| 交换朋友夫妻互换小说| 免费播放大片免费观看视频在线观看| 99久久中文字幕三级久久日本| 大片电影免费在线观看免费| 亚洲国产精品一区三区| 丝袜美足系列| 亚洲欧美日韩另类电影网站| 亚洲人与动物交配视频| 国产黄色视频一区二区在线观看| 九色亚洲精品在线播放| 热99国产精品久久久久久7| 久久久久网色| 下体分泌物呈黄色| 中文字幕亚洲精品专区| 男人舔女人的私密视频| 9191精品国产免费久久| 国产日韩欧美视频二区| 国产成人欧美| 国产淫语在线视频| 久久久久国产网址| 国产免费现黄频在线看| www.熟女人妻精品国产 | 国产爽快片一区二区三区| 亚洲伊人色综图| 一区二区日韩欧美中文字幕 | 色5月婷婷丁香| 大陆偷拍与自拍| 最近最新中文字幕大全免费视频 | 精品人妻在线不人妻| 99视频精品全部免费 在线| 欧美bdsm另类| 久久久久久久精品精品| 国产成人aa在线观看| av黄色大香蕉| 欧美最新免费一区二区三区| 亚洲欧美成人精品一区二区| 午夜日本视频在线| 日韩不卡一区二区三区视频在线| 美女xxoo啪啪120秒动态图| 99热6这里只有精品| 久热这里只有精品99| 日韩,欧美,国产一区二区三区| 街头女战士在线观看网站| 在线观看国产h片| 99热6这里只有精品| 少妇的逼水好多| av网站免费在线观看视频| 18禁裸乳无遮挡动漫免费视频| 99久久综合免费| 女人被躁到高潮嗷嗷叫费观| 在线精品无人区一区二区三| 日本与韩国留学比较| 丰满迷人的少妇在线观看| 水蜜桃什么品种好| 99久久综合免费| 内地一区二区视频在线| 亚洲,欧美,日韩| 汤姆久久久久久久影院中文字幕| 国产一区二区在线观看av| 精品国产国语对白av| 高清毛片免费看| 亚洲成色77777| 亚洲国产av影院在线观看| 18禁在线无遮挡免费观看视频| 99久久人妻综合| 亚洲经典国产精华液单| 精品国产一区二区久久| 亚洲色图综合在线观看| 午夜精品国产一区二区电影| 在线精品无人区一区二区三| 国产一区二区三区av在线| 黄色怎么调成土黄色| 18禁动态无遮挡网站| 精品人妻熟女毛片av久久网站| av播播在线观看一区| 9色porny在线观看| 欧美亚洲日本最大视频资源| 亚洲在久久综合| 欧美bdsm另类| 男男h啪啪无遮挡| av在线app专区| 欧美日韩综合久久久久久| 一本—道久久a久久精品蜜桃钙片| 国产成人免费无遮挡视频| 老熟女久久久| 亚洲人成77777在线视频| 亚洲国产欧美在线一区| 欧美成人精品欧美一级黄| 狠狠婷婷综合久久久久久88av| 天堂8中文在线网| 搡女人真爽免费视频火全软件| 亚洲精品,欧美精品| 美国免费a级毛片| 国产免费又黄又爽又色| 观看av在线不卡| 久久午夜福利片| 精品亚洲成a人片在线观看| 亚洲欧美成人精品一区二区| 亚洲一级一片aⅴ在线观看| 秋霞在线观看毛片| 久久久久精品人妻al黑| 亚洲国产精品一区二区三区在线| 在线观看免费高清a一片| 亚洲在久久综合| 久久热在线av| 成年女人在线观看亚洲视频| 国产欧美日韩综合在线一区二区| 久热久热在线精品观看| 亚洲欧美精品自产自拍| 日日爽夜夜爽网站| 久热这里只有精品99| 国产精品人妻久久久影院| 国产男人的电影天堂91| 久久精品国产综合久久久 | 男女边摸边吃奶| 国产1区2区3区精品| 青春草视频在线免费观看| 国产精品无大码| 午夜老司机福利剧场| 国产不卡av网站在线观看| 国产精品秋霞免费鲁丝片| 97人妻天天添夜夜摸| 女性生殖器流出的白浆| 日本猛色少妇xxxxx猛交久久| 亚洲精品中文字幕在线视频| 中文字幕另类日韩欧美亚洲嫩草| av一本久久久久| 亚洲国产精品国产精品| 这个男人来自地球电影免费观看 | 男女免费视频国产| 国产精品女同一区二区软件| 精品人妻一区二区三区麻豆| av在线观看视频网站免费| 18禁在线无遮挡免费观看视频| 欧美变态另类bdsm刘玥| 视频区图区小说| 国产精品一区www在线观看| 少妇高潮的动态图| 国产亚洲午夜精品一区二区久久| 内地一区二区视频在线| 交换朋友夫妻互换小说| 亚洲 欧美一区二区三区| 午夜福利视频在线观看免费| 免费高清在线观看视频在线观看| 99久久综合免费| 少妇被粗大的猛进出69影院 | 久久99热这里只频精品6学生| 亚洲欧洲日产国产| 在线观看美女被高潮喷水网站| 国产色爽女视频免费观看| 香蕉国产在线看| 老司机影院成人| 亚洲精品久久成人aⅴ小说| 精品国产乱码久久久久久小说| 五月天丁香电影| 五月开心婷婷网| 欧美少妇被猛烈插入视频| 十八禁高潮呻吟视频| 街头女战士在线观看网站| 久久国内精品自在自线图片| 不卡视频在线观看欧美| 男女边吃奶边做爰视频| 亚洲国产精品国产精品| 久久99精品国语久久久| av不卡在线播放| 成人免费观看视频高清| 成人影院久久| 国产亚洲精品第一综合不卡 | 99热6这里只有精品| 免费观看在线日韩| 久久国产亚洲av麻豆专区| kizo精华| 在线观看三级黄色| 丝瓜视频免费看黄片| 91国产中文字幕| 老司机影院成人| 国产高清不卡午夜福利| 久久久久久久精品精品| 欧美变态另类bdsm刘玥| 免费不卡的大黄色大毛片视频在线观看| 欧美 日韩 精品 国产| 午夜日本视频在线| 99久国产av精品国产电影| 国产白丝娇喘喷水9色精品| 久久久久人妻精品一区果冻| 日韩视频在线欧美| 少妇人妻久久综合中文| 蜜桃国产av成人99| 亚洲一区二区三区欧美精品| 亚洲av免费高清在线观看| 90打野战视频偷拍视频| 午夜免费鲁丝| 蜜桃在线观看..| 亚洲国产欧美在线一区| 伊人久久国产一区二区| 婷婷色综合大香蕉| 国产精品一二三区在线看| 欧美精品人与动牲交sv欧美| 婷婷色综合www| 亚洲成色77777| 国精品久久久久久国模美| 国产精品人妻久久久久久| 国产男女内射视频| 一级爰片在线观看| 国产精品秋霞免费鲁丝片| 飞空精品影院首页| 欧美日韩成人在线一区二区| 水蜜桃什么品种好| 日本黄大片高清| 久久精品国产综合久久久 | 观看美女的网站| 日韩在线高清观看一区二区三区| 免费久久久久久久精品成人欧美视频 | 日韩一区二区三区影片| 亚洲av欧美aⅴ国产| 免费日韩欧美在线观看| 99视频精品全部免费 在线| 国产成人a∨麻豆精品| 成年人免费黄色播放视频| 精品第一国产精品| 亚洲精华国产精华液的使用体验| 777米奇影视久久| 一个人免费看片子| 亚洲av男天堂| 丝瓜视频免费看黄片| 精品国产乱码久久久久久小说| 蜜桃国产av成人99| 成人手机av| 国产69精品久久久久777片| 男女边摸边吃奶| 国产成人aa在线观看| 中文天堂在线官网| 成年人午夜在线观看视频| 亚洲第一区二区三区不卡| av国产久精品久网站免费入址| 久久精品人人爽人人爽视色| 一二三四中文在线观看免费高清| 国产探花极品一区二区| 久久人人爽av亚洲精品天堂| 久久亚洲国产成人精品v| www.熟女人妻精品国产 | 在线观看三级黄色| 日韩视频在线欧美| 亚洲综合色网址| 日韩精品免费视频一区二区三区 | 午夜激情av网站| 男的添女的下面高潮视频| 亚洲精品日本国产第一区| 免费观看av网站的网址| 国语对白做爰xxxⅹ性视频网站| 国产av精品麻豆| 春色校园在线视频观看| 精品国产露脸久久av麻豆| 最近手机中文字幕大全| 久久人妻熟女aⅴ| 亚洲精品日本国产第一区| 午夜福利网站1000一区二区三区| 老司机影院成人| 22中文网久久字幕| 少妇人妻精品综合一区二区| 2022亚洲国产成人精品| 一边摸一边做爽爽视频免费| 只有这里有精品99| 丰满饥渴人妻一区二区三| 国产精品一国产av| 纯流量卡能插随身wifi吗| 成人国产麻豆网| 黑人巨大精品欧美一区二区蜜桃 | 国产精品蜜桃在线观看| 久久久久精品久久久久真实原创| 久久精品国产亚洲av天美| 日韩制服骚丝袜av| av在线老鸭窝| 日韩av免费高清视频| 在线观看免费视频网站a站| 夫妻午夜视频| 尾随美女入室| 国产av国产精品国产| 国产成人精品在线电影| 午夜91福利影院| 中文字幕人妻丝袜制服| 国产老妇伦熟女老妇高清| a级毛片在线看网站| 人妻系列 视频| 国产 一区精品| 午夜精品国产一区二区电影| 亚洲国产av影院在线观看| 老女人水多毛片| 啦啦啦在线观看免费高清www| 免费人成在线观看视频色| www.熟女人妻精品国产 | 欧美精品国产亚洲| 精品国产一区二区三区四区第35| 啦啦啦在线观看免费高清www| 亚洲欧美色中文字幕在线| av福利片在线| 国产极品粉嫩免费观看在线| 国产69精品久久久久777片| av免费观看日本|