• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Color-image encryption scheme based on channel fusion and spherical diffraction

    2022-03-12 07:44:22JunWang王君YuanXiZhang張沅熙FanWang王凡RenJieNi倪仁杰andYuHengHu胡玉衡
    Chinese Physics B 2022年3期
    關鍵詞:王君

    Jun Wang(王君) Yuan-Xi Zhang(張沅熙) Fan Wang(王凡) Ren-Jie Ni(倪仁杰) and Yu-Heng Hu(胡玉衡)

    1Sichuan University,School of Electronics and Information Engineering,Chengdu 610065,China

    2Department of Electrical and Computer Engineering,University of Wisconsin-Madison,Madison,WI 53706,USA

    Keywords: channel fusion,hyper-chaotic system,asymmetric encryption,spherical diffraction

    1. Introduction

    In the past few decades, information security has been widely discussed in the military field and civilian field. As one of the most common information carriers, encryption research on the image has always been a concern of scientific researchers. Unlike traditional digital encryption, optical encryption has attracted more and more attention due to its high-speed transmission,parallel processing,and large capacity. The earliest optical encryption system can be traced back to the double random phase encryption scheme proposed by Refregier and Javadi in 1995,[1]which can encrypt the image into stationary white noise in the 4f optical system. However, this symmetry system was later proved to be vulnerable to known-plaintext[2]and chosen-plaintext attacks.[3]To overcome the shortcoming,the fractional Fourier transform,[4,5]fractional Mellin transform,[6,7]phase-shifting interferometry,[8,9]Fresnel transform,[10]ghost image,[11]and cylindrical diffraction[12,13]have been proposed. Moreover,as an important branch of image encryption,a lot of colorful image encryption schemes[14-20]have been proposed based on previous researches.

    Nevertheless, most of color image optical encryption schemes at present which convert color plaintext into color ciphertext suffer the problem of information leakage.[21-23]The red-green-blue (RGB) channels of the color image are encrypted independently first in these encryption schemes.Then,encrypted channels are fused into a color image again. In this case, the attacker only needs to know part of the ciphertext and private key to obtain most of the partial information of the plaintext image. There are two feasible schemes to solve this problem. One is to reduce the strong correlation between separate RGB channels and the color image,[24-26]such as changing the pixel values or position of one channel through another channel.[24]However, like the parallel processing scheme, this scheme usually requires optical modulations more than once to obtain the ciphertext. Moreover,since the existing hardware usually discretizes the image,this scheme will lead to more errors in optical encryption and reduce the quality of the decrypted image. Therefore, researchers proposed another scheme[27-29]whose idea is similar to multi-image encryption.[30]Dissimilarly, the second scheme tries to transform a color image into a grayscale image. A common method to transform a color image into a single channel image is to perform the convolution operation on all three channels together.[28,29]Compared with the first scheme, the second scheme is more suitable for optical encryption. However, the second scheme usually requires more private keys to separate the merged images during decryption.And the second scheme does not solve the problem of information leakage well since the attackers can still obtain the complete information about a particular channel if they know the full ciphertext and part of the private keys. Therefore, considering the problems of existing schemes, it is necessary to develop a more secure and efficient color image encryption scheme. The proposed encryption scheme should integrate the advantages of first and second schemes and avoid their disadvantages.

    In this paper, a color-image encryption scheme based on channel fusion and spherical diffraction is proposed. In this scheme, a color image is first transformed into a grayscale image by channel fusion technology based on a hyperchaotic system and discrete wavelet transform (DWT). Here, the hyperchaotic system is to reduce the correlation between the RGB channels and colorful original image, and the DWT is to transform the color image into a grayscale image. Then,the grayscale image is modulated by a mask generated by the hyperchaotic system. The modulation result is input into an asymmetric spherical diffraction system which is more secure than the symmetric system. Finally, the improved equal module decomposition (IEMD) is used to hide the complexvalued result of diffraction into two real-values masks which are more valuable for the actual data transmission. The proposed scheme can solve the problem of information leakage well in optical encryption. The simulation results and safety analysis prove the effectiveness of our scheme.

    2. Principle of encryption and decryption

    Here in this section, some basic principles related to our proposed scheme are introduced.

    2.1. Encryption in spherical diffraction domain

    Owing to the asymmetric property of spherical diffraction, the shortcomings of symmetry of the plane diffraction encryption schemes can be overcome. Therefore,it can resist ciphertext attack, plaintext attack, and phase-retrieval attack.Meanwhile, the diffraction parameter can also be used as a private key to improve the security of the encryption scheme.

    According to spherical holographic theory,[31-35]the object surface and observation surface of spherical diffraction are the surfaces of concentric spheres with radii ofrandR.Hence,there are two propagation models which are inside-tooutside propagation(IOP)model and outside-to-inside propagation(OIP)model as shown in Figs.1(a)and 1(b).

    Fig.1. Spherical diffraction of(a)inside-to-outside propagation model and(b)outside-to-inside propagation model.

    For the IOP model,Qr(θr,φr)andPR(θR,φR)represent the object point and observation point in the spherical coordinate,respectively. For the OIP model,QR(θR,φR)andPr(θr,φr)denote the object point and observation point in the spherical coordinate,respectively. TheθrandθRare in a range from-πtoπ,andφRandφrare in a range from-π/2 toπ/2. If we denote the diffraction distributions on inner surfaces and outer surfaces asur(θr,φr)anduR(θR,φR),the diffraction integral equations based on the Rayleigh-Sommerfeld integral equation of the two models can be written as

    whereCis a constant andkdenotes the wavenumber of the incident light,drepresents the distance between the observation pointPand the object pointQ, andsrefers to the object surface.

    2.2. Improved equal module decomposition

    In conventional equal module decomposition(EMD),[36]a complex amplitudeUcan be represented by two equal module masksP1andP2. The new distribution of complex amplitude can be rewritten as

    whereAis the amplitude ofU, andβis the phase ofU. If a random phase mask (RPM) (in the following text, RPM is denoted byR)distributed uniformly in the interval[0,2π],R2is expressed as

    where rand(M×N)means a random number matrix ofMrows andNcolumns,and the value range of element is[0,1]. Here,P1will be gained byA,andP2byβandR2.

    However,P1andP2are expressed as two complex-valued masks and they are not convenient to transmit. Therefore,an IEMD scheme is used[37]to solve the problem. Here in the IEMD the output ofP1andP2are replaced byCandPKwhich are both real valued. Under the IEMD,the decomposition equation of complex amplitudeUis as follows:

    U=C·[exp(iR2)+exp(iPK)],

    C=0.5A·[cos(β-R2)]-1, PK=2β-R2=arg(P2),(6)

    whereCis ciphertext, andPKis the private key. In our scheme,R2is generated from the hyperchaotic system controlled by private key. Therefore, it is not necessary to transmitR2. Hence,Uis hidden into two real-valued masks [C,PK]successfully.

    3. Proposed scheme

    3.1. Encryption process

    Step 1 First, we need to generate several sequences or masks. In this step, Chenet al.’s four-dimensional (4D) hyperchaotic system[38]is used to generate the sequences and masks for subsequent encryption. The hyperchaotic system is as follows:

    Here, the parameters of the system are set to bea=80,b=45,c=22,d=5,e=21,f=8,andr=78,and they are broadcasted as public keys.

    The initial conditions used as private keys are determined by different plaintexts. The initial value ofx,y,z, andware determined by variance and mean of the color plaintext, respectively. The generated four sequences are used as key1,key2,R1,andR2for subsequent encryption. The key1 and key2 are used in the channel fusion process.R1is a random phase mask which forms a complex amplitude with the fused image in spherical diffraction.R2is the random mask in IEMD.

    In the actual transmission,the only private keys we need to transmit are the initial values of the hyperchaotic system.

    Step 2 In this step, the color plaintext is processed by channel fusion based on DWT and the keys generated by the hyperchaotic system. The channel fusion will change the distribution and values of the plaintext pixels through key1 and key2 and finally resulting in a grayscale image.

    Firstly,the RGB channels of colorful image are separated,and they are processed by as follows:

    whereIR,IG, andIBrepresent the corresponding RGB channels of the original image,FL[·]denotes the progress of transforming a two-dimensional (2D) image matrix into a onedimensional(1D)pixel sequence,°refers to the matrix splicing operation,andSis the spliced sequence.

    Secondly, the sequenceSis diffused and permuted by key1 and key2 which are obtained in step 1, and expressed as

    where Per(a,b) denotes usingbto permutea, and⊕is the operation of XOR.

    After that,S1is reshaped from a sequence to three matrices. Each of the three matrices contains part of the information about the three RGB channels, which means that the strong correlation between the RGB channels is weakened. In this way, the corresponding color plaintext cannot be recovered well while missing any matrix.After reshaping the fusion sequence back to three gray-scale images, they will perform inverse DWT[39]together with the interfering image to finally get a grayscale image

    where IDWT[·]is the inverse discrete wavelet transform,Re(·)is the operator of reshaping.Itis the interfering image, andf(x,y) is the grayscale image after fusion. The process of channel fusion is shown in Fig.2,and the intermediate and the final results of channel fusion are shown in Fig.3. The size of final fused image is four times that of the original image.

    Fig.2. Channel fusion process.

    Fig.3. Channel fusion results,showing(a)original image,(b)interfering image,IDWT without(c)and with(d)permutation and diffusion,and(e)fusion image.

    Step 3 After the channels are fused, the phase mask RPM(x,y)=exp(jR1) generated by the hyperchaotic system andf(x,y) together form the complex amplitude distribution to be diffracted.

    According to the theory of Eq.(1),the result of diffraction in IOP mode is expressed as a complex distribution

    Step 4 Owing to the fact that the result of spherical diffraction is a complex distribution, it is necessary to make it more convenient to the actual data transmission. Compared with the traditional EMD, the IEMD can hide complex amplitude into two real-value masks while improving security.According to Eq.(6),the result of spherical diffraction can be rewritten as

    The whole encryption progress is shown in Fig.4.

    Fig.4. Encryption process.

    3.2. Decryption progress

    Step 1 Firstly,according to Eq.(12),we can obtain the complex amplitudeU. TheUis modulated by RPM*after spherical diffraction. The fused imagef(x,y)can be obtained from

    where LH corresponds to the red channel, HL denotes the green channel,and HH refers to the blue channel. The correspondence between subbands and channels will be determined by the encryption process.

    Step 3 Then,S2is inversely permuted and inversely diffused to restoreS. According to Eqs. (8) and (15), the onedimensional sequenceSwith complete RGB three-channel information is then reshaped into three two-dimensional matrices corresponding to RGB. Finally, the RGB channels are merged and the colorful plaintext is restored as shown below:

    where Per(a,b)-1is the inverse process of Per(a,b), and merge{·}means RGB channels’mergence.

    4. Simulation results

    4.1. Encryption and decryption result

    The simulation is performed with Python 3.8.2 to analyze the performance of the proposed scheme on a 64-bit computer. In the simulation, the radius of the outer sphereR, the radius of the inner spherer, and the wavelengthλare set to be 500 mm,50 mm,and 0.25 mm. According to the spherical holographic sampling theory,[34,35]the above parameters require that the number of sampling points in the horizontal and vertical directions of the image should be at least 2513 pixels and 1257 pixels. However, if we select only 1/5 of the sphere surface, the minimum number of sampling points required will be 503 pixels and 252 pixels in the corresponding direction. To achieve this goal, the size of the original image is select as 256×256×3, and the corresponding size of the ciphertext is 512×512. Figure 5 shows the result of encryption and decryption with plaintext ‘baboon’. The parameters related to spherical diffraction and the hyperchaotic system are listed in Table 1.

    Fig.5. Encryption and decryption results,showing(a)original image,(b)cipher-text,(c)private key PK,(d)decryption result with correct PK,and(e)decryption result with the wrong PK.

    Table 1. Parameters of spherical diffraction and Chen’s 4D hyperchaotic system.

    To better evaluate the quality of encryption and decryption,we introduce PSNR and SSIM as reference indexes. The corresponding equation is as follows:

    whereμIoandμIdrepresent the mean values of the original image and the decryption result image respectively;σIo,σId,σIoIdrepresent the variance of the original image and the decrypted image and the co-variance between them,respectively;c1andc2are constants to avoid division by 0;Ldenotes the dynamic range of pixel values. Usually,k1=0.01 andk2=0.03.

    4.2. Histogram

    The histogram shows the effectiveness and security of the encryption scheme.The histograms of ciphertext and plaintext should be completely different in the ideal encryption scheme.Figure 6 shows the histograms corresponding to RGB channels of color images‘a(chǎn)irplane’and‘baboon’,and their respective ciphertext histograms,which shows that the histogram of the ciphertext is different from that of any channel.

    Fig. 6. (a)-(c) RGB channels’ histograms of ‘a(chǎn)irplane’, (d) ciphertext histogram of ‘a(chǎn)irplane’, (e)-(g) RGB channels’ histograms of ‘baboon’, and (h)ciphertext histogram of‘baboon’.

    4.3. Key sensitivity and key space analysis

    Key sensitivity is usually used to test the reliability of an encryption scheme. Figures 7(a)and 7(b)show the sensitivity sensitivities of spherical diffraction parameters and initial values of hyperchaotic systems, respectively. Here, ‘baboon’ is selected as the plaintext.

    The dependence of SSIM on the change ofr,R,λare shown in Fig. 7(a). Whenr,R, andλchange 1% , 1%, 3%,the SSIM value would change dramatically.

    The initial condition of the chaotic sequence is also used as a private key. Figure 7(b) shows the decryption effects of changes in initial conditions, indicating that the initial condition changing by 0.25% will have a significant influence on the decryption result when the initial condition is 4 decimal places. With the increase of the decimal places of the initial condition,the spatial sensitivity of the initial condition becomes stronger.

    Fig.7. (a)Key sensitivity of spherical diffraction,and(b)key sensitivity of initial conditions of 4D hyperchaotic system.

    4.4. Noise and occlusion attacks

    Usually, the ciphertext may be polluted during transmission. Therefore,it is very important to ensure that the encryption scheme is robust to noise attack. In this part, multiplicative Gaussian noise is used to test the anti-noise performance of the image.The additive Gaussian noise model is as follows:

    wherePandP′represent ciphertext and ciphertext with noise,respectively,Gdenotes the Gaussian noise with a mean value of 0 and a standard deviation of 0.01,andkrefers to the signalto-noise ratio.Figures 8(a)-8(d)show the decryption results of the plaintext‘baboon’under different strengths of multiplicative Gaussian noise attack. The strengths of the four images arek=0.01,0.05,0.1,and 0.5,and the corresponding PSNR values are 28.16 dB, 21.58 dB, 18.51 dB, and 11.45 dB, respectively.

    In the process of transmission, the occlusion of ciphertext is also one of the possible pollutions. Figure 9 shows the decryption effects under different occlusion ratios: 50×50 pixels (1%), 100×100 pixels (4%), 150×150 pixels (8%),and 200×200 pixels(15%),respectively. The corresponding PSNR values are 17.79 dB,14.68 dB,12.81 dB,and 11.61 dB,respectively. Table 2 shows the decryption quality of the proposed scheme and Ref.[36]under the same clipping ratio. It shows that the proposed scheme is more resistant to ciphertext occlusion than the counterpart in Ref.[36].

    Fig.8. Decryption results of encryption image with noise strengths: k=0.01(a),0.05(b),0.1(c),and 0.5(d).

    Fig.9. Decryption results of encryption image with occlusion of(a)50×50 pixels(1%),(b)100×100 pixels(4%),(c)150×150 pixels(8%),and(d)200×200 pixels(15%).

    Table 2. Comparison of t ability to resistocclusion between Ref.[36]and proposed scheme,with‘baboon’chosen as plaintext.

    4.5. Error analysis of spatial light modulator

    Since spatial light modulator carries out the numerical quantization of the image on the target plane,quantization errors are regarded as a main error in optical encryption.To simulate an actual optical decryption,we will test this error to approach to the simulation results of real optical experiments.[40]

    Figures 10(a)-10(d) show the decryption effects of the images at different quantization levels: 22levels, 24levels,28levels, 216levels, and the corresponding PSNR values are 10.25 dB,15.28 dB,26.34 dB,and 29.02 dB,respectively.Under the introduction of this error,the proposed scheme is better than Ref.[21].Figure 11 shows the difference between the two schemes. The corresponding PSNR values are 11.54 dB and 27.63 dB,and SSIM values are 0.69 and 0.79,respectively.

    Fig.10. Decryption results at(a)22,(b)24,(c)28,and(d)216 quantization levels.

    Fig.11. Decryption results with quantization level 28,showing(a)original image,(b)decryption result of Ref.[21],and(c)decryption result of the proposed scheme.

    4.6. Resisting information leakage

    The current partial color image encryption adopts three channels parallel processing method,[21-23]which has the risk of information leakage in the process of transmission. Unlike these schemes,the single-channel grayscale ciphertext and the low correlation among the three channels in our scheme can significantly reduce the possibility of information leakage during transmission. To test the ability to resist information leakage, we assume that the information leakage has occurred.That is, the attacker has obtained the information about one of the three RGB channels,which means that for our scheme,the attacker has obtained a subband completely. Meanwhile,we assume that the attacker knows all the private keys and the encryption scheme.

    Figure 12 shows the comparison of the decryption effect between the two schemes under the condition of only knowing channel B information,taking the result in Ref.[23]as the comparison. The corresponding SSIM values of Figs. 10(c),10(g),10(d),and 10(h)are 0.99,0.99,0.09,and 0.09,respectively, showing that the ciphertext security of our scheme is much higher than the parallel processing scheme.

    Fig.12.Comparison of anti-information leakage ability between the literature and the proposed scheme,with channel B taken for example,displaying((a),(e))plaintext,((b),(f))B channel of plaintext,((c),(g))decryption result of Ref.[23],((d),(h))decryption of the proposed scheme.

    4.7. Potential attack analysis

    Phase iterative attack is a common way to attack optical encryption.[41]Here,we compare the resistance to phase iterative attack between Ref. [23] and our scheme. To compare the result better, the black edge is padded around the image.Figure 13 shows the phase recovery of the image after 500 iterations,and figure 14 shows the relation between the number of iterations and the SSIM of the recovered image.

    Fig.13. Result of phase iterative attack: (a)plaintext,(b)result of Ref.[23],(c)result of the proposed scheme.

    Fig.14. Comparison of phase attack results between Ref.[23]and the proposed scheme.

    Compared with linear optical system, nonlinear optical system has better resistance to phase attack. And since spherical diffraction is just one kind of nonlinear optical system,our scheme has a better performance against phase attack.

    An encryption system with high security should be able to resist differential attacks. In general, the number of pixel change rate (NPCR) and unified average changing intensity(UACI)are used to evaluate the ability to resist differential attacks,and defined as

    whereEandE′represent the ciphertext and the ciphertext with only one pixel changed,respectively.

    The corresponding NPCR and UACI values under different plaintexts are shown in Table 3 as compared with those in Refs. [24,42-44]. The result from the characteristics of chaotic systems shows that the difference in result caused by small changes in initial values is widely divergent. And since the initial value is determined by the colorful plaintext,a small change in the plaintext will make the key completely different.Therefore it has a strong ability to resist differential attacks.

    Table 3. Values of NPCR and UACI of different schemes.

    5. Conclusions

    In this paper,an efficient and secure color image encryption scheme based on channel fusion and spherical diffraction is proposed. Especially,channel fusion technology can effectively solve the problem of information leakage in color image encryption and reduce the loss of encryption. Compared with the symmetric system, the asymmetric spherical diffraction system used in this paper can significantly improve the antiattack ability and security of the scheme. Besides,the IEMD also solves the problem that the diffraction result is complexvalued. The simulation results and the comparison show the high security and robustness of the proposed scheme. Therefore,the proposed scheme may be used as a reference to resisting the risk of information leakage in color image encryption.

    Acknowledgements

    Project supported by the National Natural Science Foundation of China (Grant No. U1933132) and the Chengdu Science and Technology Program, Sichuan Province, China(Grant No.2019-GH02-00070-HZ).

    猜你喜歡
    王君
    王君作品
    雨花(2023年11期)2023-11-18 13:02:58
    弟弟
    參花(下)(2021年8期)2021-08-25 18:37:55
    捏活人
    讓句式多樣化的四種方法
    海洋火鍋
    視野(2016年22期)2016-11-11 04:47:28
    蘆芽又短
    視野(2016年14期)2016-09-28 10:48:32
    漂流記
    從公務員到修車工
    瞄準目標放低身段 公務員變身修車店老板
    捏活人
    故事會(2013年9期)2013-05-14 15:24:07
    国产成人影院久久av| 在线观看免费视频日本深夜| tube8黄色片| 欧美日本中文国产一区发布| 午夜精品在线福利| 亚洲精品久久午夜乱码| 午夜两性在线视频| 午夜福利,免费看| 国产精品久久视频播放| 精品欧美一区二区三区在线| 国产激情欧美一区二区| 妹子高潮喷水视频| 91麻豆精品激情在线观看国产 | 欧美一级毛片孕妇| 色婷婷久久久亚洲欧美| 在线视频色国产色| 亚洲av熟女| 亚洲成国产人片在线观看| 精品高清国产在线一区| 午夜免费成人在线视频| 黄频高清免费视频| x7x7x7水蜜桃| 搡老熟女国产l中国老女人| 纯流量卡能插随身wifi吗| 日本精品一区二区三区蜜桃| 69精品国产乱码久久久| 日日爽夜夜爽网站| 老熟女久久久| 俄罗斯特黄特色一大片| 18禁裸乳无遮挡动漫免费视频| 色综合婷婷激情| 欧美日韩黄片免| 午夜免费观看网址| 成人手机av| 久久久国产一区二区| 99国产精品一区二区三区| 国产亚洲精品第一综合不卡| 一夜夜www| 最新在线观看一区二区三区| 国产在视频线精品| 午夜影院日韩av| 久久久久久久午夜电影 | xxx96com| 午夜视频精品福利| 黑人操中国人逼视频| 999久久久国产精品视频| 欧美日本中文国产一区发布| 操出白浆在线播放| 精品国产国语对白av| 好男人电影高清在线观看| 亚洲熟妇熟女久久| 一级作爱视频免费观看| 中文字幕高清在线视频| 精品久久久久久,| 欧美日韩亚洲综合一区二区三区_| 热99re8久久精品国产| 91精品国产国语对白视频| 每晚都被弄得嗷嗷叫到高潮| 亚洲熟妇熟女久久| 国产亚洲欧美98| 99久久99久久久精品蜜桃| 人人妻,人人澡人人爽秒播| 人人妻人人澡人人爽人人夜夜| 三级毛片av免费| 少妇猛男粗大的猛烈进出视频| 飞空精品影院首页| 99精国产麻豆久久婷婷| 久久久国产一区二区| 美女国产高潮福利片在线看| 久久天堂一区二区三区四区| 一级作爱视频免费观看| 久久 成人 亚洲| 久久久久久久国产电影| 亚洲av电影在线进入| 极品人妻少妇av视频| 亚洲成人手机| 91成人精品电影| 欧美丝袜亚洲另类 | www.精华液| 一边摸一边抽搐一进一出视频| 免费黄频网站在线观看国产| 狠狠婷婷综合久久久久久88av| 两人在一起打扑克的视频| 欧美日韩国产mv在线观看视频| 国产日韩欧美亚洲二区| 欧美精品人与动牲交sv欧美| 精品一区二区三区av网在线观看| 亚洲 国产 在线| 露出奶头的视频| 日韩一卡2卡3卡4卡2021年| 午夜91福利影院| 精品亚洲成a人片在线观看| 中文字幕另类日韩欧美亚洲嫩草| 亚洲精品国产色婷婷电影| 精品少妇一区二区三区视频日本电影| 国产欧美日韩一区二区三| 1024视频免费在线观看| 国产激情欧美一区二区| 巨乳人妻的诱惑在线观看| 男女下面插进去视频免费观看| 老司机福利观看| 欧美不卡视频在线免费观看 | 欧美在线一区亚洲| 国产男女内射视频| 建设人人有责人人尽责人人享有的| 99re6热这里在线精品视频| 99精品久久久久人妻精品| 啦啦啦视频在线资源免费观看| 乱人伦中国视频| 国产精品av久久久久免费| 成年女人毛片免费观看观看9 | 国产三级黄色录像| 中文字幕色久视频| 建设人人有责人人尽责人人享有的| 亚洲av成人av| 国产成人一区二区三区免费视频网站| 国产精品国产高清国产av | 国产精品电影一区二区三区 | 大码成人一级视频| 日本黄色视频三级网站网址 | 国产精品久久久久成人av| 日韩 欧美 亚洲 中文字幕| 男女免费视频国产| 午夜免费鲁丝| 无遮挡黄片免费观看| 久久99一区二区三区| 黑人猛操日本美女一级片| 中文亚洲av片在线观看爽 | 国产在视频线精品| 人妻 亚洲 视频| a在线观看视频网站| 怎么达到女性高潮| 亚洲国产精品sss在线观看 | 日韩一卡2卡3卡4卡2021年| 两性午夜刺激爽爽歪歪视频在线观看 | 国产欧美日韩一区二区三区在线| 亚洲aⅴ乱码一区二区在线播放 | 亚洲熟女毛片儿| 99在线人妻在线中文字幕 | 热re99久久国产66热| 国产日韩欧美亚洲二区| 大香蕉久久成人网| 亚洲中文日韩欧美视频| 亚洲国产看品久久| 国产熟女午夜一区二区三区| 国产成+人综合+亚洲专区| 日韩精品免费视频一区二区三区| 别揉我奶头~嗯~啊~动态视频| 欧美日韩国产mv在线观看视频| tube8黄色片| 亚洲av日韩在线播放| 亚洲avbb在线观看| 每晚都被弄得嗷嗷叫到高潮| 黄频高清免费视频| 国产片内射在线| 美女视频免费永久观看网站| 久久中文字幕一级| xxx96com| 亚洲精品在线观看二区| 18在线观看网站| 久久国产亚洲av麻豆专区| 国产精品久久久av美女十八| 免费人成视频x8x8入口观看| 国产激情欧美一区二区| av欧美777| 在线观看免费日韩欧美大片| 超碰成人久久| 国产欧美日韩精品亚洲av| 精品久久久久久电影网| 成年版毛片免费区| av有码第一页| 婷婷丁香在线五月| 久久久久久人人人人人| 久久人妻福利社区极品人妻图片| 精品一区二区三区av网在线观看| 女人高潮潮喷娇喘18禁视频| 国产色视频综合| 男男h啪啪无遮挡| 国产又爽黄色视频| 国产极品粉嫩免费观看在线| 女性被躁到高潮视频| 一进一出好大好爽视频| 亚洲成国产人片在线观看| 国产视频一区二区在线看| 五月开心婷婷网| 精品午夜福利视频在线观看一区| ponron亚洲| 亚洲七黄色美女视频| 搡老乐熟女国产| 日韩制服丝袜自拍偷拍| 在线观看午夜福利视频| 亚洲自偷自拍图片 自拍| 久久精品国产清高在天天线| 操出白浆在线播放| 午夜激情av网站| 老汉色av国产亚洲站长工具| 国产成人欧美在线观看 | 99香蕉大伊视频| 一本大道久久a久久精品| 亚洲第一青青草原| 亚洲精品乱久久久久久| 男人舔女人的私密视频| 欧美精品人与动牲交sv欧美| 美国免费a级毛片| 热99久久久久精品小说推荐| av片东京热男人的天堂| 悠悠久久av| 在线看a的网站| 亚洲精品久久午夜乱码| av视频免费观看在线观看| 女警被强在线播放| 天堂俺去俺来也www色官网| 人人妻人人澡人人爽人人夜夜| 丰满人妻熟妇乱又伦精品不卡| 老熟妇仑乱视频hdxx| 99国产精品一区二区蜜桃av | 51午夜福利影视在线观看| 久久热在线av| 日韩精品免费视频一区二区三区| 亚洲成a人片在线一区二区| 国产亚洲精品久久久久久毛片 | 欧美日韩精品网址| 99精国产麻豆久久婷婷| 日日摸夜夜添夜夜添小说| 国产高清激情床上av| 热99re8久久精品国产| 又紧又爽又黄一区二区| 黄频高清免费视频| 亚洲国产欧美网| 宅男免费午夜| 欧美日韩亚洲国产一区二区在线观看 | 黄片小视频在线播放| av片东京热男人的天堂| 12—13女人毛片做爰片一| 人成视频在线观看免费观看| 91在线观看av| 日韩三级视频一区二区三区| 久久久久精品国产欧美久久久| 久久精品国产a三级三级三级| 色精品久久人妻99蜜桃| 欧美激情久久久久久爽电影 | 在线免费观看的www视频| 18禁裸乳无遮挡动漫免费视频| 老汉色∧v一级毛片| 男女下面插进去视频免费观看| 久久 成人 亚洲| 丰满的人妻完整版| 亚洲一区高清亚洲精品| 男人舔女人的私密视频| 免费观看a级毛片全部| 岛国在线观看网站| 欧美日韩亚洲综合一区二区三区_| 黄色怎么调成土黄色| 一区福利在线观看| 精品久久久久久电影网| 中文字幕制服av| 色精品久久人妻99蜜桃| 成年人午夜在线观看视频| av有码第一页| 久久人妻av系列| 亚洲第一av免费看| 极品人妻少妇av视频| 精品国产亚洲在线| 男女免费视频国产| 一本大道久久a久久精品| 日本黄色日本黄色录像| 高清在线国产一区| 午夜福利欧美成人| 欧美丝袜亚洲另类 | 国产视频一区二区在线看| 狠狠婷婷综合久久久久久88av| 国产激情欧美一区二区| 99re6热这里在线精品视频| 国产精品免费大片| 午夜影院日韩av| 中文字幕人妻熟女乱码| 亚洲精品在线美女| 亚洲精品自拍成人| 曰老女人黄片| 精品免费久久久久久久清纯 | av网站免费在线观看视频| 色播在线永久视频| 国产精品.久久久| 国产精品一区二区免费欧美| 亚洲成人国产一区在线观看| 亚洲精品国产色婷婷电影| 搡老岳熟女国产| 很黄的视频免费| 老汉色∧v一级毛片| 麻豆av在线久日| 久久精品亚洲精品国产色婷小说| 国产男女超爽视频在线观看| 真人做人爱边吃奶动态| 天堂√8在线中文| 久久ye,这里只有精品| 欧美最黄视频在线播放免费 | 国产精品九九99| 国产片内射在线| 国产真人三级小视频在线观看| 99久久精品国产亚洲精品| 飞空精品影院首页| 国产精华一区二区三区| 亚洲熟女毛片儿| av网站免费在线观看视频| 国产免费男女视频| 露出奶头的视频| 精品久久久久久久久久免费视频 | 国产精品九九99| 黑人欧美特级aaaaaa片| 18禁国产床啪视频网站| 国产高清国产精品国产三级| 在线永久观看黄色视频| 男女高潮啪啪啪动态图| 天天躁狠狠躁夜夜躁狠狠躁| 国产区一区二久久| 99国产极品粉嫩在线观看| 欧美色视频一区免费| 成人特级黄色片久久久久久久| 老鸭窝网址在线观看| 无限看片的www在线观看| 午夜福利免费观看在线| 丝袜美足系列| 老司机影院毛片| 日日摸夜夜添夜夜添小说| 91精品三级在线观看| 搡老乐熟女国产| 两个人免费观看高清视频| 狂野欧美激情性xxxx| 午夜免费成人在线视频| 最新在线观看一区二区三区| 免费黄频网站在线观看国产| 久久久久视频综合| 搡老岳熟女国产| 国产区一区二久久| 欧美av亚洲av综合av国产av| 大码成人一级视频| 国产不卡一卡二| 首页视频小说图片口味搜索| 国产在线观看jvid| 欧美成人免费av一区二区三区 | 亚洲人成电影免费在线| 日韩免费av在线播放| 久久久国产成人免费| 丰满饥渴人妻一区二区三| 久久天躁狠狠躁夜夜2o2o| 欧美激情久久久久久爽电影 | 午夜免费成人在线视频| 亚洲成a人片在线一区二区| www.自偷自拍.com| 国产成人av教育| 国产精品综合久久久久久久免费 | 亚洲熟妇熟女久久| 黄色毛片三级朝国网站| av有码第一页| 在线国产一区二区在线| 黑丝袜美女国产一区| 免费一级毛片在线播放高清视频 | 欧美激情 高清一区二区三区| 亚洲国产中文字幕在线视频| 丰满的人妻完整版| 欧美乱码精品一区二区三区| 成在线人永久免费视频| 女人爽到高潮嗷嗷叫在线视频| 免费高清在线观看日韩| 国产成+人综合+亚洲专区| 久久中文字幕一级| 在线十欧美十亚洲十日本专区| 91av网站免费观看| 老司机亚洲免费影院| 免费女性裸体啪啪无遮挡网站| 国产亚洲精品一区二区www | 少妇 在线观看| 夜夜爽天天搞| 黄色成人免费大全| 嫁个100分男人电影在线观看| 国产视频一区二区在线看| 18禁裸乳无遮挡免费网站照片 | 高清黄色对白视频在线免费看| 免费日韩欧美在线观看| 母亲3免费完整高清在线观看| 国产精品一区二区精品视频观看| 99riav亚洲国产免费| 国产精品亚洲一级av第二区| 如日韩欧美国产精品一区二区三区| 激情视频va一区二区三区| 超色免费av| 热re99久久精品国产66热6| 香蕉国产在线看| 黄色 视频免费看| 69精品国产乱码久久久| 乱人伦中国视频| 国产区一区二久久| 久久狼人影院| 中文字幕最新亚洲高清| 人妻一区二区av| 黄色a级毛片大全视频| 一本一本久久a久久精品综合妖精| 黄色a级毛片大全视频| 亚洲熟妇熟女久久| 黑人操中国人逼视频| 精品国产乱码久久久久久男人| 欧美人与性动交α欧美软件| 国产精品久久久久久人妻精品电影| 97人妻天天添夜夜摸| 麻豆av在线久日| 亚洲成人免费电影在线观看| 一级作爱视频免费观看| 免费看a级黄色片| 18禁裸乳无遮挡动漫免费视频| 欧美在线黄色| 国产精品一区二区在线不卡| 久久久水蜜桃国产精品网| 日日爽夜夜爽网站| 国产有黄有色有爽视频| 国产乱人伦免费视频| 日韩大码丰满熟妇| 午夜视频精品福利| 国产97色在线日韩免费| 久久亚洲精品不卡| 国产在线精品亚洲第一网站| 亚洲精品粉嫩美女一区| 美国免费a级毛片| 亚洲一码二码三码区别大吗| 一边摸一边做爽爽视频免费| 欧美日韩福利视频一区二区| 无遮挡黄片免费观看| 欧美日韩亚洲国产一区二区在线观看 | 久久久久久久精品吃奶| 亚洲成人免费电影在线观看| 国产欧美日韩综合在线一区二区| 亚洲美女黄片视频| 午夜成年电影在线免费观看| 精品乱码久久久久久99久播| 窝窝影院91人妻| 亚洲性夜色夜夜综合| 欧美乱色亚洲激情| 亚洲五月天丁香| 热re99久久精品国产66热6| 在线观看免费午夜福利视频| 国产男靠女视频免费网站| 成年女人毛片免费观看观看9 | 女警被强在线播放| 国产精品综合久久久久久久免费 | 极品教师在线免费播放| 欧美日韩av久久| 黄片大片在线免费观看| 成人国产一区最新在线观看| 首页视频小说图片口味搜索| 午夜福利一区二区在线看| 9色porny在线观看| 色94色欧美一区二区| netflix在线观看网站| 国产亚洲精品久久久久5区| 又黄又爽又免费观看的视频| 亚洲五月婷婷丁香| 久久精品国产a三级三级三级| 成年女人毛片免费观看观看9 | 久久久久国产一级毛片高清牌| 亚洲片人在线观看| 淫妇啪啪啪对白视频| 国产三级黄色录像| 女人爽到高潮嗷嗷叫在线视频| 欧美在线一区亚洲| 国产精品久久久久久精品古装| 久久久精品国产亚洲av高清涩受| 国产淫语在线视频| 人人澡人人妻人| 国产成人av激情在线播放| 99国产精品免费福利视频| 男男h啪啪无遮挡| а√天堂www在线а√下载 | 久99久视频精品免费| 91成人精品电影| 成人18禁在线播放| 国产三级黄色录像| 女性被躁到高潮视频| 嫁个100分男人电影在线观看| 亚洲专区中文字幕在线| 99久久综合精品五月天人人| 一本一本久久a久久精品综合妖精| 亚洲中文日韩欧美视频| 少妇裸体淫交视频免费看高清 | 精品国产一区二区三区四区第35| 制服人妻中文乱码| 国产精品.久久久| 老司机亚洲免费影院| 国产精品 国内视频| 美女视频免费永久观看网站| 国产单亲对白刺激| 人妻一区二区av| 看黄色毛片网站| cao死你这个sao货| 欧美亚洲日本最大视频资源| 少妇的丰满在线观看| 久久精品国产清高在天天线| 看黄色毛片网站| 亚洲av欧美aⅴ国产| 999精品在线视频| 最新在线观看一区二区三区| 少妇被粗大的猛进出69影院| 中文字幕高清在线视频| 母亲3免费完整高清在线观看| 国产99白浆流出| 黄色片一级片一级黄色片| 欧美在线黄色| 免费在线观看日本一区| 亚洲七黄色美女视频| 一二三四在线观看免费中文在| 在线观看免费午夜福利视频| 天天影视国产精品| 国产在线精品亚洲第一网站| 亚洲九九香蕉| 99久久人妻综合| 校园春色视频在线观看| 在线天堂中文资源库| 老司机深夜福利视频在线观看| 这个男人来自地球电影免费观看| 国产在线一区二区三区精| 91麻豆av在线| 精品视频人人做人人爽| 亚洲精品av麻豆狂野| 男女之事视频高清在线观看| 999久久久精品免费观看国产| 日本撒尿小便嘘嘘汇集6| 日韩精品免费视频一区二区三区| 亚洲精品av麻豆狂野| 国产成人精品无人区| 丝袜在线中文字幕| 老司机福利观看| 亚洲成av片中文字幕在线观看| 亚洲国产欧美网| 在线观看午夜福利视频| 免费看a级黄色片| 制服人妻中文乱码| 欧美日韩亚洲综合一区二区三区_| 麻豆乱淫一区二区| 性少妇av在线| 免费在线观看完整版高清| 成人永久免费在线观看视频| 国产色视频综合| 在线视频色国产色| 人妻丰满熟妇av一区二区三区 | 久久青草综合色| 亚洲av熟女| 老熟妇仑乱视频hdxx| 美女扒开内裤让男人捅视频| 99在线人妻在线中文字幕 | 国产欧美日韩一区二区精品| 美女午夜性视频免费| 国精品久久久久久国模美| 久久久久久久精品吃奶| 大型黄色视频在线免费观看| www.熟女人妻精品国产| 99精国产麻豆久久婷婷| 动漫黄色视频在线观看| 久久久久国产一级毛片高清牌| 亚洲熟妇熟女久久| 午夜激情av网站| 精品无人区乱码1区二区| 久久精品国产清高在天天线| 久久精品亚洲精品国产色婷小说| 国产av又大| 一a级毛片在线观看| 看片在线看免费视频| 一级片免费观看大全| 亚洲 国产 在线| 正在播放国产对白刺激| 香蕉丝袜av| 999精品在线视频| 亚洲avbb在线观看| 91成年电影在线观看| 黄网站色视频无遮挡免费观看| 性少妇av在线| 日本精品一区二区三区蜜桃| 亚洲一区中文字幕在线| 久久久精品国产亚洲av高清涩受| 1024香蕉在线观看| 老司机深夜福利视频在线观看| 69精品国产乱码久久久| 久久久精品免费免费高清| 咕卡用的链子| 亚洲熟女精品中文字幕| 亚洲精品久久成人aⅴ小说| 王馨瑶露胸无遮挡在线观看| 久久性视频一级片| 精品一区二区三卡| 国产成人精品久久二区二区免费| 嫁个100分男人电影在线观看| 国产在线观看jvid| 久久国产亚洲av麻豆专区| 99riav亚洲国产免费| 国产精品久久久av美女十八| 国产成人免费无遮挡视频| 丝袜人妻中文字幕| 无遮挡黄片免费观看| 国产精品电影一区二区三区 | 久久人人97超碰香蕉20202| 国内久久婷婷六月综合欲色啪| 香蕉丝袜av| 国产精品综合久久久久久久免费 | 久久性视频一级片| av在线播放免费不卡| 男男h啪啪无遮挡| 国产精品成人在线| 亚洲片人在线观看| 好看av亚洲va欧美ⅴa在| 69精品国产乱码久久久| 精品国产美女av久久久久小说| 超碰成人久久| 99久久国产精品久久久| 国产精品免费一区二区三区在线 | 成在线人永久免费视频| 欧美亚洲日本最大视频资源| 国产精品永久免费网站| 18禁美女被吸乳视频|