• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Atmospheric Convection Model Based Digital Confidentiality Scheme

    2022-08-23 02:16:14NoorMunirMajidKhanMohammadMazyadHazzaziAmerAljaediSajjadShaukatJamalandIqtadarHussain
    Computers Materials&Continua 2022年6期

    Noor Munir,Majid Khan,,Mohammad Mazyad Hazzazi,Amer Aljaedi,Sajjad Shaukat Jamal and Iqtadar Hussain

    1Department of Applied Mathematics and Statistics,Institute of Space Technology,Islamabad,Pakistan

    2Department of Mathematics,College of Science,King Khalid University,Abha,61413,Saudi Arabia

    3College of Computing and Information Technology,University of Tabuk,Tabuk,71491,Saudi Arabia

    4Department of Mathematics,Statistics and Physics,Qatar University,Doha,2713,Qatar

    Abstract: Nonlinear dynamics is a fascinating area that is intensely affecting a wide range of different disciplines of science and technology globally.The combination of different innovative topics of information security and high-speed computing has added new visions into the behavior of complex nonlinear dynamical systems which uncovered amazing results even in the least difficult nonlinear models.The generation of complex actions from a very simple dynamical method has a strong relation with information security.The protection of digital content is one of the inescapable concerns of the digitally advanced world.Today,information plays an important role in everyday life and affects the surroundings rapidly.These digital contents consist of text,images,audio,and videos,respectively.Due to the vast usage of digital images in the number of social and web applications,its security is one of the biggest issues.In this work,we have offered an innovative image encryption technique based on present criteria of confusion and diffusion.The designed scheme comprises two major nonlinear dynamical systems.We have employed discrete fractional chaotic iterative maps to add confusion capability in our suggested algorithm and continuous chaotic Lorenz system.We have verified our offered scheme by using statistical analysis.The investigations under the statistical tests suggested that our proposed technique is quite reasonable for the security of digital data.

    Keywords: Lorenz atmospheric convection model; fractional logistic map;image encryption;S-box

    1 Introduction

    Nowadays,society is full of the sphere of information in a different form of the digital medium.The advancement in different private and public sectors demands new and innovative results towards handling big data with low-cost technologies.Digital information that travels through an insecure line of communication plays an important role because of emerging technology usage at a high scale on social media and web applications etc.This insecurity while utilizing these applications on small and large computational machines lost the confidence of the net user.The issue of information security not just stops here it extended towards the regime of corporate organizations which includes business,banking sectors, and commercial firms.The information breaches are now increasing widely due to the vast number of facilities available online for instance transactions and online banking.The online services increased by a daily boom of commercial organizations due to competition among different officialdoms in an advanced era.Different companies created their research and development teams that mainly deal with cybersecurity.The security of information and online data streams gradually increase to fifth-generation technologies and the same happened in the area of information security where one cannot remain away from cybersecurity attacks.There have been several mechanisms used for the security of information which includes cryptography,watermarking,and steganography.The privacy of the given information can be assured by using cryptography.The watermarking and information hiding techniques are utilized for both information integrity and authentication.The most fruitful area of information preserving, and confidentiality is chaotic cryptography.With the advancement in the area of nonlinear dynamics,several discrete and continuous chaotic systems were developed and tested against different chaotic tests.The relations between chaos and cryptography have been a mode of discussion for two decades[1].Similarities among different concepts of chaos and cryptography make it a reasonable candidate for the encryption of digital data.The notion of diffusion and confusion in 1949 proposed by Claude Shannon added new directions in information security.Then different new block ciphers were designed which used confusion and diffusion.The addition of diffusion and confusion in a block cipher added a robust security layer against different cryptographic attacks.In modern cryptosystems,the notion of Claude Shannon is term as substitution-permutation network(SP-network)[2].The idea of confusion is to make the relations between encrypted data and secret key as difficult as possible which can be achieved through substitution, whereas diffusion is used to scatter the statistical construction of original information over the greater part of encrypted information [3].The diffusion is achieved through permutation which simply means to reorder certain bits.By utilizing SP-network collectively, it is quite hard to detect any non-uniform change in cipher-text.The same idea of SP-network is now followed by different chaos-based encryption algorithms[4–11].

    Several image encryption schemes utilized chaotic dynamical systems for the confidentiality of digital contents [12–16].Chaotic schemes were also helpful for the formulation of nonlinear components of block cipher known as Substitution boxes (S-boxes) [17–21].The principal idea of constructing nonlinear components through chaotic dynamical systems is to add strong confusion capability which is surely one of the vital components in modern block ciphers.There exist many encryption structures in literature with weak security and vulnerability in implementation design due to skipping the notion of confusion and diffusion [22–25].A small change in chaotic parameters produces a dynamically different trajectory similarly small variations in chaotic parameters produce a completely new substitution box.The main contribution of this work is as follows:

    1.The idea of this research is to produce a nonlinear component by using a fractional chaotic logistic map.

    2.Implementation of constructed S-box in the suggested chaos-based image encryption method.

    3.The scheme also entails a continuous chaotic Lorenz system for diffusion that ultimately produces permutation[6].

    4.Some security assessments are performed to examine the efficiency and robustness of offered system along with some statistical analysis.

    This manuscript consists of seven sections.The basic concepts are reviewed in Section 2.The mathematical model of the Lorenz chaotic system is offered in Section 3.The offered substitution box and image encryption technique are presented in segments 4 and 5 correspondingly.The statistical analyses are presented in Section 6.As a final point,the conclusion is shown in the last section.

    2 Backgrounds

    In this section, we have presented some basic keys, which are essential for the interpretation of innovative image encryption techniques though suggested S-box based on discrete fractional chaotic iterative maps.

    2.1 Logistic Map

    The logistic map is one of the prominent and extensively utilized one dimensional(1-D)discrete logistic chaotic map proposed by R.M May, whose state evolves corresponding to the following mathematical equation[4]:

    where 0 ≤μ≤4 represent the control parameter and logistic map with state variableynwhose behaviors depend on the initial conditiony0.The chaotic outputsynof the map defined in Eq.(1)are bounded within the interval[0, 1]for alln≥0.

    2.2 Riemann-Liouville Fractional Derivative

    Iff(y)∈C([a,b])anda <x <bthen[5]:

    whereαranges from-∞to ∞and known as the Riemann-Liouville fractional integral having orderα.In the same way forα∈]0,∞[we let

    is known as Riemann-Liouville fractional derivative with orderα[6].

    2.3 Fractional Logistic Equation

    For ally≥0,λ >0 andα∈]-∞,∞[:

    which is called fractional logistic equation(FLE)of orderα.

    3 Mathematical Formulation of Atmospheric Convection Model

    In 1963,Edward Lorenz proposed a simple mathematical model for atmospheric convection.The mathematical derivation of Lorenz equations is given in [6,7].There are three different models of chaotic Lorenz systems which are given as follows:

    Viscosity+diffusion:

    Buoyancy+diffusion:

    Viscosity+buoyancy

    4 Proposed S-Box Using Fractional Chaotic Map

    The one-dimensional logistic map which was designed in 1967 by May [4] is one of the modest discrete nonlinear chaotic schemes which shows chaotic performance; its mathematical equation is described by the following iterative formula.

    By using the concept of the fractional logistic map,takingα= 0 and considering the fractional powers we purpose a chaotic fractional equation as

    wherexis variable of the map andx0decide the initial state,λis a system parameter,gandhare positive fractional powers andnrepresents the number of iterations desired to be applied.The initial valueλandx0acts as a private key when utilized in the encryption structure.To effectively decrypt the data, accurate values of bothλandx0are required at the receiver’s end.Therefore, the system turns out to be completely key-dependent which creates the retravel of secret data from the encrypted information complicated for the assailant.By using this fractional logistic map and the assumptionsg=1.5,h=1.5 andλ=3.5 we purposed 16×16 S-box overGF(28)(see Tab.1).

    Table 1: Proposed S-box by using chaotic fractional equation

    Table 1:Continued

    5 Suggested Image Encryption Algorithm

    In this segment, a fractional chaotic S-box-based image encryption technique is suggested.The intended scheme offers less computational time and cost of image encryption parallel to other methods which are available in the literature.The working steps of offered encryption scheme are as follows:

    Step 1:Choose a standard color image as input having sizen×m.

    Step 2:Divide the digital color image into three channels that are Red,Green,and Blue.

    Step 3:Utilize different proposed substitution boxes on each image layer individually.

    Step 4:Run Lorenz fractional chaotic equations and store all the generated output in one matrix.

    Step 5:Arrange matrix in ascending order by using the command of the sort in MATLAB and store the sorting position of each element in one matrix.

    Step 6:Now shuffle the pixels of each image layer corresponding to the sorting position matrix obtained in step 5.

    Step 7:Apply bitwise XOR with random array generated from Lorenz chaotic equation on each layer of the image obtained in step 6.

    Step 8:Concatenate all the layers produced from step 7 in one image.

    Step 9:The image attained from step 8 is the required encrypted image.

    The structure diagram of the offered image encryption algorithm is depicted in Fig.1.

    Figure 1:Design of proposed encryption scheme

    Decryption of Image

    The procedure of decryption is the same as the encryption procedure in reverse order.The original image can be retrieved easily by utilizing the decryption procedure.Figs.2 and 3 show some standard layer-wise encrypted images through the proposed scheme.

    Figure 2:(i–iv)Original layers of peppers image(v–viii)Encrypted layers of Peppers image

    Figure 3:(i–iv)Original layers of airplane image(v–viii)Encrypted layers of Airplane image

    6 Security Assessment of Suggested Technique

    This part of the manuscript describes various safety constraints to explain the robustness of the suggested technique.Some statistical analyses are accumulated by utilizing plain and their respective cipher images.These statistical analyses comprise correlation,entropy,uniformity,similarity measures,pixel modification,and sensitivity of plaintext.Each of the analyses is examined in an aspect to validate the efficiency of the encryption technique[15,16].

    6.1 NIST Analysis

    The randomness of a cipher can also be determined by NIST-800-22 test suite offered by the National Institute of Standard and Technology in 2001.NIST suite comprises several tests to analyze the arbitrariness in output data with probability values (pvalues).Thep-values of each assessment must be greater than 0.001 for a robust encryption scheme.The results of NIST for Peppers encrypted image of size 256×256 are depicted in Tab.2.The obtained results reflect that the encrypted image layers are highly randomized therefore,the offered encryption scheme is robust against all statistical attacks.

    Table 2: NIST test results for Peppers cipher image

    6.2 Histogram Analysis

    The histogram is the plot of the number of pixels for each tonal value.The histogram of original images contains sharp peaks in its distribution.An ideal encryption scheme yields a cipher image with uniform histogram distribution.3D histograms of the plain and enciphered Peppers image of size 256×256 image layers are displayed in Fig.4.From experiments, we can analyze that the scattering of pixels of the encrypted images is uniform, which can extensively decrease the values of correlation among the pixels.Consequently, histogram analysis indicates that our encryption algorithm is protected besides attacks.

    Figure 4: Continued

    Figure 4:(i–iv)Histograms of peppers image of size 256×256 original layers(v–viii)Histograms of peppers image encrypted layers

    6.3 Correlation Analysis

    The neighboring pixels of an image are highly correlated in horizontal, diagonal, and vertical directions.The original image exhibits the high correlation value, and alternatively, for an ideal encryption scheme, the correlation value must be less and approximately near to 0.A smaller value of the correlation of encrypted images leads to a secure encryption algorithm which reduces the possibility of attacks.The correlation coefficient of image pixels can be calculated by:

    where

    whereMandNare the estimations between two nearby pixels at grayscale in the digital image.The correlation coefficients for the plain and enciphered image along horizontal, vertical, and diagonal axes are presented in Tab.3.

    Table 3: Color components wise correlation coefficient of plain and enciphered images

    Table 3:Continued

    where H,V,and D shows the horizontal,vertical,and diagonal direction of the image,respectively.To quantify the correlation coefficient, we randomly choose 2500 sets of two adjoining pixels in three ways (horizontal, diagonal, and vertical) from encrypted and original image data.Tab.3 presents the corresponding experimental results.From Tab.3 we can examine that the values of correlation of original images are near to one, whereas the values of correlation of the enciphered images are near to 0.From the depicted results we can see that the suggested encryption technique reduces the correlation among image pixels accurately.Fig.5,presents the adjacent pixel distributions in the horizontal,diagonal,and vertical axes for Peppers images.Figs.5i–5iv presents the correlation of plain images,although Figs.5v–5viii represents the correlation of encrypted images.As from these Fig.5,we can see that the plain images exhibit high values of correlation,on the other hand,the enciphered images have a random distribution of correlation.The test results indicate that our encryption scheme has a very good influence on decreasing correlation.Therefore, the offered encryption algorithm is robust against all the attacks related to the correlation of pixels.

    Figure 5:(i–iv)Correlation coefficient among pixel pairs for plain peppers image;(v–viii)Correlation coefficient among pixel pairs for enciphered peppers image

    6.4 Information Entropy

    The distribution of gray values of the image is evaluated as the information entropy.Entropy increases with an increase in the uniformity of distribution of gray values.The encryption scheme is said to be highly secure if less information is leaked from the gray distribution value of images.Information entropy can be measured by the mathematical equation:

    wherepishows the gray value probability.The perfect value of encrypted image entropy is 8.The entropy of the enciphered image for the standard Lena image produced by the suggested scheme is 7.9991.The entropy of the enciphered image for Peppers image enumerated by the suggested scheme is 7.9990 and for Airplane image information entropy is 7.9991.These values are very near to the absolute value of entropy.Entropies of numerous original and enciphered images are analyzed which are listed in Tab.4.These values of entropy regard that they are very near to the perfect value 8.This shows that the encryption technique is safe against all feasible assaults.

    Table 4: Plain and encrypted images information entropies

    6.5 Distance Based Measurements

    The image quality assessment based on pixel modification measures are done by calculating maximum difference (MD), mean square error (MSE), the average difference (AD), peak signal to noise ratio(PSNR),normalized correlation(NCC),normalized absolute error(NAE)and structure content value(SC).These are the error metrics that are utilized to compare different images.

    Maximum Difference is also known as MD shows the maximum difference among the plain and enciphered images.The maximum difference can be represented in the mathematical form as follows:

    Our analyzed results are presented in Tab.5 which reflects that with the boost in the value of MD,the robustness of the encryption structure is increased.

    The normalized absolute error also named NAE is represented in mathematical form as follows:

    NAE defines the proportion of how far the enciphered digital data is from the plain image with the estimation of zero being impeccable similar images.From Tab.5, we can see that the increase in the approximation of normalized absolute error demonstrates a good description of scrambled images with encryption procedure.

    The average difference can be mathematically defined as:

    Table 5: Correlation-based and pixel difference-based measures of suggested encryption technique

    The value of the average difference is preferably zero for two similar digital images.The calculated results of the average difference are presented in Tab.5,which indicates that the suggested technique is robust against all possible differential assaults.

    6.6 Mean Squared Error and Peak Signal to Noise Ratio Analysis

    The encryption technique utilized to the original data adds noise to the actual digital contents therefore an encrypted digital image is not equivalent to the plain digital image.We process the MSE among the plain and encrypted images to evaluate the level of encryption.MSE can be formulated in mathematical form as:

    whereOxyandExyallude to pixels situated atxthrow andythcolumn of the plain and encrypted image individually.Higher the MSE value, increase the robustness of encryption.The enciphered image quality is evaluated using peak signal to noise ratio(PSNR),which is represented by the mathematical formula:

    whereIMAXis the highest pixel approximation of the image.The PSNR ought to be minimal value when equates to the enormous difference among original and encrypted images.Results in Tab.5 clearly show that the suggested technique is very near to the ideal values of MSE and PSNR,therefore the scheme is secure against security threats.

    6.7 Similarities Measures

    Normalized cross-correlation,structure content,and structure similarity are utilized to estimate the resemblances between two signals.These are some standard analyses for measuring that original and encrypted images are analogous or different.

    Normalized cross-correlation also known as NCC has been generally utilized as a metric.To check the level of difference (or resemblance) between two images.The NCC ranges from –1 and 1.Mathematically,the normalized correlation of the image is computed by the given formula[16–21]:

    whereX×Ydenotes the size of plain imageOand cipher imageEboth.Our analyzed results presented in Tab.5 reveals that the calculation of NCC for encryption is near to unity which distinctly means that the suggested technique contains strong divergences among the pixels of original and enciphered images.

    Structural content is also known as SC, measures the collective weight of a plain image to the respective encrypted image.It is,hence,a global metric.If the value of SC exhibits as one,at that point the encrypted image represents the better quality,and an increase in the assessment of SC denotes that the image is very low in quality.The mathematical form of structural content is as:

    From Tab.5 we can observe that our encryption technique gives the evaluation of SC which is not very near to unity due to the diffusion and confusion like noise disorder in the plain image.

    6.8 Plaintext Sensitivity Analysis

    To check the randomness of the encryption technique,diffusion is an important constraint that must be assessed.Two basic methods are implemented recognized as the number of changing pixel rate (NPCR), and the unified averaged changed intensity (UACI) to examine the impact of one-bit alteration in the plain content and the enciphered content.NPCR focuses on the number of pixels that change the assessment in differential assaults although the UACI concentrates on the AD(averaged difference)among two paired enciphered images.Assume encrypted image previously and afterward,one-pixel change in original content image isC1andC2correspondingly.The value of pixels at grid(x,y)inE1andE2are symbolized asE1(x,y)andE2(x,y),Da bipolar array is described by Eq.(20).Formerly the MAE,UACI,and NPCR can be formulated by the subsequent representations:

    where

    Tab.6 presents the values of, UACI (≈33%) and NPCR (>99%) for every layer of image for nine different standard images.Investigational consequences demonstrate the estimated variance of UACI and NPCR are actual near to the theoretical measures,which explain the validity of theoretical standards.Hence our proposed encryption method is resilient against differential attacks.

    Table 6: The results of sensitivity analysis of suggested encryption technique

    6.9 Z1 Test for Randomness(0–1 Test)

    In this section, we have applied the 0–1 test for the chaos which checks the randomness of enciphered images.When the value of the Z1 test is near to one it means that the proposed scheme defines good randomness which shows that it is secure against differential attacks.On the other side,if the value of this test is near zero,this means the test is failed and there is no chaos in the encrypted image.Here we have presented analyzed results in Tab.7 which defines the Z1 test value for the layerwise encrypted image.

    6.10 Comparative Analysis with Standard Results

    In this section, we compare the suggested encryption method with numerous states of the arts,which have high security.The comparison contains the following aspects: information entropy,correlation among different pixels of encrypted images, robustness to plaintext sensitivity analysis.Furthermore,from our experimental results,we can see that correlation values are high between three R,G,and B layers for plain color digital images,which makes data revelation conceivable.Moreover,we have presented a contrast of correlation coefficient of Pepper 256×256 image enciphered with our suggested technique and some encryption method already described in the literature(see Tab.8).

    Here we have offered a contrast of values of entropy of Pepper 256 × 256 image encrypted with our proposed scheme and some encryption method already described in the literature (seeTab.9).Subsequently, the suggested image encryption technique is robust adjacent to the entropy attack.Moreover,the entropy assessments of the suggested method are better as contrasted to other encryption schemes.The entropy of the recommended technique for encrypted Pepper image is improved than current methods by inspecting Tab.9.

    Table 7: Z1-Test for of enciphered image

    Table 8:Contrast of the correlation of suggested technique with current procedures using Pepper image

    Table 9: Comparative analysis for the entropy of Pepper image of size 256×256

    Thus, we have presented a UACI and NPCR of Pepper 256 × 256 image enciphered with our suggested technique with some other encryption methods to show the better performance of the suggested scheme in Tab.10.From depicted results,we can see that our offered scheme is more resilient as compared to other techniques.

    Table 10: Contrast of differential attacks analysis

    6.11 Time Complexity Analysis

    The total time in seconds carried by the suggested technique to be run depending on the input length is described as time complexity.The algorithm was executed on a personal computer with an Intel(R) for the simulations.Core (TM) i7-7500U 2.90 GHz CPU and 8 GB memory capacity.MATLAB R2019b was utilized for the simulations.The execution time(in seconds)of different sizes of Peppers image is depicted in Tab.11.

    Table 11: Time complexity analysis of the offered scheme

    7 Conclusion and Future Recommendations

    In this work, we have designed an innovative image encryption technique by employing a discrete one-dimensional logistic map and a continuous convective atmospheric model(Lorenz chaotic system).The first phase of offered image encryption scheme involves the construction of a nonlinear confusion component of the block cipher.This S-box is fundamentally accountable for the confusion in the anticipated encryption mechanism.In the second phase, we have employed a Lorenz chaotic system as a diffusion agent in the offered technique.The obtained outcomes are then contrasted with previously existing benchmarks in image encryption methods.Our anticipated image encryption scheme has quite satisfactory statistical results.

    The suggested encryption structure can also be turned into a lightweight mechanism by offering small 4×4 S-boxes with fractional chaotic logistic maps.The offered structure can be extended in audio and video encryption.

    Data Availability Statement:The data utilized in this manuscript are available in the open SIPI Image Database at http://sipi.usc.edu/database/.

    Funding Statement:The author Mohammad Mazyad Hazzazi extend his appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through research groups program under Grant no.R.G.P.2/150/42.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    亚洲中文字幕日韩| 亚洲一码二码三码区别大吗| 久99久视频精品免费| 男女高潮啪啪啪动态图| 亚洲五月色婷婷综合| 免费看a级黄色片| 亚洲精品国产精品久久久不卡| 亚洲国产欧美一区二区综合| 十八禁人妻一区二区| 极品人妻少妇av视频| 久久久久久久久免费视频了| 看黄色毛片网站| 中文字幕高清在线视频| 亚洲自偷自拍图片 自拍| 一本大道久久a久久精品| 天天躁日日躁夜夜躁夜夜| 欧美日韩av久久| 久久国产精品影院| 悠悠久久av| 国产在线一区二区三区精| 日本欧美视频一区| 国产精品国产av在线观看| 十八禁网站免费在线| 精品久久久久久久毛片微露脸| 午夜福利免费观看在线| 国产亚洲精品久久久久5区| 亚洲黑人精品在线| 在线观看午夜福利视频| 亚洲一卡2卡3卡4卡5卡精品中文| 亚洲avbb在线观看| 亚洲一区中文字幕在线| 日韩欧美一区二区三区在线观看 | 国产极品粉嫩免费观看在线| 99国产精品99久久久久| 亚洲中文字幕日韩| 久久香蕉国产精品| 两人在一起打扑克的视频| 热re99久久国产66热| 国产精品综合久久久久久久免费 | 久久婷婷成人综合色麻豆| 18禁国产床啪视频网站| 免费观看a级毛片全部| 久久久久久久久免费视频了| 999久久久精品免费观看国产| 国产91精品成人一区二区三区| 久久天躁狠狠躁夜夜2o2o| 欧美中文综合在线视频| 女同久久另类99精品国产91| 在线免费观看的www视频| 99riav亚洲国产免费| 正在播放国产对白刺激| 国产精品98久久久久久宅男小说| 久久久精品免费免费高清| 电影成人av| 法律面前人人平等表现在哪些方面| 岛国在线观看网站| 欧美午夜高清在线| 香蕉国产在线看| 亚洲情色 制服丝袜| 麻豆乱淫一区二区| 欧美激情极品国产一区二区三区| 久久久精品国产亚洲av高清涩受| 搡老熟女国产l中国老女人| 涩涩av久久男人的天堂| 99国产精品一区二区蜜桃av | 老汉色av国产亚洲站长工具| 热99re8久久精品国产| 国产成人免费无遮挡视频| 日本黄色视频三级网站网址 | 女人爽到高潮嗷嗷叫在线视频| 女人高潮潮喷娇喘18禁视频| 最近最新中文字幕大全免费视频| 国产精品欧美亚洲77777| 国产精品免费视频内射| 18禁国产床啪视频网站| 国产极品粉嫩免费观看在线| 9191精品国产免费久久| 精品一区二区三卡| av超薄肉色丝袜交足视频| 欧美国产精品一级二级三级| 国产无遮挡羞羞视频在线观看| 国产欧美日韩精品亚洲av| 亚洲熟女精品中文字幕| 亚洲午夜理论影院| 一区福利在线观看| 久久精品亚洲av国产电影网| 日日爽夜夜爽网站| 国产亚洲精品第一综合不卡| 在线看a的网站| 久久久国产一区二区| 成年人午夜在线观看视频| 日韩欧美一区视频在线观看| 欧美精品一区二区免费开放| 成人精品一区二区免费| 精品亚洲成国产av| 99国产精品一区二区蜜桃av | 女人久久www免费人成看片| 国产精品秋霞免费鲁丝片| 亚洲欧美一区二区三区久久| 久久精品aⅴ一区二区三区四区| 精品福利永久在线观看| 午夜免费鲁丝| 亚洲美女黄片视频| 这个男人来自地球电影免费观看| 免费看a级黄色片| 性色av乱码一区二区三区2| 99久久综合精品五月天人人| 97人妻天天添夜夜摸| 国产欧美日韩一区二区三| 欧美精品一区二区免费开放| 丝袜美足系列| avwww免费| 久久天躁狠狠躁夜夜2o2o| 最新美女视频免费是黄的| 久久久久久免费高清国产稀缺| 日本黄色日本黄色录像| 首页视频小说图片口味搜索| 在线观看免费视频日本深夜| 久久久久久久午夜电影 | 久久精品亚洲精品国产色婷小说| 午夜福利一区二区在线看| a在线观看视频网站| 国产在线精品亚洲第一网站| 日韩免费av在线播放| 日韩三级视频一区二区三区| e午夜精品久久久久久久| av不卡在线播放| 日韩欧美一区视频在线观看| 久9热在线精品视频| 亚洲av片天天在线观看| 亚洲精品久久成人aⅴ小说| 欧美亚洲 丝袜 人妻 在线| 我的亚洲天堂| tube8黄色片| 亚洲国产欧美一区二区综合| 91精品国产国语对白视频| 久久国产乱子伦精品免费另类| 大型av网站在线播放| 国产精品永久免费网站| 嫩草影视91久久| 国产午夜精品久久久久久| 99riav亚洲国产免费| 美女 人体艺术 gogo| 成人三级做爰电影| netflix在线观看网站| 精品福利观看| 涩涩av久久男人的天堂| 亚洲第一青青草原| 国产成人精品无人区| 操美女的视频在线观看| 人妻丰满熟妇av一区二区三区 | 日韩精品免费视频一区二区三区| av有码第一页| 色精品久久人妻99蜜桃| 99久久精品国产亚洲精品| 9色porny在线观看| 一二三四在线观看免费中文在| 人妻一区二区av| 视频区图区小说| 亚洲一区二区三区不卡视频| 国产高清激情床上av| 一区在线观看完整版| av电影中文网址| 两个人免费观看高清视频| 久久香蕉激情| 午夜激情av网站| 91精品三级在线观看| 女人精品久久久久毛片| 久久久久久免费高清国产稀缺| 免费高清在线观看日韩| 久久人妻av系列| 欧美+亚洲+日韩+国产| 亚洲国产精品一区二区三区在线| 精品国内亚洲2022精品成人 | 女警被强在线播放| 亚洲欧美日韩另类电影网站| 90打野战视频偷拍视频| 久久ye,这里只有精品| 三上悠亚av全集在线观看| 狠狠婷婷综合久久久久久88av| www.熟女人妻精品国产| 婷婷精品国产亚洲av在线 | 女人被躁到高潮嗷嗷叫费观| 最近最新中文字幕大全免费视频| 一级毛片高清免费大全| 丰满的人妻完整版| 成人国语在线视频| 成人av一区二区三区在线看| 视频在线观看一区二区三区| 午夜91福利影院| 少妇被粗大的猛进出69影院| 最新在线观看一区二区三区| 老司机靠b影院| 午夜亚洲福利在线播放| 丁香六月欧美| 国产精品国产av在线观看| 99久久国产精品久久久| 精品国产超薄肉色丝袜足j| 久久国产精品大桥未久av| 亚洲国产中文字幕在线视频| 一进一出抽搐gif免费好疼 | 国产精品一区二区在线不卡| 日韩成人在线观看一区二区三区| 成年人黄色毛片网站| 美国免费a级毛片| 一进一出好大好爽视频| 久久久久视频综合| 黄色 视频免费看| 男女之事视频高清在线观看| 在线观看免费高清a一片| 国产精品香港三级国产av潘金莲| 欧美日韩视频精品一区| 国产精品1区2区在线观看. | 国产1区2区3区精品| 国产在线一区二区三区精| 18在线观看网站| 在线观看舔阴道视频| 亚洲视频免费观看视频| 人妻久久中文字幕网| 国产精品综合久久久久久久免费 | 另类亚洲欧美激情| 色婷婷av一区二区三区视频| 久久婷婷成人综合色麻豆| 满18在线观看网站| 午夜免费鲁丝| 1024香蕉在线观看| 国产激情久久老熟女| 好男人电影高清在线观看| 麻豆av在线久日| 91九色精品人成在线观看| 久久中文看片网| 亚洲一区高清亚洲精品| 激情视频va一区二区三区| 午夜亚洲福利在线播放| 亚洲成人手机| 老汉色av国产亚洲站长工具| 高清在线国产一区| 精品一区二区三卡| 欧美丝袜亚洲另类 | 九色亚洲精品在线播放| 叶爱在线成人免费视频播放| 精品国产乱子伦一区二区三区| 美女午夜性视频免费| 成年人黄色毛片网站| 夜夜夜夜夜久久久久| 亚洲欧美精品综合一区二区三区| 久久人妻福利社区极品人妻图片| 欧美一级毛片孕妇| 一区二区三区激情视频| 女性生殖器流出的白浆| 天天操日日干夜夜撸| 久久精品成人免费网站| 欧美国产精品一级二级三级| 亚洲精品在线美女| 人人妻人人澡人人爽人人夜夜| 久久精品成人免费网站| 国产在线精品亚洲第一网站| 亚洲专区中文字幕在线| 在线观看一区二区三区激情| 国产一区有黄有色的免费视频| 亚洲人成电影观看| 夜夜躁狠狠躁天天躁| 国产日韩欧美亚洲二区| 最近最新中文字幕大全免费视频| 黄色a级毛片大全视频| 亚洲 国产 在线| 免费观看人在逋| 欧美另类亚洲清纯唯美| 久久香蕉精品热| 老汉色av国产亚洲站长工具| 免费在线观看亚洲国产| 欧美 亚洲 国产 日韩一| 国产淫语在线视频| 在线观看午夜福利视频| 国产99久久九九免费精品| 国产精品影院久久| 国产成人精品久久二区二区91| 制服人妻中文乱码| 国产成人欧美| 国产一区二区三区在线臀色熟女 | 麻豆国产av国片精品| 一本大道久久a久久精品| 深夜精品福利| e午夜精品久久久久久久| 国产精品免费视频内射| 女性生殖器流出的白浆| 大码成人一级视频| 757午夜福利合集在线观看| 午夜福利一区二区在线看| 操出白浆在线播放| 亚洲自偷自拍图片 自拍| 人妻 亚洲 视频| 国产精品成人在线| 色综合婷婷激情| 国产真人三级小视频在线观看| 国产成人影院久久av| 丁香六月欧美| 亚洲国产精品sss在线观看 | 成人亚洲精品一区在线观看| 在线av久久热| 国产亚洲av高清不卡| 在线天堂中文资源库| 99久久精品国产亚洲精品| 成年版毛片免费区| 亚洲av成人av| 成人国语在线视频| 亚洲中文字幕日韩| 国产精品自产拍在线观看55亚洲 | 亚洲国产毛片av蜜桃av| 这个男人来自地球电影免费观看| 色综合婷婷激情| 国产日韩欧美亚洲二区| tocl精华| 一本大道久久a久久精品| 亚洲成人国产一区在线观看| 一进一出抽搐动态| 黑人操中国人逼视频| 日韩欧美一区二区三区在线观看 | 99国产精品99久久久久| 欧美精品高潮呻吟av久久| 国产成人精品无人区| 国产高清国产精品国产三级| 国产在线一区二区三区精| av网站免费在线观看视频| 最近最新中文字幕大全电影3 | 日韩制服丝袜自拍偷拍| 亚洲欧美一区二区三区黑人| 丰满迷人的少妇在线观看| 欧美+亚洲+日韩+国产| 日本a在线网址| 91大片在线观看| 老熟妇仑乱视频hdxx| 欧美日韩亚洲综合一区二区三区_| e午夜精品久久久久久久| 亚洲熟女毛片儿| 黑丝袜美女国产一区| 最近最新中文字幕大全电影3 | 日本一区二区免费在线视频| 伊人久久大香线蕉亚洲五| 中文字幕人妻熟女乱码| 身体一侧抽搐| 波多野结衣一区麻豆| 一区二区三区激情视频| 如日韩欧美国产精品一区二区三区| 精品少妇一区二区三区视频日本电影| 99riav亚洲国产免费| 一级黄色大片毛片| 高清毛片免费观看视频网站 | 欧美日韩亚洲高清精品| 亚洲av欧美aⅴ国产| 欧美激情久久久久久爽电影 | 国产成人精品在线电影| 亚洲成人手机| 国内毛片毛片毛片毛片毛片| 免费在线观看视频国产中文字幕亚洲| 亚洲国产精品一区二区三区在线| 美女国产高潮福利片在线看| 亚洲国产欧美一区二区综合| 麻豆乱淫一区二区| tocl精华| 好男人电影高清在线观看| 一进一出抽搐动态| 亚洲少妇的诱惑av| 亚洲一区高清亚洲精品| 色在线成人网| 亚洲成国产人片在线观看| 久久国产乱子伦精品免费另类| 在线av久久热| 精品国产一区二区三区四区第35| 法律面前人人平等表现在哪些方面| avwww免费| 法律面前人人平等表现在哪些方面| 亚洲国产看品久久| av一本久久久久| 午夜福利一区二区在线看| 在线播放国产精品三级| 日韩欧美一区二区三区在线观看 | 午夜福利欧美成人| www.熟女人妻精品国产| 一进一出好大好爽视频| 国产成人av激情在线播放| 日本精品一区二区三区蜜桃| av国产精品久久久久影院| 天堂√8在线中文| 精品少妇久久久久久888优播| 天堂√8在线中文| 啦啦啦视频在线资源免费观看| 成人免费观看视频高清| 一级毛片高清免费大全| 欧美激情高清一区二区三区| 免费日韩欧美在线观看| 日韩人妻精品一区2区三区| 欧美日韩av久久| 1024视频免费在线观看| 亚洲精品在线美女| 国产一区二区三区在线臀色熟女 | 婷婷精品国产亚洲av在线 | 色在线成人网| 欧美日韩亚洲国产一区二区在线观看 | 人妻 亚洲 视频| 男女高潮啪啪啪动态图| 高清视频免费观看一区二区| 亚洲色图综合在线观看| 极品教师在线免费播放| 又黄又爽又免费观看的视频| 久久久久国内视频| 女人被躁到高潮嗷嗷叫费观| 99久久精品国产亚洲精品| tube8黄色片| 国产亚洲欧美精品永久| 一区二区日韩欧美中文字幕| 国产在线精品亚洲第一网站| 国产精品.久久久| 看黄色毛片网站| 日韩欧美免费精品| 97人妻天天添夜夜摸| a级毛片在线看网站| av免费在线观看网站| 欧美亚洲 丝袜 人妻 在线| 国产视频一区二区在线看| 亚洲五月婷婷丁香| 老汉色∧v一级毛片| 99精品久久久久人妻精品| 好男人电影高清在线观看| 国产亚洲欧美98| 久久国产乱子伦精品免费另类| 成年女人毛片免费观看观看9 | 日本撒尿小便嘘嘘汇集6| 亚洲美女黄片视频| 欧美一级毛片孕妇| 国产91精品成人一区二区三区| 高潮久久久久久久久久久不卡| 国产欧美亚洲国产| 看黄色毛片网站| 免费女性裸体啪啪无遮挡网站| 9热在线视频观看99| 午夜福利在线观看吧| 久久久久久免费高清国产稀缺| 如日韩欧美国产精品一区二区三区| 大码成人一级视频| 日本五十路高清| 久久久久视频综合| 欧美午夜高清在线| 亚洲精品av麻豆狂野| 国产成人精品在线电影| 精品少妇久久久久久888优播| 国产免费av片在线观看野外av| 亚洲成国产人片在线观看| 精品一区二区三区视频在线观看免费 | 欧美日韩av久久| 一边摸一边抽搐一进一小说 | 在线av久久热| av欧美777| 搡老乐熟女国产| 黄色视频不卡| 热99国产精品久久久久久7| 国产成人精品久久二区二区91| 在线观看免费视频日本深夜| 一级作爱视频免费观看| 久久国产乱子伦精品免费另类| 日韩欧美在线二视频 | 王馨瑶露胸无遮挡在线观看| 大型av网站在线播放| 午夜两性在线视频| 久久香蕉激情| 国产一区有黄有色的免费视频| 中出人妻视频一区二区| 黄片小视频在线播放| 亚洲色图综合在线观看| 日本a在线网址| 曰老女人黄片| 国产色视频综合| av线在线观看网站| av网站在线播放免费| 热99久久久久精品小说推荐| 日日夜夜操网爽| 中文字幕人妻丝袜制服| 国产亚洲av高清不卡| 免费在线观看黄色视频的| 日韩成人在线观看一区二区三区| svipshipincom国产片| 一二三四社区在线视频社区8| 99国产精品99久久久久| 人成视频在线观看免费观看| 国产精品亚洲一级av第二区| 一区二区三区精品91| 999久久久国产精品视频| 精品久久蜜臀av无| 国产精品免费一区二区三区在线 | 久久久久精品人妻al黑| av电影中文网址| 中国美女看黄片| 亚洲专区中文字幕在线| 美女扒开内裤让男人捅视频| 捣出白浆h1v1| 国产免费男女视频| a在线观看视频网站| 黑人巨大精品欧美一区二区蜜桃| 亚洲国产中文字幕在线视频| 亚洲精品粉嫩美女一区| 久久精品亚洲熟妇少妇任你| 如日韩欧美国产精品一区二区三区| av线在线观看网站| 国产精品永久免费网站| 欧美日本中文国产一区发布| 欧美性长视频在线观看| 亚洲熟女精品中文字幕| 搡老岳熟女国产| 人人澡人人妻人| 天天添夜夜摸| 一边摸一边做爽爽视频免费| 日本撒尿小便嘘嘘汇集6| 国产免费av片在线观看野外av| 国产1区2区3区精品| 亚洲aⅴ乱码一区二区在线播放 | 久久精品人人爽人人爽视色| 九色亚洲精品在线播放| 99久久国产精品久久久| 久久精品国产亚洲av香蕉五月 | 男女下面插进去视频免费观看| 日韩中文字幕欧美一区二区| x7x7x7水蜜桃| 欧美黑人精品巨大| 中文字幕av电影在线播放| 久久久久久久精品吃奶| 国产欧美日韩一区二区三区在线| 亚洲avbb在线观看| 五月开心婷婷网| 手机成人av网站| 久99久视频精品免费| avwww免费| 黄色毛片三级朝国网站| 国产精品 国内视频| 自线自在国产av| 欧美国产精品一级二级三级| 国产成人精品在线电影| 女同久久另类99精品国产91| 99热网站在线观看| 99热只有精品国产| 91九色精品人成在线观看| 亚洲人成电影观看| 无遮挡黄片免费观看| 黄片播放在线免费| 狠狠婷婷综合久久久久久88av| 999久久久精品免费观看国产| 可以免费在线观看a视频的电影网站| 男女床上黄色一级片免费看| 国产精品久久久久成人av| 欧美精品一区二区免费开放| 日本欧美视频一区| 啦啦啦视频在线资源免费观看| 高清黄色对白视频在线免费看| 美女视频免费永久观看网站| 婷婷丁香在线五月| 久久香蕉国产精品| 在线观看66精品国产| aaaaa片日本免费| 在线免费观看的www视频| 老司机深夜福利视频在线观看| tocl精华| 精品一品国产午夜福利视频| 国产成人免费无遮挡视频| 最近最新免费中文字幕在线| 女人高潮潮喷娇喘18禁视频| 国产精品一区二区免费欧美| 久久99一区二区三区| 国产99白浆流出| 一级片'在线观看视频| 黄色视频不卡| 少妇 在线观看| 无人区码免费观看不卡| 亚洲成人国产一区在线观看| 老司机深夜福利视频在线观看| 久9热在线精品视频| 亚洲精品久久成人aⅴ小说| 色播在线永久视频| 久久精品亚洲av国产电影网| 国产真人三级小视频在线观看| 久久国产亚洲av麻豆专区| 亚洲av欧美aⅴ国产| 亚洲精品在线观看二区| 欧美大码av| 少妇裸体淫交视频免费看高清 | 一区福利在线观看| 亚洲av成人一区二区三| 青草久久国产| 一a级毛片在线观看| 在线国产一区二区在线| a在线观看视频网站| 天天影视国产精品| 成人精品一区二区免费| 一区二区三区精品91| 99re在线观看精品视频| 午夜日韩欧美国产| 欧美精品一区二区免费开放| av欧美777| 天天躁日日躁夜夜躁夜夜| 欧美色视频一区免费| 久久精品国产亚洲av香蕉五月 | 桃红色精品国产亚洲av| 国产男靠女视频免费网站| 精品国产乱子伦一区二区三区| 国产精品 国内视频| 天天影视国产精品| 啦啦啦视频在线资源免费观看| 国产成人影院久久av| 国产真人三级小视频在线观看| 在线国产一区二区在线| tocl精华| 他把我摸到了高潮在线观看| 热99国产精品久久久久久7| 美女 人体艺术 gogo| 亚洲成av片中文字幕在线观看| 精品福利观看| 18禁裸乳无遮挡动漫免费视频|