• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Exponential sine chaotification model for enhancing chaos and its hardware implementation

    2022-08-31 09:56:28RuiWang王蕊MengYangLi李孟洋andHaiJunLuo羅海軍
    Chinese Physics B 2022年8期
    關(guān)鍵詞:海軍

    Rui Wang(王蕊) Meng-Yang Li(李孟洋) and Hai-Jun Luo(羅海軍)

    1College of Physics and Electronic Engineering,Chongqing Normal University,Chongqing 401331,China

    2National Center for Applied Mathematics in Chongqing,Chongqing 401331,China

    3The University of Chicago,Chicago 60637,United States of America

    Keywords: chaotic system,nonlinear system,image encryption,hardware implementation

    1. Introduction

    In 1963, Lorenz introduced the deterministic aperiodic flow model and the butterfly effect.[1]From then on, people have come to be aware of the field of chaos. Chaos theory,subsequently developed as a subfield of nonlinear science,[2]studies the behaviors of dynamical systems that have definite but unpredictable motions. The behavior of chaotic systems is determined by their initial states,yet it is impossible to predict long-term actions as they are sensitive to the slightest change in the initial states.[3]Those characteristics,such as initial state sensitivity,unpredictability,fractal dimension,and ergodicity,push chaotic systems to be widely studied and applied in many scenarios,such as personal information security,[4]communication systems,[5]and power systems.[6]

    Presently, many chaotic systems have been developed for various applications, such as chaotic synchronization,[7,8]chaotic secure communication,[9]chaotic cryptography,[10,11]and chaotic neural networks.[12,13]Among them, chaotic secure communication and chaotic encryption[14,15]are among the hottest topics in the research of international electronic communications. For example,chaotic encryption utilizes the sequence generated by a chaotic system as keys for the encryption algorithm to run on. As chaotic systems are almost impossible to be predicted unless the exact system with the initial states is known, such an encryption method is very secure. However,existing chaotic systems are far from perfect.Firstly, with the help of computer technology, identifying the chaos becomes easier. Therefore,the current chaotic systems with their low complexity are easy to be cracked by discerning their initial states[16]or estimating their chaotic orbits.[17]Secondly, chaos degradation may occur when chaotic behaviors are simulated in finite precision. Some extremely approached states may overlap and appear to be precision truncated,[18]which causes the chaotic behaviors that originally had infinite states to degrade to inevitable periodic behaviors. Thirdly,existing chaotic maps show chaotic behaviors only in limited regions. Some perturbation on the input could lead to an unexpected chaotic result being replaced by a regular output. This perturbation could destroy the chaos and mean it is unable to play the role of encryption. These potential hazards harm the application of chaos,especially in the encryption area. Therefore, acquiring robust chaos with better chaotic performance can facilitate deeper research in the field of chaos and speed up the practical application of chaos.[19]

    Much effort has been made to resolve the above problems and increase the complexity of existing chaotic systems.[20–25]For example, in Ref. [20], Liuet al.proposed a new coupled electro-optic chaotic system to conceal the time delay and enhance the complexity of chaos. They mixed the electrical signals by using nonlinear coupling functions. Luoet al.[21]introduced a novel image encryption algorithm based on double chaotic systems, which solved the limitation and vulnerability of a single chaotic map. In Ref. [22], Huanget al.took advantage of electrical mutual injection to improve the complexity and the security of chaotic communication systems. They used nonlinear transmission functions to conceal the time delay effect. Huaet al.in Ref. [23] proposed a chaotic model to enhance chaos and obtained robust results.They found a new model, a sine chaotification model, which can enhance the complexity of the current chaotic maps. They also used two maps to reach the required complexity for encryption safety.[24]In Ref.[25],Liu and Zhang improved plain text-related image encryption by constructing a special image,which can resist the existing chosen plaintext attack.

    This paper introduces an exponential sine chaotificaton model(ESCM)to boost the complexity of the existing chaotic systems. Applying double nonlinear transformations to existing chaotic systems not only enhances their complexity but also achieves a larger chaotic range than before. The main achievements and novelties of this paper are as follows:(1)We introduced ESCM as a universal framework to enhance the chaos complexity. (2)The complexity of the ESCM was theoretically analyzed using the Lyapunov exponent(LE).(3)To exhibit the usability of ESCM, we applied ESCM to multidimensional (MD) chaotic maps, including the 1D logistic map, 2D H′enon map, and 3D Lorenz map. (4) We tested the chaos performance of the enhanced chaotic maps using theLEand the bifurcation diagram. We also compared the enhanced chaos performance with their seed maps. (5) To demonstrate the practicability and simplicity of ESCM in a hardware environment, we constructed and tested the circuits of the enhanced chaotic maps in a digital signal processor(DSP).(7)We applied ESCM to image encryption and investigated its effectiveness.

    The remainder of this paper is organized as follows. Section 2 presents the proposed ESCM and analyzes its chaos complexity theoretically. Section 3 applies ESCM to a logistic map,H′enon map,and Lorenz map. We also discussed the chaotic dynamics of these chaotic maps. Section 4 validates its hardware availability using the DSP. In Section 5, we applied the enhanced Lorenz chaotic map to implement image encryption and analyzed the encryption effect. Finally, Section 6 concludes this paper.

    2. Exp-sine chaotification model

    This section proposes ESCM and analyses its chaos complexity.

    2.1. Concept of ESCM

    The proposed ESCM is designed to enhance the complexity of existing chaos. Using double nonlinear transformations and applying them to the chaotic maps, ESCM can significantly enhance the chaos complexity. The structure’s plot is shown in Fig.1.

    Fig.1. Structure of the ESCM.

    HereF(a,xi) is an existing chaotic map called a seed map, whereais a control parameter, andxiis the input. The output esin(πF(a,xi))is used as the input for the next iteration.

    We can use a mathematical equation to describe ESCM as

    whereais a control parameter.

    The exponent function,as well as the sine function,have complex nonlinear properties. Double nonlinear transformations enhance the complexity of existing chaos. The effect of ESCM in improving chaotic performance can be theoretically validated by using theLEas a standard. In this paper, we used ESCM as a chaotification model to improve the performance of chaos. The properties of ESCM are as follows. (1)It is an effective model that can enhance chaotic performance.(2) Compared with the seed map, the enhanced map owns chaotic behaviors in quite a large parameter range. (3)The enhanced map overcomes the drawbacks of seed maps entering periodic motion occasionally. (4)This model is applicable to both discrete and continuous chaotic systems. (5)Users have freewill to choose any dimension map to work as the seed map.

    These properties will be verified in the following parts.

    2.2. Chaos complexity analysis

    Due to the singularity and complexity of the chaos system, there is no unified definition of chaos. To quantitatively characterize the sensitivity of the chaotic system to the initial value, theLEcan work as a standard. TheLEis one of the most widely used criteria accepted by researchers. TheLE[26]refers to the average rate of exponential separation or convergence of two trajectories close to each other in phase space over time. IfLE>0, we can consider that it enters chaos states.

    To calculate theLEof ESCM,we supposex0is the initial value of the chaotic systemF(a,xi) in Eq. (1), and we havey0=x0+εwhich differs withx0by an infinitesimal positiveε.After one iteration by Eq.(1),the difference betweenx1andy1can be calculated as

    From the above,the existing chaotic map through ESCM could have largerLEthan before,which means they have better chaotic performance in more extensive parameter ranges.Even with seed maps that do not have chaotic behaviors, the enhanced map may also show chaotic traits through the transformation of the ESCM.This proves that the proposed ESCM can enhance the chaos performance in a more extensive range.

    3. Typical examples of an enhanced chaotic map

    To verify the performance of ESCM,we shall apply it to three example maps with different dimensions. They are a 1D logistic map,a 2D H′enon map,and 3D Lorenz map. We will also analyze the chaotic dynamics of the enhanced map.

    The logistic map[27]is derived from a demographic dynamics system designed to stimulate people’s growth, and it is one of the most widely used nonlinear dynamical discrete chaotic mapping systems. It seems too simple and deterministic but has complicated dynamical behaviors.Its mathematical mapping equation can be defined as

    3.1. Enhanced logistic map

    Definition When applying ESCM to a logistic map, it means theF(a,xi) in Eq. (1) is replaced by a logistic map in Eq. (10). Its new mathematical mapping equation can be defined as

    Bifurcation diagram The bifurcation phenomenon is a significant characteristic of nonlinear systems. Bifurcation refers to the phenomenon that a slight change in the vicinity of a parameter causes a sudden change in the phase space orbital topological structure. A bifurcation diagram is a direct description of the chaotic state of the system.[29]

    Figure 2 describes the bifurcation diagram of previous maps and their enhanced maps. Figure 2(a) plots the bifurcation diagram of the logistic map when its control parameterμ ∈[0,4]. Here, 410 iterations were performed. In order to make the iteration sufficient,the initial 400 times were discarded. As shown in Fig. 2(a), it is apparent that the logistic map is in the period-doubling bifurcation state whenμ ∈[0,3.6]and enters chaotic states whenμ ∈[3.6,4]. Even within the range of[3.6,4],there are still some periodic areas.With a slight disturbance, it will enter the periodic motions.Its outputs are limited in[0,1],while figure 2(d)represents the bifurcation diagram of the logistic map through ESCM when its control parameter ?μ ∈[0,1000]. It is clear that the logistic map through ESCM has outputs within the range[0.4,2.8],and these outputs distribute in the whole data range. In other words, the enhanced logistic map obtains superior complex dynamic behavior in a much larger range compared to its seed map,which has weak chaos in small parameter ranges.

    Lyapunov exponentLErefers to the average exponential separation or convergence of two orbitals close to each other in phase space over time.[26]It can represent the initial sensitivity when the dynamic system evolves. For nonlinear systems,if theLEis negative,the dynamical system is stable and shrinks in phase space, while positiveLErepresents the phase volume of the system that expands and folds continuously in one direction,in other words,the system is chaotic.

    Figure 3 depicts theLEof improved chaos and their seed maps. For comparison convenience, we have normalized the process. As shown in Fig.3(a),the enhanced logistic map enters a chaos state earlier than before. The previous map enters chaos when its control parameter is over 3.6,yet the enhanced chaos enters chaos from the start. TheLEof the enhanced logistic map increases as the control parameter increases. That also means the complexity of the enhanced seed map also increases. As depicted in Fig.3(a),although the control parameter is over 3.6, itsLEof the logistic map may also be less than 0 occasionally. In contrast,theLEof the enhanced logistic map is always positive,which indicates that it has complex dynamical behavior.It is clear that through ESCM,the logistic map obtains dynamic behavior in wider ranges.

    Fig.2. The first row depicts the bifurcation diagrams for the(a)logistic,(b)H′enon and(c)Lorenz maps,and the second row plots the bifurcation diagrams for their enhanced maps.

    Fig.3. The LEs of the(a)logistic and enhanced logistic map,(b)H′enon and enhanced H′enon map,and(c)Lorenz map and improved Lorenz map.

    3.2. Enhanced H′enon map

    Definition When applying ESCM to the H′enon map, it means theF(a,xi) in Eq. (1) is replaced by the H′enon map in Eq. (11). Its new mathematical mapping equation can be defined as

    Bifurcation diagram Figure 2(b)shows the bifurcation diagrams of the H′enon map. Since the 2D H′enon map has two control parameters, to obtain a straightforward comparison effect,we only plot the bifurcation diagrams of the H′enon chaotic maps when the control parameterβis fixed at 0.4 and selectαas the main control parameter within[0,1.25]. Here,200 iterations were performed. To make the iteration sufficient,the initial 50 times were discarded. Whenα ∈[1,1.25],the dynamical systems show complicated behavior. The outputs of the H′enon map are confined in the range of[0,2]. Figure 2(e)shows its enhanced bifurcation diagrams. Their initial state values are all set as(0,0). Also,200 iterations were performed, and the initial 190 times were discarded at the same time to ensure the result was satisfying. One can see that the trajectory of the enhanced H′enon map is distributed in all data ranges. At the same time, its outputs occasionally spread all over in the range of[0.4,2.7].

    Lyapunov exponent For the sake of presentation, here we set the control parameterβ=0.3. As shown in Fig.3(b),the H′enon map enters chaos whenα>1.07. It is clear that the H′enon chaotic maps enter the chaotic state only in a small range,which could impair the effect of encryption. Therefore,the original seed map is not robust. Through ESCM,it enters chaos from the start and has more significant complexity than its seed map. Along with the increase of the control parameter,theLEof the enhanced H′enon map becomes larger. That means the complexity of the enhanced H′enon map becomes larger as the control parameter increases.

    3.3. Enhanced Lorenz map

    Definition When applying ESCM to the Lorenz map,theF(a,xi)in Eq.(1)is replaced by the Lorenz map in Eq.(12).

    Bifurcation diagram The Lorenz map is a 3D chaotic map with three control parameters. Both initial values are set as(1,1,1). Figure 2(c)shows the bifurcation diagrams of the Lorenz map. We fixed two control parameters,ωandψ, to directly compare and observe their motion trials. As depicted in Fig. 2(c), it is obvious that the chaotic performance of the Lorenz map is frail with the control parameterσincreasing.It only presents complex dynamic behaviours in small parameter ranges. The outputs of the Lorenz map are restricted at[0,20]. Figure 2(f)shows the enhanced Lorenz map’s bifurcation diagrams.Exhibited in the image,it is almost all in chaos.When the parameter is within [0,1000], its outputs spread in[3,63]irregularly. Thus,the proposed ESCM can significantly enhance the chaos of the Lorenz map. The enhanced Lorenz map shows robust and complex dynamical behavior.

    Lyapunov exponent As depicted in Fig.3(c),only small parts of this system are in chaos. When the control parameter is within[5,18],theLEof the Lorenz map is positive,and the system is in chaos. In other regions, theLEjumps and changes randomly, which harms the practical application of chaos. When we compared the enhanced Lorenz map with its seed map,it is obvious that the performance improved significantly, and at the same time, it is all in chaos states. From Fig. 3(c), no matter how the control parameters change, theLEof the enhanced Lorenz map is always positive and obtains high values. That means ESCM improves the complexity of the seed map efficiently.

    4. Hardware implementation

    4.1. Hardware structure setting

    We selected the enhanced logistic, H′enon, and Lorenz maps to verify hardware operability.

    Design of DSP In some particular application scenarios,the chaotic system must be implemented in digital platforms.The DSP is a new hardware environment to simulate a chaotic system. For example, figure 4 plots the structure diagram of the hardware implementation of the improved H′enon map.There are three main components: the chaotic function generator,the counter,and feedback. The chaotic equation through the ESCM would receive the control signals and initial current valuex0,y0. Iterations are calculated by the counter and are implemented with feedback. Here,the function is the original chaotic equation through ESCM.Then,we put the result to the PWM output port of the DSP and then change the duty cycle of the PWM. Through the filter, which works as a digital-toanalog converter, we can get an analog output and input the value to the display device.

    Fig. 4. Structure diagram of a hardware implementation of the improved H′enon map.

    Implementation results Here, we present the implemented results of the enhanced logistic, H′enon, and Lorenz map. Figure 5 shows the DSP implementation environment. Figure 6 depicts the DSP implementation result shown in the oscilloscope. The logistic map initial state was set as (x0,?μ) = (0.1,10). The initial state of the H′enon map was set in (x0,y0,?α,?β) = (0.5,0.5,1.07,0.3). Here we set the initial state of the Lorenz map at (x0,y0,z0,?σ,?ω,?ψ) =(0.5,0.5,0.5,10,28,8/3). With observation by the oscilloscope,the three enhanced chaotic maps can generate complex random sequences. So, we can conclude that this enhanced model is suitable for practical application.

    Fig.5. Hardware prototype developed in DSP implementation.

    Fig.6. DSP simulation results for the three enhanced chaotic maps in the oscilloscope. (a)The enhanced logistic,(b)the enhanced H′enon,(c)the enhanced Lorenz maps.

    5. Application of ESCM in image encryption

    Currently, chaotic sequence encryption has been listed as an important research frontier of modern cryptography.Chaotic encryption is also referred to as digital sequence encryption. The chaos system can provide randomness, correlation, and a complex pseudorandom sequence. The signal is produced through a chaos map, and thus is nearly impossible for hackers to decode without knowing the initial key value.To satisfy the need for privacy protection, the chaotic image encryption technique has been studied intensively.[30,31]Since chaotic systems have been demonstrated to have a profound impact on encryption technology,we applied ESCM to image encryption.To highlight the effect of ESCM,we compared the effect of the enhanced map with its seed map.

    5.1. Proposed image encryption

    Here, we applied ESCM to the Lorenz map. We made use of the sequence generated by an enhanced chaotic system to implement image encryption.Unlike traditional encryption,chaotic encryption is dynamic encryption, and it has properties such as concealment, unpredictability, and resistance to exhaustion.

    5.2. Encryption process

    This paper uses the enhanced Lorenz system,permutation-based on Arnold transformation, and twice finite field diffusion to realize the image encryption scheme.The encryption process is described as follows.

    Step 2: Encryption of the graph

    With the generated permutation sequenceAandB, we will now swap the pixels in the graph according to the position given byAandB. We exchange the pixel’s position (1,i)of the original picture to its new position(p,q)by performing Arnold transformation. When consideringqmerely, the exchange between pixel points (1,i) and (1,q) can be constructed. At the same time,ABis regarded as a new random number and is still marked asA, thenqbecomesq=B+Ai.The performance of the permutation is simulated as in Fig.7.

    Next,usingS1 andS2,we can forward diffuse and reverse diffuse every pixel using the XOR operation. Notice that for a colour graph,every channel(RGB)needs to go through encryption. The process of diffusion is shown in Fig.8.

    The original graph is now safe as encrypted into a “random”graph.

    Step 3: Decrypt the graph

    To decipher the encrypted graph,we need to run the steps backward i.e.,re-run the XOR operation usingS2 andS1,and then swap the pixels usingBandA.Thus,we achieve the plain text graph as desired.

    Fig.7. The first step in encryption–confusion. (a)The raw information of plain images. (b)The information through the confusion process.

    Fig. 8. The diffusion process. (a) The information through the confusing process. (b)The information diffused through random sequence S1. It is a forward diffusion. (c) The information diffused through random sequence S2. It is a counter diffusion.

    5.3. Simulation results

    Fig. 9. Panel (a) presents color diagrams, gray diagrams, and binary diagrams. Panel (b) depicts the histogram of the original images. Panel (c)depicts the encrypted pictures through the enhanced map. Panel (d) describes the histogram of the encrypted images. Panel (e) describes the decrypted images.

    The image histogram reflects the statistical characteristics of image pixel distribution. We used drawing software to display the picture’s histogram. A practical and convenient image encryption algorithm should be capable of encrypting different types of pictures in order to fit different security requirements. As shown in Fig.9,three different types of images are encrypted. Figure 9(a) represents two color images, two grayscale images, and two binary images.Figure 9(b) simulates their corresponding image histograms.By observing their histograms,an important amount of information can be deduced about the pictures. Through ESCM,the original images in Fig.9(a)become the encrypted images in Fig. 9(c). We found that images through chaotic encryption have a higher complexity. Figure 9(d) describes the histograms of the encrypted images. This encryption hides the original image’s statistical properties splendidly and can defend a statistical attack based on image pixel values. The obvious statistical features of the original image have been hidden,replaced by the average distribution of the encrypted histogram. It is hard to find any regularity from this histogram.Through the correct key, it is easy to retrieve the information just as in Fig. 9(e). To compare the effect of encryption after the ESCM,here we encrypted the gray images through the Lorenz map as shown in Fig. 10. It is obvious that the encryption could not hide the statistical features of the original images perfectly. From Fig.10(c),it is not hard to vaguely see the general shape of the original picture. At the same time,the histograms of the encrypted images are not flat compared with Fig. 9(d), which means this encryption effect is worse than before. Figure 11 presents 3D visualization of the plain and cipher image. The first row depicts all pixels in the red,green,and blue color planes in the plain image. Each different color component has its distribution regularities. By contrast, the encrypted images hide the distribution rule of the pixels,so all pixels in the red, green, and blue color planes are distributed uniformly in the encrypted images. In other words,the ESCM can encrypt original images as cipher images with high performance. Compared to traditional encryption, chaotic encryption has higher complexity and hides the features of the original image perfectly. This encryption scheme contributes to chaotic secure communication and chaotic encryption, which is currently being widely researched.

    Fig. 10. Panel (a) presents the gray diagrams. Panel (b) depicts the histogram of the original images. Panel (c) depicts the encrypted pictures through the Lorenz map. Panel(d)describes the histogram of the encrypted images. Panel(e)describes the decrypted images.

    Fig. 11. Panel (a) presents original and encrypted images. Panel (b) depicts the red color plane of the images. Panel (c) depicts the green color plane of the images. Panel(d)depicts the blue color plane of the images.

    6. Conclusion

    This paper proposed an ESCM to enhance the complexity of existing chaotic maps. The ESCM uses a double nonlinear chaotic transform, including an exponential and a sine function,to enhance chaos complexity. The dynamical behavior of ESCM is verified using the principle of theLE.The resulting enhanced map of the ESCM has better chaos complexity and a much larger chaotic range than an original chaotic map. We applied it to three different dimensional chaotic maps,namely the logistic map,H′enon map,and Lorenz map,and discussed their dynamic behavior. The results confirmed that the enhanced chaos has better performance than their seed map. We used DSP to implement chaos circuits,demonstrating the simplicity of the ESCM in hardware devices. Lastly, to exhibit the practical application of an enhanced chaos map, we applied it to image encryption. The results show that chaotic image encryption hides the information of the original image effectively.

    Acknowledgments

    Project supported by the National Natural Science Foundation of China (Grant No. 51507023), Chongqing Municipal Natural Science Foundation (Grant No. cstc2020jcyjmsxmX0726),and the Science and Technology Research Program of Chongqing Municipal Education Commission(Grant No.KJZD-K202100506).

    猜你喜歡
    海軍
    曉褐蜻
    綠色天府(2022年6期)2022-07-14 11:59:42
    Time evolution law of a two-mode squeezed light field passing through twin diffusion channels
    我的海軍之夢(mèng)
    軍事文摘(2020年22期)2021-01-04 02:17:24
    相信愛
    海軍行動(dòng)
    封面人物·楊海軍
    新聞愛好者(2016年3期)2016-12-01 06:04:24
    海軍協(xié)議1
    New Approach to Calculate the Unavailability of Identical Spares in Cold Spare Configuration
    近代中國(guó)海軍的早期教育
    軍事歷史(1993年3期)1993-08-21 06:16:06
    清末海軍一次引人注目的軍艦出訪
    軍事歷史(1992年6期)1992-08-15 06:25:16
    狂野欧美激情性xxxx在线观看| 亚洲成人av在线免费| 久久精品国产亚洲av天美| 欧美3d第一页| 国产精品99久久99久久久不卡 | 赤兔流量卡办理| 新久久久久国产一级毛片| 成年免费大片在线观看| 一级黄片播放器| 亚洲欧美中文字幕日韩二区| 好男人在线观看高清免费视频| 亚洲高清免费不卡视频| 久久影院123| 国产男女内射视频| 亚洲av免费在线观看| 久久久久精品久久久久真实原创| 街头女战士在线观看网站| 成年女人看的毛片在线观看| 国产男女超爽视频在线观看| 人人妻人人爽人人添夜夜欢视频 | 毛片女人毛片| 久久99热这里只频精品6学生| 在线观看国产h片| av播播在线观看一区| 亚洲精品日韩在线中文字幕| 国产爱豆传媒在线观看| 亚洲精品亚洲一区二区| 日产精品乱码卡一卡2卡三| 国产 一区精品| 日本与韩国留学比较| 欧美精品人与动牲交sv欧美| 亚洲精品亚洲一区二区| 国产黄频视频在线观看| 深夜a级毛片| 亚洲美女视频黄频| 七月丁香在线播放| 国产男人的电影天堂91| 国产男女内射视频| 狂野欧美激情性xxxx在线观看| 黄色怎么调成土黄色| 成人无遮挡网站| 五月天丁香电影| 日本三级黄在线观看| av黄色大香蕉| 成人欧美大片| 欧美日本视频| 九草在线视频观看| 久久久久久久久久久免费av| 亚洲成色77777| 亚洲欧美日韩东京热| 大香蕉久久网| 黄色配什么色好看| 人人妻人人澡人人爽人人夜夜| 99久久九九国产精品国产免费| 三级男女做爰猛烈吃奶摸视频| 亚洲国产高清在线一区二区三| 国产午夜福利久久久久久| 精品熟女少妇av免费看| 日本-黄色视频高清免费观看| 日韩av在线免费看完整版不卡| 亚洲电影在线观看av| 午夜日本视频在线| 免费高清在线观看视频在线观看| 国产高潮美女av| 久久精品人妻少妇| 日产精品乱码卡一卡2卡三| 免费观看a级毛片全部| 久久99热这里只有精品18| 免费电影在线观看免费观看| 成人国产av品久久久| 亚洲国产最新在线播放| 一级二级三级毛片免费看| 少妇猛男粗大的猛烈进出视频 | 国产毛片在线视频| 久久久久国产网址| 老司机影院毛片| 国产有黄有色有爽视频| 成人毛片a级毛片在线播放| 国产精品久久久久久久电影| 99久久九九国产精品国产免费| 肉色欧美久久久久久久蜜桃 | 卡戴珊不雅视频在线播放| 欧美成人a在线观看| 午夜老司机福利剧场| 少妇 在线观看| 极品教师在线视频| 久久精品国产a三级三级三级| 中文字幕免费在线视频6| 中文字幕亚洲精品专区| 蜜桃久久精品国产亚洲av| 久久这里有精品视频免费| 熟女av电影| 久久久久久久久久久免费av| 麻豆久久精品国产亚洲av| 免费看a级黄色片| 日韩中字成人| 久久久久久久久大av| 五月玫瑰六月丁香| 麻豆国产97在线/欧美| 亚洲精品国产色婷婷电影| 黄色怎么调成土黄色| 大香蕉97超碰在线| 丝袜脚勾引网站| 免费在线观看成人毛片| 免费看日本二区| 观看免费一级毛片| 中国美白少妇内射xxxbb| 美女脱内裤让男人舔精品视频| 免费观看在线日韩| freevideosex欧美| 99热网站在线观看| 一级a做视频免费观看| 日本爱情动作片www.在线观看| 亚洲欧美清纯卡通| 久久99热6这里只有精品| videos熟女内射| a级一级毛片免费在线观看| 亚洲最大成人中文| 成人毛片a级毛片在线播放| 欧美精品人与动牲交sv欧美| 深夜a级毛片| 777米奇影视久久| 国产高清有码在线观看视频| 亚洲av免费高清在线观看| 少妇 在线观看| 亚洲av在线观看美女高潮| 国产亚洲av片在线观看秒播厂| 午夜精品一区二区三区免费看| 日韩成人伦理影院| 精品国产露脸久久av麻豆| 国产乱人视频| 搡女人真爽免费视频火全软件| 国产一区亚洲一区在线观看| 一边亲一边摸免费视频| 偷拍熟女少妇极品色| 亚洲,一卡二卡三卡| 简卡轻食公司| 免费观看性生交大片5| 国产亚洲最大av| 卡戴珊不雅视频在线播放| 亚洲av免费高清在线观看| 99热全是精品| 一级av片app| 国产综合懂色| 亚洲,欧美,日韩| 肉色欧美久久久久久久蜜桃 | 亚洲欧美中文字幕日韩二区| 少妇熟女欧美另类| 新久久久久国产一级毛片| 中文资源天堂在线| h日本视频在线播放| 日韩人妻高清精品专区| 亚洲成人中文字幕在线播放| 欧美精品国产亚洲| 久久97久久精品| 国产精品一区www在线观看| 美女视频免费永久观看网站| 国产大屁股一区二区在线视频| 少妇的逼水好多| 黄色一级大片看看| 国产高潮美女av| 亚洲伊人久久精品综合| 男女国产视频网站| 最后的刺客免费高清国语| 人妻系列 视频| 又爽又黄a免费视频| 少妇的逼水好多| 三级经典国产精品| 人妻夜夜爽99麻豆av| 久久国产乱子免费精品| 菩萨蛮人人尽说江南好唐韦庄| 一级毛片电影观看| 偷拍熟女少妇极品色| 国产精品嫩草影院av在线观看| 超碰97精品在线观看| 在线观看人妻少妇| 黄色配什么色好看| 麻豆久久精品国产亚洲av| 欧美bdsm另类| 欧美少妇被猛烈插入视频| 91久久精品国产一区二区成人| 午夜激情福利司机影院| 亚洲天堂国产精品一区在线| 尾随美女入室| .国产精品久久| 欧美日韩视频精品一区| 精品午夜福利在线看| 校园人妻丝袜中文字幕| 久久久久网色| 亚洲人成网站在线播| 中文资源天堂在线| 身体一侧抽搐| 国产伦精品一区二区三区视频9| 亚洲av免费在线观看| 一区二区三区四区激情视频| 午夜激情福利司机影院| 国产大屁股一区二区在线视频| 久久久欧美国产精品| 九九在线视频观看精品| 国产精品成人在线| 激情五月婷婷亚洲| 亚洲综合精品二区| 好男人在线观看高清免费视频| 午夜精品国产一区二区电影 | 日本-黄色视频高清免费观看| 少妇人妻 视频| 激情 狠狠 欧美| 五月天丁香电影| 国产亚洲av片在线观看秒播厂| 三级经典国产精品| 深夜a级毛片| 亚洲精品国产色婷婷电影| 日本一二三区视频观看| 美女视频免费永久观看网站| 午夜视频国产福利| 午夜福利在线观看免费完整高清在| 国产伦精品一区二区三区视频9| 精品少妇久久久久久888优播| 免费黄色在线免费观看| 国产亚洲av片在线观看秒播厂| 天天一区二区日本电影三级| 欧美日韩精品成人综合77777| 久久ye,这里只有精品| 天堂俺去俺来也www色官网| 少妇的逼水好多| 午夜福利高清视频| 欧美精品国产亚洲| 久久国内精品自在自线图片| 精品一区二区三卡| 亚洲精品日韩在线中文字幕| 综合色丁香网| 中文字幕亚洲精品专区| 亚洲精品成人av观看孕妇| 中文字幕久久专区| 五月开心婷婷网| 日本与韩国留学比较| 噜噜噜噜噜久久久久久91| 简卡轻食公司| 别揉我奶头 嗯啊视频| 中文资源天堂在线| 亚洲精品久久久久久婷婷小说| xxx大片免费视频| 男插女下体视频免费在线播放| 熟妇人妻不卡中文字幕| 国产探花极品一区二区| 久久久久久九九精品二区国产| 亚洲自偷自拍三级| 欧美xxxx黑人xx丫x性爽| 成人二区视频| 人妻一区二区av| 成人黄色视频免费在线看| 久久人人爽av亚洲精品天堂 | 亚洲精品国产av成人精品| 在线亚洲精品国产二区图片欧美 | 美女被艹到高潮喷水动态| 成年版毛片免费区| 26uuu在线亚洲综合色| 一级片'在线观看视频| 97热精品久久久久久| 午夜精品国产一区二区电影 | 夜夜看夜夜爽夜夜摸| 久久久久精品久久久久真实原创| 观看美女的网站| 超碰97精品在线观看| 尾随美女入室| 国产黄频视频在线观看| 国产精品爽爽va在线观看网站| 久久久久网色| 成人午夜精彩视频在线观看| 中文天堂在线官网| 97在线视频观看| 熟女人妻精品中文字幕| av专区在线播放| 欧美精品一区二区大全| 97超视频在线观看视频| 国内精品宾馆在线| 国产色爽女视频免费观看| 一级毛片黄色毛片免费观看视频| 在线观看三级黄色| 一本一本综合久久| av专区在线播放| 天堂中文最新版在线下载 | 日韩成人av中文字幕在线观看| 婷婷色av中文字幕| 欧美激情国产日韩精品一区| 精华霜和精华液先用哪个| 丝袜美腿在线中文| 精品99又大又爽又粗少妇毛片| 一个人看视频在线观看www免费| 精华霜和精华液先用哪个| av国产精品久久久久影院| 女的被弄到高潮叫床怎么办| 国产欧美亚洲国产| 国产精品秋霞免费鲁丝片| 91精品伊人久久大香线蕉| 美女视频免费永久观看网站| 久久久久国产网址| 搡女人真爽免费视频火全软件| 精品少妇久久久久久888优播| 女的被弄到高潮叫床怎么办| 天天一区二区日本电影三级| 自拍偷自拍亚洲精品老妇| 日本爱情动作片www.在线观看| 成人二区视频| 久久鲁丝午夜福利片| 亚洲欧美成人综合另类久久久| 精品久久久久久久末码| 九九爱精品视频在线观看| 精品国产一区二区三区久久久樱花 | 777米奇影视久久| 亚洲va在线va天堂va国产| 黄色欧美视频在线观看| 91久久精品电影网| 亚洲av男天堂| 一级片'在线观看视频| 亚洲av福利一区| 3wmmmm亚洲av在线观看| 国产成人一区二区在线| 晚上一个人看的免费电影| 成人漫画全彩无遮挡| 午夜老司机福利剧场| 中文字幕人妻熟人妻熟丝袜美| 人体艺术视频欧美日本| 97超视频在线观看视频| 亚洲精品成人av观看孕妇| 亚洲国产精品999| 看非洲黑人一级黄片| 在现免费观看毛片| 赤兔流量卡办理| 日本色播在线视频| 一二三四中文在线观看免费高清| 久久久久久久国产电影| 十八禁网站网址无遮挡 | 亚洲国产成人一精品久久久| .国产精品久久| 国产精品三级大全| 啦啦啦啦在线视频资源| 精品酒店卫生间| 亚洲怡红院男人天堂| 国产亚洲精品久久久com| 国产淫语在线视频| 男人舔奶头视频| 久久久久久国产a免费观看| 天堂俺去俺来也www色官网| 国产精品一区二区三区四区免费观看| 精品国产露脸久久av麻豆| 我的女老师完整版在线观看| 国产人妻一区二区三区在| 亚洲欧美成人精品一区二区| 欧美亚洲 丝袜 人妻 在线| 久久综合国产亚洲精品| 国产人妻一区二区三区在| 在线播放无遮挡| 亚洲怡红院男人天堂| 在现免费观看毛片| 日韩国内少妇激情av| 亚洲国产精品专区欧美| 成年人午夜在线观看视频| 人妻制服诱惑在线中文字幕| 草草在线视频免费看| 一区二区三区免费毛片| 一级毛片aaaaaa免费看小| 亚洲av成人精品一二三区| 好男人在线观看高清免费视频| 国产伦理片在线播放av一区| 国产精品无大码| 好男人视频免费观看在线| 老女人水多毛片| 亚洲一区二区三区欧美精品 | 国产精品99久久久久久久久| 亚洲精品乱久久久久久| 日韩一区二区三区影片| 免费av不卡在线播放| 欧美国产精品一级二级三级 | 精品午夜福利在线看| 秋霞在线观看毛片| 免费观看av网站的网址| 国产高清国产精品国产三级 | 免费少妇av软件| 中文字幕av成人在线电影| 久久97久久精品| 男女无遮挡免费网站观看| 亚洲成人精品中文字幕电影| 精品午夜福利在线看| 大片免费播放器 马上看| 男女那种视频在线观看| 婷婷色麻豆天堂久久| 一个人观看的视频www高清免费观看| 国产成人a区在线观看| 可以在线观看毛片的网站| av在线观看视频网站免费| 好男人视频免费观看在线| kizo精华| 高清日韩中文字幕在线| 女人被狂操c到高潮| 两个人的视频大全免费| 超碰av人人做人人爽久久| 国产91av在线免费观看| 在线天堂最新版资源| 青春草亚洲视频在线观看| av在线app专区| 亚洲熟女精品中文字幕| 久久国内精品自在自线图片| 免费看光身美女| av又黄又爽大尺度在线免费看| 国产精品蜜桃在线观看| 国产精品一区二区性色av| 国产成人免费无遮挡视频| 久热这里只有精品99| 草草在线视频免费看| 美女高潮的动态| 亚洲av欧美aⅴ国产| 最后的刺客免费高清国语| 人人妻人人爽人人添夜夜欢视频 | 国产亚洲av嫩草精品影院| 亚洲在久久综合| 九色成人免费人妻av| 亚洲国产精品国产精品| 国产爱豆传媒在线观看| 国产成人a∨麻豆精品| 亚洲精华国产精华液的使用体验| 最近最新中文字幕免费大全7| 免费看av在线观看网站| 午夜福利网站1000一区二区三区| 国产成人免费无遮挡视频| 国产又色又爽无遮挡免| 免费不卡的大黄色大毛片视频在线观看| 久热久热在线精品观看| 亚洲精品乱码久久久久久按摩| 能在线免费看毛片的网站| 久久久久国产网址| 一级毛片电影观看| 国产色爽女视频免费观看| 91久久精品电影网| 国产免费一区二区三区四区乱码| 中国美白少妇内射xxxbb| 大码成人一级视频| 直男gayav资源| 亚洲欧美日韩无卡精品| 成年人午夜在线观看视频| 看十八女毛片水多多多| 听说在线观看完整版免费高清| 老女人水多毛片| 少妇人妻 视频| 国产精品伦人一区二区| 亚洲av欧美aⅴ国产| 18禁在线无遮挡免费观看视频| 日韩成人伦理影院| 九色成人免费人妻av| 中文字幕人妻熟人妻熟丝袜美| 日本午夜av视频| 亚洲精品成人av观看孕妇| 欧美三级亚洲精品| 男男h啪啪无遮挡| 国产精品99久久久久久久久| 男女那种视频在线观看| 亚洲在久久综合| 精品久久久久久久久av| 如何舔出高潮| 国内少妇人妻偷人精品xxx网站| av国产久精品久网站免费入址| 欧美人与善性xxx| 亚洲内射少妇av| 一个人看视频在线观看www免费| 大片电影免费在线观看免费| 久久精品国产鲁丝片午夜精品| 欧美日韩精品成人综合77777| 久久精品夜色国产| 91久久精品电影网| 美女cb高潮喷水在线观看| 国产精品一区二区在线观看99| 黄色怎么调成土黄色| 欧美日本视频| 国产一区二区亚洲精品在线观看| 中文在线观看免费www的网站| 久久精品久久久久久噜噜老黄| 青春草国产在线视频| 亚洲av欧美aⅴ国产| 一区二区三区免费毛片| 亚洲欧美日韩东京热| 青春草亚洲视频在线观看| 久久精品熟女亚洲av麻豆精品| 亚洲国产精品专区欧美| 婷婷色av中文字幕| 日韩av在线免费看完整版不卡| 久久国内精品自在自线图片| 国产白丝娇喘喷水9色精品| 一级毛片久久久久久久久女| 少妇的逼水好多| 亚洲精品色激情综合| 亚洲美女搞黄在线观看| 亚洲一区二区三区欧美精品 | 亚洲经典国产精华液单| 午夜免费鲁丝| 午夜免费观看性视频| 亚洲欧洲国产日韩| 欧美3d第一页| 日韩av不卡免费在线播放| 国产精品99久久99久久久不卡 | 欧美成人午夜免费资源| 亚洲熟女精品中文字幕| 亚洲国产精品成人久久小说| 欧美激情久久久久久爽电影| 国产综合精华液| 日韩在线高清观看一区二区三区| 高清av免费在线| 国产色婷婷99| 国产精品av视频在线免费观看| 亚洲久久久久久中文字幕| 亚洲精品日韩av片在线观看| 国产视频内射| 边亲边吃奶的免费视频| 亚洲精品日本国产第一区| 亚洲第一区二区三区不卡| 性色avwww在线观看| 色综合色国产| 午夜亚洲福利在线播放| 午夜免费男女啪啪视频观看| 欧美少妇被猛烈插入视频| 成年女人在线观看亚洲视频 | 精品一区二区三卡| 亚洲国产欧美在线一区| 在线观看人妻少妇| 久久久久久久久大av| 亚洲国产精品国产精品| 亚洲美女视频黄频| 亚洲国产成人一精品久久久| 免费观看a级毛片全部| 性色av一级| 国产精品成人在线| 免费看日本二区| 黄片wwwwww| 国产精品一二三区在线看| 日韩一本色道免费dvd| 亚洲精品日本国产第一区| 日本黄大片高清| 国产精品熟女久久久久浪| 欧美区成人在线视频| 丰满少妇做爰视频| 国产男女超爽视频在线观看| 欧美成人a在线观看| av天堂中文字幕网| 91精品伊人久久大香线蕉| 伦理电影大哥的女人| 日日摸夜夜添夜夜爱| 白带黄色成豆腐渣| 亚洲高清免费不卡视频| 欧美区成人在线视频| 毛片女人毛片| 麻豆久久精品国产亚洲av| 亚洲国产色片| 国产免费一级a男人的天堂| 男人和女人高潮做爰伦理| 在线看a的网站| 在现免费观看毛片| 永久免费av网站大全| 亚洲欧美中文字幕日韩二区| 久久久午夜欧美精品| 久久久久性生活片| 亚洲精品视频女| 51国产日韩欧美| 自拍偷自拍亚洲精品老妇| 超碰97精品在线观看| 亚洲精品,欧美精品| 热re99久久精品国产66热6| 成人黄色视频免费在线看| 久久精品久久久久久久性| 久久国产乱子免费精品| 中文字幕亚洲精品专区| 久久精品久久久久久噜噜老黄| 国产亚洲av片在线观看秒播厂| 国产成年人精品一区二区| 日韩电影二区| 久久影院123| 久久精品国产亚洲av涩爱| 免费观看性生交大片5| 国产白丝娇喘喷水9色精品| 欧美成人一区二区免费高清观看| 亚洲电影在线观看av| 久久久久网色| 久久热精品热| 国产精品国产三级国产专区5o| 少妇丰满av| 国产精品麻豆人妻色哟哟久久| 欧美另类一区| 人妻制服诱惑在线中文字幕| 欧美成人一区二区免费高清观看| 免费观看av网站的网址| 国产精品一区www在线观看| 国产精品国产三级专区第一集| 国产69精品久久久久777片| 国产一区二区在线观看日韩| 中文字幕免费在线视频6| 免费av毛片视频| 青春草视频在线免费观看| 国产综合精华液| 老司机影院毛片| 亚洲精品日本国产第一区| 只有这里有精品99| 中文字幕制服av| 亚洲精品色激情综合| 少妇的逼水好多| 亚洲色图综合在线观看| 人体艺术视频欧美日本| 黄色视频在线播放观看不卡| 国产精品成人在线| 97在线人人人人妻| 亚洲av福利一区| 在线播放无遮挡| 亚洲aⅴ乱码一区二区在线播放| 精品国产露脸久久av麻豆| 国产精品一区www在线观看| av播播在线观看一区| 亚洲av在线观看美女高潮| 九色成人免费人妻av|