• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    An image encryption algorithm based on spatiotemporal chaos and middle order traversal of a binary tree

    2022-11-21 09:34:34YiningSu蘇怡寧XingyuanWang王興元andShujuanLin林淑娟
    Chinese Physics B 2022年11期
    關鍵詞:興元

    Yining Su(蘇怡寧), Xingyuan Wang(王興元), and Shujuan Lin(林淑娟)

    School of Information Science and Technology,Dalian Maritime University,Dalian 116026,China

    This paper proposes an image encryption algorithm based on spatiotemporal chaos and middle order traversal of a binary tree. Firstly, other programming software is used to perform the middle order traversal, and the plaintext image is sorted according to the middle order traversal sequence on the permutation. Secondly, the chaotic sequence is generated using the coupled map lattice to set the chaotic interference value. Finally,the XOR operation between the adjacent pixel values of the replacement image is completed to generate the ciphertext matrix. The simulation and experimental results show that the proposed algorithm can resist typical attacks and has good robustness.

    Keywords: spatiotemporal chaos,image encryption,middle order traversal,coupled map lattice

    1. Introduction

    With the rapid development of network and communication technology,information based on audio,video and image storage is distributed on various public platforms. Therefore,information security has become an important topic.[1–4]The key to researching information security is to preserve information security during the process of information transmission.

    Chaos has cryptographic characteristics such as parameter sensitivity.[5–7]Recently, many image encryption schemes have been proposed, based on DNA,[8,9]neural networks,[10–12]chaos,[13–16]substitution boxes,[17–20]etc.These encryption schemes are based on the sensitivity of chaos to the initial conditions.In the past 10 years they have attracted widespread attention and achieved positive results in the field of image encryption. Wanget al.proposed the anti-dynamic degradation theorem, which proved that a chaotic stream cipher system is theoretically secure.[21]Therefore, chaotic cryptography has entered a new stage. The recently proposed spatiotemporal chaotic system caused fluctuations in chaotic cryptography with its excellent chaotic dynamics.[21–25]However, for the image encryption algorithm proposed in this paper, space–time chaos alone is not sufficient and it does not meet the standards of information security. Therefore, different mechanisms are needed to jointly resist the destruction of and tampering with information in the transmission process.

    Middle order traversal of a binary tree is a method for traversing a binary tree in a data structure.Its traversal method is to traverse the left subtree first, then access the root node and finally traverse the right subtree. The sequence generated by this method is not sequential nor is it periodic,like cat mapping, and is easy to implement. In this paper, sequential traversal of a binary tree is applied to replace image encryption, which effectively disturbs the original position of plaintext pixels.

    The encryption algorithm proposed in this paper is based on a combination of spatiotemporal chaos and sequential traversal of a binary tree. The key is generated by the plaintext image through the SHA-512 hash function, which increases the sensitivity of the plaintext. The chaotic dynamics of spatiotemporal chaos and the permutation method of order traversal in binary trees effectively increase the image confusion.

    The rest of the paper is summarized as follows. Section 2 introduces the preparation work before the algorithm is implemented. Section 3 introduces the implementation of the encryption algorithm in detail. Section 4 shows the simulation results of the encryption algorithm. Section 5 is a security analysis of the algorithm. Section 6 gives a performance analysis of the algorithm. Section 7 contains our conclusions.

    2. Related work

    2.1. Coupled map lattices

    A coupled map lattice (CML) is a dynamic system with discrete time, discrete space and a continuous state. CMLs are widely used to generate spatiotemporal chaos. A CML consists of a non-linear map located on a grid point called a local map. Each local map is coupled to other local maps according to a certain coupling rule. In fact, in computer implementations,any chaotic system must have periodicity with limited precision,but the actual period of a CML may be large enough to protect information security. CMLs were proposed by Kaneko[26]and can be described as

    whenu ∈(3.5699456,4) andxn ∈(0,1) the system is in a chaotic state.

    2.2. Middle order traversal of a binary tree

    Middle order traversal is a kind of binary tree traversal,also called middle root traversal and middle order travel. In a binary tree,the in-order traversal first traverses the left subtree,then accesses the root node and finally traverses the right subtree.The order traversal process in the binary tree is shown in Fig.1.

    Fig.1. Middle order traversal of a binary tree.

    2.3. Replacement method based on middle order traversal of a binary tree

    In this paper, middle order traversal of a binary tree is applied to the permutation of the image, and the chaos of the ordered traversal sequence in the binary tree is adopted. Due to the large number of pixel values of the image, constructing a binary tree and performing a middle order traversal operation on the pixel values of the image may be difficult to implement and increase the running speed and time of the algorithm. Therefore,this paper adopts the middle order traversal 1–65536 through VC++ 6.0 to generate the sequence.txt document,which stores the middle order traversal sequence of 1–65536 and then traverses the image pixel values according to the order. Sorting is done to complete the image replacement operation. The pseudo code that generates the middle order traversal sequence is as follows:

    3. Encryption algorithm

    3.1. Key structure

    The key system structure of this paper is shown in Fig.2 and consists of four parts. Hereεanduare the control parameters of the CML anda1anda2are the initial values of the two coupled maps. In this paper,the keykis generated by the plaintext image through the SHA-512 hash function,which is divided into 8-bit blocks and converted into 64 decimal numbersk1,k2,...,k64.

    wherea0andb0are control parameters added to increase the sensitivity of the key. The function uses parameters within the range ofu ∈(3.89,4].uis obtained by the following transformationu:

    SHA-512 (512bit)ε u a1 a2

    3.2. Encryption process

    The encryption process based on spatiotemporal chaos and middle order traversal of a binary tree is as follows:

    Step 1: A 512-bit keykis generated by the plaintext image through the SHA-512 hash function.

    Step 2: The sequence.txt file generated in Subsection 2.3 is converted into matrixIaccording to

    Step 3: Since the matrixIis a middle order traversal sequence, the plaintext imagePis converted into a onedimensional sequence,P1, a sequence traversal sequence is used for sortingP1according to Eq.(6)and a permutation matrixBis generated,

    Step 4:Equation(1)is iteratedM×N+500 times according to the key in Subsection 3.1,cancelling the first 500 values and avoiding transient reaction. Finally,chaotic sequencesS1,S2are generated.

    Step 5: According to Eq. (7),S1,S2are integerized to generateS,which is used for the chaotic interference value of the diffusion,

    S(i)=mod(floor(double(S1(i)+S2(i))×256),256).(7)

    Step 6: A ciphertext matrixCis generated by performing a XOR operation between the pixel value and the adjacent pixel value according to

    3.3. Decryption process

    The ciphertext imageCis transmitted to the receiver through the common channel,and the keys are transmitted to the receiver through the key exchange protocol.[27]The decryption process is the reverse of the encryption process. Specific steps are as follows:

    Step 1:The chaotic sequencesS1,S2are obtained by substituting the key iterative chaotic system. SequenceSis obtained according to Step 5 in Subsection 3.2.

    Step 2: The inverse XOR operation is performed according to Eq.(9)to obtainB,

    Step 3: The sequenceIgenerated in Subsection 2.3 is used to inverse scrambleBto getP1. Finally,P1is recombined into plaintext imageP.

    4. Simulation results

    In this paper,Matlab 2017 is used as a simulation tool to test the binary images‘Lena’,‘Cameraman’,and‘House’and a colored‘Lena’image with the encryption method described in this article. The simulation results are shown in Fig.3. Figures 3(a)–3(e) show different plaintext images, figures 3(f)–3(j)are the corresponding ciphertext images,figures 3(k)–3(o)are the corresponding decrypted images,and figures 3(p)–3(r)illustrate the encryption and decryption process for the colored image‘Lena’. We can see that the ciphertext image has completely covered the plaintext information, and the decrypted image is no different from the plaintext image.

    5. Security analysis

    5.1. Key space analysis

    A good encryption algorithm is extremely sensitive to the key,and the key space is large enough to resist typical attacks.In the algorithm described in this paper, the keys used are SHA-512 generated hash value and given keysa0,b0. When the accuracy of the key reaches 10-14, the key space reaches 2512×1028≈2512×293= 2605, which is much larger than 2200. Table 1 compares the key space between this algorithm and other algorithms,and it can be seen from the table that the key space of this algorithm is larger than that of most algorithms. So the key space is large enough to resist a variety of typical attacks.

    Table 1. Comparison of the key spaces of different algorithms.

    5.2. Key sensitivity analysis

    Four sets of experiments were performed to test the sensitivity of the keys,and the color and grayscale‘Lena’images were tested separately. Figure 4 shows the test results. Figures 4(a) and 4(e) show the use of the correct key to decrypt the encrypted image; figures 4(b)–4(d) and figures 4(f)–4(h)show the respective use of the wrong key to decrypt the encrypted image. The wrong key is just a minor change to the correct key. When the plaintext image is not decrypted using the wrong key,the algorithm is sensitive to the key.

    Fig.3. Encrypted image and decrypted image of plaintext image: (a)plaintext‘Lena’;(b)plaintext‘Cameraman’;(c)plaintext‘House’;(d)plaintext white;(e) plaintext black; (f) ciphertext of ‘Lena’; (g) ciphertext of ‘Cameraman’; (h) ciphertext of ‘House’; (i) ciphertext of white; (j) ciphertext of black; (k)decryption of‘Lena’;(l)decryption of‘Cameraman’;(m)decryption of‘House’;(n)decryption of white;(o)decryption of black;(p)plaintext color‘Lena’;(q)ciphertext of color‘Lena’;(r)decryption of color‘Lena’.

    Fig.4. Key sensitivity analysis: (a)decrypted image with the correct key;(b)decrypted image with ε =ε+10-16;(c)decrypted image with u=u+10-16;(d)decrypted image with a1 =a1+10-16; (e)decrypted image with the correct key; (f)decrypted image with a2 =a2+10-16; (g)decrypted image with ε =ε+10-14;(h)decrypted image with u=u+10-14.

    6. Performance analysis

    6.1. Histogram analysis

    A histogram is a graph that shows the frequency at which gray values of a digital image appear.In order to hide the information of the plaintext image,the histogram of the encrypted image tends to be straight. Figure 5 shows the histogram of the plain image and the ciphertext image of the grayscale images ‘Lena’, ‘Cameraman’, and ‘House’ and figure 6 shows the plaintext images of the R,G,and B channels of the color image ‘Lena’ and the histogram of the ciphertext image. It can be seen from Figs.5 and 6 that the histograms of the encrypted images are very similar. In order to better express the encrypted image histograms, we use the chi-square test. The critical values for the 5% and 1% probability of 255 degrees of freedom are 293.2478 and 310.457,respectively. It can be seen from Table 2 that significance levels of 5%and 1%were accepted. Obviously, the histograms of all ciphertext images tend to be flat, so it is difficult to obtain pure image information through statistical analysis.

    Fig.5. Histogram analysis: (a)plaintext‘Lena’;(b)histogram of‘Lena’;(c)ciphertext of‘Lena’;(d)histogram of ciphered‘Lena’;(e)plaintext‘Cameraman’;(f)histogram of‘Cameraman’;(g)ciphertext of‘Cameraman’;(h)histogram of ciphered‘Cameraman’;(i)plaintext‘House’;(j)histogram of‘House’;(k)ciphertext of‘House’;(l)histogram of ciphered‘House’.

    Fig.6. Histogram analysis: (a)plaintext color‘Lena’; (b)histogram for plain R component; (c)histogram for plain G component; (d)histogram for plain B component;(e)ciphertext of color‘Cameraman’;(f)histogram for encrypted R component;(g)histogram for encrypted G component;(h)histogram for encrypted B component.

    6.2. Correlation analysis

    Adjacent pixels have a high correlation between plaintext pixels. In order to hide the information between the plaintext images,the correlation between the pixels is greatly reduced.The formula for calculating the correlation between pixels is as follows:

    Herexandyare the gray values of two adjacent pixels. In this paper, 2000 pairs of pixels were selected to test the ‘Lena’,‘Cameraman’ and ‘House’ gray images and the ‘Lena’ color image in clear images with Eq. (10). Figures 7–12 show the correlation between ciphertext images in the horizontal,vertical and diagonal directions.

    Table 3 shows the correlation coefficients of the three plaintext images ‘Lena’, ‘Cameraman’, and ‘House’ and the three directions of the ciphertext image. When the correlation coefficient is close to zero, the proposed algorithm can resist statistical analysis. Experiments show that the algorithm is feasible.

    Table 4 shows the plaintext image of the three channels of the ‘Lena’ color image and the correlation coefficients in three directions of the ciphertext image. When the correlation coefficient is close to zero, the proposed algorithm can resist statistical analysis. Experiments show that the algorithm is feasible.

    Table 2. The χ2 evaluation results of ciphertext images.

    Table 3. Correlations of the plain-image(PI)and the corresponding cipher image(CCI)between adjacent pixels.

    Table 4. Correlations of the color plain-image(CPI)and the corresponding cipher image(CCI)between adjacent pixels.

    Fig.7. Correlation analysis: (a)plaintext‘Lena’;(b)horizontal correlation of plain image;(c)vertical correlation of plain image;(d)diagonal correlation of plain image; (e)ciphertext of‘Lena’; (f)horizontal correlation of ciphered image; (g)horizontal correlation of ciphered image; (h)diagonal correlation of ciphered image.

    Fig. 8. Correlation analysis: (a) plaintext ‘Cameraman’; (b) horizontal correlation of plain image; (c) vertical correlation of plain image; (d) diagonal correlation of plain image; (e) ciphertext of ‘Cameraman’; (f) horizontal correlation of ciphered image; (g) horizontal correlation of ciphered image; (h)diagonal correlation of ciphered image.

    Fig.9. Correlation analysis: (a)plaintext‘House’;(b)horizontal correlation of plain image;(c)vertical correlation of plain image;(d)diagonal correlation of plain image;(e)ciphertext of‘House’;(f)horizontal correlation of ciphered image;(g)horizontal correlation of ciphered image;(h)diagonal correlation of ciphered image.

    Fig. 10. Correlation analysis: (a) plaintext of R component; (b) horizontal distribution for R component; (c) vertical distribution for R component; (d)diagonal distribution for R component; (e) ciphertext of R component; (f) horizontal distribution for ciphered R component; (g) vertical distribution for ciphered R component;(h)diagonal distribution for ciphered R component.

    Fig.11. Correlation analysis:(a)plaintext of G component;(b)horizontal distribution for G component;(c)vertical distribution for G component;(d)diagonal distribution for G component; (e) ciphertext of G component; (f) horizontal distribution for ciphered G component; (g) vertical distribution for ciphered G component;(h)diagonal distribution for ciphered G component.

    Fig.12. Correlation analysis: (a)plaintext of B component;(b)horizontal distribution for B component;(c)vertical distribution for B component;(d)diagonal distribution for B component; (e) ciphertext of B component; (f) horizontal distribution for ciphered B component; (g) vertical distribution for ciphered B component;(h)diagonal distribution for ciphered B component.

    6.3. Information entropy analysis

    Information entropy is used to reflect the degree of confusion in an image. It is calculated as follows:

    wherep(si)represents the probability of occurrence ofsi. For an image, the ideal value for information entropy is 8. Table 5 shows the plaintext images of the three grayscale images‘Lena’,‘Cameraman’and‘House’and the color image‘Lena’and the information entropy of the ciphertext images. Experiments show that the information entropy of all ciphertext images is close to 8, which means that the cipher image of the algorithm has good randomness.

    6.4. Differential attack analysis

    The number of pixels change rate(NPCR)and unified average changing intensity (UACI) randomness tests are commonly used to evaluate the ability of an encrypted image to resist differential attacks. NPCR and UACI are calculated as follows:

    hereWandHrepresent,respectively,the width and height of the image andc1andc2are the two ciphertext images after the original plaintext image changes by one pixel value. Ifc1(i,j)/=c2(i,j),thenD(i,j)=1,otherwiseD(i,j)=0. Table 6 shows the NPCR and UACI values for the three grayscale images‘Lena’,‘Cameraman’and‘House’and the color image‘Lena’. The ideal value of NPCR is 99.6094%and for UACI it is 33.4635%. It can be seen from Table 7 that the NPCR and UACI values of this algorithm are closer to ideal values than those of most algorithms.

    6.5. Robust analysis

    Images are vulnerable to hijacking, tampering or destruction during transmission,so we usually use noise-adding methods to evaluate whether the encryption algorithm is robust.[34]Figure 13 shows the decryption effect after adding noise to the encrypted image. Experiments show that the image information can still be obtained after adding noise,which shows that the proposed algorithm has good robustness.

    Table 5. Information entropy of the plain-image (PI) and the cipher-image(CI).

    Table 6. The average NPCR and UACI values with various images.

    Table 7. Comparison of NPCR and UACI for different algorithms for the image‘Lena’.

    Fig. 13. Robust analysis. (a) The encrypted image with 0.01 salt and pepper noise. (b) The encrypted image with 0.05 salt and pepper noise. (c) The encrypted image with 0.01 Gaussian noise. (d)The encrypted image with 0.05 Gaussian noise. (e)The encrypted image with 0.01 speckled noise. (f)The decrypted image with 0.01 salt and pepper noise. (g) The decrypted image with 0.05 salt and pepper noise. (h) The decrypted image with 0.01 Gaussian noise. (i)The decrypted image with 0.05 Gaussian noise. (j)The decrypted image with 0.01 speckled noise.

    6.6. Time analysis

    Encryption time is also a necessary condition for evaluating encryption algorithms. The experimental environment is MATLAB R2016a with AMD Ryzen 5 3500H CPU and 8 GB RAM. We encrypt the ‘Lena’ image 50 times, take the average value and compare it with other algorithms to get Table 8.It can be seen from the table that the encryption time of this algorithm is shorter than that of most of the other algorithms,which shows that encryption of this image is faster.

    Not only experimental time analysis but also theoretical time complexity analysis should be carried out. Assuming the size of the image isM×N, Step 1 generates the hash value whose time complexity isO(512). The required binary tree sequence is obtained in Step 2, with the time complexity ofO(M×N). In Step 3, the binary tree sequence is used to scramble the image, whose time complexity isO(M×N).Step 4 is to iterate the chaotic system and generate two chaotic sequences, whose time complexity is 2O(M×N). In Step 5,the required XOR sequence is generated, whose time complexity isO(M×N). In Step 6 the ciphertext image is obtained from the XOR scrambled image,and its time complexity isO(M×N). Therefore, the time complexity of the algorithm is 2O(M×N). Table 9 compares the time complexity between the present algorithm and other algorithms, and shows the present algorithm is superior to most of the other algorithms.

    Table 8. Time comparisons for different algorithms.

    Table 9. Comparison of time complexity for different algorithms.

    7. Conclusion

    The encryption algorithm proposed in this paper is based on a combination of spatiotemporal chaos and sequential traversal of a binary tree. The key is generated by the plaintext image through the SHA-512 hash function, which increases the sensitivity of the plaintext. The chaotic dynamics of spatiotemporal chaos and the permutation method of order traversal in binary trees effectively increase the image confusion.Diffusion uses an adjacent or exclusive XOR based on chaotic interference values, which makes ciphertext images resistant to differential attacks.

    Acknowledgments

    Project supported by the National Natural Science Foundation of China (Grant No. 61672124), the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund (Grant No. MMJJ20170203), Liaoning Province Science and Technology Innovation Leading Talents Program Project (Grant No. XLYC1802013), Key Research and Development Projects of Liaoning Province,China(Grant No.2019020105-JH2/103),and Jinan City‘20 universities’Funding Projects Introducing Innovation Team Program(Grant No.2019GXRC031).

    猜你喜歡
    興元
    情系鄉(xiāng)村振興的最美老干部——艾興元
    Synchronously scrambled diffuse image encryption method based on a new cosine chaotic map
    Force-constant-decayed anisotropic network model: An improved method for predicting RNA flexibility
    Molecular dynamics simulations on the wet/dry self-latching and electric fields triggered wet/dry transitions between nanosheets:A non-volatile memory nanostructure
    An image encryption algorithm based on improved baker transformation and chaotic S-box?
    劉興元小說二題
    劍南文學(2015年1期)2015-02-28 01:14:51
    亚洲自偷自拍三级| 免费看日本二区| 中国国产av一级| 精品午夜福利在线看| 久久国产乱子免费精品| 肉色欧美久久久久久久蜜桃 | 精品国产一区二区三区久久久樱花 | 免费av观看视频| 久久这里有精品视频免费| 在线亚洲精品国产二区图片欧美 | 亚洲精品中文字幕在线视频 | 搞女人的毛片| 亚洲无线观看免费| 亚洲国产精品999| 特级一级黄色大片| 亚洲,欧美,日韩| 久久亚洲国产成人精品v| 99热这里只有是精品50| tube8黄色片| 国产v大片淫在线免费观看| 女的被弄到高潮叫床怎么办| 欧美日韩亚洲高清精品| 中文字幕亚洲精品专区| 免费看日本二区| 国产精品伦人一区二区| 欧美3d第一页| 国产精品久久久久久久久免| 美女视频免费永久观看网站| 国产91av在线免费观看| 国产精品久久久久久精品古装| 又爽又黄无遮挡网站| 国产中年淑女户外野战色| 久久人人爽人人片av| 色视频www国产| 日韩 亚洲 欧美在线| 最近手机中文字幕大全| 高清欧美精品videossex| 国产精品熟女久久久久浪| 精品一区二区三区视频在线| 国产片特级美女逼逼视频| 97精品久久久久久久久久精品| 久久久久网色| 亚洲欧美中文字幕日韩二区| 国产精品久久久久久精品电影小说 | 国产午夜福利久久久久久| 99视频精品全部免费 在线| 一级毛片黄色毛片免费观看视频| 在线天堂最新版资源| 精品人妻偷拍中文字幕| 亚洲成色77777| 人妻制服诱惑在线中文字幕| 国产黄片美女视频| 三级男女做爰猛烈吃奶摸视频| 99视频精品全部免费 在线| 成人高潮视频无遮挡免费网站| 国产毛片a区久久久久| 国产又色又爽无遮挡免| 精品视频人人做人人爽| 久久久精品免费免费高清| 日韩电影二区| 成人午夜精彩视频在线观看| 国产精品国产av在线观看| 亚洲av中文字字幕乱码综合| 丝瓜视频免费看黄片| 少妇 在线观看| 校园人妻丝袜中文字幕| 国产精品人妻久久久影院| 丰满人妻一区二区三区视频av| 成人国产av品久久久| 亚洲天堂av无毛| 精品人妻偷拍中文字幕| 男人舔奶头视频| 日韩av在线免费看完整版不卡| av在线观看视频网站免费| 日本与韩国留学比较| 97人妻精品一区二区三区麻豆| eeuss影院久久| 欧美日韩视频精品一区| 亚洲欧洲国产日韩| 高清日韩中文字幕在线| 国产精品一及| av又黄又爽大尺度在线免费看| 国产精品一及| 精品午夜福利在线看| 男女国产视频网站| 亚洲最大成人av| 亚洲av电影在线观看一区二区三区 | 91精品伊人久久大香线蕉| 好男人视频免费观看在线| 亚洲综合精品二区| 日韩亚洲欧美综合| 免费黄色在线免费观看| 国产精品久久久久久精品古装| 国产一级毛片在线| 成人亚洲精品av一区二区| 久久久久久久久久久丰满| 夜夜爽夜夜爽视频| a级一级毛片免费在线观看| 色5月婷婷丁香| 十八禁网站网址无遮挡 | 久久影院123| 亚洲国产精品成人综合色| 99久久精品国产国产毛片| 在线免费十八禁| 女的被弄到高潮叫床怎么办| 丝袜喷水一区| 免费看不卡的av| 久久久久久久久久久免费av| av在线蜜桃| 91午夜精品亚洲一区二区三区| 成人黄色视频免费在线看| 亚洲伊人久久精品综合| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 深爱激情五月婷婷| 一区二区三区四区激情视频| 大片免费播放器 马上看| 黄色视频在线播放观看不卡| 国产精品国产三级国产专区5o| 欧美日韩亚洲高清精品| 久久久久久久亚洲中文字幕| 另类亚洲欧美激情| 久久久久国产网址| 日本-黄色视频高清免费观看| 久久精品人妻少妇| 久久国产乱子免费精品| 日日撸夜夜添| 久久久久久久午夜电影| 久久99热这里只频精品6学生| 久久精品久久精品一区二区三区| 最近手机中文字幕大全| 免费在线观看成人毛片| 精品99又大又爽又粗少妇毛片| 特大巨黑吊av在线直播| 精品一区二区三卡| 内射极品少妇av片p| 免费观看在线日韩| 2022亚洲国产成人精品| 日日撸夜夜添| 国产精品精品国产色婷婷| 男女边吃奶边做爰视频| 久久99热这里只有精品18| 高清av免费在线| av在线播放精品| 禁无遮挡网站| 男人添女人高潮全过程视频| 赤兔流量卡办理| 九草在线视频观看| 一级毛片黄色毛片免费观看视频| 神马国产精品三级电影在线观看| 精品久久久久久久久亚洲| 亚洲av.av天堂| 夫妻午夜视频| 国产成人免费无遮挡视频| 美女cb高潮喷水在线观看| 国产精品久久久久久精品电影小说 | 插逼视频在线观看| 亚洲成人av在线免费| 婷婷色麻豆天堂久久| 午夜激情久久久久久久| 国产av国产精品国产| 久久国内精品自在自线图片| 韩国高清视频一区二区三区| 亚洲精品一区蜜桃| 国产欧美日韩精品一区二区| 国产毛片在线视频| 身体一侧抽搐| 日本色播在线视频| 中国三级夫妇交换| 免费观看性生交大片5| 插阴视频在线观看视频| 秋霞在线观看毛片| 久久久久久久久久久丰满| 在线精品无人区一区二区三 | 波野结衣二区三区在线| 国产免费福利视频在线观看| 国内揄拍国产精品人妻在线| 一级片'在线观看视频| 天天躁日日操中文字幕| 国产成人aa在线观看| 九九爱精品视频在线观看| 欧美高清成人免费视频www| 亚洲最大成人中文| av在线蜜桃| 成人国产av品久久久| 精品少妇久久久久久888优播| 日韩欧美精品免费久久| 99热全是精品| 亚洲精品456在线播放app| 亚洲在线观看片| 日本熟妇午夜| 大话2 男鬼变身卡| 久久精品久久久久久噜噜老黄| 中国三级夫妇交换| 一区二区三区四区激情视频| 狂野欧美白嫩少妇大欣赏| 久久精品国产a三级三级三级| 国产成人一区二区在线| 亚洲国产高清在线一区二区三| 国产真实伦视频高清在线观看| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 国模一区二区三区四区视频| 精品一区二区三区视频在线| 亚洲人成网站在线播| 欧美激情国产日韩精品一区| 制服丝袜香蕉在线| 亚洲怡红院男人天堂| 一区二区三区四区激情视频| 青春草国产在线视频| 精品久久久久久久人妻蜜臀av| 国产精品一区二区性色av| 日本wwww免费看| 日本爱情动作片www.在线观看| 少妇人妻精品综合一区二区| 日本一本二区三区精品| 欧美激情久久久久久爽电影| 男女边摸边吃奶| 国产黄a三级三级三级人| 亚洲国产最新在线播放| 亚洲精品国产av蜜桃| 国产成人一区二区在线| 22中文网久久字幕| 亚洲精品色激情综合| 亚洲va在线va天堂va国产| 欧美日韩亚洲高清精品| 国产伦在线观看视频一区| 国产乱人视频| 国产一区亚洲一区在线观看| 一区二区三区免费毛片| 日本三级黄在线观看| 成人高潮视频无遮挡免费网站| 国产午夜精品久久久久久一区二区三区| 欧美国产精品一级二级三级 | 日本免费在线观看一区| 草草在线视频免费看| 91在线精品国自产拍蜜月| 女人被狂操c到高潮| 国产精品人妻久久久久久| 亚洲精品乱码久久久久久按摩| 五月玫瑰六月丁香| 日本一二三区视频观看| 精品99又大又爽又粗少妇毛片| 免费黄色在线免费观看| av在线老鸭窝| av天堂中文字幕网| 日韩伦理黄色片| 69人妻影院| 久久99热6这里只有精品| 久久久欧美国产精品| 男的添女的下面高潮视频| 亚洲国产欧美在线一区| 嫩草影院入口| 国产v大片淫在线免费观看| 成人综合一区亚洲| 国产色爽女视频免费观看| 久久女婷五月综合色啪小说 | 国产亚洲最大av| 人妻少妇偷人精品九色| 国产免费又黄又爽又色| 99精国产麻豆久久婷婷| www.色视频.com| 国模一区二区三区四区视频| 九九爱精品视频在线观看| 看免费成人av毛片| 哪个播放器可以免费观看大片| 欧美另类一区| 亚洲精品日本国产第一区| 亚洲在线观看片| 亚洲av日韩在线播放| 欧美少妇被猛烈插入视频| 日韩 亚洲 欧美在线| 青春草视频在线免费观看| 人体艺术视频欧美日本| 99热网站在线观看| av国产久精品久网站免费入址| 欧美成人午夜免费资源| 黄色一级大片看看| 视频区图区小说| 国产成人免费无遮挡视频| 亚洲人成网站在线播| 夫妻性生交免费视频一级片| 99热国产这里只有精品6| 久久精品久久精品一区二区三区| 又爽又黄无遮挡网站| 亚洲无线观看免费| 午夜福利在线在线| 久久综合国产亚洲精品| 韩国高清视频一区二区三区| 欧美日本视频| 久久99蜜桃精品久久| 欧美一区二区亚洲| 男人狂女人下面高潮的视频| 亚洲欧美日韩东京热| 国产伦精品一区二区三区视频9| 性插视频无遮挡在线免费观看| 婷婷色av中文字幕| 国产成人一区二区在线| 日韩欧美精品v在线| 噜噜噜噜噜久久久久久91| 麻豆成人午夜福利视频| 美女被艹到高潮喷水动态| 午夜福利高清视频| 国产一区二区亚洲精品在线观看| 乱系列少妇在线播放| 欧美变态另类bdsm刘玥| 日韩一本色道免费dvd| 91久久精品国产一区二区三区| 少妇 在线观看| 国产伦理片在线播放av一区| 亚洲真实伦在线观看| 综合色av麻豆| 国产乱来视频区| 久久久久国产网址| 视频区图区小说| 春色校园在线视频观看| 欧美一级a爱片免费观看看| av在线蜜桃| 一级a做视频免费观看| 久久久久性生活片| 人妻一区二区av| 国内揄拍国产精品人妻在线| 亚洲综合精品二区| 久久精品熟女亚洲av麻豆精品| av网站免费在线观看视频| 夫妻午夜视频| 麻豆精品久久久久久蜜桃| 精品少妇黑人巨大在线播放| 亚洲天堂av无毛| 好男人视频免费观看在线| 国产 一区 欧美 日韩| 亚洲电影在线观看av| 国产精品久久久久久精品电影| 亚洲四区av| 成人美女网站在线观看视频| 国产黄色免费在线视频| 偷拍熟女少妇极品色| 中文字幕亚洲精品专区| 色综合色国产| 精品国产乱码久久久久久小说| 天天躁日日操中文字幕| 国产 一区 欧美 日韩| 身体一侧抽搐| 麻豆国产97在线/欧美| 狂野欧美激情性bbbbbb| 少妇的逼水好多| 91aial.com中文字幕在线观看| 最近中文字幕高清免费大全6| 如何舔出高潮| 日韩成人伦理影院| 亚洲成人精品中文字幕电影| 六月丁香七月| 老女人水多毛片| 亚洲av日韩在线播放| 91久久精品国产一区二区三区| 婷婷色av中文字幕| 五月开心婷婷网| 国产精品人妻久久久影院| 亚洲欧美一区二区三区国产| 精品久久久久久久人妻蜜臀av| 免费看a级黄色片| 视频中文字幕在线观看| 亚洲成人一二三区av| 久久久欧美国产精品| 伦理电影大哥的女人| 国产成人免费观看mmmm| 简卡轻食公司| 99re6热这里在线精品视频| 少妇人妻 视频| 成年人午夜在线观看视频| 国产精品99久久久久久久久| 99热国产这里只有精品6| 王馨瑶露胸无遮挡在线观看| 观看免费一级毛片| 亚洲欧美日韩卡通动漫| 亚洲国产成人一精品久久久| 夫妻性生交免费视频一级片| av免费在线看不卡| 国语对白做爰xxxⅹ性视频网站| 少妇的逼水好多| 国内揄拍国产精品人妻在线| 乱系列少妇在线播放| 国产精品不卡视频一区二区| 久久久久精品久久久久真实原创| 99久久精品国产国产毛片| 午夜免费男女啪啪视频观看| 少妇人妻一区二区三区视频| 一区二区三区免费毛片| av黄色大香蕉| 久久久亚洲精品成人影院| 国产成人免费无遮挡视频| 国产一区有黄有色的免费视频| 国产极品天堂在线| 欧美日韩视频高清一区二区三区二| 久久久久久久大尺度免费视频| 夜夜看夜夜爽夜夜摸| 中国国产av一级| 久久精品国产a三级三级三级| 亚洲欧美精品自产自拍| 亚洲精品国产色婷婷电影| 久久久久久久国产电影| 熟女电影av网| 男女国产视频网站| 99久久人妻综合| 男的添女的下面高潮视频| 久久97久久精品| 男女无遮挡免费网站观看| 成人高潮视频无遮挡免费网站| 久久99蜜桃精品久久| 亚洲高清免费不卡视频| 精品视频人人做人人爽| 亚洲熟女精品中文字幕| 五月天丁香电影| 欧美人与善性xxx| 亚洲一级一片aⅴ在线观看| 久久人人爽人人片av| 国产精品.久久久| 少妇的逼好多水| 国产精品久久久久久精品古装| 在线天堂最新版资源| 丰满乱子伦码专区| 亚洲av在线观看美女高潮| 只有这里有精品99| 日韩免费高清中文字幕av| 亚洲人成网站在线观看播放| 久久精品久久久久久噜噜老黄| 狂野欧美白嫩少妇大欣赏| 夫妻性生交免费视频一级片| 日韩强制内射视频| 最近最新中文字幕大全电影3| 少妇人妻一区二区三区视频| 老司机影院成人| 欧美+日韩+精品| 国产成年人精品一区二区| 中文字幕免费在线视频6| 久久久亚洲精品成人影院| 好男人视频免费观看在线| 亚洲欧美成人精品一区二区| 精品久久久久久久久亚洲| 国产淫片久久久久久久久| 色综合色国产| 听说在线观看完整版免费高清| 国产乱人偷精品视频| 日韩一本色道免费dvd| 午夜老司机福利剧场| 亚洲精华国产精华液的使用体验| 亚洲欧美成人综合另类久久久| 国产精品一区www在线观看| 亚洲欧美日韩东京热| 精品久久久久久久久av| 蜜桃久久精品国产亚洲av| 国产黄色免费在线视频| 精品久久久久久久末码| 欧美变态另类bdsm刘玥| 菩萨蛮人人尽说江南好唐韦庄| 人妻系列 视频| 国产免费一级a男人的天堂| 亚洲婷婷狠狠爱综合网| av国产精品久久久久影院| 国产精品久久久久久精品古装| 成人毛片a级毛片在线播放| 一二三四中文在线观看免费高清| 国产成人午夜福利电影在线观看| 一本色道久久久久久精品综合| 中文字幕免费在线视频6| 国产极品天堂在线| 在线 av 中文字幕| .国产精品久久| 观看美女的网站| 成人一区二区视频在线观看| 又大又黄又爽视频免费| 狂野欧美激情性bbbbbb| 免费观看在线日韩| 少妇猛男粗大的猛烈进出视频 | 我的女老师完整版在线观看| 91精品国产九色| av播播在线观看一区| 国产 精品1| 亚洲第一区二区三区不卡| 欧美成人一区二区免费高清观看| 内射极品少妇av片p| 搡老乐熟女国产| 80岁老熟妇乱子伦牲交| 亚洲一级一片aⅴ在线观看| 日本三级黄在线观看| 成人黄色视频免费在线看| 久久久久国产精品人妻一区二区| 美女脱内裤让男人舔精品视频| 国产精品三级大全| 香蕉精品网在线| 天天一区二区日本电影三级| 街头女战士在线观看网站| 久久久久久国产a免费观看| 97热精品久久久久久| 美女内射精品一级片tv| 能在线免费看毛片的网站| 好男人在线观看高清免费视频| 亚洲丝袜综合中文字幕| 蜜臀久久99精品久久宅男| 精品久久久精品久久久| 18+在线观看网站| 99热网站在线观看| 建设人人有责人人尽责人人享有的 | 欧美一区二区亚洲| 国产在线男女| 国产成人福利小说| 又黄又爽又刺激的免费视频.| 美女国产视频在线观看| 涩涩av久久男人的天堂| 久久精品国产自在天天线| 亚洲成人一二三区av| 亚洲一区二区三区欧美精品 | 精品99又大又爽又粗少妇毛片| 久久99蜜桃精品久久| 少妇熟女欧美另类| 永久免费av网站大全| 色婷婷久久久亚洲欧美| 国产av码专区亚洲av| 久久韩国三级中文字幕| 日韩在线高清观看一区二区三区| 亚洲国产欧美在线一区| 久久久a久久爽久久v久久| 亚洲av成人精品一二三区| 又爽又黄无遮挡网站| 神马国产精品三级电影在线观看| 精品一区二区三区视频在线| 日本免费在线观看一区| 国产免费一区二区三区四区乱码| 亚洲欧美成人精品一区二区| 又粗又硬又长又爽又黄的视频| 99热这里只有是精品50| 日本午夜av视频| 国产精品伦人一区二区| 亚洲精品视频女| 国产黄色视频一区二区在线观看| 看十八女毛片水多多多| 免费观看无遮挡的男女| 伊人久久精品亚洲午夜| 午夜亚洲福利在线播放| 91精品一卡2卡3卡4卡| 欧美少妇被猛烈插入视频| 亚洲丝袜综合中文字幕| 国产男女内射视频| 日本一本二区三区精品| 亚洲精品乱久久久久久| 99热这里只有是精品50| 99久久精品热视频| 精品亚洲乱码少妇综合久久| 一区二区av电影网| 欧美成人午夜免费资源| 日本wwww免费看| 亚洲不卡免费看| 搡女人真爽免费视频火全软件| 中文字幕免费在线视频6| 欧美bdsm另类| 国产在线一区二区三区精| av免费在线看不卡| 日本一本二区三区精品| 国产精品人妻久久久影院| 国产 一区 欧美 日韩| 久久久久久伊人网av| 伊人久久国产一区二区| 国内揄拍国产精品人妻在线| 欧美极品一区二区三区四区| 在线观看一区二区三区| 国产精品伦人一区二区| 国产一区二区三区av在线| 干丝袜人妻中文字幕| 精品人妻视频免费看| 亚洲成人一二三区av| 汤姆久久久久久久影院中文字幕| 亚洲精品成人av观看孕妇| 国产精品偷伦视频观看了| 美女视频免费永久观看网站| 精品人妻视频免费看| 欧美 日韩 精品 国产| 五月伊人婷婷丁香| 高清毛片免费看| 国内揄拍国产精品人妻在线| 国产91av在线免费观看| 久久久成人免费电影| 日日啪夜夜爽| 精品一区二区免费观看| 亚洲国产精品国产精品| 国产精品一及| 大又大粗又爽又黄少妇毛片口| 一级片'在线观看视频| 国产欧美日韩精品一区二区| 日韩强制内射视频| 国产精品99久久久久久久久| 精品少妇久久久久久888优播| 欧美激情久久久久久爽电影| 性插视频无遮挡在线免费观看| 国产精品一区二区在线观看99| 午夜老司机福利剧场| 国内精品美女久久久久久| 国产片特级美女逼逼视频| 天天躁夜夜躁狠狠久久av| 美女高潮的动态| 婷婷色综合大香蕉| 久久精品国产鲁丝片午夜精品| 各种免费的搞黄视频| 国产探花在线观看一区二区| 成人特级av手机在线观看| 特级一级黄色大片| 欧美zozozo另类| 插逼视频在线观看| 午夜爱爱视频在线播放| 国产黄色免费在线视频| 热re99久久精品国产66热6| 国产精品无大码| 18禁动态无遮挡网站| 亚洲av男天堂| 成年女人在线观看亚洲视频 | 中文字幕久久专区| 国产视频首页在线观看| 国产伦在线观看视频一区|