• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Local binary pattern‐based reversible data hiding

    2022-12-31 03:48:04MonalisaSahuNeelamadhabPadhySasankoSekharGantayatAdityaKumarSahu

    Monalisa Sahu|Neelamadhab Padhy|Sasanko Sekhar Gantayat|Aditya Kumar Sahu

    1Department of Computer Science and Engineering,School of Engineering and Technology,GIET University,Gunupur,Odisha,India

    2Department of Computer Science and Engineering,GMRIT,Rajam,Andhra Pradesh,India

    3Department of CSE,Vignan's Foundation for Science Technology and Research,Vadlamudi,Andhra Pradesh,India

    Abstract A novel local binary pattern‐based reversible data hiding(LBP‐RDH)technique has been suggested to maintain a fair symmetry between the perceptual transparency and hiding capacity.During embedding,the image is divided into various 3×3 blocks.Then,using the LBP‐based image descriptor,the LBP codes for each block are computed.Next,the obtained LBP codes are XORed with the embedding bits and are concealed in the respective blocks using the proposed pixel readjustment process.Further,each cover image(CI)pixel produces two different stego‐image pixels.Likewise,during extraction,the CI pixels are restored without the loss of a single bit of information.The outcome of the proposed technique with respect to perceptual transparency measures,such as peak signal‐to‐noise ratio and structural similarity index,is found to be superior to that of some of the recent and state‐of‐the‐art techniques.In addition,the proposed technique has shown excellent resilience to various stego‐attacks,such as pixel difference histogram as well as regular and singular analysis.Besides,the out‐off boundary pixel problem,which endures in most of the contemporary data hiding techniques,has been successfully addressed.

    KEYWORDS hiding capacity(HC),local binary pattern(LBP),peak signal‐to‐noise ratio(PSNR),reversible data hiding

    1|INTRODUCTION

    Steganography is a data hiding technique to disguise the secret data to deceive the invader[1].Recently,voluminous data hiding techniques have been proposed by authors in the literature.These techniques are grouped into either reversible or irreversible[2].Reversible data hiding(RDH)techniques can reproduce the carrier object as well as the concealed information within it.At the same time,irreversible data hiding techniques essentially focus on the successful retrieval of the embedding bits(EBs)only[3].The efficacy of any technique fundamentally lies in measures like hiding capacity(HC),perceptual transparency,and security[4].In the context of data hiding using images,the HC refers to the number of EBs that can be concealed in that image.In this study,the image that is utilised for concealing the EBs is termed as a cover image(CI).On the other hand,the image after concealing the EBs is termed as a stego‐image(SI).The perceptual transparency points to the resemblance between the respective CI and SI[5].Generally,peak signal‐to‐noise ratio(PSNR)and structural similarity index(SSIM)are the two crucial parameters to gauge perceptual transparency[6].Finally,the ability to withstand various stego‐attacks is substantial to measure the efficacy of the technique.

    Literature has developed a collection of irreversible data hiding techniques and most of them are classified into one of the following classifications,such as(1)least significant bit substitution(LSBS),(2)pixel value differencing steganography(PVDS),(3)modulus function steganography(MFS),and(4)exploiting modification direction steganography(EMDS).The LSBS technique simply substitutes the rightmost bits of the CI pixel with the EBs.Wang et al.[7]suggested a genetic algorithm‐based LSBS technique to attain optimal the SI quality using the perceptual modelling strategy.Wu and Hwang[8]proposed the XOR‐based embedding technique using an LSB strategy to conceal the EBs with an utmost of±1 deviation to that of the SI pixels.However,Fridrich et al.[9]found that most of the conventional LSBS techniques are exposed to the regular and singular(RS)statistical analysis.Mielikainen[10]devised the LSB matching technique using±1 modification strategy to achieve a high‐quality SI.Additionally,the proposed LSB matching technique can survive the regular and singular(RS)analysis successfully.Further,the authors in Refs.[11–13,33]have suggested several reversible data hiding(RDH)techniques in the literature.

    The pixel value differencing steganography(PVDS)technique for the greyscale images introduced by Wu and Tsai[15]is considered as one of the noteworthy developments in the field of steganography.The PVDS technique conceals the EBs in the CI pixels using the fluctuation among the consecutive pixels.The consecutive pixels with greater fluctuation values can conceal relatively more EBs than that of the pixels with lower fluctuation values.The PVDS technique successfully resists the RS analysis with acceptable HC.However,Wang et al.[16]observed that after concealing the EBs,the stego‐image(SI)pixels obtained from Wu and Tsai's[15]PVDS technique go beyond 255 or fall below 0.This leads to an out‐off boundary pixel(OBP)problem.Further,the EBs cannot be extracted accurately from the OBP pixels.In this regard,to avoid OBP,Wang et al.[16]proposed a novel embedding strategy using both PVDS and modulus function.Later,Joo et al.[17]found that the existence of EBs can be revealed in Wang et al.’s[16]technique using the pixel difference histogram(PDH)analysis.Thus,to avoid the abnormal fluctuations in the PDH curve,Joo et al.[17]suggested an improved PVD and MFS technique using turnover and pixel readjustment strategies.The turnover strategy ensures that the difference between the histogram curve for the respective CI and SI is as low as possible.

    Prasad and Pal[18]extended the PVD technique in[15]to colour images using a pixel overlapping strategy to raise the HC.Luo et al.[19]found that the presence of EBs in Wu and Tsai's[15]technique can be exposed using the PDH analysis.The major reason behind this is Wu and Tsai's PVD[15]technique that considers the fluctuation between the consecutive pixels in the horizontal direction alone.However,considering the fluctuation in horizontal,vertical,and diagonal directions to conceal the EBs is more prolific to resist the PDH analysis.In this regard,the authors in[19,20]suggested the adaptive quantisation range‐based PVD technique by considering multiple directions while concealing the EBs.Recently,Hameed et al.[21]extended Wu and Tsai's PVD[15]technique in colour images to achieve higher HC.Here,the fluctuations among the pixels of a block from all three directions are considered for concealing the EBs.The suggested LSBS+PVDS technique in[22]is considered as one of the significant additions to this field.In this technique,PVDS is applied when the fluctuation between two consecutive pixels is more than 15.Otherwise,LSBS embedding is performed.Khodaei and Faez[23]extended Wu et al.’s[22]LSBS+PVDS technique to achieve higher HC.Khodaei et al.[24]proposed an improved adaptive LSBS+PVDS technique to increase the HC without reducing the SI quality.However,it has been found that the suggested technique has shown less resistance against the RS analysis.Hussain et al.[25]found that the distortion caused in the SI can be avoided by using a novel range table based on pixel differences.In this regard,the suggested adaptive LSBS+PVDS technique achieved acceptable HC as well as the improved SI quality.In[26],the author has improved the HC of the CI using LSBS+PVDS and bit plane strategies.However,this technique could not able to resist different steganalysis attacks.Zhao et al.[27]devised a combination of PVDS and modulus function‐based strategy to achieve higher embedding efficiency.The authors in[28]found the edge directions from the CI to identify the block of interest where data can be embedded using either LSBS or PVDS strategy.Experiment on different attacks suggests that the suggested work can resist both PDH as well as RS attacks successfully.

    1.1|Research motivation

    Literature suggests that the LSBS technique offers higher HC compared to other image steganography techniques[29].However,LSBS techniques are vulnerable to RS analyses.In contrast,the PVDS technique can survive the RS analysis but provides limited HC.Further,the majority of the PVDS‐based techniques,such as in[15,22–24,26],are exposed to the PDH analysis.Recently,Chakraborty and Jalal[14]have extended the ability of local binary pattern(LBP)visual descriptors in the data hiding domain.Further,the suggested LBP‐based data hiding technique can successfully resist both RS as well as PDH analyses.However,in this study,we identified the weakness of Chakraborty and Jalal's[14]LBP‐based data hiding technique.From the experiment,it has been observed that the boundary pixels,such as 0 and 255,are vulnerable to the OBP problem(elaborated in Section 2.1).The OBP problem results when a stego‐pixel value falls out of the permissible range for an image pixel,that is,{0,255}after concealing the secret bits.Such pixels cannot be utilised for concealing the EBs.Further,the existence of OBP in an image significantly reduces the HC for the technique.Additionally,precise extraction of the EBs is impossible in the case of OBPs.To evade the OBP problem and to achieve a fair trade‐off between the HC and perceptual transparency measures,this study proposes the LBP‐based reversible data hiding(LBP‐RDH)technique.

    1.2|Research contribution

    The advocated LBP‐RDH technique first partitions the image into diverse blocks having 3×3 pixels each.Then,the LBP codes from each block are extracted.Next,using the obtained codes and the proposed pixel readjustment strategy,two SI pixels are produced from each CI pixel.The substantial improvements that the proposed work offers are as follows:

    (1)The OBP problem has been avoided by readjusting the boundary pixels.

    (2)Further,a fair trade‐off between the conflicting metrics,such as high HC,perceptual transparency,and security,has been achieved.

    (3)The proposed technique shows strong anti‐steganalysis ability to PDH as well as RS attacks.

    (4)Finally,the proposed LBP‐RDH technique aptly recovers the CI at the recipient.Moreover,it is impossible to regain the EBs or the original CI without one of the SIs.

    1.3|Organization

    The remainder of the work is structured as follows.Chakraborty and Jalal's[14]technique and its inherent issues have been explored in Section 2.Section 3 presents the proposed LBP‐RDH technique with an illustration.The result of the proposed work has been compared with recent and related state‐of‐the‐art techniques in Section 4.Finally,the conclusion has been drawn in Section 5.

    2|RELATED WORK

    2.1|Existing technique

    In this section,LBP‐based steganography technique proposed by Chakraborty and Jalal[14]is discussed.Here,embedding is performed by exploring the local features of the image.At first,the CI is partitioned into various 3×3 blocks.Then,the LBP code is obtained from the respective blocks.Considering Figure 1 as one of the CI blocks,the embedding and extraction procedures are discussed.The CI block consists of 9 pixels.Considerpcas the central pixel and∑be the neighbouring pixels.

    The LBP codes for each block of an image are obtained using the functionf(.).The functionf(.)is defined in Equation(1).Fori=1–8,let LBPciBbe the eight‐bit LBP binary string for the first CI block obtained from Equation(2).

    Fori=1 to 8,letbibe the eight EBs to embed in the CI block.Again,the EBs are modified using the XOR operation as given in Equation(3)to produce encrypted bits(EBci).

    FIGURE 1 CI block

    The EBcicontains eight bits,such as EBc1,EBc2,EBc3,EBc4,EBc5,EBc6,EBc7,and EBc8.Now,swap the values of EBc1and EBc2,EBc3and EBc4,EBc5and EBc6,and EBc7and EBc8.Then,embed these EBciin the least significant position of the respective neighbour pixels ofpcas follows:EBc1is embedded in the right‐side neighbour pixel ofpc.EBc2is embedded in the upper‐right neighbour pixel ofpc.Similarly,EBc3,EBc4,EBc5,EBc6,EBc7,and EBc8are embedded in top,top‐left,left,lower‐left,lower,and lower‐right pixels,respectively.However,no bit is embedded inpc.After embedding EBci,the updated values ofpipixels are nowp′i.Finally,to preserve the local relationship among the pixels of the block,the synchronisation step is performed using Equation(4).

    whereμis the number of substituted bits.

    Considering Figure 2 as a SI block,obtain the LBPsiBfor the SI block using Equations(1)and(2).Next,find the EBsifrom the least significant position ofThe EBsicontains the eight bits,such as EBs1,EBs2,EBs3,EBs4,EBs5,EBs6,EBs7,and EBs8.Now,swap the values of EBs1and EBs2,EBs3and EBs4,EBs5and EBs6,and EBs7and EBs8.Finally,obtain original EBs using Equation(5).

    2.2|Exploring the issues in Chakraborty and Jalal's[14]technique

    The LBP‐based image steganography technique proposed by Chakraborty and Jalal's[14]technique produces imperceptible SI.However,two distinct problems are identified in Chakraborty and Jalal's[14]technique withμ=1,such as(1)the inadequate embedding strategy and(2)the OBP problem.The following section discusses both the problems.

    Problem 1:Inadequate embedding strategy(withμ=1):

    FIGURE 2 SI block

    The technique in[14]embeds the EBs in each CI block consisting of 9 pixels.As no bit is embedded inpc,each block embeds one fewer bit than the total number of pixels in the block.So,1/9th of the pixels of the whole image are not utilised for embedding any bits.In this way,if we choose the CI with a size of 512×512 pixels,then almost 29,127 pixels are left unused out of 262,144 pixels.By doing so,the number of unused pixels keeps increasing with increased image size.This problem can be addressed,ifpcof each block is also considered for embedding the bits.

    Problem 2:OBP problem:

    In an image,the value for each pixel lies in between{0–255}.After embedding the bits,if the SI pixels'value goes beyond{0–255},then the OBP arises.Once a pixel suffers from an OBP problem,then proper readjustment needs to be performed to bring back the pixel to{0–255}range.This readjustment can be done at the cost of HC and perceptual transparency.Further,it is also observed that the EBs that are embedded in such pixels cannot be retrieved accurately.Chakraborty and Jalal's[14]technique suffers from an OBP problem.Figure 3 displays a pictorial illustration of the OBP problem in[14].

    3|PROPOSED WORK

    In this paper,LBP‐based RDH technique has been proposed to preserve the local statistical feature among the pixels of an image.The proposed LBP‐RDH technique conceals two bits of information in each CI pixel by producing two distinct SI pixels.Later,the original CI,as well as the EBs,can be reversibly convertible from the produced SIs at the recipient end.The proposed technique first partitions the image into different 3×3 sized blocks.Each 3×3 block consists of nine pixels with one central pixel(pc).An illustration of a 3×3 block is shown in Figure 1.Following this,the embedding,extraction,and CI restoration steps for one of the blocks are presented.

    3.1|Embedding steps

    Step1 Considering Figure 1 as one of the CI blocks(B),the embedding of eighteen bitsis performed using the ensuing steps.

    Step2 Fori=1 to 8,let LBPciBbe the 8 bit LBP codes that are obtained from the block using Equations(6)and(7).

    Step3 Divide theEBs into three segments,such as EBci1,EBci2,and EBci3.EBci1and EBci2containandEBs,respectively.On the other hand,EBci3containsEBs.

    FIGURE 3 Illustration of the OBP problem in Chakraborty and Jalal's[14]technique with μ=1

    Step4 The three segments are encrypted using the XOR operation to obtain encrypted EBs(EEBs)using Equations(8)–(10).

    Step5 Next,concatenate the obtained EEBs to find the total encrypted EBs(TEBs).Lettibe the TEBs for B.

    Step6 Then,divide the TEBstiinto nine segmentssiwhere each segmentsiconsists of 2 consecutive bits each.The bits that are present in the segments∑siare embedded in the LSB position ofpi,whereas segments9is embedded inpc.Now,convert the segments∑siinto its respective decimal values.

    Step7 During embedding,the CI pixels are readjusted using the following steps.At first,the pixels are grouped into 4 classes.Class 1 pixels are those whose value ranges between 2 and 254,class 2 pixels are having value 0,class 3 pixels are having value 1,and class 4 pixels have the value of 255.

    Step7.1 Fori=1 to 8,to embed the segments in class 1 pixels,observe Equation(11)to obtain the corresponding SI pixelsp*iandq*i.

    Step7.2 Fori=1 to 8,to embed the segments in class 2 pixels,observe Equation(12)to obtain the corresponding SI pixels(p*iandq*i).

    Step7.3 Fori=1 to 8,to embed the segments in class 3 pixels,observe Equation(13)to obtain the corresponding SI pixels(p*iandq*i).

    Step7.4 Fori=1 to 8,to embed the segments in class 4 pixels,observe Equation(14)to obtain the corresponding SI pixels(p*iandq*i).

    Step8 Finally,s9is embedded in the central pixelpcusing Equations(11)–(14).Here,pcwill be used instead ofpito obtain(p*c,q*c).Figure 4a,b shows the SI pixels for the CI block shown in Figure 1.

    Step9 Embedding is completed.

    3.2|EBs extraction and CI restoration steps:

    Step1 Considering the SI blocks shown in Figure 4a,b,the extraction as well as the CI restoration procedures are performed.

    Step2 Fori=1–8,the CI pixelsof the block are restored by following Equation(15).However,while obtainingpc,the stego‐central pixelsp*candq*cneed to be chosen instead ofp*iandq*i.

    FIGURE 4 SI blocks(a)and(b)

    Step3 Fori=1–8,the decimal of TEBsis obtained by following Equation(16).However,while obtaining s9,the stego‐central pixelsp*candq*cneed to be chosen instead ofp*iandq*i.

    Step4 Fori=1 to 8,obtain the LBPsiBconsisting of 8‐bit LBP codes from Equations(6)and(7)using restoredpiandpc.

    Step5 Then,convert the obtainedsiinto its respective two‐bit binary bits.Let the obtained 18 encrypted bits are∑ni.Divide the bits into three segments,such as EBsi1,and EBs3i.EBs1iand EBs2icontainandbits,respectively.On the other hand,EBs3icontainsbits.

    Step6 Now using Equations(17)–(19),obtain the EBs as EB1,EB2,and EB3.

    Step7 Finally,concatenate EB1,EB2,and EB3to obtain the EBs.

    Step8 Extraction is completed.

    3.3|Illustration of the proposed technique

    An illustration of the proposed technique is presented here.Figure 5 illustrates the embedding and pixel restoration processes,and Figure 6 illustrates the EBs extraction process.Let the nine CI pixels of the block arep1=240,p2=239,p3=241,p4=240,pc=240,p5=241,p6=240,p7=240,andp8=241.At first,obtain the LBP codes using Equations(6)and(7)from the block as LBPciB=(1,1,0,1,0,1,1,0).Assume that the EBsaree1=1,e2=1,e3=0,e4=0,e5=0,e6=0,e7=1,e8=1,e9=1,e10=0,e11=0,e12=0,e13=0,e14=1,e15=1,e16=1,e17=0,ande18=0.These EBs are partitioned into 3 segments.The EBci1segment consists of{1,1,0,0,0,0,1,1}.Similarly,EBci2and EBci3segments are{1,0,0,0,0,1,1,1}and{0,0},respectively.Next,using Equations(8)–(10),the encrypted bits EEBci1,EEBci2,and EEBci3are obtained as(0,0,0,1,0,1,0,1},{0,1,0,1,0,0,0,1),and(0,0).So,the total encrypted bits(TEBs)∑tiare(0,0,0,1,0,1,0,1,0,1,0,1,0,0,0,1,0,0).Now,obtain the nine different segments in decimal asares1=0,s2=1,s3=1,s4=1,s5=1,s6=1,s7=0,s8=1,and s9=0.Finally,using Equations(11)–(14),the EBs are concealed to obtain the corresponding SI pixels asp*1=240,

    p*2=239,p*3=241,p*4=240,p*c=240,p*5=241,p*6=240,p*7=240,p*8=241 andq*1=240,q*2=238,q*3=240,q*4=239,q*c=240,q*5=240,q*6=239,q*7=240,andq*8=240.At the extraction end,the CI pixels are restored using Equation(15)asp1=240,p2=239,p3=241,p4=240,pc=240,p5=241,p6=240,p7=240,andp8=241.Next,using Equation(16),the decimalares1=0,s2=1,s3=1,s4=1,s5=1,s6=1,s7=0,s8=1,ands9=0.The LBP codes obtained from the restored block areLBPsi B=(1,1,0,1,0,1,1,0).Again obtain theasn1=00,n2=01,n3=01,n4=01,n5=01,n6=01,n7=00,n8=1,andn9=01.Then,find EBsi1,EBsi2,and EBsi3and using Equations(17)–(19),obtain EB1=(1,1,0,0,0,0,1,1),EB2=(1,0,0,0,0,1,1,1),and EB3=(0,0).Finally,concatenating EB1,EB2,and EB3,the EBs can be extracted ase1=1,e2=1,e3=0,e4=0,e5=0,e6=0,e7=1,e8=1,e9=1,e10=0,e11=0,e12=0,e13=0,e14=1,e15=1,e16=1,e17=0,ande18=0.

    FIGURE 5 An illustration of embedding and pixel restoration processes for the proposed LBP‐RDH technique

    FIGURE 6 An illustration of the extraction of EBs using the proposed LBP‐RDH technique

    4|RESULTS AND DISCUSSION

    FIGURE 7 CIs for the experiment

    The proposed LBP‐RDH technique has been implemented using Matlab 2015R in Windows 10 platform.Twelve random greyscale images with a size of 512×512 are chosen as CIs and are shown in Figure 7.The corresponding SIs are shown in Figure 8.The performance of the proposed technique has been assessed using perceptual transparency measures,such as PSNR and SSIM.Further,the OBP problem of the proposed and existing techniques is also analysed for the respective images.Additionally,the ability of the proposed work to resist the PDH and RS analyses is also presented.

    4.1|Performance analysis with respect to HC,PSNR,and SSIM

    The HC of a technique refers to the total number of embedding bits an image can conceal.This is also usually measured in terms of bits per pixel(BPP)[30].With respect to visual similarity,the SI should be highly imperceptible to the CI.A high imperceptible SI leads to low distortion in the image.In this regard,the fluctuation between the CI and SI pixels should be as low as possible to produce the optimal SI.The PSNR is a perceptual transparency measure that computes the quality of the SI and it should be as high as possible[31,32].Equation(20)is used to measure the PSNR.where the mean square error(MSE)can be found using Equation(21).

    whereCijandSijare the pixels of CI and SI at(ithandjth)positions,respectively.

    SSIM computes the similarity between the CI and the SI using Equation(22).Its value lies in the ranges from?1 to 1,where 1 points to the highest similarity and?1 refers to the lowest similarity.

    FIGURE 8 SI(1)and SI(2)of respective CIs(Img1–Img8)

    wherePC,P2C,σ2CandQs,andσ2sare the mean,variance,and standard deviation for the CI and SI.?csrepresents the covariance between the 2 images.The constantk1=c1Landk2=c2L,wherec1=0.01,c2=0.03,andLis 255.The results of the proposed and existing techniques are analysed based on the average results of the chosen twelve images are recorded in Tables 1–5.The proposed LSBP‐RDH technique offers good quality SI with descent HC.Since the proposed work produces two different SIs,therefore,two different PSNR and SSIM values are obtained.The PSNR(1)and PSNR(2)refer to the PSNR values for the respective SIs.Similarly,SSIM(1),OBP(1)and SSIM(2),OBP(2)refer to the SSIM and OBP values for the respective SIs.With reference to PSNR and SSIM measures,the proposed work outperforms others as the PSNR(1)and SSIM(1)are superior with 52.36 dB and 0.9977,respectively.On the other hand,PSNR(2)and SSIM(2)values of the proposed technique are also acceptable with 47.13 dB and 0.9835,respectively.Similarly,BPP for the proposed technique is also satisfactory with 1.98.

    Additionally,the proposed technique readjusts the boundary pixels to avoid the OBP problem.Therefore,none of the SIs invite the OBP problem.At the same time,Chakraborty and Jalal's[14]technique(forμ=1)also offers good PSNR and SSIM with 52.33 dB and 0.9966,respectively.But the BPP for the technique remains 0.88 only.However,this technique invites the OBP problem.The OBP issue can further reduce the HC as well as perceptual transparency of the SI.Likewise,techniques in[15,24]offer reasonable PSNR andSSIM.However,both techniques suffer from the OBP problem.Jung's[26]technique offers superior HC at the cost of perceptual transparency.The PSNR of this technique falls below 30 dB.Furthermore,just as the technique in[15,24],this technique also suffers from the OBP issue.Lu et al.’s[11]technique utilises dual images for achieving reversibility using the LSB matching strategy.This strategy modifies the stego‐pixels at most of±1.Results achieved with respect to PSNR and SSIM for both the stego‐images are acceptable.Jung's[33]dual image‐based reversible technique using the PVD strategy also suffers with the OBP issue.Further,the quality of stego‐images obtained using Jung's[33]technique is low.Thus,the above discussion and achieved results provide sufficient evidence to support our claim regarding the ascendancy of the proposed technique.

    TABLE 1 Results of HC,BPP,PSNR(1),PSNR(2),SSIM(1),SSIM(2),OBP(1),and OBP(2)for the proposed LBP‐RDH technique

    TABLE 2 Results for Chakraborty and Jalal's[14]technique and Wu and Tsai's[15]technique

    4.2|Security analysis

    4.2.1|Pixel difference histogram(PDH)analysis

    The resistance of the proposed LBP‐RDH technique to PDH attacks is proved in this section.To begin with,the fluctuation between the consecutive pixels of the CI is extracted.Since theminimum and maximum values of a pixel in the image lie in the range of{0,255},therefore,the fluctuation values lie in between?255 and 255.Then,the fluctuations between the consecutive pixels in the corresponding SIs are also obtained.Finally,the PDH curve is plotted by considering the difference values and its frequency in the horizontal and vertical directions,respectively.In general,the PDH curve for the CI is smooth.Further,if we observe that the curve for the SI is also smooth and merges with the CI curve,then the proposed technique successfully withstands against the PDH analysis.On the contrary,if the curves of CI and SI are having different shapes and can be easily distinguished,then it leads to exposing the presence of EBs in the SI.The PDH‐plots of img1 to img3 for the CI and SI for the proposed technique are shown in Figure 9a–c.The obtained plots for both CI and its respective SIs do not show any visual artefacts or any abnormal fluctuations.Therefore,the presence of EBs in the SI of the proposed technique using the PDH analysis cannot be identified.Conversely,the obtained PDH‐plots(in Figure 10)for the existing techniques,such as technique in[15,24],and[26],are exposed to the PDH analysis.Thus,from this test,it is evident that the proposed work has shown excellent resilience to the PDH analysis.

    TABLE 3 Results for Jung's[26]technique and Khodaei et al.’s[24]technique

    TABLE 4 Results for Lu et al.’s[11]technique

    4.2.2|Regular and singular(RS)analysis

    In this section,the ability of the proposed work against the RS steganalysis is discussed.The RS analysis is a statistical analysis consisting of discrimination function,flipping masks,regularpixels(Rm,R?m),and singular pixels(Sm,S?m).The RS‐plot is produced by considering the values ofRM,R?M,Sm,andS?m.Thex‐axis of the RS plot represents the HC,and they‐axis represents the different pixel groups.The results of the obtained RS plot result in two conditions.The conditionRm≈R?m>Sm≈S?mindicates that the technique has successfully defeated the RS analysis.Contrary,the conditionR?m–S?m>Rm–Smindicates that the technique is exposed to the RS analysis.Figure 11a,b shows the RS plot for SIs of Img 1.Similarly,Figure 11c,d shows the RS plot for SIs of Img 2.From the obtained plots,it can be observed that the conditionRm≈R?m>Sm≈S?mis successfully satisfied.Therefore,the proposed LBP‐RDH technique is resistant to the RS analysis.

    TABLE 5 Results for Jung's[33]technique

    FIGURE 9 PDH plots for Img1 to Img3((a)–(c))for the proposed technique

    4.3|Limitation of the proposed technique

    The proposed LBP‐based reversible data hiding successfully achieves better HC,SI quality,and robustness to various attacks.However,aside from these merits,the proposed technique can be improved with respect to HC.Since,the proposed work utilises the LBP‐based strategy,therefore,it considers the texture and smooth images as identical while embedding the EBs.However,the pixel intensity of texture images makes it more suitable to embed more EBs as compared to smooth images.Therefore,the proposed work can be extended to achieve higher HC in texture images by combing LBP with the PVDS‐based technique.

    5|CONCLUSION

    FIGURE 1 0 PDH plots of Img1 for(a)Chakraborty and Jalal's[14]technique withμ=1,(b)Wu and Tsai's[15]technique,(c)Khodaei et al.’s[24]technique,and(d)Jung's[26]technique

    The proposed LBP‐based RDH technique maintains a rational balance between the contradictory measures,such as SI quality,PSNR,and security.Further,using the LBP descriptor,the LBP codes are obtained from each block of the CI.These LBP codes are used to further encrypt the EBs to achieve higher security.In the next phase,the encrypted bits are concealed in the CI pixels to obtain dual SI pixels by performing an efficient embedding strategy with minimal distortion.The results obtained from multiple tests show that the proposed work not only evades the existing OBP problem but also offers excellent anti‐steganalysis ability against different stego‐attacks.In the future,the proposed work can be extended to find optimal pixel positions for embedding using various deep learning techniques without reducing the imperceptibility,capacity,and security.

    ACKNOWLEDGEMENT

    We declare that this work is an independent work and no financial assistance has been received for the work.

    CONFLICT OF INTEREST

    The authors declare that there is no conflict of interest.

    DATA AVAILABILITY STATEMENT

    Data sharing is not applicable to this article as no datasets were generated or analysed during the current study.

    ORCID

    Monalisa Sahuhttps://orcid.org/0000-0002-6928-7017

    Sasanko Sekhar Gantayathttps://orcid.org/0000-0001-5518-7026

    Aditya Kumar Sahuhttps://orcid.org/0000-0003-4257-0688

    一个人看视频在线观看www免费| 欧美成人一区二区免费高清观看| .国产精品久久| 国产一区有黄有色的免费视频 | 国产一区二区在线av高清观看| 男女边吃奶边做爰视频| 国产91av在线免费观看| 亚洲国产色片| 99国产精品一区二区蜜桃av| 亚洲精品亚洲一区二区| 国产成人精品久久久久久| 中文字幕久久专区| 乱系列少妇在线播放| 卡戴珊不雅视频在线播放| 乱人视频在线观看| 精品久久久久久久久av| 少妇人妻一区二区三区视频| 国产亚洲5aaaaa淫片| 久久久久久久久久久免费av| 成人高潮视频无遮挡免费网站| 岛国毛片在线播放| 91狼人影院| 高清视频免费观看一区二区 | 桃色一区二区三区在线观看| 久久精品夜色国产| 国产黄色视频一区二区在线观看 | 国产熟女欧美一区二区| 你懂的网址亚洲精品在线观看 | 日韩av在线大香蕉| 亚洲五月天丁香| 能在线免费看毛片的网站| 亚洲最大成人手机在线| 国产精品熟女久久久久浪| 国产高清国产精品国产三级 | 岛国在线免费视频观看| 亚洲精品国产成人久久av| 久久久久久久午夜电影| 九九热线精品视视频播放| 亚洲国产欧洲综合997久久,| av免费在线看不卡| 久久久久久久久久黄片| 日韩三级伦理在线观看| 久久久久久久午夜电影| 欧美一区二区亚洲| 69人妻影院| 国产高清有码在线观看视频| 狠狠狠狠99中文字幕| 女人十人毛片免费观看3o分钟| 久久午夜福利片| 精品久久久久久久末码| 中文乱码字字幕精品一区二区三区 | 成人亚洲欧美一区二区av| 老司机影院毛片| 波野结衣二区三区在线| 欧美日韩综合久久久久久| 人人妻人人澡人人爽人人夜夜 | 真实男女啪啪啪动态图| 一级毛片aaaaaa免费看小| 国产色婷婷99| 18+在线观看网站| 熟妇人妻久久中文字幕3abv| 黄色一级大片看看| 人体艺术视频欧美日本| 欧美日韩综合久久久久久| 日本免费一区二区三区高清不卡| 波多野结衣高清无吗| 国产三级中文精品| 国产三级在线视频| 免费av不卡在线播放| 国产免费男女视频| 亚洲精品乱码久久久v下载方式| 精品99又大又爽又粗少妇毛片| 亚洲精品一区蜜桃| 亚洲人成网站高清观看| 亚洲在线自拍视频| 大又大粗又爽又黄少妇毛片口| 亚洲人成网站在线观看播放| 亚洲最大成人中文| h日本视频在线播放| 亚洲av二区三区四区| 国产午夜福利久久久久久| 插逼视频在线观看| 黄色欧美视频在线观看| 国产亚洲av片在线观看秒播厂 | 色播亚洲综合网| 一本久久精品| 乱系列少妇在线播放| 日本黄色片子视频| 特大巨黑吊av在线直播| 国产色爽女视频免费观看| 国产探花在线观看一区二区| 搞女人的毛片| 天堂网av新在线| 菩萨蛮人人尽说江南好唐韦庄 | av专区在线播放| 国产高清视频在线观看网站| 国产亚洲最大av| 久久久精品欧美日韩精品| 观看美女的网站| 亚洲精品影视一区二区三区av| av国产久精品久网站免费入址| 成人性生交大片免费视频hd| 精品一区二区三区视频在线| 日日摸夜夜添夜夜爱| 亚洲婷婷狠狠爱综合网| 国语对白做爰xxxⅹ性视频网站| 亚洲最大成人手机在线| 三级毛片av免费| 国产精品久久久久久精品电影小说 | 精品一区二区三区人妻视频| 亚洲真实伦在线观看| 深夜a级毛片| 亚洲国产精品专区欧美| 国产成年人精品一区二区| 成人特级av手机在线观看| 综合色丁香网| 国产免费视频播放在线视频 | 18禁在线无遮挡免费观看视频| 亚洲国产最新在线播放| 亚洲成人久久爱视频| 女人被狂操c到高潮| av黄色大香蕉| 麻豆一二三区av精品| h日本视频在线播放| 亚洲av日韩在线播放| 国产极品天堂在线| 搡女人真爽免费视频火全软件| 99热网站在线观看| 激情 狠狠 欧美| 亚洲aⅴ乱码一区二区在线播放| 插阴视频在线观看视频| 1024手机看黄色片| 18禁动态无遮挡网站| 亚洲人成网站高清观看| 高清视频免费观看一区二区 | 国产伦理片在线播放av一区| 内射极品少妇av片p| 成人亚洲欧美一区二区av| 男女啪啪激烈高潮av片| 91av网一区二区| 精品国产三级普通话版| 亚洲综合色惰| 国产精品人妻久久久影院| 日韩成人av中文字幕在线观看| 午夜免费激情av| 午夜爱爱视频在线播放| 成人亚洲精品av一区二区| 欧美97在线视频| 国产探花极品一区二区| 国产女主播在线喷水免费视频网站 | 淫秽高清视频在线观看| 非洲黑人性xxxx精品又粗又长| 精品一区二区免费观看| 草草在线视频免费看| www.av在线官网国产| 久久久久国产网址| 三级男女做爰猛烈吃奶摸视频| 亚洲激情五月婷婷啪啪| 久久精品夜夜夜夜夜久久蜜豆| 色哟哟·www| 97热精品久久久久久| 人妻系列 视频| 精品久久久噜噜| 国产精品一区二区三区四区免费观看| 麻豆久久精品国产亚洲av| 欧美日韩在线观看h| 国产亚洲午夜精品一区二区久久 | av福利片在线观看| 日本五十路高清| 中文精品一卡2卡3卡4更新| 欧美性猛交╳xxx乱大交人| 免费搜索国产男女视频| 成人av在线播放网站| 岛国在线免费视频观看| 亚洲内射少妇av| 一区二区三区免费毛片| 日韩一区二区三区影片| 国产精品麻豆人妻色哟哟久久 | 少妇高潮的动态图| 亚洲精品乱码久久久久久按摩| 男女下面进入的视频免费午夜| 一级毛片电影观看 | 亚洲av不卡在线观看| 亚洲天堂国产精品一区在线| 两性午夜刺激爽爽歪歪视频在线观看| 在线a可以看的网站| 国产 一区精品| 国产一区二区在线av高清观看| 日本爱情动作片www.在线观看| 六月丁香七月| 色视频www国产| 蜜桃久久精品国产亚洲av| 国产成人午夜福利电影在线观看| 精品国产一区二区三区久久久樱花 | 女的被弄到高潮叫床怎么办| 久久久久久久久久久丰满| 国产精品蜜桃在线观看| 美女被艹到高潮喷水动态| 色综合色国产| 亚洲国产高清在线一区二区三| 看非洲黑人一级黄片| АⅤ资源中文在线天堂| 综合色丁香网| 久99久视频精品免费| 中文字幕亚洲精品专区| 中文字幕av在线有码专区| 成人亚洲欧美一区二区av| 97人妻精品一区二区三区麻豆| 国产国拍精品亚洲av在线观看| 亚洲精品影视一区二区三区av| 国产麻豆成人av免费视频| 精品国内亚洲2022精品成人| 免费无遮挡裸体视频| 人人妻人人澡欧美一区二区| 色哟哟·www| 美女cb高潮喷水在线观看| 成人亚洲精品av一区二区| 国产又色又爽无遮挡免| 熟女电影av网| 午夜a级毛片| 欧美zozozo另类| 免费在线观看成人毛片| 国产成人精品一,二区| 欧美日韩综合久久久久久| 26uuu在线亚洲综合色| 亚洲综合色惰| 久久99热这里只频精品6学生 | 一级毛片aaaaaa免费看小| 色网站视频免费| 最新中文字幕久久久久| 免费观看人在逋| 欧美3d第一页| 国产午夜精品一二区理论片| 天天躁夜夜躁狠狠久久av| 亚洲欧洲日产国产| 久久久久九九精品影院| 亚洲人成网站在线播| 亚洲色图av天堂| 国产三级在线视频| 噜噜噜噜噜久久久久久91| 国产片特级美女逼逼视频| 啦啦啦观看免费观看视频高清| 国产伦理片在线播放av一区| 欧美一区二区精品小视频在线| 又粗又硬又长又爽又黄的视频| 美女内射精品一级片tv| 国产单亲对白刺激| 麻豆成人av视频| 国产精品国产三级专区第一集| 久久精品影院6| 老司机影院成人| 十八禁国产超污无遮挡网站| 国产毛片a区久久久久| 亚洲精品日韩在线中文字幕| www.色视频.com| 一区二区三区四区激情视频| 麻豆av噜噜一区二区三区| 国产伦精品一区二区三区四那| 永久免费av网站大全| 亚洲av成人av| 在线免费十八禁| 精品久久久噜噜| 国产女主播在线喷水免费视频网站 | 波多野结衣巨乳人妻| 99视频精品全部免费 在线| 久久这里只有精品中国| 国产成人a∨麻豆精品| 午夜精品国产一区二区电影 | 亚洲自偷自拍三级| 国产精品嫩草影院av在线观看| 啦啦啦观看免费观看视频高清| 午夜福利高清视频| 国产精品日韩av在线免费观看| 欧美xxxx性猛交bbbb| 免费一级毛片在线播放高清视频| 大话2 男鬼变身卡| 亚洲自偷自拍三级| 日韩亚洲欧美综合| 中文字幕久久专区| 午夜日本视频在线| 中文字幕熟女人妻在线| 乱系列少妇在线播放| 日韩一区二区视频免费看| 永久网站在线| 国产一区二区在线av高清观看| 亚洲欧美中文字幕日韩二区| 日韩视频在线欧美| 看免费成人av毛片| 日本午夜av视频| 日韩成人av中文字幕在线观看| 亚洲国产成人一精品久久久| 大香蕉久久网| 99久久中文字幕三级久久日本| 99在线视频只有这里精品首页| 国产激情偷乱视频一区二区| 久久精品人妻少妇| 美女xxoo啪啪120秒动态图| 国产v大片淫在线免费观看| 免费无遮挡裸体视频| 亚洲伊人久久精品综合 | 亚洲久久久久久中文字幕| 国产探花极品一区二区| av免费观看日本| av在线播放精品| 中文字幕免费在线视频6| 大香蕉久久网| 3wmmmm亚洲av在线观看| 一区二区三区免费毛片| videos熟女内射| 成人高潮视频无遮挡免费网站| 欧美日韩在线观看h| 观看美女的网站| 成年av动漫网址| 一个人看视频在线观看www免费| 午夜a级毛片| 99久久无色码亚洲精品果冻| 国产高清三级在线| 亚洲真实伦在线观看| 我要看日韩黄色一级片| 亚洲精品456在线播放app| 亚洲国产日韩欧美精品在线观看| 在线观看av片永久免费下载| 97超视频在线观看视频| 国产精品一区www在线观看| 国产精品人妻久久久久久| 深夜a级毛片| 国产高清有码在线观看视频| av线在线观看网站| 免费av不卡在线播放| 亚洲av福利一区| 久久国内精品自在自线图片| 99热精品在线国产| av播播在线观看一区| 欧美激情在线99| 中文在线观看免费www的网站| 人体艺术视频欧美日本| 久久精品影院6| 1024手机看黄色片| 日韩一区二区视频免费看| 亚洲真实伦在线观看| 91久久精品国产一区二区成人| 中文字幕人妻熟人妻熟丝袜美| 国产爱豆传媒在线观看| 午夜亚洲福利在线播放| 午夜福利成人在线免费观看| 美女脱内裤让男人舔精品视频| 国产高清视频在线观看网站| 水蜜桃什么品种好| 伦精品一区二区三区| 久久亚洲精品不卡| 男女视频在线观看网站免费| 99久久人妻综合| 国产女主播在线喷水免费视频网站 | 亚洲av二区三区四区| 精品一区二区免费观看| 春色校园在线视频观看| 亚洲在线自拍视频| 波多野结衣高清无吗| 91在线精品国自产拍蜜月| 国产大屁股一区二区在线视频| 精品一区二区三区人妻视频| 久久久久久久午夜电影| 国产单亲对白刺激| 欧美最新免费一区二区三区| 日韩欧美三级三区| av女优亚洲男人天堂| 国产午夜精品一二区理论片| 日产精品乱码卡一卡2卡三| 丰满乱子伦码专区| 18禁动态无遮挡网站| 欧美区成人在线视频| 有码 亚洲区| 人妻系列 视频| 国产精品1区2区在线观看.| 国产av不卡久久| 能在线免费观看的黄片| 欧美变态另类bdsm刘玥| 在线观看一区二区三区| 国产亚洲精品久久久com| 国产精品电影一区二区三区| 波多野结衣高清无吗| 校园人妻丝袜中文字幕| 最近最新中文字幕大全电影3| 国产乱人视频| 免费搜索国产男女视频| 一级毛片aaaaaa免费看小| 久久精品国产自在天天线| 老司机影院成人| 一个人看视频在线观看www免费| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 欧美97在线视频| 亚洲精品,欧美精品| 欧美成人一区二区免费高清观看| 日韩一区二区视频免费看| 日韩中字成人| 麻豆成人午夜福利视频| 伊人久久精品亚洲午夜| 日日撸夜夜添| 国产精品国产三级国产专区5o | 一夜夜www| 成人一区二区视频在线观看| www日本黄色视频网| 亚洲欧美清纯卡通| 搞女人的毛片| 国产高清视频在线观看网站| 亚洲va在线va天堂va国产| 国产 一区 欧美 日韩| 国产精品国产三级专区第一集| 亚洲熟妇中文字幕五十中出| 国产精品一二三区在线看| 身体一侧抽搐| 午夜亚洲福利在线播放| 亚洲人成网站高清观看| 国产免费福利视频在线观看| 两个人视频免费观看高清| 精品国内亚洲2022精品成人| 久久精品国产自在天天线| 国产黄色视频一区二区在线观看 | 两个人视频免费观看高清| 国产色婷婷99| 成人国产麻豆网| 精品人妻熟女av久视频| 亚洲性久久影院| 亚洲av成人av| 精品99又大又爽又粗少妇毛片| 国产精品国产三级国产专区5o | 99久久无色码亚洲精品果冻| av专区在线播放| 久久久久精品久久久久真实原创| 国产麻豆成人av免费视频| 三级男女做爰猛烈吃奶摸视频| 激情 狠狠 欧美| 久久人妻av系列| 国产午夜精品久久久久久一区二区三区| 欧美色视频一区免费| 黄色日韩在线| 我要搜黄色片| 国产欧美日韩精品一区二区| 久久久久久伊人网av| 亚洲国产成人一精品久久久| ponron亚洲| 18禁裸乳无遮挡免费网站照片| 国产伦理片在线播放av一区| 变态另类丝袜制服| 亚洲精品一区蜜桃| 日本午夜av视频| 51国产日韩欧美| 夜夜看夜夜爽夜夜摸| 久久精品久久精品一区二区三区| 亚洲av不卡在线观看| 国产欧美日韩精品一区二区| 国产伦精品一区二区三区视频9| 建设人人有责人人尽责人人享有的 | 欧美成人精品欧美一级黄| 91久久精品电影网| 日韩高清综合在线| 成人高潮视频无遮挡免费网站| 噜噜噜噜噜久久久久久91| 啦啦啦观看免费观看视频高清| av国产免费在线观看| 久久精品夜色国产| 1000部很黄的大片| 能在线免费看毛片的网站| 少妇熟女aⅴ在线视频| 噜噜噜噜噜久久久久久91| 青春草视频在线免费观看| 免费播放大片免费观看视频在线观看 | 非洲黑人性xxxx精品又粗又长| 熟女电影av网| 我要搜黄色片| 亚洲人成网站在线观看播放| 精品午夜福利在线看| 99久久成人亚洲精品观看| 国产精品无大码| 国产精品国产三级国产专区5o | 精品一区二区三区视频在线| 欧美日韩综合久久久久久| 两个人视频免费观看高清| 亚洲精华国产精华液的使用体验| 国产精品一区二区三区四区久久| 亚洲精品一区蜜桃| 中文欧美无线码| 在线免费观看不下载黄p国产| 精品一区二区三区人妻视频| 97热精品久久久久久| 看十八女毛片水多多多| 免费大片18禁| 免费av观看视频| 男女边吃奶边做爰视频| 大又大粗又爽又黄少妇毛片口| 国产欧美另类精品又又久久亚洲欧美| av黄色大香蕉| 男女下面进入的视频免费午夜| 欧美丝袜亚洲另类| 91久久精品电影网| 国产精品熟女久久久久浪| 老司机影院毛片| 亚洲婷婷狠狠爱综合网| 大香蕉久久网| 天美传媒精品一区二区| 国产成人一区二区在线| 舔av片在线| 国产在线男女| 欧美精品国产亚洲| 国产一区有黄有色的免费视频 | av.在线天堂| 一区二区三区免费毛片| 日韩,欧美,国产一区二区三区 | 欧美潮喷喷水| 亚洲伊人久久精品综合 | 欧美不卡视频在线免费观看| 日韩成人av中文字幕在线观看| 中国美白少妇内射xxxbb| 亚洲欧洲日产国产| 国产精品电影一区二区三区| 国产亚洲91精品色在线| 国产一区有黄有色的免费视频 | 边亲边吃奶的免费视频| 久久久色成人| 国产午夜福利久久久久久| 国产亚洲av嫩草精品影院| 欧美日韩一区二区视频在线观看视频在线 | 久99久视频精品免费| 成人毛片60女人毛片免费| 中文乱码字字幕精品一区二区三区 | 久久久久久久亚洲中文字幕| 国产精品一及| 午夜久久久久精精品| 在线免费观看的www视频| 中文在线观看免费www的网站| 91av网一区二区| 如何舔出高潮| 男人舔女人下体高潮全视频| 99久国产av精品| 免费观看a级毛片全部| 麻豆乱淫一区二区| 亚洲精品久久久久久婷婷小说 | 欧美日本视频| 91久久精品国产一区二区三区| 国产成人午夜福利电影在线观看| 狂野欧美激情性xxxx在线观看| 中文字幕av在线有码专区| 国产视频首页在线观看| 中国美白少妇内射xxxbb| 噜噜噜噜噜久久久久久91| 97超碰精品成人国产| 深爱激情五月婷婷| 国产午夜精品论理片| 免费观看人在逋| 搞女人的毛片| 日日摸夜夜添夜夜爱| 国产精品一区二区三区四区免费观看| 日本爱情动作片www.在线观看| 一个人看视频在线观看www免费| 狂野欧美激情性xxxx在线观看| 亚洲精华国产精华液的使用体验| 噜噜噜噜噜久久久久久91| 亚洲性久久影院| 一个人免费在线观看电影| 久久鲁丝午夜福利片| 亚洲aⅴ乱码一区二区在线播放| 网址你懂的国产日韩在线| 久久99热这里只频精品6学生 | 精华霜和精华液先用哪个| 中文字幕亚洲精品专区| 精品国产三级普通话版| 久久精品国产鲁丝片午夜精品| 美女黄网站色视频| 黄色欧美视频在线观看| 亚洲欧洲日产国产| 中文字幕制服av| 九九久久精品国产亚洲av麻豆| av黄色大香蕉| 亚洲国产欧美在线一区| 国产激情偷乱视频一区二区| 综合色av麻豆| 亚洲,欧美,日韩| 亚洲aⅴ乱码一区二区在线播放| av天堂中文字幕网| 99久久精品国产国产毛片| 永久免费av网站大全| 一级黄片播放器| 中文欧美无线码| 国产精品久久电影中文字幕| 亚洲伊人久久精品综合 | 永久网站在线| 国产美女午夜福利| 久久99精品国语久久久| 美女高潮的动态| 久久精品久久久久久噜噜老黄 | 日韩制服骚丝袜av| 老师上课跳d突然被开到最大视频| 亚洲国产欧洲综合997久久,| 亚洲三级黄色毛片| 久久精品影院6| 日日摸夜夜添夜夜添av毛片| 视频中文字幕在线观看| 白带黄色成豆腐渣| 一本久久精品| 亚洲精品aⅴ在线观看| 国产中年淑女户外野战色| 美女大奶头视频| 色尼玛亚洲综合影院| 97超视频在线观看视频| av专区在线播放| 青青草视频在线视频观看| h日本视频在线播放| 最近手机中文字幕大全| 国产爱豆传媒在线观看| 日本黄色片子视频| 成人国产麻豆网| 亚洲在线观看片| 亚洲av电影在线观看一区二区三区 | 亚洲av男天堂| 看片在线看免费视频|