• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Local binary pattern‐based reversible data hiding

    2022-12-31 03:48:04MonalisaSahuNeelamadhabPadhySasankoSekharGantayatAdityaKumarSahu

    Monalisa Sahu|Neelamadhab Padhy|Sasanko Sekhar Gantayat|Aditya Kumar Sahu

    1Department of Computer Science and Engineering,School of Engineering and Technology,GIET University,Gunupur,Odisha,India

    2Department of Computer Science and Engineering,GMRIT,Rajam,Andhra Pradesh,India

    3Department of CSE,Vignan's Foundation for Science Technology and Research,Vadlamudi,Andhra Pradesh,India

    Abstract A novel local binary pattern‐based reversible data hiding(LBP‐RDH)technique has been suggested to maintain a fair symmetry between the perceptual transparency and hiding capacity.During embedding,the image is divided into various 3×3 blocks.Then,using the LBP‐based image descriptor,the LBP codes for each block are computed.Next,the obtained LBP codes are XORed with the embedding bits and are concealed in the respective blocks using the proposed pixel readjustment process.Further,each cover image(CI)pixel produces two different stego‐image pixels.Likewise,during extraction,the CI pixels are restored without the loss of a single bit of information.The outcome of the proposed technique with respect to perceptual transparency measures,such as peak signal‐to‐noise ratio and structural similarity index,is found to be superior to that of some of the recent and state‐of‐the‐art techniques.In addition,the proposed technique has shown excellent resilience to various stego‐attacks,such as pixel difference histogram as well as regular and singular analysis.Besides,the out‐off boundary pixel problem,which endures in most of the contemporary data hiding techniques,has been successfully addressed.

    KEYWORDS hiding capacity(HC),local binary pattern(LBP),peak signal‐to‐noise ratio(PSNR),reversible data hiding

    1|INTRODUCTION

    Steganography is a data hiding technique to disguise the secret data to deceive the invader[1].Recently,voluminous data hiding techniques have been proposed by authors in the literature.These techniques are grouped into either reversible or irreversible[2].Reversible data hiding(RDH)techniques can reproduce the carrier object as well as the concealed information within it.At the same time,irreversible data hiding techniques essentially focus on the successful retrieval of the embedding bits(EBs)only[3].The efficacy of any technique fundamentally lies in measures like hiding capacity(HC),perceptual transparency,and security[4].In the context of data hiding using images,the HC refers to the number of EBs that can be concealed in that image.In this study,the image that is utilised for concealing the EBs is termed as a cover image(CI).On the other hand,the image after concealing the EBs is termed as a stego‐image(SI).The perceptual transparency points to the resemblance between the respective CI and SI[5].Generally,peak signal‐to‐noise ratio(PSNR)and structural similarity index(SSIM)are the two crucial parameters to gauge perceptual transparency[6].Finally,the ability to withstand various stego‐attacks is substantial to measure the efficacy of the technique.

    Literature has developed a collection of irreversible data hiding techniques and most of them are classified into one of the following classifications,such as(1)least significant bit substitution(LSBS),(2)pixel value differencing steganography(PVDS),(3)modulus function steganography(MFS),and(4)exploiting modification direction steganography(EMDS).The LSBS technique simply substitutes the rightmost bits of the CI pixel with the EBs.Wang et al.[7]suggested a genetic algorithm‐based LSBS technique to attain optimal the SI quality using the perceptual modelling strategy.Wu and Hwang[8]proposed the XOR‐based embedding technique using an LSB strategy to conceal the EBs with an utmost of±1 deviation to that of the SI pixels.However,Fridrich et al.[9]found that most of the conventional LSBS techniques are exposed to the regular and singular(RS)statistical analysis.Mielikainen[10]devised the LSB matching technique using±1 modification strategy to achieve a high‐quality SI.Additionally,the proposed LSB matching technique can survive the regular and singular(RS)analysis successfully.Further,the authors in Refs.[11–13,33]have suggested several reversible data hiding(RDH)techniques in the literature.

    The pixel value differencing steganography(PVDS)technique for the greyscale images introduced by Wu and Tsai[15]is considered as one of the noteworthy developments in the field of steganography.The PVDS technique conceals the EBs in the CI pixels using the fluctuation among the consecutive pixels.The consecutive pixels with greater fluctuation values can conceal relatively more EBs than that of the pixels with lower fluctuation values.The PVDS technique successfully resists the RS analysis with acceptable HC.However,Wang et al.[16]observed that after concealing the EBs,the stego‐image(SI)pixels obtained from Wu and Tsai's[15]PVDS technique go beyond 255 or fall below 0.This leads to an out‐off boundary pixel(OBP)problem.Further,the EBs cannot be extracted accurately from the OBP pixels.In this regard,to avoid OBP,Wang et al.[16]proposed a novel embedding strategy using both PVDS and modulus function.Later,Joo et al.[17]found that the existence of EBs can be revealed in Wang et al.’s[16]technique using the pixel difference histogram(PDH)analysis.Thus,to avoid the abnormal fluctuations in the PDH curve,Joo et al.[17]suggested an improved PVD and MFS technique using turnover and pixel readjustment strategies.The turnover strategy ensures that the difference between the histogram curve for the respective CI and SI is as low as possible.

    Prasad and Pal[18]extended the PVD technique in[15]to colour images using a pixel overlapping strategy to raise the HC.Luo et al.[19]found that the presence of EBs in Wu and Tsai's[15]technique can be exposed using the PDH analysis.The major reason behind this is Wu and Tsai's PVD[15]technique that considers the fluctuation between the consecutive pixels in the horizontal direction alone.However,considering the fluctuation in horizontal,vertical,and diagonal directions to conceal the EBs is more prolific to resist the PDH analysis.In this regard,the authors in[19,20]suggested the adaptive quantisation range‐based PVD technique by considering multiple directions while concealing the EBs.Recently,Hameed et al.[21]extended Wu and Tsai's PVD[15]technique in colour images to achieve higher HC.Here,the fluctuations among the pixels of a block from all three directions are considered for concealing the EBs.The suggested LSBS+PVDS technique in[22]is considered as one of the significant additions to this field.In this technique,PVDS is applied when the fluctuation between two consecutive pixels is more than 15.Otherwise,LSBS embedding is performed.Khodaei and Faez[23]extended Wu et al.’s[22]LSBS+PVDS technique to achieve higher HC.Khodaei et al.[24]proposed an improved adaptive LSBS+PVDS technique to increase the HC without reducing the SI quality.However,it has been found that the suggested technique has shown less resistance against the RS analysis.Hussain et al.[25]found that the distortion caused in the SI can be avoided by using a novel range table based on pixel differences.In this regard,the suggested adaptive LSBS+PVDS technique achieved acceptable HC as well as the improved SI quality.In[26],the author has improved the HC of the CI using LSBS+PVDS and bit plane strategies.However,this technique could not able to resist different steganalysis attacks.Zhao et al.[27]devised a combination of PVDS and modulus function‐based strategy to achieve higher embedding efficiency.The authors in[28]found the edge directions from the CI to identify the block of interest where data can be embedded using either LSBS or PVDS strategy.Experiment on different attacks suggests that the suggested work can resist both PDH as well as RS attacks successfully.

    1.1|Research motivation

    Literature suggests that the LSBS technique offers higher HC compared to other image steganography techniques[29].However,LSBS techniques are vulnerable to RS analyses.In contrast,the PVDS technique can survive the RS analysis but provides limited HC.Further,the majority of the PVDS‐based techniques,such as in[15,22–24,26],are exposed to the PDH analysis.Recently,Chakraborty and Jalal[14]have extended the ability of local binary pattern(LBP)visual descriptors in the data hiding domain.Further,the suggested LBP‐based data hiding technique can successfully resist both RS as well as PDH analyses.However,in this study,we identified the weakness of Chakraborty and Jalal's[14]LBP‐based data hiding technique.From the experiment,it has been observed that the boundary pixels,such as 0 and 255,are vulnerable to the OBP problem(elaborated in Section 2.1).The OBP problem results when a stego‐pixel value falls out of the permissible range for an image pixel,that is,{0,255}after concealing the secret bits.Such pixels cannot be utilised for concealing the EBs.Further,the existence of OBP in an image significantly reduces the HC for the technique.Additionally,precise extraction of the EBs is impossible in the case of OBPs.To evade the OBP problem and to achieve a fair trade‐off between the HC and perceptual transparency measures,this study proposes the LBP‐based reversible data hiding(LBP‐RDH)technique.

    1.2|Research contribution

    The advocated LBP‐RDH technique first partitions the image into diverse blocks having 3×3 pixels each.Then,the LBP codes from each block are extracted.Next,using the obtained codes and the proposed pixel readjustment strategy,two SI pixels are produced from each CI pixel.The substantial improvements that the proposed work offers are as follows:

    (1)The OBP problem has been avoided by readjusting the boundary pixels.

    (2)Further,a fair trade‐off between the conflicting metrics,such as high HC,perceptual transparency,and security,has been achieved.

    (3)The proposed technique shows strong anti‐steganalysis ability to PDH as well as RS attacks.

    (4)Finally,the proposed LBP‐RDH technique aptly recovers the CI at the recipient.Moreover,it is impossible to regain the EBs or the original CI without one of the SIs.

    1.3|Organization

    The remainder of the work is structured as follows.Chakraborty and Jalal's[14]technique and its inherent issues have been explored in Section 2.Section 3 presents the proposed LBP‐RDH technique with an illustration.The result of the proposed work has been compared with recent and related state‐of‐the‐art techniques in Section 4.Finally,the conclusion has been drawn in Section 5.

    2|RELATED WORK

    2.1|Existing technique

    In this section,LBP‐based steganography technique proposed by Chakraborty and Jalal[14]is discussed.Here,embedding is performed by exploring the local features of the image.At first,the CI is partitioned into various 3×3 blocks.Then,the LBP code is obtained from the respective blocks.Considering Figure 1 as one of the CI blocks,the embedding and extraction procedures are discussed.The CI block consists of 9 pixels.Considerpcas the central pixel and∑be the neighbouring pixels.

    The LBP codes for each block of an image are obtained using the functionf(.).The functionf(.)is defined in Equation(1).Fori=1–8,let LBPciBbe the eight‐bit LBP binary string for the first CI block obtained from Equation(2).

    Fori=1 to 8,letbibe the eight EBs to embed in the CI block.Again,the EBs are modified using the XOR operation as given in Equation(3)to produce encrypted bits(EBci).

    FIGURE 1 CI block

    The EBcicontains eight bits,such as EBc1,EBc2,EBc3,EBc4,EBc5,EBc6,EBc7,and EBc8.Now,swap the values of EBc1and EBc2,EBc3and EBc4,EBc5and EBc6,and EBc7and EBc8.Then,embed these EBciin the least significant position of the respective neighbour pixels ofpcas follows:EBc1is embedded in the right‐side neighbour pixel ofpc.EBc2is embedded in the upper‐right neighbour pixel ofpc.Similarly,EBc3,EBc4,EBc5,EBc6,EBc7,and EBc8are embedded in top,top‐left,left,lower‐left,lower,and lower‐right pixels,respectively.However,no bit is embedded inpc.After embedding EBci,the updated values ofpipixels are nowp′i.Finally,to preserve the local relationship among the pixels of the block,the synchronisation step is performed using Equation(4).

    whereμis the number of substituted bits.

    Considering Figure 2 as a SI block,obtain the LBPsiBfor the SI block using Equations(1)and(2).Next,find the EBsifrom the least significant position ofThe EBsicontains the eight bits,such as EBs1,EBs2,EBs3,EBs4,EBs5,EBs6,EBs7,and EBs8.Now,swap the values of EBs1and EBs2,EBs3and EBs4,EBs5and EBs6,and EBs7and EBs8.Finally,obtain original EBs using Equation(5).

    2.2|Exploring the issues in Chakraborty and Jalal's[14]technique

    The LBP‐based image steganography technique proposed by Chakraborty and Jalal's[14]technique produces imperceptible SI.However,two distinct problems are identified in Chakraborty and Jalal's[14]technique withμ=1,such as(1)the inadequate embedding strategy and(2)the OBP problem.The following section discusses both the problems.

    Problem 1:Inadequate embedding strategy(withμ=1):

    FIGURE 2 SI block

    The technique in[14]embeds the EBs in each CI block consisting of 9 pixels.As no bit is embedded inpc,each block embeds one fewer bit than the total number of pixels in the block.So,1/9th of the pixels of the whole image are not utilised for embedding any bits.In this way,if we choose the CI with a size of 512×512 pixels,then almost 29,127 pixels are left unused out of 262,144 pixels.By doing so,the number of unused pixels keeps increasing with increased image size.This problem can be addressed,ifpcof each block is also considered for embedding the bits.

    Problem 2:OBP problem:

    In an image,the value for each pixel lies in between{0–255}.After embedding the bits,if the SI pixels'value goes beyond{0–255},then the OBP arises.Once a pixel suffers from an OBP problem,then proper readjustment needs to be performed to bring back the pixel to{0–255}range.This readjustment can be done at the cost of HC and perceptual transparency.Further,it is also observed that the EBs that are embedded in such pixels cannot be retrieved accurately.Chakraborty and Jalal's[14]technique suffers from an OBP problem.Figure 3 displays a pictorial illustration of the OBP problem in[14].

    3|PROPOSED WORK

    In this paper,LBP‐based RDH technique has been proposed to preserve the local statistical feature among the pixels of an image.The proposed LBP‐RDH technique conceals two bits of information in each CI pixel by producing two distinct SI pixels.Later,the original CI,as well as the EBs,can be reversibly convertible from the produced SIs at the recipient end.The proposed technique first partitions the image into different 3×3 sized blocks.Each 3×3 block consists of nine pixels with one central pixel(pc).An illustration of a 3×3 block is shown in Figure 1.Following this,the embedding,extraction,and CI restoration steps for one of the blocks are presented.

    3.1|Embedding steps

    Step1 Considering Figure 1 as one of the CI blocks(B),the embedding of eighteen bitsis performed using the ensuing steps.

    Step2 Fori=1 to 8,let LBPciBbe the 8 bit LBP codes that are obtained from the block using Equations(6)and(7).

    Step3 Divide theEBs into three segments,such as EBci1,EBci2,and EBci3.EBci1and EBci2containandEBs,respectively.On the other hand,EBci3containsEBs.

    FIGURE 3 Illustration of the OBP problem in Chakraborty and Jalal's[14]technique with μ=1

    Step4 The three segments are encrypted using the XOR operation to obtain encrypted EBs(EEBs)using Equations(8)–(10).

    Step5 Next,concatenate the obtained EEBs to find the total encrypted EBs(TEBs).Lettibe the TEBs for B.

    Step6 Then,divide the TEBstiinto nine segmentssiwhere each segmentsiconsists of 2 consecutive bits each.The bits that are present in the segments∑siare embedded in the LSB position ofpi,whereas segments9is embedded inpc.Now,convert the segments∑siinto its respective decimal values.

    Step7 During embedding,the CI pixels are readjusted using the following steps.At first,the pixels are grouped into 4 classes.Class 1 pixels are those whose value ranges between 2 and 254,class 2 pixels are having value 0,class 3 pixels are having value 1,and class 4 pixels have the value of 255.

    Step7.1 Fori=1 to 8,to embed the segments in class 1 pixels,observe Equation(11)to obtain the corresponding SI pixelsp*iandq*i.

    Step7.2 Fori=1 to 8,to embed the segments in class 2 pixels,observe Equation(12)to obtain the corresponding SI pixels(p*iandq*i).

    Step7.3 Fori=1 to 8,to embed the segments in class 3 pixels,observe Equation(13)to obtain the corresponding SI pixels(p*iandq*i).

    Step7.4 Fori=1 to 8,to embed the segments in class 4 pixels,observe Equation(14)to obtain the corresponding SI pixels(p*iandq*i).

    Step8 Finally,s9is embedded in the central pixelpcusing Equations(11)–(14).Here,pcwill be used instead ofpito obtain(p*c,q*c).Figure 4a,b shows the SI pixels for the CI block shown in Figure 1.

    Step9 Embedding is completed.

    3.2|EBs extraction and CI restoration steps:

    Step1 Considering the SI blocks shown in Figure 4a,b,the extraction as well as the CI restoration procedures are performed.

    Step2 Fori=1–8,the CI pixelsof the block are restored by following Equation(15).However,while obtainingpc,the stego‐central pixelsp*candq*cneed to be chosen instead ofp*iandq*i.

    FIGURE 4 SI blocks(a)and(b)

    Step3 Fori=1–8,the decimal of TEBsis obtained by following Equation(16).However,while obtaining s9,the stego‐central pixelsp*candq*cneed to be chosen instead ofp*iandq*i.

    Step4 Fori=1 to 8,obtain the LBPsiBconsisting of 8‐bit LBP codes from Equations(6)and(7)using restoredpiandpc.

    Step5 Then,convert the obtainedsiinto its respective two‐bit binary bits.Let the obtained 18 encrypted bits are∑ni.Divide the bits into three segments,such as EBsi1,and EBs3i.EBs1iand EBs2icontainandbits,respectively.On the other hand,EBs3icontainsbits.

    Step6 Now using Equations(17)–(19),obtain the EBs as EB1,EB2,and EB3.

    Step7 Finally,concatenate EB1,EB2,and EB3to obtain the EBs.

    Step8 Extraction is completed.

    3.3|Illustration of the proposed technique

    An illustration of the proposed technique is presented here.Figure 5 illustrates the embedding and pixel restoration processes,and Figure 6 illustrates the EBs extraction process.Let the nine CI pixels of the block arep1=240,p2=239,p3=241,p4=240,pc=240,p5=241,p6=240,p7=240,andp8=241.At first,obtain the LBP codes using Equations(6)and(7)from the block as LBPciB=(1,1,0,1,0,1,1,0).Assume that the EBsaree1=1,e2=1,e3=0,e4=0,e5=0,e6=0,e7=1,e8=1,e9=1,e10=0,e11=0,e12=0,e13=0,e14=1,e15=1,e16=1,e17=0,ande18=0.These EBs are partitioned into 3 segments.The EBci1segment consists of{1,1,0,0,0,0,1,1}.Similarly,EBci2and EBci3segments are{1,0,0,0,0,1,1,1}and{0,0},respectively.Next,using Equations(8)–(10),the encrypted bits EEBci1,EEBci2,and EEBci3are obtained as(0,0,0,1,0,1,0,1},{0,1,0,1,0,0,0,1),and(0,0).So,the total encrypted bits(TEBs)∑tiare(0,0,0,1,0,1,0,1,0,1,0,1,0,0,0,1,0,0).Now,obtain the nine different segments in decimal asares1=0,s2=1,s3=1,s4=1,s5=1,s6=1,s7=0,s8=1,and s9=0.Finally,using Equations(11)–(14),the EBs are concealed to obtain the corresponding SI pixels asp*1=240,

    p*2=239,p*3=241,p*4=240,p*c=240,p*5=241,p*6=240,p*7=240,p*8=241 andq*1=240,q*2=238,q*3=240,q*4=239,q*c=240,q*5=240,q*6=239,q*7=240,andq*8=240.At the extraction end,the CI pixels are restored using Equation(15)asp1=240,p2=239,p3=241,p4=240,pc=240,p5=241,p6=240,p7=240,andp8=241.Next,using Equation(16),the decimalares1=0,s2=1,s3=1,s4=1,s5=1,s6=1,s7=0,s8=1,ands9=0.The LBP codes obtained from the restored block areLBPsi B=(1,1,0,1,0,1,1,0).Again obtain theasn1=00,n2=01,n3=01,n4=01,n5=01,n6=01,n7=00,n8=1,andn9=01.Then,find EBsi1,EBsi2,and EBsi3and using Equations(17)–(19),obtain EB1=(1,1,0,0,0,0,1,1),EB2=(1,0,0,0,0,1,1,1),and EB3=(0,0).Finally,concatenating EB1,EB2,and EB3,the EBs can be extracted ase1=1,e2=1,e3=0,e4=0,e5=0,e6=0,e7=1,e8=1,e9=1,e10=0,e11=0,e12=0,e13=0,e14=1,e15=1,e16=1,e17=0,ande18=0.

    FIGURE 5 An illustration of embedding and pixel restoration processes for the proposed LBP‐RDH technique

    FIGURE 6 An illustration of the extraction of EBs using the proposed LBP‐RDH technique

    4|RESULTS AND DISCUSSION

    FIGURE 7 CIs for the experiment

    The proposed LBP‐RDH technique has been implemented using Matlab 2015R in Windows 10 platform.Twelve random greyscale images with a size of 512×512 are chosen as CIs and are shown in Figure 7.The corresponding SIs are shown in Figure 8.The performance of the proposed technique has been assessed using perceptual transparency measures,such as PSNR and SSIM.Further,the OBP problem of the proposed and existing techniques is also analysed for the respective images.Additionally,the ability of the proposed work to resist the PDH and RS analyses is also presented.

    4.1|Performance analysis with respect to HC,PSNR,and SSIM

    The HC of a technique refers to the total number of embedding bits an image can conceal.This is also usually measured in terms of bits per pixel(BPP)[30].With respect to visual similarity,the SI should be highly imperceptible to the CI.A high imperceptible SI leads to low distortion in the image.In this regard,the fluctuation between the CI and SI pixels should be as low as possible to produce the optimal SI.The PSNR is a perceptual transparency measure that computes the quality of the SI and it should be as high as possible[31,32].Equation(20)is used to measure the PSNR.where the mean square error(MSE)can be found using Equation(21).

    whereCijandSijare the pixels of CI and SI at(ithandjth)positions,respectively.

    SSIM computes the similarity between the CI and the SI using Equation(22).Its value lies in the ranges from?1 to 1,where 1 points to the highest similarity and?1 refers to the lowest similarity.

    FIGURE 8 SI(1)and SI(2)of respective CIs(Img1–Img8)

    wherePC,P2C,σ2CandQs,andσ2sare the mean,variance,and standard deviation for the CI and SI.?csrepresents the covariance between the 2 images.The constantk1=c1Landk2=c2L,wherec1=0.01,c2=0.03,andLis 255.The results of the proposed and existing techniques are analysed based on the average results of the chosen twelve images are recorded in Tables 1–5.The proposed LSBP‐RDH technique offers good quality SI with descent HC.Since the proposed work produces two different SIs,therefore,two different PSNR and SSIM values are obtained.The PSNR(1)and PSNR(2)refer to the PSNR values for the respective SIs.Similarly,SSIM(1),OBP(1)and SSIM(2),OBP(2)refer to the SSIM and OBP values for the respective SIs.With reference to PSNR and SSIM measures,the proposed work outperforms others as the PSNR(1)and SSIM(1)are superior with 52.36 dB and 0.9977,respectively.On the other hand,PSNR(2)and SSIM(2)values of the proposed technique are also acceptable with 47.13 dB and 0.9835,respectively.Similarly,BPP for the proposed technique is also satisfactory with 1.98.

    Additionally,the proposed technique readjusts the boundary pixels to avoid the OBP problem.Therefore,none of the SIs invite the OBP problem.At the same time,Chakraborty and Jalal's[14]technique(forμ=1)also offers good PSNR and SSIM with 52.33 dB and 0.9966,respectively.But the BPP for the technique remains 0.88 only.However,this technique invites the OBP problem.The OBP issue can further reduce the HC as well as perceptual transparency of the SI.Likewise,techniques in[15,24]offer reasonable PSNR andSSIM.However,both techniques suffer from the OBP problem.Jung's[26]technique offers superior HC at the cost of perceptual transparency.The PSNR of this technique falls below 30 dB.Furthermore,just as the technique in[15,24],this technique also suffers from the OBP issue.Lu et al.’s[11]technique utilises dual images for achieving reversibility using the LSB matching strategy.This strategy modifies the stego‐pixels at most of±1.Results achieved with respect to PSNR and SSIM for both the stego‐images are acceptable.Jung's[33]dual image‐based reversible technique using the PVD strategy also suffers with the OBP issue.Further,the quality of stego‐images obtained using Jung's[33]technique is low.Thus,the above discussion and achieved results provide sufficient evidence to support our claim regarding the ascendancy of the proposed technique.

    TABLE 1 Results of HC,BPP,PSNR(1),PSNR(2),SSIM(1),SSIM(2),OBP(1),and OBP(2)for the proposed LBP‐RDH technique

    TABLE 2 Results for Chakraborty and Jalal's[14]technique and Wu and Tsai's[15]technique

    4.2|Security analysis

    4.2.1|Pixel difference histogram(PDH)analysis

    The resistance of the proposed LBP‐RDH technique to PDH attacks is proved in this section.To begin with,the fluctuation between the consecutive pixels of the CI is extracted.Since theminimum and maximum values of a pixel in the image lie in the range of{0,255},therefore,the fluctuation values lie in between?255 and 255.Then,the fluctuations between the consecutive pixels in the corresponding SIs are also obtained.Finally,the PDH curve is plotted by considering the difference values and its frequency in the horizontal and vertical directions,respectively.In general,the PDH curve for the CI is smooth.Further,if we observe that the curve for the SI is also smooth and merges with the CI curve,then the proposed technique successfully withstands against the PDH analysis.On the contrary,if the curves of CI and SI are having different shapes and can be easily distinguished,then it leads to exposing the presence of EBs in the SI.The PDH‐plots of img1 to img3 for the CI and SI for the proposed technique are shown in Figure 9a–c.The obtained plots for both CI and its respective SIs do not show any visual artefacts or any abnormal fluctuations.Therefore,the presence of EBs in the SI of the proposed technique using the PDH analysis cannot be identified.Conversely,the obtained PDH‐plots(in Figure 10)for the existing techniques,such as technique in[15,24],and[26],are exposed to the PDH analysis.Thus,from this test,it is evident that the proposed work has shown excellent resilience to the PDH analysis.

    TABLE 3 Results for Jung's[26]technique and Khodaei et al.’s[24]technique

    TABLE 4 Results for Lu et al.’s[11]technique

    4.2.2|Regular and singular(RS)analysis

    In this section,the ability of the proposed work against the RS steganalysis is discussed.The RS analysis is a statistical analysis consisting of discrimination function,flipping masks,regularpixels(Rm,R?m),and singular pixels(Sm,S?m).The RS‐plot is produced by considering the values ofRM,R?M,Sm,andS?m.Thex‐axis of the RS plot represents the HC,and they‐axis represents the different pixel groups.The results of the obtained RS plot result in two conditions.The conditionRm≈R?m>Sm≈S?mindicates that the technique has successfully defeated the RS analysis.Contrary,the conditionR?m–S?m>Rm–Smindicates that the technique is exposed to the RS analysis.Figure 11a,b shows the RS plot for SIs of Img 1.Similarly,Figure 11c,d shows the RS plot for SIs of Img 2.From the obtained plots,it can be observed that the conditionRm≈R?m>Sm≈S?mis successfully satisfied.Therefore,the proposed LBP‐RDH technique is resistant to the RS analysis.

    TABLE 5 Results for Jung's[33]technique

    FIGURE 9 PDH plots for Img1 to Img3((a)–(c))for the proposed technique

    4.3|Limitation of the proposed technique

    The proposed LBP‐based reversible data hiding successfully achieves better HC,SI quality,and robustness to various attacks.However,aside from these merits,the proposed technique can be improved with respect to HC.Since,the proposed work utilises the LBP‐based strategy,therefore,it considers the texture and smooth images as identical while embedding the EBs.However,the pixel intensity of texture images makes it more suitable to embed more EBs as compared to smooth images.Therefore,the proposed work can be extended to achieve higher HC in texture images by combing LBP with the PVDS‐based technique.

    5|CONCLUSION

    FIGURE 1 0 PDH plots of Img1 for(a)Chakraborty and Jalal's[14]technique withμ=1,(b)Wu and Tsai's[15]technique,(c)Khodaei et al.’s[24]technique,and(d)Jung's[26]technique

    The proposed LBP‐based RDH technique maintains a rational balance between the contradictory measures,such as SI quality,PSNR,and security.Further,using the LBP descriptor,the LBP codes are obtained from each block of the CI.These LBP codes are used to further encrypt the EBs to achieve higher security.In the next phase,the encrypted bits are concealed in the CI pixels to obtain dual SI pixels by performing an efficient embedding strategy with minimal distortion.The results obtained from multiple tests show that the proposed work not only evades the existing OBP problem but also offers excellent anti‐steganalysis ability against different stego‐attacks.In the future,the proposed work can be extended to find optimal pixel positions for embedding using various deep learning techniques without reducing the imperceptibility,capacity,and security.

    ACKNOWLEDGEMENT

    We declare that this work is an independent work and no financial assistance has been received for the work.

    CONFLICT OF INTEREST

    The authors declare that there is no conflict of interest.

    DATA AVAILABILITY STATEMENT

    Data sharing is not applicable to this article as no datasets were generated or analysed during the current study.

    ORCID

    Monalisa Sahuhttps://orcid.org/0000-0002-6928-7017

    Sasanko Sekhar Gantayathttps://orcid.org/0000-0001-5518-7026

    Aditya Kumar Sahuhttps://orcid.org/0000-0003-4257-0688

    一级二级三级毛片免费看| 亚洲欧美日韩东京热| 三级国产精品欧美在线观看| 精品人妻偷拍中文字幕| 在线天堂最新版资源| 简卡轻食公司| 18禁在线无遮挡免费观看视频| 亚洲,一卡二卡三卡| 视频中文字幕在线观看| 国产成人免费无遮挡视频| 精品一区在线观看国产| 欧美国产精品一级二级三级 | 免费高清在线观看视频在线观看| 亚洲精品日韩在线中文字幕| 免费人妻精品一区二区三区视频| 久久久成人免费电影| 精品少妇久久久久久888优播| 99热这里只有是精品在线观看| 一级毛片aaaaaa免费看小| 成年美女黄网站色视频大全免费 | 精品国产乱码久久久久久小说| 97在线视频观看| 成年人午夜在线观看视频| 又黄又爽又刺激的免费视频.| 波野结衣二区三区在线| 成人国产麻豆网| 嫩草影院新地址| 性色av一级| 日韩欧美一区视频在线观看 | 国产精品人妻久久久影院| 国模一区二区三区四区视频| 亚洲国产毛片av蜜桃av| 国产女主播在线喷水免费视频网站| 中国三级夫妇交换| 亚洲国产精品成人久久小说| 精品视频人人做人人爽| 天天躁夜夜躁狠狠久久av| 欧美精品国产亚洲| 最近2019中文字幕mv第一页| 97超碰精品成人国产| 日韩av在线免费看完整版不卡| 日本猛色少妇xxxxx猛交久久| 久久久色成人| 国产免费又黄又爽又色| 边亲边吃奶的免费视频| 国产精品精品国产色婷婷| 在线免费观看不下载黄p国产| h视频一区二区三区| 午夜福利网站1000一区二区三区| 激情五月婷婷亚洲| 嘟嘟电影网在线观看| 欧美+日韩+精品| 亚洲熟女精品中文字幕| 美女内射精品一级片tv| 一个人免费看片子| 在线观看av片永久免费下载| 欧美一区二区亚洲| 99热这里只有精品一区| 成人亚洲精品一区在线观看 | 成人二区视频| 伊人久久精品亚洲午夜| 精品一区二区免费观看| 亚洲国产最新在线播放| 久久精品熟女亚洲av麻豆精品| 高清黄色对白视频在线免费看 | 欧美xxxx性猛交bbbb| 秋霞伦理黄片| 午夜福利网站1000一区二区三区| 丰满迷人的少妇在线观看| 国产视频内射| h日本视频在线播放| 菩萨蛮人人尽说江南好唐韦庄| 国产免费一区二区三区四区乱码| 国产淫语在线视频| 亚洲欧美精品专区久久| 少妇猛男粗大的猛烈进出视频| 内地一区二区视频在线| 国产免费福利视频在线观看| 亚洲精品国产色婷婷电影| 久久人人爽人人片av| 中国美白少妇内射xxxbb| 亚洲欧美精品专区久久| 欧美xxxx黑人xx丫x性爽| 亚洲图色成人| 一级毛片黄色毛片免费观看视频| 国产成人精品婷婷| 国产中年淑女户外野战色| 蜜桃在线观看..| 国产精品成人在线| 校园人妻丝袜中文字幕| 国产在线一区二区三区精| 99精国产麻豆久久婷婷| 大片电影免费在线观看免费| 妹子高潮喷水视频| 伦理电影大哥的女人| 久久久久精品久久久久真实原创| 在线观看免费日韩欧美大片 | 国产亚洲午夜精品一区二区久久| 久久精品久久久久久久性| 人人妻人人爽人人添夜夜欢视频 | 久久久久久伊人网av| 久久国内精品自在自线图片| 亚洲精华国产精华液的使用体验| 深夜a级毛片| 国精品久久久久久国模美| 熟妇人妻不卡中文字幕| 国产女主播在线喷水免费视频网站| 丰满乱子伦码专区| 在线免费观看不下载黄p国产| 国产成人一区二区在线| 亚洲av.av天堂| 欧美xxxx黑人xx丫x性爽| 亚洲av成人精品一区久久| 亚洲精品aⅴ在线观看| 亚洲国产欧美人成| 国产无遮挡羞羞视频在线观看| 岛国毛片在线播放| 中文精品一卡2卡3卡4更新| 女性被躁到高潮视频| 午夜免费观看性视频| 汤姆久久久久久久影院中文字幕| 美女内射精品一级片tv| 国产精品国产av在线观看| 只有这里有精品99| 王馨瑶露胸无遮挡在线观看| 小蜜桃在线观看免费完整版高清| 国产真实伦视频高清在线观看| 亚洲国产精品一区三区| 国产 精品1| 久久久久久久大尺度免费视频| 精品亚洲成a人片在线观看 | 国国产精品蜜臀av免费| 少妇猛男粗大的猛烈进出视频| 成年人午夜在线观看视频| 久热久热在线精品观看| 久久国产精品男人的天堂亚洲 | 最近中文字幕2019免费版| 这个男人来自地球电影免费观看 | 精品熟女少妇av免费看| 多毛熟女@视频| 日本黄色片子视频| 熟女电影av网| 亚洲av电影在线观看一区二区三区| 美女视频免费永久观看网站| 1000部很黄的大片| 观看美女的网站| 老熟女久久久| 亚洲精品久久久久久婷婷小说| 久久青草综合色| 精品人妻一区二区三区麻豆| 亚洲一区二区三区欧美精品| 大片免费播放器 马上看| 日本欧美视频一区| 亚洲成人中文字幕在线播放| 毛片女人毛片| 亚洲在久久综合| 亚洲怡红院男人天堂| 亚洲四区av| kizo精华| 亚洲精品乱久久久久久| 干丝袜人妻中文字幕| 国产精品一区二区在线观看99| 大片电影免费在线观看免费| 成年av动漫网址| 亚洲欧美一区二区三区黑人 | 亚洲成人一二三区av| av天堂中文字幕网| 91久久精品国产一区二区三区| 晚上一个人看的免费电影| 99视频精品全部免费 在线| 精品久久久久久久久av| 99久久人妻综合| 中文天堂在线官网| 好男人视频免费观看在线| 午夜免费观看性视频| av免费观看日本| 亚洲欧美清纯卡通| 十八禁网站网址无遮挡 | 毛片女人毛片| 黄色一级大片看看| 成人特级av手机在线观看| 中文字幕制服av| 亚洲欧美精品自产自拍| 久久6这里有精品| 一个人免费看片子| 看非洲黑人一级黄片| 热99国产精品久久久久久7| 亚洲国产精品999| 亚洲av.av天堂| 久久人人爽人人片av| 久久女婷五月综合色啪小说| 国产精品伦人一区二区| 色网站视频免费| 国国产精品蜜臀av免费| 精品亚洲成国产av| 自拍偷自拍亚洲精品老妇| 亚洲高清免费不卡视频| 亚洲性久久影院| 色吧在线观看| 久热久热在线精品观看| 日韩av在线免费看完整版不卡| 卡戴珊不雅视频在线播放| 精品久久久噜噜| 街头女战士在线观看网站| 国产免费一区二区三区四区乱码| 人人妻人人爽人人添夜夜欢视频 | 欧美性感艳星| 国产淫语在线视频| 视频区图区小说| 亚洲国产精品成人久久小说| 亚洲成人av在线免费| 黑人猛操日本美女一级片| 内地一区二区视频在线| 黄片无遮挡物在线观看| 国产片特级美女逼逼视频| www.av在线官网国产| 有码 亚洲区| 亚洲成人一二三区av| av在线老鸭窝| 亚洲精品第二区| 欧美高清性xxxxhd video| 伊人久久精品亚洲午夜| 免费高清在线观看视频在线观看| 欧美精品国产亚洲| 国产精品熟女久久久久浪| av在线app专区| 性高湖久久久久久久久免费观看| 日本-黄色视频高清免费观看| 美女国产视频在线观看| 99久久综合免费| 建设人人有责人人尽责人人享有的 | 国语对白做爰xxxⅹ性视频网站| 欧美成人午夜免费资源| 伦理电影大哥的女人| 国产精品秋霞免费鲁丝片| 嫩草影院入口| 97在线人人人人妻| 永久网站在线| 日韩中文字幕视频在线看片 | 亚洲中文av在线| 只有这里有精品99| a级毛片免费高清观看在线播放| 国产美女午夜福利| 一个人免费看片子| 国产男女超爽视频在线观看| av国产免费在线观看| 91在线精品国自产拍蜜月| 国产淫片久久久久久久久| 国产亚洲av片在线观看秒播厂| 人体艺术视频欧美日本| 日韩大片免费观看网站| 18禁裸乳无遮挡免费网站照片| 尤物成人国产欧美一区二区三区| 黄色日韩在线| 99热网站在线观看| 一级毛片我不卡| 老女人水多毛片| 天堂中文最新版在线下载| 亚洲精品乱久久久久久| 大香蕉97超碰在线| 国产日韩欧美在线精品| 国产爱豆传媒在线观看| 成人18禁高潮啪啪吃奶动态图 | av福利片在线观看| 亚洲熟女精品中文字幕| 观看美女的网站| 纯流量卡能插随身wifi吗| 看十八女毛片水多多多| 亚洲伊人久久精品综合| 18禁裸乳无遮挡免费网站照片| 乱码一卡2卡4卡精品| 日本免费在线观看一区| 777米奇影视久久| 日韩 亚洲 欧美在线| 夜夜爽夜夜爽视频| 亚洲av欧美aⅴ国产| 舔av片在线| 亚洲精品456在线播放app| 岛国毛片在线播放| 各种免费的搞黄视频| 下体分泌物呈黄色| 国产精品国产av在线观看| 久久99精品国语久久久| 日韩av免费高清视频| 热99国产精品久久久久久7| a级一级毛片免费在线观看| 亚洲精品久久久久久婷婷小说| 91在线精品国自产拍蜜月| 丝瓜视频免费看黄片| 最近中文字幕2019免费版| 丰满人妻一区二区三区视频av| 国产美女午夜福利| 亚洲欧美成人精品一区二区| 日本av免费视频播放| 嫩草影院入口| 在线观看一区二区三区激情| 国产永久视频网站| 最后的刺客免费高清国语| 亚洲欧美日韩东京热| 亚洲av电影在线观看一区二区三区| 美女中出高潮动态图| 十分钟在线观看高清视频www | 中文在线观看免费www的网站| av免费观看日本| 国产精品国产三级国产专区5o| 成人毛片60女人毛片免费| 久久午夜福利片| 亚洲国产日韩一区二区| 有码 亚洲区| 国产精品蜜桃在线观看| 伦理电影大哥的女人| 男女下面进入的视频免费午夜| 在线观看美女被高潮喷水网站| 51国产日韩欧美| 人人妻人人看人人澡| 亚洲欧美精品专区久久| 一区二区三区乱码不卡18| 欧美97在线视频| 日韩av在线免费看完整版不卡| 97在线视频观看| 久久久久久久国产电影| 日本免费在线观看一区| 国产精品爽爽va在线观看网站| 成年av动漫网址| 国产免费一级a男人的天堂| 男女边吃奶边做爰视频| 美女高潮的动态| 久久久久久久久久人人人人人人| 少妇的逼好多水| 久久精品久久久久久久性| 黑丝袜美女国产一区| 国产欧美另类精品又又久久亚洲欧美| 国产淫片久久久久久久久| 国产在线视频一区二区| 五月玫瑰六月丁香| 欧美3d第一页| 国产av码专区亚洲av| 国产男女内射视频| 蜜桃亚洲精品一区二区三区| 你懂的网址亚洲精品在线观看| 多毛熟女@视频| 一级av片app| 在线天堂最新版资源| 男女国产视频网站| 内地一区二区视频在线| 纵有疾风起免费观看全集完整版| 国产精品三级大全| 99热这里只有精品一区| 欧美三级亚洲精品| 超碰av人人做人人爽久久| 精品亚洲成a人片在线观看 | 一本久久精品| 99久久精品一区二区三区| 精品人妻视频免费看| 国语对白做爰xxxⅹ性视频网站| av视频免费观看在线观看| 26uuu在线亚洲综合色| 亚洲国产色片| 尾随美女入室| 亚洲怡红院男人天堂| 丝袜脚勾引网站| 成人亚洲精品一区在线观看 | 女的被弄到高潮叫床怎么办| 国产成人精品久久久久久| 激情 狠狠 欧美| videos熟女内射| 免费人妻精品一区二区三区视频| 亚洲av免费高清在线观看| 国产精品一区二区三区四区免费观看| 日韩制服骚丝袜av| 国产无遮挡羞羞视频在线观看| 国产精品一区二区性色av| 欧美zozozo另类| 午夜免费观看性视频| 日韩制服骚丝袜av| 久久人人爽人人片av| 夜夜看夜夜爽夜夜摸| 国产黄片视频在线免费观看| 一级毛片aaaaaa免费看小| 精品久久久久久电影网| 韩国高清视频一区二区三区| 国产av码专区亚洲av| 少妇裸体淫交视频免费看高清| 久久精品熟女亚洲av麻豆精品| 久久久成人免费电影| 干丝袜人妻中文字幕| 国内少妇人妻偷人精品xxx网站| 成人无遮挡网站| 在线播放无遮挡| 国产精品一及| 一级av片app| 久久热精品热| 国产在视频线精品| 亚洲,欧美,日韩| 成人特级av手机在线观看| 99热这里只有精品一区| 日韩av在线免费看完整版不卡| 久久午夜福利片| 99re6热这里在线精品视频| 日韩av免费高清视频| 高清在线视频一区二区三区| 国产精品无大码| 麻豆成人午夜福利视频| av天堂中文字幕网| 日韩成人av中文字幕在线观看| 大又大粗又爽又黄少妇毛片口| 久久久久久久久大av| 男人狂女人下面高潮的视频| 91久久精品电影网| 亚洲婷婷狠狠爱综合网| 国产精品99久久久久久久久| 亚洲精品乱久久久久久| 国产精品久久久久久久久免| 日韩欧美 国产精品| 午夜福利视频精品| 日本欧美视频一区| 成人黄色视频免费在线看| 亚洲国产色片| 亚洲精华国产精华液的使用体验| av免费观看日本| 熟女人妻精品中文字幕| www.av在线官网国产| 日本猛色少妇xxxxx猛交久久| 国产乱来视频区| 成人亚洲欧美一区二区av| 欧美一区二区亚洲| 精品亚洲成国产av| 最新中文字幕久久久久| 狠狠精品人妻久久久久久综合| 国产成人91sexporn| 一级爰片在线观看| 日韩强制内射视频| 国产一区二区三区综合在线观看 | 精品熟女少妇av免费看| 国产美女午夜福利| av免费观看日本| 久久久久久久久久久丰满| 爱豆传媒免费全集在线观看| 国产av一区二区精品久久 | 成人一区二区视频在线观看| 深爱激情五月婷婷| 国产精品.久久久| 高清欧美精品videossex| 精品人妻偷拍中文字幕| 嘟嘟电影网在线观看| 菩萨蛮人人尽说江南好唐韦庄| 亚洲av成人精品一区久久| 欧美少妇被猛烈插入视频| 人妻一区二区av| 国产成人免费无遮挡视频| 夜夜看夜夜爽夜夜摸| 熟女人妻精品中文字幕| 精华霜和精华液先用哪个| av在线app专区| 国产男女内射视频| 伊人久久精品亚洲午夜| 婷婷色综合www| 中文字幕av成人在线电影| 男人狂女人下面高潮的视频| 高清日韩中文字幕在线| 久久久精品免费免费高清| 天美传媒精品一区二区| 有码 亚洲区| 亚洲精品一二三| 国产av国产精品国产| 精品国产露脸久久av麻豆| 熟女人妻精品中文字幕| 美女主播在线视频| 又爽又黄a免费视频| 国产亚洲91精品色在线| 熟女av电影| 欧美成人a在线观看| 三级国产精品欧美在线观看| 美女高潮的动态| 久久久成人免费电影| 免费人成在线观看视频色| 偷拍熟女少妇极品色| 国产精品一区二区在线观看99| 久久久久网色| 成人黄色视频免费在线看| 中文在线观看免费www的网站| 夫妻午夜视频| 国产一区二区三区综合在线观看 | 日本与韩国留学比较| 亚洲美女搞黄在线观看| 国产亚洲欧美精品永久| 欧美+日韩+精品| 91久久精品国产一区二区成人| 国产成人精品福利久久| 伦理电影免费视频| 成人影院久久| 一个人免费看片子| 日韩制服骚丝袜av| 少妇人妻精品综合一区二区| 成人毛片a级毛片在线播放| 美女cb高潮喷水在线观看| 国产av精品麻豆| 国语对白做爰xxxⅹ性视频网站| 大话2 男鬼变身卡| 国产中年淑女户外野战色| 国产精品国产三级专区第一集| 国产亚洲一区二区精品| 深夜a级毛片| 国产91av在线免费观看| 久久99热这里只有精品18| 免费黄频网站在线观看国产| 麻豆国产97在线/欧美| 国产精品人妻久久久久久| 一本色道久久久久久精品综合| 亚洲人与动物交配视频| 精品人妻偷拍中文字幕| 最近的中文字幕免费完整| 国产黄色免费在线视频| 国产精品国产三级国产专区5o| 国产真实伦视频高清在线观看| 内地一区二区视频在线| 亚洲精品乱久久久久久| 99久久精品一区二区三区| 舔av片在线| 国产伦在线观看视频一区| 欧美日韩视频高清一区二区三区二| 九草在线视频观看| 日韩欧美精品免费久久| 99精国产麻豆久久婷婷| 下体分泌物呈黄色| 亚洲精品,欧美精品| 国产视频内射| 精华霜和精华液先用哪个| 内地一区二区视频在线| 国产精品一及| 精品一品国产午夜福利视频| 在线观看国产h片| 九草在线视频观看| 国产成人a∨麻豆精品| 国产精品一区二区在线观看99| 日韩欧美精品免费久久| 成人毛片60女人毛片免费| 秋霞在线观看毛片| 亚洲精品日韩av片在线观看| 蜜桃亚洲精品一区二区三区| 哪个播放器可以免费观看大片| 久久久久久人妻| 亚洲精品色激情综合| 精品一品国产午夜福利视频| 久久久国产一区二区| 成年女人在线观看亚洲视频| 99久久精品热视频| 精品人妻一区二区三区麻豆| 高清日韩中文字幕在线| 国产一区有黄有色的免费视频| 男女下面进入的视频免费午夜| 少妇熟女欧美另类| 深夜a级毛片| 欧美成人精品欧美一级黄| 少妇被粗大猛烈的视频| 伊人久久国产一区二区| 国产亚洲91精品色在线| 亚洲精品一二三| 国精品久久久久久国模美| 国产熟女欧美一区二区| 精品一区二区三区视频在线| 国产精品国产三级专区第一集| 如何舔出高潮| 又大又黄又爽视频免费| av黄色大香蕉| 我的女老师完整版在线观看| 中文字幕久久专区| 美女国产视频在线观看| 精品一品国产午夜福利视频| 欧美性感艳星| 久久女婷五月综合色啪小说| 成年人午夜在线观看视频| 国产精品福利在线免费观看| 国产深夜福利视频在线观看| 大码成人一级视频| 97超碰精品成人国产| 好男人视频免费观看在线| 精品人妻偷拍中文字幕| 亚洲国产成人一精品久久久| 亚洲国产欧美在线一区| 欧美激情国产日韩精品一区| 国产在视频线精品| 国产亚洲5aaaaa淫片| 精品人妻一区二区三区麻豆| a级毛片免费高清观看在线播放| 黄色一级大片看看| 在线 av 中文字幕| 一区在线观看完整版| 在线观看一区二区三区激情| 偷拍熟女少妇极品色| 九九在线视频观看精品| 51国产日韩欧美| 亚洲美女视频黄频| 美女中出高潮动态图| 日本av手机在线免费观看| 亚洲国产高清在线一区二区三| 久久精品国产亚洲网站| 亚洲综合色惰| 国产精品不卡视频一区二区| 91精品伊人久久大香线蕉| 纵有疾风起免费观看全集完整版| 晚上一个人看的免费电影| 国产成人精品婷婷| 看免费成人av毛片| 在现免费观看毛片| 一区在线观看完整版| 国产色婷婷99| 色视频在线一区二区三区| 全区人妻精品视频| 韩国高清视频一区二区三区| 日韩大片免费观看网站| 国产毛片在线视频| 久久国内精品自在自线图片| 国产真实伦视频高清在线观看| 成人美女网站在线观看视频|