• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A super resolution target separation and reconstruction approach for single channel sar against deceptive jamming

    2023-03-28 08:38:06ShiqiLiuBingLiBoZhoLeiHungYuezhouWuWeiminBo
    Defence Technology 2023年3期

    Shi-qi Liu , Bing Li , Bo Zho ,*, Lei Hung , Yue-zhou Wu , Wei-min Bo ,e

    a Guangdong Key Laboratory of Intelligent Information Processing, College of Electronic and Information Engineering, Shenzhen University, Shenzhen,518060, China

    b School of Electrical Engineering, Southwest Jiaotong University, Chengdu, 611756, China

    c State Key Laboratory of Millimeter Waves, Southeast University, Nanjing, 210096, China

    d School of Computer Science, Civil Aviation Flight University of China, Guanghan, 618307, China

    e China Aerospace Science and Technology Corporation, Beijing,100048, China

    Keywords:Deceptive jamming suppression Off-grid reconstruction Majorization-minimization Synthetic aperture radar (SAR)

    ABSTRACT The excellent remote sensing ability of synthetic aperture radar (SAR) will be misled seriously when it encounters deceptive jamming which possesses high fidelity and fraudulence.In this paper,the dynamic synthetic aperture (DSA) scheme is used to extract the difference between the true and false targets. A simultaneous deceptive jamming suppression and target reconstruction method is proposed for a single channel SAR system to guarantee remote sensing ability. The system model is formulated as a sparse signal recovery problem with an unknown parametric dictionary to be estimated. An iterative reweighted method is employed to jointly handle the dictionary parameter learning and target reconstruction problem in an majorization-minimization framework, where a surrogate function majorizing the Gaussian entropy in the objective function is introduced to circumvent its non-convexity. After dictionary parameter learning, the grid mismatching problem in a fixed grid based method is avoided.Therefore, the proposed method can reap a super resolution result. Besides, a simple yet effective DSA section scheme is developed for the SAR data excerpting, in which only two DSAs are required. Experimental results about location error and reconstruction power error reveal that the proposed method is able to achieve a good performance in deceptive jamming suppression.

    1. Introduction

    Synthetic aperture radar(SAR)finds widespread applications in both civilian and military remote sensing for its ability of providing high-resolution surveillance on the terrain under a variety of weather and illumination conditions [1]. Nevertheless, performance of the SAR imaging degrades seriously when encountering electronic countermeasure, such as radio frequency interference[2,3], barrage jamming [4,5] and deceptive jamming [6,7]. Unlike the other two traditional jamming schemes,the deceptive jamming brings more harm to SAR imaging since it implants well-designed false scene into SAR imagery by performing time-delay and phase modulation to the intercepted SAR signal. Lots of researches have been focused on improving the fidelity and reducing the computational complexity of the deceptive jamming, bringing threat to SAR imaging and raising the challenge to tackle it[8-11].Therefore,it is meaningful to research the strategy of deceptive jamming suppression to guarantee the remote sensing ability of SAR.

    The deceptive jamming suppression problem has attracted a lot of attention over the past few years [12-19,32]. An effective method is to use multi-channel techniques to achieve more spatial degree of freedom [12,13]. In this way, the significant distinctions between the true echoes and the deceptive jamming in different channels can be used for jamming mitigation.However,the multichannel framework is an expensive and complex way due to its high cost of deployment and maintenance on airborne/spaceborne platform. Besides these efforts, another line of work studies the countermeasure based on agile waveform, which is much cheaper than the former method [14]. The effectiveness is based on the assumption that,with the transmission of agile waveform,it is hard for the jammer to finish the work of interception,modulation and re-transmission within one pulse repetition internal.Nevertheless,as the hardware and algorithm of deceptive jammer develop, the improvement of real-time performance will negate the jamming suppression effect of agile waveform.

    In order to surmount those foregoing limitations,anti-deceptive jamming methods are developed to decrease the implementation cost[16-19].In Refs.[16-18],dynamic synthetic aperture(DSA)is proposed to eliminate deceptive jamming based on a singlechannel SAR system and a fixed waveform. The DSAs are used to provide multiple observations about the different distributions of the deceptive jamming and real SAR echo in time-frequency domain. And then the jamming mitigation is formulated as a sparse recovery problem. By solving such a problem, the true and false targets can be distinguished obviously.However,the location errors of the reconstructed targets are not so desirable because of grid mismatch errors [16]. Besides, the introduced multiple DSAs are quite redundant, resulting in a large scale sparse recovery problem.This motives us to ameliorate the method to improve the jamming suppression performance with less data extracted by fewer DSAs.

    In this paper, we tackle the deceptive jamming suppression problem under a super resolution compressed sensing framework[20,21]. Specifically, the problem of target separation and reconstruction against deceptive jamming is formulated as a sparse signal recovery problem with an unknown parametric dictionary to be estimated. The dictionary parameter learning and target reconstruction is addressed simultaneously by utilizing an iterative re-weighted method. During the solving process, a surrogate function that majorizes the Gaussian entropy is decreased iteratively in an majorization-minimization (MM) framework [22-24].Furthermore, after a detailed analysis on the time-frequency distribution characteristic difference between two kinds of targets, a DSA selection strategy is proposed to alleviate the requirement of selecting multiple DSAs in the wide slow time domain in previous method [16,17].

    The remainder of this paper is organized as follows.In Section 2,the signal model of SAR system and the theory of deceptive jamming are depicted briefly. Then the problem of target separation and reconstruction against deceptive jamming is formulated as a sparse representation problem. The grid mismatch problem is analyzed in Section 3,where a joint jamming mitigating and target reconstruction method is proposed. In Section 4, we provide the experiment results to evaluate the effectiveness of the proposed method. Section 5 presents the concluding remarks.

    2. Problem formulation of deceptive jamming suppression

    2.1. Signal model of true echo and deceptive jamming

    The geometrical model of SAR imaging and deceptive jamming is shown in Fig. 1. The axis x is parallel to the azimuth direction,along which the platform flies, axis y represents the range dimension, axis z is perpendicular to the ground. The zero slow time is set at the moment when the SAR beam center is pointing at the jammer J.

    Fig.1. Geometrical model of SAR imaging and deception jamming.

    For a single-channel SAR with fixed waveform, a linear frequency modulation (LFM) signal is usually adopted in the SAR system to achieve high resolution in the range domain, which can be expressed as

    where rect(?)is a rectangular function,tris the fast time,Trdenotes the pulse duration,f0represents the carrier frequency,and Kris the chirp rate.

    In order to simplify the formulation, the range domain processing procedures such as pulse compression and range migration correction are assumed to have been carried out in the following analysis. After range processing, the echo reflected from a true scatterer can be expressed as

    where tais the slow time,λ is the wavelength,σnis the scattering coefficient, Bris the bandwidth of the transmitted SAR signal, c is the propagation velocity of the electromagnetic wave,τnis the time delay of the scatterer in azimuth, Rn(?) is the instantaneous slant range history varying with the slow time, and Rn0is the reference range of the scatterer.

    In the process of SAR imaging, it is usually assumed that, if a scatterer falls into the main lobe of the antenna, its echoes can be received by the SAR without any attenuation, whereas no echoes will be collected when the scatterer goes out of the main lobe. For simplicity,aa(?)is usually considered as a rectangular function,i.e.,

    where |?| calculates the absolute value and Tais the synthetic aperture time.Obviously,the support region of the true scatterer in the slow time domain is[-Ta/2 +τn,Ta/2 +τn].In the so-called main lobe deceptive jamming, the same envelope assumption is also utilized,where the deceptive jammer can only disturb the SAR when it is illuminated by the main lobe.

    The support region of the true scatterer evidently varies as its azimuth location changes. Whereas, the support regions of all the false targets are the same as that of the jammer, which is [-Ta/2,Ta/2]. This is because the echo of the true scene is reflected form different scatterer,while the deceptive scene signal is emitted from the same source.

    In order to appear at the same location as the true scatterer,the false scatterer's jamming signal is generated by implementing the shift along the slant range domain and phase modulation in the azimuth domain based on the intercepted SAR signal. After range processing, the deceptive jamming signal can be expressed as

    where σJnstands for the preset scattering coefficient of the false scatterer. By comparing Eq. (4) with Eq. (2), it is clear that, after range compression, the signals of true scene and false scene coincide exactly with each other in the range domain.The high degree of consistency of signal characteristics in range domain not only brings the high fidelity and fraudulence in the SAR imagery,but also poses a great challenge in distinguishing the true and false targets through range domain processing.

    2.2. Separation and reconstruction model of true and false targets

    The above analysis reveals that the well-designed deceptive jamming mechanism may efficaciously embed the false scene to the SAR imagery, which is pernicious and also hard to tackle.Meanwhile, it is worth noting the difference lies in the azimuth support regions, which lead to a distinctive characteristic in timefrequency distribution. Therefore, fortunately, it is possible to take measures to suppress the jamming signal in the azimuth domain processing. The time-frequency distributions of the true echoes and deceptive jamming are shown in Fig.2.The thick solid lines represent the distribution of the true target signal echoes,which distribute along the slow time axis. The thick dashed lines represent the distribution of the false target signal, which distribute along the Doppler frequency axis.

    In a traditional azimuth focusing process, Doppler center correction, dechirping and Fourier transform are performed successively to achieve a focused SAR imagery.However,the process is carried out with the whole slow time domain, which could not extract the distinction between the azimuth support regions of true and false targets. This is because, if the Fourier transform is performed with a wide slow time domain, all the energy of signals from true and false targets will be retained well. This is why the deceptive jamming works. Whereas, actually, if the Fourier transform Is implemented with a small slow time,the energy of signals from the two kinds of targets suffer different energy degradation characteristics.This is the fundamental principle of the DSA based idea.

    Based on the above analysis, the DSA scheme employees a sliding synthetic aperture with varying center in the slow time domain,which is called DSA,to select a small segment data before the implementation of Fourier transform.Different time-frequency characteristics can be presented based on the processing of the selected data. The DSA is sketched as the dashed-dotted line in Fig. 2, which can be denoted as a rectangular function, i.e.,

    Fig. 2. Time-frequency distributions of the true echoes and deceptive jamming.

    where ηwis the slow time center of the DSA.As ηwmoves along the slow time axis,different parts of the true echoes and the deceptive jamming will be extracted. This will lead to different imaging quality degradation for the true and false scenes.After the azimuth focusing process of Doppler frequency center correction, dechirping, DSA extraction and Fourier transform, the azimuth profile of the true and false scatterers in each range cell can be represented by U(fa,ηw)and UJ(fa,ηw), respectively

    where, considering the consistency of true and false target in range domain,for notational simplicity,we omit the range domain parameters and expressions hereafter,is the Doppler frequency center,fais the Doppler frequency,γ is the Dopplerchirp rate,α andαJare the degeneration coefficientof the true and false scatterers,respectively,which can be defined by

    As the data acquired by the SAR contains a mixture of the true echo and the jamming signal,the azimuth focusing process can be modeled as

    where uwis the azimuth profile of the imagery after the processing of the selected data within the DSA,p, q??N×1are the scattering coefficient of the true and false targets, r??N×1is the modeling and measurement error,and N is the number of the azimuth cells,Gw, Hw??N×Nare azimuth profiles of the true and false scatters.Based on (6) and (7), their column vectors can be represented as

    where ⊙is the Hadamard product operator, fais the vectorized Doppler frequency coordinates corresponding to the azimuth cells.Considering that the targets we are interested are often manmade targets, which are constructed with typical strong scattering structures, their sparsity can be used to separate and reconstruct the true and false targets based on their distinctions mixed in Eq. (10). On the basis of aforementioned analysis, the separation and reconstruction problem can be converted to a sparse reconstruction problem, i.e.,

    where‖?‖0is the ?0-norm,which denotes the number of nonzero elements in the vector,‖?‖2is the ?2-norm and ε is a threshold for the reconstruction error.Then,the coefficients of both the true and false targets can be simultaneously obtained by solving the optimization problem in Eq. (13).

    Note that, for a SAR system, the focusing in azimuth domain relies on the relative movement between the target and SAR. A jammer with a fixed location can only shift the frequency in the azimuth domain to place a false scatterer to the location it intends to imitate. Then it inevitably leads to the distinction in timefrequency distributions, which is used for deceptive jamming suppression in this paper. Therefore, it is not only valid for frequency-shifting jammer [25], but also for interrupted sampling repeater jammer (ISRJ) [26].

    3. Proposed method

    3.1. Analysis of the modeling error

    Because of the NP-hardness of the ?0-norm problem,Eq.(13)is usually tailored to an ?1-norm problem [16-18], i.e.,

    which is a computationally feasible problem. However, it is wellknown that, the accurate reconstruction of a sparse signal relies on the knowledge of sparse representation dictionary [20,21].Actually, it is impractical to pre-specify a dictionary that can sparsely represent the targets in advance. This is because it is impossible to precisely know all the locations that the scatterers may present for the SAR system. In the preceding reconstruction model,in order to apply compressed sensing to such an application,the continuous azimuth location has to be discretized to a finite set of grids. In other word, the dictionaries, Gw, Hw, are constructed based on the discretized azimuth slow time, {τn}. And the recovered scatterers are assumed sparse on the discretized azimuth location, correspondingly. Nevertheless, their actual locations do not necessarily lie on the discretized grid,but can reside anywhere in the continuous azimuth location axis. As a result, this discretization inevitably incurs errors and causes the problem of basis mismatch, which will have a negative impact on the achievable accuracy of the SAR imageries. A direct method to solve the problem is implementing finer grids. However, the finer grids result in the high dimensionality of the dictionaries and will require more measurements to match the dictionaries.

    3.2. Parametric separation and reconstruction

    In this paper, to outfox the problem of grid mismatch, the azimuth time grid points {τn} are treated unknown. Denote τ?{τn}??1×N, then the overcomplete dictionaries Gw(τ), Hw(τ)are also unknown,with their atoms,gw, hw,determined by Eq.(11)and Eq. (12), respectively. Letting Mw(τ) = [Gw(τ),Hw(τ)], z =[p;q], the problem of separation and reconstruction can be formulated asIn this framework, the aim is not only to estimate the sparse coefficients of the targets, but also to optimize/refine τ corresponding to their locations so that the parametric dictionary will approach the true sparsifying dictionary. To face with the NPhardness of the ?0-norm problem, the ?1-norm based minimization is a well-behaved numerical selection for its attractive convex property. Despite its popularity, ?1type methods suffer from a drawback that its global minimum does not necessarily coincide with the sparsest solution [27,28]. In this paper, the Gaussian entropy is introduced as the alternative sparsity encouraging penalty function for sparse signal recovery, which is defined as

    where znis the n-th component of the vector z,and ε>0 is a small positive parameter to ensure that the function is well defined.It is obvious that, when ε→0, each individual logarithmic term log(|zn|2+ε) has infinite slope at zn= 0, ?n. It implies that Gaussian entropy places a relatively large penalty on small nonzero coefficients to drive them to zero. Hence, this penalty function behaves more like the ?0-norm than the ?1-norm [27,29].Removing the constraint and adding a data fitting term,ρ‖Mwz-uw‖22to the objective function,the jamming suppression issue can be formulated as an unconstrained optimization problem,namely

    where ρ>0 is a regularization parameter controlling the trade-off between the sparsity and the reconstruction error.

    Note that the objective function in Eq.(17)is non-convex,so it is hard to solve the problem directly.In this paper,to circumvent this issue, we adopt the MM framework, which is based on a bounded optimization strategy[22-24].The idea is to obtain an appropriate surrogate function which is easy to handle, and then iteratively minimize the simple surrogate function to get the solution.

    We first find a surrogate function majorizing L(z), which is differentiable and convex, i.e.,

    After that, the problem in Eq. (15) reduces to the iterative minimization of the surrogate function. After some arrangements and ignoring terms that are independent of z and τ, the optimization problem at the k-th iteration can be expressed as

    where (?)Hdenotes the conjugate transpose, D(k)is a diagonal matrix given asGiven τ fixed, resorting to the Lagrangian multiplier method[30], we can easily obtain the optimal z as

    Substituting (22) back into (20), the optimization simply becomes searching for the unknown azimuth time grid points,that is

    Note that the parameter τ is tightly coupled with the sophisticated form in Eq. (23). It is impossible to derive a closed-form solution. In practice, it is not necessary to obtain the parameter minimizing the function.We only need to search for a new estimatesuch that the following equality holds

    Such an estimate can be easily acquired with the implementation of any a descent method. Then, ︿z(k+1)can be obtained by replacing τ with ︿τ(k+1)in Eq. (22), i.e.,

    In what follows, we verify the non-increasing monotonicity of the objective function value with the new estimate{︿z(k+1),︿τ(k+1)},that is

    In order to achieve the purpose, we can readily derive that

    and

    which come from the properties of the surrogate function Q(?).Meanwhile, we can also get

    which comes from the monotonicity of f(?). Then combining Eq.(27), Eq. (28) and Eq. (29), we can easily obtain (26). The convergence will be guaranteed by the non-increasing monotonicity of the objective function value in the iteration procedure.

    For clarification, the parametric algorithm for target separation and reconstruction against deceptive jamming is summarized in Algorithm 1.

    Algorithm 1Parametric Algorithm for Target Separation and Reconstruction Against Deceptive Jamming

    3.3. DSA selection

    Compared with the conventional azimuth focusing process with no jamming suppression mechanism, the DSA based method can extract the distinction between the true and false targets through the selection of a small data segment in azimuth domain.However,at the same time, it is the limited data that also limits the reconstruction performance.This is because a small part of the acquired SAR data would only contain part of the distinctive feature.In order to reap a stable performance,a good and direct choice is to employ multiple randomly selected DSAs to synthetic the distinctive feature embraced in different data segments [16,17]. The employment of multiple DSAs is able to provide more observations on the true and false targets to reduce errors.Nevertheless,this operation will imply larger grid dimensions embedding into very highdimensional spaces which will inevitably lead to a higher computational overhead. Additionally, it should be noted that the computation cost in refinement of the dictionary parameters is not ignorable. Therefore, it is meaningful to restrict the amount of the data to be processed as possible as it can be.

    In order to alleviate this problem,in the following,we will focus on the time-frequency distribution again. Based on the analysis in Section 2.2, the false targets can be classified into three groups according to their distances to the jammer. For clarification, we denote the distance and the length of the synthetic aperture as dn,and La, respectively. Then the three groups can be described as follows.

    1) When|dn|≤La,the false scatterers fall into Group 1.Their timefrequency distributions overlap partly or totally with the true scatterers that have the same distances to the jammer.

    2) When La<|dn|≤0.5(β -1)La,the false scatterers fall into Group 2, with β being the oversampling rate in azimuth. Their timefrequency distributions do not overlap with the true scatterers that have the same distances to the jammer. Meanwhile, their distributions do not exceed the pulse repetition frequency(PRF).The deceptive jamming signal of these scatterers can be easily suppressed by a lowpass filter.

    3) When |dn|>0.5(β - 1)La, the false scatterers fall into Group 3.

    Their time-frequency distributions exceed the PRF,which leads to the nonsatisfaction of the Nyquist sampling theorem. In this case, it fails to deceptively jam the SAR.

    Based on the above analysis,we shall maintain our focus on the scatterers falling in Group 1. Different from the deceptive signal limited in[ -0.5Ta,0.5Ta],the echoes of the true scatterers located at the same area as false scatterers in Group 1 distribute in[-1.5Ta,1.5Ta] in the slow time domain. From Fig. 2, one can observe that there are two critical points locating at ta= ± 0.5Ta.The time-frequency distributions of the true and false signals will overlap or non-overlap with each other near the critical points. In this paper, we choose the two critical points as the centers of the DSAs.Then,all the difference between the distributions of true and false targets will be covered in the only two selected data segments.Meanwhile, with the decrease of the number of the DSAs, the computational overhead and the need of memory space will be alleviated.

    Fig. 3. The process of deceptive jamming suppression for SAR system.

    Note that, in the system model, the zero azimuth time is established at the moment when the SAR beam center points at the jammer. To put the jamming suppression work into practice, we have to find out the jammer's location. As depicted in Fig. 2, the frequency of true echoes distributes in [ - 0.5Ba,0.5Ba], while the frequency of deceptive signals distributes in [ - 0.5PRF,0.5PRF].This difference provides the opportunity to locate the jammer. If the acquired signal is filtered through a high-pass filter with its frequency thresholds being ±0.5Ba, the remained signal will only contain deceptive signals. Then, find the maximum energy integration in a DSA moving along the slow time axis,and the center of that DSA will correspond to the jammer's location.

    3.4. Practical application consideration

    To tackle the deceptive jamming effectively,a series of processes including deceptive jamming identification, target extraction/background elimination, and target reconstruction are required.Such a procedure is depicted in the following block diagram.

    As Fig. 3 shows, deceptive jamming identification and target extraction are implemented before target reconstruction.

    1) In the process of deceptive jamming identification,the aim is to figure out whether the SAR imagery is polluted by deceptive jamming or not,and where are the false targets located in.Only when deceptive jamming is discovered and identified, the subsequent procedures (including target extraction and target reconstruction) are necessary to be implemented.

    2) In the process of target extraction,the SAR imageries polluted by deceptive jamming are screening out, and the potential false targets are extracted out. This operation can distinctly restrict the data being processed in the following target reconstruction procedure, which will obviously reduce the amount of calculation.

    3) In the process of target reconstruction, the attention is focused on the extracted area to reconstruct the targets of interest.

    In this paper,the work is concentrated on target reconstruction.The process of deceptive jamming identification and target extraction(background elimination)is assumed to have been done.

    In general,it is not necessary to carry out all 3 steps depicted in Fig. 3 when dealing with the deceptive jamming. In practical application, low cost and high efficiency are usually preferred. For example, when a deceptive jamming area has been identified, a decision of weather proceed to the following steps can be made based on the power of the identified area. A deceptive jamming area with weak scattering characteristic can only covers true scene which is much weaker.In this case,the reconstruction procedure is not necessary because, in general, there is not high valued target with strong scattering coefficients.

    When the identified deceptive jamming area includes strong target, the target extraction procedure should be done to restrictthe operation of target reconstruction in a smaller area.

    Therefore,even though the deceptive jamming is carried out in a complex distributed scene,the work of target reconstruction can be separately implemented in small areas to complement the target reconstruction work for the whole scene.

    The computational complexity of the proposed method is dominated by the update of the optimal scattering coefficient vectorvia Eq. (22), which involves inverting a 2N× 2N matrix with a complexity of O(N3)per iteration.When dealing with a large scene, N becomes very large, the computational complexity will become very high.

    Fortunately, the complexity can be significantly reduced based on the results of the preprocessing mentioned before (including jamming identification and target extraction). After the preprocessing, instead of processing on the whole imaging area, the work of target reconstruction is focused on the extracted area containing potential false targets.Then the imaging area is reduced and the dimension of the dictionary matrix will be reduced. The computational complexity will decrease cubically. For example, if the dimension of the extracted area contains K cells, which is less than N, the computational complexity will decrease to O(K3).

    Furthermore,to decrease the computational complexity further,the azimuth profile can be divided into several segments. In this way, targets in each segment can be reconstructed separately. For example, if the extracted area is divided into J segments and each segment contains L cells, the computational complexity will decreased to O(JL3), which is sufficiently lower than the original computational amount. Moreover, the divided segments can be processed parallelly. This will improve the algorithm efficiency furthermore.

    4. Experimental results

    In this section, we illustrate the performance of our proposed method through experiment results. A SAR picked up on an airborne platform is employed here and it is set to work in the sidelooking strip-map mode. The parameters of SAR are shown in Table 1.

    Table 1 SAR parameters.

    In the following, we first compare the proposed method with the method in Ref. [16] to show the effectiveness after the considering of grid mismatch problem. Then the comparison of reconstruction performances with different DSA selection strategies are discussed to demonstrate the validity of the strategy adopted in Section 3.3.At last,we illustrate simulation result of the real measured target.

    4.1. Reconstruction performance

    At first, we generate the SAR data of the true and false targets,with their shapes designed as “N” and “Z”, respectively shown in Fig. 4 (a) and (b). After the implementation of the conventional range-Doppler algorithm, as shown in Fig. 4 (c), the true target is not recognizable any longer. Before the operation in azimuth domain, a super-resolution processing is applied in the range domain to alleviate the interactions between scatterers close in distance[16-18].Here,20 randomly selected DSAs are employed to excerpt the data segments for the extraction of distinctions between true and false targets.Then, the results after the separation and reconstruction processing,by using the method in Ref.[16]and the proposed method in this paper, are shown in Figs. 5 and 6,respectively. Roughly, the visual discrepancies between the two results of true targets are not too pronounced since all the true scatterers are on-grid designed. Note that, because the mismatch problem is not considered in Ref. [16], some energy leaks around the actual location in the in the imagery of the reconstructed false target.Three residual scatterers appear in the reconstruction result of the false target, which are circled in red circles. In contrast, the result of false target in Fig. 6 (b) is well reconstructed with little energy diffusion. This is because, with the mismatch problem handled, the energy is more focused on the actual locations.

    To reveal the performance promotion, location errors and reconstruction power errors of the constructed true and false targets are illustrated in Fig. 7. The results with the approach in Ref. [18] are marked by“○” and mentioned as “iDSA”. The results with the approach in Ref.[16]are marked by“×”and mentioned as“mDSA”. The results with the approach in Ref. [17] are marked by“?” and mentioned as “mDSA-ADMM”. The results with the approach proposed in this paper are marked by“?”and mentioned as “proposed”. It is observed that, by implementing the proposed method,the lowest location errors and reconstruction power errors are achieved among all the algorithms, verifying the performance promotion of the proposed method in deceptive jamming suppression.

    4.2. Comparison of DSA selection strategies

    We first show performance of the method with three kinds of single-DSA strategies with ηwset as -0.5Ta,0.5Ta,0,respectively.The corresponding results are illustrated in Figs. 8, Fig. 9, and Fig. 10. The performance with 20 randomly selected DSAs is depicted as a benchmark. In Fig. 8, the location error and the reconstruction power error on the negative axis are distinctly lower than the positive axis. That's because the data selected from the DSA with ηw=-0.5Taonly contains the information of the scatterers located at the negative axis. On the contrary, as is shown in Fig.9,when the center of the DSA is set at 0.5Ta,the errors on the negative axis are evidently higher than the positive axis.In Fig.10,the reconstruction errors for the true scatterers are lower in the middle. Meanwhile, the reconstruction results are better for the false scatterers. This is because all the deceptive jamming signals are retained in the data selected from the DSA with ηw= 0,while only signals from the true targets near the jammer are retained.Based on these results with single DSA, we can notice that, the information embraced in the data segment extracted with one DSA is limited.It is impossible to separate and reconstruct the two kinds of targets simultaneously. Therefore, a number of DSAs have to be employed to improve the robustness [16].

    Fig. 4. Conventional imaging results. (a) True targets. (b) False targets. (c) Deceptive jamming result.

    Fig. 5. Reconstructed targets without the considering of the mismatch problem [16]. (a) True targets. (b) False targets.

    Fig. 6. Reconstructed targets with the considering of the mismatch problem. (a) True targets. (b) False targets.

    Fig. 7. Performance comparison of reconstructed targets with the state-of-the-art approaches.(a) Location error of true targets.(b) Reconstruction power error of true targets.(c)Location error of false targets. (d) Reconstruction power error of false targets.

    Fig.8. Evaluation metrics of reconstructed targets with ηw set as -0.5Ta.(a)Location error of true targets.(b)Reconstruction power error of true targets.(c)Location error of false targets. (d) Reconstruction power error of false targets.

    Fig. 9. Evaluation metrics of reconstructed targets with ηw set as 0.5Ta.(a) Location error of true targets. (b) Reconstruction power error of true targets.(c) Location error of false targets. (d) Reconstruction power error of false targets.

    Fig.10. Evaluation metrics of reconstructed targets with ηw set as 0. (a) Location error of true targets. (b) Reconstruction power error of true targets. (c) Location error of false targets. (d) Reconstruction power error of false targets.

    Fig.11. Evaluation metrics of reconstructed targets with ηw set as±0.5Ta .(a)Location error of true targets.(b)Reconstruction power error of true targets.(c)Location error of false targets. (d) Reconstruction power error of false targets.

    Fig.12. Conventional imaging results. (a) True targets. (b) Deceptive jamming results.

    Fig.13. Reconstruction results. (a) True targets. (b) False targets.

    In Fig. 11, we provide the performance with the two DSAs selected at ηw=±0.5Ta.It can be observed that the two curves are very similar in all the sub-figures,which reveals that,with the only two carefully selected DSAs,we can reap the performance as good as using 20 random DSAs. Thus, it is valid to implement the DSA selection strategy analyzed in Section 3.3. It should also be noted that, the DSA selection strategy is very meaningful. With the decrease of the number of the DSAs, the computational overhead and the need of memory space will be alleviated obviously.

    4.3. Experiment on measured SAR data

    The last experiment is implemented based on the measured SAR data of an armored personnel carrier, which is collected in the Moving and Stationary Target Acquisition and Recognition(MSTAR)program[31].In order to focus on the structure and the scattering coefficients of the target and alleviate the amount of computation,a background suppression preprocessing is applied on the original image before echoes generating to highlighting the target.The true target is illustrated in Fig. 12 (a). When a meticulously designed false target signal is implanted to the acquired SAR data, the imagery after conventional range-Doppler algorithm processing without jamming suppression is shown in Fig.12 (b). We can see that, the deceptive jamming not only makes it impossible to recognize the true carrier any more, but may mislead us to recognize it as other target (e.g., a truck).

    Alternatively, by adopting the proposed method, the true and false target reconstruction results are shown in Fig.13 (a) and (b),respectively. It is clear that, when the false target is stripped from the fused SAR data, the real target is revivified clearly.

    5. Conclusion

    In this paper, we provided a super resolution target separation and reconstruction approach for single channel SAR encountering deceptive jamming.We first formulated the problem into a sparse signal recovery problem with an unknown parametric dictionary to be estimated.A simultaneous deceptive jamming suppression and target reconstruction method was developed to guarantee the remote sensing ability. By resorting to the iterative re-weighted method, we jointly addressed the dictionary parameter learning and target reconstruction problem in a majorization-minimization framework. The objective function value was gradually decreased by iteratively decreasing a surrogate function majorizing the Gaussian entropy with the refined unknown parameters. Experimental results show that the proposed method is able to decrease the location error and reconstruction power error. Besides, the proposed method can achieve a good reconstruction performance with only two DSAs.

    Declaration of competing interest

    The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

    Acknowledgement

    This work was supported in part by the National Natural Science Foundation of China under Grants 61801297, 62171293, U1713217,U2033213,61971218,61801302,61701528,61601304,in part by the National Science Fund for Distinguished Young Scholars under Grant 61925108, in part by Natural Science Funding of Guangdong Province under Grant 2017A030313336, in part by the Guangdong Basic and Applied Basic Research Foundation under Grant 2019A1515110509, in part by Foundation of Shenzhen City under Grant JCYJ20170302142545828,in part by the Shenzhen University Grant 2019119,2016057,in part by the Fund of State Key Laboratory of Millimeter Waves under Grant K202235,and in part by Sichuan Science and Technology Program under Grant 2021YFS0319.

    久久久久精品国产欧美久久久| 国产精品一及| 757午夜福利合集在线观看| 欧美高清性xxxxhd video| 少妇人妻精品综合一区二区 | 亚洲最大成人中文| 别揉我奶头 嗯啊视频| 一本一本综合久久| 18禁在线播放成人免费| 亚洲av美国av| 国产高潮美女av| 亚洲av五月六月丁香网| 美女被艹到高潮喷水动态| 亚洲不卡免费看| 老司机午夜福利在线观看视频| 色视频www国产| 国产精品嫩草影院av在线观看 | 日韩成人在线观看一区二区三区| 免费无遮挡裸体视频| 天堂网av新在线| 亚洲男人的天堂狠狠| 最近在线观看免费完整版| 91久久精品国产一区二区成人| 久久久久久大精品| 九九久久精品国产亚洲av麻豆| av在线观看视频网站免费| 亚洲精品一卡2卡三卡4卡5卡| 成人一区二区视频在线观看| 国产一区二区在线av高清观看| 日本 av在线| 12—13女人毛片做爰片一| 日本成人三级电影网站| 啦啦啦观看免费观看视频高清| 免费看日本二区| xxxwww97欧美| 99热6这里只有精品| 国产人妻一区二区三区在| 18禁裸乳无遮挡免费网站照片| 一级毛片久久久久久久久女| 亚洲狠狠婷婷综合久久图片| 99在线人妻在线中文字幕| 床上黄色一级片| 国产三级中文精品| 亚洲精品在线美女| 在线观看66精品国产| 免费看光身美女| 18+在线观看网站| 中文字幕高清在线视频| 脱女人内裤的视频| 亚洲精品乱码久久久v下载方式| 色综合欧美亚洲国产小说| 欧美色视频一区免费| 嫩草影院入口| 成人午夜高清在线视频| 亚洲av熟女| 国内毛片毛片毛片毛片毛片| 舔av片在线| 国产精品女同一区二区软件 | 国产午夜精品久久久久久一区二区三区 | 亚洲在线观看片| 亚洲久久久久久中文字幕| 成人亚洲精品av一区二区| 麻豆av噜噜一区二区三区| 国产麻豆成人av免费视频| 亚洲国产色片| 国产亚洲精品久久久com| 嫁个100分男人电影在线观看| 一区二区三区四区激情视频 | 给我免费播放毛片高清在线观看| 一边摸一边抽搐一进一小说| 色播亚洲综合网| 天美传媒精品一区二区| 深爱激情五月婷婷| 18禁在线播放成人免费| 国产亚洲欧美在线一区二区| 日韩欧美三级三区| 日韩欧美一区二区三区在线观看| 99久久精品热视频| 色噜噜av男人的天堂激情| 在线观看一区二区三区| 丰满的人妻完整版| 日本精品一区二区三区蜜桃| 久久婷婷人人爽人人干人人爱| 国产精品久久久久久精品电影| 五月伊人婷婷丁香| www日本黄色视频网| 99久久久亚洲精品蜜臀av| 亚洲中文字幕日韩| 国产白丝娇喘喷水9色精品| 亚洲av五月六月丁香网| 婷婷亚洲欧美| 少妇高潮的动态图| 波野结衣二区三区在线| 精品不卡国产一区二区三区| 久久久久国产精品人妻aⅴ院| 国产熟女xx| 亚洲无线观看免费| 中文资源天堂在线| 亚洲国产精品合色在线| av天堂中文字幕网| 在线天堂最新版资源| 亚洲专区中文字幕在线| 欧美又色又爽又黄视频| 国产精品综合久久久久久久免费| 日本黄色视频三级网站网址| 老熟妇仑乱视频hdxx| 国产高清视频在线播放一区| 每晚都被弄得嗷嗷叫到高潮| 国产精品影院久久| 久久香蕉精品热| 亚洲欧美日韩东京热| 国产精品亚洲美女久久久| 国产探花在线观看一区二区| 老女人水多毛片| 国产大屁股一区二区在线视频| 色视频www国产| 成年女人毛片免费观看观看9| 亚洲人成电影免费在线| 美女 人体艺术 gogo| 一本久久中文字幕| 亚洲无线在线观看| 深夜精品福利| 国产成年人精品一区二区| 亚洲av免费在线观看| 深夜精品福利| 久久精品影院6| 久久人人爽人人爽人人片va | 嫩草影院精品99| av在线天堂中文字幕| 在线观看美女被高潮喷水网站 | 毛片女人毛片| 亚洲成人久久爱视频| 一本一本综合久久| 日韩av在线大香蕉| 搡老妇女老女人老熟妇| 日日干狠狠操夜夜爽| 狠狠狠狠99中文字幕| 51午夜福利影视在线观看| 夜夜爽天天搞| 亚洲国产精品成人综合色| 日日干狠狠操夜夜爽| 18美女黄网站色大片免费观看| 偷拍熟女少妇极品色| av在线天堂中文字幕| 国内毛片毛片毛片毛片毛片| 日韩欧美免费精品| 18禁在线播放成人免费| 舔av片在线| 在线观看美女被高潮喷水网站 | 久久久久九九精品影院| 亚洲av免费高清在线观看| 亚洲成av人片免费观看| 成人无遮挡网站| 18禁裸乳无遮挡免费网站照片| 亚洲欧美清纯卡通| 成人无遮挡网站| 日韩欧美精品免费久久 | 亚洲国产精品合色在线| 日本成人三级电影网站| 日本熟妇午夜| 成人高潮视频无遮挡免费网站| 久久精品91蜜桃| 久久久久久九九精品二区国产| 1000部很黄的大片| 在线观看av片永久免费下载| 国产三级中文精品| 久久精品国产亚洲av香蕉五月| 精品乱码久久久久久99久播| 男女床上黄色一级片免费看| 国产精品女同一区二区软件 | 99riav亚洲国产免费| 亚洲欧美日韩高清专用| 欧美色欧美亚洲另类二区| 国产又黄又爽又无遮挡在线| 亚洲午夜理论影院| 一个人看的www免费观看视频| 久久精品91蜜桃| 深夜a级毛片| 国产免费av片在线观看野外av| 成人特级av手机在线观看| 夜夜爽天天搞| 1024手机看黄色片| 国内精品久久久久久久电影| 老司机午夜福利在线观看视频| 日韩欧美国产在线观看| 99精品在免费线老司机午夜| 欧美日本视频| 日本熟妇午夜| 亚洲精品在线美女| 人人妻,人人澡人人爽秒播| 国产高清激情床上av| 长腿黑丝高跟| 深爱激情五月婷婷| 一边摸一边抽搐一进一小说| 国产精品伦人一区二区| 亚洲三级黄色毛片| 亚洲午夜理论影院| 全区人妻精品视频| 人人妻人人澡欧美一区二区| 国产蜜桃级精品一区二区三区| 色哟哟·www| 俺也久久电影网| 国产成人影院久久av| 午夜福利18| 精品久久久久久,| 日韩亚洲欧美综合| 成年女人看的毛片在线观看| 亚洲av免费高清在线观看| 三级毛片av免费| 男女那种视频在线观看| 国产精品1区2区在线观看.| 婷婷色综合大香蕉| 亚洲av日韩精品久久久久久密| 真人一进一出gif抽搐免费| 很黄的视频免费| 老师上课跳d突然被开到最大视频 久久午夜综合久久蜜桃 | 嫩草影院新地址| 免费人成视频x8x8入口观看| 久久午夜亚洲精品久久| 亚洲欧美激情综合另类| 怎么达到女性高潮| 国产黄片美女视频| 最好的美女福利视频网| 五月玫瑰六月丁香| 亚洲精华国产精华精| xxxwww97欧美| 怎么达到女性高潮| 在线天堂最新版资源| avwww免费| 国产亚洲欧美在线一区二区| 男人和女人高潮做爰伦理| 99热这里只有精品一区| 99国产精品一区二区三区| 人人妻人人澡欧美一区二区| 香蕉av资源在线| 午夜福利在线观看吧| 国内精品久久久久久久电影| 午夜视频国产福利| 国产一区二区三区视频了| 国产免费av片在线观看野外av| 色播亚洲综合网| 亚洲成人久久爱视频| 淫妇啪啪啪对白视频| 国产精品98久久久久久宅男小说| 久久久久亚洲av毛片大全| 国产高清激情床上av| 性色av乱码一区二区三区2| 久久99热6这里只有精品| 亚洲国产日韩欧美精品在线观看| 悠悠久久av| 我的女老师完整版在线观看| 久久久久久久精品吃奶| 亚洲av电影不卡..在线观看| 伊人久久精品亚洲午夜| 日韩欧美精品v在线| 亚洲国产欧美人成| 国产精品嫩草影院av在线观看 | 18美女黄网站色大片免费观看| 亚洲国产色片| 天堂影院成人在线观看| 亚洲av五月六月丁香网| 精品人妻视频免费看| 久久精品综合一区二区三区| 久久午夜福利片| 欧美日韩亚洲国产一区二区在线观看| 午夜日韩欧美国产| 亚洲第一区二区三区不卡| 国产精品,欧美在线| 久久午夜福利片| 天堂影院成人在线观看| 搞女人的毛片| 精品久久久久久久久亚洲 | 欧美一区二区亚洲| 国内精品久久久久久久电影| 少妇的逼水好多| 国产爱豆传媒在线观看| www.999成人在线观看| 成人无遮挡网站| 欧美极品一区二区三区四区| 欧美乱色亚洲激情| 久久人人精品亚洲av| 18禁在线播放成人免费| 桃色一区二区三区在线观看| 欧美高清成人免费视频www| 日韩免费av在线播放| 少妇的逼好多水| 久久久国产成人免费| 免费在线观看日本一区| 日本黄色视频三级网站网址| 国产精品免费一区二区三区在线| 日本 欧美在线| 日韩欧美国产在线观看| 精品国产亚洲在线| 国产精品一区二区三区四区久久| 97热精品久久久久久| 别揉我奶头 嗯啊视频| 国产精品1区2区在线观看.| 一级a爱片免费观看的视频| 亚洲av第一区精品v没综合| 免费黄网站久久成人精品 | 国产精品精品国产色婷婷| 夜夜夜夜夜久久久久| 国产精品乱码一区二三区的特点| 美女免费视频网站| 日日干狠狠操夜夜爽| 午夜福利成人在线免费观看| 伦理电影大哥的女人| 18禁黄网站禁片免费观看直播| 久久久久久久精品吃奶| 一卡2卡三卡四卡精品乱码亚洲| 国产精品98久久久久久宅男小说| 男女做爰动态图高潮gif福利片| 亚洲av熟女| 亚洲avbb在线观看| 欧美不卡视频在线免费观看| 国产高清激情床上av| 美女cb高潮喷水在线观看| 可以在线观看毛片的网站| av国产免费在线观看| 欧美乱妇无乱码| 日本熟妇午夜| 亚洲国产欧洲综合997久久,| 欧美色欧美亚洲另类二区| 欧美一级a爱片免费观看看| ponron亚洲| 淫秽高清视频在线观看| 99久国产av精品| 久久香蕉精品热| 国产一区二区激情短视频| 久久久久性生活片| 757午夜福利合集在线观看| 日韩欧美一区二区三区在线观看| 嫁个100分男人电影在线观看| 可以在线观看毛片的网站| 国产三级在线视频| 女人十人毛片免费观看3o分钟| 午夜福利成人在线免费观看| 九九在线视频观看精品| 亚洲自偷自拍三级| 美女 人体艺术 gogo| 内射极品少妇av片p| 国内揄拍国产精品人妻在线| 国产精品久久久久久亚洲av鲁大| 国产精品日韩av在线免费观看| 91麻豆av在线| 午夜两性在线视频| 国产精品三级大全| 首页视频小说图片口味搜索| 变态另类成人亚洲欧美熟女| 亚洲自偷自拍三级| 免费在线观看成人毛片| 成人高潮视频无遮挡免费网站| 日韩欧美一区二区三区在线观看| 男人和女人高潮做爰伦理| 赤兔流量卡办理| 午夜福利欧美成人| 禁无遮挡网站| 国产午夜精品论理片| 精品久久久久久久久亚洲 | 精品久久久久久久末码| 99热精品在线国产| 亚洲国产精品sss在线观看| 18禁裸乳无遮挡免费网站照片| 国产在线男女| 精品国产三级普通话版| 成人无遮挡网站| 淫妇啪啪啪对白视频| ponron亚洲| 91在线精品国自产拍蜜月| 一级黄片播放器| 脱女人内裤的视频| 波多野结衣高清无吗| 免费搜索国产男女视频| 久久久久精品国产欧美久久久| 熟妇人妻久久中文字幕3abv| 3wmmmm亚洲av在线观看| 观看美女的网站| 狂野欧美白嫩少妇大欣赏| 成人永久免费在线观看视频| 黄色女人牲交| aaaaa片日本免费| 国产精品一区二区三区四区免费观看 | 嫩草影院精品99| 亚洲av电影不卡..在线观看| 人妻夜夜爽99麻豆av| 69人妻影院| 午夜精品一区二区三区免费看| 日韩精品青青久久久久久| 日本免费a在线| 日本一本二区三区精品| 人人妻人人澡欧美一区二区| 美女cb高潮喷水在线观看| 小蜜桃在线观看免费完整版高清| 国产高清视频在线播放一区| 欧美性猛交╳xxx乱大交人| 高清在线国产一区| 日韩免费av在线播放| 日本 欧美在线| 成人精品一区二区免费| 少妇丰满av| 毛片女人毛片| 免费看光身美女| 美女高潮喷水抽搐中文字幕| 亚洲人成伊人成综合网2020| 波野结衣二区三区在线| 久久久久久久午夜电影| 成年女人毛片免费观看观看9| 中文亚洲av片在线观看爽| 丰满乱子伦码专区| 99久久精品国产亚洲精品| 波野结衣二区三区在线| 国产精品爽爽va在线观看网站| 久久伊人香网站| 国内精品美女久久久久久| 日日干狠狠操夜夜爽| 免费在线观看日本一区| eeuss影院久久| 国产欧美日韩一区二区精品| 国产毛片a区久久久久| 免费高清视频大片| 欧美日韩福利视频一区二区| 国产精品一区二区三区四区免费观看 | 男女视频在线观看网站免费| 人妻丰满熟妇av一区二区三区| 搡老岳熟女国产| 精品一区二区三区视频在线| 在线十欧美十亚洲十日本专区| 黄片小视频在线播放| 老司机午夜十八禁免费视频| 动漫黄色视频在线观看| 欧美日韩乱码在线| 亚洲在线观看片| 日韩成人在线观看一区二区三区| 欧美乱妇无乱码| 少妇熟女aⅴ在线视频| 国产成人福利小说| 精品99又大又爽又粗少妇毛片 | 国内精品美女久久久久久| 俄罗斯特黄特色一大片| 精品久久久久久久久久免费视频| 一级a爱片免费观看的视频| 成年人黄色毛片网站| 熟妇人妻久久中文字幕3abv| 亚洲综合色惰| 非洲黑人性xxxx精品又粗又长| 久久国产精品影院| 亚洲性夜色夜夜综合| 国产aⅴ精品一区二区三区波| 2021天堂中文幕一二区在线观| 给我免费播放毛片高清在线观看| 日韩欧美在线乱码| 国产91精品成人一区二区三区| 成人鲁丝片一二三区免费| 悠悠久久av| 最近中文字幕高清免费大全6 | 欧美黑人巨大hd| 午夜免费男女啪啪视频观看 | 日本三级黄在线观看| 国产极品精品免费视频能看的| 亚洲狠狠婷婷综合久久图片| 国产成人aa在线观看| 国产精品一区二区三区四区免费观看 | 日韩高清综合在线| 老司机深夜福利视频在线观看| 亚洲av日韩精品久久久久久密| 又爽又黄a免费视频| 男人舔奶头视频| 在线观看午夜福利视频| 特级一级黄色大片| 国产黄a三级三级三级人| 久久精品国产亚洲av天美| 一级a爱片免费观看的视频| 欧美色欧美亚洲另类二区| 悠悠久久av| 国模一区二区三区四区视频| 国产精品99久久久久久久久| www.999成人在线观看| 级片在线观看| 婷婷色综合大香蕉| 一级黄片播放器| 精品一区二区三区视频在线观看免费| 51午夜福利影视在线观看| 欧美高清成人免费视频www| 精品乱码久久久久久99久播| 中出人妻视频一区二区| 亚洲 国产 在线| 嫩草影院精品99| 色综合欧美亚洲国产小说| 亚洲专区中文字幕在线| 一本一本综合久久| 三级男女做爰猛烈吃奶摸视频| 超碰av人人做人人爽久久| 色综合婷婷激情| 精品久久国产蜜桃| 人妻丰满熟妇av一区二区三区| 色吧在线观看| 免费在线观看成人毛片| 好男人电影高清在线观看| 男插女下体视频免费在线播放| h日本视频在线播放| 欧美性猛交╳xxx乱大交人| a级一级毛片免费在线观看| 国产精品免费一区二区三区在线| 内地一区二区视频在线| 免费看a级黄色片| 简卡轻食公司| 夜夜看夜夜爽夜夜摸| 毛片一级片免费看久久久久 | 欧美丝袜亚洲另类 | 九九在线视频观看精品| 国产精品久久久久久人妻精品电影| 欧美绝顶高潮抽搐喷水| 国产精品女同一区二区软件 | 亚洲一区二区三区不卡视频| 久久精品综合一区二区三区| 精品久久久久久久久久免费视频| 精品久久久久久久久亚洲 | 久久草成人影院| 欧美日本亚洲视频在线播放| 美女 人体艺术 gogo| 久久精品人妻少妇| 亚洲成人久久爱视频| 久久久久久九九精品二区国产| 美女cb高潮喷水在线观看| 又紧又爽又黄一区二区| 国产精品久久久久久人妻精品电影| 91狼人影院| 变态另类丝袜制服| 国产高清三级在线| 宅男免费午夜| 亚洲国产精品久久男人天堂| 少妇丰满av| 国内精品久久久久久久电影| 国产三级中文精品| 可以在线观看的亚洲视频| 日韩欧美 国产精品| 国产人妻一区二区三区在| 精品一区二区三区人妻视频| 亚洲五月婷婷丁香| 成人特级黄色片久久久久久久| 中国美女看黄片| 一级黄色大片毛片| 精品久久久久久久末码| 亚洲经典国产精华液单 | 熟妇人妻久久中文字幕3abv| 俄罗斯特黄特色一大片| 国产精品亚洲美女久久久| 51午夜福利影视在线观看| 老司机深夜福利视频在线观看| 国产精品女同一区二区软件 | 757午夜福利合集在线观看| 日日干狠狠操夜夜爽| 少妇熟女aⅴ在线视频| 一区二区三区四区激情视频 | 日韩欧美 国产精品| 精品人妻熟女av久视频| 国产乱人视频| 免费在线观看成人毛片| 午夜福利在线在线| 99热这里只有是精品在线观看 | 午夜激情欧美在线| 久久热精品热| 别揉我奶头~嗯~啊~动态视频| 亚洲精品在线美女| 麻豆国产av国片精品| 亚洲中文字幕一区二区三区有码在线看| 99在线视频只有这里精品首页| 日韩欧美 国产精品| 日韩 亚洲 欧美在线| 欧美又色又爽又黄视频| 久久99热6这里只有精品| 美女大奶头视频| 精品99又大又爽又粗少妇毛片 | 久久亚洲精品不卡| 99久久成人亚洲精品观看| 精品乱码久久久久久99久播| 午夜久久久久精精品| 91麻豆精品激情在线观看国产| 精品久久久久久久久久免费视频| 亚洲av成人av| 国产激情偷乱视频一区二区| 90打野战视频偷拍视频| 在线播放无遮挡| 男女之事视频高清在线观看| 日韩精品中文字幕看吧| 色播亚洲综合网| 亚洲人成网站在线播放欧美日韩| 午夜福利视频1000在线观看| 精品国产亚洲在线| 成人性生交大片免费视频hd| 亚洲精品在线观看二区| 日本黄色片子视频| 精华霜和精华液先用哪个| 亚洲欧美精品综合久久99| 国内揄拍国产精品人妻在线| 日韩欧美国产在线观看| 波多野结衣高清作品| 小蜜桃在线观看免费完整版高清| 亚洲av一区综合| 久久精品国产亚洲av涩爱 | 一级作爱视频免费观看| 亚洲 国产 在线| 亚洲一区高清亚洲精品| 婷婷六月久久综合丁香| 级片在线观看| 麻豆国产97在线/欧美| 午夜日韩欧美国产| 51午夜福利影视在线观看| 精品不卡国产一区二区三区| 亚洲最大成人手机在线| 国产精品影院久久| 亚洲av不卡在线观看| 亚洲综合色惰| 丁香六月欧美| 一个人免费在线观看电影|