• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    New Fragile Watermarking Technique to Identify Inserted Video Objects Using H.264 and Color Features

    2023-10-26 13:13:54RaheemOglaEmanShakarMahmoodRashaAhmedandAbdulMonemRahma
    Computers Materials&Continua 2023年9期

    Raheem Ogla ,Eman Shakar Mahmood ,Rasha I.Ahmed and Abdul Monem S.Rahma

    1Computer Science Department,University of Technology,Baghdad,11030,Iraq

    2Computer Science Department,Al_Maarif University College,Anbar,31001,Iraq

    ABSTRACT The transmission of video content over a network raises various issues relating to copyright authenticity,ethics,legality,and privacy.The protection of copyrighted video content is a significant issue in the video industry,and it is essential to find effective solutions to prevent tampering and modification of digital video content during its transmission through digital media.However,there are still many unresolved challenges.This paper aims to address those challenges by proposing a new technique for detecting moving objects in digital videos,which can help prove the credibility of video content by detecting any fake objects inserted by hackers.The proposed technique involves using two methods,the H.264 and the extraction color features methods,to embed and extract watermarks in video frames.The study tested the performance of the system against various attacks and found it to be robust.The evaluation was done using different metrics such as Peak-Signal-to-Noise Ratio(PSNR),Mean Squared Error(MSE),Structural Similarity Index Measure (SSIM),Bit Correction Ratio (BCR),and Normalized Correlation.The accuracy of identifying moving objects was high,ranging from 96.3% to 98.7%.The system was also able to embed a fragile watermark with a success rate of over 93.65% and had an average capacity of hiding of 78.67.The reconstructed video frames had high quality with a PSNR of at least 65.45 dB and SSIM of over 0.97,making them imperceptible to the human eye.The system also had an acceptable average time difference(T=1.227/s)compared with other state-of-the-art methods.

    KEYWORDS Video watermarking;fragile digital watermark;copyright protection;moving objects;color image features;H.264

    1 Introduction

    With the rapid advancement of modern technology,the interest in copyright security and the verification of computerized media content (music,images,and video) are becoming increasingly important [1,2].Information transmitted over interconnected networks,especially sensitive video content on the internet,is subjected to various malicious attacks.These attacks cast many doubts about the security,authenticity,and integrity of the video content on the receiving end [3].Watermarking technology has become popular for ensuring the authenticity of digital video content[4].One of the main challenges of image processing is the processing of digital video,which is key for the identification of interesting objects within images[5,6].Digital watermarking is a technique that embeds hidden keys known as watermarks into video data;these hidden keys serve many purposes [7–9].For example,watermark files are added to images,audio,and videos for authentication [9].There are two types of watermarks:blind and non-blind[10].Non-blind watermarks require a dataset for retrieval,while blind watermarks do not require the original video contents to be retrieved [11].In cases where the authenticity of a video’s contents is in question,a secure validation framework can be used to show that no tampering has occurred and to detect and identify tiny changes in watermarked interactive media information.To achieve this,sophisticated watermarks are designed [12].The main goal of developing a watermark framework is to ensure the integrity of live video by detecting and verifying that no modifications have been made [13–15].However,traditional watermarking techniques are susceptible to tamper attacks and require careful solutions to address challenges such as the ability to detect changes without the original video and sensory transparency [16,17].Many watermarking algorithms have been proposed to protect copyright and certify standards[17],including recent ones that focus on the H.264/AVC(Advanced Video Coding)standard encoding[18,19].However,it is not possible to directly apply many of the previously proposed video watermarking algorithms;therefore,it is necessary to develop new algorithms to meet these standards.

    This paper proposes a hybrid watermarking technique that is both imperceptible and robust.Two hybrid methods,H.264 and color feature extraction,are used to embed digital watermarks into videos.This technique ensures that contents or moving objects are not inserted into the original video contents,thus providing proof of ownership and addressing unresolved challenges by bridging the digital gap to authenticate video content against hackers.The H.264/AVC video authentication method focuses on the compressed domain,and the embedding process takes place within the compressed bit stream provided by H.264/AVC[20].

    2 Related Work

    The system introduced in this paper includes watermarks that are embedded into the spatial domain.In this section,in this paper,many review research conducted on the proposed methodology.

    The authors of[21]presented a new approach for fragile watermarking that has a high capacity for retrieval.Their method involved embedding authentication bits in the adaptive Least Significant Bit(LSB)layers of each block’s central pixel,based on the block’s complexity for the mean value of bits.The researchers used three methods to retrieve adjacent blocks,and despite a large tampered area,they claimed that their proposal achieved high quality compared to other methods.

    The authors of[22]introduced the independent embedding domain(ED)by adopting two RRW(robust reversible watermarking) stages.They recommended transforming the cover image into two independent EDs and embedding robust and reversible watermarks into each domain separately.The authors confirmed that the embedding performance of the original RRW was greatly improved through their proposed method.

    The authors of[23]studied a set of features using Log-Polar,discrete wavelet transform(DWT),and singular value decomposition(SVD)techniques to embed and retrieve watermarks for the purpose of safeguarding copyright and creating a robust and undetectable watermark system.They employed the strategy of discarding frames and achieving specific features to enhance their method.The researchers also used scramble and deep learning-based approaches to create a secret sharing image of the watermark,which improved comparison speed compared to the traditional table-based approaches of Log-Polar,DWT,and SVD.

    The authors of[24]proposed a technique for authenticating surveillance videos using semi-fragile watermarking in the frequency domain.The process involved generating a binary watermark and identifying regions of interest to use as holders for the watermark during the embedding process.These regions were decomposed into different frequency sub-bands using SVD and DWT.Then,the watermark was embedded in the selected bands in an additive manner.Blind detection was used to retrieve the hidden signature from the watermarked video.

    The authors of [25] proposed a low-cost algorithm for detecting video tampering by using the correlation coefficients between video frames and merging them as encoded data in the first frame of the video stream.To embed the encoded data,the correlation values were calculated and encrypted using the Advanced Encryption Standard(AES)algorithm.Finally,the encryption result was hidden using bit-substitution technology,which randomly selects the two least significant bits from the first frame.

    The authors of[26]proposed a modern watermarking technique that involved embedding multiple messages and a photograph into a single image for protection,as well as repeating N-frames in the film.They used multiple video sequences and evaluated their approach using three types of content:MP4,AVI,and MPEG.They also proposed a method for combining two watermarks in a specific video format.

    The authors of [27] introduced a video watermarking technique that utilized a moving object detection algorithm to embed a bit stream watermark.The goal of the watermark was to increase the moving object’s robustness by identifying large blocks that belonged to it in each frame of type P.An animated object detection algorithm was used to embed the watermark in the blocks to ensure the continuity of the bit stream.

    The method proposed in this paper offers a precise authentication technique that maintains the original bitrate and sensory quality while offering high fragility and accuracy.The method can detect tampered frames in cases of color manipulation and spatiotemporal tampering.

    The proposed method creatively connects the content of video sequences,and it is designed to be sensitive to malicious attacks by hackers.The method is robust and has low computational complexity,and can be applied to different video formats.Additionally,it is sensitive to detecting and verifying that no modifications occur in live video by using a fragile watermark embedded in video content to achieve video copyright protection.The distinctive features and novelty of the proposed method can be summarized as follows:

    1.The accuracy of determining the location of the movement of the objects in the video frame,and considering it a fragile region to insert the watermark.

    2.Investing in the real-time movement of the moving object in the video frames to insert the largest capacity of the watermark to secure the copyright of the video.

    3.The method has less computational complexity.Despite,there being many measures and criteria used to verify.

    4.The method is powerful in protecting online video regardless of video resolution or format.

    But,when various practical experiments for various video films were conducted,proposed method faced some limitations and challenges.It was found that low-resolution video films have a very small amount of watermark insertion compared to high-resolution video films.In addition to,the cartoon videos prepared for children,the movement of objects in them is far apart(the moving objects)in the spatial space,which leads to difficulty in identifying the fragile area used to insert the watermark.This leads to poor security of this type of video,which leads to the ease of identifying the watermark by hackers.

    In recent years,data transmission via multimedia has become an important issue that cannot be abandoned.At the same time,deliberate attacks to sabotage and falsify this data have escalated,so ensuring the credibility and integrity of digital media is a major issue that requires the development of basic mechanisms and solutions.The issue of multimedia security is a fundamental issue,as videos,audio,images,and text files lose their credibility,as tamperers use multiple tools to distort or manipulate their contents by deleting or entering unwanted information,so all kinds of information and data are transmitted over the network with many problems related such as illegal distribution,copying,manipulation,and forgery.Therefore,the motive behind this paper came to contribute to solving the above-mentioned issues related to securing data transmitted via multimedia in the proposed way.

    The remainder of the paper is structured as follows,Section 3 introduces the proposed work,Section 4 details the advanced features of video encoding,Section 5 describes the technique for a fragile watermark and its structure,as well as embedded and extracted color features,Section 6 presents the experimental results and corresponding discussion,finally,Section 7 concludes the paper and suggests areas for future work.

    3 Methodology

    This section describes the methodology used in this research.To watermark video content,two hybrid methods are used:H.264 and color feature extraction.The aim is to identify the most vulnerable regions caused by the rapid movement of objects in video frames,by determining the background of moving objects in digital video.This enables the insertion of watermarks in fragile areas to secure real live videos and protect their copyright.The video watermark scheme is designed to detect various attacks by hackers that tamper with moving objects and their backgrounds in the video,such as inserting unwanted information or video piracy.

    3.1 H.264 Method

    The proposed method for video watermarking is based on the H.264 standard developed by the Joint Video Team(JVT).This method uses novel coding approaches to improve the Rate–distortion(RD)performance compared to the previous H.263 standard.A fragile video watermarking technique is introduced where the watermark data is contained in a movement-mapped,extremely fragile matrix.The H.264/AVC video watermarking approach that is used during encoding embeds the watermark in the motion object matrix,taking advantage of its fragility based on statistical analysis to determine the best RD cost using the H.264/AVC RD.This approach also detects the location of moving objects in a video sequence by analyzing the movement vectors using the H.264/AVC RD.

    3.2 Color Feature Extraction Method

    The second method that is used to protect the ownership of video copyrights involves the extraction of the color features from the key frames of the video.This involves comparing frames with lower level features such as color and structure to extract an accurate key frame that covers the entire video sequence using a two-stage method.First,an alternate sequence is created by identifying color feature differences between adjacent frames in the original sequence.Then,by analyzing the structural feature differences between adjacent frames in the alternate sequence,the final key frame sequence is obtained.An optimization step is included to ensure efficient key frame extraction based on the desired number of final key frames.

    The measure of structural similarity is determined by calculating the covariance.This involves measuring the similarity of the blocks within a frame at different points,denoted as P(xi,yi).The covariance ofxandy,which is used to determine the correlation coefficient,is then calculated using Eq.(1).

    whereμiindicates the value of an average andNis the number of blocks within the frame.

    The structure similarity component between two frame blocks is calculated as(x,y),based on the two blocks of the corresponding frame at the same positionx(in the original image)andy(in the test image)as shown in Eq.(2).

    whereI=((M×N)2/2),M∈[0,255],N?1,and the variance ofxandyareσxandσy,respectively.

    4 Proposed Method

    The proposed method aims to detect different types of attacks done by hackers who tamper with moving objects and their backgrounds in videos by inserting unwanted information or engaging in video piracy.The detection of such tampering is achieved by embedding fragile watermarks in video content for copyright verification.Two techniques,H.264/AVE and color feature extraction,are used to authenticate and verify the watermark.The suggested method involves two stages,embedding and extracting watermarks.A general block diagram of the proposed digital video watermark for protecting transmitted video content is shown in Fig.1.

    Figure 1:General block diagram of the proposed digital video watermark for protecting transmitted video contents

    The proposed embedding phase has been described in Algorithm 1,involves multiple steps.

    The suggested approach verifies if the video content has been tampered with or not.This method takes into account certain environmental parameters,such as accurate background frames,quality,and ability to handle changes in illumination.Additionally,techniques for updating the background are needed to detect moving objects.The proposed extraction phase has been described in Algorithm 2,involves several steps.Those steps including designing a process for decomposing digital videos,identifying the positions where fragile watermarks should be inserted,and creating a matrix consisting of 0 s and 1 s that maps out where the watermarks should be embedded as secret keys.To prevent sudden background movements caused by external factors like water ripples,cloud movements,leaf movements,snow,and rain,a technique for extracting color features is used.These processes are illustrated in Fig.2.

    4.1 Watermark-Based Color Feature Extraction Method

    The proposed method is based on the idea that in live videos,the background color of objects usually differs from the color of the foreground.Thus,in addition to intensity and color information,there are other factors that help differentiate the background and foreground of objects in frames.Each pixel P(Xc,Yc)in a frame consists of three color components(R,G,and B).However,adding color information can increase the length of the binary bits,leading to an increase in pattern dimensions and a reduction in algorithm efficiency.To overcome this,the Color of Spatial of Binary Patterns local binary patterns(CS_LBP)technique can be used to reduce patterns by utilizing central symmetry[11],choosing a small number K,and dropping one of the three color bits,which does not impact the intensity of the brightness since the three bits are highly chromatic.

    The CS_LBP utilized in this work is defined in Eq.(3),and the video features are described in Algorithm 3.

    where SCBP is a method that uses the average color of pixels in a region to represent its feature,CS_LBP is Color of Spatial of Binary Patterns local binary patterns,and (Xc,Yc) is the center of the pixel block.The total number of SC_LBP patterns is 64 if the K value is set to 4 The histogram of SC_BP is computed based on the radius of the circular region surrounding a pixel and is used to represent the pixel’s feature vector.A background model is created using these feature vectors.

    4.2 Background Design

    To hide the secret watermark key in the frame background,the method computes the average movement rating of objects in the frames.This is done by using Eq.(4)to model the background.

    whereBt-1(x,y)is the background of the previous frame,Ii(x,y)is the upcoming video frame,andtis the number of frames in the video sequence.

    4.3 Background Subtraction

    The detection model’s output,as shown in Fig.3,is a binary image that displays the background pixels’values.The threshold parameterTp(x,y)is defined as the value of primitiveTp.Whenever the process of updating the background model and updating the threshold of the background is carried out,it is updated as shown in Eq.(5)

    wheref (x,y)represents the similarity between the background histogram and the feature vector,Tpis a threshold and the learning rateαis close to 1.

    Figure 3:Background subtraction process

    4.4 Digital Video Verification Process Design

    This step of the proposed system involves checking the received video for tampering.The received video is loaded into the graphical user interface to undergo two types of operations:feature extraction and message extraction.Feature extraction is used to obtain unique features of the received video,while message extraction is used to obtain the user’s secret key embedded in the video frames.Using the secret key,the original video features can be accessed.The extracted features from the received video are then compared with the original features to detect any tampering that may have occurred.The integrity of the submitted video is demonstrated in Fig.4.

    Figure 4:Proposed method to ensure the integrity of the submitted

    4.5 Validation Process

    The proposed algorithm for video validation involves comparing the pixel values of original blocks with the decoding blocks of successive frames.To add a watermark to a video frame,it is first divided into blocks,and the watermark is added to each sub-block.During watermark retrieval,each subblock is validated,and if any sub-block does not contain the correct watermark,the entire block is considered tampered with.This ensures that the entire video is secure and that any tampering can be detected.

    5 Watermark Based H.264 Method

    The proposed method utilizes the block size motion compensation feature of H.264/AVC codec,which allows for an accurate representation of motion in a macro block and also provides opportunities for watermark embedding.In traditional video codecs,motion compensation is done using a fixed block size,while H.264/AVC uses variable block sizes.The codec compresses temporal redundancy between frames by estimating motion vectors and using them in inter-frame coding.The watermark is embedded by adding it to the original motion vectors,computing the new prediction error,and encoding the new motion vectors along with updated prediction errors into compressed bit streams.This allows for watermark embedding without the need to decompress the video.The proposed method is based on this H.264/AVC technique and will be implemented in the following sections.

    5.1 Feature Extraction Based on H.264

    The precise identification of the location of a fragile watermark can be used to indicate where tampering has occurred.In order to achieve effective and efficient tampering detection,it is important to have a well-designed localization feature,as shown in Fig.5.In Fig.5a,the video frame is divided into multiple rectangular groups,with 9 groups per frame in Quarter Common Intermediate Format(QCIF) format (176×144 pixels).These groups are further divided into three subgroups,each containing different macro-blocks.Since the dividing process of frames into blocks is interested in video frames that are typically located in the central area of the frame,where each three macroblocks are grouped together to form one subgroup when searching in the central area,and 4 macroblocks together when searching in the left or right subgroup.Additionally,each H.264 macroblock contains 16 pieces,as specified in the Discrete Cosine Transform(DCT)used in the H.264/AVC standard,as shown in Fig.5b.Using a private key,can able to select a coefficient at random from each DCT piece,resulting in 16 coefficient values for each macroblock.These 16 coefficients are then subjected to an Exclusive-Or(XOR)operation,producing a single coefficient value.The watermark for each subgroup coefficient is generated by performing XOR on the previously XORed coefficients of the macroblocks within the subgroup.The system then searches for object movement and detects fragile regions based on the number of pixels of blocks in consecutive frames.The resulting values are aggregated into a feature matrix and the key is then extracted from the fragile background of the moving object.

    Figure 5:(a)Block division and(b)generation of authentication watermark

    5.2 Watermark Embedding Based on H.264

    Watermark embedding has been suggested that the watermark is carried using motion vectors.Previous approaches to watermark embedding using motion vectors have relied on intuition rather than statistical analysis to select embedding locations.In contrast,our proposed method utilizes statistics,such as the Bjontegaard Delta PSNR (BD-PSNR) used by the JVT group to evaluate the PSNR differences between the RD curves of two calculations’bit rates.In H.264,the encoder conveys not only the motion vector but also the contrast value of the vector(Delta MV)between the motion vector (MV) and its expected value based on surrounding blocks.Where the MVs are categorizing into seven classes based on its length and perform watermarking embedding independently on each class to assess PSNR degradation and bit rate increase.The resulting BD-PSNR values are computed and plotted in Fig.6,showing that certain MV classes,such as|MV|between 2 and 22,are better for embedding due to less BD-PSNR degradation.Therefore,the final embedding location are selected from MVs in the 1 to 10 length range using a secret key and frame numbers.

    Figure 6:Selecting embedding position by using BD-Rate and BD-PSNR

    Watermarking often involves modifying and adjusting the value of theMVor motion differential vector during the embedding process.To achieve this,to determining the typical motion vector offset a criterion must be established.This is accomplished by minimizing the cost function of the Lagrangian RD and H.264/AVC,and the resulting value can be computed using Eq.(6).

    whereDandRrepresent distortion and rate,respectively,and are used to calculate the corresponding Lagrange multiplier.The value ofJ=1is used by H.264 to select the optimum mode and MV for that mode.To embed the watermark,the value of MV must obtain firstly,and then calculate its length.Then,Eq.(7)is used to insert and embed the watermark into the MV.

    whereMVxandMVyrepresent the watermarkedMVxandMVy,respectively,andWMrepresents the two-bit watermark to be embedded.If the condition is satisfied,then the MV remains unchanged after embedding the watermark.Otherwise,it is need to modify the MV in an RD sense by adjusting either the horizontal componentMVxor the vertical componentMVy.In Fig.7 the optimal quarterpixel MV is computed in area 7 using(1).However,it is need to capture the half-pixel motion vector during the motion search(in area B).If(2)is true,then can embed the watermark in area 7 without modifying the MV.Otherwise,it is need to need to modify the MV by replacing it with MV’,which is determined by finding the point with the lowest value of(1)among B,1,3,6,or 8.

    Figure 7:Fractional modification position

    5.3 Watermark Detection Based on H.264 Method

    To detect the watermark using the suggested fragile method,a specific video is needed for extracting the watermark,which can also result in difficult detection.The watermark detection process involves several steps:

    ? Identify watermarking areas that utilize the same calculation as the embedding preparation.

    ? Determine the watermark information using Eq.(8).

    5.4 Watermark Verification

    The previous frame can be verified by comparing the watermarks that have been detected in the current frame with the extracted features,as illustrated in Fig.8.

    Figure 8:Watermark verification

    6 Experimental Results and Analysis

    To evaluate the proposed watermarking approach,where the H.264/AVC JM9.2 computer program[9]and other assistance programs as references,it is need to tested the approach on several video sequences,including Foreman(QCIF),News(QCIF),Silent(QCIF),Container(QCIF),and Mobile(CIF),among others.To comply with the H.264 baseline profile,it is need to use the IPP H.264 Encoder to encode the video frames with QP values of 24,28,32,36,and 40.And the results,shown in Table 1 and Fig.9,demonstrate the proposed method outperforms three other motion-based watermarking strategies proposed by Hammami [24] in terms of RD performance metrics such as Bitrate/Kbps,PSNR/dB,and RD.

    Table 1:PSNR and bit rate twisting

    Fig.9 also illustrates the proposed watermarking approach achieves the highest quality of RD compared to other methods.This is because the proposed method has been carefully designed to embed the watermark in a specific and optimal location,based on statistical analysis.Additionally,the proposed method is more effective since all potential directional offsets of the motion vector for watermark insertion has been used.

    Figure 9:Rate distortion curves

    6.1 Execution Time Estimation

    The implemented process of inserting and extracting the watermark using programs written in the C#programming language.The operations were carried out on a computer with Windows 10(64 bits)and an Intel(R)Core i5-4200 m CPU@2.50 Ghz 2.49 processor.The execution times for different video sizes are presented in Table 2.

    Table 2:Embedding time and extraction processes for watermark

    In terms of testing and evaluating the elapsed time,the experimental tests were carried out using two binary messages that were inserted as watermarks during the embedding and extraction process,and the results were calculated by applying the watermark to the selected frames of the video.In order to examine the effect of time,experimental time complexity was carried out.It is taken that the embedded time value is the same for both the first watermark and the second watermark.and show that the embedded time value is proportional directly to selected frame numbers.A total of 6 frames were specified from pure storage video;Thus,the total embed time is the highest for the same video.Tables 3 and 4 collect the processing time(in seconds)required to perform frame selection,embedding,and watermark extraction for a given set of video frames.The results proved that the time depends entirely on processor specifications and the selection of frames from the video.Figs.10 and 11 present the estimation time for embedding and Extracting of deferent videos when two watermarks are inserted.

    Table 3:Elapsed time(in second)of 6 videos based watermark message one

    Figure 10:Estimation time for embedding and extracting of deferent videos:Watermark 1

    Figure 11:Estimation time for embedding and extracting of deferent videos:Watermark 2

    6.2 Performance Metrics

    To assess the effectiveness of the proposed method,several standard performance metrics,including PSNR,SSIM,and bit correction ratio (BCR) are used.These metrics were used to evaluate the imperceptibility,robustness,and quality of watermarked video frames.These metrics are commonly used in watermarking and are defined by Eqs.(9)–(13).Specifically,the PSNR metric used to measure the quality of the original video frame and the frame on which the watermark was inserted,as described in Eq.(9).

    whereMaxis the maximum pixel value of the original sequence frames in the original video,andMSE(Mean Square Error)is the error between twoh×wframes(that is,the original frames and the watermark)as specified in Eq.(10).

    To extract the watermark from a watermarked video frame,the value of PSNR determined by≥65 dB indicates good quality frame reconstruction,as described in Eq.(9).Additionally,the metric SSIM metric has been used,as defined in Eq.(11),to assess the perceptual quality degradation produced by watermark insertion.SSIM quantifies the perceived difference between two similar frames and generates a quality reference by comparing the original and modified frames.

    whereK1andK2are constants used to assure stability when the denominator equals 0,μ1,andμ2represent mean values,andσis the values of variance framesF1andF2.

    To evaluate the accuracy of the extracted watermark bits,the BCR (Benefit Cost Ratio) metric are used,the metric compares the two sequences of digital binary frames: the inserted data and the extracted watermarks(B,B’,respectively).BCR is defined as the number of bits that were correctly extracted as a percentage of the total number of bits that were embedded in the host frame,as described in Eq.(12).

    wherenis the bit’s sequence length and ⊕represents the XOR operator.The BCR value is 100%.According to Eq.(12),if the extracted watermark contains no errors,the BCR accuracy value will be 100%.

    6.3 Effective Gain Index

    When performing image watermarking,there is a trade-off between embedding and robustness.To strike a balance between these qualities,an appropriate gain index factor(BCR)value should be chosen for embedding the watermark.In experimented results three different gain factor values has been tested(λ=0.1,0.2,and 0.3)to measure the invisibility and robustness of the video frame watermarking,as shown in Table 5.The table displays the different gain factor values used and their impact on the watermark’s visibility and robustness.

    Table 5:Fidelity-based criteria for PSNR(dB),SSIM,and BCR(%)

    6.4 Robustness and Attack Analysis

    To compare the extracted watermarks with the original frames,the normalized correlation(NC)metric is used,which produces values between 0.0 and 1.0.Eq.(13) describes the calculation of this metric.

    When the NC value approaches 1.0,it means that the extracted watermark is very similar to the original one.Table 6 compares the PSNR and NC values of the proposed watermark extraction technique with other conventional algorithms.It is clear that the proposed technique outperforms the conventional algorithms in terms of watermark quality.To test the robustness of the proposed technique,various attacks were applied to the watermarked frames,including gamma correction,contrast adjustment,Gaussian noise,rotation,cropping,MPEG4 compression,resizing,JPEG compression,noise addition,filtering,frame averaging,histogram equalization,and frame dropping.Table 6 shows the results of most of these attacks.

    Table 6:Comparison of the proposed technique with other algorithms(Attacks)

    6.5 Security Analysis

    In order to analyse the security of the watermarked video it is must be subjected to different video processing such as Gaussian,Poisson,and Speckle noise,and Salt&Pepper,Its effect is similar to what hackers do to remove the watermark embedded in video content.Therefore,the proposed watermarked method has been evaluated and tested with various attacks having numerous parameters until the quality of the watermarked videos is acceptable according to the known quality metrics.(explained in Section 4.5).Those attacks have been implemented by inserting specific noise ratios on watermarked video frames,the selected attacks are Gaussian,Poisson,Salt &Pepper,and Speckle noise.Where Gaussian noise and Speckle noise attacks have been implemented with variances(0.001 to 0.002 and 0.001 to 0.003),respectively,the watermarked video frames were subject to a Poisson noise attack to evaluate them,and then the original video is effectively extracted by the proposed watermarking method,Salt and pepper noise attack implemented with noise density 0.001 and 0.002 on the watermarked video frames.The outcomes reflect that the efficiency,performance,and strength of the proposed method for video frames are promising,where original video frames are effectively extracted by the proposed watermarking method.The effectiveness of attacks is shown in Tables 7–10,respectively.

    Table 7:Extracting watermarks using Gaussian noise attack with variance values(0.001 and 0.002)

    6.6 Discussion

    To validate the effectiveness of the proposed approach,the Bit Error Rate (BER) was used as another performance metric in addition to the BCR measure discussed in Eq.(12)and Table 4.Table 5 presents the BER values obtained by the Mostafa,Wand,Nisreen methods [29],and the proposed method.The results demonstrate that the proposed method outperforms the other methods,as shown in Table 11.

    6.7 Comparing Suggested Method to Other Methods

    A comparison was performed between the suggested work’s results employing fragile watermarks to identify tampered with and those of previously used approaches.the major two measurements(PSNR and MSE)have been tested and it becomes clear the work resulted has been given better quality and a higher PSNR value than previous methods.Table 12 and Fig.12 show the result comparisons.

    Table 12:Comparing proposed method with other methods

    Figure 12:PSNR and MSE contrasting the proposed method with other methods

    7 Conclusion

    A new technique was developed to create a watermarking scheme that is both robust and imperceptible.This technique uses a fragile watermark to conceal the embedded message by leveraging the instantaneous movement of objects between consecutive video frames.The purpose of this approach is to prevent any attempts to tamper with or modify digital video content while also ensuring its authenticity.The movement of objects is tracked using two algorithms,H.264 and color feature extraction.The results of the experiments indicate that the proposed system is highly accurate and effective in identifying various moving objects in video frames.The accuracy of object identification ranged between 96.3% and 98.7% even when subjected to different attacks.The rate of hiding the fragile watermark to insert the secret key was more than 93.65%,particularly in backgrounds with a fixed color level such as water or sky.The average capacity of hiding was 40.67%,the average quality of retrieved videos was high (PSNR=65.45),and the average time difference was very acceptable(T=0.1670/s).

    8 Contribution and Future Work

    The proposed scheme can be applied to help combat piracy by identifying malicious users that illegally distribute videos,even when they attempt to lower the video quality significantly.The research can provide a means for investigating and verifying copyright integrity and security of various digital materials,including digital content,music,photos,and videos,for various institutions.

    The experiments were only conducted and verified on a small number of video types and limited video formats,and whether the proposed method is suitable for a limited number of videos,so,it is still up for debate.There are many untested watermarking methods and each method has its scope of application.Whether there is a better-watermarked approach to copyright protection for the contents of videos transmitted via media is worth exploring.There are many trends that can be continued to study in the future.

    Acknowledgement:The authors would like to acknowledge the Department of Computer Science,University of Technology,Baghdad,Iraq,for providing moral support for this work.The publishing fees have been paid by the authors.

    Funding Statement:The authors did not receive any specific funding for this study.The study was funded from the authors’own funds.

    Author Contributions:Conceptualization and design:Raheem Ogla,Abdul Monem S.Rahma,Eman Shakar Mahmood;software:Raheem Ogla,Rasha I.Ahmed;validation:Rasha I.Ahmed,Raheem Ogla;formal analysis:Raheem Ogla,Eman Shakar Mahmood;data curation:Rasha I.Ahmed,Abdul Monem S.Rahma;writing–original draft preparation:Raheem Ogla,Eman Shakar Mahmood,Rasha I.Ahmed;writing–review and editing:Raheem Ogla,Rasha I.Ahmed;visualization:Raheem Ogla,Abdul Monem S.Rahma;analysis and interpretation of results:Raheem Ogla,Eman Shakar Mahmood,Rasha I.Ahmed;supervision:Raheem Ogla,Abdul Monem S.Rahma;project administration:Raheem Ogla,Eman Shakar Mahmood,Rasha I.Ahmed;funding acquisition: All authors;draft manuscript preparation:Abdul Monem S.Rahma;All authors have reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:Not applicable.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    午夜福利免费观看在线| 欧美老熟妇乱子伦牲交| 日韩免费高清中文字幕av| 亚洲欧美成人综合另类久久久| 国产成人影院久久av| 国产成人精品久久久久久| 国产一区二区三区综合在线观看| 好男人电影高清在线观看| 国产精品免费视频内射| 国语对白做爰xxxⅹ性视频网站| 中国国产av一级| 婷婷色综合大香蕉| 人成视频在线观看免费观看| 久久鲁丝午夜福利片| 国产亚洲av片在线观看秒播厂| 91九色精品人成在线观看| 国产高清videossex| 在线av久久热| 99香蕉大伊视频| 精品久久久久久久毛片微露脸 | 亚洲欧美精品自产自拍| avwww免费| 少妇粗大呻吟视频| 亚洲五月色婷婷综合| 大片免费播放器 马上看| 国产欧美日韩综合在线一区二区| 纯流量卡能插随身wifi吗| 欧美老熟妇乱子伦牲交| 国产精品偷伦视频观看了| 日韩 欧美 亚洲 中文字幕| 啦啦啦 在线观看视频| 纯流量卡能插随身wifi吗| 欧美乱码精品一区二区三区| 国产免费一区二区三区四区乱码| 极品人妻少妇av视频| 中国美女看黄片| 一级毛片黄色毛片免费观看视频| 天天添夜夜摸| 亚洲男人天堂网一区| 精品国产一区二区三区四区第35| 久久久国产欧美日韩av| 久久精品国产a三级三级三级| 中文字幕制服av| 中文字幕制服av| 亚洲专区中文字幕在线| 亚洲av综合色区一区| 777久久人妻少妇嫩草av网站| 久久精品亚洲熟妇少妇任你| 一区二区三区乱码不卡18| 亚洲中文日韩欧美视频| 国产成人免费无遮挡视频| 中文字幕av电影在线播放| 50天的宝宝边吃奶边哭怎么回事| 9色porny在线观看| 777米奇影视久久| 99久久精品国产亚洲精品| 日本午夜av视频| 如日韩欧美国产精品一区二区三区| 国产黄色免费在线视频| 欧美日韩成人在线一区二区| 亚洲av欧美aⅴ国产| 最近最新中文字幕大全免费视频 | 欧美久久黑人一区二区| 啦啦啦在线观看免费高清www| 亚洲国产av新网站| 日韩伦理黄色片| 免费观看a级毛片全部| 老鸭窝网址在线观看| 免费av中文字幕在线| 国产精品人妻久久久影院| 又大又爽又粗| 高清黄色对白视频在线免费看| 黄色视频不卡| av欧美777| 精品卡一卡二卡四卡免费| 亚洲精品久久久久久婷婷小说| 亚洲av电影在线进入| 在线天堂中文资源库| avwww免费| 国产日韩欧美亚洲二区| 在线亚洲精品国产二区图片欧美| 国产亚洲av高清不卡| 精品卡一卡二卡四卡免费| 制服人妻中文乱码| 亚洲成国产人片在线观看| 亚洲成国产人片在线观看| 亚洲精品av麻豆狂野| 美女扒开内裤让男人捅视频| 亚洲精品国产色婷婷电影| 大片免费播放器 马上看| 免费日韩欧美在线观看| 亚洲久久久国产精品| 日韩精品免费视频一区二区三区| 男人舔女人的私密视频| 国产日韩欧美视频二区| a级毛片黄视频| 一级毛片我不卡| 国精品久久久久久国模美| 欧美国产精品一级二级三级| 亚洲av成人精品一二三区| 只有这里有精品99| 日韩一本色道免费dvd| 性色av乱码一区二区三区2| 国产成人精品在线电影| 亚洲第一青青草原| 久久久精品免费免费高清| 99久久人妻综合| 午夜视频精品福利| 欧美成人午夜精品| 国产精品熟女久久久久浪| 精品少妇内射三级| 中文字幕最新亚洲高清| 精品一区在线观看国产| 国产精品免费大片| 自拍欧美九色日韩亚洲蝌蚪91| 少妇人妻 视频| 少妇的丰满在线观看| 日韩一卡2卡3卡4卡2021年| 久9热在线精品视频| 日韩一本色道免费dvd| 美女大奶头黄色视频| 免费观看av网站的网址| 波野结衣二区三区在线| 看十八女毛片水多多多| 99re6热这里在线精品视频| 高清视频免费观看一区二区| 宅男免费午夜| 欧美黄色片欧美黄色片| 人人妻人人爽人人添夜夜欢视频| 午夜福利乱码中文字幕| 国产视频一区二区在线看| 我要看黄色一级片免费的| 国产极品粉嫩免费观看在线| 亚洲一卡2卡3卡4卡5卡精品中文| 亚洲美女黄色视频免费看| 又大又黄又爽视频免费| 欧美日韩视频精品一区| 亚洲五月婷婷丁香| 如日韩欧美国产精品一区二区三区| 久久精品亚洲av国产电影网| 日本一区二区免费在线视频| av又黄又爽大尺度在线免费看| 黑人欧美特级aaaaaa片| 国产亚洲午夜精品一区二区久久| 美女福利国产在线| 下体分泌物呈黄色| 国产精品一区二区精品视频观看| 久久精品久久久久久久性| 日韩av不卡免费在线播放| 99国产综合亚洲精品| 麻豆av在线久日| 观看av在线不卡| 国产精品亚洲av一区麻豆| 亚洲情色 制服丝袜| 国产在视频线精品| 午夜两性在线视频| 极品少妇高潮喷水抽搐| 热99久久久久精品小说推荐| 国产免费现黄频在线看| 免费女性裸体啪啪无遮挡网站| 欧美成狂野欧美在线观看| 最新在线观看一区二区三区 | 啦啦啦 在线观看视频| 在线看a的网站| 后天国语完整版免费观看| 久久这里只有精品19| 欧美日韩亚洲国产一区二区在线观看 | 国产黄色视频一区二区在线观看| 亚洲熟女毛片儿| 亚洲精品中文字幕在线视频| 乱人伦中国视频| 午夜福利乱码中文字幕| 国产不卡av网站在线观看| 性高湖久久久久久久久免费观看| 男女下面插进去视频免费观看| 两性夫妻黄色片| 久久久久视频综合| 亚洲精品av麻豆狂野| 一二三四在线观看免费中文在| 91字幕亚洲| 赤兔流量卡办理| 90打野战视频偷拍视频| 国产黄色免费在线视频| 一级毛片 在线播放| 欧美久久黑人一区二区| 亚洲国产欧美网| 亚洲精品第二区| 悠悠久久av| 亚洲精品久久成人aⅴ小说| 岛国毛片在线播放| 日韩人妻精品一区2区三区| 日本wwww免费看| 一级毛片电影观看| 大片免费播放器 马上看| 亚洲精品一卡2卡三卡4卡5卡 | 黄色怎么调成土黄色| 欧美性长视频在线观看| 999久久久国产精品视频| 国产又色又爽无遮挡免| 黑丝袜美女国产一区| 麻豆国产av国片精品| 男女边吃奶边做爰视频| 亚洲国产中文字幕在线视频| 在线观看国产h片| 一本综合久久免费| 一边摸一边做爽爽视频免费| 一个人免费看片子| 人人妻人人澡人人爽人人夜夜| 国产成人精品久久二区二区91| 别揉我奶头~嗯~啊~动态视频 | 亚洲综合色网址| 亚洲中文日韩欧美视频| 国产一级毛片在线| 午夜免费男女啪啪视频观看| 男女之事视频高清在线观看 | 亚洲av男天堂| 亚洲欧洲精品一区二区精品久久久| 午夜日韩欧美国产| 一区二区三区激情视频| 国产精品久久久av美女十八| 美女高潮到喷水免费观看| 久久免费观看电影| 日韩制服骚丝袜av| 精品少妇久久久久久888优播| 黄色视频在线播放观看不卡| 精品人妻一区二区三区麻豆| 亚洲av美国av| 色精品久久人妻99蜜桃| 一本色道久久久久久精品综合| 免费一级毛片在线播放高清视频 | 久久人人97超碰香蕉20202| 亚洲人成网站在线观看播放| 黄频高清免费视频| 日本一区二区免费在线视频| 亚洲情色 制服丝袜| 精品福利观看| 亚洲成人免费av在线播放| 看免费成人av毛片| 十八禁人妻一区二区| 免费久久久久久久精品成人欧美视频| 精品卡一卡二卡四卡免费| 欧美日韩黄片免| 国产精品国产av在线观看| 国产福利在线免费观看视频| 午夜老司机福利片| 91老司机精品| 97人妻天天添夜夜摸| 午夜影院在线不卡| 久久国产精品大桥未久av| 中文欧美无线码| 美女扒开内裤让男人捅视频| 国精品久久久久久国模美| 中文字幕亚洲精品专区| 热99久久久久精品小说推荐| 丝袜人妻中文字幕| av一本久久久久| 国语对白做爰xxxⅹ性视频网站| 亚洲国产av影院在线观看| av国产精品久久久久影院| 狠狠精品人妻久久久久久综合| 夫妻性生交免费视频一级片| 亚洲熟女精品中文字幕| 热re99久久国产66热| 久久毛片免费看一区二区三区| 国产精品久久久久成人av| 中文字幕精品免费在线观看视频| 女性被躁到高潮视频| 97在线人人人人妻| 90打野战视频偷拍视频| 亚洲av成人精品一二三区| av天堂久久9| 曰老女人黄片| 少妇精品久久久久久久| 你懂的网址亚洲精品在线观看| 亚洲美女黄色视频免费看| 制服人妻中文乱码| 亚洲国产精品成人久久小说| 人人妻,人人澡人人爽秒播 | 精品少妇黑人巨大在线播放| 久久精品成人免费网站| 日韩制服骚丝袜av| 一区二区三区四区激情视频| 中文字幕亚洲精品专区| a级片在线免费高清观看视频| cao死你这个sao货| 免费不卡黄色视频| 亚洲av片天天在线观看| 久久久久久久国产电影| 色94色欧美一区二区| 精品国产乱码久久久久久小说| 久久国产精品人妻蜜桃| 最黄视频免费看| 操美女的视频在线观看| 黄色怎么调成土黄色| 婷婷色麻豆天堂久久| 黄片小视频在线播放| 国产福利在线免费观看视频| 亚洲精品乱久久久久久| 一本久久精品| 国产欧美日韩一区二区三区在线| 人妻一区二区av| 久久性视频一级片| 亚洲情色 制服丝袜| 麻豆乱淫一区二区| 亚洲成人国产一区在线观看 | 国产精品三级大全| 热99国产精品久久久久久7| 97在线人人人人妻| 亚洲九九香蕉| 狂野欧美激情性xxxx| 9191精品国产免费久久| 丝瓜视频免费看黄片| 亚洲人成77777在线视频| 日韩制服骚丝袜av| 亚洲成人手机| 丝瓜视频免费看黄片| 80岁老熟妇乱子伦牲交| 国产成人精品无人区| 精品久久蜜臀av无| 天天躁日日躁夜夜躁夜夜| 成人国产一区最新在线观看 | 一级毛片黄色毛片免费观看视频| 欧美日韩福利视频一区二区| 午夜免费鲁丝| 免费看av在线观看网站| 成年动漫av网址| 中文字幕人妻丝袜制服| 日本vs欧美在线观看视频| 国产成人精品久久二区二区免费| 日韩制服丝袜自拍偷拍| 人体艺术视频欧美日本| 国产成人欧美在线观看 | 成年人午夜在线观看视频| videos熟女内射| 国产免费现黄频在线看| 99热网站在线观看| 日本欧美国产在线视频| 国产xxxxx性猛交| 电影成人av| www.熟女人妻精品国产| 精品国产一区二区三区久久久樱花| 亚洲av日韩在线播放| 亚洲国产中文字幕在线视频| 国产精品久久久久久精品电影小说| 国产主播在线观看一区二区 | 高潮久久久久久久久久久不卡| 晚上一个人看的免费电影| 亚洲男人天堂网一区| 国产精品成人在线| 精品一区二区三区av网在线观看 | 赤兔流量卡办理| 亚洲激情五月婷婷啪啪| 丰满迷人的少妇在线观看| 中文字幕亚洲精品专区| 国产免费现黄频在线看| 日韩一卡2卡3卡4卡2021年| 午夜福利影视在线免费观看| 天天躁狠狠躁夜夜躁狠狠躁| 国产成人精品久久二区二区91| 国产日韩一区二区三区精品不卡| 欧美亚洲日本最大视频资源| 久久久国产精品麻豆| 亚洲国产av影院在线观看| netflix在线观看网站| 亚洲成人免费av在线播放| 最近最新中文字幕大全免费视频 | 女人高潮潮喷娇喘18禁视频| 色94色欧美一区二区| 亚洲综合色网址| 在线观看www视频免费| 亚洲精品美女久久av网站| 亚洲免费av在线视频| 黄色视频在线播放观看不卡| 人妻 亚洲 视频| 亚洲人成电影观看| 亚洲国产欧美网| 国产精品香港三级国产av潘金莲 | 国产精品99久久99久久久不卡| 久久人人97超碰香蕉20202| 你懂的网址亚洲精品在线观看| 精品熟女少妇八av免费久了| 精品卡一卡二卡四卡免费| 国产真人三级小视频在线观看| 亚洲国产欧美一区二区综合| 50天的宝宝边吃奶边哭怎么回事| 日本五十路高清| 久久久亚洲精品成人影院| 欧美日韩视频高清一区二区三区二| 久久精品国产a三级三级三级| 国产成人精品无人区| 色视频在线一区二区三区| 精品人妻一区二区三区麻豆| 麻豆av在线久日| 亚洲色图综合在线观看| 国产精品麻豆人妻色哟哟久久| 欧美精品人与动牲交sv欧美| 欧美久久黑人一区二区| 日韩制服丝袜自拍偷拍| 久久久亚洲精品成人影院| 国产99久久九九免费精品| 精品亚洲成a人片在线观看| 国产欧美日韩精品亚洲av| 国产精品一国产av| 一本大道久久a久久精品| 久久毛片免费看一区二区三区| 亚洲色图 男人天堂 中文字幕| 王馨瑶露胸无遮挡在线观看| 欧美黑人精品巨大| 一区二区三区精品91| 色播在线永久视频| 日韩欧美一区视频在线观看| 免费人妻精品一区二区三区视频| netflix在线观看网站| 99热国产这里只有精品6| 亚洲欧美日韩高清在线视频 | 国产精品 国内视频| 午夜免费鲁丝| 国产精品国产三级专区第一集| 精品少妇内射三级| 一区二区日韩欧美中文字幕| 亚洲天堂av无毛| 老司机深夜福利视频在线观看 | 免费少妇av软件| 久久精品亚洲av国产电影网| 色播在线永久视频| 赤兔流量卡办理| 菩萨蛮人人尽说江南好唐韦庄| 精品福利观看| 美女高潮到喷水免费观看| 熟女少妇亚洲综合色aaa.| 欧美成人精品欧美一级黄| 久久国产精品大桥未久av| 中文字幕最新亚洲高清| 97在线人人人人妻| 中国美女看黄片| 亚洲av片天天在线观看| 国产欧美日韩综合在线一区二区| 青草久久国产| 在线观看免费高清a一片| 巨乳人妻的诱惑在线观看| 香蕉国产在线看| 美国免费a级毛片| 欧美激情 高清一区二区三区| 国产精品秋霞免费鲁丝片| 少妇 在线观看| 少妇裸体淫交视频免费看高清 | 啦啦啦在线观看免费高清www| 久久久久国产精品人妻一区二区| 亚洲中文av在线| 免费av中文字幕在线| 99久久人妻综合| 欧美日韩成人在线一区二区| 婷婷色综合www| 国产在线视频一区二区| 熟女少妇亚洲综合色aaa.| 纯流量卡能插随身wifi吗| 亚洲av欧美aⅴ国产| 真人做人爱边吃奶动态| avwww免费| 精品国产一区二区久久| 午夜两性在线视频| 一级毛片黄色毛片免费观看视频| 色视频在线一区二区三区| 国产淫语在线视频| 人人妻人人澡人人看| 亚洲成人免费电影在线观看 | 99九九在线精品视频| 18禁国产床啪视频网站| 色综合欧美亚洲国产小说| 黑人巨大精品欧美一区二区蜜桃| 日韩一本色道免费dvd| 亚洲国产欧美网| 国产在线视频一区二区| 99久久精品国产亚洲精品| 美女视频免费永久观看网站| 午夜福利乱码中文字幕| 亚洲欧美成人综合另类久久久| 一边摸一边抽搐一进一出视频| 免费高清在线观看日韩| 青春草亚洲视频在线观看| 亚洲国产毛片av蜜桃av| 国产欧美日韩综合在线一区二区| 飞空精品影院首页| 制服诱惑二区| 丰满饥渴人妻一区二区三| 又大又爽又粗| 亚洲欧美清纯卡通| 19禁男女啪啪无遮挡网站| 成人18禁高潮啪啪吃奶动态图| 97在线人人人人妻| 欧美精品一区二区免费开放| 一级黄色大片毛片| 精品国产乱码久久久久久男人| 黄色毛片三级朝国网站| 91麻豆精品激情在线观看国产 | 亚洲av综合色区一区| 国产成人精品久久二区二区91| 丝袜美足系列| 在线精品无人区一区二区三| 久久久国产一区二区| 亚洲欧美激情在线| 免费女性裸体啪啪无遮挡网站| 亚洲国产欧美网| 国产免费现黄频在线看| 亚洲精品av麻豆狂野| 十八禁网站网址无遮挡| 制服人妻中文乱码| 国产免费又黄又爽又色| 国产成人免费观看mmmm| 黄色 视频免费看| 国产黄色免费在线视频| 欧美精品啪啪一区二区三区 | 精品亚洲成国产av| 老司机午夜十八禁免费视频| 三上悠亚av全集在线观看| 一区二区三区精品91| 国产精品久久久久久精品电影小说| 亚洲,欧美,日韩| 啦啦啦在线观看免费高清www| 天天影视国产精品| bbb黄色大片| 久久精品久久久久久久性| 一级片免费观看大全| 色婷婷久久久亚洲欧美| 你懂的网址亚洲精品在线观看| 一区二区三区乱码不卡18| 亚洲成色77777| 一区二区三区四区激情视频| 亚洲成av片中文字幕在线观看| 欧美久久黑人一区二区| kizo精华| 在线观看国产h片| 国产精品久久久人人做人人爽| 精品久久久久久电影网| 亚洲精品中文字幕在线视频| 免费高清在线观看视频在线观看| 少妇 在线观看| 久久免费观看电影| 下体分泌物呈黄色| 夫妻性生交免费视频一级片| 国产人伦9x9x在线观看| 纯流量卡能插随身wifi吗| 中文字幕人妻丝袜制服| 免费av中文字幕在线| 一区二区三区激情视频| 国产成人一区二区在线| 美女脱内裤让男人舔精品视频| 最新在线观看一区二区三区 | xxxhd国产人妻xxx| 热99国产精品久久久久久7| 欧美精品一区二区大全| 九色亚洲精品在线播放| 大型av网站在线播放| av不卡在线播放| 老司机影院毛片| 国产成人精品久久二区二区免费| 岛国毛片在线播放| 黄色a级毛片大全视频| 国产成人一区二区在线| 久久人人爽av亚洲精品天堂| 亚洲第一青青草原| 亚洲情色 制服丝袜| 男女床上黄色一级片免费看| 50天的宝宝边吃奶边哭怎么回事| 捣出白浆h1v1| 亚洲欧美日韩高清在线视频 | 欧美国产精品一级二级三级| 国产又爽黄色视频| 精品久久久久久电影网| 丁香六月天网| 少妇的丰满在线观看| 999久久久国产精品视频| 亚洲欧洲国产日韩| 晚上一个人看的免费电影| 99热国产这里只有精品6| www.自偷自拍.com| 久久久精品国产亚洲av高清涩受| 亚洲熟女毛片儿| 久久久亚洲精品成人影院| 亚洲五月色婷婷综合| 天天躁夜夜躁狠狠久久av| 九色亚洲精品在线播放| 免费人妻精品一区二区三区视频| 国产精品久久久久久精品古装| 精品熟女少妇八av免费久了| 午夜精品国产一区二区电影| 亚洲国产av新网站| 少妇精品久久久久久久| 中文精品一卡2卡3卡4更新| 在线观看一区二区三区激情| 精品久久蜜臀av无| 成人午夜精彩视频在线观看| 国产视频首页在线观看| 人妻一区二区av| 免费一级毛片在线播放高清视频 | 18禁黄网站禁片午夜丰满| 在线亚洲精品国产二区图片欧美| 欧美日韩视频精品一区| 亚洲三区欧美一区| 一区二区三区精品91| 少妇粗大呻吟视频| 国产国语露脸激情在线看| 亚洲伊人色综图| 中文字幕色久视频| 午夜福利乱码中文字幕| 久久ye,这里只有精品| 国产在线视频一区二区| av在线播放精品| 国产一区二区激情短视频 | 久久久久久久精品精品| 老汉色av国产亚洲站长工具| 黄片播放在线免费| videosex国产| 欧美人与性动交α欧美软件| 国产成人精品久久二区二区91|