999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

A Robust Video Watermarking Scheme with Squirrel Search Algorithm

2022-08-24 03:28:48AmanBhaskarChiragSharmaKhalidMohiuddinAmanSinghOsmanNasrandMamdoohAlwetaishi
Computers Materials&Continua 2022年5期

Aman Bhaskar,Chirag Sharma,Khalid Mohiuddin,Aman Singh,*,Osman A.Nasr and Mamdooh Alwetaishi

1Computer Science and Engineering,Lovely Professional University,Punjab,144411,India

2Department of Management Information Systems,King Khalid University,Guraiger,Abha,62529,Saudi Arabia

3Department of Civil Engineering,College of Engineering,Taif University,Taif,21944,Saudi Arabia

Abstract: Advancement in multimedia technology has resulted in protection against distortion, modification, and piracy.For implementing such protection,we have an existing technique called watermarking but obtaining desired distortion level with sufficient robustness is a challenging task for watermarking in multimedia applications.In the paper,we proposed a smart technique for video watermarking associating meta-heuristic algorithms along with an embedding method to gain an optimized efficiency.The main aim of the optimization algorithm is to obtain solutions with maximum robustness,and which should not exceed the set threshold of quality.To represent the accuracy of the proposed scheme,we employ a popular video watermarking technique(DCT domain)having frame selection and embedding method for watermarking.A squirrel search algorithm is chosen as a meta-heuristic algorithm that utilizes the stated fitness function.The results indicate that quality constraint is fulfilled, and the proposed technique gives improved robustness against different attacks with several quality thresholds.The proposed technique could be practically implemented in several multimedia applications such as the films industry,medical imagery,OOT platforms,etc.

Keywords: Meta-heuristic algorithm;constrain optimization problem;fitness fiction;frame selection;squirrel search algorithm

1 Introduction

As the growth of internet prevailing multimedia usage is easy to be shared and accessed,editing tools and software are so readily available that their utilization is inevitable up to such an extent that no professional knowledge is required to manipulate digital multimedia.To protect the digital data in a shared medium from illegal manipulation,there is a need for a unique and popular technique known as digital watermarking.Digital watermarking is a process to embed an imperceptible watermark into a host/cover digital content in such a way that the spread of watermark bits is scattered in the host evenly.Also, it must be infeasible to alter the watermark bits and could be extracted through some computation.The main applications of digital watermarking are copyright protection, ownership identification[1].Some of the other applications include broadcast monitoring,modification detection, authentication, and source tracking, etc reflected in Fig.1a.This paper discusses video watermarking, which proposes authentication to the video by embedding watermark data into the cover video.There are many challenges in video watermarking.One of the major challenges is a design scheme that provides robustness to the watermarking and loss of quality is a challenge that is reflected in Fig.1b.Whereas robustness is the tendency of the watermark to not getting destroyed during an attack makes it fault-tolerant.The significance of one is often highlighted over the other,as per the need for required quality in the application[2].There is a tradeoff between imperceptibility(quality) and robustness (fault-tolerance) i.e., if one is required the second must be compromised.Imperceptibility significantly affects the visual quality of the video.

Figure 1:(a)Watermarking techniques(b)Relationship among watermark capacity,imperceptibility,and robustness

Meanwhile, the minimal modification would result in reduced robustness of the algorithm [3].To have the balance between the three concepts,we employ a meta-heuristic optimization algorithm(SSA(Squirrel Search Algorithm)).These computed objective functions are then utilized to rank the solutions and find the optimal results.This will generate robust watermarking schemes with distortions below the sensitivity threshold[4].

Knowledge embedding in multimedia data is a field that has lately gotten a lot of attention [5].The Major contribution of the paper is integrated into the following points.

(a) We have proposed the frame selection technique to chose optimal frames.

(b) We have proposed a novel technique for embedding a watermark that is based on DCT domain block-based conversion along with an optimization algorithm.

(c) We have proposed the calculation of efficiency and performance of the presented scheme against several image processing attacks.

Kavitha Soppari et al.have done more research studies in implementing robust watermarking through clustering techniques as most of the transform-domain watermarking approaches were build on Discrete Cosine Transform (DCT).This is because it is robust to JPEG lossy compression.Therefore,the author proposes an efficient digital watermarking mechanism based on an optimized clustering method.Mohammad Moosazadeh et al.proposed an embedding method that depends upon the relationships in between DCT coefficients.The watermarking parameters are optimally selected using a rarely used optimization algorithm of watermark embedding known as Teaching-learning-Based Optimization (TLBO).Vipul and Roohie stated the considerable time complexity of metaheuristic search algorithms is not applicable for time-sensitive applications.For this, they utilize the DCT domain for embedding watermark followed by nature-based optimization algorithm ant colony optimization to search optimal parameters.Assem Mahmoud Abdelhakim et al.provided a smart scheme for watermarking by incorporating a meta-heuristic search technique known as Artificial Bee Colony along with an embedding function to achieve an optimized functionality.The quality of watermarking is insured by constraint optimization.

Squirrel Search Algorithm

There is no single nature-based optimization strategy that can solve all optimization problems in the best possible way.This means that an optimization algorithm is good at solving a certain set of problems but not so well at solving others.As a result,a new unconstrained numerical optimization algorithm called Squirrel Search is proposed.The foraging of flying squirrels can be divided into two scenarios[6].

(i)Assumptions in SSA

In a deciduous forest,there are n flying squirrels,and each squirrel is thought to be on one tree.Each flying squirrel uses a complex foraging behavior to hunt for food and make the best use of the available resources.There are only three types of trees in the forest:I Regular tree(ii)Oaktree(acorns)(abundant food source)hickory tree(iii)(alternate food source).

(ii)Implementation of SSA

The game begins with a random location of a flying squirrel(FS).In a d-dimensional search space,the location of FS is represented by a vector.The random initialization of‘n’number of FS in the forest and each vector specifies the direction of the ith FS.A matrix FS can be used to represent the location of all FS and shown by below equation

The jthdimension of ithsquirrel is defined by FSi,jequation

This provides a uniform allocation for allocating the initial position of each FS in the Forest.

FSL:Lower Bound of FSi

FSU:Upper Bound of FSi

U(0,1):random no.between[0,1]

(iii)Fitness Evaluation

In the user’s fitness function, the value of the decision variable (solution vector) and its related value is stored in‘f’.Some of the constants considered are dg:random gliding distance,R1:random no.[0,1], t:current iteration tree Gc:Constant to achieve balance b/w exploration and exploitation,dg:(hg/tan(Q)) hg:loss in height after gliding, Q:arctan(D/L), D:drag force produced, L:Sum of lift at equilibrium, L=1/(2TCL V2S), T:1.204 kgm3(air density), CL = Lift Coefficient in the range of [0.675, 1.5], V=5.25 m/sec (speed of flying squirrel (avg)), S=154 cm2(Surface area),D=1/(2TCDV2S),CD:Drag Coefficient(0.60)[6]as mentioned in Eq.(3).

Case 1:FS on Acorn tree(FSat)moving towards hickory tree(FSht).Location is updated as given in the following given Eq.(4).

where R1 is a random number between[0,1]

Case 2:FS on a normal tree(FSnt)moving towards acorn tree(FSat)location is updated as given in following given Eq.(5).

where R2 is a random number between[0,1]

Case 3:FS on a normal tree(FSnt)and already passed acorn tree and now moving towards hickory tree(FSht),Location is updated asgiven in following given Eq.(6).

where R3 is a random number between[0,1]

(iv)Seasonal Monitoring Condition

Since foraging in the winter was more expensive and dangerous,F(xiàn)S became less successful than in the autumn.Incorporating such behavior results in a more practical strategy that avoids being stuck in a locally optimal solution.Per iteration,calculate the seasonal constant(Sc)Eq.(7)[6].

where t=1,2,3 iterations

Check Sct<Smin where Smin is the minimum value of Seasonal Constant Computed as Eq.(8)[6].

t<current iteration tm<max iteration

If the condition is true, then randomly reallocating FS did not explore the forest by following Eq.(9)[6].

where Levy is random walk-through Levy distribution.

The discrete cosine transform is then applied to the blocks of a grayscale image used as the carrier image,and the DCT coefficients are quantized using the quantization table represented in the JPEG norms,which is used where an image requires a very high compression rate[7].

2 Proposed Fitness Function

Optimization problem to search for the optimum embedding strength parameter (k and p) for embedding watermark problem formulated in Eq.(10).

It assigns a score to each solution based on how effective it is at solving the problem.Sorting,declaring,and selecting at random:The following three minimum sorted fitness values are known to have (normal food source), and they are progressing towards (optimal food source).The rest of the tree is regular.The rest FS fitness value is used to make a random pick,which means aiming towards the best food source.The proposed fitness function Algorithm 1 in pseudo-code is followed by a flow diagram given in Fig.2.

Algorithm 1:Pseudocode for proposed fitness function Input:Embedding-parameters(α,β),Attacks:Gaussian Noise,Sharpening,Median filtering attack,Rotation attack Output:Ranked Solution Population(NS)Step 1Initialize Qth:=avg(PSNR)and Rt:=avg(INC);Step 2For all solutions in NS do:if β <Qth then Add solution to the quality group(Q)else Add solution to the robustness group(R)Step 3end for(Continued)

Step 4Sort Q group and R group in descending order based on min value of(Qth-PSNR)and(Rt-INC)respectively.Step 5Merge Q group to R group and call resulted population as recombined population(RP).Step 6Initialize Rank list with length of RP-current index(i)of solution in RP.Step 7For all solution s in RP do:if s_ith ∈R and s_jth ∈Q then Rank(s_ith)>Rank(s_jth)end if else if s_ith ∈R and s_jth ∈R then if s_ith(INC)>s_jth(INC)then Rank(s_ith)>Rank(s_jth)else Rank(s_jth)>Rank(s_ith)end if end else else if s_ith(PSNR)>s_jth(PSNR)then Rank(s_ith)>Rank(s_jth)else Rank(s_jth)>Rank(s_ith)end if Step 8end else Step 9end for Step 10Return RP

The robustness of the proposed method against various kinds of attacks such as median filtering,Gaussian noise [8], Sharpening, Rotation attack.According to the watermark experiment findings,the suggested scheme performs satisfactorily in terms of image distortion and embedded watermark retrieval, even after the original image has been damaged by several assaults [9].This approach can effectively avoid rotating attacks,and only half of the points need to be scanned[10].Spatial scanning,duplication,cropping,scaling,translation,compression,and rotating are examples of attacks that may be carried out deliberately or accidentally [11].We checked the watermarking algorithm’s resiliency against a series of four different attacks for various videos and enhanced the decoding BER(bit error rate)[12].When constructing an appropriate architecture,we have a list of typical attacks or threats to remember.PSNR(peak signal-to-noise ratio),MSE(mean squared error),and NCC(normalized cross-correlation)are a few of the output metrics described briefly[13].

3 Watermark Embedding

Divide the host image I, of the size P × Q, into 8 × 8 blocks.Transform each image block I p,q and its adjacent block I p+1,q into DCT coefficients as given in Eq.(11),and also we have given Algorithm 2 to represent in the form of pseudo-code.

Figure 2:Fitness function algorithm flow diagram[14]

Adjust the value of two coefficients according to the watermark bit Wp,q,which is the bit location at the pthrow&qthcolumn of the watermark image.As shown in Eq.(12)below.

This scaling parameter is calculated by associating the imperceptibility quality of each watermark with the imperceptibility quality of the host image to mitigate the tradeoff between robustness and imperceptibility[15].α←Ensure absolute difference between modified coefficients large enough to provide the required robustness.β←Ensures how much proportion of the valueαcan be used in a coefficient adjustment.As shown in Eq.(13)below.

Algorithm 2:Pseudocode of Embedding Watermark Input:Host video frame(I)and watermark image(I_w).Output:Embedded watermark frame, PSNR, and INC values on different Robustness and quality parameters.Input:Host video frame(I)and watermark image(I_w).Output:Embedded watermark frame, PSNR, and INC values on different Robustness and quality parameters.Step 1Divide host watermark image I of size P×Q,into 8×8 blocks.Step 2Transform each image block I_p,q,and its adjacent block I_p+1,q into DCT coefficients,where p,q are rows and columns indices of a frame-block.Step 3Initialize α:=127 to 255,β:=0.9 to 0.1 and MSE,INC embedding-parameters equal to zero.Also iterations counters p,q,a,b equal to 1.New frame I_e equals to zero matrix.Step 4while p <P and q <Q(till the end of frame)if I_w(p,q):=1 then if I(p,q)–I(p+1,q)greater than α then I_e(p,q):=I(p,q)+(α×β)I_e(p+1,q):=I(p+1,q)–(α×(1-β))MSE:=MSE+CALL mean_square_error(I(p,q),I_e(p,q))INC:=INC+CALL normalized_correlation(I(p,q),I_e(p,q))End if Else I_e(p,q):=I(p,q)-(α×β)I_e(p+1,q):=I(p+1,q)+(α×(1-β))MSE:=MSE+CALL mean_square_error(I(p,q),I_e(p,q))INC:=INC+CALL normalized_correlation(I(p,q),I_e(p,q))End else End Else I_e(p,q):=I(p,q)I_e(p+1,q):=I(p+1,q)End else End if Step 5End while Step 6Apply inverse DCT to obtain the watermarked image block on I_e Step 7CALL peak_signal_to_noise_ratio(MSE)to calculate PSNR value.(Continued)

Step 8Store α,β with respected PSNR and INC value to form a population.Step 9End

4 Intelligence Evolutionary Algorithm

With the rapid development of modern technology, the complex evolutionary problems are too difficult to be answered by conventional optimization algorithms.This challenge can be dealt with by incorporating an evolutionary intelligence algorithm.The implementation is done by embedding a watermark in the DCT domain,accompanied by a nature-based optimization watermark[16].This is due to the resistance to lossy JPEG compression[17].Attacks like frame lowering,averaging,cropping,and median filtering,as well as unintended attacks like noise and compression,can breach copyright information in a video[18].The evolutionary intelligence algorithms can be divided into 3 categories as given below.

4.1 Evolutionary Heuristic Algorithms

The Evolutionary heuristic algorithms are inspired by biological evolution like reproduction,mutation,recombination,and selection.It plays a vital role in estimating accurate solutions or optimal solutions from a population of solutions.Moreover, it solves difficult problems by using a fitness function which is using the evolutionary algorithm as a tool for problem-solving also known as Evolutionary Computation(EC).Genetic Programming(GP):It is an extension of GA used for testing and selecting the best choices among the set of results[19].And by integrating the MPEG specifications with the classic block-adaptive-video watermarking systems,can get better results[20].

4.2 Physics Heuristic Algorithms

These are originated by physical phenomena, which are then conceptually applied to obtain optimal solutions.After melting the energy is exceedingly high and the temperature slowly drops to a stable solid-state having minimum energy(optimal solution).Similarly,Gravitational,The magnetic optimization.

4.3 Nature Heuristic Algorithms

These are inspired by biological practices and phenomena in nature.There are several algorithms in this class such as Ant Colony Optimization that are based on naturally excrete pheromones in their path which act as an indicator better path.Another such algorithm is the particle swarm optimization algorithm,which is based on bird’s practices in seeking food.Similarly,Artificial Bee Colony is based on the adaptation of the foraging practices of the honeybee.The bee’s population is formed through 3 types of bees based on their work.Mainly Employee bee,onlooker bee and scout bee.

5 Frame Selection

We looked at a variety of image matching methods before settling on the histogram process.Histogram-based methods are ideal for determining the total changes in an image.An image’s color histogram can be calculated by dividing a color space, such as RGB.The distinction between two pictures dependent on color histograms H1 and H2 can be calculated as in Eq.(14).Fig.3 depicts the frame selection flow diagram to more clearly explain the algorithm.Algorithm 3 is also stated for the reader’s reference.

Algorithm 3:Pseudo code for Frame Selection Algorithm Input:Avideo having N number of frames.Initial value of integrator i and j equal to zero and v_diff vector equal to zero.Output:Select frame(s) concerning a threshold, calculated through Scene Change detection using histogram.Step 1 Start Step 2 Initialize variable Curframe_i:=First Frame(Video)and Curframe_j:=Second Frame(Video).Step 3 While Curframe_i not equal to the last frame do:Calculate P:=Histogram(gray_(Curframe_i))-Histogram(gray_(Curframe_j))Calculate Q:=Maximum(Histogram(gray_(Curframe_i)),Histogram(gray_(Curframe_j)))Calculate Vector S(i):=Avg(Sum(P/Q))Step 4 End While Step 5 For i:=1 to(N-1)do:Calculate vector diff_v(i):=Abs(S(i+1)–S(i))Step 6 End for Step 7 Initialize SC:=0(Gives No.of Scene Change),K:=1 And vector SCV:=0(Scene Change frame Value)Step 8 For I:=1 to(N-1)do:Vth:=K*(sum(diff_v)/(N-1)+((max(diff_v)+min(diff_v))/2)If diff_v(i)>Vth:Increment SC:=SC+1 Set Value K:=SC SCV(SC):=i End if Step 9 End for Step 10 Return SC and SCV.Step 11 End.

6 Quality Measures

It significantly affects the visual quality of the video.So, to ensure the quality of the video watermarking, we need to calculate a measure that can indicate the level of imperceptibility.It is calculated through a mathematical ratio known as Peak Signal to Noise ratio (PSNR) as per Eqs.(15)–(16).The term robustness refers to the embedded watermark’s ability to withstand image manipulation and geometric attacks.

fk→original video frame fkw→Watermarked video frame

Figure 3:Frame selection algorithm flow

7 Robustness Measures

Robustness is vital for granting capability to withstand different image processing and geometric attacks and the quality of digital content must not be degraded.Related attacks include smoothing,sharpening, compression, de-noising, filtering, scaling, cropping, and rotation.The robustness of watermarking algorithms is usually measured using normalized correlation (NC) and bit error rate(BER).NC is used to calculate the degree of resemblance between the derived and initial watermarks.It can be calculated through a mathematical measure known as Normalize Correlation that ranges between 0 to 1[21].A higher value of NC stronger the anti-attack ability,as given in Eq.(17).

8 Experimental Results

The results were evaluated in MATLAB 2014a using an i5 processor.The frame selection time and embedding time is dependent on the processing power of the processor and the size of the RAM.The observed results are based on the watermark embedding time,frame selection time,and optimization algorithm time.For testing the algorithm,a total of 5 CIF(Common Interchange Format)videos are utilized, and the frame selection technique used is based on scene change in the video.Fig.4 shows the test videos list with the chosen frames from each video.The higher value the PSNR value indicates the proposed technique will have a minimum loss in quality of output.Similarly,for greater the value of NC, more resistance against attacks.The testing is started with converting videos in mp4 format followed by frame extraction.The frames extracted are in the PNG format to withstand quality loss.The selected frames are then embedded through embedding algorithms with hyperparameters values obtained through optimization algorithm.Finally, we bring the efficiency of the proposed work by applying several image processing attacks and then calculating NC values [22].Tabs.1–3 represents number of frames selected,quality metrics values and a comparison analysis of existing frame selection techniques.

Figure 4:Selected frames from videos:(a)Akiyo#251(252),(b)Bus#126(127),(c)Football#74(218),(d)News#77(252),(e)Container#251(252),(f)Watermark

Table 1:Comparison of videos in terms of frame selection

Table 2:Results after embedding of watermark 1 on selected frames

Table 3:Comparative analysis of the robustness of our scheme with other algorithms

Experimental Tests for Time Complexity:Tab.4 describes the processing time (in seconds)associated with the frame selection and embedding algorithm applied to the test videos.The duration is entirely based on hardware processing power.Also,it depends upon the number of selected frames and the total number of frames in the video.For football and news number of frames selected is 2 out of 218 and 252 frames respectively.The average frame selection time is nearly the same.Moreover,the total number of frames in the video also lead to an increase in the execution time due to which we can see the football video having 2 frames out of 252 frames have slightly higher embedding time(3.1747) to the Akiyo video having 252 frames and 1 frame selected (3.164).Figs.5,6 signify plots drawn against quality metrics and frame selection time,embedding time Figs.7–10 signify plots drawn against gaussian noise,sharpening attack,rotation,median filtering attacks.

Table 4:Results of execution time using watermark

Figure 5:Plot of PSNR, NC, K, BER w.r.t the videos taken in the proposed work for watermark against no attack.(a)Average PSNR,(b)Average NC,(c)Average BER

Figure 6:Plot of total frame selection time and total embedding time (in seconds) for 5 videos.(a)Total frame selection time(in seconds).(b)Total embedding time(in seconds)

Figure 7:Plot of PSNR,NC,P,BER w.r.t the videos taken in the proposed work for watermark against Gaussian attack.(a)Average PSNR,(b)Average NC,(c)Average BER

The fault tolerance of the proposed technique is tested against several attack scenarios like Gaussian Noise in Tab.5,Sharpening in Tab.6,Median filtering attack in Tab.7,and Rotation attack in Tab.8.To account for the lost number of attacks on every watermarked frame to measure the quality of the proposed technique[22].The second attack on the selected frames will stretch the pixel distribution in the image and highlights the fine image details[22].

Figure 8:Plot of PSNR, NC, K, BER w.r.t the videos taken in the proposed work for watermark against Sharpening attacked.(a)Average PSNR,(b)Average NC,(c)Average BER

Figure 9:Plot of PSNR,NC,BER w.r.t the videos taken in the proposed work for watermark against Rotation attack.(a)Average PSNR,(b)Average NC,(c)Average BER

Figure 10:Plot of PSNR,NC,BER w.r.t the videos taken in the proposed work for watermark against median filter attacked.(a)Average PSNR,(b)Average NC,(c)Average BER

Table 5:Results after embedding of watermark on Gaussian attacked selected frames

Table 6:Results after embedding of watermark on Sharpening attacked selected frames

Table 7:Results after embedding of watermark on Rotation attacked on selected frames

Table 8:Results after embedding of watermark on Median filter attacked on selected frames

9 Conclusion and Future Work

We proposed a unique block-based embedding technique to entertain quality loss in watermarking process.For efficient time and space complexity, we utilize frame selection for the application of watermark embedding, which will be a time-consuming and space-expensive method.This frame selection is based on the number of scenes that change in a particular test video.This is followed by block-based application of DCT2 and searching for optimal parameters for embedding based on black and white watermark bits.The approach is tested against several image processing attacks such as Gaussian Noise,Image Sharpening,Rotation attack,Median filter attack,etc.The results indicate good levels of robustness against many attacks.Further security can be added in future work such as watermark encryption and more suitable frame selection for videos having no detectable scene change.

Acknowledgement:The authors would like to express their gratitude to King Khalid University,Saudi Arabia for providing administrative and technical support.This work was supported by the Deanship of Scientific Research,King Khalid University,under Grant GRP/358/42 and would also like to thank Taif University Researchers Support Project Number(TURSP-2020/196)Taif University,Taif,Saudi Arabia.

Funding Statement:The authors would like to express their gratitude to King Khalid University,Saudi Arabia for providing administrative and technical support.This work was supported by the Deanship of Scientific Research, King Khalid University, under Grant GRP/358/42 and the study was also funded by Taif University Researchers Support Project Number(TURSP-2020/196)Taif University,Taif,Saudi Arabia.

Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

主站蜘蛛池模板: 91精品国产自产91精品资源| 亚洲日韩AV无码精品| 国产真实自在自线免费精品| 亚洲精品国产首次亮相| 亚洲天堂网在线观看视频| 无码综合天天久久综合网| 亚洲福利一区二区三区| 欧美专区日韩专区| 精品久久久久久中文字幕女| 免费网站成人亚洲| 四虎精品国产永久在线观看| 色亚洲成人| 亚洲精品老司机| 一本二本三本不卡无码| 色哟哟国产精品| 国产经典免费播放视频| 精品伊人久久久大香线蕉欧美| 欧美一级高清视频在线播放| 久久精品人人做人人爽电影蜜月| 亚洲AⅤ永久无码精品毛片| 精品国产免费观看一区| 日韩无码真实干出血视频| 一级毛片免费的| 国产精品白浆无码流出在线看| 成人精品在线观看| 亚洲第一中文字幕| 日韩在线观看网站| 丰满人妻被猛烈进入无码| 国产福利在线观看精品| 毛片卡一卡二| 无码AV日韩一二三区| 亚洲欧洲日产国码无码av喷潮| 国产理论一区| av天堂最新版在线| 亚洲最大看欧美片网站地址| 国产国语一级毛片在线视频| 欧美日韩另类在线| 国产网友愉拍精品视频| 亚洲天堂成人在线观看| 狠狠色丁香婷婷综合| 国产精品成人一区二区不卡| 日韩国产精品无码一区二区三区| 国产日韩欧美视频| 亚洲Av激情网五月天| 先锋资源久久| 成人免费网站在线观看| 久久精品亚洲热综合一区二区| av一区二区三区在线观看| 91久久天天躁狠狠躁夜夜| 午夜国产大片免费观看| 国产黄色片在线看| 国产麻豆精品在线观看| 亚洲成aⅴ人片在线影院八| 黄片在线永久| 亚洲欧美日韩成人在线| 国产精品久久精品| 另类重口100页在线播放| 国产一级裸网站| a级毛片免费播放| 久久香蕉国产线看观看精品蕉| 亚洲成a人片在线观看88| 在线欧美日韩国产| 亚洲日韩久久综合中文字幕| 精品乱码久久久久久久| 日本久久网站| 欧美激情第一欧美在线| 999精品在线视频| 女人毛片a级大学毛片免费| 国产主播喷水| 风韵丰满熟妇啪啪区老熟熟女| 被公侵犯人妻少妇一区二区三区| 亚洲精品视频免费| 亚洲综合国产一区二区三区| 浮力影院国产第一页| 国产精品午夜电影| a级毛片毛片免费观看久潮| 国产亚洲精| 国产精品一区在线观看你懂的| 一区二区偷拍美女撒尿视频| 一级爱做片免费观看久久| 高清免费毛片| 国产精品视频导航|