期刊文献+
共找到4,769篇文章
< 1 2 239 >
每页显示 20 50 100
Digital Text Document Watermarking Based Tampering Attack Detection via Internet
1
作者 Manal Abdullah Alohali Muna Elsadig +3 位作者 Fahd N.Al-Wesabi Mesfer Al Duhayyim Anwer Mustafa Hilal Abdelwahed Motwakel 《Computer Systems Science & Engineering》 2024年第3期759-771,共13页
Owing to the rapid increase in the interchange of text information through internet networks,the reliability and security of digital content are becoming a major research problem.Tampering detection,Content authentica... Owing to the rapid increase in the interchange of text information through internet networks,the reliability and security of digital content are becoming a major research problem.Tampering detection,Content authentication,and integrity verification of digital content interchanged through the Internet were utilized to solve a major concern in information and communication technologies.The authors’difficulties were tampering detection,authentication,and integrity verification of the digital contents.This study develops an Automated Data Mining based Digital Text Document Watermarking for Tampering Attack Detection(ADMDTW-TAD)via the Internet.The DM concept is exploited in the presented ADMDTW-TAD technique to identify the document’s appropriate characteristics to embed larger watermark information.The presented secure watermarking scheme intends to transmit digital text documents over the Internet securely.Once the watermark is embedded with no damage to the original document,it is then shared with the destination.The watermark extraction process is performed to get the original document securely.The experimental validation of the ADMDTW-TAD technique is carried out under varying levels of attack volumes,and the outcomes were inspected in terms of different measures.The simulation values indicated that the ADMDTW-TAD technique improved performance over other models. 展开更多
关键词 Content authentication tampering attacks detection model SECURITY digital watermarking
下载PDF
Application of Digital Technology in Road and Bridge Design
2
作者 Bai Fan 《Journal of Architectural Research and Development》 2024年第4期92-99,共8页
With the development and progress of science and technology,road and bridge design has experienced rapid development,from the initial manual drawing design to the popularity of Computer-Aided Design(CAD),and then to t... With the development and progress of science and technology,road and bridge design has experienced rapid development,from the initial manual drawing design to the popularity of Computer-Aided Design(CAD),and then to today’s digital software design era.Early designers relied on hand-drawn paper design forms which was time-consuming and error-prone.Digital support for road and bridge design not only saves the design time but the design quality has also achieved a qualitative leap.This paper engages in the application of digital technology in road and bridge design,to provide technical reference for China’s road and bridge engineering design units,to promote the popularity of Civil3D and other advanced design software in the field of engineering design and development,ultimately contributing to the sustainable development of China’s road and bridge engineering. 展开更多
关键词 Road and bridge design digital technology Civil3D MODELLING three-dimensional view Earth calculation
下载PDF
Three-dimensional visualization interactive system for digital twin workshop 被引量:6
3
作者 Zhang Qinglei Yang Zhiwei +2 位作者 Duan Jianguo Liu Zhen Qin Jiyun 《Journal of Southeast University(English Edition)》 EI CAS 2021年第2期137-152,共16页
To improve the human-physical-virtual coordination and integration of the digital twin workshop,3D visual monitoring and human-computer interaction of the digital twin workshop was studied.First,a novel 6D model of th... To improve the human-physical-virtual coordination and integration of the digital twin workshop,3D visual monitoring and human-computer interaction of the digital twin workshop was studied.First,a novel 6D model of the 3D visualization interactive system for digital twin workshops is proposed.As the traditional 5D digital twin model ignores the importance of human-computer interaction,a new dimension of the user terminal was added.A hierarchical real-time data-driven mapping model for the workshop production process is then proposed.Moreover,a real-time data acquisition method for the industrial Internet of things is proposed based on OPC UA(object linking and embedding for process control unified architecture).Based on the 6D model of the system,the process of creating a 3D visualization virtual environment based on virtual reality is introduced,in addition to a data-driven process based on the data management cloud platform.Finally,the 6D model of the system was confirmed using the blade rotor test workshop as the object,and a 3D visualization interactive system is developed.The results show that the system is more transparent,real-time,data-driven and more efficient,as well as promotes the coordination and integration of human-physical-virtual,which has practical significance for developing digital twin workshops. 展开更多
关键词 digital twin workshop three-dimensional visualization human-computer interaction data driven OPC UA(object linking and embedding for process control unified architecture)
下载PDF
Optical encryption of multiple three-dimensional objects based on multiple interferences and single-pixel digital holography 被引量:2
4
作者 Ying Wang Qi Liu +1 位作者 Jun Wang Qiong-Hua Wang 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第3期253-259,共7页
We present an optical encryption method of multiple three-dimensional objects based on multiple interferences and single-pixel digital holography. By modifying the Mach-Zehnder interferometer, the interference of the ... We present an optical encryption method of multiple three-dimensional objects based on multiple interferences and single-pixel digital holography. By modifying the Mach-Zehnder interferometer, the interference of the multiple objects beams and the one reference beam is used to simultaneously encrypt multiple objects into a ciphertext. During decryption, each three-dimensional object can be decrypted independently without having to decrypt other objects. Since the single- pixel digital holography based on compressive sensing theory is introduced, the encrypted data of this method is effectively reduced. In addition, recording fewer encrypted data can greatly reduce the bandwidth of network transmission. Moreover, the compressive sensing essentially serves as a secret key that makes an intruder attack invalid, which means that the system is more secure than the conventional encryption method. Simulation results demonstrate the feasibility of the proposed method and show that the system has good security performance. 展开更多
关键词 multiple three-dimensional objects encryption single-pixel digital holography phase-shifting in- terference compressive sensing
下载PDF
A combination of digital design and three-dimensional printing to assist treatment of thoracolumbar compression fractures using percutaneous kyphoplasty 被引量:2
5
作者 Hui Lu Daixiang Jiang +1 位作者 Qimei Wu Rong Liu 《Global Health Journal》 2021年第4期190-193,共4页
Objective:To evaluate the clinical efficacy of the preoperative digita1 design combined with three dimensional(3D)printing models to assist percutaneous kyphoplasty(PKP)treatment for thoracolumbar compression frac tur... Objective:To evaluate the clinical efficacy of the preoperative digita1 design combined with three dimensional(3D)printing models to assist percutaneous kyphoplasty(PKP)treatment for thoracolumbar compression frac tures.Methods:From January 2018 to August 2020,we obtained data of 99 patients diagnosed thoracolumbar compression fractures.These patients were divided into control group(n=50)underwent traditional PKP surgery,and observation group(n=49)underwent preoperative digital design combined with 3D printing model assisted PKP treatment.The clinical efficacy was evaluated with five parameters,including operation time,number of intraoperative radiographs,visual analogue scale(VAS)score,Cobb Angle change,and high compression rate of injured vertebrae.Results:There were statistically significant differences of operation time and number of intraoperative radio graphs between the two groups(P<0.05).For VAS score,Cobb Angle change and vertebral height compression rate,all of these three parameters were significantly improved when the patients accepted surgery teatment in two groups(P<0.05).However,there were no significant differences between control group and observation group for these three parameters either before or after surgery(P>0.05).Conclusions:Through the design of preoperative surgical guide plate and the application of 3D printing model to guide the operation,the precise design of preoperative surgical puncture site and puncture Angle of the injured vertebra was realized,the number of intraoperative radiographs was reduced,the operation time was shortened and the operation efficiency was improved. 展开更多
关键词 Percutaneous kyphoplasty Thoracolumbar compression fracture digital design three-dimensional(3D)printing
下载PDF
Evaluation of Maxillary Dental Arch Widths in Individuals Having Unilateral and Bilateral Cleft Lip and Palate Using Three-Dimensional Digital Models
6
作者 Ege Dogan Abdü +2 位作者 lkadir Iş ik Servet Dogan 《Open Journal of Stomatology》 2019年第7期159-167,共9页
Aim: Maxillary dental arch widths were evaluated in individuals having unilateral (UCLP) and bilateral (BCLP) cleft lip and palate (CLP) using three-dimensional (3D) digital models. Material and Method: The study had ... Aim: Maxillary dental arch widths were evaluated in individuals having unilateral (UCLP) and bilateral (BCLP) cleft lip and palate (CLP) using three-dimensional (3D) digital models. Material and Method: The study had been conducted on 80 individuals aged between 14 - 17 years having UCLP and BCLP. 40 of the individuals had UCLP, whereas 40 had BCLP. The maxillary dental models taken from patients before the treatment were scanned using Orthomodel Programme (v.1.01, Orthomodel Inc., Istanbul, Turkey) to obtain 3D imagery. Student’s t-test was used in order to assess the data obtained by using SPSS software version 22.0. Results: In BCLP, the average inter-canine distance was 17.44 ± 1.31 mm, the average inter-molar distance was 36.57 ± 1.12 mm, while inter-canine/inter-molar ratio was 0.47. Whereas in UCLP, it was 25.10 ± 0.63 mm, 42.20 ± 0.53 mm and 0.59. The inter-canine distance in UCLP was found to be large enough to be statistically significant (p 0.05), even though there were differences in inter-molar widths. Conclusion: For the stable orthodontic treatment results, one of the most important points is arch form and widths to be coherent with each other. In our study, the increase of inter-canine distance seen in UCLP indicates that in the cleft region, the maxillary arch is inclined over to the back, while the same situation in BCLP suggests that the maxillary segments are collapsed inside. The difference in the arch is highly affected by the primary surgical treatment. 展开更多
关键词 UNILATERAL CLEFT LIP and PALATE Bilateral CLEFT LIP and PALATE three-dimensional digital Models
下载PDF
Digital measurement of bone tumor volume by CT three-dimensional reconstruction technology
7
作者 胡永成 《外科研究与新技术》 2011年第2期125-125,共1页
Objective To discuss the measurement of bone tumor volume on the basis of three dimensional images segmentation technology. Methods Twenty patients with lacunar bone tumor from Tianjin Hospital and Tongji Hospital wer... Objective To discuss the measurement of bone tumor volume on the basis of three dimensional images segmentation technology. Methods Twenty patients with lacunar bone tumor from Tianjin Hospital and Tongji Hospital were included in the 展开更多
关键词 BONE digital measurement of bone tumor volume by CT three-dimensional reconstruction technology CT
下载PDF
Digital watermarking algorithm based on neural network in multiwavelet domain 被引量:2
8
作者 王振飞 宋胜利 《Journal of Southeast University(English Edition)》 EI CAS 2007年第2期211-215,共5页
A novel blind digital watermarking algorithm based on neural networks and multiwavelet transform is presented. The host image is decomposed through multiwavelet transform. There are four subblocks in the LL- level of ... A novel blind digital watermarking algorithm based on neural networks and multiwavelet transform is presented. The host image is decomposed through multiwavelet transform. There are four subblocks in the LL- level of the multiwavelet domain and these subblocks have many similarities. Watermark bits are added to low- frequency coefficients. Because of the learning and adaptive capabilities of neural networks, the trained neural networks almost exactly recover the watermark from the watermarked image. Experimental results demonstrate that the new algorithm is robust against a variety of attacks, especially, the watermark extraction does not require the original image. 展开更多
关键词 digital watermarking neural networks multiwavelet transform
下载PDF
Chaotic system and QR factorization based robust digital image watermarking algorithm 被引量:9
9
作者 宋伟 侯建军 +1 位作者 李赵红 黄亮 《Journal of Central South University》 SCIE EI CAS 2011年第1期116-124,共9页
In order to protect copyright of digital images,a new robust digital image watermarking algorithm based on chaotic system and QR factorization was proposed.The host images were firstly divided into blocks with same si... In order to protect copyright of digital images,a new robust digital image watermarking algorithm based on chaotic system and QR factorization was proposed.The host images were firstly divided into blocks with same size,then QR factorization was performed on each block.Pseudorandom circular chain(PCC) generated by logistic mapping(LM) was applied to select the embedding blocks for enhancing the security of the scheme.The first column coefficients in Q matrix of chosen blocks were modified to embed watermarks without causing noticeable artifacts.Watermark extraction procedure was performed without the original cover image.The experimental results demonstrate that the watermarked images have good visual quality and this scheme is better than the existing techniques,especially when the image is attacked by cropping,noise pollution and so on.Analysis and discussion on robustness and security issues were also presented. 展开更多
关键词 digital watermarking QR factorization pseudorandom circular chain logistic mapping
下载PDF
Digital Watermarking Algorithm Based on Wavelet Transform and Neural Network 被引量:4
10
作者 WANG Zhenfei ZHAI Guangqun WANG Nengchao 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1667-1670,共4页
An effective blind digital watermarking algorithm based on neural networks in the wavelet domain is presented. Firstly, the host image is decomposed through wavelet transform. The significant coefficients of wavelet a... An effective blind digital watermarking algorithm based on neural networks in the wavelet domain is presented. Firstly, the host image is decomposed through wavelet transform. The significant coefficients of wavelet are selected according to the human visual system (HVS) characteristics. Watermark bits are added to them. And then effectively cooperates neural networks to learn the characteristics of the embedded watermark related to them. Because of the learning and adaptive capabilities of neural networks, the trained neural networks almost exactly recover the watermark from the watermarked image. Experimental results and comparisons with other techniques prove the effectiveness of the new algorithm. 展开更多
关键词 digital watermarking neural networks wavelet transform human visual system
下载PDF
A Novel Digital Image Watermarking Scheme on Copyright Protection Based on Network Manufacture Environment 被引量:2
11
作者 LIU Quan WANG Jin (School of Information Engineering,Wuhan University of Technology,Wuhan 430070,China 《武汉理工大学学报》 CAS CSCD 北大核心 2006年第S2期552-556,共5页
In this paper,we propose a novel wavelet-domain digital image watermarking scheme on copyright protection based on network manufacture environment.It codes the watermarking with error correcting coding and encrypts th... In this paper,we propose a novel wavelet-domain digital image watermarking scheme on copyright protection based on network manufacture environment.It codes the watermarking with error correcting coding and encrypts the watermarking with chaotic encryption.It embeds the watermarking into the coefficients which have large absolute values in the middle-frequency parts got by Discrete Wavelet Transform (DWT) repeatedly.The extraction doesn’t need the original image.Experiment results show that the proposed scheme is easy to implement,and has good robustness to some attacks,such as JPEG compression,average filtering,median filtering,wiener filtering,pepper (?) salt noise,especially to cropping and scaling.In order to solve the prob- lem of the copyright protection of the network manufacture production,the problems of digital image production such as tamper preventing and watermarking attacks preventing and so on are discussed.It solves the problems of manufacture information such as secure exchange and transmissions and production copyright protection and so on. 展开更多
关键词 network manufacture COPYRIGHT protection digital watermarkING wavelet transform error CORRECTING coding chaotic ENCRYPTION
下载PDF
A Novel Digital Audio Watermarking Scheme in the Wavelet Domain 被引量:2
12
作者 WANGXiang-yang YANGHong-ying ZHAOHong 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期311-314,共4页
We present a novel quantization-based digital audio walermarking scheme inwavelet domain. By quantizing a host audio's wavelet coefficients (Integer Lifting WaveletTransform) and utilizing the characteristics of h... We present a novel quantization-based digital audio walermarking scheme inwavelet domain. By quantizing a host audio's wavelet coefficients (Integer Lifting WaveletTransform) and utilizing the characteristics of human auditory system (HAS), the grayimage isembedded using our watermarking method. Experimental results show that the proposed watermarkingscheme is inaudible and robust against various signal processing such as noising adding, lossycompression, low pass filtering, re-sampling, and re-quantifying. 展开更多
关键词 digital audio watermarking lifting wavelet transform human auditory system chaotic sequence QUANTIZATION
下载PDF
DWT-Based Watermarking Scheme for Digital Images 被引量:2
13
作者 何泉 苏广川 《Journal of Beijing Institute of Technology》 EI CAS 2003年第2期134-137,共4页
A watermarking scheme for digital images is introduced. This method is based on discrete wavelet transform and spread spectrum technique. A discrete wavelet transformed binary signature image is expanded by an m ... A watermarking scheme for digital images is introduced. This method is based on discrete wavelet transform and spread spectrum technique. A discrete wavelet transformed binary signature image is expanded by an m sequence and added to the large wavelet coefficients of a host image with a scale factor. Good balance between transparency and robustness is achieved by the selection of the scale factor. In addition, the spread spectrum technique is adopted to increase the robustness of this watermarking scheme. The experimental results show that the proposed method is of good performance and robustness for common image operations such as JPEG lossy compression, etc. 展开更多
关键词 digital watermarking discrete wavelet transform spread spectrum
下载PDF
Digital Watermark-based Security Technology for Geo-spatial Graphics Data 被引量:2
14
作者 JIA Peihong CHEN Yunzhen +1 位作者 MA Jinsong ZHU Dakui 《Chinese Geographical Science》 SCIE CSCD 2006年第3期276-281,共6页
The paper presents a set of techniques of digital watermarking by which copyright and user rights messages are hidden into geo-spatial graphics data,as well as techniques of compressing and encrypting the watermarked ... The paper presents a set of techniques of digital watermarking by which copyright and user rights messages are hidden into geo-spatial graphics data,as well as techniques of compressing and encrypting the watermarked geo-spatial graphics data.The technology aims at tracing and resisting the illegal distribution and duplication of the geo-spatial graphics data product,so as to effectively protect the data producer's rights as well as to facilitate the secure sharing of geo-spatial graphics data.So far in the CIS field throughout the world,few researches have been made on digital watermarking.The research is a novel exploration both in the field of security management of geo-spatial graphics data and in the applications of digital watermarking technique.An application software employing the proposed technology has been developed.A number of experimental tests on the 1:500,000 digital bathymetric chart of the South China Sea and 1:10,000 digital topographic map of Jiangsu Province have been conducted to verify the feasibility of the proposed technology. 展开更多
关键词 geo-spatial graphics data copyright protection digital watermarking stego carrier data encrypting
下载PDF
QIM digital watermarkingbased on LDPC code and messagepassingunder scalingattacks
15
作者 崔鑫 颜斌 +1 位作者 贾霞 王亚菲 《Journal of Measurement Science and Instrumentation》 CAS 2014年第1期37-40,共4页
Watermarking system based on quantization index modulation (QIM) is increasingly popular in high payload applications,but it is inherently fragile against amplitude scaling attacks.In order to resist desynchronizati... Watermarking system based on quantization index modulation (QIM) is increasingly popular in high payload applications,but it is inherently fragile against amplitude scaling attacks.In order to resist desynchronization attacks of QIM digital watermarking,a low density parity check (LDPC) code-aided QIM watermarking algorithm is proposed,and the performance of QIM watermarking system can be improved by incorporating LDPC code with message passing estimation/detection framework.Using the theory of iterative estimation and decoding,the watermark signal is decoded by the proposed algorithm through iterative estimation of amplitude scaling parameters and decoding of watermark.The performance of the proposed algorithm is closer to the dirty paper Shannon limit than that of repetition code aided algorithm when the algorithm is attacked by the additive white Gaussian noise.For constant amplitude scaling attacks,the proposed algorithm can obtain the accurate estimation of amplitude scaling parameters.The simulation result shows that the algorithm can obtain similar performance compared to the algorithm without desynchronization. 展开更多
关键词 digital watermarking quantization index modulation (QIM) message passing algorithm based on factor graph low density parity check (LDPC) code amplitude scaling attack
下载PDF
Digital Image Watermarking Algorithm Based on Fast Curvelet Transform 被引量:3
16
作者 Jindong Xu Huimin Pang Jianping Zhao 《Journal of Software Engineering and Applications》 2010年第10期939-943,共5页
A digital image watermarking algorithm based on fast curvelet transform is proposed. Firstly, the carrier image is decomposed by fast curvelet transform, and, the watermarking image is scrambled by Arnold transform. S... A digital image watermarking algorithm based on fast curvelet transform is proposed. Firstly, the carrier image is decomposed by fast curvelet transform, and, the watermarking image is scrambled by Arnold transform. Secondly, the binary watermarking image is embedded into the medium frequency coefficients according to the human visual characteristics and curvelet coefficients. Experiment results show that the proposed algorithm has good performance in both invisibility and security and also has good robustness against the noise, cropping, filtering, JPEG compression and other attacks. 展开更多
关键词 digital Image watermarkING FAST CURVELET Transform Human Visual Characters Robustness INVISIBILITY
下载PDF
On Secure Digital Image Watermarking Techniques 被引量:2
17
作者 Manjit Thapa Sandeep Kumar Sood 《Journal of Information Security》 2011年第4期169-184,共16页
Digital watermarking is used to hide the information inside a signal, which can not be easily extracted by the third party. Its widely used application is copyright protection of digital information. It is different f... Digital watermarking is used to hide the information inside a signal, which can not be easily extracted by the third party. Its widely used application is copyright protection of digital information. It is different from the encryption in the sense that it allows the user to access, view and interpret the signal but protect the ownership of the content. One of the current research areas is to protect digital watermark inside the information so that ownership of the information cannot be claimed by third party. With a lot of information available on various search engines, to protect the ownership of information is a crucial area of research. In latest years, several digital watermarking techniques are presented based on discrete cosine transform (DCT), discrete wavelets transform (DWT) and discrete fourier transforms (DFT). In this paper, we propose an algorithm for digital image watermarking technique based on singular value decomposition;both of the L and U components are explored for watermarking algorithm. This technique refers to the watermark embedding algorithm and watermark extracting algorithm. The experimental results prove that the quality of the watermarked image is excellent and there is strong resistant against many geometrical attacks. 展开更多
关键词 digital Image watermarkING SINGULAR Value Decomposition watermark Embedding ALGORITHM watermark EXTRACTING ALGORITHM Ratio ANALYSIS Security ANALYSIS
下载PDF
APPLICATION OF NONLINEAR WATERMARK TECHNIQUES IN DIGITAL LIBRARIES 被引量:1
18
作者 Zhao Jian Zhou Mingquan 《Journal of Electronics(China)》 2005年第5期524-527,共4页
A digital watermark is an invisible mark embedded in a digital image that may be used for a number of different purposes including copyright protection. Due to the urgent need for protecting the copyright of digital p... A digital watermark is an invisible mark embedded in a digital image that may be used for a number of different purposes including copyright protection. Due to the urgent need for protecting the copyright of digital products in digital library, digital watermarking has been proposed as a solution to this problem. This letter describes potential situations that nonlinear theory can be used to enhance robustness and security of the watermark in digital library. Some nonlinear watermark techniques have been enumerated. Experimental results show that the proposed scheme is superior to the general watermark scheme both in security and robustness in digital library. 展开更多
关键词 digital library digital watermarking NONLINEAR Copyright protection
下载PDF
Embedding and Extracting Digital Watermark Based on DCT Algorithm 被引量:1
19
作者 Haiming Li Xiaoyun Guo 《Journal of Computer and Communications》 2018年第11期287-298,共12页
The principle of digital watermark is the method of adding digital watermark in the frequency domain. The digital watermark hides the watermark in digital media, such as image, voice, video, etc., so as to realize the... The principle of digital watermark is the method of adding digital watermark in the frequency domain. The digital watermark hides the watermark in digital media, such as image, voice, video, etc., so as to realize the functions of copyright protection, and identity recognition. DCT for Discrete Cosine Transform is used to transform the image pixel value and the frequency domain coefficient matrix to realize the embedding and extracting of the blind watermark in the paper. After success, the image is attacked by white noise and Gaussian low-pass filtering. The result shows that the watermark signal embedded based on the DCT algorithm is relatively robust, and can effectively resist some attack methods that use signal distortion to destroy the watermark, and has good robustness and imperceptibility. 展开更多
关键词 digital watermark DCT Algorithm White Noise GAUSSIAN LOW-PASS Filtering Robustness IMPERCEPTIBILITY
下载PDF
Robust digital image watermarking against shearing based on Haar orthogonal function system 被引量:1
20
作者 DENGMing-hui HAOYan-ling SHENDong-hui 《Journal of Marine Science and Application》 2004年第1期75-80,共6页
In this paper, a robust digital watermarking method against shearing based on Haar orthogonal function system was introduced. The proposed method adopted the complete generalized orthogonal properties of Haar ortbogon... In this paper, a robust digital watermarking method against shearing based on Haar orthogonal function system was introduced. The proposed method adopted the complete generalized orthogonal properties of Haar ortbogonal function system to achieve the piece-based orthogonal transform on the image. The significant middle frequency coefficients in the transformation matrix are picked up, based on characteristics of the image visual system and the Haar orthogonal transform. The watermark is adoptively weighed to the middle frequency matrix. The method improves the validity of watermarking and shows excellent advantage against shearing attack. Experimental results show that the Haar orthogonal function system based watermark approach can provide an excellent protection under geometric attacks. 展开更多
关键词 digital watermarking Haar orthogonal function system shearing attack
下载PDF
上一页 1 2 239 下一页 到第
使用帮助 返回顶部