{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T11:50:00Z","timestamp":1775994600250,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T00:00:00Z","timestamp":1775952000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T00:00:00Z","timestamp":1775952000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62471406"],"award-info":[{"award-number":["62471406"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-026-21275-w","type":"journal-article","created":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T11:14:53Z","timestamp":1775992493000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Image encryption algorithm using a novel chaotic pseudo-random number generator combined with square unscented root kalman filter"],"prefix":"10.1007","volume":"85","author":[{"given":"Chenghui","family":"Wang","sequence":"first","affiliation":[]},{"given":"Shiyuan","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9674-4973","authenticated-orcid":false,"given":"Bo","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,12]]},"reference":[{"issue":"34","key":"21275_CR1","doi-asserted-by":"publisher","first-page":"80823","DOI":"10.1007\/s11042-024-18668-0","volume":"83","author":"S Krishnamoorthi","year":"2024","unstructured":"Krishnamoorthi S, Dhanaraj RK, Hafizul Islam S (2024) Ccm-prng: Pseudo-random bit generator based on cross-over chaotic map and its application in image encryption. Multimedia Tool Appl 83(34):80823\u201380846","journal-title":"Multimedia Tool Appl"},{"key":"21275_CR2","doi-asserted-by":"publisher","first-page":"2494","DOI":"10.1109\/TCSVT.2020.3021908","volume":"31","author":"J Chen","year":"2020","unstructured":"Chen J, Chen L, Zhou Y (2020) Cryptanalysis of image ciphers with permutation-substitution network and chaos. IEEE Trans Circuits Syst Video Technol 31:2494\u20132508","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"21275_CR3","first-page":"103791","volume":"83","author":"M Alawida","year":"2024","unstructured":"Alawida M (2024) A novel dna tree-based chaotic image encryption algorithm. J Inf Secur Appl 83:103791","journal-title":"J Inf Secur Appl"},{"key":"21275_CR4","doi-asserted-by":"publisher","first-page":"24626","DOI":"10.1109\/ACCESS.2019.2894673","volume":"7","author":"J Qin","year":"2019","unstructured":"Qin J, Li H, Xiang X, Tan Y, Pan W, Ma W, Xiong NN (2019) An encrypted image retrieval method based on harris corner optimization and lsh in cloud computing. IEEE Access 7:24626\u201324633","journal-title":"IEEE Access"},{"issue":"6","key":"21275_CR5","doi-asserted-by":"publisher","first-page":"065503","DOI":"10.1088\/2040-8986\/ad3e0d","volume":"26","author":"H Xu","year":"2024","unstructured":"Xu H, Wang J (2024) New 4d hyperchaotic system\u2019s application in image encryption. J Opt 26(6):065503","journal-title":"J Opt"},{"key":"21275_CR6","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1109\/TCSI.2016.2515398","volume":"63","author":"Q Wang","year":"2016","unstructured":"Wang Q, Yu S, Li C, L\u00fc J, Fang X, Guyeux C, Bahi JM (2016) Theoretical design and fpga-based implementation of higher-dimensional digital chaotic systems. IEEE Trans Circuits Syst I Regul Pap 63:401\u2013412","journal-title":"IEEE Trans Circuits Syst I Regul Pap"},{"key":"21275_CR7","doi-asserted-by":"publisher","first-page":"4028","DOI":"10.1109\/TCSVT.2021.3108767","volume":"32","author":"Y Xian","year":"2021","unstructured":"Xian Y, Wang X, Teng L (2021) Double parameters fractal sorting matrix and its application in image encryption. IEEE Trans Circuits Syst Video Technol 32:4028\u20134037","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"21275_CR8","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.sigpro.2017.07.034","volume":"142","author":"J Chen","year":"2018","unstructured":"Chen J, Zhu Z-l, Zhang L-b, Zhang Y, Yang B-q (2018) Exploiting self-adaptive permutation-diffusion and dna random encoding for secure and efficient image encryption. Signal Process 142:340\u2013353","journal-title":"Signal Process"},{"issue":"225","key":"21275_CR9","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1090\/S0025-5718-99-00996-5","volume":"68","author":"P L\u2019ecuyer","year":"1999","unstructured":"L\u2019ecuyer P (1999) Tables of linear congruential generators of different sizes and good lattice structure. Math Comput 68(225):249\u2013260","journal-title":"Math Comput"},{"key":"21275_CR10","unstructured":"Zenner E (2004) Cryptanalysis of lfsr-based pseudorandom generators-a survey. Arbeitspapier"},{"issue":"11","key":"21275_CR11","doi-asserted-by":"publisher","first-page":"1374","DOI":"10.1109\/TC.2005.181","volume":"54","author":"F Arnault","year":"2005","unstructured":"Arnault F, Berger TP (2005) Design and properties of a new pseudorandom generator based on a filtered fcsr automaton. IEEE Trans Comput 54(11):1374\u20131383","journal-title":"IEEE Trans Comput"},{"key":"21275_CR12","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.cnsns.2013.06.017","volume":"19","author":"A Akhshani","year":"2014","unstructured":"Akhshani A, Akhavan A, Mobaraki A, Lim S-C, Hassan Z (2014) Pseudo random number generator based on quantum chaotic map. Commun Nonlinear Sci Numer Simul 19:101\u2013111","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"21275_CR13","doi-asserted-by":"publisher","first-page":"411","DOI":"10.12988\/astp.2015.5342","volume":"9","author":"B Stoyanov","year":"2015","unstructured":"Stoyanov B, Kordov K (2015) Novel secure pseudo-random number generation scheme based on two tinkerbell maps. Adv Stud Theor Phys 9:411\u2013421","journal-title":"Adv Stud Theor Phys"},{"key":"21275_CR14","first-page":"58","volume":"2","author":"L Moysis","year":"2020","unstructured":"Moysis L, Tutueva A, Volos CK, Butusov D (2020) A chaos based pseudo-random bit generator using multiple digits comparison. Chaos Theory Appl 2:58\u201368","journal-title":"Chaos Theory Appl"},{"key":"21275_CR15","first-page":"863","volume":"11","author":"M Saber","year":"2021","unstructured":"Saber M, Eid MM (2021) Low power pseudo-random number generator based on lemniscate chaotic map. Int J Electr Comput Eng 11:863","journal-title":"Int J Electr Comput Eng"},{"key":"21275_CR16","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/s11071-018-4361-4","volume":"94","author":"X Lv","year":"2018","unstructured":"Lv X, Liao X, Yang B (2018) A novel pseudo-random number generator from coupled map lattice with time-varying delay. Nonlinear Dyn 94:325\u2013341","journal-title":"Nonlinear Dyn"},{"key":"21275_CR17","doi-asserted-by":"publisher","first-page":"121090","DOI":"10.1016\/j.eswa.2023.121090","volume":"235","author":"H Liu","year":"2024","unstructured":"Liu H, Teng L, Zhang Y, Si R, Liu P (2024) Mutil-medical image encryption by a new spatiotemporal chaos model and dna new computing for information security. Expert Syst Appl 235:121090","journal-title":"Expert Syst Appl"},{"issue":"5","key":"21275_CR18","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1140\/epjp\/s13360-023-04078-y","volume":"138","author":"Q Ren","year":"2023","unstructured":"Ren Q, Teng L, Wang X, Jiang D (2023) A visually secure image encryption scheme based on compressed sensing and chebyshev-dynamics coupled map lattices in cloud environment. The European Phys J Plus 138(5):436","journal-title":"The European Phys J Plus"},{"key":"21275_CR19","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2024.3407809","volume-title":"Multi-image encryption algorithm based on novel spatiotemporal chaotic system and fractal geometry","author":"L Huang","year":"2024","unstructured":"Huang L, Gao H (2024) Multi-image encryption algorithm based on novel spatiotemporal chaotic system and fractal geometry. Regular Papers, IEEE Transactions on Circuits and Systems I"},{"key":"21275_CR20","doi-asserted-by":"publisher","first-page":"108678","DOI":"10.1016\/j.sigpro.2022.108678","volume":"200","author":"Y Fu","year":"2022","unstructured":"Fu Y, Sun M, Gao Y (2022) Tightly coupled distributed kalman filter under non-gaussian noises. Signal Process 200:108678","journal-title":"Signal Process"},{"key":"21275_CR21","doi-asserted-by":"publisher","first-page":"108837","DOI":"10.1016\/j.sigpro.2022.108837","volume":"204","author":"S Qiao","year":"2023","unstructured":"Qiao S, Fan Y, Wang G, Mu D, He Z (2023) Strong tracking square-root modified sliding-window variational adaptive kalman filtering with unknown noise covariance matrices. Signal Process 204:108837","journal-title":"Signal Process"},{"key":"21275_CR22","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.ins.2020.12.065","volume":"556","author":"Y Luo","year":"2021","unstructured":"Luo Y, Liu Y, Liu J, Tang S, Harkin J, Cao Y (2021) Counteracting dynamical degradation of a class of digital chaotic systems via unscented kalman filter and perturbation. Inf Sci 556:49\u201366","journal-title":"Inf Sci"},{"issue":"9","key":"21275_CR23","doi-asserted-by":"publisher","first-page":"8509","DOI":"10.1109\/TCSVT.2024.3384297","volume":"34","author":"Y Wang","year":"2024","unstructured":"Wang Y, Chen L, Yu K, Fu T (2024) A secure spatio-temporal chaotic pseudorandom generator for image encryption. IEEE Trans Circuits Syst Video Technol 34(9):8509\u20138521","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"21275_CR24","doi-asserted-by":"publisher","first-page":"3003","DOI":"10.1007\/s11071-023-09170-7","volume":"112","author":"Y Wang","year":"2024","unstructured":"Wang Y, Chen L, Yu K, Fang H (2024) Multi-key spatio-temporal chaotic image encryption and retrieval scheme. Nonlinear Dyn 112:3003\u20133025","journal-title":"Nonlinear Dyn"},{"key":"21275_CR25","doi-asserted-by":"publisher","first-page":"2589","DOI":"10.1109\/TSP.2007.914964","volume":"56","author":"I Arasaratnam","year":"2008","unstructured":"Arasaratnam I, Haykin S (2008) Square-root quadrature kalman filtering. IEEE Trans Signal Process 56:2589\u20132593","journal-title":"IEEE Trans Signal Process"},{"issue":"4","key":"21275_CR26","doi-asserted-by":"publisher","first-page":"11557","DOI":"10.1007\/s11042-023-15964-z","volume":"83","author":"S Fan","year":"2024","unstructured":"Fan S, Chen K, Tian J (2024) A novel image encryption algorithm based on coupled map lattices model. Multimedia Tools Appl 83(4):11557\u201311572","journal-title":"Multimedia Tools Appl"},{"issue":"8","key":"21275_CR27","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1140\/epjp\/s13360-024-05413-7","volume":"139","author":"S Yang","year":"2024","unstructured":"Yang S, Li Z, Tan W (2024) Enhanced image encryption with compression using improved coupled map lattices and fisher-yates permutation-diffusion. The European Phys J Plus 139(8):746","journal-title":"The European Phys J Plus"},{"issue":"13","key":"21275_CR28","doi-asserted-by":"publisher","first-page":"38037","DOI":"10.1007\/s11042-023-17150-7","volume":"83","author":"UK Gera","year":"2024","unstructured":"Gera UK, Agrawal S (2024) Image encryption using combination of 4d discrete hyperchaotic map and dna encoding. Multimedia Tools Appl 83(13):38037\u201338054","journal-title":"Multimedia Tools Appl"},{"key":"21275_CR29","doi-asserted-by":"publisher","first-page":"6663","DOI":"10.1007\/s11227-019-02878-7","volume":"75","author":"A Arab","year":"2019","unstructured":"Arab A, Rostami MJ, Ghavami B (2019) An image encryption method based on chaos system and aes algorithm. J Supercomput 75:6663\u20136682","journal-title":"J Supercomput"},{"issue":"4","key":"21275_CR30","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/s10462-024-10719-0","volume":"57","author":"S Kumar","year":"2024","unstructured":"Kumar S, Sharma D (2024) A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm. Artif Intell Rev 57(4):87","journal-title":"Artif Intell Rev"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-026-21275-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-026-21275-w","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-026-21275-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T11:14:55Z","timestamp":1775992495000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-026-21275-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,12]]},"references-count":30,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2026,4]]}},"alternative-id":["21275"],"URL":"https:\/\/doi.org\/10.1007\/s11042-026-21275-w","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,4,12]]},"assertion":[{"value":"16 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 August 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 September 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 April 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"The authors confirm that the work has not been previously published in any form, except as an abstract or part of a published lecture, review, or thesis, and that it is not under review for publication in any other publication. Moreover, its publication has been approved by all co-authors, if any, either tacitly or explicitly. Furthermore, the institution where the work was conducted has also approved its publication, either tacitly or explicitly.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"356"}}