“…Watermarkingofimagesisachallengingresearchareawhichinvolvesprinciplesandtechniquesof communications,signalprocessingandencryption (Cox,MillarandBloom,2002).Thisresearchhas manypotentialapplicationsandisdirectedtowardsdevisinganefficientwatermarkingschemewhich canbesuccessfullyimplementedinspatialand/ortransformdomains.Robustnessofembedding processisoneoftheimportantprerequisiteoftheseschemes.Evenifaschemeisprovedtoberobust enoughtotheselectedimageprocessingattacks,newattackscanbedevisedinfutureandthus,an apparentlyrobustwatermarkingschemecanbeprovedfatal.Thefinancialimplicationsofcopyright protectionareenormousandthereisarigorousincreaseofresearchactivitybyfamousresearch groupsacrosstheworldatpresent.Theresearchintheareaofimagewatermarkinginparticularhas takentwodirections.ThefirstoneisorientedtowardsitsSSPbasedindustrialapplicationslikethe onediscussedinthiswork.Thesecondorientationisevenmoreinterestingandabstractinnature.It majorlyinvolvestheuseofmachinelearningandothersoftcomputingtechniquestooptimallyembed thewatermarkintotheoptimallyidentifiedlocationswithintheimagesorvideos.Anumerousresearch activityiscarriedoutatpresentinthisdirection.Nearlyallkindsofsoftcomputingtechniques-ArtificialNeuralNetworks(ANNs) (Agarwal,2013(Agarwal, ,2015,FuzzyInferenceSystems(FIS) (Mishra, 2014(Mishra, ,2017,SupportVectorRegressionModels(SVMs) (Rajpal,2016)aswellasMetaheuristic techniques(GAanditsvariants)havebeenemployedforthispurpose.Inadditiontothesetechniques, hybridintelligentnetworksarealsoprofuselyusedtocarryoutwatermarkembeddingandextraction. Therefore,itissurethatsoonerorlaterthedevelopmentofnewandrobustwatermarkingschemes willofferacompetentandcomprehensivesolutiontotheproblemofintellectualpropertyrights(IPR) protectionandcontentauthentication.Toachievethisobjective,somestepsshouldbetaken.Such stepsmustconsistofacceptanceandimplementationofagloballyacceptedwatermarkingprotocol anddevisingwatermarkperformancebenchmarks.Tothisend,asasecondlineofresearchinsignal processingandparticularlytheimageprocessinginencrypteddomainhasattractedconsiderable attentionofresearchersinrecentyears (Erkin,Piva,Katzenbeisser,Lagendijk,Shokrollahi,Neven, andBarni,2007).Although,cryptosystemsplayasignificanttaskinsecuresignalprocessing,yet notallsystemsaresuitableforthispurpose.ThemainreasonisthatseveralcryptosystemslikeDES (DataEncryptionStandard)andAES(AdvancedEncryptionStandard)donotpreservealgebraic relationswiththeplaintextsaftertheencryptionprocess (Elgamal,1985).Ontheotherhand,special cryptosystemssuchasthosewhichofferhomomorphismkeepthisrelationship.Thus,theybecome suitableforsignalprocessingapplications.…”