“…David Asatryan et.al, [4] In this paper, a watermarking algorithm is used, which allows handling over the images at different ratios of sizes of image-container and watermark. Most of the types of image tampering are based on the well known operations of Copy-Paste, Copy-Move or their combinations.…”