“…In this approach, the digital signature retrieved from an image is compared with the digital signature stored by the third party. Comparing the two signatures helps us to detect whether the image has been tampered with or not [5,6,7,8]. The watermarking method can be categorized into robust watermarking [9,10,11,12,13,14,15], semi-fragile watermarking [16,17,18,19] and fragile watermarking [20,21,22,23,24,25,26,27,28,29,30,31,32,33,34].…”