Over past few years, we are the spectators of the evolution in the field of information technology, telecommunication and networking. Due to the advancement of smart phones, easy and inexpensive access to the internet and popularity of social networking, capture and use of digital images has increased drastically. Image processing techniques are getting developed at rapidly and at the same time easy to use image tampering soft-wares are also getting readily available. If tampered images are misused, big troubles having deep moral, ethical and lawful allegations may arise. Due to high potential of visual media and the ease in their capture, distribution and storage, we rarely find a field where digital visual data is not used. The value of image as evidence of event must be carefully assessed and it is a call for from different fields of applications. Therefore, in this age of fantasy, image authentication has become an issue of utmost importance.