Introduction - If you have any usage issues, please Google them yourself
This a methodology of robust and secure watermarking scheme as described in the following paper http://www.ias.ac.in/sadhana/Pdf2012Aug/425.pdf. Besides that the code implements ROC curves and different methods of attacks to justify the robustness of the scheme.