This book addresses the problem of copyright protection in open network environments. Author module embeds the CUN and distributor PIN in the image. In this module, FSP algorithm is used to generate public and private keys. CS module embeds the Buyer's PIN into the image using CS private key. Hash value of the image is computed using hashing algorithm. It helps for authentication purpose. In buyer module, hash value of the received image is computed using hash function. Buyer confirmation phase is used for authentication purpose.CA module detects illegal usage. Image file is transferred via LAN or email. In this book the FSP encryption/ decryption algorithm is based on the flipping, substitution and permutation operations. It is fast and fairly secure. However, it is only suitable for applications that do not expose the inputs and the encrypted form of the inputs to the public.