This document summarizes and analyzes several existing image-based relational database watermarking techniques. It begins with background on database watermarking, including applications, classifications of techniques, desired characteristics of watermarked databases, and types of attacks. It then reviews four specific algorithms that embed image watermarks into database attributes. The algorithms are analyzed for robustness against different attacks like modification, deletion and addition of tuples. The document concludes various image-based techniques are effective for copyright protection and survive attacks while preserving data integrity.