Masking Models and Watermarking: A Discussion on Methods and Effectiveness (Chapter II)