What is watermarking?
Watermarking vs. Steganography vs.
Cryptography
Application of watermarking
Focus on content authentication
Properties of watermarking schemes
Contents 1 Introduction 7 2 Data, domains, and applications 13 2.1 Data and applications . . . . . . . . . . . . . . . . . . . . . . . . . . 13 2.2 Categorization of data . . . . . . . . . . . . . . . . . . . . . . . . . . 15 2.3 Data acquisition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 2.4 Ontology creation . . . .....