Inlay Techniques with a Cover Plate Die

Inlay Techniques with a Cover Plate Die

Hi everyone!  Samantha here.  I am so excited to be the February Guest Designer for Crafty Meraki.   This week the focus is on die-cutting, and I thought it would be fun to share my technique for creating a "stained glass window" card using alcohol inks and the beautiful Lenten Rose Mini Slimline Para-Die

To start my project I grabbed drinking straws, alcohol ink card stock, Ranger alcohol inks, and some 91% rubbing alcohol.  

I needed three sheets of cardstock for my card, one each in shades of red, yellow, and blue.  To create each paper, I added various shades of inks along with Gold and Snow Cap Mixatives and created swirling patterns by blowing through a straw.  I also added in rubbing alcohol to help move the colors around the paper.  Once done, I let them fully dry overnight before spraying each sheet with a few layers of Kamar Varnish to seal in the color. 

Next, it was time to die cut.   

I cut each sheet of cardstock using the Lenten Rose Para-die.   I very carefully, tried to keep all of the die cuts pressed within the die itself before applying them to a sheet of Press 'N Seal wrap.  My goal was to keep the die cuts together in the shape of the cover plate die for ease when inlaying the die cuts later on. 

 

After cutting my alcohol ink-friendly cardstock , I cut a frame with the Lenten Rose Para-die out of brushed gold cardstock and adhered it to a 3.5" x 6.25" white card panel as my base for the inlay work. 

To do the actual inlay, using tweezers and a pick-up tool, I carefully grabbed each die cut piece from my Press 'N Seal sheets and glued them in place matching the die cut to its corresponding spot on the frame.  I used the red for the petals, the gold for the flower centers, and the teal blues for the areas between the flowers. 

Once my panel was complete, I added a white "Love You" sentiment using a die from my stash as well as giving the panel a white border.  I cut a card base 7.5" x 6.5" scoring at the 3.75" mark and then glued down my inlay card panel. 

This card took some time to complete.   A little more than I was expecting, but I just love the uniue results.  I hope you give it a try!

 

Reading next

Madison Flora Die-Cutting Technique
Meraki Musings - Die Cutting

21 comments

Blanchard Mccann

Blanchard Mccann

Hello everyone, I want you all to help me pray and thank Seeker Assets Recovery for the good work done, without this honest firm I don’t know how my life could have been today because my money was stolen by Bitcoins scammer who promise me a huge percentage if I invest with them but turn out to be scammers, but with the help of Seeker Assets Recovery after I enroll my case with them and I followed their procedures, they swift to action and recover all my lost money including my supposed percentage from this scammers firm back to my wallet with in 24 hours and I gladly refer them to some one out there who needs this help too, email: info@seekerassetsrecovery.com, Website: seekerassetsrecovery.com

Geovita Alex

Geovita Alex

Scanner Hackers Recovery, a reputable cryptocurrency recovery service, employs a comprehensive approach to recover stolen cryptocurrency. Here’s a step-by-step overview of their recovery process:

Initial Assessment
1. Case Evaluation: Scanner Hackers Recovery evaluates the case to determine the likelihood of recovery.
2. Information Gathering: They collect relevant information, such as transaction IDs, wallet addresses, and any other pertinent data. Blockchain Analysis
1. Transaction Tracking: Scanner Hackers Recovery uses advanced blockchain analysis tools to track the movement of the stolen cryptocurrency.
2. Address Clustering: They identify clusters of addresses associated with the stolen funds.
3.Transaction Pattern Analysis: Scanner Hackers Recovery analyzes transaction patterns to identify potential leads. Recovery Strategy
1. Customized Recovery Plan: Based on the analysis, Scanner Hackers Recovery develops a customized recovery plan.
2. Collaboration with Exchanges: They work with cryptocurrency exchanges to freeze and recover stolen funds.
3. Law Enforcement Coordination: Scanner Hackers Recovery coordinates with law enforcement agencies to track down and prosecute perpetrators. Recovery Execution
1. Recovery Operations: Scanner Hackers Recovery executes the recovery plan, using various techniques to recover the stolen cryptocurrency.
2. Wallet Recovery: They recover access to the wallet and secure the funds.
3. Fund Transfer: Scanner Hackers Recovery transfers the recovered funds to a secure wallet. Post-Recovery
1. Secure Storage: Scanner Hackers Recovery ensures the recovered funds are stored securely.
2. Client Updates: They provide regular updates to the client throughout the recovery process.
3. Documentation: Scanner Hackers Recovery maintains detailed records of the recovery process.

Please note that the success of the recovery process depends on various factors, including the complexity of the case and the cooperation of law enforcement and exchanges. Contact email: scannerhackersrecovery@plendtech.com

geovita Alex

geovita Alex

Saclux Comptech Specialist, a reputable cryptocurrency recovery service, employs a comprehensive approach to recover stolen cryptocurrency. Here’s a step-by-step overview of their recovery process:

Initial Assessment
1. Case Evaluation: Saclux Comptech Specialist evaluates the case to determine the likelihood of recovery.
2. Information Gathering: They collect relevant information, such as transaction IDs, wallet addresses, and any other pertinent data. Blockchain Analysis
1. Transaction Tracking: Saclux Comptech Specialist uses advanced blockchain analysis tools to track the movement of the stolen cryptocurrency.
2. Address Clustering: They identify clusters of addresses associated with the stolen funds.
3. Transaction Pattern Analysis: Saclux Comptech Specialist analyzes transaction patterns to identify potential leads. Recovery Strategy
1. Customized Recovery Plan: Based on the analysis, Saclux Comptech Specialist develops a customized recovery plan.
2. Collaboration with Exchanges: They work with cryptocurrency exchanges to freeze and recover stolen funds.
3. Law Enforcement Coordination: Saclux Comptech Specialist coordinates with law enforcement agencies to track down and prosecute perpetrators. Recovery Execution
1. Recovery Operations: Saclux Comptech Specialist executes the recovery plan, using various techniques to recover the stolen cryptocurrency.
2. Wallet Recovery: They recover access to the wallet and secure the funds.
3. Fund Transfer: Saclux Comptech Specialist transfers the recovered funds to a secure wallet. Post-Recovery
1. Secure Storage: Saclux Comptech Specialist ensures the recovered funds are stored securely.
2. Client Updates: They provide regular updates to the client throughout the recovery process.
3. Documentation: Saclux Comptech Specialist maintains detailed records of the recovery process.

Please note that the success of the recovery process depends on various factors, including the complexity of the case and the cooperation of law enforcement and exchanges. Contact: sacluxcomptechspecialst@engineer.com
Telegram:@SacluxComptech

Recovery Intelligence

Recovery Intelligence

ARE YOU A VICTIM OF INVESTMENT OR NFT SCAM? DO YOU WANT TO INVESTIGATE A CHEATING SPOUSE? DO YOU DESIRE CREDIT REPAIR (ALL BUREAUS)? SCHEDULE A MEETING WITH AN ETHICAL HACKER ASAP TO GET STARTED.

Let us show you the art of Ethical Hacking….!

EMERALD HACKS is a financial regulator, PRIVATE investigation and funds recovery body. We specialize in cases as regards ETHICAL HACKING, CRYPTOCURRENCY, FAKE INVESTMENT SCHEMES and RECOVERY SCAM. We are also experts in CREDIT REPAIR, we analyze what’s impacting your score.
All software tools needed to execute RECOVERIES from start to finish are available in stock.
Kindly NOTE that the available tools does NOT apply to CREDIT FIX.

Be ALERT to FALSE reviews and testimonies on the internet, the authors and perpetrators unite to form a syndicate.

Contact our team as soon as you can via the email address below to book a mail meeting with an ethical hacker.
emeraldhacks (.) org (@) gmail (.) com

Stay Safe out there !

Mary Jiang

Mary Jiang

At last, a reliable and effective service I can rely on! I can only imagine how many people are struggling with crypto-related issues and are likely also unsure of their ability to find practical solutions. This is where jamesmckaywizard Recovery rightfully enters the picture as the best provider of the service, and their success is clearly demonstrated by the fact that they were able to help me recover 550,000 EUROS that I had lost to online cryptocurrency theft. Get in touch with them now if facing same loss chanllenges: Email addresses:jamesmckaywizard at gmail dot com or WhatsApp +31622647750. Kindly reach on these given details.

Leave a comment

This site is protected by hCaptcha and the hCaptcha Privacy Policy and Terms of Service apply.