Investigation of Scalable Vector Graphics As a Cover Medium For

Total Page:16

File Type:pdf, Size:1020Kb

Investigation of Scalable Vector Graphics As a Cover Medium For AN INVESTIGATION OF SCALABLE VECTOR GRAPHICS AS A COVER MEDIUM FOR STEGANOGRAPHY By Gerard J. Hungerman Submitted to the Faculty of the College of Arts and Sciences of American University in Partial Fulfillment, of the Requirements for the Degree of M aster of Science In Computer Science Chair: Dr. Michael Gray Dr. Angela Wu ^ i I Dr. Dean McCullough Dean of the College of Arts and Sciences Date 2006 American University Washington, D.C. 20016 AMERICAN UNIVERSITY LIBRARY Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. UMI Number: 1439943 INFORMATION TO USERS The quality of this reproduction is dependent upon the quality of the copy submitted. Broken or indistinct print, colored or poor quality illustrations and photographs, print bleed-through, substandard margins, and improper alignment can adversely affect reproduction. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyright material had to be removed, a note will indicate the deletion. ® UMI UMI Microform 1439943 Copyright 2007 by ProQuest Information and Learning Company. All rights reserved. This microform edition is protected against unauthorized copying under Title 17, United States Code. ProQuest Information and Learning Company 300 North Zeeb Road P.O. Box 1346 Ann Arbor, Ml 48106-1346 Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. AN INVESTIGATION OF SCALABLE VECTOR GRAPHICS AS A COVER MEDIUM FOR STEGANOGRAPHY BY Gerard J. Hungerman ABSTRACT Cryptography is normally used when security is required in Internet communications, even though its use makes obvious to outside observers that communications are sensitive. If the true desire is for the very existence of sensitive communication to go undetected, then steganography is the answer. W ith steganography, data can be hidden in ordinary digital files such th at any unwanted interceptors of communications are likely to think that all they have are normal messages. A file format that has promise of becoming widely used on the Internet is Scalable Vector Graphics (SVG), which supports the delivery of two-dimensional graphical images with rich content. This work proposes algorithms for embedding information into SVG and implements three different approaches, each with variations to further explore the nature of the embedding techniques. Preliminary testing has been conducted to show the viability of SVG as a cover medium for steganography. ii Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. ACKNOWLEDGEMENTS I would like to acknowledge everyone who helped me to reach this point in my academic career. I would like to thank the faculty of the American University Computer Science Department, Dr. Michael Gray and Dr. Angela Wu, for their support and counsel. I would especially like to thank Dr. Dean McCullough not only for his advice and review of this work, but also for his understanding and friendship through the process. Most of all, I want to thank anyone who ever reached out to me when I was in need, whether it was to help at work, home, or to just motivate me to complete this body of work. Thank you Elise for your love and support through this balancing act. Last but certainly not least, I love my family beyond words, and cannot thank them enough for their love and support. iii Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. TABLE OF CONTENTS ABSTRACT ................................................................................................................................................. ii ACKNOWLEDGEMENTS....................................................................................................................... iii LIST OF TABLES ........................................................................................................................................ vi LIST OF ILLUSTRATIONS . ........................................................................................................ vii LISTINGS ........................................................................................................................................................viii CHAPTER 1. INTRODUCTION ....................................................................................................................... 1 2. B A C K G R O U N D .......................................................................................................................... 3 2.1 S teganography ........................................................................................................................ 3 2.1.1 Principles of Steganography ....................................................................................... 4 2.1.2 T echniques ........................................................................................................................ 7 2.1.3 Steganalysis ..................................................................................................................... 9 2.1.4 Attacks............................................................................................................................... 11 2.1.5 Security and Robustness .............................................................................................. 12 2.2 Scalable Vector Graphics .................................................................................................... 13 2.2.1 Raster Im a g e s .................................................................................................................. 13 2.2.2 Vector Im ages .................................................................................................................. 14 2.2.3 The Scalable Vector Graphics (SVG) Form at ........................................................... 15 3. COVERT CHANNELS IN SV G ................................................................................................... 22 3.1 Embedding M ethods .............................................................................................................. 23 3.1.1 In s e rtio n ............................................................................................................................ 24 3.1.2 Substitution ..................................................................................................................... 27 3.1.3 Tweaking ............................................................................................................................ 29 iv Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. 3.1.4 Other Embedding Approaches .................................................................................. 32 3.2 Im p le m e n ta tio n .................................................................................................................... 32 3.2.1 Inserting W hite Space ............................................................................................... 32 3.2.2 Adjusting Least Significant Figures ........................................................................ 34 3.2.3 Reordering Information ............................................................................................... 37 3.3 Test Results ........................................................................................................................... 40 3.3.1 B an d w id th ...................................................................................................................... 41 3.3.2 Visual and Structural Effects ..................................................................................... 44 3.3.3 Compression Testing .................................................................................................. 47 3.3.4 Statistical Analysis ...................................................................................................... 48 4. CONCLUSIONS AND FUTURE WORK ............................................................................ 51 APPENDIX A. SVG FILES USED IN TESTING .............................................................................................. 53 B. SOURCE C O D E ......................................................................................................................... 58 B.l Overview .................................................................................................................................. 58 B.1.1 Inserting White Space ............................................................................................... 60 B.1.2 Adjusting Least Significant Figures ........................................................................ 60 B.1.3 Reordering Information ............................................................................................... 61 B.1.4 Combining Methods ...................................................................................................... 62 B.2 Source Code Listings ............................................................................................................ 63 REFERENCES.................................................................................................................................................131 v Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. LIST OF TABLES Table Page
Recommended publications
  • Datasheet-Smartsignage
    Fanless Embedded Box PC with Intel® Celeron® SmartSignage 4-core Processor J1900 EBC-3311 Features Fanless digital signage solution Cableless design Low power consumption 1 x USB 3.0 Line-out 1 x USB 2.0 2 x RJ-45 VGA DC INPUT 12V On board Intel® Celeron® 4-core Processor EBC-3311B High definition video output J1900 (Bay Trail) Supports DDR3L SO-DIMM 1333 max. up to 8GB 1 x High definition video output & 1 VGA or 2 x High definition video output 1 x USB 3.0 Line-out 1 x USB 2.0 2 x RJ-45 DC INPUT 12V Front Side 1 mSATA supported High definition video output Supports VESA mount Rear Side Power Switch Applications Digital Signage Kiosk Engine POS PC IoT Gateway Specifications Image format Jpeg, tiff, png, (anim) gif, bmp System Optional for 802.11 b/g/n CPU Intel® Celeron® 4-core Processor J1900 WiFi (Bay Trail) Expansion Slot 1 x full-size Mini card Chipset SoC integrated (for mSATA) System Memory 1 x DDR3L 1333 max up to 8GB 1 x half-size PCI Express Mini card Storage 1 x mSATA supported for optional WiFi module Watchdog Timer 255 levels, 1-255 sec. Power Supply 12V DC-in I/O 1 x USB 2.0 , 1 x USB 3.0 2 x 10/100/1000Mbps Ethernet Dimensions (W x D x H) 170 x 120 x 40 mm 1 x power on/off button 6.69 x 4.72 x 1.57” 1 x Audio (Line-out) Packing Dimension 320 x 205 x 65 mm Video I/O EBC-3311 EBC-3311B (W x D x H) 12.59 x 8.07 x 2.55” 1 x High 2 x High definition Weight (net/gross) 0.7kg(1.5lb)/1.2kg(2.61b) definition video output video output Environmental 1 x VGA Operation Temperature 0°C – +40°C,(32°F – 104°F) Video MPEG-4, MPEG-2, MPEG-1, H.264,
    [Show full text]
  • Dynamic Resource Management of Network-On-Chip Platforms for Multi-Stream Video Processing
    DYNAMIC RESOURCE MANAGEMENT OF NETWORK-ON-CHIP PLATFORMS FOR MULTI-STREAM VIDEO PROCESSING Hashan Roshantha Mendis Doctor of Engineering University of York Computer Science March 2017 2 Abstract This thesis considers resource management in the context of parallel multiple video stream de- coding, on multicore/many-core platforms. Such platforms have tens or hundreds of on-chip processing elements which are connected via a Network-on-Chip (NoC). Inefficient task allo- cation configurations can negatively affect the communication cost and resource contention in the platform, leading to predictability and performance issues. Efficient resource management for large-scale complex workloads is considered a challenging research problem; especially when applications such as video streaming and decoding have dynamic and unpredictable workload characteristics. For these type of applications, runtime heuristic-based task mapping techniques are required. As the application and platform size increase, decentralised resource management techniques are more desirable to overcome the reliability and performance bot- tlenecks in centralised management. In this work, several heuristic-based runtime resource management techniques, targeting real-time video decoding workloads are proposed. Firstly, two admission control approaches are proposed; one fully deterministic and highly predictable; the other is heuristic-based, which balances predictability and performance. Secondly, a pair of runtime task mapping schemes are presented, which make use of limited known application properties, communication cost and blocking-aware heuristics. Combined with the proposed deterministic admission con- troller, these techniques can provide strict timing guarantees for hard real-time streams whilst improving resource usage. The third contribution in this thesis is a distributed, bio-inspired, low-overhead, task re-allocation technique, which is used to further improve the timeliness and workload distribution of admitted soft real-time streams.
    [Show full text]
  • Chapter 3 Image Data Representations
    Chapter 3 Image Data Representations 1 IT342 Fundamentals of Multimedia, Chapter 3 Outline • Image data types: • Binary image (1-bit image) • Gray-level image (8-bit image) • Color image (8-bit and 24-bit images) • Image file formats: • GIF, JPEG, PNG, TIFF, EXIF 2 IT342 Fundamentals of Multimedia, Chapter 3 Graphics and Image Data Types • The number of file formats used in multimedia continues to proliferate. For example, Table 3.1 shows a list of some file formats used in the popular product Macromedia Director. Table 3.1: Macromedia Director File Formats File Import File Export Native Image Palette Sound Video Anim. Image Video .BMP, .DIB, .PAL .AIFF .AVI .DIR .BMP .AVI .DIR .GIF, .JPG, .ACT .AU .MOV .FLA .MOV .DXR .PICT, .PNG, .MP3 .FLC .EXE .PNT, .PSD, .WAV .FLI .TGA, .TIFF, .GIF .WMF .PPT 3 IT342 Fundamentals of Multimedia, Chapter 3 1-bit Image - binary image • Each pixel is stored as a single bit (0 or 1), so also referred to as binary image. • Such an image is also called a 1-bit monochrome image since it contains no color. It is satisfactory for pictures containing only simple graphics and text. • A 640X480 monochrome image requires 38.4 kilobytes of storage (= 640x480 / (8x1000)). 4 IT342 Fundamentals of Multimedia, Chapter 3 8-bit Gray-level Images • Each pixel has a gray-value between 0 and 255. Each pixel is represented by a single byte; e.g., a dark pixel might have a value of 10, and a bright one might be 230. • Bitmap: The two-dimensional array of pixel values that represents the graphics/image data.
    [Show full text]
  • R-Photo User's Manual
    User's Manual © R-Tools Technology Inc 2020. All rights reserved. www.r-tt.com © R-tools Technology Inc 2020. All rights reserved. No part of this User's Manual may be copied, altered, or transferred to, any other media without written, explicit consent from R-tools Technology Inc.. All brand or product names appearing herein are trademarks or registered trademarks of their respective holders. R-tools Technology Inc. has developed this User's Manual to the best of its knowledge, but does not guarantee that the program will fulfill all the desires of the user. No warranty is made in regard to specifications or features. R-tools Technology Inc. retains the right to make alterations to the content of this Manual without the obligation to inform third parties. Contents I Table of Contents I Start 1 II Quick Start Guide in 3 Steps 1 1 Step 1. Di.s..k.. .S..e..l.e..c..t.i.o..n.. .............................................................................................................. 1 2 Step 2. Fi.l.e..s.. .M..a..r..k.i.n..g.. ................................................................................................................ 4 3 Step 3. Re..c..o..v..e..r.y.. ...................................................................................................................... 6 III Features 9 1 File Sorti.n..g.. .............................................................................................................................. 9 2 File Sea.r.c..h.. ............................................................................................................................
    [Show full text]
  • Digital Recording of Performing Arts: Formats and Conversion
    detailed approach also when the transfer of rights forms part of an employment contract between the producer of Digital recording of performing the recording and the live crew. arts: formats and conversion • Since the area of activity most probably qualifies as Stijn Notebaert, Jan De Cock, Sam Coppens, Erik Mannens, part of the ‘cultural sector’, separate remuneration for Rik Van de Walle (IBBT-MMLab-UGent) each method of exploitation should be stipulated in the Marc Jacobs, Joeri Barbarien, Peter Schelkens (IBBT-ETRO-VUB) contract. If no separate remuneration system has been set up, right holders might at any time invoke the legal default mechanism. This default mechanism grants a proportionate part of the gross revenue linked to a specific method of exploitation to the right holders. The producer In today’s digital era, the cultural sector is confronted with a may also be obliged to provide an annual overview of the growing demand for making digital recordings – audio, video and gross revenue per way of exploitation. This clause is crucial still images – of stage performances available over a multitude of in order to avoid unforeseen financial and administrative channels, including digital television and the internet. Essentially, burdens in a later phase. this can be accomplished in two different ways. A single entity can act as a content aggregator, collecting digital recordings from • Determine geographical scope and, if necessary, the several cultural partners and making this content available to duration of the transfer for each way of exploitation. content distributors or each individual partner can distribute its own • Include future methods of exploitation in the contract.
    [Show full text]
  • Designing and Developing a Model for Converting Image Formats Using Java API for Comparative Study of Different Image Formats
    International Journal of Scientific and Research Publications, Volume 4, Issue 7, July 2014 1 ISSN 2250-3153 Designing and developing a model for converting image formats using Java API for comparative study of different image formats Apurv Kantilal Pandya*, Dr. CK Kumbharana** * Research Scholar, Department of Computer Science, Saurashtra University, Rajkot. Gujarat, INDIA. Email: [email protected] ** Head, Department of Computer Science, Saurashtra University, Rajkot. Gujarat, INDIA. Email: [email protected] Abstract- Image is one of the most important techniques to Different requirement of compression in different area of image represent data very efficiently and effectively utilized since has produced various compression algorithms or image file ancient times. But to represent data in image format has number formats with time. These formats includes [2] ANI, ANIM, of problems. One of the major issues among all these problems is APNG, ART, BMP, BSAVE, CAL, CIN, CPC, CPT, DPX, size of image. The size of image varies from equipment to ECW, EXR, FITS, FLIC, FPX, GIF, HDRi, HEVC, ICER, equipment i.e. change in the camera and lens puts tremendous ICNS, ICO, ICS, ILBM, JBIG, JBIG2, JNG, JPEG, JPEG 2000, effect on the size of image. High speed growth in network and JPEG-LS, JPEG XR, MNG, MIFF, PAM, PCX, PGF, PICtor, communication technology has boosted the usage of image PNG, PSD, PSP, QTVR, RAS, BE, JPEG-HDR, Logluv TIFF, drastically and transfer of high quality image from one point to SGI, TGA, TIFF, WBMP, WebP, XBM, XCF, XPM, XWD. another point is the requirement of the time, hence image Above mentioned formats can be used to store different kind of compression has remained the consistent need of the domain.
    [Show full text]
  • Learning Actionscript 2.0 in Flash
    LEARNING ACTIONSCRIPT ™ 2.0 IN FLASH® © 2007 Adobe Systems Incorporated. All rights reserved. Learning ActionScript 2.0 in Adobe® Flash® If this guide is distributed with software that includes an end user agreement, this guide, as well as the software described in it, is furnished under license and may be used or copied only in accordance with the terms of such license. Except as permitted by any such license, no part of this guide may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, recording, or otherwise, without the prior written permission of Adobe Systems Incorporated. Please note that the content in this guide is protected under copyright law even if it is not distributed with software that includes an end user license agreement. The content of this guide is furnished for informational use only, is subject to change without notice, and should not be construed as a commitment by Adobe Systems Incorporated. Adobe Systems Incorporated assumes no responsibility or liability for any errors or inaccuracies that may appear in the informational content contained in this guide. Please remember that existing artwork or images that you may want to include in your project may be protected under copyright law. The unauthorized incorporation of such material into your new work could be a violation of the rights of the copyright owner. Please be sure to obtain any permission required from the copyright owner. Any references to company names in sample templates are for demonstration purposes only and are not intended to refer to any actual organization.
    [Show full text]
  • Zajy\CZKOWSKI Grzegorz, JAROSZ Bartosz
    OVERVIEW OF IMAGE FORMATS SUITABLE FOR PRESENTATION OF ART ON THE WWW ZAJy\CZKOWSKI Grzegorz, JAROSZ Bartosz, WOJCIECHOWSKI Konrad, SMOtKA Bogdan, Silesian Technical University of Gliwice Department of Computer Science Akademicka 16, 44-101 Gliwice Email: bsmolka(a).peach.ia.oolsl. qliwice.pl NAtECKAAnna, MAtECKA Agnieszka SYNOWIEC Pawet, KROL Bogdan School of Arts Katowice An important aspect of image processing is the enormous amount of data which has to be handled when transmitting digital images. The efficient transmission of images is extremally important as the image data transfer takes up over 90 percent of the volume on the Internet. In this aspect computer data compression is a powerfull technology which is playing a vital role in the Information Age. The compression of information can be devided into lossles and lossy techniques. In some cases such as text or financial data transfer only the losless algoritms can be applied. However when transmitting or storing digital images or music data, the application of losssy techniques is aimost invisible to the user, but enables a drastic reduction of the data volume. In this article we present some of the compression techniques which can be used when transmitting or storing digital images. All the formats we were able to gather are accompanied by a short description and an Internet link, which can be used when detailed information is needed. Our intention is to find the optimal compression format for presenting artistic images over the Internet. The first step of our project is the cataloging of the existing formats and evaluating their efficiency when transmitting data containing artistic features.
    [Show full text]
  • D:\My Documents\WP Documents\A1200
    The Complete Amiga 1200 User Guide by Peter Hutchison © 2006 Revised: 11/12/2006 Contents Introduction Page 3 Setting up the Amiga for First Time Page 4 Guide to Workbench 3.0 Page 6 Menus Page 6 Mouse Page 8 Programs Page 9 Preferences Page 13 Beyond Workbench 3.0 Page 20 Adding more Memory to the A1200 Page 20 Upgrading the Processor Page 21 Upgrading Expansion on the A1200 Page 23 Upgrading the Kickstart and Workbench Pa ge 24 The Motherboard in details Page 25 Backward Compatibility Page 26 Adding a Hard Disk to A1200 Page 27 Installing Workbench onto a Hard Disk Page 29 2 Introduction Welcome to the Commodore Amiga A1200, one of the most popular Amiga models of its time. It was affordable and easy to use. It had a wide range of software, in particular, games which Jay Minor, the creator of the Amiga, had designed it for. The Amiga A1200 is based on the Motorola 68020 14MHz Processor with 2MbRAM, a single 880K floppy drive with support for three more floppy drives, a Custom Chipset that provides the Sound and Graphics. The Amiga runs the Operating System called AmigaOS which consists of the Kickstart ROM which contains some essential libraries and devices needed to load Workbench which is the desktop: Figure 1 You can a while menu bar at the top and all the disks mounted on the right hand of the screen. The Ram Disk is a special one which is a disk in memory basically. More on Workbench will be explained later.
    [Show full text]
  • Hollywood 7.1 the Cross-Platform Multimedia Application Layer
    Hollywood 7.1 The Cross-Platform Multimedia Application Layer Andreas Falkenhahn i Table of Contents 1 General information::::::::::::::::::::::::::::: 1 1.1 Introduction :::::::::::::::::::::::::::::::::::::::::::::::::::: 1 1.2 Philosophy ::::::::::::::::::::::::::::::::::::::::::::::::::::: 4 1.3 Terms and conditions ::::::::::::::::::::::::::::::::::::::::::: 4 1.4 Requirements::::::::::::::::::::::::::::::::::::::::::::::::::: 6 1.5 Credits ::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 7 1.6 Forum and mailing list:::::::::::::::::::::::::::::::::::::::::: 8 1.7 Contact :::::::::::::::::::::::::::::::::::::::::::::::::::::::: 8 2 Getting started :::::::::::::::::::::::::::::::::: 9 2.1 Overview ::::::::::::::::::::::::::::::::::::::::::::::::::::::: 9 2.2 The GUI :::::::::::::::::::::::::::::::::::::::::::::::::::::: 10 2.3 Windows IDE ::::::::::::::::::::::::::::::::::::::::::::::::: 15 2.4 Mobile platforms :::::::::::::::::::::::::::::::::::::::::::::: 22 3 Console usage :::::::::::::::::::::::::::::::::: 29 3.1 Console mode ::::::::::::::::::::::::::::::::::::::::::::::::: 29 3.2 Console arguments :::::::::::::::::::::::::::::::::::::::::::: 29 3.3 Console emulation ::::::::::::::::::::::::::::::::::::::::::::: 46 4 Compiler and linker:::::::::::::::::::::::::::: 49 4.1 Compiling executables ::::::::::::::::::::::::::::::::::::::::: 49 4.2 Compiling applets ::::::::::::::::::::::::::::::::::::::::::::: 50 4.3 Linking data files :::::::::::::::::::::::::::::::::::::::::::::: 50 4.4 Linking fonts ::::::::::::::::::::::::::::::::::::::::::::::::::
    [Show full text]
  • Flip Pdf Pro
    FLIPBUILDER.COM FLIP PDF PRO Create Professional flipping book with PDF files PDF to Professional Page-Flipping eBook Utility User Document About Flip PDF Pro Flip PDF Pro is a much professional program to help you convert ordinary PDF files into stunning booklets with amazing page-flipping animations and sound! Besides original classical Flip PDF features such as adding background images and sound, Flip PDF Pro also provides more powerful and professional functionalities, like embedding video, audio and links into your flipbook pages, exporting defined templates and settings to theme for later easy using, using command line to automate the creation of the flash eBooks without opening the Windows desktop application. Note: This product is distributed on a "Try before-you-buy" basis. All features described in this documentation are enabled. The registered version doesn't insert a watermark in your generated page-flipping eBooks. Copyright 2013 by FlipBuilder.com - 1 - PDF to Professional Page-Flipping eBook Utility User Document Product features 1. Convert PDF to Adobe© Flash® based page-flipping eBooks. 2. Batch convert multiple PDF files to a single or multiple page-flipping eBooks. 3. Provide command line version. 4. Offer Project Panel to easy open or save project. 5. Import bookmarks (outline) with PDF, and edit them manually. 6. Import hyperlinks with PDF, include web link, page link, email link. 7. Import text so text is searchable, define the minimum search characters. 8. Detect landscape page to present as two-page spread. 9. Add watermarks text, image, dynamic date/ time etc to page-flipping eBooks. 10. Define quality and size for normal version and mobile version.
    [Show full text]
  • 2020-21 Course Descriptions
    2020-21 Course Descriptions Students should consult their success adviser and faculty adviser each quarter prior to registering for courses to be sure they are meeting graduation requirements for their course of study and taking appropriate electives. ACCESSORY DESIGN UNDERGRADUATE ACCE 101 Accessory Design Immersion Students discover the world of fashion accessory design with an in-depth exploration of the evolution of accessory trends, brands and research methodologies. Students learn to sketch accessory concepts, make patterns and select finishing techniques to bring accessory ideas to fruition. Through operating sewing machines, cutting tables and skiving machines students learn how to craft accessories with skill and precision. Prerequisite(s): DRAW 100, DSGN 102, any major or minor except accessory design. ACCE 110 Sewing Technology for Accessory Design This course introduces students to the industry practices involved in producing accessories. Students also are introduced to decorative ornamentation techniques while applying these techniques to accessory design. Basic patternmaking skills are taught and provide the foundation for future courses in accessory design. Prerequisite(s): None. ACCE 120 Materials and Processes for Accessory Design This course introduces students to core materials used in the implementation of accessory design products. By exploring the qualities and properties of traditional materials, students learn the basics of traditional and nontraditional materials. Students explore a variety of techniques related to accessory design with leather, from tanning to production. This course also explores alternative materials used in accessory products such as rubber, synthetics, woods and metals, as well as cements. This course requires experimentation culminating in a final project which explores individualized processes and material manipulation.
    [Show full text]