Excerpt from Accessible images (AIMS): a model to build self‐describing images for assisting screen reader users
Slide 12
Slide 12 text
Pros
+ Ease of implementation
+ Works with any image MIME type
+ Supported in browsers since
HTML 2
Slide 13
Slide 13 text
No content
Slide 14
Slide 14 text
Cons
– Requires coding knowledge
– Decoupled from the actual image
– Plenty* of devs have little to no a11y skills
*presenter’s observation of peers from over 12 years of experience in front-end development field
Slide 15
Slide 15 text
No content
Slide 16
Slide 16 text
No content
Slide 17
Slide 17 text
May 16, 2006 newscientist.com/article/dn9177-gamers-help-the-blind-get-the-picture
Slide 18
Slide 18 text
No content
Slide 19
Slide 19 text
Steganography
Slide 20
Slide 20 text
Steganography
the practice of concealing messages
or information within other
nonsecret text or data.
Slide 21
Slide 21 text
No content
Slide 22
Slide 22 text
No content
Slide 23
Slide 23 text
No content
Slide 24
Slide 24 text
No content
Slide 25
Slide 25 text
there are many steganography
techniques and approaches
Slide 26
Slide 26 text
+ concealing text in images
+ using LSB method
Slide 27
Slide 27 text
1 convert text to bits
2 store bits in LSBs of pixel data
Slide 28
Slide 28 text
close up photo of a lion facing to the left
99
1100011
ASCII character code
Slide 29
Slide 29 text
20, 255, 102
0010100
LSB
c
99
1100011
ASCII character code
save!
1
Slide 30
Slide 30 text
No content
Slide 31
Slide 31 text
No content
Slide 32
Slide 32 text
No content
Slide 33
Slide 33 text
Assumptions
? knowing length of alt text
? method to compute bit position in image
Slide 34
Slide 34 text
Knowing the length of alt text
? store length in consistent pixel location
? use special character to indicate end (EOF?)
? NLP (lol no)
Slide 35
Slide 35 text
Computing bit position in image
? use a PRNG with seed
? decoder needs to know the seed
Slide 36
Slide 36 text
Browser extension
Slide 37
Slide 37 text
Browser extension
third party script that can run on
pages loaded by a user
Slide 38
Slide 38 text
Browser extension
a terrifying way to give third party
code a same-origin policy waiver
Slide 39
Slide 39 text
No content
Slide 40
Slide 40 text
No content
Slide 41
Slide 41 text
Implementation
noopkat.github.io/a11y-alt-stego
Slide 42
Slide 42 text
Pros
+ Description is portable with image
+ Less code
+ Less effort
+ Rad use of steganography
Slide 43
Slide 43 text
Cons
– Single language restriction
– Lossless image format required
– Compression can destroy / corrupt data
– Most significant human labor not removed
– Opt-in, standard adoption challenges